1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101
|
/* NSS AEAD, for libreswan
*
* Copyright (C) 2018 Andrew Cagney <cagney@gnu.org>
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the
* Free Software Foundation; either version 2 of the License, or (at your
* option) any later version. See <https://www.gnu.org/licenses/gpl2.txt>.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
*/
#ifndef IKE_ALG_ENCRYPT_OPS_H
#define IKE_ALG_ENCRYPT_OPS_H
#include "chunk.h"
#include "shunk.h"
struct logger;
enum cipher_op;
enum cipher_iv_source;
struct cipher_op_context;
struct crypt_mac;
struct encrypt_ops {
const char *backend;
/*
* Delegate responsibility for checking OPS specific fields.
*/
void (*const cipher_check)(const struct encrypt_desc *cipher,
struct logger *logger);
/*
* Create/delete a crypto context for use by the IKE SA.
*/
struct cipher_op_context *(*const cipher_op_context_create)(const struct encrypt_desc *cipher,
enum cipher_op,
enum cipher_iv_source,
PK11SymKey *symkey,
shunk_t salt,
struct logger *logger);
void (*const cipher_op_context_destroy)(struct cipher_op_context **context,
struct logger *logger);
/*
* Perform simple encryption.
*
* Presumably something else is implementing the integrity.
*/
void (*const cipher_op_normal)(const struct encrypt_desc *cipher,
struct cipher_op_context *context,
enum cipher_op op,
enum cipher_iv_source iv_source,
PK11SymKey *symkey,
shunk_t salt,
chunk_t wire_iv,
chunk_t text,
/**/
struct crypt_mac *ikev1_iv,
struct logger *logger);
/*
* Perform Authenticated Encryption with Associated Data
* (AEAD).
*
* The salt and wire-IV are concatenated to form the NONCE
* (aka. counter variable; IV; ...).
*
* The Additional Authentication Data (AAD) and the
* cipher-text are concatenated when generating/validating the
* tag (which is appended to the text).
*
* All sizes are in 8-bit bytes.
*
* Danger: TEXT and TAG are clearly contigious.
*/
bool (*const cipher_op_aead)(const struct encrypt_desc *cipher,
struct cipher_op_context *context,
enum cipher_op op,
enum cipher_iv_source iv_source,
PK11SymKey *symkey,
shunk_t salt,
/**/
chunk_t wire_iv,
shunk_t aad,
chunk_t text_and_tag,
size_t text_size, size_t tag_size,
struct logger *logger);
};
extern const struct encrypt_ops ike_alg_encrypt_nss_aead_ops;
extern const struct encrypt_ops ike_alg_encrypt_nss_cbc_ops;
extern const struct encrypt_ops ike_alg_encrypt_nss_ctr_ops;
extern const struct encrypt_ops ike_alg_encrypt_null_ops;
#endif
|