/* * anytun * * The secure anycast tunneling protocol (satp) defines a protocol used * for communication between any combination of unicast and anycast * tunnel endpoints. It has less protocol overhead than IPSec in Tunnel * mode and allows tunneling of every ETHER TYPE protocol (e.g. * ethernet, ip, arp ...). satp directly includes cryptography and * message authentication based on the methodes used by SRTP. It is * intended to deliver a generic, scaleable and secure solution for * tunneling and relaying of packets of any protocol. * * * Copyright (C) 2007-2008 Othmar Gsenger, Erwin Nindl, * Christian Pointner * * This file is part of Anytun. * * Anytun is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * any later version. * * Anytun is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with anytun. If not, see . */ #ifndef _AUTHALGO_H_ #define _AUTHALGO_H_ #include "datatypes.h" #include "buffer.h" #include "encryptedPacket.h" #ifndef NO_CRYPT #ifndef USE_SSL_CRYPTO #include #else #include #endif #endif #include "keyDerivation.h" class AuthAlgo { public: AuthAlgo() : dir_(KD_INBOUND) {}; AuthAlgo(kd_dir_t d) : dir_(d) {}; virtual ~AuthAlgo() {}; /** * generate the mac * @param packet the packet to be authenticated */ virtual void generate(KeyDerivation& kd, EncryptedPacket& packet) = 0; /** * check the mac * @param packet the packet to be authenticated */ virtual bool checkTag(KeyDerivation& kd, EncryptedPacket& packet) = 0; protected: kd_dir_t dir_; }; //****** NullAuthAlgo ****** class NullAuthAlgo : public AuthAlgo { public: void generate(KeyDerivation& kd, EncryptedPacket& packet); bool checkTag(KeyDerivation& kd, EncryptedPacket& packet); static const u_int32_t DIGEST_LENGTH = 0; }; #ifndef NO_CRYPT //****** Sha1AuthAlgo ****** //* HMAC SHA1 Auth Tag Generator Class class Sha1AuthAlgo : public AuthAlgo { public: Sha1AuthAlgo(kd_dir_t d); ~Sha1AuthAlgo(); void generate(KeyDerivation& kd, EncryptedPacket& packet); bool checkTag(KeyDerivation& kd, EncryptedPacket& packet); static const u_int32_t DIGEST_LENGTH = 20; private: #ifndef USE_SSL_CRYPTO gcry_md_hd_t handle_; #else HMAC_CTX ctx_; #endif Buffer key_; }; #endif #endif