18c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/*-
28c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * Copyright (c) 2001-2008, by Cisco Systems, Inc. All rights reserved.
3ecc6b8c25a7e8d9d2b78889e88224354a1cc3160tuexen * Copyright (c) 2008-2012, by Randall Stewart. All rights reserved.
4ecc6b8c25a7e8d9d2b78889e88224354a1cc3160tuexen * Copyright (c) 2008-2012, by Michael Tuexen. All rights reserved.
58c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen *
68c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * Redistribution and use in source and binary forms, with or without
78c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * modification, are permitted provided that the following conditions are met:
88c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen *
98c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * a) Redistributions of source code must retain the above copyright notice,
100ac02f34d6041cd0018437596a5a9a94685e6919tuexen *    this list of conditions and the following disclaimer.
118c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen *
128c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * b) Redistributions in binary form must reproduce the above copyright
138c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen *    notice, this list of conditions and the following disclaimer in
140ac02f34d6041cd0018437596a5a9a94685e6919tuexen *    the documentation and/or other materials provided with the distribution.
158c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen *
168c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * c) Neither the name of Cisco Systems, Inc. nor the names of its
178c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen *    contributors may be used to endorse or promote products derived
188c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen *    from this software without specific prior written permission.
198c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen *
208c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
218c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
228c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
238c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
248c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
258c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
268c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
278c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
288c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
298c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
308c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * THE POSSIBILITY OF SUCH DAMAGE.
318c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen */
328c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
338c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#ifdef __FreeBSD__
348c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#include <sys/cdefs.h>
35fb3816eaffe5878bb1286adb120fd160da178a05t__FBSDID("$FreeBSD: head/sys/netinet/sctp_auth.h 269858 2014-08-12 11:30:16Z tuexen $");
368c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#endif
378c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
38ecc6b8c25a7e8d9d2b78889e88224354a1cc3160tuexen#ifndef _NETINET_SCTP_AUTH_H_
39ecc6b8c25a7e8d9d2b78889e88224354a1cc3160tuexen#define _NETINET_SCTP_AUTH_H_
408c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
4183a86bbf399ce2b9b51cdf1c0c679944bbcee0a9t#include <netinet/sctp_os.h>
428c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
438c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* digest lengths */
448c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#define SCTP_AUTH_DIGEST_LEN_SHA1	20
458c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#define SCTP_AUTH_DIGEST_LEN_SHA256	32
4683a86bbf399ce2b9b51cdf1c0c679944bbcee0a9t#define SCTP_AUTH_DIGEST_LEN_MAX	SCTP_AUTH_DIGEST_LEN_SHA256
478c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
488c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* random sizes */
498c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#define SCTP_AUTH_RANDOM_SIZE_DEFAULT	32
508c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#define SCTP_AUTH_RANDOM_SIZE_REQUIRED	32
518c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
528c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* union of all supported HMAC algorithm contexts */
538c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexentypedef union sctp_hash_context {
5483a86bbf399ce2b9b51cdf1c0c679944bbcee0a9t	SCTP_SHA1_CTX sha1;
5583a86bbf399ce2b9b51cdf1c0c679944bbcee0a9t#if defined(SCTP_SUPPORT_HMAC_SHA256)
5683a86bbf399ce2b9b51cdf1c0c679944bbcee0a9t	SCTP_SHA256_CTX sha256;
578c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#endif
588c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen} sctp_hash_context_t;
598c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
608c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexentypedef struct sctp_key {
618c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	uint32_t keylen;
628c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	uint8_t key[];
638c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen} sctp_key_t;
648c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
658c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexentypedef struct sctp_shared_key {
668c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	LIST_ENTRY(sctp_shared_key) next;
678c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	sctp_key_t *key;	/* key text */
688c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	uint32_t refcount;	/* reference count */
698c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	uint16_t keyid;		/* shared key ID */
708c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	uint8_t deactivated;	/* key is deactivated */
718c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen} sctp_sharedkey_t;
728c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
738c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenLIST_HEAD(sctp_keyhead, sctp_shared_key);
748c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
758c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* authentication chunks list */
768c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexentypedef struct sctp_auth_chklist {
778c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	uint8_t chunks[256];
788c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	uint8_t num_chunks;
798c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen} sctp_auth_chklist_t;
808c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
818c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* hmac algos supported list */
828c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexentypedef struct sctp_hmaclist {
838c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	uint16_t max_algo;	/* max algorithms allocated */
848c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	uint16_t num_algo;	/* num algorithms used */
858c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	uint16_t hmac[];
868c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen} sctp_hmaclist_t;
878c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
888c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* authentication info */
898c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexentypedef struct sctp_authinformation {
908c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	sctp_key_t *random;	/* local random key (concatenated) */
918c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	uint32_t random_len;	/* local random number length for param */
928c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	sctp_key_t *peer_random;/* peer's random key (concatenated) */
938c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	sctp_key_t *assoc_key;	/* cached concatenated send key */
948c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	sctp_key_t *recv_key;	/* cached concatenated recv key */
958c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	uint16_t active_keyid;	/* active send keyid */
968c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	uint16_t assoc_keyid;	/* current send keyid (cached) */
978c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen	uint16_t recv_keyid;	/* last recv keyid (cached) */
988c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen} sctp_authinfo_t;
998c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
1008c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
1018c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
1028c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/*
1038c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * Macros
1048c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen */
1058c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#define sctp_auth_is_required_chunk(chunk, list) ((list == NULL) ? (0) : (list->chunks[chunk] != 0))
1068c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
1078c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/*
1088c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * function prototypes
1098c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen */
1108c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
1118c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* socket option api functions */
1128c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_auth_chklist_t *sctp_alloc_chunklist(void);
1138c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_free_chunklist(sctp_auth_chklist_t *chklist);
1148c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_clear_chunklist(sctp_auth_chklist_t *chklist);
1158c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_auth_chklist_t *sctp_copy_chunklist(sctp_auth_chklist_t *chklist);
1168c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_auth_add_chunk(uint8_t chunk, sctp_auth_chklist_t *list);
1178c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_auth_delete_chunk(uint8_t chunk, sctp_auth_chklist_t *list);
1188c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern size_t sctp_auth_get_chklist_size(const sctp_auth_chklist_t *list);
1198c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_serialize_auth_chunks(const sctp_auth_chklist_t *list,
1208c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    uint8_t *ptr);
1218c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_pack_auth_chunks(const sctp_auth_chklist_t *list,
1228c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    uint8_t *ptr);
1238c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_unpack_auth_chunks(const uint8_t *ptr, uint8_t num_chunks,
1248c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    sctp_auth_chklist_t *list);
1258c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
1268c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* key handling */
1278c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_key_t *sctp_alloc_key(uint32_t keylen);
1288c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_free_key(sctp_key_t *key);
1298c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_print_key(sctp_key_t *key, const char *str);
1308c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_show_key(sctp_key_t *key, const char *str);
1318c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_key_t *sctp_generate_random_key(uint32_t keylen);
1328c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_key_t *sctp_set_key(uint8_t *key, uint32_t keylen);
1338c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_key_t *sctp_compute_hashkey(sctp_key_t *key1, sctp_key_t *key2,
1348c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    sctp_key_t *shared);
1358c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
1368c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* shared key handling */
1378c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_sharedkey_t *sctp_alloc_sharedkey(void);
1388c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_free_sharedkey(sctp_sharedkey_t *skey);
1398c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_sharedkey_t *sctp_find_sharedkey(struct sctp_keyhead *shared_keys,
1408c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    uint16_t key_id);
1418c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_insert_sharedkey(struct sctp_keyhead *shared_keys,
1428c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    sctp_sharedkey_t *new_skey);
1438c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_copy_skeylist(const struct sctp_keyhead *src,
1448c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    struct sctp_keyhead *dest);
1458c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* ref counts on shared keys, by key id */
1468c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_auth_key_acquire(struct sctp_tcb *stcb, uint16_t keyid);
1478c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_auth_key_release(struct sctp_tcb *stcb, uint16_t keyid,
1488c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    int so_locked);
1498c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
1508c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
1518c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* hmac list handling */
1528c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_hmaclist_t *sctp_alloc_hmaclist(uint8_t num_hmacs);
1538c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_free_hmaclist(sctp_hmaclist_t *list);
1548c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_auth_add_hmacid(sctp_hmaclist_t *list, uint16_t hmac_id);
1558c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_hmaclist_t *sctp_copy_hmaclist(sctp_hmaclist_t *list);
1568c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_hmaclist_t *sctp_default_supported_hmaclist(void);
1578c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern uint16_t sctp_negotiate_hmacid(sctp_hmaclist_t *peer,
1588c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    sctp_hmaclist_t *local);
1598c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_serialize_hmaclist(sctp_hmaclist_t *list, uint8_t *ptr);
1608c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_verify_hmac_param(struct sctp_auth_hmac_algo *hmacs,
1618c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    uint32_t num_hmacs);
1628c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
1638c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_authinfo_t *sctp_alloc_authinfo(void);
1648c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_free_authinfo(sctp_authinfo_t *authinfo);
1658c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
1668c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* keyed-HMAC functions */
1678c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern uint32_t sctp_get_auth_chunk_len(uint16_t hmac_algo);
1688c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern uint32_t sctp_get_hmac_digest_len(uint16_t hmac_algo);
1698c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern uint32_t sctp_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
1708c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    uint8_t *text, uint32_t textlen, uint8_t *digest);
1718c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_verify_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
1728c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    uint8_t *text, uint32_t textlen, uint8_t *digest, uint32_t digestlen);
1738c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern uint32_t sctp_compute_hmac(uint16_t hmac_algo, sctp_key_t *key,
1748c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    uint8_t *text, uint32_t textlen, uint8_t *digest);
1758c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_auth_is_supported_hmac(sctp_hmaclist_t *list, uint16_t id);
1768c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
1778c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* mbuf versions */
1788c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern uint32_t sctp_hmac_m(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
1798c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    struct mbuf *m, uint32_t m_offset, uint8_t *digest, uint32_t trailer);
1808c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern uint32_t sctp_compute_hmac_m(uint16_t hmac_algo, sctp_key_t *key,
1818c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    struct mbuf *m, uint32_t m_offset, uint8_t *digest);
1828c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
1838c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/*
1848c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * authentication routines
1858c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen */
1868c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_clear_cachedkeys(struct sctp_tcb *stcb, uint16_t keyid);
1878c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_clear_cachedkeys_ep(struct sctp_inpcb *inp, uint16_t keyid);
1888c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_delete_sharedkey(struct sctp_tcb *stcb, uint16_t keyid);
1898c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_delete_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid);
1908c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_auth_setactivekey(struct sctp_tcb *stcb, uint16_t keyid);
1918c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_auth_setactivekey_ep(struct sctp_inpcb *inp, uint16_t keyid);
1928c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_deact_sharedkey(struct sctp_tcb *stcb, uint16_t keyid);
1938c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_deact_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid);
1948c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
1958c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_auth_get_cookie_params(struct sctp_tcb *stcb, struct mbuf *m,
1968c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    uint32_t offset, uint32_t length);
1978c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_fill_hmac_digest_m(struct mbuf *m, uint32_t auth_offset,
1988c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t key_id);
1998c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern struct mbuf *sctp_add_auth_chunk(struct mbuf *m, struct mbuf **m_end,
2008c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    struct sctp_auth_chunk **auth_ret, uint32_t *offset,
2018c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    struct sctp_tcb *stcb, uint8_t chunk);
2028c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_handle_auth(struct sctp_tcb *stcb, struct sctp_auth_chunk *ch,
2038c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    struct mbuf *m, uint32_t offset);
2048c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_notify_authentication(struct sctp_tcb *stcb,
2058c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    uint32_t indication, uint16_t keyid, uint16_t alt_keyid, int so_locked);
2068c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_validate_init_auth_params(struct mbuf *m, int offset,
2078c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    int limit);
2088c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_initialize_auth_params(struct sctp_inpcb *inp,
2098c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen    struct sctp_tcb *stcb);
2108c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen
2118c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* test functions */
2128c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#ifdef SCTP_HMAC_TEST
2138c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_test_hmac_sha1(void);
2148c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_test_authkey(void);
2158c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#endif
2168c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#endif /* __SCTP_AUTH_H__ */
217