18c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/*- 28c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * Copyright (c) 2001-2008, by Cisco Systems, Inc. All rights reserved. 3ecc6b8c25a7e8d9d2b78889e88224354a1cc3160tuexen * Copyright (c) 2008-2012, by Randall Stewart. All rights reserved. 4ecc6b8c25a7e8d9d2b78889e88224354a1cc3160tuexen * Copyright (c) 2008-2012, by Michael Tuexen. All rights reserved. 58c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * 68c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * Redistribution and use in source and binary forms, with or without 78c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * modification, are permitted provided that the following conditions are met: 88c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * 98c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * a) Redistributions of source code must retain the above copyright notice, 100ac02f34d6041cd0018437596a5a9a94685e6919tuexen * this list of conditions and the following disclaimer. 118c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * 128c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * b) Redistributions in binary form must reproduce the above copyright 138c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * notice, this list of conditions and the following disclaimer in 140ac02f34d6041cd0018437596a5a9a94685e6919tuexen * the documentation and/or other materials provided with the distribution. 158c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * 168c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * c) Neither the name of Cisco Systems, Inc. nor the names of its 178c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * contributors may be used to endorse or promote products derived 188c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * from this software without specific prior written permission. 198c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * 208c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 218c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, 228c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 238c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE 248c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 258c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 268c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 278c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 288c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 298c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF 308c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * THE POSSIBILITY OF SUCH DAMAGE. 318c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen */ 328c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 338c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#ifdef __FreeBSD__ 348c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#include <sys/cdefs.h> 35fb3816eaffe5878bb1286adb120fd160da178a05t__FBSDID("$FreeBSD: head/sys/netinet/sctp_auth.h 269858 2014-08-12 11:30:16Z tuexen $"); 368c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#endif 378c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 38ecc6b8c25a7e8d9d2b78889e88224354a1cc3160tuexen#ifndef _NETINET_SCTP_AUTH_H_ 39ecc6b8c25a7e8d9d2b78889e88224354a1cc3160tuexen#define _NETINET_SCTP_AUTH_H_ 408c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 4183a86bbf399ce2b9b51cdf1c0c679944bbcee0a9t#include <netinet/sctp_os.h> 428c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 438c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* digest lengths */ 448c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#define SCTP_AUTH_DIGEST_LEN_SHA1 20 458c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#define SCTP_AUTH_DIGEST_LEN_SHA256 32 4683a86bbf399ce2b9b51cdf1c0c679944bbcee0a9t#define SCTP_AUTH_DIGEST_LEN_MAX SCTP_AUTH_DIGEST_LEN_SHA256 478c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 488c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* random sizes */ 498c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#define SCTP_AUTH_RANDOM_SIZE_DEFAULT 32 508c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#define SCTP_AUTH_RANDOM_SIZE_REQUIRED 32 518c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 528c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* union of all supported HMAC algorithm contexts */ 538c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexentypedef union sctp_hash_context { 5483a86bbf399ce2b9b51cdf1c0c679944bbcee0a9t SCTP_SHA1_CTX sha1; 5583a86bbf399ce2b9b51cdf1c0c679944bbcee0a9t#if defined(SCTP_SUPPORT_HMAC_SHA256) 5683a86bbf399ce2b9b51cdf1c0c679944bbcee0a9t SCTP_SHA256_CTX sha256; 578c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#endif 588c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen} sctp_hash_context_t; 598c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 608c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexentypedef struct sctp_key { 618c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint32_t keylen; 628c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint8_t key[]; 638c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen} sctp_key_t; 648c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 658c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexentypedef struct sctp_shared_key { 668c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen LIST_ENTRY(sctp_shared_key) next; 678c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen sctp_key_t *key; /* key text */ 688c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint32_t refcount; /* reference count */ 698c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint16_t keyid; /* shared key ID */ 708c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint8_t deactivated; /* key is deactivated */ 718c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen} sctp_sharedkey_t; 728c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 738c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenLIST_HEAD(sctp_keyhead, sctp_shared_key); 748c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 758c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* authentication chunks list */ 768c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexentypedef struct sctp_auth_chklist { 778c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint8_t chunks[256]; 788c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint8_t num_chunks; 798c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen} sctp_auth_chklist_t; 808c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 818c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* hmac algos supported list */ 828c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexentypedef struct sctp_hmaclist { 838c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint16_t max_algo; /* max algorithms allocated */ 848c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint16_t num_algo; /* num algorithms used */ 858c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint16_t hmac[]; 868c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen} sctp_hmaclist_t; 878c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 888c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* authentication info */ 898c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexentypedef struct sctp_authinformation { 908c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen sctp_key_t *random; /* local random key (concatenated) */ 918c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint32_t random_len; /* local random number length for param */ 928c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen sctp_key_t *peer_random;/* peer's random key (concatenated) */ 938c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen sctp_key_t *assoc_key; /* cached concatenated send key */ 948c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen sctp_key_t *recv_key; /* cached concatenated recv key */ 958c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint16_t active_keyid; /* active send keyid */ 968c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint16_t assoc_keyid; /* current send keyid (cached) */ 978c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint16_t recv_keyid; /* last recv keyid (cached) */ 988c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen} sctp_authinfo_t; 998c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 1008c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 1018c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 1028c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* 1038c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * Macros 1048c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen */ 1058c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#define sctp_auth_is_required_chunk(chunk, list) ((list == NULL) ? (0) : (list->chunks[chunk] != 0)) 1068c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 1078c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* 1088c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * function prototypes 1098c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen */ 1108c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 1118c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* socket option api functions */ 1128c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_auth_chklist_t *sctp_alloc_chunklist(void); 1138c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_free_chunklist(sctp_auth_chklist_t *chklist); 1148c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_clear_chunklist(sctp_auth_chklist_t *chklist); 1158c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_auth_chklist_t *sctp_copy_chunklist(sctp_auth_chklist_t *chklist); 1168c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_auth_add_chunk(uint8_t chunk, sctp_auth_chklist_t *list); 1178c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_auth_delete_chunk(uint8_t chunk, sctp_auth_chklist_t *list); 1188c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern size_t sctp_auth_get_chklist_size(const sctp_auth_chklist_t *list); 1198c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_serialize_auth_chunks(const sctp_auth_chklist_t *list, 1208c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint8_t *ptr); 1218c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_pack_auth_chunks(const sctp_auth_chklist_t *list, 1228c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint8_t *ptr); 1238c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_unpack_auth_chunks(const uint8_t *ptr, uint8_t num_chunks, 1248c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen sctp_auth_chklist_t *list); 1258c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 1268c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* key handling */ 1278c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_key_t *sctp_alloc_key(uint32_t keylen); 1288c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_free_key(sctp_key_t *key); 1298c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_print_key(sctp_key_t *key, const char *str); 1308c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_show_key(sctp_key_t *key, const char *str); 1318c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_key_t *sctp_generate_random_key(uint32_t keylen); 1328c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_key_t *sctp_set_key(uint8_t *key, uint32_t keylen); 1338c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_key_t *sctp_compute_hashkey(sctp_key_t *key1, sctp_key_t *key2, 1348c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen sctp_key_t *shared); 1358c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 1368c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* shared key handling */ 1378c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_sharedkey_t *sctp_alloc_sharedkey(void); 1388c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_free_sharedkey(sctp_sharedkey_t *skey); 1398c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_sharedkey_t *sctp_find_sharedkey(struct sctp_keyhead *shared_keys, 1408c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint16_t key_id); 1418c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_insert_sharedkey(struct sctp_keyhead *shared_keys, 1428c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen sctp_sharedkey_t *new_skey); 1438c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_copy_skeylist(const struct sctp_keyhead *src, 1448c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen struct sctp_keyhead *dest); 1458c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* ref counts on shared keys, by key id */ 1468c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_auth_key_acquire(struct sctp_tcb *stcb, uint16_t keyid); 1478c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_auth_key_release(struct sctp_tcb *stcb, uint16_t keyid, 1488c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen int so_locked); 1498c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 1508c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 1518c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* hmac list handling */ 1528c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_hmaclist_t *sctp_alloc_hmaclist(uint8_t num_hmacs); 1538c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_free_hmaclist(sctp_hmaclist_t *list); 1548c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_auth_add_hmacid(sctp_hmaclist_t *list, uint16_t hmac_id); 1558c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_hmaclist_t *sctp_copy_hmaclist(sctp_hmaclist_t *list); 1568c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_hmaclist_t *sctp_default_supported_hmaclist(void); 1578c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern uint16_t sctp_negotiate_hmacid(sctp_hmaclist_t *peer, 1588c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen sctp_hmaclist_t *local); 1598c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_serialize_hmaclist(sctp_hmaclist_t *list, uint8_t *ptr); 1608c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_verify_hmac_param(struct sctp_auth_hmac_algo *hmacs, 1618c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint32_t num_hmacs); 1628c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 1638c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern sctp_authinfo_t *sctp_alloc_authinfo(void); 1648c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_free_authinfo(sctp_authinfo_t *authinfo); 1658c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 1668c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* keyed-HMAC functions */ 1678c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern uint32_t sctp_get_auth_chunk_len(uint16_t hmac_algo); 1688c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern uint32_t sctp_get_hmac_digest_len(uint16_t hmac_algo); 1698c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern uint32_t sctp_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, 1708c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint8_t *text, uint32_t textlen, uint8_t *digest); 1718c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_verify_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, 1728c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint8_t *text, uint32_t textlen, uint8_t *digest, uint32_t digestlen); 1738c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern uint32_t sctp_compute_hmac(uint16_t hmac_algo, sctp_key_t *key, 1748c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint8_t *text, uint32_t textlen, uint8_t *digest); 1758c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_auth_is_supported_hmac(sctp_hmaclist_t *list, uint16_t id); 1768c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 1778c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* mbuf versions */ 1788c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern uint32_t sctp_hmac_m(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, 1798c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen struct mbuf *m, uint32_t m_offset, uint8_t *digest, uint32_t trailer); 1808c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern uint32_t sctp_compute_hmac_m(uint16_t hmac_algo, sctp_key_t *key, 1818c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen struct mbuf *m, uint32_t m_offset, uint8_t *digest); 1828c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 1838c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* 1848c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen * authentication routines 1858c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen */ 1868c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_clear_cachedkeys(struct sctp_tcb *stcb, uint16_t keyid); 1878c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_clear_cachedkeys_ep(struct sctp_inpcb *inp, uint16_t keyid); 1888c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_delete_sharedkey(struct sctp_tcb *stcb, uint16_t keyid); 1898c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_delete_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid); 1908c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_auth_setactivekey(struct sctp_tcb *stcb, uint16_t keyid); 1918c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_auth_setactivekey_ep(struct sctp_inpcb *inp, uint16_t keyid); 1928c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_deact_sharedkey(struct sctp_tcb *stcb, uint16_t keyid); 1938c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_deact_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid); 1948c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 1958c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_auth_get_cookie_params(struct sctp_tcb *stcb, struct mbuf *m, 1968c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint32_t offset, uint32_t length); 1978c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_fill_hmac_digest_m(struct mbuf *m, uint32_t auth_offset, 1988c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t key_id); 1998c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern struct mbuf *sctp_add_auth_chunk(struct mbuf *m, struct mbuf **m_end, 2008c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen struct sctp_auth_chunk **auth_ret, uint32_t *offset, 2018c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen struct sctp_tcb *stcb, uint8_t chunk); 2028c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_handle_auth(struct sctp_tcb *stcb, struct sctp_auth_chunk *ch, 2038c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen struct mbuf *m, uint32_t offset); 2048c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_notify_authentication(struct sctp_tcb *stcb, 2058c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen uint32_t indication, uint16_t keyid, uint16_t alt_keyid, int so_locked); 2068c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern int sctp_validate_init_auth_params(struct mbuf *m, int offset, 2078c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen int limit); 2088c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_initialize_auth_params(struct sctp_inpcb *inp, 2098c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen struct sctp_tcb *stcb); 2108c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen 2118c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen/* test functions */ 2128c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#ifdef SCTP_HMAC_TEST 2138c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_test_hmac_sha1(void); 2148c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexenextern void sctp_test_authkey(void); 2158c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#endif 2168c8a4cae58a2deed148551d56cb1ab315a55dbbdtuexen#endif /* __SCTP_AUTH_H__ */ 217