4 * The secure anycast tunneling protocol (satp) defines a protocol used
5 * for communication between any combination of unicast and anycast
6 * tunnel endpoints. It has less protocol overhead than IPSec in Tunnel
7 * mode and allows tunneling of every ETHER TYPE protocol (e.g.
8 * ethernet, ip, arp ...). satp directly includes cryptography and
9 * message authentication based on the methodes used by SRTP. It is
10 * intended to deliver a generic, scaleable and secure solution for
11 * tunneling and relaying of packets of any protocol.
14 * Copyright (C) 2007 anytun.org <satp@wirdorange.org>
16 * This program is free software; you can redistribute it and/or modify
17 * it under the terms of the GNU General Public License version 2
18 * as published by the Free Software Foundation.
20 * This program is distributed in the hope that it will be useful,
21 * but WITHOUT ANY WARRANTY; without even the implied warranty of
22 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
23 * GNU General Public License for more details.
25 * You should have received a copy of the GNU General Public License
26 * along with this program (see the file COPYING included with this
27 * distribution); if not, write to the Free Software Foundation, Inc.,
28 * 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
38 AuthTag
NullAuthAlgo::calc(const Buffer
& buf
)
43 const char* Sha1AuthAlgo::MIN_GCRYPT_VERSION
= "1.2.3";
46 Sha1AuthAlgo::Sha1AuthAlgo() : ctx_(NULL
)
49 // No other library has already initialized libgcrypt.
50 if( !gcry_control(GCRYCTL_ANY_INITIALIZATION_P
) )
52 if( !gcry_check_version( MIN_GCRYPT_VERSION
) ) {
53 cLog
.msg(Log::PRIO_ERR
) << "Sha1AuthAlgo::Sha1AuthAlgo: Invalid Version of libgcrypt, should be >= " << MIN_GCRYPT_VERSION
;
56 /* Tell Libgcrypt that initialization has completed. */
57 err
= gcry_control(GCRYCTL_INITIALIZATION_FINISHED
);
59 cLog
.msg(Log::PRIO_CRIT
) << "Sha1AuthAlgo::Sha1AuthAlgo: Failed to finish the initialization of libgcrypt: " << gpg_strerror( err
);
62 cLog
.msg(Log::PRIO_DEBUG
) << "Sha1AuthAlgo::Sha1AuthAlgo: libgcrypt init finished";
65 err
= gcry_md_open( &ctx_
, GCRY_MD_SHA1
, GCRY_MD_FLAG_HMAC
);
67 cLog
.msg(Log::PRIO_CRIT
) << "Sha1AuthAlgo::Sha1AuthAlgo: Failed to open message digest algo";
70 Sha1AuthAlgo::~Sha1AuthAlgo()
72 gcry_md_close( ctx_
);
73 cLog
.msg(Log::PRIO_DEBUG
) << "Sha1AuthAlgo::~Sha1AuthAlgo: closed hmac handler";
76 void Sha1AuthAlgo::setKey(Buffer key
)
79 err
= gcry_md_setkey( ctx_
, key
.getBuf(), key
.getLength() );
81 cLog
.msg(Log::PRIO_ERR
) << "Sha1AuthAlgo::setKey: Failed to set cipher key: " << gpg_strerror( err
);
85 AuthTag
Sha1AuthAlgo::calc(const Buffer
& buf
)
90 gcry_md_write( ctx_
, static_cast<Buffer
>(buf
).getBuf(), buf
.getLength() );
91 gcry_md_final( ctx_
);
92 hmac
= Buffer(gcry_md_read( ctx_
, 0 ), 10);