Training courses

Kernel and Embedded Linux

Bootlin training courses

Embedded Linux, kernel,
Yocto Project, Buildroot, real-time,
graphics, boot time, debugging...

Bootlin logo

Elixir Cross Referencer

/*-
 * Copyright (c) 2010 Alistair Crooks <agc@NetBSD.org>
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 * 1. Redistributions of source code must retain the above copyright
 *    notice, this list of conditions and the following disclaimer.
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in the
 *    documentation and/or other materials provided with the distribution.
 *
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 */
#ifndef LIBPAA_H_
#define LIBPAA_H_	20100908

#include <sys/types.h>

#include <inttypes.h>
#include <stdio.h>

#define DEFAULT_HASH_ALG "SHA256"

enum {
	PAA_CHALLENGE_SIZE	= 128
};

/* constant and secret info for server side */
typedef struct paa_server_info_t {
	char		 hostaddress[128];		/* host ip address */
	char		*secret;			/* raw secret of server */
	unsigned	 secretc;			/* # of characters used */
	char		 server_signature[512];		/* this is the encoded signature */
	int		 server_signaturec;		/* # of chars in encoded sig */
} paa_server_info_t;

/* used in server to formulate challenge */
typedef struct paa_challenge_t {
	const char	*realm;				/* this is realm of challenge */
	const char	*domain;			/* domain of challenge */
	char		 challenge[512];		/* the output challenge */
	int		 challengec;			/* # of chars in challenge */
	/* sub-parts of challenge */
	char		 encoded_challenge[512];	/* encoded challenge part */
	int		 encc;				/* # of chars in encoded challenge */
} paa_challenge_t;

/* used in client to formulate response */
typedef struct paa_response_t {
	const char	*userid;			/* identity to be used for signature */
	const char	*realm;				/* realm that client wants */
	char		 challenge[PAA_CHALLENGE_SIZE];	/* input challenge */
	int		 challengec;			/* # if chars in input */
	char		 response[PAA_CHALLENGE_SIZE * 2];	/* output response */
	int		 respc;				/* # of chars in output */
} paa_response_t;

/* this struct holds the identity information in the paa response */
typedef struct paa_identity_t {
	char		 userid[32];		/* verified identity */
	char		 client[128];		/* client address */
	char		 realm[128];		/* client realm */
	char		 domain[128];		/* client domain */
	int64_t		 timestamp;		/* time of response */
} paa_identity_t;

/* support functions */
int paa_write_file(const char *, char *, unsigned);
int paa_read_file(const char *, char *, size_t);

/* server initialisations - one time */
int paa_server_init(paa_server_info_t *, unsigned);

/* body of pubkey access authentication challenge/response/check functionality */
int paa_format_challenge(paa_challenge_t *, paa_server_info_t *, char *, size_t);
int paa_format_response(paa_response_t *, netpgp_t *, char *, char *, size_t);
int paa_check_response(paa_challenge_t *, paa_identity_t *, netpgp_t *, char *);

/* who are ya? */
int paa_print_identity(FILE *, paa_identity_t *);

#endif