Linux Audio

Check our new training course

Loading...
Note: File does not exist in v3.15.
  1/* SPDX-License-Identifier: GPL-2.0 */
  2/*
  3 * Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
  4 */
  5
  6#ifndef _WG_MESSAGES_H
  7#define _WG_MESSAGES_H
  8
  9#include <crypto/curve25519.h>
 10#include <crypto/chacha20poly1305.h>
 11#include <crypto/blake2s.h>
 12
 13#include <linux/kernel.h>
 14#include <linux/param.h>
 15#include <linux/skbuff.h>
 16
 17enum noise_lengths {
 18	NOISE_PUBLIC_KEY_LEN = CURVE25519_KEY_SIZE,
 19	NOISE_SYMMETRIC_KEY_LEN = CHACHA20POLY1305_KEY_SIZE,
 20	NOISE_TIMESTAMP_LEN = sizeof(u64) + sizeof(u32),
 21	NOISE_AUTHTAG_LEN = CHACHA20POLY1305_AUTHTAG_SIZE,
 22	NOISE_HASH_LEN = BLAKE2S_HASH_SIZE
 23};
 24
 25#define noise_encrypted_len(plain_len) ((plain_len) + NOISE_AUTHTAG_LEN)
 26
 27enum cookie_values {
 28	COOKIE_SECRET_MAX_AGE = 2 * 60,
 29	COOKIE_SECRET_LATENCY = 5,
 30	COOKIE_NONCE_LEN = XCHACHA20POLY1305_NONCE_SIZE,
 31	COOKIE_LEN = 16
 32};
 33
 34enum counter_values {
 35	COUNTER_BITS_TOTAL = 8192,
 36	COUNTER_REDUNDANT_BITS = BITS_PER_LONG,
 37	COUNTER_WINDOW_SIZE = COUNTER_BITS_TOTAL - COUNTER_REDUNDANT_BITS
 38};
 39
 40enum limits {
 41	REKEY_AFTER_MESSAGES = 1ULL << 60,
 42	REJECT_AFTER_MESSAGES = U64_MAX - COUNTER_WINDOW_SIZE - 1,
 43	REKEY_TIMEOUT = 5,
 44	REKEY_TIMEOUT_JITTER_MAX_JIFFIES = HZ / 3,
 45	REKEY_AFTER_TIME = 120,
 46	REJECT_AFTER_TIME = 180,
 47	INITIATIONS_PER_SECOND = 50,
 48	MAX_PEERS_PER_DEVICE = 1U << 20,
 49	KEEPALIVE_TIMEOUT = 10,
 50	MAX_TIMER_HANDSHAKES = 90 / REKEY_TIMEOUT,
 51	MAX_QUEUED_INCOMING_HANDSHAKES = 4096, /* TODO: replace this with DQL */
 52	MAX_STAGED_PACKETS = 128,
 53	MAX_QUEUED_PACKETS = 1024 /* TODO: replace this with DQL */
 54};
 55
 56enum message_type {
 57	MESSAGE_INVALID = 0,
 58	MESSAGE_HANDSHAKE_INITIATION = 1,
 59	MESSAGE_HANDSHAKE_RESPONSE = 2,
 60	MESSAGE_HANDSHAKE_COOKIE = 3,
 61	MESSAGE_DATA = 4
 62};
 63
 64struct message_header {
 65	/* The actual layout of this that we want is:
 66	 * u8 type
 67	 * u8 reserved_zero[3]
 68	 *
 69	 * But it turns out that by encoding this as little endian,
 70	 * we achieve the same thing, and it makes checking faster.
 71	 */
 72	__le32 type;
 73};
 74
 75struct message_macs {
 76	u8 mac1[COOKIE_LEN];
 77	u8 mac2[COOKIE_LEN];
 78};
 79
 80struct message_handshake_initiation {
 81	struct message_header header;
 82	__le32 sender_index;
 83	u8 unencrypted_ephemeral[NOISE_PUBLIC_KEY_LEN];
 84	u8 encrypted_static[noise_encrypted_len(NOISE_PUBLIC_KEY_LEN)];
 85	u8 encrypted_timestamp[noise_encrypted_len(NOISE_TIMESTAMP_LEN)];
 86	struct message_macs macs;
 87};
 88
 89struct message_handshake_response {
 90	struct message_header header;
 91	__le32 sender_index;
 92	__le32 receiver_index;
 93	u8 unencrypted_ephemeral[NOISE_PUBLIC_KEY_LEN];
 94	u8 encrypted_nothing[noise_encrypted_len(0)];
 95	struct message_macs macs;
 96};
 97
 98struct message_handshake_cookie {
 99	struct message_header header;
100	__le32 receiver_index;
101	u8 nonce[COOKIE_NONCE_LEN];
102	u8 encrypted_cookie[noise_encrypted_len(COOKIE_LEN)];
103};
104
105struct message_data {
106	struct message_header header;
107	__le32 key_idx;
108	__le64 counter;
109	u8 encrypted_data[];
110};
111
112#define message_data_len(plain_len) \
113	(noise_encrypted_len(plain_len) + sizeof(struct message_data))
114
115enum message_alignments {
116	MESSAGE_PADDING_MULTIPLE = 16,
117	MESSAGE_MINIMUM_LENGTH = message_data_len(0)
118};
119
120#define SKB_HEADER_LEN                                       \
121	(max(sizeof(struct iphdr), sizeof(struct ipv6hdr)) + \
122	 sizeof(struct udphdr) + NET_SKB_PAD)
123#define DATA_PACKET_HEAD_ROOM \
124	ALIGN(sizeof(struct message_data) + SKB_HEADER_LEN, 4)
125
126enum { HANDSHAKE_DSCP = 0x88 /* AF41, plus 00 ECN */ };
127
128#endif /* _WG_MESSAGES_H */