mirror of
				https://github.com/stargieg/bacnet-stack
				synced 2025-10-26 23:35:52 +08:00 
			
		
		
		
	
		
			
				
	
	
		
			291 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			291 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /**************************************************************************
 | |
| *
 | |
| * Copyright (C) 2015 Nikola Jelic <nikola.jelic@euroicc.com>
 | |
| *
 | |
| * Permission is hereby granted, free of charge, to any person obtaining
 | |
| * a copy of this software and associated documentation files (the
 | |
| * "Software"), to deal in the Software without restriction, including
 | |
| * without limitation the rights to use, copy, modify, merge, publish,
 | |
| * distribute, sublicense, and/or sell copies of the Software, and to
 | |
| * permit persons to whom the Software is furnished to do so, subject to
 | |
| * the following conditions:
 | |
| *
 | |
| * The above copyright notice and this permission notice shall be included
 | |
| * in all copies or substantial portions of the Software.
 | |
| *
 | |
| * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
 | |
| * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
 | |
| * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
 | |
| * IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
 | |
| * CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
 | |
| * TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
 | |
| * SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
 | |
| *
 | |
| *********************************************************************/
 | |
| #ifndef BACNET_SECURITY_H
 | |
| #define BACNET_SECURITY_H
 | |
| 
 | |
| #define MAX_AUTH_DATA_LEN 16
 | |
| #define MD5_KEY_SIZE 16
 | |
| #define AES_KEY_SIZE 16
 | |
| #define SHA256_KEY_SIZE 32
 | |
| #define MAX_KEY_LEN 48
 | |
| #define MAX_UPDATE_KEY_COUNT 32
 | |
| #define MAX_INCORRECT_KEYS 255
 | |
| #define MAX_SUPPORTED_ALGORITHMS 255
 | |
| #define MAX_PAD_LEN 16
 | |
| #define SIGNATURE_LEN 16
 | |
| 
 | |
| #include <stdbool.h>
 | |
| #include <stdint.h>
 | |
| 
 | |
| #include "bacdef.h"
 | |
| #include "bacenum.h"
 | |
| 
 | |
| typedef struct BACnet_Security_Wrapper {
 | |
|     bool payload_net_or_bvll_flag;      /* true if NPDU or BVLL */
 | |
|     bool encrypted_flag;
 | |
|     bool authentication_flag;   /* always false for responses */
 | |
|     bool do_not_unwrap_flag;    /* always true if do-not-encrypt is true */
 | |
|     bool do_not_decrypt_flag;   /* when encrypted flag is false, it also false */
 | |
|     bool non_trusted_source_flag;
 | |
|     bool secured_by_router_flag;
 | |
|     uint8_t key_revision;       /* 0 for Device-Master key */
 | |
|     uint16_t key_identifier;
 | |
|     uint32_t source_device_instance;
 | |
|     uint32_t message_id;        /* monotonically increased value */
 | |
|     uint32_t timestamp; /* seconds from UTC 1970-1-1 00:00:00 */
 | |
|     uint32_t destination_device_instance;
 | |
|     uint16_t dnet;
 | |
|     uint8_t dlen;
 | |
|     uint8_t dadr[MAX_MAC_LEN];
 | |
|     uint16_t snet;
 | |
|     uint8_t slen;
 | |
|     uint8_t sadr[MAX_MAC_LEN];
 | |
|     uint8_t authentication_mechanism;   /* present when User-Authenticated or
 | |
|                                          * Application-Specific keys are used with: */
 | |
|     /* APDU: Confrmed-Request, Unconfirmed-Request */
 | |
|     /* NPDU: Initialize-Routing-Table, Establish-Connection-To-Network,
 | |
|      * Disconnect-Connection-To-Network */
 | |
|     /* BVLL: Write-Broadcast-Distribution-Table, Read-Broadcast-Distribution-Table,
 | |
|      * Register-Foreign-Device, Read-Foreign-Device-Table,
 | |
|      * Delete-Foreign-Device-Table-Entry */
 | |
|     /* 0 is only legitimate value for now. 200-255 are vendor-specific */
 | |
|     uint16_t user_id;   /* 0 for unknown */
 | |
|     uint8_t user_role;  /* 0 and 1 are "system users": 0 for device-to-device non-human,
 | |
|                          * 1 for device-to-device by unknown human */
 | |
|     uint16_t authentication_data_length;        /* authentication mechanism 1-255 */
 | |
|     uint16_t vendor_id; /* authentication mechanism 200-255 */
 | |
|     uint8_t authentication_data[MAX_AUTH_DATA_LEN];     /* other than id, role, length and
 | |
|                                                          * vendor-id */
 | |
|     uint16_t service_data_len;  /* case-to-case */
 | |
|     uint8_t *service_data;
 | |
|     uint8_t service_type;       /* first octet of service_data */
 | |
|     uint16_t padding_len;       /* included in padding */
 | |
|     uint8_t padding[MAX_PAD_LEN];
 | |
|     uint8_t signature[SIGNATURE_LEN];   /* hmac-md5 or hmac-sha256, first 16 bytes */
 | |
| } BACNET_SECURITY_WRAPPER;
 | |
| 
 | |
| typedef struct Challenge_Request {
 | |
|     uint8_t message_challenge;  /* 1 as a response, everything else for other */
 | |
|     uint32_t orig_message_id;
 | |
|     uint32_t orig_timestamp;
 | |
| } BACNET_CHALLENGE_REQUEST;
 | |
| 
 | |
| typedef struct Security_Payload {
 | |
|     uint16_t payload_length;
 | |
|     uint8_t *payload;
 | |
| } BACNET_SECURITY_PAYLOAD;
 | |
| 
 | |
| struct Bad_Timestamp {
 | |
|     uint32_t expected_timestamp;
 | |
| };
 | |
| 
 | |
| struct Cannot_Use_Key {
 | |
|     uint16_t key;
 | |
| };
 | |
| 
 | |
| struct Incorrect_Key {
 | |
|     uint8_t number_of_keys;
 | |
|     uint16_t keys[MAX_INCORRECT_KEYS];
 | |
| };
 | |
| 
 | |
| struct Unknown_Authentication_Type {
 | |
|     uint8_t original_authentication_type;
 | |
|     uint16_t vendor_id;
 | |
| };
 | |
| 
 | |
| struct Unknown_Key {
 | |
|     uint16_t original_key;
 | |
| };
 | |
| 
 | |
| struct Unknown_Key_Revision {
 | |
|     uint8_t original_key_revision;
 | |
| };
 | |
| 
 | |
| struct Too_Many_Keys {
 | |
|     uint8_t max_num_of_keys;
 | |
| };
 | |
| 
 | |
| struct Invalid_Key_Data {
 | |
|     uint16_t key;
 | |
| };
 | |
| 
 | |
| typedef struct Security_Response {
 | |
|     uint16_t response_code;
 | |
|     uint32_t orig_message_id;
 | |
|     uint32_t orig_timestamp;
 | |
|     union {
 | |
|         struct Bad_Timestamp bad_timestamp;
 | |
|         struct Cannot_Use_Key cannot_use_key;
 | |
|         struct Incorrect_Key incorrect_key;
 | |
|         struct Unknown_Authentication_Type unknown_authentication_type;
 | |
|         struct Unknown_Key unknown_key;
 | |
|         struct Unknown_Key_Revision unknown_key_revision;
 | |
|         struct Too_Many_Keys too_many_keys;
 | |
|         struct Invalid_Key_Data invalid_key_data;
 | |
|     } response;
 | |
| } BACNET_SECURITY_RESPONSE;
 | |
| 
 | |
| typedef struct Request_Key_Update {
 | |
|     uint8_t set_1_key_revision;
 | |
|     uint32_t set_1_activation_time;
 | |
|     uint32_t set_1_expiration_time;
 | |
|     uint8_t set_2_key_revision;
 | |
|     uint32_t set_2_activation_time;
 | |
|     uint32_t set_2_expiration_time;
 | |
|     uint8_t distribution_key_revision;
 | |
| } BACNET_REQUEST_KEY_UPDATE;
 | |
| 
 | |
| typedef struct Key_Entry {
 | |
|     uint16_t key_identifier;
 | |
|     uint8_t key_len;
 | |
|     uint8_t key[MAX_KEY_LEN];
 | |
| } BACNET_KEY_ENTRY;
 | |
| 
 | |
| typedef struct Update_Key_Set {
 | |
|     bool set_rae[2], set_ck[2], set_clr[2];
 | |
|     bool more;
 | |
|     bool remove;        /* false for add, true for remove */
 | |
|     uint8_t set_key_revision[2];
 | |
|     uint32_t set_activation_time[2];
 | |
|     uint32_t set_expiration_time[2];
 | |
|     uint8_t set_key_count[2];
 | |
|     BACNET_KEY_ENTRY set_keys[2][MAX_UPDATE_KEY_COUNT];
 | |
| } BACNET_UPDATE_KEY_SET;
 | |
| 
 | |
| typedef struct Update_Distribution_Key {
 | |
|     uint8_t key_revision;
 | |
|     BACNET_KEY_ENTRY key;
 | |
| } BACNET_UPDATE_DISTRIBUTION_KEY;
 | |
| 
 | |
| typedef struct Request_Master_Key {
 | |
|     uint8_t no_supported_algorithms;
 | |
|     uint8_t es_algorithms[MAX_SUPPORTED_ALGORITHMS];
 | |
| } BACNET_REQUEST_MASTER_KEY;
 | |
| 
 | |
| typedef struct Set_Master_Key {
 | |
|     BACNET_KEY_ENTRY key;
 | |
| } BACNET_SET_MASTER_KEY;
 | |
| 
 | |
| #ifdef __cplusplus
 | |
| extern "C" {
 | |
| #endif /* __cplusplus */
 | |
| 
 | |
| /* helper functions */
 | |
|     BACNET_KEY_IDENTIFIER_ALGORITHM key_algorithm(uint16_t id);
 | |
|     BACNET_KEY_IDENTIFIER_KEY_NUMBER key_number(uint16_t id);
 | |
| 
 | |
| /* key manipulation functions - port specific! */
 | |
|     BACNET_SECURITY_RESPONSE_CODE bacnet_master_key_set(BACNET_SET_MASTER_KEY *
 | |
|         key);
 | |
|     BACNET_SECURITY_RESPONSE_CODE
 | |
|         bacnet_distribution_key_update(BACNET_UPDATE_DISTRIBUTION_KEY * key);
 | |
|     BACNET_SECURITY_RESPONSE_CODE bacnet_key_set_update(BACNET_UPDATE_KEY_SET *
 | |
|         update_key_sets);
 | |
|     BACNET_SECURITY_RESPONSE_CODE bacnet_find_key(uint8_t revision,
 | |
|         BACNET_KEY_ENTRY * key);
 | |
| 
 | |
| /* signing/verification and encryption/decryption - port specific */
 | |
|     int key_sign_msg(BACNET_KEY_ENTRY * key,
 | |
|         uint8_t * msg,
 | |
|         uint32_t msg_len,
 | |
|         uint8_t * signature);
 | |
|     bool key_verify_sign_msg(BACNET_KEY_ENTRY * key,
 | |
|         uint8_t * msg,
 | |
|         uint32_t msg_len,
 | |
|         uint8_t * signature);
 | |
|     int key_encrypt_msg(BACNET_KEY_ENTRY * key,
 | |
|         uint8_t * msg,
 | |
|         uint32_t msg_len,
 | |
|         uint8_t * signature);
 | |
|     bool key_decrypt_msg(BACNET_KEY_ENTRY * key,
 | |
|         uint8_t * msg,
 | |
|         uint32_t msg_len,
 | |
|         uint8_t * signature);
 | |
|     void key_set_padding(BACNET_KEY_ENTRY * key,
 | |
|         int enc_len,
 | |
|         uint16_t * padding_len,
 | |
|         uint8_t * padding);
 | |
| 
 | |
| /* encoders */
 | |
|     int encode_security_wrapper(int bytes_before,
 | |
|         uint8_t * apdu,
 | |
|         BACNET_SECURITY_WRAPPER * wrapper);
 | |
|     int encode_challenge_request(uint8_t * apdu,
 | |
|         BACNET_CHALLENGE_REQUEST * bc_req);
 | |
|     int encode_security_payload(uint8_t * apdu,
 | |
|         BACNET_SECURITY_PAYLOAD * payload);
 | |
|     int encode_security_response(uint8_t * apdu,
 | |
|         BACNET_SECURITY_RESPONSE * resp);
 | |
|     int encode_request_key_update(uint8_t * apdu,
 | |
|         BACNET_REQUEST_KEY_UPDATE * req);
 | |
|     int encode_key_entry(uint8_t * apdu,
 | |
|         BACNET_KEY_ENTRY * entry);
 | |
|     int encode_update_key_set(uint8_t * apdu,
 | |
|         BACNET_UPDATE_KEY_SET * key_set);
 | |
|     int encode_update_distribution_key(uint8_t * apdu,
 | |
|         BACNET_UPDATE_DISTRIBUTION_KEY * dist_key);
 | |
|     int encode_request_master_key(uint8_t * apdu,
 | |
|         BACNET_REQUEST_MASTER_KEY * req_master_key);
 | |
|     int encode_set_master_key(uint8_t * apdu,
 | |
|         BACNET_SET_MASTER_KEY * set_master_key);
 | |
| 
 | |
| /* safe decoders */
 | |
|     int decode_security_wrapper_safe(int bytes_before,
 | |
|         uint8_t * apdu,
 | |
|         uint32_t apdu_len_remaining,
 | |
|         BACNET_SECURITY_WRAPPER * wrapper);
 | |
|     int decode_challenge_request_safe(uint8_t * apdu,
 | |
|         uint32_t apdu_len_remaining,
 | |
|         BACNET_CHALLENGE_REQUEST * bc_req);
 | |
|     int decode_security_payload_safe(uint8_t * apdu,
 | |
|         uint32_t apdu_len_remaining,
 | |
|         BACNET_SECURITY_PAYLOAD * payload);
 | |
|     int decode_security_response_safe(uint8_t * apdu,
 | |
|         uint32_t apdu_len_remaining,
 | |
|         BACNET_SECURITY_RESPONSE * resp);
 | |
|     int decode_request_key_update_safe(uint8_t * apdu,
 | |
|         uint32_t apdu_len_remaining,
 | |
|         BACNET_REQUEST_KEY_UPDATE * req);
 | |
|     int decode_key_entry_safe(uint8_t * apdu,
 | |
|         uint32_t apdu_len_remaining,
 | |
|         BACNET_KEY_ENTRY * entry);
 | |
|     int decode_update_key_set_safe(uint8_t * apdu,
 | |
|         uint32_t apdu_len_remaining,
 | |
|         BACNET_UPDATE_KEY_SET * key_set);
 | |
|     int decode_update_distribution_key_safe(uint8_t * apdu,
 | |
|         uint32_t apdu_len_remaining,
 | |
|         BACNET_UPDATE_DISTRIBUTION_KEY * dist_key);
 | |
|     int decode_request_master_key_safe(uint8_t * apdu,
 | |
|         uint32_t apdu_len_remaining,
 | |
|         BACNET_REQUEST_MASTER_KEY * req_master_key);
 | |
|     int decode_set_master_key_safe(uint8_t * apdu,
 | |
|         uint32_t apdu_len_remaining,
 | |
|         BACNET_SET_MASTER_KEY * set_master_key);
 | |
| 
 | |
| #ifdef __cplusplus
 | |
| }
 | |
| #endif /* __cplusplus */
 | |
| #endif
 | 
