mirror of
https://github.com/deneraraujo/OpenVPNAdapter.git
synced 2026-04-24 00:00:05 +08:00
Merge commit '86cc97e55fe346502462284d2e636a2b3708163e' as 'Sources/OpenVPN3'
This commit is contained in:
@@ -0,0 +1,200 @@
|
||||
// OpenVPN -- An application to securely tunnel IP networks
|
||||
// over a single port, with support for SSL/TLS-based
|
||||
// session authentication and key exchange,
|
||||
// packet encryption, packet authentication, and
|
||||
// packet compression.
|
||||
//
|
||||
// Copyright (C) 2012-2017 OpenVPN Inc.
|
||||
//
|
||||
// This program is free software: you can redistribute it and/or modify
|
||||
// it under the terms of the GNU Affero General Public License Version 3
|
||||
// as published by the Free Software Foundation.
|
||||
//
|
||||
// This program is distributed in the hope that it will be useful,
|
||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
// GNU Affero General Public License for more details.
|
||||
//
|
||||
// You should have received a copy of the GNU Affero General Public License
|
||||
// along with this program in the COPYING file.
|
||||
// If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
// Wrap the OpenSSL cipher API defined in <openssl/evp.h> so
|
||||
// that it can be used as part of the crypto layer of the OpenVPN core.
|
||||
|
||||
#ifndef OPENVPN_OPENSSL_CRYPTO_CIPHER_H
|
||||
#define OPENVPN_OPENSSL_CRYPTO_CIPHER_H
|
||||
|
||||
#include <string>
|
||||
|
||||
#include <openssl/objects.h>
|
||||
#include <openssl/evp.h>
|
||||
|
||||
#include <openvpn/common/size.hpp>
|
||||
#include <openvpn/common/exception.hpp>
|
||||
#include <openvpn/crypto/static_key.hpp>
|
||||
#include <openvpn/crypto/cryptoalgs.hpp>
|
||||
#include <openvpn/openssl/util/error.hpp>
|
||||
#include <openvpn/openssl/compat.hpp>
|
||||
|
||||
namespace openvpn {
|
||||
namespace OpenSSLCrypto {
|
||||
class CipherContext
|
||||
{
|
||||
CipherContext(const CipherContext&) = delete;
|
||||
CipherContext& operator=(const CipherContext&) = delete;
|
||||
|
||||
public:
|
||||
OPENVPN_SIMPLE_EXCEPTION(openssl_cipher_mode_error);
|
||||
OPENVPN_SIMPLE_EXCEPTION(openssl_cipher_uninitialized);
|
||||
OPENVPN_EXCEPTION(openssl_cipher_error);
|
||||
|
||||
// mode parameter for constructor
|
||||
enum {
|
||||
MODE_UNDEF = -1,
|
||||
ENCRYPT = 1,
|
||||
DECRYPT = 0
|
||||
};
|
||||
|
||||
// OpenSSL cipher constants
|
||||
enum {
|
||||
MAX_IV_LENGTH = EVP_MAX_IV_LENGTH,
|
||||
CIPH_CBC_MODE = EVP_CIPH_CBC_MODE
|
||||
};
|
||||
|
||||
CipherContext()
|
||||
: initialized(false)
|
||||
{
|
||||
}
|
||||
|
||||
~CipherContext() { erase() ; }
|
||||
|
||||
void init(const CryptoAlgs::Type alg, const unsigned char *key, const int mode)
|
||||
{
|
||||
// check that mode is valid
|
||||
if (!(mode == ENCRYPT || mode == DECRYPT))
|
||||
throw openssl_cipher_mode_error();
|
||||
erase();
|
||||
ctx = EVP_CIPHER_CTX_new ();
|
||||
EVP_CIPHER_CTX_reset (ctx);
|
||||
if (!EVP_CipherInit_ex (ctx, cipher_type(alg), nullptr, key, nullptr, mode))
|
||||
{
|
||||
openssl_clear_error_stack();
|
||||
throw openssl_cipher_error("EVP_CipherInit_ex (init)");
|
||||
}
|
||||
initialized = true;
|
||||
}
|
||||
|
||||
void reset(const unsigned char *iv)
|
||||
{
|
||||
check_initialized();
|
||||
if (!EVP_CipherInit_ex (ctx, nullptr, nullptr, nullptr, iv, -1))
|
||||
{
|
||||
openssl_clear_error_stack();
|
||||
throw openssl_cipher_error("EVP_CipherInit_ex (reset)");
|
||||
}
|
||||
}
|
||||
|
||||
bool update(unsigned char *out, const size_t max_out_size,
|
||||
const unsigned char *in, const size_t in_size,
|
||||
size_t& out_acc)
|
||||
{
|
||||
check_initialized();
|
||||
int outlen;
|
||||
if (EVP_CipherUpdate (ctx, out, &outlen, in, int(in_size)))
|
||||
{
|
||||
out_acc += outlen;
|
||||
return true;
|
||||
}
|
||||
else
|
||||
{
|
||||
openssl_clear_error_stack();
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
bool final(unsigned char *out, const size_t max_out_size, size_t& out_acc)
|
||||
{
|
||||
check_initialized();
|
||||
int outlen;
|
||||
if (EVP_CipherFinal_ex (ctx, out, &outlen))
|
||||
{
|
||||
out_acc += outlen;
|
||||
return true;
|
||||
}
|
||||
else
|
||||
{
|
||||
openssl_clear_error_stack();
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
bool is_initialized() const { return initialized; }
|
||||
|
||||
size_t iv_length() const
|
||||
{
|
||||
check_initialized();
|
||||
return EVP_CIPHER_CTX_iv_length (ctx);
|
||||
}
|
||||
|
||||
size_t block_size() const
|
||||
{
|
||||
check_initialized();
|
||||
return EVP_CIPHER_CTX_block_size (ctx);
|
||||
}
|
||||
|
||||
// return cipher mode (such as CIPH_CBC_MODE, etc.)
|
||||
int cipher_mode() const
|
||||
{
|
||||
check_initialized();
|
||||
return EVP_CIPHER_CTX_mode (ctx);
|
||||
}
|
||||
|
||||
private:
|
||||
static const EVP_CIPHER *cipher_type(const CryptoAlgs::Type alg)
|
||||
{
|
||||
switch (alg)
|
||||
{
|
||||
case CryptoAlgs::AES_128_CBC:
|
||||
return EVP_aes_128_cbc();
|
||||
case CryptoAlgs::AES_192_CBC:
|
||||
return EVP_aes_192_cbc();
|
||||
case CryptoAlgs::AES_256_CBC:
|
||||
return EVP_aes_256_cbc();
|
||||
case CryptoAlgs::AES_256_CTR:
|
||||
return EVP_aes_256_ctr();
|
||||
case CryptoAlgs::DES_CBC:
|
||||
return EVP_des_cbc();
|
||||
case CryptoAlgs::DES_EDE3_CBC:
|
||||
return EVP_des_ede3_cbc();
|
||||
case CryptoAlgs::BF_CBC:
|
||||
return EVP_bf_cbc();
|
||||
default:
|
||||
OPENVPN_THROW(openssl_cipher_error, CryptoAlgs::name(alg) << ": not usable");
|
||||
}
|
||||
}
|
||||
|
||||
void erase()
|
||||
{
|
||||
if (initialized)
|
||||
{
|
||||
EVP_CIPHER_CTX_free (ctx);
|
||||
initialized = false;
|
||||
}
|
||||
}
|
||||
|
||||
void check_initialized() const
|
||||
{
|
||||
#ifdef OPENVPN_ENABLE_ASSERT
|
||||
if (!initialized)
|
||||
throw openssl_cipher_uninitialized();
|
||||
#endif
|
||||
}
|
||||
|
||||
bool initialized;
|
||||
EVP_CIPHER_CTX* ctx;
|
||||
};
|
||||
}
|
||||
}
|
||||
|
||||
#endif
|
||||
Reference in New Issue
Block a user