mirror of
https://github.com/deneraraujo/OpenVPNAdapter.git
synced 2026-04-24 00:00:05 +08:00
f5fda0fa73
6608878d5 [OVPN3-341] implement mssfix support 1bf3fc0e4 win: update project files f8d209435 travis: update to default osx image: xcode9.4 31eb246a8 travis.yml: align deps version to lib-version 996f86635 RunContext: fixed rebase issue that added two "default: signal_rearm();" clauses aebea6456 build script: minor changes to Cityhash inclusion 1d754072c modstat: make update_file_mod_time_nanoseconds() a no-op on non-Linux 7974c9867 Fixed some breakage caused by recent endian/ffs commits a0dd7fe8b endian.hpp: break out endian compile-time tests to endian_platform.hpp c8bdf5a34 ffs.hpp: support additional numeric types dcb0c9452 BufferType: append() argument can now be a flexible buffer type 2009a8a25 Added AsioTimerSafe 39e71b7dd event_loop_wait_barrier: use a longer default timeout when running under valgrind 8b7e08e9b string::contains_non_space_ctrl: consider ASCII char 127 (DEL) to be a control char e43024d7c RunContext: rearm non-terminating signals 6ab379323 write_binary_atomic: remove temporary file on move failure 55dc653cd path: added is_contained() 02bf235c6 Reverted previous commit: "ReplyParser: added undefined status" 84dbc5b9b Allow test/cli.cpp to be used with NetCfg Tunbuilder client 80fed2c55 Allow updating auth-token during session ad7da751e don't print time in debug message and use OPENVPN_LOG_PROTO_VERBOSE 981407994 tls-crypt-v2: implement abstract metadata parser be38bbeb8 tls-crypt-v2: test/ssl/proto.cpp - extend protocol test 60fcf374f tls-crypt-v2: implement WKc appending/unwrapping logic 51f4a3a29 tls-crypt-v2: introduce CONTROL_HARD_RESET_V3 packet type 156a6e58b tls-crypt-v2: implement client key parser and renderer 54a97b381 ssl: add support for encoding/decoding PEM format f090fcda4 tls-crypt: make HMAC API more generic d87f5bbc0 OpenSSL: init library 2ea88a93b Add Remote endpoint information to protect_socket call 0a081ee17 [OVPN3-315] cli/go: add option to compile SITNL component 5bbfb57c0 [OVPN3-315] TunLinux::Client: allow user to select netlink at compile time e8458a68e [OVPN3-315] GW: add netlink support 4e77edb9e [OVPN3-315] TunLinux: add Netlink implementation for Tun setup methods 68508fe56 bigmutex: include missing extern.hpp header a7b923e1e Fix logic inversion from commit 2de9aebc 923e10d13 runcontext: arrange members to allow inheritance 2de9aebc7 Replace deprecated mbedtls_sha1 with mbedtls_sha1_ret e9c0bd00b Remove unused private field ee17c33c2 Add virtual deconstructor to TransportClientParent fab64ba0f Fix clang warning about unused attributes and missing overrides 2624d9ddf Also parse dhcp-option DNS6 as DNS server for compatibility with OpenVPN 2 6d12c9cc2 Refuse external pki with non RSA keys 4a25059f5 test/ovpncli: Don't override PROF env variable f241c4c5f scripts: Add tool to update copyright years 27beeb03d Update lz4 version to 1.8.3 17e356858 Define DASIO_HAS_STD_STRING_VIEW on Android build b107fd994 Remove unsupported platforms from Android build 6a200f72e Ensure all Android components are always installed fbcd374a4 [OVPN3-327] OpenSSL: ensure >TLS1.0 is negotiated by default d9b1f78b6 JSON: #define OPENVPN_JSON_INTERNAL when internal JSON library is used 39290f19d Fix build issues with #if macro on big-endian hardware d4f62d9ed Fix instantiating a new URL instead of parsing the URL git-subtree-dir: Sources/OpenVPNAdapter/Libraries/Vendors/openvpn git-subtree-split: 6608878d57eec1c64c16c5a13ee65b2cf0418ca1
324 lines
9.5 KiB
C++
324 lines
9.5 KiB
C++
// OpenVPN -- An application to securely tunnel IP networks
|
|
// over a single port, with support for SSL/TLS-based
|
|
// session authentication and key exchange,
|
|
// packet encryption, packet authentication, and
|
|
// packet compression.
|
|
//
|
|
// Copyright (C) 2012-2017 OpenVPN Inc.
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License Version 3
|
|
// as published by the Free Software Foundation.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program in the COPYING file.
|
|
// If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
// OpenVPN TLS-Crypt classes
|
|
|
|
#ifndef OPENVPN_CRYPTO_TLSCRYPT_H
|
|
#define OPENVPN_CRYPTO_TLSCRYPT_H
|
|
|
|
#include <string>
|
|
|
|
#include <openvpn/common/size.hpp>
|
|
#include <openvpn/common/exception.hpp>
|
|
#include <openvpn/common/rc.hpp>
|
|
#include <openvpn/common/memneq.hpp>
|
|
#include <openvpn/crypto/static_key.hpp>
|
|
#include <openvpn/crypto/cryptoalgs.hpp>
|
|
#include <openvpn/crypto/packet_id.hpp>
|
|
#include <openvpn/ssl/psid.hpp>
|
|
|
|
namespace openvpn {
|
|
|
|
// OpenVPN protocol HMAC usage for HMAC/CTR integrity checking and tls-crypt
|
|
|
|
// Control packet format when tls-crypt is enabled:
|
|
// [OP] [PSID] [PID] [HMAC] [...]
|
|
|
|
template <typename CRYPTO_API>
|
|
class TLSCrypt
|
|
{
|
|
public:
|
|
OPENVPN_SIMPLE_EXCEPTION(ovpn_tls_crypt_context_digest_size);
|
|
OPENVPN_SIMPLE_EXCEPTION(ovpn_tls_crypt_context_bad_sizing);
|
|
OPENVPN_SIMPLE_EXCEPTION(ovpn_tls_crypt_wrong_mode);
|
|
|
|
TLSCrypt() : mode(CRYPTO_API::CipherContext::MODE_UNDEF) {}
|
|
|
|
TLSCrypt(const CryptoAlgs::Type digest, const StaticKey& key_hmac,
|
|
const CryptoAlgs::Type cipher, const StaticKey& key_crypt,
|
|
const int mode)
|
|
{
|
|
init(digest, key_hmac, cipher, key_crypt, mode);
|
|
}
|
|
|
|
bool defined() const { return ctx_hmac.is_initialized() && ctx_crypt.is_initialized(); }
|
|
|
|
// size of out buffer to pass to hmac
|
|
size_t output_hmac_size() const
|
|
{
|
|
return ctx_hmac.size();
|
|
}
|
|
|
|
void init(const CryptoAlgs::Type digest, const StaticKey& key_hmac,
|
|
const CryptoAlgs::Type cipher, const StaticKey& key_crypt,
|
|
const int mode_arg)
|
|
{
|
|
const CryptoAlgs::Alg& alg_hmac = CryptoAlgs::get(digest);
|
|
|
|
// check that key is large enough
|
|
if (key_hmac.size() < alg_hmac.size())
|
|
throw ovpn_tls_crypt_context_digest_size();
|
|
|
|
// initialize HMAC context with digest type and key
|
|
ctx_hmac.init(digest, key_hmac.data(), alg_hmac.size());
|
|
|
|
// initialize Cipher context with cipher, key and mode
|
|
ctx_crypt.init(cipher, key_crypt.data(), mode_arg);
|
|
|
|
mode = mode_arg;
|
|
}
|
|
|
|
bool hmac_gen(unsigned char *header, const size_t header_len,
|
|
const unsigned char *payload, const size_t payload_len)
|
|
{
|
|
hmac_pre(header, header_len, payload, payload_len);
|
|
ctx_hmac.final(header + header_len);
|
|
|
|
return true;
|
|
}
|
|
|
|
bool hmac_cmp(const unsigned char *header, const size_t header_len,
|
|
const unsigned char *payload, const size_t payload_len)
|
|
{
|
|
unsigned char local_hmac[CRYPTO_API::HMACContext::MAX_HMAC_SIZE];
|
|
|
|
hmac_pre(header, header_len, payload, payload_len);
|
|
ctx_hmac.final(local_hmac);
|
|
|
|
return !crypto::memneq(header + header_len, local_hmac, output_hmac_size());
|
|
}
|
|
|
|
size_t encrypt(const unsigned char *iv, unsigned char *out, const size_t olen,
|
|
const unsigned char *in, const size_t ilen)
|
|
{
|
|
if (mode != CRYPTO_API::CipherContext::ENCRYPT)
|
|
throw ovpn_tls_crypt_wrong_mode();
|
|
|
|
return encrypt_decrypt(iv, out, olen, in, ilen);
|
|
}
|
|
|
|
size_t decrypt(const unsigned char *iv, unsigned char *out, const size_t olen,
|
|
const unsigned char *in, const size_t ilen)
|
|
{
|
|
if (mode != CRYPTO_API::CipherContext::DECRYPT)
|
|
throw ovpn_tls_crypt_wrong_mode();
|
|
|
|
return encrypt_decrypt(iv, out, olen, in, ilen);
|
|
}
|
|
|
|
private:
|
|
// assume length check on header has already been performed
|
|
void hmac_pre(const unsigned char *header, const size_t header_len,
|
|
const unsigned char *payload, const size_t payload_len)
|
|
{
|
|
ctx_hmac.reset();
|
|
ctx_hmac.update(header, header_len);
|
|
ctx_hmac.update(payload, payload_len);
|
|
}
|
|
|
|
size_t encrypt_decrypt(const unsigned char *iv, unsigned char *out, const size_t olen,
|
|
const unsigned char *in, const size_t ilen)
|
|
{
|
|
ctx_crypt.reset(iv);
|
|
|
|
size_t outlen = 0;
|
|
|
|
if (!ctx_crypt.update(out, olen, in, ilen, outlen))
|
|
return 0;
|
|
|
|
if (!ctx_crypt.final(out + outlen, olen - outlen, outlen))
|
|
return 0;
|
|
|
|
return outlen;
|
|
}
|
|
|
|
typename CRYPTO_API::HMACContext ctx_hmac;
|
|
typename CRYPTO_API::CipherContext ctx_crypt;
|
|
int mode;
|
|
};
|
|
|
|
// OvpnHMAC wrapper API using dynamic polymorphism
|
|
|
|
class TLSCryptInstance : public RC<thread_unsafe_refcount>
|
|
{
|
|
public:
|
|
typedef RCPtr<TLSCryptInstance> Ptr;
|
|
|
|
virtual void init(const StaticKey& key_hmac, const StaticKey& key_crypt) = 0;
|
|
|
|
virtual size_t output_hmac_size() const = 0;
|
|
|
|
virtual bool hmac_gen(unsigned char *header, const size_t header_len,
|
|
const unsigned char *payload, const size_t payload_len) = 0;
|
|
|
|
virtual bool hmac_cmp(const unsigned char *header, const size_t header_len,
|
|
const unsigned char *payload, const size_t payload_len) = 0;
|
|
|
|
virtual size_t encrypt(const unsigned char *iv, unsigned char *out, const size_t olen,
|
|
const unsigned char *in, const size_t ilen) = 0;
|
|
|
|
virtual size_t decrypt(const unsigned char *iv, unsigned char *out, const size_t olen,
|
|
const unsigned char *in, const size_t ilen) = 0;
|
|
};
|
|
|
|
class TLSCryptContext : public RC<thread_unsafe_refcount>
|
|
{
|
|
public:
|
|
typedef RCPtr<TLSCryptContext> Ptr;
|
|
|
|
virtual size_t digest_size() const = 0;
|
|
|
|
virtual size_t cipher_key_size() const = 0;
|
|
|
|
virtual TLSCryptInstance::Ptr new_obj_send() = 0;
|
|
|
|
virtual TLSCryptInstance::Ptr new_obj_recv() = 0;
|
|
|
|
static const size_t hmac_offset;
|
|
};
|
|
|
|
// initialize static member with non-constexpr.
|
|
// This is the size of the header in a TLSCrypt-wrapped packets,
|
|
// excluding the HMAC. Format:
|
|
//
|
|
// [OP] [PSID] [PID] [HMAC] [...]
|
|
//
|
|
const size_t TLSCryptContext::hmac_offset = 1 + ProtoSessionID::SIZE +
|
|
PacketID::size(PacketID::LONG_FORM);
|
|
|
|
class TLSCryptFactory : public RC<thread_unsafe_refcount>
|
|
{
|
|
public:
|
|
typedef RCPtr<TLSCryptFactory> Ptr;
|
|
|
|
virtual TLSCryptContext::Ptr new_obj(const CryptoAlgs::Type digest_type,
|
|
const CryptoAlgs::Type cipher_type) = 0;
|
|
};
|
|
|
|
// TLSCrypt wrapper implementation using dynamic polymorphism
|
|
|
|
template <typename CRYPTO_API>
|
|
class CryptoTLSCryptInstance : public TLSCryptInstance
|
|
{
|
|
public:
|
|
CryptoTLSCryptInstance(const CryptoAlgs::Type digest_arg,
|
|
const CryptoAlgs::Type cipher_arg,
|
|
int mode_arg)
|
|
: digest(digest_arg),
|
|
cipher(cipher_arg),
|
|
mode(mode_arg)
|
|
{
|
|
}
|
|
|
|
void init(const StaticKey& key_hmac, const StaticKey& key_crypt)
|
|
{
|
|
tls_crypt.init(digest, key_hmac, cipher, key_crypt, mode);
|
|
}
|
|
|
|
size_t output_hmac_size() const
|
|
{
|
|
return tls_crypt.output_hmac_size();
|
|
}
|
|
|
|
bool hmac_gen(unsigned char *header, const size_t header_len,
|
|
const unsigned char *payload, const size_t payload_len)
|
|
{
|
|
return tls_crypt.hmac_gen(header, header_len, payload, payload_len);
|
|
}
|
|
|
|
// verify the HMAC generated by hmac_gen, return true if verified
|
|
bool hmac_cmp(const unsigned char *header, const size_t header_len,
|
|
const unsigned char *payload, const size_t payload_len)
|
|
{
|
|
return tls_crypt.hmac_cmp(header, header_len, payload, payload_len);
|
|
}
|
|
|
|
size_t encrypt(const unsigned char *iv, unsigned char *out, const size_t olen,
|
|
const unsigned char *in, const size_t ilen)
|
|
{
|
|
return tls_crypt.encrypt(iv, out, olen, in, ilen);
|
|
}
|
|
|
|
size_t decrypt(const unsigned char *iv, unsigned char *out, const size_t olen,
|
|
const unsigned char *in, const size_t ilen)
|
|
{
|
|
return tls_crypt.decrypt(iv, out, olen, in, ilen);
|
|
}
|
|
|
|
private:
|
|
typename CryptoAlgs::Type digest;
|
|
typename CryptoAlgs::Type cipher;
|
|
int mode;
|
|
TLSCrypt<CRYPTO_API> tls_crypt;
|
|
};
|
|
|
|
template <typename CRYPTO_API>
|
|
class CryptoTLSCryptContext : public TLSCryptContext
|
|
{
|
|
public:
|
|
CryptoTLSCryptContext(const CryptoAlgs::Type digest_type,
|
|
const CryptoAlgs::Type cipher_type)
|
|
: digest(digest_type),
|
|
cipher(cipher_type)
|
|
{
|
|
}
|
|
|
|
virtual size_t digest_size() const
|
|
{
|
|
return CryptoAlgs::size(digest);
|
|
}
|
|
|
|
virtual size_t cipher_key_size() const
|
|
{
|
|
return CryptoAlgs::key_length(cipher);
|
|
}
|
|
|
|
virtual TLSCryptInstance::Ptr new_obj_send()
|
|
{
|
|
return new CryptoTLSCryptInstance<CRYPTO_API>(digest, cipher,
|
|
CRYPTO_API::CipherContext::ENCRYPT);
|
|
}
|
|
|
|
virtual TLSCryptInstance::Ptr new_obj_recv()
|
|
{
|
|
return new CryptoTLSCryptInstance<CRYPTO_API>(digest, cipher,
|
|
CRYPTO_API::CipherContext::DECRYPT);
|
|
}
|
|
|
|
private:
|
|
CryptoAlgs::Type digest;
|
|
CryptoAlgs::Type cipher;
|
|
};
|
|
|
|
template <typename CRYPTO_API>
|
|
class CryptoTLSCryptFactory : public TLSCryptFactory
|
|
{
|
|
public:
|
|
virtual TLSCryptContext::Ptr new_obj(const CryptoAlgs::Type digest_type,
|
|
const CryptoAlgs::Type cipher_type)
|
|
{
|
|
return new CryptoTLSCryptContext<CRYPTO_API>(digest_type, cipher_type);
|
|
}
|
|
};
|
|
}
|
|
|
|
#endif
|