File: kocrypto.hpp

package info (click to toggle)
openvpn3-client 24.1%2Bdfsg-1
  • links: PTS, VCS
  • area: main
  • in suites: trixie
  • size: 19,384 kB
  • sloc: cpp: 180,128; python: 11,591; ansic: 1,878; sh: 1,767; java: 402; lisp: 81; makefile: 44
file content (150 lines) | stat: -rw-r--r-- 4,704 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
//    OpenVPN -- An application to securely tunnel IP networks
//               over a single port, with support for SSL/TLS-based
//               session authentication and key exchange,
//               packet encryption, packet authentication, and
//               packet compression.
//
//    Copyright (C) 2012-2022 OpenVPN Inc.
//
//    This program is free software: you can redistribute it and/or modify
//    it under the terms of the GNU Affero General Public License Version 3
//    as published by the Free Software Foundation.
//
//    This program is distributed in the hope that it will be useful,
//    but WITHOUT ANY WARRANTY; without even the implied warranty of
//    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
//    GNU Affero General Public License for more details.
//
//    You should have received a copy of the GNU Affero General Public License
//    along with this program in the COPYING file.
//    If not, see <http://www.gnu.org/licenses/>.

// kovpn crypto wrappers

#pragma once

#include <cstring> // for std::memset, std::memcpy
#include <utility> // for std::move

#include <openvpn/common/size.hpp>
#include <openvpn/common/exception.hpp>
#include <openvpn/common/rc.hpp>
#include <openvpn/frame/frame.hpp>
#include <openvpn/crypto/cryptodc.hpp>
#include <openvpn/crypto/bs64_data_limit.hpp>

namespace openvpn {
namespace KoRekey {

OPENVPN_EXCEPTION(korekey_error);

struct Info
{
    Info()
    {
    }

    Info(const CryptoDCContext::Ptr &dc_context_delegate_arg,
         const unsigned int key_id_arg,
         const Frame::Ptr &frame_arg)
        : dc_context_delegate(dc_context_delegate_arg),
          key_id(key_id_arg),
          frame(frame_arg)
    {
    }

    CryptoDCContext::Ptr dc_context_delegate;
    CompressContext comp_ctx;
    unsigned int key_id = 0;
    int remote_peer_id = -1;
    bool tcp_linear = false;
    StaticKey encrypt_cipher;
    StaticKey encrypt_hmac;
    StaticKey decrypt_cipher;
    StaticKey decrypt_hmac;
    Frame::Ptr frame;
};

class Key
{
    // noncopyable because of "opk.primary = &key" below
    Key(const Key &) = delete;
    Key &operator=(const Key &) = delete;

  public:
    static void validate(const CryptoAlgs::Type cipher,
                         const CryptoAlgs::Type digest)
    {
        const CryptoAlgs::Alg &calg = CryptoAlgs::get(cipher);
        const CryptoAlgs::Alg &halg = CryptoAlgs::get(digest);

        switch (cipher)
        {
        case CryptoAlgs::AES_128_GCM:
        case CryptoAlgs::AES_192_GCM:
        case CryptoAlgs::AES_256_GCM:
        case CryptoAlgs::AES_128_CBC:
        case CryptoAlgs::AES_192_CBC:
        case CryptoAlgs::AES_256_CBC:
        case CryptoAlgs::BF_CBC:
        case CryptoAlgs::CHACHA20_POLY1305:
#ifdef ENABLE_OVPNDCO
        case CryptoAlgs::NONE:
#endif
            break;
        default:
            OPENVPN_THROW(korekey_error, "cipher alg " << calg.name() << " is not currently supported by kovpn");
        }

        if (calg.mode() == CryptoAlgs::CBC_HMAC)
        {
            switch (digest)
            {
            case CryptoAlgs::SHA1:
            case CryptoAlgs::SHA256:
#ifdef ENABLE_OVPNDCO
            case CryptoAlgs::NONE:
#endif
                break;
            default:
                OPENVPN_THROW(korekey_error, "HMAC alg " << halg.name() << " is not currently supported by kovpn");
            }
        }
    }

    Key()
    {
    }

  protected:
    const unsigned char *verify_key(const char *title, const StaticKey &sk, const size_t size_required)
    {
        if (sk.size() < size_required)
            OPENVPN_THROW(korekey_error, title << ": insufficient key material, provided=" << sk.size() << " required=" << size_required);
        return sk.data();
    }

    void set_nonce_tail(const char *title, unsigned char *dest, const size_t dest_size, const StaticKey &src)
    {
        const int NONCE_TAIL_SIZE = CryptoAlgs::AEAD_NONCE_TAIL_SIZE;

        const unsigned char *k = verify_key(title, src, NONCE_TAIL_SIZE);
        if (dest_size < NONCE_TAIL_SIZE)
            OPENVPN_THROW(korekey_error, title << ": cannot set");
        std::memcpy(dest, k, NONCE_TAIL_SIZE);

        // if dest is larger than NONCE_TAIL_SIZE, zero remaining bytes
        if (dest_size > NONCE_TAIL_SIZE)
            std::memset(dest + NONCE_TAIL_SIZE, 0, dest_size - NONCE_TAIL_SIZE);
    }
};
} // namespace KoRekey
} // namespace openvpn

#ifdef ENABLE_KOVPN
#include <openvpn/kovpn/kovpnkocrypto.hpp>
#elif defined(ENABLE_OVPNDCO) || defined(ENABLE_OVPNDCOWIN)
#include <openvpn/dco/ovpndcokocrypto.hpp>
#else
#error either ENABLE_KOVPN, ENABLE_OVPNDCO or ENABLE_OVPNDCOWIN must be defined
#endif