mirror of
https://github.com/deneraraujo/OpenVPNAdapter.git
synced 2026-04-24 00:00:05 +08:00
Squashed 'OpenVPN Adapter/Vendors/openvpn/' content from commit da99df6
git-subtree-dir: OpenVPN Adapter/Vendors/openvpn git-subtree-split: da99df69492256d7a18bbea303ae98457782a4bf
This commit is contained in:
@@ -0,0 +1,98 @@
|
||||
// Private Gateway
|
||||
// Copyright (C) 2012-2017 OpenVPN Technologies, Inc.
|
||||
// All rights reserved
|
||||
|
||||
#ifndef OPENVPN_CRYPTO_TOKENENCRYPT_H
|
||||
#define OPENVPN_CRYPTO_TOKENENCRYPT_H
|
||||
|
||||
#include <string>
|
||||
#include <atomic>
|
||||
#include <cstdint> // for std::uint8_t
|
||||
|
||||
#include <openssl/evp.h>
|
||||
|
||||
#include <openvpn/common/size.hpp>
|
||||
#include <openvpn/common/exception.hpp>
|
||||
#include <openvpn/common/base64.hpp>
|
||||
#include <openvpn/buffer/buffer.hpp>
|
||||
#include <openvpn/random/randapi.hpp>
|
||||
#include <openvpn/openssl/util/error.hpp>
|
||||
|
||||
namespace openvpn {
|
||||
class TokenEncrypt
|
||||
{
|
||||
public:
|
||||
class Key
|
||||
{
|
||||
public:
|
||||
static constexpr size_t SIZE = 16;
|
||||
|
||||
Key(RandomAPI& rng)
|
||||
{
|
||||
rng.assert_crypto();
|
||||
rng.rand_bytes(data, sizeof(data));
|
||||
}
|
||||
|
||||
private:
|
||||
friend class TokenEncrypt;
|
||||
std::uint8_t data[SIZE];
|
||||
};
|
||||
|
||||
// mode parameter for constructor
|
||||
enum {
|
||||
ENCRYPT = 1,
|
||||
DECRYPT = 0
|
||||
};
|
||||
|
||||
TokenEncrypt(const Key& key, const int mode)
|
||||
{
|
||||
EVP_CIPHER_CTX_init(&ctx);
|
||||
if (!EVP_CipherInit_ex(&ctx, EVP_aes_128_ecb(), nullptr, key.data, nullptr, mode))
|
||||
throw OpenSSLException("TokenEncrypt: EVP_CipherInit_ex[1] failed");
|
||||
EVP_CIPHER_CTX_set_padding(&ctx, 0);
|
||||
}
|
||||
|
||||
~TokenEncrypt()
|
||||
{
|
||||
EVP_CIPHER_CTX_cleanup(&ctx);
|
||||
}
|
||||
|
||||
// Do the encrypt/decrypt
|
||||
void operator()(std::uint8_t* dest, const std::uint8_t* src, const size_t size)
|
||||
{
|
||||
// NOTE: since this algorithm uses the ECB block cipher mode,
|
||||
// it should only be used to encrypt/decrypt a message which
|
||||
// is exactly equal to the AES block size (16 bytes).
|
||||
if (size != EVP_CIPHER_CTX_block_size(&ctx))
|
||||
throw Exception("TokenEncrypt: encrypt/decrypt data must be equal to AES block size");
|
||||
int outlen=0;
|
||||
if (!EVP_CipherInit_ex(&ctx, nullptr, nullptr, nullptr, nullptr, -1))
|
||||
throw OpenSSLException("TokenEncrypt: EVP_CipherInit_ex[2] failed");
|
||||
if (!EVP_CipherUpdate(&ctx, dest, &outlen, src, size))
|
||||
throw OpenSSLException("TokenEncrypt: EVP_CipherUpdate failed");
|
||||
// NOTE: we skip EVP_CipherFinal_ex because we are running in ECB mode without padding
|
||||
if (outlen != size)
|
||||
throw Exception("TokenEncrypt: unexpected output length=" + std::to_string(outlen) + " expected=" + std::to_string(size));
|
||||
}
|
||||
|
||||
private:
|
||||
TokenEncrypt(const TokenEncrypt&) = delete;
|
||||
TokenEncrypt& operator=(const TokenEncrypt&) = delete;
|
||||
|
||||
EVP_CIPHER_CTX ctx;
|
||||
};
|
||||
|
||||
struct TokenEncryptDecrypt
|
||||
{
|
||||
TokenEncryptDecrypt(const TokenEncrypt::Key& key)
|
||||
: encrypt(key, TokenEncrypt::ENCRYPT),
|
||||
decrypt(key, TokenEncrypt::DECRYPT)
|
||||
{
|
||||
}
|
||||
|
||||
TokenEncrypt encrypt;
|
||||
TokenEncrypt decrypt;
|
||||
};
|
||||
}
|
||||
|
||||
#endif
|
||||
Reference in New Issue
Block a user