aboutsummaryrefslogtreecommitdiffstats
path: root/pylint.cfg
blob: 82b3a0621584e50ce203a6ec172fb8ff5e26c73c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
[MASTER]

# Specify a configuration file.
#rcfile=

# Python code to execute, usually for sys.path manipulation such as
# pygtk.require().
#init-hook=

# Profiled execution.
profile=no

# Add files or directories to the blacklist. They should be base names, not
# paths.
ignore=CVS, conf.py

# Pickle collected data for later comparisons.
persistent=yes

# List of plugins (as comma separated values of python modules names) to load,
# usually to register additional checkers.
load-plugins=

# A comma-separated list of package or module names from where C extensions may
# be loaded. Extensions are loading into the active Python interpreter and may
# run arbitrary code
extension-pkg-whitelist=numpy, scipy

[MESSAGES CONTROL]

# Enable the message, report, category or checker with the given id(s). You can
# either give multiple identifier separated by comma (,) or put this option
# multiple time. See also the "--disable" option for examples.
#enable=

# Disable the message, report, category or checker with the given id(s). You
# can either give multiple identifiers separated by comma (,) or put this
# option multiple times (only on the command line, not in the configuration
# file where it should appear only once).You can also use "--disable=all" to
# disable everything first and then reenable specific checks. For example, if
# you want to run only the similarities checker, you can use "--disable=all
# --enable=similarities". If you want to run only the classes checker, but have
# no Warning level messages displayed, use"--disable=all --enable=classes
# --disable=W"
#disable=redefined-variable-type, locally-disabled, locally-enabled

# TODO: Add explanation when disabling an id, either locally or globally.

[REPORTS]

# Set the output format. Available formats are text, parseable, colorized, msvs
# (visual studio) and html. You can also give a reporter class, eg
# mypackage.mymodule.MyReporterClass.
output-format=parseable

# Put messages in a separate file for each module / package specified on the
# command line instead of printing them on stdout. Reports (if any) will be
# written in a file name "pylint_global.[txt|html]".
files-output=no

# Tells whether to display a full report or only the messages
reports=yes

# Python expression which should return a note less than 10 (10 is the highest
# note). You have access to the variables errors warning, statement which
# respectively contain the number of errors / warnings messages and the total
# number of statements analyzed. This is used by the global evaluation report
# (RP0004).
evaluation=10.0 - ((float(5 * error + warning + refactor + convention) / statement) * 10)

# Add a comment according to your evaluation note. This is used by the global
# evaluation report (RP0004).
comment=no

# Template used to display messages. This is a python new-style format string
# used to format the message information. See doc for all details
#msg-template=


[FORMAT]

# Maximum number of characters on a single line.
max-line-length=80

# Regexp for a line that is allowed to be longer than the limit.
ignore-long-lines=^\s*(# )?<?https?://\S+>?$

# Allow the body of an if to be on the same line as the test if there is no
# else.
single-line-if-stmt=no

# List of optional constructs for which whitespace checking is disabled
no-space-check=trailing-comma,dict-separator

# Maximum number of lines in a module
max-module-lines=2000

# String used as indentation unit. This is usually " " (4 spaces) or "\t" (1
# tab).
indent-string='    '


[VARIABLES]

# Tells whether we should check for unused import in __init__ files.
init-import=no

# A regular expression matching the beginning of the name of dummy variables
# (i.e. not used).
dummy-variables-rgx=_$|dummy

# List of additional names supposed to be defined in builtins. Remember that
# you should avoid to define new builtins when possible.
additional-builtins=


[SIMILARITIES]

# Minimum lines number of a similarity.
min-similarity-lines=14

# Ignore comments when computing similarities.
ignore-comments=yes

# Ignore docstrings when computing similarities.
ignore-docstrings=no

# Ignore imports when computing similarities.
ignore-imports=no


[BASIC]

# Required attributes for module, separated by a comma
required-attributes=

# List of builtins function names that should not be used, separated by a comma
bad-functions=map,filter,apply,input

# Regular expression which should only match correct module names
module-rgx=(([a-z_][a-z0-9_]*)|([A-Z][a-zA-Z0-9]+))$

# Regular expression which should only match correct module level names
const-rgx=(([A-Z_][A-Z0-9_]*)|(__.*__))$

# Regular expression which should only match correct class names
class-rgx=[A-Z_][a-zA-Z0-9]+$

# Regular expression which should only match correct function names
function-rgx=[a-z_][a-z0-9_]{2,30}$

# Regular expression which should only match correct method names
method-rgx=[a-z_][a-z0-9_]{2,50}$

# Regular expression which should only match correct instance attribute names
attr-rgx=[a-z_][a-z0-9_]{2,30}$

# Regular expression which should only match correct argument names
argument-rgx=[a-z_][a-z0-9_]{2,30}$

# Regular expression which should only match correct variable names
variable-rgx=[a-z_][a-z0-9_]{2,30}$

# Regular expression which should only match correct attribute names in class
# bodies
class-attribute-rgx=([A-Za-z_][A-Za-z0-9_]{2,30}|(__.*__))$

# Regular expression which should only match correct list comprehension /
# generator expression variable names
inlinevar-rgx=[A-Za-z_][A-Za-z0-9_]*$

# Good variable names which should always be accepted, separated by a comma
good-names=i,j,k,ex,Run,_

# Bad variable names which should always be refused, separated by a comma
bad-names=foo,bar,baz,toto,tutu,tata

# Regular expression which should only match function or class names that do
# not require a docstring.
no-docstring-rgx=__.*__

# Minimum line length for functions/classes that require docstrings, shorter
# ones are exempt.
docstring-min-length=-1


[MISCELLANEOUS]

# List of note tags to take in consideration, separated by a comma.
notes=FIXME


[TYPECHECK]

# Tells whether missing members accessed in mixin class should be ignored. A
# mixin class is detected if its name ends with "mixin" (case insensitive).
ignore-mixin-members=yes

# List of classes names for which member attributes should not be checked
# (useful for classes with attributes dynamically set).
ignored-classes=SQLObject

# When zope mode is activated, add a predefined set of Zope acquired attributes
# to generated-members.
zope=no

# List of members which are set dynamically and missed by pylint inference
# system, and so shouldn't trigger E0201 when accessed. Python regular
# expressions are accepted.
generated-members=REQUEST,acl_users,aq_parent


[CLASSES]

# List of interface methods to ignore, separated by a comma. This is used for
# instance to not check methods defines in Zope's Interface base class.
ignore-iface-methods=isImplementedBy,deferred,extends,names,namesAndDescriptions,queryDescriptionFor,getBases,getDescriptionFor,getDoc,getName,getTaggedValue,getTaggedValueTags,isEqualOrExtendedBy,setTaggedValue,isImplementedByInstancesOf,adaptWith,is_implemented_by

# List of method names used to declare (i.e. assign) instance attributes.
defining-attr-methods=__init__,__new__,setUp

# List of valid names for the first argument in a class method.
valid-classmethod-first-arg=cls

# List of valid names for the first argument in a metaclass class method.
valid-metaclass-classmethod-first-arg=mcs


[IMPORTS]

# Deprecated modules which should not be used, separated by a comma
deprecated-modules=regsub,TERMIOS,Bastion,rexec

# Create a graph of every (i.e. internal and external) dependencies in the
# given file (report RP0402 must not be disabled)
import-graph=

# Create a graph of external dependencies in the given file (report RP0402 must
# not be disabled)
ext-import-graph=

# Create a graph of internal dependencies in the given file (report RP0402 must
# not be disabled)
int-import-graph=


[DESIGN]

# Maximum number of arguments for function / method
max-args=12

# Argument names that match this expression will be ignored. Default to name
# with leading underscore
ignored-argument-names=_.*

# Maximum number of locals for function / method body
max-locals=20

# Maximum number of return / yield for function / method body
max-returns=6

# Maximum number of branch for function / method body
max-branches=20

# Maximum number of statements in function / method body
max-statements=60

# Maximum number of parents for a class (see R0901).
max-parents=7

# Maximum number of attributes for a class (see R0902).
max-attributes=10

# Minimum number of public methods for a class (see R0903).
min-public-methods=0

# Maximum number of public methods for a class (see R0904).
max-public-methods=60


[EXCEPTIONS]

# Exceptions that will emit a warning when being caught. Defaults to
# "Exception"
overgeneral-exceptions=Exception


[LOGGING]

# Format style used to check logging format string. `old` means using %
# formatting, while `new` is for `{}` formatting.
logging-format-style=fstr
"> * you may not use this file except in compliance with the License. * You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include <vlib/vlib.h> #include <vnet/vnet.h> #include <vnet/pg/pg.h> #include <vppinfra/error.h> #include <vnet/udp/udp.h> #include <vnet/ipsec/ikev2.h> #include <vnet/ipsec/ikev2_priv.h> #include <openssl/obj_mac.h> #include <openssl/ec.h> #include <openssl/x509.h> #include <openssl/pem.h> #include <openssl/bn.h> #include <openssl/dh.h> /* from RFC7296 */ static const char modp_dh_768_prime[] = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" "E485B576625E7EC6F44C42E9A63A3620FFFFFFFFFFFFFFFF"; static const char modp_dh_768_generator[] = "02"; static const char modp_dh_1024_prime[] = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE65381" "FFFFFFFFFFFFFFFF"; static const char modp_dh_1024_generator[] = "02"; /* from RFC3526 */ static const char modp_dh_1536_prime[] = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" "83655D23DCA3AD961C62F356208552BB9ED529077096966D" "670C354E4ABC9804F1746C08CA237327FFFFFFFFFFFFFFFF"; static const char modp_dh_1536_generator[] = "02"; static const char modp_dh_2048_prime[] = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" "83655D23DCA3AD961C62F356208552BB9ED529077096966D" "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9" "DE2BCBF6955817183995497CEA956AE515D2261898FA0510" "15728E5A8AACAA68FFFFFFFFFFFFFFFF"; static const char modp_dh_2048_generator[] = "02"; static const char modp_dh_3072_prime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static const char modp_dh_3072_generator[] = "02"; static const char modp_dh_4096_prime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static const char modp_dh_4096_generator[] = "02"; static const char modp_dh_6144_prime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static const char modp_dh_6144_generator[] = "02"; static const char modp_dh_8192_prime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static const char modp_dh_8192_generator[] = "02"; /* from RFC5114 */ static const char modp_dh_1024_160_prime[] = "B10B8F96A080E01DDE92DE5EAE5D54EC52C99FBCFB06A3C6" "9A6A9DCA52D23B616073E28675A23D189838EF1E2EE652C0" "13ECB4AEA906112324975C3CD49B83BFACCBDD7D90C4BD70" "98488E9C219A73724EFFD6FAE5644738FAA31A4FF55BCCC0" "A151AF5F0DC8B4BD45BF37DF365C1A65E68CFDA76D4DA708" "DF1FB2BC2E4A4371"; static const char modp_dh_1024_160_generator[] = "A4D1CBD5C3FD34126765A442EFB99905F8104DD258AC507F" "D6406CFF14266D31266FEA1E5C41564B777E690F5504F213" "160217B4B01B886A5E91547F9E2749F4D7FBD7D3B9A92EE1" "909D0D2263F80A76A6A24C087A091F531DBF0A0169B6A28A" "D662A4D18E73AFA32D779D5918D08BC8858F4DCEF97C2A24" "855E6EEB22B3B2E5"; static const char modp_dh_2048_224_prime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static const char modp_dh_2048_224_generator[] = "AC4032EF4F2D9AE39DF30B5C8FFDAC506CDEBE7B89998CAF" "74866A08CFE4FFE3A6824A4E10B9A6F0DD921F01A70C4AFA" "AB739D7700C29F52C57DB17C620A8652BE5E9001A8D66AD7" "C17669101999024AF4D027275AC1348BB8A762D0521BC98A" "E247150422EA1ED409939D54DA7460CDB5F6C6B250717CBE" "F180EB34118E98D119529A45D6F834566E3025E316A330EF" "BB77A86F0C1AB15B051AE3D428C8F8ACB70A8137150B8EEB" "10E183EDD19963DDD9E263E4770589EF6AA21E7F5F2FF381" "B539CCE3409D13CD566AFBB48D6C019181E1BCFE94B30269" "EDFE72FE9B6AA4BD7B5A0F1C71CFFF4C19C418E1F6EC0179" "81BC087F2A7065B384B890D3191F2BFA"; static const char modp_dh_2048_256_prime[] = "87A8E61DB4B6663CFFBBD19C651959998CEEF608660DD0F2" "5D2CEED4435E3B00E00DF8F1D61957D4FAF7DF4561B2AA30" "16C3D91134096FAA3BF4296D830E9A7C209E0C6497517ABD" "5A8A9D306BCF67ED91F9E6725B4758C022E0B1EF4275BF7B" "6C5BFC11D45F9088B941F54EB1E59BB8BC39A0BF12307F5C" "4FDB70C581B23F76B63ACAE1CAA6B7902D52526735488A0E" "F13C6D9A51BFA4AB3AD8347796524D8EF6A167B5A41825D9" "67E144E5140564251CCACB83E6B486F6B3CA3F7971506026" "C0B857F689962856DED4010ABD0BE621C3A3960A54E710C3" "75F26375D7014103A4B54330C198AF126116D2276E11715F" "693877FAD7EF09CADB094AE91E1A1597"; static const char modp_dh_2048_256_generator[] = "3FB32C9B73134D0B2E77506660EDBD484CA7B18F21EF2054" "07F4793A1A0BA12510DBC15077BE463FFF4FED4AAC0BB555" "BE3A6C1B0C6B47B1BC3773BF7E8C6F62901228F8C28CBB18" "A55AE31341000A650196F931C77A57F2DDF463E5E9EC144B" "777DE62AAAB8A8628AC376D282D6ED3864E67982428EBC83" "1D14348F6F2F9193B5045AF2767164E1DFC967C1FB3F2E55" "A4BD1BFFE83B9C80D052B985D182EA0ADB2A3B7313D3FE14" "C8484B1E052588B9B7D2BBD2DF016199ECD06E1557CD0915" "B3353BBB64E0EC377FD028370DF92B52C7891428CDC67EB6" "184B523D1DB246C32F63078490F00EF8D647D148D4795451" "5E2327CFEF98C582664B4C0F6CC41659"; v8 * ikev2_calc_prf (ikev2_sa_transform_t * tr, v8 * key, v8 * data) { #if OPENSSL_VERSION_NUMBER >= 0x10100000L HMAC_CTX *ctx; #else HMAC_CTX ctx; #endif v8 *prf; unsigned int len = 0; prf = vec_new (u8, tr->key_trunc); #if OPENSSL_VERSION_NUMBER >= 0x10100000L ctx = HMAC_CTX_new (); HMAC_Init_ex (ctx, key, vec_len (key), tr->md, NULL); HMAC_Update (ctx, data, vec_len (data)); HMAC_Final (ctx, prf, &len); #else HMAC_CTX_init (&ctx); HMAC_Init_ex (&ctx, key, vec_len (key), tr->md, NULL); HMAC_Update (&ctx, data, vec_len (data)); HMAC_Final (&ctx, prf, &len); HMAC_CTX_cleanup (&ctx); #endif ASSERT (len == tr->key_trunc); return prf; } u8 * ikev2_calc_prfplus (ikev2_sa_transform_t * tr, u8 * key, u8 * seed, int len) { v8 *t = 0, *s = 0, *tmp = 0, *ret = 0; u8 x = 0; /* prf+ (K,S) = T1 | T2 | T3 | T4 | ... where: T1 = prf (K, S | 0x01) T2 = prf (K, T1 | S | 0x02) T3 = prf (K, T2 | S | 0x03) T4 = prf (K, T3 | S | 0x04) */ while (vec_len (ret) < len && x < 255) { if (t) { vec_append (s, t); vec_free (t); } vec_append (s, seed); vec_add2 (s, tmp, 1); *tmp = x + 1; t = ikev2_calc_prf (tr, key, s); vec_append (ret, t); vec_free (s); x++; } vec_free (t); if (x == 255) { vec_free (ret); } return ret; } v8 * ikev2_calc_integr (ikev2_sa_transform_t * tr, v8 * key, u8 * data, int len) { v8 *r; #if OPENSSL_VERSION_NUMBER >= 0x10100000L HMAC_CTX *hctx; #else HMAC_CTX hctx; #endif unsigned int l; ASSERT (tr->type == IKEV2_TRANSFORM_TYPE_INTEG); r = vec_new (u8, tr->key_len); /* verify integrity of data */ #if OPENSSL_VERSION_NUMBER >= 0x10100000L hctx = HMAC_CTX_new (); HMAC_Init_ex (hctx, key, vec_len (key), tr->md, NULL); HMAC_Update (hctx, (const u8 *) data, len); HMAC_Final (hctx, r, &l); #else HMAC_CTX_init (&hctx); HMAC_Init_ex (&hctx, key, vec_len (key), tr->md, NULL); HMAC_Update (&hctx, (const u8 *) data, len); HMAC_Final (&hctx, r, &l); HMAC_CTX_cleanup (&hctx); #endif ASSERT (l == tr->key_len); return r; } v8 * ikev2_decrypt_data (ikev2_sa_t * sa, u8 * data, int len) { #if OPENSSL_VERSION_NUMBER >= 0x10100000L EVP_CIPHER_CTX *ctx; #else EVP_CIPHER_CTX ctx; #endif v8 *r; int out_len = 0, block_size; ikev2_sa_transform_t *tr_encr; u8 *key = sa->is_initiator ? sa->sk_er : sa->sk_ei; tr_encr = ikev2_sa_get_td_for_type (sa->r_proposals, IKEV2_TRANSFORM_TYPE_ENCR); block_size = tr_encr->block_size; /* check if data is multiplier of cipher block size */ if (len % block_size) { clib_warning ("wrong data length"); return 0; } #if OPENSSL_VERSION_NUMBER >= 0x10100000L ctx = EVP_CIPHER_CTX_new (); #else EVP_CIPHER_CTX_init (&ctx); #endif r = vec_new (u8, len - block_size); #if OPENSSL_VERSION_NUMBER >= 0x10100000L EVP_DecryptInit_ex (ctx, tr_encr->cipher, NULL, key, data); EVP_DecryptUpdate (ctx, r, &out_len, data + block_size, len - block_size); EVP_DecryptFinal_ex (ctx, r + out_len, &out_len); #else EVP_DecryptInit_ex (&ctx, tr_encr->cipher, NULL, key, data); EVP_DecryptUpdate (&ctx, r, &out_len, data + block_size, len - block_size); EVP_DecryptFinal_ex (&ctx, r + out_len, &out_len); #endif /* remove padding */ _vec_len (r) -= r[vec_len (r) - 1] + 1; #if OPENSSL_VERSION_NUMBER < 0x10100000L EVP_CIPHER_CTX_cleanup (&ctx); #endif return r; } int ikev2_encrypt_data (ikev2_sa_t * sa, v8 * src, u8 * dst) { #if OPENSSL_VERSION_NUMBER >= 0x10100000L EVP_CIPHER_CTX *ctx; #else EVP_CIPHER_CTX ctx; #endif int out_len; int bs; ikev2_sa_transform_t *tr_encr; u8 *key = sa->is_initiator ? sa->sk_ei : sa->sk_er; tr_encr = ikev2_sa_get_td_for_type (sa->r_proposals, IKEV2_TRANSFORM_TYPE_ENCR); bs = tr_encr->block_size; /* generate IV */ RAND_bytes (dst, bs); #if OPENSSL_VERSION_NUMBER >= 0x10100000L ctx = EVP_CIPHER_CTX_new (); EVP_EncryptInit_ex (ctx, tr_encr->cipher, NULL, key, dst /* dst */ ); EVP_EncryptUpdate (ctx, dst + bs, &out_len, src, vec_len (src)); #else EVP_CIPHER_CTX_init (&ctx); EVP_EncryptInit_ex (&ctx, tr_encr->cipher, NULL, key, dst /* dst */ ); EVP_EncryptUpdate (&ctx, dst + bs, &out_len, src, vec_len (src)); EVP_CIPHER_CTX_cleanup (&ctx); #endif ASSERT (vec_len (src) == out_len); return out_len + bs; } void ikev2_generate_dh (ikev2_sa_t * sa, ikev2_sa_transform_t * t) { int r; #if OPENSSL_VERSION_NUMBER >= 0x10100000L BIGNUM *p = BN_new (); BIGNUM *q = BN_new (); BIGNUM *g = BN_new (); BIGNUM *pub_key = BN_new (); BIGNUM *priv_key = BN_new (); #endif if (t->dh_group == IKEV2_DH_GROUP_MODP) { DH *dh = DH_new (); #if OPENSSL_VERSION_NUMBER >= 0x10100000L BN_hex2bn (&p, t->dh_p); BN_hex2bn (&g, t->dh_g); DH_set0_pqg (dh, p, q, g); #else BN_hex2bn (&dh->p, t->dh_p); BN_hex2bn (&dh->g, t->dh_g); #endif DH_generate_key (dh); if (sa->is_initiator) { sa->i_dh_data = vec_new (u8, t->key_len); sa->dh_private_key = vec_new (u8, t->key_len); #if OPENSSL_VERSION_NUMBER >= 0x10100000L r = BN_bn2bin (pub_key, sa->i_dh_data); ASSERT (r == t->key_len); r = BN_bn2bin (priv_key, sa->dh_private_key); DH_set0_key (dh, pub_key, priv_key); #else r = BN_bn2bin (dh->pub_key, sa->i_dh_data); ASSERT (r == t->key_len); r = BN_bn2bin (dh->priv_key, sa->dh_private_key); ASSERT (r == t->key_len); #endif } else { sa->r_dh_data = vec_new (u8, t->key_len); #if OPENSSL_VERSION_NUMBER >= 0x10100000L r = BN_bn2bin (pub_key, sa->i_dh_data); ASSERT (r == t->key_len); DH_set0_key (dh, pub_key, NULL); #else r = BN_bn2bin (dh->pub_key, sa->r_dh_data); ASSERT (r == t->key_len); #endif BIGNUM *ex; sa->dh_shared_key = vec_new (u8, t->key_len); ex = BN_bin2bn (sa->i_dh_data, vec_len (sa->i_dh_data), NULL); r = DH_compute_key (sa->dh_shared_key, ex, dh); ASSERT (r == t->key_len); BN_clear_free (ex); } DH_free (dh); } else if (t->dh_group == IKEV2_DH_GROUP_ECP) { EC_KEY *ec = EC_KEY_new_by_curve_name (t->nid); ASSERT (ec); EC_KEY_generate_key (ec); const EC_POINT *r_point = EC_KEY_get0_public_key (ec); const EC_GROUP *group = EC_KEY_get0_group (ec); BIGNUM *x = NULL, *y = NULL; BN_CTX *bn_ctx = BN_CTX_new (); u16 x_off, y_off, len; EC_POINT *i_point = EC_POINT_new (group); EC_POINT *shared_point = EC_POINT_new (group); x = BN_new (); y = BN_new (); len = t->key_len / 2; EC_POINT_get_affine_coordinates_GFp (group, r_point, x, y, bn_ctx); if (sa->is_initiator) { sa->i_dh_data = vec_new (u8, t->key_len); x_off = len - BN_num_bytes (x); memset (sa->i_dh_data, 0, x_off); BN_bn2bin (x, sa->i_dh_data + x_off); y_off = t->key_len - BN_num_bytes (y); memset (sa->i_dh_data + len, 0, y_off - len); BN_bn2bin (y, sa->i_dh_data + y_off); const BIGNUM *prv = EC_KEY_get0_private_key (ec); sa->dh_private_key = vec_new (u8, BN_num_bytes (prv)); r = BN_bn2bin (prv, sa->dh_private_key); ASSERT (r == BN_num_bytes (prv)); } else { sa->r_dh_data = vec_new (u8, t->key_len); x_off = len - BN_num_bytes (x); memset (sa->r_dh_data, 0, x_off); BN_bn2bin (x, sa->r_dh_data + x_off); y_off = t->key_len - BN_num_bytes (y); memset (sa->r_dh_data + len, 0, y_off - len); BN_bn2bin (y, sa->r_dh_data + y_off); x = BN_bin2bn (sa->i_dh_data, len, x); y = BN_bin2bn (sa->i_dh_data + len, len, y); EC_POINT_set_affine_coordinates_GFp (group, i_point, x, y, bn_ctx); sa->dh_shared_key = vec_new (u8, t->key_len); EC_POINT_mul (group, shared_point, NULL, i_point, EC_KEY_get0_private_key (ec), NULL); EC_POINT_get_affine_coordinates_GFp (group, shared_point, x, y, bn_ctx); x_off = len - BN_num_bytes (x); memset (sa->dh_shared_key, 0, x_off); BN_bn2bin (x, sa->dh_shared_key + x_off); y_off = t->key_len - BN_num_bytes (y); memset (sa->dh_shared_key + len, 0, y_off - len); BN_bn2bin (y, sa->dh_shared_key + y_off); } EC_KEY_free (ec); BN_free (x); BN_free (y); BN_CTX_free (bn_ctx); EC_POINT_free (i_point); EC_POINT_free (shared_point); } } void ikev2_complete_dh (ikev2_sa_t * sa, ikev2_sa_transform_t * t) { int r; #if OPENSSL_VERSION_NUMBER >= 0x10100000L BIGNUM *p = BN_new (); BIGNUM *q = BN_new (); BIGNUM *g = BN_new (); BIGNUM *priv_key = BN_new (); #endif if (t->dh_group == IKEV2_DH_GROUP_MODP) { DH *dh = DH_new (); #if OPENSSL_VERSION_NUMBER >= 0x10100000L BN_hex2bn (&p, t->dh_p); BN_hex2bn (&g, t->dh_g); DH_set0_pqg (dh, p, q, g); priv_key = BN_bin2bn (sa->dh_private_key, vec_len (sa->dh_private_key), NULL); DH_set0_key (dh, NULL, priv_key); #else BN_hex2bn (&dh->p, t->dh_p); BN_hex2bn (&dh->g, t->dh_g); dh->priv_key = BN_bin2bn (sa->dh_private_key, vec_len (sa->dh_private_key), NULL); #endif BIGNUM *ex; sa->dh_shared_key = vec_new (u8, t->key_len); ex = BN_bin2bn (sa->r_dh_data, vec_len (sa->r_dh_data), NULL); r = DH_compute_key (sa->dh_shared_key, ex, dh); ASSERT (r == t->key_len); BN_clear_free (ex); DH_free (dh); } else if (t->dh_group == IKEV2_DH_GROUP_ECP) { EC_KEY *ec = EC_KEY_new_by_curve_name (t->nid); ASSERT (ec); const EC_GROUP *group = EC_KEY_get0_group (ec); BIGNUM *x = NULL, *y = NULL; BN_CTX *bn_ctx = BN_CTX_new (); u16 x_off, y_off, len; BIGNUM *prv; prv = BN_bin2bn (sa->dh_private_key, vec_len (sa->dh_private_key), NULL); EC_KEY_set_private_key (ec, prv); x = BN_new (); y = BN_new (); len = t->key_len / 2; x = BN_bin2bn (sa->r_dh_data, len, x); y = BN_bin2bn (sa->r_dh_data + len, len, y); EC_POINT *r_point = EC_POINT_new (group); EC_POINT_set_affine_coordinates_GFp (group, r_point, x, y, bn_ctx); EC_KEY_set_public_key (ec, r_point); EC_POINT *i_point = EC_POINT_new (group); EC_POINT *shared_point = EC_POINT_new (group); x = BN_bin2bn (sa->i_dh_data, len, x); y = BN_bin2bn (sa->i_dh_data + len, len, y); EC_POINT_set_affine_coordinates_GFp (group, i_point, x, y, bn_ctx); EC_POINT_mul (group, shared_point, NULL, r_point, EC_KEY_get0_private_key (ec), NULL); EC_POINT_get_affine_coordinates_GFp (group, shared_point, x, y, bn_ctx); sa->dh_shared_key = vec_new (u8, t->key_len); x_off = len - BN_num_bytes (x); memset (sa->dh_shared_key, 0, x_off); BN_bn2bin (x, sa->dh_shared_key + x_off); y_off = t->key_len - BN_num_bytes (y); memset (sa->dh_shared_key + len, 0, y_off - len); BN_bn2bin (y, sa->dh_shared_key + y_off); EC_KEY_free (ec); BN_free (x); BN_free (y); BN_free (prv); BN_CTX_free (bn_ctx); EC_POINT_free (i_point); EC_POINT_free (r_point); EC_POINT_free (shared_point); } } int ikev2_verify_sign (EVP_PKEY * pkey, u8 * sigbuf, u8 * data) { #if OPENSSL_VERSION_NUMBER >= 0x10100000L EVP_MD_CTX *md_ctx = EVP_MD_CTX_new (); #else EVP_MD_CTX md_ctx; #endif #if OPENSSL_VERSION_NUMBER >= 0x10100000L EVP_VerifyInit (md_ctx, EVP_sha1 ()); EVP_VerifyUpdate (md_ctx, data, vec_len (data)); #else EVP_VerifyInit_ex (&md_ctx, EVP_sha1 (), NULL); EVP_VerifyUpdate (&md_ctx, data, vec_len (data)); #endif #if OPENSSL_VERSION_NUMBER >= 0x10100000L return EVP_VerifyFinal (md_ctx, sigbuf, vec_len (sigbuf), pkey); #else return EVP_VerifyFinal (&md_ctx, sigbuf, vec_len (sigbuf), pkey); #endif } u8 * ikev2_calc_sign (EVP_PKEY * pkey, u8 * data) { #if OPENSSL_VERSION_NUMBER >= 0x10100000L EVP_MD_CTX *md_ctx = EVP_MD_CTX_new (); #else EVP_MD_CTX md_ctx; #endif unsigned int sig_len = 0; u8 *sign; #if OPENSSL_VERSION_NUMBER >= 0x10100000L EVP_SignInit (md_ctx, EVP_sha1 ()); EVP_SignUpdate (md_ctx, data, vec_len (data)); /* get sign len */ EVP_SignFinal (md_ctx, NULL, &sig_len, pkey); sign = vec_new (u8, sig_len); /* calc sign */ EVP_SignFinal (md_ctx, sign, &sig_len, pkey); #else EVP_SignInit (&md_ctx, EVP_sha1 ()); EVP_SignUpdate (&md_ctx, data, vec_len (data)); /* get sign len */ EVP_SignFinal (&md_ctx, NULL, &sig_len, pkey); sign = vec_new (u8, sig_len); /* calc sign */ EVP_SignFinal (&md_ctx, sign, &sig_len, pkey); #endif return sign; } EVP_PKEY * ikev2_load_cert_file (u8 * file) { FILE *fp; X509 *x509; EVP_PKEY *pkey = NULL; fp = fopen ((char *) file, "r"); if (!fp) { clib_warning ("open %s failed", file); goto end; } x509 = PEM_read_X509 (fp, NULL, NULL, NULL); fclose (fp); if (x509 == NULL) { clib_warning ("read cert %s failed", file); goto end; } pkey = X509_get_pubkey (x509); if (pkey == NULL) clib_warning ("get pubkey %s failed", file); end: return pkey; } EVP_PKEY * ikev2_load_key_file (u8 * file) { FILE *fp; EVP_PKEY *pkey = NULL; fp = fopen ((char *) file, "r"); if (!fp) { clib_warning ("open %s failed", file); goto end; } pkey = PEM_read_PrivateKey (fp, NULL, NULL, NULL); fclose (fp); if (pkey == NULL) clib_warning ("read %s failed", file); end: return pkey; } void ikev2_crypto_init (ikev2_main_t * km) { ikev2_sa_transform_t *tr; /* vector of supported transforms - in order of preference */ vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_ENCR; tr->encr_type = IKEV2_TRANSFORM_ENCR_TYPE_AES_CBC; tr->key_len = 256 / 8; tr->block_size = 128 / 8; tr->cipher = EVP_aes_256_cbc (); vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_ENCR; tr->encr_type = IKEV2_TRANSFORM_ENCR_TYPE_AES_CBC; tr->key_len = 192 / 8; tr->block_size = 128 / 8; tr->cipher = EVP_aes_192_cbc (); vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_ENCR; tr->encr_type = IKEV2_TRANSFORM_ENCR_TYPE_AES_CBC; tr->key_len = 128 / 8; tr->block_size = 128 / 8; tr->cipher = EVP_aes_128_cbc (); vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_PRF; tr->prf_type = IKEV2_TRANSFORM_PRF_TYPE_PRF_HMAC_SHA1; tr->key_len = 160 / 8; tr->key_trunc = 160 / 8; tr->md = EVP_sha1 (); vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_INTEG; tr->integ_type = IKEV2_TRANSFORM_INTEG_TYPE_AUTH_HMAC_SHA1_96; tr->key_len = 160 / 8; tr->key_trunc = 96 / 8; tr->md = EVP_sha1 (); #if defined(OPENSSL_NO_CISCO_FECDH) vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_BRAINPOOL_512; tr->key_len = (512 * 2) / 8; tr->nid = NID_brainpoolP512r1; tr->dh_group = IKEV2_DH_GROUP_ECP; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_BRAINPOOL_384; tr->key_len = (384 * 2) / 8; tr->nid = NID_brainpoolP384r1; tr->dh_group = IKEV2_DH_GROUP_ECP; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_BRAINPOOL_256; tr->key_len = (256 * 2) / 8; tr->nid = NID_brainpoolP256r1; tr->dh_group = IKEV2_DH_GROUP_ECP; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_BRAINPOOL_224; tr->key_len = (224 * 2) / 8; tr->nid = NID_brainpoolP224r1; tr->dh_group = IKEV2_DH_GROUP_ECP; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_ECP_224; tr->key_len = (224 * 2) / 8; tr->nid = NID_secp224r1; tr->dh_group = IKEV2_DH_GROUP_ECP; #endif vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_ECP_521; tr->key_len = (528 * 2) / 8; tr->nid = NID_secp521r1; tr->dh_group = IKEV2_DH_GROUP_ECP; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_ECP_384; tr->key_len = (384 * 2) / 8; tr->nid = NID_secp384r1; tr->dh_group = IKEV2_DH_GROUP_ECP; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_ECP_256; tr->key_len = (256 * 2) / 8; tr->nid = NID_X9_62_prime256v1; tr->dh_group = IKEV2_DH_GROUP_ECP; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_ECP_192; tr->key_len = (192 * 2) / 8; tr->nid = NID_X9_62_prime192v1; tr->dh_group = IKEV2_DH_GROUP_ECP; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_MODP_2048_256; tr->key_len = 2048 / 8; tr->dh_p = (const char *) &modp_dh_2048_256_prime; tr->dh_g = (const char *) &modp_dh_2048_256_generator; tr->dh_group = IKEV2_DH_GROUP_MODP; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_MODP_2048_224; tr->key_len = 2048 / 8; tr->dh_p = (const char *) &modp_dh_2048_224_prime; tr->dh_g = (const char *) &modp_dh_2048_224_generator; tr->dh_group = IKEV2_DH_GROUP_MODP; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_MODP_1024_160; tr->key_len = 1024 / 8; tr->dh_p = (const char *) &modp_dh_1024_160_prime; tr->dh_g = (const char *) &modp_dh_1024_160_generator; tr->dh_group = IKEV2_DH_GROUP_MODP; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_MODP_8192; tr->key_len = 8192 / 8; tr->dh_p = (const char *) &modp_dh_8192_prime; tr->dh_g = (const char *) &modp_dh_8192_generator; tr->dh_group = IKEV2_DH_GROUP_MODP; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_MODP_6144; tr->key_len = 6144 / 8; tr->dh_p = (const char *) &modp_dh_6144_prime; tr->dh_g = (const char *) &modp_dh_6144_generator; tr->dh_group = IKEV2_DH_GROUP_MODP; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_MODP_4096; tr->key_len = 4096 / 8; tr->dh_p = (const char *) &modp_dh_4096_prime; tr->dh_g = (const char *) &modp_dh_4096_generator; tr->dh_group = IKEV2_DH_GROUP_MODP; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_MODP_3072; tr->key_len = 3072 / 8; tr->dh_p = (const char *) &modp_dh_3072_prime; tr->dh_g = (const char *) &modp_dh_3072_generator; tr->dh_group = IKEV2_DH_GROUP_MODP; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_MODP_2048; tr->key_len = 2048 / 8; tr->dh_p = (const char *) &modp_dh_2048_prime; tr->dh_g = (const char *) &modp_dh_2048_generator; tr->dh_group = IKEV2_DH_GROUP_MODP; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_MODP_1536; tr->key_len = 1536 / 8; tr->dh_p = (const char *) &modp_dh_1536_prime; tr->dh_g = (const char *) &modp_dh_1536_generator; tr->dh_group = IKEV2_DH_GROUP_MODP; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_MODP_1024; tr->key_len = 1024 / 8; tr->dh_p = (const char *) &modp_dh_1024_prime; tr->dh_g = (const char *) &modp_dh_1024_generator; tr->dh_group = IKEV2_DH_GROUP_MODP; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_DH; tr->dh_type = IKEV2_TRANSFORM_DH_TYPE_MODP_768; tr->key_len = 768 / 8; tr->dh_p = (const char *) &modp_dh_768_prime; tr->dh_g = (const char *) &modp_dh_768_generator; tr->dh_group = IKEV2_DH_GROUP_MODP; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_ESN; tr->esn_type = IKEV2_TRANSFORM_ESN_TYPE_ESN; vec_add2 (km->supported_transforms, tr, 1); tr->type = IKEV2_TRANSFORM_TYPE_ESN; tr->esn_type = IKEV2_TRANSFORM_ESN_TYPE_NO_ESN; } /* * fd.io coding-style-patch-verification: ON * * Local Variables: * eval: (c-set-style "gnu") * End: */