Newer
Older
XinYang_IOS / Pods / OpenVPNAdapter / Sources / OpenVPN3 / openvpn / openssl / util / tokenencrypt.hpp
@zhangfeng zhangfeng on 7 Dec 2023 3 KB 1.8.0
//    OpenVPN -- An application to securely tunnel IP networks
//               over a single port, with support for SSL/TLS-based
//               session authentication and key exchange,
//               packet encryption, packet authentication, and
//               packet compression.
//
//    Copyright (C) 2012-2020 OpenVPN Inc.
//
//    This program is free software: you can redistribute it and/or modify
//    it under the terms of the GNU Affero General Public License Version 3
//    as published by the Free Software Foundation.
//
//    This program is distributed in the hope that it will be useful,
//    but WITHOUT ANY WARRANTY; without even the implied warranty of
//    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
//    GNU Affero General Public License for more details.
//
//    You should have received a copy of the GNU Affero General Public License
//    along with this program in the COPYING file.
//    If not, see <http://www.gnu.org/licenses/>.

#ifndef OPENVPN_CRYPTO_TOKENENCRYPT_H
#define OPENVPN_CRYPTO_TOKENENCRYPT_H

#include <string>
#include <atomic>
#include <cstdint> // for std::uint8_t

#include <openssl/evp.h>

#include <openvpn/common/size.hpp>
#include <openvpn/common/exception.hpp>
#include <openvpn/common/base64.hpp>
#include <openvpn/buffer/buffer.hpp>
#include <openvpn/random/randapi.hpp>
#include <openvpn/openssl/util/error.hpp>

#include <openvpn/openssl/compat.hpp>

namespace openvpn {
  class TokenEncrypt
  {
  public:
    class Key
    {
    public:
      static constexpr size_t SIZE = 16;

      Key(RandomAPI& rng)
      {
	rng.assert_crypto();
	rng.rand_bytes(data, sizeof(data));
      }

    private:
      friend class TokenEncrypt;
      std::uint8_t data[SIZE];
    };

    // mode parameter for constructor
    enum {
      ENCRYPT = 1,
      DECRYPT = 0
    };

    TokenEncrypt(const Key& key, const int mode)
    {
      ctx = EVP_CIPHER_CTX_new ();
      EVP_CIPHER_CTX_reset (ctx);
      if (!EVP_CipherInit_ex(ctx, EVP_aes_128_ecb(), nullptr, key.data, nullptr, mode))
	{
	  EVP_CIPHER_CTX_free(ctx);
	  throw OpenSSLException("TokenEncrypt: EVP_CipherInit_ex[1] failed");
	}
      EVP_CIPHER_CTX_set_padding(ctx, 0);
    }

    ~TokenEncrypt()
    {
      EVP_CIPHER_CTX_free(ctx);
    }

    // Do the encrypt/decrypt
    void operator()(std::uint8_t* dest, const std::uint8_t* src, const int size)
    {
      // NOTE: since this algorithm uses the ECB block cipher mode,
      // it should only be used to encrypt/decrypt a message which
      // is exactly equal to the AES block size (16 bytes).
      if (size != EVP_CIPHER_CTX_block_size(ctx))
	throw Exception("TokenEncrypt: encrypt/decrypt data must be equal to AES block size");
      int outlen=0;
      if (!EVP_CipherInit_ex(ctx, nullptr, nullptr, nullptr, nullptr, -1))
	throw OpenSSLException("TokenEncrypt: EVP_CipherInit_ex[2] failed");
      if (!EVP_CipherUpdate(ctx, dest, &outlen, src, size))
	throw OpenSSLException("TokenEncrypt: EVP_CipherUpdate failed");
      // NOTE: we skip EVP_CipherFinal_ex because we are running in ECB mode without padding
      if (outlen != size)
	throw Exception("TokenEncrypt: unexpected output length=" + std::to_string(outlen) + " expected=" + std::to_string(size));
    }

  private:
    TokenEncrypt(const TokenEncrypt&) = delete;
    TokenEncrypt& operator=(const TokenEncrypt&) = delete;

    EVP_CIPHER_CTX* ctx;
  };

  struct TokenEncryptDecrypt
  {
    TokenEncryptDecrypt(const TokenEncrypt::Key& key)
      : encrypt(key, TokenEncrypt::ENCRYPT),
	decrypt(key, TokenEncrypt::DECRYPT)
    {
    }

    TokenEncrypt encrypt;
    TokenEncrypt decrypt;
  };
}

#endif