Go to the documentation of this file.
43 const char *
aes_chacha =
"AES-128-CBC:CHACHA20-POLY1305";
51 const char *label,
size_t label_size,
52 void *ekm,
size_t ekm_size)
60 #if defined(ENABLE_DCO)
64 return "AES-192-GCM:AES-128-CBC:AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305";
86 if (have_chacha && have_blowfish)
119 bool have_chacha_mixed_case =
cipher_valid(
"ChaCha20-Poly1305");
120 if (have_chacha_mixed_case)
131 "ChaCha20-Poly1305:ChaCha20-Poly1305:ChaCha20-Poly1305:"
132 "ChaCha20-Poly1305:ChaCha20-Poly1305:ChaCha20-Poly1305:"
133 "ChaCha20-Poly1305", &
gc), NULL);
135 #ifdef ENABLE_CRYPTO_OPENSSL
137 &
gc),
"AES-128-GCM:AES-256-GCM");
152 const char *client_peer_info;
153 const char *peer_list;
155 client_peer_info =
"foo=bar\nIV_foo=y\nIV_NCP=2";
160 client_peer_info =
"foo=bar\nIV_foo=y\nIV_NCP=2\nIV_CIPHERS=BF-CBC";
162 assert_string_equal(
"BF-CBC", peer_list);
165 client_peer_info =
"IV_NCP=2\nIV_CIPHERS=BF-CBC:FOO-BAR\nIV_BAR=7";
167 assert_string_equal(
"BF-CBC:FOO-BAR", peer_list);
170 client_peer_info =
"IV_CIPHERS=BF-CBC:FOO-BAR\nIV_BAR=7";
172 assert_string_equal(
"BF-CBC:FOO-BAR", peer_list);
175 client_peer_info =
"IV_YOLO=NO\nIV_BAR=7";
177 assert_string_equal(
"", peer_list);
181 assert_string_equal(
"", peer_list);
193 const char *serverlist =
"CHACHA20_POLY1305:AES-128-GCM";
194 const char *serverlistbfcbc =
"CHACHA20_POLY1305:AES-128-GCM:BF-CBC:none";
197 "IV_YOLO=NO\nIV_BAR=7",
200 assert_ptr_equal(best_cipher, NULL);
204 "IV_YOLO=NO\nIV_BAR=7",
207 assert_string_equal(best_cipher,
"BF-CBC");
211 "IV_NCP=1\nIV_BAR=7",
214 assert_string_equal(best_cipher,
"AES-128-GCM");
219 assert_string_equal(best_cipher,
"AES-128-GCM");
223 assert_ptr_equal(best_cipher, NULL);
227 assert_string_equal(best_cipher,
"none");
230 assert_ptr_equal(best_cipher, NULL);
242 const char *serverlist =
"CHACHA20_POLY1305:AES-128-GCM:AES-256-GCM";
245 "IV_YOLO=NO\nIV_NCP=2\nIV_BAR=7",
248 assert_string_equal(best_cipher,
"AES-128-GCM");
252 "CHACHA20_POLY1305", &
gc);
254 assert_string_equal(best_cipher,
"CHACHA20_POLY1305");
261 assert_string_equal(best_cipher,
"AES-128-GCM");
265 "IV_FOO=7\nIV_CIPHERS=AES-256-GCM\nIV_NCP=2",
268 assert_string_equal(best_cipher,
"AES-256-GCM");
289 assert_string_equal(o.
ncp_ciphers,
"AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305");
293 assert_string_equal(o.
ncp_ciphers,
"AES-256-GCM:AES-128-GCM");
300 o.
ncp_ciphers =
"AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305";
311 o.
ncp_ciphers =
"BF-CBC:DEFAULT:AES-128-CBC:AES-256-CBC";
316 assert_string_equal(o.
ncp_ciphers,
"BF-CBC:AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305:AES-128-CBC:AES-256-CBC");
320 assert_string_equal(o.
ncp_ciphers,
"BF-CBC:AES-256-GCM:AES-128-GCM:AES-128-CBC:AES-256-CBC");
322 assert_string_equal(o.
ncp_ciphers_conf,
"BF-CBC:DEFAULT:AES-128-CBC:AES-256-CBC");
330 assert_string_equal(o.
ncp_ciphers,
"AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305:AES-128-CBC:AES-192-CBC");
334 assert_string_equal(o.
ncp_ciphers,
"AES-256-GCM:AES-128-GCM:AES-128-CBC:AES-192-CBC");
344 assert_string_equal(o.
ncp_ciphers,
"AES-192-GCM:AES-128-CBC:AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305");
348 assert_string_equal(o.
ncp_ciphers,
"AES-192-GCM:AES-128-CBC:AES-256-GCM:AES-128-GCM");
377 assert_string_equal(expanded,
" (AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305)");
378 assert_string_equal(expanded2,
" (AES-192-GCM:AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305)");
382 assert_string_equal(expanded,
" (AES-256-GCM:AES-128-GCM)");
383 assert_string_equal(expanded2,
" (AES-192-GCM:AES-256-GCM:AES-128-GCM)");
410 #if defined(ENABLE_CRYPTO_OPENSSL)
411 OpenSSL_add_all_algorithms();
413 return cmocka_run_group_tests(
ncp_tests, NULL, NULL);
static void test_poor_man(void **state)
const char * ncp_expanded_ciphers(struct options *o, struct gc_arena *gc)
returns the o->ncp_ciphers in brackets, e.g.
static bool cipher_valid(const char *ciphername)
Returns if the cipher is valid, based on the given cipher name.
static struct gc_arena gc_new(void)
char * mutate_ncp_cipher_list(const char *list, struct gc_arena *gc)
Check whether the ciphers in the supplied list are supported.
const char * dco_get_supported_ciphers(void)
const char * ncp_ciphers_conf
The original ncp_ciphers specified by the user in the configuration.
bool key_state_export_keying_material(struct tls_session *session, const char *label, size_t label_size, void *ekm, size_t ekm_size)
Keying Material Exporters [RFC 5705] allows additional keying material to be derived from existing TL...
const char * tls_peer_ncp_list(const char *peer_info, struct gc_arena *gc)
Returns the support cipher list from the peer according to the IV_NCP and IV_CIPHER values in peer_in...
static void test_check_ncp_ciphers_list(void **state)
bool tls_peer_supports_ncp(const char *peer_info)
Returns whether the client supports NCP either by announcing IV_NCP>=2 or the IV_CIPHERS list.
static void test_ncp_expand(void **state)
Security parameter state of a single session within a VPN tunnel.
static void test_ncp_best(void **state)
Garbage collection arena used to keep track of dynamically allocated memory.
static void openvpn_unit_test_setup(void)
Sets up the environment for unit tests like making both stderr and stdout non-buffered to avoid messa...
char * ncp_get_best_cipher(const char *server_list, const char *peer_info, const char *remote_cipher, struct gc_arena *gc)
Iterates through the ciphers in server_list and return the first cipher that is also supported by the...
static void test_extract_client_ciphers(void **state)
static void gc_free(struct gc_arena *a)
const struct CMUnitTest ncp_tests[]
void options_postprocess_setdefault_ncpciphers(struct options *o)
Checks for availibility of Chacha20-Poly1305 and sets the ncp_cipher to either AES-256-GCM:AES-128-GC...
static void test_ncp_default(void **state)