Skip to content
Snippets Groups Projects
  1. Apr 27, 2017
  2. Apr 25, 2017
  3. Apr 18, 2017
  4. Apr 16, 2017
  5. Apr 15, 2017
  6. Apr 13, 2017
  7. Apr 12, 2017
  8. Apr 10, 2017
  9. Apr 09, 2017
  10. Apr 07, 2017
  11. Apr 06, 2017
    • Thomas Faivre's avatar
      layers/ipsec: fix iv handling in special modes · d530da66
      Thomas Faivre authored
      
      There is a distinction to be made between the IV generated using
      CryptAlgo.generate_iv and the IV given as argument to the cipher mode in
      CryptAlgo.new_cipher.
      
      The first one is random string which is sent with the ESP packet (first
      bytes of the data field). The cipher mode only affects the size of the
      string in our implementation (some modes like GCM may implement a
      counter instead of pure random).
      
      And the second is a combination of the salt, the ESP iv and possibly other
      things. This can vary a lot depending on the mode.
      
      Add an attribute to CryptAlgo to give a function computing this "second"
      IV based on SA information.
      
      Signed-off-by: default avatarThomas Faivre <thomas.faivre@6wind.com>
      d530da66
    • Thomas Faivre's avatar
      Fix FlagValue dump behavior. · a0fd8688
      Thomas Faivre authored
      
      When running the command method on a packet, by default, the __repr__
      method of the value is used to dump a field.
      Although, the __repr__ method of the new FlagValue class is not a valid
      python syntax:
      
      In [2]: IP(flags=0).command()
      Out[2]: 'IP(flags=<Flag 0 ()>)'
      
      In [3]: IP(flags=<Flag 0 ()>)
        File "<ipython-input-3-1e8a4a1eb25a>", line 1
          IP(flags=<Flag 0 ()>)
                   ^
      SyntaxError: invalid syntax
      
      Also, when print a FlagValue with value of 0, flagrepr returns an empty
      string which can be confusing:
      
      In [1]: IP(flags=0)
      Out[1]: <IP  flags= |>
      
      Use int value instead in both cases.
      
      Fixes: fc6a4caa ("Introduce FlagValue(int) objects to represent FlagsField() values")
      Signed-off-by: default avatarThomas Faivre <thomas.faivre@6wind.com>
      a0fd8688
    • Thomas Faivre's avatar
      test/ipsec: add reference packet to check decryption · 8ea9b84b
      Thomas Faivre authored
      
      Currently, only internal encryption and decryption were tested but the
      implementation might not be the on it is supposed to be.
      
      Add reference packets generated using Ubuntu-16.04, iproute2 and ping:
       # ip -V
       ip utility, iproute2-ss151103
       # uname -a
       Linux router-vm 4.4.0-62-generic #83-Ubuntu SMP Wed Jan 18 14:10:15 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux
       # ping -V
       ping utility, iputils-s20160308
      
      Signed-off-by: default avatarThomas Faivre <thomas.faivre@6wind.com>
      8ea9b84b
    • Thomas Faivre's avatar
      tests: fix some AES-CCM tests · e430ef63
      Thomas Faivre authored
      
      In TLS, the AES-CCM test is commented out because CCM is not supported
      by cryptography. But the combined_modes_ccm keyword is made to skip
      these tests.
      
      In IPsec, some IPv4 tests are located in the IPv6 section. Also add the
      same combination of test for the AES-CCM as the other modes.
      
      Also, there is some errors in the key material as the *MUST*
      implementation uses a 16 bytes key and a 3 bytes nonce. Fix those
      lengths.
      
      Signed-off-by: default avatarThomas Faivre <thomas.faivre@6wind.com>
      e430ef63
    • Pierre Lalet's avatar
      Merge pull request #588 from guedou/Issue_#579 · 99381c38
      Pierre Lalet authored
      Support Raw IPv6 as PCAP linktype
      99381c38
    • Guillaume Valadon's avatar
      Merge pull request #595 from asigalas/issue-593 · 7fda8abd
      Guillaume Valadon authored
      Issue #593
      7fda8abd
    • Guillaume Valadon's avatar
      Merge pull request #594 from asigalas/patch-1 · 556741e5
      Guillaume Valadon authored
      Issue #592
      556741e5
Loading