Skip to content
Snippets Groups Projects
  1. Sep 29, 2017
  2. Jul 06, 2017
    • mtury's avatar
      [TLS] Major module overhaul (#542) · 72720872
      mtury authored
      * TLS module major overhaul
      
      * Clean TLS directory
      
      * TLS 1.3 packets and basic client automaton (+ session fixes)
      
      * Fix multiple key share entries
      
      * Convergence py3
      
      * Support features from cryptography v2.0
      
      * Validate CertificateVerify signatures
      
      * Small fix on TLS signature parsing
      
      * Small fixes in TLS module
      
      * Enhance Encrypted PMS support
      
      * Convergence py3 - print
      
      * Revert useless changes
      
      * Strengthen crypto lib validation
      72720872
  3. Apr 06, 2017
    • Thomas Faivre's avatar
      test/ipsec: add reference packet to check decryption · 8ea9b84b
      Thomas Faivre authored
      
      Currently, only internal encryption and decryption were tested but the
      implementation might not be the on it is supposed to be.
      
      Add reference packets generated using Ubuntu-16.04, iproute2 and ping:
       # ip -V
       ip utility, iproute2-ss151103
       # uname -a
       Linux router-vm 4.4.0-62-generic #83-Ubuntu SMP Wed Jan 18 14:10:15 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux
       # ping -V
       ping utility, iputils-s20160308
      
      Signed-off-by: default avatarThomas Faivre <thomas.faivre@6wind.com>
      8ea9b84b
    • Thomas Faivre's avatar
      tests: fix some AES-CCM tests · e430ef63
      Thomas Faivre authored
      
      In TLS, the AES-CCM test is commented out because CCM is not supported
      by cryptography. But the combined_modes_ccm keyword is made to skip
      these tests.
      
      In IPsec, some IPv4 tests are located in the IPv6 section. Also add the
      same combination of test for the AES-CCM as the other modes.
      
      Also, there is some errors in the key material as the *MUST*
      implementation uses a 16 bytes key and a 3 bytes nonce. Fix those
      lengths.
      
      Signed-off-by: default avatarThomas Faivre <thomas.faivre@6wind.com>
      e430ef63
  4. Mar 28, 2017
    • Thomas Faivre's avatar
      layers/ipsec: fix AH dissection · c73cdbc5
      Thomas Faivre authored
      
      The ICV size is defined by the authentication algorithm in the SA.
      it can be deduced from the payloadlen field but the padding len is
      unknown aswell so there is no way to find both without the SA.
      
      Assume everything in payloadlen is the ICV until the verification called
      from the SA. Fill padding when possible.
      
      Signed-off-by: default avatarThomas Faivre <thomas.faivre@6wind.com>
      c73cdbc5
  5. Mar 21, 2017
  6. Feb 07, 2017
  7. Jan 21, 2017
  8. Jan 06, 2017
  9. Oct 26, 2016
  10. Aug 01, 2016
    • Robin Jarry's avatar
      Fix individual modules import · 60579063
      Robin Jarry authored
      
      When using scapy as a third party library, we do not "benefit" from the
      loading routine that puts all symbols in the __builtin__ namespace. This
      implies that all modules must be "importable" without any errors for
      undefined symbols.
      
      This patch fixes importing every scapy module individually. Some
      circular imports were fixed (between inet6 and dhcp6).
      
      Most errors were detected by using pylint with the right configuration
      (scapy produces a *lot* of errors). Other errors were detected with the
      following shell script:
      
          export PYTHONPATH=".:$PYTHONPATH"
          for f in $(find scapy/ -name '*.py'); do
              f=${f%/__init__.py}
              module=$(echo ${f%.py} | sed 's,/,.,g')
              python -c "import $module; print $module"
          done
      
      Also, replace all implicit relative imports by absolute imports to avoid
      surprises with some python versions.
      
      Signed-off-by: default avatarRobin Jarry <robin.jarry@6wind.com>
      60579063
  11. Jun 17, 2014
  12. Mar 28, 2014
    • Robin Jarry's avatar
      layers: full implementation of ipsec (esp & ah) · f94c6745
      Robin Jarry authored
      
      This patch adds a full implementation of the IPSec layer in
      scapy/layers/ipsec.py. See the module's doc string for instructions.
      In order to support encryption/decryption and authentication, the
      pycrypto library is required. If not found, only the NULL/NULL
      algorithms will be available.
      
      (almost) complete test suite can be found in test/ipsec.uts and can
      be launched with:
      
        ./bin/UTscapy -m scapy/layers/ipsec.py -t test/ipsec.uts -f text -F
      
      Signed-off-by: default avatarRobin Jarry <robin.jarry@6wind.com>
      
      --HG--
      branch : ipsec
      f94c6745
Loading