algorithms.sh revision 1.3 1 1.3 ozaki # $NetBSD: algorithms.sh,v 1.3 2017/04/27 08:06:59 ozaki-r Exp $
2 1.1 ozaki #
3 1.1 ozaki # Copyright (c) 2017 Internet Initiative Japan Inc.
4 1.1 ozaki # All rights reserved.
5 1.1 ozaki #
6 1.1 ozaki # Redistribution and use in source and binary forms, with or without
7 1.1 ozaki # modification, are permitted provided that the following conditions
8 1.1 ozaki # are met:
9 1.1 ozaki # 1. Redistributions of source code must retain the above copyright
10 1.1 ozaki # notice, this list of conditions and the following disclaimer.
11 1.1 ozaki # 2. Redistributions in binary form must reproduce the above copyright
12 1.1 ozaki # notice, this list of conditions and the following disclaimer in the
13 1.1 ozaki # documentation and/or other materials provided with the distribution.
14 1.1 ozaki #
15 1.1 ozaki # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16 1.1 ozaki # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17 1.1 ozaki # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18 1.1 ozaki # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19 1.1 ozaki # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20 1.1 ozaki # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21 1.1 ozaki # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22 1.1 ozaki # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23 1.1 ozaki # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24 1.1 ozaki # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25 1.1 ozaki # POSSIBILITY OF SUCH DAMAGE.
26 1.1 ozaki #
27 1.1 ozaki
28 1.1 ozaki ESP_ENCRYPTION_ALGORITHMS="des-cbc 3des-cbc null blowfish-cbc cast128-cbc \
29 1.1 ozaki des-deriv rijndael-cbc aes-ctr camellia-cbc aes-gcm-16 aes-gmac"
30 1.3 ozaki ESP_ENCRYPTION_ALGORITHMS_MINIMUM="null rijndael-cbc"
31 1.1 ozaki
32 1.1 ozaki # Valid key lengths of ESP encription algorithms
33 1.1 ozaki # des-cbc 64
34 1.1 ozaki # 3des-cbc 192
35 1.1 ozaki # null 0 to 2048 XXX only accept 0 length
36 1.1 ozaki # blowfish-cbc 40 to 448
37 1.1 ozaki # cast128-cbc 40 to 128
38 1.1 ozaki # des-deriv 64
39 1.1 ozaki # 3des-deriv 192 XXX not implemented
40 1.1 ozaki # rijndael-cbc 128/192/256
41 1.1 ozaki # twofish-cbc 0 to 256 XXX not supported
42 1.1 ozaki # aes-ctr 160/224/288
43 1.1 ozaki # camellia-cbc 128/192/256
44 1.1 ozaki # aes-gcm-16 160/224/288
45 1.1 ozaki # aes-gmac 160/224/288
46 1.1 ozaki valid_keys_descbc="64"
47 1.1 ozaki invalid_keys_descbc="56 72"
48 1.1 ozaki valid_keys_3descbc="192"
49 1.1 ozaki invalid_keys_3descbc="184 200"
50 1.1 ozaki #valid_keys_null="0 2048"
51 1.1 ozaki valid_keys_null="0"
52 1.1 ozaki invalid_keys_null="8"
53 1.1 ozaki valid_keys_blowfishcbc="40 448"
54 1.1 ozaki invalid_keys_blowfishcbc="32 456"
55 1.1 ozaki valid_keys_cast128cbc="40 128"
56 1.1 ozaki invalid_keys_cast128cbc="32 136"
57 1.1 ozaki valid_keys_desderiv="64"
58 1.1 ozaki invalid_keys_desderiv="56 72"
59 1.1 ozaki #valid_keys_3desderiv="192"
60 1.1 ozaki #invalid_keys_3desderiv="184 200"
61 1.1 ozaki valid_keys_rijndaelcbc="128 192 256"
62 1.1 ozaki invalid_keys_rijndaelcbc="120 136 184 200 248 264"
63 1.1 ozaki #valid_keys_twofishcbc="0 256"
64 1.1 ozaki #invalid_keys_twofishcbc="264"
65 1.1 ozaki valid_keys_aesctr="160 224 288"
66 1.1 ozaki invalid_keys_aesctr="152 168 216 232 280 296"
67 1.1 ozaki valid_keys_camelliacbc="128 192 256"
68 1.1 ozaki invalid_keys_camelliacbc="120 136 184 200 248 264"
69 1.1 ozaki valid_keys_aesgcm16="160 224 288"
70 1.1 ozaki invalid_keys_aesgcm16="152 168 216 232 280 296"
71 1.1 ozaki valid_keys_aesgmac="160 224 288"
72 1.1 ozaki invalid_keys_aesgmac="152 168 216 232 280 296"
73 1.1 ozaki
74 1.1 ozaki AH_AUTHENTICATION_ALGORITHMS="hmac-md5 hmac-sha1 keyed-md5 keyed-sha1 null \
75 1.1 ozaki hmac-sha256 hmac-sha384 hmac-sha512 hmac-ripemd160 aes-xcbc-mac"
76 1.2 ozaki AH_AUTHENTICATION_ALGORITHMS_MINIMUM="null hmac-sha512"
77 1.1 ozaki
78 1.1 ozaki # Valid key lengths of AH authentication algorithms
79 1.1 ozaki # hmac-md5 128
80 1.1 ozaki # hmac-sha1 160
81 1.1 ozaki # keyed-md5 128
82 1.1 ozaki # keyed-sha1 160
83 1.1 ozaki # null 0 to 2048
84 1.1 ozaki # hmac-sha256 256
85 1.1 ozaki # hmac-sha384 384
86 1.1 ozaki # hmac-sha512 512
87 1.1 ozaki # hmac-ripemd160 160
88 1.1 ozaki # aes-xcbc-mac 128
89 1.1 ozaki # tcp-md5 8 to 640 XXX not enabled in rump kernels
90 1.1 ozaki valid_keys_hmacmd5="128"
91 1.1 ozaki invalid_keys_hmacmd5="120 136"
92 1.1 ozaki valid_keys_hmacsha1="160"
93 1.1 ozaki invalid_keys_hmacsha1="152 168"
94 1.1 ozaki valid_keys_keyedmd5="128"
95 1.1 ozaki invalid_keys_keyedmd5="120 136"
96 1.1 ozaki valid_keys_keyedsha1="160"
97 1.1 ozaki invalid_keys_keyedsha1="152 168"
98 1.1 ozaki #valid_keys_null="0 2048"
99 1.1 ozaki valid_keys_null="0"
100 1.1 ozaki invalid_keys_null="8"
101 1.1 ozaki valid_keys_hmacsha256="256"
102 1.1 ozaki invalid_keys_hmacsha256="248 264"
103 1.1 ozaki valid_keys_hmacsha384="384"
104 1.1 ozaki invalid_keys_hmacsha384="376 392"
105 1.1 ozaki valid_keys_hmacsha512="512"
106 1.1 ozaki invalid_keys_hmacsha512="504 520"
107 1.1 ozaki valid_keys_hmacripemd160="160"
108 1.1 ozaki invalid_keys_hmacripemd160="152 168"
109 1.1 ozaki valid_keys_aesxcbcmac="128"
110 1.1 ozaki invalid_keys_aesxcbcmac="120 136"
111 1.1 ozaki #valid_keys_tcpmd5="8 640"
112 1.1 ozaki #invalid_keys_tcpmd5="648"
113 1.1 ozaki
114 1.1 ozaki get_one_valid_keylen()
115 1.1 ozaki {
116 1.1 ozaki local algo=$1
117 1.1 ozaki local _algo=$(echo $algo | sed 's/-//g')
118 1.1 ozaki local len=
119 1.1 ozaki local keylengths=
120 1.1 ozaki
121 1.1 ozaki eval keylengths="\$valid_keys_${_algo}"
122 1.1 ozaki
123 1.1 ozaki for len in $(echo $keylengths); do
124 1.1 ozaki break;
125 1.1 ozaki done
126 1.1 ozaki
127 1.1 ozaki echo $len
128 1.1 ozaki }
129 1.1 ozaki
130 1.1 ozaki get_valid_keylengths()
131 1.1 ozaki {
132 1.1 ozaki local algo=$1
133 1.1 ozaki local _algo=$(echo $algo | sed 's/-//g')
134 1.1 ozaki
135 1.1 ozaki eval keylengths="\$valid_keys_${_algo}"
136 1.1 ozaki echo $keylengths
137 1.1 ozaki }
138 1.1 ozaki
139 1.1 ozaki get_invalid_keylengths()
140 1.1 ozaki {
141 1.1 ozaki local algo=$1
142 1.1 ozaki local _algo=$(echo $algo | sed 's/-//g')
143 1.1 ozaki
144 1.1 ozaki eval keylengths="\$invalid_keys_${_algo}"
145 1.1 ozaki echo $keylengths
146 1.1 ozaki }
147 1.1 ozaki
148 1.1 ozaki generate_key()
149 1.1 ozaki {
150 1.1 ozaki local keylen=$(($1 / 8))
151 1.1 ozaki local key=
152 1.1 ozaki
153 1.1 ozaki while [ $keylen -gt 0 ]; do
154 1.1 ozaki key="${key}a"
155 1.1 ozaki keylen=$((keylen - 1))
156 1.1 ozaki done
157 1.1 ozaki if [ ! -z "$key" ]; then
158 1.1 ozaki key="\"$key\""
159 1.1 ozaki fi
160 1.1 ozaki
161 1.1 ozaki echo $key
162 1.1 ozaki }
163