summaryrefslogtreecommitdiff
path: root/lib/net/ssh/transport/cipher_factory.rb
blob: 7a3d9f6c1405ae62790ae0f567253b82b68cc76f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
require 'openssl'
require 'net/ssh/transport/ctr.rb'
require 'net/ssh/transport/key_expander'
require 'net/ssh/transport/identity_cipher'

module Net 
  module SSH 
    module Transport

      # Implements a factory of OpenSSL cipher algorithms.
      class CipherFactory
        # Maps the SSH name of a cipher to it's corresponding OpenSSL name
        SSH_TO_OSSL = {
          "3des-cbc"                    => "des-ede3-cbc",
          "blowfish-cbc"                => "bf-cbc",
          "aes256-cbc"                  => "aes-256-cbc",
          "aes192-cbc"                  => "aes-192-cbc",
          "aes128-cbc"                  => "aes-128-cbc",
          "idea-cbc"                    => "idea-cbc",
          "cast128-cbc"                 => "cast-cbc",
          "rijndael-cbc@lysator.liu.se" => "aes-256-cbc",
          "arcfour128"                  => "rc4",
          "arcfour256"                  => "rc4",
          "arcfour512"                  => "rc4",
          "arcfour"                     => "rc4",
    
          "3des-ctr"                    => "des-ede3",
          "blowfish-ctr"                => "bf-ecb",
    
          "aes256-ctr"                  => "aes-256-ctr",
          "aes192-ctr"                  => "aes-192-ctr",
          "aes128-ctr"                  => "aes-128-ctr",
          "cast128-ctr"                 => "cast5-ecb",
    
          "none"                        => "none"
        }
    
        # Ruby's OpenSSL bindings always return a key length of 16 for RC4 ciphers
        # resulting in the error: OpenSSL::CipherError: key length too short.
        # The following ciphers will override this key length.
        KEY_LEN_OVERRIDE = {
          "arcfour256"                  => 32,
          "arcfour512"                  => 64
        }
    
        # Returns true if the underlying OpenSSL library supports the given cipher,
        # and false otherwise.
        def self.supported?(name)
          ossl_name = SSH_TO_OSSL[name] or raise NotImplementedError, "unimplemented cipher `#{name}'"
          return true if ossl_name == "none"
          return OpenSSL::Cipher.ciphers.include?(ossl_name)
        end
    
        # Retrieves a new instance of the named algorithm. The new instance
        # will be initialized using an iv and key generated from the given
        # iv, key, shared, hash and digester values. Additionally, the
        # cipher will be put into encryption or decryption mode, based on the
        # value of the +encrypt+ parameter.
        def self.get(name, options={})
          ossl_name = SSH_TO_OSSL[name] or raise NotImplementedError, "unimplemented cipher `#{name}'"
          return IdentityCipher if ossl_name == "none"
          cipher = OpenSSL::Cipher.new(ossl_name)
    
          cipher.send(options[:encrypt] ? :encrypt : :decrypt)
    
          cipher.padding = 0
    
          if name =~ /-ctr(@openssh.org)?$/
            if ossl_name !~ /-ctr/
              cipher.extend(Net::SSH::Transport::CTR)
            else
              cipher = Net::SSH::Transport::OpenSSLAESCTR.new(cipher)
            end
          end
          cipher.iv = Net::SSH::Transport::KeyExpander.expand_key(cipher.iv_len, options[:iv], options) if ossl_name != "rc4"
    
          key_len = KEY_LEN_OVERRIDE[name] || cipher.key_len
          cipher.key_len = key_len
          cipher.key = Net::SSH::Transport::KeyExpander.expand_key(key_len, options[:key], options)
          cipher.update(" " * 1536) if (ossl_name == "rc4" && name != "arcfour")
    
          return cipher
        end
    
        # Returns a two-element array containing the [ key-length,
        # block-size ] for the named cipher algorithm. If the cipher
        # algorithm is unknown, or is "none", 0 is returned for both elements
        # of the tuple.
        # if :iv_len option is supplied the third return value will be ivlen
        def self.get_lengths(name, options = {})
          ossl_name = SSH_TO_OSSL[name]
          if ossl_name.nil? || ossl_name == "none"
            result = [0, 0]
            result << 0 if options[:iv_len]
          else
            cipher = OpenSSL::Cipher.new(ossl_name)
            key_len = KEY_LEN_OVERRIDE[name] || cipher.key_len
            cipher.key_len = key_len
    
            block_size =
              case ossl_name
              when "rc4"
                8
              when /\-ctr/
                Net::SSH::Transport::OpenSSLAESCTR.block_size
              else
                cipher.block_size
              end
    
            result = [key_len, block_size]
            result << cipher.iv_len if options[:iv_len]
          end
          result
        end
      end

end; end; end