]> git.ipfire.org Git - people/ms/network.git/commitdiff
ipsec: security-policies: Make PRF command plural
authorMichael Tremer <michael.tremer@ipfire.org>
Sun, 16 Sep 2018 13:51:31 +0000 (15:51 +0200)
committerMichael Tremer <michael.tremer@ipfire.org>
Sun, 16 Sep 2018 13:53:25 +0000 (15:53 +0200)
References: #11446

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
config/vpn/security-policies/performance
config/vpn/security-policies/system
src/functions/functions.vpn-security-policies

index 30904b78b106f7d2ce71f4358e530bc5e998ac6d..6cac47cd30ad3901593a5318cd6645cb9b922697 100644 (file)
@@ -2,7 +2,7 @@ CIPHER="CHACHA20-POLY1305 AES128-GCM128 AES128-CBC"
 COMPRESSION="off"
 GROUP_TYPE="ECP521 ECP384 ECP256 ECP224 ECP192 CURVE25519"
 INTEGRITY="SHA256"
-PSEUDO_RANDOM_FUNCTION="SHA256"
+PSEUDO_RANDOM_FUNCTIONS="SHA256"
 KEY_EXCHANGE="ikev2"
 LIFETIME="28800"
 PFS="on"
index 3506f6892e568b3409b8b1bb603be682a05041ec..b304897d0e708730a63ed84e9a3e51ec02da173b 100644 (file)
@@ -2,7 +2,7 @@ KEY_EXCHANGE="ikev2"
 CIPHER="CHACHA20-POLY1305 AES256-GCM128 AES192-GCM128 AES128-GCM128 AES256-CBC AES192-CBC AES128-CBC"
 INTEGRITY="SHA512 SHA384 SHA256"
 GROUP_TYPE="MODP8192 MODP6144 MODP4096 MODP2048 ECP521 ECP384 ECP256 ECP224 ECP192 CURVE25519"
-PSEUDO_RANDOM_FUNCTION="SHA512 SHA384 SHA256"
+PSEUDO_RANDOM_FUNCTIONS="SHA512 SHA384 SHA256"
 LIFETIME="28800"
 PFS="on"
 COMPRESSION="off"
index 8b81850cbbf846c579aaf46ab706d79153a2da93..f8e719dc0e63bc437b13bc801b4d0fe541cc394e 100644 (file)
@@ -20,7 +20,7 @@
 ###############################################################################
 
 VPN_SECURITY_POLICIES_CONFIG_SETTINGS="CIPHER COMPRESSION GROUP_TYPE \
-       INTEGRITY PSEUDO_RANDOM_FUNCTION KEY_EXCHANGE LIFETIME PFS"
+       INTEGRITY PSEUDO_RANDOM_FUNCTIONS KEY_EXCHANGE LIFETIME PFS"
 VPN_SECURITY_POLICIES_READONLY="system performance"
 
 VPN_DEFAULT_SECURITY_POLICY="system"
@@ -175,7 +175,7 @@ declare -A CIPHER_TO_STRONGSWAN=(
        [NULL]="null"
 )
 
-declare -A VPN_SUPPORTED_PSEUDO_RANDOM_FUNCTION=(
+declare -A VPN_SUPPORTED_PSEUDO_RANDOM_FUNCTIONS=(
        [MD5]="MD5"
 
        # SHA
@@ -890,13 +890,13 @@ vpn_security_policies_pseudo_random_functions() {
                return ${EXIT_ERROR}
        fi
 
-       local PSEUDO_RANDOM_FUNCTION
-       if ! vpn_security_policies_read_config ${name} "PSEUDO_RANDOM_FUNCTION"; then
+       local PSEUDO_RANDOM_FUNCTIONS
+       if ! vpn_security_policies_read_config ${name} "PSEUDO_RANDOM_FUNCTIONS"; then
                return ${EXIT_ERROR}
        fi
 
        # Remove duplicated entries to proceed the list safely
-       PSEUDO_RANDOM_FUNCTION="$(list_unique ${PSEUDO_RANDOM_FUNCTION})"
+       PSEUDO_RANDOM_FUNCTIONS="$(list_unique ${PSEUDO_RANDOM_FUNCTIONS})"
 
        local prfs_added
        local prfs_removed
@@ -940,7 +940,7 @@ vpn_security_policies_pseudo_random_functions() {
                        fi
                done
 
-               PSEUDO_RANDOM_FUNCTION="${prfs_set}"
+               PSEUDO_RANDOM_FUNCTIONS="${prfs_set}"
 
        # Perform incremental updates
        else
@@ -948,14 +948,14 @@ vpn_security_policies_pseudo_random_functions() {
 
                # Perform all removals
                for prf in ${prfs_removed}; do
-                       if ! list_remove PSEUDO_RANDOM_FUNCTION "${prf}"; then
+                       if ! list_remove PSEUDO_RANDOM_FUNCTIONS "${prf}"; then
                                warning "${prf} was not on the list and could not be removed"
                        fi
                done
 
                for prf in ${prfs_added}; do
                        if vpn_security_policies_pseudo_random_function_supported "${prf}"; then
-                               if ! list_append_unique PSEUDO_RANDOM_FUNCTION "${prf}"; then
+                               if ! list_append_unique PSEUDO_RANDOM_FUNCTIONS "${prf}"; then
                                        warning "${prf} is already on the list"
                                fi
                        else
@@ -965,19 +965,19 @@ vpn_security_policies_pseudo_random_functions() {
        fi
 
        # Check if the list contain at least one valid value
-       if list_is_empty PSEUDO_RANDOM_FUNCTION; then
+       if list_is_empty PSEUDO_RANDOM_FUNCTIONS; then
                error "Cannot save an empty list of pseudo random functions"
                return ${EXIT_ERROR}
        fi
 
        # Save everything
-       if ! vpn_security_policies_write_config_key "${name}" "PSEUDO_RANDOM_FUNCTION" "${PSEUDO_RANDOM_FUNCTION}"; then
+       if ! vpn_security_policies_write_config_key "${name}" "PSEUDO_RANDOM_FUNCTIONS" "${PSEUDO_RANDOM_FUNCTIONS}"; then
                log ERROR "The changes for the VPN security policy ${name} could not be written"
        fi
 
        cli_headline 1 "Current pseudo random function list for ${name}:"
-       for prf in ${PSEUDO_RANDOM_FUNCTION}; do
-               cli_print_fmt1 1 "${prf}" "${VPN_SUPPORTED_PSEUDO_RANDOM_FUNCTION[${prf}]}"
+       for prf in ${PSEUDO_RANDOM_FUNCTIONS}; do
+               cli_print_fmt1 1 "${prf}" "${VPN_SUPPORTED_PSEUDO_RANDOM_FUNCTIONS[${prf}]}"
        done
 }
 
@@ -1154,7 +1154,7 @@ vpn_security_policies_integrity_supported() {
 vpn_security_policies_pseudo_random_function_supported() {
        local prf="${1}"
 
-       list_match "${prf}" ${!VPN_SUPPORTED_PSEUDO_RANDOM_FUNCTION[@]}
+       list_match "${prf}" ${!VPN_SUPPORTED_PSEUDO_RANDOM_FUNCTIONS[@]}
 }
 
 vpn_security_policies_cipher_is_aead() {
@@ -1223,7 +1223,7 @@ _vpn_security_policies_make_ike_proposal() {
 
                if vpn_security_policies_cipher_is_aead "${cipher}"; then
                        local prf
-                       for prf in ${PSEUDO_RANDOM_FUNCTION}; do
+                       for prf in ${PSEUDO_RANDOM_FUNCTIONS}; do
                                local _prf="${PSEUDO_RANDOM_FUNCTION_TO_STRONGSWAN[${prf}]}"
 
                                if ! isset _prf; then