summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/evp/bio_enc.c
diff options
context:
space:
mode:
authorryker <>1998-10-05 20:13:14 +0000
committerryker <>1998-10-05 20:13:14 +0000
commitaeeae06a79815dc190061534d47236cec09f9e32 (patch)
tree851692b9c2f9c04f077666855641900f19fdb217 /src/lib/libcrypto/evp/bio_enc.c
parenta4f79641824cbf9f60ca9d1168d1fcc46717a82a (diff)
downloadopenbsd-aeeae06a79815dc190061534d47236cec09f9e32.tar.gz
openbsd-aeeae06a79815dc190061534d47236cec09f9e32.tar.bz2
openbsd-aeeae06a79815dc190061534d47236cec09f9e32.zip
Import of SSLeay-0.9.0b with RSA and IDEA stubbed + OpenBSD build
functionality for shared libs. Note that routines such as sslv2_init and friends that use RSA will not work due to lack of RSA in this library. Needs documentation and help from ports for easy upgrade to full functionality where legally possible.
Diffstat (limited to 'src/lib/libcrypto/evp/bio_enc.c')
-rw-r--r--src/lib/libcrypto/evp/bio_enc.c423
1 files changed, 423 insertions, 0 deletions
diff --git a/src/lib/libcrypto/evp/bio_enc.c b/src/lib/libcrypto/evp/bio_enc.c
new file mode 100644
index 0000000000..6c30ddfc54
--- /dev/null
+++ b/src/lib/libcrypto/evp/bio_enc.c
@@ -0,0 +1,423 @@
1/* crypto/evp/bio_enc.c */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58
59#include <stdio.h>
60#include <errno.h>
61#include "cryptlib.h"
62#include "buffer.h"
63#include "evp.h"
64
65#ifndef NOPROTO
66static int enc_write(BIO *h,char *buf,int num);
67static int enc_read(BIO *h,char *buf,int size);
68/*static int enc_puts(BIO *h,char *str); */
69/*static int enc_gets(BIO *h,char *str,int size); */
70static long enc_ctrl(BIO *h,int cmd,long arg1,char *arg2);
71static int enc_new(BIO *h);
72static int enc_free(BIO *data);
73#else
74static int enc_write();
75static int enc_read();
76/*static int enc_puts(); */
77/*static int enc_gets(); */
78static long enc_ctrl();
79static int enc_new();
80static int enc_free();
81#endif
82
83#define ENC_BLOCK_SIZE (1024*4)
84
85typedef struct enc_struct
86 {
87 int buf_len;
88 int buf_off;
89 int cont; /* <= 0 when finished */
90 int finished;
91 int ok; /* bad decrypt */
92 EVP_CIPHER_CTX cipher;
93 char buf[ENC_BLOCK_SIZE+10];
94 } BIO_ENC_CTX;
95
96static BIO_METHOD methods_enc=
97 {
98 BIO_TYPE_CIPHER,"cipher",
99 enc_write,
100 enc_read,
101 NULL, /* enc_puts, */
102 NULL, /* enc_gets, */
103 enc_ctrl,
104 enc_new,
105 enc_free,
106 };
107
108BIO_METHOD *BIO_f_cipher()
109 {
110 return(&methods_enc);
111 }
112
113static int enc_new(bi)
114BIO *bi;
115 {
116 BIO_ENC_CTX *ctx;
117
118 ctx=(BIO_ENC_CTX *)Malloc(sizeof(BIO_ENC_CTX));
119 EVP_CIPHER_CTX_init(&ctx->cipher);
120 if (ctx == NULL) return(0);
121
122 ctx->buf_len=0;
123 ctx->buf_off=0;
124 ctx->cont=1;
125 ctx->finished=0;
126 ctx->ok=1;
127
128 bi->init=0;
129 bi->ptr=(char *)ctx;
130 bi->flags=0;
131 return(1);
132 }
133
134static int enc_free(a)
135BIO *a;
136 {
137 BIO_ENC_CTX *b;
138
139 if (a == NULL) return(0);
140 b=(BIO_ENC_CTX *)a->ptr;
141 EVP_CIPHER_CTX_cleanup(&(b->cipher));
142 memset(a->ptr,0,sizeof(BIO_ENC_CTX));
143 Free(a->ptr);
144 a->ptr=NULL;
145 a->init=0;
146 a->flags=0;
147 return(1);
148 }
149
150static int enc_read(b,out,outl)
151BIO *b;
152char *out;
153int outl;
154 {
155 int ret=0,i;
156 BIO_ENC_CTX *ctx;
157
158 if (out == NULL) return(0);
159 ctx=(BIO_ENC_CTX *)b->ptr;
160
161 if ((ctx == NULL) || (b->next_bio == NULL)) return(0);
162
163 /* First check if there are bytes decoded/encoded */
164 if (ctx->buf_len > 0)
165 {
166 i=ctx->buf_len-ctx->buf_off;
167 if (i > outl) i=outl;
168 memcpy(out,&(ctx->buf[ctx->buf_off]),i);
169 ret=i;
170 out+=i;
171 outl-=i;
172 ctx->buf_off+=i;
173 if (ctx->buf_len == ctx->buf_off)
174 {
175 ctx->buf_len=0;
176 ctx->buf_off=0;
177 }
178 }
179
180 /* At this point, we have room of outl bytes and an empty
181 * buffer, so we should read in some more. */
182
183 while (outl > 0)
184 {
185 if (ctx->cont <= 0) break;
186
187 /* read in at offset 8, read the EVP_Cipher
188 * documentation about why */
189 i=BIO_read(b->next_bio,&(ctx->buf[8]),ENC_BLOCK_SIZE);
190
191 if (i <= 0)
192 {
193 /* Should be continue next time we are called? */
194 if (!BIO_should_retry(b->next_bio))
195 {
196 ctx->cont=i;
197 i=EVP_CipherFinal(&(ctx->cipher),
198 (unsigned char *)ctx->buf,
199 &(ctx->buf_len));
200 ctx->ok=i;
201 ctx->buf_off=0;
202 }
203 else
204 ret=(ret == 0)?i:ret;
205 break;
206 }
207 else
208 {
209 EVP_CipherUpdate(&(ctx->cipher),
210 (unsigned char *)ctx->buf,&ctx->buf_len,
211 (unsigned char *)&(ctx->buf[8]),i);
212 ctx->cont=1;
213 }
214
215 if (ctx->buf_len <= outl)
216 i=ctx->buf_len;
217 else
218 i=outl;
219
220 if (i <= 0) break;
221 memcpy(out,ctx->buf,i);
222 ret+=i;
223 ctx->buf_off=i;
224 outl-=i;
225 out+=i;
226 }
227
228 BIO_clear_retry_flags(b);
229 BIO_copy_next_retry(b);
230 return((ret == 0)?ctx->cont:ret);
231 }
232
233static int enc_write(b,in,inl)
234BIO *b;
235char *in;
236int inl;
237 {
238 int ret=0,n,i;
239 BIO_ENC_CTX *ctx;
240
241 ctx=(BIO_ENC_CTX *)b->ptr;
242 ret=inl;
243
244 BIO_clear_retry_flags(b);
245 n=ctx->buf_len-ctx->buf_off;
246 while (n > 0)
247 {
248 i=BIO_write(b->next_bio,&(ctx->buf[ctx->buf_off]),n);
249 if (i <= 0)
250 {
251 BIO_copy_next_retry(b);
252 return(i);
253 }
254 ctx->buf_off+=i;
255 n-=i;
256 }
257 /* at this point all pending data has been written */
258
259 if ((in == NULL) || (inl <= 0)) return(0);
260
261 ctx->buf_off=0;
262 while (inl > 0)
263 {
264 n=(inl > ENC_BLOCK_SIZE)?ENC_BLOCK_SIZE:inl;
265 EVP_CipherUpdate(&(ctx->cipher),
266 (unsigned char *)ctx->buf,&ctx->buf_len,
267 (unsigned char *)in,n);
268 inl-=n;
269 in+=n;
270
271 ctx->buf_off=0;
272 n=ctx->buf_len;
273 while (n > 0)
274 {
275 i=BIO_write(b->next_bio,&(ctx->buf[ctx->buf_off]),n);
276 if (i <= 0)
277 {
278 BIO_copy_next_retry(b);
279 return(i);
280 }
281 n-=i;
282 ctx->buf_off+=i;
283 }
284 ctx->buf_len=0;
285 ctx->buf_off=0;
286 }
287 BIO_copy_next_retry(b);
288 return(ret);
289 }
290
291static long enc_ctrl(b,cmd,num,ptr)
292BIO *b;
293int cmd;
294long num;
295char *ptr;
296 {
297 BIO *dbio;
298 BIO_ENC_CTX *ctx,*dctx;
299 long ret=1;
300 int i;
301
302 ctx=(BIO_ENC_CTX *)b->ptr;
303
304 switch (cmd)
305 {
306 case BIO_CTRL_RESET:
307 ctx->ok=1;
308 ctx->finished=0;
309 EVP_CipherInit(&(ctx->cipher),NULL,NULL,NULL,
310 ctx->cipher.encrypt);
311 ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
312 break;
313 case BIO_CTRL_EOF: /* More to read */
314 if (ctx->cont <= 0)
315 ret=1;
316 else
317 ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
318 break;
319 case BIO_CTRL_WPENDING:
320 ret=ctx->buf_len-ctx->buf_off;
321 if (ret <= 0)
322 ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
323 break;
324 case BIO_CTRL_PENDING: /* More to read in buffer */
325 ret=ctx->buf_len-ctx->buf_off;
326 if (ret <= 0)
327 ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
328 break;
329 case BIO_CTRL_FLUSH:
330 /* do a final write */
331again:
332 while (ctx->buf_len != ctx->buf_off)
333 {
334 i=enc_write(b,NULL,0);
335 if (i < 0)
336 {
337 ret=i;
338 break;
339 }
340 }
341
342 if (!ctx->finished)
343 {
344 ctx->finished=1;
345 ctx->buf_off=0;
346 ret=EVP_CipherFinal(&(ctx->cipher),
347 (unsigned char *)ctx->buf,
348 &(ctx->buf_len));
349 ctx->ok=(int)ret;
350 if (ret <= 0) break;
351
352 /* push out the bytes */
353 goto again;
354 }
355
356 /* Finally flush the underlying BIO */
357 ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
358 break;
359 case BIO_C_GET_CIPHER_STATUS:
360 ret=(long)ctx->ok;
361 break;
362 case BIO_C_DO_STATE_MACHINE:
363 BIO_clear_retry_flags(b);
364 ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
365 BIO_copy_next_retry(b);
366 break;
367
368 case BIO_CTRL_DUP:
369 dbio=(BIO *)ptr;
370 dctx=(BIO_ENC_CTX *)dbio->ptr;
371 memcpy(&(dctx->cipher),&(ctx->cipher),sizeof(ctx->cipher));
372 dbio->init=1;
373 break;
374 default:
375 ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
376 break;
377 }
378 return(ret);
379 }
380
381/*
382void BIO_set_cipher_ctx(b,c)
383BIO *b;
384EVP_CIPHER_ctx *c;
385 {
386 if (b == NULL) return;
387
388 if ((b->callback != NULL) &&
389 (b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,0L) <= 0))
390 return;
391
392 b->init=1;
393 ctx=(BIO_ENC_CTX *)b->ptr;
394 memcpy(ctx->cipher,c,sizeof(EVP_CIPHER_CTX));
395
396 if (b->callback != NULL)
397 b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,1L);
398 }
399*/
400
401void BIO_set_cipher(b,c,k,i,e)
402BIO *b;
403EVP_CIPHER *c;
404unsigned char *k;
405unsigned char *i;
406int e;
407 {
408 BIO_ENC_CTX *ctx;
409
410 if (b == NULL) return;
411
412 if ((b->callback != NULL) &&
413 (b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,0L) <= 0))
414 return;
415
416 b->init=1;
417 ctx=(BIO_ENC_CTX *)b->ptr;
418 EVP_CipherInit(&(ctx->cipher),c,k,i,e);
419
420 if (b->callback != NULL)
421 b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,1L);
422 }
423