diff options
author | markus <> | 2002-09-05 12:51:50 +0000 |
---|---|---|
committer | markus <> | 2002-09-05 12:51:50 +0000 |
commit | 15b5d84f9da2ce4bfae8580e56e34a859f74ad71 (patch) | |
tree | bf939e82d7fd73cc8a01cf6959002209972091bc /src/lib/libcrypto/evp | |
parent | 027351f729b9e837200dae6e1520cda6577ab930 (diff) | |
download | openbsd-15b5d84f9da2ce4bfae8580e56e34a859f74ad71.tar.gz openbsd-15b5d84f9da2ce4bfae8580e56e34a859f74ad71.tar.bz2 openbsd-15b5d84f9da2ce4bfae8580e56e34a859f74ad71.zip |
import openssl-0.9.7-beta1
Diffstat (limited to 'src/lib/libcrypto/evp')
41 files changed, 2403 insertions, 1735 deletions
diff --git a/src/lib/libcrypto/evp/bio_b64.c b/src/lib/libcrypto/evp/bio_b64.c index 73172b9a07..f12eac1b55 100644 --- a/src/lib/libcrypto/evp/bio_b64.c +++ b/src/lib/libcrypto/evp/bio_b64.c | |||
@@ -59,27 +59,17 @@ | |||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include <errno.h> | 60 | #include <errno.h> |
61 | #include "cryptlib.h" | 61 | #include "cryptlib.h" |
62 | #include "buffer.h" | 62 | #include <openssl/buffer.h> |
63 | #include "evp.h" | 63 | #include <openssl/evp.h> |
64 | 64 | ||
65 | #ifndef NOPROTO | 65 | static int b64_write(BIO *h, const char *buf, int num); |
66 | static int b64_write(BIO *h,char *buf,int num); | 66 | static int b64_read(BIO *h, char *buf, int size); |
67 | static int b64_read(BIO *h,char *buf,int size); | 67 | /*static int b64_puts(BIO *h, const char *str); */ |
68 | /*static int b64_puts(BIO *h,char *str); */ | 68 | /*static int b64_gets(BIO *h, char *str, int size); */ |
69 | /*static int b64_gets(BIO *h,char *str,int size); */ | 69 | static long b64_ctrl(BIO *h, int cmd, long arg1, void *arg2); |
70 | static long b64_ctrl(BIO *h,int cmd,long arg1,char *arg2); | ||
71 | static int b64_new(BIO *h); | 70 | static int b64_new(BIO *h); |
72 | static int b64_free(BIO *data); | 71 | static int b64_free(BIO *data); |
73 | #else | 72 | static long b64_callback_ctrl(BIO *h,int cmd,bio_info_cb *fp); |
74 | static int b64_write(); | ||
75 | static int b64_read(); | ||
76 | /*static int b64_puts(); */ | ||
77 | /*static int b64_gets(); */ | ||
78 | static long b64_ctrl(); | ||
79 | static int b64_new(); | ||
80 | static int b64_free(); | ||
81 | #endif | ||
82 | |||
83 | #define B64_BLOCK_SIZE 1024 | 73 | #define B64_BLOCK_SIZE 1024 |
84 | #define B64_BLOCK_SIZE2 768 | 74 | #define B64_BLOCK_SIZE2 768 |
85 | #define B64_NONE 0 | 75 | #define B64_NONE 0 |
@@ -111,19 +101,19 @@ static BIO_METHOD methods_b64= | |||
111 | b64_ctrl, | 101 | b64_ctrl, |
112 | b64_new, | 102 | b64_new, |
113 | b64_free, | 103 | b64_free, |
104 | b64_callback_ctrl, | ||
114 | }; | 105 | }; |
115 | 106 | ||
116 | BIO_METHOD *BIO_f_base64() | 107 | BIO_METHOD *BIO_f_base64(void) |
117 | { | 108 | { |
118 | return(&methods_b64); | 109 | return(&methods_b64); |
119 | } | 110 | } |
120 | 111 | ||
121 | static int b64_new(bi) | 112 | static int b64_new(BIO *bi) |
122 | BIO *bi; | ||
123 | { | 113 | { |
124 | BIO_B64_CTX *ctx; | 114 | BIO_B64_CTX *ctx; |
125 | 115 | ||
126 | ctx=(BIO_B64_CTX *)Malloc(sizeof(BIO_B64_CTX)); | 116 | ctx=(BIO_B64_CTX *)OPENSSL_malloc(sizeof(BIO_B64_CTX)); |
127 | if (ctx == NULL) return(0); | 117 | if (ctx == NULL) return(0); |
128 | 118 | ||
129 | ctx->buf_len=0; | 119 | ctx->buf_len=0; |
@@ -140,21 +130,17 @@ BIO *bi; | |||
140 | return(1); | 130 | return(1); |
141 | } | 131 | } |
142 | 132 | ||
143 | static int b64_free(a) | 133 | static int b64_free(BIO *a) |
144 | BIO *a; | ||
145 | { | 134 | { |
146 | if (a == NULL) return(0); | 135 | if (a == NULL) return(0); |
147 | Free(a->ptr); | 136 | OPENSSL_free(a->ptr); |
148 | a->ptr=NULL; | 137 | a->ptr=NULL; |
149 | a->init=0; | 138 | a->init=0; |
150 | a->flags=0; | 139 | a->flags=0; |
151 | return(1); | 140 | return(1); |
152 | } | 141 | } |
153 | 142 | ||
154 | static int b64_read(b,out,outl) | 143 | static int b64_read(BIO *b, char *out, int outl) |
155 | BIO *b; | ||
156 | char *out; | ||
157 | int outl; | ||
158 | { | 144 | { |
159 | int ret=0,i,ii,j,k,x,n,num,ret_code=0; | 145 | int ret=0,i,ii,j,k,x,n,num,ret_code=0; |
160 | BIO_B64_CTX *ctx; | 146 | BIO_B64_CTX *ctx; |
@@ -253,8 +239,8 @@ int outl; | |||
253 | &(ctx->tmp[0])); | 239 | &(ctx->tmp[0])); |
254 | for (x=0; x < i; x++) | 240 | for (x=0; x < i; x++) |
255 | ctx->tmp[x]=p[x]; | 241 | ctx->tmp[x]=p[x]; |
256 | EVP_DecodeInit(&ctx->base64); | ||
257 | } | 242 | } |
243 | EVP_DecodeInit(&ctx->base64); | ||
258 | ctx->start=0; | 244 | ctx->start=0; |
259 | break; | 245 | break; |
260 | } | 246 | } |
@@ -354,10 +340,7 @@ int outl; | |||
354 | return((ret == 0)?ret_code:ret); | 340 | return((ret == 0)?ret_code:ret); |
355 | } | 341 | } |
356 | 342 | ||
357 | static int b64_write(b,in,inl) | 343 | static int b64_write(BIO *b, const char *in, int inl) |
358 | BIO *b; | ||
359 | char *in; | ||
360 | int inl; | ||
361 | { | 344 | { |
362 | int ret=inl,n,i; | 345 | int ret=inl,n,i; |
363 | BIO_B64_CTX *ctx; | 346 | BIO_B64_CTX *ctx; |
@@ -387,10 +370,11 @@ int inl; | |||
387 | n-=i; | 370 | n-=i; |
388 | } | 371 | } |
389 | /* at this point all pending data has been written */ | 372 | /* at this point all pending data has been written */ |
373 | ctx->buf_off=0; | ||
374 | ctx->buf_len=0; | ||
390 | 375 | ||
391 | if ((in == NULL) || (inl <= 0)) return(0); | 376 | if ((in == NULL) || (inl <= 0)) return(0); |
392 | 377 | ||
393 | ctx->buf_off=0; | ||
394 | while (inl > 0) | 378 | while (inl > 0) |
395 | { | 379 | { |
396 | n=(inl > B64_BLOCK_SIZE)?B64_BLOCK_SIZE:inl; | 380 | n=(inl > B64_BLOCK_SIZE)?B64_BLOCK_SIZE:inl; |
@@ -400,14 +384,20 @@ int inl; | |||
400 | if (ctx->tmp_len > 0) | 384 | if (ctx->tmp_len > 0) |
401 | { | 385 | { |
402 | n=3-ctx->tmp_len; | 386 | n=3-ctx->tmp_len; |
387 | /* There's a teoretical possibility for this */ | ||
388 | if (n > inl) | ||
389 | n=inl; | ||
403 | memcpy(&(ctx->tmp[ctx->tmp_len]),in,n); | 390 | memcpy(&(ctx->tmp[ctx->tmp_len]),in,n); |
404 | ctx->tmp_len+=n; | 391 | ctx->tmp_len+=n; |
405 | n=ctx->tmp_len; | 392 | if (ctx->tmp_len < 3) |
406 | if (n < 3) | ||
407 | break; | 393 | break; |
408 | ctx->buf_len=EVP_EncodeBlock( | 394 | ctx->buf_len=EVP_EncodeBlock( |
409 | (unsigned char *)ctx->buf, | 395 | (unsigned char *)ctx->buf, |
410 | (unsigned char *)ctx->tmp,n); | 396 | (unsigned char *)ctx->tmp, |
397 | ctx->tmp_len); | ||
398 | /* Since we're now done using the temporary | ||
399 | buffer, the length should be 0'd */ | ||
400 | ctx->tmp_len=0; | ||
411 | } | 401 | } |
412 | else | 402 | else |
413 | { | 403 | { |
@@ -451,11 +441,7 @@ int inl; | |||
451 | return(ret); | 441 | return(ret); |
452 | } | 442 | } |
453 | 443 | ||
454 | static long b64_ctrl(b,cmd,num,ptr) | 444 | static long b64_ctrl(BIO *b, int cmd, long num, void *ptr) |
455 | BIO *b; | ||
456 | int cmd; | ||
457 | long num; | ||
458 | char *ptr; | ||
459 | { | 445 | { |
460 | BIO_B64_CTX *ctx; | 446 | BIO_B64_CTX *ctx; |
461 | long ret=1; | 447 | long ret=1; |
@@ -479,7 +465,8 @@ char *ptr; | |||
479 | break; | 465 | break; |
480 | case BIO_CTRL_WPENDING: /* More to write in buffer */ | 466 | case BIO_CTRL_WPENDING: /* More to write in buffer */ |
481 | ret=ctx->buf_len-ctx->buf_off; | 467 | ret=ctx->buf_len-ctx->buf_off; |
482 | if ((ret == 0) && (ctx->base64.num != 0)) | 468 | if ((ret == 0) && (ctx->encode != B64_NONE) |
469 | && (ctx->base64.num != 0)) | ||
483 | ret=1; | 470 | ret=1; |
484 | else if (ret <= 0) | 471 | else if (ret <= 0) |
485 | ret=BIO_ctrl(b->next_bio,cmd,num,ptr); | 472 | ret=BIO_ctrl(b->next_bio,cmd,num,ptr); |
@@ -514,7 +501,7 @@ again: | |||
514 | goto again; | 501 | goto again; |
515 | } | 502 | } |
516 | } | 503 | } |
517 | else if (ctx->base64.num != 0) | 504 | else if (ctx->encode != B64_NONE && ctx->base64.num != 0) |
518 | { | 505 | { |
519 | ctx->buf_off=0; | 506 | ctx->buf_off=0; |
520 | EVP_EncodeFinal(&(ctx->base64), | 507 | EVP_EncodeFinal(&(ctx->base64), |
@@ -545,3 +532,17 @@ again: | |||
545 | return(ret); | 532 | return(ret); |
546 | } | 533 | } |
547 | 534 | ||
535 | static long b64_callback_ctrl(BIO *b, int cmd, bio_info_cb *fp) | ||
536 | { | ||
537 | long ret=1; | ||
538 | |||
539 | if (b->next_bio == NULL) return(0); | ||
540 | switch (cmd) | ||
541 | { | ||
542 | default: | ||
543 | ret=BIO_callback_ctrl(b->next_bio,cmd,fp); | ||
544 | break; | ||
545 | } | ||
546 | return(ret); | ||
547 | } | ||
548 | |||
diff --git a/src/lib/libcrypto/evp/bio_enc.c b/src/lib/libcrypto/evp/bio_enc.c index 6c30ddfc54..64fb2353af 100644 --- a/src/lib/libcrypto/evp/bio_enc.c +++ b/src/lib/libcrypto/evp/bio_enc.c | |||
@@ -59,28 +59,19 @@ | |||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include <errno.h> | 60 | #include <errno.h> |
61 | #include "cryptlib.h" | 61 | #include "cryptlib.h" |
62 | #include "buffer.h" | 62 | #include <openssl/buffer.h> |
63 | #include "evp.h" | 63 | #include <openssl/evp.h> |
64 | 64 | ||
65 | #ifndef NOPROTO | 65 | static int enc_write(BIO *h, const char *buf, int num); |
66 | static int enc_write(BIO *h,char *buf,int num); | 66 | static int enc_read(BIO *h, char *buf, int size); |
67 | static int enc_read(BIO *h,char *buf,int size); | 67 | /*static int enc_puts(BIO *h, const char *str); */ |
68 | /*static int enc_puts(BIO *h,char *str); */ | 68 | /*static int enc_gets(BIO *h, char *str, int size); */ |
69 | /*static int enc_gets(BIO *h,char *str,int size); */ | 69 | static long enc_ctrl(BIO *h, int cmd, long arg1, void *arg2); |
70 | static long enc_ctrl(BIO *h,int cmd,long arg1,char *arg2); | ||
71 | static int enc_new(BIO *h); | 70 | static int enc_new(BIO *h); |
72 | static int enc_free(BIO *data); | 71 | static int enc_free(BIO *data); |
73 | #else | 72 | static long enc_callback_ctrl(BIO *h, int cmd, bio_info_cb *fps); |
74 | static int enc_write(); | ||
75 | static int enc_read(); | ||
76 | /*static int enc_puts(); */ | ||
77 | /*static int enc_gets(); */ | ||
78 | static long enc_ctrl(); | ||
79 | static int enc_new(); | ||
80 | static int enc_free(); | ||
81 | #endif | ||
82 | |||
83 | #define ENC_BLOCK_SIZE (1024*4) | 73 | #define ENC_BLOCK_SIZE (1024*4) |
74 | #define BUF_OFFSET EVP_MAX_BLOCK_LENGTH | ||
84 | 75 | ||
85 | typedef struct enc_struct | 76 | typedef struct enc_struct |
86 | { | 77 | { |
@@ -90,7 +81,10 @@ typedef struct enc_struct | |||
90 | int finished; | 81 | int finished; |
91 | int ok; /* bad decrypt */ | 82 | int ok; /* bad decrypt */ |
92 | EVP_CIPHER_CTX cipher; | 83 | EVP_CIPHER_CTX cipher; |
93 | char buf[ENC_BLOCK_SIZE+10]; | 84 | /* buf is larger than ENC_BLOCK_SIZE because EVP_DecryptUpdate |
85 | * can return up to a block more data than is presented to it | ||
86 | */ | ||
87 | char buf[ENC_BLOCK_SIZE+BUF_OFFSET+2]; | ||
94 | } BIO_ENC_CTX; | 88 | } BIO_ENC_CTX; |
95 | 89 | ||
96 | static BIO_METHOD methods_enc= | 90 | static BIO_METHOD methods_enc= |
@@ -103,21 +97,21 @@ static BIO_METHOD methods_enc= | |||
103 | enc_ctrl, | 97 | enc_ctrl, |
104 | enc_new, | 98 | enc_new, |
105 | enc_free, | 99 | enc_free, |
100 | enc_callback_ctrl, | ||
106 | }; | 101 | }; |
107 | 102 | ||
108 | BIO_METHOD *BIO_f_cipher() | 103 | BIO_METHOD *BIO_f_cipher(void) |
109 | { | 104 | { |
110 | return(&methods_enc); | 105 | return(&methods_enc); |
111 | } | 106 | } |
112 | 107 | ||
113 | static int enc_new(bi) | 108 | static int enc_new(BIO *bi) |
114 | BIO *bi; | ||
115 | { | 109 | { |
116 | BIO_ENC_CTX *ctx; | 110 | BIO_ENC_CTX *ctx; |
117 | 111 | ||
118 | ctx=(BIO_ENC_CTX *)Malloc(sizeof(BIO_ENC_CTX)); | 112 | ctx=(BIO_ENC_CTX *)OPENSSL_malloc(sizeof(BIO_ENC_CTX)); |
119 | EVP_CIPHER_CTX_init(&ctx->cipher); | ||
120 | if (ctx == NULL) return(0); | 113 | if (ctx == NULL) return(0); |
114 | EVP_CIPHER_CTX_init(&ctx->cipher); | ||
121 | 115 | ||
122 | ctx->buf_len=0; | 116 | ctx->buf_len=0; |
123 | ctx->buf_off=0; | 117 | ctx->buf_off=0; |
@@ -131,8 +125,7 @@ BIO *bi; | |||
131 | return(1); | 125 | return(1); |
132 | } | 126 | } |
133 | 127 | ||
134 | static int enc_free(a) | 128 | static int enc_free(BIO *a) |
135 | BIO *a; | ||
136 | { | 129 | { |
137 | BIO_ENC_CTX *b; | 130 | BIO_ENC_CTX *b; |
138 | 131 | ||
@@ -140,17 +133,14 @@ BIO *a; | |||
140 | b=(BIO_ENC_CTX *)a->ptr; | 133 | b=(BIO_ENC_CTX *)a->ptr; |
141 | EVP_CIPHER_CTX_cleanup(&(b->cipher)); | 134 | EVP_CIPHER_CTX_cleanup(&(b->cipher)); |
142 | memset(a->ptr,0,sizeof(BIO_ENC_CTX)); | 135 | memset(a->ptr,0,sizeof(BIO_ENC_CTX)); |
143 | Free(a->ptr); | 136 | OPENSSL_free(a->ptr); |
144 | a->ptr=NULL; | 137 | a->ptr=NULL; |
145 | a->init=0; | 138 | a->init=0; |
146 | a->flags=0; | 139 | a->flags=0; |
147 | return(1); | 140 | return(1); |
148 | } | 141 | } |
149 | 142 | ||
150 | static int enc_read(b,out,outl) | 143 | static int enc_read(BIO *b, char *out, int outl) |
151 | BIO *b; | ||
152 | char *out; | ||
153 | int outl; | ||
154 | { | 144 | { |
155 | int ret=0,i; | 145 | int ret=0,i; |
156 | BIO_ENC_CTX *ctx; | 146 | BIO_ENC_CTX *ctx; |
@@ -184,9 +174,9 @@ int outl; | |||
184 | { | 174 | { |
185 | if (ctx->cont <= 0) break; | 175 | if (ctx->cont <= 0) break; |
186 | 176 | ||
187 | /* read in at offset 8, read the EVP_Cipher | 177 | /* read in at IV offset, read the EVP_Cipher |
188 | * documentation about why */ | 178 | * documentation about why */ |
189 | i=BIO_read(b->next_bio,&(ctx->buf[8]),ENC_BLOCK_SIZE); | 179 | i=BIO_read(b->next_bio,&(ctx->buf[BUF_OFFSET]),ENC_BLOCK_SIZE); |
190 | 180 | ||
191 | if (i <= 0) | 181 | if (i <= 0) |
192 | { | 182 | { |
@@ -194,29 +184,37 @@ int outl; | |||
194 | if (!BIO_should_retry(b->next_bio)) | 184 | if (!BIO_should_retry(b->next_bio)) |
195 | { | 185 | { |
196 | ctx->cont=i; | 186 | ctx->cont=i; |
197 | i=EVP_CipherFinal(&(ctx->cipher), | 187 | i=EVP_CipherFinal_ex(&(ctx->cipher), |
198 | (unsigned char *)ctx->buf, | 188 | (unsigned char *)ctx->buf, |
199 | &(ctx->buf_len)); | 189 | &(ctx->buf_len)); |
200 | ctx->ok=i; | 190 | ctx->ok=i; |
201 | ctx->buf_off=0; | 191 | ctx->buf_off=0; |
202 | } | 192 | } |
203 | else | 193 | else |
194 | { | ||
204 | ret=(ret == 0)?i:ret; | 195 | ret=(ret == 0)?i:ret; |
205 | break; | 196 | break; |
197 | } | ||
206 | } | 198 | } |
207 | else | 199 | else |
208 | { | 200 | { |
209 | EVP_CipherUpdate(&(ctx->cipher), | 201 | EVP_CipherUpdate(&(ctx->cipher), |
210 | (unsigned char *)ctx->buf,&ctx->buf_len, | 202 | (unsigned char *)ctx->buf,&ctx->buf_len, |
211 | (unsigned char *)&(ctx->buf[8]),i); | 203 | (unsigned char *)&(ctx->buf[BUF_OFFSET]),i); |
212 | ctx->cont=1; | 204 | ctx->cont=1; |
205 | /* Note: it is possible for EVP_CipherUpdate to | ||
206 | * decrypt zero bytes because this is or looks like | ||
207 | * the final block: if this happens we should retry | ||
208 | * and either read more data or decrypt the final | ||
209 | * block | ||
210 | */ | ||
211 | if(ctx->buf_len == 0) continue; | ||
213 | } | 212 | } |
214 | 213 | ||
215 | if (ctx->buf_len <= outl) | 214 | if (ctx->buf_len <= outl) |
216 | i=ctx->buf_len; | 215 | i=ctx->buf_len; |
217 | else | 216 | else |
218 | i=outl; | 217 | i=outl; |
219 | |||
220 | if (i <= 0) break; | 218 | if (i <= 0) break; |
221 | memcpy(out,ctx->buf,i); | 219 | memcpy(out,ctx->buf,i); |
222 | ret+=i; | 220 | ret+=i; |
@@ -230,10 +228,7 @@ int outl; | |||
230 | return((ret == 0)?ctx->cont:ret); | 228 | return((ret == 0)?ctx->cont:ret); |
231 | } | 229 | } |
232 | 230 | ||
233 | static int enc_write(b,in,inl) | 231 | static int enc_write(BIO *b, const char *in, int inl) |
234 | BIO *b; | ||
235 | char *in; | ||
236 | int inl; | ||
237 | { | 232 | { |
238 | int ret=0,n,i; | 233 | int ret=0,n,i; |
239 | BIO_ENC_CTX *ctx; | 234 | BIO_ENC_CTX *ctx; |
@@ -288,16 +283,13 @@ int inl; | |||
288 | return(ret); | 283 | return(ret); |
289 | } | 284 | } |
290 | 285 | ||
291 | static long enc_ctrl(b,cmd,num,ptr) | 286 | static long enc_ctrl(BIO *b, int cmd, long num, void *ptr) |
292 | BIO *b; | ||
293 | int cmd; | ||
294 | long num; | ||
295 | char *ptr; | ||
296 | { | 287 | { |
297 | BIO *dbio; | 288 | BIO *dbio; |
298 | BIO_ENC_CTX *ctx,*dctx; | 289 | BIO_ENC_CTX *ctx,*dctx; |
299 | long ret=1; | 290 | long ret=1; |
300 | int i; | 291 | int i; |
292 | EVP_CIPHER_CTX **c_ctx; | ||
301 | 293 | ||
302 | ctx=(BIO_ENC_CTX *)b->ptr; | 294 | ctx=(BIO_ENC_CTX *)b->ptr; |
303 | 295 | ||
@@ -306,7 +298,7 @@ char *ptr; | |||
306 | case BIO_CTRL_RESET: | 298 | case BIO_CTRL_RESET: |
307 | ctx->ok=1; | 299 | ctx->ok=1; |
308 | ctx->finished=0; | 300 | ctx->finished=0; |
309 | EVP_CipherInit(&(ctx->cipher),NULL,NULL,NULL, | 301 | EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL, |
310 | ctx->cipher.encrypt); | 302 | ctx->cipher.encrypt); |
311 | ret=BIO_ctrl(b->next_bio,cmd,num,ptr); | 303 | ret=BIO_ctrl(b->next_bio,cmd,num,ptr); |
312 | break; | 304 | break; |
@@ -343,7 +335,7 @@ again: | |||
343 | { | 335 | { |
344 | ctx->finished=1; | 336 | ctx->finished=1; |
345 | ctx->buf_off=0; | 337 | ctx->buf_off=0; |
346 | ret=EVP_CipherFinal(&(ctx->cipher), | 338 | ret=EVP_CipherFinal_ex(&(ctx->cipher), |
347 | (unsigned char *)ctx->buf, | 339 | (unsigned char *)ctx->buf, |
348 | &(ctx->buf_len)); | 340 | &(ctx->buf_len)); |
349 | ctx->ok=(int)ret; | 341 | ctx->ok=(int)ret; |
@@ -364,7 +356,11 @@ again: | |||
364 | ret=BIO_ctrl(b->next_bio,cmd,num,ptr); | 356 | ret=BIO_ctrl(b->next_bio,cmd,num,ptr); |
365 | BIO_copy_next_retry(b); | 357 | BIO_copy_next_retry(b); |
366 | break; | 358 | break; |
367 | 359 | case BIO_C_GET_CIPHER_CTX: | |
360 | c_ctx=(EVP_CIPHER_CTX **)ptr; | ||
361 | (*c_ctx)= &(ctx->cipher); | ||
362 | b->init=1; | ||
363 | break; | ||
368 | case BIO_CTRL_DUP: | 364 | case BIO_CTRL_DUP: |
369 | dbio=(BIO *)ptr; | 365 | dbio=(BIO *)ptr; |
370 | dctx=(BIO_ENC_CTX *)dbio->ptr; | 366 | dctx=(BIO_ENC_CTX *)dbio->ptr; |
@@ -378,6 +374,20 @@ again: | |||
378 | return(ret); | 374 | return(ret); |
379 | } | 375 | } |
380 | 376 | ||
377 | static long enc_callback_ctrl(BIO *b, int cmd, bio_info_cb *fp) | ||
378 | { | ||
379 | long ret=1; | ||
380 | |||
381 | if (b->next_bio == NULL) return(0); | ||
382 | switch (cmd) | ||
383 | { | ||
384 | default: | ||
385 | ret=BIO_callback_ctrl(b->next_bio,cmd,fp); | ||
386 | break; | ||
387 | } | ||
388 | return(ret); | ||
389 | } | ||
390 | |||
381 | /* | 391 | /* |
382 | void BIO_set_cipher_ctx(b,c) | 392 | void BIO_set_cipher_ctx(b,c) |
383 | BIO *b; | 393 | BIO *b; |
@@ -398,26 +408,22 @@ EVP_CIPHER_ctx *c; | |||
398 | } | 408 | } |
399 | */ | 409 | */ |
400 | 410 | ||
401 | void BIO_set_cipher(b,c,k,i,e) | 411 | void BIO_set_cipher(BIO *b, const EVP_CIPHER *c, unsigned char *k, |
402 | BIO *b; | 412 | unsigned char *i, int e) |
403 | EVP_CIPHER *c; | ||
404 | unsigned char *k; | ||
405 | unsigned char *i; | ||
406 | int e; | ||
407 | { | 413 | { |
408 | BIO_ENC_CTX *ctx; | 414 | BIO_ENC_CTX *ctx; |
409 | 415 | ||
410 | if (b == NULL) return; | 416 | if (b == NULL) return; |
411 | 417 | ||
412 | if ((b->callback != NULL) && | 418 | if ((b->callback != NULL) && |
413 | (b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,0L) <= 0)) | 419 | (b->callback(b,BIO_CB_CTRL,(const char *)c,BIO_CTRL_SET,e,0L) <= 0)) |
414 | return; | 420 | return; |
415 | 421 | ||
416 | b->init=1; | 422 | b->init=1; |
417 | ctx=(BIO_ENC_CTX *)b->ptr; | 423 | ctx=(BIO_ENC_CTX *)b->ptr; |
418 | EVP_CipherInit(&(ctx->cipher),c,k,i,e); | 424 | EVP_CipherInit_ex(&(ctx->cipher),c,NULL, k,i,e); |
419 | 425 | ||
420 | if (b->callback != NULL) | 426 | if (b->callback != NULL) |
421 | b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,1L); | 427 | b->callback(b,BIO_CB_CTRL,(const char *)c,BIO_CTRL_SET,e,1L); |
422 | } | 428 | } |
423 | 429 | ||
diff --git a/src/lib/libcrypto/evp/bio_md.c b/src/lib/libcrypto/evp/bio_md.c index fa5fdc055b..c632dfb202 100644 --- a/src/lib/libcrypto/evp/bio_md.c +++ b/src/lib/libcrypto/evp/bio_md.c | |||
@@ -59,29 +59,20 @@ | |||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include <errno.h> | 60 | #include <errno.h> |
61 | #include "cryptlib.h" | 61 | #include "cryptlib.h" |
62 | #include "buffer.h" | 62 | #include <openssl/buffer.h> |
63 | #include "evp.h" | 63 | #include <openssl/evp.h> |
64 | 64 | ||
65 | /* BIO_put and BIO_get both add to the digest, | 65 | /* BIO_put and BIO_get both add to the digest, |
66 | * BIO_gets returns the digest */ | 66 | * BIO_gets returns the digest */ |
67 | 67 | ||
68 | #ifndef NOPROTO | 68 | static int md_write(BIO *h, char const *buf, int num); |
69 | static int md_write(BIO *h,char *buf,int num); | 69 | static int md_read(BIO *h, char *buf, int size); |
70 | static int md_read(BIO *h,char *buf,int size); | 70 | /*static int md_puts(BIO *h, const char *str); */ |
71 | /*static int md_puts(BIO *h,char *str); */ | 71 | static int md_gets(BIO *h, char *str, int size); |
72 | static int md_gets(BIO *h,char *str,int size); | 72 | static long md_ctrl(BIO *h, int cmd, long arg1, void *arg2); |
73 | static long md_ctrl(BIO *h,int cmd,long arg1,char *arg2); | ||
74 | static int md_new(BIO *h); | 73 | static int md_new(BIO *h); |
75 | static int md_free(BIO *data); | 74 | static int md_free(BIO *data); |
76 | #else | 75 | static long md_callback_ctrl(BIO *h,int cmd,bio_info_cb *fp); |
77 | static int md_write(); | ||
78 | static int md_read(); | ||
79 | /*static int md_puts(); */ | ||
80 | static int md_gets(); | ||
81 | static long md_ctrl(); | ||
82 | static int md_new(); | ||
83 | static int md_free(); | ||
84 | #endif | ||
85 | 76 | ||
86 | static BIO_METHOD methods_md= | 77 | static BIO_METHOD methods_md= |
87 | { | 78 | { |
@@ -93,19 +84,19 @@ static BIO_METHOD methods_md= | |||
93 | md_ctrl, | 84 | md_ctrl, |
94 | md_new, | 85 | md_new, |
95 | md_free, | 86 | md_free, |
87 | md_callback_ctrl, | ||
96 | }; | 88 | }; |
97 | 89 | ||
98 | BIO_METHOD *BIO_f_md() | 90 | BIO_METHOD *BIO_f_md(void) |
99 | { | 91 | { |
100 | return(&methods_md); | 92 | return(&methods_md); |
101 | } | 93 | } |
102 | 94 | ||
103 | static int md_new(bi) | 95 | static int md_new(BIO *bi) |
104 | BIO *bi; | ||
105 | { | 96 | { |
106 | EVP_MD_CTX *ctx; | 97 | EVP_MD_CTX *ctx; |
107 | 98 | ||
108 | ctx=(EVP_MD_CTX *)Malloc(sizeof(EVP_MD_CTX)); | 99 | ctx=EVP_MD_CTX_create(); |
109 | if (ctx == NULL) return(0); | 100 | if (ctx == NULL) return(0); |
110 | 101 | ||
111 | bi->init=0; | 102 | bi->init=0; |
@@ -114,27 +105,23 @@ BIO *bi; | |||
114 | return(1); | 105 | return(1); |
115 | } | 106 | } |
116 | 107 | ||
117 | static int md_free(a) | 108 | static int md_free(BIO *a) |
118 | BIO *a; | ||
119 | { | 109 | { |
120 | if (a == NULL) return(0); | 110 | if (a == NULL) return(0); |
121 | Free(a->ptr); | 111 | EVP_MD_CTX_destroy(a->ptr); |
122 | a->ptr=NULL; | 112 | a->ptr=NULL; |
123 | a->init=0; | 113 | a->init=0; |
124 | a->flags=0; | 114 | a->flags=0; |
125 | return(1); | 115 | return(1); |
126 | } | 116 | } |
127 | 117 | ||
128 | static int md_read(b,out,outl) | 118 | static int md_read(BIO *b, char *out, int outl) |
129 | BIO *b; | ||
130 | char *out; | ||
131 | int outl; | ||
132 | { | 119 | { |
133 | int ret=0; | 120 | int ret=0; |
134 | EVP_MD_CTX *ctx; | 121 | EVP_MD_CTX *ctx; |
135 | 122 | ||
136 | if (out == NULL) return(0); | 123 | if (out == NULL) return(0); |
137 | ctx=(EVP_MD_CTX *)b->ptr; | 124 | ctx=b->ptr; |
138 | 125 | ||
139 | if ((ctx == NULL) || (b->next_bio == NULL)) return(0); | 126 | if ((ctx == NULL) || (b->next_bio == NULL)) return(0); |
140 | 127 | ||
@@ -152,16 +139,13 @@ int outl; | |||
152 | return(ret); | 139 | return(ret); |
153 | } | 140 | } |
154 | 141 | ||
155 | static int md_write(b,in,inl) | 142 | static int md_write(BIO *b, const char *in, int inl) |
156 | BIO *b; | ||
157 | char *in; | ||
158 | int inl; | ||
159 | { | 143 | { |
160 | int ret=0; | 144 | int ret=0; |
161 | EVP_MD_CTX *ctx; | 145 | EVP_MD_CTX *ctx; |
162 | 146 | ||
163 | if ((in == NULL) || (inl <= 0)) return(0); | 147 | if ((in == NULL) || (inl <= 0)) return(0); |
164 | ctx=(EVP_MD_CTX *)b->ptr; | 148 | ctx=b->ptr; |
165 | 149 | ||
166 | if ((ctx != NULL) && (b->next_bio != NULL)) | 150 | if ((ctx != NULL) && (b->next_bio != NULL)) |
167 | ret=BIO_write(b->next_bio,in,inl); | 151 | ret=BIO_write(b->next_bio,in,inl); |
@@ -178,25 +162,21 @@ int inl; | |||
178 | return(ret); | 162 | return(ret); |
179 | } | 163 | } |
180 | 164 | ||
181 | static long md_ctrl(b,cmd,num,ptr) | 165 | static long md_ctrl(BIO *b, int cmd, long num, void *ptr) |
182 | BIO *b; | ||
183 | int cmd; | ||
184 | long num; | ||
185 | char *ptr; | ||
186 | { | 166 | { |
187 | EVP_MD_CTX *ctx,*dctx,**pctx; | 167 | EVP_MD_CTX *ctx,*dctx,**pctx; |
188 | EVP_MD **ppmd; | 168 | const EVP_MD **ppmd; |
189 | EVP_MD *md; | 169 | EVP_MD *md; |
190 | long ret=1; | 170 | long ret=1; |
191 | BIO *dbio; | 171 | BIO *dbio; |
192 | 172 | ||
193 | ctx=(EVP_MD_CTX *)b->ptr; | 173 | ctx=b->ptr; |
194 | 174 | ||
195 | switch (cmd) | 175 | switch (cmd) |
196 | { | 176 | { |
197 | case BIO_CTRL_RESET: | 177 | case BIO_CTRL_RESET: |
198 | if (b->init) | 178 | if (b->init) |
199 | EVP_DigestInit(ctx,ctx->digest); | 179 | EVP_DigestInit_ex(ctx,ctx->digest, NULL); |
200 | else | 180 | else |
201 | ret=0; | 181 | ret=0; |
202 | ret=BIO_ctrl(b->next_bio,cmd,num,ptr); | 182 | ret=BIO_ctrl(b->next_bio,cmd,num,ptr); |
@@ -204,7 +184,7 @@ char *ptr; | |||
204 | case BIO_C_GET_MD: | 184 | case BIO_C_GET_MD: |
205 | if (b->init) | 185 | if (b->init) |
206 | { | 186 | { |
207 | ppmd=(EVP_MD **)ptr; | 187 | ppmd=ptr; |
208 | *ppmd=ctx->digest; | 188 | *ppmd=ctx->digest; |
209 | } | 189 | } |
210 | else | 190 | else |
@@ -213,7 +193,7 @@ char *ptr; | |||
213 | case BIO_C_GET_MD_CTX: | 193 | case BIO_C_GET_MD_CTX: |
214 | if (b->init) | 194 | if (b->init) |
215 | { | 195 | { |
216 | pctx=(EVP_MD_CTX **)ptr; | 196 | pctx=ptr; |
217 | *pctx=ctx; | 197 | *pctx=ctx; |
218 | } | 198 | } |
219 | else | 199 | else |
@@ -226,14 +206,14 @@ char *ptr; | |||
226 | break; | 206 | break; |
227 | 207 | ||
228 | case BIO_C_SET_MD: | 208 | case BIO_C_SET_MD: |
229 | md=(EVP_MD *)ptr; | 209 | md=ptr; |
230 | EVP_DigestInit(ctx,md); | 210 | EVP_DigestInit_ex(ctx,md, NULL); |
231 | b->init=1; | 211 | b->init=1; |
232 | break; | 212 | break; |
233 | case BIO_CTRL_DUP: | 213 | case BIO_CTRL_DUP: |
234 | dbio=(BIO *)ptr; | 214 | dbio=ptr; |
235 | dctx=(EVP_MD_CTX *)dbio->ptr; | 215 | dctx=dbio->ptr; |
236 | memcpy(dctx,ctx,sizeof(ctx)); | 216 | EVP_MD_CTX_copy_ex(dctx,ctx); |
237 | b->init=1; | 217 | b->init=1; |
238 | break; | 218 | break; |
239 | default: | 219 | default: |
@@ -243,19 +223,30 @@ char *ptr; | |||
243 | return(ret); | 223 | return(ret); |
244 | } | 224 | } |
245 | 225 | ||
246 | static int md_gets(bp,buf,size) | 226 | static long md_callback_ctrl(BIO *b, int cmd, bio_info_cb *fp) |
247 | BIO *bp; | 227 | { |
248 | char *buf; | 228 | long ret=1; |
249 | int size; | 229 | |
230 | if (b->next_bio == NULL) return(0); | ||
231 | switch (cmd) | ||
232 | { | ||
233 | default: | ||
234 | ret=BIO_callback_ctrl(b->next_bio,cmd,fp); | ||
235 | break; | ||
236 | } | ||
237 | return(ret); | ||
238 | } | ||
239 | |||
240 | static int md_gets(BIO *bp, char *buf, int size) | ||
250 | { | 241 | { |
251 | EVP_MD_CTX *ctx; | 242 | EVP_MD_CTX *ctx; |
252 | unsigned int ret; | 243 | unsigned int ret; |
253 | 244 | ||
254 | 245 | ||
255 | ctx=(EVP_MD_CTX *)bp->ptr; | 246 | ctx=bp->ptr; |
256 | if (size < ctx->digest->md_size) | 247 | if (size < ctx->digest->md_size) |
257 | return(0); | 248 | return(0); |
258 | EVP_DigestFinal(ctx,(unsigned char *)buf,&ret); | 249 | EVP_DigestFinal_ex(ctx,(unsigned char *)buf,&ret); |
259 | return((int)ret); | 250 | return((int)ret); |
260 | } | 251 | } |
261 | 252 | ||
diff --git a/src/lib/libcrypto/evp/c_all.c b/src/lib/libcrypto/evp/c_all.c index e77d1c896b..5ffd352ea0 100644 --- a/src/lib/libcrypto/evp/c_all.c +++ b/src/lib/libcrypto/evp/c_all.c | |||
@@ -58,133 +58,17 @@ | |||
58 | 58 | ||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
61 | #include "evp.h" | 61 | #include <openssl/evp.h> |
62 | #include "objects.h" | ||
63 | 62 | ||
64 | void SSLeay_add_all_algorithms() | 63 | #undef OpenSSL_add_all_algorithms |
65 | { | ||
66 | SSLeay_add_all_ciphers(); | ||
67 | SSLeay_add_all_digests(); | ||
68 | } | ||
69 | 64 | ||
70 | void SSLeay_add_all_ciphers() | 65 | void OpenSSL_add_all_algorithms(void) |
71 | { | 66 | { |
72 | #ifndef NO_DES | 67 | OPENSSL_add_all_algorithms_noconf(); |
73 | EVP_add_cipher(EVP_des_cfb()); | ||
74 | EVP_add_cipher(EVP_des_ede_cfb()); | ||
75 | EVP_add_cipher(EVP_des_ede3_cfb()); | ||
76 | |||
77 | EVP_add_cipher(EVP_des_ofb()); | ||
78 | EVP_add_cipher(EVP_des_ede_ofb()); | ||
79 | EVP_add_cipher(EVP_des_ede3_ofb()); | ||
80 | |||
81 | EVP_add_cipher(EVP_desx_cbc()); | ||
82 | EVP_add_alias(SN_desx_cbc,"DESX"); | ||
83 | EVP_add_alias(SN_desx_cbc,"desx"); | ||
84 | |||
85 | EVP_add_cipher(EVP_des_cbc()); | ||
86 | EVP_add_alias(SN_des_cbc,"DES"); | ||
87 | EVP_add_alias(SN_des_cbc,"des"); | ||
88 | EVP_add_cipher(EVP_des_ede_cbc()); | ||
89 | EVP_add_cipher(EVP_des_ede3_cbc()); | ||
90 | EVP_add_alias(SN_des_ede3_cbc,"DES3"); | ||
91 | EVP_add_alias(SN_des_ede3_cbc,"des3"); | ||
92 | |||
93 | EVP_add_cipher(EVP_des_ecb()); | ||
94 | EVP_add_cipher(EVP_des_ede()); | ||
95 | EVP_add_cipher(EVP_des_ede3()); | ||
96 | #endif | ||
97 | |||
98 | #ifndef NO_RC4 | ||
99 | EVP_add_cipher(EVP_rc4()); | ||
100 | EVP_add_cipher(EVP_rc4_40()); | ||
101 | #endif | ||
102 | |||
103 | #ifndef NO_IDEA | ||
104 | EVP_add_cipher(EVP_idea_ecb()); | ||
105 | EVP_add_cipher(EVP_idea_cfb()); | ||
106 | EVP_add_cipher(EVP_idea_ofb()); | ||
107 | EVP_add_cipher(EVP_idea_cbc()); | ||
108 | EVP_add_alias(SN_idea_cbc,"IDEA"); | ||
109 | EVP_add_alias(SN_idea_cbc,"idea"); | ||
110 | #endif | ||
111 | |||
112 | #ifndef NO_RC2 | ||
113 | EVP_add_cipher(EVP_rc2_ecb()); | ||
114 | EVP_add_cipher(EVP_rc2_cfb()); | ||
115 | EVP_add_cipher(EVP_rc2_ofb()); | ||
116 | EVP_add_cipher(EVP_rc2_cbc()); | ||
117 | EVP_add_cipher(EVP_rc2_40_cbc()); | ||
118 | EVP_add_alias(SN_rc2_cbc,"RC2"); | ||
119 | EVP_add_alias(SN_rc2_cbc,"rc2"); | ||
120 | #endif | ||
121 | |||
122 | #ifndef NO_BLOWFISH | ||
123 | EVP_add_cipher(EVP_bf_ecb()); | ||
124 | EVP_add_cipher(EVP_bf_cfb()); | ||
125 | EVP_add_cipher(EVP_bf_ofb()); | ||
126 | EVP_add_cipher(EVP_bf_cbc()); | ||
127 | EVP_add_alias(SN_bf_cbc,"BF"); | ||
128 | EVP_add_alias(SN_bf_cbc,"bf"); | ||
129 | EVP_add_alias(SN_bf_cbc,"blowfish"); | ||
130 | #endif | ||
131 | |||
132 | #ifndef NO_CAST | ||
133 | EVP_add_cipher(EVP_cast5_ecb()); | ||
134 | EVP_add_cipher(EVP_cast5_cfb()); | ||
135 | EVP_add_cipher(EVP_cast5_ofb()); | ||
136 | EVP_add_cipher(EVP_cast5_cbc()); | ||
137 | EVP_add_alias(SN_cast5_cbc,"CAST"); | ||
138 | EVP_add_alias(SN_cast5_cbc,"cast"); | ||
139 | EVP_add_alias(SN_cast5_cbc,"CAST-cbc"); | ||
140 | EVP_add_alias(SN_cast5_cbc,"cast-cbc"); | ||
141 | #endif | ||
142 | |||
143 | #ifndef NO_RC5 | ||
144 | EVP_add_cipher(EVP_rc5_32_12_16_ecb()); | ||
145 | EVP_add_cipher(EVP_rc5_32_12_16_cfb()); | ||
146 | EVP_add_cipher(EVP_rc5_32_12_16_ofb()); | ||
147 | EVP_add_cipher(EVP_rc5_32_12_16_cbc()); | ||
148 | EVP_add_alias(SN_rc5_cbc,"rc5"); | ||
149 | EVP_add_alias(SN_rc5_cbc,"RC5"); | ||
150 | EVP_add_alias(SN_rc5_cbc,"rc5-cbc"); | ||
151 | EVP_add_alias(SN_rc5_cbc,"RC5-cbc"); | ||
152 | #endif | ||
153 | } | 68 | } |
154 | 69 | ||
155 | 70 | void OPENSSL_add_all_algorithms_noconf(void) | |
156 | void SSLeay_add_all_digests() | ||
157 | { | 71 | { |
158 | #ifndef NO_MD2 | 72 | OpenSSL_add_all_ciphers(); |
159 | EVP_add_digest(EVP_md2()); | 73 | OpenSSL_add_all_digests(); |
160 | #endif | ||
161 | #ifndef NO_MD5 | ||
162 | EVP_add_digest(EVP_md5()); | ||
163 | EVP_add_alias(SN_md5,"ssl2-md5"); | ||
164 | EVP_add_alias(SN_md5,"ssl3-md5"); | ||
165 | #endif | ||
166 | #ifndef NO_SHA | ||
167 | EVP_add_digest(EVP_sha()); | ||
168 | #ifndef NO_DSA | ||
169 | EVP_add_digest(EVP_dss()); | ||
170 | #endif | ||
171 | #endif | ||
172 | #ifndef NO_SHA1 | ||
173 | EVP_add_digest(EVP_sha1()); | ||
174 | EVP_add_alias(SN_sha1,"ssl3-sha1"); | ||
175 | #ifndef NO_DSA | ||
176 | EVP_add_digest(EVP_dss1()); | ||
177 | EVP_add_alias(SN_dsaWithSHA1,SN_dsaWithSHA1_2); | ||
178 | EVP_add_alias(SN_dsaWithSHA1,"DSS1"); | ||
179 | EVP_add_alias(SN_dsaWithSHA1,"dss1"); | ||
180 | #endif | ||
181 | #endif | ||
182 | #if !defined(NO_MDC2) && !defined(NO_DES) | ||
183 | EVP_add_digest(EVP_mdc2()); | ||
184 | #endif | ||
185 | #ifndef NO_RIPEMD160 | ||
186 | EVP_add_digest(EVP_ripemd160()); | ||
187 | EVP_add_alias(SN_ripemd160,"ripemd"); | ||
188 | EVP_add_alias(SN_ripemd160,"rmd160"); | ||
189 | #endif | ||
190 | } | 74 | } |
diff --git a/src/lib/libcrypto/evp/digest.c b/src/lib/libcrypto/evp/digest.c index d65f0036f7..a969ac69ed 100644 --- a/src/lib/libcrypto/evp/digest.c +++ b/src/lib/libcrypto/evp/digest.c | |||
@@ -55,35 +55,258 @@ | |||
55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
57 | */ | 57 | */ |
58 | /* ==================================================================== | ||
59 | * Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved. | ||
60 | * | ||
61 | * Redistribution and use in source and binary forms, with or without | ||
62 | * modification, are permitted provided that the following conditions | ||
63 | * are met: | ||
64 | * | ||
65 | * 1. Redistributions of source code must retain the above copyright | ||
66 | * notice, this list of conditions and the following disclaimer. | ||
67 | * | ||
68 | * 2. Redistributions in binary form must reproduce the above copyright | ||
69 | * notice, this list of conditions and the following disclaimer in | ||
70 | * the documentation and/or other materials provided with the | ||
71 | * distribution. | ||
72 | * | ||
73 | * 3. All advertising materials mentioning features or use of this | ||
74 | * software must display the following acknowledgment: | ||
75 | * "This product includes software developed by the OpenSSL Project | ||
76 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
77 | * | ||
78 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
79 | * endorse or promote products derived from this software without | ||
80 | * prior written permission. For written permission, please contact | ||
81 | * openssl-core@openssl.org. | ||
82 | * | ||
83 | * 5. Products derived from this software may not be called "OpenSSL" | ||
84 | * nor may "OpenSSL" appear in their names without prior written | ||
85 | * permission of the OpenSSL Project. | ||
86 | * | ||
87 | * 6. Redistributions of any form whatsoever must retain the following | ||
88 | * acknowledgment: | ||
89 | * "This product includes software developed by the OpenSSL Project | ||
90 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
91 | * | ||
92 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
93 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
94 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
95 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
96 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
97 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
98 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
99 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
100 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
101 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
102 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
103 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
104 | * ==================================================================== | ||
105 | * | ||
106 | * This product includes cryptographic software written by Eric Young | ||
107 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
108 | * Hudson (tjh@cryptsoft.com). | ||
109 | * | ||
110 | */ | ||
58 | 111 | ||
59 | #include <stdio.h> | 112 | #include <stdio.h> |
60 | #include "cryptlib.h" | 113 | #include "cryptlib.h" |
61 | #include "objects.h" | 114 | #include <openssl/objects.h> |
62 | #include "evp.h" | 115 | #include <openssl/evp.h> |
116 | #include <openssl/engine.h> | ||
117 | |||
118 | void EVP_MD_CTX_init(EVP_MD_CTX *ctx) | ||
119 | { | ||
120 | memset(ctx,'\0',sizeof *ctx); | ||
121 | } | ||
122 | |||
123 | EVP_MD_CTX *EVP_MD_CTX_create(void) | ||
124 | { | ||
125 | EVP_MD_CTX *ctx=OPENSSL_malloc(sizeof *ctx); | ||
126 | |||
127 | EVP_MD_CTX_init(ctx); | ||
128 | |||
129 | return ctx; | ||
130 | } | ||
63 | 131 | ||
64 | void EVP_DigestInit(ctx,type) | 132 | int EVP_DigestInit(EVP_MD_CTX *ctx, const EVP_MD *type) |
65 | EVP_MD_CTX *ctx; | ||
66 | EVP_MD *type; | ||
67 | { | 133 | { |
68 | ctx->digest=type; | 134 | EVP_MD_CTX_init(ctx); |
69 | type->init(&(ctx->md)); | 135 | return EVP_DigestInit_ex(ctx, type, NULL); |
70 | } | 136 | } |
71 | 137 | ||
72 | void EVP_DigestUpdate(ctx,data,count) | 138 | int EVP_DigestInit_ex(EVP_MD_CTX *ctx, const EVP_MD *type, ENGINE *impl) |
73 | EVP_MD_CTX *ctx; | ||
74 | unsigned char *data; | ||
75 | unsigned int count; | ||
76 | { | 139 | { |
77 | ctx->digest->update(&(ctx->md.base[0]),data,(unsigned long)count); | 140 | EVP_MD_CTX_clear_flags(ctx,EVP_MD_CTX_FLAG_CLEANED); |
141 | /* Whether it's nice or not, "Inits" can be used on "Final"'d contexts | ||
142 | * so this context may already have an ENGINE! Try to avoid releasing | ||
143 | * the previous handle, re-querying for an ENGINE, and having a | ||
144 | * reinitialisation, when it may all be unecessary. */ | ||
145 | if (ctx->engine && ctx->digest && (!type || | ||
146 | (type && (type->type == ctx->digest->type)))) | ||
147 | goto skip_to_init; | ||
148 | if (type) | ||
149 | { | ||
150 | /* Ensure an ENGINE left lying around from last time is cleared | ||
151 | * (the previous check attempted to avoid this if the same | ||
152 | * ENGINE and EVP_MD could be used). */ | ||
153 | if(ctx->engine) | ||
154 | ENGINE_finish(ctx->engine); | ||
155 | if(impl) | ||
156 | { | ||
157 | if (!ENGINE_init(impl)) | ||
158 | { | ||
159 | EVPerr(EVP_F_EVP_DIGESTINIT, EVP_R_INITIALIZATION_ERROR); | ||
160 | return 0; | ||
161 | } | ||
162 | } | ||
163 | else | ||
164 | /* Ask if an ENGINE is reserved for this job */ | ||
165 | impl = ENGINE_get_digest_engine(type->type); | ||
166 | if(impl) | ||
167 | { | ||
168 | /* There's an ENGINE for this job ... (apparently) */ | ||
169 | const EVP_MD *d = ENGINE_get_digest(impl, type->type); | ||
170 | if(!d) | ||
171 | { | ||
172 | /* Same comment from evp_enc.c */ | ||
173 | EVPerr(EVP_F_EVP_DIGESTINIT, EVP_R_INITIALIZATION_ERROR); | ||
174 | return 0; | ||
175 | } | ||
176 | /* We'll use the ENGINE's private digest definition */ | ||
177 | type = d; | ||
178 | /* Store the ENGINE functional reference so we know | ||
179 | * 'type' came from an ENGINE and we need to release | ||
180 | * it when done. */ | ||
181 | ctx->engine = impl; | ||
182 | } | ||
183 | else | ||
184 | ctx->engine = NULL; | ||
185 | } | ||
186 | else if(!ctx->digest) | ||
187 | { | ||
188 | EVPerr(EVP_F_EVP_DIGESTINIT, EVP_R_NO_DIGEST_SET); | ||
189 | return 0; | ||
190 | } | ||
191 | if (ctx->digest != type) | ||
192 | { | ||
193 | if (ctx->digest && ctx->digest->ctx_size) | ||
194 | OPENSSL_free(ctx->md_data); | ||
195 | ctx->digest=type; | ||
196 | if (type->ctx_size) | ||
197 | ctx->md_data=OPENSSL_malloc(type->ctx_size); | ||
198 | } | ||
199 | skip_to_init: | ||
200 | return ctx->digest->init(ctx); | ||
78 | } | 201 | } |
79 | 202 | ||
80 | void EVP_DigestFinal(ctx,md,size) | 203 | int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *data, |
81 | EVP_MD_CTX *ctx; | 204 | unsigned int count) |
82 | unsigned char *md; | ||
83 | unsigned int *size; | ||
84 | { | 205 | { |
85 | ctx->digest->final(md,&(ctx->md.base[0])); | 206 | return ctx->digest->update(ctx,data,(unsigned long)count); |
207 | } | ||
208 | |||
209 | /* The caller can assume that this removes any secret data from the context */ | ||
210 | int EVP_DigestFinal(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) | ||
211 | { | ||
212 | int ret; | ||
213 | ret = EVP_DigestFinal_ex(ctx, md, size); | ||
214 | EVP_MD_CTX_cleanup(ctx); | ||
215 | return ret; | ||
216 | } | ||
217 | |||
218 | /* The caller can assume that this removes any secret data from the context */ | ||
219 | int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) | ||
220 | { | ||
221 | int ret; | ||
222 | ret=ctx->digest->final(ctx,md); | ||
86 | if (size != NULL) | 223 | if (size != NULL) |
87 | *size=ctx->digest->md_size; | 224 | *size=ctx->digest->md_size; |
88 | memset(&(ctx->md),0,sizeof(ctx->md)); | 225 | if (ctx->digest->cleanup) |
226 | { | ||
227 | ctx->digest->cleanup(ctx); | ||
228 | EVP_MD_CTX_set_flags(ctx,EVP_MD_CTX_FLAG_CLEANED); | ||
229 | } | ||
230 | memset(ctx->md_data,0,ctx->digest->ctx_size); | ||
231 | return ret; | ||
232 | } | ||
233 | |||
234 | int EVP_MD_CTX_copy(EVP_MD_CTX *out, const EVP_MD_CTX *in) | ||
235 | { | ||
236 | EVP_MD_CTX_init(out); | ||
237 | return EVP_MD_CTX_copy_ex(out, in); | ||
238 | } | ||
239 | |||
240 | int EVP_MD_CTX_copy_ex(EVP_MD_CTX *out, const EVP_MD_CTX *in) | ||
241 | { | ||
242 | if ((in == NULL) || (in->digest == NULL)) | ||
243 | { | ||
244 | EVPerr(EVP_F_EVP_MD_CTX_COPY,EVP_R_INPUT_NOT_INITIALIZED); | ||
245 | return 0; | ||
246 | } | ||
247 | /* Make sure it's safe to copy a digest context using an ENGINE */ | ||
248 | if (in->engine && !ENGINE_init(in->engine)) | ||
249 | { | ||
250 | EVPerr(EVP_F_EVP_MD_CTX_COPY,ERR_R_ENGINE_LIB); | ||
251 | return 0; | ||
252 | } | ||
253 | |||
254 | EVP_MD_CTX_cleanup(out); | ||
255 | memcpy(out,in,sizeof *out); | ||
256 | |||
257 | if (out->digest->ctx_size) | ||
258 | { | ||
259 | out->md_data=OPENSSL_malloc(out->digest->ctx_size); | ||
260 | memcpy(out->md_data,in->md_data,out->digest->ctx_size); | ||
261 | } | ||
262 | |||
263 | if (out->digest->copy) | ||
264 | return out->digest->copy(out,in); | ||
265 | |||
266 | return 1; | ||
267 | } | ||
268 | |||
269 | int EVP_Digest(void *data, unsigned int count, | ||
270 | unsigned char *md, unsigned int *size, const EVP_MD *type, ENGINE *impl) | ||
271 | { | ||
272 | EVP_MD_CTX ctx; | ||
273 | int ret; | ||
274 | |||
275 | EVP_MD_CTX_init(&ctx); | ||
276 | EVP_MD_CTX_set_flags(&ctx,EVP_MD_CTX_FLAG_ONESHOT); | ||
277 | ret=EVP_DigestInit_ex(&ctx, type, impl) | ||
278 | && EVP_DigestUpdate(&ctx, data, count) | ||
279 | && EVP_DigestFinal_ex(&ctx, md, size); | ||
280 | EVP_MD_CTX_cleanup(&ctx); | ||
281 | |||
282 | return ret; | ||
283 | } | ||
284 | |||
285 | void EVP_MD_CTX_destroy(EVP_MD_CTX *ctx) | ||
286 | { | ||
287 | EVP_MD_CTX_cleanup(ctx); | ||
288 | OPENSSL_free(ctx); | ||
289 | } | ||
290 | |||
291 | /* This call frees resources associated with the context */ | ||
292 | int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx) | ||
293 | { | ||
294 | /* Don't assume ctx->md_data was cleaned in EVP_Digest_Final, | ||
295 | * because sometimes only copies of the context are ever finalised. | ||
296 | */ | ||
297 | if (ctx->digest && ctx->digest->cleanup | ||
298 | && !EVP_MD_CTX_test_flags(ctx,EVP_MD_CTX_FLAG_CLEANED)) | ||
299 | ctx->digest->cleanup(ctx); | ||
300 | if (ctx->digest && ctx->digest->ctx_size && ctx->md_data) | ||
301 | { | ||
302 | memset(ctx->md_data,0,ctx->digest->ctx_size); | ||
303 | OPENSSL_free(ctx->md_data); | ||
304 | } | ||
305 | if(ctx->engine) | ||
306 | /* The EVP_MD we used belongs to an ENGINE, release the | ||
307 | * functional reference we held for this reason. */ | ||
308 | ENGINE_finish(ctx->engine); | ||
309 | memset(ctx,'\0',sizeof *ctx); | ||
310 | |||
311 | return 1; | ||
89 | } | 312 | } |
diff --git a/src/lib/libcrypto/evp/e_aes.c b/src/lib/libcrypto/evp/e_aes.c index 9d03a9602f..c323fa2892 100644 --- a/src/lib/libcrypto/evp/e_aes.c +++ b/src/lib/libcrypto/evp/e_aes.c | |||
@@ -88,7 +88,9 @@ IMPLEMENT_BLOCK_CIPHER(aes_256, ks, AES, EVP_AES_KEY, | |||
88 | static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 88 | static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
89 | const unsigned char *iv, int enc) { | 89 | const unsigned char *iv, int enc) { |
90 | 90 | ||
91 | if (enc) | 91 | if ((ctx->cipher->flags & EVP_CIPH_MODE) == EVP_CIPH_CFB_MODE |
92 | || (ctx->cipher->flags & EVP_CIPH_MODE) == EVP_CIPH_OFB_MODE | ||
93 | || enc) | ||
92 | AES_set_encrypt_key(key, ctx->key_len * 8, ctx->cipher_data); | 94 | AES_set_encrypt_key(key, ctx->key_len * 8, ctx->cipher_data); |
93 | else | 95 | else |
94 | AES_set_decrypt_key(key, ctx->key_len * 8, ctx->cipher_data); | 96 | AES_set_decrypt_key(key, ctx->key_len * 8, ctx->cipher_data); |
diff --git a/src/lib/libcrypto/evp/e_bf.c b/src/lib/libcrypto/evp/e_bf.c index 72047f64da..e74337567b 100644 --- a/src/lib/libcrypto/evp/e_bf.c +++ b/src/lib/libcrypto/evp/e_bf.c | |||
@@ -56,24 +56,32 @@ | |||
56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
57 | */ | 57 | */ |
58 | 58 | ||
59 | #ifndef NO_BF | 59 | #ifndef OPENSSL_NO_BF |
60 | #include <stdio.h> | 60 | #include <stdio.h> |
61 | #include "cryptlib.h" | 61 | #include "cryptlib.h" |
62 | #include <openssl/evp.h> | 62 | #include <openssl/evp.h> |
63 | #include "evp_locl.h" | 63 | #include "evp_locl.h" |
64 | #include <openssl/objects.h> | 64 | #include <openssl/objects.h> |
65 | #include <openssl/blowfish.h> | ||
65 | 66 | ||
66 | static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 67 | static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
67 | const unsigned char *iv, int enc); | 68 | const unsigned char *iv, int enc); |
68 | 69 | ||
69 | IMPLEMENT_BLOCK_CIPHER(bf, bf_ks, BF, bf_ks, NID_bf, 8, 16, 8, | 70 | typedef struct |
70 | 0, bf_init_key, NULL, | 71 | { |
72 | BF_KEY ks; | ||
73 | } EVP_BF_KEY; | ||
74 | |||
75 | #define data(ctx) EVP_C_DATA(EVP_BF_KEY,ctx) | ||
76 | |||
77 | IMPLEMENT_BLOCK_CIPHER(bf, ks, BF, EVP_BF_KEY, NID_bf, 8, 16, 8, 64, | ||
78 | EVP_CIPH_VARIABLE_LENGTH, bf_init_key, NULL, | ||
71 | EVP_CIPHER_set_asn1_iv, EVP_CIPHER_get_asn1_iv, NULL) | 79 | EVP_CIPHER_set_asn1_iv, EVP_CIPHER_get_asn1_iv, NULL) |
72 | 80 | ||
73 | static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 81 | static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
74 | const unsigned char *iv, int enc) | 82 | const unsigned char *iv, int enc) |
75 | { | 83 | { |
76 | BF_set_key(&(ctx->c.bf_ks),EVP_CIPHER_CTX_key_length(ctx),key); | 84 | BF_set_key(&data(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx),key); |
77 | return 1; | 85 | return 1; |
78 | } | 86 | } |
79 | 87 | ||
diff --git a/src/lib/libcrypto/evp/e_cast.c b/src/lib/libcrypto/evp/e_cast.c index e5af7fb4ed..3400fef187 100644 --- a/src/lib/libcrypto/evp/e_cast.c +++ b/src/lib/libcrypto/evp/e_cast.c | |||
@@ -56,26 +56,34 @@ | |||
56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
57 | */ | 57 | */ |
58 | 58 | ||
59 | #ifndef NO_CAST | 59 | #ifndef OPENSSL_NO_CAST |
60 | 60 | ||
61 | #include <stdio.h> | 61 | #include <stdio.h> |
62 | #include "cryptlib.h" | 62 | #include "cryptlib.h" |
63 | #include <openssl/evp.h> | 63 | #include <openssl/evp.h> |
64 | #include <openssl/objects.h> | 64 | #include <openssl/objects.h> |
65 | #include "evp_locl.h" | 65 | #include "evp_locl.h" |
66 | #include <openssl/cast.h> | ||
66 | 67 | ||
67 | static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 68 | static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
68 | const unsigned char *iv,int enc); | 69 | const unsigned char *iv,int enc); |
69 | 70 | ||
70 | IMPLEMENT_BLOCK_CIPHER(cast5, cast_ks, CAST, cast_ks, | 71 | typedef struct |
71 | NID_cast5, 8, EVP_CAST5_KEY_SIZE, 8, | 72 | { |
73 | CAST_KEY ks; | ||
74 | } EVP_CAST_KEY; | ||
75 | |||
76 | #define data(ctx) EVP_C_DATA(EVP_CAST_KEY,ctx) | ||
77 | |||
78 | IMPLEMENT_BLOCK_CIPHER(cast5, ks, CAST, EVP_CAST_KEY, | ||
79 | NID_cast5, 8, CAST_KEY_LENGTH, 8, 64, | ||
72 | EVP_CIPH_VARIABLE_LENGTH, cast_init_key, NULL, | 80 | EVP_CIPH_VARIABLE_LENGTH, cast_init_key, NULL, |
73 | EVP_CIPHER_set_asn1_iv, EVP_CIPHER_get_asn1_iv, NULL) | 81 | EVP_CIPHER_set_asn1_iv, EVP_CIPHER_get_asn1_iv, NULL) |
74 | 82 | ||
75 | static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 83 | static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
76 | const unsigned char *iv, int enc) | 84 | const unsigned char *iv, int enc) |
77 | { | 85 | { |
78 | CAST_set_key(&(ctx->c.cast_ks),EVP_CIPHER_CTX_key_length(ctx),key); | 86 | CAST_set_key(&data(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx),key); |
79 | return 1; | 87 | return 1; |
80 | } | 88 | } |
81 | 89 | ||
diff --git a/src/lib/libcrypto/evp/e_des.c b/src/lib/libcrypto/evp/e_des.c index f4e998b81c..105266a4b3 100644 --- a/src/lib/libcrypto/evp/e_des.c +++ b/src/lib/libcrypto/evp/e_des.c | |||
@@ -56,12 +56,13 @@ | |||
56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
57 | */ | 57 | */ |
58 | 58 | ||
59 | #ifndef NO_DES | 59 | #ifndef OPENSSL_NO_DES |
60 | #include <stdio.h> | 60 | #include <stdio.h> |
61 | #include "cryptlib.h" | 61 | #include "cryptlib.h" |
62 | #include <openssl/evp.h> | 62 | #include <openssl/evp.h> |
63 | #include <openssl/objects.h> | 63 | #include <openssl/objects.h> |
64 | #include "evp_locl.h" | 64 | #include "evp_locl.h" |
65 | #include <openssl/des.h> | ||
65 | 66 | ||
66 | static int des_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 67 | static int des_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
67 | const unsigned char *iv, int enc); | 68 | const unsigned char *iv, int enc); |
@@ -72,34 +73,34 @@ static int des_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | |||
72 | const unsigned char *in, unsigned int inl) | 73 | const unsigned char *in, unsigned int inl) |
73 | { | 74 | { |
74 | BLOCK_CIPHER_ecb_loop() | 75 | BLOCK_CIPHER_ecb_loop() |
75 | des_ecb_encrypt((des_cblock *)(in + i), (des_cblock *)(out + i), ctx->c.des_ks, ctx->encrypt); | 76 | DES_ecb_encrypt((DES_cblock *)(in + i), (DES_cblock *)(out + i), ctx->cipher_data, ctx->encrypt); |
76 | return 1; | 77 | return 1; |
77 | } | 78 | } |
78 | 79 | ||
79 | static int des_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 80 | static int des_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
80 | const unsigned char *in, unsigned int inl) | 81 | const unsigned char *in, unsigned int inl) |
81 | { | 82 | { |
82 | des_ofb64_encrypt(in, out, (long)inl, ctx->c.des_ks, (des_cblock *)ctx->iv, &ctx->num); | 83 | DES_ofb64_encrypt(in, out, (long)inl, ctx->cipher_data, (DES_cblock *)ctx->iv, &ctx->num); |
83 | return 1; | 84 | return 1; |
84 | } | 85 | } |
85 | 86 | ||
86 | static int des_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 87 | static int des_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
87 | const unsigned char *in, unsigned int inl) | 88 | const unsigned char *in, unsigned int inl) |
88 | { | 89 | { |
89 | des_ncbc_encrypt(in, out, (long)inl, ctx->c.des_ks, | 90 | DES_ncbc_encrypt(in, out, (long)inl, ctx->cipher_data, |
90 | (des_cblock *)ctx->iv, ctx->encrypt); | 91 | (DES_cblock *)ctx->iv, ctx->encrypt); |
91 | return 1; | 92 | return 1; |
92 | } | 93 | } |
93 | 94 | ||
94 | static int des_cfb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 95 | static int des_cfb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
95 | const unsigned char *in, unsigned int inl) | 96 | const unsigned char *in, unsigned int inl) |
96 | { | 97 | { |
97 | des_cfb64_encrypt(in, out, (long)inl, ctx->c.des_ks, | 98 | DES_cfb64_encrypt(in, out, (long)inl, ctx->cipher_data, |
98 | (des_cblock *)ctx->iv, &ctx->num, ctx->encrypt); | 99 | (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); |
99 | return 1; | 100 | return 1; |
100 | } | 101 | } |
101 | 102 | ||
102 | BLOCK_CIPHER_defs(des, des_ks, NID_des, 8, 8, 8, | 103 | BLOCK_CIPHER_defs(des, DES_key_schedule, NID_des, 8, 8, 8, 64, |
103 | 0, des_init_key, NULL, | 104 | 0, des_init_key, NULL, |
104 | EVP_CIPHER_set_asn1_iv, | 105 | EVP_CIPHER_set_asn1_iv, |
105 | EVP_CIPHER_get_asn1_iv, | 106 | EVP_CIPHER_get_asn1_iv, |
@@ -109,9 +110,9 @@ BLOCK_CIPHER_defs(des, des_ks, NID_des, 8, 8, 8, | |||
109 | static int des_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 110 | static int des_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
110 | const unsigned char *iv, int enc) | 111 | const unsigned char *iv, int enc) |
111 | { | 112 | { |
112 | des_cblock *deskey = (des_cblock *)key; | 113 | DES_cblock *deskey = (DES_cblock *)key; |
113 | 114 | ||
114 | des_set_key_unchecked(deskey,ctx->c.des_ks); | 115 | DES_set_key_unchecked(deskey,ctx->cipher_data); |
115 | return 1; | 116 | return 1; |
116 | } | 117 | } |
117 | 118 | ||
diff --git a/src/lib/libcrypto/evp/e_des3.c b/src/lib/libcrypto/evp/e_des3.c index a9aba4ae70..077860e7b6 100644 --- a/src/lib/libcrypto/evp/e_des3.c +++ b/src/lib/libcrypto/evp/e_des3.c | |||
@@ -56,12 +56,13 @@ | |||
56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
57 | */ | 57 | */ |
58 | 58 | ||
59 | #ifndef NO_DES | 59 | #ifndef OPENSSL_NO_DES |
60 | #include <stdio.h> | 60 | #include <stdio.h> |
61 | #include "cryptlib.h" | 61 | #include "cryptlib.h" |
62 | #include <openssl/evp.h> | 62 | #include <openssl/evp.h> |
63 | #include <openssl/objects.h> | 63 | #include <openssl/objects.h> |
64 | #include "evp_locl.h" | 64 | #include "evp_locl.h" |
65 | #include <openssl/des.h> | ||
65 | 66 | ||
66 | static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 67 | static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
67 | const unsigned char *iv,int enc); | 68 | const unsigned char *iv,int enc); |
@@ -69,60 +70,78 @@ static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | |||
69 | static int des_ede3_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 70 | static int des_ede3_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
70 | const unsigned char *iv,int enc); | 71 | const unsigned char *iv,int enc); |
71 | 72 | ||
73 | typedef struct | ||
74 | { | ||
75 | DES_key_schedule ks1;/* key schedule */ | ||
76 | DES_key_schedule ks2;/* key schedule (for ede) */ | ||
77 | DES_key_schedule ks3;/* key schedule (for ede3) */ | ||
78 | } DES_EDE_KEY; | ||
79 | |||
80 | #define data(ctx) ((DES_EDE_KEY *)(ctx)->cipher_data) | ||
81 | |||
72 | /* Because of various casts and different args can't use IMPLEMENT_BLOCK_CIPHER */ | 82 | /* Because of various casts and different args can't use IMPLEMENT_BLOCK_CIPHER */ |
73 | 83 | ||
74 | static int des_ede_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 84 | static int des_ede_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
75 | const unsigned char *in, unsigned int inl) | 85 | const unsigned char *in, unsigned int inl) |
76 | { | 86 | { |
77 | BLOCK_CIPHER_ecb_loop() | 87 | BLOCK_CIPHER_ecb_loop() |
78 | des_ecb3_encrypt((des_cblock *)(in + i), (des_cblock *)(out + i), | 88 | DES_ecb3_encrypt((DES_cblock *)(in + i), (DES_cblock *)(out + i), |
79 | ctx->c.des_ede.ks1, ctx->c.des_ede.ks2, ctx->c.des_ede.ks3, | 89 | &data(ctx)->ks1, &data(ctx)->ks2, |
80 | ctx->encrypt); | 90 | &data(ctx)->ks3, |
91 | ctx->encrypt); | ||
81 | return 1; | 92 | return 1; |
82 | } | 93 | } |
83 | 94 | ||
84 | static int des_ede_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 95 | static int des_ede_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
85 | const unsigned char *in, unsigned int inl) | 96 | const unsigned char *in, unsigned int inl) |
86 | { | 97 | { |
87 | des_ede3_ofb64_encrypt(in, out, (long)inl, | 98 | DES_ede3_ofb64_encrypt(in, out, (long)inl, |
88 | ctx->c.des_ede.ks1, ctx->c.des_ede.ks2, ctx->c.des_ede.ks3, | 99 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
89 | (des_cblock *)ctx->iv, &ctx->num); | 100 | (DES_cblock *)ctx->iv, &ctx->num); |
90 | return 1; | 101 | return 1; |
91 | } | 102 | } |
92 | 103 | ||
93 | static int des_ede_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 104 | static int des_ede_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
94 | const unsigned char *in, unsigned int inl) | 105 | const unsigned char *in, unsigned int inl) |
95 | { | 106 | { |
96 | des_ede3_cbc_encrypt(in, out, (long)inl, | 107 | #ifdef KSSL_DEBUG |
97 | ctx->c.des_ede.ks1, ctx->c.des_ede.ks2, ctx->c.des_ede.ks3, | 108 | { |
98 | (des_cblock *)ctx->iv, ctx->encrypt); | 109 | int i; |
110 | char *cp; | ||
111 | printf("des_ede_cbc_cipher(ctx=%lx, buflen=%d)\n", ctx, ctx->buf_len); | ||
112 | printf("\t iv= "); | ||
113 | for(i=0;i<8;i++) | ||
114 | printf("%02X",ctx->iv[i]); | ||
115 | printf("\n"); | ||
116 | } | ||
117 | #endif /* KSSL_DEBUG */ | ||
118 | DES_ede3_cbc_encrypt(in, out, (long)inl, | ||
119 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, | ||
120 | (DES_cblock *)ctx->iv, ctx->encrypt); | ||
99 | return 1; | 121 | return 1; |
100 | } | 122 | } |
101 | 123 | ||
102 | static int des_ede_cfb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 124 | static int des_ede_cfb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
103 | const unsigned char *in, unsigned int inl) | 125 | const unsigned char *in, unsigned int inl) |
104 | { | 126 | { |
105 | des_ede3_cfb64_encrypt(in, out, (long)inl, | 127 | DES_ede3_cfb64_encrypt(in, out, (long)inl, |
106 | ctx->c.des_ede.ks1, ctx->c.des_ede.ks2, ctx->c.des_ede.ks3, | 128 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
107 | (des_cblock *)ctx->iv, &ctx->num, ctx->encrypt); | 129 | (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); |
108 | return 1; | 130 | return 1; |
109 | } | 131 | } |
110 | 132 | ||
111 | #define NID_des_ede_ecb NID_des_ede | 133 | BLOCK_CIPHER_defs(des_ede, DES_EDE_KEY, NID_des_ede, 8, 16, 8, 64, |
112 | |||
113 | BLOCK_CIPHER_defs(des_ede, des_ede, NID_des_ede, 8, 16, 8, | ||
114 | 0, des_ede_init_key, NULL, | 134 | 0, des_ede_init_key, NULL, |
115 | EVP_CIPHER_set_asn1_iv, | 135 | EVP_CIPHER_set_asn1_iv, |
116 | EVP_CIPHER_get_asn1_iv, | 136 | EVP_CIPHER_get_asn1_iv, |
117 | NULL) | 137 | NULL) |
118 | 138 | ||
119 | #define NID_des_ede3_ecb NID_des_ede3 | ||
120 | #define des_ede3_cfb_cipher des_ede_cfb_cipher | 139 | #define des_ede3_cfb_cipher des_ede_cfb_cipher |
121 | #define des_ede3_ofb_cipher des_ede_ofb_cipher | 140 | #define des_ede3_ofb_cipher des_ede_ofb_cipher |
122 | #define des_ede3_cbc_cipher des_ede_cbc_cipher | 141 | #define des_ede3_cbc_cipher des_ede_cbc_cipher |
123 | #define des_ede3_ecb_cipher des_ede_ecb_cipher | 142 | #define des_ede3_ecb_cipher des_ede_ecb_cipher |
124 | 143 | ||
125 | BLOCK_CIPHER_defs(des_ede3, des_ede, NID_des_ede3, 8, 24, 8, | 144 | BLOCK_CIPHER_defs(des_ede3, DES_EDE_KEY, NID_des_ede3, 8, 24, 8, 64, |
126 | 0, des_ede3_init_key, NULL, | 145 | 0, des_ede3_init_key, NULL, |
127 | EVP_CIPHER_set_asn1_iv, | 146 | EVP_CIPHER_set_asn1_iv, |
128 | EVP_CIPHER_get_asn1_iv, | 147 | EVP_CIPHER_get_asn1_iv, |
@@ -131,34 +150,43 @@ BLOCK_CIPHER_defs(des_ede3, des_ede, NID_des_ede3, 8, 24, 8, | |||
131 | static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 150 | static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
132 | const unsigned char *iv, int enc) | 151 | const unsigned char *iv, int enc) |
133 | { | 152 | { |
134 | des_cblock *deskey = (des_cblock *)key; | 153 | DES_cblock *deskey = (DES_cblock *)key; |
135 | 154 | ||
136 | des_set_key_unchecked(&deskey[0],ctx->c.des_ede.ks1); | 155 | DES_set_key_unchecked(&deskey[0],&data(ctx)->ks1); |
137 | des_set_key_unchecked(&deskey[1],ctx->c.des_ede.ks2); | 156 | DES_set_key_unchecked(&deskey[1],&data(ctx)->ks2); |
138 | memcpy( (char *)ctx->c.des_ede.ks3, | 157 | memcpy(&data(ctx)->ks3,&data(ctx)->ks1, |
139 | (char *)ctx->c.des_ede.ks1, | 158 | sizeof(data(ctx)->ks1)); |
140 | sizeof(ctx->c.des_ede.ks1)); | ||
141 | return 1; | 159 | return 1; |
142 | } | 160 | } |
143 | 161 | ||
144 | static int des_ede3_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 162 | static int des_ede3_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
145 | const unsigned char *iv, int enc) | 163 | const unsigned char *iv, int enc) |
146 | { | 164 | { |
147 | des_cblock *deskey = (des_cblock *)key; | 165 | DES_cblock *deskey = (DES_cblock *)key; |
166 | #ifdef KSSL_DEBUG | ||
167 | { | ||
168 | int i; | ||
169 | printf("des_ede3_init_key(ctx=%lx)\n", ctx); | ||
170 | printf("\tKEY= "); | ||
171 | for(i=0;i<24;i++) printf("%02X",key[i]); printf("\n"); | ||
172 | printf("\t IV= "); | ||
173 | for(i=0;i<8;i++) printf("%02X",iv[i]); printf("\n"); | ||
174 | } | ||
175 | #endif /* KSSL_DEBUG */ | ||
148 | 176 | ||
149 | des_set_key_unchecked(&deskey[0],ctx->c.des_ede.ks1); | 177 | DES_set_key_unchecked(&deskey[0],&data(ctx)->ks1); |
150 | des_set_key_unchecked(&deskey[1],ctx->c.des_ede.ks2); | 178 | DES_set_key_unchecked(&deskey[1],&data(ctx)->ks2); |
151 | des_set_key_unchecked(&deskey[2],ctx->c.des_ede.ks3); | 179 | DES_set_key_unchecked(&deskey[2],&data(ctx)->ks3); |
152 | 180 | ||
153 | return 1; | 181 | return 1; |
154 | } | 182 | } |
155 | 183 | ||
156 | EVP_CIPHER *EVP_des_ede(void) | 184 | const EVP_CIPHER *EVP_des_ede(void) |
157 | { | 185 | { |
158 | return &des_ede_ecb; | 186 | return &des_ede_ecb; |
159 | } | 187 | } |
160 | 188 | ||
161 | EVP_CIPHER *EVP_des_ede3(void) | 189 | const EVP_CIPHER *EVP_des_ede3(void) |
162 | { | 190 | { |
163 | return &des_ede3_ecb; | 191 | return &des_ede3_ecb; |
164 | } | 192 | } |
diff --git a/src/lib/libcrypto/evp/e_idea.c b/src/lib/libcrypto/evp/e_idea.c index 8d3c88deb7..ed838d3e62 100644 --- a/src/lib/libcrypto/evp/e_idea.c +++ b/src/lib/libcrypto/evp/e_idea.c | |||
@@ -56,13 +56,14 @@ | |||
56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
57 | */ | 57 | */ |
58 | 58 | ||
59 | #ifndef NO_IDEA | 59 | #ifndef OPENSSL_NO_IDEA |
60 | 60 | ||
61 | #include <stdio.h> | 61 | #include <stdio.h> |
62 | #include "cryptlib.h" | 62 | #include "cryptlib.h" |
63 | #include <openssl/evp.h> | 63 | #include <openssl/evp.h> |
64 | #include <openssl/objects.h> | 64 | #include <openssl/objects.h> |
65 | #include "evp_locl.h" | 65 | #include "evp_locl.h" |
66 | #include <openssl/idea.h> | ||
66 | 67 | ||
67 | static int idea_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 68 | static int idea_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
68 | const unsigned char *iv,int enc); | 69 | const unsigned char *iv,int enc); |
@@ -75,17 +76,22 @@ static int idea_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | |||
75 | const unsigned char *in, unsigned int inl) | 76 | const unsigned char *in, unsigned int inl) |
76 | { | 77 | { |
77 | BLOCK_CIPHER_ecb_loop() | 78 | BLOCK_CIPHER_ecb_loop() |
78 | idea_ecb_encrypt(in + i, out + i, &ctx->c.idea_ks); | 79 | idea_ecb_encrypt(in + i, out + i, ctx->cipher_data); |
79 | return 1; | 80 | return 1; |
80 | } | 81 | } |
81 | 82 | ||
82 | /* Can't use IMPLEMENT_BLOCK_CIPHER because idea_ecb_encrypt is different */ | 83 | /* Can't use IMPLEMENT_BLOCK_CIPHER because idea_ecb_encrypt is different */ |
83 | 84 | ||
84 | BLOCK_CIPHER_func_cbc(idea, idea, idea_ks) | 85 | typedef struct |
85 | BLOCK_CIPHER_func_ofb(idea, idea, idea_ks) | 86 | { |
86 | BLOCK_CIPHER_func_cfb(idea, idea, idea_ks) | 87 | IDEA_KEY_SCHEDULE ks; |
88 | } EVP_IDEA_KEY; | ||
89 | |||
90 | BLOCK_CIPHER_func_cbc(idea, idea, EVP_IDEA_KEY, ks) | ||
91 | BLOCK_CIPHER_func_ofb(idea, idea, 64, EVP_IDEA_KEY, ks) | ||
92 | BLOCK_CIPHER_func_cfb(idea, idea, 64, EVP_IDEA_KEY, ks) | ||
87 | 93 | ||
88 | BLOCK_CIPHER_defs(idea, idea_ks, NID_idea, 8, 16, 8, | 94 | BLOCK_CIPHER_defs(idea, IDEA_KEY_SCHEDULE, NID_idea, 8, 16, 8, 64, |
89 | 0, idea_init_key, NULL, | 95 | 0, idea_init_key, NULL, |
90 | EVP_CIPHER_set_asn1_iv, EVP_CIPHER_get_asn1_iv, NULL) | 96 | EVP_CIPHER_set_asn1_iv, EVP_CIPHER_get_asn1_iv, NULL) |
91 | 97 | ||
@@ -96,13 +102,13 @@ static int idea_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | |||
96 | if (EVP_CIPHER_CTX_mode(ctx) == EVP_CIPH_OFB_MODE) enc = 1; | 102 | if (EVP_CIPHER_CTX_mode(ctx) == EVP_CIPH_OFB_MODE) enc = 1; |
97 | else if (EVP_CIPHER_CTX_mode(ctx) == EVP_CIPH_CFB_MODE) enc = 1; | 103 | else if (EVP_CIPHER_CTX_mode(ctx) == EVP_CIPH_CFB_MODE) enc = 1; |
98 | } | 104 | } |
99 | if (enc) idea_set_encrypt_key(key,&(ctx->c.idea_ks)); | 105 | if (enc) idea_set_encrypt_key(key,ctx->cipher_data); |
100 | else | 106 | else |
101 | { | 107 | { |
102 | IDEA_KEY_SCHEDULE tmp; | 108 | IDEA_KEY_SCHEDULE tmp; |
103 | 109 | ||
104 | idea_set_encrypt_key(key,&tmp); | 110 | idea_set_encrypt_key(key,&tmp); |
105 | idea_set_decrypt_key(&tmp,&(ctx->c.idea_ks)); | 111 | idea_set_decrypt_key(&tmp,ctx->cipher_data); |
106 | memset((unsigned char *)&tmp,0, | 112 | memset((unsigned char *)&tmp,0, |
107 | sizeof(IDEA_KEY_SCHEDULE)); | 113 | sizeof(IDEA_KEY_SCHEDULE)); |
108 | } | 114 | } |
diff --git a/src/lib/libcrypto/evp/e_null.c b/src/lib/libcrypto/evp/e_null.c index e4e7ca7606..2420d7e5af 100644 --- a/src/lib/libcrypto/evp/e_null.c +++ b/src/lib/libcrypto/evp/e_null.c | |||
@@ -58,52 +58,44 @@ | |||
58 | 58 | ||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
61 | #include "evp.h" | 61 | #include <openssl/evp.h> |
62 | #include "objects.h" | 62 | #include <openssl/objects.h> |
63 | 63 | ||
64 | #ifndef NOPROTO | 64 | static int null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
65 | static void null_init_key(EVP_CIPHER_CTX *ctx, unsigned char *key, | 65 | const unsigned char *iv,int enc); |
66 | unsigned char *iv,int enc); | 66 | static int null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
67 | static void null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 67 | const unsigned char *in, unsigned int inl); |
68 | unsigned char *in, unsigned int inl); | 68 | static const EVP_CIPHER n_cipher= |
69 | #else | ||
70 | static void null_init_key(); | ||
71 | static void null_cipher(); | ||
72 | #endif | ||
73 | |||
74 | static EVP_CIPHER n_cipher= | ||
75 | { | 69 | { |
76 | NID_undef, | 70 | NID_undef, |
77 | 1,0,0, | 71 | 1,0,0, |
72 | 0, | ||
78 | null_init_key, | 73 | null_init_key, |
79 | null_cipher, | 74 | null_cipher, |
80 | NULL, | 75 | NULL, |
81 | 0, | 76 | 0, |
82 | NULL, | 77 | NULL, |
83 | NULL, | 78 | NULL, |
79 | NULL | ||
84 | }; | 80 | }; |
85 | 81 | ||
86 | EVP_CIPHER *EVP_enc_null() | 82 | const EVP_CIPHER *EVP_enc_null(void) |
87 | { | 83 | { |
88 | return(&n_cipher); | 84 | return(&n_cipher); |
89 | } | 85 | } |
90 | 86 | ||
91 | static void null_init_key(ctx,key,iv,enc) | 87 | static int null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
92 | EVP_CIPHER_CTX *ctx; | 88 | const unsigned char *iv, int enc) |
93 | unsigned char *key; | ||
94 | unsigned char *iv; | ||
95 | int enc; | ||
96 | { | 89 | { |
97 | memset(&(ctx->c),0,sizeof(ctx->c)); | 90 | /* memset(&(ctx->c),0,sizeof(ctx->c));*/ |
91 | return 1; | ||
98 | } | 92 | } |
99 | 93 | ||
100 | static void null_cipher(ctx,out,in,inl) | 94 | static int null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
101 | EVP_CIPHER_CTX *ctx; | 95 | const unsigned char *in, unsigned int inl) |
102 | unsigned char *out; | ||
103 | unsigned char *in; | ||
104 | unsigned int inl; | ||
105 | { | 96 | { |
106 | if (in != out) | 97 | if (in != out) |
107 | memcpy((char *)out,(char *)in,(int)inl); | 98 | memcpy((char *)out,(char *)in,(int)inl); |
99 | return 1; | ||
108 | } | 100 | } |
109 | 101 | ||
diff --git a/src/lib/libcrypto/evp/e_rc2.c b/src/lib/libcrypto/evp/e_rc2.c index 3955c3ef84..4685198e2e 100644 --- a/src/lib/libcrypto/evp/e_rc2.c +++ b/src/lib/libcrypto/evp/e_rc2.c | |||
@@ -56,13 +56,14 @@ | |||
56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
57 | */ | 57 | */ |
58 | 58 | ||
59 | #ifndef NO_RC2 | 59 | #ifndef OPENSSL_NO_RC2 |
60 | 60 | ||
61 | #include <stdio.h> | 61 | #include <stdio.h> |
62 | #include "cryptlib.h" | 62 | #include "cryptlib.h" |
63 | #include <openssl/evp.h> | 63 | #include <openssl/evp.h> |
64 | #include <openssl/objects.h> | 64 | #include <openssl/objects.h> |
65 | #include "evp_locl.h" | 65 | #include "evp_locl.h" |
66 | #include <openssl/rc2.h> | ||
66 | 67 | ||
67 | static int rc2_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 68 | static int rc2_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
68 | const unsigned char *iv,int enc); | 69 | const unsigned char *iv,int enc); |
@@ -72,9 +73,17 @@ static int rc2_set_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type); | |||
72 | static int rc2_get_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type); | 73 | static int rc2_get_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type); |
73 | static int rc2_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr); | 74 | static int rc2_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr); |
74 | 75 | ||
75 | IMPLEMENT_BLOCK_CIPHER(rc2, rc2.ks, RC2, rc2, NID_rc2, | 76 | typedef struct |
77 | { | ||
78 | int key_bits; /* effective key bits */ | ||
79 | RC2_KEY ks; /* key schedule */ | ||
80 | } EVP_RC2_KEY; | ||
81 | |||
82 | #define data(ctx) ((EVP_RC2_KEY *)(ctx)->cipher_data) | ||
83 | |||
84 | IMPLEMENT_BLOCK_CIPHER(rc2, ks, RC2, EVP_RC2_KEY, NID_rc2, | ||
76 | 8, | 85 | 8, |
77 | EVP_RC2_KEY_SIZE, 8, | 86 | RC2_KEY_LENGTH, 8, 64, |
78 | EVP_CIPH_VARIABLE_LENGTH | EVP_CIPH_CTRL_INIT, | 87 | EVP_CIPH_VARIABLE_LENGTH | EVP_CIPH_CTRL_INIT, |
79 | rc2_init_key, NULL, | 88 | rc2_init_key, NULL, |
80 | rc2_set_asn1_type_and_iv, rc2_get_asn1_type_and_iv, | 89 | rc2_set_asn1_type_and_iv, rc2_get_asn1_type_and_iv, |
@@ -84,7 +93,7 @@ IMPLEMENT_BLOCK_CIPHER(rc2, rc2.ks, RC2, rc2, NID_rc2, | |||
84 | #define RC2_64_MAGIC 0x78 | 93 | #define RC2_64_MAGIC 0x78 |
85 | #define RC2_128_MAGIC 0x3a | 94 | #define RC2_128_MAGIC 0x3a |
86 | 95 | ||
87 | static EVP_CIPHER r2_64_cbc_cipher= | 96 | static const EVP_CIPHER r2_64_cbc_cipher= |
88 | { | 97 | { |
89 | NID_rc2_64_cbc, | 98 | NID_rc2_64_cbc, |
90 | 8,8 /* 64 bit */,8, | 99 | 8,8 /* 64 bit */,8, |
@@ -92,15 +101,14 @@ static EVP_CIPHER r2_64_cbc_cipher= | |||
92 | rc2_init_key, | 101 | rc2_init_key, |
93 | rc2_cbc_cipher, | 102 | rc2_cbc_cipher, |
94 | NULL, | 103 | NULL, |
95 | sizeof(EVP_CIPHER_CTX)-sizeof((((EVP_CIPHER_CTX *)NULL)->c))+ | 104 | sizeof(EVP_RC2_KEY), |
96 | sizeof((((EVP_CIPHER_CTX *)NULL)->c.rc2)), | ||
97 | rc2_set_asn1_type_and_iv, | 105 | rc2_set_asn1_type_and_iv, |
98 | rc2_get_asn1_type_and_iv, | 106 | rc2_get_asn1_type_and_iv, |
99 | rc2_ctrl, | 107 | rc2_ctrl, |
100 | NULL | 108 | NULL |
101 | }; | 109 | }; |
102 | 110 | ||
103 | static EVP_CIPHER r2_40_cbc_cipher= | 111 | static const EVP_CIPHER r2_40_cbc_cipher= |
104 | { | 112 | { |
105 | NID_rc2_40_cbc, | 113 | NID_rc2_40_cbc, |
106 | 8,5 /* 40 bit */,8, | 114 | 8,5 /* 40 bit */,8, |
@@ -108,20 +116,19 @@ static EVP_CIPHER r2_40_cbc_cipher= | |||
108 | rc2_init_key, | 116 | rc2_init_key, |
109 | rc2_cbc_cipher, | 117 | rc2_cbc_cipher, |
110 | NULL, | 118 | NULL, |
111 | sizeof(EVP_CIPHER_CTX)-sizeof((((EVP_CIPHER_CTX *)NULL)->c))+ | 119 | sizeof(EVP_RC2_KEY), |
112 | sizeof((((EVP_CIPHER_CTX *)NULL)->c.rc2)), | ||
113 | rc2_set_asn1_type_and_iv, | 120 | rc2_set_asn1_type_and_iv, |
114 | rc2_get_asn1_type_and_iv, | 121 | rc2_get_asn1_type_and_iv, |
115 | rc2_ctrl, | 122 | rc2_ctrl, |
116 | NULL | 123 | NULL |
117 | }; | 124 | }; |
118 | 125 | ||
119 | EVP_CIPHER *EVP_rc2_64_cbc(void) | 126 | const EVP_CIPHER *EVP_rc2_64_cbc(void) |
120 | { | 127 | { |
121 | return(&r2_64_cbc_cipher); | 128 | return(&r2_64_cbc_cipher); |
122 | } | 129 | } |
123 | 130 | ||
124 | EVP_CIPHER *EVP_rc2_40_cbc(void) | 131 | const EVP_CIPHER *EVP_rc2_40_cbc(void) |
125 | { | 132 | { |
126 | return(&r2_40_cbc_cipher); | 133 | return(&r2_40_cbc_cipher); |
127 | } | 134 | } |
@@ -129,8 +136,8 @@ EVP_CIPHER *EVP_rc2_40_cbc(void) | |||
129 | static int rc2_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 136 | static int rc2_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
130 | const unsigned char *iv, int enc) | 137 | const unsigned char *iv, int enc) |
131 | { | 138 | { |
132 | RC2_set_key(&(ctx->c.rc2.ks),EVP_CIPHER_CTX_key_length(ctx), | 139 | RC2_set_key(&data(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx), |
133 | key,ctx->c.rc2.key_bits); | 140 | key,data(ctx)->key_bits); |
134 | return 1; | 141 | return 1; |
135 | } | 142 | } |
136 | 143 | ||
@@ -173,7 +180,7 @@ static int rc2_get_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
173 | key_bits =rc2_magic_to_meth((int)num); | 180 | key_bits =rc2_magic_to_meth((int)num); |
174 | if (!key_bits) | 181 | if (!key_bits) |
175 | return(-1); | 182 | return(-1); |
176 | if(i > 0) EVP_CipherInit(c, NULL, NULL, iv, -1); | 183 | if(i > 0) EVP_CipherInit_ex(c, NULL, NULL, NULL, iv, -1); |
177 | EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_RC2_KEY_BITS, key_bits, NULL); | 184 | EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_RC2_KEY_BITS, key_bits, NULL); |
178 | EVP_CIPHER_CTX_set_key_length(c, key_bits / 8); | 185 | EVP_CIPHER_CTX_set_key_length(c, key_bits / 8); |
179 | } | 186 | } |
@@ -196,26 +203,26 @@ static int rc2_set_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
196 | 203 | ||
197 | static int rc2_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | 204 | static int rc2_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) |
198 | { | 205 | { |
199 | switch(type) { | 206 | switch(type) |
200 | 207 | { | |
201 | case EVP_CTRL_INIT: | 208 | case EVP_CTRL_INIT: |
202 | c->c.rc2.key_bits = EVP_CIPHER_CTX_key_length(c) * 8; | 209 | data(c)->key_bits = EVP_CIPHER_CTX_key_length(c) * 8; |
203 | return 1; | 210 | return 1; |
204 | 211 | ||
205 | case EVP_CTRL_GET_RC2_KEY_BITS: | 212 | case EVP_CTRL_GET_RC2_KEY_BITS: |
206 | *(int *)ptr = c->c.rc2.key_bits; | 213 | *(int *)ptr = data(c)->key_bits; |
207 | return 1; | 214 | return 1; |
208 | 215 | ||
209 | 216 | case EVP_CTRL_SET_RC2_KEY_BITS: | |
210 | case EVP_CTRL_SET_RC2_KEY_BITS: | 217 | if(arg > 0) |
211 | if(arg > 0) { | 218 | { |
212 | c->c.rc2.key_bits = arg; | 219 | data(c)->key_bits = arg; |
213 | return 1; | 220 | return 1; |
214 | } | 221 | } |
215 | return 0; | 222 | return 0; |
216 | 223 | ||
217 | default: | 224 | default: |
218 | return -1; | 225 | return -1; |
219 | } | 226 | } |
220 | } | 227 | } |
221 | 228 | ||
diff --git a/src/lib/libcrypto/evp/e_rc4.c b/src/lib/libcrypto/evp/e_rc4.c index 7e9790a94c..4064cc5fa0 100644 --- a/src/lib/libcrypto/evp/e_rc4.c +++ b/src/lib/libcrypto/evp/e_rc4.c | |||
@@ -56,72 +56,81 @@ | |||
56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
57 | */ | 57 | */ |
58 | 58 | ||
59 | #ifndef NO_RC4 | 59 | #ifndef OPENSSL_NO_RC4 |
60 | 60 | ||
61 | #include <stdio.h> | 61 | #include <stdio.h> |
62 | #include "cryptlib.h" | 62 | #include "cryptlib.h" |
63 | #include "evp.h" | 63 | #include <openssl/evp.h> |
64 | #include "objects.h" | 64 | #include <openssl/objects.h> |
65 | #include <openssl/rc4.h> | ||
65 | 66 | ||
66 | #ifndef NOPROTO | 67 | /* FIXME: surely this is available elsewhere? */ |
67 | static void rc4_init_key(EVP_CIPHER_CTX *ctx, unsigned char *key, | 68 | #define EVP_RC4_KEY_SIZE 16 |
68 | unsigned char *iv,int enc); | 69 | |
69 | static void rc4_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 70 | typedef struct |
70 | unsigned char *in, unsigned int inl); | 71 | { |
71 | #else | 72 | /* FIXME: what is the key for? */ |
72 | static void rc4_init_key(); | 73 | unsigned char key[EVP_RC4_KEY_SIZE]; |
73 | static void rc4_cipher(); | 74 | RC4_KEY ks; /* working key */ |
74 | #endif | 75 | } EVP_RC4_KEY; |
76 | |||
77 | #define data(ctx) ((EVP_RC4_KEY *)(ctx)->cipher_data) | ||
75 | 78 | ||
76 | static EVP_CIPHER r4_cipher= | 79 | static int rc4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
80 | const unsigned char *iv,int enc); | ||
81 | static int rc4_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
82 | const unsigned char *in, unsigned int inl); | ||
83 | static const EVP_CIPHER r4_cipher= | ||
77 | { | 84 | { |
78 | NID_rc4, | 85 | NID_rc4, |
79 | 1,EVP_RC4_KEY_SIZE,0, | 86 | 1,EVP_RC4_KEY_SIZE,0, |
87 | EVP_CIPH_VARIABLE_LENGTH, | ||
80 | rc4_init_key, | 88 | rc4_init_key, |
81 | rc4_cipher, | 89 | rc4_cipher, |
82 | NULL, | 90 | NULL, |
83 | sizeof(EVP_CIPHER_CTX)-sizeof((((EVP_CIPHER_CTX *)NULL)->c))+ | 91 | sizeof(EVP_RC4_KEY), |
84 | sizeof((((EVP_CIPHER_CTX *)NULL)->c.rc4)), | ||
85 | NULL, | 92 | NULL, |
86 | NULL, | 93 | NULL, |
94 | NULL | ||
87 | }; | 95 | }; |
88 | 96 | ||
89 | static EVP_CIPHER r4_40_cipher= | 97 | static const EVP_CIPHER r4_40_cipher= |
90 | { | 98 | { |
91 | NID_rc4_40, | 99 | NID_rc4_40, |
92 | 1,5 /* 40 bit */,0, | 100 | 1,5 /* 40 bit */,0, |
101 | EVP_CIPH_VARIABLE_LENGTH, | ||
93 | rc4_init_key, | 102 | rc4_init_key, |
94 | rc4_cipher, | 103 | rc4_cipher, |
104 | NULL, | ||
105 | sizeof(EVP_RC4_KEY), | ||
106 | NULL, | ||
107 | NULL, | ||
108 | NULL | ||
95 | }; | 109 | }; |
96 | 110 | ||
97 | EVP_CIPHER *EVP_rc4() | 111 | const EVP_CIPHER *EVP_rc4(void) |
98 | { | 112 | { |
99 | return(&r4_cipher); | 113 | return(&r4_cipher); |
100 | } | 114 | } |
101 | 115 | ||
102 | EVP_CIPHER *EVP_rc4_40() | 116 | const EVP_CIPHER *EVP_rc4_40(void) |
103 | { | 117 | { |
104 | return(&r4_40_cipher); | 118 | return(&r4_40_cipher); |
105 | } | 119 | } |
106 | 120 | ||
107 | static void rc4_init_key(ctx,key,iv,enc) | 121 | static int rc4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
108 | EVP_CIPHER_CTX *ctx; | 122 | const unsigned char *iv, int enc) |
109 | unsigned char *key; | ||
110 | unsigned char *iv; | ||
111 | int enc; | ||
112 | { | 123 | { |
113 | if (key != NULL) | 124 | memcpy(&data(ctx)->key[0],key,EVP_CIPHER_CTX_key_length(ctx)); |
114 | memcpy(&(ctx->c.rc4.key[0]),key,EVP_CIPHER_CTX_key_length(ctx)); | 125 | RC4_set_key(&data(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx), |
115 | RC4_set_key(&(ctx->c.rc4.ks),EVP_CIPHER_CTX_key_length(ctx), | 126 | data(ctx)->key); |
116 | ctx->c.rc4.key); | 127 | return 1; |
117 | } | 128 | } |
118 | 129 | ||
119 | static void rc4_cipher(ctx,out,in,inl) | 130 | static int rc4_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
120 | EVP_CIPHER_CTX *ctx; | 131 | const unsigned char *in, unsigned int inl) |
121 | unsigned char *out; | ||
122 | unsigned char *in; | ||
123 | unsigned int inl; | ||
124 | { | 132 | { |
125 | RC4(&(ctx->c.rc4.ks),inl,in,out); | 133 | RC4(&data(ctx)->ks,inl,in,out); |
134 | return 1; | ||
126 | } | 135 | } |
127 | #endif | 136 | #endif |
diff --git a/src/lib/libcrypto/evp/e_xcbc_d.c b/src/lib/libcrypto/evp/e_xcbc_d.c index 0d7fda0c47..a6f849e93d 100644 --- a/src/lib/libcrypto/evp/e_xcbc_d.c +++ b/src/lib/libcrypto/evp/e_xcbc_d.c | |||
@@ -56,67 +56,67 @@ | |||
56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
57 | */ | 57 | */ |
58 | 58 | ||
59 | #ifndef OPENSSL_NO_DES | ||
59 | #include <stdio.h> | 60 | #include <stdio.h> |
60 | #include "cryptlib.h" | 61 | #include "cryptlib.h" |
61 | #include "evp.h" | 62 | #include <openssl/evp.h> |
62 | #include "objects.h" | 63 | #include <openssl/objects.h> |
64 | #include <openssl/des.h> | ||
63 | 65 | ||
64 | #ifndef NOPROTO | 66 | static int desx_cbc_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
65 | static void desx_cbc_init_key(EVP_CIPHER_CTX *ctx, unsigned char *key, | 67 | const unsigned char *iv,int enc); |
66 | unsigned char *iv,int enc); | 68 | static int desx_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
67 | static void desx_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 69 | const unsigned char *in, unsigned int inl); |
68 | unsigned char *in, unsigned int inl); | 70 | |
69 | #else | 71 | |
70 | static void desx_cbc_init_key(); | 72 | typedef struct |
71 | static void desx_cbc_cipher(); | 73 | { |
72 | #endif | 74 | DES_key_schedule ks;/* key schedule */ |
75 | DES_cblock inw; | ||
76 | DES_cblock outw; | ||
77 | } DESX_CBC_KEY; | ||
78 | |||
79 | #define data(ctx) ((DESX_CBC_KEY *)(ctx)->cipher_data) | ||
73 | 80 | ||
74 | static EVP_CIPHER d_xcbc_cipher= | 81 | static const EVP_CIPHER d_xcbc_cipher= |
75 | { | 82 | { |
76 | NID_desx_cbc, | 83 | NID_desx_cbc, |
77 | 8,24,8, | 84 | 8,24,8, |
85 | EVP_CIPH_CBC_MODE, | ||
78 | desx_cbc_init_key, | 86 | desx_cbc_init_key, |
79 | desx_cbc_cipher, | 87 | desx_cbc_cipher, |
80 | NULL, | 88 | NULL, |
81 | sizeof(EVP_CIPHER_CTX)-sizeof((((EVP_CIPHER_CTX *)NULL)->c))+ | 89 | sizeof(DESX_CBC_KEY), |
82 | sizeof((((EVP_CIPHER_CTX *)NULL)->c.desx_cbc)), | ||
83 | EVP_CIPHER_set_asn1_iv, | 90 | EVP_CIPHER_set_asn1_iv, |
84 | EVP_CIPHER_get_asn1_iv, | 91 | EVP_CIPHER_get_asn1_iv, |
92 | NULL | ||
85 | }; | 93 | }; |
86 | 94 | ||
87 | EVP_CIPHER *EVP_desx_cbc() | 95 | const EVP_CIPHER *EVP_desx_cbc(void) |
88 | { | 96 | { |
89 | return(&d_xcbc_cipher); | 97 | return(&d_xcbc_cipher); |
90 | } | 98 | } |
91 | 99 | ||
92 | static void desx_cbc_init_key(ctx,key,iv,enc) | 100 | static int desx_cbc_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
93 | EVP_CIPHER_CTX *ctx; | 101 | const unsigned char *iv, int enc) |
94 | unsigned char *key; | ||
95 | unsigned char *iv; | ||
96 | int enc; | ||
97 | { | 102 | { |
98 | if (iv != NULL) | 103 | DES_cblock *deskey = (DES_cblock *)key; |
99 | memcpy(&(ctx->oiv[0]),iv,8); | 104 | |
100 | memcpy(&(ctx->iv[0]),&(ctx->oiv[0]),8); | 105 | DES_set_key_unchecked(deskey,&data(ctx)->ks); |
101 | if (key != NULL) | 106 | memcpy(&data(ctx)->inw[0],&key[8],8); |
102 | { | 107 | memcpy(&data(ctx)->outw[0],&key[16],8); |
103 | des_set_key((des_cblock *)key,ctx->c.desx_cbc.ks); | 108 | |
104 | memcpy(&(ctx->c.desx_cbc.inw[0]),&(key[8]),8); | 109 | return 1; |
105 | memcpy(&(ctx->c.desx_cbc.outw[0]),&(key[16]),8); | ||
106 | } | ||
107 | } | 110 | } |
108 | 111 | ||
109 | static void desx_cbc_cipher(ctx,out,in,inl) | 112 | static int desx_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
110 | EVP_CIPHER_CTX *ctx; | 113 | const unsigned char *in, unsigned int inl) |
111 | unsigned char *out; | ||
112 | unsigned char *in; | ||
113 | unsigned int inl; | ||
114 | { | 114 | { |
115 | des_xcbc_encrypt( | 115 | DES_xcbc_encrypt(in,out,inl,&data(ctx)->ks, |
116 | (des_cblock *)in,(des_cblock *)out, | 116 | (DES_cblock *)&(ctx->iv[0]), |
117 | (long)inl, ctx->c.desx_cbc.ks, | 117 | &data(ctx)->inw, |
118 | (des_cblock *)&(ctx->iv[0]), | 118 | &data(ctx)->outw, |
119 | (des_cblock *)&(ctx->c.desx_cbc.inw[0]), | 119 | ctx->encrypt); |
120 | (des_cblock *)&(ctx->c.desx_cbc.outw[0]), | 120 | return 1; |
121 | ctx->encrypt); | ||
122 | } | 121 | } |
122 | #endif | ||
diff --git a/src/lib/libcrypto/evp/encode.c b/src/lib/libcrypto/evp/encode.c index 14d47c1eed..12c6379df1 100644 --- a/src/lib/libcrypto/evp/encode.c +++ b/src/lib/libcrypto/evp/encode.c | |||
@@ -58,10 +58,21 @@ | |||
58 | 58 | ||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
61 | #include "evp.h" | 61 | #include <openssl/evp.h> |
62 | 62 | ||
63 | #ifndef CHARSET_EBCDIC | ||
63 | #define conv_bin2ascii(a) (data_bin2ascii[(a)&0x3f]) | 64 | #define conv_bin2ascii(a) (data_bin2ascii[(a)&0x3f]) |
64 | #define conv_ascii2bin(a) (data_ascii2bin[(a)&0x7f]) | 65 | #define conv_ascii2bin(a) (data_ascii2bin[(a)&0x7f]) |
66 | #else | ||
67 | /* We assume that PEM encoded files are EBCDIC files | ||
68 | * (i.e., printable text files). Convert them here while decoding. | ||
69 | * When encoding, output is EBCDIC (text) format again. | ||
70 | * (No need for conversion in the conv_bin2ascii macro, as the | ||
71 | * underlying textstring data_bin2ascii[] is already EBCDIC) | ||
72 | */ | ||
73 | #define conv_bin2ascii(a) (data_bin2ascii[(a)&0x3f]) | ||
74 | #define conv_ascii2bin(a) (data_ascii2bin[os_toascii[a]&0x7f]) | ||
75 | #endif | ||
65 | 76 | ||
66 | /* 64 char lines | 77 | /* 64 char lines |
67 | * pad input with 0 | 78 | * pad input with 0 |
@@ -110,20 +121,15 @@ static unsigned char data_ascii2bin[128]={ | |||
110 | 0x31,0x32,0x33,0xFF,0xFF,0xFF,0xFF,0xFF, | 121 | 0x31,0x32,0x33,0xFF,0xFF,0xFF,0xFF,0xFF, |
111 | }; | 122 | }; |
112 | 123 | ||
113 | void EVP_EncodeInit(ctx) | 124 | void EVP_EncodeInit(EVP_ENCODE_CTX *ctx) |
114 | EVP_ENCODE_CTX *ctx; | ||
115 | { | 125 | { |
116 | ctx->length=48; | 126 | ctx->length=48; |
117 | ctx->num=0; | 127 | ctx->num=0; |
118 | ctx->line_num=0; | 128 | ctx->line_num=0; |
119 | } | 129 | } |
120 | 130 | ||
121 | void EVP_EncodeUpdate(ctx,out,outl,in,inl) | 131 | void EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, |
122 | EVP_ENCODE_CTX *ctx; | 132 | unsigned char *in, int inl) |
123 | unsigned char *out; | ||
124 | int *outl; | ||
125 | unsigned char *in; | ||
126 | int inl; | ||
127 | { | 133 | { |
128 | int i,j; | 134 | int i,j; |
129 | unsigned int total=0; | 135 | unsigned int total=0; |
@@ -165,10 +171,7 @@ int inl; | |||
165 | *outl=total; | 171 | *outl=total; |
166 | } | 172 | } |
167 | 173 | ||
168 | void EVP_EncodeFinal(ctx,out,outl) | 174 | void EVP_EncodeFinal(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl) |
169 | EVP_ENCODE_CTX *ctx; | ||
170 | unsigned char *out; | ||
171 | int *outl; | ||
172 | { | 175 | { |
173 | unsigned int ret=0; | 176 | unsigned int ret=0; |
174 | 177 | ||
@@ -182,9 +185,7 @@ int *outl; | |||
182 | *outl=ret; | 185 | *outl=ret; |
183 | } | 186 | } |
184 | 187 | ||
185 | int EVP_EncodeBlock(t,f,dlen) | 188 | int EVP_EncodeBlock(unsigned char *t, const unsigned char *f, int dlen) |
186 | unsigned char *t,*f; | ||
187 | int dlen; | ||
188 | { | 189 | { |
189 | int i,ret=0; | 190 | int i,ret=0; |
190 | unsigned long l; | 191 | unsigned long l; |
@@ -218,8 +219,7 @@ int dlen; | |||
218 | return(ret); | 219 | return(ret); |
219 | } | 220 | } |
220 | 221 | ||
221 | void EVP_DecodeInit(ctx) | 222 | void EVP_DecodeInit(EVP_ENCODE_CTX *ctx) |
222 | EVP_ENCODE_CTX *ctx; | ||
223 | { | 223 | { |
224 | ctx->length=30; | 224 | ctx->length=30; |
225 | ctx->num=0; | 225 | ctx->num=0; |
@@ -231,12 +231,8 @@ EVP_ENCODE_CTX *ctx; | |||
231 | * 0 for last line | 231 | * 0 for last line |
232 | * 1 for full line | 232 | * 1 for full line |
233 | */ | 233 | */ |
234 | int EVP_DecodeUpdate(ctx,out,outl,in,inl) | 234 | int EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, |
235 | EVP_ENCODE_CTX *ctx; | 235 | unsigned char *in, int inl) |
236 | unsigned char *out; | ||
237 | int *outl; | ||
238 | unsigned char *in; | ||
239 | int inl; | ||
240 | { | 236 | { |
241 | int seof= -1,eof=0,rv= -1,ret=0,i,v,tmp,n,ln,tmp2,exp_nl; | 237 | int seof= -1,eof=0,rv= -1,ret=0,i,v,tmp,n,ln,tmp2,exp_nl; |
242 | unsigned char *d; | 238 | unsigned char *d; |
@@ -281,6 +277,13 @@ int inl; | |||
281 | eof++; | 277 | eof++; |
282 | } | 278 | } |
283 | 279 | ||
280 | if (v == B64_CR) | ||
281 | { | ||
282 | ln = 0; | ||
283 | if (exp_nl) | ||
284 | continue; | ||
285 | } | ||
286 | |||
284 | /* eoln */ | 287 | /* eoln */ |
285 | if (v == B64_EOLN) | 288 | if (v == B64_EOLN) |
286 | { | 289 | { |
@@ -296,7 +299,17 @@ int inl; | |||
296 | /* If we are at the end of input and it looks like a | 299 | /* If we are at the end of input and it looks like a |
297 | * line, process it. */ | 300 | * line, process it. */ |
298 | if (((i+1) == inl) && (((n&3) == 0) || eof)) | 301 | if (((i+1) == inl) && (((n&3) == 0) || eof)) |
302 | { | ||
299 | v=B64_EOF; | 303 | v=B64_EOF; |
304 | /* In case things were given us in really small | ||
305 | records (so two '=' were given in separate | ||
306 | updates), eof may contain the incorrect number | ||
307 | of ending bytes to skip, so let's redo the count */ | ||
308 | eof = 0; | ||
309 | if (d[n-1] == '=') eof++; | ||
310 | if (d[n-2] == '=') eof++; | ||
311 | /* There will never be more than two '=' */ | ||
312 | } | ||
300 | 313 | ||
301 | if ((v == B64_EOF) || (n >= 64)) | 314 | if ((v == B64_EOF) || (n >= 64)) |
302 | { | 315 | { |
@@ -341,9 +354,7 @@ end: | |||
341 | return(rv); | 354 | return(rv); |
342 | } | 355 | } |
343 | 356 | ||
344 | int EVP_DecodeBlock(t,f,n) | 357 | int EVP_DecodeBlock(unsigned char *t, const unsigned char *f, int n) |
345 | unsigned char *t,*f; | ||
346 | int n; | ||
347 | { | 358 | { |
348 | int i,ret=0,a,b,c,d; | 359 | int i,ret=0,a,b,c,d; |
349 | unsigned long l; | 360 | unsigned long l; |
@@ -383,10 +394,7 @@ int n; | |||
383 | return(ret); | 394 | return(ret); |
384 | } | 395 | } |
385 | 396 | ||
386 | int EVP_DecodeFinal(ctx,out,outl) | 397 | int EVP_DecodeFinal(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl) |
387 | EVP_ENCODE_CTX *ctx; | ||
388 | unsigned char *out; | ||
389 | int *outl; | ||
390 | { | 398 | { |
391 | int i; | 399 | int i; |
392 | 400 | ||
@@ -404,9 +412,7 @@ int *outl; | |||
404 | } | 412 | } |
405 | 413 | ||
406 | #ifdef undef | 414 | #ifdef undef |
407 | int EVP_DecodeValid(buf,len) | 415 | int EVP_DecodeValid(unsigned char *buf, int len) |
408 | unsigned char *buf; | ||
409 | int len; | ||
410 | { | 416 | { |
411 | int i,num=0,bad=0; | 417 | int i,num=0,bad=0; |
412 | 418 | ||
diff --git a/src/lib/libcrypto/evp/evp.h b/src/lib/libcrypto/evp/evp.h index b39fad93a4..fb16de6852 100644 --- a/src/lib/libcrypto/evp/evp.h +++ b/src/lib/libcrypto/evp/evp.h | |||
@@ -59,75 +59,39 @@ | |||
59 | #ifndef HEADER_ENVELOPE_H | 59 | #ifndef HEADER_ENVELOPE_H |
60 | #define HEADER_ENVELOPE_H | 60 | #define HEADER_ENVELOPE_H |
61 | 61 | ||
62 | #ifdef __cplusplus | 62 | #ifdef OPENSSL_ALGORITHM_DEFINES |
63 | extern "C" { | 63 | # include <openssl/opensslconf.h> |
64 | #else | ||
65 | # define OPENSSL_ALGORITHM_DEFINES | ||
66 | # include <openssl/opensslconf.h> | ||
67 | # undef OPENSSL_ALGORITHM_DEFINES | ||
64 | #endif | 68 | #endif |
65 | 69 | ||
66 | #ifndef NO_MD2 | 70 | #include <openssl/ossl_typ.h> |
67 | #include "md2.h" | 71 | |
68 | #endif | 72 | #include <openssl/symhacks.h> |
69 | #ifndef NO_MD5 | 73 | |
70 | #include "md5.h" | 74 | #ifndef OPENSSL_NO_BIO |
71 | #endif | 75 | #include <openssl/bio.h> |
72 | #if !defined(NO_SHA) || !defined(NO_SHA1) | ||
73 | #include "sha.h" | ||
74 | #endif | ||
75 | #ifndef NO_RIPEMD | ||
76 | #include "ripemd.h" | ||
77 | #endif | ||
78 | #ifndef NO_DES | ||
79 | #include "des.h" | ||
80 | #endif | ||
81 | #ifndef NO_RC4 | ||
82 | #include "rc4.h" | ||
83 | #endif | ||
84 | #ifndef NO_RC2 | ||
85 | #include "rc2.h" | ||
86 | #endif | ||
87 | #ifndef NO_RC5 | ||
88 | #include "rc5.h" | ||
89 | #endif | ||
90 | #ifndef NO_BLOWFISH | ||
91 | #include "blowfish.h" | ||
92 | #endif | ||
93 | #ifndef NO_CAST | ||
94 | #include "cast.h" | ||
95 | #endif | ||
96 | #ifndef NO_IDEA | ||
97 | #include "idea.h" | ||
98 | #endif | ||
99 | #ifndef NO_MDC2 | ||
100 | #include "mdc2.h" | ||
101 | #endif | 76 | #endif |
102 | 77 | ||
78 | /* | ||
103 | #define EVP_RC2_KEY_SIZE 16 | 79 | #define EVP_RC2_KEY_SIZE 16 |
104 | #define EVP_RC4_KEY_SIZE 16 | 80 | #define EVP_RC4_KEY_SIZE 16 |
105 | #define EVP_BLOWFISH_KEY_SIZE 16 | 81 | #define EVP_BLOWFISH_KEY_SIZE 16 |
106 | #define EVP_CAST5_KEY_SIZE 16 | 82 | #define EVP_CAST5_KEY_SIZE 16 |
107 | #define EVP_RC5_32_12_16_KEY_SIZE 16 | 83 | #define EVP_RC5_32_12_16_KEY_SIZE 16 |
84 | */ | ||
108 | #define EVP_MAX_MD_SIZE (16+20) /* The SSLv3 md5+sha1 type */ | 85 | #define EVP_MAX_MD_SIZE (16+20) /* The SSLv3 md5+sha1 type */ |
109 | #define EVP_MAX_KEY_LENGTH 24 | 86 | #define EVP_MAX_KEY_LENGTH 32 |
110 | #define EVP_MAX_IV_LENGTH 8 | 87 | #define EVP_MAX_IV_LENGTH 16 |
111 | 88 | #define EVP_MAX_BLOCK_LENGTH 32 | |
112 | #ifndef NO_RSA | ||
113 | #include "rsa.h" | ||
114 | #else | ||
115 | #define RSA long | ||
116 | #endif | ||
117 | |||
118 | #ifndef NO_DSA | ||
119 | #include "dsa.h" | ||
120 | #else | ||
121 | #define DSA long | ||
122 | #endif | ||
123 | 89 | ||
124 | #ifndef NO_DH | 90 | #define PKCS5_SALT_LEN 8 |
125 | #include "dh.h" | 91 | /* Default PKCS#5 iteration count */ |
126 | #else | 92 | #define PKCS5_DEFAULT_ITER 2048 |
127 | #define DH long | ||
128 | #endif | ||
129 | 93 | ||
130 | #include "objects.h" | 94 | #include <openssl/objects.h> |
131 | 95 | ||
132 | #define EVP_PK_RSA 0x0001 | 96 | #define EVP_PK_RSA 0x0001 |
133 | #define EVP_PK_DSA 0x0002 | 97 | #define EVP_PK_DSA 0x0002 |
@@ -149,27 +113,33 @@ extern "C" { | |||
149 | #define EVP_PKEY_DSA4 NID_dsaWithSHA1_2 | 113 | #define EVP_PKEY_DSA4 NID_dsaWithSHA1_2 |
150 | #define EVP_PKEY_DH NID_dhKeyAgreement | 114 | #define EVP_PKEY_DH NID_dhKeyAgreement |
151 | 115 | ||
116 | #ifdef __cplusplus | ||
117 | extern "C" { | ||
118 | #endif | ||
119 | |||
152 | /* Type needs to be a bit field | 120 | /* Type needs to be a bit field |
153 | * Sub-type needs to be for variations on the method, as in, can it do | 121 | * Sub-type needs to be for variations on the method, as in, can it do |
154 | * arbitary encryption.... */ | 122 | * arbitrary encryption.... */ |
155 | typedef struct evp_pkey_st | 123 | struct evp_pkey_st |
156 | { | 124 | { |
157 | int type; | 125 | int type; |
158 | int save_type; | 126 | int save_type; |
159 | int references; | 127 | int references; |
160 | union { | 128 | union { |
161 | char *ptr; | 129 | char *ptr; |
130 | #ifndef OPENSSL_NO_RSA | ||
162 | struct rsa_st *rsa; /* RSA */ | 131 | struct rsa_st *rsa; /* RSA */ |
132 | #endif | ||
133 | #ifndef OPENSSL_NO_DSA | ||
163 | struct dsa_st *dsa; /* DSA */ | 134 | struct dsa_st *dsa; /* DSA */ |
135 | #endif | ||
136 | #ifndef OPENSSL_NO_DH | ||
164 | struct dh_st *dh; /* DH */ | 137 | struct dh_st *dh; /* DH */ |
138 | #endif | ||
165 | } pkey; | 139 | } pkey; |
166 | int save_parameters; | 140 | int save_parameters; |
167 | #ifdef HEADER_STACK_H | 141 | STACK_OF(X509_ATTRIBUTE) *attributes; /* [ 0 ] */ |
168 | STACK /* X509_ATTRIBUTE */ *attributes; /* [ 0 ] */ | 142 | } /* EVP_PKEY */; |
169 | #else | ||
170 | char /* X509_ATTRIBUTE */ *attributes; /* [ 0 ] */ | ||
171 | #endif | ||
172 | } EVP_PKEY; | ||
173 | 143 | ||
174 | #define EVP_PKEY_MO_SIGN 0x0001 | 144 | #define EVP_PKEY_MO_SIGN 0x0001 |
175 | #define EVP_PKEY_MO_VERIFY 0x0002 | 145 | #define EVP_PKEY_MO_VERIFY 0x0002 |
@@ -183,7 +153,7 @@ typedef struct evp_pkey_st | |||
183 | * This is required because for various smart-card perform the digest and | 153 | * This is required because for various smart-card perform the digest and |
184 | * signing/verification on-board. To handle this case, the specific | 154 | * signing/verification on-board. To handle this case, the specific |
185 | * EVP_MD and EVP_PKEY_METHODs need to be closely associated. | 155 | * EVP_MD and EVP_PKEY_METHODs need to be closely associated. |
186 | * When a PKEY is created, it will have a EVP_PKEY_METHOD ossociated with it. | 156 | * When a PKEY is created, it will have a EVP_PKEY_METHOD associated with it. |
187 | * This can either be software or a token to provide the required low level | 157 | * This can either be software or a token to provide the required low level |
188 | * routines. | 158 | * routines. |
189 | */ | 159 | */ |
@@ -194,28 +164,28 @@ typedef struct evp_pkey_md_st | |||
194 | EVP_PKEY_METHOD *pkey; | 164 | EVP_PKEY_METHOD *pkey; |
195 | } EVP_PKEY_MD; | 165 | } EVP_PKEY_MD; |
196 | 166 | ||
197 | #define EVP_rsa_md2() | 167 | #define EVP_rsa_md2() \ |
198 | EVP_PKEY_MD_add(NID_md2WithRSAEncryption,\ | 168 | EVP_PKEY_MD_add(NID_md2WithRSAEncryption,\ |
199 | EVP_rsa_pkcs1(),EVP_md2()) | 169 | EVP_rsa_pkcs1(),EVP_md2()) |
200 | #define EVP_rsa_md5() | 170 | #define EVP_rsa_md5() \ |
201 | EVP_PKEY_MD_add(NID_md5WithRSAEncryption,\ | 171 | EVP_PKEY_MD_add(NID_md5WithRSAEncryption,\ |
202 | EVP_rsa_pkcs1(),EVP_md5()) | 172 | EVP_rsa_pkcs1(),EVP_md5()) |
203 | #define EVP_rsa_sha0() | 173 | #define EVP_rsa_sha0() \ |
204 | EVP_PKEY_MD_add(NID_shaWithRSAEncryption,\ | 174 | EVP_PKEY_MD_add(NID_shaWithRSAEncryption,\ |
205 | EVP_rsa_pkcs1(),EVP_sha()) | 175 | EVP_rsa_pkcs1(),EVP_sha()) |
206 | #define EVP_rsa_sha1() | 176 | #define EVP_rsa_sha1() \ |
207 | EVP_PKEY_MD_add(NID_sha1WithRSAEncryption,\ | 177 | EVP_PKEY_MD_add(NID_sha1WithRSAEncryption,\ |
208 | EVP_rsa_pkcs1(),EVP_sha1()) | 178 | EVP_rsa_pkcs1(),EVP_sha1()) |
209 | #define EVP_rsa_ripemd160() | 179 | #define EVP_rsa_ripemd160() \ |
210 | EVP_PKEY_MD_add(NID_ripemd160WithRSA,\ | 180 | EVP_PKEY_MD_add(NID_ripemd160WithRSA,\ |
211 | EVP_rsa_pkcs1(),EVP_ripemd160()) | 181 | EVP_rsa_pkcs1(),EVP_ripemd160()) |
212 | #define EVP_rsa_mdc2() | 182 | #define EVP_rsa_mdc2() \ |
213 | EVP_PKEY_MD_add(NID_mdc2WithRSA,\ | 183 | EVP_PKEY_MD_add(NID_mdc2WithRSA,\ |
214 | EVP_rsa_octet_string(),EVP_mdc2()) | 184 | EVP_rsa_octet_string(),EVP_mdc2()) |
215 | #define EVP_dsa_sha() | 185 | #define EVP_dsa_sha() \ |
216 | EVP_PKEY_MD_add(NID_dsaWithSHA,\ | 186 | EVP_PKEY_MD_add(NID_dsaWithSHA,\ |
217 | EVP_dsa(),EVP_mdc2()) | 187 | EVP_dsa(),EVP_sha()) |
218 | #define EVP_dsa_sha1() | 188 | #define EVP_dsa_sha1() \ |
219 | EVP_PKEY_MD_add(NID_dsaWithSHA1,\ | 189 | EVP_PKEY_MD_add(NID_dsaWithSHA1,\ |
220 | EVP_dsa(),EVP_sha1()) | 190 | EVP_dsa(),EVP_sha1()) |
221 | 191 | ||
@@ -230,7 +200,6 @@ typedef struct evp_pkey_method_st | |||
230 | int (*sign)(); | 200 | int (*sign)(); |
231 | int (*verify)(); | 201 | int (*verify)(); |
232 | struct { | 202 | struct { |
233 | int | ||
234 | int (*set)(); /* get and/or set the underlying type */ | 203 | int (*set)(); /* get and/or set the underlying type */ |
235 | int (*get)(); | 204 | int (*get)(); |
236 | int (*encrypt)(); | 205 | int (*encrypt)(); |
@@ -245,25 +214,32 @@ typedef struct evp_pkey_method_st | |||
245 | #endif | 214 | #endif |
246 | 215 | ||
247 | #ifndef EVP_MD | 216 | #ifndef EVP_MD |
248 | typedef struct env_md_st | 217 | struct env_md_st |
249 | { | 218 | { |
250 | int type; | 219 | int type; |
251 | int pkey_type; | 220 | int pkey_type; |
252 | int md_size; | 221 | int md_size; |
253 | void (*init)(); | 222 | unsigned long flags; |
254 | void (*update)(); | 223 | int (*init)(EVP_MD_CTX *ctx); |
255 | void (*final)(); | 224 | int (*update)(EVP_MD_CTX *ctx,const void *data,unsigned long count); |
256 | 225 | int (*final)(EVP_MD_CTX *ctx,unsigned char *md); | |
226 | int (*copy)(EVP_MD_CTX *to,const EVP_MD_CTX *from); | ||
227 | int (*cleanup)(EVP_MD_CTX *ctx); | ||
228 | |||
229 | /* FIXME: prototype these some day */ | ||
257 | int (*sign)(); | 230 | int (*sign)(); |
258 | int (*verify)(); | 231 | int (*verify)(); |
259 | int required_pkey_type[5]; /*EVP_PKEY_xxx */ | 232 | int required_pkey_type[5]; /*EVP_PKEY_xxx */ |
260 | int block_size; | 233 | int block_size; |
261 | int ctx_size; /* how big does the ctx need to be */ | 234 | int ctx_size; /* how big does the ctx->md_data need to be */ |
262 | } EVP_MD; | 235 | } /* EVP_MD */; |
236 | |||
237 | #define EVP_MD_FLAG_ONESHOT 0x0001 /* digest can only handle a single | ||
238 | * block */ | ||
263 | 239 | ||
264 | #define EVP_PKEY_NULL_method NULL,NULL,{0,0,0,0} | 240 | #define EVP_PKEY_NULL_method NULL,NULL,{0,0,0,0} |
265 | 241 | ||
266 | #ifndef NO_DSA | 242 | #ifndef OPENSSL_NO_DSA |
267 | #define EVP_PKEY_DSA_method DSA_sign,DSA_verify, \ | 243 | #define EVP_PKEY_DSA_method DSA_sign,DSA_verify, \ |
268 | {EVP_PKEY_DSA,EVP_PKEY_DSA2,EVP_PKEY_DSA3, \ | 244 | {EVP_PKEY_DSA,EVP_PKEY_DSA2,EVP_PKEY_DSA3, \ |
269 | EVP_PKEY_DSA4,0} | 245 | EVP_PKEY_DSA4,0} |
@@ -271,7 +247,7 @@ typedef struct env_md_st | |||
271 | #define EVP_PKEY_DSA_method EVP_PKEY_NULL_method | 247 | #define EVP_PKEY_DSA_method EVP_PKEY_NULL_method |
272 | #endif | 248 | #endif |
273 | 249 | ||
274 | #ifndef NO_RSA | 250 | #ifndef OPENSSL_NO_RSA |
275 | #define EVP_PKEY_RSA_method RSA_sign,RSA_verify, \ | 251 | #define EVP_PKEY_RSA_method RSA_sign,RSA_verify, \ |
276 | {EVP_PKEY_RSA,EVP_PKEY_RSA2,0,0} | 252 | {EVP_PKEY_RSA,EVP_PKEY_RSA2,0,0} |
277 | #define EVP_PKEY_RSA_ASN1_OCTET_STRING_method \ | 253 | #define EVP_PKEY_RSA_ASN1_OCTET_STRING_method \ |
@@ -285,103 +261,98 @@ typedef struct env_md_st | |||
285 | 261 | ||
286 | #endif /* !EVP_MD */ | 262 | #endif /* !EVP_MD */ |
287 | 263 | ||
288 | typedef struct env_md_ctx_st | 264 | struct env_md_ctx_st |
289 | { | 265 | { |
290 | EVP_MD *digest; | 266 | const EVP_MD *digest; |
291 | union { | 267 | ENGINE *engine; /* functional reference if 'digest' is ENGINE-provided */ |
292 | unsigned char base[4]; | 268 | unsigned long flags; |
293 | #ifndef NO_MD2 | 269 | void *md_data; |
294 | MD2_CTX md2; | 270 | } /* EVP_MD_CTX */; |
295 | #endif | 271 | |
296 | #ifndef NO_MD5 | 272 | /* values for EVP_MD_CTX flags */ |
297 | MD5_CTX md5; | ||
298 | #endif | ||
299 | #ifndef NO_MD5 | ||
300 | RIPEMD160_CTX ripemd160; | ||
301 | #endif | ||
302 | #if !defined(NO_SHA) || !defined(NO_SHA1) | ||
303 | SHA_CTX sha; | ||
304 | #endif | ||
305 | #ifndef NO_MDC2 | ||
306 | MDC2_CTX mdc2; | ||
307 | #endif | ||
308 | } md; | ||
309 | } EVP_MD_CTX; | ||
310 | 273 | ||
311 | typedef struct evp_cipher_st | 274 | #define EVP_MD_CTX_FLAG_ONESHOT 0x0001 /* digest update will be called |
275 | * once only */ | ||
276 | #define EVP_MD_CTX_FLAG_CLEANED 0x0002 /* context has already been | ||
277 | * cleaned */ | ||
278 | |||
279 | struct evp_cipher_st | ||
312 | { | 280 | { |
313 | int nid; | 281 | int nid; |
314 | int block_size; | 282 | int block_size; |
315 | int key_len; | 283 | int key_len; /* Default value for variable length ciphers */ |
316 | int iv_len; | 284 | int iv_len; |
317 | void (*init)(); /* init for encryption */ | 285 | unsigned long flags; /* Various flags */ |
318 | void (*do_cipher)(); /* encrypt data */ | 286 | int (*init)(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
319 | void (*cleanup)(); /* used by cipher method */ | 287 | const unsigned char *iv, int enc); /* init key */ |
320 | int ctx_size; /* how big the ctx needs to be */ | 288 | int (*do_cipher)(EVP_CIPHER_CTX *ctx, unsigned char *out, |
321 | /* int set_asn1_parameters(EVP_CIPHER_CTX,ASN1_TYPE *); */ | 289 | const unsigned char *in, unsigned int inl);/* encrypt/decrypt data */ |
322 | int (*set_asn1_parameters)(); /* Populate a ASN1_TYPE with parameters */ | 290 | int (*cleanup)(EVP_CIPHER_CTX *); /* cleanup ctx */ |
323 | /* int get_asn1_parameters(EVP_CIPHER_CTX,ASN1_TYPE *); */ | 291 | int ctx_size; /* how big ctx->cipher_data needs to be */ |
324 | int (*get_asn1_parameters)(); /* Get parameters from a ASN1_TYPE */ | 292 | int (*set_asn1_parameters)(EVP_CIPHER_CTX *, ASN1_TYPE *); /* Populate a ASN1_TYPE with parameters */ |
325 | } EVP_CIPHER; | 293 | int (*get_asn1_parameters)(EVP_CIPHER_CTX *, ASN1_TYPE *); /* Get parameters from a ASN1_TYPE */ |
294 | int (*ctrl)(EVP_CIPHER_CTX *, int type, int arg, void *ptr); /* Miscellaneous operations */ | ||
295 | void *app_data; /* Application data */ | ||
296 | } /* EVP_CIPHER */; | ||
297 | |||
298 | /* Values for cipher flags */ | ||
299 | |||
300 | /* Modes for ciphers */ | ||
301 | |||
302 | #define EVP_CIPH_STREAM_CIPHER 0x0 | ||
303 | #define EVP_CIPH_ECB_MODE 0x1 | ||
304 | #define EVP_CIPH_CBC_MODE 0x2 | ||
305 | #define EVP_CIPH_CFB_MODE 0x3 | ||
306 | #define EVP_CIPH_OFB_MODE 0x4 | ||
307 | #define EVP_CIPH_MODE 0x7 | ||
308 | /* Set if variable length cipher */ | ||
309 | #define EVP_CIPH_VARIABLE_LENGTH 0x8 | ||
310 | /* Set if the iv handling should be done by the cipher itself */ | ||
311 | #define EVP_CIPH_CUSTOM_IV 0x10 | ||
312 | /* Set if the cipher's init() function should be called if key is NULL */ | ||
313 | #define EVP_CIPH_ALWAYS_CALL_INIT 0x20 | ||
314 | /* Call ctrl() to init cipher parameters */ | ||
315 | #define EVP_CIPH_CTRL_INIT 0x40 | ||
316 | /* Don't use standard key length function */ | ||
317 | #define EVP_CIPH_CUSTOM_KEY_LENGTH 0x80 | ||
318 | /* Don't use standard block padding */ | ||
319 | #define EVP_CIPH_NO_PADDING 0x100 | ||
320 | |||
321 | /* ctrl() values */ | ||
322 | |||
323 | #define EVP_CTRL_INIT 0x0 | ||
324 | #define EVP_CTRL_SET_KEY_LENGTH 0x1 | ||
325 | #define EVP_CTRL_GET_RC2_KEY_BITS 0x2 | ||
326 | #define EVP_CTRL_SET_RC2_KEY_BITS 0x3 | ||
327 | #define EVP_CTRL_GET_RC5_ROUNDS 0x4 | ||
328 | #define EVP_CTRL_SET_RC5_ROUNDS 0x5 | ||
326 | 329 | ||
327 | typedef struct evp_cipher_info_st | 330 | typedef struct evp_cipher_info_st |
328 | { | 331 | { |
329 | EVP_CIPHER *cipher; | 332 | const EVP_CIPHER *cipher; |
330 | unsigned char iv[EVP_MAX_IV_LENGTH]; | 333 | unsigned char iv[EVP_MAX_IV_LENGTH]; |
331 | } EVP_CIPHER_INFO; | 334 | } EVP_CIPHER_INFO; |
332 | 335 | ||
333 | typedef struct evp_cipher_ctx_st | 336 | struct evp_cipher_ctx_st |
334 | { | 337 | { |
335 | EVP_CIPHER *cipher; | 338 | const EVP_CIPHER *cipher; |
339 | ENGINE *engine; /* functional reference if 'cipher' is ENGINE-provided */ | ||
336 | int encrypt; /* encrypt or decrypt */ | 340 | int encrypt; /* encrypt or decrypt */ |
337 | int buf_len; /* number we have left */ | 341 | int buf_len; /* number we have left */ |
338 | 342 | ||
339 | unsigned char oiv[EVP_MAX_IV_LENGTH]; /* original iv */ | 343 | unsigned char oiv[EVP_MAX_IV_LENGTH]; /* original iv */ |
340 | unsigned char iv[EVP_MAX_IV_LENGTH]; /* working iv */ | 344 | unsigned char iv[EVP_MAX_IV_LENGTH]; /* working iv */ |
341 | unsigned char buf[EVP_MAX_IV_LENGTH]; /* saved partial block */ | 345 | unsigned char buf[EVP_MAX_BLOCK_LENGTH];/* saved partial block */ |
342 | int num; /* used by cfb/ofb mode */ | 346 | int num; /* used by cfb/ofb mode */ |
343 | 347 | ||
344 | char *app_data; /* aplication stuff */ | 348 | void *app_data; /* application stuff */ |
345 | union { | 349 | int key_len; /* May change for variable length cipher */ |
346 | #ifndef NO_RC4 | 350 | unsigned long flags; /* Various flags */ |
347 | struct | 351 | void *cipher_data; /* per EVP data */ |
348 | { | 352 | int final_used; |
349 | unsigned char key[EVP_RC4_KEY_SIZE]; | 353 | int block_mask; |
350 | RC4_KEY ks; /* working key */ | 354 | unsigned char final[EVP_MAX_BLOCK_LENGTH];/* possible final block */ |
351 | } rc4; | 355 | } /* EVP_CIPHER_CTX */; |
352 | #endif | ||
353 | #ifndef NO_DES | ||
354 | des_key_schedule des_ks;/* key schedule */ | ||
355 | struct | ||
356 | { | ||
357 | des_key_schedule ks;/* key schedule */ | ||
358 | C_Block inw; | ||
359 | C_Block outw; | ||
360 | } desx_cbc; | ||
361 | struct | ||
362 | { | ||
363 | des_key_schedule ks1;/* key schedule */ | ||
364 | des_key_schedule ks2;/* key schedule (for ede) */ | ||
365 | des_key_schedule ks3;/* key schedule (for ede3) */ | ||
366 | } des_ede; | ||
367 | #endif | ||
368 | #ifndef NO_IDEA | ||
369 | IDEA_KEY_SCHEDULE idea_ks;/* key schedule */ | ||
370 | #endif | ||
371 | #ifndef NO_RC2 | ||
372 | RC2_KEY rc2_ks;/* key schedule */ | ||
373 | #endif | ||
374 | #ifndef NO_RC5 | ||
375 | RC5_32_KEY rc5_ks;/* key schedule */ | ||
376 | #endif | ||
377 | #ifndef NO_BLOWFISH | ||
378 | BF_KEY bf_ks;/* key schedule */ | ||
379 | #endif | ||
380 | #ifndef NO_CAST | ||
381 | CAST_KEY cast_ks;/* key schedule */ | ||
382 | #endif | ||
383 | } c; | ||
384 | } EVP_CIPHER_CTX; | ||
385 | 356 | ||
386 | typedef struct evp_Encode_Ctx_st | 357 | typedef struct evp_Encode_Ctx_st |
387 | { | 358 | { |
@@ -396,12 +367,25 @@ typedef struct evp_Encode_Ctx_st | |||
396 | int expect_nl; | 367 | int expect_nl; |
397 | } EVP_ENCODE_CTX; | 368 | } EVP_ENCODE_CTX; |
398 | 369 | ||
370 | /* Password based encryption function */ | ||
371 | typedef int (EVP_PBE_KEYGEN)(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | ||
372 | ASN1_TYPE *param, const EVP_CIPHER *cipher, | ||
373 | const EVP_MD *md, int en_de); | ||
374 | |||
375 | #ifndef OPENSSL_NO_RSA | ||
399 | #define EVP_PKEY_assign_RSA(pkey,rsa) EVP_PKEY_assign((pkey),EVP_PKEY_RSA,\ | 376 | #define EVP_PKEY_assign_RSA(pkey,rsa) EVP_PKEY_assign((pkey),EVP_PKEY_RSA,\ |
400 | (char *)(rsa)) | 377 | (char *)(rsa)) |
378 | #endif | ||
379 | |||
380 | #ifndef OPENSSL_NO_DSA | ||
401 | #define EVP_PKEY_assign_DSA(pkey,dsa) EVP_PKEY_assign((pkey),EVP_PKEY_DSA,\ | 381 | #define EVP_PKEY_assign_DSA(pkey,dsa) EVP_PKEY_assign((pkey),EVP_PKEY_DSA,\ |
402 | (char *)(dsa)) | 382 | (char *)(dsa)) |
383 | #endif | ||
384 | |||
385 | #ifndef OPENSSL_NO_DH | ||
403 | #define EVP_PKEY_assign_DH(pkey,dh) EVP_PKEY_assign((pkey),EVP_PKEY_DH,\ | 386 | #define EVP_PKEY_assign_DH(pkey,dh) EVP_PKEY_assign((pkey),EVP_PKEY_DH,\ |
404 | (char *)(dh)) | 387 | (char *)(dh)) |
388 | #endif | ||
405 | 389 | ||
406 | /* Add some extra combinations */ | 390 | /* Add some extra combinations */ |
407 | #define EVP_get_digestbynid(a) EVP_get_digestbyname(OBJ_nid2sn(a)) | 391 | #define EVP_get_digestbynid(a) EVP_get_digestbyname(OBJ_nid2sn(a)) |
@@ -410,77 +394,124 @@ typedef struct evp_Encode_Ctx_st | |||
410 | #define EVP_get_cipherbyobj(a) EVP_get_cipherbynid(OBJ_obj2nid(a)) | 394 | #define EVP_get_cipherbyobj(a) EVP_get_cipherbynid(OBJ_obj2nid(a)) |
411 | 395 | ||
412 | #define EVP_MD_type(e) ((e)->type) | 396 | #define EVP_MD_type(e) ((e)->type) |
397 | #define EVP_MD_nid(e) EVP_MD_type(e) | ||
398 | #define EVP_MD_name(e) OBJ_nid2sn(EVP_MD_nid(e)) | ||
413 | #define EVP_MD_pkey_type(e) ((e)->pkey_type) | 399 | #define EVP_MD_pkey_type(e) ((e)->pkey_type) |
414 | #define EVP_MD_size(e) ((e)->md_size) | 400 | #define EVP_MD_size(e) ((e)->md_size) |
415 | #define EVP_MD_block_size(e) ((e)->block_size) | 401 | #define EVP_MD_block_size(e) ((e)->block_size) |
416 | 402 | ||
403 | #define EVP_MD_CTX_md(e) ((e)->digest) | ||
417 | #define EVP_MD_CTX_size(e) EVP_MD_size((e)->digest) | 404 | #define EVP_MD_CTX_size(e) EVP_MD_size((e)->digest) |
418 | #define EVP_MD_CTX_block_size(e) EVP_MD_block_size((e)->digest) | 405 | #define EVP_MD_CTX_block_size(e) EVP_MD_block_size((e)->digest) |
419 | #define EVP_MD_CTX_type(e) ((e)->digest) | 406 | #define EVP_MD_CTX_type(e) EVP_MD_type((e)->digest) |
420 | 407 | ||
421 | #define EVP_CIPHER_nid(e) ((e)->nid) | 408 | #define EVP_CIPHER_nid(e) ((e)->nid) |
409 | #define EVP_CIPHER_name(e) OBJ_nid2sn(EVP_CIPHER_nid(e)) | ||
422 | #define EVP_CIPHER_block_size(e) ((e)->block_size) | 410 | #define EVP_CIPHER_block_size(e) ((e)->block_size) |
423 | #define EVP_CIPHER_key_length(e) ((e)->key_len) | 411 | #define EVP_CIPHER_key_length(e) ((e)->key_len) |
424 | #define EVP_CIPHER_iv_length(e) ((e)->iv_len) | 412 | #define EVP_CIPHER_iv_length(e) ((e)->iv_len) |
413 | #define EVP_CIPHER_flags(e) ((e)->flags) | ||
414 | #define EVP_CIPHER_mode(e) (((e)->flags) & EVP_CIPH_MODE) | ||
425 | 415 | ||
426 | #define EVP_CIPHER_CTX_cipher(e) ((e)->cipher) | 416 | #define EVP_CIPHER_CTX_cipher(e) ((e)->cipher) |
427 | #define EVP_CIPHER_CTX_nid(e) ((e)->cipher->nid) | 417 | #define EVP_CIPHER_CTX_nid(e) ((e)->cipher->nid) |
428 | #define EVP_CIPHER_CTX_block_size(e) ((e)->cipher->block_size) | 418 | #define EVP_CIPHER_CTX_block_size(e) ((e)->cipher->block_size) |
429 | #define EVP_CIPHER_CTX_key_length(e) ((e)->cipher->key_len) | 419 | #define EVP_CIPHER_CTX_key_length(e) ((e)->key_len) |
430 | #define EVP_CIPHER_CTX_iv_length(e) ((e)->cipher->iv_len) | 420 | #define EVP_CIPHER_CTX_iv_length(e) ((e)->cipher->iv_len) |
431 | #define EVP_CIPHER_CTX_get_app_data(e) ((e)->app_data) | 421 | #define EVP_CIPHER_CTX_get_app_data(e) ((e)->app_data) |
432 | #define EVP_CIPHER_CTX_set_app_data(e,d) ((e)->app_data=(char *)(d)) | 422 | #define EVP_CIPHER_CTX_set_app_data(e,d) ((e)->app_data=(char *)(d)) |
423 | #define EVP_CIPHER_CTX_type(c) EVP_CIPHER_type(EVP_CIPHER_CTX_cipher(c)) | ||
424 | #define EVP_CIPHER_CTX_flags(e) ((e)->cipher->flags) | ||
425 | #define EVP_CIPHER_CTX_mode(e) ((e)->cipher->flags & EVP_CIPH_MODE) | ||
433 | 426 | ||
434 | #define EVP_ENCODE_LENGTH(l) (((l+2)/3*4)+(l/48+1)*2+80) | 427 | #define EVP_ENCODE_LENGTH(l) (((l+2)/3*4)+(l/48+1)*2+80) |
435 | #define EVP_DECODE_LENGTH(l) ((l+3)/4*3+80) | 428 | #define EVP_DECODE_LENGTH(l) ((l+3)/4*3+80) |
436 | 429 | ||
430 | #define EVP_SignInit_ex(a,b,c) EVP_DigestInit_ex(a,b,c) | ||
437 | #define EVP_SignInit(a,b) EVP_DigestInit(a,b) | 431 | #define EVP_SignInit(a,b) EVP_DigestInit(a,b) |
438 | #define EVP_SignUpdate(a,b,c) EVP_DigestUpdate(a,b,c) | 432 | #define EVP_SignUpdate(a,b,c) EVP_DigestUpdate(a,b,c) |
433 | #define EVP_VerifyInit_ex(a,b,c) EVP_DigestInit_ex(a,b,c) | ||
439 | #define EVP_VerifyInit(a,b) EVP_DigestInit(a,b) | 434 | #define EVP_VerifyInit(a,b) EVP_DigestInit(a,b) |
440 | #define EVP_VerifyUpdate(a,b,c) EVP_DigestUpdate(a,b,c) | 435 | #define EVP_VerifyUpdate(a,b,c) EVP_DigestUpdate(a,b,c) |
441 | #define EVP_OpenUpdate(a,b,c,d,e) EVP_DecryptUpdate(a,b,c,d,e) | 436 | #define EVP_OpenUpdate(a,b,c,d,e) EVP_DecryptUpdate(a,b,c,d,e) |
442 | #define EVP_SealUpdate(a,b,c,d,e) EVP_EncryptUpdate(a,b,c,d,e) | 437 | #define EVP_SealUpdate(a,b,c,d,e) EVP_EncryptUpdate(a,b,c,d,e) |
443 | 438 | ||
444 | #define BIO_set_md(b,md) BIO_ctrl(b,BIO_C_SET_MD,0,(char *)md) | 439 | #ifdef CONST_STRICT |
440 | void BIO_set_md(BIO *,const EVP_MD *md); | ||
441 | #else | ||
442 | # define BIO_set_md(b,md) BIO_ctrl(b,BIO_C_SET_MD,0,(char *)md) | ||
443 | #endif | ||
445 | #define BIO_get_md(b,mdp) BIO_ctrl(b,BIO_C_GET_MD,0,(char *)mdp) | 444 | #define BIO_get_md(b,mdp) BIO_ctrl(b,BIO_C_GET_MD,0,(char *)mdp) |
446 | #define BIO_get_md_ctx(b,mdcp) BIO_ctrl(b,BIO_C_GET_MD_CTX,0,(char *)mdcp) | 445 | #define BIO_get_md_ctx(b,mdcp) BIO_ctrl(b,BIO_C_GET_MD_CTX,0,(char *)mdcp) |
447 | #define BIO_get_cipher_status(b) BIO_ctrl(b,BIO_C_GET_CIPHER_STATUS,0,NULL) | 446 | #define BIO_get_cipher_status(b) BIO_ctrl(b,BIO_C_GET_CIPHER_STATUS,0,NULL) |
447 | #define BIO_get_cipher_ctx(b,c_pp) BIO_ctrl(b,BIO_C_GET_CIPHER_CTX,0,(char *)c_pp) | ||
448 | 448 | ||
449 | #define EVP_Cipher(c,o,i,l) (c)->cipher->do_cipher((c),(o),(i),(l)) | 449 | #define EVP_Cipher(c,o,i,l) (c)->cipher->do_cipher((c),(o),(i),(l)) |
450 | 450 | ||
451 | #ifndef NOPROTO | 451 | #define EVP_add_cipher_alias(n,alias) \ |
452 | 452 | OBJ_NAME_add((alias),OBJ_NAME_TYPE_CIPHER_METH|OBJ_NAME_ALIAS,(n)) | |
453 | void EVP_DigestInit(EVP_MD_CTX *ctx, EVP_MD *type); | 453 | #define EVP_add_digest_alias(n,alias) \ |
454 | void EVP_DigestUpdate(EVP_MD_CTX *ctx,unsigned char *d,unsigned int cnt); | 454 | OBJ_NAME_add((alias),OBJ_NAME_TYPE_MD_METH|OBJ_NAME_ALIAS,(n)) |
455 | void EVP_DigestFinal(EVP_MD_CTX *ctx,unsigned char *md,unsigned int *s); | 455 | #define EVP_delete_cipher_alias(alias) \ |
456 | 456 | OBJ_NAME_remove(alias,OBJ_NAME_TYPE_CIPHER_METH|OBJ_NAME_ALIAS); | |
457 | int EVP_read_pw_string(char *buf,int length,char *prompt,int verify); | 457 | #define EVP_delete_digest_alias(alias) \ |
458 | OBJ_NAME_remove(alias,OBJ_NAME_TYPE_MD_METH|OBJ_NAME_ALIAS); | ||
459 | |||
460 | void EVP_MD_CTX_init(EVP_MD_CTX *ctx); | ||
461 | int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx); | ||
462 | EVP_MD_CTX *EVP_MD_CTX_create(void); | ||
463 | void EVP_MD_CTX_destroy(EVP_MD_CTX *ctx); | ||
464 | int EVP_MD_CTX_copy_ex(EVP_MD_CTX *out,const EVP_MD_CTX *in); | ||
465 | #define EVP_MD_CTX_set_flags(ctx,flgs) ((ctx)->flags|=(flgs)) | ||
466 | #define EVP_MD_CTX_clear_flags(ctx,flgs) ((ctx)->flags&=~(flgs)) | ||
467 | #define EVP_MD_CTX_test_flags(ctx,flgs) ((ctx)->flags&(flgs)) | ||
468 | int EVP_DigestInit_ex(EVP_MD_CTX *ctx, const EVP_MD *type, ENGINE *impl); | ||
469 | int EVP_DigestUpdate(EVP_MD_CTX *ctx,const void *d, | ||
470 | unsigned int cnt); | ||
471 | int EVP_DigestFinal_ex(EVP_MD_CTX *ctx,unsigned char *md,unsigned int *s); | ||
472 | int EVP_Digest(void *data, unsigned int count, | ||
473 | unsigned char *md, unsigned int *size, const EVP_MD *type, ENGINE *impl); | ||
474 | |||
475 | int EVP_MD_CTX_copy(EVP_MD_CTX *out,const EVP_MD_CTX *in); | ||
476 | int EVP_DigestInit(EVP_MD_CTX *ctx, const EVP_MD *type); | ||
477 | int EVP_DigestFinal(EVP_MD_CTX *ctx,unsigned char *md,unsigned int *s); | ||
478 | |||
479 | int EVP_read_pw_string(char *buf,int length,const char *prompt,int verify); | ||
458 | void EVP_set_pw_prompt(char *prompt); | 480 | void EVP_set_pw_prompt(char *prompt); |
459 | char * EVP_get_pw_prompt(void); | 481 | char * EVP_get_pw_prompt(void); |
460 | 482 | ||
461 | int EVP_BytesToKey(EVP_CIPHER *type,EVP_MD *md,unsigned char *salt, | 483 | int EVP_BytesToKey(const EVP_CIPHER *type,const EVP_MD *md, |
462 | unsigned char *data, int datal, int count, | 484 | const unsigned char *salt, const unsigned char *data, |
463 | unsigned char *key,unsigned char *iv); | 485 | int datal, int count, unsigned char *key,unsigned char *iv); |
464 | 486 | ||
465 | EVP_CIPHER *EVP_get_cipherbyname(char *name); | 487 | int EVP_EncryptInit(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, |
466 | 488 | const unsigned char *key, const unsigned char *iv); | |
467 | void EVP_EncryptInit(EVP_CIPHER_CTX *ctx,EVP_CIPHER *type, | 489 | int EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, ENGINE *impl, |
468 | unsigned char *key, unsigned char *iv); | 490 | const unsigned char *key, const unsigned char *iv); |
469 | void EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, | 491 | int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, |
470 | int *outl, unsigned char *in, int inl); | 492 | int *outl, const unsigned char *in, int inl); |
471 | void EVP_EncryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl); | 493 | int EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl); |
472 | 494 | int EVP_EncryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl); | |
473 | void EVP_DecryptInit(EVP_CIPHER_CTX *ctx,EVP_CIPHER *type, | 495 | |
474 | unsigned char *key, unsigned char *iv); | 496 | int EVP_DecryptInit(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, |
475 | void EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, | 497 | const unsigned char *key, const unsigned char *iv); |
476 | int *outl, unsigned char *in, int inl); | 498 | int EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, ENGINE *impl, |
499 | const unsigned char *key, const unsigned char *iv); | ||
500 | int EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
501 | int *outl, const unsigned char *in, int inl); | ||
477 | int EVP_DecryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *outm, int *outl); | 502 | int EVP_DecryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *outm, int *outl); |
478 | 503 | int EVP_DecryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *outm, int *outl); | |
479 | void EVP_CipherInit(EVP_CIPHER_CTX *ctx,EVP_CIPHER *type, unsigned char *key, | 504 | |
480 | unsigned char *iv,int enc); | 505 | int EVP_CipherInit(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, |
481 | void EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, | 506 | const unsigned char *key,const unsigned char *iv, |
482 | int *outl, unsigned char *in, int inl); | 507 | int enc); |
508 | int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, ENGINE *impl, | ||
509 | const unsigned char *key,const unsigned char *iv, | ||
510 | int enc); | ||
511 | int EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
512 | int *outl, const unsigned char *in, int inl); | ||
483 | int EVP_CipherFinal(EVP_CIPHER_CTX *ctx, unsigned char *outm, int *outl); | 513 | int EVP_CipherFinal(EVP_CIPHER_CTX *ctx, unsigned char *outm, int *outl); |
514 | int EVP_CipherFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *outm, int *outl); | ||
484 | 515 | ||
485 | int EVP_SignFinal(EVP_MD_CTX *ctx,unsigned char *md,unsigned int *s, | 516 | int EVP_SignFinal(EVP_MD_CTX *ctx,unsigned char *md,unsigned int *s, |
486 | EVP_PKEY *pkey); | 517 | EVP_PKEY *pkey); |
@@ -488,100 +519,171 @@ int EVP_SignFinal(EVP_MD_CTX *ctx,unsigned char *md,unsigned int *s, | |||
488 | int EVP_VerifyFinal(EVP_MD_CTX *ctx,unsigned char *sigbuf, | 519 | int EVP_VerifyFinal(EVP_MD_CTX *ctx,unsigned char *sigbuf, |
489 | unsigned int siglen,EVP_PKEY *pkey); | 520 | unsigned int siglen,EVP_PKEY *pkey); |
490 | 521 | ||
491 | int EVP_OpenInit(EVP_CIPHER_CTX *ctx,EVP_CIPHER *type,unsigned char *ek, | 522 | int EVP_OpenInit(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *type,unsigned char *ek, |
492 | int ekl,unsigned char *iv,EVP_PKEY *priv); | 523 | int ekl,unsigned char *iv,EVP_PKEY *priv); |
493 | int EVP_OpenFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl); | 524 | int EVP_OpenFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl); |
494 | 525 | ||
495 | int EVP_SealInit(EVP_CIPHER_CTX *ctx, EVP_CIPHER *type, unsigned char **ek, | 526 | int EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, unsigned char **ek, |
496 | int *ekl, unsigned char *iv,EVP_PKEY **pubk, int npubk); | 527 | int *ekl, unsigned char *iv,EVP_PKEY **pubk, int npubk); |
497 | void EVP_SealFinal(EVP_CIPHER_CTX *ctx,unsigned char *out,int *outl); | 528 | int EVP_SealFinal(EVP_CIPHER_CTX *ctx,unsigned char *out,int *outl); |
498 | 529 | ||
499 | void EVP_EncodeInit(EVP_ENCODE_CTX *ctx); | 530 | void EVP_EncodeInit(EVP_ENCODE_CTX *ctx); |
500 | void EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx,unsigned char *out, | 531 | void EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx,unsigned char *out, |
501 | int *outl,unsigned char *in,int inl); | 532 | int *outl,unsigned char *in,int inl); |
502 | void EVP_EncodeFinal(EVP_ENCODE_CTX *ctx,unsigned char *out,int *outl); | 533 | void EVP_EncodeFinal(EVP_ENCODE_CTX *ctx,unsigned char *out,int *outl); |
503 | int EVP_EncodeBlock(unsigned char *t, unsigned char *f, int n); | 534 | int EVP_EncodeBlock(unsigned char *t, const unsigned char *f, int n); |
504 | 535 | ||
505 | void EVP_DecodeInit(EVP_ENCODE_CTX *ctx); | 536 | void EVP_DecodeInit(EVP_ENCODE_CTX *ctx); |
506 | int EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx,unsigned char *out,int *outl, | 537 | int EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx,unsigned char *out,int *outl, |
507 | unsigned char *in, int inl); | 538 | unsigned char *in, int inl); |
508 | int EVP_DecodeFinal(EVP_ENCODE_CTX *ctx, unsigned | 539 | int EVP_DecodeFinal(EVP_ENCODE_CTX *ctx, unsigned |
509 | char *out, int *outl); | 540 | char *out, int *outl); |
510 | int EVP_DecodeBlock(unsigned char *t, unsigned | 541 | int EVP_DecodeBlock(unsigned char *t, const unsigned char *f, int n); |
511 | char *f, int n); | ||
512 | |||
513 | void ERR_load_EVP_strings(void ); | ||
514 | 542 | ||
515 | void EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *a); | 543 | void EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *a); |
516 | void EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *a); | 544 | int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *a); |
545 | int EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *x, int keylen); | ||
546 | int EVP_CIPHER_CTX_set_padding(EVP_CIPHER_CTX *c, int pad); | ||
547 | int EVP_CIPHER_CTX_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr); | ||
517 | 548 | ||
518 | #ifdef HEADER_BIO_H | 549 | #ifndef OPENSSL_NO_BIO |
519 | BIO_METHOD *BIO_f_md(void); | 550 | BIO_METHOD *BIO_f_md(void); |
520 | BIO_METHOD *BIO_f_base64(void); | 551 | BIO_METHOD *BIO_f_base64(void); |
521 | BIO_METHOD *BIO_f_cipher(void); | 552 | BIO_METHOD *BIO_f_cipher(void); |
522 | void BIO_set_cipher(BIO *b,EVP_CIPHER *c,unsigned char *k, | 553 | BIO_METHOD *BIO_f_reliable(void); |
554 | void BIO_set_cipher(BIO *b,const EVP_CIPHER *c,unsigned char *k, | ||
523 | unsigned char *i, int enc); | 555 | unsigned char *i, int enc); |
524 | #endif | 556 | #endif |
525 | 557 | ||
526 | EVP_MD *EVP_md_null(void); | 558 | const EVP_MD *EVP_md_null(void); |
527 | EVP_MD *EVP_md2(void); | 559 | #ifndef OPENSSL_NO_MD2 |
528 | EVP_MD *EVP_md5(void); | 560 | const EVP_MD *EVP_md2(void); |
529 | EVP_MD *EVP_sha(void); | 561 | #endif |
530 | EVP_MD *EVP_sha1(void); | 562 | #ifndef OPENSSL_NO_MD4 |
531 | EVP_MD *EVP_dss(void); | 563 | const EVP_MD *EVP_md4(void); |
532 | EVP_MD *EVP_dss1(void); | 564 | #endif |
533 | EVP_MD *EVP_mdc2(void); | 565 | #ifndef OPENSSL_NO_MD5 |
534 | EVP_MD *EVP_ripemd160(void); | 566 | const EVP_MD *EVP_md5(void); |
535 | 567 | #endif | |
536 | EVP_CIPHER *EVP_enc_null(void); /* does nothing :-) */ | 568 | #ifndef OPENSSL_NO_SHA |
537 | EVP_CIPHER *EVP_des_ecb(void); | 569 | const EVP_MD *EVP_sha(void); |
538 | EVP_CIPHER *EVP_des_ede(void); | 570 | const EVP_MD *EVP_sha1(void); |
539 | EVP_CIPHER *EVP_des_ede3(void); | 571 | const EVP_MD *EVP_dss(void); |
540 | EVP_CIPHER *EVP_des_cfb(void); | 572 | const EVP_MD *EVP_dss1(void); |
541 | EVP_CIPHER *EVP_des_ede_cfb(void); | 573 | #endif |
542 | EVP_CIPHER *EVP_des_ede3_cfb(void); | 574 | #ifndef OPENSSL_NO_MDC2 |
543 | EVP_CIPHER *EVP_des_ofb(void); | 575 | const EVP_MD *EVP_mdc2(void); |
544 | EVP_CIPHER *EVP_des_ede_ofb(void); | 576 | #endif |
545 | EVP_CIPHER *EVP_des_ede3_ofb(void); | 577 | #ifndef OPENSSL_NO_RIPEMD |
546 | EVP_CIPHER *EVP_des_cbc(void); | 578 | const EVP_MD *EVP_ripemd160(void); |
547 | EVP_CIPHER *EVP_des_ede_cbc(void); | 579 | #endif |
548 | EVP_CIPHER *EVP_des_ede3_cbc(void); | 580 | const EVP_CIPHER *EVP_enc_null(void); /* does nothing :-) */ |
549 | EVP_CIPHER *EVP_desx_cbc(void); | 581 | #ifndef OPENSSL_NO_DES |
550 | EVP_CIPHER *EVP_rc4(void); | 582 | const EVP_CIPHER *EVP_des_ecb(void); |
551 | EVP_CIPHER *EVP_rc4_40(void); | 583 | const EVP_CIPHER *EVP_des_ede(void); |
552 | EVP_CIPHER *EVP_idea_ecb(void); | 584 | const EVP_CIPHER *EVP_des_ede3(void); |
553 | EVP_CIPHER *EVP_idea_cfb(void); | 585 | const EVP_CIPHER *EVP_des_cfb(void); |
554 | EVP_CIPHER *EVP_idea_ofb(void); | 586 | const EVP_CIPHER *EVP_des_ede_cfb(void); |
555 | EVP_CIPHER *EVP_idea_cbc(void); | 587 | const EVP_CIPHER *EVP_des_ede3_cfb(void); |
556 | EVP_CIPHER *EVP_rc2_ecb(void); | 588 | const EVP_CIPHER *EVP_des_ofb(void); |
557 | EVP_CIPHER *EVP_rc2_cbc(void); | 589 | const EVP_CIPHER *EVP_des_ede_ofb(void); |
558 | EVP_CIPHER *EVP_rc2_40_cbc(void); | 590 | const EVP_CIPHER *EVP_des_ede3_ofb(void); |
559 | EVP_CIPHER *EVP_rc2_cfb(void); | 591 | const EVP_CIPHER *EVP_des_cbc(void); |
560 | EVP_CIPHER *EVP_rc2_ofb(void); | 592 | const EVP_CIPHER *EVP_des_ede_cbc(void); |
561 | EVP_CIPHER *EVP_bf_ecb(void); | 593 | const EVP_CIPHER *EVP_des_ede3_cbc(void); |
562 | EVP_CIPHER *EVP_bf_cbc(void); | 594 | const EVP_CIPHER *EVP_desx_cbc(void); |
563 | EVP_CIPHER *EVP_bf_cfb(void); | 595 | /* This should now be supported through the dev_crypto ENGINE. But also, why are |
564 | EVP_CIPHER *EVP_bf_ofb(void); | 596 | * rc4 and md5 declarations made here inside a "NO_DES" precompiler branch? */ |
565 | EVP_CIPHER *EVP_cast5_ecb(void); | 597 | #if 0 |
566 | EVP_CIPHER *EVP_cast5_cbc(void); | 598 | # ifdef OPENSSL_OPENBSD_DEV_CRYPTO |
567 | EVP_CIPHER *EVP_cast5_cfb(void); | 599 | const EVP_CIPHER *EVP_dev_crypto_des_ede3_cbc(void); |
568 | EVP_CIPHER *EVP_cast5_ofb(void); | 600 | const EVP_CIPHER *EVP_dev_crypto_rc4(void); |
569 | EVP_CIPHER *EVP_rc5_32_12_16_cbc(void); | 601 | const EVP_MD *EVP_dev_crypto_md5(void); |
570 | EVP_CIPHER *EVP_rc5_32_12_16_ecb(void); | 602 | # endif |
571 | EVP_CIPHER *EVP_rc5_32_12_16_cfb(void); | 603 | #endif |
572 | EVP_CIPHER *EVP_rc5_32_12_16_ofb(void); | 604 | #endif |
573 | 605 | #ifndef OPENSSL_NO_RC4 | |
574 | void SSLeay_add_all_algorithms(void); | 606 | const EVP_CIPHER *EVP_rc4(void); |
575 | void SSLeay_add_all_ciphers(void); | 607 | const EVP_CIPHER *EVP_rc4_40(void); |
576 | void SSLeay_add_all_digests(void); | 608 | #endif |
577 | 609 | #ifndef OPENSSL_NO_IDEA | |
578 | int EVP_add_cipher(EVP_CIPHER *cipher); | 610 | const EVP_CIPHER *EVP_idea_ecb(void); |
579 | int EVP_add_digest(EVP_MD *digest); | 611 | const EVP_CIPHER *EVP_idea_cfb(void); |
580 | int EVP_add_alias(char *name,char *alias); | 612 | const EVP_CIPHER *EVP_idea_ofb(void); |
581 | int EVP_delete_alias(char *name); | 613 | const EVP_CIPHER *EVP_idea_cbc(void); |
582 | 614 | #endif | |
583 | EVP_CIPHER *EVP_get_cipherbyname(char *name); | 615 | #ifndef OPENSSL_NO_RC2 |
584 | EVP_MD *EVP_get_digestbyname(char *name); | 616 | const EVP_CIPHER *EVP_rc2_ecb(void); |
617 | const EVP_CIPHER *EVP_rc2_cbc(void); | ||
618 | const EVP_CIPHER *EVP_rc2_40_cbc(void); | ||
619 | const EVP_CIPHER *EVP_rc2_64_cbc(void); | ||
620 | const EVP_CIPHER *EVP_rc2_cfb(void); | ||
621 | const EVP_CIPHER *EVP_rc2_ofb(void); | ||
622 | #endif | ||
623 | #ifndef OPENSSL_NO_BF | ||
624 | const EVP_CIPHER *EVP_bf_ecb(void); | ||
625 | const EVP_CIPHER *EVP_bf_cbc(void); | ||
626 | const EVP_CIPHER *EVP_bf_cfb(void); | ||
627 | const EVP_CIPHER *EVP_bf_ofb(void); | ||
628 | #endif | ||
629 | #ifndef OPENSSL_NO_CAST | ||
630 | const EVP_CIPHER *EVP_cast5_ecb(void); | ||
631 | const EVP_CIPHER *EVP_cast5_cbc(void); | ||
632 | const EVP_CIPHER *EVP_cast5_cfb(void); | ||
633 | const EVP_CIPHER *EVP_cast5_ofb(void); | ||
634 | #endif | ||
635 | #ifndef OPENSSL_NO_RC5 | ||
636 | const EVP_CIPHER *EVP_rc5_32_12_16_cbc(void); | ||
637 | const EVP_CIPHER *EVP_rc5_32_12_16_ecb(void); | ||
638 | const EVP_CIPHER *EVP_rc5_32_12_16_cfb(void); | ||
639 | const EVP_CIPHER *EVP_rc5_32_12_16_ofb(void); | ||
640 | #endif | ||
641 | #ifndef OPENSSL_NO_AES | ||
642 | const EVP_CIPHER *EVP_aes_128_ecb(void); | ||
643 | const EVP_CIPHER *EVP_aes_128_cbc(void); | ||
644 | const EVP_CIPHER *EVP_aes_128_cfb(void); | ||
645 | const EVP_CIPHER *EVP_aes_128_ofb(void); | ||
646 | #if 0 | ||
647 | const EVP_CIPHER *EVP_aes_128_ctr(void); | ||
648 | #endif | ||
649 | const EVP_CIPHER *EVP_aes_192_ecb(void); | ||
650 | const EVP_CIPHER *EVP_aes_192_cbc(void); | ||
651 | const EVP_CIPHER *EVP_aes_192_cfb(void); | ||
652 | const EVP_CIPHER *EVP_aes_192_ofb(void); | ||
653 | #if 0 | ||
654 | const EVP_CIPHER *EVP_aes_192_ctr(void); | ||
655 | #endif | ||
656 | const EVP_CIPHER *EVP_aes_256_ecb(void); | ||
657 | const EVP_CIPHER *EVP_aes_256_cbc(void); | ||
658 | const EVP_CIPHER *EVP_aes_256_cfb(void); | ||
659 | const EVP_CIPHER *EVP_aes_256_ofb(void); | ||
660 | #if 0 | ||
661 | const EVP_CIPHER *EVP_aes_256_ctr(void); | ||
662 | #endif | ||
663 | #endif | ||
664 | |||
665 | void OPENSSL_add_all_algorithms_noconf(void); | ||
666 | void OPENSSL_add_all_algorithms_conf(void); | ||
667 | |||
668 | #ifdef OPENSSL_LOAD_CONF | ||
669 | #define OpenSSL_add_all_algorithms() \ | ||
670 | OPENSSL_add_all_algorithms_conf() | ||
671 | #else | ||
672 | #define OpenSSL_add_all_algorithms() \ | ||
673 | OPENSSL_add_all_algorithms_noconf() | ||
674 | #endif | ||
675 | |||
676 | void OpenSSL_add_all_ciphers(void); | ||
677 | void OpenSSL_add_all_digests(void); | ||
678 | #define SSLeay_add_all_algorithms() OpenSSL_add_all_algorithms() | ||
679 | #define SSLeay_add_all_ciphers() OpenSSL_add_all_ciphers() | ||
680 | #define SSLeay_add_all_digests() OpenSSL_add_all_digests() | ||
681 | |||
682 | int EVP_add_cipher(const EVP_CIPHER *cipher); | ||
683 | int EVP_add_digest(const EVP_MD *digest); | ||
684 | |||
685 | const EVP_CIPHER *EVP_get_cipherbyname(const char *name); | ||
686 | const EVP_MD *EVP_get_digestbyname(const char *name); | ||
585 | void EVP_cleanup(void); | 687 | void EVP_cleanup(void); |
586 | 688 | ||
587 | int EVP_PKEY_decrypt(unsigned char *dec_key,unsigned char *enc_key, | 689 | int EVP_PKEY_decrypt(unsigned char *dec_key,unsigned char *enc_key, |
@@ -592,6 +694,24 @@ int EVP_PKEY_type(int type); | |||
592 | int EVP_PKEY_bits(EVP_PKEY *pkey); | 694 | int EVP_PKEY_bits(EVP_PKEY *pkey); |
593 | int EVP_PKEY_size(EVP_PKEY *pkey); | 695 | int EVP_PKEY_size(EVP_PKEY *pkey); |
594 | int EVP_PKEY_assign(EVP_PKEY *pkey,int type,char *key); | 696 | int EVP_PKEY_assign(EVP_PKEY *pkey,int type,char *key); |
697 | |||
698 | #ifndef OPENSSL_NO_RSA | ||
699 | struct rsa_st; | ||
700 | int EVP_PKEY_set1_RSA(EVP_PKEY *pkey,struct rsa_st *key); | ||
701 | struct rsa_st *EVP_PKEY_get1_RSA(EVP_PKEY *pkey); | ||
702 | #endif | ||
703 | #ifndef OPENSSL_NO_DSA | ||
704 | struct dsa_st; | ||
705 | int EVP_PKEY_set1_DSA(EVP_PKEY *pkey,struct dsa_st *key); | ||
706 | struct dsa_st *EVP_PKEY_get1_DSA(EVP_PKEY *pkey); | ||
707 | #endif | ||
708 | #ifndef OPENSSL_NO_DH | ||
709 | struct dh_st; | ||
710 | int EVP_PKEY_set1_DH(EVP_PKEY *pkey,struct dh_st *key); | ||
711 | struct dh_st *EVP_PKEY_get1_DH(EVP_PKEY *pkey); | ||
712 | #endif | ||
713 | |||
714 | |||
595 | EVP_PKEY * EVP_PKEY_new(void); | 715 | EVP_PKEY * EVP_PKEY_new(void); |
596 | void EVP_PKEY_free(EVP_PKEY *pkey); | 716 | void EVP_PKEY_free(EVP_PKEY *pkey); |
597 | EVP_PKEY * d2i_PublicKey(int type,EVP_PKEY **a, unsigned char **pp, | 717 | EVP_PKEY * d2i_PublicKey(int type,EVP_PKEY **a, unsigned char **pp, |
@@ -600,6 +720,8 @@ int i2d_PublicKey(EVP_PKEY *a, unsigned char **pp); | |||
600 | 720 | ||
601 | EVP_PKEY * d2i_PrivateKey(int type,EVP_PKEY **a, unsigned char **pp, | 721 | EVP_PKEY * d2i_PrivateKey(int type,EVP_PKEY **a, unsigned char **pp, |
602 | long length); | 722 | long length); |
723 | EVP_PKEY * d2i_AutoPrivateKey(EVP_PKEY **a, unsigned char **pp, | ||
724 | long length); | ||
603 | int i2d_PrivateKey(EVP_PKEY *a, unsigned char **pp); | 725 | int i2d_PrivateKey(EVP_PKEY *a, unsigned char **pp); |
604 | 726 | ||
605 | int EVP_PKEY_copy_parameters(EVP_PKEY *to,EVP_PKEY *from); | 727 | int EVP_PKEY_copy_parameters(EVP_PKEY *to,EVP_PKEY *from); |
@@ -607,6 +729,8 @@ int EVP_PKEY_missing_parameters(EVP_PKEY *pkey); | |||
607 | int EVP_PKEY_save_parameters(EVP_PKEY *pkey,int mode); | 729 | int EVP_PKEY_save_parameters(EVP_PKEY *pkey,int mode); |
608 | int EVP_PKEY_cmp_parameters(EVP_PKEY *a,EVP_PKEY *b); | 730 | int EVP_PKEY_cmp_parameters(EVP_PKEY *a,EVP_PKEY *b); |
609 | 731 | ||
732 | int EVP_CIPHER_type(const EVP_CIPHER *ctx); | ||
733 | |||
610 | /* calls methods */ | 734 | /* calls methods */ |
611 | int EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type); | 735 | int EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type); |
612 | int EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type); | 736 | int EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type); |
@@ -615,179 +739,106 @@ int EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type); | |||
615 | int EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c,ASN1_TYPE *type); | 739 | int EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c,ASN1_TYPE *type); |
616 | int EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c,ASN1_TYPE *type); | 740 | int EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c,ASN1_TYPE *type); |
617 | 741 | ||
618 | #else | 742 | /* PKCS5 password based encryption */ |
619 | 743 | int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | |
620 | void EVP_DigestInit(); | 744 | ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, |
621 | void EVP_DigestUpdate(); | 745 | int en_de); |
622 | void EVP_DigestFinal(); | 746 | int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, |
623 | 747 | unsigned char *salt, int saltlen, int iter, | |
624 | int EVP_read_pw_string(); | 748 | int keylen, unsigned char *out); |
625 | void EVP_set_pw_prompt(); | 749 | int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, |
626 | char * EVP_get_pw_prompt(); | 750 | ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, |
627 | 751 | int en_de); | |
628 | int EVP_BytesToKey(); | 752 | |
629 | 753 | void PKCS5_PBE_add(void); | |
630 | EVP_CIPHER *EVP_get_cipherbyname(); | 754 | |
631 | 755 | int EVP_PBE_CipherInit (ASN1_OBJECT *pbe_obj, const char *pass, int passlen, | |
632 | void EVP_EncryptInit(); | 756 | ASN1_TYPE *param, EVP_CIPHER_CTX *ctx, int en_de); |
633 | void EVP_EncryptUpdate(); | 757 | int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, |
634 | void EVP_EncryptFinal(); | 758 | EVP_PBE_KEYGEN *keygen); |
635 | 759 | void EVP_PBE_cleanup(void); | |
636 | void EVP_DecryptInit(); | ||
637 | void EVP_DecryptUpdate(); | ||
638 | int EVP_DecryptFinal(); | ||
639 | |||
640 | void EVP_CipherInit(); | ||
641 | void EVP_CipherUpdate(); | ||
642 | int EVP_CipherFinal(); | ||
643 | |||
644 | int EVP_SignFinal(); | ||
645 | |||
646 | int EVP_VerifyFinal(); | ||
647 | |||
648 | int EVP_OpenInit(); | ||
649 | int EVP_OpenFinal(); | ||
650 | |||
651 | int EVP_SealInit(); | ||
652 | void EVP_SealFinal(); | ||
653 | |||
654 | void EVP_EncodeInit(); | ||
655 | void EVP_EncodeUpdate(); | ||
656 | void EVP_EncodeFinal(); | ||
657 | int EVP_EncodeBlock(); | ||
658 | |||
659 | void EVP_DecodeInit(); | ||
660 | int EVP_DecodeUpdate(); | ||
661 | int EVP_DecodeFinal(); | ||
662 | int EVP_DecodeBlock(); | ||
663 | |||
664 | void ERR_load_EVP_strings(); | ||
665 | |||
666 | void EVP_CIPHER_CTX_init(); | ||
667 | void EVP_CIPHER_CTX_cleanup(); | ||
668 | |||
669 | #ifdef HEADER_BIO_H | ||
670 | BIO_METHOD *BIO_f_md(); | ||
671 | BIO_METHOD *BIO_f_base64(); | ||
672 | BIO_METHOD *BIO_f_cipher(); | ||
673 | void BIO_set_cipher(); | ||
674 | #endif | ||
675 | |||
676 | EVP_MD *EVP_md_null(); | ||
677 | EVP_MD *EVP_md2(); | ||
678 | EVP_MD *EVP_md5(); | ||
679 | EVP_MD *EVP_sha(); | ||
680 | EVP_MD *EVP_sha1(); | ||
681 | EVP_MD *EVP_dss(); | ||
682 | EVP_MD *EVP_dss1(); | ||
683 | EVP_MD *EVP_mdc2(); | ||
684 | |||
685 | EVP_CIPHER *EVP_enc_null(); | ||
686 | EVP_CIPHER *EVP_des_ecb(); | ||
687 | EVP_CIPHER *EVP_des_ede(); | ||
688 | EVP_CIPHER *EVP_des_ede3(); | ||
689 | EVP_CIPHER *EVP_des_cfb(); | ||
690 | EVP_CIPHER *EVP_des_ede_cfb(); | ||
691 | EVP_CIPHER *EVP_des_ede3_cfb(); | ||
692 | EVP_CIPHER *EVP_des_ofb(); | ||
693 | EVP_CIPHER *EVP_des_ede_ofb(); | ||
694 | EVP_CIPHER *EVP_des_ede3_ofb(); | ||
695 | EVP_CIPHER *EVP_des_cbc(); | ||
696 | EVP_CIPHER *EVP_des_ede_cbc(); | ||
697 | EVP_CIPHER *EVP_des_ede3_cbc(); | ||
698 | EVP_CIPHER *EVP_desx_cbc(); | ||
699 | EVP_CIPHER *EVP_rc4(); | ||
700 | EVP_CIPHER *EVP_rc4_40(); | ||
701 | EVP_CIPHER *EVP_idea_ecb(); | ||
702 | EVP_CIPHER *EVP_idea_cfb(); | ||
703 | EVP_CIPHER *EVP_idea_ofb(); | ||
704 | EVP_CIPHER *EVP_idea_cbc(); | ||
705 | EVP_CIPHER *EVP_rc2_ecb(); | ||
706 | EVP_CIPHER *EVP_rc2_cbc(); | ||
707 | EVP_CIPHER *EVP_rc2_40_cbc(); | ||
708 | EVP_CIPHER *EVP_rc2_cfb(); | ||
709 | EVP_CIPHER *EVP_rc2_ofb(); | ||
710 | EVP_CIPHER *EVP_bf_ecb(); | ||
711 | EVP_CIPHER *EVP_bf_cbc(); | ||
712 | EVP_CIPHER *EVP_bf_cfb(); | ||
713 | EVP_CIPHER *EVP_bf_ofb(); | ||
714 | EVP_CIPHER *EVP_cast5_ecb(); | ||
715 | EVP_CIPHER *EVP_cast5_cbc(); | ||
716 | EVP_CIPHER *EVP_cast5_cfb(); | ||
717 | EVP_CIPHER *EVP_cast5_ofb(); | ||
718 | EVP_CIPHER *EVP_rc5_32_12_16_cbc(); | ||
719 | EVP_CIPHER *EVP_rc5_32_12_16_ecb(); | ||
720 | EVP_CIPHER *EVP_rc5_32_12_16_cfb(); | ||
721 | EVP_CIPHER *EVP_rc5_32_12_16_ofb(); | ||
722 | |||
723 | void SSLeay_add_all_algorithms(); | ||
724 | void SSLeay_add_all_ciphers(); | ||
725 | void SSLeay_add_all_digests(); | ||
726 | |||
727 | int EVP_add_cipher(); | ||
728 | int EVP_add_digest(); | ||
729 | int EVP_add_alias(); | ||
730 | int EVP_delete_alias(); | ||
731 | |||
732 | EVP_CIPHER *EVP_get_cipherbyname(); | ||
733 | EVP_MD *EVP_get_digestbyname(); | ||
734 | void EVP_cleanup(); | ||
735 | |||
736 | int EVP_PKEY_decrypt(); | ||
737 | int EVP_PKEY_encrypt(); | ||
738 | int EVP_PKEY_type(); | ||
739 | int EVP_PKEY_bits(); | ||
740 | int EVP_PKEY_size(); | ||
741 | int EVP_PKEY_assign(); | ||
742 | EVP_PKEY * EVP_PKEY_new(); | ||
743 | void EVP_PKEY_free(); | ||
744 | EVP_PKEY * d2i_PublicKey(); | ||
745 | int i2d_PublicKey(); | ||
746 | |||
747 | EVP_PKEY * d2i_PrivateKey(); | ||
748 | int i2d_PrivateKey(); | ||
749 | |||
750 | int EVP_PKEY_copy_parameters(); | ||
751 | int EVP_PKEY_missing_parameters(); | ||
752 | int EVP_PKEY_save_parameters(); | ||
753 | int EVP_PKEY_cmp_parameters(); | ||
754 | |||
755 | int EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type); | ||
756 | int EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type); | ||
757 | |||
758 | int EVP_CIPHER_set_asn1_iv(); | ||
759 | int EVP_CIPHER_get_asn1_iv(); | ||
760 | |||
761 | #endif | ||
762 | 760 | ||
763 | /* BEGIN ERROR CODES */ | 761 | /* BEGIN ERROR CODES */ |
762 | /* The following lines are auto generated by the script mkerr.pl. Any changes | ||
763 | * made after this point may be overwritten when the script is next run. | ||
764 | */ | ||
765 | void ERR_load_EVP_strings(void); | ||
766 | |||
764 | /* Error codes for the EVP functions. */ | 767 | /* Error codes for the EVP functions. */ |
765 | 768 | ||
766 | /* Function codes. */ | 769 | /* Function codes. */ |
767 | #define EVP_F_D2I_PKEY 100 | 770 | #define EVP_F_D2I_PKEY 100 |
771 | #define EVP_F_EVP_CIPHERINIT 123 | ||
772 | #define EVP_F_EVP_CIPHER_CTX_CTRL 124 | ||
773 | #define EVP_F_EVP_CIPHER_CTX_SET_KEY_LENGTH 122 | ||
768 | #define EVP_F_EVP_DECRYPTFINAL 101 | 774 | #define EVP_F_EVP_DECRYPTFINAL 101 |
775 | #define EVP_F_EVP_DIGESTINIT 128 | ||
776 | #define EVP_F_EVP_ENCRYPTFINAL 127 | ||
777 | #define EVP_F_EVP_MD_CTX_COPY 110 | ||
769 | #define EVP_F_EVP_OPENINIT 102 | 778 | #define EVP_F_EVP_OPENINIT 102 |
779 | #define EVP_F_EVP_PBE_ALG_ADD 115 | ||
780 | #define EVP_F_EVP_PBE_CIPHERINIT 116 | ||
781 | #define EVP_F_EVP_PKCS82PKEY 111 | ||
782 | #define EVP_F_EVP_PKCS8_SET_BROKEN 112 | ||
783 | #define EVP_F_EVP_PKEY2PKCS8 113 | ||
770 | #define EVP_F_EVP_PKEY_COPY_PARAMETERS 103 | 784 | #define EVP_F_EVP_PKEY_COPY_PARAMETERS 103 |
771 | #define EVP_F_EVP_PKEY_DECRYPT 104 | 785 | #define EVP_F_EVP_PKEY_DECRYPT 104 |
772 | #define EVP_F_EVP_PKEY_ENCRYPT 105 | 786 | #define EVP_F_EVP_PKEY_ENCRYPT 105 |
787 | #define EVP_F_EVP_PKEY_GET1_DH 119 | ||
788 | #define EVP_F_EVP_PKEY_GET1_DSA 120 | ||
789 | #define EVP_F_EVP_PKEY_GET1_RSA 121 | ||
773 | #define EVP_F_EVP_PKEY_NEW 106 | 790 | #define EVP_F_EVP_PKEY_NEW 106 |
791 | #define EVP_F_EVP_RIJNDAEL 126 | ||
774 | #define EVP_F_EVP_SIGNFINAL 107 | 792 | #define EVP_F_EVP_SIGNFINAL 107 |
775 | #define EVP_F_EVP_VERIFYFINAL 108 | 793 | #define EVP_F_EVP_VERIFYFINAL 108 |
794 | #define EVP_F_PKCS5_PBE_KEYIVGEN 117 | ||
795 | #define EVP_F_PKCS5_V2_PBE_KEYIVGEN 118 | ||
796 | #define EVP_F_RC2_MAGIC_TO_METH 109 | ||
797 | #define EVP_F_RC5_CTRL 125 | ||
776 | 798 | ||
777 | /* Reason codes. */ | 799 | /* Reason codes. */ |
800 | #define EVP_R_BAD_BLOCK_LENGTH 136 | ||
778 | #define EVP_R_BAD_DECRYPT 100 | 801 | #define EVP_R_BAD_DECRYPT 100 |
802 | #define EVP_R_BAD_KEY_LENGTH 137 | ||
803 | #define EVP_R_BN_DECODE_ERROR 112 | ||
804 | #define EVP_R_BN_PUBKEY_ERROR 113 | ||
805 | #define EVP_R_CIPHER_PARAMETER_ERROR 122 | ||
806 | #define EVP_R_CTRL_NOT_IMPLEMENTED 132 | ||
807 | #define EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED 133 | ||
808 | #define EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH 138 | ||
809 | #define EVP_R_DECODE_ERROR 114 | ||
779 | #define EVP_R_DIFFERENT_KEY_TYPES 101 | 810 | #define EVP_R_DIFFERENT_KEY_TYPES 101 |
811 | #define EVP_R_ENCODE_ERROR 115 | ||
812 | #define EVP_R_EVP_PBE_CIPHERINIT_ERROR 119 | ||
813 | #define EVP_R_EXPECTING_AN_RSA_KEY 127 | ||
814 | #define EVP_R_EXPECTING_A_DH_KEY 128 | ||
815 | #define EVP_R_EXPECTING_A_DSA_KEY 129 | ||
816 | #define EVP_R_INITIALIZATION_ERROR 134 | ||
817 | #define EVP_R_INPUT_NOT_INITIALIZED 111 | ||
818 | #define EVP_R_INVALID_KEY_LENGTH 130 | ||
780 | #define EVP_R_IV_TOO_LARGE 102 | 819 | #define EVP_R_IV_TOO_LARGE 102 |
781 | #define EVP_R_MISSING_PARMATERS 103 | 820 | #define EVP_R_KEYGEN_FAILURE 120 |
821 | #define EVP_R_MISSING_PARAMETERS 103 | ||
822 | #define EVP_R_NO_CIPHER_SET 131 | ||
823 | #define EVP_R_NO_DIGEST_SET 139 | ||
824 | #define EVP_R_NO_DSA_PARAMETERS 116 | ||
782 | #define EVP_R_NO_SIGN_FUNCTION_CONFIGURED 104 | 825 | #define EVP_R_NO_SIGN_FUNCTION_CONFIGURED 104 |
783 | #define EVP_R_NO_VERIFY_FUNCTION_CONFIGURED 105 | 826 | #define EVP_R_NO_VERIFY_FUNCTION_CONFIGURED 105 |
827 | #define EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE 117 | ||
784 | #define EVP_R_PUBLIC_KEY_NOT_RSA 106 | 828 | #define EVP_R_PUBLIC_KEY_NOT_RSA 106 |
829 | #define EVP_R_UNKNOWN_PBE_ALGORITHM 121 | ||
830 | #define EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS 135 | ||
785 | #define EVP_R_UNSUPPORTED_CIPHER 107 | 831 | #define EVP_R_UNSUPPORTED_CIPHER 107 |
786 | #define EVP_R_WRONG_FINAL_BLOCK_LENGTH 108 | 832 | #define EVP_R_UNSUPPORTED_KEYLENGTH 123 |
787 | #define EVP_R_WRONG_PUBLIC_KEY_TYPE 109 | 833 | #define EVP_R_UNSUPPORTED_KEY_DERIVATION_FUNCTION 124 |
788 | 834 | #define EVP_R_UNSUPPORTED_KEY_SIZE 108 | |
835 | #define EVP_R_UNSUPPORTED_PRF 125 | ||
836 | #define EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM 118 | ||
837 | #define EVP_R_UNSUPPORTED_SALT_TYPE 126 | ||
838 | #define EVP_R_WRONG_FINAL_BLOCK_LENGTH 109 | ||
839 | #define EVP_R_WRONG_PUBLIC_KEY_TYPE 110 | ||
840 | |||
789 | #ifdef __cplusplus | 841 | #ifdef __cplusplus |
790 | } | 842 | } |
791 | #endif | 843 | #endif |
792 | #endif | 844 | #endif |
793 | |||
diff --git a/src/lib/libcrypto/evp/evp_enc.c b/src/lib/libcrypto/evp/evp_enc.c index 93cc3a9464..32a1c7a2e9 100644 --- a/src/lib/libcrypto/evp/evp_enc.c +++ b/src/lib/libcrypto/evp/evp_enc.c | |||
@@ -58,218 +58,369 @@ | |||
58 | 58 | ||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
61 | #include "evp.h" | 61 | #include <openssl/evp.h> |
62 | #include <openssl/err.h> | ||
63 | #include <openssl/engine.h> | ||
64 | #include "evp_locl.h" | ||
62 | 65 | ||
63 | char *EVP_version="EVP part of SSLeay 0.9.0b 29-Jun-1998"; | 66 | #include <assert.h> |
64 | 67 | ||
65 | void EVP_CIPHER_CTX_init(ctx) | 68 | const char *EVP_version="EVP" OPENSSL_VERSION_PTEXT; |
66 | EVP_CIPHER_CTX *ctx; | 69 | |
70 | void EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *ctx) | ||
67 | { | 71 | { |
68 | memset(ctx,0,sizeof(EVP_CIPHER_CTX)); | 72 | memset(ctx,0,sizeof(EVP_CIPHER_CTX)); |
69 | /* ctx->cipher=NULL; */ | 73 | /* ctx->cipher=NULL; */ |
70 | } | 74 | } |
71 | 75 | ||
72 | void EVP_CipherInit(ctx,data,key,iv,enc) | 76 | |
73 | EVP_CIPHER_CTX *ctx; | 77 | int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, |
74 | EVP_CIPHER *data; | 78 | const unsigned char *key, const unsigned char *iv, int enc) |
75 | unsigned char *key; | ||
76 | unsigned char *iv; | ||
77 | int enc; | ||
78 | { | 79 | { |
79 | if (enc) | 80 | if (cipher) |
80 | EVP_EncryptInit(ctx,data,key,iv); | 81 | EVP_CIPHER_CTX_init(ctx); |
81 | else | 82 | return EVP_CipherInit_ex(ctx,cipher,NULL,key,iv,enc); |
82 | EVP_DecryptInit(ctx,data,key,iv); | ||
83 | } | 83 | } |
84 | 84 | ||
85 | void EVP_CipherUpdate(ctx,out,outl,in,inl) | 85 | int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, |
86 | EVP_CIPHER_CTX *ctx; | 86 | const unsigned char *key, const unsigned char *iv, int enc) |
87 | unsigned char *out; | 87 | { |
88 | int *outl; | 88 | if (enc == -1) |
89 | unsigned char *in; | 89 | enc = ctx->encrypt; |
90 | int inl; | 90 | else |
91 | { | ||
92 | if (enc) | ||
93 | enc = 1; | ||
94 | ctx->encrypt = enc; | ||
95 | } | ||
96 | /* Whether it's nice or not, "Inits" can be used on "Final"'d contexts | ||
97 | * so this context may already have an ENGINE! Try to avoid releasing | ||
98 | * the previous handle, re-querying for an ENGINE, and having a | ||
99 | * reinitialisation, when it may all be unecessary. */ | ||
100 | if (ctx->engine && ctx->cipher && (!cipher || | ||
101 | (cipher && (cipher->nid == ctx->cipher->nid)))) | ||
102 | goto skip_to_init; | ||
103 | if (cipher) | ||
104 | { | ||
105 | /* Ensure a context left lying around from last time is cleared | ||
106 | * (the previous check attempted to avoid this if the same | ||
107 | * ENGINE and EVP_CIPHER could be used). */ | ||
108 | EVP_CIPHER_CTX_cleanup(ctx); | ||
109 | |||
110 | /* Restore encrypt field: it is zeroed by cleanup */ | ||
111 | ctx->encrypt = enc; | ||
112 | if(impl) | ||
113 | { | ||
114 | if (!ENGINE_init(impl)) | ||
115 | { | ||
116 | EVPerr(EVP_F_EVP_CIPHERINIT, EVP_R_INITIALIZATION_ERROR); | ||
117 | return 0; | ||
118 | } | ||
119 | } | ||
120 | else | ||
121 | /* Ask if an ENGINE is reserved for this job */ | ||
122 | impl = ENGINE_get_cipher_engine(cipher->nid); | ||
123 | if(impl) | ||
124 | { | ||
125 | /* There's an ENGINE for this job ... (apparently) */ | ||
126 | const EVP_CIPHER *c = ENGINE_get_cipher(impl, cipher->nid); | ||
127 | if(!c) | ||
128 | { | ||
129 | /* One positive side-effect of US's export | ||
130 | * control history, is that we should at least | ||
131 | * be able to avoid using US mispellings of | ||
132 | * "initialisation"? */ | ||
133 | EVPerr(EVP_F_EVP_CIPHERINIT, EVP_R_INITIALIZATION_ERROR); | ||
134 | return 0; | ||
135 | } | ||
136 | /* We'll use the ENGINE's private cipher definition */ | ||
137 | cipher = c; | ||
138 | /* Store the ENGINE functional reference so we know | ||
139 | * 'cipher' came from an ENGINE and we need to release | ||
140 | * it when done. */ | ||
141 | ctx->engine = impl; | ||
142 | } | ||
143 | else | ||
144 | ctx->engine = NULL; | ||
145 | |||
146 | ctx->cipher=cipher; | ||
147 | ctx->cipher_data=OPENSSL_malloc(ctx->cipher->ctx_size); | ||
148 | ctx->key_len = cipher->key_len; | ||
149 | ctx->flags = 0; | ||
150 | if(ctx->cipher->flags & EVP_CIPH_CTRL_INIT) | ||
151 | { | ||
152 | if(!EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_INIT, 0, NULL)) | ||
153 | { | ||
154 | EVPerr(EVP_F_EVP_CIPHERINIT, EVP_R_INITIALIZATION_ERROR); | ||
155 | return 0; | ||
156 | } | ||
157 | } | ||
158 | } | ||
159 | else if(!ctx->cipher) | ||
160 | { | ||
161 | EVPerr(EVP_F_EVP_CIPHERINIT, EVP_R_NO_CIPHER_SET); | ||
162 | return 0; | ||
163 | } | ||
164 | skip_to_init: | ||
165 | /* we assume block size is a power of 2 in *cryptUpdate */ | ||
166 | assert(ctx->cipher->block_size == 1 | ||
167 | || ctx->cipher->block_size == 8 | ||
168 | || ctx->cipher->block_size == 16); | ||
169 | |||
170 | if(!(EVP_CIPHER_CTX_flags(ctx) & EVP_CIPH_CUSTOM_IV)) { | ||
171 | switch(EVP_CIPHER_CTX_mode(ctx)) { | ||
172 | |||
173 | case EVP_CIPH_STREAM_CIPHER: | ||
174 | case EVP_CIPH_ECB_MODE: | ||
175 | break; | ||
176 | |||
177 | case EVP_CIPH_CFB_MODE: | ||
178 | case EVP_CIPH_OFB_MODE: | ||
179 | |||
180 | ctx->num = 0; | ||
181 | |||
182 | case EVP_CIPH_CBC_MODE: | ||
183 | |||
184 | if(iv) memcpy(ctx->oiv, iv, EVP_CIPHER_CTX_iv_length(ctx)); | ||
185 | memcpy(ctx->iv, ctx->oiv, EVP_CIPHER_CTX_iv_length(ctx)); | ||
186 | break; | ||
187 | |||
188 | default: | ||
189 | return 0; | ||
190 | break; | ||
191 | } | ||
192 | } | ||
193 | |||
194 | if(key || (ctx->cipher->flags & EVP_CIPH_ALWAYS_CALL_INIT)) { | ||
195 | if(!ctx->cipher->init(ctx,key,iv,enc)) return 0; | ||
196 | } | ||
197 | ctx->buf_len=0; | ||
198 | ctx->final_used=0; | ||
199 | ctx->block_mask=ctx->cipher->block_size-1; | ||
200 | return 1; | ||
201 | } | ||
202 | |||
203 | int EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | ||
204 | const unsigned char *in, int inl) | ||
91 | { | 205 | { |
92 | if (ctx->encrypt) | 206 | if (ctx->encrypt) |
93 | EVP_EncryptUpdate(ctx,out,outl,in,inl); | 207 | return EVP_EncryptUpdate(ctx,out,outl,in,inl); |
94 | else EVP_DecryptUpdate(ctx,out,outl,in,inl); | 208 | else return EVP_DecryptUpdate(ctx,out,outl,in,inl); |
95 | } | 209 | } |
96 | 210 | ||
97 | int EVP_CipherFinal(ctx,out,outl) | 211 | int EVP_CipherFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) |
98 | EVP_CIPHER_CTX *ctx; | ||
99 | unsigned char *out; | ||
100 | int *outl; | ||
101 | { | 212 | { |
102 | if (ctx->encrypt) | 213 | if (ctx->encrypt) |
103 | { | 214 | return EVP_EncryptFinal_ex(ctx,out,outl); |
104 | EVP_EncryptFinal(ctx,out,outl); | 215 | else return EVP_DecryptFinal_ex(ctx,out,outl); |
105 | return(1); | ||
106 | } | ||
107 | else return(EVP_DecryptFinal(ctx,out,outl)); | ||
108 | } | 216 | } |
109 | 217 | ||
110 | void EVP_EncryptInit(ctx,cipher,key,iv) | 218 | int EVP_CipherFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) |
111 | EVP_CIPHER_CTX *ctx; | ||
112 | EVP_CIPHER *cipher; | ||
113 | unsigned char *key; | ||
114 | unsigned char *iv; | ||
115 | { | 219 | { |
116 | if (cipher != NULL) | 220 | if (ctx->encrypt) |
117 | ctx->cipher=cipher; | 221 | return EVP_EncryptFinal(ctx,out,outl); |
118 | ctx->cipher->init(ctx,key,iv,1); | 222 | else return EVP_DecryptFinal(ctx,out,outl); |
119 | ctx->encrypt=1; | ||
120 | ctx->buf_len=0; | ||
121 | } | 223 | } |
122 | 224 | ||
123 | void EVP_DecryptInit(ctx,cipher,key,iv) | 225 | int EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, |
124 | EVP_CIPHER_CTX *ctx; | 226 | const unsigned char *key, const unsigned char *iv) |
125 | EVP_CIPHER *cipher; | ||
126 | unsigned char *key; | ||
127 | unsigned char *iv; | ||
128 | { | 227 | { |
129 | if (cipher != NULL) | 228 | return EVP_CipherInit(ctx, cipher, key, iv, 1); |
130 | ctx->cipher=cipher; | 229 | } |
131 | ctx->cipher->init(ctx,key,iv,0); | 230 | |
132 | ctx->encrypt=0; | 231 | int EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, ENGINE *impl, |
133 | ctx->buf_len=0; | 232 | const unsigned char *key, const unsigned char *iv) |
233 | { | ||
234 | return EVP_CipherInit_ex(ctx, cipher, impl, key, iv, 1); | ||
235 | } | ||
236 | |||
237 | int EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, | ||
238 | const unsigned char *key, const unsigned char *iv) | ||
239 | { | ||
240 | return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, 0); | ||
134 | } | 241 | } |
135 | 242 | ||
243 | int EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, | ||
244 | const unsigned char *key, const unsigned char *iv) | ||
245 | { | ||
246 | return EVP_CipherInit_ex(ctx, cipher, impl, key, iv, 0); | ||
247 | } | ||
136 | 248 | ||
137 | void EVP_EncryptUpdate(ctx,out,outl,in,inl) | 249 | int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, |
138 | EVP_CIPHER_CTX *ctx; | 250 | const unsigned char *in, int inl) |
139 | unsigned char *out; | ||
140 | int *outl; | ||
141 | unsigned char *in; | ||
142 | int inl; | ||
143 | { | 251 | { |
144 | int i,j,bl; | 252 | int i,j,bl; |
145 | 253 | ||
254 | if(ctx->buf_len == 0 && (inl&(ctx->block_mask)) == 0) | ||
255 | { | ||
256 | if(ctx->cipher->do_cipher(ctx,out,in,inl)) | ||
257 | { | ||
258 | *outl=inl; | ||
259 | return 1; | ||
260 | } | ||
261 | else | ||
262 | { | ||
263 | *outl=0; | ||
264 | return 0; | ||
265 | } | ||
266 | } | ||
146 | i=ctx->buf_len; | 267 | i=ctx->buf_len; |
147 | bl=ctx->cipher->block_size; | 268 | bl=ctx->cipher->block_size; |
148 | *outl=0; | ||
149 | if ((inl == 0) && (i != bl)) return; | ||
150 | if (i != 0) | 269 | if (i != 0) |
151 | { | 270 | { |
152 | if (i+inl < bl) | 271 | if (i+inl < bl) |
153 | { | 272 | { |
154 | memcpy(&(ctx->buf[i]),in,inl); | 273 | memcpy(&(ctx->buf[i]),in,inl); |
155 | ctx->buf_len+=inl; | 274 | ctx->buf_len+=inl; |
156 | return; | 275 | *outl=0; |
276 | return 1; | ||
157 | } | 277 | } |
158 | else | 278 | else |
159 | { | 279 | { |
160 | j=bl-i; | 280 | j=bl-i; |
161 | if (j != 0) memcpy(&(ctx->buf[i]),in,j); | 281 | memcpy(&(ctx->buf[i]),in,j); |
162 | ctx->cipher->do_cipher(ctx,out,ctx->buf,bl); | 282 | if(!ctx->cipher->do_cipher(ctx,out,ctx->buf,bl)) return 0; |
163 | inl-=j; | 283 | inl-=j; |
164 | in+=j; | 284 | in+=j; |
165 | out+=bl; | 285 | out+=bl; |
166 | *outl+=bl; | 286 | *outl=bl; |
167 | } | 287 | } |
168 | } | 288 | } |
169 | i=inl%bl; /* how much is left */ | 289 | else |
290 | *outl = 0; | ||
291 | i=inl&(bl-1); | ||
170 | inl-=i; | 292 | inl-=i; |
171 | if (inl > 0) | 293 | if (inl > 0) |
172 | { | 294 | { |
173 | ctx->cipher->do_cipher(ctx,out,in,inl); | 295 | if(!ctx->cipher->do_cipher(ctx,out,in,inl)) return 0; |
174 | *outl+=inl; | 296 | *outl+=inl; |
175 | } | 297 | } |
176 | 298 | ||
177 | if (i != 0) | 299 | if (i != 0) |
178 | memcpy(ctx->buf,&(in[inl]),i); | 300 | memcpy(ctx->buf,&(in[inl]),i); |
179 | ctx->buf_len=i; | 301 | ctx->buf_len=i; |
302 | return 1; | ||
180 | } | 303 | } |
181 | 304 | ||
182 | void EVP_EncryptFinal(ctx,out,outl) | 305 | int EVP_EncryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) |
183 | EVP_CIPHER_CTX *ctx; | ||
184 | unsigned char *out; | ||
185 | int *outl; | ||
186 | { | 306 | { |
187 | int i,n,b,bl; | 307 | int ret; |
308 | ret = EVP_EncryptFinal_ex(ctx, out, outl); | ||
309 | return ret; | ||
310 | } | ||
311 | |||
312 | int EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | ||
313 | { | ||
314 | int i,n,b,bl,ret; | ||
188 | 315 | ||
189 | b=ctx->cipher->block_size; | 316 | b=ctx->cipher->block_size; |
190 | if (b == 1) | 317 | if (b == 1) |
191 | { | 318 | { |
192 | *outl=0; | 319 | *outl=0; |
193 | return; | 320 | return 1; |
194 | } | 321 | } |
195 | bl=ctx->buf_len; | 322 | bl=ctx->buf_len; |
323 | if (ctx->flags & EVP_CIPH_NO_PADDING) | ||
324 | { | ||
325 | if(bl) | ||
326 | { | ||
327 | EVPerr(EVP_F_EVP_ENCRYPTFINAL,EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH); | ||
328 | return 0; | ||
329 | } | ||
330 | *outl = 0; | ||
331 | return 1; | ||
332 | } | ||
333 | |||
196 | n=b-bl; | 334 | n=b-bl; |
197 | for (i=bl; i<b; i++) | 335 | for (i=bl; i<b; i++) |
198 | ctx->buf[i]=n; | 336 | ctx->buf[i]=n; |
199 | ctx->cipher->do_cipher(ctx,out,ctx->buf,b); | 337 | ret=ctx->cipher->do_cipher(ctx,out,ctx->buf,b); |
200 | *outl=b; | 338 | |
339 | |||
340 | if(ret) | ||
341 | *outl=b; | ||
342 | |||
343 | return ret; | ||
201 | } | 344 | } |
202 | 345 | ||
203 | void EVP_DecryptUpdate(ctx,out,outl,in,inl) | 346 | int EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, |
204 | EVP_CIPHER_CTX *ctx; | 347 | const unsigned char *in, int inl) |
205 | unsigned char *out; | ||
206 | int *outl; | ||
207 | unsigned char *in; | ||
208 | int inl; | ||
209 | { | 348 | { |
210 | int b,bl,n; | 349 | int b, fix_len; |
211 | int keep_last=0; | ||
212 | 350 | ||
213 | *outl=0; | 351 | if (inl == 0) |
214 | if (inl == 0) return; | 352 | { |
353 | *outl=0; | ||
354 | return 1; | ||
355 | } | ||
356 | |||
357 | if (ctx->flags & EVP_CIPH_NO_PADDING) | ||
358 | return EVP_EncryptUpdate(ctx, out, outl, in, inl); | ||
215 | 359 | ||
216 | b=ctx->cipher->block_size; | 360 | b=ctx->cipher->block_size; |
217 | if (b > 1) | 361 | |
362 | if(ctx->final_used) | ||
218 | { | 363 | { |
219 | /* Is the input a multiple of the block size? */ | 364 | memcpy(out,ctx->final,b); |
220 | bl=ctx->buf_len; | 365 | out+=b; |
221 | n=inl+bl; | 366 | fix_len = 1; |
222 | if (n%b == 0) | ||
223 | { | ||
224 | if (inl < b) /* must be 'just one' buff */ | ||
225 | { | ||
226 | memcpy(&(ctx->buf[bl]),in,inl); | ||
227 | ctx->buf_len=b; | ||
228 | *outl=0; | ||
229 | return; | ||
230 | } | ||
231 | keep_last=1; | ||
232 | inl-=b; /* don't do the last block */ | ||
233 | } | ||
234 | } | 367 | } |
235 | EVP_EncryptUpdate(ctx,out,outl,in,inl); | 368 | else |
369 | fix_len = 0; | ||
370 | |||
371 | |||
372 | if(!EVP_EncryptUpdate(ctx,out,outl,in,inl)) | ||
373 | return 0; | ||
236 | 374 | ||
237 | /* if we have 'decrypted' a multiple of block size, make sure | 375 | /* if we have 'decrypted' a multiple of block size, make sure |
238 | * we have a copy of this last block */ | 376 | * we have a copy of this last block */ |
239 | if (keep_last) | 377 | if (b > 1 && !ctx->buf_len) |
240 | { | 378 | { |
241 | memcpy(&(ctx->buf[0]),&(in[inl]),b); | 379 | *outl-=b; |
242 | #ifdef DEBUG | 380 | ctx->final_used=1; |
243 | if (ctx->buf_len != 0) | 381 | memcpy(ctx->final,&out[*outl],b); |
244 | { | ||
245 | abort(); | ||
246 | } | ||
247 | #endif | ||
248 | ctx->buf_len=b; | ||
249 | } | 382 | } |
383 | else | ||
384 | ctx->final_used = 0; | ||
385 | |||
386 | if (fix_len) | ||
387 | *outl += b; | ||
388 | |||
389 | return 1; | ||
250 | } | 390 | } |
251 | 391 | ||
252 | int EVP_DecryptFinal(ctx,out,outl) | 392 | int EVP_DecryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) |
253 | EVP_CIPHER_CTX *ctx; | 393 | { |
254 | unsigned char *out; | 394 | int ret; |
255 | int *outl; | 395 | ret = EVP_DecryptFinal_ex(ctx, out, outl); |
396 | return ret; | ||
397 | } | ||
398 | |||
399 | int EVP_DecryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | ||
256 | { | 400 | { |
257 | int i,b; | 401 | int i,b; |
258 | int n; | 402 | int n; |
259 | 403 | ||
260 | *outl=0; | 404 | *outl=0; |
261 | b=ctx->cipher->block_size; | 405 | b=ctx->cipher->block_size; |
406 | if (ctx->flags & EVP_CIPH_NO_PADDING) | ||
407 | { | ||
408 | if(ctx->buf_len) | ||
409 | { | ||
410 | EVPerr(EVP_F_EVP_DECRYPTFINAL,EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH); | ||
411 | return 0; | ||
412 | } | ||
413 | *outl = 0; | ||
414 | return 1; | ||
415 | } | ||
262 | if (b > 1) | 416 | if (b > 1) |
263 | { | 417 | { |
264 | if (ctx->buf_len != b) | 418 | if (ctx->buf_len || !ctx->final_used) |
265 | { | 419 | { |
266 | EVPerr(EVP_F_EVP_DECRYPTFINAL,EVP_R_WRONG_FINAL_BLOCK_LENGTH); | 420 | EVPerr(EVP_F_EVP_DECRYPTFINAL,EVP_R_WRONG_FINAL_BLOCK_LENGTH); |
267 | return(0); | 421 | return(0); |
268 | } | 422 | } |
269 | EVP_EncryptUpdate(ctx,ctx->buf,&n,ctx->buf,0); | 423 | n=ctx->final[b-1]; |
270 | if (n != b) | ||
271 | return(0); | ||
272 | n=ctx->buf[b-1]; | ||
273 | if (n > b) | 424 | if (n > b) |
274 | { | 425 | { |
275 | EVPerr(EVP_F_EVP_DECRYPTFINAL,EVP_R_BAD_DECRYPT); | 426 | EVPerr(EVP_F_EVP_DECRYPTFINAL,EVP_R_BAD_DECRYPT); |
@@ -277,7 +428,7 @@ int *outl; | |||
277 | } | 428 | } |
278 | for (i=0; i<n; i++) | 429 | for (i=0; i<n; i++) |
279 | { | 430 | { |
280 | if (ctx->buf[--b] != n) | 431 | if (ctx->final[--b] != n) |
281 | { | 432 | { |
282 | EVPerr(EVP_F_EVP_DECRYPTFINAL,EVP_R_BAD_DECRYPT); | 433 | EVPerr(EVP_F_EVP_DECRYPTFINAL,EVP_R_BAD_DECRYPT); |
283 | return(0); | 434 | return(0); |
@@ -285,7 +436,7 @@ int *outl; | |||
285 | } | 436 | } |
286 | n=ctx->cipher->block_size-n; | 437 | n=ctx->cipher->block_size-n; |
287 | for (i=0; i<n; i++) | 438 | for (i=0; i<n; i++) |
288 | out[i]=ctx->buf[i]; | 439 | out[i]=ctx->final[i]; |
289 | *outl=n; | 440 | *outl=n; |
290 | } | 441 | } |
291 | else | 442 | else |
@@ -293,11 +444,64 @@ int *outl; | |||
293 | return(1); | 444 | return(1); |
294 | } | 445 | } |
295 | 446 | ||
296 | void EVP_CIPHER_CTX_cleanup(c) | 447 | int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c) |
297 | EVP_CIPHER_CTX *c; | ||
298 | { | 448 | { |
299 | if ((c->cipher != NULL) && (c->cipher->cleanup != NULL)) | 449 | if (c->cipher != NULL) |
300 | c->cipher->cleanup(c); | 450 | { |
451 | if(c->cipher->cleanup && !c->cipher->cleanup(c)) | ||
452 | return 0; | ||
453 | /* Zero cipher context data */ | ||
454 | if (c->cipher_data) | ||
455 | memset(c->cipher_data, 0, c->cipher->ctx_size); | ||
456 | } | ||
457 | if (c->cipher_data) | ||
458 | OPENSSL_free(c->cipher_data); | ||
459 | if (c->engine) | ||
460 | /* The EVP_CIPHER we used belongs to an ENGINE, release the | ||
461 | * functional reference we held for this reason. */ | ||
462 | ENGINE_finish(c->engine); | ||
301 | memset(c,0,sizeof(EVP_CIPHER_CTX)); | 463 | memset(c,0,sizeof(EVP_CIPHER_CTX)); |
464 | return 1; | ||
465 | } | ||
466 | |||
467 | int EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *c, int keylen) | ||
468 | { | ||
469 | if(c->cipher->flags & EVP_CIPH_CUSTOM_KEY_LENGTH) | ||
470 | return EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_KEY_LENGTH, keylen, NULL); | ||
471 | if(c->key_len == keylen) return 1; | ||
472 | if((keylen > 0) && (c->cipher->flags & EVP_CIPH_VARIABLE_LENGTH)) | ||
473 | { | ||
474 | c->key_len = keylen; | ||
475 | return 1; | ||
476 | } | ||
477 | EVPerr(EVP_F_EVP_CIPHER_CTX_SET_KEY_LENGTH,EVP_R_INVALID_KEY_LENGTH); | ||
478 | return 0; | ||
479 | } | ||
480 | |||
481 | int EVP_CIPHER_CTX_set_padding(EVP_CIPHER_CTX *ctx, int pad) | ||
482 | { | ||
483 | if (pad) ctx->flags &= ~EVP_CIPH_NO_PADDING; | ||
484 | else ctx->flags |= EVP_CIPH_NO_PADDING; | ||
485 | return 1; | ||
486 | } | ||
487 | |||
488 | int EVP_CIPHER_CTX_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | ||
489 | { | ||
490 | int ret; | ||
491 | if(!ctx->cipher) { | ||
492 | EVPerr(EVP_F_EVP_CIPHER_CTX_CTRL, EVP_R_NO_CIPHER_SET); | ||
493 | return 0; | ||
302 | } | 494 | } |
303 | 495 | ||
496 | if(!ctx->cipher->ctrl) { | ||
497 | EVPerr(EVP_F_EVP_CIPHER_CTX_CTRL, EVP_R_CTRL_NOT_IMPLEMENTED); | ||
498 | return 0; | ||
499 | } | ||
500 | |||
501 | ret = ctx->cipher->ctrl(ctx, type, arg, ptr); | ||
502 | if(ret == -1) { | ||
503 | EVPerr(EVP_F_EVP_CIPHER_CTX_CTRL, EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED); | ||
504 | return 0; | ||
505 | } | ||
506 | return ret; | ||
507 | } | ||
diff --git a/src/lib/libcrypto/evp/evp_err.c b/src/lib/libcrypto/evp/evp_err.c index 2b0a0ab93f..3a23d21c21 100644 --- a/src/lib/libcrypto/evp/evp_err.c +++ b/src/lib/libcrypto/evp/evp_err.c | |||
@@ -1,105 +1,157 @@ | |||
1 | /* lib/evp/evp_err.c */ | 1 | /* crypto/evp/evp_err.c */ |
2 | /* Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) | 2 | /* ==================================================================== |
3 | * All rights reserved. | 3 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * This package is an SSL implementation written | ||
6 | * by Eric Young (eay@cryptsoft.com). | ||
7 | * The implementation was written so as to conform with Netscapes SSL. | ||
8 | * | ||
9 | * This library is free for commercial and non-commercial use as long as | ||
10 | * the following conditions are aheared to. The following conditions | ||
11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
13 | * included with this distribution is covered by the same copyright terms | ||
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
15 | * | ||
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
17 | * the code are not to be removed. | ||
18 | * If this package is used in a product, Eric Young should be given attribution | ||
19 | * as the author of the parts of the library used. | ||
20 | * This can be in the form of a textual message at program startup or | ||
21 | * in documentation (online or textual) provided with the package. | ||
22 | * | ||
23 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
24 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
25 | * are met: | 7 | * are met: |
26 | * 1. Redistributions of source code must retain the copyright | 8 | * |
27 | * notice, this list of conditions and the following disclaimer. | 9 | * 1. Redistributions of source code must retain the above copyright |
10 | * notice, this list of conditions and the following disclaimer. | ||
11 | * | ||
28 | * 2. Redistributions in binary form must reproduce the above copyright | 12 | * 2. Redistributions in binary form must reproduce the above copyright |
29 | * notice, this list of conditions and the following disclaimer in the | 13 | * notice, this list of conditions and the following disclaimer in |
30 | * documentation and/or other materials provided with the distribution. | 14 | * the documentation and/or other materials provided with the |
31 | * 3. All advertising materials mentioning features or use of this software | 15 | * distribution. |
32 | * must display the following acknowledgement: | 16 | * |
33 | * "This product includes cryptographic software written by | 17 | * 3. All advertising materials mentioning features or use of this |
34 | * Eric Young (eay@cryptsoft.com)" | 18 | * software must display the following acknowledgment: |
35 | * The word 'cryptographic' can be left out if the rouines from the library | 19 | * "This product includes software developed by the OpenSSL Project |
36 | * being used are not cryptographic related :-). | 20 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" |
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 21 | * |
38 | * the apps directory (application code) you must include an acknowledgement: | 22 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to |
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 23 | * endorse or promote products derived from this software without |
40 | * | 24 | * prior written permission. For written permission, please contact |
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 25 | * openssl-core@OpenSSL.org. |
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 26 | * |
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 27 | * 5. Products derived from this software may not be called "OpenSSL" |
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | 28 | * nor may "OpenSSL" appear in their names without prior written |
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | 29 | * permission of the OpenSSL Project. |
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | 30 | * |
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | 31 | * 6. Redistributions of any form whatsoever must retain the following |
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | 32 | * acknowledgment: |
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 33 | * "This product includes software developed by the OpenSSL Project |
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 34 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" |
51 | * SUCH DAMAGE. | 35 | * |
52 | * | 36 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY |
53 | * The licence and distribution terms for any publically available version or | 37 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 38 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
55 | * copied and put under another distribution licence | 39 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR |
56 | * [including the GNU Public Licence.] | 40 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
41 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
42 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
43 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
44 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
45 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
46 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
47 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
48 | * ==================================================================== | ||
49 | * | ||
50 | * This product includes cryptographic software written by Eric Young | ||
51 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
52 | * Hudson (tjh@cryptsoft.com). | ||
53 | * | ||
57 | */ | 54 | */ |
55 | |||
56 | /* NOTE: this file was auto generated by the mkerr.pl script: any changes | ||
57 | * made to it will be overwritten when the script next updates this file, | ||
58 | * only reason strings will be preserved. | ||
59 | */ | ||
60 | |||
58 | #include <stdio.h> | 61 | #include <stdio.h> |
59 | #include "err.h" | 62 | #include <openssl/err.h> |
60 | #include "evp.h" | 63 | #include <openssl/evp.h> |
61 | 64 | ||
62 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
63 | #ifndef NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
64 | static ERR_STRING_DATA EVP_str_functs[]= | 67 | static ERR_STRING_DATA EVP_str_functs[]= |
65 | { | 68 | { |
66 | {ERR_PACK(0,EVP_F_D2I_PKEY,0), "D2I_PKEY"}, | 69 | {ERR_PACK(0,EVP_F_D2I_PKEY,0), "D2I_PKEY"}, |
70 | {ERR_PACK(0,EVP_F_EVP_CIPHERINIT,0), "EVP_CipherInit"}, | ||
71 | {ERR_PACK(0,EVP_F_EVP_CIPHER_CTX_CTRL,0), "EVP_CIPHER_CTX_ctrl"}, | ||
72 | {ERR_PACK(0,EVP_F_EVP_CIPHER_CTX_SET_KEY_LENGTH,0), "EVP_CIPHER_CTX_set_key_length"}, | ||
67 | {ERR_PACK(0,EVP_F_EVP_DECRYPTFINAL,0), "EVP_DecryptFinal"}, | 73 | {ERR_PACK(0,EVP_F_EVP_DECRYPTFINAL,0), "EVP_DecryptFinal"}, |
74 | {ERR_PACK(0,EVP_F_EVP_DIGESTINIT,0), "EVP_DigestInit"}, | ||
75 | {ERR_PACK(0,EVP_F_EVP_ENCRYPTFINAL,0), "EVP_EncryptFinal"}, | ||
76 | {ERR_PACK(0,EVP_F_EVP_MD_CTX_COPY,0), "EVP_MD_CTX_copy"}, | ||
68 | {ERR_PACK(0,EVP_F_EVP_OPENINIT,0), "EVP_OpenInit"}, | 77 | {ERR_PACK(0,EVP_F_EVP_OPENINIT,0), "EVP_OpenInit"}, |
78 | {ERR_PACK(0,EVP_F_EVP_PBE_ALG_ADD,0), "EVP_PBE_alg_add"}, | ||
79 | {ERR_PACK(0,EVP_F_EVP_PBE_CIPHERINIT,0), "EVP_PBE_CipherInit"}, | ||
80 | {ERR_PACK(0,EVP_F_EVP_PKCS82PKEY,0), "EVP_PKCS82PKEY"}, | ||
81 | {ERR_PACK(0,EVP_F_EVP_PKCS8_SET_BROKEN,0), "EVP_PKCS8_SET_BROKEN"}, | ||
82 | {ERR_PACK(0,EVP_F_EVP_PKEY2PKCS8,0), "EVP_PKEY2PKCS8"}, | ||
69 | {ERR_PACK(0,EVP_F_EVP_PKEY_COPY_PARAMETERS,0), "EVP_PKEY_copy_parameters"}, | 83 | {ERR_PACK(0,EVP_F_EVP_PKEY_COPY_PARAMETERS,0), "EVP_PKEY_copy_parameters"}, |
70 | {ERR_PACK(0,EVP_F_EVP_PKEY_DECRYPT,0), "EVP_PKEY_decrypt"}, | 84 | {ERR_PACK(0,EVP_F_EVP_PKEY_DECRYPT,0), "EVP_PKEY_decrypt"}, |
71 | {ERR_PACK(0,EVP_F_EVP_PKEY_ENCRYPT,0), "EVP_PKEY_encrypt"}, | 85 | {ERR_PACK(0,EVP_F_EVP_PKEY_ENCRYPT,0), "EVP_PKEY_encrypt"}, |
86 | {ERR_PACK(0,EVP_F_EVP_PKEY_GET1_DH,0), "EVP_PKEY_get1_DH"}, | ||
87 | {ERR_PACK(0,EVP_F_EVP_PKEY_GET1_DSA,0), "EVP_PKEY_get1_DSA"}, | ||
88 | {ERR_PACK(0,EVP_F_EVP_PKEY_GET1_RSA,0), "EVP_PKEY_get1_RSA"}, | ||
72 | {ERR_PACK(0,EVP_F_EVP_PKEY_NEW,0), "EVP_PKEY_new"}, | 89 | {ERR_PACK(0,EVP_F_EVP_PKEY_NEW,0), "EVP_PKEY_new"}, |
90 | {ERR_PACK(0,EVP_F_EVP_RIJNDAEL,0), "EVP_RIJNDAEL"}, | ||
73 | {ERR_PACK(0,EVP_F_EVP_SIGNFINAL,0), "EVP_SignFinal"}, | 91 | {ERR_PACK(0,EVP_F_EVP_SIGNFINAL,0), "EVP_SignFinal"}, |
74 | {ERR_PACK(0,EVP_F_EVP_VERIFYFINAL,0), "EVP_VerifyFinal"}, | 92 | {ERR_PACK(0,EVP_F_EVP_VERIFYFINAL,0), "EVP_VerifyFinal"}, |
75 | {0,NULL}, | 93 | {ERR_PACK(0,EVP_F_PKCS5_PBE_KEYIVGEN,0), "PKCS5_PBE_keyivgen"}, |
94 | {ERR_PACK(0,EVP_F_PKCS5_V2_PBE_KEYIVGEN,0), "PKCS5_v2_PBE_keyivgen"}, | ||
95 | {ERR_PACK(0,EVP_F_RC2_MAGIC_TO_METH,0), "RC2_MAGIC_TO_METH"}, | ||
96 | {ERR_PACK(0,EVP_F_RC5_CTRL,0), "RC5_CTRL"}, | ||
97 | {0,NULL} | ||
76 | }; | 98 | }; |
77 | 99 | ||
78 | static ERR_STRING_DATA EVP_str_reasons[]= | 100 | static ERR_STRING_DATA EVP_str_reasons[]= |
79 | { | 101 | { |
102 | {EVP_R_BAD_BLOCK_LENGTH ,"bad block length"}, | ||
80 | {EVP_R_BAD_DECRYPT ,"bad decrypt"}, | 103 | {EVP_R_BAD_DECRYPT ,"bad decrypt"}, |
104 | {EVP_R_BAD_KEY_LENGTH ,"bad key length"}, | ||
105 | {EVP_R_BN_DECODE_ERROR ,"bn decode error"}, | ||
106 | {EVP_R_BN_PUBKEY_ERROR ,"bn pubkey error"}, | ||
107 | {EVP_R_CIPHER_PARAMETER_ERROR ,"cipher parameter error"}, | ||
108 | {EVP_R_CTRL_NOT_IMPLEMENTED ,"ctrl not implemented"}, | ||
109 | {EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED ,"ctrl operation not implemented"}, | ||
110 | {EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH ,"data not multiple of block length"}, | ||
111 | {EVP_R_DECODE_ERROR ,"decode error"}, | ||
81 | {EVP_R_DIFFERENT_KEY_TYPES ,"different key types"}, | 112 | {EVP_R_DIFFERENT_KEY_TYPES ,"different key types"}, |
113 | {EVP_R_ENCODE_ERROR ,"encode error"}, | ||
114 | {EVP_R_EVP_PBE_CIPHERINIT_ERROR ,"evp pbe cipherinit error"}, | ||
115 | {EVP_R_EXPECTING_AN_RSA_KEY ,"expecting an rsa key"}, | ||
116 | {EVP_R_EXPECTING_A_DH_KEY ,"expecting a dh key"}, | ||
117 | {EVP_R_EXPECTING_A_DSA_KEY ,"expecting a dsa key"}, | ||
118 | {EVP_R_INITIALIZATION_ERROR ,"initialization error"}, | ||
119 | {EVP_R_INPUT_NOT_INITIALIZED ,"input not initialized"}, | ||
120 | {EVP_R_INVALID_KEY_LENGTH ,"invalid key length"}, | ||
82 | {EVP_R_IV_TOO_LARGE ,"iv too large"}, | 121 | {EVP_R_IV_TOO_LARGE ,"iv too large"}, |
83 | {EVP_R_MISSING_PARMATERS ,"missing parmaters"}, | 122 | {EVP_R_KEYGEN_FAILURE ,"keygen failure"}, |
123 | {EVP_R_MISSING_PARAMETERS ,"missing parameters"}, | ||
124 | {EVP_R_NO_CIPHER_SET ,"no cipher set"}, | ||
125 | {EVP_R_NO_DIGEST_SET ,"no digest set"}, | ||
126 | {EVP_R_NO_DSA_PARAMETERS ,"no dsa parameters"}, | ||
84 | {EVP_R_NO_SIGN_FUNCTION_CONFIGURED ,"no sign function configured"}, | 127 | {EVP_R_NO_SIGN_FUNCTION_CONFIGURED ,"no sign function configured"}, |
85 | {EVP_R_NO_VERIFY_FUNCTION_CONFIGURED ,"no verify function configured"}, | 128 | {EVP_R_NO_VERIFY_FUNCTION_CONFIGURED ,"no verify function configured"}, |
129 | {EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE ,"pkcs8 unknown broken type"}, | ||
86 | {EVP_R_PUBLIC_KEY_NOT_RSA ,"public key not rsa"}, | 130 | {EVP_R_PUBLIC_KEY_NOT_RSA ,"public key not rsa"}, |
131 | {EVP_R_UNKNOWN_PBE_ALGORITHM ,"unknown pbe algorithm"}, | ||
132 | {EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS ,"unsuported number of rounds"}, | ||
87 | {EVP_R_UNSUPPORTED_CIPHER ,"unsupported cipher"}, | 133 | {EVP_R_UNSUPPORTED_CIPHER ,"unsupported cipher"}, |
134 | {EVP_R_UNSUPPORTED_KEYLENGTH ,"unsupported keylength"}, | ||
135 | {EVP_R_UNSUPPORTED_KEY_DERIVATION_FUNCTION,"unsupported key derivation function"}, | ||
136 | {EVP_R_UNSUPPORTED_KEY_SIZE ,"unsupported key size"}, | ||
137 | {EVP_R_UNSUPPORTED_PRF ,"unsupported prf"}, | ||
138 | {EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM ,"unsupported private key algorithm"}, | ||
139 | {EVP_R_UNSUPPORTED_SALT_TYPE ,"unsupported salt type"}, | ||
88 | {EVP_R_WRONG_FINAL_BLOCK_LENGTH ,"wrong final block length"}, | 140 | {EVP_R_WRONG_FINAL_BLOCK_LENGTH ,"wrong final block length"}, |
89 | {EVP_R_WRONG_PUBLIC_KEY_TYPE ,"wrong public key type"}, | 141 | {EVP_R_WRONG_PUBLIC_KEY_TYPE ,"wrong public key type"}, |
90 | {0,NULL}, | 142 | {0,NULL} |
91 | }; | 143 | }; |
92 | 144 | ||
93 | #endif | 145 | #endif |
94 | 146 | ||
95 | void ERR_load_EVP_strings() | 147 | void ERR_load_EVP_strings(void) |
96 | { | 148 | { |
97 | static int init=1; | 149 | static int init=1; |
98 | 150 | ||
99 | if (init); | 151 | if (init) |
100 | {; | 152 | { |
101 | init=0; | 153 | init=0; |
102 | #ifndef NO_ERR | 154 | #ifndef OPENSSL_NO_ERR |
103 | ERR_load_strings(ERR_LIB_EVP,EVP_str_functs); | 155 | ERR_load_strings(ERR_LIB_EVP,EVP_str_functs); |
104 | ERR_load_strings(ERR_LIB_EVP,EVP_str_reasons); | 156 | ERR_load_strings(ERR_LIB_EVP,EVP_str_reasons); |
105 | #endif | 157 | #endif |
diff --git a/src/lib/libcrypto/evp/evp_key.c b/src/lib/libcrypto/evp/evp_key.c index dafa686f64..4271393069 100644 --- a/src/lib/libcrypto/evp/evp_key.c +++ b/src/lib/libcrypto/evp/evp_key.c | |||
@@ -58,23 +58,26 @@ | |||
58 | 58 | ||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
61 | #include "x509.h" | 61 | #include <openssl/x509.h> |
62 | #include "objects.h" | 62 | #include <openssl/objects.h> |
63 | #include "evp.h" | 63 | #include <openssl/evp.h> |
64 | #include <openssl/ui.h> | ||
64 | 65 | ||
65 | /* should be init to zeros. */ | 66 | /* should be init to zeros. */ |
66 | static char prompt_string[80]; | 67 | static char prompt_string[80]; |
67 | 68 | ||
68 | void EVP_set_pw_prompt(prompt) | 69 | void EVP_set_pw_prompt(char *prompt) |
69 | char *prompt; | ||
70 | { | 70 | { |
71 | if (prompt == NULL) | 71 | if (prompt == NULL) |
72 | prompt_string[0]='\0'; | 72 | prompt_string[0]='\0'; |
73 | else | 73 | else |
74 | { | ||
74 | strncpy(prompt_string,prompt,79); | 75 | strncpy(prompt_string,prompt,79); |
76 | prompt_string[79]='\0'; | ||
77 | } | ||
75 | } | 78 | } |
76 | 79 | ||
77 | char *EVP_get_pw_prompt() | 80 | char *EVP_get_pw_prompt(void) |
78 | { | 81 | { |
79 | if (prompt_string[0] == '\0') | 82 | if (prompt_string[0] == '\0') |
80 | return(NULL); | 83 | return(NULL); |
@@ -82,30 +85,31 @@ char *EVP_get_pw_prompt() | |||
82 | return(prompt_string); | 85 | return(prompt_string); |
83 | } | 86 | } |
84 | 87 | ||
85 | #ifdef NO_DES | 88 | /* For historical reasons, the standard function for reading passwords is |
86 | int des_read_pw_string(char *buf,int len,char *prompt,int verify); | 89 | * in the DES library -- if someone ever wants to disable DES, |
87 | #endif | 90 | * this function will fail */ |
88 | 91 | int EVP_read_pw_string(char *buf, int len, const char *prompt, int verify) | |
89 | int EVP_read_pw_string(buf,len,prompt,verify) | ||
90 | char *buf; | ||
91 | int len; | ||
92 | char *prompt; | ||
93 | int verify; | ||
94 | { | 92 | { |
93 | int ret; | ||
94 | char buff[BUFSIZ]; | ||
95 | UI *ui; | ||
96 | |||
95 | if ((prompt == NULL) && (prompt_string[0] != '\0')) | 97 | if ((prompt == NULL) && (prompt_string[0] != '\0')) |
96 | prompt=prompt_string; | 98 | prompt=prompt_string; |
97 | return(des_read_pw_string(buf,len,prompt,verify)); | 99 | ui = UI_new(); |
100 | UI_add_input_string(ui,prompt,0,buf,0,(len>=BUFSIZ)?BUFSIZ-1:len); | ||
101 | if (verify) | ||
102 | UI_add_verify_string(ui,prompt,0, | ||
103 | buff,0,(len>=BUFSIZ)?BUFSIZ-1:len,buf); | ||
104 | ret = UI_process(ui); | ||
105 | UI_free(ui); | ||
106 | memset(buff,0,BUFSIZ); | ||
107 | return ret; | ||
98 | } | 108 | } |
99 | 109 | ||
100 | int EVP_BytesToKey(type,md,salt,data,datal,count,key,iv) | 110 | int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, |
101 | EVP_CIPHER *type; | 111 | const unsigned char *salt, const unsigned char *data, int datal, |
102 | EVP_MD *md; | 112 | int count, unsigned char *key, unsigned char *iv) |
103 | unsigned char *salt; | ||
104 | unsigned char *data; | ||
105 | int datal; | ||
106 | int count; | ||
107 | unsigned char *key; | ||
108 | unsigned char *iv; | ||
109 | { | 113 | { |
110 | EVP_MD_CTX c; | 114 | EVP_MD_CTX c; |
111 | unsigned char md_buf[EVP_MAX_MD_SIZE]; | 115 | unsigned char md_buf[EVP_MAX_MD_SIZE]; |
@@ -117,21 +121,22 @@ unsigned char *iv; | |||
117 | 121 | ||
118 | if (data == NULL) return(nkey); | 122 | if (data == NULL) return(nkey); |
119 | 123 | ||
124 | EVP_MD_CTX_init(&c); | ||
120 | for (;;) | 125 | for (;;) |
121 | { | 126 | { |
122 | EVP_DigestInit(&c,md); | 127 | EVP_DigestInit_ex(&c,md, NULL); |
123 | if (addmd++) | 128 | if (addmd++) |
124 | EVP_DigestUpdate(&c,&(md_buf[0]),mds); | 129 | EVP_DigestUpdate(&c,&(md_buf[0]),mds); |
125 | EVP_DigestUpdate(&c,data,datal); | 130 | EVP_DigestUpdate(&c,data,datal); |
126 | if (salt != NULL) | 131 | if (salt != NULL) |
127 | EVP_DigestUpdate(&c,salt,8); | 132 | EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN); |
128 | EVP_DigestFinal(&c,&(md_buf[0]),&mds); | 133 | EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds); |
129 | 134 | ||
130 | for (i=1; i<(unsigned int)count; i++) | 135 | for (i=1; i<(unsigned int)count; i++) |
131 | { | 136 | { |
132 | EVP_DigestInit(&c,md); | 137 | EVP_DigestInit_ex(&c,md, NULL); |
133 | EVP_DigestUpdate(&c,&(md_buf[0]),mds); | 138 | EVP_DigestUpdate(&c,&(md_buf[0]),mds); |
134 | EVP_DigestFinal(&c,&(md_buf[0]),&mds); | 139 | EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds); |
135 | } | 140 | } |
136 | i=0; | 141 | i=0; |
137 | if (nkey) | 142 | if (nkey) |
@@ -160,7 +165,7 @@ unsigned char *iv; | |||
160 | } | 165 | } |
161 | if ((nkey == 0) && (niv == 0)) break; | 166 | if ((nkey == 0) && (niv == 0)) break; |
162 | } | 167 | } |
163 | memset(&c,0,sizeof(c)); | 168 | EVP_MD_CTX_cleanup(&c); |
164 | memset(&(md_buf[0]),0,EVP_MAX_MD_SIZE); | 169 | memset(&(md_buf[0]),0,EVP_MAX_MD_SIZE); |
165 | return(type->key_len); | 170 | return(type->key_len); |
166 | } | 171 | } |
diff --git a/src/lib/libcrypto/evp/evp_lib.c b/src/lib/libcrypto/evp/evp_lib.c index 69784eb555..a431945ef5 100644 --- a/src/lib/libcrypto/evp/evp_lib.c +++ b/src/lib/libcrypto/evp/evp_lib.c | |||
@@ -58,12 +58,10 @@ | |||
58 | 58 | ||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
61 | #include "evp.h" | 61 | #include <openssl/evp.h> |
62 | #include "objects.h" | 62 | #include <openssl/objects.h> |
63 | 63 | ||
64 | int EVP_CIPHER_param_to_asn1(c,type) | 64 | int EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
65 | EVP_CIPHER_CTX *c; | ||
66 | ASN1_TYPE *type; | ||
67 | { | 65 | { |
68 | int ret; | 66 | int ret; |
69 | 67 | ||
@@ -74,9 +72,7 @@ ASN1_TYPE *type; | |||
74 | return(ret); | 72 | return(ret); |
75 | } | 73 | } |
76 | 74 | ||
77 | int EVP_CIPHER_asn1_to_param(c,type) | 75 | int EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
78 | EVP_CIPHER_CTX *c; | ||
79 | ASN1_TYPE *type; | ||
80 | { | 76 | { |
81 | int ret; | 77 | int ret; |
82 | 78 | ||
@@ -87,9 +83,7 @@ ASN1_TYPE *type; | |||
87 | return(ret); | 83 | return(ret); |
88 | } | 84 | } |
89 | 85 | ||
90 | int EVP_CIPHER_get_asn1_iv(c,type) | 86 | int EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
91 | EVP_CIPHER_CTX *c; | ||
92 | ASN1_TYPE *type; | ||
93 | { | 87 | { |
94 | int i=0,l; | 88 | int i=0,l; |
95 | 89 | ||
@@ -97,14 +91,15 @@ ASN1_TYPE *type; | |||
97 | { | 91 | { |
98 | l=EVP_CIPHER_CTX_iv_length(c); | 92 | l=EVP_CIPHER_CTX_iv_length(c); |
99 | i=ASN1_TYPE_get_octetstring(type,c->oiv,l); | 93 | i=ASN1_TYPE_get_octetstring(type,c->oiv,l); |
100 | memcpy(c->iv,c->oiv,l); | 94 | if (i != l) |
95 | return(-1); | ||
96 | else if (i > 0) | ||
97 | memcpy(c->iv,c->oiv,l); | ||
101 | } | 98 | } |
102 | return(i); | 99 | return(i); |
103 | } | 100 | } |
104 | 101 | ||
105 | int EVP_CIPHER_set_asn1_iv(c,type) | 102 | int EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
106 | EVP_CIPHER_CTX *c; | ||
107 | ASN1_TYPE *type; | ||
108 | { | 103 | { |
109 | int i=0,j; | 104 | int i=0,j; |
110 | 105 | ||
@@ -115,3 +110,33 @@ ASN1_TYPE *type; | |||
115 | } | 110 | } |
116 | return(i); | 111 | return(i); |
117 | } | 112 | } |
113 | |||
114 | /* Convert the various cipher NIDs and dummies to a proper OID NID */ | ||
115 | int EVP_CIPHER_type(const EVP_CIPHER *ctx) | ||
116 | { | ||
117 | int nid; | ||
118 | ASN1_OBJECT *otmp; | ||
119 | nid = EVP_CIPHER_nid(ctx); | ||
120 | |||
121 | switch(nid) { | ||
122 | |||
123 | case NID_rc2_cbc: | ||
124 | case NID_rc2_64_cbc: | ||
125 | case NID_rc2_40_cbc: | ||
126 | |||
127 | return NID_rc2_cbc; | ||
128 | |||
129 | case NID_rc4: | ||
130 | case NID_rc4_40: | ||
131 | |||
132 | return NID_rc4; | ||
133 | |||
134 | default: | ||
135 | /* Check it has an OID and it is valid */ | ||
136 | otmp = OBJ_nid2obj(nid); | ||
137 | if(!otmp || !otmp->data) nid = NID_undef; | ||
138 | ASN1_OBJECT_free(otmp); | ||
139 | return nid; | ||
140 | } | ||
141 | } | ||
142 | |||
diff --git a/src/lib/libcrypto/evp/evp_locl.h b/src/lib/libcrypto/evp/evp_locl.h index ce49d5b7d8..7b088b4848 100644 --- a/src/lib/libcrypto/evp/evp_locl.h +++ b/src/lib/libcrypto/evp/evp_locl.h | |||
@@ -61,50 +61,107 @@ | |||
61 | /* Wrapper functions for each cipher mode */ | 61 | /* Wrapper functions for each cipher mode */ |
62 | 62 | ||
63 | #define BLOCK_CIPHER_ecb_loop() \ | 63 | #define BLOCK_CIPHER_ecb_loop() \ |
64 | unsigned int i; \ | 64 | unsigned int i, bl; \ |
65 | if(inl < 8) return 1;\ | 65 | bl = ctx->cipher->block_size;\ |
66 | inl -= 8; \ | 66 | if(inl < bl) return 1;\ |
67 | for(i=0; i <= inl; i+=8) \ | 67 | inl -= bl; \ |
68 | for(i=0; i <= inl; i+=bl) \ | ||
68 | 69 | ||
69 | #define BLOCK_CIPHER_func_ecb(cname, cprefix, kname) \ | 70 | #define BLOCK_CIPHER_func_ecb(cname, cprefix, kstruct, ksched) \ |
70 | static int cname##_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, unsigned int inl) \ | 71 | static int cname##_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, unsigned int inl) \ |
71 | {\ | 72 | {\ |
72 | BLOCK_CIPHER_ecb_loop() \ | 73 | BLOCK_CIPHER_ecb_loop() \ |
73 | cprefix##_ecb_encrypt(in + i, out + i, &ctx->c.kname, ctx->encrypt);\ | 74 | cprefix##_ecb_encrypt(in + i, out + i, &((kstruct *)ctx->cipher_data)->ksched, ctx->encrypt);\ |
74 | return 1;\ | 75 | return 1;\ |
75 | } | 76 | } |
76 | 77 | ||
77 | #define BLOCK_CIPHER_func_ofb(cname, cprefix, kname) \ | 78 | #define BLOCK_CIPHER_func_ofb(cname, cprefix, cbits, kstruct, ksched) \ |
78 | static int cname##_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, unsigned int inl) \ | 79 | static int cname##_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, unsigned int inl) \ |
79 | {\ | 80 | {\ |
80 | cprefix##_ofb64_encrypt(in, out, (long)inl, &ctx->c.kname, ctx->iv, &ctx->num);\ | 81 | cprefix##_ofb##cbits##_encrypt(in, out, (long)inl, &((kstruct *)ctx->cipher_data)->ksched, ctx->iv, &ctx->num);\ |
81 | return 1;\ | 82 | return 1;\ |
82 | } | 83 | } |
83 | 84 | ||
84 | #define BLOCK_CIPHER_func_cbc(cname, cprefix, kname) \ | 85 | #define BLOCK_CIPHER_func_cbc(cname, cprefix, kstruct, ksched) \ |
85 | static int cname##_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, unsigned int inl) \ | 86 | static int cname##_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, unsigned int inl) \ |
86 | {\ | 87 | {\ |
87 | cprefix##_cbc_encrypt(in, out, (long)inl, &ctx->c.kname, ctx->iv, ctx->encrypt);\ | 88 | cprefix##_cbc_encrypt(in, out, (long)inl, &((kstruct *)ctx->cipher_data)->ksched, ctx->iv, ctx->encrypt);\ |
88 | return 1;\ | 89 | return 1;\ |
89 | } | 90 | } |
90 | 91 | ||
91 | #define BLOCK_CIPHER_func_cfb(cname, cprefix, kname) \ | 92 | #define BLOCK_CIPHER_func_cfb(cname, cprefix, cbits, kstruct, ksched) \ |
92 | static int cname##_cfb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, unsigned int inl) \ | 93 | static int cname##_cfb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, unsigned int inl) \ |
93 | {\ | 94 | {\ |
94 | cprefix##_cfb64_encrypt(in, out, (long)inl, &ctx->c.kname, ctx->iv, &ctx->num, ctx->encrypt);\ | 95 | cprefix##_cfb##cbits##_encrypt(in, out, (long)inl, &((kstruct *)ctx->cipher_data)->ksched, ctx->iv, &ctx->num, ctx->encrypt);\ |
95 | return 1;\ | 96 | return 1;\ |
96 | } | 97 | } |
97 | 98 | ||
98 | #define BLOCK_CIPHER_all_funcs(cname, cprefix, kname) \ | 99 | #define BLOCK_CIPHER_all_funcs(cname, cprefix, cbits, kstruct, ksched) \ |
99 | BLOCK_CIPHER_func_cbc(cname, cprefix, kname) \ | 100 | BLOCK_CIPHER_func_cbc(cname, cprefix, kstruct, ksched) \ |
100 | BLOCK_CIPHER_func_cfb(cname, cprefix, kname) \ | 101 | BLOCK_CIPHER_func_cfb(cname, cprefix, cbits, kstruct, ksched) \ |
101 | BLOCK_CIPHER_func_ecb(cname, cprefix, kname) \ | 102 | BLOCK_CIPHER_func_ecb(cname, cprefix, kstruct, ksched) \ |
102 | BLOCK_CIPHER_func_ofb(cname, cprefix, kname) | 103 | BLOCK_CIPHER_func_ofb(cname, cprefix, cbits, kstruct, ksched) |
103 | 104 | ||
105 | #define BLOCK_CIPHER_def1(cname, nmode, mode, MODE, kstruct, nid, block_size, \ | ||
106 | key_len, iv_len, flags, init_key, cleanup, \ | ||
107 | set_asn1, get_asn1, ctrl) \ | ||
108 | static const EVP_CIPHER cname##_##mode = { \ | ||
109 | nid##_##nmode, block_size, key_len, iv_len, \ | ||
110 | flags | EVP_CIPH_##MODE##_MODE, \ | ||
111 | init_key, \ | ||
112 | cname##_##mode##_cipher, \ | ||
113 | cleanup, \ | ||
114 | sizeof(kstruct), \ | ||
115 | set_asn1, get_asn1,\ | ||
116 | ctrl, \ | ||
117 | NULL \ | ||
118 | }; \ | ||
119 | const EVP_CIPHER *EVP_##cname##_##mode(void) { return &cname##_##mode; } | ||
120 | |||
121 | #define BLOCK_CIPHER_def_cbc(cname, kstruct, nid, block_size, key_len, \ | ||
122 | iv_len, flags, init_key, cleanup, set_asn1, \ | ||
123 | get_asn1, ctrl) \ | ||
124 | BLOCK_CIPHER_def1(cname, cbc, cbc, CBC, kstruct, nid, block_size, key_len, \ | ||
125 | iv_len, flags, init_key, cleanup, set_asn1, get_asn1, ctrl) | ||
126 | |||
127 | #define BLOCK_CIPHER_def_cfb(cname, kstruct, nid, block_size, key_len, \ | ||
128 | iv_len, cbits, flags, init_key, cleanup, \ | ||
129 | set_asn1, get_asn1, ctrl) \ | ||
130 | BLOCK_CIPHER_def1(cname, cfb##cbits, cfb, CFB, kstruct, nid, block_size, \ | ||
131 | key_len, iv_len, flags, init_key, cleanup, set_asn1, \ | ||
132 | get_asn1, ctrl) | ||
133 | |||
134 | #define BLOCK_CIPHER_def_ofb(cname, kstruct, nid, block_size, key_len, \ | ||
135 | iv_len, cbits, flags, init_key, cleanup, \ | ||
136 | set_asn1, get_asn1, ctrl) \ | ||
137 | BLOCK_CIPHER_def1(cname, ofb##cbits, ofb, OFB, kstruct, nid, block_size, \ | ||
138 | key_len, iv_len, flags, init_key, cleanup, set_asn1, \ | ||
139 | get_asn1, ctrl) | ||
140 | |||
141 | #define BLOCK_CIPHER_def_ecb(cname, kstruct, nid, block_size, key_len, \ | ||
142 | iv_len, flags, init_key, cleanup, set_asn1, \ | ||
143 | get_asn1, ctrl) \ | ||
144 | BLOCK_CIPHER_def1(cname, ecb, ecb, ECB, kstruct, nid, block_size, key_len, \ | ||
145 | iv_len, flags, init_key, cleanup, set_asn1, get_asn1, ctrl) | ||
146 | |||
147 | #define BLOCK_CIPHER_defs(cname, kstruct, \ | ||
148 | nid, block_size, key_len, iv_len, cbits, flags, \ | ||
149 | init_key, cleanup, set_asn1, get_asn1, ctrl) \ | ||
150 | BLOCK_CIPHER_def_cbc(cname, kstruct, nid, block_size, key_len, iv_len, flags, \ | ||
151 | init_key, cleanup, set_asn1, get_asn1, ctrl) \ | ||
152 | BLOCK_CIPHER_def_cfb(cname, kstruct, nid, block_size, key_len, iv_len, cbits, \ | ||
153 | flags, init_key, cleanup, set_asn1, get_asn1, ctrl) \ | ||
154 | BLOCK_CIPHER_def_ofb(cname, kstruct, nid, block_size, key_len, iv_len, cbits, \ | ||
155 | flags, init_key, cleanup, set_asn1, get_asn1, ctrl) \ | ||
156 | BLOCK_CIPHER_def_ecb(cname, kstruct, nid, block_size, key_len, iv_len, flags, \ | ||
157 | init_key, cleanup, set_asn1, get_asn1, ctrl) | ||
158 | |||
159 | |||
160 | /* | ||
104 | #define BLOCK_CIPHER_defs(cname, kstruct, \ | 161 | #define BLOCK_CIPHER_defs(cname, kstruct, \ |
105 | nid, block_size, key_len, iv_len, flags,\ | 162 | nid, block_size, key_len, iv_len, flags,\ |
106 | init_key, cleanup, set_asn1, get_asn1, ctrl)\ | 163 | init_key, cleanup, set_asn1, get_asn1, ctrl)\ |
107 | static EVP_CIPHER cname##_cbc = {\ | 164 | static const EVP_CIPHER cname##_cbc = {\ |
108 | nid##_cbc, block_size, key_len, iv_len, \ | 165 | nid##_cbc, block_size, key_len, iv_len, \ |
109 | flags | EVP_CIPH_CBC_MODE,\ | 166 | flags | EVP_CIPH_CBC_MODE,\ |
110 | init_key,\ | 167 | init_key,\ |
@@ -116,8 +173,8 @@ static EVP_CIPHER cname##_cbc = {\ | |||
116 | ctrl, \ | 173 | ctrl, \ |
117 | NULL \ | 174 | NULL \ |
118 | };\ | 175 | };\ |
119 | EVP_CIPHER *EVP_##cname##_cbc(void) { return &cname##_cbc; }\ | 176 | const EVP_CIPHER *EVP_##cname##_cbc(void) { return &cname##_cbc; }\ |
120 | static EVP_CIPHER cname##_cfb = {\ | 177 | static const EVP_CIPHER cname##_cfb = {\ |
121 | nid##_cfb64, 1, key_len, iv_len, \ | 178 | nid##_cfb64, 1, key_len, iv_len, \ |
122 | flags | EVP_CIPH_CFB_MODE,\ | 179 | flags | EVP_CIPH_CFB_MODE,\ |
123 | init_key,\ | 180 | init_key,\ |
@@ -129,8 +186,8 @@ static EVP_CIPHER cname##_cfb = {\ | |||
129 | ctrl,\ | 186 | ctrl,\ |
130 | NULL \ | 187 | NULL \ |
131 | };\ | 188 | };\ |
132 | EVP_CIPHER *EVP_##cname##_cfb(void) { return &cname##_cfb; }\ | 189 | const EVP_CIPHER *EVP_##cname##_cfb(void) { return &cname##_cfb; }\ |
133 | static EVP_CIPHER cname##_ofb = {\ | 190 | static const EVP_CIPHER cname##_ofb = {\ |
134 | nid##_ofb64, 1, key_len, iv_len, \ | 191 | nid##_ofb64, 1, key_len, iv_len, \ |
135 | flags | EVP_CIPH_OFB_MODE,\ | 192 | flags | EVP_CIPH_OFB_MODE,\ |
136 | init_key,\ | 193 | init_key,\ |
@@ -142,8 +199,8 @@ static EVP_CIPHER cname##_ofb = {\ | |||
142 | ctrl,\ | 199 | ctrl,\ |
143 | NULL \ | 200 | NULL \ |
144 | };\ | 201 | };\ |
145 | EVP_CIPHER *EVP_##cname##_ofb(void) { return &cname##_ofb; }\ | 202 | const EVP_CIPHER *EVP_##cname##_ofb(void) { return &cname##_ofb; }\ |
146 | static EVP_CIPHER cname##_ecb = {\ | 203 | static const EVP_CIPHER cname##_ecb = {\ |
147 | nid##_ecb, block_size, key_len, iv_len, \ | 204 | nid##_ecb, block_size, key_len, iv_len, \ |
148 | flags | EVP_CIPH_ECB_MODE,\ | 205 | flags | EVP_CIPH_ECB_MODE,\ |
149 | init_key,\ | 206 | init_key,\ |
@@ -155,14 +212,16 @@ static EVP_CIPHER cname##_ecb = {\ | |||
155 | ctrl,\ | 212 | ctrl,\ |
156 | NULL \ | 213 | NULL \ |
157 | };\ | 214 | };\ |
158 | EVP_CIPHER *EVP_##cname##_ecb(void) { return &cname##_ecb; } | 215 | const EVP_CIPHER *EVP_##cname##_ecb(void) { return &cname##_ecb; } |
159 | 216 | */ | |
160 | |||
161 | 217 | ||
162 | #define IMPLEMENT_BLOCK_CIPHER(cname, kname, cprefix, kstruct, \ | 218 | #define IMPLEMENT_BLOCK_CIPHER(cname, ksched, cprefix, kstruct, nid, \ |
163 | nid, block_size, key_len, iv_len, flags, \ | 219 | block_size, key_len, iv_len, cbits, \ |
164 | init_key, cleanup, set_asn1, get_asn1, ctrl) \ | 220 | flags, init_key, \ |
165 | BLOCK_CIPHER_all_funcs(cname, cprefix, kname) \ | 221 | cleanup, set_asn1, get_asn1, ctrl) \ |
166 | BLOCK_CIPHER_defs(cname, kstruct, nid, block_size, key_len, iv_len, flags,\ | 222 | BLOCK_CIPHER_all_funcs(cname, cprefix, cbits, kstruct, ksched) \ |
167 | init_key, cleanup, set_asn1, get_asn1, ctrl) | 223 | BLOCK_CIPHER_defs(cname, kstruct, nid, block_size, key_len, iv_len, \ |
224 | cbits, flags, init_key, cleanup, set_asn1, \ | ||
225 | get_asn1, ctrl) | ||
168 | 226 | ||
227 | #define EVP_C_DATA(kstruct, ctx) ((kstruct *)(ctx)->cipher_data) | ||
diff --git a/src/lib/libcrypto/evp/evp_pbe.c b/src/lib/libcrypto/evp/evp_pbe.c index 353c3ad667..06afb9d152 100644 --- a/src/lib/libcrypto/evp/evp_pbe.c +++ b/src/lib/libcrypto/evp/evp_pbe.c | |||
@@ -69,8 +69,8 @@ static STACK *pbe_algs; | |||
69 | 69 | ||
70 | typedef struct { | 70 | typedef struct { |
71 | int pbe_nid; | 71 | int pbe_nid; |
72 | EVP_CIPHER *cipher; | 72 | const EVP_CIPHER *cipher; |
73 | EVP_MD *md; | 73 | const EVP_MD *md; |
74 | EVP_PBE_KEYGEN *keygen; | 74 | EVP_PBE_KEYGEN *keygen; |
75 | } EVP_PBE_CTL; | 75 | } EVP_PBE_CTL; |
76 | 76 | ||
@@ -92,7 +92,8 @@ int EVP_PBE_CipherInit (ASN1_OBJECT *pbe_obj, const char *pass, int passlen, | |||
92 | ERR_add_error_data(2, "TYPE=", obj_tmp); | 92 | ERR_add_error_data(2, "TYPE=", obj_tmp); |
93 | return 0; | 93 | return 0; |
94 | } | 94 | } |
95 | if (passlen == -1) passlen = strlen(pass); | 95 | if(!pass) passlen = 0; |
96 | else if (passlen == -1) passlen = strlen(pass); | ||
96 | pbetmp = (EVP_PBE_CTL *)sk_value (pbe_algs, i); | 97 | pbetmp = (EVP_PBE_CTL *)sk_value (pbe_algs, i); |
97 | i = (*pbetmp->keygen)(ctx, pass, passlen, param, pbetmp->cipher, | 98 | i = (*pbetmp->keygen)(ctx, pass, passlen, param, pbetmp->cipher, |
98 | pbetmp->md, en_de); | 99 | pbetmp->md, en_de); |
@@ -103,19 +104,20 @@ int EVP_PBE_CipherInit (ASN1_OBJECT *pbe_obj, const char *pass, int passlen, | |||
103 | return 1; | 104 | return 1; |
104 | } | 105 | } |
105 | 106 | ||
106 | static int pbe_cmp (EVP_PBE_CTL **pbe1, EVP_PBE_CTL **pbe2) | 107 | static int pbe_cmp(const char * const *a, const char * const *b) |
107 | { | 108 | { |
109 | EVP_PBE_CTL **pbe1 = (EVP_PBE_CTL **) a, **pbe2 = (EVP_PBE_CTL **)b; | ||
108 | return ((*pbe1)->pbe_nid - (*pbe2)->pbe_nid); | 110 | return ((*pbe1)->pbe_nid - (*pbe2)->pbe_nid); |
109 | } | 111 | } |
110 | 112 | ||
111 | /* Add a PBE algorithm */ | 113 | /* Add a PBE algorithm */ |
112 | 114 | ||
113 | int EVP_PBE_alg_add (int nid, EVP_CIPHER *cipher, EVP_MD *md, | 115 | int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, |
114 | EVP_PBE_KEYGEN *keygen) | 116 | EVP_PBE_KEYGEN *keygen) |
115 | { | 117 | { |
116 | EVP_PBE_CTL *pbe_tmp; | 118 | EVP_PBE_CTL *pbe_tmp; |
117 | if (!pbe_algs) pbe_algs = sk_new (pbe_cmp); | 119 | if (!pbe_algs) pbe_algs = sk_new(pbe_cmp); |
118 | if (!(pbe_tmp = (EVP_PBE_CTL*) Malloc (sizeof(EVP_PBE_CTL)))) { | 120 | if (!(pbe_tmp = (EVP_PBE_CTL*) OPENSSL_malloc (sizeof(EVP_PBE_CTL)))) { |
119 | EVPerr(EVP_F_EVP_PBE_ALG_ADD,ERR_R_MALLOC_FAILURE); | 121 | EVPerr(EVP_F_EVP_PBE_ALG_ADD,ERR_R_MALLOC_FAILURE); |
120 | return 0; | 122 | return 0; |
121 | } | 123 | } |
@@ -129,6 +131,6 @@ int EVP_PBE_alg_add (int nid, EVP_CIPHER *cipher, EVP_MD *md, | |||
129 | 131 | ||
130 | void EVP_PBE_cleanup(void) | 132 | void EVP_PBE_cleanup(void) |
131 | { | 133 | { |
132 | sk_pop_free(pbe_algs, FreeFunc); | 134 | sk_pop_free(pbe_algs, OPENSSL_freeFunc); |
133 | pbe_algs = NULL; | 135 | pbe_algs = NULL; |
134 | } | 136 | } |
diff --git a/src/lib/libcrypto/evp/evp_pkey.c b/src/lib/libcrypto/evp/evp_pkey.c index 421e452db1..34b5b1d21c 100644 --- a/src/lib/libcrypto/evp/evp_pkey.c +++ b/src/lib/libcrypto/evp/evp_pkey.c | |||
@@ -62,41 +62,40 @@ | |||
62 | #include <openssl/x509.h> | 62 | #include <openssl/x509.h> |
63 | #include <openssl/rand.h> | 63 | #include <openssl/rand.h> |
64 | 64 | ||
65 | #ifndef OPENSSL_NO_DSA | ||
66 | static int dsa_pkey2pkcs8(PKCS8_PRIV_KEY_INFO *p8inf, EVP_PKEY *pkey); | ||
67 | #endif | ||
68 | |||
65 | /* Extract a private key from a PKCS8 structure */ | 69 | /* Extract a private key from a PKCS8 structure */ |
66 | 70 | ||
67 | EVP_PKEY *EVP_PKCS82PKEY (PKCS8_PRIV_KEY_INFO *p8) | 71 | EVP_PKEY *EVP_PKCS82PKEY (PKCS8_PRIV_KEY_INFO *p8) |
68 | { | 72 | { |
69 | EVP_PKEY *pkey; | 73 | EVP_PKEY *pkey = NULL; |
70 | #ifndef NO_RSA | 74 | #ifndef OPENSSL_NO_RSA |
71 | RSA *rsa; | 75 | RSA *rsa = NULL; |
72 | #endif | 76 | #endif |
73 | #ifndef NO_DSA | 77 | #ifndef OPENSSL_NO_DSA |
74 | DSA *dsa; | 78 | DSA *dsa = NULL; |
75 | ASN1_INTEGER *dsapriv; | 79 | ASN1_INTEGER *privkey; |
76 | STACK *ndsa; | 80 | ASN1_TYPE *t1, *t2, *param = NULL; |
77 | BN_CTX *ctx; | 81 | STACK_OF(ASN1_TYPE) *ndsa = NULL; |
82 | BN_CTX *ctx = NULL; | ||
78 | int plen; | 83 | int plen; |
79 | #endif | 84 | #endif |
80 | X509_ALGOR *a; | 85 | X509_ALGOR *a; |
81 | unsigned char *p; | 86 | unsigned char *p; |
87 | const unsigned char *cp; | ||
82 | int pkeylen; | 88 | int pkeylen; |
83 | char obj_tmp[80]; | 89 | char obj_tmp[80]; |
84 | 90 | ||
85 | switch (p8->broken) { | 91 | if(p8->pkey->type == V_ASN1_OCTET_STRING) { |
86 | case PKCS8_OK: | 92 | p8->broken = PKCS8_OK; |
87 | p = p8->pkey->value.octet_string->data; | 93 | p = p8->pkey->value.octet_string->data; |
88 | pkeylen = p8->pkey->value.octet_string->length; | 94 | pkeylen = p8->pkey->value.octet_string->length; |
89 | break; | 95 | } else { |
90 | 96 | p8->broken = PKCS8_NO_OCTET; | |
91 | case PKCS8_NO_OCTET: | ||
92 | p = p8->pkey->value.sequence->data; | 97 | p = p8->pkey->value.sequence->data; |
93 | pkeylen = p8->pkey->value.sequence->length; | 98 | pkeylen = p8->pkey->value.sequence->length; |
94 | break; | ||
95 | |||
96 | default: | ||
97 | EVPerr(EVP_F_EVP_PKCS82PKEY,EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE); | ||
98 | return NULL; | ||
99 | break; | ||
100 | } | 99 | } |
101 | if (!(pkey = EVP_PKEY_new())) { | 100 | if (!(pkey = EVP_PKEY_new())) { |
102 | EVPerr(EVP_F_EVP_PKCS82PKEY,ERR_R_MALLOC_FAILURE); | 101 | EVPerr(EVP_F_EVP_PKCS82PKEY,ERR_R_MALLOC_FAILURE); |
@@ -105,81 +104,108 @@ EVP_PKEY *EVP_PKCS82PKEY (PKCS8_PRIV_KEY_INFO *p8) | |||
105 | a = p8->pkeyalg; | 104 | a = p8->pkeyalg; |
106 | switch (OBJ_obj2nid(a->algorithm)) | 105 | switch (OBJ_obj2nid(a->algorithm)) |
107 | { | 106 | { |
108 | #ifndef NO_RSA | 107 | #ifndef OPENSSL_NO_RSA |
109 | case NID_rsaEncryption: | 108 | case NID_rsaEncryption: |
110 | if (!(rsa = d2i_RSAPrivateKey (NULL, &p, pkeylen))) { | 109 | cp = p; |
110 | if (!(rsa = d2i_RSAPrivateKey (NULL,&cp, pkeylen))) { | ||
111 | EVPerr(EVP_F_EVP_PKCS82PKEY, EVP_R_DECODE_ERROR); | 111 | EVPerr(EVP_F_EVP_PKCS82PKEY, EVP_R_DECODE_ERROR); |
112 | return NULL; | 112 | return NULL; |
113 | } | 113 | } |
114 | EVP_PKEY_assign_RSA (pkey, rsa); | 114 | EVP_PKEY_assign_RSA (pkey, rsa); |
115 | break; | 115 | break; |
116 | #endif | 116 | #endif |
117 | #ifndef NO_DSA | 117 | #ifndef OPENSSL_NO_DSA |
118 | case NID_dsa: | 118 | case NID_dsa: |
119 | /* PKCS#8 DSA is weird: you just get a private key integer | 119 | /* PKCS#8 DSA is weird: you just get a private key integer |
120 | * and parameters in the AlgorithmIdentifier the pubkey must | 120 | * and parameters in the AlgorithmIdentifier the pubkey must |
121 | * be recalculated. | 121 | * be recalculated. |
122 | */ | 122 | */ |
123 | 123 | ||
124 | /* Check for broken Netscape Database DSA PKCS#8, UGH! */ | 124 | /* Check for broken DSA PKCS#8, UGH! */ |
125 | if(*p == (V_ASN1_SEQUENCE|V_ASN1_CONSTRUCTED)) { | 125 | if(*p == (V_ASN1_SEQUENCE|V_ASN1_CONSTRUCTED)) { |
126 | if(!(ndsa = ASN1_seq_unpack(p, pkeylen, | 126 | if(!(ndsa = ASN1_seq_unpack_ASN1_TYPE(p, pkeylen, |
127 | (char *(*)())d2i_ASN1_INTEGER, | 127 | d2i_ASN1_TYPE, |
128 | ASN1_STRING_free))) { | 128 | ASN1_TYPE_free))) { |
129 | EVPerr(EVP_F_EVP_PKCS82PKEY, EVP_R_DECODE_ERROR); | 129 | EVPerr(EVP_F_EVP_PKCS82PKEY, EVP_R_DECODE_ERROR); |
130 | return NULL; | 130 | goto dsaerr; |
131 | } | 131 | } |
132 | if(sk_num(ndsa) != 2 ) { | 132 | if(sk_ASN1_TYPE_num(ndsa) != 2 ) { |
133 | EVPerr(EVP_F_EVP_PKCS82PKEY, EVP_R_DECODE_ERROR); | 133 | EVPerr(EVP_F_EVP_PKCS82PKEY, EVP_R_DECODE_ERROR); |
134 | sk_pop_free(ndsa, ASN1_STRING_free); | 134 | goto dsaerr; |
135 | return NULL; | ||
136 | } | 135 | } |
137 | dsapriv = (ASN1_INTEGER *) sk_pop(ndsa); | 136 | /* Handle Two broken types: |
138 | sk_pop_free(ndsa, ASN1_STRING_free); | 137 | * SEQUENCE {parameters, priv_key} |
139 | } else if (!(dsapriv=d2i_ASN1_INTEGER (NULL, &p, pkeylen))) { | 138 | * SEQUENCE {pub_key, priv_key} |
139 | */ | ||
140 | |||
141 | t1 = sk_ASN1_TYPE_value(ndsa, 0); | ||
142 | t2 = sk_ASN1_TYPE_value(ndsa, 1); | ||
143 | if(t1->type == V_ASN1_SEQUENCE) { | ||
144 | p8->broken = PKCS8_EMBEDDED_PARAM; | ||
145 | param = t1; | ||
146 | } else if(a->parameter->type == V_ASN1_SEQUENCE) { | ||
147 | p8->broken = PKCS8_NS_DB; | ||
148 | param = a->parameter; | ||
149 | } else { | ||
140 | EVPerr(EVP_F_EVP_PKCS82PKEY, EVP_R_DECODE_ERROR); | 150 | EVPerr(EVP_F_EVP_PKCS82PKEY, EVP_R_DECODE_ERROR); |
141 | return NULL; | 151 | goto dsaerr; |
152 | } | ||
153 | |||
154 | if(t2->type != V_ASN1_INTEGER) { | ||
155 | EVPerr(EVP_F_EVP_PKCS82PKEY, EVP_R_DECODE_ERROR); | ||
156 | goto dsaerr; | ||
157 | } | ||
158 | privkey = t2->value.integer; | ||
159 | } else { | ||
160 | if (!(privkey=d2i_ASN1_INTEGER (NULL, &p, pkeylen))) { | ||
161 | EVPerr(EVP_F_EVP_PKCS82PKEY, EVP_R_DECODE_ERROR); | ||
162 | goto dsaerr; | ||
163 | } | ||
164 | param = p8->pkeyalg->parameter; | ||
142 | } | 165 | } |
143 | /* Retrieve parameters */ | 166 | if (!param || (param->type != V_ASN1_SEQUENCE)) { |
144 | if (a->parameter->type != V_ASN1_SEQUENCE) { | 167 | EVPerr(EVP_F_EVP_PKCS82PKEY, EVP_R_DECODE_ERROR); |
145 | EVPerr(EVP_F_EVP_PKCS82PKEY, EVP_R_NO_DSA_PARAMETERS); | 168 | goto dsaerr; |
146 | return NULL; | ||
147 | } | 169 | } |
148 | p = a->parameter->value.sequence->data; | 170 | cp = p = param->value.sequence->data; |
149 | plen = a->parameter->value.sequence->length; | 171 | plen = param->value.sequence->length; |
150 | if (!(dsa = d2i_DSAparams (NULL, &p, plen))) { | 172 | if (!(dsa = d2i_DSAparams (NULL, &cp, plen))) { |
151 | EVPerr(EVP_F_EVP_PKCS82PKEY, EVP_R_DECODE_ERROR); | 173 | EVPerr(EVP_F_EVP_PKCS82PKEY, EVP_R_DECODE_ERROR); |
152 | return NULL; | 174 | goto dsaerr; |
153 | } | 175 | } |
154 | /* We have parameters now set private key */ | 176 | /* We have parameters now set private key */ |
155 | if (!(dsa->priv_key = ASN1_INTEGER_to_BN(dsapriv, NULL))) { | 177 | if (!(dsa->priv_key = ASN1_INTEGER_to_BN(privkey, NULL))) { |
156 | EVPerr(EVP_F_EVP_PKCS82PKEY,EVP_R_BN_DECODE_ERROR); | 178 | EVPerr(EVP_F_EVP_PKCS82PKEY,EVP_R_BN_DECODE_ERROR); |
157 | DSA_free (dsa); | 179 | goto dsaerr; |
158 | return NULL; | ||
159 | } | 180 | } |
160 | /* Calculate public key (ouch!) */ | 181 | /* Calculate public key (ouch!) */ |
161 | if (!(dsa->pub_key = BN_new())) { | 182 | if (!(dsa->pub_key = BN_new())) { |
162 | EVPerr(EVP_F_EVP_PKCS82PKEY,ERR_R_MALLOC_FAILURE); | 183 | EVPerr(EVP_F_EVP_PKCS82PKEY,ERR_R_MALLOC_FAILURE); |
163 | DSA_free (dsa); | 184 | goto dsaerr; |
164 | return NULL; | ||
165 | } | 185 | } |
166 | if (!(ctx = BN_CTX_new())) { | 186 | if (!(ctx = BN_CTX_new())) { |
167 | EVPerr(EVP_F_EVP_PKCS82PKEY,ERR_R_MALLOC_FAILURE); | 187 | EVPerr(EVP_F_EVP_PKCS82PKEY,ERR_R_MALLOC_FAILURE); |
168 | DSA_free (dsa); | 188 | goto dsaerr; |
169 | return NULL; | ||
170 | } | 189 | } |
171 | 190 | ||
172 | if (!BN_mod_exp(dsa->pub_key, dsa->g, | 191 | if (!BN_mod_exp(dsa->pub_key, dsa->g, |
173 | dsa->priv_key, dsa->p, ctx)) { | 192 | dsa->priv_key, dsa->p, ctx)) { |
174 | 193 | ||
175 | EVPerr(EVP_F_EVP_PKCS82PKEY,EVP_R_BN_PUBKEY_ERROR); | 194 | EVPerr(EVP_F_EVP_PKCS82PKEY,EVP_R_BN_PUBKEY_ERROR); |
176 | BN_CTX_free (ctx); | 195 | goto dsaerr; |
177 | DSA_free (dsa); | ||
178 | return NULL; | ||
179 | } | 196 | } |
180 | 197 | ||
181 | EVP_PKEY_assign_DSA (pkey, dsa); | 198 | EVP_PKEY_assign_DSA(pkey, dsa); |
182 | BN_CTX_free (ctx); | 199 | BN_CTX_free (ctx); |
200 | if(ndsa) sk_ASN1_TYPE_pop_free(ndsa, ASN1_TYPE_free); | ||
201 | else ASN1_INTEGER_free(privkey); | ||
202 | break; | ||
203 | dsaerr: | ||
204 | BN_CTX_free (ctx); | ||
205 | sk_ASN1_TYPE_pop_free(ndsa, ASN1_TYPE_free); | ||
206 | DSA_free(dsa); | ||
207 | EVP_PKEY_free(pkey); | ||
208 | return NULL; | ||
183 | break; | 209 | break; |
184 | #endif | 210 | #endif |
185 | default: | 211 | default: |
@@ -193,30 +219,35 @@ EVP_PKEY *EVP_PKCS82PKEY (PKCS8_PRIV_KEY_INFO *p8) | |||
193 | return pkey; | 219 | return pkey; |
194 | } | 220 | } |
195 | 221 | ||
222 | PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8(EVP_PKEY *pkey) | ||
223 | { | ||
224 | return EVP_PKEY2PKCS8_broken(pkey, PKCS8_OK); | ||
225 | } | ||
226 | |||
196 | /* Turn a private key into a PKCS8 structure */ | 227 | /* Turn a private key into a PKCS8 structure */ |
197 | 228 | ||
198 | PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8(EVP_PKEY *pkey) | 229 | PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8_broken(EVP_PKEY *pkey, int broken) |
199 | { | 230 | { |
200 | PKCS8_PRIV_KEY_INFO *p8; | 231 | PKCS8_PRIV_KEY_INFO *p8; |
201 | #ifndef NO_DSA | 232 | |
202 | ASN1_INTEGER *dpkey; | ||
203 | unsigned char *p, *q; | ||
204 | int len; | ||
205 | #endif | ||
206 | if (!(p8 = PKCS8_PRIV_KEY_INFO_new())) { | 233 | if (!(p8 = PKCS8_PRIV_KEY_INFO_new())) { |
207 | EVPerr(EVP_F_EVP_PKEY2PKCS8,ERR_R_MALLOC_FAILURE); | 234 | EVPerr(EVP_F_EVP_PKEY2PKCS8,ERR_R_MALLOC_FAILURE); |
208 | return NULL; | 235 | return NULL; |
209 | } | 236 | } |
237 | p8->broken = broken; | ||
210 | ASN1_INTEGER_set (p8->version, 0); | 238 | ASN1_INTEGER_set (p8->version, 0); |
211 | if (!(p8->pkeyalg->parameter = ASN1_TYPE_new ())) { | 239 | if (!(p8->pkeyalg->parameter = ASN1_TYPE_new ())) { |
212 | EVPerr(EVP_F_EVP_PKEY2PKCS8,ERR_R_MALLOC_FAILURE); | 240 | EVPerr(EVP_F_EVP_PKEY2PKCS8,ERR_R_MALLOC_FAILURE); |
213 | PKCS8_PRIV_KEY_INFO_free (p8); | 241 | PKCS8_PRIV_KEY_INFO_free (p8); |
214 | return NULL; | 242 | return NULL; |
215 | } | 243 | } |
244 | p8->pkey->type = V_ASN1_OCTET_STRING; | ||
216 | switch (EVP_PKEY_type(pkey->type)) { | 245 | switch (EVP_PKEY_type(pkey->type)) { |
217 | #ifndef NO_RSA | 246 | #ifndef OPENSSL_NO_RSA |
218 | case EVP_PKEY_RSA: | 247 | case EVP_PKEY_RSA: |
219 | 248 | ||
249 | if(p8->broken == PKCS8_NO_OCTET) p8->pkey->type = V_ASN1_SEQUENCE; | ||
250 | |||
220 | p8->pkeyalg->algorithm = OBJ_nid2obj(NID_rsaEncryption); | 251 | p8->pkeyalg->algorithm = OBJ_nid2obj(NID_rsaEncryption); |
221 | p8->pkeyalg->parameter->type = V_ASN1_NULL; | 252 | p8->pkeyalg->parameter->type = V_ASN1_NULL; |
222 | if (!ASN1_pack_string ((char *)pkey, i2d_PrivateKey, | 253 | if (!ASN1_pack_string ((char *)pkey, i2d_PrivateKey, |
@@ -227,38 +258,13 @@ PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8(EVP_PKEY *pkey) | |||
227 | } | 258 | } |
228 | break; | 259 | break; |
229 | #endif | 260 | #endif |
230 | #ifndef NO_DSA | 261 | #ifndef OPENSSL_NO_DSA |
231 | case EVP_PKEY_DSA: | 262 | case EVP_PKEY_DSA: |
232 | p8->pkeyalg->algorithm = OBJ_nid2obj(NID_dsa); | 263 | if(!dsa_pkey2pkcs8(p8, pkey)) { |
233 | |||
234 | /* get paramaters and place in AlgorithmIdentifier */ | ||
235 | len = i2d_DSAparams (pkey->pkey.dsa, NULL); | ||
236 | if (!(p = Malloc(len))) { | ||
237 | EVPerr(EVP_F_EVP_PKEY2PKCS8,ERR_R_MALLOC_FAILURE); | ||
238 | PKCS8_PRIV_KEY_INFO_free (p8); | ||
239 | return NULL; | ||
240 | } | ||
241 | q = p; | ||
242 | i2d_DSAparams (pkey->pkey.dsa, &q); | ||
243 | p8->pkeyalg->parameter->type = V_ASN1_SEQUENCE; | ||
244 | p8->pkeyalg->parameter->value.sequence = ASN1_STRING_new(); | ||
245 | ASN1_STRING_set(p8->pkeyalg->parameter->value.sequence, p, len); | ||
246 | Free(p); | ||
247 | /* Get private key into an integer and pack */ | ||
248 | if (!(dpkey = BN_to_ASN1_INTEGER (pkey->pkey.dsa->priv_key, NULL))) { | ||
249 | EVPerr(EVP_F_EVP_PKEY2PKCS8,EVP_R_ENCODE_ERROR); | ||
250 | PKCS8_PRIV_KEY_INFO_free (p8); | 264 | PKCS8_PRIV_KEY_INFO_free (p8); |
251 | return NULL; | 265 | return NULL; |
252 | } | 266 | } |
253 | 267 | ||
254 | if (!ASN1_pack_string((char *)dpkey, i2d_ASN1_INTEGER, | ||
255 | &p8->pkey->value.octet_string)) { | ||
256 | EVPerr(EVP_F_EVP_PKEY2PKCS8,ERR_R_MALLOC_FAILURE); | ||
257 | ASN1_INTEGER_free (dpkey); | ||
258 | PKCS8_PRIV_KEY_INFO_free (p8); | ||
259 | return NULL; | ||
260 | } | ||
261 | ASN1_INTEGER_free (dpkey); | ||
262 | break; | 268 | break; |
263 | #endif | 269 | #endif |
264 | default: | 270 | default: |
@@ -266,9 +272,8 @@ PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8(EVP_PKEY *pkey) | |||
266 | PKCS8_PRIV_KEY_INFO_free (p8); | 272 | PKCS8_PRIV_KEY_INFO_free (p8); |
267 | return NULL; | 273 | return NULL; |
268 | } | 274 | } |
269 | p8->pkey->type = V_ASN1_OCTET_STRING; | 275 | RAND_add(p8->pkey->value.octet_string->data, |
270 | RAND_seed (p8->pkey->value.octet_string->data, | 276 | p8->pkey->value.octet_string->length, 0); |
271 | p8->pkey->value.octet_string->length); | ||
272 | return p8; | 277 | return p8; |
273 | } | 278 | } |
274 | 279 | ||
@@ -295,4 +300,113 @@ PKCS8_PRIV_KEY_INFO *PKCS8_set_broken(PKCS8_PRIV_KEY_INFO *p8, int broken) | |||
295 | } | 300 | } |
296 | } | 301 | } |
297 | 302 | ||
303 | #ifndef OPENSSL_NO_DSA | ||
304 | static int dsa_pkey2pkcs8(PKCS8_PRIV_KEY_INFO *p8, EVP_PKEY *pkey) | ||
305 | { | ||
306 | ASN1_STRING *params; | ||
307 | ASN1_INTEGER *prkey; | ||
308 | ASN1_TYPE *ttmp; | ||
309 | STACK_OF(ASN1_TYPE) *ndsa; | ||
310 | unsigned char *p, *q; | ||
311 | int len; | ||
312 | |||
313 | p8->pkeyalg->algorithm = OBJ_nid2obj(NID_dsa); | ||
314 | len = i2d_DSAparams (pkey->pkey.dsa, NULL); | ||
315 | if (!(p = OPENSSL_malloc(len))) { | ||
316 | EVPerr(EVP_F_EVP_PKEY2PKCS8,ERR_R_MALLOC_FAILURE); | ||
317 | PKCS8_PRIV_KEY_INFO_free (p8); | ||
318 | return 0; | ||
319 | } | ||
320 | q = p; | ||
321 | i2d_DSAparams (pkey->pkey.dsa, &q); | ||
322 | params = ASN1_STRING_new(); | ||
323 | ASN1_STRING_set(params, p, len); | ||
324 | OPENSSL_free(p); | ||
325 | /* Get private key into integer */ | ||
326 | if (!(prkey = BN_to_ASN1_INTEGER (pkey->pkey.dsa->priv_key, NULL))) { | ||
327 | EVPerr(EVP_F_EVP_PKEY2PKCS8,EVP_R_ENCODE_ERROR); | ||
328 | return 0; | ||
329 | } | ||
330 | |||
331 | switch(p8->broken) { | ||
332 | |||
333 | case PKCS8_OK: | ||
334 | case PKCS8_NO_OCTET: | ||
335 | |||
336 | if (!ASN1_pack_string((char *)prkey, i2d_ASN1_INTEGER, | ||
337 | &p8->pkey->value.octet_string)) { | ||
338 | EVPerr(EVP_F_EVP_PKEY2PKCS8,ERR_R_MALLOC_FAILURE); | ||
339 | M_ASN1_INTEGER_free (prkey); | ||
340 | return 0; | ||
341 | } | ||
342 | |||
343 | M_ASN1_INTEGER_free (prkey); | ||
344 | p8->pkeyalg->parameter->value.sequence = params; | ||
345 | p8->pkeyalg->parameter->type = V_ASN1_SEQUENCE; | ||
346 | |||
347 | break; | ||
348 | |||
349 | case PKCS8_NS_DB: | ||
350 | |||
351 | p8->pkeyalg->parameter->value.sequence = params; | ||
352 | p8->pkeyalg->parameter->type = V_ASN1_SEQUENCE; | ||
353 | ndsa = sk_ASN1_TYPE_new_null(); | ||
354 | ttmp = ASN1_TYPE_new(); | ||
355 | if (!(ttmp->value.integer = BN_to_ASN1_INTEGER (pkey->pkey.dsa->pub_key, NULL))) { | ||
356 | EVPerr(EVP_F_EVP_PKEY2PKCS8,EVP_R_ENCODE_ERROR); | ||
357 | PKCS8_PRIV_KEY_INFO_free(p8); | ||
358 | return 0; | ||
359 | } | ||
360 | ttmp->type = V_ASN1_INTEGER; | ||
361 | sk_ASN1_TYPE_push(ndsa, ttmp); | ||
362 | |||
363 | ttmp = ASN1_TYPE_new(); | ||
364 | ttmp->value.integer = prkey; | ||
365 | ttmp->type = V_ASN1_INTEGER; | ||
366 | sk_ASN1_TYPE_push(ndsa, ttmp); | ||
367 | |||
368 | p8->pkey->value.octet_string = ASN1_OCTET_STRING_new(); | ||
369 | |||
370 | if (!ASN1_seq_pack_ASN1_TYPE(ndsa, i2d_ASN1_TYPE, | ||
371 | &p8->pkey->value.octet_string->data, | ||
372 | &p8->pkey->value.octet_string->length)) { | ||
373 | |||
374 | EVPerr(EVP_F_EVP_PKEY2PKCS8,ERR_R_MALLOC_FAILURE); | ||
375 | sk_ASN1_TYPE_pop_free(ndsa, ASN1_TYPE_free); | ||
376 | M_ASN1_INTEGER_free(prkey); | ||
377 | return 0; | ||
378 | } | ||
379 | sk_ASN1_TYPE_pop_free(ndsa, ASN1_TYPE_free); | ||
380 | break; | ||
298 | 381 | ||
382 | case PKCS8_EMBEDDED_PARAM: | ||
383 | |||
384 | p8->pkeyalg->parameter->type = V_ASN1_NULL; | ||
385 | ndsa = sk_ASN1_TYPE_new_null(); | ||
386 | ttmp = ASN1_TYPE_new(); | ||
387 | ttmp->value.sequence = params; | ||
388 | ttmp->type = V_ASN1_SEQUENCE; | ||
389 | sk_ASN1_TYPE_push(ndsa, ttmp); | ||
390 | |||
391 | ttmp = ASN1_TYPE_new(); | ||
392 | ttmp->value.integer = prkey; | ||
393 | ttmp->type = V_ASN1_INTEGER; | ||
394 | sk_ASN1_TYPE_push(ndsa, ttmp); | ||
395 | |||
396 | p8->pkey->value.octet_string = ASN1_OCTET_STRING_new(); | ||
397 | |||
398 | if (!ASN1_seq_pack_ASN1_TYPE(ndsa, i2d_ASN1_TYPE, | ||
399 | &p8->pkey->value.octet_string->data, | ||
400 | &p8->pkey->value.octet_string->length)) { | ||
401 | |||
402 | EVPerr(EVP_F_EVP_PKEY2PKCS8,ERR_R_MALLOC_FAILURE); | ||
403 | sk_ASN1_TYPE_pop_free(ndsa, ASN1_TYPE_free); | ||
404 | M_ASN1_INTEGER_free (prkey); | ||
405 | return 0; | ||
406 | } | ||
407 | sk_ASN1_TYPE_pop_free(ndsa, ASN1_TYPE_free); | ||
408 | break; | ||
409 | } | ||
410 | return 1; | ||
411 | } | ||
412 | #endif | ||
diff --git a/src/lib/libcrypto/evp/m_dss.c b/src/lib/libcrypto/evp/m_dss.c index 3549b1699c..beb8d7fc5c 100644 --- a/src/lib/libcrypto/evp/m_dss.c +++ b/src/lib/libcrypto/evp/m_dss.c | |||
@@ -58,25 +58,38 @@ | |||
58 | 58 | ||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
61 | #include "evp.h" | 61 | #include <openssl/evp.h> |
62 | #include "objects.h" | 62 | #include <openssl/objects.h> |
63 | #include "x509.h" | 63 | #include <openssl/x509.h> |
64 | 64 | ||
65 | static EVP_MD dsa_md= | 65 | #ifndef OPENSSL_NO_SHA |
66 | static int init(EVP_MD_CTX *ctx) | ||
67 | { return SHA1_Init(ctx->md_data); } | ||
68 | |||
69 | static int update(EVP_MD_CTX *ctx,const void *data,unsigned long count) | ||
70 | { return SHA1_Update(ctx->md_data,data,count); } | ||
71 | |||
72 | static int final(EVP_MD_CTX *ctx,unsigned char *md) | ||
73 | { return SHA1_Final(md,ctx->md_data); } | ||
74 | |||
75 | static const EVP_MD dsa_md= | ||
66 | { | 76 | { |
67 | NID_dsaWithSHA, | 77 | NID_dsaWithSHA, |
68 | NID_dsaWithSHA, | 78 | NID_dsaWithSHA, |
69 | SHA_DIGEST_LENGTH, | 79 | SHA_DIGEST_LENGTH, |
70 | SHA1_Init, | 80 | 0, |
71 | SHA1_Update, | 81 | init, |
72 | SHA1_Final, | 82 | update, |
83 | final, | ||
84 | NULL, | ||
85 | NULL, | ||
73 | EVP_PKEY_DSA_method, | 86 | EVP_PKEY_DSA_method, |
74 | SHA_CBLOCK, | 87 | SHA_CBLOCK, |
75 | sizeof(EVP_MD *)+sizeof(SHA_CTX), | 88 | sizeof(EVP_MD *)+sizeof(SHA_CTX), |
76 | }; | 89 | }; |
77 | 90 | ||
78 | EVP_MD *EVP_dss() | 91 | const EVP_MD *EVP_dss(void) |
79 | { | 92 | { |
80 | return(&dsa_md); | 93 | return(&dsa_md); |
81 | } | 94 | } |
82 | 95 | #endif | |
diff --git a/src/lib/libcrypto/evp/m_dss1.c b/src/lib/libcrypto/evp/m_dss1.c index ff256b7b20..f5668ebda0 100644 --- a/src/lib/libcrypto/evp/m_dss1.c +++ b/src/lib/libcrypto/evp/m_dss1.c | |||
@@ -56,26 +56,40 @@ | |||
56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
57 | */ | 57 | */ |
58 | 58 | ||
59 | #ifndef OPENSSL_NO_SHA | ||
59 | #include <stdio.h> | 60 | #include <stdio.h> |
60 | #include "cryptlib.h" | 61 | #include "cryptlib.h" |
61 | #include "evp.h" | 62 | #include <openssl/evp.h> |
62 | #include "objects.h" | 63 | #include <openssl/objects.h> |
63 | #include "x509.h" | 64 | #include <openssl/x509.h> |
64 | 65 | ||
65 | static EVP_MD dss1_md= | 66 | static int init(EVP_MD_CTX *ctx) |
67 | { return SHA1_Init(ctx->md_data); } | ||
68 | |||
69 | static int update(EVP_MD_CTX *ctx,const void *data,unsigned long count) | ||
70 | { return SHA1_Update(ctx->md_data,data,count); } | ||
71 | |||
72 | static int final(EVP_MD_CTX *ctx,unsigned char *md) | ||
73 | { return SHA1_Final(md,ctx->md_data); } | ||
74 | |||
75 | static const EVP_MD dss1_md= | ||
66 | { | 76 | { |
67 | NID_dsa, | 77 | NID_dsa, |
68 | NID_dsaWithSHA1, | 78 | NID_dsaWithSHA1, |
69 | SHA_DIGEST_LENGTH, | 79 | SHA_DIGEST_LENGTH, |
70 | SHA1_Init, | 80 | 0, |
71 | SHA1_Update, | 81 | init, |
72 | SHA1_Final, | 82 | update, |
83 | final, | ||
84 | NULL, | ||
85 | NULL, | ||
73 | EVP_PKEY_DSA_method, | 86 | EVP_PKEY_DSA_method, |
74 | SHA_CBLOCK, | 87 | SHA_CBLOCK, |
75 | sizeof(EVP_MD *)+sizeof(SHA_CTX), | 88 | sizeof(EVP_MD *)+sizeof(SHA_CTX), |
76 | }; | 89 | }; |
77 | 90 | ||
78 | EVP_MD *EVP_dss1() | 91 | const EVP_MD *EVP_dss1(void) |
79 | { | 92 | { |
80 | return(&dss1_md); | 93 | return(&dss1_md); |
81 | } | 94 | } |
95 | #endif | ||
diff --git a/src/lib/libcrypto/evp/m_md4.c b/src/lib/libcrypto/evp/m_md4.c index 6a24ceb86d..e19b663754 100644 --- a/src/lib/libcrypto/evp/m_md4.c +++ b/src/lib/libcrypto/evp/m_md4.c | |||
@@ -56,27 +56,40 @@ | |||
56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
57 | */ | 57 | */ |
58 | 58 | ||
59 | #ifndef NO_MD4 | 59 | #ifndef OPENSSL_NO_MD4 |
60 | #include <stdio.h> | 60 | #include <stdio.h> |
61 | #include "cryptlib.h" | 61 | #include "cryptlib.h" |
62 | #include <openssl/evp.h> | 62 | #include <openssl/evp.h> |
63 | #include <openssl/objects.h> | 63 | #include <openssl/objects.h> |
64 | #include <openssl/x509.h> | 64 | #include <openssl/x509.h> |
65 | #include <openssl/md4.h> | ||
65 | 66 | ||
66 | static EVP_MD md4_md= | 67 | static int init(EVP_MD_CTX *ctx) |
68 | { return MD4_Init(ctx->md_data); } | ||
69 | |||
70 | static int update(EVP_MD_CTX *ctx,const void *data,unsigned long count) | ||
71 | { return MD4_Update(ctx->md_data,data,count); } | ||
72 | |||
73 | static int final(EVP_MD_CTX *ctx,unsigned char *md) | ||
74 | { return MD4_Final(md,ctx->md_data); } | ||
75 | |||
76 | static const EVP_MD md4_md= | ||
67 | { | 77 | { |
68 | NID_md4, | 78 | NID_md4, |
69 | 0, | 79 | NID_md4WithRSAEncryption, |
70 | MD4_DIGEST_LENGTH, | 80 | MD4_DIGEST_LENGTH, |
71 | MD4_Init, | 81 | 0, |
72 | MD4_Update, | 82 | init, |
73 | MD4_Final, | 83 | update, |
84 | final, | ||
85 | NULL, | ||
86 | NULL, | ||
74 | EVP_PKEY_RSA_method, | 87 | EVP_PKEY_RSA_method, |
75 | MD4_CBLOCK, | 88 | MD4_CBLOCK, |
76 | sizeof(EVP_MD *)+sizeof(MD4_CTX), | 89 | sizeof(EVP_MD *)+sizeof(MD4_CTX), |
77 | }; | 90 | }; |
78 | 91 | ||
79 | EVP_MD *EVP_md4(void) | 92 | const EVP_MD *EVP_md4(void) |
80 | { | 93 | { |
81 | return(&md4_md); | 94 | return(&md4_md); |
82 | } | 95 | } |
diff --git a/src/lib/libcrypto/evp/m_md5.c b/src/lib/libcrypto/evp/m_md5.c index d65db9aa1d..b00a03e048 100644 --- a/src/lib/libcrypto/evp/m_md5.c +++ b/src/lib/libcrypto/evp/m_md5.c | |||
@@ -56,26 +56,41 @@ | |||
56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
57 | */ | 57 | */ |
58 | 58 | ||
59 | #ifndef OPENSSL_NO_MD5 | ||
59 | #include <stdio.h> | 60 | #include <stdio.h> |
60 | #include "cryptlib.h" | 61 | #include "cryptlib.h" |
61 | #include "evp.h" | 62 | #include <openssl/evp.h> |
62 | #include "objects.h" | 63 | #include <openssl/objects.h> |
63 | #include "x509.h" | 64 | #include <openssl/x509.h> |
65 | #include <openssl/md5.h> | ||
64 | 66 | ||
65 | static EVP_MD md5_md= | 67 | static int init(EVP_MD_CTX *ctx) |
68 | { return MD5_Init(ctx->md_data); } | ||
69 | |||
70 | static int update(EVP_MD_CTX *ctx,const void *data,unsigned long count) | ||
71 | { return MD5_Update(ctx->md_data,data,count); } | ||
72 | |||
73 | static int final(EVP_MD_CTX *ctx,unsigned char *md) | ||
74 | { return MD5_Final(md,ctx->md_data); } | ||
75 | |||
76 | static const EVP_MD md5_md= | ||
66 | { | 77 | { |
67 | NID_md5, | 78 | NID_md5, |
68 | NID_md5WithRSAEncryption, | 79 | NID_md5WithRSAEncryption, |
69 | MD5_DIGEST_LENGTH, | 80 | MD5_DIGEST_LENGTH, |
70 | MD5_Init, | 81 | 0, |
71 | MD5_Update, | 82 | init, |
72 | MD5_Final, | 83 | update, |
84 | final, | ||
85 | NULL, | ||
86 | NULL, | ||
73 | EVP_PKEY_RSA_method, | 87 | EVP_PKEY_RSA_method, |
74 | MD5_CBLOCK, | 88 | MD5_CBLOCK, |
75 | sizeof(EVP_MD *)+sizeof(MD5_CTX), | 89 | sizeof(EVP_MD *)+sizeof(MD5_CTX), |
76 | }; | 90 | }; |
77 | 91 | ||
78 | EVP_MD *EVP_md5() | 92 | const EVP_MD *EVP_md5(void) |
79 | { | 93 | { |
80 | return(&md5_md); | 94 | return(&md5_md); |
81 | } | 95 | } |
96 | #endif | ||
diff --git a/src/lib/libcrypto/evp/m_null.c b/src/lib/libcrypto/evp/m_null.c index 6d80560df2..f6f0a1d2c0 100644 --- a/src/lib/libcrypto/evp/m_null.c +++ b/src/lib/libcrypto/evp/m_null.c | |||
@@ -58,29 +58,36 @@ | |||
58 | 58 | ||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
61 | #include "evp.h" | 61 | #include <openssl/evp.h> |
62 | #include "objects.h" | 62 | #include <openssl/objects.h> |
63 | #include "x509.h" | 63 | #include <openssl/x509.h> |
64 | 64 | ||
65 | static void function() | 65 | static int init(EVP_MD_CTX *ctx) |
66 | { | 66 | { return 1; } |
67 | } | 67 | |
68 | static int update(EVP_MD_CTX *ctx,const void *data,unsigned long count) | ||
69 | { return 1; } | ||
68 | 70 | ||
69 | static EVP_MD null_md= | 71 | static int final(EVP_MD_CTX *ctx,unsigned char *md) |
72 | { return 1; } | ||
73 | |||
74 | static const EVP_MD null_md= | ||
70 | { | 75 | { |
71 | NID_undef, | 76 | NID_undef, |
72 | NID_undef, | 77 | NID_undef, |
73 | 0, | 78 | 0, |
74 | function, | 79 | 0, |
75 | function, | 80 | init, |
76 | function, | 81 | update, |
77 | 82 | final, | |
83 | NULL, | ||
84 | NULL, | ||
78 | EVP_PKEY_NULL_method, | 85 | EVP_PKEY_NULL_method, |
79 | 0, | 86 | 0, |
80 | sizeof(EVP_MD *), | 87 | sizeof(EVP_MD *), |
81 | }; | 88 | }; |
82 | 89 | ||
83 | EVP_MD *EVP_md_null() | 90 | const EVP_MD *EVP_md_null(void) |
84 | { | 91 | { |
85 | return(&null_md); | 92 | return(&null_md); |
86 | } | 93 | } |
diff --git a/src/lib/libcrypto/evp/m_ripemd.c b/src/lib/libcrypto/evp/m_ripemd.c index 04c5d8897b..64725528dc 100644 --- a/src/lib/libcrypto/evp/m_ripemd.c +++ b/src/lib/libcrypto/evp/m_ripemd.c | |||
@@ -56,26 +56,41 @@ | |||
56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
57 | */ | 57 | */ |
58 | 58 | ||
59 | #ifndef OPENSSL_NO_RIPEMD | ||
59 | #include <stdio.h> | 60 | #include <stdio.h> |
60 | #include "cryptlib.h" | 61 | #include "cryptlib.h" |
61 | #include "evp.h" | 62 | #include <openssl/ripemd.h> |
62 | #include "objects.h" | 63 | #include <openssl/evp.h> |
63 | #include "x509.h" | 64 | #include <openssl/objects.h> |
65 | #include <openssl/x509.h> | ||
64 | 66 | ||
65 | static EVP_MD ripemd160_md= | 67 | static int init(EVP_MD_CTX *ctx) |
68 | { return RIPEMD160_Init(ctx->md_data); } | ||
69 | |||
70 | static int update(EVP_MD_CTX *ctx,const void *data,unsigned long count) | ||
71 | { return RIPEMD160_Update(ctx->md_data,data,count); } | ||
72 | |||
73 | static int final(EVP_MD_CTX *ctx,unsigned char *md) | ||
74 | { return RIPEMD160_Final(md,ctx->md_data); } | ||
75 | |||
76 | static const EVP_MD ripemd160_md= | ||
66 | { | 77 | { |
67 | NID_ripemd160, | 78 | NID_ripemd160, |
68 | NID_ripemd160WithRSA, | 79 | NID_ripemd160WithRSA, |
69 | RIPEMD160_DIGEST_LENGTH, | 80 | RIPEMD160_DIGEST_LENGTH, |
70 | RIPEMD160_Init, | 81 | 0, |
71 | RIPEMD160_Update, | 82 | init, |
72 | RIPEMD160_Final, | 83 | update, |
84 | final, | ||
85 | NULL, | ||
86 | NULL, | ||
73 | EVP_PKEY_RSA_method, | 87 | EVP_PKEY_RSA_method, |
74 | RIPEMD160_CBLOCK, | 88 | RIPEMD160_CBLOCK, |
75 | sizeof(EVP_MD *)+sizeof(RIPEMD160_CTX), | 89 | sizeof(EVP_MD *)+sizeof(RIPEMD160_CTX), |
76 | }; | 90 | }; |
77 | 91 | ||
78 | EVP_MD *EVP_ripemd160() | 92 | const EVP_MD *EVP_ripemd160(void) |
79 | { | 93 | { |
80 | return(&ripemd160_md); | 94 | return(&ripemd160_md); |
81 | } | 95 | } |
96 | #endif | ||
diff --git a/src/lib/libcrypto/evp/m_sha1.c b/src/lib/libcrypto/evp/m_sha1.c index 87135a9cf2..d6be3502f0 100644 --- a/src/lib/libcrypto/evp/m_sha1.c +++ b/src/lib/libcrypto/evp/m_sha1.c | |||
@@ -56,26 +56,40 @@ | |||
56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
57 | */ | 57 | */ |
58 | 58 | ||
59 | #ifndef OPENSSL_NO_SHA | ||
59 | #include <stdio.h> | 60 | #include <stdio.h> |
60 | #include "cryptlib.h" | 61 | #include "cryptlib.h" |
61 | #include "evp.h" | 62 | #include <openssl/evp.h> |
62 | #include "objects.h" | 63 | #include <openssl/objects.h> |
63 | #include "x509.h" | 64 | #include <openssl/x509.h> |
64 | 65 | ||
65 | static EVP_MD sha1_md= | 66 | static int init(EVP_MD_CTX *ctx) |
67 | { return SHA1_Init(ctx->md_data); } | ||
68 | |||
69 | static int update(EVP_MD_CTX *ctx,const void *data,unsigned long count) | ||
70 | { return SHA1_Update(ctx->md_data,data,count); } | ||
71 | |||
72 | static int final(EVP_MD_CTX *ctx,unsigned char *md) | ||
73 | { return SHA1_Final(md,ctx->md_data); } | ||
74 | |||
75 | static const EVP_MD sha1_md= | ||
66 | { | 76 | { |
67 | NID_sha1, | 77 | NID_sha1, |
68 | NID_sha1WithRSAEncryption, | 78 | NID_sha1WithRSAEncryption, |
69 | SHA_DIGEST_LENGTH, | 79 | SHA_DIGEST_LENGTH, |
70 | SHA1_Init, | 80 | 0, |
71 | SHA1_Update, | 81 | init, |
72 | SHA1_Final, | 82 | update, |
83 | final, | ||
84 | NULL, | ||
85 | NULL, | ||
73 | EVP_PKEY_RSA_method, | 86 | EVP_PKEY_RSA_method, |
74 | SHA_CBLOCK, | 87 | SHA_CBLOCK, |
75 | sizeof(EVP_MD *)+sizeof(SHA_CTX), | 88 | sizeof(EVP_MD *)+sizeof(SHA_CTX), |
76 | }; | 89 | }; |
77 | 90 | ||
78 | EVP_MD *EVP_sha1() | 91 | const EVP_MD *EVP_sha1(void) |
79 | { | 92 | { |
80 | return(&sha1_md); | 93 | return(&sha1_md); |
81 | } | 94 | } |
95 | #endif | ||
diff --git a/src/lib/libcrypto/evp/names.c b/src/lib/libcrypto/evp/names.c index e0774da20d..eb9f4329cd 100644 --- a/src/lib/libcrypto/evp/names.c +++ b/src/lib/libcrypto/evp/names.c | |||
@@ -58,228 +58,66 @@ | |||
58 | 58 | ||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
61 | #include "evp.h" | 61 | #include <openssl/evp.h> |
62 | #include "objects.h" | 62 | #include <openssl/objects.h> |
63 | #include <openssl/x509.h> | ||
63 | 64 | ||
64 | typedef struct aliases_st { | 65 | int EVP_add_cipher(const EVP_CIPHER *c) |
65 | char *alias; | ||
66 | /* This must be the last field becaue I will allocate things | ||
67 | * so they go off the end of it */ | ||
68 | char name[4]; | ||
69 | } ALIASES; | ||
70 | |||
71 | static STACK /* ALIASES */ *aliases=NULL; | ||
72 | static STACK /* EVP_CIPHERS */ *ciphers=NULL; | ||
73 | static STACK /* EVP_MD */ *digests=NULL; | ||
74 | |||
75 | static int cipher_nid_cmp(a,b) | ||
76 | EVP_CIPHER **a,**b; | ||
77 | { return((*a)->nid - (*b)->nid); } | ||
78 | |||
79 | static int digest_type_cmp(a,b) | ||
80 | EVP_MD **a,**b; | ||
81 | { return((*a)->pkey_type - (*b)->pkey_type); } | ||
82 | |||
83 | int EVP_add_cipher(c) | ||
84 | EVP_CIPHER *c; | ||
85 | { | ||
86 | int i; | ||
87 | |||
88 | if (ciphers == NULL) | ||
89 | { | ||
90 | ciphers=sk_new(cipher_nid_cmp); | ||
91 | if (ciphers == NULL) return(0); | ||
92 | } | ||
93 | if ((i=sk_find(ciphers,(char *)c)) >= 0) | ||
94 | { | ||
95 | if (sk_value(ciphers,i) == (char *)c) | ||
96 | return(1); | ||
97 | sk_delete(ciphers,i); | ||
98 | } | ||
99 | return(sk_push(ciphers,(char *)c)); | ||
100 | } | ||
101 | |||
102 | int EVP_add_digest(md) | ||
103 | EVP_MD *md; | ||
104 | { | 66 | { |
105 | int i; | 67 | int r; |
106 | char *n; | ||
107 | 68 | ||
108 | if (digests == NULL) | 69 | r=OBJ_NAME_add(OBJ_nid2sn(c->nid),OBJ_NAME_TYPE_CIPHER_METH,(char *)c); |
109 | { | 70 | if (r == 0) return(0); |
110 | digests=sk_new(digest_type_cmp); | 71 | r=OBJ_NAME_add(OBJ_nid2ln(c->nid),OBJ_NAME_TYPE_CIPHER_METH,(char *)c); |
111 | if (digests == NULL) return(0); | 72 | return(r); |
112 | } | ||
113 | if ((i=sk_find(digests,(char *)md)) >= 0) | ||
114 | { | ||
115 | if (sk_value(digests,i) == (char *)md) | ||
116 | return(1); | ||
117 | sk_delete(digests,i); | ||
118 | } | ||
119 | if (md->type != md->pkey_type) | ||
120 | { | ||
121 | n=OBJ_nid2sn(md->pkey_type); | ||
122 | EVP_add_alias(n,OBJ_nid2sn(md->type)); | ||
123 | EVP_add_alias(n,OBJ_nid2ln(md->type)); | ||
124 | } | ||
125 | sk_push(digests,(char *)md); | ||
126 | return(1); | ||
127 | } | ||
128 | |||
129 | static int alias_cmp(a,b) | ||
130 | ALIASES **a,**b; | ||
131 | { | ||
132 | return(strcmp((*a)->alias,(*b)->alias)); | ||
133 | } | 73 | } |
134 | 74 | ||
135 | int EVP_add_alias(name,aname) | 75 | int EVP_add_digest(const EVP_MD *md) |
136 | char *name; | ||
137 | char *aname; | ||
138 | { | 76 | { |
139 | int l1,l2,i; | 77 | int r; |
140 | ALIASES *a; | 78 | const char *name; |
141 | char *p; | ||
142 | 79 | ||
143 | if ((name == NULL) || (aname == NULL)) return(0); | 80 | name=OBJ_nid2sn(md->type); |
144 | l1=strlen(name)+1; | 81 | r=OBJ_NAME_add(name,OBJ_NAME_TYPE_MD_METH,(char *)md); |
145 | l2=strlen(aname)+1; | 82 | if (r == 0) return(0); |
146 | i=sizeof(ALIASES)+l1+l2; | 83 | r=OBJ_NAME_add(OBJ_nid2ln(md->type),OBJ_NAME_TYPE_MD_METH,(char *)md); |
147 | if ((a=(ALIASES *)Malloc(i)) == NULL) | 84 | if (r == 0) return(0); |
148 | return(0); | ||
149 | strcpy(a->name,name); | ||
150 | p= &(a->name[l1]); | ||
151 | strcpy(p,aname); | ||
152 | a->alias=p; | ||
153 | 85 | ||
154 | if (aliases == NULL) | 86 | if (md->type != md->pkey_type) |
155 | { | ||
156 | aliases=sk_new(alias_cmp); | ||
157 | if (aliases == NULL) goto err; | ||
158 | } | ||
159 | |||
160 | if ((i=sk_find(aliases,(char *)a)) >= 0) | ||
161 | { | 87 | { |
162 | Free(sk_delete(aliases,i)); | 88 | r=OBJ_NAME_add(OBJ_nid2sn(md->pkey_type), |
89 | OBJ_NAME_TYPE_MD_METH|OBJ_NAME_ALIAS,name); | ||
90 | if (r == 0) return(0); | ||
91 | r=OBJ_NAME_add(OBJ_nid2ln(md->pkey_type), | ||
92 | OBJ_NAME_TYPE_MD_METH|OBJ_NAME_ALIAS,name); | ||
163 | } | 93 | } |
164 | if (!sk_push(aliases,(char *)a)) goto err; | 94 | return(r); |
165 | return(1); | ||
166 | err: | ||
167 | return(0); | ||
168 | } | 95 | } |
169 | 96 | ||
170 | int EVP_delete_alias(name) | 97 | const EVP_CIPHER *EVP_get_cipherbyname(const char *name) |
171 | char *name; | ||
172 | { | 98 | { |
173 | ALIASES a; | 99 | const EVP_CIPHER *cp; |
174 | int i; | ||
175 | 100 | ||
176 | if (aliases != NULL) | 101 | cp=(const EVP_CIPHER *)OBJ_NAME_get(name,OBJ_NAME_TYPE_CIPHER_METH); |
177 | { | 102 | return(cp); |
178 | a.alias=name; | ||
179 | if ((i=sk_find(aliases,(char *)&a)) >= 0) | ||
180 | { | ||
181 | Free(sk_delete(aliases,i)); | ||
182 | return(1); | ||
183 | } | ||
184 | } | ||
185 | return(0); | ||
186 | } | 103 | } |
187 | 104 | ||
188 | EVP_CIPHER *EVP_get_cipherbyname(name) | 105 | const EVP_MD *EVP_get_digestbyname(const char *name) |
189 | char *name; | ||
190 | { | 106 | { |
191 | int nid,num=6,i; | 107 | const EVP_MD *cp; |
192 | EVP_CIPHER c,*cp; | ||
193 | ALIASES a,*ap; | ||
194 | |||
195 | if (ciphers == NULL) return(NULL); | ||
196 | for (;;) | ||
197 | { | ||
198 | if (num-- <= 0) return(NULL); | ||
199 | if (aliases != NULL) | ||
200 | { | ||
201 | a.alias=name; | ||
202 | i=sk_find(aliases,(char *)&a); | ||
203 | if (i >= 0) | ||
204 | { | ||
205 | ap=(ALIASES *)sk_value(aliases,i); | ||
206 | name=ap->name; | ||
207 | continue; | ||
208 | } | ||
209 | } | ||
210 | 108 | ||
211 | nid=OBJ_txt2nid(name); | 109 | cp=(const EVP_MD *)OBJ_NAME_get(name,OBJ_NAME_TYPE_MD_METH); |
212 | if (nid == NID_undef) return(NULL); | 110 | return(cp); |
213 | c.nid=nid; | ||
214 | i=sk_find(ciphers,(char *)&c); | ||
215 | if (i >= 0) | ||
216 | { | ||
217 | cp=(EVP_CIPHER *)sk_value(ciphers,i); | ||
218 | return(cp); | ||
219 | } | ||
220 | else | ||
221 | return(NULL); | ||
222 | } | ||
223 | } | 111 | } |
224 | 112 | ||
225 | EVP_MD *EVP_get_digestbyname(name) | 113 | void EVP_cleanup(void) |
226 | char *name; | ||
227 | { | 114 | { |
228 | int nid,num=6,i; | 115 | OBJ_NAME_cleanup(OBJ_NAME_TYPE_CIPHER_METH); |
229 | EVP_MD c,*cp; | 116 | OBJ_NAME_cleanup(OBJ_NAME_TYPE_MD_METH); |
230 | ALIASES a,*ap; | 117 | /* The above calls will only clean out the contents of the name |
231 | 118 | hash table, but not the hash table itself. The following line | |
232 | if (digests == NULL) return(NULL); | 119 | does that part. -- Richard Levitte */ |
233 | 120 | OBJ_NAME_cleanup(-1); | |
234 | for (;;) | 121 | |
235 | { | 122 | EVP_PBE_cleanup(); |
236 | if (num-- <= 0) return(NULL); | ||
237 | |||
238 | if (aliases != NULL) | ||
239 | { | ||
240 | a.alias=name; | ||
241 | i=sk_find(aliases,(char *)&a); | ||
242 | if (i >= 0) | ||
243 | { | ||
244 | ap=(ALIASES *)sk_value(aliases,i); | ||
245 | name=ap->name; | ||
246 | continue; | ||
247 | } | ||
248 | } | ||
249 | |||
250 | nid=OBJ_txt2nid(name); | ||
251 | if (nid == NID_undef) return(NULL); | ||
252 | c.pkey_type=nid; | ||
253 | i=sk_find(digests,(char *)&c); | ||
254 | if (i >= 0) | ||
255 | { | ||
256 | cp=(EVP_MD *)sk_value(digests,i); | ||
257 | return(cp); | ||
258 | } | ||
259 | else | ||
260 | return(NULL); | ||
261 | } | ||
262 | } | ||
263 | |||
264 | void EVP_cleanup() | ||
265 | { | ||
266 | int i; | ||
267 | |||
268 | if (aliases != NULL) | ||
269 | { | ||
270 | for (i=0; i<sk_num(aliases); i++) | ||
271 | Free(sk_value(aliases,i)); | ||
272 | sk_free(aliases); | ||
273 | aliases=NULL; | ||
274 | } | ||
275 | if (ciphers != NULL) | ||
276 | { | ||
277 | sk_free(ciphers); | ||
278 | ciphers=NULL; | ||
279 | } | ||
280 | if (digests != NULL) | ||
281 | { | ||
282 | sk_free(digests); | ||
283 | digests=NULL; | ||
284 | } | ||
285 | } | 123 | } |
diff --git a/src/lib/libcrypto/evp/p5_crpt.c b/src/lib/libcrypto/evp/p5_crpt.c index e3dae52d4d..113c60fedb 100644 --- a/src/lib/libcrypto/evp/p5_crpt.c +++ b/src/lib/libcrypto/evp/p5_crpt.c | |||
@@ -67,41 +67,41 @@ | |||
67 | 67 | ||
68 | void PKCS5_PBE_add(void) | 68 | void PKCS5_PBE_add(void) |
69 | { | 69 | { |
70 | #ifndef NO_DES | 70 | #ifndef OPENSSL_NO_DES |
71 | # ifndef NO_MD5 | 71 | # ifndef OPENSSL_NO_MD5 |
72 | EVP_PBE_alg_add(NID_pbeWithMD5AndDES_CBC, EVP_des_cbc(), EVP_md5(), | 72 | EVP_PBE_alg_add(NID_pbeWithMD5AndDES_CBC, EVP_des_cbc(), EVP_md5(), |
73 | PKCS5_PBE_keyivgen); | 73 | PKCS5_PBE_keyivgen); |
74 | # endif | 74 | # endif |
75 | # ifndef NO_MD2 | 75 | # ifndef OPENSSL_NO_MD2 |
76 | EVP_PBE_alg_add(NID_pbeWithMD2AndDES_CBC, EVP_des_cbc(), EVP_md2(), | 76 | EVP_PBE_alg_add(NID_pbeWithMD2AndDES_CBC, EVP_des_cbc(), EVP_md2(), |
77 | PKCS5_PBE_keyivgen); | 77 | PKCS5_PBE_keyivgen); |
78 | # endif | 78 | # endif |
79 | # ifndef NO_SHA | 79 | # ifndef OPENSSL_NO_SHA |
80 | EVP_PBE_alg_add(NID_pbeWithSHA1AndDES_CBC, EVP_des_cbc(), EVP_sha1(), | 80 | EVP_PBE_alg_add(NID_pbeWithSHA1AndDES_CBC, EVP_des_cbc(), EVP_sha1(), |
81 | PKCS5_PBE_keyivgen); | 81 | PKCS5_PBE_keyivgen); |
82 | # endif | 82 | # endif |
83 | #endif | 83 | #endif |
84 | #ifndef NO_RC2 | 84 | #ifndef OPENSSL_NO_RC2 |
85 | # ifndef NO_MD5 | 85 | # ifndef OPENSSL_NO_MD5 |
86 | EVP_PBE_alg_add(NID_pbeWithMD5AndRC2_CBC, EVP_rc2_64_cbc(), EVP_md5(), | 86 | EVP_PBE_alg_add(NID_pbeWithMD5AndRC2_CBC, EVP_rc2_64_cbc(), EVP_md5(), |
87 | PKCS5_PBE_keyivgen); | 87 | PKCS5_PBE_keyivgen); |
88 | # endif | 88 | # endif |
89 | # ifndef NO_MD2 | 89 | # ifndef OPENSSL_NO_MD2 |
90 | EVP_PBE_alg_add(NID_pbeWithMD2AndRC2_CBC, EVP_rc2_64_cbc(), EVP_md2(), | 90 | EVP_PBE_alg_add(NID_pbeWithMD2AndRC2_CBC, EVP_rc2_64_cbc(), EVP_md2(), |
91 | PKCS5_PBE_keyivgen); | 91 | PKCS5_PBE_keyivgen); |
92 | # endif | 92 | # endif |
93 | # ifndef NO_SHA | 93 | # ifndef OPENSSL_NO_SHA |
94 | EVP_PBE_alg_add(NID_pbeWithSHA1AndRC2_CBC, EVP_rc2_64_cbc(), EVP_sha1(), | 94 | EVP_PBE_alg_add(NID_pbeWithSHA1AndRC2_CBC, EVP_rc2_64_cbc(), EVP_sha1(), |
95 | PKCS5_PBE_keyivgen); | 95 | PKCS5_PBE_keyivgen); |
96 | # endif | 96 | # endif |
97 | #endif | 97 | #endif |
98 | #ifndef NO_HMAC | 98 | #ifndef OPENSSL_NO_HMAC |
99 | EVP_PBE_alg_add(NID_pbes2, NULL, NULL, PKCS5_v2_PBE_keyivgen); | 99 | EVP_PBE_alg_add(NID_pbes2, NULL, NULL, PKCS5_v2_PBE_keyivgen); |
100 | #endif | 100 | #endif |
101 | } | 101 | } |
102 | 102 | ||
103 | int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, | 103 | int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, |
104 | ASN1_TYPE *param, EVP_CIPHER *cipher, EVP_MD *md, | 104 | ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, |
105 | int en_de) | 105 | int en_de) |
106 | { | 106 | { |
107 | EVP_MD_CTX ctx; | 107 | EVP_MD_CTX ctx; |
@@ -125,20 +125,25 @@ int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, | |||
125 | salt = pbe->salt->data; | 125 | salt = pbe->salt->data; |
126 | saltlen = pbe->salt->length; | 126 | saltlen = pbe->salt->length; |
127 | 127 | ||
128 | EVP_DigestInit (&ctx, md); | 128 | if(!pass) passlen = 0; |
129 | EVP_DigestUpdate (&ctx, pass, passlen); | 129 | else if(passlen == -1) passlen = strlen(pass); |
130 | EVP_DigestUpdate (&ctx, salt, saltlen); | 130 | |
131 | EVP_MD_CTX_init(&ctx); | ||
132 | EVP_DigestInit_ex(&ctx, md, NULL); | ||
133 | EVP_DigestUpdate(&ctx, pass, passlen); | ||
134 | EVP_DigestUpdate(&ctx, salt, saltlen); | ||
131 | PBEPARAM_free(pbe); | 135 | PBEPARAM_free(pbe); |
132 | EVP_DigestFinal (&ctx, md_tmp, NULL); | 136 | EVP_DigestFinal_ex(&ctx, md_tmp, NULL); |
133 | for (i = 1; i < iter; i++) { | 137 | for (i = 1; i < iter; i++) { |
134 | EVP_DigestInit(&ctx, md); | 138 | EVP_DigestInit_ex(&ctx, md, NULL); |
135 | EVP_DigestUpdate(&ctx, md_tmp, EVP_MD_size(md)); | 139 | EVP_DigestUpdate(&ctx, md_tmp, EVP_MD_size(md)); |
136 | EVP_DigestFinal (&ctx, md_tmp, NULL); | 140 | EVP_DigestFinal_ex (&ctx, md_tmp, NULL); |
137 | } | 141 | } |
138 | memcpy (key, md_tmp, EVP_CIPHER_key_length(cipher)); | 142 | EVP_MD_CTX_cleanup(&ctx); |
139 | memcpy (iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), | 143 | memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); |
144 | memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), | ||
140 | EVP_CIPHER_iv_length(cipher)); | 145 | EVP_CIPHER_iv_length(cipher)); |
141 | EVP_CipherInit(cctx, cipher, key, iv, en_de); | 146 | EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de); |
142 | memset(md_tmp, 0, EVP_MAX_MD_SIZE); | 147 | memset(md_tmp, 0, EVP_MAX_MD_SIZE); |
143 | memset(key, 0, EVP_MAX_KEY_LENGTH); | 148 | memset(key, 0, EVP_MAX_KEY_LENGTH); |
144 | memset(iv, 0, EVP_MAX_IV_LENGTH); | 149 | memset(iv, 0, EVP_MAX_IV_LENGTH); |
diff --git a/src/lib/libcrypto/evp/p5_crpt2.c b/src/lib/libcrypto/evp/p5_crpt2.c index 27a2c518be..7881860b53 100644 --- a/src/lib/libcrypto/evp/p5_crpt2.c +++ b/src/lib/libcrypto/evp/p5_crpt2.c | |||
@@ -55,7 +55,7 @@ | |||
55 | * Hudson (tjh@cryptsoft.com). | 55 | * Hudson (tjh@cryptsoft.com). |
56 | * | 56 | * |
57 | */ | 57 | */ |
58 | #if !defined(NO_HMAC) && !defined(NO_SHA) | 58 | #if !defined(OPENSSL_NO_HMAC) && !defined(OPENSSL_NO_SHA) |
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include <stdlib.h> | 60 | #include <stdlib.h> |
61 | #include <openssl/x509.h> | 61 | #include <openssl/x509.h> |
@@ -84,9 +84,12 @@ int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, | |||
84 | int cplen, j, k, tkeylen; | 84 | int cplen, j, k, tkeylen; |
85 | unsigned long i = 1; | 85 | unsigned long i = 1; |
86 | HMAC_CTX hctx; | 86 | HMAC_CTX hctx; |
87 | |||
88 | HMAC_CTX_init(&hctx); | ||
87 | p = out; | 89 | p = out; |
88 | tkeylen = keylen; | 90 | tkeylen = keylen; |
89 | if(passlen == -1) passlen = strlen(pass); | 91 | if(!pass) passlen = 0; |
92 | else if(passlen == -1) passlen = strlen(pass); | ||
90 | while(tkeylen) { | 93 | while(tkeylen) { |
91 | if(tkeylen > SHA_DIGEST_LENGTH) cplen = SHA_DIGEST_LENGTH; | 94 | if(tkeylen > SHA_DIGEST_LENGTH) cplen = SHA_DIGEST_LENGTH; |
92 | else cplen = tkeylen; | 95 | else cplen = tkeylen; |
@@ -97,7 +100,7 @@ int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, | |||
97 | itmp[1] = (unsigned char)((i >> 16) & 0xff); | 100 | itmp[1] = (unsigned char)((i >> 16) & 0xff); |
98 | itmp[2] = (unsigned char)((i >> 8) & 0xff); | 101 | itmp[2] = (unsigned char)((i >> 8) & 0xff); |
99 | itmp[3] = (unsigned char)(i & 0xff); | 102 | itmp[3] = (unsigned char)(i & 0xff); |
100 | HMAC_Init(&hctx, pass, passlen, EVP_sha1()); | 103 | HMAC_Init_ex(&hctx, pass, passlen, EVP_sha1(), NULL); |
101 | HMAC_Update(&hctx, salt, saltlen); | 104 | HMAC_Update(&hctx, salt, saltlen); |
102 | HMAC_Update(&hctx, itmp, 4); | 105 | HMAC_Update(&hctx, itmp, 4); |
103 | HMAC_Final(&hctx, digtmp, NULL); | 106 | HMAC_Final(&hctx, digtmp, NULL); |
@@ -111,7 +114,7 @@ int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, | |||
111 | i++; | 114 | i++; |
112 | p+= cplen; | 115 | p+= cplen; |
113 | } | 116 | } |
114 | HMAC_cleanup(&hctx); | 117 | HMAC_CTX_cleanup(&hctx); |
115 | #ifdef DEBUG_PKCS5V2 | 118 | #ifdef DEBUG_PKCS5V2 |
116 | fprintf(stderr, "Password:\n"); | 119 | fprintf(stderr, "Password:\n"); |
117 | h__dump (pass, passlen); | 120 | h__dump (pass, passlen); |
@@ -142,7 +145,7 @@ main() | |||
142 | */ | 145 | */ |
143 | 146 | ||
144 | int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | 147 | int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, |
145 | ASN1_TYPE *param, EVP_CIPHER *c, EVP_MD *md, | 148 | ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, |
146 | int en_de) | 149 | int en_de) |
147 | { | 150 | { |
148 | unsigned char *pbuf, *salt, key[EVP_MAX_KEY_LENGTH]; | 151 | unsigned char *pbuf, *salt, key[EVP_MAX_KEY_LENGTH]; |
@@ -180,7 +183,7 @@ int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | |||
180 | } | 183 | } |
181 | 184 | ||
182 | /* Fixup cipher based on AlgorithmIdentifier */ | 185 | /* Fixup cipher based on AlgorithmIdentifier */ |
183 | EVP_CipherInit(ctx, cipher, NULL, NULL, en_de); | 186 | EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de); |
184 | if(EVP_CIPHER_asn1_to_param(ctx, pbe2->encryption->parameter) < 0) { | 187 | if(EVP_CIPHER_asn1_to_param(ctx, pbe2->encryption->parameter) < 0) { |
185 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, | 188 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, |
186 | EVP_R_CIPHER_PARAMETER_ERROR); | 189 | EVP_R_CIPHER_PARAMETER_ERROR); |
@@ -226,7 +229,7 @@ int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | |||
226 | saltlen = kdf->salt->value.octet_string->length; | 229 | saltlen = kdf->salt->value.octet_string->length; |
227 | iter = ASN1_INTEGER_get(kdf->iter); | 230 | iter = ASN1_INTEGER_get(kdf->iter); |
228 | PKCS5_PBKDF2_HMAC_SHA1(pass, passlen, salt, saltlen, iter, keylen, key); | 231 | PKCS5_PBKDF2_HMAC_SHA1(pass, passlen, salt, saltlen, iter, keylen, key); |
229 | EVP_CipherInit(ctx, NULL, key, NULL, en_de); | 232 | EVP_CipherInit_ex(ctx, NULL, NULL, key, NULL, en_de); |
230 | memset(key, 0, keylen); | 233 | memset(key, 0, keylen); |
231 | PBKDF2PARAM_free(kdf); | 234 | PBKDF2PARAM_free(kdf); |
232 | return 1; | 235 | return 1; |
diff --git a/src/lib/libcrypto/evp/p_dec.c b/src/lib/libcrypto/evp/p_dec.c index e845ce70c7..8af620400e 100644 --- a/src/lib/libcrypto/evp/p_dec.c +++ b/src/lib/libcrypto/evp/p_dec.c | |||
@@ -58,27 +58,30 @@ | |||
58 | 58 | ||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
61 | #include "rand.h" | 61 | #include <openssl/rand.h> |
62 | #include "rsa.h" | 62 | #ifndef OPENSSL_NO_RSA |
63 | #include "evp.h" | 63 | #include <openssl/rsa.h> |
64 | #include "objects.h" | 64 | #endif |
65 | #include "x509.h" | 65 | #include <openssl/evp.h> |
66 | #include <openssl/objects.h> | ||
67 | #include <openssl/x509.h> | ||
66 | 68 | ||
67 | int EVP_PKEY_decrypt(key,ek,ekl,priv) | 69 | int EVP_PKEY_decrypt(unsigned char *key, unsigned char *ek, int ekl, |
68 | unsigned char *key; | 70 | EVP_PKEY *priv) |
69 | unsigned char *ek; | ||
70 | int ekl; | ||
71 | EVP_PKEY *priv; | ||
72 | { | 71 | { |
73 | int ret= -1; | 72 | int ret= -1; |
74 | 73 | ||
74 | #ifndef OPENSSL_NO_RSA | ||
75 | if (priv->type != EVP_PKEY_RSA) | 75 | if (priv->type != EVP_PKEY_RSA) |
76 | { | 76 | { |
77 | #endif | ||
77 | EVPerr(EVP_F_EVP_PKEY_DECRYPT,EVP_R_PUBLIC_KEY_NOT_RSA); | 78 | EVPerr(EVP_F_EVP_PKEY_DECRYPT,EVP_R_PUBLIC_KEY_NOT_RSA); |
79 | #ifndef OPENSSL_NO_RSA | ||
78 | goto err; | 80 | goto err; |
79 | } | 81 | } |
80 | 82 | ||
81 | ret=RSA_private_decrypt(ekl,ek,key,priv->pkey.rsa,RSA_PKCS1_PADDING); | 83 | ret=RSA_private_decrypt(ekl,ek,key,priv->pkey.rsa,RSA_PKCS1_PADDING); |
82 | err: | 84 | err: |
85 | #endif | ||
83 | return(ret); | 86 | return(ret); |
84 | } | 87 | } |
diff --git a/src/lib/libcrypto/evp/p_enc.c b/src/lib/libcrypto/evp/p_enc.c index a26bfad02a..656883b996 100644 --- a/src/lib/libcrypto/evp/p_enc.c +++ b/src/lib/libcrypto/evp/p_enc.c | |||
@@ -58,26 +58,29 @@ | |||
58 | 58 | ||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
61 | #include "rand.h" | 61 | #include <openssl/rand.h> |
62 | #include "rsa.h" | 62 | #ifndef OPENSSL_NO_RSA |
63 | #include "evp.h" | 63 | #include <openssl/rsa.h> |
64 | #include "objects.h" | 64 | #endif |
65 | #include "x509.h" | 65 | #include <openssl/evp.h> |
66 | #include <openssl/objects.h> | ||
67 | #include <openssl/x509.h> | ||
66 | 68 | ||
67 | int EVP_PKEY_encrypt(ek,key,key_len,pubk) | 69 | int EVP_PKEY_encrypt(unsigned char *ek, unsigned char *key, int key_len, |
68 | unsigned char *ek; | 70 | EVP_PKEY *pubk) |
69 | unsigned char *key; | ||
70 | int key_len; | ||
71 | EVP_PKEY *pubk; | ||
72 | { | 71 | { |
73 | int ret=0; | 72 | int ret=0; |
74 | 73 | ||
74 | #ifndef OPENSSL_NO_RSA | ||
75 | if (pubk->type != EVP_PKEY_RSA) | 75 | if (pubk->type != EVP_PKEY_RSA) |
76 | { | 76 | { |
77 | #endif | ||
77 | EVPerr(EVP_F_EVP_PKEY_ENCRYPT,EVP_R_PUBLIC_KEY_NOT_RSA); | 78 | EVPerr(EVP_F_EVP_PKEY_ENCRYPT,EVP_R_PUBLIC_KEY_NOT_RSA); |
79 | #ifndef OPENSSL_NO_RSA | ||
78 | goto err; | 80 | goto err; |
79 | } | 81 | } |
80 | ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING); | 82 | ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING); |
81 | err: | 83 | err: |
84 | #endif | ||
82 | return(ret); | 85 | return(ret); |
83 | } | 86 | } |
diff --git a/src/lib/libcrypto/evp/p_lib.c b/src/lib/libcrypto/evp/p_lib.c index 395351b373..215b94292a 100644 --- a/src/lib/libcrypto/evp/p_lib.c +++ b/src/lib/libcrypto/evp/p_lib.c | |||
@@ -58,58 +58,49 @@ | |||
58 | 58 | ||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
61 | #include "objects.h" | 61 | #include <openssl/objects.h> |
62 | #include "evp.h" | 62 | #include <openssl/evp.h> |
63 | #include "asn1_mac.h" | 63 | #include <openssl/asn1_mac.h> |
64 | #include "x509.h" | 64 | #include <openssl/x509.h> |
65 | 65 | ||
66 | /* EVPerr(EVP_F_D2I_PKEY,EVP_R_UNSUPPORTED_CIPHER); */ | ||
67 | /* EVPerr(EVP_F_D2I_PKEY,EVP_R_IV_TOO_LARGE); */ | ||
68 | |||
69 | #ifndef NOPROTO | ||
70 | static void EVP_PKEY_free_it(EVP_PKEY *x); | 66 | static void EVP_PKEY_free_it(EVP_PKEY *x); |
71 | #else | ||
72 | static void EVP_PKEY_free_it(); | ||
73 | #endif | ||
74 | 67 | ||
75 | int EVP_PKEY_bits(pkey) | 68 | int EVP_PKEY_bits(EVP_PKEY *pkey) |
76 | EVP_PKEY *pkey; | ||
77 | { | 69 | { |
78 | #ifndef NO_RSA | 70 | #ifndef OPENSSL_NO_RSA |
79 | if (pkey->type == EVP_PKEY_RSA) | 71 | if (pkey->type == EVP_PKEY_RSA) |
80 | return(BN_num_bits(pkey->pkey.rsa->n)); | 72 | return(BN_num_bits(pkey->pkey.rsa->n)); |
81 | else | 73 | else |
82 | #endif | 74 | #endif |
83 | #ifndef NO_DSA | 75 | #ifndef OPENSSL_NO_DSA |
84 | if (pkey->type == EVP_PKEY_DSA) | 76 | if (pkey->type == EVP_PKEY_DSA) |
85 | return(BN_num_bits(pkey->pkey.dsa->p)); | 77 | return(BN_num_bits(pkey->pkey.dsa->p)); |
86 | #endif | 78 | #endif |
87 | return(0); | 79 | return(0); |
88 | } | 80 | } |
89 | 81 | ||
90 | int EVP_PKEY_size(pkey) | 82 | int EVP_PKEY_size(EVP_PKEY *pkey) |
91 | EVP_PKEY *pkey; | ||
92 | { | 83 | { |
93 | #ifndef NO_RSA | 84 | if (pkey == NULL) |
85 | return(0); | ||
86 | #ifndef OPENSSL_NO_RSA | ||
94 | if (pkey->type == EVP_PKEY_RSA) | 87 | if (pkey->type == EVP_PKEY_RSA) |
95 | return(RSA_size(pkey->pkey.rsa)); | 88 | return(RSA_size(pkey->pkey.rsa)); |
96 | else | 89 | else |
97 | #endif | 90 | #endif |
98 | #ifndef NO_DSA | 91 | #ifndef OPENSSL_NO_DSA |
99 | if (pkey->type == EVP_PKEY_DSA) | 92 | if (pkey->type == EVP_PKEY_DSA) |
100 | return(DSA_size(pkey->pkey.dsa)); | 93 | return(DSA_size(pkey->pkey.dsa)); |
101 | #endif | 94 | #endif |
102 | return(0); | 95 | return(0); |
103 | } | 96 | } |
104 | 97 | ||
105 | int EVP_PKEY_save_parameters(pkey,mode) | 98 | int EVP_PKEY_save_parameters(EVP_PKEY *pkey, int mode) |
106 | EVP_PKEY *pkey; | ||
107 | int mode; | ||
108 | { | 99 | { |
109 | #ifndef NO_DSA | 100 | #ifndef OPENSSL_NO_DSA |
110 | if (pkey->type == EVP_PKEY_DSA) | 101 | if (pkey->type == EVP_PKEY_DSA) |
111 | { | 102 | { |
112 | int ret=pkey->save_parameters=mode; | 103 | int ret=pkey->save_parameters; |
113 | 104 | ||
114 | if (mode >= 0) | 105 | if (mode >= 0) |
115 | pkey->save_parameters=mode; | 106 | pkey->save_parameters=mode; |
@@ -119,8 +110,7 @@ int mode; | |||
119 | return(0); | 110 | return(0); |
120 | } | 111 | } |
121 | 112 | ||
122 | int EVP_PKEY_copy_parameters(to,from) | 113 | int EVP_PKEY_copy_parameters(EVP_PKEY *to, EVP_PKEY *from) |
123 | EVP_PKEY *to,*from; | ||
124 | { | 114 | { |
125 | if (to->type != from->type) | 115 | if (to->type != from->type) |
126 | { | 116 | { |
@@ -130,10 +120,10 @@ EVP_PKEY *to,*from; | |||
130 | 120 | ||
131 | if (EVP_PKEY_missing_parameters(from)) | 121 | if (EVP_PKEY_missing_parameters(from)) |
132 | { | 122 | { |
133 | EVPerr(EVP_F_EVP_PKEY_COPY_PARAMETERS,EVP_R_MISSING_PARMATERS); | 123 | EVPerr(EVP_F_EVP_PKEY_COPY_PARAMETERS,EVP_R_MISSING_PARAMETERS); |
134 | goto err; | 124 | goto err; |
135 | } | 125 | } |
136 | #ifndef NO_DSA | 126 | #ifndef OPENSSL_NO_DSA |
137 | if (to->type == EVP_PKEY_DSA) | 127 | if (to->type == EVP_PKEY_DSA) |
138 | { | 128 | { |
139 | BIGNUM *a; | 129 | BIGNUM *a; |
@@ -156,10 +146,9 @@ err: | |||
156 | return(0); | 146 | return(0); |
157 | } | 147 | } |
158 | 148 | ||
159 | int EVP_PKEY_missing_parameters(pkey) | 149 | int EVP_PKEY_missing_parameters(EVP_PKEY *pkey) |
160 | EVP_PKEY *pkey; | ||
161 | { | 150 | { |
162 | #ifndef NO_DSA | 151 | #ifndef OPENSSL_NO_DSA |
163 | if (pkey->type == EVP_PKEY_DSA) | 152 | if (pkey->type == EVP_PKEY_DSA) |
164 | { | 153 | { |
165 | DSA *dsa; | 154 | DSA *dsa; |
@@ -172,10 +161,9 @@ EVP_PKEY *pkey; | |||
172 | return(0); | 161 | return(0); |
173 | } | 162 | } |
174 | 163 | ||
175 | int EVP_PKEY_cmp_parameters(a,b) | 164 | int EVP_PKEY_cmp_parameters(EVP_PKEY *a, EVP_PKEY *b) |
176 | EVP_PKEY *a,*b; | ||
177 | { | 165 | { |
178 | #ifndef NO_DSA | 166 | #ifndef OPENSSL_NO_DSA |
179 | if ((a->type == EVP_PKEY_DSA) && (b->type == EVP_PKEY_DSA)) | 167 | if ((a->type == EVP_PKEY_DSA) && (b->type == EVP_PKEY_DSA)) |
180 | { | 168 | { |
181 | if ( BN_cmp(a->pkey.dsa->p,b->pkey.dsa->p) || | 169 | if ( BN_cmp(a->pkey.dsa->p,b->pkey.dsa->p) || |
@@ -189,11 +177,11 @@ EVP_PKEY *a,*b; | |||
189 | return(-1); | 177 | return(-1); |
190 | } | 178 | } |
191 | 179 | ||
192 | EVP_PKEY *EVP_PKEY_new() | 180 | EVP_PKEY *EVP_PKEY_new(void) |
193 | { | 181 | { |
194 | EVP_PKEY *ret; | 182 | EVP_PKEY *ret; |
195 | 183 | ||
196 | ret=(EVP_PKEY *)Malloc(sizeof(EVP_PKEY)); | 184 | ret=(EVP_PKEY *)OPENSSL_malloc(sizeof(EVP_PKEY)); |
197 | if (ret == NULL) | 185 | if (ret == NULL) |
198 | { | 186 | { |
199 | EVPerr(EVP_F_EVP_PKEY_NEW,ERR_R_MALLOC_FAILURE); | 187 | EVPerr(EVP_F_EVP_PKEY_NEW,ERR_R_MALLOC_FAILURE); |
@@ -207,10 +195,7 @@ EVP_PKEY *EVP_PKEY_new() | |||
207 | return(ret); | 195 | return(ret); |
208 | } | 196 | } |
209 | 197 | ||
210 | int EVP_PKEY_assign(pkey,type,key) | 198 | int EVP_PKEY_assign(EVP_PKEY *pkey, int type, char *key) |
211 | EVP_PKEY *pkey; | ||
212 | int type; | ||
213 | char *key; | ||
214 | { | 199 | { |
215 | if (pkey == NULL) return(0); | 200 | if (pkey == NULL) return(0); |
216 | if (pkey->pkey.ptr != NULL) | 201 | if (pkey->pkey.ptr != NULL) |
@@ -218,11 +203,71 @@ char *key; | |||
218 | pkey->type=EVP_PKEY_type(type); | 203 | pkey->type=EVP_PKEY_type(type); |
219 | pkey->save_type=type; | 204 | pkey->save_type=type; |
220 | pkey->pkey.ptr=key; | 205 | pkey->pkey.ptr=key; |
221 | return(1); | 206 | return(key != NULL); |
207 | } | ||
208 | |||
209 | #ifndef OPENSSL_NO_RSA | ||
210 | int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key) | ||
211 | { | ||
212 | int ret = EVP_PKEY_assign_RSA(pkey, key); | ||
213 | if(ret) | ||
214 | RSA_up_ref(key); | ||
215 | return ret; | ||
216 | } | ||
217 | |||
218 | RSA *EVP_PKEY_get1_RSA(EVP_PKEY *pkey) | ||
219 | { | ||
220 | if(pkey->type != EVP_PKEY_RSA) { | ||
221 | EVPerr(EVP_F_EVP_PKEY_GET1_RSA, EVP_R_EXPECTING_AN_RSA_KEY); | ||
222 | return NULL; | ||
222 | } | 223 | } |
224 | RSA_up_ref(pkey->pkey.rsa); | ||
225 | return pkey->pkey.rsa; | ||
226 | } | ||
227 | #endif | ||
228 | |||
229 | #ifndef OPENSSL_NO_DSA | ||
230 | int EVP_PKEY_set1_DSA(EVP_PKEY *pkey, DSA *key) | ||
231 | { | ||
232 | int ret = EVP_PKEY_assign_DSA(pkey, key); | ||
233 | if(ret) | ||
234 | DSA_up_ref(key); | ||
235 | return ret; | ||
236 | } | ||
237 | |||
238 | DSA *EVP_PKEY_get1_DSA(EVP_PKEY *pkey) | ||
239 | { | ||
240 | if(pkey->type != EVP_PKEY_DSA) { | ||
241 | EVPerr(EVP_F_EVP_PKEY_GET1_DSA, EVP_R_EXPECTING_A_DSA_KEY); | ||
242 | return NULL; | ||
243 | } | ||
244 | DSA_up_ref(pkey->pkey.dsa); | ||
245 | return pkey->pkey.dsa; | ||
246 | } | ||
247 | #endif | ||
248 | |||
249 | #ifndef OPENSSL_NO_DH | ||
250 | |||
251 | int EVP_PKEY_set1_DH(EVP_PKEY *pkey, DH *key) | ||
252 | { | ||
253 | int ret = EVP_PKEY_assign_DH(pkey, key); | ||
254 | if(ret) | ||
255 | DH_up_ref(key); | ||
256 | return ret; | ||
257 | } | ||
258 | |||
259 | DH *EVP_PKEY_get1_DH(EVP_PKEY *pkey) | ||
260 | { | ||
261 | if(pkey->type != EVP_PKEY_DH) { | ||
262 | EVPerr(EVP_F_EVP_PKEY_GET1_DH, EVP_R_EXPECTING_A_DH_KEY); | ||
263 | return NULL; | ||
264 | } | ||
265 | DH_up_ref(pkey->pkey.dh); | ||
266 | return pkey->pkey.dh; | ||
267 | } | ||
268 | #endif | ||
223 | 269 | ||
224 | int EVP_PKEY_type(type) | 270 | int EVP_PKEY_type(int type) |
225 | int type; | ||
226 | { | 271 | { |
227 | switch (type) | 272 | switch (type) |
228 | { | 273 | { |
@@ -242,8 +287,7 @@ int type; | |||
242 | } | 287 | } |
243 | } | 288 | } |
244 | 289 | ||
245 | void EVP_PKEY_free(x) | 290 | void EVP_PKEY_free(EVP_PKEY *x) |
246 | EVP_PKEY *x; | ||
247 | { | 291 | { |
248 | int i; | 292 | int i; |
249 | 293 | ||
@@ -262,21 +306,20 @@ EVP_PKEY *x; | |||
262 | } | 306 | } |
263 | #endif | 307 | #endif |
264 | EVP_PKEY_free_it(x); | 308 | EVP_PKEY_free_it(x); |
265 | Free((char *)x); | 309 | OPENSSL_free(x); |
266 | } | 310 | } |
267 | 311 | ||
268 | static void EVP_PKEY_free_it(x) | 312 | static void EVP_PKEY_free_it(EVP_PKEY *x) |
269 | EVP_PKEY *x; | ||
270 | { | 313 | { |
271 | switch (x->type) | 314 | switch (x->type) |
272 | { | 315 | { |
273 | #ifndef NO_RSA | 316 | #ifndef OPENSSL_NO_RSA |
274 | case EVP_PKEY_RSA: | 317 | case EVP_PKEY_RSA: |
275 | case EVP_PKEY_RSA2: | 318 | case EVP_PKEY_RSA2: |
276 | RSA_free(x->pkey.rsa); | 319 | RSA_free(x->pkey.rsa); |
277 | break; | 320 | break; |
278 | #endif | 321 | #endif |
279 | #ifndef NO_DSA | 322 | #ifndef OPENSSL_NO_DSA |
280 | case EVP_PKEY_DSA: | 323 | case EVP_PKEY_DSA: |
281 | case EVP_PKEY_DSA2: | 324 | case EVP_PKEY_DSA2: |
282 | case EVP_PKEY_DSA3: | 325 | case EVP_PKEY_DSA3: |
@@ -284,7 +327,7 @@ EVP_PKEY *x; | |||
284 | DSA_free(x->pkey.dsa); | 327 | DSA_free(x->pkey.dsa); |
285 | break; | 328 | break; |
286 | #endif | 329 | #endif |
287 | #ifndef NO_DH | 330 | #ifndef OPENSSL_NO_DH |
288 | case EVP_PKEY_DH: | 331 | case EVP_PKEY_DH: |
289 | DH_free(x->pkey.dh); | 332 | DH_free(x->pkey.dh); |
290 | break; | 333 | break; |
diff --git a/src/lib/libcrypto/evp/p_open.c b/src/lib/libcrypto/evp/p_open.c index 28a8e02252..6976f2a867 100644 --- a/src/lib/libcrypto/evp/p_open.c +++ b/src/lib/libcrypto/evp/p_open.c | |||
@@ -56,64 +56,68 @@ | |||
56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
57 | */ | 57 | */ |
58 | 58 | ||
59 | #ifndef OPENSSL_NO_RSA | ||
59 | #include <stdio.h> | 60 | #include <stdio.h> |
60 | #include "cryptlib.h" | 61 | #include "cryptlib.h" |
61 | #include "evp.h" | 62 | #include <openssl/evp.h> |
62 | #include "objects.h" | 63 | #include <openssl/objects.h> |
63 | #include "x509.h" | 64 | #include <openssl/x509.h> |
64 | 65 | ||
65 | int EVP_OpenInit(ctx,type,ek,ekl,iv,priv) | 66 | int EVP_OpenInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, unsigned char *ek, |
66 | EVP_CIPHER_CTX *ctx; | 67 | int ekl, unsigned char *iv, EVP_PKEY *priv) |
67 | EVP_CIPHER *type; | ||
68 | unsigned char *ek; | ||
69 | int ekl; | ||
70 | unsigned char *iv; | ||
71 | EVP_PKEY *priv; | ||
72 | { | 68 | { |
73 | unsigned char *key=NULL; | 69 | unsigned char *key=NULL; |
74 | int i,size=0,ret=0; | 70 | int i,size=0,ret=0; |
75 | 71 | ||
72 | if(type) { | ||
73 | EVP_CIPHER_CTX_init(ctx); | ||
74 | if(!EVP_DecryptInit_ex(ctx,type,NULL, NULL,NULL)) return 0; | ||
75 | } | ||
76 | |||
77 | if(!priv) return 1; | ||
78 | |||
76 | if (priv->type != EVP_PKEY_RSA) | 79 | if (priv->type != EVP_PKEY_RSA) |
77 | { | 80 | { |
78 | EVPerr(EVP_F_EVP_OPENINIT,EVP_R_PUBLIC_KEY_NOT_RSA); | 81 | EVPerr(EVP_F_EVP_OPENINIT,EVP_R_PUBLIC_KEY_NOT_RSA); |
79 | ret= -1; | ||
80 | goto err; | 82 | goto err; |
81 | } | 83 | } |
82 | 84 | ||
83 | size=RSA_size(priv->pkey.rsa); | 85 | size=RSA_size(priv->pkey.rsa); |
84 | key=(unsigned char *)Malloc(size+2); | 86 | key=(unsigned char *)OPENSSL_malloc(size+2); |
85 | if (key == NULL) | 87 | if (key == NULL) |
86 | { | 88 | { |
87 | /* ERROR */ | 89 | /* ERROR */ |
88 | EVPerr(EVP_F_EVP_OPENINIT,ERR_R_MALLOC_FAILURE); | 90 | EVPerr(EVP_F_EVP_OPENINIT,ERR_R_MALLOC_FAILURE); |
89 | ret= -1; | ||
90 | goto err; | 91 | goto err; |
91 | } | 92 | } |
92 | 93 | ||
93 | i=EVP_PKEY_decrypt(key,ek,ekl,priv); | 94 | i=EVP_PKEY_decrypt(key,ek,ekl,priv); |
94 | if (i != type->key_len) | 95 | if ((i <= 0) || !EVP_CIPHER_CTX_set_key_length(ctx, i)) |
95 | { | 96 | { |
96 | /* ERROR */ | 97 | /* ERROR */ |
97 | goto err; | 98 | goto err; |
98 | } | 99 | } |
100 | if(!EVP_DecryptInit_ex(ctx,NULL,NULL,key,iv)) goto err; | ||
99 | 101 | ||
100 | EVP_CIPHER_CTX_init(ctx); | ||
101 | EVP_DecryptInit(ctx,type,key,iv); | ||
102 | ret=1; | 102 | ret=1; |
103 | err: | 103 | err: |
104 | if (key != NULL) memset(key,0,size); | 104 | if (key != NULL) memset(key,0,size); |
105 | Free(key); | 105 | OPENSSL_free(key); |
106 | return(ret); | 106 | return(ret); |
107 | } | 107 | } |
108 | 108 | ||
109 | int EVP_OpenFinal(ctx,out,outl) | 109 | int EVP_OpenFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) |
110 | EVP_CIPHER_CTX *ctx; | ||
111 | unsigned char *out; | ||
112 | int *outl; | ||
113 | { | 110 | { |
114 | int i; | 111 | int i; |
115 | 112 | ||
116 | i=EVP_DecryptFinal(ctx,out,outl); | 113 | i=EVP_DecryptFinal_ex(ctx,out,outl); |
117 | EVP_DecryptInit(ctx,NULL,NULL,NULL); | 114 | EVP_DecryptInit_ex(ctx,NULL,NULL,NULL,NULL); |
118 | return(i); | 115 | return(i); |
119 | } | 116 | } |
117 | #else /* !OPENSSL_NO_RSA */ | ||
118 | |||
119 | # ifdef PEDANTIC | ||
120 | static void *dummy=&dummy; | ||
121 | # endif | ||
122 | |||
123 | #endif | ||
diff --git a/src/lib/libcrypto/evp/p_seal.c b/src/lib/libcrypto/evp/p_seal.c index 09a408de35..37e547fe72 100644 --- a/src/lib/libcrypto/evp/p_seal.c +++ b/src/lib/libcrypto/evp/p_seal.c | |||
@@ -58,35 +58,36 @@ | |||
58 | 58 | ||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
61 | #include "rand.h" | 61 | #include <openssl/rand.h> |
62 | #include "rsa.h" | 62 | #ifndef OPENSSL_NO_RSA |
63 | #include "evp.h" | 63 | #include <openssl/rsa.h> |
64 | #include "objects.h" | 64 | #endif |
65 | #include "x509.h" | 65 | #include <openssl/evp.h> |
66 | #include <openssl/objects.h> | ||
67 | #include <openssl/x509.h> | ||
66 | 68 | ||
67 | int EVP_SealInit(ctx,type,ek,ekl,iv,pubk,npubk) | 69 | int EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, unsigned char **ek, |
68 | EVP_CIPHER_CTX *ctx; | 70 | int *ekl, unsigned char *iv, EVP_PKEY **pubk, int npubk) |
69 | EVP_CIPHER *type; | ||
70 | unsigned char **ek; | ||
71 | int *ekl; | ||
72 | unsigned char *iv; | ||
73 | EVP_PKEY **pubk; | ||
74 | int npubk; | ||
75 | { | 71 | { |
76 | unsigned char key[EVP_MAX_KEY_LENGTH]; | 72 | unsigned char key[EVP_MAX_KEY_LENGTH]; |
77 | int i; | 73 | int i; |
78 | 74 | ||
79 | if (npubk <= 0) return(0); | 75 | if(type) { |
80 | RAND_bytes(key,EVP_MAX_KEY_LENGTH); | 76 | EVP_CIPHER_CTX_init(ctx); |
81 | if (type->iv_len > 0) | 77 | if(!EVP_EncryptInit_ex(ctx,type,NULL,NULL,NULL)) return 0; |
82 | RAND_bytes(iv,type->iv_len); | 78 | } |
79 | if ((npubk <= 0) || !pubk) | ||
80 | return 1; | ||
81 | if (RAND_bytes(key,EVP_MAX_KEY_LENGTH) <= 0) | ||
82 | return 0; | ||
83 | if (EVP_CIPHER_CTX_iv_length(ctx)) | ||
84 | RAND_pseudo_bytes(iv,EVP_CIPHER_CTX_iv_length(ctx)); | ||
83 | 85 | ||
84 | EVP_CIPHER_CTX_init(ctx); | 86 | if(!EVP_EncryptInit_ex(ctx,NULL,NULL,key,iv)) return 0; |
85 | EVP_EncryptInit(ctx,type,key,iv); | ||
86 | 87 | ||
87 | for (i=0; i<npubk; i++) | 88 | for (i=0; i<npubk; i++) |
88 | { | 89 | { |
89 | ekl[i]=EVP_PKEY_encrypt(ek[i],key,EVP_CIPHER_key_length(type), | 90 | ekl[i]=EVP_PKEY_encrypt(ek[i],key,EVP_CIPHER_CTX_key_length(ctx), |
90 | pubk[i]); | 91 | pubk[i]); |
91 | if (ekl[i] <= 0) return(-1); | 92 | if (ekl[i] <= 0) return(-1); |
92 | } | 93 | } |
@@ -105,11 +106,10 @@ int inl; | |||
105 | } | 106 | } |
106 | */ | 107 | */ |
107 | 108 | ||
108 | void EVP_SealFinal(ctx,out,outl) | 109 | int EVP_SealFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) |
109 | EVP_CIPHER_CTX *ctx; | ||
110 | unsigned char *out; | ||
111 | int *outl; | ||
112 | { | 110 | { |
113 | EVP_EncryptFinal(ctx,out,outl); | 111 | int i; |
114 | EVP_EncryptInit(ctx,NULL,NULL,NULL); | 112 | i = EVP_EncryptFinal_ex(ctx,out,outl); |
113 | EVP_EncryptInit_ex(ctx,NULL,NULL,NULL,NULL); | ||
114 | return i; | ||
115 | } | 115 | } |
diff --git a/src/lib/libcrypto/evp/p_sign.c b/src/lib/libcrypto/evp/p_sign.c index 073270ce31..e4ae5906f5 100644 --- a/src/lib/libcrypto/evp/p_sign.c +++ b/src/lib/libcrypto/evp/p_sign.c | |||
@@ -58,32 +58,25 @@ | |||
58 | 58 | ||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
61 | #include "evp.h" | 61 | #include <openssl/evp.h> |
62 | #include "objects.h" | 62 | #include <openssl/objects.h> |
63 | #include "x509.h" | 63 | #include <openssl/x509.h> |
64 | 64 | ||
65 | #ifdef undef | 65 | #ifdef undef |
66 | void EVP_SignInit(ctx,type) | 66 | void EVP_SignInit(EVP_MD_CTX *ctx, EVP_MD *type) |
67 | EVP_MD_CTX *ctx; | ||
68 | EVP_MD *type; | ||
69 | { | 67 | { |
70 | EVP_DigestInit(ctx,type); | 68 | EVP_DigestInit_ex(ctx,type); |
71 | } | 69 | } |
72 | 70 | ||
73 | void EVP_SignUpdate(ctx,data,count) | 71 | void EVP_SignUpdate(EVP_MD_CTX *ctx, unsigned char *data, |
74 | EVP_MD_CTX *ctx; | 72 | unsigned int count) |
75 | unsigned char *data; | ||
76 | unsigned int count; | ||
77 | { | 73 | { |
78 | EVP_DigestUpdate(ctx,data,count); | 74 | EVP_DigestUpdate(ctx,data,count); |
79 | } | 75 | } |
80 | #endif | 76 | #endif |
81 | 77 | ||
82 | int EVP_SignFinal(ctx,sigret,siglen,pkey) | 78 | int EVP_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, |
83 | EVP_MD_CTX *ctx; | 79 | EVP_PKEY *pkey) |
84 | unsigned char *sigret; | ||
85 | unsigned int *siglen; | ||
86 | EVP_PKEY *pkey; | ||
87 | { | 80 | { |
88 | unsigned char m[EVP_MAX_MD_SIZE]; | 81 | unsigned char m[EVP_MAX_MD_SIZE]; |
89 | unsigned int m_len; | 82 | unsigned int m_len; |
@@ -91,8 +84,10 @@ EVP_PKEY *pkey; | |||
91 | MS_STATIC EVP_MD_CTX tmp_ctx; | 84 | MS_STATIC EVP_MD_CTX tmp_ctx; |
92 | 85 | ||
93 | *siglen=0; | 86 | *siglen=0; |
94 | memcpy(&tmp_ctx,ctx,sizeof(EVP_MD_CTX)); | 87 | EVP_MD_CTX_init(&tmp_ctx); |
95 | EVP_DigestFinal(&tmp_ctx,&(m[0]),&m_len); | 88 | EVP_MD_CTX_copy_ex(&tmp_ctx,ctx); |
89 | EVP_DigestFinal_ex(&tmp_ctx,&(m[0]),&m_len); | ||
90 | EVP_MD_CTX_cleanup(&tmp_ctx); | ||
96 | for (i=0; i<4; i++) | 91 | for (i=0; i<4; i++) |
97 | { | 92 | { |
98 | v=ctx->digest->required_pkey_type[i]; | 93 | v=ctx->digest->required_pkey_type[i]; |
diff --git a/src/lib/libcrypto/evp/p_verify.c b/src/lib/libcrypto/evp/p_verify.c index 8d727d8f02..d854d743a5 100644 --- a/src/lib/libcrypto/evp/p_verify.c +++ b/src/lib/libcrypto/evp/p_verify.c | |||
@@ -58,15 +58,12 @@ | |||
58 | 58 | ||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
61 | #include "evp.h" | 61 | #include <openssl/evp.h> |
62 | #include "objects.h" | 62 | #include <openssl/objects.h> |
63 | #include "x509.h" | 63 | #include <openssl/x509.h> |
64 | 64 | ||
65 | int EVP_VerifyFinal(ctx,sigbuf,siglen,pkey) | 65 | int EVP_VerifyFinal(EVP_MD_CTX *ctx, unsigned char *sigbuf, |
66 | EVP_MD_CTX *ctx; | 66 | unsigned int siglen, EVP_PKEY *pkey) |
67 | unsigned char *sigbuf; | ||
68 | unsigned int siglen; | ||
69 | EVP_PKEY *pkey; | ||
70 | { | 67 | { |
71 | unsigned char m[EVP_MAX_MD_SIZE]; | 68 | unsigned char m[EVP_MAX_MD_SIZE]; |
72 | unsigned int m_len; | 69 | unsigned int m_len; |
@@ -88,8 +85,10 @@ EVP_PKEY *pkey; | |||
88 | EVPerr(EVP_F_EVP_VERIFYFINAL,EVP_R_WRONG_PUBLIC_KEY_TYPE); | 85 | EVPerr(EVP_F_EVP_VERIFYFINAL,EVP_R_WRONG_PUBLIC_KEY_TYPE); |
89 | return(-1); | 86 | return(-1); |
90 | } | 87 | } |
91 | memcpy(&tmp_ctx,ctx,sizeof(EVP_MD_CTX)); | 88 | EVP_MD_CTX_init(&tmp_ctx); |
92 | EVP_DigestFinal(&tmp_ctx,&(m[0]),&m_len); | 89 | EVP_MD_CTX_copy_ex(&tmp_ctx,ctx); |
90 | EVP_DigestFinal_ex(&tmp_ctx,&(m[0]),&m_len); | ||
91 | EVP_MD_CTX_cleanup(&tmp_ctx); | ||
93 | if (ctx->digest->verify == NULL) | 92 | if (ctx->digest->verify == NULL) |
94 | { | 93 | { |
95 | EVPerr(EVP_F_EVP_VERIFYFINAL,EVP_R_NO_VERIFY_FUNCTION_CONFIGURED); | 94 | EVPerr(EVP_F_EVP_VERIFYFINAL,EVP_R_NO_VERIFY_FUNCTION_CONFIGURED); |