diff options
| author | djm <> | 2012-10-13 21:23:50 +0000 |
|---|---|---|
| committer | djm <> | 2012-10-13 21:23:50 +0000 |
| commit | 228cae30b117c2493f69ad3c195341cd6ec8d430 (patch) | |
| tree | 29ff00b10d52c0978077c4fd83c33b065bade73e /src/lib/libcrypto/evp | |
| parent | 731838c66b52c0ae5888333005b74115a620aa96 (diff) | |
| download | openbsd-228cae30b117c2493f69ad3c195341cd6ec8d430.tar.gz openbsd-228cae30b117c2493f69ad3c195341cd6ec8d430.tar.bz2 openbsd-228cae30b117c2493f69ad3c195341cd6ec8d430.zip | |
import OpenSSL-1.0.1c
Diffstat (limited to 'src/lib/libcrypto/evp')
33 files changed, 2412 insertions, 131 deletions
diff --git a/src/lib/libcrypto/evp/bio_md.c b/src/lib/libcrypto/evp/bio_md.c index 9841e32e1a..144fdfd56a 100644 --- a/src/lib/libcrypto/evp/bio_md.c +++ b/src/lib/libcrypto/evp/bio_md.c | |||
| @@ -153,8 +153,12 @@ static int md_write(BIO *b, const char *in, int inl) | |||
| 153 | { | 153 | { |
| 154 | if (ret > 0) | 154 | if (ret > 0) |
| 155 | { | 155 | { |
| 156 | EVP_DigestUpdate(ctx,(const unsigned char *)in, | 156 | if (!EVP_DigestUpdate(ctx,(const unsigned char *)in, |
| 157 | (unsigned int)ret); | 157 | (unsigned int)ret)) |
| 158 | { | ||
| 159 | BIO_clear_retry_flags(b); | ||
| 160 | return 0; | ||
| 161 | } | ||
| 158 | } | 162 | } |
| 159 | } | 163 | } |
| 160 | if(b->next_bio != NULL) | 164 | if(b->next_bio != NULL) |
| @@ -220,7 +224,8 @@ static long md_ctrl(BIO *b, int cmd, long num, void *ptr) | |||
| 220 | case BIO_CTRL_DUP: | 224 | case BIO_CTRL_DUP: |
| 221 | dbio=ptr; | 225 | dbio=ptr; |
| 222 | dctx=dbio->ptr; | 226 | dctx=dbio->ptr; |
| 223 | EVP_MD_CTX_copy_ex(dctx,ctx); | 227 | if (!EVP_MD_CTX_copy_ex(dctx,ctx)) |
| 228 | return 0; | ||
| 224 | b->init=1; | 229 | b->init=1; |
| 225 | break; | 230 | break; |
| 226 | default: | 231 | default: |
diff --git a/src/lib/libcrypto/evp/digest.c b/src/lib/libcrypto/evp/digest.c index 982ba2b136..467e6b5ae9 100644 --- a/src/lib/libcrypto/evp/digest.c +++ b/src/lib/libcrypto/evp/digest.c | |||
| @@ -117,6 +117,10 @@ | |||
| 117 | #include <openssl/engine.h> | 117 | #include <openssl/engine.h> |
| 118 | #endif | 118 | #endif |
| 119 | 119 | ||
| 120 | #ifdef OPENSSL_FIPS | ||
| 121 | #include <openssl/fips.h> | ||
| 122 | #endif | ||
| 123 | |||
| 120 | void EVP_MD_CTX_init(EVP_MD_CTX *ctx) | 124 | void EVP_MD_CTX_init(EVP_MD_CTX *ctx) |
| 121 | { | 125 | { |
| 122 | memset(ctx,'\0',sizeof *ctx); | 126 | memset(ctx,'\0',sizeof *ctx); |
| @@ -225,12 +229,26 @@ skip_to_init: | |||
| 225 | } | 229 | } |
| 226 | if (ctx->flags & EVP_MD_CTX_FLAG_NO_INIT) | 230 | if (ctx->flags & EVP_MD_CTX_FLAG_NO_INIT) |
| 227 | return 1; | 231 | return 1; |
| 232 | #ifdef OPENSSL_FIPS | ||
| 233 | if (FIPS_mode()) | ||
| 234 | { | ||
| 235 | if (FIPS_digestinit(ctx, type)) | ||
| 236 | return 1; | ||
| 237 | OPENSSL_free(ctx->md_data); | ||
| 238 | ctx->md_data = NULL; | ||
| 239 | return 0; | ||
| 240 | } | ||
| 241 | #endif | ||
| 228 | return ctx->digest->init(ctx); | 242 | return ctx->digest->init(ctx); |
| 229 | } | 243 | } |
| 230 | 244 | ||
| 231 | int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *data, size_t count) | 245 | int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *data, size_t count) |
| 232 | { | 246 | { |
| 247 | #ifdef OPENSSL_FIPS | ||
| 248 | return FIPS_digestupdate(ctx, data, count); | ||
| 249 | #else | ||
| 233 | return ctx->update(ctx,data,count); | 250 | return ctx->update(ctx,data,count); |
| 251 | #endif | ||
| 234 | } | 252 | } |
| 235 | 253 | ||
| 236 | /* The caller can assume that this removes any secret data from the context */ | 254 | /* The caller can assume that this removes any secret data from the context */ |
| @@ -245,8 +263,10 @@ int EVP_DigestFinal(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) | |||
| 245 | /* The caller can assume that this removes any secret data from the context */ | 263 | /* The caller can assume that this removes any secret data from the context */ |
| 246 | int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) | 264 | int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) |
| 247 | { | 265 | { |
| 266 | #ifdef OPENSSL_FIPS | ||
| 267 | return FIPS_digestfinal(ctx, md, size); | ||
| 268 | #else | ||
| 248 | int ret; | 269 | int ret; |
| 249 | |||
| 250 | OPENSSL_assert(ctx->digest->md_size <= EVP_MAX_MD_SIZE); | 270 | OPENSSL_assert(ctx->digest->md_size <= EVP_MAX_MD_SIZE); |
| 251 | ret=ctx->digest->final(ctx,md); | 271 | ret=ctx->digest->final(ctx,md); |
| 252 | if (size != NULL) | 272 | if (size != NULL) |
| @@ -258,6 +278,7 @@ int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) | |||
| 258 | } | 278 | } |
| 259 | memset(ctx->md_data,0,ctx->digest->ctx_size); | 279 | memset(ctx->md_data,0,ctx->digest->ctx_size); |
| 260 | return ret; | 280 | return ret; |
| 281 | #endif | ||
| 261 | } | 282 | } |
| 262 | 283 | ||
| 263 | int EVP_MD_CTX_copy(EVP_MD_CTX *out, const EVP_MD_CTX *in) | 284 | int EVP_MD_CTX_copy(EVP_MD_CTX *out, const EVP_MD_CTX *in) |
| @@ -351,6 +372,7 @@ void EVP_MD_CTX_destroy(EVP_MD_CTX *ctx) | |||
| 351 | /* This call frees resources associated with the context */ | 372 | /* This call frees resources associated with the context */ |
| 352 | int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx) | 373 | int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx) |
| 353 | { | 374 | { |
| 375 | #ifndef OPENSSL_FIPS | ||
| 354 | /* Don't assume ctx->md_data was cleaned in EVP_Digest_Final, | 376 | /* Don't assume ctx->md_data was cleaned in EVP_Digest_Final, |
| 355 | * because sometimes only copies of the context are ever finalised. | 377 | * because sometimes only copies of the context are ever finalised. |
| 356 | */ | 378 | */ |
| @@ -363,6 +385,7 @@ int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx) | |||
| 363 | OPENSSL_cleanse(ctx->md_data,ctx->digest->ctx_size); | 385 | OPENSSL_cleanse(ctx->md_data,ctx->digest->ctx_size); |
| 364 | OPENSSL_free(ctx->md_data); | 386 | OPENSSL_free(ctx->md_data); |
| 365 | } | 387 | } |
| 388 | #endif | ||
| 366 | if (ctx->pctx) | 389 | if (ctx->pctx) |
| 367 | EVP_PKEY_CTX_free(ctx->pctx); | 390 | EVP_PKEY_CTX_free(ctx->pctx); |
| 368 | #ifndef OPENSSL_NO_ENGINE | 391 | #ifndef OPENSSL_NO_ENGINE |
| @@ -371,6 +394,9 @@ int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx) | |||
| 371 | * functional reference we held for this reason. */ | 394 | * functional reference we held for this reason. */ |
| 372 | ENGINE_finish(ctx->engine); | 395 | ENGINE_finish(ctx->engine); |
| 373 | #endif | 396 | #endif |
| 397 | #ifdef OPENSSL_FIPS | ||
| 398 | FIPS_md_ctx_cleanup(ctx); | ||
| 399 | #endif | ||
| 374 | memset(ctx,'\0',sizeof *ctx); | 400 | memset(ctx,'\0',sizeof *ctx); |
| 375 | 401 | ||
| 376 | return 1; | 402 | return 1; |
diff --git a/src/lib/libcrypto/evp/e_aes.c b/src/lib/libcrypto/evp/e_aes.c index bd6c0a3a62..1e4af0cb75 100644 --- a/src/lib/libcrypto/evp/e_aes.c +++ b/src/lib/libcrypto/evp/e_aes.c | |||
| @@ -1,5 +1,5 @@ | |||
| 1 | /* ==================================================================== | 1 | /* ==================================================================== |
| 2 | * Copyright (c) 2001 The OpenSSL Project. All rights reserved. | 2 | * Copyright (c) 2001-2011 The OpenSSL Project. All rights reserved. |
| 3 | * | 3 | * |
| 4 | * Redistribution and use in source and binary forms, with or without | 4 | * Redistribution and use in source and binary forms, with or without |
| 5 | * modification, are permitted provided that the following conditions | 5 | * modification, are permitted provided that the following conditions |
| @@ -56,57 +56,511 @@ | |||
| 56 | #include <assert.h> | 56 | #include <assert.h> |
| 57 | #include <openssl/aes.h> | 57 | #include <openssl/aes.h> |
| 58 | #include "evp_locl.h" | 58 | #include "evp_locl.h" |
| 59 | 59 | #ifndef OPENSSL_FIPS | |
| 60 | static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 60 | #include "modes_lcl.h" |
| 61 | const unsigned char *iv, int enc); | 61 | #include <openssl/rand.h> |
| 62 | 62 | ||
| 63 | typedef struct | 63 | typedef struct |
| 64 | { | 64 | { |
| 65 | AES_KEY ks; | 65 | AES_KEY ks; |
| 66 | block128_f block; | ||
| 67 | union { | ||
| 68 | cbc128_f cbc; | ||
| 69 | ctr128_f ctr; | ||
| 70 | } stream; | ||
| 66 | } EVP_AES_KEY; | 71 | } EVP_AES_KEY; |
| 67 | 72 | ||
| 68 | #define data(ctx) EVP_C_DATA(EVP_AES_KEY,ctx) | 73 | typedef struct |
| 69 | 74 | { | |
| 70 | IMPLEMENT_BLOCK_CIPHER(aes_128, ks, AES, EVP_AES_KEY, | 75 | AES_KEY ks; /* AES key schedule to use */ |
| 71 | NID_aes_128, 16, 16, 16, 128, | 76 | int key_set; /* Set if key initialised */ |
| 72 | 0, aes_init_key, NULL, | 77 | int iv_set; /* Set if an iv is set */ |
| 73 | EVP_CIPHER_set_asn1_iv, | 78 | GCM128_CONTEXT gcm; |
| 74 | EVP_CIPHER_get_asn1_iv, | 79 | unsigned char *iv; /* Temporary IV store */ |
| 75 | NULL) | 80 | int ivlen; /* IV length */ |
| 76 | IMPLEMENT_BLOCK_CIPHER(aes_192, ks, AES, EVP_AES_KEY, | 81 | int taglen; |
| 77 | NID_aes_192, 16, 24, 16, 128, | 82 | int iv_gen; /* It is OK to generate IVs */ |
| 78 | 0, aes_init_key, NULL, | 83 | int tls_aad_len; /* TLS AAD length */ |
| 79 | EVP_CIPHER_set_asn1_iv, | 84 | ctr128_f ctr; |
| 80 | EVP_CIPHER_get_asn1_iv, | 85 | } EVP_AES_GCM_CTX; |
| 81 | NULL) | 86 | |
| 82 | IMPLEMENT_BLOCK_CIPHER(aes_256, ks, AES, EVP_AES_KEY, | 87 | typedef struct |
| 83 | NID_aes_256, 16, 32, 16, 128, | 88 | { |
| 84 | 0, aes_init_key, NULL, | 89 | AES_KEY ks1, ks2; /* AES key schedules to use */ |
| 85 | EVP_CIPHER_set_asn1_iv, | 90 | XTS128_CONTEXT xts; |
| 86 | EVP_CIPHER_get_asn1_iv, | 91 | void (*stream)(const unsigned char *in, |
| 87 | NULL) | 92 | unsigned char *out, size_t length, |
| 88 | 93 | const AES_KEY *key1, const AES_KEY *key2, | |
| 89 | #define IMPLEMENT_AES_CFBR(ksize,cbits) IMPLEMENT_CFBR(aes,AES,EVP_AES_KEY,ks,ksize,cbits,16) | 94 | const unsigned char iv[16]); |
| 90 | 95 | } EVP_AES_XTS_CTX; | |
| 91 | IMPLEMENT_AES_CFBR(128,1) | 96 | |
| 92 | IMPLEMENT_AES_CFBR(192,1) | 97 | typedef struct |
| 93 | IMPLEMENT_AES_CFBR(256,1) | 98 | { |
| 94 | 99 | AES_KEY ks; /* AES key schedule to use */ | |
| 95 | IMPLEMENT_AES_CFBR(128,8) | 100 | int key_set; /* Set if key initialised */ |
| 96 | IMPLEMENT_AES_CFBR(192,8) | 101 | int iv_set; /* Set if an iv is set */ |
| 97 | IMPLEMENT_AES_CFBR(256,8) | 102 | int tag_set; /* Set if tag is valid */ |
| 103 | int len_set; /* Set if message length set */ | ||
| 104 | int L, M; /* L and M parameters from RFC3610 */ | ||
| 105 | CCM128_CONTEXT ccm; | ||
| 106 | ccm128_f str; | ||
| 107 | } EVP_AES_CCM_CTX; | ||
| 108 | |||
| 109 | #define MAXBITCHUNK ((size_t)1<<(sizeof(size_t)*8-4)) | ||
| 110 | |||
| 111 | #ifdef VPAES_ASM | ||
| 112 | int vpaes_set_encrypt_key(const unsigned char *userKey, int bits, | ||
| 113 | AES_KEY *key); | ||
| 114 | int vpaes_set_decrypt_key(const unsigned char *userKey, int bits, | ||
| 115 | AES_KEY *key); | ||
| 116 | |||
| 117 | void vpaes_encrypt(const unsigned char *in, unsigned char *out, | ||
| 118 | const AES_KEY *key); | ||
| 119 | void vpaes_decrypt(const unsigned char *in, unsigned char *out, | ||
| 120 | const AES_KEY *key); | ||
| 121 | |||
| 122 | void vpaes_cbc_encrypt(const unsigned char *in, | ||
| 123 | unsigned char *out, | ||
| 124 | size_t length, | ||
| 125 | const AES_KEY *key, | ||
| 126 | unsigned char *ivec, int enc); | ||
| 127 | #endif | ||
| 128 | #ifdef BSAES_ASM | ||
| 129 | void bsaes_cbc_encrypt(const unsigned char *in, unsigned char *out, | ||
| 130 | size_t length, const AES_KEY *key, | ||
| 131 | unsigned char ivec[16], int enc); | ||
| 132 | void bsaes_ctr32_encrypt_blocks(const unsigned char *in, unsigned char *out, | ||
| 133 | size_t len, const AES_KEY *key, | ||
| 134 | const unsigned char ivec[16]); | ||
| 135 | void bsaes_xts_encrypt(const unsigned char *inp, unsigned char *out, | ||
| 136 | size_t len, const AES_KEY *key1, | ||
| 137 | const AES_KEY *key2, const unsigned char iv[16]); | ||
| 138 | void bsaes_xts_decrypt(const unsigned char *inp, unsigned char *out, | ||
| 139 | size_t len, const AES_KEY *key1, | ||
| 140 | const AES_KEY *key2, const unsigned char iv[16]); | ||
| 141 | #endif | ||
| 142 | #ifdef AES_CTR_ASM | ||
| 143 | void AES_ctr32_encrypt(const unsigned char *in, unsigned char *out, | ||
| 144 | size_t blocks, const AES_KEY *key, | ||
| 145 | const unsigned char ivec[AES_BLOCK_SIZE]); | ||
| 146 | #endif | ||
| 147 | #ifdef AES_XTS_ASM | ||
| 148 | void AES_xts_encrypt(const char *inp,char *out,size_t len, | ||
| 149 | const AES_KEY *key1, const AES_KEY *key2, | ||
| 150 | const unsigned char iv[16]); | ||
| 151 | void AES_xts_decrypt(const char *inp,char *out,size_t len, | ||
| 152 | const AES_KEY *key1, const AES_KEY *key2, | ||
| 153 | const unsigned char iv[16]); | ||
| 154 | #endif | ||
| 155 | |||
| 156 | #if defined(AES_ASM) && !defined(I386_ONLY) && ( \ | ||
| 157 | ((defined(__i386) || defined(__i386__) || \ | ||
| 158 | defined(_M_IX86)) && defined(OPENSSL_IA32_SSE2))|| \ | ||
| 159 | defined(__x86_64) || defined(__x86_64__) || \ | ||
| 160 | defined(_M_AMD64) || defined(_M_X64) || \ | ||
| 161 | defined(__INTEL__) ) | ||
| 162 | |||
| 163 | extern unsigned int OPENSSL_ia32cap_P[2]; | ||
| 164 | |||
| 165 | #ifdef VPAES_ASM | ||
| 166 | #define VPAES_CAPABLE (OPENSSL_ia32cap_P[1]&(1<<(41-32))) | ||
| 167 | #endif | ||
| 168 | #ifdef BSAES_ASM | ||
| 169 | #define BSAES_CAPABLE VPAES_CAPABLE | ||
| 170 | #endif | ||
| 171 | /* | ||
| 172 | * AES-NI section | ||
| 173 | */ | ||
| 174 | #define AESNI_CAPABLE (OPENSSL_ia32cap_P[1]&(1<<(57-32))) | ||
| 175 | |||
| 176 | int aesni_set_encrypt_key(const unsigned char *userKey, int bits, | ||
| 177 | AES_KEY *key); | ||
| 178 | int aesni_set_decrypt_key(const unsigned char *userKey, int bits, | ||
| 179 | AES_KEY *key); | ||
| 180 | |||
| 181 | void aesni_encrypt(const unsigned char *in, unsigned char *out, | ||
| 182 | const AES_KEY *key); | ||
| 183 | void aesni_decrypt(const unsigned char *in, unsigned char *out, | ||
| 184 | const AES_KEY *key); | ||
| 185 | |||
| 186 | void aesni_ecb_encrypt(const unsigned char *in, | ||
| 187 | unsigned char *out, | ||
| 188 | size_t length, | ||
| 189 | const AES_KEY *key, | ||
| 190 | int enc); | ||
| 191 | void aesni_cbc_encrypt(const unsigned char *in, | ||
| 192 | unsigned char *out, | ||
| 193 | size_t length, | ||
| 194 | const AES_KEY *key, | ||
| 195 | unsigned char *ivec, int enc); | ||
| 196 | |||
| 197 | void aesni_ctr32_encrypt_blocks(const unsigned char *in, | ||
| 198 | unsigned char *out, | ||
| 199 | size_t blocks, | ||
| 200 | const void *key, | ||
| 201 | const unsigned char *ivec); | ||
| 202 | |||
| 203 | void aesni_xts_encrypt(const unsigned char *in, | ||
| 204 | unsigned char *out, | ||
| 205 | size_t length, | ||
| 206 | const AES_KEY *key1, const AES_KEY *key2, | ||
| 207 | const unsigned char iv[16]); | ||
| 208 | |||
| 209 | void aesni_xts_decrypt(const unsigned char *in, | ||
| 210 | unsigned char *out, | ||
| 211 | size_t length, | ||
| 212 | const AES_KEY *key1, const AES_KEY *key2, | ||
| 213 | const unsigned char iv[16]); | ||
| 214 | |||
| 215 | void aesni_ccm64_encrypt_blocks (const unsigned char *in, | ||
| 216 | unsigned char *out, | ||
| 217 | size_t blocks, | ||
| 218 | const void *key, | ||
| 219 | const unsigned char ivec[16], | ||
| 220 | unsigned char cmac[16]); | ||
| 221 | |||
| 222 | void aesni_ccm64_decrypt_blocks (const unsigned char *in, | ||
| 223 | unsigned char *out, | ||
| 224 | size_t blocks, | ||
| 225 | const void *key, | ||
| 226 | const unsigned char ivec[16], | ||
| 227 | unsigned char cmac[16]); | ||
| 228 | |||
| 229 | static int aesni_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
| 230 | const unsigned char *iv, int enc) | ||
| 231 | { | ||
| 232 | int ret, mode; | ||
| 233 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
| 234 | |||
| 235 | mode = ctx->cipher->flags & EVP_CIPH_MODE; | ||
| 236 | if ((mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE) | ||
| 237 | && !enc) | ||
| 238 | { | ||
| 239 | ret = aesni_set_decrypt_key(key, ctx->key_len*8, ctx->cipher_data); | ||
| 240 | dat->block = (block128_f)aesni_decrypt; | ||
| 241 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | ||
| 242 | (cbc128_f)aesni_cbc_encrypt : | ||
| 243 | NULL; | ||
| 244 | } | ||
| 245 | else { | ||
| 246 | ret = aesni_set_encrypt_key(key, ctx->key_len*8, ctx->cipher_data); | ||
| 247 | dat->block = (block128_f)aesni_encrypt; | ||
| 248 | if (mode==EVP_CIPH_CBC_MODE) | ||
| 249 | dat->stream.cbc = (cbc128_f)aesni_cbc_encrypt; | ||
| 250 | else if (mode==EVP_CIPH_CTR_MODE) | ||
| 251 | dat->stream.ctr = (ctr128_f)aesni_ctr32_encrypt_blocks; | ||
| 252 | else | ||
| 253 | dat->stream.cbc = NULL; | ||
| 254 | } | ||
| 255 | |||
| 256 | if(ret < 0) | ||
| 257 | { | ||
| 258 | EVPerr(EVP_F_AESNI_INIT_KEY,EVP_R_AES_KEY_SETUP_FAILED); | ||
| 259 | return 0; | ||
| 260 | } | ||
| 261 | |||
| 262 | return 1; | ||
| 263 | } | ||
| 264 | |||
| 265 | static int aesni_cbc_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
| 266 | const unsigned char *in, size_t len) | ||
| 267 | { | ||
| 268 | aesni_cbc_encrypt(in,out,len,ctx->cipher_data,ctx->iv,ctx->encrypt); | ||
| 269 | |||
| 270 | return 1; | ||
| 271 | } | ||
| 272 | |||
| 273 | static int aesni_ecb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
| 274 | const unsigned char *in, size_t len) | ||
| 275 | { | ||
| 276 | size_t bl = ctx->cipher->block_size; | ||
| 277 | |||
| 278 | if (len<bl) return 1; | ||
| 279 | |||
| 280 | aesni_ecb_encrypt(in,out,len,ctx->cipher_data,ctx->encrypt); | ||
| 281 | |||
| 282 | return 1; | ||
| 283 | } | ||
| 284 | |||
| 285 | #define aesni_ofb_cipher aes_ofb_cipher | ||
| 286 | static int aesni_ofb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
| 287 | const unsigned char *in,size_t len); | ||
| 288 | |||
| 289 | #define aesni_cfb_cipher aes_cfb_cipher | ||
| 290 | static int aesni_cfb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
| 291 | const unsigned char *in,size_t len); | ||
| 292 | |||
| 293 | #define aesni_cfb8_cipher aes_cfb8_cipher | ||
| 294 | static int aesni_cfb8_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
| 295 | const unsigned char *in,size_t len); | ||
| 296 | |||
| 297 | #define aesni_cfb1_cipher aes_cfb1_cipher | ||
| 298 | static int aesni_cfb1_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
| 299 | const unsigned char *in,size_t len); | ||
| 300 | |||
| 301 | #define aesni_ctr_cipher aes_ctr_cipher | ||
| 302 | static int aesni_ctr_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
| 303 | const unsigned char *in, size_t len); | ||
| 304 | |||
| 305 | static int aesni_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
| 306 | const unsigned char *iv, int enc) | ||
| 307 | { | ||
| 308 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | ||
| 309 | if (!iv && !key) | ||
| 310 | return 1; | ||
| 311 | if (key) | ||
| 312 | { | ||
| 313 | aesni_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks); | ||
| 314 | CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, | ||
| 315 | (block128_f)aesni_encrypt); | ||
| 316 | gctx->ctr = (ctr128_f)aesni_ctr32_encrypt_blocks; | ||
| 317 | /* If we have an iv can set it directly, otherwise use | ||
| 318 | * saved IV. | ||
| 319 | */ | ||
| 320 | if (iv == NULL && gctx->iv_set) | ||
| 321 | iv = gctx->iv; | ||
| 322 | if (iv) | ||
| 323 | { | ||
| 324 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | ||
| 325 | gctx->iv_set = 1; | ||
| 326 | } | ||
| 327 | gctx->key_set = 1; | ||
| 328 | } | ||
| 329 | else | ||
| 330 | { | ||
| 331 | /* If key set use IV, otherwise copy */ | ||
| 332 | if (gctx->key_set) | ||
| 333 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | ||
| 334 | else | ||
| 335 | memcpy(gctx->iv, iv, gctx->ivlen); | ||
| 336 | gctx->iv_set = 1; | ||
| 337 | gctx->iv_gen = 0; | ||
| 338 | } | ||
| 339 | return 1; | ||
| 340 | } | ||
| 341 | |||
| 342 | #define aesni_gcm_cipher aes_gcm_cipher | ||
| 343 | static int aesni_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
| 344 | const unsigned char *in, size_t len); | ||
| 345 | |||
| 346 | static int aesni_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
| 347 | const unsigned char *iv, int enc) | ||
| 348 | { | ||
| 349 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; | ||
| 350 | if (!iv && !key) | ||
| 351 | return 1; | ||
| 352 | |||
| 353 | if (key) | ||
| 354 | { | ||
| 355 | /* key_len is two AES keys */ | ||
| 356 | if (enc) | ||
| 357 | { | ||
| 358 | aesni_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
| 359 | xctx->xts.block1 = (block128_f)aesni_encrypt; | ||
| 360 | xctx->stream = aesni_xts_encrypt; | ||
| 361 | } | ||
| 362 | else | ||
| 363 | { | ||
| 364 | aesni_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
| 365 | xctx->xts.block1 = (block128_f)aesni_decrypt; | ||
| 366 | xctx->stream = aesni_xts_decrypt; | ||
| 367 | } | ||
| 368 | |||
| 369 | aesni_set_encrypt_key(key + ctx->key_len/2, | ||
| 370 | ctx->key_len * 4, &xctx->ks2); | ||
| 371 | xctx->xts.block2 = (block128_f)aesni_encrypt; | ||
| 372 | |||
| 373 | xctx->xts.key1 = &xctx->ks1; | ||
| 374 | } | ||
| 375 | |||
| 376 | if (iv) | ||
| 377 | { | ||
| 378 | xctx->xts.key2 = &xctx->ks2; | ||
| 379 | memcpy(ctx->iv, iv, 16); | ||
| 380 | } | ||
| 381 | |||
| 382 | return 1; | ||
| 383 | } | ||
| 384 | |||
| 385 | #define aesni_xts_cipher aes_xts_cipher | ||
| 386 | static int aesni_xts_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
| 387 | const unsigned char *in, size_t len); | ||
| 388 | |||
| 389 | static int aesni_ccm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
| 390 | const unsigned char *iv, int enc) | ||
| 391 | { | ||
| 392 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; | ||
| 393 | if (!iv && !key) | ||
| 394 | return 1; | ||
| 395 | if (key) | ||
| 396 | { | ||
| 397 | aesni_set_encrypt_key(key, ctx->key_len * 8, &cctx->ks); | ||
| 398 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, | ||
| 399 | &cctx->ks, (block128_f)aesni_encrypt); | ||
| 400 | cctx->str = enc?(ccm128_f)aesni_ccm64_encrypt_blocks : | ||
| 401 | (ccm128_f)aesni_ccm64_decrypt_blocks; | ||
| 402 | cctx->key_set = 1; | ||
| 403 | } | ||
| 404 | if (iv) | ||
| 405 | { | ||
| 406 | memcpy(ctx->iv, iv, 15 - cctx->L); | ||
| 407 | cctx->iv_set = 1; | ||
| 408 | } | ||
| 409 | return 1; | ||
| 410 | } | ||
| 411 | |||
| 412 | #define aesni_ccm_cipher aes_ccm_cipher | ||
| 413 | static int aesni_ccm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
| 414 | const unsigned char *in, size_t len); | ||
| 415 | |||
| 416 | #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ | ||
| 417 | static const EVP_CIPHER aesni_##keylen##_##mode = { \ | ||
| 418 | nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ | ||
| 419 | flags|EVP_CIPH_##MODE##_MODE, \ | ||
| 420 | aesni_init_key, \ | ||
| 421 | aesni_##mode##_cipher, \ | ||
| 422 | NULL, \ | ||
| 423 | sizeof(EVP_AES_KEY), \ | ||
| 424 | NULL,NULL,NULL,NULL }; \ | ||
| 425 | static const EVP_CIPHER aes_##keylen##_##mode = { \ | ||
| 426 | nid##_##keylen##_##nmode,blocksize, \ | ||
| 427 | keylen/8,ivlen, \ | ||
| 428 | flags|EVP_CIPH_##MODE##_MODE, \ | ||
| 429 | aes_init_key, \ | ||
| 430 | aes_##mode##_cipher, \ | ||
| 431 | NULL, \ | ||
| 432 | sizeof(EVP_AES_KEY), \ | ||
| 433 | NULL,NULL,NULL,NULL }; \ | ||
| 434 | const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \ | ||
| 435 | { return AESNI_CAPABLE?&aesni_##keylen##_##mode:&aes_##keylen##_##mode; } | ||
| 436 | |||
| 437 | #define BLOCK_CIPHER_custom(nid,keylen,blocksize,ivlen,mode,MODE,flags) \ | ||
| 438 | static const EVP_CIPHER aesni_##keylen##_##mode = { \ | ||
| 439 | nid##_##keylen##_##mode,blocksize, \ | ||
| 440 | (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ | ||
| 441 | flags|EVP_CIPH_##MODE##_MODE, \ | ||
| 442 | aesni_##mode##_init_key, \ | ||
| 443 | aesni_##mode##_cipher, \ | ||
| 444 | aes_##mode##_cleanup, \ | ||
| 445 | sizeof(EVP_AES_##MODE##_CTX), \ | ||
| 446 | NULL,NULL,aes_##mode##_ctrl,NULL }; \ | ||
| 447 | static const EVP_CIPHER aes_##keylen##_##mode = { \ | ||
| 448 | nid##_##keylen##_##mode,blocksize, \ | ||
| 449 | (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ | ||
| 450 | flags|EVP_CIPH_##MODE##_MODE, \ | ||
| 451 | aes_##mode##_init_key, \ | ||
| 452 | aes_##mode##_cipher, \ | ||
| 453 | aes_##mode##_cleanup, \ | ||
| 454 | sizeof(EVP_AES_##MODE##_CTX), \ | ||
| 455 | NULL,NULL,aes_##mode##_ctrl,NULL }; \ | ||
| 456 | const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \ | ||
| 457 | { return AESNI_CAPABLE?&aesni_##keylen##_##mode:&aes_##keylen##_##mode; } | ||
| 458 | |||
| 459 | #else | ||
| 460 | |||
| 461 | #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ | ||
| 462 | static const EVP_CIPHER aes_##keylen##_##mode = { \ | ||
| 463 | nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ | ||
| 464 | flags|EVP_CIPH_##MODE##_MODE, \ | ||
| 465 | aes_init_key, \ | ||
| 466 | aes_##mode##_cipher, \ | ||
| 467 | NULL, \ | ||
| 468 | sizeof(EVP_AES_KEY), \ | ||
| 469 | NULL,NULL,NULL,NULL }; \ | ||
| 470 | const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \ | ||
| 471 | { return &aes_##keylen##_##mode; } | ||
| 472 | |||
| 473 | #define BLOCK_CIPHER_custom(nid,keylen,blocksize,ivlen,mode,MODE,flags) \ | ||
| 474 | static const EVP_CIPHER aes_##keylen##_##mode = { \ | ||
| 475 | nid##_##keylen##_##mode,blocksize, \ | ||
| 476 | (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ | ||
| 477 | flags|EVP_CIPH_##MODE##_MODE, \ | ||
| 478 | aes_##mode##_init_key, \ | ||
| 479 | aes_##mode##_cipher, \ | ||
| 480 | aes_##mode##_cleanup, \ | ||
| 481 | sizeof(EVP_AES_##MODE##_CTX), \ | ||
| 482 | NULL,NULL,aes_##mode##_ctrl,NULL }; \ | ||
| 483 | const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \ | ||
| 484 | { return &aes_##keylen##_##mode; } | ||
| 485 | #endif | ||
| 486 | |||
| 487 | #define BLOCK_CIPHER_generic_pack(nid,keylen,flags) \ | ||
| 488 | BLOCK_CIPHER_generic(nid,keylen,16,16,cbc,cbc,CBC,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ | ||
| 489 | BLOCK_CIPHER_generic(nid,keylen,16,0,ecb,ecb,ECB,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ | ||
| 490 | BLOCK_CIPHER_generic(nid,keylen,1,16,ofb128,ofb,OFB,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ | ||
| 491 | BLOCK_CIPHER_generic(nid,keylen,1,16,cfb128,cfb,CFB,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ | ||
| 492 | BLOCK_CIPHER_generic(nid,keylen,1,16,cfb1,cfb1,CFB,flags) \ | ||
| 493 | BLOCK_CIPHER_generic(nid,keylen,1,16,cfb8,cfb8,CFB,flags) \ | ||
| 494 | BLOCK_CIPHER_generic(nid,keylen,1,16,ctr,ctr,CTR,flags) | ||
| 98 | 495 | ||
| 99 | static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 496 | static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 100 | const unsigned char *iv, int enc) | 497 | const unsigned char *iv, int enc) |
| 101 | { | 498 | { |
| 102 | int ret; | 499 | int ret, mode; |
| 500 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
| 103 | 501 | ||
| 104 | if ((ctx->cipher->flags & EVP_CIPH_MODE) == EVP_CIPH_CFB_MODE | 502 | mode = ctx->cipher->flags & EVP_CIPH_MODE; |
| 105 | || (ctx->cipher->flags & EVP_CIPH_MODE) == EVP_CIPH_OFB_MODE | 503 | if ((mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE) |
| 106 | || enc) | 504 | && !enc) |
| 107 | ret=AES_set_encrypt_key(key, ctx->key_len * 8, ctx->cipher_data); | 505 | #ifdef BSAES_CAPABLE |
| 506 | if (BSAES_CAPABLE && mode==EVP_CIPH_CBC_MODE) | ||
| 507 | { | ||
| 508 | ret = AES_set_decrypt_key(key,ctx->key_len*8,&dat->ks); | ||
| 509 | dat->block = (block128_f)AES_decrypt; | ||
| 510 | dat->stream.cbc = (cbc128_f)bsaes_cbc_encrypt; | ||
| 511 | } | ||
| 512 | else | ||
| 513 | #endif | ||
| 514 | #ifdef VPAES_CAPABLE | ||
| 515 | if (VPAES_CAPABLE) | ||
| 516 | { | ||
| 517 | ret = vpaes_set_decrypt_key(key,ctx->key_len*8,&dat->ks); | ||
| 518 | dat->block = (block128_f)vpaes_decrypt; | ||
| 519 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | ||
| 520 | (cbc128_f)vpaes_cbc_encrypt : | ||
| 521 | NULL; | ||
| 522 | } | ||
| 523 | else | ||
| 524 | #endif | ||
| 525 | { | ||
| 526 | ret = AES_set_decrypt_key(key,ctx->key_len*8,&dat->ks); | ||
| 527 | dat->block = (block128_f)AES_decrypt; | ||
| 528 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | ||
| 529 | (cbc128_f)AES_cbc_encrypt : | ||
| 530 | NULL; | ||
| 531 | } | ||
| 108 | else | 532 | else |
| 109 | ret=AES_set_decrypt_key(key, ctx->key_len * 8, ctx->cipher_data); | 533 | #ifdef BSAES_CAPABLE |
| 534 | if (BSAES_CAPABLE && mode==EVP_CIPH_CTR_MODE) | ||
| 535 | { | ||
| 536 | ret = AES_set_encrypt_key(key,ctx->key_len*8,&dat->ks); | ||
| 537 | dat->block = (block128_f)AES_encrypt; | ||
| 538 | dat->stream.ctr = (ctr128_f)bsaes_ctr32_encrypt_blocks; | ||
| 539 | } | ||
| 540 | else | ||
| 541 | #endif | ||
| 542 | #ifdef VPAES_CAPABLE | ||
| 543 | if (VPAES_CAPABLE) | ||
| 544 | { | ||
| 545 | ret = vpaes_set_encrypt_key(key,ctx->key_len*8,&dat->ks); | ||
| 546 | dat->block = (block128_f)vpaes_encrypt; | ||
| 547 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | ||
| 548 | (cbc128_f)vpaes_cbc_encrypt : | ||
| 549 | NULL; | ||
| 550 | } | ||
| 551 | else | ||
| 552 | #endif | ||
| 553 | { | ||
| 554 | ret = AES_set_encrypt_key(key,ctx->key_len*8,&dat->ks); | ||
| 555 | dat->block = (block128_f)AES_encrypt; | ||
| 556 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | ||
| 557 | (cbc128_f)AES_cbc_encrypt : | ||
| 558 | NULL; | ||
| 559 | #ifdef AES_CTR_ASM | ||
| 560 | if (mode==EVP_CIPH_CTR_MODE) | ||
| 561 | dat->stream.ctr = (ctr128_f)AES_ctr32_encrypt; | ||
| 562 | #endif | ||
| 563 | } | ||
| 110 | 564 | ||
| 111 | if(ret < 0) | 565 | if(ret < 0) |
| 112 | { | 566 | { |
| @@ -117,4 +571,743 @@ static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | |||
| 117 | return 1; | 571 | return 1; |
| 118 | } | 572 | } |
| 119 | 573 | ||
| 574 | static int aes_cbc_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
| 575 | const unsigned char *in, size_t len) | ||
| 576 | { | ||
| 577 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
| 578 | |||
| 579 | if (dat->stream.cbc) | ||
| 580 | (*dat->stream.cbc)(in,out,len,&dat->ks,ctx->iv,ctx->encrypt); | ||
| 581 | else if (ctx->encrypt) | ||
| 582 | CRYPTO_cbc128_encrypt(in,out,len,&dat->ks,ctx->iv,dat->block); | ||
| 583 | else | ||
| 584 | CRYPTO_cbc128_encrypt(in,out,len,&dat->ks,ctx->iv,dat->block); | ||
| 585 | |||
| 586 | return 1; | ||
| 587 | } | ||
| 588 | |||
| 589 | static int aes_ecb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
| 590 | const unsigned char *in, size_t len) | ||
| 591 | { | ||
| 592 | size_t bl = ctx->cipher->block_size; | ||
| 593 | size_t i; | ||
| 594 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
| 595 | |||
| 596 | if (len<bl) return 1; | ||
| 597 | |||
| 598 | for (i=0,len-=bl;i<=len;i+=bl) | ||
| 599 | (*dat->block)(in+i,out+i,&dat->ks); | ||
| 600 | |||
| 601 | return 1; | ||
| 602 | } | ||
| 603 | |||
| 604 | static int aes_ofb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
| 605 | const unsigned char *in,size_t len) | ||
| 606 | { | ||
| 607 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
| 608 | |||
| 609 | CRYPTO_ofb128_encrypt(in,out,len,&dat->ks, | ||
| 610 | ctx->iv,&ctx->num,dat->block); | ||
| 611 | return 1; | ||
| 612 | } | ||
| 613 | |||
| 614 | static int aes_cfb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
| 615 | const unsigned char *in,size_t len) | ||
| 616 | { | ||
| 617 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
| 618 | |||
| 619 | CRYPTO_cfb128_encrypt(in,out,len,&dat->ks, | ||
| 620 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | ||
| 621 | return 1; | ||
| 622 | } | ||
| 623 | |||
| 624 | static int aes_cfb8_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
| 625 | const unsigned char *in,size_t len) | ||
| 626 | { | ||
| 627 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
| 628 | |||
| 629 | CRYPTO_cfb128_8_encrypt(in,out,len,&dat->ks, | ||
| 630 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | ||
| 631 | return 1; | ||
| 632 | } | ||
| 633 | |||
| 634 | static int aes_cfb1_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
| 635 | const unsigned char *in,size_t len) | ||
| 636 | { | ||
| 637 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
| 638 | |||
| 639 | if (ctx->flags&EVP_CIPH_FLAG_LENGTH_BITS) { | ||
| 640 | CRYPTO_cfb128_1_encrypt(in,out,len,&dat->ks, | ||
| 641 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | ||
| 642 | return 1; | ||
| 643 | } | ||
| 644 | |||
| 645 | while (len>=MAXBITCHUNK) { | ||
| 646 | CRYPTO_cfb128_1_encrypt(in,out,MAXBITCHUNK*8,&dat->ks, | ||
| 647 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | ||
| 648 | len-=MAXBITCHUNK; | ||
| 649 | } | ||
| 650 | if (len) | ||
| 651 | CRYPTO_cfb128_1_encrypt(in,out,len*8,&dat->ks, | ||
| 652 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | ||
| 653 | |||
| 654 | return 1; | ||
| 655 | } | ||
| 656 | |||
| 657 | static int aes_ctr_cipher (EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
| 658 | const unsigned char *in, size_t len) | ||
| 659 | { | ||
| 660 | unsigned int num = ctx->num; | ||
| 661 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
| 662 | |||
| 663 | if (dat->stream.ctr) | ||
| 664 | CRYPTO_ctr128_encrypt_ctr32(in,out,len,&dat->ks, | ||
| 665 | ctx->iv,ctx->buf,&num,dat->stream.ctr); | ||
| 666 | else | ||
| 667 | CRYPTO_ctr128_encrypt(in,out,len,&dat->ks, | ||
| 668 | ctx->iv,ctx->buf,&num,dat->block); | ||
| 669 | ctx->num = (size_t)num; | ||
| 670 | return 1; | ||
| 671 | } | ||
| 672 | |||
| 673 | BLOCK_CIPHER_generic_pack(NID_aes,128,EVP_CIPH_FLAG_FIPS) | ||
| 674 | BLOCK_CIPHER_generic_pack(NID_aes,192,EVP_CIPH_FLAG_FIPS) | ||
| 675 | BLOCK_CIPHER_generic_pack(NID_aes,256,EVP_CIPH_FLAG_FIPS) | ||
| 676 | |||
| 677 | static int aes_gcm_cleanup(EVP_CIPHER_CTX *c) | ||
| 678 | { | ||
| 679 | EVP_AES_GCM_CTX *gctx = c->cipher_data; | ||
| 680 | OPENSSL_cleanse(&gctx->gcm, sizeof(gctx->gcm)); | ||
| 681 | if (gctx->iv != c->iv) | ||
| 682 | OPENSSL_free(gctx->iv); | ||
| 683 | return 1; | ||
| 684 | } | ||
| 685 | |||
| 686 | /* increment counter (64-bit int) by 1 */ | ||
| 687 | static void ctr64_inc(unsigned char *counter) { | ||
| 688 | int n=8; | ||
| 689 | unsigned char c; | ||
| 690 | |||
| 691 | do { | ||
| 692 | --n; | ||
| 693 | c = counter[n]; | ||
| 694 | ++c; | ||
| 695 | counter[n] = c; | ||
| 696 | if (c) return; | ||
| 697 | } while (n); | ||
| 698 | } | ||
| 699 | |||
| 700 | static int aes_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | ||
| 701 | { | ||
| 702 | EVP_AES_GCM_CTX *gctx = c->cipher_data; | ||
| 703 | switch (type) | ||
| 704 | { | ||
| 705 | case EVP_CTRL_INIT: | ||
| 706 | gctx->key_set = 0; | ||
| 707 | gctx->iv_set = 0; | ||
| 708 | gctx->ivlen = c->cipher->iv_len; | ||
| 709 | gctx->iv = c->iv; | ||
| 710 | gctx->taglen = -1; | ||
| 711 | gctx->iv_gen = 0; | ||
| 712 | gctx->tls_aad_len = -1; | ||
| 713 | return 1; | ||
| 714 | |||
| 715 | case EVP_CTRL_GCM_SET_IVLEN: | ||
| 716 | if (arg <= 0) | ||
| 717 | return 0; | ||
| 718 | #ifdef OPENSSL_FIPS | ||
| 719 | if (FIPS_module_mode() && !(c->flags & EVP_CIPH_FLAG_NON_FIPS_ALLOW) | ||
| 720 | && arg < 12) | ||
| 721 | return 0; | ||
| 722 | #endif | ||
| 723 | /* Allocate memory for IV if needed */ | ||
| 724 | if ((arg > EVP_MAX_IV_LENGTH) && (arg > gctx->ivlen)) | ||
| 725 | { | ||
| 726 | if (gctx->iv != c->iv) | ||
| 727 | OPENSSL_free(gctx->iv); | ||
| 728 | gctx->iv = OPENSSL_malloc(arg); | ||
| 729 | if (!gctx->iv) | ||
| 730 | return 0; | ||
| 731 | } | ||
| 732 | gctx->ivlen = arg; | ||
| 733 | return 1; | ||
| 734 | |||
| 735 | case EVP_CTRL_GCM_SET_TAG: | ||
| 736 | if (arg <= 0 || arg > 16 || c->encrypt) | ||
| 737 | return 0; | ||
| 738 | memcpy(c->buf, ptr, arg); | ||
| 739 | gctx->taglen = arg; | ||
| 740 | return 1; | ||
| 741 | |||
| 742 | case EVP_CTRL_GCM_GET_TAG: | ||
| 743 | if (arg <= 0 || arg > 16 || !c->encrypt || gctx->taglen < 0) | ||
| 744 | return 0; | ||
| 745 | memcpy(ptr, c->buf, arg); | ||
| 746 | return 1; | ||
| 747 | |||
| 748 | case EVP_CTRL_GCM_SET_IV_FIXED: | ||
| 749 | /* Special case: -1 length restores whole IV */ | ||
| 750 | if (arg == -1) | ||
| 751 | { | ||
| 752 | memcpy(gctx->iv, ptr, gctx->ivlen); | ||
| 753 | gctx->iv_gen = 1; | ||
| 754 | return 1; | ||
| 755 | } | ||
| 756 | /* Fixed field must be at least 4 bytes and invocation field | ||
| 757 | * at least 8. | ||
| 758 | */ | ||
| 759 | if ((arg < 4) || (gctx->ivlen - arg) < 8) | ||
| 760 | return 0; | ||
| 761 | if (arg) | ||
| 762 | memcpy(gctx->iv, ptr, arg); | ||
| 763 | if (c->encrypt && | ||
| 764 | RAND_bytes(gctx->iv + arg, gctx->ivlen - arg) <= 0) | ||
| 765 | return 0; | ||
| 766 | gctx->iv_gen = 1; | ||
| 767 | return 1; | ||
| 768 | |||
| 769 | case EVP_CTRL_GCM_IV_GEN: | ||
| 770 | if (gctx->iv_gen == 0 || gctx->key_set == 0) | ||
| 771 | return 0; | ||
| 772 | CRYPTO_gcm128_setiv(&gctx->gcm, gctx->iv, gctx->ivlen); | ||
| 773 | if (arg <= 0 || arg > gctx->ivlen) | ||
| 774 | arg = gctx->ivlen; | ||
| 775 | memcpy(ptr, gctx->iv + gctx->ivlen - arg, arg); | ||
| 776 | /* Invocation field will be at least 8 bytes in size and | ||
| 777 | * so no need to check wrap around or increment more than | ||
| 778 | * last 8 bytes. | ||
| 779 | */ | ||
| 780 | ctr64_inc(gctx->iv + gctx->ivlen - 8); | ||
| 781 | gctx->iv_set = 1; | ||
| 782 | return 1; | ||
| 783 | |||
| 784 | case EVP_CTRL_GCM_SET_IV_INV: | ||
| 785 | if (gctx->iv_gen == 0 || gctx->key_set == 0 || c->encrypt) | ||
| 786 | return 0; | ||
| 787 | memcpy(gctx->iv + gctx->ivlen - arg, ptr, arg); | ||
| 788 | CRYPTO_gcm128_setiv(&gctx->gcm, gctx->iv, gctx->ivlen); | ||
| 789 | gctx->iv_set = 1; | ||
| 790 | return 1; | ||
| 791 | |||
| 792 | case EVP_CTRL_AEAD_TLS1_AAD: | ||
| 793 | /* Save the AAD for later use */ | ||
| 794 | if (arg != 13) | ||
| 795 | return 0; | ||
| 796 | memcpy(c->buf, ptr, arg); | ||
| 797 | gctx->tls_aad_len = arg; | ||
| 798 | { | ||
| 799 | unsigned int len=c->buf[arg-2]<<8|c->buf[arg-1]; | ||
| 800 | /* Correct length for explicit IV */ | ||
| 801 | len -= EVP_GCM_TLS_EXPLICIT_IV_LEN; | ||
| 802 | /* If decrypting correct for tag too */ | ||
| 803 | if (!c->encrypt) | ||
| 804 | len -= EVP_GCM_TLS_TAG_LEN; | ||
| 805 | c->buf[arg-2] = len>>8; | ||
| 806 | c->buf[arg-1] = len & 0xff; | ||
| 807 | } | ||
| 808 | /* Extra padding: tag appended to record */ | ||
| 809 | return EVP_GCM_TLS_TAG_LEN; | ||
| 810 | |||
| 811 | default: | ||
| 812 | return -1; | ||
| 813 | |||
| 814 | } | ||
| 815 | } | ||
| 816 | |||
| 817 | static int aes_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
| 818 | const unsigned char *iv, int enc) | ||
| 819 | { | ||
| 820 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | ||
| 821 | if (!iv && !key) | ||
| 822 | return 1; | ||
| 823 | if (key) | ||
| 824 | { do { | ||
| 825 | #ifdef BSAES_CAPABLE | ||
| 826 | if (BSAES_CAPABLE) | ||
| 827 | { | ||
| 828 | AES_set_encrypt_key(key,ctx->key_len*8,&gctx->ks); | ||
| 829 | CRYPTO_gcm128_init(&gctx->gcm,&gctx->ks, | ||
| 830 | (block128_f)AES_encrypt); | ||
| 831 | gctx->ctr = (ctr128_f)bsaes_ctr32_encrypt_blocks; | ||
| 832 | break; | ||
| 833 | } | ||
| 834 | else | ||
| 835 | #endif | ||
| 836 | #ifdef VPAES_CAPABLE | ||
| 837 | if (VPAES_CAPABLE) | ||
| 838 | { | ||
| 839 | vpaes_set_encrypt_key(key,ctx->key_len*8,&gctx->ks); | ||
| 840 | CRYPTO_gcm128_init(&gctx->gcm,&gctx->ks, | ||
| 841 | (block128_f)vpaes_encrypt); | ||
| 842 | gctx->ctr = NULL; | ||
| 843 | break; | ||
| 844 | } | ||
| 845 | #endif | ||
| 846 | AES_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks); | ||
| 847 | CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, (block128_f)AES_encrypt); | ||
| 848 | #ifdef AES_CTR_ASM | ||
| 849 | gctx->ctr = (ctr128_f)AES_ctr32_encrypt; | ||
| 850 | #else | ||
| 851 | gctx->ctr = NULL; | ||
| 852 | #endif | ||
| 853 | } while (0); | ||
| 854 | |||
| 855 | /* If we have an iv can set it directly, otherwise use | ||
| 856 | * saved IV. | ||
| 857 | */ | ||
| 858 | if (iv == NULL && gctx->iv_set) | ||
| 859 | iv = gctx->iv; | ||
| 860 | if (iv) | ||
| 861 | { | ||
| 862 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | ||
| 863 | gctx->iv_set = 1; | ||
| 864 | } | ||
| 865 | gctx->key_set = 1; | ||
| 866 | } | ||
| 867 | else | ||
| 868 | { | ||
| 869 | /* If key set use IV, otherwise copy */ | ||
| 870 | if (gctx->key_set) | ||
| 871 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | ||
| 872 | else | ||
| 873 | memcpy(gctx->iv, iv, gctx->ivlen); | ||
| 874 | gctx->iv_set = 1; | ||
| 875 | gctx->iv_gen = 0; | ||
| 876 | } | ||
| 877 | return 1; | ||
| 878 | } | ||
| 879 | |||
| 880 | /* Handle TLS GCM packet format. This consists of the last portion of the IV | ||
| 881 | * followed by the payload and finally the tag. On encrypt generate IV, | ||
| 882 | * encrypt payload and write the tag. On verify retrieve IV, decrypt payload | ||
| 883 | * and verify tag. | ||
| 884 | */ | ||
| 885 | |||
| 886 | static int aes_gcm_tls_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
| 887 | const unsigned char *in, size_t len) | ||
| 888 | { | ||
| 889 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | ||
| 890 | int rv = -1; | ||
| 891 | /* Encrypt/decrypt must be performed in place */ | ||
| 892 | if (out != in || len < (EVP_GCM_TLS_EXPLICIT_IV_LEN+EVP_GCM_TLS_TAG_LEN)) | ||
| 893 | return -1; | ||
| 894 | /* Set IV from start of buffer or generate IV and write to start | ||
| 895 | * of buffer. | ||
| 896 | */ | ||
| 897 | if (EVP_CIPHER_CTX_ctrl(ctx, ctx->encrypt ? | ||
| 898 | EVP_CTRL_GCM_IV_GEN : EVP_CTRL_GCM_SET_IV_INV, | ||
| 899 | EVP_GCM_TLS_EXPLICIT_IV_LEN, out) <= 0) | ||
| 900 | goto err; | ||
| 901 | /* Use saved AAD */ | ||
| 902 | if (CRYPTO_gcm128_aad(&gctx->gcm, ctx->buf, gctx->tls_aad_len)) | ||
| 903 | goto err; | ||
| 904 | /* Fix buffer and length to point to payload */ | ||
| 905 | in += EVP_GCM_TLS_EXPLICIT_IV_LEN; | ||
| 906 | out += EVP_GCM_TLS_EXPLICIT_IV_LEN; | ||
| 907 | len -= EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN; | ||
| 908 | if (ctx->encrypt) | ||
| 909 | { | ||
| 910 | /* Encrypt payload */ | ||
| 911 | if (gctx->ctr) | ||
| 912 | { | ||
| 913 | if (CRYPTO_gcm128_encrypt_ctr32(&gctx->gcm, | ||
| 914 | in, out, len, | ||
| 915 | gctx->ctr)) | ||
| 916 | goto err; | ||
| 917 | } | ||
| 918 | else { | ||
| 919 | if (CRYPTO_gcm128_encrypt(&gctx->gcm, in, out, len)) | ||
| 920 | goto err; | ||
| 921 | } | ||
| 922 | out += len; | ||
| 923 | /* Finally write tag */ | ||
| 924 | CRYPTO_gcm128_tag(&gctx->gcm, out, EVP_GCM_TLS_TAG_LEN); | ||
| 925 | rv = len + EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN; | ||
| 926 | } | ||
| 927 | else | ||
| 928 | { | ||
| 929 | /* Decrypt */ | ||
| 930 | if (gctx->ctr) | ||
| 931 | { | ||
| 932 | if (CRYPTO_gcm128_decrypt_ctr32(&gctx->gcm, | ||
| 933 | in, out, len, | ||
| 934 | gctx->ctr)) | ||
| 935 | goto err; | ||
| 936 | } | ||
| 937 | else { | ||
| 938 | if (CRYPTO_gcm128_decrypt(&gctx->gcm, in, out, len)) | ||
| 939 | goto err; | ||
| 940 | } | ||
| 941 | /* Retrieve tag */ | ||
| 942 | CRYPTO_gcm128_tag(&gctx->gcm, ctx->buf, | ||
| 943 | EVP_GCM_TLS_TAG_LEN); | ||
| 944 | /* If tag mismatch wipe buffer */ | ||
| 945 | if (memcmp(ctx->buf, in + len, EVP_GCM_TLS_TAG_LEN)) | ||
| 946 | { | ||
| 947 | OPENSSL_cleanse(out, len); | ||
| 948 | goto err; | ||
| 949 | } | ||
| 950 | rv = len; | ||
| 951 | } | ||
| 952 | |||
| 953 | err: | ||
| 954 | gctx->iv_set = 0; | ||
| 955 | gctx->tls_aad_len = -1; | ||
| 956 | return rv; | ||
| 957 | } | ||
| 958 | |||
| 959 | static int aes_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
| 960 | const unsigned char *in, size_t len) | ||
| 961 | { | ||
| 962 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | ||
| 963 | /* If not set up, return error */ | ||
| 964 | if (!gctx->key_set) | ||
| 965 | return -1; | ||
| 966 | |||
| 967 | if (gctx->tls_aad_len >= 0) | ||
| 968 | return aes_gcm_tls_cipher(ctx, out, in, len); | ||
| 969 | |||
| 970 | if (!gctx->iv_set) | ||
| 971 | return -1; | ||
| 972 | if (!ctx->encrypt && gctx->taglen < 0) | ||
| 973 | return -1; | ||
| 974 | if (in) | ||
| 975 | { | ||
| 976 | if (out == NULL) | ||
| 977 | { | ||
| 978 | if (CRYPTO_gcm128_aad(&gctx->gcm, in, len)) | ||
| 979 | return -1; | ||
| 980 | } | ||
| 981 | else if (ctx->encrypt) | ||
| 982 | { | ||
| 983 | if (gctx->ctr) | ||
| 984 | { | ||
| 985 | if (CRYPTO_gcm128_encrypt_ctr32(&gctx->gcm, | ||
| 986 | in, out, len, | ||
| 987 | gctx->ctr)) | ||
| 988 | return -1; | ||
| 989 | } | ||
| 990 | else { | ||
| 991 | if (CRYPTO_gcm128_encrypt(&gctx->gcm, in, out, len)) | ||
| 992 | return -1; | ||
| 993 | } | ||
| 994 | } | ||
| 995 | else | ||
| 996 | { | ||
| 997 | if (gctx->ctr) | ||
| 998 | { | ||
| 999 | if (CRYPTO_gcm128_decrypt_ctr32(&gctx->gcm, | ||
| 1000 | in, out, len, | ||
| 1001 | gctx->ctr)) | ||
| 1002 | return -1; | ||
| 1003 | } | ||
| 1004 | else { | ||
| 1005 | if (CRYPTO_gcm128_decrypt(&gctx->gcm, in, out, len)) | ||
| 1006 | return -1; | ||
| 1007 | } | ||
| 1008 | } | ||
| 1009 | return len; | ||
| 1010 | } | ||
| 1011 | else | ||
| 1012 | { | ||
| 1013 | if (!ctx->encrypt) | ||
| 1014 | { | ||
| 1015 | if (CRYPTO_gcm128_finish(&gctx->gcm, | ||
| 1016 | ctx->buf, gctx->taglen) != 0) | ||
| 1017 | return -1; | ||
| 1018 | gctx->iv_set = 0; | ||
| 1019 | return 0; | ||
| 1020 | } | ||
| 1021 | CRYPTO_gcm128_tag(&gctx->gcm, ctx->buf, 16); | ||
| 1022 | gctx->taglen = 16; | ||
| 1023 | /* Don't reuse the IV */ | ||
| 1024 | gctx->iv_set = 0; | ||
| 1025 | return 0; | ||
| 1026 | } | ||
| 1027 | |||
| 1028 | } | ||
| 1029 | |||
| 1030 | #define CUSTOM_FLAGS (EVP_CIPH_FLAG_DEFAULT_ASN1 \ | ||
| 1031 | | EVP_CIPH_CUSTOM_IV | EVP_CIPH_FLAG_CUSTOM_CIPHER \ | ||
| 1032 | | EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT) | ||
| 1033 | |||
| 1034 | BLOCK_CIPHER_custom(NID_aes,128,1,12,gcm,GCM, | ||
| 1035 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) | ||
| 1036 | BLOCK_CIPHER_custom(NID_aes,192,1,12,gcm,GCM, | ||
| 1037 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) | ||
| 1038 | BLOCK_CIPHER_custom(NID_aes,256,1,12,gcm,GCM, | ||
| 1039 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) | ||
| 1040 | |||
| 1041 | static int aes_xts_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | ||
| 1042 | { | ||
| 1043 | EVP_AES_XTS_CTX *xctx = c->cipher_data; | ||
| 1044 | if (type != EVP_CTRL_INIT) | ||
| 1045 | return -1; | ||
| 1046 | /* key1 and key2 are used as an indicator both key and IV are set */ | ||
| 1047 | xctx->xts.key1 = NULL; | ||
| 1048 | xctx->xts.key2 = NULL; | ||
| 1049 | return 1; | ||
| 1050 | } | ||
| 1051 | |||
| 1052 | static int aes_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
| 1053 | const unsigned char *iv, int enc) | ||
| 1054 | { | ||
| 1055 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; | ||
| 1056 | if (!iv && !key) | ||
| 1057 | return 1; | ||
| 1058 | |||
| 1059 | if (key) do | ||
| 1060 | { | ||
| 1061 | #ifdef AES_XTS_ASM | ||
| 1062 | xctx->stream = enc ? AES_xts_encrypt : AES_xts_decrypt; | ||
| 1063 | #else | ||
| 1064 | xctx->stream = NULL; | ||
| 1065 | #endif | ||
| 1066 | /* key_len is two AES keys */ | ||
| 1067 | #ifdef BSAES_CAPABLE | ||
| 1068 | if (BSAES_CAPABLE) | ||
| 1069 | xctx->stream = enc ? bsaes_xts_encrypt : bsaes_xts_decrypt; | ||
| 1070 | else | ||
| 1071 | #endif | ||
| 1072 | #ifdef VPAES_CAPABLE | ||
| 1073 | if (VPAES_CAPABLE) | ||
| 1074 | { | ||
| 1075 | if (enc) | ||
| 1076 | { | ||
| 1077 | vpaes_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
| 1078 | xctx->xts.block1 = (block128_f)vpaes_encrypt; | ||
| 1079 | } | ||
| 1080 | else | ||
| 1081 | { | ||
| 1082 | vpaes_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
| 1083 | xctx->xts.block1 = (block128_f)vpaes_decrypt; | ||
| 1084 | } | ||
| 1085 | |||
| 1086 | vpaes_set_encrypt_key(key + ctx->key_len/2, | ||
| 1087 | ctx->key_len * 4, &xctx->ks2); | ||
| 1088 | xctx->xts.block2 = (block128_f)vpaes_encrypt; | ||
| 1089 | |||
| 1090 | xctx->xts.key1 = &xctx->ks1; | ||
| 1091 | break; | ||
| 1092 | } | ||
| 1093 | #endif | ||
| 1094 | if (enc) | ||
| 1095 | { | ||
| 1096 | AES_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
| 1097 | xctx->xts.block1 = (block128_f)AES_encrypt; | ||
| 1098 | } | ||
| 1099 | else | ||
| 1100 | { | ||
| 1101 | AES_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
| 1102 | xctx->xts.block1 = (block128_f)AES_decrypt; | ||
| 1103 | } | ||
| 1104 | |||
| 1105 | AES_set_encrypt_key(key + ctx->key_len/2, | ||
| 1106 | ctx->key_len * 4, &xctx->ks2); | ||
| 1107 | xctx->xts.block2 = (block128_f)AES_encrypt; | ||
| 1108 | |||
| 1109 | xctx->xts.key1 = &xctx->ks1; | ||
| 1110 | } while (0); | ||
| 1111 | |||
| 1112 | if (iv) | ||
| 1113 | { | ||
| 1114 | xctx->xts.key2 = &xctx->ks2; | ||
| 1115 | memcpy(ctx->iv, iv, 16); | ||
| 1116 | } | ||
| 1117 | |||
| 1118 | return 1; | ||
| 1119 | } | ||
| 1120 | |||
| 1121 | static int aes_xts_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
| 1122 | const unsigned char *in, size_t len) | ||
| 1123 | { | ||
| 1124 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; | ||
| 1125 | if (!xctx->xts.key1 || !xctx->xts.key2) | ||
| 1126 | return 0; | ||
| 1127 | if (!out || !in || len<AES_BLOCK_SIZE) | ||
| 1128 | return 0; | ||
| 1129 | #ifdef OPENSSL_FIPS | ||
| 1130 | /* Requirement of SP800-38E */ | ||
| 1131 | if (FIPS_module_mode() && !(ctx->flags & EVP_CIPH_FLAG_NON_FIPS_ALLOW) && | ||
| 1132 | (len > (1UL<<20)*16)) | ||
| 1133 | { | ||
| 1134 | EVPerr(EVP_F_AES_XTS_CIPHER, EVP_R_TOO_LARGE); | ||
| 1135 | return 0; | ||
| 1136 | } | ||
| 1137 | #endif | ||
| 1138 | if (xctx->stream) | ||
| 1139 | (*xctx->stream)(in, out, len, | ||
| 1140 | xctx->xts.key1, xctx->xts.key2, ctx->iv); | ||
| 1141 | else if (CRYPTO_xts128_encrypt(&xctx->xts, ctx->iv, in, out, len, | ||
| 1142 | ctx->encrypt)) | ||
| 1143 | return 0; | ||
| 1144 | return 1; | ||
| 1145 | } | ||
| 1146 | |||
| 1147 | #define aes_xts_cleanup NULL | ||
| 1148 | |||
| 1149 | #define XTS_FLAGS (EVP_CIPH_FLAG_DEFAULT_ASN1 | EVP_CIPH_CUSTOM_IV \ | ||
| 1150 | | EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT) | ||
| 1151 | |||
| 1152 | BLOCK_CIPHER_custom(NID_aes,128,1,16,xts,XTS,EVP_CIPH_FLAG_FIPS|XTS_FLAGS) | ||
| 1153 | BLOCK_CIPHER_custom(NID_aes,256,1,16,xts,XTS,EVP_CIPH_FLAG_FIPS|XTS_FLAGS) | ||
| 1154 | |||
| 1155 | static int aes_ccm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | ||
| 1156 | { | ||
| 1157 | EVP_AES_CCM_CTX *cctx = c->cipher_data; | ||
| 1158 | switch (type) | ||
| 1159 | { | ||
| 1160 | case EVP_CTRL_INIT: | ||
| 1161 | cctx->key_set = 0; | ||
| 1162 | cctx->iv_set = 0; | ||
| 1163 | cctx->L = 8; | ||
| 1164 | cctx->M = 12; | ||
| 1165 | cctx->tag_set = 0; | ||
| 1166 | cctx->len_set = 0; | ||
| 1167 | return 1; | ||
| 1168 | |||
| 1169 | case EVP_CTRL_CCM_SET_IVLEN: | ||
| 1170 | arg = 15 - arg; | ||
| 1171 | case EVP_CTRL_CCM_SET_L: | ||
| 1172 | if (arg < 2 || arg > 8) | ||
| 1173 | return 0; | ||
| 1174 | cctx->L = arg; | ||
| 1175 | return 1; | ||
| 1176 | |||
| 1177 | case EVP_CTRL_CCM_SET_TAG: | ||
| 1178 | if ((arg & 1) || arg < 4 || arg > 16) | ||
| 1179 | return 0; | ||
| 1180 | if ((c->encrypt && ptr) || (!c->encrypt && !ptr)) | ||
| 1181 | return 0; | ||
| 1182 | if (ptr) | ||
| 1183 | { | ||
| 1184 | cctx->tag_set = 1; | ||
| 1185 | memcpy(c->buf, ptr, arg); | ||
| 1186 | } | ||
| 1187 | cctx->M = arg; | ||
| 1188 | return 1; | ||
| 1189 | |||
| 1190 | case EVP_CTRL_CCM_GET_TAG: | ||
| 1191 | if (!c->encrypt || !cctx->tag_set) | ||
| 1192 | return 0; | ||
| 1193 | if(!CRYPTO_ccm128_tag(&cctx->ccm, ptr, (size_t)arg)) | ||
| 1194 | return 0; | ||
| 1195 | cctx->tag_set = 0; | ||
| 1196 | cctx->iv_set = 0; | ||
| 1197 | cctx->len_set = 0; | ||
| 1198 | return 1; | ||
| 1199 | |||
| 1200 | default: | ||
| 1201 | return -1; | ||
| 1202 | |||
| 1203 | } | ||
| 1204 | } | ||
| 1205 | |||
| 1206 | static int aes_ccm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
| 1207 | const unsigned char *iv, int enc) | ||
| 1208 | { | ||
| 1209 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; | ||
| 1210 | if (!iv && !key) | ||
| 1211 | return 1; | ||
| 1212 | if (key) do | ||
| 1213 | { | ||
| 1214 | #ifdef VPAES_CAPABLE | ||
| 1215 | if (VPAES_CAPABLE) | ||
| 1216 | { | ||
| 1217 | vpaes_set_encrypt_key(key, ctx->key_len*8, &cctx->ks); | ||
| 1218 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, | ||
| 1219 | &cctx->ks, (block128_f)vpaes_encrypt); | ||
| 1220 | cctx->key_set = 1; | ||
| 1221 | break; | ||
| 1222 | } | ||
| 1223 | #endif | ||
| 1224 | AES_set_encrypt_key(key, ctx->key_len * 8, &cctx->ks); | ||
| 1225 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, | ||
| 1226 | &cctx->ks, (block128_f)AES_encrypt); | ||
| 1227 | cctx->str = NULL; | ||
| 1228 | cctx->key_set = 1; | ||
| 1229 | } while (0); | ||
| 1230 | if (iv) | ||
| 1231 | { | ||
| 1232 | memcpy(ctx->iv, iv, 15 - cctx->L); | ||
| 1233 | cctx->iv_set = 1; | ||
| 1234 | } | ||
| 1235 | return 1; | ||
| 1236 | } | ||
| 1237 | |||
| 1238 | static int aes_ccm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
| 1239 | const unsigned char *in, size_t len) | ||
| 1240 | { | ||
| 1241 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; | ||
| 1242 | CCM128_CONTEXT *ccm = &cctx->ccm; | ||
| 1243 | /* If not set up, return error */ | ||
| 1244 | if (!cctx->iv_set && !cctx->key_set) | ||
| 1245 | return -1; | ||
| 1246 | if (!ctx->encrypt && !cctx->tag_set) | ||
| 1247 | return -1; | ||
| 1248 | if (!out) | ||
| 1249 | { | ||
| 1250 | if (!in) | ||
| 1251 | { | ||
| 1252 | if (CRYPTO_ccm128_setiv(ccm, ctx->iv, 15 - cctx->L,len)) | ||
| 1253 | return -1; | ||
| 1254 | cctx->len_set = 1; | ||
| 1255 | return len; | ||
| 1256 | } | ||
| 1257 | /* If have AAD need message length */ | ||
| 1258 | if (!cctx->len_set && len) | ||
| 1259 | return -1; | ||
| 1260 | CRYPTO_ccm128_aad(ccm, in, len); | ||
| 1261 | return len; | ||
| 1262 | } | ||
| 1263 | /* EVP_*Final() doesn't return any data */ | ||
| 1264 | if (!in) | ||
| 1265 | return 0; | ||
| 1266 | /* If not set length yet do it */ | ||
| 1267 | if (!cctx->len_set) | ||
| 1268 | { | ||
| 1269 | if (CRYPTO_ccm128_setiv(ccm, ctx->iv, 15 - cctx->L, len)) | ||
| 1270 | return -1; | ||
| 1271 | cctx->len_set = 1; | ||
| 1272 | } | ||
| 1273 | if (ctx->encrypt) | ||
| 1274 | { | ||
| 1275 | if (cctx->str ? CRYPTO_ccm128_encrypt_ccm64(ccm, in, out, len, | ||
| 1276 | cctx->str) : | ||
| 1277 | CRYPTO_ccm128_encrypt(ccm, in, out, len)) | ||
| 1278 | return -1; | ||
| 1279 | cctx->tag_set = 1; | ||
| 1280 | return len; | ||
| 1281 | } | ||
| 1282 | else | ||
| 1283 | { | ||
| 1284 | int rv = -1; | ||
| 1285 | if (cctx->str ? !CRYPTO_ccm128_decrypt_ccm64(ccm, in, out, len, | ||
| 1286 | cctx->str) : | ||
| 1287 | !CRYPTO_ccm128_decrypt(ccm, in, out, len)) | ||
| 1288 | { | ||
| 1289 | unsigned char tag[16]; | ||
| 1290 | if (CRYPTO_ccm128_tag(ccm, tag, cctx->M)) | ||
| 1291 | { | ||
| 1292 | if (!memcmp(tag, ctx->buf, cctx->M)) | ||
| 1293 | rv = len; | ||
| 1294 | } | ||
| 1295 | } | ||
| 1296 | if (rv == -1) | ||
| 1297 | OPENSSL_cleanse(out, len); | ||
| 1298 | cctx->iv_set = 0; | ||
| 1299 | cctx->tag_set = 0; | ||
| 1300 | cctx->len_set = 0; | ||
| 1301 | return rv; | ||
| 1302 | } | ||
| 1303 | |||
| 1304 | } | ||
| 1305 | |||
| 1306 | #define aes_ccm_cleanup NULL | ||
| 1307 | |||
| 1308 | BLOCK_CIPHER_custom(NID_aes,128,1,12,ccm,CCM,EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) | ||
| 1309 | BLOCK_CIPHER_custom(NID_aes,192,1,12,ccm,CCM,EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) | ||
| 1310 | BLOCK_CIPHER_custom(NID_aes,256,1,12,ccm,CCM,EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) | ||
| 1311 | |||
| 1312 | #endif | ||
| 120 | #endif | 1313 | #endif |
diff --git a/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c b/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c new file mode 100644 index 0000000000..710fb79baf --- /dev/null +++ b/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c | |||
| @@ -0,0 +1,406 @@ | |||
| 1 | /* ==================================================================== | ||
| 2 | * Copyright (c) 2011 The OpenSSL Project. All rights reserved. | ||
| 3 | * | ||
| 4 | * Redistribution and use in source and binary forms, with or without | ||
| 5 | * modification, are permitted provided that the following conditions | ||
| 6 | * are met: | ||
| 7 | * | ||
| 8 | * 1. Redistributions of source code must retain the above copyright | ||
| 9 | * notice, this list of conditions and the following disclaimer. | ||
| 10 | * | ||
| 11 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 12 | * notice, this list of conditions and the following disclaimer in | ||
| 13 | * the documentation and/or other materials provided with the | ||
| 14 | * distribution. | ||
| 15 | * | ||
| 16 | * 3. All advertising materials mentioning features or use of this | ||
| 17 | * software must display the following acknowledgment: | ||
| 18 | * "This product includes software developed by the OpenSSL Project | ||
| 19 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
| 20 | * | ||
| 21 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 22 | * endorse or promote products derived from this software without | ||
| 23 | * prior written permission. For written permission, please contact | ||
| 24 | * licensing@OpenSSL.org. | ||
| 25 | * | ||
| 26 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 27 | * nor may "OpenSSL" appear in their names without prior written | ||
| 28 | * permission of the OpenSSL Project. | ||
| 29 | * | ||
| 30 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 31 | * acknowledgment: | ||
| 32 | * "This product includes software developed by the OpenSSL Project | ||
| 33 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
| 34 | * | ||
| 35 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 36 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 37 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 38 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 39 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 40 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 41 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 42 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 43 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 44 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 45 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 46 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 47 | * ==================================================================== | ||
| 48 | */ | ||
| 49 | |||
| 50 | #include <openssl/opensslconf.h> | ||
| 51 | |||
| 52 | #include <stdio.h> | ||
| 53 | #include <string.h> | ||
| 54 | |||
| 55 | #if !defined(OPENSSL_NO_AES) && !defined(OPENSSL_NO_SHA1) | ||
| 56 | |||
| 57 | #include <openssl/evp.h> | ||
| 58 | #include <openssl/objects.h> | ||
| 59 | #include <openssl/aes.h> | ||
| 60 | #include <openssl/sha.h> | ||
| 61 | #include "evp_locl.h" | ||
| 62 | |||
| 63 | #ifndef EVP_CIPH_FLAG_AEAD_CIPHER | ||
| 64 | #define EVP_CIPH_FLAG_AEAD_CIPHER 0x200000 | ||
| 65 | #define EVP_CTRL_AEAD_TLS1_AAD 0x16 | ||
| 66 | #define EVP_CTRL_AEAD_SET_MAC_KEY 0x17 | ||
| 67 | #endif | ||
| 68 | |||
| 69 | #if !defined(EVP_CIPH_FLAG_DEFAULT_ASN1) | ||
| 70 | #define EVP_CIPH_FLAG_DEFAULT_ASN1 0 | ||
| 71 | #endif | ||
| 72 | |||
| 73 | #define TLS1_1_VERSION 0x0302 | ||
| 74 | |||
| 75 | typedef struct | ||
| 76 | { | ||
| 77 | AES_KEY ks; | ||
| 78 | SHA_CTX head,tail,md; | ||
| 79 | size_t payload_length; /* AAD length in decrypt case */ | ||
| 80 | union { | ||
| 81 | unsigned int tls_ver; | ||
| 82 | unsigned char tls_aad[16]; /* 13 used */ | ||
| 83 | } aux; | ||
| 84 | } EVP_AES_HMAC_SHA1; | ||
| 85 | |||
| 86 | #define NO_PAYLOAD_LENGTH ((size_t)-1) | ||
| 87 | |||
| 88 | #if defined(AES_ASM) && ( \ | ||
| 89 | defined(__x86_64) || defined(__x86_64__) || \ | ||
| 90 | defined(_M_AMD64) || defined(_M_X64) || \ | ||
| 91 | defined(__INTEL__) ) | ||
| 92 | |||
| 93 | extern unsigned int OPENSSL_ia32cap_P[2]; | ||
| 94 | #define AESNI_CAPABLE (1<<(57-32)) | ||
| 95 | |||
| 96 | int aesni_set_encrypt_key(const unsigned char *userKey, int bits, | ||
| 97 | AES_KEY *key); | ||
| 98 | int aesni_set_decrypt_key(const unsigned char *userKey, int bits, | ||
| 99 | AES_KEY *key); | ||
| 100 | |||
| 101 | void aesni_cbc_encrypt(const unsigned char *in, | ||
| 102 | unsigned char *out, | ||
| 103 | size_t length, | ||
| 104 | const AES_KEY *key, | ||
| 105 | unsigned char *ivec, int enc); | ||
| 106 | |||
| 107 | void aesni_cbc_sha1_enc (const void *inp, void *out, size_t blocks, | ||
| 108 | const AES_KEY *key, unsigned char iv[16], | ||
| 109 | SHA_CTX *ctx,const void *in0); | ||
| 110 | |||
| 111 | #define data(ctx) ((EVP_AES_HMAC_SHA1 *)(ctx)->cipher_data) | ||
| 112 | |||
| 113 | static int aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, | ||
| 114 | const unsigned char *inkey, | ||
| 115 | const unsigned char *iv, int enc) | ||
| 116 | { | ||
| 117 | EVP_AES_HMAC_SHA1 *key = data(ctx); | ||
| 118 | int ret; | ||
| 119 | |||
| 120 | if (enc) | ||
| 121 | ret=aesni_set_encrypt_key(inkey,ctx->key_len*8,&key->ks); | ||
| 122 | else | ||
| 123 | ret=aesni_set_decrypt_key(inkey,ctx->key_len*8,&key->ks); | ||
| 124 | |||
| 125 | SHA1_Init(&key->head); /* handy when benchmarking */ | ||
| 126 | key->tail = key->head; | ||
| 127 | key->md = key->head; | ||
| 128 | |||
| 129 | key->payload_length = NO_PAYLOAD_LENGTH; | ||
| 130 | |||
| 131 | return ret<0?0:1; | ||
| 132 | } | ||
| 133 | |||
| 134 | #define STITCHED_CALL | ||
| 135 | |||
| 136 | #if !defined(STITCHED_CALL) | ||
| 137 | #define aes_off 0 | ||
| 138 | #endif | ||
| 139 | |||
| 140 | void sha1_block_data_order (void *c,const void *p,size_t len); | ||
| 141 | |||
| 142 | static void sha1_update(SHA_CTX *c,const void *data,size_t len) | ||
| 143 | { const unsigned char *ptr = data; | ||
| 144 | size_t res; | ||
| 145 | |||
| 146 | if ((res = c->num)) { | ||
| 147 | res = SHA_CBLOCK-res; | ||
| 148 | if (len<res) res=len; | ||
| 149 | SHA1_Update (c,ptr,res); | ||
| 150 | ptr += res; | ||
| 151 | len -= res; | ||
| 152 | } | ||
| 153 | |||
| 154 | res = len % SHA_CBLOCK; | ||
| 155 | len -= res; | ||
| 156 | |||
| 157 | if (len) { | ||
| 158 | sha1_block_data_order(c,ptr,len/SHA_CBLOCK); | ||
| 159 | |||
| 160 | ptr += len; | ||
| 161 | c->Nh += len>>29; | ||
| 162 | c->Nl += len<<=3; | ||
| 163 | if (c->Nl<(unsigned int)len) c->Nh++; | ||
| 164 | } | ||
| 165 | |||
| 166 | if (res) | ||
| 167 | SHA1_Update(c,ptr,res); | ||
| 168 | } | ||
| 169 | |||
| 170 | #define SHA1_Update sha1_update | ||
| 171 | |||
| 172 | static int aesni_cbc_hmac_sha1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
| 173 | const unsigned char *in, size_t len) | ||
| 174 | { | ||
| 175 | EVP_AES_HMAC_SHA1 *key = data(ctx); | ||
| 176 | unsigned int l; | ||
| 177 | size_t plen = key->payload_length, | ||
| 178 | iv = 0, /* explicit IV in TLS 1.1 and later */ | ||
| 179 | sha_off = 0; | ||
| 180 | #if defined(STITCHED_CALL) | ||
| 181 | size_t aes_off = 0, | ||
| 182 | blocks; | ||
| 183 | |||
| 184 | sha_off = SHA_CBLOCK-key->md.num; | ||
| 185 | #endif | ||
| 186 | |||
| 187 | if (len%AES_BLOCK_SIZE) return 0; | ||
| 188 | |||
| 189 | if (ctx->encrypt) { | ||
| 190 | if (plen==NO_PAYLOAD_LENGTH) | ||
| 191 | plen = len; | ||
| 192 | else if (len!=((plen+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE)) | ||
| 193 | return 0; | ||
| 194 | else if (key->aux.tls_ver >= TLS1_1_VERSION) | ||
| 195 | iv = AES_BLOCK_SIZE; | ||
| 196 | |||
| 197 | #if defined(STITCHED_CALL) | ||
| 198 | if (plen>(sha_off+iv) && (blocks=(plen-(sha_off+iv))/SHA_CBLOCK)) { | ||
| 199 | SHA1_Update(&key->md,in+iv,sha_off); | ||
| 200 | |||
| 201 | aesni_cbc_sha1_enc(in,out,blocks,&key->ks, | ||
| 202 | ctx->iv,&key->md,in+iv+sha_off); | ||
| 203 | blocks *= SHA_CBLOCK; | ||
| 204 | aes_off += blocks; | ||
| 205 | sha_off += blocks; | ||
| 206 | key->md.Nh += blocks>>29; | ||
| 207 | key->md.Nl += blocks<<=3; | ||
| 208 | if (key->md.Nl<(unsigned int)blocks) key->md.Nh++; | ||
| 209 | } else { | ||
| 210 | sha_off = 0; | ||
| 211 | } | ||
| 212 | #endif | ||
| 213 | sha_off += iv; | ||
| 214 | SHA1_Update(&key->md,in+sha_off,plen-sha_off); | ||
| 215 | |||
| 216 | if (plen!=len) { /* "TLS" mode of operation */ | ||
| 217 | if (in!=out) | ||
| 218 | memcpy(out+aes_off,in+aes_off,plen-aes_off); | ||
| 219 | |||
| 220 | /* calculate HMAC and append it to payload */ | ||
| 221 | SHA1_Final(out+plen,&key->md); | ||
| 222 | key->md = key->tail; | ||
| 223 | SHA1_Update(&key->md,out+plen,SHA_DIGEST_LENGTH); | ||
| 224 | SHA1_Final(out+plen,&key->md); | ||
| 225 | |||
| 226 | /* pad the payload|hmac */ | ||
| 227 | plen += SHA_DIGEST_LENGTH; | ||
| 228 | for (l=len-plen-1;plen<len;plen++) out[plen]=l; | ||
| 229 | /* encrypt HMAC|padding at once */ | ||
| 230 | aesni_cbc_encrypt(out+aes_off,out+aes_off,len-aes_off, | ||
| 231 | &key->ks,ctx->iv,1); | ||
| 232 | } else { | ||
| 233 | aesni_cbc_encrypt(in+aes_off,out+aes_off,len-aes_off, | ||
| 234 | &key->ks,ctx->iv,1); | ||
| 235 | } | ||
| 236 | } else { | ||
| 237 | unsigned char mac[SHA_DIGEST_LENGTH]; | ||
| 238 | |||
| 239 | /* decrypt HMAC|padding at once */ | ||
| 240 | aesni_cbc_encrypt(in,out,len, | ||
| 241 | &key->ks,ctx->iv,0); | ||
| 242 | |||
| 243 | if (plen) { /* "TLS" mode of operation */ | ||
| 244 | /* figure out payload length */ | ||
| 245 | if (len<(size_t)(out[len-1]+1+SHA_DIGEST_LENGTH)) | ||
| 246 | return 0; | ||
| 247 | |||
| 248 | len -= (out[len-1]+1+SHA_DIGEST_LENGTH); | ||
| 249 | |||
| 250 | if ((key->aux.tls_aad[plen-4]<<8|key->aux.tls_aad[plen-3]) | ||
| 251 | >= TLS1_1_VERSION) { | ||
| 252 | len -= AES_BLOCK_SIZE; | ||
| 253 | iv = AES_BLOCK_SIZE; | ||
| 254 | } | ||
| 255 | |||
| 256 | key->aux.tls_aad[plen-2] = len>>8; | ||
| 257 | key->aux.tls_aad[plen-1] = len; | ||
| 258 | |||
| 259 | /* calculate HMAC and verify it */ | ||
| 260 | key->md = key->head; | ||
| 261 | SHA1_Update(&key->md,key->aux.tls_aad,plen); | ||
| 262 | SHA1_Update(&key->md,out+iv,len); | ||
| 263 | SHA1_Final(mac,&key->md); | ||
| 264 | |||
| 265 | key->md = key->tail; | ||
| 266 | SHA1_Update(&key->md,mac,SHA_DIGEST_LENGTH); | ||
| 267 | SHA1_Final(mac,&key->md); | ||
| 268 | |||
| 269 | if (memcmp(out+iv+len,mac,SHA_DIGEST_LENGTH)) | ||
| 270 | return 0; | ||
| 271 | } else { | ||
| 272 | SHA1_Update(&key->md,out,len); | ||
| 273 | } | ||
| 274 | } | ||
| 275 | |||
| 276 | key->payload_length = NO_PAYLOAD_LENGTH; | ||
| 277 | |||
| 278 | return 1; | ||
| 279 | } | ||
| 280 | |||
| 281 | static int aesni_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | ||
| 282 | { | ||
| 283 | EVP_AES_HMAC_SHA1 *key = data(ctx); | ||
| 284 | |||
| 285 | switch (type) | ||
| 286 | { | ||
| 287 | case EVP_CTRL_AEAD_SET_MAC_KEY: | ||
| 288 | { | ||
| 289 | unsigned int i; | ||
| 290 | unsigned char hmac_key[64]; | ||
| 291 | |||
| 292 | memset (hmac_key,0,sizeof(hmac_key)); | ||
| 293 | |||
| 294 | if (arg > (int)sizeof(hmac_key)) { | ||
| 295 | SHA1_Init(&key->head); | ||
| 296 | SHA1_Update(&key->head,ptr,arg); | ||
| 297 | SHA1_Final(hmac_key,&key->head); | ||
| 298 | } else { | ||
| 299 | memcpy(hmac_key,ptr,arg); | ||
| 300 | } | ||
| 301 | |||
| 302 | for (i=0;i<sizeof(hmac_key);i++) | ||
| 303 | hmac_key[i] ^= 0x36; /* ipad */ | ||
| 304 | SHA1_Init(&key->head); | ||
| 305 | SHA1_Update(&key->head,hmac_key,sizeof(hmac_key)); | ||
| 306 | |||
| 307 | for (i=0;i<sizeof(hmac_key);i++) | ||
| 308 | hmac_key[i] ^= 0x36^0x5c; /* opad */ | ||
| 309 | SHA1_Init(&key->tail); | ||
| 310 | SHA1_Update(&key->tail,hmac_key,sizeof(hmac_key)); | ||
| 311 | |||
| 312 | return 1; | ||
| 313 | } | ||
| 314 | case EVP_CTRL_AEAD_TLS1_AAD: | ||
| 315 | { | ||
| 316 | unsigned char *p=ptr; | ||
| 317 | unsigned int len=p[arg-2]<<8|p[arg-1]; | ||
| 318 | |||
| 319 | if (ctx->encrypt) | ||
| 320 | { | ||
| 321 | key->payload_length = len; | ||
| 322 | if ((key->aux.tls_ver=p[arg-4]<<8|p[arg-3]) >= TLS1_1_VERSION) { | ||
| 323 | len -= AES_BLOCK_SIZE; | ||
| 324 | p[arg-2] = len>>8; | ||
| 325 | p[arg-1] = len; | ||
| 326 | } | ||
| 327 | key->md = key->head; | ||
| 328 | SHA1_Update(&key->md,p,arg); | ||
| 329 | |||
| 330 | return (int)(((len+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE) | ||
| 331 | - len); | ||
| 332 | } | ||
| 333 | else | ||
| 334 | { | ||
| 335 | if (arg>13) arg = 13; | ||
| 336 | memcpy(key->aux.tls_aad,ptr,arg); | ||
| 337 | key->payload_length = arg; | ||
| 338 | |||
| 339 | return SHA_DIGEST_LENGTH; | ||
| 340 | } | ||
| 341 | } | ||
| 342 | default: | ||
| 343 | return -1; | ||
| 344 | } | ||
| 345 | } | ||
| 346 | |||
| 347 | static EVP_CIPHER aesni_128_cbc_hmac_sha1_cipher = | ||
| 348 | { | ||
| 349 | #ifdef NID_aes_128_cbc_hmac_sha1 | ||
| 350 | NID_aes_128_cbc_hmac_sha1, | ||
| 351 | #else | ||
| 352 | NID_undef, | ||
| 353 | #endif | ||
| 354 | 16,16,16, | ||
| 355 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, | ||
| 356 | aesni_cbc_hmac_sha1_init_key, | ||
| 357 | aesni_cbc_hmac_sha1_cipher, | ||
| 358 | NULL, | ||
| 359 | sizeof(EVP_AES_HMAC_SHA1), | ||
| 360 | EVP_CIPH_FLAG_DEFAULT_ASN1?NULL:EVP_CIPHER_set_asn1_iv, | ||
| 361 | EVP_CIPH_FLAG_DEFAULT_ASN1?NULL:EVP_CIPHER_get_asn1_iv, | ||
| 362 | aesni_cbc_hmac_sha1_ctrl, | ||
| 363 | NULL | ||
| 364 | }; | ||
| 365 | |||
| 366 | static EVP_CIPHER aesni_256_cbc_hmac_sha1_cipher = | ||
| 367 | { | ||
| 368 | #ifdef NID_aes_256_cbc_hmac_sha1 | ||
| 369 | NID_aes_256_cbc_hmac_sha1, | ||
| 370 | #else | ||
| 371 | NID_undef, | ||
| 372 | #endif | ||
| 373 | 16,32,16, | ||
| 374 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, | ||
| 375 | aesni_cbc_hmac_sha1_init_key, | ||
| 376 | aesni_cbc_hmac_sha1_cipher, | ||
| 377 | NULL, | ||
| 378 | sizeof(EVP_AES_HMAC_SHA1), | ||
| 379 | EVP_CIPH_FLAG_DEFAULT_ASN1?NULL:EVP_CIPHER_set_asn1_iv, | ||
| 380 | EVP_CIPH_FLAG_DEFAULT_ASN1?NULL:EVP_CIPHER_get_asn1_iv, | ||
| 381 | aesni_cbc_hmac_sha1_ctrl, | ||
| 382 | NULL | ||
| 383 | }; | ||
| 384 | |||
| 385 | const EVP_CIPHER *EVP_aes_128_cbc_hmac_sha1(void) | ||
| 386 | { | ||
| 387 | return(OPENSSL_ia32cap_P[1]&AESNI_CAPABLE? | ||
| 388 | &aesni_128_cbc_hmac_sha1_cipher:NULL); | ||
| 389 | } | ||
| 390 | |||
| 391 | const EVP_CIPHER *EVP_aes_256_cbc_hmac_sha1(void) | ||
| 392 | { | ||
| 393 | return(OPENSSL_ia32cap_P[1]&AESNI_CAPABLE? | ||
| 394 | &aesni_256_cbc_hmac_sha1_cipher:NULL); | ||
| 395 | } | ||
| 396 | #else | ||
| 397 | const EVP_CIPHER *EVP_aes_128_cbc_hmac_sha1(void) | ||
| 398 | { | ||
| 399 | return NULL; | ||
| 400 | } | ||
| 401 | const EVP_CIPHER *EVP_aes_256_cbc_hmac_sha1(void) | ||
| 402 | { | ||
| 403 | return NULL; | ||
| 404 | } | ||
| 405 | #endif | ||
| 406 | #endif | ||
diff --git a/src/lib/libcrypto/evp/e_des3.c b/src/lib/libcrypto/evp/e_des3.c index 3232cfe024..1e69972662 100644 --- a/src/lib/libcrypto/evp/e_des3.c +++ b/src/lib/libcrypto/evp/e_des3.c | |||
| @@ -65,6 +65,8 @@ | |||
| 65 | #include <openssl/des.h> | 65 | #include <openssl/des.h> |
| 66 | #include <openssl/rand.h> | 66 | #include <openssl/rand.h> |
| 67 | 67 | ||
| 68 | #ifndef OPENSSL_FIPS | ||
| 69 | |||
| 68 | static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 70 | static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 69 | const unsigned char *iv,int enc); | 71 | const unsigned char *iv,int enc); |
| 70 | 72 | ||
| @@ -311,3 +313,4 @@ const EVP_CIPHER *EVP_des_ede3(void) | |||
| 311 | return &des_ede3_ecb; | 313 | return &des_ede3_ecb; |
| 312 | } | 314 | } |
| 313 | #endif | 315 | #endif |
| 316 | #endif | ||
diff --git a/src/lib/libcrypto/evp/e_null.c b/src/lib/libcrypto/evp/e_null.c index 7cf50e1416..f0c1f78b5f 100644 --- a/src/lib/libcrypto/evp/e_null.c +++ b/src/lib/libcrypto/evp/e_null.c | |||
| @@ -61,6 +61,8 @@ | |||
| 61 | #include <openssl/evp.h> | 61 | #include <openssl/evp.h> |
| 62 | #include <openssl/objects.h> | 62 | #include <openssl/objects.h> |
| 63 | 63 | ||
| 64 | #ifndef OPENSSL_FIPS | ||
| 65 | |||
| 64 | static int null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 66 | static int null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 65 | const unsigned char *iv,int enc); | 67 | const unsigned char *iv,int enc); |
| 66 | static int null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 68 | static int null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| @@ -99,4 +101,4 @@ static int null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | |||
| 99 | memcpy((char *)out,(const char *)in,inl); | 101 | memcpy((char *)out,(const char *)in,inl); |
| 100 | return 1; | 102 | return 1; |
| 101 | } | 103 | } |
| 102 | 104 | #endif | |
diff --git a/src/lib/libcrypto/evp/e_rc2.c b/src/lib/libcrypto/evp/e_rc2.c index f78d781129..d4c33b58d4 100644 --- a/src/lib/libcrypto/evp/e_rc2.c +++ b/src/lib/libcrypto/evp/e_rc2.c | |||
| @@ -183,7 +183,8 @@ static int rc2_get_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
| 183 | key_bits =rc2_magic_to_meth((int)num); | 183 | key_bits =rc2_magic_to_meth((int)num); |
| 184 | if (!key_bits) | 184 | if (!key_bits) |
| 185 | return(-1); | 185 | return(-1); |
| 186 | if(i > 0) EVP_CipherInit_ex(c, NULL, NULL, NULL, iv, -1); | 186 | if(i > 0 && !EVP_CipherInit_ex(c, NULL, NULL, NULL, iv, -1)) |
| 187 | return -1; | ||
| 187 | EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_RC2_KEY_BITS, key_bits, NULL); | 188 | EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_RC2_KEY_BITS, key_bits, NULL); |
| 188 | EVP_CIPHER_CTX_set_key_length(c, key_bits / 8); | 189 | EVP_CIPHER_CTX_set_key_length(c, key_bits / 8); |
| 189 | } | 190 | } |
diff --git a/src/lib/libcrypto/evp/e_rc4.c b/src/lib/libcrypto/evp/e_rc4.c index 8b5175e0fd..b4f6bda82d 100644 --- a/src/lib/libcrypto/evp/e_rc4.c +++ b/src/lib/libcrypto/evp/e_rc4.c | |||
| @@ -62,6 +62,7 @@ | |||
| 62 | #ifndef OPENSSL_NO_RC4 | 62 | #ifndef OPENSSL_NO_RC4 |
| 63 | 63 | ||
| 64 | #include <openssl/evp.h> | 64 | #include <openssl/evp.h> |
| 65 | #include "evp_locl.h" | ||
| 65 | #include <openssl/objects.h> | 66 | #include <openssl/objects.h> |
| 66 | #include <openssl/rc4.h> | 67 | #include <openssl/rc4.h> |
| 67 | 68 | ||
diff --git a/src/lib/libcrypto/evp/e_rc4_hmac_md5.c b/src/lib/libcrypto/evp/e_rc4_hmac_md5.c new file mode 100644 index 0000000000..56563191ba --- /dev/null +++ b/src/lib/libcrypto/evp/e_rc4_hmac_md5.c | |||
| @@ -0,0 +1,298 @@ | |||
| 1 | /* ==================================================================== | ||
| 2 | * Copyright (c) 2011 The OpenSSL Project. All rights reserved. | ||
| 3 | * | ||
| 4 | * Redistribution and use in source and binary forms, with or without | ||
| 5 | * modification, are permitted provided that the following conditions | ||
| 6 | * are met: | ||
| 7 | * | ||
| 8 | * 1. Redistributions of source code must retain the above copyright | ||
| 9 | * notice, this list of conditions and the following disclaimer. | ||
| 10 | * | ||
| 11 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 12 | * notice, this list of conditions and the following disclaimer in | ||
| 13 | * the documentation and/or other materials provided with the | ||
| 14 | * distribution. | ||
| 15 | * | ||
| 16 | * 3. All advertising materials mentioning features or use of this | ||
| 17 | * software must display the following acknowledgment: | ||
| 18 | * "This product includes software developed by the OpenSSL Project | ||
| 19 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
| 20 | * | ||
| 21 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 22 | * endorse or promote products derived from this software without | ||
| 23 | * prior written permission. For written permission, please contact | ||
| 24 | * licensing@OpenSSL.org. | ||
| 25 | * | ||
| 26 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 27 | * nor may "OpenSSL" appear in their names without prior written | ||
| 28 | * permission of the OpenSSL Project. | ||
| 29 | * | ||
| 30 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 31 | * acknowledgment: | ||
| 32 | * "This product includes software developed by the OpenSSL Project | ||
| 33 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
| 34 | * | ||
| 35 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 36 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 37 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 38 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 39 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 40 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 41 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 42 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 43 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 44 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 45 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 46 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 47 | * ==================================================================== | ||
| 48 | */ | ||
| 49 | |||
| 50 | #include <openssl/opensslconf.h> | ||
| 51 | |||
| 52 | #include <stdio.h> | ||
| 53 | #include <string.h> | ||
| 54 | |||
| 55 | #if !defined(OPENSSL_NO_RC4) && !defined(OPENSSL_NO_MD5) | ||
| 56 | |||
| 57 | #include <openssl/evp.h> | ||
| 58 | #include <openssl/objects.h> | ||
| 59 | #include <openssl/rc4.h> | ||
| 60 | #include <openssl/md5.h> | ||
| 61 | |||
| 62 | #ifndef EVP_CIPH_FLAG_AEAD_CIPHER | ||
| 63 | #define EVP_CIPH_FLAG_AEAD_CIPHER 0x200000 | ||
| 64 | #define EVP_CTRL_AEAD_TLS1_AAD 0x16 | ||
| 65 | #define EVP_CTRL_AEAD_SET_MAC_KEY 0x17 | ||
| 66 | #endif | ||
| 67 | |||
| 68 | /* FIXME: surely this is available elsewhere? */ | ||
| 69 | #define EVP_RC4_KEY_SIZE 16 | ||
| 70 | |||
| 71 | typedef struct | ||
| 72 | { | ||
| 73 | RC4_KEY ks; | ||
| 74 | MD5_CTX head,tail,md; | ||
| 75 | size_t payload_length; | ||
| 76 | } EVP_RC4_HMAC_MD5; | ||
| 77 | |||
| 78 | #define NO_PAYLOAD_LENGTH ((size_t)-1) | ||
| 79 | |||
| 80 | void rc4_md5_enc (RC4_KEY *key, const void *in0, void *out, | ||
| 81 | MD5_CTX *ctx,const void *inp,size_t blocks); | ||
| 82 | |||
| 83 | #define data(ctx) ((EVP_RC4_HMAC_MD5 *)(ctx)->cipher_data) | ||
| 84 | |||
| 85 | static int rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, | ||
| 86 | const unsigned char *inkey, | ||
| 87 | const unsigned char *iv, int enc) | ||
| 88 | { | ||
| 89 | EVP_RC4_HMAC_MD5 *key = data(ctx); | ||
| 90 | |||
| 91 | RC4_set_key(&key->ks,EVP_CIPHER_CTX_key_length(ctx), | ||
| 92 | inkey); | ||
| 93 | |||
| 94 | MD5_Init(&key->head); /* handy when benchmarking */ | ||
| 95 | key->tail = key->head; | ||
| 96 | key->md = key->head; | ||
| 97 | |||
| 98 | key->payload_length = NO_PAYLOAD_LENGTH; | ||
| 99 | |||
| 100 | return 1; | ||
| 101 | } | ||
| 102 | |||
| 103 | #if !defined(OPENSSL_NO_ASM) && ( \ | ||
| 104 | defined(__x86_64) || defined(__x86_64__) || \ | ||
| 105 | defined(_M_AMD64) || defined(_M_X64) || \ | ||
| 106 | defined(__INTEL__) ) && \ | ||
| 107 | !(defined(__APPLE__) && defined(__MACH__)) | ||
| 108 | #define STITCHED_CALL | ||
| 109 | #endif | ||
| 110 | |||
| 111 | #if !defined(STITCHED_CALL) | ||
| 112 | #define rc4_off 0 | ||
| 113 | #define md5_off 0 | ||
| 114 | #endif | ||
| 115 | |||
| 116 | static int rc4_hmac_md5_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
| 117 | const unsigned char *in, size_t len) | ||
| 118 | { | ||
| 119 | EVP_RC4_HMAC_MD5 *key = data(ctx); | ||
| 120 | #if defined(STITCHED_CALL) | ||
| 121 | size_t rc4_off = 32-1-(key->ks.x&(32-1)), /* 32 is $MOD from rc4_md5-x86_64.pl */ | ||
| 122 | md5_off = MD5_CBLOCK-key->md.num, | ||
| 123 | blocks; | ||
| 124 | unsigned int l; | ||
| 125 | extern unsigned int OPENSSL_ia32cap_P[]; | ||
| 126 | #endif | ||
| 127 | size_t plen = key->payload_length; | ||
| 128 | |||
| 129 | if (plen!=NO_PAYLOAD_LENGTH && len!=(plen+MD5_DIGEST_LENGTH)) return 0; | ||
| 130 | |||
| 131 | if (ctx->encrypt) { | ||
| 132 | if (plen==NO_PAYLOAD_LENGTH) plen = len; | ||
| 133 | #if defined(STITCHED_CALL) | ||
| 134 | /* cipher has to "fall behind" */ | ||
| 135 | if (rc4_off>md5_off) md5_off+=MD5_CBLOCK; | ||
| 136 | |||
| 137 | if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK) && | ||
| 138 | (OPENSSL_ia32cap_P[0]&(1<<20))==0) { | ||
| 139 | MD5_Update(&key->md,in,md5_off); | ||
| 140 | RC4(&key->ks,rc4_off,in,out); | ||
| 141 | |||
| 142 | rc4_md5_enc(&key->ks,in+rc4_off,out+rc4_off, | ||
| 143 | &key->md,in+md5_off,blocks); | ||
| 144 | blocks *= MD5_CBLOCK; | ||
| 145 | rc4_off += blocks; | ||
| 146 | md5_off += blocks; | ||
| 147 | key->md.Nh += blocks>>29; | ||
| 148 | key->md.Nl += blocks<<=3; | ||
| 149 | if (key->md.Nl<(unsigned int)blocks) key->md.Nh++; | ||
| 150 | } else { | ||
| 151 | rc4_off = 0; | ||
| 152 | md5_off = 0; | ||
| 153 | } | ||
| 154 | #endif | ||
| 155 | MD5_Update(&key->md,in+md5_off,plen-md5_off); | ||
| 156 | |||
| 157 | if (plen!=len) { /* "TLS" mode of operation */ | ||
| 158 | if (in!=out) | ||
| 159 | memcpy(out+rc4_off,in+rc4_off,plen-rc4_off); | ||
| 160 | |||
| 161 | /* calculate HMAC and append it to payload */ | ||
| 162 | MD5_Final(out+plen,&key->md); | ||
| 163 | key->md = key->tail; | ||
| 164 | MD5_Update(&key->md,out+plen,MD5_DIGEST_LENGTH); | ||
| 165 | MD5_Final(out+plen,&key->md); | ||
| 166 | /* encrypt HMAC at once */ | ||
| 167 | RC4(&key->ks,len-rc4_off,out+rc4_off,out+rc4_off); | ||
| 168 | } else { | ||
| 169 | RC4(&key->ks,len-rc4_off,in+rc4_off,out+rc4_off); | ||
| 170 | } | ||
| 171 | } else { | ||
| 172 | unsigned char mac[MD5_DIGEST_LENGTH]; | ||
| 173 | #if defined(STITCHED_CALL) | ||
| 174 | /* digest has to "fall behind" */ | ||
| 175 | if (md5_off>rc4_off) rc4_off += 2*MD5_CBLOCK; | ||
| 176 | else rc4_off += MD5_CBLOCK; | ||
| 177 | |||
| 178 | if (len>rc4_off && (blocks=(len-rc4_off)/MD5_CBLOCK) && | ||
| 179 | (OPENSSL_ia32cap_P[0]&(1<<20))==0) { | ||
| 180 | RC4(&key->ks,rc4_off,in,out); | ||
| 181 | MD5_Update(&key->md,out,md5_off); | ||
| 182 | |||
| 183 | rc4_md5_enc(&key->ks,in+rc4_off,out+rc4_off, | ||
| 184 | &key->md,out+md5_off,blocks); | ||
| 185 | blocks *= MD5_CBLOCK; | ||
| 186 | rc4_off += blocks; | ||
| 187 | md5_off += blocks; | ||
| 188 | l = (key->md.Nl+(blocks<<3))&0xffffffffU; | ||
| 189 | if (l<key->md.Nl) key->md.Nh++; | ||
| 190 | key->md.Nl = l; | ||
| 191 | key->md.Nh += blocks>>29; | ||
| 192 | } else { | ||
| 193 | md5_off=0; | ||
| 194 | rc4_off=0; | ||
| 195 | } | ||
| 196 | #endif | ||
| 197 | /* decrypt HMAC at once */ | ||
| 198 | RC4(&key->ks,len-rc4_off,in+rc4_off,out+rc4_off); | ||
| 199 | if (plen!=NO_PAYLOAD_LENGTH) { /* "TLS" mode of operation */ | ||
| 200 | MD5_Update(&key->md,out+md5_off,plen-md5_off); | ||
| 201 | |||
| 202 | /* calculate HMAC and verify it */ | ||
| 203 | MD5_Final(mac,&key->md); | ||
| 204 | key->md = key->tail; | ||
| 205 | MD5_Update(&key->md,mac,MD5_DIGEST_LENGTH); | ||
| 206 | MD5_Final(mac,&key->md); | ||
| 207 | |||
| 208 | if (memcmp(out+plen,mac,MD5_DIGEST_LENGTH)) | ||
| 209 | return 0; | ||
| 210 | } else { | ||
| 211 | MD5_Update(&key->md,out+md5_off,len-md5_off); | ||
| 212 | } | ||
| 213 | } | ||
| 214 | |||
| 215 | key->payload_length = NO_PAYLOAD_LENGTH; | ||
| 216 | |||
| 217 | return 1; | ||
| 218 | } | ||
| 219 | |||
| 220 | static int rc4_hmac_md5_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | ||
| 221 | { | ||
| 222 | EVP_RC4_HMAC_MD5 *key = data(ctx); | ||
| 223 | |||
| 224 | switch (type) | ||
| 225 | { | ||
| 226 | case EVP_CTRL_AEAD_SET_MAC_KEY: | ||
| 227 | { | ||
| 228 | unsigned int i; | ||
| 229 | unsigned char hmac_key[64]; | ||
| 230 | |||
| 231 | memset (hmac_key,0,sizeof(hmac_key)); | ||
| 232 | |||
| 233 | if (arg > (int)sizeof(hmac_key)) { | ||
| 234 | MD5_Init(&key->head); | ||
| 235 | MD5_Update(&key->head,ptr,arg); | ||
| 236 | MD5_Final(hmac_key,&key->head); | ||
| 237 | } else { | ||
| 238 | memcpy(hmac_key,ptr,arg); | ||
| 239 | } | ||
| 240 | |||
| 241 | for (i=0;i<sizeof(hmac_key);i++) | ||
| 242 | hmac_key[i] ^= 0x36; /* ipad */ | ||
| 243 | MD5_Init(&key->head); | ||
| 244 | MD5_Update(&key->head,hmac_key,sizeof(hmac_key)); | ||
| 245 | |||
| 246 | for (i=0;i<sizeof(hmac_key);i++) | ||
| 247 | hmac_key[i] ^= 0x36^0x5c; /* opad */ | ||
| 248 | MD5_Init(&key->tail); | ||
| 249 | MD5_Update(&key->tail,hmac_key,sizeof(hmac_key)); | ||
| 250 | |||
| 251 | return 1; | ||
| 252 | } | ||
| 253 | case EVP_CTRL_AEAD_TLS1_AAD: | ||
| 254 | { | ||
| 255 | unsigned char *p=ptr; | ||
| 256 | unsigned int len=p[arg-2]<<8|p[arg-1]; | ||
| 257 | |||
| 258 | if (!ctx->encrypt) | ||
| 259 | { | ||
| 260 | len -= MD5_DIGEST_LENGTH; | ||
| 261 | p[arg-2] = len>>8; | ||
| 262 | p[arg-1] = len; | ||
| 263 | } | ||
| 264 | key->payload_length=len; | ||
| 265 | key->md = key->head; | ||
| 266 | MD5_Update(&key->md,p,arg); | ||
| 267 | |||
| 268 | return MD5_DIGEST_LENGTH; | ||
| 269 | } | ||
| 270 | default: | ||
| 271 | return -1; | ||
| 272 | } | ||
| 273 | } | ||
| 274 | |||
| 275 | static EVP_CIPHER r4_hmac_md5_cipher= | ||
| 276 | { | ||
| 277 | #ifdef NID_rc4_hmac_md5 | ||
| 278 | NID_rc4_hmac_md5, | ||
| 279 | #else | ||
| 280 | NID_undef, | ||
| 281 | #endif | ||
| 282 | 1,EVP_RC4_KEY_SIZE,0, | ||
| 283 | EVP_CIPH_STREAM_CIPHER|EVP_CIPH_VARIABLE_LENGTH|EVP_CIPH_FLAG_AEAD_CIPHER, | ||
| 284 | rc4_hmac_md5_init_key, | ||
| 285 | rc4_hmac_md5_cipher, | ||
| 286 | NULL, | ||
| 287 | sizeof(EVP_RC4_HMAC_MD5), | ||
| 288 | NULL, | ||
| 289 | NULL, | ||
| 290 | rc4_hmac_md5_ctrl, | ||
| 291 | NULL | ||
| 292 | }; | ||
| 293 | |||
| 294 | const EVP_CIPHER *EVP_rc4_hmac_md5(void) | ||
| 295 | { | ||
| 296 | return(&r4_hmac_md5_cipher); | ||
| 297 | } | ||
| 298 | #endif | ||
diff --git a/src/lib/libcrypto/evp/evp.h b/src/lib/libcrypto/evp/evp.h index 9f9795e2d9..0d1b20a7d3 100644 --- a/src/lib/libcrypto/evp/evp.h +++ b/src/lib/libcrypto/evp/evp.h | |||
| @@ -83,7 +83,7 @@ | |||
| 83 | #define EVP_RC5_32_12_16_KEY_SIZE 16 | 83 | #define EVP_RC5_32_12_16_KEY_SIZE 16 |
| 84 | */ | 84 | */ |
| 85 | #define EVP_MAX_MD_SIZE 64 /* longest known is SHA512 */ | 85 | #define EVP_MAX_MD_SIZE 64 /* longest known is SHA512 */ |
| 86 | #define EVP_MAX_KEY_LENGTH 32 | 86 | #define EVP_MAX_KEY_LENGTH 64 |
| 87 | #define EVP_MAX_IV_LENGTH 16 | 87 | #define EVP_MAX_IV_LENGTH 16 |
| 88 | #define EVP_MAX_BLOCK_LENGTH 32 | 88 | #define EVP_MAX_BLOCK_LENGTH 32 |
| 89 | 89 | ||
| @@ -116,6 +116,7 @@ | |||
| 116 | #define EVP_PKEY_DH NID_dhKeyAgreement | 116 | #define EVP_PKEY_DH NID_dhKeyAgreement |
| 117 | #define EVP_PKEY_EC NID_X9_62_id_ecPublicKey | 117 | #define EVP_PKEY_EC NID_X9_62_id_ecPublicKey |
| 118 | #define EVP_PKEY_HMAC NID_hmac | 118 | #define EVP_PKEY_HMAC NID_hmac |
| 119 | #define EVP_PKEY_CMAC NID_cmac | ||
| 119 | 120 | ||
| 120 | #ifdef __cplusplus | 121 | #ifdef __cplusplus |
| 121 | extern "C" { | 122 | extern "C" { |
| @@ -216,6 +217,8 @@ typedef int evp_verify_method(int type,const unsigned char *m, | |||
| 216 | 217 | ||
| 217 | #define EVP_MD_FLAG_DIGALGID_CUSTOM 0x0018 | 218 | #define EVP_MD_FLAG_DIGALGID_CUSTOM 0x0018 |
| 218 | 219 | ||
| 220 | #define EVP_MD_FLAG_FIPS 0x0400 /* Note if suitable for use in FIPS mode */ | ||
| 221 | |||
| 219 | /* Digest ctrls */ | 222 | /* Digest ctrls */ |
| 220 | 223 | ||
| 221 | #define EVP_MD_CTRL_DIGALGID 0x1 | 224 | #define EVP_MD_CTRL_DIGALGID 0x1 |
| @@ -325,6 +328,10 @@ struct evp_cipher_st | |||
| 325 | #define EVP_CIPH_CBC_MODE 0x2 | 328 | #define EVP_CIPH_CBC_MODE 0x2 |
| 326 | #define EVP_CIPH_CFB_MODE 0x3 | 329 | #define EVP_CIPH_CFB_MODE 0x3 |
| 327 | #define EVP_CIPH_OFB_MODE 0x4 | 330 | #define EVP_CIPH_OFB_MODE 0x4 |
| 331 | #define EVP_CIPH_CTR_MODE 0x5 | ||
| 332 | #define EVP_CIPH_GCM_MODE 0x6 | ||
| 333 | #define EVP_CIPH_CCM_MODE 0x7 | ||
| 334 | #define EVP_CIPH_XTS_MODE 0x10001 | ||
| 328 | #define EVP_CIPH_MODE 0xF0007 | 335 | #define EVP_CIPH_MODE 0xF0007 |
| 329 | /* Set if variable length cipher */ | 336 | /* Set if variable length cipher */ |
| 330 | #define EVP_CIPH_VARIABLE_LENGTH 0x8 | 337 | #define EVP_CIPH_VARIABLE_LENGTH 0x8 |
| @@ -346,6 +353,15 @@ struct evp_cipher_st | |||
| 346 | #define EVP_CIPH_FLAG_DEFAULT_ASN1 0x1000 | 353 | #define EVP_CIPH_FLAG_DEFAULT_ASN1 0x1000 |
| 347 | /* Buffer length in bits not bytes: CFB1 mode only */ | 354 | /* Buffer length in bits not bytes: CFB1 mode only */ |
| 348 | #define EVP_CIPH_FLAG_LENGTH_BITS 0x2000 | 355 | #define EVP_CIPH_FLAG_LENGTH_BITS 0x2000 |
| 356 | /* Note if suitable for use in FIPS mode */ | ||
| 357 | #define EVP_CIPH_FLAG_FIPS 0x4000 | ||
| 358 | /* Allow non FIPS cipher in FIPS mode */ | ||
| 359 | #define EVP_CIPH_FLAG_NON_FIPS_ALLOW 0x8000 | ||
| 360 | /* Cipher handles any and all padding logic as well | ||
| 361 | * as finalisation. | ||
| 362 | */ | ||
| 363 | #define EVP_CIPH_FLAG_CUSTOM_CIPHER 0x100000 | ||
| 364 | #define EVP_CIPH_FLAG_AEAD_CIPHER 0x200000 | ||
| 349 | 365 | ||
| 350 | /* ctrl() values */ | 366 | /* ctrl() values */ |
| 351 | 367 | ||
| @@ -358,6 +374,34 @@ struct evp_cipher_st | |||
| 358 | #define EVP_CTRL_RAND_KEY 0x6 | 374 | #define EVP_CTRL_RAND_KEY 0x6 |
| 359 | #define EVP_CTRL_PBE_PRF_NID 0x7 | 375 | #define EVP_CTRL_PBE_PRF_NID 0x7 |
| 360 | #define EVP_CTRL_COPY 0x8 | 376 | #define EVP_CTRL_COPY 0x8 |
| 377 | #define EVP_CTRL_GCM_SET_IVLEN 0x9 | ||
| 378 | #define EVP_CTRL_GCM_GET_TAG 0x10 | ||
| 379 | #define EVP_CTRL_GCM_SET_TAG 0x11 | ||
| 380 | #define EVP_CTRL_GCM_SET_IV_FIXED 0x12 | ||
| 381 | #define EVP_CTRL_GCM_IV_GEN 0x13 | ||
| 382 | #define EVP_CTRL_CCM_SET_IVLEN EVP_CTRL_GCM_SET_IVLEN | ||
| 383 | #define EVP_CTRL_CCM_GET_TAG EVP_CTRL_GCM_GET_TAG | ||
| 384 | #define EVP_CTRL_CCM_SET_TAG EVP_CTRL_GCM_SET_TAG | ||
| 385 | #define EVP_CTRL_CCM_SET_L 0x14 | ||
| 386 | #define EVP_CTRL_CCM_SET_MSGLEN 0x15 | ||
| 387 | /* AEAD cipher deduces payload length and returns number of bytes | ||
| 388 | * required to store MAC and eventual padding. Subsequent call to | ||
| 389 | * EVP_Cipher even appends/verifies MAC. | ||
| 390 | */ | ||
| 391 | #define EVP_CTRL_AEAD_TLS1_AAD 0x16 | ||
| 392 | /* Used by composite AEAD ciphers, no-op in GCM, CCM... */ | ||
| 393 | #define EVP_CTRL_AEAD_SET_MAC_KEY 0x17 | ||
| 394 | /* Set the GCM invocation field, decrypt only */ | ||
| 395 | #define EVP_CTRL_GCM_SET_IV_INV 0x18 | ||
| 396 | |||
| 397 | /* GCM TLS constants */ | ||
| 398 | /* Length of fixed part of IV derived from PRF */ | ||
| 399 | #define EVP_GCM_TLS_FIXED_IV_LEN 4 | ||
| 400 | /* Length of explicit part of IV part of TLS records */ | ||
| 401 | #define EVP_GCM_TLS_EXPLICIT_IV_LEN 8 | ||
| 402 | /* Length of tag for TLS */ | ||
| 403 | #define EVP_GCM_TLS_TAG_LEN 16 | ||
| 404 | |||
| 361 | 405 | ||
| 362 | typedef struct evp_cipher_info_st | 406 | typedef struct evp_cipher_info_st |
| 363 | { | 407 | { |
| @@ -375,7 +419,7 @@ struct evp_cipher_ctx_st | |||
| 375 | unsigned char oiv[EVP_MAX_IV_LENGTH]; /* original iv */ | 419 | unsigned char oiv[EVP_MAX_IV_LENGTH]; /* original iv */ |
| 376 | unsigned char iv[EVP_MAX_IV_LENGTH]; /* working iv */ | 420 | unsigned char iv[EVP_MAX_IV_LENGTH]; /* working iv */ |
| 377 | unsigned char buf[EVP_MAX_BLOCK_LENGTH];/* saved partial block */ | 421 | unsigned char buf[EVP_MAX_BLOCK_LENGTH];/* saved partial block */ |
| 378 | int num; /* used by cfb/ofb mode */ | 422 | int num; /* used by cfb/ofb/ctr mode */ |
| 379 | 423 | ||
| 380 | void *app_data; /* application stuff */ | 424 | void *app_data; /* application stuff */ |
| 381 | int key_len; /* May change for variable length cipher */ | 425 | int key_len; /* May change for variable length cipher */ |
| @@ -695,6 +739,9 @@ const EVP_MD *EVP_dev_crypto_md5(void); | |||
| 695 | #ifndef OPENSSL_NO_RC4 | 739 | #ifndef OPENSSL_NO_RC4 |
| 696 | const EVP_CIPHER *EVP_rc4(void); | 740 | const EVP_CIPHER *EVP_rc4(void); |
| 697 | const EVP_CIPHER *EVP_rc4_40(void); | 741 | const EVP_CIPHER *EVP_rc4_40(void); |
| 742 | #ifndef OPENSSL_NO_MD5 | ||
| 743 | const EVP_CIPHER *EVP_rc4_hmac_md5(void); | ||
| 744 | #endif | ||
| 698 | #endif | 745 | #endif |
| 699 | #ifndef OPENSSL_NO_IDEA | 746 | #ifndef OPENSSL_NO_IDEA |
| 700 | const EVP_CIPHER *EVP_idea_ecb(void); | 747 | const EVP_CIPHER *EVP_idea_ecb(void); |
| @@ -741,9 +788,10 @@ const EVP_CIPHER *EVP_aes_128_cfb8(void); | |||
| 741 | const EVP_CIPHER *EVP_aes_128_cfb128(void); | 788 | const EVP_CIPHER *EVP_aes_128_cfb128(void); |
| 742 | # define EVP_aes_128_cfb EVP_aes_128_cfb128 | 789 | # define EVP_aes_128_cfb EVP_aes_128_cfb128 |
| 743 | const EVP_CIPHER *EVP_aes_128_ofb(void); | 790 | const EVP_CIPHER *EVP_aes_128_ofb(void); |
| 744 | #if 0 | ||
| 745 | const EVP_CIPHER *EVP_aes_128_ctr(void); | 791 | const EVP_CIPHER *EVP_aes_128_ctr(void); |
| 746 | #endif | 792 | const EVP_CIPHER *EVP_aes_128_gcm(void); |
| 793 | const EVP_CIPHER *EVP_aes_128_ccm(void); | ||
| 794 | const EVP_CIPHER *EVP_aes_128_xts(void); | ||
| 747 | const EVP_CIPHER *EVP_aes_192_ecb(void); | 795 | const EVP_CIPHER *EVP_aes_192_ecb(void); |
| 748 | const EVP_CIPHER *EVP_aes_192_cbc(void); | 796 | const EVP_CIPHER *EVP_aes_192_cbc(void); |
| 749 | const EVP_CIPHER *EVP_aes_192_cfb1(void); | 797 | const EVP_CIPHER *EVP_aes_192_cfb1(void); |
| @@ -751,9 +799,9 @@ const EVP_CIPHER *EVP_aes_192_cfb8(void); | |||
| 751 | const EVP_CIPHER *EVP_aes_192_cfb128(void); | 799 | const EVP_CIPHER *EVP_aes_192_cfb128(void); |
| 752 | # define EVP_aes_192_cfb EVP_aes_192_cfb128 | 800 | # define EVP_aes_192_cfb EVP_aes_192_cfb128 |
| 753 | const EVP_CIPHER *EVP_aes_192_ofb(void); | 801 | const EVP_CIPHER *EVP_aes_192_ofb(void); |
| 754 | #if 0 | ||
| 755 | const EVP_CIPHER *EVP_aes_192_ctr(void); | 802 | const EVP_CIPHER *EVP_aes_192_ctr(void); |
| 756 | #endif | 803 | const EVP_CIPHER *EVP_aes_192_gcm(void); |
| 804 | const EVP_CIPHER *EVP_aes_192_ccm(void); | ||
| 757 | const EVP_CIPHER *EVP_aes_256_ecb(void); | 805 | const EVP_CIPHER *EVP_aes_256_ecb(void); |
| 758 | const EVP_CIPHER *EVP_aes_256_cbc(void); | 806 | const EVP_CIPHER *EVP_aes_256_cbc(void); |
| 759 | const EVP_CIPHER *EVP_aes_256_cfb1(void); | 807 | const EVP_CIPHER *EVP_aes_256_cfb1(void); |
| @@ -761,8 +809,13 @@ const EVP_CIPHER *EVP_aes_256_cfb8(void); | |||
| 761 | const EVP_CIPHER *EVP_aes_256_cfb128(void); | 809 | const EVP_CIPHER *EVP_aes_256_cfb128(void); |
| 762 | # define EVP_aes_256_cfb EVP_aes_256_cfb128 | 810 | # define EVP_aes_256_cfb EVP_aes_256_cfb128 |
| 763 | const EVP_CIPHER *EVP_aes_256_ofb(void); | 811 | const EVP_CIPHER *EVP_aes_256_ofb(void); |
| 764 | #if 0 | ||
| 765 | const EVP_CIPHER *EVP_aes_256_ctr(void); | 812 | const EVP_CIPHER *EVP_aes_256_ctr(void); |
| 813 | const EVP_CIPHER *EVP_aes_256_gcm(void); | ||
| 814 | const EVP_CIPHER *EVP_aes_256_ccm(void); | ||
| 815 | const EVP_CIPHER *EVP_aes_256_xts(void); | ||
| 816 | #if !defined(OPENSSL_NO_SHA) && !defined(OPENSSL_NO_SHA1) | ||
| 817 | const EVP_CIPHER *EVP_aes_128_cbc_hmac_sha1(void); | ||
| 818 | const EVP_CIPHER *EVP_aes_256_cbc_hmac_sha1(void); | ||
| 766 | #endif | 819 | #endif |
| 767 | #endif | 820 | #endif |
| 768 | #ifndef OPENSSL_NO_CAMELLIA | 821 | #ifndef OPENSSL_NO_CAMELLIA |
| @@ -1047,13 +1100,22 @@ void EVP_PKEY_asn1_set_ctrl(EVP_PKEY_ASN1_METHOD *ameth, | |||
| 1047 | #define EVP_PKEY_CTRL_CMS_DECRYPT 10 | 1100 | #define EVP_PKEY_CTRL_CMS_DECRYPT 10 |
| 1048 | #define EVP_PKEY_CTRL_CMS_SIGN 11 | 1101 | #define EVP_PKEY_CTRL_CMS_SIGN 11 |
| 1049 | 1102 | ||
| 1103 | #define EVP_PKEY_CTRL_CIPHER 12 | ||
| 1104 | |||
| 1050 | #define EVP_PKEY_ALG_CTRL 0x1000 | 1105 | #define EVP_PKEY_ALG_CTRL 0x1000 |
| 1051 | 1106 | ||
| 1052 | 1107 | ||
| 1053 | #define EVP_PKEY_FLAG_AUTOARGLEN 2 | 1108 | #define EVP_PKEY_FLAG_AUTOARGLEN 2 |
| 1109 | /* Method handles all operations: don't assume any digest related | ||
| 1110 | * defaults. | ||
| 1111 | */ | ||
| 1112 | #define EVP_PKEY_FLAG_SIGCTX_CUSTOM 4 | ||
| 1054 | 1113 | ||
| 1055 | const EVP_PKEY_METHOD *EVP_PKEY_meth_find(int type); | 1114 | const EVP_PKEY_METHOD *EVP_PKEY_meth_find(int type); |
| 1056 | EVP_PKEY_METHOD* EVP_PKEY_meth_new(int id, int flags); | 1115 | EVP_PKEY_METHOD* EVP_PKEY_meth_new(int id, int flags); |
| 1116 | void EVP_PKEY_meth_get0_info(int *ppkey_id, int *pflags, | ||
| 1117 | const EVP_PKEY_METHOD *meth); | ||
| 1118 | void EVP_PKEY_meth_copy(EVP_PKEY_METHOD *dst, const EVP_PKEY_METHOD *src); | ||
| 1057 | void EVP_PKEY_meth_free(EVP_PKEY_METHOD *pmeth); | 1119 | void EVP_PKEY_meth_free(EVP_PKEY_METHOD *pmeth); |
| 1058 | int EVP_PKEY_meth_add0(const EVP_PKEY_METHOD *pmeth); | 1120 | int EVP_PKEY_meth_add0(const EVP_PKEY_METHOD *pmeth); |
| 1059 | 1121 | ||
| @@ -1071,7 +1133,7 @@ int EVP_PKEY_CTX_get_operation(EVP_PKEY_CTX *ctx); | |||
| 1071 | void EVP_PKEY_CTX_set0_keygen_info(EVP_PKEY_CTX *ctx, int *dat, int datlen); | 1133 | void EVP_PKEY_CTX_set0_keygen_info(EVP_PKEY_CTX *ctx, int *dat, int datlen); |
| 1072 | 1134 | ||
| 1073 | EVP_PKEY *EVP_PKEY_new_mac_key(int type, ENGINE *e, | 1135 | EVP_PKEY *EVP_PKEY_new_mac_key(int type, ENGINE *e, |
| 1074 | unsigned char *key, int keylen); | 1136 | const unsigned char *key, int keylen); |
| 1075 | 1137 | ||
| 1076 | void EVP_PKEY_CTX_set_data(EVP_PKEY_CTX *ctx, void *data); | 1138 | void EVP_PKEY_CTX_set_data(EVP_PKEY_CTX *ctx, void *data); |
| 1077 | void *EVP_PKEY_CTX_get_data(EVP_PKEY_CTX *ctx); | 1139 | void *EVP_PKEY_CTX_get_data(EVP_PKEY_CTX *ctx); |
| @@ -1190,8 +1252,13 @@ void ERR_load_EVP_strings(void); | |||
| 1190 | /* Error codes for the EVP functions. */ | 1252 | /* Error codes for the EVP functions. */ |
| 1191 | 1253 | ||
| 1192 | /* Function codes. */ | 1254 | /* Function codes. */ |
| 1255 | #define EVP_F_AESNI_INIT_KEY 165 | ||
| 1256 | #define EVP_F_AESNI_XTS_CIPHER 176 | ||
| 1193 | #define EVP_F_AES_INIT_KEY 133 | 1257 | #define EVP_F_AES_INIT_KEY 133 |
| 1258 | #define EVP_F_AES_XTS 172 | ||
| 1259 | #define EVP_F_AES_XTS_CIPHER 175 | ||
| 1194 | #define EVP_F_CAMELLIA_INIT_KEY 159 | 1260 | #define EVP_F_CAMELLIA_INIT_KEY 159 |
| 1261 | #define EVP_F_CMAC_INIT 173 | ||
| 1195 | #define EVP_F_D2I_PKEY 100 | 1262 | #define EVP_F_D2I_PKEY 100 |
| 1196 | #define EVP_F_DO_SIGVER_INIT 161 | 1263 | #define EVP_F_DO_SIGVER_INIT 161 |
| 1197 | #define EVP_F_DSAPKEY2PKCS8 134 | 1264 | #define EVP_F_DSAPKEY2PKCS8 134 |
| @@ -1246,15 +1313,24 @@ void ERR_load_EVP_strings(void); | |||
| 1246 | #define EVP_F_EVP_RIJNDAEL 126 | 1313 | #define EVP_F_EVP_RIJNDAEL 126 |
| 1247 | #define EVP_F_EVP_SIGNFINAL 107 | 1314 | #define EVP_F_EVP_SIGNFINAL 107 |
| 1248 | #define EVP_F_EVP_VERIFYFINAL 108 | 1315 | #define EVP_F_EVP_VERIFYFINAL 108 |
| 1316 | #define EVP_F_FIPS_CIPHERINIT 166 | ||
| 1317 | #define EVP_F_FIPS_CIPHER_CTX_COPY 170 | ||
| 1318 | #define EVP_F_FIPS_CIPHER_CTX_CTRL 167 | ||
| 1319 | #define EVP_F_FIPS_CIPHER_CTX_SET_KEY_LENGTH 171 | ||
| 1320 | #define EVP_F_FIPS_DIGESTINIT 168 | ||
| 1321 | #define EVP_F_FIPS_MD_CTX_COPY 169 | ||
| 1322 | #define EVP_F_HMAC_INIT_EX 174 | ||
| 1249 | #define EVP_F_INT_CTX_NEW 157 | 1323 | #define EVP_F_INT_CTX_NEW 157 |
| 1250 | #define EVP_F_PKCS5_PBE_KEYIVGEN 117 | 1324 | #define EVP_F_PKCS5_PBE_KEYIVGEN 117 |
| 1251 | #define EVP_F_PKCS5_V2_PBE_KEYIVGEN 118 | 1325 | #define EVP_F_PKCS5_V2_PBE_KEYIVGEN 118 |
| 1326 | #define EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN 164 | ||
| 1252 | #define EVP_F_PKCS8_SET_BROKEN 112 | 1327 | #define EVP_F_PKCS8_SET_BROKEN 112 |
| 1253 | #define EVP_F_PKEY_SET_TYPE 158 | 1328 | #define EVP_F_PKEY_SET_TYPE 158 |
| 1254 | #define EVP_F_RC2_MAGIC_TO_METH 109 | 1329 | #define EVP_F_RC2_MAGIC_TO_METH 109 |
| 1255 | #define EVP_F_RC5_CTRL 125 | 1330 | #define EVP_F_RC5_CTRL 125 |
| 1256 | 1331 | ||
| 1257 | /* Reason codes. */ | 1332 | /* Reason codes. */ |
| 1333 | #define EVP_R_AES_IV_SETUP_FAILED 162 | ||
| 1258 | #define EVP_R_AES_KEY_SETUP_FAILED 143 | 1334 | #define EVP_R_AES_KEY_SETUP_FAILED 143 |
| 1259 | #define EVP_R_ASN1_LIB 140 | 1335 | #define EVP_R_ASN1_LIB 140 |
| 1260 | #define EVP_R_BAD_BLOCK_LENGTH 136 | 1336 | #define EVP_R_BAD_BLOCK_LENGTH 136 |
| @@ -1272,6 +1348,7 @@ void ERR_load_EVP_strings(void); | |||
| 1272 | #define EVP_R_DECODE_ERROR 114 | 1348 | #define EVP_R_DECODE_ERROR 114 |
| 1273 | #define EVP_R_DIFFERENT_KEY_TYPES 101 | 1349 | #define EVP_R_DIFFERENT_KEY_TYPES 101 |
| 1274 | #define EVP_R_DIFFERENT_PARAMETERS 153 | 1350 | #define EVP_R_DIFFERENT_PARAMETERS 153 |
| 1351 | #define EVP_R_DISABLED_FOR_FIPS 163 | ||
| 1275 | #define EVP_R_ENCODE_ERROR 115 | 1352 | #define EVP_R_ENCODE_ERROR 115 |
| 1276 | #define EVP_R_EVP_PBE_CIPHERINIT_ERROR 119 | 1353 | #define EVP_R_EVP_PBE_CIPHERINIT_ERROR 119 |
| 1277 | #define EVP_R_EXPECTING_AN_RSA_KEY 127 | 1354 | #define EVP_R_EXPECTING_AN_RSA_KEY 127 |
| @@ -1303,6 +1380,7 @@ void ERR_load_EVP_strings(void); | |||
| 1303 | #define EVP_R_PRIVATE_KEY_DECODE_ERROR 145 | 1380 | #define EVP_R_PRIVATE_KEY_DECODE_ERROR 145 |
| 1304 | #define EVP_R_PRIVATE_KEY_ENCODE_ERROR 146 | 1381 | #define EVP_R_PRIVATE_KEY_ENCODE_ERROR 146 |
| 1305 | #define EVP_R_PUBLIC_KEY_NOT_RSA 106 | 1382 | #define EVP_R_PUBLIC_KEY_NOT_RSA 106 |
| 1383 | #define EVP_R_TOO_LARGE 164 | ||
| 1306 | #define EVP_R_UNKNOWN_CIPHER 160 | 1384 | #define EVP_R_UNKNOWN_CIPHER 160 |
| 1307 | #define EVP_R_UNKNOWN_DIGEST 161 | 1385 | #define EVP_R_UNKNOWN_DIGEST 161 |
| 1308 | #define EVP_R_UNKNOWN_PBE_ALGORITHM 121 | 1386 | #define EVP_R_UNKNOWN_PBE_ALGORITHM 121 |
diff --git a/src/lib/libcrypto/evp/evp_enc.c b/src/lib/libcrypto/evp/evp_enc.c index c268d25cb4..0c54f05e6e 100644 --- a/src/lib/libcrypto/evp/evp_enc.c +++ b/src/lib/libcrypto/evp/evp_enc.c | |||
| @@ -64,8 +64,18 @@ | |||
| 64 | #ifndef OPENSSL_NO_ENGINE | 64 | #ifndef OPENSSL_NO_ENGINE |
| 65 | #include <openssl/engine.h> | 65 | #include <openssl/engine.h> |
| 66 | #endif | 66 | #endif |
| 67 | #ifdef OPENSSL_FIPS | ||
| 68 | #include <openssl/fips.h> | ||
| 69 | #endif | ||
| 67 | #include "evp_locl.h" | 70 | #include "evp_locl.h" |
| 68 | 71 | ||
| 72 | #ifdef OPENSSL_FIPS | ||
| 73 | #define M_do_cipher(ctx, out, in, inl) FIPS_cipher(ctx, out, in, inl) | ||
| 74 | #else | ||
| 75 | #define M_do_cipher(ctx, out, in, inl) ctx->cipher->do_cipher(ctx, out, in, inl) | ||
| 76 | #endif | ||
| 77 | |||
| 78 | |||
| 69 | const char EVP_version[]="EVP" OPENSSL_VERSION_PTEXT; | 79 | const char EVP_version[]="EVP" OPENSSL_VERSION_PTEXT; |
| 70 | 80 | ||
| 71 | void EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *ctx) | 81 | void EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *ctx) |
| @@ -115,10 +125,14 @@ int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *imp | |||
| 115 | /* Ensure a context left lying around from last time is cleared | 125 | /* Ensure a context left lying around from last time is cleared |
| 116 | * (the previous check attempted to avoid this if the same | 126 | * (the previous check attempted to avoid this if the same |
| 117 | * ENGINE and EVP_CIPHER could be used). */ | 127 | * ENGINE and EVP_CIPHER could be used). */ |
| 118 | EVP_CIPHER_CTX_cleanup(ctx); | 128 | if (ctx->cipher) |
| 119 | 129 | { | |
| 120 | /* Restore encrypt field: it is zeroed by cleanup */ | 130 | unsigned long flags = ctx->flags; |
| 121 | ctx->encrypt = enc; | 131 | EVP_CIPHER_CTX_cleanup(ctx); |
| 132 | /* Restore encrypt and flags */ | ||
| 133 | ctx->encrypt = enc; | ||
| 134 | ctx->flags = flags; | ||
| 135 | } | ||
| 122 | #ifndef OPENSSL_NO_ENGINE | 136 | #ifndef OPENSSL_NO_ENGINE |
| 123 | if(impl) | 137 | if(impl) |
| 124 | { | 138 | { |
| @@ -155,6 +169,10 @@ int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *imp | |||
| 155 | ctx->engine = NULL; | 169 | ctx->engine = NULL; |
| 156 | #endif | 170 | #endif |
| 157 | 171 | ||
| 172 | #ifdef OPENSSL_FIPS | ||
| 173 | if (FIPS_mode()) | ||
| 174 | return FIPS_cipherinit(ctx, cipher, key, iv, enc); | ||
| 175 | #endif | ||
| 158 | ctx->cipher=cipher; | 176 | ctx->cipher=cipher; |
| 159 | if (ctx->cipher->ctx_size) | 177 | if (ctx->cipher->ctx_size) |
| 160 | { | 178 | { |
| @@ -188,6 +206,10 @@ int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *imp | |||
| 188 | #ifndef OPENSSL_NO_ENGINE | 206 | #ifndef OPENSSL_NO_ENGINE |
| 189 | skip_to_init: | 207 | skip_to_init: |
| 190 | #endif | 208 | #endif |
| 209 | #ifdef OPENSSL_FIPS | ||
| 210 | if (FIPS_mode()) | ||
| 211 | return FIPS_cipherinit(ctx, cipher, key, iv, enc); | ||
| 212 | #endif | ||
| 191 | /* we assume block size is a power of 2 in *cryptUpdate */ | 213 | /* we assume block size is a power of 2 in *cryptUpdate */ |
| 192 | OPENSSL_assert(ctx->cipher->block_size == 1 | 214 | OPENSSL_assert(ctx->cipher->block_size == 1 |
| 193 | || ctx->cipher->block_size == 8 | 215 | || ctx->cipher->block_size == 8 |
| @@ -214,6 +236,13 @@ skip_to_init: | |||
| 214 | memcpy(ctx->iv, ctx->oiv, EVP_CIPHER_CTX_iv_length(ctx)); | 236 | memcpy(ctx->iv, ctx->oiv, EVP_CIPHER_CTX_iv_length(ctx)); |
| 215 | break; | 237 | break; |
| 216 | 238 | ||
| 239 | case EVP_CIPH_CTR_MODE: | ||
| 240 | ctx->num = 0; | ||
| 241 | /* Don't reuse IV for CTR mode */ | ||
| 242 | if(iv) | ||
| 243 | memcpy(ctx->iv, iv, EVP_CIPHER_CTX_iv_length(ctx)); | ||
| 244 | break; | ||
| 245 | |||
| 217 | default: | 246 | default: |
| 218 | return 0; | 247 | return 0; |
| 219 | break; | 248 | break; |
| @@ -280,6 +309,16 @@ int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |||
| 280 | { | 309 | { |
| 281 | int i,j,bl; | 310 | int i,j,bl; |
| 282 | 311 | ||
| 312 | if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) | ||
| 313 | { | ||
| 314 | i = M_do_cipher(ctx, out, in, inl); | ||
| 315 | if (i < 0) | ||
| 316 | return 0; | ||
| 317 | else | ||
| 318 | *outl = i; | ||
| 319 | return 1; | ||
| 320 | } | ||
| 321 | |||
| 283 | if (inl <= 0) | 322 | if (inl <= 0) |
| 284 | { | 323 | { |
| 285 | *outl = 0; | 324 | *outl = 0; |
| @@ -288,7 +327,7 @@ int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |||
| 288 | 327 | ||
| 289 | if(ctx->buf_len == 0 && (inl&(ctx->block_mask)) == 0) | 328 | if(ctx->buf_len == 0 && (inl&(ctx->block_mask)) == 0) |
| 290 | { | 329 | { |
| 291 | if(ctx->cipher->do_cipher(ctx,out,in,inl)) | 330 | if(M_do_cipher(ctx,out,in,inl)) |
| 292 | { | 331 | { |
| 293 | *outl=inl; | 332 | *outl=inl; |
| 294 | return 1; | 333 | return 1; |
| @@ -315,7 +354,7 @@ int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |||
| 315 | { | 354 | { |
| 316 | j=bl-i; | 355 | j=bl-i; |
| 317 | memcpy(&(ctx->buf[i]),in,j); | 356 | memcpy(&(ctx->buf[i]),in,j); |
| 318 | if(!ctx->cipher->do_cipher(ctx,out,ctx->buf,bl)) return 0; | 357 | if(!M_do_cipher(ctx,out,ctx->buf,bl)) return 0; |
| 319 | inl-=j; | 358 | inl-=j; |
| 320 | in+=j; | 359 | in+=j; |
| 321 | out+=bl; | 360 | out+=bl; |
| @@ -328,7 +367,7 @@ int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |||
| 328 | inl-=i; | 367 | inl-=i; |
| 329 | if (inl > 0) | 368 | if (inl > 0) |
| 330 | { | 369 | { |
| 331 | if(!ctx->cipher->do_cipher(ctx,out,in,inl)) return 0; | 370 | if(!M_do_cipher(ctx,out,in,inl)) return 0; |
| 332 | *outl+=inl; | 371 | *outl+=inl; |
| 333 | } | 372 | } |
| 334 | 373 | ||
| @@ -350,6 +389,16 @@ int EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
| 350 | int n,ret; | 389 | int n,ret; |
| 351 | unsigned int i, b, bl; | 390 | unsigned int i, b, bl; |
| 352 | 391 | ||
| 392 | if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) | ||
| 393 | { | ||
| 394 | ret = M_do_cipher(ctx, out, NULL, 0); | ||
| 395 | if (ret < 0) | ||
| 396 | return 0; | ||
| 397 | else | ||
| 398 | *outl = ret; | ||
| 399 | return 1; | ||
| 400 | } | ||
| 401 | |||
| 353 | b=ctx->cipher->block_size; | 402 | b=ctx->cipher->block_size; |
| 354 | OPENSSL_assert(b <= sizeof ctx->buf); | 403 | OPENSSL_assert(b <= sizeof ctx->buf); |
| 355 | if (b == 1) | 404 | if (b == 1) |
| @@ -372,7 +421,7 @@ int EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
| 372 | n=b-bl; | 421 | n=b-bl; |
| 373 | for (i=bl; i<b; i++) | 422 | for (i=bl; i<b; i++) |
| 374 | ctx->buf[i]=n; | 423 | ctx->buf[i]=n; |
| 375 | ret=ctx->cipher->do_cipher(ctx,out,ctx->buf,b); | 424 | ret=M_do_cipher(ctx,out,ctx->buf,b); |
| 376 | 425 | ||
| 377 | 426 | ||
| 378 | if(ret) | 427 | if(ret) |
| @@ -387,6 +436,19 @@ int EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |||
| 387 | int fix_len; | 436 | int fix_len; |
| 388 | unsigned int b; | 437 | unsigned int b; |
| 389 | 438 | ||
| 439 | if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) | ||
| 440 | { | ||
| 441 | fix_len = M_do_cipher(ctx, out, in, inl); | ||
| 442 | if (fix_len < 0) | ||
| 443 | { | ||
| 444 | *outl = 0; | ||
| 445 | return 0; | ||
| 446 | } | ||
| 447 | else | ||
| 448 | *outl = fix_len; | ||
| 449 | return 1; | ||
| 450 | } | ||
| 451 | |||
| 390 | if (inl <= 0) | 452 | if (inl <= 0) |
| 391 | { | 453 | { |
| 392 | *outl = 0; | 454 | *outl = 0; |
| @@ -440,8 +502,18 @@ int EVP_DecryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
| 440 | { | 502 | { |
| 441 | int i,n; | 503 | int i,n; |
| 442 | unsigned int b; | 504 | unsigned int b; |
| 443 | |||
| 444 | *outl=0; | 505 | *outl=0; |
| 506 | |||
| 507 | if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) | ||
| 508 | { | ||
| 509 | i = M_do_cipher(ctx, out, NULL, 0); | ||
| 510 | if (i < 0) | ||
| 511 | return 0; | ||
| 512 | else | ||
| 513 | *outl = i; | ||
| 514 | return 1; | ||
| 515 | } | ||
| 516 | |||
| 445 | b=ctx->cipher->block_size; | 517 | b=ctx->cipher->block_size; |
| 446 | if (ctx->flags & EVP_CIPH_NO_PADDING) | 518 | if (ctx->flags & EVP_CIPH_NO_PADDING) |
| 447 | { | 519 | { |
| @@ -496,6 +568,7 @@ void EVP_CIPHER_CTX_free(EVP_CIPHER_CTX *ctx) | |||
| 496 | 568 | ||
| 497 | int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c) | 569 | int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c) |
| 498 | { | 570 | { |
| 571 | #ifndef OPENSSL_FIPS | ||
| 499 | if (c->cipher != NULL) | 572 | if (c->cipher != NULL) |
| 500 | { | 573 | { |
| 501 | if(c->cipher->cleanup && !c->cipher->cleanup(c)) | 574 | if(c->cipher->cleanup && !c->cipher->cleanup(c)) |
| @@ -506,12 +579,16 @@ int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c) | |||
| 506 | } | 579 | } |
| 507 | if (c->cipher_data) | 580 | if (c->cipher_data) |
| 508 | OPENSSL_free(c->cipher_data); | 581 | OPENSSL_free(c->cipher_data); |
| 582 | #endif | ||
| 509 | #ifndef OPENSSL_NO_ENGINE | 583 | #ifndef OPENSSL_NO_ENGINE |
| 510 | if (c->engine) | 584 | if (c->engine) |
| 511 | /* The EVP_CIPHER we used belongs to an ENGINE, release the | 585 | /* The EVP_CIPHER we used belongs to an ENGINE, release the |
| 512 | * functional reference we held for this reason. */ | 586 | * functional reference we held for this reason. */ |
| 513 | ENGINE_finish(c->engine); | 587 | ENGINE_finish(c->engine); |
| 514 | #endif | 588 | #endif |
| 589 | #ifdef OPENSSL_FIPS | ||
| 590 | FIPS_cipher_ctx_cleanup(c); | ||
| 591 | #endif | ||
| 515 | memset(c,0,sizeof(EVP_CIPHER_CTX)); | 592 | memset(c,0,sizeof(EVP_CIPHER_CTX)); |
| 516 | return 1; | 593 | return 1; |
| 517 | } | 594 | } |
diff --git a/src/lib/libcrypto/evp/evp_err.c b/src/lib/libcrypto/evp/evp_err.c index d8bfec0959..db0f76d59b 100644 --- a/src/lib/libcrypto/evp/evp_err.c +++ b/src/lib/libcrypto/evp/evp_err.c | |||
| @@ -1,6 +1,6 @@ | |||
| 1 | /* crypto/evp/evp_err.c */ | 1 | /* crypto/evp/evp_err.c */ |
| 2 | /* ==================================================================== | 2 | /* ==================================================================== |
| 3 | * Copyright (c) 1999-2008 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved. |
| 4 | * | 4 | * |
| 5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
| 6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
| @@ -70,8 +70,13 @@ | |||
| 70 | 70 | ||
| 71 | static ERR_STRING_DATA EVP_str_functs[]= | 71 | static ERR_STRING_DATA EVP_str_functs[]= |
| 72 | { | 72 | { |
| 73 | {ERR_FUNC(EVP_F_AESNI_INIT_KEY), "AESNI_INIT_KEY"}, | ||
| 74 | {ERR_FUNC(EVP_F_AESNI_XTS_CIPHER), "AESNI_XTS_CIPHER"}, | ||
| 73 | {ERR_FUNC(EVP_F_AES_INIT_KEY), "AES_INIT_KEY"}, | 75 | {ERR_FUNC(EVP_F_AES_INIT_KEY), "AES_INIT_KEY"}, |
| 76 | {ERR_FUNC(EVP_F_AES_XTS), "AES_XTS"}, | ||
| 77 | {ERR_FUNC(EVP_F_AES_XTS_CIPHER), "AES_XTS_CIPHER"}, | ||
| 74 | {ERR_FUNC(EVP_F_CAMELLIA_INIT_KEY), "CAMELLIA_INIT_KEY"}, | 78 | {ERR_FUNC(EVP_F_CAMELLIA_INIT_KEY), "CAMELLIA_INIT_KEY"}, |
| 79 | {ERR_FUNC(EVP_F_CMAC_INIT), "CMAC_INIT"}, | ||
| 75 | {ERR_FUNC(EVP_F_D2I_PKEY), "D2I_PKEY"}, | 80 | {ERR_FUNC(EVP_F_D2I_PKEY), "D2I_PKEY"}, |
| 76 | {ERR_FUNC(EVP_F_DO_SIGVER_INIT), "DO_SIGVER_INIT"}, | 81 | {ERR_FUNC(EVP_F_DO_SIGVER_INIT), "DO_SIGVER_INIT"}, |
| 77 | {ERR_FUNC(EVP_F_DSAPKEY2PKCS8), "DSAPKEY2PKCS8"}, | 82 | {ERR_FUNC(EVP_F_DSAPKEY2PKCS8), "DSAPKEY2PKCS8"}, |
| @@ -86,7 +91,7 @@ static ERR_STRING_DATA EVP_str_functs[]= | |||
| 86 | {ERR_FUNC(EVP_F_EVP_DIGESTINIT_EX), "EVP_DigestInit_ex"}, | 91 | {ERR_FUNC(EVP_F_EVP_DIGESTINIT_EX), "EVP_DigestInit_ex"}, |
| 87 | {ERR_FUNC(EVP_F_EVP_ENCRYPTFINAL_EX), "EVP_EncryptFinal_ex"}, | 92 | {ERR_FUNC(EVP_F_EVP_ENCRYPTFINAL_EX), "EVP_EncryptFinal_ex"}, |
| 88 | {ERR_FUNC(EVP_F_EVP_MD_CTX_COPY_EX), "EVP_MD_CTX_copy_ex"}, | 93 | {ERR_FUNC(EVP_F_EVP_MD_CTX_COPY_EX), "EVP_MD_CTX_copy_ex"}, |
| 89 | {ERR_FUNC(EVP_F_EVP_MD_SIZE), "EVP_MD_SIZE"}, | 94 | {ERR_FUNC(EVP_F_EVP_MD_SIZE), "EVP_MD_size"}, |
| 90 | {ERR_FUNC(EVP_F_EVP_OPENINIT), "EVP_OpenInit"}, | 95 | {ERR_FUNC(EVP_F_EVP_OPENINIT), "EVP_OpenInit"}, |
| 91 | {ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD), "EVP_PBE_alg_add"}, | 96 | {ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD), "EVP_PBE_alg_add"}, |
| 92 | {ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD_TYPE), "EVP_PBE_alg_add_type"}, | 97 | {ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD_TYPE), "EVP_PBE_alg_add_type"}, |
| @@ -126,9 +131,17 @@ static ERR_STRING_DATA EVP_str_functs[]= | |||
| 126 | {ERR_FUNC(EVP_F_EVP_RIJNDAEL), "EVP_RIJNDAEL"}, | 131 | {ERR_FUNC(EVP_F_EVP_RIJNDAEL), "EVP_RIJNDAEL"}, |
| 127 | {ERR_FUNC(EVP_F_EVP_SIGNFINAL), "EVP_SignFinal"}, | 132 | {ERR_FUNC(EVP_F_EVP_SIGNFINAL), "EVP_SignFinal"}, |
| 128 | {ERR_FUNC(EVP_F_EVP_VERIFYFINAL), "EVP_VerifyFinal"}, | 133 | {ERR_FUNC(EVP_F_EVP_VERIFYFINAL), "EVP_VerifyFinal"}, |
| 134 | {ERR_FUNC(EVP_F_FIPS_CIPHERINIT), "FIPS_CIPHERINIT"}, | ||
| 135 | {ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_COPY), "FIPS_CIPHER_CTX_COPY"}, | ||
| 136 | {ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_CTRL), "FIPS_CIPHER_CTX_CTRL"}, | ||
| 137 | {ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_SET_KEY_LENGTH), "FIPS_CIPHER_CTX_SET_KEY_LENGTH"}, | ||
| 138 | {ERR_FUNC(EVP_F_FIPS_DIGESTINIT), "FIPS_DIGESTINIT"}, | ||
| 139 | {ERR_FUNC(EVP_F_FIPS_MD_CTX_COPY), "FIPS_MD_CTX_COPY"}, | ||
| 140 | {ERR_FUNC(EVP_F_HMAC_INIT_EX), "HMAC_Init_ex"}, | ||
| 129 | {ERR_FUNC(EVP_F_INT_CTX_NEW), "INT_CTX_NEW"}, | 141 | {ERR_FUNC(EVP_F_INT_CTX_NEW), "INT_CTX_NEW"}, |
| 130 | {ERR_FUNC(EVP_F_PKCS5_PBE_KEYIVGEN), "PKCS5_PBE_keyivgen"}, | 142 | {ERR_FUNC(EVP_F_PKCS5_PBE_KEYIVGEN), "PKCS5_PBE_keyivgen"}, |
| 131 | {ERR_FUNC(EVP_F_PKCS5_V2_PBE_KEYIVGEN), "PKCS5_v2_PBE_keyivgen"}, | 143 | {ERR_FUNC(EVP_F_PKCS5_V2_PBE_KEYIVGEN), "PKCS5_v2_PBE_keyivgen"}, |
| 144 | {ERR_FUNC(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN), "PKCS5_V2_PBKDF2_KEYIVGEN"}, | ||
| 132 | {ERR_FUNC(EVP_F_PKCS8_SET_BROKEN), "PKCS8_set_broken"}, | 145 | {ERR_FUNC(EVP_F_PKCS8_SET_BROKEN), "PKCS8_set_broken"}, |
| 133 | {ERR_FUNC(EVP_F_PKEY_SET_TYPE), "PKEY_SET_TYPE"}, | 146 | {ERR_FUNC(EVP_F_PKEY_SET_TYPE), "PKEY_SET_TYPE"}, |
| 134 | {ERR_FUNC(EVP_F_RC2_MAGIC_TO_METH), "RC2_MAGIC_TO_METH"}, | 147 | {ERR_FUNC(EVP_F_RC2_MAGIC_TO_METH), "RC2_MAGIC_TO_METH"}, |
| @@ -138,6 +151,7 @@ static ERR_STRING_DATA EVP_str_functs[]= | |||
| 138 | 151 | ||
| 139 | static ERR_STRING_DATA EVP_str_reasons[]= | 152 | static ERR_STRING_DATA EVP_str_reasons[]= |
| 140 | { | 153 | { |
| 154 | {ERR_REASON(EVP_R_AES_IV_SETUP_FAILED) ,"aes iv setup failed"}, | ||
| 141 | {ERR_REASON(EVP_R_AES_KEY_SETUP_FAILED) ,"aes key setup failed"}, | 155 | {ERR_REASON(EVP_R_AES_KEY_SETUP_FAILED) ,"aes key setup failed"}, |
| 142 | {ERR_REASON(EVP_R_ASN1_LIB) ,"asn1 lib"}, | 156 | {ERR_REASON(EVP_R_ASN1_LIB) ,"asn1 lib"}, |
| 143 | {ERR_REASON(EVP_R_BAD_BLOCK_LENGTH) ,"bad block length"}, | 157 | {ERR_REASON(EVP_R_BAD_BLOCK_LENGTH) ,"bad block length"}, |
| @@ -155,6 +169,7 @@ static ERR_STRING_DATA EVP_str_reasons[]= | |||
| 155 | {ERR_REASON(EVP_R_DECODE_ERROR) ,"decode error"}, | 169 | {ERR_REASON(EVP_R_DECODE_ERROR) ,"decode error"}, |
| 156 | {ERR_REASON(EVP_R_DIFFERENT_KEY_TYPES) ,"different key types"}, | 170 | {ERR_REASON(EVP_R_DIFFERENT_KEY_TYPES) ,"different key types"}, |
| 157 | {ERR_REASON(EVP_R_DIFFERENT_PARAMETERS) ,"different parameters"}, | 171 | {ERR_REASON(EVP_R_DIFFERENT_PARAMETERS) ,"different parameters"}, |
| 172 | {ERR_REASON(EVP_R_DISABLED_FOR_FIPS) ,"disabled for fips"}, | ||
| 158 | {ERR_REASON(EVP_R_ENCODE_ERROR) ,"encode error"}, | 173 | {ERR_REASON(EVP_R_ENCODE_ERROR) ,"encode error"}, |
| 159 | {ERR_REASON(EVP_R_EVP_PBE_CIPHERINIT_ERROR),"evp pbe cipherinit error"}, | 174 | {ERR_REASON(EVP_R_EVP_PBE_CIPHERINIT_ERROR),"evp pbe cipherinit error"}, |
| 160 | {ERR_REASON(EVP_R_EXPECTING_AN_RSA_KEY) ,"expecting an rsa key"}, | 175 | {ERR_REASON(EVP_R_EXPECTING_AN_RSA_KEY) ,"expecting an rsa key"}, |
| @@ -186,6 +201,7 @@ static ERR_STRING_DATA EVP_str_reasons[]= | |||
| 186 | {ERR_REASON(EVP_R_PRIVATE_KEY_DECODE_ERROR),"private key decode error"}, | 201 | {ERR_REASON(EVP_R_PRIVATE_KEY_DECODE_ERROR),"private key decode error"}, |
| 187 | {ERR_REASON(EVP_R_PRIVATE_KEY_ENCODE_ERROR),"private key encode error"}, | 202 | {ERR_REASON(EVP_R_PRIVATE_KEY_ENCODE_ERROR),"private key encode error"}, |
| 188 | {ERR_REASON(EVP_R_PUBLIC_KEY_NOT_RSA) ,"public key not rsa"}, | 203 | {ERR_REASON(EVP_R_PUBLIC_KEY_NOT_RSA) ,"public key not rsa"}, |
| 204 | {ERR_REASON(EVP_R_TOO_LARGE) ,"too large"}, | ||
| 189 | {ERR_REASON(EVP_R_UNKNOWN_CIPHER) ,"unknown cipher"}, | 205 | {ERR_REASON(EVP_R_UNKNOWN_CIPHER) ,"unknown cipher"}, |
| 190 | {ERR_REASON(EVP_R_UNKNOWN_DIGEST) ,"unknown digest"}, | 206 | {ERR_REASON(EVP_R_UNKNOWN_DIGEST) ,"unknown digest"}, |
| 191 | {ERR_REASON(EVP_R_UNKNOWN_PBE_ALGORITHM) ,"unknown pbe algorithm"}, | 207 | {ERR_REASON(EVP_R_UNKNOWN_PBE_ALGORITHM) ,"unknown pbe algorithm"}, |
diff --git a/src/lib/libcrypto/evp/evp_key.c b/src/lib/libcrypto/evp/evp_key.c index 839d6a3a16..7961fbebf2 100644 --- a/src/lib/libcrypto/evp/evp_key.c +++ b/src/lib/libcrypto/evp/evp_key.c | |||
| @@ -120,7 +120,7 @@ int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, | |||
| 120 | unsigned char md_buf[EVP_MAX_MD_SIZE]; | 120 | unsigned char md_buf[EVP_MAX_MD_SIZE]; |
| 121 | int niv,nkey,addmd=0; | 121 | int niv,nkey,addmd=0; |
| 122 | unsigned int mds=0,i; | 122 | unsigned int mds=0,i; |
| 123 | 123 | int rv = 0; | |
| 124 | nkey=type->key_len; | 124 | nkey=type->key_len; |
| 125 | niv=type->iv_len; | 125 | niv=type->iv_len; |
| 126 | OPENSSL_assert(nkey <= EVP_MAX_KEY_LENGTH); | 126 | OPENSSL_assert(nkey <= EVP_MAX_KEY_LENGTH); |
| @@ -134,17 +134,24 @@ int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, | |||
| 134 | if (!EVP_DigestInit_ex(&c,md, NULL)) | 134 | if (!EVP_DigestInit_ex(&c,md, NULL)) |
| 135 | return 0; | 135 | return 0; |
| 136 | if (addmd++) | 136 | if (addmd++) |
| 137 | EVP_DigestUpdate(&c,&(md_buf[0]),mds); | 137 | if (!EVP_DigestUpdate(&c,&(md_buf[0]),mds)) |
| 138 | EVP_DigestUpdate(&c,data,datal); | 138 | goto err; |
| 139 | if (!EVP_DigestUpdate(&c,data,datal)) | ||
| 140 | goto err; | ||
| 139 | if (salt != NULL) | 141 | if (salt != NULL) |
| 140 | EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN); | 142 | if (!EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN)) |
| 141 | EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds); | 143 | goto err; |
| 144 | if (!EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds)) | ||
| 145 | goto err; | ||
| 142 | 146 | ||
| 143 | for (i=1; i<(unsigned int)count; i++) | 147 | for (i=1; i<(unsigned int)count; i++) |
| 144 | { | 148 | { |
| 145 | EVP_DigestInit_ex(&c,md, NULL); | 149 | if (!EVP_DigestInit_ex(&c,md, NULL)) |
| 146 | EVP_DigestUpdate(&c,&(md_buf[0]),mds); | 150 | goto err; |
| 147 | EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds); | 151 | if (!EVP_DigestUpdate(&c,&(md_buf[0]),mds)) |
| 152 | goto err; | ||
| 153 | if (!EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds)) | ||
| 154 | goto err; | ||
| 148 | } | 155 | } |
| 149 | i=0; | 156 | i=0; |
| 150 | if (nkey) | 157 | if (nkey) |
| @@ -173,8 +180,10 @@ int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, | |||
| 173 | } | 180 | } |
| 174 | if ((nkey == 0) && (niv == 0)) break; | 181 | if ((nkey == 0) && (niv == 0)) break; |
| 175 | } | 182 | } |
| 183 | rv = type->key_len; | ||
| 184 | err: | ||
| 176 | EVP_MD_CTX_cleanup(&c); | 185 | EVP_MD_CTX_cleanup(&c); |
| 177 | OPENSSL_cleanse(&(md_buf[0]),EVP_MAX_MD_SIZE); | 186 | OPENSSL_cleanse(&(md_buf[0]),EVP_MAX_MD_SIZE); |
| 178 | return(type->key_len); | 187 | return rv; |
| 179 | } | 188 | } |
| 180 | 189 | ||
diff --git a/src/lib/libcrypto/evp/evp_lib.c b/src/lib/libcrypto/evp/evp_lib.c index 40951a04f0..b180e4828a 100644 --- a/src/lib/libcrypto/evp/evp_lib.c +++ b/src/lib/libcrypto/evp/evp_lib.c | |||
| @@ -67,6 +67,8 @@ int EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
| 67 | 67 | ||
| 68 | if (c->cipher->set_asn1_parameters != NULL) | 68 | if (c->cipher->set_asn1_parameters != NULL) |
| 69 | ret=c->cipher->set_asn1_parameters(c,type); | 69 | ret=c->cipher->set_asn1_parameters(c,type); |
| 70 | else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) | ||
| 71 | ret=EVP_CIPHER_set_asn1_iv(c, type); | ||
| 70 | else | 72 | else |
| 71 | ret=-1; | 73 | ret=-1; |
| 72 | return(ret); | 74 | return(ret); |
| @@ -78,6 +80,8 @@ int EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
| 78 | 80 | ||
| 79 | if (c->cipher->get_asn1_parameters != NULL) | 81 | if (c->cipher->get_asn1_parameters != NULL) |
| 80 | ret=c->cipher->get_asn1_parameters(c,type); | 82 | ret=c->cipher->get_asn1_parameters(c,type); |
| 83 | else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) | ||
| 84 | ret=EVP_CIPHER_get_asn1_iv(c, type); | ||
| 81 | else | 85 | else |
| 82 | ret=-1; | 86 | ret=-1; |
| 83 | return(ret); | 87 | return(ret); |
diff --git a/src/lib/libcrypto/evp/evp_locl.h b/src/lib/libcrypto/evp/evp_locl.h index 292d74c188..08c0a66d39 100644 --- a/src/lib/libcrypto/evp/evp_locl.h +++ b/src/lib/libcrypto/evp/evp_locl.h | |||
| @@ -343,3 +343,43 @@ struct evp_pkey_method_st | |||
| 343 | } /* EVP_PKEY_METHOD */; | 343 | } /* EVP_PKEY_METHOD */; |
| 344 | 344 | ||
| 345 | void evp_pkey_set_cb_translate(BN_GENCB *cb, EVP_PKEY_CTX *ctx); | 345 | void evp_pkey_set_cb_translate(BN_GENCB *cb, EVP_PKEY_CTX *ctx); |
| 346 | |||
| 347 | int PKCS5_v2_PBKDF2_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | ||
| 348 | ASN1_TYPE *param, | ||
| 349 | const EVP_CIPHER *c, const EVP_MD *md, int en_de); | ||
| 350 | |||
| 351 | #ifdef OPENSSL_FIPS | ||
| 352 | |||
| 353 | #ifdef OPENSSL_DOING_MAKEDEPEND | ||
| 354 | #undef SHA1_Init | ||
| 355 | #undef SHA1_Update | ||
| 356 | #undef SHA224_Init | ||
| 357 | #undef SHA256_Init | ||
| 358 | #undef SHA384_Init | ||
| 359 | #undef SHA512_Init | ||
| 360 | #undef DES_set_key_unchecked | ||
| 361 | #endif | ||
| 362 | |||
| 363 | #define RIPEMD160_Init private_RIPEMD160_Init | ||
| 364 | #define WHIRLPOOL_Init private_WHIRLPOOL_Init | ||
| 365 | #define MD5_Init private_MD5_Init | ||
| 366 | #define MD4_Init private_MD4_Init | ||
| 367 | #define MD2_Init private_MD2_Init | ||
| 368 | #define MDC2_Init private_MDC2_Init | ||
| 369 | #define SHA_Init private_SHA_Init | ||
| 370 | #define SHA1_Init private_SHA1_Init | ||
| 371 | #define SHA224_Init private_SHA224_Init | ||
| 372 | #define SHA256_Init private_SHA256_Init | ||
| 373 | #define SHA384_Init private_SHA384_Init | ||
| 374 | #define SHA512_Init private_SHA512_Init | ||
| 375 | |||
| 376 | #define BF_set_key private_BF_set_key | ||
| 377 | #define CAST_set_key private_CAST_set_key | ||
| 378 | #define idea_set_encrypt_key private_idea_set_encrypt_key | ||
| 379 | #define SEED_set_key private_SEED_set_key | ||
| 380 | #define RC2_set_key private_RC2_set_key | ||
| 381 | #define RC4_set_key private_RC4_set_key | ||
| 382 | #define DES_set_key_unchecked private_DES_set_key_unchecked | ||
| 383 | #define Camellia_set_key private_Camellia_set_key | ||
| 384 | |||
| 385 | #endif | ||
diff --git a/src/lib/libcrypto/evp/evp_pbe.c b/src/lib/libcrypto/evp/evp_pbe.c index c9d932d205..f8c32d825e 100644 --- a/src/lib/libcrypto/evp/evp_pbe.c +++ b/src/lib/libcrypto/evp/evp_pbe.c | |||
| @@ -61,6 +61,7 @@ | |||
| 61 | #include <openssl/evp.h> | 61 | #include <openssl/evp.h> |
| 62 | #include <openssl/pkcs12.h> | 62 | #include <openssl/pkcs12.h> |
| 63 | #include <openssl/x509.h> | 63 | #include <openssl/x509.h> |
| 64 | #include "evp_locl.h" | ||
| 64 | 65 | ||
| 65 | /* Password based encryption (PBE) functions */ | 66 | /* Password based encryption (PBE) functions */ |
| 66 | 67 | ||
| @@ -87,6 +88,10 @@ static const EVP_PBE_CTL builtin_pbe[] = | |||
| 87 | {EVP_PBE_TYPE_OUTER, NID_pbeWithSHA1AndRC2_CBC, | 88 | {EVP_PBE_TYPE_OUTER, NID_pbeWithSHA1AndRC2_CBC, |
| 88 | NID_rc2_64_cbc, NID_sha1, PKCS5_PBE_keyivgen}, | 89 | NID_rc2_64_cbc, NID_sha1, PKCS5_PBE_keyivgen}, |
| 89 | 90 | ||
| 91 | #ifndef OPENSSL_NO_HMAC | ||
| 92 | {EVP_PBE_TYPE_OUTER, NID_id_pbkdf2, -1, -1, PKCS5_v2_PBKDF2_keyivgen}, | ||
| 93 | #endif | ||
| 94 | |||
| 90 | {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And128BitRC4, | 95 | {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And128BitRC4, |
| 91 | NID_rc4, NID_sha1, PKCS12_PBE_keyivgen}, | 96 | NID_rc4, NID_sha1, PKCS12_PBE_keyivgen}, |
| 92 | {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And40BitRC4, | 97 | {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And40BitRC4, |
diff --git a/src/lib/libcrypto/evp/m_dss.c b/src/lib/libcrypto/evp/m_dss.c index 48c2689504..4ad63ada6f 100644 --- a/src/lib/libcrypto/evp/m_dss.c +++ b/src/lib/libcrypto/evp/m_dss.c | |||
| @@ -66,6 +66,7 @@ | |||
| 66 | #endif | 66 | #endif |
| 67 | 67 | ||
| 68 | #ifndef OPENSSL_NO_SHA | 68 | #ifndef OPENSSL_NO_SHA |
| 69 | #ifndef OPENSSL_FIPS | ||
| 69 | 70 | ||
| 70 | static int init(EVP_MD_CTX *ctx) | 71 | static int init(EVP_MD_CTX *ctx) |
| 71 | { return SHA1_Init(ctx->md_data); } | 72 | { return SHA1_Init(ctx->md_data); } |
| @@ -97,3 +98,4 @@ const EVP_MD *EVP_dss(void) | |||
| 97 | return(&dsa_md); | 98 | return(&dsa_md); |
| 98 | } | 99 | } |
| 99 | #endif | 100 | #endif |
| 101 | #endif | ||
diff --git a/src/lib/libcrypto/evp/m_dss1.c b/src/lib/libcrypto/evp/m_dss1.c index 4f03fb70e0..f80170efeb 100644 --- a/src/lib/libcrypto/evp/m_dss1.c +++ b/src/lib/libcrypto/evp/m_dss1.c | |||
| @@ -68,6 +68,8 @@ | |||
| 68 | #include <openssl/dsa.h> | 68 | #include <openssl/dsa.h> |
| 69 | #endif | 69 | #endif |
| 70 | 70 | ||
| 71 | #ifndef OPENSSL_FIPS | ||
| 72 | |||
| 71 | static int init(EVP_MD_CTX *ctx) | 73 | static int init(EVP_MD_CTX *ctx) |
| 72 | { return SHA1_Init(ctx->md_data); } | 74 | { return SHA1_Init(ctx->md_data); } |
| 73 | 75 | ||
| @@ -98,3 +100,4 @@ const EVP_MD *EVP_dss1(void) | |||
| 98 | return(&dss1_md); | 100 | return(&dss1_md); |
| 99 | } | 101 | } |
| 100 | #endif | 102 | #endif |
| 103 | #endif | ||
diff --git a/src/lib/libcrypto/evp/m_ecdsa.c b/src/lib/libcrypto/evp/m_ecdsa.c index 8d87a49ebe..4b15fb0f6c 100644 --- a/src/lib/libcrypto/evp/m_ecdsa.c +++ b/src/lib/libcrypto/evp/m_ecdsa.c | |||
| @@ -116,6 +116,8 @@ | |||
| 116 | #include <openssl/x509.h> | 116 | #include <openssl/x509.h> |
| 117 | 117 | ||
| 118 | #ifndef OPENSSL_NO_SHA | 118 | #ifndef OPENSSL_NO_SHA |
| 119 | #ifndef OPENSSL_FIPS | ||
| 120 | |||
| 119 | static int init(EVP_MD_CTX *ctx) | 121 | static int init(EVP_MD_CTX *ctx) |
| 120 | { return SHA1_Init(ctx->md_data); } | 122 | { return SHA1_Init(ctx->md_data); } |
| 121 | 123 | ||
| @@ -146,3 +148,4 @@ const EVP_MD *EVP_ecdsa(void) | |||
| 146 | return(&ecdsa_md); | 148 | return(&ecdsa_md); |
| 147 | } | 149 | } |
| 148 | #endif | 150 | #endif |
| 151 | #endif | ||
diff --git a/src/lib/libcrypto/evp/m_md4.c b/src/lib/libcrypto/evp/m_md4.c index 1e0b7c5b42..6d47f61b27 100644 --- a/src/lib/libcrypto/evp/m_md4.c +++ b/src/lib/libcrypto/evp/m_md4.c | |||
| @@ -69,6 +69,8 @@ | |||
| 69 | #include <openssl/rsa.h> | 69 | #include <openssl/rsa.h> |
| 70 | #endif | 70 | #endif |
| 71 | 71 | ||
| 72 | #include "evp_locl.h" | ||
| 73 | |||
| 72 | static int init(EVP_MD_CTX *ctx) | 74 | static int init(EVP_MD_CTX *ctx) |
| 73 | { return MD4_Init(ctx->md_data); } | 75 | { return MD4_Init(ctx->md_data); } |
| 74 | 76 | ||
diff --git a/src/lib/libcrypto/evp/m_md5.c b/src/lib/libcrypto/evp/m_md5.c index 63c142119e..9a8bae0258 100644 --- a/src/lib/libcrypto/evp/m_md5.c +++ b/src/lib/libcrypto/evp/m_md5.c | |||
| @@ -68,6 +68,7 @@ | |||
| 68 | #ifndef OPENSSL_NO_RSA | 68 | #ifndef OPENSSL_NO_RSA |
| 69 | #include <openssl/rsa.h> | 69 | #include <openssl/rsa.h> |
| 70 | #endif | 70 | #endif |
| 71 | #include "evp_locl.h" | ||
| 71 | 72 | ||
| 72 | static int init(EVP_MD_CTX *ctx) | 73 | static int init(EVP_MD_CTX *ctx) |
| 73 | { return MD5_Init(ctx->md_data); } | 74 | { return MD5_Init(ctx->md_data); } |
diff --git a/src/lib/libcrypto/evp/m_ripemd.c b/src/lib/libcrypto/evp/m_ripemd.c index a1d60ee78d..7bf4804cf8 100644 --- a/src/lib/libcrypto/evp/m_ripemd.c +++ b/src/lib/libcrypto/evp/m_ripemd.c | |||
| @@ -68,6 +68,7 @@ | |||
| 68 | #ifndef OPENSSL_NO_RSA | 68 | #ifndef OPENSSL_NO_RSA |
| 69 | #include <openssl/rsa.h> | 69 | #include <openssl/rsa.h> |
| 70 | #endif | 70 | #endif |
| 71 | #include "evp_locl.h" | ||
| 71 | 72 | ||
| 72 | static int init(EVP_MD_CTX *ctx) | 73 | static int init(EVP_MD_CTX *ctx) |
| 73 | { return RIPEMD160_Init(ctx->md_data); } | 74 | { return RIPEMD160_Init(ctx->md_data); } |
diff --git a/src/lib/libcrypto/evp/m_sha1.c b/src/lib/libcrypto/evp/m_sha1.c index 9a2790fdea..3cb11f1ebb 100644 --- a/src/lib/libcrypto/evp/m_sha1.c +++ b/src/lib/libcrypto/evp/m_sha1.c | |||
| @@ -59,6 +59,8 @@ | |||
| 59 | #include <stdio.h> | 59 | #include <stdio.h> |
| 60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
| 61 | 61 | ||
| 62 | #ifndef OPENSSL_FIPS | ||
| 63 | |||
| 62 | #ifndef OPENSSL_NO_SHA | 64 | #ifndef OPENSSL_NO_SHA |
| 63 | 65 | ||
| 64 | #include <openssl/evp.h> | 66 | #include <openssl/evp.h> |
| @@ -68,6 +70,7 @@ | |||
| 68 | #include <openssl/rsa.h> | 70 | #include <openssl/rsa.h> |
| 69 | #endif | 71 | #endif |
| 70 | 72 | ||
| 73 | |||
| 71 | static int init(EVP_MD_CTX *ctx) | 74 | static int init(EVP_MD_CTX *ctx) |
| 72 | { return SHA1_Init(ctx->md_data); } | 75 | { return SHA1_Init(ctx->md_data); } |
| 73 | 76 | ||
| @@ -202,3 +205,5 @@ static const EVP_MD sha512_md= | |||
| 202 | const EVP_MD *EVP_sha512(void) | 205 | const EVP_MD *EVP_sha512(void) |
| 203 | { return(&sha512_md); } | 206 | { return(&sha512_md); } |
| 204 | #endif /* ifndef OPENSSL_NO_SHA512 */ | 207 | #endif /* ifndef OPENSSL_NO_SHA512 */ |
| 208 | |||
| 209 | #endif | ||
diff --git a/src/lib/libcrypto/evp/m_wp.c b/src/lib/libcrypto/evp/m_wp.c index 1ce47c040b..c51bc2d5d1 100644 --- a/src/lib/libcrypto/evp/m_wp.c +++ b/src/lib/libcrypto/evp/m_wp.c | |||
| @@ -9,6 +9,7 @@ | |||
| 9 | #include <openssl/objects.h> | 9 | #include <openssl/objects.h> |
| 10 | #include <openssl/x509.h> | 10 | #include <openssl/x509.h> |
| 11 | #include <openssl/whrlpool.h> | 11 | #include <openssl/whrlpool.h> |
| 12 | #include "evp_locl.h" | ||
| 12 | 13 | ||
| 13 | static int init(EVP_MD_CTX *ctx) | 14 | static int init(EVP_MD_CTX *ctx) |
| 14 | { return WHIRLPOOL_Init(ctx->md_data); } | 15 | { return WHIRLPOOL_Init(ctx->md_data); } |
diff --git a/src/lib/libcrypto/evp/names.c b/src/lib/libcrypto/evp/names.c index f2869f5c78..6311ad7cfb 100644 --- a/src/lib/libcrypto/evp/names.c +++ b/src/lib/libcrypto/evp/names.c | |||
| @@ -66,6 +66,10 @@ int EVP_add_cipher(const EVP_CIPHER *c) | |||
| 66 | { | 66 | { |
| 67 | int r; | 67 | int r; |
| 68 | 68 | ||
| 69 | if (c == NULL) return 0; | ||
| 70 | |||
| 71 | OPENSSL_init(); | ||
| 72 | |||
| 69 | r=OBJ_NAME_add(OBJ_nid2sn(c->nid),OBJ_NAME_TYPE_CIPHER_METH,(const char *)c); | 73 | r=OBJ_NAME_add(OBJ_nid2sn(c->nid),OBJ_NAME_TYPE_CIPHER_METH,(const char *)c); |
| 70 | if (r == 0) return(0); | 74 | if (r == 0) return(0); |
| 71 | check_defer(c->nid); | 75 | check_defer(c->nid); |
| @@ -78,6 +82,7 @@ int EVP_add_digest(const EVP_MD *md) | |||
| 78 | { | 82 | { |
| 79 | int r; | 83 | int r; |
| 80 | const char *name; | 84 | const char *name; |
| 85 | OPENSSL_init(); | ||
| 81 | 86 | ||
| 82 | name=OBJ_nid2sn(md->type); | 87 | name=OBJ_nid2sn(md->type); |
| 83 | r=OBJ_NAME_add(name,OBJ_NAME_TYPE_MD_METH,(const char *)md); | 88 | r=OBJ_NAME_add(name,OBJ_NAME_TYPE_MD_METH,(const char *)md); |
diff --git a/src/lib/libcrypto/evp/p5_crpt.c b/src/lib/libcrypto/evp/p5_crpt.c index 7ecfa8dad9..294cc90d87 100644 --- a/src/lib/libcrypto/evp/p5_crpt.c +++ b/src/lib/libcrypto/evp/p5_crpt.c | |||
| @@ -82,6 +82,8 @@ int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, | |||
| 82 | unsigned char *salt; | 82 | unsigned char *salt; |
| 83 | const unsigned char *pbuf; | 83 | const unsigned char *pbuf; |
| 84 | int mdsize; | 84 | int mdsize; |
| 85 | int rv = 0; | ||
| 86 | EVP_MD_CTX_init(&ctx); | ||
| 85 | 87 | ||
| 86 | /* Extract useful info from parameter */ | 88 | /* Extract useful info from parameter */ |
| 87 | if (param == NULL || param->type != V_ASN1_SEQUENCE || | 89 | if (param == NULL || param->type != V_ASN1_SEQUENCE || |
| @@ -104,29 +106,38 @@ int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, | |||
| 104 | if(!pass) passlen = 0; | 106 | if(!pass) passlen = 0; |
| 105 | else if(passlen == -1) passlen = strlen(pass); | 107 | else if(passlen == -1) passlen = strlen(pass); |
| 106 | 108 | ||
| 107 | EVP_MD_CTX_init(&ctx); | 109 | if (!EVP_DigestInit_ex(&ctx, md, NULL)) |
| 108 | EVP_DigestInit_ex(&ctx, md, NULL); | 110 | goto err; |
| 109 | EVP_DigestUpdate(&ctx, pass, passlen); | 111 | if (!EVP_DigestUpdate(&ctx, pass, passlen)) |
| 110 | EVP_DigestUpdate(&ctx, salt, saltlen); | 112 | goto err; |
| 113 | if (!EVP_DigestUpdate(&ctx, salt, saltlen)) | ||
| 114 | goto err; | ||
| 111 | PBEPARAM_free(pbe); | 115 | PBEPARAM_free(pbe); |
| 112 | EVP_DigestFinal_ex(&ctx, md_tmp, NULL); | 116 | if (!EVP_DigestFinal_ex(&ctx, md_tmp, NULL)) |
| 117 | goto err; | ||
| 113 | mdsize = EVP_MD_size(md); | 118 | mdsize = EVP_MD_size(md); |
| 114 | if (mdsize < 0) | 119 | if (mdsize < 0) |
| 115 | return 0; | 120 | return 0; |
| 116 | for (i = 1; i < iter; i++) { | 121 | for (i = 1; i < iter; i++) { |
| 117 | EVP_DigestInit_ex(&ctx, md, NULL); | 122 | if (!EVP_DigestInit_ex(&ctx, md, NULL)) |
| 118 | EVP_DigestUpdate(&ctx, md_tmp, mdsize); | 123 | goto err; |
| 119 | EVP_DigestFinal_ex (&ctx, md_tmp, NULL); | 124 | if (!EVP_DigestUpdate(&ctx, md_tmp, mdsize)) |
| 125 | goto err; | ||
| 126 | if (!EVP_DigestFinal_ex (&ctx, md_tmp, NULL)) | ||
| 127 | goto err; | ||
| 120 | } | 128 | } |
| 121 | EVP_MD_CTX_cleanup(&ctx); | ||
| 122 | OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp)); | 129 | OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp)); |
| 123 | memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); | 130 | memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); |
| 124 | OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16); | 131 | OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16); |
| 125 | memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), | 132 | memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), |
| 126 | EVP_CIPHER_iv_length(cipher)); | 133 | EVP_CIPHER_iv_length(cipher)); |
| 127 | EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de); | 134 | if (!EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de)) |
| 135 | goto err; | ||
| 128 | OPENSSL_cleanse(md_tmp, EVP_MAX_MD_SIZE); | 136 | OPENSSL_cleanse(md_tmp, EVP_MAX_MD_SIZE); |
| 129 | OPENSSL_cleanse(key, EVP_MAX_KEY_LENGTH); | 137 | OPENSSL_cleanse(key, EVP_MAX_KEY_LENGTH); |
| 130 | OPENSSL_cleanse(iv, EVP_MAX_IV_LENGTH); | 138 | OPENSSL_cleanse(iv, EVP_MAX_IV_LENGTH); |
| 131 | return 1; | 139 | rv = 1; |
| 140 | err: | ||
| 141 | EVP_MD_CTX_cleanup(&ctx); | ||
| 142 | return rv; | ||
| 132 | } | 143 | } |
diff --git a/src/lib/libcrypto/evp/p5_crpt2.c b/src/lib/libcrypto/evp/p5_crpt2.c index 334379f310..975d004df4 100644 --- a/src/lib/libcrypto/evp/p5_crpt2.c +++ b/src/lib/libcrypto/evp/p5_crpt2.c | |||
| @@ -62,6 +62,7 @@ | |||
| 62 | #include <openssl/x509.h> | 62 | #include <openssl/x509.h> |
| 63 | #include <openssl/evp.h> | 63 | #include <openssl/evp.h> |
| 64 | #include <openssl/hmac.h> | 64 | #include <openssl/hmac.h> |
| 65 | #include "evp_locl.h" | ||
| 65 | 66 | ||
| 66 | /* set this to print out info about the keygen algorithm */ | 67 | /* set this to print out info about the keygen algorithm */ |
| 67 | /* #define DEBUG_PKCS5V2 */ | 68 | /* #define DEBUG_PKCS5V2 */ |
| @@ -110,10 +111,14 @@ int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, | |||
| 110 | itmp[1] = (unsigned char)((i >> 16) & 0xff); | 111 | itmp[1] = (unsigned char)((i >> 16) & 0xff); |
| 111 | itmp[2] = (unsigned char)((i >> 8) & 0xff); | 112 | itmp[2] = (unsigned char)((i >> 8) & 0xff); |
| 112 | itmp[3] = (unsigned char)(i & 0xff); | 113 | itmp[3] = (unsigned char)(i & 0xff); |
| 113 | HMAC_Init_ex(&hctx, pass, passlen, digest, NULL); | 114 | if (!HMAC_Init_ex(&hctx, pass, passlen, digest, NULL) |
| 114 | HMAC_Update(&hctx, salt, saltlen); | 115 | || !HMAC_Update(&hctx, salt, saltlen) |
| 115 | HMAC_Update(&hctx, itmp, 4); | 116 | || !HMAC_Update(&hctx, itmp, 4) |
| 116 | HMAC_Final(&hctx, digtmp, NULL); | 117 | || !HMAC_Final(&hctx, digtmp, NULL)) |
| 118 | { | ||
| 119 | HMAC_CTX_cleanup(&hctx); | ||
| 120 | return 0; | ||
| 121 | } | ||
| 117 | memcpy(p, digtmp, cplen); | 122 | memcpy(p, digtmp, cplen); |
| 118 | for(j = 1; j < iter; j++) | 123 | for(j = 1; j < iter; j++) |
| 119 | { | 124 | { |
| @@ -168,27 +173,24 @@ int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | |||
| 168 | ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, | 173 | ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, |
| 169 | int en_de) | 174 | int en_de) |
| 170 | { | 175 | { |
| 171 | unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; | ||
| 172 | const unsigned char *pbuf; | 176 | const unsigned char *pbuf; |
| 173 | int saltlen, iter, plen; | 177 | int plen; |
| 174 | unsigned int keylen; | ||
| 175 | PBE2PARAM *pbe2 = NULL; | 178 | PBE2PARAM *pbe2 = NULL; |
| 176 | const EVP_CIPHER *cipher; | 179 | const EVP_CIPHER *cipher; |
| 177 | PBKDF2PARAM *kdf = NULL; | 180 | |
| 178 | const EVP_MD *prfmd; | 181 | int rv = 0; |
| 179 | int prf_nid, hmac_md_nid; | ||
| 180 | 182 | ||
| 181 | if (param == NULL || param->type != V_ASN1_SEQUENCE || | 183 | if (param == NULL || param->type != V_ASN1_SEQUENCE || |
| 182 | param->value.sequence == NULL) { | 184 | param->value.sequence == NULL) { |
| 183 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); | 185 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); |
| 184 | return 0; | 186 | goto err; |
| 185 | } | 187 | } |
| 186 | 188 | ||
| 187 | pbuf = param->value.sequence->data; | 189 | pbuf = param->value.sequence->data; |
| 188 | plen = param->value.sequence->length; | 190 | plen = param->value.sequence->length; |
| 189 | if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) { | 191 | if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) { |
| 190 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); | 192 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); |
| 191 | return 0; | 193 | goto err; |
| 192 | } | 194 | } |
| 193 | 195 | ||
| 194 | /* See if we recognise the key derivation function */ | 196 | /* See if we recognise the key derivation function */ |
| @@ -211,38 +213,63 @@ int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | |||
| 211 | } | 213 | } |
| 212 | 214 | ||
| 213 | /* Fixup cipher based on AlgorithmIdentifier */ | 215 | /* Fixup cipher based on AlgorithmIdentifier */ |
| 214 | EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de); | 216 | if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de)) |
| 217 | goto err; | ||
| 215 | if(EVP_CIPHER_asn1_to_param(ctx, pbe2->encryption->parameter) < 0) { | 218 | if(EVP_CIPHER_asn1_to_param(ctx, pbe2->encryption->parameter) < 0) { |
| 216 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, | 219 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, |
| 217 | EVP_R_CIPHER_PARAMETER_ERROR); | 220 | EVP_R_CIPHER_PARAMETER_ERROR); |
| 218 | goto err; | 221 | goto err; |
| 219 | } | 222 | } |
| 223 | rv = PKCS5_v2_PBKDF2_keyivgen(ctx, pass, passlen, | ||
| 224 | pbe2->keyfunc->parameter, c, md, en_de); | ||
| 225 | err: | ||
| 226 | PBE2PARAM_free(pbe2); | ||
| 227 | return rv; | ||
| 228 | } | ||
| 229 | |||
| 230 | int PKCS5_v2_PBKDF2_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | ||
| 231 | ASN1_TYPE *param, | ||
| 232 | const EVP_CIPHER *c, const EVP_MD *md, int en_de) | ||
| 233 | { | ||
| 234 | unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; | ||
| 235 | const unsigned char *pbuf; | ||
| 236 | int saltlen, iter, plen; | ||
| 237 | int rv = 0; | ||
| 238 | unsigned int keylen = 0; | ||
| 239 | int prf_nid, hmac_md_nid; | ||
| 240 | PBKDF2PARAM *kdf = NULL; | ||
| 241 | const EVP_MD *prfmd; | ||
| 242 | |||
| 243 | if (EVP_CIPHER_CTX_cipher(ctx) == NULL) | ||
| 244 | { | ||
| 245 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN,EVP_R_NO_CIPHER_SET); | ||
| 246 | goto err; | ||
| 247 | } | ||
| 220 | keylen = EVP_CIPHER_CTX_key_length(ctx); | 248 | keylen = EVP_CIPHER_CTX_key_length(ctx); |
| 221 | OPENSSL_assert(keylen <= sizeof key); | 249 | OPENSSL_assert(keylen <= sizeof key); |
| 222 | 250 | ||
| 223 | /* Now decode key derivation function */ | 251 | /* Decode parameter */ |
| 224 | 252 | ||
| 225 | if(!pbe2->keyfunc->parameter || | 253 | if(!param || (param->type != V_ASN1_SEQUENCE)) |
| 226 | (pbe2->keyfunc->parameter->type != V_ASN1_SEQUENCE)) | ||
| 227 | { | 254 | { |
| 228 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); | 255 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN,EVP_R_DECODE_ERROR); |
| 229 | goto err; | 256 | goto err; |
| 230 | } | 257 | } |
| 231 | 258 | ||
| 232 | pbuf = pbe2->keyfunc->parameter->value.sequence->data; | 259 | pbuf = param->value.sequence->data; |
| 233 | plen = pbe2->keyfunc->parameter->value.sequence->length; | 260 | plen = param->value.sequence->length; |
| 261 | |||
| 234 | if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { | 262 | if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { |
| 235 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); | 263 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN,EVP_R_DECODE_ERROR); |
| 236 | goto err; | 264 | goto err; |
| 237 | } | 265 | } |
| 238 | 266 | ||
| 239 | PBE2PARAM_free(pbe2); | 267 | keylen = EVP_CIPHER_CTX_key_length(ctx); |
| 240 | pbe2 = NULL; | ||
| 241 | 268 | ||
| 242 | /* Now check the parameters of the kdf */ | 269 | /* Now check the parameters of the kdf */ |
| 243 | 270 | ||
| 244 | if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ | 271 | if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ |
| 245 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, | 272 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN, |
| 246 | EVP_R_UNSUPPORTED_KEYLENGTH); | 273 | EVP_R_UNSUPPORTED_KEYLENGTH); |
| 247 | goto err; | 274 | goto err; |
| 248 | } | 275 | } |
| @@ -254,19 +281,19 @@ int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | |||
| 254 | 281 | ||
| 255 | if (!EVP_PBE_find(EVP_PBE_TYPE_PRF, prf_nid, NULL, &hmac_md_nid, 0)) | 282 | if (!EVP_PBE_find(EVP_PBE_TYPE_PRF, prf_nid, NULL, &hmac_md_nid, 0)) |
| 256 | { | 283 | { |
| 257 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, EVP_R_UNSUPPORTED_PRF); | 284 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN, EVP_R_UNSUPPORTED_PRF); |
| 258 | goto err; | 285 | goto err; |
| 259 | } | 286 | } |
| 260 | 287 | ||
| 261 | prfmd = EVP_get_digestbynid(hmac_md_nid); | 288 | prfmd = EVP_get_digestbynid(hmac_md_nid); |
| 262 | if (prfmd == NULL) | 289 | if (prfmd == NULL) |
| 263 | { | 290 | { |
| 264 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, EVP_R_UNSUPPORTED_PRF); | 291 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN, EVP_R_UNSUPPORTED_PRF); |
| 265 | goto err; | 292 | goto err; |
| 266 | } | 293 | } |
| 267 | 294 | ||
| 268 | if(kdf->salt->type != V_ASN1_OCTET_STRING) { | 295 | if(kdf->salt->type != V_ASN1_OCTET_STRING) { |
| 269 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, | 296 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN, |
| 270 | EVP_R_UNSUPPORTED_SALT_TYPE); | 297 | EVP_R_UNSUPPORTED_SALT_TYPE); |
| 271 | goto err; | 298 | goto err; |
| 272 | } | 299 | } |
| @@ -278,15 +305,11 @@ int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | |||
| 278 | if(!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd, | 305 | if(!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd, |
| 279 | keylen, key)) | 306 | keylen, key)) |
| 280 | goto err; | 307 | goto err; |
| 281 | EVP_CipherInit_ex(ctx, NULL, NULL, key, NULL, en_de); | 308 | rv = EVP_CipherInit_ex(ctx, NULL, NULL, key, NULL, en_de); |
| 282 | OPENSSL_cleanse(key, keylen); | ||
| 283 | PBKDF2PARAM_free(kdf); | ||
| 284 | return 1; | ||
| 285 | |||
| 286 | err: | 309 | err: |
| 287 | PBE2PARAM_free(pbe2); | 310 | OPENSSL_cleanse(key, keylen); |
| 288 | PBKDF2PARAM_free(kdf); | 311 | PBKDF2PARAM_free(kdf); |
| 289 | return 0; | 312 | return rv; |
| 290 | } | 313 | } |
| 291 | 314 | ||
| 292 | #ifdef DEBUG_PKCS5V2 | 315 | #ifdef DEBUG_PKCS5V2 |
diff --git a/src/lib/libcrypto/evp/p_open.c b/src/lib/libcrypto/evp/p_open.c index 53a59a295c..c748fbea87 100644 --- a/src/lib/libcrypto/evp/p_open.c +++ b/src/lib/libcrypto/evp/p_open.c | |||
| @@ -115,7 +115,8 @@ int EVP_OpenFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
| 115 | int i; | 115 | int i; |
| 116 | 116 | ||
| 117 | i=EVP_DecryptFinal_ex(ctx,out,outl); | 117 | i=EVP_DecryptFinal_ex(ctx,out,outl); |
| 118 | EVP_DecryptInit_ex(ctx,NULL,NULL,NULL,NULL); | 118 | if (i) |
| 119 | i = EVP_DecryptInit_ex(ctx,NULL,NULL,NULL,NULL); | ||
| 119 | return(i); | 120 | return(i); |
| 120 | } | 121 | } |
| 121 | #else /* !OPENSSL_NO_RSA */ | 122 | #else /* !OPENSSL_NO_RSA */ |
diff --git a/src/lib/libcrypto/evp/p_seal.c b/src/lib/libcrypto/evp/p_seal.c index d8324526e7..e5919b0fbf 100644 --- a/src/lib/libcrypto/evp/p_seal.c +++ b/src/lib/libcrypto/evp/p_seal.c | |||
| @@ -110,6 +110,7 @@ int EVP_SealFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
| 110 | { | 110 | { |
| 111 | int i; | 111 | int i; |
| 112 | i = EVP_EncryptFinal_ex(ctx,out,outl); | 112 | i = EVP_EncryptFinal_ex(ctx,out,outl); |
| 113 | EVP_EncryptInit_ex(ctx,NULL,NULL,NULL,NULL); | 113 | if (i) |
| 114 | i = EVP_EncryptInit_ex(ctx,NULL,NULL,NULL,NULL); | ||
| 114 | return i; | 115 | return i; |
| 115 | } | 116 | } |
diff --git a/src/lib/libcrypto/evp/p_sign.c b/src/lib/libcrypto/evp/p_sign.c index bb893f5bde..dfa48c157c 100644 --- a/src/lib/libcrypto/evp/p_sign.c +++ b/src/lib/libcrypto/evp/p_sign.c | |||
| @@ -80,18 +80,20 @@ int EVP_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, | |||
| 80 | { | 80 | { |
| 81 | unsigned char m[EVP_MAX_MD_SIZE]; | 81 | unsigned char m[EVP_MAX_MD_SIZE]; |
| 82 | unsigned int m_len; | 82 | unsigned int m_len; |
| 83 | int i,ok=0,v; | 83 | int i=0,ok=0,v; |
| 84 | EVP_MD_CTX tmp_ctx; | 84 | EVP_MD_CTX tmp_ctx; |
| 85 | EVP_PKEY_CTX *pkctx = NULL; | ||
| 85 | 86 | ||
| 86 | *siglen=0; | 87 | *siglen=0; |
| 87 | EVP_MD_CTX_init(&tmp_ctx); | 88 | EVP_MD_CTX_init(&tmp_ctx); |
| 88 | EVP_MD_CTX_copy_ex(&tmp_ctx,ctx); | 89 | if (!EVP_MD_CTX_copy_ex(&tmp_ctx,ctx)) |
| 89 | EVP_DigestFinal_ex(&tmp_ctx,&(m[0]),&m_len); | 90 | goto err; |
| 91 | if (!EVP_DigestFinal_ex(&tmp_ctx,&(m[0]),&m_len)) | ||
| 92 | goto err; | ||
| 90 | EVP_MD_CTX_cleanup(&tmp_ctx); | 93 | EVP_MD_CTX_cleanup(&tmp_ctx); |
| 91 | 94 | ||
| 92 | if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) | 95 | if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) |
| 93 | { | 96 | { |
| 94 | EVP_PKEY_CTX *pkctx = NULL; | ||
| 95 | size_t sltmp = (size_t)EVP_PKEY_size(pkey); | 97 | size_t sltmp = (size_t)EVP_PKEY_size(pkey); |
| 96 | i = 0; | 98 | i = 0; |
| 97 | pkctx = EVP_PKEY_CTX_new(pkey, NULL); | 99 | pkctx = EVP_PKEY_CTX_new(pkey, NULL); |
diff --git a/src/lib/libcrypto/evp/p_verify.c b/src/lib/libcrypto/evp/p_verify.c index 41d4b67130..5f5c409f45 100644 --- a/src/lib/libcrypto/evp/p_verify.c +++ b/src/lib/libcrypto/evp/p_verify.c | |||
| @@ -67,17 +67,19 @@ int EVP_VerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sigbuf, | |||
| 67 | { | 67 | { |
| 68 | unsigned char m[EVP_MAX_MD_SIZE]; | 68 | unsigned char m[EVP_MAX_MD_SIZE]; |
| 69 | unsigned int m_len; | 69 | unsigned int m_len; |
| 70 | int i,ok=0,v; | 70 | int i=-1,ok=0,v; |
| 71 | EVP_MD_CTX tmp_ctx; | 71 | EVP_MD_CTX tmp_ctx; |
| 72 | EVP_PKEY_CTX *pkctx = NULL; | ||
| 72 | 73 | ||
| 73 | EVP_MD_CTX_init(&tmp_ctx); | 74 | EVP_MD_CTX_init(&tmp_ctx); |
| 74 | EVP_MD_CTX_copy_ex(&tmp_ctx,ctx); | 75 | if (!EVP_MD_CTX_copy_ex(&tmp_ctx,ctx)) |
| 75 | EVP_DigestFinal_ex(&tmp_ctx,&(m[0]),&m_len); | 76 | goto err; |
| 77 | if (!EVP_DigestFinal_ex(&tmp_ctx,&(m[0]),&m_len)) | ||
| 78 | goto err; | ||
| 76 | EVP_MD_CTX_cleanup(&tmp_ctx); | 79 | EVP_MD_CTX_cleanup(&tmp_ctx); |
| 77 | 80 | ||
| 78 | if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) | 81 | if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) |
| 79 | { | 82 | { |
| 80 | EVP_PKEY_CTX *pkctx = NULL; | ||
| 81 | i = -1; | 83 | i = -1; |
| 82 | pkctx = EVP_PKEY_CTX_new(pkey, NULL); | 84 | pkctx = EVP_PKEY_CTX_new(pkey, NULL); |
| 83 | if (!pkctx) | 85 | if (!pkctx) |
diff --git a/src/lib/libcrypto/evp/pmeth_gn.c b/src/lib/libcrypto/evp/pmeth_gn.c index 5d74161a09..4651c81370 100644 --- a/src/lib/libcrypto/evp/pmeth_gn.c +++ b/src/lib/libcrypto/evp/pmeth_gn.c | |||
| @@ -199,7 +199,7 @@ int EVP_PKEY_CTX_get_keygen_info(EVP_PKEY_CTX *ctx, int idx) | |||
| 199 | } | 199 | } |
| 200 | 200 | ||
| 201 | EVP_PKEY *EVP_PKEY_new_mac_key(int type, ENGINE *e, | 201 | EVP_PKEY *EVP_PKEY_new_mac_key(int type, ENGINE *e, |
| 202 | unsigned char *key, int keylen) | 202 | const unsigned char *key, int keylen) |
| 203 | { | 203 | { |
| 204 | EVP_PKEY_CTX *mac_ctx = NULL; | 204 | EVP_PKEY_CTX *mac_ctx = NULL; |
| 205 | EVP_PKEY *mac_key = NULL; | 205 | EVP_PKEY *mac_key = NULL; |
| @@ -209,7 +209,8 @@ EVP_PKEY *EVP_PKEY_new_mac_key(int type, ENGINE *e, | |||
| 209 | if (EVP_PKEY_keygen_init(mac_ctx) <= 0) | 209 | if (EVP_PKEY_keygen_init(mac_ctx) <= 0) |
| 210 | goto merr; | 210 | goto merr; |
| 211 | if (EVP_PKEY_CTX_ctrl(mac_ctx, -1, EVP_PKEY_OP_KEYGEN, | 211 | if (EVP_PKEY_CTX_ctrl(mac_ctx, -1, EVP_PKEY_OP_KEYGEN, |
| 212 | EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key) <= 0) | 212 | EVP_PKEY_CTRL_SET_MAC_KEY, |
| 213 | keylen, (void *)key) <= 0) | ||
| 213 | goto merr; | 214 | goto merr; |
| 214 | if (EVP_PKEY_keygen(mac_ctx, &mac_key) <= 0) | 215 | if (EVP_PKEY_keygen(mac_ctx, &mac_key) <= 0) |
| 215 | goto merr; | 216 | goto merr; |
diff --git a/src/lib/libcrypto/evp/pmeth_lib.c b/src/lib/libcrypto/evp/pmeth_lib.c index 5481d4b8a5..acfa7b6f87 100644 --- a/src/lib/libcrypto/evp/pmeth_lib.c +++ b/src/lib/libcrypto/evp/pmeth_lib.c | |||
| @@ -73,7 +73,7 @@ DECLARE_STACK_OF(EVP_PKEY_METHOD) | |||
| 73 | STACK_OF(EVP_PKEY_METHOD) *app_pkey_methods = NULL; | 73 | STACK_OF(EVP_PKEY_METHOD) *app_pkey_methods = NULL; |
| 74 | 74 | ||
| 75 | extern const EVP_PKEY_METHOD rsa_pkey_meth, dh_pkey_meth, dsa_pkey_meth; | 75 | extern const EVP_PKEY_METHOD rsa_pkey_meth, dh_pkey_meth, dsa_pkey_meth; |
| 76 | extern const EVP_PKEY_METHOD ec_pkey_meth, hmac_pkey_meth; | 76 | extern const EVP_PKEY_METHOD ec_pkey_meth, hmac_pkey_meth, cmac_pkey_meth; |
| 77 | 77 | ||
| 78 | static const EVP_PKEY_METHOD *standard_methods[] = | 78 | static const EVP_PKEY_METHOD *standard_methods[] = |
| 79 | { | 79 | { |
| @@ -90,6 +90,7 @@ static const EVP_PKEY_METHOD *standard_methods[] = | |||
| 90 | &ec_pkey_meth, | 90 | &ec_pkey_meth, |
| 91 | #endif | 91 | #endif |
| 92 | &hmac_pkey_meth, | 92 | &hmac_pkey_meth, |
| 93 | &cmac_pkey_meth | ||
| 93 | }; | 94 | }; |
| 94 | 95 | ||
| 95 | DECLARE_OBJ_BSEARCH_CMP_FN(const EVP_PKEY_METHOD *, const EVP_PKEY_METHOD *, | 96 | DECLARE_OBJ_BSEARCH_CMP_FN(const EVP_PKEY_METHOD *, const EVP_PKEY_METHOD *, |
| @@ -203,6 +204,8 @@ EVP_PKEY_METHOD* EVP_PKEY_meth_new(int id, int flags) | |||
| 203 | if (!pmeth) | 204 | if (!pmeth) |
| 204 | return NULL; | 205 | return NULL; |
| 205 | 206 | ||
| 207 | memset(pmeth, 0, sizeof(EVP_PKEY_METHOD)); | ||
| 208 | |||
| 206 | pmeth->pkey_id = id; | 209 | pmeth->pkey_id = id; |
| 207 | pmeth->flags = flags | EVP_PKEY_FLAG_DYNAMIC; | 210 | pmeth->flags = flags | EVP_PKEY_FLAG_DYNAMIC; |
| 208 | 211 | ||
| @@ -235,6 +238,56 @@ EVP_PKEY_METHOD* EVP_PKEY_meth_new(int id, int flags) | |||
| 235 | return pmeth; | 238 | return pmeth; |
| 236 | } | 239 | } |
| 237 | 240 | ||
| 241 | void EVP_PKEY_meth_get0_info(int *ppkey_id, int *pflags, | ||
| 242 | const EVP_PKEY_METHOD *meth) | ||
| 243 | { | ||
| 244 | if (ppkey_id) | ||
| 245 | *ppkey_id = meth->pkey_id; | ||
| 246 | if (pflags) | ||
| 247 | *pflags = meth->flags; | ||
| 248 | } | ||
| 249 | |||
| 250 | void EVP_PKEY_meth_copy(EVP_PKEY_METHOD *dst, const EVP_PKEY_METHOD *src) | ||
| 251 | { | ||
| 252 | |||
| 253 | dst->init = src->init; | ||
| 254 | dst->copy = src->copy; | ||
| 255 | dst->cleanup = src->cleanup; | ||
| 256 | |||
| 257 | dst->paramgen_init = src->paramgen_init; | ||
| 258 | dst->paramgen = src->paramgen; | ||
| 259 | |||
| 260 | dst->keygen_init = src->keygen_init; | ||
| 261 | dst->keygen = src->keygen; | ||
| 262 | |||
| 263 | dst->sign_init = src->sign_init; | ||
| 264 | dst->sign = src->sign; | ||
| 265 | |||
| 266 | dst->verify_init = src->verify_init; | ||
| 267 | dst->verify = src->verify; | ||
| 268 | |||
| 269 | dst->verify_recover_init = src->verify_recover_init; | ||
| 270 | dst->verify_recover = src->verify_recover; | ||
| 271 | |||
| 272 | dst->signctx_init = src->signctx_init; | ||
| 273 | dst->signctx = src->signctx; | ||
| 274 | |||
| 275 | dst->verifyctx_init = src->verifyctx_init; | ||
| 276 | dst->verifyctx = src->verifyctx; | ||
| 277 | |||
| 278 | dst->encrypt_init = src->encrypt_init; | ||
| 279 | dst->encrypt = src->encrypt; | ||
| 280 | |||
| 281 | dst->decrypt_init = src->decrypt_init; | ||
| 282 | dst->decrypt = src->decrypt; | ||
| 283 | |||
| 284 | dst->derive_init = src->derive_init; | ||
| 285 | dst->derive = src->derive; | ||
| 286 | |||
| 287 | dst->ctrl = src->ctrl; | ||
| 288 | dst->ctrl_str = src->ctrl_str; | ||
| 289 | } | ||
| 290 | |||
| 238 | void EVP_PKEY_meth_free(EVP_PKEY_METHOD *pmeth) | 291 | void EVP_PKEY_meth_free(EVP_PKEY_METHOD *pmeth) |
| 239 | { | 292 | { |
| 240 | if (pmeth && (pmeth->flags & EVP_PKEY_FLAG_DYNAMIC)) | 293 | if (pmeth && (pmeth->flags & EVP_PKEY_FLAG_DYNAMIC)) |
