diff options
author | djm <> | 2012-10-13 21:25:14 +0000 |
---|---|---|
committer | djm <> | 2012-10-13 21:25:14 +0000 |
commit | 93723b50b639d8dc717bc1bf463fd46e1b321239 (patch) | |
tree | 281e0a29ae8f87a8c47fbd4deaa1f3d48b8cc5c1 /src/lib/libcrypto/evp | |
parent | 65e72ac55a6405783db7a12d7e35a7561d46005b (diff) | |
download | openbsd-93723b50b639d8dc717bc1bf463fd46e1b321239.tar.gz openbsd-93723b50b639d8dc717bc1bf463fd46e1b321239.tar.bz2 openbsd-93723b50b639d8dc717bc1bf463fd46e1b321239.zip |
resolve conflicts
Diffstat (limited to 'src/lib/libcrypto/evp')
33 files changed, 1806 insertions, 179 deletions
diff --git a/src/lib/libcrypto/evp/Makefile b/src/lib/libcrypto/evp/Makefile index 82825e5299..0fe1b96bff 100644 --- a/src/lib/libcrypto/evp/Makefile +++ b/src/lib/libcrypto/evp/Makefile | |||
@@ -28,7 +28,8 @@ LIBSRC= encode.c digest.c evp_enc.c evp_key.c evp_acnf.c \ | |||
28 | bio_md.c bio_b64.c bio_enc.c evp_err.c e_null.c \ | 28 | bio_md.c bio_b64.c bio_enc.c evp_err.c e_null.c \ |
29 | c_all.c c_allc.c c_alld.c evp_lib.c bio_ok.c \ | 29 | c_all.c c_allc.c c_alld.c evp_lib.c bio_ok.c \ |
30 | evp_pkey.c evp_pbe.c p5_crpt.c p5_crpt2.c \ | 30 | evp_pkey.c evp_pbe.c p5_crpt.c p5_crpt2.c \ |
31 | e_old.c pmeth_lib.c pmeth_fn.c pmeth_gn.c m_sigver.c | 31 | e_old.c pmeth_lib.c pmeth_fn.c pmeth_gn.c m_sigver.c evp_fips.c \ |
32 | e_aes_cbc_hmac_sha1.c e_rc4_hmac_md5.c | ||
32 | 33 | ||
33 | LIBOBJ= encode.o digest.o evp_enc.o evp_key.o evp_acnf.o \ | 34 | LIBOBJ= encode.o digest.o evp_enc.o evp_key.o evp_acnf.o \ |
34 | e_des.o e_bf.o e_idea.o e_des3.o e_camellia.o\ | 35 | e_des.o e_bf.o e_idea.o e_des3.o e_camellia.o\ |
@@ -40,7 +41,8 @@ LIBOBJ= encode.o digest.o evp_enc.o evp_key.o evp_acnf.o \ | |||
40 | bio_md.o bio_b64.o bio_enc.o evp_err.o e_null.o \ | 41 | bio_md.o bio_b64.o bio_enc.o evp_err.o e_null.o \ |
41 | c_all.o c_allc.o c_alld.o evp_lib.o bio_ok.o \ | 42 | c_all.o c_allc.o c_alld.o evp_lib.o bio_ok.o \ |
42 | evp_pkey.o evp_pbe.o p5_crpt.o p5_crpt2.o \ | 43 | evp_pkey.o evp_pbe.o p5_crpt.o p5_crpt2.o \ |
43 | e_old.o pmeth_lib.o pmeth_fn.o pmeth_gn.o m_sigver.o | 44 | e_old.o pmeth_lib.o pmeth_fn.o pmeth_gn.o m_sigver.o evp_fips.o \ |
45 | e_aes_cbc_hmac_sha1.o e_rc4_hmac_md5.o | ||
44 | 46 | ||
45 | SRC= $(LIBSRC) | 47 | SRC= $(LIBSRC) |
46 | 48 | ||
@@ -189,11 +191,27 @@ e_aes.o: ../../include/openssl/aes.h ../../include/openssl/asn1.h | |||
189 | e_aes.o: ../../include/openssl/bio.h ../../include/openssl/crypto.h | 191 | e_aes.o: ../../include/openssl/bio.h ../../include/openssl/crypto.h |
190 | e_aes.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h | 192 | e_aes.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
191 | e_aes.o: ../../include/openssl/evp.h ../../include/openssl/lhash.h | 193 | e_aes.o: ../../include/openssl/evp.h ../../include/openssl/lhash.h |
192 | e_aes.o: ../../include/openssl/obj_mac.h ../../include/openssl/objects.h | 194 | e_aes.o: ../../include/openssl/modes.h ../../include/openssl/obj_mac.h |
193 | e_aes.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | 195 | e_aes.o: ../../include/openssl/objects.h ../../include/openssl/opensslconf.h |
194 | e_aes.o: ../../include/openssl/ossl_typ.h ../../include/openssl/safestack.h | 196 | e_aes.o: ../../include/openssl/opensslv.h ../../include/openssl/ossl_typ.h |
195 | e_aes.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h e_aes.c | 197 | e_aes.o: ../../include/openssl/rand.h ../../include/openssl/safestack.h |
196 | e_aes.o: evp_locl.h | 198 | e_aes.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
199 | e_aes.o: ../modes/modes_lcl.h e_aes.c evp_locl.h | ||
200 | e_aes_cbc_hmac_sha1.o: ../../include/openssl/aes.h ../../include/openssl/asn1.h | ||
201 | e_aes_cbc_hmac_sha1.o: ../../include/openssl/bio.h | ||
202 | e_aes_cbc_hmac_sha1.o: ../../include/openssl/crypto.h | ||
203 | e_aes_cbc_hmac_sha1.o: ../../include/openssl/e_os2.h | ||
204 | e_aes_cbc_hmac_sha1.o: ../../include/openssl/evp.h | ||
205 | e_aes_cbc_hmac_sha1.o: ../../include/openssl/obj_mac.h | ||
206 | e_aes_cbc_hmac_sha1.o: ../../include/openssl/objects.h | ||
207 | e_aes_cbc_hmac_sha1.o: ../../include/openssl/opensslconf.h | ||
208 | e_aes_cbc_hmac_sha1.o: ../../include/openssl/opensslv.h | ||
209 | e_aes_cbc_hmac_sha1.o: ../../include/openssl/ossl_typ.h | ||
210 | e_aes_cbc_hmac_sha1.o: ../../include/openssl/safestack.h | ||
211 | e_aes_cbc_hmac_sha1.o: ../../include/openssl/sha.h | ||
212 | e_aes_cbc_hmac_sha1.o: ../../include/openssl/stack.h | ||
213 | e_aes_cbc_hmac_sha1.o: ../../include/openssl/symhacks.h e_aes_cbc_hmac_sha1.c | ||
214 | e_aes_cbc_hmac_sha1.o: evp_locl.h | ||
197 | e_bf.o: ../../e_os.h ../../include/openssl/asn1.h ../../include/openssl/bio.h | 215 | e_bf.o: ../../e_os.h ../../include/openssl/asn1.h ../../include/openssl/bio.h |
198 | e_bf.o: ../../include/openssl/blowfish.h ../../include/openssl/buffer.h | 216 | e_bf.o: ../../include/openssl/blowfish.h ../../include/openssl/buffer.h |
199 | e_bf.o: ../../include/openssl/crypto.h ../../include/openssl/e_os2.h | 217 | e_bf.o: ../../include/openssl/crypto.h ../../include/openssl/e_os2.h |
@@ -279,7 +297,18 @@ e_rc4.o: ../../include/openssl/obj_mac.h ../../include/openssl/objects.h | |||
279 | e_rc4.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | 297 | e_rc4.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h |
280 | e_rc4.o: ../../include/openssl/ossl_typ.h ../../include/openssl/rc4.h | 298 | e_rc4.o: ../../include/openssl/ossl_typ.h ../../include/openssl/rc4.h |
281 | e_rc4.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | 299 | e_rc4.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h |
282 | e_rc4.o: ../../include/openssl/symhacks.h ../cryptlib.h e_rc4.c | 300 | e_rc4.o: ../../include/openssl/symhacks.h ../cryptlib.h e_rc4.c evp_locl.h |
301 | e_rc4_hmac_md5.o: ../../include/openssl/asn1.h ../../include/openssl/bio.h | ||
302 | e_rc4_hmac_md5.o: ../../include/openssl/crypto.h ../../include/openssl/e_os2.h | ||
303 | e_rc4_hmac_md5.o: ../../include/openssl/evp.h ../../include/openssl/md5.h | ||
304 | e_rc4_hmac_md5.o: ../../include/openssl/obj_mac.h | ||
305 | e_rc4_hmac_md5.o: ../../include/openssl/objects.h | ||
306 | e_rc4_hmac_md5.o: ../../include/openssl/opensslconf.h | ||
307 | e_rc4_hmac_md5.o: ../../include/openssl/opensslv.h | ||
308 | e_rc4_hmac_md5.o: ../../include/openssl/ossl_typ.h ../../include/openssl/rc4.h | ||
309 | e_rc4_hmac_md5.o: ../../include/openssl/safestack.h | ||
310 | e_rc4_hmac_md5.o: ../../include/openssl/stack.h | ||
311 | e_rc4_hmac_md5.o: ../../include/openssl/symhacks.h e_rc4_hmac_md5.c | ||
283 | e_rc5.o: ../../e_os.h ../../include/openssl/bio.h | 312 | e_rc5.o: ../../e_os.h ../../include/openssl/bio.h |
284 | e_rc5.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 313 | e_rc5.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
285 | e_rc5.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h | 314 | e_rc5.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h |
@@ -349,6 +378,13 @@ evp_err.o: ../../include/openssl/objects.h ../../include/openssl/opensslconf.h | |||
349 | evp_err.o: ../../include/openssl/opensslv.h ../../include/openssl/ossl_typ.h | 378 | evp_err.o: ../../include/openssl/opensslv.h ../../include/openssl/ossl_typ.h |
350 | evp_err.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | 379 | evp_err.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h |
351 | evp_err.o: ../../include/openssl/symhacks.h evp_err.c | 380 | evp_err.o: ../../include/openssl/symhacks.h evp_err.c |
381 | evp_fips.o: ../../include/openssl/asn1.h ../../include/openssl/bio.h | ||
382 | evp_fips.o: ../../include/openssl/crypto.h ../../include/openssl/e_os2.h | ||
383 | evp_fips.o: ../../include/openssl/evp.h ../../include/openssl/obj_mac.h | ||
384 | evp_fips.o: ../../include/openssl/objects.h ../../include/openssl/opensslconf.h | ||
385 | evp_fips.o: ../../include/openssl/opensslv.h ../../include/openssl/ossl_typ.h | ||
386 | evp_fips.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | ||
387 | evp_fips.o: ../../include/openssl/symhacks.h evp_fips.c | ||
352 | evp_key.o: ../../e_os.h ../../include/openssl/asn1.h | 388 | evp_key.o: ../../e_os.h ../../include/openssl/asn1.h |
353 | evp_key.o: ../../include/openssl/bio.h ../../include/openssl/buffer.h | 389 | evp_key.o: ../../include/openssl/bio.h ../../include/openssl/buffer.h |
354 | evp_key.o: ../../include/openssl/crypto.h ../../include/openssl/e_os2.h | 390 | evp_key.o: ../../include/openssl/crypto.h ../../include/openssl/e_os2.h |
@@ -383,7 +419,7 @@ evp_pbe.o: ../../include/openssl/ossl_typ.h ../../include/openssl/pkcs12.h | |||
383 | evp_pbe.o: ../../include/openssl/pkcs7.h ../../include/openssl/safestack.h | 419 | evp_pbe.o: ../../include/openssl/pkcs7.h ../../include/openssl/safestack.h |
384 | evp_pbe.o: ../../include/openssl/sha.h ../../include/openssl/stack.h | 420 | evp_pbe.o: ../../include/openssl/sha.h ../../include/openssl/stack.h |
385 | evp_pbe.o: ../../include/openssl/symhacks.h ../../include/openssl/x509.h | 421 | evp_pbe.o: ../../include/openssl/symhacks.h ../../include/openssl/x509.h |
386 | evp_pbe.o: ../../include/openssl/x509_vfy.h ../cryptlib.h evp_pbe.c | 422 | evp_pbe.o: ../../include/openssl/x509_vfy.h ../cryptlib.h evp_locl.h evp_pbe.c |
387 | evp_pkey.o: ../../e_os.h ../../include/openssl/asn1.h | 423 | evp_pkey.o: ../../e_os.h ../../include/openssl/asn1.h |
388 | evp_pkey.o: ../../include/openssl/bio.h ../../include/openssl/buffer.h | 424 | evp_pkey.o: ../../include/openssl/bio.h ../../include/openssl/buffer.h |
389 | evp_pkey.o: ../../include/openssl/crypto.h ../../include/openssl/e_os2.h | 425 | evp_pkey.o: ../../include/openssl/crypto.h ../../include/openssl/e_os2.h |
@@ -456,7 +492,7 @@ m_md4.o: ../../include/openssl/ossl_typ.h ../../include/openssl/pkcs7.h | |||
456 | m_md4.o: ../../include/openssl/rsa.h ../../include/openssl/safestack.h | 492 | m_md4.o: ../../include/openssl/rsa.h ../../include/openssl/safestack.h |
457 | m_md4.o: ../../include/openssl/sha.h ../../include/openssl/stack.h | 493 | m_md4.o: ../../include/openssl/sha.h ../../include/openssl/stack.h |
458 | m_md4.o: ../../include/openssl/symhacks.h ../../include/openssl/x509.h | 494 | m_md4.o: ../../include/openssl/symhacks.h ../../include/openssl/x509.h |
459 | m_md4.o: ../../include/openssl/x509_vfy.h ../cryptlib.h m_md4.c | 495 | m_md4.o: ../../include/openssl/x509_vfy.h ../cryptlib.h evp_locl.h m_md4.c |
460 | m_md5.o: ../../e_os.h ../../include/openssl/asn1.h ../../include/openssl/bio.h | 496 | m_md5.o: ../../e_os.h ../../include/openssl/asn1.h ../../include/openssl/bio.h |
461 | m_md5.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 497 | m_md5.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
462 | m_md5.o: ../../include/openssl/e_os2.h ../../include/openssl/ec.h | 498 | m_md5.o: ../../include/openssl/e_os2.h ../../include/openssl/ec.h |
@@ -469,7 +505,7 @@ m_md5.o: ../../include/openssl/ossl_typ.h ../../include/openssl/pkcs7.h | |||
469 | m_md5.o: ../../include/openssl/rsa.h ../../include/openssl/safestack.h | 505 | m_md5.o: ../../include/openssl/rsa.h ../../include/openssl/safestack.h |
470 | m_md5.o: ../../include/openssl/sha.h ../../include/openssl/stack.h | 506 | m_md5.o: ../../include/openssl/sha.h ../../include/openssl/stack.h |
471 | m_md5.o: ../../include/openssl/symhacks.h ../../include/openssl/x509.h | 507 | m_md5.o: ../../include/openssl/symhacks.h ../../include/openssl/x509.h |
472 | m_md5.o: ../../include/openssl/x509_vfy.h ../cryptlib.h m_md5.c | 508 | m_md5.o: ../../include/openssl/x509_vfy.h ../cryptlib.h evp_locl.h m_md5.c |
473 | m_mdc2.o: ../../e_os.h ../../include/openssl/asn1.h ../../include/openssl/bio.h | 509 | m_mdc2.o: ../../e_os.h ../../include/openssl/asn1.h ../../include/openssl/bio.h |
474 | m_mdc2.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 510 | m_mdc2.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
475 | m_mdc2.o: ../../include/openssl/des.h ../../include/openssl/des_old.h | 511 | m_mdc2.o: ../../include/openssl/des.h ../../include/openssl/des_old.h |
@@ -484,7 +520,7 @@ m_mdc2.o: ../../include/openssl/rsa.h ../../include/openssl/safestack.h | |||
484 | m_mdc2.o: ../../include/openssl/sha.h ../../include/openssl/stack.h | 520 | m_mdc2.o: ../../include/openssl/sha.h ../../include/openssl/stack.h |
485 | m_mdc2.o: ../../include/openssl/symhacks.h ../../include/openssl/ui.h | 521 | m_mdc2.o: ../../include/openssl/symhacks.h ../../include/openssl/ui.h |
486 | m_mdc2.o: ../../include/openssl/ui_compat.h ../../include/openssl/x509.h | 522 | m_mdc2.o: ../../include/openssl/ui_compat.h ../../include/openssl/x509.h |
487 | m_mdc2.o: ../../include/openssl/x509_vfy.h ../cryptlib.h m_mdc2.c | 523 | m_mdc2.o: ../../include/openssl/x509_vfy.h ../cryptlib.h evp_locl.h m_mdc2.c |
488 | m_null.o: ../../e_os.h ../../include/openssl/asn1.h ../../include/openssl/bio.h | 524 | m_null.o: ../../e_os.h ../../include/openssl/asn1.h ../../include/openssl/bio.h |
489 | m_null.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 525 | m_null.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
490 | m_null.o: ../../include/openssl/e_os2.h ../../include/openssl/ec.h | 526 | m_null.o: ../../include/openssl/e_os2.h ../../include/openssl/ec.h |
@@ -510,7 +546,8 @@ m_ripemd.o: ../../include/openssl/pkcs7.h ../../include/openssl/ripemd.h | |||
510 | m_ripemd.o: ../../include/openssl/rsa.h ../../include/openssl/safestack.h | 546 | m_ripemd.o: ../../include/openssl/rsa.h ../../include/openssl/safestack.h |
511 | m_ripemd.o: ../../include/openssl/sha.h ../../include/openssl/stack.h | 547 | m_ripemd.o: ../../include/openssl/sha.h ../../include/openssl/stack.h |
512 | m_ripemd.o: ../../include/openssl/symhacks.h ../../include/openssl/x509.h | 548 | m_ripemd.o: ../../include/openssl/symhacks.h ../../include/openssl/x509.h |
513 | m_ripemd.o: ../../include/openssl/x509_vfy.h ../cryptlib.h m_ripemd.c | 549 | m_ripemd.o: ../../include/openssl/x509_vfy.h ../cryptlib.h evp_locl.h |
550 | m_ripemd.o: m_ripemd.c | ||
514 | m_sha.o: ../../e_os.h ../../include/openssl/asn1.h ../../include/openssl/bio.h | 551 | m_sha.o: ../../e_os.h ../../include/openssl/asn1.h ../../include/openssl/bio.h |
515 | m_sha.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 552 | m_sha.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
516 | m_sha.o: ../../include/openssl/e_os2.h ../../include/openssl/ec.h | 553 | m_sha.o: ../../include/openssl/e_os2.h ../../include/openssl/ec.h |
@@ -523,7 +560,7 @@ m_sha.o: ../../include/openssl/pkcs7.h ../../include/openssl/rsa.h | |||
523 | m_sha.o: ../../include/openssl/safestack.h ../../include/openssl/sha.h | 560 | m_sha.o: ../../include/openssl/safestack.h ../../include/openssl/sha.h |
524 | m_sha.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h | 561 | m_sha.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h |
525 | m_sha.o: ../../include/openssl/x509.h ../../include/openssl/x509_vfy.h | 562 | m_sha.o: ../../include/openssl/x509.h ../../include/openssl/x509_vfy.h |
526 | m_sha.o: ../cryptlib.h m_sha.c | 563 | m_sha.o: ../cryptlib.h evp_locl.h m_sha.c |
527 | m_sha1.o: ../../e_os.h ../../include/openssl/asn1.h ../../include/openssl/bio.h | 564 | m_sha1.o: ../../e_os.h ../../include/openssl/asn1.h ../../include/openssl/bio.h |
528 | m_sha1.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 565 | m_sha1.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
529 | m_sha1.o: ../../include/openssl/e_os2.h ../../include/openssl/ec.h | 566 | m_sha1.o: ../../include/openssl/e_os2.h ../../include/openssl/ec.h |
@@ -563,7 +600,7 @@ m_wp.o: ../../include/openssl/pkcs7.h ../../include/openssl/safestack.h | |||
563 | m_wp.o: ../../include/openssl/sha.h ../../include/openssl/stack.h | 600 | m_wp.o: ../../include/openssl/sha.h ../../include/openssl/stack.h |
564 | m_wp.o: ../../include/openssl/symhacks.h ../../include/openssl/whrlpool.h | 601 | m_wp.o: ../../include/openssl/symhacks.h ../../include/openssl/whrlpool.h |
565 | m_wp.o: ../../include/openssl/x509.h ../../include/openssl/x509_vfy.h | 602 | m_wp.o: ../../include/openssl/x509.h ../../include/openssl/x509_vfy.h |
566 | m_wp.o: ../cryptlib.h m_wp.c | 603 | m_wp.o: ../cryptlib.h evp_locl.h m_wp.c |
567 | names.o: ../../e_os.h ../../include/openssl/asn1.h ../../include/openssl/bio.h | 604 | names.o: ../../e_os.h ../../include/openssl/asn1.h ../../include/openssl/bio.h |
568 | names.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 605 | names.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
569 | names.o: ../../include/openssl/e_os2.h ../../include/openssl/ec.h | 606 | names.o: ../../include/openssl/e_os2.h ../../include/openssl/ec.h |
@@ -601,7 +638,8 @@ p5_crpt2.o: ../../include/openssl/opensslv.h ../../include/openssl/ossl_typ.h | |||
601 | p5_crpt2.o: ../../include/openssl/pkcs7.h ../../include/openssl/safestack.h | 638 | p5_crpt2.o: ../../include/openssl/pkcs7.h ../../include/openssl/safestack.h |
602 | p5_crpt2.o: ../../include/openssl/sha.h ../../include/openssl/stack.h | 639 | p5_crpt2.o: ../../include/openssl/sha.h ../../include/openssl/stack.h |
603 | p5_crpt2.o: ../../include/openssl/symhacks.h ../../include/openssl/x509.h | 640 | p5_crpt2.o: ../../include/openssl/symhacks.h ../../include/openssl/x509.h |
604 | p5_crpt2.o: ../../include/openssl/x509_vfy.h ../cryptlib.h p5_crpt2.c | 641 | p5_crpt2.o: ../../include/openssl/x509_vfy.h ../cryptlib.h evp_locl.h |
642 | p5_crpt2.o: p5_crpt2.c | ||
605 | p_dec.o: ../../e_os.h ../../include/openssl/asn1.h ../../include/openssl/bio.h | 643 | p_dec.o: ../../e_os.h ../../include/openssl/asn1.h ../../include/openssl/bio.h |
606 | p_dec.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | 644 | p_dec.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h |
607 | p_dec.o: ../../include/openssl/e_os2.h ../../include/openssl/ec.h | 645 | p_dec.o: ../../include/openssl/e_os2.h ../../include/openssl/ec.h |
diff --git a/src/lib/libcrypto/evp/bio_md.c b/src/lib/libcrypto/evp/bio_md.c index 9841e32e1a..144fdfd56a 100644 --- a/src/lib/libcrypto/evp/bio_md.c +++ b/src/lib/libcrypto/evp/bio_md.c | |||
@@ -153,8 +153,12 @@ static int md_write(BIO *b, const char *in, int inl) | |||
153 | { | 153 | { |
154 | if (ret > 0) | 154 | if (ret > 0) |
155 | { | 155 | { |
156 | EVP_DigestUpdate(ctx,(const unsigned char *)in, | 156 | if (!EVP_DigestUpdate(ctx,(const unsigned char *)in, |
157 | (unsigned int)ret); | 157 | (unsigned int)ret)) |
158 | { | ||
159 | BIO_clear_retry_flags(b); | ||
160 | return 0; | ||
161 | } | ||
158 | } | 162 | } |
159 | } | 163 | } |
160 | if(b->next_bio != NULL) | 164 | if(b->next_bio != NULL) |
@@ -220,7 +224,8 @@ static long md_ctrl(BIO *b, int cmd, long num, void *ptr) | |||
220 | case BIO_CTRL_DUP: | 224 | case BIO_CTRL_DUP: |
221 | dbio=ptr; | 225 | dbio=ptr; |
222 | dctx=dbio->ptr; | 226 | dctx=dbio->ptr; |
223 | EVP_MD_CTX_copy_ex(dctx,ctx); | 227 | if (!EVP_MD_CTX_copy_ex(dctx,ctx)) |
228 | return 0; | ||
224 | b->init=1; | 229 | b->init=1; |
225 | break; | 230 | break; |
226 | default: | 231 | default: |
diff --git a/src/lib/libcrypto/evp/bio_ok.c b/src/lib/libcrypto/evp/bio_ok.c index 98bc1ab409..e64335353f 100644 --- a/src/lib/libcrypto/evp/bio_ok.c +++ b/src/lib/libcrypto/evp/bio_ok.c | |||
@@ -133,10 +133,10 @@ static int ok_new(BIO *h); | |||
133 | static int ok_free(BIO *data); | 133 | static int ok_free(BIO *data); |
134 | static long ok_callback_ctrl(BIO *h, int cmd, bio_info_cb *fp); | 134 | static long ok_callback_ctrl(BIO *h, int cmd, bio_info_cb *fp); |
135 | 135 | ||
136 | static void sig_out(BIO* b); | 136 | static int sig_out(BIO* b); |
137 | static void sig_in(BIO* b); | 137 | static int sig_in(BIO* b); |
138 | static void block_out(BIO* b); | 138 | static int block_out(BIO* b); |
139 | static void block_in(BIO* b); | 139 | static int block_in(BIO* b); |
140 | #define OK_BLOCK_SIZE (1024*4) | 140 | #define OK_BLOCK_SIZE (1024*4) |
141 | #define OK_BLOCK_BLOCK 4 | 141 | #define OK_BLOCK_BLOCK 4 |
142 | #define IOBS (OK_BLOCK_SIZE+ OK_BLOCK_BLOCK+ 3*EVP_MAX_MD_SIZE) | 142 | #define IOBS (OK_BLOCK_SIZE+ OK_BLOCK_BLOCK+ 3*EVP_MAX_MD_SIZE) |
@@ -266,10 +266,24 @@ static int ok_read(BIO *b, char *out, int outl) | |||
266 | ctx->buf_len+= i; | 266 | ctx->buf_len+= i; |
267 | 267 | ||
268 | /* no signature yet -- check if we got one */ | 268 | /* no signature yet -- check if we got one */ |
269 | if (ctx->sigio == 1) sig_in(b); | 269 | if (ctx->sigio == 1) |
270 | { | ||
271 | if (!sig_in(b)) | ||
272 | { | ||
273 | BIO_clear_retry_flags(b); | ||
274 | return 0; | ||
275 | } | ||
276 | } | ||
270 | 277 | ||
271 | /* signature ok -- check if we got block */ | 278 | /* signature ok -- check if we got block */ |
272 | if (ctx->sigio == 0) block_in(b); | 279 | if (ctx->sigio == 0) |
280 | { | ||
281 | if (!block_in(b)) | ||
282 | { | ||
283 | BIO_clear_retry_flags(b); | ||
284 | return 0; | ||
285 | } | ||
286 | } | ||
273 | 287 | ||
274 | /* invalid block -- cancel */ | 288 | /* invalid block -- cancel */ |
275 | if (ctx->cont <= 0) break; | 289 | if (ctx->cont <= 0) break; |
@@ -293,7 +307,8 @@ static int ok_write(BIO *b, const char *in, int inl) | |||
293 | 307 | ||
294 | if ((ctx == NULL) || (b->next_bio == NULL) || (b->init == 0)) return(0); | 308 | if ((ctx == NULL) || (b->next_bio == NULL) || (b->init == 0)) return(0); |
295 | 309 | ||
296 | if(ctx->sigio) sig_out(b); | 310 | if(ctx->sigio && !sig_out(b)) |
311 | return 0; | ||
297 | 312 | ||
298 | do{ | 313 | do{ |
299 | BIO_clear_retry_flags(b); | 314 | BIO_clear_retry_flags(b); |
@@ -332,7 +347,11 @@ static int ok_write(BIO *b, const char *in, int inl) | |||
332 | 347 | ||
333 | if(ctx->buf_len >= OK_BLOCK_SIZE+ OK_BLOCK_BLOCK) | 348 | if(ctx->buf_len >= OK_BLOCK_SIZE+ OK_BLOCK_BLOCK) |
334 | { | 349 | { |
335 | block_out(b); | 350 | if (!block_out(b)) |
351 | { | ||
352 | BIO_clear_retry_flags(b); | ||
353 | return 0; | ||
354 | } | ||
336 | } | 355 | } |
337 | }while(inl > 0); | 356 | }while(inl > 0); |
338 | 357 | ||
@@ -379,7 +398,8 @@ static long ok_ctrl(BIO *b, int cmd, long num, void *ptr) | |||
379 | case BIO_CTRL_FLUSH: | 398 | case BIO_CTRL_FLUSH: |
380 | /* do a final write */ | 399 | /* do a final write */ |
381 | if(ctx->blockout == 0) | 400 | if(ctx->blockout == 0) |
382 | block_out(b); | 401 | if (!block_out(b)) |
402 | return 0; | ||
383 | 403 | ||
384 | while (ctx->blockout) | 404 | while (ctx->blockout) |
385 | { | 405 | { |
@@ -408,7 +428,8 @@ static long ok_ctrl(BIO *b, int cmd, long num, void *ptr) | |||
408 | break; | 428 | break; |
409 | case BIO_C_SET_MD: | 429 | case BIO_C_SET_MD: |
410 | md=ptr; | 430 | md=ptr; |
411 | EVP_DigestInit_ex(&ctx->md, md, NULL); | 431 | if (!EVP_DigestInit_ex(&ctx->md, md, NULL)) |
432 | return 0; | ||
412 | b->init=1; | 433 | b->init=1; |
413 | break; | 434 | break; |
414 | case BIO_C_GET_MD: | 435 | case BIO_C_GET_MD: |
@@ -455,7 +476,7 @@ static void longswap(void *_ptr, size_t len) | |||
455 | } | 476 | } |
456 | } | 477 | } |
457 | 478 | ||
458 | static void sig_out(BIO* b) | 479 | static int sig_out(BIO* b) |
459 | { | 480 | { |
460 | BIO_OK_CTX *ctx; | 481 | BIO_OK_CTX *ctx; |
461 | EVP_MD_CTX *md; | 482 | EVP_MD_CTX *md; |
@@ -463,9 +484,10 @@ static void sig_out(BIO* b) | |||
463 | ctx=b->ptr; | 484 | ctx=b->ptr; |
464 | md=&ctx->md; | 485 | md=&ctx->md; |
465 | 486 | ||
466 | if(ctx->buf_len+ 2* md->digest->md_size > OK_BLOCK_SIZE) return; | 487 | if(ctx->buf_len+ 2* md->digest->md_size > OK_BLOCK_SIZE) return 1; |
467 | 488 | ||
468 | EVP_DigestInit_ex(md, md->digest, NULL); | 489 | if (!EVP_DigestInit_ex(md, md->digest, NULL)) |
490 | goto berr; | ||
469 | /* FIXME: there's absolutely no guarantee this makes any sense at all, | 491 | /* FIXME: there's absolutely no guarantee this makes any sense at all, |
470 | * particularly now EVP_MD_CTX has been restructured. | 492 | * particularly now EVP_MD_CTX has been restructured. |
471 | */ | 493 | */ |
@@ -474,14 +496,20 @@ static void sig_out(BIO* b) | |||
474 | longswap(&(ctx->buf[ctx->buf_len]), md->digest->md_size); | 496 | longswap(&(ctx->buf[ctx->buf_len]), md->digest->md_size); |
475 | ctx->buf_len+= md->digest->md_size; | 497 | ctx->buf_len+= md->digest->md_size; |
476 | 498 | ||
477 | EVP_DigestUpdate(md, WELLKNOWN, strlen(WELLKNOWN)); | 499 | if (!EVP_DigestUpdate(md, WELLKNOWN, strlen(WELLKNOWN))) |
478 | EVP_DigestFinal_ex(md, &(ctx->buf[ctx->buf_len]), NULL); | 500 | goto berr; |
501 | if (!EVP_DigestFinal_ex(md, &(ctx->buf[ctx->buf_len]), NULL)) | ||
502 | goto berr; | ||
479 | ctx->buf_len+= md->digest->md_size; | 503 | ctx->buf_len+= md->digest->md_size; |
480 | ctx->blockout= 1; | 504 | ctx->blockout= 1; |
481 | ctx->sigio= 0; | 505 | ctx->sigio= 0; |
506 | return 1; | ||
507 | berr: | ||
508 | BIO_clear_retry_flags(b); | ||
509 | return 0; | ||
482 | } | 510 | } |
483 | 511 | ||
484 | static void sig_in(BIO* b) | 512 | static int sig_in(BIO* b) |
485 | { | 513 | { |
486 | BIO_OK_CTX *ctx; | 514 | BIO_OK_CTX *ctx; |
487 | EVP_MD_CTX *md; | 515 | EVP_MD_CTX *md; |
@@ -491,15 +519,18 @@ static void sig_in(BIO* b) | |||
491 | ctx=b->ptr; | 519 | ctx=b->ptr; |
492 | md=&ctx->md; | 520 | md=&ctx->md; |
493 | 521 | ||
494 | if((int)(ctx->buf_len-ctx->buf_off) < 2*md->digest->md_size) return; | 522 | if((int)(ctx->buf_len-ctx->buf_off) < 2*md->digest->md_size) return 1; |
495 | 523 | ||
496 | EVP_DigestInit_ex(md, md->digest, NULL); | 524 | if (!EVP_DigestInit_ex(md, md->digest, NULL)) |
525 | goto berr; | ||
497 | memcpy(md->md_data, &(ctx->buf[ctx->buf_off]), md->digest->md_size); | 526 | memcpy(md->md_data, &(ctx->buf[ctx->buf_off]), md->digest->md_size); |
498 | longswap(md->md_data, md->digest->md_size); | 527 | longswap(md->md_data, md->digest->md_size); |
499 | ctx->buf_off+= md->digest->md_size; | 528 | ctx->buf_off+= md->digest->md_size; |
500 | 529 | ||
501 | EVP_DigestUpdate(md, WELLKNOWN, strlen(WELLKNOWN)); | 530 | if (!EVP_DigestUpdate(md, WELLKNOWN, strlen(WELLKNOWN))) |
502 | EVP_DigestFinal_ex(md, tmp, NULL); | 531 | goto berr; |
532 | if (!EVP_DigestFinal_ex(md, tmp, NULL)) | ||
533 | goto berr; | ||
503 | ret= memcmp(&(ctx->buf[ctx->buf_off]), tmp, md->digest->md_size) == 0; | 534 | ret= memcmp(&(ctx->buf[ctx->buf_off]), tmp, md->digest->md_size) == 0; |
504 | ctx->buf_off+= md->digest->md_size; | 535 | ctx->buf_off+= md->digest->md_size; |
505 | if(ret == 1) | 536 | if(ret == 1) |
@@ -516,9 +547,13 @@ static void sig_in(BIO* b) | |||
516 | { | 547 | { |
517 | ctx->cont= 0; | 548 | ctx->cont= 0; |
518 | } | 549 | } |
550 | return 1; | ||
551 | berr: | ||
552 | BIO_clear_retry_flags(b); | ||
553 | return 0; | ||
519 | } | 554 | } |
520 | 555 | ||
521 | static void block_out(BIO* b) | 556 | static int block_out(BIO* b) |
522 | { | 557 | { |
523 | BIO_OK_CTX *ctx; | 558 | BIO_OK_CTX *ctx; |
524 | EVP_MD_CTX *md; | 559 | EVP_MD_CTX *md; |
@@ -532,13 +567,20 @@ static void block_out(BIO* b) | |||
532 | ctx->buf[1]=(unsigned char)(tl>>16); | 567 | ctx->buf[1]=(unsigned char)(tl>>16); |
533 | ctx->buf[2]=(unsigned char)(tl>>8); | 568 | ctx->buf[2]=(unsigned char)(tl>>8); |
534 | ctx->buf[3]=(unsigned char)(tl); | 569 | ctx->buf[3]=(unsigned char)(tl); |
535 | EVP_DigestUpdate(md, (unsigned char*) &(ctx->buf[OK_BLOCK_BLOCK]), tl); | 570 | if (!EVP_DigestUpdate(md, |
536 | EVP_DigestFinal_ex(md, &(ctx->buf[ctx->buf_len]), NULL); | 571 | (unsigned char*) &(ctx->buf[OK_BLOCK_BLOCK]), tl)) |
572 | goto berr; | ||
573 | if (!EVP_DigestFinal_ex(md, &(ctx->buf[ctx->buf_len]), NULL)) | ||
574 | goto berr; | ||
537 | ctx->buf_len+= md->digest->md_size; | 575 | ctx->buf_len+= md->digest->md_size; |
538 | ctx->blockout= 1; | 576 | ctx->blockout= 1; |
577 | return 1; | ||
578 | berr: | ||
579 | BIO_clear_retry_flags(b); | ||
580 | return 0; | ||
539 | } | 581 | } |
540 | 582 | ||
541 | static void block_in(BIO* b) | 583 | static int block_in(BIO* b) |
542 | { | 584 | { |
543 | BIO_OK_CTX *ctx; | 585 | BIO_OK_CTX *ctx; |
544 | EVP_MD_CTX *md; | 586 | EVP_MD_CTX *md; |
@@ -554,10 +596,13 @@ static void block_in(BIO* b) | |||
554 | tl|=ctx->buf[2]; tl<<=8; | 596 | tl|=ctx->buf[2]; tl<<=8; |
555 | tl|=ctx->buf[3]; | 597 | tl|=ctx->buf[3]; |
556 | 598 | ||
557 | if (ctx->buf_len < tl+ OK_BLOCK_BLOCK+ md->digest->md_size) return; | 599 | if (ctx->buf_len < tl+ OK_BLOCK_BLOCK+ md->digest->md_size) return 1; |
558 | 600 | ||
559 | EVP_DigestUpdate(md, (unsigned char*) &(ctx->buf[OK_BLOCK_BLOCK]), tl); | 601 | if (!EVP_DigestUpdate(md, |
560 | EVP_DigestFinal_ex(md, tmp, NULL); | 602 | (unsigned char*) &(ctx->buf[OK_BLOCK_BLOCK]), tl)) |
603 | goto berr; | ||
604 | if (!EVP_DigestFinal_ex(md, tmp, NULL)) | ||
605 | goto berr; | ||
561 | if(memcmp(&(ctx->buf[tl+ OK_BLOCK_BLOCK]), tmp, md->digest->md_size) == 0) | 606 | if(memcmp(&(ctx->buf[tl+ OK_BLOCK_BLOCK]), tmp, md->digest->md_size) == 0) |
562 | { | 607 | { |
563 | /* there might be parts from next block lurking around ! */ | 608 | /* there might be parts from next block lurking around ! */ |
@@ -571,5 +616,9 @@ static void block_in(BIO* b) | |||
571 | { | 616 | { |
572 | ctx->cont= 0; | 617 | ctx->cont= 0; |
573 | } | 618 | } |
619 | return 1; | ||
620 | berr: | ||
621 | BIO_clear_retry_flags(b); | ||
622 | return 0; | ||
574 | } | 623 | } |
575 | 624 | ||
diff --git a/src/lib/libcrypto/evp/c_allc.c b/src/lib/libcrypto/evp/c_allc.c index c5f9268378..2a45d435e5 100644 --- a/src/lib/libcrypto/evp/c_allc.c +++ b/src/lib/libcrypto/evp/c_allc.c | |||
@@ -98,6 +98,9 @@ void OpenSSL_add_all_ciphers(void) | |||
98 | #ifndef OPENSSL_NO_RC4 | 98 | #ifndef OPENSSL_NO_RC4 |
99 | EVP_add_cipher(EVP_rc4()); | 99 | EVP_add_cipher(EVP_rc4()); |
100 | EVP_add_cipher(EVP_rc4_40()); | 100 | EVP_add_cipher(EVP_rc4_40()); |
101 | #ifndef OPENSSL_NO_MD5 | ||
102 | EVP_add_cipher(EVP_rc4_hmac_md5()); | ||
103 | #endif | ||
101 | #endif | 104 | #endif |
102 | 105 | ||
103 | #ifndef OPENSSL_NO_IDEA | 106 | #ifndef OPENSSL_NO_IDEA |
@@ -166,9 +169,9 @@ void OpenSSL_add_all_ciphers(void) | |||
166 | EVP_add_cipher(EVP_aes_128_cfb1()); | 169 | EVP_add_cipher(EVP_aes_128_cfb1()); |
167 | EVP_add_cipher(EVP_aes_128_cfb8()); | 170 | EVP_add_cipher(EVP_aes_128_cfb8()); |
168 | EVP_add_cipher(EVP_aes_128_ofb()); | 171 | EVP_add_cipher(EVP_aes_128_ofb()); |
169 | #if 0 | ||
170 | EVP_add_cipher(EVP_aes_128_ctr()); | 172 | EVP_add_cipher(EVP_aes_128_ctr()); |
171 | #endif | 173 | EVP_add_cipher(EVP_aes_128_gcm()); |
174 | EVP_add_cipher(EVP_aes_128_xts()); | ||
172 | EVP_add_cipher_alias(SN_aes_128_cbc,"AES128"); | 175 | EVP_add_cipher_alias(SN_aes_128_cbc,"AES128"); |
173 | EVP_add_cipher_alias(SN_aes_128_cbc,"aes128"); | 176 | EVP_add_cipher_alias(SN_aes_128_cbc,"aes128"); |
174 | EVP_add_cipher(EVP_aes_192_ecb()); | 177 | EVP_add_cipher(EVP_aes_192_ecb()); |
@@ -177,9 +180,8 @@ void OpenSSL_add_all_ciphers(void) | |||
177 | EVP_add_cipher(EVP_aes_192_cfb1()); | 180 | EVP_add_cipher(EVP_aes_192_cfb1()); |
178 | EVP_add_cipher(EVP_aes_192_cfb8()); | 181 | EVP_add_cipher(EVP_aes_192_cfb8()); |
179 | EVP_add_cipher(EVP_aes_192_ofb()); | 182 | EVP_add_cipher(EVP_aes_192_ofb()); |
180 | #if 0 | ||
181 | EVP_add_cipher(EVP_aes_192_ctr()); | 183 | EVP_add_cipher(EVP_aes_192_ctr()); |
182 | #endif | 184 | EVP_add_cipher(EVP_aes_192_gcm()); |
183 | EVP_add_cipher_alias(SN_aes_192_cbc,"AES192"); | 185 | EVP_add_cipher_alias(SN_aes_192_cbc,"AES192"); |
184 | EVP_add_cipher_alias(SN_aes_192_cbc,"aes192"); | 186 | EVP_add_cipher_alias(SN_aes_192_cbc,"aes192"); |
185 | EVP_add_cipher(EVP_aes_256_ecb()); | 187 | EVP_add_cipher(EVP_aes_256_ecb()); |
@@ -188,11 +190,15 @@ void OpenSSL_add_all_ciphers(void) | |||
188 | EVP_add_cipher(EVP_aes_256_cfb1()); | 190 | EVP_add_cipher(EVP_aes_256_cfb1()); |
189 | EVP_add_cipher(EVP_aes_256_cfb8()); | 191 | EVP_add_cipher(EVP_aes_256_cfb8()); |
190 | EVP_add_cipher(EVP_aes_256_ofb()); | 192 | EVP_add_cipher(EVP_aes_256_ofb()); |
191 | #if 0 | ||
192 | EVP_add_cipher(EVP_aes_256_ctr()); | 193 | EVP_add_cipher(EVP_aes_256_ctr()); |
193 | #endif | 194 | EVP_add_cipher(EVP_aes_256_gcm()); |
195 | EVP_add_cipher(EVP_aes_256_xts()); | ||
194 | EVP_add_cipher_alias(SN_aes_256_cbc,"AES256"); | 196 | EVP_add_cipher_alias(SN_aes_256_cbc,"AES256"); |
195 | EVP_add_cipher_alias(SN_aes_256_cbc,"aes256"); | 197 | EVP_add_cipher_alias(SN_aes_256_cbc,"aes256"); |
198 | #if !defined(OPENSSL_NO_SHA) && !defined(OPENSSL_NO_SHA1) | ||
199 | EVP_add_cipher(EVP_aes_128_cbc_hmac_sha1()); | ||
200 | EVP_add_cipher(EVP_aes_256_cbc_hmac_sha1()); | ||
201 | #endif | ||
196 | #endif | 202 | #endif |
197 | 203 | ||
198 | #ifndef OPENSSL_NO_CAMELLIA | 204 | #ifndef OPENSSL_NO_CAMELLIA |
diff --git a/src/lib/libcrypto/evp/digest.c b/src/lib/libcrypto/evp/digest.c index 982ba2b136..467e6b5ae9 100644 --- a/src/lib/libcrypto/evp/digest.c +++ b/src/lib/libcrypto/evp/digest.c | |||
@@ -117,6 +117,10 @@ | |||
117 | #include <openssl/engine.h> | 117 | #include <openssl/engine.h> |
118 | #endif | 118 | #endif |
119 | 119 | ||
120 | #ifdef OPENSSL_FIPS | ||
121 | #include <openssl/fips.h> | ||
122 | #endif | ||
123 | |||
120 | void EVP_MD_CTX_init(EVP_MD_CTX *ctx) | 124 | void EVP_MD_CTX_init(EVP_MD_CTX *ctx) |
121 | { | 125 | { |
122 | memset(ctx,'\0',sizeof *ctx); | 126 | memset(ctx,'\0',sizeof *ctx); |
@@ -225,12 +229,26 @@ skip_to_init: | |||
225 | } | 229 | } |
226 | if (ctx->flags & EVP_MD_CTX_FLAG_NO_INIT) | 230 | if (ctx->flags & EVP_MD_CTX_FLAG_NO_INIT) |
227 | return 1; | 231 | return 1; |
232 | #ifdef OPENSSL_FIPS | ||
233 | if (FIPS_mode()) | ||
234 | { | ||
235 | if (FIPS_digestinit(ctx, type)) | ||
236 | return 1; | ||
237 | OPENSSL_free(ctx->md_data); | ||
238 | ctx->md_data = NULL; | ||
239 | return 0; | ||
240 | } | ||
241 | #endif | ||
228 | return ctx->digest->init(ctx); | 242 | return ctx->digest->init(ctx); |
229 | } | 243 | } |
230 | 244 | ||
231 | int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *data, size_t count) | 245 | int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *data, size_t count) |
232 | { | 246 | { |
247 | #ifdef OPENSSL_FIPS | ||
248 | return FIPS_digestupdate(ctx, data, count); | ||
249 | #else | ||
233 | return ctx->update(ctx,data,count); | 250 | return ctx->update(ctx,data,count); |
251 | #endif | ||
234 | } | 252 | } |
235 | 253 | ||
236 | /* The caller can assume that this removes any secret data from the context */ | 254 | /* The caller can assume that this removes any secret data from the context */ |
@@ -245,8 +263,10 @@ int EVP_DigestFinal(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) | |||
245 | /* The caller can assume that this removes any secret data from the context */ | 263 | /* The caller can assume that this removes any secret data from the context */ |
246 | int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) | 264 | int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) |
247 | { | 265 | { |
266 | #ifdef OPENSSL_FIPS | ||
267 | return FIPS_digestfinal(ctx, md, size); | ||
268 | #else | ||
248 | int ret; | 269 | int ret; |
249 | |||
250 | OPENSSL_assert(ctx->digest->md_size <= EVP_MAX_MD_SIZE); | 270 | OPENSSL_assert(ctx->digest->md_size <= EVP_MAX_MD_SIZE); |
251 | ret=ctx->digest->final(ctx,md); | 271 | ret=ctx->digest->final(ctx,md); |
252 | if (size != NULL) | 272 | if (size != NULL) |
@@ -258,6 +278,7 @@ int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) | |||
258 | } | 278 | } |
259 | memset(ctx->md_data,0,ctx->digest->ctx_size); | 279 | memset(ctx->md_data,0,ctx->digest->ctx_size); |
260 | return ret; | 280 | return ret; |
281 | #endif | ||
261 | } | 282 | } |
262 | 283 | ||
263 | int EVP_MD_CTX_copy(EVP_MD_CTX *out, const EVP_MD_CTX *in) | 284 | int EVP_MD_CTX_copy(EVP_MD_CTX *out, const EVP_MD_CTX *in) |
@@ -351,6 +372,7 @@ void EVP_MD_CTX_destroy(EVP_MD_CTX *ctx) | |||
351 | /* This call frees resources associated with the context */ | 372 | /* This call frees resources associated with the context */ |
352 | int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx) | 373 | int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx) |
353 | { | 374 | { |
375 | #ifndef OPENSSL_FIPS | ||
354 | /* Don't assume ctx->md_data was cleaned in EVP_Digest_Final, | 376 | /* Don't assume ctx->md_data was cleaned in EVP_Digest_Final, |
355 | * because sometimes only copies of the context are ever finalised. | 377 | * because sometimes only copies of the context are ever finalised. |
356 | */ | 378 | */ |
@@ -363,6 +385,7 @@ int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx) | |||
363 | OPENSSL_cleanse(ctx->md_data,ctx->digest->ctx_size); | 385 | OPENSSL_cleanse(ctx->md_data,ctx->digest->ctx_size); |
364 | OPENSSL_free(ctx->md_data); | 386 | OPENSSL_free(ctx->md_data); |
365 | } | 387 | } |
388 | #endif | ||
366 | if (ctx->pctx) | 389 | if (ctx->pctx) |
367 | EVP_PKEY_CTX_free(ctx->pctx); | 390 | EVP_PKEY_CTX_free(ctx->pctx); |
368 | #ifndef OPENSSL_NO_ENGINE | 391 | #ifndef OPENSSL_NO_ENGINE |
@@ -371,6 +394,9 @@ int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx) | |||
371 | * functional reference we held for this reason. */ | 394 | * functional reference we held for this reason. */ |
372 | ENGINE_finish(ctx->engine); | 395 | ENGINE_finish(ctx->engine); |
373 | #endif | 396 | #endif |
397 | #ifdef OPENSSL_FIPS | ||
398 | FIPS_md_ctx_cleanup(ctx); | ||
399 | #endif | ||
374 | memset(ctx,'\0',sizeof *ctx); | 400 | memset(ctx,'\0',sizeof *ctx); |
375 | 401 | ||
376 | return 1; | 402 | return 1; |
diff --git a/src/lib/libcrypto/evp/e_aes.c b/src/lib/libcrypto/evp/e_aes.c index bd6c0a3a62..1e4af0cb75 100644 --- a/src/lib/libcrypto/evp/e_aes.c +++ b/src/lib/libcrypto/evp/e_aes.c | |||
@@ -1,5 +1,5 @@ | |||
1 | /* ==================================================================== | 1 | /* ==================================================================== |
2 | * Copyright (c) 2001 The OpenSSL Project. All rights reserved. | 2 | * Copyright (c) 2001-2011 The OpenSSL Project. All rights reserved. |
3 | * | 3 | * |
4 | * Redistribution and use in source and binary forms, with or without | 4 | * Redistribution and use in source and binary forms, with or without |
5 | * modification, are permitted provided that the following conditions | 5 | * modification, are permitted provided that the following conditions |
@@ -56,57 +56,511 @@ | |||
56 | #include <assert.h> | 56 | #include <assert.h> |
57 | #include <openssl/aes.h> | 57 | #include <openssl/aes.h> |
58 | #include "evp_locl.h" | 58 | #include "evp_locl.h" |
59 | 59 | #ifndef OPENSSL_FIPS | |
60 | static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 60 | #include "modes_lcl.h" |
61 | const unsigned char *iv, int enc); | 61 | #include <openssl/rand.h> |
62 | 62 | ||
63 | typedef struct | 63 | typedef struct |
64 | { | 64 | { |
65 | AES_KEY ks; | 65 | AES_KEY ks; |
66 | block128_f block; | ||
67 | union { | ||
68 | cbc128_f cbc; | ||
69 | ctr128_f ctr; | ||
70 | } stream; | ||
66 | } EVP_AES_KEY; | 71 | } EVP_AES_KEY; |
67 | 72 | ||
68 | #define data(ctx) EVP_C_DATA(EVP_AES_KEY,ctx) | 73 | typedef struct |
69 | 74 | { | |
70 | IMPLEMENT_BLOCK_CIPHER(aes_128, ks, AES, EVP_AES_KEY, | 75 | AES_KEY ks; /* AES key schedule to use */ |
71 | NID_aes_128, 16, 16, 16, 128, | 76 | int key_set; /* Set if key initialised */ |
72 | 0, aes_init_key, NULL, | 77 | int iv_set; /* Set if an iv is set */ |
73 | EVP_CIPHER_set_asn1_iv, | 78 | GCM128_CONTEXT gcm; |
74 | EVP_CIPHER_get_asn1_iv, | 79 | unsigned char *iv; /* Temporary IV store */ |
75 | NULL) | 80 | int ivlen; /* IV length */ |
76 | IMPLEMENT_BLOCK_CIPHER(aes_192, ks, AES, EVP_AES_KEY, | 81 | int taglen; |
77 | NID_aes_192, 16, 24, 16, 128, | 82 | int iv_gen; /* It is OK to generate IVs */ |
78 | 0, aes_init_key, NULL, | 83 | int tls_aad_len; /* TLS AAD length */ |
79 | EVP_CIPHER_set_asn1_iv, | 84 | ctr128_f ctr; |
80 | EVP_CIPHER_get_asn1_iv, | 85 | } EVP_AES_GCM_CTX; |
81 | NULL) | 86 | |
82 | IMPLEMENT_BLOCK_CIPHER(aes_256, ks, AES, EVP_AES_KEY, | 87 | typedef struct |
83 | NID_aes_256, 16, 32, 16, 128, | 88 | { |
84 | 0, aes_init_key, NULL, | 89 | AES_KEY ks1, ks2; /* AES key schedules to use */ |
85 | EVP_CIPHER_set_asn1_iv, | 90 | XTS128_CONTEXT xts; |
86 | EVP_CIPHER_get_asn1_iv, | 91 | void (*stream)(const unsigned char *in, |
87 | NULL) | 92 | unsigned char *out, size_t length, |
88 | 93 | const AES_KEY *key1, const AES_KEY *key2, | |
89 | #define IMPLEMENT_AES_CFBR(ksize,cbits) IMPLEMENT_CFBR(aes,AES,EVP_AES_KEY,ks,ksize,cbits,16) | 94 | const unsigned char iv[16]); |
90 | 95 | } EVP_AES_XTS_CTX; | |
91 | IMPLEMENT_AES_CFBR(128,1) | 96 | |
92 | IMPLEMENT_AES_CFBR(192,1) | 97 | typedef struct |
93 | IMPLEMENT_AES_CFBR(256,1) | 98 | { |
94 | 99 | AES_KEY ks; /* AES key schedule to use */ | |
95 | IMPLEMENT_AES_CFBR(128,8) | 100 | int key_set; /* Set if key initialised */ |
96 | IMPLEMENT_AES_CFBR(192,8) | 101 | int iv_set; /* Set if an iv is set */ |
97 | IMPLEMENT_AES_CFBR(256,8) | 102 | int tag_set; /* Set if tag is valid */ |
103 | int len_set; /* Set if message length set */ | ||
104 | int L, M; /* L and M parameters from RFC3610 */ | ||
105 | CCM128_CONTEXT ccm; | ||
106 | ccm128_f str; | ||
107 | } EVP_AES_CCM_CTX; | ||
108 | |||
109 | #define MAXBITCHUNK ((size_t)1<<(sizeof(size_t)*8-4)) | ||
110 | |||
111 | #ifdef VPAES_ASM | ||
112 | int vpaes_set_encrypt_key(const unsigned char *userKey, int bits, | ||
113 | AES_KEY *key); | ||
114 | int vpaes_set_decrypt_key(const unsigned char *userKey, int bits, | ||
115 | AES_KEY *key); | ||
116 | |||
117 | void vpaes_encrypt(const unsigned char *in, unsigned char *out, | ||
118 | const AES_KEY *key); | ||
119 | void vpaes_decrypt(const unsigned char *in, unsigned char *out, | ||
120 | const AES_KEY *key); | ||
121 | |||
122 | void vpaes_cbc_encrypt(const unsigned char *in, | ||
123 | unsigned char *out, | ||
124 | size_t length, | ||
125 | const AES_KEY *key, | ||
126 | unsigned char *ivec, int enc); | ||
127 | #endif | ||
128 | #ifdef BSAES_ASM | ||
129 | void bsaes_cbc_encrypt(const unsigned char *in, unsigned char *out, | ||
130 | size_t length, const AES_KEY *key, | ||
131 | unsigned char ivec[16], int enc); | ||
132 | void bsaes_ctr32_encrypt_blocks(const unsigned char *in, unsigned char *out, | ||
133 | size_t len, const AES_KEY *key, | ||
134 | const unsigned char ivec[16]); | ||
135 | void bsaes_xts_encrypt(const unsigned char *inp, unsigned char *out, | ||
136 | size_t len, const AES_KEY *key1, | ||
137 | const AES_KEY *key2, const unsigned char iv[16]); | ||
138 | void bsaes_xts_decrypt(const unsigned char *inp, unsigned char *out, | ||
139 | size_t len, const AES_KEY *key1, | ||
140 | const AES_KEY *key2, const unsigned char iv[16]); | ||
141 | #endif | ||
142 | #ifdef AES_CTR_ASM | ||
143 | void AES_ctr32_encrypt(const unsigned char *in, unsigned char *out, | ||
144 | size_t blocks, const AES_KEY *key, | ||
145 | const unsigned char ivec[AES_BLOCK_SIZE]); | ||
146 | #endif | ||
147 | #ifdef AES_XTS_ASM | ||
148 | void AES_xts_encrypt(const char *inp,char *out,size_t len, | ||
149 | const AES_KEY *key1, const AES_KEY *key2, | ||
150 | const unsigned char iv[16]); | ||
151 | void AES_xts_decrypt(const char *inp,char *out,size_t len, | ||
152 | const AES_KEY *key1, const AES_KEY *key2, | ||
153 | const unsigned char iv[16]); | ||
154 | #endif | ||
155 | |||
156 | #if defined(AES_ASM) && !defined(I386_ONLY) && ( \ | ||
157 | ((defined(__i386) || defined(__i386__) || \ | ||
158 | defined(_M_IX86)) && defined(OPENSSL_IA32_SSE2))|| \ | ||
159 | defined(__x86_64) || defined(__x86_64__) || \ | ||
160 | defined(_M_AMD64) || defined(_M_X64) || \ | ||
161 | defined(__INTEL__) ) | ||
162 | |||
163 | extern unsigned int OPENSSL_ia32cap_P[2]; | ||
164 | |||
165 | #ifdef VPAES_ASM | ||
166 | #define VPAES_CAPABLE (OPENSSL_ia32cap_P[1]&(1<<(41-32))) | ||
167 | #endif | ||
168 | #ifdef BSAES_ASM | ||
169 | #define BSAES_CAPABLE VPAES_CAPABLE | ||
170 | #endif | ||
171 | /* | ||
172 | * AES-NI section | ||
173 | */ | ||
174 | #define AESNI_CAPABLE (OPENSSL_ia32cap_P[1]&(1<<(57-32))) | ||
175 | |||
176 | int aesni_set_encrypt_key(const unsigned char *userKey, int bits, | ||
177 | AES_KEY *key); | ||
178 | int aesni_set_decrypt_key(const unsigned char *userKey, int bits, | ||
179 | AES_KEY *key); | ||
180 | |||
181 | void aesni_encrypt(const unsigned char *in, unsigned char *out, | ||
182 | const AES_KEY *key); | ||
183 | void aesni_decrypt(const unsigned char *in, unsigned char *out, | ||
184 | const AES_KEY *key); | ||
185 | |||
186 | void aesni_ecb_encrypt(const unsigned char *in, | ||
187 | unsigned char *out, | ||
188 | size_t length, | ||
189 | const AES_KEY *key, | ||
190 | int enc); | ||
191 | void aesni_cbc_encrypt(const unsigned char *in, | ||
192 | unsigned char *out, | ||
193 | size_t length, | ||
194 | const AES_KEY *key, | ||
195 | unsigned char *ivec, int enc); | ||
196 | |||
197 | void aesni_ctr32_encrypt_blocks(const unsigned char *in, | ||
198 | unsigned char *out, | ||
199 | size_t blocks, | ||
200 | const void *key, | ||
201 | const unsigned char *ivec); | ||
202 | |||
203 | void aesni_xts_encrypt(const unsigned char *in, | ||
204 | unsigned char *out, | ||
205 | size_t length, | ||
206 | const AES_KEY *key1, const AES_KEY *key2, | ||
207 | const unsigned char iv[16]); | ||
208 | |||
209 | void aesni_xts_decrypt(const unsigned char *in, | ||
210 | unsigned char *out, | ||
211 | size_t length, | ||
212 | const AES_KEY *key1, const AES_KEY *key2, | ||
213 | const unsigned char iv[16]); | ||
214 | |||
215 | void aesni_ccm64_encrypt_blocks (const unsigned char *in, | ||
216 | unsigned char *out, | ||
217 | size_t blocks, | ||
218 | const void *key, | ||
219 | const unsigned char ivec[16], | ||
220 | unsigned char cmac[16]); | ||
221 | |||
222 | void aesni_ccm64_decrypt_blocks (const unsigned char *in, | ||
223 | unsigned char *out, | ||
224 | size_t blocks, | ||
225 | const void *key, | ||
226 | const unsigned char ivec[16], | ||
227 | unsigned char cmac[16]); | ||
228 | |||
229 | static int aesni_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
230 | const unsigned char *iv, int enc) | ||
231 | { | ||
232 | int ret, mode; | ||
233 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
234 | |||
235 | mode = ctx->cipher->flags & EVP_CIPH_MODE; | ||
236 | if ((mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE) | ||
237 | && !enc) | ||
238 | { | ||
239 | ret = aesni_set_decrypt_key(key, ctx->key_len*8, ctx->cipher_data); | ||
240 | dat->block = (block128_f)aesni_decrypt; | ||
241 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | ||
242 | (cbc128_f)aesni_cbc_encrypt : | ||
243 | NULL; | ||
244 | } | ||
245 | else { | ||
246 | ret = aesni_set_encrypt_key(key, ctx->key_len*8, ctx->cipher_data); | ||
247 | dat->block = (block128_f)aesni_encrypt; | ||
248 | if (mode==EVP_CIPH_CBC_MODE) | ||
249 | dat->stream.cbc = (cbc128_f)aesni_cbc_encrypt; | ||
250 | else if (mode==EVP_CIPH_CTR_MODE) | ||
251 | dat->stream.ctr = (ctr128_f)aesni_ctr32_encrypt_blocks; | ||
252 | else | ||
253 | dat->stream.cbc = NULL; | ||
254 | } | ||
255 | |||
256 | if(ret < 0) | ||
257 | { | ||
258 | EVPerr(EVP_F_AESNI_INIT_KEY,EVP_R_AES_KEY_SETUP_FAILED); | ||
259 | return 0; | ||
260 | } | ||
261 | |||
262 | return 1; | ||
263 | } | ||
264 | |||
265 | static int aesni_cbc_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
266 | const unsigned char *in, size_t len) | ||
267 | { | ||
268 | aesni_cbc_encrypt(in,out,len,ctx->cipher_data,ctx->iv,ctx->encrypt); | ||
269 | |||
270 | return 1; | ||
271 | } | ||
272 | |||
273 | static int aesni_ecb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
274 | const unsigned char *in, size_t len) | ||
275 | { | ||
276 | size_t bl = ctx->cipher->block_size; | ||
277 | |||
278 | if (len<bl) return 1; | ||
279 | |||
280 | aesni_ecb_encrypt(in,out,len,ctx->cipher_data,ctx->encrypt); | ||
281 | |||
282 | return 1; | ||
283 | } | ||
284 | |||
285 | #define aesni_ofb_cipher aes_ofb_cipher | ||
286 | static int aesni_ofb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
287 | const unsigned char *in,size_t len); | ||
288 | |||
289 | #define aesni_cfb_cipher aes_cfb_cipher | ||
290 | static int aesni_cfb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
291 | const unsigned char *in,size_t len); | ||
292 | |||
293 | #define aesni_cfb8_cipher aes_cfb8_cipher | ||
294 | static int aesni_cfb8_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
295 | const unsigned char *in,size_t len); | ||
296 | |||
297 | #define aesni_cfb1_cipher aes_cfb1_cipher | ||
298 | static int aesni_cfb1_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
299 | const unsigned char *in,size_t len); | ||
300 | |||
301 | #define aesni_ctr_cipher aes_ctr_cipher | ||
302 | static int aesni_ctr_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
303 | const unsigned char *in, size_t len); | ||
304 | |||
305 | static int aesni_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
306 | const unsigned char *iv, int enc) | ||
307 | { | ||
308 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | ||
309 | if (!iv && !key) | ||
310 | return 1; | ||
311 | if (key) | ||
312 | { | ||
313 | aesni_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks); | ||
314 | CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, | ||
315 | (block128_f)aesni_encrypt); | ||
316 | gctx->ctr = (ctr128_f)aesni_ctr32_encrypt_blocks; | ||
317 | /* If we have an iv can set it directly, otherwise use | ||
318 | * saved IV. | ||
319 | */ | ||
320 | if (iv == NULL && gctx->iv_set) | ||
321 | iv = gctx->iv; | ||
322 | if (iv) | ||
323 | { | ||
324 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | ||
325 | gctx->iv_set = 1; | ||
326 | } | ||
327 | gctx->key_set = 1; | ||
328 | } | ||
329 | else | ||
330 | { | ||
331 | /* If key set use IV, otherwise copy */ | ||
332 | if (gctx->key_set) | ||
333 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | ||
334 | else | ||
335 | memcpy(gctx->iv, iv, gctx->ivlen); | ||
336 | gctx->iv_set = 1; | ||
337 | gctx->iv_gen = 0; | ||
338 | } | ||
339 | return 1; | ||
340 | } | ||
341 | |||
342 | #define aesni_gcm_cipher aes_gcm_cipher | ||
343 | static int aesni_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
344 | const unsigned char *in, size_t len); | ||
345 | |||
346 | static int aesni_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
347 | const unsigned char *iv, int enc) | ||
348 | { | ||
349 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; | ||
350 | if (!iv && !key) | ||
351 | return 1; | ||
352 | |||
353 | if (key) | ||
354 | { | ||
355 | /* key_len is two AES keys */ | ||
356 | if (enc) | ||
357 | { | ||
358 | aesni_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
359 | xctx->xts.block1 = (block128_f)aesni_encrypt; | ||
360 | xctx->stream = aesni_xts_encrypt; | ||
361 | } | ||
362 | else | ||
363 | { | ||
364 | aesni_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
365 | xctx->xts.block1 = (block128_f)aesni_decrypt; | ||
366 | xctx->stream = aesni_xts_decrypt; | ||
367 | } | ||
368 | |||
369 | aesni_set_encrypt_key(key + ctx->key_len/2, | ||
370 | ctx->key_len * 4, &xctx->ks2); | ||
371 | xctx->xts.block2 = (block128_f)aesni_encrypt; | ||
372 | |||
373 | xctx->xts.key1 = &xctx->ks1; | ||
374 | } | ||
375 | |||
376 | if (iv) | ||
377 | { | ||
378 | xctx->xts.key2 = &xctx->ks2; | ||
379 | memcpy(ctx->iv, iv, 16); | ||
380 | } | ||
381 | |||
382 | return 1; | ||
383 | } | ||
384 | |||
385 | #define aesni_xts_cipher aes_xts_cipher | ||
386 | static int aesni_xts_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
387 | const unsigned char *in, size_t len); | ||
388 | |||
389 | static int aesni_ccm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
390 | const unsigned char *iv, int enc) | ||
391 | { | ||
392 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; | ||
393 | if (!iv && !key) | ||
394 | return 1; | ||
395 | if (key) | ||
396 | { | ||
397 | aesni_set_encrypt_key(key, ctx->key_len * 8, &cctx->ks); | ||
398 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, | ||
399 | &cctx->ks, (block128_f)aesni_encrypt); | ||
400 | cctx->str = enc?(ccm128_f)aesni_ccm64_encrypt_blocks : | ||
401 | (ccm128_f)aesni_ccm64_decrypt_blocks; | ||
402 | cctx->key_set = 1; | ||
403 | } | ||
404 | if (iv) | ||
405 | { | ||
406 | memcpy(ctx->iv, iv, 15 - cctx->L); | ||
407 | cctx->iv_set = 1; | ||
408 | } | ||
409 | return 1; | ||
410 | } | ||
411 | |||
412 | #define aesni_ccm_cipher aes_ccm_cipher | ||
413 | static int aesni_ccm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
414 | const unsigned char *in, size_t len); | ||
415 | |||
416 | #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ | ||
417 | static const EVP_CIPHER aesni_##keylen##_##mode = { \ | ||
418 | nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ | ||
419 | flags|EVP_CIPH_##MODE##_MODE, \ | ||
420 | aesni_init_key, \ | ||
421 | aesni_##mode##_cipher, \ | ||
422 | NULL, \ | ||
423 | sizeof(EVP_AES_KEY), \ | ||
424 | NULL,NULL,NULL,NULL }; \ | ||
425 | static const EVP_CIPHER aes_##keylen##_##mode = { \ | ||
426 | nid##_##keylen##_##nmode,blocksize, \ | ||
427 | keylen/8,ivlen, \ | ||
428 | flags|EVP_CIPH_##MODE##_MODE, \ | ||
429 | aes_init_key, \ | ||
430 | aes_##mode##_cipher, \ | ||
431 | NULL, \ | ||
432 | sizeof(EVP_AES_KEY), \ | ||
433 | NULL,NULL,NULL,NULL }; \ | ||
434 | const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \ | ||
435 | { return AESNI_CAPABLE?&aesni_##keylen##_##mode:&aes_##keylen##_##mode; } | ||
436 | |||
437 | #define BLOCK_CIPHER_custom(nid,keylen,blocksize,ivlen,mode,MODE,flags) \ | ||
438 | static const EVP_CIPHER aesni_##keylen##_##mode = { \ | ||
439 | nid##_##keylen##_##mode,blocksize, \ | ||
440 | (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ | ||
441 | flags|EVP_CIPH_##MODE##_MODE, \ | ||
442 | aesni_##mode##_init_key, \ | ||
443 | aesni_##mode##_cipher, \ | ||
444 | aes_##mode##_cleanup, \ | ||
445 | sizeof(EVP_AES_##MODE##_CTX), \ | ||
446 | NULL,NULL,aes_##mode##_ctrl,NULL }; \ | ||
447 | static const EVP_CIPHER aes_##keylen##_##mode = { \ | ||
448 | nid##_##keylen##_##mode,blocksize, \ | ||
449 | (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ | ||
450 | flags|EVP_CIPH_##MODE##_MODE, \ | ||
451 | aes_##mode##_init_key, \ | ||
452 | aes_##mode##_cipher, \ | ||
453 | aes_##mode##_cleanup, \ | ||
454 | sizeof(EVP_AES_##MODE##_CTX), \ | ||
455 | NULL,NULL,aes_##mode##_ctrl,NULL }; \ | ||
456 | const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \ | ||
457 | { return AESNI_CAPABLE?&aesni_##keylen##_##mode:&aes_##keylen##_##mode; } | ||
458 | |||
459 | #else | ||
460 | |||
461 | #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ | ||
462 | static const EVP_CIPHER aes_##keylen##_##mode = { \ | ||
463 | nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ | ||
464 | flags|EVP_CIPH_##MODE##_MODE, \ | ||
465 | aes_init_key, \ | ||
466 | aes_##mode##_cipher, \ | ||
467 | NULL, \ | ||
468 | sizeof(EVP_AES_KEY), \ | ||
469 | NULL,NULL,NULL,NULL }; \ | ||
470 | const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \ | ||
471 | { return &aes_##keylen##_##mode; } | ||
472 | |||
473 | #define BLOCK_CIPHER_custom(nid,keylen,blocksize,ivlen,mode,MODE,flags) \ | ||
474 | static const EVP_CIPHER aes_##keylen##_##mode = { \ | ||
475 | nid##_##keylen##_##mode,blocksize, \ | ||
476 | (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ | ||
477 | flags|EVP_CIPH_##MODE##_MODE, \ | ||
478 | aes_##mode##_init_key, \ | ||
479 | aes_##mode##_cipher, \ | ||
480 | aes_##mode##_cleanup, \ | ||
481 | sizeof(EVP_AES_##MODE##_CTX), \ | ||
482 | NULL,NULL,aes_##mode##_ctrl,NULL }; \ | ||
483 | const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \ | ||
484 | { return &aes_##keylen##_##mode; } | ||
485 | #endif | ||
486 | |||
487 | #define BLOCK_CIPHER_generic_pack(nid,keylen,flags) \ | ||
488 | BLOCK_CIPHER_generic(nid,keylen,16,16,cbc,cbc,CBC,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ | ||
489 | BLOCK_CIPHER_generic(nid,keylen,16,0,ecb,ecb,ECB,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ | ||
490 | BLOCK_CIPHER_generic(nid,keylen,1,16,ofb128,ofb,OFB,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ | ||
491 | BLOCK_CIPHER_generic(nid,keylen,1,16,cfb128,cfb,CFB,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ | ||
492 | BLOCK_CIPHER_generic(nid,keylen,1,16,cfb1,cfb1,CFB,flags) \ | ||
493 | BLOCK_CIPHER_generic(nid,keylen,1,16,cfb8,cfb8,CFB,flags) \ | ||
494 | BLOCK_CIPHER_generic(nid,keylen,1,16,ctr,ctr,CTR,flags) | ||
98 | 495 | ||
99 | static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 496 | static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
100 | const unsigned char *iv, int enc) | 497 | const unsigned char *iv, int enc) |
101 | { | 498 | { |
102 | int ret; | 499 | int ret, mode; |
500 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
103 | 501 | ||
104 | if ((ctx->cipher->flags & EVP_CIPH_MODE) == EVP_CIPH_CFB_MODE | 502 | mode = ctx->cipher->flags & EVP_CIPH_MODE; |
105 | || (ctx->cipher->flags & EVP_CIPH_MODE) == EVP_CIPH_OFB_MODE | 503 | if ((mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE) |
106 | || enc) | 504 | && !enc) |
107 | ret=AES_set_encrypt_key(key, ctx->key_len * 8, ctx->cipher_data); | 505 | #ifdef BSAES_CAPABLE |
506 | if (BSAES_CAPABLE && mode==EVP_CIPH_CBC_MODE) | ||
507 | { | ||
508 | ret = AES_set_decrypt_key(key,ctx->key_len*8,&dat->ks); | ||
509 | dat->block = (block128_f)AES_decrypt; | ||
510 | dat->stream.cbc = (cbc128_f)bsaes_cbc_encrypt; | ||
511 | } | ||
512 | else | ||
513 | #endif | ||
514 | #ifdef VPAES_CAPABLE | ||
515 | if (VPAES_CAPABLE) | ||
516 | { | ||
517 | ret = vpaes_set_decrypt_key(key,ctx->key_len*8,&dat->ks); | ||
518 | dat->block = (block128_f)vpaes_decrypt; | ||
519 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | ||
520 | (cbc128_f)vpaes_cbc_encrypt : | ||
521 | NULL; | ||
522 | } | ||
523 | else | ||
524 | #endif | ||
525 | { | ||
526 | ret = AES_set_decrypt_key(key,ctx->key_len*8,&dat->ks); | ||
527 | dat->block = (block128_f)AES_decrypt; | ||
528 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | ||
529 | (cbc128_f)AES_cbc_encrypt : | ||
530 | NULL; | ||
531 | } | ||
108 | else | 532 | else |
109 | ret=AES_set_decrypt_key(key, ctx->key_len * 8, ctx->cipher_data); | 533 | #ifdef BSAES_CAPABLE |
534 | if (BSAES_CAPABLE && mode==EVP_CIPH_CTR_MODE) | ||
535 | { | ||
536 | ret = AES_set_encrypt_key(key,ctx->key_len*8,&dat->ks); | ||
537 | dat->block = (block128_f)AES_encrypt; | ||
538 | dat->stream.ctr = (ctr128_f)bsaes_ctr32_encrypt_blocks; | ||
539 | } | ||
540 | else | ||
541 | #endif | ||
542 | #ifdef VPAES_CAPABLE | ||
543 | if (VPAES_CAPABLE) | ||
544 | { | ||
545 | ret = vpaes_set_encrypt_key(key,ctx->key_len*8,&dat->ks); | ||
546 | dat->block = (block128_f)vpaes_encrypt; | ||
547 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | ||
548 | (cbc128_f)vpaes_cbc_encrypt : | ||
549 | NULL; | ||
550 | } | ||
551 | else | ||
552 | #endif | ||
553 | { | ||
554 | ret = AES_set_encrypt_key(key,ctx->key_len*8,&dat->ks); | ||
555 | dat->block = (block128_f)AES_encrypt; | ||
556 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | ||
557 | (cbc128_f)AES_cbc_encrypt : | ||
558 | NULL; | ||
559 | #ifdef AES_CTR_ASM | ||
560 | if (mode==EVP_CIPH_CTR_MODE) | ||
561 | dat->stream.ctr = (ctr128_f)AES_ctr32_encrypt; | ||
562 | #endif | ||
563 | } | ||
110 | 564 | ||
111 | if(ret < 0) | 565 | if(ret < 0) |
112 | { | 566 | { |
@@ -117,4 +571,743 @@ static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | |||
117 | return 1; | 571 | return 1; |
118 | } | 572 | } |
119 | 573 | ||
574 | static int aes_cbc_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
575 | const unsigned char *in, size_t len) | ||
576 | { | ||
577 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
578 | |||
579 | if (dat->stream.cbc) | ||
580 | (*dat->stream.cbc)(in,out,len,&dat->ks,ctx->iv,ctx->encrypt); | ||
581 | else if (ctx->encrypt) | ||
582 | CRYPTO_cbc128_encrypt(in,out,len,&dat->ks,ctx->iv,dat->block); | ||
583 | else | ||
584 | CRYPTO_cbc128_encrypt(in,out,len,&dat->ks,ctx->iv,dat->block); | ||
585 | |||
586 | return 1; | ||
587 | } | ||
588 | |||
589 | static int aes_ecb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
590 | const unsigned char *in, size_t len) | ||
591 | { | ||
592 | size_t bl = ctx->cipher->block_size; | ||
593 | size_t i; | ||
594 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
595 | |||
596 | if (len<bl) return 1; | ||
597 | |||
598 | for (i=0,len-=bl;i<=len;i+=bl) | ||
599 | (*dat->block)(in+i,out+i,&dat->ks); | ||
600 | |||
601 | return 1; | ||
602 | } | ||
603 | |||
604 | static int aes_ofb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
605 | const unsigned char *in,size_t len) | ||
606 | { | ||
607 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
608 | |||
609 | CRYPTO_ofb128_encrypt(in,out,len,&dat->ks, | ||
610 | ctx->iv,&ctx->num,dat->block); | ||
611 | return 1; | ||
612 | } | ||
613 | |||
614 | static int aes_cfb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
615 | const unsigned char *in,size_t len) | ||
616 | { | ||
617 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
618 | |||
619 | CRYPTO_cfb128_encrypt(in,out,len,&dat->ks, | ||
620 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | ||
621 | return 1; | ||
622 | } | ||
623 | |||
624 | static int aes_cfb8_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
625 | const unsigned char *in,size_t len) | ||
626 | { | ||
627 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
628 | |||
629 | CRYPTO_cfb128_8_encrypt(in,out,len,&dat->ks, | ||
630 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | ||
631 | return 1; | ||
632 | } | ||
633 | |||
634 | static int aes_cfb1_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
635 | const unsigned char *in,size_t len) | ||
636 | { | ||
637 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
638 | |||
639 | if (ctx->flags&EVP_CIPH_FLAG_LENGTH_BITS) { | ||
640 | CRYPTO_cfb128_1_encrypt(in,out,len,&dat->ks, | ||
641 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | ||
642 | return 1; | ||
643 | } | ||
644 | |||
645 | while (len>=MAXBITCHUNK) { | ||
646 | CRYPTO_cfb128_1_encrypt(in,out,MAXBITCHUNK*8,&dat->ks, | ||
647 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | ||
648 | len-=MAXBITCHUNK; | ||
649 | } | ||
650 | if (len) | ||
651 | CRYPTO_cfb128_1_encrypt(in,out,len*8,&dat->ks, | ||
652 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | ||
653 | |||
654 | return 1; | ||
655 | } | ||
656 | |||
657 | static int aes_ctr_cipher (EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
658 | const unsigned char *in, size_t len) | ||
659 | { | ||
660 | unsigned int num = ctx->num; | ||
661 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
662 | |||
663 | if (dat->stream.ctr) | ||
664 | CRYPTO_ctr128_encrypt_ctr32(in,out,len,&dat->ks, | ||
665 | ctx->iv,ctx->buf,&num,dat->stream.ctr); | ||
666 | else | ||
667 | CRYPTO_ctr128_encrypt(in,out,len,&dat->ks, | ||
668 | ctx->iv,ctx->buf,&num,dat->block); | ||
669 | ctx->num = (size_t)num; | ||
670 | return 1; | ||
671 | } | ||
672 | |||
673 | BLOCK_CIPHER_generic_pack(NID_aes,128,EVP_CIPH_FLAG_FIPS) | ||
674 | BLOCK_CIPHER_generic_pack(NID_aes,192,EVP_CIPH_FLAG_FIPS) | ||
675 | BLOCK_CIPHER_generic_pack(NID_aes,256,EVP_CIPH_FLAG_FIPS) | ||
676 | |||
677 | static int aes_gcm_cleanup(EVP_CIPHER_CTX *c) | ||
678 | { | ||
679 | EVP_AES_GCM_CTX *gctx = c->cipher_data; | ||
680 | OPENSSL_cleanse(&gctx->gcm, sizeof(gctx->gcm)); | ||
681 | if (gctx->iv != c->iv) | ||
682 | OPENSSL_free(gctx->iv); | ||
683 | return 1; | ||
684 | } | ||
685 | |||
686 | /* increment counter (64-bit int) by 1 */ | ||
687 | static void ctr64_inc(unsigned char *counter) { | ||
688 | int n=8; | ||
689 | unsigned char c; | ||
690 | |||
691 | do { | ||
692 | --n; | ||
693 | c = counter[n]; | ||
694 | ++c; | ||
695 | counter[n] = c; | ||
696 | if (c) return; | ||
697 | } while (n); | ||
698 | } | ||
699 | |||
700 | static int aes_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | ||
701 | { | ||
702 | EVP_AES_GCM_CTX *gctx = c->cipher_data; | ||
703 | switch (type) | ||
704 | { | ||
705 | case EVP_CTRL_INIT: | ||
706 | gctx->key_set = 0; | ||
707 | gctx->iv_set = 0; | ||
708 | gctx->ivlen = c->cipher->iv_len; | ||
709 | gctx->iv = c->iv; | ||
710 | gctx->taglen = -1; | ||
711 | gctx->iv_gen = 0; | ||
712 | gctx->tls_aad_len = -1; | ||
713 | return 1; | ||
714 | |||
715 | case EVP_CTRL_GCM_SET_IVLEN: | ||
716 | if (arg <= 0) | ||
717 | return 0; | ||
718 | #ifdef OPENSSL_FIPS | ||
719 | if (FIPS_module_mode() && !(c->flags & EVP_CIPH_FLAG_NON_FIPS_ALLOW) | ||
720 | && arg < 12) | ||
721 | return 0; | ||
722 | #endif | ||
723 | /* Allocate memory for IV if needed */ | ||
724 | if ((arg > EVP_MAX_IV_LENGTH) && (arg > gctx->ivlen)) | ||
725 | { | ||
726 | if (gctx->iv != c->iv) | ||
727 | OPENSSL_free(gctx->iv); | ||
728 | gctx->iv = OPENSSL_malloc(arg); | ||
729 | if (!gctx->iv) | ||
730 | return 0; | ||
731 | } | ||
732 | gctx->ivlen = arg; | ||
733 | return 1; | ||
734 | |||
735 | case EVP_CTRL_GCM_SET_TAG: | ||
736 | if (arg <= 0 || arg > 16 || c->encrypt) | ||
737 | return 0; | ||
738 | memcpy(c->buf, ptr, arg); | ||
739 | gctx->taglen = arg; | ||
740 | return 1; | ||
741 | |||
742 | case EVP_CTRL_GCM_GET_TAG: | ||
743 | if (arg <= 0 || arg > 16 || !c->encrypt || gctx->taglen < 0) | ||
744 | return 0; | ||
745 | memcpy(ptr, c->buf, arg); | ||
746 | return 1; | ||
747 | |||
748 | case EVP_CTRL_GCM_SET_IV_FIXED: | ||
749 | /* Special case: -1 length restores whole IV */ | ||
750 | if (arg == -1) | ||
751 | { | ||
752 | memcpy(gctx->iv, ptr, gctx->ivlen); | ||
753 | gctx->iv_gen = 1; | ||
754 | return 1; | ||
755 | } | ||
756 | /* Fixed field must be at least 4 bytes and invocation field | ||
757 | * at least 8. | ||
758 | */ | ||
759 | if ((arg < 4) || (gctx->ivlen - arg) < 8) | ||
760 | return 0; | ||
761 | if (arg) | ||
762 | memcpy(gctx->iv, ptr, arg); | ||
763 | if (c->encrypt && | ||
764 | RAND_bytes(gctx->iv + arg, gctx->ivlen - arg) <= 0) | ||
765 | return 0; | ||
766 | gctx->iv_gen = 1; | ||
767 | return 1; | ||
768 | |||
769 | case EVP_CTRL_GCM_IV_GEN: | ||
770 | if (gctx->iv_gen == 0 || gctx->key_set == 0) | ||
771 | return 0; | ||
772 | CRYPTO_gcm128_setiv(&gctx->gcm, gctx->iv, gctx->ivlen); | ||
773 | if (arg <= 0 || arg > gctx->ivlen) | ||
774 | arg = gctx->ivlen; | ||
775 | memcpy(ptr, gctx->iv + gctx->ivlen - arg, arg); | ||
776 | /* Invocation field will be at least 8 bytes in size and | ||
777 | * so no need to check wrap around or increment more than | ||
778 | * last 8 bytes. | ||
779 | */ | ||
780 | ctr64_inc(gctx->iv + gctx->ivlen - 8); | ||
781 | gctx->iv_set = 1; | ||
782 | return 1; | ||
783 | |||
784 | case EVP_CTRL_GCM_SET_IV_INV: | ||
785 | if (gctx->iv_gen == 0 || gctx->key_set == 0 || c->encrypt) | ||
786 | return 0; | ||
787 | memcpy(gctx->iv + gctx->ivlen - arg, ptr, arg); | ||
788 | CRYPTO_gcm128_setiv(&gctx->gcm, gctx->iv, gctx->ivlen); | ||
789 | gctx->iv_set = 1; | ||
790 | return 1; | ||
791 | |||
792 | case EVP_CTRL_AEAD_TLS1_AAD: | ||
793 | /* Save the AAD for later use */ | ||
794 | if (arg != 13) | ||
795 | return 0; | ||
796 | memcpy(c->buf, ptr, arg); | ||
797 | gctx->tls_aad_len = arg; | ||
798 | { | ||
799 | unsigned int len=c->buf[arg-2]<<8|c->buf[arg-1]; | ||
800 | /* Correct length for explicit IV */ | ||
801 | len -= EVP_GCM_TLS_EXPLICIT_IV_LEN; | ||
802 | /* If decrypting correct for tag too */ | ||
803 | if (!c->encrypt) | ||
804 | len -= EVP_GCM_TLS_TAG_LEN; | ||
805 | c->buf[arg-2] = len>>8; | ||
806 | c->buf[arg-1] = len & 0xff; | ||
807 | } | ||
808 | /* Extra padding: tag appended to record */ | ||
809 | return EVP_GCM_TLS_TAG_LEN; | ||
810 | |||
811 | default: | ||
812 | return -1; | ||
813 | |||
814 | } | ||
815 | } | ||
816 | |||
817 | static int aes_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
818 | const unsigned char *iv, int enc) | ||
819 | { | ||
820 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | ||
821 | if (!iv && !key) | ||
822 | return 1; | ||
823 | if (key) | ||
824 | { do { | ||
825 | #ifdef BSAES_CAPABLE | ||
826 | if (BSAES_CAPABLE) | ||
827 | { | ||
828 | AES_set_encrypt_key(key,ctx->key_len*8,&gctx->ks); | ||
829 | CRYPTO_gcm128_init(&gctx->gcm,&gctx->ks, | ||
830 | (block128_f)AES_encrypt); | ||
831 | gctx->ctr = (ctr128_f)bsaes_ctr32_encrypt_blocks; | ||
832 | break; | ||
833 | } | ||
834 | else | ||
835 | #endif | ||
836 | #ifdef VPAES_CAPABLE | ||
837 | if (VPAES_CAPABLE) | ||
838 | { | ||
839 | vpaes_set_encrypt_key(key,ctx->key_len*8,&gctx->ks); | ||
840 | CRYPTO_gcm128_init(&gctx->gcm,&gctx->ks, | ||
841 | (block128_f)vpaes_encrypt); | ||
842 | gctx->ctr = NULL; | ||
843 | break; | ||
844 | } | ||
845 | #endif | ||
846 | AES_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks); | ||
847 | CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, (block128_f)AES_encrypt); | ||
848 | #ifdef AES_CTR_ASM | ||
849 | gctx->ctr = (ctr128_f)AES_ctr32_encrypt; | ||
850 | #else | ||
851 | gctx->ctr = NULL; | ||
852 | #endif | ||
853 | } while (0); | ||
854 | |||
855 | /* If we have an iv can set it directly, otherwise use | ||
856 | * saved IV. | ||
857 | */ | ||
858 | if (iv == NULL && gctx->iv_set) | ||
859 | iv = gctx->iv; | ||
860 | if (iv) | ||
861 | { | ||
862 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | ||
863 | gctx->iv_set = 1; | ||
864 | } | ||
865 | gctx->key_set = 1; | ||
866 | } | ||
867 | else | ||
868 | { | ||
869 | /* If key set use IV, otherwise copy */ | ||
870 | if (gctx->key_set) | ||
871 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | ||
872 | else | ||
873 | memcpy(gctx->iv, iv, gctx->ivlen); | ||
874 | gctx->iv_set = 1; | ||
875 | gctx->iv_gen = 0; | ||
876 | } | ||
877 | return 1; | ||
878 | } | ||
879 | |||
880 | /* Handle TLS GCM packet format. This consists of the last portion of the IV | ||
881 | * followed by the payload and finally the tag. On encrypt generate IV, | ||
882 | * encrypt payload and write the tag. On verify retrieve IV, decrypt payload | ||
883 | * and verify tag. | ||
884 | */ | ||
885 | |||
886 | static int aes_gcm_tls_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
887 | const unsigned char *in, size_t len) | ||
888 | { | ||
889 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | ||
890 | int rv = -1; | ||
891 | /* Encrypt/decrypt must be performed in place */ | ||
892 | if (out != in || len < (EVP_GCM_TLS_EXPLICIT_IV_LEN+EVP_GCM_TLS_TAG_LEN)) | ||
893 | return -1; | ||
894 | /* Set IV from start of buffer or generate IV and write to start | ||
895 | * of buffer. | ||
896 | */ | ||
897 | if (EVP_CIPHER_CTX_ctrl(ctx, ctx->encrypt ? | ||
898 | EVP_CTRL_GCM_IV_GEN : EVP_CTRL_GCM_SET_IV_INV, | ||
899 | EVP_GCM_TLS_EXPLICIT_IV_LEN, out) <= 0) | ||
900 | goto err; | ||
901 | /* Use saved AAD */ | ||
902 | if (CRYPTO_gcm128_aad(&gctx->gcm, ctx->buf, gctx->tls_aad_len)) | ||
903 | goto err; | ||
904 | /* Fix buffer and length to point to payload */ | ||
905 | in += EVP_GCM_TLS_EXPLICIT_IV_LEN; | ||
906 | out += EVP_GCM_TLS_EXPLICIT_IV_LEN; | ||
907 | len -= EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN; | ||
908 | if (ctx->encrypt) | ||
909 | { | ||
910 | /* Encrypt payload */ | ||
911 | if (gctx->ctr) | ||
912 | { | ||
913 | if (CRYPTO_gcm128_encrypt_ctr32(&gctx->gcm, | ||
914 | in, out, len, | ||
915 | gctx->ctr)) | ||
916 | goto err; | ||
917 | } | ||
918 | else { | ||
919 | if (CRYPTO_gcm128_encrypt(&gctx->gcm, in, out, len)) | ||
920 | goto err; | ||
921 | } | ||
922 | out += len; | ||
923 | /* Finally write tag */ | ||
924 | CRYPTO_gcm128_tag(&gctx->gcm, out, EVP_GCM_TLS_TAG_LEN); | ||
925 | rv = len + EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN; | ||
926 | } | ||
927 | else | ||
928 | { | ||
929 | /* Decrypt */ | ||
930 | if (gctx->ctr) | ||
931 | { | ||
932 | if (CRYPTO_gcm128_decrypt_ctr32(&gctx->gcm, | ||
933 | in, out, len, | ||
934 | gctx->ctr)) | ||
935 | goto err; | ||
936 | } | ||
937 | else { | ||
938 | if (CRYPTO_gcm128_decrypt(&gctx->gcm, in, out, len)) | ||
939 | goto err; | ||
940 | } | ||
941 | /* Retrieve tag */ | ||
942 | CRYPTO_gcm128_tag(&gctx->gcm, ctx->buf, | ||
943 | EVP_GCM_TLS_TAG_LEN); | ||
944 | /* If tag mismatch wipe buffer */ | ||
945 | if (memcmp(ctx->buf, in + len, EVP_GCM_TLS_TAG_LEN)) | ||
946 | { | ||
947 | OPENSSL_cleanse(out, len); | ||
948 | goto err; | ||
949 | } | ||
950 | rv = len; | ||
951 | } | ||
952 | |||
953 | err: | ||
954 | gctx->iv_set = 0; | ||
955 | gctx->tls_aad_len = -1; | ||
956 | return rv; | ||
957 | } | ||
958 | |||
959 | static int aes_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
960 | const unsigned char *in, size_t len) | ||
961 | { | ||
962 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | ||
963 | /* If not set up, return error */ | ||
964 | if (!gctx->key_set) | ||
965 | return -1; | ||
966 | |||
967 | if (gctx->tls_aad_len >= 0) | ||
968 | return aes_gcm_tls_cipher(ctx, out, in, len); | ||
969 | |||
970 | if (!gctx->iv_set) | ||
971 | return -1; | ||
972 | if (!ctx->encrypt && gctx->taglen < 0) | ||
973 | return -1; | ||
974 | if (in) | ||
975 | { | ||
976 | if (out == NULL) | ||
977 | { | ||
978 | if (CRYPTO_gcm128_aad(&gctx->gcm, in, len)) | ||
979 | return -1; | ||
980 | } | ||
981 | else if (ctx->encrypt) | ||
982 | { | ||
983 | if (gctx->ctr) | ||
984 | { | ||
985 | if (CRYPTO_gcm128_encrypt_ctr32(&gctx->gcm, | ||
986 | in, out, len, | ||
987 | gctx->ctr)) | ||
988 | return -1; | ||
989 | } | ||
990 | else { | ||
991 | if (CRYPTO_gcm128_encrypt(&gctx->gcm, in, out, len)) | ||
992 | return -1; | ||
993 | } | ||
994 | } | ||
995 | else | ||
996 | { | ||
997 | if (gctx->ctr) | ||
998 | { | ||
999 | if (CRYPTO_gcm128_decrypt_ctr32(&gctx->gcm, | ||
1000 | in, out, len, | ||
1001 | gctx->ctr)) | ||
1002 | return -1; | ||
1003 | } | ||
1004 | else { | ||
1005 | if (CRYPTO_gcm128_decrypt(&gctx->gcm, in, out, len)) | ||
1006 | return -1; | ||
1007 | } | ||
1008 | } | ||
1009 | return len; | ||
1010 | } | ||
1011 | else | ||
1012 | { | ||
1013 | if (!ctx->encrypt) | ||
1014 | { | ||
1015 | if (CRYPTO_gcm128_finish(&gctx->gcm, | ||
1016 | ctx->buf, gctx->taglen) != 0) | ||
1017 | return -1; | ||
1018 | gctx->iv_set = 0; | ||
1019 | return 0; | ||
1020 | } | ||
1021 | CRYPTO_gcm128_tag(&gctx->gcm, ctx->buf, 16); | ||
1022 | gctx->taglen = 16; | ||
1023 | /* Don't reuse the IV */ | ||
1024 | gctx->iv_set = 0; | ||
1025 | return 0; | ||
1026 | } | ||
1027 | |||
1028 | } | ||
1029 | |||
1030 | #define CUSTOM_FLAGS (EVP_CIPH_FLAG_DEFAULT_ASN1 \ | ||
1031 | | EVP_CIPH_CUSTOM_IV | EVP_CIPH_FLAG_CUSTOM_CIPHER \ | ||
1032 | | EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT) | ||
1033 | |||
1034 | BLOCK_CIPHER_custom(NID_aes,128,1,12,gcm,GCM, | ||
1035 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) | ||
1036 | BLOCK_CIPHER_custom(NID_aes,192,1,12,gcm,GCM, | ||
1037 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) | ||
1038 | BLOCK_CIPHER_custom(NID_aes,256,1,12,gcm,GCM, | ||
1039 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) | ||
1040 | |||
1041 | static int aes_xts_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | ||
1042 | { | ||
1043 | EVP_AES_XTS_CTX *xctx = c->cipher_data; | ||
1044 | if (type != EVP_CTRL_INIT) | ||
1045 | return -1; | ||
1046 | /* key1 and key2 are used as an indicator both key and IV are set */ | ||
1047 | xctx->xts.key1 = NULL; | ||
1048 | xctx->xts.key2 = NULL; | ||
1049 | return 1; | ||
1050 | } | ||
1051 | |||
1052 | static int aes_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
1053 | const unsigned char *iv, int enc) | ||
1054 | { | ||
1055 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; | ||
1056 | if (!iv && !key) | ||
1057 | return 1; | ||
1058 | |||
1059 | if (key) do | ||
1060 | { | ||
1061 | #ifdef AES_XTS_ASM | ||
1062 | xctx->stream = enc ? AES_xts_encrypt : AES_xts_decrypt; | ||
1063 | #else | ||
1064 | xctx->stream = NULL; | ||
1065 | #endif | ||
1066 | /* key_len is two AES keys */ | ||
1067 | #ifdef BSAES_CAPABLE | ||
1068 | if (BSAES_CAPABLE) | ||
1069 | xctx->stream = enc ? bsaes_xts_encrypt : bsaes_xts_decrypt; | ||
1070 | else | ||
1071 | #endif | ||
1072 | #ifdef VPAES_CAPABLE | ||
1073 | if (VPAES_CAPABLE) | ||
1074 | { | ||
1075 | if (enc) | ||
1076 | { | ||
1077 | vpaes_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
1078 | xctx->xts.block1 = (block128_f)vpaes_encrypt; | ||
1079 | } | ||
1080 | else | ||
1081 | { | ||
1082 | vpaes_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
1083 | xctx->xts.block1 = (block128_f)vpaes_decrypt; | ||
1084 | } | ||
1085 | |||
1086 | vpaes_set_encrypt_key(key + ctx->key_len/2, | ||
1087 | ctx->key_len * 4, &xctx->ks2); | ||
1088 | xctx->xts.block2 = (block128_f)vpaes_encrypt; | ||
1089 | |||
1090 | xctx->xts.key1 = &xctx->ks1; | ||
1091 | break; | ||
1092 | } | ||
1093 | #endif | ||
1094 | if (enc) | ||
1095 | { | ||
1096 | AES_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
1097 | xctx->xts.block1 = (block128_f)AES_encrypt; | ||
1098 | } | ||
1099 | else | ||
1100 | { | ||
1101 | AES_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
1102 | xctx->xts.block1 = (block128_f)AES_decrypt; | ||
1103 | } | ||
1104 | |||
1105 | AES_set_encrypt_key(key + ctx->key_len/2, | ||
1106 | ctx->key_len * 4, &xctx->ks2); | ||
1107 | xctx->xts.block2 = (block128_f)AES_encrypt; | ||
1108 | |||
1109 | xctx->xts.key1 = &xctx->ks1; | ||
1110 | } while (0); | ||
1111 | |||
1112 | if (iv) | ||
1113 | { | ||
1114 | xctx->xts.key2 = &xctx->ks2; | ||
1115 | memcpy(ctx->iv, iv, 16); | ||
1116 | } | ||
1117 | |||
1118 | return 1; | ||
1119 | } | ||
1120 | |||
1121 | static int aes_xts_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
1122 | const unsigned char *in, size_t len) | ||
1123 | { | ||
1124 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; | ||
1125 | if (!xctx->xts.key1 || !xctx->xts.key2) | ||
1126 | return 0; | ||
1127 | if (!out || !in || len<AES_BLOCK_SIZE) | ||
1128 | return 0; | ||
1129 | #ifdef OPENSSL_FIPS | ||
1130 | /* Requirement of SP800-38E */ | ||
1131 | if (FIPS_module_mode() && !(ctx->flags & EVP_CIPH_FLAG_NON_FIPS_ALLOW) && | ||
1132 | (len > (1UL<<20)*16)) | ||
1133 | { | ||
1134 | EVPerr(EVP_F_AES_XTS_CIPHER, EVP_R_TOO_LARGE); | ||
1135 | return 0; | ||
1136 | } | ||
1137 | #endif | ||
1138 | if (xctx->stream) | ||
1139 | (*xctx->stream)(in, out, len, | ||
1140 | xctx->xts.key1, xctx->xts.key2, ctx->iv); | ||
1141 | else if (CRYPTO_xts128_encrypt(&xctx->xts, ctx->iv, in, out, len, | ||
1142 | ctx->encrypt)) | ||
1143 | return 0; | ||
1144 | return 1; | ||
1145 | } | ||
1146 | |||
1147 | #define aes_xts_cleanup NULL | ||
1148 | |||
1149 | #define XTS_FLAGS (EVP_CIPH_FLAG_DEFAULT_ASN1 | EVP_CIPH_CUSTOM_IV \ | ||
1150 | | EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT) | ||
1151 | |||
1152 | BLOCK_CIPHER_custom(NID_aes,128,1,16,xts,XTS,EVP_CIPH_FLAG_FIPS|XTS_FLAGS) | ||
1153 | BLOCK_CIPHER_custom(NID_aes,256,1,16,xts,XTS,EVP_CIPH_FLAG_FIPS|XTS_FLAGS) | ||
1154 | |||
1155 | static int aes_ccm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | ||
1156 | { | ||
1157 | EVP_AES_CCM_CTX *cctx = c->cipher_data; | ||
1158 | switch (type) | ||
1159 | { | ||
1160 | case EVP_CTRL_INIT: | ||
1161 | cctx->key_set = 0; | ||
1162 | cctx->iv_set = 0; | ||
1163 | cctx->L = 8; | ||
1164 | cctx->M = 12; | ||
1165 | cctx->tag_set = 0; | ||
1166 | cctx->len_set = 0; | ||
1167 | return 1; | ||
1168 | |||
1169 | case EVP_CTRL_CCM_SET_IVLEN: | ||
1170 | arg = 15 - arg; | ||
1171 | case EVP_CTRL_CCM_SET_L: | ||
1172 | if (arg < 2 || arg > 8) | ||
1173 | return 0; | ||
1174 | cctx->L = arg; | ||
1175 | return 1; | ||
1176 | |||
1177 | case EVP_CTRL_CCM_SET_TAG: | ||
1178 | if ((arg & 1) || arg < 4 || arg > 16) | ||
1179 | return 0; | ||
1180 | if ((c->encrypt && ptr) || (!c->encrypt && !ptr)) | ||
1181 | return 0; | ||
1182 | if (ptr) | ||
1183 | { | ||
1184 | cctx->tag_set = 1; | ||
1185 | memcpy(c->buf, ptr, arg); | ||
1186 | } | ||
1187 | cctx->M = arg; | ||
1188 | return 1; | ||
1189 | |||
1190 | case EVP_CTRL_CCM_GET_TAG: | ||
1191 | if (!c->encrypt || !cctx->tag_set) | ||
1192 | return 0; | ||
1193 | if(!CRYPTO_ccm128_tag(&cctx->ccm, ptr, (size_t)arg)) | ||
1194 | return 0; | ||
1195 | cctx->tag_set = 0; | ||
1196 | cctx->iv_set = 0; | ||
1197 | cctx->len_set = 0; | ||
1198 | return 1; | ||
1199 | |||
1200 | default: | ||
1201 | return -1; | ||
1202 | |||
1203 | } | ||
1204 | } | ||
1205 | |||
1206 | static int aes_ccm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
1207 | const unsigned char *iv, int enc) | ||
1208 | { | ||
1209 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; | ||
1210 | if (!iv && !key) | ||
1211 | return 1; | ||
1212 | if (key) do | ||
1213 | { | ||
1214 | #ifdef VPAES_CAPABLE | ||
1215 | if (VPAES_CAPABLE) | ||
1216 | { | ||
1217 | vpaes_set_encrypt_key(key, ctx->key_len*8, &cctx->ks); | ||
1218 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, | ||
1219 | &cctx->ks, (block128_f)vpaes_encrypt); | ||
1220 | cctx->key_set = 1; | ||
1221 | break; | ||
1222 | } | ||
1223 | #endif | ||
1224 | AES_set_encrypt_key(key, ctx->key_len * 8, &cctx->ks); | ||
1225 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, | ||
1226 | &cctx->ks, (block128_f)AES_encrypt); | ||
1227 | cctx->str = NULL; | ||
1228 | cctx->key_set = 1; | ||
1229 | } while (0); | ||
1230 | if (iv) | ||
1231 | { | ||
1232 | memcpy(ctx->iv, iv, 15 - cctx->L); | ||
1233 | cctx->iv_set = 1; | ||
1234 | } | ||
1235 | return 1; | ||
1236 | } | ||
1237 | |||
1238 | static int aes_ccm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
1239 | const unsigned char *in, size_t len) | ||
1240 | { | ||
1241 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; | ||
1242 | CCM128_CONTEXT *ccm = &cctx->ccm; | ||
1243 | /* If not set up, return error */ | ||
1244 | if (!cctx->iv_set && !cctx->key_set) | ||
1245 | return -1; | ||
1246 | if (!ctx->encrypt && !cctx->tag_set) | ||
1247 | return -1; | ||
1248 | if (!out) | ||
1249 | { | ||
1250 | if (!in) | ||
1251 | { | ||
1252 | if (CRYPTO_ccm128_setiv(ccm, ctx->iv, 15 - cctx->L,len)) | ||
1253 | return -1; | ||
1254 | cctx->len_set = 1; | ||
1255 | return len; | ||
1256 | } | ||
1257 | /* If have AAD need message length */ | ||
1258 | if (!cctx->len_set && len) | ||
1259 | return -1; | ||
1260 | CRYPTO_ccm128_aad(ccm, in, len); | ||
1261 | return len; | ||
1262 | } | ||
1263 | /* EVP_*Final() doesn't return any data */ | ||
1264 | if (!in) | ||
1265 | return 0; | ||
1266 | /* If not set length yet do it */ | ||
1267 | if (!cctx->len_set) | ||
1268 | { | ||
1269 | if (CRYPTO_ccm128_setiv(ccm, ctx->iv, 15 - cctx->L, len)) | ||
1270 | return -1; | ||
1271 | cctx->len_set = 1; | ||
1272 | } | ||
1273 | if (ctx->encrypt) | ||
1274 | { | ||
1275 | if (cctx->str ? CRYPTO_ccm128_encrypt_ccm64(ccm, in, out, len, | ||
1276 | cctx->str) : | ||
1277 | CRYPTO_ccm128_encrypt(ccm, in, out, len)) | ||
1278 | return -1; | ||
1279 | cctx->tag_set = 1; | ||
1280 | return len; | ||
1281 | } | ||
1282 | else | ||
1283 | { | ||
1284 | int rv = -1; | ||
1285 | if (cctx->str ? !CRYPTO_ccm128_decrypt_ccm64(ccm, in, out, len, | ||
1286 | cctx->str) : | ||
1287 | !CRYPTO_ccm128_decrypt(ccm, in, out, len)) | ||
1288 | { | ||
1289 | unsigned char tag[16]; | ||
1290 | if (CRYPTO_ccm128_tag(ccm, tag, cctx->M)) | ||
1291 | { | ||
1292 | if (!memcmp(tag, ctx->buf, cctx->M)) | ||
1293 | rv = len; | ||
1294 | } | ||
1295 | } | ||
1296 | if (rv == -1) | ||
1297 | OPENSSL_cleanse(out, len); | ||
1298 | cctx->iv_set = 0; | ||
1299 | cctx->tag_set = 0; | ||
1300 | cctx->len_set = 0; | ||
1301 | return rv; | ||
1302 | } | ||
1303 | |||
1304 | } | ||
1305 | |||
1306 | #define aes_ccm_cleanup NULL | ||
1307 | |||
1308 | BLOCK_CIPHER_custom(NID_aes,128,1,12,ccm,CCM,EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) | ||
1309 | BLOCK_CIPHER_custom(NID_aes,192,1,12,ccm,CCM,EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) | ||
1310 | BLOCK_CIPHER_custom(NID_aes,256,1,12,ccm,CCM,EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) | ||
1311 | |||
1312 | #endif | ||
120 | #endif | 1313 | #endif |
diff --git a/src/lib/libcrypto/evp/e_des3.c b/src/lib/libcrypto/evp/e_des3.c index 3232cfe024..1e69972662 100644 --- a/src/lib/libcrypto/evp/e_des3.c +++ b/src/lib/libcrypto/evp/e_des3.c | |||
@@ -65,6 +65,8 @@ | |||
65 | #include <openssl/des.h> | 65 | #include <openssl/des.h> |
66 | #include <openssl/rand.h> | 66 | #include <openssl/rand.h> |
67 | 67 | ||
68 | #ifndef OPENSSL_FIPS | ||
69 | |||
68 | static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 70 | static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
69 | const unsigned char *iv,int enc); | 71 | const unsigned char *iv,int enc); |
70 | 72 | ||
@@ -311,3 +313,4 @@ const EVP_CIPHER *EVP_des_ede3(void) | |||
311 | return &des_ede3_ecb; | 313 | return &des_ede3_ecb; |
312 | } | 314 | } |
313 | #endif | 315 | #endif |
316 | #endif | ||
diff --git a/src/lib/libcrypto/evp/e_null.c b/src/lib/libcrypto/evp/e_null.c index 7cf50e1416..f0c1f78b5f 100644 --- a/src/lib/libcrypto/evp/e_null.c +++ b/src/lib/libcrypto/evp/e_null.c | |||
@@ -61,6 +61,8 @@ | |||
61 | #include <openssl/evp.h> | 61 | #include <openssl/evp.h> |
62 | #include <openssl/objects.h> | 62 | #include <openssl/objects.h> |
63 | 63 | ||
64 | #ifndef OPENSSL_FIPS | ||
65 | |||
64 | static int null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 66 | static int null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
65 | const unsigned char *iv,int enc); | 67 | const unsigned char *iv,int enc); |
66 | static int null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 68 | static int null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
@@ -99,4 +101,4 @@ static int null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | |||
99 | memcpy((char *)out,(const char *)in,inl); | 101 | memcpy((char *)out,(const char *)in,inl); |
100 | return 1; | 102 | return 1; |
101 | } | 103 | } |
102 | 104 | #endif | |
diff --git a/src/lib/libcrypto/evp/e_rc2.c b/src/lib/libcrypto/evp/e_rc2.c index f78d781129..d4c33b58d4 100644 --- a/src/lib/libcrypto/evp/e_rc2.c +++ b/src/lib/libcrypto/evp/e_rc2.c | |||
@@ -183,7 +183,8 @@ static int rc2_get_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
183 | key_bits =rc2_magic_to_meth((int)num); | 183 | key_bits =rc2_magic_to_meth((int)num); |
184 | if (!key_bits) | 184 | if (!key_bits) |
185 | return(-1); | 185 | return(-1); |
186 | if(i > 0) EVP_CipherInit_ex(c, NULL, NULL, NULL, iv, -1); | 186 | if(i > 0 && !EVP_CipherInit_ex(c, NULL, NULL, NULL, iv, -1)) |
187 | return -1; | ||
187 | EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_RC2_KEY_BITS, key_bits, NULL); | 188 | EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_RC2_KEY_BITS, key_bits, NULL); |
188 | EVP_CIPHER_CTX_set_key_length(c, key_bits / 8); | 189 | EVP_CIPHER_CTX_set_key_length(c, key_bits / 8); |
189 | } | 190 | } |
diff --git a/src/lib/libcrypto/evp/e_rc4.c b/src/lib/libcrypto/evp/e_rc4.c index 8b5175e0fd..b4f6bda82d 100644 --- a/src/lib/libcrypto/evp/e_rc4.c +++ b/src/lib/libcrypto/evp/e_rc4.c | |||
@@ -62,6 +62,7 @@ | |||
62 | #ifndef OPENSSL_NO_RC4 | 62 | #ifndef OPENSSL_NO_RC4 |
63 | 63 | ||
64 | #include <openssl/evp.h> | 64 | #include <openssl/evp.h> |
65 | #include "evp_locl.h" | ||
65 | #include <openssl/objects.h> | 66 | #include <openssl/objects.h> |
66 | #include <openssl/rc4.h> | 67 | #include <openssl/rc4.h> |
67 | 68 | ||
diff --git a/src/lib/libcrypto/evp/evp.h b/src/lib/libcrypto/evp/evp.h index da93e945f5..aa9616e11b 100644 --- a/src/lib/libcrypto/evp/evp.h +++ b/src/lib/libcrypto/evp/evp.h | |||
@@ -83,7 +83,7 @@ | |||
83 | #define EVP_RC5_32_12_16_KEY_SIZE 16 | 83 | #define EVP_RC5_32_12_16_KEY_SIZE 16 |
84 | */ | 84 | */ |
85 | #define EVP_MAX_MD_SIZE 64 /* longest known is SHA512 */ | 85 | #define EVP_MAX_MD_SIZE 64 /* longest known is SHA512 */ |
86 | #define EVP_MAX_KEY_LENGTH 32 | 86 | #define EVP_MAX_KEY_LENGTH 64 |
87 | #define EVP_MAX_IV_LENGTH 16 | 87 | #define EVP_MAX_IV_LENGTH 16 |
88 | #define EVP_MAX_BLOCK_LENGTH 32 | 88 | #define EVP_MAX_BLOCK_LENGTH 32 |
89 | 89 | ||
@@ -116,6 +116,7 @@ | |||
116 | #define EVP_PKEY_DH NID_dhKeyAgreement | 116 | #define EVP_PKEY_DH NID_dhKeyAgreement |
117 | #define EVP_PKEY_EC NID_X9_62_id_ecPublicKey | 117 | #define EVP_PKEY_EC NID_X9_62_id_ecPublicKey |
118 | #define EVP_PKEY_HMAC NID_hmac | 118 | #define EVP_PKEY_HMAC NID_hmac |
119 | #define EVP_PKEY_CMAC NID_cmac | ||
119 | 120 | ||
120 | #ifdef __cplusplus | 121 | #ifdef __cplusplus |
121 | extern "C" { | 122 | extern "C" { |
@@ -216,6 +217,8 @@ typedef int evp_verify_method(int type,const unsigned char *m, | |||
216 | 217 | ||
217 | #define EVP_MD_FLAG_DIGALGID_CUSTOM 0x0018 | 218 | #define EVP_MD_FLAG_DIGALGID_CUSTOM 0x0018 |
218 | 219 | ||
220 | #define EVP_MD_FLAG_FIPS 0x0400 /* Note if suitable for use in FIPS mode */ | ||
221 | |||
219 | /* Digest ctrls */ | 222 | /* Digest ctrls */ |
220 | 223 | ||
221 | #define EVP_MD_CTRL_DIGALGID 0x1 | 224 | #define EVP_MD_CTRL_DIGALGID 0x1 |
@@ -325,6 +328,10 @@ struct evp_cipher_st | |||
325 | #define EVP_CIPH_CBC_MODE 0x2 | 328 | #define EVP_CIPH_CBC_MODE 0x2 |
326 | #define EVP_CIPH_CFB_MODE 0x3 | 329 | #define EVP_CIPH_CFB_MODE 0x3 |
327 | #define EVP_CIPH_OFB_MODE 0x4 | 330 | #define EVP_CIPH_OFB_MODE 0x4 |
331 | #define EVP_CIPH_CTR_MODE 0x5 | ||
332 | #define EVP_CIPH_GCM_MODE 0x6 | ||
333 | #define EVP_CIPH_CCM_MODE 0x7 | ||
334 | #define EVP_CIPH_XTS_MODE 0x10001 | ||
328 | #define EVP_CIPH_MODE 0xF0007 | 335 | #define EVP_CIPH_MODE 0xF0007 |
329 | /* Set if variable length cipher */ | 336 | /* Set if variable length cipher */ |
330 | #define EVP_CIPH_VARIABLE_LENGTH 0x8 | 337 | #define EVP_CIPH_VARIABLE_LENGTH 0x8 |
@@ -346,6 +353,15 @@ struct evp_cipher_st | |||
346 | #define EVP_CIPH_FLAG_DEFAULT_ASN1 0x1000 | 353 | #define EVP_CIPH_FLAG_DEFAULT_ASN1 0x1000 |
347 | /* Buffer length in bits not bytes: CFB1 mode only */ | 354 | /* Buffer length in bits not bytes: CFB1 mode only */ |
348 | #define EVP_CIPH_FLAG_LENGTH_BITS 0x2000 | 355 | #define EVP_CIPH_FLAG_LENGTH_BITS 0x2000 |
356 | /* Note if suitable for use in FIPS mode */ | ||
357 | #define EVP_CIPH_FLAG_FIPS 0x4000 | ||
358 | /* Allow non FIPS cipher in FIPS mode */ | ||
359 | #define EVP_CIPH_FLAG_NON_FIPS_ALLOW 0x8000 | ||
360 | /* Cipher handles any and all padding logic as well | ||
361 | * as finalisation. | ||
362 | */ | ||
363 | #define EVP_CIPH_FLAG_CUSTOM_CIPHER 0x100000 | ||
364 | #define EVP_CIPH_FLAG_AEAD_CIPHER 0x200000 | ||
349 | 365 | ||
350 | /* ctrl() values */ | 366 | /* ctrl() values */ |
351 | 367 | ||
@@ -358,7 +374,36 @@ struct evp_cipher_st | |||
358 | #define EVP_CTRL_RAND_KEY 0x6 | 374 | #define EVP_CTRL_RAND_KEY 0x6 |
359 | #define EVP_CTRL_PBE_PRF_NID 0x7 | 375 | #define EVP_CTRL_PBE_PRF_NID 0x7 |
360 | #define EVP_CTRL_COPY 0x8 | 376 | #define EVP_CTRL_COPY 0x8 |
361 | #define EVP_CTRL_SET_ACSS_MODE 0x9 | 377 | #define EVP_CTRL_GCM_SET_IVLEN 0x9 |
378 | #define EVP_CTRL_GCM_GET_TAG 0x10 | ||
379 | #define EVP_CTRL_GCM_SET_TAG 0x11 | ||
380 | #define EVP_CTRL_GCM_SET_IV_FIXED 0x12 | ||
381 | #define EVP_CTRL_GCM_IV_GEN 0x13 | ||
382 | #define EVP_CTRL_CCM_SET_IVLEN EVP_CTRL_GCM_SET_IVLEN | ||
383 | #define EVP_CTRL_CCM_GET_TAG EVP_CTRL_GCM_GET_TAG | ||
384 | #define EVP_CTRL_CCM_SET_TAG EVP_CTRL_GCM_SET_TAG | ||
385 | #define EVP_CTRL_CCM_SET_L 0x14 | ||
386 | #define EVP_CTRL_CCM_SET_MSGLEN 0x15 | ||
387 | /* AEAD cipher deduces payload length and returns number of bytes | ||
388 | * required to store MAC and eventual padding. Subsequent call to | ||
389 | * EVP_Cipher even appends/verifies MAC. | ||
390 | */ | ||
391 | #define EVP_CTRL_AEAD_TLS1_AAD 0x16 | ||
392 | /* Used by composite AEAD ciphers, no-op in GCM, CCM... */ | ||
393 | #define EVP_CTRL_AEAD_SET_MAC_KEY 0x17 | ||
394 | /* Set the GCM invocation field, decrypt only */ | ||
395 | #define EVP_CTRL_GCM_SET_IV_INV 0x18 | ||
396 | |||
397 | /* OpenBSD extension */ | ||
398 | #define EVP_CTRL_SET_ACSS_MODE 0x80 | ||
399 | |||
400 | /* GCM TLS constants */ | ||
401 | /* Length of fixed part of IV derived from PRF */ | ||
402 | #define EVP_GCM_TLS_FIXED_IV_LEN 4 | ||
403 | /* Length of explicit part of IV part of TLS records */ | ||
404 | #define EVP_GCM_TLS_EXPLICIT_IV_LEN 8 | ||
405 | /* Length of tag for TLS */ | ||
406 | #define EVP_GCM_TLS_TAG_LEN 16 | ||
362 | 407 | ||
363 | typedef struct evp_cipher_info_st | 408 | typedef struct evp_cipher_info_st |
364 | { | 409 | { |
@@ -376,7 +421,7 @@ struct evp_cipher_ctx_st | |||
376 | unsigned char oiv[EVP_MAX_IV_LENGTH]; /* original iv */ | 421 | unsigned char oiv[EVP_MAX_IV_LENGTH]; /* original iv */ |
377 | unsigned char iv[EVP_MAX_IV_LENGTH]; /* working iv */ | 422 | unsigned char iv[EVP_MAX_IV_LENGTH]; /* working iv */ |
378 | unsigned char buf[EVP_MAX_BLOCK_LENGTH];/* saved partial block */ | 423 | unsigned char buf[EVP_MAX_BLOCK_LENGTH];/* saved partial block */ |
379 | int num; /* used by cfb/ofb mode */ | 424 | int num; /* used by cfb/ofb/ctr mode */ |
380 | 425 | ||
381 | void *app_data; /* application stuff */ | 426 | void *app_data; /* application stuff */ |
382 | int key_len; /* May change for variable length cipher */ | 427 | int key_len; /* May change for variable length cipher */ |
@@ -696,6 +741,9 @@ const EVP_MD *EVP_dev_crypto_md5(void); | |||
696 | #ifndef OPENSSL_NO_RC4 | 741 | #ifndef OPENSSL_NO_RC4 |
697 | const EVP_CIPHER *EVP_rc4(void); | 742 | const EVP_CIPHER *EVP_rc4(void); |
698 | const EVP_CIPHER *EVP_rc4_40(void); | 743 | const EVP_CIPHER *EVP_rc4_40(void); |
744 | #ifndef OPENSSL_NO_MD5 | ||
745 | const EVP_CIPHER *EVP_rc4_hmac_md5(void); | ||
746 | #endif | ||
699 | #endif | 747 | #endif |
700 | #ifndef OPENSSL_NO_IDEA | 748 | #ifndef OPENSSL_NO_IDEA |
701 | const EVP_CIPHER *EVP_idea_ecb(void); | 749 | const EVP_CIPHER *EVP_idea_ecb(void); |
@@ -742,9 +790,10 @@ const EVP_CIPHER *EVP_aes_128_cfb8(void); | |||
742 | const EVP_CIPHER *EVP_aes_128_cfb128(void); | 790 | const EVP_CIPHER *EVP_aes_128_cfb128(void); |
743 | # define EVP_aes_128_cfb EVP_aes_128_cfb128 | 791 | # define EVP_aes_128_cfb EVP_aes_128_cfb128 |
744 | const EVP_CIPHER *EVP_aes_128_ofb(void); | 792 | const EVP_CIPHER *EVP_aes_128_ofb(void); |
745 | #if 0 | ||
746 | const EVP_CIPHER *EVP_aes_128_ctr(void); | 793 | const EVP_CIPHER *EVP_aes_128_ctr(void); |
747 | #endif | 794 | const EVP_CIPHER *EVP_aes_128_gcm(void); |
795 | const EVP_CIPHER *EVP_aes_128_ccm(void); | ||
796 | const EVP_CIPHER *EVP_aes_128_xts(void); | ||
748 | const EVP_CIPHER *EVP_aes_192_ecb(void); | 797 | const EVP_CIPHER *EVP_aes_192_ecb(void); |
749 | const EVP_CIPHER *EVP_aes_192_cbc(void); | 798 | const EVP_CIPHER *EVP_aes_192_cbc(void); |
750 | const EVP_CIPHER *EVP_aes_192_cfb1(void); | 799 | const EVP_CIPHER *EVP_aes_192_cfb1(void); |
@@ -752,9 +801,9 @@ const EVP_CIPHER *EVP_aes_192_cfb8(void); | |||
752 | const EVP_CIPHER *EVP_aes_192_cfb128(void); | 801 | const EVP_CIPHER *EVP_aes_192_cfb128(void); |
753 | # define EVP_aes_192_cfb EVP_aes_192_cfb128 | 802 | # define EVP_aes_192_cfb EVP_aes_192_cfb128 |
754 | const EVP_CIPHER *EVP_aes_192_ofb(void); | 803 | const EVP_CIPHER *EVP_aes_192_ofb(void); |
755 | #if 0 | ||
756 | const EVP_CIPHER *EVP_aes_192_ctr(void); | 804 | const EVP_CIPHER *EVP_aes_192_ctr(void); |
757 | #endif | 805 | const EVP_CIPHER *EVP_aes_192_gcm(void); |
806 | const EVP_CIPHER *EVP_aes_192_ccm(void); | ||
758 | const EVP_CIPHER *EVP_aes_256_ecb(void); | 807 | const EVP_CIPHER *EVP_aes_256_ecb(void); |
759 | const EVP_CIPHER *EVP_aes_256_cbc(void); | 808 | const EVP_CIPHER *EVP_aes_256_cbc(void); |
760 | const EVP_CIPHER *EVP_aes_256_cfb1(void); | 809 | const EVP_CIPHER *EVP_aes_256_cfb1(void); |
@@ -762,8 +811,13 @@ const EVP_CIPHER *EVP_aes_256_cfb8(void); | |||
762 | const EVP_CIPHER *EVP_aes_256_cfb128(void); | 811 | const EVP_CIPHER *EVP_aes_256_cfb128(void); |
763 | # define EVP_aes_256_cfb EVP_aes_256_cfb128 | 812 | # define EVP_aes_256_cfb EVP_aes_256_cfb128 |
764 | const EVP_CIPHER *EVP_aes_256_ofb(void); | 813 | const EVP_CIPHER *EVP_aes_256_ofb(void); |
765 | #if 0 | ||
766 | const EVP_CIPHER *EVP_aes_256_ctr(void); | 814 | const EVP_CIPHER *EVP_aes_256_ctr(void); |
815 | const EVP_CIPHER *EVP_aes_256_gcm(void); | ||
816 | const EVP_CIPHER *EVP_aes_256_ccm(void); | ||
817 | const EVP_CIPHER *EVP_aes_256_xts(void); | ||
818 | #if !defined(OPENSSL_NO_SHA) && !defined(OPENSSL_NO_SHA1) | ||
819 | const EVP_CIPHER *EVP_aes_128_cbc_hmac_sha1(void); | ||
820 | const EVP_CIPHER *EVP_aes_256_cbc_hmac_sha1(void); | ||
767 | #endif | 821 | #endif |
768 | #endif | 822 | #endif |
769 | #ifndef OPENSSL_NO_ACSS | 823 | #ifndef OPENSSL_NO_ACSS |
@@ -1051,13 +1105,22 @@ void EVP_PKEY_asn1_set_ctrl(EVP_PKEY_ASN1_METHOD *ameth, | |||
1051 | #define EVP_PKEY_CTRL_CMS_DECRYPT 10 | 1105 | #define EVP_PKEY_CTRL_CMS_DECRYPT 10 |
1052 | #define EVP_PKEY_CTRL_CMS_SIGN 11 | 1106 | #define EVP_PKEY_CTRL_CMS_SIGN 11 |
1053 | 1107 | ||
1108 | #define EVP_PKEY_CTRL_CIPHER 12 | ||
1109 | |||
1054 | #define EVP_PKEY_ALG_CTRL 0x1000 | 1110 | #define EVP_PKEY_ALG_CTRL 0x1000 |
1055 | 1111 | ||
1056 | 1112 | ||
1057 | #define EVP_PKEY_FLAG_AUTOARGLEN 2 | 1113 | #define EVP_PKEY_FLAG_AUTOARGLEN 2 |
1114 | /* Method handles all operations: don't assume any digest related | ||
1115 | * defaults. | ||
1116 | */ | ||
1117 | #define EVP_PKEY_FLAG_SIGCTX_CUSTOM 4 | ||
1058 | 1118 | ||
1059 | const EVP_PKEY_METHOD *EVP_PKEY_meth_find(int type); | 1119 | const EVP_PKEY_METHOD *EVP_PKEY_meth_find(int type); |
1060 | EVP_PKEY_METHOD* EVP_PKEY_meth_new(int id, int flags); | 1120 | EVP_PKEY_METHOD* EVP_PKEY_meth_new(int id, int flags); |
1121 | void EVP_PKEY_meth_get0_info(int *ppkey_id, int *pflags, | ||
1122 | const EVP_PKEY_METHOD *meth); | ||
1123 | void EVP_PKEY_meth_copy(EVP_PKEY_METHOD *dst, const EVP_PKEY_METHOD *src); | ||
1061 | void EVP_PKEY_meth_free(EVP_PKEY_METHOD *pmeth); | 1124 | void EVP_PKEY_meth_free(EVP_PKEY_METHOD *pmeth); |
1062 | int EVP_PKEY_meth_add0(const EVP_PKEY_METHOD *pmeth); | 1125 | int EVP_PKEY_meth_add0(const EVP_PKEY_METHOD *pmeth); |
1063 | 1126 | ||
@@ -1075,7 +1138,7 @@ int EVP_PKEY_CTX_get_operation(EVP_PKEY_CTX *ctx); | |||
1075 | void EVP_PKEY_CTX_set0_keygen_info(EVP_PKEY_CTX *ctx, int *dat, int datlen); | 1138 | void EVP_PKEY_CTX_set0_keygen_info(EVP_PKEY_CTX *ctx, int *dat, int datlen); |
1076 | 1139 | ||
1077 | EVP_PKEY *EVP_PKEY_new_mac_key(int type, ENGINE *e, | 1140 | EVP_PKEY *EVP_PKEY_new_mac_key(int type, ENGINE *e, |
1078 | unsigned char *key, int keylen); | 1141 | const unsigned char *key, int keylen); |
1079 | 1142 | ||
1080 | void EVP_PKEY_CTX_set_data(EVP_PKEY_CTX *ctx, void *data); | 1143 | void EVP_PKEY_CTX_set_data(EVP_PKEY_CTX *ctx, void *data); |
1081 | void *EVP_PKEY_CTX_get_data(EVP_PKEY_CTX *ctx); | 1144 | void *EVP_PKEY_CTX_get_data(EVP_PKEY_CTX *ctx); |
@@ -1194,9 +1257,13 @@ void ERR_load_EVP_strings(void); | |||
1194 | /* Error codes for the EVP functions. */ | 1257 | /* Error codes for the EVP functions. */ |
1195 | 1258 | ||
1196 | /* Function codes. */ | 1259 | /* Function codes. */ |
1197 | #define EVP_F_AESNI_INIT_KEY 165 | 1260 | #define EVP_F_AESNI_INIT_KEY 165 |
1261 | #define EVP_F_AESNI_XTS_CIPHER 176 | ||
1198 | #define EVP_F_AES_INIT_KEY 133 | 1262 | #define EVP_F_AES_INIT_KEY 133 |
1263 | #define EVP_F_AES_XTS 172 | ||
1264 | #define EVP_F_AES_XTS_CIPHER 175 | ||
1199 | #define EVP_F_CAMELLIA_INIT_KEY 159 | 1265 | #define EVP_F_CAMELLIA_INIT_KEY 159 |
1266 | #define EVP_F_CMAC_INIT 173 | ||
1200 | #define EVP_F_D2I_PKEY 100 | 1267 | #define EVP_F_D2I_PKEY 100 |
1201 | #define EVP_F_DO_SIGVER_INIT 161 | 1268 | #define EVP_F_DO_SIGVER_INIT 161 |
1202 | #define EVP_F_DSAPKEY2PKCS8 134 | 1269 | #define EVP_F_DSAPKEY2PKCS8 134 |
@@ -1251,15 +1318,24 @@ void ERR_load_EVP_strings(void); | |||
1251 | #define EVP_F_EVP_RIJNDAEL 126 | 1318 | #define EVP_F_EVP_RIJNDAEL 126 |
1252 | #define EVP_F_EVP_SIGNFINAL 107 | 1319 | #define EVP_F_EVP_SIGNFINAL 107 |
1253 | #define EVP_F_EVP_VERIFYFINAL 108 | 1320 | #define EVP_F_EVP_VERIFYFINAL 108 |
1321 | #define EVP_F_FIPS_CIPHERINIT 166 | ||
1322 | #define EVP_F_FIPS_CIPHER_CTX_COPY 170 | ||
1323 | #define EVP_F_FIPS_CIPHER_CTX_CTRL 167 | ||
1324 | #define EVP_F_FIPS_CIPHER_CTX_SET_KEY_LENGTH 171 | ||
1325 | #define EVP_F_FIPS_DIGESTINIT 168 | ||
1326 | #define EVP_F_FIPS_MD_CTX_COPY 169 | ||
1327 | #define EVP_F_HMAC_INIT_EX 174 | ||
1254 | #define EVP_F_INT_CTX_NEW 157 | 1328 | #define EVP_F_INT_CTX_NEW 157 |
1255 | #define EVP_F_PKCS5_PBE_KEYIVGEN 117 | 1329 | #define EVP_F_PKCS5_PBE_KEYIVGEN 117 |
1256 | #define EVP_F_PKCS5_V2_PBE_KEYIVGEN 118 | 1330 | #define EVP_F_PKCS5_V2_PBE_KEYIVGEN 118 |
1331 | #define EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN 164 | ||
1257 | #define EVP_F_PKCS8_SET_BROKEN 112 | 1332 | #define EVP_F_PKCS8_SET_BROKEN 112 |
1258 | #define EVP_F_PKEY_SET_TYPE 158 | 1333 | #define EVP_F_PKEY_SET_TYPE 158 |
1259 | #define EVP_F_RC2_MAGIC_TO_METH 109 | 1334 | #define EVP_F_RC2_MAGIC_TO_METH 109 |
1260 | #define EVP_F_RC5_CTRL 125 | 1335 | #define EVP_F_RC5_CTRL 125 |
1261 | 1336 | ||
1262 | /* Reason codes. */ | 1337 | /* Reason codes. */ |
1338 | #define EVP_R_AES_IV_SETUP_FAILED 162 | ||
1263 | #define EVP_R_AES_KEY_SETUP_FAILED 143 | 1339 | #define EVP_R_AES_KEY_SETUP_FAILED 143 |
1264 | #define EVP_R_ASN1_LIB 140 | 1340 | #define EVP_R_ASN1_LIB 140 |
1265 | #define EVP_R_BAD_BLOCK_LENGTH 136 | 1341 | #define EVP_R_BAD_BLOCK_LENGTH 136 |
@@ -1277,6 +1353,7 @@ void ERR_load_EVP_strings(void); | |||
1277 | #define EVP_R_DECODE_ERROR 114 | 1353 | #define EVP_R_DECODE_ERROR 114 |
1278 | #define EVP_R_DIFFERENT_KEY_TYPES 101 | 1354 | #define EVP_R_DIFFERENT_KEY_TYPES 101 |
1279 | #define EVP_R_DIFFERENT_PARAMETERS 153 | 1355 | #define EVP_R_DIFFERENT_PARAMETERS 153 |
1356 | #define EVP_R_DISABLED_FOR_FIPS 163 | ||
1280 | #define EVP_R_ENCODE_ERROR 115 | 1357 | #define EVP_R_ENCODE_ERROR 115 |
1281 | #define EVP_R_EVP_PBE_CIPHERINIT_ERROR 119 | 1358 | #define EVP_R_EVP_PBE_CIPHERINIT_ERROR 119 |
1282 | #define EVP_R_EXPECTING_AN_RSA_KEY 127 | 1359 | #define EVP_R_EXPECTING_AN_RSA_KEY 127 |
@@ -1308,6 +1385,7 @@ void ERR_load_EVP_strings(void); | |||
1308 | #define EVP_R_PRIVATE_KEY_DECODE_ERROR 145 | 1385 | #define EVP_R_PRIVATE_KEY_DECODE_ERROR 145 |
1309 | #define EVP_R_PRIVATE_KEY_ENCODE_ERROR 146 | 1386 | #define EVP_R_PRIVATE_KEY_ENCODE_ERROR 146 |
1310 | #define EVP_R_PUBLIC_KEY_NOT_RSA 106 | 1387 | #define EVP_R_PUBLIC_KEY_NOT_RSA 106 |
1388 | #define EVP_R_TOO_LARGE 164 | ||
1311 | #define EVP_R_UNKNOWN_CIPHER 160 | 1389 | #define EVP_R_UNKNOWN_CIPHER 160 |
1312 | #define EVP_R_UNKNOWN_DIGEST 161 | 1390 | #define EVP_R_UNKNOWN_DIGEST 161 |
1313 | #define EVP_R_UNKNOWN_PBE_ALGORITHM 121 | 1391 | #define EVP_R_UNKNOWN_PBE_ALGORITHM 121 |
diff --git a/src/lib/libcrypto/evp/evp_enc.c b/src/lib/libcrypto/evp/evp_enc.c index c268d25cb4..0c54f05e6e 100644 --- a/src/lib/libcrypto/evp/evp_enc.c +++ b/src/lib/libcrypto/evp/evp_enc.c | |||
@@ -64,8 +64,18 @@ | |||
64 | #ifndef OPENSSL_NO_ENGINE | 64 | #ifndef OPENSSL_NO_ENGINE |
65 | #include <openssl/engine.h> | 65 | #include <openssl/engine.h> |
66 | #endif | 66 | #endif |
67 | #ifdef OPENSSL_FIPS | ||
68 | #include <openssl/fips.h> | ||
69 | #endif | ||
67 | #include "evp_locl.h" | 70 | #include "evp_locl.h" |
68 | 71 | ||
72 | #ifdef OPENSSL_FIPS | ||
73 | #define M_do_cipher(ctx, out, in, inl) FIPS_cipher(ctx, out, in, inl) | ||
74 | #else | ||
75 | #define M_do_cipher(ctx, out, in, inl) ctx->cipher->do_cipher(ctx, out, in, inl) | ||
76 | #endif | ||
77 | |||
78 | |||
69 | const char EVP_version[]="EVP" OPENSSL_VERSION_PTEXT; | 79 | const char EVP_version[]="EVP" OPENSSL_VERSION_PTEXT; |
70 | 80 | ||
71 | void EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *ctx) | 81 | void EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *ctx) |
@@ -115,10 +125,14 @@ int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *imp | |||
115 | /* Ensure a context left lying around from last time is cleared | 125 | /* Ensure a context left lying around from last time is cleared |
116 | * (the previous check attempted to avoid this if the same | 126 | * (the previous check attempted to avoid this if the same |
117 | * ENGINE and EVP_CIPHER could be used). */ | 127 | * ENGINE and EVP_CIPHER could be used). */ |
118 | EVP_CIPHER_CTX_cleanup(ctx); | 128 | if (ctx->cipher) |
119 | 129 | { | |
120 | /* Restore encrypt field: it is zeroed by cleanup */ | 130 | unsigned long flags = ctx->flags; |
121 | ctx->encrypt = enc; | 131 | EVP_CIPHER_CTX_cleanup(ctx); |
132 | /* Restore encrypt and flags */ | ||
133 | ctx->encrypt = enc; | ||
134 | ctx->flags = flags; | ||
135 | } | ||
122 | #ifndef OPENSSL_NO_ENGINE | 136 | #ifndef OPENSSL_NO_ENGINE |
123 | if(impl) | 137 | if(impl) |
124 | { | 138 | { |
@@ -155,6 +169,10 @@ int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *imp | |||
155 | ctx->engine = NULL; | 169 | ctx->engine = NULL; |
156 | #endif | 170 | #endif |
157 | 171 | ||
172 | #ifdef OPENSSL_FIPS | ||
173 | if (FIPS_mode()) | ||
174 | return FIPS_cipherinit(ctx, cipher, key, iv, enc); | ||
175 | #endif | ||
158 | ctx->cipher=cipher; | 176 | ctx->cipher=cipher; |
159 | if (ctx->cipher->ctx_size) | 177 | if (ctx->cipher->ctx_size) |
160 | { | 178 | { |
@@ -188,6 +206,10 @@ int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *imp | |||
188 | #ifndef OPENSSL_NO_ENGINE | 206 | #ifndef OPENSSL_NO_ENGINE |
189 | skip_to_init: | 207 | skip_to_init: |
190 | #endif | 208 | #endif |
209 | #ifdef OPENSSL_FIPS | ||
210 | if (FIPS_mode()) | ||
211 | return FIPS_cipherinit(ctx, cipher, key, iv, enc); | ||
212 | #endif | ||
191 | /* we assume block size is a power of 2 in *cryptUpdate */ | 213 | /* we assume block size is a power of 2 in *cryptUpdate */ |
192 | OPENSSL_assert(ctx->cipher->block_size == 1 | 214 | OPENSSL_assert(ctx->cipher->block_size == 1 |
193 | || ctx->cipher->block_size == 8 | 215 | || ctx->cipher->block_size == 8 |
@@ -214,6 +236,13 @@ skip_to_init: | |||
214 | memcpy(ctx->iv, ctx->oiv, EVP_CIPHER_CTX_iv_length(ctx)); | 236 | memcpy(ctx->iv, ctx->oiv, EVP_CIPHER_CTX_iv_length(ctx)); |
215 | break; | 237 | break; |
216 | 238 | ||
239 | case EVP_CIPH_CTR_MODE: | ||
240 | ctx->num = 0; | ||
241 | /* Don't reuse IV for CTR mode */ | ||
242 | if(iv) | ||
243 | memcpy(ctx->iv, iv, EVP_CIPHER_CTX_iv_length(ctx)); | ||
244 | break; | ||
245 | |||
217 | default: | 246 | default: |
218 | return 0; | 247 | return 0; |
219 | break; | 248 | break; |
@@ -280,6 +309,16 @@ int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |||
280 | { | 309 | { |
281 | int i,j,bl; | 310 | int i,j,bl; |
282 | 311 | ||
312 | if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) | ||
313 | { | ||
314 | i = M_do_cipher(ctx, out, in, inl); | ||
315 | if (i < 0) | ||
316 | return 0; | ||
317 | else | ||
318 | *outl = i; | ||
319 | return 1; | ||
320 | } | ||
321 | |||
283 | if (inl <= 0) | 322 | if (inl <= 0) |
284 | { | 323 | { |
285 | *outl = 0; | 324 | *outl = 0; |
@@ -288,7 +327,7 @@ int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |||
288 | 327 | ||
289 | if(ctx->buf_len == 0 && (inl&(ctx->block_mask)) == 0) | 328 | if(ctx->buf_len == 0 && (inl&(ctx->block_mask)) == 0) |
290 | { | 329 | { |
291 | if(ctx->cipher->do_cipher(ctx,out,in,inl)) | 330 | if(M_do_cipher(ctx,out,in,inl)) |
292 | { | 331 | { |
293 | *outl=inl; | 332 | *outl=inl; |
294 | return 1; | 333 | return 1; |
@@ -315,7 +354,7 @@ int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |||
315 | { | 354 | { |
316 | j=bl-i; | 355 | j=bl-i; |
317 | memcpy(&(ctx->buf[i]),in,j); | 356 | memcpy(&(ctx->buf[i]),in,j); |
318 | if(!ctx->cipher->do_cipher(ctx,out,ctx->buf,bl)) return 0; | 357 | if(!M_do_cipher(ctx,out,ctx->buf,bl)) return 0; |
319 | inl-=j; | 358 | inl-=j; |
320 | in+=j; | 359 | in+=j; |
321 | out+=bl; | 360 | out+=bl; |
@@ -328,7 +367,7 @@ int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |||
328 | inl-=i; | 367 | inl-=i; |
329 | if (inl > 0) | 368 | if (inl > 0) |
330 | { | 369 | { |
331 | if(!ctx->cipher->do_cipher(ctx,out,in,inl)) return 0; | 370 | if(!M_do_cipher(ctx,out,in,inl)) return 0; |
332 | *outl+=inl; | 371 | *outl+=inl; |
333 | } | 372 | } |
334 | 373 | ||
@@ -350,6 +389,16 @@ int EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
350 | int n,ret; | 389 | int n,ret; |
351 | unsigned int i, b, bl; | 390 | unsigned int i, b, bl; |
352 | 391 | ||
392 | if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) | ||
393 | { | ||
394 | ret = M_do_cipher(ctx, out, NULL, 0); | ||
395 | if (ret < 0) | ||
396 | return 0; | ||
397 | else | ||
398 | *outl = ret; | ||
399 | return 1; | ||
400 | } | ||
401 | |||
353 | b=ctx->cipher->block_size; | 402 | b=ctx->cipher->block_size; |
354 | OPENSSL_assert(b <= sizeof ctx->buf); | 403 | OPENSSL_assert(b <= sizeof ctx->buf); |
355 | if (b == 1) | 404 | if (b == 1) |
@@ -372,7 +421,7 @@ int EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
372 | n=b-bl; | 421 | n=b-bl; |
373 | for (i=bl; i<b; i++) | 422 | for (i=bl; i<b; i++) |
374 | ctx->buf[i]=n; | 423 | ctx->buf[i]=n; |
375 | ret=ctx->cipher->do_cipher(ctx,out,ctx->buf,b); | 424 | ret=M_do_cipher(ctx,out,ctx->buf,b); |
376 | 425 | ||
377 | 426 | ||
378 | if(ret) | 427 | if(ret) |
@@ -387,6 +436,19 @@ int EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |||
387 | int fix_len; | 436 | int fix_len; |
388 | unsigned int b; | 437 | unsigned int b; |
389 | 438 | ||
439 | if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) | ||
440 | { | ||
441 | fix_len = M_do_cipher(ctx, out, in, inl); | ||
442 | if (fix_len < 0) | ||
443 | { | ||
444 | *outl = 0; | ||
445 | return 0; | ||
446 | } | ||
447 | else | ||
448 | *outl = fix_len; | ||
449 | return 1; | ||
450 | } | ||
451 | |||
390 | if (inl <= 0) | 452 | if (inl <= 0) |
391 | { | 453 | { |
392 | *outl = 0; | 454 | *outl = 0; |
@@ -440,8 +502,18 @@ int EVP_DecryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
440 | { | 502 | { |
441 | int i,n; | 503 | int i,n; |
442 | unsigned int b; | 504 | unsigned int b; |
443 | |||
444 | *outl=0; | 505 | *outl=0; |
506 | |||
507 | if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) | ||
508 | { | ||
509 | i = M_do_cipher(ctx, out, NULL, 0); | ||
510 | if (i < 0) | ||
511 | return 0; | ||
512 | else | ||
513 | *outl = i; | ||
514 | return 1; | ||
515 | } | ||
516 | |||
445 | b=ctx->cipher->block_size; | 517 | b=ctx->cipher->block_size; |
446 | if (ctx->flags & EVP_CIPH_NO_PADDING) | 518 | if (ctx->flags & EVP_CIPH_NO_PADDING) |
447 | { | 519 | { |
@@ -496,6 +568,7 @@ void EVP_CIPHER_CTX_free(EVP_CIPHER_CTX *ctx) | |||
496 | 568 | ||
497 | int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c) | 569 | int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c) |
498 | { | 570 | { |
571 | #ifndef OPENSSL_FIPS | ||
499 | if (c->cipher != NULL) | 572 | if (c->cipher != NULL) |
500 | { | 573 | { |
501 | if(c->cipher->cleanup && !c->cipher->cleanup(c)) | 574 | if(c->cipher->cleanup && !c->cipher->cleanup(c)) |
@@ -506,12 +579,16 @@ int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c) | |||
506 | } | 579 | } |
507 | if (c->cipher_data) | 580 | if (c->cipher_data) |
508 | OPENSSL_free(c->cipher_data); | 581 | OPENSSL_free(c->cipher_data); |
582 | #endif | ||
509 | #ifndef OPENSSL_NO_ENGINE | 583 | #ifndef OPENSSL_NO_ENGINE |
510 | if (c->engine) | 584 | if (c->engine) |
511 | /* The EVP_CIPHER we used belongs to an ENGINE, release the | 585 | /* The EVP_CIPHER we used belongs to an ENGINE, release the |
512 | * functional reference we held for this reason. */ | 586 | * functional reference we held for this reason. */ |
513 | ENGINE_finish(c->engine); | 587 | ENGINE_finish(c->engine); |
514 | #endif | 588 | #endif |
589 | #ifdef OPENSSL_FIPS | ||
590 | FIPS_cipher_ctx_cleanup(c); | ||
591 | #endif | ||
515 | memset(c,0,sizeof(EVP_CIPHER_CTX)); | 592 | memset(c,0,sizeof(EVP_CIPHER_CTX)); |
516 | return 1; | 593 | return 1; |
517 | } | 594 | } |
diff --git a/src/lib/libcrypto/evp/evp_err.c b/src/lib/libcrypto/evp/evp_err.c index 6b585c7483..db0f76d59b 100644 --- a/src/lib/libcrypto/evp/evp_err.c +++ b/src/lib/libcrypto/evp/evp_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/evp/evp_err.c */ | 1 | /* crypto/evp/evp_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999-2008 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -71,8 +71,12 @@ | |||
71 | static ERR_STRING_DATA EVP_str_functs[]= | 71 | static ERR_STRING_DATA EVP_str_functs[]= |
72 | { | 72 | { |
73 | {ERR_FUNC(EVP_F_AESNI_INIT_KEY), "AESNI_INIT_KEY"}, | 73 | {ERR_FUNC(EVP_F_AESNI_INIT_KEY), "AESNI_INIT_KEY"}, |
74 | {ERR_FUNC(EVP_F_AESNI_XTS_CIPHER), "AESNI_XTS_CIPHER"}, | ||
74 | {ERR_FUNC(EVP_F_AES_INIT_KEY), "AES_INIT_KEY"}, | 75 | {ERR_FUNC(EVP_F_AES_INIT_KEY), "AES_INIT_KEY"}, |
76 | {ERR_FUNC(EVP_F_AES_XTS), "AES_XTS"}, | ||
77 | {ERR_FUNC(EVP_F_AES_XTS_CIPHER), "AES_XTS_CIPHER"}, | ||
75 | {ERR_FUNC(EVP_F_CAMELLIA_INIT_KEY), "CAMELLIA_INIT_KEY"}, | 78 | {ERR_FUNC(EVP_F_CAMELLIA_INIT_KEY), "CAMELLIA_INIT_KEY"}, |
79 | {ERR_FUNC(EVP_F_CMAC_INIT), "CMAC_INIT"}, | ||
76 | {ERR_FUNC(EVP_F_D2I_PKEY), "D2I_PKEY"}, | 80 | {ERR_FUNC(EVP_F_D2I_PKEY), "D2I_PKEY"}, |
77 | {ERR_FUNC(EVP_F_DO_SIGVER_INIT), "DO_SIGVER_INIT"}, | 81 | {ERR_FUNC(EVP_F_DO_SIGVER_INIT), "DO_SIGVER_INIT"}, |
78 | {ERR_FUNC(EVP_F_DSAPKEY2PKCS8), "DSAPKEY2PKCS8"}, | 82 | {ERR_FUNC(EVP_F_DSAPKEY2PKCS8), "DSAPKEY2PKCS8"}, |
@@ -87,7 +91,7 @@ static ERR_STRING_DATA EVP_str_functs[]= | |||
87 | {ERR_FUNC(EVP_F_EVP_DIGESTINIT_EX), "EVP_DigestInit_ex"}, | 91 | {ERR_FUNC(EVP_F_EVP_DIGESTINIT_EX), "EVP_DigestInit_ex"}, |
88 | {ERR_FUNC(EVP_F_EVP_ENCRYPTFINAL_EX), "EVP_EncryptFinal_ex"}, | 92 | {ERR_FUNC(EVP_F_EVP_ENCRYPTFINAL_EX), "EVP_EncryptFinal_ex"}, |
89 | {ERR_FUNC(EVP_F_EVP_MD_CTX_COPY_EX), "EVP_MD_CTX_copy_ex"}, | 93 | {ERR_FUNC(EVP_F_EVP_MD_CTX_COPY_EX), "EVP_MD_CTX_copy_ex"}, |
90 | {ERR_FUNC(EVP_F_EVP_MD_SIZE), "EVP_MD_SIZE"}, | 94 | {ERR_FUNC(EVP_F_EVP_MD_SIZE), "EVP_MD_size"}, |
91 | {ERR_FUNC(EVP_F_EVP_OPENINIT), "EVP_OpenInit"}, | 95 | {ERR_FUNC(EVP_F_EVP_OPENINIT), "EVP_OpenInit"}, |
92 | {ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD), "EVP_PBE_alg_add"}, | 96 | {ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD), "EVP_PBE_alg_add"}, |
93 | {ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD_TYPE), "EVP_PBE_alg_add_type"}, | 97 | {ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD_TYPE), "EVP_PBE_alg_add_type"}, |
@@ -127,9 +131,17 @@ static ERR_STRING_DATA EVP_str_functs[]= | |||
127 | {ERR_FUNC(EVP_F_EVP_RIJNDAEL), "EVP_RIJNDAEL"}, | 131 | {ERR_FUNC(EVP_F_EVP_RIJNDAEL), "EVP_RIJNDAEL"}, |
128 | {ERR_FUNC(EVP_F_EVP_SIGNFINAL), "EVP_SignFinal"}, | 132 | {ERR_FUNC(EVP_F_EVP_SIGNFINAL), "EVP_SignFinal"}, |
129 | {ERR_FUNC(EVP_F_EVP_VERIFYFINAL), "EVP_VerifyFinal"}, | 133 | {ERR_FUNC(EVP_F_EVP_VERIFYFINAL), "EVP_VerifyFinal"}, |
134 | {ERR_FUNC(EVP_F_FIPS_CIPHERINIT), "FIPS_CIPHERINIT"}, | ||
135 | {ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_COPY), "FIPS_CIPHER_CTX_COPY"}, | ||
136 | {ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_CTRL), "FIPS_CIPHER_CTX_CTRL"}, | ||
137 | {ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_SET_KEY_LENGTH), "FIPS_CIPHER_CTX_SET_KEY_LENGTH"}, | ||
138 | {ERR_FUNC(EVP_F_FIPS_DIGESTINIT), "FIPS_DIGESTINIT"}, | ||
139 | {ERR_FUNC(EVP_F_FIPS_MD_CTX_COPY), "FIPS_MD_CTX_COPY"}, | ||
140 | {ERR_FUNC(EVP_F_HMAC_INIT_EX), "HMAC_Init_ex"}, | ||
130 | {ERR_FUNC(EVP_F_INT_CTX_NEW), "INT_CTX_NEW"}, | 141 | {ERR_FUNC(EVP_F_INT_CTX_NEW), "INT_CTX_NEW"}, |
131 | {ERR_FUNC(EVP_F_PKCS5_PBE_KEYIVGEN), "PKCS5_PBE_keyivgen"}, | 142 | {ERR_FUNC(EVP_F_PKCS5_PBE_KEYIVGEN), "PKCS5_PBE_keyivgen"}, |
132 | {ERR_FUNC(EVP_F_PKCS5_V2_PBE_KEYIVGEN), "PKCS5_v2_PBE_keyivgen"}, | 143 | {ERR_FUNC(EVP_F_PKCS5_V2_PBE_KEYIVGEN), "PKCS5_v2_PBE_keyivgen"}, |
144 | {ERR_FUNC(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN), "PKCS5_V2_PBKDF2_KEYIVGEN"}, | ||
133 | {ERR_FUNC(EVP_F_PKCS8_SET_BROKEN), "PKCS8_set_broken"}, | 145 | {ERR_FUNC(EVP_F_PKCS8_SET_BROKEN), "PKCS8_set_broken"}, |
134 | {ERR_FUNC(EVP_F_PKEY_SET_TYPE), "PKEY_SET_TYPE"}, | 146 | {ERR_FUNC(EVP_F_PKEY_SET_TYPE), "PKEY_SET_TYPE"}, |
135 | {ERR_FUNC(EVP_F_RC2_MAGIC_TO_METH), "RC2_MAGIC_TO_METH"}, | 147 | {ERR_FUNC(EVP_F_RC2_MAGIC_TO_METH), "RC2_MAGIC_TO_METH"}, |
@@ -139,6 +151,7 @@ static ERR_STRING_DATA EVP_str_functs[]= | |||
139 | 151 | ||
140 | static ERR_STRING_DATA EVP_str_reasons[]= | 152 | static ERR_STRING_DATA EVP_str_reasons[]= |
141 | { | 153 | { |
154 | {ERR_REASON(EVP_R_AES_IV_SETUP_FAILED) ,"aes iv setup failed"}, | ||
142 | {ERR_REASON(EVP_R_AES_KEY_SETUP_FAILED) ,"aes key setup failed"}, | 155 | {ERR_REASON(EVP_R_AES_KEY_SETUP_FAILED) ,"aes key setup failed"}, |
143 | {ERR_REASON(EVP_R_ASN1_LIB) ,"asn1 lib"}, | 156 | {ERR_REASON(EVP_R_ASN1_LIB) ,"asn1 lib"}, |
144 | {ERR_REASON(EVP_R_BAD_BLOCK_LENGTH) ,"bad block length"}, | 157 | {ERR_REASON(EVP_R_BAD_BLOCK_LENGTH) ,"bad block length"}, |
@@ -156,6 +169,7 @@ static ERR_STRING_DATA EVP_str_reasons[]= | |||
156 | {ERR_REASON(EVP_R_DECODE_ERROR) ,"decode error"}, | 169 | {ERR_REASON(EVP_R_DECODE_ERROR) ,"decode error"}, |
157 | {ERR_REASON(EVP_R_DIFFERENT_KEY_TYPES) ,"different key types"}, | 170 | {ERR_REASON(EVP_R_DIFFERENT_KEY_TYPES) ,"different key types"}, |
158 | {ERR_REASON(EVP_R_DIFFERENT_PARAMETERS) ,"different parameters"}, | 171 | {ERR_REASON(EVP_R_DIFFERENT_PARAMETERS) ,"different parameters"}, |
172 | {ERR_REASON(EVP_R_DISABLED_FOR_FIPS) ,"disabled for fips"}, | ||
159 | {ERR_REASON(EVP_R_ENCODE_ERROR) ,"encode error"}, | 173 | {ERR_REASON(EVP_R_ENCODE_ERROR) ,"encode error"}, |
160 | {ERR_REASON(EVP_R_EVP_PBE_CIPHERINIT_ERROR),"evp pbe cipherinit error"}, | 174 | {ERR_REASON(EVP_R_EVP_PBE_CIPHERINIT_ERROR),"evp pbe cipherinit error"}, |
161 | {ERR_REASON(EVP_R_EXPECTING_AN_RSA_KEY) ,"expecting an rsa key"}, | 175 | {ERR_REASON(EVP_R_EXPECTING_AN_RSA_KEY) ,"expecting an rsa key"}, |
@@ -187,6 +201,7 @@ static ERR_STRING_DATA EVP_str_reasons[]= | |||
187 | {ERR_REASON(EVP_R_PRIVATE_KEY_DECODE_ERROR),"private key decode error"}, | 201 | {ERR_REASON(EVP_R_PRIVATE_KEY_DECODE_ERROR),"private key decode error"}, |
188 | {ERR_REASON(EVP_R_PRIVATE_KEY_ENCODE_ERROR),"private key encode error"}, | 202 | {ERR_REASON(EVP_R_PRIVATE_KEY_ENCODE_ERROR),"private key encode error"}, |
189 | {ERR_REASON(EVP_R_PUBLIC_KEY_NOT_RSA) ,"public key not rsa"}, | 203 | {ERR_REASON(EVP_R_PUBLIC_KEY_NOT_RSA) ,"public key not rsa"}, |
204 | {ERR_REASON(EVP_R_TOO_LARGE) ,"too large"}, | ||
190 | {ERR_REASON(EVP_R_UNKNOWN_CIPHER) ,"unknown cipher"}, | 205 | {ERR_REASON(EVP_R_UNKNOWN_CIPHER) ,"unknown cipher"}, |
191 | {ERR_REASON(EVP_R_UNKNOWN_DIGEST) ,"unknown digest"}, | 206 | {ERR_REASON(EVP_R_UNKNOWN_DIGEST) ,"unknown digest"}, |
192 | {ERR_REASON(EVP_R_UNKNOWN_PBE_ALGORITHM) ,"unknown pbe algorithm"}, | 207 | {ERR_REASON(EVP_R_UNKNOWN_PBE_ALGORITHM) ,"unknown pbe algorithm"}, |
diff --git a/src/lib/libcrypto/evp/evp_key.c b/src/lib/libcrypto/evp/evp_key.c index 839d6a3a16..7961fbebf2 100644 --- a/src/lib/libcrypto/evp/evp_key.c +++ b/src/lib/libcrypto/evp/evp_key.c | |||
@@ -120,7 +120,7 @@ int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, | |||
120 | unsigned char md_buf[EVP_MAX_MD_SIZE]; | 120 | unsigned char md_buf[EVP_MAX_MD_SIZE]; |
121 | int niv,nkey,addmd=0; | 121 | int niv,nkey,addmd=0; |
122 | unsigned int mds=0,i; | 122 | unsigned int mds=0,i; |
123 | 123 | int rv = 0; | |
124 | nkey=type->key_len; | 124 | nkey=type->key_len; |
125 | niv=type->iv_len; | 125 | niv=type->iv_len; |
126 | OPENSSL_assert(nkey <= EVP_MAX_KEY_LENGTH); | 126 | OPENSSL_assert(nkey <= EVP_MAX_KEY_LENGTH); |
@@ -134,17 +134,24 @@ int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, | |||
134 | if (!EVP_DigestInit_ex(&c,md, NULL)) | 134 | if (!EVP_DigestInit_ex(&c,md, NULL)) |
135 | return 0; | 135 | return 0; |
136 | if (addmd++) | 136 | if (addmd++) |
137 | EVP_DigestUpdate(&c,&(md_buf[0]),mds); | 137 | if (!EVP_DigestUpdate(&c,&(md_buf[0]),mds)) |
138 | EVP_DigestUpdate(&c,data,datal); | 138 | goto err; |
139 | if (!EVP_DigestUpdate(&c,data,datal)) | ||
140 | goto err; | ||
139 | if (salt != NULL) | 141 | if (salt != NULL) |
140 | EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN); | 142 | if (!EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN)) |
141 | EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds); | 143 | goto err; |
144 | if (!EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds)) | ||
145 | goto err; | ||
142 | 146 | ||
143 | for (i=1; i<(unsigned int)count; i++) | 147 | for (i=1; i<(unsigned int)count; i++) |
144 | { | 148 | { |
145 | EVP_DigestInit_ex(&c,md, NULL); | 149 | if (!EVP_DigestInit_ex(&c,md, NULL)) |
146 | EVP_DigestUpdate(&c,&(md_buf[0]),mds); | 150 | goto err; |
147 | EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds); | 151 | if (!EVP_DigestUpdate(&c,&(md_buf[0]),mds)) |
152 | goto err; | ||
153 | if (!EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds)) | ||
154 | goto err; | ||
148 | } | 155 | } |
149 | i=0; | 156 | i=0; |
150 | if (nkey) | 157 | if (nkey) |
@@ -173,8 +180,10 @@ int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, | |||
173 | } | 180 | } |
174 | if ((nkey == 0) && (niv == 0)) break; | 181 | if ((nkey == 0) && (niv == 0)) break; |
175 | } | 182 | } |
183 | rv = type->key_len; | ||
184 | err: | ||
176 | EVP_MD_CTX_cleanup(&c); | 185 | EVP_MD_CTX_cleanup(&c); |
177 | OPENSSL_cleanse(&(md_buf[0]),EVP_MAX_MD_SIZE); | 186 | OPENSSL_cleanse(&(md_buf[0]),EVP_MAX_MD_SIZE); |
178 | return(type->key_len); | 187 | return rv; |
179 | } | 188 | } |
180 | 189 | ||
diff --git a/src/lib/libcrypto/evp/evp_lib.c b/src/lib/libcrypto/evp/evp_lib.c index 40951a04f0..b180e4828a 100644 --- a/src/lib/libcrypto/evp/evp_lib.c +++ b/src/lib/libcrypto/evp/evp_lib.c | |||
@@ -67,6 +67,8 @@ int EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
67 | 67 | ||
68 | if (c->cipher->set_asn1_parameters != NULL) | 68 | if (c->cipher->set_asn1_parameters != NULL) |
69 | ret=c->cipher->set_asn1_parameters(c,type); | 69 | ret=c->cipher->set_asn1_parameters(c,type); |
70 | else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) | ||
71 | ret=EVP_CIPHER_set_asn1_iv(c, type); | ||
70 | else | 72 | else |
71 | ret=-1; | 73 | ret=-1; |
72 | return(ret); | 74 | return(ret); |
@@ -78,6 +80,8 @@ int EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
78 | 80 | ||
79 | if (c->cipher->get_asn1_parameters != NULL) | 81 | if (c->cipher->get_asn1_parameters != NULL) |
80 | ret=c->cipher->get_asn1_parameters(c,type); | 82 | ret=c->cipher->get_asn1_parameters(c,type); |
83 | else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) | ||
84 | ret=EVP_CIPHER_get_asn1_iv(c, type); | ||
81 | else | 85 | else |
82 | ret=-1; | 86 | ret=-1; |
83 | return(ret); | 87 | return(ret); |
diff --git a/src/lib/libcrypto/evp/evp_locl.h b/src/lib/libcrypto/evp/evp_locl.h index 292d74c188..08c0a66d39 100644 --- a/src/lib/libcrypto/evp/evp_locl.h +++ b/src/lib/libcrypto/evp/evp_locl.h | |||
@@ -343,3 +343,43 @@ struct evp_pkey_method_st | |||
343 | } /* EVP_PKEY_METHOD */; | 343 | } /* EVP_PKEY_METHOD */; |
344 | 344 | ||
345 | void evp_pkey_set_cb_translate(BN_GENCB *cb, EVP_PKEY_CTX *ctx); | 345 | void evp_pkey_set_cb_translate(BN_GENCB *cb, EVP_PKEY_CTX *ctx); |
346 | |||
347 | int PKCS5_v2_PBKDF2_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | ||
348 | ASN1_TYPE *param, | ||
349 | const EVP_CIPHER *c, const EVP_MD *md, int en_de); | ||
350 | |||
351 | #ifdef OPENSSL_FIPS | ||
352 | |||
353 | #ifdef OPENSSL_DOING_MAKEDEPEND | ||
354 | #undef SHA1_Init | ||
355 | #undef SHA1_Update | ||
356 | #undef SHA224_Init | ||
357 | #undef SHA256_Init | ||
358 | #undef SHA384_Init | ||
359 | #undef SHA512_Init | ||
360 | #undef DES_set_key_unchecked | ||
361 | #endif | ||
362 | |||
363 | #define RIPEMD160_Init private_RIPEMD160_Init | ||
364 | #define WHIRLPOOL_Init private_WHIRLPOOL_Init | ||
365 | #define MD5_Init private_MD5_Init | ||
366 | #define MD4_Init private_MD4_Init | ||
367 | #define MD2_Init private_MD2_Init | ||
368 | #define MDC2_Init private_MDC2_Init | ||
369 | #define SHA_Init private_SHA_Init | ||
370 | #define SHA1_Init private_SHA1_Init | ||
371 | #define SHA224_Init private_SHA224_Init | ||
372 | #define SHA256_Init private_SHA256_Init | ||
373 | #define SHA384_Init private_SHA384_Init | ||
374 | #define SHA512_Init private_SHA512_Init | ||
375 | |||
376 | #define BF_set_key private_BF_set_key | ||
377 | #define CAST_set_key private_CAST_set_key | ||
378 | #define idea_set_encrypt_key private_idea_set_encrypt_key | ||
379 | #define SEED_set_key private_SEED_set_key | ||
380 | #define RC2_set_key private_RC2_set_key | ||
381 | #define RC4_set_key private_RC4_set_key | ||
382 | #define DES_set_key_unchecked private_DES_set_key_unchecked | ||
383 | #define Camellia_set_key private_Camellia_set_key | ||
384 | |||
385 | #endif | ||
diff --git a/src/lib/libcrypto/evp/evp_pbe.c b/src/lib/libcrypto/evp/evp_pbe.c index c9d932d205..f8c32d825e 100644 --- a/src/lib/libcrypto/evp/evp_pbe.c +++ b/src/lib/libcrypto/evp/evp_pbe.c | |||
@@ -61,6 +61,7 @@ | |||
61 | #include <openssl/evp.h> | 61 | #include <openssl/evp.h> |
62 | #include <openssl/pkcs12.h> | 62 | #include <openssl/pkcs12.h> |
63 | #include <openssl/x509.h> | 63 | #include <openssl/x509.h> |
64 | #include "evp_locl.h" | ||
64 | 65 | ||
65 | /* Password based encryption (PBE) functions */ | 66 | /* Password based encryption (PBE) functions */ |
66 | 67 | ||
@@ -87,6 +88,10 @@ static const EVP_PBE_CTL builtin_pbe[] = | |||
87 | {EVP_PBE_TYPE_OUTER, NID_pbeWithSHA1AndRC2_CBC, | 88 | {EVP_PBE_TYPE_OUTER, NID_pbeWithSHA1AndRC2_CBC, |
88 | NID_rc2_64_cbc, NID_sha1, PKCS5_PBE_keyivgen}, | 89 | NID_rc2_64_cbc, NID_sha1, PKCS5_PBE_keyivgen}, |
89 | 90 | ||
91 | #ifndef OPENSSL_NO_HMAC | ||
92 | {EVP_PBE_TYPE_OUTER, NID_id_pbkdf2, -1, -1, PKCS5_v2_PBKDF2_keyivgen}, | ||
93 | #endif | ||
94 | |||
90 | {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And128BitRC4, | 95 | {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And128BitRC4, |
91 | NID_rc4, NID_sha1, PKCS12_PBE_keyivgen}, | 96 | NID_rc4, NID_sha1, PKCS12_PBE_keyivgen}, |
92 | {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And40BitRC4, | 97 | {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And40BitRC4, |
diff --git a/src/lib/libcrypto/evp/evptests.txt b/src/lib/libcrypto/evp/evptests.txt index beb12144b6..c273707c14 100644 --- a/src/lib/libcrypto/evp/evptests.txt +++ b/src/lib/libcrypto/evp/evptests.txt | |||
@@ -158,6 +158,19 @@ AES-256-OFB:603DEB1015CA71BE2B73AEF0857D77811F352C073B6108D72D9810A30914DFF4:B7B | |||
158 | AES-256-OFB:603DEB1015CA71BE2B73AEF0857D77811F352C073B6108D72D9810A30914DFF4:E1C656305ED1A7A6563805746FE03EDC:30C81C46A35CE411E5FBC1191A0A52EF:71AB47A086E86EEDF39D1C5BBA97C408:0 | 158 | AES-256-OFB:603DEB1015CA71BE2B73AEF0857D77811F352C073B6108D72D9810A30914DFF4:E1C656305ED1A7A6563805746FE03EDC:30C81C46A35CE411E5FBC1191A0A52EF:71AB47A086E86EEDF39D1C5BBA97C408:0 |
159 | AES-256-OFB:603DEB1015CA71BE2B73AEF0857D77811F352C073B6108D72D9810A30914DFF4:41635BE625B48AFC1666DD42A09D96E7:F69F2445DF4F9B17AD2B417BE66C3710:0126141D67F37BE8538F5A8BE740E484:0 | 159 | AES-256-OFB:603DEB1015CA71BE2B73AEF0857D77811F352C073B6108D72D9810A30914DFF4:41635BE625B48AFC1666DD42A09D96E7:F69F2445DF4F9B17AD2B417BE66C3710:0126141D67F37BE8538F5A8BE740E484:0 |
160 | 160 | ||
161 | # AES Counter test vectors from RFC3686 | ||
162 | aes-128-ctr:AE6852F8121067CC4BF7A5765577F39E:00000030000000000000000000000001:53696E676C6520626C6F636B206D7367:E4095D4FB7A7B3792D6175A3261311B8:1 | ||
163 | aes-128-ctr:7E24067817FAE0D743D6CE1F32539163:006CB6DBC0543B59DA48D90B00000001:000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F:5104A106168A72D9790D41EE8EDAD388EB2E1EFC46DA57C8FCE630DF9141BE28:1 | ||
164 | aes-128-ctr:7691BE035E5020A8AC6E618529F9A0DC:00E0017B27777F3F4A1786F000000001:000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F20212223:C1CF48A89F2FFDD9CF4652E9EFDB72D74540A42BDE6D7836D59A5CEAAEF3105325B2072F:1 | ||
165 | |||
166 | aes-192-ctr:16AF5B145FC9F579C175F93E3BFB0EED863D06CCFDB78515:0000004836733C147D6D93CB00000001:53696E676C6520626C6F636B206D7367:4B55384FE259C9C84E7935A003CBE928:1 | ||
167 | aes-192-ctr:7C5CB2401B3DC33C19E7340819E0F69C678C3DB8E6F6A91A:0096B03B020C6EADC2CB500D00000001:000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F:453243FC609B23327EDFAAFA7131CD9F8490701C5AD4A79CFC1FE0FF42F4FB00:1 | ||
168 | aes-192-ctr:02BF391EE8ECB159B959617B0965279BF59B60A786D3E0FE:0007BDFD5CBD60278DCC091200000001:000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F20212223:96893FC55E5C722F540B7DD1DDF7E758D288BC95C69165884536C811662F2188ABEE0935:1 | ||
169 | |||
170 | aes-256-ctr:776BEFF2851DB06F4C8A0542C8696F6C6A81AF1EEC96B4D37FC1D689E6C1C104:00000060DB5672C97AA8F0B200000001:53696E676C6520626C6F636B206D7367:145AD01DBF824EC7560863DC71E3E0C0:1 | ||
171 | aes-256-ctr:F6D66D6BD52D59BB0796365879EFF886C66DD51A5B6A99744B50590C87A23884:00FAAC24C1585EF15A43D87500000001:000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F:F05E231B3894612C49EE000B804EB2A9B8306B508F839D6A5530831D9344AF1C:1 | ||
172 | aes-256-ctr:FF7A617CE69148E4F1726E2F43581DE2AA62D9F805532EDFF1EED687FB54153D:001CC5B751A51D70A1C1114800000001:000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F20212223:EB6C52821D0BBBF7CE7594462ACA4FAAB407DF866569FD07F48CC0B583D6071F1EC0E6B8:1 | ||
173 | |||
161 | # DES ECB tests (from destest) | 174 | # DES ECB tests (from destest) |
162 | 175 | ||
163 | DES-ECB:0000000000000000::0000000000000000:8CA64DE9C1B123A7 | 176 | DES-ECB:0000000000000000::0000000000000000:8CA64DE9C1B123A7 |
diff --git a/src/lib/libcrypto/evp/m_dss.c b/src/lib/libcrypto/evp/m_dss.c index 48c2689504..4ad63ada6f 100644 --- a/src/lib/libcrypto/evp/m_dss.c +++ b/src/lib/libcrypto/evp/m_dss.c | |||
@@ -66,6 +66,7 @@ | |||
66 | #endif | 66 | #endif |
67 | 67 | ||
68 | #ifndef OPENSSL_NO_SHA | 68 | #ifndef OPENSSL_NO_SHA |
69 | #ifndef OPENSSL_FIPS | ||
69 | 70 | ||
70 | static int init(EVP_MD_CTX *ctx) | 71 | static int init(EVP_MD_CTX *ctx) |
71 | { return SHA1_Init(ctx->md_data); } | 72 | { return SHA1_Init(ctx->md_data); } |
@@ -97,3 +98,4 @@ const EVP_MD *EVP_dss(void) | |||
97 | return(&dsa_md); | 98 | return(&dsa_md); |
98 | } | 99 | } |
99 | #endif | 100 | #endif |
101 | #endif | ||
diff --git a/src/lib/libcrypto/evp/m_dss1.c b/src/lib/libcrypto/evp/m_dss1.c index 4f03fb70e0..f80170efeb 100644 --- a/src/lib/libcrypto/evp/m_dss1.c +++ b/src/lib/libcrypto/evp/m_dss1.c | |||
@@ -68,6 +68,8 @@ | |||
68 | #include <openssl/dsa.h> | 68 | #include <openssl/dsa.h> |
69 | #endif | 69 | #endif |
70 | 70 | ||
71 | #ifndef OPENSSL_FIPS | ||
72 | |||
71 | static int init(EVP_MD_CTX *ctx) | 73 | static int init(EVP_MD_CTX *ctx) |
72 | { return SHA1_Init(ctx->md_data); } | 74 | { return SHA1_Init(ctx->md_data); } |
73 | 75 | ||
@@ -98,3 +100,4 @@ const EVP_MD *EVP_dss1(void) | |||
98 | return(&dss1_md); | 100 | return(&dss1_md); |
99 | } | 101 | } |
100 | #endif | 102 | #endif |
103 | #endif | ||
diff --git a/src/lib/libcrypto/evp/m_md4.c b/src/lib/libcrypto/evp/m_md4.c index 1e0b7c5b42..6d47f61b27 100644 --- a/src/lib/libcrypto/evp/m_md4.c +++ b/src/lib/libcrypto/evp/m_md4.c | |||
@@ -69,6 +69,8 @@ | |||
69 | #include <openssl/rsa.h> | 69 | #include <openssl/rsa.h> |
70 | #endif | 70 | #endif |
71 | 71 | ||
72 | #include "evp_locl.h" | ||
73 | |||
72 | static int init(EVP_MD_CTX *ctx) | 74 | static int init(EVP_MD_CTX *ctx) |
73 | { return MD4_Init(ctx->md_data); } | 75 | { return MD4_Init(ctx->md_data); } |
74 | 76 | ||
diff --git a/src/lib/libcrypto/evp/m_md5.c b/src/lib/libcrypto/evp/m_md5.c index 63c142119e..9a8bae0258 100644 --- a/src/lib/libcrypto/evp/m_md5.c +++ b/src/lib/libcrypto/evp/m_md5.c | |||
@@ -68,6 +68,7 @@ | |||
68 | #ifndef OPENSSL_NO_RSA | 68 | #ifndef OPENSSL_NO_RSA |
69 | #include <openssl/rsa.h> | 69 | #include <openssl/rsa.h> |
70 | #endif | 70 | #endif |
71 | #include "evp_locl.h" | ||
71 | 72 | ||
72 | static int init(EVP_MD_CTX *ctx) | 73 | static int init(EVP_MD_CTX *ctx) |
73 | { return MD5_Init(ctx->md_data); } | 74 | { return MD5_Init(ctx->md_data); } |
diff --git a/src/lib/libcrypto/evp/m_mdc2.c b/src/lib/libcrypto/evp/m_mdc2.c index b08d559803..3602bed316 100644 --- a/src/lib/libcrypto/evp/m_mdc2.c +++ b/src/lib/libcrypto/evp/m_mdc2.c | |||
@@ -69,6 +69,8 @@ | |||
69 | #include <openssl/rsa.h> | 69 | #include <openssl/rsa.h> |
70 | #endif | 70 | #endif |
71 | 71 | ||
72 | #include "evp_locl.h" | ||
73 | |||
72 | static int init(EVP_MD_CTX *ctx) | 74 | static int init(EVP_MD_CTX *ctx) |
73 | { return MDC2_Init(ctx->md_data); } | 75 | { return MDC2_Init(ctx->md_data); } |
74 | 76 | ||
diff --git a/src/lib/libcrypto/evp/m_ripemd.c b/src/lib/libcrypto/evp/m_ripemd.c index a1d60ee78d..7bf4804cf8 100644 --- a/src/lib/libcrypto/evp/m_ripemd.c +++ b/src/lib/libcrypto/evp/m_ripemd.c | |||
@@ -68,6 +68,7 @@ | |||
68 | #ifndef OPENSSL_NO_RSA | 68 | #ifndef OPENSSL_NO_RSA |
69 | #include <openssl/rsa.h> | 69 | #include <openssl/rsa.h> |
70 | #endif | 70 | #endif |
71 | #include "evp_locl.h" | ||
71 | 72 | ||
72 | static int init(EVP_MD_CTX *ctx) | 73 | static int init(EVP_MD_CTX *ctx) |
73 | { return RIPEMD160_Init(ctx->md_data); } | 74 | { return RIPEMD160_Init(ctx->md_data); } |
diff --git a/src/lib/libcrypto/evp/m_sha.c b/src/lib/libcrypto/evp/m_sha.c index acccc8f92d..8769cdd42f 100644 --- a/src/lib/libcrypto/evp/m_sha.c +++ b/src/lib/libcrypto/evp/m_sha.c | |||
@@ -67,6 +67,7 @@ | |||
67 | #ifndef OPENSSL_NO_RSA | 67 | #ifndef OPENSSL_NO_RSA |
68 | #include <openssl/rsa.h> | 68 | #include <openssl/rsa.h> |
69 | #endif | 69 | #endif |
70 | #include "evp_locl.h" | ||
70 | 71 | ||
71 | static int init(EVP_MD_CTX *ctx) | 72 | static int init(EVP_MD_CTX *ctx) |
72 | { return SHA_Init(ctx->md_data); } | 73 | { return SHA_Init(ctx->md_data); } |
diff --git a/src/lib/libcrypto/evp/m_sha1.c b/src/lib/libcrypto/evp/m_sha1.c index 9a2790fdea..3cb11f1ebb 100644 --- a/src/lib/libcrypto/evp/m_sha1.c +++ b/src/lib/libcrypto/evp/m_sha1.c | |||
@@ -59,6 +59,8 @@ | |||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
61 | 61 | ||
62 | #ifndef OPENSSL_FIPS | ||
63 | |||
62 | #ifndef OPENSSL_NO_SHA | 64 | #ifndef OPENSSL_NO_SHA |
63 | 65 | ||
64 | #include <openssl/evp.h> | 66 | #include <openssl/evp.h> |
@@ -68,6 +70,7 @@ | |||
68 | #include <openssl/rsa.h> | 70 | #include <openssl/rsa.h> |
69 | #endif | 71 | #endif |
70 | 72 | ||
73 | |||
71 | static int init(EVP_MD_CTX *ctx) | 74 | static int init(EVP_MD_CTX *ctx) |
72 | { return SHA1_Init(ctx->md_data); } | 75 | { return SHA1_Init(ctx->md_data); } |
73 | 76 | ||
@@ -202,3 +205,5 @@ static const EVP_MD sha512_md= | |||
202 | const EVP_MD *EVP_sha512(void) | 205 | const EVP_MD *EVP_sha512(void) |
203 | { return(&sha512_md); } | 206 | { return(&sha512_md); } |
204 | #endif /* ifndef OPENSSL_NO_SHA512 */ | 207 | #endif /* ifndef OPENSSL_NO_SHA512 */ |
208 | |||
209 | #endif | ||
diff --git a/src/lib/libcrypto/evp/names.c b/src/lib/libcrypto/evp/names.c index f2869f5c78..6311ad7cfb 100644 --- a/src/lib/libcrypto/evp/names.c +++ b/src/lib/libcrypto/evp/names.c | |||
@@ -66,6 +66,10 @@ int EVP_add_cipher(const EVP_CIPHER *c) | |||
66 | { | 66 | { |
67 | int r; | 67 | int r; |
68 | 68 | ||
69 | if (c == NULL) return 0; | ||
70 | |||
71 | OPENSSL_init(); | ||
72 | |||
69 | r=OBJ_NAME_add(OBJ_nid2sn(c->nid),OBJ_NAME_TYPE_CIPHER_METH,(const char *)c); | 73 | r=OBJ_NAME_add(OBJ_nid2sn(c->nid),OBJ_NAME_TYPE_CIPHER_METH,(const char *)c); |
70 | if (r == 0) return(0); | 74 | if (r == 0) return(0); |
71 | check_defer(c->nid); | 75 | check_defer(c->nid); |
@@ -78,6 +82,7 @@ int EVP_add_digest(const EVP_MD *md) | |||
78 | { | 82 | { |
79 | int r; | 83 | int r; |
80 | const char *name; | 84 | const char *name; |
85 | OPENSSL_init(); | ||
81 | 86 | ||
82 | name=OBJ_nid2sn(md->type); | 87 | name=OBJ_nid2sn(md->type); |
83 | r=OBJ_NAME_add(name,OBJ_NAME_TYPE_MD_METH,(const char *)md); | 88 | r=OBJ_NAME_add(name,OBJ_NAME_TYPE_MD_METH,(const char *)md); |
diff --git a/src/lib/libcrypto/evp/p5_crpt.c b/src/lib/libcrypto/evp/p5_crpt.c index 7ecfa8dad9..294cc90d87 100644 --- a/src/lib/libcrypto/evp/p5_crpt.c +++ b/src/lib/libcrypto/evp/p5_crpt.c | |||
@@ -82,6 +82,8 @@ int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, | |||
82 | unsigned char *salt; | 82 | unsigned char *salt; |
83 | const unsigned char *pbuf; | 83 | const unsigned char *pbuf; |
84 | int mdsize; | 84 | int mdsize; |
85 | int rv = 0; | ||
86 | EVP_MD_CTX_init(&ctx); | ||
85 | 87 | ||
86 | /* Extract useful info from parameter */ | 88 | /* Extract useful info from parameter */ |
87 | if (param == NULL || param->type != V_ASN1_SEQUENCE || | 89 | if (param == NULL || param->type != V_ASN1_SEQUENCE || |
@@ -104,29 +106,38 @@ int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, | |||
104 | if(!pass) passlen = 0; | 106 | if(!pass) passlen = 0; |
105 | else if(passlen == -1) passlen = strlen(pass); | 107 | else if(passlen == -1) passlen = strlen(pass); |
106 | 108 | ||
107 | EVP_MD_CTX_init(&ctx); | 109 | if (!EVP_DigestInit_ex(&ctx, md, NULL)) |
108 | EVP_DigestInit_ex(&ctx, md, NULL); | 110 | goto err; |
109 | EVP_DigestUpdate(&ctx, pass, passlen); | 111 | if (!EVP_DigestUpdate(&ctx, pass, passlen)) |
110 | EVP_DigestUpdate(&ctx, salt, saltlen); | 112 | goto err; |
113 | if (!EVP_DigestUpdate(&ctx, salt, saltlen)) | ||
114 | goto err; | ||
111 | PBEPARAM_free(pbe); | 115 | PBEPARAM_free(pbe); |
112 | EVP_DigestFinal_ex(&ctx, md_tmp, NULL); | 116 | if (!EVP_DigestFinal_ex(&ctx, md_tmp, NULL)) |
117 | goto err; | ||
113 | mdsize = EVP_MD_size(md); | 118 | mdsize = EVP_MD_size(md); |
114 | if (mdsize < 0) | 119 | if (mdsize < 0) |
115 | return 0; | 120 | return 0; |
116 | for (i = 1; i < iter; i++) { | 121 | for (i = 1; i < iter; i++) { |
117 | EVP_DigestInit_ex(&ctx, md, NULL); | 122 | if (!EVP_DigestInit_ex(&ctx, md, NULL)) |
118 | EVP_DigestUpdate(&ctx, md_tmp, mdsize); | 123 | goto err; |
119 | EVP_DigestFinal_ex (&ctx, md_tmp, NULL); | 124 | if (!EVP_DigestUpdate(&ctx, md_tmp, mdsize)) |
125 | goto err; | ||
126 | if (!EVP_DigestFinal_ex (&ctx, md_tmp, NULL)) | ||
127 | goto err; | ||
120 | } | 128 | } |
121 | EVP_MD_CTX_cleanup(&ctx); | ||
122 | OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp)); | 129 | OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp)); |
123 | memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); | 130 | memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); |
124 | OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16); | 131 | OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16); |
125 | memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), | 132 | memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), |
126 | EVP_CIPHER_iv_length(cipher)); | 133 | EVP_CIPHER_iv_length(cipher)); |
127 | EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de); | 134 | if (!EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de)) |
135 | goto err; | ||
128 | OPENSSL_cleanse(md_tmp, EVP_MAX_MD_SIZE); | 136 | OPENSSL_cleanse(md_tmp, EVP_MAX_MD_SIZE); |
129 | OPENSSL_cleanse(key, EVP_MAX_KEY_LENGTH); | 137 | OPENSSL_cleanse(key, EVP_MAX_KEY_LENGTH); |
130 | OPENSSL_cleanse(iv, EVP_MAX_IV_LENGTH); | 138 | OPENSSL_cleanse(iv, EVP_MAX_IV_LENGTH); |
131 | return 1; | 139 | rv = 1; |
140 | err: | ||
141 | EVP_MD_CTX_cleanup(&ctx); | ||
142 | return rv; | ||
132 | } | 143 | } |
diff --git a/src/lib/libcrypto/evp/p5_crpt2.c b/src/lib/libcrypto/evp/p5_crpt2.c index 334379f310..975d004df4 100644 --- a/src/lib/libcrypto/evp/p5_crpt2.c +++ b/src/lib/libcrypto/evp/p5_crpt2.c | |||
@@ -62,6 +62,7 @@ | |||
62 | #include <openssl/x509.h> | 62 | #include <openssl/x509.h> |
63 | #include <openssl/evp.h> | 63 | #include <openssl/evp.h> |
64 | #include <openssl/hmac.h> | 64 | #include <openssl/hmac.h> |
65 | #include "evp_locl.h" | ||
65 | 66 | ||
66 | /* set this to print out info about the keygen algorithm */ | 67 | /* set this to print out info about the keygen algorithm */ |
67 | /* #define DEBUG_PKCS5V2 */ | 68 | /* #define DEBUG_PKCS5V2 */ |
@@ -110,10 +111,14 @@ int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, | |||
110 | itmp[1] = (unsigned char)((i >> 16) & 0xff); | 111 | itmp[1] = (unsigned char)((i >> 16) & 0xff); |
111 | itmp[2] = (unsigned char)((i >> 8) & 0xff); | 112 | itmp[2] = (unsigned char)((i >> 8) & 0xff); |
112 | itmp[3] = (unsigned char)(i & 0xff); | 113 | itmp[3] = (unsigned char)(i & 0xff); |
113 | HMAC_Init_ex(&hctx, pass, passlen, digest, NULL); | 114 | if (!HMAC_Init_ex(&hctx, pass, passlen, digest, NULL) |
114 | HMAC_Update(&hctx, salt, saltlen); | 115 | || !HMAC_Update(&hctx, salt, saltlen) |
115 | HMAC_Update(&hctx, itmp, 4); | 116 | || !HMAC_Update(&hctx, itmp, 4) |
116 | HMAC_Final(&hctx, digtmp, NULL); | 117 | || !HMAC_Final(&hctx, digtmp, NULL)) |
118 | { | ||
119 | HMAC_CTX_cleanup(&hctx); | ||
120 | return 0; | ||
121 | } | ||
117 | memcpy(p, digtmp, cplen); | 122 | memcpy(p, digtmp, cplen); |
118 | for(j = 1; j < iter; j++) | 123 | for(j = 1; j < iter; j++) |
119 | { | 124 | { |
@@ -168,27 +173,24 @@ int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | |||
168 | ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, | 173 | ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, |
169 | int en_de) | 174 | int en_de) |
170 | { | 175 | { |
171 | unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; | ||
172 | const unsigned char *pbuf; | 176 | const unsigned char *pbuf; |
173 | int saltlen, iter, plen; | 177 | int plen; |
174 | unsigned int keylen; | ||
175 | PBE2PARAM *pbe2 = NULL; | 178 | PBE2PARAM *pbe2 = NULL; |
176 | const EVP_CIPHER *cipher; | 179 | const EVP_CIPHER *cipher; |
177 | PBKDF2PARAM *kdf = NULL; | 180 | |
178 | const EVP_MD *prfmd; | 181 | int rv = 0; |
179 | int prf_nid, hmac_md_nid; | ||
180 | 182 | ||
181 | if (param == NULL || param->type != V_ASN1_SEQUENCE || | 183 | if (param == NULL || param->type != V_ASN1_SEQUENCE || |
182 | param->value.sequence == NULL) { | 184 | param->value.sequence == NULL) { |
183 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); | 185 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); |
184 | return 0; | 186 | goto err; |
185 | } | 187 | } |
186 | 188 | ||
187 | pbuf = param->value.sequence->data; | 189 | pbuf = param->value.sequence->data; |
188 | plen = param->value.sequence->length; | 190 | plen = param->value.sequence->length; |
189 | if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) { | 191 | if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) { |
190 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); | 192 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); |
191 | return 0; | 193 | goto err; |
192 | } | 194 | } |
193 | 195 | ||
194 | /* See if we recognise the key derivation function */ | 196 | /* See if we recognise the key derivation function */ |
@@ -211,38 +213,63 @@ int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | |||
211 | } | 213 | } |
212 | 214 | ||
213 | /* Fixup cipher based on AlgorithmIdentifier */ | 215 | /* Fixup cipher based on AlgorithmIdentifier */ |
214 | EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de); | 216 | if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de)) |
217 | goto err; | ||
215 | if(EVP_CIPHER_asn1_to_param(ctx, pbe2->encryption->parameter) < 0) { | 218 | if(EVP_CIPHER_asn1_to_param(ctx, pbe2->encryption->parameter) < 0) { |
216 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, | 219 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, |
217 | EVP_R_CIPHER_PARAMETER_ERROR); | 220 | EVP_R_CIPHER_PARAMETER_ERROR); |
218 | goto err; | 221 | goto err; |
219 | } | 222 | } |
223 | rv = PKCS5_v2_PBKDF2_keyivgen(ctx, pass, passlen, | ||
224 | pbe2->keyfunc->parameter, c, md, en_de); | ||
225 | err: | ||
226 | PBE2PARAM_free(pbe2); | ||
227 | return rv; | ||
228 | } | ||
229 | |||
230 | int PKCS5_v2_PBKDF2_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | ||
231 | ASN1_TYPE *param, | ||
232 | const EVP_CIPHER *c, const EVP_MD *md, int en_de) | ||
233 | { | ||
234 | unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; | ||
235 | const unsigned char *pbuf; | ||
236 | int saltlen, iter, plen; | ||
237 | int rv = 0; | ||
238 | unsigned int keylen = 0; | ||
239 | int prf_nid, hmac_md_nid; | ||
240 | PBKDF2PARAM *kdf = NULL; | ||
241 | const EVP_MD *prfmd; | ||
242 | |||
243 | if (EVP_CIPHER_CTX_cipher(ctx) == NULL) | ||
244 | { | ||
245 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN,EVP_R_NO_CIPHER_SET); | ||
246 | goto err; | ||
247 | } | ||
220 | keylen = EVP_CIPHER_CTX_key_length(ctx); | 248 | keylen = EVP_CIPHER_CTX_key_length(ctx); |
221 | OPENSSL_assert(keylen <= sizeof key); | 249 | OPENSSL_assert(keylen <= sizeof key); |
222 | 250 | ||
223 | /* Now decode key derivation function */ | 251 | /* Decode parameter */ |
224 | 252 | ||
225 | if(!pbe2->keyfunc->parameter || | 253 | if(!param || (param->type != V_ASN1_SEQUENCE)) |
226 | (pbe2->keyfunc->parameter->type != V_ASN1_SEQUENCE)) | ||
227 | { | 254 | { |
228 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); | 255 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN,EVP_R_DECODE_ERROR); |
229 | goto err; | 256 | goto err; |
230 | } | 257 | } |
231 | 258 | ||
232 | pbuf = pbe2->keyfunc->parameter->value.sequence->data; | 259 | pbuf = param->value.sequence->data; |
233 | plen = pbe2->keyfunc->parameter->value.sequence->length; | 260 | plen = param->value.sequence->length; |
261 | |||
234 | if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { | 262 | if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { |
235 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); | 263 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN,EVP_R_DECODE_ERROR); |
236 | goto err; | 264 | goto err; |
237 | } | 265 | } |
238 | 266 | ||
239 | PBE2PARAM_free(pbe2); | 267 | keylen = EVP_CIPHER_CTX_key_length(ctx); |
240 | pbe2 = NULL; | ||
241 | 268 | ||
242 | /* Now check the parameters of the kdf */ | 269 | /* Now check the parameters of the kdf */ |
243 | 270 | ||
244 | if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ | 271 | if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ |
245 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, | 272 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN, |
246 | EVP_R_UNSUPPORTED_KEYLENGTH); | 273 | EVP_R_UNSUPPORTED_KEYLENGTH); |
247 | goto err; | 274 | goto err; |
248 | } | 275 | } |
@@ -254,19 +281,19 @@ int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | |||
254 | 281 | ||
255 | if (!EVP_PBE_find(EVP_PBE_TYPE_PRF, prf_nid, NULL, &hmac_md_nid, 0)) | 282 | if (!EVP_PBE_find(EVP_PBE_TYPE_PRF, prf_nid, NULL, &hmac_md_nid, 0)) |
256 | { | 283 | { |
257 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, EVP_R_UNSUPPORTED_PRF); | 284 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN, EVP_R_UNSUPPORTED_PRF); |
258 | goto err; | 285 | goto err; |
259 | } | 286 | } |
260 | 287 | ||
261 | prfmd = EVP_get_digestbynid(hmac_md_nid); | 288 | prfmd = EVP_get_digestbynid(hmac_md_nid); |
262 | if (prfmd == NULL) | 289 | if (prfmd == NULL) |
263 | { | 290 | { |
264 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, EVP_R_UNSUPPORTED_PRF); | 291 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN, EVP_R_UNSUPPORTED_PRF); |
265 | goto err; | 292 | goto err; |
266 | } | 293 | } |
267 | 294 | ||
268 | if(kdf->salt->type != V_ASN1_OCTET_STRING) { | 295 | if(kdf->salt->type != V_ASN1_OCTET_STRING) { |
269 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, | 296 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN, |
270 | EVP_R_UNSUPPORTED_SALT_TYPE); | 297 | EVP_R_UNSUPPORTED_SALT_TYPE); |
271 | goto err; | 298 | goto err; |
272 | } | 299 | } |
@@ -278,15 +305,11 @@ int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | |||
278 | if(!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd, | 305 | if(!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd, |
279 | keylen, key)) | 306 | keylen, key)) |
280 | goto err; | 307 | goto err; |
281 | EVP_CipherInit_ex(ctx, NULL, NULL, key, NULL, en_de); | 308 | rv = EVP_CipherInit_ex(ctx, NULL, NULL, key, NULL, en_de); |
282 | OPENSSL_cleanse(key, keylen); | ||
283 | PBKDF2PARAM_free(kdf); | ||
284 | return 1; | ||
285 | |||
286 | err: | 309 | err: |
287 | PBE2PARAM_free(pbe2); | 310 | OPENSSL_cleanse(key, keylen); |
288 | PBKDF2PARAM_free(kdf); | 311 | PBKDF2PARAM_free(kdf); |
289 | return 0; | 312 | return rv; |
290 | } | 313 | } |
291 | 314 | ||
292 | #ifdef DEBUG_PKCS5V2 | 315 | #ifdef DEBUG_PKCS5V2 |
diff --git a/src/lib/libcrypto/evp/p_open.c b/src/lib/libcrypto/evp/p_open.c index 53a59a295c..c748fbea87 100644 --- a/src/lib/libcrypto/evp/p_open.c +++ b/src/lib/libcrypto/evp/p_open.c | |||
@@ -115,7 +115,8 @@ int EVP_OpenFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
115 | int i; | 115 | int i; |
116 | 116 | ||
117 | i=EVP_DecryptFinal_ex(ctx,out,outl); | 117 | i=EVP_DecryptFinal_ex(ctx,out,outl); |
118 | EVP_DecryptInit_ex(ctx,NULL,NULL,NULL,NULL); | 118 | if (i) |
119 | i = EVP_DecryptInit_ex(ctx,NULL,NULL,NULL,NULL); | ||
119 | return(i); | 120 | return(i); |
120 | } | 121 | } |
121 | #else /* !OPENSSL_NO_RSA */ | 122 | #else /* !OPENSSL_NO_RSA */ |
diff --git a/src/lib/libcrypto/evp/p_seal.c b/src/lib/libcrypto/evp/p_seal.c index d8324526e7..e5919b0fbf 100644 --- a/src/lib/libcrypto/evp/p_seal.c +++ b/src/lib/libcrypto/evp/p_seal.c | |||
@@ -110,6 +110,7 @@ int EVP_SealFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
110 | { | 110 | { |
111 | int i; | 111 | int i; |
112 | i = EVP_EncryptFinal_ex(ctx,out,outl); | 112 | i = EVP_EncryptFinal_ex(ctx,out,outl); |
113 | EVP_EncryptInit_ex(ctx,NULL,NULL,NULL,NULL); | 113 | if (i) |
114 | i = EVP_EncryptInit_ex(ctx,NULL,NULL,NULL,NULL); | ||
114 | return i; | 115 | return i; |
115 | } | 116 | } |
diff --git a/src/lib/libcrypto/evp/p_sign.c b/src/lib/libcrypto/evp/p_sign.c index bb893f5bde..dfa48c157c 100644 --- a/src/lib/libcrypto/evp/p_sign.c +++ b/src/lib/libcrypto/evp/p_sign.c | |||
@@ -80,18 +80,20 @@ int EVP_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, | |||
80 | { | 80 | { |
81 | unsigned char m[EVP_MAX_MD_SIZE]; | 81 | unsigned char m[EVP_MAX_MD_SIZE]; |
82 | unsigned int m_len; | 82 | unsigned int m_len; |
83 | int i,ok=0,v; | 83 | int i=0,ok=0,v; |
84 | EVP_MD_CTX tmp_ctx; | 84 | EVP_MD_CTX tmp_ctx; |
85 | EVP_PKEY_CTX *pkctx = NULL; | ||
85 | 86 | ||
86 | *siglen=0; | 87 | *siglen=0; |
87 | EVP_MD_CTX_init(&tmp_ctx); | 88 | EVP_MD_CTX_init(&tmp_ctx); |
88 | EVP_MD_CTX_copy_ex(&tmp_ctx,ctx); | 89 | if (!EVP_MD_CTX_copy_ex(&tmp_ctx,ctx)) |
89 | EVP_DigestFinal_ex(&tmp_ctx,&(m[0]),&m_len); | 90 | goto err; |
91 | if (!EVP_DigestFinal_ex(&tmp_ctx,&(m[0]),&m_len)) | ||
92 | goto err; | ||
90 | EVP_MD_CTX_cleanup(&tmp_ctx); | 93 | EVP_MD_CTX_cleanup(&tmp_ctx); |
91 | 94 | ||
92 | if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) | 95 | if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) |
93 | { | 96 | { |
94 | EVP_PKEY_CTX *pkctx = NULL; | ||
95 | size_t sltmp = (size_t)EVP_PKEY_size(pkey); | 97 | size_t sltmp = (size_t)EVP_PKEY_size(pkey); |
96 | i = 0; | 98 | i = 0; |
97 | pkctx = EVP_PKEY_CTX_new(pkey, NULL); | 99 | pkctx = EVP_PKEY_CTX_new(pkey, NULL); |
diff --git a/src/lib/libcrypto/evp/p_verify.c b/src/lib/libcrypto/evp/p_verify.c index 41d4b67130..5f5c409f45 100644 --- a/src/lib/libcrypto/evp/p_verify.c +++ b/src/lib/libcrypto/evp/p_verify.c | |||
@@ -67,17 +67,19 @@ int EVP_VerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sigbuf, | |||
67 | { | 67 | { |
68 | unsigned char m[EVP_MAX_MD_SIZE]; | 68 | unsigned char m[EVP_MAX_MD_SIZE]; |
69 | unsigned int m_len; | 69 | unsigned int m_len; |
70 | int i,ok=0,v; | 70 | int i=-1,ok=0,v; |
71 | EVP_MD_CTX tmp_ctx; | 71 | EVP_MD_CTX tmp_ctx; |
72 | EVP_PKEY_CTX *pkctx = NULL; | ||
72 | 73 | ||
73 | EVP_MD_CTX_init(&tmp_ctx); | 74 | EVP_MD_CTX_init(&tmp_ctx); |
74 | EVP_MD_CTX_copy_ex(&tmp_ctx,ctx); | 75 | if (!EVP_MD_CTX_copy_ex(&tmp_ctx,ctx)) |
75 | EVP_DigestFinal_ex(&tmp_ctx,&(m[0]),&m_len); | 76 | goto err; |
77 | if (!EVP_DigestFinal_ex(&tmp_ctx,&(m[0]),&m_len)) | ||
78 | goto err; | ||
76 | EVP_MD_CTX_cleanup(&tmp_ctx); | 79 | EVP_MD_CTX_cleanup(&tmp_ctx); |
77 | 80 | ||
78 | if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) | 81 | if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) |
79 | { | 82 | { |
80 | EVP_PKEY_CTX *pkctx = NULL; | ||
81 | i = -1; | 83 | i = -1; |
82 | pkctx = EVP_PKEY_CTX_new(pkey, NULL); | 84 | pkctx = EVP_PKEY_CTX_new(pkey, NULL); |
83 | if (!pkctx) | 85 | if (!pkctx) |