diff options
Diffstat (limited to '')
32 files changed, 3088 insertions, 2998 deletions
diff --git a/src/lib/libcrypto/evp/e_aes.c b/src/lib/libcrypto/evp/e_aes.c index d6f0124a94..db0fdf85c8 100644 --- a/src/lib/libcrypto/evp/e_aes.c +++ b/src/lib/libcrypto/evp/e_aes.c | |||
| @@ -6,7 +6,7 @@ | |||
| 6 | * are met: | 6 | * are met: |
| 7 | * | 7 | * |
| 8 | * 1. Redistributions of source code must retain the above copyright | 8 | * 1. Redistributions of source code must retain the above copyright |
| 9 | * notice, this list of conditions and the following disclaimer. | 9 | * notice, this list of conditions and the following disclaimer. |
| 10 | * | 10 | * |
| 11 | * 2. Redistributions in binary form must reproduce the above copyright | 11 | * 2. Redistributions in binary form must reproduce the above copyright |
| 12 | * notice, this list of conditions and the following disclaimer in | 12 | * notice, this list of conditions and the following disclaimer in |
| @@ -60,18 +60,16 @@ | |||
| 60 | #include "modes_lcl.h" | 60 | #include "modes_lcl.h" |
| 61 | #include <openssl/rand.h> | 61 | #include <openssl/rand.h> |
| 62 | 62 | ||
| 63 | typedef struct | 63 | typedef struct { |
| 64 | { | ||
| 65 | AES_KEY ks; | 64 | AES_KEY ks; |
| 66 | block128_f block; | 65 | block128_f block; |
| 67 | union { | 66 | union { |
| 68 | cbc128_f cbc; | 67 | cbc128_f cbc; |
| 69 | ctr128_f ctr; | 68 | ctr128_f ctr; |
| 70 | } stream; | 69 | } stream; |
| 71 | } EVP_AES_KEY; | 70 | } EVP_AES_KEY; |
| 72 | 71 | ||
| 73 | typedef struct | 72 | typedef struct { |
| 74 | { | ||
| 75 | AES_KEY ks; /* AES key schedule to use */ | 73 | AES_KEY ks; /* AES key schedule to use */ |
| 76 | int key_set; /* Set if key initialised */ | 74 | int key_set; /* Set if key initialised */ |
| 77 | int iv_set; /* Set if an iv is set */ | 75 | int iv_set; /* Set if an iv is set */ |
| @@ -82,20 +80,17 @@ typedef struct | |||
| 82 | int iv_gen; /* It is OK to generate IVs */ | 80 | int iv_gen; /* It is OK to generate IVs */ |
| 83 | int tls_aad_len; /* TLS AAD length */ | 81 | int tls_aad_len; /* TLS AAD length */ |
| 84 | ctr128_f ctr; | 82 | ctr128_f ctr; |
| 85 | } EVP_AES_GCM_CTX; | 83 | } EVP_AES_GCM_CTX; |
| 86 | 84 | ||
| 87 | typedef struct | 85 | typedef struct { |
| 88 | { | ||
| 89 | AES_KEY ks1, ks2; /* AES key schedules to use */ | 86 | AES_KEY ks1, ks2; /* AES key schedules to use */ |
| 90 | XTS128_CONTEXT xts; | 87 | XTS128_CONTEXT xts; |
| 91 | void (*stream)(const unsigned char *in, | 88 | void (*stream)(const unsigned char *in, unsigned char *out, |
| 92 | unsigned char *out, size_t length, | 89 | size_t length, const AES_KEY *key1, const AES_KEY *key2, |
| 93 | const AES_KEY *key1, const AES_KEY *key2, | 90 | const unsigned char iv[16]); |
| 94 | const unsigned char iv[16]); | 91 | } EVP_AES_XTS_CTX; |
| 95 | } EVP_AES_XTS_CTX; | 92 | |
| 96 | 93 | typedef struct { | |
| 97 | typedef struct | ||
| 98 | { | ||
| 99 | AES_KEY ks; /* AES key schedule to use */ | 94 | AES_KEY ks; /* AES key schedule to use */ |
| 100 | int key_set; /* Set if key initialised */ | 95 | int key_set; /* Set if key initialised */ |
| 101 | int iv_set; /* Set if an iv is set */ | 96 | int iv_set; /* Set if an iv is set */ |
| @@ -104,53 +99,46 @@ typedef struct | |||
| 104 | int L, M; /* L and M parameters from RFC3610 */ | 99 | int L, M; /* L and M parameters from RFC3610 */ |
| 105 | CCM128_CONTEXT ccm; | 100 | CCM128_CONTEXT ccm; |
| 106 | ccm128_f str; | 101 | ccm128_f str; |
| 107 | } EVP_AES_CCM_CTX; | 102 | } EVP_AES_CCM_CTX; |
| 108 | 103 | ||
| 109 | #define MAXBITCHUNK ((size_t)1<<(sizeof(size_t)*8-4)) | 104 | #define MAXBITCHUNK ((size_t)1<<(sizeof(size_t)*8-4)) |
| 110 | 105 | ||
| 111 | #ifdef VPAES_ASM | 106 | #ifdef VPAES_ASM |
| 112 | int vpaes_set_encrypt_key(const unsigned char *userKey, int bits, | 107 | int vpaes_set_encrypt_key(const unsigned char *userKey, int bits, |
| 113 | AES_KEY *key); | 108 | AES_KEY *key); |
| 114 | int vpaes_set_decrypt_key(const unsigned char *userKey, int bits, | 109 | int vpaes_set_decrypt_key(const unsigned char *userKey, int bits, |
| 115 | AES_KEY *key); | 110 | AES_KEY *key); |
| 116 | 111 | ||
| 117 | void vpaes_encrypt(const unsigned char *in, unsigned char *out, | 112 | void vpaes_encrypt(const unsigned char *in, unsigned char *out, |
| 118 | const AES_KEY *key); | 113 | const AES_KEY *key); |
| 119 | void vpaes_decrypt(const unsigned char *in, unsigned char *out, | 114 | void vpaes_decrypt(const unsigned char *in, unsigned char *out, |
| 120 | const AES_KEY *key); | 115 | const AES_KEY *key); |
| 121 | 116 | ||
| 122 | void vpaes_cbc_encrypt(const unsigned char *in, | 117 | void vpaes_cbc_encrypt(const unsigned char *in, unsigned char *out, |
| 123 | unsigned char *out, | 118 | size_t length, const AES_KEY *key, unsigned char *ivec, int enc); |
| 124 | size_t length, | ||
| 125 | const AES_KEY *key, | ||
| 126 | unsigned char *ivec, int enc); | ||
| 127 | #endif | 119 | #endif |
| 128 | #ifdef BSAES_ASM | 120 | #ifdef BSAES_ASM |
| 129 | void bsaes_cbc_encrypt(const unsigned char *in, unsigned char *out, | 121 | void bsaes_cbc_encrypt(const unsigned char *in, unsigned char *out, |
| 130 | size_t length, const AES_KEY *key, | 122 | size_t length, const AES_KEY *key, unsigned char ivec[16], int enc); |
| 131 | unsigned char ivec[16], int enc); | ||
| 132 | void bsaes_ctr32_encrypt_blocks(const unsigned char *in, unsigned char *out, | 123 | void bsaes_ctr32_encrypt_blocks(const unsigned char *in, unsigned char *out, |
| 133 | size_t len, const AES_KEY *key, | 124 | size_t len, const AES_KEY *key, const unsigned char ivec[16]); |
| 134 | const unsigned char ivec[16]); | ||
| 135 | void bsaes_xts_encrypt(const unsigned char *inp, unsigned char *out, | 125 | void bsaes_xts_encrypt(const unsigned char *inp, unsigned char *out, |
| 136 | size_t len, const AES_KEY *key1, | 126 | size_t len, const AES_KEY *key1, const AES_KEY *key2, |
| 137 | const AES_KEY *key2, const unsigned char iv[16]); | 127 | const unsigned char iv[16]); |
| 138 | void bsaes_xts_decrypt(const unsigned char *inp, unsigned char *out, | 128 | void bsaes_xts_decrypt(const unsigned char *inp, unsigned char *out, |
| 139 | size_t len, const AES_KEY *key1, | 129 | size_t len, const AES_KEY *key1, const AES_KEY *key2, |
| 140 | const AES_KEY *key2, const unsigned char iv[16]); | 130 | const unsigned char iv[16]); |
| 141 | #endif | 131 | #endif |
| 142 | #ifdef AES_CTR_ASM | 132 | #ifdef AES_CTR_ASM |
| 143 | void AES_ctr32_encrypt(const unsigned char *in, unsigned char *out, | 133 | void AES_ctr32_encrypt(const unsigned char *in, unsigned char *out, |
| 144 | size_t blocks, const AES_KEY *key, | 134 | size_t blocks, const AES_KEY *key, |
| 145 | const unsigned char ivec[AES_BLOCK_SIZE]); | 135 | const unsigned char ivec[AES_BLOCK_SIZE]); |
| 146 | #endif | 136 | #endif |
| 147 | #ifdef AES_XTS_ASM | 137 | #ifdef AES_XTS_ASM |
| 148 | void AES_xts_encrypt(const char *inp,char *out,size_t len, | 138 | void AES_xts_encrypt(const char *inp, char *out, size_t len, |
| 149 | const AES_KEY *key1, const AES_KEY *key2, | 139 | const AES_KEY *key1, const AES_KEY *key2, const unsigned char iv[16]); |
| 150 | const unsigned char iv[16]); | 140 | void AES_xts_decrypt(const char *inp, char *out, size_t len, |
| 151 | void AES_xts_decrypt(const char *inp,char *out,size_t len, | 141 | const AES_KEY *key1, const AES_KEY *key2, const unsigned char iv[16]); |
| 152 | const AES_KEY *key1, const AES_KEY *key2, | ||
| 153 | const unsigned char iv[16]); | ||
| 154 | #endif | 142 | #endif |
| 155 | 143 | ||
| 156 | #if defined(AES_ASM) && !defined(I386_ONLY) && ( \ | 144 | #if defined(AES_ASM) && !defined(I386_ONLY) && ( \ |
| @@ -174,160 +162,142 @@ extern unsigned int OPENSSL_ia32cap_P[2]; | |||
| 174 | #define AESNI_CAPABLE (OPENSSL_ia32cap_P[1]&(1<<(57-32))) | 162 | #define AESNI_CAPABLE (OPENSSL_ia32cap_P[1]&(1<<(57-32))) |
| 175 | 163 | ||
| 176 | int aesni_set_encrypt_key(const unsigned char *userKey, int bits, | 164 | int aesni_set_encrypt_key(const unsigned char *userKey, int bits, |
| 177 | AES_KEY *key); | 165 | AES_KEY *key); |
| 178 | int aesni_set_decrypt_key(const unsigned char *userKey, int bits, | 166 | int aesni_set_decrypt_key(const unsigned char *userKey, int bits, |
| 179 | AES_KEY *key); | 167 | AES_KEY *key); |
| 180 | 168 | ||
| 181 | void aesni_encrypt(const unsigned char *in, unsigned char *out, | 169 | void aesni_encrypt(const unsigned char *in, unsigned char *out, |
| 182 | const AES_KEY *key); | 170 | const AES_KEY *key); |
| 183 | void aesni_decrypt(const unsigned char *in, unsigned char *out, | 171 | void aesni_decrypt(const unsigned char *in, unsigned char *out, |
| 184 | const AES_KEY *key); | 172 | const AES_KEY *key); |
| 185 | 173 | ||
| 186 | void aesni_ecb_encrypt(const unsigned char *in, | 174 | void aesni_ecb_encrypt(const unsigned char *in, unsigned char *out, |
| 187 | unsigned char *out, | 175 | size_t length, const AES_KEY *key, int enc); |
| 188 | size_t length, | 176 | void aesni_cbc_encrypt(const unsigned char *in, unsigned char *out, |
| 189 | const AES_KEY *key, | 177 | size_t length, const AES_KEY *key, unsigned char *ivec, int enc); |
| 190 | int enc); | 178 | |
| 191 | void aesni_cbc_encrypt(const unsigned char *in, | 179 | void aesni_ctr32_encrypt_blocks(const unsigned char *in, unsigned char *out, |
| 192 | unsigned char *out, | 180 | size_t blocks, const void *key, const unsigned char *ivec); |
| 193 | size_t length, | 181 | |
| 194 | const AES_KEY *key, | 182 | void aesni_xts_encrypt(const unsigned char *in, unsigned char *out, |
| 195 | unsigned char *ivec, int enc); | 183 | size_t length, const AES_KEY *key1, const AES_KEY *key2, |
| 196 | 184 | const unsigned char iv[16]); | |
| 197 | void aesni_ctr32_encrypt_blocks(const unsigned char *in, | 185 | |
| 198 | unsigned char *out, | 186 | void aesni_xts_decrypt(const unsigned char *in, unsigned char *out, |
| 199 | size_t blocks, | 187 | size_t length, const AES_KEY *key1, const AES_KEY *key2, |
| 200 | const void *key, | 188 | const unsigned char iv[16]); |
| 201 | const unsigned char *ivec); | 189 | |
| 202 | 190 | void aesni_ccm64_encrypt_blocks (const unsigned char *in, unsigned char *out, | |
| 203 | void aesni_xts_encrypt(const unsigned char *in, | 191 | size_t blocks, const void *key, const unsigned char ivec[16], |
| 204 | unsigned char *out, | 192 | unsigned char cmac[16]); |
| 205 | size_t length, | 193 | |
| 206 | const AES_KEY *key1, const AES_KEY *key2, | 194 | void aesni_ccm64_decrypt_blocks (const unsigned char *in, unsigned char *out, |
| 207 | const unsigned char iv[16]); | 195 | size_t blocks, const void *key, const unsigned char ivec[16], |
| 208 | 196 | unsigned char cmac[16]); | |
| 209 | void aesni_xts_decrypt(const unsigned char *in, | 197 | |
| 210 | unsigned char *out, | 198 | static int |
| 211 | size_t length, | 199 | aesni_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 212 | const AES_KEY *key1, const AES_KEY *key2, | 200 | const unsigned char *iv, int enc) |
| 213 | const unsigned char iv[16]); | 201 | { |
| 214 | |||
| 215 | void aesni_ccm64_encrypt_blocks (const unsigned char *in, | ||
| 216 | unsigned char *out, | ||
| 217 | size_t blocks, | ||
| 218 | const void *key, | ||
| 219 | const unsigned char ivec[16], | ||
| 220 | unsigned char cmac[16]); | ||
| 221 | |||
| 222 | void aesni_ccm64_decrypt_blocks (const unsigned char *in, | ||
| 223 | unsigned char *out, | ||
| 224 | size_t blocks, | ||
| 225 | const void *key, | ||
| 226 | const unsigned char ivec[16], | ||
| 227 | unsigned char cmac[16]); | ||
| 228 | |||
| 229 | static int aesni_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
| 230 | const unsigned char *iv, int enc) | ||
| 231 | { | ||
| 232 | int ret, mode; | 202 | int ret, mode; |
| 233 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | 203 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; |
| 234 | 204 | ||
| 235 | mode = ctx->cipher->flags & EVP_CIPH_MODE; | 205 | mode = ctx->cipher->flags & EVP_CIPH_MODE; |
| 236 | if ((mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE) | 206 | if ((mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE) && |
| 237 | && !enc) | 207 | !enc) { |
| 238 | { | 208 | ret = aesni_set_decrypt_key(key, ctx->key_len * 8, |
| 239 | ret = aesni_set_decrypt_key(key, ctx->key_len*8, ctx->cipher_data); | 209 | ctx->cipher_data); |
| 240 | dat->block = (block128_f)aesni_decrypt; | 210 | dat->block = (block128_f)aesni_decrypt; |
| 241 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | 211 | dat->stream.cbc = mode == EVP_CIPH_CBC_MODE ? |
| 242 | (cbc128_f)aesni_cbc_encrypt : | 212 | (cbc128_f)aesni_cbc_encrypt : NULL; |
| 243 | NULL; | 213 | } else { |
| 244 | } | 214 | ret = aesni_set_encrypt_key(key, ctx->key_len * 8, |
| 245 | else { | 215 | ctx->cipher_data); |
| 246 | ret = aesni_set_encrypt_key(key, ctx->key_len*8, ctx->cipher_data); | 216 | dat->block = (block128_f)aesni_encrypt; |
| 247 | dat->block = (block128_f)aesni_encrypt; | 217 | if (mode == EVP_CIPH_CBC_MODE) |
| 248 | if (mode==EVP_CIPH_CBC_MODE) | 218 | dat->stream.cbc = (cbc128_f)aesni_cbc_encrypt; |
| 249 | dat->stream.cbc = (cbc128_f)aesni_cbc_encrypt; | 219 | else if (mode == EVP_CIPH_CTR_MODE) |
| 250 | else if (mode==EVP_CIPH_CTR_MODE) | ||
| 251 | dat->stream.ctr = (ctr128_f)aesni_ctr32_encrypt_blocks; | 220 | dat->stream.ctr = (ctr128_f)aesni_ctr32_encrypt_blocks; |
| 252 | else | 221 | else |
| 253 | dat->stream.cbc = NULL; | 222 | dat->stream.cbc = NULL; |
| 254 | } | 223 | } |
| 255 | 224 | ||
| 256 | if(ret < 0) | 225 | if (ret < 0) { |
| 257 | { | 226 | EVPerr(EVP_F_AESNI_INIT_KEY, EVP_R_AES_KEY_SETUP_FAILED); |
| 258 | EVPerr(EVP_F_AESNI_INIT_KEY,EVP_R_AES_KEY_SETUP_FAILED); | ||
| 259 | return 0; | 227 | return 0; |
| 260 | } | 228 | } |
| 261 | 229 | ||
| 262 | return 1; | 230 | return 1; |
| 263 | } | 231 | } |
| 264 | 232 | ||
| 265 | static int aesni_cbc_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 233 | static int |
| 266 | const unsigned char *in, size_t len) | 234 | aesni_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 235 | const unsigned char *in, size_t len) | ||
| 267 | { | 236 | { |
| 268 | aesni_cbc_encrypt(in,out,len,ctx->cipher_data,ctx->iv,ctx->encrypt); | 237 | aesni_cbc_encrypt(in, out, len, ctx->cipher_data, ctx->iv, |
| 238 | ctx->encrypt); | ||
| 269 | 239 | ||
| 270 | return 1; | 240 | return 1; |
| 271 | } | 241 | } |
| 272 | 242 | ||
| 273 | static int aesni_ecb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 243 | static int |
| 274 | const unsigned char *in, size_t len) | 244 | aesni_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 245 | const unsigned char *in, size_t len) | ||
| 275 | { | 246 | { |
| 276 | size_t bl = ctx->cipher->block_size; | 247 | size_t bl = ctx->cipher->block_size; |
| 277 | 248 | ||
| 278 | if (len<bl) return 1; | 249 | if (len < bl) |
| 250 | return 1; | ||
| 279 | 251 | ||
| 280 | aesni_ecb_encrypt(in,out,len,ctx->cipher_data,ctx->encrypt); | 252 | aesni_ecb_encrypt(in, out, len, ctx->cipher_data, ctx->encrypt); |
| 281 | 253 | ||
| 282 | return 1; | 254 | return 1; |
| 283 | } | 255 | } |
| 284 | 256 | ||
| 285 | #define aesni_ofb_cipher aes_ofb_cipher | 257 | #define aesni_ofb_cipher aes_ofb_cipher |
| 286 | static int aesni_ofb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 258 | static int aesni_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 287 | const unsigned char *in,size_t len); | 259 | const unsigned char *in, size_t len); |
| 288 | 260 | ||
| 289 | #define aesni_cfb_cipher aes_cfb_cipher | 261 | #define aesni_cfb_cipher aes_cfb_cipher |
| 290 | static int aesni_cfb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 262 | static int aesni_cfb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 291 | const unsigned char *in,size_t len); | 263 | const unsigned char *in, size_t len); |
| 292 | 264 | ||
| 293 | #define aesni_cfb8_cipher aes_cfb8_cipher | 265 | #define aesni_cfb8_cipher aes_cfb8_cipher |
| 294 | static int aesni_cfb8_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 266 | static int aesni_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 295 | const unsigned char *in,size_t len); | 267 | const unsigned char *in, size_t len); |
| 296 | 268 | ||
| 297 | #define aesni_cfb1_cipher aes_cfb1_cipher | 269 | #define aesni_cfb1_cipher aes_cfb1_cipher |
| 298 | static int aesni_cfb1_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 270 | static int aesni_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 299 | const unsigned char *in,size_t len); | 271 | const unsigned char *in, size_t len); |
| 300 | 272 | ||
| 301 | #define aesni_ctr_cipher aes_ctr_cipher | 273 | #define aesni_ctr_cipher aes_ctr_cipher |
| 302 | static int aesni_ctr_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 274 | static int aesni_ctr_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 303 | const unsigned char *in, size_t len); | 275 | const unsigned char *in, size_t len); |
| 304 | 276 | ||
| 305 | static int aesni_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 277 | static int |
| 306 | const unsigned char *iv, int enc) | 278 | aesni_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 307 | { | 279 | const unsigned char *iv, int enc) |
| 280 | { | ||
| 308 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | 281 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; |
| 282 | |||
| 309 | if (!iv && !key) | 283 | if (!iv && !key) |
| 310 | return 1; | 284 | return 1; |
| 311 | if (key) | 285 | if (key) { |
| 312 | { | ||
| 313 | aesni_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks); | 286 | aesni_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks); |
| 314 | CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, | 287 | CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, |
| 315 | (block128_f)aesni_encrypt); | 288 | (block128_f)aesni_encrypt); |
| 316 | gctx->ctr = (ctr128_f)aesni_ctr32_encrypt_blocks; | 289 | gctx->ctr = (ctr128_f)aesni_ctr32_encrypt_blocks; |
| 317 | /* If we have an iv can set it directly, otherwise use | 290 | /* If we have an iv can set it directly, otherwise use |
| 318 | * saved IV. | 291 | * saved IV. |
| 319 | */ | 292 | */ |
| 320 | if (iv == NULL && gctx->iv_set) | 293 | if (iv == NULL && gctx->iv_set) |
| 321 | iv = gctx->iv; | 294 | iv = gctx->iv; |
| 322 | if (iv) | 295 | if (iv) { |
| 323 | { | ||
| 324 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | 296 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); |
| 325 | gctx->iv_set = 1; | 297 | gctx->iv_set = 1; |
| 326 | } | ||
| 327 | gctx->key_set = 1; | ||
| 328 | } | 298 | } |
| 329 | else | 299 | gctx->key_set = 1; |
| 330 | { | 300 | } else { |
| 331 | /* If key set use IV, otherwise copy */ | 301 | /* If key set use IV, otherwise copy */ |
| 332 | if (gctx->key_set) | 302 | if (gctx->key_set) |
| 333 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | 303 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); |
| @@ -335,83 +305,82 @@ static int aesni_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | |||
| 335 | memcpy(gctx->iv, iv, gctx->ivlen); | 305 | memcpy(gctx->iv, iv, gctx->ivlen); |
| 336 | gctx->iv_set = 1; | 306 | gctx->iv_set = 1; |
| 337 | gctx->iv_gen = 0; | 307 | gctx->iv_gen = 0; |
| 338 | } | ||
| 339 | return 1; | ||
| 340 | } | 308 | } |
| 309 | return 1; | ||
| 310 | } | ||
| 341 | 311 | ||
| 342 | #define aesni_gcm_cipher aes_gcm_cipher | 312 | #define aesni_gcm_cipher aes_gcm_cipher |
| 343 | static int aesni_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 313 | static int aesni_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 344 | const unsigned char *in, size_t len); | 314 | const unsigned char *in, size_t len); |
| 345 | 315 | ||
| 346 | static int aesni_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 316 | static int |
| 347 | const unsigned char *iv, int enc) | 317 | aesni_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 348 | { | 318 | const unsigned char *iv, int enc) |
| 319 | { | ||
| 349 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; | 320 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; |
| 321 | |||
| 350 | if (!iv && !key) | 322 | if (!iv && !key) |
| 351 | return 1; | 323 | return 1; |
| 352 | 324 | ||
| 353 | if (key) | 325 | if (key) { |
| 354 | { | ||
| 355 | /* key_len is two AES keys */ | 326 | /* key_len is two AES keys */ |
| 356 | if (enc) | 327 | if (enc) { |
| 357 | { | 328 | aesni_set_encrypt_key(key, ctx->key_len * 4, |
| 358 | aesni_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1); | 329 | &xctx->ks1); |
| 359 | xctx->xts.block1 = (block128_f)aesni_encrypt; | 330 | xctx->xts.block1 = (block128_f)aesni_encrypt; |
| 360 | xctx->stream = aesni_xts_encrypt; | 331 | xctx->stream = aesni_xts_encrypt; |
| 361 | } | 332 | } else { |
| 362 | else | 333 | aesni_set_decrypt_key(key, ctx->key_len * 4, |
| 363 | { | 334 | &xctx->ks1); |
| 364 | aesni_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
| 365 | xctx->xts.block1 = (block128_f)aesni_decrypt; | 335 | xctx->xts.block1 = (block128_f)aesni_decrypt; |
| 366 | xctx->stream = aesni_xts_decrypt; | 336 | xctx->stream = aesni_xts_decrypt; |
| 367 | } | 337 | } |
| 368 | 338 | ||
| 369 | aesni_set_encrypt_key(key + ctx->key_len/2, | 339 | aesni_set_encrypt_key(key + ctx->key_len / 2, |
| 370 | ctx->key_len * 4, &xctx->ks2); | 340 | ctx->key_len * 4, &xctx->ks2); |
| 371 | xctx->xts.block2 = (block128_f)aesni_encrypt; | 341 | xctx->xts.block2 = (block128_f)aesni_encrypt; |
| 372 | 342 | ||
| 373 | xctx->xts.key1 = &xctx->ks1; | 343 | xctx->xts.key1 = &xctx->ks1; |
| 374 | } | 344 | } |
| 375 | 345 | ||
| 376 | if (iv) | 346 | if (iv) { |
| 377 | { | ||
| 378 | xctx->xts.key2 = &xctx->ks2; | 347 | xctx->xts.key2 = &xctx->ks2; |
| 379 | memcpy(ctx->iv, iv, 16); | 348 | memcpy(ctx->iv, iv, 16); |
| 380 | } | 349 | } |
| 381 | 350 | ||
| 382 | return 1; | 351 | return 1; |
| 383 | } | 352 | } |
| 384 | 353 | ||
| 385 | #define aesni_xts_cipher aes_xts_cipher | 354 | #define aesni_xts_cipher aes_xts_cipher |
| 386 | static int aesni_xts_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 355 | static int aesni_xts_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 387 | const unsigned char *in, size_t len); | 356 | const unsigned char *in, size_t len); |
| 388 | 357 | ||
| 389 | static int aesni_ccm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 358 | static int |
| 390 | const unsigned char *iv, int enc) | 359 | aesni_ccm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 391 | { | 360 | const unsigned char *iv, int enc) |
| 361 | { | ||
| 392 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; | 362 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; |
| 363 | |||
| 393 | if (!iv && !key) | 364 | if (!iv && !key) |
| 394 | return 1; | 365 | return 1; |
| 395 | if (key) | 366 | if (key) { |
| 396 | { | ||
| 397 | aesni_set_encrypt_key(key, ctx->key_len * 8, &cctx->ks); | 367 | aesni_set_encrypt_key(key, ctx->key_len * 8, &cctx->ks); |
| 398 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, | 368 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, |
| 399 | &cctx->ks, (block128_f)aesni_encrypt); | 369 | &cctx->ks, (block128_f)aesni_encrypt); |
| 400 | cctx->str = enc?(ccm128_f)aesni_ccm64_encrypt_blocks : | 370 | cctx->str = enc ? (ccm128_f)aesni_ccm64_encrypt_blocks : |
| 401 | (ccm128_f)aesni_ccm64_decrypt_blocks; | 371 | (ccm128_f)aesni_ccm64_decrypt_blocks; |
| 402 | cctx->key_set = 1; | 372 | cctx->key_set = 1; |
| 403 | } | 373 | } |
| 404 | if (iv) | 374 | if (iv) { |
| 405 | { | ||
| 406 | memcpy(ctx->iv, iv, 15 - cctx->L); | 375 | memcpy(ctx->iv, iv, 15 - cctx->L); |
| 407 | cctx->iv_set = 1; | 376 | cctx->iv_set = 1; |
| 408 | } | ||
| 409 | return 1; | ||
| 410 | } | 377 | } |
| 378 | return 1; | ||
| 379 | } | ||
| 411 | 380 | ||
| 412 | #define aesni_ccm_cipher aes_ccm_cipher | 381 | #define aesni_ccm_cipher aes_ccm_cipher |
| 413 | static int aesni_ccm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 382 | static int aesni_ccm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 414 | const unsigned char *in, size_t len); | 383 | const unsigned char *in, size_t len); |
| 415 | 384 | ||
| 416 | #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ | 385 | #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ |
| 417 | static const EVP_CIPHER aesni_##keylen##_##mode = { \ | 386 | static const EVP_CIPHER aesni_##keylen##_##mode = { \ |
| @@ -493,199 +462,205 @@ const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \ | |||
| 493 | BLOCK_CIPHER_generic(nid,keylen,1,16,cfb8,cfb8,CFB,flags) \ | 462 | BLOCK_CIPHER_generic(nid,keylen,1,16,cfb8,cfb8,CFB,flags) \ |
| 494 | BLOCK_CIPHER_generic(nid,keylen,1,16,ctr,ctr,CTR,flags) | 463 | BLOCK_CIPHER_generic(nid,keylen,1,16,ctr,ctr,CTR,flags) |
| 495 | 464 | ||
| 496 | static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 465 | static int |
| 497 | const unsigned char *iv, int enc) | 466 | aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 498 | { | 467 | const unsigned char *iv, int enc) |
| 468 | { | ||
| 499 | int ret, mode; | 469 | int ret, mode; |
| 500 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | 470 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; |
| 501 | 471 | ||
| 502 | mode = ctx->cipher->flags & EVP_CIPH_MODE; | 472 | mode = ctx->cipher->flags & EVP_CIPH_MODE; |
| 503 | if ((mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE) | 473 | if ((mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE) && |
| 504 | && !enc) | 474 | !enc) |
| 505 | #ifdef BSAES_CAPABLE | 475 | #ifdef BSAES_CAPABLE |
| 506 | if (BSAES_CAPABLE && mode==EVP_CIPH_CBC_MODE) | 476 | if (BSAES_CAPABLE && mode == EVP_CIPH_CBC_MODE) { |
| 507 | { | 477 | ret = AES_set_decrypt_key(key, ctx->key_len * 8, |
| 508 | ret = AES_set_decrypt_key(key,ctx->key_len*8,&dat->ks); | 478 | &dat->ks); |
| 509 | dat->block = (block128_f)AES_decrypt; | 479 | dat->block = (block128_f)AES_decrypt; |
| 510 | dat->stream.cbc = (cbc128_f)bsaes_cbc_encrypt; | 480 | dat->stream.cbc = (cbc128_f)bsaes_cbc_encrypt; |
| 511 | } | 481 | } else |
| 512 | else | ||
| 513 | #endif | 482 | #endif |
| 514 | #ifdef VPAES_CAPABLE | 483 | #ifdef VPAES_CAPABLE |
| 515 | if (VPAES_CAPABLE) | 484 | if (VPAES_CAPABLE) { |
| 516 | { | 485 | ret = vpaes_set_decrypt_key(key, ctx->key_len * 8, |
| 517 | ret = vpaes_set_decrypt_key(key,ctx->key_len*8,&dat->ks); | 486 | &dat->ks); |
| 518 | dat->block = (block128_f)vpaes_decrypt; | 487 | dat->block = (block128_f)vpaes_decrypt; |
| 519 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | 488 | dat->stream.cbc = mode == EVP_CIPH_CBC_MODE ? |
| 520 | (cbc128_f)vpaes_cbc_encrypt : | 489 | (cbc128_f)vpaes_cbc_encrypt : NULL; |
| 521 | NULL; | 490 | } else |
| 522 | } | ||
| 523 | else | ||
| 524 | #endif | 491 | #endif |
| 525 | { | 492 | { |
| 526 | ret = AES_set_decrypt_key(key,ctx->key_len*8,&dat->ks); | 493 | ret = AES_set_decrypt_key(key, ctx->key_len * 8, |
| 527 | dat->block = (block128_f)AES_decrypt; | 494 | &dat->ks); |
| 528 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | 495 | dat->block = (block128_f)AES_decrypt; |
| 529 | (cbc128_f)AES_cbc_encrypt : | 496 | dat->stream.cbc = mode == EVP_CIPH_CBC_MODE ? |
| 530 | NULL; | 497 | (cbc128_f)AES_cbc_encrypt : NULL; |
| 531 | } | 498 | } else |
| 532 | else | ||
| 533 | #ifdef BSAES_CAPABLE | 499 | #ifdef BSAES_CAPABLE |
| 534 | if (BSAES_CAPABLE && mode==EVP_CIPH_CTR_MODE) | 500 | if (BSAES_CAPABLE && mode == EVP_CIPH_CTR_MODE) { |
| 535 | { | 501 | ret = AES_set_encrypt_key(key, ctx->key_len * 8, |
| 536 | ret = AES_set_encrypt_key(key,ctx->key_len*8,&dat->ks); | 502 | &dat->ks); |
| 537 | dat->block = (block128_f)AES_encrypt; | 503 | dat->block = (block128_f)AES_encrypt; |
| 538 | dat->stream.ctr = (ctr128_f)bsaes_ctr32_encrypt_blocks; | 504 | dat->stream.ctr = (ctr128_f)bsaes_ctr32_encrypt_blocks; |
| 539 | } | 505 | } else |
| 540 | else | ||
| 541 | #endif | 506 | #endif |
| 542 | #ifdef VPAES_CAPABLE | 507 | #ifdef VPAES_CAPABLE |
| 543 | if (VPAES_CAPABLE) | 508 | if (VPAES_CAPABLE) { |
| 544 | { | 509 | ret = vpaes_set_encrypt_key(key, ctx->key_len * 8, |
| 545 | ret = vpaes_set_encrypt_key(key,ctx->key_len*8,&dat->ks); | 510 | &dat->ks); |
| 546 | dat->block = (block128_f)vpaes_encrypt; | 511 | dat->block = (block128_f)vpaes_encrypt; |
| 547 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | 512 | dat->stream.cbc = mode == EVP_CIPH_CBC_MODE ? |
| 548 | (cbc128_f)vpaes_cbc_encrypt : | 513 | (cbc128_f)vpaes_cbc_encrypt : NULL; |
| 549 | NULL; | 514 | } else |
| 550 | } | ||
| 551 | else | ||
| 552 | #endif | 515 | #endif |
| 553 | { | 516 | { |
| 554 | ret = AES_set_encrypt_key(key,ctx->key_len*8,&dat->ks); | 517 | ret = AES_set_encrypt_key(key, ctx->key_len * 8, |
| 555 | dat->block = (block128_f)AES_encrypt; | 518 | &dat->ks); |
| 556 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | 519 | dat->block = (block128_f)AES_encrypt; |
| 557 | (cbc128_f)AES_cbc_encrypt : | 520 | dat->stream.cbc = mode == EVP_CIPH_CBC_MODE ? |
| 558 | NULL; | 521 | (cbc128_f)AES_cbc_encrypt : NULL; |
| 559 | #ifdef AES_CTR_ASM | 522 | #ifdef AES_CTR_ASM |
| 560 | if (mode==EVP_CIPH_CTR_MODE) | 523 | if (mode == EVP_CIPH_CTR_MODE) |
| 561 | dat->stream.ctr = (ctr128_f)AES_ctr32_encrypt; | 524 | dat->stream.ctr = (ctr128_f)AES_ctr32_encrypt; |
| 562 | #endif | 525 | #endif |
| 563 | } | 526 | } |
| 564 | 527 | ||
| 565 | if(ret < 0) | 528 | if (ret < 0) { |
| 566 | { | 529 | EVPerr(EVP_F_AES_INIT_KEY, EVP_R_AES_KEY_SETUP_FAILED); |
| 567 | EVPerr(EVP_F_AES_INIT_KEY,EVP_R_AES_KEY_SETUP_FAILED); | ||
| 568 | return 0; | 530 | return 0; |
| 569 | } | 531 | } |
| 570 | 532 | ||
| 571 | return 1; | 533 | return 1; |
| 572 | } | 534 | } |
| 573 | 535 | ||
| 574 | static int aes_cbc_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 536 | static int |
| 575 | const unsigned char *in, size_t len) | 537 | aes_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 538 | const unsigned char *in, size_t len) | ||
| 576 | { | 539 | { |
| 577 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | 540 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; |
| 578 | 541 | ||
| 579 | if (dat->stream.cbc) | 542 | if (dat->stream.cbc) |
| 580 | (*dat->stream.cbc)(in,out,len,&dat->ks,ctx->iv,ctx->encrypt); | 543 | (*dat->stream.cbc)(in, out, len, &dat->ks, ctx->iv, |
| 544 | ctx->encrypt); | ||
| 581 | else if (ctx->encrypt) | 545 | else if (ctx->encrypt) |
| 582 | CRYPTO_cbc128_encrypt(in,out,len,&dat->ks,ctx->iv,dat->block); | 546 | CRYPTO_cbc128_encrypt(in, out, len, &dat->ks, ctx->iv, |
| 547 | dat->block); | ||
| 583 | else | 548 | else |
| 584 | CRYPTO_cbc128_decrypt(in,out,len,&dat->ks,ctx->iv,dat->block); | 549 | CRYPTO_cbc128_decrypt(in, out, len, &dat->ks, ctx->iv, |
| 550 | dat->block); | ||
| 585 | 551 | ||
| 586 | return 1; | 552 | return 1; |
| 587 | } | 553 | } |
| 588 | 554 | ||
| 589 | static int aes_ecb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 555 | static int |
| 590 | const unsigned char *in, size_t len) | 556 | aes_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 557 | const unsigned char *in, size_t len) | ||
| 591 | { | 558 | { |
| 592 | size_t bl = ctx->cipher->block_size; | 559 | size_t bl = ctx->cipher->block_size; |
| 593 | size_t i; | 560 | size_t i; |
| 594 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | 561 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; |
| 595 | 562 | ||
| 596 | if (len<bl) return 1; | 563 | if (len < bl) |
| 564 | return 1; | ||
| 597 | 565 | ||
| 598 | for (i=0,len-=bl;i<=len;i+=bl) | 566 | for (i = 0, len -= bl; i <= len; i += bl) |
| 599 | (*dat->block)(in+i,out+i,&dat->ks); | 567 | (*dat->block)(in + i, out + i, &dat->ks); |
| 600 | 568 | ||
| 601 | return 1; | 569 | return 1; |
| 602 | } | 570 | } |
| 603 | 571 | ||
| 604 | static int aes_ofb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 572 | static int |
| 605 | const unsigned char *in,size_t len) | 573 | aes_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 574 | const unsigned char *in, size_t len) | ||
| 606 | { | 575 | { |
| 607 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | 576 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; |
| 608 | 577 | ||
| 609 | CRYPTO_ofb128_encrypt(in,out,len,&dat->ks, | 578 | CRYPTO_ofb128_encrypt(in, out, len, &dat->ks, ctx->iv, &ctx->num, |
| 610 | ctx->iv,&ctx->num,dat->block); | 579 | dat->block); |
| 611 | return 1; | 580 | return 1; |
| 612 | } | 581 | } |
| 613 | 582 | ||
| 614 | static int aes_cfb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 583 | static int |
| 615 | const unsigned char *in,size_t len) | 584 | aes_cfb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 585 | const unsigned char *in, size_t len) | ||
| 616 | { | 586 | { |
| 617 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | 587 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; |
| 618 | 588 | ||
| 619 | CRYPTO_cfb128_encrypt(in,out,len,&dat->ks, | 589 | CRYPTO_cfb128_encrypt(in, out, len, &dat->ks, ctx->iv, &ctx->num, |
| 620 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | 590 | ctx->encrypt, dat->block); |
| 621 | return 1; | 591 | return 1; |
| 622 | } | 592 | } |
| 623 | 593 | ||
| 624 | static int aes_cfb8_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 594 | static int |
| 625 | const unsigned char *in,size_t len) | 595 | aes_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 596 | const unsigned char *in, size_t len) | ||
| 626 | { | 597 | { |
| 627 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | 598 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; |
| 628 | 599 | ||
| 629 | CRYPTO_cfb128_8_encrypt(in,out,len,&dat->ks, | 600 | CRYPTO_cfb128_8_encrypt(in, out, len, &dat->ks, ctx->iv, &ctx->num, |
| 630 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | 601 | ctx->encrypt, dat->block); |
| 631 | return 1; | 602 | return 1; |
| 632 | } | 603 | } |
| 633 | 604 | ||
| 634 | static int aes_cfb1_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 605 | static int |
| 635 | const unsigned char *in,size_t len) | 606 | aes_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 607 | const unsigned char *in, size_t len) | ||
| 636 | { | 608 | { |
| 637 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | 609 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; |
| 638 | 610 | ||
| 639 | if (ctx->flags&EVP_CIPH_FLAG_LENGTH_BITS) { | 611 | if (ctx->flags&EVP_CIPH_FLAG_LENGTH_BITS) { |
| 640 | CRYPTO_cfb128_1_encrypt(in,out,len,&dat->ks, | 612 | CRYPTO_cfb128_1_encrypt(in, out, len, &dat->ks, ctx->iv, |
| 641 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | 613 | &ctx->num, ctx->encrypt, dat->block); |
| 642 | return 1; | 614 | return 1; |
| 643 | } | 615 | } |
| 644 | 616 | ||
| 645 | while (len>=MAXBITCHUNK) { | 617 | while (len >= MAXBITCHUNK) { |
| 646 | CRYPTO_cfb128_1_encrypt(in,out,MAXBITCHUNK*8,&dat->ks, | 618 | CRYPTO_cfb128_1_encrypt(in, out, MAXBITCHUNK*8, &dat->ks, |
| 647 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | 619 | ctx->iv, &ctx->num, ctx->encrypt, dat->block); |
| 648 | len-=MAXBITCHUNK; | 620 | len -= MAXBITCHUNK; |
| 649 | } | 621 | } |
| 650 | if (len) | 622 | if (len) |
| 651 | CRYPTO_cfb128_1_encrypt(in,out,len*8,&dat->ks, | 623 | CRYPTO_cfb128_1_encrypt(in, out, len*8, &dat->ks, |
| 652 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | 624 | ctx->iv, &ctx->num, ctx->encrypt, dat->block); |
| 653 | 625 | ||
| 654 | return 1; | 626 | return 1; |
| 655 | } | 627 | } |
| 656 | 628 | ||
| 657 | static int aes_ctr_cipher (EVP_CIPHER_CTX *ctx, unsigned char *out, | 629 | static int aes_ctr_cipher (EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 658 | const unsigned char *in, size_t len) | 630 | const unsigned char *in, size_t len) |
| 659 | { | 631 | { |
| 660 | unsigned int num = ctx->num; | 632 | unsigned int num = ctx->num; |
| 661 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | 633 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; |
| 662 | 634 | ||
| 663 | if (dat->stream.ctr) | 635 | if (dat->stream.ctr) |
| 664 | CRYPTO_ctr128_encrypt_ctr32(in,out,len,&dat->ks, | 636 | CRYPTO_ctr128_encrypt_ctr32(in, out, len, &dat->ks, |
| 665 | ctx->iv,ctx->buf,&num,dat->stream.ctr); | 637 | ctx->iv, ctx->buf, &num, dat->stream.ctr); |
| 666 | else | 638 | else |
| 667 | CRYPTO_ctr128_encrypt(in,out,len,&dat->ks, | 639 | CRYPTO_ctr128_encrypt(in, out, len, &dat->ks, |
| 668 | ctx->iv,ctx->buf,&num,dat->block); | 640 | ctx->iv, ctx->buf, &num, dat->block); |
| 669 | ctx->num = (size_t)num; | 641 | ctx->num = (size_t)num; |
| 670 | return 1; | 642 | return 1; |
| 671 | } | 643 | } |
| 672 | 644 | ||
| 673 | BLOCK_CIPHER_generic_pack(NID_aes,128,EVP_CIPH_FLAG_FIPS) | 645 | BLOCK_CIPHER_generic_pack(NID_aes, 128, EVP_CIPH_FLAG_FIPS) |
| 674 | BLOCK_CIPHER_generic_pack(NID_aes,192,EVP_CIPH_FLAG_FIPS) | 646 | BLOCK_CIPHER_generic_pack(NID_aes, 192, EVP_CIPH_FLAG_FIPS) |
| 675 | BLOCK_CIPHER_generic_pack(NID_aes,256,EVP_CIPH_FLAG_FIPS) | 647 | BLOCK_CIPHER_generic_pack(NID_aes, 256, EVP_CIPH_FLAG_FIPS) |
| 676 | 648 | ||
| 677 | static int aes_gcm_cleanup(EVP_CIPHER_CTX *c) | 649 | static int |
| 678 | { | 650 | aes_gcm_cleanup(EVP_CIPHER_CTX *c) |
| 651 | { | ||
| 679 | EVP_AES_GCM_CTX *gctx = c->cipher_data; | 652 | EVP_AES_GCM_CTX *gctx = c->cipher_data; |
| 653 | |||
| 680 | OPENSSL_cleanse(&gctx->gcm, sizeof(gctx->gcm)); | 654 | OPENSSL_cleanse(&gctx->gcm, sizeof(gctx->gcm)); |
| 681 | if (gctx->iv != c->iv) | 655 | if (gctx->iv != c->iv) |
| 682 | free(gctx->iv); | 656 | free(gctx->iv); |
| 683 | return 1; | 657 | return 1; |
| 684 | } | 658 | } |
| 685 | 659 | ||
| 686 | /* increment counter (64-bit int) by 1 */ | 660 | /* increment counter (64-bit int) by 1 */ |
| 687 | static void ctr64_inc(unsigned char *counter) { | 661 | static void |
| 688 | int n=8; | 662 | ctr64_inc(unsigned char *counter) { |
| 663 | int n = 8; | ||
| 689 | unsigned char c; | 664 | unsigned char c; |
| 690 | 665 | ||
| 691 | do { | 666 | do { |
| @@ -693,15 +668,17 @@ static void ctr64_inc(unsigned char *counter) { | |||
| 693 | c = counter[n]; | 668 | c = counter[n]; |
| 694 | ++c; | 669 | ++c; |
| 695 | counter[n] = c; | 670 | counter[n] = c; |
| 696 | if (c) return; | 671 | if (c) |
| 672 | return; | ||
| 697 | } while (n); | 673 | } while (n); |
| 698 | } | 674 | } |
| 699 | 675 | ||
| 700 | static int aes_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | 676 | static int |
| 701 | { | 677 | aes_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) |
| 678 | { | ||
| 702 | EVP_AES_GCM_CTX *gctx = c->cipher_data; | 679 | EVP_AES_GCM_CTX *gctx = c->cipher_data; |
| 703 | switch (type) | 680 | |
| 704 | { | 681 | switch (type) { |
| 705 | case EVP_CTRL_INIT: | 682 | case EVP_CTRL_INIT: |
| 706 | gctx->key_set = 0; | 683 | gctx->key_set = 0; |
| 707 | gctx->iv_set = 0; | 684 | gctx->iv_set = 0; |
| @@ -716,19 +693,18 @@ static int aes_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 716 | if (arg <= 0) | 693 | if (arg <= 0) |
| 717 | return 0; | 694 | return 0; |
| 718 | #ifdef OPENSSL_FIPS | 695 | #ifdef OPENSSL_FIPS |
| 719 | if (FIPS_module_mode() && !(c->flags & EVP_CIPH_FLAG_NON_FIPS_ALLOW) | 696 | if (FIPS_module_mode() && |
| 720 | && arg < 12) | 697 | !(c->flags & EVP_CIPH_FLAG_NON_FIPS_ALLOW) && arg < 12) |
| 721 | return 0; | 698 | return 0; |
| 722 | #endif | 699 | #endif |
| 723 | /* Allocate memory for IV if needed */ | 700 | /* Allocate memory for IV if needed */ |
| 724 | if ((arg > EVP_MAX_IV_LENGTH) && (arg > gctx->ivlen)) | 701 | if ((arg > EVP_MAX_IV_LENGTH) && (arg > gctx->ivlen)) { |
| 725 | { | ||
| 726 | if (gctx->iv != c->iv) | 702 | if (gctx->iv != c->iv) |
| 727 | free(gctx->iv); | 703 | free(gctx->iv); |
| 728 | gctx->iv = malloc(arg); | 704 | gctx->iv = malloc(arg); |
| 729 | if (!gctx->iv) | 705 | if (!gctx->iv) |
| 730 | return 0; | 706 | return 0; |
| 731 | } | 707 | } |
| 732 | gctx->ivlen = arg; | 708 | gctx->ivlen = arg; |
| 733 | return 1; | 709 | return 1; |
| 734 | 710 | ||
| @@ -747,12 +723,11 @@ static int aes_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 747 | 723 | ||
| 748 | case EVP_CTRL_GCM_SET_IV_FIXED: | 724 | case EVP_CTRL_GCM_SET_IV_FIXED: |
| 749 | /* Special case: -1 length restores whole IV */ | 725 | /* Special case: -1 length restores whole IV */ |
| 750 | if (arg == -1) | 726 | if (arg == -1) { |
| 751 | { | ||
| 752 | memcpy(gctx->iv, ptr, gctx->ivlen); | 727 | memcpy(gctx->iv, ptr, gctx->ivlen); |
| 753 | gctx->iv_gen = 1; | 728 | gctx->iv_gen = 1; |
| 754 | return 1; | 729 | return 1; |
| 755 | } | 730 | } |
| 756 | /* Fixed field must be at least 4 bytes and invocation field | 731 | /* Fixed field must be at least 4 bytes and invocation field |
| 757 | * at least 8. | 732 | * at least 8. |
| 758 | */ | 733 | */ |
| @@ -761,7 +736,7 @@ static int aes_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 761 | if (arg) | 736 | if (arg) |
| 762 | memcpy(gctx->iv, ptr, arg); | 737 | memcpy(gctx->iv, ptr, arg); |
| 763 | if (c->encrypt && | 738 | if (c->encrypt && |
| 764 | RAND_bytes(gctx->iv + arg, gctx->ivlen - arg) <= 0) | 739 | RAND_bytes(gctx->iv + arg, gctx->ivlen - arg) <= 0) |
| 765 | return 0; | 740 | return 0; |
| 766 | gctx->iv_gen = 1; | 741 | gctx->iv_gen = 1; |
| 767 | return 1; | 742 | return 1; |
| @@ -795,63 +770,68 @@ static int aes_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 795 | return 0; | 770 | return 0; |
| 796 | memcpy(c->buf, ptr, arg); | 771 | memcpy(c->buf, ptr, arg); |
| 797 | gctx->tls_aad_len = arg; | 772 | gctx->tls_aad_len = arg; |
| 798 | { | 773 | { |
| 799 | unsigned int len=c->buf[arg-2]<<8|c->buf[arg-1]; | 774 | unsigned int len = c->buf[arg - 2] << 8 | |
| 775 | c->buf[arg - 1]; | ||
| 776 | |||
| 800 | /* Correct length for explicit IV */ | 777 | /* Correct length for explicit IV */ |
| 801 | len -= EVP_GCM_TLS_EXPLICIT_IV_LEN; | 778 | len -= EVP_GCM_TLS_EXPLICIT_IV_LEN; |
| 779 | |||
| 802 | /* If decrypting correct for tag too */ | 780 | /* If decrypting correct for tag too */ |
| 803 | if (!c->encrypt) | 781 | if (!c->encrypt) |
| 804 | len -= EVP_GCM_TLS_TAG_LEN; | 782 | len -= EVP_GCM_TLS_TAG_LEN; |
| 805 | c->buf[arg-2] = len>>8; | 783 | c->buf[arg - 2] = len >> 8; |
| 806 | c->buf[arg-1] = len & 0xff; | 784 | c->buf[arg - 1] = len & 0xff; |
| 807 | } | 785 | } |
| 808 | /* Extra padding: tag appended to record */ | 786 | /* Extra padding: tag appended to record */ |
| 809 | return EVP_GCM_TLS_TAG_LEN; | 787 | return EVP_GCM_TLS_TAG_LEN; |
| 810 | 788 | ||
| 811 | default: | 789 | default: |
| 812 | return -1; | 790 | return -1; |
| 813 | 791 | ||
| 814 | } | ||
| 815 | } | 792 | } |
| 793 | } | ||
| 816 | 794 | ||
| 817 | static int aes_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 795 | static int |
| 818 | const unsigned char *iv, int enc) | 796 | aes_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 819 | { | 797 | const unsigned char *iv, int enc) |
| 798 | { | ||
| 820 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | 799 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; |
| 800 | |||
| 821 | if (!iv && !key) | 801 | if (!iv && !key) |
| 822 | return 1; | 802 | return 1; |
| 823 | if (key) | 803 | if (key) { |
| 824 | { do { | 804 | do { |
| 825 | #ifdef BSAES_CAPABLE | 805 | #ifdef BSAES_CAPABLE |
| 826 | if (BSAES_CAPABLE) | 806 | if (BSAES_CAPABLE) { |
| 827 | { | 807 | AES_set_encrypt_key(key, ctx->key_len * 8, |
| 828 | AES_set_encrypt_key(key,ctx->key_len*8,&gctx->ks); | 808 | &gctx->ks); |
| 829 | CRYPTO_gcm128_init(&gctx->gcm,&gctx->ks, | 809 | CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, |
| 830 | (block128_f)AES_encrypt); | 810 | (block128_f)AES_encrypt); |
| 831 | gctx->ctr = (ctr128_f)bsaes_ctr32_encrypt_blocks; | 811 | gctx->ctr = |
| 832 | break; | 812 | (ctr128_f)bsaes_ctr32_encrypt_blocks; |
| 833 | } | 813 | break; |
| 834 | else | 814 | } else |
| 835 | #endif | 815 | #endif |
| 836 | #ifdef VPAES_CAPABLE | 816 | #ifdef VPAES_CAPABLE |
| 837 | if (VPAES_CAPABLE) | 817 | if (VPAES_CAPABLE) { |
| 838 | { | 818 | vpaes_set_encrypt_key(key, ctx->key_len * 8, |
| 839 | vpaes_set_encrypt_key(key,ctx->key_len*8,&gctx->ks); | 819 | &gctx->ks); |
| 840 | CRYPTO_gcm128_init(&gctx->gcm,&gctx->ks, | 820 | CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, |
| 841 | (block128_f)vpaes_encrypt); | 821 | (block128_f)vpaes_encrypt); |
| 842 | gctx->ctr = NULL; | 822 | gctx->ctr = NULL; |
| 843 | break; | 823 | break; |
| 844 | } | 824 | } else |
| 845 | else | ||
| 846 | #endif | 825 | #endif |
| 847 | (void)0; /* terminate potentially open 'else' */ | 826 | (void)0; /* terminate potentially open 'else' */ |
| 848 | 827 | ||
| 849 | AES_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks); | 828 | AES_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks); |
| 850 | CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, (block128_f)AES_encrypt); | 829 | CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, |
| 830 | (block128_f)AES_encrypt); | ||
| 851 | #ifdef AES_CTR_ASM | 831 | #ifdef AES_CTR_ASM |
| 852 | gctx->ctr = (ctr128_f)AES_ctr32_encrypt; | 832 | gctx->ctr = (ctr128_f)AES_ctr32_encrypt; |
| 853 | #else | 833 | #else |
| 854 | gctx->ctr = NULL; | 834 | gctx->ctr = NULL; |
| 855 | #endif | 835 | #endif |
| 856 | } while (0); | 836 | } while (0); |
| 857 | 837 | ||
| @@ -860,15 +840,12 @@ static int aes_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | |||
| 860 | */ | 840 | */ |
| 861 | if (iv == NULL && gctx->iv_set) | 841 | if (iv == NULL && gctx->iv_set) |
| 862 | iv = gctx->iv; | 842 | iv = gctx->iv; |
| 863 | if (iv) | 843 | if (iv) { |
| 864 | { | ||
| 865 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | 844 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); |
| 866 | gctx->iv_set = 1; | 845 | gctx->iv_set = 1; |
| 867 | } | ||
| 868 | gctx->key_set = 1; | ||
| 869 | } | 846 | } |
| 870 | else | 847 | gctx->key_set = 1; |
| 871 | { | 848 | } else { |
| 872 | /* If key set use IV, otherwise copy */ | 849 | /* If key set use IV, otherwise copy */ |
| 873 | if (gctx->key_set) | 850 | if (gctx->key_set) |
| 874 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | 851 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); |
| @@ -876,9 +853,9 @@ static int aes_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | |||
| 876 | memcpy(gctx->iv, iv, gctx->ivlen); | 853 | memcpy(gctx->iv, iv, gctx->ivlen); |
| 877 | gctx->iv_set = 1; | 854 | gctx->iv_set = 1; |
| 878 | gctx->iv_gen = 0; | 855 | gctx->iv_gen = 0; |
| 879 | } | ||
| 880 | return 1; | ||
| 881 | } | 856 | } |
| 857 | return 1; | ||
| 858 | } | ||
| 882 | 859 | ||
| 883 | /* Handle TLS GCM packet format. This consists of the last portion of the IV | 860 | /* Handle TLS GCM packet format. This consists of the last portion of the IV |
| 884 | * followed by the payload and finally the tag. On encrypt generate IV, | 861 | * followed by the payload and finally the tag. On encrypt generate IV, |
| @@ -886,83 +863,82 @@ static int aes_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | |||
| 886 | * and verify tag. | 863 | * and verify tag. |
| 887 | */ | 864 | */ |
| 888 | 865 | ||
| 889 | static int aes_gcm_tls_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 866 | static int |
| 890 | const unsigned char *in, size_t len) | 867 | aes_gcm_tls_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 891 | { | 868 | const unsigned char *in, size_t len) |
| 869 | { | ||
| 892 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | 870 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; |
| 893 | int rv = -1; | 871 | int rv = -1; |
| 872 | |||
| 894 | /* Encrypt/decrypt must be performed in place */ | 873 | /* Encrypt/decrypt must be performed in place */ |
| 895 | if (out != in || len < (EVP_GCM_TLS_EXPLICIT_IV_LEN+EVP_GCM_TLS_TAG_LEN)) | 874 | if (out != in || |
| 875 | len < (EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN)) | ||
| 896 | return -1; | 876 | return -1; |
| 877 | |||
| 897 | /* Set IV from start of buffer or generate IV and write to start | 878 | /* Set IV from start of buffer or generate IV and write to start |
| 898 | * of buffer. | 879 | * of buffer. |
| 899 | */ | 880 | */ |
| 900 | if (EVP_CIPHER_CTX_ctrl(ctx, ctx->encrypt ? | 881 | if (EVP_CIPHER_CTX_ctrl(ctx, ctx->encrypt ? |
| 901 | EVP_CTRL_GCM_IV_GEN : EVP_CTRL_GCM_SET_IV_INV, | 882 | EVP_CTRL_GCM_IV_GEN : EVP_CTRL_GCM_SET_IV_INV, |
| 902 | EVP_GCM_TLS_EXPLICIT_IV_LEN, out) <= 0) | 883 | EVP_GCM_TLS_EXPLICIT_IV_LEN, out) <= 0) |
| 903 | goto err; | 884 | goto err; |
| 885 | |||
| 904 | /* Use saved AAD */ | 886 | /* Use saved AAD */ |
| 905 | if (CRYPTO_gcm128_aad(&gctx->gcm, ctx->buf, gctx->tls_aad_len)) | 887 | if (CRYPTO_gcm128_aad(&gctx->gcm, ctx->buf, gctx->tls_aad_len)) |
| 906 | goto err; | 888 | goto err; |
| 889 | |||
| 907 | /* Fix buffer and length to point to payload */ | 890 | /* Fix buffer and length to point to payload */ |
| 908 | in += EVP_GCM_TLS_EXPLICIT_IV_LEN; | 891 | in += EVP_GCM_TLS_EXPLICIT_IV_LEN; |
| 909 | out += EVP_GCM_TLS_EXPLICIT_IV_LEN; | 892 | out += EVP_GCM_TLS_EXPLICIT_IV_LEN; |
| 910 | len -= EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN; | 893 | len -= EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN; |
| 911 | if (ctx->encrypt) | 894 | if (ctx->encrypt) { |
| 912 | { | ||
| 913 | /* Encrypt payload */ | 895 | /* Encrypt payload */ |
| 914 | if (gctx->ctr) | 896 | if (gctx->ctr) { |
| 915 | { | 897 | if (CRYPTO_gcm128_encrypt_ctr32(&gctx->gcm, in, out, |
| 916 | if (CRYPTO_gcm128_encrypt_ctr32(&gctx->gcm, | 898 | len, gctx->ctr)) |
| 917 | in, out, len, | ||
| 918 | gctx->ctr)) | ||
| 919 | goto err; | 899 | goto err; |
| 920 | } | 900 | } else { |
| 921 | else { | ||
| 922 | if (CRYPTO_gcm128_encrypt(&gctx->gcm, in, out, len)) | 901 | if (CRYPTO_gcm128_encrypt(&gctx->gcm, in, out, len)) |
| 923 | goto err; | 902 | goto err; |
| 924 | } | 903 | } |
| 925 | out += len; | 904 | out += len; |
| 905 | |||
| 926 | /* Finally write tag */ | 906 | /* Finally write tag */ |
| 927 | CRYPTO_gcm128_tag(&gctx->gcm, out, EVP_GCM_TLS_TAG_LEN); | 907 | CRYPTO_gcm128_tag(&gctx->gcm, out, EVP_GCM_TLS_TAG_LEN); |
| 928 | rv = len + EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN; | 908 | rv = len + EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN; |
| 929 | } | 909 | } else { |
| 930 | else | ||
| 931 | { | ||
| 932 | /* Decrypt */ | 910 | /* Decrypt */ |
| 933 | if (gctx->ctr) | 911 | if (gctx->ctr) { |
| 934 | { | 912 | if (CRYPTO_gcm128_decrypt_ctr32(&gctx->gcm, in, out, |
| 935 | if (CRYPTO_gcm128_decrypt_ctr32(&gctx->gcm, | 913 | len, gctx->ctr)) |
| 936 | in, out, len, | ||
| 937 | gctx->ctr)) | ||
| 938 | goto err; | 914 | goto err; |
| 939 | } | 915 | } else { |
| 940 | else { | ||
| 941 | if (CRYPTO_gcm128_decrypt(&gctx->gcm, in, out, len)) | 916 | if (CRYPTO_gcm128_decrypt(&gctx->gcm, in, out, len)) |
| 942 | goto err; | 917 | goto err; |
| 943 | } | 918 | } |
| 944 | /* Retrieve tag */ | 919 | /* Retrieve tag */ |
| 945 | CRYPTO_gcm128_tag(&gctx->gcm, ctx->buf, | 920 | CRYPTO_gcm128_tag(&gctx->gcm, ctx->buf, EVP_GCM_TLS_TAG_LEN); |
| 946 | EVP_GCM_TLS_TAG_LEN); | 921 | |
| 947 | /* If tag mismatch wipe buffer */ | 922 | /* If tag mismatch wipe buffer */ |
| 948 | if (memcmp(ctx->buf, in + len, EVP_GCM_TLS_TAG_LEN)) | 923 | if (memcmp(ctx->buf, in + len, EVP_GCM_TLS_TAG_LEN)) { |
| 949 | { | ||
| 950 | OPENSSL_cleanse(out, len); | 924 | OPENSSL_cleanse(out, len); |
| 951 | goto err; | 925 | goto err; |
| 952 | } | ||
| 953 | rv = len; | ||
| 954 | } | 926 | } |
| 927 | rv = len; | ||
| 928 | } | ||
| 955 | 929 | ||
| 956 | err: | 930 | err: |
| 957 | gctx->iv_set = 0; | 931 | gctx->iv_set = 0; |
| 958 | gctx->tls_aad_len = -1; | 932 | gctx->tls_aad_len = -1; |
| 959 | return rv; | 933 | return rv; |
| 960 | } | 934 | } |
| 961 | 935 | ||
| 962 | static int aes_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 936 | static int |
| 963 | const unsigned char *in, size_t len) | 937 | aes_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 964 | { | 938 | const unsigned char *in, size_t len) |
| 939 | { | ||
| 965 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | 940 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; |
| 941 | |||
| 966 | /* If not set up, return error */ | 942 | /* If not set up, return error */ |
| 967 | if (!gctx->key_set) | 943 | if (!gctx->key_set) |
| 968 | return -1; | 944 | return -1; |
| @@ -972,95 +948,88 @@ static int aes_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | |||
| 972 | 948 | ||
| 973 | if (!gctx->iv_set) | 949 | if (!gctx->iv_set) |
| 974 | return -1; | 950 | return -1; |
| 975 | if (in) | 951 | |
| 976 | { | 952 | if (in) { |
| 977 | if (out == NULL) | 953 | if (out == NULL) { |
| 978 | { | ||
| 979 | if (CRYPTO_gcm128_aad(&gctx->gcm, in, len)) | 954 | if (CRYPTO_gcm128_aad(&gctx->gcm, in, len)) |
| 980 | return -1; | 955 | return -1; |
| 981 | } | 956 | } else if (ctx->encrypt) { |
| 982 | else if (ctx->encrypt) | 957 | if (gctx->ctr) { |
| 983 | { | ||
| 984 | if (gctx->ctr) | ||
| 985 | { | ||
| 986 | if (CRYPTO_gcm128_encrypt_ctr32(&gctx->gcm, | 958 | if (CRYPTO_gcm128_encrypt_ctr32(&gctx->gcm, |
| 987 | in, out, len, | 959 | in, out, len, gctx->ctr)) |
| 988 | gctx->ctr)) | ||
| 989 | return -1; | 960 | return -1; |
| 990 | } | 961 | } else { |
| 991 | else { | 962 | if (CRYPTO_gcm128_encrypt(&gctx->gcm, |
| 992 | if (CRYPTO_gcm128_encrypt(&gctx->gcm, in, out, len)) | 963 | in, out, len)) |
| 993 | return -1; | 964 | return -1; |
| 994 | } | ||
| 995 | } | 965 | } |
| 996 | else | 966 | } else { |
| 997 | { | 967 | if (gctx->ctr) { |
| 998 | if (gctx->ctr) | ||
| 999 | { | ||
| 1000 | if (CRYPTO_gcm128_decrypt_ctr32(&gctx->gcm, | 968 | if (CRYPTO_gcm128_decrypt_ctr32(&gctx->gcm, |
| 1001 | in, out, len, | 969 | in, out, len, gctx->ctr)) |
| 1002 | gctx->ctr)) | ||
| 1003 | return -1; | 970 | return -1; |
| 1004 | } | 971 | } else { |
| 1005 | else { | 972 | if (CRYPTO_gcm128_decrypt(&gctx->gcm, |
| 1006 | if (CRYPTO_gcm128_decrypt(&gctx->gcm, in, out, len)) | 973 | in, out, len)) |
| 1007 | return -1; | 974 | return -1; |
| 1008 | } | ||
| 1009 | } | 975 | } |
| 1010 | return len; | ||
| 1011 | } | 976 | } |
| 1012 | else | 977 | return len; |
| 1013 | { | 978 | } else { |
| 1014 | if (!ctx->encrypt) | 979 | if (!ctx->encrypt) { |
| 1015 | { | ||
| 1016 | if (gctx->taglen < 0) | 980 | if (gctx->taglen < 0) |
| 1017 | return -1; | 981 | return -1; |
| 1018 | if (CRYPTO_gcm128_finish(&gctx->gcm, | 982 | if (CRYPTO_gcm128_finish(&gctx->gcm, ctx->buf, |
| 1019 | ctx->buf, gctx->taglen) != 0) | 983 | gctx->taglen) != 0) |
| 1020 | return -1; | 984 | return -1; |
| 1021 | gctx->iv_set = 0; | 985 | gctx->iv_set = 0; |
| 1022 | return 0; | 986 | return 0; |
| 1023 | } | 987 | } |
| 1024 | CRYPTO_gcm128_tag(&gctx->gcm, ctx->buf, 16); | 988 | CRYPTO_gcm128_tag(&gctx->gcm, ctx->buf, 16); |
| 1025 | gctx->taglen = 16; | 989 | gctx->taglen = 16; |
| 990 | |||
| 1026 | /* Don't reuse the IV */ | 991 | /* Don't reuse the IV */ |
| 1027 | gctx->iv_set = 0; | 992 | gctx->iv_set = 0; |
| 1028 | return 0; | 993 | return 0; |
| 1029 | } | ||
| 1030 | |||
| 1031 | } | 994 | } |
| 1032 | 995 | ||
| 996 | } | ||
| 997 | |||
| 1033 | #define CUSTOM_FLAGS (EVP_CIPH_FLAG_DEFAULT_ASN1 \ | 998 | #define CUSTOM_FLAGS (EVP_CIPH_FLAG_DEFAULT_ASN1 \ |
| 1034 | | EVP_CIPH_CUSTOM_IV | EVP_CIPH_FLAG_CUSTOM_CIPHER \ | 999 | | EVP_CIPH_CUSTOM_IV | EVP_CIPH_FLAG_CUSTOM_CIPHER \ |
| 1035 | | EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT) | 1000 | | EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT) |
| 1036 | 1001 | ||
| 1037 | BLOCK_CIPHER_custom(NID_aes,128,1,12,gcm,GCM, | 1002 | BLOCK_CIPHER_custom(NID_aes, 128, 1,12, gcm, GCM, |
| 1038 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) | 1003 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) |
| 1039 | BLOCK_CIPHER_custom(NID_aes,192,1,12,gcm,GCM, | 1004 | BLOCK_CIPHER_custom(NID_aes, 192, 1,12, gcm, GCM, |
| 1040 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) | 1005 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) |
| 1041 | BLOCK_CIPHER_custom(NID_aes,256,1,12,gcm,GCM, | 1006 | BLOCK_CIPHER_custom(NID_aes, 256, 1,12, gcm, GCM, |
| 1042 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) | 1007 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) |
| 1043 | 1008 | ||
| 1044 | static int aes_xts_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | 1009 | static int |
| 1045 | { | 1010 | aes_xts_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) |
| 1011 | { | ||
| 1046 | EVP_AES_XTS_CTX *xctx = c->cipher_data; | 1012 | EVP_AES_XTS_CTX *xctx = c->cipher_data; |
| 1013 | |||
| 1047 | if (type != EVP_CTRL_INIT) | 1014 | if (type != EVP_CTRL_INIT) |
| 1048 | return -1; | 1015 | return -1; |
| 1016 | |||
| 1049 | /* key1 and key2 are used as an indicator both key and IV are set */ | 1017 | /* key1 and key2 are used as an indicator both key and IV are set */ |
| 1050 | xctx->xts.key1 = NULL; | 1018 | xctx->xts.key1 = NULL; |
| 1051 | xctx->xts.key2 = NULL; | 1019 | xctx->xts.key2 = NULL; |
| 1052 | return 1; | 1020 | return 1; |
| 1053 | } | 1021 | } |
| 1054 | 1022 | ||
| 1055 | static int aes_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 1023 | static int |
| 1056 | const unsigned char *iv, int enc) | 1024 | aes_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 1057 | { | 1025 | const unsigned char *iv, int enc) |
| 1026 | { | ||
| 1058 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; | 1027 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; |
| 1028 | |||
| 1059 | if (!iv && !key) | 1029 | if (!iv && !key) |
| 1060 | return 1; | 1030 | return 1; |
| 1061 | 1031 | ||
| 1062 | if (key) do | 1032 | if (key) do { |
| 1063 | { | ||
| 1064 | #ifdef AES_XTS_ASM | 1033 | #ifdef AES_XTS_ASM |
| 1065 | xctx->stream = enc ? AES_xts_encrypt : AES_xts_decrypt; | 1034 | xctx->stream = enc ? AES_xts_encrypt : AES_xts_decrypt; |
| 1066 | #else | 1035 | #else |
| @@ -1069,100 +1038,98 @@ static int aes_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | |||
| 1069 | /* key_len is two AES keys */ | 1038 | /* key_len is two AES keys */ |
| 1070 | #ifdef BSAES_CAPABLE | 1039 | #ifdef BSAES_CAPABLE |
| 1071 | if (BSAES_CAPABLE) | 1040 | if (BSAES_CAPABLE) |
| 1072 | xctx->stream = enc ? bsaes_xts_encrypt : bsaes_xts_decrypt; | 1041 | xctx->stream = enc ? bsaes_xts_encrypt : |
| 1042 | bsaes_xts_decrypt; | ||
| 1073 | else | 1043 | else |
| 1074 | #endif | 1044 | #endif |
| 1075 | #ifdef VPAES_CAPABLE | 1045 | #ifdef VPAES_CAPABLE |
| 1076 | if (VPAES_CAPABLE) | 1046 | if (VPAES_CAPABLE) { |
| 1077 | { | 1047 | if (enc) { |
| 1078 | if (enc) | 1048 | vpaes_set_encrypt_key(key, ctx->key_len * 4, |
| 1079 | { | 1049 | &xctx->ks1); |
| 1080 | vpaes_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1); | 1050 | xctx->xts.block1 = (block128_f)vpaes_encrypt; |
| 1081 | xctx->xts.block1 = (block128_f)vpaes_encrypt; | 1051 | } else { |
| 1082 | } | 1052 | vpaes_set_decrypt_key(key, ctx->key_len * 4, |
| 1083 | else | 1053 | &xctx->ks1); |
| 1084 | { | 1054 | xctx->xts.block1 = (block128_f)vpaes_decrypt; |
| 1085 | vpaes_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
| 1086 | xctx->xts.block1 = (block128_f)vpaes_decrypt; | ||
| 1087 | } | 1055 | } |
| 1088 | 1056 | ||
| 1089 | vpaes_set_encrypt_key(key + ctx->key_len/2, | 1057 | vpaes_set_encrypt_key(key + ctx->key_len / 2, |
| 1090 | ctx->key_len * 4, &xctx->ks2); | 1058 | ctx->key_len * 4, &xctx->ks2); |
| 1091 | xctx->xts.block2 = (block128_f)vpaes_encrypt; | 1059 | xctx->xts.block2 = (block128_f)vpaes_encrypt; |
| 1092 | 1060 | ||
| 1093 | xctx->xts.key1 = &xctx->ks1; | 1061 | xctx->xts.key1 = &xctx->ks1; |
| 1094 | break; | 1062 | break; |
| 1095 | } | 1063 | } else |
| 1096 | else | ||
| 1097 | #endif | 1064 | #endif |
| 1098 | (void)0; /* terminate potentially open 'else' */ | 1065 | (void)0; /* terminate potentially open 'else' */ |
| 1099 | 1066 | ||
| 1100 | if (enc) | 1067 | if (enc) { |
| 1101 | { | ||
| 1102 | AES_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1); | 1068 | AES_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1); |
| 1103 | xctx->xts.block1 = (block128_f)AES_encrypt; | 1069 | xctx->xts.block1 = (block128_f)AES_encrypt; |
| 1104 | } | 1070 | } else { |
| 1105 | else | ||
| 1106 | { | ||
| 1107 | AES_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1); | 1071 | AES_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1); |
| 1108 | xctx->xts.block1 = (block128_f)AES_decrypt; | 1072 | xctx->xts.block1 = (block128_f)AES_decrypt; |
| 1109 | } | 1073 | } |
| 1110 | 1074 | ||
| 1111 | AES_set_encrypt_key(key + ctx->key_len/2, | 1075 | AES_set_encrypt_key(key + ctx->key_len / 2, |
| 1112 | ctx->key_len * 4, &xctx->ks2); | 1076 | ctx->key_len * 4, &xctx->ks2); |
| 1113 | xctx->xts.block2 = (block128_f)AES_encrypt; | 1077 | xctx->xts.block2 = (block128_f)AES_encrypt; |
| 1114 | 1078 | ||
| 1115 | xctx->xts.key1 = &xctx->ks1; | 1079 | xctx->xts.key1 = &xctx->ks1; |
| 1116 | } while (0); | 1080 | } while (0); |
| 1117 | 1081 | ||
| 1118 | if (iv) | 1082 | if (iv) { |
| 1119 | { | ||
| 1120 | xctx->xts.key2 = &xctx->ks2; | 1083 | xctx->xts.key2 = &xctx->ks2; |
| 1121 | memcpy(ctx->iv, iv, 16); | 1084 | memcpy(ctx->iv, iv, 16); |
| 1122 | } | 1085 | } |
| 1123 | 1086 | ||
| 1124 | return 1; | 1087 | return 1; |
| 1125 | } | 1088 | } |
| 1126 | 1089 | ||
| 1127 | static int aes_xts_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 1090 | static int |
| 1128 | const unsigned char *in, size_t len) | 1091 | aes_xts_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 1129 | { | 1092 | const unsigned char *in, size_t len) |
| 1093 | { | ||
| 1130 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; | 1094 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; |
| 1095 | |||
| 1131 | if (!xctx->xts.key1 || !xctx->xts.key2) | 1096 | if (!xctx->xts.key1 || !xctx->xts.key2) |
| 1132 | return 0; | 1097 | return 0; |
| 1133 | if (!out || !in || len<AES_BLOCK_SIZE) | 1098 | if (!out || !in || len < AES_BLOCK_SIZE) |
| 1134 | return 0; | 1099 | return 0; |
| 1100 | |||
| 1135 | #ifdef OPENSSL_FIPS | 1101 | #ifdef OPENSSL_FIPS |
| 1136 | /* Requirement of SP800-38E */ | 1102 | /* Requirement of SP800-38E */ |
| 1137 | if (FIPS_module_mode() && !(ctx->flags & EVP_CIPH_FLAG_NON_FIPS_ALLOW) && | 1103 | if (FIPS_module_mode() && |
| 1138 | (len > (1UL<<20)*16)) | 1104 | !(ctx->flags & EVP_CIPH_FLAG_NON_FIPS_ALLOW) && |
| 1139 | { | 1105 | (len > (1UL << 20) * 16)) { |
| 1140 | EVPerr(EVP_F_AES_XTS_CIPHER, EVP_R_TOO_LARGE); | 1106 | EVPerr(EVP_F_AES_XTS_CIPHER, EVP_R_TOO_LARGE); |
| 1141 | return 0; | 1107 | return 0; |
| 1142 | } | 1108 | } |
| 1143 | #endif | 1109 | #endif |
| 1144 | if (xctx->stream) | 1110 | if (xctx->stream) |
| 1145 | (*xctx->stream)(in, out, len, | 1111 | (*xctx->stream)(in, out, len, xctx->xts.key1, xctx->xts.key2, |
| 1146 | xctx->xts.key1, xctx->xts.key2, ctx->iv); | 1112 | ctx->iv); |
| 1147 | else if (CRYPTO_xts128_encrypt(&xctx->xts, ctx->iv, in, out, len, | 1113 | else if (CRYPTO_xts128_encrypt(&xctx->xts, ctx->iv, in, out, len, |
| 1148 | ctx->encrypt)) | 1114 | ctx->encrypt)) |
| 1149 | return 0; | 1115 | return 0; |
| 1150 | return 1; | 1116 | return 1; |
| 1151 | } | 1117 | } |
| 1152 | 1118 | ||
| 1153 | #define aes_xts_cleanup NULL | 1119 | #define aes_xts_cleanup NULL |
| 1154 | 1120 | ||
| 1155 | #define XTS_FLAGS (EVP_CIPH_FLAG_DEFAULT_ASN1 | EVP_CIPH_CUSTOM_IV \ | 1121 | #define XTS_FLAGS (EVP_CIPH_FLAG_DEFAULT_ASN1 | EVP_CIPH_CUSTOM_IV \ |
| 1156 | | EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT) | 1122 | | EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT) |
| 1157 | 1123 | ||
| 1158 | BLOCK_CIPHER_custom(NID_aes,128,1,16,xts,XTS,EVP_CIPH_FLAG_FIPS|XTS_FLAGS) | 1124 | BLOCK_CIPHER_custom(NID_aes, 128, 1,16, xts, XTS, EVP_CIPH_FLAG_FIPS|XTS_FLAGS) |
| 1159 | BLOCK_CIPHER_custom(NID_aes,256,1,16,xts,XTS,EVP_CIPH_FLAG_FIPS|XTS_FLAGS) | 1125 | BLOCK_CIPHER_custom(NID_aes, 256, 1,16, xts, XTS, EVP_CIPH_FLAG_FIPS|XTS_FLAGS) |
| 1160 | 1126 | ||
| 1161 | static int aes_ccm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | 1127 | static int |
| 1162 | { | 1128 | aes_ccm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) |
| 1129 | { | ||
| 1163 | EVP_AES_CCM_CTX *cctx = c->cipher_data; | 1130 | EVP_AES_CCM_CTX *cctx = c->cipher_data; |
| 1164 | switch (type) | 1131 | |
| 1165 | { | 1132 | switch (type) { |
| 1166 | case EVP_CTRL_INIT: | 1133 | case EVP_CTRL_INIT: |
| 1167 | cctx->key_set = 0; | 1134 | cctx->key_set = 0; |
| 1168 | cctx->iv_set = 0; | 1135 | cctx->iv_set = 0; |
| @@ -1174,6 +1141,7 @@ static int aes_ccm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 1174 | 1141 | ||
| 1175 | case EVP_CTRL_CCM_SET_IVLEN: | 1142 | case EVP_CTRL_CCM_SET_IVLEN: |
| 1176 | arg = 15 - arg; | 1143 | arg = 15 - arg; |
| 1144 | |||
| 1177 | case EVP_CTRL_CCM_SET_L: | 1145 | case EVP_CTRL_CCM_SET_L: |
| 1178 | if (arg < 2 || arg > 8) | 1146 | if (arg < 2 || arg > 8) |
| 1179 | return 0; | 1147 | return 0; |
| @@ -1185,18 +1153,17 @@ static int aes_ccm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 1185 | return 0; | 1153 | return 0; |
| 1186 | if ((c->encrypt && ptr) || (!c->encrypt && !ptr)) | 1154 | if ((c->encrypt && ptr) || (!c->encrypt && !ptr)) |
| 1187 | return 0; | 1155 | return 0; |
| 1188 | if (ptr) | 1156 | if (ptr) { |
| 1189 | { | ||
| 1190 | cctx->tag_set = 1; | 1157 | cctx->tag_set = 1; |
| 1191 | memcpy(c->buf, ptr, arg); | 1158 | memcpy(c->buf, ptr, arg); |
| 1192 | } | 1159 | } |
| 1193 | cctx->M = arg; | 1160 | cctx->M = arg; |
| 1194 | return 1; | 1161 | return 1; |
| 1195 | 1162 | ||
| 1196 | case EVP_CTRL_CCM_GET_TAG: | 1163 | case EVP_CTRL_CCM_GET_TAG: |
| 1197 | if (!c->encrypt || !cctx->tag_set) | 1164 | if (!c->encrypt || !cctx->tag_set) |
| 1198 | return 0; | 1165 | return 0; |
| 1199 | if(!CRYPTO_ccm128_tag(&cctx->ccm, ptr, (size_t)arg)) | 1166 | if (!CRYPTO_ccm128_tag(&cctx->ccm, ptr, (size_t)arg)) |
| 1200 | return 0; | 1167 | return 0; |
| 1201 | cctx->tag_set = 0; | 1168 | cctx->tag_set = 0; |
| 1202 | cctx->iv_set = 0; | 1169 | cctx->iv_set = 0; |
| @@ -1205,116 +1172,111 @@ static int aes_ccm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 1205 | 1172 | ||
| 1206 | default: | 1173 | default: |
| 1207 | return -1; | 1174 | return -1; |
| 1208 | |||
| 1209 | } | ||
| 1210 | } | 1175 | } |
| 1176 | } | ||
| 1211 | 1177 | ||
| 1212 | static int aes_ccm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 1178 | static int |
| 1213 | const unsigned char *iv, int enc) | 1179 | aes_ccm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 1214 | { | 1180 | const unsigned char *iv, int enc) |
| 1181 | { | ||
| 1215 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; | 1182 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; |
| 1183 | |||
| 1216 | if (!iv && !key) | 1184 | if (!iv && !key) |
| 1217 | return 1; | 1185 | return 1; |
| 1218 | if (key) do | 1186 | if (key) do { |
| 1219 | { | ||
| 1220 | #ifdef VPAES_CAPABLE | 1187 | #ifdef VPAES_CAPABLE |
| 1221 | if (VPAES_CAPABLE) | 1188 | if (VPAES_CAPABLE) { |
| 1222 | { | ||
| 1223 | vpaes_set_encrypt_key(key, ctx->key_len*8, &cctx->ks); | 1189 | vpaes_set_encrypt_key(key, ctx->key_len*8, &cctx->ks); |
| 1224 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, | 1190 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, |
| 1225 | &cctx->ks, (block128_f)vpaes_encrypt); | 1191 | &cctx->ks, (block128_f)vpaes_encrypt); |
| 1226 | cctx->str = NULL; | 1192 | cctx->str = NULL; |
| 1227 | cctx->key_set = 1; | 1193 | cctx->key_set = 1; |
| 1228 | break; | 1194 | break; |
| 1229 | } | 1195 | } |
| 1230 | #endif | 1196 | #endif |
| 1231 | AES_set_encrypt_key(key, ctx->key_len * 8, &cctx->ks); | 1197 | AES_set_encrypt_key(key, ctx->key_len * 8, &cctx->ks); |
| 1232 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, | 1198 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, |
| 1233 | &cctx->ks, (block128_f)AES_encrypt); | 1199 | &cctx->ks, (block128_f)AES_encrypt); |
| 1234 | cctx->str = NULL; | 1200 | cctx->str = NULL; |
| 1235 | cctx->key_set = 1; | 1201 | cctx->key_set = 1; |
| 1236 | } while (0); | 1202 | } while (0); |
| 1237 | if (iv) | 1203 | if (iv) { |
| 1238 | { | ||
| 1239 | memcpy(ctx->iv, iv, 15 - cctx->L); | 1204 | memcpy(ctx->iv, iv, 15 - cctx->L); |
| 1240 | cctx->iv_set = 1; | 1205 | cctx->iv_set = 1; |
| 1241 | } | ||
| 1242 | return 1; | ||
| 1243 | } | 1206 | } |
| 1207 | return 1; | ||
| 1208 | } | ||
| 1244 | 1209 | ||
| 1245 | static int aes_ccm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 1210 | static int |
| 1246 | const unsigned char *in, size_t len) | 1211 | aes_ccm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 1247 | { | 1212 | const unsigned char *in, size_t len) |
| 1213 | { | ||
| 1248 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; | 1214 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; |
| 1249 | CCM128_CONTEXT *ccm = &cctx->ccm; | 1215 | CCM128_CONTEXT *ccm = &cctx->ccm; |
| 1216 | |||
| 1250 | /* If not set up, return error */ | 1217 | /* If not set up, return error */ |
| 1251 | if (!cctx->iv_set && !cctx->key_set) | 1218 | if (!cctx->iv_set && !cctx->key_set) |
| 1252 | return -1; | 1219 | return -1; |
| 1253 | if (!ctx->encrypt && !cctx->tag_set) | 1220 | if (!ctx->encrypt && !cctx->tag_set) |
| 1254 | return -1; | 1221 | return -1; |
| 1255 | if (!out) | 1222 | |
| 1256 | { | 1223 | if (!out) { |
| 1257 | if (!in) | 1224 | if (!in) { |
| 1258 | { | 1225 | if (CRYPTO_ccm128_setiv(ccm, ctx->iv, 15 - cctx->L, |
| 1259 | if (CRYPTO_ccm128_setiv(ccm, ctx->iv, 15 - cctx->L,len)) | 1226 | len)) |
| 1260 | return -1; | 1227 | return -1; |
| 1261 | cctx->len_set = 1; | 1228 | cctx->len_set = 1; |
| 1262 | return len; | 1229 | return len; |
| 1263 | } | 1230 | } |
| 1264 | /* If have AAD need message length */ | 1231 | /* If have AAD need message length */ |
| 1265 | if (!cctx->len_set && len) | 1232 | if (!cctx->len_set && len) |
| 1266 | return -1; | 1233 | return -1; |
| 1267 | CRYPTO_ccm128_aad(ccm, in, len); | 1234 | CRYPTO_ccm128_aad(ccm, in, len); |
| 1268 | return len; | 1235 | return len; |
| 1269 | } | 1236 | } |
| 1270 | /* EVP_*Final() doesn't return any data */ | 1237 | /* EVP_*Final() doesn't return any data */ |
| 1271 | if (!in) | 1238 | if (!in) |
| 1272 | return 0; | 1239 | return 0; |
| 1273 | /* If not set length yet do it */ | 1240 | /* If not set length yet do it */ |
| 1274 | if (!cctx->len_set) | 1241 | if (!cctx->len_set) { |
| 1275 | { | ||
| 1276 | if (CRYPTO_ccm128_setiv(ccm, ctx->iv, 15 - cctx->L, len)) | 1242 | if (CRYPTO_ccm128_setiv(ccm, ctx->iv, 15 - cctx->L, len)) |
| 1277 | return -1; | 1243 | return -1; |
| 1278 | cctx->len_set = 1; | 1244 | cctx->len_set = 1; |
| 1279 | } | 1245 | } |
| 1280 | if (ctx->encrypt) | 1246 | if (ctx->encrypt) { |
| 1281 | { | ||
| 1282 | if (cctx->str ? CRYPTO_ccm128_encrypt_ccm64(ccm, in, out, len, | 1247 | if (cctx->str ? CRYPTO_ccm128_encrypt_ccm64(ccm, in, out, len, |
| 1283 | cctx->str) : | 1248 | cctx->str) : CRYPTO_ccm128_encrypt(ccm, in, out, len)) |
| 1284 | CRYPTO_ccm128_encrypt(ccm, in, out, len)) | ||
| 1285 | return -1; | 1249 | return -1; |
| 1286 | cctx->tag_set = 1; | 1250 | cctx->tag_set = 1; |
| 1287 | return len; | 1251 | return len; |
| 1288 | } | 1252 | } else { |
| 1289 | else | ||
| 1290 | { | ||
| 1291 | int rv = -1; | 1253 | int rv = -1; |
| 1292 | if (cctx->str ? !CRYPTO_ccm128_decrypt_ccm64(ccm, in, out, len, | 1254 | if (cctx->str ? !CRYPTO_ccm128_decrypt_ccm64(ccm, in, out, len, |
| 1293 | cctx->str) : | 1255 | cctx->str) : !CRYPTO_ccm128_decrypt(ccm, in, out, len)) { |
| 1294 | !CRYPTO_ccm128_decrypt(ccm, in, out, len)) | ||
| 1295 | { | ||
| 1296 | unsigned char tag[16]; | 1256 | unsigned char tag[16]; |
| 1297 | if (CRYPTO_ccm128_tag(ccm, tag, cctx->M)) | 1257 | if (CRYPTO_ccm128_tag(ccm, tag, cctx->M)) { |
| 1298 | { | ||
| 1299 | if (!memcmp(tag, ctx->buf, cctx->M)) | 1258 | if (!memcmp(tag, ctx->buf, cctx->M)) |
| 1300 | rv = len; | 1259 | rv = len; |
| 1301 | } | ||
| 1302 | } | 1260 | } |
| 1261 | } | ||
| 1303 | if (rv == -1) | 1262 | if (rv == -1) |
| 1304 | OPENSSL_cleanse(out, len); | 1263 | OPENSSL_cleanse(out, len); |
| 1305 | cctx->iv_set = 0; | 1264 | cctx->iv_set = 0; |
| 1306 | cctx->tag_set = 0; | 1265 | cctx->tag_set = 0; |
| 1307 | cctx->len_set = 0; | 1266 | cctx->len_set = 0; |
| 1308 | return rv; | 1267 | return rv; |
| 1309 | } | ||
| 1310 | |||
| 1311 | } | 1268 | } |
| 1312 | 1269 | ||
| 1270 | } | ||
| 1271 | |||
| 1313 | #define aes_ccm_cleanup NULL | 1272 | #define aes_ccm_cleanup NULL |
| 1314 | 1273 | ||
| 1315 | BLOCK_CIPHER_custom(NID_aes,128,1,12,ccm,CCM,EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) | 1274 | BLOCK_CIPHER_custom(NID_aes, 128, 1,12, ccm, CCM, |
| 1316 | BLOCK_CIPHER_custom(NID_aes,192,1,12,ccm,CCM,EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) | 1275 | EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) |
| 1317 | BLOCK_CIPHER_custom(NID_aes,256,1,12,ccm,CCM,EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) | 1276 | BLOCK_CIPHER_custom(NID_aes, 192, 1,12, ccm, CCM, |
| 1277 | EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) | ||
| 1278 | BLOCK_CIPHER_custom(NID_aes, 256, 1,12, ccm, CCM, | ||
| 1279 | EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) | ||
| 1318 | 1280 | ||
| 1319 | #endif | 1281 | #endif |
| 1320 | #endif | 1282 | #endif |
diff --git a/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c b/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c index 4d76ec74d2..af0edb3dcf 100644 --- a/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c +++ b/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c | |||
| @@ -72,16 +72,15 @@ | |||
| 72 | 72 | ||
| 73 | #define TLS1_1_VERSION 0x0302 | 73 | #define TLS1_1_VERSION 0x0302 |
| 74 | 74 | ||
| 75 | typedef struct | 75 | typedef struct { |
| 76 | { | 76 | AES_KEY ks; |
| 77 | AES_KEY ks; | 77 | SHA_CTX head, tail, md; |
| 78 | SHA_CTX head,tail,md; | 78 | size_t payload_length; /* AAD length in decrypt case */ |
| 79 | size_t payload_length; /* AAD length in decrypt case */ | 79 | union { |
| 80 | union { | 80 | unsigned int tls_ver; |
| 81 | unsigned int tls_ver; | 81 | unsigned char tls_aad[16]; /* 13 used */ |
| 82 | unsigned char tls_aad[16]; /* 13 used */ | 82 | } aux; |
| 83 | } aux; | 83 | } EVP_AES_HMAC_SHA1; |
| 84 | } EVP_AES_HMAC_SHA1; | ||
| 85 | 84 | ||
| 86 | #define NO_PAYLOAD_LENGTH ((size_t)-1) | 85 | #define NO_PAYLOAD_LENGTH ((size_t)-1) |
| 87 | 86 | ||
| @@ -97,43 +96,37 @@ typedef struct | |||
| 97 | extern unsigned int OPENSSL_ia32cap_P[2]; | 96 | extern unsigned int OPENSSL_ia32cap_P[2]; |
| 98 | #define AESNI_CAPABLE (1<<(57-32)) | 97 | #define AESNI_CAPABLE (1<<(57-32)) |
| 99 | 98 | ||
| 100 | int aesni_set_encrypt_key(const unsigned char *userKey, int bits, | 99 | int aesni_set_encrypt_key(const unsigned char *userKey, int bits, AES_KEY *key); |
| 101 | AES_KEY *key); | 100 | int aesni_set_decrypt_key(const unsigned char *userKey, int bits, AES_KEY *key); |
| 102 | int aesni_set_decrypt_key(const unsigned char *userKey, int bits, | ||
| 103 | AES_KEY *key); | ||
| 104 | 101 | ||
| 105 | void aesni_cbc_encrypt(const unsigned char *in, | 102 | void aesni_cbc_encrypt(const unsigned char *in, unsigned char *out, |
| 106 | unsigned char *out, | 103 | size_t length, const AES_KEY *key, unsigned char *ivec, int enc); |
| 107 | size_t length, | ||
| 108 | const AES_KEY *key, | ||
| 109 | unsigned char *ivec, int enc); | ||
| 110 | 104 | ||
| 111 | void aesni_cbc_sha1_enc (const void *inp, void *out, size_t blocks, | 105 | void aesni_cbc_sha1_enc (const void *inp, void *out, size_t blocks, |
| 112 | const AES_KEY *key, unsigned char iv[16], | 106 | const AES_KEY *key, unsigned char iv[16], SHA_CTX *ctx, const void *in0); |
| 113 | SHA_CTX *ctx,const void *in0); | ||
| 114 | 107 | ||
| 115 | #define data(ctx) ((EVP_AES_HMAC_SHA1 *)(ctx)->cipher_data) | 108 | #define data(ctx) ((EVP_AES_HMAC_SHA1 *)(ctx)->cipher_data) |
| 116 | 109 | ||
| 117 | static int aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, | 110 | static int |
| 118 | const unsigned char *inkey, | 111 | aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, |
| 119 | const unsigned char *iv, int enc) | 112 | const unsigned char *iv, int enc) |
| 120 | { | 113 | { |
| 121 | EVP_AES_HMAC_SHA1 *key = data(ctx); | 114 | EVP_AES_HMAC_SHA1 *key = data(ctx); |
| 122 | int ret; | 115 | int ret; |
| 123 | 116 | ||
| 124 | if (enc) | 117 | if (enc) |
| 125 | ret=aesni_set_encrypt_key(inkey,ctx->key_len*8,&key->ks); | 118 | ret = aesni_set_encrypt_key(inkey, ctx->key_len * 8, &key->ks); |
| 126 | else | 119 | else |
| 127 | ret=aesni_set_decrypt_key(inkey,ctx->key_len*8,&key->ks); | 120 | ret = aesni_set_decrypt_key(inkey, ctx->key_len * 8, &key->ks); |
| 128 | 121 | ||
| 129 | SHA1_Init(&key->head); /* handy when benchmarking */ | 122 | SHA1_Init(&key->head); /* handy when benchmarking */ |
| 130 | key->tail = key->head; | 123 | key->tail = key->head; |
| 131 | key->md = key->head; | 124 | key->md = key->head; |
| 132 | 125 | ||
| 133 | key->payload_length = NO_PAYLOAD_LENGTH; | 126 | key->payload_length = NO_PAYLOAD_LENGTH; |
| 134 | 127 | ||
| 135 | return ret<0?0:1; | 128 | return ret < 0 ? 0 : 1; |
| 136 | } | 129 | } |
| 137 | 130 | ||
| 138 | #define STITCHED_CALL | 131 | #define STITCHED_CALL |
| 139 | 132 | ||
| @@ -141,16 +134,19 @@ static int aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, | |||
| 141 | #define aes_off 0 | 134 | #define aes_off 0 |
| 142 | #endif | 135 | #endif |
| 143 | 136 | ||
| 144 | void sha1_block_data_order (void *c,const void *p,size_t len); | 137 | void sha1_block_data_order (void *c, const void *p, size_t len); |
| 145 | 138 | ||
| 146 | static void sha1_update(SHA_CTX *c,const void *data,size_t len) | 139 | static void |
| 147 | { const unsigned char *ptr = data; | 140 | sha1_update(SHA_CTX *c, const void *data, size_t len) |
| 141 | { | ||
| 142 | const unsigned char *ptr = data; | ||
| 148 | size_t res; | 143 | size_t res; |
| 149 | 144 | ||
| 150 | if ((res = c->num)) { | 145 | if ((res = c->num)) { |
| 151 | res = SHA_CBLOCK-res; | 146 | res = SHA_CBLOCK - res; |
| 152 | if (len<res) res=len; | 147 | if (len < res) |
| 153 | SHA1_Update (c,ptr,res); | 148 | res = len; |
| 149 | SHA1_Update(c, ptr, res); | ||
| 154 | ptr += res; | 150 | ptr += res; |
| 155 | len -= res; | 151 | len -= res; |
| 156 | } | 152 | } |
| @@ -159,16 +155,17 @@ static void sha1_update(SHA_CTX *c,const void *data,size_t len) | |||
| 159 | len -= res; | 155 | len -= res; |
| 160 | 156 | ||
| 161 | if (len) { | 157 | if (len) { |
| 162 | sha1_block_data_order(c,ptr,len/SHA_CBLOCK); | 158 | sha1_block_data_order(c, ptr, len / SHA_CBLOCK); |
| 163 | 159 | ||
| 164 | ptr += len; | 160 | ptr += len; |
| 165 | c->Nh += len>>29; | 161 | c->Nh += len >> 29; |
| 166 | c->Nl += len<<=3; | 162 | c->Nl += len <<= 3; |
| 167 | if (c->Nl<(unsigned int)len) c->Nh++; | 163 | if (c->Nl < (unsigned int)len) |
| 164 | c->Nh++; | ||
| 168 | } | 165 | } |
| 169 | 166 | ||
| 170 | if (res) | 167 | if (res) |
| 171 | SHA1_Update(c,ptr,res); | 168 | SHA1_Update(c, ptr, res); |
| 172 | } | 169 | } |
| 173 | 170 | ||
| 174 | #ifdef SHA1_Update | 171 | #ifdef SHA1_Update |
| @@ -176,96 +173,106 @@ static void sha1_update(SHA_CTX *c,const void *data,size_t len) | |||
| 176 | #endif | 173 | #endif |
| 177 | #define SHA1_Update sha1_update | 174 | #define SHA1_Update sha1_update |
| 178 | 175 | ||
| 179 | static int aesni_cbc_hmac_sha1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 176 | static int |
| 180 | const unsigned char *in, size_t len) | 177 | aesni_cbc_hmac_sha1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 181 | { | 178 | const unsigned char *in, size_t len) |
| 179 | { | ||
| 182 | EVP_AES_HMAC_SHA1 *key = data(ctx); | 180 | EVP_AES_HMAC_SHA1 *key = data(ctx); |
| 183 | unsigned int l; | 181 | unsigned int l; |
| 184 | size_t plen = key->payload_length, | 182 | size_t plen = key->payload_length, |
| 185 | iv = 0, /* explicit IV in TLS 1.1 and later */ | 183 | iv = 0, /* explicit IV in TLS 1.1 and later */ |
| 186 | sha_off = 0; | 184 | sha_off = 0; |
| 187 | #if defined(STITCHED_CALL) | 185 | #if defined(STITCHED_CALL) |
| 188 | size_t aes_off = 0, | 186 | size_t aes_off = 0, blocks; |
| 189 | blocks; | ||
| 190 | 187 | ||
| 191 | sha_off = SHA_CBLOCK-key->md.num; | 188 | sha_off = SHA_CBLOCK - key->md.num; |
| 192 | #endif | 189 | #endif |
| 193 | 190 | ||
| 194 | key->payload_length = NO_PAYLOAD_LENGTH; | 191 | key->payload_length = NO_PAYLOAD_LENGTH; |
| 195 | 192 | ||
| 196 | if (len%AES_BLOCK_SIZE) return 0; | 193 | if (len % AES_BLOCK_SIZE) |
| 194 | return 0; | ||
| 197 | 195 | ||
| 198 | if (ctx->encrypt) { | 196 | if (ctx->encrypt) { |
| 199 | if (plen==NO_PAYLOAD_LENGTH) | 197 | if (plen == NO_PAYLOAD_LENGTH) |
| 200 | plen = len; | 198 | plen = len; |
| 201 | else if (len!=((plen+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE)) | 199 | else if (len != ((plen + SHA_DIGEST_LENGTH + AES_BLOCK_SIZE) & |
| 200 | -AES_BLOCK_SIZE)) | ||
| 202 | return 0; | 201 | return 0; |
| 203 | else if (key->aux.tls_ver >= TLS1_1_VERSION) | 202 | else if (key->aux.tls_ver >= TLS1_1_VERSION) |
| 204 | iv = AES_BLOCK_SIZE; | 203 | iv = AES_BLOCK_SIZE; |
| 205 | 204 | ||
| 206 | #if defined(STITCHED_CALL) | 205 | #if defined(STITCHED_CALL) |
| 207 | if (plen>(sha_off+iv) && (blocks=(plen-(sha_off+iv))/SHA_CBLOCK)) { | 206 | if (plen > (sha_off + iv) && |
| 208 | SHA1_Update(&key->md,in+iv,sha_off); | 207 | (blocks = (plen - (sha_off + iv)) / SHA_CBLOCK)) { |
| 208 | SHA1_Update(&key->md, in + iv, sha_off); | ||
| 209 | 209 | ||
| 210 | aesni_cbc_sha1_enc(in,out,blocks,&key->ks, | 210 | aesni_cbc_sha1_enc(in, out, blocks, &key->ks, |
| 211 | ctx->iv,&key->md,in+iv+sha_off); | 211 | ctx->iv, &key->md, in + iv + sha_off); |
| 212 | blocks *= SHA_CBLOCK; | 212 | blocks *= SHA_CBLOCK; |
| 213 | aes_off += blocks; | 213 | aes_off += blocks; |
| 214 | sha_off += blocks; | 214 | sha_off += blocks; |
| 215 | key->md.Nh += blocks>>29; | 215 | key->md.Nh += blocks >> 29; |
| 216 | key->md.Nl += blocks<<=3; | 216 | key->md.Nl += blocks <<= 3; |
| 217 | if (key->md.Nl<(unsigned int)blocks) key->md.Nh++; | 217 | if (key->md.Nl < (unsigned int)blocks) |
| 218 | key->md.Nh++; | ||
| 218 | } else { | 219 | } else { |
| 219 | sha_off = 0; | 220 | sha_off = 0; |
| 220 | } | 221 | } |
| 221 | #endif | 222 | #endif |
| 222 | sha_off += iv; | 223 | sha_off += iv; |
| 223 | SHA1_Update(&key->md,in+sha_off,plen-sha_off); | 224 | SHA1_Update(&key->md, in + sha_off, plen - sha_off); |
| 224 | 225 | ||
| 225 | if (plen!=len) { /* "TLS" mode of operation */ | 226 | if (plen != len) { /* "TLS" mode of operation */ |
| 226 | if (in!=out) | 227 | if (in != out) |
| 227 | memcpy(out+aes_off,in+aes_off,plen-aes_off); | 228 | memcpy(out + aes_off, in + aes_off, |
| 229 | plen - aes_off); | ||
| 228 | 230 | ||
| 229 | /* calculate HMAC and append it to payload */ | 231 | /* calculate HMAC and append it to payload */ |
| 230 | SHA1_Final(out+plen,&key->md); | 232 | SHA1_Final(out + plen, &key->md); |
| 231 | key->md = key->tail; | 233 | key->md = key->tail; |
| 232 | SHA1_Update(&key->md,out+plen,SHA_DIGEST_LENGTH); | 234 | SHA1_Update(&key->md, out + plen, SHA_DIGEST_LENGTH); |
| 233 | SHA1_Final(out+plen,&key->md); | 235 | SHA1_Final(out + plen, &key->md); |
| 234 | 236 | ||
| 235 | /* pad the payload|hmac */ | 237 | /* pad the payload|hmac */ |
| 236 | plen += SHA_DIGEST_LENGTH; | 238 | plen += SHA_DIGEST_LENGTH; |
| 237 | for (l=len-plen-1;plen<len;plen++) out[plen]=l; | 239 | for (l = len - plen - 1; plen < len; plen++) |
| 240 | out[plen] = l; | ||
| 241 | |||
| 238 | /* encrypt HMAC|padding at once */ | 242 | /* encrypt HMAC|padding at once */ |
| 239 | aesni_cbc_encrypt(out+aes_off,out+aes_off,len-aes_off, | 243 | aesni_cbc_encrypt(out + aes_off, out + aes_off, |
| 240 | &key->ks,ctx->iv,1); | 244 | len - aes_off, &key->ks, ctx->iv, 1); |
| 241 | } else { | 245 | } else { |
| 242 | aesni_cbc_encrypt(in+aes_off,out+aes_off,len-aes_off, | 246 | aesni_cbc_encrypt(in + aes_off, out + aes_off, |
| 243 | &key->ks,ctx->iv,1); | 247 | len - aes_off, &key->ks, ctx->iv, 1); |
| 244 | } | 248 | } |
| 245 | } else { | 249 | } else { |
| 246 | union { unsigned int u[SHA_DIGEST_LENGTH/sizeof(unsigned int)]; | 250 | union { |
| 247 | unsigned char c[32+SHA_DIGEST_LENGTH]; } mac, *pmac; | 251 | unsigned int u[SHA_DIGEST_LENGTH/sizeof(unsigned int)]; |
| 252 | unsigned char c[32 + SHA_DIGEST_LENGTH]; | ||
| 253 | } mac, *pmac; | ||
| 248 | 254 | ||
| 249 | /* arrange cache line alignment */ | 255 | /* arrange cache line alignment */ |
| 250 | pmac = (void *)(((size_t)mac.c+31)&((size_t)0-32)); | 256 | pmac = (void *)(((size_t)mac.c + 31) & ((size_t)0 - 32)); |
| 251 | 257 | ||
| 252 | /* decrypt HMAC|padding at once */ | 258 | /* decrypt HMAC|padding at once */ |
| 253 | aesni_cbc_encrypt(in,out,len, | 259 | aesni_cbc_encrypt(in, out, len, &key->ks, ctx->iv, 0); |
| 254 | &key->ks,ctx->iv,0); | ||
| 255 | 260 | ||
| 256 | if (plen) { /* "TLS" mode of operation */ | 261 | if (plen) { /* "TLS" mode of operation */ |
| 257 | size_t inp_len, mask, j, i; | 262 | size_t inp_len, mask, j, i; |
| 258 | unsigned int res, maxpad, pad, bitlen; | 263 | unsigned int res, maxpad, pad, bitlen; |
| 259 | int ret = 1; | 264 | int ret = 1; |
| 260 | union { unsigned int u[SHA_LBLOCK]; | 265 | union { |
| 261 | unsigned char c[SHA_CBLOCK]; } | 266 | unsigned int u[SHA_LBLOCK]; |
| 262 | *data = (void *)key->md.data; | 267 | unsigned char c[SHA_CBLOCK]; |
| 268 | } | ||
| 269 | *data = (void *)key->md.data; | ||
| 263 | 270 | ||
| 264 | if ((key->aux.tls_aad[plen-4]<<8|key->aux.tls_aad[plen-3]) | 271 | if ((key->aux.tls_aad[plen - 4] << 8 | |
| 265 | >= TLS1_1_VERSION) | 272 | key->aux.tls_aad[plen - 3]) >= TLS1_1_VERSION) |
| 266 | iv = AES_BLOCK_SIZE; | 273 | iv = AES_BLOCK_SIZE; |
| 267 | 274 | ||
| 268 | if (len<(iv+SHA_DIGEST_LENGTH+1)) | 275 | if (len < (iv + SHA_DIGEST_LENGTH + 1)) |
| 269 | return 0; | 276 | return 0; |
| 270 | 277 | ||
| 271 | /* omit explicit iv */ | 278 | /* omit explicit iv */ |
| @@ -273,93 +280,102 @@ static int aesni_cbc_hmac_sha1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | |||
| 273 | len -= iv; | 280 | len -= iv; |
| 274 | 281 | ||
| 275 | /* figure out payload length */ | 282 | /* figure out payload length */ |
| 276 | pad = out[len-1]; | 283 | pad = out[len - 1]; |
| 277 | maxpad = len-(SHA_DIGEST_LENGTH+1); | 284 | maxpad = len - (SHA_DIGEST_LENGTH + 1); |
| 278 | maxpad |= (255-maxpad)>>(sizeof(maxpad)*8-8); | 285 | maxpad |= (255 - maxpad) >> (sizeof(maxpad) * 8 - 8); |
| 279 | maxpad &= 255; | 286 | maxpad &= 255; |
| 280 | 287 | ||
| 281 | inp_len = len - (SHA_DIGEST_LENGTH+pad+1); | 288 | inp_len = len - (SHA_DIGEST_LENGTH + pad + 1); |
| 282 | mask = (0-((inp_len-len)>>(sizeof(inp_len)*8-1))); | 289 | mask = (0 - ((inp_len - len) >> |
| 290 | (sizeof(inp_len) * 8 - 1))); | ||
| 283 | inp_len &= mask; | 291 | inp_len &= mask; |
| 284 | ret &= (int)mask; | 292 | ret &= (int)mask; |
| 285 | 293 | ||
| 286 | key->aux.tls_aad[plen-2] = inp_len>>8; | 294 | key->aux.tls_aad[plen - 2] = inp_len >> 8; |
| 287 | key->aux.tls_aad[plen-1] = inp_len; | 295 | key->aux.tls_aad[plen - 1] = inp_len; |
| 288 | 296 | ||
| 289 | /* calculate HMAC */ | 297 | /* calculate HMAC */ |
| 290 | key->md = key->head; | 298 | key->md = key->head; |
| 291 | SHA1_Update(&key->md,key->aux.tls_aad,plen); | 299 | SHA1_Update(&key->md, key->aux.tls_aad, plen); |
| 292 | 300 | ||
| 293 | #if 1 | 301 | #if 1 |
| 294 | len -= SHA_DIGEST_LENGTH; /* amend mac */ | 302 | len -= SHA_DIGEST_LENGTH; /* amend mac */ |
| 295 | if (len>=(256+SHA_CBLOCK)) { | 303 | if (len >= (256 + SHA_CBLOCK)) { |
| 296 | j = (len-(256+SHA_CBLOCK))&(0-SHA_CBLOCK); | 304 | j = (len - (256 + SHA_CBLOCK)) & |
| 297 | j += SHA_CBLOCK-key->md.num; | 305 | (0 - SHA_CBLOCK); |
| 298 | SHA1_Update(&key->md,out,j); | 306 | j += SHA_CBLOCK - key->md.num; |
| 307 | SHA1_Update(&key->md, out, j); | ||
| 299 | out += j; | 308 | out += j; |
| 300 | len -= j; | 309 | len -= j; |
| 301 | inp_len -= j; | 310 | inp_len -= j; |
| 302 | } | 311 | } |
| 303 | 312 | ||
| 304 | /* but pretend as if we hashed padded payload */ | 313 | /* but pretend as if we hashed padded payload */ |
| 305 | bitlen = key->md.Nl+(inp_len<<3); /* at most 18 bits */ | 314 | bitlen = key->md.Nl + (inp_len << 3); /* at most 18 bits */ |
| 306 | #ifdef BSWAP | 315 | #ifdef BSWAP |
| 307 | bitlen = BSWAP(bitlen); | 316 | bitlen = BSWAP(bitlen); |
| 308 | #else | 317 | #else |
| 309 | mac.c[0] = 0; | 318 | mac.c[0] = 0; |
| 310 | mac.c[1] = (unsigned char)(bitlen>>16); | 319 | mac.c[1] = (unsigned char)(bitlen >> 16); |
| 311 | mac.c[2] = (unsigned char)(bitlen>>8); | 320 | mac.c[2] = (unsigned char)(bitlen >> 8); |
| 312 | mac.c[3] = (unsigned char)bitlen; | 321 | mac.c[3] = (unsigned char)bitlen; |
| 313 | bitlen = mac.u[0]; | 322 | bitlen = mac.u[0]; |
| 314 | #endif | 323 | #endif |
| 315 | 324 | ||
| 316 | pmac->u[0]=0; | 325 | pmac->u[0] = 0; |
| 317 | pmac->u[1]=0; | 326 | pmac->u[1] = 0; |
| 318 | pmac->u[2]=0; | 327 | pmac->u[2] = 0; |
| 319 | pmac->u[3]=0; | 328 | pmac->u[3] = 0; |
| 320 | pmac->u[4]=0; | 329 | pmac->u[4] = 0; |
| 321 | 330 | ||
| 322 | for (res=key->md.num, j=0;j<len;j++) { | 331 | for (res = key->md.num, j = 0; j < len; j++) { |
| 323 | size_t c = out[j]; | 332 | size_t c = out[j]; |
| 324 | mask = (j-inp_len)>>(sizeof(j)*8-8); | 333 | mask = (j - inp_len) >> (sizeof(j) * 8 - 8); |
| 325 | c &= mask; | 334 | c &= mask; |
| 326 | c |= 0x80&~mask&~((inp_len-j)>>(sizeof(j)*8-8)); | 335 | c |= 0x80 & ~mask & |
| 327 | data->c[res++]=(unsigned char)c; | 336 | ~((inp_len - j) >> (sizeof(j) * 8 - 8)); |
| 337 | data->c[res++] = (unsigned char)c; | ||
| 328 | 338 | ||
| 329 | if (res!=SHA_CBLOCK) continue; | 339 | if (res != SHA_CBLOCK) |
| 340 | continue; | ||
| 330 | 341 | ||
| 331 | /* j is not incremented yet */ | 342 | /* j is not incremented yet */ |
| 332 | mask = 0-((inp_len+7-j)>>(sizeof(j)*8-1)); | 343 | mask = 0 - ((inp_len + 7 - j) >> |
| 333 | data->u[SHA_LBLOCK-1] |= bitlen&mask; | 344 | (sizeof(j) * 8 - 1)); |
| 334 | sha1_block_data_order(&key->md,data,1); | 345 | data->u[SHA_LBLOCK - 1] |= bitlen&mask; |
| 335 | mask &= 0-((j-inp_len-72)>>(sizeof(j)*8-1)); | 346 | sha1_block_data_order(&key->md, data, 1); |
| 347 | mask &= 0 - ((j - inp_len - 72) >> | ||
| 348 | (sizeof(j) * 8 - 1)); | ||
| 336 | pmac->u[0] |= key->md.h0 & mask; | 349 | pmac->u[0] |= key->md.h0 & mask; |
| 337 | pmac->u[1] |= key->md.h1 & mask; | 350 | pmac->u[1] |= key->md.h1 & mask; |
| 338 | pmac->u[2] |= key->md.h2 & mask; | 351 | pmac->u[2] |= key->md.h2 & mask; |
| 339 | pmac->u[3] |= key->md.h3 & mask; | 352 | pmac->u[3] |= key->md.h3 & mask; |
| 340 | pmac->u[4] |= key->md.h4 & mask; | 353 | pmac->u[4] |= key->md.h4 & mask; |
| 341 | res=0; | 354 | res = 0; |
| 342 | } | 355 | } |
| 343 | 356 | ||
| 344 | for(i=res;i<SHA_CBLOCK;i++,j++) data->c[i]=0; | 357 | for (i = res; i < SHA_CBLOCK; i++, j++) |
| 358 | data->c[i] = 0; | ||
| 345 | 359 | ||
| 346 | if (res>SHA_CBLOCK-8) { | 360 | if (res > SHA_CBLOCK - 8) { |
| 347 | mask = 0-((inp_len+8-j)>>(sizeof(j)*8-1)); | 361 | mask = 0 - ((inp_len + 8 - j) >> |
| 348 | data->u[SHA_LBLOCK-1] |= bitlen&mask; | 362 | (sizeof(j) * 8 - 1)); |
| 349 | sha1_block_data_order(&key->md,data,1); | 363 | data->u[SHA_LBLOCK - 1] |= bitlen & mask; |
| 350 | mask &= 0-((j-inp_len-73)>>(sizeof(j)*8-1)); | 364 | sha1_block_data_order(&key->md, data, 1); |
| 365 | mask &= 0 - ((j - inp_len - 73) >> | ||
| 366 | (sizeof(j) * 8 - 1)); | ||
| 351 | pmac->u[0] |= key->md.h0 & mask; | 367 | pmac->u[0] |= key->md.h0 & mask; |
| 352 | pmac->u[1] |= key->md.h1 & mask; | 368 | pmac->u[1] |= key->md.h1 & mask; |
| 353 | pmac->u[2] |= key->md.h2 & mask; | 369 | pmac->u[2] |= key->md.h2 & mask; |
| 354 | pmac->u[3] |= key->md.h3 & mask; | 370 | pmac->u[3] |= key->md.h3 & mask; |
| 355 | pmac->u[4] |= key->md.h4 & mask; | 371 | pmac->u[4] |= key->md.h4 & mask; |
| 356 | 372 | ||
| 357 | memset(data,0,SHA_CBLOCK); | 373 | memset(data, 0, SHA_CBLOCK); |
| 358 | j+=64; | 374 | j += 64; |
| 359 | } | 375 | } |
| 360 | data->u[SHA_LBLOCK-1] = bitlen; | 376 | data->u[SHA_LBLOCK - 1] = bitlen; |
| 361 | sha1_block_data_order(&key->md,data,1); | 377 | sha1_block_data_order(&key->md, data, 1); |
| 362 | mask = 0-((j-inp_len-73)>>(sizeof(j)*8-1)); | 378 | mask = 0 - ((j - inp_len - 73) >> (sizeof(j) * 8 - 1)); |
| 363 | pmac->u[0] |= key->md.h0 & mask; | 379 | pmac->u[0] |= key->md.h0 & mask; |
| 364 | pmac->u[1] |= key->md.h1 & mask; | 380 | pmac->u[1] |= key->md.h1 & mask; |
| 365 | pmac->u[2] |= key->md.h2 & mask; | 381 | pmac->u[2] |= key->md.h2 & mask; |
| @@ -373,209 +389,218 @@ static int aesni_cbc_hmac_sha1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | |||
| 373 | pmac->u[3] = BSWAP(pmac->u[3]); | 389 | pmac->u[3] = BSWAP(pmac->u[3]); |
| 374 | pmac->u[4] = BSWAP(pmac->u[4]); | 390 | pmac->u[4] = BSWAP(pmac->u[4]); |
| 375 | #else | 391 | #else |
| 376 | for (i=0;i<5;i++) { | 392 | for (i = 0; i < 5; i++) { |
| 377 | res = pmac->u[i]; | 393 | res = pmac->u[i]; |
| 378 | pmac->c[4*i+0]=(unsigned char)(res>>24); | 394 | pmac->c[4 * i + 0] = (unsigned char)(res >> 24); |
| 379 | pmac->c[4*i+1]=(unsigned char)(res>>16); | 395 | pmac->c[4 * i + 1] = (unsigned char)(res >> 16); |
| 380 | pmac->c[4*i+2]=(unsigned char)(res>>8); | 396 | pmac->c[4 * i + 2] = (unsigned char)(res >> 8); |
| 381 | pmac->c[4*i+3]=(unsigned char)res; | 397 | pmac->c[4 * i + 3] = (unsigned char)res; |
| 382 | } | 398 | } |
| 383 | #endif | 399 | #endif |
| 384 | len += SHA_DIGEST_LENGTH; | 400 | len += SHA_DIGEST_LENGTH; |
| 385 | #else | 401 | #else |
| 386 | SHA1_Update(&key->md,out,inp_len); | 402 | SHA1_Update(&key->md, out, inp_len); |
| 387 | res = key->md.num; | 403 | res = key->md.num; |
| 388 | SHA1_Final(pmac->c,&key->md); | 404 | SHA1_Final(pmac->c, &key->md); |
| 389 | 405 | ||
| 390 | { | 406 | { |
| 391 | unsigned int inp_blocks, pad_blocks; | 407 | unsigned int inp_blocks, pad_blocks; |
| 392 | 408 | ||
| 393 | /* but pretend as if we hashed padded payload */ | 409 | /* but pretend as if we hashed padded payload */ |
| 394 | inp_blocks = 1+((SHA_CBLOCK-9-res)>>(sizeof(res)*8-1)); | 410 | inp_blocks = 1 + ((SHA_CBLOCK - 9 - res) >> |
| 395 | res += (unsigned int)(len-inp_len); | 411 | (sizeof(res) * 8 - 1)); |
| 396 | pad_blocks = res / SHA_CBLOCK; | 412 | res += (unsigned int)(len - inp_len); |
| 397 | res %= SHA_CBLOCK; | 413 | pad_blocks = res / SHA_CBLOCK; |
| 398 | pad_blocks += 1+((SHA_CBLOCK-9-res)>>(sizeof(res)*8-1)); | 414 | res %= SHA_CBLOCK; |
| 399 | for (;inp_blocks<pad_blocks;inp_blocks++) | 415 | pad_blocks += 1 + ((SHA_CBLOCK - 9 - res) >> |
| 400 | sha1_block_data_order(&key->md,data,1); | 416 | (sizeof(res) * 8 - 1)); |
| 417 | for (; inp_blocks < pad_blocks; inp_blocks++) | ||
| 418 | sha1_block_data_order(&key->md, | ||
| 419 | data, 1); | ||
| 401 | } | 420 | } |
| 402 | #endif | 421 | #endif |
| 403 | key->md = key->tail; | 422 | key->md = key->tail; |
| 404 | SHA1_Update(&key->md,pmac->c,SHA_DIGEST_LENGTH); | 423 | SHA1_Update(&key->md, pmac->c, SHA_DIGEST_LENGTH); |
| 405 | SHA1_Final(pmac->c,&key->md); | 424 | SHA1_Final(pmac->c, &key->md); |
| 406 | 425 | ||
| 407 | /* verify HMAC */ | 426 | /* verify HMAC */ |
| 408 | out += inp_len; | 427 | out += inp_len; |
| 409 | len -= inp_len; | 428 | len -= inp_len; |
| 410 | #if 1 | 429 | #if 1 |
| 411 | { | 430 | { |
| 412 | unsigned char *p = out+len-1-maxpad-SHA_DIGEST_LENGTH; | 431 | unsigned char *p = |
| 413 | size_t off = out-p; | 432 | out + len - 1 - maxpad - SHA_DIGEST_LENGTH; |
| 414 | unsigned int c, cmask; | 433 | size_t off = out - p; |
| 415 | 434 | unsigned int c, cmask; | |
| 416 | maxpad += SHA_DIGEST_LENGTH; | 435 | |
| 417 | for (res=0,i=0,j=0;j<maxpad;j++) { | 436 | maxpad += SHA_DIGEST_LENGTH; |
| 418 | c = p[j]; | 437 | for (res = 0, i = 0, j = 0; j < maxpad; j++) { |
| 419 | cmask = ((int)(j-off-SHA_DIGEST_LENGTH))>>(sizeof(int)*8-1); | 438 | c = p[j]; |
| 420 | res |= (c^pad)&~cmask; /* ... and padding */ | 439 | cmask = ((int)(j - off - |
| 421 | cmask &= ((int)(off-1-j))>>(sizeof(int)*8-1); | 440 | SHA_DIGEST_LENGTH)) >> |
| 422 | res |= (c^pmac->c[i])&cmask; | 441 | (sizeof(int) * 8 - 1); |
| 423 | i += 1&cmask; | 442 | res |= (c ^ pad) & ~cmask; /* ... and padding */ |
| 424 | } | 443 | cmask &= ((int)(off - 1 - j)) >> |
| 425 | maxpad -= SHA_DIGEST_LENGTH; | 444 | (sizeof(int) * 8 - 1); |
| 426 | 445 | res |= (c ^ pmac->c[i]) & cmask; | |
| 427 | res = 0-((0-res)>>(sizeof(res)*8-1)); | 446 | i += 1 & cmask; |
| 428 | ret &= (int)~res; | 447 | } |
| 448 | maxpad -= SHA_DIGEST_LENGTH; | ||
| 449 | |||
| 450 | res = 0 - ((0 - res) >> (sizeof(res) * 8 - 1)); | ||
| 451 | ret &= (int)~res; | ||
| 429 | } | 452 | } |
| 430 | #else | 453 | #else |
| 431 | for (res=0,i=0;i<SHA_DIGEST_LENGTH;i++) | 454 | for (res = 0, i = 0; i < SHA_DIGEST_LENGTH; i++) |
| 432 | res |= out[i]^pmac->c[i]; | 455 | res |= out[i] ^ pmac->c[i]; |
| 433 | res = 0-((0-res)>>(sizeof(res)*8-1)); | 456 | res = 0 - ((0 - res) >> (sizeof(res) * 8 - 1)); |
| 434 | ret &= (int)~res; | 457 | ret &= (int)~res; |
| 435 | 458 | ||
| 436 | /* verify padding */ | 459 | /* verify padding */ |
| 437 | pad = (pad&~res) | (maxpad&res); | 460 | pad = (pad & ~res) | (maxpad & res); |
| 438 | out = out+len-1-pad; | 461 | out = out + len - 1 - pad; |
| 439 | for (res=0,i=0;i<pad;i++) | 462 | for (res = 0, i = 0; i < pad; i++) |
| 440 | res |= out[i]^pad; | 463 | res |= out[i] ^ pad; |
| 441 | 464 | ||
| 442 | res = (0-res)>>(sizeof(res)*8-1); | 465 | res = (0 - res) >> (sizeof(res) * 8 - 1); |
| 443 | ret &= (int)~res; | 466 | ret &= (int)~res; |
| 444 | #endif | 467 | #endif |
| 445 | return ret; | 468 | return ret; |
| 446 | } else { | 469 | } else { |
| 447 | SHA1_Update(&key->md,out,len); | 470 | SHA1_Update(&key->md, out, len); |
| 448 | } | 471 | } |
| 449 | } | 472 | } |
| 450 | 473 | ||
| 451 | return 1; | 474 | return 1; |
| 452 | } | 475 | } |
| 453 | 476 | ||
| 454 | static int aesni_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | 477 | static int |
| 455 | { | 478 | aesni_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) |
| 479 | { | ||
| 456 | EVP_AES_HMAC_SHA1 *key = data(ctx); | 480 | EVP_AES_HMAC_SHA1 *key = data(ctx); |
| 457 | 481 | ||
| 458 | switch (type) | 482 | switch (type) { |
| 459 | { | ||
| 460 | case EVP_CTRL_AEAD_SET_MAC_KEY: | 483 | case EVP_CTRL_AEAD_SET_MAC_KEY: |
| 461 | { | 484 | { |
| 462 | unsigned int i; | 485 | unsigned int i; |
| 463 | unsigned char hmac_key[64]; | 486 | unsigned char hmac_key[64]; |
| 464 | 487 | ||
| 465 | memset (hmac_key,0,sizeof(hmac_key)); | 488 | memset (hmac_key, 0, sizeof(hmac_key)); |
| 466 | 489 | ||
| 467 | if (arg > (int)sizeof(hmac_key)) { | 490 | if (arg > (int)sizeof(hmac_key)) { |
| 468 | SHA1_Init(&key->head); | 491 | SHA1_Init(&key->head); |
| 469 | SHA1_Update(&key->head,ptr,arg); | 492 | SHA1_Update(&key->head, ptr, arg); |
| 470 | SHA1_Final(hmac_key,&key->head); | 493 | SHA1_Final(hmac_key, &key->head); |
| 471 | } else { | 494 | } else { |
| 472 | memcpy(hmac_key,ptr,arg); | 495 | memcpy(hmac_key, ptr, arg); |
| 473 | } | 496 | } |
| 474 | 497 | ||
| 475 | for (i=0;i<sizeof(hmac_key);i++) | 498 | for (i = 0; i < sizeof(hmac_key); i++) |
| 476 | hmac_key[i] ^= 0x36; /* ipad */ | 499 | hmac_key[i] ^= 0x36; /* ipad */ |
| 477 | SHA1_Init(&key->head); | 500 | SHA1_Init(&key->head); |
| 478 | SHA1_Update(&key->head,hmac_key,sizeof(hmac_key)); | 501 | SHA1_Update(&key->head, hmac_key, sizeof(hmac_key)); |
| 479 | 502 | ||
| 480 | for (i=0;i<sizeof(hmac_key);i++) | 503 | for (i = 0; i < sizeof(hmac_key); i++) |
| 481 | hmac_key[i] ^= 0x36^0x5c; /* opad */ | 504 | hmac_key[i] ^= 0x36 ^ 0x5c; /* opad */ |
| 482 | SHA1_Init(&key->tail); | 505 | SHA1_Init(&key->tail); |
| 483 | SHA1_Update(&key->tail,hmac_key,sizeof(hmac_key)); | 506 | SHA1_Update(&key->tail, hmac_key, sizeof(hmac_key)); |
| 484 | 507 | ||
| 485 | OPENSSL_cleanse(hmac_key,sizeof(hmac_key)); | 508 | OPENSSL_cleanse(hmac_key, sizeof(hmac_key)); |
| 486 | 509 | ||
| 487 | return 1; | 510 | return 1; |
| 488 | } | 511 | } |
| 489 | case EVP_CTRL_AEAD_TLS1_AAD: | 512 | case EVP_CTRL_AEAD_TLS1_AAD: |
| 490 | { | 513 | { |
| 491 | unsigned char *p=ptr; | 514 | unsigned char *p = ptr; |
| 492 | unsigned int len=p[arg-2]<<8|p[arg-1]; | 515 | unsigned int len = p[arg - 2] << 8 | p[arg - 1]; |
| 493 | 516 | ||
| 494 | if (ctx->encrypt) | 517 | if (ctx->encrypt) { |
| 495 | { | 518 | key->payload_length = len; |
| 496 | key->payload_length = len; | 519 | if ((key->aux.tls_ver = p[arg - 4] << 8 | |
| 497 | if ((key->aux.tls_ver=p[arg-4]<<8|p[arg-3]) >= TLS1_1_VERSION) { | 520 | p[arg - 3]) >= TLS1_1_VERSION) { |
| 498 | len -= AES_BLOCK_SIZE; | 521 | len -= AES_BLOCK_SIZE; |
| 499 | p[arg-2] = len>>8; | 522 | p[arg - 2] = len >> 8; |
| 500 | p[arg-1] = len; | 523 | p[arg - 1] = len; |
| 501 | } | 524 | } |
| 502 | key->md = key->head; | 525 | key->md = key->head; |
| 503 | SHA1_Update(&key->md,p,arg); | 526 | SHA1_Update(&key->md, p, arg); |
| 504 | 527 | ||
| 505 | return (int)(((len+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE) | 528 | return (int)(((len + SHA_DIGEST_LENGTH + |
| 506 | - len); | 529 | AES_BLOCK_SIZE) & -AES_BLOCK_SIZE) - len); |
| 507 | } | 530 | } else { |
| 508 | else | 531 | if (arg > 13) |
| 509 | { | 532 | arg = 13; |
| 510 | if (arg>13) arg = 13; | 533 | memcpy(key->aux.tls_aad, ptr, arg); |
| 511 | memcpy(key->aux.tls_aad,ptr,arg); | 534 | key->payload_length = arg; |
| 512 | key->payload_length = arg; | 535 | |
| 513 | 536 | return SHA_DIGEST_LENGTH; | |
| 514 | return SHA_DIGEST_LENGTH; | ||
| 515 | } | 537 | } |
| 516 | } | 538 | } |
| 517 | default: | 539 | default: |
| 518 | return -1; | 540 | return -1; |
| 519 | } | ||
| 520 | } | 541 | } |
| 542 | } | ||
| 521 | 543 | ||
| 522 | static EVP_CIPHER aesni_128_cbc_hmac_sha1_cipher = | 544 | static EVP_CIPHER aesni_128_cbc_hmac_sha1_cipher = { |
| 523 | { | ||
| 524 | #ifdef NID_aes_128_cbc_hmac_sha1 | 545 | #ifdef NID_aes_128_cbc_hmac_sha1 |
| 525 | NID_aes_128_cbc_hmac_sha1, | 546 | NID_aes_128_cbc_hmac_sha1, |
| 526 | #else | 547 | #else |
| 527 | NID_undef, | 548 | NID_undef, |
| 528 | #endif | 549 | #endif |
| 529 | 16,16,16, | 550 | 16, 16, 16, |
| 530 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, | 551 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, |
| 531 | aesni_cbc_hmac_sha1_init_key, | 552 | aesni_cbc_hmac_sha1_init_key, |
| 532 | aesni_cbc_hmac_sha1_cipher, | 553 | aesni_cbc_hmac_sha1_cipher, |
| 533 | NULL, | 554 | NULL, |
| 534 | sizeof(EVP_AES_HMAC_SHA1), | 555 | sizeof(EVP_AES_HMAC_SHA1), |
| 535 | EVP_CIPH_FLAG_DEFAULT_ASN1?NULL:EVP_CIPHER_set_asn1_iv, | 556 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_set_asn1_iv, |
| 536 | EVP_CIPH_FLAG_DEFAULT_ASN1?NULL:EVP_CIPHER_get_asn1_iv, | 557 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_get_asn1_iv, |
| 537 | aesni_cbc_hmac_sha1_ctrl, | 558 | aesni_cbc_hmac_sha1_ctrl, |
| 538 | NULL | 559 | NULL |
| 539 | }; | 560 | }; |
| 540 | 561 | ||
| 541 | static EVP_CIPHER aesni_256_cbc_hmac_sha1_cipher = | 562 | static EVP_CIPHER aesni_256_cbc_hmac_sha1_cipher = { |
| 542 | { | ||
| 543 | #ifdef NID_aes_256_cbc_hmac_sha1 | 563 | #ifdef NID_aes_256_cbc_hmac_sha1 |
| 544 | NID_aes_256_cbc_hmac_sha1, | 564 | NID_aes_256_cbc_hmac_sha1, |
| 545 | #else | 565 | #else |
| 546 | NID_undef, | 566 | NID_undef, |
| 547 | #endif | 567 | #endif |
| 548 | 16,32,16, | 568 | 16, 32, 16, |
| 549 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, | 569 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, |
| 550 | aesni_cbc_hmac_sha1_init_key, | 570 | aesni_cbc_hmac_sha1_init_key, |
| 551 | aesni_cbc_hmac_sha1_cipher, | 571 | aesni_cbc_hmac_sha1_cipher, |
| 552 | NULL, | 572 | NULL, |
| 553 | sizeof(EVP_AES_HMAC_SHA1), | 573 | sizeof(EVP_AES_HMAC_SHA1), |
| 554 | EVP_CIPH_FLAG_DEFAULT_ASN1?NULL:EVP_CIPHER_set_asn1_iv, | 574 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_set_asn1_iv, |
| 555 | EVP_CIPH_FLAG_DEFAULT_ASN1?NULL:EVP_CIPHER_get_asn1_iv, | 575 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_get_asn1_iv, |
| 556 | aesni_cbc_hmac_sha1_ctrl, | 576 | aesni_cbc_hmac_sha1_ctrl, |
| 557 | NULL | 577 | NULL |
| 558 | }; | 578 | }; |
| 559 | 579 | ||
| 560 | const EVP_CIPHER *EVP_aes_128_cbc_hmac_sha1(void) | 580 | const EVP_CIPHER * |
| 561 | { | 581 | EVP_aes_128_cbc_hmac_sha1(void) |
| 562 | return(OPENSSL_ia32cap_P[1]&AESNI_CAPABLE? | 582 | { |
| 563 | &aesni_128_cbc_hmac_sha1_cipher:NULL); | 583 | return(OPENSSL_ia32cap_P[1] & AESNI_CAPABLE? |
| 564 | } | 584 | &aesni_128_cbc_hmac_sha1_cipher : NULL); |
| 585 | } | ||
| 565 | 586 | ||
| 566 | const EVP_CIPHER *EVP_aes_256_cbc_hmac_sha1(void) | 587 | const EVP_CIPHER * |
| 567 | { | 588 | EVP_aes_256_cbc_hmac_sha1(void) |
| 568 | return(OPENSSL_ia32cap_P[1]&AESNI_CAPABLE? | 589 | { |
| 569 | &aesni_256_cbc_hmac_sha1_cipher:NULL); | 590 | return(OPENSSL_ia32cap_P[1] & AESNI_CAPABLE? |
| 570 | } | 591 | &aesni_256_cbc_hmac_sha1_cipher : NULL); |
| 592 | } | ||
| 571 | #else | 593 | #else |
| 572 | const EVP_CIPHER *EVP_aes_128_cbc_hmac_sha1(void) | 594 | const EVP_CIPHER * |
| 573 | { | 595 | EVP_aes_128_cbc_hmac_sha1(void) |
| 574 | return NULL; | 596 | { |
| 575 | } | ||
| 576 | const EVP_CIPHER *EVP_aes_256_cbc_hmac_sha1(void) | ||
| 577 | { | ||
| 578 | return NULL; | 597 | return NULL; |
| 579 | } | 598 | } |
| 599 | |||
| 600 | const EVP_CIPHER * | ||
| 601 | EVP_aes_256_cbc_hmac_sha1(void) | ||
| 602 | { | ||
| 603 | return NULL; | ||
| 604 | } | ||
| 580 | #endif | 605 | #endif |
| 581 | #endif | 606 | #endif |
diff --git a/src/lib/libcrypto/evp/e_bf.c b/src/lib/libcrypto/evp/e_bf.c index cc224e5363..62194767c8 100644 --- a/src/lib/libcrypto/evp/e_bf.c +++ b/src/lib/libcrypto/evp/e_bf.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -65,24 +65,23 @@ | |||
| 65 | #include <openssl/blowfish.h> | 65 | #include <openssl/blowfish.h> |
| 66 | 66 | ||
| 67 | static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 67 | static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 68 | const unsigned char *iv, int enc); | 68 | const unsigned char *iv, int enc); |
| 69 | 69 | ||
| 70 | typedef struct | 70 | typedef struct { |
| 71 | { | ||
| 72 | BF_KEY ks; | 71 | BF_KEY ks; |
| 73 | } EVP_BF_KEY; | 72 | } EVP_BF_KEY; |
| 74 | 73 | ||
| 75 | #define data(ctx) EVP_C_DATA(EVP_BF_KEY,ctx) | 74 | #define data(ctx) EVP_C_DATA(EVP_BF_KEY,ctx) |
| 76 | 75 | ||
| 77 | IMPLEMENT_BLOCK_CIPHER(bf, ks, BF, EVP_BF_KEY, NID_bf, 8, 16, 8, 64, | 76 | IMPLEMENT_BLOCK_CIPHER(bf, ks, BF, EVP_BF_KEY, NID_bf, 8, 16, 8, 64, |
| 78 | EVP_CIPH_VARIABLE_LENGTH, bf_init_key, NULL, | 77 | EVP_CIPH_VARIABLE_LENGTH, bf_init_key, NULL, |
| 79 | EVP_CIPHER_set_asn1_iv, EVP_CIPHER_get_asn1_iv, NULL) | 78 | EVP_CIPHER_set_asn1_iv, EVP_CIPHER_get_asn1_iv, NULL) |
| 80 | |||
| 81 | static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
| 82 | const unsigned char *iv, int enc) | ||
| 83 | { | ||
| 84 | BF_set_key(&data(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx),key); | ||
| 85 | return 1; | ||
| 86 | } | ||
| 87 | 79 | ||
| 80 | static int | ||
| 81 | bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
| 82 | const unsigned char *iv, int enc) | ||
| 83 | { | ||
| 84 | BF_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx), key); | ||
| 85 | return 1; | ||
| 86 | } | ||
| 88 | #endif | 87 | #endif |
diff --git a/src/lib/libcrypto/evp/e_camellia.c b/src/lib/libcrypto/evp/e_camellia.c index 8bb7c320d3..377d121b89 100644 --- a/src/lib/libcrypto/evp/e_camellia.c +++ b/src/lib/libcrypto/evp/e_camellia.c | |||
| @@ -7,7 +7,7 @@ | |||
| 7 | * are met: | 7 | * are met: |
| 8 | * | 8 | * |
| 9 | * 1. Redistributions of source code must retain the above copyright | 9 | * 1. Redistributions of source code must retain the above copyright |
| 10 | * notice, this list of conditions and the following disclaimer. | 10 | * notice, this list of conditions and the following disclaimer. |
| 11 | * | 11 | * |
| 12 | * 2. Redistributions in binary form must reproduce the above copyright | 12 | * 2. Redistributions in binary form must reproduce the above copyright |
| 13 | * notice, this list of conditions and the following disclaimer in | 13 | * notice, this list of conditions and the following disclaimer in |
| @@ -63,63 +63,61 @@ | |||
| 63 | #include "evp_locl.h" | 63 | #include "evp_locl.h" |
| 64 | 64 | ||
| 65 | static int camellia_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 65 | static int camellia_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 66 | const unsigned char *iv, int enc); | 66 | const unsigned char *iv, int enc); |
| 67 | 67 | ||
| 68 | /* Camellia subkey Structure */ | 68 | /* Camellia subkey Structure */ |
| 69 | typedef struct | 69 | typedef struct { |
| 70 | { | ||
| 71 | CAMELLIA_KEY ks; | 70 | CAMELLIA_KEY ks; |
| 72 | } EVP_CAMELLIA_KEY; | 71 | } EVP_CAMELLIA_KEY; |
| 73 | 72 | ||
| 74 | /* Attribute operation for Camellia */ | 73 | /* Attribute operation for Camellia */ |
| 75 | #define data(ctx) EVP_C_DATA(EVP_CAMELLIA_KEY,ctx) | 74 | #define data(ctx) EVP_C_DATA(EVP_CAMELLIA_KEY,ctx) |
| 76 | 75 | ||
| 77 | IMPLEMENT_BLOCK_CIPHER(camellia_128, ks, Camellia, EVP_CAMELLIA_KEY, | 76 | IMPLEMENT_BLOCK_CIPHER(camellia_128, ks, Camellia, EVP_CAMELLIA_KEY, |
| 78 | NID_camellia_128, 16, 16, 16, 128, | 77 | NID_camellia_128, 16, 16, 16, 128, |
| 79 | 0, camellia_init_key, NULL, | 78 | 0, camellia_init_key, NULL, |
| 80 | EVP_CIPHER_set_asn1_iv, | 79 | EVP_CIPHER_set_asn1_iv, |
| 81 | EVP_CIPHER_get_asn1_iv, | 80 | EVP_CIPHER_get_asn1_iv, |
| 82 | NULL) | 81 | NULL) |
| 83 | IMPLEMENT_BLOCK_CIPHER(camellia_192, ks, Camellia, EVP_CAMELLIA_KEY, | 82 | IMPLEMENT_BLOCK_CIPHER(camellia_192, ks, Camellia, EVP_CAMELLIA_KEY, |
| 84 | NID_camellia_192, 16, 24, 16, 128, | 83 | NID_camellia_192, 16, 24, 16, 128, |
| 85 | 0, camellia_init_key, NULL, | 84 | 0, camellia_init_key, NULL, |
| 86 | EVP_CIPHER_set_asn1_iv, | 85 | EVP_CIPHER_set_asn1_iv, |
| 87 | EVP_CIPHER_get_asn1_iv, | 86 | EVP_CIPHER_get_asn1_iv, |
| 88 | NULL) | 87 | NULL) |
| 89 | IMPLEMENT_BLOCK_CIPHER(camellia_256, ks, Camellia, EVP_CAMELLIA_KEY, | 88 | IMPLEMENT_BLOCK_CIPHER(camellia_256, ks, Camellia, EVP_CAMELLIA_KEY, |
| 90 | NID_camellia_256, 16, 32, 16, 128, | 89 | NID_camellia_256, 16, 32, 16, 128, |
| 91 | 0, camellia_init_key, NULL, | 90 | 0, camellia_init_key, NULL, |
| 92 | EVP_CIPHER_set_asn1_iv, | 91 | EVP_CIPHER_set_asn1_iv, |
| 93 | EVP_CIPHER_get_asn1_iv, | 92 | EVP_CIPHER_get_asn1_iv, |
| 94 | NULL) | 93 | NULL) |
| 95 | 94 | ||
| 96 | #define IMPLEMENT_CAMELLIA_CFBR(ksize,cbits) IMPLEMENT_CFBR(camellia,Camellia,EVP_CAMELLIA_KEY,ks,ksize,cbits,16) | 95 | #define IMPLEMENT_CAMELLIA_CFBR(ksize,cbits) IMPLEMENT_CFBR(camellia,Camellia,EVP_CAMELLIA_KEY,ks,ksize,cbits,16) |
| 97 | 96 | ||
| 98 | IMPLEMENT_CAMELLIA_CFBR(128,1) | 97 | IMPLEMENT_CAMELLIA_CFBR(128, 1) |
| 99 | IMPLEMENT_CAMELLIA_CFBR(192,1) | 98 | IMPLEMENT_CAMELLIA_CFBR(192, 1) |
| 100 | IMPLEMENT_CAMELLIA_CFBR(256,1) | 99 | IMPLEMENT_CAMELLIA_CFBR(256, 1) |
| 101 | 100 | ||
| 102 | IMPLEMENT_CAMELLIA_CFBR(128,8) | 101 | IMPLEMENT_CAMELLIA_CFBR(128, 8) |
| 103 | IMPLEMENT_CAMELLIA_CFBR(192,8) | 102 | IMPLEMENT_CAMELLIA_CFBR(192, 8) |
| 104 | IMPLEMENT_CAMELLIA_CFBR(256,8) | 103 | IMPLEMENT_CAMELLIA_CFBR(256, 8) |
| 105 | 104 | ||
| 106 | 105 | ||
| 107 | 106 | /* The subkey for Camellia is generated. */ | |
| 108 | /* The subkey for Camellia is generated. */ | 107 | static int |
| 109 | static int camellia_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 108 | camellia_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 110 | const unsigned char *iv, int enc) | 109 | const unsigned char *iv, int enc) |
| 111 | { | 110 | { |
| 112 | int ret; | 111 | int ret; |
| 113 | 112 | ||
| 114 | ret=Camellia_set_key(key, ctx->key_len * 8, ctx->cipher_data); | 113 | ret = Camellia_set_key(key, ctx->key_len * 8, ctx->cipher_data); |
| 115 | 114 | ||
| 116 | if(ret < 0) | 115 | if (ret < 0) { |
| 117 | { | 116 | EVPerr(EVP_F_CAMELLIA_INIT_KEY, |
| 118 | EVPerr(EVP_F_CAMELLIA_INIT_KEY,EVP_R_CAMELLIA_KEY_SETUP_FAILED); | 117 | EVP_R_CAMELLIA_KEY_SETUP_FAILED); |
| 119 | return 0; | 118 | return 0; |
| 120 | } | ||
| 121 | |||
| 122 | return 1; | ||
| 123 | } | 119 | } |
| 124 | 120 | ||
| 121 | return 1; | ||
| 122 | } | ||
| 125 | #endif | 123 | #endif |
diff --git a/src/lib/libcrypto/evp/e_cast.c b/src/lib/libcrypto/evp/e_cast.c index d77bcd9298..199c5bf48e 100644 --- a/src/lib/libcrypto/evp/e_cast.c +++ b/src/lib/libcrypto/evp/e_cast.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -66,25 +66,24 @@ | |||
| 66 | #include <openssl/cast.h> | 66 | #include <openssl/cast.h> |
| 67 | 67 | ||
| 68 | static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 68 | static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 69 | const unsigned char *iv,int enc); | 69 | const unsigned char *iv, int enc); |
| 70 | 70 | ||
| 71 | typedef struct | 71 | typedef struct { |
| 72 | { | ||
| 73 | CAST_KEY ks; | 72 | CAST_KEY ks; |
| 74 | } EVP_CAST_KEY; | 73 | } EVP_CAST_KEY; |
| 75 | 74 | ||
| 76 | #define data(ctx) EVP_C_DATA(EVP_CAST_KEY,ctx) | 75 | #define data(ctx) EVP_C_DATA(EVP_CAST_KEY,ctx) |
| 77 | 76 | ||
| 78 | IMPLEMENT_BLOCK_CIPHER(cast5, ks, CAST, EVP_CAST_KEY, | 77 | IMPLEMENT_BLOCK_CIPHER(cast5, ks, CAST, EVP_CAST_KEY, |
| 79 | NID_cast5, 8, CAST_KEY_LENGTH, 8, 64, | 78 | NID_cast5, 8, CAST_KEY_LENGTH, 8, 64, |
| 80 | EVP_CIPH_VARIABLE_LENGTH, cast_init_key, NULL, | 79 | EVP_CIPH_VARIABLE_LENGTH, cast_init_key, NULL, |
| 81 | EVP_CIPHER_set_asn1_iv, EVP_CIPHER_get_asn1_iv, NULL) | 80 | EVP_CIPHER_set_asn1_iv, EVP_CIPHER_get_asn1_iv, NULL) |
| 82 | |||
| 83 | static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
| 84 | const unsigned char *iv, int enc) | ||
| 85 | { | ||
| 86 | CAST_set_key(&data(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx),key); | ||
| 87 | return 1; | ||
| 88 | } | ||
| 89 | 81 | ||
| 82 | static int | ||
| 83 | cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
| 84 | const unsigned char *iv, int enc) | ||
| 85 | { | ||
| 86 | CAST_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx), key); | ||
| 87 | return 1; | ||
| 88 | } | ||
| 90 | #endif | 89 | #endif |
diff --git a/src/lib/libcrypto/evp/e_chacha.c b/src/lib/libcrypto/evp/e_chacha.c index 4a20186006..0c32b99df4 100644 --- a/src/lib/libcrypto/evp/e_chacha.c +++ b/src/lib/libcrypto/evp/e_chacha.c | |||
| @@ -41,7 +41,7 @@ static const EVP_CIPHER chacha20_cipher = { | |||
| 41 | const EVP_CIPHER * | 41 | const EVP_CIPHER * |
| 42 | EVP_chacha20(void) | 42 | EVP_chacha20(void) |
| 43 | { | 43 | { |
| 44 | return(&chacha20_cipher); | 44 | return (&chacha20_cipher); |
| 45 | } | 45 | } |
| 46 | 46 | ||
| 47 | static int | 47 | static int |
diff --git a/src/lib/libcrypto/evp/e_des.c b/src/lib/libcrypto/evp/e_des.c index ca009f2c52..ac46ba6a96 100644 --- a/src/lib/libcrypto/evp/e_des.c +++ b/src/lib/libcrypto/evp/e_des.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -66,150 +66,155 @@ | |||
| 66 | #include <openssl/rand.h> | 66 | #include <openssl/rand.h> |
| 67 | 67 | ||
| 68 | static int des_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 68 | static int des_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 69 | const unsigned char *iv, int enc); | 69 | const unsigned char *iv, int enc); |
| 70 | static int des_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr); | 70 | static int des_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr); |
| 71 | 71 | ||
| 72 | /* Because of various casts and different names can't use IMPLEMENT_BLOCK_CIPHER */ | 72 | /* Because of various casts and different names can't use IMPLEMENT_BLOCK_CIPHER */ |
| 73 | 73 | ||
| 74 | static int des_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 74 | static int |
| 75 | const unsigned char *in, size_t inl) | 75 | des_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 76 | const unsigned char *in, size_t inl) | ||
| 76 | { | 77 | { |
| 77 | BLOCK_CIPHER_ecb_loop() | 78 | BLOCK_CIPHER_ecb_loop() |
| 78 | DES_ecb_encrypt((DES_cblock *)(in + i), (DES_cblock *)(out + i), ctx->cipher_data, ctx->encrypt); | 79 | DES_ecb_encrypt((DES_cblock *)(in + i), (DES_cblock *)(out + i), |
| 80 | ctx->cipher_data, ctx->encrypt); | ||
| 79 | return 1; | 81 | return 1; |
| 80 | } | 82 | } |
| 81 | 83 | ||
| 82 | static int des_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 84 | static int |
| 83 | const unsigned char *in, size_t inl) | 85 | des_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 86 | const unsigned char *in, size_t inl) | ||
| 84 | { | 87 | { |
| 85 | while(inl>=EVP_MAXCHUNK) | 88 | while (inl >= EVP_MAXCHUNK) { |
| 86 | { | ||
| 87 | DES_ofb64_encrypt(in, out, (long)EVP_MAXCHUNK, ctx->cipher_data, | 89 | DES_ofb64_encrypt(in, out, (long)EVP_MAXCHUNK, ctx->cipher_data, |
| 88 | (DES_cblock *)ctx->iv, &ctx->num); | 90 | (DES_cblock *)ctx->iv, &ctx->num); |
| 89 | inl-=EVP_MAXCHUNK; | 91 | inl -= EVP_MAXCHUNK; |
| 90 | in +=EVP_MAXCHUNK; | 92 | in += EVP_MAXCHUNK; |
| 91 | out+=EVP_MAXCHUNK; | 93 | out += EVP_MAXCHUNK; |
| 92 | } | 94 | } |
| 93 | if (inl) | 95 | if (inl) |
| 94 | DES_ofb64_encrypt(in, out, (long)inl, ctx->cipher_data, | 96 | DES_ofb64_encrypt(in, out, (long)inl, ctx->cipher_data, |
| 95 | (DES_cblock *)ctx->iv, &ctx->num); | 97 | (DES_cblock *)ctx->iv, &ctx->num); |
| 96 | return 1; | 98 | return 1; |
| 97 | } | 99 | } |
| 98 | 100 | ||
| 99 | static int des_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 101 | static int |
| 100 | const unsigned char *in, size_t inl) | 102 | des_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 103 | const unsigned char *in, size_t inl) | ||
| 101 | { | 104 | { |
| 102 | while(inl>=EVP_MAXCHUNK) | 105 | while (inl >= EVP_MAXCHUNK) { |
| 103 | { | ||
| 104 | DES_ncbc_encrypt(in, out, (long)EVP_MAXCHUNK, ctx->cipher_data, | 106 | DES_ncbc_encrypt(in, out, (long)EVP_MAXCHUNK, ctx->cipher_data, |
| 105 | (DES_cblock *)ctx->iv, ctx->encrypt); | 107 | (DES_cblock *)ctx->iv, ctx->encrypt); |
| 106 | inl-=EVP_MAXCHUNK; | 108 | inl -= EVP_MAXCHUNK; |
| 107 | in +=EVP_MAXCHUNK; | 109 | in += EVP_MAXCHUNK; |
| 108 | out+=EVP_MAXCHUNK; | 110 | out += EVP_MAXCHUNK; |
| 109 | } | 111 | } |
| 110 | if (inl) | 112 | if (inl) |
| 111 | DES_ncbc_encrypt(in, out, (long)inl, ctx->cipher_data, | 113 | DES_ncbc_encrypt(in, out, (long)inl, ctx->cipher_data, |
| 112 | (DES_cblock *)ctx->iv, ctx->encrypt); | 114 | (DES_cblock *)ctx->iv, ctx->encrypt); |
| 113 | return 1; | 115 | return 1; |
| 114 | } | 116 | } |
| 115 | 117 | ||
| 116 | static int des_cfb64_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 118 | static int |
| 117 | const unsigned char *in, size_t inl) | 119 | des_cfb64_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 120 | const unsigned char *in, size_t inl) | ||
| 118 | { | 121 | { |
| 119 | while(inl>=EVP_MAXCHUNK) | 122 | while (inl >= EVP_MAXCHUNK) { |
| 120 | { | 123 | DES_cfb64_encrypt(in, out, (long)EVP_MAXCHUNK, ctx->cipher_data, |
| 121 | DES_cfb64_encrypt(in,out, (long)EVP_MAXCHUNK, ctx->cipher_data, | 124 | (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); |
| 122 | (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); | 125 | inl -= EVP_MAXCHUNK; |
| 123 | inl-=EVP_MAXCHUNK; | 126 | in += EVP_MAXCHUNK; |
| 124 | in +=EVP_MAXCHUNK; | 127 | out += EVP_MAXCHUNK; |
| 125 | out+=EVP_MAXCHUNK; | 128 | } |
| 126 | } | ||
| 127 | if (inl) | 129 | if (inl) |
| 128 | DES_cfb64_encrypt(in, out, (long)inl, ctx->cipher_data, | 130 | DES_cfb64_encrypt(in, out, (long)inl, ctx->cipher_data, |
| 129 | (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); | 131 | (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); |
| 130 | return 1; | 132 | return 1; |
| 131 | } | 133 | } |
| 132 | 134 | ||
| 133 | /* Although we have a CFB-r implementation for DES, it doesn't pack the right | 135 | /* Although we have a CFB-r implementation for DES, it doesn't pack the right |
| 134 | way, so wrap it here */ | 136 | way, so wrap it here */ |
| 135 | static int des_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 137 | static int |
| 136 | const unsigned char *in, size_t inl) | 138 | des_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 137 | { | 139 | const unsigned char *in, size_t inl) |
| 138 | size_t n,chunk=EVP_MAXCHUNK/8; | 140 | { |
| 139 | unsigned char c[1],d[1]; | 141 | size_t n, chunk = EVP_MAXCHUNK/8; |
| 140 | 142 | unsigned char c[1], d[1]; | |
| 141 | if (inl<chunk) chunk=inl; | 143 | |
| 142 | 144 | if (inl < chunk) | |
| 143 | while (inl && inl>=chunk) | 145 | chunk = inl; |
| 144 | { | 146 | |
| 145 | for(n=0 ; n < chunk*8; ++n) | 147 | while (inl && inl >= chunk) { |
| 146 | { | 148 | for (n = 0; n < chunk*8; ++n) { |
| 147 | c[0]=(in[n/8]&(1 << (7-n%8))) ? 0x80 : 0; | 149 | c[0] = (in[n / 8] & (1 << (7 - n % 8))) ? 0x80 : 0; |
| 148 | DES_cfb_encrypt(c,d,1,1,ctx->cipher_data,(DES_cblock *)ctx->iv, | 150 | DES_cfb_encrypt(c, d, 1, 1, ctx->cipher_data, |
| 149 | ctx->encrypt); | 151 | (DES_cblock *)ctx->iv, ctx->encrypt); |
| 150 | out[n/8]=(out[n/8]&~(0x80 >> (unsigned int)(n%8))) | | 152 | out[n / 8] = (out[n / 8] & |
| 151 | ((d[0]&0x80) >> (unsigned int)(n%8)); | 153 | ~(0x80 >> (unsigned int)(n % 8))) | |
| 152 | } | 154 | ((d[0] & 0x80) >> (unsigned int)(n % 8)); |
| 153 | inl-=chunk; | 155 | } |
| 154 | in +=chunk; | 156 | inl -= chunk; |
| 155 | out+=chunk; | 157 | in += chunk; |
| 156 | if (inl<chunk) chunk=inl; | 158 | out += chunk; |
| 159 | if (inl < chunk) | ||
| 160 | chunk = inl; | ||
| 157 | } | 161 | } |
| 158 | 162 | ||
| 159 | return 1; | 163 | return 1; |
| 160 | } | 164 | } |
| 161 | 165 | ||
| 162 | static int des_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 166 | static int |
| 163 | const unsigned char *in, size_t inl) | 167 | des_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 164 | { | 168 | const unsigned char *in, size_t inl) |
| 165 | while (inl>=EVP_MAXCHUNK) | 169 | { |
| 166 | { | 170 | while (inl >= EVP_MAXCHUNK) { |
| 167 | DES_cfb_encrypt(in,out,8,(long)EVP_MAXCHUNK,ctx->cipher_data, | 171 | DES_cfb_encrypt(in, out, 8, (long)EVP_MAXCHUNK, |
| 168 | (DES_cblock *)ctx->iv,ctx->encrypt); | 172 | ctx->cipher_data, (DES_cblock *)ctx->iv, ctx->encrypt); |
| 169 | inl-=EVP_MAXCHUNK; | 173 | inl -= EVP_MAXCHUNK; |
| 170 | in +=EVP_MAXCHUNK; | 174 | in += EVP_MAXCHUNK; |
| 171 | out+=EVP_MAXCHUNK; | 175 | out += EVP_MAXCHUNK; |
| 172 | } | 176 | } |
| 173 | if (inl) | 177 | if (inl) |
| 174 | DES_cfb_encrypt(in,out,8,(long)inl,ctx->cipher_data, | 178 | DES_cfb_encrypt(in, out, 8,(long)inl, ctx->cipher_data, |
| 175 | (DES_cblock *)ctx->iv,ctx->encrypt); | 179 | (DES_cblock *)ctx->iv, ctx->encrypt); |
| 176 | return 1; | 180 | return 1; |
| 177 | } | 181 | } |
| 178 | 182 | ||
| 179 | BLOCK_CIPHER_defs(des, DES_key_schedule, NID_des, 8, 8, 8, 64, | 183 | BLOCK_CIPHER_defs(des, DES_key_schedule, NID_des, 8, 8, 8, 64, |
| 180 | EVP_CIPH_RAND_KEY, des_init_key, NULL, | 184 | EVP_CIPH_RAND_KEY, des_init_key, NULL, |
| 181 | EVP_CIPHER_set_asn1_iv, | 185 | EVP_CIPHER_set_asn1_iv, |
| 182 | EVP_CIPHER_get_asn1_iv, | 186 | EVP_CIPHER_get_asn1_iv, |
| 183 | des_ctrl) | 187 | des_ctrl) |
| 184 | 188 | ||
| 185 | BLOCK_CIPHER_def_cfb(des,DES_key_schedule,NID_des,8,8,1, | 189 | BLOCK_CIPHER_def_cfb(des, DES_key_schedule, NID_des, 8,8, 1, |
| 186 | EVP_CIPH_RAND_KEY, des_init_key,NULL, | 190 | EVP_CIPH_RAND_KEY, des_init_key, NULL, |
| 187 | EVP_CIPHER_set_asn1_iv, | 191 | EVP_CIPHER_set_asn1_iv, |
| 188 | EVP_CIPHER_get_asn1_iv,des_ctrl) | 192 | EVP_CIPHER_get_asn1_iv, des_ctrl) |
| 189 | 193 | ||
| 190 | BLOCK_CIPHER_def_cfb(des,DES_key_schedule,NID_des,8,8,8, | 194 | BLOCK_CIPHER_def_cfb(des, DES_key_schedule, NID_des, 8,8, 8, |
| 191 | EVP_CIPH_RAND_KEY,des_init_key,NULL, | 195 | EVP_CIPH_RAND_KEY, des_init_key, NULL, |
| 192 | EVP_CIPHER_set_asn1_iv, | 196 | EVP_CIPHER_set_asn1_iv, |
| 193 | EVP_CIPHER_get_asn1_iv,des_ctrl) | 197 | EVP_CIPHER_get_asn1_iv, des_ctrl) |
| 194 | 198 | ||
| 195 | static int des_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 199 | static int |
| 196 | const unsigned char *iv, int enc) | 200 | des_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 197 | { | 201 | const unsigned char *iv, int enc) |
| 202 | { | ||
| 198 | DES_cblock *deskey = (DES_cblock *)key; | 203 | DES_cblock *deskey = (DES_cblock *)key; |
| 204 | |||
| 199 | #ifdef EVP_CHECK_DES_KEY | 205 | #ifdef EVP_CHECK_DES_KEY |
| 200 | if(DES_set_key_checked(deskey,ctx->cipher_data) != 0) | 206 | if (DES_set_key_checked(deskey, ctx->cipher_data) != 0) |
| 201 | return 0; | 207 | return 0; |
| 202 | #else | 208 | #else |
| 203 | DES_set_key_unchecked(deskey,ctx->cipher_data); | 209 | DES_set_key_unchecked(deskey, ctx->cipher_data); |
| 204 | #endif | 210 | #endif |
| 205 | return 1; | 211 | return 1; |
| 206 | } | 212 | } |
| 207 | 213 | ||
| 208 | static int des_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | 214 | static int |
| 209 | { | 215 | des_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) |
| 210 | 216 | { | |
| 211 | switch(type) | 217 | switch (type) { |
| 212 | { | ||
| 213 | case EVP_CTRL_RAND_KEY: | 218 | case EVP_CTRL_RAND_KEY: |
| 214 | if (RAND_bytes(ptr, 8) <= 0) | 219 | if (RAND_bytes(ptr, 8) <= 0) |
| 215 | return 0; | 220 | return 0; |
| @@ -218,7 +223,7 @@ static int des_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 218 | 223 | ||
| 219 | default: | 224 | default: |
| 220 | return -1; | 225 | return -1; |
| 221 | } | ||
| 222 | } | 226 | } |
| 227 | } | ||
| 223 | 228 | ||
| 224 | #endif | 229 | #endif |
diff --git a/src/lib/libcrypto/evp/e_des3.c b/src/lib/libcrypto/evp/e_des3.c index 8d7b7de292..ddb069dda5 100644 --- a/src/lib/libcrypto/evp/e_des3.c +++ b/src/lib/libcrypto/evp/e_des3.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -68,150 +68,147 @@ | |||
| 68 | #ifndef OPENSSL_FIPS | 68 | #ifndef OPENSSL_FIPS |
| 69 | 69 | ||
| 70 | static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 70 | static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 71 | const unsigned char *iv,int enc); | 71 | const unsigned char *iv, int enc); |
| 72 | 72 | ||
| 73 | static int des_ede3_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 73 | static int des_ede3_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 74 | const unsigned char *iv,int enc); | 74 | const unsigned char *iv, int enc); |
| 75 | 75 | ||
| 76 | static int des3_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr); | 76 | static int des3_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr); |
| 77 | 77 | ||
| 78 | typedef struct | 78 | typedef struct { |
| 79 | { | ||
| 80 | DES_key_schedule ks1;/* key schedule */ | 79 | DES_key_schedule ks1;/* key schedule */ |
| 81 | DES_key_schedule ks2;/* key schedule (for ede) */ | 80 | DES_key_schedule ks2;/* key schedule (for ede) */ |
| 82 | DES_key_schedule ks3;/* key schedule (for ede3) */ | 81 | DES_key_schedule ks3;/* key schedule (for ede3) */ |
| 83 | } DES_EDE_KEY; | 82 | } DES_EDE_KEY; |
| 84 | 83 | ||
| 85 | #define data(ctx) ((DES_EDE_KEY *)(ctx)->cipher_data) | 84 | #define data(ctx) ((DES_EDE_KEY *)(ctx)->cipher_data) |
| 86 | 85 | ||
| 87 | /* Because of various casts and different args can't use IMPLEMENT_BLOCK_CIPHER */ | 86 | /* Because of various casts and different args can't use IMPLEMENT_BLOCK_CIPHER */ |
| 88 | 87 | ||
| 89 | static int des_ede_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 88 | static int |
| 90 | const unsigned char *in, size_t inl) | 89 | des_ede_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 90 | const unsigned char *in, size_t inl) | ||
| 91 | { | 91 | { |
| 92 | BLOCK_CIPHER_ecb_loop() | 92 | BLOCK_CIPHER_ecb_loop() |
| 93 | DES_ecb3_encrypt((const_DES_cblock *)(in + i), | 93 | DES_ecb3_encrypt((const_DES_cblock *)(in + i), (DES_cblock *)(out + i), |
| 94 | (DES_cblock *)(out + i), | 94 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, ctx->encrypt); |
| 95 | &data(ctx)->ks1, &data(ctx)->ks2, | ||
| 96 | &data(ctx)->ks3, | ||
| 97 | ctx->encrypt); | ||
| 98 | return 1; | 95 | return 1; |
| 99 | } | 96 | } |
| 100 | 97 | ||
| 101 | static int des_ede_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 98 | static int |
| 102 | const unsigned char *in, size_t inl) | 99 | des_ede_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 100 | const unsigned char *in, size_t inl) | ||
| 103 | { | 101 | { |
| 104 | while (inl>=EVP_MAXCHUNK) | 102 | while (inl >= EVP_MAXCHUNK) { |
| 105 | { | ||
| 106 | DES_ede3_ofb64_encrypt(in, out, (long)EVP_MAXCHUNK, | 103 | DES_ede3_ofb64_encrypt(in, out, (long)EVP_MAXCHUNK, |
| 107 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, | 104 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
| 108 | (DES_cblock *)ctx->iv, &ctx->num); | 105 | (DES_cblock *)ctx->iv, &ctx->num); |
| 109 | inl-=EVP_MAXCHUNK; | 106 | inl -= EVP_MAXCHUNK; |
| 110 | in +=EVP_MAXCHUNK; | 107 | in += EVP_MAXCHUNK; |
| 111 | out+=EVP_MAXCHUNK; | 108 | out += EVP_MAXCHUNK; |
| 112 | } | 109 | } |
| 113 | if (inl) | 110 | if (inl) |
| 114 | DES_ede3_ofb64_encrypt(in, out, (long)inl, | 111 | DES_ede3_ofb64_encrypt(in, out, (long)inl, |
| 115 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, | 112 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
| 116 | (DES_cblock *)ctx->iv, &ctx->num); | 113 | (DES_cblock *)ctx->iv, &ctx->num); |
| 117 | 114 | ||
| 118 | return 1; | 115 | return 1; |
| 119 | } | 116 | } |
| 120 | 117 | ||
| 121 | static int des_ede_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 118 | static int |
| 122 | const unsigned char *in, size_t inl) | 119 | des_ede_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 120 | const unsigned char *in, size_t inl) | ||
| 123 | { | 121 | { |
| 124 | #ifdef KSSL_DEBUG | 122 | #ifdef KSSL_DEBUG |
| 125 | { | 123 | { |
| 126 | int i; | 124 | int i; |
| 127 | char *cp; | 125 | char *cp; |
| 128 | printf("des_ede_cbc_cipher(ctx=%lx, buflen=%d)\n", ctx, ctx->buf_len); | 126 | printf("des_ede_cbc_cipher(ctx=%lx, buflen=%d)\n", ctx, ctx->buf_len); |
| 129 | printf("\t iv= "); | 127 | printf("\t iv= "); |
| 130 | for(i=0;i<8;i++) | 128 | for (i = 0; i < 8; i++) |
| 131 | printf("%02X",ctx->iv[i]); | 129 | printf("%02X",ctx->iv[i]); |
| 132 | printf("\n"); | 130 | printf("\n"); |
| 133 | } | 131 | } |
| 134 | #endif /* KSSL_DEBUG */ | 132 | #endif /* KSSL_DEBUG */ |
| 135 | while (inl>=EVP_MAXCHUNK) | 133 | while (inl >= EVP_MAXCHUNK) { |
| 136 | { | ||
| 137 | DES_ede3_cbc_encrypt(in, out, (long)EVP_MAXCHUNK, | 134 | DES_ede3_cbc_encrypt(in, out, (long)EVP_MAXCHUNK, |
| 138 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, | 135 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
| 139 | (DES_cblock *)ctx->iv, ctx->encrypt); | 136 | (DES_cblock *)ctx->iv, ctx->encrypt); |
| 140 | inl-=EVP_MAXCHUNK; | 137 | inl -= EVP_MAXCHUNK; |
| 141 | in +=EVP_MAXCHUNK; | 138 | in += EVP_MAXCHUNK; |
| 142 | out+=EVP_MAXCHUNK; | 139 | out += EVP_MAXCHUNK; |
| 143 | } | 140 | } |
| 144 | if (inl) | 141 | if (inl) |
| 145 | DES_ede3_cbc_encrypt(in, out, (long)inl, | 142 | DES_ede3_cbc_encrypt(in, out, (long)inl, |
| 146 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, | 143 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
| 147 | (DES_cblock *)ctx->iv, ctx->encrypt); | 144 | (DES_cblock *)ctx->iv, ctx->encrypt); |
| 148 | return 1; | 145 | return 1; |
| 149 | } | 146 | } |
| 150 | 147 | ||
| 151 | static int des_ede_cfb64_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 148 | static int |
| 152 | const unsigned char *in, size_t inl) | 149 | des_ede_cfb64_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 150 | const unsigned char *in, size_t inl) | ||
| 153 | { | 151 | { |
| 154 | while (inl>=EVP_MAXCHUNK) | 152 | while (inl >= EVP_MAXCHUNK) { |
| 155 | { | 153 | DES_ede3_cfb64_encrypt(in, out, (long)EVP_MAXCHUNK, |
| 156 | DES_ede3_cfb64_encrypt(in, out, (long)EVP_MAXCHUNK, | 154 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
| 157 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, | 155 | (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); |
| 158 | (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); | 156 | inl -= EVP_MAXCHUNK; |
| 159 | inl-=EVP_MAXCHUNK; | 157 | in += EVP_MAXCHUNK; |
| 160 | in +=EVP_MAXCHUNK; | 158 | out += EVP_MAXCHUNK; |
| 161 | out+=EVP_MAXCHUNK; | 159 | } |
| 162 | } | ||
| 163 | if (inl) | 160 | if (inl) |
| 164 | DES_ede3_cfb64_encrypt(in, out, (long)inl, | 161 | DES_ede3_cfb64_encrypt(in, out, (long)inl, |
| 165 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, | 162 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
| 166 | (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); | 163 | (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); |
| 167 | return 1; | 164 | return 1; |
| 168 | } | 165 | } |
| 169 | 166 | ||
| 170 | /* Although we have a CFB-r implementation for 3-DES, it doesn't pack the right | 167 | /* Although we have a CFB-r implementation for 3-DES, it doesn't pack the right |
| 171 | way, so wrap it here */ | 168 | way, so wrap it here */ |
| 172 | static int des_ede3_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 169 | static int |
| 173 | const unsigned char *in, size_t inl) | 170 | des_ede3_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 174 | { | 171 | const unsigned char *in, size_t inl) |
| 175 | size_t n; | 172 | { |
| 176 | unsigned char c[1],d[1]; | 173 | size_t n; |
| 174 | unsigned char c[1], d[1]; | ||
| 177 | 175 | ||
| 178 | for(n=0 ; n < inl ; ++n) | 176 | for (n = 0; n < inl; ++n) { |
| 179 | { | 177 | c[0] = (in[n/8]&(1 << (7 - n % 8))) ? 0x80 : 0; |
| 180 | c[0]=(in[n/8]&(1 << (7-n%8))) ? 0x80 : 0; | 178 | DES_ede3_cfb_encrypt(c, d, 1, 1, |
| 181 | DES_ede3_cfb_encrypt(c,d,1,1, | 179 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
| 182 | &data(ctx)->ks1,&data(ctx)->ks2,&data(ctx)->ks3, | 180 | (DES_cblock *)ctx->iv, ctx->encrypt); |
| 183 | (DES_cblock *)ctx->iv,ctx->encrypt); | 181 | out[n / 8] = (out[n / 8] & ~(0x80 >> (unsigned int)(n % 8))) | |
| 184 | out[n/8]=(out[n/8]&~(0x80 >> (unsigned int)(n%8))) | | 182 | ((d[0] & 0x80) >> (unsigned int)(n % 8)); |
| 185 | ((d[0]&0x80) >> (unsigned int)(n%8)); | ||
| 186 | } | 183 | } |
| 187 | 184 | ||
| 188 | return 1; | 185 | return 1; |
| 189 | } | 186 | } |
| 190 | 187 | ||
| 191 | static int des_ede3_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 188 | static int |
| 192 | const unsigned char *in, size_t inl) | 189 | des_ede3_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 193 | { | 190 | const unsigned char *in, size_t inl) |
| 194 | while (inl>=EVP_MAXCHUNK) | 191 | { |
| 195 | { | 192 | while (inl >= EVP_MAXCHUNK) { |
| 196 | DES_ede3_cfb_encrypt(in,out,8,(long)EVP_MAXCHUNK, | 193 | DES_ede3_cfb_encrypt(in, out, 8, (long)EVP_MAXCHUNK, |
| 197 | &data(ctx)->ks1,&data(ctx)->ks2,&data(ctx)->ks3, | 194 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
| 198 | (DES_cblock *)ctx->iv,ctx->encrypt); | 195 | (DES_cblock *)ctx->iv, ctx->encrypt); |
| 199 | inl-=EVP_MAXCHUNK; | 196 | inl -= EVP_MAXCHUNK; |
| 200 | in +=EVP_MAXCHUNK; | 197 | in += EVP_MAXCHUNK; |
| 201 | out+=EVP_MAXCHUNK; | 198 | out += EVP_MAXCHUNK; |
| 202 | } | 199 | } |
| 203 | if (inl) | 200 | if (inl) |
| 204 | DES_ede3_cfb_encrypt(in,out,8,(long)inl, | 201 | DES_ede3_cfb_encrypt(in, out, 8, (long)inl, |
| 205 | &data(ctx)->ks1,&data(ctx)->ks2,&data(ctx)->ks3, | 202 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
| 206 | (DES_cblock *)ctx->iv,ctx->encrypt); | 203 | (DES_cblock *)ctx->iv, ctx->encrypt); |
| 207 | return 1; | 204 | return 1; |
| 208 | } | 205 | } |
| 209 | 206 | ||
| 210 | BLOCK_CIPHER_defs(des_ede, DES_EDE_KEY, NID_des_ede, 8, 16, 8, 64, | 207 | BLOCK_CIPHER_defs(des_ede, DES_EDE_KEY, NID_des_ede, 8, 16, 8, 64, |
| 211 | EVP_CIPH_RAND_KEY, des_ede_init_key, NULL, | 208 | EVP_CIPH_RAND_KEY, des_ede_init_key, NULL, |
| 212 | EVP_CIPHER_set_asn1_iv, | 209 | EVP_CIPHER_set_asn1_iv, |
| 213 | EVP_CIPHER_get_asn1_iv, | 210 | EVP_CIPHER_get_asn1_iv, |
| 214 | des3_ctrl) | 211 | des3_ctrl) |
| 215 | 212 | ||
| 216 | #define des_ede3_cfb64_cipher des_ede_cfb64_cipher | 213 | #define des_ede3_cfb64_cipher des_ede_cfb64_cipher |
| 217 | #define des_ede3_ofb_cipher des_ede_ofb_cipher | 214 | #define des_ede3_ofb_cipher des_ede_ofb_cipher |
| @@ -219,75 +216,78 @@ BLOCK_CIPHER_defs(des_ede, DES_EDE_KEY, NID_des_ede, 8, 16, 8, 64, | |||
| 219 | #define des_ede3_ecb_cipher des_ede_ecb_cipher | 216 | #define des_ede3_ecb_cipher des_ede_ecb_cipher |
| 220 | 217 | ||
| 221 | BLOCK_CIPHER_defs(des_ede3, DES_EDE_KEY, NID_des_ede3, 8, 24, 8, 64, | 218 | BLOCK_CIPHER_defs(des_ede3, DES_EDE_KEY, NID_des_ede3, 8, 24, 8, 64, |
| 222 | EVP_CIPH_RAND_KEY, des_ede3_init_key, NULL, | 219 | EVP_CIPH_RAND_KEY, des_ede3_init_key, NULL, |
| 223 | EVP_CIPHER_set_asn1_iv, | 220 | EVP_CIPHER_set_asn1_iv, |
| 224 | EVP_CIPHER_get_asn1_iv, | 221 | EVP_CIPHER_get_asn1_iv, |
| 225 | des3_ctrl) | 222 | des3_ctrl) |
| 226 | |||
| 227 | BLOCK_CIPHER_def_cfb(des_ede3,DES_EDE_KEY,NID_des_ede3,24,8,1, | ||
| 228 | EVP_CIPH_RAND_KEY, des_ede3_init_key,NULL, | ||
| 229 | EVP_CIPHER_set_asn1_iv, | ||
| 230 | EVP_CIPHER_get_asn1_iv, | ||
| 231 | des3_ctrl) | ||
| 232 | |||
| 233 | BLOCK_CIPHER_def_cfb(des_ede3,DES_EDE_KEY,NID_des_ede3,24,8,8, | ||
| 234 | EVP_CIPH_RAND_KEY, des_ede3_init_key,NULL, | ||
| 235 | EVP_CIPHER_set_asn1_iv, | ||
| 236 | EVP_CIPHER_get_asn1_iv, | ||
| 237 | des3_ctrl) | ||
| 238 | 223 | ||
| 239 | static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 224 | BLOCK_CIPHER_def_cfb(des_ede3, DES_EDE_KEY, NID_des_ede3, 24, 8, 1, |
| 240 | const unsigned char *iv, int enc) | 225 | EVP_CIPH_RAND_KEY, des_ede3_init_key, NULL, |
| 241 | { | 226 | EVP_CIPHER_set_asn1_iv, |
| 227 | EVP_CIPHER_get_asn1_iv, | ||
| 228 | des3_ctrl) | ||
| 229 | |||
| 230 | BLOCK_CIPHER_def_cfb(des_ede3, DES_EDE_KEY, NID_des_ede3, 24, 8, 8, | ||
| 231 | EVP_CIPH_RAND_KEY, des_ede3_init_key, NULL, | ||
| 232 | EVP_CIPHER_set_asn1_iv, | ||
| 233 | EVP_CIPHER_get_asn1_iv, | ||
| 234 | des3_ctrl) | ||
| 235 | |||
| 236 | static int | ||
| 237 | des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
| 238 | const unsigned char *iv, int enc) | ||
| 239 | { | ||
| 242 | DES_cblock *deskey = (DES_cblock *)key; | 240 | DES_cblock *deskey = (DES_cblock *)key; |
| 241 | |||
| 243 | #ifdef EVP_CHECK_DES_KEY | 242 | #ifdef EVP_CHECK_DES_KEY |
| 244 | if (DES_set_key_checked(&deskey[0],&data(ctx)->ks1) | 243 | if (DES_set_key_checked(&deskey[0], &data(ctx)->ks1) |
| 245 | !! DES_set_key_checked(&deskey[1],&data(ctx)->ks2)) | 244 | !! DES_set_key_checked(&deskey[1], &data(ctx)->ks2)) |
| 246 | return 0; | 245 | return 0; |
| 247 | #else | 246 | #else |
| 248 | DES_set_key_unchecked(&deskey[0],&data(ctx)->ks1); | 247 | DES_set_key_unchecked(&deskey[0], &data(ctx)->ks1); |
| 249 | DES_set_key_unchecked(&deskey[1],&data(ctx)->ks2); | 248 | DES_set_key_unchecked(&deskey[1], &data(ctx)->ks2); |
| 250 | #endif | 249 | #endif |
| 251 | memcpy(&data(ctx)->ks3,&data(ctx)->ks1, | 250 | memcpy(&data(ctx)->ks3, &data(ctx)->ks1, |
| 252 | sizeof(data(ctx)->ks1)); | 251 | sizeof(data(ctx)->ks1)); |
| 253 | return 1; | 252 | return 1; |
| 254 | } | 253 | } |
| 255 | 254 | ||
| 256 | static int des_ede3_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 255 | static int |
| 257 | const unsigned char *iv, int enc) | 256 | des_ede3_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 258 | { | 257 | const unsigned char *iv, int enc) |
| 258 | { | ||
| 259 | DES_cblock *deskey = (DES_cblock *)key; | 259 | DES_cblock *deskey = (DES_cblock *)key; |
| 260 | |||
| 260 | #ifdef KSSL_DEBUG | 261 | #ifdef KSSL_DEBUG |
| 261 | { | 262 | { |
| 262 | int i; | 263 | int i; |
| 263 | printf("des_ede3_init_key(ctx=%lx)\n", ctx); | 264 | printf("des_ede3_init_key(ctx=%lx)\n", ctx); |
| 264 | printf("\tKEY= "); | 265 | printf("\tKEY= "); |
| 265 | for(i=0;i<24;i++) printf("%02X",key[i]); printf("\n"); | 266 | for(i=0;i<24;i++) printf("%02X",key[i]); printf("\n"); |
| 266 | printf("\t IV= "); | 267 | printf("\t IV= "); |
| 267 | for(i=0;i<8;i++) printf("%02X",iv[i]); printf("\n"); | 268 | for(i=0;i<8;i++) printf("%02X",iv[i]); printf("\n"); |
| 268 | } | 269 | } |
| 269 | #endif /* KSSL_DEBUG */ | 270 | #endif /* KSSL_DEBUG */ |
| 270 | 271 | ||
| 271 | #ifdef EVP_CHECK_DES_KEY | 272 | #ifdef EVP_CHECK_DES_KEY |
| 272 | if (DES_set_key_checked(&deskey[0],&data(ctx)->ks1) | 273 | if (DES_set_key_checked(&deskey[0], &data(ctx)->ks1) || |
| 273 | || DES_set_key_checked(&deskey[1],&data(ctx)->ks2) | 274 | DES_set_key_checked(&deskey[1], &data(ctx)->ks2) || |
| 274 | || DES_set_key_checked(&deskey[2],&data(ctx)->ks3)) | 275 | DES_set_key_checked(&deskey[2], &data(ctx)->ks3)) |
| 275 | return 0; | 276 | return 0; |
| 276 | #else | 277 | #else |
| 277 | DES_set_key_unchecked(&deskey[0],&data(ctx)->ks1); | 278 | DES_set_key_unchecked(&deskey[0], &data(ctx)->ks1); |
| 278 | DES_set_key_unchecked(&deskey[1],&data(ctx)->ks2); | 279 | DES_set_key_unchecked(&deskey[1], &data(ctx)->ks2); |
| 279 | DES_set_key_unchecked(&deskey[2],&data(ctx)->ks3); | 280 | DES_set_key_unchecked(&deskey[2], &data(ctx)->ks3); |
| 280 | #endif | 281 | #endif |
| 281 | return 1; | 282 | return 1; |
| 282 | } | 283 | } |
| 283 | |||
| 284 | static int des3_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | ||
| 285 | { | ||
| 286 | 284 | ||
| 285 | static int | ||
| 286 | des3_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | ||
| 287 | { | ||
| 287 | DES_cblock *deskey = ptr; | 288 | DES_cblock *deskey = ptr; |
| 288 | 289 | ||
| 289 | switch(type) | 290 | switch (type) { |
| 290 | { | ||
| 291 | case EVP_CTRL_RAND_KEY: | 291 | case EVP_CTRL_RAND_KEY: |
| 292 | if (RAND_bytes(ptr, c->key_len) <= 0) | 292 | if (RAND_bytes(ptr, c->key_len) <= 0) |
| 293 | return 0; | 293 | return 0; |
| @@ -300,15 +300,17 @@ static int des3_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 300 | 300 | ||
| 301 | default: | 301 | default: |
| 302 | return -1; | 302 | return -1; |
| 303 | } | ||
| 304 | } | 303 | } |
| 304 | } | ||
| 305 | 305 | ||
| 306 | const EVP_CIPHER *EVP_des_ede(void) | 306 | const EVP_CIPHER * |
| 307 | EVP_des_ede(void) | ||
| 307 | { | 308 | { |
| 308 | return &des_ede_ecb; | 309 | return &des_ede_ecb; |
| 309 | } | 310 | } |
| 310 | 311 | ||
| 311 | const EVP_CIPHER *EVP_des_ede3(void) | 312 | const EVP_CIPHER * |
| 313 | EVP_des_ede3(void) | ||
| 312 | { | 314 | { |
| 313 | return &des_ede3_ecb; | 315 | return &des_ede3_ecb; |
| 314 | } | 316 | } |
diff --git a/src/lib/libcrypto/evp/e_idea.c b/src/lib/libcrypto/evp/e_idea.c index 806b080360..8b8a647a8c 100644 --- a/src/lib/libcrypto/evp/e_idea.c +++ b/src/lib/libcrypto/evp/e_idea.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -66,53 +66,56 @@ | |||
| 66 | #include <openssl/idea.h> | 66 | #include <openssl/idea.h> |
| 67 | 67 | ||
| 68 | static int idea_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 68 | static int idea_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 69 | const unsigned char *iv,int enc); | 69 | const unsigned char *iv, int enc); |
| 70 | 70 | ||
| 71 | /* NB idea_ecb_encrypt doesn't take an 'encrypt' argument so we treat it as a special | 71 | /* NB idea_ecb_encrypt doesn't take an 'encrypt' argument so we treat it as a special |
| 72 | * case | 72 | * case |
| 73 | */ | 73 | */ |
| 74 | 74 | ||
| 75 | static int idea_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 75 | static int |
| 76 | const unsigned char *in, size_t inl) | 76 | idea_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 77 | const unsigned char *in, size_t inl) | ||
| 77 | { | 78 | { |
| 78 | BLOCK_CIPHER_ecb_loop() | 79 | BLOCK_CIPHER_ecb_loop() |
| 79 | idea_ecb_encrypt(in + i, out + i, ctx->cipher_data); | 80 | idea_ecb_encrypt(in + i, out + i, ctx->cipher_data); |
| 80 | return 1; | 81 | return 1; |
| 81 | } | 82 | } |
| 82 | 83 | ||
| 83 | /* Can't use IMPLEMENT_BLOCK_CIPHER because idea_ecb_encrypt is different */ | 84 | /* Can't use IMPLEMENT_BLOCK_CIPHER because idea_ecb_encrypt is different */ |
| 84 | 85 | ||
| 85 | typedef struct | 86 | typedef struct { |
| 86 | { | ||
| 87 | IDEA_KEY_SCHEDULE ks; | 87 | IDEA_KEY_SCHEDULE ks; |
| 88 | } EVP_IDEA_KEY; | 88 | } EVP_IDEA_KEY; |
| 89 | 89 | ||
| 90 | BLOCK_CIPHER_func_cbc(idea, idea, EVP_IDEA_KEY, ks) | 90 | BLOCK_CIPHER_func_cbc(idea, idea, EVP_IDEA_KEY, ks) |
| 91 | BLOCK_CIPHER_func_ofb(idea, idea, 64, EVP_IDEA_KEY, ks) | 91 | BLOCK_CIPHER_func_ofb(idea, idea, 64, EVP_IDEA_KEY, ks) |
| 92 | BLOCK_CIPHER_func_cfb(idea, idea, 64, EVP_IDEA_KEY, ks) | 92 | BLOCK_CIPHER_func_cfb(idea, idea, 64, EVP_IDEA_KEY, ks) |
| 93 | 93 | ||
| 94 | BLOCK_CIPHER_defs(idea, IDEA_KEY_SCHEDULE, NID_idea, 8, 16, 8, 64, | 94 | BLOCK_CIPHER_defs(idea, IDEA_KEY_SCHEDULE, NID_idea, 8, 16, 8, 64, |
| 95 | 0, idea_init_key, NULL, | 95 | 0, idea_init_key, NULL, |
| 96 | EVP_CIPHER_set_asn1_iv, EVP_CIPHER_get_asn1_iv, NULL) | 96 | EVP_CIPHER_set_asn1_iv, EVP_CIPHER_get_asn1_iv, NULL) |
| 97 | 97 | ||
| 98 | static int idea_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 98 | static int |
| 99 | const unsigned char *iv, int enc) | 99 | idea_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 100 | { | 100 | const unsigned char *iv, int enc) |
| 101 | if(!enc) { | 101 | { |
| 102 | if (EVP_CIPHER_CTX_mode(ctx) == EVP_CIPH_OFB_MODE) enc = 1; | 102 | if (!enc) { |
| 103 | else if (EVP_CIPHER_CTX_mode(ctx) == EVP_CIPH_CFB_MODE) enc = 1; | 103 | if (EVP_CIPHER_CTX_mode(ctx) == EVP_CIPH_OFB_MODE) |
| 104 | enc = 1; | ||
| 105 | else if (EVP_CIPHER_CTX_mode(ctx) == EVP_CIPH_CFB_MODE) | ||
| 106 | enc = 1; | ||
| 104 | } | 107 | } |
| 105 | if (enc) idea_set_encrypt_key(key,ctx->cipher_data); | 108 | if (enc) |
| 106 | else | 109 | idea_set_encrypt_key(key, ctx->cipher_data); |
| 107 | { | 110 | else { |
| 108 | IDEA_KEY_SCHEDULE tmp; | 111 | IDEA_KEY_SCHEDULE tmp; |
| 109 | 112 | ||
| 110 | idea_set_encrypt_key(key,&tmp); | 113 | idea_set_encrypt_key(key, &tmp); |
| 111 | idea_set_decrypt_key(&tmp,ctx->cipher_data); | 114 | idea_set_decrypt_key(&tmp, ctx->cipher_data); |
| 112 | OPENSSL_cleanse((unsigned char *)&tmp, | 115 | OPENSSL_cleanse((unsigned char *)&tmp, |
| 113 | sizeof(IDEA_KEY_SCHEDULE)); | 116 | sizeof(IDEA_KEY_SCHEDULE)); |
| 114 | } | ||
| 115 | return 1; | ||
| 116 | } | 117 | } |
| 118 | return 1; | ||
| 119 | } | ||
| 117 | 120 | ||
| 118 | #endif | 121 | #endif |
diff --git a/src/lib/libcrypto/evp/e_null.c b/src/lib/libcrypto/evp/e_null.c index 98a78499f9..d94751a07a 100644 --- a/src/lib/libcrypto/evp/e_null.c +++ b/src/lib/libcrypto/evp/e_null.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -62,13 +62,13 @@ | |||
| 62 | #include <openssl/objects.h> | 62 | #include <openssl/objects.h> |
| 63 | 63 | ||
| 64 | static int null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 64 | static int null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 65 | const unsigned char *iv,int enc); | 65 | const unsigned char *iv, int enc); |
| 66 | static int null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 66 | static int null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 67 | const unsigned char *in, size_t inl); | 67 | const unsigned char *in, size_t inl); |
| 68 | static const EVP_CIPHER n_cipher= | 68 | |
| 69 | { | 69 | static const EVP_CIPHER n_cipher = { |
| 70 | NID_undef, | 70 | NID_undef, |
| 71 | 1,0,0, | 71 | 1, 0, 0, |
| 72 | 0, | 72 | 0, |
| 73 | null_init_key, | 73 | null_init_key, |
| 74 | null_cipher, | 74 | null_cipher, |
| @@ -78,24 +78,27 @@ static const EVP_CIPHER n_cipher= | |||
| 78 | NULL, | 78 | NULL, |
| 79 | NULL, | 79 | NULL, |
| 80 | NULL | 80 | NULL |
| 81 | }; | 81 | }; |
| 82 | 82 | ||
| 83 | const EVP_CIPHER *EVP_enc_null(void) | 83 | const EVP_CIPHER * |
| 84 | { | 84 | EVP_enc_null(void) |
| 85 | return(&n_cipher); | 85 | { |
| 86 | } | 86 | return (&n_cipher); |
| 87 | } | ||
| 87 | 88 | ||
| 88 | static int null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 89 | static int |
| 89 | const unsigned char *iv, int enc) | 90 | null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 90 | { | 91 | const unsigned char *iv, int enc) |
| 92 | { | ||
| 91 | /* memset(&(ctx->c),0,sizeof(ctx->c));*/ | 93 | /* memset(&(ctx->c),0,sizeof(ctx->c));*/ |
| 92 | return 1; | 94 | return 1; |
| 93 | } | 95 | } |
| 94 | 96 | ||
| 95 | static int null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 97 | static int |
| 96 | const unsigned char *in, size_t inl) | 98 | null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 97 | { | 99 | const unsigned char *in, size_t inl) |
| 100 | { | ||
| 98 | if (in != out) | 101 | if (in != out) |
| 99 | memcpy((char *)out,(const char *)in,inl); | 102 | memcpy((char *)out, (const char *)in, inl); |
| 100 | return 1; | 103 | return 1; |
| 101 | } | 104 | } |
diff --git a/src/lib/libcrypto/evp/e_old.c b/src/lib/libcrypto/evp/e_old.c index 1642af4869..c27b61a4bf 100644 --- a/src/lib/libcrypto/evp/e_old.c +++ b/src/lib/libcrypto/evp/e_old.c | |||
| @@ -10,7 +10,7 @@ | |||
| 10 | * are met: | 10 | * are met: |
| 11 | * | 11 | * |
| 12 | * 1. Redistributions of source code must retain the above copyright | 12 | * 1. Redistributions of source code must retain the above copyright |
| 13 | * notice, this list of conditions and the following disclaimer. | 13 | * notice, this list of conditions and the following disclaimer. |
| 14 | * | 14 | * |
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | 15 | * 2. Redistributions in binary form must reproduce the above copyright |
| 16 | * notice, this list of conditions and the following disclaimer in | 16 | * notice, this list of conditions and the following disclaimer in |
| @@ -71,55 +71,88 @@ static void *dummy = &dummy; | |||
| 71 | #ifndef OPENSSL_NO_BF | 71 | #ifndef OPENSSL_NO_BF |
| 72 | #undef EVP_bf_cfb | 72 | #undef EVP_bf_cfb |
| 73 | const EVP_CIPHER *EVP_bf_cfb(void); | 73 | const EVP_CIPHER *EVP_bf_cfb(void); |
| 74 | const EVP_CIPHER *EVP_bf_cfb(void) { return EVP_bf_cfb64(); } | 74 | const EVP_CIPHER *EVP_bf_cfb(void) |
| 75 | { | ||
| 76 | return EVP_bf_cfb64(); | ||
| 77 | } | ||
| 75 | #endif | 78 | #endif |
| 76 | 79 | ||
| 77 | #ifndef OPENSSL_NO_DES | 80 | #ifndef OPENSSL_NO_DES |
| 78 | #undef EVP_des_cfb | 81 | #undef EVP_des_cfb |
| 79 | const EVP_CIPHER *EVP_des_cfb(void); | 82 | const EVP_CIPHER *EVP_des_cfb(void); |
| 80 | const EVP_CIPHER *EVP_des_cfb(void) { return EVP_des_cfb64(); } | 83 | const EVP_CIPHER *EVP_des_cfb(void) |
| 84 | { | ||
| 85 | return EVP_des_cfb64(); | ||
| 86 | } | ||
| 81 | #undef EVP_des_ede3_cfb | 87 | #undef EVP_des_ede3_cfb |
| 82 | const EVP_CIPHER *EVP_des_ede3_cfb(void); | 88 | const EVP_CIPHER *EVP_des_ede3_cfb(void); |
| 83 | const EVP_CIPHER *EVP_des_ede3_cfb(void) { return EVP_des_ede3_cfb64(); } | 89 | const EVP_CIPHER *EVP_des_ede3_cfb(void) |
| 90 | { | ||
| 91 | return EVP_des_ede3_cfb64(); | ||
| 92 | } | ||
| 84 | #undef EVP_des_ede_cfb | 93 | #undef EVP_des_ede_cfb |
| 85 | const EVP_CIPHER *EVP_des_ede_cfb(void); | 94 | const EVP_CIPHER *EVP_des_ede_cfb(void); |
| 86 | const EVP_CIPHER *EVP_des_ede_cfb(void) { return EVP_des_ede_cfb64(); } | 95 | const EVP_CIPHER *EVP_des_ede_cfb(void) |
| 96 | { | ||
| 97 | return EVP_des_ede_cfb64(); | ||
| 98 | } | ||
| 87 | #endif | 99 | #endif |
| 88 | 100 | ||
| 89 | #ifndef OPENSSL_NO_IDEA | 101 | #ifndef OPENSSL_NO_IDEA |
| 90 | #undef EVP_idea_cfb | 102 | #undef EVP_idea_cfb |
| 91 | const EVP_CIPHER *EVP_idea_cfb(void); | 103 | const EVP_CIPHER *EVP_idea_cfb(void); |
| 92 | const EVP_CIPHER *EVP_idea_cfb(void) { return EVP_idea_cfb64(); } | 104 | const EVP_CIPHER *EVP_idea_cfb(void) |
| 105 | { | ||
| 106 | return EVP_idea_cfb64(); | ||
| 107 | } | ||
| 93 | #endif | 108 | #endif |
| 94 | 109 | ||
| 95 | #ifndef OPENSSL_NO_RC2 | 110 | #ifndef OPENSSL_NO_RC2 |
| 96 | #undef EVP_rc2_cfb | 111 | #undef EVP_rc2_cfb |
| 97 | const EVP_CIPHER *EVP_rc2_cfb(void); | 112 | const EVP_CIPHER *EVP_rc2_cfb(void); |
| 98 | const EVP_CIPHER *EVP_rc2_cfb(void) { return EVP_rc2_cfb64(); } | 113 | const EVP_CIPHER *EVP_rc2_cfb(void) |
| 114 | { | ||
| 115 | return EVP_rc2_cfb64(); | ||
| 116 | } | ||
| 99 | #endif | 117 | #endif |
| 100 | 118 | ||
| 101 | #ifndef OPENSSL_NO_CAST | 119 | #ifndef OPENSSL_NO_CAST |
| 102 | #undef EVP_cast5_cfb | 120 | #undef EVP_cast5_cfb |
| 103 | const EVP_CIPHER *EVP_cast5_cfb(void); | 121 | const EVP_CIPHER *EVP_cast5_cfb(void); |
| 104 | const EVP_CIPHER *EVP_cast5_cfb(void) { return EVP_cast5_cfb64(); } | 122 | const EVP_CIPHER *EVP_cast5_cfb(void) |
| 123 | { | ||
| 124 | return EVP_cast5_cfb64(); | ||
| 125 | } | ||
| 105 | #endif | 126 | #endif |
| 106 | 127 | ||
| 107 | #ifndef OPENSSL_NO_RC5 | 128 | #ifndef OPENSSL_NO_RC5 |
| 108 | #undef EVP_rc5_32_12_16_cfb | 129 | #undef EVP_rc5_32_12_16_cfb |
| 109 | const EVP_CIPHER *EVP_rc5_32_12_16_cfb(void); | 130 | const EVP_CIPHER *EVP_rc5_32_12_16_cfb(void); |
| 110 | const EVP_CIPHER *EVP_rc5_32_12_16_cfb(void) { return EVP_rc5_32_12_16_cfb64(); } | 131 | const EVP_CIPHER *EVP_rc5_32_12_16_cfb(void) |
| 132 | { | ||
| 133 | return EVP_rc5_32_12_16_cfb64(); | ||
| 134 | } | ||
| 111 | #endif | 135 | #endif |
| 112 | 136 | ||
| 113 | #ifndef OPENSSL_NO_AES | 137 | #ifndef OPENSSL_NO_AES |
| 114 | #undef EVP_aes_128_cfb | 138 | #undef EVP_aes_128_cfb |
| 115 | const EVP_CIPHER *EVP_aes_128_cfb(void); | 139 | const EVP_CIPHER *EVP_aes_128_cfb(void); |
| 116 | const EVP_CIPHER *EVP_aes_128_cfb(void) { return EVP_aes_128_cfb128(); } | 140 | const EVP_CIPHER *EVP_aes_128_cfb(void) |
| 141 | { | ||
| 142 | return EVP_aes_128_cfb128(); | ||
| 143 | } | ||
| 117 | #undef EVP_aes_192_cfb | 144 | #undef EVP_aes_192_cfb |
| 118 | const EVP_CIPHER *EVP_aes_192_cfb(void); | 145 | const EVP_CIPHER *EVP_aes_192_cfb(void); |
| 119 | const EVP_CIPHER *EVP_aes_192_cfb(void) { return EVP_aes_192_cfb128(); } | 146 | const EVP_CIPHER *EVP_aes_192_cfb(void) |
| 147 | { | ||
| 148 | return EVP_aes_192_cfb128(); | ||
| 149 | } | ||
| 120 | #undef EVP_aes_256_cfb | 150 | #undef EVP_aes_256_cfb |
| 121 | const EVP_CIPHER *EVP_aes_256_cfb(void); | 151 | const EVP_CIPHER *EVP_aes_256_cfb(void); |
| 122 | const EVP_CIPHER *EVP_aes_256_cfb(void) { return EVP_aes_256_cfb128(); } | 152 | const EVP_CIPHER *EVP_aes_256_cfb(void) |
| 153 | { | ||
| 154 | return EVP_aes_256_cfb128(); | ||
| 155 | } | ||
| 123 | #endif | 156 | #endif |
| 124 | 157 | ||
| 125 | #endif | 158 | #endif |
diff --git a/src/lib/libcrypto/evp/e_rc2.c b/src/lib/libcrypto/evp/e_rc2.c index d4c33b58d4..f6f4504890 100644 --- a/src/lib/libcrypto/evp/e_rc2.c +++ b/src/lib/libcrypto/evp/e_rc2.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -67,37 +67,35 @@ | |||
| 67 | #include <openssl/rc2.h> | 67 | #include <openssl/rc2.h> |
| 68 | 68 | ||
| 69 | static int rc2_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 69 | static int rc2_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 70 | const unsigned char *iv,int enc); | 70 | const unsigned char *iv, int enc); |
| 71 | static int rc2_meth_to_magic(EVP_CIPHER_CTX *ctx); | 71 | static int rc2_meth_to_magic(EVP_CIPHER_CTX *ctx); |
| 72 | static int rc2_magic_to_meth(int i); | 72 | static int rc2_magic_to_meth(int i); |
| 73 | static int rc2_set_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type); | 73 | static int rc2_set_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type); |
| 74 | static int rc2_get_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type); | 74 | static int rc2_get_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type); |
| 75 | static int rc2_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr); | 75 | static int rc2_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr); |
| 76 | 76 | ||
| 77 | typedef struct | 77 | typedef struct { |
| 78 | { | ||
| 79 | int key_bits; /* effective key bits */ | 78 | int key_bits; /* effective key bits */ |
| 80 | RC2_KEY ks; /* key schedule */ | 79 | RC2_KEY ks; /* key schedule */ |
| 81 | } EVP_RC2_KEY; | 80 | } EVP_RC2_KEY; |
| 82 | 81 | ||
| 83 | #define data(ctx) ((EVP_RC2_KEY *)(ctx)->cipher_data) | 82 | #define data(ctx) ((EVP_RC2_KEY *)(ctx)->cipher_data) |
| 84 | 83 | ||
| 85 | IMPLEMENT_BLOCK_CIPHER(rc2, ks, RC2, EVP_RC2_KEY, NID_rc2, | 84 | IMPLEMENT_BLOCK_CIPHER(rc2, ks, RC2, EVP_RC2_KEY, NID_rc2, |
| 86 | 8, | 85 | 8, |
| 87 | RC2_KEY_LENGTH, 8, 64, | 86 | RC2_KEY_LENGTH, 8, 64, |
| 88 | EVP_CIPH_VARIABLE_LENGTH | EVP_CIPH_CTRL_INIT, | 87 | EVP_CIPH_VARIABLE_LENGTH | EVP_CIPH_CTRL_INIT, |
| 89 | rc2_init_key, NULL, | 88 | rc2_init_key, NULL, |
| 90 | rc2_set_asn1_type_and_iv, rc2_get_asn1_type_and_iv, | 89 | rc2_set_asn1_type_and_iv, rc2_get_asn1_type_and_iv, |
| 91 | rc2_ctrl) | 90 | rc2_ctrl) |
| 92 | 91 | ||
| 93 | #define RC2_40_MAGIC 0xa0 | 92 | #define RC2_40_MAGIC 0xa0 |
| 94 | #define RC2_64_MAGIC 0x78 | 93 | #define RC2_64_MAGIC 0x78 |
| 95 | #define RC2_128_MAGIC 0x3a | 94 | #define RC2_128_MAGIC 0x3a |
| 96 | 95 | ||
| 97 | static const EVP_CIPHER r2_64_cbc_cipher= | 96 | static const EVP_CIPHER r2_64_cbc_cipher = { |
| 98 | { | ||
| 99 | NID_rc2_64_cbc, | 97 | NID_rc2_64_cbc, |
| 100 | 8,8 /* 64 bit */,8, | 98 | 8, 8 /* 64 bit */, 8, |
| 101 | EVP_CIPH_CBC_MODE | EVP_CIPH_VARIABLE_LENGTH | EVP_CIPH_CTRL_INIT, | 99 | EVP_CIPH_CBC_MODE | EVP_CIPH_VARIABLE_LENGTH | EVP_CIPH_CTRL_INIT, |
| 102 | rc2_init_key, | 100 | rc2_init_key, |
| 103 | rc2_cbc_cipher, | 101 | rc2_cbc_cipher, |
| @@ -107,12 +105,11 @@ static const EVP_CIPHER r2_64_cbc_cipher= | |||
| 107 | rc2_get_asn1_type_and_iv, | 105 | rc2_get_asn1_type_and_iv, |
| 108 | rc2_ctrl, | 106 | rc2_ctrl, |
| 109 | NULL | 107 | NULL |
| 110 | }; | 108 | }; |
| 111 | 109 | ||
| 112 | static const EVP_CIPHER r2_40_cbc_cipher= | 110 | static const EVP_CIPHER r2_40_cbc_cipher = { |
| 113 | { | ||
| 114 | NID_rc2_40_cbc, | 111 | NID_rc2_40_cbc, |
| 115 | 8,5 /* 40 bit */,8, | 112 | 8, 5 /* 40 bit */, 8, |
| 116 | EVP_CIPH_CBC_MODE | EVP_CIPH_VARIABLE_LENGTH | EVP_CIPH_CTRL_INIT, | 113 | EVP_CIPH_CBC_MODE | EVP_CIPH_VARIABLE_LENGTH | EVP_CIPH_CTRL_INIT, |
| 117 | rc2_init_key, | 114 | rc2_init_key, |
| 118 | rc2_cbc_cipher, | 115 | rc2_cbc_cipher, |
| @@ -122,93 +119,105 @@ static const EVP_CIPHER r2_40_cbc_cipher= | |||
| 122 | rc2_get_asn1_type_and_iv, | 119 | rc2_get_asn1_type_and_iv, |
| 123 | rc2_ctrl, | 120 | rc2_ctrl, |
| 124 | NULL | 121 | NULL |
| 125 | }; | 122 | }; |
| 126 | 123 | ||
| 127 | const EVP_CIPHER *EVP_rc2_64_cbc(void) | 124 | const EVP_CIPHER * |
| 128 | { | 125 | EVP_rc2_64_cbc(void) |
| 129 | return(&r2_64_cbc_cipher); | 126 | { |
| 130 | } | 127 | return (&r2_64_cbc_cipher); |
| 131 | 128 | } | |
| 132 | const EVP_CIPHER *EVP_rc2_40_cbc(void) | 129 | |
| 133 | { | 130 | const EVP_CIPHER * |
| 134 | return(&r2_40_cbc_cipher); | 131 | EVP_rc2_40_cbc(void) |
| 135 | } | 132 | { |
| 136 | 133 | return (&r2_40_cbc_cipher); | |
| 137 | static int rc2_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 134 | } |
| 138 | const unsigned char *iv, int enc) | 135 | |
| 139 | { | 136 | static int |
| 140 | RC2_set_key(&data(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx), | 137 | rc2_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 141 | key,data(ctx)->key_bits); | 138 | const unsigned char *iv, int enc) |
| 139 | { | ||
| 140 | RC2_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx), | ||
| 141 | key, data(ctx)->key_bits); | ||
| 142 | return 1; | 142 | return 1; |
| 143 | } | 143 | } |
| 144 | 144 | ||
| 145 | static int rc2_meth_to_magic(EVP_CIPHER_CTX *e) | 145 | static int |
| 146 | { | 146 | rc2_meth_to_magic(EVP_CIPHER_CTX *e) |
| 147 | { | ||
| 147 | int i; | 148 | int i; |
| 148 | 149 | ||
| 149 | EVP_CIPHER_CTX_ctrl(e, EVP_CTRL_GET_RC2_KEY_BITS, 0, &i); | 150 | EVP_CIPHER_CTX_ctrl(e, EVP_CTRL_GET_RC2_KEY_BITS, 0, &i); |
| 150 | if (i == 128) return(RC2_128_MAGIC); | 151 | if (i == 128) |
| 151 | else if (i == 64) return(RC2_64_MAGIC); | 152 | return (RC2_128_MAGIC); |
| 152 | else if (i == 40) return(RC2_40_MAGIC); | 153 | else if (i == 64) |
| 153 | else return(0); | 154 | return (RC2_64_MAGIC); |
| 154 | } | 155 | else if (i == 40) |
| 155 | 156 | return (RC2_40_MAGIC); | |
| 156 | static int rc2_magic_to_meth(int i) | ||
| 157 | { | ||
| 158 | if (i == RC2_128_MAGIC) return 128; | ||
| 159 | else if (i == RC2_64_MAGIC) return 64; | ||
| 160 | else if (i == RC2_40_MAGIC) return 40; | ||
| 161 | else | 157 | else |
| 162 | { | 158 | return (0); |
| 163 | EVPerr(EVP_F_RC2_MAGIC_TO_METH,EVP_R_UNSUPPORTED_KEY_SIZE); | 159 | } |
| 164 | return(0); | 160 | |
| 165 | } | 161 | static int |
| 162 | rc2_magic_to_meth(int i) | ||
| 163 | { | ||
| 164 | if (i == RC2_128_MAGIC) | ||
| 165 | return 128; | ||
| 166 | else if (i == RC2_64_MAGIC) | ||
| 167 | return 64; | ||
| 168 | else if (i == RC2_40_MAGIC) | ||
| 169 | return 40; | ||
| 170 | else { | ||
| 171 | EVPerr(EVP_F_RC2_MAGIC_TO_METH, EVP_R_UNSUPPORTED_KEY_SIZE); | ||
| 172 | return (0); | ||
| 166 | } | 173 | } |
| 174 | } | ||
| 167 | 175 | ||
| 168 | static int rc2_get_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | 176 | static int |
| 169 | { | 177 | rc2_get_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
| 170 | long num=0; | 178 | { |
| 171 | int i=0; | 179 | long num = 0; |
| 180 | int i = 0; | ||
| 172 | int key_bits; | 181 | int key_bits; |
| 173 | unsigned int l; | 182 | unsigned int l; |
| 174 | unsigned char iv[EVP_MAX_IV_LENGTH]; | 183 | unsigned char iv[EVP_MAX_IV_LENGTH]; |
| 175 | 184 | ||
| 176 | if (type != NULL) | 185 | if (type != NULL) { |
| 177 | { | 186 | l = EVP_CIPHER_CTX_iv_length(c); |
| 178 | l=EVP_CIPHER_CTX_iv_length(c); | ||
| 179 | OPENSSL_assert(l <= sizeof(iv)); | 187 | OPENSSL_assert(l <= sizeof(iv)); |
| 180 | i=ASN1_TYPE_get_int_octetstring(type,&num,iv,l); | 188 | i = ASN1_TYPE_get_int_octetstring(type, &num, iv, l); |
| 181 | if (i != (int)l) | 189 | if (i != (int)l) |
| 182 | return(-1); | 190 | return (-1); |
| 183 | key_bits =rc2_magic_to_meth((int)num); | 191 | key_bits = rc2_magic_to_meth((int)num); |
| 184 | if (!key_bits) | 192 | if (!key_bits) |
| 185 | return(-1); | 193 | return (-1); |
| 186 | if(i > 0 && !EVP_CipherInit_ex(c, NULL, NULL, NULL, iv, -1)) | 194 | if (i > 0 && !EVP_CipherInit_ex(c, NULL, NULL, NULL, iv, -1)) |
| 187 | return -1; | 195 | return -1; |
| 188 | EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_RC2_KEY_BITS, key_bits, NULL); | 196 | EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_RC2_KEY_BITS, |
| 197 | key_bits, NULL); | ||
| 189 | EVP_CIPHER_CTX_set_key_length(c, key_bits / 8); | 198 | EVP_CIPHER_CTX_set_key_length(c, key_bits / 8); |
| 190 | } | ||
| 191 | return(i); | ||
| 192 | } | 199 | } |
| 200 | return (i); | ||
| 201 | } | ||
| 193 | 202 | ||
| 194 | static int rc2_set_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | 203 | static int |
| 195 | { | 204 | rc2_set_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
| 205 | { | ||
| 196 | long num; | 206 | long num; |
| 197 | int i=0,j; | 207 | int i = 0, j; |
| 198 | 208 | ||
| 199 | if (type != NULL) | 209 | if (type != NULL) { |
| 200 | { | 210 | num = rc2_meth_to_magic(c); |
| 201 | num=rc2_meth_to_magic(c); | 211 | j = EVP_CIPHER_CTX_iv_length(c); |
| 202 | j=EVP_CIPHER_CTX_iv_length(c); | 212 | i = ASN1_TYPE_set_int_octetstring(type, num, c->oiv, j); |
| 203 | i=ASN1_TYPE_set_int_octetstring(type,num,c->oiv,j); | ||
| 204 | } | ||
| 205 | return(i); | ||
| 206 | } | 213 | } |
| 214 | return (i); | ||
| 215 | } | ||
| 207 | 216 | ||
| 208 | static int rc2_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | 217 | static int |
| 209 | { | 218 | rc2_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) |
| 210 | switch(type) | 219 | { |
| 211 | { | 220 | switch (type) { |
| 212 | case EVP_CTRL_INIT: | 221 | case EVP_CTRL_INIT: |
| 213 | data(c)->key_bits = EVP_CIPHER_CTX_key_length(c) * 8; | 222 | data(c)->key_bits = EVP_CIPHER_CTX_key_length(c) * 8; |
| 214 | return 1; | 223 | return 1; |
| @@ -216,14 +225,14 @@ static int rc2_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 216 | case EVP_CTRL_GET_RC2_KEY_BITS: | 225 | case EVP_CTRL_GET_RC2_KEY_BITS: |
| 217 | *(int *)ptr = data(c)->key_bits; | 226 | *(int *)ptr = data(c)->key_bits; |
| 218 | return 1; | 227 | return 1; |
| 219 | 228 | ||
| 220 | case EVP_CTRL_SET_RC2_KEY_BITS: | 229 | case EVP_CTRL_SET_RC2_KEY_BITS: |
| 221 | if(arg > 0) | 230 | if (arg > 0) { |
| 222 | { | ||
| 223 | data(c)->key_bits = arg; | 231 | data(c)->key_bits = arg; |
| 224 | return 1; | 232 | return 1; |
| 225 | } | 233 | } |
| 226 | return 0; | 234 | return 0; |
| 235 | |||
| 227 | #ifdef PBE_PRF_TEST | 236 | #ifdef PBE_PRF_TEST |
| 228 | case EVP_CTRL_PBE_PRF_NID: | 237 | case EVP_CTRL_PBE_PRF_NID: |
| 229 | *(int *)ptr = NID_hmacWithMD5; | 238 | *(int *)ptr = NID_hmacWithMD5; |
| @@ -232,7 +241,7 @@ static int rc2_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 232 | 241 | ||
| 233 | default: | 242 | default: |
| 234 | return -1; | 243 | return -1; |
| 235 | } | ||
| 236 | } | 244 | } |
| 245 | } | ||
| 237 | 246 | ||
| 238 | #endif | 247 | #endif |
diff --git a/src/lib/libcrypto/evp/e_rc4.c b/src/lib/libcrypto/evp/e_rc4.c index b4f6bda82d..f66885f70d 100644 --- a/src/lib/libcrypto/evp/e_rc4.c +++ b/src/lib/libcrypto/evp/e_rc4.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -69,21 +69,20 @@ | |||
| 69 | /* FIXME: surely this is available elsewhere? */ | 69 | /* FIXME: surely this is available elsewhere? */ |
| 70 | #define EVP_RC4_KEY_SIZE 16 | 70 | #define EVP_RC4_KEY_SIZE 16 |
| 71 | 71 | ||
| 72 | typedef struct | 72 | typedef struct { |
| 73 | { | ||
| 74 | RC4_KEY ks; /* working key */ | 73 | RC4_KEY ks; /* working key */ |
| 75 | } EVP_RC4_KEY; | 74 | } EVP_RC4_KEY; |
| 76 | 75 | ||
| 77 | #define data(ctx) ((EVP_RC4_KEY *)(ctx)->cipher_data) | 76 | #define data(ctx) ((EVP_RC4_KEY *)(ctx)->cipher_data) |
| 78 | 77 | ||
| 79 | static int rc4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 78 | static int rc4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 80 | const unsigned char *iv,int enc); | 79 | const unsigned char *iv, int enc); |
| 81 | static int rc4_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 80 | static int rc4_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 82 | const unsigned char *in, size_t inl); | 81 | const unsigned char *in, size_t inl); |
| 83 | static const EVP_CIPHER r4_cipher= | 82 | |
| 84 | { | 83 | static const EVP_CIPHER r4_cipher = { |
| 85 | NID_rc4, | 84 | NID_rc4, |
| 86 | 1,EVP_RC4_KEY_SIZE,0, | 85 | 1, EVP_RC4_KEY_SIZE, 0, |
| 87 | EVP_CIPH_VARIABLE_LENGTH, | 86 | EVP_CIPH_VARIABLE_LENGTH, |
| 88 | rc4_init_key, | 87 | rc4_init_key, |
| 89 | rc4_cipher, | 88 | rc4_cipher, |
| @@ -93,45 +92,47 @@ static const EVP_CIPHER r4_cipher= | |||
| 93 | NULL, | 92 | NULL, |
| 94 | NULL, | 93 | NULL, |
| 95 | NULL | 94 | NULL |
| 96 | }; | 95 | }; |
| 97 | 96 | ||
| 98 | static const EVP_CIPHER r4_40_cipher= | 97 | static const EVP_CIPHER r4_40_cipher = { |
| 99 | { | ||
| 100 | NID_rc4_40, | 98 | NID_rc4_40, |
| 101 | 1,5 /* 40 bit */,0, | 99 | 1, 5 /* 40 bit */, 0, |
| 102 | EVP_CIPH_VARIABLE_LENGTH, | 100 | EVP_CIPH_VARIABLE_LENGTH, |
| 103 | rc4_init_key, | 101 | rc4_init_key, |
| 104 | rc4_cipher, | 102 | rc4_cipher, |
| 105 | NULL, | 103 | NULL, |
| 106 | sizeof(EVP_RC4_KEY), | 104 | sizeof(EVP_RC4_KEY), |
| 107 | NULL, | 105 | NULL, |
| 108 | NULL, | 106 | NULL, |
| 109 | NULL, | 107 | NULL, |
| 110 | NULL | 108 | NULL |
| 111 | }; | 109 | }; |
| 112 | 110 | ||
| 113 | const EVP_CIPHER *EVP_rc4(void) | 111 | const EVP_CIPHER * |
| 114 | { | 112 | EVP_rc4(void) |
| 115 | return(&r4_cipher); | 113 | { |
| 116 | } | 114 | return (&r4_cipher); |
| 115 | } | ||
| 117 | 116 | ||
| 118 | const EVP_CIPHER *EVP_rc4_40(void) | 117 | const EVP_CIPHER * |
| 119 | { | 118 | EVP_rc4_40(void) |
| 120 | return(&r4_40_cipher); | 119 | { |
| 121 | } | 120 | return (&r4_40_cipher); |
| 121 | } | ||
| 122 | 122 | ||
| 123 | static int rc4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 123 | static int |
| 124 | const unsigned char *iv, int enc) | 124 | rc4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 125 | { | 125 | const unsigned char *iv, int enc) |
| 126 | RC4_set_key(&data(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx), | 126 | { |
| 127 | key); | 127 | RC4_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx), key); |
| 128 | return 1; | 128 | return 1; |
| 129 | } | 129 | } |
| 130 | 130 | ||
| 131 | static int rc4_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 131 | static int |
| 132 | const unsigned char *in, size_t inl) | 132 | rc4_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 133 | { | 133 | const unsigned char *in, size_t inl) |
| 134 | RC4(&data(ctx)->ks,inl,in,out); | 134 | { |
| 135 | RC4(&data(ctx)->ks, inl, in, out); | ||
| 135 | return 1; | 136 | return 1; |
| 136 | } | 137 | } |
| 137 | #endif | 138 | #endif |
diff --git a/src/lib/libcrypto/evp/e_rc4_hmac_md5.c b/src/lib/libcrypto/evp/e_rc4_hmac_md5.c index 56563191ba..d4655c56d9 100644 --- a/src/lib/libcrypto/evp/e_rc4_hmac_md5.c +++ b/src/lib/libcrypto/evp/e_rc4_hmac_md5.c | |||
| @@ -68,37 +68,35 @@ | |||
| 68 | /* FIXME: surely this is available elsewhere? */ | 68 | /* FIXME: surely this is available elsewhere? */ |
| 69 | #define EVP_RC4_KEY_SIZE 16 | 69 | #define EVP_RC4_KEY_SIZE 16 |
| 70 | 70 | ||
| 71 | typedef struct | 71 | typedef struct { |
| 72 | { | 72 | RC4_KEY ks; |
| 73 | RC4_KEY ks; | 73 | MD5_CTX head, tail, md; |
| 74 | MD5_CTX head,tail,md; | 74 | size_t payload_length; |
| 75 | size_t payload_length; | 75 | } EVP_RC4_HMAC_MD5; |
| 76 | } EVP_RC4_HMAC_MD5; | ||
| 77 | 76 | ||
| 78 | #define NO_PAYLOAD_LENGTH ((size_t)-1) | 77 | #define NO_PAYLOAD_LENGTH ((size_t)-1) |
| 79 | 78 | ||
| 80 | void rc4_md5_enc (RC4_KEY *key, const void *in0, void *out, | 79 | void rc4_md5_enc (RC4_KEY *key, const void *in0, void *out, |
| 81 | MD5_CTX *ctx,const void *inp,size_t blocks); | 80 | MD5_CTX *ctx, const void *inp, size_t blocks); |
| 82 | 81 | ||
| 83 | #define data(ctx) ((EVP_RC4_HMAC_MD5 *)(ctx)->cipher_data) | 82 | #define data(ctx) ((EVP_RC4_HMAC_MD5 *)(ctx)->cipher_data) |
| 84 | 83 | ||
| 85 | static int rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, | 84 | static int |
| 86 | const unsigned char *inkey, | 85 | rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, |
| 87 | const unsigned char *iv, int enc) | 86 | const unsigned char *iv, int enc) |
| 88 | { | 87 | { |
| 89 | EVP_RC4_HMAC_MD5 *key = data(ctx); | 88 | EVP_RC4_HMAC_MD5 *key = data(ctx); |
| 90 | 89 | ||
| 91 | RC4_set_key(&key->ks,EVP_CIPHER_CTX_key_length(ctx), | 90 | RC4_set_key(&key->ks, EVP_CIPHER_CTX_key_length(ctx), inkey); |
| 92 | inkey); | ||
| 93 | 91 | ||
| 94 | MD5_Init(&key->head); /* handy when benchmarking */ | 92 | MD5_Init(&key->head); /* handy when benchmarking */ |
| 95 | key->tail = key->head; | 93 | key->tail = key->head; |
| 96 | key->md = key->head; | 94 | key->md = key->head; |
| 97 | 95 | ||
| 98 | key->payload_length = NO_PAYLOAD_LENGTH; | 96 | key->payload_length = NO_PAYLOAD_LENGTH; |
| 99 | 97 | ||
| 100 | return 1; | 98 | return 1; |
| 101 | } | 99 | } |
| 102 | 100 | ||
| 103 | #if !defined(OPENSSL_NO_ASM) && ( \ | 101 | #if !defined(OPENSSL_NO_ASM) && ( \ |
| 104 | defined(__x86_64) || defined(__x86_64__) || \ | 102 | defined(__x86_64) || defined(__x86_64__) || \ |
| @@ -113,173 +111,184 @@ static int rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, | |||
| 113 | #define md5_off 0 | 111 | #define md5_off 0 |
| 114 | #endif | 112 | #endif |
| 115 | 113 | ||
| 116 | static int rc4_hmac_md5_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 114 | static int |
| 117 | const unsigned char *in, size_t len) | 115 | rc4_hmac_md5_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 118 | { | 116 | const unsigned char *in, size_t len) |
| 117 | { | ||
| 119 | EVP_RC4_HMAC_MD5 *key = data(ctx); | 118 | EVP_RC4_HMAC_MD5 *key = data(ctx); |
| 120 | #if defined(STITCHED_CALL) | 119 | #if defined(STITCHED_CALL) |
| 121 | size_t rc4_off = 32-1-(key->ks.x&(32-1)), /* 32 is $MOD from rc4_md5-x86_64.pl */ | 120 | size_t rc4_off = 32-1-(key->ks.x&(32-1)), /* 32 is $MOD from rc4_md5-x86_64.pl */ |
| 122 | md5_off = MD5_CBLOCK-key->md.num, | 121 | md5_off = MD5_CBLOCK - key->md.num, |
| 123 | blocks; | 122 | blocks; |
| 124 | unsigned int l; | 123 | unsigned int l; |
| 125 | extern unsigned int OPENSSL_ia32cap_P[]; | 124 | extern unsigned int OPENSSL_ia32cap_P[]; |
| 126 | #endif | 125 | #endif |
| 127 | size_t plen = key->payload_length; | 126 | size_t plen = key->payload_length; |
| 128 | 127 | ||
| 129 | if (plen!=NO_PAYLOAD_LENGTH && len!=(plen+MD5_DIGEST_LENGTH)) return 0; | 128 | if (plen != NO_PAYLOAD_LENGTH && len != (plen + MD5_DIGEST_LENGTH)) |
| 129 | return 0; | ||
| 130 | 130 | ||
| 131 | if (ctx->encrypt) { | 131 | if (ctx->encrypt) { |
| 132 | if (plen==NO_PAYLOAD_LENGTH) plen = len; | 132 | if (plen == NO_PAYLOAD_LENGTH) |
| 133 | plen = len; | ||
| 133 | #if defined(STITCHED_CALL) | 134 | #if defined(STITCHED_CALL) |
| 134 | /* cipher has to "fall behind" */ | 135 | /* cipher has to "fall behind" */ |
| 135 | if (rc4_off>md5_off) md5_off+=MD5_CBLOCK; | 136 | if (rc4_off > md5_off) |
| 137 | md5_off += MD5_CBLOCK; | ||
| 136 | 138 | ||
| 137 | if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK) && | 139 | if (plen > md5_off && |
| 138 | (OPENSSL_ia32cap_P[0]&(1<<20))==0) { | 140 | (blocks = (plen - md5_off) / MD5_CBLOCK) && |
| 139 | MD5_Update(&key->md,in,md5_off); | 141 | (OPENSSL_ia32cap_P[0]&(1 << 20)) == 0) { |
| 140 | RC4(&key->ks,rc4_off,in,out); | 142 | MD5_Update(&key->md, in, md5_off); |
| 143 | RC4(&key->ks, rc4_off, in, out); | ||
| 141 | 144 | ||
| 142 | rc4_md5_enc(&key->ks,in+rc4_off,out+rc4_off, | 145 | rc4_md5_enc(&key->ks, in + rc4_off, out + rc4_off, |
| 143 | &key->md,in+md5_off,blocks); | 146 | &key->md, in + md5_off, blocks); |
| 144 | blocks *= MD5_CBLOCK; | 147 | blocks *= MD5_CBLOCK; |
| 145 | rc4_off += blocks; | 148 | rc4_off += blocks; |
| 146 | md5_off += blocks; | 149 | md5_off += blocks; |
| 147 | key->md.Nh += blocks>>29; | 150 | key->md.Nh += blocks >> 29; |
| 148 | key->md.Nl += blocks<<=3; | 151 | key->md.Nl += blocks <<= 3; |
| 149 | if (key->md.Nl<(unsigned int)blocks) key->md.Nh++; | 152 | if (key->md.Nl < (unsigned int)blocks) |
| 153 | key->md.Nh++; | ||
| 150 | } else { | 154 | } else { |
| 151 | rc4_off = 0; | 155 | rc4_off = 0; |
| 152 | md5_off = 0; | 156 | md5_off = 0; |
| 153 | } | 157 | } |
| 154 | #endif | 158 | #endif |
| 155 | MD5_Update(&key->md,in+md5_off,plen-md5_off); | 159 | MD5_Update(&key->md, in + md5_off, plen - md5_off); |
| 156 | 160 | ||
| 157 | if (plen!=len) { /* "TLS" mode of operation */ | 161 | if (plen!=len) { /* "TLS" mode of operation */ |
| 158 | if (in!=out) | 162 | if (in != out) |
| 159 | memcpy(out+rc4_off,in+rc4_off,plen-rc4_off); | 163 | memcpy(out + rc4_off, in + rc4_off, |
| 164 | plen - rc4_off); | ||
| 160 | 165 | ||
| 161 | /* calculate HMAC and append it to payload */ | 166 | /* calculate HMAC and append it to payload */ |
| 162 | MD5_Final(out+plen,&key->md); | 167 | MD5_Final(out + plen, &key->md); |
| 163 | key->md = key->tail; | 168 | key->md = key->tail; |
| 164 | MD5_Update(&key->md,out+plen,MD5_DIGEST_LENGTH); | 169 | MD5_Update(&key->md, out + plen, MD5_DIGEST_LENGTH); |
| 165 | MD5_Final(out+plen,&key->md); | 170 | MD5_Final(out + plen, &key->md); |
| 171 | |||
| 166 | /* encrypt HMAC at once */ | 172 | /* encrypt HMAC at once */ |
| 167 | RC4(&key->ks,len-rc4_off,out+rc4_off,out+rc4_off); | 173 | RC4(&key->ks, len - rc4_off, out + rc4_off, |
| 174 | out + rc4_off); | ||
| 168 | } else { | 175 | } else { |
| 169 | RC4(&key->ks,len-rc4_off,in+rc4_off,out+rc4_off); | 176 | RC4(&key->ks, len - rc4_off, in + rc4_off, |
| 177 | out + rc4_off); | ||
| 170 | } | 178 | } |
| 171 | } else { | 179 | } else { |
| 172 | unsigned char mac[MD5_DIGEST_LENGTH]; | 180 | unsigned char mac[MD5_DIGEST_LENGTH]; |
| 173 | #if defined(STITCHED_CALL) | 181 | #if defined(STITCHED_CALL) |
| 174 | /* digest has to "fall behind" */ | 182 | /* digest has to "fall behind" */ |
| 175 | if (md5_off>rc4_off) rc4_off += 2*MD5_CBLOCK; | 183 | if (md5_off > rc4_off) |
| 176 | else rc4_off += MD5_CBLOCK; | 184 | rc4_off += 2*MD5_CBLOCK; |
| 177 | 185 | else | |
| 178 | if (len>rc4_off && (blocks=(len-rc4_off)/MD5_CBLOCK) && | 186 | rc4_off += MD5_CBLOCK; |
| 179 | (OPENSSL_ia32cap_P[0]&(1<<20))==0) { | 187 | |
| 180 | RC4(&key->ks,rc4_off,in,out); | 188 | if (len > rc4_off && (blocks = (len - rc4_off) / MD5_CBLOCK) && |
| 181 | MD5_Update(&key->md,out,md5_off); | 189 | (OPENSSL_ia32cap_P[0] & (1 << 20)) == 0) { |
| 182 | 190 | RC4(&key->ks, rc4_off, in, out); | |
| 183 | rc4_md5_enc(&key->ks,in+rc4_off,out+rc4_off, | 191 | MD5_Update(&key->md, out, md5_off); |
| 184 | &key->md,out+md5_off,blocks); | 192 | |
| 193 | rc4_md5_enc(&key->ks, in + rc4_off, out + rc4_off, | ||
| 194 | &key->md, out + md5_off, blocks); | ||
| 185 | blocks *= MD5_CBLOCK; | 195 | blocks *= MD5_CBLOCK; |
| 186 | rc4_off += blocks; | 196 | rc4_off += blocks; |
| 187 | md5_off += blocks; | 197 | md5_off += blocks; |
| 188 | l = (key->md.Nl+(blocks<<3))&0xffffffffU; | 198 | l = (key->md.Nl + (blocks << 3)) & 0xffffffffU; |
| 189 | if (l<key->md.Nl) key->md.Nh++; | 199 | if (l < key->md.Nl) |
| 190 | key->md.Nl = l; | 200 | key->md.Nh++; |
| 191 | key->md.Nh += blocks>>29; | 201 | key->md.Nl = l; |
| 202 | key->md.Nh += blocks >> 29; | ||
| 192 | } else { | 203 | } else { |
| 193 | md5_off=0; | 204 | md5_off = 0; |
| 194 | rc4_off=0; | 205 | rc4_off = 0; |
| 195 | } | 206 | } |
| 196 | #endif | 207 | #endif |
| 197 | /* decrypt HMAC at once */ | 208 | /* decrypt HMAC at once */ |
| 198 | RC4(&key->ks,len-rc4_off,in+rc4_off,out+rc4_off); | 209 | RC4(&key->ks, len - rc4_off, in + rc4_off, out + rc4_off); |
| 199 | if (plen!=NO_PAYLOAD_LENGTH) { /* "TLS" mode of operation */ | 210 | if (plen!=NO_PAYLOAD_LENGTH) { /* "TLS" mode of operation */ |
| 200 | MD5_Update(&key->md,out+md5_off,plen-md5_off); | 211 | MD5_Update(&key->md, out + md5_off, plen - md5_off); |
| 201 | 212 | ||
| 202 | /* calculate HMAC and verify it */ | 213 | /* calculate HMAC and verify it */ |
| 203 | MD5_Final(mac,&key->md); | 214 | MD5_Final(mac, &key->md); |
| 204 | key->md = key->tail; | 215 | key->md = key->tail; |
| 205 | MD5_Update(&key->md,mac,MD5_DIGEST_LENGTH); | 216 | MD5_Update(&key->md, mac, MD5_DIGEST_LENGTH); |
| 206 | MD5_Final(mac,&key->md); | 217 | MD5_Final(mac, &key->md); |
| 207 | 218 | ||
| 208 | if (memcmp(out+plen,mac,MD5_DIGEST_LENGTH)) | 219 | if (memcmp(out + plen, mac, MD5_DIGEST_LENGTH)) |
| 209 | return 0; | 220 | return 0; |
| 210 | } else { | 221 | } else { |
| 211 | MD5_Update(&key->md,out+md5_off,len-md5_off); | 222 | MD5_Update(&key->md, out + md5_off, len - md5_off); |
| 212 | } | 223 | } |
| 213 | } | 224 | } |
| 214 | 225 | ||
| 215 | key->payload_length = NO_PAYLOAD_LENGTH; | 226 | key->payload_length = NO_PAYLOAD_LENGTH; |
| 216 | 227 | ||
| 217 | return 1; | 228 | return 1; |
| 218 | } | 229 | } |
| 219 | 230 | ||
| 220 | static int rc4_hmac_md5_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | 231 | static int |
| 221 | { | 232 | rc4_hmac_md5_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) |
| 233 | { | ||
| 222 | EVP_RC4_HMAC_MD5 *key = data(ctx); | 234 | EVP_RC4_HMAC_MD5 *key = data(ctx); |
| 223 | 235 | ||
| 224 | switch (type) | 236 | switch (type) { |
| 225 | { | ||
| 226 | case EVP_CTRL_AEAD_SET_MAC_KEY: | 237 | case EVP_CTRL_AEAD_SET_MAC_KEY: |
| 227 | { | 238 | { |
| 228 | unsigned int i; | 239 | unsigned int i; |
| 229 | unsigned char hmac_key[64]; | 240 | unsigned char hmac_key[64]; |
| 230 | 241 | ||
| 231 | memset (hmac_key,0,sizeof(hmac_key)); | 242 | memset (hmac_key, 0, sizeof(hmac_key)); |
| 232 | 243 | ||
| 233 | if (arg > (int)sizeof(hmac_key)) { | 244 | if (arg > (int)sizeof(hmac_key)) { |
| 234 | MD5_Init(&key->head); | 245 | MD5_Init(&key->head); |
| 235 | MD5_Update(&key->head,ptr,arg); | 246 | MD5_Update(&key->head, ptr, arg); |
| 236 | MD5_Final(hmac_key,&key->head); | 247 | MD5_Final(hmac_key, &key->head); |
| 237 | } else { | 248 | } else { |
| 238 | memcpy(hmac_key,ptr,arg); | 249 | memcpy(hmac_key, ptr, arg); |
| 239 | } | 250 | } |
| 240 | 251 | ||
| 241 | for (i=0;i<sizeof(hmac_key);i++) | 252 | for (i = 0; i < sizeof(hmac_key); i++) |
| 242 | hmac_key[i] ^= 0x36; /* ipad */ | 253 | hmac_key[i] ^= 0x36; /* ipad */ |
| 243 | MD5_Init(&key->head); | 254 | MD5_Init(&key->head); |
| 244 | MD5_Update(&key->head,hmac_key,sizeof(hmac_key)); | 255 | MD5_Update(&key->head, hmac_key, sizeof(hmac_key)); |
| 245 | 256 | ||
| 246 | for (i=0;i<sizeof(hmac_key);i++) | 257 | for (i = 0; i < sizeof(hmac_key); i++) |
| 247 | hmac_key[i] ^= 0x36^0x5c; /* opad */ | 258 | hmac_key[i] ^= 0x36 ^ 0x5c; /* opad */ |
| 248 | MD5_Init(&key->tail); | 259 | MD5_Init(&key->tail); |
| 249 | MD5_Update(&key->tail,hmac_key,sizeof(hmac_key)); | 260 | MD5_Update(&key->tail, hmac_key, sizeof(hmac_key)); |
| 250 | 261 | ||
| 251 | return 1; | 262 | return 1; |
| 252 | } | 263 | } |
| 253 | case EVP_CTRL_AEAD_TLS1_AAD: | 264 | case EVP_CTRL_AEAD_TLS1_AAD: |
| 254 | { | 265 | { |
| 255 | unsigned char *p=ptr; | 266 | unsigned char *p = ptr; |
| 256 | unsigned int len=p[arg-2]<<8|p[arg-1]; | 267 | unsigned int len = p[arg - 2] << 8 | p[arg - 1]; |
| 257 | 268 | ||
| 258 | if (!ctx->encrypt) | 269 | if (!ctx->encrypt) { |
| 259 | { | 270 | len -= MD5_DIGEST_LENGTH; |
| 260 | len -= MD5_DIGEST_LENGTH; | 271 | p[arg - 2] = len >> 8; |
| 261 | p[arg-2] = len>>8; | 272 | p[arg - 1] = len; |
| 262 | p[arg-1] = len; | ||
| 263 | } | 273 | } |
| 264 | key->payload_length=len; | 274 | key->payload_length = len; |
| 265 | key->md = key->head; | 275 | key->md = key->head; |
| 266 | MD5_Update(&key->md,p,arg); | 276 | MD5_Update(&key->md, p, arg); |
| 267 | 277 | ||
| 268 | return MD5_DIGEST_LENGTH; | 278 | return MD5_DIGEST_LENGTH; |
| 269 | } | 279 | } |
| 270 | default: | 280 | default: |
| 271 | return -1; | 281 | return -1; |
| 272 | } | ||
| 273 | } | 282 | } |
| 283 | } | ||
| 274 | 284 | ||
| 275 | static EVP_CIPHER r4_hmac_md5_cipher= | 285 | static EVP_CIPHER r4_hmac_md5_cipher = { |
| 276 | { | ||
| 277 | #ifdef NID_rc4_hmac_md5 | 286 | #ifdef NID_rc4_hmac_md5 |
| 278 | NID_rc4_hmac_md5, | 287 | NID_rc4_hmac_md5, |
| 279 | #else | 288 | #else |
| 280 | NID_undef, | 289 | NID_undef, |
| 281 | #endif | 290 | #endif |
| 282 | 1,EVP_RC4_KEY_SIZE,0, | 291 | 1, EVP_RC4_KEY_SIZE, 0, |
| 283 | EVP_CIPH_STREAM_CIPHER|EVP_CIPH_VARIABLE_LENGTH|EVP_CIPH_FLAG_AEAD_CIPHER, | 292 | EVP_CIPH_STREAM_CIPHER|EVP_CIPH_VARIABLE_LENGTH|EVP_CIPH_FLAG_AEAD_CIPHER, |
| 284 | rc4_hmac_md5_init_key, | 293 | rc4_hmac_md5_init_key, |
| 285 | rc4_hmac_md5_cipher, | 294 | rc4_hmac_md5_cipher, |
| @@ -289,10 +298,11 @@ static EVP_CIPHER r4_hmac_md5_cipher= | |||
| 289 | NULL, | 298 | NULL, |
| 290 | rc4_hmac_md5_ctrl, | 299 | rc4_hmac_md5_ctrl, |
| 291 | NULL | 300 | NULL |
| 292 | }; | 301 | }; |
| 293 | 302 | ||
| 294 | const EVP_CIPHER *EVP_rc4_hmac_md5(void) | 303 | const EVP_CIPHER * |
| 295 | { | 304 | EVP_rc4_hmac_md5(void) |
| 296 | return(&r4_hmac_md5_cipher); | 305 | { |
| 297 | } | 306 | return (&r4_hmac_md5_cipher); |
| 307 | } | ||
| 298 | #endif | 308 | #endif |
diff --git a/src/lib/libcrypto/evp/e_rc5.c b/src/lib/libcrypto/evp/e_rc5.c index 19a10c6402..efbd03735e 100644 --- a/src/lib/libcrypto/evp/e_rc5.c +++ b/src/lib/libcrypto/evp/e_rc5.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -67,27 +67,26 @@ | |||
| 67 | #include <openssl/rc5.h> | 67 | #include <openssl/rc5.h> |
| 68 | 68 | ||
| 69 | static int r_32_12_16_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 69 | static int r_32_12_16_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 70 | const unsigned char *iv,int enc); | 70 | const unsigned char *iv, int enc); |
| 71 | static int rc5_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr); | 71 | static int rc5_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr); |
| 72 | 72 | ||
| 73 | typedef struct | 73 | typedef struct { |
| 74 | { | ||
| 75 | int rounds; /* number of rounds */ | 74 | int rounds; /* number of rounds */ |
| 76 | RC5_32_KEY ks; /* key schedule */ | 75 | RC5_32_KEY ks; /* key schedule */ |
| 77 | } EVP_RC5_KEY; | 76 | } EVP_RC5_KEY; |
| 78 | 77 | ||
| 79 | #define data(ctx) EVP_C_DATA(EVP_RC5_KEY,ctx) | 78 | #define data(ctx) EVP_C_DATA(EVP_RC5_KEY,ctx) |
| 80 | 79 | ||
| 81 | IMPLEMENT_BLOCK_CIPHER(rc5_32_12_16, ks, RC5_32, EVP_RC5_KEY, NID_rc5, | 80 | IMPLEMENT_BLOCK_CIPHER(rc5_32_12_16, ks, RC5_32, EVP_RC5_KEY, NID_rc5, |
| 82 | 8, RC5_32_KEY_LENGTH, 8, 64, | 81 | 8, RC5_32_KEY_LENGTH, 8, 64, |
| 83 | EVP_CIPH_VARIABLE_LENGTH | EVP_CIPH_CTRL_INIT, | 82 | EVP_CIPH_VARIABLE_LENGTH | EVP_CIPH_CTRL_INIT, |
| 84 | r_32_12_16_init_key, NULL, | 83 | r_32_12_16_init_key, NULL, |
| 85 | NULL, NULL, rc5_ctrl) | 84 | NULL, NULL, rc5_ctrl) |
| 86 | 85 | ||
| 87 | static int rc5_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | 86 | static int |
| 88 | { | 87 | rc5_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) |
| 89 | switch(type) | 88 | { |
| 90 | { | 89 | switch (type) { |
| 91 | case EVP_CTRL_INIT: | 90 | case EVP_CTRL_INIT: |
| 92 | data(c)->rounds = RC5_12_ROUNDS; | 91 | data(c)->rounds = RC5_12_ROUNDS; |
| 93 | return 1; | 92 | return 1; |
| @@ -95,10 +94,9 @@ static int rc5_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 95 | case EVP_CTRL_GET_RC5_ROUNDS: | 94 | case EVP_CTRL_GET_RC5_ROUNDS: |
| 96 | *(int *)ptr = data(c)->rounds; | 95 | *(int *)ptr = data(c)->rounds; |
| 97 | return 1; | 96 | return 1; |
| 98 | 97 | ||
| 99 | case EVP_CTRL_SET_RC5_ROUNDS: | 98 | case EVP_CTRL_SET_RC5_ROUNDS: |
| 100 | switch(arg) | 99 | switch (arg) { |
| 101 | { | ||
| 102 | case RC5_8_ROUNDS: | 100 | case RC5_8_ROUNDS: |
| 103 | case RC5_12_ROUNDS: | 101 | case RC5_12_ROUNDS: |
| 104 | case RC5_16_ROUNDS: | 102 | case RC5_16_ROUNDS: |
| @@ -106,21 +104,23 @@ static int rc5_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 106 | return 1; | 104 | return 1; |
| 107 | 105 | ||
| 108 | default: | 106 | default: |
| 109 | EVPerr(EVP_F_RC5_CTRL, EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS); | 107 | EVPerr(EVP_F_RC5_CTRL, |
| 108 | EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS); | ||
| 110 | return 0; | 109 | return 0; |
| 111 | } | 110 | } |
| 112 | 111 | ||
| 113 | default: | 112 | default: |
| 114 | return -1; | 113 | return -1; |
| 115 | } | ||
| 116 | } | 114 | } |
| 115 | } | ||
| 117 | 116 | ||
| 118 | static int r_32_12_16_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 117 | static int |
| 119 | const unsigned char *iv, int enc) | 118 | r_32_12_16_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 120 | { | 119 | const unsigned char *iv, int enc) |
| 121 | RC5_32_set_key(&data(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx), | 120 | { |
| 122 | key,data(ctx)->rounds); | 121 | RC5_32_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx), key, |
| 122 | data(ctx)->rounds); | ||
| 123 | return 1; | 123 | return 1; |
| 124 | } | 124 | } |
| 125 | 125 | ||
| 126 | #endif | 126 | #endif |
diff --git a/src/lib/libcrypto/evp/e_xcbc_d.c b/src/lib/libcrypto/evp/e_xcbc_d.c index 250e88c8c5..7313e4d225 100644 --- a/src/lib/libcrypto/evp/e_xcbc_d.c +++ b/src/lib/libcrypto/evp/e_xcbc_d.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -67,24 +67,22 @@ | |||
| 67 | #include <openssl/des.h> | 67 | #include <openssl/des.h> |
| 68 | 68 | ||
| 69 | static int desx_cbc_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 69 | static int desx_cbc_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 70 | const unsigned char *iv,int enc); | 70 | const unsigned char *iv, int enc); |
| 71 | static int desx_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 71 | static int desx_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 72 | const unsigned char *in, size_t inl); | 72 | const unsigned char *in, size_t inl); |
| 73 | 73 | ||
| 74 | 74 | ||
| 75 | typedef struct | 75 | typedef struct { |
| 76 | { | 76 | DES_key_schedule ks;/* key schedule */ |
| 77 | DES_key_schedule ks;/* key schedule */ | 77 | DES_cblock inw; |
| 78 | DES_cblock inw; | 78 | DES_cblock outw; |
| 79 | DES_cblock outw; | 79 | } DESX_CBC_KEY; |
| 80 | } DESX_CBC_KEY; | ||
| 81 | 80 | ||
| 82 | #define data(ctx) ((DESX_CBC_KEY *)(ctx)->cipher_data) | 81 | #define data(ctx) ((DESX_CBC_KEY *)(ctx)->cipher_data) |
| 83 | 82 | ||
| 84 | static const EVP_CIPHER d_xcbc_cipher= | 83 | static const EVP_CIPHER d_xcbc_cipher = { |
| 85 | { | ||
| 86 | NID_desx_cbc, | 84 | NID_desx_cbc, |
| 87 | 8,24,8, | 85 | 8, 24, 8, |
| 88 | EVP_CIPH_CBC_MODE, | 86 | EVP_CIPH_CBC_MODE, |
| 89 | desx_cbc_init_key, | 87 | desx_cbc_init_key, |
| 90 | desx_cbc_cipher, | 88 | desx_cbc_cipher, |
| @@ -94,45 +92,43 @@ static const EVP_CIPHER d_xcbc_cipher= | |||
| 94 | EVP_CIPHER_get_asn1_iv, | 92 | EVP_CIPHER_get_asn1_iv, |
| 95 | NULL, | 93 | NULL, |
| 96 | NULL | 94 | NULL |
| 97 | }; | 95 | }; |
| 98 | 96 | ||
| 99 | const EVP_CIPHER *EVP_desx_cbc(void) | 97 | const EVP_CIPHER * |
| 100 | { | 98 | EVP_desx_cbc(void) |
| 101 | return(&d_xcbc_cipher); | 99 | { |
| 102 | } | 100 | return (&d_xcbc_cipher); |
| 103 | 101 | } | |
| 104 | static int desx_cbc_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 102 | |
| 105 | const unsigned char *iv, int enc) | 103 | static int |
| 106 | { | 104 | desx_cbc_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 105 | const unsigned char *iv, int enc) | ||
| 106 | { | ||
| 107 | DES_cblock *deskey = (DES_cblock *)key; | 107 | DES_cblock *deskey = (DES_cblock *)key; |
| 108 | 108 | ||
| 109 | DES_set_key_unchecked(deskey,&data(ctx)->ks); | 109 | DES_set_key_unchecked(deskey, &data(ctx)->ks); |
| 110 | memcpy(&data(ctx)->inw[0],&key[8],8); | 110 | memcpy(&data(ctx)->inw[0], &key[8], 8); |
| 111 | memcpy(&data(ctx)->outw[0],&key[16],8); | 111 | memcpy(&data(ctx)->outw[0], &key[16], 8); |
| 112 | 112 | ||
| 113 | return 1; | 113 | return 1; |
| 114 | } | 114 | } |
| 115 | 115 | ||
| 116 | static int desx_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 116 | static int |
| 117 | const unsigned char *in, size_t inl) | 117 | desx_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 118 | { | 118 | const unsigned char *in, size_t inl) |
| 119 | while (inl>=EVP_MAXCHUNK) | 119 | { |
| 120 | { | 120 | while (inl >= EVP_MAXCHUNK) { |
| 121 | DES_xcbc_encrypt(in,out,(long)EVP_MAXCHUNK,&data(ctx)->ks, | 121 | DES_xcbc_encrypt(in, out, (long)EVP_MAXCHUNK, &data(ctx)->ks, |
| 122 | (DES_cblock *)&(ctx->iv[0]), | 122 | (DES_cblock *)&(ctx->iv[0]), &data(ctx)->inw, |
| 123 | &data(ctx)->inw, | 123 | &data(ctx)->outw, ctx->encrypt); |
| 124 | &data(ctx)->outw, | 124 | inl -= EVP_MAXCHUNK; |
| 125 | ctx->encrypt); | 125 | in += EVP_MAXCHUNK; |
| 126 | inl-=EVP_MAXCHUNK; | 126 | out += EVP_MAXCHUNK; |
| 127 | in +=EVP_MAXCHUNK; | 127 | } |
| 128 | out+=EVP_MAXCHUNK; | ||
| 129 | } | ||
| 130 | if (inl) | 128 | if (inl) |
| 131 | DES_xcbc_encrypt(in,out,(long)inl,&data(ctx)->ks, | 129 | DES_xcbc_encrypt(in, out, (long)inl, &data(ctx)->ks, |
| 132 | (DES_cblock *)&(ctx->iv[0]), | 130 | (DES_cblock *)&(ctx->iv[0]), &data(ctx)->inw, |
| 133 | &data(ctx)->inw, | 131 | &data(ctx)->outw, ctx->encrypt); |
| 134 | &data(ctx)->outw, | ||
| 135 | ctx->encrypt); | ||
| 136 | return 1; | 132 | return 1; |
| 137 | } | 133 | } |
| 138 | #endif | 134 | #endif |
diff --git a/src/lib/libssl/src/crypto/evp/e_aes.c b/src/lib/libssl/src/crypto/evp/e_aes.c index d6f0124a94..db0fdf85c8 100644 --- a/src/lib/libssl/src/crypto/evp/e_aes.c +++ b/src/lib/libssl/src/crypto/evp/e_aes.c | |||
| @@ -6,7 +6,7 @@ | |||
| 6 | * are met: | 6 | * are met: |
| 7 | * | 7 | * |
| 8 | * 1. Redistributions of source code must retain the above copyright | 8 | * 1. Redistributions of source code must retain the above copyright |
| 9 | * notice, this list of conditions and the following disclaimer. | 9 | * notice, this list of conditions and the following disclaimer. |
| 10 | * | 10 | * |
| 11 | * 2. Redistributions in binary form must reproduce the above copyright | 11 | * 2. Redistributions in binary form must reproduce the above copyright |
| 12 | * notice, this list of conditions and the following disclaimer in | 12 | * notice, this list of conditions and the following disclaimer in |
| @@ -60,18 +60,16 @@ | |||
| 60 | #include "modes_lcl.h" | 60 | #include "modes_lcl.h" |
| 61 | #include <openssl/rand.h> | 61 | #include <openssl/rand.h> |
| 62 | 62 | ||
| 63 | typedef struct | 63 | typedef struct { |
| 64 | { | ||
| 65 | AES_KEY ks; | 64 | AES_KEY ks; |
| 66 | block128_f block; | 65 | block128_f block; |
| 67 | union { | 66 | union { |
| 68 | cbc128_f cbc; | 67 | cbc128_f cbc; |
| 69 | ctr128_f ctr; | 68 | ctr128_f ctr; |
| 70 | } stream; | 69 | } stream; |
| 71 | } EVP_AES_KEY; | 70 | } EVP_AES_KEY; |
| 72 | 71 | ||
| 73 | typedef struct | 72 | typedef struct { |
| 74 | { | ||
| 75 | AES_KEY ks; /* AES key schedule to use */ | 73 | AES_KEY ks; /* AES key schedule to use */ |
| 76 | int key_set; /* Set if key initialised */ | 74 | int key_set; /* Set if key initialised */ |
| 77 | int iv_set; /* Set if an iv is set */ | 75 | int iv_set; /* Set if an iv is set */ |
| @@ -82,20 +80,17 @@ typedef struct | |||
| 82 | int iv_gen; /* It is OK to generate IVs */ | 80 | int iv_gen; /* It is OK to generate IVs */ |
| 83 | int tls_aad_len; /* TLS AAD length */ | 81 | int tls_aad_len; /* TLS AAD length */ |
| 84 | ctr128_f ctr; | 82 | ctr128_f ctr; |
| 85 | } EVP_AES_GCM_CTX; | 83 | } EVP_AES_GCM_CTX; |
| 86 | 84 | ||
| 87 | typedef struct | 85 | typedef struct { |
| 88 | { | ||
| 89 | AES_KEY ks1, ks2; /* AES key schedules to use */ | 86 | AES_KEY ks1, ks2; /* AES key schedules to use */ |
| 90 | XTS128_CONTEXT xts; | 87 | XTS128_CONTEXT xts; |
| 91 | void (*stream)(const unsigned char *in, | 88 | void (*stream)(const unsigned char *in, unsigned char *out, |
| 92 | unsigned char *out, size_t length, | 89 | size_t length, const AES_KEY *key1, const AES_KEY *key2, |
| 93 | const AES_KEY *key1, const AES_KEY *key2, | 90 | const unsigned char iv[16]); |
| 94 | const unsigned char iv[16]); | 91 | } EVP_AES_XTS_CTX; |
| 95 | } EVP_AES_XTS_CTX; | 92 | |
| 96 | 93 | typedef struct { | |
| 97 | typedef struct | ||
| 98 | { | ||
| 99 | AES_KEY ks; /* AES key schedule to use */ | 94 | AES_KEY ks; /* AES key schedule to use */ |
| 100 | int key_set; /* Set if key initialised */ | 95 | int key_set; /* Set if key initialised */ |
| 101 | int iv_set; /* Set if an iv is set */ | 96 | int iv_set; /* Set if an iv is set */ |
| @@ -104,53 +99,46 @@ typedef struct | |||
| 104 | int L, M; /* L and M parameters from RFC3610 */ | 99 | int L, M; /* L and M parameters from RFC3610 */ |
| 105 | CCM128_CONTEXT ccm; | 100 | CCM128_CONTEXT ccm; |
| 106 | ccm128_f str; | 101 | ccm128_f str; |
| 107 | } EVP_AES_CCM_CTX; | 102 | } EVP_AES_CCM_CTX; |
| 108 | 103 | ||
| 109 | #define MAXBITCHUNK ((size_t)1<<(sizeof(size_t)*8-4)) | 104 | #define MAXBITCHUNK ((size_t)1<<(sizeof(size_t)*8-4)) |
| 110 | 105 | ||
| 111 | #ifdef VPAES_ASM | 106 | #ifdef VPAES_ASM |
| 112 | int vpaes_set_encrypt_key(const unsigned char *userKey, int bits, | 107 | int vpaes_set_encrypt_key(const unsigned char *userKey, int bits, |
| 113 | AES_KEY *key); | 108 | AES_KEY *key); |
| 114 | int vpaes_set_decrypt_key(const unsigned char *userKey, int bits, | 109 | int vpaes_set_decrypt_key(const unsigned char *userKey, int bits, |
| 115 | AES_KEY *key); | 110 | AES_KEY *key); |
| 116 | 111 | ||
| 117 | void vpaes_encrypt(const unsigned char *in, unsigned char *out, | 112 | void vpaes_encrypt(const unsigned char *in, unsigned char *out, |
| 118 | const AES_KEY *key); | 113 | const AES_KEY *key); |
| 119 | void vpaes_decrypt(const unsigned char *in, unsigned char *out, | 114 | void vpaes_decrypt(const unsigned char *in, unsigned char *out, |
| 120 | const AES_KEY *key); | 115 | const AES_KEY *key); |
| 121 | 116 | ||
| 122 | void vpaes_cbc_encrypt(const unsigned char *in, | 117 | void vpaes_cbc_encrypt(const unsigned char *in, unsigned char *out, |
| 123 | unsigned char *out, | 118 | size_t length, const AES_KEY *key, unsigned char *ivec, int enc); |
| 124 | size_t length, | ||
| 125 | const AES_KEY *key, | ||
| 126 | unsigned char *ivec, int enc); | ||
| 127 | #endif | 119 | #endif |
| 128 | #ifdef BSAES_ASM | 120 | #ifdef BSAES_ASM |
| 129 | void bsaes_cbc_encrypt(const unsigned char *in, unsigned char *out, | 121 | void bsaes_cbc_encrypt(const unsigned char *in, unsigned char *out, |
| 130 | size_t length, const AES_KEY *key, | 122 | size_t length, const AES_KEY *key, unsigned char ivec[16], int enc); |
| 131 | unsigned char ivec[16], int enc); | ||
| 132 | void bsaes_ctr32_encrypt_blocks(const unsigned char *in, unsigned char *out, | 123 | void bsaes_ctr32_encrypt_blocks(const unsigned char *in, unsigned char *out, |
| 133 | size_t len, const AES_KEY *key, | 124 | size_t len, const AES_KEY *key, const unsigned char ivec[16]); |
| 134 | const unsigned char ivec[16]); | ||
| 135 | void bsaes_xts_encrypt(const unsigned char *inp, unsigned char *out, | 125 | void bsaes_xts_encrypt(const unsigned char *inp, unsigned char *out, |
| 136 | size_t len, const AES_KEY *key1, | 126 | size_t len, const AES_KEY *key1, const AES_KEY *key2, |
| 137 | const AES_KEY *key2, const unsigned char iv[16]); | 127 | const unsigned char iv[16]); |
| 138 | void bsaes_xts_decrypt(const unsigned char *inp, unsigned char *out, | 128 | void bsaes_xts_decrypt(const unsigned char *inp, unsigned char *out, |
| 139 | size_t len, const AES_KEY *key1, | 129 | size_t len, const AES_KEY *key1, const AES_KEY *key2, |
| 140 | const AES_KEY *key2, const unsigned char iv[16]); | 130 | const unsigned char iv[16]); |
| 141 | #endif | 131 | #endif |
| 142 | #ifdef AES_CTR_ASM | 132 | #ifdef AES_CTR_ASM |
| 143 | void AES_ctr32_encrypt(const unsigned char *in, unsigned char *out, | 133 | void AES_ctr32_encrypt(const unsigned char *in, unsigned char *out, |
| 144 | size_t blocks, const AES_KEY *key, | 134 | size_t blocks, const AES_KEY *key, |
| 145 | const unsigned char ivec[AES_BLOCK_SIZE]); | 135 | const unsigned char ivec[AES_BLOCK_SIZE]); |
| 146 | #endif | 136 | #endif |
| 147 | #ifdef AES_XTS_ASM | 137 | #ifdef AES_XTS_ASM |
| 148 | void AES_xts_encrypt(const char *inp,char *out,size_t len, | 138 | void AES_xts_encrypt(const char *inp, char *out, size_t len, |
| 149 | const AES_KEY *key1, const AES_KEY *key2, | 139 | const AES_KEY *key1, const AES_KEY *key2, const unsigned char iv[16]); |
| 150 | const unsigned char iv[16]); | 140 | void AES_xts_decrypt(const char *inp, char *out, size_t len, |
| 151 | void AES_xts_decrypt(const char *inp,char *out,size_t len, | 141 | const AES_KEY *key1, const AES_KEY *key2, const unsigned char iv[16]); |
| 152 | const AES_KEY *key1, const AES_KEY *key2, | ||
| 153 | const unsigned char iv[16]); | ||
| 154 | #endif | 142 | #endif |
| 155 | 143 | ||
| 156 | #if defined(AES_ASM) && !defined(I386_ONLY) && ( \ | 144 | #if defined(AES_ASM) && !defined(I386_ONLY) && ( \ |
| @@ -174,160 +162,142 @@ extern unsigned int OPENSSL_ia32cap_P[2]; | |||
| 174 | #define AESNI_CAPABLE (OPENSSL_ia32cap_P[1]&(1<<(57-32))) | 162 | #define AESNI_CAPABLE (OPENSSL_ia32cap_P[1]&(1<<(57-32))) |
| 175 | 163 | ||
| 176 | int aesni_set_encrypt_key(const unsigned char *userKey, int bits, | 164 | int aesni_set_encrypt_key(const unsigned char *userKey, int bits, |
| 177 | AES_KEY *key); | 165 | AES_KEY *key); |
| 178 | int aesni_set_decrypt_key(const unsigned char *userKey, int bits, | 166 | int aesni_set_decrypt_key(const unsigned char *userKey, int bits, |
| 179 | AES_KEY *key); | 167 | AES_KEY *key); |
| 180 | 168 | ||
| 181 | void aesni_encrypt(const unsigned char *in, unsigned char *out, | 169 | void aesni_encrypt(const unsigned char *in, unsigned char *out, |
| 182 | const AES_KEY *key); | 170 | const AES_KEY *key); |
| 183 | void aesni_decrypt(const unsigned char *in, unsigned char *out, | 171 | void aesni_decrypt(const unsigned char *in, unsigned char *out, |
| 184 | const AES_KEY *key); | 172 | const AES_KEY *key); |
| 185 | 173 | ||
| 186 | void aesni_ecb_encrypt(const unsigned char *in, | 174 | void aesni_ecb_encrypt(const unsigned char *in, unsigned char *out, |
| 187 | unsigned char *out, | 175 | size_t length, const AES_KEY *key, int enc); |
| 188 | size_t length, | 176 | void aesni_cbc_encrypt(const unsigned char *in, unsigned char *out, |
| 189 | const AES_KEY *key, | 177 | size_t length, const AES_KEY *key, unsigned char *ivec, int enc); |
| 190 | int enc); | 178 | |
| 191 | void aesni_cbc_encrypt(const unsigned char *in, | 179 | void aesni_ctr32_encrypt_blocks(const unsigned char *in, unsigned char *out, |
| 192 | unsigned char *out, | 180 | size_t blocks, const void *key, const unsigned char *ivec); |
| 193 | size_t length, | 181 | |
| 194 | const AES_KEY *key, | 182 | void aesni_xts_encrypt(const unsigned char *in, unsigned char *out, |
| 195 | unsigned char *ivec, int enc); | 183 | size_t length, const AES_KEY *key1, const AES_KEY *key2, |
| 196 | 184 | const unsigned char iv[16]); | |
| 197 | void aesni_ctr32_encrypt_blocks(const unsigned char *in, | 185 | |
| 198 | unsigned char *out, | 186 | void aesni_xts_decrypt(const unsigned char *in, unsigned char *out, |
| 199 | size_t blocks, | 187 | size_t length, const AES_KEY *key1, const AES_KEY *key2, |
| 200 | const void *key, | 188 | const unsigned char iv[16]); |
| 201 | const unsigned char *ivec); | 189 | |
| 202 | 190 | void aesni_ccm64_encrypt_blocks (const unsigned char *in, unsigned char *out, | |
| 203 | void aesni_xts_encrypt(const unsigned char *in, | 191 | size_t blocks, const void *key, const unsigned char ivec[16], |
| 204 | unsigned char *out, | 192 | unsigned char cmac[16]); |
| 205 | size_t length, | 193 | |
| 206 | const AES_KEY *key1, const AES_KEY *key2, | 194 | void aesni_ccm64_decrypt_blocks (const unsigned char *in, unsigned char *out, |
| 207 | const unsigned char iv[16]); | 195 | size_t blocks, const void *key, const unsigned char ivec[16], |
| 208 | 196 | unsigned char cmac[16]); | |
| 209 | void aesni_xts_decrypt(const unsigned char *in, | 197 | |
| 210 | unsigned char *out, | 198 | static int |
| 211 | size_t length, | 199 | aesni_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 212 | const AES_KEY *key1, const AES_KEY *key2, | 200 | const unsigned char *iv, int enc) |
| 213 | const unsigned char iv[16]); | 201 | { |
| 214 | |||
| 215 | void aesni_ccm64_encrypt_blocks (const unsigned char *in, | ||
| 216 | unsigned char *out, | ||
| 217 | size_t blocks, | ||
| 218 | const void *key, | ||
| 219 | const unsigned char ivec[16], | ||
| 220 | unsigned char cmac[16]); | ||
| 221 | |||
| 222 | void aesni_ccm64_decrypt_blocks (const unsigned char *in, | ||
| 223 | unsigned char *out, | ||
| 224 | size_t blocks, | ||
| 225 | const void *key, | ||
| 226 | const unsigned char ivec[16], | ||
| 227 | unsigned char cmac[16]); | ||
| 228 | |||
| 229 | static int aesni_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
| 230 | const unsigned char *iv, int enc) | ||
| 231 | { | ||
| 232 | int ret, mode; | 202 | int ret, mode; |
| 233 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | 203 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; |
| 234 | 204 | ||
| 235 | mode = ctx->cipher->flags & EVP_CIPH_MODE; | 205 | mode = ctx->cipher->flags & EVP_CIPH_MODE; |
| 236 | if ((mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE) | 206 | if ((mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE) && |
| 237 | && !enc) | 207 | !enc) { |
| 238 | { | 208 | ret = aesni_set_decrypt_key(key, ctx->key_len * 8, |
| 239 | ret = aesni_set_decrypt_key(key, ctx->key_len*8, ctx->cipher_data); | 209 | ctx->cipher_data); |
| 240 | dat->block = (block128_f)aesni_decrypt; | 210 | dat->block = (block128_f)aesni_decrypt; |
| 241 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | 211 | dat->stream.cbc = mode == EVP_CIPH_CBC_MODE ? |
| 242 | (cbc128_f)aesni_cbc_encrypt : | 212 | (cbc128_f)aesni_cbc_encrypt : NULL; |
| 243 | NULL; | 213 | } else { |
| 244 | } | 214 | ret = aesni_set_encrypt_key(key, ctx->key_len * 8, |
| 245 | else { | 215 | ctx->cipher_data); |
| 246 | ret = aesni_set_encrypt_key(key, ctx->key_len*8, ctx->cipher_data); | 216 | dat->block = (block128_f)aesni_encrypt; |
| 247 | dat->block = (block128_f)aesni_encrypt; | 217 | if (mode == EVP_CIPH_CBC_MODE) |
| 248 | if (mode==EVP_CIPH_CBC_MODE) | 218 | dat->stream.cbc = (cbc128_f)aesni_cbc_encrypt; |
| 249 | dat->stream.cbc = (cbc128_f)aesni_cbc_encrypt; | 219 | else if (mode == EVP_CIPH_CTR_MODE) |
| 250 | else if (mode==EVP_CIPH_CTR_MODE) | ||
| 251 | dat->stream.ctr = (ctr128_f)aesni_ctr32_encrypt_blocks; | 220 | dat->stream.ctr = (ctr128_f)aesni_ctr32_encrypt_blocks; |
| 252 | else | 221 | else |
| 253 | dat->stream.cbc = NULL; | 222 | dat->stream.cbc = NULL; |
| 254 | } | 223 | } |
| 255 | 224 | ||
| 256 | if(ret < 0) | 225 | if (ret < 0) { |
| 257 | { | 226 | EVPerr(EVP_F_AESNI_INIT_KEY, EVP_R_AES_KEY_SETUP_FAILED); |
| 258 | EVPerr(EVP_F_AESNI_INIT_KEY,EVP_R_AES_KEY_SETUP_FAILED); | ||
| 259 | return 0; | 227 | return 0; |
| 260 | } | 228 | } |
| 261 | 229 | ||
| 262 | return 1; | 230 | return 1; |
| 263 | } | 231 | } |
| 264 | 232 | ||
| 265 | static int aesni_cbc_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 233 | static int |
| 266 | const unsigned char *in, size_t len) | 234 | aesni_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 235 | const unsigned char *in, size_t len) | ||
| 267 | { | 236 | { |
| 268 | aesni_cbc_encrypt(in,out,len,ctx->cipher_data,ctx->iv,ctx->encrypt); | 237 | aesni_cbc_encrypt(in, out, len, ctx->cipher_data, ctx->iv, |
| 238 | ctx->encrypt); | ||
| 269 | 239 | ||
| 270 | return 1; | 240 | return 1; |
| 271 | } | 241 | } |
| 272 | 242 | ||
| 273 | static int aesni_ecb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 243 | static int |
| 274 | const unsigned char *in, size_t len) | 244 | aesni_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 245 | const unsigned char *in, size_t len) | ||
| 275 | { | 246 | { |
| 276 | size_t bl = ctx->cipher->block_size; | 247 | size_t bl = ctx->cipher->block_size; |
| 277 | 248 | ||
| 278 | if (len<bl) return 1; | 249 | if (len < bl) |
| 250 | return 1; | ||
| 279 | 251 | ||
| 280 | aesni_ecb_encrypt(in,out,len,ctx->cipher_data,ctx->encrypt); | 252 | aesni_ecb_encrypt(in, out, len, ctx->cipher_data, ctx->encrypt); |
| 281 | 253 | ||
| 282 | return 1; | 254 | return 1; |
| 283 | } | 255 | } |
| 284 | 256 | ||
| 285 | #define aesni_ofb_cipher aes_ofb_cipher | 257 | #define aesni_ofb_cipher aes_ofb_cipher |
| 286 | static int aesni_ofb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 258 | static int aesni_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 287 | const unsigned char *in,size_t len); | 259 | const unsigned char *in, size_t len); |
| 288 | 260 | ||
| 289 | #define aesni_cfb_cipher aes_cfb_cipher | 261 | #define aesni_cfb_cipher aes_cfb_cipher |
| 290 | static int aesni_cfb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 262 | static int aesni_cfb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 291 | const unsigned char *in,size_t len); | 263 | const unsigned char *in, size_t len); |
| 292 | 264 | ||
| 293 | #define aesni_cfb8_cipher aes_cfb8_cipher | 265 | #define aesni_cfb8_cipher aes_cfb8_cipher |
| 294 | static int aesni_cfb8_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 266 | static int aesni_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 295 | const unsigned char *in,size_t len); | 267 | const unsigned char *in, size_t len); |
| 296 | 268 | ||
| 297 | #define aesni_cfb1_cipher aes_cfb1_cipher | 269 | #define aesni_cfb1_cipher aes_cfb1_cipher |
| 298 | static int aesni_cfb1_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 270 | static int aesni_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 299 | const unsigned char *in,size_t len); | 271 | const unsigned char *in, size_t len); |
| 300 | 272 | ||
| 301 | #define aesni_ctr_cipher aes_ctr_cipher | 273 | #define aesni_ctr_cipher aes_ctr_cipher |
| 302 | static int aesni_ctr_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 274 | static int aesni_ctr_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 303 | const unsigned char *in, size_t len); | 275 | const unsigned char *in, size_t len); |
| 304 | 276 | ||
| 305 | static int aesni_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 277 | static int |
| 306 | const unsigned char *iv, int enc) | 278 | aesni_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 307 | { | 279 | const unsigned char *iv, int enc) |
| 280 | { | ||
| 308 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | 281 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; |
| 282 | |||
| 309 | if (!iv && !key) | 283 | if (!iv && !key) |
| 310 | return 1; | 284 | return 1; |
| 311 | if (key) | 285 | if (key) { |
| 312 | { | ||
| 313 | aesni_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks); | 286 | aesni_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks); |
| 314 | CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, | 287 | CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, |
| 315 | (block128_f)aesni_encrypt); | 288 | (block128_f)aesni_encrypt); |
| 316 | gctx->ctr = (ctr128_f)aesni_ctr32_encrypt_blocks; | 289 | gctx->ctr = (ctr128_f)aesni_ctr32_encrypt_blocks; |
| 317 | /* If we have an iv can set it directly, otherwise use | 290 | /* If we have an iv can set it directly, otherwise use |
| 318 | * saved IV. | 291 | * saved IV. |
| 319 | */ | 292 | */ |
| 320 | if (iv == NULL && gctx->iv_set) | 293 | if (iv == NULL && gctx->iv_set) |
| 321 | iv = gctx->iv; | 294 | iv = gctx->iv; |
| 322 | if (iv) | 295 | if (iv) { |
| 323 | { | ||
| 324 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | 296 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); |
| 325 | gctx->iv_set = 1; | 297 | gctx->iv_set = 1; |
| 326 | } | ||
| 327 | gctx->key_set = 1; | ||
| 328 | } | 298 | } |
| 329 | else | 299 | gctx->key_set = 1; |
| 330 | { | 300 | } else { |
| 331 | /* If key set use IV, otherwise copy */ | 301 | /* If key set use IV, otherwise copy */ |
| 332 | if (gctx->key_set) | 302 | if (gctx->key_set) |
| 333 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | 303 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); |
| @@ -335,83 +305,82 @@ static int aesni_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | |||
| 335 | memcpy(gctx->iv, iv, gctx->ivlen); | 305 | memcpy(gctx->iv, iv, gctx->ivlen); |
| 336 | gctx->iv_set = 1; | 306 | gctx->iv_set = 1; |
| 337 | gctx->iv_gen = 0; | 307 | gctx->iv_gen = 0; |
| 338 | } | ||
| 339 | return 1; | ||
| 340 | } | 308 | } |
| 309 | return 1; | ||
| 310 | } | ||
| 341 | 311 | ||
| 342 | #define aesni_gcm_cipher aes_gcm_cipher | 312 | #define aesni_gcm_cipher aes_gcm_cipher |
| 343 | static int aesni_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 313 | static int aesni_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 344 | const unsigned char *in, size_t len); | 314 | const unsigned char *in, size_t len); |
| 345 | 315 | ||
| 346 | static int aesni_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 316 | static int |
| 347 | const unsigned char *iv, int enc) | 317 | aesni_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 348 | { | 318 | const unsigned char *iv, int enc) |
| 319 | { | ||
| 349 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; | 320 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; |
| 321 | |||
| 350 | if (!iv && !key) | 322 | if (!iv && !key) |
| 351 | return 1; | 323 | return 1; |
| 352 | 324 | ||
| 353 | if (key) | 325 | if (key) { |
| 354 | { | ||
| 355 | /* key_len is two AES keys */ | 326 | /* key_len is two AES keys */ |
| 356 | if (enc) | 327 | if (enc) { |
| 357 | { | 328 | aesni_set_encrypt_key(key, ctx->key_len * 4, |
| 358 | aesni_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1); | 329 | &xctx->ks1); |
| 359 | xctx->xts.block1 = (block128_f)aesni_encrypt; | 330 | xctx->xts.block1 = (block128_f)aesni_encrypt; |
| 360 | xctx->stream = aesni_xts_encrypt; | 331 | xctx->stream = aesni_xts_encrypt; |
| 361 | } | 332 | } else { |
| 362 | else | 333 | aesni_set_decrypt_key(key, ctx->key_len * 4, |
| 363 | { | 334 | &xctx->ks1); |
| 364 | aesni_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
| 365 | xctx->xts.block1 = (block128_f)aesni_decrypt; | 335 | xctx->xts.block1 = (block128_f)aesni_decrypt; |
| 366 | xctx->stream = aesni_xts_decrypt; | 336 | xctx->stream = aesni_xts_decrypt; |
| 367 | } | 337 | } |
| 368 | 338 | ||
| 369 | aesni_set_encrypt_key(key + ctx->key_len/2, | 339 | aesni_set_encrypt_key(key + ctx->key_len / 2, |
| 370 | ctx->key_len * 4, &xctx->ks2); | 340 | ctx->key_len * 4, &xctx->ks2); |
| 371 | xctx->xts.block2 = (block128_f)aesni_encrypt; | 341 | xctx->xts.block2 = (block128_f)aesni_encrypt; |
| 372 | 342 | ||
| 373 | xctx->xts.key1 = &xctx->ks1; | 343 | xctx->xts.key1 = &xctx->ks1; |
| 374 | } | 344 | } |
| 375 | 345 | ||
| 376 | if (iv) | 346 | if (iv) { |
| 377 | { | ||
| 378 | xctx->xts.key2 = &xctx->ks2; | 347 | xctx->xts.key2 = &xctx->ks2; |
| 379 | memcpy(ctx->iv, iv, 16); | 348 | memcpy(ctx->iv, iv, 16); |
| 380 | } | 349 | } |
| 381 | 350 | ||
| 382 | return 1; | 351 | return 1; |
| 383 | } | 352 | } |
| 384 | 353 | ||
| 385 | #define aesni_xts_cipher aes_xts_cipher | 354 | #define aesni_xts_cipher aes_xts_cipher |
| 386 | static int aesni_xts_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 355 | static int aesni_xts_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 387 | const unsigned char *in, size_t len); | 356 | const unsigned char *in, size_t len); |
| 388 | 357 | ||
| 389 | static int aesni_ccm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 358 | static int |
| 390 | const unsigned char *iv, int enc) | 359 | aesni_ccm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 391 | { | 360 | const unsigned char *iv, int enc) |
| 361 | { | ||
| 392 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; | 362 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; |
| 363 | |||
| 393 | if (!iv && !key) | 364 | if (!iv && !key) |
| 394 | return 1; | 365 | return 1; |
| 395 | if (key) | 366 | if (key) { |
| 396 | { | ||
| 397 | aesni_set_encrypt_key(key, ctx->key_len * 8, &cctx->ks); | 367 | aesni_set_encrypt_key(key, ctx->key_len * 8, &cctx->ks); |
| 398 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, | 368 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, |
| 399 | &cctx->ks, (block128_f)aesni_encrypt); | 369 | &cctx->ks, (block128_f)aesni_encrypt); |
| 400 | cctx->str = enc?(ccm128_f)aesni_ccm64_encrypt_blocks : | 370 | cctx->str = enc ? (ccm128_f)aesni_ccm64_encrypt_blocks : |
| 401 | (ccm128_f)aesni_ccm64_decrypt_blocks; | 371 | (ccm128_f)aesni_ccm64_decrypt_blocks; |
| 402 | cctx->key_set = 1; | 372 | cctx->key_set = 1; |
| 403 | } | 373 | } |
| 404 | if (iv) | 374 | if (iv) { |
| 405 | { | ||
| 406 | memcpy(ctx->iv, iv, 15 - cctx->L); | 375 | memcpy(ctx->iv, iv, 15 - cctx->L); |
| 407 | cctx->iv_set = 1; | 376 | cctx->iv_set = 1; |
| 408 | } | ||
| 409 | return 1; | ||
| 410 | } | 377 | } |
| 378 | return 1; | ||
| 379 | } | ||
| 411 | 380 | ||
| 412 | #define aesni_ccm_cipher aes_ccm_cipher | 381 | #define aesni_ccm_cipher aes_ccm_cipher |
| 413 | static int aesni_ccm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 382 | static int aesni_ccm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 414 | const unsigned char *in, size_t len); | 383 | const unsigned char *in, size_t len); |
| 415 | 384 | ||
| 416 | #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ | 385 | #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ |
| 417 | static const EVP_CIPHER aesni_##keylen##_##mode = { \ | 386 | static const EVP_CIPHER aesni_##keylen##_##mode = { \ |
| @@ -493,199 +462,205 @@ const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \ | |||
| 493 | BLOCK_CIPHER_generic(nid,keylen,1,16,cfb8,cfb8,CFB,flags) \ | 462 | BLOCK_CIPHER_generic(nid,keylen,1,16,cfb8,cfb8,CFB,flags) \ |
| 494 | BLOCK_CIPHER_generic(nid,keylen,1,16,ctr,ctr,CTR,flags) | 463 | BLOCK_CIPHER_generic(nid,keylen,1,16,ctr,ctr,CTR,flags) |
| 495 | 464 | ||
| 496 | static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 465 | static int |
| 497 | const unsigned char *iv, int enc) | 466 | aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 498 | { | 467 | const unsigned char *iv, int enc) |
| 468 | { | ||
| 499 | int ret, mode; | 469 | int ret, mode; |
| 500 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | 470 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; |
| 501 | 471 | ||
| 502 | mode = ctx->cipher->flags & EVP_CIPH_MODE; | 472 | mode = ctx->cipher->flags & EVP_CIPH_MODE; |
| 503 | if ((mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE) | 473 | if ((mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE) && |
| 504 | && !enc) | 474 | !enc) |
| 505 | #ifdef BSAES_CAPABLE | 475 | #ifdef BSAES_CAPABLE |
| 506 | if (BSAES_CAPABLE && mode==EVP_CIPH_CBC_MODE) | 476 | if (BSAES_CAPABLE && mode == EVP_CIPH_CBC_MODE) { |
| 507 | { | 477 | ret = AES_set_decrypt_key(key, ctx->key_len * 8, |
| 508 | ret = AES_set_decrypt_key(key,ctx->key_len*8,&dat->ks); | 478 | &dat->ks); |
| 509 | dat->block = (block128_f)AES_decrypt; | 479 | dat->block = (block128_f)AES_decrypt; |
| 510 | dat->stream.cbc = (cbc128_f)bsaes_cbc_encrypt; | 480 | dat->stream.cbc = (cbc128_f)bsaes_cbc_encrypt; |
| 511 | } | 481 | } else |
| 512 | else | ||
| 513 | #endif | 482 | #endif |
| 514 | #ifdef VPAES_CAPABLE | 483 | #ifdef VPAES_CAPABLE |
| 515 | if (VPAES_CAPABLE) | 484 | if (VPAES_CAPABLE) { |
| 516 | { | 485 | ret = vpaes_set_decrypt_key(key, ctx->key_len * 8, |
| 517 | ret = vpaes_set_decrypt_key(key,ctx->key_len*8,&dat->ks); | 486 | &dat->ks); |
| 518 | dat->block = (block128_f)vpaes_decrypt; | 487 | dat->block = (block128_f)vpaes_decrypt; |
| 519 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | 488 | dat->stream.cbc = mode == EVP_CIPH_CBC_MODE ? |
| 520 | (cbc128_f)vpaes_cbc_encrypt : | 489 | (cbc128_f)vpaes_cbc_encrypt : NULL; |
| 521 | NULL; | 490 | } else |
| 522 | } | ||
| 523 | else | ||
| 524 | #endif | 491 | #endif |
| 525 | { | 492 | { |
| 526 | ret = AES_set_decrypt_key(key,ctx->key_len*8,&dat->ks); | 493 | ret = AES_set_decrypt_key(key, ctx->key_len * 8, |
| 527 | dat->block = (block128_f)AES_decrypt; | 494 | &dat->ks); |
| 528 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | 495 | dat->block = (block128_f)AES_decrypt; |
| 529 | (cbc128_f)AES_cbc_encrypt : | 496 | dat->stream.cbc = mode == EVP_CIPH_CBC_MODE ? |
| 530 | NULL; | 497 | (cbc128_f)AES_cbc_encrypt : NULL; |
| 531 | } | 498 | } else |
| 532 | else | ||
| 533 | #ifdef BSAES_CAPABLE | 499 | #ifdef BSAES_CAPABLE |
| 534 | if (BSAES_CAPABLE && mode==EVP_CIPH_CTR_MODE) | 500 | if (BSAES_CAPABLE && mode == EVP_CIPH_CTR_MODE) { |
| 535 | { | 501 | ret = AES_set_encrypt_key(key, ctx->key_len * 8, |
| 536 | ret = AES_set_encrypt_key(key,ctx->key_len*8,&dat->ks); | 502 | &dat->ks); |
| 537 | dat->block = (block128_f)AES_encrypt; | 503 | dat->block = (block128_f)AES_encrypt; |
| 538 | dat->stream.ctr = (ctr128_f)bsaes_ctr32_encrypt_blocks; | 504 | dat->stream.ctr = (ctr128_f)bsaes_ctr32_encrypt_blocks; |
| 539 | } | 505 | } else |
| 540 | else | ||
| 541 | #endif | 506 | #endif |
| 542 | #ifdef VPAES_CAPABLE | 507 | #ifdef VPAES_CAPABLE |
| 543 | if (VPAES_CAPABLE) | 508 | if (VPAES_CAPABLE) { |
| 544 | { | 509 | ret = vpaes_set_encrypt_key(key, ctx->key_len * 8, |
| 545 | ret = vpaes_set_encrypt_key(key,ctx->key_len*8,&dat->ks); | 510 | &dat->ks); |
| 546 | dat->block = (block128_f)vpaes_encrypt; | 511 | dat->block = (block128_f)vpaes_encrypt; |
| 547 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | 512 | dat->stream.cbc = mode == EVP_CIPH_CBC_MODE ? |
| 548 | (cbc128_f)vpaes_cbc_encrypt : | 513 | (cbc128_f)vpaes_cbc_encrypt : NULL; |
| 549 | NULL; | 514 | } else |
| 550 | } | ||
| 551 | else | ||
| 552 | #endif | 515 | #endif |
| 553 | { | 516 | { |
| 554 | ret = AES_set_encrypt_key(key,ctx->key_len*8,&dat->ks); | 517 | ret = AES_set_encrypt_key(key, ctx->key_len * 8, |
| 555 | dat->block = (block128_f)AES_encrypt; | 518 | &dat->ks); |
| 556 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | 519 | dat->block = (block128_f)AES_encrypt; |
| 557 | (cbc128_f)AES_cbc_encrypt : | 520 | dat->stream.cbc = mode == EVP_CIPH_CBC_MODE ? |
| 558 | NULL; | 521 | (cbc128_f)AES_cbc_encrypt : NULL; |
| 559 | #ifdef AES_CTR_ASM | 522 | #ifdef AES_CTR_ASM |
| 560 | if (mode==EVP_CIPH_CTR_MODE) | 523 | if (mode == EVP_CIPH_CTR_MODE) |
| 561 | dat->stream.ctr = (ctr128_f)AES_ctr32_encrypt; | 524 | dat->stream.ctr = (ctr128_f)AES_ctr32_encrypt; |
| 562 | #endif | 525 | #endif |
| 563 | } | 526 | } |
| 564 | 527 | ||
| 565 | if(ret < 0) | 528 | if (ret < 0) { |
| 566 | { | 529 | EVPerr(EVP_F_AES_INIT_KEY, EVP_R_AES_KEY_SETUP_FAILED); |
| 567 | EVPerr(EVP_F_AES_INIT_KEY,EVP_R_AES_KEY_SETUP_FAILED); | ||
| 568 | return 0; | 530 | return 0; |
| 569 | } | 531 | } |
| 570 | 532 | ||
| 571 | return 1; | 533 | return 1; |
| 572 | } | 534 | } |
| 573 | 535 | ||
| 574 | static int aes_cbc_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 536 | static int |
| 575 | const unsigned char *in, size_t len) | 537 | aes_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 538 | const unsigned char *in, size_t len) | ||
| 576 | { | 539 | { |
| 577 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | 540 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; |
| 578 | 541 | ||
| 579 | if (dat->stream.cbc) | 542 | if (dat->stream.cbc) |
| 580 | (*dat->stream.cbc)(in,out,len,&dat->ks,ctx->iv,ctx->encrypt); | 543 | (*dat->stream.cbc)(in, out, len, &dat->ks, ctx->iv, |
| 544 | ctx->encrypt); | ||
| 581 | else if (ctx->encrypt) | 545 | else if (ctx->encrypt) |
| 582 | CRYPTO_cbc128_encrypt(in,out,len,&dat->ks,ctx->iv,dat->block); | 546 | CRYPTO_cbc128_encrypt(in, out, len, &dat->ks, ctx->iv, |
| 547 | dat->block); | ||
| 583 | else | 548 | else |
| 584 | CRYPTO_cbc128_decrypt(in,out,len,&dat->ks,ctx->iv,dat->block); | 549 | CRYPTO_cbc128_decrypt(in, out, len, &dat->ks, ctx->iv, |
| 550 | dat->block); | ||
| 585 | 551 | ||
| 586 | return 1; | 552 | return 1; |
| 587 | } | 553 | } |
| 588 | 554 | ||
| 589 | static int aes_ecb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 555 | static int |
| 590 | const unsigned char *in, size_t len) | 556 | aes_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 557 | const unsigned char *in, size_t len) | ||
| 591 | { | 558 | { |
| 592 | size_t bl = ctx->cipher->block_size; | 559 | size_t bl = ctx->cipher->block_size; |
| 593 | size_t i; | 560 | size_t i; |
| 594 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | 561 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; |
| 595 | 562 | ||
| 596 | if (len<bl) return 1; | 563 | if (len < bl) |
| 564 | return 1; | ||
| 597 | 565 | ||
| 598 | for (i=0,len-=bl;i<=len;i+=bl) | 566 | for (i = 0, len -= bl; i <= len; i += bl) |
| 599 | (*dat->block)(in+i,out+i,&dat->ks); | 567 | (*dat->block)(in + i, out + i, &dat->ks); |
| 600 | 568 | ||
| 601 | return 1; | 569 | return 1; |
| 602 | } | 570 | } |
| 603 | 571 | ||
| 604 | static int aes_ofb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 572 | static int |
| 605 | const unsigned char *in,size_t len) | 573 | aes_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 574 | const unsigned char *in, size_t len) | ||
| 606 | { | 575 | { |
| 607 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | 576 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; |
| 608 | 577 | ||
| 609 | CRYPTO_ofb128_encrypt(in,out,len,&dat->ks, | 578 | CRYPTO_ofb128_encrypt(in, out, len, &dat->ks, ctx->iv, &ctx->num, |
| 610 | ctx->iv,&ctx->num,dat->block); | 579 | dat->block); |
| 611 | return 1; | 580 | return 1; |
| 612 | } | 581 | } |
| 613 | 582 | ||
| 614 | static int aes_cfb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 583 | static int |
| 615 | const unsigned char *in,size_t len) | 584 | aes_cfb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 585 | const unsigned char *in, size_t len) | ||
| 616 | { | 586 | { |
| 617 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | 587 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; |
| 618 | 588 | ||
| 619 | CRYPTO_cfb128_encrypt(in,out,len,&dat->ks, | 589 | CRYPTO_cfb128_encrypt(in, out, len, &dat->ks, ctx->iv, &ctx->num, |
| 620 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | 590 | ctx->encrypt, dat->block); |
| 621 | return 1; | 591 | return 1; |
| 622 | } | 592 | } |
| 623 | 593 | ||
| 624 | static int aes_cfb8_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 594 | static int |
| 625 | const unsigned char *in,size_t len) | 595 | aes_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 596 | const unsigned char *in, size_t len) | ||
| 626 | { | 597 | { |
| 627 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | 598 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; |
| 628 | 599 | ||
| 629 | CRYPTO_cfb128_8_encrypt(in,out,len,&dat->ks, | 600 | CRYPTO_cfb128_8_encrypt(in, out, len, &dat->ks, ctx->iv, &ctx->num, |
| 630 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | 601 | ctx->encrypt, dat->block); |
| 631 | return 1; | 602 | return 1; |
| 632 | } | 603 | } |
| 633 | 604 | ||
| 634 | static int aes_cfb1_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | 605 | static int |
| 635 | const unsigned char *in,size_t len) | 606 | aes_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 607 | const unsigned char *in, size_t len) | ||
| 636 | { | 608 | { |
| 637 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | 609 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; |
| 638 | 610 | ||
| 639 | if (ctx->flags&EVP_CIPH_FLAG_LENGTH_BITS) { | 611 | if (ctx->flags&EVP_CIPH_FLAG_LENGTH_BITS) { |
| 640 | CRYPTO_cfb128_1_encrypt(in,out,len,&dat->ks, | 612 | CRYPTO_cfb128_1_encrypt(in, out, len, &dat->ks, ctx->iv, |
| 641 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | 613 | &ctx->num, ctx->encrypt, dat->block); |
| 642 | return 1; | 614 | return 1; |
| 643 | } | 615 | } |
| 644 | 616 | ||
| 645 | while (len>=MAXBITCHUNK) { | 617 | while (len >= MAXBITCHUNK) { |
| 646 | CRYPTO_cfb128_1_encrypt(in,out,MAXBITCHUNK*8,&dat->ks, | 618 | CRYPTO_cfb128_1_encrypt(in, out, MAXBITCHUNK*8, &dat->ks, |
| 647 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | 619 | ctx->iv, &ctx->num, ctx->encrypt, dat->block); |
| 648 | len-=MAXBITCHUNK; | 620 | len -= MAXBITCHUNK; |
| 649 | } | 621 | } |
| 650 | if (len) | 622 | if (len) |
| 651 | CRYPTO_cfb128_1_encrypt(in,out,len*8,&dat->ks, | 623 | CRYPTO_cfb128_1_encrypt(in, out, len*8, &dat->ks, |
| 652 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | 624 | ctx->iv, &ctx->num, ctx->encrypt, dat->block); |
| 653 | 625 | ||
| 654 | return 1; | 626 | return 1; |
| 655 | } | 627 | } |
| 656 | 628 | ||
| 657 | static int aes_ctr_cipher (EVP_CIPHER_CTX *ctx, unsigned char *out, | 629 | static int aes_ctr_cipher (EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 658 | const unsigned char *in, size_t len) | 630 | const unsigned char *in, size_t len) |
| 659 | { | 631 | { |
| 660 | unsigned int num = ctx->num; | 632 | unsigned int num = ctx->num; |
| 661 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | 633 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; |
| 662 | 634 | ||
| 663 | if (dat->stream.ctr) | 635 | if (dat->stream.ctr) |
| 664 | CRYPTO_ctr128_encrypt_ctr32(in,out,len,&dat->ks, | 636 | CRYPTO_ctr128_encrypt_ctr32(in, out, len, &dat->ks, |
| 665 | ctx->iv,ctx->buf,&num,dat->stream.ctr); | 637 | ctx->iv, ctx->buf, &num, dat->stream.ctr); |
| 666 | else | 638 | else |
| 667 | CRYPTO_ctr128_encrypt(in,out,len,&dat->ks, | 639 | CRYPTO_ctr128_encrypt(in, out, len, &dat->ks, |
| 668 | ctx->iv,ctx->buf,&num,dat->block); | 640 | ctx->iv, ctx->buf, &num, dat->block); |
| 669 | ctx->num = (size_t)num; | 641 | ctx->num = (size_t)num; |
| 670 | return 1; | 642 | return 1; |
| 671 | } | 643 | } |
| 672 | 644 | ||
| 673 | BLOCK_CIPHER_generic_pack(NID_aes,128,EVP_CIPH_FLAG_FIPS) | 645 | BLOCK_CIPHER_generic_pack(NID_aes, 128, EVP_CIPH_FLAG_FIPS) |
| 674 | BLOCK_CIPHER_generic_pack(NID_aes,192,EVP_CIPH_FLAG_FIPS) | 646 | BLOCK_CIPHER_generic_pack(NID_aes, 192, EVP_CIPH_FLAG_FIPS) |
| 675 | BLOCK_CIPHER_generic_pack(NID_aes,256,EVP_CIPH_FLAG_FIPS) | 647 | BLOCK_CIPHER_generic_pack(NID_aes, 256, EVP_CIPH_FLAG_FIPS) |
| 676 | 648 | ||
| 677 | static int aes_gcm_cleanup(EVP_CIPHER_CTX *c) | 649 | static int |
| 678 | { | 650 | aes_gcm_cleanup(EVP_CIPHER_CTX *c) |
| 651 | { | ||
| 679 | EVP_AES_GCM_CTX *gctx = c->cipher_data; | 652 | EVP_AES_GCM_CTX *gctx = c->cipher_data; |
| 653 | |||
| 680 | OPENSSL_cleanse(&gctx->gcm, sizeof(gctx->gcm)); | 654 | OPENSSL_cleanse(&gctx->gcm, sizeof(gctx->gcm)); |
| 681 | if (gctx->iv != c->iv) | 655 | if (gctx->iv != c->iv) |
| 682 | free(gctx->iv); | 656 | free(gctx->iv); |
| 683 | return 1; | 657 | return 1; |
| 684 | } | 658 | } |
| 685 | 659 | ||
| 686 | /* increment counter (64-bit int) by 1 */ | 660 | /* increment counter (64-bit int) by 1 */ |
| 687 | static void ctr64_inc(unsigned char *counter) { | 661 | static void |
| 688 | int n=8; | 662 | ctr64_inc(unsigned char *counter) { |
| 663 | int n = 8; | ||
| 689 | unsigned char c; | 664 | unsigned char c; |
| 690 | 665 | ||
| 691 | do { | 666 | do { |
| @@ -693,15 +668,17 @@ static void ctr64_inc(unsigned char *counter) { | |||
| 693 | c = counter[n]; | 668 | c = counter[n]; |
| 694 | ++c; | 669 | ++c; |
| 695 | counter[n] = c; | 670 | counter[n] = c; |
| 696 | if (c) return; | 671 | if (c) |
| 672 | return; | ||
| 697 | } while (n); | 673 | } while (n); |
| 698 | } | 674 | } |
| 699 | 675 | ||
| 700 | static int aes_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | 676 | static int |
| 701 | { | 677 | aes_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) |
| 678 | { | ||
| 702 | EVP_AES_GCM_CTX *gctx = c->cipher_data; | 679 | EVP_AES_GCM_CTX *gctx = c->cipher_data; |
| 703 | switch (type) | 680 | |
| 704 | { | 681 | switch (type) { |
| 705 | case EVP_CTRL_INIT: | 682 | case EVP_CTRL_INIT: |
| 706 | gctx->key_set = 0; | 683 | gctx->key_set = 0; |
| 707 | gctx->iv_set = 0; | 684 | gctx->iv_set = 0; |
| @@ -716,19 +693,18 @@ static int aes_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 716 | if (arg <= 0) | 693 | if (arg <= 0) |
| 717 | return 0; | 694 | return 0; |
| 718 | #ifdef OPENSSL_FIPS | 695 | #ifdef OPENSSL_FIPS |
| 719 | if (FIPS_module_mode() && !(c->flags & EVP_CIPH_FLAG_NON_FIPS_ALLOW) | 696 | if (FIPS_module_mode() && |
| 720 | && arg < 12) | 697 | !(c->flags & EVP_CIPH_FLAG_NON_FIPS_ALLOW) && arg < 12) |
| 721 | return 0; | 698 | return 0; |
| 722 | #endif | 699 | #endif |
| 723 | /* Allocate memory for IV if needed */ | 700 | /* Allocate memory for IV if needed */ |
| 724 | if ((arg > EVP_MAX_IV_LENGTH) && (arg > gctx->ivlen)) | 701 | if ((arg > EVP_MAX_IV_LENGTH) && (arg > gctx->ivlen)) { |
| 725 | { | ||
| 726 | if (gctx->iv != c->iv) | 702 | if (gctx->iv != c->iv) |
| 727 | free(gctx->iv); | 703 | free(gctx->iv); |
| 728 | gctx->iv = malloc(arg); | 704 | gctx->iv = malloc(arg); |
| 729 | if (!gctx->iv) | 705 | if (!gctx->iv) |
| 730 | return 0; | 706 | return 0; |
| 731 | } | 707 | } |
| 732 | gctx->ivlen = arg; | 708 | gctx->ivlen = arg; |
| 733 | return 1; | 709 | return 1; |
| 734 | 710 | ||
| @@ -747,12 +723,11 @@ static int aes_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 747 | 723 | ||
| 748 | case EVP_CTRL_GCM_SET_IV_FIXED: | 724 | case EVP_CTRL_GCM_SET_IV_FIXED: |
| 749 | /* Special case: -1 length restores whole IV */ | 725 | /* Special case: -1 length restores whole IV */ |
| 750 | if (arg == -1) | 726 | if (arg == -1) { |
| 751 | { | ||
| 752 | memcpy(gctx->iv, ptr, gctx->ivlen); | 727 | memcpy(gctx->iv, ptr, gctx->ivlen); |
| 753 | gctx->iv_gen = 1; | 728 | gctx->iv_gen = 1; |
| 754 | return 1; | 729 | return 1; |
| 755 | } | 730 | } |
| 756 | /* Fixed field must be at least 4 bytes and invocation field | 731 | /* Fixed field must be at least 4 bytes and invocation field |
| 757 | * at least 8. | 732 | * at least 8. |
| 758 | */ | 733 | */ |
| @@ -761,7 +736,7 @@ static int aes_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 761 | if (arg) | 736 | if (arg) |
| 762 | memcpy(gctx->iv, ptr, arg); | 737 | memcpy(gctx->iv, ptr, arg); |
| 763 | if (c->encrypt && | 738 | if (c->encrypt && |
| 764 | RAND_bytes(gctx->iv + arg, gctx->ivlen - arg) <= 0) | 739 | RAND_bytes(gctx->iv + arg, gctx->ivlen - arg) <= 0) |
| 765 | return 0; | 740 | return 0; |
| 766 | gctx->iv_gen = 1; | 741 | gctx->iv_gen = 1; |
| 767 | return 1; | 742 | return 1; |
| @@ -795,63 +770,68 @@ static int aes_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 795 | return 0; | 770 | return 0; |
| 796 | memcpy(c->buf, ptr, arg); | 771 | memcpy(c->buf, ptr, arg); |
| 797 | gctx->tls_aad_len = arg; | 772 | gctx->tls_aad_len = arg; |
| 798 | { | 773 | { |
| 799 | unsigned int len=c->buf[arg-2]<<8|c->buf[arg-1]; | 774 | unsigned int len = c->buf[arg - 2] << 8 | |
| 775 | c->buf[arg - 1]; | ||
| 776 | |||
| 800 | /* Correct length for explicit IV */ | 777 | /* Correct length for explicit IV */ |
| 801 | len -= EVP_GCM_TLS_EXPLICIT_IV_LEN; | 778 | len -= EVP_GCM_TLS_EXPLICIT_IV_LEN; |
| 779 | |||
| 802 | /* If decrypting correct for tag too */ | 780 | /* If decrypting correct for tag too */ |
| 803 | if (!c->encrypt) | 781 | if (!c->encrypt) |
| 804 | len -= EVP_GCM_TLS_TAG_LEN; | 782 | len -= EVP_GCM_TLS_TAG_LEN; |
| 805 | c->buf[arg-2] = len>>8; | 783 | c->buf[arg - 2] = len >> 8; |
| 806 | c->buf[arg-1] = len & 0xff; | 784 | c->buf[arg - 1] = len & 0xff; |
| 807 | } | 785 | } |
| 808 | /* Extra padding: tag appended to record */ | 786 | /* Extra padding: tag appended to record */ |
| 809 | return EVP_GCM_TLS_TAG_LEN; | 787 | return EVP_GCM_TLS_TAG_LEN; |
| 810 | 788 | ||
| 811 | default: | 789 | default: |
| 812 | return -1; | 790 | return -1; |
| 813 | 791 | ||
| 814 | } | ||
| 815 | } | 792 | } |
| 793 | } | ||
| 816 | 794 | ||
| 817 | static int aes_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 795 | static int |
| 818 | const unsigned char *iv, int enc) | 796 | aes_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 819 | { | 797 | const unsigned char *iv, int enc) |
| 798 | { | ||
| 820 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | 799 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; |
| 800 | |||
| 821 | if (!iv && !key) | 801 | if (!iv && !key) |
| 822 | return 1; | 802 | return 1; |
| 823 | if (key) | 803 | if (key) { |
| 824 | { do { | 804 | do { |
| 825 | #ifdef BSAES_CAPABLE | 805 | #ifdef BSAES_CAPABLE |
| 826 | if (BSAES_CAPABLE) | 806 | if (BSAES_CAPABLE) { |
| 827 | { | 807 | AES_set_encrypt_key(key, ctx->key_len * 8, |
| 828 | AES_set_encrypt_key(key,ctx->key_len*8,&gctx->ks); | 808 | &gctx->ks); |
| 829 | CRYPTO_gcm128_init(&gctx->gcm,&gctx->ks, | 809 | CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, |
| 830 | (block128_f)AES_encrypt); | 810 | (block128_f)AES_encrypt); |
| 831 | gctx->ctr = (ctr128_f)bsaes_ctr32_encrypt_blocks; | 811 | gctx->ctr = |
| 832 | break; | 812 | (ctr128_f)bsaes_ctr32_encrypt_blocks; |
| 833 | } | 813 | break; |
| 834 | else | 814 | } else |
| 835 | #endif | 815 | #endif |
| 836 | #ifdef VPAES_CAPABLE | 816 | #ifdef VPAES_CAPABLE |
| 837 | if (VPAES_CAPABLE) | 817 | if (VPAES_CAPABLE) { |
| 838 | { | 818 | vpaes_set_encrypt_key(key, ctx->key_len * 8, |
| 839 | vpaes_set_encrypt_key(key,ctx->key_len*8,&gctx->ks); | 819 | &gctx->ks); |
| 840 | CRYPTO_gcm128_init(&gctx->gcm,&gctx->ks, | 820 | CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, |
| 841 | (block128_f)vpaes_encrypt); | 821 | (block128_f)vpaes_encrypt); |
| 842 | gctx->ctr = NULL; | 822 | gctx->ctr = NULL; |
| 843 | break; | 823 | break; |
| 844 | } | 824 | } else |
| 845 | else | ||
| 846 | #endif | 825 | #endif |
| 847 | (void)0; /* terminate potentially open 'else' */ | 826 | (void)0; /* terminate potentially open 'else' */ |
| 848 | 827 | ||
| 849 | AES_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks); | 828 | AES_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks); |
| 850 | CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, (block128_f)AES_encrypt); | 829 | CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, |
| 830 | (block128_f)AES_encrypt); | ||
| 851 | #ifdef AES_CTR_ASM | 831 | #ifdef AES_CTR_ASM |
| 852 | gctx->ctr = (ctr128_f)AES_ctr32_encrypt; | 832 | gctx->ctr = (ctr128_f)AES_ctr32_encrypt; |
| 853 | #else | 833 | #else |
| 854 | gctx->ctr = NULL; | 834 | gctx->ctr = NULL; |
| 855 | #endif | 835 | #endif |
| 856 | } while (0); | 836 | } while (0); |
| 857 | 837 | ||
| @@ -860,15 +840,12 @@ static int aes_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | |||
| 860 | */ | 840 | */ |
| 861 | if (iv == NULL && gctx->iv_set) | 841 | if (iv == NULL && gctx->iv_set) |
| 862 | iv = gctx->iv; | 842 | iv = gctx->iv; |
| 863 | if (iv) | 843 | if (iv) { |
| 864 | { | ||
| 865 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | 844 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); |
| 866 | gctx->iv_set = 1; | 845 | gctx->iv_set = 1; |
| 867 | } | ||
| 868 | gctx->key_set = 1; | ||
| 869 | } | 846 | } |
| 870 | else | 847 | gctx->key_set = 1; |
| 871 | { | 848 | } else { |
| 872 | /* If key set use IV, otherwise copy */ | 849 | /* If key set use IV, otherwise copy */ |
| 873 | if (gctx->key_set) | 850 | if (gctx->key_set) |
| 874 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | 851 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); |
| @@ -876,9 +853,9 @@ static int aes_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | |||
| 876 | memcpy(gctx->iv, iv, gctx->ivlen); | 853 | memcpy(gctx->iv, iv, gctx->ivlen); |
| 877 | gctx->iv_set = 1; | 854 | gctx->iv_set = 1; |
| 878 | gctx->iv_gen = 0; | 855 | gctx->iv_gen = 0; |
| 879 | } | ||
| 880 | return 1; | ||
| 881 | } | 856 | } |
| 857 | return 1; | ||
| 858 | } | ||
| 882 | 859 | ||
| 883 | /* Handle TLS GCM packet format. This consists of the last portion of the IV | 860 | /* Handle TLS GCM packet format. This consists of the last portion of the IV |
| 884 | * followed by the payload and finally the tag. On encrypt generate IV, | 861 | * followed by the payload and finally the tag. On encrypt generate IV, |
| @@ -886,83 +863,82 @@ static int aes_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | |||
| 886 | * and verify tag. | 863 | * and verify tag. |
| 887 | */ | 864 | */ |
| 888 | 865 | ||
| 889 | static int aes_gcm_tls_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 866 | static int |
| 890 | const unsigned char *in, size_t len) | 867 | aes_gcm_tls_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 891 | { | 868 | const unsigned char *in, size_t len) |
| 869 | { | ||
| 892 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | 870 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; |
| 893 | int rv = -1; | 871 | int rv = -1; |
| 872 | |||
| 894 | /* Encrypt/decrypt must be performed in place */ | 873 | /* Encrypt/decrypt must be performed in place */ |
| 895 | if (out != in || len < (EVP_GCM_TLS_EXPLICIT_IV_LEN+EVP_GCM_TLS_TAG_LEN)) | 874 | if (out != in || |
| 875 | len < (EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN)) | ||
| 896 | return -1; | 876 | return -1; |
| 877 | |||
| 897 | /* Set IV from start of buffer or generate IV and write to start | 878 | /* Set IV from start of buffer or generate IV and write to start |
| 898 | * of buffer. | 879 | * of buffer. |
| 899 | */ | 880 | */ |
| 900 | if (EVP_CIPHER_CTX_ctrl(ctx, ctx->encrypt ? | 881 | if (EVP_CIPHER_CTX_ctrl(ctx, ctx->encrypt ? |
| 901 | EVP_CTRL_GCM_IV_GEN : EVP_CTRL_GCM_SET_IV_INV, | 882 | EVP_CTRL_GCM_IV_GEN : EVP_CTRL_GCM_SET_IV_INV, |
| 902 | EVP_GCM_TLS_EXPLICIT_IV_LEN, out) <= 0) | 883 | EVP_GCM_TLS_EXPLICIT_IV_LEN, out) <= 0) |
| 903 | goto err; | 884 | goto err; |
| 885 | |||
| 904 | /* Use saved AAD */ | 886 | /* Use saved AAD */ |
| 905 | if (CRYPTO_gcm128_aad(&gctx->gcm, ctx->buf, gctx->tls_aad_len)) | 887 | if (CRYPTO_gcm128_aad(&gctx->gcm, ctx->buf, gctx->tls_aad_len)) |
| 906 | goto err; | 888 | goto err; |
| 889 | |||
| 907 | /* Fix buffer and length to point to payload */ | 890 | /* Fix buffer and length to point to payload */ |
| 908 | in += EVP_GCM_TLS_EXPLICIT_IV_LEN; | 891 | in += EVP_GCM_TLS_EXPLICIT_IV_LEN; |
| 909 | out += EVP_GCM_TLS_EXPLICIT_IV_LEN; | 892 | out += EVP_GCM_TLS_EXPLICIT_IV_LEN; |
| 910 | len -= EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN; | 893 | len -= EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN; |
| 911 | if (ctx->encrypt) | 894 | if (ctx->encrypt) { |
| 912 | { | ||
| 913 | /* Encrypt payload */ | 895 | /* Encrypt payload */ |
| 914 | if (gctx->ctr) | 896 | if (gctx->ctr) { |
| 915 | { | 897 | if (CRYPTO_gcm128_encrypt_ctr32(&gctx->gcm, in, out, |
| 916 | if (CRYPTO_gcm128_encrypt_ctr32(&gctx->gcm, | 898 | len, gctx->ctr)) |
| 917 | in, out, len, | ||
| 918 | gctx->ctr)) | ||
| 919 | goto err; | 899 | goto err; |
| 920 | } | 900 | } else { |
| 921 | else { | ||
| 922 | if (CRYPTO_gcm128_encrypt(&gctx->gcm, in, out, len)) | 901 | if (CRYPTO_gcm128_encrypt(&gctx->gcm, in, out, len)) |
| 923 | goto err; | 902 | goto err; |
| 924 | } | 903 | } |
| 925 | out += len; | 904 | out += len; |
| 905 | |||
| 926 | /* Finally write tag */ | 906 | /* Finally write tag */ |
| 927 | CRYPTO_gcm128_tag(&gctx->gcm, out, EVP_GCM_TLS_TAG_LEN); | 907 | CRYPTO_gcm128_tag(&gctx->gcm, out, EVP_GCM_TLS_TAG_LEN); |
| 928 | rv = len + EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN; | 908 | rv = len + EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN; |
| 929 | } | 909 | } else { |
| 930 | else | ||
| 931 | { | ||
| 932 | /* Decrypt */ | 910 | /* Decrypt */ |
| 933 | if (gctx->ctr) | 911 | if (gctx->ctr) { |
| 934 | { | 912 | if (CRYPTO_gcm128_decrypt_ctr32(&gctx->gcm, in, out, |
| 935 | if (CRYPTO_gcm128_decrypt_ctr32(&gctx->gcm, | 913 | len, gctx->ctr)) |
| 936 | in, out, len, | ||
| 937 | gctx->ctr)) | ||
| 938 | goto err; | 914 | goto err; |
| 939 | } | 915 | } else { |
| 940 | else { | ||
| 941 | if (CRYPTO_gcm128_decrypt(&gctx->gcm, in, out, len)) | 916 | if (CRYPTO_gcm128_decrypt(&gctx->gcm, in, out, len)) |
| 942 | goto err; | 917 | goto err; |
| 943 | } | 918 | } |
| 944 | /* Retrieve tag */ | 919 | /* Retrieve tag */ |
| 945 | CRYPTO_gcm128_tag(&gctx->gcm, ctx->buf, | 920 | CRYPTO_gcm128_tag(&gctx->gcm, ctx->buf, EVP_GCM_TLS_TAG_LEN); |
| 946 | EVP_GCM_TLS_TAG_LEN); | 921 | |
| 947 | /* If tag mismatch wipe buffer */ | 922 | /* If tag mismatch wipe buffer */ |
| 948 | if (memcmp(ctx->buf, in + len, EVP_GCM_TLS_TAG_LEN)) | 923 | if (memcmp(ctx->buf, in + len, EVP_GCM_TLS_TAG_LEN)) { |
| 949 | { | ||
| 950 | OPENSSL_cleanse(out, len); | 924 | OPENSSL_cleanse(out, len); |
| 951 | goto err; | 925 | goto err; |
| 952 | } | ||
| 953 | rv = len; | ||
| 954 | } | 926 | } |
| 927 | rv = len; | ||
| 928 | } | ||
| 955 | 929 | ||
| 956 | err: | 930 | err: |
| 957 | gctx->iv_set = 0; | 931 | gctx->iv_set = 0; |
| 958 | gctx->tls_aad_len = -1; | 932 | gctx->tls_aad_len = -1; |
| 959 | return rv; | 933 | return rv; |
| 960 | } | 934 | } |
| 961 | 935 | ||
| 962 | static int aes_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 936 | static int |
| 963 | const unsigned char *in, size_t len) | 937 | aes_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 964 | { | 938 | const unsigned char *in, size_t len) |
| 939 | { | ||
| 965 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | 940 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; |
| 941 | |||
| 966 | /* If not set up, return error */ | 942 | /* If not set up, return error */ |
| 967 | if (!gctx->key_set) | 943 | if (!gctx->key_set) |
| 968 | return -1; | 944 | return -1; |
| @@ -972,95 +948,88 @@ static int aes_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | |||
| 972 | 948 | ||
| 973 | if (!gctx->iv_set) | 949 | if (!gctx->iv_set) |
| 974 | return -1; | 950 | return -1; |
| 975 | if (in) | 951 | |
| 976 | { | 952 | if (in) { |
| 977 | if (out == NULL) | 953 | if (out == NULL) { |
| 978 | { | ||
| 979 | if (CRYPTO_gcm128_aad(&gctx->gcm, in, len)) | 954 | if (CRYPTO_gcm128_aad(&gctx->gcm, in, len)) |
| 980 | return -1; | 955 | return -1; |
| 981 | } | 956 | } else if (ctx->encrypt) { |
| 982 | else if (ctx->encrypt) | 957 | if (gctx->ctr) { |
| 983 | { | ||
| 984 | if (gctx->ctr) | ||
| 985 | { | ||
| 986 | if (CRYPTO_gcm128_encrypt_ctr32(&gctx->gcm, | 958 | if (CRYPTO_gcm128_encrypt_ctr32(&gctx->gcm, |
| 987 | in, out, len, | 959 | in, out, len, gctx->ctr)) |
| 988 | gctx->ctr)) | ||
| 989 | return -1; | 960 | return -1; |
| 990 | } | 961 | } else { |
| 991 | else { | 962 | if (CRYPTO_gcm128_encrypt(&gctx->gcm, |
| 992 | if (CRYPTO_gcm128_encrypt(&gctx->gcm, in, out, len)) | 963 | in, out, len)) |
| 993 | return -1; | 964 | return -1; |
| 994 | } | ||
| 995 | } | 965 | } |
| 996 | else | 966 | } else { |
| 997 | { | 967 | if (gctx->ctr) { |
| 998 | if (gctx->ctr) | ||
| 999 | { | ||
| 1000 | if (CRYPTO_gcm128_decrypt_ctr32(&gctx->gcm, | 968 | if (CRYPTO_gcm128_decrypt_ctr32(&gctx->gcm, |
| 1001 | in, out, len, | 969 | in, out, len, gctx->ctr)) |
| 1002 | gctx->ctr)) | ||
| 1003 | return -1; | 970 | return -1; |
| 1004 | } | 971 | } else { |
| 1005 | else { | 972 | if (CRYPTO_gcm128_decrypt(&gctx->gcm, |
| 1006 | if (CRYPTO_gcm128_decrypt(&gctx->gcm, in, out, len)) | 973 | in, out, len)) |
| 1007 | return -1; | 974 | return -1; |
| 1008 | } | ||
| 1009 | } | 975 | } |
| 1010 | return len; | ||
| 1011 | } | 976 | } |
| 1012 | else | 977 | return len; |
| 1013 | { | 978 | } else { |
| 1014 | if (!ctx->encrypt) | 979 | if (!ctx->encrypt) { |
| 1015 | { | ||
| 1016 | if (gctx->taglen < 0) | 980 | if (gctx->taglen < 0) |
| 1017 | return -1; | 981 | return -1; |
| 1018 | if (CRYPTO_gcm128_finish(&gctx->gcm, | 982 | if (CRYPTO_gcm128_finish(&gctx->gcm, ctx->buf, |
| 1019 | ctx->buf, gctx->taglen) != 0) | 983 | gctx->taglen) != 0) |
| 1020 | return -1; | 984 | return -1; |
| 1021 | gctx->iv_set = 0; | 985 | gctx->iv_set = 0; |
| 1022 | return 0; | 986 | return 0; |
| 1023 | } | 987 | } |
| 1024 | CRYPTO_gcm128_tag(&gctx->gcm, ctx->buf, 16); | 988 | CRYPTO_gcm128_tag(&gctx->gcm, ctx->buf, 16); |
| 1025 | gctx->taglen = 16; | 989 | gctx->taglen = 16; |
| 990 | |||
| 1026 | /* Don't reuse the IV */ | 991 | /* Don't reuse the IV */ |
| 1027 | gctx->iv_set = 0; | 992 | gctx->iv_set = 0; |
| 1028 | return 0; | 993 | return 0; |
| 1029 | } | ||
| 1030 | |||
| 1031 | } | 994 | } |
| 1032 | 995 | ||
| 996 | } | ||
| 997 | |||
| 1033 | #define CUSTOM_FLAGS (EVP_CIPH_FLAG_DEFAULT_ASN1 \ | 998 | #define CUSTOM_FLAGS (EVP_CIPH_FLAG_DEFAULT_ASN1 \ |
| 1034 | | EVP_CIPH_CUSTOM_IV | EVP_CIPH_FLAG_CUSTOM_CIPHER \ | 999 | | EVP_CIPH_CUSTOM_IV | EVP_CIPH_FLAG_CUSTOM_CIPHER \ |
| 1035 | | EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT) | 1000 | | EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT) |
| 1036 | 1001 | ||
| 1037 | BLOCK_CIPHER_custom(NID_aes,128,1,12,gcm,GCM, | 1002 | BLOCK_CIPHER_custom(NID_aes, 128, 1,12, gcm, GCM, |
| 1038 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) | 1003 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) |
| 1039 | BLOCK_CIPHER_custom(NID_aes,192,1,12,gcm,GCM, | 1004 | BLOCK_CIPHER_custom(NID_aes, 192, 1,12, gcm, GCM, |
| 1040 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) | 1005 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) |
| 1041 | BLOCK_CIPHER_custom(NID_aes,256,1,12,gcm,GCM, | 1006 | BLOCK_CIPHER_custom(NID_aes, 256, 1,12, gcm, GCM, |
| 1042 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) | 1007 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) |
| 1043 | 1008 | ||
| 1044 | static int aes_xts_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | 1009 | static int |
| 1045 | { | 1010 | aes_xts_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) |
| 1011 | { | ||
| 1046 | EVP_AES_XTS_CTX *xctx = c->cipher_data; | 1012 | EVP_AES_XTS_CTX *xctx = c->cipher_data; |
| 1013 | |||
| 1047 | if (type != EVP_CTRL_INIT) | 1014 | if (type != EVP_CTRL_INIT) |
| 1048 | return -1; | 1015 | return -1; |
| 1016 | |||
| 1049 | /* key1 and key2 are used as an indicator both key and IV are set */ | 1017 | /* key1 and key2 are used as an indicator both key and IV are set */ |
| 1050 | xctx->xts.key1 = NULL; | 1018 | xctx->xts.key1 = NULL; |
| 1051 | xctx->xts.key2 = NULL; | 1019 | xctx->xts.key2 = NULL; |
| 1052 | return 1; | 1020 | return 1; |
| 1053 | } | 1021 | } |
| 1054 | 1022 | ||
| 1055 | static int aes_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 1023 | static int |
| 1056 | const unsigned char *iv, int enc) | 1024 | aes_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 1057 | { | 1025 | const unsigned char *iv, int enc) |
| 1026 | { | ||
| 1058 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; | 1027 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; |
| 1028 | |||
| 1059 | if (!iv && !key) | 1029 | if (!iv && !key) |
| 1060 | return 1; | 1030 | return 1; |
| 1061 | 1031 | ||
| 1062 | if (key) do | 1032 | if (key) do { |
| 1063 | { | ||
| 1064 | #ifdef AES_XTS_ASM | 1033 | #ifdef AES_XTS_ASM |
| 1065 | xctx->stream = enc ? AES_xts_encrypt : AES_xts_decrypt; | 1034 | xctx->stream = enc ? AES_xts_encrypt : AES_xts_decrypt; |
| 1066 | #else | 1035 | #else |
| @@ -1069,100 +1038,98 @@ static int aes_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | |||
| 1069 | /* key_len is two AES keys */ | 1038 | /* key_len is two AES keys */ |
| 1070 | #ifdef BSAES_CAPABLE | 1039 | #ifdef BSAES_CAPABLE |
| 1071 | if (BSAES_CAPABLE) | 1040 | if (BSAES_CAPABLE) |
| 1072 | xctx->stream = enc ? bsaes_xts_encrypt : bsaes_xts_decrypt; | 1041 | xctx->stream = enc ? bsaes_xts_encrypt : |
| 1042 | bsaes_xts_decrypt; | ||
| 1073 | else | 1043 | else |
| 1074 | #endif | 1044 | #endif |
| 1075 | #ifdef VPAES_CAPABLE | 1045 | #ifdef VPAES_CAPABLE |
| 1076 | if (VPAES_CAPABLE) | 1046 | if (VPAES_CAPABLE) { |
| 1077 | { | 1047 | if (enc) { |
| 1078 | if (enc) | 1048 | vpaes_set_encrypt_key(key, ctx->key_len * 4, |
| 1079 | { | 1049 | &xctx->ks1); |
| 1080 | vpaes_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1); | 1050 | xctx->xts.block1 = (block128_f)vpaes_encrypt; |
| 1081 | xctx->xts.block1 = (block128_f)vpaes_encrypt; | 1051 | } else { |
| 1082 | } | 1052 | vpaes_set_decrypt_key(key, ctx->key_len * 4, |
| 1083 | else | 1053 | &xctx->ks1); |
| 1084 | { | 1054 | xctx->xts.block1 = (block128_f)vpaes_decrypt; |
| 1085 | vpaes_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
| 1086 | xctx->xts.block1 = (block128_f)vpaes_decrypt; | ||
| 1087 | } | 1055 | } |
| 1088 | 1056 | ||
| 1089 | vpaes_set_encrypt_key(key + ctx->key_len/2, | 1057 | vpaes_set_encrypt_key(key + ctx->key_len / 2, |
| 1090 | ctx->key_len * 4, &xctx->ks2); | 1058 | ctx->key_len * 4, &xctx->ks2); |
| 1091 | xctx->xts.block2 = (block128_f)vpaes_encrypt; | 1059 | xctx->xts.block2 = (block128_f)vpaes_encrypt; |
| 1092 | 1060 | ||
| 1093 | xctx->xts.key1 = &xctx->ks1; | 1061 | xctx->xts.key1 = &xctx->ks1; |
| 1094 | break; | 1062 | break; |
| 1095 | } | 1063 | } else |
| 1096 | else | ||
| 1097 | #endif | 1064 | #endif |
| 1098 | (void)0; /* terminate potentially open 'else' */ | 1065 | (void)0; /* terminate potentially open 'else' */ |
| 1099 | 1066 | ||
| 1100 | if (enc) | 1067 | if (enc) { |
| 1101 | { | ||
| 1102 | AES_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1); | 1068 | AES_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1); |
| 1103 | xctx->xts.block1 = (block128_f)AES_encrypt; | 1069 | xctx->xts.block1 = (block128_f)AES_encrypt; |
| 1104 | } | 1070 | } else { |
| 1105 | else | ||
| 1106 | { | ||
| 1107 | AES_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1); | 1071 | AES_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1); |
| 1108 | xctx->xts.block1 = (block128_f)AES_decrypt; | 1072 | xctx->xts.block1 = (block128_f)AES_decrypt; |
| 1109 | } | 1073 | } |
| 1110 | 1074 | ||
| 1111 | AES_set_encrypt_key(key + ctx->key_len/2, | 1075 | AES_set_encrypt_key(key + ctx->key_len / 2, |
| 1112 | ctx->key_len * 4, &xctx->ks2); | 1076 | ctx->key_len * 4, &xctx->ks2); |
| 1113 | xctx->xts.block2 = (block128_f)AES_encrypt; | 1077 | xctx->xts.block2 = (block128_f)AES_encrypt; |
| 1114 | 1078 | ||
| 1115 | xctx->xts.key1 = &xctx->ks1; | 1079 | xctx->xts.key1 = &xctx->ks1; |
| 1116 | } while (0); | 1080 | } while (0); |
| 1117 | 1081 | ||
| 1118 | if (iv) | 1082 | if (iv) { |
| 1119 | { | ||
| 1120 | xctx->xts.key2 = &xctx->ks2; | 1083 | xctx->xts.key2 = &xctx->ks2; |
| 1121 | memcpy(ctx->iv, iv, 16); | 1084 | memcpy(ctx->iv, iv, 16); |
| 1122 | } | 1085 | } |
| 1123 | 1086 | ||
| 1124 | return 1; | 1087 | return 1; |
| 1125 | } | 1088 | } |
| 1126 | 1089 | ||
| 1127 | static int aes_xts_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 1090 | static int |
| 1128 | const unsigned char *in, size_t len) | 1091 | aes_xts_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 1129 | { | 1092 | const unsigned char *in, size_t len) |
| 1093 | { | ||
| 1130 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; | 1094 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; |
| 1095 | |||
| 1131 | if (!xctx->xts.key1 || !xctx->xts.key2) | 1096 | if (!xctx->xts.key1 || !xctx->xts.key2) |
| 1132 | return 0; | 1097 | return 0; |
| 1133 | if (!out || !in || len<AES_BLOCK_SIZE) | 1098 | if (!out || !in || len < AES_BLOCK_SIZE) |
| 1134 | return 0; | 1099 | return 0; |
| 1100 | |||
| 1135 | #ifdef OPENSSL_FIPS | 1101 | #ifdef OPENSSL_FIPS |
| 1136 | /* Requirement of SP800-38E */ | 1102 | /* Requirement of SP800-38E */ |
| 1137 | if (FIPS_module_mode() && !(ctx->flags & EVP_CIPH_FLAG_NON_FIPS_ALLOW) && | 1103 | if (FIPS_module_mode() && |
| 1138 | (len > (1UL<<20)*16)) | 1104 | !(ctx->flags & EVP_CIPH_FLAG_NON_FIPS_ALLOW) && |
| 1139 | { | 1105 | (len > (1UL << 20) * 16)) { |
| 1140 | EVPerr(EVP_F_AES_XTS_CIPHER, EVP_R_TOO_LARGE); | 1106 | EVPerr(EVP_F_AES_XTS_CIPHER, EVP_R_TOO_LARGE); |
| 1141 | return 0; | 1107 | return 0; |
| 1142 | } | 1108 | } |
| 1143 | #endif | 1109 | #endif |
| 1144 | if (xctx->stream) | 1110 | if (xctx->stream) |
| 1145 | (*xctx->stream)(in, out, len, | 1111 | (*xctx->stream)(in, out, len, xctx->xts.key1, xctx->xts.key2, |
| 1146 | xctx->xts.key1, xctx->xts.key2, ctx->iv); | 1112 | ctx->iv); |
| 1147 | else if (CRYPTO_xts128_encrypt(&xctx->xts, ctx->iv, in, out, len, | 1113 | else if (CRYPTO_xts128_encrypt(&xctx->xts, ctx->iv, in, out, len, |
| 1148 | ctx->encrypt)) | 1114 | ctx->encrypt)) |
| 1149 | return 0; | 1115 | return 0; |
| 1150 | return 1; | 1116 | return 1; |
| 1151 | } | 1117 | } |
| 1152 | 1118 | ||
| 1153 | #define aes_xts_cleanup NULL | 1119 | #define aes_xts_cleanup NULL |
| 1154 | 1120 | ||
| 1155 | #define XTS_FLAGS (EVP_CIPH_FLAG_DEFAULT_ASN1 | EVP_CIPH_CUSTOM_IV \ | 1121 | #define XTS_FLAGS (EVP_CIPH_FLAG_DEFAULT_ASN1 | EVP_CIPH_CUSTOM_IV \ |
| 1156 | | EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT) | 1122 | | EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT) |
| 1157 | 1123 | ||
| 1158 | BLOCK_CIPHER_custom(NID_aes,128,1,16,xts,XTS,EVP_CIPH_FLAG_FIPS|XTS_FLAGS) | 1124 | BLOCK_CIPHER_custom(NID_aes, 128, 1,16, xts, XTS, EVP_CIPH_FLAG_FIPS|XTS_FLAGS) |
| 1159 | BLOCK_CIPHER_custom(NID_aes,256,1,16,xts,XTS,EVP_CIPH_FLAG_FIPS|XTS_FLAGS) | 1125 | BLOCK_CIPHER_custom(NID_aes, 256, 1,16, xts, XTS, EVP_CIPH_FLAG_FIPS|XTS_FLAGS) |
| 1160 | 1126 | ||
| 1161 | static int aes_ccm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | 1127 | static int |
| 1162 | { | 1128 | aes_ccm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) |
| 1129 | { | ||
| 1163 | EVP_AES_CCM_CTX *cctx = c->cipher_data; | 1130 | EVP_AES_CCM_CTX *cctx = c->cipher_data; |
| 1164 | switch (type) | 1131 | |
| 1165 | { | 1132 | switch (type) { |
| 1166 | case EVP_CTRL_INIT: | 1133 | case EVP_CTRL_INIT: |
| 1167 | cctx->key_set = 0; | 1134 | cctx->key_set = 0; |
| 1168 | cctx->iv_set = 0; | 1135 | cctx->iv_set = 0; |
| @@ -1174,6 +1141,7 @@ static int aes_ccm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 1174 | 1141 | ||
| 1175 | case EVP_CTRL_CCM_SET_IVLEN: | 1142 | case EVP_CTRL_CCM_SET_IVLEN: |
| 1176 | arg = 15 - arg; | 1143 | arg = 15 - arg; |
| 1144 | |||
| 1177 | case EVP_CTRL_CCM_SET_L: | 1145 | case EVP_CTRL_CCM_SET_L: |
| 1178 | if (arg < 2 || arg > 8) | 1146 | if (arg < 2 || arg > 8) |
| 1179 | return 0; | 1147 | return 0; |
| @@ -1185,18 +1153,17 @@ static int aes_ccm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 1185 | return 0; | 1153 | return 0; |
| 1186 | if ((c->encrypt && ptr) || (!c->encrypt && !ptr)) | 1154 | if ((c->encrypt && ptr) || (!c->encrypt && !ptr)) |
| 1187 | return 0; | 1155 | return 0; |
| 1188 | if (ptr) | 1156 | if (ptr) { |
| 1189 | { | ||
| 1190 | cctx->tag_set = 1; | 1157 | cctx->tag_set = 1; |
| 1191 | memcpy(c->buf, ptr, arg); | 1158 | memcpy(c->buf, ptr, arg); |
| 1192 | } | 1159 | } |
| 1193 | cctx->M = arg; | 1160 | cctx->M = arg; |
| 1194 | return 1; | 1161 | return 1; |
| 1195 | 1162 | ||
| 1196 | case EVP_CTRL_CCM_GET_TAG: | 1163 | case EVP_CTRL_CCM_GET_TAG: |
| 1197 | if (!c->encrypt || !cctx->tag_set) | 1164 | if (!c->encrypt || !cctx->tag_set) |
| 1198 | return 0; | 1165 | return 0; |
| 1199 | if(!CRYPTO_ccm128_tag(&cctx->ccm, ptr, (size_t)arg)) | 1166 | if (!CRYPTO_ccm128_tag(&cctx->ccm, ptr, (size_t)arg)) |
| 1200 | return 0; | 1167 | return 0; |
| 1201 | cctx->tag_set = 0; | 1168 | cctx->tag_set = 0; |
| 1202 | cctx->iv_set = 0; | 1169 | cctx->iv_set = 0; |
| @@ -1205,116 +1172,111 @@ static int aes_ccm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 1205 | 1172 | ||
| 1206 | default: | 1173 | default: |
| 1207 | return -1; | 1174 | return -1; |
| 1208 | |||
| 1209 | } | ||
| 1210 | } | 1175 | } |
| 1176 | } | ||
| 1211 | 1177 | ||
| 1212 | static int aes_ccm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 1178 | static int |
| 1213 | const unsigned char *iv, int enc) | 1179 | aes_ccm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 1214 | { | 1180 | const unsigned char *iv, int enc) |
| 1181 | { | ||
| 1215 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; | 1182 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; |
| 1183 | |||
| 1216 | if (!iv && !key) | 1184 | if (!iv && !key) |
| 1217 | return 1; | 1185 | return 1; |
| 1218 | if (key) do | 1186 | if (key) do { |
| 1219 | { | ||
| 1220 | #ifdef VPAES_CAPABLE | 1187 | #ifdef VPAES_CAPABLE |
| 1221 | if (VPAES_CAPABLE) | 1188 | if (VPAES_CAPABLE) { |
| 1222 | { | ||
| 1223 | vpaes_set_encrypt_key(key, ctx->key_len*8, &cctx->ks); | 1189 | vpaes_set_encrypt_key(key, ctx->key_len*8, &cctx->ks); |
| 1224 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, | 1190 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, |
| 1225 | &cctx->ks, (block128_f)vpaes_encrypt); | 1191 | &cctx->ks, (block128_f)vpaes_encrypt); |
| 1226 | cctx->str = NULL; | 1192 | cctx->str = NULL; |
| 1227 | cctx->key_set = 1; | 1193 | cctx->key_set = 1; |
| 1228 | break; | 1194 | break; |
| 1229 | } | 1195 | } |
| 1230 | #endif | 1196 | #endif |
| 1231 | AES_set_encrypt_key(key, ctx->key_len * 8, &cctx->ks); | 1197 | AES_set_encrypt_key(key, ctx->key_len * 8, &cctx->ks); |
| 1232 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, | 1198 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, |
| 1233 | &cctx->ks, (block128_f)AES_encrypt); | 1199 | &cctx->ks, (block128_f)AES_encrypt); |
| 1234 | cctx->str = NULL; | 1200 | cctx->str = NULL; |
| 1235 | cctx->key_set = 1; | 1201 | cctx->key_set = 1; |
| 1236 | } while (0); | 1202 | } while (0); |
| 1237 | if (iv) | 1203 | if (iv) { |
| 1238 | { | ||
| 1239 | memcpy(ctx->iv, iv, 15 - cctx->L); | 1204 | memcpy(ctx->iv, iv, 15 - cctx->L); |
| 1240 | cctx->iv_set = 1; | 1205 | cctx->iv_set = 1; |
| 1241 | } | ||
| 1242 | return 1; | ||
| 1243 | } | 1206 | } |
| 1207 | return 1; | ||
| 1208 | } | ||
| 1244 | 1209 | ||
| 1245 | static int aes_ccm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 1210 | static int |
| 1246 | const unsigned char *in, size_t len) | 1211 | aes_ccm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 1247 | { | 1212 | const unsigned char *in, size_t len) |
| 1213 | { | ||
| 1248 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; | 1214 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; |
| 1249 | CCM128_CONTEXT *ccm = &cctx->ccm; | 1215 | CCM128_CONTEXT *ccm = &cctx->ccm; |
| 1216 | |||
| 1250 | /* If not set up, return error */ | 1217 | /* If not set up, return error */ |
| 1251 | if (!cctx->iv_set && !cctx->key_set) | 1218 | if (!cctx->iv_set && !cctx->key_set) |
| 1252 | return -1; | 1219 | return -1; |
| 1253 | if (!ctx->encrypt && !cctx->tag_set) | 1220 | if (!ctx->encrypt && !cctx->tag_set) |
| 1254 | return -1; | 1221 | return -1; |
| 1255 | if (!out) | 1222 | |
| 1256 | { | 1223 | if (!out) { |
| 1257 | if (!in) | 1224 | if (!in) { |
| 1258 | { | 1225 | if (CRYPTO_ccm128_setiv(ccm, ctx->iv, 15 - cctx->L, |
| 1259 | if (CRYPTO_ccm128_setiv(ccm, ctx->iv, 15 - cctx->L,len)) | 1226 | len)) |
| 1260 | return -1; | 1227 | return -1; |
| 1261 | cctx->len_set = 1; | 1228 | cctx->len_set = 1; |
| 1262 | return len; | 1229 | return len; |
| 1263 | } | 1230 | } |
| 1264 | /* If have AAD need message length */ | 1231 | /* If have AAD need message length */ |
| 1265 | if (!cctx->len_set && len) | 1232 | if (!cctx->len_set && len) |
| 1266 | return -1; | 1233 | return -1; |
| 1267 | CRYPTO_ccm128_aad(ccm, in, len); | 1234 | CRYPTO_ccm128_aad(ccm, in, len); |
| 1268 | return len; | 1235 | return len; |
| 1269 | } | 1236 | } |
| 1270 | /* EVP_*Final() doesn't return any data */ | 1237 | /* EVP_*Final() doesn't return any data */ |
| 1271 | if (!in) | 1238 | if (!in) |
| 1272 | return 0; | 1239 | return 0; |
| 1273 | /* If not set length yet do it */ | 1240 | /* If not set length yet do it */ |
| 1274 | if (!cctx->len_set) | 1241 | if (!cctx->len_set) { |
| 1275 | { | ||
| 1276 | if (CRYPTO_ccm128_setiv(ccm, ctx->iv, 15 - cctx->L, len)) | 1242 | if (CRYPTO_ccm128_setiv(ccm, ctx->iv, 15 - cctx->L, len)) |
| 1277 | return -1; | 1243 | return -1; |
| 1278 | cctx->len_set = 1; | 1244 | cctx->len_set = 1; |
| 1279 | } | 1245 | } |
| 1280 | if (ctx->encrypt) | 1246 | if (ctx->encrypt) { |
| 1281 | { | ||
| 1282 | if (cctx->str ? CRYPTO_ccm128_encrypt_ccm64(ccm, in, out, len, | 1247 | if (cctx->str ? CRYPTO_ccm128_encrypt_ccm64(ccm, in, out, len, |
| 1283 | cctx->str) : | 1248 | cctx->str) : CRYPTO_ccm128_encrypt(ccm, in, out, len)) |
| 1284 | CRYPTO_ccm128_encrypt(ccm, in, out, len)) | ||
| 1285 | return -1; | 1249 | return -1; |
| 1286 | cctx->tag_set = 1; | 1250 | cctx->tag_set = 1; |
| 1287 | return len; | 1251 | return len; |
| 1288 | } | 1252 | } else { |
| 1289 | else | ||
| 1290 | { | ||
| 1291 | int rv = -1; | 1253 | int rv = -1; |
| 1292 | if (cctx->str ? !CRYPTO_ccm128_decrypt_ccm64(ccm, in, out, len, | 1254 | if (cctx->str ? !CRYPTO_ccm128_decrypt_ccm64(ccm, in, out, len, |
| 1293 | cctx->str) : | 1255 | cctx->str) : !CRYPTO_ccm128_decrypt(ccm, in, out, len)) { |
| 1294 | !CRYPTO_ccm128_decrypt(ccm, in, out, len)) | ||
| 1295 | { | ||
| 1296 | unsigned char tag[16]; | 1256 | unsigned char tag[16]; |
| 1297 | if (CRYPTO_ccm128_tag(ccm, tag, cctx->M)) | 1257 | if (CRYPTO_ccm128_tag(ccm, tag, cctx->M)) { |
| 1298 | { | ||
| 1299 | if (!memcmp(tag, ctx->buf, cctx->M)) | 1258 | if (!memcmp(tag, ctx->buf, cctx->M)) |
| 1300 | rv = len; | 1259 | rv = len; |
| 1301 | } | ||
| 1302 | } | 1260 | } |
| 1261 | } | ||
| 1303 | if (rv == -1) | 1262 | if (rv == -1) |
| 1304 | OPENSSL_cleanse(out, len); | 1263 | OPENSSL_cleanse(out, len); |
| 1305 | cctx->iv_set = 0; | 1264 | cctx->iv_set = 0; |
| 1306 | cctx->tag_set = 0; | 1265 | cctx->tag_set = 0; |
| 1307 | cctx->len_set = 0; | 1266 | cctx->len_set = 0; |
| 1308 | return rv; | 1267 | return rv; |
| 1309 | } | ||
| 1310 | |||
| 1311 | } | 1268 | } |
| 1312 | 1269 | ||
| 1270 | } | ||
| 1271 | |||
| 1313 | #define aes_ccm_cleanup NULL | 1272 | #define aes_ccm_cleanup NULL |
| 1314 | 1273 | ||
| 1315 | BLOCK_CIPHER_custom(NID_aes,128,1,12,ccm,CCM,EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) | 1274 | BLOCK_CIPHER_custom(NID_aes, 128, 1,12, ccm, CCM, |
| 1316 | BLOCK_CIPHER_custom(NID_aes,192,1,12,ccm,CCM,EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) | 1275 | EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) |
| 1317 | BLOCK_CIPHER_custom(NID_aes,256,1,12,ccm,CCM,EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) | 1276 | BLOCK_CIPHER_custom(NID_aes, 192, 1,12, ccm, CCM, |
| 1277 | EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) | ||
| 1278 | BLOCK_CIPHER_custom(NID_aes, 256, 1,12, ccm, CCM, | ||
| 1279 | EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) | ||
| 1318 | 1280 | ||
| 1319 | #endif | 1281 | #endif |
| 1320 | #endif | 1282 | #endif |
diff --git a/src/lib/libssl/src/crypto/evp/e_aes_cbc_hmac_sha1.c b/src/lib/libssl/src/crypto/evp/e_aes_cbc_hmac_sha1.c index 4d76ec74d2..af0edb3dcf 100644 --- a/src/lib/libssl/src/crypto/evp/e_aes_cbc_hmac_sha1.c +++ b/src/lib/libssl/src/crypto/evp/e_aes_cbc_hmac_sha1.c | |||
| @@ -72,16 +72,15 @@ | |||
| 72 | 72 | ||
| 73 | #define TLS1_1_VERSION 0x0302 | 73 | #define TLS1_1_VERSION 0x0302 |
| 74 | 74 | ||
| 75 | typedef struct | 75 | typedef struct { |
| 76 | { | 76 | AES_KEY ks; |
| 77 | AES_KEY ks; | 77 | SHA_CTX head, tail, md; |
| 78 | SHA_CTX head,tail,md; | 78 | size_t payload_length; /* AAD length in decrypt case */ |
| 79 | size_t payload_length; /* AAD length in decrypt case */ | 79 | union { |
| 80 | union { | 80 | unsigned int tls_ver; |
| 81 | unsigned int tls_ver; | 81 | unsigned char tls_aad[16]; /* 13 used */ |
| 82 | unsigned char tls_aad[16]; /* 13 used */ | 82 | } aux; |
| 83 | } aux; | 83 | } EVP_AES_HMAC_SHA1; |
| 84 | } EVP_AES_HMAC_SHA1; | ||
| 85 | 84 | ||
| 86 | #define NO_PAYLOAD_LENGTH ((size_t)-1) | 85 | #define NO_PAYLOAD_LENGTH ((size_t)-1) |
| 87 | 86 | ||
| @@ -97,43 +96,37 @@ typedef struct | |||
| 97 | extern unsigned int OPENSSL_ia32cap_P[2]; | 96 | extern unsigned int OPENSSL_ia32cap_P[2]; |
| 98 | #define AESNI_CAPABLE (1<<(57-32)) | 97 | #define AESNI_CAPABLE (1<<(57-32)) |
| 99 | 98 | ||
| 100 | int aesni_set_encrypt_key(const unsigned char *userKey, int bits, | 99 | int aesni_set_encrypt_key(const unsigned char *userKey, int bits, AES_KEY *key); |
| 101 | AES_KEY *key); | 100 | int aesni_set_decrypt_key(const unsigned char *userKey, int bits, AES_KEY *key); |
| 102 | int aesni_set_decrypt_key(const unsigned char *userKey, int bits, | ||
| 103 | AES_KEY *key); | ||
| 104 | 101 | ||
| 105 | void aesni_cbc_encrypt(const unsigned char *in, | 102 | void aesni_cbc_encrypt(const unsigned char *in, unsigned char *out, |
| 106 | unsigned char *out, | 103 | size_t length, const AES_KEY *key, unsigned char *ivec, int enc); |
| 107 | size_t length, | ||
| 108 | const AES_KEY *key, | ||
| 109 | unsigned char *ivec, int enc); | ||
| 110 | 104 | ||
| 111 | void aesni_cbc_sha1_enc (const void *inp, void *out, size_t blocks, | 105 | void aesni_cbc_sha1_enc (const void *inp, void *out, size_t blocks, |
| 112 | const AES_KEY *key, unsigned char iv[16], | 106 | const AES_KEY *key, unsigned char iv[16], SHA_CTX *ctx, const void *in0); |
| 113 | SHA_CTX *ctx,const void *in0); | ||
| 114 | 107 | ||
| 115 | #define data(ctx) ((EVP_AES_HMAC_SHA1 *)(ctx)->cipher_data) | 108 | #define data(ctx) ((EVP_AES_HMAC_SHA1 *)(ctx)->cipher_data) |
| 116 | 109 | ||
| 117 | static int aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, | 110 | static int |
| 118 | const unsigned char *inkey, | 111 | aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, |
| 119 | const unsigned char *iv, int enc) | 112 | const unsigned char *iv, int enc) |
| 120 | { | 113 | { |
| 121 | EVP_AES_HMAC_SHA1 *key = data(ctx); | 114 | EVP_AES_HMAC_SHA1 *key = data(ctx); |
| 122 | int ret; | 115 | int ret; |
| 123 | 116 | ||
| 124 | if (enc) | 117 | if (enc) |
| 125 | ret=aesni_set_encrypt_key(inkey,ctx->key_len*8,&key->ks); | 118 | ret = aesni_set_encrypt_key(inkey, ctx->key_len * 8, &key->ks); |
| 126 | else | 119 | else |
| 127 | ret=aesni_set_decrypt_key(inkey,ctx->key_len*8,&key->ks); | 120 | ret = aesni_set_decrypt_key(inkey, ctx->key_len * 8, &key->ks); |
| 128 | 121 | ||
| 129 | SHA1_Init(&key->head); /* handy when benchmarking */ | 122 | SHA1_Init(&key->head); /* handy when benchmarking */ |
| 130 | key->tail = key->head; | 123 | key->tail = key->head; |
| 131 | key->md = key->head; | 124 | key->md = key->head; |
| 132 | 125 | ||
| 133 | key->payload_length = NO_PAYLOAD_LENGTH; | 126 | key->payload_length = NO_PAYLOAD_LENGTH; |
| 134 | 127 | ||
| 135 | return ret<0?0:1; | 128 | return ret < 0 ? 0 : 1; |
| 136 | } | 129 | } |
| 137 | 130 | ||
| 138 | #define STITCHED_CALL | 131 | #define STITCHED_CALL |
| 139 | 132 | ||
| @@ -141,16 +134,19 @@ static int aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, | |||
| 141 | #define aes_off 0 | 134 | #define aes_off 0 |
| 142 | #endif | 135 | #endif |
| 143 | 136 | ||
| 144 | void sha1_block_data_order (void *c,const void *p,size_t len); | 137 | void sha1_block_data_order (void *c, const void *p, size_t len); |
| 145 | 138 | ||
| 146 | static void sha1_update(SHA_CTX *c,const void *data,size_t len) | 139 | static void |
| 147 | { const unsigned char *ptr = data; | 140 | sha1_update(SHA_CTX *c, const void *data, size_t len) |
| 141 | { | ||
| 142 | const unsigned char *ptr = data; | ||
| 148 | size_t res; | 143 | size_t res; |
| 149 | 144 | ||
| 150 | if ((res = c->num)) { | 145 | if ((res = c->num)) { |
| 151 | res = SHA_CBLOCK-res; | 146 | res = SHA_CBLOCK - res; |
| 152 | if (len<res) res=len; | 147 | if (len < res) |
| 153 | SHA1_Update (c,ptr,res); | 148 | res = len; |
| 149 | SHA1_Update(c, ptr, res); | ||
| 154 | ptr += res; | 150 | ptr += res; |
| 155 | len -= res; | 151 | len -= res; |
| 156 | } | 152 | } |
| @@ -159,16 +155,17 @@ static void sha1_update(SHA_CTX *c,const void *data,size_t len) | |||
| 159 | len -= res; | 155 | len -= res; |
| 160 | 156 | ||
| 161 | if (len) { | 157 | if (len) { |
| 162 | sha1_block_data_order(c,ptr,len/SHA_CBLOCK); | 158 | sha1_block_data_order(c, ptr, len / SHA_CBLOCK); |
| 163 | 159 | ||
| 164 | ptr += len; | 160 | ptr += len; |
| 165 | c->Nh += len>>29; | 161 | c->Nh += len >> 29; |
| 166 | c->Nl += len<<=3; | 162 | c->Nl += len <<= 3; |
| 167 | if (c->Nl<(unsigned int)len) c->Nh++; | 163 | if (c->Nl < (unsigned int)len) |
| 164 | c->Nh++; | ||
| 168 | } | 165 | } |
| 169 | 166 | ||
| 170 | if (res) | 167 | if (res) |
| 171 | SHA1_Update(c,ptr,res); | 168 | SHA1_Update(c, ptr, res); |
| 172 | } | 169 | } |
| 173 | 170 | ||
| 174 | #ifdef SHA1_Update | 171 | #ifdef SHA1_Update |
| @@ -176,96 +173,106 @@ static void sha1_update(SHA_CTX *c,const void *data,size_t len) | |||
| 176 | #endif | 173 | #endif |
| 177 | #define SHA1_Update sha1_update | 174 | #define SHA1_Update sha1_update |
| 178 | 175 | ||
| 179 | static int aesni_cbc_hmac_sha1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 176 | static int |
| 180 | const unsigned char *in, size_t len) | 177 | aesni_cbc_hmac_sha1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 181 | { | 178 | const unsigned char *in, size_t len) |
| 179 | { | ||
| 182 | EVP_AES_HMAC_SHA1 *key = data(ctx); | 180 | EVP_AES_HMAC_SHA1 *key = data(ctx); |
| 183 | unsigned int l; | 181 | unsigned int l; |
| 184 | size_t plen = key->payload_length, | 182 | size_t plen = key->payload_length, |
| 185 | iv = 0, /* explicit IV in TLS 1.1 and later */ | 183 | iv = 0, /* explicit IV in TLS 1.1 and later */ |
| 186 | sha_off = 0; | 184 | sha_off = 0; |
| 187 | #if defined(STITCHED_CALL) | 185 | #if defined(STITCHED_CALL) |
| 188 | size_t aes_off = 0, | 186 | size_t aes_off = 0, blocks; |
| 189 | blocks; | ||
| 190 | 187 | ||
| 191 | sha_off = SHA_CBLOCK-key->md.num; | 188 | sha_off = SHA_CBLOCK - key->md.num; |
| 192 | #endif | 189 | #endif |
| 193 | 190 | ||
| 194 | key->payload_length = NO_PAYLOAD_LENGTH; | 191 | key->payload_length = NO_PAYLOAD_LENGTH; |
| 195 | 192 | ||
| 196 | if (len%AES_BLOCK_SIZE) return 0; | 193 | if (len % AES_BLOCK_SIZE) |
| 194 | return 0; | ||
| 197 | 195 | ||
| 198 | if (ctx->encrypt) { | 196 | if (ctx->encrypt) { |
| 199 | if (plen==NO_PAYLOAD_LENGTH) | 197 | if (plen == NO_PAYLOAD_LENGTH) |
| 200 | plen = len; | 198 | plen = len; |
| 201 | else if (len!=((plen+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE)) | 199 | else if (len != ((plen + SHA_DIGEST_LENGTH + AES_BLOCK_SIZE) & |
| 200 | -AES_BLOCK_SIZE)) | ||
| 202 | return 0; | 201 | return 0; |
| 203 | else if (key->aux.tls_ver >= TLS1_1_VERSION) | 202 | else if (key->aux.tls_ver >= TLS1_1_VERSION) |
| 204 | iv = AES_BLOCK_SIZE; | 203 | iv = AES_BLOCK_SIZE; |
| 205 | 204 | ||
| 206 | #if defined(STITCHED_CALL) | 205 | #if defined(STITCHED_CALL) |
| 207 | if (plen>(sha_off+iv) && (blocks=(plen-(sha_off+iv))/SHA_CBLOCK)) { | 206 | if (plen > (sha_off + iv) && |
| 208 | SHA1_Update(&key->md,in+iv,sha_off); | 207 | (blocks = (plen - (sha_off + iv)) / SHA_CBLOCK)) { |
| 208 | SHA1_Update(&key->md, in + iv, sha_off); | ||
| 209 | 209 | ||
| 210 | aesni_cbc_sha1_enc(in,out,blocks,&key->ks, | 210 | aesni_cbc_sha1_enc(in, out, blocks, &key->ks, |
| 211 | ctx->iv,&key->md,in+iv+sha_off); | 211 | ctx->iv, &key->md, in + iv + sha_off); |
| 212 | blocks *= SHA_CBLOCK; | 212 | blocks *= SHA_CBLOCK; |
| 213 | aes_off += blocks; | 213 | aes_off += blocks; |
| 214 | sha_off += blocks; | 214 | sha_off += blocks; |
| 215 | key->md.Nh += blocks>>29; | 215 | key->md.Nh += blocks >> 29; |
| 216 | key->md.Nl += blocks<<=3; | 216 | key->md.Nl += blocks <<= 3; |
| 217 | if (key->md.Nl<(unsigned int)blocks) key->md.Nh++; | 217 | if (key->md.Nl < (unsigned int)blocks) |
| 218 | key->md.Nh++; | ||
| 218 | } else { | 219 | } else { |
| 219 | sha_off = 0; | 220 | sha_off = 0; |
| 220 | } | 221 | } |
| 221 | #endif | 222 | #endif |
| 222 | sha_off += iv; | 223 | sha_off += iv; |
| 223 | SHA1_Update(&key->md,in+sha_off,plen-sha_off); | 224 | SHA1_Update(&key->md, in + sha_off, plen - sha_off); |
| 224 | 225 | ||
| 225 | if (plen!=len) { /* "TLS" mode of operation */ | 226 | if (plen != len) { /* "TLS" mode of operation */ |
| 226 | if (in!=out) | 227 | if (in != out) |
| 227 | memcpy(out+aes_off,in+aes_off,plen-aes_off); | 228 | memcpy(out + aes_off, in + aes_off, |
| 229 | plen - aes_off); | ||
| 228 | 230 | ||
| 229 | /* calculate HMAC and append it to payload */ | 231 | /* calculate HMAC and append it to payload */ |
| 230 | SHA1_Final(out+plen,&key->md); | 232 | SHA1_Final(out + plen, &key->md); |
| 231 | key->md = key->tail; | 233 | key->md = key->tail; |
| 232 | SHA1_Update(&key->md,out+plen,SHA_DIGEST_LENGTH); | 234 | SHA1_Update(&key->md, out + plen, SHA_DIGEST_LENGTH); |
| 233 | SHA1_Final(out+plen,&key->md); | 235 | SHA1_Final(out + plen, &key->md); |
| 234 | 236 | ||
| 235 | /* pad the payload|hmac */ | 237 | /* pad the payload|hmac */ |
| 236 | plen += SHA_DIGEST_LENGTH; | 238 | plen += SHA_DIGEST_LENGTH; |
| 237 | for (l=len-plen-1;plen<len;plen++) out[plen]=l; | 239 | for (l = len - plen - 1; plen < len; plen++) |
| 240 | out[plen] = l; | ||
| 241 | |||
| 238 | /* encrypt HMAC|padding at once */ | 242 | /* encrypt HMAC|padding at once */ |
| 239 | aesni_cbc_encrypt(out+aes_off,out+aes_off,len-aes_off, | 243 | aesni_cbc_encrypt(out + aes_off, out + aes_off, |
| 240 | &key->ks,ctx->iv,1); | 244 | len - aes_off, &key->ks, ctx->iv, 1); |
| 241 | } else { | 245 | } else { |
| 242 | aesni_cbc_encrypt(in+aes_off,out+aes_off,len-aes_off, | 246 | aesni_cbc_encrypt(in + aes_off, out + aes_off, |
| 243 | &key->ks,ctx->iv,1); | 247 | len - aes_off, &key->ks, ctx->iv, 1); |
| 244 | } | 248 | } |
| 245 | } else { | 249 | } else { |
| 246 | union { unsigned int u[SHA_DIGEST_LENGTH/sizeof(unsigned int)]; | 250 | union { |
| 247 | unsigned char c[32+SHA_DIGEST_LENGTH]; } mac, *pmac; | 251 | unsigned int u[SHA_DIGEST_LENGTH/sizeof(unsigned int)]; |
| 252 | unsigned char c[32 + SHA_DIGEST_LENGTH]; | ||
| 253 | } mac, *pmac; | ||
| 248 | 254 | ||
| 249 | /* arrange cache line alignment */ | 255 | /* arrange cache line alignment */ |
| 250 | pmac = (void *)(((size_t)mac.c+31)&((size_t)0-32)); | 256 | pmac = (void *)(((size_t)mac.c + 31) & ((size_t)0 - 32)); |
| 251 | 257 | ||
| 252 | /* decrypt HMAC|padding at once */ | 258 | /* decrypt HMAC|padding at once */ |
| 253 | aesni_cbc_encrypt(in,out,len, | 259 | aesni_cbc_encrypt(in, out, len, &key->ks, ctx->iv, 0); |
| 254 | &key->ks,ctx->iv,0); | ||
| 255 | 260 | ||
| 256 | if (plen) { /* "TLS" mode of operation */ | 261 | if (plen) { /* "TLS" mode of operation */ |
| 257 | size_t inp_len, mask, j, i; | 262 | size_t inp_len, mask, j, i; |
| 258 | unsigned int res, maxpad, pad, bitlen; | 263 | unsigned int res, maxpad, pad, bitlen; |
| 259 | int ret = 1; | 264 | int ret = 1; |
| 260 | union { unsigned int u[SHA_LBLOCK]; | 265 | union { |
| 261 | unsigned char c[SHA_CBLOCK]; } | 266 | unsigned int u[SHA_LBLOCK]; |
| 262 | *data = (void *)key->md.data; | 267 | unsigned char c[SHA_CBLOCK]; |
| 268 | } | ||
| 269 | *data = (void *)key->md.data; | ||
| 263 | 270 | ||
| 264 | if ((key->aux.tls_aad[plen-4]<<8|key->aux.tls_aad[plen-3]) | 271 | if ((key->aux.tls_aad[plen - 4] << 8 | |
| 265 | >= TLS1_1_VERSION) | 272 | key->aux.tls_aad[plen - 3]) >= TLS1_1_VERSION) |
| 266 | iv = AES_BLOCK_SIZE; | 273 | iv = AES_BLOCK_SIZE; |
| 267 | 274 | ||
| 268 | if (len<(iv+SHA_DIGEST_LENGTH+1)) | 275 | if (len < (iv + SHA_DIGEST_LENGTH + 1)) |
| 269 | return 0; | 276 | return 0; |
| 270 | 277 | ||
| 271 | /* omit explicit iv */ | 278 | /* omit explicit iv */ |
| @@ -273,93 +280,102 @@ static int aesni_cbc_hmac_sha1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | |||
| 273 | len -= iv; | 280 | len -= iv; |
| 274 | 281 | ||
| 275 | /* figure out payload length */ | 282 | /* figure out payload length */ |
| 276 | pad = out[len-1]; | 283 | pad = out[len - 1]; |
| 277 | maxpad = len-(SHA_DIGEST_LENGTH+1); | 284 | maxpad = len - (SHA_DIGEST_LENGTH + 1); |
| 278 | maxpad |= (255-maxpad)>>(sizeof(maxpad)*8-8); | 285 | maxpad |= (255 - maxpad) >> (sizeof(maxpad) * 8 - 8); |
| 279 | maxpad &= 255; | 286 | maxpad &= 255; |
| 280 | 287 | ||
| 281 | inp_len = len - (SHA_DIGEST_LENGTH+pad+1); | 288 | inp_len = len - (SHA_DIGEST_LENGTH + pad + 1); |
| 282 | mask = (0-((inp_len-len)>>(sizeof(inp_len)*8-1))); | 289 | mask = (0 - ((inp_len - len) >> |
| 290 | (sizeof(inp_len) * 8 - 1))); | ||
| 283 | inp_len &= mask; | 291 | inp_len &= mask; |
| 284 | ret &= (int)mask; | 292 | ret &= (int)mask; |
| 285 | 293 | ||
| 286 | key->aux.tls_aad[plen-2] = inp_len>>8; | 294 | key->aux.tls_aad[plen - 2] = inp_len >> 8; |
| 287 | key->aux.tls_aad[plen-1] = inp_len; | 295 | key->aux.tls_aad[plen - 1] = inp_len; |
| 288 | 296 | ||
| 289 | /* calculate HMAC */ | 297 | /* calculate HMAC */ |
| 290 | key->md = key->head; | 298 | key->md = key->head; |
| 291 | SHA1_Update(&key->md,key->aux.tls_aad,plen); | 299 | SHA1_Update(&key->md, key->aux.tls_aad, plen); |
| 292 | 300 | ||
| 293 | #if 1 | 301 | #if 1 |
| 294 | len -= SHA_DIGEST_LENGTH; /* amend mac */ | 302 | len -= SHA_DIGEST_LENGTH; /* amend mac */ |
| 295 | if (len>=(256+SHA_CBLOCK)) { | 303 | if (len >= (256 + SHA_CBLOCK)) { |
| 296 | j = (len-(256+SHA_CBLOCK))&(0-SHA_CBLOCK); | 304 | j = (len - (256 + SHA_CBLOCK)) & |
| 297 | j += SHA_CBLOCK-key->md.num; | 305 | (0 - SHA_CBLOCK); |
| 298 | SHA1_Update(&key->md,out,j); | 306 | j += SHA_CBLOCK - key->md.num; |
| 307 | SHA1_Update(&key->md, out, j); | ||
| 299 | out += j; | 308 | out += j; |
| 300 | len -= j; | 309 | len -= j; |
| 301 | inp_len -= j; | 310 | inp_len -= j; |
| 302 | } | 311 | } |
| 303 | 312 | ||
| 304 | /* but pretend as if we hashed padded payload */ | 313 | /* but pretend as if we hashed padded payload */ |
| 305 | bitlen = key->md.Nl+(inp_len<<3); /* at most 18 bits */ | 314 | bitlen = key->md.Nl + (inp_len << 3); /* at most 18 bits */ |
| 306 | #ifdef BSWAP | 315 | #ifdef BSWAP |
| 307 | bitlen = BSWAP(bitlen); | 316 | bitlen = BSWAP(bitlen); |
| 308 | #else | 317 | #else |
| 309 | mac.c[0] = 0; | 318 | mac.c[0] = 0; |
| 310 | mac.c[1] = (unsigned char)(bitlen>>16); | 319 | mac.c[1] = (unsigned char)(bitlen >> 16); |
| 311 | mac.c[2] = (unsigned char)(bitlen>>8); | 320 | mac.c[2] = (unsigned char)(bitlen >> 8); |
| 312 | mac.c[3] = (unsigned char)bitlen; | 321 | mac.c[3] = (unsigned char)bitlen; |
| 313 | bitlen = mac.u[0]; | 322 | bitlen = mac.u[0]; |
| 314 | #endif | 323 | #endif |
| 315 | 324 | ||
| 316 | pmac->u[0]=0; | 325 | pmac->u[0] = 0; |
| 317 | pmac->u[1]=0; | 326 | pmac->u[1] = 0; |
| 318 | pmac->u[2]=0; | 327 | pmac->u[2] = 0; |
| 319 | pmac->u[3]=0; | 328 | pmac->u[3] = 0; |
| 320 | pmac->u[4]=0; | 329 | pmac->u[4] = 0; |
| 321 | 330 | ||
| 322 | for (res=key->md.num, j=0;j<len;j++) { | 331 | for (res = key->md.num, j = 0; j < len; j++) { |
| 323 | size_t c = out[j]; | 332 | size_t c = out[j]; |
| 324 | mask = (j-inp_len)>>(sizeof(j)*8-8); | 333 | mask = (j - inp_len) >> (sizeof(j) * 8 - 8); |
| 325 | c &= mask; | 334 | c &= mask; |
| 326 | c |= 0x80&~mask&~((inp_len-j)>>(sizeof(j)*8-8)); | 335 | c |= 0x80 & ~mask & |
| 327 | data->c[res++]=(unsigned char)c; | 336 | ~((inp_len - j) >> (sizeof(j) * 8 - 8)); |
| 337 | data->c[res++] = (unsigned char)c; | ||
| 328 | 338 | ||
| 329 | if (res!=SHA_CBLOCK) continue; | 339 | if (res != SHA_CBLOCK) |
| 340 | continue; | ||
| 330 | 341 | ||
| 331 | /* j is not incremented yet */ | 342 | /* j is not incremented yet */ |
| 332 | mask = 0-((inp_len+7-j)>>(sizeof(j)*8-1)); | 343 | mask = 0 - ((inp_len + 7 - j) >> |
| 333 | data->u[SHA_LBLOCK-1] |= bitlen&mask; | 344 | (sizeof(j) * 8 - 1)); |
| 334 | sha1_block_data_order(&key->md,data,1); | 345 | data->u[SHA_LBLOCK - 1] |= bitlen&mask; |
| 335 | mask &= 0-((j-inp_len-72)>>(sizeof(j)*8-1)); | 346 | sha1_block_data_order(&key->md, data, 1); |
| 347 | mask &= 0 - ((j - inp_len - 72) >> | ||
| 348 | (sizeof(j) * 8 - 1)); | ||
| 336 | pmac->u[0] |= key->md.h0 & mask; | 349 | pmac->u[0] |= key->md.h0 & mask; |
| 337 | pmac->u[1] |= key->md.h1 & mask; | 350 | pmac->u[1] |= key->md.h1 & mask; |
| 338 | pmac->u[2] |= key->md.h2 & mask; | 351 | pmac->u[2] |= key->md.h2 & mask; |
| 339 | pmac->u[3] |= key->md.h3 & mask; | 352 | pmac->u[3] |= key->md.h3 & mask; |
| 340 | pmac->u[4] |= key->md.h4 & mask; | 353 | pmac->u[4] |= key->md.h4 & mask; |
| 341 | res=0; | 354 | res = 0; |
| 342 | } | 355 | } |
| 343 | 356 | ||
| 344 | for(i=res;i<SHA_CBLOCK;i++,j++) data->c[i]=0; | 357 | for (i = res; i < SHA_CBLOCK; i++, j++) |
| 358 | data->c[i] = 0; | ||
| 345 | 359 | ||
| 346 | if (res>SHA_CBLOCK-8) { | 360 | if (res > SHA_CBLOCK - 8) { |
| 347 | mask = 0-((inp_len+8-j)>>(sizeof(j)*8-1)); | 361 | mask = 0 - ((inp_len + 8 - j) >> |
| 348 | data->u[SHA_LBLOCK-1] |= bitlen&mask; | 362 | (sizeof(j) * 8 - 1)); |
| 349 | sha1_block_data_order(&key->md,data,1); | 363 | data->u[SHA_LBLOCK - 1] |= bitlen & mask; |
| 350 | mask &= 0-((j-inp_len-73)>>(sizeof(j)*8-1)); | 364 | sha1_block_data_order(&key->md, data, 1); |
| 365 | mask &= 0 - ((j - inp_len - 73) >> | ||
| 366 | (sizeof(j) * 8 - 1)); | ||
| 351 | pmac->u[0] |= key->md.h0 & mask; | 367 | pmac->u[0] |= key->md.h0 & mask; |
| 352 | pmac->u[1] |= key->md.h1 & mask; | 368 | pmac->u[1] |= key->md.h1 & mask; |
| 353 | pmac->u[2] |= key->md.h2 & mask; | 369 | pmac->u[2] |= key->md.h2 & mask; |
| 354 | pmac->u[3] |= key->md.h3 & mask; | 370 | pmac->u[3] |= key->md.h3 & mask; |
| 355 | pmac->u[4] |= key->md.h4 & mask; | 371 | pmac->u[4] |= key->md.h4 & mask; |
| 356 | 372 | ||
| 357 | memset(data,0,SHA_CBLOCK); | 373 | memset(data, 0, SHA_CBLOCK); |
| 358 | j+=64; | 374 | j += 64; |
| 359 | } | 375 | } |
| 360 | data->u[SHA_LBLOCK-1] = bitlen; | 376 | data->u[SHA_LBLOCK - 1] = bitlen; |
| 361 | sha1_block_data_order(&key->md,data,1); | 377 | sha1_block_data_order(&key->md, data, 1); |
| 362 | mask = 0-((j-inp_len-73)>>(sizeof(j)*8-1)); | 378 | mask = 0 - ((j - inp_len - 73) >> (sizeof(j) * 8 - 1)); |
| 363 | pmac->u[0] |= key->md.h0 & mask; | 379 | pmac->u[0] |= key->md.h0 & mask; |
| 364 | pmac->u[1] |= key->md.h1 & mask; | 380 | pmac->u[1] |= key->md.h1 & mask; |
| 365 | pmac->u[2] |= key->md.h2 & mask; | 381 | pmac->u[2] |= key->md.h2 & mask; |
| @@ -373,209 +389,218 @@ static int aesni_cbc_hmac_sha1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | |||
| 373 | pmac->u[3] = BSWAP(pmac->u[3]); | 389 | pmac->u[3] = BSWAP(pmac->u[3]); |
| 374 | pmac->u[4] = BSWAP(pmac->u[4]); | 390 | pmac->u[4] = BSWAP(pmac->u[4]); |
| 375 | #else | 391 | #else |
| 376 | for (i=0;i<5;i++) { | 392 | for (i = 0; i < 5; i++) { |
| 377 | res = pmac->u[i]; | 393 | res = pmac->u[i]; |
| 378 | pmac->c[4*i+0]=(unsigned char)(res>>24); | 394 | pmac->c[4 * i + 0] = (unsigned char)(res >> 24); |
| 379 | pmac->c[4*i+1]=(unsigned char)(res>>16); | 395 | pmac->c[4 * i + 1] = (unsigned char)(res >> 16); |
| 380 | pmac->c[4*i+2]=(unsigned char)(res>>8); | 396 | pmac->c[4 * i + 2] = (unsigned char)(res >> 8); |
| 381 | pmac->c[4*i+3]=(unsigned char)res; | 397 | pmac->c[4 * i + 3] = (unsigned char)res; |
| 382 | } | 398 | } |
| 383 | #endif | 399 | #endif |
| 384 | len += SHA_DIGEST_LENGTH; | 400 | len += SHA_DIGEST_LENGTH; |
| 385 | #else | 401 | #else |
| 386 | SHA1_Update(&key->md,out,inp_len); | 402 | SHA1_Update(&key->md, out, inp_len); |
| 387 | res = key->md.num; | 403 | res = key->md.num; |
| 388 | SHA1_Final(pmac->c,&key->md); | 404 | SHA1_Final(pmac->c, &key->md); |
| 389 | 405 | ||
| 390 | { | 406 | { |
| 391 | unsigned int inp_blocks, pad_blocks; | 407 | unsigned int inp_blocks, pad_blocks; |
| 392 | 408 | ||
| 393 | /* but pretend as if we hashed padded payload */ | 409 | /* but pretend as if we hashed padded payload */ |
| 394 | inp_blocks = 1+((SHA_CBLOCK-9-res)>>(sizeof(res)*8-1)); | 410 | inp_blocks = 1 + ((SHA_CBLOCK - 9 - res) >> |
| 395 | res += (unsigned int)(len-inp_len); | 411 | (sizeof(res) * 8 - 1)); |
| 396 | pad_blocks = res / SHA_CBLOCK; | 412 | res += (unsigned int)(len - inp_len); |
| 397 | res %= SHA_CBLOCK; | 413 | pad_blocks = res / SHA_CBLOCK; |
| 398 | pad_blocks += 1+((SHA_CBLOCK-9-res)>>(sizeof(res)*8-1)); | 414 | res %= SHA_CBLOCK; |
| 399 | for (;inp_blocks<pad_blocks;inp_blocks++) | 415 | pad_blocks += 1 + ((SHA_CBLOCK - 9 - res) >> |
| 400 | sha1_block_data_order(&key->md,data,1); | 416 | (sizeof(res) * 8 - 1)); |
| 417 | for (; inp_blocks < pad_blocks; inp_blocks++) | ||
| 418 | sha1_block_data_order(&key->md, | ||
| 419 | data, 1); | ||
| 401 | } | 420 | } |
| 402 | #endif | 421 | #endif |
| 403 | key->md = key->tail; | 422 | key->md = key->tail; |
| 404 | SHA1_Update(&key->md,pmac->c,SHA_DIGEST_LENGTH); | 423 | SHA1_Update(&key->md, pmac->c, SHA_DIGEST_LENGTH); |
| 405 | SHA1_Final(pmac->c,&key->md); | 424 | SHA1_Final(pmac->c, &key->md); |
| 406 | 425 | ||
| 407 | /* verify HMAC */ | 426 | /* verify HMAC */ |
| 408 | out += inp_len; | 427 | out += inp_len; |
| 409 | len -= inp_len; | 428 | len -= inp_len; |
| 410 | #if 1 | 429 | #if 1 |
| 411 | { | 430 | { |
| 412 | unsigned char *p = out+len-1-maxpad-SHA_DIGEST_LENGTH; | 431 | unsigned char *p = |
| 413 | size_t off = out-p; | 432 | out + len - 1 - maxpad - SHA_DIGEST_LENGTH; |
| 414 | unsigned int c, cmask; | 433 | size_t off = out - p; |
| 415 | 434 | unsigned int c, cmask; | |
| 416 | maxpad += SHA_DIGEST_LENGTH; | 435 | |
| 417 | for (res=0,i=0,j=0;j<maxpad;j++) { | 436 | maxpad += SHA_DIGEST_LENGTH; |
| 418 | c = p[j]; | 437 | for (res = 0, i = 0, j = 0; j < maxpad; j++) { |
| 419 | cmask = ((int)(j-off-SHA_DIGEST_LENGTH))>>(sizeof(int)*8-1); | 438 | c = p[j]; |
| 420 | res |= (c^pad)&~cmask; /* ... and padding */ | 439 | cmask = ((int)(j - off - |
| 421 | cmask &= ((int)(off-1-j))>>(sizeof(int)*8-1); | 440 | SHA_DIGEST_LENGTH)) >> |
| 422 | res |= (c^pmac->c[i])&cmask; | 441 | (sizeof(int) * 8 - 1); |
| 423 | i += 1&cmask; | 442 | res |= (c ^ pad) & ~cmask; /* ... and padding */ |
| 424 | } | 443 | cmask &= ((int)(off - 1 - j)) >> |
| 425 | maxpad -= SHA_DIGEST_LENGTH; | 444 | (sizeof(int) * 8 - 1); |
| 426 | 445 | res |= (c ^ pmac->c[i]) & cmask; | |
| 427 | res = 0-((0-res)>>(sizeof(res)*8-1)); | 446 | i += 1 & cmask; |
| 428 | ret &= (int)~res; | 447 | } |
| 448 | maxpad -= SHA_DIGEST_LENGTH; | ||
| 449 | |||
| 450 | res = 0 - ((0 - res) >> (sizeof(res) * 8 - 1)); | ||
| 451 | ret &= (int)~res; | ||
| 429 | } | 452 | } |
| 430 | #else | 453 | #else |
| 431 | for (res=0,i=0;i<SHA_DIGEST_LENGTH;i++) | 454 | for (res = 0, i = 0; i < SHA_DIGEST_LENGTH; i++) |
| 432 | res |= out[i]^pmac->c[i]; | 455 | res |= out[i] ^ pmac->c[i]; |
| 433 | res = 0-((0-res)>>(sizeof(res)*8-1)); | 456 | res = 0 - ((0 - res) >> (sizeof(res) * 8 - 1)); |
| 434 | ret &= (int)~res; | 457 | ret &= (int)~res; |
| 435 | 458 | ||
| 436 | /* verify padding */ | 459 | /* verify padding */ |
| 437 | pad = (pad&~res) | (maxpad&res); | 460 | pad = (pad & ~res) | (maxpad & res); |
| 438 | out = out+len-1-pad; | 461 | out = out + len - 1 - pad; |
| 439 | for (res=0,i=0;i<pad;i++) | 462 | for (res = 0, i = 0; i < pad; i++) |
| 440 | res |= out[i]^pad; | 463 | res |= out[i] ^ pad; |
| 441 | 464 | ||
| 442 | res = (0-res)>>(sizeof(res)*8-1); | 465 | res = (0 - res) >> (sizeof(res) * 8 - 1); |
| 443 | ret &= (int)~res; | 466 | ret &= (int)~res; |
| 444 | #endif | 467 | #endif |
| 445 | return ret; | 468 | return ret; |
| 446 | } else { | 469 | } else { |
| 447 | SHA1_Update(&key->md,out,len); | 470 | SHA1_Update(&key->md, out, len); |
| 448 | } | 471 | } |
| 449 | } | 472 | } |
| 450 | 473 | ||
| 451 | return 1; | 474 | return 1; |
| 452 | } | 475 | } |
| 453 | 476 | ||
| 454 | static int aesni_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | 477 | static int |
| 455 | { | 478 | aesni_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) |
| 479 | { | ||
| 456 | EVP_AES_HMAC_SHA1 *key = data(ctx); | 480 | EVP_AES_HMAC_SHA1 *key = data(ctx); |
| 457 | 481 | ||
| 458 | switch (type) | 482 | switch (type) { |
| 459 | { | ||
| 460 | case EVP_CTRL_AEAD_SET_MAC_KEY: | 483 | case EVP_CTRL_AEAD_SET_MAC_KEY: |
| 461 | { | 484 | { |
| 462 | unsigned int i; | 485 | unsigned int i; |
| 463 | unsigned char hmac_key[64]; | 486 | unsigned char hmac_key[64]; |
| 464 | 487 | ||
| 465 | memset (hmac_key,0,sizeof(hmac_key)); | 488 | memset (hmac_key, 0, sizeof(hmac_key)); |
| 466 | 489 | ||
| 467 | if (arg > (int)sizeof(hmac_key)) { | 490 | if (arg > (int)sizeof(hmac_key)) { |
| 468 | SHA1_Init(&key->head); | 491 | SHA1_Init(&key->head); |
| 469 | SHA1_Update(&key->head,ptr,arg); | 492 | SHA1_Update(&key->head, ptr, arg); |
| 470 | SHA1_Final(hmac_key,&key->head); | 493 | SHA1_Final(hmac_key, &key->head); |
| 471 | } else { | 494 | } else { |
| 472 | memcpy(hmac_key,ptr,arg); | 495 | memcpy(hmac_key, ptr, arg); |
| 473 | } | 496 | } |
| 474 | 497 | ||
| 475 | for (i=0;i<sizeof(hmac_key);i++) | 498 | for (i = 0; i < sizeof(hmac_key); i++) |
| 476 | hmac_key[i] ^= 0x36; /* ipad */ | 499 | hmac_key[i] ^= 0x36; /* ipad */ |
| 477 | SHA1_Init(&key->head); | 500 | SHA1_Init(&key->head); |
| 478 | SHA1_Update(&key->head,hmac_key,sizeof(hmac_key)); | 501 | SHA1_Update(&key->head, hmac_key, sizeof(hmac_key)); |
| 479 | 502 | ||
| 480 | for (i=0;i<sizeof(hmac_key);i++) | 503 | for (i = 0; i < sizeof(hmac_key); i++) |
| 481 | hmac_key[i] ^= 0x36^0x5c; /* opad */ | 504 | hmac_key[i] ^= 0x36 ^ 0x5c; /* opad */ |
| 482 | SHA1_Init(&key->tail); | 505 | SHA1_Init(&key->tail); |
| 483 | SHA1_Update(&key->tail,hmac_key,sizeof(hmac_key)); | 506 | SHA1_Update(&key->tail, hmac_key, sizeof(hmac_key)); |
| 484 | 507 | ||
| 485 | OPENSSL_cleanse(hmac_key,sizeof(hmac_key)); | 508 | OPENSSL_cleanse(hmac_key, sizeof(hmac_key)); |
| 486 | 509 | ||
| 487 | return 1; | 510 | return 1; |
| 488 | } | 511 | } |
| 489 | case EVP_CTRL_AEAD_TLS1_AAD: | 512 | case EVP_CTRL_AEAD_TLS1_AAD: |
| 490 | { | 513 | { |
| 491 | unsigned char *p=ptr; | 514 | unsigned char *p = ptr; |
| 492 | unsigned int len=p[arg-2]<<8|p[arg-1]; | 515 | unsigned int len = p[arg - 2] << 8 | p[arg - 1]; |
| 493 | 516 | ||
| 494 | if (ctx->encrypt) | 517 | if (ctx->encrypt) { |
| 495 | { | 518 | key->payload_length = len; |
| 496 | key->payload_length = len; | 519 | if ((key->aux.tls_ver = p[arg - 4] << 8 | |
| 497 | if ((key->aux.tls_ver=p[arg-4]<<8|p[arg-3]) >= TLS1_1_VERSION) { | 520 | p[arg - 3]) >= TLS1_1_VERSION) { |
| 498 | len -= AES_BLOCK_SIZE; | 521 | len -= AES_BLOCK_SIZE; |
| 499 | p[arg-2] = len>>8; | 522 | p[arg - 2] = len >> 8; |
| 500 | p[arg-1] = len; | 523 | p[arg - 1] = len; |
| 501 | } | 524 | } |
| 502 | key->md = key->head; | 525 | key->md = key->head; |
| 503 | SHA1_Update(&key->md,p,arg); | 526 | SHA1_Update(&key->md, p, arg); |
| 504 | 527 | ||
| 505 | return (int)(((len+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE) | 528 | return (int)(((len + SHA_DIGEST_LENGTH + |
| 506 | - len); | 529 | AES_BLOCK_SIZE) & -AES_BLOCK_SIZE) - len); |
| 507 | } | 530 | } else { |
| 508 | else | 531 | if (arg > 13) |
| 509 | { | 532 | arg = 13; |
| 510 | if (arg>13) arg = 13; | 533 | memcpy(key->aux.tls_aad, ptr, arg); |
| 511 | memcpy(key->aux.tls_aad,ptr,arg); | 534 | key->payload_length = arg; |
| 512 | key->payload_length = arg; | 535 | |
| 513 | 536 | return SHA_DIGEST_LENGTH; | |
| 514 | return SHA_DIGEST_LENGTH; | ||
| 515 | } | 537 | } |
| 516 | } | 538 | } |
| 517 | default: | 539 | default: |
| 518 | return -1; | 540 | return -1; |
| 519 | } | ||
| 520 | } | 541 | } |
| 542 | } | ||
| 521 | 543 | ||
| 522 | static EVP_CIPHER aesni_128_cbc_hmac_sha1_cipher = | 544 | static EVP_CIPHER aesni_128_cbc_hmac_sha1_cipher = { |
| 523 | { | ||
| 524 | #ifdef NID_aes_128_cbc_hmac_sha1 | 545 | #ifdef NID_aes_128_cbc_hmac_sha1 |
| 525 | NID_aes_128_cbc_hmac_sha1, | 546 | NID_aes_128_cbc_hmac_sha1, |
| 526 | #else | 547 | #else |
| 527 | NID_undef, | 548 | NID_undef, |
| 528 | #endif | 549 | #endif |
| 529 | 16,16,16, | 550 | 16, 16, 16, |
| 530 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, | 551 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, |
| 531 | aesni_cbc_hmac_sha1_init_key, | 552 | aesni_cbc_hmac_sha1_init_key, |
| 532 | aesni_cbc_hmac_sha1_cipher, | 553 | aesni_cbc_hmac_sha1_cipher, |
| 533 | NULL, | 554 | NULL, |
| 534 | sizeof(EVP_AES_HMAC_SHA1), | 555 | sizeof(EVP_AES_HMAC_SHA1), |
| 535 | EVP_CIPH_FLAG_DEFAULT_ASN1?NULL:EVP_CIPHER_set_asn1_iv, | 556 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_set_asn1_iv, |
| 536 | EVP_CIPH_FLAG_DEFAULT_ASN1?NULL:EVP_CIPHER_get_asn1_iv, | 557 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_get_asn1_iv, |
| 537 | aesni_cbc_hmac_sha1_ctrl, | 558 | aesni_cbc_hmac_sha1_ctrl, |
| 538 | NULL | 559 | NULL |
| 539 | }; | 560 | }; |
| 540 | 561 | ||
| 541 | static EVP_CIPHER aesni_256_cbc_hmac_sha1_cipher = | 562 | static EVP_CIPHER aesni_256_cbc_hmac_sha1_cipher = { |
| 542 | { | ||
| 543 | #ifdef NID_aes_256_cbc_hmac_sha1 | 563 | #ifdef NID_aes_256_cbc_hmac_sha1 |
| 544 | NID_aes_256_cbc_hmac_sha1, | 564 | NID_aes_256_cbc_hmac_sha1, |
| 545 | #else | 565 | #else |
| 546 | NID_undef, | 566 | NID_undef, |
| 547 | #endif | 567 | #endif |
| 548 | 16,32,16, | 568 | 16, 32, 16, |
| 549 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, | 569 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, |
| 550 | aesni_cbc_hmac_sha1_init_key, | 570 | aesni_cbc_hmac_sha1_init_key, |
| 551 | aesni_cbc_hmac_sha1_cipher, | 571 | aesni_cbc_hmac_sha1_cipher, |
| 552 | NULL, | 572 | NULL, |
| 553 | sizeof(EVP_AES_HMAC_SHA1), | 573 | sizeof(EVP_AES_HMAC_SHA1), |
| 554 | EVP_CIPH_FLAG_DEFAULT_ASN1?NULL:EVP_CIPHER_set_asn1_iv, | 574 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_set_asn1_iv, |
| 555 | EVP_CIPH_FLAG_DEFAULT_ASN1?NULL:EVP_CIPHER_get_asn1_iv, | 575 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_get_asn1_iv, |
| 556 | aesni_cbc_hmac_sha1_ctrl, | 576 | aesni_cbc_hmac_sha1_ctrl, |
| 557 | NULL | 577 | NULL |
| 558 | }; | 578 | }; |
| 559 | 579 | ||
| 560 | const EVP_CIPHER *EVP_aes_128_cbc_hmac_sha1(void) | 580 | const EVP_CIPHER * |
| 561 | { | 581 | EVP_aes_128_cbc_hmac_sha1(void) |
| 562 | return(OPENSSL_ia32cap_P[1]&AESNI_CAPABLE? | 582 | { |
| 563 | &aesni_128_cbc_hmac_sha1_cipher:NULL); | 583 | return(OPENSSL_ia32cap_P[1] & AESNI_CAPABLE? |
| 564 | } | 584 | &aesni_128_cbc_hmac_sha1_cipher : NULL); |
| 585 | } | ||
| 565 | 586 | ||
| 566 | const EVP_CIPHER *EVP_aes_256_cbc_hmac_sha1(void) | 587 | const EVP_CIPHER * |
| 567 | { | 588 | EVP_aes_256_cbc_hmac_sha1(void) |
| 568 | return(OPENSSL_ia32cap_P[1]&AESNI_CAPABLE? | 589 | { |
| 569 | &aesni_256_cbc_hmac_sha1_cipher:NULL); | 590 | return(OPENSSL_ia32cap_P[1] & AESNI_CAPABLE? |
| 570 | } | 591 | &aesni_256_cbc_hmac_sha1_cipher : NULL); |
| 592 | } | ||
| 571 | #else | 593 | #else |
| 572 | const EVP_CIPHER *EVP_aes_128_cbc_hmac_sha1(void) | 594 | const EVP_CIPHER * |
| 573 | { | 595 | EVP_aes_128_cbc_hmac_sha1(void) |
| 574 | return NULL; | 596 | { |
| 575 | } | ||
| 576 | const EVP_CIPHER *EVP_aes_256_cbc_hmac_sha1(void) | ||
| 577 | { | ||
| 578 | return NULL; | 597 | return NULL; |
| 579 | } | 598 | } |
| 599 | |||
| 600 | const EVP_CIPHER * | ||
| 601 | EVP_aes_256_cbc_hmac_sha1(void) | ||
| 602 | { | ||
| 603 | return NULL; | ||
| 604 | } | ||
| 580 | #endif | 605 | #endif |
| 581 | #endif | 606 | #endif |
diff --git a/src/lib/libssl/src/crypto/evp/e_bf.c b/src/lib/libssl/src/crypto/evp/e_bf.c index cc224e5363..62194767c8 100644 --- a/src/lib/libssl/src/crypto/evp/e_bf.c +++ b/src/lib/libssl/src/crypto/evp/e_bf.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -65,24 +65,23 @@ | |||
| 65 | #include <openssl/blowfish.h> | 65 | #include <openssl/blowfish.h> |
| 66 | 66 | ||
| 67 | static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 67 | static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 68 | const unsigned char *iv, int enc); | 68 | const unsigned char *iv, int enc); |
| 69 | 69 | ||
| 70 | typedef struct | 70 | typedef struct { |
| 71 | { | ||
| 72 | BF_KEY ks; | 71 | BF_KEY ks; |
| 73 | } EVP_BF_KEY; | 72 | } EVP_BF_KEY; |
| 74 | 73 | ||
| 75 | #define data(ctx) EVP_C_DATA(EVP_BF_KEY,ctx) | 74 | #define data(ctx) EVP_C_DATA(EVP_BF_KEY,ctx) |
| 76 | 75 | ||
| 77 | IMPLEMENT_BLOCK_CIPHER(bf, ks, BF, EVP_BF_KEY, NID_bf, 8, 16, 8, 64, | 76 | IMPLEMENT_BLOCK_CIPHER(bf, ks, BF, EVP_BF_KEY, NID_bf, 8, 16, 8, 64, |
| 78 | EVP_CIPH_VARIABLE_LENGTH, bf_init_key, NULL, | 77 | EVP_CIPH_VARIABLE_LENGTH, bf_init_key, NULL, |
| 79 | EVP_CIPHER_set_asn1_iv, EVP_CIPHER_get_asn1_iv, NULL) | 78 | EVP_CIPHER_set_asn1_iv, EVP_CIPHER_get_asn1_iv, NULL) |
| 80 | |||
| 81 | static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
| 82 | const unsigned char *iv, int enc) | ||
| 83 | { | ||
| 84 | BF_set_key(&data(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx),key); | ||
| 85 | return 1; | ||
| 86 | } | ||
| 87 | 79 | ||
| 80 | static int | ||
| 81 | bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
| 82 | const unsigned char *iv, int enc) | ||
| 83 | { | ||
| 84 | BF_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx), key); | ||
| 85 | return 1; | ||
| 86 | } | ||
| 88 | #endif | 87 | #endif |
diff --git a/src/lib/libssl/src/crypto/evp/e_camellia.c b/src/lib/libssl/src/crypto/evp/e_camellia.c index 8bb7c320d3..377d121b89 100644 --- a/src/lib/libssl/src/crypto/evp/e_camellia.c +++ b/src/lib/libssl/src/crypto/evp/e_camellia.c | |||
| @@ -7,7 +7,7 @@ | |||
| 7 | * are met: | 7 | * are met: |
| 8 | * | 8 | * |
| 9 | * 1. Redistributions of source code must retain the above copyright | 9 | * 1. Redistributions of source code must retain the above copyright |
| 10 | * notice, this list of conditions and the following disclaimer. | 10 | * notice, this list of conditions and the following disclaimer. |
| 11 | * | 11 | * |
| 12 | * 2. Redistributions in binary form must reproduce the above copyright | 12 | * 2. Redistributions in binary form must reproduce the above copyright |
| 13 | * notice, this list of conditions and the following disclaimer in | 13 | * notice, this list of conditions and the following disclaimer in |
| @@ -63,63 +63,61 @@ | |||
| 63 | #include "evp_locl.h" | 63 | #include "evp_locl.h" |
| 64 | 64 | ||
| 65 | static int camellia_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 65 | static int camellia_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 66 | const unsigned char *iv, int enc); | 66 | const unsigned char *iv, int enc); |
| 67 | 67 | ||
| 68 | /* Camellia subkey Structure */ | 68 | /* Camellia subkey Structure */ |
| 69 | typedef struct | 69 | typedef struct { |
| 70 | { | ||
| 71 | CAMELLIA_KEY ks; | 70 | CAMELLIA_KEY ks; |
| 72 | } EVP_CAMELLIA_KEY; | 71 | } EVP_CAMELLIA_KEY; |
| 73 | 72 | ||
| 74 | /* Attribute operation for Camellia */ | 73 | /* Attribute operation for Camellia */ |
| 75 | #define data(ctx) EVP_C_DATA(EVP_CAMELLIA_KEY,ctx) | 74 | #define data(ctx) EVP_C_DATA(EVP_CAMELLIA_KEY,ctx) |
| 76 | 75 | ||
| 77 | IMPLEMENT_BLOCK_CIPHER(camellia_128, ks, Camellia, EVP_CAMELLIA_KEY, | 76 | IMPLEMENT_BLOCK_CIPHER(camellia_128, ks, Camellia, EVP_CAMELLIA_KEY, |
| 78 | NID_camellia_128, 16, 16, 16, 128, | 77 | NID_camellia_128, 16, 16, 16, 128, |
| 79 | 0, camellia_init_key, NULL, | 78 | 0, camellia_init_key, NULL, |
| 80 | EVP_CIPHER_set_asn1_iv, | 79 | EVP_CIPHER_set_asn1_iv, |
| 81 | EVP_CIPHER_get_asn1_iv, | 80 | EVP_CIPHER_get_asn1_iv, |
| 82 | NULL) | 81 | NULL) |
| 83 | IMPLEMENT_BLOCK_CIPHER(camellia_192, ks, Camellia, EVP_CAMELLIA_KEY, | 82 | IMPLEMENT_BLOCK_CIPHER(camellia_192, ks, Camellia, EVP_CAMELLIA_KEY, |
| 84 | NID_camellia_192, 16, 24, 16, 128, | 83 | NID_camellia_192, 16, 24, 16, 128, |
| 85 | 0, camellia_init_key, NULL, | 84 | 0, camellia_init_key, NULL, |
| 86 | EVP_CIPHER_set_asn1_iv, | 85 | EVP_CIPHER_set_asn1_iv, |
| 87 | EVP_CIPHER_get_asn1_iv, | 86 | EVP_CIPHER_get_asn1_iv, |
| 88 | NULL) | 87 | NULL) |
| 89 | IMPLEMENT_BLOCK_CIPHER(camellia_256, ks, Camellia, EVP_CAMELLIA_KEY, | 88 | IMPLEMENT_BLOCK_CIPHER(camellia_256, ks, Camellia, EVP_CAMELLIA_KEY, |
| 90 | NID_camellia_256, 16, 32, 16, 128, | 89 | NID_camellia_256, 16, 32, 16, 128, |
| 91 | 0, camellia_init_key, NULL, | 90 | 0, camellia_init_key, NULL, |
| 92 | EVP_CIPHER_set_asn1_iv, | 91 | EVP_CIPHER_set_asn1_iv, |
| 93 | EVP_CIPHER_get_asn1_iv, | 92 | EVP_CIPHER_get_asn1_iv, |
| 94 | NULL) | 93 | NULL) |
| 95 | 94 | ||
| 96 | #define IMPLEMENT_CAMELLIA_CFBR(ksize,cbits) IMPLEMENT_CFBR(camellia,Camellia,EVP_CAMELLIA_KEY,ks,ksize,cbits,16) | 95 | #define IMPLEMENT_CAMELLIA_CFBR(ksize,cbits) IMPLEMENT_CFBR(camellia,Camellia,EVP_CAMELLIA_KEY,ks,ksize,cbits,16) |
| 97 | 96 | ||
| 98 | IMPLEMENT_CAMELLIA_CFBR(128,1) | 97 | IMPLEMENT_CAMELLIA_CFBR(128, 1) |
| 99 | IMPLEMENT_CAMELLIA_CFBR(192,1) | 98 | IMPLEMENT_CAMELLIA_CFBR(192, 1) |
| 100 | IMPLEMENT_CAMELLIA_CFBR(256,1) | 99 | IMPLEMENT_CAMELLIA_CFBR(256, 1) |
| 101 | 100 | ||
| 102 | IMPLEMENT_CAMELLIA_CFBR(128,8) | 101 | IMPLEMENT_CAMELLIA_CFBR(128, 8) |
| 103 | IMPLEMENT_CAMELLIA_CFBR(192,8) | 102 | IMPLEMENT_CAMELLIA_CFBR(192, 8) |
| 104 | IMPLEMENT_CAMELLIA_CFBR(256,8) | 103 | IMPLEMENT_CAMELLIA_CFBR(256, 8) |
| 105 | 104 | ||
| 106 | 105 | ||
| 107 | 106 | /* The subkey for Camellia is generated. */ | |
| 108 | /* The subkey for Camellia is generated. */ | 107 | static int |
| 109 | static int camellia_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 108 | camellia_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 110 | const unsigned char *iv, int enc) | 109 | const unsigned char *iv, int enc) |
| 111 | { | 110 | { |
| 112 | int ret; | 111 | int ret; |
| 113 | 112 | ||
| 114 | ret=Camellia_set_key(key, ctx->key_len * 8, ctx->cipher_data); | 113 | ret = Camellia_set_key(key, ctx->key_len * 8, ctx->cipher_data); |
| 115 | 114 | ||
| 116 | if(ret < 0) | 115 | if (ret < 0) { |
| 117 | { | 116 | EVPerr(EVP_F_CAMELLIA_INIT_KEY, |
| 118 | EVPerr(EVP_F_CAMELLIA_INIT_KEY,EVP_R_CAMELLIA_KEY_SETUP_FAILED); | 117 | EVP_R_CAMELLIA_KEY_SETUP_FAILED); |
| 119 | return 0; | 118 | return 0; |
| 120 | } | ||
| 121 | |||
| 122 | return 1; | ||
| 123 | } | 119 | } |
| 124 | 120 | ||
| 121 | return 1; | ||
| 122 | } | ||
| 125 | #endif | 123 | #endif |
diff --git a/src/lib/libssl/src/crypto/evp/e_cast.c b/src/lib/libssl/src/crypto/evp/e_cast.c index d77bcd9298..199c5bf48e 100644 --- a/src/lib/libssl/src/crypto/evp/e_cast.c +++ b/src/lib/libssl/src/crypto/evp/e_cast.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -66,25 +66,24 @@ | |||
| 66 | #include <openssl/cast.h> | 66 | #include <openssl/cast.h> |
| 67 | 67 | ||
| 68 | static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 68 | static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 69 | const unsigned char *iv,int enc); | 69 | const unsigned char *iv, int enc); |
| 70 | 70 | ||
| 71 | typedef struct | 71 | typedef struct { |
| 72 | { | ||
| 73 | CAST_KEY ks; | 72 | CAST_KEY ks; |
| 74 | } EVP_CAST_KEY; | 73 | } EVP_CAST_KEY; |
| 75 | 74 | ||
| 76 | #define data(ctx) EVP_C_DATA(EVP_CAST_KEY,ctx) | 75 | #define data(ctx) EVP_C_DATA(EVP_CAST_KEY,ctx) |
| 77 | 76 | ||
| 78 | IMPLEMENT_BLOCK_CIPHER(cast5, ks, CAST, EVP_CAST_KEY, | 77 | IMPLEMENT_BLOCK_CIPHER(cast5, ks, CAST, EVP_CAST_KEY, |
| 79 | NID_cast5, 8, CAST_KEY_LENGTH, 8, 64, | 78 | NID_cast5, 8, CAST_KEY_LENGTH, 8, 64, |
| 80 | EVP_CIPH_VARIABLE_LENGTH, cast_init_key, NULL, | 79 | EVP_CIPH_VARIABLE_LENGTH, cast_init_key, NULL, |
| 81 | EVP_CIPHER_set_asn1_iv, EVP_CIPHER_get_asn1_iv, NULL) | 80 | EVP_CIPHER_set_asn1_iv, EVP_CIPHER_get_asn1_iv, NULL) |
| 82 | |||
| 83 | static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
| 84 | const unsigned char *iv, int enc) | ||
| 85 | { | ||
| 86 | CAST_set_key(&data(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx),key); | ||
| 87 | return 1; | ||
| 88 | } | ||
| 89 | 81 | ||
| 82 | static int | ||
| 83 | cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
| 84 | const unsigned char *iv, int enc) | ||
| 85 | { | ||
| 86 | CAST_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx), key); | ||
| 87 | return 1; | ||
| 88 | } | ||
| 90 | #endif | 89 | #endif |
diff --git a/src/lib/libssl/src/crypto/evp/e_chacha.c b/src/lib/libssl/src/crypto/evp/e_chacha.c index 4a20186006..0c32b99df4 100644 --- a/src/lib/libssl/src/crypto/evp/e_chacha.c +++ b/src/lib/libssl/src/crypto/evp/e_chacha.c | |||
| @@ -41,7 +41,7 @@ static const EVP_CIPHER chacha20_cipher = { | |||
| 41 | const EVP_CIPHER * | 41 | const EVP_CIPHER * |
| 42 | EVP_chacha20(void) | 42 | EVP_chacha20(void) |
| 43 | { | 43 | { |
| 44 | return(&chacha20_cipher); | 44 | return (&chacha20_cipher); |
| 45 | } | 45 | } |
| 46 | 46 | ||
| 47 | static int | 47 | static int |
diff --git a/src/lib/libssl/src/crypto/evp/e_des.c b/src/lib/libssl/src/crypto/evp/e_des.c index ca009f2c52..ac46ba6a96 100644 --- a/src/lib/libssl/src/crypto/evp/e_des.c +++ b/src/lib/libssl/src/crypto/evp/e_des.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -66,150 +66,155 @@ | |||
| 66 | #include <openssl/rand.h> | 66 | #include <openssl/rand.h> |
| 67 | 67 | ||
| 68 | static int des_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 68 | static int des_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 69 | const unsigned char *iv, int enc); | 69 | const unsigned char *iv, int enc); |
| 70 | static int des_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr); | 70 | static int des_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr); |
| 71 | 71 | ||
| 72 | /* Because of various casts and different names can't use IMPLEMENT_BLOCK_CIPHER */ | 72 | /* Because of various casts and different names can't use IMPLEMENT_BLOCK_CIPHER */ |
| 73 | 73 | ||
| 74 | static int des_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 74 | static int |
| 75 | const unsigned char *in, size_t inl) | 75 | des_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 76 | const unsigned char *in, size_t inl) | ||
| 76 | { | 77 | { |
| 77 | BLOCK_CIPHER_ecb_loop() | 78 | BLOCK_CIPHER_ecb_loop() |
| 78 | DES_ecb_encrypt((DES_cblock *)(in + i), (DES_cblock *)(out + i), ctx->cipher_data, ctx->encrypt); | 79 | DES_ecb_encrypt((DES_cblock *)(in + i), (DES_cblock *)(out + i), |
| 80 | ctx->cipher_data, ctx->encrypt); | ||
| 79 | return 1; | 81 | return 1; |
| 80 | } | 82 | } |
| 81 | 83 | ||
| 82 | static int des_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 84 | static int |
| 83 | const unsigned char *in, size_t inl) | 85 | des_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 86 | const unsigned char *in, size_t inl) | ||
| 84 | { | 87 | { |
| 85 | while(inl>=EVP_MAXCHUNK) | 88 | while (inl >= EVP_MAXCHUNK) { |
| 86 | { | ||
| 87 | DES_ofb64_encrypt(in, out, (long)EVP_MAXCHUNK, ctx->cipher_data, | 89 | DES_ofb64_encrypt(in, out, (long)EVP_MAXCHUNK, ctx->cipher_data, |
| 88 | (DES_cblock *)ctx->iv, &ctx->num); | 90 | (DES_cblock *)ctx->iv, &ctx->num); |
| 89 | inl-=EVP_MAXCHUNK; | 91 | inl -= EVP_MAXCHUNK; |
| 90 | in +=EVP_MAXCHUNK; | 92 | in += EVP_MAXCHUNK; |
| 91 | out+=EVP_MAXCHUNK; | 93 | out += EVP_MAXCHUNK; |
| 92 | } | 94 | } |
| 93 | if (inl) | 95 | if (inl) |
| 94 | DES_ofb64_encrypt(in, out, (long)inl, ctx->cipher_data, | 96 | DES_ofb64_encrypt(in, out, (long)inl, ctx->cipher_data, |
| 95 | (DES_cblock *)ctx->iv, &ctx->num); | 97 | (DES_cblock *)ctx->iv, &ctx->num); |
| 96 | return 1; | 98 | return 1; |
| 97 | } | 99 | } |
| 98 | 100 | ||
| 99 | static int des_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 101 | static int |
| 100 | const unsigned char *in, size_t inl) | 102 | des_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 103 | const unsigned char *in, size_t inl) | ||
| 101 | { | 104 | { |
| 102 | while(inl>=EVP_MAXCHUNK) | 105 | while (inl >= EVP_MAXCHUNK) { |
| 103 | { | ||
| 104 | DES_ncbc_encrypt(in, out, (long)EVP_MAXCHUNK, ctx->cipher_data, | 106 | DES_ncbc_encrypt(in, out, (long)EVP_MAXCHUNK, ctx->cipher_data, |
| 105 | (DES_cblock *)ctx->iv, ctx->encrypt); | 107 | (DES_cblock *)ctx->iv, ctx->encrypt); |
| 106 | inl-=EVP_MAXCHUNK; | 108 | inl -= EVP_MAXCHUNK; |
| 107 | in +=EVP_MAXCHUNK; | 109 | in += EVP_MAXCHUNK; |
| 108 | out+=EVP_MAXCHUNK; | 110 | out += EVP_MAXCHUNK; |
| 109 | } | 111 | } |
| 110 | if (inl) | 112 | if (inl) |
| 111 | DES_ncbc_encrypt(in, out, (long)inl, ctx->cipher_data, | 113 | DES_ncbc_encrypt(in, out, (long)inl, ctx->cipher_data, |
| 112 | (DES_cblock *)ctx->iv, ctx->encrypt); | 114 | (DES_cblock *)ctx->iv, ctx->encrypt); |
| 113 | return 1; | 115 | return 1; |
| 114 | } | 116 | } |
| 115 | 117 | ||
| 116 | static int des_cfb64_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 118 | static int |
| 117 | const unsigned char *in, size_t inl) | 119 | des_cfb64_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 120 | const unsigned char *in, size_t inl) | ||
| 118 | { | 121 | { |
| 119 | while(inl>=EVP_MAXCHUNK) | 122 | while (inl >= EVP_MAXCHUNK) { |
| 120 | { | 123 | DES_cfb64_encrypt(in, out, (long)EVP_MAXCHUNK, ctx->cipher_data, |
| 121 | DES_cfb64_encrypt(in,out, (long)EVP_MAXCHUNK, ctx->cipher_data, | 124 | (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); |
| 122 | (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); | 125 | inl -= EVP_MAXCHUNK; |
| 123 | inl-=EVP_MAXCHUNK; | 126 | in += EVP_MAXCHUNK; |
| 124 | in +=EVP_MAXCHUNK; | 127 | out += EVP_MAXCHUNK; |
| 125 | out+=EVP_MAXCHUNK; | 128 | } |
| 126 | } | ||
| 127 | if (inl) | 129 | if (inl) |
| 128 | DES_cfb64_encrypt(in, out, (long)inl, ctx->cipher_data, | 130 | DES_cfb64_encrypt(in, out, (long)inl, ctx->cipher_data, |
| 129 | (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); | 131 | (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); |
| 130 | return 1; | 132 | return 1; |
| 131 | } | 133 | } |
| 132 | 134 | ||
| 133 | /* Although we have a CFB-r implementation for DES, it doesn't pack the right | 135 | /* Although we have a CFB-r implementation for DES, it doesn't pack the right |
| 134 | way, so wrap it here */ | 136 | way, so wrap it here */ |
| 135 | static int des_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 137 | static int |
| 136 | const unsigned char *in, size_t inl) | 138 | des_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 137 | { | 139 | const unsigned char *in, size_t inl) |
| 138 | size_t n,chunk=EVP_MAXCHUNK/8; | 140 | { |
| 139 | unsigned char c[1],d[1]; | 141 | size_t n, chunk = EVP_MAXCHUNK/8; |
| 140 | 142 | unsigned char c[1], d[1]; | |
| 141 | if (inl<chunk) chunk=inl; | 143 | |
| 142 | 144 | if (inl < chunk) | |
| 143 | while (inl && inl>=chunk) | 145 | chunk = inl; |
| 144 | { | 146 | |
| 145 | for(n=0 ; n < chunk*8; ++n) | 147 | while (inl && inl >= chunk) { |
| 146 | { | 148 | for (n = 0; n < chunk*8; ++n) { |
| 147 | c[0]=(in[n/8]&(1 << (7-n%8))) ? 0x80 : 0; | 149 | c[0] = (in[n / 8] & (1 << (7 - n % 8))) ? 0x80 : 0; |
| 148 | DES_cfb_encrypt(c,d,1,1,ctx->cipher_data,(DES_cblock *)ctx->iv, | 150 | DES_cfb_encrypt(c, d, 1, 1, ctx->cipher_data, |
| 149 | ctx->encrypt); | 151 | (DES_cblock *)ctx->iv, ctx->encrypt); |
| 150 | out[n/8]=(out[n/8]&~(0x80 >> (unsigned int)(n%8))) | | 152 | out[n / 8] = (out[n / 8] & |
| 151 | ((d[0]&0x80) >> (unsigned int)(n%8)); | 153 | ~(0x80 >> (unsigned int)(n % 8))) | |
| 152 | } | 154 | ((d[0] & 0x80) >> (unsigned int)(n % 8)); |
| 153 | inl-=chunk; | 155 | } |
| 154 | in +=chunk; | 156 | inl -= chunk; |
| 155 | out+=chunk; | 157 | in += chunk; |
| 156 | if (inl<chunk) chunk=inl; | 158 | out += chunk; |
| 159 | if (inl < chunk) | ||
| 160 | chunk = inl; | ||
| 157 | } | 161 | } |
| 158 | 162 | ||
| 159 | return 1; | 163 | return 1; |
| 160 | } | 164 | } |
| 161 | 165 | ||
| 162 | static int des_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 166 | static int |
| 163 | const unsigned char *in, size_t inl) | 167 | des_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 164 | { | 168 | const unsigned char *in, size_t inl) |
| 165 | while (inl>=EVP_MAXCHUNK) | 169 | { |
| 166 | { | 170 | while (inl >= EVP_MAXCHUNK) { |
| 167 | DES_cfb_encrypt(in,out,8,(long)EVP_MAXCHUNK,ctx->cipher_data, | 171 | DES_cfb_encrypt(in, out, 8, (long)EVP_MAXCHUNK, |
| 168 | (DES_cblock *)ctx->iv,ctx->encrypt); | 172 | ctx->cipher_data, (DES_cblock *)ctx->iv, ctx->encrypt); |
| 169 | inl-=EVP_MAXCHUNK; | 173 | inl -= EVP_MAXCHUNK; |
| 170 | in +=EVP_MAXCHUNK; | 174 | in += EVP_MAXCHUNK; |
| 171 | out+=EVP_MAXCHUNK; | 175 | out += EVP_MAXCHUNK; |
| 172 | } | 176 | } |
| 173 | if (inl) | 177 | if (inl) |
| 174 | DES_cfb_encrypt(in,out,8,(long)inl,ctx->cipher_data, | 178 | DES_cfb_encrypt(in, out, 8,(long)inl, ctx->cipher_data, |
| 175 | (DES_cblock *)ctx->iv,ctx->encrypt); | 179 | (DES_cblock *)ctx->iv, ctx->encrypt); |
| 176 | return 1; | 180 | return 1; |
| 177 | } | 181 | } |
| 178 | 182 | ||
| 179 | BLOCK_CIPHER_defs(des, DES_key_schedule, NID_des, 8, 8, 8, 64, | 183 | BLOCK_CIPHER_defs(des, DES_key_schedule, NID_des, 8, 8, 8, 64, |
| 180 | EVP_CIPH_RAND_KEY, des_init_key, NULL, | 184 | EVP_CIPH_RAND_KEY, des_init_key, NULL, |
| 181 | EVP_CIPHER_set_asn1_iv, | 185 | EVP_CIPHER_set_asn1_iv, |
| 182 | EVP_CIPHER_get_asn1_iv, | 186 | EVP_CIPHER_get_asn1_iv, |
| 183 | des_ctrl) | 187 | des_ctrl) |
| 184 | 188 | ||
| 185 | BLOCK_CIPHER_def_cfb(des,DES_key_schedule,NID_des,8,8,1, | 189 | BLOCK_CIPHER_def_cfb(des, DES_key_schedule, NID_des, 8,8, 1, |
| 186 | EVP_CIPH_RAND_KEY, des_init_key,NULL, | 190 | EVP_CIPH_RAND_KEY, des_init_key, NULL, |
| 187 | EVP_CIPHER_set_asn1_iv, | 191 | EVP_CIPHER_set_asn1_iv, |
| 188 | EVP_CIPHER_get_asn1_iv,des_ctrl) | 192 | EVP_CIPHER_get_asn1_iv, des_ctrl) |
| 189 | 193 | ||
| 190 | BLOCK_CIPHER_def_cfb(des,DES_key_schedule,NID_des,8,8,8, | 194 | BLOCK_CIPHER_def_cfb(des, DES_key_schedule, NID_des, 8,8, 8, |
| 191 | EVP_CIPH_RAND_KEY,des_init_key,NULL, | 195 | EVP_CIPH_RAND_KEY, des_init_key, NULL, |
| 192 | EVP_CIPHER_set_asn1_iv, | 196 | EVP_CIPHER_set_asn1_iv, |
| 193 | EVP_CIPHER_get_asn1_iv,des_ctrl) | 197 | EVP_CIPHER_get_asn1_iv, des_ctrl) |
| 194 | 198 | ||
| 195 | static int des_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 199 | static int |
| 196 | const unsigned char *iv, int enc) | 200 | des_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 197 | { | 201 | const unsigned char *iv, int enc) |
| 202 | { | ||
| 198 | DES_cblock *deskey = (DES_cblock *)key; | 203 | DES_cblock *deskey = (DES_cblock *)key; |
| 204 | |||
| 199 | #ifdef EVP_CHECK_DES_KEY | 205 | #ifdef EVP_CHECK_DES_KEY |
| 200 | if(DES_set_key_checked(deskey,ctx->cipher_data) != 0) | 206 | if (DES_set_key_checked(deskey, ctx->cipher_data) != 0) |
| 201 | return 0; | 207 | return 0; |
| 202 | #else | 208 | #else |
| 203 | DES_set_key_unchecked(deskey,ctx->cipher_data); | 209 | DES_set_key_unchecked(deskey, ctx->cipher_data); |
| 204 | #endif | 210 | #endif |
| 205 | return 1; | 211 | return 1; |
| 206 | } | 212 | } |
| 207 | 213 | ||
| 208 | static int des_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | 214 | static int |
| 209 | { | 215 | des_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) |
| 210 | 216 | { | |
| 211 | switch(type) | 217 | switch (type) { |
| 212 | { | ||
| 213 | case EVP_CTRL_RAND_KEY: | 218 | case EVP_CTRL_RAND_KEY: |
| 214 | if (RAND_bytes(ptr, 8) <= 0) | 219 | if (RAND_bytes(ptr, 8) <= 0) |
| 215 | return 0; | 220 | return 0; |
| @@ -218,7 +223,7 @@ static int des_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 218 | 223 | ||
| 219 | default: | 224 | default: |
| 220 | return -1; | 225 | return -1; |
| 221 | } | ||
| 222 | } | 226 | } |
| 227 | } | ||
| 223 | 228 | ||
| 224 | #endif | 229 | #endif |
diff --git a/src/lib/libssl/src/crypto/evp/e_des3.c b/src/lib/libssl/src/crypto/evp/e_des3.c index 8d7b7de292..ddb069dda5 100644 --- a/src/lib/libssl/src/crypto/evp/e_des3.c +++ b/src/lib/libssl/src/crypto/evp/e_des3.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -68,150 +68,147 @@ | |||
| 68 | #ifndef OPENSSL_FIPS | 68 | #ifndef OPENSSL_FIPS |
| 69 | 69 | ||
| 70 | static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 70 | static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 71 | const unsigned char *iv,int enc); | 71 | const unsigned char *iv, int enc); |
| 72 | 72 | ||
| 73 | static int des_ede3_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 73 | static int des_ede3_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 74 | const unsigned char *iv,int enc); | 74 | const unsigned char *iv, int enc); |
| 75 | 75 | ||
| 76 | static int des3_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr); | 76 | static int des3_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr); |
| 77 | 77 | ||
| 78 | typedef struct | 78 | typedef struct { |
| 79 | { | ||
| 80 | DES_key_schedule ks1;/* key schedule */ | 79 | DES_key_schedule ks1;/* key schedule */ |
| 81 | DES_key_schedule ks2;/* key schedule (for ede) */ | 80 | DES_key_schedule ks2;/* key schedule (for ede) */ |
| 82 | DES_key_schedule ks3;/* key schedule (for ede3) */ | 81 | DES_key_schedule ks3;/* key schedule (for ede3) */ |
| 83 | } DES_EDE_KEY; | 82 | } DES_EDE_KEY; |
| 84 | 83 | ||
| 85 | #define data(ctx) ((DES_EDE_KEY *)(ctx)->cipher_data) | 84 | #define data(ctx) ((DES_EDE_KEY *)(ctx)->cipher_data) |
| 86 | 85 | ||
| 87 | /* Because of various casts and different args can't use IMPLEMENT_BLOCK_CIPHER */ | 86 | /* Because of various casts and different args can't use IMPLEMENT_BLOCK_CIPHER */ |
| 88 | 87 | ||
| 89 | static int des_ede_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 88 | static int |
| 90 | const unsigned char *in, size_t inl) | 89 | des_ede_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 90 | const unsigned char *in, size_t inl) | ||
| 91 | { | 91 | { |
| 92 | BLOCK_CIPHER_ecb_loop() | 92 | BLOCK_CIPHER_ecb_loop() |
| 93 | DES_ecb3_encrypt((const_DES_cblock *)(in + i), | 93 | DES_ecb3_encrypt((const_DES_cblock *)(in + i), (DES_cblock *)(out + i), |
| 94 | (DES_cblock *)(out + i), | 94 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, ctx->encrypt); |
| 95 | &data(ctx)->ks1, &data(ctx)->ks2, | ||
| 96 | &data(ctx)->ks3, | ||
| 97 | ctx->encrypt); | ||
| 98 | return 1; | 95 | return 1; |
| 99 | } | 96 | } |
| 100 | 97 | ||
| 101 | static int des_ede_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 98 | static int |
| 102 | const unsigned char *in, size_t inl) | 99 | des_ede_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 100 | const unsigned char *in, size_t inl) | ||
| 103 | { | 101 | { |
| 104 | while (inl>=EVP_MAXCHUNK) | 102 | while (inl >= EVP_MAXCHUNK) { |
| 105 | { | ||
| 106 | DES_ede3_ofb64_encrypt(in, out, (long)EVP_MAXCHUNK, | 103 | DES_ede3_ofb64_encrypt(in, out, (long)EVP_MAXCHUNK, |
| 107 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, | 104 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
| 108 | (DES_cblock *)ctx->iv, &ctx->num); | 105 | (DES_cblock *)ctx->iv, &ctx->num); |
| 109 | inl-=EVP_MAXCHUNK; | 106 | inl -= EVP_MAXCHUNK; |
| 110 | in +=EVP_MAXCHUNK; | 107 | in += EVP_MAXCHUNK; |
| 111 | out+=EVP_MAXCHUNK; | 108 | out += EVP_MAXCHUNK; |
| 112 | } | 109 | } |
| 113 | if (inl) | 110 | if (inl) |
| 114 | DES_ede3_ofb64_encrypt(in, out, (long)inl, | 111 | DES_ede3_ofb64_encrypt(in, out, (long)inl, |
| 115 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, | 112 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
| 116 | (DES_cblock *)ctx->iv, &ctx->num); | 113 | (DES_cblock *)ctx->iv, &ctx->num); |
| 117 | 114 | ||
| 118 | return 1; | 115 | return 1; |
| 119 | } | 116 | } |
| 120 | 117 | ||
| 121 | static int des_ede_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 118 | static int |
| 122 | const unsigned char *in, size_t inl) | 119 | des_ede_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 120 | const unsigned char *in, size_t inl) | ||
| 123 | { | 121 | { |
| 124 | #ifdef KSSL_DEBUG | 122 | #ifdef KSSL_DEBUG |
| 125 | { | 123 | { |
| 126 | int i; | 124 | int i; |
| 127 | char *cp; | 125 | char *cp; |
| 128 | printf("des_ede_cbc_cipher(ctx=%lx, buflen=%d)\n", ctx, ctx->buf_len); | 126 | printf("des_ede_cbc_cipher(ctx=%lx, buflen=%d)\n", ctx, ctx->buf_len); |
| 129 | printf("\t iv= "); | 127 | printf("\t iv= "); |
| 130 | for(i=0;i<8;i++) | 128 | for (i = 0; i < 8; i++) |
| 131 | printf("%02X",ctx->iv[i]); | 129 | printf("%02X",ctx->iv[i]); |
| 132 | printf("\n"); | 130 | printf("\n"); |
| 133 | } | 131 | } |
| 134 | #endif /* KSSL_DEBUG */ | 132 | #endif /* KSSL_DEBUG */ |
| 135 | while (inl>=EVP_MAXCHUNK) | 133 | while (inl >= EVP_MAXCHUNK) { |
| 136 | { | ||
| 137 | DES_ede3_cbc_encrypt(in, out, (long)EVP_MAXCHUNK, | 134 | DES_ede3_cbc_encrypt(in, out, (long)EVP_MAXCHUNK, |
| 138 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, | 135 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
| 139 | (DES_cblock *)ctx->iv, ctx->encrypt); | 136 | (DES_cblock *)ctx->iv, ctx->encrypt); |
| 140 | inl-=EVP_MAXCHUNK; | 137 | inl -= EVP_MAXCHUNK; |
| 141 | in +=EVP_MAXCHUNK; | 138 | in += EVP_MAXCHUNK; |
| 142 | out+=EVP_MAXCHUNK; | 139 | out += EVP_MAXCHUNK; |
| 143 | } | 140 | } |
| 144 | if (inl) | 141 | if (inl) |
| 145 | DES_ede3_cbc_encrypt(in, out, (long)inl, | 142 | DES_ede3_cbc_encrypt(in, out, (long)inl, |
| 146 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, | 143 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
| 147 | (DES_cblock *)ctx->iv, ctx->encrypt); | 144 | (DES_cblock *)ctx->iv, ctx->encrypt); |
| 148 | return 1; | 145 | return 1; |
| 149 | } | 146 | } |
| 150 | 147 | ||
| 151 | static int des_ede_cfb64_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 148 | static int |
| 152 | const unsigned char *in, size_t inl) | 149 | des_ede_cfb64_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 150 | const unsigned char *in, size_t inl) | ||
| 153 | { | 151 | { |
| 154 | while (inl>=EVP_MAXCHUNK) | 152 | while (inl >= EVP_MAXCHUNK) { |
| 155 | { | 153 | DES_ede3_cfb64_encrypt(in, out, (long)EVP_MAXCHUNK, |
| 156 | DES_ede3_cfb64_encrypt(in, out, (long)EVP_MAXCHUNK, | 154 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
| 157 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, | 155 | (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); |
| 158 | (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); | 156 | inl -= EVP_MAXCHUNK; |
| 159 | inl-=EVP_MAXCHUNK; | 157 | in += EVP_MAXCHUNK; |
| 160 | in +=EVP_MAXCHUNK; | 158 | out += EVP_MAXCHUNK; |
| 161 | out+=EVP_MAXCHUNK; | 159 | } |
| 162 | } | ||
| 163 | if (inl) | 160 | if (inl) |
| 164 | DES_ede3_cfb64_encrypt(in, out, (long)inl, | 161 | DES_ede3_cfb64_encrypt(in, out, (long)inl, |
| 165 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, | 162 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
| 166 | (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); | 163 | (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); |
| 167 | return 1; | 164 | return 1; |
| 168 | } | 165 | } |
| 169 | 166 | ||
| 170 | /* Although we have a CFB-r implementation for 3-DES, it doesn't pack the right | 167 | /* Although we have a CFB-r implementation for 3-DES, it doesn't pack the right |
| 171 | way, so wrap it here */ | 168 | way, so wrap it here */ |
| 172 | static int des_ede3_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 169 | static int |
| 173 | const unsigned char *in, size_t inl) | 170 | des_ede3_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 174 | { | 171 | const unsigned char *in, size_t inl) |
| 175 | size_t n; | 172 | { |
| 176 | unsigned char c[1],d[1]; | 173 | size_t n; |
| 174 | unsigned char c[1], d[1]; | ||
| 177 | 175 | ||
| 178 | for(n=0 ; n < inl ; ++n) | 176 | for (n = 0; n < inl; ++n) { |
| 179 | { | 177 | c[0] = (in[n/8]&(1 << (7 - n % 8))) ? 0x80 : 0; |
| 180 | c[0]=(in[n/8]&(1 << (7-n%8))) ? 0x80 : 0; | 178 | DES_ede3_cfb_encrypt(c, d, 1, 1, |
| 181 | DES_ede3_cfb_encrypt(c,d,1,1, | 179 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
| 182 | &data(ctx)->ks1,&data(ctx)->ks2,&data(ctx)->ks3, | 180 | (DES_cblock *)ctx->iv, ctx->encrypt); |
| 183 | (DES_cblock *)ctx->iv,ctx->encrypt); | 181 | out[n / 8] = (out[n / 8] & ~(0x80 >> (unsigned int)(n % 8))) | |
| 184 | out[n/8]=(out[n/8]&~(0x80 >> (unsigned int)(n%8))) | | 182 | ((d[0] & 0x80) >> (unsigned int)(n % 8)); |
| 185 | ((d[0]&0x80) >> (unsigned int)(n%8)); | ||
| 186 | } | 183 | } |
| 187 | 184 | ||
| 188 | return 1; | 185 | return 1; |
| 189 | } | 186 | } |
| 190 | 187 | ||
| 191 | static int des_ede3_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 188 | static int |
| 192 | const unsigned char *in, size_t inl) | 189 | des_ede3_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 193 | { | 190 | const unsigned char *in, size_t inl) |
| 194 | while (inl>=EVP_MAXCHUNK) | 191 | { |
| 195 | { | 192 | while (inl >= EVP_MAXCHUNK) { |
| 196 | DES_ede3_cfb_encrypt(in,out,8,(long)EVP_MAXCHUNK, | 193 | DES_ede3_cfb_encrypt(in, out, 8, (long)EVP_MAXCHUNK, |
| 197 | &data(ctx)->ks1,&data(ctx)->ks2,&data(ctx)->ks3, | 194 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
| 198 | (DES_cblock *)ctx->iv,ctx->encrypt); | 195 | (DES_cblock *)ctx->iv, ctx->encrypt); |
| 199 | inl-=EVP_MAXCHUNK; | 196 | inl -= EVP_MAXCHUNK; |
| 200 | in +=EVP_MAXCHUNK; | 197 | in += EVP_MAXCHUNK; |
| 201 | out+=EVP_MAXCHUNK; | 198 | out += EVP_MAXCHUNK; |
| 202 | } | 199 | } |
| 203 | if (inl) | 200 | if (inl) |
| 204 | DES_ede3_cfb_encrypt(in,out,8,(long)inl, | 201 | DES_ede3_cfb_encrypt(in, out, 8, (long)inl, |
| 205 | &data(ctx)->ks1,&data(ctx)->ks2,&data(ctx)->ks3, | 202 | &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3, |
| 206 | (DES_cblock *)ctx->iv,ctx->encrypt); | 203 | (DES_cblock *)ctx->iv, ctx->encrypt); |
| 207 | return 1; | 204 | return 1; |
| 208 | } | 205 | } |
| 209 | 206 | ||
| 210 | BLOCK_CIPHER_defs(des_ede, DES_EDE_KEY, NID_des_ede, 8, 16, 8, 64, | 207 | BLOCK_CIPHER_defs(des_ede, DES_EDE_KEY, NID_des_ede, 8, 16, 8, 64, |
| 211 | EVP_CIPH_RAND_KEY, des_ede_init_key, NULL, | 208 | EVP_CIPH_RAND_KEY, des_ede_init_key, NULL, |
| 212 | EVP_CIPHER_set_asn1_iv, | 209 | EVP_CIPHER_set_asn1_iv, |
| 213 | EVP_CIPHER_get_asn1_iv, | 210 | EVP_CIPHER_get_asn1_iv, |
| 214 | des3_ctrl) | 211 | des3_ctrl) |
| 215 | 212 | ||
| 216 | #define des_ede3_cfb64_cipher des_ede_cfb64_cipher | 213 | #define des_ede3_cfb64_cipher des_ede_cfb64_cipher |
| 217 | #define des_ede3_ofb_cipher des_ede_ofb_cipher | 214 | #define des_ede3_ofb_cipher des_ede_ofb_cipher |
| @@ -219,75 +216,78 @@ BLOCK_CIPHER_defs(des_ede, DES_EDE_KEY, NID_des_ede, 8, 16, 8, 64, | |||
| 219 | #define des_ede3_ecb_cipher des_ede_ecb_cipher | 216 | #define des_ede3_ecb_cipher des_ede_ecb_cipher |
| 220 | 217 | ||
| 221 | BLOCK_CIPHER_defs(des_ede3, DES_EDE_KEY, NID_des_ede3, 8, 24, 8, 64, | 218 | BLOCK_CIPHER_defs(des_ede3, DES_EDE_KEY, NID_des_ede3, 8, 24, 8, 64, |
| 222 | EVP_CIPH_RAND_KEY, des_ede3_init_key, NULL, | 219 | EVP_CIPH_RAND_KEY, des_ede3_init_key, NULL, |
| 223 | EVP_CIPHER_set_asn1_iv, | 220 | EVP_CIPHER_set_asn1_iv, |
| 224 | EVP_CIPHER_get_asn1_iv, | 221 | EVP_CIPHER_get_asn1_iv, |
| 225 | des3_ctrl) | 222 | des3_ctrl) |
| 226 | |||
| 227 | BLOCK_CIPHER_def_cfb(des_ede3,DES_EDE_KEY,NID_des_ede3,24,8,1, | ||
| 228 | EVP_CIPH_RAND_KEY, des_ede3_init_key,NULL, | ||
| 229 | EVP_CIPHER_set_asn1_iv, | ||
| 230 | EVP_CIPHER_get_asn1_iv, | ||
| 231 | des3_ctrl) | ||
| 232 | |||
| 233 | BLOCK_CIPHER_def_cfb(des_ede3,DES_EDE_KEY,NID_des_ede3,24,8,8, | ||
| 234 | EVP_CIPH_RAND_KEY, des_ede3_init_key,NULL, | ||
| 235 | EVP_CIPHER_set_asn1_iv, | ||
| 236 | EVP_CIPHER_get_asn1_iv, | ||
| 237 | des3_ctrl) | ||
| 238 | 223 | ||
| 239 | static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 224 | BLOCK_CIPHER_def_cfb(des_ede3, DES_EDE_KEY, NID_des_ede3, 24, 8, 1, |
| 240 | const unsigned char *iv, int enc) | 225 | EVP_CIPH_RAND_KEY, des_ede3_init_key, NULL, |
| 241 | { | 226 | EVP_CIPHER_set_asn1_iv, |
| 227 | EVP_CIPHER_get_asn1_iv, | ||
| 228 | des3_ctrl) | ||
| 229 | |||
| 230 | BLOCK_CIPHER_def_cfb(des_ede3, DES_EDE_KEY, NID_des_ede3, 24, 8, 8, | ||
| 231 | EVP_CIPH_RAND_KEY, des_ede3_init_key, NULL, | ||
| 232 | EVP_CIPHER_set_asn1_iv, | ||
| 233 | EVP_CIPHER_get_asn1_iv, | ||
| 234 | des3_ctrl) | ||
| 235 | |||
| 236 | static int | ||
| 237 | des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
| 238 | const unsigned char *iv, int enc) | ||
| 239 | { | ||
| 242 | DES_cblock *deskey = (DES_cblock *)key; | 240 | DES_cblock *deskey = (DES_cblock *)key; |
| 241 | |||
| 243 | #ifdef EVP_CHECK_DES_KEY | 242 | #ifdef EVP_CHECK_DES_KEY |
| 244 | if (DES_set_key_checked(&deskey[0],&data(ctx)->ks1) | 243 | if (DES_set_key_checked(&deskey[0], &data(ctx)->ks1) |
| 245 | !! DES_set_key_checked(&deskey[1],&data(ctx)->ks2)) | 244 | !! DES_set_key_checked(&deskey[1], &data(ctx)->ks2)) |
| 246 | return 0; | 245 | return 0; |
| 247 | #else | 246 | #else |
| 248 | DES_set_key_unchecked(&deskey[0],&data(ctx)->ks1); | 247 | DES_set_key_unchecked(&deskey[0], &data(ctx)->ks1); |
| 249 | DES_set_key_unchecked(&deskey[1],&data(ctx)->ks2); | 248 | DES_set_key_unchecked(&deskey[1], &data(ctx)->ks2); |
| 250 | #endif | 249 | #endif |
| 251 | memcpy(&data(ctx)->ks3,&data(ctx)->ks1, | 250 | memcpy(&data(ctx)->ks3, &data(ctx)->ks1, |
| 252 | sizeof(data(ctx)->ks1)); | 251 | sizeof(data(ctx)->ks1)); |
| 253 | return 1; | 252 | return 1; |
| 254 | } | 253 | } |
| 255 | 254 | ||
| 256 | static int des_ede3_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 255 | static int |
| 257 | const unsigned char *iv, int enc) | 256 | des_ede3_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 258 | { | 257 | const unsigned char *iv, int enc) |
| 258 | { | ||
| 259 | DES_cblock *deskey = (DES_cblock *)key; | 259 | DES_cblock *deskey = (DES_cblock *)key; |
| 260 | |||
| 260 | #ifdef KSSL_DEBUG | 261 | #ifdef KSSL_DEBUG |
| 261 | { | 262 | { |
| 262 | int i; | 263 | int i; |
| 263 | printf("des_ede3_init_key(ctx=%lx)\n", ctx); | 264 | printf("des_ede3_init_key(ctx=%lx)\n", ctx); |
| 264 | printf("\tKEY= "); | 265 | printf("\tKEY= "); |
| 265 | for(i=0;i<24;i++) printf("%02X",key[i]); printf("\n"); | 266 | for(i=0;i<24;i++) printf("%02X",key[i]); printf("\n"); |
| 266 | printf("\t IV= "); | 267 | printf("\t IV= "); |
| 267 | for(i=0;i<8;i++) printf("%02X",iv[i]); printf("\n"); | 268 | for(i=0;i<8;i++) printf("%02X",iv[i]); printf("\n"); |
| 268 | } | 269 | } |
| 269 | #endif /* KSSL_DEBUG */ | 270 | #endif /* KSSL_DEBUG */ |
| 270 | 271 | ||
| 271 | #ifdef EVP_CHECK_DES_KEY | 272 | #ifdef EVP_CHECK_DES_KEY |
| 272 | if (DES_set_key_checked(&deskey[0],&data(ctx)->ks1) | 273 | if (DES_set_key_checked(&deskey[0], &data(ctx)->ks1) || |
| 273 | || DES_set_key_checked(&deskey[1],&data(ctx)->ks2) | 274 | DES_set_key_checked(&deskey[1], &data(ctx)->ks2) || |
| 274 | || DES_set_key_checked(&deskey[2],&data(ctx)->ks3)) | 275 | DES_set_key_checked(&deskey[2], &data(ctx)->ks3)) |
| 275 | return 0; | 276 | return 0; |
| 276 | #else | 277 | #else |
| 277 | DES_set_key_unchecked(&deskey[0],&data(ctx)->ks1); | 278 | DES_set_key_unchecked(&deskey[0], &data(ctx)->ks1); |
| 278 | DES_set_key_unchecked(&deskey[1],&data(ctx)->ks2); | 279 | DES_set_key_unchecked(&deskey[1], &data(ctx)->ks2); |
| 279 | DES_set_key_unchecked(&deskey[2],&data(ctx)->ks3); | 280 | DES_set_key_unchecked(&deskey[2], &data(ctx)->ks3); |
| 280 | #endif | 281 | #endif |
| 281 | return 1; | 282 | return 1; |
| 282 | } | 283 | } |
| 283 | |||
| 284 | static int des3_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | ||
| 285 | { | ||
| 286 | 284 | ||
| 285 | static int | ||
| 286 | des3_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | ||
| 287 | { | ||
| 287 | DES_cblock *deskey = ptr; | 288 | DES_cblock *deskey = ptr; |
| 288 | 289 | ||
| 289 | switch(type) | 290 | switch (type) { |
| 290 | { | ||
| 291 | case EVP_CTRL_RAND_KEY: | 291 | case EVP_CTRL_RAND_KEY: |
| 292 | if (RAND_bytes(ptr, c->key_len) <= 0) | 292 | if (RAND_bytes(ptr, c->key_len) <= 0) |
| 293 | return 0; | 293 | return 0; |
| @@ -300,15 +300,17 @@ static int des3_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 300 | 300 | ||
| 301 | default: | 301 | default: |
| 302 | return -1; | 302 | return -1; |
| 303 | } | ||
| 304 | } | 303 | } |
| 304 | } | ||
| 305 | 305 | ||
| 306 | const EVP_CIPHER *EVP_des_ede(void) | 306 | const EVP_CIPHER * |
| 307 | EVP_des_ede(void) | ||
| 307 | { | 308 | { |
| 308 | return &des_ede_ecb; | 309 | return &des_ede_ecb; |
| 309 | } | 310 | } |
| 310 | 311 | ||
| 311 | const EVP_CIPHER *EVP_des_ede3(void) | 312 | const EVP_CIPHER * |
| 313 | EVP_des_ede3(void) | ||
| 312 | { | 314 | { |
| 313 | return &des_ede3_ecb; | 315 | return &des_ede3_ecb; |
| 314 | } | 316 | } |
diff --git a/src/lib/libssl/src/crypto/evp/e_idea.c b/src/lib/libssl/src/crypto/evp/e_idea.c index 806b080360..8b8a647a8c 100644 --- a/src/lib/libssl/src/crypto/evp/e_idea.c +++ b/src/lib/libssl/src/crypto/evp/e_idea.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -66,53 +66,56 @@ | |||
| 66 | #include <openssl/idea.h> | 66 | #include <openssl/idea.h> |
| 67 | 67 | ||
| 68 | static int idea_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 68 | static int idea_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 69 | const unsigned char *iv,int enc); | 69 | const unsigned char *iv, int enc); |
| 70 | 70 | ||
| 71 | /* NB idea_ecb_encrypt doesn't take an 'encrypt' argument so we treat it as a special | 71 | /* NB idea_ecb_encrypt doesn't take an 'encrypt' argument so we treat it as a special |
| 72 | * case | 72 | * case |
| 73 | */ | 73 | */ |
| 74 | 74 | ||
| 75 | static int idea_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 75 | static int |
| 76 | const unsigned char *in, size_t inl) | 76 | idea_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 77 | const unsigned char *in, size_t inl) | ||
| 77 | { | 78 | { |
| 78 | BLOCK_CIPHER_ecb_loop() | 79 | BLOCK_CIPHER_ecb_loop() |
| 79 | idea_ecb_encrypt(in + i, out + i, ctx->cipher_data); | 80 | idea_ecb_encrypt(in + i, out + i, ctx->cipher_data); |
| 80 | return 1; | 81 | return 1; |
| 81 | } | 82 | } |
| 82 | 83 | ||
| 83 | /* Can't use IMPLEMENT_BLOCK_CIPHER because idea_ecb_encrypt is different */ | 84 | /* Can't use IMPLEMENT_BLOCK_CIPHER because idea_ecb_encrypt is different */ |
| 84 | 85 | ||
| 85 | typedef struct | 86 | typedef struct { |
| 86 | { | ||
| 87 | IDEA_KEY_SCHEDULE ks; | 87 | IDEA_KEY_SCHEDULE ks; |
| 88 | } EVP_IDEA_KEY; | 88 | } EVP_IDEA_KEY; |
| 89 | 89 | ||
| 90 | BLOCK_CIPHER_func_cbc(idea, idea, EVP_IDEA_KEY, ks) | 90 | BLOCK_CIPHER_func_cbc(idea, idea, EVP_IDEA_KEY, ks) |
| 91 | BLOCK_CIPHER_func_ofb(idea, idea, 64, EVP_IDEA_KEY, ks) | 91 | BLOCK_CIPHER_func_ofb(idea, idea, 64, EVP_IDEA_KEY, ks) |
| 92 | BLOCK_CIPHER_func_cfb(idea, idea, 64, EVP_IDEA_KEY, ks) | 92 | BLOCK_CIPHER_func_cfb(idea, idea, 64, EVP_IDEA_KEY, ks) |
| 93 | 93 | ||
| 94 | BLOCK_CIPHER_defs(idea, IDEA_KEY_SCHEDULE, NID_idea, 8, 16, 8, 64, | 94 | BLOCK_CIPHER_defs(idea, IDEA_KEY_SCHEDULE, NID_idea, 8, 16, 8, 64, |
| 95 | 0, idea_init_key, NULL, | 95 | 0, idea_init_key, NULL, |
| 96 | EVP_CIPHER_set_asn1_iv, EVP_CIPHER_get_asn1_iv, NULL) | 96 | EVP_CIPHER_set_asn1_iv, EVP_CIPHER_get_asn1_iv, NULL) |
| 97 | 97 | ||
| 98 | static int idea_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 98 | static int |
| 99 | const unsigned char *iv, int enc) | 99 | idea_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 100 | { | 100 | const unsigned char *iv, int enc) |
| 101 | if(!enc) { | 101 | { |
| 102 | if (EVP_CIPHER_CTX_mode(ctx) == EVP_CIPH_OFB_MODE) enc = 1; | 102 | if (!enc) { |
| 103 | else if (EVP_CIPHER_CTX_mode(ctx) == EVP_CIPH_CFB_MODE) enc = 1; | 103 | if (EVP_CIPHER_CTX_mode(ctx) == EVP_CIPH_OFB_MODE) |
| 104 | enc = 1; | ||
| 105 | else if (EVP_CIPHER_CTX_mode(ctx) == EVP_CIPH_CFB_MODE) | ||
| 106 | enc = 1; | ||
| 104 | } | 107 | } |
| 105 | if (enc) idea_set_encrypt_key(key,ctx->cipher_data); | 108 | if (enc) |
| 106 | else | 109 | idea_set_encrypt_key(key, ctx->cipher_data); |
| 107 | { | 110 | else { |
| 108 | IDEA_KEY_SCHEDULE tmp; | 111 | IDEA_KEY_SCHEDULE tmp; |
| 109 | 112 | ||
| 110 | idea_set_encrypt_key(key,&tmp); | 113 | idea_set_encrypt_key(key, &tmp); |
| 111 | idea_set_decrypt_key(&tmp,ctx->cipher_data); | 114 | idea_set_decrypt_key(&tmp, ctx->cipher_data); |
| 112 | OPENSSL_cleanse((unsigned char *)&tmp, | 115 | OPENSSL_cleanse((unsigned char *)&tmp, |
| 113 | sizeof(IDEA_KEY_SCHEDULE)); | 116 | sizeof(IDEA_KEY_SCHEDULE)); |
| 114 | } | ||
| 115 | return 1; | ||
| 116 | } | 117 | } |
| 118 | return 1; | ||
| 119 | } | ||
| 117 | 120 | ||
| 118 | #endif | 121 | #endif |
diff --git a/src/lib/libssl/src/crypto/evp/e_null.c b/src/lib/libssl/src/crypto/evp/e_null.c index 98a78499f9..d94751a07a 100644 --- a/src/lib/libssl/src/crypto/evp/e_null.c +++ b/src/lib/libssl/src/crypto/evp/e_null.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -62,13 +62,13 @@ | |||
| 62 | #include <openssl/objects.h> | 62 | #include <openssl/objects.h> |
| 63 | 63 | ||
| 64 | static int null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 64 | static int null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 65 | const unsigned char *iv,int enc); | 65 | const unsigned char *iv, int enc); |
| 66 | static int null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 66 | static int null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 67 | const unsigned char *in, size_t inl); | 67 | const unsigned char *in, size_t inl); |
| 68 | static const EVP_CIPHER n_cipher= | 68 | |
| 69 | { | 69 | static const EVP_CIPHER n_cipher = { |
| 70 | NID_undef, | 70 | NID_undef, |
| 71 | 1,0,0, | 71 | 1, 0, 0, |
| 72 | 0, | 72 | 0, |
| 73 | null_init_key, | 73 | null_init_key, |
| 74 | null_cipher, | 74 | null_cipher, |
| @@ -78,24 +78,27 @@ static const EVP_CIPHER n_cipher= | |||
| 78 | NULL, | 78 | NULL, |
| 79 | NULL, | 79 | NULL, |
| 80 | NULL | 80 | NULL |
| 81 | }; | 81 | }; |
| 82 | 82 | ||
| 83 | const EVP_CIPHER *EVP_enc_null(void) | 83 | const EVP_CIPHER * |
| 84 | { | 84 | EVP_enc_null(void) |
| 85 | return(&n_cipher); | 85 | { |
| 86 | } | 86 | return (&n_cipher); |
| 87 | } | ||
| 87 | 88 | ||
| 88 | static int null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 89 | static int |
| 89 | const unsigned char *iv, int enc) | 90 | null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 90 | { | 91 | const unsigned char *iv, int enc) |
| 92 | { | ||
| 91 | /* memset(&(ctx->c),0,sizeof(ctx->c));*/ | 93 | /* memset(&(ctx->c),0,sizeof(ctx->c));*/ |
| 92 | return 1; | 94 | return 1; |
| 93 | } | 95 | } |
| 94 | 96 | ||
| 95 | static int null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 97 | static int |
| 96 | const unsigned char *in, size_t inl) | 98 | null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 97 | { | 99 | const unsigned char *in, size_t inl) |
| 100 | { | ||
| 98 | if (in != out) | 101 | if (in != out) |
| 99 | memcpy((char *)out,(const char *)in,inl); | 102 | memcpy((char *)out, (const char *)in, inl); |
| 100 | return 1; | 103 | return 1; |
| 101 | } | 104 | } |
diff --git a/src/lib/libssl/src/crypto/evp/e_old.c b/src/lib/libssl/src/crypto/evp/e_old.c index 1642af4869..c27b61a4bf 100644 --- a/src/lib/libssl/src/crypto/evp/e_old.c +++ b/src/lib/libssl/src/crypto/evp/e_old.c | |||
| @@ -10,7 +10,7 @@ | |||
| 10 | * are met: | 10 | * are met: |
| 11 | * | 11 | * |
| 12 | * 1. Redistributions of source code must retain the above copyright | 12 | * 1. Redistributions of source code must retain the above copyright |
| 13 | * notice, this list of conditions and the following disclaimer. | 13 | * notice, this list of conditions and the following disclaimer. |
| 14 | * | 14 | * |
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | 15 | * 2. Redistributions in binary form must reproduce the above copyright |
| 16 | * notice, this list of conditions and the following disclaimer in | 16 | * notice, this list of conditions and the following disclaimer in |
| @@ -71,55 +71,88 @@ static void *dummy = &dummy; | |||
| 71 | #ifndef OPENSSL_NO_BF | 71 | #ifndef OPENSSL_NO_BF |
| 72 | #undef EVP_bf_cfb | 72 | #undef EVP_bf_cfb |
| 73 | const EVP_CIPHER *EVP_bf_cfb(void); | 73 | const EVP_CIPHER *EVP_bf_cfb(void); |
| 74 | const EVP_CIPHER *EVP_bf_cfb(void) { return EVP_bf_cfb64(); } | 74 | const EVP_CIPHER *EVP_bf_cfb(void) |
| 75 | { | ||
| 76 | return EVP_bf_cfb64(); | ||
| 77 | } | ||
| 75 | #endif | 78 | #endif |
| 76 | 79 | ||
| 77 | #ifndef OPENSSL_NO_DES | 80 | #ifndef OPENSSL_NO_DES |
| 78 | #undef EVP_des_cfb | 81 | #undef EVP_des_cfb |
| 79 | const EVP_CIPHER *EVP_des_cfb(void); | 82 | const EVP_CIPHER *EVP_des_cfb(void); |
| 80 | const EVP_CIPHER *EVP_des_cfb(void) { return EVP_des_cfb64(); } | 83 | const EVP_CIPHER *EVP_des_cfb(void) |
| 84 | { | ||
| 85 | return EVP_des_cfb64(); | ||
| 86 | } | ||
| 81 | #undef EVP_des_ede3_cfb | 87 | #undef EVP_des_ede3_cfb |
| 82 | const EVP_CIPHER *EVP_des_ede3_cfb(void); | 88 | const EVP_CIPHER *EVP_des_ede3_cfb(void); |
| 83 | const EVP_CIPHER *EVP_des_ede3_cfb(void) { return EVP_des_ede3_cfb64(); } | 89 | const EVP_CIPHER *EVP_des_ede3_cfb(void) |
| 90 | { | ||
| 91 | return EVP_des_ede3_cfb64(); | ||
| 92 | } | ||
| 84 | #undef EVP_des_ede_cfb | 93 | #undef EVP_des_ede_cfb |
| 85 | const EVP_CIPHER *EVP_des_ede_cfb(void); | 94 | const EVP_CIPHER *EVP_des_ede_cfb(void); |
| 86 | const EVP_CIPHER *EVP_des_ede_cfb(void) { return EVP_des_ede_cfb64(); } | 95 | const EVP_CIPHER *EVP_des_ede_cfb(void) |
| 96 | { | ||
| 97 | return EVP_des_ede_cfb64(); | ||
| 98 | } | ||
| 87 | #endif | 99 | #endif |
| 88 | 100 | ||
| 89 | #ifndef OPENSSL_NO_IDEA | 101 | #ifndef OPENSSL_NO_IDEA |
| 90 | #undef EVP_idea_cfb | 102 | #undef EVP_idea_cfb |
| 91 | const EVP_CIPHER *EVP_idea_cfb(void); | 103 | const EVP_CIPHER *EVP_idea_cfb(void); |
| 92 | const EVP_CIPHER *EVP_idea_cfb(void) { return EVP_idea_cfb64(); } | 104 | const EVP_CIPHER *EVP_idea_cfb(void) |
| 105 | { | ||
| 106 | return EVP_idea_cfb64(); | ||
| 107 | } | ||
| 93 | #endif | 108 | #endif |
| 94 | 109 | ||
| 95 | #ifndef OPENSSL_NO_RC2 | 110 | #ifndef OPENSSL_NO_RC2 |
| 96 | #undef EVP_rc2_cfb | 111 | #undef EVP_rc2_cfb |
| 97 | const EVP_CIPHER *EVP_rc2_cfb(void); | 112 | const EVP_CIPHER *EVP_rc2_cfb(void); |
| 98 | const EVP_CIPHER *EVP_rc2_cfb(void) { return EVP_rc2_cfb64(); } | 113 | const EVP_CIPHER *EVP_rc2_cfb(void) |
| 114 | { | ||
| 115 | return EVP_rc2_cfb64(); | ||
| 116 | } | ||
| 99 | #endif | 117 | #endif |
| 100 | 118 | ||
| 101 | #ifndef OPENSSL_NO_CAST | 119 | #ifndef OPENSSL_NO_CAST |
| 102 | #undef EVP_cast5_cfb | 120 | #undef EVP_cast5_cfb |
| 103 | const EVP_CIPHER *EVP_cast5_cfb(void); | 121 | const EVP_CIPHER *EVP_cast5_cfb(void); |
| 104 | const EVP_CIPHER *EVP_cast5_cfb(void) { return EVP_cast5_cfb64(); } | 122 | const EVP_CIPHER *EVP_cast5_cfb(void) |
| 123 | { | ||
| 124 | return EVP_cast5_cfb64(); | ||
| 125 | } | ||
| 105 | #endif | 126 | #endif |
| 106 | 127 | ||
| 107 | #ifndef OPENSSL_NO_RC5 | 128 | #ifndef OPENSSL_NO_RC5 |
| 108 | #undef EVP_rc5_32_12_16_cfb | 129 | #undef EVP_rc5_32_12_16_cfb |
| 109 | const EVP_CIPHER *EVP_rc5_32_12_16_cfb(void); | 130 | const EVP_CIPHER *EVP_rc5_32_12_16_cfb(void); |
| 110 | const EVP_CIPHER *EVP_rc5_32_12_16_cfb(void) { return EVP_rc5_32_12_16_cfb64(); } | 131 | const EVP_CIPHER *EVP_rc5_32_12_16_cfb(void) |
| 132 | { | ||
| 133 | return EVP_rc5_32_12_16_cfb64(); | ||
| 134 | } | ||
| 111 | #endif | 135 | #endif |
| 112 | 136 | ||
| 113 | #ifndef OPENSSL_NO_AES | 137 | #ifndef OPENSSL_NO_AES |
| 114 | #undef EVP_aes_128_cfb | 138 | #undef EVP_aes_128_cfb |
| 115 | const EVP_CIPHER *EVP_aes_128_cfb(void); | 139 | const EVP_CIPHER *EVP_aes_128_cfb(void); |
| 116 | const EVP_CIPHER *EVP_aes_128_cfb(void) { return EVP_aes_128_cfb128(); } | 140 | const EVP_CIPHER *EVP_aes_128_cfb(void) |
| 141 | { | ||
| 142 | return EVP_aes_128_cfb128(); | ||
| 143 | } | ||
| 117 | #undef EVP_aes_192_cfb | 144 | #undef EVP_aes_192_cfb |
| 118 | const EVP_CIPHER *EVP_aes_192_cfb(void); | 145 | const EVP_CIPHER *EVP_aes_192_cfb(void); |
| 119 | const EVP_CIPHER *EVP_aes_192_cfb(void) { return EVP_aes_192_cfb128(); } | 146 | const EVP_CIPHER *EVP_aes_192_cfb(void) |
| 147 | { | ||
| 148 | return EVP_aes_192_cfb128(); | ||
| 149 | } | ||
| 120 | #undef EVP_aes_256_cfb | 150 | #undef EVP_aes_256_cfb |
| 121 | const EVP_CIPHER *EVP_aes_256_cfb(void); | 151 | const EVP_CIPHER *EVP_aes_256_cfb(void); |
| 122 | const EVP_CIPHER *EVP_aes_256_cfb(void) { return EVP_aes_256_cfb128(); } | 152 | const EVP_CIPHER *EVP_aes_256_cfb(void) |
| 153 | { | ||
| 154 | return EVP_aes_256_cfb128(); | ||
| 155 | } | ||
| 123 | #endif | 156 | #endif |
| 124 | 157 | ||
| 125 | #endif | 158 | #endif |
diff --git a/src/lib/libssl/src/crypto/evp/e_rc2.c b/src/lib/libssl/src/crypto/evp/e_rc2.c index d4c33b58d4..f6f4504890 100644 --- a/src/lib/libssl/src/crypto/evp/e_rc2.c +++ b/src/lib/libssl/src/crypto/evp/e_rc2.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -67,37 +67,35 @@ | |||
| 67 | #include <openssl/rc2.h> | 67 | #include <openssl/rc2.h> |
| 68 | 68 | ||
| 69 | static int rc2_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 69 | static int rc2_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 70 | const unsigned char *iv,int enc); | 70 | const unsigned char *iv, int enc); |
| 71 | static int rc2_meth_to_magic(EVP_CIPHER_CTX *ctx); | 71 | static int rc2_meth_to_magic(EVP_CIPHER_CTX *ctx); |
| 72 | static int rc2_magic_to_meth(int i); | 72 | static int rc2_magic_to_meth(int i); |
| 73 | static int rc2_set_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type); | 73 | static int rc2_set_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type); |
| 74 | static int rc2_get_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type); | 74 | static int rc2_get_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type); |
| 75 | static int rc2_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr); | 75 | static int rc2_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr); |
| 76 | 76 | ||
| 77 | typedef struct | 77 | typedef struct { |
| 78 | { | ||
| 79 | int key_bits; /* effective key bits */ | 78 | int key_bits; /* effective key bits */ |
| 80 | RC2_KEY ks; /* key schedule */ | 79 | RC2_KEY ks; /* key schedule */ |
| 81 | } EVP_RC2_KEY; | 80 | } EVP_RC2_KEY; |
| 82 | 81 | ||
| 83 | #define data(ctx) ((EVP_RC2_KEY *)(ctx)->cipher_data) | 82 | #define data(ctx) ((EVP_RC2_KEY *)(ctx)->cipher_data) |
| 84 | 83 | ||
| 85 | IMPLEMENT_BLOCK_CIPHER(rc2, ks, RC2, EVP_RC2_KEY, NID_rc2, | 84 | IMPLEMENT_BLOCK_CIPHER(rc2, ks, RC2, EVP_RC2_KEY, NID_rc2, |
| 86 | 8, | 85 | 8, |
| 87 | RC2_KEY_LENGTH, 8, 64, | 86 | RC2_KEY_LENGTH, 8, 64, |
| 88 | EVP_CIPH_VARIABLE_LENGTH | EVP_CIPH_CTRL_INIT, | 87 | EVP_CIPH_VARIABLE_LENGTH | EVP_CIPH_CTRL_INIT, |
| 89 | rc2_init_key, NULL, | 88 | rc2_init_key, NULL, |
| 90 | rc2_set_asn1_type_and_iv, rc2_get_asn1_type_and_iv, | 89 | rc2_set_asn1_type_and_iv, rc2_get_asn1_type_and_iv, |
| 91 | rc2_ctrl) | 90 | rc2_ctrl) |
| 92 | 91 | ||
| 93 | #define RC2_40_MAGIC 0xa0 | 92 | #define RC2_40_MAGIC 0xa0 |
| 94 | #define RC2_64_MAGIC 0x78 | 93 | #define RC2_64_MAGIC 0x78 |
| 95 | #define RC2_128_MAGIC 0x3a | 94 | #define RC2_128_MAGIC 0x3a |
| 96 | 95 | ||
| 97 | static const EVP_CIPHER r2_64_cbc_cipher= | 96 | static const EVP_CIPHER r2_64_cbc_cipher = { |
| 98 | { | ||
| 99 | NID_rc2_64_cbc, | 97 | NID_rc2_64_cbc, |
| 100 | 8,8 /* 64 bit */,8, | 98 | 8, 8 /* 64 bit */, 8, |
| 101 | EVP_CIPH_CBC_MODE | EVP_CIPH_VARIABLE_LENGTH | EVP_CIPH_CTRL_INIT, | 99 | EVP_CIPH_CBC_MODE | EVP_CIPH_VARIABLE_LENGTH | EVP_CIPH_CTRL_INIT, |
| 102 | rc2_init_key, | 100 | rc2_init_key, |
| 103 | rc2_cbc_cipher, | 101 | rc2_cbc_cipher, |
| @@ -107,12 +105,11 @@ static const EVP_CIPHER r2_64_cbc_cipher= | |||
| 107 | rc2_get_asn1_type_and_iv, | 105 | rc2_get_asn1_type_and_iv, |
| 108 | rc2_ctrl, | 106 | rc2_ctrl, |
| 109 | NULL | 107 | NULL |
| 110 | }; | 108 | }; |
| 111 | 109 | ||
| 112 | static const EVP_CIPHER r2_40_cbc_cipher= | 110 | static const EVP_CIPHER r2_40_cbc_cipher = { |
| 113 | { | ||
| 114 | NID_rc2_40_cbc, | 111 | NID_rc2_40_cbc, |
| 115 | 8,5 /* 40 bit */,8, | 112 | 8, 5 /* 40 bit */, 8, |
| 116 | EVP_CIPH_CBC_MODE | EVP_CIPH_VARIABLE_LENGTH | EVP_CIPH_CTRL_INIT, | 113 | EVP_CIPH_CBC_MODE | EVP_CIPH_VARIABLE_LENGTH | EVP_CIPH_CTRL_INIT, |
| 117 | rc2_init_key, | 114 | rc2_init_key, |
| 118 | rc2_cbc_cipher, | 115 | rc2_cbc_cipher, |
| @@ -122,93 +119,105 @@ static const EVP_CIPHER r2_40_cbc_cipher= | |||
| 122 | rc2_get_asn1_type_and_iv, | 119 | rc2_get_asn1_type_and_iv, |
| 123 | rc2_ctrl, | 120 | rc2_ctrl, |
| 124 | NULL | 121 | NULL |
| 125 | }; | 122 | }; |
| 126 | 123 | ||
| 127 | const EVP_CIPHER *EVP_rc2_64_cbc(void) | 124 | const EVP_CIPHER * |
| 128 | { | 125 | EVP_rc2_64_cbc(void) |
| 129 | return(&r2_64_cbc_cipher); | 126 | { |
| 130 | } | 127 | return (&r2_64_cbc_cipher); |
| 131 | 128 | } | |
| 132 | const EVP_CIPHER *EVP_rc2_40_cbc(void) | 129 | |
| 133 | { | 130 | const EVP_CIPHER * |
| 134 | return(&r2_40_cbc_cipher); | 131 | EVP_rc2_40_cbc(void) |
| 135 | } | 132 | { |
| 136 | 133 | return (&r2_40_cbc_cipher); | |
| 137 | static int rc2_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 134 | } |
| 138 | const unsigned char *iv, int enc) | 135 | |
| 139 | { | 136 | static int |
| 140 | RC2_set_key(&data(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx), | 137 | rc2_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 141 | key,data(ctx)->key_bits); | 138 | const unsigned char *iv, int enc) |
| 139 | { | ||
| 140 | RC2_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx), | ||
| 141 | key, data(ctx)->key_bits); | ||
| 142 | return 1; | 142 | return 1; |
| 143 | } | 143 | } |
| 144 | 144 | ||
| 145 | static int rc2_meth_to_magic(EVP_CIPHER_CTX *e) | 145 | static int |
| 146 | { | 146 | rc2_meth_to_magic(EVP_CIPHER_CTX *e) |
| 147 | { | ||
| 147 | int i; | 148 | int i; |
| 148 | 149 | ||
| 149 | EVP_CIPHER_CTX_ctrl(e, EVP_CTRL_GET_RC2_KEY_BITS, 0, &i); | 150 | EVP_CIPHER_CTX_ctrl(e, EVP_CTRL_GET_RC2_KEY_BITS, 0, &i); |
| 150 | if (i == 128) return(RC2_128_MAGIC); | 151 | if (i == 128) |
| 151 | else if (i == 64) return(RC2_64_MAGIC); | 152 | return (RC2_128_MAGIC); |
| 152 | else if (i == 40) return(RC2_40_MAGIC); | 153 | else if (i == 64) |
| 153 | else return(0); | 154 | return (RC2_64_MAGIC); |
| 154 | } | 155 | else if (i == 40) |
| 155 | 156 | return (RC2_40_MAGIC); | |
| 156 | static int rc2_magic_to_meth(int i) | ||
| 157 | { | ||
| 158 | if (i == RC2_128_MAGIC) return 128; | ||
| 159 | else if (i == RC2_64_MAGIC) return 64; | ||
| 160 | else if (i == RC2_40_MAGIC) return 40; | ||
| 161 | else | 157 | else |
| 162 | { | 158 | return (0); |
| 163 | EVPerr(EVP_F_RC2_MAGIC_TO_METH,EVP_R_UNSUPPORTED_KEY_SIZE); | 159 | } |
| 164 | return(0); | 160 | |
| 165 | } | 161 | static int |
| 162 | rc2_magic_to_meth(int i) | ||
| 163 | { | ||
| 164 | if (i == RC2_128_MAGIC) | ||
| 165 | return 128; | ||
| 166 | else if (i == RC2_64_MAGIC) | ||
| 167 | return 64; | ||
| 168 | else if (i == RC2_40_MAGIC) | ||
| 169 | return 40; | ||
| 170 | else { | ||
| 171 | EVPerr(EVP_F_RC2_MAGIC_TO_METH, EVP_R_UNSUPPORTED_KEY_SIZE); | ||
| 172 | return (0); | ||
| 166 | } | 173 | } |
| 174 | } | ||
| 167 | 175 | ||
| 168 | static int rc2_get_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | 176 | static int |
| 169 | { | 177 | rc2_get_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
| 170 | long num=0; | 178 | { |
| 171 | int i=0; | 179 | long num = 0; |
| 180 | int i = 0; | ||
| 172 | int key_bits; | 181 | int key_bits; |
| 173 | unsigned int l; | 182 | unsigned int l; |
| 174 | unsigned char iv[EVP_MAX_IV_LENGTH]; | 183 | unsigned char iv[EVP_MAX_IV_LENGTH]; |
| 175 | 184 | ||
| 176 | if (type != NULL) | 185 | if (type != NULL) { |
| 177 | { | 186 | l = EVP_CIPHER_CTX_iv_length(c); |
| 178 | l=EVP_CIPHER_CTX_iv_length(c); | ||
| 179 | OPENSSL_assert(l <= sizeof(iv)); | 187 | OPENSSL_assert(l <= sizeof(iv)); |
| 180 | i=ASN1_TYPE_get_int_octetstring(type,&num,iv,l); | 188 | i = ASN1_TYPE_get_int_octetstring(type, &num, iv, l); |
| 181 | if (i != (int)l) | 189 | if (i != (int)l) |
| 182 | return(-1); | 190 | return (-1); |
| 183 | key_bits =rc2_magic_to_meth((int)num); | 191 | key_bits = rc2_magic_to_meth((int)num); |
| 184 | if (!key_bits) | 192 | if (!key_bits) |
| 185 | return(-1); | 193 | return (-1); |
| 186 | if(i > 0 && !EVP_CipherInit_ex(c, NULL, NULL, NULL, iv, -1)) | 194 | if (i > 0 && !EVP_CipherInit_ex(c, NULL, NULL, NULL, iv, -1)) |
| 187 | return -1; | 195 | return -1; |
| 188 | EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_RC2_KEY_BITS, key_bits, NULL); | 196 | EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_RC2_KEY_BITS, |
| 197 | key_bits, NULL); | ||
| 189 | EVP_CIPHER_CTX_set_key_length(c, key_bits / 8); | 198 | EVP_CIPHER_CTX_set_key_length(c, key_bits / 8); |
| 190 | } | ||
| 191 | return(i); | ||
| 192 | } | 199 | } |
| 200 | return (i); | ||
| 201 | } | ||
| 193 | 202 | ||
| 194 | static int rc2_set_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | 203 | static int |
| 195 | { | 204 | rc2_set_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
| 205 | { | ||
| 196 | long num; | 206 | long num; |
| 197 | int i=0,j; | 207 | int i = 0, j; |
| 198 | 208 | ||
| 199 | if (type != NULL) | 209 | if (type != NULL) { |
| 200 | { | 210 | num = rc2_meth_to_magic(c); |
| 201 | num=rc2_meth_to_magic(c); | 211 | j = EVP_CIPHER_CTX_iv_length(c); |
| 202 | j=EVP_CIPHER_CTX_iv_length(c); | 212 | i = ASN1_TYPE_set_int_octetstring(type, num, c->oiv, j); |
| 203 | i=ASN1_TYPE_set_int_octetstring(type,num,c->oiv,j); | ||
| 204 | } | ||
| 205 | return(i); | ||
| 206 | } | 213 | } |
| 214 | return (i); | ||
| 215 | } | ||
| 207 | 216 | ||
| 208 | static int rc2_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | 217 | static int |
| 209 | { | 218 | rc2_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) |
| 210 | switch(type) | 219 | { |
| 211 | { | 220 | switch (type) { |
| 212 | case EVP_CTRL_INIT: | 221 | case EVP_CTRL_INIT: |
| 213 | data(c)->key_bits = EVP_CIPHER_CTX_key_length(c) * 8; | 222 | data(c)->key_bits = EVP_CIPHER_CTX_key_length(c) * 8; |
| 214 | return 1; | 223 | return 1; |
| @@ -216,14 +225,14 @@ static int rc2_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 216 | case EVP_CTRL_GET_RC2_KEY_BITS: | 225 | case EVP_CTRL_GET_RC2_KEY_BITS: |
| 217 | *(int *)ptr = data(c)->key_bits; | 226 | *(int *)ptr = data(c)->key_bits; |
| 218 | return 1; | 227 | return 1; |
| 219 | 228 | ||
| 220 | case EVP_CTRL_SET_RC2_KEY_BITS: | 229 | case EVP_CTRL_SET_RC2_KEY_BITS: |
| 221 | if(arg > 0) | 230 | if (arg > 0) { |
| 222 | { | ||
| 223 | data(c)->key_bits = arg; | 231 | data(c)->key_bits = arg; |
| 224 | return 1; | 232 | return 1; |
| 225 | } | 233 | } |
| 226 | return 0; | 234 | return 0; |
| 235 | |||
| 227 | #ifdef PBE_PRF_TEST | 236 | #ifdef PBE_PRF_TEST |
| 228 | case EVP_CTRL_PBE_PRF_NID: | 237 | case EVP_CTRL_PBE_PRF_NID: |
| 229 | *(int *)ptr = NID_hmacWithMD5; | 238 | *(int *)ptr = NID_hmacWithMD5; |
| @@ -232,7 +241,7 @@ static int rc2_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 232 | 241 | ||
| 233 | default: | 242 | default: |
| 234 | return -1; | 243 | return -1; |
| 235 | } | ||
| 236 | } | 244 | } |
| 245 | } | ||
| 237 | 246 | ||
| 238 | #endif | 247 | #endif |
diff --git a/src/lib/libssl/src/crypto/evp/e_rc4.c b/src/lib/libssl/src/crypto/evp/e_rc4.c index b4f6bda82d..f66885f70d 100644 --- a/src/lib/libssl/src/crypto/evp/e_rc4.c +++ b/src/lib/libssl/src/crypto/evp/e_rc4.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -69,21 +69,20 @@ | |||
| 69 | /* FIXME: surely this is available elsewhere? */ | 69 | /* FIXME: surely this is available elsewhere? */ |
| 70 | #define EVP_RC4_KEY_SIZE 16 | 70 | #define EVP_RC4_KEY_SIZE 16 |
| 71 | 71 | ||
| 72 | typedef struct | 72 | typedef struct { |
| 73 | { | ||
| 74 | RC4_KEY ks; /* working key */ | 73 | RC4_KEY ks; /* working key */ |
| 75 | } EVP_RC4_KEY; | 74 | } EVP_RC4_KEY; |
| 76 | 75 | ||
| 77 | #define data(ctx) ((EVP_RC4_KEY *)(ctx)->cipher_data) | 76 | #define data(ctx) ((EVP_RC4_KEY *)(ctx)->cipher_data) |
| 78 | 77 | ||
| 79 | static int rc4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 78 | static int rc4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 80 | const unsigned char *iv,int enc); | 79 | const unsigned char *iv, int enc); |
| 81 | static int rc4_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 80 | static int rc4_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 82 | const unsigned char *in, size_t inl); | 81 | const unsigned char *in, size_t inl); |
| 83 | static const EVP_CIPHER r4_cipher= | 82 | |
| 84 | { | 83 | static const EVP_CIPHER r4_cipher = { |
| 85 | NID_rc4, | 84 | NID_rc4, |
| 86 | 1,EVP_RC4_KEY_SIZE,0, | 85 | 1, EVP_RC4_KEY_SIZE, 0, |
| 87 | EVP_CIPH_VARIABLE_LENGTH, | 86 | EVP_CIPH_VARIABLE_LENGTH, |
| 88 | rc4_init_key, | 87 | rc4_init_key, |
| 89 | rc4_cipher, | 88 | rc4_cipher, |
| @@ -93,45 +92,47 @@ static const EVP_CIPHER r4_cipher= | |||
| 93 | NULL, | 92 | NULL, |
| 94 | NULL, | 93 | NULL, |
| 95 | NULL | 94 | NULL |
| 96 | }; | 95 | }; |
| 97 | 96 | ||
| 98 | static const EVP_CIPHER r4_40_cipher= | 97 | static const EVP_CIPHER r4_40_cipher = { |
| 99 | { | ||
| 100 | NID_rc4_40, | 98 | NID_rc4_40, |
| 101 | 1,5 /* 40 bit */,0, | 99 | 1, 5 /* 40 bit */, 0, |
| 102 | EVP_CIPH_VARIABLE_LENGTH, | 100 | EVP_CIPH_VARIABLE_LENGTH, |
| 103 | rc4_init_key, | 101 | rc4_init_key, |
| 104 | rc4_cipher, | 102 | rc4_cipher, |
| 105 | NULL, | 103 | NULL, |
| 106 | sizeof(EVP_RC4_KEY), | 104 | sizeof(EVP_RC4_KEY), |
| 107 | NULL, | 105 | NULL, |
| 108 | NULL, | 106 | NULL, |
| 109 | NULL, | 107 | NULL, |
| 110 | NULL | 108 | NULL |
| 111 | }; | 109 | }; |
| 112 | 110 | ||
| 113 | const EVP_CIPHER *EVP_rc4(void) | 111 | const EVP_CIPHER * |
| 114 | { | 112 | EVP_rc4(void) |
| 115 | return(&r4_cipher); | 113 | { |
| 116 | } | 114 | return (&r4_cipher); |
| 115 | } | ||
| 117 | 116 | ||
| 118 | const EVP_CIPHER *EVP_rc4_40(void) | 117 | const EVP_CIPHER * |
| 119 | { | 118 | EVP_rc4_40(void) |
| 120 | return(&r4_40_cipher); | 119 | { |
| 121 | } | 120 | return (&r4_40_cipher); |
| 121 | } | ||
| 122 | 122 | ||
| 123 | static int rc4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 123 | static int |
| 124 | const unsigned char *iv, int enc) | 124 | rc4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 125 | { | 125 | const unsigned char *iv, int enc) |
| 126 | RC4_set_key(&data(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx), | 126 | { |
| 127 | key); | 127 | RC4_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx), key); |
| 128 | return 1; | 128 | return 1; |
| 129 | } | 129 | } |
| 130 | 130 | ||
| 131 | static int rc4_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 131 | static int |
| 132 | const unsigned char *in, size_t inl) | 132 | rc4_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 133 | { | 133 | const unsigned char *in, size_t inl) |
| 134 | RC4(&data(ctx)->ks,inl,in,out); | 134 | { |
| 135 | RC4(&data(ctx)->ks, inl, in, out); | ||
| 135 | return 1; | 136 | return 1; |
| 136 | } | 137 | } |
| 137 | #endif | 138 | #endif |
diff --git a/src/lib/libssl/src/crypto/evp/e_rc4_hmac_md5.c b/src/lib/libssl/src/crypto/evp/e_rc4_hmac_md5.c index 56563191ba..d4655c56d9 100644 --- a/src/lib/libssl/src/crypto/evp/e_rc4_hmac_md5.c +++ b/src/lib/libssl/src/crypto/evp/e_rc4_hmac_md5.c | |||
| @@ -68,37 +68,35 @@ | |||
| 68 | /* FIXME: surely this is available elsewhere? */ | 68 | /* FIXME: surely this is available elsewhere? */ |
| 69 | #define EVP_RC4_KEY_SIZE 16 | 69 | #define EVP_RC4_KEY_SIZE 16 |
| 70 | 70 | ||
| 71 | typedef struct | 71 | typedef struct { |
| 72 | { | 72 | RC4_KEY ks; |
| 73 | RC4_KEY ks; | 73 | MD5_CTX head, tail, md; |
| 74 | MD5_CTX head,tail,md; | 74 | size_t payload_length; |
| 75 | size_t payload_length; | 75 | } EVP_RC4_HMAC_MD5; |
| 76 | } EVP_RC4_HMAC_MD5; | ||
| 77 | 76 | ||
| 78 | #define NO_PAYLOAD_LENGTH ((size_t)-1) | 77 | #define NO_PAYLOAD_LENGTH ((size_t)-1) |
| 79 | 78 | ||
| 80 | void rc4_md5_enc (RC4_KEY *key, const void *in0, void *out, | 79 | void rc4_md5_enc (RC4_KEY *key, const void *in0, void *out, |
| 81 | MD5_CTX *ctx,const void *inp,size_t blocks); | 80 | MD5_CTX *ctx, const void *inp, size_t blocks); |
| 82 | 81 | ||
| 83 | #define data(ctx) ((EVP_RC4_HMAC_MD5 *)(ctx)->cipher_data) | 82 | #define data(ctx) ((EVP_RC4_HMAC_MD5 *)(ctx)->cipher_data) |
| 84 | 83 | ||
| 85 | static int rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, | 84 | static int |
| 86 | const unsigned char *inkey, | 85 | rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, |
| 87 | const unsigned char *iv, int enc) | 86 | const unsigned char *iv, int enc) |
| 88 | { | 87 | { |
| 89 | EVP_RC4_HMAC_MD5 *key = data(ctx); | 88 | EVP_RC4_HMAC_MD5 *key = data(ctx); |
| 90 | 89 | ||
| 91 | RC4_set_key(&key->ks,EVP_CIPHER_CTX_key_length(ctx), | 90 | RC4_set_key(&key->ks, EVP_CIPHER_CTX_key_length(ctx), inkey); |
| 92 | inkey); | ||
| 93 | 91 | ||
| 94 | MD5_Init(&key->head); /* handy when benchmarking */ | 92 | MD5_Init(&key->head); /* handy when benchmarking */ |
| 95 | key->tail = key->head; | 93 | key->tail = key->head; |
| 96 | key->md = key->head; | 94 | key->md = key->head; |
| 97 | 95 | ||
| 98 | key->payload_length = NO_PAYLOAD_LENGTH; | 96 | key->payload_length = NO_PAYLOAD_LENGTH; |
| 99 | 97 | ||
| 100 | return 1; | 98 | return 1; |
| 101 | } | 99 | } |
| 102 | 100 | ||
| 103 | #if !defined(OPENSSL_NO_ASM) && ( \ | 101 | #if !defined(OPENSSL_NO_ASM) && ( \ |
| 104 | defined(__x86_64) || defined(__x86_64__) || \ | 102 | defined(__x86_64) || defined(__x86_64__) || \ |
| @@ -113,173 +111,184 @@ static int rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, | |||
| 113 | #define md5_off 0 | 111 | #define md5_off 0 |
| 114 | #endif | 112 | #endif |
| 115 | 113 | ||
| 116 | static int rc4_hmac_md5_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 114 | static int |
| 117 | const unsigned char *in, size_t len) | 115 | rc4_hmac_md5_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 118 | { | 116 | const unsigned char *in, size_t len) |
| 117 | { | ||
| 119 | EVP_RC4_HMAC_MD5 *key = data(ctx); | 118 | EVP_RC4_HMAC_MD5 *key = data(ctx); |
| 120 | #if defined(STITCHED_CALL) | 119 | #if defined(STITCHED_CALL) |
| 121 | size_t rc4_off = 32-1-(key->ks.x&(32-1)), /* 32 is $MOD from rc4_md5-x86_64.pl */ | 120 | size_t rc4_off = 32-1-(key->ks.x&(32-1)), /* 32 is $MOD from rc4_md5-x86_64.pl */ |
| 122 | md5_off = MD5_CBLOCK-key->md.num, | 121 | md5_off = MD5_CBLOCK - key->md.num, |
| 123 | blocks; | 122 | blocks; |
| 124 | unsigned int l; | 123 | unsigned int l; |
| 125 | extern unsigned int OPENSSL_ia32cap_P[]; | 124 | extern unsigned int OPENSSL_ia32cap_P[]; |
| 126 | #endif | 125 | #endif |
| 127 | size_t plen = key->payload_length; | 126 | size_t plen = key->payload_length; |
| 128 | 127 | ||
| 129 | if (plen!=NO_PAYLOAD_LENGTH && len!=(plen+MD5_DIGEST_LENGTH)) return 0; | 128 | if (plen != NO_PAYLOAD_LENGTH && len != (plen + MD5_DIGEST_LENGTH)) |
| 129 | return 0; | ||
| 130 | 130 | ||
| 131 | if (ctx->encrypt) { | 131 | if (ctx->encrypt) { |
| 132 | if (plen==NO_PAYLOAD_LENGTH) plen = len; | 132 | if (plen == NO_PAYLOAD_LENGTH) |
| 133 | plen = len; | ||
| 133 | #if defined(STITCHED_CALL) | 134 | #if defined(STITCHED_CALL) |
| 134 | /* cipher has to "fall behind" */ | 135 | /* cipher has to "fall behind" */ |
| 135 | if (rc4_off>md5_off) md5_off+=MD5_CBLOCK; | 136 | if (rc4_off > md5_off) |
| 137 | md5_off += MD5_CBLOCK; | ||
| 136 | 138 | ||
| 137 | if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK) && | 139 | if (plen > md5_off && |
| 138 | (OPENSSL_ia32cap_P[0]&(1<<20))==0) { | 140 | (blocks = (plen - md5_off) / MD5_CBLOCK) && |
| 139 | MD5_Update(&key->md,in,md5_off); | 141 | (OPENSSL_ia32cap_P[0]&(1 << 20)) == 0) { |
| 140 | RC4(&key->ks,rc4_off,in,out); | 142 | MD5_Update(&key->md, in, md5_off); |
| 143 | RC4(&key->ks, rc4_off, in, out); | ||
| 141 | 144 | ||
| 142 | rc4_md5_enc(&key->ks,in+rc4_off,out+rc4_off, | 145 | rc4_md5_enc(&key->ks, in + rc4_off, out + rc4_off, |
| 143 | &key->md,in+md5_off,blocks); | 146 | &key->md, in + md5_off, blocks); |
| 144 | blocks *= MD5_CBLOCK; | 147 | blocks *= MD5_CBLOCK; |
| 145 | rc4_off += blocks; | 148 | rc4_off += blocks; |
| 146 | md5_off += blocks; | 149 | md5_off += blocks; |
| 147 | key->md.Nh += blocks>>29; | 150 | key->md.Nh += blocks >> 29; |
| 148 | key->md.Nl += blocks<<=3; | 151 | key->md.Nl += blocks <<= 3; |
| 149 | if (key->md.Nl<(unsigned int)blocks) key->md.Nh++; | 152 | if (key->md.Nl < (unsigned int)blocks) |
| 153 | key->md.Nh++; | ||
| 150 | } else { | 154 | } else { |
| 151 | rc4_off = 0; | 155 | rc4_off = 0; |
| 152 | md5_off = 0; | 156 | md5_off = 0; |
| 153 | } | 157 | } |
| 154 | #endif | 158 | #endif |
| 155 | MD5_Update(&key->md,in+md5_off,plen-md5_off); | 159 | MD5_Update(&key->md, in + md5_off, plen - md5_off); |
| 156 | 160 | ||
| 157 | if (plen!=len) { /* "TLS" mode of operation */ | 161 | if (plen!=len) { /* "TLS" mode of operation */ |
| 158 | if (in!=out) | 162 | if (in != out) |
| 159 | memcpy(out+rc4_off,in+rc4_off,plen-rc4_off); | 163 | memcpy(out + rc4_off, in + rc4_off, |
| 164 | plen - rc4_off); | ||
| 160 | 165 | ||
| 161 | /* calculate HMAC and append it to payload */ | 166 | /* calculate HMAC and append it to payload */ |
| 162 | MD5_Final(out+plen,&key->md); | 167 | MD5_Final(out + plen, &key->md); |
| 163 | key->md = key->tail; | 168 | key->md = key->tail; |
| 164 | MD5_Update(&key->md,out+plen,MD5_DIGEST_LENGTH); | 169 | MD5_Update(&key->md, out + plen, MD5_DIGEST_LENGTH); |
| 165 | MD5_Final(out+plen,&key->md); | 170 | MD5_Final(out + plen, &key->md); |
| 171 | |||
| 166 | /* encrypt HMAC at once */ | 172 | /* encrypt HMAC at once */ |
| 167 | RC4(&key->ks,len-rc4_off,out+rc4_off,out+rc4_off); | 173 | RC4(&key->ks, len - rc4_off, out + rc4_off, |
| 174 | out + rc4_off); | ||
| 168 | } else { | 175 | } else { |
| 169 | RC4(&key->ks,len-rc4_off,in+rc4_off,out+rc4_off); | 176 | RC4(&key->ks, len - rc4_off, in + rc4_off, |
| 177 | out + rc4_off); | ||
| 170 | } | 178 | } |
| 171 | } else { | 179 | } else { |
| 172 | unsigned char mac[MD5_DIGEST_LENGTH]; | 180 | unsigned char mac[MD5_DIGEST_LENGTH]; |
| 173 | #if defined(STITCHED_CALL) | 181 | #if defined(STITCHED_CALL) |
| 174 | /* digest has to "fall behind" */ | 182 | /* digest has to "fall behind" */ |
| 175 | if (md5_off>rc4_off) rc4_off += 2*MD5_CBLOCK; | 183 | if (md5_off > rc4_off) |
| 176 | else rc4_off += MD5_CBLOCK; | 184 | rc4_off += 2*MD5_CBLOCK; |
| 177 | 185 | else | |
| 178 | if (len>rc4_off && (blocks=(len-rc4_off)/MD5_CBLOCK) && | 186 | rc4_off += MD5_CBLOCK; |
| 179 | (OPENSSL_ia32cap_P[0]&(1<<20))==0) { | 187 | |
| 180 | RC4(&key->ks,rc4_off,in,out); | 188 | if (len > rc4_off && (blocks = (len - rc4_off) / MD5_CBLOCK) && |
| 181 | MD5_Update(&key->md,out,md5_off); | 189 | (OPENSSL_ia32cap_P[0] & (1 << 20)) == 0) { |
| 182 | 190 | RC4(&key->ks, rc4_off, in, out); | |
| 183 | rc4_md5_enc(&key->ks,in+rc4_off,out+rc4_off, | 191 | MD5_Update(&key->md, out, md5_off); |
| 184 | &key->md,out+md5_off,blocks); | 192 | |
| 193 | rc4_md5_enc(&key->ks, in + rc4_off, out + rc4_off, | ||
| 194 | &key->md, out + md5_off, blocks); | ||
| 185 | blocks *= MD5_CBLOCK; | 195 | blocks *= MD5_CBLOCK; |
| 186 | rc4_off += blocks; | 196 | rc4_off += blocks; |
| 187 | md5_off += blocks; | 197 | md5_off += blocks; |
| 188 | l = (key->md.Nl+(blocks<<3))&0xffffffffU; | 198 | l = (key->md.Nl + (blocks << 3)) & 0xffffffffU; |
| 189 | if (l<key->md.Nl) key->md.Nh++; | 199 | if (l < key->md.Nl) |
| 190 | key->md.Nl = l; | 200 | key->md.Nh++; |
| 191 | key->md.Nh += blocks>>29; | 201 | key->md.Nl = l; |
| 202 | key->md.Nh += blocks >> 29; | ||
| 192 | } else { | 203 | } else { |
| 193 | md5_off=0; | 204 | md5_off = 0; |
| 194 | rc4_off=0; | 205 | rc4_off = 0; |
| 195 | } | 206 | } |
| 196 | #endif | 207 | #endif |
| 197 | /* decrypt HMAC at once */ | 208 | /* decrypt HMAC at once */ |
| 198 | RC4(&key->ks,len-rc4_off,in+rc4_off,out+rc4_off); | 209 | RC4(&key->ks, len - rc4_off, in + rc4_off, out + rc4_off); |
| 199 | if (plen!=NO_PAYLOAD_LENGTH) { /* "TLS" mode of operation */ | 210 | if (plen!=NO_PAYLOAD_LENGTH) { /* "TLS" mode of operation */ |
| 200 | MD5_Update(&key->md,out+md5_off,plen-md5_off); | 211 | MD5_Update(&key->md, out + md5_off, plen - md5_off); |
| 201 | 212 | ||
| 202 | /* calculate HMAC and verify it */ | 213 | /* calculate HMAC and verify it */ |
| 203 | MD5_Final(mac,&key->md); | 214 | MD5_Final(mac, &key->md); |
| 204 | key->md = key->tail; | 215 | key->md = key->tail; |
| 205 | MD5_Update(&key->md,mac,MD5_DIGEST_LENGTH); | 216 | MD5_Update(&key->md, mac, MD5_DIGEST_LENGTH); |
| 206 | MD5_Final(mac,&key->md); | 217 | MD5_Final(mac, &key->md); |
| 207 | 218 | ||
| 208 | if (memcmp(out+plen,mac,MD5_DIGEST_LENGTH)) | 219 | if (memcmp(out + plen, mac, MD5_DIGEST_LENGTH)) |
| 209 | return 0; | 220 | return 0; |
| 210 | } else { | 221 | } else { |
| 211 | MD5_Update(&key->md,out+md5_off,len-md5_off); | 222 | MD5_Update(&key->md, out + md5_off, len - md5_off); |
| 212 | } | 223 | } |
| 213 | } | 224 | } |
| 214 | 225 | ||
| 215 | key->payload_length = NO_PAYLOAD_LENGTH; | 226 | key->payload_length = NO_PAYLOAD_LENGTH; |
| 216 | 227 | ||
| 217 | return 1; | 228 | return 1; |
| 218 | } | 229 | } |
| 219 | 230 | ||
| 220 | static int rc4_hmac_md5_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | 231 | static int |
| 221 | { | 232 | rc4_hmac_md5_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) |
| 233 | { | ||
| 222 | EVP_RC4_HMAC_MD5 *key = data(ctx); | 234 | EVP_RC4_HMAC_MD5 *key = data(ctx); |
| 223 | 235 | ||
| 224 | switch (type) | 236 | switch (type) { |
| 225 | { | ||
| 226 | case EVP_CTRL_AEAD_SET_MAC_KEY: | 237 | case EVP_CTRL_AEAD_SET_MAC_KEY: |
| 227 | { | 238 | { |
| 228 | unsigned int i; | 239 | unsigned int i; |
| 229 | unsigned char hmac_key[64]; | 240 | unsigned char hmac_key[64]; |
| 230 | 241 | ||
| 231 | memset (hmac_key,0,sizeof(hmac_key)); | 242 | memset (hmac_key, 0, sizeof(hmac_key)); |
| 232 | 243 | ||
| 233 | if (arg > (int)sizeof(hmac_key)) { | 244 | if (arg > (int)sizeof(hmac_key)) { |
| 234 | MD5_Init(&key->head); | 245 | MD5_Init(&key->head); |
| 235 | MD5_Update(&key->head,ptr,arg); | 246 | MD5_Update(&key->head, ptr, arg); |
| 236 | MD5_Final(hmac_key,&key->head); | 247 | MD5_Final(hmac_key, &key->head); |
| 237 | } else { | 248 | } else { |
| 238 | memcpy(hmac_key,ptr,arg); | 249 | memcpy(hmac_key, ptr, arg); |
| 239 | } | 250 | } |
| 240 | 251 | ||
| 241 | for (i=0;i<sizeof(hmac_key);i++) | 252 | for (i = 0; i < sizeof(hmac_key); i++) |
| 242 | hmac_key[i] ^= 0x36; /* ipad */ | 253 | hmac_key[i] ^= 0x36; /* ipad */ |
| 243 | MD5_Init(&key->head); | 254 | MD5_Init(&key->head); |
| 244 | MD5_Update(&key->head,hmac_key,sizeof(hmac_key)); | 255 | MD5_Update(&key->head, hmac_key, sizeof(hmac_key)); |
| 245 | 256 | ||
| 246 | for (i=0;i<sizeof(hmac_key);i++) | 257 | for (i = 0; i < sizeof(hmac_key); i++) |
| 247 | hmac_key[i] ^= 0x36^0x5c; /* opad */ | 258 | hmac_key[i] ^= 0x36 ^ 0x5c; /* opad */ |
| 248 | MD5_Init(&key->tail); | 259 | MD5_Init(&key->tail); |
| 249 | MD5_Update(&key->tail,hmac_key,sizeof(hmac_key)); | 260 | MD5_Update(&key->tail, hmac_key, sizeof(hmac_key)); |
| 250 | 261 | ||
| 251 | return 1; | 262 | return 1; |
| 252 | } | 263 | } |
| 253 | case EVP_CTRL_AEAD_TLS1_AAD: | 264 | case EVP_CTRL_AEAD_TLS1_AAD: |
| 254 | { | 265 | { |
| 255 | unsigned char *p=ptr; | 266 | unsigned char *p = ptr; |
| 256 | unsigned int len=p[arg-2]<<8|p[arg-1]; | 267 | unsigned int len = p[arg - 2] << 8 | p[arg - 1]; |
| 257 | 268 | ||
| 258 | if (!ctx->encrypt) | 269 | if (!ctx->encrypt) { |
| 259 | { | 270 | len -= MD5_DIGEST_LENGTH; |
| 260 | len -= MD5_DIGEST_LENGTH; | 271 | p[arg - 2] = len >> 8; |
| 261 | p[arg-2] = len>>8; | 272 | p[arg - 1] = len; |
| 262 | p[arg-1] = len; | ||
| 263 | } | 273 | } |
| 264 | key->payload_length=len; | 274 | key->payload_length = len; |
| 265 | key->md = key->head; | 275 | key->md = key->head; |
| 266 | MD5_Update(&key->md,p,arg); | 276 | MD5_Update(&key->md, p, arg); |
| 267 | 277 | ||
| 268 | return MD5_DIGEST_LENGTH; | 278 | return MD5_DIGEST_LENGTH; |
| 269 | } | 279 | } |
| 270 | default: | 280 | default: |
| 271 | return -1; | 281 | return -1; |
| 272 | } | ||
| 273 | } | 282 | } |
| 283 | } | ||
| 274 | 284 | ||
| 275 | static EVP_CIPHER r4_hmac_md5_cipher= | 285 | static EVP_CIPHER r4_hmac_md5_cipher = { |
| 276 | { | ||
| 277 | #ifdef NID_rc4_hmac_md5 | 286 | #ifdef NID_rc4_hmac_md5 |
| 278 | NID_rc4_hmac_md5, | 287 | NID_rc4_hmac_md5, |
| 279 | #else | 288 | #else |
| 280 | NID_undef, | 289 | NID_undef, |
| 281 | #endif | 290 | #endif |
| 282 | 1,EVP_RC4_KEY_SIZE,0, | 291 | 1, EVP_RC4_KEY_SIZE, 0, |
| 283 | EVP_CIPH_STREAM_CIPHER|EVP_CIPH_VARIABLE_LENGTH|EVP_CIPH_FLAG_AEAD_CIPHER, | 292 | EVP_CIPH_STREAM_CIPHER|EVP_CIPH_VARIABLE_LENGTH|EVP_CIPH_FLAG_AEAD_CIPHER, |
| 284 | rc4_hmac_md5_init_key, | 293 | rc4_hmac_md5_init_key, |
| 285 | rc4_hmac_md5_cipher, | 294 | rc4_hmac_md5_cipher, |
| @@ -289,10 +298,11 @@ static EVP_CIPHER r4_hmac_md5_cipher= | |||
| 289 | NULL, | 298 | NULL, |
| 290 | rc4_hmac_md5_ctrl, | 299 | rc4_hmac_md5_ctrl, |
| 291 | NULL | 300 | NULL |
| 292 | }; | 301 | }; |
| 293 | 302 | ||
| 294 | const EVP_CIPHER *EVP_rc4_hmac_md5(void) | 303 | const EVP_CIPHER * |
| 295 | { | 304 | EVP_rc4_hmac_md5(void) |
| 296 | return(&r4_hmac_md5_cipher); | 305 | { |
| 297 | } | 306 | return (&r4_hmac_md5_cipher); |
| 307 | } | ||
| 298 | #endif | 308 | #endif |
diff --git a/src/lib/libssl/src/crypto/evp/e_rc5.c b/src/lib/libssl/src/crypto/evp/e_rc5.c index 19a10c6402..efbd03735e 100644 --- a/src/lib/libssl/src/crypto/evp/e_rc5.c +++ b/src/lib/libssl/src/crypto/evp/e_rc5.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -67,27 +67,26 @@ | |||
| 67 | #include <openssl/rc5.h> | 67 | #include <openssl/rc5.h> |
| 68 | 68 | ||
| 69 | static int r_32_12_16_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 69 | static int r_32_12_16_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 70 | const unsigned char *iv,int enc); | 70 | const unsigned char *iv, int enc); |
| 71 | static int rc5_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr); | 71 | static int rc5_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr); |
| 72 | 72 | ||
| 73 | typedef struct | 73 | typedef struct { |
| 74 | { | ||
| 75 | int rounds; /* number of rounds */ | 74 | int rounds; /* number of rounds */ |
| 76 | RC5_32_KEY ks; /* key schedule */ | 75 | RC5_32_KEY ks; /* key schedule */ |
| 77 | } EVP_RC5_KEY; | 76 | } EVP_RC5_KEY; |
| 78 | 77 | ||
| 79 | #define data(ctx) EVP_C_DATA(EVP_RC5_KEY,ctx) | 78 | #define data(ctx) EVP_C_DATA(EVP_RC5_KEY,ctx) |
| 80 | 79 | ||
| 81 | IMPLEMENT_BLOCK_CIPHER(rc5_32_12_16, ks, RC5_32, EVP_RC5_KEY, NID_rc5, | 80 | IMPLEMENT_BLOCK_CIPHER(rc5_32_12_16, ks, RC5_32, EVP_RC5_KEY, NID_rc5, |
| 82 | 8, RC5_32_KEY_LENGTH, 8, 64, | 81 | 8, RC5_32_KEY_LENGTH, 8, 64, |
| 83 | EVP_CIPH_VARIABLE_LENGTH | EVP_CIPH_CTRL_INIT, | 82 | EVP_CIPH_VARIABLE_LENGTH | EVP_CIPH_CTRL_INIT, |
| 84 | r_32_12_16_init_key, NULL, | 83 | r_32_12_16_init_key, NULL, |
| 85 | NULL, NULL, rc5_ctrl) | 84 | NULL, NULL, rc5_ctrl) |
| 86 | 85 | ||
| 87 | static int rc5_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | 86 | static int |
| 88 | { | 87 | rc5_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) |
| 89 | switch(type) | 88 | { |
| 90 | { | 89 | switch (type) { |
| 91 | case EVP_CTRL_INIT: | 90 | case EVP_CTRL_INIT: |
| 92 | data(c)->rounds = RC5_12_ROUNDS; | 91 | data(c)->rounds = RC5_12_ROUNDS; |
| 93 | return 1; | 92 | return 1; |
| @@ -95,10 +94,9 @@ static int rc5_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 95 | case EVP_CTRL_GET_RC5_ROUNDS: | 94 | case EVP_CTRL_GET_RC5_ROUNDS: |
| 96 | *(int *)ptr = data(c)->rounds; | 95 | *(int *)ptr = data(c)->rounds; |
| 97 | return 1; | 96 | return 1; |
| 98 | 97 | ||
| 99 | case EVP_CTRL_SET_RC5_ROUNDS: | 98 | case EVP_CTRL_SET_RC5_ROUNDS: |
| 100 | switch(arg) | 99 | switch (arg) { |
| 101 | { | ||
| 102 | case RC5_8_ROUNDS: | 100 | case RC5_8_ROUNDS: |
| 103 | case RC5_12_ROUNDS: | 101 | case RC5_12_ROUNDS: |
| 104 | case RC5_16_ROUNDS: | 102 | case RC5_16_ROUNDS: |
| @@ -106,21 +104,23 @@ static int rc5_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | |||
| 106 | return 1; | 104 | return 1; |
| 107 | 105 | ||
| 108 | default: | 106 | default: |
| 109 | EVPerr(EVP_F_RC5_CTRL, EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS); | 107 | EVPerr(EVP_F_RC5_CTRL, |
| 108 | EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS); | ||
| 110 | return 0; | 109 | return 0; |
| 111 | } | 110 | } |
| 112 | 111 | ||
| 113 | default: | 112 | default: |
| 114 | return -1; | 113 | return -1; |
| 115 | } | ||
| 116 | } | 114 | } |
| 115 | } | ||
| 117 | 116 | ||
| 118 | static int r_32_12_16_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 117 | static int |
| 119 | const unsigned char *iv, int enc) | 118 | r_32_12_16_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 120 | { | 119 | const unsigned char *iv, int enc) |
| 121 | RC5_32_set_key(&data(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx), | 120 | { |
| 122 | key,data(ctx)->rounds); | 121 | RC5_32_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx), key, |
| 122 | data(ctx)->rounds); | ||
| 123 | return 1; | 123 | return 1; |
| 124 | } | 124 | } |
| 125 | 125 | ||
| 126 | #endif | 126 | #endif |
diff --git a/src/lib/libssl/src/crypto/evp/e_xcbc_d.c b/src/lib/libssl/src/crypto/evp/e_xcbc_d.c index 250e88c8c5..7313e4d225 100644 --- a/src/lib/libssl/src/crypto/evp/e_xcbc_d.c +++ b/src/lib/libssl/src/crypto/evp/e_xcbc_d.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -67,24 +67,22 @@ | |||
| 67 | #include <openssl/des.h> | 67 | #include <openssl/des.h> |
| 68 | 68 | ||
| 69 | static int desx_cbc_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 69 | static int desx_cbc_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 70 | const unsigned char *iv,int enc); | 70 | const unsigned char *iv, int enc); |
| 71 | static int desx_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 71 | static int desx_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 72 | const unsigned char *in, size_t inl); | 72 | const unsigned char *in, size_t inl); |
| 73 | 73 | ||
| 74 | 74 | ||
| 75 | typedef struct | 75 | typedef struct { |
| 76 | { | 76 | DES_key_schedule ks;/* key schedule */ |
| 77 | DES_key_schedule ks;/* key schedule */ | 77 | DES_cblock inw; |
| 78 | DES_cblock inw; | 78 | DES_cblock outw; |
| 79 | DES_cblock outw; | 79 | } DESX_CBC_KEY; |
| 80 | } DESX_CBC_KEY; | ||
| 81 | 80 | ||
| 82 | #define data(ctx) ((DESX_CBC_KEY *)(ctx)->cipher_data) | 81 | #define data(ctx) ((DESX_CBC_KEY *)(ctx)->cipher_data) |
| 83 | 82 | ||
| 84 | static const EVP_CIPHER d_xcbc_cipher= | 83 | static const EVP_CIPHER d_xcbc_cipher = { |
| 85 | { | ||
| 86 | NID_desx_cbc, | 84 | NID_desx_cbc, |
| 87 | 8,24,8, | 85 | 8, 24, 8, |
| 88 | EVP_CIPH_CBC_MODE, | 86 | EVP_CIPH_CBC_MODE, |
| 89 | desx_cbc_init_key, | 87 | desx_cbc_init_key, |
| 90 | desx_cbc_cipher, | 88 | desx_cbc_cipher, |
| @@ -94,45 +92,43 @@ static const EVP_CIPHER d_xcbc_cipher= | |||
| 94 | EVP_CIPHER_get_asn1_iv, | 92 | EVP_CIPHER_get_asn1_iv, |
| 95 | NULL, | 93 | NULL, |
| 96 | NULL | 94 | NULL |
| 97 | }; | 95 | }; |
| 98 | 96 | ||
| 99 | const EVP_CIPHER *EVP_desx_cbc(void) | 97 | const EVP_CIPHER * |
| 100 | { | 98 | EVP_desx_cbc(void) |
| 101 | return(&d_xcbc_cipher); | 99 | { |
| 102 | } | 100 | return (&d_xcbc_cipher); |
| 103 | 101 | } | |
| 104 | static int desx_cbc_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 102 | |
| 105 | const unsigned char *iv, int enc) | 103 | static int |
| 106 | { | 104 | desx_cbc_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| 105 | const unsigned char *iv, int enc) | ||
| 106 | { | ||
| 107 | DES_cblock *deskey = (DES_cblock *)key; | 107 | DES_cblock *deskey = (DES_cblock *)key; |
| 108 | 108 | ||
| 109 | DES_set_key_unchecked(deskey,&data(ctx)->ks); | 109 | DES_set_key_unchecked(deskey, &data(ctx)->ks); |
| 110 | memcpy(&data(ctx)->inw[0],&key[8],8); | 110 | memcpy(&data(ctx)->inw[0], &key[8], 8); |
| 111 | memcpy(&data(ctx)->outw[0],&key[16],8); | 111 | memcpy(&data(ctx)->outw[0], &key[16], 8); |
| 112 | 112 | ||
| 113 | return 1; | 113 | return 1; |
| 114 | } | 114 | } |
| 115 | 115 | ||
| 116 | static int desx_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 116 | static int |
| 117 | const unsigned char *in, size_t inl) | 117 | desx_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| 118 | { | 118 | const unsigned char *in, size_t inl) |
| 119 | while (inl>=EVP_MAXCHUNK) | 119 | { |
| 120 | { | 120 | while (inl >= EVP_MAXCHUNK) { |
| 121 | DES_xcbc_encrypt(in,out,(long)EVP_MAXCHUNK,&data(ctx)->ks, | 121 | DES_xcbc_encrypt(in, out, (long)EVP_MAXCHUNK, &data(ctx)->ks, |
| 122 | (DES_cblock *)&(ctx->iv[0]), | 122 | (DES_cblock *)&(ctx->iv[0]), &data(ctx)->inw, |
| 123 | &data(ctx)->inw, | 123 | &data(ctx)->outw, ctx->encrypt); |
| 124 | &data(ctx)->outw, | 124 | inl -= EVP_MAXCHUNK; |
| 125 | ctx->encrypt); | 125 | in += EVP_MAXCHUNK; |
| 126 | inl-=EVP_MAXCHUNK; | 126 | out += EVP_MAXCHUNK; |
| 127 | in +=EVP_MAXCHUNK; | 127 | } |
| 128 | out+=EVP_MAXCHUNK; | ||
| 129 | } | ||
| 130 | if (inl) | 128 | if (inl) |
| 131 | DES_xcbc_encrypt(in,out,(long)inl,&data(ctx)->ks, | 129 | DES_xcbc_encrypt(in, out, (long)inl, &data(ctx)->ks, |
| 132 | (DES_cblock *)&(ctx->iv[0]), | 130 | (DES_cblock *)&(ctx->iv[0]), &data(ctx)->inw, |
| 133 | &data(ctx)->inw, | 131 | &data(ctx)->outw, ctx->encrypt); |
| 134 | &data(ctx)->outw, | ||
| 135 | ctx->encrypt); | ||
| 136 | return 1; | 132 | return 1; |
| 137 | } | 133 | } |
| 138 | #endif | 134 | #endif |
