summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/evp/bio_enc.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libcrypto/evp/bio_enc.c')
-rw-r--r--src/lib/libcrypto/evp/bio_enc.c401
1 files changed, 0 insertions, 401 deletions
diff --git a/src/lib/libcrypto/evp/bio_enc.c b/src/lib/libcrypto/evp/bio_enc.c
deleted file mode 100644
index 0a7b1ecf07..0000000000
--- a/src/lib/libcrypto/evp/bio_enc.c
+++ /dev/null
@@ -1,401 +0,0 @@
1/* crypto/evp/bio_enc.c */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58
59#include <stdio.h>
60#include <errno.h>
61#include "cryptlib.h"
62#include <openssl/buffer.h>
63#include <openssl/evp.h>
64
65static int enc_write(BIO *h,char *buf,int num);
66static int enc_read(BIO *h,char *buf,int size);
67/*static int enc_puts(BIO *h,char *str); */
68/*static int enc_gets(BIO *h,char *str,int size); */
69static long enc_ctrl(BIO *h,int cmd,long arg1,char *arg2);
70static int enc_new(BIO *h);
71static int enc_free(BIO *data);
72#define ENC_BLOCK_SIZE (1024*4)
73
74typedef struct enc_struct
75 {
76 int buf_len;
77 int buf_off;
78 int cont; /* <= 0 when finished */
79 int finished;
80 int ok; /* bad decrypt */
81 EVP_CIPHER_CTX cipher;
82 char buf[ENC_BLOCK_SIZE+10];
83 } BIO_ENC_CTX;
84
85static BIO_METHOD methods_enc=
86 {
87 BIO_TYPE_CIPHER,"cipher",
88 enc_write,
89 enc_read,
90 NULL, /* enc_puts, */
91 NULL, /* enc_gets, */
92 enc_ctrl,
93 enc_new,
94 enc_free,
95 };
96
97BIO_METHOD *BIO_f_cipher(void)
98 {
99 return(&methods_enc);
100 }
101
102static int enc_new(BIO *bi)
103 {
104 BIO_ENC_CTX *ctx;
105
106 ctx=(BIO_ENC_CTX *)Malloc(sizeof(BIO_ENC_CTX));
107 EVP_CIPHER_CTX_init(&ctx->cipher);
108 if (ctx == NULL) return(0);
109
110 ctx->buf_len=0;
111 ctx->buf_off=0;
112 ctx->cont=1;
113 ctx->finished=0;
114 ctx->ok=1;
115
116 bi->init=0;
117 bi->ptr=(char *)ctx;
118 bi->flags=0;
119 return(1);
120 }
121
122static int enc_free(BIO *a)
123 {
124 BIO_ENC_CTX *b;
125
126 if (a == NULL) return(0);
127 b=(BIO_ENC_CTX *)a->ptr;
128 EVP_CIPHER_CTX_cleanup(&(b->cipher));
129 memset(a->ptr,0,sizeof(BIO_ENC_CTX));
130 Free(a->ptr);
131 a->ptr=NULL;
132 a->init=0;
133 a->flags=0;
134 return(1);
135 }
136
137static int enc_read(BIO *b, char *out, int outl)
138 {
139 int ret=0,i;
140 BIO_ENC_CTX *ctx;
141
142 if (out == NULL) return(0);
143 ctx=(BIO_ENC_CTX *)b->ptr;
144
145 if ((ctx == NULL) || (b->next_bio == NULL)) return(0);
146
147 /* First check if there are bytes decoded/encoded */
148 if (ctx->buf_len > 0)
149 {
150 i=ctx->buf_len-ctx->buf_off;
151 if (i > outl) i=outl;
152 memcpy(out,&(ctx->buf[ctx->buf_off]),i);
153 ret=i;
154 out+=i;
155 outl-=i;
156 ctx->buf_off+=i;
157 if (ctx->buf_len == ctx->buf_off)
158 {
159 ctx->buf_len=0;
160 ctx->buf_off=0;
161 }
162 }
163
164 /* At this point, we have room of outl bytes and an empty
165 * buffer, so we should read in some more. */
166
167 while (outl > 0)
168 {
169 if (ctx->cont <= 0) break;
170
171 /* read in at offset 8, read the EVP_Cipher
172 * documentation about why */
173 i=BIO_read(b->next_bio,&(ctx->buf[8]),ENC_BLOCK_SIZE);
174
175 if (i <= 0)
176 {
177 /* Should be continue next time we are called? */
178 if (!BIO_should_retry(b->next_bio))
179 {
180 ctx->cont=i;
181 i=EVP_CipherFinal(&(ctx->cipher),
182 (unsigned char *)ctx->buf,
183 &(ctx->buf_len));
184 ctx->ok=i;
185 ctx->buf_off=0;
186 }
187 else
188 ret=(ret == 0)?i:ret;
189 break;
190 }
191 else
192 {
193 EVP_CipherUpdate(&(ctx->cipher),
194 (unsigned char *)ctx->buf,&ctx->buf_len,
195 (unsigned char *)&(ctx->buf[8]),i);
196 ctx->cont=1;
197 }
198
199 if (ctx->buf_len <= outl)
200 i=ctx->buf_len;
201 else
202 i=outl;
203
204 if (i <= 0) break;
205 memcpy(out,ctx->buf,i);
206 ret+=i;
207 ctx->buf_off=i;
208 outl-=i;
209 out+=i;
210 }
211
212 BIO_clear_retry_flags(b);
213 BIO_copy_next_retry(b);
214 return((ret == 0)?ctx->cont:ret);
215 }
216
217static int enc_write(BIO *b, char *in, int inl)
218 {
219 int ret=0,n,i;
220 BIO_ENC_CTX *ctx;
221
222 ctx=(BIO_ENC_CTX *)b->ptr;
223 ret=inl;
224
225 BIO_clear_retry_flags(b);
226 n=ctx->buf_len-ctx->buf_off;
227 while (n > 0)
228 {
229 i=BIO_write(b->next_bio,&(ctx->buf[ctx->buf_off]),n);
230 if (i <= 0)
231 {
232 BIO_copy_next_retry(b);
233 return(i);
234 }
235 ctx->buf_off+=i;
236 n-=i;
237 }
238 /* at this point all pending data has been written */
239
240 if ((in == NULL) || (inl <= 0)) return(0);
241
242 ctx->buf_off=0;
243 while (inl > 0)
244 {
245 n=(inl > ENC_BLOCK_SIZE)?ENC_BLOCK_SIZE:inl;
246 EVP_CipherUpdate(&(ctx->cipher),
247 (unsigned char *)ctx->buf,&ctx->buf_len,
248 (unsigned char *)in,n);
249 inl-=n;
250 in+=n;
251
252 ctx->buf_off=0;
253 n=ctx->buf_len;
254 while (n > 0)
255 {
256 i=BIO_write(b->next_bio,&(ctx->buf[ctx->buf_off]),n);
257 if (i <= 0)
258 {
259 BIO_copy_next_retry(b);
260 return(i);
261 }
262 n-=i;
263 ctx->buf_off+=i;
264 }
265 ctx->buf_len=0;
266 ctx->buf_off=0;
267 }
268 BIO_copy_next_retry(b);
269 return(ret);
270 }
271
272static long enc_ctrl(BIO *b, int cmd, long num, char *ptr)
273 {
274 BIO *dbio;
275 BIO_ENC_CTX *ctx,*dctx;
276 long ret=1;
277 int i;
278 EVP_CIPHER_CTX **c_ctx;
279
280 ctx=(BIO_ENC_CTX *)b->ptr;
281
282 switch (cmd)
283 {
284 case BIO_CTRL_RESET:
285 ctx->ok=1;
286 ctx->finished=0;
287 EVP_CipherInit(&(ctx->cipher),NULL,NULL,NULL,
288 ctx->cipher.encrypt);
289 ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
290 break;
291 case BIO_CTRL_EOF: /* More to read */
292 if (ctx->cont <= 0)
293 ret=1;
294 else
295 ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
296 break;
297 case BIO_CTRL_WPENDING:
298 ret=ctx->buf_len-ctx->buf_off;
299 if (ret <= 0)
300 ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
301 break;
302 case BIO_CTRL_PENDING: /* More to read in buffer */
303 ret=ctx->buf_len-ctx->buf_off;
304 if (ret <= 0)
305 ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
306 break;
307 case BIO_CTRL_FLUSH:
308 /* do a final write */
309again:
310 while (ctx->buf_len != ctx->buf_off)
311 {
312 i=enc_write(b,NULL,0);
313 if (i < 0)
314 {
315 ret=i;
316 break;
317 }
318 }
319
320 if (!ctx->finished)
321 {
322 ctx->finished=1;
323 ctx->buf_off=0;
324 ret=EVP_CipherFinal(&(ctx->cipher),
325 (unsigned char *)ctx->buf,
326 &(ctx->buf_len));
327 ctx->ok=(int)ret;
328 if (ret <= 0) break;
329
330 /* push out the bytes */
331 goto again;
332 }
333
334 /* Finally flush the underlying BIO */
335 ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
336 break;
337 case BIO_C_GET_CIPHER_STATUS:
338 ret=(long)ctx->ok;
339 break;
340 case BIO_C_DO_STATE_MACHINE:
341 BIO_clear_retry_flags(b);
342 ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
343 BIO_copy_next_retry(b);
344 break;
345 case BIO_C_GET_CIPHER_CTX:
346 c_ctx=(EVP_CIPHER_CTX **)ptr;
347 (*c_ctx)= &(ctx->cipher);
348 b->init=1;
349 break;
350 case BIO_CTRL_DUP:
351 dbio=(BIO *)ptr;
352 dctx=(BIO_ENC_CTX *)dbio->ptr;
353 memcpy(&(dctx->cipher),&(ctx->cipher),sizeof(ctx->cipher));
354 dbio->init=1;
355 break;
356 default:
357 ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
358 break;
359 }
360 return(ret);
361 }
362
363/*
364void BIO_set_cipher_ctx(b,c)
365BIO *b;
366EVP_CIPHER_ctx *c;
367 {
368 if (b == NULL) return;
369
370 if ((b->callback != NULL) &&
371 (b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,0L) <= 0))
372 return;
373
374 b->init=1;
375 ctx=(BIO_ENC_CTX *)b->ptr;
376 memcpy(ctx->cipher,c,sizeof(EVP_CIPHER_CTX));
377
378 if (b->callback != NULL)
379 b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,1L);
380 }
381*/
382
383void BIO_set_cipher(BIO *b, const EVP_CIPHER *c, unsigned char *k,
384 unsigned char *i, int e)
385 {
386 BIO_ENC_CTX *ctx;
387
388 if (b == NULL) return;
389
390 if ((b->callback != NULL) &&
391 (b->callback(b,BIO_CB_CTRL,(const char *)c,BIO_CTRL_SET,e,0L) <= 0))
392 return;
393
394 b->init=1;
395 ctx=(BIO_ENC_CTX *)b->ptr;
396 EVP_CipherInit(&(ctx->cipher),c,k,i,e);
397
398 if (b->callback != NULL)
399 b->callback(b,BIO_CB_CTRL,(const char *)c,BIO_CTRL_SET,e,1L);
400 }
401