diff options
Diffstat (limited to 'src/lib/libcrypto/evp')
33 files changed, 2412 insertions, 131 deletions
diff --git a/src/lib/libcrypto/evp/bio_md.c b/src/lib/libcrypto/evp/bio_md.c index 9841e32e1a..144fdfd56a 100644 --- a/src/lib/libcrypto/evp/bio_md.c +++ b/src/lib/libcrypto/evp/bio_md.c | |||
@@ -153,8 +153,12 @@ static int md_write(BIO *b, const char *in, int inl) | |||
153 | { | 153 | { |
154 | if (ret > 0) | 154 | if (ret > 0) |
155 | { | 155 | { |
156 | EVP_DigestUpdate(ctx,(const unsigned char *)in, | 156 | if (!EVP_DigestUpdate(ctx,(const unsigned char *)in, |
157 | (unsigned int)ret); | 157 | (unsigned int)ret)) |
158 | { | ||
159 | BIO_clear_retry_flags(b); | ||
160 | return 0; | ||
161 | } | ||
158 | } | 162 | } |
159 | } | 163 | } |
160 | if(b->next_bio != NULL) | 164 | if(b->next_bio != NULL) |
@@ -220,7 +224,8 @@ static long md_ctrl(BIO *b, int cmd, long num, void *ptr) | |||
220 | case BIO_CTRL_DUP: | 224 | case BIO_CTRL_DUP: |
221 | dbio=ptr; | 225 | dbio=ptr; |
222 | dctx=dbio->ptr; | 226 | dctx=dbio->ptr; |
223 | EVP_MD_CTX_copy_ex(dctx,ctx); | 227 | if (!EVP_MD_CTX_copy_ex(dctx,ctx)) |
228 | return 0; | ||
224 | b->init=1; | 229 | b->init=1; |
225 | break; | 230 | break; |
226 | default: | 231 | default: |
diff --git a/src/lib/libcrypto/evp/digest.c b/src/lib/libcrypto/evp/digest.c index 982ba2b136..467e6b5ae9 100644 --- a/src/lib/libcrypto/evp/digest.c +++ b/src/lib/libcrypto/evp/digest.c | |||
@@ -117,6 +117,10 @@ | |||
117 | #include <openssl/engine.h> | 117 | #include <openssl/engine.h> |
118 | #endif | 118 | #endif |
119 | 119 | ||
120 | #ifdef OPENSSL_FIPS | ||
121 | #include <openssl/fips.h> | ||
122 | #endif | ||
123 | |||
120 | void EVP_MD_CTX_init(EVP_MD_CTX *ctx) | 124 | void EVP_MD_CTX_init(EVP_MD_CTX *ctx) |
121 | { | 125 | { |
122 | memset(ctx,'\0',sizeof *ctx); | 126 | memset(ctx,'\0',sizeof *ctx); |
@@ -225,12 +229,26 @@ skip_to_init: | |||
225 | } | 229 | } |
226 | if (ctx->flags & EVP_MD_CTX_FLAG_NO_INIT) | 230 | if (ctx->flags & EVP_MD_CTX_FLAG_NO_INIT) |
227 | return 1; | 231 | return 1; |
232 | #ifdef OPENSSL_FIPS | ||
233 | if (FIPS_mode()) | ||
234 | { | ||
235 | if (FIPS_digestinit(ctx, type)) | ||
236 | return 1; | ||
237 | OPENSSL_free(ctx->md_data); | ||
238 | ctx->md_data = NULL; | ||
239 | return 0; | ||
240 | } | ||
241 | #endif | ||
228 | return ctx->digest->init(ctx); | 242 | return ctx->digest->init(ctx); |
229 | } | 243 | } |
230 | 244 | ||
231 | int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *data, size_t count) | 245 | int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *data, size_t count) |
232 | { | 246 | { |
247 | #ifdef OPENSSL_FIPS | ||
248 | return FIPS_digestupdate(ctx, data, count); | ||
249 | #else | ||
233 | return ctx->update(ctx,data,count); | 250 | return ctx->update(ctx,data,count); |
251 | #endif | ||
234 | } | 252 | } |
235 | 253 | ||
236 | /* The caller can assume that this removes any secret data from the context */ | 254 | /* The caller can assume that this removes any secret data from the context */ |
@@ -245,8 +263,10 @@ int EVP_DigestFinal(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) | |||
245 | /* The caller can assume that this removes any secret data from the context */ | 263 | /* The caller can assume that this removes any secret data from the context */ |
246 | int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) | 264 | int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) |
247 | { | 265 | { |
266 | #ifdef OPENSSL_FIPS | ||
267 | return FIPS_digestfinal(ctx, md, size); | ||
268 | #else | ||
248 | int ret; | 269 | int ret; |
249 | |||
250 | OPENSSL_assert(ctx->digest->md_size <= EVP_MAX_MD_SIZE); | 270 | OPENSSL_assert(ctx->digest->md_size <= EVP_MAX_MD_SIZE); |
251 | ret=ctx->digest->final(ctx,md); | 271 | ret=ctx->digest->final(ctx,md); |
252 | if (size != NULL) | 272 | if (size != NULL) |
@@ -258,6 +278,7 @@ int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) | |||
258 | } | 278 | } |
259 | memset(ctx->md_data,0,ctx->digest->ctx_size); | 279 | memset(ctx->md_data,0,ctx->digest->ctx_size); |
260 | return ret; | 280 | return ret; |
281 | #endif | ||
261 | } | 282 | } |
262 | 283 | ||
263 | int EVP_MD_CTX_copy(EVP_MD_CTX *out, const EVP_MD_CTX *in) | 284 | int EVP_MD_CTX_copy(EVP_MD_CTX *out, const EVP_MD_CTX *in) |
@@ -351,6 +372,7 @@ void EVP_MD_CTX_destroy(EVP_MD_CTX *ctx) | |||
351 | /* This call frees resources associated with the context */ | 372 | /* This call frees resources associated with the context */ |
352 | int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx) | 373 | int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx) |
353 | { | 374 | { |
375 | #ifndef OPENSSL_FIPS | ||
354 | /* Don't assume ctx->md_data was cleaned in EVP_Digest_Final, | 376 | /* Don't assume ctx->md_data was cleaned in EVP_Digest_Final, |
355 | * because sometimes only copies of the context are ever finalised. | 377 | * because sometimes only copies of the context are ever finalised. |
356 | */ | 378 | */ |
@@ -363,6 +385,7 @@ int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx) | |||
363 | OPENSSL_cleanse(ctx->md_data,ctx->digest->ctx_size); | 385 | OPENSSL_cleanse(ctx->md_data,ctx->digest->ctx_size); |
364 | OPENSSL_free(ctx->md_data); | 386 | OPENSSL_free(ctx->md_data); |
365 | } | 387 | } |
388 | #endif | ||
366 | if (ctx->pctx) | 389 | if (ctx->pctx) |
367 | EVP_PKEY_CTX_free(ctx->pctx); | 390 | EVP_PKEY_CTX_free(ctx->pctx); |
368 | #ifndef OPENSSL_NO_ENGINE | 391 | #ifndef OPENSSL_NO_ENGINE |
@@ -371,6 +394,9 @@ int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx) | |||
371 | * functional reference we held for this reason. */ | 394 | * functional reference we held for this reason. */ |
372 | ENGINE_finish(ctx->engine); | 395 | ENGINE_finish(ctx->engine); |
373 | #endif | 396 | #endif |
397 | #ifdef OPENSSL_FIPS | ||
398 | FIPS_md_ctx_cleanup(ctx); | ||
399 | #endif | ||
374 | memset(ctx,'\0',sizeof *ctx); | 400 | memset(ctx,'\0',sizeof *ctx); |
375 | 401 | ||
376 | return 1; | 402 | return 1; |
diff --git a/src/lib/libcrypto/evp/e_aes.c b/src/lib/libcrypto/evp/e_aes.c index bd6c0a3a62..1e4af0cb75 100644 --- a/src/lib/libcrypto/evp/e_aes.c +++ b/src/lib/libcrypto/evp/e_aes.c | |||
@@ -1,5 +1,5 @@ | |||
1 | /* ==================================================================== | 1 | /* ==================================================================== |
2 | * Copyright (c) 2001 The OpenSSL Project. All rights reserved. | 2 | * Copyright (c) 2001-2011 The OpenSSL Project. All rights reserved. |
3 | * | 3 | * |
4 | * Redistribution and use in source and binary forms, with or without | 4 | * Redistribution and use in source and binary forms, with or without |
5 | * modification, are permitted provided that the following conditions | 5 | * modification, are permitted provided that the following conditions |
@@ -56,57 +56,511 @@ | |||
56 | #include <assert.h> | 56 | #include <assert.h> |
57 | #include <openssl/aes.h> | 57 | #include <openssl/aes.h> |
58 | #include "evp_locl.h" | 58 | #include "evp_locl.h" |
59 | 59 | #ifndef OPENSSL_FIPS | |
60 | static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 60 | #include "modes_lcl.h" |
61 | const unsigned char *iv, int enc); | 61 | #include <openssl/rand.h> |
62 | 62 | ||
63 | typedef struct | 63 | typedef struct |
64 | { | 64 | { |
65 | AES_KEY ks; | 65 | AES_KEY ks; |
66 | block128_f block; | ||
67 | union { | ||
68 | cbc128_f cbc; | ||
69 | ctr128_f ctr; | ||
70 | } stream; | ||
66 | } EVP_AES_KEY; | 71 | } EVP_AES_KEY; |
67 | 72 | ||
68 | #define data(ctx) EVP_C_DATA(EVP_AES_KEY,ctx) | 73 | typedef struct |
69 | 74 | { | |
70 | IMPLEMENT_BLOCK_CIPHER(aes_128, ks, AES, EVP_AES_KEY, | 75 | AES_KEY ks; /* AES key schedule to use */ |
71 | NID_aes_128, 16, 16, 16, 128, | 76 | int key_set; /* Set if key initialised */ |
72 | 0, aes_init_key, NULL, | 77 | int iv_set; /* Set if an iv is set */ |
73 | EVP_CIPHER_set_asn1_iv, | 78 | GCM128_CONTEXT gcm; |
74 | EVP_CIPHER_get_asn1_iv, | 79 | unsigned char *iv; /* Temporary IV store */ |
75 | NULL) | 80 | int ivlen; /* IV length */ |
76 | IMPLEMENT_BLOCK_CIPHER(aes_192, ks, AES, EVP_AES_KEY, | 81 | int taglen; |
77 | NID_aes_192, 16, 24, 16, 128, | 82 | int iv_gen; /* It is OK to generate IVs */ |
78 | 0, aes_init_key, NULL, | 83 | int tls_aad_len; /* TLS AAD length */ |
79 | EVP_CIPHER_set_asn1_iv, | 84 | ctr128_f ctr; |
80 | EVP_CIPHER_get_asn1_iv, | 85 | } EVP_AES_GCM_CTX; |
81 | NULL) | 86 | |
82 | IMPLEMENT_BLOCK_CIPHER(aes_256, ks, AES, EVP_AES_KEY, | 87 | typedef struct |
83 | NID_aes_256, 16, 32, 16, 128, | 88 | { |
84 | 0, aes_init_key, NULL, | 89 | AES_KEY ks1, ks2; /* AES key schedules to use */ |
85 | EVP_CIPHER_set_asn1_iv, | 90 | XTS128_CONTEXT xts; |
86 | EVP_CIPHER_get_asn1_iv, | 91 | void (*stream)(const unsigned char *in, |
87 | NULL) | 92 | unsigned char *out, size_t length, |
88 | 93 | const AES_KEY *key1, const AES_KEY *key2, | |
89 | #define IMPLEMENT_AES_CFBR(ksize,cbits) IMPLEMENT_CFBR(aes,AES,EVP_AES_KEY,ks,ksize,cbits,16) | 94 | const unsigned char iv[16]); |
90 | 95 | } EVP_AES_XTS_CTX; | |
91 | IMPLEMENT_AES_CFBR(128,1) | 96 | |
92 | IMPLEMENT_AES_CFBR(192,1) | 97 | typedef struct |
93 | IMPLEMENT_AES_CFBR(256,1) | 98 | { |
94 | 99 | AES_KEY ks; /* AES key schedule to use */ | |
95 | IMPLEMENT_AES_CFBR(128,8) | 100 | int key_set; /* Set if key initialised */ |
96 | IMPLEMENT_AES_CFBR(192,8) | 101 | int iv_set; /* Set if an iv is set */ |
97 | IMPLEMENT_AES_CFBR(256,8) | 102 | int tag_set; /* Set if tag is valid */ |
103 | int len_set; /* Set if message length set */ | ||
104 | int L, M; /* L and M parameters from RFC3610 */ | ||
105 | CCM128_CONTEXT ccm; | ||
106 | ccm128_f str; | ||
107 | } EVP_AES_CCM_CTX; | ||
108 | |||
109 | #define MAXBITCHUNK ((size_t)1<<(sizeof(size_t)*8-4)) | ||
110 | |||
111 | #ifdef VPAES_ASM | ||
112 | int vpaes_set_encrypt_key(const unsigned char *userKey, int bits, | ||
113 | AES_KEY *key); | ||
114 | int vpaes_set_decrypt_key(const unsigned char *userKey, int bits, | ||
115 | AES_KEY *key); | ||
116 | |||
117 | void vpaes_encrypt(const unsigned char *in, unsigned char *out, | ||
118 | const AES_KEY *key); | ||
119 | void vpaes_decrypt(const unsigned char *in, unsigned char *out, | ||
120 | const AES_KEY *key); | ||
121 | |||
122 | void vpaes_cbc_encrypt(const unsigned char *in, | ||
123 | unsigned char *out, | ||
124 | size_t length, | ||
125 | const AES_KEY *key, | ||
126 | unsigned char *ivec, int enc); | ||
127 | #endif | ||
128 | #ifdef BSAES_ASM | ||
129 | void bsaes_cbc_encrypt(const unsigned char *in, unsigned char *out, | ||
130 | size_t length, const AES_KEY *key, | ||
131 | unsigned char ivec[16], int enc); | ||
132 | void bsaes_ctr32_encrypt_blocks(const unsigned char *in, unsigned char *out, | ||
133 | size_t len, const AES_KEY *key, | ||
134 | const unsigned char ivec[16]); | ||
135 | void bsaes_xts_encrypt(const unsigned char *inp, unsigned char *out, | ||
136 | size_t len, const AES_KEY *key1, | ||
137 | const AES_KEY *key2, const unsigned char iv[16]); | ||
138 | void bsaes_xts_decrypt(const unsigned char *inp, unsigned char *out, | ||
139 | size_t len, const AES_KEY *key1, | ||
140 | const AES_KEY *key2, const unsigned char iv[16]); | ||
141 | #endif | ||
142 | #ifdef AES_CTR_ASM | ||
143 | void AES_ctr32_encrypt(const unsigned char *in, unsigned char *out, | ||
144 | size_t blocks, const AES_KEY *key, | ||
145 | const unsigned char ivec[AES_BLOCK_SIZE]); | ||
146 | #endif | ||
147 | #ifdef AES_XTS_ASM | ||
148 | void AES_xts_encrypt(const char *inp,char *out,size_t len, | ||
149 | const AES_KEY *key1, const AES_KEY *key2, | ||
150 | const unsigned char iv[16]); | ||
151 | void AES_xts_decrypt(const char *inp,char *out,size_t len, | ||
152 | const AES_KEY *key1, const AES_KEY *key2, | ||
153 | const unsigned char iv[16]); | ||
154 | #endif | ||
155 | |||
156 | #if defined(AES_ASM) && !defined(I386_ONLY) && ( \ | ||
157 | ((defined(__i386) || defined(__i386__) || \ | ||
158 | defined(_M_IX86)) && defined(OPENSSL_IA32_SSE2))|| \ | ||
159 | defined(__x86_64) || defined(__x86_64__) || \ | ||
160 | defined(_M_AMD64) || defined(_M_X64) || \ | ||
161 | defined(__INTEL__) ) | ||
162 | |||
163 | extern unsigned int OPENSSL_ia32cap_P[2]; | ||
164 | |||
165 | #ifdef VPAES_ASM | ||
166 | #define VPAES_CAPABLE (OPENSSL_ia32cap_P[1]&(1<<(41-32))) | ||
167 | #endif | ||
168 | #ifdef BSAES_ASM | ||
169 | #define BSAES_CAPABLE VPAES_CAPABLE | ||
170 | #endif | ||
171 | /* | ||
172 | * AES-NI section | ||
173 | */ | ||
174 | #define AESNI_CAPABLE (OPENSSL_ia32cap_P[1]&(1<<(57-32))) | ||
175 | |||
176 | int aesni_set_encrypt_key(const unsigned char *userKey, int bits, | ||
177 | AES_KEY *key); | ||
178 | int aesni_set_decrypt_key(const unsigned char *userKey, int bits, | ||
179 | AES_KEY *key); | ||
180 | |||
181 | void aesni_encrypt(const unsigned char *in, unsigned char *out, | ||
182 | const AES_KEY *key); | ||
183 | void aesni_decrypt(const unsigned char *in, unsigned char *out, | ||
184 | const AES_KEY *key); | ||
185 | |||
186 | void aesni_ecb_encrypt(const unsigned char *in, | ||
187 | unsigned char *out, | ||
188 | size_t length, | ||
189 | const AES_KEY *key, | ||
190 | int enc); | ||
191 | void aesni_cbc_encrypt(const unsigned char *in, | ||
192 | unsigned char *out, | ||
193 | size_t length, | ||
194 | const AES_KEY *key, | ||
195 | unsigned char *ivec, int enc); | ||
196 | |||
197 | void aesni_ctr32_encrypt_blocks(const unsigned char *in, | ||
198 | unsigned char *out, | ||
199 | size_t blocks, | ||
200 | const void *key, | ||
201 | const unsigned char *ivec); | ||
202 | |||
203 | void aesni_xts_encrypt(const unsigned char *in, | ||
204 | unsigned char *out, | ||
205 | size_t length, | ||
206 | const AES_KEY *key1, const AES_KEY *key2, | ||
207 | const unsigned char iv[16]); | ||
208 | |||
209 | void aesni_xts_decrypt(const unsigned char *in, | ||
210 | unsigned char *out, | ||
211 | size_t length, | ||
212 | const AES_KEY *key1, const AES_KEY *key2, | ||
213 | const unsigned char iv[16]); | ||
214 | |||
215 | void aesni_ccm64_encrypt_blocks (const unsigned char *in, | ||
216 | unsigned char *out, | ||
217 | size_t blocks, | ||
218 | const void *key, | ||
219 | const unsigned char ivec[16], | ||
220 | unsigned char cmac[16]); | ||
221 | |||
222 | void aesni_ccm64_decrypt_blocks (const unsigned char *in, | ||
223 | unsigned char *out, | ||
224 | size_t blocks, | ||
225 | const void *key, | ||
226 | const unsigned char ivec[16], | ||
227 | unsigned char cmac[16]); | ||
228 | |||
229 | static int aesni_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
230 | const unsigned char *iv, int enc) | ||
231 | { | ||
232 | int ret, mode; | ||
233 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
234 | |||
235 | mode = ctx->cipher->flags & EVP_CIPH_MODE; | ||
236 | if ((mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE) | ||
237 | && !enc) | ||
238 | { | ||
239 | ret = aesni_set_decrypt_key(key, ctx->key_len*8, ctx->cipher_data); | ||
240 | dat->block = (block128_f)aesni_decrypt; | ||
241 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | ||
242 | (cbc128_f)aesni_cbc_encrypt : | ||
243 | NULL; | ||
244 | } | ||
245 | else { | ||
246 | ret = aesni_set_encrypt_key(key, ctx->key_len*8, ctx->cipher_data); | ||
247 | dat->block = (block128_f)aesni_encrypt; | ||
248 | if (mode==EVP_CIPH_CBC_MODE) | ||
249 | dat->stream.cbc = (cbc128_f)aesni_cbc_encrypt; | ||
250 | else if (mode==EVP_CIPH_CTR_MODE) | ||
251 | dat->stream.ctr = (ctr128_f)aesni_ctr32_encrypt_blocks; | ||
252 | else | ||
253 | dat->stream.cbc = NULL; | ||
254 | } | ||
255 | |||
256 | if(ret < 0) | ||
257 | { | ||
258 | EVPerr(EVP_F_AESNI_INIT_KEY,EVP_R_AES_KEY_SETUP_FAILED); | ||
259 | return 0; | ||
260 | } | ||
261 | |||
262 | return 1; | ||
263 | } | ||
264 | |||
265 | static int aesni_cbc_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
266 | const unsigned char *in, size_t len) | ||
267 | { | ||
268 | aesni_cbc_encrypt(in,out,len,ctx->cipher_data,ctx->iv,ctx->encrypt); | ||
269 | |||
270 | return 1; | ||
271 | } | ||
272 | |||
273 | static int aesni_ecb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
274 | const unsigned char *in, size_t len) | ||
275 | { | ||
276 | size_t bl = ctx->cipher->block_size; | ||
277 | |||
278 | if (len<bl) return 1; | ||
279 | |||
280 | aesni_ecb_encrypt(in,out,len,ctx->cipher_data,ctx->encrypt); | ||
281 | |||
282 | return 1; | ||
283 | } | ||
284 | |||
285 | #define aesni_ofb_cipher aes_ofb_cipher | ||
286 | static int aesni_ofb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
287 | const unsigned char *in,size_t len); | ||
288 | |||
289 | #define aesni_cfb_cipher aes_cfb_cipher | ||
290 | static int aesni_cfb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
291 | const unsigned char *in,size_t len); | ||
292 | |||
293 | #define aesni_cfb8_cipher aes_cfb8_cipher | ||
294 | static int aesni_cfb8_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
295 | const unsigned char *in,size_t len); | ||
296 | |||
297 | #define aesni_cfb1_cipher aes_cfb1_cipher | ||
298 | static int aesni_cfb1_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
299 | const unsigned char *in,size_t len); | ||
300 | |||
301 | #define aesni_ctr_cipher aes_ctr_cipher | ||
302 | static int aesni_ctr_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
303 | const unsigned char *in, size_t len); | ||
304 | |||
305 | static int aesni_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
306 | const unsigned char *iv, int enc) | ||
307 | { | ||
308 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | ||
309 | if (!iv && !key) | ||
310 | return 1; | ||
311 | if (key) | ||
312 | { | ||
313 | aesni_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks); | ||
314 | CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, | ||
315 | (block128_f)aesni_encrypt); | ||
316 | gctx->ctr = (ctr128_f)aesni_ctr32_encrypt_blocks; | ||
317 | /* If we have an iv can set it directly, otherwise use | ||
318 | * saved IV. | ||
319 | */ | ||
320 | if (iv == NULL && gctx->iv_set) | ||
321 | iv = gctx->iv; | ||
322 | if (iv) | ||
323 | { | ||
324 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | ||
325 | gctx->iv_set = 1; | ||
326 | } | ||
327 | gctx->key_set = 1; | ||
328 | } | ||
329 | else | ||
330 | { | ||
331 | /* If key set use IV, otherwise copy */ | ||
332 | if (gctx->key_set) | ||
333 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | ||
334 | else | ||
335 | memcpy(gctx->iv, iv, gctx->ivlen); | ||
336 | gctx->iv_set = 1; | ||
337 | gctx->iv_gen = 0; | ||
338 | } | ||
339 | return 1; | ||
340 | } | ||
341 | |||
342 | #define aesni_gcm_cipher aes_gcm_cipher | ||
343 | static int aesni_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
344 | const unsigned char *in, size_t len); | ||
345 | |||
346 | static int aesni_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
347 | const unsigned char *iv, int enc) | ||
348 | { | ||
349 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; | ||
350 | if (!iv && !key) | ||
351 | return 1; | ||
352 | |||
353 | if (key) | ||
354 | { | ||
355 | /* key_len is two AES keys */ | ||
356 | if (enc) | ||
357 | { | ||
358 | aesni_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
359 | xctx->xts.block1 = (block128_f)aesni_encrypt; | ||
360 | xctx->stream = aesni_xts_encrypt; | ||
361 | } | ||
362 | else | ||
363 | { | ||
364 | aesni_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
365 | xctx->xts.block1 = (block128_f)aesni_decrypt; | ||
366 | xctx->stream = aesni_xts_decrypt; | ||
367 | } | ||
368 | |||
369 | aesni_set_encrypt_key(key + ctx->key_len/2, | ||
370 | ctx->key_len * 4, &xctx->ks2); | ||
371 | xctx->xts.block2 = (block128_f)aesni_encrypt; | ||
372 | |||
373 | xctx->xts.key1 = &xctx->ks1; | ||
374 | } | ||
375 | |||
376 | if (iv) | ||
377 | { | ||
378 | xctx->xts.key2 = &xctx->ks2; | ||
379 | memcpy(ctx->iv, iv, 16); | ||
380 | } | ||
381 | |||
382 | return 1; | ||
383 | } | ||
384 | |||
385 | #define aesni_xts_cipher aes_xts_cipher | ||
386 | static int aesni_xts_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
387 | const unsigned char *in, size_t len); | ||
388 | |||
389 | static int aesni_ccm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
390 | const unsigned char *iv, int enc) | ||
391 | { | ||
392 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; | ||
393 | if (!iv && !key) | ||
394 | return 1; | ||
395 | if (key) | ||
396 | { | ||
397 | aesni_set_encrypt_key(key, ctx->key_len * 8, &cctx->ks); | ||
398 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, | ||
399 | &cctx->ks, (block128_f)aesni_encrypt); | ||
400 | cctx->str = enc?(ccm128_f)aesni_ccm64_encrypt_blocks : | ||
401 | (ccm128_f)aesni_ccm64_decrypt_blocks; | ||
402 | cctx->key_set = 1; | ||
403 | } | ||
404 | if (iv) | ||
405 | { | ||
406 | memcpy(ctx->iv, iv, 15 - cctx->L); | ||
407 | cctx->iv_set = 1; | ||
408 | } | ||
409 | return 1; | ||
410 | } | ||
411 | |||
412 | #define aesni_ccm_cipher aes_ccm_cipher | ||
413 | static int aesni_ccm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
414 | const unsigned char *in, size_t len); | ||
415 | |||
416 | #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ | ||
417 | static const EVP_CIPHER aesni_##keylen##_##mode = { \ | ||
418 | nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ | ||
419 | flags|EVP_CIPH_##MODE##_MODE, \ | ||
420 | aesni_init_key, \ | ||
421 | aesni_##mode##_cipher, \ | ||
422 | NULL, \ | ||
423 | sizeof(EVP_AES_KEY), \ | ||
424 | NULL,NULL,NULL,NULL }; \ | ||
425 | static const EVP_CIPHER aes_##keylen##_##mode = { \ | ||
426 | nid##_##keylen##_##nmode,blocksize, \ | ||
427 | keylen/8,ivlen, \ | ||
428 | flags|EVP_CIPH_##MODE##_MODE, \ | ||
429 | aes_init_key, \ | ||
430 | aes_##mode##_cipher, \ | ||
431 | NULL, \ | ||
432 | sizeof(EVP_AES_KEY), \ | ||
433 | NULL,NULL,NULL,NULL }; \ | ||
434 | const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \ | ||
435 | { return AESNI_CAPABLE?&aesni_##keylen##_##mode:&aes_##keylen##_##mode; } | ||
436 | |||
437 | #define BLOCK_CIPHER_custom(nid,keylen,blocksize,ivlen,mode,MODE,flags) \ | ||
438 | static const EVP_CIPHER aesni_##keylen##_##mode = { \ | ||
439 | nid##_##keylen##_##mode,blocksize, \ | ||
440 | (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ | ||
441 | flags|EVP_CIPH_##MODE##_MODE, \ | ||
442 | aesni_##mode##_init_key, \ | ||
443 | aesni_##mode##_cipher, \ | ||
444 | aes_##mode##_cleanup, \ | ||
445 | sizeof(EVP_AES_##MODE##_CTX), \ | ||
446 | NULL,NULL,aes_##mode##_ctrl,NULL }; \ | ||
447 | static const EVP_CIPHER aes_##keylen##_##mode = { \ | ||
448 | nid##_##keylen##_##mode,blocksize, \ | ||
449 | (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ | ||
450 | flags|EVP_CIPH_##MODE##_MODE, \ | ||
451 | aes_##mode##_init_key, \ | ||
452 | aes_##mode##_cipher, \ | ||
453 | aes_##mode##_cleanup, \ | ||
454 | sizeof(EVP_AES_##MODE##_CTX), \ | ||
455 | NULL,NULL,aes_##mode##_ctrl,NULL }; \ | ||
456 | const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \ | ||
457 | { return AESNI_CAPABLE?&aesni_##keylen##_##mode:&aes_##keylen##_##mode; } | ||
458 | |||
459 | #else | ||
460 | |||
461 | #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ | ||
462 | static const EVP_CIPHER aes_##keylen##_##mode = { \ | ||
463 | nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ | ||
464 | flags|EVP_CIPH_##MODE##_MODE, \ | ||
465 | aes_init_key, \ | ||
466 | aes_##mode##_cipher, \ | ||
467 | NULL, \ | ||
468 | sizeof(EVP_AES_KEY), \ | ||
469 | NULL,NULL,NULL,NULL }; \ | ||
470 | const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \ | ||
471 | { return &aes_##keylen##_##mode; } | ||
472 | |||
473 | #define BLOCK_CIPHER_custom(nid,keylen,blocksize,ivlen,mode,MODE,flags) \ | ||
474 | static const EVP_CIPHER aes_##keylen##_##mode = { \ | ||
475 | nid##_##keylen##_##mode,blocksize, \ | ||
476 | (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ | ||
477 | flags|EVP_CIPH_##MODE##_MODE, \ | ||
478 | aes_##mode##_init_key, \ | ||
479 | aes_##mode##_cipher, \ | ||
480 | aes_##mode##_cleanup, \ | ||
481 | sizeof(EVP_AES_##MODE##_CTX), \ | ||
482 | NULL,NULL,aes_##mode##_ctrl,NULL }; \ | ||
483 | const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \ | ||
484 | { return &aes_##keylen##_##mode; } | ||
485 | #endif | ||
486 | |||
487 | #define BLOCK_CIPHER_generic_pack(nid,keylen,flags) \ | ||
488 | BLOCK_CIPHER_generic(nid,keylen,16,16,cbc,cbc,CBC,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ | ||
489 | BLOCK_CIPHER_generic(nid,keylen,16,0,ecb,ecb,ECB,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ | ||
490 | BLOCK_CIPHER_generic(nid,keylen,1,16,ofb128,ofb,OFB,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ | ||
491 | BLOCK_CIPHER_generic(nid,keylen,1,16,cfb128,cfb,CFB,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ | ||
492 | BLOCK_CIPHER_generic(nid,keylen,1,16,cfb1,cfb1,CFB,flags) \ | ||
493 | BLOCK_CIPHER_generic(nid,keylen,1,16,cfb8,cfb8,CFB,flags) \ | ||
494 | BLOCK_CIPHER_generic(nid,keylen,1,16,ctr,ctr,CTR,flags) | ||
98 | 495 | ||
99 | static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 496 | static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
100 | const unsigned char *iv, int enc) | 497 | const unsigned char *iv, int enc) |
101 | { | 498 | { |
102 | int ret; | 499 | int ret, mode; |
500 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
103 | 501 | ||
104 | if ((ctx->cipher->flags & EVP_CIPH_MODE) == EVP_CIPH_CFB_MODE | 502 | mode = ctx->cipher->flags & EVP_CIPH_MODE; |
105 | || (ctx->cipher->flags & EVP_CIPH_MODE) == EVP_CIPH_OFB_MODE | 503 | if ((mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE) |
106 | || enc) | 504 | && !enc) |
107 | ret=AES_set_encrypt_key(key, ctx->key_len * 8, ctx->cipher_data); | 505 | #ifdef BSAES_CAPABLE |
506 | if (BSAES_CAPABLE && mode==EVP_CIPH_CBC_MODE) | ||
507 | { | ||
508 | ret = AES_set_decrypt_key(key,ctx->key_len*8,&dat->ks); | ||
509 | dat->block = (block128_f)AES_decrypt; | ||
510 | dat->stream.cbc = (cbc128_f)bsaes_cbc_encrypt; | ||
511 | } | ||
512 | else | ||
513 | #endif | ||
514 | #ifdef VPAES_CAPABLE | ||
515 | if (VPAES_CAPABLE) | ||
516 | { | ||
517 | ret = vpaes_set_decrypt_key(key,ctx->key_len*8,&dat->ks); | ||
518 | dat->block = (block128_f)vpaes_decrypt; | ||
519 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | ||
520 | (cbc128_f)vpaes_cbc_encrypt : | ||
521 | NULL; | ||
522 | } | ||
523 | else | ||
524 | #endif | ||
525 | { | ||
526 | ret = AES_set_decrypt_key(key,ctx->key_len*8,&dat->ks); | ||
527 | dat->block = (block128_f)AES_decrypt; | ||
528 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | ||
529 | (cbc128_f)AES_cbc_encrypt : | ||
530 | NULL; | ||
531 | } | ||
108 | else | 532 | else |
109 | ret=AES_set_decrypt_key(key, ctx->key_len * 8, ctx->cipher_data); | 533 | #ifdef BSAES_CAPABLE |
534 | if (BSAES_CAPABLE && mode==EVP_CIPH_CTR_MODE) | ||
535 | { | ||
536 | ret = AES_set_encrypt_key(key,ctx->key_len*8,&dat->ks); | ||
537 | dat->block = (block128_f)AES_encrypt; | ||
538 | dat->stream.ctr = (ctr128_f)bsaes_ctr32_encrypt_blocks; | ||
539 | } | ||
540 | else | ||
541 | #endif | ||
542 | #ifdef VPAES_CAPABLE | ||
543 | if (VPAES_CAPABLE) | ||
544 | { | ||
545 | ret = vpaes_set_encrypt_key(key,ctx->key_len*8,&dat->ks); | ||
546 | dat->block = (block128_f)vpaes_encrypt; | ||
547 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | ||
548 | (cbc128_f)vpaes_cbc_encrypt : | ||
549 | NULL; | ||
550 | } | ||
551 | else | ||
552 | #endif | ||
553 | { | ||
554 | ret = AES_set_encrypt_key(key,ctx->key_len*8,&dat->ks); | ||
555 | dat->block = (block128_f)AES_encrypt; | ||
556 | dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? | ||
557 | (cbc128_f)AES_cbc_encrypt : | ||
558 | NULL; | ||
559 | #ifdef AES_CTR_ASM | ||
560 | if (mode==EVP_CIPH_CTR_MODE) | ||
561 | dat->stream.ctr = (ctr128_f)AES_ctr32_encrypt; | ||
562 | #endif | ||
563 | } | ||
110 | 564 | ||
111 | if(ret < 0) | 565 | if(ret < 0) |
112 | { | 566 | { |
@@ -117,4 +571,743 @@ static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | |||
117 | return 1; | 571 | return 1; |
118 | } | 572 | } |
119 | 573 | ||
574 | static int aes_cbc_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
575 | const unsigned char *in, size_t len) | ||
576 | { | ||
577 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
578 | |||
579 | if (dat->stream.cbc) | ||
580 | (*dat->stream.cbc)(in,out,len,&dat->ks,ctx->iv,ctx->encrypt); | ||
581 | else if (ctx->encrypt) | ||
582 | CRYPTO_cbc128_encrypt(in,out,len,&dat->ks,ctx->iv,dat->block); | ||
583 | else | ||
584 | CRYPTO_cbc128_encrypt(in,out,len,&dat->ks,ctx->iv,dat->block); | ||
585 | |||
586 | return 1; | ||
587 | } | ||
588 | |||
589 | static int aes_ecb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
590 | const unsigned char *in, size_t len) | ||
591 | { | ||
592 | size_t bl = ctx->cipher->block_size; | ||
593 | size_t i; | ||
594 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
595 | |||
596 | if (len<bl) return 1; | ||
597 | |||
598 | for (i=0,len-=bl;i<=len;i+=bl) | ||
599 | (*dat->block)(in+i,out+i,&dat->ks); | ||
600 | |||
601 | return 1; | ||
602 | } | ||
603 | |||
604 | static int aes_ofb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
605 | const unsigned char *in,size_t len) | ||
606 | { | ||
607 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
608 | |||
609 | CRYPTO_ofb128_encrypt(in,out,len,&dat->ks, | ||
610 | ctx->iv,&ctx->num,dat->block); | ||
611 | return 1; | ||
612 | } | ||
613 | |||
614 | static int aes_cfb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
615 | const unsigned char *in,size_t len) | ||
616 | { | ||
617 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
618 | |||
619 | CRYPTO_cfb128_encrypt(in,out,len,&dat->ks, | ||
620 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | ||
621 | return 1; | ||
622 | } | ||
623 | |||
624 | static int aes_cfb8_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
625 | const unsigned char *in,size_t len) | ||
626 | { | ||
627 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
628 | |||
629 | CRYPTO_cfb128_8_encrypt(in,out,len,&dat->ks, | ||
630 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | ||
631 | return 1; | ||
632 | } | ||
633 | |||
634 | static int aes_cfb1_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, | ||
635 | const unsigned char *in,size_t len) | ||
636 | { | ||
637 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
638 | |||
639 | if (ctx->flags&EVP_CIPH_FLAG_LENGTH_BITS) { | ||
640 | CRYPTO_cfb128_1_encrypt(in,out,len,&dat->ks, | ||
641 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | ||
642 | return 1; | ||
643 | } | ||
644 | |||
645 | while (len>=MAXBITCHUNK) { | ||
646 | CRYPTO_cfb128_1_encrypt(in,out,MAXBITCHUNK*8,&dat->ks, | ||
647 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | ||
648 | len-=MAXBITCHUNK; | ||
649 | } | ||
650 | if (len) | ||
651 | CRYPTO_cfb128_1_encrypt(in,out,len*8,&dat->ks, | ||
652 | ctx->iv,&ctx->num,ctx->encrypt,dat->block); | ||
653 | |||
654 | return 1; | ||
655 | } | ||
656 | |||
657 | static int aes_ctr_cipher (EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
658 | const unsigned char *in, size_t len) | ||
659 | { | ||
660 | unsigned int num = ctx->num; | ||
661 | EVP_AES_KEY *dat = (EVP_AES_KEY *)ctx->cipher_data; | ||
662 | |||
663 | if (dat->stream.ctr) | ||
664 | CRYPTO_ctr128_encrypt_ctr32(in,out,len,&dat->ks, | ||
665 | ctx->iv,ctx->buf,&num,dat->stream.ctr); | ||
666 | else | ||
667 | CRYPTO_ctr128_encrypt(in,out,len,&dat->ks, | ||
668 | ctx->iv,ctx->buf,&num,dat->block); | ||
669 | ctx->num = (size_t)num; | ||
670 | return 1; | ||
671 | } | ||
672 | |||
673 | BLOCK_CIPHER_generic_pack(NID_aes,128,EVP_CIPH_FLAG_FIPS) | ||
674 | BLOCK_CIPHER_generic_pack(NID_aes,192,EVP_CIPH_FLAG_FIPS) | ||
675 | BLOCK_CIPHER_generic_pack(NID_aes,256,EVP_CIPH_FLAG_FIPS) | ||
676 | |||
677 | static int aes_gcm_cleanup(EVP_CIPHER_CTX *c) | ||
678 | { | ||
679 | EVP_AES_GCM_CTX *gctx = c->cipher_data; | ||
680 | OPENSSL_cleanse(&gctx->gcm, sizeof(gctx->gcm)); | ||
681 | if (gctx->iv != c->iv) | ||
682 | OPENSSL_free(gctx->iv); | ||
683 | return 1; | ||
684 | } | ||
685 | |||
686 | /* increment counter (64-bit int) by 1 */ | ||
687 | static void ctr64_inc(unsigned char *counter) { | ||
688 | int n=8; | ||
689 | unsigned char c; | ||
690 | |||
691 | do { | ||
692 | --n; | ||
693 | c = counter[n]; | ||
694 | ++c; | ||
695 | counter[n] = c; | ||
696 | if (c) return; | ||
697 | } while (n); | ||
698 | } | ||
699 | |||
700 | static int aes_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | ||
701 | { | ||
702 | EVP_AES_GCM_CTX *gctx = c->cipher_data; | ||
703 | switch (type) | ||
704 | { | ||
705 | case EVP_CTRL_INIT: | ||
706 | gctx->key_set = 0; | ||
707 | gctx->iv_set = 0; | ||
708 | gctx->ivlen = c->cipher->iv_len; | ||
709 | gctx->iv = c->iv; | ||
710 | gctx->taglen = -1; | ||
711 | gctx->iv_gen = 0; | ||
712 | gctx->tls_aad_len = -1; | ||
713 | return 1; | ||
714 | |||
715 | case EVP_CTRL_GCM_SET_IVLEN: | ||
716 | if (arg <= 0) | ||
717 | return 0; | ||
718 | #ifdef OPENSSL_FIPS | ||
719 | if (FIPS_module_mode() && !(c->flags & EVP_CIPH_FLAG_NON_FIPS_ALLOW) | ||
720 | && arg < 12) | ||
721 | return 0; | ||
722 | #endif | ||
723 | /* Allocate memory for IV if needed */ | ||
724 | if ((arg > EVP_MAX_IV_LENGTH) && (arg > gctx->ivlen)) | ||
725 | { | ||
726 | if (gctx->iv != c->iv) | ||
727 | OPENSSL_free(gctx->iv); | ||
728 | gctx->iv = OPENSSL_malloc(arg); | ||
729 | if (!gctx->iv) | ||
730 | return 0; | ||
731 | } | ||
732 | gctx->ivlen = arg; | ||
733 | return 1; | ||
734 | |||
735 | case EVP_CTRL_GCM_SET_TAG: | ||
736 | if (arg <= 0 || arg > 16 || c->encrypt) | ||
737 | return 0; | ||
738 | memcpy(c->buf, ptr, arg); | ||
739 | gctx->taglen = arg; | ||
740 | return 1; | ||
741 | |||
742 | case EVP_CTRL_GCM_GET_TAG: | ||
743 | if (arg <= 0 || arg > 16 || !c->encrypt || gctx->taglen < 0) | ||
744 | return 0; | ||
745 | memcpy(ptr, c->buf, arg); | ||
746 | return 1; | ||
747 | |||
748 | case EVP_CTRL_GCM_SET_IV_FIXED: | ||
749 | /* Special case: -1 length restores whole IV */ | ||
750 | if (arg == -1) | ||
751 | { | ||
752 | memcpy(gctx->iv, ptr, gctx->ivlen); | ||
753 | gctx->iv_gen = 1; | ||
754 | return 1; | ||
755 | } | ||
756 | /* Fixed field must be at least 4 bytes and invocation field | ||
757 | * at least 8. | ||
758 | */ | ||
759 | if ((arg < 4) || (gctx->ivlen - arg) < 8) | ||
760 | return 0; | ||
761 | if (arg) | ||
762 | memcpy(gctx->iv, ptr, arg); | ||
763 | if (c->encrypt && | ||
764 | RAND_bytes(gctx->iv + arg, gctx->ivlen - arg) <= 0) | ||
765 | return 0; | ||
766 | gctx->iv_gen = 1; | ||
767 | return 1; | ||
768 | |||
769 | case EVP_CTRL_GCM_IV_GEN: | ||
770 | if (gctx->iv_gen == 0 || gctx->key_set == 0) | ||
771 | return 0; | ||
772 | CRYPTO_gcm128_setiv(&gctx->gcm, gctx->iv, gctx->ivlen); | ||
773 | if (arg <= 0 || arg > gctx->ivlen) | ||
774 | arg = gctx->ivlen; | ||
775 | memcpy(ptr, gctx->iv + gctx->ivlen - arg, arg); | ||
776 | /* Invocation field will be at least 8 bytes in size and | ||
777 | * so no need to check wrap around or increment more than | ||
778 | * last 8 bytes. | ||
779 | */ | ||
780 | ctr64_inc(gctx->iv + gctx->ivlen - 8); | ||
781 | gctx->iv_set = 1; | ||
782 | return 1; | ||
783 | |||
784 | case EVP_CTRL_GCM_SET_IV_INV: | ||
785 | if (gctx->iv_gen == 0 || gctx->key_set == 0 || c->encrypt) | ||
786 | return 0; | ||
787 | memcpy(gctx->iv + gctx->ivlen - arg, ptr, arg); | ||
788 | CRYPTO_gcm128_setiv(&gctx->gcm, gctx->iv, gctx->ivlen); | ||
789 | gctx->iv_set = 1; | ||
790 | return 1; | ||
791 | |||
792 | case EVP_CTRL_AEAD_TLS1_AAD: | ||
793 | /* Save the AAD for later use */ | ||
794 | if (arg != 13) | ||
795 | return 0; | ||
796 | memcpy(c->buf, ptr, arg); | ||
797 | gctx->tls_aad_len = arg; | ||
798 | { | ||
799 | unsigned int len=c->buf[arg-2]<<8|c->buf[arg-1]; | ||
800 | /* Correct length for explicit IV */ | ||
801 | len -= EVP_GCM_TLS_EXPLICIT_IV_LEN; | ||
802 | /* If decrypting correct for tag too */ | ||
803 | if (!c->encrypt) | ||
804 | len -= EVP_GCM_TLS_TAG_LEN; | ||
805 | c->buf[arg-2] = len>>8; | ||
806 | c->buf[arg-1] = len & 0xff; | ||
807 | } | ||
808 | /* Extra padding: tag appended to record */ | ||
809 | return EVP_GCM_TLS_TAG_LEN; | ||
810 | |||
811 | default: | ||
812 | return -1; | ||
813 | |||
814 | } | ||
815 | } | ||
816 | |||
817 | static int aes_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
818 | const unsigned char *iv, int enc) | ||
819 | { | ||
820 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | ||
821 | if (!iv && !key) | ||
822 | return 1; | ||
823 | if (key) | ||
824 | { do { | ||
825 | #ifdef BSAES_CAPABLE | ||
826 | if (BSAES_CAPABLE) | ||
827 | { | ||
828 | AES_set_encrypt_key(key,ctx->key_len*8,&gctx->ks); | ||
829 | CRYPTO_gcm128_init(&gctx->gcm,&gctx->ks, | ||
830 | (block128_f)AES_encrypt); | ||
831 | gctx->ctr = (ctr128_f)bsaes_ctr32_encrypt_blocks; | ||
832 | break; | ||
833 | } | ||
834 | else | ||
835 | #endif | ||
836 | #ifdef VPAES_CAPABLE | ||
837 | if (VPAES_CAPABLE) | ||
838 | { | ||
839 | vpaes_set_encrypt_key(key,ctx->key_len*8,&gctx->ks); | ||
840 | CRYPTO_gcm128_init(&gctx->gcm,&gctx->ks, | ||
841 | (block128_f)vpaes_encrypt); | ||
842 | gctx->ctr = NULL; | ||
843 | break; | ||
844 | } | ||
845 | #endif | ||
846 | AES_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks); | ||
847 | CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, (block128_f)AES_encrypt); | ||
848 | #ifdef AES_CTR_ASM | ||
849 | gctx->ctr = (ctr128_f)AES_ctr32_encrypt; | ||
850 | #else | ||
851 | gctx->ctr = NULL; | ||
852 | #endif | ||
853 | } while (0); | ||
854 | |||
855 | /* If we have an iv can set it directly, otherwise use | ||
856 | * saved IV. | ||
857 | */ | ||
858 | if (iv == NULL && gctx->iv_set) | ||
859 | iv = gctx->iv; | ||
860 | if (iv) | ||
861 | { | ||
862 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | ||
863 | gctx->iv_set = 1; | ||
864 | } | ||
865 | gctx->key_set = 1; | ||
866 | } | ||
867 | else | ||
868 | { | ||
869 | /* If key set use IV, otherwise copy */ | ||
870 | if (gctx->key_set) | ||
871 | CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); | ||
872 | else | ||
873 | memcpy(gctx->iv, iv, gctx->ivlen); | ||
874 | gctx->iv_set = 1; | ||
875 | gctx->iv_gen = 0; | ||
876 | } | ||
877 | return 1; | ||
878 | } | ||
879 | |||
880 | /* Handle TLS GCM packet format. This consists of the last portion of the IV | ||
881 | * followed by the payload and finally the tag. On encrypt generate IV, | ||
882 | * encrypt payload and write the tag. On verify retrieve IV, decrypt payload | ||
883 | * and verify tag. | ||
884 | */ | ||
885 | |||
886 | static int aes_gcm_tls_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
887 | const unsigned char *in, size_t len) | ||
888 | { | ||
889 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | ||
890 | int rv = -1; | ||
891 | /* Encrypt/decrypt must be performed in place */ | ||
892 | if (out != in || len < (EVP_GCM_TLS_EXPLICIT_IV_LEN+EVP_GCM_TLS_TAG_LEN)) | ||
893 | return -1; | ||
894 | /* Set IV from start of buffer or generate IV and write to start | ||
895 | * of buffer. | ||
896 | */ | ||
897 | if (EVP_CIPHER_CTX_ctrl(ctx, ctx->encrypt ? | ||
898 | EVP_CTRL_GCM_IV_GEN : EVP_CTRL_GCM_SET_IV_INV, | ||
899 | EVP_GCM_TLS_EXPLICIT_IV_LEN, out) <= 0) | ||
900 | goto err; | ||
901 | /* Use saved AAD */ | ||
902 | if (CRYPTO_gcm128_aad(&gctx->gcm, ctx->buf, gctx->tls_aad_len)) | ||
903 | goto err; | ||
904 | /* Fix buffer and length to point to payload */ | ||
905 | in += EVP_GCM_TLS_EXPLICIT_IV_LEN; | ||
906 | out += EVP_GCM_TLS_EXPLICIT_IV_LEN; | ||
907 | len -= EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN; | ||
908 | if (ctx->encrypt) | ||
909 | { | ||
910 | /* Encrypt payload */ | ||
911 | if (gctx->ctr) | ||
912 | { | ||
913 | if (CRYPTO_gcm128_encrypt_ctr32(&gctx->gcm, | ||
914 | in, out, len, | ||
915 | gctx->ctr)) | ||
916 | goto err; | ||
917 | } | ||
918 | else { | ||
919 | if (CRYPTO_gcm128_encrypt(&gctx->gcm, in, out, len)) | ||
920 | goto err; | ||
921 | } | ||
922 | out += len; | ||
923 | /* Finally write tag */ | ||
924 | CRYPTO_gcm128_tag(&gctx->gcm, out, EVP_GCM_TLS_TAG_LEN); | ||
925 | rv = len + EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN; | ||
926 | } | ||
927 | else | ||
928 | { | ||
929 | /* Decrypt */ | ||
930 | if (gctx->ctr) | ||
931 | { | ||
932 | if (CRYPTO_gcm128_decrypt_ctr32(&gctx->gcm, | ||
933 | in, out, len, | ||
934 | gctx->ctr)) | ||
935 | goto err; | ||
936 | } | ||
937 | else { | ||
938 | if (CRYPTO_gcm128_decrypt(&gctx->gcm, in, out, len)) | ||
939 | goto err; | ||
940 | } | ||
941 | /* Retrieve tag */ | ||
942 | CRYPTO_gcm128_tag(&gctx->gcm, ctx->buf, | ||
943 | EVP_GCM_TLS_TAG_LEN); | ||
944 | /* If tag mismatch wipe buffer */ | ||
945 | if (memcmp(ctx->buf, in + len, EVP_GCM_TLS_TAG_LEN)) | ||
946 | { | ||
947 | OPENSSL_cleanse(out, len); | ||
948 | goto err; | ||
949 | } | ||
950 | rv = len; | ||
951 | } | ||
952 | |||
953 | err: | ||
954 | gctx->iv_set = 0; | ||
955 | gctx->tls_aad_len = -1; | ||
956 | return rv; | ||
957 | } | ||
958 | |||
959 | static int aes_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
960 | const unsigned char *in, size_t len) | ||
961 | { | ||
962 | EVP_AES_GCM_CTX *gctx = ctx->cipher_data; | ||
963 | /* If not set up, return error */ | ||
964 | if (!gctx->key_set) | ||
965 | return -1; | ||
966 | |||
967 | if (gctx->tls_aad_len >= 0) | ||
968 | return aes_gcm_tls_cipher(ctx, out, in, len); | ||
969 | |||
970 | if (!gctx->iv_set) | ||
971 | return -1; | ||
972 | if (!ctx->encrypt && gctx->taglen < 0) | ||
973 | return -1; | ||
974 | if (in) | ||
975 | { | ||
976 | if (out == NULL) | ||
977 | { | ||
978 | if (CRYPTO_gcm128_aad(&gctx->gcm, in, len)) | ||
979 | return -1; | ||
980 | } | ||
981 | else if (ctx->encrypt) | ||
982 | { | ||
983 | if (gctx->ctr) | ||
984 | { | ||
985 | if (CRYPTO_gcm128_encrypt_ctr32(&gctx->gcm, | ||
986 | in, out, len, | ||
987 | gctx->ctr)) | ||
988 | return -1; | ||
989 | } | ||
990 | else { | ||
991 | if (CRYPTO_gcm128_encrypt(&gctx->gcm, in, out, len)) | ||
992 | return -1; | ||
993 | } | ||
994 | } | ||
995 | else | ||
996 | { | ||
997 | if (gctx->ctr) | ||
998 | { | ||
999 | if (CRYPTO_gcm128_decrypt_ctr32(&gctx->gcm, | ||
1000 | in, out, len, | ||
1001 | gctx->ctr)) | ||
1002 | return -1; | ||
1003 | } | ||
1004 | else { | ||
1005 | if (CRYPTO_gcm128_decrypt(&gctx->gcm, in, out, len)) | ||
1006 | return -1; | ||
1007 | } | ||
1008 | } | ||
1009 | return len; | ||
1010 | } | ||
1011 | else | ||
1012 | { | ||
1013 | if (!ctx->encrypt) | ||
1014 | { | ||
1015 | if (CRYPTO_gcm128_finish(&gctx->gcm, | ||
1016 | ctx->buf, gctx->taglen) != 0) | ||
1017 | return -1; | ||
1018 | gctx->iv_set = 0; | ||
1019 | return 0; | ||
1020 | } | ||
1021 | CRYPTO_gcm128_tag(&gctx->gcm, ctx->buf, 16); | ||
1022 | gctx->taglen = 16; | ||
1023 | /* Don't reuse the IV */ | ||
1024 | gctx->iv_set = 0; | ||
1025 | return 0; | ||
1026 | } | ||
1027 | |||
1028 | } | ||
1029 | |||
1030 | #define CUSTOM_FLAGS (EVP_CIPH_FLAG_DEFAULT_ASN1 \ | ||
1031 | | EVP_CIPH_CUSTOM_IV | EVP_CIPH_FLAG_CUSTOM_CIPHER \ | ||
1032 | | EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT) | ||
1033 | |||
1034 | BLOCK_CIPHER_custom(NID_aes,128,1,12,gcm,GCM, | ||
1035 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) | ||
1036 | BLOCK_CIPHER_custom(NID_aes,192,1,12,gcm,GCM, | ||
1037 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) | ||
1038 | BLOCK_CIPHER_custom(NID_aes,256,1,12,gcm,GCM, | ||
1039 | EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_AEAD_CIPHER|CUSTOM_FLAGS) | ||
1040 | |||
1041 | static int aes_xts_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | ||
1042 | { | ||
1043 | EVP_AES_XTS_CTX *xctx = c->cipher_data; | ||
1044 | if (type != EVP_CTRL_INIT) | ||
1045 | return -1; | ||
1046 | /* key1 and key2 are used as an indicator both key and IV are set */ | ||
1047 | xctx->xts.key1 = NULL; | ||
1048 | xctx->xts.key2 = NULL; | ||
1049 | return 1; | ||
1050 | } | ||
1051 | |||
1052 | static int aes_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
1053 | const unsigned char *iv, int enc) | ||
1054 | { | ||
1055 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; | ||
1056 | if (!iv && !key) | ||
1057 | return 1; | ||
1058 | |||
1059 | if (key) do | ||
1060 | { | ||
1061 | #ifdef AES_XTS_ASM | ||
1062 | xctx->stream = enc ? AES_xts_encrypt : AES_xts_decrypt; | ||
1063 | #else | ||
1064 | xctx->stream = NULL; | ||
1065 | #endif | ||
1066 | /* key_len is two AES keys */ | ||
1067 | #ifdef BSAES_CAPABLE | ||
1068 | if (BSAES_CAPABLE) | ||
1069 | xctx->stream = enc ? bsaes_xts_encrypt : bsaes_xts_decrypt; | ||
1070 | else | ||
1071 | #endif | ||
1072 | #ifdef VPAES_CAPABLE | ||
1073 | if (VPAES_CAPABLE) | ||
1074 | { | ||
1075 | if (enc) | ||
1076 | { | ||
1077 | vpaes_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
1078 | xctx->xts.block1 = (block128_f)vpaes_encrypt; | ||
1079 | } | ||
1080 | else | ||
1081 | { | ||
1082 | vpaes_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
1083 | xctx->xts.block1 = (block128_f)vpaes_decrypt; | ||
1084 | } | ||
1085 | |||
1086 | vpaes_set_encrypt_key(key + ctx->key_len/2, | ||
1087 | ctx->key_len * 4, &xctx->ks2); | ||
1088 | xctx->xts.block2 = (block128_f)vpaes_encrypt; | ||
1089 | |||
1090 | xctx->xts.key1 = &xctx->ks1; | ||
1091 | break; | ||
1092 | } | ||
1093 | #endif | ||
1094 | if (enc) | ||
1095 | { | ||
1096 | AES_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
1097 | xctx->xts.block1 = (block128_f)AES_encrypt; | ||
1098 | } | ||
1099 | else | ||
1100 | { | ||
1101 | AES_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1); | ||
1102 | xctx->xts.block1 = (block128_f)AES_decrypt; | ||
1103 | } | ||
1104 | |||
1105 | AES_set_encrypt_key(key + ctx->key_len/2, | ||
1106 | ctx->key_len * 4, &xctx->ks2); | ||
1107 | xctx->xts.block2 = (block128_f)AES_encrypt; | ||
1108 | |||
1109 | xctx->xts.key1 = &xctx->ks1; | ||
1110 | } while (0); | ||
1111 | |||
1112 | if (iv) | ||
1113 | { | ||
1114 | xctx->xts.key2 = &xctx->ks2; | ||
1115 | memcpy(ctx->iv, iv, 16); | ||
1116 | } | ||
1117 | |||
1118 | return 1; | ||
1119 | } | ||
1120 | |||
1121 | static int aes_xts_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
1122 | const unsigned char *in, size_t len) | ||
1123 | { | ||
1124 | EVP_AES_XTS_CTX *xctx = ctx->cipher_data; | ||
1125 | if (!xctx->xts.key1 || !xctx->xts.key2) | ||
1126 | return 0; | ||
1127 | if (!out || !in || len<AES_BLOCK_SIZE) | ||
1128 | return 0; | ||
1129 | #ifdef OPENSSL_FIPS | ||
1130 | /* Requirement of SP800-38E */ | ||
1131 | if (FIPS_module_mode() && !(ctx->flags & EVP_CIPH_FLAG_NON_FIPS_ALLOW) && | ||
1132 | (len > (1UL<<20)*16)) | ||
1133 | { | ||
1134 | EVPerr(EVP_F_AES_XTS_CIPHER, EVP_R_TOO_LARGE); | ||
1135 | return 0; | ||
1136 | } | ||
1137 | #endif | ||
1138 | if (xctx->stream) | ||
1139 | (*xctx->stream)(in, out, len, | ||
1140 | xctx->xts.key1, xctx->xts.key2, ctx->iv); | ||
1141 | else if (CRYPTO_xts128_encrypt(&xctx->xts, ctx->iv, in, out, len, | ||
1142 | ctx->encrypt)) | ||
1143 | return 0; | ||
1144 | return 1; | ||
1145 | } | ||
1146 | |||
1147 | #define aes_xts_cleanup NULL | ||
1148 | |||
1149 | #define XTS_FLAGS (EVP_CIPH_FLAG_DEFAULT_ASN1 | EVP_CIPH_CUSTOM_IV \ | ||
1150 | | EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT) | ||
1151 | |||
1152 | BLOCK_CIPHER_custom(NID_aes,128,1,16,xts,XTS,EVP_CIPH_FLAG_FIPS|XTS_FLAGS) | ||
1153 | BLOCK_CIPHER_custom(NID_aes,256,1,16,xts,XTS,EVP_CIPH_FLAG_FIPS|XTS_FLAGS) | ||
1154 | |||
1155 | static int aes_ccm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | ||
1156 | { | ||
1157 | EVP_AES_CCM_CTX *cctx = c->cipher_data; | ||
1158 | switch (type) | ||
1159 | { | ||
1160 | case EVP_CTRL_INIT: | ||
1161 | cctx->key_set = 0; | ||
1162 | cctx->iv_set = 0; | ||
1163 | cctx->L = 8; | ||
1164 | cctx->M = 12; | ||
1165 | cctx->tag_set = 0; | ||
1166 | cctx->len_set = 0; | ||
1167 | return 1; | ||
1168 | |||
1169 | case EVP_CTRL_CCM_SET_IVLEN: | ||
1170 | arg = 15 - arg; | ||
1171 | case EVP_CTRL_CCM_SET_L: | ||
1172 | if (arg < 2 || arg > 8) | ||
1173 | return 0; | ||
1174 | cctx->L = arg; | ||
1175 | return 1; | ||
1176 | |||
1177 | case EVP_CTRL_CCM_SET_TAG: | ||
1178 | if ((arg & 1) || arg < 4 || arg > 16) | ||
1179 | return 0; | ||
1180 | if ((c->encrypt && ptr) || (!c->encrypt && !ptr)) | ||
1181 | return 0; | ||
1182 | if (ptr) | ||
1183 | { | ||
1184 | cctx->tag_set = 1; | ||
1185 | memcpy(c->buf, ptr, arg); | ||
1186 | } | ||
1187 | cctx->M = arg; | ||
1188 | return 1; | ||
1189 | |||
1190 | case EVP_CTRL_CCM_GET_TAG: | ||
1191 | if (!c->encrypt || !cctx->tag_set) | ||
1192 | return 0; | ||
1193 | if(!CRYPTO_ccm128_tag(&cctx->ccm, ptr, (size_t)arg)) | ||
1194 | return 0; | ||
1195 | cctx->tag_set = 0; | ||
1196 | cctx->iv_set = 0; | ||
1197 | cctx->len_set = 0; | ||
1198 | return 1; | ||
1199 | |||
1200 | default: | ||
1201 | return -1; | ||
1202 | |||
1203 | } | ||
1204 | } | ||
1205 | |||
1206 | static int aes_ccm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | ||
1207 | const unsigned char *iv, int enc) | ||
1208 | { | ||
1209 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; | ||
1210 | if (!iv && !key) | ||
1211 | return 1; | ||
1212 | if (key) do | ||
1213 | { | ||
1214 | #ifdef VPAES_CAPABLE | ||
1215 | if (VPAES_CAPABLE) | ||
1216 | { | ||
1217 | vpaes_set_encrypt_key(key, ctx->key_len*8, &cctx->ks); | ||
1218 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, | ||
1219 | &cctx->ks, (block128_f)vpaes_encrypt); | ||
1220 | cctx->key_set = 1; | ||
1221 | break; | ||
1222 | } | ||
1223 | #endif | ||
1224 | AES_set_encrypt_key(key, ctx->key_len * 8, &cctx->ks); | ||
1225 | CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, | ||
1226 | &cctx->ks, (block128_f)AES_encrypt); | ||
1227 | cctx->str = NULL; | ||
1228 | cctx->key_set = 1; | ||
1229 | } while (0); | ||
1230 | if (iv) | ||
1231 | { | ||
1232 | memcpy(ctx->iv, iv, 15 - cctx->L); | ||
1233 | cctx->iv_set = 1; | ||
1234 | } | ||
1235 | return 1; | ||
1236 | } | ||
1237 | |||
1238 | static int aes_ccm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
1239 | const unsigned char *in, size_t len) | ||
1240 | { | ||
1241 | EVP_AES_CCM_CTX *cctx = ctx->cipher_data; | ||
1242 | CCM128_CONTEXT *ccm = &cctx->ccm; | ||
1243 | /* If not set up, return error */ | ||
1244 | if (!cctx->iv_set && !cctx->key_set) | ||
1245 | return -1; | ||
1246 | if (!ctx->encrypt && !cctx->tag_set) | ||
1247 | return -1; | ||
1248 | if (!out) | ||
1249 | { | ||
1250 | if (!in) | ||
1251 | { | ||
1252 | if (CRYPTO_ccm128_setiv(ccm, ctx->iv, 15 - cctx->L,len)) | ||
1253 | return -1; | ||
1254 | cctx->len_set = 1; | ||
1255 | return len; | ||
1256 | } | ||
1257 | /* If have AAD need message length */ | ||
1258 | if (!cctx->len_set && len) | ||
1259 | return -1; | ||
1260 | CRYPTO_ccm128_aad(ccm, in, len); | ||
1261 | return len; | ||
1262 | } | ||
1263 | /* EVP_*Final() doesn't return any data */ | ||
1264 | if (!in) | ||
1265 | return 0; | ||
1266 | /* If not set length yet do it */ | ||
1267 | if (!cctx->len_set) | ||
1268 | { | ||
1269 | if (CRYPTO_ccm128_setiv(ccm, ctx->iv, 15 - cctx->L, len)) | ||
1270 | return -1; | ||
1271 | cctx->len_set = 1; | ||
1272 | } | ||
1273 | if (ctx->encrypt) | ||
1274 | { | ||
1275 | if (cctx->str ? CRYPTO_ccm128_encrypt_ccm64(ccm, in, out, len, | ||
1276 | cctx->str) : | ||
1277 | CRYPTO_ccm128_encrypt(ccm, in, out, len)) | ||
1278 | return -1; | ||
1279 | cctx->tag_set = 1; | ||
1280 | return len; | ||
1281 | } | ||
1282 | else | ||
1283 | { | ||
1284 | int rv = -1; | ||
1285 | if (cctx->str ? !CRYPTO_ccm128_decrypt_ccm64(ccm, in, out, len, | ||
1286 | cctx->str) : | ||
1287 | !CRYPTO_ccm128_decrypt(ccm, in, out, len)) | ||
1288 | { | ||
1289 | unsigned char tag[16]; | ||
1290 | if (CRYPTO_ccm128_tag(ccm, tag, cctx->M)) | ||
1291 | { | ||
1292 | if (!memcmp(tag, ctx->buf, cctx->M)) | ||
1293 | rv = len; | ||
1294 | } | ||
1295 | } | ||
1296 | if (rv == -1) | ||
1297 | OPENSSL_cleanse(out, len); | ||
1298 | cctx->iv_set = 0; | ||
1299 | cctx->tag_set = 0; | ||
1300 | cctx->len_set = 0; | ||
1301 | return rv; | ||
1302 | } | ||
1303 | |||
1304 | } | ||
1305 | |||
1306 | #define aes_ccm_cleanup NULL | ||
1307 | |||
1308 | BLOCK_CIPHER_custom(NID_aes,128,1,12,ccm,CCM,EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) | ||
1309 | BLOCK_CIPHER_custom(NID_aes,192,1,12,ccm,CCM,EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) | ||
1310 | BLOCK_CIPHER_custom(NID_aes,256,1,12,ccm,CCM,EVP_CIPH_FLAG_FIPS|CUSTOM_FLAGS) | ||
1311 | |||
1312 | #endif | ||
120 | #endif | 1313 | #endif |
diff --git a/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c b/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c new file mode 100644 index 0000000000..710fb79baf --- /dev/null +++ b/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c | |||
@@ -0,0 +1,406 @@ | |||
1 | /* ==================================================================== | ||
2 | * Copyright (c) 2011 The OpenSSL Project. All rights reserved. | ||
3 | * | ||
4 | * Redistribution and use in source and binary forms, with or without | ||
5 | * modification, are permitted provided that the following conditions | ||
6 | * are met: | ||
7 | * | ||
8 | * 1. Redistributions of source code must retain the above copyright | ||
9 | * notice, this list of conditions and the following disclaimer. | ||
10 | * | ||
11 | * 2. Redistributions in binary form must reproduce the above copyright | ||
12 | * notice, this list of conditions and the following disclaimer in | ||
13 | * the documentation and/or other materials provided with the | ||
14 | * distribution. | ||
15 | * | ||
16 | * 3. All advertising materials mentioning features or use of this | ||
17 | * software must display the following acknowledgment: | ||
18 | * "This product includes software developed by the OpenSSL Project | ||
19 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
20 | * | ||
21 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
22 | * endorse or promote products derived from this software without | ||
23 | * prior written permission. For written permission, please contact | ||
24 | * licensing@OpenSSL.org. | ||
25 | * | ||
26 | * 5. Products derived from this software may not be called "OpenSSL" | ||
27 | * nor may "OpenSSL" appear in their names without prior written | ||
28 | * permission of the OpenSSL Project. | ||
29 | * | ||
30 | * 6. Redistributions of any form whatsoever must retain the following | ||
31 | * acknowledgment: | ||
32 | * "This product includes software developed by the OpenSSL Project | ||
33 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
34 | * | ||
35 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
36 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
37 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
38 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
39 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
40 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
41 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
42 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
43 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
44 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
45 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
46 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
47 | * ==================================================================== | ||
48 | */ | ||
49 | |||
50 | #include <openssl/opensslconf.h> | ||
51 | |||
52 | #include <stdio.h> | ||
53 | #include <string.h> | ||
54 | |||
55 | #if !defined(OPENSSL_NO_AES) && !defined(OPENSSL_NO_SHA1) | ||
56 | |||
57 | #include <openssl/evp.h> | ||
58 | #include <openssl/objects.h> | ||
59 | #include <openssl/aes.h> | ||
60 | #include <openssl/sha.h> | ||
61 | #include "evp_locl.h" | ||
62 | |||
63 | #ifndef EVP_CIPH_FLAG_AEAD_CIPHER | ||
64 | #define EVP_CIPH_FLAG_AEAD_CIPHER 0x200000 | ||
65 | #define EVP_CTRL_AEAD_TLS1_AAD 0x16 | ||
66 | #define EVP_CTRL_AEAD_SET_MAC_KEY 0x17 | ||
67 | #endif | ||
68 | |||
69 | #if !defined(EVP_CIPH_FLAG_DEFAULT_ASN1) | ||
70 | #define EVP_CIPH_FLAG_DEFAULT_ASN1 0 | ||
71 | #endif | ||
72 | |||
73 | #define TLS1_1_VERSION 0x0302 | ||
74 | |||
75 | typedef struct | ||
76 | { | ||
77 | AES_KEY ks; | ||
78 | SHA_CTX head,tail,md; | ||
79 | size_t payload_length; /* AAD length in decrypt case */ | ||
80 | union { | ||
81 | unsigned int tls_ver; | ||
82 | unsigned char tls_aad[16]; /* 13 used */ | ||
83 | } aux; | ||
84 | } EVP_AES_HMAC_SHA1; | ||
85 | |||
86 | #define NO_PAYLOAD_LENGTH ((size_t)-1) | ||
87 | |||
88 | #if defined(AES_ASM) && ( \ | ||
89 | defined(__x86_64) || defined(__x86_64__) || \ | ||
90 | defined(_M_AMD64) || defined(_M_X64) || \ | ||
91 | defined(__INTEL__) ) | ||
92 | |||
93 | extern unsigned int OPENSSL_ia32cap_P[2]; | ||
94 | #define AESNI_CAPABLE (1<<(57-32)) | ||
95 | |||
96 | int aesni_set_encrypt_key(const unsigned char *userKey, int bits, | ||
97 | AES_KEY *key); | ||
98 | int aesni_set_decrypt_key(const unsigned char *userKey, int bits, | ||
99 | AES_KEY *key); | ||
100 | |||
101 | void aesni_cbc_encrypt(const unsigned char *in, | ||
102 | unsigned char *out, | ||
103 | size_t length, | ||
104 | const AES_KEY *key, | ||
105 | unsigned char *ivec, int enc); | ||
106 | |||
107 | void aesni_cbc_sha1_enc (const void *inp, void *out, size_t blocks, | ||
108 | const AES_KEY *key, unsigned char iv[16], | ||
109 | SHA_CTX *ctx,const void *in0); | ||
110 | |||
111 | #define data(ctx) ((EVP_AES_HMAC_SHA1 *)(ctx)->cipher_data) | ||
112 | |||
113 | static int aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, | ||
114 | const unsigned char *inkey, | ||
115 | const unsigned char *iv, int enc) | ||
116 | { | ||
117 | EVP_AES_HMAC_SHA1 *key = data(ctx); | ||
118 | int ret; | ||
119 | |||
120 | if (enc) | ||
121 | ret=aesni_set_encrypt_key(inkey,ctx->key_len*8,&key->ks); | ||
122 | else | ||
123 | ret=aesni_set_decrypt_key(inkey,ctx->key_len*8,&key->ks); | ||
124 | |||
125 | SHA1_Init(&key->head); /* handy when benchmarking */ | ||
126 | key->tail = key->head; | ||
127 | key->md = key->head; | ||
128 | |||
129 | key->payload_length = NO_PAYLOAD_LENGTH; | ||
130 | |||
131 | return ret<0?0:1; | ||
132 | } | ||
133 | |||
134 | #define STITCHED_CALL | ||
135 | |||
136 | #if !defined(STITCHED_CALL) | ||
137 | #define aes_off 0 | ||
138 | #endif | ||
139 | |||
140 | void sha1_block_data_order (void *c,const void *p,size_t len); | ||
141 | |||
142 | static void sha1_update(SHA_CTX *c,const void *data,size_t len) | ||
143 | { const unsigned char *ptr = data; | ||
144 | size_t res; | ||
145 | |||
146 | if ((res = c->num)) { | ||
147 | res = SHA_CBLOCK-res; | ||
148 | if (len<res) res=len; | ||
149 | SHA1_Update (c,ptr,res); | ||
150 | ptr += res; | ||
151 | len -= res; | ||
152 | } | ||
153 | |||
154 | res = len % SHA_CBLOCK; | ||
155 | len -= res; | ||
156 | |||
157 | if (len) { | ||
158 | sha1_block_data_order(c,ptr,len/SHA_CBLOCK); | ||
159 | |||
160 | ptr += len; | ||
161 | c->Nh += len>>29; | ||
162 | c->Nl += len<<=3; | ||
163 | if (c->Nl<(unsigned int)len) c->Nh++; | ||
164 | } | ||
165 | |||
166 | if (res) | ||
167 | SHA1_Update(c,ptr,res); | ||
168 | } | ||
169 | |||
170 | #define SHA1_Update sha1_update | ||
171 | |||
172 | static int aesni_cbc_hmac_sha1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
173 | const unsigned char *in, size_t len) | ||
174 | { | ||
175 | EVP_AES_HMAC_SHA1 *key = data(ctx); | ||
176 | unsigned int l; | ||
177 | size_t plen = key->payload_length, | ||
178 | iv = 0, /* explicit IV in TLS 1.1 and later */ | ||
179 | sha_off = 0; | ||
180 | #if defined(STITCHED_CALL) | ||
181 | size_t aes_off = 0, | ||
182 | blocks; | ||
183 | |||
184 | sha_off = SHA_CBLOCK-key->md.num; | ||
185 | #endif | ||
186 | |||
187 | if (len%AES_BLOCK_SIZE) return 0; | ||
188 | |||
189 | if (ctx->encrypt) { | ||
190 | if (plen==NO_PAYLOAD_LENGTH) | ||
191 | plen = len; | ||
192 | else if (len!=((plen+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE)) | ||
193 | return 0; | ||
194 | else if (key->aux.tls_ver >= TLS1_1_VERSION) | ||
195 | iv = AES_BLOCK_SIZE; | ||
196 | |||
197 | #if defined(STITCHED_CALL) | ||
198 | if (plen>(sha_off+iv) && (blocks=(plen-(sha_off+iv))/SHA_CBLOCK)) { | ||
199 | SHA1_Update(&key->md,in+iv,sha_off); | ||
200 | |||
201 | aesni_cbc_sha1_enc(in,out,blocks,&key->ks, | ||
202 | ctx->iv,&key->md,in+iv+sha_off); | ||
203 | blocks *= SHA_CBLOCK; | ||
204 | aes_off += blocks; | ||
205 | sha_off += blocks; | ||
206 | key->md.Nh += blocks>>29; | ||
207 | key->md.Nl += blocks<<=3; | ||
208 | if (key->md.Nl<(unsigned int)blocks) key->md.Nh++; | ||
209 | } else { | ||
210 | sha_off = 0; | ||
211 | } | ||
212 | #endif | ||
213 | sha_off += iv; | ||
214 | SHA1_Update(&key->md,in+sha_off,plen-sha_off); | ||
215 | |||
216 | if (plen!=len) { /* "TLS" mode of operation */ | ||
217 | if (in!=out) | ||
218 | memcpy(out+aes_off,in+aes_off,plen-aes_off); | ||
219 | |||
220 | /* calculate HMAC and append it to payload */ | ||
221 | SHA1_Final(out+plen,&key->md); | ||
222 | key->md = key->tail; | ||
223 | SHA1_Update(&key->md,out+plen,SHA_DIGEST_LENGTH); | ||
224 | SHA1_Final(out+plen,&key->md); | ||
225 | |||
226 | /* pad the payload|hmac */ | ||
227 | plen += SHA_DIGEST_LENGTH; | ||
228 | for (l=len-plen-1;plen<len;plen++) out[plen]=l; | ||
229 | /* encrypt HMAC|padding at once */ | ||
230 | aesni_cbc_encrypt(out+aes_off,out+aes_off,len-aes_off, | ||
231 | &key->ks,ctx->iv,1); | ||
232 | } else { | ||
233 | aesni_cbc_encrypt(in+aes_off,out+aes_off,len-aes_off, | ||
234 | &key->ks,ctx->iv,1); | ||
235 | } | ||
236 | } else { | ||
237 | unsigned char mac[SHA_DIGEST_LENGTH]; | ||
238 | |||
239 | /* decrypt HMAC|padding at once */ | ||
240 | aesni_cbc_encrypt(in,out,len, | ||
241 | &key->ks,ctx->iv,0); | ||
242 | |||
243 | if (plen) { /* "TLS" mode of operation */ | ||
244 | /* figure out payload length */ | ||
245 | if (len<(size_t)(out[len-1]+1+SHA_DIGEST_LENGTH)) | ||
246 | return 0; | ||
247 | |||
248 | len -= (out[len-1]+1+SHA_DIGEST_LENGTH); | ||
249 | |||
250 | if ((key->aux.tls_aad[plen-4]<<8|key->aux.tls_aad[plen-3]) | ||
251 | >= TLS1_1_VERSION) { | ||
252 | len -= AES_BLOCK_SIZE; | ||
253 | iv = AES_BLOCK_SIZE; | ||
254 | } | ||
255 | |||
256 | key->aux.tls_aad[plen-2] = len>>8; | ||
257 | key->aux.tls_aad[plen-1] = len; | ||
258 | |||
259 | /* calculate HMAC and verify it */ | ||
260 | key->md = key->head; | ||
261 | SHA1_Update(&key->md,key->aux.tls_aad,plen); | ||
262 | SHA1_Update(&key->md,out+iv,len); | ||
263 | SHA1_Final(mac,&key->md); | ||
264 | |||
265 | key->md = key->tail; | ||
266 | SHA1_Update(&key->md,mac,SHA_DIGEST_LENGTH); | ||
267 | SHA1_Final(mac,&key->md); | ||
268 | |||
269 | if (memcmp(out+iv+len,mac,SHA_DIGEST_LENGTH)) | ||
270 | return 0; | ||
271 | } else { | ||
272 | SHA1_Update(&key->md,out,len); | ||
273 | } | ||
274 | } | ||
275 | |||
276 | key->payload_length = NO_PAYLOAD_LENGTH; | ||
277 | |||
278 | return 1; | ||
279 | } | ||
280 | |||
281 | static int aesni_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | ||
282 | { | ||
283 | EVP_AES_HMAC_SHA1 *key = data(ctx); | ||
284 | |||
285 | switch (type) | ||
286 | { | ||
287 | case EVP_CTRL_AEAD_SET_MAC_KEY: | ||
288 | { | ||
289 | unsigned int i; | ||
290 | unsigned char hmac_key[64]; | ||
291 | |||
292 | memset (hmac_key,0,sizeof(hmac_key)); | ||
293 | |||
294 | if (arg > (int)sizeof(hmac_key)) { | ||
295 | SHA1_Init(&key->head); | ||
296 | SHA1_Update(&key->head,ptr,arg); | ||
297 | SHA1_Final(hmac_key,&key->head); | ||
298 | } else { | ||
299 | memcpy(hmac_key,ptr,arg); | ||
300 | } | ||
301 | |||
302 | for (i=0;i<sizeof(hmac_key);i++) | ||
303 | hmac_key[i] ^= 0x36; /* ipad */ | ||
304 | SHA1_Init(&key->head); | ||
305 | SHA1_Update(&key->head,hmac_key,sizeof(hmac_key)); | ||
306 | |||
307 | for (i=0;i<sizeof(hmac_key);i++) | ||
308 | hmac_key[i] ^= 0x36^0x5c; /* opad */ | ||
309 | SHA1_Init(&key->tail); | ||
310 | SHA1_Update(&key->tail,hmac_key,sizeof(hmac_key)); | ||
311 | |||
312 | return 1; | ||
313 | } | ||
314 | case EVP_CTRL_AEAD_TLS1_AAD: | ||
315 | { | ||
316 | unsigned char *p=ptr; | ||
317 | unsigned int len=p[arg-2]<<8|p[arg-1]; | ||
318 | |||
319 | if (ctx->encrypt) | ||
320 | { | ||
321 | key->payload_length = len; | ||
322 | if ((key->aux.tls_ver=p[arg-4]<<8|p[arg-3]) >= TLS1_1_VERSION) { | ||
323 | len -= AES_BLOCK_SIZE; | ||
324 | p[arg-2] = len>>8; | ||
325 | p[arg-1] = len; | ||
326 | } | ||
327 | key->md = key->head; | ||
328 | SHA1_Update(&key->md,p,arg); | ||
329 | |||
330 | return (int)(((len+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE) | ||
331 | - len); | ||
332 | } | ||
333 | else | ||
334 | { | ||
335 | if (arg>13) arg = 13; | ||
336 | memcpy(key->aux.tls_aad,ptr,arg); | ||
337 | key->payload_length = arg; | ||
338 | |||
339 | return SHA_DIGEST_LENGTH; | ||
340 | } | ||
341 | } | ||
342 | default: | ||
343 | return -1; | ||
344 | } | ||
345 | } | ||
346 | |||
347 | static EVP_CIPHER aesni_128_cbc_hmac_sha1_cipher = | ||
348 | { | ||
349 | #ifdef NID_aes_128_cbc_hmac_sha1 | ||
350 | NID_aes_128_cbc_hmac_sha1, | ||
351 | #else | ||
352 | NID_undef, | ||
353 | #endif | ||
354 | 16,16,16, | ||
355 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, | ||
356 | aesni_cbc_hmac_sha1_init_key, | ||
357 | aesni_cbc_hmac_sha1_cipher, | ||
358 | NULL, | ||
359 | sizeof(EVP_AES_HMAC_SHA1), | ||
360 | EVP_CIPH_FLAG_DEFAULT_ASN1?NULL:EVP_CIPHER_set_asn1_iv, | ||
361 | EVP_CIPH_FLAG_DEFAULT_ASN1?NULL:EVP_CIPHER_get_asn1_iv, | ||
362 | aesni_cbc_hmac_sha1_ctrl, | ||
363 | NULL | ||
364 | }; | ||
365 | |||
366 | static EVP_CIPHER aesni_256_cbc_hmac_sha1_cipher = | ||
367 | { | ||
368 | #ifdef NID_aes_256_cbc_hmac_sha1 | ||
369 | NID_aes_256_cbc_hmac_sha1, | ||
370 | #else | ||
371 | NID_undef, | ||
372 | #endif | ||
373 | 16,32,16, | ||
374 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, | ||
375 | aesni_cbc_hmac_sha1_init_key, | ||
376 | aesni_cbc_hmac_sha1_cipher, | ||
377 | NULL, | ||
378 | sizeof(EVP_AES_HMAC_SHA1), | ||
379 | EVP_CIPH_FLAG_DEFAULT_ASN1?NULL:EVP_CIPHER_set_asn1_iv, | ||
380 | EVP_CIPH_FLAG_DEFAULT_ASN1?NULL:EVP_CIPHER_get_asn1_iv, | ||
381 | aesni_cbc_hmac_sha1_ctrl, | ||
382 | NULL | ||
383 | }; | ||
384 | |||
385 | const EVP_CIPHER *EVP_aes_128_cbc_hmac_sha1(void) | ||
386 | { | ||
387 | return(OPENSSL_ia32cap_P[1]&AESNI_CAPABLE? | ||
388 | &aesni_128_cbc_hmac_sha1_cipher:NULL); | ||
389 | } | ||
390 | |||
391 | const EVP_CIPHER *EVP_aes_256_cbc_hmac_sha1(void) | ||
392 | { | ||
393 | return(OPENSSL_ia32cap_P[1]&AESNI_CAPABLE? | ||
394 | &aesni_256_cbc_hmac_sha1_cipher:NULL); | ||
395 | } | ||
396 | #else | ||
397 | const EVP_CIPHER *EVP_aes_128_cbc_hmac_sha1(void) | ||
398 | { | ||
399 | return NULL; | ||
400 | } | ||
401 | const EVP_CIPHER *EVP_aes_256_cbc_hmac_sha1(void) | ||
402 | { | ||
403 | return NULL; | ||
404 | } | ||
405 | #endif | ||
406 | #endif | ||
diff --git a/src/lib/libcrypto/evp/e_des3.c b/src/lib/libcrypto/evp/e_des3.c index 3232cfe024..1e69972662 100644 --- a/src/lib/libcrypto/evp/e_des3.c +++ b/src/lib/libcrypto/evp/e_des3.c | |||
@@ -65,6 +65,8 @@ | |||
65 | #include <openssl/des.h> | 65 | #include <openssl/des.h> |
66 | #include <openssl/rand.h> | 66 | #include <openssl/rand.h> |
67 | 67 | ||
68 | #ifndef OPENSSL_FIPS | ||
69 | |||
68 | static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 70 | static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
69 | const unsigned char *iv,int enc); | 71 | const unsigned char *iv,int enc); |
70 | 72 | ||
@@ -311,3 +313,4 @@ const EVP_CIPHER *EVP_des_ede3(void) | |||
311 | return &des_ede3_ecb; | 313 | return &des_ede3_ecb; |
312 | } | 314 | } |
313 | #endif | 315 | #endif |
316 | #endif | ||
diff --git a/src/lib/libcrypto/evp/e_null.c b/src/lib/libcrypto/evp/e_null.c index 7cf50e1416..f0c1f78b5f 100644 --- a/src/lib/libcrypto/evp/e_null.c +++ b/src/lib/libcrypto/evp/e_null.c | |||
@@ -61,6 +61,8 @@ | |||
61 | #include <openssl/evp.h> | 61 | #include <openssl/evp.h> |
62 | #include <openssl/objects.h> | 62 | #include <openssl/objects.h> |
63 | 63 | ||
64 | #ifndef OPENSSL_FIPS | ||
65 | |||
64 | static int null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 66 | static int null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
65 | const unsigned char *iv,int enc); | 67 | const unsigned char *iv,int enc); |
66 | static int null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | 68 | static int null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
@@ -99,4 +101,4 @@ static int null_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | |||
99 | memcpy((char *)out,(const char *)in,inl); | 101 | memcpy((char *)out,(const char *)in,inl); |
100 | return 1; | 102 | return 1; |
101 | } | 103 | } |
102 | 104 | #endif | |
diff --git a/src/lib/libcrypto/evp/e_rc2.c b/src/lib/libcrypto/evp/e_rc2.c index f78d781129..d4c33b58d4 100644 --- a/src/lib/libcrypto/evp/e_rc2.c +++ b/src/lib/libcrypto/evp/e_rc2.c | |||
@@ -183,7 +183,8 @@ static int rc2_get_asn1_type_and_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
183 | key_bits =rc2_magic_to_meth((int)num); | 183 | key_bits =rc2_magic_to_meth((int)num); |
184 | if (!key_bits) | 184 | if (!key_bits) |
185 | return(-1); | 185 | return(-1); |
186 | if(i > 0) EVP_CipherInit_ex(c, NULL, NULL, NULL, iv, -1); | 186 | if(i > 0 && !EVP_CipherInit_ex(c, NULL, NULL, NULL, iv, -1)) |
187 | return -1; | ||
187 | EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_RC2_KEY_BITS, key_bits, NULL); | 188 | EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_RC2_KEY_BITS, key_bits, NULL); |
188 | EVP_CIPHER_CTX_set_key_length(c, key_bits / 8); | 189 | EVP_CIPHER_CTX_set_key_length(c, key_bits / 8); |
189 | } | 190 | } |
diff --git a/src/lib/libcrypto/evp/e_rc4.c b/src/lib/libcrypto/evp/e_rc4.c index 8b5175e0fd..b4f6bda82d 100644 --- a/src/lib/libcrypto/evp/e_rc4.c +++ b/src/lib/libcrypto/evp/e_rc4.c | |||
@@ -62,6 +62,7 @@ | |||
62 | #ifndef OPENSSL_NO_RC4 | 62 | #ifndef OPENSSL_NO_RC4 |
63 | 63 | ||
64 | #include <openssl/evp.h> | 64 | #include <openssl/evp.h> |
65 | #include "evp_locl.h" | ||
65 | #include <openssl/objects.h> | 66 | #include <openssl/objects.h> |
66 | #include <openssl/rc4.h> | 67 | #include <openssl/rc4.h> |
67 | 68 | ||
diff --git a/src/lib/libcrypto/evp/e_rc4_hmac_md5.c b/src/lib/libcrypto/evp/e_rc4_hmac_md5.c new file mode 100644 index 0000000000..56563191ba --- /dev/null +++ b/src/lib/libcrypto/evp/e_rc4_hmac_md5.c | |||
@@ -0,0 +1,298 @@ | |||
1 | /* ==================================================================== | ||
2 | * Copyright (c) 2011 The OpenSSL Project. All rights reserved. | ||
3 | * | ||
4 | * Redistribution and use in source and binary forms, with or without | ||
5 | * modification, are permitted provided that the following conditions | ||
6 | * are met: | ||
7 | * | ||
8 | * 1. Redistributions of source code must retain the above copyright | ||
9 | * notice, this list of conditions and the following disclaimer. | ||
10 | * | ||
11 | * 2. Redistributions in binary form must reproduce the above copyright | ||
12 | * notice, this list of conditions and the following disclaimer in | ||
13 | * the documentation and/or other materials provided with the | ||
14 | * distribution. | ||
15 | * | ||
16 | * 3. All advertising materials mentioning features or use of this | ||
17 | * software must display the following acknowledgment: | ||
18 | * "This product includes software developed by the OpenSSL Project | ||
19 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
20 | * | ||
21 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
22 | * endorse or promote products derived from this software without | ||
23 | * prior written permission. For written permission, please contact | ||
24 | * licensing@OpenSSL.org. | ||
25 | * | ||
26 | * 5. Products derived from this software may not be called "OpenSSL" | ||
27 | * nor may "OpenSSL" appear in their names without prior written | ||
28 | * permission of the OpenSSL Project. | ||
29 | * | ||
30 | * 6. Redistributions of any form whatsoever must retain the following | ||
31 | * acknowledgment: | ||
32 | * "This product includes software developed by the OpenSSL Project | ||
33 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
34 | * | ||
35 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
36 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
37 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
38 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
39 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
40 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
41 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
42 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
43 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
44 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
45 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
46 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
47 | * ==================================================================== | ||
48 | */ | ||
49 | |||
50 | #include <openssl/opensslconf.h> | ||
51 | |||
52 | #include <stdio.h> | ||
53 | #include <string.h> | ||
54 | |||
55 | #if !defined(OPENSSL_NO_RC4) && !defined(OPENSSL_NO_MD5) | ||
56 | |||
57 | #include <openssl/evp.h> | ||
58 | #include <openssl/objects.h> | ||
59 | #include <openssl/rc4.h> | ||
60 | #include <openssl/md5.h> | ||
61 | |||
62 | #ifndef EVP_CIPH_FLAG_AEAD_CIPHER | ||
63 | #define EVP_CIPH_FLAG_AEAD_CIPHER 0x200000 | ||
64 | #define EVP_CTRL_AEAD_TLS1_AAD 0x16 | ||
65 | #define EVP_CTRL_AEAD_SET_MAC_KEY 0x17 | ||
66 | #endif | ||
67 | |||
68 | /* FIXME: surely this is available elsewhere? */ | ||
69 | #define EVP_RC4_KEY_SIZE 16 | ||
70 | |||
71 | typedef struct | ||
72 | { | ||
73 | RC4_KEY ks; | ||
74 | MD5_CTX head,tail,md; | ||
75 | size_t payload_length; | ||
76 | } EVP_RC4_HMAC_MD5; | ||
77 | |||
78 | #define NO_PAYLOAD_LENGTH ((size_t)-1) | ||
79 | |||
80 | void rc4_md5_enc (RC4_KEY *key, const void *in0, void *out, | ||
81 | MD5_CTX *ctx,const void *inp,size_t blocks); | ||
82 | |||
83 | #define data(ctx) ((EVP_RC4_HMAC_MD5 *)(ctx)->cipher_data) | ||
84 | |||
85 | static int rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, | ||
86 | const unsigned char *inkey, | ||
87 | const unsigned char *iv, int enc) | ||
88 | { | ||
89 | EVP_RC4_HMAC_MD5 *key = data(ctx); | ||
90 | |||
91 | RC4_set_key(&key->ks,EVP_CIPHER_CTX_key_length(ctx), | ||
92 | inkey); | ||
93 | |||
94 | MD5_Init(&key->head); /* handy when benchmarking */ | ||
95 | key->tail = key->head; | ||
96 | key->md = key->head; | ||
97 | |||
98 | key->payload_length = NO_PAYLOAD_LENGTH; | ||
99 | |||
100 | return 1; | ||
101 | } | ||
102 | |||
103 | #if !defined(OPENSSL_NO_ASM) && ( \ | ||
104 | defined(__x86_64) || defined(__x86_64__) || \ | ||
105 | defined(_M_AMD64) || defined(_M_X64) || \ | ||
106 | defined(__INTEL__) ) && \ | ||
107 | !(defined(__APPLE__) && defined(__MACH__)) | ||
108 | #define STITCHED_CALL | ||
109 | #endif | ||
110 | |||
111 | #if !defined(STITCHED_CALL) | ||
112 | #define rc4_off 0 | ||
113 | #define md5_off 0 | ||
114 | #endif | ||
115 | |||
116 | static int rc4_hmac_md5_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
117 | const unsigned char *in, size_t len) | ||
118 | { | ||
119 | EVP_RC4_HMAC_MD5 *key = data(ctx); | ||
120 | #if defined(STITCHED_CALL) | ||
121 | size_t rc4_off = 32-1-(key->ks.x&(32-1)), /* 32 is $MOD from rc4_md5-x86_64.pl */ | ||
122 | md5_off = MD5_CBLOCK-key->md.num, | ||
123 | blocks; | ||
124 | unsigned int l; | ||
125 | extern unsigned int OPENSSL_ia32cap_P[]; | ||
126 | #endif | ||
127 | size_t plen = key->payload_length; | ||
128 | |||
129 | if (plen!=NO_PAYLOAD_LENGTH && len!=(plen+MD5_DIGEST_LENGTH)) return 0; | ||
130 | |||
131 | if (ctx->encrypt) { | ||
132 | if (plen==NO_PAYLOAD_LENGTH) plen = len; | ||
133 | #if defined(STITCHED_CALL) | ||
134 | /* cipher has to "fall behind" */ | ||
135 | if (rc4_off>md5_off) md5_off+=MD5_CBLOCK; | ||
136 | |||
137 | if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK) && | ||
138 | (OPENSSL_ia32cap_P[0]&(1<<20))==0) { | ||
139 | MD5_Update(&key->md,in,md5_off); | ||
140 | RC4(&key->ks,rc4_off,in,out); | ||
141 | |||
142 | rc4_md5_enc(&key->ks,in+rc4_off,out+rc4_off, | ||
143 | &key->md,in+md5_off,blocks); | ||
144 | blocks *= MD5_CBLOCK; | ||
145 | rc4_off += blocks; | ||
146 | md5_off += blocks; | ||
147 | key->md.Nh += blocks>>29; | ||
148 | key->md.Nl += blocks<<=3; | ||
149 | if (key->md.Nl<(unsigned int)blocks) key->md.Nh++; | ||
150 | } else { | ||
151 | rc4_off = 0; | ||
152 | md5_off = 0; | ||
153 | } | ||
154 | #endif | ||
155 | MD5_Update(&key->md,in+md5_off,plen-md5_off); | ||
156 | |||
157 | if (plen!=len) { /* "TLS" mode of operation */ | ||
158 | if (in!=out) | ||
159 | memcpy(out+rc4_off,in+rc4_off,plen-rc4_off); | ||
160 | |||
161 | /* calculate HMAC and append it to payload */ | ||
162 | MD5_Final(out+plen,&key->md); | ||
163 | key->md = key->tail; | ||
164 | MD5_Update(&key->md,out+plen,MD5_DIGEST_LENGTH); | ||
165 | MD5_Final(out+plen,&key->md); | ||
166 | /* encrypt HMAC at once */ | ||
167 | RC4(&key->ks,len-rc4_off,out+rc4_off,out+rc4_off); | ||
168 | } else { | ||
169 | RC4(&key->ks,len-rc4_off,in+rc4_off,out+rc4_off); | ||
170 | } | ||
171 | } else { | ||
172 | unsigned char mac[MD5_DIGEST_LENGTH]; | ||
173 | #if defined(STITCHED_CALL) | ||
174 | /* digest has to "fall behind" */ | ||
175 | if (md5_off>rc4_off) rc4_off += 2*MD5_CBLOCK; | ||
176 | else rc4_off += MD5_CBLOCK; | ||
177 | |||
178 | if (len>rc4_off && (blocks=(len-rc4_off)/MD5_CBLOCK) && | ||
179 | (OPENSSL_ia32cap_P[0]&(1<<20))==0) { | ||
180 | RC4(&key->ks,rc4_off,in,out); | ||
181 | MD5_Update(&key->md,out,md5_off); | ||
182 | |||
183 | rc4_md5_enc(&key->ks,in+rc4_off,out+rc4_off, | ||
184 | &key->md,out+md5_off,blocks); | ||
185 | blocks *= MD5_CBLOCK; | ||
186 | rc4_off += blocks; | ||
187 | md5_off += blocks; | ||
188 | l = (key->md.Nl+(blocks<<3))&0xffffffffU; | ||
189 | if (l<key->md.Nl) key->md.Nh++; | ||
190 | key->md.Nl = l; | ||
191 | key->md.Nh += blocks>>29; | ||
192 | } else { | ||
193 | md5_off=0; | ||
194 | rc4_off=0; | ||
195 | } | ||
196 | #endif | ||
197 | /* decrypt HMAC at once */ | ||
198 | RC4(&key->ks,len-rc4_off,in+rc4_off,out+rc4_off); | ||
199 | if (plen!=NO_PAYLOAD_LENGTH) { /* "TLS" mode of operation */ | ||
200 | MD5_Update(&key->md,out+md5_off,plen-md5_off); | ||
201 | |||
202 | /* calculate HMAC and verify it */ | ||
203 | MD5_Final(mac,&key->md); | ||
204 | key->md = key->tail; | ||
205 | MD5_Update(&key->md,mac,MD5_DIGEST_LENGTH); | ||
206 | MD5_Final(mac,&key->md); | ||
207 | |||
208 | if (memcmp(out+plen,mac,MD5_DIGEST_LENGTH)) | ||
209 | return 0; | ||
210 | } else { | ||
211 | MD5_Update(&key->md,out+md5_off,len-md5_off); | ||
212 | } | ||
213 | } | ||
214 | |||
215 | key->payload_length = NO_PAYLOAD_LENGTH; | ||
216 | |||
217 | return 1; | ||
218 | } | ||
219 | |||
220 | static int rc4_hmac_md5_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | ||
221 | { | ||
222 | EVP_RC4_HMAC_MD5 *key = data(ctx); | ||
223 | |||
224 | switch (type) | ||
225 | { | ||
226 | case EVP_CTRL_AEAD_SET_MAC_KEY: | ||
227 | { | ||
228 | unsigned int i; | ||
229 | unsigned char hmac_key[64]; | ||
230 | |||
231 | memset (hmac_key,0,sizeof(hmac_key)); | ||
232 | |||
233 | if (arg > (int)sizeof(hmac_key)) { | ||
234 | MD5_Init(&key->head); | ||
235 | MD5_Update(&key->head,ptr,arg); | ||
236 | MD5_Final(hmac_key,&key->head); | ||
237 | } else { | ||
238 | memcpy(hmac_key,ptr,arg); | ||
239 | } | ||
240 | |||
241 | for (i=0;i<sizeof(hmac_key);i++) | ||
242 | hmac_key[i] ^= 0x36; /* ipad */ | ||
243 | MD5_Init(&key->head); | ||
244 | MD5_Update(&key->head,hmac_key,sizeof(hmac_key)); | ||
245 | |||
246 | for (i=0;i<sizeof(hmac_key);i++) | ||
247 | hmac_key[i] ^= 0x36^0x5c; /* opad */ | ||
248 | MD5_Init(&key->tail); | ||
249 | MD5_Update(&key->tail,hmac_key,sizeof(hmac_key)); | ||
250 | |||
251 | return 1; | ||
252 | } | ||
253 | case EVP_CTRL_AEAD_TLS1_AAD: | ||
254 | { | ||
255 | unsigned char *p=ptr; | ||
256 | unsigned int len=p[arg-2]<<8|p[arg-1]; | ||
257 | |||
258 | if (!ctx->encrypt) | ||
259 | { | ||
260 | len -= MD5_DIGEST_LENGTH; | ||
261 | p[arg-2] = len>>8; | ||
262 | p[arg-1] = len; | ||
263 | } | ||
264 | key->payload_length=len; | ||
265 | key->md = key->head; | ||
266 | MD5_Update(&key->md,p,arg); | ||
267 | |||
268 | return MD5_DIGEST_LENGTH; | ||
269 | } | ||
270 | default: | ||
271 | return -1; | ||
272 | } | ||
273 | } | ||
274 | |||
275 | static EVP_CIPHER r4_hmac_md5_cipher= | ||
276 | { | ||
277 | #ifdef NID_rc4_hmac_md5 | ||
278 | NID_rc4_hmac_md5, | ||
279 | #else | ||
280 | NID_undef, | ||
281 | #endif | ||
282 | 1,EVP_RC4_KEY_SIZE,0, | ||
283 | EVP_CIPH_STREAM_CIPHER|EVP_CIPH_VARIABLE_LENGTH|EVP_CIPH_FLAG_AEAD_CIPHER, | ||
284 | rc4_hmac_md5_init_key, | ||
285 | rc4_hmac_md5_cipher, | ||
286 | NULL, | ||
287 | sizeof(EVP_RC4_HMAC_MD5), | ||
288 | NULL, | ||
289 | NULL, | ||
290 | rc4_hmac_md5_ctrl, | ||
291 | NULL | ||
292 | }; | ||
293 | |||
294 | const EVP_CIPHER *EVP_rc4_hmac_md5(void) | ||
295 | { | ||
296 | return(&r4_hmac_md5_cipher); | ||
297 | } | ||
298 | #endif | ||
diff --git a/src/lib/libcrypto/evp/evp.h b/src/lib/libcrypto/evp/evp.h index 9f9795e2d9..0d1b20a7d3 100644 --- a/src/lib/libcrypto/evp/evp.h +++ b/src/lib/libcrypto/evp/evp.h | |||
@@ -83,7 +83,7 @@ | |||
83 | #define EVP_RC5_32_12_16_KEY_SIZE 16 | 83 | #define EVP_RC5_32_12_16_KEY_SIZE 16 |
84 | */ | 84 | */ |
85 | #define EVP_MAX_MD_SIZE 64 /* longest known is SHA512 */ | 85 | #define EVP_MAX_MD_SIZE 64 /* longest known is SHA512 */ |
86 | #define EVP_MAX_KEY_LENGTH 32 | 86 | #define EVP_MAX_KEY_LENGTH 64 |
87 | #define EVP_MAX_IV_LENGTH 16 | 87 | #define EVP_MAX_IV_LENGTH 16 |
88 | #define EVP_MAX_BLOCK_LENGTH 32 | 88 | #define EVP_MAX_BLOCK_LENGTH 32 |
89 | 89 | ||
@@ -116,6 +116,7 @@ | |||
116 | #define EVP_PKEY_DH NID_dhKeyAgreement | 116 | #define EVP_PKEY_DH NID_dhKeyAgreement |
117 | #define EVP_PKEY_EC NID_X9_62_id_ecPublicKey | 117 | #define EVP_PKEY_EC NID_X9_62_id_ecPublicKey |
118 | #define EVP_PKEY_HMAC NID_hmac | 118 | #define EVP_PKEY_HMAC NID_hmac |
119 | #define EVP_PKEY_CMAC NID_cmac | ||
119 | 120 | ||
120 | #ifdef __cplusplus | 121 | #ifdef __cplusplus |
121 | extern "C" { | 122 | extern "C" { |
@@ -216,6 +217,8 @@ typedef int evp_verify_method(int type,const unsigned char *m, | |||
216 | 217 | ||
217 | #define EVP_MD_FLAG_DIGALGID_CUSTOM 0x0018 | 218 | #define EVP_MD_FLAG_DIGALGID_CUSTOM 0x0018 |
218 | 219 | ||
220 | #define EVP_MD_FLAG_FIPS 0x0400 /* Note if suitable for use in FIPS mode */ | ||
221 | |||
219 | /* Digest ctrls */ | 222 | /* Digest ctrls */ |
220 | 223 | ||
221 | #define EVP_MD_CTRL_DIGALGID 0x1 | 224 | #define EVP_MD_CTRL_DIGALGID 0x1 |
@@ -325,6 +328,10 @@ struct evp_cipher_st | |||
325 | #define EVP_CIPH_CBC_MODE 0x2 | 328 | #define EVP_CIPH_CBC_MODE 0x2 |
326 | #define EVP_CIPH_CFB_MODE 0x3 | 329 | #define EVP_CIPH_CFB_MODE 0x3 |
327 | #define EVP_CIPH_OFB_MODE 0x4 | 330 | #define EVP_CIPH_OFB_MODE 0x4 |
331 | #define EVP_CIPH_CTR_MODE 0x5 | ||
332 | #define EVP_CIPH_GCM_MODE 0x6 | ||
333 | #define EVP_CIPH_CCM_MODE 0x7 | ||
334 | #define EVP_CIPH_XTS_MODE 0x10001 | ||
328 | #define EVP_CIPH_MODE 0xF0007 | 335 | #define EVP_CIPH_MODE 0xF0007 |
329 | /* Set if variable length cipher */ | 336 | /* Set if variable length cipher */ |
330 | #define EVP_CIPH_VARIABLE_LENGTH 0x8 | 337 | #define EVP_CIPH_VARIABLE_LENGTH 0x8 |
@@ -346,6 +353,15 @@ struct evp_cipher_st | |||
346 | #define EVP_CIPH_FLAG_DEFAULT_ASN1 0x1000 | 353 | #define EVP_CIPH_FLAG_DEFAULT_ASN1 0x1000 |
347 | /* Buffer length in bits not bytes: CFB1 mode only */ | 354 | /* Buffer length in bits not bytes: CFB1 mode only */ |
348 | #define EVP_CIPH_FLAG_LENGTH_BITS 0x2000 | 355 | #define EVP_CIPH_FLAG_LENGTH_BITS 0x2000 |
356 | /* Note if suitable for use in FIPS mode */ | ||
357 | #define EVP_CIPH_FLAG_FIPS 0x4000 | ||
358 | /* Allow non FIPS cipher in FIPS mode */ | ||
359 | #define EVP_CIPH_FLAG_NON_FIPS_ALLOW 0x8000 | ||
360 | /* Cipher handles any and all padding logic as well | ||
361 | * as finalisation. | ||
362 | */ | ||
363 | #define EVP_CIPH_FLAG_CUSTOM_CIPHER 0x100000 | ||
364 | #define EVP_CIPH_FLAG_AEAD_CIPHER 0x200000 | ||
349 | 365 | ||
350 | /* ctrl() values */ | 366 | /* ctrl() values */ |
351 | 367 | ||
@@ -358,6 +374,34 @@ struct evp_cipher_st | |||
358 | #define EVP_CTRL_RAND_KEY 0x6 | 374 | #define EVP_CTRL_RAND_KEY 0x6 |
359 | #define EVP_CTRL_PBE_PRF_NID 0x7 | 375 | #define EVP_CTRL_PBE_PRF_NID 0x7 |
360 | #define EVP_CTRL_COPY 0x8 | 376 | #define EVP_CTRL_COPY 0x8 |
377 | #define EVP_CTRL_GCM_SET_IVLEN 0x9 | ||
378 | #define EVP_CTRL_GCM_GET_TAG 0x10 | ||
379 | #define EVP_CTRL_GCM_SET_TAG 0x11 | ||
380 | #define EVP_CTRL_GCM_SET_IV_FIXED 0x12 | ||
381 | #define EVP_CTRL_GCM_IV_GEN 0x13 | ||
382 | #define EVP_CTRL_CCM_SET_IVLEN EVP_CTRL_GCM_SET_IVLEN | ||
383 | #define EVP_CTRL_CCM_GET_TAG EVP_CTRL_GCM_GET_TAG | ||
384 | #define EVP_CTRL_CCM_SET_TAG EVP_CTRL_GCM_SET_TAG | ||
385 | #define EVP_CTRL_CCM_SET_L 0x14 | ||
386 | #define EVP_CTRL_CCM_SET_MSGLEN 0x15 | ||
387 | /* AEAD cipher deduces payload length and returns number of bytes | ||
388 | * required to store MAC and eventual padding. Subsequent call to | ||
389 | * EVP_Cipher even appends/verifies MAC. | ||
390 | */ | ||
391 | #define EVP_CTRL_AEAD_TLS1_AAD 0x16 | ||
392 | /* Used by composite AEAD ciphers, no-op in GCM, CCM... */ | ||
393 | #define EVP_CTRL_AEAD_SET_MAC_KEY 0x17 | ||
394 | /* Set the GCM invocation field, decrypt only */ | ||
395 | #define EVP_CTRL_GCM_SET_IV_INV 0x18 | ||
396 | |||
397 | /* GCM TLS constants */ | ||
398 | /* Length of fixed part of IV derived from PRF */ | ||
399 | #define EVP_GCM_TLS_FIXED_IV_LEN 4 | ||
400 | /* Length of explicit part of IV part of TLS records */ | ||
401 | #define EVP_GCM_TLS_EXPLICIT_IV_LEN 8 | ||
402 | /* Length of tag for TLS */ | ||
403 | #define EVP_GCM_TLS_TAG_LEN 16 | ||
404 | |||
361 | 405 | ||
362 | typedef struct evp_cipher_info_st | 406 | typedef struct evp_cipher_info_st |
363 | { | 407 | { |
@@ -375,7 +419,7 @@ struct evp_cipher_ctx_st | |||
375 | unsigned char oiv[EVP_MAX_IV_LENGTH]; /* original iv */ | 419 | unsigned char oiv[EVP_MAX_IV_LENGTH]; /* original iv */ |
376 | unsigned char iv[EVP_MAX_IV_LENGTH]; /* working iv */ | 420 | unsigned char iv[EVP_MAX_IV_LENGTH]; /* working iv */ |
377 | unsigned char buf[EVP_MAX_BLOCK_LENGTH];/* saved partial block */ | 421 | unsigned char buf[EVP_MAX_BLOCK_LENGTH];/* saved partial block */ |
378 | int num; /* used by cfb/ofb mode */ | 422 | int num; /* used by cfb/ofb/ctr mode */ |
379 | 423 | ||
380 | void *app_data; /* application stuff */ | 424 | void *app_data; /* application stuff */ |
381 | int key_len; /* May change for variable length cipher */ | 425 | int key_len; /* May change for variable length cipher */ |
@@ -695,6 +739,9 @@ const EVP_MD *EVP_dev_crypto_md5(void); | |||
695 | #ifndef OPENSSL_NO_RC4 | 739 | #ifndef OPENSSL_NO_RC4 |
696 | const EVP_CIPHER *EVP_rc4(void); | 740 | const EVP_CIPHER *EVP_rc4(void); |
697 | const EVP_CIPHER *EVP_rc4_40(void); | 741 | const EVP_CIPHER *EVP_rc4_40(void); |
742 | #ifndef OPENSSL_NO_MD5 | ||
743 | const EVP_CIPHER *EVP_rc4_hmac_md5(void); | ||
744 | #endif | ||
698 | #endif | 745 | #endif |
699 | #ifndef OPENSSL_NO_IDEA | 746 | #ifndef OPENSSL_NO_IDEA |
700 | const EVP_CIPHER *EVP_idea_ecb(void); | 747 | const EVP_CIPHER *EVP_idea_ecb(void); |
@@ -741,9 +788,10 @@ const EVP_CIPHER *EVP_aes_128_cfb8(void); | |||
741 | const EVP_CIPHER *EVP_aes_128_cfb128(void); | 788 | const EVP_CIPHER *EVP_aes_128_cfb128(void); |
742 | # define EVP_aes_128_cfb EVP_aes_128_cfb128 | 789 | # define EVP_aes_128_cfb EVP_aes_128_cfb128 |
743 | const EVP_CIPHER *EVP_aes_128_ofb(void); | 790 | const EVP_CIPHER *EVP_aes_128_ofb(void); |
744 | #if 0 | ||
745 | const EVP_CIPHER *EVP_aes_128_ctr(void); | 791 | const EVP_CIPHER *EVP_aes_128_ctr(void); |
746 | #endif | 792 | const EVP_CIPHER *EVP_aes_128_gcm(void); |
793 | const EVP_CIPHER *EVP_aes_128_ccm(void); | ||
794 | const EVP_CIPHER *EVP_aes_128_xts(void); | ||
747 | const EVP_CIPHER *EVP_aes_192_ecb(void); | 795 | const EVP_CIPHER *EVP_aes_192_ecb(void); |
748 | const EVP_CIPHER *EVP_aes_192_cbc(void); | 796 | const EVP_CIPHER *EVP_aes_192_cbc(void); |
749 | const EVP_CIPHER *EVP_aes_192_cfb1(void); | 797 | const EVP_CIPHER *EVP_aes_192_cfb1(void); |
@@ -751,9 +799,9 @@ const EVP_CIPHER *EVP_aes_192_cfb8(void); | |||
751 | const EVP_CIPHER *EVP_aes_192_cfb128(void); | 799 | const EVP_CIPHER *EVP_aes_192_cfb128(void); |
752 | # define EVP_aes_192_cfb EVP_aes_192_cfb128 | 800 | # define EVP_aes_192_cfb EVP_aes_192_cfb128 |
753 | const EVP_CIPHER *EVP_aes_192_ofb(void); | 801 | const EVP_CIPHER *EVP_aes_192_ofb(void); |
754 | #if 0 | ||
755 | const EVP_CIPHER *EVP_aes_192_ctr(void); | 802 | const EVP_CIPHER *EVP_aes_192_ctr(void); |
756 | #endif | 803 | const EVP_CIPHER *EVP_aes_192_gcm(void); |
804 | const EVP_CIPHER *EVP_aes_192_ccm(void); | ||
757 | const EVP_CIPHER *EVP_aes_256_ecb(void); | 805 | const EVP_CIPHER *EVP_aes_256_ecb(void); |
758 | const EVP_CIPHER *EVP_aes_256_cbc(void); | 806 | const EVP_CIPHER *EVP_aes_256_cbc(void); |
759 | const EVP_CIPHER *EVP_aes_256_cfb1(void); | 807 | const EVP_CIPHER *EVP_aes_256_cfb1(void); |
@@ -761,8 +809,13 @@ const EVP_CIPHER *EVP_aes_256_cfb8(void); | |||
761 | const EVP_CIPHER *EVP_aes_256_cfb128(void); | 809 | const EVP_CIPHER *EVP_aes_256_cfb128(void); |
762 | # define EVP_aes_256_cfb EVP_aes_256_cfb128 | 810 | # define EVP_aes_256_cfb EVP_aes_256_cfb128 |
763 | const EVP_CIPHER *EVP_aes_256_ofb(void); | 811 | const EVP_CIPHER *EVP_aes_256_ofb(void); |
764 | #if 0 | ||
765 | const EVP_CIPHER *EVP_aes_256_ctr(void); | 812 | const EVP_CIPHER *EVP_aes_256_ctr(void); |
813 | const EVP_CIPHER *EVP_aes_256_gcm(void); | ||
814 | const EVP_CIPHER *EVP_aes_256_ccm(void); | ||
815 | const EVP_CIPHER *EVP_aes_256_xts(void); | ||
816 | #if !defined(OPENSSL_NO_SHA) && !defined(OPENSSL_NO_SHA1) | ||
817 | const EVP_CIPHER *EVP_aes_128_cbc_hmac_sha1(void); | ||
818 | const EVP_CIPHER *EVP_aes_256_cbc_hmac_sha1(void); | ||
766 | #endif | 819 | #endif |
767 | #endif | 820 | #endif |
768 | #ifndef OPENSSL_NO_CAMELLIA | 821 | #ifndef OPENSSL_NO_CAMELLIA |
@@ -1047,13 +1100,22 @@ void EVP_PKEY_asn1_set_ctrl(EVP_PKEY_ASN1_METHOD *ameth, | |||
1047 | #define EVP_PKEY_CTRL_CMS_DECRYPT 10 | 1100 | #define EVP_PKEY_CTRL_CMS_DECRYPT 10 |
1048 | #define EVP_PKEY_CTRL_CMS_SIGN 11 | 1101 | #define EVP_PKEY_CTRL_CMS_SIGN 11 |
1049 | 1102 | ||
1103 | #define EVP_PKEY_CTRL_CIPHER 12 | ||
1104 | |||
1050 | #define EVP_PKEY_ALG_CTRL 0x1000 | 1105 | #define EVP_PKEY_ALG_CTRL 0x1000 |
1051 | 1106 | ||
1052 | 1107 | ||
1053 | #define EVP_PKEY_FLAG_AUTOARGLEN 2 | 1108 | #define EVP_PKEY_FLAG_AUTOARGLEN 2 |
1109 | /* Method handles all operations: don't assume any digest related | ||
1110 | * defaults. | ||
1111 | */ | ||
1112 | #define EVP_PKEY_FLAG_SIGCTX_CUSTOM 4 | ||
1054 | 1113 | ||
1055 | const EVP_PKEY_METHOD *EVP_PKEY_meth_find(int type); | 1114 | const EVP_PKEY_METHOD *EVP_PKEY_meth_find(int type); |
1056 | EVP_PKEY_METHOD* EVP_PKEY_meth_new(int id, int flags); | 1115 | EVP_PKEY_METHOD* EVP_PKEY_meth_new(int id, int flags); |
1116 | void EVP_PKEY_meth_get0_info(int *ppkey_id, int *pflags, | ||
1117 | const EVP_PKEY_METHOD *meth); | ||
1118 | void EVP_PKEY_meth_copy(EVP_PKEY_METHOD *dst, const EVP_PKEY_METHOD *src); | ||
1057 | void EVP_PKEY_meth_free(EVP_PKEY_METHOD *pmeth); | 1119 | void EVP_PKEY_meth_free(EVP_PKEY_METHOD *pmeth); |
1058 | int EVP_PKEY_meth_add0(const EVP_PKEY_METHOD *pmeth); | 1120 | int EVP_PKEY_meth_add0(const EVP_PKEY_METHOD *pmeth); |
1059 | 1121 | ||
@@ -1071,7 +1133,7 @@ int EVP_PKEY_CTX_get_operation(EVP_PKEY_CTX *ctx); | |||
1071 | void EVP_PKEY_CTX_set0_keygen_info(EVP_PKEY_CTX *ctx, int *dat, int datlen); | 1133 | void EVP_PKEY_CTX_set0_keygen_info(EVP_PKEY_CTX *ctx, int *dat, int datlen); |
1072 | 1134 | ||
1073 | EVP_PKEY *EVP_PKEY_new_mac_key(int type, ENGINE *e, | 1135 | EVP_PKEY *EVP_PKEY_new_mac_key(int type, ENGINE *e, |
1074 | unsigned char *key, int keylen); | 1136 | const unsigned char *key, int keylen); |
1075 | 1137 | ||
1076 | void EVP_PKEY_CTX_set_data(EVP_PKEY_CTX *ctx, void *data); | 1138 | void EVP_PKEY_CTX_set_data(EVP_PKEY_CTX *ctx, void *data); |
1077 | void *EVP_PKEY_CTX_get_data(EVP_PKEY_CTX *ctx); | 1139 | void *EVP_PKEY_CTX_get_data(EVP_PKEY_CTX *ctx); |
@@ -1190,8 +1252,13 @@ void ERR_load_EVP_strings(void); | |||
1190 | /* Error codes for the EVP functions. */ | 1252 | /* Error codes for the EVP functions. */ |
1191 | 1253 | ||
1192 | /* Function codes. */ | 1254 | /* Function codes. */ |
1255 | #define EVP_F_AESNI_INIT_KEY 165 | ||
1256 | #define EVP_F_AESNI_XTS_CIPHER 176 | ||
1193 | #define EVP_F_AES_INIT_KEY 133 | 1257 | #define EVP_F_AES_INIT_KEY 133 |
1258 | #define EVP_F_AES_XTS 172 | ||
1259 | #define EVP_F_AES_XTS_CIPHER 175 | ||
1194 | #define EVP_F_CAMELLIA_INIT_KEY 159 | 1260 | #define EVP_F_CAMELLIA_INIT_KEY 159 |
1261 | #define EVP_F_CMAC_INIT 173 | ||
1195 | #define EVP_F_D2I_PKEY 100 | 1262 | #define EVP_F_D2I_PKEY 100 |
1196 | #define EVP_F_DO_SIGVER_INIT 161 | 1263 | #define EVP_F_DO_SIGVER_INIT 161 |
1197 | #define EVP_F_DSAPKEY2PKCS8 134 | 1264 | #define EVP_F_DSAPKEY2PKCS8 134 |
@@ -1246,15 +1313,24 @@ void ERR_load_EVP_strings(void); | |||
1246 | #define EVP_F_EVP_RIJNDAEL 126 | 1313 | #define EVP_F_EVP_RIJNDAEL 126 |
1247 | #define EVP_F_EVP_SIGNFINAL 107 | 1314 | #define EVP_F_EVP_SIGNFINAL 107 |
1248 | #define EVP_F_EVP_VERIFYFINAL 108 | 1315 | #define EVP_F_EVP_VERIFYFINAL 108 |
1316 | #define EVP_F_FIPS_CIPHERINIT 166 | ||
1317 | #define EVP_F_FIPS_CIPHER_CTX_COPY 170 | ||
1318 | #define EVP_F_FIPS_CIPHER_CTX_CTRL 167 | ||
1319 | #define EVP_F_FIPS_CIPHER_CTX_SET_KEY_LENGTH 171 | ||
1320 | #define EVP_F_FIPS_DIGESTINIT 168 | ||
1321 | #define EVP_F_FIPS_MD_CTX_COPY 169 | ||
1322 | #define EVP_F_HMAC_INIT_EX 174 | ||
1249 | #define EVP_F_INT_CTX_NEW 157 | 1323 | #define EVP_F_INT_CTX_NEW 157 |
1250 | #define EVP_F_PKCS5_PBE_KEYIVGEN 117 | 1324 | #define EVP_F_PKCS5_PBE_KEYIVGEN 117 |
1251 | #define EVP_F_PKCS5_V2_PBE_KEYIVGEN 118 | 1325 | #define EVP_F_PKCS5_V2_PBE_KEYIVGEN 118 |
1326 | #define EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN 164 | ||
1252 | #define EVP_F_PKCS8_SET_BROKEN 112 | 1327 | #define EVP_F_PKCS8_SET_BROKEN 112 |
1253 | #define EVP_F_PKEY_SET_TYPE 158 | 1328 | #define EVP_F_PKEY_SET_TYPE 158 |
1254 | #define EVP_F_RC2_MAGIC_TO_METH 109 | 1329 | #define EVP_F_RC2_MAGIC_TO_METH 109 |
1255 | #define EVP_F_RC5_CTRL 125 | 1330 | #define EVP_F_RC5_CTRL 125 |
1256 | 1331 | ||
1257 | /* Reason codes. */ | 1332 | /* Reason codes. */ |
1333 | #define EVP_R_AES_IV_SETUP_FAILED 162 | ||
1258 | #define EVP_R_AES_KEY_SETUP_FAILED 143 | 1334 | #define EVP_R_AES_KEY_SETUP_FAILED 143 |
1259 | #define EVP_R_ASN1_LIB 140 | 1335 | #define EVP_R_ASN1_LIB 140 |
1260 | #define EVP_R_BAD_BLOCK_LENGTH 136 | 1336 | #define EVP_R_BAD_BLOCK_LENGTH 136 |
@@ -1272,6 +1348,7 @@ void ERR_load_EVP_strings(void); | |||
1272 | #define EVP_R_DECODE_ERROR 114 | 1348 | #define EVP_R_DECODE_ERROR 114 |
1273 | #define EVP_R_DIFFERENT_KEY_TYPES 101 | 1349 | #define EVP_R_DIFFERENT_KEY_TYPES 101 |
1274 | #define EVP_R_DIFFERENT_PARAMETERS 153 | 1350 | #define EVP_R_DIFFERENT_PARAMETERS 153 |
1351 | #define EVP_R_DISABLED_FOR_FIPS 163 | ||
1275 | #define EVP_R_ENCODE_ERROR 115 | 1352 | #define EVP_R_ENCODE_ERROR 115 |
1276 | #define EVP_R_EVP_PBE_CIPHERINIT_ERROR 119 | 1353 | #define EVP_R_EVP_PBE_CIPHERINIT_ERROR 119 |
1277 | #define EVP_R_EXPECTING_AN_RSA_KEY 127 | 1354 | #define EVP_R_EXPECTING_AN_RSA_KEY 127 |
@@ -1303,6 +1380,7 @@ void ERR_load_EVP_strings(void); | |||
1303 | #define EVP_R_PRIVATE_KEY_DECODE_ERROR 145 | 1380 | #define EVP_R_PRIVATE_KEY_DECODE_ERROR 145 |
1304 | #define EVP_R_PRIVATE_KEY_ENCODE_ERROR 146 | 1381 | #define EVP_R_PRIVATE_KEY_ENCODE_ERROR 146 |
1305 | #define EVP_R_PUBLIC_KEY_NOT_RSA 106 | 1382 | #define EVP_R_PUBLIC_KEY_NOT_RSA 106 |
1383 | #define EVP_R_TOO_LARGE 164 | ||
1306 | #define EVP_R_UNKNOWN_CIPHER 160 | 1384 | #define EVP_R_UNKNOWN_CIPHER 160 |
1307 | #define EVP_R_UNKNOWN_DIGEST 161 | 1385 | #define EVP_R_UNKNOWN_DIGEST 161 |
1308 | #define EVP_R_UNKNOWN_PBE_ALGORITHM 121 | 1386 | #define EVP_R_UNKNOWN_PBE_ALGORITHM 121 |
diff --git a/src/lib/libcrypto/evp/evp_enc.c b/src/lib/libcrypto/evp/evp_enc.c index c268d25cb4..0c54f05e6e 100644 --- a/src/lib/libcrypto/evp/evp_enc.c +++ b/src/lib/libcrypto/evp/evp_enc.c | |||
@@ -64,8 +64,18 @@ | |||
64 | #ifndef OPENSSL_NO_ENGINE | 64 | #ifndef OPENSSL_NO_ENGINE |
65 | #include <openssl/engine.h> | 65 | #include <openssl/engine.h> |
66 | #endif | 66 | #endif |
67 | #ifdef OPENSSL_FIPS | ||
68 | #include <openssl/fips.h> | ||
69 | #endif | ||
67 | #include "evp_locl.h" | 70 | #include "evp_locl.h" |
68 | 71 | ||
72 | #ifdef OPENSSL_FIPS | ||
73 | #define M_do_cipher(ctx, out, in, inl) FIPS_cipher(ctx, out, in, inl) | ||
74 | #else | ||
75 | #define M_do_cipher(ctx, out, in, inl) ctx->cipher->do_cipher(ctx, out, in, inl) | ||
76 | #endif | ||
77 | |||
78 | |||
69 | const char EVP_version[]="EVP" OPENSSL_VERSION_PTEXT; | 79 | const char EVP_version[]="EVP" OPENSSL_VERSION_PTEXT; |
70 | 80 | ||
71 | void EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *ctx) | 81 | void EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *ctx) |
@@ -115,10 +125,14 @@ int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *imp | |||
115 | /* Ensure a context left lying around from last time is cleared | 125 | /* Ensure a context left lying around from last time is cleared |
116 | * (the previous check attempted to avoid this if the same | 126 | * (the previous check attempted to avoid this if the same |
117 | * ENGINE and EVP_CIPHER could be used). */ | 127 | * ENGINE and EVP_CIPHER could be used). */ |
118 | EVP_CIPHER_CTX_cleanup(ctx); | 128 | if (ctx->cipher) |
119 | 129 | { | |
120 | /* Restore encrypt field: it is zeroed by cleanup */ | 130 | unsigned long flags = ctx->flags; |
121 | ctx->encrypt = enc; | 131 | EVP_CIPHER_CTX_cleanup(ctx); |
132 | /* Restore encrypt and flags */ | ||
133 | ctx->encrypt = enc; | ||
134 | ctx->flags = flags; | ||
135 | } | ||
122 | #ifndef OPENSSL_NO_ENGINE | 136 | #ifndef OPENSSL_NO_ENGINE |
123 | if(impl) | 137 | if(impl) |
124 | { | 138 | { |
@@ -155,6 +169,10 @@ int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *imp | |||
155 | ctx->engine = NULL; | 169 | ctx->engine = NULL; |
156 | #endif | 170 | #endif |
157 | 171 | ||
172 | #ifdef OPENSSL_FIPS | ||
173 | if (FIPS_mode()) | ||
174 | return FIPS_cipherinit(ctx, cipher, key, iv, enc); | ||
175 | #endif | ||
158 | ctx->cipher=cipher; | 176 | ctx->cipher=cipher; |
159 | if (ctx->cipher->ctx_size) | 177 | if (ctx->cipher->ctx_size) |
160 | { | 178 | { |
@@ -188,6 +206,10 @@ int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *imp | |||
188 | #ifndef OPENSSL_NO_ENGINE | 206 | #ifndef OPENSSL_NO_ENGINE |
189 | skip_to_init: | 207 | skip_to_init: |
190 | #endif | 208 | #endif |
209 | #ifdef OPENSSL_FIPS | ||
210 | if (FIPS_mode()) | ||
211 | return FIPS_cipherinit(ctx, cipher, key, iv, enc); | ||
212 | #endif | ||
191 | /* we assume block size is a power of 2 in *cryptUpdate */ | 213 | /* we assume block size is a power of 2 in *cryptUpdate */ |
192 | OPENSSL_assert(ctx->cipher->block_size == 1 | 214 | OPENSSL_assert(ctx->cipher->block_size == 1 |
193 | || ctx->cipher->block_size == 8 | 215 | || ctx->cipher->block_size == 8 |
@@ -214,6 +236,13 @@ skip_to_init: | |||
214 | memcpy(ctx->iv, ctx->oiv, EVP_CIPHER_CTX_iv_length(ctx)); | 236 | memcpy(ctx->iv, ctx->oiv, EVP_CIPHER_CTX_iv_length(ctx)); |
215 | break; | 237 | break; |
216 | 238 | ||
239 | case EVP_CIPH_CTR_MODE: | ||
240 | ctx->num = 0; | ||
241 | /* Don't reuse IV for CTR mode */ | ||
242 | if(iv) | ||
243 | memcpy(ctx->iv, iv, EVP_CIPHER_CTX_iv_length(ctx)); | ||
244 | break; | ||
245 | |||
217 | default: | 246 | default: |
218 | return 0; | 247 | return 0; |
219 | break; | 248 | break; |
@@ -280,6 +309,16 @@ int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |||
280 | { | 309 | { |
281 | int i,j,bl; | 310 | int i,j,bl; |
282 | 311 | ||
312 | if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) | ||
313 | { | ||
314 | i = M_do_cipher(ctx, out, in, inl); | ||
315 | if (i < 0) | ||
316 | return 0; | ||
317 | else | ||
318 | *outl = i; | ||
319 | return 1; | ||
320 | } | ||
321 | |||
283 | if (inl <= 0) | 322 | if (inl <= 0) |
284 | { | 323 | { |
285 | *outl = 0; | 324 | *outl = 0; |
@@ -288,7 +327,7 @@ int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |||
288 | 327 | ||
289 | if(ctx->buf_len == 0 && (inl&(ctx->block_mask)) == 0) | 328 | if(ctx->buf_len == 0 && (inl&(ctx->block_mask)) == 0) |
290 | { | 329 | { |
291 | if(ctx->cipher->do_cipher(ctx,out,in,inl)) | 330 | if(M_do_cipher(ctx,out,in,inl)) |
292 | { | 331 | { |
293 | *outl=inl; | 332 | *outl=inl; |
294 | return 1; | 333 | return 1; |
@@ -315,7 +354,7 @@ int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |||
315 | { | 354 | { |
316 | j=bl-i; | 355 | j=bl-i; |
317 | memcpy(&(ctx->buf[i]),in,j); | 356 | memcpy(&(ctx->buf[i]),in,j); |
318 | if(!ctx->cipher->do_cipher(ctx,out,ctx->buf,bl)) return 0; | 357 | if(!M_do_cipher(ctx,out,ctx->buf,bl)) return 0; |
319 | inl-=j; | 358 | inl-=j; |
320 | in+=j; | 359 | in+=j; |
321 | out+=bl; | 360 | out+=bl; |
@@ -328,7 +367,7 @@ int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |||
328 | inl-=i; | 367 | inl-=i; |
329 | if (inl > 0) | 368 | if (inl > 0) |
330 | { | 369 | { |
331 | if(!ctx->cipher->do_cipher(ctx,out,in,inl)) return 0; | 370 | if(!M_do_cipher(ctx,out,in,inl)) return 0; |
332 | *outl+=inl; | 371 | *outl+=inl; |
333 | } | 372 | } |
334 | 373 | ||
@@ -350,6 +389,16 @@ int EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
350 | int n,ret; | 389 | int n,ret; |
351 | unsigned int i, b, bl; | 390 | unsigned int i, b, bl; |
352 | 391 | ||
392 | if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) | ||
393 | { | ||
394 | ret = M_do_cipher(ctx, out, NULL, 0); | ||
395 | if (ret < 0) | ||
396 | return 0; | ||
397 | else | ||
398 | *outl = ret; | ||
399 | return 1; | ||
400 | } | ||
401 | |||
353 | b=ctx->cipher->block_size; | 402 | b=ctx->cipher->block_size; |
354 | OPENSSL_assert(b <= sizeof ctx->buf); | 403 | OPENSSL_assert(b <= sizeof ctx->buf); |
355 | if (b == 1) | 404 | if (b == 1) |
@@ -372,7 +421,7 @@ int EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
372 | n=b-bl; | 421 | n=b-bl; |
373 | for (i=bl; i<b; i++) | 422 | for (i=bl; i<b; i++) |
374 | ctx->buf[i]=n; | 423 | ctx->buf[i]=n; |
375 | ret=ctx->cipher->do_cipher(ctx,out,ctx->buf,b); | 424 | ret=M_do_cipher(ctx,out,ctx->buf,b); |
376 | 425 | ||
377 | 426 | ||
378 | if(ret) | 427 | if(ret) |
@@ -387,6 +436,19 @@ int EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |||
387 | int fix_len; | 436 | int fix_len; |
388 | unsigned int b; | 437 | unsigned int b; |
389 | 438 | ||
439 | if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) | ||
440 | { | ||
441 | fix_len = M_do_cipher(ctx, out, in, inl); | ||
442 | if (fix_len < 0) | ||
443 | { | ||
444 | *outl = 0; | ||
445 | return 0; | ||
446 | } | ||
447 | else | ||
448 | *outl = fix_len; | ||
449 | return 1; | ||
450 | } | ||
451 | |||
390 | if (inl <= 0) | 452 | if (inl <= 0) |
391 | { | 453 | { |
392 | *outl = 0; | 454 | *outl = 0; |
@@ -440,8 +502,18 @@ int EVP_DecryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
440 | { | 502 | { |
441 | int i,n; | 503 | int i,n; |
442 | unsigned int b; | 504 | unsigned int b; |
443 | |||
444 | *outl=0; | 505 | *outl=0; |
506 | |||
507 | if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) | ||
508 | { | ||
509 | i = M_do_cipher(ctx, out, NULL, 0); | ||
510 | if (i < 0) | ||
511 | return 0; | ||
512 | else | ||
513 | *outl = i; | ||
514 | return 1; | ||
515 | } | ||
516 | |||
445 | b=ctx->cipher->block_size; | 517 | b=ctx->cipher->block_size; |
446 | if (ctx->flags & EVP_CIPH_NO_PADDING) | 518 | if (ctx->flags & EVP_CIPH_NO_PADDING) |
447 | { | 519 | { |
@@ -496,6 +568,7 @@ void EVP_CIPHER_CTX_free(EVP_CIPHER_CTX *ctx) | |||
496 | 568 | ||
497 | int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c) | 569 | int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c) |
498 | { | 570 | { |
571 | #ifndef OPENSSL_FIPS | ||
499 | if (c->cipher != NULL) | 572 | if (c->cipher != NULL) |
500 | { | 573 | { |
501 | if(c->cipher->cleanup && !c->cipher->cleanup(c)) | 574 | if(c->cipher->cleanup && !c->cipher->cleanup(c)) |
@@ -506,12 +579,16 @@ int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c) | |||
506 | } | 579 | } |
507 | if (c->cipher_data) | 580 | if (c->cipher_data) |
508 | OPENSSL_free(c->cipher_data); | 581 | OPENSSL_free(c->cipher_data); |
582 | #endif | ||
509 | #ifndef OPENSSL_NO_ENGINE | 583 | #ifndef OPENSSL_NO_ENGINE |
510 | if (c->engine) | 584 | if (c->engine) |
511 | /* The EVP_CIPHER we used belongs to an ENGINE, release the | 585 | /* The EVP_CIPHER we used belongs to an ENGINE, release the |
512 | * functional reference we held for this reason. */ | 586 | * functional reference we held for this reason. */ |
513 | ENGINE_finish(c->engine); | 587 | ENGINE_finish(c->engine); |
514 | #endif | 588 | #endif |
589 | #ifdef OPENSSL_FIPS | ||
590 | FIPS_cipher_ctx_cleanup(c); | ||
591 | #endif | ||
515 | memset(c,0,sizeof(EVP_CIPHER_CTX)); | 592 | memset(c,0,sizeof(EVP_CIPHER_CTX)); |
516 | return 1; | 593 | return 1; |
517 | } | 594 | } |
diff --git a/src/lib/libcrypto/evp/evp_err.c b/src/lib/libcrypto/evp/evp_err.c index d8bfec0959..db0f76d59b 100644 --- a/src/lib/libcrypto/evp/evp_err.c +++ b/src/lib/libcrypto/evp/evp_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/evp/evp_err.c */ | 1 | /* crypto/evp/evp_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999-2008 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -70,8 +70,13 @@ | |||
70 | 70 | ||
71 | static ERR_STRING_DATA EVP_str_functs[]= | 71 | static ERR_STRING_DATA EVP_str_functs[]= |
72 | { | 72 | { |
73 | {ERR_FUNC(EVP_F_AESNI_INIT_KEY), "AESNI_INIT_KEY"}, | ||
74 | {ERR_FUNC(EVP_F_AESNI_XTS_CIPHER), "AESNI_XTS_CIPHER"}, | ||
73 | {ERR_FUNC(EVP_F_AES_INIT_KEY), "AES_INIT_KEY"}, | 75 | {ERR_FUNC(EVP_F_AES_INIT_KEY), "AES_INIT_KEY"}, |
76 | {ERR_FUNC(EVP_F_AES_XTS), "AES_XTS"}, | ||
77 | {ERR_FUNC(EVP_F_AES_XTS_CIPHER), "AES_XTS_CIPHER"}, | ||
74 | {ERR_FUNC(EVP_F_CAMELLIA_INIT_KEY), "CAMELLIA_INIT_KEY"}, | 78 | {ERR_FUNC(EVP_F_CAMELLIA_INIT_KEY), "CAMELLIA_INIT_KEY"}, |
79 | {ERR_FUNC(EVP_F_CMAC_INIT), "CMAC_INIT"}, | ||
75 | {ERR_FUNC(EVP_F_D2I_PKEY), "D2I_PKEY"}, | 80 | {ERR_FUNC(EVP_F_D2I_PKEY), "D2I_PKEY"}, |
76 | {ERR_FUNC(EVP_F_DO_SIGVER_INIT), "DO_SIGVER_INIT"}, | 81 | {ERR_FUNC(EVP_F_DO_SIGVER_INIT), "DO_SIGVER_INIT"}, |
77 | {ERR_FUNC(EVP_F_DSAPKEY2PKCS8), "DSAPKEY2PKCS8"}, | 82 | {ERR_FUNC(EVP_F_DSAPKEY2PKCS8), "DSAPKEY2PKCS8"}, |
@@ -86,7 +91,7 @@ static ERR_STRING_DATA EVP_str_functs[]= | |||
86 | {ERR_FUNC(EVP_F_EVP_DIGESTINIT_EX), "EVP_DigestInit_ex"}, | 91 | {ERR_FUNC(EVP_F_EVP_DIGESTINIT_EX), "EVP_DigestInit_ex"}, |
87 | {ERR_FUNC(EVP_F_EVP_ENCRYPTFINAL_EX), "EVP_EncryptFinal_ex"}, | 92 | {ERR_FUNC(EVP_F_EVP_ENCRYPTFINAL_EX), "EVP_EncryptFinal_ex"}, |
88 | {ERR_FUNC(EVP_F_EVP_MD_CTX_COPY_EX), "EVP_MD_CTX_copy_ex"}, | 93 | {ERR_FUNC(EVP_F_EVP_MD_CTX_COPY_EX), "EVP_MD_CTX_copy_ex"}, |
89 | {ERR_FUNC(EVP_F_EVP_MD_SIZE), "EVP_MD_SIZE"}, | 94 | {ERR_FUNC(EVP_F_EVP_MD_SIZE), "EVP_MD_size"}, |
90 | {ERR_FUNC(EVP_F_EVP_OPENINIT), "EVP_OpenInit"}, | 95 | {ERR_FUNC(EVP_F_EVP_OPENINIT), "EVP_OpenInit"}, |
91 | {ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD), "EVP_PBE_alg_add"}, | 96 | {ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD), "EVP_PBE_alg_add"}, |
92 | {ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD_TYPE), "EVP_PBE_alg_add_type"}, | 97 | {ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD_TYPE), "EVP_PBE_alg_add_type"}, |
@@ -126,9 +131,17 @@ static ERR_STRING_DATA EVP_str_functs[]= | |||
126 | {ERR_FUNC(EVP_F_EVP_RIJNDAEL), "EVP_RIJNDAEL"}, | 131 | {ERR_FUNC(EVP_F_EVP_RIJNDAEL), "EVP_RIJNDAEL"}, |
127 | {ERR_FUNC(EVP_F_EVP_SIGNFINAL), "EVP_SignFinal"}, | 132 | {ERR_FUNC(EVP_F_EVP_SIGNFINAL), "EVP_SignFinal"}, |
128 | {ERR_FUNC(EVP_F_EVP_VERIFYFINAL), "EVP_VerifyFinal"}, | 133 | {ERR_FUNC(EVP_F_EVP_VERIFYFINAL), "EVP_VerifyFinal"}, |
134 | {ERR_FUNC(EVP_F_FIPS_CIPHERINIT), "FIPS_CIPHERINIT"}, | ||
135 | {ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_COPY), "FIPS_CIPHER_CTX_COPY"}, | ||
136 | {ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_CTRL), "FIPS_CIPHER_CTX_CTRL"}, | ||
137 | {ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_SET_KEY_LENGTH), "FIPS_CIPHER_CTX_SET_KEY_LENGTH"}, | ||
138 | {ERR_FUNC(EVP_F_FIPS_DIGESTINIT), "FIPS_DIGESTINIT"}, | ||
139 | {ERR_FUNC(EVP_F_FIPS_MD_CTX_COPY), "FIPS_MD_CTX_COPY"}, | ||
140 | {ERR_FUNC(EVP_F_HMAC_INIT_EX), "HMAC_Init_ex"}, | ||
129 | {ERR_FUNC(EVP_F_INT_CTX_NEW), "INT_CTX_NEW"}, | 141 | {ERR_FUNC(EVP_F_INT_CTX_NEW), "INT_CTX_NEW"}, |
130 | {ERR_FUNC(EVP_F_PKCS5_PBE_KEYIVGEN), "PKCS5_PBE_keyivgen"}, | 142 | {ERR_FUNC(EVP_F_PKCS5_PBE_KEYIVGEN), "PKCS5_PBE_keyivgen"}, |
131 | {ERR_FUNC(EVP_F_PKCS5_V2_PBE_KEYIVGEN), "PKCS5_v2_PBE_keyivgen"}, | 143 | {ERR_FUNC(EVP_F_PKCS5_V2_PBE_KEYIVGEN), "PKCS5_v2_PBE_keyivgen"}, |
144 | {ERR_FUNC(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN), "PKCS5_V2_PBKDF2_KEYIVGEN"}, | ||
132 | {ERR_FUNC(EVP_F_PKCS8_SET_BROKEN), "PKCS8_set_broken"}, | 145 | {ERR_FUNC(EVP_F_PKCS8_SET_BROKEN), "PKCS8_set_broken"}, |
133 | {ERR_FUNC(EVP_F_PKEY_SET_TYPE), "PKEY_SET_TYPE"}, | 146 | {ERR_FUNC(EVP_F_PKEY_SET_TYPE), "PKEY_SET_TYPE"}, |
134 | {ERR_FUNC(EVP_F_RC2_MAGIC_TO_METH), "RC2_MAGIC_TO_METH"}, | 147 | {ERR_FUNC(EVP_F_RC2_MAGIC_TO_METH), "RC2_MAGIC_TO_METH"}, |
@@ -138,6 +151,7 @@ static ERR_STRING_DATA EVP_str_functs[]= | |||
138 | 151 | ||
139 | static ERR_STRING_DATA EVP_str_reasons[]= | 152 | static ERR_STRING_DATA EVP_str_reasons[]= |
140 | { | 153 | { |
154 | {ERR_REASON(EVP_R_AES_IV_SETUP_FAILED) ,"aes iv setup failed"}, | ||
141 | {ERR_REASON(EVP_R_AES_KEY_SETUP_FAILED) ,"aes key setup failed"}, | 155 | {ERR_REASON(EVP_R_AES_KEY_SETUP_FAILED) ,"aes key setup failed"}, |
142 | {ERR_REASON(EVP_R_ASN1_LIB) ,"asn1 lib"}, | 156 | {ERR_REASON(EVP_R_ASN1_LIB) ,"asn1 lib"}, |
143 | {ERR_REASON(EVP_R_BAD_BLOCK_LENGTH) ,"bad block length"}, | 157 | {ERR_REASON(EVP_R_BAD_BLOCK_LENGTH) ,"bad block length"}, |
@@ -155,6 +169,7 @@ static ERR_STRING_DATA EVP_str_reasons[]= | |||
155 | {ERR_REASON(EVP_R_DECODE_ERROR) ,"decode error"}, | 169 | {ERR_REASON(EVP_R_DECODE_ERROR) ,"decode error"}, |
156 | {ERR_REASON(EVP_R_DIFFERENT_KEY_TYPES) ,"different key types"}, | 170 | {ERR_REASON(EVP_R_DIFFERENT_KEY_TYPES) ,"different key types"}, |
157 | {ERR_REASON(EVP_R_DIFFERENT_PARAMETERS) ,"different parameters"}, | 171 | {ERR_REASON(EVP_R_DIFFERENT_PARAMETERS) ,"different parameters"}, |
172 | {ERR_REASON(EVP_R_DISABLED_FOR_FIPS) ,"disabled for fips"}, | ||
158 | {ERR_REASON(EVP_R_ENCODE_ERROR) ,"encode error"}, | 173 | {ERR_REASON(EVP_R_ENCODE_ERROR) ,"encode error"}, |
159 | {ERR_REASON(EVP_R_EVP_PBE_CIPHERINIT_ERROR),"evp pbe cipherinit error"}, | 174 | {ERR_REASON(EVP_R_EVP_PBE_CIPHERINIT_ERROR),"evp pbe cipherinit error"}, |
160 | {ERR_REASON(EVP_R_EXPECTING_AN_RSA_KEY) ,"expecting an rsa key"}, | 175 | {ERR_REASON(EVP_R_EXPECTING_AN_RSA_KEY) ,"expecting an rsa key"}, |
@@ -186,6 +201,7 @@ static ERR_STRING_DATA EVP_str_reasons[]= | |||
186 | {ERR_REASON(EVP_R_PRIVATE_KEY_DECODE_ERROR),"private key decode error"}, | 201 | {ERR_REASON(EVP_R_PRIVATE_KEY_DECODE_ERROR),"private key decode error"}, |
187 | {ERR_REASON(EVP_R_PRIVATE_KEY_ENCODE_ERROR),"private key encode error"}, | 202 | {ERR_REASON(EVP_R_PRIVATE_KEY_ENCODE_ERROR),"private key encode error"}, |
188 | {ERR_REASON(EVP_R_PUBLIC_KEY_NOT_RSA) ,"public key not rsa"}, | 203 | {ERR_REASON(EVP_R_PUBLIC_KEY_NOT_RSA) ,"public key not rsa"}, |
204 | {ERR_REASON(EVP_R_TOO_LARGE) ,"too large"}, | ||
189 | {ERR_REASON(EVP_R_UNKNOWN_CIPHER) ,"unknown cipher"}, | 205 | {ERR_REASON(EVP_R_UNKNOWN_CIPHER) ,"unknown cipher"}, |
190 | {ERR_REASON(EVP_R_UNKNOWN_DIGEST) ,"unknown digest"}, | 206 | {ERR_REASON(EVP_R_UNKNOWN_DIGEST) ,"unknown digest"}, |
191 | {ERR_REASON(EVP_R_UNKNOWN_PBE_ALGORITHM) ,"unknown pbe algorithm"}, | 207 | {ERR_REASON(EVP_R_UNKNOWN_PBE_ALGORITHM) ,"unknown pbe algorithm"}, |
diff --git a/src/lib/libcrypto/evp/evp_key.c b/src/lib/libcrypto/evp/evp_key.c index 839d6a3a16..7961fbebf2 100644 --- a/src/lib/libcrypto/evp/evp_key.c +++ b/src/lib/libcrypto/evp/evp_key.c | |||
@@ -120,7 +120,7 @@ int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, | |||
120 | unsigned char md_buf[EVP_MAX_MD_SIZE]; | 120 | unsigned char md_buf[EVP_MAX_MD_SIZE]; |
121 | int niv,nkey,addmd=0; | 121 | int niv,nkey,addmd=0; |
122 | unsigned int mds=0,i; | 122 | unsigned int mds=0,i; |
123 | 123 | int rv = 0; | |
124 | nkey=type->key_len; | 124 | nkey=type->key_len; |
125 | niv=type->iv_len; | 125 | niv=type->iv_len; |
126 | OPENSSL_assert(nkey <= EVP_MAX_KEY_LENGTH); | 126 | OPENSSL_assert(nkey <= EVP_MAX_KEY_LENGTH); |
@@ -134,17 +134,24 @@ int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, | |||
134 | if (!EVP_DigestInit_ex(&c,md, NULL)) | 134 | if (!EVP_DigestInit_ex(&c,md, NULL)) |
135 | return 0; | 135 | return 0; |
136 | if (addmd++) | 136 | if (addmd++) |
137 | EVP_DigestUpdate(&c,&(md_buf[0]),mds); | 137 | if (!EVP_DigestUpdate(&c,&(md_buf[0]),mds)) |
138 | EVP_DigestUpdate(&c,data,datal); | 138 | goto err; |
139 | if (!EVP_DigestUpdate(&c,data,datal)) | ||
140 | goto err; | ||
139 | if (salt != NULL) | 141 | if (salt != NULL) |
140 | EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN); | 142 | if (!EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN)) |
141 | EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds); | 143 | goto err; |
144 | if (!EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds)) | ||
145 | goto err; | ||
142 | 146 | ||
143 | for (i=1; i<(unsigned int)count; i++) | 147 | for (i=1; i<(unsigned int)count; i++) |
144 | { | 148 | { |
145 | EVP_DigestInit_ex(&c,md, NULL); | 149 | if (!EVP_DigestInit_ex(&c,md, NULL)) |
146 | EVP_DigestUpdate(&c,&(md_buf[0]),mds); | 150 | goto err; |
147 | EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds); | 151 | if (!EVP_DigestUpdate(&c,&(md_buf[0]),mds)) |
152 | goto err; | ||
153 | if (!EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds)) | ||
154 | goto err; | ||
148 | } | 155 | } |
149 | i=0; | 156 | i=0; |
150 | if (nkey) | 157 | if (nkey) |
@@ -173,8 +180,10 @@ int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, | |||
173 | } | 180 | } |
174 | if ((nkey == 0) && (niv == 0)) break; | 181 | if ((nkey == 0) && (niv == 0)) break; |
175 | } | 182 | } |
183 | rv = type->key_len; | ||
184 | err: | ||
176 | EVP_MD_CTX_cleanup(&c); | 185 | EVP_MD_CTX_cleanup(&c); |
177 | OPENSSL_cleanse(&(md_buf[0]),EVP_MAX_MD_SIZE); | 186 | OPENSSL_cleanse(&(md_buf[0]),EVP_MAX_MD_SIZE); |
178 | return(type->key_len); | 187 | return rv; |
179 | } | 188 | } |
180 | 189 | ||
diff --git a/src/lib/libcrypto/evp/evp_lib.c b/src/lib/libcrypto/evp/evp_lib.c index 40951a04f0..b180e4828a 100644 --- a/src/lib/libcrypto/evp/evp_lib.c +++ b/src/lib/libcrypto/evp/evp_lib.c | |||
@@ -67,6 +67,8 @@ int EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
67 | 67 | ||
68 | if (c->cipher->set_asn1_parameters != NULL) | 68 | if (c->cipher->set_asn1_parameters != NULL) |
69 | ret=c->cipher->set_asn1_parameters(c,type); | 69 | ret=c->cipher->set_asn1_parameters(c,type); |
70 | else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) | ||
71 | ret=EVP_CIPHER_set_asn1_iv(c, type); | ||
70 | else | 72 | else |
71 | ret=-1; | 73 | ret=-1; |
72 | return(ret); | 74 | return(ret); |
@@ -78,6 +80,8 @@ int EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
78 | 80 | ||
79 | if (c->cipher->get_asn1_parameters != NULL) | 81 | if (c->cipher->get_asn1_parameters != NULL) |
80 | ret=c->cipher->get_asn1_parameters(c,type); | 82 | ret=c->cipher->get_asn1_parameters(c,type); |
83 | else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) | ||
84 | ret=EVP_CIPHER_get_asn1_iv(c, type); | ||
81 | else | 85 | else |
82 | ret=-1; | 86 | ret=-1; |
83 | return(ret); | 87 | return(ret); |
diff --git a/src/lib/libcrypto/evp/evp_locl.h b/src/lib/libcrypto/evp/evp_locl.h index 292d74c188..08c0a66d39 100644 --- a/src/lib/libcrypto/evp/evp_locl.h +++ b/src/lib/libcrypto/evp/evp_locl.h | |||
@@ -343,3 +343,43 @@ struct evp_pkey_method_st | |||
343 | } /* EVP_PKEY_METHOD */; | 343 | } /* EVP_PKEY_METHOD */; |
344 | 344 | ||
345 | void evp_pkey_set_cb_translate(BN_GENCB *cb, EVP_PKEY_CTX *ctx); | 345 | void evp_pkey_set_cb_translate(BN_GENCB *cb, EVP_PKEY_CTX *ctx); |
346 | |||
347 | int PKCS5_v2_PBKDF2_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | ||
348 | ASN1_TYPE *param, | ||
349 | const EVP_CIPHER *c, const EVP_MD *md, int en_de); | ||
350 | |||
351 | #ifdef OPENSSL_FIPS | ||
352 | |||
353 | #ifdef OPENSSL_DOING_MAKEDEPEND | ||
354 | #undef SHA1_Init | ||
355 | #undef SHA1_Update | ||
356 | #undef SHA224_Init | ||
357 | #undef SHA256_Init | ||
358 | #undef SHA384_Init | ||
359 | #undef SHA512_Init | ||
360 | #undef DES_set_key_unchecked | ||
361 | #endif | ||
362 | |||
363 | #define RIPEMD160_Init private_RIPEMD160_Init | ||
364 | #define WHIRLPOOL_Init private_WHIRLPOOL_Init | ||
365 | #define MD5_Init private_MD5_Init | ||
366 | #define MD4_Init private_MD4_Init | ||
367 | #define MD2_Init private_MD2_Init | ||
368 | #define MDC2_Init private_MDC2_Init | ||
369 | #define SHA_Init private_SHA_Init | ||
370 | #define SHA1_Init private_SHA1_Init | ||
371 | #define SHA224_Init private_SHA224_Init | ||
372 | #define SHA256_Init private_SHA256_Init | ||
373 | #define SHA384_Init private_SHA384_Init | ||
374 | #define SHA512_Init private_SHA512_Init | ||
375 | |||
376 | #define BF_set_key private_BF_set_key | ||
377 | #define CAST_set_key private_CAST_set_key | ||
378 | #define idea_set_encrypt_key private_idea_set_encrypt_key | ||
379 | #define SEED_set_key private_SEED_set_key | ||
380 | #define RC2_set_key private_RC2_set_key | ||
381 | #define RC4_set_key private_RC4_set_key | ||
382 | #define DES_set_key_unchecked private_DES_set_key_unchecked | ||
383 | #define Camellia_set_key private_Camellia_set_key | ||
384 | |||
385 | #endif | ||
diff --git a/src/lib/libcrypto/evp/evp_pbe.c b/src/lib/libcrypto/evp/evp_pbe.c index c9d932d205..f8c32d825e 100644 --- a/src/lib/libcrypto/evp/evp_pbe.c +++ b/src/lib/libcrypto/evp/evp_pbe.c | |||
@@ -61,6 +61,7 @@ | |||
61 | #include <openssl/evp.h> | 61 | #include <openssl/evp.h> |
62 | #include <openssl/pkcs12.h> | 62 | #include <openssl/pkcs12.h> |
63 | #include <openssl/x509.h> | 63 | #include <openssl/x509.h> |
64 | #include "evp_locl.h" | ||
64 | 65 | ||
65 | /* Password based encryption (PBE) functions */ | 66 | /* Password based encryption (PBE) functions */ |
66 | 67 | ||
@@ -87,6 +88,10 @@ static const EVP_PBE_CTL builtin_pbe[] = | |||
87 | {EVP_PBE_TYPE_OUTER, NID_pbeWithSHA1AndRC2_CBC, | 88 | {EVP_PBE_TYPE_OUTER, NID_pbeWithSHA1AndRC2_CBC, |
88 | NID_rc2_64_cbc, NID_sha1, PKCS5_PBE_keyivgen}, | 89 | NID_rc2_64_cbc, NID_sha1, PKCS5_PBE_keyivgen}, |
89 | 90 | ||
91 | #ifndef OPENSSL_NO_HMAC | ||
92 | {EVP_PBE_TYPE_OUTER, NID_id_pbkdf2, -1, -1, PKCS5_v2_PBKDF2_keyivgen}, | ||
93 | #endif | ||
94 | |||
90 | {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And128BitRC4, | 95 | {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And128BitRC4, |
91 | NID_rc4, NID_sha1, PKCS12_PBE_keyivgen}, | 96 | NID_rc4, NID_sha1, PKCS12_PBE_keyivgen}, |
92 | {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And40BitRC4, | 97 | {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And40BitRC4, |
diff --git a/src/lib/libcrypto/evp/m_dss.c b/src/lib/libcrypto/evp/m_dss.c index 48c2689504..4ad63ada6f 100644 --- a/src/lib/libcrypto/evp/m_dss.c +++ b/src/lib/libcrypto/evp/m_dss.c | |||
@@ -66,6 +66,7 @@ | |||
66 | #endif | 66 | #endif |
67 | 67 | ||
68 | #ifndef OPENSSL_NO_SHA | 68 | #ifndef OPENSSL_NO_SHA |
69 | #ifndef OPENSSL_FIPS | ||
69 | 70 | ||
70 | static int init(EVP_MD_CTX *ctx) | 71 | static int init(EVP_MD_CTX *ctx) |
71 | { return SHA1_Init(ctx->md_data); } | 72 | { return SHA1_Init(ctx->md_data); } |
@@ -97,3 +98,4 @@ const EVP_MD *EVP_dss(void) | |||
97 | return(&dsa_md); | 98 | return(&dsa_md); |
98 | } | 99 | } |
99 | #endif | 100 | #endif |
101 | #endif | ||
diff --git a/src/lib/libcrypto/evp/m_dss1.c b/src/lib/libcrypto/evp/m_dss1.c index 4f03fb70e0..f80170efeb 100644 --- a/src/lib/libcrypto/evp/m_dss1.c +++ b/src/lib/libcrypto/evp/m_dss1.c | |||
@@ -68,6 +68,8 @@ | |||
68 | #include <openssl/dsa.h> | 68 | #include <openssl/dsa.h> |
69 | #endif | 69 | #endif |
70 | 70 | ||
71 | #ifndef OPENSSL_FIPS | ||
72 | |||
71 | static int init(EVP_MD_CTX *ctx) | 73 | static int init(EVP_MD_CTX *ctx) |
72 | { return SHA1_Init(ctx->md_data); } | 74 | { return SHA1_Init(ctx->md_data); } |
73 | 75 | ||
@@ -98,3 +100,4 @@ const EVP_MD *EVP_dss1(void) | |||
98 | return(&dss1_md); | 100 | return(&dss1_md); |
99 | } | 101 | } |
100 | #endif | 102 | #endif |
103 | #endif | ||
diff --git a/src/lib/libcrypto/evp/m_ecdsa.c b/src/lib/libcrypto/evp/m_ecdsa.c index 8d87a49ebe..4b15fb0f6c 100644 --- a/src/lib/libcrypto/evp/m_ecdsa.c +++ b/src/lib/libcrypto/evp/m_ecdsa.c | |||
@@ -116,6 +116,8 @@ | |||
116 | #include <openssl/x509.h> | 116 | #include <openssl/x509.h> |
117 | 117 | ||
118 | #ifndef OPENSSL_NO_SHA | 118 | #ifndef OPENSSL_NO_SHA |
119 | #ifndef OPENSSL_FIPS | ||
120 | |||
119 | static int init(EVP_MD_CTX *ctx) | 121 | static int init(EVP_MD_CTX *ctx) |
120 | { return SHA1_Init(ctx->md_data); } | 122 | { return SHA1_Init(ctx->md_data); } |
121 | 123 | ||
@@ -146,3 +148,4 @@ const EVP_MD *EVP_ecdsa(void) | |||
146 | return(&ecdsa_md); | 148 | return(&ecdsa_md); |
147 | } | 149 | } |
148 | #endif | 150 | #endif |
151 | #endif | ||
diff --git a/src/lib/libcrypto/evp/m_md4.c b/src/lib/libcrypto/evp/m_md4.c index 1e0b7c5b42..6d47f61b27 100644 --- a/src/lib/libcrypto/evp/m_md4.c +++ b/src/lib/libcrypto/evp/m_md4.c | |||
@@ -69,6 +69,8 @@ | |||
69 | #include <openssl/rsa.h> | 69 | #include <openssl/rsa.h> |
70 | #endif | 70 | #endif |
71 | 71 | ||
72 | #include "evp_locl.h" | ||
73 | |||
72 | static int init(EVP_MD_CTX *ctx) | 74 | static int init(EVP_MD_CTX *ctx) |
73 | { return MD4_Init(ctx->md_data); } | 75 | { return MD4_Init(ctx->md_data); } |
74 | 76 | ||
diff --git a/src/lib/libcrypto/evp/m_md5.c b/src/lib/libcrypto/evp/m_md5.c index 63c142119e..9a8bae0258 100644 --- a/src/lib/libcrypto/evp/m_md5.c +++ b/src/lib/libcrypto/evp/m_md5.c | |||
@@ -68,6 +68,7 @@ | |||
68 | #ifndef OPENSSL_NO_RSA | 68 | #ifndef OPENSSL_NO_RSA |
69 | #include <openssl/rsa.h> | 69 | #include <openssl/rsa.h> |
70 | #endif | 70 | #endif |
71 | #include "evp_locl.h" | ||
71 | 72 | ||
72 | static int init(EVP_MD_CTX *ctx) | 73 | static int init(EVP_MD_CTX *ctx) |
73 | { return MD5_Init(ctx->md_data); } | 74 | { return MD5_Init(ctx->md_data); } |
diff --git a/src/lib/libcrypto/evp/m_ripemd.c b/src/lib/libcrypto/evp/m_ripemd.c index a1d60ee78d..7bf4804cf8 100644 --- a/src/lib/libcrypto/evp/m_ripemd.c +++ b/src/lib/libcrypto/evp/m_ripemd.c | |||
@@ -68,6 +68,7 @@ | |||
68 | #ifndef OPENSSL_NO_RSA | 68 | #ifndef OPENSSL_NO_RSA |
69 | #include <openssl/rsa.h> | 69 | #include <openssl/rsa.h> |
70 | #endif | 70 | #endif |
71 | #include "evp_locl.h" | ||
71 | 72 | ||
72 | static int init(EVP_MD_CTX *ctx) | 73 | static int init(EVP_MD_CTX *ctx) |
73 | { return RIPEMD160_Init(ctx->md_data); } | 74 | { return RIPEMD160_Init(ctx->md_data); } |
diff --git a/src/lib/libcrypto/evp/m_sha1.c b/src/lib/libcrypto/evp/m_sha1.c index 9a2790fdea..3cb11f1ebb 100644 --- a/src/lib/libcrypto/evp/m_sha1.c +++ b/src/lib/libcrypto/evp/m_sha1.c | |||
@@ -59,6 +59,8 @@ | |||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
61 | 61 | ||
62 | #ifndef OPENSSL_FIPS | ||
63 | |||
62 | #ifndef OPENSSL_NO_SHA | 64 | #ifndef OPENSSL_NO_SHA |
63 | 65 | ||
64 | #include <openssl/evp.h> | 66 | #include <openssl/evp.h> |
@@ -68,6 +70,7 @@ | |||
68 | #include <openssl/rsa.h> | 70 | #include <openssl/rsa.h> |
69 | #endif | 71 | #endif |
70 | 72 | ||
73 | |||
71 | static int init(EVP_MD_CTX *ctx) | 74 | static int init(EVP_MD_CTX *ctx) |
72 | { return SHA1_Init(ctx->md_data); } | 75 | { return SHA1_Init(ctx->md_data); } |
73 | 76 | ||
@@ -202,3 +205,5 @@ static const EVP_MD sha512_md= | |||
202 | const EVP_MD *EVP_sha512(void) | 205 | const EVP_MD *EVP_sha512(void) |
203 | { return(&sha512_md); } | 206 | { return(&sha512_md); } |
204 | #endif /* ifndef OPENSSL_NO_SHA512 */ | 207 | #endif /* ifndef OPENSSL_NO_SHA512 */ |
208 | |||
209 | #endif | ||
diff --git a/src/lib/libcrypto/evp/m_wp.c b/src/lib/libcrypto/evp/m_wp.c index 1ce47c040b..c51bc2d5d1 100644 --- a/src/lib/libcrypto/evp/m_wp.c +++ b/src/lib/libcrypto/evp/m_wp.c | |||
@@ -9,6 +9,7 @@ | |||
9 | #include <openssl/objects.h> | 9 | #include <openssl/objects.h> |
10 | #include <openssl/x509.h> | 10 | #include <openssl/x509.h> |
11 | #include <openssl/whrlpool.h> | 11 | #include <openssl/whrlpool.h> |
12 | #include "evp_locl.h" | ||
12 | 13 | ||
13 | static int init(EVP_MD_CTX *ctx) | 14 | static int init(EVP_MD_CTX *ctx) |
14 | { return WHIRLPOOL_Init(ctx->md_data); } | 15 | { return WHIRLPOOL_Init(ctx->md_data); } |
diff --git a/src/lib/libcrypto/evp/names.c b/src/lib/libcrypto/evp/names.c index f2869f5c78..6311ad7cfb 100644 --- a/src/lib/libcrypto/evp/names.c +++ b/src/lib/libcrypto/evp/names.c | |||
@@ -66,6 +66,10 @@ int EVP_add_cipher(const EVP_CIPHER *c) | |||
66 | { | 66 | { |
67 | int r; | 67 | int r; |
68 | 68 | ||
69 | if (c == NULL) return 0; | ||
70 | |||
71 | OPENSSL_init(); | ||
72 | |||
69 | r=OBJ_NAME_add(OBJ_nid2sn(c->nid),OBJ_NAME_TYPE_CIPHER_METH,(const char *)c); | 73 | r=OBJ_NAME_add(OBJ_nid2sn(c->nid),OBJ_NAME_TYPE_CIPHER_METH,(const char *)c); |
70 | if (r == 0) return(0); | 74 | if (r == 0) return(0); |
71 | check_defer(c->nid); | 75 | check_defer(c->nid); |
@@ -78,6 +82,7 @@ int EVP_add_digest(const EVP_MD *md) | |||
78 | { | 82 | { |
79 | int r; | 83 | int r; |
80 | const char *name; | 84 | const char *name; |
85 | OPENSSL_init(); | ||
81 | 86 | ||
82 | name=OBJ_nid2sn(md->type); | 87 | name=OBJ_nid2sn(md->type); |
83 | r=OBJ_NAME_add(name,OBJ_NAME_TYPE_MD_METH,(const char *)md); | 88 | r=OBJ_NAME_add(name,OBJ_NAME_TYPE_MD_METH,(const char *)md); |
diff --git a/src/lib/libcrypto/evp/p5_crpt.c b/src/lib/libcrypto/evp/p5_crpt.c index 7ecfa8dad9..294cc90d87 100644 --- a/src/lib/libcrypto/evp/p5_crpt.c +++ b/src/lib/libcrypto/evp/p5_crpt.c | |||
@@ -82,6 +82,8 @@ int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, | |||
82 | unsigned char *salt; | 82 | unsigned char *salt; |
83 | const unsigned char *pbuf; | 83 | const unsigned char *pbuf; |
84 | int mdsize; | 84 | int mdsize; |
85 | int rv = 0; | ||
86 | EVP_MD_CTX_init(&ctx); | ||
85 | 87 | ||
86 | /* Extract useful info from parameter */ | 88 | /* Extract useful info from parameter */ |
87 | if (param == NULL || param->type != V_ASN1_SEQUENCE || | 89 | if (param == NULL || param->type != V_ASN1_SEQUENCE || |
@@ -104,29 +106,38 @@ int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, | |||
104 | if(!pass) passlen = 0; | 106 | if(!pass) passlen = 0; |
105 | else if(passlen == -1) passlen = strlen(pass); | 107 | else if(passlen == -1) passlen = strlen(pass); |
106 | 108 | ||
107 | EVP_MD_CTX_init(&ctx); | 109 | if (!EVP_DigestInit_ex(&ctx, md, NULL)) |
108 | EVP_DigestInit_ex(&ctx, md, NULL); | 110 | goto err; |
109 | EVP_DigestUpdate(&ctx, pass, passlen); | 111 | if (!EVP_DigestUpdate(&ctx, pass, passlen)) |
110 | EVP_DigestUpdate(&ctx, salt, saltlen); | 112 | goto err; |
113 | if (!EVP_DigestUpdate(&ctx, salt, saltlen)) | ||
114 | goto err; | ||
111 | PBEPARAM_free(pbe); | 115 | PBEPARAM_free(pbe); |
112 | EVP_DigestFinal_ex(&ctx, md_tmp, NULL); | 116 | if (!EVP_DigestFinal_ex(&ctx, md_tmp, NULL)) |
117 | goto err; | ||
113 | mdsize = EVP_MD_size(md); | 118 | mdsize = EVP_MD_size(md); |
114 | if (mdsize < 0) | 119 | if (mdsize < 0) |
115 | return 0; | 120 | return 0; |
116 | for (i = 1; i < iter; i++) { | 121 | for (i = 1; i < iter; i++) { |
117 | EVP_DigestInit_ex(&ctx, md, NULL); | 122 | if (!EVP_DigestInit_ex(&ctx, md, NULL)) |
118 | EVP_DigestUpdate(&ctx, md_tmp, mdsize); | 123 | goto err; |
119 | EVP_DigestFinal_ex (&ctx, md_tmp, NULL); | 124 | if (!EVP_DigestUpdate(&ctx, md_tmp, mdsize)) |
125 | goto err; | ||
126 | if (!EVP_DigestFinal_ex (&ctx, md_tmp, NULL)) | ||
127 | goto err; | ||
120 | } | 128 | } |
121 | EVP_MD_CTX_cleanup(&ctx); | ||
122 | OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp)); | 129 | OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp)); |
123 | memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); | 130 | memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); |
124 | OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16); | 131 | OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16); |
125 | memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), | 132 | memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), |
126 | EVP_CIPHER_iv_length(cipher)); | 133 | EVP_CIPHER_iv_length(cipher)); |
127 | EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de); | 134 | if (!EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de)) |
135 | goto err; | ||
128 | OPENSSL_cleanse(md_tmp, EVP_MAX_MD_SIZE); | 136 | OPENSSL_cleanse(md_tmp, EVP_MAX_MD_SIZE); |
129 | OPENSSL_cleanse(key, EVP_MAX_KEY_LENGTH); | 137 | OPENSSL_cleanse(key, EVP_MAX_KEY_LENGTH); |
130 | OPENSSL_cleanse(iv, EVP_MAX_IV_LENGTH); | 138 | OPENSSL_cleanse(iv, EVP_MAX_IV_LENGTH); |
131 | return 1; | 139 | rv = 1; |
140 | err: | ||
141 | EVP_MD_CTX_cleanup(&ctx); | ||
142 | return rv; | ||
132 | } | 143 | } |
diff --git a/src/lib/libcrypto/evp/p5_crpt2.c b/src/lib/libcrypto/evp/p5_crpt2.c index 334379f310..975d004df4 100644 --- a/src/lib/libcrypto/evp/p5_crpt2.c +++ b/src/lib/libcrypto/evp/p5_crpt2.c | |||
@@ -62,6 +62,7 @@ | |||
62 | #include <openssl/x509.h> | 62 | #include <openssl/x509.h> |
63 | #include <openssl/evp.h> | 63 | #include <openssl/evp.h> |
64 | #include <openssl/hmac.h> | 64 | #include <openssl/hmac.h> |
65 | #include "evp_locl.h" | ||
65 | 66 | ||
66 | /* set this to print out info about the keygen algorithm */ | 67 | /* set this to print out info about the keygen algorithm */ |
67 | /* #define DEBUG_PKCS5V2 */ | 68 | /* #define DEBUG_PKCS5V2 */ |
@@ -110,10 +111,14 @@ int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, | |||
110 | itmp[1] = (unsigned char)((i >> 16) & 0xff); | 111 | itmp[1] = (unsigned char)((i >> 16) & 0xff); |
111 | itmp[2] = (unsigned char)((i >> 8) & 0xff); | 112 | itmp[2] = (unsigned char)((i >> 8) & 0xff); |
112 | itmp[3] = (unsigned char)(i & 0xff); | 113 | itmp[3] = (unsigned char)(i & 0xff); |
113 | HMAC_Init_ex(&hctx, pass, passlen, digest, NULL); | 114 | if (!HMAC_Init_ex(&hctx, pass, passlen, digest, NULL) |
114 | HMAC_Update(&hctx, salt, saltlen); | 115 | || !HMAC_Update(&hctx, salt, saltlen) |
115 | HMAC_Update(&hctx, itmp, 4); | 116 | || !HMAC_Update(&hctx, itmp, 4) |
116 | HMAC_Final(&hctx, digtmp, NULL); | 117 | || !HMAC_Final(&hctx, digtmp, NULL)) |
118 | { | ||
119 | HMAC_CTX_cleanup(&hctx); | ||
120 | return 0; | ||
121 | } | ||
117 | memcpy(p, digtmp, cplen); | 122 | memcpy(p, digtmp, cplen); |
118 | for(j = 1; j < iter; j++) | 123 | for(j = 1; j < iter; j++) |
119 | { | 124 | { |
@@ -168,27 +173,24 @@ int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | |||
168 | ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, | 173 | ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, |
169 | int en_de) | 174 | int en_de) |
170 | { | 175 | { |
171 | unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; | ||
172 | const unsigned char *pbuf; | 176 | const unsigned char *pbuf; |
173 | int saltlen, iter, plen; | 177 | int plen; |
174 | unsigned int keylen; | ||
175 | PBE2PARAM *pbe2 = NULL; | 178 | PBE2PARAM *pbe2 = NULL; |
176 | const EVP_CIPHER *cipher; | 179 | const EVP_CIPHER *cipher; |
177 | PBKDF2PARAM *kdf = NULL; | 180 | |
178 | const EVP_MD *prfmd; | 181 | int rv = 0; |
179 | int prf_nid, hmac_md_nid; | ||
180 | 182 | ||
181 | if (param == NULL || param->type != V_ASN1_SEQUENCE || | 183 | if (param == NULL || param->type != V_ASN1_SEQUENCE || |
182 | param->value.sequence == NULL) { | 184 | param->value.sequence == NULL) { |
183 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); | 185 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); |
184 | return 0; | 186 | goto err; |
185 | } | 187 | } |
186 | 188 | ||
187 | pbuf = param->value.sequence->data; | 189 | pbuf = param->value.sequence->data; |
188 | plen = param->value.sequence->length; | 190 | plen = param->value.sequence->length; |
189 | if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) { | 191 | if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) { |
190 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); | 192 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); |
191 | return 0; | 193 | goto err; |
192 | } | 194 | } |
193 | 195 | ||
194 | /* See if we recognise the key derivation function */ | 196 | /* See if we recognise the key derivation function */ |
@@ -211,38 +213,63 @@ int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | |||
211 | } | 213 | } |
212 | 214 | ||
213 | /* Fixup cipher based on AlgorithmIdentifier */ | 215 | /* Fixup cipher based on AlgorithmIdentifier */ |
214 | EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de); | 216 | if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de)) |
217 | goto err; | ||
215 | if(EVP_CIPHER_asn1_to_param(ctx, pbe2->encryption->parameter) < 0) { | 218 | if(EVP_CIPHER_asn1_to_param(ctx, pbe2->encryption->parameter) < 0) { |
216 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, | 219 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, |
217 | EVP_R_CIPHER_PARAMETER_ERROR); | 220 | EVP_R_CIPHER_PARAMETER_ERROR); |
218 | goto err; | 221 | goto err; |
219 | } | 222 | } |
223 | rv = PKCS5_v2_PBKDF2_keyivgen(ctx, pass, passlen, | ||
224 | pbe2->keyfunc->parameter, c, md, en_de); | ||
225 | err: | ||
226 | PBE2PARAM_free(pbe2); | ||
227 | return rv; | ||
228 | } | ||
229 | |||
230 | int PKCS5_v2_PBKDF2_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | ||
231 | ASN1_TYPE *param, | ||
232 | const EVP_CIPHER *c, const EVP_MD *md, int en_de) | ||
233 | { | ||
234 | unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; | ||
235 | const unsigned char *pbuf; | ||
236 | int saltlen, iter, plen; | ||
237 | int rv = 0; | ||
238 | unsigned int keylen = 0; | ||
239 | int prf_nid, hmac_md_nid; | ||
240 | PBKDF2PARAM *kdf = NULL; | ||
241 | const EVP_MD *prfmd; | ||
242 | |||
243 | if (EVP_CIPHER_CTX_cipher(ctx) == NULL) | ||
244 | { | ||
245 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN,EVP_R_NO_CIPHER_SET); | ||
246 | goto err; | ||
247 | } | ||
220 | keylen = EVP_CIPHER_CTX_key_length(ctx); | 248 | keylen = EVP_CIPHER_CTX_key_length(ctx); |
221 | OPENSSL_assert(keylen <= sizeof key); | 249 | OPENSSL_assert(keylen <= sizeof key); |
222 | 250 | ||
223 | /* Now decode key derivation function */ | 251 | /* Decode parameter */ |
224 | 252 | ||
225 | if(!pbe2->keyfunc->parameter || | 253 | if(!param || (param->type != V_ASN1_SEQUENCE)) |
226 | (pbe2->keyfunc->parameter->type != V_ASN1_SEQUENCE)) | ||
227 | { | 254 | { |
228 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); | 255 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN,EVP_R_DECODE_ERROR); |
229 | goto err; | 256 | goto err; |
230 | } | 257 | } |
231 | 258 | ||
232 | pbuf = pbe2->keyfunc->parameter->value.sequence->data; | 259 | pbuf = param->value.sequence->data; |
233 | plen = pbe2->keyfunc->parameter->value.sequence->length; | 260 | plen = param->value.sequence->length; |
261 | |||
234 | if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { | 262 | if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { |
235 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); | 263 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN,EVP_R_DECODE_ERROR); |
236 | goto err; | 264 | goto err; |
237 | } | 265 | } |
238 | 266 | ||
239 | PBE2PARAM_free(pbe2); | 267 | keylen = EVP_CIPHER_CTX_key_length(ctx); |
240 | pbe2 = NULL; | ||
241 | 268 | ||
242 | /* Now check the parameters of the kdf */ | 269 | /* Now check the parameters of the kdf */ |
243 | 270 | ||
244 | if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ | 271 | if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ |
245 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, | 272 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN, |
246 | EVP_R_UNSUPPORTED_KEYLENGTH); | 273 | EVP_R_UNSUPPORTED_KEYLENGTH); |
247 | goto err; | 274 | goto err; |
248 | } | 275 | } |
@@ -254,19 +281,19 @@ int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | |||
254 | 281 | ||
255 | if (!EVP_PBE_find(EVP_PBE_TYPE_PRF, prf_nid, NULL, &hmac_md_nid, 0)) | 282 | if (!EVP_PBE_find(EVP_PBE_TYPE_PRF, prf_nid, NULL, &hmac_md_nid, 0)) |
256 | { | 283 | { |
257 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, EVP_R_UNSUPPORTED_PRF); | 284 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN, EVP_R_UNSUPPORTED_PRF); |
258 | goto err; | 285 | goto err; |
259 | } | 286 | } |
260 | 287 | ||
261 | prfmd = EVP_get_digestbynid(hmac_md_nid); | 288 | prfmd = EVP_get_digestbynid(hmac_md_nid); |
262 | if (prfmd == NULL) | 289 | if (prfmd == NULL) |
263 | { | 290 | { |
264 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, EVP_R_UNSUPPORTED_PRF); | 291 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN, EVP_R_UNSUPPORTED_PRF); |
265 | goto err; | 292 | goto err; |
266 | } | 293 | } |
267 | 294 | ||
268 | if(kdf->salt->type != V_ASN1_OCTET_STRING) { | 295 | if(kdf->salt->type != V_ASN1_OCTET_STRING) { |
269 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN, | 296 | EVPerr(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN, |
270 | EVP_R_UNSUPPORTED_SALT_TYPE); | 297 | EVP_R_UNSUPPORTED_SALT_TYPE); |
271 | goto err; | 298 | goto err; |
272 | } | 299 | } |
@@ -278,15 +305,11 @@ int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | |||
278 | if(!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd, | 305 | if(!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd, |
279 | keylen, key)) | 306 | keylen, key)) |
280 | goto err; | 307 | goto err; |
281 | EVP_CipherInit_ex(ctx, NULL, NULL, key, NULL, en_de); | 308 | rv = EVP_CipherInit_ex(ctx, NULL, NULL, key, NULL, en_de); |
282 | OPENSSL_cleanse(key, keylen); | ||
283 | PBKDF2PARAM_free(kdf); | ||
284 | return 1; | ||
285 | |||
286 | err: | 309 | err: |
287 | PBE2PARAM_free(pbe2); | 310 | OPENSSL_cleanse(key, keylen); |
288 | PBKDF2PARAM_free(kdf); | 311 | PBKDF2PARAM_free(kdf); |
289 | return 0; | 312 | return rv; |
290 | } | 313 | } |
291 | 314 | ||
292 | #ifdef DEBUG_PKCS5V2 | 315 | #ifdef DEBUG_PKCS5V2 |
diff --git a/src/lib/libcrypto/evp/p_open.c b/src/lib/libcrypto/evp/p_open.c index 53a59a295c..c748fbea87 100644 --- a/src/lib/libcrypto/evp/p_open.c +++ b/src/lib/libcrypto/evp/p_open.c | |||
@@ -115,7 +115,8 @@ int EVP_OpenFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
115 | int i; | 115 | int i; |
116 | 116 | ||
117 | i=EVP_DecryptFinal_ex(ctx,out,outl); | 117 | i=EVP_DecryptFinal_ex(ctx,out,outl); |
118 | EVP_DecryptInit_ex(ctx,NULL,NULL,NULL,NULL); | 118 | if (i) |
119 | i = EVP_DecryptInit_ex(ctx,NULL,NULL,NULL,NULL); | ||
119 | return(i); | 120 | return(i); |
120 | } | 121 | } |
121 | #else /* !OPENSSL_NO_RSA */ | 122 | #else /* !OPENSSL_NO_RSA */ |
diff --git a/src/lib/libcrypto/evp/p_seal.c b/src/lib/libcrypto/evp/p_seal.c index d8324526e7..e5919b0fbf 100644 --- a/src/lib/libcrypto/evp/p_seal.c +++ b/src/lib/libcrypto/evp/p_seal.c | |||
@@ -110,6 +110,7 @@ int EVP_SealFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
110 | { | 110 | { |
111 | int i; | 111 | int i; |
112 | i = EVP_EncryptFinal_ex(ctx,out,outl); | 112 | i = EVP_EncryptFinal_ex(ctx,out,outl); |
113 | EVP_EncryptInit_ex(ctx,NULL,NULL,NULL,NULL); | 113 | if (i) |
114 | i = EVP_EncryptInit_ex(ctx,NULL,NULL,NULL,NULL); | ||
114 | return i; | 115 | return i; |
115 | } | 116 | } |
diff --git a/src/lib/libcrypto/evp/p_sign.c b/src/lib/libcrypto/evp/p_sign.c index bb893f5bde..dfa48c157c 100644 --- a/src/lib/libcrypto/evp/p_sign.c +++ b/src/lib/libcrypto/evp/p_sign.c | |||
@@ -80,18 +80,20 @@ int EVP_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, | |||
80 | { | 80 | { |
81 | unsigned char m[EVP_MAX_MD_SIZE]; | 81 | unsigned char m[EVP_MAX_MD_SIZE]; |
82 | unsigned int m_len; | 82 | unsigned int m_len; |
83 | int i,ok=0,v; | 83 | int i=0,ok=0,v; |
84 | EVP_MD_CTX tmp_ctx; | 84 | EVP_MD_CTX tmp_ctx; |
85 | EVP_PKEY_CTX *pkctx = NULL; | ||
85 | 86 | ||
86 | *siglen=0; | 87 | *siglen=0; |
87 | EVP_MD_CTX_init(&tmp_ctx); | 88 | EVP_MD_CTX_init(&tmp_ctx); |
88 | EVP_MD_CTX_copy_ex(&tmp_ctx,ctx); | 89 | if (!EVP_MD_CTX_copy_ex(&tmp_ctx,ctx)) |
89 | EVP_DigestFinal_ex(&tmp_ctx,&(m[0]),&m_len); | 90 | goto err; |
91 | if (!EVP_DigestFinal_ex(&tmp_ctx,&(m[0]),&m_len)) | ||
92 | goto err; | ||
90 | EVP_MD_CTX_cleanup(&tmp_ctx); | 93 | EVP_MD_CTX_cleanup(&tmp_ctx); |
91 | 94 | ||
92 | if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) | 95 | if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) |
93 | { | 96 | { |
94 | EVP_PKEY_CTX *pkctx = NULL; | ||
95 | size_t sltmp = (size_t)EVP_PKEY_size(pkey); | 97 | size_t sltmp = (size_t)EVP_PKEY_size(pkey); |
96 | i = 0; | 98 | i = 0; |
97 | pkctx = EVP_PKEY_CTX_new(pkey, NULL); | 99 | pkctx = EVP_PKEY_CTX_new(pkey, NULL); |
diff --git a/src/lib/libcrypto/evp/p_verify.c b/src/lib/libcrypto/evp/p_verify.c index 41d4b67130..5f5c409f45 100644 --- a/src/lib/libcrypto/evp/p_verify.c +++ b/src/lib/libcrypto/evp/p_verify.c | |||
@@ -67,17 +67,19 @@ int EVP_VerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sigbuf, | |||
67 | { | 67 | { |
68 | unsigned char m[EVP_MAX_MD_SIZE]; | 68 | unsigned char m[EVP_MAX_MD_SIZE]; |
69 | unsigned int m_len; | 69 | unsigned int m_len; |
70 | int i,ok=0,v; | 70 | int i=-1,ok=0,v; |
71 | EVP_MD_CTX tmp_ctx; | 71 | EVP_MD_CTX tmp_ctx; |
72 | EVP_PKEY_CTX *pkctx = NULL; | ||
72 | 73 | ||
73 | EVP_MD_CTX_init(&tmp_ctx); | 74 | EVP_MD_CTX_init(&tmp_ctx); |
74 | EVP_MD_CTX_copy_ex(&tmp_ctx,ctx); | 75 | if (!EVP_MD_CTX_copy_ex(&tmp_ctx,ctx)) |
75 | EVP_DigestFinal_ex(&tmp_ctx,&(m[0]),&m_len); | 76 | goto err; |
77 | if (!EVP_DigestFinal_ex(&tmp_ctx,&(m[0]),&m_len)) | ||
78 | goto err; | ||
76 | EVP_MD_CTX_cleanup(&tmp_ctx); | 79 | EVP_MD_CTX_cleanup(&tmp_ctx); |
77 | 80 | ||
78 | if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) | 81 | if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) |
79 | { | 82 | { |
80 | EVP_PKEY_CTX *pkctx = NULL; | ||
81 | i = -1; | 83 | i = -1; |
82 | pkctx = EVP_PKEY_CTX_new(pkey, NULL); | 84 | pkctx = EVP_PKEY_CTX_new(pkey, NULL); |
83 | if (!pkctx) | 85 | if (!pkctx) |
diff --git a/src/lib/libcrypto/evp/pmeth_gn.c b/src/lib/libcrypto/evp/pmeth_gn.c index 5d74161a09..4651c81370 100644 --- a/src/lib/libcrypto/evp/pmeth_gn.c +++ b/src/lib/libcrypto/evp/pmeth_gn.c | |||
@@ -199,7 +199,7 @@ int EVP_PKEY_CTX_get_keygen_info(EVP_PKEY_CTX *ctx, int idx) | |||
199 | } | 199 | } |
200 | 200 | ||
201 | EVP_PKEY *EVP_PKEY_new_mac_key(int type, ENGINE *e, | 201 | EVP_PKEY *EVP_PKEY_new_mac_key(int type, ENGINE *e, |
202 | unsigned char *key, int keylen) | 202 | const unsigned char *key, int keylen) |
203 | { | 203 | { |
204 | EVP_PKEY_CTX *mac_ctx = NULL; | 204 | EVP_PKEY_CTX *mac_ctx = NULL; |
205 | EVP_PKEY *mac_key = NULL; | 205 | EVP_PKEY *mac_key = NULL; |
@@ -209,7 +209,8 @@ EVP_PKEY *EVP_PKEY_new_mac_key(int type, ENGINE *e, | |||
209 | if (EVP_PKEY_keygen_init(mac_ctx) <= 0) | 209 | if (EVP_PKEY_keygen_init(mac_ctx) <= 0) |
210 | goto merr; | 210 | goto merr; |
211 | if (EVP_PKEY_CTX_ctrl(mac_ctx, -1, EVP_PKEY_OP_KEYGEN, | 211 | if (EVP_PKEY_CTX_ctrl(mac_ctx, -1, EVP_PKEY_OP_KEYGEN, |
212 | EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key) <= 0) | 212 | EVP_PKEY_CTRL_SET_MAC_KEY, |
213 | keylen, (void *)key) <= 0) | ||
213 | goto merr; | 214 | goto merr; |
214 | if (EVP_PKEY_keygen(mac_ctx, &mac_key) <= 0) | 215 | if (EVP_PKEY_keygen(mac_ctx, &mac_key) <= 0) |
215 | goto merr; | 216 | goto merr; |
diff --git a/src/lib/libcrypto/evp/pmeth_lib.c b/src/lib/libcrypto/evp/pmeth_lib.c index 5481d4b8a5..acfa7b6f87 100644 --- a/src/lib/libcrypto/evp/pmeth_lib.c +++ b/src/lib/libcrypto/evp/pmeth_lib.c | |||
@@ -73,7 +73,7 @@ DECLARE_STACK_OF(EVP_PKEY_METHOD) | |||
73 | STACK_OF(EVP_PKEY_METHOD) *app_pkey_methods = NULL; | 73 | STACK_OF(EVP_PKEY_METHOD) *app_pkey_methods = NULL; |
74 | 74 | ||
75 | extern const EVP_PKEY_METHOD rsa_pkey_meth, dh_pkey_meth, dsa_pkey_meth; | 75 | extern const EVP_PKEY_METHOD rsa_pkey_meth, dh_pkey_meth, dsa_pkey_meth; |
76 | extern const EVP_PKEY_METHOD ec_pkey_meth, hmac_pkey_meth; | 76 | extern const EVP_PKEY_METHOD ec_pkey_meth, hmac_pkey_meth, cmac_pkey_meth; |
77 | 77 | ||
78 | static const EVP_PKEY_METHOD *standard_methods[] = | 78 | static const EVP_PKEY_METHOD *standard_methods[] = |
79 | { | 79 | { |
@@ -90,6 +90,7 @@ static const EVP_PKEY_METHOD *standard_methods[] = | |||
90 | &ec_pkey_meth, | 90 | &ec_pkey_meth, |
91 | #endif | 91 | #endif |
92 | &hmac_pkey_meth, | 92 | &hmac_pkey_meth, |
93 | &cmac_pkey_meth | ||
93 | }; | 94 | }; |
94 | 95 | ||
95 | DECLARE_OBJ_BSEARCH_CMP_FN(const EVP_PKEY_METHOD *, const EVP_PKEY_METHOD *, | 96 | DECLARE_OBJ_BSEARCH_CMP_FN(const EVP_PKEY_METHOD *, const EVP_PKEY_METHOD *, |
@@ -203,6 +204,8 @@ EVP_PKEY_METHOD* EVP_PKEY_meth_new(int id, int flags) | |||
203 | if (!pmeth) | 204 | if (!pmeth) |
204 | return NULL; | 205 | return NULL; |
205 | 206 | ||
207 | memset(pmeth, 0, sizeof(EVP_PKEY_METHOD)); | ||
208 | |||
206 | pmeth->pkey_id = id; | 209 | pmeth->pkey_id = id; |
207 | pmeth->flags = flags | EVP_PKEY_FLAG_DYNAMIC; | 210 | pmeth->flags = flags | EVP_PKEY_FLAG_DYNAMIC; |
208 | 211 | ||
@@ -235,6 +238,56 @@ EVP_PKEY_METHOD* EVP_PKEY_meth_new(int id, int flags) | |||
235 | return pmeth; | 238 | return pmeth; |
236 | } | 239 | } |
237 | 240 | ||
241 | void EVP_PKEY_meth_get0_info(int *ppkey_id, int *pflags, | ||
242 | const EVP_PKEY_METHOD *meth) | ||
243 | { | ||
244 | if (ppkey_id) | ||
245 | *ppkey_id = meth->pkey_id; | ||
246 | if (pflags) | ||
247 | *pflags = meth->flags; | ||
248 | } | ||
249 | |||
250 | void EVP_PKEY_meth_copy(EVP_PKEY_METHOD *dst, const EVP_PKEY_METHOD *src) | ||
251 | { | ||
252 | |||
253 | dst->init = src->init; | ||
254 | dst->copy = src->copy; | ||
255 | dst->cleanup = src->cleanup; | ||
256 | |||
257 | dst->paramgen_init = src->paramgen_init; | ||
258 | dst->paramgen = src->paramgen; | ||
259 | |||
260 | dst->keygen_init = src->keygen_init; | ||
261 | dst->keygen = src->keygen; | ||
262 | |||
263 | dst->sign_init = src->sign_init; | ||
264 | dst->sign = src->sign; | ||
265 | |||
266 | dst->verify_init = src->verify_init; | ||
267 | dst->verify = src->verify; | ||
268 | |||
269 | dst->verify_recover_init = src->verify_recover_init; | ||
270 | dst->verify_recover = src->verify_recover; | ||
271 | |||
272 | dst->signctx_init = src->signctx_init; | ||
273 | dst->signctx = src->signctx; | ||
274 | |||
275 | dst->verifyctx_init = src->verifyctx_init; | ||
276 | dst->verifyctx = src->verifyctx; | ||
277 | |||
278 | dst->encrypt_init = src->encrypt_init; | ||
279 | dst->encrypt = src->encrypt; | ||
280 | |||
281 | dst->decrypt_init = src->decrypt_init; | ||
282 | dst->decrypt = src->decrypt; | ||
283 | |||
284 | dst->derive_init = src->derive_init; | ||
285 | dst->derive = src->derive; | ||
286 | |||
287 | dst->ctrl = src->ctrl; | ||
288 | dst->ctrl_str = src->ctrl_str; | ||
289 | } | ||
290 | |||
238 | void EVP_PKEY_meth_free(EVP_PKEY_METHOD *pmeth) | 291 | void EVP_PKEY_meth_free(EVP_PKEY_METHOD *pmeth) |
239 | { | 292 | { |
240 | if (pmeth && (pmeth->flags & EVP_PKEY_FLAG_DYNAMIC)) | 293 | if (pmeth && (pmeth->flags & EVP_PKEY_FLAG_DYNAMIC)) |