]>
Commit | Line | Data |
---|---|---|
62867571 | 1 | /* |
fd38836b | 2 | * Copyright 1995-2018 The OpenSSL Project Authors. All Rights Reserved. |
58964a49 | 3 | * |
4a8b0c55 | 4 | * Licensed under the Apache License 2.0 (the "License"). You may not use |
62867571 RS |
5 | * this file except in compliance with the License. You can obtain a copy |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
58964a49 RE |
8 | */ |
9 | ||
10 | #include <stdio.h> | |
b39fc560 | 11 | #include "internal/cryptlib.h" |
ec577822 BM |
12 | #include <openssl/evp.h> |
13 | #include <openssl/objects.h> | |
718b133a MC |
14 | #include <openssl/params.h> |
15 | #include <openssl/core_names.h> | |
ff64702b | 16 | #include <openssl/dh.h> |
2db6bf6f | 17 | #include "internal/evp_int.h" |
3653d0c2 | 18 | #include "internal/provider.h" |
7638370c | 19 | #include "evp_locl.h" |
58964a49 | 20 | |
319e518a | 21 | #if !defined(FIPS_MODE) |
6b691a5c | 22 | int EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
0f113f3e MC |
23 | { |
24 | int ret; | |
718b133a | 25 | const EVP_CIPHER *cipher = c->cipher; |
0f113f3e | 26 | |
718b133a MC |
27 | if (cipher->prov != NULL) { |
28 | /* | |
29 | * The cipher has come from a provider and won't have the default flags. | |
30 | * Find the implicit form so we can check the flags. | |
31 | * TODO(3.0): This won't work for 3rd party ciphers we know nothing about | |
32 | * We'll need to think of something else for those. | |
33 | */ | |
34 | cipher = EVP_get_cipherbynid(cipher->nid); | |
35 | if (cipher == NULL) { | |
36 | EVPerr(EVP_F_EVP_CIPHER_PARAM_TO_ASN1, ASN1_R_UNSUPPORTED_CIPHER); | |
37 | return -1; | |
38 | } | |
39 | } | |
40 | ||
41 | if (cipher->set_asn1_parameters != NULL) | |
42 | ret = cipher->set_asn1_parameters(c, type); | |
43 | else if (cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) { | |
44 | switch (EVP_CIPHER_mode(cipher)) { | |
2acdef5e | 45 | case EVP_CIPH_WRAP_MODE: |
718b133a | 46 | if (EVP_CIPHER_nid(cipher) == NID_id_smime_alg_CMS3DESwrap) |
4ec36aff | 47 | ASN1_TYPE_set(type, V_ASN1_NULL, NULL); |
0f113f3e | 48 | ret = 1; |
2acdef5e DSH |
49 | break; |
50 | ||
51 | case EVP_CIPH_GCM_MODE: | |
52 | case EVP_CIPH_CCM_MODE: | |
53 | case EVP_CIPH_XTS_MODE: | |
54 | case EVP_CIPH_OCB_MODE: | |
49c9c1b3 | 55 | ret = -2; |
2acdef5e DSH |
56 | break; |
57 | ||
58 | default: | |
0f113f3e | 59 | ret = EVP_CIPHER_set_asn1_iv(c, type); |
2acdef5e | 60 | } |
0f113f3e MC |
61 | } else |
62 | ret = -1; | |
49c9c1b3 DO |
63 | if (ret <= 0) |
64 | EVPerr(EVP_F_EVP_CIPHER_PARAM_TO_ASN1, ret == -2 ? | |
65 | ASN1_R_UNSUPPORTED_CIPHER : | |
66 | EVP_R_CIPHER_PARAMETER_ERROR); | |
67 | if (ret < -1) | |
68 | ret = -1; | |
26a7d938 | 69 | return ret; |
0f113f3e | 70 | } |
58964a49 | 71 | |
6b691a5c | 72 | int EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
0f113f3e MC |
73 | { |
74 | int ret; | |
718b133a MC |
75 | const EVP_CIPHER *cipher = c->cipher; |
76 | ||
77 | if (cipher->prov != NULL) { | |
78 | /* | |
79 | * The cipher has come from a provider and won't have the default flags. | |
80 | * Find the implicit form so we can check the flags. | |
81 | */ | |
82 | cipher = EVP_get_cipherbynid(cipher->nid); | |
83 | if (cipher == NULL) | |
84 | return -1; | |
85 | } | |
0f113f3e | 86 | |
718b133a MC |
87 | if (cipher->get_asn1_parameters != NULL) |
88 | ret = cipher->get_asn1_parameters(c, type); | |
89 | else if (cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) { | |
90 | switch (EVP_CIPHER_mode(cipher)) { | |
2acdef5e DSH |
91 | |
92 | case EVP_CIPH_WRAP_MODE: | |
93 | ret = 1; | |
94 | break; | |
95 | ||
96 | case EVP_CIPH_GCM_MODE: | |
97 | case EVP_CIPH_CCM_MODE: | |
98 | case EVP_CIPH_XTS_MODE: | |
99 | case EVP_CIPH_OCB_MODE: | |
49c9c1b3 | 100 | ret = -2; |
2acdef5e DSH |
101 | break; |
102 | ||
103 | default: | |
104 | ret = EVP_CIPHER_get_asn1_iv(c, type); | |
105 | break; | |
106 | } | |
0f113f3e MC |
107 | } else |
108 | ret = -1; | |
49c9c1b3 DO |
109 | if (ret <= 0) |
110 | EVPerr(EVP_F_EVP_CIPHER_ASN1_TO_PARAM, ret == -2 ? | |
111 | EVP_R_UNSUPPORTED_CIPHER : | |
112 | EVP_R_CIPHER_PARAMETER_ERROR); | |
113 | if (ret < -1) | |
114 | ret = -1; | |
26a7d938 | 115 | return ret; |
0f113f3e | 116 | } |
58964a49 | 117 | |
718b133a | 118 | int EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *ctx, ASN1_TYPE *type) |
0f113f3e MC |
119 | { |
120 | int i = 0; | |
121 | unsigned int l; | |
122 | ||
123 | if (type != NULL) { | |
718b133a MC |
124 | unsigned char iv[EVP_MAX_IV_LENGTH]; |
125 | ||
126 | l = EVP_CIPHER_CTX_iv_length(ctx); | |
127 | if (!ossl_assert(l <= sizeof(iv))) | |
128 | return -1; | |
129 | i = ASN1_TYPE_get_octetstring(type, iv, l); | |
0f113f3e | 130 | if (i != (int)l) |
26a7d938 | 131 | return -1; |
718b133a MC |
132 | |
133 | if (!EVP_CipherInit_ex(ctx, NULL, NULL, NULL, iv, -1)) | |
134 | return -1; | |
0f113f3e | 135 | } |
26a7d938 | 136 | return i; |
0f113f3e | 137 | } |
58964a49 | 138 | |
6b691a5c | 139 | int EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
0f113f3e MC |
140 | { |
141 | int i = 0; | |
142 | unsigned int j; | |
143 | ||
144 | if (type != NULL) { | |
145 | j = EVP_CIPHER_CTX_iv_length(c); | |
146 | OPENSSL_assert(j <= sizeof(c->iv)); | |
147 | i = ASN1_TYPE_set_octetstring(type, c->oiv, j); | |
148 | } | |
26a7d938 | 149 | return i; |
0f113f3e | 150 | } |
319e518a | 151 | #endif /* !defined(FIPS_MODE) */ |
884e8ec6 DSH |
152 | |
153 | /* Convert the various cipher NIDs and dummies to a proper OID NID */ | |
84fa704c | 154 | int EVP_CIPHER_type(const EVP_CIPHER *ctx) |
884e8ec6 | 155 | { |
0f113f3e | 156 | int nid; |
0f113f3e | 157 | nid = EVP_CIPHER_nid(ctx); |
884e8ec6 | 158 | |
0f113f3e | 159 | switch (nid) { |
884e8ec6 | 160 | |
0f113f3e MC |
161 | case NID_rc2_cbc: |
162 | case NID_rc2_64_cbc: | |
163 | case NID_rc2_40_cbc: | |
884e8ec6 | 164 | |
0f113f3e | 165 | return NID_rc2_cbc; |
884e8ec6 | 166 | |
0f113f3e MC |
167 | case NID_rc4: |
168 | case NID_rc4_40: | |
884e8ec6 | 169 | |
0f113f3e | 170 | return NID_rc4; |
884e8ec6 | 171 | |
0f113f3e MC |
172 | case NID_aes_128_cfb128: |
173 | case NID_aes_128_cfb8: | |
174 | case NID_aes_128_cfb1: | |
8d1ebe0b | 175 | |
0f113f3e | 176 | return NID_aes_128_cfb128; |
8d1ebe0b | 177 | |
0f113f3e MC |
178 | case NID_aes_192_cfb128: |
179 | case NID_aes_192_cfb8: | |
180 | case NID_aes_192_cfb1: | |
8d1ebe0b | 181 | |
0f113f3e | 182 | return NID_aes_192_cfb128; |
8d1ebe0b | 183 | |
0f113f3e MC |
184 | case NID_aes_256_cfb128: |
185 | case NID_aes_256_cfb8: | |
186 | case NID_aes_256_cfb1: | |
8d1ebe0b | 187 | |
0f113f3e | 188 | return NID_aes_256_cfb128; |
8d1ebe0b | 189 | |
0f113f3e MC |
190 | case NID_des_cfb64: |
191 | case NID_des_cfb8: | |
192 | case NID_des_cfb1: | |
8d1ebe0b | 193 | |
0f113f3e | 194 | return NID_des_cfb64; |
8d1ebe0b | 195 | |
0f113f3e MC |
196 | case NID_des_ede3_cfb64: |
197 | case NID_des_ede3_cfb8: | |
198 | case NID_des_ede3_cfb1: | |
7e765bf2 | 199 | |
0f113f3e | 200 | return NID_des_cfb64; |
7e765bf2 | 201 | |
0f113f3e | 202 | default: |
319e518a MC |
203 | #ifdef FIPS_MODE |
204 | return NID_undef; | |
205 | #else | |
206 | { | |
207 | /* Check it has an OID and it is valid */ | |
208 | ASN1_OBJECT *otmp = OBJ_nid2obj(nid); | |
209 | ||
210 | if (OBJ_get0_data(otmp) == NULL) | |
211 | nid = NID_undef; | |
212 | ASN1_OBJECT_free(otmp); | |
213 | return nid; | |
214 | } | |
215 | #endif | |
0f113f3e | 216 | } |
884e8ec6 DSH |
217 | } |
218 | ||
718b133a | 219 | int EVP_CIPHER_block_size(const EVP_CIPHER *cipher) |
0f113f3e | 220 | { |
459b15d4 SL |
221 | int ok, v = cipher->block_size; |
222 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; | |
223 | ||
224 | params[0] = OSSL_PARAM_construct_int(OSSL_CIPHER_PARAM_BLOCK_SIZE, &v); | |
225 | ok = evp_do_ciph_getparams(cipher, params); | |
13273237 | 226 | |
e870791a | 227 | return ok != 0 ? v : EVP_CTRL_RET_UNSUPPORTED; |
0f113f3e | 228 | } |
7806f3dd | 229 | |
6343829a | 230 | int EVP_CIPHER_CTX_block_size(const EVP_CIPHER_CTX *ctx) |
0f113f3e | 231 | { |
718b133a | 232 | return EVP_CIPHER_block_size(ctx->cipher); |
0f113f3e | 233 | } |
7806f3dd | 234 | |
e79f8773 RL |
235 | int EVP_CIPHER_impl_ctx_size(const EVP_CIPHER *e) |
236 | { | |
237 | return e->ctx_size; | |
238 | } | |
239 | ||
0f113f3e MC |
240 | int EVP_Cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
241 | const unsigned char *in, unsigned int inl) | |
242 | { | |
718b133a | 243 | if (ctx->cipher->prov != NULL) { |
f79858ac RL |
244 | size_t outl = 0; /* ignored */ |
245 | int blocksize = EVP_CIPHER_CTX_block_size(ctx); | |
246 | ||
718b133a | 247 | if (ctx->cipher->ccipher != NULL) |
f79858ac RL |
248 | return |
249 | ctx->cipher->ccipher(ctx->provctx, out, &outl, | |
250 | inl + (blocksize == 1 ? 0 : blocksize), | |
251 | in, (size_t)inl); | |
718b133a MC |
252 | return 0; |
253 | } | |
254 | ||
0f113f3e MC |
255 | return ctx->cipher->do_cipher(ctx, out, in, inl); |
256 | } | |
7806f3dd NL |
257 | |
258 | const EVP_CIPHER *EVP_CIPHER_CTX_cipher(const EVP_CIPHER_CTX *ctx) | |
0f113f3e MC |
259 | { |
260 | return ctx->cipher; | |
261 | } | |
7806f3dd | 262 | |
83b06347 RL |
263 | int EVP_CIPHER_CTX_encrypting(const EVP_CIPHER_CTX *ctx) |
264 | { | |
265 | return ctx->encrypt; | |
266 | } | |
267 | ||
7806f3dd | 268 | unsigned long EVP_CIPHER_flags(const EVP_CIPHER *cipher) |
0f113f3e | 269 | { |
459b15d4 | 270 | int ok; |
13273237 | 271 | unsigned long v = cipher->flags; |
459b15d4 SL |
272 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; |
273 | ||
274 | params[0] = OSSL_PARAM_construct_ulong(OSSL_CIPHER_PARAM_FLAGS, &v); | |
275 | ok = evp_do_ciph_getparams(cipher, params); | |
13273237 RL |
276 | |
277 | return ok != 0 ? v : 0; | |
0f113f3e | 278 | } |
7806f3dd | 279 | |
7806f3dd | 280 | void *EVP_CIPHER_CTX_get_app_data(const EVP_CIPHER_CTX *ctx) |
0f113f3e MC |
281 | { |
282 | return ctx->app_data; | |
283 | } | |
7806f3dd NL |
284 | |
285 | void EVP_CIPHER_CTX_set_app_data(EVP_CIPHER_CTX *ctx, void *data) | |
0f113f3e MC |
286 | { |
287 | ctx->app_data = data; | |
288 | } | |
7806f3dd | 289 | |
44ab2dfd | 290 | void *EVP_CIPHER_CTX_get_cipher_data(const EVP_CIPHER_CTX *ctx) |
83b06347 RL |
291 | { |
292 | return ctx->cipher_data; | |
293 | } | |
294 | ||
98ee7543 MC |
295 | void *EVP_CIPHER_CTX_set_cipher_data(EVP_CIPHER_CTX *ctx, void *cipher_data) |
296 | { | |
297 | void *old_cipher_data; | |
298 | ||
299 | old_cipher_data = ctx->cipher_data; | |
300 | ctx->cipher_data = cipher_data; | |
301 | ||
302 | return old_cipher_data; | |
303 | } | |
304 | ||
6343829a | 305 | int EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) |
0f113f3e | 306 | { |
459b15d4 SL |
307 | int ok, v = cipher->iv_len; |
308 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; | |
718b133a | 309 | |
459b15d4 SL |
310 | params[0] = OSSL_PARAM_construct_int(OSSL_CIPHER_PARAM_IVLEN, &v); |
311 | ok = evp_do_ciph_getparams(cipher, params); | |
312 | ||
e870791a | 313 | return ok != 0 ? v : EVP_CTRL_RET_UNSUPPORTED; |
0f113f3e | 314 | } |
7806f3dd | 315 | |
6343829a | 316 | int EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx) |
0f113f3e | 317 | { |
a672a02a SL |
318 | int ok, v = EVP_CIPHER_iv_length(ctx->cipher); |
319 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; | |
320 | ||
321 | params[0] = OSSL_PARAM_construct_int(OSSL_CIPHER_PARAM_IVLEN, &v); | |
322 | ok = evp_do_ciph_ctx_getparams(ctx->cipher, ctx->provctx, params); | |
323 | ||
324 | return ok != 0 ? v : -1; | |
0f113f3e | 325 | } |
7806f3dd | 326 | |
83b06347 RL |
327 | const unsigned char *EVP_CIPHER_CTX_original_iv(const EVP_CIPHER_CTX *ctx) |
328 | { | |
329 | return ctx->oiv; | |
330 | } | |
331 | ||
13273237 RL |
332 | /* |
333 | * OSSL_PARAM_OCTET_PTR gets us the pointer to the running IV in the provider | |
334 | */ | |
83b06347 RL |
335 | const unsigned char *EVP_CIPHER_CTX_iv(const EVP_CIPHER_CTX *ctx) |
336 | { | |
459b15d4 | 337 | int ok; |
13273237 | 338 | const unsigned char *v = ctx->iv; |
459b15d4 | 339 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; |
13273237 | 340 | |
459b15d4 SL |
341 | params[0] = |
342 | OSSL_PARAM_construct_octet_ptr(OSSL_CIPHER_PARAM_IV, (void **)&v, | |
343 | sizeof(ctx->iv)); | |
344 | ok = evp_do_ciph_ctx_getparams(ctx->cipher, ctx->provctx, params); | |
345 | ||
346 | return ok != 0 ? v : NULL; | |
83b06347 RL |
347 | } |
348 | ||
349 | unsigned char *EVP_CIPHER_CTX_iv_noconst(EVP_CIPHER_CTX *ctx) | |
350 | { | |
459b15d4 | 351 | int ok; |
13273237 | 352 | unsigned char *v = ctx->iv; |
459b15d4 SL |
353 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; |
354 | ||
355 | params[0] = | |
356 | OSSL_PARAM_construct_octet_ptr(OSSL_CIPHER_PARAM_IV, (void **)&v, | |
357 | sizeof(ctx->iv)); | |
358 | ok = evp_do_ciph_ctx_getparams(ctx->cipher, ctx->provctx, params); | |
13273237 | 359 | |
459b15d4 | 360 | return ok != 0 ? v : NULL; |
83b06347 RL |
361 | } |
362 | ||
363 | unsigned char *EVP_CIPHER_CTX_buf_noconst(EVP_CIPHER_CTX *ctx) | |
364 | { | |
365 | return ctx->buf; | |
366 | } | |
367 | ||
368 | int EVP_CIPHER_CTX_num(const EVP_CIPHER_CTX *ctx) | |
369 | { | |
459b15d4 SL |
370 | int ok, v = ctx->num; |
371 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; | |
13273237 | 372 | |
459b15d4 SL |
373 | params[0] = OSSL_PARAM_construct_int(OSSL_CIPHER_PARAM_NUM, &v); |
374 | ok = evp_do_ciph_ctx_getparams(ctx->cipher, ctx->provctx, params); | |
375 | ||
e870791a | 376 | return ok != 0 ? v : EVP_CTRL_RET_UNSUPPORTED; |
83b06347 RL |
377 | } |
378 | ||
13273237 | 379 | int EVP_CIPHER_CTX_set_num(EVP_CIPHER_CTX *ctx, int num) |
83b06347 | 380 | { |
459b15d4 SL |
381 | int ok; |
382 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; | |
13273237 | 383 | |
459b15d4 SL |
384 | params[0] = OSSL_PARAM_construct_int(OSSL_CIPHER_PARAM_NUM, &num); |
385 | ok = evp_do_ciph_ctx_setparams(ctx->cipher, ctx->provctx, params); | |
386 | ||
387 | if (ok != 0) | |
388 | ctx->num = num; | |
13273237 | 389 | return ok != 0; |
83b06347 RL |
390 | } |
391 | ||
6343829a | 392 | int EVP_CIPHER_key_length(const EVP_CIPHER *cipher) |
0f113f3e | 393 | { |
459b15d4 SL |
394 | int ok, v = cipher->key_len; |
395 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; | |
396 | ||
397 | params[0] = OSSL_PARAM_construct_int(OSSL_CIPHER_PARAM_KEYLEN, &v); | |
398 | ok = evp_do_ciph_getparams(cipher, params); | |
df05f2ce | 399 | |
e870791a | 400 | return ok != 0 ? v : EVP_CTRL_RET_UNSUPPORTED; |
0f113f3e | 401 | } |
7806f3dd | 402 | |
6343829a | 403 | int EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx) |
0f113f3e | 404 | { |
459b15d4 SL |
405 | int ok, v = ctx->key_len; |
406 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; | |
407 | ||
408 | params[0] = OSSL_PARAM_construct_int(OSSL_CIPHER_PARAM_KEYLEN, &v); | |
409 | ok = evp_do_ciph_ctx_getparams(ctx->cipher, ctx->provctx, params); | |
13273237 | 410 | |
e870791a | 411 | return ok != 0 ? v : EVP_CTRL_RET_UNSUPPORTED; |
0f113f3e | 412 | } |
7806f3dd NL |
413 | |
414 | int EVP_CIPHER_nid(const EVP_CIPHER *cipher) | |
0f113f3e MC |
415 | { |
416 | return cipher->nid; | |
417 | } | |
7806f3dd NL |
418 | |
419 | int EVP_CIPHER_CTX_nid(const EVP_CIPHER_CTX *ctx) | |
0f113f3e MC |
420 | { |
421 | return ctx->cipher->nid; | |
422 | } | |
7806f3dd | 423 | |
c750bc08 RL |
424 | const char *EVP_CIPHER_name(const EVP_CIPHER *cipher) |
425 | { | |
426 | if (cipher->prov != NULL) | |
427 | return cipher->name; | |
428 | #ifndef FIPS_MODE | |
429 | return OBJ_nid2sn(EVP_CIPHER_nid(cipher)); | |
430 | #else | |
431 | return NULL; | |
432 | #endif | |
433 | } | |
434 | ||
1d2622d4 RL |
435 | const OSSL_PROVIDER *EVP_CIPHER_provider(const EVP_CIPHER *cipher) |
436 | { | |
437 | return cipher->prov; | |
438 | } | |
439 | ||
718b133a MC |
440 | int EVP_CIPHER_mode(const EVP_CIPHER *cipher) |
441 | { | |
459b15d4 SL |
442 | int ok, v = EVP_CIPHER_flags(cipher) & EVP_CIPH_MODE; |
443 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; | |
718b133a | 444 | |
459b15d4 SL |
445 | params[0] = OSSL_PARAM_construct_int(OSSL_CIPHER_PARAM_MODE, &v); |
446 | ok = evp_do_ciph_getparams(cipher, params); | |
718b133a | 447 | |
459b15d4 SL |
448 | return ok != 0 ? v : 0; |
449 | } | |
718b133a | 450 | |
c750bc08 RL |
451 | const char *EVP_MD_name(const EVP_MD *md) |
452 | { | |
453 | if (md->prov != NULL) | |
454 | return md->name; | |
455 | #ifndef FIPS_MODE | |
456 | return OBJ_nid2sn(EVP_MD_nid(md)); | |
457 | #else | |
458 | return NULL; | |
459 | #endif | |
460 | } | |
461 | ||
1d2622d4 RL |
462 | const OSSL_PROVIDER *EVP_MD_provider(const EVP_MD *md) |
463 | { | |
464 | return md->prov; | |
465 | } | |
466 | ||
0f113f3e MC |
467 | int EVP_MD_block_size(const EVP_MD *md) |
468 | { | |
7556b9df MC |
469 | if (md == NULL) { |
470 | EVPerr(EVP_F_EVP_MD_BLOCK_SIZE, EVP_R_MESSAGE_DIGEST_IS_NULL); | |
471 | return -1; | |
472 | } | |
473 | ||
474 | if (md->prov != NULL && md->dblock_size != NULL) | |
475 | return (int)md->dblock_size(); | |
476 | ||
0f113f3e MC |
477 | return md->block_size; |
478 | } | |
7806f3dd NL |
479 | |
480 | int EVP_MD_type(const EVP_MD *md) | |
0f113f3e MC |
481 | { |
482 | return md->type; | |
483 | } | |
7806f3dd NL |
484 | |
485 | int EVP_MD_pkey_type(const EVP_MD *md) | |
0f113f3e MC |
486 | { |
487 | return md->pkey_type; | |
488 | } | |
7806f3dd | 489 | |
6343829a | 490 | int EVP_MD_size(const EVP_MD *md) |
0f113f3e MC |
491 | { |
492 | if (!md) { | |
493 | EVPerr(EVP_F_EVP_MD_SIZE, EVP_R_MESSAGE_DIGEST_IS_NULL); | |
494 | return -1; | |
495 | } | |
8c8cf0d9 MC |
496 | |
497 | if (md->prov != NULL && md->size != NULL) | |
498 | return (int)md->size(); | |
499 | ||
0f113f3e MC |
500 | return md->md_size; |
501 | } | |
7806f3dd | 502 | |
e5fa864f | 503 | unsigned long EVP_MD_flags(const EVP_MD *md) |
0f113f3e MC |
504 | { |
505 | return md->flags; | |
506 | } | |
e5fa864f | 507 | |
2db6bf6f RL |
508 | EVP_MD *EVP_MD_meth_new(int md_type, int pkey_type) |
509 | { | |
43ecb9c3 RS |
510 | EVP_MD *md = OPENSSL_zalloc(sizeof(*md)); |
511 | ||
2db6bf6f RL |
512 | if (md != NULL) { |
513 | md->type = md_type; | |
514 | md->pkey_type = pkey_type; | |
3653d0c2 MC |
515 | md->lock = CRYPTO_THREAD_lock_new(); |
516 | if (md->lock == NULL) { | |
517 | OPENSSL_free(md); | |
518 | return NULL; | |
519 | } | |
520 | md->refcnt = 1; | |
2db6bf6f RL |
521 | } |
522 | return md; | |
523 | } | |
df05f2ce | 524 | |
2db6bf6f RL |
525 | EVP_MD *EVP_MD_meth_dup(const EVP_MD *md) |
526 | { | |
527 | EVP_MD *to = EVP_MD_meth_new(md->type, md->pkey_type); | |
43ecb9c3 | 528 | |
df05f2ce MC |
529 | if (to != NULL) { |
530 | CRYPTO_RWLOCK *lock = to->lock; | |
2db6bf6f | 531 | memcpy(to, md, sizeof(*to)); |
df05f2ce MC |
532 | to->lock = lock; |
533 | } | |
2db6bf6f RL |
534 | return to; |
535 | } | |
3653d0c2 | 536 | |
70c35fd1 | 537 | int EVP_MD_up_ref(EVP_MD *md) |
3653d0c2 MC |
538 | { |
539 | int ref = 0; | |
540 | ||
541 | CRYPTO_UP_REF(&md->refcnt, &ref, md->lock); | |
542 | return 1; | |
543 | } | |
544 | ||
2db6bf6f RL |
545 | void EVP_MD_meth_free(EVP_MD *md) |
546 | { | |
3653d0c2 MC |
547 | if (md != NULL) { |
548 | int i; | |
549 | ||
550 | CRYPTO_DOWN_REF(&md->refcnt, &i, md->lock); | |
551 | if (i > 0) | |
552 | return; | |
553 | ossl_provider_free(md->prov); | |
6b9e3724 | 554 | OPENSSL_free(md->name); |
3653d0c2 MC |
555 | CRYPTO_THREAD_lock_free(md->lock); |
556 | OPENSSL_free(md); | |
557 | } | |
2db6bf6f RL |
558 | } |
559 | int EVP_MD_meth_set_input_blocksize(EVP_MD *md, int blocksize) | |
560 | { | |
561 | md->block_size = blocksize; | |
562 | return 1; | |
563 | } | |
564 | int EVP_MD_meth_set_result_size(EVP_MD *md, int resultsize) | |
565 | { | |
566 | md->md_size = resultsize; | |
567 | return 1; | |
568 | } | |
569 | int EVP_MD_meth_set_app_datasize(EVP_MD *md, int datasize) | |
570 | { | |
571 | md->ctx_size = datasize; | |
572 | return 1; | |
573 | } | |
574 | int EVP_MD_meth_set_flags(EVP_MD *md, unsigned long flags) | |
575 | { | |
576 | md->flags = flags; | |
577 | return 1; | |
578 | } | |
579 | int EVP_MD_meth_set_init(EVP_MD *md, int (*init)(EVP_MD_CTX *ctx)) | |
580 | { | |
581 | md->init = init; | |
582 | return 1; | |
583 | } | |
584 | int EVP_MD_meth_set_update(EVP_MD *md, int (*update)(EVP_MD_CTX *ctx, | |
585 | const void *data, | |
586 | size_t count)) | |
587 | { | |
588 | md->update = update; | |
589 | return 1; | |
590 | } | |
591 | int EVP_MD_meth_set_final(EVP_MD *md, int (*final)(EVP_MD_CTX *ctx, | |
592 | unsigned char *md)) | |
593 | { | |
594 | md->final = final; | |
595 | return 1; | |
596 | } | |
597 | int EVP_MD_meth_set_copy(EVP_MD *md, int (*copy)(EVP_MD_CTX *to, | |
598 | const EVP_MD_CTX *from)) | |
599 | { | |
600 | md->copy = copy; | |
601 | return 1; | |
602 | } | |
603 | int EVP_MD_meth_set_cleanup(EVP_MD *md, int (*cleanup)(EVP_MD_CTX *ctx)) | |
604 | { | |
605 | md->cleanup = cleanup; | |
606 | return 1; | |
607 | } | |
608 | int EVP_MD_meth_set_ctrl(EVP_MD *md, int (*ctrl)(EVP_MD_CTX *ctx, int cmd, | |
609 | int p1, void *p2)) | |
610 | { | |
611 | md->md_ctrl = ctrl; | |
612 | return 1; | |
613 | } | |
614 | ||
615 | int EVP_MD_meth_get_input_blocksize(const EVP_MD *md) | |
616 | { | |
617 | return md->block_size; | |
618 | } | |
619 | int EVP_MD_meth_get_result_size(const EVP_MD *md) | |
620 | { | |
621 | return md->md_size; | |
622 | } | |
623 | int EVP_MD_meth_get_app_datasize(const EVP_MD *md) | |
624 | { | |
625 | return md->ctx_size; | |
626 | } | |
627 | unsigned long EVP_MD_meth_get_flags(const EVP_MD *md) | |
628 | { | |
8bfa99f0 | 629 | return md->flags; |
2db6bf6f RL |
630 | } |
631 | int (*EVP_MD_meth_get_init(const EVP_MD *md))(EVP_MD_CTX *ctx) | |
632 | { | |
633 | return md->init; | |
634 | } | |
635 | int (*EVP_MD_meth_get_update(const EVP_MD *md))(EVP_MD_CTX *ctx, | |
636 | const void *data, | |
637 | size_t count) | |
638 | { | |
639 | return md->update; | |
640 | } | |
641 | int (*EVP_MD_meth_get_final(const EVP_MD *md))(EVP_MD_CTX *ctx, | |
642 | unsigned char *md) | |
643 | { | |
644 | return md->final; | |
645 | } | |
646 | int (*EVP_MD_meth_get_copy(const EVP_MD *md))(EVP_MD_CTX *to, | |
647 | const EVP_MD_CTX *from) | |
648 | { | |
649 | return md->copy; | |
650 | } | |
651 | int (*EVP_MD_meth_get_cleanup(const EVP_MD *md))(EVP_MD_CTX *ctx) | |
652 | { | |
653 | return md->cleanup; | |
654 | } | |
655 | int (*EVP_MD_meth_get_ctrl(const EVP_MD *md))(EVP_MD_CTX *ctx, int cmd, | |
656 | int p1, void *p2) | |
657 | { | |
658 | return md->md_ctrl; | |
659 | } | |
660 | ||
7806f3dd | 661 | const EVP_MD *EVP_MD_CTX_md(const EVP_MD_CTX *ctx) |
0f113f3e | 662 | { |
b7c913c8 | 663 | if (ctx == NULL) |
0f113f3e | 664 | return NULL; |
b7c913c8 | 665 | return ctx->reqdigest; |
0f113f3e | 666 | } |
7806f3dd | 667 | |
7638370c RL |
668 | EVP_PKEY_CTX *EVP_MD_CTX_pkey_ctx(const EVP_MD_CTX *ctx) |
669 | { | |
670 | return ctx->pctx; | |
671 | } | |
672 | ||
319e518a MC |
673 | #if !defined(FIPS_MODE) |
674 | /* TODO(3.0): EVP_DigestSign* not yet supported in FIPS module */ | |
00902d94 PY |
675 | void EVP_MD_CTX_set_pkey_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pctx) |
676 | { | |
81c79453 PY |
677 | /* |
678 | * it's reasonable to set NULL pctx (a.k.a clear the ctx->pctx), so | |
679 | * we have to deal with the cleanup job here. | |
680 | */ | |
681 | if (!EVP_MD_CTX_test_flags(ctx, EVP_MD_CTX_FLAG_KEEP_PKEY_CTX)) | |
682 | EVP_PKEY_CTX_free(ctx->pctx); | |
683 | ||
00902d94 | 684 | ctx->pctx = pctx; |
81c79453 PY |
685 | |
686 | if (pctx != NULL) { | |
687 | /* make sure pctx is not freed when destroying EVP_MD_CTX */ | |
688 | EVP_MD_CTX_set_flags(ctx, EVP_MD_CTX_FLAG_KEEP_PKEY_CTX); | |
689 | } else { | |
690 | EVP_MD_CTX_clear_flags(ctx, EVP_MD_CTX_FLAG_KEEP_PKEY_CTX); | |
691 | } | |
00902d94 | 692 | } |
319e518a | 693 | #endif /* !defined(FIPS_MODE) */ |
00902d94 | 694 | |
7638370c RL |
695 | void *EVP_MD_CTX_md_data(const EVP_MD_CTX *ctx) |
696 | { | |
697 | return ctx->md_data; | |
698 | } | |
699 | ||
700 | int (*EVP_MD_CTX_update_fn(EVP_MD_CTX *ctx))(EVP_MD_CTX *ctx, | |
701 | const void *data, size_t count) | |
702 | { | |
703 | return ctx->update; | |
704 | } | |
705 | ||
706 | void EVP_MD_CTX_set_update_fn(EVP_MD_CTX *ctx, | |
707 | int (*update) (EVP_MD_CTX *ctx, | |
708 | const void *data, size_t count)) | |
709 | { | |
710 | ctx->update = update; | |
711 | } | |
712 | ||
7806f3dd | 713 | void EVP_MD_CTX_set_flags(EVP_MD_CTX *ctx, int flags) |
0f113f3e MC |
714 | { |
715 | ctx->flags |= flags; | |
716 | } | |
7806f3dd NL |
717 | |
718 | void EVP_MD_CTX_clear_flags(EVP_MD_CTX *ctx, int flags) | |
0f113f3e MC |
719 | { |
720 | ctx->flags &= ~flags; | |
721 | } | |
7806f3dd NL |
722 | |
723 | int EVP_MD_CTX_test_flags(const EVP_MD_CTX *ctx, int flags) | |
0f113f3e MC |
724 | { |
725 | return (ctx->flags & flags); | |
726 | } | |
e92f9f45 DSH |
727 | |
728 | void EVP_CIPHER_CTX_set_flags(EVP_CIPHER_CTX *ctx, int flags) | |
0f113f3e MC |
729 | { |
730 | ctx->flags |= flags; | |
731 | } | |
e92f9f45 DSH |
732 | |
733 | void EVP_CIPHER_CTX_clear_flags(EVP_CIPHER_CTX *ctx, int flags) | |
0f113f3e MC |
734 | { |
735 | ctx->flags &= ~flags; | |
736 | } | |
e92f9f45 DSH |
737 | |
738 | int EVP_CIPHER_CTX_test_flags(const EVP_CIPHER_CTX *ctx, int flags) | |
0f113f3e MC |
739 | { |
740 | return (ctx->flags & flags); | |
741 | } | |
f842b6b2 RL |
742 | |
743 | int EVP_str2ctrl(int (*cb)(void *ctx, int cmd, void *buf, size_t buflen), | |
744 | void *ctx, int cmd, const char *value) | |
745 | { | |
746 | size_t len; | |
747 | ||
748 | len = strlen(value); | |
749 | if (len > INT_MAX) | |
750 | return -1; | |
751 | return cb(ctx, cmd, (void *)value, len); | |
752 | } | |
753 | ||
754 | int EVP_hex2ctrl(int (*cb)(void *ctx, int cmd, void *buf, size_t buflen), | |
755 | void *ctx, int cmd, const char *hex) | |
756 | { | |
757 | unsigned char *bin; | |
758 | long binlen; | |
759 | int rv = -1; | |
760 | ||
761 | bin = OPENSSL_hexstr2buf(hex, &binlen); | |
762 | if (bin == NULL) | |
763 | return 0; | |
764 | if (binlen <= INT_MAX) | |
765 | rv = cb(ctx, cmd, bin, binlen); | |
766 | OPENSSL_free(bin); | |
767 | return rv; | |
768 | } |