]>
Commit | Line | Data |
---|---|---|
62867571 | 1 | /* |
fd38836b | 2 | * Copyright 1995-2018 The OpenSSL Project Authors. All Rights Reserved. |
58964a49 | 3 | * |
4a8b0c55 | 4 | * Licensed under the Apache License 2.0 (the "License"). You may not use |
62867571 RS |
5 | * this file except in compliance with the License. You can obtain a copy |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
58964a49 RE |
8 | */ |
9 | ||
10 | #include <stdio.h> | |
b39fc560 | 11 | #include "internal/cryptlib.h" |
ec577822 BM |
12 | #include <openssl/evp.h> |
13 | #include <openssl/objects.h> | |
718b133a MC |
14 | #include <openssl/params.h> |
15 | #include <openssl/core_names.h> | |
ff64702b | 16 | #include <openssl/dh.h> |
25f2138b | 17 | #include "crypto/evp.h" |
3653d0c2 | 18 | #include "internal/provider.h" |
7638370c | 19 | #include "evp_locl.h" |
58964a49 | 20 | |
319e518a | 21 | #if !defined(FIPS_MODE) |
6b691a5c | 22 | int EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
0f113f3e MC |
23 | { |
24 | int ret; | |
718b133a | 25 | const EVP_CIPHER *cipher = c->cipher; |
0f113f3e | 26 | |
718b133a MC |
27 | if (cipher->prov != NULL) { |
28 | /* | |
29 | * The cipher has come from a provider and won't have the default flags. | |
30 | * Find the implicit form so we can check the flags. | |
31 | * TODO(3.0): This won't work for 3rd party ciphers we know nothing about | |
32 | * We'll need to think of something else for those. | |
33 | */ | |
34 | cipher = EVP_get_cipherbynid(cipher->nid); | |
35 | if (cipher == NULL) { | |
36 | EVPerr(EVP_F_EVP_CIPHER_PARAM_TO_ASN1, ASN1_R_UNSUPPORTED_CIPHER); | |
37 | return -1; | |
38 | } | |
39 | } | |
40 | ||
41 | if (cipher->set_asn1_parameters != NULL) | |
42 | ret = cipher->set_asn1_parameters(c, type); | |
43 | else if (cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) { | |
44 | switch (EVP_CIPHER_mode(cipher)) { | |
2acdef5e | 45 | case EVP_CIPH_WRAP_MODE: |
718b133a | 46 | if (EVP_CIPHER_nid(cipher) == NID_id_smime_alg_CMS3DESwrap) |
4ec36aff | 47 | ASN1_TYPE_set(type, V_ASN1_NULL, NULL); |
0f113f3e | 48 | ret = 1; |
2acdef5e DSH |
49 | break; |
50 | ||
51 | case EVP_CIPH_GCM_MODE: | |
52 | case EVP_CIPH_CCM_MODE: | |
53 | case EVP_CIPH_XTS_MODE: | |
54 | case EVP_CIPH_OCB_MODE: | |
49c9c1b3 | 55 | ret = -2; |
2acdef5e DSH |
56 | break; |
57 | ||
58 | default: | |
0f113f3e | 59 | ret = EVP_CIPHER_set_asn1_iv(c, type); |
2acdef5e | 60 | } |
0f113f3e MC |
61 | } else |
62 | ret = -1; | |
51ba9ebd RS |
63 | if (ret == -2) |
64 | EVPerr(EVP_F_EVP_CIPHER_PARAM_TO_ASN1, ASN1_R_UNSUPPORTED_CIPHER); | |
65 | else if (ret <= 0) | |
66 | EVPerr(EVP_F_EVP_CIPHER_PARAM_TO_ASN1, EVP_R_CIPHER_PARAMETER_ERROR); | |
49c9c1b3 DO |
67 | if (ret < -1) |
68 | ret = -1; | |
26a7d938 | 69 | return ret; |
0f113f3e | 70 | } |
58964a49 | 71 | |
6b691a5c | 72 | int EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
0f113f3e MC |
73 | { |
74 | int ret; | |
718b133a MC |
75 | const EVP_CIPHER *cipher = c->cipher; |
76 | ||
77 | if (cipher->prov != NULL) { | |
78 | /* | |
79 | * The cipher has come from a provider and won't have the default flags. | |
80 | * Find the implicit form so we can check the flags. | |
81 | */ | |
82 | cipher = EVP_get_cipherbynid(cipher->nid); | |
83 | if (cipher == NULL) | |
84 | return -1; | |
85 | } | |
0f113f3e | 86 | |
718b133a MC |
87 | if (cipher->get_asn1_parameters != NULL) |
88 | ret = cipher->get_asn1_parameters(c, type); | |
89 | else if (cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) { | |
90 | switch (EVP_CIPHER_mode(cipher)) { | |
2acdef5e DSH |
91 | |
92 | case EVP_CIPH_WRAP_MODE: | |
93 | ret = 1; | |
94 | break; | |
95 | ||
96 | case EVP_CIPH_GCM_MODE: | |
97 | case EVP_CIPH_CCM_MODE: | |
98 | case EVP_CIPH_XTS_MODE: | |
99 | case EVP_CIPH_OCB_MODE: | |
49c9c1b3 | 100 | ret = -2; |
2acdef5e DSH |
101 | break; |
102 | ||
103 | default: | |
104 | ret = EVP_CIPHER_get_asn1_iv(c, type); | |
105 | break; | |
106 | } | |
0f113f3e MC |
107 | } else |
108 | ret = -1; | |
51ba9ebd RS |
109 | if (ret == -2) |
110 | EVPerr(EVP_F_EVP_CIPHER_ASN1_TO_PARAM, EVP_R_UNSUPPORTED_CIPHER); | |
111 | else if (ret <= 0) | |
112 | EVPerr(EVP_F_EVP_CIPHER_ASN1_TO_PARAM, EVP_R_CIPHER_PARAMETER_ERROR); | |
49c9c1b3 DO |
113 | if (ret < -1) |
114 | ret = -1; | |
26a7d938 | 115 | return ret; |
0f113f3e | 116 | } |
58964a49 | 117 | |
718b133a | 118 | int EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *ctx, ASN1_TYPE *type) |
0f113f3e MC |
119 | { |
120 | int i = 0; | |
121 | unsigned int l; | |
122 | ||
123 | if (type != NULL) { | |
718b133a MC |
124 | unsigned char iv[EVP_MAX_IV_LENGTH]; |
125 | ||
126 | l = EVP_CIPHER_CTX_iv_length(ctx); | |
127 | if (!ossl_assert(l <= sizeof(iv))) | |
128 | return -1; | |
129 | i = ASN1_TYPE_get_octetstring(type, iv, l); | |
0f113f3e | 130 | if (i != (int)l) |
26a7d938 | 131 | return -1; |
718b133a MC |
132 | |
133 | if (!EVP_CipherInit_ex(ctx, NULL, NULL, NULL, iv, -1)) | |
134 | return -1; | |
0f113f3e | 135 | } |
26a7d938 | 136 | return i; |
0f113f3e | 137 | } |
58964a49 | 138 | |
6b691a5c | 139 | int EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
0f113f3e MC |
140 | { |
141 | int i = 0; | |
142 | unsigned int j; | |
143 | ||
144 | if (type != NULL) { | |
145 | j = EVP_CIPHER_CTX_iv_length(c); | |
146 | OPENSSL_assert(j <= sizeof(c->iv)); | |
147 | i = ASN1_TYPE_set_octetstring(type, c->oiv, j); | |
148 | } | |
26a7d938 | 149 | return i; |
0f113f3e | 150 | } |
319e518a | 151 | #endif /* !defined(FIPS_MODE) */ |
884e8ec6 DSH |
152 | |
153 | /* Convert the various cipher NIDs and dummies to a proper OID NID */ | |
84fa704c | 154 | int EVP_CIPHER_type(const EVP_CIPHER *ctx) |
884e8ec6 | 155 | { |
0f113f3e | 156 | int nid; |
0f113f3e | 157 | nid = EVP_CIPHER_nid(ctx); |
884e8ec6 | 158 | |
0f113f3e | 159 | switch (nid) { |
884e8ec6 | 160 | |
0f113f3e MC |
161 | case NID_rc2_cbc: |
162 | case NID_rc2_64_cbc: | |
163 | case NID_rc2_40_cbc: | |
884e8ec6 | 164 | |
0f113f3e | 165 | return NID_rc2_cbc; |
884e8ec6 | 166 | |
0f113f3e MC |
167 | case NID_rc4: |
168 | case NID_rc4_40: | |
884e8ec6 | 169 | |
0f113f3e | 170 | return NID_rc4; |
884e8ec6 | 171 | |
0f113f3e MC |
172 | case NID_aes_128_cfb128: |
173 | case NID_aes_128_cfb8: | |
174 | case NID_aes_128_cfb1: | |
8d1ebe0b | 175 | |
0f113f3e | 176 | return NID_aes_128_cfb128; |
8d1ebe0b | 177 | |
0f113f3e MC |
178 | case NID_aes_192_cfb128: |
179 | case NID_aes_192_cfb8: | |
180 | case NID_aes_192_cfb1: | |
8d1ebe0b | 181 | |
0f113f3e | 182 | return NID_aes_192_cfb128; |
8d1ebe0b | 183 | |
0f113f3e MC |
184 | case NID_aes_256_cfb128: |
185 | case NID_aes_256_cfb8: | |
186 | case NID_aes_256_cfb1: | |
8d1ebe0b | 187 | |
0f113f3e | 188 | return NID_aes_256_cfb128; |
8d1ebe0b | 189 | |
0f113f3e MC |
190 | case NID_des_cfb64: |
191 | case NID_des_cfb8: | |
192 | case NID_des_cfb1: | |
8d1ebe0b | 193 | |
0f113f3e | 194 | return NID_des_cfb64; |
8d1ebe0b | 195 | |
0f113f3e MC |
196 | case NID_des_ede3_cfb64: |
197 | case NID_des_ede3_cfb8: | |
198 | case NID_des_ede3_cfb1: | |
7e765bf2 | 199 | |
0f113f3e | 200 | return NID_des_cfb64; |
7e765bf2 | 201 | |
0f113f3e | 202 | default: |
319e518a MC |
203 | #ifdef FIPS_MODE |
204 | return NID_undef; | |
205 | #else | |
206 | { | |
207 | /* Check it has an OID and it is valid */ | |
208 | ASN1_OBJECT *otmp = OBJ_nid2obj(nid); | |
209 | ||
210 | if (OBJ_get0_data(otmp) == NULL) | |
211 | nid = NID_undef; | |
212 | ASN1_OBJECT_free(otmp); | |
213 | return nid; | |
214 | } | |
215 | #endif | |
0f113f3e | 216 | } |
884e8ec6 DSH |
217 | } |
218 | ||
718b133a | 219 | int EVP_CIPHER_block_size(const EVP_CIPHER *cipher) |
0f113f3e | 220 | { |
1c3ace68 SL |
221 | int ok; |
222 | size_t v = cipher->block_size; | |
459b15d4 SL |
223 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; |
224 | ||
1c3ace68 | 225 | params[0] = OSSL_PARAM_construct_size_t(OSSL_CIPHER_PARAM_BLOCK_SIZE, &v); |
459b15d4 | 226 | ok = evp_do_ciph_getparams(cipher, params); |
13273237 | 227 | |
1c3ace68 | 228 | return ok != 0 ? (int)v : EVP_CTRL_RET_UNSUPPORTED; |
0f113f3e | 229 | } |
7806f3dd | 230 | |
6343829a | 231 | int EVP_CIPHER_CTX_block_size(const EVP_CIPHER_CTX *ctx) |
0f113f3e | 232 | { |
718b133a | 233 | return EVP_CIPHER_block_size(ctx->cipher); |
0f113f3e | 234 | } |
7806f3dd | 235 | |
e79f8773 RL |
236 | int EVP_CIPHER_impl_ctx_size(const EVP_CIPHER *e) |
237 | { | |
238 | return e->ctx_size; | |
239 | } | |
240 | ||
0f113f3e MC |
241 | int EVP_Cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
242 | const unsigned char *in, unsigned int inl) | |
243 | { | |
718b133a | 244 | if (ctx->cipher->prov != NULL) { |
f79858ac RL |
245 | size_t outl = 0; /* ignored */ |
246 | int blocksize = EVP_CIPHER_CTX_block_size(ctx); | |
247 | ||
718b133a | 248 | if (ctx->cipher->ccipher != NULL) |
f79858ac RL |
249 | return |
250 | ctx->cipher->ccipher(ctx->provctx, out, &outl, | |
251 | inl + (blocksize == 1 ? 0 : blocksize), | |
252 | in, (size_t)inl); | |
718b133a MC |
253 | return 0; |
254 | } | |
255 | ||
0f113f3e MC |
256 | return ctx->cipher->do_cipher(ctx, out, in, inl); |
257 | } | |
7806f3dd NL |
258 | |
259 | const EVP_CIPHER *EVP_CIPHER_CTX_cipher(const EVP_CIPHER_CTX *ctx) | |
0f113f3e MC |
260 | { |
261 | return ctx->cipher; | |
262 | } | |
7806f3dd | 263 | |
83b06347 RL |
264 | int EVP_CIPHER_CTX_encrypting(const EVP_CIPHER_CTX *ctx) |
265 | { | |
266 | return ctx->encrypt; | |
267 | } | |
268 | ||
7806f3dd | 269 | unsigned long EVP_CIPHER_flags(const EVP_CIPHER *cipher) |
0f113f3e | 270 | { |
459b15d4 | 271 | int ok; |
13273237 | 272 | unsigned long v = cipher->flags; |
459b15d4 SL |
273 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; |
274 | ||
275 | params[0] = OSSL_PARAM_construct_ulong(OSSL_CIPHER_PARAM_FLAGS, &v); | |
276 | ok = evp_do_ciph_getparams(cipher, params); | |
13273237 RL |
277 | |
278 | return ok != 0 ? v : 0; | |
0f113f3e | 279 | } |
7806f3dd | 280 | |
7806f3dd | 281 | void *EVP_CIPHER_CTX_get_app_data(const EVP_CIPHER_CTX *ctx) |
0f113f3e MC |
282 | { |
283 | return ctx->app_data; | |
284 | } | |
7806f3dd NL |
285 | |
286 | void EVP_CIPHER_CTX_set_app_data(EVP_CIPHER_CTX *ctx, void *data) | |
0f113f3e MC |
287 | { |
288 | ctx->app_data = data; | |
289 | } | |
7806f3dd | 290 | |
44ab2dfd | 291 | void *EVP_CIPHER_CTX_get_cipher_data(const EVP_CIPHER_CTX *ctx) |
83b06347 RL |
292 | { |
293 | return ctx->cipher_data; | |
294 | } | |
295 | ||
98ee7543 MC |
296 | void *EVP_CIPHER_CTX_set_cipher_data(EVP_CIPHER_CTX *ctx, void *cipher_data) |
297 | { | |
298 | void *old_cipher_data; | |
299 | ||
300 | old_cipher_data = ctx->cipher_data; | |
301 | ctx->cipher_data = cipher_data; | |
302 | ||
303 | return old_cipher_data; | |
304 | } | |
305 | ||
6343829a | 306 | int EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) |
0f113f3e | 307 | { |
1c3ace68 SL |
308 | int ok; |
309 | size_t v = cipher->iv_len; | |
459b15d4 | 310 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; |
718b133a | 311 | |
1c3ace68 | 312 | params[0] = OSSL_PARAM_construct_size_t(OSSL_CIPHER_PARAM_IVLEN, &v); |
459b15d4 SL |
313 | ok = evp_do_ciph_getparams(cipher, params); |
314 | ||
1c3ace68 | 315 | return ok != 0 ? (int)v : EVP_CTRL_RET_UNSUPPORTED; |
0f113f3e | 316 | } |
7806f3dd | 317 | |
6343829a | 318 | int EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx) |
0f113f3e | 319 | { |
88d87082 SL |
320 | int rv, len = EVP_CIPHER_iv_length(ctx->cipher); |
321 | size_t v = len; | |
a672a02a SL |
322 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; |
323 | ||
1c3ace68 | 324 | params[0] = OSSL_PARAM_construct_size_t(OSSL_CIPHER_PARAM_IVLEN, &v); |
7dddf2fc SL |
325 | rv = evp_do_ciph_ctx_getparams(ctx->cipher, ctx->provctx, params); |
326 | if (rv == EVP_CTRL_RET_UNSUPPORTED) | |
327 | goto legacy; | |
1c3ace68 | 328 | return rv != 0 ? (int)v : -1; |
7dddf2fc SL |
329 | /* TODO (3.0) Remove legacy support */ |
330 | legacy: | |
331 | if ((EVP_CIPHER_flags(ctx->cipher) & EVP_CIPH_CUSTOM_IV_LENGTH) != 0) { | |
332 | rv = EVP_CIPHER_CTX_ctrl((EVP_CIPHER_CTX *)ctx, EVP_CTRL_GET_IVLEN, | |
333 | 0, &len); | |
88d87082 | 334 | return (rv == 1) ? len : -1; |
7dddf2fc | 335 | } |
88d87082 | 336 | return len; |
0f113f3e | 337 | } |
7806f3dd | 338 | |
dc64dc2e SL |
339 | int EVP_CIPHER_CTX_tag_length(const EVP_CIPHER_CTX *ctx) |
340 | { | |
341 | int ret; | |
342 | size_t v = 0; | |
343 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; | |
344 | ||
345 | params[0] = OSSL_PARAM_construct_size_t(OSSL_CIPHER_PARAM_AEAD_TAGLEN, &v); | |
346 | ret = evp_do_ciph_ctx_getparams(ctx->cipher, ctx->provctx, params); | |
347 | return ret == 1 ? (int)v : 0; | |
348 | } | |
349 | ||
83b06347 RL |
350 | const unsigned char *EVP_CIPHER_CTX_original_iv(const EVP_CIPHER_CTX *ctx) |
351 | { | |
352 | return ctx->oiv; | |
353 | } | |
354 | ||
13273237 RL |
355 | /* |
356 | * OSSL_PARAM_OCTET_PTR gets us the pointer to the running IV in the provider | |
357 | */ | |
83b06347 RL |
358 | const unsigned char *EVP_CIPHER_CTX_iv(const EVP_CIPHER_CTX *ctx) |
359 | { | |
459b15d4 | 360 | int ok; |
13273237 | 361 | const unsigned char *v = ctx->iv; |
459b15d4 | 362 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; |
13273237 | 363 | |
459b15d4 SL |
364 | params[0] = |
365 | OSSL_PARAM_construct_octet_ptr(OSSL_CIPHER_PARAM_IV, (void **)&v, | |
366 | sizeof(ctx->iv)); | |
367 | ok = evp_do_ciph_ctx_getparams(ctx->cipher, ctx->provctx, params); | |
368 | ||
369 | return ok != 0 ? v : NULL; | |
83b06347 RL |
370 | } |
371 | ||
372 | unsigned char *EVP_CIPHER_CTX_iv_noconst(EVP_CIPHER_CTX *ctx) | |
373 | { | |
459b15d4 | 374 | int ok; |
13273237 | 375 | unsigned char *v = ctx->iv; |
459b15d4 SL |
376 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; |
377 | ||
378 | params[0] = | |
379 | OSSL_PARAM_construct_octet_ptr(OSSL_CIPHER_PARAM_IV, (void **)&v, | |
380 | sizeof(ctx->iv)); | |
381 | ok = evp_do_ciph_ctx_getparams(ctx->cipher, ctx->provctx, params); | |
13273237 | 382 | |
459b15d4 | 383 | return ok != 0 ? v : NULL; |
83b06347 RL |
384 | } |
385 | ||
386 | unsigned char *EVP_CIPHER_CTX_buf_noconst(EVP_CIPHER_CTX *ctx) | |
387 | { | |
388 | return ctx->buf; | |
389 | } | |
390 | ||
391 | int EVP_CIPHER_CTX_num(const EVP_CIPHER_CTX *ctx) | |
392 | { | |
1c3ace68 SL |
393 | int ok; |
394 | unsigned int v = (unsigned int)ctx->num; | |
459b15d4 | 395 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; |
13273237 | 396 | |
1c3ace68 | 397 | params[0] = OSSL_PARAM_construct_uint(OSSL_CIPHER_PARAM_NUM, &v); |
459b15d4 SL |
398 | ok = evp_do_ciph_ctx_getparams(ctx->cipher, ctx->provctx, params); |
399 | ||
1c3ace68 | 400 | return ok != 0 ? (int)v : EVP_CTRL_RET_UNSUPPORTED; |
83b06347 RL |
401 | } |
402 | ||
13273237 | 403 | int EVP_CIPHER_CTX_set_num(EVP_CIPHER_CTX *ctx, int num) |
83b06347 | 404 | { |
459b15d4 | 405 | int ok; |
1c3ace68 | 406 | unsigned int n = (unsigned int)num; |
459b15d4 | 407 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; |
13273237 | 408 | |
1c3ace68 | 409 | params[0] = OSSL_PARAM_construct_uint(OSSL_CIPHER_PARAM_NUM, &n); |
459b15d4 SL |
410 | ok = evp_do_ciph_ctx_setparams(ctx->cipher, ctx->provctx, params); |
411 | ||
412 | if (ok != 0) | |
1c3ace68 | 413 | ctx->num = (int)n; |
13273237 | 414 | return ok != 0; |
83b06347 RL |
415 | } |
416 | ||
6343829a | 417 | int EVP_CIPHER_key_length(const EVP_CIPHER *cipher) |
0f113f3e | 418 | { |
1c3ace68 SL |
419 | int ok; |
420 | size_t v = cipher->key_len; | |
459b15d4 SL |
421 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; |
422 | ||
1c3ace68 | 423 | params[0] = OSSL_PARAM_construct_size_t(OSSL_CIPHER_PARAM_KEYLEN, &v); |
459b15d4 | 424 | ok = evp_do_ciph_getparams(cipher, params); |
df05f2ce | 425 | |
1c3ace68 | 426 | return ok != 0 ? (int)v : EVP_CTRL_RET_UNSUPPORTED; |
0f113f3e | 427 | } |
7806f3dd | 428 | |
6343829a | 429 | int EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx) |
0f113f3e | 430 | { |
1c3ace68 SL |
431 | int ok; |
432 | size_t v = ctx->key_len; | |
459b15d4 SL |
433 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; |
434 | ||
1c3ace68 | 435 | params[0] = OSSL_PARAM_construct_size_t(OSSL_CIPHER_PARAM_KEYLEN, &v); |
459b15d4 | 436 | ok = evp_do_ciph_ctx_getparams(ctx->cipher, ctx->provctx, params); |
13273237 | 437 | |
1c3ace68 | 438 | return ok != 0 ? (int)v : EVP_CTRL_RET_UNSUPPORTED; |
0f113f3e | 439 | } |
7806f3dd NL |
440 | |
441 | int EVP_CIPHER_nid(const EVP_CIPHER *cipher) | |
0f113f3e MC |
442 | { |
443 | return cipher->nid; | |
444 | } | |
7806f3dd NL |
445 | |
446 | int EVP_CIPHER_CTX_nid(const EVP_CIPHER_CTX *ctx) | |
0f113f3e MC |
447 | { |
448 | return ctx->cipher->nid; | |
449 | } | |
7806f3dd | 450 | |
7cfa1717 RL |
451 | int EVP_CIPHER_is_a(const EVP_CIPHER *cipher, const char *name) |
452 | { | |
453 | return evp_is_a(cipher->prov, cipher->name_id, name); | |
454 | } | |
455 | ||
c750bc08 RL |
456 | const char *EVP_CIPHER_name(const EVP_CIPHER *cipher) |
457 | { | |
458 | if (cipher->prov != NULL) | |
f7c16d48 | 459 | return evp_first_name(cipher->prov, cipher->name_id); |
c750bc08 RL |
460 | #ifndef FIPS_MODE |
461 | return OBJ_nid2sn(EVP_CIPHER_nid(cipher)); | |
462 | #else | |
463 | return NULL; | |
464 | #endif | |
465 | } | |
466 | ||
1d2622d4 RL |
467 | const OSSL_PROVIDER *EVP_CIPHER_provider(const EVP_CIPHER *cipher) |
468 | { | |
469 | return cipher->prov; | |
470 | } | |
471 | ||
718b133a MC |
472 | int EVP_CIPHER_mode(const EVP_CIPHER *cipher) |
473 | { | |
1c3ace68 SL |
474 | int ok; |
475 | unsigned int v = EVP_CIPHER_flags(cipher) & EVP_CIPH_MODE; | |
459b15d4 | 476 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; |
718b133a | 477 | |
1c3ace68 | 478 | params[0] = OSSL_PARAM_construct_uint(OSSL_CIPHER_PARAM_MODE, &v); |
459b15d4 | 479 | ok = evp_do_ciph_getparams(cipher, params); |
718b133a | 480 | |
1c3ace68 | 481 | return ok != 0 ? (int)v : 0; |
459b15d4 | 482 | } |
718b133a | 483 | |
c750bc08 RL |
484 | const char *EVP_MD_name(const EVP_MD *md) |
485 | { | |
486 | if (md->prov != NULL) | |
f7c16d48 | 487 | return evp_first_name(md->prov, md->name_id); |
c750bc08 RL |
488 | #ifndef FIPS_MODE |
489 | return OBJ_nid2sn(EVP_MD_nid(md)); | |
490 | #else | |
491 | return NULL; | |
492 | #endif | |
493 | } | |
494 | ||
1d2622d4 RL |
495 | const OSSL_PROVIDER *EVP_MD_provider(const EVP_MD *md) |
496 | { | |
497 | return md->prov; | |
498 | } | |
499 | ||
0f113f3e MC |
500 | int EVP_MD_block_size(const EVP_MD *md) |
501 | { | |
1c3ace68 SL |
502 | int ok; |
503 | size_t v = md->block_size; | |
6a3b7c68 RL |
504 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; |
505 | ||
7556b9df MC |
506 | if (md == NULL) { |
507 | EVPerr(EVP_F_EVP_MD_BLOCK_SIZE, EVP_R_MESSAGE_DIGEST_IS_NULL); | |
508 | return -1; | |
509 | } | |
510 | ||
1c3ace68 | 511 | params[0] = OSSL_PARAM_construct_size_t(OSSL_DIGEST_PARAM_BLOCK_SIZE, &v); |
6a3b7c68 | 512 | ok = evp_do_md_getparams(md, params); |
7556b9df | 513 | |
1c3ace68 | 514 | return ok != 0 ? (int)v : -1; |
0f113f3e | 515 | } |
7806f3dd NL |
516 | |
517 | int EVP_MD_type(const EVP_MD *md) | |
0f113f3e MC |
518 | { |
519 | return md->type; | |
520 | } | |
7806f3dd NL |
521 | |
522 | int EVP_MD_pkey_type(const EVP_MD *md) | |
0f113f3e MC |
523 | { |
524 | return md->pkey_type; | |
525 | } | |
7806f3dd | 526 | |
6343829a | 527 | int EVP_MD_size(const EVP_MD *md) |
0f113f3e | 528 | { |
1c3ace68 SL |
529 | int ok; |
530 | size_t v = md->md_size; | |
6a3b7c68 RL |
531 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; |
532 | ||
533 | if (md == NULL) { | |
0f113f3e MC |
534 | EVPerr(EVP_F_EVP_MD_SIZE, EVP_R_MESSAGE_DIGEST_IS_NULL); |
535 | return -1; | |
536 | } | |
8c8cf0d9 | 537 | |
1c3ace68 | 538 | params[0] = OSSL_PARAM_construct_size_t(OSSL_DIGEST_PARAM_SIZE, &v); |
6a3b7c68 | 539 | ok = evp_do_md_getparams(md, params); |
8c8cf0d9 | 540 | |
1c3ace68 | 541 | return ok != 0 ? (int)v : -1; |
0f113f3e | 542 | } |
7806f3dd | 543 | |
e5fa864f | 544 | unsigned long EVP_MD_flags(const EVP_MD *md) |
0f113f3e | 545 | { |
6a3b7c68 RL |
546 | int ok; |
547 | unsigned long v = md->flags; | |
548 | OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; | |
549 | ||
550 | params[0] = OSSL_PARAM_construct_ulong(OSSL_CIPHER_PARAM_FLAGS, &v); | |
551 | ok = evp_do_md_getparams(md, params); | |
552 | ||
553 | return ok != 0 ? v : 0; | |
0f113f3e | 554 | } |
e5fa864f | 555 | |
2db6bf6f RL |
556 | EVP_MD *EVP_MD_meth_new(int md_type, int pkey_type) |
557 | { | |
3fd70262 | 558 | EVP_MD *md = evp_md_new(); |
43ecb9c3 | 559 | |
2db6bf6f RL |
560 | if (md != NULL) { |
561 | md->type = md_type; | |
562 | md->pkey_type = pkey_type; | |
563 | } | |
564 | return md; | |
565 | } | |
df05f2ce | 566 | |
2db6bf6f RL |
567 | EVP_MD *EVP_MD_meth_dup(const EVP_MD *md) |
568 | { | |
3fd70262 RL |
569 | EVP_MD *to = NULL; |
570 | ||
571 | /* | |
572 | * Non-legacy EVP_MDs can't be duplicated like this. | |
573 | * Use EVP_MD_up_ref() instead. | |
574 | */ | |
575 | if (md->prov != NULL) | |
576 | return NULL; | |
43ecb9c3 | 577 | |
3fd70262 | 578 | if ((to = EVP_MD_meth_new(md->type, md->pkey_type)) != NULL) { |
df05f2ce | 579 | CRYPTO_RWLOCK *lock = to->lock; |
3fd70262 | 580 | |
2db6bf6f | 581 | memcpy(to, md, sizeof(*to)); |
df05f2ce MC |
582 | to->lock = lock; |
583 | } | |
2db6bf6f RL |
584 | return to; |
585 | } | |
3653d0c2 | 586 | |
2db6bf6f RL |
587 | void EVP_MD_meth_free(EVP_MD *md) |
588 | { | |
3fd70262 | 589 | EVP_MD_free(md); |
2db6bf6f RL |
590 | } |
591 | int EVP_MD_meth_set_input_blocksize(EVP_MD *md, int blocksize) | |
592 | { | |
8bbc7f22 DB |
593 | if (md->block_size != 0) |
594 | return 0; | |
595 | ||
2db6bf6f RL |
596 | md->block_size = blocksize; |
597 | return 1; | |
598 | } | |
599 | int EVP_MD_meth_set_result_size(EVP_MD *md, int resultsize) | |
600 | { | |
8bbc7f22 DB |
601 | if (md->md_size != 0) |
602 | return 0; | |
603 | ||
2db6bf6f RL |
604 | md->md_size = resultsize; |
605 | return 1; | |
606 | } | |
607 | int EVP_MD_meth_set_app_datasize(EVP_MD *md, int datasize) | |
608 | { | |
8bbc7f22 DB |
609 | if (md->ctx_size != 0) |
610 | return 0; | |
611 | ||
2db6bf6f RL |
612 | md->ctx_size = datasize; |
613 | return 1; | |
614 | } | |
615 | int EVP_MD_meth_set_flags(EVP_MD *md, unsigned long flags) | |
616 | { | |
8bbc7f22 DB |
617 | if (md->flags != 0) |
618 | return 0; | |
619 | ||
2db6bf6f RL |
620 | md->flags = flags; |
621 | return 1; | |
622 | } | |
623 | int EVP_MD_meth_set_init(EVP_MD *md, int (*init)(EVP_MD_CTX *ctx)) | |
624 | { | |
8bbc7f22 DB |
625 | if (md->init != NULL) |
626 | return 0; | |
627 | ||
2db6bf6f RL |
628 | md->init = init; |
629 | return 1; | |
630 | } | |
631 | int EVP_MD_meth_set_update(EVP_MD *md, int (*update)(EVP_MD_CTX *ctx, | |
632 | const void *data, | |
633 | size_t count)) | |
634 | { | |
8bbc7f22 DB |
635 | if (md->update != NULL) |
636 | return 0; | |
637 | ||
2db6bf6f RL |
638 | md->update = update; |
639 | return 1; | |
640 | } | |
641 | int EVP_MD_meth_set_final(EVP_MD *md, int (*final)(EVP_MD_CTX *ctx, | |
642 | unsigned char *md)) | |
643 | { | |
8bbc7f22 DB |
644 | if (md->final != NULL) |
645 | return 0; | |
646 | ||
2db6bf6f RL |
647 | md->final = final; |
648 | return 1; | |
649 | } | |
650 | int EVP_MD_meth_set_copy(EVP_MD *md, int (*copy)(EVP_MD_CTX *to, | |
651 | const EVP_MD_CTX *from)) | |
652 | { | |
8bbc7f22 DB |
653 | if (md->copy != NULL) |
654 | return 0; | |
655 | ||
2db6bf6f RL |
656 | md->copy = copy; |
657 | return 1; | |
658 | } | |
659 | int EVP_MD_meth_set_cleanup(EVP_MD *md, int (*cleanup)(EVP_MD_CTX *ctx)) | |
660 | { | |
8bbc7f22 DB |
661 | if (md->cleanup != NULL) |
662 | return 0; | |
663 | ||
2db6bf6f RL |
664 | md->cleanup = cleanup; |
665 | return 1; | |
666 | } | |
667 | int EVP_MD_meth_set_ctrl(EVP_MD *md, int (*ctrl)(EVP_MD_CTX *ctx, int cmd, | |
668 | int p1, void *p2)) | |
669 | { | |
8bbc7f22 DB |
670 | if (md->md_ctrl != NULL) |
671 | return 0; | |
672 | ||
2db6bf6f RL |
673 | md->md_ctrl = ctrl; |
674 | return 1; | |
675 | } | |
676 | ||
677 | int EVP_MD_meth_get_input_blocksize(const EVP_MD *md) | |
678 | { | |
679 | return md->block_size; | |
680 | } | |
681 | int EVP_MD_meth_get_result_size(const EVP_MD *md) | |
682 | { | |
683 | return md->md_size; | |
684 | } | |
685 | int EVP_MD_meth_get_app_datasize(const EVP_MD *md) | |
686 | { | |
687 | return md->ctx_size; | |
688 | } | |
689 | unsigned long EVP_MD_meth_get_flags(const EVP_MD *md) | |
690 | { | |
8bfa99f0 | 691 | return md->flags; |
2db6bf6f RL |
692 | } |
693 | int (*EVP_MD_meth_get_init(const EVP_MD *md))(EVP_MD_CTX *ctx) | |
694 | { | |
695 | return md->init; | |
696 | } | |
697 | int (*EVP_MD_meth_get_update(const EVP_MD *md))(EVP_MD_CTX *ctx, | |
698 | const void *data, | |
699 | size_t count) | |
700 | { | |
701 | return md->update; | |
702 | } | |
703 | int (*EVP_MD_meth_get_final(const EVP_MD *md))(EVP_MD_CTX *ctx, | |
704 | unsigned char *md) | |
705 | { | |
706 | return md->final; | |
707 | } | |
708 | int (*EVP_MD_meth_get_copy(const EVP_MD *md))(EVP_MD_CTX *to, | |
709 | const EVP_MD_CTX *from) | |
710 | { | |
711 | return md->copy; | |
712 | } | |
713 | int (*EVP_MD_meth_get_cleanup(const EVP_MD *md))(EVP_MD_CTX *ctx) | |
714 | { | |
715 | return md->cleanup; | |
716 | } | |
717 | int (*EVP_MD_meth_get_ctrl(const EVP_MD *md))(EVP_MD_CTX *ctx, int cmd, | |
718 | int p1, void *p2) | |
719 | { | |
720 | return md->md_ctrl; | |
721 | } | |
722 | ||
7806f3dd | 723 | const EVP_MD *EVP_MD_CTX_md(const EVP_MD_CTX *ctx) |
0f113f3e | 724 | { |
b7c913c8 | 725 | if (ctx == NULL) |
0f113f3e | 726 | return NULL; |
b7c913c8 | 727 | return ctx->reqdigest; |
0f113f3e | 728 | } |
7806f3dd | 729 | |
7638370c RL |
730 | EVP_PKEY_CTX *EVP_MD_CTX_pkey_ctx(const EVP_MD_CTX *ctx) |
731 | { | |
732 | return ctx->pctx; | |
733 | } | |
734 | ||
319e518a MC |
735 | #if !defined(FIPS_MODE) |
736 | /* TODO(3.0): EVP_DigestSign* not yet supported in FIPS module */ | |
00902d94 PY |
737 | void EVP_MD_CTX_set_pkey_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pctx) |
738 | { | |
81c79453 PY |
739 | /* |
740 | * it's reasonable to set NULL pctx (a.k.a clear the ctx->pctx), so | |
741 | * we have to deal with the cleanup job here. | |
742 | */ | |
743 | if (!EVP_MD_CTX_test_flags(ctx, EVP_MD_CTX_FLAG_KEEP_PKEY_CTX)) | |
744 | EVP_PKEY_CTX_free(ctx->pctx); | |
745 | ||
00902d94 | 746 | ctx->pctx = pctx; |
81c79453 PY |
747 | |
748 | if (pctx != NULL) { | |
749 | /* make sure pctx is not freed when destroying EVP_MD_CTX */ | |
750 | EVP_MD_CTX_set_flags(ctx, EVP_MD_CTX_FLAG_KEEP_PKEY_CTX); | |
751 | } else { | |
752 | EVP_MD_CTX_clear_flags(ctx, EVP_MD_CTX_FLAG_KEEP_PKEY_CTX); | |
753 | } | |
00902d94 | 754 | } |
319e518a | 755 | #endif /* !defined(FIPS_MODE) */ |
00902d94 | 756 | |
7638370c RL |
757 | void *EVP_MD_CTX_md_data(const EVP_MD_CTX *ctx) |
758 | { | |
759 | return ctx->md_data; | |
760 | } | |
761 | ||
762 | int (*EVP_MD_CTX_update_fn(EVP_MD_CTX *ctx))(EVP_MD_CTX *ctx, | |
763 | const void *data, size_t count) | |
764 | { | |
765 | return ctx->update; | |
766 | } | |
767 | ||
768 | void EVP_MD_CTX_set_update_fn(EVP_MD_CTX *ctx, | |
769 | int (*update) (EVP_MD_CTX *ctx, | |
770 | const void *data, size_t count)) | |
771 | { | |
772 | ctx->update = update; | |
773 | } | |
774 | ||
7806f3dd | 775 | void EVP_MD_CTX_set_flags(EVP_MD_CTX *ctx, int flags) |
0f113f3e MC |
776 | { |
777 | ctx->flags |= flags; | |
778 | } | |
7806f3dd NL |
779 | |
780 | void EVP_MD_CTX_clear_flags(EVP_MD_CTX *ctx, int flags) | |
0f113f3e MC |
781 | { |
782 | ctx->flags &= ~flags; | |
783 | } | |
7806f3dd NL |
784 | |
785 | int EVP_MD_CTX_test_flags(const EVP_MD_CTX *ctx, int flags) | |
0f113f3e MC |
786 | { |
787 | return (ctx->flags & flags); | |
788 | } | |
e92f9f45 DSH |
789 | |
790 | void EVP_CIPHER_CTX_set_flags(EVP_CIPHER_CTX *ctx, int flags) | |
0f113f3e MC |
791 | { |
792 | ctx->flags |= flags; | |
793 | } | |
e92f9f45 DSH |
794 | |
795 | void EVP_CIPHER_CTX_clear_flags(EVP_CIPHER_CTX *ctx, int flags) | |
0f113f3e MC |
796 | { |
797 | ctx->flags &= ~flags; | |
798 | } | |
e92f9f45 DSH |
799 | |
800 | int EVP_CIPHER_CTX_test_flags(const EVP_CIPHER_CTX *ctx, int flags) | |
0f113f3e MC |
801 | { |
802 | return (ctx->flags & flags); | |
803 | } | |
f842b6b2 RL |
804 | |
805 | int EVP_str2ctrl(int (*cb)(void *ctx, int cmd, void *buf, size_t buflen), | |
806 | void *ctx, int cmd, const char *value) | |
807 | { | |
808 | size_t len; | |
809 | ||
810 | len = strlen(value); | |
811 | if (len > INT_MAX) | |
812 | return -1; | |
813 | return cb(ctx, cmd, (void *)value, len); | |
814 | } | |
815 | ||
816 | int EVP_hex2ctrl(int (*cb)(void *ctx, int cmd, void *buf, size_t buflen), | |
817 | void *ctx, int cmd, const char *hex) | |
818 | { | |
819 | unsigned char *bin; | |
820 | long binlen; | |
821 | int rv = -1; | |
822 | ||
823 | bin = OPENSSL_hexstr2buf(hex, &binlen); | |
824 | if (bin == NULL) | |
825 | return 0; | |
826 | if (binlen <= INT_MAX) | |
827 | rv = cb(ctx, cmd, bin, binlen); | |
828 | OPENSSL_free(bin); | |
829 | return rv; | |
830 | } |