2017-10-31 13:19:14 +08:00
|
|
|
/*
|
2021-04-08 20:04:41 +08:00
|
|
|
* Copyright 2017-2021 The OpenSSL Project Authors. All Rights Reserved.
|
2017-10-31 13:19:14 +08:00
|
|
|
* Copyright 2017 Ribose Inc. All Rights Reserved.
|
|
|
|
* Ported from Ribose contributions from Botan.
|
|
|
|
*
|
2018-12-06 20:40:06 +08:00
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
2017-10-31 13:19:14 +08:00
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
|
|
|
*/
|
|
|
|
|
2021-06-02 17:07:20 +08:00
|
|
|
#include "internal/deprecated.h"
|
|
|
|
|
2017-10-31 13:19:14 +08:00
|
|
|
#include "internal/cryptlib.h"
|
|
|
|
#ifndef OPENSSL_NO_SM4
|
|
|
|
# include <openssl/evp.h>
|
|
|
|
# include <openssl/modes.h>
|
2019-09-28 06:45:33 +08:00
|
|
|
# include "crypto/sm4.h"
|
|
|
|
# include "crypto/evp.h"
|
2020-07-03 05:12:33 +08:00
|
|
|
# include "evp_local.h"
|
2017-10-31 13:19:14 +08:00
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
SM4_KEY ks;
|
|
|
|
} EVP_SM4_KEY;
|
|
|
|
|
|
|
|
static int sm4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
|
|
|
|
const unsigned char *iv, int enc)
|
|
|
|
{
|
2021-03-09 09:53:33 +08:00
|
|
|
ossl_sm4_set_key(key, EVP_CIPHER_CTX_get_cipher_data(ctx));
|
2017-10-31 13:19:14 +08:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void sm4_cbc_encrypt(const unsigned char *in, unsigned char *out,
|
|
|
|
size_t len, const SM4_KEY *key,
|
|
|
|
unsigned char *ivec, const int enc)
|
|
|
|
{
|
|
|
|
if (enc)
|
|
|
|
CRYPTO_cbc128_encrypt(in, out, len, key, ivec,
|
2021-03-09 09:53:33 +08:00
|
|
|
(block128_f)ossl_sm4_encrypt);
|
2017-10-31 13:19:14 +08:00
|
|
|
else
|
|
|
|
CRYPTO_cbc128_decrypt(in, out, len, key, ivec,
|
2021-03-09 09:53:33 +08:00
|
|
|
(block128_f)ossl_sm4_decrypt);
|
2017-10-31 13:19:14 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void sm4_cfb128_encrypt(const unsigned char *in, unsigned char *out,
|
|
|
|
size_t length, const SM4_KEY *key,
|
|
|
|
unsigned char *ivec, int *num, const int enc)
|
|
|
|
{
|
|
|
|
CRYPTO_cfb128_encrypt(in, out, length, key, ivec, num, enc,
|
2021-03-09 09:53:33 +08:00
|
|
|
(block128_f)ossl_sm4_encrypt);
|
2017-10-31 13:19:14 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void sm4_ecb_encrypt(const unsigned char *in, unsigned char *out,
|
|
|
|
const SM4_KEY *key, const int enc)
|
|
|
|
{
|
|
|
|
if (enc)
|
2021-03-09 09:53:33 +08:00
|
|
|
ossl_sm4_encrypt(in, out, key);
|
2017-10-31 13:19:14 +08:00
|
|
|
else
|
2021-03-09 09:53:33 +08:00
|
|
|
ossl_sm4_decrypt(in, out, key);
|
2017-10-31 13:19:14 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void sm4_ofb128_encrypt(const unsigned char *in, unsigned char *out,
|
|
|
|
size_t length, const SM4_KEY *key,
|
|
|
|
unsigned char *ivec, int *num)
|
|
|
|
{
|
|
|
|
CRYPTO_ofb128_encrypt(in, out, length, key, ivec, num,
|
2021-03-09 09:53:33 +08:00
|
|
|
(block128_f)ossl_sm4_encrypt);
|
2017-10-31 13:19:14 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
IMPLEMENT_BLOCK_CIPHER(sm4, ks, sm4, EVP_SM4_KEY, NID_sm4,
|
|
|
|
16, 16, 16, 128, EVP_CIPH_FLAG_DEFAULT_ASN1,
|
|
|
|
sm4_init_key, 0, 0, 0, 0)
|
|
|
|
|
|
|
|
static int sm4_ctr_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
|
|
|
|
const unsigned char *in, size_t len)
|
|
|
|
{
|
2021-06-07 07:28:49 +08:00
|
|
|
int n = EVP_CIPHER_CTX_get_num(ctx);
|
|
|
|
unsigned int num;
|
2017-10-31 13:19:14 +08:00
|
|
|
EVP_SM4_KEY *dat = EVP_C_DATA(EVP_SM4_KEY, ctx);
|
|
|
|
|
2021-06-07 07:28:49 +08:00
|
|
|
if (n < 0)
|
|
|
|
return 0;
|
|
|
|
num = (unsigned int)n;
|
|
|
|
|
2020-07-03 05:12:33 +08:00
|
|
|
CRYPTO_ctr128_encrypt(in, out, len, &dat->ks, ctx->iv,
|
2017-10-31 13:19:14 +08:00
|
|
|
EVP_CIPHER_CTX_buf_noconst(ctx), &num,
|
2021-03-09 09:53:33 +08:00
|
|
|
(block128_f)ossl_sm4_encrypt);
|
2017-10-31 13:19:14 +08:00
|
|
|
EVP_CIPHER_CTX_set_num(ctx, num);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const EVP_CIPHER sm4_ctr_mode = {
|
|
|
|
NID_sm4_ctr, 1, 16, 16,
|
|
|
|
EVP_CIPH_CTR_MODE,
|
Add "origin" field to EVP_CIPHER, EVP_MD
Add a "where did this EVP_{CIPHER,MD} come from" flag: global, via fetch,
or via EVP_{CIPHER,MD}_meth_new. Update EVP_{CIPHER,MD}_free to handle all
three origins. The flag is deliberately right before some function pointers,
so that compile-time failures (int/pointer) will occur, as opposed to
taking a bit in the existing "flags" field. The "global variable" flag
is non-zero, so the default case of using OPENSSL_zalloc (for provider
ciphers), will do the right thing. Ref-counting is a no-op for
Make up_ref no-op for global MD and CIPHER objects
Deprecate EVP_MD_CTX_md(). Added EVP_MD_CTX_get0_md() (same semantics as
the deprecated function) and EVP_MD_CTX_get1_md(). Likewise, deprecate
EVP_CIPHER_CTX_cipher() in favor of EVP_CIPHER_CTX_get0_cipher(), and add
EVP_CIPHER_CTX_get1_CIPHER().
Refactor EVP_MD_free() and EVP_MD_meth_free() to call new common
evp_md_free_int() function.
Refactor EVP_CIPHER_free() and EVP_CIPHER_meth_free() to call new common
evp_cipher_free_int() function.
Also change some flags tests to explicit test == or != zero. E.g.,
if (flags & x) --> if ((flags & x) != 0)
if (!(flags & x)) --> if ((flags & x) == 0)
Only done for those lines where "get0_cipher" calls were made.
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/14193)
2021-02-17 06:51:56 +08:00
|
|
|
EVP_ORIG_GLOBAL,
|
2017-10-31 13:19:14 +08:00
|
|
|
sm4_init_key,
|
|
|
|
sm4_ctr_cipher,
|
|
|
|
NULL,
|
|
|
|
sizeof(EVP_SM4_KEY),
|
|
|
|
NULL, NULL, NULL, NULL
|
|
|
|
};
|
|
|
|
|
|
|
|
const EVP_CIPHER *EVP_sm4_ctr(void)
|
|
|
|
{
|
|
|
|
return &sm4_ctr_mode;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|