2015-12-18 23:37:02 +08:00
|
|
|
/*
|
2020-08-06 20:22:30 +08:00
|
|
|
* Copyright 2015-2020 The OpenSSL Project Authors. All Rights Reserved.
|
2015-12-18 23:37:02 +08:00
|
|
|
*
|
2018-12-06 20:40:06 +08:00
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 03:38:09 +08:00
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
2015-12-18 23:37:02 +08:00
|
|
|
*/
|
|
|
|
|
2020-02-13 09:00:57 +08:00
|
|
|
/*
|
|
|
|
* EVP _meth_ APIs are deprecated for public use, but still ok for
|
|
|
|
* internal use.
|
|
|
|
*/
|
|
|
|
#include "internal/deprecated.h"
|
|
|
|
|
2015-12-18 23:37:02 +08:00
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include <openssl/evp.h>
|
2019-09-28 06:45:33 +08:00
|
|
|
#include "crypto/evp.h"
|
2019-04-03 22:38:07 +08:00
|
|
|
#include "internal/provider.h"
|
2019-09-28 06:45:40 +08:00
|
|
|
#include "evp_local.h"
|
2015-12-18 23:37:02 +08:00
|
|
|
|
|
|
|
EVP_CIPHER *EVP_CIPHER_meth_new(int cipher_type, int block_size, int key_len)
|
|
|
|
{
|
2019-09-04 00:11:49 +08:00
|
|
|
EVP_CIPHER *cipher = evp_cipher_new();
|
2016-02-08 23:11:56 +08:00
|
|
|
|
2015-12-18 23:37:02 +08:00
|
|
|
if (cipher != NULL) {
|
|
|
|
cipher->nid = cipher_type;
|
|
|
|
cipher->block_size = block_size;
|
|
|
|
cipher->key_len = key_len;
|
Add "origin" field to EVP_CIPHER, EVP_MD
Add a "where did this EVP_{CIPHER,MD} come from" flag: global, via fetch,
or via EVP_{CIPHER,MD}_meth_new. Update EVP_{CIPHER,MD}_free to handle all
three origins. The flag is deliberately right before some function pointers,
so that compile-time failures (int/pointer) will occur, as opposed to
taking a bit in the existing "flags" field. The "global variable" flag
is non-zero, so the default case of using OPENSSL_zalloc (for provider
ciphers), will do the right thing. Ref-counting is a no-op for
Make up_ref no-op for global MD and CIPHER objects
Deprecate EVP_MD_CTX_md(). Added EVP_MD_CTX_get0_md() (same semantics as
the deprecated function) and EVP_MD_CTX_get1_md(). Likewise, deprecate
EVP_CIPHER_CTX_cipher() in favor of EVP_CIPHER_CTX_get0_cipher(), and add
EVP_CIPHER_CTX_get1_CIPHER().
Refactor EVP_MD_free() and EVP_MD_meth_free() to call new common
evp_md_free_int() function.
Refactor EVP_CIPHER_free() and EVP_CIPHER_meth_free() to call new common
evp_cipher_free_int() function.
Also change some flags tests to explicit test == or != zero. E.g.,
if (flags & x) --> if ((flags & x) != 0)
if (!(flags & x)) --> if ((flags & x) == 0)
Only done for those lines where "get0_cipher" calls were made.
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/14193)
2021-02-17 06:51:56 +08:00
|
|
|
cipher->origin = EVP_ORIG_METH;
|
2015-12-18 23:37:02 +08:00
|
|
|
}
|
|
|
|
return cipher;
|
|
|
|
}
|
|
|
|
|
|
|
|
EVP_CIPHER *EVP_CIPHER_meth_dup(const EVP_CIPHER *cipher)
|
|
|
|
{
|
2019-09-04 00:11:49 +08:00
|
|
|
EVP_CIPHER *to = NULL;
|
2016-02-08 23:11:56 +08:00
|
|
|
|
2019-09-04 00:11:49 +08:00
|
|
|
/*
|
|
|
|
* Non-legacy EVP_CIPHERs can't be duplicated like this.
|
|
|
|
* Use EVP_CIPHER_up_ref() instead.
|
|
|
|
*/
|
|
|
|
if (cipher->prov != NULL)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if ((to = EVP_CIPHER_meth_new(cipher->nid, cipher->block_size,
|
2019-09-05 20:50:58 +08:00
|
|
|
cipher->key_len)) != NULL) {
|
2019-04-03 22:38:07 +08:00
|
|
|
CRYPTO_RWLOCK *lock = to->lock;
|
|
|
|
|
2015-12-18 23:37:02 +08:00
|
|
|
memcpy(to, cipher, sizeof(*to));
|
2019-04-03 22:38:07 +08:00
|
|
|
to->lock = lock;
|
|
|
|
}
|
2015-12-18 23:37:02 +08:00
|
|
|
return to;
|
|
|
|
}
|
|
|
|
|
|
|
|
void EVP_CIPHER_meth_free(EVP_CIPHER *cipher)
|
|
|
|
{
|
Add "origin" field to EVP_CIPHER, EVP_MD
Add a "where did this EVP_{CIPHER,MD} come from" flag: global, via fetch,
or via EVP_{CIPHER,MD}_meth_new. Update EVP_{CIPHER,MD}_free to handle all
three origins. The flag is deliberately right before some function pointers,
so that compile-time failures (int/pointer) will occur, as opposed to
taking a bit in the existing "flags" field. The "global variable" flag
is non-zero, so the default case of using OPENSSL_zalloc (for provider
ciphers), will do the right thing. Ref-counting is a no-op for
Make up_ref no-op for global MD and CIPHER objects
Deprecate EVP_MD_CTX_md(). Added EVP_MD_CTX_get0_md() (same semantics as
the deprecated function) and EVP_MD_CTX_get1_md(). Likewise, deprecate
EVP_CIPHER_CTX_cipher() in favor of EVP_CIPHER_CTX_get0_cipher(), and add
EVP_CIPHER_CTX_get1_CIPHER().
Refactor EVP_MD_free() and EVP_MD_meth_free() to call new common
evp_md_free_int() function.
Refactor EVP_CIPHER_free() and EVP_CIPHER_meth_free() to call new common
evp_cipher_free_int() function.
Also change some flags tests to explicit test == or != zero. E.g.,
if (flags & x) --> if ((flags & x) != 0)
if (!(flags & x)) --> if ((flags & x) == 0)
Only done for those lines where "get0_cipher" calls were made.
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/14193)
2021-02-17 06:51:56 +08:00
|
|
|
if (cipher == NULL || cipher->origin != EVP_ORIG_METH)
|
|
|
|
return;
|
|
|
|
|
|
|
|
evp_cipher_free_int(cipher);
|
2015-12-18 23:37:02 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int EVP_CIPHER_meth_set_iv_length(EVP_CIPHER *cipher, int iv_len)
|
|
|
|
{
|
2019-09-05 13:31:38 +08:00
|
|
|
if (cipher->iv_len != 0)
|
|
|
|
return 0;
|
|
|
|
|
2015-12-18 23:37:02 +08:00
|
|
|
cipher->iv_len = iv_len;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int EVP_CIPHER_meth_set_flags(EVP_CIPHER *cipher, unsigned long flags)
|
|
|
|
{
|
2019-09-05 13:31:38 +08:00
|
|
|
if (cipher->flags != 0)
|
|
|
|
return 0;
|
|
|
|
|
2015-12-18 23:37:02 +08:00
|
|
|
cipher->flags = flags;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int EVP_CIPHER_meth_set_impl_ctx_size(EVP_CIPHER *cipher, int ctx_size)
|
|
|
|
{
|
2019-09-05 13:31:38 +08:00
|
|
|
if (cipher->ctx_size != 0)
|
|
|
|
return 0;
|
|
|
|
|
2015-12-18 23:37:02 +08:00
|
|
|
cipher->ctx_size = ctx_size;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int EVP_CIPHER_meth_set_init(EVP_CIPHER *cipher,
|
|
|
|
int (*init) (EVP_CIPHER_CTX *ctx,
|
|
|
|
const unsigned char *key,
|
|
|
|
const unsigned char *iv,
|
|
|
|
int enc))
|
|
|
|
{
|
2019-09-05 13:31:38 +08:00
|
|
|
if (cipher->init != NULL)
|
|
|
|
return 0;
|
|
|
|
|
2015-12-18 23:37:02 +08:00
|
|
|
cipher->init = init;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int EVP_CIPHER_meth_set_do_cipher(EVP_CIPHER *cipher,
|
|
|
|
int (*do_cipher) (EVP_CIPHER_CTX *ctx,
|
|
|
|
unsigned char *out,
|
|
|
|
const unsigned char *in,
|
|
|
|
size_t inl))
|
|
|
|
{
|
2019-09-05 13:31:38 +08:00
|
|
|
if (cipher->do_cipher != NULL)
|
|
|
|
return 0;
|
|
|
|
|
2015-12-18 23:37:02 +08:00
|
|
|
cipher->do_cipher = do_cipher;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int EVP_CIPHER_meth_set_cleanup(EVP_CIPHER *cipher,
|
|
|
|
int (*cleanup) (EVP_CIPHER_CTX *))
|
|
|
|
{
|
2019-09-05 13:31:38 +08:00
|
|
|
if (cipher->cleanup != NULL)
|
|
|
|
return 0;
|
|
|
|
|
2015-12-18 23:37:02 +08:00
|
|
|
cipher->cleanup = cleanup;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int EVP_CIPHER_meth_set_set_asn1_params(EVP_CIPHER *cipher,
|
|
|
|
int (*set_asn1_parameters) (EVP_CIPHER_CTX *,
|
|
|
|
ASN1_TYPE *))
|
|
|
|
{
|
2019-09-05 13:31:38 +08:00
|
|
|
if (cipher->set_asn1_parameters != NULL)
|
|
|
|
return 0;
|
|
|
|
|
2015-12-18 23:37:02 +08:00
|
|
|
cipher->set_asn1_parameters = set_asn1_parameters;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int EVP_CIPHER_meth_set_get_asn1_params(EVP_CIPHER *cipher,
|
|
|
|
int (*get_asn1_parameters) (EVP_CIPHER_CTX *,
|
|
|
|
ASN1_TYPE *))
|
|
|
|
{
|
2019-09-05 13:31:38 +08:00
|
|
|
if (cipher->get_asn1_parameters != NULL)
|
|
|
|
return 0;
|
|
|
|
|
2015-12-18 23:37:02 +08:00
|
|
|
cipher->get_asn1_parameters = get_asn1_parameters;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int EVP_CIPHER_meth_set_ctrl(EVP_CIPHER *cipher,
|
|
|
|
int (*ctrl) (EVP_CIPHER_CTX *, int type,
|
|
|
|
int arg, void *ptr))
|
|
|
|
{
|
2019-09-05 13:31:38 +08:00
|
|
|
if (cipher->ctrl != NULL)
|
|
|
|
return 0;
|
|
|
|
|
2015-12-18 23:37:02 +08:00
|
|
|
cipher->ctrl = ctrl;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int (*EVP_CIPHER_meth_get_init(const EVP_CIPHER *cipher))(EVP_CIPHER_CTX *ctx,
|
|
|
|
const unsigned char *key,
|
|
|
|
const unsigned char *iv,
|
|
|
|
int enc)
|
|
|
|
{
|
|
|
|
return cipher->init;
|
|
|
|
}
|
|
|
|
int (*EVP_CIPHER_meth_get_do_cipher(const EVP_CIPHER *cipher))(EVP_CIPHER_CTX *ctx,
|
|
|
|
unsigned char *out,
|
|
|
|
const unsigned char *in,
|
|
|
|
size_t inl)
|
|
|
|
{
|
|
|
|
return cipher->do_cipher;
|
|
|
|
}
|
|
|
|
|
|
|
|
int (*EVP_CIPHER_meth_get_cleanup(const EVP_CIPHER *cipher))(EVP_CIPHER_CTX *)
|
|
|
|
{
|
|
|
|
return cipher->cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
int (*EVP_CIPHER_meth_get_set_asn1_params(const EVP_CIPHER *cipher))(EVP_CIPHER_CTX *,
|
|
|
|
ASN1_TYPE *)
|
|
|
|
{
|
|
|
|
return cipher->set_asn1_parameters;
|
|
|
|
}
|
|
|
|
|
|
|
|
int (*EVP_CIPHER_meth_get_get_asn1_params(const EVP_CIPHER *cipher))(EVP_CIPHER_CTX *,
|
|
|
|
ASN1_TYPE *)
|
|
|
|
{
|
|
|
|
return cipher->get_asn1_parameters;
|
|
|
|
}
|
|
|
|
|
|
|
|
int (*EVP_CIPHER_meth_get_ctrl(const EVP_CIPHER *cipher))(EVP_CIPHER_CTX *,
|
|
|
|
int type, int arg,
|
|
|
|
void *ptr)
|
|
|
|
{
|
|
|
|
return cipher->ctrl;
|
|
|
|
}
|
|
|
|
|