mirror of
https://github.com/openssl/openssl.git
synced 2025-03-31 20:10:45 +08:00
prov: add extra params argument to KDF implementations
Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/14310)
This commit is contained in:
parent
5cceedb583
commit
3469b38816
@ -123,12 +123,13 @@ static size_t kdf_hkdf_size(KDF_HKDF *ctx)
|
||||
return sz;
|
||||
}
|
||||
|
||||
static int kdf_hkdf_derive(void *vctx, unsigned char *key, size_t keylen)
|
||||
static int kdf_hkdf_derive(void *vctx, unsigned char *key, size_t keylen,
|
||||
const OSSL_PARAM params[])
|
||||
{
|
||||
KDF_HKDF *ctx = (KDF_HKDF *)vctx;
|
||||
const EVP_MD *md;
|
||||
|
||||
if (!ossl_prov_is_running())
|
||||
if (!ossl_prov_is_running() || !kdf_hkdf_set_ctx_params(ctx, params))
|
||||
return 0;
|
||||
|
||||
md = ossl_prov_digest_md(&ctx->digest);
|
||||
|
@ -209,7 +209,8 @@ done:
|
||||
return ret;
|
||||
}
|
||||
|
||||
static int kbkdf_derive(void *vctx, unsigned char *key, size_t keylen)
|
||||
static int kbkdf_derive(void *vctx, unsigned char *key, size_t keylen,
|
||||
const OSSL_PARAM params[])
|
||||
{
|
||||
KBKDF *ctx = (KBKDF *)vctx;
|
||||
int ret = 0;
|
||||
@ -217,7 +218,7 @@ static int kbkdf_derive(void *vctx, unsigned char *key, size_t keylen)
|
||||
uint32_t l = 0;
|
||||
size_t h = 0;
|
||||
|
||||
if (!ossl_prov_is_running())
|
||||
if (!ossl_prov_is_running() || !kbkdf_set_ctx_params(ctx, params))
|
||||
return 0;
|
||||
|
||||
/* label, context, and iv are permitted to be empty. Check everything
|
||||
|
@ -101,14 +101,14 @@ static int krb5kdf_set_membuf(unsigned char **dst, size_t *dst_len,
|
||||
return OSSL_PARAM_get_octet_string(p, (void **)dst, 0, dst_len);
|
||||
}
|
||||
|
||||
static int krb5kdf_derive(void *vctx, unsigned char *key,
|
||||
size_t keylen)
|
||||
static int krb5kdf_derive(void *vctx, unsigned char *key, size_t keylen,
|
||||
const OSSL_PARAM params[])
|
||||
{
|
||||
KRB5KDF_CTX *ctx = (KRB5KDF_CTX *)vctx;
|
||||
const EVP_CIPHER *cipher;
|
||||
ENGINE *engine;
|
||||
|
||||
if (!ossl_prov_is_running())
|
||||
if (!ossl_prov_is_running() || !krb5kdf_set_ctx_params(ctx, params))
|
||||
return 0;
|
||||
|
||||
cipher = ossl_prov_cipher_cipher(&ctx->cipher);
|
||||
|
@ -139,13 +139,13 @@ static int pbkdf2_set_membuf(unsigned char **buffer, size_t *buflen,
|
||||
return 1;
|
||||
}
|
||||
|
||||
static int kdf_pbkdf2_derive(void *vctx, unsigned char *key,
|
||||
size_t keylen)
|
||||
static int kdf_pbkdf2_derive(void *vctx, unsigned char *key, size_t keylen,
|
||||
const OSSL_PARAM params[])
|
||||
{
|
||||
KDF_PBKDF2 *ctx = (KDF_PBKDF2 *)vctx;
|
||||
const EVP_MD *md;
|
||||
|
||||
if (!ossl_prov_is_running())
|
||||
if (!ossl_prov_is_running() || !kdf_pbkdf2_set_ctx_params(ctx, params))
|
||||
return 0;
|
||||
|
||||
if (ctx->pass == NULL) {
|
||||
|
@ -195,13 +195,13 @@ static int pkcs12kdf_set_membuf(unsigned char **buffer, size_t *buflen,
|
||||
return 1;
|
||||
}
|
||||
|
||||
static int kdf_pkcs12_derive(void *vctx, unsigned char *key,
|
||||
size_t keylen)
|
||||
static int kdf_pkcs12_derive(void *vctx, unsigned char *key, size_t keylen,
|
||||
const OSSL_PARAM params[])
|
||||
{
|
||||
KDF_PKCS12 *ctx = (KDF_PKCS12 *)vctx;
|
||||
const EVP_MD *md;
|
||||
|
||||
if (!ossl_prov_is_running())
|
||||
if (!ossl_prov_is_running() || !kdf_pkcs12_set_ctx_params(ctx, params))
|
||||
return 0;
|
||||
|
||||
if (ctx->pass == NULL) {
|
||||
|
@ -147,12 +147,12 @@ static int set_property_query(KDF_SCRYPT *ctx, const char *propq)
|
||||
return 1;
|
||||
}
|
||||
|
||||
static int kdf_scrypt_derive(void *vctx, unsigned char *key,
|
||||
size_t keylen)
|
||||
static int kdf_scrypt_derive(void *vctx, unsigned char *key, size_t keylen,
|
||||
const OSSL_PARAM params[])
|
||||
{
|
||||
KDF_SCRYPT *ctx = (KDF_SCRYPT *)vctx;
|
||||
|
||||
if (!ossl_prov_is_running())
|
||||
if (!ossl_prov_is_running() || !kdf_scrypt_set_ctx_params(ctx, params))
|
||||
return 0;
|
||||
|
||||
if (ctx->pass == NULL) {
|
||||
|
@ -94,13 +94,13 @@ static int sshkdf_set_membuf(unsigned char **dst, size_t *dst_len,
|
||||
return OSSL_PARAM_get_octet_string(p, (void **)dst, 0, dst_len);
|
||||
}
|
||||
|
||||
static int kdf_sshkdf_derive(void *vctx, unsigned char *key,
|
||||
size_t keylen)
|
||||
static int kdf_sshkdf_derive(void *vctx, unsigned char *key, size_t keylen,
|
||||
const OSSL_PARAM params[])
|
||||
{
|
||||
KDF_SSHKDF *ctx = (KDF_SSHKDF *)vctx;
|
||||
const EVP_MD *md;
|
||||
|
||||
if (!ossl_prov_is_running())
|
||||
if (!ossl_prov_is_running() || !kdf_sshkdf_set_ctx_params(ctx, params))
|
||||
return 0;
|
||||
|
||||
md = ossl_prov_digest_md(&ctx->digest);
|
||||
|
@ -342,12 +342,13 @@ static size_t sskdf_size(KDF_SSKDF *ctx)
|
||||
return (len <= 0) ? 0 : (size_t)len;
|
||||
}
|
||||
|
||||
static int sskdf_derive(void *vctx, unsigned char *key, size_t keylen)
|
||||
static int sskdf_derive(void *vctx, unsigned char *key, size_t keylen,
|
||||
const OSSL_PARAM params[])
|
||||
{
|
||||
KDF_SSKDF *ctx = (KDF_SSKDF *)vctx;
|
||||
const EVP_MD *md;
|
||||
|
||||
if (!ossl_prov_is_running())
|
||||
if (!ossl_prov_is_running() || !sskdf_set_ctx_params(ctx, params))
|
||||
return 0;
|
||||
if (ctx->secret == NULL) {
|
||||
ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_SECRET);
|
||||
@ -411,12 +412,13 @@ static int sskdf_derive(void *vctx, unsigned char *key, size_t keylen)
|
||||
}
|
||||
}
|
||||
|
||||
static int x963kdf_derive(void *vctx, unsigned char *key, size_t keylen)
|
||||
static int x963kdf_derive(void *vctx, unsigned char *key, size_t keylen,
|
||||
const OSSL_PARAM params[])
|
||||
{
|
||||
KDF_SSKDF *ctx = (KDF_SSKDF *)vctx;
|
||||
const EVP_MD *md;
|
||||
|
||||
if (!ossl_prov_is_running())
|
||||
if (!ossl_prov_is_running() || !sskdf_set_ctx_params(ctx, params))
|
||||
return 0;
|
||||
|
||||
if (ctx->secret == NULL) {
|
||||
|
@ -131,12 +131,12 @@ static void kdf_tls1_prf_reset(void *vctx)
|
||||
ctx->provctx = provctx;
|
||||
}
|
||||
|
||||
static int kdf_tls1_prf_derive(void *vctx, unsigned char *key,
|
||||
size_t keylen)
|
||||
static int kdf_tls1_prf_derive(void *vctx, unsigned char *key, size_t keylen,
|
||||
const OSSL_PARAM params[])
|
||||
{
|
||||
TLS1_PRF *ctx = (TLS1_PRF *)vctx;
|
||||
|
||||
if (!ossl_prov_is_running())
|
||||
if (!ossl_prov_is_running() || !kdf_tls1_prf_set_ctx_params(ctx, params))
|
||||
return 0;
|
||||
|
||||
if (ctx->P_hash == NULL) {
|
||||
|
@ -392,7 +392,8 @@ static size_t x942kdf_size(KDF_X942 *ctx)
|
||||
return (len <= 0) ? 0 : (size_t)len;
|
||||
}
|
||||
|
||||
static int x942kdf_derive(void *vctx, unsigned char *key, size_t keylen)
|
||||
static int x942kdf_derive(void *vctx, unsigned char *key, size_t keylen,
|
||||
const OSSL_PARAM params[])
|
||||
{
|
||||
KDF_X942 *ctx = (KDF_X942 *)vctx;
|
||||
const EVP_MD *md;
|
||||
@ -401,7 +402,7 @@ static int x942kdf_derive(void *vctx, unsigned char *key, size_t keylen)
|
||||
unsigned char *der = NULL;
|
||||
size_t der_len = 0;
|
||||
|
||||
if (!ossl_prov_is_running())
|
||||
if (!ossl_prov_is_running() || !x942kdf_set_ctx_params(ctx, params))
|
||||
return 0;
|
||||
|
||||
/*
|
||||
|
Loading…
x
Reference in New Issue
Block a user