file_path
stringlengths
19
75
code
stringlengths
279
1.37M
./openssl/fuzz/asn1.c
/* * Copyright 2016-2022 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ /* * Fuzz ASN.1 parsing for various data structures. Specify which on the * command line: * * asn1 <data structure> */ /* We need to use some deprecated APIs */ #define OPENSSL_SUPPRESS_DEPRECATED #include <stdio.h> #include <string.h> #include <openssl/asn1.h> #include <openssl/asn1t.h> #include <openssl/dh.h> #include <openssl/dsa.h> #include <openssl/ec.h> #include <openssl/ocsp.h> #include <openssl/pkcs12.h> #include <openssl/rsa.h> #include <openssl/ts.h> #include <openssl/x509v3.h> #include <openssl/cms.h> #include <openssl/ess.h> #include <openssl/err.h> #include <openssl/rand.h> #include <openssl/bio.h> #include <openssl/evp.h> #include <openssl/ssl.h> #include "internal/nelem.h" #include "fuzzer.h" static ASN1_ITEM_EXP *item_type[] = { ASN1_ITEM_ref(ACCESS_DESCRIPTION), #ifndef OPENSSL_NO_RFC3779 ASN1_ITEM_ref(ASIdentifierChoice), ASN1_ITEM_ref(ASIdentifiers), ASN1_ITEM_ref(ASIdOrRange), #endif ASN1_ITEM_ref(ASN1_ANY), ASN1_ITEM_ref(ASN1_BIT_STRING), ASN1_ITEM_ref(ASN1_BMPSTRING), ASN1_ITEM_ref(ASN1_BOOLEAN), ASN1_ITEM_ref(ASN1_ENUMERATED), ASN1_ITEM_ref(ASN1_FBOOLEAN), ASN1_ITEM_ref(ASN1_GENERALIZEDTIME), ASN1_ITEM_ref(ASN1_GENERALSTRING), ASN1_ITEM_ref(ASN1_IA5STRING), ASN1_ITEM_ref(ASN1_INTEGER), ASN1_ITEM_ref(ASN1_NULL), ASN1_ITEM_ref(ASN1_OBJECT), ASN1_ITEM_ref(ASN1_OCTET_STRING), ASN1_ITEM_ref(ASN1_OCTET_STRING_NDEF), ASN1_ITEM_ref(ASN1_PRINTABLE), ASN1_ITEM_ref(ASN1_PRINTABLESTRING), ASN1_ITEM_ref(ASN1_SEQUENCE), ASN1_ITEM_ref(ASN1_SEQUENCE_ANY), ASN1_ITEM_ref(ASN1_SET_ANY), ASN1_ITEM_ref(ASN1_T61STRING), ASN1_ITEM_ref(ASN1_TBOOLEAN), ASN1_ITEM_ref(ASN1_TIME), ASN1_ITEM_ref(ASN1_UNIVERSALSTRING), ASN1_ITEM_ref(ASN1_UTCTIME), ASN1_ITEM_ref(ASN1_UTF8STRING), ASN1_ITEM_ref(ASN1_VISIBLESTRING), #ifndef OPENSSL_NO_RFC3779 ASN1_ITEM_ref(ASRange), #endif ASN1_ITEM_ref(AUTHORITY_INFO_ACCESS), ASN1_ITEM_ref(AUTHORITY_KEYID), ASN1_ITEM_ref(BASIC_CONSTRAINTS), ASN1_ITEM_ref(BIGNUM), ASN1_ITEM_ref(CBIGNUM), ASN1_ITEM_ref(CERTIFICATEPOLICIES), #ifndef OPENSSL_NO_CMS ASN1_ITEM_ref(CMS_ContentInfo), ASN1_ITEM_ref(CMS_ReceiptRequest), ASN1_ITEM_ref(CRL_DIST_POINTS), #endif #ifndef OPENSSL_NO_DH ASN1_ITEM_ref(DHparams), #endif ASN1_ITEM_ref(DIRECTORYSTRING), ASN1_ITEM_ref(DISPLAYTEXT), ASN1_ITEM_ref(DIST_POINT), ASN1_ITEM_ref(DIST_POINT_NAME), #if !defined(OPENSSL_NO_EC) && !defined(OPENSSL_NO_DEPRECATED_3_0) ASN1_ITEM_ref(ECPARAMETERS), ASN1_ITEM_ref(ECPKPARAMETERS), #endif ASN1_ITEM_ref(EDIPARTYNAME), ASN1_ITEM_ref(EXTENDED_KEY_USAGE), ASN1_ITEM_ref(GENERAL_NAME), ASN1_ITEM_ref(GENERAL_NAMES), ASN1_ITEM_ref(GENERAL_SUBTREE), #ifndef OPENSSL_NO_RFC3779 ASN1_ITEM_ref(IPAddressChoice), ASN1_ITEM_ref(IPAddressFamily), ASN1_ITEM_ref(IPAddressOrRange), ASN1_ITEM_ref(IPAddressRange), #endif ASN1_ITEM_ref(ISSUING_DIST_POINT), #ifndef OPENSSL_NO_DEPRECATED_3_0 ASN1_ITEM_ref(LONG), #endif ASN1_ITEM_ref(NAME_CONSTRAINTS), ASN1_ITEM_ref(NETSCAPE_CERT_SEQUENCE), ASN1_ITEM_ref(NETSCAPE_SPKAC), ASN1_ITEM_ref(NETSCAPE_SPKI), ASN1_ITEM_ref(NOTICEREF), #ifndef OPENSSL_NO_OCSP ASN1_ITEM_ref(OCSP_BASICRESP), ASN1_ITEM_ref(OCSP_CERTID), ASN1_ITEM_ref(OCSP_CERTSTATUS), ASN1_ITEM_ref(OCSP_CRLID), ASN1_ITEM_ref(OCSP_ONEREQ), ASN1_ITEM_ref(OCSP_REQINFO), ASN1_ITEM_ref(OCSP_REQUEST), ASN1_ITEM_ref(OCSP_RESPBYTES), ASN1_ITEM_ref(OCSP_RESPDATA), ASN1_ITEM_ref(OCSP_RESPID), ASN1_ITEM_ref(OCSP_RESPONSE), ASN1_ITEM_ref(OCSP_REVOKEDINFO), ASN1_ITEM_ref(OCSP_SERVICELOC), ASN1_ITEM_ref(OCSP_SIGNATURE), ASN1_ITEM_ref(OCSP_SINGLERESP), #endif ASN1_ITEM_ref(OTHERNAME), ASN1_ITEM_ref(PBE2PARAM), ASN1_ITEM_ref(PBEPARAM), ASN1_ITEM_ref(PBKDF2PARAM), ASN1_ITEM_ref(PKCS12), ASN1_ITEM_ref(PKCS12_AUTHSAFES), ASN1_ITEM_ref(PKCS12_BAGS), ASN1_ITEM_ref(PKCS12_MAC_DATA), ASN1_ITEM_ref(PKCS12_SAFEBAG), ASN1_ITEM_ref(PKCS12_SAFEBAGS), ASN1_ITEM_ref(PKCS7), ASN1_ITEM_ref(PKCS7_ATTR_SIGN), ASN1_ITEM_ref(PKCS7_ATTR_VERIFY), ASN1_ITEM_ref(PKCS7_DIGEST), ASN1_ITEM_ref(PKCS7_ENC_CONTENT), ASN1_ITEM_ref(PKCS7_ENCRYPT), ASN1_ITEM_ref(PKCS7_ENVELOPE), ASN1_ITEM_ref(PKCS7_ISSUER_AND_SERIAL), ASN1_ITEM_ref(PKCS7_RECIP_INFO), ASN1_ITEM_ref(PKCS7_SIGNED), ASN1_ITEM_ref(PKCS7_SIGN_ENVELOPE), ASN1_ITEM_ref(PKCS7_SIGNER_INFO), ASN1_ITEM_ref(PKCS8_PRIV_KEY_INFO), ASN1_ITEM_ref(PKEY_USAGE_PERIOD), ASN1_ITEM_ref(POLICY_CONSTRAINTS), ASN1_ITEM_ref(POLICYINFO), ASN1_ITEM_ref(POLICY_MAPPING), ASN1_ITEM_ref(POLICY_MAPPINGS), ASN1_ITEM_ref(POLICYQUALINFO), ASN1_ITEM_ref(PROXY_CERT_INFO_EXTENSION), ASN1_ITEM_ref(PROXY_POLICY), ASN1_ITEM_ref(RSA_OAEP_PARAMS), ASN1_ITEM_ref(RSA_PSS_PARAMS), #ifndef OPENSSL_NO_DEPRECATED_3_0 ASN1_ITEM_ref(RSAPrivateKey), ASN1_ITEM_ref(RSAPublicKey), #endif ASN1_ITEM_ref(SXNET), ASN1_ITEM_ref(SXNETID), ASN1_ITEM_ref(USERNOTICE), ASN1_ITEM_ref(X509), ASN1_ITEM_ref(X509_ALGOR), ASN1_ITEM_ref(X509_ALGORS), ASN1_ITEM_ref(X509_ATTRIBUTE), ASN1_ITEM_ref(X509_CERT_AUX), ASN1_ITEM_ref(X509_CINF), ASN1_ITEM_ref(X509_CRL), ASN1_ITEM_ref(X509_CRL_INFO), ASN1_ITEM_ref(X509_EXTENSION), ASN1_ITEM_ref(X509_EXTENSIONS), ASN1_ITEM_ref(X509_NAME), ASN1_ITEM_ref(X509_NAME_ENTRY), ASN1_ITEM_ref(X509_PUBKEY), ASN1_ITEM_ref(X509_REQ), ASN1_ITEM_ref(X509_REQ_INFO), ASN1_ITEM_ref(X509_REVOKED), ASN1_ITEM_ref(X509_SIG), ASN1_ITEM_ref(X509_VAL), #ifndef OPENSSL_NO_DEPRECATED_3_0 ASN1_ITEM_ref(ZLONG), #endif ASN1_ITEM_ref(INT32), ASN1_ITEM_ref(ZINT32), ASN1_ITEM_ref(UINT32), ASN1_ITEM_ref(ZUINT32), ASN1_ITEM_ref(INT64), ASN1_ITEM_ref(ZINT64), ASN1_ITEM_ref(UINT64), ASN1_ITEM_ref(ZUINT64), NULL }; static ASN1_PCTX *pctx; #define DO_TEST(TYPE, D2I, I2D, PRINT) { \ const unsigned char *p = buf; \ unsigned char *der = NULL; \ TYPE *type = D2I(NULL, &p, len); \ \ if (type != NULL) { \ int len2; \ BIO *bio = BIO_new(BIO_s_null()); \ \ if (bio != NULL) { \ PRINT(bio, type); \ BIO_free(bio); \ } \ len2 = I2D(type, &der); \ if (len2 != 0) {} \ OPENSSL_free(der); \ TYPE ## _free(type); \ } \ } #define DO_TEST_PRINT_OFFSET(TYPE, D2I, I2D, PRINT) { \ const unsigned char *p = buf; \ unsigned char *der = NULL; \ TYPE *type = D2I(NULL, &p, len); \ \ if (type != NULL) { \ BIO *bio = BIO_new(BIO_s_null()); \ \ if (bio != NULL) { \ PRINT(bio, type, 0); \ BIO_free(bio); \ } \ I2D(type, &der); \ OPENSSL_free(der); \ TYPE ## _free(type); \ } \ } #define DO_TEST_PRINT_PCTX(TYPE, D2I, I2D, PRINT) { \ const unsigned char *p = buf; \ unsigned char *der = NULL; \ TYPE *type = D2I(NULL, &p, len); \ \ if (type != NULL) { \ BIO *bio = BIO_new(BIO_s_null()); \ \ if (bio != NULL) { \ PRINT(bio, type, 0, pctx); \ BIO_free(bio); \ } \ I2D(type, &der); \ OPENSSL_free(der); \ TYPE ## _free(type); \ } \ } #define DO_TEST_NO_PRINT(TYPE, D2I, I2D) { \ const unsigned char *p = buf; \ unsigned char *der = NULL; \ TYPE *type = D2I(NULL, &p, len); \ \ if (type != NULL) { \ BIO *bio = BIO_new(BIO_s_null()); \ \ BIO_free(bio); \ I2D(type, &der); \ OPENSSL_free(der); \ TYPE ## _free(type); \ } \ } int FuzzerInitialize(int *argc, char ***argv) { FuzzerSetRand(); pctx = ASN1_PCTX_new(); ASN1_PCTX_set_flags(pctx, ASN1_PCTX_FLAGS_SHOW_ABSENT | ASN1_PCTX_FLAGS_SHOW_SEQUENCE | ASN1_PCTX_FLAGS_SHOW_SSOF | ASN1_PCTX_FLAGS_SHOW_TYPE | ASN1_PCTX_FLAGS_SHOW_FIELD_STRUCT_NAME); ASN1_PCTX_set_str_flags(pctx, ASN1_STRFLGS_UTF8_CONVERT | ASN1_STRFLGS_SHOW_TYPE | ASN1_STRFLGS_DUMP_ALL); OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL); OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS, NULL); ERR_clear_error(); CRYPTO_free_ex_index(0, -1); return 1; } int FuzzerTestOneInput(const uint8_t *buf, size_t len) { int n; for (n = 0; item_type[n] != NULL; ++n) { const uint8_t *b = buf; unsigned char *der = NULL; const ASN1_ITEM *i = ASN1_ITEM_ptr(item_type[n]); ASN1_VALUE *o = ASN1_item_d2i(NULL, &b, len, i); if (o != NULL) { BIO *bio = BIO_new(BIO_s_null()); if (bio != NULL) { ASN1_item_print(bio, o, 4, i, pctx); BIO_free(bio); } if (ASN1_item_i2d(o, &der, i) > 0) { OPENSSL_free(der); } ASN1_item_free(o, i); } } #ifndef OPENSSL_NO_TS DO_TEST(TS_REQ, d2i_TS_REQ, i2d_TS_REQ, TS_REQ_print_bio); DO_TEST(TS_MSG_IMPRINT, d2i_TS_MSG_IMPRINT, i2d_TS_MSG_IMPRINT, TS_MSG_IMPRINT_print_bio); DO_TEST(TS_RESP, d2i_TS_RESP, i2d_TS_RESP, TS_RESP_print_bio); DO_TEST(TS_STATUS_INFO, d2i_TS_STATUS_INFO, i2d_TS_STATUS_INFO, TS_STATUS_INFO_print_bio); DO_TEST(TS_TST_INFO, d2i_TS_TST_INFO, i2d_TS_TST_INFO, TS_TST_INFO_print_bio); DO_TEST_NO_PRINT(TS_ACCURACY, d2i_TS_ACCURACY, i2d_TS_ACCURACY); #endif DO_TEST_NO_PRINT(ESS_ISSUER_SERIAL, d2i_ESS_ISSUER_SERIAL, i2d_ESS_ISSUER_SERIAL); DO_TEST_NO_PRINT(ESS_CERT_ID, d2i_ESS_CERT_ID, i2d_ESS_CERT_ID); DO_TEST_NO_PRINT(ESS_SIGNING_CERT, d2i_ESS_SIGNING_CERT, i2d_ESS_SIGNING_CERT); DO_TEST_NO_PRINT(ESS_CERT_ID_V2, d2i_ESS_CERT_ID_V2, i2d_ESS_CERT_ID_V2); DO_TEST_NO_PRINT(ESS_SIGNING_CERT_V2, d2i_ESS_SIGNING_CERT_V2, i2d_ESS_SIGNING_CERT_V2); #if !defined(OPENSSL_NO_DH) && !defined(OPENSSL_NO_DEPRECATED_3_0) DO_TEST_NO_PRINT(DH, d2i_DHparams, i2d_DHparams); DO_TEST_NO_PRINT(DH, d2i_DHxparams, i2d_DHxparams); #endif #ifndef OPENSSL_NO_DSA DO_TEST_NO_PRINT(DSA_SIG, d2i_DSA_SIG, i2d_DSA_SIG); # ifndef OPENSSL_NO_DEPRECATED_3_0 DO_TEST_NO_PRINT(DSA, d2i_DSAPrivateKey, i2d_DSAPrivateKey); DO_TEST_NO_PRINT(DSA, d2i_DSAPublicKey, i2d_DSAPublicKey); DO_TEST_NO_PRINT(DSA, d2i_DSAparams, i2d_DSAparams); # endif #endif #ifndef OPENSSL_NO_DEPRECATED_3_0 DO_TEST_NO_PRINT(RSA, d2i_RSAPublicKey, i2d_RSAPublicKey); #endif #ifndef OPENSSL_NO_EC # ifndef OPENSSL_NO_DEPRECATED_3_0 DO_TEST_PRINT_OFFSET(EC_GROUP, d2i_ECPKParameters, i2d_ECPKParameters, ECPKParameters_print); DO_TEST_PRINT_OFFSET(EC_KEY, d2i_ECPrivateKey, i2d_ECPrivateKey, EC_KEY_print); DO_TEST(EC_KEY, d2i_ECParameters, i2d_ECParameters, ECParameters_print); DO_TEST_NO_PRINT(ECDSA_SIG, d2i_ECDSA_SIG, i2d_ECDSA_SIG); # endif #endif DO_TEST_PRINT_PCTX(EVP_PKEY, d2i_AutoPrivateKey, i2d_PrivateKey, EVP_PKEY_print_private); DO_TEST(SSL_SESSION, d2i_SSL_SESSION, i2d_SSL_SESSION, SSL_SESSION_print); ERR_clear_error(); return 0; } void FuzzerCleanup(void) { ASN1_PCTX_free(pctx); FuzzerClearRand(); }
./openssl/fuzz/punycode.c
/* * Copyright 2022 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "crypto/punycode.h" #include "internal/nelem.h" #include <openssl/crypto.h> #include "fuzzer.h" #include <stdio.h> #include <string.h> int FuzzerInitialize(int *argc, char ***argv) { return 1; } int FuzzerTestOneInput(const uint8_t *buf, size_t len) { char *b; unsigned int out[16], outlen = OSSL_NELEM(out); char outc[16]; b = OPENSSL_malloc(len + 1); if (b != NULL) { ossl_punycode_decode((const char *)buf, len, out, &outlen); memcpy(b, buf, len); b[len] = '\0'; ossl_a2ulabel(b, outc, sizeof(outc)); OPENSSL_free(b); } return 0; } void FuzzerCleanup(void) { }
./openssl/fuzz/quic-lcidm.c
/* * Copyright 2016-2022 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ #include <openssl/ssl.h> #include <openssl/err.h> #include <openssl/bio.h> #include "fuzzer.h" #include "internal/quic_lcidm.h" #include "internal/packet.h" int FuzzerInitialize(int *argc, char ***argv) { FuzzerSetRand(); OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS | OPENSSL_INIT_ASYNC, NULL); OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS, NULL); ERR_clear_error(); return 1; } /* * Fuzzer input "protocol": * Big endian * u8(LCID length) * Zero or more of: * ENROL_ODCID u0(0x00) u64(opaque) u8(cidl):cid * RETIRE_ODCID u8(0x01) u64(opaque) * GENERATE_INITIAL u8(0x02) u64(opaque) * GENERATE u8(0x03) u64(opaque) * RETIRE u8(0x04) u64(opaque) u64(retire_prior_to) * CULL u8(0x05) u64(opaque) * LOOKUP u8(0x06) u8(cidl):cid */ enum { CMD_ENROL_ODCID, CMD_RETIRE_ODCID, CMD_GENERATE_INITIAL, CMD_GENERATE, CMD_RETIRE, CMD_CULL, CMD_LOOKUP }; static int get_cid(PACKET *pkt, QUIC_CONN_ID *cid) { unsigned int cidl; if (!PACKET_get_1(pkt, &cidl) || cidl > QUIC_MAX_CONN_ID_LEN || !PACKET_copy_bytes(pkt, cid->id, cidl)) return 0; cid->id_len = (unsigned char)cidl; return 1; } int FuzzerTestOneInput(const uint8_t *buf, size_t len) { int rc = 0; QUIC_LCIDM *lcidm = NULL; PACKET pkt; uint64_t arg_opaque, arg_retire_prior_to, seq_num_out; unsigned int cmd, lcidl; QUIC_CONN_ID arg_cid, cid_out; OSSL_QUIC_FRAME_NEW_CONN_ID ncid_frame; int did_retire; void *opaque_out; if (!PACKET_buf_init(&pkt, buf, len)) goto err; if (!PACKET_get_1(&pkt, &lcidl) || lcidl > QUIC_MAX_CONN_ID_LEN) { rc = -1; goto err; } if ((lcidm = ossl_quic_lcidm_new(NULL, lcidl)) == NULL) { rc = -1; goto err; } while (PACKET_remaining(&pkt) > 0) { if (!PACKET_get_1(&pkt, &cmd)) goto err; switch (cmd) { case CMD_ENROL_ODCID: if (!PACKET_get_net_8(&pkt, &arg_opaque) || !get_cid(&pkt, &arg_cid)) { rc = -1; goto err; } ossl_quic_lcidm_enrol_odcid(lcidm, (void *)(uintptr_t)arg_opaque, &arg_cid); break; case CMD_RETIRE_ODCID: if (!PACKET_get_net_8(&pkt, &arg_opaque)) { rc = -1; goto err; } ossl_quic_lcidm_retire_odcid(lcidm, (void *)(uintptr_t)arg_opaque); break; case CMD_GENERATE_INITIAL: if (!PACKET_get_net_8(&pkt, &arg_opaque)) { rc = -1; goto err; } ossl_quic_lcidm_generate_initial(lcidm, (void *)(uintptr_t)arg_opaque, &cid_out); break; case CMD_GENERATE: if (!PACKET_get_net_8(&pkt, &arg_opaque)) { rc = -1; goto err; } ossl_quic_lcidm_generate(lcidm, (void *)(uintptr_t)arg_opaque, &ncid_frame); break; case CMD_RETIRE: if (!PACKET_get_net_8(&pkt, &arg_opaque) || !PACKET_get_net_8(&pkt, &arg_retire_prior_to)) { rc = -1; goto err; } ossl_quic_lcidm_retire(lcidm, (void *)(uintptr_t)arg_opaque, arg_retire_prior_to, NULL, &cid_out, &seq_num_out, &did_retire); break; case CMD_CULL: if (!PACKET_get_net_8(&pkt, &arg_opaque)) { rc = -1; goto err; } ossl_quic_lcidm_cull(lcidm, (void *)(uintptr_t)arg_opaque); break; case CMD_LOOKUP: if (!get_cid(&pkt, &arg_cid)) { rc = -1; goto err; } ossl_quic_lcidm_lookup(lcidm, &arg_cid, &seq_num_out, &opaque_out); break; default: rc = -1; goto err; } } err: ossl_quic_lcidm_free(lcidm); return rc; } void FuzzerCleanup(void) { FuzzerClearRand(); }
./openssl/fuzz/test-corpus.c
/* * Copyright 2016-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ /* * Given a list of files, run each of them through the fuzzer. Note that * failure will be indicated by some kind of crash. Switching on things like * asan improves the test. */ #include <stdio.h> #include <stdlib.h> #include <string.h> #include <sys/stat.h> #include <openssl/crypto.h> #include "fuzzer.h" #include "internal/o_dir.h" #if defined(_WIN32) && defined(_MAX_PATH) && !defined(PATH_MAX) # define PATH_MAX _MAX_PATH #endif #ifndef PATH_MAX # define PATH_MAX 4096 #endif # if !defined(S_ISREG) # define S_ISREG(m) ((m) & S_IFREG) # endif static void testfile(const char *pathname) { struct stat st; FILE *f; unsigned char *buf; size_t s; if (stat(pathname, &st) < 0 || !S_ISREG(st.st_mode)) return; printf("# %s\n", pathname); fflush(stdout); f = fopen(pathname, "rb"); if (f == NULL) return; buf = malloc(st.st_size); if (buf != NULL) { s = fread(buf, 1, st.st_size, f); OPENSSL_assert(s == (size_t)st.st_size); FuzzerTestOneInput(buf, s); free(buf); } fclose(f); } int main(int argc, char **argv) { int n; FuzzerInitialize(&argc, &argv); for (n = 1; n < argc; ++n) { size_t dirname_len = strlen(argv[n]); const char *filename = NULL; char *pathname = NULL; OPENSSL_DIR_CTX *ctx = NULL; int wasdir = 0; /* * We start with trying to read the given path as a directory. */ while ((filename = OPENSSL_DIR_read(&ctx, argv[n])) != NULL) { wasdir = 1; if (pathname == NULL) { pathname = malloc(PATH_MAX); if (pathname == NULL) break; strcpy(pathname, argv[n]); #ifdef __VMS if (strchr(":<]", pathname[dirname_len - 1]) == NULL) #endif pathname[dirname_len++] = '/'; pathname[dirname_len] = '\0'; } strcpy(pathname + dirname_len, filename); testfile(pathname); } OPENSSL_DIR_end(&ctx); /* If it wasn't a directory, treat it as a file instead */ if (!wasdir) testfile(argv[n]); free(pathname); } FuzzerCleanup(); return 0; }
./openssl/fuzz/fuzz_rand.c
/* * Copyright 2016-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ #include <openssl/core_names.h> #include <openssl/rand.h> #include <openssl/provider.h> #include "fuzzer.h" static OSSL_FUNC_rand_newctx_fn fuzz_rand_newctx; static OSSL_FUNC_rand_freectx_fn fuzz_rand_freectx; static OSSL_FUNC_rand_instantiate_fn fuzz_rand_instantiate; static OSSL_FUNC_rand_uninstantiate_fn fuzz_rand_uninstantiate; static OSSL_FUNC_rand_generate_fn fuzz_rand_generate; static OSSL_FUNC_rand_gettable_ctx_params_fn fuzz_rand_gettable_ctx_params; static OSSL_FUNC_rand_get_ctx_params_fn fuzz_rand_get_ctx_params; static OSSL_FUNC_rand_enable_locking_fn fuzz_rand_enable_locking; static void *fuzz_rand_newctx( void *provctx, void *parent, const OSSL_DISPATCH *parent_dispatch) { int *st = OPENSSL_malloc(sizeof(*st)); if (st != NULL) *st = EVP_RAND_STATE_UNINITIALISED; return st; } static void fuzz_rand_freectx(ossl_unused void *vrng) { OPENSSL_free(vrng); } static int fuzz_rand_instantiate(ossl_unused void *vrng, ossl_unused unsigned int strength, ossl_unused int prediction_resistance, ossl_unused const unsigned char *pstr, ossl_unused size_t pstr_len, ossl_unused const OSSL_PARAM params[]) { *(int *)vrng = EVP_RAND_STATE_READY; return 1; } static int fuzz_rand_uninstantiate(ossl_unused void *vrng) { *(int *)vrng = EVP_RAND_STATE_UNINITIALISED; return 1; } static int fuzz_rand_generate(ossl_unused void *vdrbg, unsigned char *out, size_t outlen, ossl_unused unsigned int strength, ossl_unused int prediction_resistance, ossl_unused const unsigned char *adin, ossl_unused size_t adinlen) { unsigned char val = 1; size_t i; for (i = 0; i < outlen; i++) out[i] = val++; return 1; } static int fuzz_rand_enable_locking(ossl_unused void *vrng) { return 1; } static int fuzz_rand_get_ctx_params(void *vrng, OSSL_PARAM params[]) { OSSL_PARAM *p; p = OSSL_PARAM_locate(params, OSSL_RAND_PARAM_STATE); if (p != NULL && !OSSL_PARAM_set_int(p, *(int *)vrng)) return 0; p = OSSL_PARAM_locate(params, OSSL_RAND_PARAM_STRENGTH); if (p != NULL && !OSSL_PARAM_set_int(p, 500)) return 0; p = OSSL_PARAM_locate(params, OSSL_RAND_PARAM_MAX_REQUEST); if (p != NULL && !OSSL_PARAM_set_size_t(p, INT_MAX)) return 0; return 1; } static const OSSL_PARAM *fuzz_rand_gettable_ctx_params(ossl_unused void *vrng, ossl_unused void *provctx) { static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_int(OSSL_RAND_PARAM_STATE, NULL), OSSL_PARAM_uint(OSSL_RAND_PARAM_STRENGTH, NULL), OSSL_PARAM_size_t(OSSL_RAND_PARAM_MAX_REQUEST, NULL), OSSL_PARAM_END }; return known_gettable_ctx_params; } static const OSSL_DISPATCH fuzz_rand_functions[] = { { OSSL_FUNC_RAND_NEWCTX, (void (*)(void))fuzz_rand_newctx }, { OSSL_FUNC_RAND_FREECTX, (void (*)(void))fuzz_rand_freectx }, { OSSL_FUNC_RAND_INSTANTIATE, (void (*)(void))fuzz_rand_instantiate }, { OSSL_FUNC_RAND_UNINSTANTIATE, (void (*)(void))fuzz_rand_uninstantiate }, { OSSL_FUNC_RAND_GENERATE, (void (*)(void))fuzz_rand_generate }, { OSSL_FUNC_RAND_ENABLE_LOCKING, (void (*)(void))fuzz_rand_enable_locking }, { OSSL_FUNC_RAND_GETTABLE_CTX_PARAMS, (void(*)(void))fuzz_rand_gettable_ctx_params }, { OSSL_FUNC_RAND_GET_CTX_PARAMS, (void(*)(void))fuzz_rand_get_ctx_params }, OSSL_DISPATCH_END }; static const OSSL_ALGORITHM fuzz_rand_rand[] = { { "fuzz", "provider=fuzz-rand", fuzz_rand_functions }, { NULL, NULL, NULL } }; static const OSSL_ALGORITHM *fuzz_rand_query(void *provctx, int operation_id, int *no_cache) { *no_cache = 0; switch (operation_id) { case OSSL_OP_RAND: return fuzz_rand_rand; } return NULL; } /* Functions we provide to the core */ static const OSSL_DISPATCH fuzz_rand_method[] = { { OSSL_FUNC_PROVIDER_TEARDOWN, (void (*)(void))OSSL_LIB_CTX_free }, { OSSL_FUNC_PROVIDER_QUERY_OPERATION, (void (*)(void))fuzz_rand_query }, OSSL_DISPATCH_END }; static int fuzz_rand_provider_init(const OSSL_CORE_HANDLE *handle, const OSSL_DISPATCH *in, const OSSL_DISPATCH **out, void **provctx) { *provctx = OSSL_LIB_CTX_new(); if (*provctx == NULL) return 0; *out = fuzz_rand_method; return 1; } static OSSL_PROVIDER *r_prov; void FuzzerSetRand(void) { if (!OSSL_PROVIDER_add_builtin(NULL, "fuzz-rand", fuzz_rand_provider_init) || !RAND_set_DRBG_type(NULL, "fuzz", NULL, NULL, NULL) || (r_prov = OSSL_PROVIDER_try_load(NULL, "fuzz-rand", 1)) == NULL) exit(1); } void FuzzerClearRand(void) { OSSL_PROVIDER_unload(r_prov); }
./openssl/fuzz/quic-srtm.c
/* * Copyright 2016-2022 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ #include <openssl/ssl.h> #include <openssl/err.h> #include <openssl/bio.h> #include "fuzzer.h" #include "internal/quic_srtm.h" int FuzzerInitialize(int *argc, char ***argv) { FuzzerSetRand(); OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS | OPENSSL_INIT_ASYNC, NULL); OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS, NULL); ERR_clear_error(); return 1; } /* * Fuzzer input "protocol": * Big endian * Zero or more of: * ADD - u8(0x00) u64(opaque) u64(seq_num) u128(token) * REMOVE - u8(0x01) u64(opaque) u64(seq_num) * CULL - u8(0x02) u64(opaque) * LOOKUP - u8(0x03) u128(token) u64(idx) */ enum { CMD_ADD, CMD_REMOVE, CMD_CULL, CMD_LOOKUP }; int FuzzerTestOneInput(const uint8_t *buf, size_t len) { int rc = 0; QUIC_SRTM *srtm = NULL; PACKET pkt; unsigned int cmd; uint64_t arg_opaque, arg_seq_num, arg_idx; QUIC_STATELESS_RESET_TOKEN arg_token; if ((srtm = ossl_quic_srtm_new(NULL, NULL)) == NULL) { rc = -1; goto err; } if (!PACKET_buf_init(&pkt, buf, len)) goto err; while (PACKET_remaining(&pkt) > 0) { if (!PACKET_get_1(&pkt, &cmd)) goto err; switch (cmd) { case CMD_ADD: if (!PACKET_get_net_8(&pkt, &arg_opaque) || !PACKET_get_net_8(&pkt, &arg_seq_num) || !PACKET_copy_bytes(&pkt, arg_token.token, sizeof(arg_token.token))) continue; /* just stop */ ossl_quic_srtm_add(srtm, (void *)(uintptr_t)arg_opaque, arg_seq_num, &arg_token); ossl_quic_srtm_check(srtm); break; case CMD_REMOVE: if (!PACKET_get_net_8(&pkt, &arg_opaque) || !PACKET_get_net_8(&pkt, &arg_seq_num)) continue; /* just stop */ ossl_quic_srtm_remove(srtm, (void *)(uintptr_t)arg_opaque, arg_seq_num); ossl_quic_srtm_check(srtm); break; case CMD_CULL: if (!PACKET_get_net_8(&pkt, &arg_opaque)) continue; /* just stop */ ossl_quic_srtm_cull(srtm, (void *)(uintptr_t)arg_opaque); ossl_quic_srtm_check(srtm); break; case CMD_LOOKUP: if (!PACKET_copy_bytes(&pkt, arg_token.token, sizeof(arg_token.token)) || !PACKET_get_net_8(&pkt, &arg_idx)) continue; /* just stop */ ossl_quic_srtm_lookup(srtm, &arg_token, (size_t)arg_idx, NULL, NULL); ossl_quic_srtm_check(srtm); break; default: /* Other bytes are treated as no-ops */ continue; } } err: ossl_quic_srtm_free(srtm); return rc; } void FuzzerCleanup(void) { FuzzerClearRand(); }
./openssl/fuzz/server.c
/* * Copyright 2016-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ /* Shamelessly copied from BoringSSL and converted to C. */ /* Test first part of SSL server handshake. */ /* We need to use some deprecated APIs */ #define OPENSSL_SUPPRESS_DEPRECATED #include <time.h> #include <openssl/rand.h> #include <openssl/ssl.h> #include <openssl/rsa.h> #include <openssl/dsa.h> #include <openssl/ec.h> #include <openssl/dh.h> #include <openssl/err.h> #include "fuzzer.h" static const uint8_t kCertificateDER[] = { 0x30, 0x82, 0x02, 0xff, 0x30, 0x82, 0x01, 0xe7, 0xa0, 0x03, 0x02, 0x01, 0x02, 0x02, 0x11, 0x00, 0xb1, 0x84, 0xee, 0x34, 0x99, 0x98, 0x76, 0xfb, 0x6f, 0xb2, 0x15, 0xc8, 0x47, 0x79, 0x05, 0x9b, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05, 0x00, 0x30, 0x12, 0x31, 0x10, 0x30, 0x0e, 0x06, 0x03, 0x55, 0x04, 0x0a, 0x13, 0x07, 0x41, 0x63, 0x6d, 0x65, 0x20, 0x43, 0x6f, 0x30, 0x1e, 0x17, 0x0d, 0x31, 0x35, 0x31, 0x31, 0x30, 0x37, 0x30, 0x30, 0x32, 0x34, 0x35, 0x36, 0x5a, 0x17, 0x0d, 0x31, 0x36, 0x31, 0x31, 0x30, 0x36, 0x30, 0x30, 0x32, 0x34, 0x35, 0x36, 0x5a, 0x30, 0x12, 0x31, 0x10, 0x30, 0x0e, 0x06, 0x03, 0x55, 0x04, 0x0a, 0x13, 0x07, 0x41, 0x63, 0x6d, 0x65, 0x20, 0x43, 0x6f, 0x30, 0x82, 0x01, 0x22, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x01, 0x05, 0x00, 0x03, 0x82, 0x01, 0x0f, 0x00, 0x30, 0x82, 0x01, 0x0a, 0x02, 0x82, 0x01, 0x01, 0x00, 0xce, 0x47, 0xcb, 0x11, 0xbb, 0xd2, 0x9d, 0x8e, 0x9e, 0xd2, 0x1e, 0x14, 0xaf, 0xc7, 0xea, 0xb6, 0xc9, 0x38, 0x2a, 0x6f, 0xb3, 0x7e, 0xfb, 0xbc, 0xfc, 0x59, 0x42, 0xb9, 0x56, 0xf0, 0x4c, 0x3f, 0xf7, 0x31, 0x84, 0xbe, 0xac, 0x03, 0x9e, 0x71, 0x91, 0x85, 0xd8, 0x32, 0xbd, 0x00, 0xea, 0xac, 0x65, 0xf6, 0x03, 0xc8, 0x0f, 0x8b, 0xfd, 0x6e, 0x58, 0x88, 0x04, 0x41, 0x92, 0x74, 0xa6, 0x57, 0x2e, 0x8e, 0x88, 0xd5, 0x3d, 0xda, 0x14, 0x3e, 0x63, 0x88, 0x22, 0xe3, 0x53, 0xe9, 0xba, 0x39, 0x09, 0xac, 0xfb, 0xd0, 0x4c, 0xf2, 0x3c, 0x20, 0xd6, 0x97, 0xe6, 0xed, 0xf1, 0x62, 0x1e, 0xe5, 0xc9, 0x48, 0xa0, 0xca, 0x2e, 0x3c, 0x14, 0x5a, 0x82, 0xd4, 0xed, 0xb1, 0xe3, 0x43, 0xc1, 0x2a, 0x59, 0xa5, 0xb9, 0xc8, 0x48, 0xa7, 0x39, 0x23, 0x74, 0xa7, 0x37, 0xb0, 0x6f, 0xc3, 0x64, 0x99, 0x6c, 0xa2, 0x82, 0xc8, 0xf6, 0xdb, 0x86, 0x40, 0xce, 0xd1, 0x85, 0x9f, 0xce, 0x69, 0xf4, 0x15, 0x2a, 0x23, 0xca, 0xea, 0xb7, 0x7b, 0xdf, 0xfb, 0x43, 0x5f, 0xff, 0x7a, 0x49, 0x49, 0x0e, 0xe7, 0x02, 0x51, 0x45, 0x13, 0xe8, 0x90, 0x64, 0x21, 0x0c, 0x26, 0x2b, 0x5d, 0xfc, 0xe4, 0xb5, 0x86, 0x89, 0x43, 0x22, 0x4c, 0xf3, 0x3b, 0xf3, 0x09, 0xc4, 0xa4, 0x10, 0x80, 0xf2, 0x46, 0xe2, 0x46, 0x8f, 0x76, 0x50, 0xbf, 0xaf, 0x2b, 0x90, 0x1b, 0x78, 0xc7, 0xcf, 0xc1, 0x77, 0xd0, 0xfb, 0xa9, 0xfb, 0xc9, 0x66, 0x5a, 0xc5, 0x9b, 0x31, 0x41, 0x67, 0x01, 0xbe, 0x33, 0x10, 0xba, 0x05, 0x58, 0xed, 0x76, 0x53, 0xde, 0x5d, 0xc1, 0xe8, 0xbb, 0x9f, 0xf1, 0xcd, 0xfb, 0xdf, 0x64, 0x7f, 0xd7, 0x18, 0xab, 0x0f, 0x94, 0x28, 0x95, 0x4a, 0xcc, 0x6a, 0xa9, 0x50, 0xc7, 0x05, 0x47, 0x10, 0x41, 0x02, 0x03, 0x01, 0x00, 0x01, 0xa3, 0x50, 0x30, 0x4e, 0x30, 0x0e, 0x06, 0x03, 0x55, 0x1d, 0x0f, 0x01, 0x01, 0xff, 0x04, 0x04, 0x03, 0x02, 0x05, 0xa0, 0x30, 0x13, 0x06, 0x03, 0x55, 0x1d, 0x25, 0x04, 0x0c, 0x30, 0x0a, 0x06, 0x08, 0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x01, 0x30, 0x0c, 0x06, 0x03, 0x55, 0x1d, 0x13, 0x01, 0x01, 0xff, 0x04, 0x02, 0x30, 0x00, 0x30, 0x19, 0x06, 0x03, 0x55, 0x1d, 0x11, 0x04, 0x12, 0x30, 0x10, 0x82, 0x0e, 0x66, 0x75, 0x7a, 0x7a, 0x2e, 0x62, 0x6f, 0x72, 0x69, 0x6e, 0x67, 0x73, 0x73, 0x6c, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05, 0x00, 0x03, 0x82, 0x01, 0x01, 0x00, 0x92, 0xde, 0xef, 0x96, 0x06, 0x7b, 0xff, 0x71, 0x7d, 0x4e, 0xa0, 0x7d, 0xae, 0xb8, 0x22, 0xb4, 0x2c, 0xf7, 0x96, 0x9c, 0x37, 0x1d, 0x8f, 0xe7, 0xd9, 0x47, 0xff, 0x3f, 0xe9, 0x35, 0x95, 0x0e, 0xdd, 0xdc, 0x7f, 0xc8, 0x8a, 0x1e, 0x36, 0x1d, 0x38, 0x47, 0xfc, 0x76, 0xd2, 0x1f, 0x98, 0xa1, 0x36, 0xac, 0xc8, 0x70, 0x38, 0x0a, 0x3d, 0x51, 0x8d, 0x0f, 0x03, 0x1b, 0xef, 0x62, 0xa1, 0xcb, 0x2b, 0x4a, 0x8c, 0x12, 0x2b, 0x54, 0x50, 0x9a, 0x6b, 0xfe, 0xaf, 0xd9, 0xf6, 0xbf, 0x58, 0x11, 0x58, 0x5e, 0xe5, 0x86, 0x1e, 0x3b, 0x6b, 0x30, 0x7e, 0x72, 0x89, 0xe8, 0x6b, 0x7b, 0xb7, 0xaf, 0xef, 0x8b, 0xa9, 0x3e, 0xb0, 0xcd, 0x0b, 0xef, 0xb0, 0x0c, 0x96, 0x2b, 0xc5, 0x3b, 0xd5, 0xf1, 0xc2, 0xae, 0x3a, 0x60, 0xd9, 0x0f, 0x75, 0x37, 0x55, 0x4d, 0x62, 0xd2, 0xed, 0x96, 0xac, 0x30, 0x6b, 0xda, 0xa1, 0x48, 0x17, 0x96, 0x23, 0x85, 0x9a, 0x57, 0x77, 0xe9, 0x22, 0xa2, 0x37, 0x03, 0xba, 0x49, 0x77, 0x40, 0x3b, 0x76, 0x4b, 0xda, 0xc1, 0x04, 0x57, 0x55, 0x34, 0x22, 0x83, 0x45, 0x29, 0xab, 0x2e, 0x11, 0xff, 0x0d, 0xab, 0x55, 0xb1, 0xa7, 0x58, 0x59, 0x05, 0x25, 0xf9, 0x1e, 0x3d, 0xb7, 0xac, 0x04, 0x39, 0x2c, 0xf9, 0xaf, 0xb8, 0x68, 0xfb, 0x8e, 0x35, 0x71, 0x32, 0xff, 0x70, 0xe9, 0x46, 0x6d, 0x5c, 0x06, 0x90, 0x88, 0x23, 0x48, 0x0c, 0x50, 0xeb, 0x0a, 0xa9, 0xae, 0xe8, 0xfc, 0xbe, 0xa5, 0x76, 0x94, 0xd7, 0x64, 0x22, 0x38, 0x98, 0x17, 0xa4, 0x3a, 0xa7, 0x59, 0x9f, 0x1d, 0x3b, 0x75, 0x90, 0x1a, 0x81, 0xef, 0x19, 0xfb, 0x2b, 0xb7, 0xa7, 0x64, 0x61, 0x22, 0xa4, 0x6f, 0x7b, 0xfa, 0x58, 0xbb, 0x8c, 0x4e, 0x77, 0x67, 0xd0, 0x5d, 0x58, 0x76, 0x8a, 0xbb, }; #ifndef OPENSSL_NO_DEPRECATED_3_0 static const uint8_t kRSAPrivateKeyDER[] = { 0x30, 0x82, 0x04, 0xa5, 0x02, 0x01, 0x00, 0x02, 0x82, 0x01, 0x01, 0x00, 0xce, 0x47, 0xcb, 0x11, 0xbb, 0xd2, 0x9d, 0x8e, 0x9e, 0xd2, 0x1e, 0x14, 0xaf, 0xc7, 0xea, 0xb6, 0xc9, 0x38, 0x2a, 0x6f, 0xb3, 0x7e, 0xfb, 0xbc, 0xfc, 0x59, 0x42, 0xb9, 0x56, 0xf0, 0x4c, 0x3f, 0xf7, 0x31, 0x84, 0xbe, 0xac, 0x03, 0x9e, 0x71, 0x91, 0x85, 0xd8, 0x32, 0xbd, 0x00, 0xea, 0xac, 0x65, 0xf6, 0x03, 0xc8, 0x0f, 0x8b, 0xfd, 0x6e, 0x58, 0x88, 0x04, 0x41, 0x92, 0x74, 0xa6, 0x57, 0x2e, 0x8e, 0x88, 0xd5, 0x3d, 0xda, 0x14, 0x3e, 0x63, 0x88, 0x22, 0xe3, 0x53, 0xe9, 0xba, 0x39, 0x09, 0xac, 0xfb, 0xd0, 0x4c, 0xf2, 0x3c, 0x20, 0xd6, 0x97, 0xe6, 0xed, 0xf1, 0x62, 0x1e, 0xe5, 0xc9, 0x48, 0xa0, 0xca, 0x2e, 0x3c, 0x14, 0x5a, 0x82, 0xd4, 0xed, 0xb1, 0xe3, 0x43, 0xc1, 0x2a, 0x59, 0xa5, 0xb9, 0xc8, 0x48, 0xa7, 0x39, 0x23, 0x74, 0xa7, 0x37, 0xb0, 0x6f, 0xc3, 0x64, 0x99, 0x6c, 0xa2, 0x82, 0xc8, 0xf6, 0xdb, 0x86, 0x40, 0xce, 0xd1, 0x85, 0x9f, 0xce, 0x69, 0xf4, 0x15, 0x2a, 0x23, 0xca, 0xea, 0xb7, 0x7b, 0xdf, 0xfb, 0x43, 0x5f, 0xff, 0x7a, 0x49, 0x49, 0x0e, 0xe7, 0x02, 0x51, 0x45, 0x13, 0xe8, 0x90, 0x64, 0x21, 0x0c, 0x26, 0x2b, 0x5d, 0xfc, 0xe4, 0xb5, 0x86, 0x89, 0x43, 0x22, 0x4c, 0xf3, 0x3b, 0xf3, 0x09, 0xc4, 0xa4, 0x10, 0x80, 0xf2, 0x46, 0xe2, 0x46, 0x8f, 0x76, 0x50, 0xbf, 0xaf, 0x2b, 0x90, 0x1b, 0x78, 0xc7, 0xcf, 0xc1, 0x77, 0xd0, 0xfb, 0xa9, 0xfb, 0xc9, 0x66, 0x5a, 0xc5, 0x9b, 0x31, 0x41, 0x67, 0x01, 0xbe, 0x33, 0x10, 0xba, 0x05, 0x58, 0xed, 0x76, 0x53, 0xde, 0x5d, 0xc1, 0xe8, 0xbb, 0x9f, 0xf1, 0xcd, 0xfb, 0xdf, 0x64, 0x7f, 0xd7, 0x18, 0xab, 0x0f, 0x94, 0x28, 0x95, 0x4a, 0xcc, 0x6a, 0xa9, 0x50, 0xc7, 0x05, 0x47, 0x10, 0x41, 0x02, 0x03, 0x01, 0x00, 0x01, 0x02, 0x82, 0x01, 0x01, 0x00, 0xa8, 0x47, 0xb9, 0x4a, 0x06, 0x47, 0x93, 0x71, 0x3d, 0xef, 0x7b, 0xca, 0xb4, 0x7c, 0x0a, 0xe6, 0x82, 0xd0, 0xe7, 0x0d, 0xa9, 0x08, 0xf6, 0xa4, 0xfd, 0xd8, 0x73, 0xae, 0x6f, 0x56, 0x29, 0x5e, 0x25, 0x72, 0xa8, 0x30, 0x44, 0x73, 0xcf, 0x56, 0x26, 0xb9, 0x61, 0xde, 0x42, 0x81, 0xf4, 0xf0, 0x1f, 0x5d, 0xcb, 0x47, 0xf2, 0x26, 0xe9, 0xe0, 0x93, 0x28, 0xa3, 0x10, 0x3b, 0x42, 0x1e, 0x51, 0x11, 0x12, 0x06, 0x5e, 0xaf, 0xce, 0xb0, 0xa5, 0x14, 0xdd, 0x82, 0x58, 0xa1, 0xa4, 0x12, 0xdf, 0x65, 0x1d, 0x51, 0x70, 0x64, 0xd5, 0x58, 0x68, 0x11, 0xa8, 0x6a, 0x23, 0xc2, 0xbf, 0xa1, 0x25, 0x24, 0x47, 0xb3, 0xa4, 0x3c, 0x83, 0x96, 0xb7, 0x1f, 0xf4, 0x44, 0xd4, 0xd1, 0xe9, 0xfc, 0x33, 0x68, 0x5e, 0xe2, 0x68, 0x99, 0x9c, 0x91, 0xe8, 0x72, 0xc9, 0xd7, 0x8c, 0x80, 0x20, 0x8e, 0x77, 0x83, 0x4d, 0xe4, 0xab, 0xf9, 0x74, 0xa1, 0xdf, 0xd3, 0xc0, 0x0d, 0x5b, 0x05, 0x51, 0xc2, 0x6f, 0xb2, 0x91, 0x02, 0xec, 0xc0, 0x02, 0x1a, 0x5c, 0x91, 0x05, 0xf1, 0xe3, 0xfa, 0x65, 0xc2, 0xad, 0x24, 0xe6, 0xe5, 0x3c, 0xb6, 0x16, 0xf1, 0xa1, 0x67, 0x1a, 0x9d, 0x37, 0x56, 0xbf, 0x01, 0xd7, 0x3b, 0x35, 0x30, 0x57, 0x73, 0xf4, 0xf0, 0x5e, 0xa7, 0xe8, 0x0a, 0xc1, 0x94, 0x17, 0xcf, 0x0a, 0xbd, 0xf5, 0x31, 0xa7, 0x2d, 0xf7, 0xf5, 0xd9, 0x8c, 0xc2, 0x01, 0xbd, 0xda, 0x16, 0x8e, 0xb9, 0x30, 0x40, 0xa6, 0x6e, 0xbd, 0xcd, 0x4d, 0x84, 0x67, 0x4e, 0x0b, 0xce, 0xd5, 0xef, 0xf8, 0x08, 0x63, 0x02, 0xc6, 0xc7, 0xf7, 0x67, 0x92, 0xe2, 0x23, 0x9d, 0x27, 0x22, 0x1d, 0xc6, 0x67, 0x5e, 0x66, 0xbf, 0x03, 0xb8, 0xa9, 0x67, 0xd4, 0x39, 0xd8, 0x75, 0xfa, 0xe8, 0xed, 0x56, 0xb8, 0x81, 0x02, 0x81, 0x81, 0x00, 0xf7, 0x46, 0x68, 0xc6, 0x13, 0xf8, 0xba, 0x0f, 0x83, 0xdb, 0x05, 0xa8, 0x25, 0x00, 0x70, 0x9c, 0x9e, 0x8b, 0x12, 0x34, 0x0d, 0x96, 0xcf, 0x0d, 0x98, 0x9b, 0x8d, 0x9c, 0x96, 0x78, 0xd1, 0x3c, 0x01, 0x8c, 0xb9, 0x35, 0x5c, 0x20, 0x42, 0xb4, 0x38, 0xe3, 0xd6, 0x54, 0xe7, 0x55, 0xd6, 0x26, 0x8a, 0x0c, 0xf6, 0x1f, 0xe0, 0x04, 0xc1, 0x22, 0x42, 0x19, 0x61, 0xc4, 0x94, 0x7c, 0x07, 0x2e, 0x80, 0x52, 0xfe, 0x8d, 0xe6, 0x92, 0x3a, 0x91, 0xfe, 0x72, 0x99, 0xe1, 0x2a, 0x73, 0x76, 0xb1, 0x24, 0x20, 0x67, 0xde, 0x28, 0xcb, 0x0e, 0xe6, 0x52, 0xb5, 0xfa, 0xfb, 0x8b, 0x1e, 0x6a, 0x1d, 0x09, 0x26, 0xb9, 0xa7, 0x61, 0xba, 0xf8, 0x79, 0xd2, 0x66, 0x57, 0x28, 0xd7, 0x31, 0xb5, 0x0b, 0x27, 0x19, 0x1e, 0x6f, 0x46, 0xfc, 0x54, 0x95, 0xeb, 0x78, 0x01, 0xb6, 0xd9, 0x79, 0x5a, 0x4d, 0x02, 0x81, 0x81, 0x00, 0xd5, 0x8f, 0x16, 0x53, 0x2f, 0x57, 0x93, 0xbf, 0x09, 0x75, 0xbf, 0x63, 0x40, 0x3d, 0x27, 0xfd, 0x23, 0x21, 0xde, 0x9b, 0xe9, 0x73, 0x3f, 0x49, 0x02, 0xd2, 0x38, 0x96, 0xcf, 0xc3, 0xba, 0x92, 0x07, 0x87, 0x52, 0xa9, 0x35, 0xe3, 0x0c, 0xe4, 0x2f, 0x05, 0x7b, 0x37, 0xa5, 0x40, 0x9c, 0x3b, 0x94, 0xf7, 0xad, 0xa0, 0xee, 0x3a, 0xa8, 0xfb, 0x1f, 0x11, 0x1f, 0xd8, 0x9a, 0x80, 0x42, 0x3d, 0x7f, 0xa4, 0xb8, 0x9a, 0xaa, 0xea, 0x72, 0xc1, 0xe3, 0xed, 0x06, 0x60, 0x92, 0x37, 0xf9, 0xba, 0xfb, 0x9e, 0xed, 0x05, 0xa6, 0xd4, 0x72, 0x68, 0x4f, 0x63, 0xfe, 0xd6, 0x10, 0x0d, 0x4f, 0x0a, 0x93, 0xc6, 0xb9, 0xd7, 0xaf, 0xfd, 0xd9, 0x57, 0x7d, 0xcb, 0x75, 0xe8, 0x93, 0x2b, 0xae, 0x4f, 0xea, 0xd7, 0x30, 0x0b, 0x58, 0x44, 0x82, 0x0f, 0x84, 0x5d, 0x62, 0x11, 0x78, 0xea, 0x5f, 0xc5, 0x02, 0x81, 0x81, 0x00, 0x82, 0x0c, 0xc1, 0xe6, 0x0b, 0x72, 0xf1, 0x48, 0x5f, 0xac, 0xbd, 0x98, 0xe5, 0x7d, 0x09, 0xbd, 0x15, 0x95, 0x47, 0x09, 0xa1, 0x6c, 0x03, 0x91, 0xbf, 0x05, 0x70, 0xc1, 0x3e, 0x52, 0x64, 0x99, 0x0e, 0xa7, 0x98, 0x70, 0xfb, 0xf6, 0xeb, 0x9e, 0x25, 0x9d, 0x8e, 0x88, 0x30, 0xf2, 0xf0, 0x22, 0x6c, 0xd0, 0xcc, 0x51, 0x8f, 0x5c, 0x70, 0xc7, 0x37, 0xc4, 0x69, 0xab, 0x1d, 0xfc, 0xed, 0x3a, 0x03, 0xbb, 0xa2, 0xad, 0xb6, 0xea, 0x89, 0x6b, 0x67, 0x4b, 0x96, 0xaa, 0xd9, 0xcc, 0xc8, 0x4b, 0xfa, 0x18, 0x21, 0x08, 0xb2, 0xa3, 0xb9, 0x3e, 0x61, 0x99, 0xdc, 0x5a, 0x97, 0x9c, 0x73, 0x6a, 0xb9, 0xf9, 0x68, 0x03, 0x24, 0x5f, 0x55, 0x77, 0x9c, 0xb4, 0xbe, 0x7a, 0x78, 0x53, 0x68, 0x48, 0x69, 0x53, 0xc8, 0xb1, 0xf5, 0xbf, 0x98, 0x2d, 0x11, 0x1e, 0x98, 0xa8, 0x36, 0x50, 0xa0, 0xb1, 0x02, 0x81, 0x81, 0x00, 0x90, 0x88, 0x30, 0x71, 0xc7, 0xfe, 0x9b, 0x6d, 0x95, 0x37, 0x6d, 0x79, 0xfc, 0x85, 0xe7, 0x44, 0x78, 0xbc, 0x79, 0x6e, 0x47, 0x86, 0xc9, 0xf3, 0xdd, 0xc6, 0xec, 0xa9, 0x94, 0x9f, 0x40, 0xeb, 0x87, 0xd0, 0xdb, 0xee, 0xcd, 0x1b, 0x87, 0x23, 0xff, 0x76, 0xd4, 0x37, 0x8a, 0xcd, 0xb9, 0x6e, 0xd1, 0x98, 0xf6, 0x97, 0x8d, 0xe3, 0x81, 0x6d, 0xc3, 0x4e, 0xd1, 0xa0, 0xc4, 0x9f, 0xbd, 0x34, 0xe5, 0xe8, 0x53, 0x4f, 0xca, 0x10, 0xb5, 0xed, 0xe7, 0x16, 0x09, 0x54, 0xde, 0x60, 0xa7, 0xd1, 0x16, 0x6e, 0x2e, 0xb7, 0xbe, 0x7a, 0xd5, 0x9b, 0x26, 0xef, 0xe4, 0x0e, 0x77, 0xfa, 0xa9, 0xdd, 0xdc, 0xb9, 0x88, 0x19, 0x23, 0x70, 0xc7, 0xe1, 0x60, 0xaf, 0x8c, 0x73, 0x04, 0xf7, 0x71, 0x17, 0x81, 0x36, 0x75, 0xbb, 0x97, 0xd7, 0x75, 0xb6, 0x8e, 0xbc, 0xac, 0x9c, 0x6a, 0x9b, 0x24, 0x89, 0x02, 0x81, 0x80, 0x5a, 0x2b, 0xc7, 0x6b, 0x8c, 0x65, 0xdb, 0x04, 0x73, 0xab, 0x25, 0xe1, 0x5b, 0xbc, 0x3c, 0xcf, 0x5a, 0x3c, 0x04, 0xae, 0x97, 0x2e, 0xfd, 0xa4, 0x97, 0x1f, 0x05, 0x17, 0x27, 0xac, 0x7c, 0x30, 0x85, 0xb4, 0x82, 0x3f, 0x5b, 0xb7, 0x94, 0x3b, 0x7f, 0x6c, 0x0c, 0xc7, 0x16, 0xc6, 0xa0, 0xbd, 0x80, 0xb0, 0x81, 0xde, 0xa0, 0x23, 0xa6, 0xf6, 0x75, 0x33, 0x51, 0x35, 0xa2, 0x75, 0x55, 0x70, 0x4d, 0x42, 0xbb, 0xcf, 0x54, 0xe4, 0xdb, 0x2d, 0x88, 0xa0, 0x7a, 0xf2, 0x17, 0xa7, 0xdd, 0x13, 0x44, 0x9f, 0x5f, 0x6b, 0x2c, 0x42, 0x42, 0x8b, 0x13, 0x4d, 0xf9, 0x5b, 0xf8, 0x33, 0x42, 0xd9, 0x9e, 0x50, 0x1c, 0x7c, 0xbc, 0xfa, 0x62, 0x85, 0x0b, 0xcf, 0x99, 0xda, 0x9e, 0x04, 0x90, 0xb2, 0xc6, 0xb2, 0x0a, 0x2a, 0x7c, 0x6d, 0x6a, 0x40, 0xfc, 0xf5, 0x50, 0x98, 0x46, 0x89, 0x82, 0x40, }; #endif #ifndef OPENSSL_NO_EC # ifndef OPENSSL_NO_DEPRECATED_3_0 /* * -----BEGIN EC PRIVATE KEY----- * MHcCAQEEIJLyl7hJjpQL/RhP1x2zS79xdiPJQB683gWeqcqHPeZkoAoGCCqGSM49 * AwEHoUQDQgAEdsjygVYjjaKBF4CNECVllNf017p5/MxNSWDoTHy9I2GeDwEDDazI * D/xy8JiYjtPKVE/Zqwbmivp2UwtH28a7NQ== * -----END EC PRIVATE KEY----- */ static const char ECDSAPrivateKeyPEM[] = { 0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x42, 0x45, 0x47, 0x49, 0x4e, 0x20, 0x45, 0x43, 0x20, 0x50, 0x52, 0x49, 0x56, 0x41, 0x54, 0x45, 0x20, 0x4b, 0x45, 0x59, 0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x0a, 0x4d, 0x48, 0x63, 0x43, 0x41, 0x51, 0x45, 0x45, 0x49, 0x4a, 0x4c, 0x79, 0x6c, 0x37, 0x68, 0x4a, 0x6a, 0x70, 0x51, 0x4c, 0x2f, 0x52, 0x68, 0x50, 0x31, 0x78, 0x32, 0x7a, 0x53, 0x37, 0x39, 0x78, 0x64, 0x69, 0x50, 0x4a, 0x51, 0x42, 0x36, 0x38, 0x33, 0x67, 0x57, 0x65, 0x71, 0x63, 0x71, 0x48, 0x50, 0x65, 0x5a, 0x6b, 0x6f, 0x41, 0x6f, 0x47, 0x43, 0x43, 0x71, 0x47, 0x53, 0x4d, 0x34, 0x39, 0x0a, 0x41, 0x77, 0x45, 0x48, 0x6f, 0x55, 0x51, 0x44, 0x51, 0x67, 0x41, 0x45, 0x64, 0x73, 0x6a, 0x79, 0x67, 0x56, 0x59, 0x6a, 0x6a, 0x61, 0x4b, 0x42, 0x46, 0x34, 0x43, 0x4e, 0x45, 0x43, 0x56, 0x6c, 0x6c, 0x4e, 0x66, 0x30, 0x31, 0x37, 0x70, 0x35, 0x2f, 0x4d, 0x78, 0x4e, 0x53, 0x57, 0x44, 0x6f, 0x54, 0x48, 0x79, 0x39, 0x49, 0x32, 0x47, 0x65, 0x44, 0x77, 0x45, 0x44, 0x44, 0x61, 0x7a, 0x49, 0x0a, 0x44, 0x2f, 0x78, 0x79, 0x38, 0x4a, 0x69, 0x59, 0x6a, 0x74, 0x50, 0x4b, 0x56, 0x45, 0x2f, 0x5a, 0x71, 0x77, 0x62, 0x6d, 0x69, 0x76, 0x70, 0x32, 0x55, 0x77, 0x74, 0x48, 0x32, 0x38, 0x61, 0x37, 0x4e, 0x51, 0x3d, 0x3d, 0x0a, 0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x45, 0x4e, 0x44, 0x20, 0x45, 0x43, 0x20, 0x50, 0x52, 0x49, 0x56, 0x41, 0x54, 0x45, 0x20, 0x4b, 0x45, 0x59, 0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x0a }; # endif /* * -----BEGIN CERTIFICATE----- * MIIBXzCCAQagAwIBAgIJAK6/Yvf/ain6MAoGCCqGSM49BAMCMBIxEDAOBgNVBAoM * B0FjbWUgQ28wHhcNMTYxMjI1MTEzOTI3WhcNMjYxMjI1MTEzOTI3WjASMRAwDgYD * VQQKDAdBY21lIENvMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEdsjygVYjjaKB * F4CNECVllNf017p5/MxNSWDoTHy9I2GeDwEDDazID/xy8JiYjtPKVE/Zqwbmivp2 * UwtH28a7NaNFMEMwCQYDVR0TBAIwADALBgNVHQ8EBAMCBaAwEwYDVR0lBAwwCgYI * KwYBBQUHAwEwFAYDVR0RBA0wC4IJbG9jYWxob3N0MAoGCCqGSM49BAMCA0cAMEQC * IEzr3t/jejVE9oSnBp8c3P2p+lDLVRrB8zxLyjZvirUXAiAyQPaE9MNcL8/nRpuu * 99I1enCSmWIAJ57IwuJ/n1d45Q== * -----END CERTIFICATE----- */ static const char ECDSACertPEM[] = { 0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x42, 0x45, 0x47, 0x49, 0x4e, 0x20, 0x43, 0x45, 0x52, 0x54, 0x49, 0x46, 0x49, 0x43, 0x41, 0x54, 0x45, 0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x0a, 0x4d, 0x49, 0x49, 0x42, 0x58, 0x7a, 0x43, 0x43, 0x41, 0x51, 0x61, 0x67, 0x41, 0x77, 0x49, 0x42, 0x41, 0x67, 0x49, 0x4a, 0x41, 0x4b, 0x36, 0x2f, 0x59, 0x76, 0x66, 0x2f, 0x61, 0x69, 0x6e, 0x36, 0x4d, 0x41, 0x6f, 0x47, 0x43, 0x43, 0x71, 0x47, 0x53, 0x4d, 0x34, 0x39, 0x42, 0x41, 0x4d, 0x43, 0x4d, 0x42, 0x49, 0x78, 0x45, 0x44, 0x41, 0x4f, 0x42, 0x67, 0x4e, 0x56, 0x42, 0x41, 0x6f, 0x4d, 0x0a, 0x42, 0x30, 0x46, 0x6a, 0x62, 0x57, 0x55, 0x67, 0x51, 0x32, 0x38, 0x77, 0x48, 0x68, 0x63, 0x4e, 0x4d, 0x54, 0x59, 0x78, 0x4d, 0x6a, 0x49, 0x31, 0x4d, 0x54, 0x45, 0x7a, 0x4f, 0x54, 0x49, 0x33, 0x57, 0x68, 0x63, 0x4e, 0x4d, 0x6a, 0x59, 0x78, 0x4d, 0x6a, 0x49, 0x31, 0x4d, 0x54, 0x45, 0x7a, 0x4f, 0x54, 0x49, 0x33, 0x57, 0x6a, 0x41, 0x53, 0x4d, 0x52, 0x41, 0x77, 0x44, 0x67, 0x59, 0x44, 0x0a, 0x56, 0x51, 0x51, 0x4b, 0x44, 0x41, 0x64, 0x42, 0x59, 0x32, 0x31, 0x6c, 0x49, 0x45, 0x4e, 0x76, 0x4d, 0x46, 0x6b, 0x77, 0x45, 0x77, 0x59, 0x48, 0x4b, 0x6f, 0x5a, 0x49, 0x7a, 0x6a, 0x30, 0x43, 0x41, 0x51, 0x59, 0x49, 0x4b, 0x6f, 0x5a, 0x49, 0x7a, 0x6a, 0x30, 0x44, 0x41, 0x51, 0x63, 0x44, 0x51, 0x67, 0x41, 0x45, 0x64, 0x73, 0x6a, 0x79, 0x67, 0x56, 0x59, 0x6a, 0x6a, 0x61, 0x4b, 0x42, 0x0a, 0x46, 0x34, 0x43, 0x4e, 0x45, 0x43, 0x56, 0x6c, 0x6c, 0x4e, 0x66, 0x30, 0x31, 0x37, 0x70, 0x35, 0x2f, 0x4d, 0x78, 0x4e, 0x53, 0x57, 0x44, 0x6f, 0x54, 0x48, 0x79, 0x39, 0x49, 0x32, 0x47, 0x65, 0x44, 0x77, 0x45, 0x44, 0x44, 0x61, 0x7a, 0x49, 0x44, 0x2f, 0x78, 0x79, 0x38, 0x4a, 0x69, 0x59, 0x6a, 0x74, 0x50, 0x4b, 0x56, 0x45, 0x2f, 0x5a, 0x71, 0x77, 0x62, 0x6d, 0x69, 0x76, 0x70, 0x32, 0x0a, 0x55, 0x77, 0x74, 0x48, 0x32, 0x38, 0x61, 0x37, 0x4e, 0x61, 0x4e, 0x46, 0x4d, 0x45, 0x4d, 0x77, 0x43, 0x51, 0x59, 0x44, 0x56, 0x52, 0x30, 0x54, 0x42, 0x41, 0x49, 0x77, 0x41, 0x44, 0x41, 0x4c, 0x42, 0x67, 0x4e, 0x56, 0x48, 0x51, 0x38, 0x45, 0x42, 0x41, 0x4d, 0x43, 0x42, 0x61, 0x41, 0x77, 0x45, 0x77, 0x59, 0x44, 0x56, 0x52, 0x30, 0x6c, 0x42, 0x41, 0x77, 0x77, 0x43, 0x67, 0x59, 0x49, 0x0a, 0x4b, 0x77, 0x59, 0x42, 0x42, 0x51, 0x55, 0x48, 0x41, 0x77, 0x45, 0x77, 0x46, 0x41, 0x59, 0x44, 0x56, 0x52, 0x30, 0x52, 0x42, 0x41, 0x30, 0x77, 0x43, 0x34, 0x49, 0x4a, 0x62, 0x47, 0x39, 0x6a, 0x59, 0x57, 0x78, 0x6f, 0x62, 0x33, 0x4e, 0x30, 0x4d, 0x41, 0x6f, 0x47, 0x43, 0x43, 0x71, 0x47, 0x53, 0x4d, 0x34, 0x39, 0x42, 0x41, 0x4d, 0x43, 0x41, 0x30, 0x63, 0x41, 0x4d, 0x45, 0x51, 0x43, 0x0a, 0x49, 0x45, 0x7a, 0x72, 0x33, 0x74, 0x2f, 0x6a, 0x65, 0x6a, 0x56, 0x45, 0x39, 0x6f, 0x53, 0x6e, 0x42, 0x70, 0x38, 0x63, 0x33, 0x50, 0x32, 0x70, 0x2b, 0x6c, 0x44, 0x4c, 0x56, 0x52, 0x72, 0x42, 0x38, 0x7a, 0x78, 0x4c, 0x79, 0x6a, 0x5a, 0x76, 0x69, 0x72, 0x55, 0x58, 0x41, 0x69, 0x41, 0x79, 0x51, 0x50, 0x61, 0x45, 0x39, 0x4d, 0x4e, 0x63, 0x4c, 0x38, 0x2f, 0x6e, 0x52, 0x70, 0x75, 0x75, 0x0a, 0x39, 0x39, 0x49, 0x31, 0x65, 0x6e, 0x43, 0x53, 0x6d, 0x57, 0x49, 0x41, 0x4a, 0x35, 0x37, 0x49, 0x77, 0x75, 0x4a, 0x2f, 0x6e, 0x31, 0x64, 0x34, 0x35, 0x51, 0x3d, 0x3d, 0x0a, 0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x45, 0x4e, 0x44, 0x20, 0x43, 0x45, 0x52, 0x54, 0x49, 0x46, 0x49, 0x43, 0x41, 0x54, 0x45, 0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x0a }; #endif #if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_DEPRECATED_3_0) /* * -----BEGIN DSA PRIVATE KEY----- * MIIBuwIBAAKBgQDdkFKzNABLOha7Eqj7004+p5fhtR6bxpujToMmSZTYi8igVVXP * Wzf03ULKS5UKjA6WpR6EiZAhm+PdxusZ5xfAuRZLdKy0bgxn1f348Rwh+EQNaEM8 * 0TGcnw5ijwKmSw5yyHPDWdiHzoqEBlhAf8Nl22YTXax/clsc/pu/RRLAdwIVAIEg * QqWRf/1EIZZcgM65Qpd65YuxAoGBAKBauV/RuloFHoSy5iWXESDywiS380tN5974 * GukGwoYdZo5uSIH6ahpeNSef0MbHGAzr7ZVEnhCQfRAwH1gRvSHoq/Rbmcvtd3r+ * QtQHOwvQHgLAynhI4i73c794czHaR+439bmcaSwDnQduRM85Mho/jiiZzAVPxBmG * POIMWNXXAoGAI6Ep5IE7yn3JzkXO9B6tC3bbDM+ZzuuInwZLbtZ8lim7Dsqabg4k * 2YbE4R95Bnfwnjsyl80mq/DbQN5lAHBvjDrkC6ItojBGKI3+iIrqGUEJdxvl4ulj * F0PmSD7zvIG8BfocKOel+EHH0YryExiW6krV1KW2ZRmJrqSFw6KCjV0CFFQFbPfU * xy5PmKytJmXR8BmppkIO * -----END DSA PRIVATE KEY----- */ static const char DSAPrivateKeyPEM[] = { 0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x42, 0x45, 0x47, 0x49, 0x4e, 0x20, 0x44, 0x53, 0x41, 0x20, 0x50, 0x52, 0x49, 0x56, 0x41, 0x54, 0x45, 0x20, 0x4b, 0x45, 0x59, 0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x0a, 0x4d, 0x49, 0x49, 0x42, 0x75, 0x77, 0x49, 0x42, 0x41, 0x41, 0x4b, 0x42, 0x67, 0x51, 0x44, 0x64, 0x6b, 0x46, 0x4b, 0x7a, 0x4e, 0x41, 0x42, 0x4c, 0x4f, 0x68, 0x61, 0x37, 0x45, 0x71, 0x6a, 0x37, 0x30, 0x30, 0x34, 0x2b, 0x70, 0x35, 0x66, 0x68, 0x74, 0x52, 0x36, 0x62, 0x78, 0x70, 0x75, 0x6a, 0x54, 0x6f, 0x4d, 0x6d, 0x53, 0x5a, 0x54, 0x59, 0x69, 0x38, 0x69, 0x67, 0x56, 0x56, 0x58, 0x50, 0x0a, 0x57, 0x7a, 0x66, 0x30, 0x33, 0x55, 0x4c, 0x4b, 0x53, 0x35, 0x55, 0x4b, 0x6a, 0x41, 0x36, 0x57, 0x70, 0x52, 0x36, 0x45, 0x69, 0x5a, 0x41, 0x68, 0x6d, 0x2b, 0x50, 0x64, 0x78, 0x75, 0x73, 0x5a, 0x35, 0x78, 0x66, 0x41, 0x75, 0x52, 0x5a, 0x4c, 0x64, 0x4b, 0x79, 0x30, 0x62, 0x67, 0x78, 0x6e, 0x31, 0x66, 0x33, 0x34, 0x38, 0x52, 0x77, 0x68, 0x2b, 0x45, 0x51, 0x4e, 0x61, 0x45, 0x4d, 0x38, 0x0a, 0x30, 0x54, 0x47, 0x63, 0x6e, 0x77, 0x35, 0x69, 0x6a, 0x77, 0x4b, 0x6d, 0x53, 0x77, 0x35, 0x79, 0x79, 0x48, 0x50, 0x44, 0x57, 0x64, 0x69, 0x48, 0x7a, 0x6f, 0x71, 0x45, 0x42, 0x6c, 0x68, 0x41, 0x66, 0x38, 0x4e, 0x6c, 0x32, 0x32, 0x59, 0x54, 0x58, 0x61, 0x78, 0x2f, 0x63, 0x6c, 0x73, 0x63, 0x2f, 0x70, 0x75, 0x2f, 0x52, 0x52, 0x4c, 0x41, 0x64, 0x77, 0x49, 0x56, 0x41, 0x49, 0x45, 0x67, 0x0a, 0x51, 0x71, 0x57, 0x52, 0x66, 0x2f, 0x31, 0x45, 0x49, 0x5a, 0x5a, 0x63, 0x67, 0x4d, 0x36, 0x35, 0x51, 0x70, 0x64, 0x36, 0x35, 0x59, 0x75, 0x78, 0x41, 0x6f, 0x47, 0x42, 0x41, 0x4b, 0x42, 0x61, 0x75, 0x56, 0x2f, 0x52, 0x75, 0x6c, 0x6f, 0x46, 0x48, 0x6f, 0x53, 0x79, 0x35, 0x69, 0x57, 0x58, 0x45, 0x53, 0x44, 0x79, 0x77, 0x69, 0x53, 0x33, 0x38, 0x30, 0x74, 0x4e, 0x35, 0x39, 0x37, 0x34, 0x0a, 0x47, 0x75, 0x6b, 0x47, 0x77, 0x6f, 0x59, 0x64, 0x5a, 0x6f, 0x35, 0x75, 0x53, 0x49, 0x48, 0x36, 0x61, 0x68, 0x70, 0x65, 0x4e, 0x53, 0x65, 0x66, 0x30, 0x4d, 0x62, 0x48, 0x47, 0x41, 0x7a, 0x72, 0x37, 0x5a, 0x56, 0x45, 0x6e, 0x68, 0x43, 0x51, 0x66, 0x52, 0x41, 0x77, 0x48, 0x31, 0x67, 0x52, 0x76, 0x53, 0x48, 0x6f, 0x71, 0x2f, 0x52, 0x62, 0x6d, 0x63, 0x76, 0x74, 0x64, 0x33, 0x72, 0x2b, 0x0a, 0x51, 0x74, 0x51, 0x48, 0x4f, 0x77, 0x76, 0x51, 0x48, 0x67, 0x4c, 0x41, 0x79, 0x6e, 0x68, 0x49, 0x34, 0x69, 0x37, 0x33, 0x63, 0x37, 0x39, 0x34, 0x63, 0x7a, 0x48, 0x61, 0x52, 0x2b, 0x34, 0x33, 0x39, 0x62, 0x6d, 0x63, 0x61, 0x53, 0x77, 0x44, 0x6e, 0x51, 0x64, 0x75, 0x52, 0x4d, 0x38, 0x35, 0x4d, 0x68, 0x6f, 0x2f, 0x6a, 0x69, 0x69, 0x5a, 0x7a, 0x41, 0x56, 0x50, 0x78, 0x42, 0x6d, 0x47, 0x0a, 0x50, 0x4f, 0x49, 0x4d, 0x57, 0x4e, 0x58, 0x58, 0x41, 0x6f, 0x47, 0x41, 0x49, 0x36, 0x45, 0x70, 0x35, 0x49, 0x45, 0x37, 0x79, 0x6e, 0x33, 0x4a, 0x7a, 0x6b, 0x58, 0x4f, 0x39, 0x42, 0x36, 0x74, 0x43, 0x33, 0x62, 0x62, 0x44, 0x4d, 0x2b, 0x5a, 0x7a, 0x75, 0x75, 0x49, 0x6e, 0x77, 0x5a, 0x4c, 0x62, 0x74, 0x5a, 0x38, 0x6c, 0x69, 0x6d, 0x37, 0x44, 0x73, 0x71, 0x61, 0x62, 0x67, 0x34, 0x6b, 0x0a, 0x32, 0x59, 0x62, 0x45, 0x34, 0x52, 0x39, 0x35, 0x42, 0x6e, 0x66, 0x77, 0x6e, 0x6a, 0x73, 0x79, 0x6c, 0x38, 0x30, 0x6d, 0x71, 0x2f, 0x44, 0x62, 0x51, 0x4e, 0x35, 0x6c, 0x41, 0x48, 0x42, 0x76, 0x6a, 0x44, 0x72, 0x6b, 0x43, 0x36, 0x49, 0x74, 0x6f, 0x6a, 0x42, 0x47, 0x4b, 0x49, 0x33, 0x2b, 0x69, 0x49, 0x72, 0x71, 0x47, 0x55, 0x45, 0x4a, 0x64, 0x78, 0x76, 0x6c, 0x34, 0x75, 0x6c, 0x6a, 0x0a, 0x46, 0x30, 0x50, 0x6d, 0x53, 0x44, 0x37, 0x7a, 0x76, 0x49, 0x47, 0x38, 0x42, 0x66, 0x6f, 0x63, 0x4b, 0x4f, 0x65, 0x6c, 0x2b, 0x45, 0x48, 0x48, 0x30, 0x59, 0x72, 0x79, 0x45, 0x78, 0x69, 0x57, 0x36, 0x6b, 0x72, 0x56, 0x31, 0x4b, 0x57, 0x32, 0x5a, 0x52, 0x6d, 0x4a, 0x72, 0x71, 0x53, 0x46, 0x77, 0x36, 0x4b, 0x43, 0x6a, 0x56, 0x30, 0x43, 0x46, 0x46, 0x51, 0x46, 0x62, 0x50, 0x66, 0x55, 0x0a, 0x78, 0x79, 0x35, 0x50, 0x6d, 0x4b, 0x79, 0x74, 0x4a, 0x6d, 0x58, 0x52, 0x38, 0x42, 0x6d, 0x70, 0x70, 0x6b, 0x49, 0x4f, 0x0a, 0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x45, 0x4e, 0x44, 0x20, 0x44, 0x53, 0x41, 0x20, 0x50, 0x52, 0x49, 0x56, 0x41, 0x54, 0x45, 0x20, 0x4b, 0x45, 0x59, 0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x0a }; /* * -----BEGIN CERTIFICATE----- * MIICqTCCAmegAwIBAgIJAILDGUk37fWGMAsGCWCGSAFlAwQDAjASMRAwDgYDVQQK * DAdBY21lIENvMB4XDTE2MTIyNTEzMjUzNloXDTI2MTIyNTEzMjUzNlowEjEQMA4G * A1UECgwHQWNtZSBDbzCCAbcwggEsBgcqhkjOOAQBMIIBHwKBgQDdkFKzNABLOha7 * Eqj7004+p5fhtR6bxpujToMmSZTYi8igVVXPWzf03ULKS5UKjA6WpR6EiZAhm+Pd * xusZ5xfAuRZLdKy0bgxn1f348Rwh+EQNaEM80TGcnw5ijwKmSw5yyHPDWdiHzoqE * BlhAf8Nl22YTXax/clsc/pu/RRLAdwIVAIEgQqWRf/1EIZZcgM65Qpd65YuxAoGB * AKBauV/RuloFHoSy5iWXESDywiS380tN5974GukGwoYdZo5uSIH6ahpeNSef0MbH * GAzr7ZVEnhCQfRAwH1gRvSHoq/Rbmcvtd3r+QtQHOwvQHgLAynhI4i73c794czHa * R+439bmcaSwDnQduRM85Mho/jiiZzAVPxBmGPOIMWNXXA4GEAAKBgCOhKeSBO8p9 * yc5FzvQerQt22wzPmc7riJ8GS27WfJYpuw7Kmm4OJNmGxOEfeQZ38J47MpfNJqvw * 20DeZQBwb4w65AuiLaIwRiiN/oiK6hlBCXcb5eLpYxdD5kg+87yBvAX6HCjnpfhB * x9GK8hMYlupK1dSltmUZia6khcOigo1do0UwQzAJBgNVHRMEAjAAMAsGA1UdDwQE * AwIFoDATBgNVHSUEDDAKBggrBgEFBQcDATAUBgNVHREEDTALgglsb2NhbGhvc3Qw * CwYJYIZIAWUDBAMCAy8AMCwCFClxInXTRWNJEWdi5ilNr/fbM1bKAhQy4B7wtmfd * I+zV6g3w9qBkNqStpA== * -----END CERTIFICATE----- */ static const char DSACertPEM[] = { 0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x42, 0x45, 0x47, 0x49, 0x4e, 0x20, 0x43, 0x45, 0x52, 0x54, 0x49, 0x46, 0x49, 0x43, 0x41, 0x54, 0x45, 0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x0a, 0x4d, 0x49, 0x49, 0x43, 0x71, 0x54, 0x43, 0x43, 0x41, 0x6d, 0x65, 0x67, 0x41, 0x77, 0x49, 0x42, 0x41, 0x67, 0x49, 0x4a, 0x41, 0x49, 0x4c, 0x44, 0x47, 0x55, 0x6b, 0x33, 0x37, 0x66, 0x57, 0x47, 0x4d, 0x41, 0x73, 0x47, 0x43, 0x57, 0x43, 0x47, 0x53, 0x41, 0x46, 0x6c, 0x41, 0x77, 0x51, 0x44, 0x41, 0x6a, 0x41, 0x53, 0x4d, 0x52, 0x41, 0x77, 0x44, 0x67, 0x59, 0x44, 0x56, 0x51, 0x51, 0x4b, 0x0a, 0x44, 0x41, 0x64, 0x42, 0x59, 0x32, 0x31, 0x6c, 0x49, 0x45, 0x4e, 0x76, 0x4d, 0x42, 0x34, 0x58, 0x44, 0x54, 0x45, 0x32, 0x4d, 0x54, 0x49, 0x79, 0x4e, 0x54, 0x45, 0x7a, 0x4d, 0x6a, 0x55, 0x7a, 0x4e, 0x6c, 0x6f, 0x58, 0x44, 0x54, 0x49, 0x32, 0x4d, 0x54, 0x49, 0x79, 0x4e, 0x54, 0x45, 0x7a, 0x4d, 0x6a, 0x55, 0x7a, 0x4e, 0x6c, 0x6f, 0x77, 0x45, 0x6a, 0x45, 0x51, 0x4d, 0x41, 0x34, 0x47, 0x0a, 0x41, 0x31, 0x55, 0x45, 0x43, 0x67, 0x77, 0x48, 0x51, 0x57, 0x4e, 0x74, 0x5a, 0x53, 0x42, 0x44, 0x62, 0x7a, 0x43, 0x43, 0x41, 0x62, 0x63, 0x77, 0x67, 0x67, 0x45, 0x73, 0x42, 0x67, 0x63, 0x71, 0x68, 0x6b, 0x6a, 0x4f, 0x4f, 0x41, 0x51, 0x42, 0x4d, 0x49, 0x49, 0x42, 0x48, 0x77, 0x4b, 0x42, 0x67, 0x51, 0x44, 0x64, 0x6b, 0x46, 0x4b, 0x7a, 0x4e, 0x41, 0x42, 0x4c, 0x4f, 0x68, 0x61, 0x37, 0x0a, 0x45, 0x71, 0x6a, 0x37, 0x30, 0x30, 0x34, 0x2b, 0x70, 0x35, 0x66, 0x68, 0x74, 0x52, 0x36, 0x62, 0x78, 0x70, 0x75, 0x6a, 0x54, 0x6f, 0x4d, 0x6d, 0x53, 0x5a, 0x54, 0x59, 0x69, 0x38, 0x69, 0x67, 0x56, 0x56, 0x58, 0x50, 0x57, 0x7a, 0x66, 0x30, 0x33, 0x55, 0x4c, 0x4b, 0x53, 0x35, 0x55, 0x4b, 0x6a, 0x41, 0x36, 0x57, 0x70, 0x52, 0x36, 0x45, 0x69, 0x5a, 0x41, 0x68, 0x6d, 0x2b, 0x50, 0x64, 0x0a, 0x78, 0x75, 0x73, 0x5a, 0x35, 0x78, 0x66, 0x41, 0x75, 0x52, 0x5a, 0x4c, 0x64, 0x4b, 0x79, 0x30, 0x62, 0x67, 0x78, 0x6e, 0x31, 0x66, 0x33, 0x34, 0x38, 0x52, 0x77, 0x68, 0x2b, 0x45, 0x51, 0x4e, 0x61, 0x45, 0x4d, 0x38, 0x30, 0x54, 0x47, 0x63, 0x6e, 0x77, 0x35, 0x69, 0x6a, 0x77, 0x4b, 0x6d, 0x53, 0x77, 0x35, 0x79, 0x79, 0x48, 0x50, 0x44, 0x57, 0x64, 0x69, 0x48, 0x7a, 0x6f, 0x71, 0x45, 0x0a, 0x42, 0x6c, 0x68, 0x41, 0x66, 0x38, 0x4e, 0x6c, 0x32, 0x32, 0x59, 0x54, 0x58, 0x61, 0x78, 0x2f, 0x63, 0x6c, 0x73, 0x63, 0x2f, 0x70, 0x75, 0x2f, 0x52, 0x52, 0x4c, 0x41, 0x64, 0x77, 0x49, 0x56, 0x41, 0x49, 0x45, 0x67, 0x51, 0x71, 0x57, 0x52, 0x66, 0x2f, 0x31, 0x45, 0x49, 0x5a, 0x5a, 0x63, 0x67, 0x4d, 0x36, 0x35, 0x51, 0x70, 0x64, 0x36, 0x35, 0x59, 0x75, 0x78, 0x41, 0x6f, 0x47, 0x42, 0x0a, 0x41, 0x4b, 0x42, 0x61, 0x75, 0x56, 0x2f, 0x52, 0x75, 0x6c, 0x6f, 0x46, 0x48, 0x6f, 0x53, 0x79, 0x35, 0x69, 0x57, 0x58, 0x45, 0x53, 0x44, 0x79, 0x77, 0x69, 0x53, 0x33, 0x38, 0x30, 0x74, 0x4e, 0x35, 0x39, 0x37, 0x34, 0x47, 0x75, 0x6b, 0x47, 0x77, 0x6f, 0x59, 0x64, 0x5a, 0x6f, 0x35, 0x75, 0x53, 0x49, 0x48, 0x36, 0x61, 0x68, 0x70, 0x65, 0x4e, 0x53, 0x65, 0x66, 0x30, 0x4d, 0x62, 0x48, 0x0a, 0x47, 0x41, 0x7a, 0x72, 0x37, 0x5a, 0x56, 0x45, 0x6e, 0x68, 0x43, 0x51, 0x66, 0x52, 0x41, 0x77, 0x48, 0x31, 0x67, 0x52, 0x76, 0x53, 0x48, 0x6f, 0x71, 0x2f, 0x52, 0x62, 0x6d, 0x63, 0x76, 0x74, 0x64, 0x33, 0x72, 0x2b, 0x51, 0x74, 0x51, 0x48, 0x4f, 0x77, 0x76, 0x51, 0x48, 0x67, 0x4c, 0x41, 0x79, 0x6e, 0x68, 0x49, 0x34, 0x69, 0x37, 0x33, 0x63, 0x37, 0x39, 0x34, 0x63, 0x7a, 0x48, 0x61, 0x0a, 0x52, 0x2b, 0x34, 0x33, 0x39, 0x62, 0x6d, 0x63, 0x61, 0x53, 0x77, 0x44, 0x6e, 0x51, 0x64, 0x75, 0x52, 0x4d, 0x38, 0x35, 0x4d, 0x68, 0x6f, 0x2f, 0x6a, 0x69, 0x69, 0x5a, 0x7a, 0x41, 0x56, 0x50, 0x78, 0x42, 0x6d, 0x47, 0x50, 0x4f, 0x49, 0x4d, 0x57, 0x4e, 0x58, 0x58, 0x41, 0x34, 0x47, 0x45, 0x41, 0x41, 0x4b, 0x42, 0x67, 0x43, 0x4f, 0x68, 0x4b, 0x65, 0x53, 0x42, 0x4f, 0x38, 0x70, 0x39, 0x0a, 0x79, 0x63, 0x35, 0x46, 0x7a, 0x76, 0x51, 0x65, 0x72, 0x51, 0x74, 0x32, 0x32, 0x77, 0x7a, 0x50, 0x6d, 0x63, 0x37, 0x72, 0x69, 0x4a, 0x38, 0x47, 0x53, 0x32, 0x37, 0x57, 0x66, 0x4a, 0x59, 0x70, 0x75, 0x77, 0x37, 0x4b, 0x6d, 0x6d, 0x34, 0x4f, 0x4a, 0x4e, 0x6d, 0x47, 0x78, 0x4f, 0x45, 0x66, 0x65, 0x51, 0x5a, 0x33, 0x38, 0x4a, 0x34, 0x37, 0x4d, 0x70, 0x66, 0x4e, 0x4a, 0x71, 0x76, 0x77, 0x0a, 0x32, 0x30, 0x44, 0x65, 0x5a, 0x51, 0x42, 0x77, 0x62, 0x34, 0x77, 0x36, 0x35, 0x41, 0x75, 0x69, 0x4c, 0x61, 0x49, 0x77, 0x52, 0x69, 0x69, 0x4e, 0x2f, 0x6f, 0x69, 0x4b, 0x36, 0x68, 0x6c, 0x42, 0x43, 0x58, 0x63, 0x62, 0x35, 0x65, 0x4c, 0x70, 0x59, 0x78, 0x64, 0x44, 0x35, 0x6b, 0x67, 0x2b, 0x38, 0x37, 0x79, 0x42, 0x76, 0x41, 0x58, 0x36, 0x48, 0x43, 0x6a, 0x6e, 0x70, 0x66, 0x68, 0x42, 0x0a, 0x78, 0x39, 0x47, 0x4b, 0x38, 0x68, 0x4d, 0x59, 0x6c, 0x75, 0x70, 0x4b, 0x31, 0x64, 0x53, 0x6c, 0x74, 0x6d, 0x55, 0x5a, 0x69, 0x61, 0x36, 0x6b, 0x68, 0x63, 0x4f, 0x69, 0x67, 0x6f, 0x31, 0x64, 0x6f, 0x30, 0x55, 0x77, 0x51, 0x7a, 0x41, 0x4a, 0x42, 0x67, 0x4e, 0x56, 0x48, 0x52, 0x4d, 0x45, 0x41, 0x6a, 0x41, 0x41, 0x4d, 0x41, 0x73, 0x47, 0x41, 0x31, 0x55, 0x64, 0x44, 0x77, 0x51, 0x45, 0x0a, 0x41, 0x77, 0x49, 0x46, 0x6f, 0x44, 0x41, 0x54, 0x42, 0x67, 0x4e, 0x56, 0x48, 0x53, 0x55, 0x45, 0x44, 0x44, 0x41, 0x4b, 0x42, 0x67, 0x67, 0x72, 0x42, 0x67, 0x45, 0x46, 0x42, 0x51, 0x63, 0x44, 0x41, 0x54, 0x41, 0x55, 0x42, 0x67, 0x4e, 0x56, 0x48, 0x52, 0x45, 0x45, 0x44, 0x54, 0x41, 0x4c, 0x67, 0x67, 0x6c, 0x73, 0x62, 0x32, 0x4e, 0x68, 0x62, 0x47, 0x68, 0x76, 0x63, 0x33, 0x51, 0x77, 0x0a, 0x43, 0x77, 0x59, 0x4a, 0x59, 0x49, 0x5a, 0x49, 0x41, 0x57, 0x55, 0x44, 0x42, 0x41, 0x4d, 0x43, 0x41, 0x79, 0x38, 0x41, 0x4d, 0x43, 0x77, 0x43, 0x46, 0x43, 0x6c, 0x78, 0x49, 0x6e, 0x58, 0x54, 0x52, 0x57, 0x4e, 0x4a, 0x45, 0x57, 0x64, 0x69, 0x35, 0x69, 0x6c, 0x4e, 0x72, 0x2f, 0x66, 0x62, 0x4d, 0x31, 0x62, 0x4b, 0x41, 0x68, 0x51, 0x79, 0x34, 0x42, 0x37, 0x77, 0x74, 0x6d, 0x66, 0x64, 0x0a, 0x49, 0x2b, 0x7a, 0x56, 0x36, 0x67, 0x33, 0x77, 0x39, 0x71, 0x42, 0x6b, 0x4e, 0x71, 0x53, 0x74, 0x70, 0x41, 0x3d, 0x3d, 0x0a, 0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x45, 0x4e, 0x44, 0x20, 0x43, 0x45, 0x52, 0x54, 0x49, 0x46, 0x49, 0x43, 0x41, 0x54, 0x45, 0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x0a }; #endif /* unused, to avoid warning. */ static int idx; #define FUZZTIME 1485898104 #define TIME_IMPL(t) { if (t != NULL) *t = FUZZTIME; return FUZZTIME; } /* * This might not work in all cases (and definitely not on Windows * because of the way linkers are) and callees can still get the * current time instead of the fixed time. This will just result * in things not being fully reproducible and have a slightly * different coverage. */ #if !defined(_WIN32) time_t time(time_t *t) TIME_IMPL(t) #endif int FuzzerInitialize(int *argc, char ***argv) { STACK_OF(SSL_COMP) *comp_methods; FuzzerSetRand(); OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS | OPENSSL_INIT_ASYNC, NULL); OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS, NULL); ERR_clear_error(); CRYPTO_free_ex_index(0, -1); idx = SSL_get_ex_data_X509_STORE_CTX_idx(); comp_methods = SSL_COMP_get_compression_methods(); if (comp_methods != NULL) sk_SSL_COMP_sort(comp_methods); return 1; } int FuzzerTestOneInput(const uint8_t *buf, size_t len) { SSL *server; BIO *in; BIO *out; #if !defined(OPENSSL_NO_EC) \ || (!defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_DEPRECATED_3_0)) BIO *bio_buf; #endif SSL_CTX *ctx; int ret; #ifndef OPENSSL_NO_DEPRECATED_3_0 RSA *privkey; #endif const uint8_t *bufp; #if !defined(OPENSSL_NO_DEPRECATED_3_0) EVP_PKEY *pkey; #endif X509 *cert; #ifndef OPENSSL_NO_DEPRECATED_3_0 # ifndef OPENSSL_NO_EC EC_KEY *ecdsakey = NULL; # endif #endif #if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_DEPRECATED_3_0) DSA *dsakey = NULL; #endif uint8_t opt; if (len < 2) return 0; /* This only fuzzes the initial flow from the client so far. */ ctx = SSL_CTX_new(SSLv23_method()); ret = SSL_CTX_set_min_proto_version(ctx, 0); OPENSSL_assert(ret == 1); ret = SSL_CTX_set_cipher_list(ctx, "ALL:eNULL:@SECLEVEL=0"); OPENSSL_assert(ret == 1); #ifndef OPENSSL_NO_DEPRECATED_3_0 /* RSA */ bufp = kRSAPrivateKeyDER; privkey = d2i_RSAPrivateKey(NULL, &bufp, sizeof(kRSAPrivateKeyDER)); OPENSSL_assert(privkey != NULL); pkey = EVP_PKEY_new(); EVP_PKEY_assign_RSA(pkey, privkey); ret = SSL_CTX_use_PrivateKey(ctx, pkey); OPENSSL_assert(ret == 1); EVP_PKEY_free(pkey); #endif bufp = kCertificateDER; cert = d2i_X509(NULL, &bufp, sizeof(kCertificateDER)); OPENSSL_assert(cert != NULL); ret = SSL_CTX_use_certificate(ctx, cert); OPENSSL_assert(ret == 1); X509_free(cert); #ifndef OPENSSL_NO_EC # ifndef OPENSSL_NO_DEPRECATED_3_0 /* ECDSA */ bio_buf = BIO_new(BIO_s_mem()); OPENSSL_assert((size_t)BIO_write(bio_buf, ECDSAPrivateKeyPEM, sizeof(ECDSAPrivateKeyPEM)) == sizeof(ECDSAPrivateKeyPEM)); ecdsakey = PEM_read_bio_ECPrivateKey(bio_buf, NULL, NULL, NULL); ERR_print_errors_fp(stderr); OPENSSL_assert(ecdsakey != NULL); BIO_free(bio_buf); pkey = EVP_PKEY_new(); EVP_PKEY_assign_EC_KEY(pkey, ecdsakey); ret = SSL_CTX_use_PrivateKey(ctx, pkey); OPENSSL_assert(ret == 1); EVP_PKEY_free(pkey); # endif bio_buf = BIO_new(BIO_s_mem()); OPENSSL_assert((size_t)BIO_write(bio_buf, ECDSACertPEM, sizeof(ECDSACertPEM)) == sizeof(ECDSACertPEM)); cert = PEM_read_bio_X509(bio_buf, NULL, NULL, NULL); OPENSSL_assert(cert != NULL); BIO_free(bio_buf); ret = SSL_CTX_use_certificate(ctx, cert); OPENSSL_assert(ret == 1); X509_free(cert); #endif #if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_DEPRECATED_3_0) /* DSA */ bio_buf = BIO_new(BIO_s_mem()); OPENSSL_assert((size_t)BIO_write(bio_buf, DSAPrivateKeyPEM, sizeof(DSAPrivateKeyPEM)) == sizeof(DSAPrivateKeyPEM)); dsakey = PEM_read_bio_DSAPrivateKey(bio_buf, NULL, NULL, NULL); ERR_print_errors_fp(stderr); OPENSSL_assert(dsakey != NULL); BIO_free(bio_buf); pkey = EVP_PKEY_new(); EVP_PKEY_assign_DSA(pkey, dsakey); ret = SSL_CTX_use_PrivateKey(ctx, pkey); OPENSSL_assert(ret == 1); EVP_PKEY_free(pkey); bio_buf = BIO_new(BIO_s_mem()); OPENSSL_assert((size_t)BIO_write(bio_buf, DSACertPEM, sizeof(DSACertPEM)) == sizeof(DSACertPEM)); cert = PEM_read_bio_X509(bio_buf, NULL, NULL, NULL); OPENSSL_assert(cert != NULL); BIO_free(bio_buf); ret = SSL_CTX_use_certificate(ctx, cert); OPENSSL_assert(ret == 1); X509_free(cert); #endif server = SSL_new(ctx); in = BIO_new(BIO_s_mem()); out = BIO_new(BIO_s_mem()); SSL_set_bio(server, in, out); SSL_set_accept_state(server); opt = (uint8_t)buf[len-1]; len--; OPENSSL_assert((size_t)BIO_write(in, buf, len) == len); if ((opt & 0x01) != 0) { do { char early_buf[16384]; size_t early_len; ret = SSL_read_early_data(server, early_buf, sizeof(early_buf), &early_len); if (ret != SSL_READ_EARLY_DATA_SUCCESS) break; } while (1); } if (SSL_do_handshake(server) == 1) { /* Keep reading application data until error or EOF. */ uint8_t tmp[1024]; for (;;) { if (SSL_read(server, tmp, sizeof(tmp)) <= 0) { break; } } } SSL_free(server); ERR_clear_error(); SSL_CTX_free(ctx); return 0; } void FuzzerCleanup(void) { FuzzerClearRand(); }
./openssl/fuzz/smime.c
/* * Copyright 2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ #include "fuzzer.h" #include <openssl/err.h> #include <openssl/pkcs7.h> #include <openssl/x509.h> #include <stdio.h> int FuzzerInitialize(int *argc, char ***argv) { return 1; } int FuzzerTestOneInput(const uint8_t *buf, size_t len) { BIO *b = BIO_new_mem_buf(buf, len); PKCS7 *p7 = SMIME_read_PKCS7(b, NULL); if (p7 != NULL) { STACK_OF(PKCS7_SIGNER_INFO) *p7si = PKCS7_get_signer_info(p7); int i; for (i = 0; i < sk_PKCS7_SIGNER_INFO_num(p7si); i++) { STACK_OF(X509_ALGOR) *algs; PKCS7_cert_from_signer_info(p7, sk_PKCS7_SIGNER_INFO_value(p7si, i)); algs = PKCS7_get_smimecap(sk_PKCS7_SIGNER_INFO_value(p7si, i)); sk_X509_ALGOR_pop_free(algs, X509_ALGOR_free); } PKCS7_free(p7); } BIO_free(b); ERR_clear_error(); return 0; } void FuzzerCleanup(void) { }
./openssl/fuzz/fuzzer.h
/* * Copyright 2016-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ #include <stddef.h> /* for size_t */ #include <openssl/e_os2.h> /* for uint8_t */ int FuzzerTestOneInput(const uint8_t *buf, size_t len); int FuzzerInitialize(int *argc, char ***argv); void FuzzerCleanup(void); void FuzzerSetRand(void); void FuzzerClearRand(void);
./openssl/fuzz/bignum.c
/* * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ /* * Confirm that a^b mod c agrees when calculated cleverly vs naively, for * random a, b and c. */ #include <stdio.h> #include <openssl/bn.h> #include <openssl/err.h> #include "fuzzer.h" int FuzzerInitialize(int *argc, char ***argv) { OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL); ERR_clear_error(); return 1; } int FuzzerTestOneInput(const uint8_t *buf, size_t len) { int success = 0; size_t l1 = 0, l2 = 0, l3 = 0; int s1 = 0, s3 = 0; BN_CTX *ctx; BIGNUM *b1; BIGNUM *b2; BIGNUM *b3; BIGNUM *b4; BIGNUM *b5; b1 = BN_new(); b2 = BN_new(); b3 = BN_new(); b4 = BN_new(); b5 = BN_new(); ctx = BN_CTX_new(); /* Divide the input into three parts, using the values of the first two * bytes to choose lengths, which generate b1, b2 and b3. Use three bits * of the third byte to choose signs for the three numbers. */ if (len > 2) { len -= 3; l1 = (buf[0] * len) / 255; ++buf; l2 = (buf[0] * (len - l1)) / 255; ++buf; l3 = len - l1 - l2; s1 = buf[0] & 1; s3 = buf[0] & 4; ++buf; } OPENSSL_assert(BN_bin2bn(buf, l1, b1) == b1); BN_set_negative(b1, s1); OPENSSL_assert(BN_bin2bn(buf + l1, l2, b2) == b2); OPENSSL_assert(BN_bin2bn(buf + l1 + l2, l3, b3) == b3); BN_set_negative(b3, s3); /* mod 0 is undefined */ if (BN_is_zero(b3)) { success = 1; goto done; } OPENSSL_assert(BN_mod_exp(b4, b1, b2, b3, ctx)); OPENSSL_assert(BN_mod_exp_simple(b5, b1, b2, b3, ctx)); success = BN_cmp(b4, b5) == 0; if (!success) { BN_print_fp(stdout, b1); putchar('\n'); BN_print_fp(stdout, b2); putchar('\n'); BN_print_fp(stdout, b3); putchar('\n'); BN_print_fp(stdout, b4); putchar('\n'); BN_print_fp(stdout, b5); putchar('\n'); } done: OPENSSL_assert(success); BN_free(b1); BN_free(b2); BN_free(b3); BN_free(b4); BN_free(b5); BN_CTX_free(ctx); ERR_clear_error(); return 0; } void FuzzerCleanup(void) { }
./openssl/fuzz/driver.c
/* * Copyright 2016-2018 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ #include <stdint.h> #include <unistd.h> #include <stdlib.h> #include <openssl/opensslconf.h> #include "fuzzer.h" #ifndef OPENSSL_NO_FUZZ_LIBFUZZER int LLVMFuzzerInitialize(int *argc, char ***argv); int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len); int LLVMFuzzerInitialize(int *argc, char ***argv) { return FuzzerInitialize(argc, argv); } int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) { return FuzzerTestOneInput(buf, len); } #elif !defined(OPENSSL_NO_FUZZ_AFL) #define BUF_SIZE 65536 int main(int argc, char** argv) { FuzzerInitialize(&argc, &argv); while (__AFL_LOOP(10000)) { uint8_t *buf = malloc(BUF_SIZE); size_t size = read(0, buf, BUF_SIZE); FuzzerTestOneInput(buf, size); free(buf); } FuzzerCleanup(); return 0; } #else #error "Unsupported fuzzer" #endif
./openssl/fuzz/client.c
/* * Copyright 2016-2022 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ #include <time.h> #include <openssl/rand.h> #include <openssl/ssl.h> #include <openssl/rsa.h> #include <openssl/dsa.h> #include <openssl/ec.h> #include <openssl/dh.h> #include <openssl/err.h> #include "fuzzer.h" /* unused, to avoid warning. */ static int idx; #define FUZZTIME 1485898104 #define TIME_IMPL(t) { if (t != NULL) *t = FUZZTIME; return FUZZTIME; } /* * This might not work in all cases (and definitely not on Windows * because of the way linkers are) and callees can still get the * current time instead of the fixed time. This will just result * in things not being fully reproducible and have a slightly * different coverage. */ #if !defined(_WIN32) time_t time(time_t *t) TIME_IMPL(t) #endif int FuzzerInitialize(int *argc, char ***argv) { STACK_OF(SSL_COMP) *comp_methods; FuzzerSetRand(); OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS | OPENSSL_INIT_ASYNC, NULL); OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS, NULL); ERR_clear_error(); CRYPTO_free_ex_index(0, -1); idx = SSL_get_ex_data_X509_STORE_CTX_idx(); comp_methods = SSL_COMP_get_compression_methods(); if (comp_methods != NULL) sk_SSL_COMP_sort(comp_methods); return 1; } int FuzzerTestOneInput(const uint8_t *buf, size_t len) { SSL *client = NULL; BIO *in; BIO *out; SSL_CTX *ctx; if (len == 0) return 0; /* This only fuzzes the initial flow from the client so far. */ ctx = SSL_CTX_new(SSLv23_method()); if (ctx == NULL) goto end; client = SSL_new(ctx); if (client == NULL) goto end; OPENSSL_assert(SSL_set_min_proto_version(client, 0) == 1); OPENSSL_assert(SSL_set_cipher_list(client, "ALL:eNULL:@SECLEVEL=0") == 1); SSL_set_tlsext_host_name(client, "localhost"); in = BIO_new(BIO_s_mem()); if (in == NULL) goto end; out = BIO_new(BIO_s_mem()); if (out == NULL) { BIO_free(in); goto end; } SSL_set_bio(client, in, out); SSL_set_connect_state(client); OPENSSL_assert((size_t)BIO_write(in, buf, len) == len); if (SSL_do_handshake(client) == 1) { /* Keep reading application data until error or EOF. */ uint8_t tmp[1024]; for (;;) { if (SSL_read(client, tmp, sizeof(tmp)) <= 0) { break; } } } end: SSL_free(client); ERR_clear_error(); SSL_CTX_free(ctx); return 0; } void FuzzerCleanup(void) { FuzzerClearRand(); }
./openssl/fuzz/decoder.c
/* * Copyright 2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ #include <openssl/decoder.h> #include <openssl/err.h> #include <openssl/rand.h> #include "fuzzer.h" static ASN1_PCTX *pctx; int FuzzerInitialize(int *argc, char ***argv) { FuzzerSetRand(); OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS | OPENSSL_INIT_ADD_ALL_CIPHERS | OPENSSL_INIT_ADD_ALL_DIGESTS, NULL); pctx = ASN1_PCTX_new(); ASN1_PCTX_set_flags(pctx, ASN1_PCTX_FLAGS_SHOW_ABSENT | ASN1_PCTX_FLAGS_SHOW_SEQUENCE | ASN1_PCTX_FLAGS_SHOW_SSOF | ASN1_PCTX_FLAGS_SHOW_TYPE | ASN1_PCTX_FLAGS_SHOW_FIELD_STRUCT_NAME); ASN1_PCTX_set_str_flags(pctx, ASN1_STRFLGS_UTF8_CONVERT | ASN1_STRFLGS_SHOW_TYPE | ASN1_STRFLGS_DUMP_ALL); ERR_clear_error(); CRYPTO_free_ex_index(0, -1); return 1; } int FuzzerTestOneInput(const uint8_t *buf, size_t len) { OSSL_DECODER_CTX *dctx; EVP_PKEY *pkey = NULL; EVP_PKEY_CTX *ctx = NULL; BIO *bio; bio = BIO_new(BIO_s_null()); dctx = OSSL_DECODER_CTX_new_for_pkey(&pkey, NULL, NULL, NULL, 0, NULL, NULL); if (dctx == NULL) { return 0; } if (OSSL_DECODER_from_data(dctx, &buf, &len)) { EVP_PKEY *pkey2; EVP_PKEY_print_public(bio, pkey, 1, pctx); EVP_PKEY_print_private(bio, pkey, 1, pctx); EVP_PKEY_print_params(bio, pkey, 1, pctx); pkey2 = EVP_PKEY_dup(pkey); OPENSSL_assert(pkey2 != NULL); EVP_PKEY_eq(pkey, pkey2); EVP_PKEY_free(pkey2); ctx = EVP_PKEY_CTX_new(pkey, NULL); EVP_PKEY_param_check(ctx); EVP_PKEY_public_check(ctx); EVP_PKEY_private_check(ctx); EVP_PKEY_pairwise_check(ctx); OPENSSL_assert(ctx != NULL); EVP_PKEY_CTX_free(ctx); EVP_PKEY_free(pkey); } OSSL_DECODER_CTX_free(dctx); BIO_free(bio); ERR_clear_error(); return 0; } void FuzzerCleanup(void) { ASN1_PCTX_free(pctx); FuzzerClearRand(); }
./openssl/fuzz/bndiv.c
/* * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ /* * Confirm that if (d, r) = a / b, then b * d + r == a, and that sign(d) == * sign(a), and 0 <= r <= b */ #include <stdio.h> #include <openssl/bn.h> #include <openssl/err.h> #include "fuzzer.h" /* 256 kB */ #define MAX_LEN (256 * 1000) static BN_CTX *ctx; static BIGNUM *b1; static BIGNUM *b2; static BIGNUM *b3; static BIGNUM *b4; static BIGNUM *b5; int FuzzerInitialize(int *argc, char ***argv) { b1 = BN_new(); b2 = BN_new(); b3 = BN_new(); b4 = BN_new(); b5 = BN_new(); ctx = BN_CTX_new(); OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL); ERR_clear_error(); return 1; } int FuzzerTestOneInput(const uint8_t *buf, size_t len) { int success = 0; size_t l1 = 0, l2 = 0; /* s1 and s2 will be the signs for b1 and b2. */ int s1 = 0, s2 = 0; /* limit the size of the input to avoid timeout */ if (len > MAX_LEN) len = MAX_LEN; /* We are going to split the buffer in two, sizes l1 and l2, giving b1 and * b2. */ if (len > 0) { --len; /* Use first byte to divide the remaining buffer into 3Fths. I admit * this disallows some number sizes. If it matters, better ideas are * welcome (Ben). */ l1 = ((buf[0] & 0x3f) * len) / 0x3f; s1 = buf[0] & 0x40; s2 = buf[0] & 0x80; ++buf; l2 = len - l1; } OPENSSL_assert(BN_bin2bn(buf, l1, b1) == b1); BN_set_negative(b1, s1); OPENSSL_assert(BN_bin2bn(buf + l1, l2, b2) == b2); BN_set_negative(b2, s2); /* divide by 0 is an error */ if (BN_is_zero(b2)) { success = 1; goto done; } OPENSSL_assert(BN_div(b3, b4, b1, b2, ctx)); if (BN_is_zero(b1)) success = BN_is_zero(b3) && BN_is_zero(b4); else if (BN_is_negative(b1)) success = (BN_is_negative(b3) != BN_is_negative(b2) || BN_is_zero(b3)) && (BN_is_negative(b4) || BN_is_zero(b4)); else success = (BN_is_negative(b3) == BN_is_negative(b2) || BN_is_zero(b3)) && (!BN_is_negative(b4) || BN_is_zero(b4)); OPENSSL_assert(BN_mul(b5, b3, b2, ctx)); OPENSSL_assert(BN_add(b5, b5, b4)); success = success && BN_cmp(b5, b1) == 0; if (!success) { BN_print_fp(stdout, b1); putchar('\n'); BN_print_fp(stdout, b2); putchar('\n'); BN_print_fp(stdout, b3); putchar('\n'); BN_print_fp(stdout, b4); putchar('\n'); BN_print_fp(stdout, b5); putchar('\n'); printf("%d %d %d %d %d %d %d\n", BN_is_negative(b1), BN_is_negative(b2), BN_is_negative(b3), BN_is_negative(b4), BN_is_zero(b4), BN_is_negative(b3) != BN_is_negative(b2) && (BN_is_negative(b4) || BN_is_zero(b4)), BN_cmp(b5, b1)); puts("----\n"); } done: OPENSSL_assert(success); ERR_clear_error(); return 0; } void FuzzerCleanup(void) { BN_free(b1); BN_free(b2); BN_free(b3); BN_free(b4); BN_free(b5); BN_CTX_free(ctx); }
./openssl/fuzz/x509.c
/* * Copyright 2016-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ #include <openssl/x509.h> #include <openssl/ocsp.h> #include <openssl/bio.h> #include <openssl/err.h> #include <openssl/rand.h> #include "fuzzer.h" int FuzzerInitialize(int *argc, char ***argv) { FuzzerSetRand(); OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS | OPENSSL_INIT_ADD_ALL_CIPHERS | OPENSSL_INIT_ADD_ALL_DIGESTS, NULL); ERR_clear_error(); CRYPTO_free_ex_index(0, -1); return 1; } static int cb(int ok, X509_STORE_CTX *ctx) { return 1; } int FuzzerTestOneInput(const uint8_t *buf, size_t len) { const unsigned char *p = buf; size_t orig_len = len; unsigned char *der = NULL; BIO *bio = NULL; X509 *x509_1 = NULL, *x509_2 = NULL; X509_STORE *store = NULL; X509_VERIFY_PARAM *param = NULL; X509_STORE_CTX *ctx = NULL; X509_CRL *crl = NULL; STACK_OF(X509_CRL) *crls = NULL; STACK_OF(X509) *certs = NULL; OCSP_RESPONSE *resp = NULL; OCSP_BASICRESP *bs = NULL; OCSP_CERTID *id = NULL; x509_1 = d2i_X509(NULL, &p, len); if (x509_1 == NULL) goto err; bio = BIO_new(BIO_s_null()); if (bio == NULL) goto err; /* This will load and print the public key as well as extensions */ X509_print(bio, x509_1); BIO_free(bio); X509_issuer_and_serial_hash(x509_1); i2d_X509(x509_1, &der); OPENSSL_free(der); len = orig_len - (p - buf); x509_2 = d2i_X509(NULL, &p, len); if (x509_2 == NULL) goto err; len = orig_len - (p - buf); crl = d2i_X509_CRL(NULL, &p, len); if (crl == NULL) goto err; len = orig_len - (p - buf); resp = d2i_OCSP_RESPONSE(NULL, &p, len); store = X509_STORE_new(); X509_STORE_add_cert(store, x509_2); param = X509_VERIFY_PARAM_new(); X509_VERIFY_PARAM_set_flags(param, X509_V_FLAG_NO_CHECK_TIME); X509_VERIFY_PARAM_set_flags(param, X509_V_FLAG_X509_STRICT); X509_VERIFY_PARAM_set_flags(param, X509_V_FLAG_PARTIAL_CHAIN); X509_VERIFY_PARAM_set_flags(param, X509_V_FLAG_CRL_CHECK); X509_STORE_set1_param(store, param); X509_STORE_set_verify_cb(store, cb); ctx = X509_STORE_CTX_new(); if (ctx == NULL) goto err; X509_STORE_CTX_init(ctx, store, x509_1, NULL); if (crl != NULL) { crls = sk_X509_CRL_new_null(); if (crls == NULL) goto err; sk_X509_CRL_push(crls, crl); X509_STORE_CTX_set0_crls(ctx, crls); } X509_verify_cert(ctx); if (resp != NULL) bs = OCSP_response_get1_basic(resp); if (bs != NULL) { int status, reason; ASN1_GENERALIZEDTIME *revtime, *thisupd, *nextupd; certs = sk_X509_new_null(); if (certs == NULL) goto err; sk_X509_push(certs, x509_1); sk_X509_push(certs, x509_2); OCSP_basic_verify(bs, certs, store, OCSP_PARTIAL_CHAIN); id = OCSP_cert_to_id(NULL, x509_1, x509_2); if (id == NULL) goto err; OCSP_resp_find_status(bs, id, &status, &reason, &revtime, &thisupd, &nextupd); } err: X509_STORE_CTX_free(ctx); X509_VERIFY_PARAM_free(param); X509_STORE_free(store); X509_free(x509_1); X509_free(x509_2); X509_CRL_free(crl); OCSP_CERTID_free(id); OCSP_BASICRESP_free(bs); OCSP_RESPONSE_free(resp); sk_X509_CRL_free(crls); sk_X509_free(certs); ERR_clear_error(); return 0; } void FuzzerCleanup(void) { FuzzerClearRand(); }
./openssl/fuzz/pem.c
/* * Copyright 2022-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ #include <openssl/pem.h> #include <openssl/err.h> #include "fuzzer.h" int FuzzerInitialize(int *argc, char ***argv) { OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL); ERR_clear_error(); CRYPTO_free_ex_index(0, -1); return 1; } int FuzzerTestOneInput(const uint8_t *buf, size_t len) { BIO *in; char *name = NULL, *header = NULL; unsigned char *data = NULL; long outlen; if (len <= 1) return 0; in = BIO_new(BIO_s_mem()); OPENSSL_assert((size_t)BIO_write(in, buf + 1, len - 1) == len - 1); if (PEM_read_bio_ex(in, &name, &header, &data, &outlen, buf[0]) == 1) { /* Try to read all the data we get to see if allocated properly. */ BIO_write(in, name, strlen(name)); BIO_write(in, header, strlen(header)); BIO_write(in, data, outlen); } if (buf[0] & PEM_FLAG_SECURE) { OPENSSL_secure_free(name); OPENSSL_secure_free(header); OPENSSL_secure_free(data); } else { OPENSSL_free(name); OPENSSL_free(header); OPENSSL_free(data); } BIO_free(in); ERR_clear_error(); return 0; } void FuzzerCleanup(void) { }
./openssl/fuzz/quic-rcidm.c
/* * Copyright 2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ #include <openssl/ssl.h> #include <openssl/err.h> #include <openssl/bio.h> #include "fuzzer.h" #include "internal/quic_rcidm.h" #include "internal/packet.h" int FuzzerInitialize(int *argc, char ***argv) { FuzzerSetRand(); OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS | OPENSSL_INIT_ASYNC, NULL); OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS, NULL); ERR_clear_error(); return 1; } /* * Fuzzer input "protocol": * Big endian * Zero or more of: * RESET_WITH_ODCID u8(0x00) u8(cidl):cid * RESET_WITHOUT_ODCID u8(0x01) * (free and reallocate) * ADD_FROM_INITIAL u8(0x02) u8(cidl):cid * ADD_FROM_SERVER_RETRY u8(0x03) u8(cidl):cid * ADD_FROM_NCID u8(0x04) u64(seq_num) * u64(retire_prior_to) u8(cidl):cid * ON_HANDSHAKE_COMPLETE u8(0x05) * ON_PACKET_SENT u8(0x06) u64(num_pkt) * REQUEST_ROLL u8(0x07) * POP_RETIRE_SEQ_NUM u8(0x08) * PEEK_RETIRE_SEQ_NUM u8(0x09) * GET_PREFERRED_TX_DCID u8(0x0A) * GET_PREFERRED_TX_DCID_CHANGED u8(0x0B) u8(clear) */ enum { CMD_RESET_WITH_ODCID, CMD_RESET_WITHOUT_ODCID, CMD_ADD_FROM_INITIAL, CMD_ADD_FROM_SERVER_RETRY, CMD_ADD_FROM_NCID, CMD_ON_HANDSHAKE_COMPLETE, CMD_ON_PACKET_SENT, CMD_REQUEST_ROLL, CMD_POP_RETIRE_SEQ_NUM, CMD_PEEK_RETIRE_SEQ_NUM, CMD_GET_PREFERRED_TX_DCID, CMD_GET_PREFERRED_TX_DCID_CHANGED }; static int get_cid(PACKET *pkt, QUIC_CONN_ID *cid) { unsigned int cidl; if (!PACKET_get_1(pkt, &cidl) || cidl > QUIC_MAX_CONN_ID_LEN || !PACKET_copy_bytes(pkt, cid->id, cidl)) return 0; cid->id_len = (unsigned char)cidl; return 1; } int FuzzerTestOneInput(const uint8_t *buf, size_t len) { int rc = 0; QUIC_RCIDM *rcidm = NULL; PACKET pkt; uint64_t seq_num_out, arg_num_pkt; unsigned int cmd, arg_clear; QUIC_CONN_ID arg_cid, cid_out; OSSL_QUIC_FRAME_NEW_CONN_ID ncid_frame; if (!PACKET_buf_init(&pkt, buf, len)) goto err; if ((rcidm = ossl_quic_rcidm_new(NULL)) == NULL) goto err; while (PACKET_remaining(&pkt) > 0) { if (!PACKET_get_1(&pkt, &cmd)) goto err; switch (cmd) { case CMD_RESET_WITH_ODCID: if (!get_cid(&pkt, &arg_cid)) { rc = -1; goto err; } ossl_quic_rcidm_free(rcidm); if ((rcidm = ossl_quic_rcidm_new(&arg_cid)) == NULL) goto err; break; case CMD_RESET_WITHOUT_ODCID: ossl_quic_rcidm_free(rcidm); if ((rcidm = ossl_quic_rcidm_new(NULL)) == NULL) goto err; break; case CMD_ADD_FROM_INITIAL: if (!get_cid(&pkt, &arg_cid)) { rc = -1; goto err; } ossl_quic_rcidm_add_from_initial(rcidm, &arg_cid); break; case CMD_ADD_FROM_SERVER_RETRY: if (!get_cid(&pkt, &arg_cid)) { rc = -1; goto err; } ossl_quic_rcidm_add_from_server_retry(rcidm, &arg_cid); break; case CMD_ADD_FROM_NCID: if (!PACKET_get_net_8(&pkt, &ncid_frame.seq_num) || !PACKET_get_net_8(&pkt, &ncid_frame.retire_prior_to) || !get_cid(&pkt, &ncid_frame.conn_id)) { rc = -1; goto err; } ossl_quic_rcidm_add_from_ncid(rcidm, &ncid_frame); break; case CMD_ON_HANDSHAKE_COMPLETE: ossl_quic_rcidm_on_handshake_complete(rcidm); break; case CMD_ON_PACKET_SENT: if (!PACKET_get_net_8(&pkt, &arg_num_pkt)) { rc = -1; goto err; } ossl_quic_rcidm_on_packet_sent(rcidm, arg_num_pkt); break; case CMD_REQUEST_ROLL: ossl_quic_rcidm_request_roll(rcidm); break; case CMD_POP_RETIRE_SEQ_NUM: ossl_quic_rcidm_pop_retire_seq_num(rcidm, &seq_num_out); break; case CMD_PEEK_RETIRE_SEQ_NUM: ossl_quic_rcidm_peek_retire_seq_num(rcidm, &seq_num_out); break; case CMD_GET_PREFERRED_TX_DCID: ossl_quic_rcidm_get_preferred_tx_dcid(rcidm, &cid_out); break; case CMD_GET_PREFERRED_TX_DCID_CHANGED: if (!PACKET_get_1(&pkt, &arg_clear)) { rc = -1; goto err; } ossl_quic_rcidm_get_preferred_tx_dcid_changed(rcidm, arg_clear); break; default: rc = -1; goto err; } } err: ossl_quic_rcidm_free(rcidm); return rc; } void FuzzerCleanup(void) { FuzzerClearRand(); }
./openssl/fuzz/conf.c
/* * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ /* * Test configuration parsing. */ #include <openssl/conf.h> #include <openssl/err.h> #include "fuzzer.h" int FuzzerInitialize(int *argc, char ***argv) { OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL); ERR_clear_error(); return 1; } int FuzzerTestOneInput(const uint8_t *buf, size_t len) { CONF *conf; BIO *in; long eline; if (len == 0) return 0; conf = NCONF_new(NULL); in = BIO_new(BIO_s_mem()); OPENSSL_assert((size_t)BIO_write(in, buf, len) == len); NCONF_load_bio(conf, in, &eline); NCONF_free(conf); BIO_free(in); ERR_clear_error(); return 0; } void FuzzerCleanup(void) { }
./openssl/fuzz/v3name.c
/* * Copyright 2012-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <string.h> #include <openssl/e_os2.h> #include <openssl/x509.h> #include <openssl/x509v3.h> #include "internal/nelem.h" #include "fuzzer.h" int FuzzerInitialize(int *argc, char ***argv) { return 1; } int FuzzerTestOneInput(const uint8_t* data, size_t size){ GENERAL_NAME *namesa; GENERAL_NAME *namesb; const unsigned char *derp = data; /* * We create two versions of each GENERAL_NAME so that we ensure when * we compare them they are always different pointers. */ namesa = d2i_GENERAL_NAME(NULL, &derp, size); derp = data; namesb = d2i_GENERAL_NAME(NULL, &derp, size); GENERAL_NAME_cmp(namesa, namesb); if (namesa != NULL) GENERAL_NAME_free(namesa); if (namesb != NULL) GENERAL_NAME_free(namesb); return 0; } void FuzzerCleanup(void) { }
./openssl/fuzz/asn1parse.c
/* * Copyright 2016-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ /* * Fuzz the parser used for dumping ASN.1 using "openssl asn1parse". */ #include <stdio.h> #include <openssl/asn1.h> #include <openssl/x509.h> #include <openssl/x509v3.h> #include <openssl/err.h> #include "fuzzer.h" static BIO *bio_out; int FuzzerInitialize(int *argc, char ***argv) { bio_out = BIO_new(BIO_s_null()); /* output will be ignored */ if (bio_out == NULL) return 0; OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL); ERR_clear_error(); CRYPTO_free_ex_index(0, -1); return 1; } int FuzzerTestOneInput(const uint8_t *buf, size_t len) { (void)ASN1_parse_dump(bio_out, buf, len, 0, 0); ERR_clear_error(); return 0; } void FuzzerCleanup(void) { BIO_free(bio_out); }
./openssl/fuzz/crl.c
/* * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ #include <openssl/x509.h> #include <openssl/bio.h> #include <openssl/err.h> #include "fuzzer.h" int FuzzerInitialize(int *argc, char ***argv) { OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL); ERR_clear_error(); CRYPTO_free_ex_index(0, -1); return 1; } int FuzzerTestOneInput(const uint8_t *buf, size_t len) { const unsigned char *p = buf; unsigned char *der = NULL; X509_CRL *crl = d2i_X509_CRL(NULL, &p, len); if (crl != NULL) { BIO *bio = BIO_new(BIO_s_null()); X509_CRL_print(bio, crl); BIO_free(bio); i2d_X509_CRL(crl, &der); OPENSSL_free(der); X509_CRL_free(crl); } ERR_clear_error(); return 0; } void FuzzerCleanup(void) { }
./openssl/fuzz/cms.c
/* * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ /* * Test CMS DER parsing. */ #include <openssl/bio.h> #include <openssl/cms.h> #include <openssl/err.h> #include "fuzzer.h" int FuzzerInitialize(int *argc, char ***argv) { OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL); ERR_clear_error(); CRYPTO_free_ex_index(0, -1); return 1; } int FuzzerTestOneInput(const uint8_t *buf, size_t len) { CMS_ContentInfo *cms; BIO *in; if (len == 0) return 0; in = BIO_new(BIO_s_mem()); OPENSSL_assert((size_t)BIO_write(in, buf, len) == len); cms = d2i_CMS_bio(in, NULL); if (cms != NULL) { BIO *out = BIO_new(BIO_s_null()); i2d_CMS_bio(out, cms); BIO_free(out); CMS_ContentInfo_free(cms); } BIO_free(in); ERR_clear_error(); return 0; } void FuzzerCleanup(void) { }
./openssl/fuzz/ct.c
/* * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ /* * Fuzz the SCT parser. */ #include <stdio.h> #include <openssl/ct.h> #include <openssl/err.h> #include "fuzzer.h" int FuzzerInitialize(int *argc, char ***argv) { OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL); CRYPTO_free_ex_index(0, -1); ERR_clear_error(); return 1; } int FuzzerTestOneInput(const uint8_t *buf, size_t len) { const uint8_t **pp = &buf; unsigned char *der = NULL; STACK_OF(SCT) *scts = d2i_SCT_LIST(NULL, pp, len); if (scts != NULL) { BIO *bio = BIO_new(BIO_s_null()); SCT_LIST_print(scts, bio, 4, "\n", NULL); BIO_free(bio); if (i2d_SCT_LIST(scts, &der)) { /* Silence unused result warning */ } OPENSSL_free(der); SCT_LIST_free(scts); } ERR_clear_error(); return 0; } void FuzzerCleanup(void) { }
./openssl/fuzz/cmp.c
/* * Copyright 2007-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * Test CMP DER parsing. */ #include <openssl/bio.h> #include <openssl/cmp.h> #include "../crypto/cmp/cmp_local.h" #include <openssl/err.h> #include "fuzzer.h" int FuzzerInitialize(int *argc, char ***argv) { FuzzerSetRand(); OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL); ERR_clear_error(); CRYPTO_free_ex_index(0, -1); return 1; } static int num_responses; static OSSL_CMP_MSG *transfer_cb(OSSL_CMP_CTX *ctx, const OSSL_CMP_MSG *req) { if (num_responses++ > 2) return NULL; /* prevent loops due to repeated pollRep */ return OSSL_CMP_MSG_dup((OSSL_CMP_MSG *) OSSL_CMP_CTX_get_transfer_cb_arg(ctx)); } static int print_noop(const char *func, const char *file, int line, OSSL_CMP_severity level, const char *msg) { return 1; } static int allow_unprotected(const OSSL_CMP_CTX *ctx, const OSSL_CMP_MSG *rep, int invalid_protection, int expected_type) { return 1; } static void cmp_client_process_response(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg) { X509_NAME *name = X509_NAME_new(); ASN1_INTEGER *serial = ASN1_INTEGER_new(); ctx->unprotectedSend = 1; /* satisfy ossl_cmp_msg_protect() */ ctx->disableConfirm = 1; /* check just one response message */ ctx->popoMethod = OSSL_CRMF_POPO_NONE; /* satisfy ossl_cmp_certReq_new() */ ctx->oldCert = X509_new(); /* satisfy crm_new() and ossl_cmp_rr_new() */ if (!OSSL_CMP_CTX_set1_secretValue(ctx, (unsigned char *)"", 0) /* prevent too unspecific error */ || ctx->oldCert == NULL || name == NULL || !X509_set_issuer_name(ctx->oldCert, name) || serial == NULL || !X509_set_serialNumber(ctx->oldCert, serial)) goto err; (void)OSSL_CMP_CTX_set_transfer_cb(ctx, transfer_cb); (void)OSSL_CMP_CTX_set_transfer_cb_arg(ctx, msg); (void)OSSL_CMP_CTX_set_log_cb(ctx, print_noop); num_responses = 0; switch (msg->body != NULL ? msg->body->type : -1) { case OSSL_CMP_PKIBODY_IP: (void)OSSL_CMP_exec_IR_ses(ctx); break; case OSSL_CMP_PKIBODY_CP: (void)OSSL_CMP_exec_CR_ses(ctx); (void)OSSL_CMP_exec_P10CR_ses(ctx); break; case OSSL_CMP_PKIBODY_KUP: (void)OSSL_CMP_exec_KUR_ses(ctx); break; case OSSL_CMP_PKIBODY_POLLREP: ctx->status = OSSL_CMP_PKISTATUS_waiting; (void)OSSL_CMP_try_certreq(ctx, OSSL_CMP_PKIBODY_CR, NULL, NULL); break; case OSSL_CMP_PKIBODY_RP: (void)OSSL_CMP_exec_RR_ses(ctx); break; case OSSL_CMP_PKIBODY_GENP: sk_OSSL_CMP_ITAV_pop_free(OSSL_CMP_exec_GENM_ses(ctx), OSSL_CMP_ITAV_free); break; default: (void)ossl_cmp_msg_check_update(ctx, msg, allow_unprotected, 0); break; } err: X509_NAME_free(name); ASN1_INTEGER_free(serial); } static OSSL_CMP_PKISI *process_cert_request(OSSL_CMP_SRV_CTX *srv_ctx, const OSSL_CMP_MSG *cert_req, int certReqId, const OSSL_CRMF_MSG *crm, const X509_REQ *p10cr, X509 **certOut, STACK_OF(X509) **chainOut, STACK_OF(X509) **caPubs) { ERR_raise(ERR_LIB_CMP, CMP_R_ERROR_PROCESSING_MESSAGE); return NULL; } static OSSL_CMP_PKISI *process_rr(OSSL_CMP_SRV_CTX *srv_ctx, const OSSL_CMP_MSG *rr, const X509_NAME *issuer, const ASN1_INTEGER *serial) { ERR_raise(ERR_LIB_CMP, CMP_R_ERROR_PROCESSING_MESSAGE); return NULL; } static int process_genm(OSSL_CMP_SRV_CTX *srv_ctx, const OSSL_CMP_MSG *genm, const STACK_OF(OSSL_CMP_ITAV) *in, STACK_OF(OSSL_CMP_ITAV) **out) { ERR_raise(ERR_LIB_CMP, CMP_R_ERROR_PROCESSING_MESSAGE); return 0; } static void process_error(OSSL_CMP_SRV_CTX *srv_ctx, const OSSL_CMP_MSG *error, const OSSL_CMP_PKISI *statusInfo, const ASN1_INTEGER *errorCode, const OSSL_CMP_PKIFREETEXT *errorDetails) { ERR_raise(ERR_LIB_CMP, CMP_R_ERROR_PROCESSING_MESSAGE); } static int process_certConf(OSSL_CMP_SRV_CTX *srv_ctx, const OSSL_CMP_MSG *certConf, int certReqId, const ASN1_OCTET_STRING *certHash, const OSSL_CMP_PKISI *si) { ERR_raise(ERR_LIB_CMP, CMP_R_ERROR_PROCESSING_MESSAGE); return 0; } static int process_pollReq(OSSL_CMP_SRV_CTX *srv_ctx, const OSSL_CMP_MSG *pollReq, int certReqId, OSSL_CMP_MSG **certReq, int64_t *check_after) { ERR_raise(ERR_LIB_CMP, CMP_R_ERROR_PROCESSING_MESSAGE); return 0; } static int clean_transaction(ossl_unused OSSL_CMP_SRV_CTX *srv_ctx, ossl_unused const ASN1_OCTET_STRING *id) { return 1; } static int delayed_delivery(ossl_unused OSSL_CMP_SRV_CTX *srv_ctx, ossl_unused const OSSL_CMP_MSG *req) { return 0; } int FuzzerTestOneInput(const uint8_t *buf, size_t len) { OSSL_CMP_MSG *msg; BIO *in; if (len == 0) return 0; in = BIO_new(BIO_s_mem()); OPENSSL_assert((size_t)BIO_write(in, buf, len) == len); msg = d2i_OSSL_CMP_MSG_bio(in, NULL); if (msg != NULL) { BIO *out = BIO_new(BIO_s_null()); OSSL_CMP_SRV_CTX *srv_ctx = OSSL_CMP_SRV_CTX_new(NULL, NULL); OSSL_CMP_CTX *client_ctx = OSSL_CMP_CTX_new(NULL, NULL); i2d_OSSL_CMP_MSG_bio(out, msg); ASN1_item_print(out, (ASN1_VALUE *)msg, 4, ASN1_ITEM_rptr(OSSL_CMP_MSG), NULL); BIO_free(out); if (client_ctx != NULL) cmp_client_process_response(client_ctx, msg); if (srv_ctx != NULL && OSSL_CMP_CTX_set_log_cb(OSSL_CMP_SRV_CTX_get0_cmp_ctx(srv_ctx), print_noop) && OSSL_CMP_SRV_CTX_init(srv_ctx, NULL, process_cert_request, process_rr, process_genm, process_error, process_certConf, process_pollReq) && OSSL_CMP_SRV_CTX_init_trans(srv_ctx, delayed_delivery, clean_transaction)) OSSL_CMP_MSG_free(OSSL_CMP_SRV_process_request(srv_ctx, msg)); OSSL_CMP_CTX_free(client_ctx); OSSL_CMP_SRV_CTX_free(srv_ctx); OSSL_CMP_MSG_free(msg); } BIO_free(in); ERR_clear_error(); return 0; } void FuzzerCleanup(void) { FuzzerClearRand(); }
./openssl/fuzz/quic-client.c
/* * Copyright 2016-2022 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html * or in the file LICENSE in the source distribution. */ #include <openssl/ssl.h> #include <openssl/err.h> #include <openssl/bio.h> #include "fuzzer.h" #include "internal/sockets.h" #include "internal/time.h" #include "internal/quic_ssl.h" /* unused, to avoid warning. */ static int idx; static OSSL_TIME fake_now; static OSSL_TIME fake_now_cb(void *arg) { return fake_now; } int FuzzerInitialize(int *argc, char ***argv) { STACK_OF(SSL_COMP) *comp_methods; FuzzerSetRand(); OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS | OPENSSL_INIT_ASYNC, NULL); OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS, NULL); ERR_clear_error(); CRYPTO_free_ex_index(0, -1); idx = SSL_get_ex_data_X509_STORE_CTX_idx(); comp_methods = SSL_COMP_get_compression_methods(); if (comp_methods != NULL) sk_SSL_COMP_sort(comp_methods); return 1; } #define HANDSHAKING 0 #define READING 1 #define WRITING 2 #define ACCEPTING_STREAM 3 #define CREATING_STREAM 4 #define SWAPPING_STREAM 5 int FuzzerTestOneInput(const uint8_t *buf, size_t len) { SSL *client = NULL, *stream = NULL; SSL *allstreams[] = {NULL, NULL, NULL, NULL}; size_t i, thisstream = 0, numstreams = 1; BIO *in; BIO *out; SSL_CTX *ctx; BIO_ADDR *peer_addr = NULL; struct in_addr ina = {0}; struct timeval tv; int state = HANDSHAKING; uint8_t tmp[1024]; int writelen = 0; if (len == 0) return 0; /* This only fuzzes the initial flow from the client so far. */ ctx = SSL_CTX_new(OSSL_QUIC_client_method()); if (ctx == NULL) goto end; client = SSL_new(ctx); if (client == NULL) goto end; fake_now = ossl_ms2time(1); if (!ossl_quic_conn_set_override_now_cb(client, fake_now_cb, NULL)) goto end; peer_addr = BIO_ADDR_new(); if (peer_addr == NULL) goto end; ina.s_addr = htonl(0x7f000001UL); if (!BIO_ADDR_rawmake(peer_addr, AF_INET, &ina, sizeof(ina), htons(4433))) goto end; SSL_set_tlsext_host_name(client, "localhost"); in = BIO_new(BIO_s_dgram_mem()); if (in == NULL) goto end; out = BIO_new(BIO_s_dgram_mem()); if (out == NULL) { BIO_free(in); goto end; } if (!BIO_dgram_set_caps(out, BIO_DGRAM_CAP_HANDLES_DST_ADDR)) { BIO_free(in); BIO_free(out); goto end; } SSL_set_bio(client, in, out); if (SSL_set_alpn_protos(client, (const unsigned char *)"\x08ossltest", 9) != 0) goto end; if (SSL_set1_initial_peer_addr(client, peer_addr) != 1) goto end; SSL_set_connect_state(client); if (!SSL_set_incoming_stream_policy(client, SSL_INCOMING_STREAM_POLICY_ACCEPT, 0)) goto end; allstreams[0] = stream = client; for (;;) { size_t size; uint64_t nxtpktms = 0; OSSL_TIME nxtpkt = ossl_time_zero(), nxttimeout; int isinf, ret = 0; if (len >= 2) { if (len >= 5 && buf[0] == 0xff && buf[1] == 0xff) { switch (buf[2]) { case 0x00: if (state == READING) state = ACCEPTING_STREAM; break; case 0x01: if (state == READING) state = CREATING_STREAM; break; case 0x02: if (state == READING) state = SWAPPING_STREAM; break; default: /*ignore*/ break; } len -= 3; buf += 3; } nxtpktms = buf[0] + (buf[1] << 8); nxtpkt = ossl_time_add(fake_now, ossl_ms2time(nxtpktms)); len -= 2; buf += 2; } for (;;) { switch (state) { case HANDSHAKING: ret = SSL_do_handshake(stream); if (ret == 1) state = READING; break; case READING: ret = SSL_read(stream, tmp, sizeof(tmp)); if (ret > 0) { state = WRITING; writelen = ret; assert(writelen <= (int)sizeof(tmp)); } break; case WRITING: ret = SSL_write(stream, tmp, writelen); if (ret > 0) state = READING; break; case ACCEPTING_STREAM: state = READING; ret = 1; if (numstreams == OSSL_NELEM(allstreams) || SSL_get_accept_stream_queue_len(client) == 0) break; thisstream = numstreams; stream = allstreams[numstreams++] = SSL_accept_stream(client, 0); if (stream == NULL) goto end; break; case CREATING_STREAM: state = READING; ret = 1; if (numstreams == OSSL_NELEM(allstreams)) break; stream = SSL_new_stream(client, 0); if (stream == NULL) { /* Ignore, and go back to the previous stream */ stream = allstreams[thisstream]; break; } thisstream = numstreams; allstreams[numstreams++] = stream; break; case SWAPPING_STREAM: state = READING; ret = 1; if (numstreams == 1) break; if (++thisstream == numstreams) thisstream = 0; stream = allstreams[thisstream]; break; } assert(stream != NULL); assert(thisstream < numstreams); if (ret <= 0) { switch (SSL_get_error(stream, ret)) { case SSL_ERROR_WANT_READ: case SSL_ERROR_WANT_WRITE: break; default: goto end; } } if (!SSL_get_event_timeout(client, &tv, &isinf)) goto end; if (isinf) { fake_now = nxtpkt; break; } else { nxttimeout = ossl_time_add(fake_now, ossl_time_from_timeval(tv)); if (len > 3 && ossl_time_compare(nxttimeout, nxtpkt) >= 0) { fake_now = nxtpkt; break; } fake_now = nxttimeout; } } if (len <= 3) break; size = buf[0] + (buf[1] << 8); if (size > len - 2) break; if (size > 0) BIO_write(in, buf+2, size); len -= size + 2; buf += size + 2; } end: for (i = 0; i < numstreams; i++) SSL_free(allstreams[i]); ERR_clear_error(); SSL_CTX_free(ctx); BIO_ADDR_free(peer_addr); return 0; } void FuzzerCleanup(void) { FuzzerClearRand(); }
./openssl/providers/nullprov.c
/* * Copyright 2020-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <string.h> #include <stdio.h> #include <openssl/core.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/params.h> #include "prov/implementations.h" #include "prov/providercommon.h" OSSL_provider_init_fn ossl_null_provider_init; /* Parameters we provide to the core */ static const OSSL_PARAM null_param_types[] = { OSSL_PARAM_DEFN(OSSL_PROV_PARAM_NAME, OSSL_PARAM_UTF8_PTR, NULL, 0), OSSL_PARAM_DEFN(OSSL_PROV_PARAM_VERSION, OSSL_PARAM_UTF8_PTR, NULL, 0), OSSL_PARAM_DEFN(OSSL_PROV_PARAM_BUILDINFO, OSSL_PARAM_UTF8_PTR, NULL, 0), OSSL_PARAM_DEFN(OSSL_PROV_PARAM_STATUS, OSSL_PARAM_INTEGER, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *null_gettable_params(const OSSL_PROVIDER *prov) { return null_param_types; } static int null_get_params(const OSSL_PROVIDER *provctx, OSSL_PARAM params[]) { OSSL_PARAM *p; p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_NAME); if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, "OpenSSL Null Provider")) return 0; p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_VERSION); if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, OPENSSL_VERSION_STR)) return 0; p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_BUILDINFO); if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, OPENSSL_FULL_VERSION_STR)) return 0; p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_STATUS); if (p != NULL && !OSSL_PARAM_set_int(p, ossl_prov_is_running())) return 0; return 1; } static const OSSL_ALGORITHM *null_query(OSSL_PROVIDER *prov, int operation_id, int *no_cache) { *no_cache = 0; return NULL; } /* Functions we provide to the core */ static const OSSL_DISPATCH null_dispatch_table[] = { { OSSL_FUNC_PROVIDER_GETTABLE_PARAMS, (void (*)(void))null_gettable_params }, { OSSL_FUNC_PROVIDER_GET_PARAMS, (void (*)(void))null_get_params }, { OSSL_FUNC_PROVIDER_QUERY_OPERATION, (void (*)(void))null_query }, OSSL_DISPATCH_END }; int ossl_null_provider_init(const OSSL_CORE_HANDLE *handle, const OSSL_DISPATCH *in, const OSSL_DISPATCH **out, void **provctx) { *out = null_dispatch_table; /* Could be anything - we don't use it */ *provctx = (void *)handle; return 1; }
./openssl/providers/legacyprov.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <string.h> #include <stdio.h> #include <openssl/core.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/err.h> #include <openssl/params.h> #include "prov/provider_ctx.h" #include "prov/implementations.h" #include "prov/names.h" #include "prov/providercommon.h" /* * Forward declarations to ensure that interface functions are correctly * defined. */ static OSSL_FUNC_provider_gettable_params_fn legacy_gettable_params; static OSSL_FUNC_provider_get_params_fn legacy_get_params; static OSSL_FUNC_provider_query_operation_fn legacy_query; #define ALG(NAMES, FUNC) { NAMES, "provider=legacy", FUNC } #ifdef STATIC_LEGACY OSSL_provider_init_fn ossl_legacy_provider_init; # define OSSL_provider_init ossl_legacy_provider_init #endif #ifndef STATIC_LEGACY /* * Should these function pointers be stored in the provider side provctx? * Could they ever be different from one init to the next? We assume not for * now. */ /* Functions provided by the core */ static OSSL_FUNC_core_new_error_fn *c_new_error; static OSSL_FUNC_core_set_error_debug_fn *c_set_error_debug; static OSSL_FUNC_core_vset_error_fn *c_vset_error; static OSSL_FUNC_core_set_error_mark_fn *c_set_error_mark; static OSSL_FUNC_core_clear_last_error_mark_fn *c_clear_last_error_mark; static OSSL_FUNC_core_pop_error_to_mark_fn *c_pop_error_to_mark; #endif /* Parameters we provide to the core */ static const OSSL_PARAM legacy_param_types[] = { OSSL_PARAM_DEFN(OSSL_PROV_PARAM_NAME, OSSL_PARAM_UTF8_PTR, NULL, 0), OSSL_PARAM_DEFN(OSSL_PROV_PARAM_VERSION, OSSL_PARAM_UTF8_PTR, NULL, 0), OSSL_PARAM_DEFN(OSSL_PROV_PARAM_BUILDINFO, OSSL_PARAM_UTF8_PTR, NULL, 0), OSSL_PARAM_DEFN(OSSL_PROV_PARAM_STATUS, OSSL_PARAM_INTEGER, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *legacy_gettable_params(void *provctx) { return legacy_param_types; } static int legacy_get_params(void *provctx, OSSL_PARAM params[]) { OSSL_PARAM *p; p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_NAME); if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, "OpenSSL Legacy Provider")) return 0; p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_VERSION); if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, OPENSSL_VERSION_STR)) return 0; p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_BUILDINFO); if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, OPENSSL_FULL_VERSION_STR)) return 0; p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_STATUS); if (p != NULL && !OSSL_PARAM_set_int(p, ossl_prov_is_running())) return 0; return 1; } static const OSSL_ALGORITHM legacy_digests[] = { #ifndef OPENSSL_NO_MD2 ALG(PROV_NAMES_MD2, ossl_md2_functions), #endif #ifndef OPENSSL_NO_MD4 ALG(PROV_NAMES_MD4, ossl_md4_functions), #endif #ifndef OPENSSL_NO_MDC2 ALG(PROV_NAMES_MDC2, ossl_mdc2_functions), #endif /* OPENSSL_NO_MDC2 */ #ifndef OPENSSL_NO_WHIRLPOOL ALG(PROV_NAMES_WHIRLPOOL, ossl_wp_functions), #endif /* OPENSSL_NO_WHIRLPOOL */ #ifndef OPENSSL_NO_RMD160 ALG(PROV_NAMES_RIPEMD_160, ossl_ripemd160_functions), #endif /* OPENSSL_NO_RMD160 */ { NULL, NULL, NULL } }; static const OSSL_ALGORITHM legacy_ciphers[] = { #ifndef OPENSSL_NO_CAST ALG(PROV_NAMES_CAST5_ECB, ossl_cast5128ecb_functions), ALG(PROV_NAMES_CAST5_CBC, ossl_cast5128cbc_functions), ALG(PROV_NAMES_CAST5_OFB, ossl_cast5128ofb64_functions), ALG(PROV_NAMES_CAST5_CFB, ossl_cast5128cfb64_functions), #endif /* OPENSSL_NO_CAST */ #ifndef OPENSSL_NO_BF ALG(PROV_NAMES_BF_ECB, ossl_blowfish128ecb_functions), ALG(PROV_NAMES_BF_CBC, ossl_blowfish128cbc_functions), ALG(PROV_NAMES_BF_OFB, ossl_blowfish128ofb64_functions), ALG(PROV_NAMES_BF_CFB, ossl_blowfish128cfb64_functions), #endif /* OPENSSL_NO_BF */ #ifndef OPENSSL_NO_IDEA ALG(PROV_NAMES_IDEA_ECB, ossl_idea128ecb_functions), ALG(PROV_NAMES_IDEA_CBC, ossl_idea128cbc_functions), ALG(PROV_NAMES_IDEA_OFB, ossl_idea128ofb64_functions), ALG(PROV_NAMES_IDEA_CFB, ossl_idea128cfb64_functions), #endif /* OPENSSL_NO_IDEA */ #ifndef OPENSSL_NO_SEED ALG(PROV_NAMES_SEED_ECB, ossl_seed128ecb_functions), ALG(PROV_NAMES_SEED_CBC, ossl_seed128cbc_functions), ALG(PROV_NAMES_SEED_OFB, ossl_seed128ofb128_functions), ALG(PROV_NAMES_SEED_CFB, ossl_seed128cfb128_functions), #endif /* OPENSSL_NO_SEED */ #ifndef OPENSSL_NO_RC2 ALG(PROV_NAMES_RC2_ECB, ossl_rc2128ecb_functions), ALG(PROV_NAMES_RC2_CBC, ossl_rc2128cbc_functions), ALG(PROV_NAMES_RC2_40_CBC, ossl_rc240cbc_functions), ALG(PROV_NAMES_RC2_64_CBC, ossl_rc264cbc_functions), ALG(PROV_NAMES_RC2_CFB, ossl_rc2128cfb128_functions), ALG(PROV_NAMES_RC2_OFB, ossl_rc2128ofb128_functions), #endif /* OPENSSL_NO_RC2 */ #ifndef OPENSSL_NO_RC4 ALG(PROV_NAMES_RC4, ossl_rc4128_functions), ALG(PROV_NAMES_RC4_40, ossl_rc440_functions), # ifndef OPENSSL_NO_MD5 ALG(PROV_NAMES_RC4_HMAC_MD5, ossl_rc4_hmac_ossl_md5_functions), # endif /* OPENSSL_NO_MD5 */ #endif /* OPENSSL_NO_RC4 */ #ifndef OPENSSL_NO_RC5 ALG(PROV_NAMES_RC5_ECB, ossl_rc5128ecb_functions), ALG(PROV_NAMES_RC5_CBC, ossl_rc5128cbc_functions), ALG(PROV_NAMES_RC5_OFB, ossl_rc5128ofb64_functions), ALG(PROV_NAMES_RC5_CFB, ossl_rc5128cfb64_functions), #endif /* OPENSSL_NO_RC5 */ #ifndef OPENSSL_NO_DES ALG(PROV_NAMES_DESX_CBC, ossl_tdes_desx_cbc_functions), ALG(PROV_NAMES_DES_ECB, ossl_des_ecb_functions), ALG(PROV_NAMES_DES_CBC, ossl_des_cbc_functions), ALG(PROV_NAMES_DES_OFB, ossl_des_ofb64_functions), ALG(PROV_NAMES_DES_CFB, ossl_des_cfb64_functions), ALG(PROV_NAMES_DES_CFB1, ossl_des_cfb1_functions), ALG(PROV_NAMES_DES_CFB8, ossl_des_cfb8_functions), #endif /* OPENSSL_NO_DES */ { NULL, NULL, NULL } }; static const OSSL_ALGORITHM legacy_kdfs[] = { ALG(PROV_NAMES_PBKDF1, ossl_kdf_pbkdf1_functions), ALG(PROV_NAMES_PVKKDF, ossl_kdf_pvk_functions), { NULL, NULL, NULL } }; static const OSSL_ALGORITHM *legacy_query(void *provctx, int operation_id, int *no_cache) { *no_cache = 0; switch (operation_id) { case OSSL_OP_DIGEST: return legacy_digests; case OSSL_OP_CIPHER: return legacy_ciphers; case OSSL_OP_KDF: return legacy_kdfs; } return NULL; } static void legacy_teardown(void *provctx) { OSSL_LIB_CTX_free(PROV_LIBCTX_OF(provctx)); ossl_prov_ctx_free(provctx); } /* Functions we provide to the core */ static const OSSL_DISPATCH legacy_dispatch_table[] = { { OSSL_FUNC_PROVIDER_TEARDOWN, (void (*)(void))legacy_teardown }, { OSSL_FUNC_PROVIDER_GETTABLE_PARAMS, (void (*)(void))legacy_gettable_params }, { OSSL_FUNC_PROVIDER_GET_PARAMS, (void (*)(void))legacy_get_params }, { OSSL_FUNC_PROVIDER_QUERY_OPERATION, (void (*)(void))legacy_query }, OSSL_DISPATCH_END }; int OSSL_provider_init(const OSSL_CORE_HANDLE *handle, const OSSL_DISPATCH *in, const OSSL_DISPATCH **out, void **provctx) { OSSL_LIB_CTX *libctx = NULL; #ifndef STATIC_LEGACY const OSSL_DISPATCH *tmp; #endif #ifndef STATIC_LEGACY for (tmp = in; tmp->function_id != 0; tmp++) { /* * We do not support the scenario of an application linked against * multiple versions of libcrypto (e.g. one static and one dynamic), * but sharing a single legacy.so. We do a simple sanity check here. */ #define set_func(c, f) if (c == NULL) c = f; else if (c != f) return 0; switch (tmp->function_id) { case OSSL_FUNC_CORE_NEW_ERROR: set_func(c_new_error, OSSL_FUNC_core_new_error(tmp)); break; case OSSL_FUNC_CORE_SET_ERROR_DEBUG: set_func(c_set_error_debug, OSSL_FUNC_core_set_error_debug(tmp)); break; case OSSL_FUNC_CORE_VSET_ERROR: set_func(c_vset_error, OSSL_FUNC_core_vset_error(tmp)); break; case OSSL_FUNC_CORE_SET_ERROR_MARK: set_func(c_set_error_mark, OSSL_FUNC_core_set_error_mark(tmp)); break; case OSSL_FUNC_CORE_CLEAR_LAST_ERROR_MARK: set_func(c_clear_last_error_mark, OSSL_FUNC_core_clear_last_error_mark(tmp)); break; case OSSL_FUNC_CORE_POP_ERROR_TO_MARK: set_func(c_pop_error_to_mark, OSSL_FUNC_core_pop_error_to_mark(tmp)); break; } } #endif if ((*provctx = ossl_prov_ctx_new()) == NULL || (libctx = OSSL_LIB_CTX_new_child(handle, in)) == NULL) { OSSL_LIB_CTX_free(libctx); legacy_teardown(*provctx); *provctx = NULL; return 0; } ossl_prov_ctx_set0_libctx(*provctx, libctx); ossl_prov_ctx_set0_handle(*provctx, handle); *out = legacy_dispatch_table; return 1; } #ifndef STATIC_LEGACY /* * Provider specific implementation of libcrypto functions in terms of * upcalls. */ /* * For ERR functions, we pass a NULL context. This is valid to do as long * as only error codes that the calling libcrypto supports are used. */ void ERR_new(void) { c_new_error(NULL); } void ERR_set_debug(const char *file, int line, const char *func) { c_set_error_debug(NULL, file, line, func); } void ERR_set_error(int lib, int reason, const char *fmt, ...) { va_list args; va_start(args, fmt); c_vset_error(NULL, ERR_PACK(lib, 0, reason), fmt, args); va_end(args); } void ERR_vset_error(int lib, int reason, const char *fmt, va_list args) { c_vset_error(NULL, ERR_PACK(lib, 0, reason), fmt, args); } int ERR_set_mark(void) { return c_set_error_mark(NULL); } int ERR_clear_last_mark(void) { return c_clear_last_error_mark(NULL); } int ERR_pop_to_mark(void) { return c_pop_error_to_mark(NULL); } #endif
./openssl/providers/defltprov.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <string.h> #include <stdio.h> #include <openssl/opensslconf.h> #include <openssl/core.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/params.h> #include "prov/bio.h" #include "prov/provider_ctx.h" #include "prov/providercommon.h" #include "prov/implementations.h" #include "prov/names.h" #include "prov/provider_util.h" #include "prov/seeding.h" #include "internal/nelem.h" /* * Forward declarations to ensure that interface functions are correctly * defined. */ static OSSL_FUNC_provider_gettable_params_fn deflt_gettable_params; static OSSL_FUNC_provider_get_params_fn deflt_get_params; static OSSL_FUNC_provider_query_operation_fn deflt_query; #define ALGC(NAMES, FUNC, CHECK) { { NAMES, "provider=default", FUNC }, CHECK } #define ALG(NAMES, FUNC) ALGC(NAMES, FUNC, NULL) /* Functions provided by the core */ static OSSL_FUNC_core_gettable_params_fn *c_gettable_params = NULL; static OSSL_FUNC_core_get_params_fn *c_get_params = NULL; /* Parameters we provide to the core */ static const OSSL_PARAM deflt_param_types[] = { OSSL_PARAM_DEFN(OSSL_PROV_PARAM_NAME, OSSL_PARAM_UTF8_PTR, NULL, 0), OSSL_PARAM_DEFN(OSSL_PROV_PARAM_VERSION, OSSL_PARAM_UTF8_PTR, NULL, 0), OSSL_PARAM_DEFN(OSSL_PROV_PARAM_BUILDINFO, OSSL_PARAM_UTF8_PTR, NULL, 0), OSSL_PARAM_DEFN(OSSL_PROV_PARAM_STATUS, OSSL_PARAM_INTEGER, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *deflt_gettable_params(void *provctx) { return deflt_param_types; } static int deflt_get_params(void *provctx, OSSL_PARAM params[]) { OSSL_PARAM *p; p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_NAME); if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, "OpenSSL Default Provider")) return 0; p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_VERSION); if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, OPENSSL_VERSION_STR)) return 0; p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_BUILDINFO); if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, OPENSSL_FULL_VERSION_STR)) return 0; p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_STATUS); if (p != NULL && !OSSL_PARAM_set_int(p, ossl_prov_is_running())) return 0; return 1; } /* * For the algorithm names, we use the following formula for our primary * names: * * ALGNAME[VERSION?][-SUBNAME[VERSION?]?][-SIZE?][-MODE?] * * VERSION is only present if there are multiple versions of * an alg (MD2, MD4, MD5). It may be omitted if there is only * one version (if a subsequent version is released in the future, * we can always change the canonical name, and add the old name * as an alias). * * SUBNAME may be present where we are combining multiple * algorithms together, e.g. MD5-SHA1. * * SIZE is only present if multiple versions of an algorithm exist * with different sizes (e.g. AES-128-CBC, AES-256-CBC) * * MODE is only present where applicable. * * We add diverse other names where applicable, such as the names that * NIST uses, or that are used for ASN.1 OBJECT IDENTIFIERs, or names * we have used historically. * * Algorithm names are case insensitive, but we use all caps in our "canonical" * names for consistency. */ static const OSSL_ALGORITHM deflt_digests[] = { /* Our primary name:NIST name[:our older names] */ { PROV_NAMES_SHA1, "provider=default", ossl_sha1_functions }, { PROV_NAMES_SHA2_224, "provider=default", ossl_sha224_functions }, { PROV_NAMES_SHA2_256, "provider=default", ossl_sha256_functions }, { PROV_NAMES_SHA2_256_192, "provider=default", ossl_sha256_192_functions }, { PROV_NAMES_SHA2_384, "provider=default", ossl_sha384_functions }, { PROV_NAMES_SHA2_512, "provider=default", ossl_sha512_functions }, { PROV_NAMES_SHA2_512_224, "provider=default", ossl_sha512_224_functions }, { PROV_NAMES_SHA2_512_256, "provider=default", ossl_sha512_256_functions }, /* We agree with NIST here, so one name only */ { PROV_NAMES_SHA3_224, "provider=default", ossl_sha3_224_functions }, { PROV_NAMES_SHA3_256, "provider=default", ossl_sha3_256_functions }, { PROV_NAMES_SHA3_384, "provider=default", ossl_sha3_384_functions }, { PROV_NAMES_SHA3_512, "provider=default", ossl_sha3_512_functions }, { PROV_NAMES_KECCAK_224, "provider=default", ossl_keccak_224_functions }, { PROV_NAMES_KECCAK_256, "provider=default", ossl_keccak_256_functions }, { PROV_NAMES_KECCAK_384, "provider=default", ossl_keccak_384_functions }, { PROV_NAMES_KECCAK_512, "provider=default", ossl_keccak_512_functions }, /* * KECCAK-KMAC-128 and KECCAK-KMAC-256 as hashes are mostly useful for * the KMAC-128 and KMAC-256. */ { PROV_NAMES_KECCAK_KMAC_128, "provider=default", ossl_keccak_kmac_128_functions }, { PROV_NAMES_KECCAK_KMAC_256, "provider=default", ossl_keccak_kmac_256_functions }, /* Our primary name:NIST name */ { PROV_NAMES_SHAKE_128, "provider=default", ossl_shake_128_functions }, { PROV_NAMES_SHAKE_256, "provider=default", ossl_shake_256_functions }, #ifndef OPENSSL_NO_BLAKE2 /* * https://blake2.net/ doesn't specify size variants, * but mentions that Bouncy Castle uses the names * BLAKE2b-160, BLAKE2b-256, BLAKE2b-384, and BLAKE2b-512 * If we assume that "2b" and "2s" are versions, that pattern * fits with ours. We also add our historical names. */ { PROV_NAMES_BLAKE2S_256, "provider=default", ossl_blake2s256_functions }, { PROV_NAMES_BLAKE2B_512, "provider=default", ossl_blake2b512_functions }, #endif /* OPENSSL_NO_BLAKE2 */ #ifndef OPENSSL_NO_SM3 { PROV_NAMES_SM3, "provider=default", ossl_sm3_functions }, #endif /* OPENSSL_NO_SM3 */ #ifndef OPENSSL_NO_MD5 { PROV_NAMES_MD5, "provider=default", ossl_md5_functions }, { PROV_NAMES_MD5_SHA1, "provider=default", ossl_md5_sha1_functions }, #endif /* OPENSSL_NO_MD5 */ #ifndef OPENSSL_NO_RMD160 { PROV_NAMES_RIPEMD_160, "provider=default", ossl_ripemd160_functions }, #endif /* OPENSSL_NO_RMD160 */ { PROV_NAMES_NULL, "provider=default", ossl_nullmd_functions }, { NULL, NULL, NULL } }; static const OSSL_ALGORITHM_CAPABLE deflt_ciphers[] = { ALG(PROV_NAMES_NULL, ossl_null_functions), ALG(PROV_NAMES_AES_256_ECB, ossl_aes256ecb_functions), ALG(PROV_NAMES_AES_192_ECB, ossl_aes192ecb_functions), ALG(PROV_NAMES_AES_128_ECB, ossl_aes128ecb_functions), ALG(PROV_NAMES_AES_256_CBC, ossl_aes256cbc_functions), ALG(PROV_NAMES_AES_192_CBC, ossl_aes192cbc_functions), ALG(PROV_NAMES_AES_128_CBC, ossl_aes128cbc_functions), ALG(PROV_NAMES_AES_128_CBC_CTS, ossl_aes128cbc_cts_functions), ALG(PROV_NAMES_AES_192_CBC_CTS, ossl_aes192cbc_cts_functions), ALG(PROV_NAMES_AES_256_CBC_CTS, ossl_aes256cbc_cts_functions), ALG(PROV_NAMES_AES_256_OFB, ossl_aes256ofb_functions), ALG(PROV_NAMES_AES_192_OFB, ossl_aes192ofb_functions), ALG(PROV_NAMES_AES_128_OFB, ossl_aes128ofb_functions), ALG(PROV_NAMES_AES_256_CFB, ossl_aes256cfb_functions), ALG(PROV_NAMES_AES_192_CFB, ossl_aes192cfb_functions), ALG(PROV_NAMES_AES_128_CFB, ossl_aes128cfb_functions), ALG(PROV_NAMES_AES_256_CFB1, ossl_aes256cfb1_functions), ALG(PROV_NAMES_AES_192_CFB1, ossl_aes192cfb1_functions), ALG(PROV_NAMES_AES_128_CFB1, ossl_aes128cfb1_functions), ALG(PROV_NAMES_AES_256_CFB8, ossl_aes256cfb8_functions), ALG(PROV_NAMES_AES_192_CFB8, ossl_aes192cfb8_functions), ALG(PROV_NAMES_AES_128_CFB8, ossl_aes128cfb8_functions), ALG(PROV_NAMES_AES_256_CTR, ossl_aes256ctr_functions), ALG(PROV_NAMES_AES_192_CTR, ossl_aes192ctr_functions), ALG(PROV_NAMES_AES_128_CTR, ossl_aes128ctr_functions), ALG(PROV_NAMES_AES_256_XTS, ossl_aes256xts_functions), ALG(PROV_NAMES_AES_128_XTS, ossl_aes128xts_functions), #ifndef OPENSSL_NO_OCB ALG(PROV_NAMES_AES_256_OCB, ossl_aes256ocb_functions), ALG(PROV_NAMES_AES_192_OCB, ossl_aes192ocb_functions), ALG(PROV_NAMES_AES_128_OCB, ossl_aes128ocb_functions), #endif /* OPENSSL_NO_OCB */ #ifndef OPENSSL_NO_SIV ALG(PROV_NAMES_AES_128_SIV, ossl_aes128siv_functions), ALG(PROV_NAMES_AES_192_SIV, ossl_aes192siv_functions), ALG(PROV_NAMES_AES_256_SIV, ossl_aes256siv_functions), ALG(PROV_NAMES_AES_128_GCM_SIV, ossl_aes128gcm_siv_functions), ALG(PROV_NAMES_AES_192_GCM_SIV, ossl_aes192gcm_siv_functions), ALG(PROV_NAMES_AES_256_GCM_SIV, ossl_aes256gcm_siv_functions), #endif /* OPENSSL_NO_SIV */ ALG(PROV_NAMES_AES_256_GCM, ossl_aes256gcm_functions), ALG(PROV_NAMES_AES_192_GCM, ossl_aes192gcm_functions), ALG(PROV_NAMES_AES_128_GCM, ossl_aes128gcm_functions), ALG(PROV_NAMES_AES_256_CCM, ossl_aes256ccm_functions), ALG(PROV_NAMES_AES_192_CCM, ossl_aes192ccm_functions), ALG(PROV_NAMES_AES_128_CCM, ossl_aes128ccm_functions), ALG(PROV_NAMES_AES_256_WRAP, ossl_aes256wrap_functions), ALG(PROV_NAMES_AES_192_WRAP, ossl_aes192wrap_functions), ALG(PROV_NAMES_AES_128_WRAP, ossl_aes128wrap_functions), ALG(PROV_NAMES_AES_256_WRAP_PAD, ossl_aes256wrappad_functions), ALG(PROV_NAMES_AES_192_WRAP_PAD, ossl_aes192wrappad_functions), ALG(PROV_NAMES_AES_128_WRAP_PAD, ossl_aes128wrappad_functions), ALG(PROV_NAMES_AES_256_WRAP_INV, ossl_aes256wrapinv_functions), ALG(PROV_NAMES_AES_192_WRAP_INV, ossl_aes192wrapinv_functions), ALG(PROV_NAMES_AES_128_WRAP_INV, ossl_aes128wrapinv_functions), ALG(PROV_NAMES_AES_256_WRAP_PAD_INV, ossl_aes256wrappadinv_functions), ALG(PROV_NAMES_AES_192_WRAP_PAD_INV, ossl_aes192wrappadinv_functions), ALG(PROV_NAMES_AES_128_WRAP_PAD_INV, ossl_aes128wrappadinv_functions), ALGC(PROV_NAMES_AES_128_CBC_HMAC_SHA1, ossl_aes128cbc_hmac_sha1_functions, ossl_cipher_capable_aes_cbc_hmac_sha1), ALGC(PROV_NAMES_AES_256_CBC_HMAC_SHA1, ossl_aes256cbc_hmac_sha1_functions, ossl_cipher_capable_aes_cbc_hmac_sha1), ALGC(PROV_NAMES_AES_128_CBC_HMAC_SHA256, ossl_aes128cbc_hmac_sha256_functions, ossl_cipher_capable_aes_cbc_hmac_sha256), ALGC(PROV_NAMES_AES_256_CBC_HMAC_SHA256, ossl_aes256cbc_hmac_sha256_functions, ossl_cipher_capable_aes_cbc_hmac_sha256), #ifndef OPENSSL_NO_ARIA ALG(PROV_NAMES_ARIA_256_GCM, ossl_aria256gcm_functions), ALG(PROV_NAMES_ARIA_192_GCM, ossl_aria192gcm_functions), ALG(PROV_NAMES_ARIA_128_GCM, ossl_aria128gcm_functions), ALG(PROV_NAMES_ARIA_256_CCM, ossl_aria256ccm_functions), ALG(PROV_NAMES_ARIA_192_CCM, ossl_aria192ccm_functions), ALG(PROV_NAMES_ARIA_128_CCM, ossl_aria128ccm_functions), ALG(PROV_NAMES_ARIA_256_ECB, ossl_aria256ecb_functions), ALG(PROV_NAMES_ARIA_192_ECB, ossl_aria192ecb_functions), ALG(PROV_NAMES_ARIA_128_ECB, ossl_aria128ecb_functions), ALG(PROV_NAMES_ARIA_256_CBC, ossl_aria256cbc_functions), ALG(PROV_NAMES_ARIA_192_CBC, ossl_aria192cbc_functions), ALG(PROV_NAMES_ARIA_128_CBC, ossl_aria128cbc_functions), ALG(PROV_NAMES_ARIA_256_OFB, ossl_aria256ofb_functions), ALG(PROV_NAMES_ARIA_192_OFB, ossl_aria192ofb_functions), ALG(PROV_NAMES_ARIA_128_OFB, ossl_aria128ofb_functions), ALG(PROV_NAMES_ARIA_256_CFB, ossl_aria256cfb_functions), ALG(PROV_NAMES_ARIA_192_CFB, ossl_aria192cfb_functions), ALG(PROV_NAMES_ARIA_128_CFB, ossl_aria128cfb_functions), ALG(PROV_NAMES_ARIA_256_CFB1, ossl_aria256cfb1_functions), ALG(PROV_NAMES_ARIA_192_CFB1, ossl_aria192cfb1_functions), ALG(PROV_NAMES_ARIA_128_CFB1, ossl_aria128cfb1_functions), ALG(PROV_NAMES_ARIA_256_CFB8, ossl_aria256cfb8_functions), ALG(PROV_NAMES_ARIA_192_CFB8, ossl_aria192cfb8_functions), ALG(PROV_NAMES_ARIA_128_CFB8, ossl_aria128cfb8_functions), ALG(PROV_NAMES_ARIA_256_CTR, ossl_aria256ctr_functions), ALG(PROV_NAMES_ARIA_192_CTR, ossl_aria192ctr_functions), ALG(PROV_NAMES_ARIA_128_CTR, ossl_aria128ctr_functions), #endif /* OPENSSL_NO_ARIA */ #ifndef OPENSSL_NO_CAMELLIA ALG(PROV_NAMES_CAMELLIA_256_ECB, ossl_camellia256ecb_functions), ALG(PROV_NAMES_CAMELLIA_192_ECB, ossl_camellia192ecb_functions), ALG(PROV_NAMES_CAMELLIA_128_ECB, ossl_camellia128ecb_functions), ALG(PROV_NAMES_CAMELLIA_256_CBC, ossl_camellia256cbc_functions), ALG(PROV_NAMES_CAMELLIA_192_CBC, ossl_camellia192cbc_functions), ALG(PROV_NAMES_CAMELLIA_128_CBC, ossl_camellia128cbc_functions), ALG(PROV_NAMES_CAMELLIA_128_CBC_CTS, ossl_camellia128cbc_cts_functions), ALG(PROV_NAMES_CAMELLIA_192_CBC_CTS, ossl_camellia192cbc_cts_functions), ALG(PROV_NAMES_CAMELLIA_256_CBC_CTS, ossl_camellia256cbc_cts_functions), ALG(PROV_NAMES_CAMELLIA_256_OFB, ossl_camellia256ofb_functions), ALG(PROV_NAMES_CAMELLIA_192_OFB, ossl_camellia192ofb_functions), ALG(PROV_NAMES_CAMELLIA_128_OFB, ossl_camellia128ofb_functions), ALG(PROV_NAMES_CAMELLIA_256_CFB, ossl_camellia256cfb_functions), ALG(PROV_NAMES_CAMELLIA_192_CFB, ossl_camellia192cfb_functions), ALG(PROV_NAMES_CAMELLIA_128_CFB, ossl_camellia128cfb_functions), ALG(PROV_NAMES_CAMELLIA_256_CFB1, ossl_camellia256cfb1_functions), ALG(PROV_NAMES_CAMELLIA_192_CFB1, ossl_camellia192cfb1_functions), ALG(PROV_NAMES_CAMELLIA_128_CFB1, ossl_camellia128cfb1_functions), ALG(PROV_NAMES_CAMELLIA_256_CFB8, ossl_camellia256cfb8_functions), ALG(PROV_NAMES_CAMELLIA_192_CFB8, ossl_camellia192cfb8_functions), ALG(PROV_NAMES_CAMELLIA_128_CFB8, ossl_camellia128cfb8_functions), ALG(PROV_NAMES_CAMELLIA_256_CTR, ossl_camellia256ctr_functions), ALG(PROV_NAMES_CAMELLIA_192_CTR, ossl_camellia192ctr_functions), ALG(PROV_NAMES_CAMELLIA_128_CTR, ossl_camellia128ctr_functions), #endif /* OPENSSL_NO_CAMELLIA */ #ifndef OPENSSL_NO_DES ALG(PROV_NAMES_DES_EDE3_ECB, ossl_tdes_ede3_ecb_functions), ALG(PROV_NAMES_DES_EDE3_CBC, ossl_tdes_ede3_cbc_functions), ALG(PROV_NAMES_DES_EDE3_OFB, ossl_tdes_ede3_ofb_functions), ALG(PROV_NAMES_DES_EDE3_CFB, ossl_tdes_ede3_cfb_functions), ALG(PROV_NAMES_DES_EDE3_CFB8, ossl_tdes_ede3_cfb8_functions), ALG(PROV_NAMES_DES_EDE3_CFB1, ossl_tdes_ede3_cfb1_functions), ALG(PROV_NAMES_DES3_WRAP, ossl_tdes_wrap_cbc_functions), ALG(PROV_NAMES_DES_EDE_ECB, ossl_tdes_ede2_ecb_functions), ALG(PROV_NAMES_DES_EDE_CBC, ossl_tdes_ede2_cbc_functions), ALG(PROV_NAMES_DES_EDE_OFB, ossl_tdes_ede2_ofb_functions), ALG(PROV_NAMES_DES_EDE_CFB, ossl_tdes_ede2_cfb_functions), #endif /* OPENSSL_NO_DES */ #ifndef OPENSSL_NO_SM4 ALG(PROV_NAMES_SM4_GCM, ossl_sm4128gcm_functions), ALG(PROV_NAMES_SM4_CCM, ossl_sm4128ccm_functions), ALG(PROV_NAMES_SM4_ECB, ossl_sm4128ecb_functions), ALG(PROV_NAMES_SM4_CBC, ossl_sm4128cbc_functions), ALG(PROV_NAMES_SM4_CTR, ossl_sm4128ctr_functions), ALG(PROV_NAMES_SM4_OFB, ossl_sm4128ofb128_functions), ALG(PROV_NAMES_SM4_CFB, ossl_sm4128cfb128_functions), ALG(PROV_NAMES_SM4_XTS, ossl_sm4128xts_functions), #endif /* OPENSSL_NO_SM4 */ #ifndef OPENSSL_NO_CHACHA ALG(PROV_NAMES_ChaCha20, ossl_chacha20_functions), # ifndef OPENSSL_NO_POLY1305 ALG(PROV_NAMES_ChaCha20_Poly1305, ossl_chacha20_ossl_poly1305_functions), # endif /* OPENSSL_NO_POLY1305 */ #endif /* OPENSSL_NO_CHACHA */ { { NULL, NULL, NULL }, NULL } }; static OSSL_ALGORITHM exported_ciphers[OSSL_NELEM(deflt_ciphers)]; static const OSSL_ALGORITHM deflt_macs[] = { #ifndef OPENSSL_NO_BLAKE2 { PROV_NAMES_BLAKE2BMAC, "provider=default", ossl_blake2bmac_functions }, { PROV_NAMES_BLAKE2SMAC, "provider=default", ossl_blake2smac_functions }, #endif #ifndef OPENSSL_NO_CMAC { PROV_NAMES_CMAC, "provider=default", ossl_cmac_functions }, #endif { PROV_NAMES_GMAC, "provider=default", ossl_gmac_functions }, { PROV_NAMES_HMAC, "provider=default", ossl_hmac_functions }, { PROV_NAMES_KMAC_128, "provider=default", ossl_kmac128_functions }, { PROV_NAMES_KMAC_256, "provider=default", ossl_kmac256_functions }, #ifndef OPENSSL_NO_SIPHASH { PROV_NAMES_SIPHASH, "provider=default", ossl_siphash_functions }, #endif #ifndef OPENSSL_NO_POLY1305 { PROV_NAMES_POLY1305, "provider=default", ossl_poly1305_functions }, #endif { NULL, NULL, NULL } }; static const OSSL_ALGORITHM deflt_kdfs[] = { { PROV_NAMES_HKDF, "provider=default", ossl_kdf_hkdf_functions }, { PROV_NAMES_TLS1_3_KDF, "provider=default", ossl_kdf_tls1_3_kdf_functions }, { PROV_NAMES_SSKDF, "provider=default", ossl_kdf_sskdf_functions }, { PROV_NAMES_PBKDF2, "provider=default", ossl_kdf_pbkdf2_functions }, { PROV_NAMES_PKCS12KDF, "provider=default", ossl_kdf_pkcs12_functions }, { PROV_NAMES_SSHKDF, "provider=default", ossl_kdf_sshkdf_functions }, { PROV_NAMES_X963KDF, "provider=default", ossl_kdf_x963_kdf_functions }, { PROV_NAMES_TLS1_PRF, "provider=default", ossl_kdf_tls1_prf_functions }, { PROV_NAMES_KBKDF, "provider=default", ossl_kdf_kbkdf_functions }, { PROV_NAMES_X942KDF_ASN1, "provider=default", ossl_kdf_x942_kdf_functions }, #ifndef OPENSSL_NO_SCRYPT { PROV_NAMES_SCRYPT, "provider=default", ossl_kdf_scrypt_functions }, #endif { PROV_NAMES_KRB5KDF, "provider=default", ossl_kdf_krb5kdf_functions }, { PROV_NAMES_HMAC_DRBG_KDF, "provider=default", ossl_kdf_hmac_drbg_functions }, #ifndef OPENSSL_NO_ARGON2 { PROV_NAMES_ARGON2I, "provider=default", ossl_kdf_argon2i_functions }, { PROV_NAMES_ARGON2D, "provider=default", ossl_kdf_argon2d_functions }, { PROV_NAMES_ARGON2ID, "provider=default", ossl_kdf_argon2id_functions }, #endif { NULL, NULL, NULL } }; static const OSSL_ALGORITHM deflt_keyexch[] = { #ifndef OPENSSL_NO_DH { PROV_NAMES_DH, "provider=default", ossl_dh_keyexch_functions }, #endif #ifndef OPENSSL_NO_EC { PROV_NAMES_ECDH, "provider=default", ossl_ecdh_keyexch_functions }, # ifndef OPENSSL_NO_ECX { PROV_NAMES_X25519, "provider=default", ossl_x25519_keyexch_functions }, { PROV_NAMES_X448, "provider=default", ossl_x448_keyexch_functions }, # endif #endif { PROV_NAMES_TLS1_PRF, "provider=default", ossl_kdf_tls1_prf_keyexch_functions }, { PROV_NAMES_HKDF, "provider=default", ossl_kdf_hkdf_keyexch_functions }, { PROV_NAMES_SCRYPT, "provider=default", ossl_kdf_scrypt_keyexch_functions }, { NULL, NULL, NULL } }; static const OSSL_ALGORITHM deflt_rands[] = { { PROV_NAMES_CTR_DRBG, "provider=default", ossl_drbg_ctr_functions }, { PROV_NAMES_HASH_DRBG, "provider=default", ossl_drbg_hash_functions }, { PROV_NAMES_HMAC_DRBG, "provider=default", ossl_drbg_ossl_hmac_functions }, { PROV_NAMES_SEED_SRC, "provider=default", ossl_seed_src_functions }, { PROV_NAMES_TEST_RAND, "provider=default", ossl_test_rng_functions }, { NULL, NULL, NULL } }; static const OSSL_ALGORITHM deflt_signature[] = { #ifndef OPENSSL_NO_DSA { PROV_NAMES_DSA, "provider=default", ossl_dsa_signature_functions }, #endif { PROV_NAMES_RSA, "provider=default", ossl_rsa_signature_functions }, #ifndef OPENSSL_NO_EC # ifndef OPENSSL_NO_ECX { PROV_NAMES_ED25519, "provider=default", ossl_ed25519_signature_functions }, { PROV_NAMES_ED448, "provider=default", ossl_ed448_signature_functions }, # endif { PROV_NAMES_ECDSA, "provider=default", ossl_ecdsa_signature_functions }, # ifndef OPENSSL_NO_SM2 { PROV_NAMES_SM2, "provider=default", ossl_sm2_signature_functions }, # endif #endif { PROV_NAMES_HMAC, "provider=default", ossl_mac_legacy_hmac_signature_functions }, { PROV_NAMES_SIPHASH, "provider=default", ossl_mac_legacy_siphash_signature_functions }, #ifndef OPENSSL_NO_POLY1305 { PROV_NAMES_POLY1305, "provider=default", ossl_mac_legacy_poly1305_signature_functions }, #endif #ifndef OPENSSL_NO_CMAC { PROV_NAMES_CMAC, "provider=default", ossl_mac_legacy_cmac_signature_functions }, #endif { NULL, NULL, NULL } }; static const OSSL_ALGORITHM deflt_asym_cipher[] = { { PROV_NAMES_RSA, "provider=default", ossl_rsa_asym_cipher_functions }, #ifndef OPENSSL_NO_SM2 { PROV_NAMES_SM2, "provider=default", ossl_sm2_asym_cipher_functions }, #endif { NULL, NULL, NULL } }; static const OSSL_ALGORITHM deflt_asym_kem[] = { { PROV_NAMES_RSA, "provider=default", ossl_rsa_asym_kem_functions }, #ifndef OPENSSL_NO_EC # ifndef OPENSSL_NO_ECX { PROV_NAMES_X25519, "provider=default", ossl_ecx_asym_kem_functions }, { PROV_NAMES_X448, "provider=default", ossl_ecx_asym_kem_functions }, # endif { PROV_NAMES_EC, "provider=default", ossl_ec_asym_kem_functions }, #endif { NULL, NULL, NULL } }; static const OSSL_ALGORITHM deflt_keymgmt[] = { #ifndef OPENSSL_NO_DH { PROV_NAMES_DH, "provider=default", ossl_dh_keymgmt_functions, PROV_DESCS_DH }, { PROV_NAMES_DHX, "provider=default", ossl_dhx_keymgmt_functions, PROV_DESCS_DHX }, #endif #ifndef OPENSSL_NO_DSA { PROV_NAMES_DSA, "provider=default", ossl_dsa_keymgmt_functions, PROV_DESCS_DSA}, #endif { PROV_NAMES_RSA, "provider=default", ossl_rsa_keymgmt_functions, PROV_DESCS_RSA }, { PROV_NAMES_RSA_PSS, "provider=default", ossl_rsapss_keymgmt_functions, PROV_DESCS_RSA_PSS }, #ifndef OPENSSL_NO_EC { PROV_NAMES_EC, "provider=default", ossl_ec_keymgmt_functions, PROV_DESCS_EC }, # ifndef OPENSSL_NO_ECX { PROV_NAMES_X25519, "provider=default", ossl_x25519_keymgmt_functions, PROV_DESCS_X25519 }, { PROV_NAMES_X448, "provider=default", ossl_x448_keymgmt_functions, PROV_DESCS_X448 }, { PROV_NAMES_ED25519, "provider=default", ossl_ed25519_keymgmt_functions, PROV_DESCS_ED25519 }, { PROV_NAMES_ED448, "provider=default", ossl_ed448_keymgmt_functions, PROV_DESCS_ED448 }, # endif #endif { PROV_NAMES_TLS1_PRF, "provider=default", ossl_kdf_keymgmt_functions, PROV_DESCS_TLS1_PRF_SIGN }, { PROV_NAMES_HKDF, "provider=default", ossl_kdf_keymgmt_functions, PROV_DESCS_HKDF_SIGN }, { PROV_NAMES_SCRYPT, "provider=default", ossl_kdf_keymgmt_functions, PROV_DESCS_SCRYPT_SIGN }, { PROV_NAMES_HMAC, "provider=default", ossl_mac_legacy_keymgmt_functions, PROV_DESCS_HMAC_SIGN }, { PROV_NAMES_SIPHASH, "provider=default", ossl_mac_legacy_keymgmt_functions, PROV_DESCS_SIPHASH_SIGN }, #ifndef OPENSSL_NO_POLY1305 { PROV_NAMES_POLY1305, "provider=default", ossl_mac_legacy_keymgmt_functions, PROV_DESCS_POLY1305_SIGN }, #endif #ifndef OPENSSL_NO_CMAC { PROV_NAMES_CMAC, "provider=default", ossl_cmac_legacy_keymgmt_functions, PROV_DESCS_CMAC_SIGN }, #endif #ifndef OPENSSL_NO_SM2 { PROV_NAMES_SM2, "provider=default", ossl_sm2_keymgmt_functions, PROV_DESCS_SM2 }, #endif { NULL, NULL, NULL } }; static const OSSL_ALGORITHM deflt_encoder[] = { #define ENCODER_PROVIDER "default" #include "encoders.inc" { NULL, NULL, NULL } #undef ENCODER_PROVIDER }; static const OSSL_ALGORITHM deflt_decoder[] = { #define DECODER_PROVIDER "default" #include "decoders.inc" { NULL, NULL, NULL } #undef DECODER_PROVIDER }; static const OSSL_ALGORITHM deflt_store[] = { #define STORE(name, _fips, func_table) \ { name, "provider=default,fips=" _fips, (func_table) }, #include "stores.inc" { NULL, NULL, NULL } #undef STORE }; static const OSSL_ALGORITHM *deflt_query(void *provctx, int operation_id, int *no_cache) { *no_cache = 0; switch (operation_id) { case OSSL_OP_DIGEST: return deflt_digests; case OSSL_OP_CIPHER: return exported_ciphers; case OSSL_OP_MAC: return deflt_macs; case OSSL_OP_KDF: return deflt_kdfs; case OSSL_OP_RAND: return deflt_rands; case OSSL_OP_KEYMGMT: return deflt_keymgmt; case OSSL_OP_KEYEXCH: return deflt_keyexch; case OSSL_OP_SIGNATURE: return deflt_signature; case OSSL_OP_ASYM_CIPHER: return deflt_asym_cipher; case OSSL_OP_KEM: return deflt_asym_kem; case OSSL_OP_ENCODER: return deflt_encoder; case OSSL_OP_DECODER: return deflt_decoder; case OSSL_OP_STORE: return deflt_store; } return NULL; } static void deflt_teardown(void *provctx) { BIO_meth_free(ossl_prov_ctx_get0_core_bio_method(provctx)); ossl_prov_ctx_free(provctx); } /* Functions we provide to the core */ static const OSSL_DISPATCH deflt_dispatch_table[] = { { OSSL_FUNC_PROVIDER_TEARDOWN, (void (*)(void))deflt_teardown }, { OSSL_FUNC_PROVIDER_GETTABLE_PARAMS, (void (*)(void))deflt_gettable_params }, { OSSL_FUNC_PROVIDER_GET_PARAMS, (void (*)(void))deflt_get_params }, { OSSL_FUNC_PROVIDER_QUERY_OPERATION, (void (*)(void))deflt_query }, { OSSL_FUNC_PROVIDER_GET_CAPABILITIES, (void (*)(void))ossl_prov_get_capabilities }, OSSL_DISPATCH_END }; OSSL_provider_init_fn ossl_default_provider_init; int ossl_default_provider_init(const OSSL_CORE_HANDLE *handle, const OSSL_DISPATCH *in, const OSSL_DISPATCH **out, void **provctx) { OSSL_FUNC_core_get_libctx_fn *c_get_libctx = NULL; BIO_METHOD *corebiometh; if (!ossl_prov_bio_from_dispatch(in) || !ossl_prov_seeding_from_dispatch(in)) return 0; for (; in->function_id != 0; in++) { switch (in->function_id) { case OSSL_FUNC_CORE_GETTABLE_PARAMS: c_gettable_params = OSSL_FUNC_core_gettable_params(in); break; case OSSL_FUNC_CORE_GET_PARAMS: c_get_params = OSSL_FUNC_core_get_params(in); break; case OSSL_FUNC_CORE_GET_LIBCTX: c_get_libctx = OSSL_FUNC_core_get_libctx(in); break; default: /* Just ignore anything we don't understand */ break; } } if (c_get_libctx == NULL) return 0; /* * We want to make sure that all calls from this provider that requires * a library context use the same context as the one used to call our * functions. We do that by passing it along in the provider context. * * This only works for built-in providers. Most providers should * create their own library context. */ if ((*provctx = ossl_prov_ctx_new()) == NULL || (corebiometh = ossl_bio_prov_init_bio_method()) == NULL) { ossl_prov_ctx_free(*provctx); *provctx = NULL; return 0; } ossl_prov_ctx_set0_libctx(*provctx, (OSSL_LIB_CTX *)c_get_libctx(handle)); ossl_prov_ctx_set0_handle(*provctx, handle); ossl_prov_ctx_set0_core_bio_method(*provctx, corebiometh); *out = deflt_dispatch_table; ossl_prov_cache_exported_algorithms(deflt_ciphers, exported_ciphers); return 1; }
./openssl/providers/prov_running.c
/* * Copyright 2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/e_os2.h> #include "prov/providercommon.h" /* By default, our providers don't have an error state */ void ossl_set_error_state(const char *type) { } /* By default, our providers are always in a happy state */ int ossl_prov_is_running(void) { return 1; }
./openssl/providers/baseprov.c
/* * Copyright 2020-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <string.h> #include <stdio.h> #include <openssl/opensslconf.h> #include <openssl/core.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/params.h> #include "prov/bio.h" #include "prov/provider_ctx.h" #include "prov/providercommon.h" #include "prov/implementations.h" #include "prov/provider_util.h" #include "prov/names.h" /* * Forward declarations to ensure that interface functions are correctly * defined. */ static OSSL_FUNC_provider_gettable_params_fn base_gettable_params; static OSSL_FUNC_provider_get_params_fn base_get_params; static OSSL_FUNC_provider_query_operation_fn base_query; /* Functions provided by the core */ static OSSL_FUNC_core_gettable_params_fn *c_gettable_params = NULL; static OSSL_FUNC_core_get_params_fn *c_get_params = NULL; /* Parameters we provide to the core */ static const OSSL_PARAM base_param_types[] = { OSSL_PARAM_DEFN(OSSL_PROV_PARAM_NAME, OSSL_PARAM_UTF8_PTR, NULL, 0), OSSL_PARAM_DEFN(OSSL_PROV_PARAM_VERSION, OSSL_PARAM_UTF8_PTR, NULL, 0), OSSL_PARAM_DEFN(OSSL_PROV_PARAM_BUILDINFO, OSSL_PARAM_UTF8_PTR, NULL, 0), OSSL_PARAM_DEFN(OSSL_PROV_PARAM_STATUS, OSSL_PARAM_INTEGER, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *base_gettable_params(void *provctx) { return base_param_types; } static int base_get_params(void *provctx, OSSL_PARAM params[]) { OSSL_PARAM *p; p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_NAME); if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, "OpenSSL Base Provider")) return 0; p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_VERSION); if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, OPENSSL_VERSION_STR)) return 0; p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_BUILDINFO); if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, OPENSSL_FULL_VERSION_STR)) return 0; p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_STATUS); if (p != NULL && !OSSL_PARAM_set_int(p, ossl_prov_is_running())) return 0; return 1; } static const OSSL_ALGORITHM base_encoder[] = { #define ENCODER_PROVIDER "base" #include "encoders.inc" { NULL, NULL, NULL } #undef ENCODER_PROVIDER }; static const OSSL_ALGORITHM base_decoder[] = { #define DECODER_PROVIDER "base" #include "decoders.inc" { NULL, NULL, NULL } #undef DECODER_PROVIDER }; static const OSSL_ALGORITHM base_store[] = { #define STORE(name, _fips, func_table) \ { name, "provider=base,fips=" _fips, (func_table) }, #include "stores.inc" { NULL, NULL, NULL } #undef STORE }; static const OSSL_ALGORITHM base_rands[] = { { PROV_NAMES_SEED_SRC, "provider=base", ossl_seed_src_functions }, { NULL, NULL, NULL } }; static const OSSL_ALGORITHM *base_query(void *provctx, int operation_id, int *no_cache) { *no_cache = 0; switch (operation_id) { case OSSL_OP_ENCODER: return base_encoder; case OSSL_OP_DECODER: return base_decoder; case OSSL_OP_STORE: return base_store; case OSSL_OP_RAND: return base_rands; } return NULL; } static void base_teardown(void *provctx) { BIO_meth_free(ossl_prov_ctx_get0_core_bio_method(provctx)); ossl_prov_ctx_free(provctx); } /* Functions we provide to the core */ static const OSSL_DISPATCH base_dispatch_table[] = { { OSSL_FUNC_PROVIDER_TEARDOWN, (void (*)(void))base_teardown }, { OSSL_FUNC_PROVIDER_GETTABLE_PARAMS, (void (*)(void))base_gettable_params }, { OSSL_FUNC_PROVIDER_GET_PARAMS, (void (*)(void))base_get_params }, { OSSL_FUNC_PROVIDER_QUERY_OPERATION, (void (*)(void))base_query }, OSSL_DISPATCH_END }; OSSL_provider_init_fn ossl_base_provider_init; int ossl_base_provider_init(const OSSL_CORE_HANDLE *handle, const OSSL_DISPATCH *in, const OSSL_DISPATCH **out, void **provctx) { OSSL_FUNC_core_get_libctx_fn *c_get_libctx = NULL; BIO_METHOD *corebiometh; if (!ossl_prov_bio_from_dispatch(in)) return 0; for (; in->function_id != 0; in++) { switch (in->function_id) { case OSSL_FUNC_CORE_GETTABLE_PARAMS: c_gettable_params = OSSL_FUNC_core_gettable_params(in); break; case OSSL_FUNC_CORE_GET_PARAMS: c_get_params = OSSL_FUNC_core_get_params(in); break; case OSSL_FUNC_CORE_GET_LIBCTX: c_get_libctx = OSSL_FUNC_core_get_libctx(in); break; default: /* Just ignore anything we don't understand */ break; } } if (c_get_libctx == NULL) return 0; /* * We want to make sure that all calls from this provider that requires * a library context use the same context as the one used to call our * functions. We do that by passing it along in the provider context. * * This only works for built-in providers. Most providers should * create their own library context. */ if ((*provctx = ossl_prov_ctx_new()) == NULL || (corebiometh = ossl_bio_prov_init_bio_method()) == NULL) { ossl_prov_ctx_free(*provctx); *provctx = NULL; return 0; } ossl_prov_ctx_set0_libctx(*provctx, (OSSL_LIB_CTX *)c_get_libctx(handle)); ossl_prov_ctx_set0_handle(*provctx, handle); ossl_prov_ctx_set0_core_bio_method(*provctx, corebiometh); *out = base_dispatch_table; return 1; }
./openssl/providers/implementations/macs/gmac_prov.c
/* * Copyright 2018-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <stdlib.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/params.h> #include <openssl/evp.h> #include <openssl/err.h> #include <openssl/proverr.h> #include "prov/implementations.h" #include "prov/provider_ctx.h" #include "prov/provider_util.h" #include "prov/providercommon.h" /* * Forward declaration of everything implemented here. This is not strictly * necessary for the compiler, but provides an assurance that the signatures * of the functions in the dispatch table are correct. */ static OSSL_FUNC_mac_newctx_fn gmac_new; static OSSL_FUNC_mac_dupctx_fn gmac_dup; static OSSL_FUNC_mac_freectx_fn gmac_free; static OSSL_FUNC_mac_gettable_params_fn gmac_gettable_params; static OSSL_FUNC_mac_get_params_fn gmac_get_params; static OSSL_FUNC_mac_settable_ctx_params_fn gmac_settable_ctx_params; static OSSL_FUNC_mac_set_ctx_params_fn gmac_set_ctx_params; static OSSL_FUNC_mac_init_fn gmac_init; static OSSL_FUNC_mac_update_fn gmac_update; static OSSL_FUNC_mac_final_fn gmac_final; /* local GMAC pkey structure */ struct gmac_data_st { void *provctx; EVP_CIPHER_CTX *ctx; /* Cipher context */ PROV_CIPHER cipher; }; static void gmac_free(void *vmacctx) { struct gmac_data_st *macctx = vmacctx; if (macctx != NULL) { EVP_CIPHER_CTX_free(macctx->ctx); ossl_prov_cipher_reset(&macctx->cipher); OPENSSL_free(macctx); } } static void *gmac_new(void *provctx) { struct gmac_data_st *macctx; if (!ossl_prov_is_running()) return NULL; if ((macctx = OPENSSL_zalloc(sizeof(*macctx))) == NULL || (macctx->ctx = EVP_CIPHER_CTX_new()) == NULL) { gmac_free(macctx); return NULL; } macctx->provctx = provctx; return macctx; } static void *gmac_dup(void *vsrc) { struct gmac_data_st *src = vsrc; struct gmac_data_st *dst; if (!ossl_prov_is_running()) return NULL; dst = gmac_new(src->provctx); if (dst == NULL) return NULL; if (!EVP_CIPHER_CTX_copy(dst->ctx, src->ctx) || !ossl_prov_cipher_copy(&dst->cipher, &src->cipher)) { gmac_free(dst); return NULL; } return dst; } static size_t gmac_size(void) { return EVP_GCM_TLS_TAG_LEN; } static int gmac_setkey(struct gmac_data_st *macctx, const unsigned char *key, size_t keylen) { EVP_CIPHER_CTX *ctx = macctx->ctx; if (keylen != (size_t)EVP_CIPHER_CTX_get_key_length(ctx)) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } if (!EVP_EncryptInit_ex(ctx, NULL, NULL, key, NULL)) return 0; return 1; } static int gmac_init(void *vmacctx, const unsigned char *key, size_t keylen, const OSSL_PARAM params[]) { struct gmac_data_st *macctx = vmacctx; if (!ossl_prov_is_running() || !gmac_set_ctx_params(macctx, params)) return 0; if (key != NULL) return gmac_setkey(macctx, key, keylen); return EVP_EncryptInit_ex(macctx->ctx, NULL, NULL, NULL, NULL); } static int gmac_update(void *vmacctx, const unsigned char *data, size_t datalen) { struct gmac_data_st *macctx = vmacctx; EVP_CIPHER_CTX *ctx = macctx->ctx; int outlen; if (datalen == 0) return 1; while (datalen > INT_MAX) { if (!EVP_EncryptUpdate(ctx, NULL, &outlen, data, INT_MAX)) return 0; data += INT_MAX; datalen -= INT_MAX; } return EVP_EncryptUpdate(ctx, NULL, &outlen, data, datalen); } static int gmac_final(void *vmacctx, unsigned char *out, size_t *outl, size_t outsize) { OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; struct gmac_data_st *macctx = vmacctx; int hlen = 0; if (!ossl_prov_is_running()) return 0; if (!EVP_EncryptFinal_ex(macctx->ctx, out, &hlen)) return 0; hlen = gmac_size(); params[0] = OSSL_PARAM_construct_octet_string(OSSL_CIPHER_PARAM_AEAD_TAG, out, (size_t)hlen); if (!EVP_CIPHER_CTX_get_params(macctx->ctx, params)) return 0; *outl = hlen; return 1; } static const OSSL_PARAM known_gettable_params[] = { OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), OSSL_PARAM_END }; static const OSSL_PARAM *gmac_gettable_params(void *provctx) { return known_gettable_params; } static int gmac_get_params(OSSL_PARAM params[]) { OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_SIZE)) != NULL) return OSSL_PARAM_set_size_t(p, gmac_size()); return 1; } static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_MAC_PARAM_CIPHER, NULL, 0), OSSL_PARAM_utf8_string(OSSL_MAC_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_octet_string(OSSL_MAC_PARAM_KEY, NULL, 0), OSSL_PARAM_octet_string(OSSL_MAC_PARAM_IV, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *gmac_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_settable_ctx_params; } /* * ALL parameters should be set before init(). */ static int gmac_set_ctx_params(void *vmacctx, const OSSL_PARAM params[]) { struct gmac_data_st *macctx = vmacctx; EVP_CIPHER_CTX *ctx = macctx->ctx; OSSL_LIB_CTX *provctx = PROV_LIBCTX_OF(macctx->provctx); const OSSL_PARAM *p; if (params == NULL) return 1; if (ctx == NULL) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_CIPHER)) != NULL) { if (!ossl_prov_cipher_load_from_params(&macctx->cipher, params, provctx)) return 0; if (EVP_CIPHER_get_mode(ossl_prov_cipher_cipher(&macctx->cipher)) != EVP_CIPH_GCM_MODE) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_MODE); return 0; } if (!EVP_EncryptInit_ex(ctx, ossl_prov_cipher_cipher(&macctx->cipher), ossl_prov_cipher_engine(&macctx->cipher), NULL, NULL)) return 0; } if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_KEY)) != NULL) if (p->data_type != OSSL_PARAM_OCTET_STRING || !gmac_setkey(macctx, p->data, p->data_size)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_IV)) != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) return 0; if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_IVLEN, p->data_size, NULL) <= 0 || !EVP_EncryptInit_ex(ctx, NULL, NULL, NULL, p->data)) return 0; } return 1; } const OSSL_DISPATCH ossl_gmac_functions[] = { { OSSL_FUNC_MAC_NEWCTX, (void (*)(void))gmac_new }, { OSSL_FUNC_MAC_DUPCTX, (void (*)(void))gmac_dup }, { OSSL_FUNC_MAC_FREECTX, (void (*)(void))gmac_free }, { OSSL_FUNC_MAC_INIT, (void (*)(void))gmac_init }, { OSSL_FUNC_MAC_UPDATE, (void (*)(void))gmac_update }, { OSSL_FUNC_MAC_FINAL, (void (*)(void))gmac_final }, { OSSL_FUNC_MAC_GETTABLE_PARAMS, (void (*)(void))gmac_gettable_params }, { OSSL_FUNC_MAC_GET_PARAMS, (void (*)(void))gmac_get_params }, { OSSL_FUNC_MAC_SETTABLE_CTX_PARAMS, (void (*)(void))gmac_settable_ctx_params }, { OSSL_FUNC_MAC_SET_CTX_PARAMS, (void (*)(void))gmac_set_ctx_params }, OSSL_DISPATCH_END };
./openssl/providers/implementations/macs/blake2s_mac.c
/* * Copyright 2018-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Constants */ #define BLAKE2_CTX BLAKE2S_CTX #define BLAKE2_PARAM BLAKE2S_PARAM #define BLAKE2_KEYBYTES BLAKE2S_KEYBYTES #define BLAKE2_OUTBYTES BLAKE2S_OUTBYTES #define BLAKE2_PERSONALBYTES BLAKE2S_PERSONALBYTES #define BLAKE2_SALTBYTES BLAKE2S_SALTBYTES #define BLAKE2_BLOCKBYTES BLAKE2S_BLOCKBYTES /* Function names */ #define BLAKE2_PARAM_INIT ossl_blake2s_param_init #define BLAKE2_INIT_KEY ossl_blake2s_init_key #define BLAKE2_UPDATE ossl_blake2s_update #define BLAKE2_FINAL ossl_blake2s_final #define BLAKE2_PARAM_SET_DIGEST_LENGTH ossl_blake2s_param_set_digest_length #define BLAKE2_PARAM_SET_KEY_LENGTH ossl_blake2s_param_set_key_length #define BLAKE2_PARAM_SET_PERSONAL ossl_blake2s_param_set_personal #define BLAKE2_PARAM_SET_SALT ossl_blake2s_param_set_salt /* OSSL_DISPATCH symbol */ #define BLAKE2_FUNCTIONS ossl_blake2smac_functions #include "blake2_mac_impl.c"
./openssl/providers/implementations/macs/siphash_prov.c
/* * Copyright 2018-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <string.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/params.h> #include <openssl/evp.h> #include <openssl/err.h> #include <openssl/proverr.h> #include "crypto/siphash.h" #include "prov/implementations.h" #include "prov/providercommon.h" /* * Forward declaration of everything implemented here. This is not strictly * necessary for the compiler, but provides an assurance that the signatures * of the functions in the dispatch table are correct. */ static OSSL_FUNC_mac_newctx_fn siphash_new; static OSSL_FUNC_mac_dupctx_fn siphash_dup; static OSSL_FUNC_mac_freectx_fn siphash_free; static OSSL_FUNC_mac_gettable_ctx_params_fn siphash_gettable_ctx_params; static OSSL_FUNC_mac_get_ctx_params_fn siphash_get_ctx_params; static OSSL_FUNC_mac_settable_ctx_params_fn siphash_settable_ctx_params; static OSSL_FUNC_mac_set_ctx_params_fn siphash_set_params; static OSSL_FUNC_mac_init_fn siphash_init; static OSSL_FUNC_mac_update_fn siphash_update; static OSSL_FUNC_mac_final_fn siphash_final; struct siphash_data_st { void *provctx; SIPHASH siphash; /* Siphash data */ SIPHASH sipcopy; /* Siphash data copy for reinitialization */ unsigned int crounds, drounds; }; static unsigned int crounds(struct siphash_data_st *ctx) { return ctx->crounds != 0 ? ctx->crounds : SIPHASH_C_ROUNDS; } static unsigned int drounds(struct siphash_data_st *ctx) { return ctx->drounds != 0 ? ctx->drounds : SIPHASH_D_ROUNDS; } static void *siphash_new(void *provctx) { struct siphash_data_st *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) ctx->provctx = provctx; return ctx; } static void siphash_free(void *vmacctx) { OPENSSL_free(vmacctx); } static void *siphash_dup(void *vsrc) { struct siphash_data_st *ssrc = vsrc; struct siphash_data_st *sdst; if (!ossl_prov_is_running()) return NULL; sdst = OPENSSL_malloc(sizeof(*sdst)); if (sdst == NULL) return NULL; *sdst = *ssrc; return sdst; } static size_t siphash_size(void *vmacctx) { struct siphash_data_st *ctx = vmacctx; return SipHash_hash_size(&ctx->siphash); } static int siphash_setkey(struct siphash_data_st *ctx, const unsigned char *key, size_t keylen) { int ret; if (keylen != SIPHASH_KEY_SIZE) return 0; ret = SipHash_Init(&ctx->siphash, key, crounds(ctx), drounds(ctx)); if (ret) ctx->sipcopy = ctx->siphash; return ret; } static int siphash_init(void *vmacctx, const unsigned char *key, size_t keylen, const OSSL_PARAM params[]) { struct siphash_data_st *ctx = vmacctx; if (!ossl_prov_is_running() || !siphash_set_params(ctx, params)) return 0; /* * Without a key, there is not much to do here, * The actual initialization happens through controls. */ if (key == NULL) { ctx->siphash = ctx->sipcopy; return 1; } return siphash_setkey(ctx, key, keylen); } static int siphash_update(void *vmacctx, const unsigned char *data, size_t datalen) { struct siphash_data_st *ctx = vmacctx; if (datalen == 0) return 1; SipHash_Update(&ctx->siphash, data, datalen); return 1; } static int siphash_final(void *vmacctx, unsigned char *out, size_t *outl, size_t outsize) { struct siphash_data_st *ctx = vmacctx; size_t hlen = siphash_size(ctx); if (!ossl_prov_is_running() || outsize < hlen) return 0; *outl = hlen; return SipHash_Final(&ctx->siphash, out, hlen); } static const OSSL_PARAM *siphash_gettable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), OSSL_PARAM_uint(OSSL_MAC_PARAM_C_ROUNDS, NULL), OSSL_PARAM_uint(OSSL_MAC_PARAM_D_ROUNDS, NULL), OSSL_PARAM_END }; return known_gettable_ctx_params; } static int siphash_get_ctx_params(void *vmacctx, OSSL_PARAM params[]) { struct siphash_data_st *ctx = vmacctx; OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_SIZE)) != NULL && !OSSL_PARAM_set_size_t(p, siphash_size(vmacctx))) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_C_ROUNDS)) != NULL && !OSSL_PARAM_set_uint(p, crounds(ctx))) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_D_ROUNDS)) != NULL && !OSSL_PARAM_set_uint(p, drounds(ctx))) return 0; return 1; } static const OSSL_PARAM *siphash_settable_ctx_params(ossl_unused void *ctx, void *provctx) { static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), OSSL_PARAM_octet_string(OSSL_MAC_PARAM_KEY, NULL, 0), OSSL_PARAM_uint(OSSL_MAC_PARAM_C_ROUNDS, NULL), OSSL_PARAM_uint(OSSL_MAC_PARAM_D_ROUNDS, NULL), OSSL_PARAM_END }; return known_settable_ctx_params; } static int siphash_set_params(void *vmacctx, const OSSL_PARAM *params) { struct siphash_data_st *ctx = vmacctx; const OSSL_PARAM *p = NULL; size_t size; if (params == NULL) return 1; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_SIZE)) != NULL) { if (!OSSL_PARAM_get_size_t(p, &size) || !SipHash_set_hash_size(&ctx->siphash, size) || !SipHash_set_hash_size(&ctx->sipcopy, size)) return 0; } if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_C_ROUNDS)) != NULL && !OSSL_PARAM_get_uint(p, &ctx->crounds)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_D_ROUNDS)) != NULL && !OSSL_PARAM_get_uint(p, &ctx->drounds)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_KEY)) != NULL) if (p->data_type != OSSL_PARAM_OCTET_STRING || !siphash_setkey(ctx, p->data, p->data_size)) return 0; return 1; } const OSSL_DISPATCH ossl_siphash_functions[] = { { OSSL_FUNC_MAC_NEWCTX, (void (*)(void))siphash_new }, { OSSL_FUNC_MAC_DUPCTX, (void (*)(void))siphash_dup }, { OSSL_FUNC_MAC_FREECTX, (void (*)(void))siphash_free }, { OSSL_FUNC_MAC_INIT, (void (*)(void))siphash_init }, { OSSL_FUNC_MAC_UPDATE, (void (*)(void))siphash_update }, { OSSL_FUNC_MAC_FINAL, (void (*)(void))siphash_final }, { OSSL_FUNC_MAC_GETTABLE_CTX_PARAMS, (void (*)(void))siphash_gettable_ctx_params }, { OSSL_FUNC_MAC_GET_CTX_PARAMS, (void (*)(void))siphash_get_ctx_params }, { OSSL_FUNC_MAC_SETTABLE_CTX_PARAMS, (void (*)(void))siphash_settable_ctx_params }, { OSSL_FUNC_MAC_SET_CTX_PARAMS, (void (*)(void))siphash_set_params }, OSSL_DISPATCH_END };
./openssl/providers/implementations/macs/hmac_prov.c
/* * Copyright 2018-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * HMAC low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include <string.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/params.h> #include <openssl/evp.h> #include <openssl/hmac.h> #include "internal/ssl3_cbc.h" #include "prov/implementations.h" #include "prov/provider_ctx.h" #include "prov/provider_util.h" #include "prov/providercommon.h" /* * Forward declaration of everything implemented here. This is not strictly * necessary for the compiler, but provides an assurance that the signatures * of the functions in the dispatch table are correct. */ static OSSL_FUNC_mac_newctx_fn hmac_new; static OSSL_FUNC_mac_dupctx_fn hmac_dup; static OSSL_FUNC_mac_freectx_fn hmac_free; static OSSL_FUNC_mac_gettable_ctx_params_fn hmac_gettable_ctx_params; static OSSL_FUNC_mac_get_ctx_params_fn hmac_get_ctx_params; static OSSL_FUNC_mac_settable_ctx_params_fn hmac_settable_ctx_params; static OSSL_FUNC_mac_set_ctx_params_fn hmac_set_ctx_params; static OSSL_FUNC_mac_init_fn hmac_init; static OSSL_FUNC_mac_update_fn hmac_update; static OSSL_FUNC_mac_final_fn hmac_final; /* local HMAC context structure */ /* typedef EVP_MAC_IMPL */ struct hmac_data_st { void *provctx; HMAC_CTX *ctx; /* HMAC context */ PROV_DIGEST digest; unsigned char *key; size_t keylen; /* Length of full TLS record including the MAC and any padding */ size_t tls_data_size; unsigned char tls_header[13]; int tls_header_set; unsigned char tls_mac_out[EVP_MAX_MD_SIZE]; size_t tls_mac_out_size; }; static void *hmac_new(void *provctx) { struct hmac_data_st *macctx; if (!ossl_prov_is_running()) return NULL; if ((macctx = OPENSSL_zalloc(sizeof(*macctx))) == NULL || (macctx->ctx = HMAC_CTX_new()) == NULL) { OPENSSL_free(macctx); return NULL; } macctx->provctx = provctx; return macctx; } static void hmac_free(void *vmacctx) { struct hmac_data_st *macctx = vmacctx; if (macctx != NULL) { HMAC_CTX_free(macctx->ctx); ossl_prov_digest_reset(&macctx->digest); OPENSSL_secure_clear_free(macctx->key, macctx->keylen); OPENSSL_free(macctx); } } static void *hmac_dup(void *vsrc) { struct hmac_data_st *src = vsrc; struct hmac_data_st *dst; HMAC_CTX *ctx; if (!ossl_prov_is_running()) return NULL; dst = hmac_new(src->provctx); if (dst == NULL) return NULL; ctx = dst->ctx; *dst = *src; dst->ctx = ctx; dst->key = NULL; memset(&dst->digest, 0, sizeof(dst->digest)); if (!HMAC_CTX_copy(dst->ctx, src->ctx) || !ossl_prov_digest_copy(&dst->digest, &src->digest)) { hmac_free(dst); return NULL; } if (src->key != NULL) { /* There is no "secure" OPENSSL_memdup */ dst->key = OPENSSL_secure_malloc(src->keylen > 0 ? src->keylen : 1); if (dst->key == NULL) { hmac_free(dst); return 0; } memcpy(dst->key, src->key, src->keylen); } return dst; } static size_t hmac_size(struct hmac_data_st *macctx) { return HMAC_size(macctx->ctx); } static int hmac_block_size(struct hmac_data_st *macctx) { const EVP_MD *md = ossl_prov_digest_md(&macctx->digest); if (md == NULL) return 0; return EVP_MD_block_size(md); } static int hmac_setkey(struct hmac_data_st *macctx, const unsigned char *key, size_t keylen) { const EVP_MD *digest; if (macctx->key != NULL) OPENSSL_secure_clear_free(macctx->key, macctx->keylen); /* Keep a copy of the key in case we need it for TLS HMAC */ macctx->key = OPENSSL_secure_malloc(keylen > 0 ? keylen : 1); if (macctx->key == NULL) return 0; memcpy(macctx->key, key, keylen); macctx->keylen = keylen; digest = ossl_prov_digest_md(&macctx->digest); /* HMAC_Init_ex doesn't tolerate all zero params, so we must be careful */ if (key != NULL || (macctx->tls_data_size == 0 && digest != NULL)) return HMAC_Init_ex(macctx->ctx, key, keylen, digest, ossl_prov_digest_engine(&macctx->digest)); return 1; } static int hmac_init(void *vmacctx, const unsigned char *key, size_t keylen, const OSSL_PARAM params[]) { struct hmac_data_st *macctx = vmacctx; if (!ossl_prov_is_running() || !hmac_set_ctx_params(macctx, params)) return 0; if (key != NULL) return hmac_setkey(macctx, key, keylen); /* Just reinit the HMAC context */ return HMAC_Init_ex(macctx->ctx, NULL, 0, NULL, NULL); } static int hmac_update(void *vmacctx, const unsigned char *data, size_t datalen) { struct hmac_data_st *macctx = vmacctx; if (macctx->tls_data_size > 0) { /* We're doing a TLS HMAC */ if (!macctx->tls_header_set) { /* We expect the first update call to contain the TLS header */ if (datalen != sizeof(macctx->tls_header)) return 0; memcpy(macctx->tls_header, data, datalen); macctx->tls_header_set = 1; return 1; } /* macctx->tls_data_size is datalen plus the padding length */ if (macctx->tls_data_size < datalen) return 0; return ssl3_cbc_digest_record(ossl_prov_digest_md(&macctx->digest), macctx->tls_mac_out, &macctx->tls_mac_out_size, macctx->tls_header, data, datalen, macctx->tls_data_size, macctx->key, macctx->keylen, 0); } return HMAC_Update(macctx->ctx, data, datalen); } static int hmac_final(void *vmacctx, unsigned char *out, size_t *outl, size_t outsize) { unsigned int hlen; struct hmac_data_st *macctx = vmacctx; if (!ossl_prov_is_running()) return 0; if (macctx->tls_data_size > 0) { if (macctx->tls_mac_out_size == 0) return 0; if (outl != NULL) *outl = macctx->tls_mac_out_size; memcpy(out, macctx->tls_mac_out, macctx->tls_mac_out_size); return 1; } if (!HMAC_Final(macctx->ctx, out, &hlen)) return 0; *outl = hlen; return 1; } static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), OSSL_PARAM_size_t(OSSL_MAC_PARAM_BLOCK_SIZE, NULL), OSSL_PARAM_END }; static const OSSL_PARAM *hmac_gettable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_gettable_ctx_params; } static int hmac_get_ctx_params(void *vmacctx, OSSL_PARAM params[]) { struct hmac_data_st *macctx = vmacctx; OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_SIZE)) != NULL && !OSSL_PARAM_set_size_t(p, hmac_size(macctx))) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_BLOCK_SIZE)) != NULL && !OSSL_PARAM_set_int(p, hmac_block_size(macctx))) return 0; return 1; } static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_MAC_PARAM_DIGEST, NULL, 0), OSSL_PARAM_utf8_string(OSSL_MAC_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_octet_string(OSSL_MAC_PARAM_KEY, NULL, 0), OSSL_PARAM_int(OSSL_MAC_PARAM_DIGEST_NOINIT, NULL), OSSL_PARAM_int(OSSL_MAC_PARAM_DIGEST_ONESHOT, NULL), OSSL_PARAM_size_t(OSSL_MAC_PARAM_TLS_DATA_SIZE, NULL), OSSL_PARAM_END }; static const OSSL_PARAM *hmac_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_settable_ctx_params; } /* * ALL parameters should be set before init(). */ static int hmac_set_ctx_params(void *vmacctx, const OSSL_PARAM params[]) { struct hmac_data_st *macctx = vmacctx; OSSL_LIB_CTX *ctx = PROV_LIBCTX_OF(macctx->provctx); const OSSL_PARAM *p; if (params == NULL) return 1; if (!ossl_prov_digest_load_from_params(&macctx->digest, params, ctx)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_KEY)) != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) return 0; if (!hmac_setkey(macctx, p->data, p->data_size)) return 0; } if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_TLS_DATA_SIZE)) != NULL) { if (!OSSL_PARAM_get_size_t(p, &macctx->tls_data_size)) return 0; } return 1; } const OSSL_DISPATCH ossl_hmac_functions[] = { { OSSL_FUNC_MAC_NEWCTX, (void (*)(void))hmac_new }, { OSSL_FUNC_MAC_DUPCTX, (void (*)(void))hmac_dup }, { OSSL_FUNC_MAC_FREECTX, (void (*)(void))hmac_free }, { OSSL_FUNC_MAC_INIT, (void (*)(void))hmac_init }, { OSSL_FUNC_MAC_UPDATE, (void (*)(void))hmac_update }, { OSSL_FUNC_MAC_FINAL, (void (*)(void))hmac_final }, { OSSL_FUNC_MAC_GETTABLE_CTX_PARAMS, (void (*)(void))hmac_gettable_ctx_params }, { OSSL_FUNC_MAC_GET_CTX_PARAMS, (void (*)(void))hmac_get_ctx_params }, { OSSL_FUNC_MAC_SETTABLE_CTX_PARAMS, (void (*)(void))hmac_settable_ctx_params }, { OSSL_FUNC_MAC_SET_CTX_PARAMS, (void (*)(void))hmac_set_ctx_params }, OSSL_DISPATCH_END };
./openssl/providers/implementations/macs/cmac_prov.c
/* * Copyright 2018-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * CMAC low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/params.h> #include <openssl/evp.h> #include <openssl/cmac.h> #include <openssl/err.h> #include <openssl/proverr.h> #include "prov/implementations.h" #include "prov/provider_ctx.h" #include "prov/provider_util.h" #include "prov/providercommon.h" /* * Forward declaration of everything implemented here. This is not strictly * necessary for the compiler, but provides an assurance that the signatures * of the functions in the dispatch table are correct. */ static OSSL_FUNC_mac_newctx_fn cmac_new; static OSSL_FUNC_mac_dupctx_fn cmac_dup; static OSSL_FUNC_mac_freectx_fn cmac_free; static OSSL_FUNC_mac_gettable_ctx_params_fn cmac_gettable_ctx_params; static OSSL_FUNC_mac_get_ctx_params_fn cmac_get_ctx_params; static OSSL_FUNC_mac_settable_ctx_params_fn cmac_settable_ctx_params; static OSSL_FUNC_mac_set_ctx_params_fn cmac_set_ctx_params; static OSSL_FUNC_mac_init_fn cmac_init; static OSSL_FUNC_mac_update_fn cmac_update; static OSSL_FUNC_mac_final_fn cmac_final; /* local CMAC data */ struct cmac_data_st { void *provctx; CMAC_CTX *ctx; PROV_CIPHER cipher; }; static void *cmac_new(void *provctx) { struct cmac_data_st *macctx; if (!ossl_prov_is_running()) return NULL; if ((macctx = OPENSSL_zalloc(sizeof(*macctx))) == NULL || (macctx->ctx = CMAC_CTX_new()) == NULL) { OPENSSL_free(macctx); macctx = NULL; } else { macctx->provctx = provctx; } return macctx; } static void cmac_free(void *vmacctx) { struct cmac_data_st *macctx = vmacctx; if (macctx != NULL) { CMAC_CTX_free(macctx->ctx); ossl_prov_cipher_reset(&macctx->cipher); OPENSSL_free(macctx); } } static void *cmac_dup(void *vsrc) { struct cmac_data_st *src = vsrc; struct cmac_data_st *dst; if (!ossl_prov_is_running()) return NULL; dst = cmac_new(src->provctx); if (dst == NULL) return NULL; if (!CMAC_CTX_copy(dst->ctx, src->ctx) || !ossl_prov_cipher_copy(&dst->cipher, &src->cipher)) { cmac_free(dst); return NULL; } return dst; } static size_t cmac_size(void *vmacctx) { struct cmac_data_st *macctx = vmacctx; const EVP_CIPHER_CTX *cipherctx = CMAC_CTX_get0_cipher_ctx(macctx->ctx); if (EVP_CIPHER_CTX_get0_cipher(cipherctx) == NULL) return 0; return EVP_CIPHER_CTX_get_block_size(cipherctx); } static int cmac_setkey(struct cmac_data_st *macctx, const unsigned char *key, size_t keylen) { int rv = CMAC_Init(macctx->ctx, key, keylen, ossl_prov_cipher_cipher(&macctx->cipher), ossl_prov_cipher_engine(&macctx->cipher)); ossl_prov_cipher_reset(&macctx->cipher); return rv; } static int cmac_init(void *vmacctx, const unsigned char *key, size_t keylen, const OSSL_PARAM params[]) { struct cmac_data_st *macctx = vmacctx; if (!ossl_prov_is_running() || !cmac_set_ctx_params(macctx, params)) return 0; if (key != NULL) return cmac_setkey(macctx, key, keylen); /* Reinitialize the CMAC context */ return CMAC_Init(macctx->ctx, NULL, 0, NULL, NULL); } static int cmac_update(void *vmacctx, const unsigned char *data, size_t datalen) { struct cmac_data_st *macctx = vmacctx; return CMAC_Update(macctx->ctx, data, datalen); } static int cmac_final(void *vmacctx, unsigned char *out, size_t *outl, size_t outsize) { struct cmac_data_st *macctx = vmacctx; if (!ossl_prov_is_running()) return 0; return CMAC_Final(macctx->ctx, out, outl); } static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), OSSL_PARAM_size_t(OSSL_MAC_PARAM_BLOCK_SIZE, NULL), OSSL_PARAM_END }; static const OSSL_PARAM *cmac_gettable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_gettable_ctx_params; } static int cmac_get_ctx_params(void *vmacctx, OSSL_PARAM params[]) { OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_SIZE)) != NULL && !OSSL_PARAM_set_size_t(p, cmac_size(vmacctx))) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_BLOCK_SIZE)) != NULL && !OSSL_PARAM_set_size_t(p, cmac_size(vmacctx))) return 0; return 1; } static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_MAC_PARAM_CIPHER, NULL, 0), OSSL_PARAM_utf8_string(OSSL_MAC_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_octet_string(OSSL_MAC_PARAM_KEY, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *cmac_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_settable_ctx_params; } /* * ALL parameters should be set before init(). */ static int cmac_set_ctx_params(void *vmacctx, const OSSL_PARAM params[]) { struct cmac_data_st *macctx = vmacctx; OSSL_LIB_CTX *ctx = PROV_LIBCTX_OF(macctx->provctx); const OSSL_PARAM *p; if (params == NULL) return 1; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_CIPHER)) != NULL) { if (!ossl_prov_cipher_load_from_params(&macctx->cipher, params, ctx)) return 0; if (EVP_CIPHER_get_mode(ossl_prov_cipher_cipher(&macctx->cipher)) != EVP_CIPH_CBC_MODE) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_MODE); return 0; } } if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_KEY)) != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) return 0; return cmac_setkey(macctx, p->data, p->data_size); } return 1; } const OSSL_DISPATCH ossl_cmac_functions[] = { { OSSL_FUNC_MAC_NEWCTX, (void (*)(void))cmac_new }, { OSSL_FUNC_MAC_DUPCTX, (void (*)(void))cmac_dup }, { OSSL_FUNC_MAC_FREECTX, (void (*)(void))cmac_free }, { OSSL_FUNC_MAC_INIT, (void (*)(void))cmac_init }, { OSSL_FUNC_MAC_UPDATE, (void (*)(void))cmac_update }, { OSSL_FUNC_MAC_FINAL, (void (*)(void))cmac_final }, { OSSL_FUNC_MAC_GETTABLE_CTX_PARAMS, (void (*)(void))cmac_gettable_ctx_params }, { OSSL_FUNC_MAC_GET_CTX_PARAMS, (void (*)(void))cmac_get_ctx_params }, { OSSL_FUNC_MAC_SETTABLE_CTX_PARAMS, (void (*)(void))cmac_settable_ctx_params }, { OSSL_FUNC_MAC_SET_CTX_PARAMS, (void (*)(void))cmac_set_ctx_params }, OSSL_DISPATCH_END };
./openssl/providers/implementations/macs/poly1305_prov.c
/* * Copyright 2018-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/params.h> #include <openssl/evp.h> #include <openssl/err.h> #include <openssl/proverr.h> #include "crypto/poly1305.h" #include "prov/implementations.h" #include "prov/providercommon.h" /* * Forward declaration of everything implemented here. This is not strictly * necessary for the compiler, but provides an assurance that the signatures * of the functions in the dispatch table are correct. */ static OSSL_FUNC_mac_newctx_fn poly1305_new; static OSSL_FUNC_mac_dupctx_fn poly1305_dup; static OSSL_FUNC_mac_freectx_fn poly1305_free; static OSSL_FUNC_mac_gettable_params_fn poly1305_gettable_params; static OSSL_FUNC_mac_get_params_fn poly1305_get_params; static OSSL_FUNC_mac_settable_ctx_params_fn poly1305_settable_ctx_params; static OSSL_FUNC_mac_set_ctx_params_fn poly1305_set_ctx_params; static OSSL_FUNC_mac_init_fn poly1305_init; static OSSL_FUNC_mac_update_fn poly1305_update; static OSSL_FUNC_mac_final_fn poly1305_final; struct poly1305_data_st { void *provctx; int updated; POLY1305 poly1305; /* Poly1305 data */ }; static void *poly1305_new(void *provctx) { struct poly1305_data_st *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) ctx->provctx = provctx; return ctx; } static void poly1305_free(void *vmacctx) { OPENSSL_free(vmacctx); } static void *poly1305_dup(void *vsrc) { struct poly1305_data_st *src = vsrc; struct poly1305_data_st *dst; if (!ossl_prov_is_running()) return NULL; dst = OPENSSL_malloc(sizeof(*dst)); if (dst == NULL) return NULL; *dst = *src; return dst; } static size_t poly1305_size(void) { return POLY1305_DIGEST_SIZE; } static int poly1305_setkey(struct poly1305_data_st *ctx, const unsigned char *key, size_t keylen) { if (keylen != POLY1305_KEY_SIZE) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } Poly1305_Init(&ctx->poly1305, key); ctx->updated = 0; return 1; } static int poly1305_init(void *vmacctx, const unsigned char *key, size_t keylen, const OSSL_PARAM params[]) { struct poly1305_data_st *ctx = vmacctx; /* initialize the context in MAC_ctrl function */ if (!ossl_prov_is_running() || !poly1305_set_ctx_params(ctx, params)) return 0; if (key != NULL) return poly1305_setkey(ctx, key, keylen); /* no reinitialization of context with the same key is allowed */ return ctx->updated == 0; } static int poly1305_update(void *vmacctx, const unsigned char *data, size_t datalen) { struct poly1305_data_st *ctx = vmacctx; ctx->updated = 1; if (datalen == 0) return 1; /* poly1305 has nothing to return in its update function */ Poly1305_Update(&ctx->poly1305, data, datalen); return 1; } static int poly1305_final(void *vmacctx, unsigned char *out, size_t *outl, size_t outsize) { struct poly1305_data_st *ctx = vmacctx; if (!ossl_prov_is_running()) return 0; ctx->updated = 1; Poly1305_Final(&ctx->poly1305, out); *outl = poly1305_size(); return 1; } static const OSSL_PARAM known_gettable_params[] = { OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), OSSL_PARAM_END }; static const OSSL_PARAM *poly1305_gettable_params(void *provctx) { return known_gettable_params; } static int poly1305_get_params(OSSL_PARAM params[]) { OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_SIZE)) != NULL) return OSSL_PARAM_set_size_t(p, poly1305_size()); return 1; } static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_octet_string(OSSL_MAC_PARAM_KEY, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *poly1305_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_settable_ctx_params; } static int poly1305_set_ctx_params(void *vmacctx, const OSSL_PARAM *params) { struct poly1305_data_st *ctx = vmacctx; const OSSL_PARAM *p; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_KEY)) != NULL && !poly1305_setkey(ctx, p->data, p->data_size)) return 0; return 1; } const OSSL_DISPATCH ossl_poly1305_functions[] = { { OSSL_FUNC_MAC_NEWCTX, (void (*)(void))poly1305_new }, { OSSL_FUNC_MAC_DUPCTX, (void (*)(void))poly1305_dup }, { OSSL_FUNC_MAC_FREECTX, (void (*)(void))poly1305_free }, { OSSL_FUNC_MAC_INIT, (void (*)(void))poly1305_init }, { OSSL_FUNC_MAC_UPDATE, (void (*)(void))poly1305_update }, { OSSL_FUNC_MAC_FINAL, (void (*)(void))poly1305_final }, { OSSL_FUNC_MAC_GETTABLE_PARAMS, (void (*)(void))poly1305_gettable_params }, { OSSL_FUNC_MAC_GET_PARAMS, (void (*)(void))poly1305_get_params }, { OSSL_FUNC_MAC_SETTABLE_CTX_PARAMS, (void (*)(void))poly1305_settable_ctx_params }, { OSSL_FUNC_MAC_SET_CTX_PARAMS, (void (*)(void))poly1305_set_ctx_params }, OSSL_DISPATCH_END };
./openssl/providers/implementations/macs/blake2b_mac.c
/* * Copyright 2018-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Constants */ #define BLAKE2_CTX BLAKE2B_CTX #define BLAKE2_PARAM BLAKE2B_PARAM #define BLAKE2_KEYBYTES BLAKE2B_KEYBYTES #define BLAKE2_OUTBYTES BLAKE2B_OUTBYTES #define BLAKE2_PERSONALBYTES BLAKE2B_PERSONALBYTES #define BLAKE2_SALTBYTES BLAKE2B_SALTBYTES #define BLAKE2_BLOCKBYTES BLAKE2B_BLOCKBYTES /* Function names */ #define BLAKE2_PARAM_INIT ossl_blake2b_param_init #define BLAKE2_INIT_KEY ossl_blake2b_init_key #define BLAKE2_UPDATE ossl_blake2b_update #define BLAKE2_FINAL ossl_blake2b_final #define BLAKE2_PARAM_SET_DIGEST_LENGTH ossl_blake2b_param_set_digest_length #define BLAKE2_PARAM_SET_KEY_LENGTH ossl_blake2b_param_set_key_length #define BLAKE2_PARAM_SET_PERSONAL ossl_blake2b_param_set_personal #define BLAKE2_PARAM_SET_SALT ossl_blake2b_param_set_salt /* OSSL_DISPATCH symbol */ #define BLAKE2_FUNCTIONS ossl_blake2bmac_functions #include "blake2_mac_impl.c"
./openssl/providers/implementations/macs/blake2_mac_impl.c
/* * Copyright 2018-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/params.h> #include <openssl/proverr.h> #include "prov/blake2.h" #include "internal/cryptlib.h" #include "prov/implementations.h" #include "prov/providercommon.h" /* * Forward declaration of everything implemented here. This is not strictly * necessary for the compiler, but provides an assurance that the signatures * of the functions in the dispatch table are correct. */ static OSSL_FUNC_mac_newctx_fn blake2_mac_new; static OSSL_FUNC_mac_dupctx_fn blake2_mac_dup; static OSSL_FUNC_mac_freectx_fn blake2_mac_free; static OSSL_FUNC_mac_gettable_ctx_params_fn blake2_gettable_ctx_params; static OSSL_FUNC_mac_get_ctx_params_fn blake2_get_ctx_params; static OSSL_FUNC_mac_settable_ctx_params_fn blake2_mac_settable_ctx_params; static OSSL_FUNC_mac_set_ctx_params_fn blake2_mac_set_ctx_params; static OSSL_FUNC_mac_init_fn blake2_mac_init; static OSSL_FUNC_mac_update_fn blake2_mac_update; static OSSL_FUNC_mac_final_fn blake2_mac_final; struct blake2_mac_data_st { BLAKE2_CTX ctx; BLAKE2_PARAM params; unsigned char key[BLAKE2_KEYBYTES]; }; static void *blake2_mac_new(void *unused_provctx) { struct blake2_mac_data_st *macctx; if (!ossl_prov_is_running()) return NULL; macctx = OPENSSL_zalloc(sizeof(*macctx)); if (macctx != NULL) { BLAKE2_PARAM_INIT(&macctx->params); /* ctx initialization is deferred to BLAKE2b_Init() */ } return macctx; } static void *blake2_mac_dup(void *vsrc) { struct blake2_mac_data_st *dst; struct blake2_mac_data_st *src = vsrc; if (!ossl_prov_is_running()) return NULL; dst = OPENSSL_zalloc(sizeof(*dst)); if (dst == NULL) return NULL; *dst = *src; return dst; } static void blake2_mac_free(void *vmacctx) { struct blake2_mac_data_st *macctx = vmacctx; if (macctx != NULL) { OPENSSL_cleanse(macctx->key, sizeof(macctx->key)); OPENSSL_free(macctx); } } static size_t blake2_mac_size(void *vmacctx) { struct blake2_mac_data_st *macctx = vmacctx; return macctx->params.digest_length; } static int blake2_setkey(struct blake2_mac_data_st *macctx, const unsigned char *key, size_t keylen) { if (keylen > BLAKE2_KEYBYTES || keylen == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } memcpy(macctx->key, key, keylen); /* Pad with zeroes at the end if required */ if (keylen < BLAKE2_KEYBYTES) memset(macctx->key + keylen, 0, BLAKE2_KEYBYTES - keylen); BLAKE2_PARAM_SET_KEY_LENGTH(&macctx->params, (uint8_t)keylen); return 1; } static int blake2_mac_init(void *vmacctx, const unsigned char *key, size_t keylen, const OSSL_PARAM params[]) { struct blake2_mac_data_st *macctx = vmacctx; if (!ossl_prov_is_running() || !blake2_mac_set_ctx_params(macctx, params)) return 0; if (key != NULL) { if (!blake2_setkey(macctx, key, keylen)) return 0; } else if (macctx->params.key_length == 0) { /* Check key has been set */ ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET); return 0; } return BLAKE2_INIT_KEY(&macctx->ctx, &macctx->params, macctx->key); } static int blake2_mac_update(void *vmacctx, const unsigned char *data, size_t datalen) { struct blake2_mac_data_st *macctx = vmacctx; if (datalen == 0) return 1; return BLAKE2_UPDATE(&macctx->ctx, data, datalen); } static int blake2_mac_final(void *vmacctx, unsigned char *out, size_t *outl, size_t outsize) { struct blake2_mac_data_st *macctx = vmacctx; if (!ossl_prov_is_running()) return 0; *outl = blake2_mac_size(macctx); return BLAKE2_FINAL(out, &macctx->ctx); } static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), OSSL_PARAM_size_t(OSSL_MAC_PARAM_BLOCK_SIZE, NULL), OSSL_PARAM_END }; static const OSSL_PARAM *blake2_gettable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_gettable_ctx_params; } static int blake2_get_ctx_params(void *vmacctx, OSSL_PARAM params[]) { OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_SIZE)) != NULL && !OSSL_PARAM_set_size_t(p, blake2_mac_size(vmacctx))) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_BLOCK_SIZE)) != NULL && !OSSL_PARAM_set_size_t(p, BLAKE2_BLOCKBYTES)) return 0; return 1; } static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), OSSL_PARAM_octet_string(OSSL_MAC_PARAM_KEY, NULL, 0), OSSL_PARAM_octet_string(OSSL_MAC_PARAM_CUSTOM, NULL, 0), OSSL_PARAM_octet_string(OSSL_MAC_PARAM_SALT, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *blake2_mac_settable_ctx_params( ossl_unused void *ctx, ossl_unused void *p_ctx) { return known_settable_ctx_params; } /* * ALL parameters should be set before init(). */ static int blake2_mac_set_ctx_params(void *vmacctx, const OSSL_PARAM params[]) { struct blake2_mac_data_st *macctx = vmacctx; const OSSL_PARAM *p; if (params == NULL) return 1; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_SIZE)) != NULL) { size_t size; if (!OSSL_PARAM_get_size_t(p, &size) || size < 1 || size > BLAKE2_OUTBYTES) { ERR_raise(ERR_LIB_PROV, PROV_R_NOT_XOF_OR_INVALID_LENGTH); return 0; } BLAKE2_PARAM_SET_DIGEST_LENGTH(&macctx->params, (uint8_t)size); } if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_KEY)) != NULL && !blake2_setkey(macctx, p->data, p->data_size)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_CUSTOM)) != NULL) { /* * The OSSL_PARAM API doesn't provide direct pointer use, so we * must handle the OSSL_PARAM structure ourselves here */ if (p->data_size > BLAKE2_PERSONALBYTES) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_CUSTOM_LENGTH); return 0; } BLAKE2_PARAM_SET_PERSONAL(&macctx->params, p->data, p->data_size); } if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_SALT)) != NULL) { /* * The OSSL_PARAM API doesn't provide direct pointer use, so we * must handle the OSSL_PARAM structure ourselves here as well */ if (p->data_size > BLAKE2_SALTBYTES) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_SALT_LENGTH); return 0; } BLAKE2_PARAM_SET_SALT(&macctx->params, p->data, p->data_size); } return 1; } const OSSL_DISPATCH BLAKE2_FUNCTIONS[] = { { OSSL_FUNC_MAC_NEWCTX, (void (*)(void))blake2_mac_new }, { OSSL_FUNC_MAC_DUPCTX, (void (*)(void))blake2_mac_dup }, { OSSL_FUNC_MAC_FREECTX, (void (*)(void))blake2_mac_free }, { OSSL_FUNC_MAC_INIT, (void (*)(void))blake2_mac_init }, { OSSL_FUNC_MAC_UPDATE, (void (*)(void))blake2_mac_update }, { OSSL_FUNC_MAC_FINAL, (void (*)(void))blake2_mac_final }, { OSSL_FUNC_MAC_GETTABLE_CTX_PARAMS, (void (*)(void))blake2_gettable_ctx_params }, { OSSL_FUNC_MAC_GET_CTX_PARAMS, (void (*)(void))blake2_get_ctx_params }, { OSSL_FUNC_MAC_SETTABLE_CTX_PARAMS, (void (*)(void))blake2_mac_settable_ctx_params }, { OSSL_FUNC_MAC_SET_CTX_PARAMS, (void (*)(void))blake2_mac_set_ctx_params }, OSSL_DISPATCH_END };
./openssl/providers/implementations/macs/kmac_prov.c
/* * Copyright 2018-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * See SP800-185 "Appendix A - KMAC, .... in Terms of Keccak[c]" * * Inputs are: * K = Key (len(K) < 2^2040 bits) * X = Input * L = Output length (0 <= L < 2^2040 bits) * S = Customization String Default="" (len(S) < 2^2040 bits) * * KMAC128(K, X, L, S) * { * newX = bytepad(encode_string(K), 168) || X || right_encode(L). * T = bytepad(encode_string("KMAC") || encode_string(S), 168). * return KECCAK[256](T || newX || 00, L). * } * * KMAC256(K, X, L, S) * { * newX = bytepad(encode_string(K), 136) || X || right_encode(L). * T = bytepad(encode_string("KMAC") || encode_string(S), 136). * return KECCAK[512](T || newX || 00, L). * } * * KMAC128XOF(K, X, L, S) * { * newX = bytepad(encode_string(K), 168) || X || right_encode(0). * T = bytepad(encode_string("KMAC") || encode_string(S), 168). * return KECCAK[256](T || newX || 00, L). * } * * KMAC256XOF(K, X, L, S) * { * newX = bytepad(encode_string(K), 136) || X || right_encode(0). * T = bytepad(encode_string("KMAC") || encode_string(S), 136). * return KECCAK[512](T || newX || 00, L). * } * */ #include <stdlib.h> #include <string.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/params.h> #include <openssl/evp.h> #include <openssl/err.h> #include <openssl/proverr.h> #include "prov/implementations.h" #include "prov/provider_ctx.h" #include "prov/provider_util.h" #include "prov/providercommon.h" #include "internal/cryptlib.h" /* ossl_assert */ /* * Forward declaration of everything implemented here. This is not strictly * necessary for the compiler, but provides an assurance that the signatures * of the functions in the dispatch table are correct. */ static OSSL_FUNC_mac_newctx_fn kmac128_new; static OSSL_FUNC_mac_newctx_fn kmac256_new; static OSSL_FUNC_mac_dupctx_fn kmac_dup; static OSSL_FUNC_mac_freectx_fn kmac_free; static OSSL_FUNC_mac_gettable_ctx_params_fn kmac_gettable_ctx_params; static OSSL_FUNC_mac_get_ctx_params_fn kmac_get_ctx_params; static OSSL_FUNC_mac_settable_ctx_params_fn kmac_settable_ctx_params; static OSSL_FUNC_mac_set_ctx_params_fn kmac_set_ctx_params; static OSSL_FUNC_mac_init_fn kmac_init; static OSSL_FUNC_mac_update_fn kmac_update; static OSSL_FUNC_mac_final_fn kmac_final; #define KMAC_MAX_BLOCKSIZE ((1600 - 128 * 2) / 8) /* 168 */ /* * Length encoding will be a 1 byte size + length in bits (3 bytes max) * This gives a range of 0..0XFFFFFF bits = 2097151 bytes). */ #define KMAC_MAX_OUTPUT_LEN (0xFFFFFF / 8) #define KMAC_MAX_ENCODED_HEADER_LEN (1 + 3) /* * Restrict the maximum length of the customisation string. This must not * exceed 64 bits = 8k bytes. */ #define KMAC_MAX_CUSTOM 512 /* Maximum size of encoded custom string */ #define KMAC_MAX_CUSTOM_ENCODED (KMAC_MAX_CUSTOM + KMAC_MAX_ENCODED_HEADER_LEN) /* Maximum key size in bytes = 512 (4096 bits) */ #define KMAC_MAX_KEY 512 #define KMAC_MIN_KEY 4 /* * Maximum Encoded Key size will be padded to a multiple of the blocksize * i.e KMAC_MAX_KEY + KMAC_MAX_ENCODED_HEADER_LEN = 512 + 4 * Padded to a multiple of KMAC_MAX_BLOCKSIZE */ #define KMAC_MAX_KEY_ENCODED (KMAC_MAX_BLOCKSIZE * 4) /* Fixed value of encode_string("KMAC") */ static const unsigned char kmac_string[] = { 0x01, 0x20, 0x4B, 0x4D, 0x41, 0x43 }; #define KMAC_FLAG_XOF_MODE 1 struct kmac_data_st { void *provctx; EVP_MD_CTX *ctx; PROV_DIGEST digest; size_t out_len; size_t key_len; size_t custom_len; /* If xof_mode = 1 then we use right_encode(0) */ int xof_mode; /* key and custom are stored in encoded form */ unsigned char key[KMAC_MAX_KEY_ENCODED]; unsigned char custom[KMAC_MAX_CUSTOM_ENCODED]; }; static int encode_string(unsigned char *out, size_t out_max_len, size_t *out_len, const unsigned char *in, size_t in_len); static int right_encode(unsigned char *out, size_t out_max_len, size_t *out_len, size_t bits); static int bytepad(unsigned char *out, size_t *out_len, const unsigned char *in1, size_t in1_len, const unsigned char *in2, size_t in2_len, size_t w); static int kmac_bytepad_encode_key(unsigned char *out, size_t out_max_len, size_t *out_len, const unsigned char *in, size_t in_len, size_t w); static void kmac_free(void *vmacctx) { struct kmac_data_st *kctx = vmacctx; if (kctx != NULL) { EVP_MD_CTX_free(kctx->ctx); ossl_prov_digest_reset(&kctx->digest); OPENSSL_cleanse(kctx->key, kctx->key_len); OPENSSL_cleanse(kctx->custom, kctx->custom_len); OPENSSL_free(kctx); } } /* * We have KMAC implemented as a hash, which we can use instead of * reimplementing the EVP functionality with direct use of * keccak_mac_init() and friends. */ static struct kmac_data_st *kmac_new(void *provctx) { struct kmac_data_st *kctx; if (!ossl_prov_is_running()) return NULL; if ((kctx = OPENSSL_zalloc(sizeof(*kctx))) == NULL || (kctx->ctx = EVP_MD_CTX_new()) == NULL) { kmac_free(kctx); return NULL; } kctx->provctx = provctx; return kctx; } static void *kmac_fetch_new(void *provctx, const OSSL_PARAM *params) { struct kmac_data_st *kctx = kmac_new(provctx); if (kctx == NULL) return 0; if (!ossl_prov_digest_load_from_params(&kctx->digest, params, PROV_LIBCTX_OF(provctx))) { kmac_free(kctx); return 0; } kctx->out_len = EVP_MD_get_size(ossl_prov_digest_md(&kctx->digest)); return kctx; } static void *kmac128_new(void *provctx) { static const OSSL_PARAM kmac128_params[] = { OSSL_PARAM_utf8_string("digest", OSSL_DIGEST_NAME_KECCAK_KMAC128, sizeof(OSSL_DIGEST_NAME_KECCAK_KMAC128)), OSSL_PARAM_END }; return kmac_fetch_new(provctx, kmac128_params); } static void *kmac256_new(void *provctx) { static const OSSL_PARAM kmac256_params[] = { OSSL_PARAM_utf8_string("digest", OSSL_DIGEST_NAME_KECCAK_KMAC256, sizeof(OSSL_DIGEST_NAME_KECCAK_KMAC256)), OSSL_PARAM_END }; return kmac_fetch_new(provctx, kmac256_params); } static void *kmac_dup(void *vsrc) { struct kmac_data_st *src = vsrc; struct kmac_data_st *dst; if (!ossl_prov_is_running()) return NULL; dst = kmac_new(src->provctx); if (dst == NULL) return NULL; if (!EVP_MD_CTX_copy(dst->ctx, src->ctx) || !ossl_prov_digest_copy(&dst->digest, &src->digest)) { kmac_free(dst); return NULL; } dst->out_len = src->out_len; dst->key_len = src->key_len; dst->custom_len = src->custom_len; dst->xof_mode = src->xof_mode; memcpy(dst->key, src->key, src->key_len); memcpy(dst->custom, src->custom, dst->custom_len); return dst; } static int kmac_setkey(struct kmac_data_st *kctx, const unsigned char *key, size_t keylen) { const EVP_MD *digest = ossl_prov_digest_md(&kctx->digest); int w = EVP_MD_get_block_size(digest); if (keylen < KMAC_MIN_KEY || keylen > KMAC_MAX_KEY) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } if (w <= 0) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_DIGEST_LENGTH); return 0; } if (!kmac_bytepad_encode_key(kctx->key, sizeof(kctx->key), &kctx->key_len, key, keylen, (size_t)w)) return 0; return 1; } /* * The init() assumes that any ctrl methods are set beforehand for * md, key and custom. Setting the fields afterwards will have no * effect on the output mac. */ static int kmac_init(void *vmacctx, const unsigned char *key, size_t keylen, const OSSL_PARAM params[]) { struct kmac_data_st *kctx = vmacctx; EVP_MD_CTX *ctx = kctx->ctx; unsigned char *out; size_t out_len, block_len; int res, t; if (!ossl_prov_is_running() || !kmac_set_ctx_params(kctx, params)) return 0; if (key != NULL) { if (!kmac_setkey(kctx, key, keylen)) return 0; } else if (kctx->key_len == 0) { /* Check key has been set */ ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET); return 0; } if (!EVP_DigestInit_ex(kctx->ctx, ossl_prov_digest_md(&kctx->digest), NULL)) return 0; t = EVP_MD_get_block_size(ossl_prov_digest_md(&kctx->digest)); if (t <= 0) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_DIGEST_LENGTH); return 0; } block_len = t; /* Set default custom string if it is not already set */ if (kctx->custom_len == 0) { const OSSL_PARAM cparams[] = { OSSL_PARAM_octet_string(OSSL_MAC_PARAM_CUSTOM, "", 0), OSSL_PARAM_END }; (void)kmac_set_ctx_params(kctx, cparams); } if (!bytepad(NULL, &out_len, kmac_string, sizeof(kmac_string), kctx->custom, kctx->custom_len, block_len)) { ERR_raise(ERR_LIB_PROV, ERR_R_INTERNAL_ERROR); return 0; } out = OPENSSL_malloc(out_len); if (out == NULL) return 0; res = bytepad(out, NULL, kmac_string, sizeof(kmac_string), kctx->custom, kctx->custom_len, block_len) && EVP_DigestUpdate(ctx, out, out_len) && EVP_DigestUpdate(ctx, kctx->key, kctx->key_len); OPENSSL_free(out); return res; } static int kmac_update(void *vmacctx, const unsigned char *data, size_t datalen) { struct kmac_data_st *kctx = vmacctx; return EVP_DigestUpdate(kctx->ctx, data, datalen); } static int kmac_final(void *vmacctx, unsigned char *out, size_t *outl, size_t outsize) { struct kmac_data_st *kctx = vmacctx; EVP_MD_CTX *ctx = kctx->ctx; size_t lbits, len; unsigned char encoded_outlen[KMAC_MAX_ENCODED_HEADER_LEN]; int ok; if (!ossl_prov_is_running()) return 0; /* KMAC XOF mode sets the encoded length to 0 */ lbits = (kctx->xof_mode ? 0 : (kctx->out_len * 8)); ok = right_encode(encoded_outlen, sizeof(encoded_outlen), &len, lbits) && EVP_DigestUpdate(ctx, encoded_outlen, len) && EVP_DigestFinalXOF(ctx, out, kctx->out_len); *outl = kctx->out_len; return ok; } static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), OSSL_PARAM_size_t(OSSL_MAC_PARAM_BLOCK_SIZE, NULL), OSSL_PARAM_END }; static const OSSL_PARAM *kmac_gettable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_gettable_ctx_params; } static int kmac_get_ctx_params(void *vmacctx, OSSL_PARAM params[]) { struct kmac_data_st *kctx = vmacctx; OSSL_PARAM *p; int sz; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_SIZE)) != NULL && !OSSL_PARAM_set_size_t(p, kctx->out_len)) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_BLOCK_SIZE)) != NULL) { sz = EVP_MD_block_size(ossl_prov_digest_md(&kctx->digest)); if (!OSSL_PARAM_set_int(p, sz)) return 0; } return 1; } static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_int(OSSL_MAC_PARAM_XOF, NULL), OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), OSSL_PARAM_octet_string(OSSL_MAC_PARAM_KEY, NULL, 0), OSSL_PARAM_octet_string(OSSL_MAC_PARAM_CUSTOM, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *kmac_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_settable_ctx_params; } /* * The following params can be set any time before final(): * - "outlen" or "size": The requested output length. * - "xof": If set, this indicates that right_encoded(0) * is part of the digested data, otherwise it * uses right_encoded(requested output length). * * All other params should be set before init(). */ static int kmac_set_ctx_params(void *vmacctx, const OSSL_PARAM *params) { struct kmac_data_st *kctx = vmacctx; const OSSL_PARAM *p; if (params == NULL) return 1; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_XOF)) != NULL && !OSSL_PARAM_get_int(p, &kctx->xof_mode)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_SIZE)) != NULL) { size_t sz = 0; if (!OSSL_PARAM_get_size_t(p, &sz)) return 0; if (sz > KMAC_MAX_OUTPUT_LEN) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_OUTPUT_LENGTH); return 0; } kctx->out_len = sz; } if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_KEY)) != NULL && !kmac_setkey(kctx, p->data, p->data_size)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_CUSTOM)) != NULL) { if (p->data_size > KMAC_MAX_CUSTOM) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_CUSTOM_LENGTH); return 0; } if (!encode_string(kctx->custom, sizeof(kctx->custom), &kctx->custom_len, p->data, p->data_size)) return 0; } return 1; } /* Encoding/Padding Methods. */ /* Returns the number of bytes required to store 'bits' into a byte array */ static unsigned int get_encode_size(size_t bits) { unsigned int cnt = 0, sz = sizeof(size_t); while (bits && (cnt < sz)) { ++cnt; bits >>= 8; } /* If bits is zero 1 byte is required */ if (cnt == 0) cnt = 1; return cnt; } /* * Convert an integer into bytes . The number of bytes is appended * to the end of the buffer. Returns an array of bytes 'out' of size * *out_len. * * e.g if bits = 32, out[2] = { 0x20, 0x01 } */ static int right_encode(unsigned char *out, size_t out_max_len, size_t *out_len, size_t bits) { unsigned int len = get_encode_size(bits); int i; if (len >= out_max_len) { ERR_raise(ERR_LIB_PROV, PROV_R_LENGTH_TOO_LARGE); return 0; } /* MSB's are at the start of the bytes array */ for (i = len - 1; i >= 0; --i) { out[i] = (unsigned char)(bits & 0xFF); bits >>= 8; } /* Tack the length onto the end */ out[len] = (unsigned char)len; /* The Returned length includes the tacked on byte */ *out_len = len + 1; return 1; } /* * Encodes a string with a left encoded length added. Note that the * in_len is converted to bits (*8). * * e.g- in="KMAC" gives out[6] = { 0x01, 0x20, 0x4B, 0x4D, 0x41, 0x43 } * len bits K M A C */ static int encode_string(unsigned char *out, size_t out_max_len, size_t *out_len, const unsigned char *in, size_t in_len) { if (in == NULL) { *out_len = 0; } else { size_t i, bits, len, sz; bits = 8 * in_len; len = get_encode_size(bits); sz = 1 + len + in_len; if (sz > out_max_len) { ERR_raise(ERR_LIB_PROV, PROV_R_LENGTH_TOO_LARGE); return 0; } out[0] = (unsigned char)len; for (i = len; i > 0; --i) { out[i] = (bits & 0xFF); bits >>= 8; } memcpy(out + len + 1, in, in_len); *out_len = sz; } return 1; } /* * Returns a zero padded encoding of the inputs in1 and an optional * in2 (can be NULL). The padded output must be a multiple of the blocksize 'w'. * The value of w is in bytes (< 256). * * The returned output is: * zero_padded(multiple of w, (left_encode(w) || in1 [|| in2]) */ static int bytepad(unsigned char *out, size_t *out_len, const unsigned char *in1, size_t in1_len, const unsigned char *in2, size_t in2_len, size_t w) { int len; unsigned char *p = out; int sz = w; if (out == NULL) { if (out_len == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); return 0; } sz = 2 + in1_len + (in2 != NULL ? in2_len : 0); *out_len = (sz + w - 1) / w * w; return 1; } if (!ossl_assert(w <= 255)) return 0; /* Left encoded w */ *p++ = 1; *p++ = (unsigned char)w; /* || in1 */ memcpy(p, in1, in1_len); p += in1_len; /* [ || in2 ] */ if (in2 != NULL && in2_len > 0) { memcpy(p, in2, in2_len); p += in2_len; } /* Figure out the pad size (divisible by w) */ len = p - out; sz = (len + w - 1) / w * w; /* zero pad the end of the buffer */ if (sz != len) memset(p, 0, sz - len); if (out_len != NULL) *out_len = sz; return 1; } /* Returns out = bytepad(encode_string(in), w) */ static int kmac_bytepad_encode_key(unsigned char *out, size_t out_max_len, size_t *out_len, const unsigned char *in, size_t in_len, size_t w) { unsigned char tmp[KMAC_MAX_KEY + KMAC_MAX_ENCODED_HEADER_LEN]; size_t tmp_len; if (!encode_string(tmp, sizeof(tmp), &tmp_len, in, in_len)) return 0; if (!bytepad(NULL, out_len, tmp, tmp_len, NULL, 0, w)) return 0; if (!ossl_assert(*out_len <= out_max_len)) return 0; return bytepad(out, NULL, tmp, tmp_len, NULL, 0, w); } const OSSL_DISPATCH ossl_kmac128_functions[] = { { OSSL_FUNC_MAC_NEWCTX, (void (*)(void))kmac128_new }, { OSSL_FUNC_MAC_DUPCTX, (void (*)(void))kmac_dup }, { OSSL_FUNC_MAC_FREECTX, (void (*)(void))kmac_free }, { OSSL_FUNC_MAC_INIT, (void (*)(void))kmac_init }, { OSSL_FUNC_MAC_UPDATE, (void (*)(void))kmac_update }, { OSSL_FUNC_MAC_FINAL, (void (*)(void))kmac_final }, { OSSL_FUNC_MAC_GETTABLE_CTX_PARAMS, (void (*)(void))kmac_gettable_ctx_params }, { OSSL_FUNC_MAC_GET_CTX_PARAMS, (void (*)(void))kmac_get_ctx_params }, { OSSL_FUNC_MAC_SETTABLE_CTX_PARAMS, (void (*)(void))kmac_settable_ctx_params }, { OSSL_FUNC_MAC_SET_CTX_PARAMS, (void (*)(void))kmac_set_ctx_params }, OSSL_DISPATCH_END }; const OSSL_DISPATCH ossl_kmac256_functions[] = { { OSSL_FUNC_MAC_NEWCTX, (void (*)(void))kmac256_new }, { OSSL_FUNC_MAC_DUPCTX, (void (*)(void))kmac_dup }, { OSSL_FUNC_MAC_FREECTX, (void (*)(void))kmac_free }, { OSSL_FUNC_MAC_INIT, (void (*)(void))kmac_init }, { OSSL_FUNC_MAC_UPDATE, (void (*)(void))kmac_update }, { OSSL_FUNC_MAC_FINAL, (void (*)(void))kmac_final }, { OSSL_FUNC_MAC_GETTABLE_CTX_PARAMS, (void (*)(void))kmac_gettable_ctx_params }, { OSSL_FUNC_MAC_GET_CTX_PARAMS, (void (*)(void))kmac_get_ctx_params }, { OSSL_FUNC_MAC_SETTABLE_CTX_PARAMS, (void (*)(void))kmac_settable_ctx_params }, { OSSL_FUNC_MAC_SET_CTX_PARAMS, (void (*)(void))kmac_set_ctx_params }, OSSL_DISPATCH_END };
./openssl/providers/implementations/storemgmt/file_store.c
/* * Copyright 2020-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* This file has quite some overlap with engines/e_loader_attic.c */ #include <string.h> #include <sys/stat.h> #include <ctype.h> /* isdigit */ #include <assert.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/core_object.h> #include <openssl/bio.h> #include <openssl/err.h> #include <openssl/params.h> #include <openssl/decoder.h> #include <openssl/proverr.h> #include <openssl/store.h> /* The OSSL_STORE_INFO type numbers */ #include "internal/cryptlib.h" #include "internal/o_dir.h" #include "crypto/decoder.h" #include "crypto/ctype.h" /* ossl_isdigit() */ #include "prov/implementations.h" #include "prov/bio.h" #include "file_store_local.h" DEFINE_STACK_OF(OSSL_STORE_INFO) #ifdef _WIN32 # define stat _stat #endif #ifndef S_ISDIR # define S_ISDIR(a) (((a) & S_IFMT) == S_IFDIR) #endif static OSSL_FUNC_store_open_fn file_open; static OSSL_FUNC_store_attach_fn file_attach; static OSSL_FUNC_store_settable_ctx_params_fn file_settable_ctx_params; static OSSL_FUNC_store_set_ctx_params_fn file_set_ctx_params; static OSSL_FUNC_store_load_fn file_load; static OSSL_FUNC_store_eof_fn file_eof; static OSSL_FUNC_store_close_fn file_close; /* * This implementation makes full use of OSSL_DECODER, and then some. * It uses its own internal decoder implementation that reads DER and * passes that on to the data callback; this decoder is created with * internal OpenSSL functions, thereby bypassing the need for a surrounding * provider. This is ok, since this is a local decoder, not meant for * public consumption. * Finally, it sets up its own construct and cleanup functions. * * Essentially, that makes this implementation a kind of glorified decoder. */ struct file_ctx_st { void *provctx; char *uri; /* The URI we currently try to load */ enum { IS_FILE = 0, /* Read file and pass results */ IS_DIR /* Pass directory entry names */ } type; union { /* Used with |IS_FILE| */ struct { BIO *file; OSSL_DECODER_CTX *decoderctx; char *input_type; char *propq; /* The properties we got as a parameter */ } file; /* Used with |IS_DIR| */ struct { OPENSSL_DIR_CTX *ctx; int end_reached; /* * When a search expression is given, these are filled in. * |search_name| contains the file basename to look for. * The string is exactly 8 characters long. */ char search_name[9]; /* * The directory reading utility we have combines opening with * reading the first name. To make sure we can detect the end * at the right time, we read early and cache the name. */ const char *last_entry; int last_errno; } dir; } _; /* Expected object type. May be unspecified */ int expected_type; }; static void free_file_ctx(struct file_ctx_st *ctx) { if (ctx == NULL) return; OPENSSL_free(ctx->uri); if (ctx->type != IS_DIR) { OSSL_DECODER_CTX_free(ctx->_.file.decoderctx); OPENSSL_free(ctx->_.file.propq); OPENSSL_free(ctx->_.file.input_type); } OPENSSL_free(ctx); } static struct file_ctx_st *new_file_ctx(int type, const char *uri, void *provctx) { struct file_ctx_st *ctx = NULL; if ((ctx = OPENSSL_zalloc(sizeof(*ctx))) != NULL && (uri == NULL || (ctx->uri = OPENSSL_strdup(uri)) != NULL)) { ctx->type = type; ctx->provctx = provctx; return ctx; } free_file_ctx(ctx); return NULL; } static OSSL_DECODER_CONSTRUCT file_load_construct; static OSSL_DECODER_CLEANUP file_load_cleanup; /*- * Opening / attaching streams and directories * ------------------------------------------- */ /* * Function to service both file_open() and file_attach() * * */ static struct file_ctx_st *file_open_stream(BIO *source, const char *uri, void *provctx) { struct file_ctx_st *ctx; if ((ctx = new_file_ctx(IS_FILE, uri, provctx)) == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_PROV_LIB); goto err; } ctx->_.file.file = source; return ctx; err: free_file_ctx(ctx); return NULL; } static void *file_open_dir(const char *path, const char *uri, void *provctx) { struct file_ctx_st *ctx; if ((ctx = new_file_ctx(IS_DIR, uri, provctx)) == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_PROV_LIB); return NULL; } ctx->_.dir.last_entry = OPENSSL_DIR_read(&ctx->_.dir.ctx, path); ctx->_.dir.last_errno = errno; if (ctx->_.dir.last_entry == NULL) { if (ctx->_.dir.last_errno != 0) { ERR_raise_data(ERR_LIB_SYS, ctx->_.dir.last_errno, "Calling OPENSSL_DIR_read(\"%s\")", path); goto err; } ctx->_.dir.end_reached = 1; } return ctx; err: file_close(ctx); return NULL; } static void *file_open(void *provctx, const char *uri) { struct file_ctx_st *ctx = NULL; struct stat st; struct { const char *path; unsigned int check_absolute:1; } path_data[2]; size_t path_data_n = 0, i; const char *path, *p = uri, *q; BIO *bio; ERR_set_mark(); /* * First step, just take the URI as is. */ path_data[path_data_n].check_absolute = 0; path_data[path_data_n++].path = uri; /* * Second step, if the URI appears to start with the "file" scheme, * extract the path and make that the second path to check. * There's a special case if the URI also contains an authority, then * the full URI shouldn't be used as a path anywhere. */ if (CHECK_AND_SKIP_CASE_PREFIX(p, "file:")) { q = p; if (CHECK_AND_SKIP_CASE_PREFIX(q, "//")) { path_data_n--; /* Invalidate using the full URI */ if (CHECK_AND_SKIP_CASE_PREFIX(q, "localhost/") || CHECK_AND_SKIP_CASE_PREFIX(q, "/")) { p = q - 1; } else { ERR_clear_last_mark(); ERR_raise(ERR_LIB_PROV, PROV_R_URI_AUTHORITY_UNSUPPORTED); return NULL; } } path_data[path_data_n].check_absolute = 1; #ifdef _WIN32 /* Windows "file:" URIs with a drive letter start with a '/' */ if (p[0] == '/' && p[2] == ':' && p[3] == '/') { char c = tolower(p[1]); if (c >= 'a' && c <= 'z') { p++; /* We know it's absolute, so no need to check */ path_data[path_data_n].check_absolute = 0; } } #endif path_data[path_data_n++].path = p; } for (i = 0, path = NULL; path == NULL && i < path_data_n; i++) { /* * If the scheme "file" was an explicit part of the URI, the path must * be absolute. So says RFC 8089 */ if (path_data[i].check_absolute && path_data[i].path[0] != '/') { ERR_clear_last_mark(); ERR_raise_data(ERR_LIB_PROV, PROV_R_PATH_MUST_BE_ABSOLUTE, "Given path=%s", path_data[i].path); return NULL; } if (stat(path_data[i].path, &st) < 0) { ERR_raise_data(ERR_LIB_SYS, errno, "calling stat(%s)", path_data[i].path); } else { path = path_data[i].path; } } if (path == NULL) { ERR_clear_last_mark(); return NULL; } /* Successfully found a working path, clear possible collected errors */ ERR_pop_to_mark(); if (S_ISDIR(st.st_mode)) ctx = file_open_dir(path, uri, provctx); else if ((bio = BIO_new_file(path, "rb")) == NULL || (ctx = file_open_stream(bio, uri, provctx)) == NULL) BIO_free_all(bio); return ctx; } void *file_attach(void *provctx, OSSL_CORE_BIO *cin) { struct file_ctx_st *ctx; BIO *new_bio = ossl_bio_new_from_core_bio(provctx, cin); if (new_bio == NULL) return NULL; ctx = file_open_stream(new_bio, NULL, provctx); if (ctx == NULL) BIO_free(new_bio); return ctx; } /*- * Setting parameters * ------------------ */ static const OSSL_PARAM *file_settable_ctx_params(void *provctx) { static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_STORE_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_int(OSSL_STORE_PARAM_EXPECT, NULL), OSSL_PARAM_octet_string(OSSL_STORE_PARAM_SUBJECT, NULL, 0), OSSL_PARAM_utf8_string(OSSL_STORE_PARAM_INPUT_TYPE, NULL, 0), OSSL_PARAM_END }; return known_settable_ctx_params; } static int file_set_ctx_params(void *loaderctx, const OSSL_PARAM params[]) { struct file_ctx_st *ctx = loaderctx; const OSSL_PARAM *p; if (params == NULL) return 1; if (ctx->type != IS_DIR) { /* these parameters are ignored for directories */ p = OSSL_PARAM_locate_const(params, OSSL_STORE_PARAM_PROPERTIES); if (p != NULL) { OPENSSL_free(ctx->_.file.propq); ctx->_.file.propq = NULL; if (!OSSL_PARAM_get_utf8_string(p, &ctx->_.file.propq, 0)) return 0; } p = OSSL_PARAM_locate_const(params, OSSL_STORE_PARAM_INPUT_TYPE); if (p != NULL) { OPENSSL_free(ctx->_.file.input_type); ctx->_.file.input_type = NULL; if (!OSSL_PARAM_get_utf8_string(p, &ctx->_.file.input_type, 0)) return 0; } } p = OSSL_PARAM_locate_const(params, OSSL_STORE_PARAM_EXPECT); if (p != NULL && !OSSL_PARAM_get_int(p, &ctx->expected_type)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_STORE_PARAM_SUBJECT); if (p != NULL) { const unsigned char *der = NULL; size_t der_len = 0; X509_NAME *x509_name; unsigned long hash; int ok; if (ctx->type != IS_DIR) { ERR_raise(ERR_LIB_PROV, PROV_R_SEARCH_ONLY_SUPPORTED_FOR_DIRECTORIES); return 0; } if (!OSSL_PARAM_get_octet_string_ptr(p, (const void **)&der, &der_len) || (x509_name = d2i_X509_NAME(NULL, &der, der_len)) == NULL) return 0; hash = X509_NAME_hash_ex(x509_name, ossl_prov_ctx_get0_libctx(ctx->provctx), NULL, &ok); BIO_snprintf(ctx->_.dir.search_name, sizeof(ctx->_.dir.search_name), "%08lx", hash); X509_NAME_free(x509_name); if (ok == 0) return 0; } return 1; } /*- * Loading an object from a stream * ------------------------------- */ struct file_load_data_st { OSSL_CALLBACK *object_cb; void *object_cbarg; }; static int file_load_construct(OSSL_DECODER_INSTANCE *decoder_inst, const OSSL_PARAM *params, void *construct_data) { struct file_load_data_st *data = construct_data; /* * At some point, we may find it justifiable to recognise PKCS#12 and * handle it specially here, making |file_load()| return pass its * contents one piece at ta time, like |e_loader_attic.c| does. * * However, that currently means parsing them out, which converts the * DER encoded PKCS#12 into a bunch of EVP_PKEYs and X509s, just to * have to re-encode them into DER to create an object abstraction for * each of them. * It's much simpler (less churn) to pass on the object abstraction we * get to the load_result callback and leave it to that one to do the * work. If that's libcrypto code, we know that it has much better * possibilities to handle the EVP_PKEYs and X509s without the extra * churn. */ return data->object_cb(params, data->object_cbarg); } void file_load_cleanup(void *construct_data) { /* Nothing to do */ } static int file_setup_decoders(struct file_ctx_st *ctx) { OSSL_LIB_CTX *libctx = ossl_prov_ctx_get0_libctx(ctx->provctx); const OSSL_ALGORITHM *to_algo = NULL; int ok = 0; /* Setup for this session, so only if not already done */ if (ctx->_.file.decoderctx == NULL) { if ((ctx->_.file.decoderctx = OSSL_DECODER_CTX_new()) == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } /* Make sure the input type is set */ if (!OSSL_DECODER_CTX_set_input_type(ctx->_.file.decoderctx, ctx->_.file.input_type)) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } /* * Where applicable, set the outermost structure name. * The goal is to avoid the STORE object types that are * potentially password protected but aren't interesting * for this load. */ switch (ctx->expected_type) { case OSSL_STORE_INFO_CERT: if (!OSSL_DECODER_CTX_set_input_structure(ctx->_.file.decoderctx, "Certificate")) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } break; case OSSL_STORE_INFO_CRL: if (!OSSL_DECODER_CTX_set_input_structure(ctx->_.file.decoderctx, "CertificateList")) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } break; default: break; } for (to_algo = ossl_any_to_obj_algorithm; to_algo->algorithm_names != NULL; to_algo++) { OSSL_DECODER *to_obj = NULL; OSSL_DECODER_INSTANCE *to_obj_inst = NULL; /* * Create the internal last resort decoder implementation * together with a "decoder instance". * The decoder doesn't need any identification or to be * attached to any provider, since it's only used locally. */ to_obj = ossl_decoder_from_algorithm(0, to_algo, NULL); if (to_obj != NULL) to_obj_inst = ossl_decoder_instance_new(to_obj, ctx->provctx); OSSL_DECODER_free(to_obj); if (to_obj_inst == NULL) goto err; if (!ossl_decoder_ctx_add_decoder_inst(ctx->_.file.decoderctx, to_obj_inst)) { ossl_decoder_instance_free(to_obj_inst); ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } } /* Add on the usual extra decoders */ if (!OSSL_DECODER_CTX_add_extra(ctx->_.file.decoderctx, libctx, ctx->_.file.propq)) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } /* * Then install our constructor hooks, which just passes decoded * data to the load callback */ if (!OSSL_DECODER_CTX_set_construct(ctx->_.file.decoderctx, file_load_construct) || !OSSL_DECODER_CTX_set_cleanup(ctx->_.file.decoderctx, file_load_cleanup)) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } } ok = 1; err: return ok; } static int file_load_file(struct file_ctx_st *ctx, OSSL_CALLBACK *object_cb, void *object_cbarg, OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg) { struct file_load_data_st data; int ret, err; /* Setup the decoders (one time shot per session */ if (!file_setup_decoders(ctx)) return 0; /* Setup for this object */ data.object_cb = object_cb; data.object_cbarg = object_cbarg; OSSL_DECODER_CTX_set_construct_data(ctx->_.file.decoderctx, &data); OSSL_DECODER_CTX_set_passphrase_cb(ctx->_.file.decoderctx, pw_cb, pw_cbarg); /* Launch */ ERR_set_mark(); ret = OSSL_DECODER_from_bio(ctx->_.file.decoderctx, ctx->_.file.file); if (BIO_eof(ctx->_.file.file) && ((err = ERR_peek_last_error()) != 0) && ERR_GET_LIB(err) == ERR_LIB_OSSL_DECODER && ERR_GET_REASON(err) == ERR_R_UNSUPPORTED) ERR_pop_to_mark(); else ERR_clear_last_mark(); return ret; } /*- * Loading a name object from a directory * -------------------------------------- */ static char *file_name_to_uri(struct file_ctx_st *ctx, const char *name) { char *data = NULL; assert(name != NULL); { const char *pathsep = ossl_ends_with_dirsep(ctx->uri) ? "" : "/"; long calculated_length = strlen(ctx->uri) + strlen(pathsep) + strlen(name) + 1 /* \0 */; data = OPENSSL_zalloc(calculated_length); if (data == NULL) return NULL; OPENSSL_strlcat(data, ctx->uri, calculated_length); OPENSSL_strlcat(data, pathsep, calculated_length); OPENSSL_strlcat(data, name, calculated_length); } return data; } static int file_name_check(struct file_ctx_st *ctx, const char *name) { const char *p = NULL; size_t len = strlen(ctx->_.dir.search_name); /* If there are no search criteria, all names are accepted */ if (ctx->_.dir.search_name[0] == '\0') return 1; /* If the expected type isn't supported, no name is accepted */ if (ctx->expected_type != 0 && ctx->expected_type != OSSL_STORE_INFO_CERT && ctx->expected_type != OSSL_STORE_INFO_CRL) return 0; /* * First, check the basename */ if (OPENSSL_strncasecmp(name, ctx->_.dir.search_name, len) != 0 || name[len] != '.') return 0; p = &name[len + 1]; /* * Then, if the expected type is a CRL, check that the extension starts * with 'r' */ if (*p == 'r') { p++; if (ctx->expected_type != 0 && ctx->expected_type != OSSL_STORE_INFO_CRL) return 0; } else if (ctx->expected_type == OSSL_STORE_INFO_CRL) { return 0; } /* * Last, check that the rest of the extension is a decimal number, at * least one digit long. */ if (!isdigit((unsigned char)*p)) return 0; while (isdigit((unsigned char)*p)) p++; #ifdef __VMS /* * One extra step here, check for a possible generation number. */ if (*p == ';') for (p++; *p != '\0'; p++) if (!ossl_isdigit((unsigned char)*p)) break; #endif /* * If we've reached the end of the string at this point, we've successfully * found a fitting file name. */ return *p == '\0'; } static int file_load_dir_entry(struct file_ctx_st *ctx, OSSL_CALLBACK *object_cb, void *object_cbarg, OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg) { /* Prepare as much as possible in advance */ static const int object_type = OSSL_OBJECT_NAME; OSSL_PARAM object[] = { OSSL_PARAM_int(OSSL_OBJECT_PARAM_TYPE, (int *)&object_type), OSSL_PARAM_utf8_string(OSSL_OBJECT_PARAM_DATA, NULL, 0), OSSL_PARAM_END }; char *newname = NULL; int ok; /* Loop until we get an error or until we have a suitable name */ do { if (ctx->_.dir.last_entry == NULL) { if (!ctx->_.dir.end_reached) { assert(ctx->_.dir.last_errno != 0); ERR_raise(ERR_LIB_SYS, ctx->_.dir.last_errno); } /* file_eof() will tell if EOF was reached */ return 0; } /* flag acceptable names */ if (ctx->_.dir.last_entry[0] != '.' && file_name_check(ctx, ctx->_.dir.last_entry)) { /* If we can't allocate the new name, we fail */ if ((newname = file_name_to_uri(ctx, ctx->_.dir.last_entry)) == NULL) return 0; } /* * On the first call (with a NULL context), OPENSSL_DIR_read() * cares about the second argument. On the following calls, it * only cares that it isn't NULL. Therefore, we can safely give * it our URI here. */ ctx->_.dir.last_entry = OPENSSL_DIR_read(&ctx->_.dir.ctx, ctx->uri); ctx->_.dir.last_errno = errno; if (ctx->_.dir.last_entry == NULL && ctx->_.dir.last_errno == 0) ctx->_.dir.end_reached = 1; } while (newname == NULL); object[1].data = newname; object[1].data_size = strlen(newname); ok = object_cb(object, object_cbarg); OPENSSL_free(newname); return ok; } /*- * Loading, local dispatcher * ------------------------- */ static int file_load(void *loaderctx, OSSL_CALLBACK *object_cb, void *object_cbarg, OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg) { struct file_ctx_st *ctx = loaderctx; switch (ctx->type) { case IS_FILE: return file_load_file(ctx, object_cb, object_cbarg, pw_cb, pw_cbarg); case IS_DIR: return file_load_dir_entry(ctx, object_cb, object_cbarg, pw_cb, pw_cbarg); default: break; } /* ctx->type has an unexpected value */ assert(0); return 0; } /*- * Eof detection and closing * ------------------------- */ static int file_eof(void *loaderctx) { struct file_ctx_st *ctx = loaderctx; switch (ctx->type) { case IS_DIR: return ctx->_.dir.end_reached; case IS_FILE: /* * BIO_pending() checks any filter BIO. * BIO_eof() checks the source BIO. */ return !BIO_pending(ctx->_.file.file) && BIO_eof(ctx->_.file.file); } /* ctx->type has an unexpected value */ assert(0); return 1; } static int file_close_dir(struct file_ctx_st *ctx) { if (ctx->_.dir.ctx != NULL) OPENSSL_DIR_end(&ctx->_.dir.ctx); free_file_ctx(ctx); return 1; } static int file_close_stream(struct file_ctx_st *ctx) { /* * This frees either the provider BIO filter (for file_attach()) OR * the allocated file BIO (for file_open()). */ BIO_free(ctx->_.file.file); ctx->_.file.file = NULL; free_file_ctx(ctx); return 1; } static int file_close(void *loaderctx) { struct file_ctx_st *ctx = loaderctx; switch (ctx->type) { case IS_DIR: return file_close_dir(ctx); case IS_FILE: return file_close_stream(ctx); } /* ctx->type has an unexpected value */ assert(0); return 1; } const OSSL_DISPATCH ossl_file_store_functions[] = { { OSSL_FUNC_STORE_OPEN, (void (*)(void))file_open }, { OSSL_FUNC_STORE_ATTACH, (void (*)(void))file_attach }, { OSSL_FUNC_STORE_SETTABLE_CTX_PARAMS, (void (*)(void))file_settable_ctx_params }, { OSSL_FUNC_STORE_SET_CTX_PARAMS, (void (*)(void))file_set_ctx_params }, { OSSL_FUNC_STORE_LOAD, (void (*)(void))file_load }, { OSSL_FUNC_STORE_EOF, (void (*)(void))file_eof }, { OSSL_FUNC_STORE_CLOSE, (void (*)(void))file_close }, OSSL_DISPATCH_END, };
./openssl/providers/implementations/storemgmt/file_store_any2obj.c
/* * Copyright 2020-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * This is a decoder that's completely internal to the 'file:' store * implementation. Only code in file_store.c know about this one. Because * of this close relationship, we can cut certain corners, such as making * assumptions about the "provider context", which is currently simply the * provider context that the file_store.c code operates within. * * All this does is to read known binary encodings (currently: DER, MSBLOB, * PVK) from the input if it can, and passes it on to the data callback as * an object abstraction, leaving it to the callback to figure out what it * actually is. * * This MUST be made the last decoder in a chain, leaving it to other more * specialized decoders to recognise and process their stuff first. */ #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/core_object.h> #include <openssl/bio.h> #include <openssl/buffer.h> #include <openssl/err.h> #include <openssl/asn1err.h> #include <openssl/params.h> #include "internal/asn1.h" #include "crypto/pem.h" /* For internal PVK and "blob" headers */ #include "prov/bio.h" #include "file_store_local.h" /* * newctx and freectx are not strictly necessary. However, the method creator, * ossl_decoder_from_algorithm(), demands that they exist, so we make sure to * oblige. */ static OSSL_FUNC_decoder_newctx_fn any2obj_newctx; static OSSL_FUNC_decoder_freectx_fn any2obj_freectx; static void *any2obj_newctx(void *provctx) { return provctx; } static void any2obj_freectx(void *vctx) { } static int any2obj_decode_final(void *provctx, int objtype, BUF_MEM *mem, OSSL_CALLBACK *data_cb, void *data_cbarg) { /* * 1 indicates that we successfully decoded something, or not at all. * Ending up "empty handed" is not an error. */ int ok = 1; if (mem != NULL) { OSSL_PARAM params[3]; params[0] = OSSL_PARAM_construct_int(OSSL_OBJECT_PARAM_TYPE, &objtype); params[1] = OSSL_PARAM_construct_octet_string(OSSL_OBJECT_PARAM_DATA, mem->data, mem->length); params[2] = OSSL_PARAM_construct_end(); ok = data_cb(params, data_cbarg); BUF_MEM_free(mem); } return ok; } static OSSL_FUNC_decoder_decode_fn der2obj_decode; static int der2obj_decode(void *provctx, OSSL_CORE_BIO *cin, int selection, OSSL_CALLBACK *data_cb, void *data_cbarg, OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg) { BIO *in = ossl_bio_new_from_core_bio(provctx, cin); BUF_MEM *mem = NULL; int ok; if (in == NULL) return 0; ERR_set_mark(); ok = (asn1_d2i_read_bio(in, &mem) >= 0); ERR_pop_to_mark(); if (!ok && mem != NULL) { BUF_MEM_free(mem); mem = NULL; } BIO_free(in); /* any2obj_decode_final() frees |mem| for us */ return any2obj_decode_final(provctx, OSSL_OBJECT_UNKNOWN, mem, data_cb, data_cbarg); } static OSSL_FUNC_decoder_decode_fn msblob2obj_decode; static int msblob2obj_decode(void *provctx, OSSL_CORE_BIO *cin, int selection, OSSL_CALLBACK *data_cb, void *data_cbarg, OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg) { BIO *in = ossl_bio_new_from_core_bio(provctx, cin); BUF_MEM *mem = NULL; size_t mem_len = 0, mem_want; const unsigned char *p; unsigned int bitlen, magic; int isdss = -1; int ispub = -1; int ok = 0; if (in == NULL) goto err; mem_want = 16; /* The size of the MSBLOB header */ if ((mem = BUF_MEM_new()) == NULL || !BUF_MEM_grow(mem, mem_want)) { ERR_raise(ERR_LIB_PEM, ERR_R_BUF_LIB); goto err; } ERR_set_mark(); ok = BIO_read(in, &mem->data[0], mem_want) == (int)mem_want; mem_len += mem_want; ERR_pop_to_mark(); if (!ok) goto next; ERR_set_mark(); p = (unsigned char *)&mem->data[0]; ok = ossl_do_blob_header(&p, 16, &magic, &bitlen, &isdss, &ispub) > 0; ERR_pop_to_mark(); if (!ok) goto next; ok = 0; mem_want = ossl_blob_length(bitlen, isdss, ispub); if (!BUF_MEM_grow(mem, mem_len + mem_want)) { ERR_raise(ERR_LIB_PEM, ERR_R_BUF_LIB); goto err; } ERR_set_mark(); ok = BIO_read(in, &mem->data[mem_len], mem_want) == (int)mem_want; mem_len += mem_want; ERR_pop_to_mark(); next: /* Free resources we no longer need. */ BIO_free(in); if (!ok && mem != NULL) { BUF_MEM_free(mem); mem = NULL; } /* any2obj_decode_final() frees |mem| for us */ return any2obj_decode_final(provctx, OSSL_OBJECT_PKEY, mem, data_cb, data_cbarg); err: BIO_free(in); BUF_MEM_free(mem); return 0; } static OSSL_FUNC_decoder_decode_fn pvk2obj_decode; static int pvk2obj_decode(void *provctx, OSSL_CORE_BIO *cin, int selection, OSSL_CALLBACK *data_cb, void *data_cbarg, OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg) { BIO *in = ossl_bio_new_from_core_bio(provctx, cin); BUF_MEM *mem = NULL; size_t mem_len = 0, mem_want; const unsigned char *p; unsigned int saltlen, keylen; int ok = 0; if (in == NULL) goto err; mem_want = 24; /* The size of the PVK header */ if ((mem = BUF_MEM_new()) == NULL || !BUF_MEM_grow(mem, mem_want)) { ERR_raise(ERR_LIB_PEM, ERR_R_BUF_LIB); goto err; } ERR_set_mark(); ok = BIO_read(in, &mem->data[0], mem_want) == (int)mem_want; mem_len += mem_want; ERR_pop_to_mark(); if (!ok) goto next; ERR_set_mark(); p = (unsigned char *)&mem->data[0]; ok = ossl_do_PVK_header(&p, 24, 0, &saltlen, &keylen) > 0; ERR_pop_to_mark(); if (!ok) goto next; ok = 0; mem_want = saltlen + keylen; if (!BUF_MEM_grow(mem, mem_len + mem_want)) { ERR_raise(ERR_LIB_PEM, ERR_R_BUF_LIB); goto err; } ERR_set_mark(); ok = BIO_read(in, &mem->data[mem_len], mem_want) == (int)mem_want; mem_len += mem_want; ERR_pop_to_mark(); next: /* Free resources we no longer need. */ BIO_free(in); if (!ok && mem != NULL) { BUF_MEM_free(mem); mem = NULL; } /* any2obj_decode_final() frees |mem| for us */ return any2obj_decode_final(provctx, OSSL_OBJECT_PKEY, mem, data_cb, data_cbarg); err: BIO_free(in); BUF_MEM_free(mem); return 0; } #define MAKE_DECODER(fromtype, objtype) \ static const OSSL_DISPATCH fromtype##_to_obj_decoder_functions[] = { \ { OSSL_FUNC_DECODER_NEWCTX, (void (*)(void))any2obj_newctx }, \ { OSSL_FUNC_DECODER_FREECTX, (void (*)(void))any2obj_freectx }, \ { OSSL_FUNC_DECODER_DECODE, (void (*)(void))fromtype##2obj_decode }, \ OSSL_DISPATCH_END \ } MAKE_DECODER(der, OSSL_OBJECT_UNKNOWN); MAKE_DECODER(msblob, OSSL_OBJECT_PKEY); MAKE_DECODER(pvk, OSSL_OBJECT_PKEY); const OSSL_ALGORITHM ossl_any_to_obj_algorithm[] = { { "obj", "input=DER", der_to_obj_decoder_functions }, { "obj", "input=MSBLOB", msblob_to_obj_decoder_functions }, { "obj", "input=PVK", pvk_to_obj_decoder_functions }, { NULL, } };
./openssl/providers/implementations/storemgmt/winstore_store.c
/* * Copyright 2022-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/store.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/core_object.h> #include <openssl/bio.h> #include <openssl/err.h> #include <openssl/params.h> #include <openssl/decoder.h> #include <openssl/proverr.h> #include <openssl/store.h> /* The OSSL_STORE_INFO type numbers */ #include "internal/cryptlib.h" #include "internal/o_dir.h" #include "crypto/decoder.h" #include "crypto/ctype.h" /* ossl_isdigit() */ #include "prov/implementations.h" #include "prov/bio.h" #include "file_store_local.h" #ifdef __CYGWIN__ # include <windows.h> #endif #include <wincrypt.h> enum { STATE_IDLE, STATE_READ, STATE_EOF, }; struct winstore_ctx_st { void *provctx; char *propq; unsigned char *subject; size_t subject_len; HCERTSTORE win_store; const CERT_CONTEXT *win_ctx; int state; OSSL_DECODER_CTX *dctx; }; static void winstore_win_reset(struct winstore_ctx_st *ctx) { if (ctx->win_ctx != NULL) { CertFreeCertificateContext(ctx->win_ctx); ctx->win_ctx = NULL; } ctx->state = STATE_IDLE; } static void winstore_win_advance(struct winstore_ctx_st *ctx) { CERT_NAME_BLOB name = {0}; if (ctx->state == STATE_EOF) return; name.cbData = ctx->subject_len; name.pbData = ctx->subject; ctx->win_ctx = (name.cbData == 0 ? NULL : CertFindCertificateInStore(ctx->win_store, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, 0, CERT_FIND_SUBJECT_NAME, &name, ctx->win_ctx)); ctx->state = (ctx->win_ctx == NULL) ? STATE_EOF : STATE_READ; } static void *winstore_open(void *provctx, const char *uri) { struct winstore_ctx_st *ctx = NULL; if (!HAS_CASE_PREFIX(uri, "org.openssl.winstore:")) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx == NULL) return NULL; ctx->provctx = provctx; ctx->win_store = CertOpenSystemStoreW(0, L"ROOT"); if (ctx->win_store == NULL) { OPENSSL_free(ctx); return NULL; } winstore_win_reset(ctx); return ctx; } static void *winstore_attach(void *provctx, OSSL_CORE_BIO *cin) { return NULL; /* not supported */ } static const OSSL_PARAM *winstore_settable_ctx_params(void *loaderctx, const OSSL_PARAM params[]) { static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_octet_string(OSSL_STORE_PARAM_SUBJECT, NULL, 0), OSSL_PARAM_utf8_string(OSSL_STORE_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_END }; return known_settable_ctx_params; } static int winstore_set_ctx_params(void *loaderctx, const OSSL_PARAM params[]) { struct winstore_ctx_st *ctx = loaderctx; const OSSL_PARAM *p; int do_reset = 0; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_STORE_PARAM_PROPERTIES); if (p != NULL) { do_reset = 1; OPENSSL_free(ctx->propq); ctx->propq = NULL; if (!OSSL_PARAM_get_utf8_string(p, &ctx->propq, 0)) return 0; } p = OSSL_PARAM_locate_const(params, OSSL_STORE_PARAM_SUBJECT); if (p != NULL) { const unsigned char *der = NULL; size_t der_len = 0; if (!OSSL_PARAM_get_octet_string_ptr(p, (const void **)&der, &der_len)) return 0; do_reset = 1; OPENSSL_free(ctx->subject); ctx->subject = OPENSSL_malloc(der_len); if (ctx->subject == NULL) { ctx->subject_len = 0; return 0; } ctx->subject_len = der_len; memcpy(ctx->subject, der, der_len); } if (do_reset) { winstore_win_reset(ctx); winstore_win_advance(ctx); } return 1; } struct load_data_st { OSSL_CALLBACK *object_cb; void *object_cbarg; }; static int load_construct(OSSL_DECODER_INSTANCE *decoder_inst, const OSSL_PARAM *params, void *construct_data) { struct load_data_st *data = construct_data; return data->object_cb(params, data->object_cbarg); } static void load_cleanup(void *construct_data) { /* No-op. */ } static int setup_decoder(struct winstore_ctx_st *ctx) { OSSL_LIB_CTX *libctx = ossl_prov_ctx_get0_libctx(ctx->provctx); const OSSL_ALGORITHM *to_algo = NULL; if (ctx->dctx != NULL) return 1; ctx->dctx = OSSL_DECODER_CTX_new(); if (ctx->dctx == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); return 0; } if (!OSSL_DECODER_CTX_set_input_type(ctx->dctx, "DER")) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } if (!OSSL_DECODER_CTX_set_input_structure(ctx->dctx, "Certificate")) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } for (to_algo = ossl_any_to_obj_algorithm; to_algo->algorithm_names != NULL; to_algo++) { OSSL_DECODER *to_obj = NULL; OSSL_DECODER_INSTANCE *to_obj_inst = NULL; /* * Create the internal last resort decoder implementation * together with a "decoder instance". * The decoder doesn't need any identification or to be * attached to any provider, since it's only used locally. */ to_obj = ossl_decoder_from_algorithm(0, to_algo, NULL); if (to_obj != NULL) to_obj_inst = ossl_decoder_instance_new(to_obj, ctx->provctx); OSSL_DECODER_free(to_obj); if (to_obj_inst == NULL) goto err; if (!ossl_decoder_ctx_add_decoder_inst(ctx->dctx, to_obj_inst)) { ossl_decoder_instance_free(to_obj_inst); ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } } if (!OSSL_DECODER_CTX_add_extra(ctx->dctx, libctx, ctx->propq)) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } if (!OSSL_DECODER_CTX_set_construct(ctx->dctx, load_construct)) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } if (!OSSL_DECODER_CTX_set_cleanup(ctx->dctx, load_cleanup)) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } return 1; err: OSSL_DECODER_CTX_free(ctx->dctx); ctx->dctx = NULL; return 0; } static int winstore_load_using(struct winstore_ctx_st *ctx, OSSL_CALLBACK *object_cb, void *object_cbarg, OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg, const void *der, size_t der_len) { struct load_data_st data; const unsigned char *der_ = der; size_t der_len_ = der_len; if (setup_decoder(ctx) == 0) return 0; data.object_cb = object_cb; data.object_cbarg = object_cbarg; OSSL_DECODER_CTX_set_construct_data(ctx->dctx, &data); OSSL_DECODER_CTX_set_passphrase_cb(ctx->dctx, pw_cb, pw_cbarg); if (OSSL_DECODER_from_data(ctx->dctx, &der_, &der_len_) == 0) return 0; return 1; } static int winstore_load(void *loaderctx, OSSL_CALLBACK *object_cb, void *object_cbarg, OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg) { int ret = 0; struct winstore_ctx_st *ctx = loaderctx; if (ctx->state != STATE_READ) return 0; ret = winstore_load_using(ctx, object_cb, object_cbarg, pw_cb, pw_cbarg, ctx->win_ctx->pbCertEncoded, ctx->win_ctx->cbCertEncoded); if (ret == 1) winstore_win_advance(ctx); return ret; } static int winstore_eof(void *loaderctx) { struct winstore_ctx_st *ctx = loaderctx; return ctx->state != STATE_READ; } static int winstore_close(void *loaderctx) { struct winstore_ctx_st *ctx = loaderctx; winstore_win_reset(ctx); CertCloseStore(ctx->win_store, 0); OSSL_DECODER_CTX_free(ctx->dctx); OPENSSL_free(ctx->propq); OPENSSL_free(ctx->subject); OPENSSL_free(ctx); return 1; } const OSSL_DISPATCH ossl_winstore_store_functions[] = { { OSSL_FUNC_STORE_OPEN, (void (*)(void))winstore_open }, { OSSL_FUNC_STORE_ATTACH, (void (*)(void))winstore_attach }, { OSSL_FUNC_STORE_SETTABLE_CTX_PARAMS, (void (*)(void))winstore_settable_ctx_params }, { OSSL_FUNC_STORE_SET_CTX_PARAMS, (void (*)(void))winstore_set_ctx_params }, { OSSL_FUNC_STORE_LOAD, (void (*)(void))winstore_load }, { OSSL_FUNC_STORE_EOF, (void (*)(void))winstore_eof }, { OSSL_FUNC_STORE_CLOSE, (void (*)(void))winstore_close }, OSSL_DISPATCH_END, };
./openssl/providers/implementations/storemgmt/file_store_local.h
/* * Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ extern const OSSL_ALGORITHM ossl_any_to_obj_algorithm[];
./openssl/providers/implementations/include/prov/names.h
/* * Copyright 2021-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * Macros for use as names and descriptions in our providers' OSSL_ALGORITHM. * * All the strings are formatted the same way: * * Our primary name[:other names][:numeric OID] * * 'other names' include historical OpenSSL names, NIST names, ASN.1 OBJECT * IDENTIFIER names, and commonly known aliases. * * Where it matters, our primary names follow this format: * * ALGNAME[VERSION?][-SUBNAME[VERSION?]?][-SIZE?][-MODE?] * * VERSION is only present if there are multiple versions of * an alg (MD2, MD4, MD5). It may be omitted if there is only * one version (if a subsequent version is released in the future, * we can always change the canonical name, and add the old name * as an alias). * * SUBNAME may be present where we are combining multiple * algorithms together, e.g. MD5-SHA1. * * SIZE is only present if multiple versions of an algorithm exist * with different sizes (e.g. AES-128-CBC, AES-256-CBC) * * MODE is only present where applicable. */ /*- * Symmetric ciphers * ----------------- */ #define PROV_NAMES_AES_256_ECB "AES-256-ECB:2.16.840.1.101.3.4.1.41" #define PROV_NAMES_AES_192_ECB "AES-192-ECB:2.16.840.1.101.3.4.1.21" #define PROV_NAMES_AES_128_ECB "AES-128-ECB:2.16.840.1.101.3.4.1.1" #define PROV_NAMES_AES_256_CBC "AES-256-CBC:AES256:2.16.840.1.101.3.4.1.42" #define PROV_NAMES_AES_192_CBC "AES-192-CBC:AES192:2.16.840.1.101.3.4.1.22" #define PROV_NAMES_AES_128_CBC "AES-128-CBC:AES128:2.16.840.1.101.3.4.1.2" #define PROV_NAMES_AES_256_CBC_CTS "AES-256-CBC-CTS" #define PROV_NAMES_AES_192_CBC_CTS "AES-192-CBC-CTS" #define PROV_NAMES_AES_128_CBC_CTS "AES-128-CBC-CTS" #define PROV_NAMES_AES_256_OFB "AES-256-OFB:2.16.840.1.101.3.4.1.43" #define PROV_NAMES_AES_192_OFB "AES-192-OFB:2.16.840.1.101.3.4.1.23" #define PROV_NAMES_AES_128_OFB "AES-128-OFB:2.16.840.1.101.3.4.1.3" #define PROV_NAMES_AES_256_CFB "AES-256-CFB:2.16.840.1.101.3.4.1.44" #define PROV_NAMES_AES_192_CFB "AES-192-CFB:2.16.840.1.101.3.4.1.24" #define PROV_NAMES_AES_128_CFB "AES-128-CFB:2.16.840.1.101.3.4.1.4" #define PROV_NAMES_AES_256_CFB1 "AES-256-CFB1" #define PROV_NAMES_AES_192_CFB1 "AES-192-CFB1" #define PROV_NAMES_AES_128_CFB1 "AES-128-CFB1" #define PROV_NAMES_AES_256_CFB8 "AES-256-CFB8" #define PROV_NAMES_AES_192_CFB8 "AES-192-CFB8" #define PROV_NAMES_AES_128_CFB8 "AES-128-CFB8" #define PROV_NAMES_AES_256_CTR "AES-256-CTR" #define PROV_NAMES_AES_192_CTR "AES-192-CTR" #define PROV_NAMES_AES_128_CTR "AES-128-CTR" #define PROV_NAMES_AES_256_XTS "AES-256-XTS:1.3.111.2.1619.0.1.2" #define PROV_NAMES_AES_128_XTS "AES-128-XTS:1.3.111.2.1619.0.1.1" #define PROV_NAMES_AES_256_GCM "AES-256-GCM:id-aes256-GCM:2.16.840.1.101.3.4.1.46" #define PROV_NAMES_AES_192_GCM "AES-192-GCM:id-aes192-GCM:2.16.840.1.101.3.4.1.26" #define PROV_NAMES_AES_128_GCM "AES-128-GCM:id-aes128-GCM:2.16.840.1.101.3.4.1.6" #define PROV_NAMES_AES_256_CCM "AES-256-CCM:id-aes256-CCM:2.16.840.1.101.3.4.1.47" #define PROV_NAMES_AES_192_CCM "AES-192-CCM:id-aes192-CCM:2.16.840.1.101.3.4.1.27" #define PROV_NAMES_AES_128_CCM "AES-128-CCM:id-aes128-CCM:2.16.840.1.101.3.4.1.7" #define PROV_NAMES_AES_256_WRAP "AES-256-WRAP:id-aes256-wrap:AES256-WRAP:2.16.840.1.101.3.4.1.45" #define PROV_NAMES_AES_192_WRAP "AES-192-WRAP:id-aes192-wrap:AES192-WRAP:2.16.840.1.101.3.4.1.25" #define PROV_NAMES_AES_128_WRAP "AES-128-WRAP:id-aes128-wrap:AES128-WRAP:2.16.840.1.101.3.4.1.5" #define PROV_NAMES_AES_256_WRAP_PAD "AES-256-WRAP-PAD:id-aes256-wrap-pad:AES256-WRAP-PAD:2.16.840.1.101.3.4.1.48" #define PROV_NAMES_AES_192_WRAP_PAD "AES-192-WRAP-PAD:id-aes192-wrap-pad:AES192-WRAP-PAD:2.16.840.1.101.3.4.1.28" #define PROV_NAMES_AES_128_WRAP_PAD "AES-128-WRAP-PAD:id-aes128-wrap-pad:AES128-WRAP-PAD:2.16.840.1.101.3.4.1.8" #define PROV_NAMES_AES_256_WRAP_INV "AES-256-WRAP-INV:AES256-WRAP-INV" #define PROV_NAMES_AES_192_WRAP_INV "AES-192-WRAP-INV:AES192-WRAP-INV" #define PROV_NAMES_AES_128_WRAP_INV "AES-128-WRAP-INV:AES128-WRAP-INV" #define PROV_NAMES_AES_256_WRAP_PAD_INV "AES-256-WRAP-PAD-INV:AES256-WRAP-PAD-INV" #define PROV_NAMES_AES_192_WRAP_PAD_INV "AES-192-WRAP-PAD-INV:AES192-WRAP-PAD-INV" #define PROV_NAMES_AES_128_WRAP_PAD_INV "AES-128-WRAP-PAD-INV:AES128-WRAP-PAD-INV" #define PROV_NAMES_AES_128_CBC_HMAC_SHA1 "AES-128-CBC-HMAC-SHA1" #define PROV_NAMES_AES_256_CBC_HMAC_SHA1 "AES-256-CBC-HMAC-SHA1" #define PROV_NAMES_AES_128_CBC_HMAC_SHA256 "AES-128-CBC-HMAC-SHA256" #define PROV_NAMES_AES_256_CBC_HMAC_SHA256 "AES-256-CBC-HMAC-SHA256" #define PROV_NAMES_DES_EDE3_ECB "DES-EDE3-ECB:DES-EDE3" #define PROV_NAMES_DES_EDE3_CBC "DES-EDE3-CBC:DES3:1.2.840.113549.3.7" #define PROV_NAMES_NULL "NULL" #define PROV_NAMES_AES_256_OCB "AES-256-OCB" #define PROV_NAMES_AES_192_OCB "AES-192-OCB" #define PROV_NAMES_AES_128_OCB "AES-128-OCB" #define PROV_NAMES_AES_128_SIV "AES-128-SIV" #define PROV_NAMES_AES_192_SIV "AES-192-SIV" #define PROV_NAMES_AES_256_SIV "AES-256-SIV" #define PROV_NAMES_AES_128_GCM_SIV "AES-128-GCM-SIV" #define PROV_NAMES_AES_192_GCM_SIV "AES-192-GCM-SIV" #define PROV_NAMES_AES_256_GCM_SIV "AES-256-GCM-SIV" #define PROV_NAMES_ARIA_256_GCM "ARIA-256-GCM:1.2.410.200046.1.1.36" #define PROV_NAMES_ARIA_192_GCM "ARIA-192-GCM:1.2.410.200046.1.1.35" #define PROV_NAMES_ARIA_128_GCM "ARIA-128-GCM:1.2.410.200046.1.1.34" #define PROV_NAMES_ARIA_256_CCM "ARIA-256-CCM:1.2.410.200046.1.1.39" #define PROV_NAMES_ARIA_192_CCM "ARIA-192-CCM:1.2.410.200046.1.1.38" #define PROV_NAMES_ARIA_128_CCM "ARIA-128-CCM:1.2.410.200046.1.1.37" #define PROV_NAMES_ARIA_256_ECB "ARIA-256-ECB:1.2.410.200046.1.1.11" #define PROV_NAMES_ARIA_192_ECB "ARIA-192-ECB:1.2.410.200046.1.1.6" #define PROV_NAMES_ARIA_128_ECB "ARIA-128-ECB:1.2.410.200046.1.1.1" #define PROV_NAMES_ARIA_256_CBC "ARIA-256-CBC:ARIA256:1.2.410.200046.1.1.12" #define PROV_NAMES_ARIA_192_CBC "ARIA-192-CBC:ARIA192:1.2.410.200046.1.1.7" #define PROV_NAMES_ARIA_128_CBC "ARIA-128-CBC:ARIA128:1.2.410.200046.1.1.2" #define PROV_NAMES_ARIA_256_OFB "ARIA-256-OFB:1.2.410.200046.1.1.14" #define PROV_NAMES_ARIA_192_OFB "ARIA-192-OFB:1.2.410.200046.1.1.9" #define PROV_NAMES_ARIA_128_OFB "ARIA-128-OFB:1.2.410.200046.1.1.4" #define PROV_NAMES_ARIA_256_CFB "ARIA-256-CFB:1.2.410.200046.1.1.13" #define PROV_NAMES_ARIA_192_CFB "ARIA-192-CFB:1.2.410.200046.1.1.8" #define PROV_NAMES_ARIA_128_CFB "ARIA-128-CFB:1.2.410.200046.1.1.3" #define PROV_NAMES_ARIA_256_CFB1 "ARIA-256-CFB1" #define PROV_NAMES_ARIA_192_CFB1 "ARIA-192-CFB1" #define PROV_NAMES_ARIA_128_CFB1 "ARIA-128-CFB1" #define PROV_NAMES_ARIA_256_CFB8 "ARIA-256-CFB8" #define PROV_NAMES_ARIA_192_CFB8 "ARIA-192-CFB8" #define PROV_NAMES_ARIA_128_CFB8 "ARIA-128-CFB8" #define PROV_NAMES_ARIA_256_CTR "ARIA-256-CTR:1.2.410.200046.1.1.15" #define PROV_NAMES_ARIA_192_CTR "ARIA-192-CTR:1.2.410.200046.1.1.10" #define PROV_NAMES_ARIA_128_CTR "ARIA-128-CTR:1.2.410.200046.1.1.5" #define PROV_NAMES_CAMELLIA_256_ECB "CAMELLIA-256-ECB:0.3.4401.5.3.1.9.41" #define PROV_NAMES_CAMELLIA_192_ECB "CAMELLIA-192-ECB:0.3.4401.5.3.1.9.21" #define PROV_NAMES_CAMELLIA_128_ECB "CAMELLIA-128-ECB:0.3.4401.5.3.1.9.1" #define PROV_NAMES_CAMELLIA_256_CBC "CAMELLIA-256-CBC:CAMELLIA256:1.2.392.200011.61.1.1.1.4" #define PROV_NAMES_CAMELLIA_192_CBC "CAMELLIA-192-CBC:CAMELLIA192:1.2.392.200011.61.1.1.1.3" #define PROV_NAMES_CAMELLIA_128_CBC "CAMELLIA-128-CBC:CAMELLIA128:1.2.392.200011.61.1.1.1.2" #define PROV_NAMES_CAMELLIA_256_CBC_CTS "CAMELLIA-256-CBC-CTS" #define PROV_NAMES_CAMELLIA_192_CBC_CTS "CAMELLIA-192-CBC-CTS" #define PROV_NAMES_CAMELLIA_128_CBC_CTS "CAMELLIA-128-CBC-CTS" #define PROV_NAMES_CAMELLIA_256_OFB "CAMELLIA-256-OFB:0.3.4401.5.3.1.9.43" #define PROV_NAMES_CAMELLIA_192_OFB "CAMELLIA-192-OFB:0.3.4401.5.3.1.9.23" #define PROV_NAMES_CAMELLIA_128_OFB "CAMELLIA-128-OFB:0.3.4401.5.3.1.9.3" #define PROV_NAMES_CAMELLIA_256_CFB "CAMELLIA-256-CFB:0.3.4401.5.3.1.9.44" #define PROV_NAMES_CAMELLIA_192_CFB "CAMELLIA-192-CFB:0.3.4401.5.3.1.9.24" #define PROV_NAMES_CAMELLIA_128_CFB "CAMELLIA-128-CFB:0.3.4401.5.3.1.9.4" #define PROV_NAMES_CAMELLIA_256_CFB1 "CAMELLIA-256-CFB1" #define PROV_NAMES_CAMELLIA_192_CFB1 "CAMELLIA-192-CFB1" #define PROV_NAMES_CAMELLIA_128_CFB1 "CAMELLIA-128-CFB1" #define PROV_NAMES_CAMELLIA_256_CFB8 "CAMELLIA-256-CFB8" #define PROV_NAMES_CAMELLIA_192_CFB8 "CAMELLIA-192-CFB8" #define PROV_NAMES_CAMELLIA_128_CFB8 "CAMELLIA-128-CFB8" #define PROV_NAMES_CAMELLIA_256_CTR "CAMELLIA-256-CTR:0.3.4401.5.3.1.9.49" #define PROV_NAMES_CAMELLIA_192_CTR "CAMELLIA-192-CTR:0.3.4401.5.3.1.9.29" #define PROV_NAMES_CAMELLIA_128_CTR "CAMELLIA-128-CTR:0.3.4401.5.3.1.9.9" #define PROV_NAMES_DES_EDE3_OFB "DES-EDE3-OFB" #define PROV_NAMES_DES_EDE3_CFB "DES-EDE3-CFB" #define PROV_NAMES_DES_EDE3_CFB8 "DES-EDE3-CFB8" #define PROV_NAMES_DES_EDE3_CFB1 "DES-EDE3-CFB1" #define PROV_NAMES_DES3_WRAP "DES3-WRAP:id-smime-alg-CMS3DESwrap:1.2.840.113549.1.9.16.3.6" #define PROV_NAMES_DES_EDE_ECB "DES-EDE-ECB:DES-EDE:1.3.14.3.2.17" #define PROV_NAMES_DES_EDE_CBC "DES-EDE-CBC" #define PROV_NAMES_DES_EDE_OFB "DES-EDE-OFB" #define PROV_NAMES_DES_EDE_CFB "DES-EDE-CFB" #define PROV_NAMES_SM4_ECB "SM4-ECB:1.2.156.10197.1.104.1" #define PROV_NAMES_SM4_CBC "SM4-CBC:SM4:1.2.156.10197.1.104.2" #define PROV_NAMES_SM4_CTR "SM4-CTR:1.2.156.10197.1.104.7" #define PROV_NAMES_SM4_OFB "SM4-OFB:SM4-OFB128:1.2.156.10197.1.104.3" #define PROV_NAMES_SM4_CFB "SM4-CFB:SM4-CFB128:1.2.156.10197.1.104.4" #define PROV_NAMES_SM4_GCM "SM4-GCM:1.2.156.10197.1.104.8" #define PROV_NAMES_SM4_CCM "SM4-CCM:1.2.156.10197.1.104.9" #define PROV_NAMES_SM4_XTS "SM4-XTS:1.2.156.10197.1.104.10" #define PROV_NAMES_ChaCha20 "ChaCha20" #define PROV_NAMES_ChaCha20_Poly1305 "ChaCha20-Poly1305" #define PROV_NAMES_CAST5_ECB "CAST5-ECB" #define PROV_NAMES_CAST5_CBC "CAST5-CBC:CAST-CBC:CAST:1.2.840.113533.7.66.10" #define PROV_NAMES_CAST5_OFB "CAST5-OFB" #define PROV_NAMES_CAST5_CFB "CAST5-CFB" #define PROV_NAMES_BF_ECB "BF-ECB" #define PROV_NAMES_BF_CBC "BF-CBC:BF:BLOWFISH:1.3.6.1.4.1.3029.1.2" #define PROV_NAMES_BF_OFB "BF-OFB" #define PROV_NAMES_BF_CFB "BF-CFB" #define PROV_NAMES_IDEA_ECB "IDEA-ECB" #define PROV_NAMES_IDEA_CBC "IDEA-CBC:IDEA:1.3.6.1.4.1.188.7.1.1.2" #define PROV_NAMES_IDEA_OFB "IDEA-OFB:IDEA-OFB64" #define PROV_NAMES_IDEA_CFB "IDEA-CFB:IDEA-CFB64" #define PROV_NAMES_SEED_ECB "SEED-ECB:1.2.410.200004.1.3" #define PROV_NAMES_SEED_CBC "SEED-CBC:SEED:1.2.410.200004.1.4" #define PROV_NAMES_SEED_OFB "SEED-OFB:SEED-OFB128:1.2.410.200004.1.6" #define PROV_NAMES_SEED_CFB "SEED-CFB:SEED-CFB128:1.2.410.200004.1.5" #define PROV_NAMES_RC2_ECB "RC2-ECB" #define PROV_NAMES_RC2_CBC "RC2-CBC:RC2:RC2-128:1.2.840.113549.3.2" #define PROV_NAMES_RC2_40_CBC "RC2-40-CBC:RC2-40" #define PROV_NAMES_RC2_64_CBC "RC2-64-CBC:RC2-64" #define PROV_NAMES_RC2_CFB "RC2-CFB" #define PROV_NAMES_RC2_OFB "RC2-OFB" #define PROV_NAMES_RC4 "RC4:1.2.840.113549.3.4" #define PROV_NAMES_RC4_40 "RC4-40" #define PROV_NAMES_RC4_HMAC_MD5 "RC4-HMAC-MD5" #define PROV_NAMES_RC5_ECB "RC5-ECB" #define PROV_NAMES_RC5_CBC "RC5-CBC:RC5:1.2.840.113549.3.8" #define PROV_NAMES_RC5_OFB "RC5-OFB" #define PROV_NAMES_RC5_CFB "RC5-CFB" #define PROV_NAMES_DESX_CBC "DESX-CBC:DESX" #define PROV_NAMES_DES_ECB "DES-ECB:1.3.14.3.2.6" #define PROV_NAMES_DES_CBC "DES-CBC:DES:1.3.14.3.2.7" #define PROV_NAMES_DES_OFB "DES-OFB:1.3.14.3.2.8" #define PROV_NAMES_DES_CFB "DES-CFB:1.3.14.3.2.9" #define PROV_NAMES_DES_CFB1 "DES-CFB1" #define PROV_NAMES_DES_CFB8 "DES-CFB8" /*- * Digests * ------- */ #define PROV_NAMES_SHA1 "SHA1:SHA-1:SSL3-SHA1:1.3.14.3.2.26" #define PROV_NAMES_SHA2_224 "SHA2-224:SHA-224:SHA224:2.16.840.1.101.3.4.2.4" #define PROV_NAMES_SHA2_256 "SHA2-256:SHA-256:SHA256:2.16.840.1.101.3.4.2.1" #define PROV_NAMES_SHA2_256_192 "SHA2-256/192:SHA-256/192:SHA256-192" #define PROV_NAMES_SHA2_384 "SHA2-384:SHA-384:SHA384:2.16.840.1.101.3.4.2.2" #define PROV_NAMES_SHA2_512 "SHA2-512:SHA-512:SHA512:2.16.840.1.101.3.4.2.3" #define PROV_NAMES_SHA2_512_224 "SHA2-512/224:SHA-512/224:SHA512-224:2.16.840.1.101.3.4.2.5" #define PROV_NAMES_SHA2_512_256 "SHA2-512/256:SHA-512/256:SHA512-256:2.16.840.1.101.3.4.2.6" /* We agree with NIST here, so one name only */ #define PROV_NAMES_SHA3_224 "SHA3-224:2.16.840.1.101.3.4.2.7" #define PROV_NAMES_SHA3_256 "SHA3-256:2.16.840.1.101.3.4.2.8" #define PROV_NAMES_SHA3_384 "SHA3-384:2.16.840.1.101.3.4.2.9" #define PROV_NAMES_SHA3_512 "SHA3-512:2.16.840.1.101.3.4.2.10" #define PROV_NAMES_KECCAK_224 "KECCAK-224" #define PROV_NAMES_KECCAK_256 "KECCAK-256" #define PROV_NAMES_KECCAK_384 "KECCAK-384" #define PROV_NAMES_KECCAK_512 "KECCAK-512" #define PROV_NAMES_SHAKE_128 "SHAKE-128:SHAKE128:2.16.840.1.101.3.4.2.11" #define PROV_NAMES_SHAKE_256 "SHAKE-256:SHAKE256:2.16.840.1.101.3.4.2.12" /* * KECCAK-KMAC-128 and KECCAK-KMAC-256 as hashes are mostly useful for * KMAC128 and KMAC256. */ #define PROV_NAMES_KECCAK_KMAC_128 "KECCAK-KMAC-128:KECCAK-KMAC128" #define PROV_NAMES_KECCAK_KMAC_256 "KECCAK-KMAC-256:KECCAK-KMAC256" /* * https://blake2.net/ doesn't specify size variants, but mentions that * Bouncy Castle uses the names BLAKE2b-160, BLAKE2b-256, BLAKE2b-384, and * BLAKE2b-512 * If we assume that "2b" and "2s" are versions, that pattern fits with ours. * We also add our historical names. */ #define PROV_NAMES_BLAKE2S_256 "BLAKE2S-256:BLAKE2s256:1.3.6.1.4.1.1722.12.2.2.8" #define PROV_NAMES_BLAKE2B_512 "BLAKE2B-512:BLAKE2b512:1.3.6.1.4.1.1722.12.2.1.16" #define PROV_NAMES_SM3 "SM3:1.2.156.10197.1.401" #define PROV_NAMES_MD5 "MD5:SSL3-MD5:1.2.840.113549.2.5" #define PROV_NAMES_MD5_SHA1 "MD5-SHA1" #define PROV_NAMES_MD2 "MD2:1.2.840.113549.2.2" #define PROV_NAMES_MD4 "MD4:1.2.840.113549.2.4" #define PROV_NAMES_MDC2 "MDC2:2.5.8.3.101" #define PROV_NAMES_WHIRLPOOL "WHIRLPOOL:1.0.10118.3.0.55" #define PROV_NAMES_RIPEMD_160 "RIPEMD-160:RIPEMD160:RIPEMD:RMD160:1.3.36.3.2.1" /*- * KDFs / PRFs * ----------- */ #define PROV_NAMES_HKDF "HKDF" #define PROV_DESCS_HKDF_SIGN "OpenSSL HKDF via EVP_PKEY implementation" #define PROV_NAMES_TLS1_3_KDF "TLS13-KDF" #define PROV_NAMES_SSKDF "SSKDF" #define PROV_NAMES_PBKDF1 "PBKDF1" #define PROV_NAMES_PBKDF2 "PBKDF2:1.2.840.113549.1.5.12" #define PROV_NAMES_PVKKDF "PVKKDF" #define PROV_NAMES_SSHKDF "SSHKDF" #define PROV_NAMES_X963KDF "X963KDF:X942KDF-CONCAT" #define PROV_NAMES_X942KDF_ASN1 "X942KDF-ASN1:X942KDF" #define PROV_NAMES_TLS1_PRF "TLS1-PRF" #define PROV_DESCS_TLS1_PRF_SIGN "OpenSSL TLS1_PRF via EVP_PKEY implementation" #define PROV_NAMES_KBKDF "KBKDF" #define PROV_NAMES_PKCS12KDF "PKCS12KDF" #define PROV_NAMES_SCRYPT "SCRYPT:id-scrypt:1.3.6.1.4.1.11591.4.11" #define PROV_DESCS_SCRYPT_SIGN "OpenSSL SCRYPT via EVP_PKEY implementation" #define PROV_NAMES_KRB5KDF "KRB5KDF" #define PROV_NAMES_HMAC_DRBG_KDF "HMAC-DRBG-KDF" #define PROV_NAMES_ARGON2I "ARGON2I" #define PROV_NAMES_ARGON2D "ARGON2D" #define PROV_NAMES_ARGON2ID "ARGON2ID" /*- * MACs * ---- */ #define PROV_NAMES_HMAC "HMAC" #define PROV_DESCS_HMAC_SIGN "OpenSSL HMAC via EVP_PKEY implementation" #define PROV_NAMES_CMAC "CMAC" #define PROV_DESCS_CMAC_SIGN "OpenSSL CMAC via EVP_PKEY implementation" #define PROV_NAMES_SIPHASH "SIPHASH" #define PROV_DESCS_SIPHASH_SIGN "OpenSSL SIPHASH via EVP_PKEY implementation" #define PROV_NAMES_POLY1305 "POLY1305" #define PROV_DESCS_POLY1305_SIGN "OpenSSL POLY1305 via EVP_PKEY implementation" #define PROV_NAMES_GMAC "GMAC:1.0.9797.3.4" #define PROV_NAMES_KMAC_128 "KMAC-128:KMAC128:2.16.840.1.101.3.4.2.19" #define PROV_NAMES_KMAC_256 "KMAC-256:KMAC256:2.16.840.1.101.3.4.2.20" #define PROV_NAMES_BLAKE2BMAC "BLAKE2BMAC:1.3.6.1.4.1.1722.12.2.1" #define PROV_NAMES_BLAKE2SMAC "BLAKE2SMAC:1.3.6.1.4.1.1722.12.2.2" /*- * RANDs * ----- */ #define PROV_NAMES_CTR_DRBG "CTR-DRBG" #define PROV_NAMES_HASH_DRBG "HASH-DRBG" #define PROV_NAMES_HMAC_DRBG "HMAC-DRBG" #define PROV_NAMES_TEST_RAND "TEST-RAND" #define PROV_NAMES_SEED_SRC "SEED-SRC" /*- * Asymmetric algos * ---------------- */ #define PROV_NAMES_EC "EC:id-ecPublicKey:1.2.840.10045.2.1" #define PROV_DESCS_EC "OpenSSL EC implementation" #define PROV_NAMES_ECDH "ECDH" #define PROV_DESCS_ECDH "OpenSSL ECDH implementation" #define PROV_NAMES_ECDSA "ECDSA" #define PROV_DESCS_ECDSA "OpenSSL ECDSA implementation" #define PROV_NAMES_X25519 "X25519:1.3.101.110" #define PROV_DESCS_X25519 "OpenSSL X25519 implementation" #define PROV_NAMES_X448 "X448:1.3.101.111" #define PROV_DESCS_X448 "OpenSSL X448 implementation" #define PROV_NAMES_ED25519 "ED25519:1.3.101.112" #define PROV_DESCS_ED25519 "OpenSSL ED25519 implementation" #define PROV_NAMES_ED448 "ED448:1.3.101.113" #define PROV_DESCS_ED448 "OpenSSL ED448 implementation" #define PROV_NAMES_DH "DH:dhKeyAgreement:1.2.840.113549.1.3.1" #define PROV_DESCS_DH "OpenSSL PKCS#3 DH implementation" #define PROV_NAMES_DHX "DHX:X9.42 DH:dhpublicnumber:1.2.840.10046.2.1" #define PROV_DESCS_DHX "OpenSSL X9.42 DH implementation" #define PROV_NAMES_DSA "DSA:dsaEncryption:1.2.840.10040.4.1" #define PROV_DESCS_DSA "OpenSSL DSA implementation" #define PROV_NAMES_RSA "RSA:rsaEncryption:1.2.840.113549.1.1.1" #define PROV_DESCS_RSA "OpenSSL RSA implementation" #define PROV_NAMES_RSA_PSS "RSA-PSS:RSASSA-PSS:1.2.840.113549.1.1.10" #define PROV_DESCS_RSA_PSS "OpenSSL RSA-PSS implementation" #define PROV_NAMES_SM2 "SM2:1.2.156.10197.1.301" #define PROV_DESCS_SM2 "OpenSSL SM2 implementation"
./openssl/providers/implementations/include/prov/ciphercommon.h
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #ifndef OSSL_PROV_CIPHERCOMMON_H # define OSSL_PROV_CIPHERCOMMON_H # pragma once # include <openssl/params.h> # include <openssl/core_dispatch.h> # include <openssl/core_names.h> # include <openssl/evp.h> # include "internal/cryptlib.h" # include "crypto/modes.h" # define MAXCHUNK ((size_t)1 << 30) # define MAXBITCHUNK ((size_t)1 << (sizeof(size_t) * 8 - 4)) # define GENERIC_BLOCK_SIZE 16 # define IV_STATE_UNINITIALISED 0 /* initial state is not initialized */ # define IV_STATE_BUFFERED 1 /* iv has been copied to the iv buffer */ # define IV_STATE_COPIED 2 /* iv has been copied from the iv buffer */ # define IV_STATE_FINISHED 3 /* the iv has been used - so don't reuse it */ # define PROV_CIPHER_FUNC(type, name, args) typedef type (* OSSL_##name##_fn)args typedef struct prov_cipher_hw_st PROV_CIPHER_HW; typedef struct prov_cipher_ctx_st PROV_CIPHER_CTX; typedef int (PROV_CIPHER_HW_FN)(PROV_CIPHER_CTX *dat, unsigned char *out, const unsigned char *in, size_t len); /* Internal flags that can be queried */ # define PROV_CIPHER_FLAG_AEAD 0x0001 # define PROV_CIPHER_FLAG_CUSTOM_IV 0x0002 # define PROV_CIPHER_FLAG_CTS 0x0004 # define PROV_CIPHER_FLAG_TLS1_MULTIBLOCK 0x0008 # define PROV_CIPHER_FLAG_RAND_KEY 0x0010 /* Internal flags that are only used within the provider */ # define PROV_CIPHER_FLAG_VARIABLE_LENGTH 0x0100 # define PROV_CIPHER_FLAG_INVERSE_CIPHER 0x0200 struct prov_cipher_ctx_st { /* place buffer at the beginning for memory alignment */ /* The original value of the iv */ unsigned char oiv[GENERIC_BLOCK_SIZE]; /* Buffer of partial blocks processed via update calls */ unsigned char buf[GENERIC_BLOCK_SIZE]; unsigned char iv[GENERIC_BLOCK_SIZE]; block128_f block; union { cbc128_f cbc; ctr128_f ctr; ecb128_f ecb; } stream; unsigned int mode; size_t keylen; /* key size (in bytes) */ size_t ivlen; size_t blocksize; size_t bufsz; /* Number of bytes in buf */ unsigned int cts_mode; /* Use to set the type for CTS modes */ unsigned int pad : 1; /* Whether padding should be used or not */ unsigned int enc : 1; /* Set to 1 for encrypt, or 0 otherwise */ unsigned int iv_set : 1; /* Set when the iv is copied to the iv/oiv buffers */ unsigned int key_set : 1; /* Set when key is set on the context */ unsigned int updated : 1; /* Set to 1 during update for one shot ciphers */ unsigned int variable_keylength : 1; unsigned int inverse_cipher : 1; /* set to 1 to use inverse cipher */ unsigned int use_bits : 1; /* Set to 0 for cfb1 to use bits instead of bytes */ unsigned int tlsversion; /* If TLS padding is in use the TLS version number */ unsigned char *tlsmac; /* tls MAC extracted from the last record */ int alloced; /* * Whether the tlsmac data has been allocated or * points into the user buffer. */ size_t tlsmacsize; /* Size of the TLS MAC */ int removetlspad; /* Whether TLS padding should be removed or not */ size_t removetlsfixed; /* * Length of the fixed size data to remove when * processing TLS data (equals mac size plus * IV size if applicable) */ /* * num contains the number of bytes of |iv| which are valid for modes that * manage partial blocks themselves. */ unsigned int num; const PROV_CIPHER_HW *hw; /* hardware specific functions */ const void *ks; /* Pointer to algorithm specific key data */ OSSL_LIB_CTX *libctx; }; struct prov_cipher_hw_st { int (*init)(PROV_CIPHER_CTX *dat, const uint8_t *key, size_t keylen); PROV_CIPHER_HW_FN *cipher; void (*copyctx)(PROV_CIPHER_CTX *dst, const PROV_CIPHER_CTX *src); }; void ossl_cipher_generic_reset_ctx(PROV_CIPHER_CTX *ctx); OSSL_FUNC_cipher_encrypt_init_fn ossl_cipher_generic_einit; OSSL_FUNC_cipher_decrypt_init_fn ossl_cipher_generic_dinit; OSSL_FUNC_cipher_update_fn ossl_cipher_generic_block_update; OSSL_FUNC_cipher_final_fn ossl_cipher_generic_block_final; OSSL_FUNC_cipher_update_fn ossl_cipher_generic_stream_update; OSSL_FUNC_cipher_final_fn ossl_cipher_generic_stream_final; OSSL_FUNC_cipher_cipher_fn ossl_cipher_generic_cipher; OSSL_FUNC_cipher_get_ctx_params_fn ossl_cipher_generic_get_ctx_params; OSSL_FUNC_cipher_set_ctx_params_fn ossl_cipher_generic_set_ctx_params; OSSL_FUNC_cipher_gettable_params_fn ossl_cipher_generic_gettable_params; OSSL_FUNC_cipher_gettable_ctx_params_fn ossl_cipher_generic_gettable_ctx_params; OSSL_FUNC_cipher_settable_ctx_params_fn ossl_cipher_generic_settable_ctx_params; OSSL_FUNC_cipher_set_ctx_params_fn ossl_cipher_var_keylen_set_ctx_params; OSSL_FUNC_cipher_settable_ctx_params_fn ossl_cipher_var_keylen_settable_ctx_params; OSSL_FUNC_cipher_gettable_ctx_params_fn ossl_cipher_aead_gettable_ctx_params; OSSL_FUNC_cipher_settable_ctx_params_fn ossl_cipher_aead_settable_ctx_params; int ossl_cipher_generic_get_params(OSSL_PARAM params[], unsigned int md, uint64_t flags, size_t kbits, size_t blkbits, size_t ivbits); void ossl_cipher_generic_initkey(void *vctx, size_t kbits, size_t blkbits, size_t ivbits, unsigned int mode, uint64_t flags, const PROV_CIPHER_HW *hw, void *provctx); # define IMPLEMENT_generic_cipher_func(alg, UCALG, lcmode, UCMODE, flags, kbits,\ blkbits, ivbits, typ) \ const OSSL_DISPATCH ossl_##alg##kbits##lcmode##_functions[] = { \ { OSSL_FUNC_CIPHER_NEWCTX, \ (void (*)(void)) alg##_##kbits##_##lcmode##_newctx }, \ { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void)) alg##_freectx }, \ { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void)) alg##_dupctx }, \ { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))ossl_cipher_generic_einit }, \ { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))ossl_cipher_generic_dinit }, \ { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))ossl_cipher_generic_##typ##_update },\ { OSSL_FUNC_CIPHER_FINAL, (void (*)(void))ossl_cipher_generic_##typ##_final }, \ { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))ossl_cipher_generic_cipher }, \ { OSSL_FUNC_CIPHER_GET_PARAMS, \ (void (*)(void)) alg##_##kbits##_##lcmode##_get_params }, \ { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_get_ctx_params }, \ { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_set_ctx_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_ctx_params }, \ { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_settable_ctx_params }, \ OSSL_DISPATCH_END \ }; # define IMPLEMENT_var_keylen_cipher_func(alg, UCALG, lcmode, UCMODE, flags, \ kbits, blkbits, ivbits, typ) \ const OSSL_DISPATCH ossl_##alg##kbits##lcmode##_functions[] = { \ { OSSL_FUNC_CIPHER_NEWCTX, \ (void (*)(void)) alg##_##kbits##_##lcmode##_newctx }, \ { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void)) alg##_freectx }, \ { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void)) alg##_dupctx }, \ { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))ossl_cipher_generic_einit },\ { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))ossl_cipher_generic_dinit },\ { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))ossl_cipher_generic_##typ##_update },\ { OSSL_FUNC_CIPHER_FINAL, (void (*)(void))ossl_cipher_generic_##typ##_final }, \ { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))ossl_cipher_generic_cipher }, \ { OSSL_FUNC_CIPHER_GET_PARAMS, \ (void (*)(void)) alg##_##kbits##_##lcmode##_get_params }, \ { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_get_ctx_params }, \ { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, \ (void (*)(void))ossl_cipher_var_keylen_set_ctx_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_ctx_params }, \ { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, \ (void (*)(void))ossl_cipher_var_keylen_settable_ctx_params }, \ OSSL_DISPATCH_END \ }; # define IMPLEMENT_generic_cipher_genfn(alg, UCALG, lcmode, UCMODE, flags, \ kbits, blkbits, ivbits, typ) \ static OSSL_FUNC_cipher_get_params_fn alg##_##kbits##_##lcmode##_get_params; \ static int alg##_##kbits##_##lcmode##_get_params(OSSL_PARAM params[]) \ { \ return ossl_cipher_generic_get_params(params, EVP_CIPH_##UCMODE##_MODE, \ flags, kbits, blkbits, ivbits); \ } \ static OSSL_FUNC_cipher_newctx_fn alg##_##kbits##_##lcmode##_newctx; \ static void * alg##_##kbits##_##lcmode##_newctx(void *provctx) \ { \ PROV_##UCALG##_CTX *ctx = ossl_prov_is_running() ? OPENSSL_zalloc(sizeof(*ctx))\ : NULL; \ if (ctx != NULL) { \ ossl_cipher_generic_initkey(ctx, kbits, blkbits, ivbits, \ EVP_CIPH_##UCMODE##_MODE, flags, \ ossl_prov_cipher_hw_##alg##_##lcmode(kbits),\ provctx); \ } \ return ctx; \ } \ # define IMPLEMENT_generic_cipher(alg, UCALG, lcmode, UCMODE, flags, kbits, \ blkbits, ivbits, typ) \ IMPLEMENT_generic_cipher_genfn(alg, UCALG, lcmode, UCMODE, flags, kbits, \ blkbits, ivbits, typ) \ IMPLEMENT_generic_cipher_func(alg, UCALG, lcmode, UCMODE, flags, kbits, \ blkbits, ivbits, typ) # define IMPLEMENT_var_keylen_cipher(alg, UCALG, lcmode, UCMODE, flags, kbits, \ blkbits, ivbits, typ) \ IMPLEMENT_generic_cipher_genfn(alg, UCALG, lcmode, UCMODE, flags, kbits, \ blkbits, ivbits, typ) \ IMPLEMENT_var_keylen_cipher_func(alg, UCALG, lcmode, UCMODE, flags, kbits, \ blkbits, ivbits, typ) PROV_CIPHER_HW_FN ossl_cipher_hw_generic_cbc; PROV_CIPHER_HW_FN ossl_cipher_hw_generic_ecb; PROV_CIPHER_HW_FN ossl_cipher_hw_generic_ofb128; PROV_CIPHER_HW_FN ossl_cipher_hw_generic_cfb128; PROV_CIPHER_HW_FN ossl_cipher_hw_generic_cfb8; PROV_CIPHER_HW_FN ossl_cipher_hw_generic_cfb1; PROV_CIPHER_HW_FN ossl_cipher_hw_generic_ctr; PROV_CIPHER_HW_FN ossl_cipher_hw_chunked_cbc; PROV_CIPHER_HW_FN ossl_cipher_hw_chunked_cfb8; PROV_CIPHER_HW_FN ossl_cipher_hw_chunked_cfb128; PROV_CIPHER_HW_FN ossl_cipher_hw_chunked_ofb128; # define ossl_cipher_hw_chunked_ecb ossl_cipher_hw_generic_ecb # define ossl_cipher_hw_chunked_ctr ossl_cipher_hw_generic_ctr # define ossl_cipher_hw_chunked_cfb1 ossl_cipher_hw_generic_cfb1 # define IMPLEMENT_CIPHER_HW_OFB(MODE, NAME, CTX_NAME, KEY_NAME, FUNC_PREFIX) \ static int cipher_hw_##NAME##_##MODE##_cipher(PROV_CIPHER_CTX *ctx, \ unsigned char *out, \ const unsigned char *in, size_t len) \ { \ int num = ctx->num; \ KEY_NAME *key = &(((CTX_NAME *)ctx)->ks.ks); \ \ while (len >= MAXCHUNK) { \ FUNC_PREFIX##_encrypt(in, out, MAXCHUNK, key, ctx->iv, &num); \ len -= MAXCHUNK; \ in += MAXCHUNK; \ out += MAXCHUNK; \ } \ if (len > 0) { \ FUNC_PREFIX##_encrypt(in, out, (long)len, key, ctx->iv, &num); \ } \ ctx->num = num; \ return 1; \ } # define IMPLEMENT_CIPHER_HW_ECB(MODE, NAME, CTX_NAME, KEY_NAME, FUNC_PREFIX) \ static int cipher_hw_##NAME##_##MODE##_cipher(PROV_CIPHER_CTX *ctx, \ unsigned char *out, \ const unsigned char *in, size_t len) \ { \ size_t i, bl = ctx->blocksize; \ KEY_NAME *key = &(((CTX_NAME *)ctx)->ks.ks); \ \ if (len < bl) \ return 1; \ for (i = 0, len -= bl; i <= len; i += bl) \ FUNC_PREFIX##_encrypt(in + i, out + i, key, ctx->enc); \ return 1; \ } # define IMPLEMENT_CIPHER_HW_CBC(MODE, NAME, CTX_NAME, KEY_NAME, FUNC_PREFIX) \ static int cipher_hw_##NAME##_##MODE##_cipher(PROV_CIPHER_CTX *ctx, \ unsigned char *out, \ const unsigned char *in, size_t len) \ { \ KEY_NAME *key = &(((CTX_NAME *)ctx)->ks.ks); \ \ while (len >= MAXCHUNK) { \ FUNC_PREFIX##_encrypt(in, out, MAXCHUNK, key, ctx->iv, ctx->enc); \ len -= MAXCHUNK; \ in += MAXCHUNK; \ out += MAXCHUNK; \ } \ if (len > 0) \ FUNC_PREFIX##_encrypt(in, out, (long)len, key, ctx->iv, ctx->enc); \ return 1; \ } # define IMPLEMENT_CIPHER_HW_CFB(MODE, NAME, CTX_NAME, KEY_NAME, FUNC_PREFIX) \ static int cipher_hw_##NAME##_##MODE##_cipher(PROV_CIPHER_CTX *ctx, \ unsigned char *out, \ const unsigned char *in, size_t len) \ { \ size_t chunk = MAXCHUNK; \ KEY_NAME *key = &(((CTX_NAME *)ctx)->ks.ks); \ int num = ctx->num; \ \ if (len < chunk) \ chunk = len; \ while (len > 0 && len >= chunk) { \ FUNC_PREFIX##_encrypt(in, out, (long)chunk, key, ctx->iv, &num, \ ctx->enc); \ len -= chunk; \ in += chunk; \ out += chunk; \ if (len < chunk) \ chunk = len; \ } \ ctx->num = num; \ return 1; \ } # define IMPLEMENT_CIPHER_HW_COPYCTX(name, CTX_TYPE) \ static void name(PROV_CIPHER_CTX *dst, const PROV_CIPHER_CTX *src) \ { \ CTX_TYPE *sctx = (CTX_TYPE *)src; \ CTX_TYPE *dctx = (CTX_TYPE *)dst; \ \ *dctx = *sctx; \ dst->ks = &dctx->ks.ks; \ } # define CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_START(name) \ static const OSSL_PARAM name##_known_gettable_ctx_params[] = { \ OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), \ OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL), \ OSSL_PARAM_uint(OSSL_CIPHER_PARAM_PADDING, NULL), \ OSSL_PARAM_uint(OSSL_CIPHER_PARAM_NUM, NULL), \ OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_IV, NULL, 0), \ OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_UPDATED_IV, NULL, 0), # define CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_END(name) \ OSSL_PARAM_END \ }; \ const OSSL_PARAM * name##_gettable_ctx_params(ossl_unused void *cctx, \ ossl_unused void *provctx) \ { \ return name##_known_gettable_ctx_params; \ } # define CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_START(name) \ static const OSSL_PARAM name##_known_settable_ctx_params[] = { \ OSSL_PARAM_uint(OSSL_CIPHER_PARAM_PADDING, NULL), \ OSSL_PARAM_uint(OSSL_CIPHER_PARAM_NUM, NULL), # define CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_END(name) \ OSSL_PARAM_END \ }; \ const OSSL_PARAM * name##_settable_ctx_params(ossl_unused void *cctx, \ ossl_unused void *provctx) \ { \ return name##_known_settable_ctx_params; \ } int ossl_cipher_generic_initiv(PROV_CIPHER_CTX *ctx, const unsigned char *iv, size_t ivlen); size_t ossl_cipher_fillblock(unsigned char *buf, size_t *buflen, size_t blocksize, const unsigned char **in, size_t *inlen); int ossl_cipher_trailingdata(unsigned char *buf, size_t *buflen, size_t blocksize, const unsigned char **in, size_t *inlen); #endif
./openssl/providers/implementations/include/prov/md5_sha1.h
/* * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #ifndef OSSL_PROV_MD5_SHA1_H # define OSSL_PROV_MD5_SHA1_H # include <openssl/opensslconf.h> # ifndef OPENSSL_NO_MD5 # include <openssl/e_os2.h> # include <stddef.h> # include <openssl/md5.h> # include <openssl/sha.h> # define MD5_SHA1_DIGEST_LENGTH (MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH) # define MD5_SHA1_CBLOCK MD5_CBLOCK typedef struct md5_sha1_st { MD5_CTX md5; SHA_CTX sha1; } MD5_SHA1_CTX; int ossl_md5_sha1_init(MD5_SHA1_CTX *mctx); int ossl_md5_sha1_update(MD5_SHA1_CTX *mctx, const void *data, size_t count); int ossl_md5_sha1_final(unsigned char *md, MD5_SHA1_CTX *mctx); int ossl_md5_sha1_ctrl(MD5_SHA1_CTX *mctx, int cmd, int mslen, void *ms); # endif /* OPENSSL_NO_MD5 */ #endif /* OSSL_PROV_MD5_SHA1_H */
./openssl/providers/implementations/include/prov/macsignature.h
/* * Copyright 2020-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <stdlib.h> #include <openssl/crypto.h> #include "internal/refcount.h" #include "prov/provider_util.h" struct mac_key_st { OSSL_LIB_CTX *libctx; CRYPTO_REF_COUNT refcnt; unsigned char *priv_key; size_t priv_key_len; PROV_CIPHER cipher; char *properties; int cmac; }; typedef struct mac_key_st MAC_KEY; MAC_KEY *ossl_mac_key_new(OSSL_LIB_CTX *libctx, int cmac); void ossl_mac_key_free(MAC_KEY *mackey); int ossl_mac_key_up_ref(MAC_KEY *mackey);
./openssl/providers/implementations/include/prov/ciphercommon_gcm.h
/* * Copyright 2019-2022 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #ifndef OSSL_PROV_CIPHERCOMMON_GCM_H # define OSSL_PROV_CIPHERCOMMON_GCM_H # pragma once # include <openssl/aes.h> # include "ciphercommon_aead.h" typedef struct prov_gcm_hw_st PROV_GCM_HW; # define GCM_IV_DEFAULT_SIZE 12 /* IV's for AES_GCM should normally be 12 bytes */ # define GCM_IV_MAX_SIZE (1024 / 8) # define GCM_TAG_MAX_SIZE 16 # if defined(OPENSSL_CPUID_OBJ) && defined(__s390__) /*- * KMA-GCM-AES parameter block - begin * (see z/Architecture Principles of Operation >= SA22-7832-11) */ typedef struct S390X_kma_params_st { unsigned char reserved[12]; union { unsigned int w; unsigned char b[4]; } cv; /* 32 bit counter value */ union { unsigned long long g[2]; unsigned char b[16]; } t; /* tag */ unsigned char h[16]; /* hash subkey */ unsigned long long taadl; /* total AAD length */ unsigned long long tpcl; /* total plaintxt/ciphertxt len */ union { unsigned long long g[2]; unsigned int w[4]; } j0; /* initial counter value */ unsigned char k[32]; /* key */ } S390X_KMA_PARAMS; # endif typedef struct prov_gcm_ctx_st { unsigned int mode; /* The mode that we are using */ size_t keylen; size_t ivlen; size_t taglen; size_t tls_aad_pad_sz; size_t tls_aad_len; /* TLS AAD length */ uint64_t tls_enc_records; /* Number of TLS records encrypted */ /* * num contains the number of bytes of |iv| which are valid for modes that * manage partial blocks themselves. */ size_t num; size_t bufsz; /* Number of bytes in buf */ uint64_t flags; unsigned int iv_state; /* set to one of IV_STATE_XXX */ unsigned int enc:1; /* Set to 1 if we are encrypting or 0 otherwise */ unsigned int pad:1; /* Whether padding should be used or not */ unsigned int key_set:1; /* Set if key initialised */ unsigned int iv_gen_rand:1; /* No IV was specified, so generate a rand IV */ unsigned int iv_gen:1; /* It is OK to generate IVs */ unsigned char iv[GCM_IV_MAX_SIZE]; /* Buffer to use for IV's */ unsigned char buf[AES_BLOCK_SIZE]; /* Buffer of partial blocks processed via update calls */ OSSL_LIB_CTX *libctx; /* needed for rand calls */ const PROV_GCM_HW *hw; /* hardware specific methods */ GCM128_CONTEXT gcm; ctr128_f ctr; } PROV_GCM_CTX; PROV_CIPHER_FUNC(int, GCM_setkey, (PROV_GCM_CTX *ctx, const unsigned char *key, size_t keylen)); PROV_CIPHER_FUNC(int, GCM_setiv, (PROV_GCM_CTX *dat, const unsigned char *iv, size_t ivlen)); PROV_CIPHER_FUNC(int, GCM_aadupdate, (PROV_GCM_CTX *ctx, const unsigned char *aad, size_t aadlen)); PROV_CIPHER_FUNC(int, GCM_cipherupdate, (PROV_GCM_CTX *ctx, const unsigned char *in, size_t len, unsigned char *out)); PROV_CIPHER_FUNC(int, GCM_cipherfinal, (PROV_GCM_CTX *ctx, unsigned char *tag)); PROV_CIPHER_FUNC(int, GCM_oneshot, (PROV_GCM_CTX *ctx, unsigned char *aad, size_t aad_len, const unsigned char *in, size_t in_len, unsigned char *out, unsigned char *tag, size_t taglen)); struct prov_gcm_hw_st { OSSL_GCM_setkey_fn setkey; OSSL_GCM_setiv_fn setiv; OSSL_GCM_aadupdate_fn aadupdate; OSSL_GCM_cipherupdate_fn cipherupdate; OSSL_GCM_cipherfinal_fn cipherfinal; OSSL_GCM_oneshot_fn oneshot; }; OSSL_FUNC_cipher_encrypt_init_fn ossl_gcm_einit; OSSL_FUNC_cipher_decrypt_init_fn ossl_gcm_dinit; OSSL_FUNC_cipher_get_ctx_params_fn ossl_gcm_get_ctx_params; OSSL_FUNC_cipher_set_ctx_params_fn ossl_gcm_set_ctx_params; OSSL_FUNC_cipher_cipher_fn ossl_gcm_cipher; OSSL_FUNC_cipher_update_fn ossl_gcm_stream_update; OSSL_FUNC_cipher_final_fn ossl_gcm_stream_final; void ossl_gcm_initctx(void *provctx, PROV_GCM_CTX *ctx, size_t keybits, const PROV_GCM_HW *hw); int ossl_gcm_setiv(PROV_GCM_CTX *ctx, const unsigned char *iv, size_t ivlen); int ossl_gcm_aad_update(PROV_GCM_CTX *ctx, const unsigned char *aad, size_t aad_len); int ossl_gcm_cipher_final(PROV_GCM_CTX *ctx, unsigned char *tag); int ossl_gcm_one_shot(PROV_GCM_CTX *ctx, unsigned char *aad, size_t aad_len, const unsigned char *in, size_t in_len, unsigned char *out, unsigned char *tag, size_t tag_len); int ossl_gcm_cipher_update(PROV_GCM_CTX *ctx, const unsigned char *in, size_t len, unsigned char *out); # define GCM_HW_SET_KEY_CTR_FN(ks, fn_set_enc_key, fn_block, fn_ctr) \ fn_set_enc_key(key, keylen * 8, ks); \ CRYPTO_gcm128_init(&ctx->gcm, ks, (block128_f)fn_block); \ ctx->ctr = (ctr128_f)fn_ctr; \ ctx->key_set = 1; #endif
./openssl/providers/implementations/include/prov/hmac_drbg.h
/* * Copyright 2022 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #ifndef OSSL_PROV_HMAC_DRBG_H # define OSSL_PROV_HMAC_DRBG_H # pragma once #include <openssl/evp.h> #include "prov/provider_util.h" typedef struct drbg_hmac_st { EVP_MAC_CTX *ctx; /* H(x) = HMAC_hash OR H(x) = KMAC */ PROV_DIGEST digest; /* H(x) = hash(x) */ size_t blocklen; unsigned char K[EVP_MAX_MD_SIZE]; unsigned char V[EVP_MAX_MD_SIZE]; } PROV_DRBG_HMAC; int ossl_drbg_hmac_init(PROV_DRBG_HMAC *drbg, const unsigned char *ent, size_t ent_len, const unsigned char *nonce, size_t nonce_len, const unsigned char *pstr, size_t pstr_len); int ossl_drbg_hmac_generate(PROV_DRBG_HMAC *hmac, unsigned char *out, size_t outlen, const unsigned char *adin, size_t adin_len); #endif /* OSSL_PROV_HMAC_DRBG_H */
./openssl/providers/implementations/include/prov/kdfexchange.h
/* * Copyright 2020-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <stdlib.h> #include <openssl/crypto.h> #include "internal/refcount.h" struct kdf_data_st { OSSL_LIB_CTX *libctx; CRYPTO_REF_COUNT refcnt; }; typedef struct kdf_data_st KDF_DATA; KDF_DATA *ossl_kdf_data_new(void *provctx); void ossl_kdf_data_free(KDF_DATA *kdfdata); int ossl_kdf_data_up_ref(KDF_DATA *kdfdata);
./openssl/providers/implementations/include/prov/blake2.h
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #ifndef OSSL_PROV_BLAKE2_H # define OSSL_PROV_BLAKE2_H # include <openssl/opensslconf.h> # include <openssl/e_os2.h> # include <stddef.h> # include <crypto/evp.h> # define BLAKE2S_BLOCKBYTES 64 # define BLAKE2S_OUTBYTES 32 # define BLAKE2S_KEYBYTES 32 # define BLAKE2S_SALTBYTES 8 # define BLAKE2S_PERSONALBYTES 8 # define BLAKE2B_BLOCKBYTES 128 # define BLAKE2B_OUTBYTES 64 # define BLAKE2B_KEYBYTES 64 # define BLAKE2B_SALTBYTES 16 # define BLAKE2B_PERSONALBYTES 16 struct blake2s_param_st { uint8_t digest_length; /* 1 */ uint8_t key_length; /* 2 */ uint8_t fanout; /* 3 */ uint8_t depth; /* 4 */ uint8_t leaf_length[4];/* 8 */ uint8_t node_offset[6];/* 14 */ uint8_t node_depth; /* 15 */ uint8_t inner_length; /* 16 */ uint8_t salt[BLAKE2S_SALTBYTES]; /* 24 */ uint8_t personal[BLAKE2S_PERSONALBYTES]; /* 32 */ }; typedef struct blake2s_param_st BLAKE2S_PARAM; struct blake2s_ctx_st { uint32_t h[8]; uint32_t t[2]; uint32_t f[2]; uint8_t buf[BLAKE2S_BLOCKBYTES]; size_t buflen; size_t outlen; }; struct blake2b_param_st { uint8_t digest_length; /* 1 */ uint8_t key_length; /* 2 */ uint8_t fanout; /* 3 */ uint8_t depth; /* 4 */ uint8_t leaf_length[4];/* 8 */ uint8_t node_offset[8];/* 16 */ uint8_t node_depth; /* 17 */ uint8_t inner_length; /* 18 */ uint8_t reserved[14]; /* 32 */ uint8_t salt[BLAKE2B_SALTBYTES]; /* 48 */ uint8_t personal[BLAKE2B_PERSONALBYTES]; /* 64 */ }; typedef struct blake2b_param_st BLAKE2B_PARAM; struct blake2b_ctx_st { uint64_t h[8]; uint64_t t[2]; uint64_t f[2]; uint8_t buf[BLAKE2B_BLOCKBYTES]; size_t buflen; size_t outlen; }; #define BLAKE2B_DIGEST_LENGTH 64 #define BLAKE2S_DIGEST_LENGTH 32 typedef struct blake2s_ctx_st BLAKE2S_CTX; typedef struct blake2b_ctx_st BLAKE2B_CTX; struct blake2b_md_data_st { BLAKE2B_CTX ctx; BLAKE2B_PARAM params; }; struct blake2s_md_data_st { BLAKE2S_CTX ctx; BLAKE2S_PARAM params; }; int ossl_blake2b_init(BLAKE2B_CTX *c, const BLAKE2B_PARAM *P); int ossl_blake2b_init_key(BLAKE2B_CTX *c, const BLAKE2B_PARAM *P, const void *key); int ossl_blake2b_update(BLAKE2B_CTX *c, const void *data, size_t datalen); int ossl_blake2b_final(unsigned char *md, BLAKE2B_CTX *c); OSSL_FUNC_digest_get_ctx_params_fn ossl_blake2b_get_ctx_params; OSSL_FUNC_digest_set_ctx_params_fn ossl_blake2b_set_ctx_params; OSSL_FUNC_digest_gettable_ctx_params_fn ossl_blake2b_gettable_ctx_params; OSSL_FUNC_digest_settable_ctx_params_fn ossl_blake2b_settable_ctx_params; /* * These setters are internal and do not check the validity of their parameters. * See blake2b_mac_ctrl for validation logic. */ void ossl_blake2b_param_init(BLAKE2B_PARAM *P); void ossl_blake2b_param_set_digest_length(BLAKE2B_PARAM *P, uint8_t outlen); void ossl_blake2b_param_set_key_length(BLAKE2B_PARAM *P, uint8_t keylen); void ossl_blake2b_param_set_personal(BLAKE2B_PARAM *P, const uint8_t *personal, size_t length); void ossl_blake2b_param_set_salt(BLAKE2B_PARAM *P, const uint8_t *salt, size_t length); int ossl_blake2s_init(BLAKE2S_CTX *c, const BLAKE2S_PARAM *P); int ossl_blake2s_init_key(BLAKE2S_CTX *c, const BLAKE2S_PARAM *P, const void *key); int ossl_blake2s_update(BLAKE2S_CTX *c, const void *data, size_t datalen); int ossl_blake2s_final(unsigned char *md, BLAKE2S_CTX *c); void ossl_blake2s_param_init(BLAKE2S_PARAM *P); void ossl_blake2s_param_set_digest_length(BLAKE2S_PARAM *P, uint8_t outlen); void ossl_blake2s_param_set_key_length(BLAKE2S_PARAM *P, uint8_t keylen); void ossl_blake2s_param_set_personal(BLAKE2S_PARAM *P, const uint8_t *personal, size_t length); void ossl_blake2s_param_set_salt(BLAKE2S_PARAM *P, const uint8_t *salt, size_t length); OSSL_FUNC_digest_get_ctx_params_fn ossl_blake2s_get_ctx_params; OSSL_FUNC_digest_set_ctx_params_fn ossl_blake2s_set_ctx_params; OSSL_FUNC_digest_gettable_ctx_params_fn ossl_blake2s_gettable_ctx_params; OSSL_FUNC_digest_settable_ctx_params_fn ossl_blake2s_settable_ctx_params; #endif /* OSSL_PROV_BLAKE2_H */
./openssl/providers/implementations/include/prov/ciphercommon_aead.h
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #ifndef OSSL_PROV_CIPHERCOMMON_AEAD_H # define OSSL_PROV_CIPHERCOMMON_AEAD_H # pragma once # define UNINITIALISED_SIZET ((size_t)-1) # define AEAD_FLAGS (PROV_CIPHER_FLAG_AEAD | PROV_CIPHER_FLAG_CUSTOM_IV) # define IMPLEMENT_aead_cipher(alg, lc, UCMODE, flags, kbits, blkbits, ivbits) \ static OSSL_FUNC_cipher_get_params_fn alg##_##kbits##_##lc##_get_params; \ static int alg##_##kbits##_##lc##_get_params(OSSL_PARAM params[]) \ { \ return ossl_cipher_generic_get_params(params, EVP_CIPH_##UCMODE##_MODE, \ flags, kbits, blkbits, ivbits); \ } \ static OSSL_FUNC_cipher_newctx_fn alg##kbits##lc##_newctx; \ static void * alg##kbits##lc##_newctx(void *provctx) \ { \ return alg##_##lc##_newctx(provctx, kbits); \ } \ static void * alg##kbits##lc##_dupctx(void *src) \ { \ return alg##_##lc##_dupctx(src); \ } \ const OSSL_DISPATCH ossl_##alg##kbits##lc##_functions[] = { \ { OSSL_FUNC_CIPHER_NEWCTX, (void (*)(void))alg##kbits##lc##_newctx }, \ { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))alg##_##lc##_freectx }, \ { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))alg##kbits##lc##_dupctx }, \ { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))ossl_##lc##_einit }, \ { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))ossl_##lc##_dinit }, \ { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))ossl_##lc##_stream_update }, \ { OSSL_FUNC_CIPHER_FINAL, (void (*)(void))ossl_##lc##_stream_final }, \ { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))ossl_##lc##_cipher }, \ { OSSL_FUNC_CIPHER_GET_PARAMS, \ (void (*)(void)) alg##_##kbits##_##lc##_get_params }, \ { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, \ (void (*)(void)) ossl_##lc##_get_ctx_params }, \ { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, \ (void (*)(void)) ossl_##lc##_set_ctx_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, \ (void (*)(void))ossl_cipher_aead_gettable_ctx_params }, \ { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, \ (void (*)(void))ossl_cipher_aead_settable_ctx_params }, \ OSSL_DISPATCH_END \ } #endif
./openssl/providers/implementations/include/prov/ciphercommon_ccm.h
/* * Copyright 2019-2022 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #ifndef OSSL_PROV_CIPHERCOMMON_CCM_H # define OSSL_PROV_CIPHERCOMMON_CCM_H # pragma once # include "ciphercommon_aead.h" typedef struct prov_ccm_hw_st PROV_CCM_HW; # if defined(OPENSSL_CPUID_OBJ) && defined(__s390__) /*- * KMAC-AES parameter block - begin * (see z/Architecture Principles of Operation >= SA22-7832-08) */ typedef struct S390X_kmac_params_st { union { unsigned long long g[2]; unsigned char b[16]; } icv; unsigned char k[32]; } S390X_KMAC_PARAMS; /* KMAC-AES parameter block - end */ # endif /* Base structure that is shared by AES & ARIA for CCM MODE */ typedef struct prov_ccm_st { unsigned int enc : 1; unsigned int key_set : 1; /* Set if key initialised */ unsigned int iv_set : 1; /* Set if an iv is set */ unsigned int tag_set : 1; /* Set if tag is valid */ unsigned int len_set : 1; /* Set if message length set */ size_t l, m; /* L and M parameters from RFC3610 */ size_t keylen; size_t tls_aad_len; /* TLS AAD length */ size_t tls_aad_pad_sz; unsigned char iv[GENERIC_BLOCK_SIZE]; unsigned char buf[GENERIC_BLOCK_SIZE]; CCM128_CONTEXT ccm_ctx; ccm128_f str; const PROV_CCM_HW *hw; /* hardware specific methods */ } PROV_CCM_CTX; PROV_CIPHER_FUNC(int, CCM_cipher, (PROV_CCM_CTX *ctx, unsigned char *out, \ size_t *padlen, const unsigned char *in, \ size_t len)); PROV_CIPHER_FUNC(int, CCM_setkey, (PROV_CCM_CTX *ctx, \ const unsigned char *key, size_t keylen)); PROV_CIPHER_FUNC(int, CCM_setiv, (PROV_CCM_CTX *dat, \ const unsigned char *iv, size_t ivlen, \ size_t mlen)); PROV_CIPHER_FUNC(int, CCM_setaad, (PROV_CCM_CTX *ctx, \ const unsigned char *aad, size_t aadlen)); PROV_CIPHER_FUNC(int, CCM_auth_encrypt, (PROV_CCM_CTX *ctx, \ const unsigned char *in, \ unsigned char *out, size_t len, \ unsigned char *tag, size_t taglen)); PROV_CIPHER_FUNC(int, CCM_auth_decrypt, (PROV_CCM_CTX *ctx, \ const unsigned char *in, \ unsigned char *out, size_t len, \ unsigned char *tag, size_t taglen)); PROV_CIPHER_FUNC(int, CCM_gettag, (PROV_CCM_CTX *ctx, \ unsigned char *tag, size_t taglen)); /* * CCM Mode internal method table used to handle hardware specific differences, * (and different algorithms). */ struct prov_ccm_hw_st { OSSL_CCM_setkey_fn setkey; OSSL_CCM_setiv_fn setiv; OSSL_CCM_setaad_fn setaad; OSSL_CCM_auth_encrypt_fn auth_encrypt; OSSL_CCM_auth_decrypt_fn auth_decrypt; OSSL_CCM_gettag_fn gettag; }; OSSL_FUNC_cipher_encrypt_init_fn ossl_ccm_einit; OSSL_FUNC_cipher_decrypt_init_fn ossl_ccm_dinit; OSSL_FUNC_cipher_get_ctx_params_fn ossl_ccm_get_ctx_params; OSSL_FUNC_cipher_set_ctx_params_fn ossl_ccm_set_ctx_params; OSSL_FUNC_cipher_update_fn ossl_ccm_stream_update; OSSL_FUNC_cipher_final_fn ossl_ccm_stream_final; OSSL_FUNC_cipher_cipher_fn ossl_ccm_cipher; void ossl_ccm_initctx(PROV_CCM_CTX *ctx, size_t keybits, const PROV_CCM_HW *hw); int ossl_ccm_generic_setiv(PROV_CCM_CTX *ctx, const unsigned char *nonce, size_t nlen, size_t mlen); int ossl_ccm_generic_setaad(PROV_CCM_CTX *ctx, const unsigned char *aad, size_t alen); int ossl_ccm_generic_gettag(PROV_CCM_CTX *ctx, unsigned char *tag, size_t tlen); int ossl_ccm_generic_auth_encrypt(PROV_CCM_CTX *ctx, const unsigned char *in, unsigned char *out, size_t len, unsigned char *tag, size_t taglen); int ossl_ccm_generic_auth_decrypt(PROV_CCM_CTX *ctx, const unsigned char *in, unsigned char *out, size_t len, unsigned char *expected_tag, size_t taglen); #endif
./openssl/providers/implementations/include/prov/digestcommon.h
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #ifndef OSSL_PROVIDERS_DIGESTCOMMON_H # define OSSL_PROVIDERS_DIGESTCOMMON_H # include <openssl/core_dispatch.h> # include <openssl/core_names.h> # include <openssl/params.h> # include "prov/providercommon.h" /* Internal flags that can be queried */ #define PROV_DIGEST_FLAG_XOF 0x0001 #define PROV_DIGEST_FLAG_ALGID_ABSENT 0x0002 # ifdef __cplusplus extern "C" { # endif #define PROV_FUNC_DIGEST_GET_PARAM(name, blksize, dgstsize, flags) \ static OSSL_FUNC_digest_get_params_fn name##_get_params; \ static int name##_get_params(OSSL_PARAM params[]) \ { \ return ossl_digest_default_get_params(params, blksize, dgstsize, flags); \ } #define PROV_DISPATCH_FUNC_DIGEST_GET_PARAMS(name) \ { OSSL_FUNC_DIGEST_GET_PARAMS, (void (*)(void))name##_get_params }, \ { OSSL_FUNC_DIGEST_GETTABLE_PARAMS, \ (void (*)(void))ossl_digest_default_gettable_params } # define PROV_FUNC_DIGEST_FINAL(name, dgstsize, fin) \ static OSSL_FUNC_digest_final_fn name##_internal_final; \ static int name##_internal_final(void *ctx, unsigned char *out, size_t *outl, \ size_t outsz) \ { \ if (ossl_prov_is_running() && outsz >= dgstsize && fin(out, ctx)) { \ *outl = dgstsize; \ return 1; \ } \ return 0; \ } # define PROV_DISPATCH_FUNC_DIGEST_CONSTRUCT_START( \ name, CTX, blksize, dgstsize, flags, upd, fin) \ static OSSL_FUNC_digest_newctx_fn name##_newctx; \ static OSSL_FUNC_digest_freectx_fn name##_freectx; \ static OSSL_FUNC_digest_dupctx_fn name##_dupctx; \ static void *name##_newctx(void *prov_ctx) \ { \ CTX *ctx = ossl_prov_is_running() ? OPENSSL_zalloc(sizeof(*ctx)) : NULL; \ return ctx; \ } \ static void name##_freectx(void *vctx) \ { \ CTX *ctx = (CTX *)vctx; \ OPENSSL_clear_free(ctx, sizeof(*ctx)); \ } \ static void *name##_dupctx(void *ctx) \ { \ CTX *in = (CTX *)ctx; \ CTX *ret = ossl_prov_is_running() ? OPENSSL_malloc(sizeof(*ret)) : NULL; \ if (ret != NULL) \ *ret = *in; \ return ret; \ } \ PROV_FUNC_DIGEST_FINAL(name, dgstsize, fin) \ PROV_FUNC_DIGEST_GET_PARAM(name, blksize, dgstsize, flags) \ const OSSL_DISPATCH ossl_##name##_functions[] = { \ { OSSL_FUNC_DIGEST_NEWCTX, (void (*)(void))name##_newctx }, \ { OSSL_FUNC_DIGEST_UPDATE, (void (*)(void))upd }, \ { OSSL_FUNC_DIGEST_FINAL, (void (*)(void))name##_internal_final }, \ { OSSL_FUNC_DIGEST_FREECTX, (void (*)(void))name##_freectx }, \ { OSSL_FUNC_DIGEST_DUPCTX, (void (*)(void))name##_dupctx }, \ PROV_DISPATCH_FUNC_DIGEST_GET_PARAMS(name) # define PROV_DISPATCH_FUNC_DIGEST_CONSTRUCT_END \ { 0, NULL } \ }; # define IMPLEMENT_digest_functions( \ name, CTX, blksize, dgstsize, flags, init, upd, fin) \ static OSSL_FUNC_digest_init_fn name##_internal_init; \ static int name##_internal_init(void *ctx, \ ossl_unused const OSSL_PARAM params[]) \ { \ return ossl_prov_is_running() && init(ctx); \ } \ PROV_DISPATCH_FUNC_DIGEST_CONSTRUCT_START(name, CTX, blksize, dgstsize, flags, \ upd, fin), \ { OSSL_FUNC_DIGEST_INIT, (void (*)(void))name##_internal_init }, \ PROV_DISPATCH_FUNC_DIGEST_CONSTRUCT_END # define IMPLEMENT_digest_functions_with_settable_ctx( \ name, CTX, blksize, dgstsize, flags, init, upd, fin, \ settable_ctx_params, set_ctx_params) \ static OSSL_FUNC_digest_init_fn name##_internal_init; \ static int name##_internal_init(void *ctx, const OSSL_PARAM params[]) \ { \ return ossl_prov_is_running() \ && init(ctx) \ && set_ctx_params(ctx, params); \ } \ PROV_DISPATCH_FUNC_DIGEST_CONSTRUCT_START(name, CTX, blksize, dgstsize, flags, \ upd, fin), \ { OSSL_FUNC_DIGEST_INIT, (void (*)(void))name##_internal_init }, \ { OSSL_FUNC_DIGEST_SETTABLE_CTX_PARAMS, (void (*)(void))settable_ctx_params }, \ { OSSL_FUNC_DIGEST_SET_CTX_PARAMS, (void (*)(void))set_ctx_params }, \ PROV_DISPATCH_FUNC_DIGEST_CONSTRUCT_END const OSSL_PARAM *ossl_digest_default_gettable_params(void *provctx); int ossl_digest_default_get_params(OSSL_PARAM params[], size_t blksz, size_t paramsz, unsigned long flags); # ifdef __cplusplus } # endif #endif /* OSSL_PROVIDERS_DIGESTCOMMON_H */
./openssl/providers/implementations/include/prov/ecx.h
/* * Copyright 2022 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "crypto/types.h" #ifndef OPENSSL_NO_EC /* RFC 9180 Labels used for Extract and Expand operations */ /* ASCII: "eae_prk", in hex for EBCDIC compatibility */ #define OSSL_DHKEM_LABEL_EAE_PRK "\x65\x61\x65\x5F\x70\x72\x6B" /* ASCII: "shared_secret", in hex for EBCDIC compatibility */ #define OSSL_DHKEM_LABEL_SHARED_SECRET "\x73\x68\x61\x72\x65\x64\x5F\x73\x65\x63\x72\x65\x74" /* ASCII: "dkp_prk", in hex for EBCDIC compatibility */ #define OSSL_DHKEM_LABEL_DKP_PRK "\x64\x6B\x70\x5F\x70\x72\x6B" /* ASCII: "candidate", in hex for EBCDIC compatibility */ #define OSSL_DHKEM_LABEL_CANDIDATE "\x63\x61\x6E\x64\x69\x64\x61\x74\x65" /* ASCII: "sk", in hex for EBCDIC compatibility */ #define OSSL_DHKEM_LABEL_SK "\x73\x6B" int ossl_ecx_dhkem_derive_private(ECX_KEY *ecx, unsigned char *privout, const unsigned char *ikm, size_t ikmlen); int ossl_ec_dhkem_derive_private(EC_KEY *ec, BIGNUM *privout, const unsigned char *ikm, size_t ikmlen); #endif
./openssl/providers/implementations/include/prov/seeding.h
/* * Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "prov/provider_ctx.h" #include "crypto/rand_pool.h" /* Hardware-based seeding functions. */ size_t ossl_prov_acquire_entropy_from_tsc(RAND_POOL *pool); size_t ossl_prov_acquire_entropy_from_cpu(RAND_POOL *pool); /* * External seeding functions from the core dispatch table. */ int ossl_prov_seeding_from_dispatch(const OSSL_DISPATCH *fns); size_t ossl_prov_get_entropy(PROV_CTX *prov_ctx, unsigned char **pout, int entropy, size_t min_len, size_t max_len); void ossl_prov_cleanup_entropy(PROV_CTX *prov_ctx, unsigned char *buf, size_t len); size_t ossl_prov_get_nonce(PROV_CTX *prov_ctx, unsigned char **pout, size_t min_len, size_t max_len, const void *salt, size_t salt_len); void ossl_prov_cleanup_nonce(PROV_CTX *prov_ctx, unsigned char *buf, size_t len);
./openssl/providers/implementations/include/prov/implementations.h
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/core.h> #include <openssl/types.h> /* Digests */ extern const OSSL_DISPATCH ossl_sha1_functions[]; extern const OSSL_DISPATCH ossl_sha224_functions[]; extern const OSSL_DISPATCH ossl_sha256_functions[]; extern const OSSL_DISPATCH ossl_sha256_192_functions[]; extern const OSSL_DISPATCH ossl_sha384_functions[]; extern const OSSL_DISPATCH ossl_sha512_functions[]; extern const OSSL_DISPATCH ossl_sha512_224_functions[]; extern const OSSL_DISPATCH ossl_sha512_256_functions[]; extern const OSSL_DISPATCH ossl_sha3_224_functions[]; extern const OSSL_DISPATCH ossl_sha3_256_functions[]; extern const OSSL_DISPATCH ossl_sha3_384_functions[]; extern const OSSL_DISPATCH ossl_sha3_512_functions[]; extern const OSSL_DISPATCH ossl_keccak_224_functions[]; extern const OSSL_DISPATCH ossl_keccak_256_functions[]; extern const OSSL_DISPATCH ossl_keccak_384_functions[]; extern const OSSL_DISPATCH ossl_keccak_512_functions[]; extern const OSSL_DISPATCH ossl_keccak_kmac_128_functions[]; extern const OSSL_DISPATCH ossl_keccak_kmac_256_functions[]; extern const OSSL_DISPATCH ossl_shake_128_functions[]; extern const OSSL_DISPATCH ossl_shake_256_functions[]; extern const OSSL_DISPATCH ossl_blake2s256_functions[]; extern const OSSL_DISPATCH ossl_blake2b512_functions[]; extern const OSSL_DISPATCH ossl_md5_functions[]; extern const OSSL_DISPATCH ossl_md5_sha1_functions[]; extern const OSSL_DISPATCH ossl_sm3_functions[]; extern const OSSL_DISPATCH ossl_md2_functions[]; extern const OSSL_DISPATCH ossl_md4_functions[]; extern const OSSL_DISPATCH ossl_mdc2_functions[]; extern const OSSL_DISPATCH ossl_wp_functions[]; extern const OSSL_DISPATCH ossl_ripemd160_functions[]; extern const OSSL_DISPATCH ossl_nullmd_functions[]; /* Ciphers */ extern const OSSL_DISPATCH ossl_null_functions[]; extern const OSSL_DISPATCH ossl_aes256ecb_functions[]; extern const OSSL_DISPATCH ossl_aes192ecb_functions[]; extern const OSSL_DISPATCH ossl_aes128ecb_functions[]; extern const OSSL_DISPATCH ossl_aes256cbc_functions[]; extern const OSSL_DISPATCH ossl_aes192cbc_functions[]; extern const OSSL_DISPATCH ossl_aes128cbc_functions[]; extern const OSSL_DISPATCH ossl_aes256cbc_cts_functions[]; extern const OSSL_DISPATCH ossl_aes192cbc_cts_functions[]; extern const OSSL_DISPATCH ossl_aes128cbc_cts_functions[]; extern const OSSL_DISPATCH ossl_aes256ofb_functions[]; extern const OSSL_DISPATCH ossl_aes192ofb_functions[]; extern const OSSL_DISPATCH ossl_aes128ofb_functions[]; extern const OSSL_DISPATCH ossl_aes256cfb_functions[]; extern const OSSL_DISPATCH ossl_aes192cfb_functions[]; extern const OSSL_DISPATCH ossl_aes128cfb_functions[]; extern const OSSL_DISPATCH ossl_aes256cfb1_functions[]; extern const OSSL_DISPATCH ossl_aes192cfb1_functions[]; extern const OSSL_DISPATCH ossl_aes128cfb1_functions[]; extern const OSSL_DISPATCH ossl_aes256cfb8_functions[]; extern const OSSL_DISPATCH ossl_aes192cfb8_functions[]; extern const OSSL_DISPATCH ossl_aes128cfb8_functions[]; extern const OSSL_DISPATCH ossl_aes256ctr_functions[]; extern const OSSL_DISPATCH ossl_aes192ctr_functions[]; extern const OSSL_DISPATCH ossl_aes128ctr_functions[]; extern const OSSL_DISPATCH ossl_aes256xts_functions[]; extern const OSSL_DISPATCH ossl_aes128xts_functions[]; #ifndef OPENSSL_NO_OCB extern const OSSL_DISPATCH ossl_aes256ocb_functions[]; extern const OSSL_DISPATCH ossl_aes192ocb_functions[]; extern const OSSL_DISPATCH ossl_aes128ocb_functions[]; #endif /* OPENSSL_NO_OCB */ extern const OSSL_DISPATCH ossl_aes256gcm_functions[]; extern const OSSL_DISPATCH ossl_aes192gcm_functions[]; extern const OSSL_DISPATCH ossl_aes128gcm_functions[]; extern const OSSL_DISPATCH ossl_aes256ccm_functions[]; extern const OSSL_DISPATCH ossl_aes192ccm_functions[]; extern const OSSL_DISPATCH ossl_aes128ccm_functions[]; extern const OSSL_DISPATCH ossl_aes256wrap_functions[]; extern const OSSL_DISPATCH ossl_aes192wrap_functions[]; extern const OSSL_DISPATCH ossl_aes128wrap_functions[]; extern const OSSL_DISPATCH ossl_aes256wrappad_functions[]; extern const OSSL_DISPATCH ossl_aes192wrappad_functions[]; extern const OSSL_DISPATCH ossl_aes128wrappad_functions[]; extern const OSSL_DISPATCH ossl_aes256wrapinv_functions[]; extern const OSSL_DISPATCH ossl_aes192wrapinv_functions[]; extern const OSSL_DISPATCH ossl_aes128wrapinv_functions[]; extern const OSSL_DISPATCH ossl_aes256wrappadinv_functions[]; extern const OSSL_DISPATCH ossl_aes192wrappadinv_functions[]; extern const OSSL_DISPATCH ossl_aes128wrappadinv_functions[]; extern const OSSL_DISPATCH ossl_aes256cbc_hmac_sha1_functions[]; extern const OSSL_DISPATCH ossl_aes128cbc_hmac_sha1_functions[]; extern const OSSL_DISPATCH ossl_aes256cbc_hmac_sha256_functions[]; extern const OSSL_DISPATCH ossl_aes128cbc_hmac_sha256_functions[]; #ifndef OPENSSL_NO_ARIA extern const OSSL_DISPATCH ossl_aria256gcm_functions[]; extern const OSSL_DISPATCH ossl_aria192gcm_functions[]; extern const OSSL_DISPATCH ossl_aria128gcm_functions[]; extern const OSSL_DISPATCH ossl_aria256ccm_functions[]; extern const OSSL_DISPATCH ossl_aria192ccm_functions[]; extern const OSSL_DISPATCH ossl_aria128ccm_functions[]; extern const OSSL_DISPATCH ossl_aria256ecb_functions[]; extern const OSSL_DISPATCH ossl_aria192ecb_functions[]; extern const OSSL_DISPATCH ossl_aria128ecb_functions[]; extern const OSSL_DISPATCH ossl_aria256cbc_functions[]; extern const OSSL_DISPATCH ossl_aria192cbc_functions[]; extern const OSSL_DISPATCH ossl_aria128cbc_functions[]; extern const OSSL_DISPATCH ossl_aria256ofb_functions[]; extern const OSSL_DISPATCH ossl_aria192ofb_functions[]; extern const OSSL_DISPATCH ossl_aria128ofb_functions[]; extern const OSSL_DISPATCH ossl_aria256cfb_functions[]; extern const OSSL_DISPATCH ossl_aria192cfb_functions[]; extern const OSSL_DISPATCH ossl_aria128cfb_functions[]; extern const OSSL_DISPATCH ossl_aria256cfb1_functions[]; extern const OSSL_DISPATCH ossl_aria192cfb1_functions[]; extern const OSSL_DISPATCH ossl_aria128cfb1_functions[]; extern const OSSL_DISPATCH ossl_aria256cfb8_functions[]; extern const OSSL_DISPATCH ossl_aria192cfb8_functions[]; extern const OSSL_DISPATCH ossl_aria128cfb8_functions[]; extern const OSSL_DISPATCH ossl_aria256ctr_functions[]; extern const OSSL_DISPATCH ossl_aria192ctr_functions[]; extern const OSSL_DISPATCH ossl_aria128ctr_functions[]; #endif /* OPENSSL_NO_ARIA */ #ifndef OPENSSL_NO_CAMELLIA extern const OSSL_DISPATCH ossl_camellia256ecb_functions[]; extern const OSSL_DISPATCH ossl_camellia192ecb_functions[]; extern const OSSL_DISPATCH ossl_camellia128ecb_functions[]; extern const OSSL_DISPATCH ossl_camellia256cbc_functions[]; extern const OSSL_DISPATCH ossl_camellia192cbc_functions[]; extern const OSSL_DISPATCH ossl_camellia128cbc_functions[]; extern const OSSL_DISPATCH ossl_camellia256cbc_cts_functions[]; extern const OSSL_DISPATCH ossl_camellia192cbc_cts_functions[]; extern const OSSL_DISPATCH ossl_camellia128cbc_cts_functions[]; extern const OSSL_DISPATCH ossl_camellia256ofb_functions[]; extern const OSSL_DISPATCH ossl_camellia192ofb_functions[]; extern const OSSL_DISPATCH ossl_camellia128ofb_functions[]; extern const OSSL_DISPATCH ossl_camellia256cfb_functions[]; extern const OSSL_DISPATCH ossl_camellia192cfb_functions[]; extern const OSSL_DISPATCH ossl_camellia128cfb_functions[]; extern const OSSL_DISPATCH ossl_camellia256cfb1_functions[]; extern const OSSL_DISPATCH ossl_camellia192cfb1_functions[]; extern const OSSL_DISPATCH ossl_camellia128cfb1_functions[]; extern const OSSL_DISPATCH ossl_camellia256cfb8_functions[]; extern const OSSL_DISPATCH ossl_camellia192cfb8_functions[]; extern const OSSL_DISPATCH ossl_camellia128cfb8_functions[]; extern const OSSL_DISPATCH ossl_camellia256ctr_functions[]; extern const OSSL_DISPATCH ossl_camellia192ctr_functions[]; extern const OSSL_DISPATCH ossl_camellia128ctr_functions[]; #endif /* OPENSSL_NO_CAMELLIA */ #ifndef OPENSSL_NO_BF extern const OSSL_DISPATCH ossl_blowfish128ecb_functions[]; extern const OSSL_DISPATCH ossl_blowfish128cbc_functions[]; extern const OSSL_DISPATCH ossl_blowfish128ofb64_functions[]; extern const OSSL_DISPATCH ossl_blowfish128cfb64_functions[]; #endif /* OPENSSL_NO_BF */ #ifndef OPENSSL_NO_IDEA extern const OSSL_DISPATCH ossl_idea128ecb_functions[]; extern const OSSL_DISPATCH ossl_idea128cbc_functions[]; extern const OSSL_DISPATCH ossl_idea128ofb64_functions[]; extern const OSSL_DISPATCH ossl_idea128cfb64_functions[]; #endif /* OPENSSL_NO_IDEA */ #ifndef OPENSSL_NO_CAST extern const OSSL_DISPATCH ossl_cast5128ecb_functions[]; extern const OSSL_DISPATCH ossl_cast5128cbc_functions[]; extern const OSSL_DISPATCH ossl_cast5128ofb64_functions[]; extern const OSSL_DISPATCH ossl_cast5128cfb64_functions[]; #endif /* OPENSSL_NO_CAST */ #ifndef OPENSSL_NO_SEED extern const OSSL_DISPATCH ossl_seed128ecb_functions[]; extern const OSSL_DISPATCH ossl_seed128cbc_functions[]; extern const OSSL_DISPATCH ossl_seed128ofb128_functions[]; extern const OSSL_DISPATCH ossl_seed128cfb128_functions[]; #endif /* OPENSSL_NO_SEED */ #ifndef OPENSSL_NO_SM4 extern const OSSL_DISPATCH ossl_sm4128gcm_functions[]; extern const OSSL_DISPATCH ossl_sm4128ccm_functions[]; extern const OSSL_DISPATCH ossl_sm4128ecb_functions[]; extern const OSSL_DISPATCH ossl_sm4128cbc_functions[]; extern const OSSL_DISPATCH ossl_sm4128ctr_functions[]; extern const OSSL_DISPATCH ossl_sm4128ofb128_functions[]; extern const OSSL_DISPATCH ossl_sm4128cfb128_functions[]; extern const OSSL_DISPATCH ossl_sm4128xts_functions[]; #endif /* OPENSSL_NO_SM4 */ #ifndef OPENSSL_NO_RC5 extern const OSSL_DISPATCH ossl_rc5128ecb_functions[]; extern const OSSL_DISPATCH ossl_rc5128cbc_functions[]; extern const OSSL_DISPATCH ossl_rc5128ofb64_functions[]; extern const OSSL_DISPATCH ossl_rc5128cfb64_functions[]; #endif /* OPENSSL_NO_RC5 */ #ifndef OPENSSL_NO_RC2 extern const OSSL_DISPATCH ossl_rc2128ecb_functions[]; extern const OSSL_DISPATCH ossl_rc2128cbc_functions[]; extern const OSSL_DISPATCH ossl_rc240cbc_functions[]; extern const OSSL_DISPATCH ossl_rc264cbc_functions[]; extern const OSSL_DISPATCH ossl_rc2128cfb128_functions[]; extern const OSSL_DISPATCH ossl_rc2128ofb128_functions[]; #endif /* OPENSSL_NO_RC2 */ #ifndef OPENSSL_NO_DES extern const OSSL_DISPATCH ossl_tdes_ede3_ecb_functions[]; extern const OSSL_DISPATCH ossl_tdes_ede3_cbc_functions[]; # ifndef FIPS_MODULE extern const OSSL_DISPATCH ossl_tdes_ede3_ofb_functions[]; extern const OSSL_DISPATCH ossl_tdes_ede3_cfb_functions[]; extern const OSSL_DISPATCH ossl_tdes_ede3_cfb8_functions[]; extern const OSSL_DISPATCH ossl_tdes_ede3_cfb1_functions[]; extern const OSSL_DISPATCH ossl_tdes_ede2_ecb_functions[]; extern const OSSL_DISPATCH ossl_tdes_ede2_cbc_functions[]; extern const OSSL_DISPATCH ossl_tdes_ede2_ofb_functions[]; extern const OSSL_DISPATCH ossl_tdes_ede2_cfb_functions[]; extern const OSSL_DISPATCH ossl_tdes_desx_cbc_functions[]; extern const OSSL_DISPATCH ossl_tdes_wrap_cbc_functions[]; extern const OSSL_DISPATCH ossl_des_ecb_functions[]; extern const OSSL_DISPATCH ossl_des_cbc_functions[]; extern const OSSL_DISPATCH ossl_des_ofb64_functions[]; extern const OSSL_DISPATCH ossl_des_cfb64_functions[]; extern const OSSL_DISPATCH ossl_des_cfb1_functions[]; extern const OSSL_DISPATCH ossl_des_cfb8_functions[]; # endif /* FIPS_MODULE */ #endif /* OPENSSL_NO_DES */ #ifndef OPENSSL_NO_RC4 extern const OSSL_DISPATCH ossl_rc440_functions[]; extern const OSSL_DISPATCH ossl_rc4128_functions[]; # ifndef OPENSSL_NO_MD5 extern const OSSL_DISPATCH ossl_rc4_hmac_ossl_md5_functions[]; # endif /* OPENSSL_NO_MD5 */ #endif /* OPENSSL_NO_RC4 */ #ifndef OPENSSL_NO_CHACHA extern const OSSL_DISPATCH ossl_chacha20_functions[]; # ifndef OPENSSL_NO_POLY1305 extern const OSSL_DISPATCH ossl_chacha20_ossl_poly1305_functions[]; # endif /* OPENSSL_NO_POLY1305 */ #endif /* OPENSSL_NO_CHACHA */ #ifndef OPENSSL_NO_SIV extern const OSSL_DISPATCH ossl_aes128siv_functions[]; extern const OSSL_DISPATCH ossl_aes192siv_functions[]; extern const OSSL_DISPATCH ossl_aes256siv_functions[]; extern const OSSL_DISPATCH ossl_aes128gcm_siv_functions[]; extern const OSSL_DISPATCH ossl_aes192gcm_siv_functions[]; extern const OSSL_DISPATCH ossl_aes256gcm_siv_functions[]; #endif /* OPENSSL_NO_SIV */ /* MACs */ extern const OSSL_DISPATCH ossl_blake2bmac_functions[]; extern const OSSL_DISPATCH ossl_blake2smac_functions[]; extern const OSSL_DISPATCH ossl_cmac_functions[]; extern const OSSL_DISPATCH ossl_gmac_functions[]; extern const OSSL_DISPATCH ossl_hmac_functions[]; extern const OSSL_DISPATCH ossl_kmac128_functions[]; extern const OSSL_DISPATCH ossl_kmac256_functions[]; extern const OSSL_DISPATCH ossl_siphash_functions[]; extern const OSSL_DISPATCH ossl_poly1305_functions[]; /* KDFs / PRFs */ extern const OSSL_DISPATCH ossl_kdf_pbkdf1_functions[]; extern const OSSL_DISPATCH ossl_kdf_pbkdf2_functions[]; extern const OSSL_DISPATCH ossl_kdf_pvk_functions[]; extern const OSSL_DISPATCH ossl_kdf_pkcs12_functions[]; #ifndef OPENSSL_NO_SCRYPT extern const OSSL_DISPATCH ossl_kdf_scrypt_functions[]; #endif extern const OSSL_DISPATCH ossl_kdf_tls1_prf_functions[]; extern const OSSL_DISPATCH ossl_kdf_hkdf_functions[]; extern const OSSL_DISPATCH ossl_kdf_tls1_3_kdf_functions[]; extern const OSSL_DISPATCH ossl_kdf_sshkdf_functions[]; extern const OSSL_DISPATCH ossl_kdf_sskdf_functions[]; extern const OSSL_DISPATCH ossl_kdf_x963_kdf_functions[]; extern const OSSL_DISPATCH ossl_kdf_kbkdf_functions[]; extern const OSSL_DISPATCH ossl_kdf_x942_kdf_functions[]; extern const OSSL_DISPATCH ossl_kdf_krb5kdf_functions[]; extern const OSSL_DISPATCH ossl_kdf_hmac_drbg_functions[]; #ifndef OPENSSL_NO_ARGON2 extern const OSSL_DISPATCH ossl_kdf_argon2i_functions[]; extern const OSSL_DISPATCH ossl_kdf_argon2d_functions[]; extern const OSSL_DISPATCH ossl_kdf_argon2id_functions[]; #endif /* RNGs */ extern const OSSL_DISPATCH ossl_test_rng_functions[]; extern const OSSL_DISPATCH ossl_seed_src_functions[]; extern const OSSL_DISPATCH ossl_drbg_hash_functions[]; extern const OSSL_DISPATCH ossl_drbg_ossl_hmac_functions[]; extern const OSSL_DISPATCH ossl_drbg_ctr_functions[]; extern const OSSL_DISPATCH crngt_functions[]; /* Key management */ extern const OSSL_DISPATCH ossl_dh_keymgmt_functions[]; extern const OSSL_DISPATCH ossl_dhx_keymgmt_functions[]; extern const OSSL_DISPATCH ossl_dsa_keymgmt_functions[]; extern const OSSL_DISPATCH ossl_rsa_keymgmt_functions[]; extern const OSSL_DISPATCH ossl_rsapss_keymgmt_functions[]; #ifndef OPENSSL_NO_ECX extern const OSSL_DISPATCH ossl_x25519_keymgmt_functions[]; extern const OSSL_DISPATCH ossl_x448_keymgmt_functions[]; extern const OSSL_DISPATCH ossl_ed25519_keymgmt_functions[]; extern const OSSL_DISPATCH ossl_ed448_keymgmt_functions[]; #endif extern const OSSL_DISPATCH ossl_ec_keymgmt_functions[]; extern const OSSL_DISPATCH ossl_kdf_keymgmt_functions[]; extern const OSSL_DISPATCH ossl_mac_legacy_keymgmt_functions[]; extern const OSSL_DISPATCH ossl_cmac_legacy_keymgmt_functions[]; #ifndef OPENSSL_NO_SM2 extern const OSSL_DISPATCH ossl_sm2_keymgmt_functions[]; #endif /* Key Exchange */ extern const OSSL_DISPATCH ossl_dh_keyexch_functions[]; extern const OSSL_DISPATCH ossl_x25519_keyexch_functions[]; extern const OSSL_DISPATCH ossl_x448_keyexch_functions[]; extern const OSSL_DISPATCH ossl_ecdh_keyexch_functions[]; extern const OSSL_DISPATCH ossl_kdf_tls1_prf_keyexch_functions[]; extern const OSSL_DISPATCH ossl_kdf_hkdf_keyexch_functions[]; extern const OSSL_DISPATCH ossl_kdf_scrypt_keyexch_functions[]; /* Signature */ extern const OSSL_DISPATCH ossl_dsa_signature_functions[]; extern const OSSL_DISPATCH ossl_rsa_signature_functions[]; extern const OSSL_DISPATCH ossl_ed25519_signature_functions[]; extern const OSSL_DISPATCH ossl_ed448_signature_functions[]; extern const OSSL_DISPATCH ossl_ecdsa_signature_functions[]; extern const OSSL_DISPATCH ossl_mac_legacy_hmac_signature_functions[]; extern const OSSL_DISPATCH ossl_mac_legacy_siphash_signature_functions[]; extern const OSSL_DISPATCH ossl_mac_legacy_poly1305_signature_functions[]; extern const OSSL_DISPATCH ossl_mac_legacy_cmac_signature_functions[]; extern const OSSL_DISPATCH ossl_sm2_signature_functions[]; /* Asym Cipher */ extern const OSSL_DISPATCH ossl_rsa_asym_cipher_functions[]; #ifndef OPENSSL_NO_SM2 extern const OSSL_DISPATCH ossl_sm2_asym_cipher_functions[]; #endif /* Asym Key encapsulation */ extern const OSSL_DISPATCH ossl_rsa_asym_kem_functions[]; extern const OSSL_DISPATCH ossl_ecx_asym_kem_functions[]; extern const OSSL_DISPATCH ossl_ec_asym_kem_functions[]; /* Encoders */ extern const OSSL_DISPATCH ossl_rsa_to_PKCS1_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsa_to_PKCS1_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsa_to_EncryptedPrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsa_to_EncryptedPrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsa_to_PrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsa_to_PrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsa_to_RSA_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsa_to_RSA_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsa_to_SubjectPublicKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsa_to_SubjectPublicKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsa_to_msblob_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsa_to_pvk_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsa_to_text_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsa_to_type_specific_keypair_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsa_to_type_specific_keypair_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsapss_to_PKCS1_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsapss_to_PKCS1_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsapss_to_EncryptedPrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsapss_to_EncryptedPrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsapss_to_PrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsapss_to_PrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsapss_to_SubjectPublicKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsapss_to_SubjectPublicKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_rsapss_to_text_encoder_functions[]; extern const OSSL_DISPATCH ossl_dh_to_DH_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_dh_to_DH_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_dh_to_PKCS3_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_dh_to_PKCS3_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_dh_to_EncryptedPrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_dh_to_EncryptedPrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_dh_to_PrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_dh_to_PrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_dh_to_SubjectPublicKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_dh_to_SubjectPublicKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_dh_to_type_specific_params_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_dh_to_type_specific_params_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_dh_to_text_encoder_functions[]; extern const OSSL_DISPATCH ossl_dhx_to_DHX_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_dhx_to_DHX_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_dhx_to_EncryptedPrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_dhx_to_EncryptedPrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_dhx_to_PrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_dhx_to_PrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_dhx_to_SubjectPublicKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_dhx_to_SubjectPublicKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_dhx_to_X9_42_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_dhx_to_X9_42_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_dhx_to_type_specific_params_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_dhx_to_type_specific_params_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_dhx_to_text_encoder_functions[]; extern const OSSL_DISPATCH ossl_dsa_to_DSA_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_dsa_to_DSA_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_dsa_to_EncryptedPrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_dsa_to_EncryptedPrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_dsa_to_PrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_dsa_to_PrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_dsa_to_SubjectPublicKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_dsa_to_SubjectPublicKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_dsa_to_type_specific_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_dsa_to_type_specific_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_dsa_to_msblob_encoder_functions[]; extern const OSSL_DISPATCH ossl_dsa_to_pvk_encoder_functions[]; extern const OSSL_DISPATCH ossl_dsa_to_text_encoder_functions[]; extern const OSSL_DISPATCH ossl_ec_to_EC_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_ec_to_EC_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_ec_to_blob_encoder_functions[]; extern const OSSL_DISPATCH ossl_ec_to_EncryptedPrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_ec_to_EncryptedPrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_ec_to_PrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_ec_to_PrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_ec_to_SubjectPublicKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_ec_to_SubjectPublicKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_ec_to_X9_62_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_ec_to_X9_62_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_ec_to_type_specific_no_pub_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_ec_to_type_specific_no_pub_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_ec_to_text_encoder_functions[]; #ifndef OPENSSL_NO_SM2 extern const OSSL_DISPATCH ossl_sm2_to_SM2_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_sm2_to_SM2_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_sm2_to_blob_encoder_functions[]; extern const OSSL_DISPATCH ossl_sm2_to_EncryptedPrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_sm2_to_EncryptedPrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_sm2_to_PrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_sm2_to_PrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_sm2_to_SubjectPublicKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_sm2_to_SubjectPublicKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_sm2_to_type_specific_no_pub_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_sm2_to_type_specific_no_pub_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_sm2_to_text_encoder_functions[]; #endif extern const OSSL_DISPATCH ossl_ed25519_to_EncryptedPrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_ed25519_to_EncryptedPrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_ed25519_to_PrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_ed25519_to_PrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_ed25519_to_SubjectPublicKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_ed25519_to_SubjectPublicKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_ed25519_to_OSSL_current_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_ed25519_to_text_encoder_functions[]; extern const OSSL_DISPATCH ossl_ed448_to_EncryptedPrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_ed448_to_EncryptedPrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_ed448_to_PrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_ed448_to_PrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_ed448_to_SubjectPublicKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_ed448_to_SubjectPublicKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_ed448_to_OSSL_current_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_ed448_to_text_encoder_functions[]; extern const OSSL_DISPATCH ossl_x25519_to_EncryptedPrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_x25519_to_EncryptedPrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_x25519_to_PrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_x25519_to_PrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_x25519_to_SubjectPublicKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_x25519_to_SubjectPublicKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_x25519_to_OSSL_current_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_x25519_to_text_encoder_functions[]; extern const OSSL_DISPATCH ossl_x448_to_EncryptedPrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_x448_to_EncryptedPrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_x448_to_PrivateKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_x448_to_PrivateKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_x448_to_SubjectPublicKeyInfo_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_x448_to_SubjectPublicKeyInfo_pem_encoder_functions[]; extern const OSSL_DISPATCH ossl_x448_to_OSSL_current_der_encoder_functions[]; extern const OSSL_DISPATCH ossl_x448_to_text_encoder_functions[]; /* Decoders */ extern const OSSL_DISPATCH ossl_PrivateKeyInfo_der_to_dh_decoder_functions[]; extern const OSSL_DISPATCH ossl_SubjectPublicKeyInfo_der_to_dh_decoder_functions[]; extern const OSSL_DISPATCH ossl_type_specific_params_der_to_dh_decoder_functions[]; extern const OSSL_DISPATCH ossl_DH_der_to_dh_decoder_functions[]; extern const OSSL_DISPATCH ossl_PrivateKeyInfo_der_to_dhx_decoder_functions[]; extern const OSSL_DISPATCH ossl_SubjectPublicKeyInfo_der_to_dhx_decoder_functions[]; extern const OSSL_DISPATCH ossl_type_specific_params_der_to_dhx_decoder_functions[]; extern const OSSL_DISPATCH ossl_DHX_der_to_dhx_decoder_functions[]; extern const OSSL_DISPATCH ossl_PrivateKeyInfo_der_to_dsa_decoder_functions[]; extern const OSSL_DISPATCH ossl_SubjectPublicKeyInfo_der_to_dsa_decoder_functions[]; extern const OSSL_DISPATCH ossl_type_specific_der_to_dsa_decoder_functions[]; extern const OSSL_DISPATCH ossl_DSA_der_to_dsa_decoder_functions[]; extern const OSSL_DISPATCH ossl_msblob_to_dsa_decoder_functions[]; extern const OSSL_DISPATCH ossl_pvk_to_dsa_decoder_functions[]; extern const OSSL_DISPATCH ossl_PrivateKeyInfo_der_to_ec_decoder_functions[]; extern const OSSL_DISPATCH ossl_SubjectPublicKeyInfo_der_to_ec_decoder_functions[]; extern const OSSL_DISPATCH ossl_type_specific_no_pub_der_to_ec_decoder_functions[]; extern const OSSL_DISPATCH ossl_EC_der_to_ec_decoder_functions[]; extern const OSSL_DISPATCH ossl_PrivateKeyInfo_der_to_x25519_decoder_functions[]; extern const OSSL_DISPATCH ossl_SubjectPublicKeyInfo_der_to_x25519_decoder_functions[]; extern const OSSL_DISPATCH ossl_PrivateKeyInfo_der_to_x448_decoder_functions[]; extern const OSSL_DISPATCH ossl_SubjectPublicKeyInfo_der_to_x448_decoder_functions[]; extern const OSSL_DISPATCH ossl_PrivateKeyInfo_der_to_ed25519_decoder_functions[]; extern const OSSL_DISPATCH ossl_SubjectPublicKeyInfo_der_to_ed25519_decoder_functions[]; extern const OSSL_DISPATCH ossl_PrivateKeyInfo_der_to_ed448_decoder_functions[]; extern const OSSL_DISPATCH ossl_SubjectPublicKeyInfo_der_to_ed448_decoder_functions[]; #ifndef OPENSSL_NO_SM2 extern const OSSL_DISPATCH ossl_PrivateKeyInfo_der_to_sm2_decoder_functions[]; extern const OSSL_DISPATCH ossl_SubjectPublicKeyInfo_der_to_sm2_decoder_functions[]; extern const OSSL_DISPATCH ossl_type_specific_no_pub_der_to_sm2_decoder_functions[]; #endif extern const OSSL_DISPATCH ossl_PrivateKeyInfo_der_to_rsa_decoder_functions[]; extern const OSSL_DISPATCH ossl_SubjectPublicKeyInfo_der_to_rsa_decoder_functions[]; extern const OSSL_DISPATCH ossl_type_specific_keypair_der_to_rsa_decoder_functions[]; extern const OSSL_DISPATCH ossl_RSA_der_to_rsa_decoder_functions[]; extern const OSSL_DISPATCH ossl_msblob_to_rsa_decoder_functions[]; extern const OSSL_DISPATCH ossl_pvk_to_rsa_decoder_functions[]; extern const OSSL_DISPATCH ossl_PrivateKeyInfo_der_to_rsapss_decoder_functions[]; extern const OSSL_DISPATCH ossl_SubjectPublicKeyInfo_der_to_rsapss_decoder_functions[]; extern const OSSL_DISPATCH ossl_EncryptedPrivateKeyInfo_der_to_der_decoder_functions[]; extern const OSSL_DISPATCH ossl_SubjectPublicKeyInfo_der_to_der_decoder_functions[]; extern const OSSL_DISPATCH ossl_pem_to_der_decoder_functions[]; extern const OSSL_DISPATCH ossl_file_store_functions[]; extern const OSSL_DISPATCH ossl_winstore_store_functions[];
./openssl/providers/implementations/rands/test_rng.c
/* * Copyright 2020-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <string.h> #include <stdlib.h> #include <openssl/core_dispatch.h> #include <openssl/e_os2.h> #include <openssl/params.h> #include <openssl/core_names.h> #include <openssl/evp.h> #include <openssl/err.h> #include <openssl/randerr.h> #include "prov/providercommon.h" #include "prov/provider_ctx.h" #include "prov/provider_util.h" #include "prov/implementations.h" static OSSL_FUNC_rand_newctx_fn test_rng_new; static OSSL_FUNC_rand_freectx_fn test_rng_free; static OSSL_FUNC_rand_instantiate_fn test_rng_instantiate; static OSSL_FUNC_rand_uninstantiate_fn test_rng_uninstantiate; static OSSL_FUNC_rand_generate_fn test_rng_generate; static OSSL_FUNC_rand_reseed_fn test_rng_reseed; static OSSL_FUNC_rand_nonce_fn test_rng_nonce; static OSSL_FUNC_rand_settable_ctx_params_fn test_rng_settable_ctx_params; static OSSL_FUNC_rand_set_ctx_params_fn test_rng_set_ctx_params; static OSSL_FUNC_rand_gettable_ctx_params_fn test_rng_gettable_ctx_params; static OSSL_FUNC_rand_get_ctx_params_fn test_rng_get_ctx_params; static OSSL_FUNC_rand_verify_zeroization_fn test_rng_verify_zeroization; static OSSL_FUNC_rand_enable_locking_fn test_rng_enable_locking; static OSSL_FUNC_rand_lock_fn test_rng_lock; static OSSL_FUNC_rand_unlock_fn test_rng_unlock; static OSSL_FUNC_rand_get_seed_fn test_rng_get_seed; typedef struct { void *provctx; unsigned int generate; int state; unsigned int strength; size_t max_request; unsigned char *entropy, *nonce; size_t entropy_len, entropy_pos, nonce_len; CRYPTO_RWLOCK *lock; uint32_t seed; } PROV_TEST_RNG; static void *test_rng_new(void *provctx, void *parent, const OSSL_DISPATCH *parent_dispatch) { PROV_TEST_RNG *t; t = OPENSSL_zalloc(sizeof(*t)); if (t == NULL) return NULL; t->max_request = INT_MAX; t->provctx = provctx; t->state = EVP_RAND_STATE_UNINITIALISED; return t; } static void test_rng_free(void *vtest) { PROV_TEST_RNG *t = (PROV_TEST_RNG *)vtest; if (t == NULL) return; OPENSSL_free(t->entropy); OPENSSL_free(t->nonce); CRYPTO_THREAD_lock_free(t->lock); OPENSSL_free(t); } static int test_rng_instantiate(void *vtest, unsigned int strength, int prediction_resistance, const unsigned char *pstr, size_t pstr_len, const OSSL_PARAM params[]) { PROV_TEST_RNG *t = (PROV_TEST_RNG *)vtest; if (!test_rng_set_ctx_params(t, params) || strength > t->strength) return 0; t->state = EVP_RAND_STATE_READY; t->entropy_pos = 0; t->seed = 221953166; /* Value doesn't matter, so long as it isn't zero */ return 1; } static int test_rng_uninstantiate(void *vtest) { PROV_TEST_RNG *t = (PROV_TEST_RNG *)vtest; t->entropy_pos = 0; t->state = EVP_RAND_STATE_UNINITIALISED; return 1; } static unsigned char gen_byte(PROV_TEST_RNG *t) { uint32_t n; /* * Implement the 32 bit xorshift as suggested by George Marsaglia in: * https://doi.org/10.18637/jss.v008.i14 * * This is a very fast PRNG so there is no need to extract bytes one at a * time and use the entire value each time. */ n = t->seed; n ^= n << 13; n ^= n >> 17; n ^= n << 5; t->seed = n; return n & 0xff; } static int test_rng_generate(void *vtest, unsigned char *out, size_t outlen, unsigned int strength, int prediction_resistance, const unsigned char *adin, size_t adin_len) { PROV_TEST_RNG *t = (PROV_TEST_RNG *)vtest; size_t i; if (strength > t->strength) return 0; if (t->generate) { for (i = 0; i < outlen; i++) out[i] = gen_byte(t); } else { if (t->entropy_len - t->entropy_pos < outlen) return 0; memcpy(out, t->entropy + t->entropy_pos, outlen); t->entropy_pos += outlen; } return 1; } static int test_rng_reseed(ossl_unused void *vtest, ossl_unused int prediction_resistance, ossl_unused const unsigned char *ent, ossl_unused size_t ent_len, ossl_unused const unsigned char *adin, ossl_unused size_t adin_len) { return 1; } static size_t test_rng_nonce(void *vtest, unsigned char *out, unsigned int strength, size_t min_noncelen, ossl_unused size_t max_noncelen) { PROV_TEST_RNG *t = (PROV_TEST_RNG *)vtest; size_t i; if (strength > t->strength) return 0; if (t->generate) { for (i = 0; i < min_noncelen; i++) out[i] = gen_byte(t); return min_noncelen; } if (t->nonce == NULL) return 0; if (out != NULL) memcpy(out, t->nonce, t->nonce_len); return t->nonce_len; } static int test_rng_get_ctx_params(void *vtest, OSSL_PARAM params[]) { PROV_TEST_RNG *t = (PROV_TEST_RNG *)vtest; OSSL_PARAM *p; p = OSSL_PARAM_locate(params, OSSL_RAND_PARAM_STATE); if (p != NULL && !OSSL_PARAM_set_int(p, t->state)) return 0; p = OSSL_PARAM_locate(params, OSSL_RAND_PARAM_STRENGTH); if (p != NULL && !OSSL_PARAM_set_int(p, t->strength)) return 0; p = OSSL_PARAM_locate(params, OSSL_RAND_PARAM_MAX_REQUEST); if (p != NULL && !OSSL_PARAM_set_size_t(p, t->max_request)) return 0; p = OSSL_PARAM_locate(params, OSSL_RAND_PARAM_GENERATE); if (p != NULL && OSSL_PARAM_set_uint(p, t->generate)) return 0; return 1; } static const OSSL_PARAM *test_rng_gettable_ctx_params(ossl_unused void *vtest, ossl_unused void *provctx) { static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_int(OSSL_RAND_PARAM_STATE, NULL), OSSL_PARAM_uint(OSSL_RAND_PARAM_STRENGTH, NULL), OSSL_PARAM_size_t(OSSL_RAND_PARAM_MAX_REQUEST, NULL), OSSL_PARAM_uint(OSSL_RAND_PARAM_GENERATE, NULL), OSSL_PARAM_END }; return known_gettable_ctx_params; } static int test_rng_set_ctx_params(void *vtest, const OSSL_PARAM params[]) { PROV_TEST_RNG *t = (PROV_TEST_RNG *)vtest; const OSSL_PARAM *p; void *ptr = NULL; size_t size = 0; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_RAND_PARAM_STRENGTH); if (p != NULL && !OSSL_PARAM_get_uint(p, &t->strength)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_RAND_PARAM_TEST_ENTROPY); if (p != NULL) { if (!OSSL_PARAM_get_octet_string(p, &ptr, 0, &size)) return 0; OPENSSL_free(t->entropy); t->entropy = ptr; t->entropy_len = size; t->entropy_pos = 0; ptr = NULL; } p = OSSL_PARAM_locate_const(params, OSSL_RAND_PARAM_TEST_NONCE); if (p != NULL) { if (!OSSL_PARAM_get_octet_string(p, &ptr, 0, &size)) return 0; OPENSSL_free(t->nonce); t->nonce = ptr; t->nonce_len = size; } p = OSSL_PARAM_locate_const(params, OSSL_RAND_PARAM_MAX_REQUEST); if (p != NULL && !OSSL_PARAM_get_size_t(p, &t->max_request)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_RAND_PARAM_GENERATE); if (p != NULL && !OSSL_PARAM_get_uint(p, &t->generate)) return 0; return 1; } static const OSSL_PARAM *test_rng_settable_ctx_params(ossl_unused void *vtest, ossl_unused void *provctx) { static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_octet_string(OSSL_RAND_PARAM_TEST_ENTROPY, NULL, 0), OSSL_PARAM_octet_string(OSSL_RAND_PARAM_TEST_NONCE, NULL, 0), OSSL_PARAM_uint(OSSL_RAND_PARAM_STRENGTH, NULL), OSSL_PARAM_size_t(OSSL_RAND_PARAM_MAX_REQUEST, NULL), OSSL_PARAM_uint(OSSL_RAND_PARAM_GENERATE, NULL), OSSL_PARAM_END }; return known_settable_ctx_params; } static int test_rng_verify_zeroization(ossl_unused void *vtest) { return 1; } static size_t test_rng_get_seed(void *vtest, unsigned char **pout, int entropy, size_t min_len, size_t max_len, ossl_unused int prediction_resistance, ossl_unused const unsigned char *adin, ossl_unused size_t adin_len) { PROV_TEST_RNG *t = (PROV_TEST_RNG *)vtest; *pout = t->entropy; return t->entropy_len > max_len ? max_len : t->entropy_len; } static int test_rng_enable_locking(void *vtest) { PROV_TEST_RNG *t = (PROV_TEST_RNG *)vtest; if (t != NULL && t->lock == NULL) { t->lock = CRYPTO_THREAD_lock_new(); if (t->lock == NULL) { ERR_raise(ERR_LIB_PROV, RAND_R_FAILED_TO_CREATE_LOCK); return 0; } } return 1; } static int test_rng_lock(void *vtest) { PROV_TEST_RNG *t = (PROV_TEST_RNG *)vtest; if (t == NULL || t->lock == NULL) return 1; return CRYPTO_THREAD_write_lock(t->lock); } static void test_rng_unlock(void *vtest) { PROV_TEST_RNG *t = (PROV_TEST_RNG *)vtest; if (t != NULL && t->lock != NULL) CRYPTO_THREAD_unlock(t->lock); } const OSSL_DISPATCH ossl_test_rng_functions[] = { { OSSL_FUNC_RAND_NEWCTX, (void(*)(void))test_rng_new }, { OSSL_FUNC_RAND_FREECTX, (void(*)(void))test_rng_free }, { OSSL_FUNC_RAND_INSTANTIATE, (void(*)(void))test_rng_instantiate }, { OSSL_FUNC_RAND_UNINSTANTIATE, (void(*)(void))test_rng_uninstantiate }, { OSSL_FUNC_RAND_GENERATE, (void(*)(void))test_rng_generate }, { OSSL_FUNC_RAND_RESEED, (void(*)(void))test_rng_reseed }, { OSSL_FUNC_RAND_NONCE, (void(*)(void))test_rng_nonce }, { OSSL_FUNC_RAND_ENABLE_LOCKING, (void(*)(void))test_rng_enable_locking }, { OSSL_FUNC_RAND_LOCK, (void(*)(void))test_rng_lock }, { OSSL_FUNC_RAND_UNLOCK, (void(*)(void))test_rng_unlock }, { OSSL_FUNC_RAND_SETTABLE_CTX_PARAMS, (void(*)(void))test_rng_settable_ctx_params }, { OSSL_FUNC_RAND_SET_CTX_PARAMS, (void(*)(void))test_rng_set_ctx_params }, { OSSL_FUNC_RAND_GETTABLE_CTX_PARAMS, (void(*)(void))test_rng_gettable_ctx_params }, { OSSL_FUNC_RAND_GET_CTX_PARAMS, (void(*)(void))test_rng_get_ctx_params }, { OSSL_FUNC_RAND_VERIFY_ZEROIZATION, (void(*)(void))test_rng_verify_zeroization }, { OSSL_FUNC_RAND_GET_SEED, (void(*)(void))test_rng_get_seed }, OSSL_DISPATCH_END };
./openssl/providers/implementations/rands/drbg_local.h
/* * Copyright 1995-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #ifndef OSSL_CRYPTO_PROV_LOCAL_H # define OSSL_CRYPTO_PROV_LOCAL_H # include <openssl/evp.h> # include <openssl/core_dispatch.h> # include <openssl/core_names.h> # include <openssl/params.h> # include "internal/tsan_assist.h" # include "internal/nelem.h" # include "internal/numbers.h" # include "prov/provider_ctx.h" /* How many times to read the TSC as a randomness source. */ # define TSC_READ_COUNT 4 /* Maximum reseed intervals */ # define MAX_RESEED_INTERVAL (1 << 24) # define MAX_RESEED_TIME_INTERVAL (1 << 20) /* approx. 12 days */ /* Default reseed intervals */ # define RESEED_INTERVAL (1 << 8) # define TIME_INTERVAL (60*60) /* 1 hour */ /* * The number of bytes that constitutes an atomic lump of entropy with respect * to the FIPS 140-2 section 4.9.2 Conditional Tests. The size is somewhat * arbitrary, the smaller the value, the less entropy is consumed on first * read but the higher the probability of the test failing by accident. * * The value is in bytes. */ #define CRNGT_BUFSIZ 16 /* * Maximum input size for the DRBG (entropy, nonce, personalization string) * * NIST SP800 90Ar1 allows a maximum of (1 << 35) bits i.e., (1 << 32) bytes. * * We lower it to 'only' INT32_MAX bytes, which is equivalent to 2 gigabytes. */ # define DRBG_MAX_LENGTH INT32_MAX /* The default nonce */ /* ASCII: "OpenSSL NIST SP 800-90A DRBG", in hex for EBCDIC compatibility */ #define DRBG_DEFAULT_PERS_STRING "\x4f\x70\x65\x6e\x53\x53\x4c\x20\x4e\x49\x53\x54\x20\x53\x50\x20\x38\x30\x30\x2d\x39\x30\x41\x20\x44\x52\x42\x47" typedef struct prov_drbg_st PROV_DRBG; /* DRBG status values */ typedef enum drbg_status_e { DRBG_UNINITIALISED, DRBG_READY, DRBG_ERROR } DRBG_STATUS; /* * The state of all types of DRBGs. */ struct prov_drbg_st { CRYPTO_RWLOCK *lock; PROV_CTX *provctx; /* Virtual functions are cache here */ int (*instantiate)(PROV_DRBG *drbg, const unsigned char *entropy, size_t entropylen, const unsigned char *nonce, size_t noncelen, const unsigned char *pers, size_t perslen); int (*uninstantiate)(PROV_DRBG *ctx); int (*reseed)(PROV_DRBG *drbg, const unsigned char *ent, size_t ent_len, const unsigned char *adin, size_t adin_len); int (*generate)(PROV_DRBG *, unsigned char *out, size_t outlen, const unsigned char *adin, size_t adin_len); /* Parent PROV_RAND and its dispatch table functions */ void *parent; OSSL_FUNC_rand_enable_locking_fn *parent_enable_locking; OSSL_FUNC_rand_lock_fn *parent_lock; OSSL_FUNC_rand_unlock_fn *parent_unlock; OSSL_FUNC_rand_get_ctx_params_fn *parent_get_ctx_params; OSSL_FUNC_rand_nonce_fn *parent_nonce; OSSL_FUNC_rand_get_seed_fn *parent_get_seed; OSSL_FUNC_rand_clear_seed_fn *parent_clear_seed; const OSSL_DISPATCH *parent_dispatch; /* * Stores the return value of openssl_get_fork_id() as of when we last * reseeded. The DRBG reseeds automatically whenever drbg->fork_id != * openssl_get_fork_id(). Used to provide fork-safety and reseed this * DRBG in the child process. */ int fork_id; unsigned short flags; /* various external flags */ /* * The following parameters are setup by the per-type "init" function. * * The supported types and their init functions are: * (1) CTR_DRBG: drbg_ctr_init(). * (2) HMAC_DRBG: drbg_hmac_init(). * (3) HASH_DRBG: drbg_hash_init(). * * The parameters are closely related to the ones described in * section '10.2.1 CTR_DRBG' of [NIST SP 800-90Ar1], with one * crucial difference: In the NIST standard, all counts are given * in bits, whereas in OpenSSL entropy counts are given in bits * and buffer lengths are given in bytes. * * Since this difference has lead to some confusion in the past, * (see [GitHub Issue #2443], formerly [rt.openssl.org #4055]) * the 'len' suffix has been added to all buffer sizes for * clarification. */ unsigned int strength; size_t max_request; size_t min_entropylen, max_entropylen; size_t min_noncelen, max_noncelen; size_t max_perslen, max_adinlen; /* * Counts the number of generate requests since the last reseed * (Starts at 1). This value is the reseed_counter as defined in * NIST SP 800-90Ar1 */ unsigned int generate_counter; /* * Maximum number of generate requests until a reseed is required. * This value is ignored if it is zero. */ unsigned int reseed_interval; /* Stores the time when the last reseeding occurred */ time_t reseed_time; /* * Specifies the maximum time interval (in seconds) between reseeds. * This value is ignored if it is zero. */ time_t reseed_time_interval; /* * Counts the number of reseeds since instantiation. * This value is ignored if it is zero. * * This counter is used only for seed propagation from the <master> DRBG * to its two children, the <public> and <private> DRBG. This feature is * very special and its sole purpose is to ensure that any randomness which * is added by PROV_add() or PROV_seed() will have an immediate effect on * the output of PROV_bytes() resp. PROV_priv_bytes(). */ TSAN_QUALIFIER unsigned int reseed_counter; unsigned int reseed_next_counter; unsigned int parent_reseed_counter; size_t seedlen; DRBG_STATUS state; /* DRBG specific data */ void *data; /* Entropy and nonce gathering callbacks */ void *callback_arg; OSSL_INOUT_CALLBACK *get_entropy_fn; OSSL_CALLBACK *cleanup_entropy_fn; OSSL_INOUT_CALLBACK *get_nonce_fn; OSSL_CALLBACK *cleanup_nonce_fn; }; PROV_DRBG *ossl_rand_drbg_new (void *provctx, void *parent, const OSSL_DISPATCH *parent_dispatch, int (*dnew)(PROV_DRBG *ctx), int (*instantiate)(PROV_DRBG *drbg, const unsigned char *entropy, size_t entropylen, const unsigned char *nonce, size_t noncelen, const unsigned char *pers, size_t perslen), int (*uninstantiate)(PROV_DRBG *ctx), int (*reseed)(PROV_DRBG *drbg, const unsigned char *ent, size_t ent_len, const unsigned char *adin, size_t adin_len), int (*generate)(PROV_DRBG *, unsigned char *out, size_t outlen, const unsigned char *adin, size_t adin_len)); void ossl_rand_drbg_free(PROV_DRBG *drbg); int ossl_prov_drbg_instantiate(PROV_DRBG *drbg, unsigned int strength, int prediction_resistance, const unsigned char *pers, size_t perslen); int ossl_prov_drbg_uninstantiate(PROV_DRBG *drbg); int ossl_prov_drbg_reseed(PROV_DRBG *drbg, int prediction_resistance, const unsigned char *ent, size_t ent_len, const unsigned char *adin, size_t adinlen); int ossl_prov_drbg_generate(PROV_DRBG *drbg, unsigned char *out, size_t outlen, unsigned int strength, int prediction_resistance, const unsigned char *adin, size_t adinlen); /* Seeding api */ OSSL_FUNC_rand_get_seed_fn ossl_drbg_get_seed; OSSL_FUNC_rand_clear_seed_fn ossl_drbg_clear_seed; /* Verify that an array of numeric values is all zero */ #define PROV_DRBG_VERIFY_ZEROIZATION(v) \ { \ size_t i; \ \ for (i = 0; i < OSSL_NELEM(v); i++) \ if ((v)[i] != 0) \ goto err; \ } /* locking api */ OSSL_FUNC_rand_enable_locking_fn ossl_drbg_enable_locking; OSSL_FUNC_rand_lock_fn ossl_drbg_lock; OSSL_FUNC_rand_unlock_fn ossl_drbg_unlock; /* Common parameters for all of our DRBGs */ int ossl_drbg_get_ctx_params(PROV_DRBG *drbg, OSSL_PARAM params[]); int ossl_drbg_get_ctx_params_no_lock(PROV_DRBG *drbg, OSSL_PARAM params[], int *complete); int ossl_drbg_set_ctx_params(PROV_DRBG *drbg, const OSSL_PARAM params[]); #define OSSL_PARAM_DRBG_SETTABLE_CTX_COMMON \ OSSL_PARAM_uint(OSSL_DRBG_PARAM_RESEED_REQUESTS, NULL), \ OSSL_PARAM_uint64(OSSL_DRBG_PARAM_RESEED_TIME_INTERVAL, NULL) #define OSSL_PARAM_DRBG_GETTABLE_CTX_COMMON \ OSSL_PARAM_int(OSSL_RAND_PARAM_STATE, NULL), \ OSSL_PARAM_uint(OSSL_RAND_PARAM_STRENGTH, NULL), \ OSSL_PARAM_size_t(OSSL_RAND_PARAM_MAX_REQUEST, NULL), \ OSSL_PARAM_size_t(OSSL_DRBG_PARAM_MIN_ENTROPYLEN, NULL), \ OSSL_PARAM_size_t(OSSL_DRBG_PARAM_MAX_ENTROPYLEN, NULL), \ OSSL_PARAM_size_t(OSSL_DRBG_PARAM_MIN_NONCELEN, NULL), \ OSSL_PARAM_size_t(OSSL_DRBG_PARAM_MAX_NONCELEN, NULL), \ OSSL_PARAM_size_t(OSSL_DRBG_PARAM_MAX_PERSLEN, NULL), \ OSSL_PARAM_size_t(OSSL_DRBG_PARAM_MAX_ADINLEN, NULL), \ OSSL_PARAM_uint(OSSL_DRBG_PARAM_RESEED_COUNTER, NULL), \ OSSL_PARAM_time_t(OSSL_DRBG_PARAM_RESEED_TIME, NULL), \ OSSL_PARAM_uint(OSSL_DRBG_PARAM_RESEED_REQUESTS, NULL), \ OSSL_PARAM_uint64(OSSL_DRBG_PARAM_RESEED_TIME_INTERVAL, NULL) /* Continuous test "entropy" calls */ size_t ossl_crngt_get_entropy(PROV_DRBG *drbg, unsigned char **pout, int entropy, size_t min_len, size_t max_len, int prediction_resistance); void ossl_crngt_cleanup_entropy(PROV_DRBG *drbg, unsigned char *out, size_t outlen); /* Confirm digest is allowed to be used with a DRBG */ int ossl_drbg_verify_digest(ossl_unused OSSL_LIB_CTX *libctx, const EVP_MD *md); #endif
./openssl/providers/implementations/rands/crngt.c
/* * Copyright 2019-2022 The OpenSSL Project Authors. All Rights Reserved. * Copyright (c) 2019, Oracle and/or its affiliates. All rights reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * Implementation of the FIPS 140-2 section 4.9.2 Conditional Tests. */ #include <string.h> #include <openssl/evp.h> #include <openssl/core_dispatch.h> #include <openssl/params.h> #include <openssl/self_test.h> #include "prov/providercommon.h" #include "prov/provider_ctx.h" #include "internal/cryptlib.h" #include "crypto/rand_pool.h" #include "drbg_local.h" #include "prov/seeding.h" #include "crypto/context.h" typedef struct crng_test_global_st { unsigned char crngt_prev[EVP_MAX_MD_SIZE]; EVP_MD *md; int preloaded; CRYPTO_RWLOCK *lock; } CRNG_TEST_GLOBAL; static int crngt_get_entropy(PROV_CTX *provctx, const EVP_MD *digest, unsigned char *buf, unsigned char *md, unsigned int *md_size) { int r; size_t n; unsigned char *p; n = ossl_prov_get_entropy(provctx, &p, 0, CRNGT_BUFSIZ, CRNGT_BUFSIZ); if (n == CRNGT_BUFSIZ) { r = EVP_Digest(p, CRNGT_BUFSIZ, md, md_size, digest, NULL); if (r != 0) memcpy(buf, p, CRNGT_BUFSIZ); ossl_prov_cleanup_entropy(provctx, p, n); return r != 0; } if (n != 0) ossl_prov_cleanup_entropy(provctx, p, n); return 0; } void ossl_rand_crng_ctx_free(void *vcrngt_glob) { CRNG_TEST_GLOBAL *crngt_glob = vcrngt_glob; CRYPTO_THREAD_lock_free(crngt_glob->lock); EVP_MD_free(crngt_glob->md); OPENSSL_free(crngt_glob); } void *ossl_rand_crng_ctx_new(OSSL_LIB_CTX *ctx) { CRNG_TEST_GLOBAL *crngt_glob = OPENSSL_zalloc(sizeof(*crngt_glob)); if (crngt_glob == NULL) return NULL; if ((crngt_glob->md = EVP_MD_fetch(ctx, "SHA256", "")) == NULL) { OPENSSL_free(crngt_glob); return NULL; } if ((crngt_glob->lock = CRYPTO_THREAD_lock_new()) == NULL) { EVP_MD_free(crngt_glob->md); OPENSSL_free(crngt_glob); return NULL; } return crngt_glob; } static int prov_crngt_compare_previous(const unsigned char *prev, const unsigned char *cur, size_t sz) { const int res = memcmp(prev, cur, sz) != 0; if (!res) ossl_set_error_state(OSSL_SELF_TEST_TYPE_CRNG); return res; } size_t ossl_crngt_get_entropy(PROV_DRBG *drbg, unsigned char **pout, int entropy, size_t min_len, size_t max_len, int prediction_resistance) { unsigned char md[EVP_MAX_MD_SIZE]; unsigned char buf[CRNGT_BUFSIZ]; unsigned char *ent, *entp, *entbuf; unsigned int sz; size_t bytes_needed; size_t r = 0, s, t; int crng_test_pass = 1; OSSL_LIB_CTX *libctx = ossl_prov_ctx_get0_libctx(drbg->provctx); CRNG_TEST_GLOBAL *crngt_glob = ossl_lib_ctx_get_data(libctx, OSSL_LIB_CTX_RAND_CRNGT_INDEX); OSSL_CALLBACK *stcb = NULL; void *stcbarg = NULL; OSSL_SELF_TEST *st = NULL; if (crngt_glob == NULL) return 0; if (!CRYPTO_THREAD_write_lock(crngt_glob->lock)) return 0; if (!crngt_glob->preloaded) { if (!crngt_get_entropy(drbg->provctx, crngt_glob->md, buf, crngt_glob->crngt_prev, NULL)) { OPENSSL_cleanse(buf, sizeof(buf)); goto unlock_return; } crngt_glob->preloaded = 1; } /* * Calculate how many bytes of seed material we require, rounded up * to the nearest byte. If the entropy is of less than full quality, * the amount required should be scaled up appropriately here. */ bytes_needed = (entropy + 7) / 8; if (bytes_needed < min_len) bytes_needed = min_len; if (bytes_needed > max_len) goto unlock_return; entp = ent = OPENSSL_secure_malloc(bytes_needed); if (ent == NULL) goto unlock_return; OSSL_SELF_TEST_get_callback(libctx, &stcb, &stcbarg); if (stcb != NULL) { st = OSSL_SELF_TEST_new(stcb, stcbarg); if (st == NULL) goto err; OSSL_SELF_TEST_onbegin(st, OSSL_SELF_TEST_TYPE_CRNG, OSSL_SELF_TEST_DESC_RNG); } for (t = bytes_needed; t > 0;) { /* Care needs to be taken to avoid overrunning the buffer */ s = t >= CRNGT_BUFSIZ ? CRNGT_BUFSIZ : t; entbuf = t >= CRNGT_BUFSIZ ? entp : buf; if (!crngt_get_entropy(drbg->provctx, crngt_glob->md, entbuf, md, &sz)) goto err; if (t < CRNGT_BUFSIZ) memcpy(entp, buf, t); /* Force a failure here if the callback returns 1 */ if (OSSL_SELF_TEST_oncorrupt_byte(st, md)) memcpy(md, crngt_glob->crngt_prev, sz); if (!prov_crngt_compare_previous(crngt_glob->crngt_prev, md, sz)) { crng_test_pass = 0; goto err; } /* Update for next block */ memcpy(crngt_glob->crngt_prev, md, sz); entp += s; t -= s; } r = bytes_needed; *pout = ent; ent = NULL; err: OSSL_SELF_TEST_onend(st, crng_test_pass); OSSL_SELF_TEST_free(st); OPENSSL_secure_clear_free(ent, bytes_needed); unlock_return: CRYPTO_THREAD_unlock(crngt_glob->lock); return r; } void ossl_crngt_cleanup_entropy(ossl_unused PROV_DRBG *drbg, unsigned char *out, size_t outlen) { OPENSSL_secure_clear_free(out, outlen); }
./openssl/providers/implementations/rands/drbg_ctr.c
/* * Copyright 2011-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <stdlib.h> #include <string.h> #include <openssl/crypto.h> #include <openssl/err.h> #include <openssl/rand.h> #include <openssl/aes.h> #include <openssl/proverr.h> #include "crypto/modes.h" #include "internal/thread_once.h" #include "prov/implementations.h" #include "prov/providercommon.h" #include "prov/provider_ctx.h" #include "drbg_local.h" static OSSL_FUNC_rand_newctx_fn drbg_ctr_new_wrapper; static OSSL_FUNC_rand_freectx_fn drbg_ctr_free; static OSSL_FUNC_rand_instantiate_fn drbg_ctr_instantiate_wrapper; static OSSL_FUNC_rand_uninstantiate_fn drbg_ctr_uninstantiate_wrapper; static OSSL_FUNC_rand_generate_fn drbg_ctr_generate_wrapper; static OSSL_FUNC_rand_reseed_fn drbg_ctr_reseed_wrapper; static OSSL_FUNC_rand_settable_ctx_params_fn drbg_ctr_settable_ctx_params; static OSSL_FUNC_rand_set_ctx_params_fn drbg_ctr_set_ctx_params; static OSSL_FUNC_rand_gettable_ctx_params_fn drbg_ctr_gettable_ctx_params; static OSSL_FUNC_rand_get_ctx_params_fn drbg_ctr_get_ctx_params; static OSSL_FUNC_rand_verify_zeroization_fn drbg_ctr_verify_zeroization; static int drbg_ctr_set_ctx_params_locked(void *vctx, const OSSL_PARAM params[]); /* * The state of a DRBG AES-CTR. */ typedef struct rand_drbg_ctr_st { EVP_CIPHER_CTX *ctx_ecb; EVP_CIPHER_CTX *ctx_ctr; EVP_CIPHER_CTX *ctx_df; EVP_CIPHER *cipher_ecb; EVP_CIPHER *cipher_ctr; size_t keylen; int use_df; unsigned char K[32]; unsigned char V[16]; /* Temporary block storage used by ctr_df */ unsigned char bltmp[16]; size_t bltmp_pos; unsigned char KX[48]; } PROV_DRBG_CTR; /* * Implementation of NIST SP 800-90A CTR DRBG. */ static void inc_128(PROV_DRBG_CTR *ctr) { unsigned char *p = &ctr->V[0]; u32 n = 16, c = 1; do { --n; c += p[n]; p[n] = (u8)c; c >>= 8; } while (n); } static void ctr_XOR(PROV_DRBG_CTR *ctr, const unsigned char *in, size_t inlen) { size_t i, n; if (in == NULL || inlen == 0) return; /* * Any zero padding will have no effect on the result as we * are XORing. So just process however much input we have. */ n = inlen < ctr->keylen ? inlen : ctr->keylen; for (i = 0; i < n; i++) ctr->K[i] ^= in[i]; if (inlen <= ctr->keylen) return; n = inlen - ctr->keylen; if (n > 16) { /* Should never happen */ n = 16; } for (i = 0; i < n; i++) ctr->V[i] ^= in[i + ctr->keylen]; } /* * Process a complete block using BCC algorithm of SP 800-90A 10.3.3 */ __owur static int ctr_BCC_block(PROV_DRBG_CTR *ctr, unsigned char *out, const unsigned char *in, int len) { int i, outlen = AES_BLOCK_SIZE; for (i = 0; i < len; i++) out[i] ^= in[i]; if (!EVP_CipherUpdate(ctr->ctx_df, out, &outlen, out, len) || outlen != len) return 0; return 1; } /* * Handle several BCC operations for as much data as we need for K and X */ __owur static int ctr_BCC_blocks(PROV_DRBG_CTR *ctr, const unsigned char *in) { unsigned char in_tmp[48]; unsigned char num_of_blk = 2; memcpy(in_tmp, in, 16); memcpy(in_tmp + 16, in, 16); if (ctr->keylen != 16) { memcpy(in_tmp + 32, in, 16); num_of_blk = 3; } return ctr_BCC_block(ctr, ctr->KX, in_tmp, AES_BLOCK_SIZE * num_of_blk); } /* * Initialise BCC blocks: these have the value 0,1,2 in leftmost positions: * see 10.3.1 stage 7. */ __owur static int ctr_BCC_init(PROV_DRBG_CTR *ctr) { unsigned char bltmp[48] = {0}; unsigned char num_of_blk; memset(ctr->KX, 0, 48); num_of_blk = ctr->keylen == 16 ? 2 : 3; bltmp[(AES_BLOCK_SIZE * 1) + 3] = 1; bltmp[(AES_BLOCK_SIZE * 2) + 3] = 2; return ctr_BCC_block(ctr, ctr->KX, bltmp, num_of_blk * AES_BLOCK_SIZE); } /* * Process several blocks into BCC algorithm, some possibly partial */ __owur static int ctr_BCC_update(PROV_DRBG_CTR *ctr, const unsigned char *in, size_t inlen) { if (in == NULL || inlen == 0) return 1; /* If we have partial block handle it first */ if (ctr->bltmp_pos) { size_t left = 16 - ctr->bltmp_pos; /* If we now have a complete block process it */ if (inlen >= left) { memcpy(ctr->bltmp + ctr->bltmp_pos, in, left); if (!ctr_BCC_blocks(ctr, ctr->bltmp)) return 0; ctr->bltmp_pos = 0; inlen -= left; in += left; } } /* Process zero or more complete blocks */ for (; inlen >= 16; in += 16, inlen -= 16) { if (!ctr_BCC_blocks(ctr, in)) return 0; } /* Copy any remaining partial block to the temporary buffer */ if (inlen > 0) { memcpy(ctr->bltmp + ctr->bltmp_pos, in, inlen); ctr->bltmp_pos += inlen; } return 1; } __owur static int ctr_BCC_final(PROV_DRBG_CTR *ctr) { if (ctr->bltmp_pos) { memset(ctr->bltmp + ctr->bltmp_pos, 0, 16 - ctr->bltmp_pos); if (!ctr_BCC_blocks(ctr, ctr->bltmp)) return 0; } return 1; } __owur static int ctr_df(PROV_DRBG_CTR *ctr, const unsigned char *in1, size_t in1len, const unsigned char *in2, size_t in2len, const unsigned char *in3, size_t in3len) { static unsigned char c80 = 0x80; size_t inlen; unsigned char *p = ctr->bltmp; int outlen = AES_BLOCK_SIZE; if (!ctr_BCC_init(ctr)) return 0; if (in1 == NULL) in1len = 0; if (in2 == NULL) in2len = 0; if (in3 == NULL) in3len = 0; inlen = in1len + in2len + in3len; /* Initialise L||N in temporary block */ *p++ = (inlen >> 24) & 0xff; *p++ = (inlen >> 16) & 0xff; *p++ = (inlen >> 8) & 0xff; *p++ = inlen & 0xff; /* NB keylen is at most 32 bytes */ *p++ = 0; *p++ = 0; *p++ = 0; *p = (unsigned char)((ctr->keylen + 16) & 0xff); ctr->bltmp_pos = 8; if (!ctr_BCC_update(ctr, in1, in1len) || !ctr_BCC_update(ctr, in2, in2len) || !ctr_BCC_update(ctr, in3, in3len) || !ctr_BCC_update(ctr, &c80, 1) || !ctr_BCC_final(ctr)) return 0; /* Set up key K */ if (!EVP_CipherInit_ex(ctr->ctx_ecb, NULL, NULL, ctr->KX, NULL, -1)) return 0; /* X follows key K */ if (!EVP_CipherUpdate(ctr->ctx_ecb, ctr->KX, &outlen, ctr->KX + ctr->keylen, AES_BLOCK_SIZE) || outlen != AES_BLOCK_SIZE) return 0; if (!EVP_CipherUpdate(ctr->ctx_ecb, ctr->KX + 16, &outlen, ctr->KX, AES_BLOCK_SIZE) || outlen != AES_BLOCK_SIZE) return 0; if (ctr->keylen != 16) if (!EVP_CipherUpdate(ctr->ctx_ecb, ctr->KX + 32, &outlen, ctr->KX + 16, AES_BLOCK_SIZE) || outlen != AES_BLOCK_SIZE) return 0; return 1; } /* * NB the no-df Update in SP800-90A specifies a constant input length * of seedlen, however other uses of this algorithm pad the input with * zeroes if necessary and have up to two parameters XORed together, * so we handle both cases in this function instead. */ __owur static int ctr_update(PROV_DRBG *drbg, const unsigned char *in1, size_t in1len, const unsigned char *in2, size_t in2len, const unsigned char *nonce, size_t noncelen) { PROV_DRBG_CTR *ctr = (PROV_DRBG_CTR *)drbg->data; int outlen = AES_BLOCK_SIZE; unsigned char V_tmp[48], out[48]; unsigned char len; /* correct key is already set up. */ memcpy(V_tmp, ctr->V, 16); inc_128(ctr); memcpy(V_tmp + 16, ctr->V, 16); if (ctr->keylen == 16) { len = 32; } else { inc_128(ctr); memcpy(V_tmp + 32, ctr->V, 16); len = 48; } if (!EVP_CipherUpdate(ctr->ctx_ecb, out, &outlen, V_tmp, len) || outlen != len) return 0; memcpy(ctr->K, out, ctr->keylen); memcpy(ctr->V, out + ctr->keylen, 16); if (ctr->use_df) { /* If no input reuse existing derived value */ if (in1 != NULL || nonce != NULL || in2 != NULL) if (!ctr_df(ctr, in1, in1len, nonce, noncelen, in2, in2len)) return 0; /* If this a reuse input in1len != 0 */ if (in1len) ctr_XOR(ctr, ctr->KX, drbg->seedlen); } else { ctr_XOR(ctr, in1, in1len); ctr_XOR(ctr, in2, in2len); } if (!EVP_CipherInit_ex(ctr->ctx_ecb, NULL, NULL, ctr->K, NULL, -1) || !EVP_CipherInit_ex(ctr->ctx_ctr, NULL, NULL, ctr->K, NULL, -1)) return 0; return 1; } static int drbg_ctr_instantiate(PROV_DRBG *drbg, const unsigned char *entropy, size_t entropylen, const unsigned char *nonce, size_t noncelen, const unsigned char *pers, size_t perslen) { PROV_DRBG_CTR *ctr = (PROV_DRBG_CTR *)drbg->data; if (entropy == NULL) return 0; memset(ctr->K, 0, sizeof(ctr->K)); memset(ctr->V, 0, sizeof(ctr->V)); if (!EVP_CipherInit_ex(ctr->ctx_ecb, NULL, NULL, ctr->K, NULL, -1)) return 0; inc_128(ctr); if (!ctr_update(drbg, entropy, entropylen, pers, perslen, nonce, noncelen)) return 0; return 1; } static int drbg_ctr_instantiate_wrapper(void *vdrbg, unsigned int strength, int prediction_resistance, const unsigned char *pstr, size_t pstr_len, const OSSL_PARAM params[]) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; int ret = 0; if (drbg->lock != NULL && !CRYPTO_THREAD_write_lock(drbg->lock)) return 0; if (!ossl_prov_is_running() || !drbg_ctr_set_ctx_params_locked(drbg, params)) goto err; ret = ossl_prov_drbg_instantiate(drbg, strength, prediction_resistance, pstr, pstr_len); err: if (drbg->lock != NULL) CRYPTO_THREAD_unlock(drbg->lock); return ret; } static int drbg_ctr_reseed(PROV_DRBG *drbg, const unsigned char *entropy, size_t entropylen, const unsigned char *adin, size_t adinlen) { PROV_DRBG_CTR *ctr = (PROV_DRBG_CTR *)drbg->data; if (entropy == NULL) return 0; inc_128(ctr); if (!ctr_update(drbg, entropy, entropylen, adin, adinlen, NULL, 0)) return 0; return 1; } static int drbg_ctr_reseed_wrapper(void *vdrbg, int prediction_resistance, const unsigned char *ent, size_t ent_len, const unsigned char *adin, size_t adin_len) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; return ossl_prov_drbg_reseed(drbg, prediction_resistance, ent, ent_len, adin, adin_len); } static void ctr96_inc(unsigned char *counter) { u32 n = 12, c = 1; do { --n; c += counter[n]; counter[n] = (u8)c; c >>= 8; } while (n); } static int drbg_ctr_generate(PROV_DRBG *drbg, unsigned char *out, size_t outlen, const unsigned char *adin, size_t adinlen) { PROV_DRBG_CTR *ctr = (PROV_DRBG_CTR *)drbg->data; unsigned int ctr32, blocks; int outl, buflen; if (adin != NULL && adinlen != 0) { inc_128(ctr); if (!ctr_update(drbg, adin, adinlen, NULL, 0, NULL, 0)) return 0; /* This means we reuse derived value */ if (ctr->use_df) { adin = NULL; adinlen = 1; } } else { adinlen = 0; } inc_128(ctr); if (outlen == 0) { inc_128(ctr); if (!ctr_update(drbg, adin, adinlen, NULL, 0, NULL, 0)) return 0; return 1; } memset(out, 0, outlen); do { if (!EVP_CipherInit_ex(ctr->ctx_ctr, NULL, NULL, NULL, ctr->V, -1)) return 0; /*- * outlen has type size_t while EVP_CipherUpdate takes an * int argument and thus cannot be guaranteed to process more * than 2^31-1 bytes at a time. We process such huge generate * requests in 2^30 byte chunks, which is the greatest multiple * of AES block size lower than or equal to 2^31-1. */ buflen = outlen > (1U << 30) ? (1U << 30) : outlen; blocks = (buflen + 15) / 16; ctr32 = GETU32(ctr->V + 12) + blocks; if (ctr32 < blocks) { /* 32-bit counter overflow into V. */ if (ctr32 != 0) { blocks -= ctr32; buflen = blocks * 16; ctr32 = 0; } ctr96_inc(ctr->V); } PUTU32(ctr->V + 12, ctr32); if (!EVP_CipherUpdate(ctr->ctx_ctr, out, &outl, out, buflen) || outl != buflen) return 0; out += buflen; outlen -= buflen; } while (outlen); if (!ctr_update(drbg, adin, adinlen, NULL, 0, NULL, 0)) return 0; return 1; } static int drbg_ctr_generate_wrapper (void *vdrbg, unsigned char *out, size_t outlen, unsigned int strength, int prediction_resistance, const unsigned char *adin, size_t adin_len) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; return ossl_prov_drbg_generate(drbg, out, outlen, strength, prediction_resistance, adin, adin_len); } static int drbg_ctr_uninstantiate(PROV_DRBG *drbg) { PROV_DRBG_CTR *ctr = (PROV_DRBG_CTR *)drbg->data; OPENSSL_cleanse(ctr->K, sizeof(ctr->K)); OPENSSL_cleanse(ctr->V, sizeof(ctr->V)); OPENSSL_cleanse(ctr->bltmp, sizeof(ctr->bltmp)); OPENSSL_cleanse(ctr->KX, sizeof(ctr->KX)); ctr->bltmp_pos = 0; return ossl_prov_drbg_uninstantiate(drbg); } static int drbg_ctr_uninstantiate_wrapper(void *vdrbg) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; int ret; if (drbg->lock != NULL && !CRYPTO_THREAD_write_lock(drbg->lock)) return 0; ret = drbg_ctr_uninstantiate(drbg); if (drbg->lock != NULL) CRYPTO_THREAD_unlock(drbg->lock); return ret; } static int drbg_ctr_verify_zeroization(void *vdrbg) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; PROV_DRBG_CTR *ctr = (PROV_DRBG_CTR *)drbg->data; int ret = 0; if (drbg->lock != NULL && !CRYPTO_THREAD_read_lock(drbg->lock)) return 0; PROV_DRBG_VERIFY_ZEROIZATION(ctr->K); PROV_DRBG_VERIFY_ZEROIZATION(ctr->V); PROV_DRBG_VERIFY_ZEROIZATION(ctr->bltmp); PROV_DRBG_VERIFY_ZEROIZATION(ctr->KX); if (ctr->bltmp_pos != 0) goto err; ret = 1; err: if (drbg->lock != NULL) CRYPTO_THREAD_unlock(drbg->lock); return ret; } static int drbg_ctr_init_lengths(PROV_DRBG *drbg) { PROV_DRBG_CTR *ctr = (PROV_DRBG_CTR *)drbg->data; int res = 1; /* Maximum number of bits per request = 2^19 = 2^16 bytes */ drbg->max_request = 1 << 16; if (ctr->use_df) { drbg->min_entropylen = 0; drbg->max_entropylen = DRBG_MAX_LENGTH; drbg->min_noncelen = 0; drbg->max_noncelen = DRBG_MAX_LENGTH; drbg->max_perslen = DRBG_MAX_LENGTH; drbg->max_adinlen = DRBG_MAX_LENGTH; if (ctr->keylen > 0) { drbg->min_entropylen = ctr->keylen; drbg->min_noncelen = drbg->min_entropylen / 2; } } else { const size_t len = ctr->keylen > 0 ? drbg->seedlen : DRBG_MAX_LENGTH; drbg->min_entropylen = len; drbg->max_entropylen = len; /* Nonce not used */ drbg->min_noncelen = 0; drbg->max_noncelen = 0; drbg->max_perslen = len; drbg->max_adinlen = len; } return res; } static int drbg_ctr_init(PROV_DRBG *drbg) { PROV_DRBG_CTR *ctr = (PROV_DRBG_CTR *)drbg->data; size_t keylen; if (ctr->cipher_ctr == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_CIPHER); return 0; } ctr->keylen = keylen = EVP_CIPHER_get_key_length(ctr->cipher_ctr); if (ctr->ctx_ecb == NULL) ctr->ctx_ecb = EVP_CIPHER_CTX_new(); if (ctr->ctx_ctr == NULL) ctr->ctx_ctr = EVP_CIPHER_CTX_new(); if (ctr->ctx_ecb == NULL || ctr->ctx_ctr == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_EVP_LIB); goto err; } if (!EVP_CipherInit_ex(ctr->ctx_ecb, ctr->cipher_ecb, NULL, NULL, NULL, 1) || !EVP_CipherInit_ex(ctr->ctx_ctr, ctr->cipher_ctr, NULL, NULL, NULL, 1)) { ERR_raise(ERR_LIB_PROV, PROV_R_UNABLE_TO_INITIALISE_CIPHERS); goto err; } drbg->strength = keylen * 8; drbg->seedlen = keylen + 16; if (ctr->use_df) { /* df initialisation */ static const unsigned char df_key[32] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }; if (ctr->ctx_df == NULL) ctr->ctx_df = EVP_CIPHER_CTX_new(); if (ctr->ctx_df == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_EVP_LIB); goto err; } /* Set key schedule for df_key */ if (!EVP_CipherInit_ex(ctr->ctx_df, ctr->cipher_ecb, NULL, df_key, NULL, 1)) { ERR_raise(ERR_LIB_PROV, PROV_R_DERIVATION_FUNCTION_INIT_FAILED); goto err; } } return drbg_ctr_init_lengths(drbg); err: EVP_CIPHER_CTX_free(ctr->ctx_ecb); EVP_CIPHER_CTX_free(ctr->ctx_ctr); ctr->ctx_ecb = ctr->ctx_ctr = NULL; return 0; } static int drbg_ctr_new(PROV_DRBG *drbg) { PROV_DRBG_CTR *ctr; ctr = OPENSSL_secure_zalloc(sizeof(*ctr)); if (ctr == NULL) return 0; ctr->use_df = 1; drbg->data = ctr; return drbg_ctr_init_lengths(drbg); } static void *drbg_ctr_new_wrapper(void *provctx, void *parent, const OSSL_DISPATCH *parent_dispatch) { return ossl_rand_drbg_new(provctx, parent, parent_dispatch, &drbg_ctr_new, &drbg_ctr_instantiate, &drbg_ctr_uninstantiate, &drbg_ctr_reseed, &drbg_ctr_generate); } static void drbg_ctr_free(void *vdrbg) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; PROV_DRBG_CTR *ctr; if (drbg != NULL && (ctr = (PROV_DRBG_CTR *)drbg->data) != NULL) { EVP_CIPHER_CTX_free(ctr->ctx_ecb); EVP_CIPHER_CTX_free(ctr->ctx_ctr); EVP_CIPHER_CTX_free(ctr->ctx_df); EVP_CIPHER_free(ctr->cipher_ecb); EVP_CIPHER_free(ctr->cipher_ctr); OPENSSL_secure_clear_free(ctr, sizeof(*ctr)); } ossl_rand_drbg_free(drbg); } static int drbg_ctr_get_ctx_params(void *vdrbg, OSSL_PARAM params[]) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; PROV_DRBG_CTR *ctr = (PROV_DRBG_CTR *)drbg->data; OSSL_PARAM *p; int ret = 0, complete = 0; if (!ossl_drbg_get_ctx_params_no_lock(drbg, params, &complete)) return 0; if (complete) return 1; if (drbg->lock != NULL && !CRYPTO_THREAD_read_lock(drbg->lock)) return 0; p = OSSL_PARAM_locate(params, OSSL_DRBG_PARAM_USE_DF); if (p != NULL && !OSSL_PARAM_set_int(p, ctr->use_df)) goto err; p = OSSL_PARAM_locate(params, OSSL_DRBG_PARAM_CIPHER); if (p != NULL) { if (ctr->cipher_ctr == NULL || !OSSL_PARAM_set_utf8_string(p, EVP_CIPHER_get0_name(ctr->cipher_ctr))) goto err; } ret = ossl_drbg_get_ctx_params(drbg, params); err: if (drbg->lock != NULL) CRYPTO_THREAD_unlock(drbg->lock); return ret; } static const OSSL_PARAM *drbg_ctr_gettable_ctx_params(ossl_unused void *vctx, ossl_unused void *provctx) { static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_DRBG_PARAM_CIPHER, NULL, 0), OSSL_PARAM_int(OSSL_DRBG_PARAM_USE_DF, NULL), OSSL_PARAM_DRBG_GETTABLE_CTX_COMMON, OSSL_PARAM_END }; return known_gettable_ctx_params; } static int drbg_ctr_set_ctx_params_locked(void *vctx, const OSSL_PARAM params[]) { PROV_DRBG *ctx = (PROV_DRBG *)vctx; PROV_DRBG_CTR *ctr = (PROV_DRBG_CTR *)ctx->data; OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(ctx->provctx); const OSSL_PARAM *p; char *ecb; const char *propquery = NULL; int i, cipher_init = 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_DRBG_PARAM_USE_DF)) != NULL && OSSL_PARAM_get_int(p, &i)) { /* FIPS errors out in the drbg_ctr_init() call later */ ctr->use_df = i != 0; cipher_init = 1; } if ((p = OSSL_PARAM_locate_const(params, OSSL_DRBG_PARAM_PROPERTIES)) != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING) return 0; propquery = (const char *)p->data; } if ((p = OSSL_PARAM_locate_const(params, OSSL_DRBG_PARAM_CIPHER)) != NULL) { const char *base = (const char *)p->data; size_t ctr_str_len = sizeof("CTR") - 1; size_t ecb_str_len = sizeof("ECB") - 1; if (p->data_type != OSSL_PARAM_UTF8_STRING || p->data_size < ctr_str_len) return 0; if (OPENSSL_strcasecmp("CTR", base + p->data_size - ctr_str_len) != 0) { ERR_raise(ERR_LIB_PROV, PROV_R_REQUIRE_CTR_MODE_CIPHER); return 0; } if ((ecb = OPENSSL_strndup(base, p->data_size)) == NULL) return 0; strcpy(ecb + p->data_size - ecb_str_len, "ECB"); EVP_CIPHER_free(ctr->cipher_ecb); EVP_CIPHER_free(ctr->cipher_ctr); ctr->cipher_ctr = EVP_CIPHER_fetch(libctx, base, propquery); ctr->cipher_ecb = EVP_CIPHER_fetch(libctx, ecb, propquery); OPENSSL_free(ecb); if (ctr->cipher_ctr == NULL || ctr->cipher_ecb == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_UNABLE_TO_FIND_CIPHERS); return 0; } cipher_init = 1; } if (cipher_init && !drbg_ctr_init(ctx)) return 0; return ossl_drbg_set_ctx_params(ctx, params); } static int drbg_ctr_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { PROV_DRBG *drbg = (PROV_DRBG *)vctx; int ret; if (drbg->lock != NULL && !CRYPTO_THREAD_write_lock(drbg->lock)) return 0; ret = drbg_ctr_set_ctx_params_locked(vctx, params); if (drbg->lock != NULL) CRYPTO_THREAD_unlock(drbg->lock); return ret; } static const OSSL_PARAM *drbg_ctr_settable_ctx_params(ossl_unused void *vctx, ossl_unused void *provctx) { static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_DRBG_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_utf8_string(OSSL_DRBG_PARAM_CIPHER, NULL, 0), OSSL_PARAM_int(OSSL_DRBG_PARAM_USE_DF, NULL), OSSL_PARAM_DRBG_SETTABLE_CTX_COMMON, OSSL_PARAM_END }; return known_settable_ctx_params; } const OSSL_DISPATCH ossl_drbg_ctr_functions[] = { { OSSL_FUNC_RAND_NEWCTX, (void(*)(void))drbg_ctr_new_wrapper }, { OSSL_FUNC_RAND_FREECTX, (void(*)(void))drbg_ctr_free }, { OSSL_FUNC_RAND_INSTANTIATE, (void(*)(void))drbg_ctr_instantiate_wrapper }, { OSSL_FUNC_RAND_UNINSTANTIATE, (void(*)(void))drbg_ctr_uninstantiate_wrapper }, { OSSL_FUNC_RAND_GENERATE, (void(*)(void))drbg_ctr_generate_wrapper }, { OSSL_FUNC_RAND_RESEED, (void(*)(void))drbg_ctr_reseed_wrapper }, { OSSL_FUNC_RAND_ENABLE_LOCKING, (void(*)(void))ossl_drbg_enable_locking }, { OSSL_FUNC_RAND_LOCK, (void(*)(void))ossl_drbg_lock }, { OSSL_FUNC_RAND_UNLOCK, (void(*)(void))ossl_drbg_unlock }, { OSSL_FUNC_RAND_SETTABLE_CTX_PARAMS, (void(*)(void))drbg_ctr_settable_ctx_params }, { OSSL_FUNC_RAND_SET_CTX_PARAMS, (void(*)(void))drbg_ctr_set_ctx_params }, { OSSL_FUNC_RAND_GETTABLE_CTX_PARAMS, (void(*)(void))drbg_ctr_gettable_ctx_params }, { OSSL_FUNC_RAND_GET_CTX_PARAMS, (void(*)(void))drbg_ctr_get_ctx_params }, { OSSL_FUNC_RAND_VERIFY_ZEROIZATION, (void(*)(void))drbg_ctr_verify_zeroization }, { OSSL_FUNC_RAND_GET_SEED, (void(*)(void))ossl_drbg_get_seed }, { OSSL_FUNC_RAND_CLEAR_SEED, (void(*)(void))ossl_drbg_clear_seed }, OSSL_DISPATCH_END };
./openssl/providers/implementations/rands/seed_src.c
/* * Copyright 2020-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <string.h> #include <openssl/rand.h> #include <openssl/core_dispatch.h> #include <openssl/e_os2.h> #include <openssl/params.h> #include <openssl/core_names.h> #include <openssl/evp.h> #include <openssl/err.h> #include <openssl/randerr.h> #include <openssl/proverr.h> #include "prov/implementations.h" #include "prov/provider_ctx.h" #include "crypto/rand.h" #include "crypto/rand_pool.h" static OSSL_FUNC_rand_newctx_fn seed_src_new; static OSSL_FUNC_rand_freectx_fn seed_src_free; static OSSL_FUNC_rand_instantiate_fn seed_src_instantiate; static OSSL_FUNC_rand_uninstantiate_fn seed_src_uninstantiate; static OSSL_FUNC_rand_generate_fn seed_src_generate; static OSSL_FUNC_rand_reseed_fn seed_src_reseed; static OSSL_FUNC_rand_gettable_ctx_params_fn seed_src_gettable_ctx_params; static OSSL_FUNC_rand_get_ctx_params_fn seed_src_get_ctx_params; static OSSL_FUNC_rand_verify_zeroization_fn seed_src_verify_zeroization; static OSSL_FUNC_rand_enable_locking_fn seed_src_enable_locking; static OSSL_FUNC_rand_lock_fn seed_src_lock; static OSSL_FUNC_rand_unlock_fn seed_src_unlock; static OSSL_FUNC_rand_get_seed_fn seed_get_seed; static OSSL_FUNC_rand_clear_seed_fn seed_clear_seed; typedef struct { void *provctx; int state; } PROV_SEED_SRC; static void *seed_src_new(void *provctx, void *parent, const OSSL_DISPATCH *parent_dispatch) { PROV_SEED_SRC *s; if (parent != NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_SEED_SOURCES_MUST_NOT_HAVE_A_PARENT); return NULL; } s = OPENSSL_zalloc(sizeof(*s)); if (s == NULL) return NULL; s->provctx = provctx; s->state = EVP_RAND_STATE_UNINITIALISED; return s; } static void seed_src_free(void *vseed) { OPENSSL_free(vseed); } static int seed_src_instantiate(void *vseed, unsigned int strength, int prediction_resistance, const unsigned char *pstr, size_t pstr_len, ossl_unused const OSSL_PARAM params[]) { PROV_SEED_SRC *s = (PROV_SEED_SRC *)vseed; s->state = EVP_RAND_STATE_READY; return 1; } static int seed_src_uninstantiate(void *vseed) { PROV_SEED_SRC *s = (PROV_SEED_SRC *)vseed; s->state = EVP_RAND_STATE_UNINITIALISED; return 1; } static int seed_src_generate(void *vseed, unsigned char *out, size_t outlen, unsigned int strength, ossl_unused int prediction_resistance, ossl_unused const unsigned char *adin, ossl_unused size_t adin_len) { PROV_SEED_SRC *s = (PROV_SEED_SRC *)vseed; size_t entropy_available; RAND_POOL *pool; if (s->state != EVP_RAND_STATE_READY) { ERR_raise(ERR_LIB_PROV, s->state == EVP_RAND_STATE_ERROR ? PROV_R_IN_ERROR_STATE : PROV_R_NOT_INSTANTIATED); return 0; } pool = ossl_rand_pool_new(strength, 1, outlen, outlen); if (pool == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_RAND_LIB); return 0; } /* Get entropy by polling system entropy sources. */ entropy_available = ossl_pool_acquire_entropy(pool); if (entropy_available > 0) memcpy(out, ossl_rand_pool_buffer(pool), ossl_rand_pool_length(pool)); ossl_rand_pool_free(pool); return entropy_available > 0; } static int seed_src_reseed(void *vseed, ossl_unused int prediction_resistance, ossl_unused const unsigned char *ent, ossl_unused size_t ent_len, ossl_unused const unsigned char *adin, ossl_unused size_t adin_len) { PROV_SEED_SRC *s = (PROV_SEED_SRC *)vseed; if (s->state != EVP_RAND_STATE_READY) { ERR_raise(ERR_LIB_PROV, s->state == EVP_RAND_STATE_ERROR ? PROV_R_IN_ERROR_STATE : PROV_R_NOT_INSTANTIATED); return 0; } return 1; } static int seed_src_get_ctx_params(void *vseed, OSSL_PARAM params[]) { PROV_SEED_SRC *s = (PROV_SEED_SRC *)vseed; OSSL_PARAM *p; p = OSSL_PARAM_locate(params, OSSL_RAND_PARAM_STATE); if (p != NULL && !OSSL_PARAM_set_int(p, s->state)) return 0; p = OSSL_PARAM_locate(params, OSSL_RAND_PARAM_STRENGTH); if (p != NULL && !OSSL_PARAM_set_int(p, 1024)) return 0; p = OSSL_PARAM_locate(params, OSSL_RAND_PARAM_MAX_REQUEST); if (p != NULL && !OSSL_PARAM_set_size_t(p, 128)) return 0; return 1; } static const OSSL_PARAM *seed_src_gettable_ctx_params(ossl_unused void *vseed, ossl_unused void *provctx) { static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_int(OSSL_RAND_PARAM_STATE, NULL), OSSL_PARAM_uint(OSSL_RAND_PARAM_STRENGTH, NULL), OSSL_PARAM_size_t(OSSL_RAND_PARAM_MAX_REQUEST, NULL), OSSL_PARAM_END }; return known_gettable_ctx_params; } static int seed_src_verify_zeroization(ossl_unused void *vseed) { return 1; } static size_t seed_get_seed(void *vseed, unsigned char **pout, int entropy, size_t min_len, size_t max_len, int prediction_resistance, const unsigned char *adin, size_t adin_len) { size_t ret = 0; size_t entropy_available = 0; size_t i; RAND_POOL *pool; pool = ossl_rand_pool_new(entropy, 1, min_len, max_len); if (pool == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_RAND_LIB); return 0; } /* Get entropy by polling system entropy sources. */ entropy_available = ossl_pool_acquire_entropy(pool); if (entropy_available > 0) { ret = ossl_rand_pool_length(pool); *pout = ossl_rand_pool_detach(pool); /* xor the additional data into the output */ for (i = 0 ; i < adin_len ; ++i) (*pout)[i % ret] ^= adin[i]; } else { ERR_raise(ERR_LIB_PROV, PROV_R_ENTROPY_SOURCE_STRENGTH_TOO_WEAK); } ossl_rand_pool_free(pool); return ret; } static void seed_clear_seed(ossl_unused void *vdrbg, unsigned char *out, size_t outlen) { OPENSSL_secure_clear_free(out, outlen); } static int seed_src_enable_locking(ossl_unused void *vseed) { return 1; } int seed_src_lock(ossl_unused void *vctx) { return 1; } void seed_src_unlock(ossl_unused void *vctx) { } const OSSL_DISPATCH ossl_seed_src_functions[] = { { OSSL_FUNC_RAND_NEWCTX, (void(*)(void))seed_src_new }, { OSSL_FUNC_RAND_FREECTX, (void(*)(void))seed_src_free }, { OSSL_FUNC_RAND_INSTANTIATE, (void(*)(void))seed_src_instantiate }, { OSSL_FUNC_RAND_UNINSTANTIATE, (void(*)(void))seed_src_uninstantiate }, { OSSL_FUNC_RAND_GENERATE, (void(*)(void))seed_src_generate }, { OSSL_FUNC_RAND_RESEED, (void(*)(void))seed_src_reseed }, { OSSL_FUNC_RAND_ENABLE_LOCKING, (void(*)(void))seed_src_enable_locking }, { OSSL_FUNC_RAND_LOCK, (void(*)(void))seed_src_lock }, { OSSL_FUNC_RAND_UNLOCK, (void(*)(void))seed_src_unlock }, { OSSL_FUNC_RAND_GETTABLE_CTX_PARAMS, (void(*)(void))seed_src_gettable_ctx_params }, { OSSL_FUNC_RAND_GET_CTX_PARAMS, (void(*)(void))seed_src_get_ctx_params }, { OSSL_FUNC_RAND_VERIFY_ZEROIZATION, (void(*)(void))seed_src_verify_zeroization }, { OSSL_FUNC_RAND_GET_SEED, (void(*)(void))seed_get_seed }, { OSSL_FUNC_RAND_CLEAR_SEED, (void(*)(void))seed_clear_seed }, OSSL_DISPATCH_END };
./openssl/providers/implementations/rands/drbg_hmac.c
/* * Copyright 2011-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <stdlib.h> #include <string.h> #include <openssl/crypto.h> #include <openssl/err.h> #include <openssl/rand.h> #include <openssl/proverr.h> #include "internal/thread_once.h" #include "prov/providercommon.h" #include "prov/implementations.h" #include "prov/provider_ctx.h" #include "prov/hmac_drbg.h" #include "drbg_local.h" static OSSL_FUNC_rand_newctx_fn drbg_hmac_new_wrapper; static OSSL_FUNC_rand_freectx_fn drbg_hmac_free; static OSSL_FUNC_rand_instantiate_fn drbg_hmac_instantiate_wrapper; static OSSL_FUNC_rand_uninstantiate_fn drbg_hmac_uninstantiate_wrapper; static OSSL_FUNC_rand_generate_fn drbg_hmac_generate_wrapper; static OSSL_FUNC_rand_reseed_fn drbg_hmac_reseed_wrapper; static OSSL_FUNC_rand_settable_ctx_params_fn drbg_hmac_settable_ctx_params; static OSSL_FUNC_rand_set_ctx_params_fn drbg_hmac_set_ctx_params; static OSSL_FUNC_rand_gettable_ctx_params_fn drbg_hmac_gettable_ctx_params; static OSSL_FUNC_rand_get_ctx_params_fn drbg_hmac_get_ctx_params; static OSSL_FUNC_rand_verify_zeroization_fn drbg_hmac_verify_zeroization; static int drbg_hmac_set_ctx_params_locked(void *vctx, const OSSL_PARAM params[]); /* * Called twice by SP800-90Ar1 10.1.2.2 HMAC_DRBG_Update_Process. * * hmac is an object that holds the input/output Key and Value (K and V). * inbyte is 0x00 on the first call and 0x01 on the second call. * in1, in2, in3 are optional inputs that can be NULL. * in1len, in2len, in3len are the lengths of the input buffers. * * The returned K,V is: * hmac->K = HMAC(hmac->K, hmac->V || inbyte || [in1] || [in2] || [in3]) * hmac->V = HMAC(hmac->K, hmac->V) * * Returns zero if an error occurs otherwise it returns 1. */ static int do_hmac(PROV_DRBG_HMAC *hmac, unsigned char inbyte, const unsigned char *in1, size_t in1len, const unsigned char *in2, size_t in2len, const unsigned char *in3, size_t in3len) { EVP_MAC_CTX *ctx = hmac->ctx; if (!EVP_MAC_init(ctx, hmac->K, hmac->blocklen, NULL) /* K = HMAC(K, V || inbyte || [in1] || [in2] || [in3]) */ || !EVP_MAC_update(ctx, hmac->V, hmac->blocklen) || !EVP_MAC_update(ctx, &inbyte, 1) || !(in1 == NULL || in1len == 0 || EVP_MAC_update(ctx, in1, in1len)) || !(in2 == NULL || in2len == 0 || EVP_MAC_update(ctx, in2, in2len)) || !(in3 == NULL || in3len == 0 || EVP_MAC_update(ctx, in3, in3len)) || !EVP_MAC_final(ctx, hmac->K, NULL, sizeof(hmac->K))) return 0; /* V = HMAC(K, V) */ return EVP_MAC_init(ctx, hmac->K, hmac->blocklen, NULL) && EVP_MAC_update(ctx, hmac->V, hmac->blocklen) && EVP_MAC_final(ctx, hmac->V, NULL, sizeof(hmac->V)); } /* * SP800-90Ar1 10.1.2.2 HMAC_DRBG_Update_Process * * * Updates the drbg objects Key(K) and Value(V) using the following algorithm: * K,V = do_hmac(hmac, 0, in1, in2, in3) * if (any input is not NULL) * K,V = do_hmac(hmac, 1, in1, in2, in3) * * where in1, in2, in3 are optional input buffers that can be NULL. * in1len, in2len, in3len are the lengths of the input buffers. * * Returns zero if an error occurs otherwise it returns 1. */ static int drbg_hmac_update(PROV_DRBG_HMAC *hmac, const unsigned char *in1, size_t in1len, const unsigned char *in2, size_t in2len, const unsigned char *in3, size_t in3len) { /* (Steps 1-2) K = HMAC(K, V||0x00||provided_data). V = HMAC(K,V) */ if (!do_hmac(hmac, 0x00, in1, in1len, in2, in2len, in3, in3len)) return 0; /* (Step 3) If provided_data == NULL then return (K,V) */ if (in1len == 0 && in2len == 0 && in3len == 0) return 1; /* (Steps 4-5) K = HMAC(K, V||0x01||provided_data). V = HMAC(K,V) */ return do_hmac(hmac, 0x01, in1, in1len, in2, in2len, in3, in3len); } /* * SP800-90Ar1 10.1.2.3 HMAC_DRBG_Instantiate_Process: * * This sets the drbg Key (K) to all zeros, and Value (V) to all 1's. * and then calls (K,V) = drbg_hmac_update() with input parameters: * ent = entropy data (Can be NULL) of length ent_len. * nonce = nonce data (Can be NULL) of length nonce_len. * pstr = personalization data (Can be NULL) of length pstr_len. * * Returns zero if an error occurs otherwise it returns 1. */ int ossl_drbg_hmac_init(PROV_DRBG_HMAC *hmac, const unsigned char *ent, size_t ent_len, const unsigned char *nonce, size_t nonce_len, const unsigned char *pstr, size_t pstr_len) { if (hmac->ctx == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_MAC); return 0; } /* (Step 2) Key = 0x00 00...00 */ memset(hmac->K, 0x00, hmac->blocklen); /* (Step 3) V = 0x01 01...01 */ memset(hmac->V, 0x01, hmac->blocklen); /* (Step 4) (K,V) = HMAC_DRBG_Update(entropy||nonce||pers string, K, V) */ return drbg_hmac_update(hmac, ent, ent_len, nonce, nonce_len, pstr, pstr_len); } static int drbg_hmac_instantiate(PROV_DRBG *drbg, const unsigned char *ent, size_t ent_len, const unsigned char *nonce, size_t nonce_len, const unsigned char *pstr, size_t pstr_len) { return ossl_drbg_hmac_init((PROV_DRBG_HMAC *)drbg->data, ent, ent_len, nonce, nonce_len, pstr, pstr_len); } static int drbg_hmac_instantiate_wrapper(void *vdrbg, unsigned int strength, int prediction_resistance, const unsigned char *pstr, size_t pstr_len, const OSSL_PARAM params[]) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; int ret = 0; if (drbg->lock != NULL && !CRYPTO_THREAD_write_lock(drbg->lock)) return 0; if (!ossl_prov_is_running() || !drbg_hmac_set_ctx_params_locked(drbg, params)) goto err; ret = ossl_prov_drbg_instantiate(drbg, strength, prediction_resistance, pstr, pstr_len); err: if (drbg->lock != NULL) CRYPTO_THREAD_unlock(drbg->lock); return ret; } /* * SP800-90Ar1 10.1.2.4 HMAC_DRBG_Reseed_Process: * * Reseeds the drbg's Key (K) and Value (V) by calling * (K,V) = drbg_hmac_update() with the following input parameters: * ent = entropy input data (Can be NULL) of length ent_len. * adin = additional input data (Can be NULL) of length adin_len. * * Returns zero if an error occurs otherwise it returns 1. */ static int drbg_hmac_reseed(PROV_DRBG *drbg, const unsigned char *ent, size_t ent_len, const unsigned char *adin, size_t adin_len) { PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; /* (Step 2) (K,V) = HMAC_DRBG_Update(entropy||additional_input, K, V) */ return drbg_hmac_update(hmac, ent, ent_len, adin, adin_len, NULL, 0); } static int drbg_hmac_reseed_wrapper(void *vdrbg, int prediction_resistance, const unsigned char *ent, size_t ent_len, const unsigned char *adin, size_t adin_len) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; return ossl_prov_drbg_reseed(drbg, prediction_resistance, ent, ent_len, adin, adin_len); } /* * SP800-90Ar1 10.1.2.5 HMAC_DRBG_Generate_Process: * * Generates pseudo random bytes and updates the internal K,V for the drbg. * out is a buffer to fill with outlen bytes of pseudo random data. * adin is an additional_input string of size adin_len that may be NULL. * * Returns zero if an error occurs otherwise it returns 1. */ int ossl_drbg_hmac_generate(PROV_DRBG_HMAC *hmac, unsigned char *out, size_t outlen, const unsigned char *adin, size_t adin_len) { EVP_MAC_CTX *ctx = hmac->ctx; const unsigned char *temp = hmac->V; /* (Step 2) if adin != NULL then (K,V) = HMAC_DRBG_Update(adin, K, V) */ if (adin != NULL && adin_len > 0 && !drbg_hmac_update(hmac, adin, adin_len, NULL, 0, NULL, 0)) return 0; /* * (Steps 3-5) temp = NULL * while (len(temp) < outlen) { * V = HMAC(K, V) * temp = temp || V * } */ for (;;) { if (!EVP_MAC_init(ctx, hmac->K, hmac->blocklen, NULL) || !EVP_MAC_update(ctx, temp, hmac->blocklen)) return 0; if (outlen > hmac->blocklen) { if (!EVP_MAC_final(ctx, out, NULL, outlen)) return 0; temp = out; } else { if (!EVP_MAC_final(ctx, hmac->V, NULL, sizeof(hmac->V))) return 0; memcpy(out, hmac->V, outlen); break; } out += hmac->blocklen; outlen -= hmac->blocklen; } /* (Step 6) (K,V) = HMAC_DRBG_Update(adin, K, V) */ if (!drbg_hmac_update(hmac, adin, adin_len, NULL, 0, NULL, 0)) return 0; return 1; } static int drbg_hmac_generate(PROV_DRBG *drbg, unsigned char *out, size_t outlen, const unsigned char *adin, size_t adin_len) { return ossl_drbg_hmac_generate((PROV_DRBG_HMAC *)drbg->data, out, outlen, adin, adin_len); } static int drbg_hmac_generate_wrapper(void *vdrbg, unsigned char *out, size_t outlen, unsigned int strength, int prediction_resistance, const unsigned char *adin, size_t adin_len) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; return ossl_prov_drbg_generate(drbg, out, outlen, strength, prediction_resistance, adin, adin_len); } static int drbg_hmac_uninstantiate(PROV_DRBG *drbg) { PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; OPENSSL_cleanse(hmac->K, sizeof(hmac->K)); OPENSSL_cleanse(hmac->V, sizeof(hmac->V)); return ossl_prov_drbg_uninstantiate(drbg); } static int drbg_hmac_uninstantiate_wrapper(void *vdrbg) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; int ret; if (drbg->lock != NULL && !CRYPTO_THREAD_write_lock(drbg->lock)) return 0; ret = drbg_hmac_uninstantiate(drbg); if (drbg->lock != NULL) CRYPTO_THREAD_unlock(drbg->lock); return ret; } static int drbg_hmac_verify_zeroization(void *vdrbg) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; int ret = 0; if (drbg->lock != NULL && !CRYPTO_THREAD_read_lock(drbg->lock)) return 0; PROV_DRBG_VERIFY_ZEROIZATION(hmac->K); PROV_DRBG_VERIFY_ZEROIZATION(hmac->V); ret = 1; err: if (drbg->lock != NULL) CRYPTO_THREAD_unlock(drbg->lock); return ret; } static int drbg_hmac_new(PROV_DRBG *drbg) { PROV_DRBG_HMAC *hmac; hmac = OPENSSL_secure_zalloc(sizeof(*hmac)); if (hmac == NULL) return 0; drbg->data = hmac; /* See SP800-57 Part1 Rev4 5.6.1 Table 3 */ drbg->max_entropylen = DRBG_MAX_LENGTH; drbg->max_noncelen = DRBG_MAX_LENGTH; drbg->max_perslen = DRBG_MAX_LENGTH; drbg->max_adinlen = DRBG_MAX_LENGTH; /* Maximum number of bits per request = 2^19 = 2^16 bytes */ drbg->max_request = 1 << 16; return 1; } static void *drbg_hmac_new_wrapper(void *provctx, void *parent, const OSSL_DISPATCH *parent_dispatch) { return ossl_rand_drbg_new(provctx, parent, parent_dispatch, &drbg_hmac_new, &drbg_hmac_instantiate, &drbg_hmac_uninstantiate, &drbg_hmac_reseed, &drbg_hmac_generate); } static void drbg_hmac_free(void *vdrbg) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; PROV_DRBG_HMAC *hmac; if (drbg != NULL && (hmac = (PROV_DRBG_HMAC *)drbg->data) != NULL) { EVP_MAC_CTX_free(hmac->ctx); ossl_prov_digest_reset(&hmac->digest); OPENSSL_secure_clear_free(hmac, sizeof(*hmac)); } ossl_rand_drbg_free(drbg); } static int drbg_hmac_get_ctx_params(void *vdrbg, OSSL_PARAM params[]) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; const char *name; const EVP_MD *md; OSSL_PARAM *p; int ret = 0, complete = 0; if (!ossl_drbg_get_ctx_params_no_lock(drbg, params, &complete)) return 0; if (complete) return 1; if (drbg->lock != NULL && !CRYPTO_THREAD_read_lock(drbg->lock)) return 0; p = OSSL_PARAM_locate(params, OSSL_DRBG_PARAM_MAC); if (p != NULL) { if (hmac->ctx == NULL) goto err; name = EVP_MAC_get0_name(EVP_MAC_CTX_get0_mac(hmac->ctx)); if (!OSSL_PARAM_set_utf8_string(p, name)) goto err; } p = OSSL_PARAM_locate(params, OSSL_DRBG_PARAM_DIGEST); if (p != NULL) { md = ossl_prov_digest_md(&hmac->digest); if (md == NULL || !OSSL_PARAM_set_utf8_string(p, EVP_MD_get0_name(md))) goto err; } ret = ossl_drbg_get_ctx_params(drbg, params); err: if (drbg->lock != NULL) CRYPTO_THREAD_unlock(drbg->lock); return ret; } static const OSSL_PARAM *drbg_hmac_gettable_ctx_params(ossl_unused void *vctx, ossl_unused void *p_ctx) { static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_DRBG_PARAM_MAC, NULL, 0), OSSL_PARAM_utf8_string(OSSL_DRBG_PARAM_DIGEST, NULL, 0), OSSL_PARAM_DRBG_GETTABLE_CTX_COMMON, OSSL_PARAM_END }; return known_gettable_ctx_params; } static int drbg_hmac_set_ctx_params_locked(void *vctx, const OSSL_PARAM params[]) { PROV_DRBG *ctx = (PROV_DRBG *)vctx; PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)ctx->data; OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(ctx->provctx); const EVP_MD *md; if (!ossl_prov_digest_load_from_params(&hmac->digest, params, libctx)) return 0; md = ossl_prov_digest_md(&hmac->digest); if (md != NULL && !ossl_drbg_verify_digest(libctx, md)) return 0; /* Error already raised for us */ if (!ossl_prov_macctx_load_from_params(&hmac->ctx, params, NULL, NULL, NULL, libctx)) return 0; if (md != NULL && hmac->ctx != NULL) { /* These are taken from SP 800-90 10.1 Table 2 */ hmac->blocklen = EVP_MD_get_size(md); /* See SP800-57 Part1 Rev4 5.6.1 Table 3 */ ctx->strength = 64 * (int)(hmac->blocklen >> 3); if (ctx->strength > 256) ctx->strength = 256; ctx->seedlen = hmac->blocklen; ctx->min_entropylen = ctx->strength / 8; ctx->min_noncelen = ctx->min_entropylen / 2; } return ossl_drbg_set_ctx_params(ctx, params); } static int drbg_hmac_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { PROV_DRBG *drbg = (PROV_DRBG *)vctx; int ret; if (drbg->lock != NULL && !CRYPTO_THREAD_write_lock(drbg->lock)) return 0; ret = drbg_hmac_set_ctx_params_locked(vctx, params); if (drbg->lock != NULL) CRYPTO_THREAD_unlock(drbg->lock); return ret; } static const OSSL_PARAM *drbg_hmac_settable_ctx_params(ossl_unused void *vctx, ossl_unused void *p_ctx) { static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_DRBG_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_utf8_string(OSSL_DRBG_PARAM_DIGEST, NULL, 0), OSSL_PARAM_utf8_string(OSSL_DRBG_PARAM_MAC, NULL, 0), OSSL_PARAM_DRBG_SETTABLE_CTX_COMMON, OSSL_PARAM_END }; return known_settable_ctx_params; } const OSSL_DISPATCH ossl_drbg_ossl_hmac_functions[] = { { OSSL_FUNC_RAND_NEWCTX, (void(*)(void))drbg_hmac_new_wrapper }, { OSSL_FUNC_RAND_FREECTX, (void(*)(void))drbg_hmac_free }, { OSSL_FUNC_RAND_INSTANTIATE, (void(*)(void))drbg_hmac_instantiate_wrapper }, { OSSL_FUNC_RAND_UNINSTANTIATE, (void(*)(void))drbg_hmac_uninstantiate_wrapper }, { OSSL_FUNC_RAND_GENERATE, (void(*)(void))drbg_hmac_generate_wrapper }, { OSSL_FUNC_RAND_RESEED, (void(*)(void))drbg_hmac_reseed_wrapper }, { OSSL_FUNC_RAND_ENABLE_LOCKING, (void(*)(void))ossl_drbg_enable_locking }, { OSSL_FUNC_RAND_LOCK, (void(*)(void))ossl_drbg_lock }, { OSSL_FUNC_RAND_UNLOCK, (void(*)(void))ossl_drbg_unlock }, { OSSL_FUNC_RAND_SETTABLE_CTX_PARAMS, (void(*)(void))drbg_hmac_settable_ctx_params }, { OSSL_FUNC_RAND_SET_CTX_PARAMS, (void(*)(void))drbg_hmac_set_ctx_params }, { OSSL_FUNC_RAND_GETTABLE_CTX_PARAMS, (void(*)(void))drbg_hmac_gettable_ctx_params }, { OSSL_FUNC_RAND_GET_CTX_PARAMS, (void(*)(void))drbg_hmac_get_ctx_params }, { OSSL_FUNC_RAND_VERIFY_ZEROIZATION, (void(*)(void))drbg_hmac_verify_zeroization }, { OSSL_FUNC_RAND_GET_SEED, (void(*)(void))ossl_drbg_get_seed }, { OSSL_FUNC_RAND_CLEAR_SEED, (void(*)(void))ossl_drbg_clear_seed }, OSSL_DISPATCH_END };
./openssl/providers/implementations/rands/drbg_hash.c
/* * Copyright 2011-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <assert.h> #include <stdlib.h> #include <string.h> #include <openssl/sha.h> #include <openssl/crypto.h> #include <openssl/err.h> #include <openssl/rand.h> #include <openssl/core_dispatch.h> #include <openssl/proverr.h> #include "internal/thread_once.h" #include "prov/providercommon.h" #include "prov/provider_ctx.h" #include "prov/provider_util.h" #include "prov/implementations.h" #include "drbg_local.h" static OSSL_FUNC_rand_newctx_fn drbg_hash_new_wrapper; static OSSL_FUNC_rand_freectx_fn drbg_hash_free; static OSSL_FUNC_rand_instantiate_fn drbg_hash_instantiate_wrapper; static OSSL_FUNC_rand_uninstantiate_fn drbg_hash_uninstantiate_wrapper; static OSSL_FUNC_rand_generate_fn drbg_hash_generate_wrapper; static OSSL_FUNC_rand_reseed_fn drbg_hash_reseed_wrapper; static OSSL_FUNC_rand_settable_ctx_params_fn drbg_hash_settable_ctx_params; static OSSL_FUNC_rand_set_ctx_params_fn drbg_hash_set_ctx_params; static OSSL_FUNC_rand_gettable_ctx_params_fn drbg_hash_gettable_ctx_params; static OSSL_FUNC_rand_get_ctx_params_fn drbg_hash_get_ctx_params; static OSSL_FUNC_rand_verify_zeroization_fn drbg_hash_verify_zeroization; static int drbg_hash_set_ctx_params_locked(void *vctx, const OSSL_PARAM params[]); /* 888 bits from SP800-90Ar1 10.1 table 2 */ #define HASH_PRNG_MAX_SEEDLEN (888/8) /* 440 bits from SP800-90Ar1 10.1 table 2 */ #define HASH_PRNG_SMALL_SEEDLEN (440/8) /* Determine what seedlen to use based on the block length */ #define MAX_BLOCKLEN_USING_SMALL_SEEDLEN (256/8) #define INBYTE_IGNORE ((unsigned char)0xFF) typedef struct rand_drbg_hash_st { PROV_DIGEST digest; EVP_MD_CTX *ctx; size_t blocklen; unsigned char V[HASH_PRNG_MAX_SEEDLEN]; unsigned char C[HASH_PRNG_MAX_SEEDLEN]; /* Temporary value storage: should always exceed max digest length */ unsigned char vtmp[HASH_PRNG_MAX_SEEDLEN]; } PROV_DRBG_HASH; /* * SP800-90Ar1 10.3.1 Derivation function using a Hash Function (Hash_df). * The input string used is composed of: * inbyte - An optional leading byte (ignore if equal to INBYTE_IGNORE) * in - input string 1 (A Non NULL value). * in2 - optional input string (Can be NULL). * in3 - optional input string (Can be NULL). * These are concatenated as part of the DigestUpdate process. */ static int hash_df(PROV_DRBG *drbg, unsigned char *out, const unsigned char inbyte, const unsigned char *in, size_t inlen, const unsigned char *in2, size_t in2len, const unsigned char *in3, size_t in3len) { PROV_DRBG_HASH *hash = (PROV_DRBG_HASH *)drbg->data; EVP_MD_CTX *ctx = hash->ctx; unsigned char *vtmp = hash->vtmp; /* tmp = counter || num_bits_returned || [inbyte] */ unsigned char tmp[1 + 4 + 1]; int tmp_sz = 0; size_t outlen = drbg->seedlen; size_t num_bits_returned = outlen * 8; /* * No need to check outlen size here, as the standard only ever needs * seedlen bytes which is always less than the maximum permitted. */ /* (Step 3) counter = 1 (tmp[0] is the 8 bit counter) */ tmp[tmp_sz++] = 1; /* tmp[1..4] is the fixed 32 bit no_of_bits_to_return */ tmp[tmp_sz++] = (unsigned char)((num_bits_returned >> 24) & 0xff); tmp[tmp_sz++] = (unsigned char)((num_bits_returned >> 16) & 0xff); tmp[tmp_sz++] = (unsigned char)((num_bits_returned >> 8) & 0xff); tmp[tmp_sz++] = (unsigned char)(num_bits_returned & 0xff); /* Tack the additional input byte onto the end of tmp if it exists */ if (inbyte != INBYTE_IGNORE) tmp[tmp_sz++] = inbyte; /* (Step 4) */ for (;;) { /* * (Step 4.1) out = out || Hash(tmp || in || [in2] || [in3]) * (where tmp = counter || num_bits_returned || [inbyte]) */ if (!(EVP_DigestInit_ex(ctx, ossl_prov_digest_md(&hash->digest), NULL) && EVP_DigestUpdate(ctx, tmp, tmp_sz) && EVP_DigestUpdate(ctx, in, inlen) && (in2 == NULL || EVP_DigestUpdate(ctx, in2, in2len)) && (in3 == NULL || EVP_DigestUpdate(ctx, in3, in3len)))) return 0; if (outlen < hash->blocklen) { if (!EVP_DigestFinal(ctx, vtmp, NULL)) return 0; memcpy(out, vtmp, outlen); OPENSSL_cleanse(vtmp, hash->blocklen); break; } else if (!EVP_DigestFinal(ctx, out, NULL)) { return 0; } outlen -= hash->blocklen; if (outlen == 0) break; /* (Step 4.2) counter++ */ tmp[0]++; out += hash->blocklen; } return 1; } /* Helper function that just passes 2 input parameters to hash_df() */ static int hash_df1(PROV_DRBG *drbg, unsigned char *out, const unsigned char in_byte, const unsigned char *in1, size_t in1len) { return hash_df(drbg, out, in_byte, in1, in1len, NULL, 0, NULL, 0); } /* * Add 2 byte buffers together. The first elements in each buffer are the top * most bytes. The result is stored in the dst buffer. * The final carry is ignored i.e: dst = (dst + in) mod (2^seedlen_bits). * where dst size is drbg->seedlen, and inlen <= drbg->seedlen. */ static int add_bytes(PROV_DRBG *drbg, unsigned char *dst, unsigned char *in, size_t inlen) { size_t i; int result; const unsigned char *add; unsigned char carry = 0, *d; assert(drbg->seedlen >= 1 && inlen >= 1 && inlen <= drbg->seedlen); d = &dst[drbg->seedlen - 1]; add = &in[inlen - 1]; for (i = inlen; i > 0; i--, d--, add--) { result = *d + *add + carry; carry = (unsigned char)(result >> 8); *d = (unsigned char)(result & 0xff); } if (carry != 0) { /* Add the carry to the top of the dst if inlen is not the same size */ for (i = drbg->seedlen - inlen; i > 0; --i, d--) { *d += 1; /* Carry can only be 1 */ if (*d != 0) /* exit if carry doesn't propagate to the next byte */ break; } } return 1; } /* V = (V + Hash(inbyte || V || [additional_input]) mod (2^seedlen) */ static int add_hash_to_v(PROV_DRBG *drbg, unsigned char inbyte, const unsigned char *adin, size_t adinlen) { PROV_DRBG_HASH *hash = (PROV_DRBG_HASH *)drbg->data; EVP_MD_CTX *ctx = hash->ctx; return EVP_DigestInit_ex(ctx, ossl_prov_digest_md(&hash->digest), NULL) && EVP_DigestUpdate(ctx, &inbyte, 1) && EVP_DigestUpdate(ctx, hash->V, drbg->seedlen) && (adin == NULL || EVP_DigestUpdate(ctx, adin, adinlen)) && EVP_DigestFinal(ctx, hash->vtmp, NULL) && add_bytes(drbg, hash->V, hash->vtmp, hash->blocklen); } /* * The Hashgen() as listed in SP800-90Ar1 10.1.1.4 Hash_DRBG_Generate_Process. * * drbg contains the current value of V. * outlen is the requested number of bytes. * out is a buffer to return the generated bits. * * The algorithm to generate the bits is: * data = V * w = NULL * for (i = 1 to m) { * W = W || Hash(data) * data = (data + 1) mod (2^seedlen) * } * out = Leftmost(W, outlen) * * Returns zero if an error occurs otherwise it returns 1. */ static int hash_gen(PROV_DRBG *drbg, unsigned char *out, size_t outlen) { PROV_DRBG_HASH *hash = (PROV_DRBG_HASH *)drbg->data; unsigned char one = 1; if (outlen == 0) return 1; memcpy(hash->vtmp, hash->V, drbg->seedlen); for (;;) { if (!EVP_DigestInit_ex(hash->ctx, ossl_prov_digest_md(&hash->digest), NULL) || !EVP_DigestUpdate(hash->ctx, hash->vtmp, drbg->seedlen)) return 0; if (outlen < hash->blocklen) { if (!EVP_DigestFinal(hash->ctx, hash->vtmp, NULL)) return 0; memcpy(out, hash->vtmp, outlen); return 1; } else { if (!EVP_DigestFinal(hash->ctx, out, NULL)) return 0; outlen -= hash->blocklen; if (outlen == 0) break; out += hash->blocklen; } add_bytes(drbg, hash->vtmp, &one, 1); } return 1; } /* * SP800-90Ar1 10.1.1.2 Hash_DRBG_Instantiate_Process: * * ent is entropy input obtained from a randomness source of length ent_len. * nonce is a string of bytes of length nonce_len. * pstr is a personalization string received from an application. May be NULL. * * Returns zero if an error occurs otherwise it returns 1. */ static int drbg_hash_instantiate(PROV_DRBG *drbg, const unsigned char *ent, size_t ent_len, const unsigned char *nonce, size_t nonce_len, const unsigned char *pstr, size_t pstr_len) { PROV_DRBG_HASH *hash = (PROV_DRBG_HASH *)drbg->data; EVP_MD_CTX_free(hash->ctx); hash->ctx = EVP_MD_CTX_new(); /* (Step 1-3) V = Hash_df(entropy||nonce||pers, seedlen) */ return hash->ctx != NULL && hash_df(drbg, hash->V, INBYTE_IGNORE, ent, ent_len, nonce, nonce_len, pstr, pstr_len) /* (Step 4) C = Hash_df(0x00||V, seedlen) */ && hash_df1(drbg, hash->C, 0x00, hash->V, drbg->seedlen); } static int drbg_hash_instantiate_wrapper(void *vdrbg, unsigned int strength, int prediction_resistance, const unsigned char *pstr, size_t pstr_len, const OSSL_PARAM params[]) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; int ret = 0; if (drbg->lock != NULL && !CRYPTO_THREAD_write_lock(drbg->lock)) return 0; if (!ossl_prov_is_running() || !drbg_hash_set_ctx_params_locked(drbg, params)) goto err; ret = ossl_prov_drbg_instantiate(drbg, strength, prediction_resistance, pstr, pstr_len); err: if (drbg->lock != NULL) CRYPTO_THREAD_unlock(drbg->lock); return ret; } /* * SP800-90Ar1 10.1.1.3 Hash_DRBG_Reseed_Process: * * ent is entropy input bytes obtained from a randomness source. * addin is additional input received from an application. May be NULL. * * Returns zero if an error occurs otherwise it returns 1. */ static int drbg_hash_reseed(PROV_DRBG *drbg, const unsigned char *ent, size_t ent_len, const unsigned char *adin, size_t adin_len) { PROV_DRBG_HASH *hash = (PROV_DRBG_HASH *)drbg->data; /* (Step 1-2) V = Hash_df(0x01 || V || entropy_input || additional_input) */ /* V about to be updated so use C as output instead */ if (!hash_df(drbg, hash->C, 0x01, hash->V, drbg->seedlen, ent, ent_len, adin, adin_len)) return 0; memcpy(hash->V, hash->C, drbg->seedlen); /* (Step 4) C = Hash_df(0x00||V, seedlen) */ return hash_df1(drbg, hash->C, 0x00, hash->V, drbg->seedlen); } static int drbg_hash_reseed_wrapper(void *vdrbg, int prediction_resistance, const unsigned char *ent, size_t ent_len, const unsigned char *adin, size_t adin_len) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; return ossl_prov_drbg_reseed(drbg, prediction_resistance, ent, ent_len, adin, adin_len); } /* * SP800-90Ar1 10.1.1.4 Hash_DRBG_Generate_Process: * * Generates pseudo random bytes using the drbg. * out is a buffer to fill with outlen bytes of pseudo random data. * addin is additional input received from an application. May be NULL. * * Returns zero if an error occurs otherwise it returns 1. */ static int drbg_hash_generate(PROV_DRBG *drbg, unsigned char *out, size_t outlen, const unsigned char *adin, size_t adin_len) { PROV_DRBG_HASH *hash = (PROV_DRBG_HASH *)drbg->data; unsigned char counter[4]; int reseed_counter = drbg->generate_counter; counter[0] = (unsigned char)((reseed_counter >> 24) & 0xff); counter[1] = (unsigned char)((reseed_counter >> 16) & 0xff); counter[2] = (unsigned char)((reseed_counter >> 8) & 0xff); counter[3] = (unsigned char)(reseed_counter & 0xff); return hash->ctx != NULL && (adin == NULL /* (Step 2) if adin != NULL then V = V + Hash(0x02||V||adin) */ || adin_len == 0 || add_hash_to_v(drbg, 0x02, adin, adin_len)) /* (Step 3) Hashgen(outlen, V) */ && hash_gen(drbg, out, outlen) /* (Step 4/5) H = V = (V + Hash(0x03||V) mod (2^seedlen_bits) */ && add_hash_to_v(drbg, 0x03, NULL, 0) /* (Step 5) V = (V + H + C + reseed_counter) mod (2^seedlen_bits) */ /* V = (V + C) mod (2^seedlen_bits) */ && add_bytes(drbg, hash->V, hash->C, drbg->seedlen) /* V = (V + reseed_counter) mod (2^seedlen_bits) */ && add_bytes(drbg, hash->V, counter, 4); } static int drbg_hash_generate_wrapper (void *vdrbg, unsigned char *out, size_t outlen, unsigned int strength, int prediction_resistance, const unsigned char *adin, size_t adin_len) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; return ossl_prov_drbg_generate(drbg, out, outlen, strength, prediction_resistance, adin, adin_len); } static int drbg_hash_uninstantiate(PROV_DRBG *drbg) { PROV_DRBG_HASH *hash = (PROV_DRBG_HASH *)drbg->data; OPENSSL_cleanse(hash->V, sizeof(hash->V)); OPENSSL_cleanse(hash->C, sizeof(hash->C)); OPENSSL_cleanse(hash->vtmp, sizeof(hash->vtmp)); return ossl_prov_drbg_uninstantiate(drbg); } static int drbg_hash_uninstantiate_wrapper(void *vdrbg) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; int ret; if (drbg->lock != NULL && !CRYPTO_THREAD_write_lock(drbg->lock)) return 0; ret = drbg_hash_uninstantiate(drbg); if (drbg->lock != NULL) CRYPTO_THREAD_unlock(drbg->lock); return ret; } static int drbg_hash_verify_zeroization(void *vdrbg) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; PROV_DRBG_HASH *hash = (PROV_DRBG_HASH *)drbg->data; int ret = 0; if (drbg->lock != NULL && !CRYPTO_THREAD_read_lock(drbg->lock)) return 0; PROV_DRBG_VERIFY_ZEROIZATION(hash->V); PROV_DRBG_VERIFY_ZEROIZATION(hash->C); PROV_DRBG_VERIFY_ZEROIZATION(hash->vtmp); ret = 1; err: if (drbg->lock != NULL) CRYPTO_THREAD_unlock(drbg->lock); return ret; } static int drbg_hash_new(PROV_DRBG *ctx) { PROV_DRBG_HASH *hash; hash = OPENSSL_secure_zalloc(sizeof(*hash)); if (hash == NULL) return 0; ctx->data = hash; ctx->seedlen = HASH_PRNG_MAX_SEEDLEN; ctx->max_entropylen = DRBG_MAX_LENGTH; ctx->max_noncelen = DRBG_MAX_LENGTH; ctx->max_perslen = DRBG_MAX_LENGTH; ctx->max_adinlen = DRBG_MAX_LENGTH; /* Maximum number of bits per request = 2^19 = 2^16 bytes */ ctx->max_request = 1 << 16; return 1; } static void *drbg_hash_new_wrapper(void *provctx, void *parent, const OSSL_DISPATCH *parent_dispatch) { return ossl_rand_drbg_new(provctx, parent, parent_dispatch, &drbg_hash_new, &drbg_hash_instantiate, &drbg_hash_uninstantiate, &drbg_hash_reseed, &drbg_hash_generate); } static void drbg_hash_free(void *vdrbg) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; PROV_DRBG_HASH *hash; if (drbg != NULL && (hash = (PROV_DRBG_HASH *)drbg->data) != NULL) { EVP_MD_CTX_free(hash->ctx); ossl_prov_digest_reset(&hash->digest); OPENSSL_secure_clear_free(hash, sizeof(*hash)); } ossl_rand_drbg_free(drbg); } static int drbg_hash_get_ctx_params(void *vdrbg, OSSL_PARAM params[]) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; PROV_DRBG_HASH *hash = (PROV_DRBG_HASH *)drbg->data; const EVP_MD *md; OSSL_PARAM *p; int ret = 0, complete = 0; if (!ossl_drbg_get_ctx_params_no_lock(drbg, params, &complete)) return 0; if (complete) return 1; if (drbg->lock != NULL && !CRYPTO_THREAD_read_lock(drbg->lock)) return 0; p = OSSL_PARAM_locate(params, OSSL_DRBG_PARAM_DIGEST); if (p != NULL) { md = ossl_prov_digest_md(&hash->digest); if (md == NULL || !OSSL_PARAM_set_utf8_string(p, EVP_MD_get0_name(md))) goto err; } ret = ossl_drbg_get_ctx_params(drbg, params); err: if (drbg->lock != NULL) CRYPTO_THREAD_unlock(drbg->lock); return ret; } static const OSSL_PARAM *drbg_hash_gettable_ctx_params(ossl_unused void *vctx, ossl_unused void *p_ctx) { static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_DRBG_PARAM_DIGEST, NULL, 0), OSSL_PARAM_DRBG_GETTABLE_CTX_COMMON, OSSL_PARAM_END }; return known_gettable_ctx_params; } static int drbg_hash_set_ctx_params_locked(void *vctx, const OSSL_PARAM params[]) { PROV_DRBG *ctx = (PROV_DRBG *)vctx; PROV_DRBG_HASH *hash = (PROV_DRBG_HASH *)ctx->data; OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(ctx->provctx); const EVP_MD *md; if (!ossl_prov_digest_load_from_params(&hash->digest, params, libctx)) return 0; md = ossl_prov_digest_md(&hash->digest); if (md != NULL) { if (!ossl_drbg_verify_digest(libctx, md)) return 0; /* Error already raised for us */ /* These are taken from SP 800-90 10.1 Table 2 */ hash->blocklen = EVP_MD_get_size(md); /* See SP800-57 Part1 Rev4 5.6.1 Table 3 */ ctx->strength = 64 * (hash->blocklen >> 3); if (ctx->strength > 256) ctx->strength = 256; if (hash->blocklen > MAX_BLOCKLEN_USING_SMALL_SEEDLEN) ctx->seedlen = HASH_PRNG_MAX_SEEDLEN; else ctx->seedlen = HASH_PRNG_SMALL_SEEDLEN; ctx->min_entropylen = ctx->strength / 8; ctx->min_noncelen = ctx->min_entropylen / 2; } return ossl_drbg_set_ctx_params(ctx, params); } static int drbg_hash_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { PROV_DRBG *drbg = (PROV_DRBG *)vctx; int ret; if (drbg->lock != NULL && !CRYPTO_THREAD_write_lock(drbg->lock)) return 0; ret = drbg_hash_set_ctx_params_locked(vctx, params); if (drbg->lock != NULL) CRYPTO_THREAD_unlock(drbg->lock); return ret; } static const OSSL_PARAM *drbg_hash_settable_ctx_params(ossl_unused void *vctx, ossl_unused void *p_ctx) { static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_DRBG_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_utf8_string(OSSL_DRBG_PARAM_DIGEST, NULL, 0), OSSL_PARAM_DRBG_SETTABLE_CTX_COMMON, OSSL_PARAM_END }; return known_settable_ctx_params; } const OSSL_DISPATCH ossl_drbg_hash_functions[] = { { OSSL_FUNC_RAND_NEWCTX, (void(*)(void))drbg_hash_new_wrapper }, { OSSL_FUNC_RAND_FREECTX, (void(*)(void))drbg_hash_free }, { OSSL_FUNC_RAND_INSTANTIATE, (void(*)(void))drbg_hash_instantiate_wrapper }, { OSSL_FUNC_RAND_UNINSTANTIATE, (void(*)(void))drbg_hash_uninstantiate_wrapper }, { OSSL_FUNC_RAND_GENERATE, (void(*)(void))drbg_hash_generate_wrapper }, { OSSL_FUNC_RAND_RESEED, (void(*)(void))drbg_hash_reseed_wrapper }, { OSSL_FUNC_RAND_ENABLE_LOCKING, (void(*)(void))ossl_drbg_enable_locking }, { OSSL_FUNC_RAND_LOCK, (void(*)(void))ossl_drbg_lock }, { OSSL_FUNC_RAND_UNLOCK, (void(*)(void))ossl_drbg_unlock }, { OSSL_FUNC_RAND_SETTABLE_CTX_PARAMS, (void(*)(void))drbg_hash_settable_ctx_params }, { OSSL_FUNC_RAND_SET_CTX_PARAMS, (void(*)(void))drbg_hash_set_ctx_params }, { OSSL_FUNC_RAND_GETTABLE_CTX_PARAMS, (void(*)(void))drbg_hash_gettable_ctx_params }, { OSSL_FUNC_RAND_GET_CTX_PARAMS, (void(*)(void))drbg_hash_get_ctx_params }, { OSSL_FUNC_RAND_VERIFY_ZEROIZATION, (void(*)(void))drbg_hash_verify_zeroization }, { OSSL_FUNC_RAND_GET_SEED, (void(*)(void))ossl_drbg_get_seed }, { OSSL_FUNC_RAND_CLEAR_SEED, (void(*)(void))ossl_drbg_clear_seed }, OSSL_DISPATCH_END };
./openssl/providers/implementations/rands/drbg.c
/* * Copyright 2011-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <string.h> #include <openssl/crypto.h> #include <openssl/err.h> #include <openssl/rand.h> #include <openssl/evp.h> #include "crypto/rand.h" #include <openssl/proverr.h> #include "drbg_local.h" #include "internal/thread_once.h" #include "crypto/cryptlib.h" #include "prov/seeding.h" #include "crypto/rand_pool.h" #include "prov/provider_ctx.h" #include "prov/providercommon.h" #include "prov/fipscommon.h" #include "crypto/context.h" /* * Support framework for NIST SP 800-90A DRBG * * See manual page PROV_DRBG(7) for a general overview. * * The OpenSSL model is to have new and free functions, and that new * does all initialization. That is not the NIST model, which has * instantiation and un-instantiate, and re-use within a new/free * lifecycle. (No doubt this comes from the desire to support hardware * DRBG, where allocation of resources on something like an HSM is * a much bigger deal than just re-setting an allocated resource.) */ /* NIST SP 800-90A DRBG recommends the use of a personalization string. */ static const char ossl_pers_string[] = DRBG_DEFAULT_PERS_STRING; static const OSSL_DISPATCH *find_call(const OSSL_DISPATCH *dispatch, int function); static int rand_drbg_restart(PROV_DRBG *drbg); /* * We interpret a call to this function as a hint only and ignore it. This * occurs when the EVP layer thinks we should do some locking. In practice * however we manage for ourselves when we take a lock or not on the basis * of whether drbg->lock is present or not. */ int ossl_drbg_lock(void *vctx) { return 1; } /* Interpreted as a hint only and ignored as for ossl_drbg_lock() */ void ossl_drbg_unlock(void *vctx) { } static int ossl_drbg_lock_parent(PROV_DRBG *drbg) { void *parent = drbg->parent; if (parent != NULL && drbg->parent_lock != NULL && !drbg->parent_lock(parent)) { ERR_raise(ERR_LIB_PROV, PROV_R_PARENT_LOCKING_NOT_ENABLED); return 0; } return 1; } static void ossl_drbg_unlock_parent(PROV_DRBG *drbg) { void *parent = drbg->parent; if (parent != NULL && drbg->parent_unlock != NULL) drbg->parent_unlock(parent); } static int get_parent_strength(PROV_DRBG *drbg, unsigned int *str) { OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; void *parent = drbg->parent; int res; if (drbg->parent_get_ctx_params == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_UNABLE_TO_GET_PARENT_STRENGTH); return 0; } *params = OSSL_PARAM_construct_uint(OSSL_RAND_PARAM_STRENGTH, str); if (!ossl_drbg_lock_parent(drbg)) { ERR_raise(ERR_LIB_PROV, PROV_R_UNABLE_TO_LOCK_PARENT); return 0; } res = drbg->parent_get_ctx_params(parent, params); ossl_drbg_unlock_parent(drbg); if (!res) { ERR_raise(ERR_LIB_PROV, PROV_R_UNABLE_TO_GET_PARENT_STRENGTH); return 0; } return 1; } static unsigned int get_parent_reseed_count(PROV_DRBG *drbg) { OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; void *parent = drbg->parent; unsigned int r = 0; *params = OSSL_PARAM_construct_uint(OSSL_DRBG_PARAM_RESEED_COUNTER, &r); if (!ossl_drbg_lock_parent(drbg)) { ERR_raise(ERR_LIB_PROV, PROV_R_UNABLE_TO_LOCK_PARENT); goto err; } if (!drbg->parent_get_ctx_params(parent, params)) r = 0; ossl_drbg_unlock_parent(drbg); return r; err: r = tsan_load(&drbg->reseed_counter) - 2; if (r == 0) r = UINT_MAX; return r; } /* * Implements the get_entropy() callback * * If the DRBG has a parent, then the required amount of entropy input * is fetched using the parent's ossl_prov_drbg_generate(). * * Otherwise, the entropy is polled from the system entropy sources * using ossl_pool_acquire_entropy(). * * If a random pool has been added to the DRBG using RAND_add(), then * its entropy will be used up first. */ size_t ossl_drbg_get_seed(void *vdrbg, unsigned char **pout, int entropy, size_t min_len, size_t max_len, int prediction_resistance, const unsigned char *adin, size_t adin_len) { PROV_DRBG *drbg = (PROV_DRBG *)vdrbg; size_t bytes_needed; unsigned char *buffer; /* Figure out how many bytes we need */ bytes_needed = entropy >= 0 ? (entropy + 7) / 8 : 0; if (bytes_needed < min_len) bytes_needed = min_len; if (bytes_needed > max_len) bytes_needed = max_len; /* Allocate storage */ buffer = OPENSSL_secure_malloc(bytes_needed); if (buffer == NULL) return 0; /* * Get random data. Include our DRBG address as * additional input, in order to provide a distinction between * different DRBG child instances. * * Note: using the sizeof() operator on a pointer triggers * a warning in some static code analyzers, but it's * intentional and correct here. */ if (!ossl_prov_drbg_generate(drbg, buffer, bytes_needed, drbg->strength, prediction_resistance, (unsigned char *)&drbg, sizeof(drbg))) { OPENSSL_secure_clear_free(buffer, bytes_needed); ERR_raise(ERR_LIB_PROV, PROV_R_GENERATE_ERROR); return 0; } *pout = buffer; return bytes_needed; } /* Implements the cleanup_entropy() callback */ void ossl_drbg_clear_seed(ossl_unused void *vdrbg, unsigned char *out, size_t outlen) { OPENSSL_secure_clear_free(out, outlen); } static size_t get_entropy(PROV_DRBG *drbg, unsigned char **pout, int entropy, size_t min_len, size_t max_len, int prediction_resistance) { size_t bytes; unsigned int p_str; if (drbg->parent == NULL) #ifdef FIPS_MODULE return ossl_crngt_get_entropy(drbg, pout, entropy, min_len, max_len, prediction_resistance); #else return ossl_prov_get_entropy(drbg->provctx, pout, entropy, min_len, max_len); #endif if (drbg->parent_get_seed == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_PARENT_CANNOT_SUPPLY_ENTROPY_SEED); return 0; } if (!get_parent_strength(drbg, &p_str)) return 0; if (drbg->strength > p_str) { /* * We currently don't support the algorithm from NIST SP 800-90C * 10.1.2 to use a weaker DRBG as source */ ERR_raise(ERR_LIB_PROV, PROV_R_PARENT_STRENGTH_TOO_WEAK); return 0; } /* * Our lock is already held, but we need to lock our parent before * generating bits from it. Note: taking the lock will be a no-op * if locking is not required (while drbg->parent->lock == NULL). */ if (!ossl_drbg_lock_parent(drbg)) return 0; /* * Get random data from parent. Include our DRBG address as * additional input, in order to provide a distinction between * different DRBG child instances. * * Note: using the sizeof() operator on a pointer triggers * a warning in some static code analyzers, but it's * intentional and correct here. */ bytes = drbg->parent_get_seed(drbg->parent, pout, drbg->strength, min_len, max_len, prediction_resistance, (unsigned char *)&drbg, sizeof(drbg)); ossl_drbg_unlock_parent(drbg); return bytes; } static void cleanup_entropy(PROV_DRBG *drbg, unsigned char *out, size_t outlen) { if (drbg->parent == NULL) { #ifdef FIPS_MODULE ossl_crngt_cleanup_entropy(drbg, out, outlen); #else ossl_prov_cleanup_entropy(drbg->provctx, out, outlen); #endif } else if (drbg->parent_clear_seed != NULL) { if (!ossl_drbg_lock_parent(drbg)) return; drbg->parent_clear_seed(drbg->parent, out, outlen); ossl_drbg_unlock_parent(drbg); } } #ifndef PROV_RAND_GET_RANDOM_NONCE typedef struct prov_drbg_nonce_global_st { CRYPTO_RWLOCK *rand_nonce_lock; int rand_nonce_count; } PROV_DRBG_NONCE_GLOBAL; /* * drbg_ossl_ctx_new() calls drgb_setup() which calls rand_drbg_get_nonce() * which needs to get the rand_nonce_lock out of the OSSL_LIB_CTX...but since * drbg_ossl_ctx_new() hasn't finished running yet we need the rand_nonce_lock * to be in a different global data object. Otherwise we will go into an * infinite recursion loop. */ void *ossl_prov_drbg_nonce_ctx_new(OSSL_LIB_CTX *libctx) { PROV_DRBG_NONCE_GLOBAL *dngbl = OPENSSL_zalloc(sizeof(*dngbl)); if (dngbl == NULL) return NULL; dngbl->rand_nonce_lock = CRYPTO_THREAD_lock_new(); if (dngbl->rand_nonce_lock == NULL) { OPENSSL_free(dngbl); return NULL; } return dngbl; } void ossl_prov_drbg_nonce_ctx_free(void *vdngbl) { PROV_DRBG_NONCE_GLOBAL *dngbl = vdngbl; if (dngbl == NULL) return; CRYPTO_THREAD_lock_free(dngbl->rand_nonce_lock); OPENSSL_free(dngbl); } /* Get a nonce from the operating system */ static size_t prov_drbg_get_nonce(PROV_DRBG *drbg, unsigned char **pout, size_t min_len, size_t max_len) { size_t ret = 0, n; unsigned char *buf = NULL; OSSL_LIB_CTX *libctx = ossl_prov_ctx_get0_libctx(drbg->provctx); PROV_DRBG_NONCE_GLOBAL *dngbl = ossl_lib_ctx_get_data(libctx, OSSL_LIB_CTX_DRBG_NONCE_INDEX); struct { void *drbg; int count; } data; if (dngbl == NULL) return 0; if (drbg->parent != NULL && drbg->parent_nonce != NULL) { n = drbg->parent_nonce(drbg->parent, NULL, 0, drbg->min_noncelen, drbg->max_noncelen); if (n > 0 && (buf = OPENSSL_malloc(n)) != NULL) { ret = drbg->parent_nonce(drbg->parent, buf, 0, drbg->min_noncelen, drbg->max_noncelen); if (ret == n) { *pout = buf; return ret; } OPENSSL_free(buf); } } /* Use the built in nonce source plus some of our specifics */ memset(&data, 0, sizeof(data)); data.drbg = drbg; if (!CRYPTO_atomic_add(&dngbl->rand_nonce_count, 1, &data.count, dngbl->rand_nonce_lock)) return 0; return ossl_prov_get_nonce(drbg->provctx, pout, min_len, max_len, &data, sizeof(data)); } #endif /* PROV_RAND_GET_RANDOM_NONCE */ /* * Instantiate |drbg|, after it has been initialized. Use |pers| and * |perslen| as prediction-resistance input. * * Requires that drbg->lock is already locked for write, if non-null. * * Returns 1 on success, 0 on failure. */ int ossl_prov_drbg_instantiate(PROV_DRBG *drbg, unsigned int strength, int prediction_resistance, const unsigned char *pers, size_t perslen) { unsigned char *nonce = NULL, *entropy = NULL; size_t noncelen = 0, entropylen = 0; size_t min_entropy, min_entropylen, max_entropylen; if (strength > drbg->strength) { ERR_raise(ERR_LIB_PROV, PROV_R_INSUFFICIENT_DRBG_STRENGTH); goto end; } min_entropy = drbg->strength; min_entropylen = drbg->min_entropylen; max_entropylen = drbg->max_entropylen; if (pers == NULL) { pers = (const unsigned char *)ossl_pers_string; perslen = sizeof(ossl_pers_string); } if (perslen > drbg->max_perslen) { ERR_raise(ERR_LIB_PROV, PROV_R_PERSONALISATION_STRING_TOO_LONG); goto end; } if (drbg->state != EVP_RAND_STATE_UNINITIALISED) { if (drbg->state == EVP_RAND_STATE_ERROR) ERR_raise(ERR_LIB_PROV, PROV_R_IN_ERROR_STATE); else ERR_raise(ERR_LIB_PROV, PROV_R_ALREADY_INSTANTIATED); goto end; } drbg->state = EVP_RAND_STATE_ERROR; if (drbg->min_noncelen > 0) { if (drbg->parent_nonce != NULL) { noncelen = drbg->parent_nonce(drbg->parent, NULL, drbg->strength, drbg->min_noncelen, drbg->max_noncelen); if (noncelen == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_ERROR_RETRIEVING_NONCE); goto end; } nonce = OPENSSL_malloc(noncelen); if (nonce == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_ERROR_RETRIEVING_NONCE); goto end; } if (noncelen != drbg->parent_nonce(drbg->parent, nonce, drbg->strength, drbg->min_noncelen, drbg->max_noncelen)) { ERR_raise(ERR_LIB_PROV, PROV_R_ERROR_RETRIEVING_NONCE); goto end; } #ifndef PROV_RAND_GET_RANDOM_NONCE } else if (drbg->parent != NULL) { #endif /* * NIST SP800-90Ar1 section 9.1 says you can combine getting * the entropy and nonce in 1 call by increasing the entropy * with 50% and increasing the minimum length to accommodate * the length of the nonce. We do this in case a nonce is * required and there is no parental nonce capability. */ min_entropy += drbg->strength / 2; min_entropylen += drbg->min_noncelen; max_entropylen += drbg->max_noncelen; } #ifndef PROV_RAND_GET_RANDOM_NONCE else { /* parent == NULL */ noncelen = prov_drbg_get_nonce(drbg, &nonce, drbg->min_noncelen, drbg->max_noncelen); if (noncelen < drbg->min_noncelen || noncelen > drbg->max_noncelen) { ERR_raise(ERR_LIB_PROV, PROV_R_ERROR_RETRIEVING_NONCE); goto end; } } #endif } drbg->reseed_next_counter = tsan_load(&drbg->reseed_counter); if (drbg->reseed_next_counter) { drbg->reseed_next_counter++; if (!drbg->reseed_next_counter) drbg->reseed_next_counter = 1; } entropylen = get_entropy(drbg, &entropy, min_entropy, min_entropylen, max_entropylen, prediction_resistance); if (entropylen < min_entropylen || entropylen > max_entropylen) { ERR_raise(ERR_LIB_PROV, PROV_R_ERROR_RETRIEVING_ENTROPY); goto end; } if (!drbg->instantiate(drbg, entropy, entropylen, nonce, noncelen, pers, perslen)) { cleanup_entropy(drbg, entropy, entropylen); ERR_raise(ERR_LIB_PROV, PROV_R_ERROR_INSTANTIATING_DRBG); goto end; } cleanup_entropy(drbg, entropy, entropylen); drbg->state = EVP_RAND_STATE_READY; drbg->generate_counter = 1; drbg->reseed_time = time(NULL); tsan_store(&drbg->reseed_counter, drbg->reseed_next_counter); end: if (nonce != NULL) ossl_prov_cleanup_nonce(drbg->provctx, nonce, noncelen); if (drbg->state == EVP_RAND_STATE_READY) return 1; return 0; } /* * Uninstantiate |drbg|. Must be instantiated before it can be used. * * Requires that drbg->lock is already locked for write, if non-null. * * Returns 1 on success, 0 on failure. */ int ossl_prov_drbg_uninstantiate(PROV_DRBG *drbg) { drbg->state = EVP_RAND_STATE_UNINITIALISED; return 1; } static int ossl_prov_drbg_reseed_unlocked(PROV_DRBG *drbg, int prediction_resistance, const unsigned char *ent, size_t ent_len, const unsigned char *adin, size_t adinlen) { unsigned char *entropy = NULL; size_t entropylen = 0; if (!ossl_prov_is_running()) return 0; if (drbg->state != EVP_RAND_STATE_READY) { /* try to recover from previous errors */ rand_drbg_restart(drbg); if (drbg->state == EVP_RAND_STATE_ERROR) { ERR_raise(ERR_LIB_PROV, PROV_R_IN_ERROR_STATE); return 0; } if (drbg->state == EVP_RAND_STATE_UNINITIALISED) { ERR_raise(ERR_LIB_PROV, PROV_R_NOT_INSTANTIATED); return 0; } } if (ent != NULL) { if (ent_len < drbg->min_entropylen) { ERR_raise(ERR_LIB_RAND, RAND_R_ENTROPY_OUT_OF_RANGE); drbg->state = EVP_RAND_STATE_ERROR; return 0; } if (ent_len > drbg->max_entropylen) { ERR_raise(ERR_LIB_RAND, RAND_R_ENTROPY_INPUT_TOO_LONG); drbg->state = EVP_RAND_STATE_ERROR; return 0; } } if (adin == NULL) { adinlen = 0; } else if (adinlen > drbg->max_adinlen) { ERR_raise(ERR_LIB_PROV, PROV_R_ADDITIONAL_INPUT_TOO_LONG); return 0; } drbg->state = EVP_RAND_STATE_ERROR; drbg->reseed_next_counter = tsan_load(&drbg->reseed_counter); if (drbg->reseed_next_counter) { drbg->reseed_next_counter++; if (!drbg->reseed_next_counter) drbg->reseed_next_counter = 1; } if (ent != NULL) { #ifdef FIPS_MODULE /* * NIST SP-800-90A mandates that entropy *shall not* be provided * by the consuming application. Instead the data is added as additional * input. * * (NIST SP-800-90Ar1, Sections 9.1 and 9.2) */ if (!drbg->reseed(drbg, NULL, 0, ent, ent_len)) { ERR_raise(ERR_LIB_PROV, PROV_R_UNABLE_TO_RESEED); return 0; } #else if (!drbg->reseed(drbg, ent, ent_len, adin, adinlen)) { ERR_raise(ERR_LIB_PROV, PROV_R_UNABLE_TO_RESEED); return 0; } /* There isn't much point adding the same additional input twice */ adin = NULL; adinlen = 0; #endif } /* Reseed using our sources in addition */ entropylen = get_entropy(drbg, &entropy, drbg->strength, drbg->min_entropylen, drbg->max_entropylen, prediction_resistance); if (entropylen < drbg->min_entropylen || entropylen > drbg->max_entropylen) { ERR_raise(ERR_LIB_PROV, PROV_R_ERROR_RETRIEVING_ENTROPY); goto end; } if (!drbg->reseed(drbg, entropy, entropylen, adin, adinlen)) goto end; drbg->state = EVP_RAND_STATE_READY; drbg->generate_counter = 1; drbg->reseed_time = time(NULL); tsan_store(&drbg->reseed_counter, drbg->reseed_next_counter); if (drbg->parent != NULL) drbg->parent_reseed_counter = get_parent_reseed_count(drbg); end: cleanup_entropy(drbg, entropy, entropylen); if (drbg->state == EVP_RAND_STATE_READY) return 1; return 0; } /* * Reseed |drbg|, mixing in the specified data * * Acquires the drbg->lock for writing, if non-null. * * Returns 1 on success, 0 on failure. */ int ossl_prov_drbg_reseed(PROV_DRBG *drbg, int prediction_resistance, const unsigned char *ent, size_t ent_len, const unsigned char *adin, size_t adinlen) { int ret; if (drbg->lock != NULL && !CRYPTO_THREAD_write_lock(drbg->lock)) return 0; ret = ossl_prov_drbg_reseed_unlocked(drbg, prediction_resistance, ent, ent_len, adin, adinlen); if (drbg->lock != NULL) CRYPTO_THREAD_unlock(drbg->lock); return ret; } /* * Generate |outlen| bytes into the buffer at |out|. Reseed if we need * to or if |prediction_resistance| is set. Additional input can be * sent in |adin| and |adinlen|. * * Acquires the drbg->lock for writing if available * * Returns 1 on success, 0 on failure. * */ int ossl_prov_drbg_generate(PROV_DRBG *drbg, unsigned char *out, size_t outlen, unsigned int strength, int prediction_resistance, const unsigned char *adin, size_t adinlen) { int fork_id; int reseed_required = 0; int ret = 0; if (!ossl_prov_is_running()) return 0; if (drbg->lock != NULL && !CRYPTO_THREAD_write_lock(drbg->lock)) return 0; if (drbg->state != EVP_RAND_STATE_READY) { /* try to recover from previous errors */ rand_drbg_restart(drbg); if (drbg->state == EVP_RAND_STATE_ERROR) { ERR_raise(ERR_LIB_PROV, PROV_R_IN_ERROR_STATE); goto err; } if (drbg->state == EVP_RAND_STATE_UNINITIALISED) { ERR_raise(ERR_LIB_PROV, PROV_R_NOT_INSTANTIATED); goto err; } } if (strength > drbg->strength) { ERR_raise(ERR_LIB_PROV, PROV_R_INSUFFICIENT_DRBG_STRENGTH); goto err; } if (outlen > drbg->max_request) { ERR_raise(ERR_LIB_PROV, PROV_R_REQUEST_TOO_LARGE_FOR_DRBG); goto err; } if (adinlen > drbg->max_adinlen) { ERR_raise(ERR_LIB_PROV, PROV_R_ADDITIONAL_INPUT_TOO_LONG); goto err; } fork_id = openssl_get_fork_id(); if (drbg->fork_id != fork_id) { drbg->fork_id = fork_id; reseed_required = 1; } if (drbg->reseed_interval > 0) { if (drbg->generate_counter >= drbg->reseed_interval) reseed_required = 1; } if (drbg->reseed_time_interval > 0) { time_t now = time(NULL); if (now < drbg->reseed_time || now - drbg->reseed_time >= drbg->reseed_time_interval) reseed_required = 1; } if (drbg->parent != NULL && get_parent_reseed_count(drbg) != drbg->parent_reseed_counter) reseed_required = 1; if (reseed_required || prediction_resistance) { if (!ossl_prov_drbg_reseed_unlocked(drbg, prediction_resistance, NULL, 0, adin, adinlen)) { ERR_raise(ERR_LIB_PROV, PROV_R_RESEED_ERROR); goto err; } adin = NULL; adinlen = 0; } if (!drbg->generate(drbg, out, outlen, adin, adinlen)) { drbg->state = EVP_RAND_STATE_ERROR; ERR_raise(ERR_LIB_PROV, PROV_R_GENERATE_ERROR); goto err; } drbg->generate_counter++; ret = 1; err: if (drbg->lock != NULL) CRYPTO_THREAD_unlock(drbg->lock); return ret; } /* * Restart |drbg|, using the specified entropy or additional input * * Tries its best to get the drbg instantiated by all means, * regardless of its current state. * * Optionally, a |buffer| of |len| random bytes can be passed, * which is assumed to contain at least |entropy| bits of entropy. * * If |entropy| > 0, the buffer content is used as entropy input. * * If |entropy| == 0, the buffer content is used as additional input * * Returns 1 on success, 0 on failure. * * This function is used internally only. */ static int rand_drbg_restart(PROV_DRBG *drbg) { /* repair error state */ if (drbg->state == EVP_RAND_STATE_ERROR) drbg->uninstantiate(drbg); /* repair uninitialized state */ if (drbg->state == EVP_RAND_STATE_UNINITIALISED) /* reinstantiate drbg */ ossl_prov_drbg_instantiate(drbg, drbg->strength, 0, NULL, 0); return drbg->state == EVP_RAND_STATE_READY; } /* Provider support from here down */ static const OSSL_DISPATCH *find_call(const OSSL_DISPATCH *dispatch, int function) { if (dispatch != NULL) while (dispatch->function_id != 0) { if (dispatch->function_id == function) return dispatch; dispatch++; } return NULL; } int ossl_drbg_enable_locking(void *vctx) { PROV_DRBG *drbg = vctx; if (drbg != NULL && drbg->lock == NULL) { if (drbg->parent_enable_locking != NULL) if (!drbg->parent_enable_locking(drbg->parent)) { ERR_raise(ERR_LIB_PROV, PROV_R_PARENT_LOCKING_NOT_ENABLED); return 0; } drbg->lock = CRYPTO_THREAD_lock_new(); if (drbg->lock == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_CREATE_LOCK); return 0; } } return 1; } /* * Allocate memory and initialize a new DRBG. The DRBG is allocated on * the secure heap if |secure| is nonzero and the secure heap is enabled. * The |parent|, if not NULL, will be used as random source for reseeding. * This also requires the parent's provider context and the parent's lock. * * Returns a pointer to the new DRBG instance on success, NULL on failure. */ PROV_DRBG *ossl_rand_drbg_new (void *provctx, void *parent, const OSSL_DISPATCH *p_dispatch, int (*dnew)(PROV_DRBG *ctx), int (*instantiate)(PROV_DRBG *drbg, const unsigned char *entropy, size_t entropylen, const unsigned char *nonce, size_t noncelen, const unsigned char *pers, size_t perslen), int (*uninstantiate)(PROV_DRBG *ctx), int (*reseed)(PROV_DRBG *drbg, const unsigned char *ent, size_t ent_len, const unsigned char *adin, size_t adin_len), int (*generate)(PROV_DRBG *, unsigned char *out, size_t outlen, const unsigned char *adin, size_t adin_len)) { PROV_DRBG *drbg; unsigned int p_str; const OSSL_DISPATCH *pfunc; if (!ossl_prov_is_running()) return NULL; drbg = OPENSSL_zalloc(sizeof(*drbg)); if (drbg == NULL) return NULL; drbg->provctx = provctx; drbg->instantiate = instantiate; drbg->uninstantiate = uninstantiate; drbg->reseed = reseed; drbg->generate = generate; drbg->fork_id = openssl_get_fork_id(); /* Extract parent's functions */ drbg->parent = parent; if ((pfunc = find_call(p_dispatch, OSSL_FUNC_RAND_ENABLE_LOCKING)) != NULL) drbg->parent_enable_locking = OSSL_FUNC_rand_enable_locking(pfunc); if ((pfunc = find_call(p_dispatch, OSSL_FUNC_RAND_LOCK)) != NULL) drbg->parent_lock = OSSL_FUNC_rand_lock(pfunc); if ((pfunc = find_call(p_dispatch, OSSL_FUNC_RAND_UNLOCK)) != NULL) drbg->parent_unlock = OSSL_FUNC_rand_unlock(pfunc); if ((pfunc = find_call(p_dispatch, OSSL_FUNC_RAND_GET_CTX_PARAMS)) != NULL) drbg->parent_get_ctx_params = OSSL_FUNC_rand_get_ctx_params(pfunc); if ((pfunc = find_call(p_dispatch, OSSL_FUNC_RAND_NONCE)) != NULL) drbg->parent_nonce = OSSL_FUNC_rand_nonce(pfunc); if ((pfunc = find_call(p_dispatch, OSSL_FUNC_RAND_GET_SEED)) != NULL) drbg->parent_get_seed = OSSL_FUNC_rand_get_seed(pfunc); if ((pfunc = find_call(p_dispatch, OSSL_FUNC_RAND_CLEAR_SEED)) != NULL) drbg->parent_clear_seed = OSSL_FUNC_rand_clear_seed(pfunc); /* Set some default maximums up */ drbg->max_entropylen = DRBG_MAX_LENGTH; drbg->max_noncelen = DRBG_MAX_LENGTH; drbg->max_perslen = DRBG_MAX_LENGTH; drbg->max_adinlen = DRBG_MAX_LENGTH; drbg->generate_counter = 1; drbg->reseed_counter = 1; drbg->reseed_interval = RESEED_INTERVAL; drbg->reseed_time_interval = TIME_INTERVAL; if (!dnew(drbg)) goto err; if (parent != NULL) { if (!get_parent_strength(drbg, &p_str)) goto err; if (drbg->strength > p_str) { /* * We currently don't support the algorithm from NIST SP 800-90C * 10.1.2 to use a weaker DRBG as source */ ERR_raise(ERR_LIB_PROV, PROV_R_PARENT_STRENGTH_TOO_WEAK); goto err; } } #ifdef TSAN_REQUIRES_LOCKING if (!ossl_drbg_enable_locking(drbg)) goto err; #endif return drbg; err: ossl_rand_drbg_free(drbg); return NULL; } void ossl_rand_drbg_free(PROV_DRBG *drbg) { if (drbg == NULL) return; CRYPTO_THREAD_lock_free(drbg->lock); OPENSSL_free(drbg); } /* * Helper function called by internal DRBG implementations. Assumes that at * least a read lock has been taken on drbg->lock */ int ossl_drbg_get_ctx_params(PROV_DRBG *drbg, OSSL_PARAM params[]) { OSSL_PARAM *p; p = OSSL_PARAM_locate(params, OSSL_RAND_PARAM_STATE); if (p != NULL && !OSSL_PARAM_set_int(p, drbg->state)) return 0; p = OSSL_PARAM_locate(params, OSSL_RAND_PARAM_STRENGTH); if (p != NULL && !OSSL_PARAM_set_int(p, drbg->strength)) return 0; p = OSSL_PARAM_locate(params, OSSL_DRBG_PARAM_MIN_ENTROPYLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, drbg->min_entropylen)) return 0; p = OSSL_PARAM_locate(params, OSSL_DRBG_PARAM_MAX_ENTROPYLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, drbg->max_entropylen)) return 0; p = OSSL_PARAM_locate(params, OSSL_DRBG_PARAM_MIN_NONCELEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, drbg->min_noncelen)) return 0; p = OSSL_PARAM_locate(params, OSSL_DRBG_PARAM_MAX_NONCELEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, drbg->max_noncelen)) return 0; p = OSSL_PARAM_locate(params, OSSL_DRBG_PARAM_MAX_PERSLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, drbg->max_perslen)) return 0; p = OSSL_PARAM_locate(params, OSSL_DRBG_PARAM_MAX_ADINLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, drbg->max_adinlen)) return 0; p = OSSL_PARAM_locate(params, OSSL_DRBG_PARAM_RESEED_REQUESTS); if (p != NULL && !OSSL_PARAM_set_uint(p, drbg->reseed_interval)) return 0; p = OSSL_PARAM_locate(params, OSSL_DRBG_PARAM_RESEED_TIME); if (p != NULL && !OSSL_PARAM_set_time_t(p, drbg->reseed_time)) return 0; p = OSSL_PARAM_locate(params, OSSL_DRBG_PARAM_RESEED_TIME_INTERVAL); if (p != NULL && !OSSL_PARAM_set_time_t(p, drbg->reseed_time_interval)) return 0; return 1; } /* * Helper function to get certain params that require no lock to obtain. Sets * *complete to 1 if all the params were processed, or 0 otherwise */ int ossl_drbg_get_ctx_params_no_lock(PROV_DRBG *drbg, OSSL_PARAM params[], int *complete) { size_t cnt = 0; OSSL_PARAM *p; /* This value never changes once set */ p = OSSL_PARAM_locate(params, OSSL_RAND_PARAM_MAX_REQUEST); if (p != NULL) { if (!OSSL_PARAM_set_size_t(p, drbg->max_request)) return 0; cnt++; } /* * Can be changed by multiple threads, but we tolerate inaccuracies in this * value. */ p = OSSL_PARAM_locate(params, OSSL_DRBG_PARAM_RESEED_COUNTER); if (p != NULL) { if (!OSSL_PARAM_set_uint(p, tsan_load(&drbg->reseed_counter))) return 0; cnt++; } if (params[cnt].key == NULL) *complete = 1; else *complete = 0; return 1; } int ossl_drbg_set_ctx_params(PROV_DRBG *drbg, const OSSL_PARAM params[]) { const OSSL_PARAM *p; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_DRBG_PARAM_RESEED_REQUESTS); if (p != NULL && !OSSL_PARAM_get_uint(p, &drbg->reseed_interval)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_DRBG_PARAM_RESEED_TIME_INTERVAL); if (p != NULL && !OSSL_PARAM_get_time_t(p, &drbg->reseed_time_interval)) return 0; return 1; } /* Confirm digest is allowed to be used with a DRBG */ int ossl_drbg_verify_digest(ossl_unused OSSL_LIB_CTX *libctx, const EVP_MD *md) { #ifdef FIPS_MODULE /* FIPS 140-3 IG D.R limited DRBG digests to a specific set */ static const char *const allowed_digests[] = { "SHA1", /* SHA 1 allowed */ "SHA2-256", "SHA2-512", /* non-truncated SHA2 allowed */ "SHA3-256", "SHA3-512", /* non-truncated SHA3 allowed */ }; size_t i; if (FIPS_restricted_drbg_digests_enabled(libctx)) { for (i = 0; i < OSSL_NELEM(allowed_digests); i++) if (EVP_MD_is_a(md, allowed_digests[i])) return 1; ERR_raise(ERR_LIB_PROV, PROV_R_DIGEST_NOT_ALLOWED); return 0; } #endif /* Outside of FIPS, any digests that are not XOF are allowed */ if ((EVP_MD_get_flags(md) & EVP_MD_FLAG_XOF) != 0) { ERR_raise(ERR_LIB_PROV, PROV_R_XOF_DIGESTS_NOT_ALLOWED); return 0; } return 1; }
./openssl/providers/implementations/rands/seeding/rand_cpu_arm64.c
/* * Copyright 2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "internal/cryptlib.h" #include <openssl/opensslconf.h> #include "crypto/rand_pool.h" #include "prov/seeding.h" #ifdef OPENSSL_RAND_SEED_RDCPU #include "crypto/arm_arch.h" size_t OPENSSL_rndrrs_bytes(unsigned char *buf, size_t len); static size_t get_hardware_random_value(unsigned char *buf, size_t len); /* * Acquire entropy using Arm-specific cpu instructions * * Uses the RNDRRS instruction. RNDR is never needed since * RNDRRS will always be available if RNDR is an available * instruction. * * Returns the total entropy count, if it exceeds the requested * entropy count. Otherwise, returns an entropy count of 0. */ size_t ossl_prov_acquire_entropy_from_cpu(RAND_POOL *pool) { size_t bytes_needed; unsigned char *buffer; bytes_needed = ossl_rand_pool_bytes_needed(pool, 1 /*entropy_factor*/); if (bytes_needed > 0) { buffer = ossl_rand_pool_add_begin(pool, bytes_needed); if (buffer != NULL) { if (get_hardware_random_value(buffer, bytes_needed) == bytes_needed) ossl_rand_pool_add_end(pool, bytes_needed, 8 * bytes_needed); else ossl_rand_pool_add_end(pool, 0, 0); } } return ossl_rand_pool_entropy_available(pool); } static size_t get_hardware_random_value(unsigned char *buf, size_t len) { /* Always use RNDRRS or nothing */ if (OPENSSL_armcap_P & ARMV8_RNG) { if (OPENSSL_rndrrs_bytes(buf, len) != len) return 0; } else { return 0; } return len; } #else NON_EMPTY_TRANSLATION_UNIT #endif /* OPENSSL_RAND_SEED_RDCPU */
./openssl/providers/implementations/rands/seeding/rand_unix.c
/* * Copyright 1995-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #ifndef _GNU_SOURCE # define _GNU_SOURCE #endif #include "internal/e_os.h" #include <stdio.h> #include "internal/cryptlib.h" #include <openssl/rand.h> #include <openssl/crypto.h> #include "crypto/rand_pool.h" #include "crypto/rand.h" #include "internal/dso.h" #include "internal/nelem.h" #include "prov/seeding.h" #ifdef __linux # include <sys/syscall.h> # ifdef DEVRANDOM_WAIT # include <sys/shm.h> # include <sys/utsname.h> # endif #endif #if (defined(__FreeBSD__) || defined(__NetBSD__)) && !defined(OPENSSL_SYS_UEFI) # include <sys/types.h> # include <sys/sysctl.h> # include <sys/param.h> #endif #if defined(__OpenBSD__) # include <sys/param.h> #endif #if defined(__DragonFly__) # include <sys/param.h> # include <sys/random.h> #endif #if (defined(OPENSSL_SYS_UNIX) && !defined(OPENSSL_SYS_VXWORKS)) \ || defined(__DJGPP__) # include <sys/types.h> # include <sys/stat.h> # include <fcntl.h> # include <unistd.h> # include <sys/time.h> static uint64_t get_time_stamp(void); /* Macro to convert two thirty two bit values into a sixty four bit one */ # define TWO32TO64(a, b) ((((uint64_t)(a)) << 32) + (b)) /* * Check for the existence and support of POSIX timers. The standard * says that the _POSIX_TIMERS macro will have a positive value if they * are available. * * However, we want an additional constraint: that the timer support does * not require an extra library dependency. Early versions of glibc * require -lrt to be specified on the link line to access the timers, * so this needs to be checked for. * * It is worse because some libraries define __GLIBC__ but don't * support the version testing macro (e.g. uClibc). This means * an extra check is needed. * * The final condition is: * "have posix timers and either not glibc or glibc without -lrt" * * The nested #if sequences are required to avoid using a parameterised * macro that might be undefined. */ # undef OSSL_POSIX_TIMER_OKAY /* On some systems, _POSIX_TIMERS is defined but empty. * Subtracting by 0 when comparing avoids an error in this case. */ # if defined(_POSIX_TIMERS) && _POSIX_TIMERS -0 > 0 # if defined(__GLIBC__) # if defined(__GLIBC_PREREQ) # if __GLIBC_PREREQ(2, 17) # define OSSL_POSIX_TIMER_OKAY # endif # endif # else # define OSSL_POSIX_TIMER_OKAY # endif # endif #endif /* (defined(OPENSSL_SYS_UNIX) && !defined(OPENSSL_SYS_VXWORKS)) || defined(__DJGPP__) */ #if defined(OPENSSL_RAND_SEED_NONE) /* none means none. this simplifies the following logic */ # undef OPENSSL_RAND_SEED_OS # undef OPENSSL_RAND_SEED_GETRANDOM # undef OPENSSL_RAND_SEED_LIBRANDOM # undef OPENSSL_RAND_SEED_DEVRANDOM # undef OPENSSL_RAND_SEED_RDTSC # undef OPENSSL_RAND_SEED_RDCPU # undef OPENSSL_RAND_SEED_EGD #endif #if defined(OPENSSL_SYS_UEFI) && !defined(OPENSSL_RAND_SEED_NONE) # error "UEFI only supports seeding NONE" #endif #if !(defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_WIN32) \ || defined(OPENSSL_SYS_VMS) || defined(OPENSSL_SYS_VXWORKS) \ || defined(OPENSSL_SYS_UEFI)) # if defined(OPENSSL_SYS_VOS) # ifndef OPENSSL_RAND_SEED_OS # error "Unsupported seeding method configured; must be os" # endif # if defined(OPENSSL_SYS_VOS_HPPA) && defined(OPENSSL_SYS_VOS_IA32) # error "Unsupported HP-PA and IA32 at the same time." # endif # if !defined(OPENSSL_SYS_VOS_HPPA) && !defined(OPENSSL_SYS_VOS_IA32) # error "Must have one of HP-PA or IA32" # endif /* * The following algorithm repeatedly samples the real-time clock (RTC) to * generate a sequence of unpredictable data. The algorithm relies upon the * uneven execution speed of the code (due to factors such as cache misses, * interrupts, bus activity, and scheduling) and upon the rather large * relative difference between the speed of the clock and the rate at which * it can be read. If it is ported to an environment where execution speed * is more constant or where the RTC ticks at a much slower rate, or the * clock can be read with fewer instructions, it is likely that the results * would be far more predictable. This should only be used for legacy * platforms. * * As a precaution, we assume only 2 bits of entropy per byte. */ size_t ossl_pool_acquire_entropy(RAND_POOL *pool) { short int code; int i, k; size_t bytes_needed; struct timespec ts; unsigned char v; # ifdef OPENSSL_SYS_VOS_HPPA long duration; extern void s$sleep(long *_duration, short int *_code); # else long long duration; extern void s$sleep2(long long *_duration, short int *_code); # endif bytes_needed = ossl_rand_pool_bytes_needed(pool, 4 /*entropy_factor*/); for (i = 0; i < bytes_needed; i++) { /* * burn some cpu; hope for interrupts, cache collisions, bus * interference, etc. */ for (k = 0; k < 99; k++) ts.tv_nsec = random(); # ifdef OPENSSL_SYS_VOS_HPPA /* sleep for 1/1024 of a second (976 us). */ duration = 1; s$sleep(&duration, &code); # else /* sleep for 1/65536 of a second (15 us). */ duration = 1; s$sleep2(&duration, &code); # endif /* Get wall clock time, take 8 bits. */ clock_gettime(CLOCK_REALTIME, &ts); v = (unsigned char)(ts.tv_nsec & 0xFF); ossl_rand_pool_add(pool, arg, &v, sizeof(v), 2); } return ossl_rand_pool_entropy_available(pool); } void ossl_rand_pool_cleanup(void) { } void ossl_rand_pool_keep_random_devices_open(int keep) { } # else # if defined(OPENSSL_RAND_SEED_EGD) && \ (defined(OPENSSL_NO_EGD) || !defined(DEVRANDOM_EGD)) # error "Seeding uses EGD but EGD is turned off or no device given" # endif # if defined(OPENSSL_RAND_SEED_DEVRANDOM) && !defined(DEVRANDOM) # error "Seeding uses urandom but DEVRANDOM is not configured" # endif # if defined(OPENSSL_RAND_SEED_OS) # if !defined(DEVRANDOM) # error "OS seeding requires DEVRANDOM to be configured" # endif # define OPENSSL_RAND_SEED_GETRANDOM # define OPENSSL_RAND_SEED_DEVRANDOM # endif # if defined(OPENSSL_RAND_SEED_LIBRANDOM) # error "librandom not (yet) supported" # endif # if (defined(__FreeBSD__) || defined(__NetBSD__)) && defined(KERN_ARND) /* * sysctl_random(): Use sysctl() to read a random number from the kernel * Returns the number of bytes returned in buf on success, -1 on failure. */ static ssize_t sysctl_random(char *buf, size_t buflen) { int mib[2]; size_t done = 0; size_t len; /* * Note: sign conversion between size_t and ssize_t is safe even * without a range check, see comment in syscall_random() */ /* * On FreeBSD old implementations returned longs, newer versions support * variable sizes up to 256 byte. The code below would not work properly * when the sysctl returns long and we want to request something not a * multiple of longs, which should never be the case. */ #if defined(__FreeBSD__) if (!ossl_assert(buflen % sizeof(long) == 0)) { errno = EINVAL; return -1; } #endif /* * On NetBSD before 4.0 KERN_ARND was an alias for KERN_URND, and only * filled in an int, leaving the rest uninitialized. Since NetBSD 4.0 * it returns a variable number of bytes with the current version supporting * up to 256 bytes. * Just return an error on older NetBSD versions. */ #if defined(__NetBSD__) && __NetBSD_Version__ < 400000000 errno = ENOSYS; return -1; #endif mib[0] = CTL_KERN; mib[1] = KERN_ARND; do { len = buflen > 256 ? 256 : buflen; if (sysctl(mib, 2, buf, &len, NULL, 0) == -1) return done > 0 ? done : -1; done += len; buf += len; buflen -= len; } while (buflen > 0); return done; } # endif # if defined(OPENSSL_RAND_SEED_GETRANDOM) # if defined(__linux) && !defined(__NR_getrandom) # if defined(__arm__) # define __NR_getrandom (__NR_SYSCALL_BASE+384) # elif defined(__i386__) # define __NR_getrandom 355 # elif defined(__x86_64__) # if defined(__ILP32__) # define __NR_getrandom (__X32_SYSCALL_BIT + 318) # else # define __NR_getrandom 318 # endif # elif defined(__xtensa__) # define __NR_getrandom 338 # elif defined(__s390__) || defined(__s390x__) # define __NR_getrandom 349 # elif defined(__bfin__) # define __NR_getrandom 389 # elif defined(__powerpc__) # define __NR_getrandom 359 # elif defined(__mips__) || defined(__mips64) # if _MIPS_SIM == _MIPS_SIM_ABI32 # define __NR_getrandom (__NR_Linux + 353) # elif _MIPS_SIM == _MIPS_SIM_ABI64 # define __NR_getrandom (__NR_Linux + 313) # elif _MIPS_SIM == _MIPS_SIM_NABI32 # define __NR_getrandom (__NR_Linux + 317) # endif # elif defined(__hppa__) # define __NR_getrandom (__NR_Linux + 339) # elif defined(__sparc__) # define __NR_getrandom 347 # elif defined(__ia64__) # define __NR_getrandom 1339 # elif defined(__alpha__) # define __NR_getrandom 511 # elif defined(__sh__) # if defined(__SH5__) # define __NR_getrandom 373 # else # define __NR_getrandom 384 # endif # elif defined(__avr32__) # define __NR_getrandom 317 # elif defined(__microblaze__) # define __NR_getrandom 385 # elif defined(__m68k__) # define __NR_getrandom 352 # elif defined(__cris__) # define __NR_getrandom 356 # else /* generic (f.e. aarch64, loongarch, loongarch64) */ # define __NR_getrandom 278 # endif # endif /* * syscall_random(): Try to get random data using a system call * returns the number of bytes returned in buf, or < 0 on error. */ static ssize_t syscall_random(void *buf, size_t buflen) { /* * Note: 'buflen' equals the size of the buffer which is used by the * get_entropy() callback of the RAND_DRBG. It is roughly bounded by * * 2 * RAND_POOL_FACTOR * (RAND_DRBG_STRENGTH / 8) = 2^14 * * which is way below the OSSL_SSIZE_MAX limit. Therefore sign conversion * between size_t and ssize_t is safe even without a range check. */ /* * Do runtime detection to find getentropy(). * * Known OSs that should support this: * - Darwin since 16 (OSX 10.12, IOS 10.0). * - Solaris since 11.3 * - OpenBSD since 5.6 * - Linux since 3.17 with glibc 2.25 * - FreeBSD since 12.0 (1200061) * * Note: Sometimes getentropy() can be provided but not implemented * internally. So we need to check errno for ENOSYS */ # if !defined(__DragonFly__) && !defined(__NetBSD__) # if defined(__GNUC__) && __GNUC__>=2 && defined(__ELF__) && !defined(__hpux) extern int getentropy(void *buffer, size_t length) __attribute__((weak)); if (getentropy != NULL) { if (getentropy(buf, buflen) == 0) return (ssize_t)buflen; if (errno != ENOSYS) return -1; } # elif defined(OPENSSL_APPLE_CRYPTO_RANDOM) if (CCRandomGenerateBytes(buf, buflen) == kCCSuccess) return (ssize_t)buflen; return -1; # else union { void *p; int (*f)(void *buffer, size_t length); } p_getentropy; /* * We could cache the result of the lookup, but we normally don't * call this function often. */ ERR_set_mark(); p_getentropy.p = DSO_global_lookup("getentropy"); ERR_pop_to_mark(); if (p_getentropy.p != NULL) return p_getentropy.f(buf, buflen) == 0 ? (ssize_t)buflen : -1; # endif # endif /* !__DragonFly__ */ /* Linux supports this since version 3.17 */ # if defined(__linux) && defined(__NR_getrandom) return syscall(__NR_getrandom, buf, buflen, 0); # elif (defined(__FreeBSD__) || defined(__NetBSD__)) && defined(KERN_ARND) return sysctl_random(buf, buflen); # elif (defined(__DragonFly__) && __DragonFly_version >= 500700) \ || (defined(__NetBSD__) && __NetBSD_Version >= 1000000000) return getrandom(buf, buflen, 0); # elif defined(__wasi__) if (getentropy(buf, buflen) == 0) return (ssize_t)buflen; return -1; # else errno = ENOSYS; return -1; # endif } # endif /* defined(OPENSSL_RAND_SEED_GETRANDOM) */ # if defined(OPENSSL_RAND_SEED_DEVRANDOM) static const char *random_device_paths[] = { DEVRANDOM }; static struct random_device { int fd; dev_t dev; ino_t ino; mode_t mode; dev_t rdev; } random_devices[OSSL_NELEM(random_device_paths)]; static int keep_random_devices_open = 1; # if defined(__linux) && defined(DEVRANDOM_WAIT) \ && defined(OPENSSL_RAND_SEED_GETRANDOM) static void *shm_addr; static void cleanup_shm(void) { shmdt(shm_addr); } /* * Ensure that the system randomness source has been adequately seeded. * This is done by having the first start of libcrypto, wait until the device * /dev/random becomes able to supply a byte of entropy. Subsequent starts * of the library and later reseedings do not need to do this. */ static int wait_random_seeded(void) { static int seeded = OPENSSL_RAND_SEED_DEVRANDOM_SHM_ID < 0; static const int kernel_version[] = { DEVRANDOM_SAFE_KERNEL }; int kernel[2]; int shm_id, fd, r; char c, *p; struct utsname un; fd_set fds; if (!seeded) { /* See if anything has created the global seeded indication */ if ((shm_id = shmget(OPENSSL_RAND_SEED_DEVRANDOM_SHM_ID, 1, 0)) == -1) { /* * Check the kernel's version and fail if it is too recent. * * Linux kernels from 4.8 onwards do not guarantee that * /dev/urandom is properly seeded when /dev/random becomes * readable. However, such kernels support the getentropy(2) * system call and this should always succeed which renders * this alternative but essentially identical source moot. */ if (uname(&un) == 0) { kernel[0] = atoi(un.release); p = strchr(un.release, '.'); kernel[1] = p == NULL ? 0 : atoi(p + 1); if (kernel[0] > kernel_version[0] || (kernel[0] == kernel_version[0] && kernel[1] >= kernel_version[1])) { return 0; } } /* Open /dev/random and wait for it to be readable */ if ((fd = open(DEVRANDOM_WAIT, O_RDONLY)) != -1) { if (DEVRANDM_WAIT_USE_SELECT && fd < FD_SETSIZE) { FD_ZERO(&fds); FD_SET(fd, &fds); while ((r = select(fd + 1, &fds, NULL, NULL, NULL)) < 0 && errno == EINTR); } else { while ((r = read(fd, &c, 1)) < 0 && errno == EINTR); } close(fd); if (r == 1) { seeded = 1; /* Create the shared memory indicator */ shm_id = shmget(OPENSSL_RAND_SEED_DEVRANDOM_SHM_ID, 1, IPC_CREAT | S_IRUSR | S_IRGRP | S_IROTH); } } } if (shm_id != -1) { seeded = 1; /* * Map the shared memory to prevent its premature destruction. * If this call fails, it isn't a big problem. */ shm_addr = shmat(shm_id, NULL, SHM_RDONLY); if (shm_addr != (void *)-1) OPENSSL_atexit(&cleanup_shm); } } return seeded; } # else /* defined __linux && DEVRANDOM_WAIT && OPENSSL_RAND_SEED_GETRANDOM */ static int wait_random_seeded(void) { return 1; } # endif /* * Verify that the file descriptor associated with the random source is * still valid. The rationale for doing this is the fact that it is not * uncommon for daemons to close all open file handles when daemonizing. * So the handle might have been closed or even reused for opening * another file. */ static int check_random_device(struct random_device *rd) { struct stat st; return rd->fd != -1 && fstat(rd->fd, &st) != -1 && rd->dev == st.st_dev && rd->ino == st.st_ino && ((rd->mode ^ st.st_mode) & ~(S_IRWXU | S_IRWXG | S_IRWXO)) == 0 && rd->rdev == st.st_rdev; } /* * Open a random device if required and return its file descriptor or -1 on error */ static int get_random_device(size_t n) { struct stat st; struct random_device *rd = &random_devices[n]; /* reuse existing file descriptor if it is (still) valid */ if (check_random_device(rd)) return rd->fd; /* open the random device ... */ if ((rd->fd = open(random_device_paths[n], O_RDONLY)) == -1) return rd->fd; /* ... and cache its relevant stat(2) data */ if (fstat(rd->fd, &st) != -1) { rd->dev = st.st_dev; rd->ino = st.st_ino; rd->mode = st.st_mode; rd->rdev = st.st_rdev; } else { close(rd->fd); rd->fd = -1; } return rd->fd; } /* * Close a random device making sure it is a random device */ static void close_random_device(size_t n) { struct random_device *rd = &random_devices[n]; if (check_random_device(rd)) close(rd->fd); rd->fd = -1; } int ossl_rand_pool_init(void) { size_t i; for (i = 0; i < OSSL_NELEM(random_devices); i++) random_devices[i].fd = -1; return 1; } void ossl_rand_pool_cleanup(void) { size_t i; for (i = 0; i < OSSL_NELEM(random_devices); i++) close_random_device(i); } void ossl_rand_pool_keep_random_devices_open(int keep) { if (!keep) ossl_rand_pool_cleanup(); keep_random_devices_open = keep; } # else /* !defined(OPENSSL_RAND_SEED_DEVRANDOM) */ int ossl_rand_pool_init(void) { return 1; } void ossl_rand_pool_cleanup(void) { } void ossl_rand_pool_keep_random_devices_open(int keep) { } # endif /* defined(OPENSSL_RAND_SEED_DEVRANDOM) */ /* * Try the various seeding methods in turn, exit when successful. * * If more than one entropy source is available, is it * preferable to stop as soon as enough entropy has been collected * (as favored by @rsalz) or should one rather be defensive and add * more entropy than requested and/or from different sources? * * Currently, the user can select multiple entropy sources in the * configure step, yet in practice only the first available source * will be used. A more flexible solution has been requested, but * currently it is not clear how this can be achieved without * overengineering the problem. There are many parameters which * could be taken into account when selecting the order and amount * of input from the different entropy sources (trust, quality, * possibility of blocking). */ size_t ossl_pool_acquire_entropy(RAND_POOL *pool) { # if defined(OPENSSL_RAND_SEED_NONE) return ossl_rand_pool_entropy_available(pool); # else size_t entropy_available = 0; (void)entropy_available; /* avoid compiler warning */ # if defined(OPENSSL_RAND_SEED_GETRANDOM) { size_t bytes_needed; unsigned char *buffer; ssize_t bytes; /* Maximum allowed number of consecutive unsuccessful attempts */ int attempts = 3; bytes_needed = ossl_rand_pool_bytes_needed(pool, 1 /*entropy_factor*/); while (bytes_needed != 0 && attempts-- > 0) { buffer = ossl_rand_pool_add_begin(pool, bytes_needed); bytes = syscall_random(buffer, bytes_needed); if (bytes > 0) { ossl_rand_pool_add_end(pool, bytes, 8 * bytes); bytes_needed -= bytes; attempts = 3; /* reset counter after successful attempt */ } else if (bytes < 0 && errno != EINTR) { break; } } } entropy_available = ossl_rand_pool_entropy_available(pool); if (entropy_available > 0) return entropy_available; # endif # if defined(OPENSSL_RAND_SEED_LIBRANDOM) { /* Not yet implemented. */ } # endif # if defined(OPENSSL_RAND_SEED_DEVRANDOM) if (wait_random_seeded()) { size_t bytes_needed; unsigned char *buffer; size_t i; bytes_needed = ossl_rand_pool_bytes_needed(pool, 1 /*entropy_factor*/); for (i = 0; bytes_needed > 0 && i < OSSL_NELEM(random_device_paths); i++) { ssize_t bytes = 0; /* Maximum number of consecutive unsuccessful attempts */ int attempts = 3; const int fd = get_random_device(i); if (fd == -1) continue; while (bytes_needed != 0 && attempts-- > 0) { buffer = ossl_rand_pool_add_begin(pool, bytes_needed); bytes = read(fd, buffer, bytes_needed); if (bytes > 0) { ossl_rand_pool_add_end(pool, bytes, 8 * bytes); bytes_needed -= bytes; attempts = 3; /* reset counter on successful attempt */ } else if (bytes < 0 && errno != EINTR) { break; } } if (bytes < 0 || !keep_random_devices_open) close_random_device(i); bytes_needed = ossl_rand_pool_bytes_needed(pool, 1); } entropy_available = ossl_rand_pool_entropy_available(pool); if (entropy_available > 0) return entropy_available; } # endif # if defined(OPENSSL_RAND_SEED_RDTSC) entropy_available = ossl_prov_acquire_entropy_from_tsc(pool); if (entropy_available > 0) return entropy_available; # endif # if defined(OPENSSL_RAND_SEED_RDCPU) entropy_available = ossl_prov_acquire_entropy_from_cpu(pool); if (entropy_available > 0) return entropy_available; # endif # if defined(OPENSSL_RAND_SEED_EGD) { static const char *paths[] = { DEVRANDOM_EGD, NULL }; size_t bytes_needed; unsigned char *buffer; int i; bytes_needed = ossl_rand_pool_bytes_needed(pool, 1 /*entropy_factor*/); for (i = 0; bytes_needed > 0 && paths[i] != NULL; i++) { size_t bytes = 0; int num; buffer = ossl_rand_pool_add_begin(pool, bytes_needed); num = RAND_query_egd_bytes(paths[i], buffer, (int)bytes_needed); if (num == (int)bytes_needed) bytes = bytes_needed; ossl_rand_pool_add_end(pool, bytes, 8 * bytes); bytes_needed = ossl_rand_pool_bytes_needed(pool, 1); } entropy_available = ossl_rand_pool_entropy_available(pool); if (entropy_available > 0) return entropy_available; } # endif return ossl_rand_pool_entropy_available(pool); # endif } # endif #endif #if (defined(OPENSSL_SYS_UNIX) && !defined(OPENSSL_SYS_VXWORKS)) \ || defined(__DJGPP__) int ossl_pool_add_nonce_data(RAND_POOL *pool) { struct { pid_t pid; CRYPTO_THREAD_ID tid; uint64_t time; } data; /* Erase the entire structure including any padding */ memset(&data, 0, sizeof(data)); /* * Add process id, thread id, and a high resolution timestamp to * ensure that the nonce is unique with high probability for * different process instances. */ data.pid = getpid(); data.tid = CRYPTO_THREAD_get_current_id(); data.time = get_time_stamp(); return ossl_rand_pool_add(pool, (unsigned char *)&data, sizeof(data), 0); } /* * Get the current time with the highest possible resolution * * The time stamp is added to the nonce, so it is optimized for not repeating. * The current time is ideal for this purpose, provided the computer's clock * is synchronized. */ static uint64_t get_time_stamp(void) { # if defined(OSSL_POSIX_TIMER_OKAY) { struct timespec ts; if (clock_gettime(CLOCK_REALTIME, &ts) == 0) return TWO32TO64(ts.tv_sec, ts.tv_nsec); } # endif # if defined(__unix__) \ || (defined(_POSIX_C_SOURCE) && _POSIX_C_SOURCE >= 200112L) { struct timeval tv; if (gettimeofday(&tv, NULL) == 0) return TWO32TO64(tv.tv_sec, tv.tv_usec); } # endif return time(NULL); } #endif /* (defined(OPENSSL_SYS_UNIX) && !defined(OPENSSL_SYS_VXWORKS)) || defined(__DJGPP__) */
./openssl/providers/implementations/rands/seeding/rand_vxworks.c
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/opensslconf.h> #include <openssl/rand.h> #include "crypto/rand_pool.h" #include "crypto/rand.h" #include "internal/cryptlib.h" #include "prov/seeding.h" #include <version.h> #include <taskLib.h> #if defined(OPENSSL_RAND_SEED_NONE) /* none means none */ # undef OPENSSL_RAND_SEED_OS #endif #if defined(OPENSSL_RAND_SEED_OS) # if _WRS_VXWORKS_MAJOR >= 7 # define RAND_SEED_VXRANDLIB # else # error "VxWorks <7 only support RAND_SEED_NONE" # endif #endif #if defined(RAND_SEED_VXRANDLIB) # include <randomNumGen.h> #endif /* Macro to convert two thirty two bit values into a sixty four bit one */ #define TWO32TO64(a, b) ((((uint64_t)(a)) << 32) + (b)) static uint64_t get_time_stamp(void) { struct timespec ts; if (clock_gettime(CLOCK_REALTIME, &ts) == 0) return TWO32TO64(ts.tv_sec, ts.tv_nsec); return time(NULL); } static uint64_t get_timer_bits(void) { uint64_t res = OPENSSL_rdtsc(); struct timespec ts; if (res != 0) return res; if (clock_gettime(CLOCK_MONOTONIC, &ts) == 0) return TWO32TO64(ts.tv_sec, ts.tv_nsec); return time(NULL); } /* * empty implementation * vxworks does not need to init/cleanup or keep open the random lib */ int ossl_rand_pool_init(void) { return 1; } void ossl_rand_pool_cleanup(void) { } void ossl_rand_pool_keep_random_devices_open(int keep) { } int ossl_pool_add_nonce_data(RAND_POOL *pool) { struct { pid_t pid; CRYPTO_THREAD_ID tid; uint64_t time; } data; memset(&data, 0, sizeof(data)); /* * Add process id, thread id, and a high resolution timestamp to * ensure that the nonce is unique with high probability for * different process instances. */ data.pid = getpid(); data.tid = CRYPTO_THREAD_get_current_id(); data.time = get_time_stamp(); return ossl_rand_pool_add(pool, (unsigned char *)&data, sizeof(data), 0); } size_t ossl_pool_acquire_entropy(RAND_POOL *pool) { #if defined(RAND_SEED_VXRANDLIB) /* vxRandLib based entropy method */ size_t bytes_needed; bytes_needed = ossl_rand_pool_bytes_needed(pool, 1 /*entropy_factor*/); if (bytes_needed > 0) { int retryCount = 0; STATUS result = ERROR; unsigned char *buffer; buffer = ossl_rand_pool_add_begin(pool, bytes_needed); while ((result != OK) && (retryCount < 10)) { RANDOM_NUM_GEN_STATUS status = randStatus(); if ((status == RANDOM_NUM_GEN_ENOUGH_ENTROPY) || (status == RANDOM_NUM_GEN_MAX_ENTROPY)) { result = randBytes(buffer, bytes_needed); if (result == OK) ossl_rand_pool_add_end(pool, bytes_needed, 8 * bytes_needed); /* * no else here: randStatus said ok, if randBytes failed * it will result in another loop or no entropy */ } else { /* * give a minimum delay here to allow OS to collect more * entropy. taskDelay duration will depend on the system tick, * this is by design as the sw-random lib uses interrupts * which will at least happen during ticks */ taskDelay(5); } retryCount++; } } return ossl_rand_pool_entropy_available(pool); #else /* * SEED_NONE means none, without randlib we dont have entropy and * rely on it being added externally */ return ossl_rand_pool_entropy_available(pool); #endif /* defined(RAND_SEED_VXRANDLIB) */ }
./openssl/providers/implementations/rands/seeding/rand_cpu_x86.c
/* * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "internal/cryptlib.h" #include <openssl/opensslconf.h> #include "crypto/rand_pool.h" #include "prov/seeding.h" #ifdef OPENSSL_RAND_SEED_RDCPU # if defined(OPENSSL_SYS_TANDEM) && defined(_TNS_X_TARGET) # include <builtin.h> /* _rdrand64 */ # include <string.h> /* memcpy */ # else size_t OPENSSL_ia32_rdseed_bytes(unsigned char *buf, size_t len); size_t OPENSSL_ia32_rdrand_bytes(unsigned char *buf, size_t len); # endif static size_t get_hardware_random_value(unsigned char *buf, size_t len); /* * Acquire entropy using Intel-specific cpu instructions * * Uses the RDSEED instruction if available, otherwise uses * RDRAND if available. * * For the differences between RDSEED and RDRAND, and why RDSEED * is the preferred choice, see https://goo.gl/oK3KcN * * Returns the total entropy count, if it exceeds the requested * entropy count. Otherwise, returns an entropy count of 0. */ size_t ossl_prov_acquire_entropy_from_cpu(RAND_POOL *pool) { size_t bytes_needed; unsigned char *buffer; bytes_needed = ossl_rand_pool_bytes_needed(pool, 1 /*entropy_factor*/); if (bytes_needed > 0) { buffer = ossl_rand_pool_add_begin(pool, bytes_needed); if (buffer != NULL) { if (get_hardware_random_value(buffer, bytes_needed) == bytes_needed) { ossl_rand_pool_add_end(pool, bytes_needed, 8 * bytes_needed); } else { ossl_rand_pool_add_end(pool, 0, 0); } } } return ossl_rand_pool_entropy_available(pool); } #if defined(OPENSSL_SYS_TANDEM) && defined(_TNS_X_TARGET) /* Obtain random bytes from the x86 hardware random function in 64 bit chunks */ static size_t get_hardware_random_value(unsigned char *buf, size_t len) { size_t bytes_remaining = len; while (bytes_remaining > 0) { /* Always use 64 bit fetch, then use the lower bytes as needed. */ /* The platform is big-endian. */ uint64_t random_value = 0; if (_rdrand64(&random_value) != 0) { unsigned char *random_buffer = (unsigned char *)&random_value; if (bytes_remaining >= sizeof(random_value)) { memcpy(buf, random_buffer, sizeof(random_value)); bytes_remaining -= sizeof(random_value); buf += sizeof(random_value); } else { memcpy(buf, random_buffer + (sizeof(random_value) - bytes_remaining), bytes_remaining); bytes_remaining = 0; /* This will terminate the loop */ } } else break; } if (bytes_remaining == 0) return len; return 0; } #else static size_t get_hardware_random_value(unsigned char *buf, size_t len) { /* Whichever comes first, use RDSEED, RDRAND or nothing */ if ((OPENSSL_ia32cap_P[2] & (1 << 18)) != 0) { if (OPENSSL_ia32_rdseed_bytes(buf, len) != len) return 0; } else if ((OPENSSL_ia32cap_P[1] & (1 << (62 - 32))) != 0) { if (OPENSSL_ia32_rdrand_bytes(buf, len) != len) return 0; } else return 0; return len; } #endif #else NON_EMPTY_TRANSLATION_UNIT #endif
./openssl/providers/implementations/rands/seeding/rand_win.c
/* * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "internal/cryptlib.h" #include <openssl/rand.h> #include "crypto/rand_pool.h" #include "crypto/rand.h" #include "prov/seeding.h" #if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_WIN32) # ifndef OPENSSL_RAND_SEED_OS # error "Unsupported seeding method configured; must be os" # endif # include <windows.h> /* On Windows Vista or higher use BCrypt instead of the legacy CryptoAPI */ # if defined(_MSC_VER) && _MSC_VER > 1500 /* 1500 = Visual Studio 2008 */ \ && defined(_WIN32_WINNT) && _WIN32_WINNT >= 0x0600 # define USE_BCRYPTGENRANDOM # endif # ifdef USE_BCRYPTGENRANDOM # include <bcrypt.h> # ifdef _MSC_VER # pragma comment(lib, "bcrypt.lib") # endif # ifndef STATUS_SUCCESS # define STATUS_SUCCESS ((NTSTATUS)0x00000000L) # endif # else # include <wincrypt.h> /* * Intel hardware RNG CSP -- available from * http://developer.intel.com/design/security/rng/redist_license.htm */ # define PROV_INTEL_SEC 22 # define INTEL_DEF_PROV L"Intel Hardware Cryptographic Service Provider" # endif size_t ossl_pool_acquire_entropy(RAND_POOL *pool) { # ifndef USE_BCRYPTGENRANDOM HCRYPTPROV hProvider; # endif unsigned char *buffer; size_t bytes_needed; size_t entropy_available = 0; # ifdef OPENSSL_RAND_SEED_RDTSC entropy_available = ossl_prov_acquire_entropy_from_tsc(pool); if (entropy_available > 0) return entropy_available; # endif # ifdef OPENSSL_RAND_SEED_RDCPU entropy_available = ossl_prov_acquire_entropy_from_cpu(pool); if (entropy_available > 0) return entropy_available; # endif # ifdef USE_BCRYPTGENRANDOM bytes_needed = ossl_rand_pool_bytes_needed(pool, 1 /*entropy_factor*/); buffer = ossl_rand_pool_add_begin(pool, bytes_needed); if (buffer != NULL) { size_t bytes = 0; if (BCryptGenRandom(NULL, buffer, bytes_needed, BCRYPT_USE_SYSTEM_PREFERRED_RNG) == STATUS_SUCCESS) bytes = bytes_needed; ossl_rand_pool_add_end(pool, bytes, 8 * bytes); entropy_available = ossl_rand_pool_entropy_available(pool); } if (entropy_available > 0) return entropy_available; # else bytes_needed = ossl_rand_pool_bytes_needed(pool, 1 /*entropy_factor*/); buffer = ossl_rand_pool_add_begin(pool, bytes_needed); if (buffer != NULL) { size_t bytes = 0; /* poll the CryptoAPI PRNG */ if (CryptAcquireContextW(&hProvider, NULL, NULL, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT | CRYPT_SILENT) != 0) { if (CryptGenRandom(hProvider, bytes_needed, buffer) != 0) bytes = bytes_needed; CryptReleaseContext(hProvider, 0); } ossl_rand_pool_add_end(pool, bytes, 8 * bytes); entropy_available = ossl_rand_pool_entropy_available(pool); } if (entropy_available > 0) return entropy_available; bytes_needed = ossl_rand_pool_bytes_needed(pool, 1 /*entropy_factor*/); buffer = ossl_rand_pool_add_begin(pool, bytes_needed); if (buffer != NULL) { size_t bytes = 0; /* poll the Pentium PRG with CryptoAPI */ if (CryptAcquireContextW(&hProvider, NULL, INTEL_DEF_PROV, PROV_INTEL_SEC, CRYPT_VERIFYCONTEXT | CRYPT_SILENT) != 0) { if (CryptGenRandom(hProvider, bytes_needed, buffer) != 0) bytes = bytes_needed; CryptReleaseContext(hProvider, 0); } ossl_rand_pool_add_end(pool, bytes, 8 * bytes); entropy_available = ossl_rand_pool_entropy_available(pool); } if (entropy_available > 0) return entropy_available; # endif return ossl_rand_pool_entropy_available(pool); } int ossl_pool_add_nonce_data(RAND_POOL *pool) { struct { DWORD pid; DWORD tid; FILETIME time; } data; /* Erase the entire structure including any padding */ memset(&data, 0, sizeof(data)); /* * Add process id, thread id, and a high resolution timestamp to * ensure that the nonce is unique with high probability for * different process instances. */ data.pid = GetCurrentProcessId(); data.tid = GetCurrentThreadId(); GetSystemTimeAsFileTime(&data.time); return ossl_rand_pool_add(pool, (unsigned char *)&data, sizeof(data), 0); } int ossl_rand_pool_init(void) { return 1; } void ossl_rand_pool_cleanup(void) { } void ossl_rand_pool_keep_random_devices_open(int keep) { } #endif
./openssl/providers/implementations/rands/seeding/rand_vms.c
/* * Copyright 2001-2022 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "internal/e_os.h" #define __NEW_STARLET 1 /* New starlet definitions since VMS 7.0 */ #include <unistd.h> #include "internal/cryptlib.h" #include "internal/nelem.h" #include <openssl/rand.h> #include "crypto/rand.h" #include "crypto/rand_pool.h" #include "prov/seeding.h" #include <descrip.h> #include <dvidef.h> #include <jpidef.h> #include <rmidef.h> #include <syidef.h> #include <ssdef.h> #include <starlet.h> #include <efndef.h> #include <gen64def.h> #include <iosbdef.h> #include <iledef.h> #include <lib$routines.h> #ifdef __DECC # pragma message disable DOLLARID #endif #include <dlfcn.h> /* SYS$GET_ENTROPY presence */ #ifndef OPENSSL_RAND_SEED_OS # error "Unsupported seeding method configured; must be os" #endif /* * DATA COLLECTION METHOD * ====================== * * This is a method to get low quality entropy. * It works by collecting all kinds of statistical data that * VMS offers and using them as random seed. */ /* We need to make sure we have the right size pointer in some cases */ #if __INITIAL_POINTER_SIZE == 64 # pragma pointer_size save # pragma pointer_size 32 #endif typedef uint32_t *uint32_t__ptr32; #if __INITIAL_POINTER_SIZE == 64 # pragma pointer_size restore #endif struct item_st { short length, code; /* length is number of bytes */ }; static const struct item_st DVI_item_data[] = { {4, DVI$_ERRCNT}, {4, DVI$_REFCNT}, }; static const struct item_st JPI_item_data[] = { {4, JPI$_BUFIO}, {4, JPI$_CPUTIM}, {4, JPI$_DIRIO}, {4, JPI$_IMAGECOUNT}, {4, JPI$_PAGEFLTS}, {4, JPI$_PID}, {4, JPI$_PPGCNT}, {4, JPI$_WSPEAK}, /* * Note: the direct result is just a 32-bit address. However, it points * to a list of 4 32-bit words, so we make extra space for them so we can * do in-place replacement of values */ {16, JPI$_FINALEXC}, }; static const struct item_st JPI_item_data_64bit[] = { {8, JPI$_LAST_LOGIN_I}, {8, JPI$_LOGINTIM}, }; static const struct item_st RMI_item_data[] = { {4, RMI$_COLPG}, {4, RMI$_MWAIT}, {4, RMI$_CEF}, {4, RMI$_PFW}, {4, RMI$_LEF}, {4, RMI$_LEFO}, {4, RMI$_HIB}, {4, RMI$_HIBO}, {4, RMI$_SUSP}, {4, RMI$_SUSPO}, {4, RMI$_FPG}, {4, RMI$_COM}, {4, RMI$_COMO}, {4, RMI$_CUR}, #if defined __alpha {4, RMI$_FRLIST}, {4, RMI$_MODLIST}, #endif {4, RMI$_FAULTS}, {4, RMI$_PREADS}, {4, RMI$_PWRITES}, {4, RMI$_PWRITIO}, {4, RMI$_PREADIO}, {4, RMI$_GVALFLTS}, {4, RMI$_WRTINPROG}, {4, RMI$_FREFLTS}, {4, RMI$_DZROFLTS}, {4, RMI$_SYSFAULTS}, {4, RMI$_ISWPCNT}, {4, RMI$_DIRIO}, {4, RMI$_BUFIO}, {4, RMI$_MBREADS}, {4, RMI$_MBWRITES}, {4, RMI$_LOGNAM}, {4, RMI$_FCPCALLS}, {4, RMI$_FCPREAD}, {4, RMI$_FCPWRITE}, {4, RMI$_FCPCACHE}, {4, RMI$_FCPCPU}, {4, RMI$_FCPHIT}, {4, RMI$_FCPSPLIT}, {4, RMI$_FCPFAULT}, {4, RMI$_ENQNEW}, {4, RMI$_ENQCVT}, {4, RMI$_DEQ}, {4, RMI$_BLKAST}, {4, RMI$_ENQWAIT}, {4, RMI$_ENQNOTQD}, {4, RMI$_DLCKSRCH}, {4, RMI$_DLCKFND}, {4, RMI$_NUMLOCKS}, {4, RMI$_NUMRES}, {4, RMI$_ARRLOCPK}, {4, RMI$_DEPLOCPK}, {4, RMI$_ARRTRAPK}, {4, RMI$_TRCNGLOS}, {4, RMI$_RCVBUFFL}, {4, RMI$_ENQNEWLOC}, {4, RMI$_ENQNEWIN}, {4, RMI$_ENQNEWOUT}, {4, RMI$_ENQCVTLOC}, {4, RMI$_ENQCVTIN}, {4, RMI$_ENQCVTOUT}, {4, RMI$_DEQLOC}, {4, RMI$_DEQIN}, {4, RMI$_DEQOUT}, {4, RMI$_BLKLOC}, {4, RMI$_BLKIN}, {4, RMI$_BLKOUT}, {4, RMI$_DIRIN}, {4, RMI$_DIROUT}, /* We currently get a fault when trying these */ #if 0 {140, RMI$_MSCP_EVERYTHING}, /* 35 32-bit words */ {152, RMI$_DDTM_ALL}, /* 38 32-bit words */ {80, RMI$_TMSCP_EVERYTHING} /* 20 32-bit words */ #endif {4, RMI$_LPZ_PAGCNT}, {4, RMI$_LPZ_HITS}, {4, RMI$_LPZ_MISSES}, {4, RMI$_LPZ_EXPCNT}, {4, RMI$_LPZ_ALLOCF}, {4, RMI$_LPZ_ALLOC2}, {4, RMI$_ACCESS}, {4, RMI$_ALLOC}, {4, RMI$_FCPCREATE}, {4, RMI$_VOLWAIT}, {4, RMI$_FCPTURN}, {4, RMI$_FCPERASE}, {4, RMI$_OPENS}, {4, RMI$_FIDHIT}, {4, RMI$_FIDMISS}, {4, RMI$_FILHDR_HIT}, {4, RMI$_DIRFCB_HIT}, {4, RMI$_DIRFCB_MISS}, {4, RMI$_DIRDATA_HIT}, {4, RMI$_EXTHIT}, {4, RMI$_EXTMISS}, {4, RMI$_QUOHIT}, {4, RMI$_QUOMISS}, {4, RMI$_STORAGMAP_HIT}, {4, RMI$_VOLLCK}, {4, RMI$_SYNCHLCK}, {4, RMI$_SYNCHWAIT}, {4, RMI$_ACCLCK}, {4, RMI$_XQPCACHEWAIT}, {4, RMI$_DIRDATA_MISS}, {4, RMI$_FILHDR_MISS}, {4, RMI$_STORAGMAP_MISS}, {4, RMI$_PROCCNTMAX}, {4, RMI$_PROCBATCNT}, {4, RMI$_PROCINTCNT}, {4, RMI$_PROCNETCNT}, {4, RMI$_PROCSWITCHCNT}, {4, RMI$_PROCBALSETCNT}, {4, RMI$_PROCLOADCNT}, {4, RMI$_BADFLTS}, {4, RMI$_EXEFAULTS}, {4, RMI$_HDRINSWAPS}, {4, RMI$_HDROUTSWAPS}, {4, RMI$_IOPAGCNT}, {4, RMI$_ISWPCNTPG}, {4, RMI$_OSWPCNT}, {4, RMI$_OSWPCNTPG}, {4, RMI$_RDFAULTS}, {4, RMI$_TRANSFLTS}, {4, RMI$_WRTFAULTS}, #if defined __alpha {4, RMI$_USERPAGES}, #endif {4, RMI$_VMSPAGES}, {4, RMI$_TTWRITES}, {4, RMI$_BUFOBJPAG}, {4, RMI$_BUFOBJPAGPEAK}, {4, RMI$_BUFOBJPAGS01}, {4, RMI$_BUFOBJPAGS2}, {4, RMI$_BUFOBJPAGMAXS01}, {4, RMI$_BUFOBJPAGMAXS2}, {4, RMI$_BUFOBJPAGPEAKS01}, {4, RMI$_BUFOBJPAGPEAKS2}, {4, RMI$_BUFOBJPGLTMAXS01}, {4, RMI$_BUFOBJPGLTMAXS2}, {4, RMI$_DLCK_INCMPLT}, {4, RMI$_DLCKMSGS_IN}, {4, RMI$_DLCKMSGS_OUT}, {4, RMI$_MCHKERRS}, {4, RMI$_MEMERRS}, }; static const struct item_st RMI_item_data_64bit[] = { #if defined __ia64 {8, RMI$_FRLIST}, {8, RMI$_MODLIST}, #endif {8, RMI$_LCKMGR_REQCNT}, {8, RMI$_LCKMGR_REQTIME}, {8, RMI$_LCKMGR_SPINCNT}, {8, RMI$_LCKMGR_SPINTIME}, {8, RMI$_CPUINTSTK}, {8, RMI$_CPUMPSYNCH}, {8, RMI$_CPUKERNEL}, {8, RMI$_CPUEXEC}, {8, RMI$_CPUSUPER}, {8, RMI$_CPUUSER}, #if defined __ia64 {8, RMI$_USERPAGES}, #endif {8, RMI$_TQETOTAL}, {8, RMI$_TQESYSUB}, {8, RMI$_TQEUSRTIMR}, {8, RMI$_TQEUSRWAKE}, }; static const struct item_st SYI_item_data[] = { {4, SYI$_PAGEFILE_FREE}, }; /* * Input: * items_data - an array of lengths and codes * items_data_num - number of elements in that array * * Output: * items - pre-allocated ILE3 array to be filled. * It's assumed to have items_data_num elements plus * one extra for the terminating NULL element * databuffer - pre-allocated 32-bit word array. * * Returns the number of elements used in databuffer */ static size_t prepare_item_list(const struct item_st *items_input, size_t items_input_num, ILE3 *items, uint32_t__ptr32 databuffer) { size_t data_sz = 0; for (; items_input_num-- > 0; items_input++, items++) { items->ile3$w_code = items_input->code; /* Special treatment of JPI$_FINALEXC */ if (items->ile3$w_code == JPI$_FINALEXC) items->ile3$w_length = 4; else items->ile3$w_length = items_input->length; items->ile3$ps_bufaddr = databuffer; items->ile3$ps_retlen_addr = 0; databuffer += items_input->length / sizeof(databuffer[0]); data_sz += items_input->length; } /* Terminating NULL entry */ items->ile3$w_length = items->ile3$w_code = 0; items->ile3$ps_bufaddr = items->ile3$ps_retlen_addr = NULL; return data_sz / sizeof(databuffer[0]); } static void massage_JPI(ILE3 *items) { /* * Special treatment of JPI$_FINALEXC * The result of that item's data buffer is a 32-bit address to a list of * 4 32-bit words. */ for (; items->ile3$w_length != 0; items++) { if (items->ile3$w_code == JPI$_FINALEXC) { uint32_t *data = items->ile3$ps_bufaddr; uint32_t *ptr = (uint32_t *)*data; size_t j; /* * We know we made space for 4 32-bit words, so we can do in-place * replacement. */ for (j = 0; j < 4; j++) data[j] = ptr[j]; break; } } } /* * This number expresses how many bits of data contain 1 bit of entropy. * * For the moment, we assume about 0.05 entropy bits per data bit, or 1 * bit of entropy per 20 data bits. */ #define ENTROPY_FACTOR 20 size_t data_collect_method(RAND_POOL *pool) { ILE3 JPI_items_64bit[OSSL_NELEM(JPI_item_data_64bit) + 1]; ILE3 RMI_items_64bit[OSSL_NELEM(RMI_item_data_64bit) + 1]; ILE3 DVI_items[OSSL_NELEM(DVI_item_data) + 1]; ILE3 JPI_items[OSSL_NELEM(JPI_item_data) + 1]; ILE3 RMI_items[OSSL_NELEM(RMI_item_data) + 1]; ILE3 SYI_items[OSSL_NELEM(SYI_item_data) + 1]; union { /* This ensures buffer starts at 64 bit boundary */ uint64_t dummy; uint32_t buffer[OSSL_NELEM(JPI_item_data_64bit) * 2 + OSSL_NELEM(RMI_item_data_64bit) * 2 + OSSL_NELEM(DVI_item_data) + OSSL_NELEM(JPI_item_data) + OSSL_NELEM(RMI_item_data) + OSSL_NELEM(SYI_item_data) + 4 /* For JPI$_FINALEXC */]; } data; size_t total_elems = 0; size_t total_length = 0; size_t bytes_needed = ossl_rand_pool_bytes_needed(pool, ENTROPY_FACTOR); size_t bytes_remaining = ossl_rand_pool_bytes_remaining(pool); /* Take all the 64-bit items first, to ensure proper alignment of data */ total_elems += prepare_item_list(JPI_item_data_64bit, OSSL_NELEM(JPI_item_data_64bit), JPI_items_64bit, &data.buffer[total_elems]); total_elems += prepare_item_list(RMI_item_data_64bit, OSSL_NELEM(RMI_item_data_64bit), RMI_items_64bit, &data.buffer[total_elems]); /* Now the 32-bit items */ total_elems += prepare_item_list(DVI_item_data, OSSL_NELEM(DVI_item_data), DVI_items, &data.buffer[total_elems]); total_elems += prepare_item_list(JPI_item_data, OSSL_NELEM(JPI_item_data), JPI_items, &data.buffer[total_elems]); total_elems += prepare_item_list(RMI_item_data, OSSL_NELEM(RMI_item_data), RMI_items, &data.buffer[total_elems]); total_elems += prepare_item_list(SYI_item_data, OSSL_NELEM(SYI_item_data), SYI_items, &data.buffer[total_elems]); total_length = total_elems * sizeof(data.buffer[0]); /* Fill data.buffer with various info bits from this process */ { uint32_t status; uint32_t efn; IOSB iosb; $DESCRIPTOR(SYSDEVICE, "SYS$SYSDEVICE:"); if ((status = sys$getdviw(EFN$C_ENF, 0, &SYSDEVICE, DVI_items, 0, 0, 0, 0, 0)) != SS$_NORMAL) { lib$signal(status); return 0; } if ((status = sys$getjpiw(EFN$C_ENF, 0, 0, JPI_items_64bit, 0, 0, 0)) != SS$_NORMAL) { lib$signal(status); return 0; } if ((status = sys$getjpiw(EFN$C_ENF, 0, 0, JPI_items, 0, 0, 0)) != SS$_NORMAL) { lib$signal(status); return 0; } if ((status = sys$getsyiw(EFN$C_ENF, 0, 0, SYI_items, 0, 0, 0)) != SS$_NORMAL) { lib$signal(status); return 0; } /* * The RMI service is a bit special, as there is no synchronous * variant, so we MUST create an event flag to synchronise on. */ if ((status = lib$get_ef(&efn)) != SS$_NORMAL) { lib$signal(status); return 0; } if ((status = sys$getrmi(efn, 0, 0, RMI_items_64bit, &iosb, 0, 0)) != SS$_NORMAL) { lib$signal(status); return 0; } if ((status = sys$synch(efn, &iosb)) != SS$_NORMAL) { lib$signal(status); return 0; } if (iosb.iosb$l_getxxi_status != SS$_NORMAL) { lib$signal(iosb.iosb$l_getxxi_status); return 0; } if ((status = sys$getrmi(efn, 0, 0, RMI_items, &iosb, 0, 0)) != SS$_NORMAL) { lib$signal(status); return 0; } if ((status = sys$synch(efn, &iosb)) != SS$_NORMAL) { lib$signal(status); return 0; } if (iosb.iosb$l_getxxi_status != SS$_NORMAL) { lib$signal(iosb.iosb$l_getxxi_status); return 0; } if ((status = lib$free_ef(&efn)) != SS$_NORMAL) { lib$signal(status); return 0; } } massage_JPI(JPI_items); /* * If we can't feed the requirements from the caller, we're in deep trouble. */ if (!ossl_assert(total_length >= bytes_needed)) { ERR_raise_data(ERR_LIB_RAND, RAND_R_RANDOM_POOL_UNDERFLOW, "Needed: %zu, Available: %zu", bytes_needed, total_length); return 0; } /* * Try not to overfeed the pool */ if (total_length > bytes_remaining) total_length = bytes_remaining; /* We give the pessimistic value for the amount of entropy */ ossl_rand_pool_add(pool, (unsigned char *)data.buffer, total_length, 8 * total_length / ENTROPY_FACTOR); return ossl_rand_pool_entropy_available(pool); } /* * SYS$GET_ENTROPY METHOD * ====================== * * This is a high entropy method based on a new system service that is * based on getentropy() from FreeBSD 12. It's only used if available, * and its availability is detected at run-time. * * We assume that this function provides full entropy random output. */ #define PUBLIC_VECTORS "SYS$LIBRARY:SYS$PUBLIC_VECTORS.EXE" #define GET_ENTROPY "SYS$GET_ENTROPY" static int get_entropy_address_flag = 0; static int (*get_entropy_address)(void *buffer, size_t buffer_size) = NULL; static int init_get_entropy_address(void) { if (get_entropy_address_flag == 0) get_entropy_address = dlsym(dlopen(PUBLIC_VECTORS, 0), GET_ENTROPY); get_entropy_address_flag = 1; return get_entropy_address != NULL; } size_t get_entropy_method(RAND_POOL *pool) { /* * The documentation says that SYS$GET_ENTROPY will give a maximum of * 256 bytes of data. */ unsigned char buffer[256]; size_t bytes_needed; size_t bytes_to_get = 0; uint32_t status; for (bytes_needed = ossl_rand_pool_bytes_needed(pool, 1); bytes_needed > 0; bytes_needed -= bytes_to_get) { bytes_to_get = bytes_needed > sizeof(buffer) ? sizeof(buffer) : bytes_needed; status = get_entropy_address(buffer, bytes_to_get); if (status == SS$_RETRY) { /* Set to zero so the loop doesn't diminish |bytes_needed| */ bytes_to_get = 0; /* Should sleep some amount of time */ continue; } if (status != SS$_NORMAL) { lib$signal(status); return 0; } ossl_rand_pool_add(pool, buffer, bytes_to_get, 8 * bytes_to_get); } return ossl_rand_pool_entropy_available(pool); } /* * MAIN ENTROPY ACQUISITION FUNCTIONS * ================================== * * These functions are called by the RAND / DRBG functions */ size_t ossl_pool_acquire_entropy(RAND_POOL *pool) { if (init_get_entropy_address()) return get_entropy_method(pool); return data_collect_method(pool); } int ossl_pool_add_nonce_data(RAND_POOL *pool) { /* * Two variables to ensure that two nonces won't ever be the same */ static unsigned __int64 last_time = 0; static unsigned __int32 last_seq = 0; struct { pid_t pid; CRYPTO_THREAD_ID tid; unsigned __int64 time; unsigned __int32 seq; } data; /* Erase the entire structure including any padding */ memset(&data, 0, sizeof(data)); /* * Add process id, thread id, a timestamp, and a sequence number in case * the same time stamp is repeated, to ensure that the nonce is unique * with high probability for different process instances. * * The normal OpenVMS time is specified to be high granularity (100ns), * but the time update granularity given by sys$gettim() may be lower. * * OpenVMS version 8.4 (which is the latest for Alpha and Itanium) and * on have sys$gettim_prec() as well, which is supposedly having a better * time update granularity, but tests on Itanium (and even Alpha) have * shown that compared with sys$gettim(), the difference is marginal, * so of very little significance in terms of entropy. * Given that, and that it's a high ask to expect everyone to have * upgraded to OpenVMS version 8.4, only sys$gettim() is used, and a * sequence number is added as well, in case sys$gettim() returns the * same time value more than once. * * This function is assumed to be called under thread lock, and does * therefore not take concurrency into account. */ data.pid = getpid(); data.tid = CRYPTO_THREAD_get_current_id(); data.seq = 0; sys$gettim((void*)&data.time); if (data.time == last_time) { data.seq = ++last_seq; } else { last_time = data.time; last_seq = 0; } return ossl_rand_pool_add(pool, (unsigned char *)&data, sizeof(data), 0); } int ossl_rand_pool_init(void) { return 1; } void ossl_rand_pool_cleanup(void) { } void ossl_rand_pool_keep_random_devices_open(int keep) { }
./openssl/providers/implementations/rands/seeding/rand_tsc.c
/* * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "internal/cryptlib.h" #include <openssl/opensslconf.h> #include "crypto/rand_pool.h" #include "prov/seeding.h" #ifdef OPENSSL_RAND_SEED_RDTSC /* * IMPORTANT NOTE: It is not currently possible to use this code * because we are not sure about the amount of randomness it provides. * Some SP800-90B tests have been run, but there is internal skepticism. * So for now this code is not used. */ # error "RDTSC enabled? Should not be possible!" /* * Acquire entropy from high-speed clock * * Since we get some randomness from the low-order bits of the * high-speed clock, it can help. * * Returns the total entropy count, if it exceeds the requested * entropy count. Otherwise, returns an entropy count of 0. */ size_t ossl_prov_acquire_entropy_from_tsc(RAND_POOL *pool) { unsigned char c; int i; if ((OPENSSL_ia32cap_P[0] & (1 << 4)) != 0) { for (i = 0; i < TSC_READ_COUNT; i++) { c = (unsigned char)(OPENSSL_rdtsc() & 0xFF); ossl_rand_pool_add(pool, &c, 1, 4); } } return ossl_rand_pool_entropy_available(pool); } #else NON_EMPTY_TRANSLATION_UNIT #endif
./openssl/providers/implementations/keymgmt/ecx_kmgmt.c
/* * Copyright 2020-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <assert.h> #include <string.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/params.h> #include <openssl/err.h> #include <openssl/proverr.h> #include <openssl/evp.h> #include <openssl/rand.h> #include "internal/param_build_set.h" #include <openssl/param_build.h> #include "crypto/ecx.h" #include "prov/implementations.h" #include "prov/providercommon.h" #include "prov/provider_ctx.h" #include "prov/ecx.h" #ifdef S390X_EC_ASM # include "s390x_arch.h" # include <openssl/sha.h> /* For SHA512_DIGEST_LENGTH */ #endif static OSSL_FUNC_keymgmt_new_fn x25519_new_key; static OSSL_FUNC_keymgmt_new_fn x448_new_key; static OSSL_FUNC_keymgmt_new_fn ed25519_new_key; static OSSL_FUNC_keymgmt_new_fn ed448_new_key; static OSSL_FUNC_keymgmt_gen_init_fn x25519_gen_init; static OSSL_FUNC_keymgmt_gen_init_fn x448_gen_init; static OSSL_FUNC_keymgmt_gen_init_fn ed25519_gen_init; static OSSL_FUNC_keymgmt_gen_init_fn ed448_gen_init; static OSSL_FUNC_keymgmt_gen_fn x25519_gen; static OSSL_FUNC_keymgmt_gen_fn x448_gen; static OSSL_FUNC_keymgmt_gen_fn ed25519_gen; static OSSL_FUNC_keymgmt_gen_fn ed448_gen; static OSSL_FUNC_keymgmt_gen_cleanup_fn ecx_gen_cleanup; static OSSL_FUNC_keymgmt_gen_set_params_fn ecx_gen_set_params; static OSSL_FUNC_keymgmt_gen_settable_params_fn ecx_gen_settable_params; static OSSL_FUNC_keymgmt_load_fn ecx_load; static OSSL_FUNC_keymgmt_get_params_fn x25519_get_params; static OSSL_FUNC_keymgmt_get_params_fn x448_get_params; static OSSL_FUNC_keymgmt_get_params_fn ed25519_get_params; static OSSL_FUNC_keymgmt_get_params_fn ed448_get_params; static OSSL_FUNC_keymgmt_gettable_params_fn x25519_gettable_params; static OSSL_FUNC_keymgmt_gettable_params_fn x448_gettable_params; static OSSL_FUNC_keymgmt_gettable_params_fn ed25519_gettable_params; static OSSL_FUNC_keymgmt_gettable_params_fn ed448_gettable_params; static OSSL_FUNC_keymgmt_set_params_fn x25519_set_params; static OSSL_FUNC_keymgmt_set_params_fn x448_set_params; static OSSL_FUNC_keymgmt_set_params_fn ed25519_set_params; static OSSL_FUNC_keymgmt_set_params_fn ed448_set_params; static OSSL_FUNC_keymgmt_settable_params_fn x25519_settable_params; static OSSL_FUNC_keymgmt_settable_params_fn x448_settable_params; static OSSL_FUNC_keymgmt_settable_params_fn ed25519_settable_params; static OSSL_FUNC_keymgmt_settable_params_fn ed448_settable_params; static OSSL_FUNC_keymgmt_has_fn ecx_has; static OSSL_FUNC_keymgmt_match_fn ecx_match; static OSSL_FUNC_keymgmt_validate_fn x25519_validate; static OSSL_FUNC_keymgmt_validate_fn x448_validate; static OSSL_FUNC_keymgmt_validate_fn ed25519_validate; static OSSL_FUNC_keymgmt_validate_fn ed448_validate; static OSSL_FUNC_keymgmt_import_fn ecx_import; static OSSL_FUNC_keymgmt_import_types_fn ecx_imexport_types; static OSSL_FUNC_keymgmt_export_fn ecx_export; static OSSL_FUNC_keymgmt_export_types_fn ecx_imexport_types; static OSSL_FUNC_keymgmt_dup_fn ecx_dup; #define ECX_POSSIBLE_SELECTIONS (OSSL_KEYMGMT_SELECT_KEYPAIR) struct ecx_gen_ctx { OSSL_LIB_CTX *libctx; char *propq; ECX_KEY_TYPE type; int selection; unsigned char *dhkem_ikm; size_t dhkem_ikmlen; }; #ifdef S390X_EC_ASM static void *s390x_ecx_keygen25519(struct ecx_gen_ctx *gctx); static void *s390x_ecx_keygen448(struct ecx_gen_ctx *gctx); static void *s390x_ecd_keygen25519(struct ecx_gen_ctx *gctx); static void *s390x_ecd_keygen448(struct ecx_gen_ctx *gctx); #endif static void *x25519_new_key(void *provctx) { if (!ossl_prov_is_running()) return 0; return ossl_ecx_key_new(PROV_LIBCTX_OF(provctx), ECX_KEY_TYPE_X25519, 0, NULL); } static void *x448_new_key(void *provctx) { if (!ossl_prov_is_running()) return 0; return ossl_ecx_key_new(PROV_LIBCTX_OF(provctx), ECX_KEY_TYPE_X448, 0, NULL); } static void *ed25519_new_key(void *provctx) { if (!ossl_prov_is_running()) return 0; return ossl_ecx_key_new(PROV_LIBCTX_OF(provctx), ECX_KEY_TYPE_ED25519, 0, NULL); } static void *ed448_new_key(void *provctx) { if (!ossl_prov_is_running()) return 0; return ossl_ecx_key_new(PROV_LIBCTX_OF(provctx), ECX_KEY_TYPE_ED448, 0, NULL); } static int ecx_has(const void *keydata, int selection) { const ECX_KEY *key = keydata; int ok = 0; if (ossl_prov_is_running() && key != NULL) { /* * ECX keys always have all the parameters they need (i.e. none). * Therefore we always return with 1, if asked about parameters. */ ok = 1; if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) ok = ok && key->haspubkey; if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) ok = ok && key->privkey != NULL; } return ok; } static int ecx_match(const void *keydata1, const void *keydata2, int selection) { const ECX_KEY *key1 = keydata1; const ECX_KEY *key2 = keydata2; int ok = 1; if (!ossl_prov_is_running()) return 0; if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) ok = ok && key1->type == key2->type; if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { int key_checked = 0; if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { const unsigned char *pa = key1->haspubkey ? key1->pubkey : NULL; const unsigned char *pb = key2->haspubkey ? key2->pubkey : NULL; size_t pal = key1->keylen; size_t pbl = key2->keylen; if (pa != NULL && pb != NULL) { ok = ok && key1->type == key2->type && pal == pbl && CRYPTO_memcmp(pa, pb, pal) == 0; key_checked = 1; } } if (!key_checked && (selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { const unsigned char *pa = key1->privkey; const unsigned char *pb = key2->privkey; size_t pal = key1->keylen; size_t pbl = key2->keylen; if (pa != NULL && pb != NULL) { ok = ok && key1->type == key2->type && pal == pbl && CRYPTO_memcmp(pa, pb, pal) == 0; key_checked = 1; } } ok = ok && key_checked; } return ok; } static int ecx_import(void *keydata, int selection, const OSSL_PARAM params[]) { ECX_KEY *key = keydata; int ok = 1; int include_private; if (!ossl_prov_is_running() || key == NULL) return 0; if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) == 0) return 0; include_private = selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY ? 1 : 0; ok = ok && ossl_ecx_key_fromdata(key, params, include_private); return ok; } static int key_to_params(ECX_KEY *key, OSSL_PARAM_BLD *tmpl, OSSL_PARAM params[], int include_private) { if (key == NULL) return 0; if (!ossl_param_build_set_octet_string(tmpl, params, OSSL_PKEY_PARAM_PUB_KEY, key->pubkey, key->keylen)) return 0; if (include_private && key->privkey != NULL && !ossl_param_build_set_octet_string(tmpl, params, OSSL_PKEY_PARAM_PRIV_KEY, key->privkey, key->keylen)) return 0; return 1; } static int ecx_export(void *keydata, int selection, OSSL_CALLBACK *param_cb, void *cbarg) { ECX_KEY *key = keydata; OSSL_PARAM_BLD *tmpl; OSSL_PARAM *params = NULL; int ret = 0; if (!ossl_prov_is_running() || key == NULL) return 0; if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) == 0) return 0; tmpl = OSSL_PARAM_BLD_new(); if (tmpl == NULL) return 0; if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { int include_private = ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0); if (!key_to_params(key, tmpl, NULL, include_private)) goto err; } params = OSSL_PARAM_BLD_to_param(tmpl); if (params == NULL) goto err; ret = param_cb(params, cbarg); OSSL_PARAM_free(params); err: OSSL_PARAM_BLD_free(tmpl); return ret; } #define ECX_KEY_TYPES() \ OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_PUB_KEY, NULL, 0), \ OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_PRIV_KEY, NULL, 0) static const OSSL_PARAM ecx_key_types[] = { ECX_KEY_TYPES(), OSSL_PARAM_END }; static const OSSL_PARAM *ecx_imexport_types(int selection) { if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) return ecx_key_types; return NULL; } static int ecx_get_params(void *key, OSSL_PARAM params[], int bits, int secbits, int size) { ECX_KEY *ecx = key; OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_BITS)) != NULL && !OSSL_PARAM_set_int(p, bits)) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_SECURITY_BITS)) != NULL && !OSSL_PARAM_set_int(p, secbits)) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_MAX_SIZE)) != NULL && !OSSL_PARAM_set_int(p, size)) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY)) != NULL && (ecx->type == ECX_KEY_TYPE_X25519 || ecx->type == ECX_KEY_TYPE_X448)) { if (!OSSL_PARAM_set_octet_string(p, ecx->pubkey, ecx->keylen)) return 0; } return key_to_params(ecx, NULL, params, 1); } static int ed_get_params(void *key, OSSL_PARAM params[]) { OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_MANDATORY_DIGEST)) != NULL && !OSSL_PARAM_set_utf8_string(p, "")) return 0; return 1; } static int x25519_get_params(void *key, OSSL_PARAM params[]) { return ecx_get_params(key, params, X25519_BITS, X25519_SECURITY_BITS, X25519_KEYLEN); } static int x448_get_params(void *key, OSSL_PARAM params[]) { return ecx_get_params(key, params, X448_BITS, X448_SECURITY_BITS, X448_KEYLEN); } static int ed25519_get_params(void *key, OSSL_PARAM params[]) { return ecx_get_params(key, params, ED25519_BITS, ED25519_SECURITY_BITS, ED25519_SIGSIZE) && ed_get_params(key, params); } static int ed448_get_params(void *key, OSSL_PARAM params[]) { return ecx_get_params(key, params, ED448_BITS, ED448_SECURITY_BITS, ED448_SIGSIZE) && ed_get_params(key, params); } static const OSSL_PARAM ecx_gettable_params[] = { OSSL_PARAM_int(OSSL_PKEY_PARAM_BITS, NULL), OSSL_PARAM_int(OSSL_PKEY_PARAM_SECURITY_BITS, NULL), OSSL_PARAM_int(OSSL_PKEY_PARAM_MAX_SIZE, NULL), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_MANDATORY_DIGEST, NULL, 0), OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY, NULL, 0), ECX_KEY_TYPES(), OSSL_PARAM_END }; static const OSSL_PARAM ed_gettable_params[] = { OSSL_PARAM_int(OSSL_PKEY_PARAM_BITS, NULL), OSSL_PARAM_int(OSSL_PKEY_PARAM_SECURITY_BITS, NULL), OSSL_PARAM_int(OSSL_PKEY_PARAM_MAX_SIZE, NULL), ECX_KEY_TYPES(), OSSL_PARAM_END }; static const OSSL_PARAM *x25519_gettable_params(void *provctx) { return ecx_gettable_params; } static const OSSL_PARAM *x448_gettable_params(void *provctx) { return ecx_gettable_params; } static const OSSL_PARAM *ed25519_gettable_params(void *provctx) { return ed_gettable_params; } static const OSSL_PARAM *ed448_gettable_params(void *provctx) { return ed_gettable_params; } static int set_property_query(ECX_KEY *ecxkey, const char *propq) { OPENSSL_free(ecxkey->propq); ecxkey->propq = NULL; if (propq != NULL) { ecxkey->propq = OPENSSL_strdup(propq); if (ecxkey->propq == NULL) return 0; } return 1; } static int ecx_set_params(void *key, const OSSL_PARAM params[]) { ECX_KEY *ecxkey = key; const OSSL_PARAM *p; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY); if (p != NULL) { void *buf = ecxkey->pubkey; if (p->data_size != ecxkey->keylen || !OSSL_PARAM_get_octet_string(p, &buf, sizeof(ecxkey->pubkey), NULL)) return 0; OPENSSL_clear_free(ecxkey->privkey, ecxkey->keylen); ecxkey->privkey = NULL; ecxkey->haspubkey = 1; } p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_PROPERTIES); if (p != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING || !set_property_query(ecxkey, p->data)) return 0; } return 1; } static int x25519_set_params(void *key, const OSSL_PARAM params[]) { return ecx_set_params(key, params); } static int x448_set_params(void *key, const OSSL_PARAM params[]) { return ecx_set_params(key, params); } static int ed25519_set_params(void *key, const OSSL_PARAM params[]) { return 1; } static int ed448_set_params(void *key, const OSSL_PARAM params[]) { return 1; } static const OSSL_PARAM ecx_settable_params[] = { OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY, NULL, 0), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM ed_settable_params[] = { OSSL_PARAM_END }; static const OSSL_PARAM *x25519_settable_params(void *provctx) { return ecx_settable_params; } static const OSSL_PARAM *x448_settable_params(void *provctx) { return ecx_settable_params; } static const OSSL_PARAM *ed25519_settable_params(void *provctx) { return ed_settable_params; } static const OSSL_PARAM *ed448_settable_params(void *provctx) { return ed_settable_params; } static void *ecx_gen_init(void *provctx, int selection, const OSSL_PARAM params[], ECX_KEY_TYPE type) { OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(provctx); struct ecx_gen_ctx *gctx = NULL; if (!ossl_prov_is_running()) return NULL; if ((gctx = OPENSSL_zalloc(sizeof(*gctx))) != NULL) { gctx->libctx = libctx; gctx->type = type; gctx->selection = selection; } if (!ecx_gen_set_params(gctx, params)) { OPENSSL_free(gctx); gctx = NULL; } return gctx; } static void *x25519_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) { return ecx_gen_init(provctx, selection, params, ECX_KEY_TYPE_X25519); } static void *x448_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) { return ecx_gen_init(provctx, selection, params, ECX_KEY_TYPE_X448); } static void *ed25519_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) { return ecx_gen_init(provctx, selection, params, ECX_KEY_TYPE_ED25519); } static void *ed448_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) { return ecx_gen_init(provctx, selection, params, ECX_KEY_TYPE_ED448); } static int ecx_gen_set_params(void *genctx, const OSSL_PARAM params[]) { struct ecx_gen_ctx *gctx = genctx; const OSSL_PARAM *p; if (gctx == NULL) return 0; p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_GROUP_NAME); if (p != NULL) { const char *groupname = NULL; /* * We optionally allow setting a group name - but each algorithm only * support one such name, so all we do is verify that it is the one we * expected. */ switch (gctx->type) { case ECX_KEY_TYPE_X25519: groupname = "x25519"; break; case ECX_KEY_TYPE_X448: groupname = "x448"; break; default: /* We only support this for key exchange at the moment */ break; } if (p->data_type != OSSL_PARAM_UTF8_STRING || groupname == NULL || OPENSSL_strcasecmp(p->data, groupname) != 0) { ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); return 0; } } p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_PROPERTIES); if (p != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING) return 0; OPENSSL_free(gctx->propq); gctx->propq = OPENSSL_strdup(p->data); if (gctx->propq == NULL) return 0; } p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_DHKEM_IKM); if (p != NULL) { if (p->data_size != 0 && p->data != NULL) { OPENSSL_free(gctx->dhkem_ikm); gctx->dhkem_ikm = NULL; if (!OSSL_PARAM_get_octet_string(p, (void **)&gctx->dhkem_ikm, 0, &gctx->dhkem_ikmlen)) return 0; } } return 1; } static const OSSL_PARAM *ecx_gen_settable_params(ossl_unused void *genctx, ossl_unused void *provctx) { static OSSL_PARAM settable[] = { OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_GROUP_NAME, NULL, 0), OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_DHKEM_IKM, NULL, 0), OSSL_PARAM_END }; return settable; } static void *ecx_gen(struct ecx_gen_ctx *gctx) { ECX_KEY *key; unsigned char *privkey; if (gctx == NULL) return NULL; if ((key = ossl_ecx_key_new(gctx->libctx, gctx->type, 0, gctx->propq)) == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_EC_LIB); return NULL; } /* If we're doing parameter generation then we just return a blank key */ if ((gctx->selection & OSSL_KEYMGMT_SELECT_KEYPAIR) == 0) return key; if ((privkey = ossl_ecx_key_allocate_privkey(key)) == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_EC_LIB); goto err; } #ifndef FIPS_MODULE if (gctx->dhkem_ikm != NULL && gctx->dhkem_ikmlen != 0) { if (gctx->type == ECX_KEY_TYPE_ED25519 || gctx->type == ECX_KEY_TYPE_ED448) goto err; if (!ossl_ecx_dhkem_derive_private(key, privkey, gctx->dhkem_ikm, gctx->dhkem_ikmlen)) goto err; } else #endif { if (RAND_priv_bytes_ex(gctx->libctx, privkey, key->keylen, 0) <= 0) goto err; } switch (gctx->type) { case ECX_KEY_TYPE_X25519: privkey[0] &= 248; privkey[X25519_KEYLEN - 1] &= 127; privkey[X25519_KEYLEN - 1] |= 64; ossl_x25519_public_from_private(key->pubkey, privkey); break; case ECX_KEY_TYPE_X448: privkey[0] &= 252; privkey[X448_KEYLEN - 1] |= 128; ossl_x448_public_from_private(key->pubkey, privkey); break; case ECX_KEY_TYPE_ED25519: if (!ossl_ed25519_public_from_private(gctx->libctx, key->pubkey, privkey, gctx->propq)) goto err; break; case ECX_KEY_TYPE_ED448: if (!ossl_ed448_public_from_private(gctx->libctx, key->pubkey, privkey, gctx->propq)) goto err; break; } key->haspubkey = 1; return key; err: ossl_ecx_key_free(key); return NULL; } static void *x25519_gen(void *genctx, OSSL_CALLBACK *osslcb, void *cbarg) { struct ecx_gen_ctx *gctx = genctx; if (!ossl_prov_is_running()) return 0; #ifdef S390X_EC_ASM if (OPENSSL_s390xcap_P.pcc[1] & S390X_CAPBIT(S390X_SCALAR_MULTIPLY_X25519)) return s390x_ecx_keygen25519(gctx); #endif return ecx_gen(gctx); } static void *x448_gen(void *genctx, OSSL_CALLBACK *osslcb, void *cbarg) { struct ecx_gen_ctx *gctx = genctx; if (!ossl_prov_is_running()) return 0; #ifdef S390X_EC_ASM if (OPENSSL_s390xcap_P.pcc[1] & S390X_CAPBIT(S390X_SCALAR_MULTIPLY_X448)) return s390x_ecx_keygen448(gctx); #endif return ecx_gen(gctx); } static void *ed25519_gen(void *genctx, OSSL_CALLBACK *osslcb, void *cbarg) { struct ecx_gen_ctx *gctx = genctx; if (!ossl_prov_is_running()) return 0; #ifdef S390X_EC_ASM if (OPENSSL_s390xcap_P.pcc[1] & S390X_CAPBIT(S390X_SCALAR_MULTIPLY_ED25519) && OPENSSL_s390xcap_P.kdsa[0] & S390X_CAPBIT(S390X_EDDSA_SIGN_ED25519) && OPENSSL_s390xcap_P.kdsa[0] & S390X_CAPBIT(S390X_EDDSA_VERIFY_ED25519)) return s390x_ecd_keygen25519(gctx); #endif return ecx_gen(gctx); } static void *ed448_gen(void *genctx, OSSL_CALLBACK *osslcb, void *cbarg) { struct ecx_gen_ctx *gctx = genctx; if (!ossl_prov_is_running()) return 0; #ifdef S390X_EC_ASM if (OPENSSL_s390xcap_P.pcc[1] & S390X_CAPBIT(S390X_SCALAR_MULTIPLY_ED448) && OPENSSL_s390xcap_P.kdsa[0] & S390X_CAPBIT(S390X_EDDSA_SIGN_ED448) && OPENSSL_s390xcap_P.kdsa[0] & S390X_CAPBIT(S390X_EDDSA_VERIFY_ED448)) return s390x_ecd_keygen448(gctx); #endif return ecx_gen(gctx); } static void ecx_gen_cleanup(void *genctx) { struct ecx_gen_ctx *gctx = genctx; OPENSSL_clear_free(gctx->dhkem_ikm, gctx->dhkem_ikmlen); OPENSSL_free(gctx->propq); OPENSSL_free(gctx); } void *ecx_load(const void *reference, size_t reference_sz) { ECX_KEY *key = NULL; if (ossl_prov_is_running() && reference_sz == sizeof(key)) { /* The contents of the reference is the address to our object */ key = *(ECX_KEY **)reference; /* We grabbed, so we detach it */ *(ECX_KEY **)reference = NULL; return key; } return NULL; } static void *ecx_dup(const void *keydata_from, int selection) { if (ossl_prov_is_running()) return ossl_ecx_key_dup(keydata_from, selection); return NULL; } static int ecx_key_pairwise_check(const ECX_KEY *ecx, int type) { uint8_t pub[64]; switch (type) { case ECX_KEY_TYPE_X25519: ossl_x25519_public_from_private(pub, ecx->privkey); break; case ECX_KEY_TYPE_X448: ossl_x448_public_from_private(pub, ecx->privkey); break; case ECX_KEY_TYPE_ED25519: if (!ossl_ed25519_public_from_private(ecx->libctx, pub, ecx->privkey, ecx->propq)) return 0; break; case ECX_KEY_TYPE_ED448: if (!ossl_ed448_public_from_private(ecx->libctx, pub, ecx->privkey, ecx->propq)) return 0; break; default: return 0; } return CRYPTO_memcmp(ecx->pubkey, pub, ecx->keylen) == 0; } static int ecx_validate(const void *keydata, int selection, int type, size_t keylen) { const ECX_KEY *ecx = keydata; int ok = keylen == ecx->keylen; if (!ossl_prov_is_running()) return 0; if ((selection & ECX_POSSIBLE_SELECTIONS) == 0) return 1; /* nothing to validate */ if (!ok) { ERR_raise(ERR_LIB_PROV, PROV_R_ALGORITHM_MISMATCH); return 0; } if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) ok = ok && ecx->haspubkey; if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) ok = ok && ecx->privkey != NULL; if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) == OSSL_KEYMGMT_SELECT_KEYPAIR) ok = ok && ecx_key_pairwise_check(ecx, type); return ok; } static int x25519_validate(const void *keydata, int selection, int checktype) { return ecx_validate(keydata, selection, ECX_KEY_TYPE_X25519, X25519_KEYLEN); } static int x448_validate(const void *keydata, int selection, int checktype) { return ecx_validate(keydata, selection, ECX_KEY_TYPE_X448, X448_KEYLEN); } static int ed25519_validate(const void *keydata, int selection, int checktype) { return ecx_validate(keydata, selection, ECX_KEY_TYPE_ED25519, ED25519_KEYLEN); } static int ed448_validate(const void *keydata, int selection, int checktype) { return ecx_validate(keydata, selection, ECX_KEY_TYPE_ED448, ED448_KEYLEN); } #define MAKE_KEYMGMT_FUNCTIONS(alg) \ const OSSL_DISPATCH ossl_##alg##_keymgmt_functions[] = { \ { OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))alg##_new_key }, \ { OSSL_FUNC_KEYMGMT_FREE, (void (*)(void))ossl_ecx_key_free }, \ { OSSL_FUNC_KEYMGMT_GET_PARAMS, (void (*) (void))alg##_get_params }, \ { OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS, (void (*) (void))alg##_gettable_params }, \ { OSSL_FUNC_KEYMGMT_SET_PARAMS, (void (*) (void))alg##_set_params }, \ { OSSL_FUNC_KEYMGMT_SETTABLE_PARAMS, (void (*) (void))alg##_settable_params }, \ { OSSL_FUNC_KEYMGMT_HAS, (void (*)(void))ecx_has }, \ { OSSL_FUNC_KEYMGMT_MATCH, (void (*)(void))ecx_match }, \ { OSSL_FUNC_KEYMGMT_VALIDATE, (void (*)(void))alg##_validate }, \ { OSSL_FUNC_KEYMGMT_IMPORT, (void (*)(void))ecx_import }, \ { OSSL_FUNC_KEYMGMT_IMPORT_TYPES, (void (*)(void))ecx_imexport_types }, \ { OSSL_FUNC_KEYMGMT_EXPORT, (void (*)(void))ecx_export }, \ { OSSL_FUNC_KEYMGMT_EXPORT_TYPES, (void (*)(void))ecx_imexport_types }, \ { OSSL_FUNC_KEYMGMT_GEN_INIT, (void (*)(void))alg##_gen_init }, \ { OSSL_FUNC_KEYMGMT_GEN_SET_PARAMS, (void (*)(void))ecx_gen_set_params }, \ { OSSL_FUNC_KEYMGMT_GEN_SETTABLE_PARAMS, \ (void (*)(void))ecx_gen_settable_params }, \ { OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))alg##_gen }, \ { OSSL_FUNC_KEYMGMT_GEN_CLEANUP, (void (*)(void))ecx_gen_cleanup }, \ { OSSL_FUNC_KEYMGMT_LOAD, (void (*)(void))ecx_load }, \ { OSSL_FUNC_KEYMGMT_DUP, (void (*)(void))ecx_dup }, \ OSSL_DISPATCH_END \ }; MAKE_KEYMGMT_FUNCTIONS(x25519) MAKE_KEYMGMT_FUNCTIONS(x448) MAKE_KEYMGMT_FUNCTIONS(ed25519) MAKE_KEYMGMT_FUNCTIONS(ed448) #ifdef S390X_EC_ASM # include "s390x_arch.h" static void *s390x_ecx_keygen25519(struct ecx_gen_ctx *gctx) { static const unsigned char generator[] = { 0x09, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; ECX_KEY *key = ossl_ecx_key_new(gctx->libctx, ECX_KEY_TYPE_X25519, 1, gctx->propq); unsigned char *privkey = NULL, *pubkey; if (key == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_EC_LIB); goto err; } /* If we're doing parameter generation then we just return a blank key */ if ((gctx->selection & OSSL_KEYMGMT_SELECT_KEYPAIR) == 0) return key; pubkey = key->pubkey; privkey = ossl_ecx_key_allocate_privkey(key); if (privkey == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_EC_LIB); goto err; } #ifndef FIPS_MODULE if (gctx->dhkem_ikm != NULL && gctx->dhkem_ikmlen != 0) { if (gctx->type != ECX_KEY_TYPE_X25519) goto err; if (!ossl_ecx_dhkem_derive_private(key, privkey, gctx->dhkem_ikm, gctx->dhkem_ikmlen)) goto err; } else #endif { if (RAND_priv_bytes_ex(gctx->libctx, privkey, X25519_KEYLEN, 0) <= 0) goto err; } privkey[0] &= 248; privkey[31] &= 127; privkey[31] |= 64; if (s390x_x25519_mul(pubkey, generator, privkey) != 1) goto err; key->haspubkey = 1; return key; err: ossl_ecx_key_free(key); return NULL; } static void *s390x_ecx_keygen448(struct ecx_gen_ctx *gctx) { static const unsigned char generator[] = { 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; ECX_KEY *key = ossl_ecx_key_new(gctx->libctx, ECX_KEY_TYPE_X448, 1, gctx->propq); unsigned char *privkey = NULL, *pubkey; if (key == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_EC_LIB); goto err; } /* If we're doing parameter generation then we just return a blank key */ if ((gctx->selection & OSSL_KEYMGMT_SELECT_KEYPAIR) == 0) return key; pubkey = key->pubkey; privkey = ossl_ecx_key_allocate_privkey(key); if (privkey == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_EC_LIB); goto err; } #ifndef FIPS_MODULE if (gctx->dhkem_ikm != NULL && gctx->dhkem_ikmlen != 0) { if (gctx->type != ECX_KEY_TYPE_X448) goto err; if (!ossl_ecx_dhkem_derive_private(key, privkey, gctx->dhkem_ikm, gctx->dhkem_ikmlen)) goto err; } else #endif { if (RAND_priv_bytes_ex(gctx->libctx, privkey, X448_KEYLEN, 0) <= 0) goto err; } privkey[0] &= 252; privkey[55] |= 128; if (s390x_x448_mul(pubkey, generator, privkey) != 1) goto err; key->haspubkey = 1; return key; err: ossl_ecx_key_free(key); return NULL; } static void *s390x_ecd_keygen25519(struct ecx_gen_ctx *gctx) { static const unsigned char generator_x[] = { 0x1a, 0xd5, 0x25, 0x8f, 0x60, 0x2d, 0x56, 0xc9, 0xb2, 0xa7, 0x25, 0x95, 0x60, 0xc7, 0x2c, 0x69, 0x5c, 0xdc, 0xd6, 0xfd, 0x31, 0xe2, 0xa4, 0xc0, 0xfe, 0x53, 0x6e, 0xcd, 0xd3, 0x36, 0x69, 0x21 }; static const unsigned char generator_y[] = { 0x58, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, }; unsigned char x_dst[32], buff[SHA512_DIGEST_LENGTH]; ECX_KEY *key = ossl_ecx_key_new(gctx->libctx, ECX_KEY_TYPE_ED25519, 1, gctx->propq); unsigned char *privkey = NULL, *pubkey; unsigned int sz; EVP_MD *sha = NULL; int j; if (key == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_EC_LIB); goto err; } /* If we're doing parameter generation then we just return a blank key */ if ((gctx->selection & OSSL_KEYMGMT_SELECT_KEYPAIR) == 0) return key; pubkey = key->pubkey; privkey = ossl_ecx_key_allocate_privkey(key); if (privkey == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_EC_LIB); goto err; } if (RAND_priv_bytes_ex(gctx->libctx, privkey, ED25519_KEYLEN, 0) <= 0) goto err; sha = EVP_MD_fetch(gctx->libctx, "SHA512", gctx->propq); if (sha == NULL) goto err; j = EVP_Digest(privkey, 32, buff, &sz, sha, NULL); EVP_MD_free(sha); if (!j) goto err; buff[0] &= 248; buff[31] &= 63; buff[31] |= 64; if (s390x_ed25519_mul(x_dst, pubkey, generator_x, generator_y, buff) != 1) goto err; pubkey[31] |= ((x_dst[0] & 0x01) << 7); key->haspubkey = 1; return key; err: ossl_ecx_key_free(key); return NULL; } static void *s390x_ecd_keygen448(struct ecx_gen_ctx *gctx) { static const unsigned char generator_x[] = { 0x5e, 0xc0, 0x0c, 0xc7, 0x2b, 0xa8, 0x26, 0x26, 0x8e, 0x93, 0x00, 0x8b, 0xe1, 0x80, 0x3b, 0x43, 0x11, 0x65, 0xb6, 0x2a, 0xf7, 0x1a, 0xae, 0x12, 0x64, 0xa4, 0xd3, 0xa3, 0x24, 0xe3, 0x6d, 0xea, 0x67, 0x17, 0x0f, 0x47, 0x70, 0x65, 0x14, 0x9e, 0xda, 0x36, 0xbf, 0x22, 0xa6, 0x15, 0x1d, 0x22, 0xed, 0x0d, 0xed, 0x6b, 0xc6, 0x70, 0x19, 0x4f, 0x00 }; static const unsigned char generator_y[] = { 0x14, 0xfa, 0x30, 0xf2, 0x5b, 0x79, 0x08, 0x98, 0xad, 0xc8, 0xd7, 0x4e, 0x2c, 0x13, 0xbd, 0xfd, 0xc4, 0x39, 0x7c, 0xe6, 0x1c, 0xff, 0xd3, 0x3a, 0xd7, 0xc2, 0xa0, 0x05, 0x1e, 0x9c, 0x78, 0x87, 0x40, 0x98, 0xa3, 0x6c, 0x73, 0x73, 0xea, 0x4b, 0x62, 0xc7, 0xc9, 0x56, 0x37, 0x20, 0x76, 0x88, 0x24, 0xbc, 0xb6, 0x6e, 0x71, 0x46, 0x3f, 0x69, 0x00 }; unsigned char x_dst[57], buff[114]; ECX_KEY *key = ossl_ecx_key_new(gctx->libctx, ECX_KEY_TYPE_ED448, 1, gctx->propq); unsigned char *privkey = NULL, *pubkey; EVP_MD_CTX *hashctx = NULL; EVP_MD *shake = NULL; if (key == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_EC_LIB); goto err; } /* If we're doing parameter generation then we just return a blank key */ if ((gctx->selection & OSSL_KEYMGMT_SELECT_KEYPAIR) == 0) return key; pubkey = key->pubkey; privkey = ossl_ecx_key_allocate_privkey(key); if (privkey == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_EC_LIB); goto err; } shake = EVP_MD_fetch(gctx->libctx, "SHAKE256", gctx->propq); if (shake == NULL) goto err; if (RAND_priv_bytes_ex(gctx->libctx, privkey, ED448_KEYLEN, 0) <= 0) goto err; hashctx = EVP_MD_CTX_new(); if (hashctx == NULL) goto err; if (EVP_DigestInit_ex(hashctx, shake, NULL) != 1) goto err; if (EVP_DigestUpdate(hashctx, privkey, 57) != 1) goto err; if (EVP_DigestFinalXOF(hashctx, buff, sizeof(buff)) != 1) goto err; buff[0] &= -4; buff[55] |= 0x80; buff[56] = 0; if (s390x_ed448_mul(x_dst, pubkey, generator_x, generator_y, buff) != 1) goto err; pubkey[56] |= ((x_dst[0] & 0x01) << 7); EVP_MD_CTX_free(hashctx); EVP_MD_free(shake); key->haspubkey = 1; return key; err: ossl_ecx_key_free(key); EVP_MD_CTX_free(hashctx); EVP_MD_free(shake); return NULL; } #endif
./openssl/providers/implementations/keymgmt/mac_legacy_kmgmt.c
/* * Copyright 2020-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* We need to use some engine deprecated APIs */ #define OPENSSL_SUPPRESS_DEPRECATED #include <string.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/params.h> #include <openssl/err.h> #include <openssl/evp.h> #include <openssl/proverr.h> #include <openssl/param_build.h> #ifndef FIPS_MODULE # include <openssl/engine.h> #endif #include "internal/param_build_set.h" #include "prov/implementations.h" #include "prov/providercommon.h" #include "prov/provider_ctx.h" #include "prov/macsignature.h" static OSSL_FUNC_keymgmt_new_fn mac_new; static OSSL_FUNC_keymgmt_free_fn mac_free; static OSSL_FUNC_keymgmt_gen_init_fn mac_gen_init; static OSSL_FUNC_keymgmt_gen_fn mac_gen; static OSSL_FUNC_keymgmt_gen_cleanup_fn mac_gen_cleanup; static OSSL_FUNC_keymgmt_gen_set_params_fn mac_gen_set_params; static OSSL_FUNC_keymgmt_gen_settable_params_fn mac_gen_settable_params; static OSSL_FUNC_keymgmt_get_params_fn mac_get_params; static OSSL_FUNC_keymgmt_gettable_params_fn mac_gettable_params; static OSSL_FUNC_keymgmt_set_params_fn mac_set_params; static OSSL_FUNC_keymgmt_settable_params_fn mac_settable_params; static OSSL_FUNC_keymgmt_has_fn mac_has; static OSSL_FUNC_keymgmt_match_fn mac_match; static OSSL_FUNC_keymgmt_import_fn mac_import; static OSSL_FUNC_keymgmt_import_types_fn mac_imexport_types; static OSSL_FUNC_keymgmt_export_fn mac_export; static OSSL_FUNC_keymgmt_export_types_fn mac_imexport_types; static OSSL_FUNC_keymgmt_new_fn mac_new_cmac; static OSSL_FUNC_keymgmt_gettable_params_fn cmac_gettable_params; static OSSL_FUNC_keymgmt_import_types_fn cmac_imexport_types; static OSSL_FUNC_keymgmt_export_types_fn cmac_imexport_types; static OSSL_FUNC_keymgmt_gen_init_fn cmac_gen_init; static OSSL_FUNC_keymgmt_gen_set_params_fn cmac_gen_set_params; static OSSL_FUNC_keymgmt_gen_settable_params_fn cmac_gen_settable_params; struct mac_gen_ctx { OSSL_LIB_CTX *libctx; int selection; unsigned char *priv_key; size_t priv_key_len; PROV_CIPHER cipher; }; MAC_KEY *ossl_mac_key_new(OSSL_LIB_CTX *libctx, int cmac) { MAC_KEY *mackey; if (!ossl_prov_is_running()) return NULL; mackey = OPENSSL_zalloc(sizeof(*mackey)); if (mackey == NULL) return NULL; if (!CRYPTO_NEW_REF(&mackey->refcnt, 1)) { OPENSSL_free(mackey); return NULL; } mackey->libctx = libctx; mackey->cmac = cmac; return mackey; } void ossl_mac_key_free(MAC_KEY *mackey) { int ref = 0; if (mackey == NULL) return; CRYPTO_DOWN_REF(&mackey->refcnt, &ref); if (ref > 0) return; OPENSSL_secure_clear_free(mackey->priv_key, mackey->priv_key_len); OPENSSL_free(mackey->properties); ossl_prov_cipher_reset(&mackey->cipher); CRYPTO_FREE_REF(&mackey->refcnt); OPENSSL_free(mackey); } int ossl_mac_key_up_ref(MAC_KEY *mackey) { int ref = 0; /* This is effectively doing a new operation on the MAC_KEY and should be * adequately guarded again modules' error states. However, both current * calls here are guarded properly in signature/mac_legacy.c. Thus, it * could be removed here. The concern is that something in the future * might call this function without adequate guards. It's a cheap call, * it seems best to leave it even though it is currently redundant. */ if (!ossl_prov_is_running()) return 0; CRYPTO_UP_REF(&mackey->refcnt, &ref); return 1; } static void *mac_new(void *provctx) { return ossl_mac_key_new(PROV_LIBCTX_OF(provctx), 0); } static void *mac_new_cmac(void *provctx) { return ossl_mac_key_new(PROV_LIBCTX_OF(provctx), 1); } static void mac_free(void *mackey) { ossl_mac_key_free(mackey); } static int mac_has(const void *keydata, int selection) { const MAC_KEY *key = keydata; int ok = 0; if (ossl_prov_is_running() && key != NULL) { /* * MAC keys always have all the parameters they need (i.e. none). * Therefore we always return with 1, if asked about parameters. * Similarly for public keys. */ ok = 1; if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) ok = key->priv_key != NULL; } return ok; } static int mac_match(const void *keydata1, const void *keydata2, int selection) { const MAC_KEY *key1 = keydata1; const MAC_KEY *key2 = keydata2; int ok = 1; if (!ossl_prov_is_running()) return 0; if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { if ((key1->priv_key == NULL && key2->priv_key != NULL) || (key1->priv_key != NULL && key2->priv_key == NULL) || key1->priv_key_len != key2->priv_key_len || (key1->cipher.cipher == NULL && key2->cipher.cipher != NULL) || (key1->cipher.cipher != NULL && key2->cipher.cipher == NULL)) ok = 0; else ok = ok && (key1->priv_key == NULL /* implies key2->privkey == NULL */ || CRYPTO_memcmp(key1->priv_key, key2->priv_key, key1->priv_key_len) == 0); if (key1->cipher.cipher != NULL) ok = ok && EVP_CIPHER_is_a(key1->cipher.cipher, EVP_CIPHER_get0_name(key2->cipher.cipher)); } return ok; } static int mac_key_fromdata(MAC_KEY *key, const OSSL_PARAM params[]) { const OSSL_PARAM *p; p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_PRIV_KEY); if (p != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) { ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); return 0; } OPENSSL_secure_clear_free(key->priv_key, key->priv_key_len); /* allocate at least one byte to distinguish empty key from no key set */ key->priv_key = OPENSSL_secure_malloc(p->data_size > 0 ? p->data_size : 1); if (key->priv_key == NULL) return 0; memcpy(key->priv_key, p->data, p->data_size); key->priv_key_len = p->data_size; } p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_PROPERTIES); if (p != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING) { ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); return 0; } OPENSSL_free(key->properties); key->properties = OPENSSL_strdup(p->data); if (key->properties == NULL) return 0; } if (key->cmac && !ossl_prov_cipher_load_from_params(&key->cipher, params, key->libctx)) { ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); return 0; } if (key->priv_key != NULL) return 1; return 0; } static int mac_import(void *keydata, int selection, const OSSL_PARAM params[]) { MAC_KEY *key = keydata; if (!ossl_prov_is_running() || key == NULL) return 0; if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) == 0) return 0; return mac_key_fromdata(key, params); } static int key_to_params(MAC_KEY *key, OSSL_PARAM_BLD *tmpl, OSSL_PARAM params[]) { if (key == NULL) return 0; if (key->priv_key != NULL && !ossl_param_build_set_octet_string(tmpl, params, OSSL_PKEY_PARAM_PRIV_KEY, key->priv_key, key->priv_key_len)) return 0; if (key->cipher.cipher != NULL && !ossl_param_build_set_utf8_string(tmpl, params, OSSL_PKEY_PARAM_CIPHER, EVP_CIPHER_get0_name(key->cipher.cipher))) return 0; #if !defined(OPENSSL_NO_ENGINE) && !defined(FIPS_MODULE) if (key->cipher.engine != NULL && !ossl_param_build_set_utf8_string(tmpl, params, OSSL_PKEY_PARAM_ENGINE, ENGINE_get_id(key->cipher.engine))) return 0; #endif return 1; } static int mac_export(void *keydata, int selection, OSSL_CALLBACK *param_cb, void *cbarg) { MAC_KEY *key = keydata; OSSL_PARAM_BLD *tmpl; OSSL_PARAM *params = NULL; int ret = 0; if (!ossl_prov_is_running() || key == NULL) return 0; if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) == 0) return 0; tmpl = OSSL_PARAM_BLD_new(); if (tmpl == NULL) return 0; if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0 && !key_to_params(key, tmpl, NULL)) goto err; params = OSSL_PARAM_BLD_to_param(tmpl); if (params == NULL) goto err; ret = param_cb(params, cbarg); OSSL_PARAM_free(params); err: OSSL_PARAM_BLD_free(tmpl); return ret; } static const OSSL_PARAM mac_key_types[] = { OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_PRIV_KEY, NULL, 0), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *mac_imexport_types(int selection) { if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) return mac_key_types; return NULL; } static const OSSL_PARAM cmac_key_types[] = { OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_PRIV_KEY, NULL, 0), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_CIPHER, NULL, 0), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_ENGINE, NULL, 0), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *cmac_imexport_types(int selection) { if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) return cmac_key_types; return NULL; } static int mac_get_params(void *key, OSSL_PARAM params[]) { return key_to_params(key, NULL, params); } static const OSSL_PARAM *mac_gettable_params(void *provctx) { static const OSSL_PARAM gettable_params[] = { OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_PRIV_KEY, NULL, 0), OSSL_PARAM_END }; return gettable_params; } static const OSSL_PARAM *cmac_gettable_params(void *provctx) { static const OSSL_PARAM gettable_params[] = { OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_PRIV_KEY, NULL, 0), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_CIPHER, NULL, 0), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_ENGINE, NULL, 0), OSSL_PARAM_END }; return gettable_params; } static int mac_set_params(void *keydata, const OSSL_PARAM params[]) { MAC_KEY *key = keydata; const OSSL_PARAM *p; if (key == NULL) return 0; p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_PRIV_KEY); if (p != NULL) return mac_key_fromdata(key, params); return 1; } static const OSSL_PARAM *mac_settable_params(void *provctx) { static const OSSL_PARAM settable_params[] = { OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_PRIV_KEY, NULL, 0), OSSL_PARAM_END }; return settable_params; } static void *mac_gen_init_common(void *provctx, int selection) { OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(provctx); struct mac_gen_ctx *gctx = NULL; if (!ossl_prov_is_running()) return NULL; if ((gctx = OPENSSL_zalloc(sizeof(*gctx))) != NULL) { gctx->libctx = libctx; gctx->selection = selection; } return gctx; } static void *mac_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) { struct mac_gen_ctx *gctx = mac_gen_init_common(provctx, selection); if (gctx != NULL && !mac_gen_set_params(gctx, params)) { OPENSSL_free(gctx); gctx = NULL; } return gctx; } static void *cmac_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) { struct mac_gen_ctx *gctx = mac_gen_init_common(provctx, selection); if (gctx != NULL && !cmac_gen_set_params(gctx, params)) { OPENSSL_free(gctx); gctx = NULL; } return gctx; } static int mac_gen_set_params(void *genctx, const OSSL_PARAM params[]) { struct mac_gen_ctx *gctx = genctx; const OSSL_PARAM *p; if (gctx == NULL) return 0; p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_PRIV_KEY); if (p != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) { ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); return 0; } gctx->priv_key = OPENSSL_secure_malloc(p->data_size); if (gctx->priv_key == NULL) return 0; memcpy(gctx->priv_key, p->data, p->data_size); gctx->priv_key_len = p->data_size; } return 1; } static int cmac_gen_set_params(void *genctx, const OSSL_PARAM params[]) { struct mac_gen_ctx *gctx = genctx; if (!mac_gen_set_params(genctx, params)) return 0; if (!ossl_prov_cipher_load_from_params(&gctx->cipher, params, gctx->libctx)) { ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); return 0; } return 1; } static const OSSL_PARAM *mac_gen_settable_params(ossl_unused void *genctx, ossl_unused void *provctx) { static OSSL_PARAM settable[] = { OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_PRIV_KEY, NULL, 0), OSSL_PARAM_END }; return settable; } static const OSSL_PARAM *cmac_gen_settable_params(ossl_unused void *genctx, ossl_unused void *provctx) { static OSSL_PARAM settable[] = { OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_PRIV_KEY, NULL, 0), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_CIPHER, NULL, 0), OSSL_PARAM_END }; return settable; } static void *mac_gen(void *genctx, OSSL_CALLBACK *cb, void *cbarg) { struct mac_gen_ctx *gctx = genctx; MAC_KEY *key; if (!ossl_prov_is_running() || gctx == NULL) return NULL; if ((key = ossl_mac_key_new(gctx->libctx, 0)) == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_PROV_LIB); return NULL; } /* If we're doing parameter generation then we just return a blank key */ if ((gctx->selection & OSSL_KEYMGMT_SELECT_KEYPAIR) == 0) return key; if (gctx->priv_key == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY); ossl_mac_key_free(key); return NULL; } /* * This is horrible but required for backwards compatibility. We don't * actually do real key generation at all. We simply copy the key that was * previously set in the gctx. Hopefully at some point in the future all * of this can be removed and we will only support the EVP_KDF APIs. */ if (!ossl_prov_cipher_copy(&key->cipher, &gctx->cipher)) { ossl_mac_key_free(key); ERR_raise(ERR_LIB_PROV, ERR_R_INTERNAL_ERROR); return NULL; } ossl_prov_cipher_reset(&gctx->cipher); key->priv_key = gctx->priv_key; key->priv_key_len = gctx->priv_key_len; gctx->priv_key_len = 0; gctx->priv_key = NULL; return key; } static void mac_gen_cleanup(void *genctx) { struct mac_gen_ctx *gctx = genctx; OPENSSL_secure_clear_free(gctx->priv_key, gctx->priv_key_len); ossl_prov_cipher_reset(&gctx->cipher); OPENSSL_free(gctx); } const OSSL_DISPATCH ossl_mac_legacy_keymgmt_functions[] = { { OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))mac_new }, { OSSL_FUNC_KEYMGMT_FREE, (void (*)(void))mac_free }, { OSSL_FUNC_KEYMGMT_GET_PARAMS, (void (*) (void))mac_get_params }, { OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS, (void (*) (void))mac_gettable_params }, { OSSL_FUNC_KEYMGMT_SET_PARAMS, (void (*) (void))mac_set_params }, { OSSL_FUNC_KEYMGMT_SETTABLE_PARAMS, (void (*) (void))mac_settable_params }, { OSSL_FUNC_KEYMGMT_HAS, (void (*)(void))mac_has }, { OSSL_FUNC_KEYMGMT_MATCH, (void (*)(void))mac_match }, { OSSL_FUNC_KEYMGMT_IMPORT, (void (*)(void))mac_import }, { OSSL_FUNC_KEYMGMT_IMPORT_TYPES, (void (*)(void))mac_imexport_types }, { OSSL_FUNC_KEYMGMT_EXPORT, (void (*)(void))mac_export }, { OSSL_FUNC_KEYMGMT_EXPORT_TYPES, (void (*)(void))mac_imexport_types }, { OSSL_FUNC_KEYMGMT_GEN_INIT, (void (*)(void))mac_gen_init }, { OSSL_FUNC_KEYMGMT_GEN_SET_PARAMS, (void (*)(void))mac_gen_set_params }, { OSSL_FUNC_KEYMGMT_GEN_SETTABLE_PARAMS, (void (*)(void))mac_gen_settable_params }, { OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))mac_gen }, { OSSL_FUNC_KEYMGMT_GEN_CLEANUP, (void (*)(void))mac_gen_cleanup }, OSSL_DISPATCH_END }; const OSSL_DISPATCH ossl_cmac_legacy_keymgmt_functions[] = { { OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))mac_new_cmac }, { OSSL_FUNC_KEYMGMT_FREE, (void (*)(void))mac_free }, { OSSL_FUNC_KEYMGMT_GET_PARAMS, (void (*) (void))mac_get_params }, { OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS, (void (*) (void))cmac_gettable_params }, { OSSL_FUNC_KEYMGMT_SET_PARAMS, (void (*) (void))mac_set_params }, { OSSL_FUNC_KEYMGMT_SETTABLE_PARAMS, (void (*) (void))mac_settable_params }, { OSSL_FUNC_KEYMGMT_HAS, (void (*)(void))mac_has }, { OSSL_FUNC_KEYMGMT_MATCH, (void (*)(void))mac_match }, { OSSL_FUNC_KEYMGMT_IMPORT, (void (*)(void))mac_import }, { OSSL_FUNC_KEYMGMT_IMPORT_TYPES, (void (*)(void))cmac_imexport_types }, { OSSL_FUNC_KEYMGMT_EXPORT, (void (*)(void))mac_export }, { OSSL_FUNC_KEYMGMT_EXPORT_TYPES, (void (*)(void))cmac_imexport_types }, { OSSL_FUNC_KEYMGMT_GEN_INIT, (void (*)(void))cmac_gen_init }, { OSSL_FUNC_KEYMGMT_GEN_SET_PARAMS, (void (*)(void))cmac_gen_set_params }, { OSSL_FUNC_KEYMGMT_GEN_SETTABLE_PARAMS, (void (*)(void))cmac_gen_settable_params }, { OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))mac_gen }, { OSSL_FUNC_KEYMGMT_GEN_CLEANUP, (void (*)(void))mac_gen_cleanup }, OSSL_DISPATCH_END };
./openssl/providers/implementations/keymgmt/ec_kmgmt.c
/* * Copyright 2020-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * ECDH/ECDSA low level APIs are deprecated for public use, but still ok for * internal use. */ #include "internal/deprecated.h" #include <string.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/bn.h> #include <openssl/err.h> #include <openssl/objects.h> #include <openssl/proverr.h> #include "crypto/bn.h" #include "crypto/ec.h" #include "prov/implementations.h" #include "prov/providercommon.h" #include "prov/provider_ctx.h" #include "internal/param_build_set.h" #ifndef FIPS_MODULE # ifndef OPENSSL_NO_SM2 # include "crypto/sm2.h" # endif #endif static OSSL_FUNC_keymgmt_new_fn ec_newdata; static OSSL_FUNC_keymgmt_gen_init_fn ec_gen_init; static OSSL_FUNC_keymgmt_gen_set_template_fn ec_gen_set_template; static OSSL_FUNC_keymgmt_gen_set_params_fn ec_gen_set_params; static OSSL_FUNC_keymgmt_gen_settable_params_fn ec_gen_settable_params; static OSSL_FUNC_keymgmt_gen_fn ec_gen; static OSSL_FUNC_keymgmt_gen_cleanup_fn ec_gen_cleanup; static OSSL_FUNC_keymgmt_load_fn ec_load; static OSSL_FUNC_keymgmt_free_fn ec_freedata; static OSSL_FUNC_keymgmt_get_params_fn ec_get_params; static OSSL_FUNC_keymgmt_gettable_params_fn ec_gettable_params; static OSSL_FUNC_keymgmt_set_params_fn ec_set_params; static OSSL_FUNC_keymgmt_settable_params_fn ec_settable_params; static OSSL_FUNC_keymgmt_has_fn ec_has; static OSSL_FUNC_keymgmt_match_fn ec_match; static OSSL_FUNC_keymgmt_validate_fn ec_validate; static OSSL_FUNC_keymgmt_import_fn ec_import; static OSSL_FUNC_keymgmt_import_types_fn ec_import_types; static OSSL_FUNC_keymgmt_export_fn ec_export; static OSSL_FUNC_keymgmt_export_types_fn ec_export_types; static OSSL_FUNC_keymgmt_query_operation_name_fn ec_query_operation_name; static OSSL_FUNC_keymgmt_dup_fn ec_dup; #ifndef FIPS_MODULE # ifndef OPENSSL_NO_SM2 static OSSL_FUNC_keymgmt_new_fn sm2_newdata; static OSSL_FUNC_keymgmt_gen_init_fn sm2_gen_init; static OSSL_FUNC_keymgmt_gen_fn sm2_gen; static OSSL_FUNC_keymgmt_get_params_fn sm2_get_params; static OSSL_FUNC_keymgmt_gettable_params_fn sm2_gettable_params; static OSSL_FUNC_keymgmt_settable_params_fn sm2_settable_params; static OSSL_FUNC_keymgmt_import_fn sm2_import; static OSSL_FUNC_keymgmt_query_operation_name_fn sm2_query_operation_name; static OSSL_FUNC_keymgmt_validate_fn sm2_validate; # endif #endif #define EC_DEFAULT_MD "SHA256" #define EC_POSSIBLE_SELECTIONS \ (OSSL_KEYMGMT_SELECT_KEYPAIR | OSSL_KEYMGMT_SELECT_ALL_PARAMETERS) #define SM2_DEFAULT_MD "SM3" static const char *ec_query_operation_name(int operation_id) { switch (operation_id) { case OSSL_OP_KEYEXCH: return "ECDH"; case OSSL_OP_SIGNATURE: return "ECDSA"; } return NULL; } #ifndef FIPS_MODULE # ifndef OPENSSL_NO_SM2 static const char *sm2_query_operation_name(int operation_id) { switch (operation_id) { case OSSL_OP_SIGNATURE: return "SM2"; } return NULL; } # endif #endif /* * Callers of key_to_params MUST make sure that domparams_to_params is also * called! * * This function only exports the bare keypair, domain parameters and other * parameters are exported separately. */ static ossl_inline int key_to_params(const EC_KEY *eckey, OSSL_PARAM_BLD *tmpl, OSSL_PARAM params[], int include_private, unsigned char **pub_key) { BIGNUM *x = NULL, *y = NULL; const BIGNUM *priv_key = NULL; const EC_POINT *pub_point = NULL; const EC_GROUP *ecg = NULL; size_t pub_key_len = 0; int ret = 0; BN_CTX *bnctx = NULL; if (eckey == NULL || (ecg = EC_KEY_get0_group(eckey)) == NULL) return 0; priv_key = EC_KEY_get0_private_key(eckey); pub_point = EC_KEY_get0_public_key(eckey); if (pub_point != NULL) { OSSL_PARAM *p = NULL, *px = NULL, *py = NULL; /* * EC_POINT_point2buf() can generate random numbers in some * implementations so we need to ensure we use the correct libctx. */ bnctx = BN_CTX_new_ex(ossl_ec_key_get_libctx(eckey)); if (bnctx == NULL) goto err; /* If we are doing a get then check first before decoding the point */ if (tmpl == NULL) { p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_PUB_KEY); px = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_EC_PUB_X); py = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_EC_PUB_Y); } if (p != NULL || tmpl != NULL) { /* convert pub_point to a octet string according to the SECG standard */ point_conversion_form_t format = EC_KEY_get_conv_form(eckey); if ((pub_key_len = EC_POINT_point2buf(ecg, pub_point, format, pub_key, bnctx)) == 0 || !ossl_param_build_set_octet_string(tmpl, p, OSSL_PKEY_PARAM_PUB_KEY, *pub_key, pub_key_len)) goto err; } if (px != NULL || py != NULL) { if (px != NULL) { x = BN_CTX_get(bnctx); if (x == NULL) goto err; } if (py != NULL) { y = BN_CTX_get(bnctx); if (y == NULL) goto err; } if (!EC_POINT_get_affine_coordinates(ecg, pub_point, x, y, bnctx)) goto err; if (px != NULL && !ossl_param_build_set_bn(tmpl, px, OSSL_PKEY_PARAM_EC_PUB_X, x)) goto err; if (py != NULL && !ossl_param_build_set_bn(tmpl, py, OSSL_PKEY_PARAM_EC_PUB_Y, y)) goto err; } } if (priv_key != NULL && include_private) { size_t sz; int ecbits; /* * Key import/export should never leak the bit length of the secret * scalar in the key. * * For this reason, on export we use padded BIGNUMs with fixed length. * * When importing we also should make sure that, even if short lived, * the newly created BIGNUM is marked with the BN_FLG_CONSTTIME flag as * soon as possible, so that any processing of this BIGNUM might opt for * constant time implementations in the backend. * * Setting the BN_FLG_CONSTTIME flag alone is never enough, we also have * to preallocate the BIGNUM internal buffer to a fixed public size big * enough that operations performed during the processing never trigger * a realloc which would leak the size of the scalar through memory * accesses. * * Fixed Length * ------------ * * The order of the large prime subgroup of the curve is our choice for * a fixed public size, as that is generally the upper bound for * generating a private key in EC cryptosystems and should fit all valid * secret scalars. * * For padding on export we just use the bit length of the order * converted to bytes (rounding up). * * For preallocating the BIGNUM storage we look at the number of "words" * required for the internal representation of the order, and we * preallocate 2 extra "words" in case any of the subsequent processing * might temporarily overflow the order length. */ ecbits = EC_GROUP_order_bits(ecg); if (ecbits <= 0) goto err; sz = (ecbits + 7) / 8; if (!ossl_param_build_set_bn_pad(tmpl, params, OSSL_PKEY_PARAM_PRIV_KEY, priv_key, sz)) goto err; } ret = 1; err: BN_CTX_free(bnctx); return ret; } static ossl_inline int otherparams_to_params(const EC_KEY *ec, OSSL_PARAM_BLD *tmpl, OSSL_PARAM params[]) { int ecdh_cofactor_mode = 0, group_check = 0; const char *name = NULL; point_conversion_form_t format; if (ec == NULL) return 0; format = EC_KEY_get_conv_form(ec); name = ossl_ec_pt_format_id2name((int)format); if (name != NULL && !ossl_param_build_set_utf8_string(tmpl, params, OSSL_PKEY_PARAM_EC_POINT_CONVERSION_FORMAT, name)) return 0; group_check = EC_KEY_get_flags(ec) & EC_FLAG_CHECK_NAMED_GROUP_MASK; name = ossl_ec_check_group_type_id2name(group_check); if (name != NULL && !ossl_param_build_set_utf8_string(tmpl, params, OSSL_PKEY_PARAM_EC_GROUP_CHECK_TYPE, name)) return 0; if ((EC_KEY_get_enc_flags(ec) & EC_PKEY_NO_PUBKEY) != 0 && !ossl_param_build_set_int(tmpl, params, OSSL_PKEY_PARAM_EC_INCLUDE_PUBLIC, 0)) return 0; ecdh_cofactor_mode = (EC_KEY_get_flags(ec) & EC_FLAG_COFACTOR_ECDH) ? 1 : 0; return ossl_param_build_set_int(tmpl, params, OSSL_PKEY_PARAM_USE_COFACTOR_ECDH, ecdh_cofactor_mode); } static void *ec_newdata(void *provctx) { if (!ossl_prov_is_running()) return NULL; return EC_KEY_new_ex(PROV_LIBCTX_OF(provctx), NULL); } #ifndef FIPS_MODULE # ifndef OPENSSL_NO_SM2 static void *sm2_newdata(void *provctx) { if (!ossl_prov_is_running()) return NULL; return EC_KEY_new_by_curve_name_ex(PROV_LIBCTX_OF(provctx), NULL, NID_sm2); } # endif #endif static void ec_freedata(void *keydata) { EC_KEY_free(keydata); } static int ec_has(const void *keydata, int selection) { const EC_KEY *ec = keydata; int ok = 1; if (!ossl_prov_is_running() || ec == NULL) return 0; if ((selection & EC_POSSIBLE_SELECTIONS) == 0) return 1; /* the selection is not missing */ if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) ok = ok && (EC_KEY_get0_public_key(ec) != NULL); if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) ok = ok && (EC_KEY_get0_private_key(ec) != NULL); if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) ok = ok && (EC_KEY_get0_group(ec) != NULL); /* * We consider OSSL_KEYMGMT_SELECT_OTHER_PARAMETERS to always be * available, so no extra check is needed other than the previous one * against EC_POSSIBLE_SELECTIONS. */ return ok; } static int ec_match(const void *keydata1, const void *keydata2, int selection) { const EC_KEY *ec1 = keydata1; const EC_KEY *ec2 = keydata2; const EC_GROUP *group_a = EC_KEY_get0_group(ec1); const EC_GROUP *group_b = EC_KEY_get0_group(ec2); BN_CTX *ctx = NULL; int ok = 1; if (!ossl_prov_is_running()) return 0; ctx = BN_CTX_new_ex(ossl_ec_key_get_libctx(ec1)); if (ctx == NULL) return 0; if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) ok = ok && group_a != NULL && group_b != NULL && EC_GROUP_cmp(group_a, group_b, ctx) == 0; if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { int key_checked = 0; if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { const EC_POINT *pa = EC_KEY_get0_public_key(ec1); const EC_POINT *pb = EC_KEY_get0_public_key(ec2); if (pa != NULL && pb != NULL) { ok = ok && EC_POINT_cmp(group_b, pa, pb, ctx) == 0; key_checked = 1; } } if (!key_checked && (selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { const BIGNUM *pa = EC_KEY_get0_private_key(ec1); const BIGNUM *pb = EC_KEY_get0_private_key(ec2); if (pa != NULL && pb != NULL) { ok = ok && BN_cmp(pa, pb) == 0; key_checked = 1; } } ok = ok && key_checked; } BN_CTX_free(ctx); return ok; } static int common_check_sm2(const EC_KEY *ec, int sm2_wanted) { const EC_GROUP *ecg = NULL; /* * sm2_wanted: import the keys or domparams only on SM2 Curve * !sm2_wanted: import the keys or domparams only not on SM2 Curve */ if ((ecg = EC_KEY_get0_group(ec)) == NULL || (sm2_wanted ^ (EC_GROUP_get_curve_name(ecg) == NID_sm2))) return 0; return 1; } static int common_import(void *keydata, int selection, const OSSL_PARAM params[], int sm2_wanted) { EC_KEY *ec = keydata; int ok = 1; if (!ossl_prov_is_running() || ec == NULL) return 0; /* * In this implementation, we can export/import only keydata in the * following combinations: * - domain parameters (+optional other params) * - public key with associated domain parameters (+optional other params) * - private key with associated domain parameters and optional public key * (+optional other params) * * This means: * - domain parameters must always be requested * - private key must be requested alongside public key * - other parameters are always optional */ if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) == 0) return 0; ok = ok && ossl_ec_group_fromdata(ec, params); if (!common_check_sm2(ec, sm2_wanted)) return 0; if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { int include_private = selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY ? 1 : 0; ok = ok && ossl_ec_key_fromdata(ec, params, include_private); } if ((selection & OSSL_KEYMGMT_SELECT_OTHER_PARAMETERS) != 0) ok = ok && ossl_ec_key_otherparams_fromdata(ec, params); return ok; } static int ec_import(void *keydata, int selection, const OSSL_PARAM params[]) { return common_import(keydata, selection, params, 0); } #ifndef FIPS_MODULE # ifndef OPENSSL_NO_SM2 static int sm2_import(void *keydata, int selection, const OSSL_PARAM params[]) { return common_import(keydata, selection, params, 1); } # endif #endif static int ec_export(void *keydata, int selection, OSSL_CALLBACK *param_cb, void *cbarg) { EC_KEY *ec = keydata; OSSL_PARAM_BLD *tmpl = NULL; OSSL_PARAM *params = NULL; unsigned char *pub_key = NULL, *genbuf = NULL; BN_CTX *bnctx = NULL; int ok = 1; if (!ossl_prov_is_running() || ec == NULL) return 0; /* * In this implementation, we can export/import only keydata in the * following combinations: * - domain parameters (+optional other params) * - public key with associated domain parameters (+optional other params) * - private key with associated public key and domain parameters * (+optional other params) * * This means: * - domain parameters must always be requested * - private key must be requested alongside public key * - other parameters are always optional */ if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) == 0) return 0; if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0 && (selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) == 0) return 0; tmpl = OSSL_PARAM_BLD_new(); if (tmpl == NULL) return 0; if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) { bnctx = BN_CTX_new_ex(ossl_ec_key_get_libctx(ec)); if (bnctx == NULL) { ok = 0; goto end; } BN_CTX_start(bnctx); ok = ok && ossl_ec_group_todata(EC_KEY_get0_group(ec), tmpl, NULL, ossl_ec_key_get_libctx(ec), ossl_ec_key_get0_propq(ec), bnctx, &genbuf); } if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { int include_private = selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY ? 1 : 0; ok = ok && key_to_params(ec, tmpl, NULL, include_private, &pub_key); } if ((selection & OSSL_KEYMGMT_SELECT_OTHER_PARAMETERS) != 0) ok = ok && otherparams_to_params(ec, tmpl, NULL); if (!ok || (params = OSSL_PARAM_BLD_to_param(tmpl)) == NULL) { ok = 0; goto end; } ok = param_cb(params, cbarg); OSSL_PARAM_free(params); end: OSSL_PARAM_BLD_free(tmpl); OPENSSL_free(pub_key); OPENSSL_free(genbuf); BN_CTX_end(bnctx); BN_CTX_free(bnctx); return ok; } /* IMEXPORT = IMPORT + EXPORT */ # define EC_IMEXPORTABLE_DOM_PARAMETERS \ OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_GROUP_NAME, NULL, 0), \ OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_EC_ENCODING, NULL, 0), \ OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_EC_POINT_CONVERSION_FORMAT, NULL, 0),\ OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_EC_FIELD_TYPE, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_EC_P, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_EC_A, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_EC_B, NULL, 0), \ OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_EC_GENERATOR, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_EC_ORDER, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_EC_COFACTOR, NULL, 0), \ OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_EC_SEED, NULL, 0), \ OSSL_PARAM_int(OSSL_PKEY_PARAM_EC_DECODED_FROM_EXPLICIT_PARAMS, NULL) # define EC_IMEXPORTABLE_PUBLIC_KEY \ OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_PUB_KEY, NULL, 0) # define EC_IMEXPORTABLE_PRIVATE_KEY \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_PRIV_KEY, NULL, 0) # define EC_IMEXPORTABLE_OTHER_PARAMETERS \ OSSL_PARAM_int(OSSL_PKEY_PARAM_USE_COFACTOR_ECDH, NULL), \ OSSL_PARAM_int(OSSL_PKEY_PARAM_EC_INCLUDE_PUBLIC, NULL) /* * Include all the possible combinations of OSSL_PARAM arrays for * ec_imexport_types(). * * They are in a separate file as it is ~100 lines of unreadable and * uninteresting machine generated stuff. */ #include "ec_kmgmt_imexport.inc" static ossl_inline const OSSL_PARAM *ec_imexport_types(int selection) { int type_select = 0; if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) type_select += 1; if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) type_select += 2; if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) type_select += 4; if ((selection & OSSL_KEYMGMT_SELECT_OTHER_PARAMETERS) != 0) type_select += 8; return ec_types[type_select]; } static const OSSL_PARAM *ec_import_types(int selection) { return ec_imexport_types(selection); } static const OSSL_PARAM *ec_export_types(int selection) { return ec_imexport_types(selection); } static int ec_get_ecm_params(const EC_GROUP *group, OSSL_PARAM params[]) { #ifdef OPENSSL_NO_EC2M return 1; #else int ret = 0, m; unsigned int k1 = 0, k2 = 0, k3 = 0; int basis_nid; const char *basis_name = NULL; int fid = EC_GROUP_get_field_type(group); if (fid != NID_X9_62_characteristic_two_field) return 1; basis_nid = EC_GROUP_get_basis_type(group); if (basis_nid == NID_X9_62_tpBasis) basis_name = SN_X9_62_tpBasis; else if (basis_nid == NID_X9_62_ppBasis) basis_name = SN_X9_62_ppBasis; else goto err; m = EC_GROUP_get_degree(group); if (!ossl_param_build_set_int(NULL, params, OSSL_PKEY_PARAM_EC_CHAR2_M, m) || !ossl_param_build_set_utf8_string(NULL, params, OSSL_PKEY_PARAM_EC_CHAR2_TYPE, basis_name)) goto err; if (basis_nid == NID_X9_62_tpBasis) { if (!EC_GROUP_get_trinomial_basis(group, &k1) || !ossl_param_build_set_int(NULL, params, OSSL_PKEY_PARAM_EC_CHAR2_TP_BASIS, (int)k1)) goto err; } else { if (!EC_GROUP_get_pentanomial_basis(group, &k1, &k2, &k3) || !ossl_param_build_set_int(NULL, params, OSSL_PKEY_PARAM_EC_CHAR2_PP_K1, (int)k1) || !ossl_param_build_set_int(NULL, params, OSSL_PKEY_PARAM_EC_CHAR2_PP_K2, (int)k2) || !ossl_param_build_set_int(NULL, params, OSSL_PKEY_PARAM_EC_CHAR2_PP_K3, (int)k3)) goto err; } ret = 1; err: return ret; #endif /* OPENSSL_NO_EC2M */ } static int common_get_params(void *key, OSSL_PARAM params[], int sm2) { int ret = 0; EC_KEY *eck = key; const EC_GROUP *ecg = NULL; OSSL_PARAM *p; unsigned char *pub_key = NULL, *genbuf = NULL; OSSL_LIB_CTX *libctx; const char *propq; BN_CTX *bnctx = NULL; ecg = EC_KEY_get0_group(eck); if (ecg == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_NO_PARAMETERS_SET); return 0; } libctx = ossl_ec_key_get_libctx(eck); propq = ossl_ec_key_get0_propq(eck); bnctx = BN_CTX_new_ex(libctx); if (bnctx == NULL) return 0; BN_CTX_start(bnctx); if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_MAX_SIZE)) != NULL && !OSSL_PARAM_set_int(p, ECDSA_size(eck))) goto err; if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_BITS)) != NULL && !OSSL_PARAM_set_int(p, EC_GROUP_order_bits(ecg))) goto err; if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_SECURITY_BITS)) != NULL) { int ecbits, sec_bits; ecbits = EC_GROUP_order_bits(ecg); /* * The following estimates are based on the values published * in Table 2 of "NIST Special Publication 800-57 Part 1 Revision 4" * at http://dx.doi.org/10.6028/NIST.SP.800-57pt1r4 . * * Note that the above reference explicitly categorizes algorithms in a * discrete set of values {80, 112, 128, 192, 256}, and that it is * relevant only for NIST approved Elliptic Curves, while OpenSSL * applies the same logic also to other curves. * * Classifications produced by other standardazing bodies might differ, * so the results provided for "bits of security" by this provider are * to be considered merely indicative, and it is the users' * responsibility to compare these values against the normative * references that may be relevant for their intent and purposes. */ if (ecbits >= 512) sec_bits = 256; else if (ecbits >= 384) sec_bits = 192; else if (ecbits >= 256) sec_bits = 128; else if (ecbits >= 224) sec_bits = 112; else if (ecbits >= 160) sec_bits = 80; else sec_bits = ecbits / 2; if (!OSSL_PARAM_set_int(p, sec_bits)) goto err; } if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_EC_DECODED_FROM_EXPLICIT_PARAMS)) != NULL) { int explicitparams = EC_KEY_decoded_from_explicit_params(eck); if (explicitparams < 0 || !OSSL_PARAM_set_int(p, explicitparams)) goto err; } if (!sm2) { if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_DEFAULT_DIGEST)) != NULL && !OSSL_PARAM_set_utf8_string(p, EC_DEFAULT_MD)) goto err; } else { if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_DEFAULT_DIGEST)) != NULL && !OSSL_PARAM_set_utf8_string(p, SM2_DEFAULT_MD)) goto err; } /* SM2 doesn't support this PARAM */ if (!sm2) { p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_USE_COFACTOR_ECDH); if (p != NULL) { int ecdh_cofactor_mode = 0; ecdh_cofactor_mode = (EC_KEY_get_flags(eck) & EC_FLAG_COFACTOR_ECDH) ? 1 : 0; if (!OSSL_PARAM_set_int(p, ecdh_cofactor_mode)) goto err; } } if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY)) != NULL) { const EC_POINT *ecp = EC_KEY_get0_public_key(key); if (ecp == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY); goto err; } p->return_size = EC_POINT_point2oct(ecg, ecp, POINT_CONVERSION_UNCOMPRESSED, p->data, p->data_size, bnctx); if (p->return_size == 0) goto err; } ret = ec_get_ecm_params(ecg, params) && ossl_ec_group_todata(ecg, NULL, params, libctx, propq, bnctx, &genbuf) && key_to_params(eck, NULL, params, 1, &pub_key) && otherparams_to_params(eck, NULL, params); err: OPENSSL_free(genbuf); OPENSSL_free(pub_key); BN_CTX_end(bnctx); BN_CTX_free(bnctx); return ret; } static int ec_get_params(void *key, OSSL_PARAM params[]) { return common_get_params(key, params, 0); } #ifndef OPENSSL_NO_EC2M # define EC2M_GETTABLE_DOM_PARAMS \ OSSL_PARAM_int(OSSL_PKEY_PARAM_EC_CHAR2_M, NULL), \ OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_EC_CHAR2_TYPE, NULL, 0), \ OSSL_PARAM_int(OSSL_PKEY_PARAM_EC_CHAR2_TP_BASIS, NULL), \ OSSL_PARAM_int(OSSL_PKEY_PARAM_EC_CHAR2_PP_K1, NULL), \ OSSL_PARAM_int(OSSL_PKEY_PARAM_EC_CHAR2_PP_K2, NULL), \ OSSL_PARAM_int(OSSL_PKEY_PARAM_EC_CHAR2_PP_K3, NULL), #else # define EC2M_GETTABLE_DOM_PARAMS #endif static const OSSL_PARAM ec_known_gettable_params[] = { OSSL_PARAM_int(OSSL_PKEY_PARAM_BITS, NULL), OSSL_PARAM_int(OSSL_PKEY_PARAM_SECURITY_BITS, NULL), OSSL_PARAM_int(OSSL_PKEY_PARAM_MAX_SIZE, NULL), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_DEFAULT_DIGEST, NULL, 0), OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY, NULL, 0), OSSL_PARAM_int(OSSL_PKEY_PARAM_EC_DECODED_FROM_EXPLICIT_PARAMS, NULL), EC_IMEXPORTABLE_DOM_PARAMETERS, EC2M_GETTABLE_DOM_PARAMS EC_IMEXPORTABLE_PUBLIC_KEY, OSSL_PARAM_BN(OSSL_PKEY_PARAM_EC_PUB_X, NULL, 0), OSSL_PARAM_BN(OSSL_PKEY_PARAM_EC_PUB_Y, NULL, 0), EC_IMEXPORTABLE_PRIVATE_KEY, EC_IMEXPORTABLE_OTHER_PARAMETERS, OSSL_PARAM_END }; static const OSSL_PARAM *ec_gettable_params(void *provctx) { return ec_known_gettable_params; } static const OSSL_PARAM ec_known_settable_params[] = { OSSL_PARAM_int(OSSL_PKEY_PARAM_USE_COFACTOR_ECDH, NULL), OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY, NULL, 0), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_EC_ENCODING, NULL, 0), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_EC_POINT_CONVERSION_FORMAT, NULL, 0), OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_EC_SEED, NULL, 0), OSSL_PARAM_int(OSSL_PKEY_PARAM_EC_INCLUDE_PUBLIC, NULL), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_EC_GROUP_CHECK_TYPE, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *ec_settable_params(void *provctx) { return ec_known_settable_params; } static int ec_set_params(void *key, const OSSL_PARAM params[]) { EC_KEY *eck = key; const OSSL_PARAM *p; if (key == NULL) return 0; if (params == NULL) return 1; if (!ossl_ec_group_set_params((EC_GROUP *)EC_KEY_get0_group(key), params)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY); if (p != NULL) { BN_CTX *ctx = BN_CTX_new_ex(ossl_ec_key_get_libctx(key)); int ret = 1; if (ctx == NULL || p->data_type != OSSL_PARAM_OCTET_STRING || !EC_KEY_oct2key(key, p->data, p->data_size, ctx)) ret = 0; BN_CTX_free(ctx); if (!ret) return 0; } return ossl_ec_key_otherparams_fromdata(eck, params); } #ifndef FIPS_MODULE # ifndef OPENSSL_NO_SM2 static int sm2_get_params(void *key, OSSL_PARAM params[]) { return common_get_params(key, params, 1); } static const OSSL_PARAM sm2_known_gettable_params[] = { OSSL_PARAM_int(OSSL_PKEY_PARAM_BITS, NULL), OSSL_PARAM_int(OSSL_PKEY_PARAM_SECURITY_BITS, NULL), OSSL_PARAM_int(OSSL_PKEY_PARAM_MAX_SIZE, NULL), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_DEFAULT_DIGEST, NULL, 0), OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY, NULL, 0), OSSL_PARAM_int(OSSL_PKEY_PARAM_EC_DECODED_FROM_EXPLICIT_PARAMS, NULL), EC_IMEXPORTABLE_DOM_PARAMETERS, EC_IMEXPORTABLE_PUBLIC_KEY, OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_EC_PUB_X, NULL, 0), OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_EC_PUB_Y, NULL, 0), EC_IMEXPORTABLE_PRIVATE_KEY, OSSL_PARAM_END }; static const OSSL_PARAM *sm2_gettable_params(ossl_unused void *provctx) { return sm2_known_gettable_params; } static const OSSL_PARAM sm2_known_settable_params[] = { OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *sm2_settable_params(ossl_unused void *provctx) { return sm2_known_settable_params; } static int sm2_validate(const void *keydata, int selection, int checktype) { const EC_KEY *eck = keydata; int ok = 1; BN_CTX *ctx = NULL; if (!ossl_prov_is_running()) return 0; if ((selection & EC_POSSIBLE_SELECTIONS) == 0) return 1; /* nothing to validate */ ctx = BN_CTX_new_ex(ossl_ec_key_get_libctx(eck)); if (ctx == NULL) return 0; if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) ok = ok && EC_GROUP_check(EC_KEY_get0_group(eck), ctx); if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { if (checktype == OSSL_KEYMGMT_VALIDATE_QUICK_CHECK) ok = ok && ossl_ec_key_public_check_quick(eck, ctx); else ok = ok && ossl_ec_key_public_check(eck, ctx); } if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) ok = ok && ossl_sm2_key_private_check(eck); if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) == OSSL_KEYMGMT_SELECT_KEYPAIR) ok = ok && ossl_ec_key_pairwise_check(eck, ctx); BN_CTX_free(ctx); return ok; } # endif #endif static int ec_validate(const void *keydata, int selection, int checktype) { const EC_KEY *eck = keydata; int ok = 1; BN_CTX *ctx = NULL; if (!ossl_prov_is_running()) return 0; if ((selection & EC_POSSIBLE_SELECTIONS) == 0) return 1; /* nothing to validate */ ctx = BN_CTX_new_ex(ossl_ec_key_get_libctx(eck)); if (ctx == NULL) return 0; if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) { int flags = EC_KEY_get_flags(eck); if ((flags & EC_FLAG_CHECK_NAMED_GROUP) != 0) ok = ok && EC_GROUP_check_named_curve(EC_KEY_get0_group(eck), (flags & EC_FLAG_CHECK_NAMED_GROUP_NIST) != 0, ctx) > 0; else ok = ok && EC_GROUP_check(EC_KEY_get0_group(eck), ctx); } if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { if (checktype == OSSL_KEYMGMT_VALIDATE_QUICK_CHECK) ok = ok && ossl_ec_key_public_check_quick(eck, ctx); else ok = ok && ossl_ec_key_public_check(eck, ctx); } if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) ok = ok && ossl_ec_key_private_check(eck); if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) == OSSL_KEYMGMT_SELECT_KEYPAIR) ok = ok && ossl_ec_key_pairwise_check(eck, ctx); BN_CTX_free(ctx); return ok; } struct ec_gen_ctx { OSSL_LIB_CTX *libctx; char *group_name; char *encoding; char *pt_format; char *group_check; char *field_type; BIGNUM *p, *a, *b, *order, *cofactor; unsigned char *gen, *seed; size_t gen_len, seed_len; int selection; int ecdh_mode; EC_GROUP *gen_group; unsigned char *dhkem_ikm; size_t dhkem_ikmlen; }; static void *ec_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) { OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(provctx); struct ec_gen_ctx *gctx = NULL; if (!ossl_prov_is_running() || (selection & (EC_POSSIBLE_SELECTIONS)) == 0) return NULL; if ((gctx = OPENSSL_zalloc(sizeof(*gctx))) != NULL) { gctx->libctx = libctx; gctx->selection = selection; gctx->ecdh_mode = 0; if (!ec_gen_set_params(gctx, params)) { OPENSSL_free(gctx); gctx = NULL; } } return gctx; } #ifndef FIPS_MODULE # ifndef OPENSSL_NO_SM2 static void *sm2_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) { struct ec_gen_ctx *gctx = ec_gen_init(provctx, selection, params); if (gctx != NULL) { if (gctx->group_name != NULL) return gctx; if ((gctx->group_name = OPENSSL_strdup("sm2")) != NULL) return gctx; ec_gen_cleanup(gctx); } return NULL; } # endif #endif static int ec_gen_set_group(void *genctx, const EC_GROUP *src) { struct ec_gen_ctx *gctx = genctx; EC_GROUP *group; group = EC_GROUP_dup(src); if (group == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_CURVE); return 0; } EC_GROUP_free(gctx->gen_group); gctx->gen_group = group; return 1; } static int ec_gen_set_template(void *genctx, void *templ) { struct ec_gen_ctx *gctx = genctx; EC_KEY *ec = templ; const EC_GROUP *ec_group; if (!ossl_prov_is_running() || gctx == NULL || ec == NULL) return 0; if ((ec_group = EC_KEY_get0_group(ec)) == NULL) return 0; return ec_gen_set_group(gctx, ec_group); } #define COPY_INT_PARAM(params, key, val) \ p = OSSL_PARAM_locate_const(params, key); \ if (p != NULL && !OSSL_PARAM_get_int(p, &val)) \ goto err; #define COPY_UTF8_PARAM(params, key, val) \ p = OSSL_PARAM_locate_const(params, key); \ if (p != NULL) { \ if (p->data_type != OSSL_PARAM_UTF8_STRING) \ goto err; \ OPENSSL_free(val); \ val = OPENSSL_strdup(p->data); \ if (val == NULL) \ goto err; \ } #define COPY_OCTET_PARAM(params, key, val, len) \ p = OSSL_PARAM_locate_const(params, key); \ if (p != NULL) { \ if (p->data_type != OSSL_PARAM_OCTET_STRING) \ goto err; \ OPENSSL_free(val); \ len = p->data_size; \ val = OPENSSL_memdup(p->data, p->data_size); \ if (val == NULL) \ goto err; \ } #define COPY_BN_PARAM(params, key, bn) \ p = OSSL_PARAM_locate_const(params, key); \ if (p != NULL) { \ if (bn == NULL) \ bn = BN_new(); \ if (bn == NULL || !OSSL_PARAM_get_BN(p, &bn)) \ goto err; \ } static int ec_gen_set_params(void *genctx, const OSSL_PARAM params[]) { int ret = 0; struct ec_gen_ctx *gctx = genctx; const OSSL_PARAM *p; EC_GROUP *group = NULL; COPY_INT_PARAM(params, OSSL_PKEY_PARAM_USE_COFACTOR_ECDH, gctx->ecdh_mode); COPY_UTF8_PARAM(params, OSSL_PKEY_PARAM_GROUP_NAME, gctx->group_name); COPY_UTF8_PARAM(params, OSSL_PKEY_PARAM_EC_FIELD_TYPE, gctx->field_type); COPY_UTF8_PARAM(params, OSSL_PKEY_PARAM_EC_ENCODING, gctx->encoding); COPY_UTF8_PARAM(params, OSSL_PKEY_PARAM_EC_POINT_CONVERSION_FORMAT, gctx->pt_format); COPY_UTF8_PARAM(params, OSSL_PKEY_PARAM_EC_GROUP_CHECK_TYPE, gctx->group_check); COPY_BN_PARAM(params, OSSL_PKEY_PARAM_EC_P, gctx->p); COPY_BN_PARAM(params, OSSL_PKEY_PARAM_EC_A, gctx->a); COPY_BN_PARAM(params, OSSL_PKEY_PARAM_EC_B, gctx->b); COPY_BN_PARAM(params, OSSL_PKEY_PARAM_EC_ORDER, gctx->order); COPY_BN_PARAM(params, OSSL_PKEY_PARAM_EC_COFACTOR, gctx->cofactor); COPY_OCTET_PARAM(params, OSSL_PKEY_PARAM_EC_SEED, gctx->seed, gctx->seed_len); COPY_OCTET_PARAM(params, OSSL_PKEY_PARAM_EC_GENERATOR, gctx->gen, gctx->gen_len); COPY_OCTET_PARAM(params, OSSL_PKEY_PARAM_DHKEM_IKM, gctx->dhkem_ikm, gctx->dhkem_ikmlen); ret = 1; err: EC_GROUP_free(group); return ret; } static int ec_gen_set_group_from_params(struct ec_gen_ctx *gctx) { int ret = 0; OSSL_PARAM_BLD *bld; OSSL_PARAM *params = NULL; EC_GROUP *group = NULL; bld = OSSL_PARAM_BLD_new(); if (bld == NULL) return 0; if (gctx->encoding != NULL && !OSSL_PARAM_BLD_push_utf8_string(bld, OSSL_PKEY_PARAM_EC_ENCODING, gctx->encoding, 0)) goto err; if (gctx->pt_format != NULL && !OSSL_PARAM_BLD_push_utf8_string(bld, OSSL_PKEY_PARAM_EC_POINT_CONVERSION_FORMAT, gctx->pt_format, 0)) goto err; if (gctx->group_name != NULL) { if (!OSSL_PARAM_BLD_push_utf8_string(bld, OSSL_PKEY_PARAM_GROUP_NAME, gctx->group_name, 0)) goto err; /* Ignore any other parameters if there is a group name */ goto build; } else if (gctx->field_type != NULL) { if (!OSSL_PARAM_BLD_push_utf8_string(bld, OSSL_PKEY_PARAM_EC_FIELD_TYPE, gctx->field_type, 0)) goto err; } else { goto err; } if (gctx->p == NULL || gctx->a == NULL || gctx->b == NULL || gctx->order == NULL || !OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_P, gctx->p) || !OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_A, gctx->a) || !OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_B, gctx->b) || !OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_ORDER, gctx->order)) goto err; if (gctx->cofactor != NULL && !OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_COFACTOR, gctx->cofactor)) goto err; if (gctx->seed != NULL && !OSSL_PARAM_BLD_push_octet_string(bld, OSSL_PKEY_PARAM_EC_SEED, gctx->seed, gctx->seed_len)) goto err; if (gctx->gen == NULL || !OSSL_PARAM_BLD_push_octet_string(bld, OSSL_PKEY_PARAM_EC_GENERATOR, gctx->gen, gctx->gen_len)) goto err; build: params = OSSL_PARAM_BLD_to_param(bld); if (params == NULL) goto err; group = EC_GROUP_new_from_params(params, gctx->libctx, NULL); if (group == NULL) goto err; EC_GROUP_free(gctx->gen_group); gctx->gen_group = group; ret = 1; err: OSSL_PARAM_free(params); OSSL_PARAM_BLD_free(bld); return ret; } static const OSSL_PARAM *ec_gen_settable_params(ossl_unused void *genctx, ossl_unused void *provctx) { static OSSL_PARAM settable[] = { OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_GROUP_NAME, NULL, 0), OSSL_PARAM_int(OSSL_PKEY_PARAM_USE_COFACTOR_ECDH, NULL), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_EC_ENCODING, NULL, 0), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_EC_POINT_CONVERSION_FORMAT, NULL, 0), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_EC_FIELD_TYPE, NULL, 0), OSSL_PARAM_BN(OSSL_PKEY_PARAM_EC_P, NULL, 0), OSSL_PARAM_BN(OSSL_PKEY_PARAM_EC_A, NULL, 0), OSSL_PARAM_BN(OSSL_PKEY_PARAM_EC_B, NULL, 0), OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_EC_GENERATOR, NULL, 0), OSSL_PARAM_BN(OSSL_PKEY_PARAM_EC_ORDER, NULL, 0), OSSL_PARAM_BN(OSSL_PKEY_PARAM_EC_COFACTOR, NULL, 0), OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_EC_SEED, NULL, 0), OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_DHKEM_IKM, NULL, 0), OSSL_PARAM_END }; return settable; } static int ec_gen_assign_group(EC_KEY *ec, EC_GROUP *group) { if (group == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_NO_PARAMETERS_SET); return 0; } return EC_KEY_set_group(ec, group) > 0; } /* * The callback arguments (osslcb & cbarg) are not used by EC_KEY generation */ static void *ec_gen(void *genctx, OSSL_CALLBACK *osslcb, void *cbarg) { struct ec_gen_ctx *gctx = genctx; EC_KEY *ec = NULL; int ret = 0; if (!ossl_prov_is_running() || gctx == NULL || (ec = EC_KEY_new_ex(gctx->libctx, NULL)) == NULL) return NULL; if (gctx->gen_group == NULL) { if (!ec_gen_set_group_from_params(gctx)) goto err; } else { if (gctx->encoding != NULL) { int flags = ossl_ec_encoding_name2id(gctx->encoding); if (flags < 0) goto err; EC_GROUP_set_asn1_flag(gctx->gen_group, flags); } if (gctx->pt_format != NULL) { int format = ossl_ec_pt_format_name2id(gctx->pt_format); if (format < 0) goto err; EC_GROUP_set_point_conversion_form(gctx->gen_group, format); } } /* We must always assign a group, no matter what */ ret = ec_gen_assign_group(ec, gctx->gen_group); /* Whether you want it or not, you get a keypair, not just one half */ if ((gctx->selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { #ifndef FIPS_MODULE if (gctx->dhkem_ikm != NULL && gctx->dhkem_ikmlen != 0) ret = ret && ossl_ec_generate_key_dhkem(ec, gctx->dhkem_ikm, gctx->dhkem_ikmlen); else #endif ret = ret && EC_KEY_generate_key(ec); } if (gctx->ecdh_mode != -1) ret = ret && ossl_ec_set_ecdh_cofactor_mode(ec, gctx->ecdh_mode); if (gctx->group_check != NULL) ret = ret && ossl_ec_set_check_group_type_from_name(ec, gctx->group_check); if (ret) return ec; err: /* Something went wrong, throw the key away */ EC_KEY_free(ec); return NULL; } #ifndef FIPS_MODULE # ifndef OPENSSL_NO_SM2 /* * The callback arguments (osslcb & cbarg) are not used by EC_KEY generation */ static void *sm2_gen(void *genctx, OSSL_CALLBACK *osslcb, void *cbarg) { struct ec_gen_ctx *gctx = genctx; EC_KEY *ec = NULL; int ret = 1; if (gctx == NULL || (ec = EC_KEY_new_ex(gctx->libctx, NULL)) == NULL) return NULL; if (gctx->gen_group == NULL) { if (!ec_gen_set_group_from_params(gctx)) goto err; } else { if (gctx->encoding) { int flags = ossl_ec_encoding_name2id(gctx->encoding); if (flags < 0) goto err; EC_GROUP_set_asn1_flag(gctx->gen_group, flags); } if (gctx->pt_format != NULL) { int format = ossl_ec_pt_format_name2id(gctx->pt_format); if (format < 0) goto err; EC_GROUP_set_point_conversion_form(gctx->gen_group, format); } } /* We must always assign a group, no matter what */ ret = ec_gen_assign_group(ec, gctx->gen_group); /* Whether you want it or not, you get a keypair, not just one half */ if ((gctx->selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) ret = ret && EC_KEY_generate_key(ec); if (ret) return ec; err: /* Something went wrong, throw the key away */ EC_KEY_free(ec); return NULL; } # endif #endif static void ec_gen_cleanup(void *genctx) { struct ec_gen_ctx *gctx = genctx; if (gctx == NULL) return; OPENSSL_clear_free(gctx->dhkem_ikm, gctx->dhkem_ikmlen); EC_GROUP_free(gctx->gen_group); BN_free(gctx->p); BN_free(gctx->a); BN_free(gctx->b); BN_free(gctx->order); BN_free(gctx->cofactor); OPENSSL_free(gctx->group_name); OPENSSL_free(gctx->field_type); OPENSSL_free(gctx->pt_format); OPENSSL_free(gctx->encoding); OPENSSL_free(gctx->seed); OPENSSL_free(gctx->gen); OPENSSL_free(gctx); } static void *common_load(const void *reference, size_t reference_sz, int sm2_wanted) { EC_KEY *ec = NULL; if (ossl_prov_is_running() && reference_sz == sizeof(ec)) { /* The contents of the reference is the address to our object */ ec = *(EC_KEY **)reference; if (!common_check_sm2(ec, sm2_wanted)) return NULL; /* We grabbed, so we detach it */ *(EC_KEY **)reference = NULL; return ec; } return NULL; } static void *ec_load(const void *reference, size_t reference_sz) { return common_load(reference, reference_sz, 0); } #ifndef FIPS_MODULE # ifndef OPENSSL_NO_SM2 static void *sm2_load(const void *reference, size_t reference_sz) { return common_load(reference, reference_sz, 1); } # endif #endif static void *ec_dup(const void *keydata_from, int selection) { if (ossl_prov_is_running()) return ossl_ec_key_dup(keydata_from, selection); return NULL; } const OSSL_DISPATCH ossl_ec_keymgmt_functions[] = { { OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))ec_newdata }, { OSSL_FUNC_KEYMGMT_GEN_INIT, (void (*)(void))ec_gen_init }, { OSSL_FUNC_KEYMGMT_GEN_SET_TEMPLATE, (void (*)(void))ec_gen_set_template }, { OSSL_FUNC_KEYMGMT_GEN_SET_PARAMS, (void (*)(void))ec_gen_set_params }, { OSSL_FUNC_KEYMGMT_GEN_SETTABLE_PARAMS, (void (*)(void))ec_gen_settable_params }, { OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))ec_gen }, { OSSL_FUNC_KEYMGMT_GEN_CLEANUP, (void (*)(void))ec_gen_cleanup }, { OSSL_FUNC_KEYMGMT_LOAD, (void (*)(void))ec_load }, { OSSL_FUNC_KEYMGMT_FREE, (void (*)(void))ec_freedata }, { OSSL_FUNC_KEYMGMT_GET_PARAMS, (void (*) (void))ec_get_params }, { OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS, (void (*) (void))ec_gettable_params }, { OSSL_FUNC_KEYMGMT_SET_PARAMS, (void (*) (void))ec_set_params }, { OSSL_FUNC_KEYMGMT_SETTABLE_PARAMS, (void (*) (void))ec_settable_params }, { OSSL_FUNC_KEYMGMT_HAS, (void (*)(void))ec_has }, { OSSL_FUNC_KEYMGMT_MATCH, (void (*)(void))ec_match }, { OSSL_FUNC_KEYMGMT_VALIDATE, (void (*)(void))ec_validate }, { OSSL_FUNC_KEYMGMT_IMPORT, (void (*)(void))ec_import }, { OSSL_FUNC_KEYMGMT_IMPORT_TYPES, (void (*)(void))ec_import_types }, { OSSL_FUNC_KEYMGMT_EXPORT, (void (*)(void))ec_export }, { OSSL_FUNC_KEYMGMT_EXPORT_TYPES, (void (*)(void))ec_export_types }, { OSSL_FUNC_KEYMGMT_QUERY_OPERATION_NAME, (void (*)(void))ec_query_operation_name }, { OSSL_FUNC_KEYMGMT_DUP, (void (*)(void))ec_dup }, OSSL_DISPATCH_END }; #ifndef FIPS_MODULE # ifndef OPENSSL_NO_SM2 const OSSL_DISPATCH ossl_sm2_keymgmt_functions[] = { { OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))sm2_newdata }, { OSSL_FUNC_KEYMGMT_GEN_INIT, (void (*)(void))sm2_gen_init }, { OSSL_FUNC_KEYMGMT_GEN_SET_TEMPLATE, (void (*)(void))ec_gen_set_template }, { OSSL_FUNC_KEYMGMT_GEN_SET_PARAMS, (void (*)(void))ec_gen_set_params }, { OSSL_FUNC_KEYMGMT_GEN_SETTABLE_PARAMS, (void (*)(void))ec_gen_settable_params }, { OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))sm2_gen }, { OSSL_FUNC_KEYMGMT_GEN_CLEANUP, (void (*)(void))ec_gen_cleanup }, { OSSL_FUNC_KEYMGMT_LOAD, (void (*)(void))sm2_load }, { OSSL_FUNC_KEYMGMT_FREE, (void (*)(void))ec_freedata }, { OSSL_FUNC_KEYMGMT_GET_PARAMS, (void (*) (void))sm2_get_params }, { OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS, (void (*) (void))sm2_gettable_params }, { OSSL_FUNC_KEYMGMT_SET_PARAMS, (void (*) (void))ec_set_params }, { OSSL_FUNC_KEYMGMT_SETTABLE_PARAMS, (void (*) (void))sm2_settable_params }, { OSSL_FUNC_KEYMGMT_HAS, (void (*)(void))ec_has }, { OSSL_FUNC_KEYMGMT_MATCH, (void (*)(void))ec_match }, { OSSL_FUNC_KEYMGMT_VALIDATE, (void (*)(void))sm2_validate }, { OSSL_FUNC_KEYMGMT_IMPORT, (void (*)(void))sm2_import }, { OSSL_FUNC_KEYMGMT_IMPORT_TYPES, (void (*)(void))ec_import_types }, { OSSL_FUNC_KEYMGMT_EXPORT, (void (*)(void))ec_export }, { OSSL_FUNC_KEYMGMT_EXPORT_TYPES, (void (*)(void))ec_export_types }, { OSSL_FUNC_KEYMGMT_QUERY_OPERATION_NAME, (void (*)(void))sm2_query_operation_name }, { OSSL_FUNC_KEYMGMT_DUP, (void (*)(void))ec_dup }, OSSL_DISPATCH_END }; # endif #endif
./openssl/providers/implementations/keymgmt/rsa_kmgmt.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * RSA low level APIs are deprecated for public use, but still ok for * internal use. */ #include "internal/deprecated.h" #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/bn.h> #include <openssl/err.h> #include <openssl/rsa.h> #include <openssl/evp.h> #include <openssl/proverr.h> #include "prov/implementations.h" #include "prov/providercommon.h" #include "prov/provider_ctx.h" #include "crypto/rsa.h" #include "crypto/cryptlib.h" #include "internal/param_build_set.h" static OSSL_FUNC_keymgmt_new_fn rsa_newdata; static OSSL_FUNC_keymgmt_new_fn rsapss_newdata; static OSSL_FUNC_keymgmt_gen_init_fn rsa_gen_init; static OSSL_FUNC_keymgmt_gen_init_fn rsapss_gen_init; static OSSL_FUNC_keymgmt_gen_set_params_fn rsa_gen_set_params; static OSSL_FUNC_keymgmt_gen_settable_params_fn rsa_gen_settable_params; static OSSL_FUNC_keymgmt_gen_settable_params_fn rsapss_gen_settable_params; static OSSL_FUNC_keymgmt_gen_fn rsa_gen; static OSSL_FUNC_keymgmt_gen_cleanup_fn rsa_gen_cleanup; static OSSL_FUNC_keymgmt_load_fn rsa_load; static OSSL_FUNC_keymgmt_load_fn rsapss_load; static OSSL_FUNC_keymgmt_free_fn rsa_freedata; static OSSL_FUNC_keymgmt_get_params_fn rsa_get_params; static OSSL_FUNC_keymgmt_gettable_params_fn rsa_gettable_params; static OSSL_FUNC_keymgmt_has_fn rsa_has; static OSSL_FUNC_keymgmt_match_fn rsa_match; static OSSL_FUNC_keymgmt_validate_fn rsa_validate; static OSSL_FUNC_keymgmt_import_fn rsa_import; static OSSL_FUNC_keymgmt_import_types_fn rsa_import_types; static OSSL_FUNC_keymgmt_export_fn rsa_export; static OSSL_FUNC_keymgmt_export_types_fn rsa_export_types; static OSSL_FUNC_keymgmt_query_operation_name_fn rsa_query_operation_name; static OSSL_FUNC_keymgmt_dup_fn rsa_dup; #define RSA_DEFAULT_MD "SHA256" #define RSA_PSS_DEFAULT_MD OSSL_DIGEST_NAME_SHA1 #define RSA_POSSIBLE_SELECTIONS \ (OSSL_KEYMGMT_SELECT_KEYPAIR | OSSL_KEYMGMT_SELECT_OTHER_PARAMETERS) DEFINE_STACK_OF(BIGNUM) DEFINE_SPECIAL_STACK_OF_CONST(BIGNUM_const, BIGNUM) static int pss_params_fromdata(RSA_PSS_PARAMS_30 *pss_params, int *defaults_set, const OSSL_PARAM params[], int rsa_type, OSSL_LIB_CTX *libctx) { if (!ossl_rsa_pss_params_30_fromdata(pss_params, defaults_set, params, libctx)) return 0; /* If not a PSS type RSA, sending us PSS parameters is wrong */ if (rsa_type != RSA_FLAG_TYPE_RSASSAPSS && !ossl_rsa_pss_params_30_is_unrestricted(pss_params)) return 0; return 1; } static void *rsa_newdata(void *provctx) { OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(provctx); RSA *rsa; if (!ossl_prov_is_running()) return NULL; rsa = ossl_rsa_new_with_ctx(libctx); if (rsa != NULL) { RSA_clear_flags(rsa, RSA_FLAG_TYPE_MASK); RSA_set_flags(rsa, RSA_FLAG_TYPE_RSA); } return rsa; } static void *rsapss_newdata(void *provctx) { OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(provctx); RSA *rsa; if (!ossl_prov_is_running()) return NULL; rsa = ossl_rsa_new_with_ctx(libctx); if (rsa != NULL) { RSA_clear_flags(rsa, RSA_FLAG_TYPE_MASK); RSA_set_flags(rsa, RSA_FLAG_TYPE_RSASSAPSS); } return rsa; } static void rsa_freedata(void *keydata) { RSA_free(keydata); } static int rsa_has(const void *keydata, int selection) { const RSA *rsa = keydata; int ok = 1; if (rsa == NULL || !ossl_prov_is_running()) return 0; if ((selection & RSA_POSSIBLE_SELECTIONS) == 0) return 1; /* the selection is not missing */ /* OSSL_KEYMGMT_SELECT_OTHER_PARAMETERS are always available even if empty */ if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) ok = ok && (RSA_get0_n(rsa) != NULL); if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) ok = ok && (RSA_get0_e(rsa) != NULL); if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) ok = ok && (RSA_get0_d(rsa) != NULL); return ok; } static int rsa_match(const void *keydata1, const void *keydata2, int selection) { const RSA *rsa1 = keydata1; const RSA *rsa2 = keydata2; int ok = 1; if (!ossl_prov_is_running()) return 0; /* There is always an |e| */ ok = ok && BN_cmp(RSA_get0_e(rsa1), RSA_get0_e(rsa2)) == 0; if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { int key_checked = 0; if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { const BIGNUM *pa = RSA_get0_n(rsa1); const BIGNUM *pb = RSA_get0_n(rsa2); if (pa != NULL && pb != NULL) { ok = ok && BN_cmp(pa, pb) == 0; key_checked = 1; } } if (!key_checked && (selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { const BIGNUM *pa = RSA_get0_d(rsa1); const BIGNUM *pb = RSA_get0_d(rsa2); if (pa != NULL && pb != NULL) { ok = ok && BN_cmp(pa, pb) == 0; key_checked = 1; } } ok = ok && key_checked; } return ok; } static int rsa_import(void *keydata, int selection, const OSSL_PARAM params[]) { RSA *rsa = keydata; int rsa_type; int ok = 1; int pss_defaults_set = 0; if (!ossl_prov_is_running() || rsa == NULL) return 0; if ((selection & RSA_POSSIBLE_SELECTIONS) == 0) return 0; rsa_type = RSA_test_flags(rsa, RSA_FLAG_TYPE_MASK); if ((selection & OSSL_KEYMGMT_SELECT_OTHER_PARAMETERS) != 0) ok = ok && pss_params_fromdata(ossl_rsa_get0_pss_params_30(rsa), &pss_defaults_set, params, rsa_type, ossl_rsa_get0_libctx(rsa)); if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { int include_private = selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY ? 1 : 0; ok = ok && ossl_rsa_fromdata(rsa, params, include_private); } return ok; } static int rsa_export(void *keydata, int selection, OSSL_CALLBACK *param_callback, void *cbarg) { RSA *rsa = keydata; const RSA_PSS_PARAMS_30 *pss_params = ossl_rsa_get0_pss_params_30(rsa); OSSL_PARAM_BLD *tmpl; OSSL_PARAM *params = NULL; int ok = 1; if (!ossl_prov_is_running() || rsa == NULL) return 0; if ((selection & RSA_POSSIBLE_SELECTIONS) == 0) return 0; tmpl = OSSL_PARAM_BLD_new(); if (tmpl == NULL) return 0; if ((selection & OSSL_KEYMGMT_SELECT_OTHER_PARAMETERS) != 0) ok = ok && (ossl_rsa_pss_params_30_is_unrestricted(pss_params) || ossl_rsa_pss_params_30_todata(pss_params, tmpl, NULL)); if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { int include_private = selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY ? 1 : 0; ok = ok && ossl_rsa_todata(rsa, tmpl, NULL, include_private); } if (!ok || (params = OSSL_PARAM_BLD_to_param(tmpl)) == NULL) { ok = 0; goto err; } ok = param_callback(params, cbarg); OSSL_PARAM_free(params); err: OSSL_PARAM_BLD_free(tmpl); return ok; } #ifdef FIPS_MODULE /* In fips mode there are no multi-primes. */ # define RSA_KEY_MP_TYPES() \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR1, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR2, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT1, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT2, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_COEFFICIENT1, NULL, 0), #else /* * We allow up to 10 prime factors (starting with p, q). * NOTE: there is only 9 OSSL_PKEY_PARAM_RSA_COEFFICIENT */ # define RSA_KEY_MP_TYPES() \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR1, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR2, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR3, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR4, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR5, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR6, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR7, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR8, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR9, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR10, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT1, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT2, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT3, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT4, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT5, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT6, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT7, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT8, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT9, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT10, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_COEFFICIENT1, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_COEFFICIENT2, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_COEFFICIENT3, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_COEFFICIENT4, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_COEFFICIENT5, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_COEFFICIENT6, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_COEFFICIENT7, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_COEFFICIENT8, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_COEFFICIENT9, NULL, 0), #endif #define RSA_KEY_TYPES() \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_N, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_E, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_D, NULL, 0), \ RSA_KEY_MP_TYPES() /* * This provider can export everything in an RSA key, so we use the exact * same type description for export as for import. Other providers might * choose to import full keys, but only export the public parts, and will * therefore have the importkey_types and importkey_types functions return * different arrays. */ static const OSSL_PARAM rsa_key_types[] = { RSA_KEY_TYPES() OSSL_PARAM_END }; /* * We lied about the amount of factors, exponents and coefficients, the * export and import functions can really deal with an infinite amount * of these numbers. However, RSA keys with too many primes are futile, * so we at least pretend to have some limits. */ static const OSSL_PARAM *rsa_imexport_types(int selection) { if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) return rsa_key_types; return NULL; } static const OSSL_PARAM *rsa_import_types(int selection) { return rsa_imexport_types(selection); } static const OSSL_PARAM *rsa_export_types(int selection) { return rsa_imexport_types(selection); } static int rsa_get_params(void *key, OSSL_PARAM params[]) { RSA *rsa = key; const RSA_PSS_PARAMS_30 *pss_params = ossl_rsa_get0_pss_params_30(rsa); int rsa_type = RSA_test_flags(rsa, RSA_FLAG_TYPE_MASK); OSSL_PARAM *p; int empty = RSA_get0_n(rsa) == NULL; if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_BITS)) != NULL && (empty || !OSSL_PARAM_set_int(p, RSA_bits(rsa)))) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_SECURITY_BITS)) != NULL && (empty || !OSSL_PARAM_set_int(p, RSA_security_bits(rsa)))) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_MAX_SIZE)) != NULL && (empty || !OSSL_PARAM_set_int(p, RSA_size(rsa)))) return 0; /* * For restricted RSA-PSS keys, we ignore the default digest request. * With RSA-OAEP keys, this may need to be amended. */ if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_DEFAULT_DIGEST)) != NULL && (rsa_type != RSA_FLAG_TYPE_RSASSAPSS || ossl_rsa_pss_params_30_is_unrestricted(pss_params))) { if (!OSSL_PARAM_set_utf8_string(p, RSA_DEFAULT_MD)) return 0; } /* * For non-RSA-PSS keys, we ignore the mandatory digest request. * With RSA-OAEP keys, this may need to be amended. */ if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_MANDATORY_DIGEST)) != NULL && rsa_type == RSA_FLAG_TYPE_RSASSAPSS && !ossl_rsa_pss_params_30_is_unrestricted(pss_params)) { const char *mdname = ossl_rsa_oaeppss_nid2name(ossl_rsa_pss_params_30_hashalg(pss_params)); if (mdname == NULL || !OSSL_PARAM_set_utf8_string(p, mdname)) return 0; } return (rsa_type != RSA_FLAG_TYPE_RSASSAPSS || ossl_rsa_pss_params_30_todata(pss_params, NULL, params)) && ossl_rsa_todata(rsa, NULL, params, 1); } static const OSSL_PARAM rsa_params[] = { OSSL_PARAM_int(OSSL_PKEY_PARAM_BITS, NULL), OSSL_PARAM_int(OSSL_PKEY_PARAM_SECURITY_BITS, NULL), OSSL_PARAM_int(OSSL_PKEY_PARAM_MAX_SIZE, NULL), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_DEFAULT_DIGEST, NULL, 0), RSA_KEY_TYPES() OSSL_PARAM_END }; static const OSSL_PARAM *rsa_gettable_params(void *provctx) { return rsa_params; } static int rsa_validate(const void *keydata, int selection, int checktype) { const RSA *rsa = keydata; int ok = 1; if (!ossl_prov_is_running()) return 0; if ((selection & RSA_POSSIBLE_SELECTIONS) == 0) return 1; /* nothing to validate */ /* If the whole key is selected, we do a pairwise validation */ if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) == OSSL_KEYMGMT_SELECT_KEYPAIR) { ok = ok && ossl_rsa_validate_pairwise(rsa); } else { if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) ok = ok && ossl_rsa_validate_private(rsa); if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) ok = ok && ossl_rsa_validate_public(rsa); } return ok; } struct rsa_gen_ctx { OSSL_LIB_CTX *libctx; const char *propq; int rsa_type; size_t nbits; BIGNUM *pub_exp; size_t primes; /* For PSS */ RSA_PSS_PARAMS_30 pss_params; int pss_defaults_set; /* For generation callback */ OSSL_CALLBACK *cb; void *cbarg; #if defined(FIPS_MODULE) && !defined(OPENSSL_NO_ACVP_TESTS) /* ACVP test parameters */ OSSL_PARAM *acvp_test_params; #endif }; static int rsa_gencb(int p, int n, BN_GENCB *cb) { struct rsa_gen_ctx *gctx = BN_GENCB_get_arg(cb); OSSL_PARAM params[] = { OSSL_PARAM_END, OSSL_PARAM_END, OSSL_PARAM_END }; params[0] = OSSL_PARAM_construct_int(OSSL_GEN_PARAM_POTENTIAL, &p); params[1] = OSSL_PARAM_construct_int(OSSL_GEN_PARAM_ITERATION, &n); return gctx->cb(params, gctx->cbarg); } static void *gen_init(void *provctx, int selection, int rsa_type, const OSSL_PARAM params[]) { OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(provctx); struct rsa_gen_ctx *gctx = NULL; if (!ossl_prov_is_running()) return NULL; if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) == 0) return NULL; if ((gctx = OPENSSL_zalloc(sizeof(*gctx))) != NULL) { gctx->libctx = libctx; if ((gctx->pub_exp = BN_new()) == NULL || !BN_set_word(gctx->pub_exp, RSA_F4)) { goto err; } gctx->nbits = 2048; gctx->primes = RSA_DEFAULT_PRIME_NUM; gctx->rsa_type = rsa_type; } else { goto err; } if (!rsa_gen_set_params(gctx, params)) goto err; return gctx; err: if (gctx != NULL) BN_free(gctx->pub_exp); OPENSSL_free(gctx); return NULL; } static void *rsa_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) { return gen_init(provctx, selection, RSA_FLAG_TYPE_RSA, params); } static void *rsapss_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) { return gen_init(provctx, selection, RSA_FLAG_TYPE_RSASSAPSS, params); } /* * This function is common for all RSA sub-types, to detect possible * misuse, such as PSS parameters being passed when a plain RSA key * is generated. */ static int rsa_gen_set_params(void *genctx, const OSSL_PARAM params[]) { struct rsa_gen_ctx *gctx = genctx; const OSSL_PARAM *p; if (params == NULL) return 1; if ((p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_RSA_BITS)) != NULL) { if (!OSSL_PARAM_get_size_t(p, &gctx->nbits)) return 0; if (gctx->nbits < RSA_MIN_MODULUS_BITS) { ERR_raise(ERR_LIB_PROV, PROV_R_KEY_SIZE_TOO_SMALL); return 0; } } if ((p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_RSA_PRIMES)) != NULL && !OSSL_PARAM_get_size_t(p, &gctx->primes)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_RSA_E)) != NULL && !OSSL_PARAM_get_BN(p, &gctx->pub_exp)) return 0; /* Only attempt to get PSS parameters when generating an RSA-PSS key */ if (gctx->rsa_type == RSA_FLAG_TYPE_RSASSAPSS && !pss_params_fromdata(&gctx->pss_params, &gctx->pss_defaults_set, params, gctx->rsa_type, gctx->libctx)) return 0; #if defined(FIPS_MODULE) && !defined(OPENSSL_NO_ACVP_TESTS) /* Any ACVP test related parameters are copied into a params[] */ if (!ossl_rsa_acvp_test_gen_params_new(&gctx->acvp_test_params, params)) return 0; #endif return 1; } #define rsa_gen_basic \ OSSL_PARAM_size_t(OSSL_PKEY_PARAM_RSA_BITS, NULL), \ OSSL_PARAM_size_t(OSSL_PKEY_PARAM_RSA_PRIMES, NULL), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_E, NULL, 0) /* * The following must be kept in sync with ossl_rsa_pss_params_30_fromdata() * in crypto/rsa/rsa_backend.c */ #define rsa_gen_pss \ OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_RSA_DIGEST, NULL, 0), \ OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_RSA_DIGEST_PROPS, NULL, 0), \ OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_RSA_MASKGENFUNC, NULL, 0), \ OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_RSA_MGF1_DIGEST, NULL, 0), \ OSSL_PARAM_int(OSSL_PKEY_PARAM_RSA_PSS_SALTLEN, NULL) static const OSSL_PARAM *rsa_gen_settable_params(ossl_unused void *genctx, ossl_unused void *provctx) { static OSSL_PARAM settable[] = { rsa_gen_basic, OSSL_PARAM_END }; return settable; } static const OSSL_PARAM *rsapss_gen_settable_params(ossl_unused void *genctx, ossl_unused void *provctx) { static OSSL_PARAM settable[] = { rsa_gen_basic, rsa_gen_pss, OSSL_PARAM_END }; return settable; } static void *rsa_gen(void *genctx, OSSL_CALLBACK *osslcb, void *cbarg) { struct rsa_gen_ctx *gctx = genctx; RSA *rsa = NULL, *rsa_tmp = NULL; BN_GENCB *gencb = NULL; if (!ossl_prov_is_running() || gctx == NULL) return NULL; switch (gctx->rsa_type) { case RSA_FLAG_TYPE_RSA: /* For plain RSA keys, PSS parameters must not be set */ if (!ossl_rsa_pss_params_30_is_unrestricted(&gctx->pss_params)) goto err; break; case RSA_FLAG_TYPE_RSASSAPSS: /* * For plain RSA-PSS keys, PSS parameters may be set but don't have * to, so not check. */ break; default: /* Unsupported RSA key sub-type... */ return NULL; } if ((rsa_tmp = ossl_rsa_new_with_ctx(gctx->libctx)) == NULL) return NULL; gctx->cb = osslcb; gctx->cbarg = cbarg; gencb = BN_GENCB_new(); if (gencb != NULL) BN_GENCB_set(gencb, rsa_gencb, genctx); #if defined(FIPS_MODULE) && !defined(OPENSSL_NO_ACVP_TESTS) if (gctx->acvp_test_params != NULL) { if (!ossl_rsa_acvp_test_set_params(rsa_tmp, gctx->acvp_test_params)) goto err; } #endif if (!RSA_generate_multi_prime_key(rsa_tmp, (int)gctx->nbits, (int)gctx->primes, gctx->pub_exp, gencb)) goto err; if (!ossl_rsa_pss_params_30_copy(ossl_rsa_get0_pss_params_30(rsa_tmp), &gctx->pss_params)) goto err; RSA_clear_flags(rsa_tmp, RSA_FLAG_TYPE_MASK); RSA_set_flags(rsa_tmp, gctx->rsa_type); rsa = rsa_tmp; rsa_tmp = NULL; err: BN_GENCB_free(gencb); RSA_free(rsa_tmp); return rsa; } static void rsa_gen_cleanup(void *genctx) { struct rsa_gen_ctx *gctx = genctx; if (gctx == NULL) return; #if defined(FIPS_MODULE) && !defined(OPENSSL_NO_ACVP_TESTS) ossl_rsa_acvp_test_gen_params_free(gctx->acvp_test_params); gctx->acvp_test_params = NULL; #endif BN_clear_free(gctx->pub_exp); OPENSSL_free(gctx); } static void *common_load(const void *reference, size_t reference_sz, int expected_rsa_type) { RSA *rsa = NULL; if (ossl_prov_is_running() && reference_sz == sizeof(rsa)) { /* The contents of the reference is the address to our object */ rsa = *(RSA **)reference; if (RSA_test_flags(rsa, RSA_FLAG_TYPE_MASK) != expected_rsa_type) return NULL; /* We grabbed, so we detach it */ *(RSA **)reference = NULL; return rsa; } return NULL; } static void *rsa_load(const void *reference, size_t reference_sz) { return common_load(reference, reference_sz, RSA_FLAG_TYPE_RSA); } static void *rsapss_load(const void *reference, size_t reference_sz) { return common_load(reference, reference_sz, RSA_FLAG_TYPE_RSASSAPSS); } static void *rsa_dup(const void *keydata_from, int selection) { if (ossl_prov_is_running() /* do not allow creating empty keys by duplication */ && (selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) return ossl_rsa_dup(keydata_from, selection); return NULL; } /* For any RSA key, we use the "RSA" algorithms regardless of sub-type. */ static const char *rsa_query_operation_name(int operation_id) { return "RSA"; } const OSSL_DISPATCH ossl_rsa_keymgmt_functions[] = { { OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))rsa_newdata }, { OSSL_FUNC_KEYMGMT_GEN_INIT, (void (*)(void))rsa_gen_init }, { OSSL_FUNC_KEYMGMT_GEN_SET_PARAMS, (void (*)(void))rsa_gen_set_params }, { OSSL_FUNC_KEYMGMT_GEN_SETTABLE_PARAMS, (void (*)(void))rsa_gen_settable_params }, { OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))rsa_gen }, { OSSL_FUNC_KEYMGMT_GEN_CLEANUP, (void (*)(void))rsa_gen_cleanup }, { OSSL_FUNC_KEYMGMT_LOAD, (void (*)(void))rsa_load }, { OSSL_FUNC_KEYMGMT_FREE, (void (*)(void))rsa_freedata }, { OSSL_FUNC_KEYMGMT_GET_PARAMS, (void (*) (void))rsa_get_params }, { OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS, (void (*) (void))rsa_gettable_params }, { OSSL_FUNC_KEYMGMT_HAS, (void (*)(void))rsa_has }, { OSSL_FUNC_KEYMGMT_MATCH, (void (*)(void))rsa_match }, { OSSL_FUNC_KEYMGMT_VALIDATE, (void (*)(void))rsa_validate }, { OSSL_FUNC_KEYMGMT_IMPORT, (void (*)(void))rsa_import }, { OSSL_FUNC_KEYMGMT_IMPORT_TYPES, (void (*)(void))rsa_import_types }, { OSSL_FUNC_KEYMGMT_EXPORT, (void (*)(void))rsa_export }, { OSSL_FUNC_KEYMGMT_EXPORT_TYPES, (void (*)(void))rsa_export_types }, { OSSL_FUNC_KEYMGMT_DUP, (void (*)(void))rsa_dup }, OSSL_DISPATCH_END }; const OSSL_DISPATCH ossl_rsapss_keymgmt_functions[] = { { OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))rsapss_newdata }, { OSSL_FUNC_KEYMGMT_GEN_INIT, (void (*)(void))rsapss_gen_init }, { OSSL_FUNC_KEYMGMT_GEN_SET_PARAMS, (void (*)(void))rsa_gen_set_params }, { OSSL_FUNC_KEYMGMT_GEN_SETTABLE_PARAMS, (void (*)(void))rsapss_gen_settable_params }, { OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))rsa_gen }, { OSSL_FUNC_KEYMGMT_GEN_CLEANUP, (void (*)(void))rsa_gen_cleanup }, { OSSL_FUNC_KEYMGMT_LOAD, (void (*)(void))rsapss_load }, { OSSL_FUNC_KEYMGMT_FREE, (void (*)(void))rsa_freedata }, { OSSL_FUNC_KEYMGMT_GET_PARAMS, (void (*) (void))rsa_get_params }, { OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS, (void (*) (void))rsa_gettable_params }, { OSSL_FUNC_KEYMGMT_HAS, (void (*)(void))rsa_has }, { OSSL_FUNC_KEYMGMT_MATCH, (void (*)(void))rsa_match }, { OSSL_FUNC_KEYMGMT_VALIDATE, (void (*)(void))rsa_validate }, { OSSL_FUNC_KEYMGMT_IMPORT, (void (*)(void))rsa_import }, { OSSL_FUNC_KEYMGMT_IMPORT_TYPES, (void (*)(void))rsa_import_types }, { OSSL_FUNC_KEYMGMT_EXPORT, (void (*)(void))rsa_export }, { OSSL_FUNC_KEYMGMT_EXPORT_TYPES, (void (*)(void))rsa_export_types }, { OSSL_FUNC_KEYMGMT_QUERY_OPERATION_NAME, (void (*)(void))rsa_query_operation_name }, { OSSL_FUNC_KEYMGMT_DUP, (void (*)(void))rsa_dup }, OSSL_DISPATCH_END };
./openssl/providers/implementations/keymgmt/kdf_legacy_kmgmt.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * This implemments a dummy key manager for legacy KDFs that still support the * old way of performing a KDF via EVP_PKEY_derive(). New KDFs should not be * implemented this way. In reality there is no key data for such KDFs, so this * key manager does very little. */ #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/err.h> #include "prov/implementations.h" #include "prov/providercommon.h" #include "prov/provider_ctx.h" #include "prov/kdfexchange.h" static OSSL_FUNC_keymgmt_new_fn kdf_newdata; static OSSL_FUNC_keymgmt_free_fn kdf_freedata; static OSSL_FUNC_keymgmt_has_fn kdf_has; KDF_DATA *ossl_kdf_data_new(void *provctx) { KDF_DATA *kdfdata; if (!ossl_prov_is_running()) return NULL; kdfdata = OPENSSL_zalloc(sizeof(*kdfdata)); if (kdfdata == NULL) return NULL; if (!CRYPTO_NEW_REF(&kdfdata->refcnt, 1)) { OPENSSL_free(kdfdata); return NULL; } kdfdata->libctx = PROV_LIBCTX_OF(provctx); return kdfdata; } void ossl_kdf_data_free(KDF_DATA *kdfdata) { int ref = 0; if (kdfdata == NULL) return; CRYPTO_DOWN_REF(&kdfdata->refcnt, &ref); if (ref > 0) return; CRYPTO_FREE_REF(&kdfdata->refcnt); OPENSSL_free(kdfdata); } int ossl_kdf_data_up_ref(KDF_DATA *kdfdata) { int ref = 0; /* This is effectively doing a new operation on the KDF_DATA and should be * adequately guarded again modules' error states. However, both current * calls here are guarded properly in exchange/kdf_exch.c. Thus, it * could be removed here. The concern is that something in the future * might call this function without adequate guards. It's a cheap call, * it seems best to leave it even though it is currently redundant. */ if (!ossl_prov_is_running()) return 0; CRYPTO_UP_REF(&kdfdata->refcnt, &ref); return 1; } static void *kdf_newdata(void *provctx) { return ossl_kdf_data_new(provctx); } static void kdf_freedata(void *kdfdata) { ossl_kdf_data_free(kdfdata); } static int kdf_has(const void *keydata, int selection) { return 1; /* nothing is missing */ } const OSSL_DISPATCH ossl_kdf_keymgmt_functions[] = { { OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))kdf_newdata }, { OSSL_FUNC_KEYMGMT_FREE, (void (*)(void))kdf_freedata }, { OSSL_FUNC_KEYMGMT_HAS, (void (*)(void))kdf_has }, OSSL_DISPATCH_END };
./openssl/providers/implementations/keymgmt/dh_kmgmt.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * DH low level APIs are deprecated for public use, but still ok for * internal use. */ #include "internal/deprecated.h" #include "internal/common.h" #include <string.h> /* strcmp */ #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/bn.h> #include <openssl/err.h> #include "prov/implementations.h" #include "prov/providercommon.h" #include "prov/provider_ctx.h" #include "crypto/dh.h" #include "internal/sizes.h" static OSSL_FUNC_keymgmt_new_fn dh_newdata; static OSSL_FUNC_keymgmt_free_fn dh_freedata; static OSSL_FUNC_keymgmt_gen_init_fn dh_gen_init; static OSSL_FUNC_keymgmt_gen_init_fn dhx_gen_init; static OSSL_FUNC_keymgmt_gen_set_template_fn dh_gen_set_template; static OSSL_FUNC_keymgmt_gen_set_params_fn dh_gen_set_params; static OSSL_FUNC_keymgmt_gen_settable_params_fn dh_gen_settable_params; static OSSL_FUNC_keymgmt_gen_fn dh_gen; static OSSL_FUNC_keymgmt_gen_cleanup_fn dh_gen_cleanup; static OSSL_FUNC_keymgmt_load_fn dh_load; static OSSL_FUNC_keymgmt_get_params_fn dh_get_params; static OSSL_FUNC_keymgmt_gettable_params_fn dh_gettable_params; static OSSL_FUNC_keymgmt_set_params_fn dh_set_params; static OSSL_FUNC_keymgmt_settable_params_fn dh_settable_params; static OSSL_FUNC_keymgmt_has_fn dh_has; static OSSL_FUNC_keymgmt_match_fn dh_match; static OSSL_FUNC_keymgmt_validate_fn dh_validate; static OSSL_FUNC_keymgmt_import_fn dh_import; static OSSL_FUNC_keymgmt_import_types_fn dh_import_types; static OSSL_FUNC_keymgmt_export_fn dh_export; static OSSL_FUNC_keymgmt_export_types_fn dh_export_types; static OSSL_FUNC_keymgmt_dup_fn dh_dup; #define DH_POSSIBLE_SELECTIONS \ (OSSL_KEYMGMT_SELECT_KEYPAIR | OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) struct dh_gen_ctx { OSSL_LIB_CTX *libctx; FFC_PARAMS *ffc_params; int selection; /* All these parameters are used for parameter generation only */ /* If there is a group name then the remaining parameters are not needed */ int group_nid; size_t pbits; size_t qbits; unsigned char *seed; /* optional FIPS186-4 param for testing */ size_t seedlen; int gindex; /* optional FIPS186-4 generator index (ignored if -1) */ int gen_type; /* see dhtype2id */ int generator; /* Used by DH_PARAMGEN_TYPE_GENERATOR in non fips mode only */ int pcounter; int hindex; int priv_len; char *mdname; char *mdprops; OSSL_CALLBACK *cb; void *cbarg; int dh_type; }; static int dh_gen_type_name2id_w_default(const char *name, int type) { if (strcmp(name, "default") == 0) { #ifdef FIPS_MODULE if (type == DH_FLAG_TYPE_DHX) return DH_PARAMGEN_TYPE_FIPS_186_4; return DH_PARAMGEN_TYPE_GROUP; #else if (type == DH_FLAG_TYPE_DHX) return DH_PARAMGEN_TYPE_FIPS_186_2; return DH_PARAMGEN_TYPE_GENERATOR; #endif } return ossl_dh_gen_type_name2id(name, type); } static void *dh_newdata(void *provctx) { DH *dh = NULL; if (ossl_prov_is_running()) { dh = ossl_dh_new_ex(PROV_LIBCTX_OF(provctx)); if (dh != NULL) { DH_clear_flags(dh, DH_FLAG_TYPE_MASK); DH_set_flags(dh, DH_FLAG_TYPE_DH); } } return dh; } static void *dhx_newdata(void *provctx) { DH *dh = NULL; dh = ossl_dh_new_ex(PROV_LIBCTX_OF(provctx)); if (dh != NULL) { DH_clear_flags(dh, DH_FLAG_TYPE_MASK); DH_set_flags(dh, DH_FLAG_TYPE_DHX); } return dh; } static void dh_freedata(void *keydata) { DH_free(keydata); } static int dh_has(const void *keydata, int selection) { const DH *dh = keydata; int ok = 1; if (!ossl_prov_is_running() || dh == NULL) return 0; if ((selection & DH_POSSIBLE_SELECTIONS) == 0) return 1; /* the selection is not missing */ if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) ok = ok && (DH_get0_pub_key(dh) != NULL); if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) ok = ok && (DH_get0_priv_key(dh) != NULL); if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) ok = ok && (DH_get0_p(dh) != NULL && DH_get0_g(dh) != NULL); return ok; } static int dh_match(const void *keydata1, const void *keydata2, int selection) { const DH *dh1 = keydata1; const DH *dh2 = keydata2; int ok = 1; if (!ossl_prov_is_running()) return 0; if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { int key_checked = 0; if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { const BIGNUM *pa = DH_get0_pub_key(dh1); const BIGNUM *pb = DH_get0_pub_key(dh2); if (pa != NULL && pb != NULL) { ok = ok && BN_cmp(pa, pb) == 0; key_checked = 1; } } if (!key_checked && (selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { const BIGNUM *pa = DH_get0_priv_key(dh1); const BIGNUM *pb = DH_get0_priv_key(dh2); if (pa != NULL && pb != NULL) { ok = ok && BN_cmp(pa, pb) == 0; key_checked = 1; } } ok = ok && key_checked; } if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) { FFC_PARAMS *dhparams1 = ossl_dh_get0_params((DH *)dh1); FFC_PARAMS *dhparams2 = ossl_dh_get0_params((DH *)dh2); ok = ok && ossl_ffc_params_cmp(dhparams1, dhparams2, 1); } return ok; } static int dh_import(void *keydata, int selection, const OSSL_PARAM params[]) { DH *dh = keydata; int ok = 1; if (!ossl_prov_is_running() || dh == NULL) return 0; if ((selection & DH_POSSIBLE_SELECTIONS) == 0) return 0; /* a key without parameters is meaningless */ ok = ok && ossl_dh_params_fromdata(dh, params); if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { int include_private = selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY ? 1 : 0; ok = ok && ossl_dh_key_fromdata(dh, params, include_private); } return ok; } static int dh_export(void *keydata, int selection, OSSL_CALLBACK *param_cb, void *cbarg) { DH *dh = keydata; OSSL_PARAM_BLD *tmpl = NULL; OSSL_PARAM *params = NULL; int ok = 1; if (!ossl_prov_is_running() || dh == NULL) return 0; if ((selection & DH_POSSIBLE_SELECTIONS) == 0) return 0; tmpl = OSSL_PARAM_BLD_new(); if (tmpl == NULL) return 0; if ((selection & OSSL_KEYMGMT_SELECT_ALL_PARAMETERS) != 0) ok = ok && ossl_dh_params_todata(dh, tmpl, NULL); if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { int include_private = selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY ? 1 : 0; ok = ok && ossl_dh_key_todata(dh, tmpl, NULL, include_private); } if (!ok || (params = OSSL_PARAM_BLD_to_param(tmpl)) == NULL) { ok = 0; goto err; } ok = param_cb(params, cbarg); OSSL_PARAM_free(params); err: OSSL_PARAM_BLD_free(tmpl); return ok; } /* IMEXPORT = IMPORT + EXPORT */ # define DH_IMEXPORTABLE_PARAMETERS \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_FFC_P, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_FFC_Q, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_FFC_G, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_FFC_COFACTOR, NULL, 0), \ OSSL_PARAM_int(OSSL_PKEY_PARAM_FFC_GINDEX, NULL), \ OSSL_PARAM_int(OSSL_PKEY_PARAM_FFC_PCOUNTER, NULL), \ OSSL_PARAM_int(OSSL_PKEY_PARAM_FFC_H, NULL), \ OSSL_PARAM_int(OSSL_PKEY_PARAM_DH_PRIV_LEN, NULL), \ OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_FFC_SEED, NULL, 0), \ OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_GROUP_NAME, NULL, 0) # define DH_IMEXPORTABLE_PUBLIC_KEY \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_PUB_KEY, NULL, 0) # define DH_IMEXPORTABLE_PRIVATE_KEY \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_PRIV_KEY, NULL, 0) static const OSSL_PARAM dh_all_types[] = { DH_IMEXPORTABLE_PARAMETERS, DH_IMEXPORTABLE_PUBLIC_KEY, DH_IMEXPORTABLE_PRIVATE_KEY, OSSL_PARAM_END }; static const OSSL_PARAM dh_parameter_types[] = { DH_IMEXPORTABLE_PARAMETERS, OSSL_PARAM_END }; static const OSSL_PARAM dh_key_types[] = { DH_IMEXPORTABLE_PUBLIC_KEY, DH_IMEXPORTABLE_PRIVATE_KEY, OSSL_PARAM_END }; static const OSSL_PARAM *dh_types[] = { NULL, /* Index 0 = none of them */ dh_parameter_types, /* Index 1 = parameter types */ dh_key_types, /* Index 2 = key types */ dh_all_types /* Index 3 = 1 + 2 */ }; static const OSSL_PARAM *dh_imexport_types(int selection) { int type_select = 0; if ((selection & OSSL_KEYMGMT_SELECT_ALL_PARAMETERS) != 0) type_select += 1; if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) type_select += 2; return dh_types[type_select]; } static const OSSL_PARAM *dh_import_types(int selection) { return dh_imexport_types(selection); } static const OSSL_PARAM *dh_export_types(int selection) { return dh_imexport_types(selection); } static ossl_inline int dh_get_params(void *key, OSSL_PARAM params[]) { DH *dh = key; OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_BITS)) != NULL && !OSSL_PARAM_set_int(p, DH_bits(dh))) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_SECURITY_BITS)) != NULL && !OSSL_PARAM_set_int(p, DH_security_bits(dh))) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_MAX_SIZE)) != NULL && !OSSL_PARAM_set_int(p, DH_size(dh))) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY)) != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) return 0; p->return_size = ossl_dh_key2buf(dh, (unsigned char **)&p->data, p->data_size, 0); if (p->return_size == 0) return 0; } return ossl_dh_params_todata(dh, NULL, params) && ossl_dh_key_todata(dh, NULL, params, 1); } static const OSSL_PARAM dh_params[] = { OSSL_PARAM_int(OSSL_PKEY_PARAM_BITS, NULL), OSSL_PARAM_int(OSSL_PKEY_PARAM_SECURITY_BITS, NULL), OSSL_PARAM_int(OSSL_PKEY_PARAM_MAX_SIZE, NULL), OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY, NULL, 0), DH_IMEXPORTABLE_PARAMETERS, DH_IMEXPORTABLE_PUBLIC_KEY, DH_IMEXPORTABLE_PRIVATE_KEY, OSSL_PARAM_END }; static const OSSL_PARAM *dh_gettable_params(void *provctx) { return dh_params; } static const OSSL_PARAM dh_known_settable_params[] = { OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *dh_settable_params(void *provctx) { return dh_known_settable_params; } static int dh_set_params(void *key, const OSSL_PARAM params[]) { DH *dh = key; const OSSL_PARAM *p; p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY); if (p != NULL && (p->data_type != OSSL_PARAM_OCTET_STRING || !ossl_dh_buf2key(dh, p->data, p->data_size))) return 0; return 1; } static int dh_validate_public(const DH *dh, int checktype) { const BIGNUM *pub_key = NULL; int res = 0; DH_get0_key(dh, &pub_key, NULL); if (pub_key == NULL) return 0; /* The partial test is only valid for named group's with q = (p - 1) / 2 */ if (checktype == OSSL_KEYMGMT_VALIDATE_QUICK_CHECK && ossl_dh_is_named_safe_prime_group(dh)) return ossl_dh_check_pub_key_partial(dh, pub_key, &res); return DH_check_pub_key_ex(dh, pub_key); } static int dh_validate_private(const DH *dh) { int status = 0; const BIGNUM *priv_key = NULL; DH_get0_key(dh, NULL, &priv_key); if (priv_key == NULL) return 0; return ossl_dh_check_priv_key(dh, priv_key, &status); } static int dh_validate(const void *keydata, int selection, int checktype) { const DH *dh = keydata; int ok = 1; if (!ossl_prov_is_running()) return 0; if ((selection & DH_POSSIBLE_SELECTIONS) == 0) return 1; /* nothing to validate */ if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) { /* * Both of these functions check parameters. DH_check_params_ex() * performs a lightweight check (e.g. it does not check that p is a * safe prime) */ if (checktype == OSSL_KEYMGMT_VALIDATE_QUICK_CHECK) ok = ok && DH_check_params_ex(dh); else ok = ok && DH_check_ex(dh); } if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) ok = ok && dh_validate_public(dh, checktype); if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) ok = ok && dh_validate_private(dh); if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) == OSSL_KEYMGMT_SELECT_KEYPAIR) ok = ok && ossl_dh_check_pairwise(dh); return ok; } static void *dh_gen_init_base(void *provctx, int selection, const OSSL_PARAM params[], int type) { OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(provctx); struct dh_gen_ctx *gctx = NULL; if (!ossl_prov_is_running()) return NULL; if ((selection & (OSSL_KEYMGMT_SELECT_KEYPAIR | OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS)) == 0) return NULL; if ((gctx = OPENSSL_zalloc(sizeof(*gctx))) != NULL) { gctx->selection = selection; gctx->libctx = libctx; gctx->pbits = 2048; gctx->qbits = 224; gctx->mdname = NULL; #ifdef FIPS_MODULE gctx->gen_type = (type == DH_FLAG_TYPE_DHX) ? DH_PARAMGEN_TYPE_FIPS_186_4 : DH_PARAMGEN_TYPE_GROUP; #else gctx->gen_type = (type == DH_FLAG_TYPE_DHX) ? DH_PARAMGEN_TYPE_FIPS_186_2 : DH_PARAMGEN_TYPE_GENERATOR; #endif gctx->gindex = -1; gctx->hindex = 0; gctx->pcounter = -1; gctx->generator = DH_GENERATOR_2; gctx->dh_type = type; } if (!dh_gen_set_params(gctx, params)) { OPENSSL_free(gctx); gctx = NULL; } return gctx; } static void *dh_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) { return dh_gen_init_base(provctx, selection, params, DH_FLAG_TYPE_DH); } static void *dhx_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) { return dh_gen_init_base(provctx, selection, params, DH_FLAG_TYPE_DHX); } static int dh_gen_set_template(void *genctx, void *templ) { struct dh_gen_ctx *gctx = genctx; DH *dh = templ; if (!ossl_prov_is_running() || gctx == NULL || dh == NULL) return 0; gctx->ffc_params = ossl_dh_get0_params(dh); return 1; } static int dh_set_gen_seed(struct dh_gen_ctx *gctx, unsigned char *seed, size_t seedlen) { OPENSSL_clear_free(gctx->seed, gctx->seedlen); gctx->seed = NULL; gctx->seedlen = 0; if (seed != NULL && seedlen > 0) { gctx->seed = OPENSSL_memdup(seed, seedlen); if (gctx->seed == NULL) return 0; gctx->seedlen = seedlen; } return 1; } static int dh_gen_common_set_params(void *genctx, const OSSL_PARAM params[]) { struct dh_gen_ctx *gctx = genctx; const OSSL_PARAM *p; int gen_type = -1; if (gctx == NULL) return 0; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_TYPE); if (p != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING || ((gen_type = dh_gen_type_name2id_w_default(p->data, gctx->dh_type)) == -1)) { ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); return 0; } if (gen_type != -1) gctx->gen_type = gen_type; } p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_GROUP_NAME); if (p != NULL) { const DH_NAMED_GROUP *group = NULL; if (p->data_type != OSSL_PARAM_UTF8_STRING || p->data == NULL || (group = ossl_ffc_name_to_dh_named_group(p->data)) == NULL || ((gctx->group_nid = ossl_ffc_named_group_get_uid(group)) == NID_undef)) { ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); return 0; } } if ((p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_PBITS)) != NULL && !OSSL_PARAM_get_size_t(p, &gctx->pbits)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_DH_PRIV_LEN); if (p != NULL && !OSSL_PARAM_get_int(p, &gctx->priv_len)) return 0; return 1; } static const OSSL_PARAM *dh_gen_settable_params(ossl_unused void *genctx, ossl_unused void *provctx) { static const OSSL_PARAM dh_gen_settable[] = { OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_FFC_TYPE, NULL, 0), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_GROUP_NAME, NULL, 0), OSSL_PARAM_int(OSSL_PKEY_PARAM_DH_PRIV_LEN, NULL), OSSL_PARAM_size_t(OSSL_PKEY_PARAM_FFC_PBITS, NULL), OSSL_PARAM_int(OSSL_PKEY_PARAM_DH_GENERATOR, NULL), OSSL_PARAM_END }; return dh_gen_settable; } static const OSSL_PARAM *dhx_gen_settable_params(ossl_unused void *genctx, ossl_unused void *provctx) { static const OSSL_PARAM dhx_gen_settable[] = { OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_FFC_TYPE, NULL, 0), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_GROUP_NAME, NULL, 0), OSSL_PARAM_int(OSSL_PKEY_PARAM_DH_PRIV_LEN, NULL), OSSL_PARAM_size_t(OSSL_PKEY_PARAM_FFC_PBITS, NULL), OSSL_PARAM_size_t(OSSL_PKEY_PARAM_FFC_QBITS, NULL), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_FFC_DIGEST, NULL, 0), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_FFC_DIGEST_PROPS, NULL, 0), OSSL_PARAM_int(OSSL_PKEY_PARAM_FFC_GINDEX, NULL), OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_FFC_SEED, NULL, 0), OSSL_PARAM_int(OSSL_PKEY_PARAM_FFC_PCOUNTER, NULL), OSSL_PARAM_int(OSSL_PKEY_PARAM_FFC_H, NULL), OSSL_PARAM_END }; return dhx_gen_settable; } static int dhx_gen_set_params(void *genctx, const OSSL_PARAM params[]) { struct dh_gen_ctx *gctx = genctx; const OSSL_PARAM *p; if (!dh_gen_common_set_params(genctx, params)) return 0; /* Parameters related to fips186-4 and fips186-2 */ p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_GINDEX); if (p != NULL && !OSSL_PARAM_get_int(p, &gctx->gindex)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_PCOUNTER); if (p != NULL && !OSSL_PARAM_get_int(p, &gctx->pcounter)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_H); if (p != NULL && !OSSL_PARAM_get_int(p, &gctx->hindex)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_SEED); if (p != NULL && (p->data_type != OSSL_PARAM_OCTET_STRING || !dh_set_gen_seed(gctx, p->data, p->data_size))) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_QBITS)) != NULL && !OSSL_PARAM_get_size_t(p, &gctx->qbits)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_DIGEST); if (p != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING) return 0; OPENSSL_free(gctx->mdname); gctx->mdname = OPENSSL_strdup(p->data); if (gctx->mdname == NULL) return 0; } p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_DIGEST_PROPS); if (p != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING) return 0; OPENSSL_free(gctx->mdprops); gctx->mdprops = OPENSSL_strdup(p->data); if (gctx->mdprops == NULL) return 0; } /* Parameters that are not allowed for DHX */ p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_DH_GENERATOR); if (p != NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_UNSUPPORTED); return 0; } return 1; } static int dh_gen_set_params(void *genctx, const OSSL_PARAM params[]) { struct dh_gen_ctx *gctx = genctx; const OSSL_PARAM *p; if (!dh_gen_common_set_params(genctx, params)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_DH_GENERATOR); if (p != NULL && !OSSL_PARAM_get_int(p, &gctx->generator)) return 0; /* Parameters that are not allowed for DH */ if (OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_GINDEX) != NULL || OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_PCOUNTER) != NULL || OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_H) != NULL || OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_SEED) != NULL || OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_QBITS) != NULL || OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_DIGEST) != NULL || OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_DIGEST_PROPS) != NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); return 0; } return 1; } static int dh_gencb(int p, int n, BN_GENCB *cb) { struct dh_gen_ctx *gctx = BN_GENCB_get_arg(cb); OSSL_PARAM params[] = { OSSL_PARAM_END, OSSL_PARAM_END, OSSL_PARAM_END }; params[0] = OSSL_PARAM_construct_int(OSSL_GEN_PARAM_POTENTIAL, &p); params[1] = OSSL_PARAM_construct_int(OSSL_GEN_PARAM_ITERATION, &n); return gctx->cb(params, gctx->cbarg); } static void *dh_gen(void *genctx, OSSL_CALLBACK *osslcb, void *cbarg) { int ret = 0; struct dh_gen_ctx *gctx = genctx; DH *dh = NULL; BN_GENCB *gencb = NULL; FFC_PARAMS *ffc; if (!ossl_prov_is_running() || gctx == NULL) return NULL; /* * If a group name is selected then the type is group regardless of what * the user selected. This overrides rather than errors for backwards * compatibility. */ if (gctx->group_nid != NID_undef) gctx->gen_type = DH_PARAMGEN_TYPE_GROUP; /* * Do a bounds check on context gen_type. Must be in range: * DH_PARAMGEN_TYPE_GENERATOR <= gen_type <= DH_PARAMGEN_TYPE_GROUP * Noted here as this needs to be adjusted if a new group type is * added. */ if (!ossl_assert((gctx->gen_type >= DH_PARAMGEN_TYPE_GENERATOR) && (gctx->gen_type <= DH_PARAMGEN_TYPE_GROUP))) { ERR_raise_data(ERR_LIB_PROV, ERR_R_INTERNAL_ERROR, "gen_type set to unsupported value %d", gctx->gen_type); return NULL; } /* For parameter generation - If there is a group name just create it */ if (gctx->gen_type == DH_PARAMGEN_TYPE_GROUP && gctx->ffc_params == NULL) { /* Select a named group if there is not one already */ if (gctx->group_nid == NID_undef) gctx->group_nid = ossl_dh_get_named_group_uid_from_size(gctx->pbits); if (gctx->group_nid == NID_undef) return NULL; dh = ossl_dh_new_by_nid_ex(gctx->libctx, gctx->group_nid); if (dh == NULL) return NULL; ffc = ossl_dh_get0_params(dh); } else { dh = ossl_dh_new_ex(gctx->libctx); if (dh == NULL) return NULL; ffc = ossl_dh_get0_params(dh); /* Copy the template value if one was passed */ if (gctx->ffc_params != NULL && !ossl_ffc_params_copy(ffc, gctx->ffc_params)) goto end; if (!ossl_ffc_params_set_seed(ffc, gctx->seed, gctx->seedlen)) goto end; if (gctx->gindex != -1) { ossl_ffc_params_set_gindex(ffc, gctx->gindex); if (gctx->pcounter != -1) ossl_ffc_params_set_pcounter(ffc, gctx->pcounter); } else if (gctx->hindex != 0) { ossl_ffc_params_set_h(ffc, gctx->hindex); } if (gctx->mdname != NULL) ossl_ffc_set_digest(ffc, gctx->mdname, gctx->mdprops); gctx->cb = osslcb; gctx->cbarg = cbarg; gencb = BN_GENCB_new(); if (gencb != NULL) BN_GENCB_set(gencb, dh_gencb, genctx); if ((gctx->selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) { /* * NOTE: The old safe prime generator code is not used in fips mode, * (i.e internally it ignores the generator and chooses a named * group based on pbits. */ if (gctx->gen_type == DH_PARAMGEN_TYPE_GENERATOR) ret = DH_generate_parameters_ex(dh, gctx->pbits, gctx->generator, gencb); else ret = ossl_dh_generate_ffc_parameters(dh, gctx->gen_type, gctx->pbits, gctx->qbits, gencb); if (ret <= 0) goto end; } } if ((gctx->selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { if (ffc->p == NULL || ffc->g == NULL) goto end; if (gctx->priv_len > 0) DH_set_length(dh, (long)gctx->priv_len); ossl_ffc_params_enable_flags(ffc, FFC_PARAM_FLAG_VALIDATE_LEGACY, gctx->gen_type == DH_PARAMGEN_TYPE_FIPS_186_2); if (DH_generate_key(dh) <= 0) goto end; } DH_clear_flags(dh, DH_FLAG_TYPE_MASK); DH_set_flags(dh, gctx->dh_type); ret = 1; end: if (ret <= 0) { DH_free(dh); dh = NULL; } BN_GENCB_free(gencb); return dh; } static void dh_gen_cleanup(void *genctx) { struct dh_gen_ctx *gctx = genctx; if (gctx == NULL) return; OPENSSL_free(gctx->mdname); OPENSSL_free(gctx->mdprops); OPENSSL_clear_free(gctx->seed, gctx->seedlen); OPENSSL_free(gctx); } static void *dh_load(const void *reference, size_t reference_sz) { DH *dh = NULL; if (ossl_prov_is_running() && reference_sz == sizeof(dh)) { /* The contents of the reference is the address to our object */ dh = *(DH **)reference; /* We grabbed, so we detach it */ *(DH **)reference = NULL; return dh; } return NULL; } static void *dh_dup(const void *keydata_from, int selection) { if (ossl_prov_is_running()) return ossl_dh_dup(keydata_from, selection); return NULL; } const OSSL_DISPATCH ossl_dh_keymgmt_functions[] = { { OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))dh_newdata }, { OSSL_FUNC_KEYMGMT_GEN_INIT, (void (*)(void))dh_gen_init }, { OSSL_FUNC_KEYMGMT_GEN_SET_TEMPLATE, (void (*)(void))dh_gen_set_template }, { OSSL_FUNC_KEYMGMT_GEN_SET_PARAMS, (void (*)(void))dh_gen_set_params }, { OSSL_FUNC_KEYMGMT_GEN_SETTABLE_PARAMS, (void (*)(void))dh_gen_settable_params }, { OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))dh_gen }, { OSSL_FUNC_KEYMGMT_GEN_CLEANUP, (void (*)(void))dh_gen_cleanup }, { OSSL_FUNC_KEYMGMT_LOAD, (void (*)(void))dh_load }, { OSSL_FUNC_KEYMGMT_FREE, (void (*)(void))dh_freedata }, { OSSL_FUNC_KEYMGMT_GET_PARAMS, (void (*) (void))dh_get_params }, { OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS, (void (*) (void))dh_gettable_params }, { OSSL_FUNC_KEYMGMT_SET_PARAMS, (void (*) (void))dh_set_params }, { OSSL_FUNC_KEYMGMT_SETTABLE_PARAMS, (void (*) (void))dh_settable_params }, { OSSL_FUNC_KEYMGMT_HAS, (void (*)(void))dh_has }, { OSSL_FUNC_KEYMGMT_MATCH, (void (*)(void))dh_match }, { OSSL_FUNC_KEYMGMT_VALIDATE, (void (*)(void))dh_validate }, { OSSL_FUNC_KEYMGMT_IMPORT, (void (*)(void))dh_import }, { OSSL_FUNC_KEYMGMT_IMPORT_TYPES, (void (*)(void))dh_import_types }, { OSSL_FUNC_KEYMGMT_EXPORT, (void (*)(void))dh_export }, { OSSL_FUNC_KEYMGMT_EXPORT_TYPES, (void (*)(void))dh_export_types }, { OSSL_FUNC_KEYMGMT_DUP, (void (*)(void))dh_dup }, OSSL_DISPATCH_END }; /* For any DH key, we use the "DH" algorithms regardless of sub-type. */ static const char *dhx_query_operation_name(int operation_id) { return "DH"; } const OSSL_DISPATCH ossl_dhx_keymgmt_functions[] = { { OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))dhx_newdata }, { OSSL_FUNC_KEYMGMT_GEN_INIT, (void (*)(void))dhx_gen_init }, { OSSL_FUNC_KEYMGMT_GEN_SET_TEMPLATE, (void (*)(void))dh_gen_set_template }, { OSSL_FUNC_KEYMGMT_GEN_SET_PARAMS, (void (*)(void))dhx_gen_set_params }, { OSSL_FUNC_KEYMGMT_GEN_SETTABLE_PARAMS, (void (*)(void))dhx_gen_settable_params }, { OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))dh_gen }, { OSSL_FUNC_KEYMGMT_GEN_CLEANUP, (void (*)(void))dh_gen_cleanup }, { OSSL_FUNC_KEYMGMT_LOAD, (void (*)(void))dh_load }, { OSSL_FUNC_KEYMGMT_FREE, (void (*)(void))dh_freedata }, { OSSL_FUNC_KEYMGMT_GET_PARAMS, (void (*) (void))dh_get_params }, { OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS, (void (*) (void))dh_gettable_params }, { OSSL_FUNC_KEYMGMT_SET_PARAMS, (void (*) (void))dh_set_params }, { OSSL_FUNC_KEYMGMT_SETTABLE_PARAMS, (void (*) (void))dh_settable_params }, { OSSL_FUNC_KEYMGMT_HAS, (void (*)(void))dh_has }, { OSSL_FUNC_KEYMGMT_MATCH, (void (*)(void))dh_match }, { OSSL_FUNC_KEYMGMT_VALIDATE, (void (*)(void))dh_validate }, { OSSL_FUNC_KEYMGMT_IMPORT, (void (*)(void))dh_import }, { OSSL_FUNC_KEYMGMT_IMPORT_TYPES, (void (*)(void))dh_import_types }, { OSSL_FUNC_KEYMGMT_EXPORT, (void (*)(void))dh_export }, { OSSL_FUNC_KEYMGMT_EXPORT_TYPES, (void (*)(void))dh_export_types }, { OSSL_FUNC_KEYMGMT_QUERY_OPERATION_NAME, (void (*)(void))dhx_query_operation_name }, { OSSL_FUNC_KEYMGMT_DUP, (void (*)(void))dh_dup }, OSSL_DISPATCH_END };
./openssl/providers/implementations/keymgmt/dsa_kmgmt.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * DSA low level APIs are deprecated for public use, but still ok for * internal use. */ #include "internal/deprecated.h" #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/bn.h> #include <openssl/err.h> #include "prov/providercommon.h" #include "prov/implementations.h" #include "prov/provider_ctx.h" #include "crypto/dsa.h" #include "internal/sizes.h" #include "internal/nelem.h" #include "internal/param_build_set.h" static OSSL_FUNC_keymgmt_new_fn dsa_newdata; static OSSL_FUNC_keymgmt_free_fn dsa_freedata; static OSSL_FUNC_keymgmt_gen_init_fn dsa_gen_init; static OSSL_FUNC_keymgmt_gen_set_template_fn dsa_gen_set_template; static OSSL_FUNC_keymgmt_gen_set_params_fn dsa_gen_set_params; static OSSL_FUNC_keymgmt_gen_settable_params_fn dsa_gen_settable_params; static OSSL_FUNC_keymgmt_gen_fn dsa_gen; static OSSL_FUNC_keymgmt_gen_cleanup_fn dsa_gen_cleanup; static OSSL_FUNC_keymgmt_load_fn dsa_load; static OSSL_FUNC_keymgmt_get_params_fn dsa_get_params; static OSSL_FUNC_keymgmt_gettable_params_fn dsa_gettable_params; static OSSL_FUNC_keymgmt_has_fn dsa_has; static OSSL_FUNC_keymgmt_match_fn dsa_match; static OSSL_FUNC_keymgmt_validate_fn dsa_validate; static OSSL_FUNC_keymgmt_import_fn dsa_import; static OSSL_FUNC_keymgmt_import_types_fn dsa_import_types; static OSSL_FUNC_keymgmt_export_fn dsa_export; static OSSL_FUNC_keymgmt_export_types_fn dsa_export_types; static OSSL_FUNC_keymgmt_dup_fn dsa_dup; #define DSA_DEFAULT_MD "SHA256" #define DSA_POSSIBLE_SELECTIONS \ (OSSL_KEYMGMT_SELECT_KEYPAIR | OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) struct dsa_gen_ctx { OSSL_LIB_CTX *libctx; FFC_PARAMS *ffc_params; int selection; /* All these parameters are used for parameter generation only */ size_t pbits; size_t qbits; unsigned char *seed; /* optional FIPS186-4 param for testing */ size_t seedlen; int gindex; /* optional FIPS186-4 generator index (ignored if -1) */ int gen_type; /* DSA_PARAMGEN_TYPE_FIPS_186_2 or DSA_PARAMGEN_TYPE_FIPS_186_4 */ int pcounter; int hindex; char *mdname; char *mdprops; OSSL_CALLBACK *cb; void *cbarg; }; typedef struct dh_name2id_st{ const char *name; int id; } DSA_GENTYPE_NAME2ID; static const DSA_GENTYPE_NAME2ID dsatype2id[]= { #ifdef FIPS_MODULE { "default", DSA_PARAMGEN_TYPE_FIPS_186_4 }, #else { "default", DSA_PARAMGEN_TYPE_FIPS_DEFAULT }, #endif { "fips186_4", DSA_PARAMGEN_TYPE_FIPS_186_4 }, { "fips186_2", DSA_PARAMGEN_TYPE_FIPS_186_2 }, }; static int dsa_gen_type_name2id(const char *name) { size_t i; for (i = 0; i < OSSL_NELEM(dsatype2id); ++i) { if (OPENSSL_strcasecmp(dsatype2id[i].name, name) == 0) return dsatype2id[i].id; } return -1; } static int dsa_key_todata(DSA *dsa, OSSL_PARAM_BLD *bld, OSSL_PARAM params[], int include_private) { const BIGNUM *priv = NULL, *pub = NULL; if (dsa == NULL) return 0; DSA_get0_key(dsa, &pub, &priv); if (include_private && priv != NULL && !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_PRIV_KEY, priv)) return 0; if (pub != NULL && !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_PUB_KEY, pub)) return 0; return 1; } static void *dsa_newdata(void *provctx) { if (!ossl_prov_is_running()) return NULL; return ossl_dsa_new(PROV_LIBCTX_OF(provctx)); } static void dsa_freedata(void *keydata) { DSA_free(keydata); } static int dsa_has(const void *keydata, int selection) { const DSA *dsa = keydata; int ok = 1; if (!ossl_prov_is_running() || dsa == NULL) return 0; if ((selection & DSA_POSSIBLE_SELECTIONS) == 0) return 1; /* the selection is not missing */ if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) ok = ok && (DSA_get0_pub_key(dsa) != NULL); if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) ok = ok && (DSA_get0_priv_key(dsa) != NULL); if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) ok = ok && (DSA_get0_p(dsa) != NULL && DSA_get0_g(dsa) != NULL); return ok; } static int dsa_match(const void *keydata1, const void *keydata2, int selection) { const DSA *dsa1 = keydata1; const DSA *dsa2 = keydata2; int ok = 1; if (!ossl_prov_is_running()) return 0; if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { int key_checked = 0; if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { const BIGNUM *pa = DSA_get0_pub_key(dsa1); const BIGNUM *pb = DSA_get0_pub_key(dsa2); if (pa != NULL && pb != NULL) { ok = ok && BN_cmp(pa, pb) == 0; key_checked = 1; } } if (!key_checked && (selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { const BIGNUM *pa = DSA_get0_priv_key(dsa1); const BIGNUM *pb = DSA_get0_priv_key(dsa2); if (pa != NULL && pb != NULL) { ok = ok && BN_cmp(pa, pb) == 0; key_checked = 1; } } ok = ok && key_checked; } if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) { FFC_PARAMS *dsaparams1 = ossl_dsa_get0_params((DSA *)dsa1); FFC_PARAMS *dsaparams2 = ossl_dsa_get0_params((DSA *)dsa2); ok = ok && ossl_ffc_params_cmp(dsaparams1, dsaparams2, 1); } return ok; } static int dsa_import(void *keydata, int selection, const OSSL_PARAM params[]) { DSA *dsa = keydata; int ok = 1; if (!ossl_prov_is_running() || dsa == NULL) return 0; if ((selection & DSA_POSSIBLE_SELECTIONS) == 0) return 0; /* a key without parameters is meaningless */ ok = ok && ossl_dsa_ffc_params_fromdata(dsa, params); if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { int include_private = selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY ? 1 : 0; ok = ok && ossl_dsa_key_fromdata(dsa, params, include_private); } return ok; } static int dsa_export(void *keydata, int selection, OSSL_CALLBACK *param_cb, void *cbarg) { DSA *dsa = keydata; OSSL_PARAM_BLD *tmpl; OSSL_PARAM *params = NULL; int ok = 1; if (!ossl_prov_is_running() || dsa == NULL) return 0; if ((selection & DSA_POSSIBLE_SELECTIONS) == 0) return 0; tmpl = OSSL_PARAM_BLD_new(); if (tmpl == NULL) return 0; if ((selection & OSSL_KEYMGMT_SELECT_ALL_PARAMETERS) != 0) ok = ok && ossl_ffc_params_todata(ossl_dsa_get0_params(dsa), tmpl, NULL); if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { int include_private = selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY ? 1 : 0; ok = ok && dsa_key_todata(dsa, tmpl, NULL, include_private); } if (!ok || (params = OSSL_PARAM_BLD_to_param(tmpl)) == NULL) { ok = 0; goto err; } ok = param_cb(params, cbarg); OSSL_PARAM_free(params); err: OSSL_PARAM_BLD_free(tmpl); return ok; } /* IMEXPORT = IMPORT + EXPORT */ # define DSA_IMEXPORTABLE_PARAMETERS \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_FFC_P, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_FFC_Q, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_FFC_G, NULL, 0), \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_FFC_COFACTOR, NULL, 0), \ OSSL_PARAM_int(OSSL_PKEY_PARAM_FFC_GINDEX, NULL), \ OSSL_PARAM_int(OSSL_PKEY_PARAM_FFC_PCOUNTER, NULL), \ OSSL_PARAM_int(OSSL_PKEY_PARAM_FFC_H, NULL), \ OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_FFC_SEED, NULL, 0) # define DSA_IMEXPORTABLE_PUBLIC_KEY \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_PUB_KEY, NULL, 0) # define DSA_IMEXPORTABLE_PRIVATE_KEY \ OSSL_PARAM_BN(OSSL_PKEY_PARAM_PRIV_KEY, NULL, 0) static const OSSL_PARAM dsa_all_types[] = { DSA_IMEXPORTABLE_PARAMETERS, DSA_IMEXPORTABLE_PUBLIC_KEY, DSA_IMEXPORTABLE_PRIVATE_KEY, OSSL_PARAM_END }; static const OSSL_PARAM dsa_parameter_types[] = { DSA_IMEXPORTABLE_PARAMETERS, OSSL_PARAM_END }; static const OSSL_PARAM dsa_key_types[] = { DSA_IMEXPORTABLE_PUBLIC_KEY, DSA_IMEXPORTABLE_PRIVATE_KEY, OSSL_PARAM_END }; static const OSSL_PARAM *dsa_types[] = { NULL, /* Index 0 = none of them */ dsa_parameter_types, /* Index 1 = parameter types */ dsa_key_types, /* Index 2 = key types */ dsa_all_types /* Index 3 = 1 + 2 */ }; static const OSSL_PARAM *dsa_imexport_types(int selection) { int type_select = 0; if ((selection & OSSL_KEYMGMT_SELECT_ALL_PARAMETERS) != 0) type_select += 1; if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) type_select += 2; return dsa_types[type_select]; } static const OSSL_PARAM *dsa_import_types(int selection) { return dsa_imexport_types(selection); } static const OSSL_PARAM *dsa_export_types(int selection) { return dsa_imexport_types(selection); } static ossl_inline int dsa_get_params(void *key, OSSL_PARAM params[]) { DSA *dsa = key; OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_BITS)) != NULL && !OSSL_PARAM_set_int(p, DSA_bits(dsa))) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_SECURITY_BITS)) != NULL && !OSSL_PARAM_set_int(p, DSA_security_bits(dsa))) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_MAX_SIZE)) != NULL && !OSSL_PARAM_set_int(p, DSA_size(dsa))) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_DEFAULT_DIGEST)) != NULL && !OSSL_PARAM_set_utf8_string(p, DSA_DEFAULT_MD)) return 0; return ossl_ffc_params_todata(ossl_dsa_get0_params(dsa), NULL, params) && dsa_key_todata(dsa, NULL, params, 1); } static const OSSL_PARAM dsa_params[] = { OSSL_PARAM_int(OSSL_PKEY_PARAM_BITS, NULL), OSSL_PARAM_int(OSSL_PKEY_PARAM_SECURITY_BITS, NULL), OSSL_PARAM_int(OSSL_PKEY_PARAM_MAX_SIZE, NULL), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_DEFAULT_DIGEST, NULL, 0), DSA_IMEXPORTABLE_PARAMETERS, DSA_IMEXPORTABLE_PUBLIC_KEY, DSA_IMEXPORTABLE_PRIVATE_KEY, OSSL_PARAM_END }; static const OSSL_PARAM *dsa_gettable_params(void *provctx) { return dsa_params; } static int dsa_validate_domparams(const DSA *dsa, int checktype) { int status = 0; return ossl_dsa_check_params(dsa, checktype, &status); } static int dsa_validate_public(const DSA *dsa) { int status = 0; const BIGNUM *pub_key = NULL; DSA_get0_key(dsa, &pub_key, NULL); if (pub_key == NULL) return 0; return ossl_dsa_check_pub_key(dsa, pub_key, &status); } static int dsa_validate_private(const DSA *dsa) { int status = 0; const BIGNUM *priv_key = NULL; DSA_get0_key(dsa, NULL, &priv_key); if (priv_key == NULL) return 0; return ossl_dsa_check_priv_key(dsa, priv_key, &status); } static int dsa_validate(const void *keydata, int selection, int checktype) { const DSA *dsa = keydata; int ok = 1; if (!ossl_prov_is_running()) return 0; if ((selection & DSA_POSSIBLE_SELECTIONS) == 0) return 1; /* nothing to validate */ if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) ok = ok && dsa_validate_domparams(dsa, checktype); if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) ok = ok && dsa_validate_public(dsa); if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) ok = ok && dsa_validate_private(dsa); /* If the whole key is selected, we do a pairwise validation */ if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) == OSSL_KEYMGMT_SELECT_KEYPAIR) ok = ok && ossl_dsa_check_pairwise(dsa); return ok; } static void *dsa_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) { OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(provctx); struct dsa_gen_ctx *gctx = NULL; if (!ossl_prov_is_running() || (selection & DSA_POSSIBLE_SELECTIONS) == 0) return NULL; if ((gctx = OPENSSL_zalloc(sizeof(*gctx))) != NULL) { gctx->selection = selection; gctx->libctx = libctx; gctx->pbits = 2048; gctx->qbits = 224; #ifdef FIPS_MODULE gctx->gen_type = DSA_PARAMGEN_TYPE_FIPS_186_4; #else gctx->gen_type = DSA_PARAMGEN_TYPE_FIPS_DEFAULT; #endif gctx->gindex = -1; gctx->pcounter = -1; gctx->hindex = 0; } if (!dsa_gen_set_params(gctx, params)) { OPENSSL_free(gctx); gctx = NULL; } return gctx; } static int dsa_gen_set_template(void *genctx, void *templ) { struct dsa_gen_ctx *gctx = genctx; DSA *dsa = templ; if (!ossl_prov_is_running() || gctx == NULL || dsa == NULL) return 0; gctx->ffc_params = ossl_dsa_get0_params(dsa); return 1; } static int dsa_set_gen_seed(struct dsa_gen_ctx *gctx, unsigned char *seed, size_t seedlen) { OPENSSL_clear_free(gctx->seed, gctx->seedlen); gctx->seed = NULL; gctx->seedlen = 0; if (seed != NULL && seedlen > 0) { gctx->seed = OPENSSL_memdup(seed, seedlen); if (gctx->seed == NULL) return 0; gctx->seedlen = seedlen; } return 1; } static int dsa_gen_set_params(void *genctx, const OSSL_PARAM params[]) { struct dsa_gen_ctx *gctx = genctx; const OSSL_PARAM *p; int gen_type = -1; if (gctx == NULL) return 0; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_TYPE); if (p != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING || ((gen_type = dsa_gen_type_name2id(p->data)) == -1)) { ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); return 0; } /* * Only assign context gen_type if it was set by dsa_gen_type_name2id * must be in range: * DSA_PARAMGEN_TYPE_FIPS_186_4 <= gen_type <= DSA_PARAMGEN_TYPE_FIPS_DEFAULT */ if (gen_type != -1) gctx->gen_type = gen_type; } p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_GINDEX); if (p != NULL && !OSSL_PARAM_get_int(p, &gctx->gindex)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_PCOUNTER); if (p != NULL && !OSSL_PARAM_get_int(p, &gctx->pcounter)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_H); if (p != NULL && !OSSL_PARAM_get_int(p, &gctx->hindex)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_SEED); if (p != NULL && (p->data_type != OSSL_PARAM_OCTET_STRING || !dsa_set_gen_seed(gctx, p->data, p->data_size))) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_PBITS)) != NULL && !OSSL_PARAM_get_size_t(p, &gctx->pbits)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_QBITS)) != NULL && !OSSL_PARAM_get_size_t(p, &gctx->qbits)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_DIGEST); if (p != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING) return 0; OPENSSL_free(gctx->mdname); gctx->mdname = OPENSSL_strdup(p->data); if (gctx->mdname == NULL) return 0; } p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_FFC_DIGEST_PROPS); if (p != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING) return 0; OPENSSL_free(gctx->mdprops); gctx->mdprops = OPENSSL_strdup(p->data); if (gctx->mdprops == NULL) return 0; } return 1; } static const OSSL_PARAM *dsa_gen_settable_params(ossl_unused void *genctx, ossl_unused void *provctx) { static OSSL_PARAM settable[] = { OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_FFC_TYPE, NULL, 0), OSSL_PARAM_size_t(OSSL_PKEY_PARAM_FFC_PBITS, NULL), OSSL_PARAM_size_t(OSSL_PKEY_PARAM_FFC_QBITS, NULL), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_FFC_DIGEST, NULL, 0), OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_FFC_DIGEST_PROPS, NULL, 0), OSSL_PARAM_int(OSSL_PKEY_PARAM_FFC_GINDEX, NULL), OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_FFC_SEED, NULL, 0), OSSL_PARAM_int(OSSL_PKEY_PARAM_FFC_PCOUNTER, NULL), OSSL_PARAM_int(OSSL_PKEY_PARAM_FFC_H, NULL), OSSL_PARAM_END }; return settable; } static int dsa_gencb(int p, int n, BN_GENCB *cb) { struct dsa_gen_ctx *gctx = BN_GENCB_get_arg(cb); OSSL_PARAM params[] = { OSSL_PARAM_END, OSSL_PARAM_END, OSSL_PARAM_END }; params[0] = OSSL_PARAM_construct_int(OSSL_GEN_PARAM_POTENTIAL, &p); params[1] = OSSL_PARAM_construct_int(OSSL_GEN_PARAM_ITERATION, &n); return gctx->cb(params, gctx->cbarg); } static void *dsa_gen(void *genctx, OSSL_CALLBACK *osslcb, void *cbarg) { struct dsa_gen_ctx *gctx = genctx; DSA *dsa = NULL; BN_GENCB *gencb = NULL; int ret = 0; FFC_PARAMS *ffc; if (!ossl_prov_is_running() || gctx == NULL) return NULL; dsa = ossl_dsa_new(gctx->libctx); if (dsa == NULL) return NULL; if (gctx->gen_type == DSA_PARAMGEN_TYPE_FIPS_DEFAULT) gctx->gen_type = (gctx->pbits >= 2048 ? DSA_PARAMGEN_TYPE_FIPS_186_4 : DSA_PARAMGEN_TYPE_FIPS_186_2); /* * Do a bounds check on context gen_type. Must be in range: * DSA_PARAMGEN_TYPE_FIPS_186_4 <= gen_type <= DSA_PARAMGEN_TYPE_FIPS_DEFAULT * Noted here as this needs to be adjusted if a new type is * added. */ if (!ossl_assert((gctx->gen_type >= DSA_PARAMGEN_TYPE_FIPS_186_4) && (gctx->gen_type <= DSA_PARAMGEN_TYPE_FIPS_DEFAULT))) { ERR_raise_data(ERR_LIB_PROV, ERR_R_INTERNAL_ERROR, "gen_type set to unsupported value %d", gctx->gen_type); return NULL; } gctx->cb = osslcb; gctx->cbarg = cbarg; gencb = BN_GENCB_new(); if (gencb != NULL) BN_GENCB_set(gencb, dsa_gencb, genctx); ffc = ossl_dsa_get0_params(dsa); /* Copy the template value if one was passed */ if (gctx->ffc_params != NULL && !ossl_ffc_params_copy(ffc, gctx->ffc_params)) goto end; if (gctx->seed != NULL && !ossl_ffc_params_set_seed(ffc, gctx->seed, gctx->seedlen)) goto end; if (gctx->gindex != -1) { ossl_ffc_params_set_gindex(ffc, gctx->gindex); if (gctx->pcounter != -1) ossl_ffc_params_set_pcounter(ffc, gctx->pcounter); } else if (gctx->hindex != 0) { ossl_ffc_params_set_h(ffc, gctx->hindex); } if (gctx->mdname != NULL) ossl_ffc_set_digest(ffc, gctx->mdname, gctx->mdprops); if ((gctx->selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) { if (ossl_dsa_generate_ffc_parameters(dsa, gctx->gen_type, gctx->pbits, gctx->qbits, gencb) <= 0) goto end; } ossl_ffc_params_enable_flags(ffc, FFC_PARAM_FLAG_VALIDATE_LEGACY, gctx->gen_type == DSA_PARAMGEN_TYPE_FIPS_186_2); if ((gctx->selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { if (ffc->p == NULL || ffc->q == NULL || ffc->g == NULL) goto end; if (DSA_generate_key(dsa) <= 0) goto end; } ret = 1; end: if (ret <= 0) { DSA_free(dsa); dsa = NULL; } BN_GENCB_free(gencb); return dsa; } static void dsa_gen_cleanup(void *genctx) { struct dsa_gen_ctx *gctx = genctx; if (gctx == NULL) return; OPENSSL_free(gctx->mdname); OPENSSL_free(gctx->mdprops); OPENSSL_clear_free(gctx->seed, gctx->seedlen); OPENSSL_free(gctx); } static void *dsa_load(const void *reference, size_t reference_sz) { DSA *dsa = NULL; if (ossl_prov_is_running() && reference_sz == sizeof(dsa)) { /* The contents of the reference is the address to our object */ dsa = *(DSA **)reference; /* We grabbed, so we detach it */ *(DSA **)reference = NULL; return dsa; } return NULL; } static void *dsa_dup(const void *keydata_from, int selection) { if (ossl_prov_is_running()) return ossl_dsa_dup(keydata_from, selection); return NULL; } const OSSL_DISPATCH ossl_dsa_keymgmt_functions[] = { { OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))dsa_newdata }, { OSSL_FUNC_KEYMGMT_GEN_INIT, (void (*)(void))dsa_gen_init }, { OSSL_FUNC_KEYMGMT_GEN_SET_TEMPLATE, (void (*)(void))dsa_gen_set_template }, { OSSL_FUNC_KEYMGMT_GEN_SET_PARAMS, (void (*)(void))dsa_gen_set_params }, { OSSL_FUNC_KEYMGMT_GEN_SETTABLE_PARAMS, (void (*)(void))dsa_gen_settable_params }, { OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))dsa_gen }, { OSSL_FUNC_KEYMGMT_GEN_CLEANUP, (void (*)(void))dsa_gen_cleanup }, { OSSL_FUNC_KEYMGMT_LOAD, (void (*)(void))dsa_load }, { OSSL_FUNC_KEYMGMT_FREE, (void (*)(void))dsa_freedata }, { OSSL_FUNC_KEYMGMT_GET_PARAMS, (void (*) (void))dsa_get_params }, { OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS, (void (*) (void))dsa_gettable_params }, { OSSL_FUNC_KEYMGMT_HAS, (void (*)(void))dsa_has }, { OSSL_FUNC_KEYMGMT_MATCH, (void (*)(void))dsa_match }, { OSSL_FUNC_KEYMGMT_VALIDATE, (void (*)(void))dsa_validate }, { OSSL_FUNC_KEYMGMT_IMPORT, (void (*)(void))dsa_import }, { OSSL_FUNC_KEYMGMT_IMPORT_TYPES, (void (*)(void))dsa_import_types }, { OSSL_FUNC_KEYMGMT_EXPORT, (void (*)(void))dsa_export }, { OSSL_FUNC_KEYMGMT_EXPORT_TYPES, (void (*)(void))dsa_export_types }, { OSSL_FUNC_KEYMGMT_DUP, (void (*)(void))dsa_dup }, OSSL_DISPATCH_END };
./openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.h
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/aes.h> #include "prov/ciphercommon.h" #include "crypto/aes_platform.h" #define BLOCK_SIZE 16 #define NONCE_SIZE 12 #define TAG_SIZE 16 /* AAD manipulation macros */ #define UP16(x) (((x) + 15) & ~0x0F) #define DOWN16(x) ((x) & ~0x0F) #define REMAINDER16(x) ((x) & 0x0F) #define IS16(x) (((x) & 0x0F) == 0) typedef struct prov_cipher_hw_aes_gcm_siv_st { int (*initkey)(void *vctx); int (*cipher)(void *vctx, unsigned char *out, const unsigned char *in, size_t len); int (*dup_ctx)(void *vdst, void *vsrc); void (*clean_ctx)(void *vctx); } PROV_CIPHER_HW_AES_GCM_SIV; /* Arranged for alignment purposes */ typedef struct prov_aes_gcm_siv_ctx_st { EVP_CIPHER_CTX *ecb_ctx; const PROV_CIPHER_HW_AES_GCM_SIV *hw; /* maybe not used, yet? */ uint8_t *aad; /* Allocated, rounded up to 16 bytes, from user */ OSSL_LIB_CTX *libctx; OSSL_PROVIDER *provctx; size_t aad_len; /* actual AAD length */ size_t key_len; uint8_t key_gen_key[32]; /* from user */ uint8_t msg_enc_key[32]; /* depends on key size */ uint8_t msg_auth_key[BLOCK_SIZE]; uint8_t tag[TAG_SIZE]; /* generated tag, given to user or compared to user */ uint8_t user_tag[TAG_SIZE]; /* from user */ uint8_t nonce[NONCE_SIZE]; /* from user */ u128 Htable[16]; /* Polyval calculations via ghash */ unsigned int enc : 1; /* Set to 1 if we are encrypting or 0 otherwise */ unsigned int have_user_tag : 1; unsigned int generated_tag : 1; unsigned int used_enc : 1; unsigned int used_dec : 1; unsigned int speed : 1; } PROV_AES_GCM_SIV_CTX; const PROV_CIPHER_HW_AES_GCM_SIV *ossl_prov_cipher_hw_aes_gcm_siv(size_t keybits); void ossl_polyval_ghash_init(u128 Htable[16], const uint64_t H[2]); void ossl_polyval_ghash_hash(const u128 Htable[16], uint8_t *tag, const uint8_t *inp, size_t len); /* Define GSWAP8/GSWAP4 - used for BOTH little and big endian architectures */ static ossl_inline uint32_t GSWAP4(uint32_t n) { return (((n & 0x000000FF) << 24) | ((n & 0x0000FF00) << 8) | ((n & 0x00FF0000) >> 8) | ((n & 0xFF000000) >> 24)); } static ossl_inline uint64_t GSWAP8(uint64_t n) { uint64_t result; result = GSWAP4(n & 0x0FFFFFFFF); result <<= 32; return result | GSWAP4(n >> 32); }
./openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha1_hw.c
/* * Copyright 2011-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * All low level APIs are deprecated for public use, but still ok for internal * use where we're using them to implement the higher level EVP interface, as is * the case here. */ #include "internal/deprecated.h" #include "cipher_aes_cbc_hmac_sha.h" #if !defined(AES_CBC_HMAC_SHA_CAPABLE) || !defined(AESNI_CAPABLE) int ossl_cipher_capable_aes_cbc_hmac_sha1(void) { return 0; } const PROV_CIPHER_HW_AES_HMAC_SHA *ossl_prov_cipher_hw_aes_cbc_hmac_sha1(void) { return NULL; } #else # include <openssl/rand.h> # include "crypto/evp.h" # include "internal/constant_time.h" void sha1_block_data_order(void *c, const void *p, size_t len); void aesni_cbc_sha1_enc(const void *inp, void *out, size_t blocks, const AES_KEY *key, unsigned char iv[16], SHA_CTX *ctx, const void *in0); int ossl_cipher_capable_aes_cbc_hmac_sha1(void) { return AESNI_CBC_HMAC_SHA_CAPABLE; } static int aesni_cbc_hmac_sha1_init_key(PROV_CIPHER_CTX *vctx, const unsigned char *key, size_t keylen) { int ret; PROV_AES_HMAC_SHA_CTX *ctx = (PROV_AES_HMAC_SHA_CTX *)vctx; PROV_AES_HMAC_SHA1_CTX *sctx = (PROV_AES_HMAC_SHA1_CTX *)vctx; if (ctx->base.enc) ret = aesni_set_encrypt_key(key, keylen * 8, &ctx->ks); else ret = aesni_set_decrypt_key(key, keylen * 8, &ctx->ks); SHA1_Init(&sctx->head); /* handy when benchmarking */ sctx->tail = sctx->head; sctx->md = sctx->head; ctx->payload_length = NO_PAYLOAD_LENGTH; vctx->removetlspad = 1; vctx->removetlsfixed = SHA_DIGEST_LENGTH + AES_BLOCK_SIZE; return ret < 0 ? 0 : 1; } static void sha1_update(SHA_CTX *c, const void *data, size_t len) { const unsigned char *ptr = data; size_t res; if ((res = c->num)) { res = SHA_CBLOCK - res; if (len < res) res = len; SHA1_Update(c, ptr, res); ptr += res; len -= res; } res = len % SHA_CBLOCK; len -= res; if (len) { sha1_block_data_order(c, ptr, len / SHA_CBLOCK); ptr += len; c->Nh += len >> 29; c->Nl += len <<= 3; if (c->Nl < (unsigned int)len) c->Nh++; } if (res) SHA1_Update(c, ptr, res); } # if !defined(OPENSSL_NO_MULTIBLOCK) typedef struct { unsigned int A[8], B[8], C[8], D[8], E[8]; } SHA1_MB_CTX; typedef struct { const unsigned char *ptr; int blocks; } HASH_DESC; typedef struct { const unsigned char *inp; unsigned char *out; int blocks; u64 iv[2]; } CIPH_DESC; void sha1_multi_block(SHA1_MB_CTX *, const HASH_DESC *, int); void aesni_multi_cbc_encrypt(CIPH_DESC *, void *, int); static size_t tls1_multi_block_encrypt(void *vctx, unsigned char *out, const unsigned char *inp, size_t inp_len, int n4x) { /* n4x is 1 or 2 */ PROV_AES_HMAC_SHA_CTX *ctx = (PROV_AES_HMAC_SHA_CTX *)vctx; PROV_AES_HMAC_SHA1_CTX *sctx = (PROV_AES_HMAC_SHA1_CTX *)vctx; HASH_DESC hash_d[8], edges[8]; CIPH_DESC ciph_d[8]; unsigned char storage[sizeof(SHA1_MB_CTX) + 32]; union { u64 q[16]; u32 d[32]; u8 c[128]; } blocks[8]; SHA1_MB_CTX *mctx; unsigned int frag, last, packlen, i; unsigned int x4 = 4 * n4x, minblocks, processed = 0; size_t ret = 0; u8 *IVs; # if defined(BSWAP8) u64 seqnum; # endif /* ask for IVs in bulk */ if (RAND_bytes_ex(ctx->base.libctx, (IVs = blocks[0].c), 16 * x4, 0) <= 0) return 0; mctx = (SHA1_MB_CTX *) (storage + 32 - ((size_t)storage % 32)); /* align */ frag = (unsigned int)inp_len >> (1 + n4x); last = (unsigned int)inp_len + frag - (frag << (1 + n4x)); if (last > frag && ((last + 13 + 9) % 64) < (x4 - 1)) { frag++; last -= x4 - 1; } packlen = 5 + 16 + ((frag + 20 + 16) & -16); /* populate descriptors with pointers and IVs */ hash_d[0].ptr = inp; ciph_d[0].inp = inp; /* 5+16 is place for header and explicit IV */ ciph_d[0].out = out + 5 + 16; memcpy(ciph_d[0].out - 16, IVs, 16); memcpy(ciph_d[0].iv, IVs, 16); IVs += 16; for (i = 1; i < x4; i++) { ciph_d[i].inp = hash_d[i].ptr = hash_d[i - 1].ptr + frag; ciph_d[i].out = ciph_d[i - 1].out + packlen; memcpy(ciph_d[i].out - 16, IVs, 16); memcpy(ciph_d[i].iv, IVs, 16); IVs += 16; } # if defined(BSWAP8) memcpy(blocks[0].c, sctx->md.data, 8); seqnum = BSWAP8(blocks[0].q[0]); # endif for (i = 0; i < x4; i++) { unsigned int len = (i == (x4 - 1) ? last : frag); # if !defined(BSWAP8) unsigned int carry, j; # endif mctx->A[i] = sctx->md.h0; mctx->B[i] = sctx->md.h1; mctx->C[i] = sctx->md.h2; mctx->D[i] = sctx->md.h3; mctx->E[i] = sctx->md.h4; /* fix seqnum */ # if defined(BSWAP8) blocks[i].q[0] = BSWAP8(seqnum + i); # else for (carry = i, j = 8; j--;) { blocks[i].c[j] = ((u8 *)sctx->md.data)[j] + carry; carry = (blocks[i].c[j] - carry) >> (sizeof(carry) * 8 - 1); } # endif blocks[i].c[8] = ((u8 *)sctx->md.data)[8]; blocks[i].c[9] = ((u8 *)sctx->md.data)[9]; blocks[i].c[10] = ((u8 *)sctx->md.data)[10]; /* fix length */ blocks[i].c[11] = (u8)(len >> 8); blocks[i].c[12] = (u8)(len); memcpy(blocks[i].c + 13, hash_d[i].ptr, 64 - 13); hash_d[i].ptr += 64 - 13; hash_d[i].blocks = (len - (64 - 13)) / 64; edges[i].ptr = blocks[i].c; edges[i].blocks = 1; } /* hash 13-byte headers and first 64-13 bytes of inputs */ sha1_multi_block(mctx, edges, n4x); /* hash bulk inputs */ # define MAXCHUNKSIZE 2048 # if MAXCHUNKSIZE%64 # error "MAXCHUNKSIZE is not divisible by 64" # elif MAXCHUNKSIZE /* * goal is to minimize pressure on L1 cache by moving in shorter steps, * so that hashed data is still in the cache by the time we encrypt it */ minblocks = ((frag <= last ? frag : last) - (64 - 13)) / 64; if (minblocks > MAXCHUNKSIZE / 64) { for (i = 0; i < x4; i++) { edges[i].ptr = hash_d[i].ptr; edges[i].blocks = MAXCHUNKSIZE / 64; ciph_d[i].blocks = MAXCHUNKSIZE / 16; } do { sha1_multi_block(mctx, edges, n4x); aesni_multi_cbc_encrypt(ciph_d, &ctx->ks, n4x); for (i = 0; i < x4; i++) { edges[i].ptr = hash_d[i].ptr += MAXCHUNKSIZE; hash_d[i].blocks -= MAXCHUNKSIZE / 64; edges[i].blocks = MAXCHUNKSIZE / 64; ciph_d[i].inp += MAXCHUNKSIZE; ciph_d[i].out += MAXCHUNKSIZE; ciph_d[i].blocks = MAXCHUNKSIZE / 16; memcpy(ciph_d[i].iv, ciph_d[i].out - 16, 16); } processed += MAXCHUNKSIZE; minblocks -= MAXCHUNKSIZE / 64; } while (minblocks > MAXCHUNKSIZE / 64); } # endif # undef MAXCHUNKSIZE sha1_multi_block(mctx, hash_d, n4x); memset(blocks, 0, sizeof(blocks)); for (i = 0; i < x4; i++) { unsigned int len = (i == (x4 - 1) ? last : frag), off = hash_d[i].blocks * 64; const unsigned char *ptr = hash_d[i].ptr + off; off = (len - processed) - (64 - 13) - off; /* remainder actually */ memcpy(blocks[i].c, ptr, off); blocks[i].c[off] = 0x80; len += 64 + 13; /* 64 is HMAC header */ len *= 8; /* convert to bits */ if (off < (64 - 8)) { # ifdef BSWAP4 blocks[i].d[15] = BSWAP4(len); # else PUTU32(blocks[i].c + 60, len); # endif edges[i].blocks = 1; } else { # ifdef BSWAP4 blocks[i].d[31] = BSWAP4(len); # else PUTU32(blocks[i].c + 124, len); # endif edges[i].blocks = 2; } edges[i].ptr = blocks[i].c; } /* hash input tails and finalize */ sha1_multi_block(mctx, edges, n4x); memset(blocks, 0, sizeof(blocks)); for (i = 0; i < x4; i++) { # ifdef BSWAP4 blocks[i].d[0] = BSWAP4(mctx->A[i]); mctx->A[i] = sctx->tail.h0; blocks[i].d[1] = BSWAP4(mctx->B[i]); mctx->B[i] = sctx->tail.h1; blocks[i].d[2] = BSWAP4(mctx->C[i]); mctx->C[i] = sctx->tail.h2; blocks[i].d[3] = BSWAP4(mctx->D[i]); mctx->D[i] = sctx->tail.h3; blocks[i].d[4] = BSWAP4(mctx->E[i]); mctx->E[i] = sctx->tail.h4; blocks[i].c[20] = 0x80; blocks[i].d[15] = BSWAP4((64 + 20) * 8); # else PUTU32(blocks[i].c + 0, mctx->A[i]); mctx->A[i] = sctx->tail.h0; PUTU32(blocks[i].c + 4, mctx->B[i]); mctx->B[i] = sctx->tail.h1; PUTU32(blocks[i].c + 8, mctx->C[i]); mctx->C[i] = sctx->tail.h2; PUTU32(blocks[i].c + 12, mctx->D[i]); mctx->D[i] = sctx->tail.h3; PUTU32(blocks[i].c + 16, mctx->E[i]); mctx->E[i] = sctx->tail.h4; blocks[i].c[20] = 0x80; PUTU32(blocks[i].c + 60, (64 + 20) * 8); # endif /* BSWAP */ edges[i].ptr = blocks[i].c; edges[i].blocks = 1; } /* finalize MACs */ sha1_multi_block(mctx, edges, n4x); for (i = 0; i < x4; i++) { unsigned int len = (i == (x4 - 1) ? last : frag), pad, j; unsigned char *out0 = out; memcpy(ciph_d[i].out, ciph_d[i].inp, len - processed); ciph_d[i].inp = ciph_d[i].out; out += 5 + 16 + len; /* write MAC */ PUTU32(out + 0, mctx->A[i]); PUTU32(out + 4, mctx->B[i]); PUTU32(out + 8, mctx->C[i]); PUTU32(out + 12, mctx->D[i]); PUTU32(out + 16, mctx->E[i]); out += 20; len += 20; /* pad */ pad = 15 - len % 16; for (j = 0; j <= pad; j++) *(out++) = pad; len += pad + 1; ciph_d[i].blocks = (len - processed) / 16; len += 16; /* account for explicit iv */ /* arrange header */ out0[0] = ((u8 *)sctx->md.data)[8]; out0[1] = ((u8 *)sctx->md.data)[9]; out0[2] = ((u8 *)sctx->md.data)[10]; out0[3] = (u8)(len >> 8); out0[4] = (u8)(len); ret += len + 5; inp += frag; } aesni_multi_cbc_encrypt(ciph_d, &ctx->ks, n4x); OPENSSL_cleanse(blocks, sizeof(blocks)); OPENSSL_cleanse(mctx, sizeof(*mctx)); ctx->multiblock_encrypt_len = ret; return ret; } # endif /* OPENSSL_NO_MULTIBLOCK */ static int aesni_cbc_hmac_sha1_cipher(PROV_CIPHER_CTX *vctx, unsigned char *out, const unsigned char *in, size_t len) { PROV_AES_HMAC_SHA_CTX *ctx = (PROV_AES_HMAC_SHA_CTX *)vctx; PROV_AES_HMAC_SHA1_CTX *sctx = (PROV_AES_HMAC_SHA1_CTX *)vctx; unsigned int l; size_t plen = ctx->payload_length; size_t iv = 0; /* explicit IV in TLS 1.1 and later */ size_t aes_off = 0, blocks; size_t sha_off = SHA_CBLOCK - sctx->md.num; ctx->payload_length = NO_PAYLOAD_LENGTH; if (len % AES_BLOCK_SIZE) return 0; if (ctx->base.enc) { if (plen == NO_PAYLOAD_LENGTH) plen = len; else if (len != ((plen + SHA_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE)) return 0; else if (ctx->aux.tls_ver >= TLS1_1_VERSION) iv = AES_BLOCK_SIZE; if (plen > (sha_off + iv) && (blocks = (plen - (sha_off + iv)) / SHA_CBLOCK)) { sha1_update(&sctx->md, in + iv, sha_off); aesni_cbc_sha1_enc(in, out, blocks, &ctx->ks, ctx->base.iv, &sctx->md, in + iv + sha_off); blocks *= SHA_CBLOCK; aes_off += blocks; sha_off += blocks; sctx->md.Nh += blocks >> 29; sctx->md.Nl += blocks <<= 3; if (sctx->md.Nl < (unsigned int)blocks) sctx->md.Nh++; } else { sha_off = 0; } sha_off += iv; sha1_update(&sctx->md, in + sha_off, plen - sha_off); if (plen != len) { /* "TLS" mode of operation */ if (in != out) memcpy(out + aes_off, in + aes_off, plen - aes_off); /* calculate HMAC and append it to payload */ SHA1_Final(out + plen, &sctx->md); sctx->md = sctx->tail; sha1_update(&sctx->md, out + plen, SHA_DIGEST_LENGTH); SHA1_Final(out + plen, &sctx->md); /* pad the payload|hmac */ plen += SHA_DIGEST_LENGTH; for (l = len - plen - 1; plen < len; plen++) out[plen] = l; /* encrypt HMAC|padding at once */ aesni_cbc_encrypt(out + aes_off, out + aes_off, len - aes_off, &ctx->ks, ctx->base.iv, 1); } else { aesni_cbc_encrypt(in + aes_off, out + aes_off, len - aes_off, &ctx->ks, ctx->base.iv, 1); } } else { union { unsigned int u[SHA_DIGEST_LENGTH / sizeof(unsigned int)]; unsigned char c[32 + SHA_DIGEST_LENGTH]; } mac, *pmac; /* arrange cache line alignment */ pmac = (void *)(((size_t)mac.c + 31) & ((size_t)0 - 32)); if (plen != NO_PAYLOAD_LENGTH) { /* "TLS" mode of operation */ size_t inp_len, mask, j, i; unsigned int res, maxpad, pad, bitlen; int ret = 1; union { unsigned int u[SHA_LBLOCK]; unsigned char c[SHA_CBLOCK]; } *data = (void *)sctx->md.data; if ((ctx->aux.tls_aad[plen - 4] << 8 | ctx->aux.tls_aad[plen - 3]) >= TLS1_1_VERSION) { if (len < (AES_BLOCK_SIZE + SHA_DIGEST_LENGTH + 1)) return 0; /* omit explicit iv */ memcpy(ctx->base.iv, in, AES_BLOCK_SIZE); in += AES_BLOCK_SIZE; out += AES_BLOCK_SIZE; len -= AES_BLOCK_SIZE; } else if (len < (SHA_DIGEST_LENGTH + 1)) return 0; /* decrypt HMAC|padding at once */ aesni_cbc_encrypt(in, out, len, &ctx->ks, ctx->base.iv, 0); /* figure out payload length */ pad = out[len - 1]; maxpad = len - (SHA_DIGEST_LENGTH + 1); maxpad |= (255 - maxpad) >> (sizeof(maxpad) * 8 - 8); maxpad &= 255; mask = constant_time_ge(maxpad, pad); ret &= mask; /* * If pad is invalid then we will fail the above test but we must * continue anyway because we are in constant time code. However, * we'll use the maxpad value instead of the supplied pad to make * sure we perform well defined pointer arithmetic. */ pad = constant_time_select(mask, pad, maxpad); inp_len = len - (SHA_DIGEST_LENGTH + pad + 1); ctx->aux.tls_aad[plen - 2] = inp_len >> 8; ctx->aux.tls_aad[plen - 1] = inp_len; /* calculate HMAC */ sctx->md = sctx->head; sha1_update(&sctx->md, ctx->aux.tls_aad, plen); /* code containing lucky-13 fix */ len -= SHA_DIGEST_LENGTH; /* amend mac */ if (len >= (256 + SHA_CBLOCK)) { j = (len - (256 + SHA_CBLOCK)) & (0 - SHA_CBLOCK); j += SHA_CBLOCK - sctx->md.num; sha1_update(&sctx->md, out, j); out += j; len -= j; inp_len -= j; } /* but pretend as if we hashed padded payload */ bitlen = sctx->md.Nl + (inp_len << 3); /* at most 18 bits */ # ifdef BSWAP4 bitlen = BSWAP4(bitlen); # else mac.c[0] = 0; mac.c[1] = (unsigned char)(bitlen >> 16); mac.c[2] = (unsigned char)(bitlen >> 8); mac.c[3] = (unsigned char)bitlen; bitlen = mac.u[0]; # endif /* BSWAP */ pmac->u[0] = 0; pmac->u[1] = 0; pmac->u[2] = 0; pmac->u[3] = 0; pmac->u[4] = 0; for (res = sctx->md.num, j = 0; j < len; j++) { size_t c = out[j]; mask = (j - inp_len) >> (sizeof(j) * 8 - 8); c &= mask; c |= 0x80 & ~mask & ~((inp_len - j) >> (sizeof(j) * 8 - 8)); data->c[res++] = (unsigned char)c; if (res != SHA_CBLOCK) continue; /* j is not incremented yet */ mask = 0 - ((inp_len + 7 - j) >> (sizeof(j) * 8 - 1)); data->u[SHA_LBLOCK - 1] |= bitlen & mask; sha1_block_data_order(&sctx->md, data, 1); mask &= 0 - ((j - inp_len - 72) >> (sizeof(j) * 8 - 1)); pmac->u[0] |= sctx->md.h0 & mask; pmac->u[1] |= sctx->md.h1 & mask; pmac->u[2] |= sctx->md.h2 & mask; pmac->u[3] |= sctx->md.h3 & mask; pmac->u[4] |= sctx->md.h4 & mask; res = 0; } for (i = res; i < SHA_CBLOCK; i++, j++) data->c[i] = 0; if (res > SHA_CBLOCK - 8) { mask = 0 - ((inp_len + 8 - j) >> (sizeof(j) * 8 - 1)); data->u[SHA_LBLOCK - 1] |= bitlen & mask; sha1_block_data_order(&sctx->md, data, 1); mask &= 0 - ((j - inp_len - 73) >> (sizeof(j) * 8 - 1)); pmac->u[0] |= sctx->md.h0 & mask; pmac->u[1] |= sctx->md.h1 & mask; pmac->u[2] |= sctx->md.h2 & mask; pmac->u[3] |= sctx->md.h3 & mask; pmac->u[4] |= sctx->md.h4 & mask; memset(data, 0, SHA_CBLOCK); j += 64; } data->u[SHA_LBLOCK - 1] = bitlen; sha1_block_data_order(&sctx->md, data, 1); mask = 0 - ((j - inp_len - 73) >> (sizeof(j) * 8 - 1)); pmac->u[0] |= sctx->md.h0 & mask; pmac->u[1] |= sctx->md.h1 & mask; pmac->u[2] |= sctx->md.h2 & mask; pmac->u[3] |= sctx->md.h3 & mask; pmac->u[4] |= sctx->md.h4 & mask; # ifdef BSWAP4 pmac->u[0] = BSWAP4(pmac->u[0]); pmac->u[1] = BSWAP4(pmac->u[1]); pmac->u[2] = BSWAP4(pmac->u[2]); pmac->u[3] = BSWAP4(pmac->u[3]); pmac->u[4] = BSWAP4(pmac->u[4]); # else for (i = 0; i < 5; i++) { res = pmac->u[i]; pmac->c[4 * i + 0] = (unsigned char)(res >> 24); pmac->c[4 * i + 1] = (unsigned char)(res >> 16); pmac->c[4 * i + 2] = (unsigned char)(res >> 8); pmac->c[4 * i + 3] = (unsigned char)res; } # endif /* BSWAP4 */ len += SHA_DIGEST_LENGTH; sctx->md = sctx->tail; sha1_update(&sctx->md, pmac->c, SHA_DIGEST_LENGTH); SHA1_Final(pmac->c, &sctx->md); /* verify HMAC */ out += inp_len; len -= inp_len; /* version of code with lucky-13 fix */ { unsigned char *p = out + len - 1 - maxpad - SHA_DIGEST_LENGTH; size_t off = out - p; unsigned int c, cmask; for (res = 0, i = 0, j = 0; j < maxpad + SHA_DIGEST_LENGTH; j++) { c = p[j]; cmask = ((int)(j - off - SHA_DIGEST_LENGTH)) >> (sizeof(int) * 8 - 1); res |= (c ^ pad) & ~cmask; /* ... and padding */ cmask &= ((int)(off - 1 - j)) >> (sizeof(int) * 8 - 1); res |= (c ^ pmac->c[i]) & cmask; i += 1 & cmask; } res = 0 - ((0 - res) >> (sizeof(res) * 8 - 1)); ret &= (int)~res; } return ret; } else { /* decrypt HMAC|padding at once */ aesni_cbc_encrypt(in, out, len, &ctx->ks, ctx->base.iv, 0); sha1_update(&sctx->md, out, len); } } return 1; } /* EVP_CTRL_AEAD_SET_MAC_KEY */ static void aesni_cbc_hmac_sha1_set_mac_key(void *vctx, const unsigned char *mac, size_t len) { PROV_AES_HMAC_SHA1_CTX *ctx = (PROV_AES_HMAC_SHA1_CTX *)vctx; unsigned int i; unsigned char hmac_key[64]; memset(hmac_key, 0, sizeof(hmac_key)); if (len > (int)sizeof(hmac_key)) { SHA1_Init(&ctx->head); sha1_update(&ctx->head, mac, len); SHA1_Final(hmac_key, &ctx->head); } else { memcpy(hmac_key, mac, len); } for (i = 0; i < sizeof(hmac_key); i++) hmac_key[i] ^= 0x36; /* ipad */ SHA1_Init(&ctx->head); sha1_update(&ctx->head, hmac_key, sizeof(hmac_key)); for (i = 0; i < sizeof(hmac_key); i++) hmac_key[i] ^= 0x36 ^ 0x5c; /* opad */ SHA1_Init(&ctx->tail); sha1_update(&ctx->tail, hmac_key, sizeof(hmac_key)); OPENSSL_cleanse(hmac_key, sizeof(hmac_key)); } /* EVP_CTRL_AEAD_TLS1_AAD */ static int aesni_cbc_hmac_sha1_set_tls1_aad(void *vctx, unsigned char *aad_rec, int aad_len) { PROV_AES_HMAC_SHA_CTX *ctx = (PROV_AES_HMAC_SHA_CTX *)vctx; PROV_AES_HMAC_SHA1_CTX *sctx = (PROV_AES_HMAC_SHA1_CTX *)vctx; unsigned char *p = aad_rec; unsigned int len; if (aad_len != EVP_AEAD_TLS1_AAD_LEN) return -1; len = p[aad_len - 2] << 8 | p[aad_len - 1]; if (ctx->base.enc) { ctx->payload_length = len; if ((ctx->aux.tls_ver = p[aad_len - 4] << 8 | p[aad_len - 3]) >= TLS1_1_VERSION) { if (len < AES_BLOCK_SIZE) return 0; len -= AES_BLOCK_SIZE; p[aad_len - 2] = len >> 8; p[aad_len - 1] = len; } sctx->md = sctx->head; sha1_update(&sctx->md, p, aad_len); ctx->tls_aad_pad = (int)(((len + SHA_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE) - len); return 1; } else { memcpy(ctx->aux.tls_aad, aad_rec, aad_len); ctx->payload_length = aad_len; ctx->tls_aad_pad = SHA_DIGEST_LENGTH; return 1; } } # if !defined(OPENSSL_NO_MULTIBLOCK) /* EVP_CTRL_TLS1_1_MULTIBLOCK_MAX_BUFSIZE */ static int aesni_cbc_hmac_sha1_tls1_multiblock_max_bufsize(void *vctx) { PROV_AES_HMAC_SHA_CTX *ctx = (PROV_AES_HMAC_SHA_CTX *)vctx; OPENSSL_assert(ctx->multiblock_max_send_fragment != 0); return (int)(5 + 16 + (((int)ctx->multiblock_max_send_fragment + 20 + 16) & -16)); } /* EVP_CTRL_TLS1_1_MULTIBLOCK_AAD */ static int aesni_cbc_hmac_sha1_tls1_multiblock_aad( void *vctx, EVP_CTRL_TLS1_1_MULTIBLOCK_PARAM *param) { PROV_AES_HMAC_SHA_CTX *ctx = (PROV_AES_HMAC_SHA_CTX *)vctx; PROV_AES_HMAC_SHA1_CTX *sctx = (PROV_AES_HMAC_SHA1_CTX *)vctx; unsigned int n4x = 1, x4; unsigned int frag, last, packlen, inp_len; inp_len = param->inp[11] << 8 | param->inp[12]; ctx->multiblock_interleave = param->interleave; if (ctx->base.enc) { if ((param->inp[9] << 8 | param->inp[10]) < TLS1_1_VERSION) return -1; if (inp_len) { if (inp_len < 4096) return 0; /* too short */ if (inp_len >= 8192 && OPENSSL_ia32cap_P[2] & (1 << 5)) n4x = 2; /* AVX2 */ } else if ((n4x = param->interleave / 4) && n4x <= 2) inp_len = param->len; else return -1; sctx->md = sctx->head; sha1_update(&sctx->md, param->inp, 13); x4 = 4 * n4x; n4x += 1; frag = inp_len >> n4x; last = inp_len + frag - (frag << n4x); if (last > frag && ((last + 13 + 9) % 64 < (x4 - 1))) { frag++; last -= x4 - 1; } packlen = 5 + 16 + ((frag + 20 + 16) & -16); packlen = (packlen << n4x) - packlen; packlen += 5 + 16 + ((last + 20 + 16) & -16); param->interleave = x4; /* The returned values used by get need to be stored */ ctx->multiblock_interleave = x4; ctx->multiblock_aad_packlen = packlen; return 1; } return -1; /* not yet */ } /* EVP_CTRL_TLS1_1_MULTIBLOCK_ENCRYPT */ static int aesni_cbc_hmac_sha1_tls1_multiblock_encrypt( void *ctx, EVP_CTRL_TLS1_1_MULTIBLOCK_PARAM *param) { return (int)tls1_multi_block_encrypt(ctx, param->out, param->inp, param->len, param->interleave / 4); } # endif /* OPENSSL_NO_MULTIBLOCK */ static const PROV_CIPHER_HW_AES_HMAC_SHA cipher_hw_aes_hmac_sha1 = { { aesni_cbc_hmac_sha1_init_key, aesni_cbc_hmac_sha1_cipher }, aesni_cbc_hmac_sha1_set_mac_key, aesni_cbc_hmac_sha1_set_tls1_aad, # if !defined(OPENSSL_NO_MULTIBLOCK) aesni_cbc_hmac_sha1_tls1_multiblock_max_bufsize, aesni_cbc_hmac_sha1_tls1_multiblock_aad, aesni_cbc_hmac_sha1_tls1_multiblock_encrypt # endif }; const PROV_CIPHER_HW_AES_HMAC_SHA *ossl_prov_cipher_hw_aes_cbc_hmac_sha1(void) { return &cipher_hw_aes_hmac_sha1; } #endif /* !defined(AES_CBC_HMAC_SHA_CAPABLE) || !defined(AESNI_CAPABLE) */
./openssl/providers/implementations/ciphers/cipher_tdes_hw.c
/* * Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * DES low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include "prov/ciphercommon.h" #include "cipher_tdes.h" #define ks1 tks.ks[0] #define ks2 tks.ks[1] #define ks3 tks.ks[2] int ossl_cipher_hw_tdes_ede3_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_TDES_CTX *tctx = (PROV_TDES_CTX *)ctx; DES_cblock *deskey = (DES_cblock *)key; tctx->tstream.cbc = NULL; # if defined(SPARC_DES_CAPABLE) if (SPARC_DES_CAPABLE) { if (ctx->mode == EVP_CIPH_CBC_MODE) { des_t4_key_expand(&deskey[0], &tctx->ks1); des_t4_key_expand(&deskey[1], &tctx->ks2); des_t4_key_expand(&deskey[2], &tctx->ks3); tctx->tstream.cbc = ctx->enc ? des_t4_ede3_cbc_encrypt : des_t4_ede3_cbc_decrypt; return 1; } } # endif DES_set_key_unchecked(&deskey[0], &tctx->ks1); DES_set_key_unchecked(&deskey[1], &tctx->ks2); DES_set_key_unchecked(&deskey[2], &tctx->ks3); return 1; } void ossl_cipher_hw_tdes_copyctx(PROV_CIPHER_CTX *dst, const PROV_CIPHER_CTX *src) { PROV_TDES_CTX *sctx = (PROV_TDES_CTX *)src; PROV_TDES_CTX *dctx = (PROV_TDES_CTX *)dst; *dctx = *sctx; dst->ks = &dctx->tks.ks; } int ossl_cipher_hw_tdes_cbc(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { PROV_TDES_CTX *tctx = (PROV_TDES_CTX *)ctx; if (tctx->tstream.cbc != NULL) { (*tctx->tstream.cbc) (in, out, inl, tctx->tks.ks, ctx->iv); return 1; } while (inl >= MAXCHUNK) { DES_ede3_cbc_encrypt(in, out, (long)MAXCHUNK, &tctx->ks1, &tctx->ks2, &tctx->ks3, (DES_cblock *)ctx->iv, ctx->enc); inl -= MAXCHUNK; in += MAXCHUNK; out += MAXCHUNK; } if (inl > 0) DES_ede3_cbc_encrypt(in, out, (long)inl, &tctx->ks1, &tctx->ks2, &tctx->ks3, (DES_cblock *)ctx->iv, ctx->enc); return 1; } int ossl_cipher_hw_tdes_ecb(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t len) { size_t i; PROV_TDES_CTX *tctx = (PROV_TDES_CTX *)ctx; if (len < DES_BLOCK_SIZE) return 1; for (i = 0, len -= DES_BLOCK_SIZE; i <= len; i += DES_BLOCK_SIZE) { DES_ecb3_encrypt((const_DES_cblock *)(in + i), (DES_cblock *)(out + i), &tctx->ks1, &tctx->ks2, &tctx->ks3, ctx->enc); } return 1; } PROV_CIPHER_HW_tdes_mode(ede3, ecb) PROV_CIPHER_HW_tdes_mode(ede3, cbc)
./openssl/providers/implementations/ciphers/cipher_aria.c
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for ARIA cipher modes ecb, cbc, ofb, cfb, ctr */ #include "cipher_aria.h" #include "prov/implementations.h" #include "prov/providercommon.h" static OSSL_FUNC_cipher_freectx_fn aria_freectx; static OSSL_FUNC_cipher_dupctx_fn aria_dupctx; static void aria_freectx(void *vctx) { PROV_ARIA_CTX *ctx = (PROV_ARIA_CTX *)vctx; ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } static void *aria_dupctx(void *ctx) { PROV_ARIA_CTX *in = (PROV_ARIA_CTX *)ctx; PROV_ARIA_CTX *ret; if (!ossl_prov_is_running()) return NULL; ret = OPENSSL_malloc(sizeof(*ret)); if (ret == NULL) return NULL; in->base.hw->copyctx(&ret->base, &in->base); return ret; } /* ossl_aria256ecb_functions */ IMPLEMENT_generic_cipher(aria, ARIA, ecb, ECB, 0, 256, 128, 0, block) /* ossl_aria192ecb_functions */ IMPLEMENT_generic_cipher(aria, ARIA, ecb, ECB, 0, 192, 128, 0, block) /* ossl_aria128ecb_functions */ IMPLEMENT_generic_cipher(aria, ARIA, ecb, ECB, 0, 128, 128, 0, block) /* ossl_aria256cbc_functions */ IMPLEMENT_generic_cipher(aria, ARIA, cbc, CBC, 0, 256, 128, 128, block) /* ossl_aria192cbc_functions */ IMPLEMENT_generic_cipher(aria, ARIA, cbc, CBC, 0, 192, 128, 128, block) /* ossl_aria128cbc_functions */ IMPLEMENT_generic_cipher(aria, ARIA, cbc, CBC, 0, 128, 128, 128, block) /* ossl_aria256ofb_functions */ IMPLEMENT_generic_cipher(aria, ARIA, ofb, OFB, 0, 256, 8, 128, stream) /* ossl_aria192ofb_functions */ IMPLEMENT_generic_cipher(aria, ARIA, ofb, OFB, 0, 192, 8, 128, stream) /* ossl_aria128ofb_functions */ IMPLEMENT_generic_cipher(aria, ARIA, ofb, OFB, 0, 128, 8, 128, stream) /* ossl_aria256cfb_functions */ IMPLEMENT_generic_cipher(aria, ARIA, cfb, CFB, 0, 256, 8, 128, stream) /* ossl_aria192cfb_functions */ IMPLEMENT_generic_cipher(aria, ARIA, cfb, CFB, 0, 192, 8, 128, stream) /* ossl_aria128cfb_functions */ IMPLEMENT_generic_cipher(aria, ARIA, cfb, CFB, 0, 128, 8, 128, stream) /* ossl_aria256cfb1_functions */ IMPLEMENT_generic_cipher(aria, ARIA, cfb1, CFB, 0, 256, 8, 128, stream) /* ossl_aria192cfb1_functions */ IMPLEMENT_generic_cipher(aria, ARIA, cfb1, CFB, 0, 192, 8, 128, stream) /* ossl_aria128cfb1_functions */ IMPLEMENT_generic_cipher(aria, ARIA, cfb1, CFB, 0, 128, 8, 128, stream) /* ossl_aria256cfb8_functions */ IMPLEMENT_generic_cipher(aria, ARIA, cfb8, CFB, 0, 256, 8, 128, stream) /* ossl_aria192cfb8_functions */ IMPLEMENT_generic_cipher(aria, ARIA, cfb8, CFB, 0, 192, 8, 128, stream) /* ossl_aria128cfb8_functions */ IMPLEMENT_generic_cipher(aria, ARIA, cfb8, CFB, 0, 128, 8, 128, stream) /* ossl_aria256ctr_functions */ IMPLEMENT_generic_cipher(aria, ARIA, ctr, CTR, 0, 256, 8, 128, stream) /* ossl_aria192ctr_functions */ IMPLEMENT_generic_cipher(aria, ARIA, ctr, CTR, 0, 192, 8, 128, stream) /* ossl_aria128ctr_functions */ IMPLEMENT_generic_cipher(aria, ARIA, ctr, CTR, 0, 128, 8, 128, stream)
./openssl/providers/implementations/ciphers/cipher_aes_gcm.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * AES low level APIs are deprecated for public use, but still ok for internal * use where we're using them to implement the higher level EVP interface, as is * the case here. */ #include "internal/deprecated.h" /* Dispatch functions for AES GCM mode */ #include "cipher_aes_gcm.h" #include "prov/implementations.h" #include "prov/providercommon.h" static void *aes_gcm_newctx(void *provctx, size_t keybits) { PROV_AES_GCM_CTX *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) ossl_gcm_initctx(provctx, &ctx->base, keybits, ossl_prov_aes_hw_gcm(keybits)); return ctx; } static void *aes_gcm_dupctx(void *provctx) { PROV_AES_GCM_CTX *ctx = provctx; PROV_AES_GCM_CTX *dctx = NULL; if (ctx == NULL) return NULL; dctx = OPENSSL_memdup(ctx, sizeof(*ctx)); if (dctx != NULL && dctx->base.gcm.key != NULL) dctx->base.gcm.key = &dctx->ks.ks; return dctx; } static OSSL_FUNC_cipher_freectx_fn aes_gcm_freectx; static void aes_gcm_freectx(void *vctx) { PROV_AES_GCM_CTX *ctx = (PROV_AES_GCM_CTX *)vctx; OPENSSL_clear_free(ctx, sizeof(*ctx)); } /* ossl_aes128gcm_functions */ IMPLEMENT_aead_cipher(aes, gcm, GCM, AEAD_FLAGS, 128, 8, 96); /* ossl_aes192gcm_functions */ IMPLEMENT_aead_cipher(aes, gcm, GCM, AEAD_FLAGS, 192, 8, 96); /* ossl_aes256gcm_functions */ IMPLEMENT_aead_cipher(aes, gcm, GCM, AEAD_FLAGS, 256, 8, 96);
./openssl/providers/implementations/ciphers/ciphercommon_hw.c
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "prov/ciphercommon.h" /*- * The generic cipher functions for cipher modes cbc, ecb, ofb, cfb and ctr. * Used if there is no special hardware implementations. */ int ossl_cipher_hw_generic_cbc(PROV_CIPHER_CTX *dat, unsigned char *out, const unsigned char *in, size_t len) { if (dat->stream.cbc) (*dat->stream.cbc) (in, out, len, dat->ks, dat->iv, dat->enc); else if (dat->enc) CRYPTO_cbc128_encrypt(in, out, len, dat->ks, dat->iv, dat->block); else CRYPTO_cbc128_decrypt(in, out, len, dat->ks, dat->iv, dat->block); return 1; } int ossl_cipher_hw_generic_ecb(PROV_CIPHER_CTX *dat, unsigned char *out, const unsigned char *in, size_t len) { size_t i, bl = dat->blocksize; if (len < bl) return 1; if (dat->stream.ecb) { (*dat->stream.ecb) (in, out, len, dat->ks, dat->enc); } else { for (i = 0, len -= bl; i <= len; i += bl) (*dat->block) (in + i, out + i, dat->ks); } return 1; } int ossl_cipher_hw_generic_ofb128(PROV_CIPHER_CTX *dat, unsigned char *out, const unsigned char *in, size_t len) { int num = dat->num; CRYPTO_ofb128_encrypt(in, out, len, dat->ks, dat->iv, &num, dat->block); dat->num = num; return 1; } int ossl_cipher_hw_generic_cfb128(PROV_CIPHER_CTX *dat, unsigned char *out, const unsigned char *in, size_t len) { int num = dat->num; CRYPTO_cfb128_encrypt(in, out, len, dat->ks, dat->iv, &num, dat->enc, dat->block); dat->num = num; return 1; } int ossl_cipher_hw_generic_cfb8(PROV_CIPHER_CTX *dat, unsigned char *out, const unsigned char *in, size_t len) { int num = dat->num; CRYPTO_cfb128_8_encrypt(in, out, len, dat->ks, dat->iv, &num, dat->enc, dat->block); dat->num = num; return 1; } int ossl_cipher_hw_generic_cfb1(PROV_CIPHER_CTX *dat, unsigned char *out, const unsigned char *in, size_t len) { int num = dat->num; if (dat->use_bits) { CRYPTO_cfb128_1_encrypt(in, out, len, dat->ks, dat->iv, &num, dat->enc, dat->block); dat->num = num; return 1; } while (len >= MAXBITCHUNK) { CRYPTO_cfb128_1_encrypt(in, out, MAXBITCHUNK * 8, dat->ks, dat->iv, &num, dat->enc, dat->block); len -= MAXBITCHUNK; out += MAXBITCHUNK; in += MAXBITCHUNK; } if (len) CRYPTO_cfb128_1_encrypt(in, out, len * 8, dat->ks, dat->iv, &num, dat->enc, dat->block); dat->num = num; return 1; } int ossl_cipher_hw_generic_ctr(PROV_CIPHER_CTX *dat, unsigned char *out, const unsigned char *in, size_t len) { unsigned int num = dat->num; if (dat->stream.ctr) CRYPTO_ctr128_encrypt_ctr32(in, out, len, dat->ks, dat->iv, dat->buf, &num, dat->stream.ctr); else CRYPTO_ctr128_encrypt(in, out, len, dat->ks, dat->iv, dat->buf, &num, dat->block); dat->num = num; return 1; } /*- * The chunked cipher functions for cipher modes cbc, ecb, ofb, cfb and ctr. * Used if there is no special hardware implementations. */ int ossl_cipher_hw_chunked_cbc(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { while (inl >= MAXCHUNK) { ossl_cipher_hw_generic_cbc(ctx, out, in, MAXCHUNK); inl -= MAXCHUNK; in += MAXCHUNK; out += MAXCHUNK; } if (inl > 0) ossl_cipher_hw_generic_cbc(ctx, out, in, inl); return 1; } int ossl_cipher_hw_chunked_cfb8(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { size_t chunk = MAXCHUNK; if (inl < chunk) chunk = inl; while (inl > 0 && inl >= chunk) { ossl_cipher_hw_generic_cfb8(ctx, out, in, inl); inl -= chunk; in += chunk; out += chunk; if (inl < chunk) chunk = inl; } return 1; } int ossl_cipher_hw_chunked_cfb128(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { size_t chunk = MAXCHUNK; if (inl < chunk) chunk = inl; while (inl > 0 && inl >= chunk) { ossl_cipher_hw_generic_cfb128(ctx, out, in, inl); inl -= chunk; in += chunk; out += chunk; if (inl < chunk) chunk = inl; } return 1; } int ossl_cipher_hw_chunked_ofb128(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { while (inl >= MAXCHUNK) { ossl_cipher_hw_generic_ofb128(ctx, out, in, MAXCHUNK); inl -= MAXCHUNK; in += MAXCHUNK; out += MAXCHUNK; } if (inl > 0) ossl_cipher_hw_generic_ofb128(ctx, out, in, inl); return 1; }
./openssl/providers/implementations/ciphers/ciphercommon_gcm_hw.c
/* * Copyright 2001-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "prov/ciphercommon.h" #include "prov/ciphercommon_gcm.h" int ossl_gcm_setiv(PROV_GCM_CTX *ctx, const unsigned char *iv, size_t ivlen) { CRYPTO_gcm128_setiv(&ctx->gcm, iv, ivlen); return 1; } int ossl_gcm_aad_update(PROV_GCM_CTX *ctx, const unsigned char *aad, size_t aad_len) { return CRYPTO_gcm128_aad(&ctx->gcm, aad, aad_len) == 0; } int ossl_gcm_cipher_update(PROV_GCM_CTX *ctx, const unsigned char *in, size_t len, unsigned char *out) { if (ctx->enc) { if (CRYPTO_gcm128_encrypt(&ctx->gcm, in, out, len)) return 0; } else { if (CRYPTO_gcm128_decrypt(&ctx->gcm, in, out, len)) return 0; } return 1; } int ossl_gcm_cipher_final(PROV_GCM_CTX *ctx, unsigned char *tag) { if (ctx->enc) { CRYPTO_gcm128_tag(&ctx->gcm, tag, GCM_TAG_MAX_SIZE); ctx->taglen = GCM_TAG_MAX_SIZE; } else { if (CRYPTO_gcm128_finish(&ctx->gcm, tag, ctx->taglen) != 0) return 0; } return 1; } int ossl_gcm_one_shot(PROV_GCM_CTX *ctx, unsigned char *aad, size_t aad_len, const unsigned char *in, size_t in_len, unsigned char *out, unsigned char *tag, size_t tag_len) { int ret = 0; /* Use saved AAD */ if (!ctx->hw->aadupdate(ctx, aad, aad_len)) goto err; if (!ctx->hw->cipherupdate(ctx, in, in_len, out)) goto err; ctx->taglen = GCM_TAG_MAX_SIZE; if (!ctx->hw->cipherfinal(ctx, tag)) goto err; ret = 1; err: return ret; }
./openssl/providers/implementations/ciphers/cipher_aes_xts_fips.c
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * AES low level APIs are deprecated for public use, but still ok for internal * use where we're using them to implement the higher level EVP interface, as is * the case here. */ #include "internal/deprecated.h" #include "cipher_aes_xts.h" #ifdef FIPS_MODULE const int ossl_aes_xts_allow_insecure_decrypt = 0; #else const int ossl_aes_xts_allow_insecure_decrypt = 1; #endif /* FIPS_MODULE */
./openssl/providers/implementations/ciphers/cipher_cast5_hw.c
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * CAST low level APIs are deprecated for public use, but still ok for * internal use. */ #include "internal/deprecated.h" #include "cipher_cast.h" static int cipher_hw_cast5_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_CAST_CTX *bctx = (PROV_CAST_CTX *)ctx; CAST_set_key(&(bctx->ks.ks), keylen, key); return 1; } # define PROV_CIPHER_HW_cast_mode(mode, UCMODE) \ IMPLEMENT_CIPHER_HW_##UCMODE(mode, cast5, PROV_CAST_CTX, CAST_KEY, \ CAST_##mode) \ static const PROV_CIPHER_HW cast5_##mode = { \ cipher_hw_cast5_initkey, \ cipher_hw_cast5_##mode##_cipher \ }; \ const PROV_CIPHER_HW *ossl_prov_cipher_hw_cast5_##mode(size_t keybits) \ { \ return &cast5_##mode; \ } PROV_CIPHER_HW_cast_mode(cbc, CBC) PROV_CIPHER_HW_cast_mode(ecb, ECB) PROV_CIPHER_HW_cast_mode(ofb64, OFB) PROV_CIPHER_HW_cast_mode(cfb64, CFB)
./openssl/providers/implementations/ciphers/cipher_aes_xts_hw.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * This file uses the low level AES functions (which are deprecated for * non-internal use) in order to implement provider AES ciphers. */ #include "internal/deprecated.h" #include "cipher_aes_xts.h" #define XTS_SET_KEY_FN(fn_set_enc_key, fn_set_dec_key, \ fn_block_enc, fn_block_dec, \ fn_stream_enc, fn_stream_dec) { \ size_t bytes = keylen / 2; \ size_t bits = bytes * 8; \ \ if (ctx->enc) { \ fn_set_enc_key(key, bits, &xctx->ks1.ks); \ xctx->xts.block1 = (block128_f)fn_block_enc; \ } else { \ fn_set_dec_key(key, bits, &xctx->ks1.ks); \ xctx->xts.block1 = (block128_f)fn_block_dec; \ } \ fn_set_enc_key(key + bytes, bits, &xctx->ks2.ks); \ xctx->xts.block2 = (block128_f)fn_block_enc; \ xctx->xts.key1 = &xctx->ks1; \ xctx->xts.key2 = &xctx->ks2; \ xctx->stream = ctx->enc ? fn_stream_enc : fn_stream_dec; \ } static int cipher_hw_aes_xts_generic_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_AES_XTS_CTX *xctx = (PROV_AES_XTS_CTX *)ctx; OSSL_xts_stream_fn stream_enc = NULL; OSSL_xts_stream_fn stream_dec = NULL; #ifdef AES_XTS_ASM stream_enc = AES_xts_encrypt; stream_dec = AES_xts_decrypt; #endif /* AES_XTS_ASM */ #ifdef HWAES_CAPABLE if (HWAES_CAPABLE) { # ifdef HWAES_xts_encrypt stream_enc = HWAES_xts_encrypt; # endif /* HWAES_xts_encrypt */ # ifdef HWAES_xts_decrypt stream_dec = HWAES_xts_decrypt; # endif /* HWAES_xts_decrypt */ XTS_SET_KEY_FN(HWAES_set_encrypt_key, HWAES_set_decrypt_key, HWAES_encrypt, HWAES_decrypt, stream_enc, stream_dec); return 1; } else #endif /* HWAES_CAPABLE */ #ifdef BSAES_CAPABLE if (BSAES_CAPABLE) { stream_enc = ossl_bsaes_xts_encrypt; stream_dec = ossl_bsaes_xts_decrypt; } else #endif /* BSAES_CAPABLE */ #ifdef VPAES_CAPABLE if (VPAES_CAPABLE) { XTS_SET_KEY_FN(vpaes_set_encrypt_key, vpaes_set_decrypt_key, vpaes_encrypt, vpaes_decrypt, stream_enc, stream_dec); return 1; } else #endif /* VPAES_CAPABLE */ { (void)0; } { XTS_SET_KEY_FN(AES_set_encrypt_key, AES_set_decrypt_key, AES_encrypt, AES_decrypt, stream_enc, stream_dec); } return 1; } static void cipher_hw_aes_xts_copyctx(PROV_CIPHER_CTX *dst, const PROV_CIPHER_CTX *src) { PROV_AES_XTS_CTX *sctx = (PROV_AES_XTS_CTX *)src; PROV_AES_XTS_CTX *dctx = (PROV_AES_XTS_CTX *)dst; *dctx = *sctx; dctx->xts.key1 = &dctx->ks1.ks; dctx->xts.key2 = &dctx->ks2.ks; } #if defined(AESNI_CAPABLE) static int cipher_hw_aesni_xts_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_AES_XTS_CTX *xctx = (PROV_AES_XTS_CTX *)ctx; XTS_SET_KEY_FN(aesni_set_encrypt_key, aesni_set_decrypt_key, aesni_encrypt, aesni_decrypt, aesni_xts_encrypt, aesni_xts_decrypt); return 1; } # define PROV_CIPHER_HW_declare_xts() \ static const PROV_CIPHER_HW aesni_xts = { \ cipher_hw_aesni_xts_initkey, \ NULL, \ cipher_hw_aes_xts_copyctx \ }; # define PROV_CIPHER_HW_select_xts() \ if (AESNI_CAPABLE) \ return &aesni_xts; # elif defined(SPARC_AES_CAPABLE) static int cipher_hw_aes_xts_t4_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_AES_XTS_CTX *xctx = (PROV_AES_XTS_CTX *)ctx; OSSL_xts_stream_fn stream_enc = NULL; OSSL_xts_stream_fn stream_dec = NULL; /* Note: keylen is the size of 2 keys */ switch (keylen) { case 32: stream_enc = aes128_t4_xts_encrypt; stream_dec = aes128_t4_xts_decrypt; break; case 64: stream_enc = aes256_t4_xts_encrypt; stream_dec = aes256_t4_xts_decrypt; break; default: return 0; } XTS_SET_KEY_FN(aes_t4_set_encrypt_key, aes_t4_set_decrypt_key, aes_t4_encrypt, aes_t4_decrypt, stream_enc, stream_dec); return 1; } # define PROV_CIPHER_HW_declare_xts() \ static const PROV_CIPHER_HW aes_xts_t4 = { \ cipher_hw_aes_xts_t4_initkey, \ NULL, \ cipher_hw_aes_xts_copyctx \ }; # define PROV_CIPHER_HW_select_xts() \ if (SPARC_AES_CAPABLE) \ return &aes_xts_t4; #elif defined(__riscv) && __riscv_xlen == 64 static int cipher_hw_aes_xts_rv64i_zknd_zkne_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_AES_XTS_CTX *xctx = (PROV_AES_XTS_CTX *)ctx; OSSL_xts_stream_fn stream_enc = NULL; OSSL_xts_stream_fn stream_dec = NULL; XTS_SET_KEY_FN(rv64i_zkne_set_encrypt_key, rv64i_zknd_set_decrypt_key, rv64i_zkne_encrypt, rv64i_zknd_decrypt, stream_enc, stream_dec); return 1; } static int cipher_hw_aes_xts_rv64i_zvbb_zvkg_zvkned_initkey( PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_AES_XTS_CTX *xctx = (PROV_AES_XTS_CTX *)ctx; OSSL_xts_stream_fn stream_enc = NULL; OSSL_xts_stream_fn stream_dec = NULL; /* Zvkned only supports 128 and 256 bit keys. */ if (keylen * 8 == 128 * 2 || keylen * 8 == 256 * 2) { XTS_SET_KEY_FN(rv64i_zvkned_set_encrypt_key, rv64i_zvkned_set_decrypt_key, rv64i_zvkned_encrypt, rv64i_zvkned_decrypt, rv64i_zvbb_zvkg_zvkned_aes_xts_encrypt, rv64i_zvbb_zvkg_zvkned_aes_xts_decrypt); } else { XTS_SET_KEY_FN(AES_set_encrypt_key, AES_set_encrypt_key, rv64i_zvkned_encrypt, rv64i_zvkned_decrypt, stream_enc, stream_dec); } return 1; } static int cipher_hw_aes_xts_rv64i_zvkned_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_AES_XTS_CTX *xctx = (PROV_AES_XTS_CTX *)ctx; OSSL_xts_stream_fn stream_enc = NULL; OSSL_xts_stream_fn stream_dec = NULL; /* Zvkned only supports 128 and 256 bit keys. */ if (keylen * 8 == 128 * 2 || keylen * 8 == 256 * 2) { XTS_SET_KEY_FN(rv64i_zvkned_set_encrypt_key, rv64i_zvkned_set_decrypt_key, rv64i_zvkned_encrypt, rv64i_zvkned_decrypt, stream_enc, stream_dec); } else { XTS_SET_KEY_FN(AES_set_encrypt_key, AES_set_encrypt_key, rv64i_zvkned_encrypt, rv64i_zvkned_decrypt, stream_enc, stream_dec); } return 1; } # define PROV_CIPHER_HW_declare_xts() \ static const PROV_CIPHER_HW aes_xts_rv64i_zknd_zkne = { \ cipher_hw_aes_xts_rv64i_zknd_zkne_initkey, \ NULL, \ cipher_hw_aes_xts_copyctx \ }; \ static const PROV_CIPHER_HW aes_xts_rv64i_zvkned = { \ cipher_hw_aes_xts_rv64i_zvkned_initkey, \ NULL, \ cipher_hw_aes_xts_copyctx \ }; \ static const PROV_CIPHER_HW aes_xts_rv64i_zvbb_zvkg_zvkned = { \ cipher_hw_aes_xts_rv64i_zvbb_zvkg_zvkned_initkey, \ NULL, \ cipher_hw_aes_xts_copyctx \ }; # define PROV_CIPHER_HW_select_xts() \ if (RISCV_HAS_ZVBB() && RISCV_HAS_ZVKG() && RISCV_HAS_ZVKNED() && \ riscv_vlen() >= 128) \ return &aes_xts_rv64i_zvbb_zvkg_zvkned; \ if (RISCV_HAS_ZVKNED() && riscv_vlen() >= 128) \ return &aes_xts_rv64i_zvkned; \ else if (RISCV_HAS_ZKND_AND_ZKNE()) \ return &aes_xts_rv64i_zknd_zkne; #elif defined(__riscv) && __riscv_xlen == 32 static int cipher_hw_aes_xts_rv32i_zknd_zkne_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_AES_XTS_CTX *xctx = (PROV_AES_XTS_CTX *)ctx; XTS_SET_KEY_FN(rv32i_zkne_set_encrypt_key, rv32i_zknd_zkne_set_decrypt_key, rv32i_zkne_encrypt, rv32i_zknd_decrypt, NULL, NULL); return 1; } static int cipher_hw_aes_xts_rv32i_zbkb_zknd_zkne_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_AES_XTS_CTX *xctx = (PROV_AES_XTS_CTX *)ctx; XTS_SET_KEY_FN(rv32i_zbkb_zkne_set_encrypt_key, rv32i_zbkb_zknd_zkne_set_decrypt_key, rv32i_zkne_encrypt, rv32i_zknd_decrypt, NULL, NULL); return 1; } # define PROV_CIPHER_HW_declare_xts() \ static const PROV_CIPHER_HW aes_xts_rv32i_zknd_zkne = { \ cipher_hw_aes_xts_rv32i_zknd_zkne_initkey, \ NULL, \ cipher_hw_aes_xts_copyctx \ }; \ static const PROV_CIPHER_HW aes_xts_rv32i_zbkb_zknd_zkne = { \ cipher_hw_aes_xts_rv32i_zbkb_zknd_zkne_initkey, \ NULL, \ cipher_hw_aes_xts_copyctx \ }; # define PROV_CIPHER_HW_select_xts() \ if (RISCV_HAS_ZBKB_AND_ZKND_AND_ZKNE()) \ return &aes_xts_rv32i_zbkb_zknd_zkne; \ if (RISCV_HAS_ZKND_AND_ZKNE()) \ return &aes_xts_rv32i_zknd_zkne; # else /* The generic case */ # define PROV_CIPHER_HW_declare_xts() # define PROV_CIPHER_HW_select_xts() #endif static const PROV_CIPHER_HW aes_generic_xts = { cipher_hw_aes_xts_generic_initkey, NULL, cipher_hw_aes_xts_copyctx }; PROV_CIPHER_HW_declare_xts() const PROV_CIPHER_HW *ossl_prov_cipher_hw_aes_xts(size_t keybits) { PROV_CIPHER_HW_select_xts() return &aes_generic_xts; }
./openssl/providers/implementations/ciphers/cipher_rc2.h
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/rc2.h> #include "prov/ciphercommon.h" typedef struct prov_rc2_ctx_st { PROV_CIPHER_CTX base; /* Must be first */ union { OSSL_UNION_ALIGN; RC2_KEY ks; } ks; size_t key_bits; } PROV_RC2_CTX; #define ossl_prov_cipher_hw_rc2_ofb128 ossl_prov_cipher_hw_rc2_ofb64 #define ossl_prov_cipher_hw_rc2_cfb128 ossl_prov_cipher_hw_rc2_cfb64 const PROV_CIPHER_HW *ossl_prov_cipher_hw_rc2_cbc(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_rc2_ecb(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_rc2_ofb64(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_rc2_cfb64(size_t keybits);
./openssl/providers/implementations/ciphers/cipher_chacha20.h
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "include/crypto/chacha.h" #include "prov/ciphercommon.h" typedef struct { PROV_CIPHER_CTX base; /* must be first */ union { OSSL_UNION_ALIGN; unsigned int d[CHACHA_KEY_SIZE / 4]; } key; unsigned int counter[CHACHA_CTR_SIZE / 4]; unsigned char buf[CHACHA_BLK_SIZE]; unsigned int partial_len; } PROV_CHACHA20_CTX; typedef struct prov_cipher_hw_chacha20_st { PROV_CIPHER_HW base; /* must be first */ int (*initiv)(PROV_CIPHER_CTX *ctx); } PROV_CIPHER_HW_CHACHA20; const PROV_CIPHER_HW *ossl_prov_cipher_hw_chacha20(size_t keybits); OSSL_FUNC_cipher_encrypt_init_fn ossl_chacha20_einit; OSSL_FUNC_cipher_decrypt_init_fn ossl_chacha20_dinit; void ossl_chacha20_initctx(PROV_CHACHA20_CTX *ctx);
./openssl/providers/implementations/ciphers/cipher_chacha20.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for chacha20 cipher */ #include <openssl/proverr.h> #include "cipher_chacha20.h" #include "prov/implementations.h" #include "prov/providercommon.h" #define CHACHA20_KEYLEN (CHACHA_KEY_SIZE) #define CHACHA20_BLKLEN (1) #define CHACHA20_IVLEN (CHACHA_CTR_SIZE) #define CHACHA20_FLAGS (PROV_CIPHER_FLAG_CUSTOM_IV) static OSSL_FUNC_cipher_newctx_fn chacha20_newctx; static OSSL_FUNC_cipher_freectx_fn chacha20_freectx; static OSSL_FUNC_cipher_dupctx_fn chacha20_dupctx; static OSSL_FUNC_cipher_get_params_fn chacha20_get_params; static OSSL_FUNC_cipher_get_ctx_params_fn chacha20_get_ctx_params; static OSSL_FUNC_cipher_set_ctx_params_fn chacha20_set_ctx_params; static OSSL_FUNC_cipher_gettable_ctx_params_fn chacha20_gettable_ctx_params; static OSSL_FUNC_cipher_settable_ctx_params_fn chacha20_settable_ctx_params; #define chacha20_cipher ossl_cipher_generic_cipher #define chacha20_update ossl_cipher_generic_stream_update #define chacha20_final ossl_cipher_generic_stream_final #define chacha20_gettable_params ossl_cipher_generic_gettable_params void ossl_chacha20_initctx(PROV_CHACHA20_CTX *ctx) { ossl_cipher_generic_initkey(ctx, CHACHA20_KEYLEN * 8, CHACHA20_BLKLEN * 8, CHACHA20_IVLEN * 8, 0, CHACHA20_FLAGS, ossl_prov_cipher_hw_chacha20(CHACHA20_KEYLEN * 8), NULL); } static void *chacha20_newctx(void *provctx) { PROV_CHACHA20_CTX *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) ossl_chacha20_initctx(ctx); return ctx; } static void chacha20_freectx(void *vctx) { PROV_CHACHA20_CTX *ctx = (PROV_CHACHA20_CTX *)vctx; if (ctx != NULL) { ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } } static void *chacha20_dupctx(void *vctx) { PROV_CHACHA20_CTX *ctx = (PROV_CHACHA20_CTX *)vctx; PROV_CHACHA20_CTX *dupctx = NULL; if (ctx != NULL) { dupctx = OPENSSL_memdup(ctx, sizeof(*dupctx)); if (dupctx != NULL && dupctx->base.tlsmac != NULL && dupctx->base.alloced) { dupctx->base.tlsmac = OPENSSL_memdup(dupctx->base.tlsmac, dupctx->base.tlsmacsize); if (dupctx->base.tlsmac == NULL) { OPENSSL_free(dupctx); dupctx = NULL; } } } return dupctx; } static int chacha20_get_params(OSSL_PARAM params[]) { return ossl_cipher_generic_get_params(params, 0, CHACHA20_FLAGS, CHACHA20_KEYLEN * 8, CHACHA20_BLKLEN * 8, CHACHA20_IVLEN * 8); } static int chacha20_get_ctx_params(void *vctx, OSSL_PARAM params[]) { OSSL_PARAM *p; p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IVLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, CHACHA20_IVLEN)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, CHACHA20_KEYLEN)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } return 1; } static const OSSL_PARAM chacha20_known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL), OSSL_PARAM_END }; const OSSL_PARAM *chacha20_gettable_ctx_params(ossl_unused void *cctx, ossl_unused void *provctx) { return chacha20_known_gettable_ctx_params; } static int chacha20_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { const OSSL_PARAM *p; size_t len; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL) { if (!OSSL_PARAM_get_size_t(p, &len)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (len != CHACHA20_KEYLEN) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_IVLEN); if (p != NULL) { if (!OSSL_PARAM_get_size_t(p, &len)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (len != CHACHA20_IVLEN) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH); return 0; } } return 1; } static const OSSL_PARAM chacha20_known_settable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL), OSSL_PARAM_END }; const OSSL_PARAM *chacha20_settable_ctx_params(ossl_unused void *cctx, ossl_unused void *provctx) { return chacha20_known_settable_ctx_params; } int ossl_chacha20_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { int ret; /* The generic function checks for ossl_prov_is_running() */ ret = ossl_cipher_generic_einit(vctx, key, keylen, iv, ivlen, NULL); if (ret && iv != NULL) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; PROV_CIPHER_HW_CHACHA20 *hw = (PROV_CIPHER_HW_CHACHA20 *)ctx->hw; hw->initiv(ctx); } if (ret && !chacha20_set_ctx_params(vctx, params)) ret = 0; return ret; } int ossl_chacha20_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { int ret; /* The generic function checks for ossl_prov_is_running() */ ret = ossl_cipher_generic_dinit(vctx, key, keylen, iv, ivlen, NULL); if (ret && iv != NULL) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; PROV_CIPHER_HW_CHACHA20 *hw = (PROV_CIPHER_HW_CHACHA20 *)ctx->hw; hw->initiv(ctx); } if (ret && !chacha20_set_ctx_params(vctx, params)) ret = 0; return ret; } /* ossl_chacha20_functions */ const OSSL_DISPATCH ossl_chacha20_functions[] = { { OSSL_FUNC_CIPHER_NEWCTX, (void (*)(void))chacha20_newctx }, { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))chacha20_freectx }, { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))chacha20_dupctx }, { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))ossl_chacha20_einit }, { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))ossl_chacha20_dinit }, { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))chacha20_update }, { OSSL_FUNC_CIPHER_FINAL, (void (*)(void))chacha20_final }, { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))chacha20_cipher}, { OSSL_FUNC_CIPHER_GET_PARAMS, (void (*)(void))chacha20_get_params }, { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, (void (*)(void))chacha20_gettable_params }, { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, (void (*)(void))chacha20_get_ctx_params }, { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, (void (*)(void))chacha20_gettable_ctx_params }, { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, (void (*)(void))chacha20_set_ctx_params }, { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, (void (*)(void))chacha20_settable_ctx_params }, OSSL_DISPATCH_END };
./openssl/providers/implementations/ciphers/cipher_rc5.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for RC5 cipher modes ecb, cbc, ofb, cfb */ /* * RC5 low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include <openssl/proverr.h> #include "cipher_rc5.h" #include "prov/implementations.h" #include "prov/providercommon.h" #define RC5_FLAGS PROV_CIPHER_FLAG_VARIABLE_LENGTH static OSSL_FUNC_cipher_encrypt_init_fn rc5_einit; static OSSL_FUNC_cipher_decrypt_init_fn rc5_dinit; static OSSL_FUNC_cipher_freectx_fn rc5_freectx; static OSSL_FUNC_cipher_dupctx_fn rc5_dupctx; OSSL_FUNC_cipher_gettable_ctx_params_fn rc5_gettable_ctx_params; OSSL_FUNC_cipher_settable_ctx_params_fn rc5_settable_ctx_params; static OSSL_FUNC_cipher_set_ctx_params_fn rc5_set_ctx_params; static void rc5_freectx(void *vctx) { PROV_RC5_CTX *ctx = (PROV_RC5_CTX *)vctx; ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } static void *rc5_dupctx(void *ctx) { PROV_RC5_CTX *in = (PROV_RC5_CTX *)ctx; PROV_RC5_CTX *ret; if (!ossl_prov_is_running()) return NULL; ret = OPENSSL_malloc(sizeof(*ret)); if (ret == NULL) return NULL; *ret = *in; return ret; } static int rc5_einit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL)) return 0; return rc5_set_ctx_params(ctx, params); } static int rc5_dinit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL)) return 0; return rc5_set_ctx_params(ctx, params); } static int rc5_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { PROV_RC5_CTX *ctx = (PROV_RC5_CTX *)vctx; const OSSL_PARAM *p; if (params == NULL) return 1; if (!ossl_cipher_var_keylen_set_ctx_params(vctx, params)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_ROUNDS); if (p != NULL) { unsigned int rounds; if (!OSSL_PARAM_get_uint(p, &rounds)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (rounds != RC5_8_ROUNDS && rounds != RC5_12_ROUNDS && rounds != RC5_16_ROUNDS) { ERR_raise(ERR_LIB_PROV, PROV_R_UNSUPPORTED_NUMBER_OF_ROUNDS); return 0; } ctx->rounds = rounds; } return 1; } CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_START(rc5) OSSL_PARAM_uint(OSSL_CIPHER_PARAM_ROUNDS, NULL), CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_END(rc5) CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_START(rc5) OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), OSSL_PARAM_uint(OSSL_CIPHER_PARAM_ROUNDS, NULL), CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_END(rc5) static int rc5_get_ctx_params(void *vctx, OSSL_PARAM params[]) { PROV_RC5_CTX *ctx = (PROV_RC5_CTX *)vctx; OSSL_PARAM *p; if (!ossl_cipher_generic_get_ctx_params(vctx, params)) return 0; p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_ROUNDS); if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->rounds)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } return 1; } #define IMPLEMENT_cipher(alg, UCALG, lcmode, UCMODE, flags, kbits, \ blkbits, ivbits, typ) \ static OSSL_FUNC_cipher_get_params_fn alg##_##kbits##_##lcmode##_get_params; \ static int alg##_##kbits##_##lcmode##_get_params(OSSL_PARAM params[]) \ { \ return ossl_cipher_generic_get_params(params, EVP_CIPH_##UCMODE##_MODE, \ flags, kbits, blkbits, ivbits); \ } \ static OSSL_FUNC_cipher_newctx_fn alg##_##kbits##_##lcmode##_newctx; \ static void *alg##_##kbits##_##lcmode##_newctx(void *provctx) \ { \ PROV_##UCALG##_CTX *ctx; \ if (!ossl_prov_is_running()) \ return NULL; \ ctx = OPENSSL_zalloc(sizeof(*ctx)); \ if (ctx != NULL) { \ ossl_cipher_generic_initkey(ctx, kbits, blkbits, ivbits, \ EVP_CIPH_##UCMODE##_MODE, flags, \ ossl_prov_cipher_hw_##alg##_##lcmode(kbits),\ NULL); \ ctx->rounds = RC5_12_ROUNDS; \ } \ return ctx; \ } \ const OSSL_DISPATCH ossl_##alg##kbits##lcmode##_functions[] = { \ { OSSL_FUNC_CIPHER_NEWCTX, \ (void (*)(void)) alg##_##kbits##_##lcmode##_newctx }, \ { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void)) alg##_freectx }, \ { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void)) alg##_dupctx }, \ { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))rc5_einit }, \ { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))rc5_dinit }, \ { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))ossl_cipher_generic_##typ##_update },\ { OSSL_FUNC_CIPHER_FINAL, (void (*)(void))ossl_cipher_generic_##typ##_final }, \ { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))ossl_cipher_generic_cipher }, \ { OSSL_FUNC_CIPHER_GET_PARAMS, \ (void (*)(void)) alg##_##kbits##_##lcmode##_get_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_params }, \ { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, \ (void (*)(void))rc5_get_ctx_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, \ (void (*)(void))rc5_gettable_ctx_params }, \ { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, \ (void (*)(void))rc5_set_ctx_params }, \ { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, \ (void (*)(void))rc5_settable_ctx_params }, \ OSSL_DISPATCH_END \ }; /* ossl_rc5128ecb_functions */ IMPLEMENT_cipher(rc5, RC5, ecb, ECB, RC5_FLAGS, 128, 64, 0, block) /* ossl_rc5128cbc_functions */ IMPLEMENT_cipher(rc5, RC5, cbc, CBC, RC5_FLAGS, 128, 64, 64, block) /* ossl_rc5128ofb64_functions */ IMPLEMENT_cipher(rc5, RC5, ofb64, OFB, RC5_FLAGS, 128, 8, 64, stream) /* ossl_rc5128cfb64_functions */ IMPLEMENT_cipher(rc5, RC5, cfb64, CFB, RC5_FLAGS, 128, 8, 64, stream)
./openssl/providers/implementations/ciphers/cipher_seed_hw.c
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * SEED low level APIs are deprecated for public use, but still ok for * internal use. */ #include "internal/deprecated.h" #include "cipher_seed.h" static int cipher_hw_seed_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_SEED_CTX *sctx = (PROV_SEED_CTX *)ctx; SEED_set_key(key, &(sctx->ks.ks)); return 1; } # define PROV_CIPHER_HW_seed_mode(mode, UCMODE) \ IMPLEMENT_CIPHER_HW_##UCMODE(mode, seed, PROV_SEED_CTX, SEED_KEY_SCHEDULE, \ SEED_##mode) \ static const PROV_CIPHER_HW seed_##mode = { \ cipher_hw_seed_initkey, \ cipher_hw_seed_##mode##_cipher \ }; \ const PROV_CIPHER_HW *ossl_prov_cipher_hw_seed_##mode(size_t keybits) \ { \ return &seed_##mode; \ } PROV_CIPHER_HW_seed_mode(cbc, CBC) PROV_CIPHER_HW_seed_mode(ecb, ECB) PROV_CIPHER_HW_seed_mode(ofb128, OFB) PROV_CIPHER_HW_seed_mode(cfb128, CFB)
./openssl/providers/implementations/ciphers/cipher_rc4_hmac_md5.h
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/rc4.h> #include <openssl/md5.h> #include "prov/ciphercommon.h" typedef struct prov_rc4_hmac_md5_ctx_st { PROV_CIPHER_CTX base; /* Must be first */ union { OSSL_UNION_ALIGN; RC4_KEY ks; } ks; MD5_CTX head, tail, md; size_t payload_length; size_t tls_aad_pad_sz; } PROV_RC4_HMAC_MD5_CTX; typedef struct prov_cipher_hw_rc4_hmac_md5_st { PROV_CIPHER_HW base; /* Must be first */ int (*tls_init)(PROV_CIPHER_CTX *ctx, unsigned char *aad, size_t aad_len); void (*init_mackey)(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t len); } PROV_CIPHER_HW_RC4_HMAC_MD5; const PROV_CIPHER_HW *ossl_prov_cipher_hw_rc4_hmac_md5(size_t keybits); void rc4_md5_enc(RC4_KEY *key, const void *in0, void *out, MD5_CTX *ctx, const void *inp, size_t blocks);
./openssl/providers/implementations/ciphers/cipher_des.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * DES low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include <openssl/rand.h> #include <openssl/proverr.h> #include "prov/ciphercommon.h" #include "cipher_des.h" #include "prov/implementations.h" #include "prov/providercommon.h" #define DES_FLAGS PROV_CIPHER_FLAG_RAND_KEY static OSSL_FUNC_cipher_freectx_fn des_freectx; static OSSL_FUNC_cipher_encrypt_init_fn des_einit; static OSSL_FUNC_cipher_decrypt_init_fn des_dinit; static OSSL_FUNC_cipher_get_ctx_params_fn des_get_ctx_params; static OSSL_FUNC_cipher_gettable_ctx_params_fn des_gettable_ctx_params; static void *des_newctx(void *provctx, size_t kbits, size_t blkbits, size_t ivbits, unsigned int mode, uint64_t flags, const PROV_CIPHER_HW *hw) { PROV_DES_CTX *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) ossl_cipher_generic_initkey(ctx, kbits, blkbits, ivbits, mode, flags, hw, provctx); return ctx; } static void *des_dupctx(void *ctx) { PROV_DES_CTX *in = (PROV_DES_CTX *)ctx; PROV_DES_CTX *ret; if (!ossl_prov_is_running()) return NULL; ret = OPENSSL_malloc(sizeof(*ret)); if (ret == NULL) return NULL; in->base.hw->copyctx(&ret->base, &in->base); return ret; } static void des_freectx(void *vctx) { PROV_DES_CTX *ctx = (PROV_DES_CTX *)vctx; ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } static int des_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; if (!ossl_prov_is_running()) return 0; ctx->num = 0; ctx->bufsz = 0; ctx->enc = enc; if (iv != NULL) { if (!ossl_cipher_generic_initiv(ctx, iv, ivlen)) return 0; } else if (ctx->iv_set) { /* reset IV to keep compatibility with 1.1.1 */ memcpy(ctx->iv, ctx->oiv, ctx->ivlen); } if (key != NULL) { if (keylen != ctx->keylen) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } if (!ctx->hw->init(ctx, key, keylen)) return 0; ctx->key_set = 1; } return ossl_cipher_generic_set_ctx_params(ctx, params); } static int des_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return des_init(vctx, key, keylen, iv, ivlen, params, 1); } static int des_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return des_init(vctx, key, keylen, iv, ivlen, params, 0); } static int des_generatekey(PROV_CIPHER_CTX *ctx, void *ptr) { DES_cblock *deskey = ptr; size_t kl = ctx->keylen; if (kl == 0 || RAND_priv_bytes_ex(ctx->libctx, ptr, kl, 0) <= 0) return 0; DES_set_odd_parity(deskey); return 1; } CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_START(des) OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_RANDOM_KEY, NULL, 0), CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_END(des) static int des_get_ctx_params(void *vctx, OSSL_PARAM params[]) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; OSSL_PARAM *p; if (!ossl_cipher_generic_get_ctx_params(vctx, params)) return 0; p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_RANDOM_KEY); if (p != NULL && !des_generatekey(ctx, p->data)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GENERATE_KEY); return 0; } return 1; } #define IMPLEMENT_des_cipher(type, lcmode, UCMODE, flags, \ kbits, blkbits, ivbits, block) \ static OSSL_FUNC_cipher_newctx_fn type##_##lcmode##_newctx; \ static void *des_##lcmode##_newctx(void *provctx) \ { \ return des_newctx(provctx, kbits, blkbits, ivbits, \ EVP_CIPH_##UCMODE##_MODE, flags, \ ossl_prov_cipher_hw_des_##lcmode()); \ } \ static OSSL_FUNC_cipher_get_params_fn des_##lcmode##_get_params; \ static int des_##lcmode##_get_params(OSSL_PARAM params[]) \ { \ return ossl_cipher_generic_get_params(params, EVP_CIPH_##UCMODE##_MODE, \ flags, kbits, blkbits, ivbits); \ } \ const OSSL_DISPATCH ossl_##des_##lcmode##_functions[] = { \ { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))des_einit }, \ { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))des_dinit }, \ { OSSL_FUNC_CIPHER_UPDATE, \ (void (*)(void))ossl_cipher_generic_##block##_update }, \ { OSSL_FUNC_CIPHER_FINAL, (void (*)(void))ossl_cipher_generic_##block##_final },\ { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))ossl_cipher_generic_cipher }, \ { OSSL_FUNC_CIPHER_NEWCTX, \ (void (*)(void))des_##lcmode##_newctx }, \ { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))des_dupctx }, \ { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))des_freectx }, \ { OSSL_FUNC_CIPHER_GET_PARAMS, \ (void (*)(void))des_##lcmode##_get_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_params }, \ { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, (void (*)(void))des_get_ctx_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, \ (void (*)(void))des_gettable_ctx_params }, \ { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_set_ctx_params }, \ { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_settable_ctx_params }, \ OSSL_DISPATCH_END \ } /* ossl_des_ecb_functions */ IMPLEMENT_des_cipher(des, ecb, ECB, DES_FLAGS, 64, 64, 0, block); /* ossl_des_cbc_functions */ IMPLEMENT_des_cipher(des, cbc, CBC, DES_FLAGS, 64, 64, 64, block); /* ossl_des_ofb64_functions */ IMPLEMENT_des_cipher(des, ofb64, OFB, DES_FLAGS, 64, 8, 64, stream); /* ossl_des_cfb64_functions */ IMPLEMENT_des_cipher(des, cfb64, CFB, DES_FLAGS, 64, 8, 64, stream); /* ossl_des_cfb1_functions */ IMPLEMENT_des_cipher(des, cfb1, CFB, DES_FLAGS, 64, 8, 64, stream); /* ossl_des_cfb8_functions */ IMPLEMENT_des_cipher(des, cfb8, CFB, DES_FLAGS, 64, 8, 64, stream);
./openssl/providers/implementations/ciphers/cipher_idea.h
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/idea.h> #include "prov/ciphercommon.h" typedef struct prov_idea_ctx_st { PROV_CIPHER_CTX base; /* Must be first */ union { OSSL_UNION_ALIGN; IDEA_KEY_SCHEDULE ks; } ks; } PROV_IDEA_CTX; const PROV_CIPHER_HW *ossl_prov_cipher_hw_idea_cbc(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_idea_ecb(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_idea_ofb64(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_idea_cfb64(size_t keybits);
./openssl/providers/implementations/ciphers/cipher_sm4_ccm.c
/* * Copyright 2021-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for SM4 CCM mode */ #include "cipher_sm4_ccm.h" #include "prov/implementations.h" #include "prov/providercommon.h" static OSSL_FUNC_cipher_freectx_fn sm4_ccm_freectx; static void *sm4_ccm_newctx(void *provctx, size_t keybits) { PROV_SM4_CCM_CTX *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) ossl_ccm_initctx(&ctx->base, keybits, ossl_prov_sm4_hw_ccm(keybits)); return ctx; } static void *sm4_ccm_dupctx(void *provctx) { PROV_SM4_CCM_CTX *ctx = provctx; PROV_SM4_CCM_CTX *dctx = NULL; if (ctx == NULL) return NULL; dctx = OPENSSL_memdup(ctx, sizeof(*ctx)); if (dctx != NULL && dctx->base.ccm_ctx.key != NULL) dctx->base.ccm_ctx.key = &dctx->ks.ks; return dctx; } static void sm4_ccm_freectx(void *vctx) { PROV_SM4_CCM_CTX *ctx = (PROV_SM4_CCM_CTX *)vctx; OPENSSL_clear_free(ctx, sizeof(*ctx)); } /* sm4128ccm functions */ IMPLEMENT_aead_cipher(sm4, ccm, CCM, AEAD_FLAGS, 128, 8, 96);
./openssl/providers/implementations/ciphers/ciphercommon_ccm_hw.c
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "prov/ciphercommon.h" #include "prov/ciphercommon_ccm.h" int ossl_ccm_generic_setiv(PROV_CCM_CTX *ctx, const unsigned char *nonce, size_t nlen, size_t mlen) { return CRYPTO_ccm128_setiv(&ctx->ccm_ctx, nonce, nlen, mlen) == 0; } int ossl_ccm_generic_setaad(PROV_CCM_CTX *ctx, const unsigned char *aad, size_t alen) { CRYPTO_ccm128_aad(&ctx->ccm_ctx, aad, alen); return 1; } int ossl_ccm_generic_gettag(PROV_CCM_CTX *ctx, unsigned char *tag, size_t tlen) { return CRYPTO_ccm128_tag(&ctx->ccm_ctx, tag, tlen) > 0; } int ossl_ccm_generic_auth_encrypt(PROV_CCM_CTX *ctx, const unsigned char *in, unsigned char *out, size_t len, unsigned char *tag, size_t taglen) { int rv; if (ctx->str != NULL) rv = CRYPTO_ccm128_encrypt_ccm64(&ctx->ccm_ctx, in, out, len, ctx->str) == 0; else rv = CRYPTO_ccm128_encrypt(&ctx->ccm_ctx, in, out, len) == 0; if (rv == 1 && tag != NULL) rv = (CRYPTO_ccm128_tag(&ctx->ccm_ctx, tag, taglen) > 0); return rv; } int ossl_ccm_generic_auth_decrypt(PROV_CCM_CTX *ctx, const unsigned char *in, unsigned char *out, size_t len, unsigned char *expected_tag, size_t taglen) { int rv = 0; if (ctx->str != NULL) rv = CRYPTO_ccm128_decrypt_ccm64(&ctx->ccm_ctx, in, out, len, ctx->str) == 0; else rv = CRYPTO_ccm128_decrypt(&ctx->ccm_ctx, in, out, len) == 0; if (rv) { unsigned char tag[16]; if (!CRYPTO_ccm128_tag(&ctx->ccm_ctx, tag, taglen) || CRYPTO_memcmp(tag, expected_tag, taglen) != 0) rv = 0; } if (rv == 0) OPENSSL_cleanse(out, len); return rv; }
./openssl/providers/implementations/ciphers/cipher_des_hw.c
/* * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * DES low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include "prov/ciphercommon.h" #include "cipher_des.h" static int cipher_hw_des_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_DES_CTX *dctx = (PROV_DES_CTX *)ctx; DES_cblock *deskey = (DES_cblock *)key; DES_key_schedule *ks = &dctx->dks.ks; dctx->dstream.cbc = NULL; #if defined(SPARC_DES_CAPABLE) if (SPARC_DES_CAPABLE) { if (ctx->mode == EVP_CIPH_CBC_MODE) { des_t4_key_expand(&deskey[0], ks); dctx->dstream.cbc = ctx->enc ? des_t4_cbc_encrypt : des_t4_cbc_decrypt; return 1; } } #endif DES_set_key_unchecked(deskey, ks); return 1; } static void cipher_hw_des_copyctx(PROV_CIPHER_CTX *dst, const PROV_CIPHER_CTX *src) { PROV_DES_CTX *sctx = (PROV_DES_CTX *)src; PROV_DES_CTX *dctx = (PROV_DES_CTX *)dst; *dctx = *sctx; dst->ks = &dctx->dks.ks; } static int cipher_hw_des_ecb_cipher(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t len) { size_t i, bl = ctx->blocksize; DES_key_schedule *key = &(((PROV_DES_CTX *)ctx)->dks.ks); if (len < bl) return 1; for (i = 0, len -= bl; i <= len; i += bl) DES_ecb_encrypt((const_DES_cblock *)(in + i), (const_DES_cblock *)(out + i), key, ctx->enc); return 1; } static int cipher_hw_des_cbc_cipher(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t len) { PROV_DES_CTX *dctx = (PROV_DES_CTX *)ctx; DES_key_schedule *key = &(dctx->dks.ks); if (dctx->dstream.cbc != NULL) { (*dctx->dstream.cbc) (in, out, len, key, ctx->iv); return 1; } while (len >= MAXCHUNK) { DES_ncbc_encrypt(in, out, MAXCHUNK, key, (DES_cblock *)ctx->iv, ctx->enc); len -= MAXCHUNK; in += MAXCHUNK; out += MAXCHUNK; } if (len > 0) DES_ncbc_encrypt(in, out, (long)len, key, (DES_cblock *)ctx->iv, ctx->enc); return 1; } static int cipher_hw_des_ofb64_cipher(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t len) { int num = ctx->num; DES_key_schedule *key = &(((PROV_DES_CTX *)ctx)->dks.ks); while (len >= MAXCHUNK) { DES_ofb64_encrypt(in, out, MAXCHUNK, key, (DES_cblock *)ctx->iv, &num); len -= MAXCHUNK; in += MAXCHUNK; out += MAXCHUNK; } if (len > 0) { DES_ofb64_encrypt(in, out, (long)len, key, (DES_cblock *)ctx->iv, &num); } ctx->num = num; return 1; } static int cipher_hw_des_cfb64_cipher(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t len) { size_t chunk = MAXCHUNK; DES_key_schedule *key = &(((PROV_DES_CTX *)ctx)->dks.ks); int num = ctx->num; if (len < chunk) chunk = len; while (len > 0 && len >= chunk) { DES_cfb64_encrypt(in, out, (long)chunk, key, (DES_cblock *)ctx->iv, &num, ctx->enc); len -= chunk; in += chunk; out += chunk; if (len < chunk) chunk = len; } ctx->num = num; return 1; } /* * Although we have a CFB-r implementation for DES, it doesn't pack the right * way, so wrap it here */ static int cipher_hw_des_cfb1_cipher(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { size_t n, chunk = MAXCHUNK / 8; DES_key_schedule *key = &(((PROV_DES_CTX *)ctx)->dks.ks); unsigned char c[1]; unsigned char d[1] = { 0 }; if (inl < chunk) chunk = inl; while (inl && inl >= chunk) { for (n = 0; n < chunk * 8; ++n) { c[0] = (in[n / 8] & (1 << (7 - n % 8))) ? 0x80 : 0; DES_cfb_encrypt(c, d, 1, 1, key, (DES_cblock *)ctx->iv, ctx->enc); out[n / 8] = (out[n / 8] & ~(0x80 >> (unsigned int)(n % 8))) | ((d[0] & 0x80) >> (unsigned int)(n % 8)); } inl -= chunk; in += chunk; out += chunk; if (inl < chunk) chunk = inl; } return 1; } static int cipher_hw_des_cfb8_cipher(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { DES_key_schedule *key = &(((PROV_DES_CTX *)ctx)->dks.ks); while (inl >= MAXCHUNK) { DES_cfb_encrypt(in, out, 8, (long)MAXCHUNK, key, (DES_cblock *)ctx->iv, ctx->enc); inl -= MAXCHUNK; in += MAXCHUNK; out += MAXCHUNK; } if (inl > 0) DES_cfb_encrypt(in, out, 8, (long)inl, key, (DES_cblock *)ctx->iv, ctx->enc); return 1; } #define PROV_CIPHER_HW_des_mode(mode) \ static const PROV_CIPHER_HW des_##mode = { \ cipher_hw_des_initkey, \ cipher_hw_des_##mode##_cipher, \ cipher_hw_des_copyctx \ }; \ const PROV_CIPHER_HW *ossl_prov_cipher_hw_des_##mode(void) \ { \ return &des_##mode; \ } PROV_CIPHER_HW_des_mode(ecb) PROV_CIPHER_HW_des_mode(cbc) PROV_CIPHER_HW_des_mode(ofb64) PROV_CIPHER_HW_des_mode(cfb64) PROV_CIPHER_HW_des_mode(cfb1) PROV_CIPHER_HW_des_mode(cfb8)