file_path
stringlengths
19
75
code
stringlengths
279
1.37M
./openssl/providers/implementations/ciphers/cipher_idea_hw.c
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * IDEA low level APIs are deprecated for public use, but still ok for internal * use where we're using them to implement the higher level EVP interface, as is * the case here. */ #include "internal/deprecated.h" #include "cipher_idea.h" static int cipher_hw_idea_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_IDEA_CTX *ictx = (PROV_IDEA_CTX *)ctx; IDEA_KEY_SCHEDULE *ks = &(ictx->ks.ks); if (ctx->enc || ctx->mode == EVP_CIPH_OFB_MODE || ctx->mode == EVP_CIPH_CFB_MODE) { IDEA_set_encrypt_key(key, ks); } else { IDEA_KEY_SCHEDULE tmp; IDEA_set_encrypt_key(key, &tmp); IDEA_set_decrypt_key(&tmp, ks); OPENSSL_cleanse((unsigned char *)&tmp, sizeof(IDEA_KEY_SCHEDULE)); } return 1; } # define PROV_CIPHER_HW_idea_mode_ex(mode, UCMODE, fname) \ IMPLEMENT_CIPHER_HW_##UCMODE(mode, idea, PROV_IDEA_CTX, IDEA_KEY_SCHEDULE, \ fname) \ static const PROV_CIPHER_HW idea_##mode = { \ cipher_hw_idea_initkey, \ cipher_hw_idea_##mode##_cipher \ }; \ const PROV_CIPHER_HW *ossl_prov_cipher_hw_idea_##mode(size_t keybits) \ { \ return &idea_##mode; \ } # define PROV_CIPHER_HW_idea_mode(mode, UCMODE) \ PROV_CIPHER_HW_idea_mode_ex(mode, UCMODE, IDEA_##mode) PROV_CIPHER_HW_idea_mode(cbc, CBC) PROV_CIPHER_HW_idea_mode(ofb64, OFB) PROV_CIPHER_HW_idea_mode(cfb64, CFB) /* * IDEA_ecb_encrypt() does not have a enc parameter - so we create a macro * that ignores this parameter when IMPLEMENT_CIPHER_HW_ecb() is called. */ #define IDEA2_ecb_encrypt(in, out, ks, enc) IDEA_ecb_encrypt(in, out, ks) PROV_CIPHER_HW_idea_mode_ex(ecb, ECB, IDEA2_ecb)
./openssl/providers/implementations/ciphers/cipher_aria_ccm_hw.c
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /*- * Generic support for ARIA CCM. */ #include "cipher_aria_ccm.h" static int ccm_aria_initkey(PROV_CCM_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_ARIA_CCM_CTX *actx = (PROV_ARIA_CCM_CTX *)ctx; ossl_aria_set_encrypt_key(key, keylen * 8, &actx->ks.ks); CRYPTO_ccm128_init(&ctx->ccm_ctx, ctx->m, ctx->l, &actx->ks.ks, (block128_f)ossl_aria_encrypt); ctx->str = NULL; ctx->key_set = 1; return 1; } static const PROV_CCM_HW ccm_aria = { ccm_aria_initkey, ossl_ccm_generic_setiv, ossl_ccm_generic_setaad, ossl_ccm_generic_auth_encrypt, ossl_ccm_generic_auth_decrypt, ossl_ccm_generic_gettag }; const PROV_CCM_HW *ossl_prov_aria_hw_ccm(size_t keybits) { return &ccm_aria; }
./openssl/providers/implementations/ciphers/cipher_tdes_wrap_hw.c
/* * Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * DES low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include "cipher_tdes_default.h" #define ossl_cipher_hw_tdes_wrap_initkey ossl_cipher_hw_tdes_ede3_initkey PROV_CIPHER_HW_tdes_mode(wrap, cbc)
./openssl/providers/implementations/ciphers/cipher_aes_xts.h
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/aes.h> #include "prov/ciphercommon.h" #include "crypto/aes_platform.h" /* * Available in cipher_fips.c, and compiled with different values depending * on we're in the FIPS module or not. */ extern const int ossl_aes_xts_allow_insecure_decrypt; PROV_CIPHER_FUNC(void, xts_stream, (const unsigned char *in, unsigned char *out, size_t len, const AES_KEY *key1, const AES_KEY *key2, const unsigned char iv[16])); typedef struct prov_aes_xts_ctx_st { PROV_CIPHER_CTX base; /* Must be first */ union { OSSL_UNION_ALIGN; AES_KEY ks; } ks1, ks2; /* AES key schedules to use */ XTS128_CONTEXT xts; OSSL_xts_stream_fn stream; } PROV_AES_XTS_CTX; const PROV_CIPHER_HW *ossl_prov_cipher_hw_aes_xts(size_t keybits);
./openssl/providers/implementations/ciphers/cipher_aes_gcm_siv_hw.c
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * AES low level APIs are deprecated for public use, but still ok for internal * use where we're using them to implement the higher level EVP interface, as is * the case here. */ #include "internal/deprecated.h" #include <openssl/evp.h> #include <internal/endian.h> #include <prov/implementations.h> #include "cipher_aes_gcm_siv.h" static int aes_gcm_siv_ctr32(PROV_AES_GCM_SIV_CTX *ctx, const unsigned char *init_counter, unsigned char *out, const unsigned char *in, size_t len); static int aes_gcm_siv_initkey(void *vctx) { PROV_AES_GCM_SIV_CTX *ctx = (PROV_AES_GCM_SIV_CTX *)vctx; uint8_t output[BLOCK_SIZE]; uint32_t counter = 0x0; size_t i; union { uint32_t counter; uint8_t block[BLOCK_SIZE]; } data; int out_len; EVP_CIPHER *ecb = NULL; DECLARE_IS_ENDIAN; switch (ctx->key_len) { case 16: ecb = EVP_CIPHER_fetch(ctx->libctx, "AES-128-ECB", NULL); break; case 24: ecb = EVP_CIPHER_fetch(ctx->libctx, "AES-192-ECB", NULL); break; case 32: ecb = EVP_CIPHER_fetch(ctx->libctx, "AES-256-ECB", NULL); break; default: goto err; } if (ctx->ecb_ctx == NULL && (ctx->ecb_ctx = EVP_CIPHER_CTX_new()) == NULL) goto err; if (!EVP_EncryptInit_ex2(ctx->ecb_ctx, ecb, ctx->key_gen_key, NULL, NULL)) goto err; memset(&data, 0, sizeof(data)); memcpy(&data.block[sizeof(data.counter)], ctx->nonce, NONCE_SIZE); /* msg_auth_key is always 16 bytes in size, regardless of AES128/AES256 */ /* counter is stored little-endian */ for (i = 0; i < BLOCK_SIZE; i += 8) { if (IS_LITTLE_ENDIAN) { data.counter = counter; } else { data.counter = GSWAP4(counter); } /* Block size is 16 (128 bits), but only 8 bytes are used */ out_len = BLOCK_SIZE; if (!EVP_EncryptUpdate(ctx->ecb_ctx, output, &out_len, data.block, BLOCK_SIZE)) goto err; memcpy(&ctx->msg_auth_key[i], output, 8); counter++; } /* msg_enc_key length is directly tied to key length AES128/AES256 */ for (i = 0; i < ctx->key_len; i += 8) { if (IS_LITTLE_ENDIAN) { data.counter = counter; } else { data.counter = GSWAP4(counter); } /* Block size is 16 bytes (128 bits), but only 8 bytes are used */ out_len = BLOCK_SIZE; if (!EVP_EncryptUpdate(ctx->ecb_ctx, output, &out_len, data.block, BLOCK_SIZE)) goto err; memcpy(&ctx->msg_enc_key[i], output, 8); counter++; } if (!EVP_EncryptInit_ex2(ctx->ecb_ctx, ecb, ctx->msg_enc_key, NULL, NULL)) goto err; /* Freshen up the state */ ctx->used_enc = 0; ctx->used_dec = 0; EVP_CIPHER_free(ecb); return 1; err: EVP_CIPHER_CTX_free(ctx->ecb_ctx); EVP_CIPHER_free(ecb); ctx->ecb_ctx = NULL; return 0; } static int aes_gcm_siv_aad(PROV_AES_GCM_SIV_CTX *ctx, const unsigned char *aad, size_t len) { size_t to_alloc; uint8_t *ptr; uint64_t len64; /* length of 0 resets the AAD */ if (len == 0) { OPENSSL_free(ctx->aad); ctx->aad = NULL; ctx->aad_len = 0; return 1; } to_alloc = UP16(ctx->aad_len + len); /* need to check the size of the AAD per RFC8452 */ len64 = to_alloc; if (len64 > ((uint64_t)1 << 36)) return 0; ptr = OPENSSL_realloc(ctx->aad, to_alloc); if (ptr == NULL) return 0; ctx->aad = ptr; memcpy(&ctx->aad[ctx->aad_len], aad, len); ctx->aad_len += len; if (to_alloc > ctx->aad_len) memset(&ctx->aad[ctx->aad_len], 0, to_alloc - ctx->aad_len); return 1; } static int aes_gcm_siv_finish(PROV_AES_GCM_SIV_CTX *ctx) { int ret = 0; if (ctx->enc) return ctx->generated_tag; ret = !CRYPTO_memcmp(ctx->tag, ctx->user_tag, sizeof(ctx->tag)); ret &= ctx->have_user_tag; return ret; } static int aes_gcm_siv_encrypt(PROV_AES_GCM_SIV_CTX *ctx, const unsigned char *in, unsigned char *out, size_t len) { uint64_t len_blk[2]; uint8_t S_s[TAG_SIZE]; uint8_t counter_block[TAG_SIZE]; uint8_t padding[BLOCK_SIZE]; size_t i; int64_t len64 = len; int out_len; int error = 0; DECLARE_IS_ENDIAN; ctx->generated_tag = 0; if (!ctx->speed && ctx->used_enc) return 0; /* need to check the size of the input! */ if (len64 > ((int64_t)1 << 36) || len == 0) return 0; if (IS_LITTLE_ENDIAN) { len_blk[0] = (uint64_t)ctx->aad_len * 8; len_blk[1] = (uint64_t)len * 8; } else { len_blk[0] = GSWAP8((uint64_t)ctx->aad_len * 8); len_blk[1] = GSWAP8((uint64_t)len * 8); } memset(S_s, 0, TAG_SIZE); ossl_polyval_ghash_init(ctx->Htable, (const uint64_t*)ctx->msg_auth_key); if (ctx->aad != NULL) { /* AAD is allocated with padding, but need to adjust length */ ossl_polyval_ghash_hash(ctx->Htable, S_s, ctx->aad, UP16(ctx->aad_len)); } if (DOWN16(len) > 0) ossl_polyval_ghash_hash(ctx->Htable, S_s, (uint8_t *) in, DOWN16(len)); if (!IS16(len)) { /* deal with padding - probably easier to memset the padding first rather than calculate */ memset(padding, 0, sizeof(padding)); memcpy(padding, &in[DOWN16(len)], REMAINDER16(len)); ossl_polyval_ghash_hash(ctx->Htable, S_s, padding, sizeof(padding)); } ossl_polyval_ghash_hash(ctx->Htable, S_s, (uint8_t *) len_blk, sizeof(len_blk)); for (i = 0; i < NONCE_SIZE; i++) S_s[i] ^= ctx->nonce[i]; S_s[TAG_SIZE - 1] &= 0x7f; out_len = sizeof(ctx->tag); error |= !EVP_EncryptUpdate(ctx->ecb_ctx, ctx->tag, &out_len, S_s, sizeof(S_s)); memcpy(counter_block, ctx->tag, TAG_SIZE); counter_block[TAG_SIZE - 1] |= 0x80; error |= !aes_gcm_siv_ctr32(ctx, counter_block, out, in, len); ctx->generated_tag = !error; /* Regardless of error */ ctx->used_enc = 1; return !error; } static int aes_gcm_siv_decrypt(PROV_AES_GCM_SIV_CTX *ctx, const unsigned char *in, unsigned char *out, size_t len) { uint8_t counter_block[TAG_SIZE]; uint64_t len_blk[2]; uint8_t S_s[TAG_SIZE]; size_t i; uint64_t padding[2]; int64_t len64 = len; int out_len; int error = 0; DECLARE_IS_ENDIAN; ctx->generated_tag = 0; if (!ctx->speed && ctx->used_dec) return 0; /* need to check the size of the input! */ if (len64 > ((int64_t)1 << 36) || len == 0) return 0; memcpy(counter_block, ctx->user_tag, sizeof(counter_block)); counter_block[TAG_SIZE - 1] |= 0x80; error |= !aes_gcm_siv_ctr32(ctx, counter_block, out, in, len); if (IS_LITTLE_ENDIAN) { len_blk[0] = (uint64_t)ctx->aad_len * 8; len_blk[1] = (uint64_t)len * 8; } else { len_blk[0] = GSWAP8((uint64_t)ctx->aad_len * 8); len_blk[1] = GSWAP8((uint64_t)len * 8); } memset(S_s, 0, TAG_SIZE); ossl_polyval_ghash_init(ctx->Htable, (const uint64_t*)ctx->msg_auth_key); if (ctx->aad != NULL) { /* AAD allocated with padding, but need to adjust length */ ossl_polyval_ghash_hash(ctx->Htable, S_s, ctx->aad, UP16(ctx->aad_len)); } if (DOWN16(len) > 0) ossl_polyval_ghash_hash(ctx->Htable, S_s, out, DOWN16(len)); if (!IS16(len)) { /* deal with padding - probably easier to "memset" the padding first rather than calculate */ padding[0] = padding[1] = 0; memcpy(padding, &out[DOWN16(len)], REMAINDER16(len)); ossl_polyval_ghash_hash(ctx->Htable, S_s, (uint8_t *)padding, sizeof(padding)); } ossl_polyval_ghash_hash(ctx->Htable, S_s, (uint8_t *)len_blk, TAG_SIZE); for (i = 0; i < NONCE_SIZE; i++) S_s[i] ^= ctx->nonce[i]; S_s[TAG_SIZE - 1] &= 0x7f; /* * In the ctx, user_tag is the one received/set by the user, * and tag is generated from the input */ out_len = sizeof(ctx->tag); error |= !EVP_EncryptUpdate(ctx->ecb_ctx, ctx->tag, &out_len, S_s, sizeof(S_s)); ctx->generated_tag = !error; /* Regardless of error */ ctx->used_dec = 1; return !error; } static int aes_gcm_siv_cipher(void *vctx, unsigned char *out, const unsigned char *in, size_t len) { PROV_AES_GCM_SIV_CTX *ctx = (PROV_AES_GCM_SIV_CTX *)vctx; /* EncryptFinal or DecryptFinal */ if (in == NULL) return aes_gcm_siv_finish(ctx); /* Deal with associated data */ if (out == NULL) return aes_gcm_siv_aad(ctx, in, len); if (ctx->enc) return aes_gcm_siv_encrypt(ctx, in, out, len); return aes_gcm_siv_decrypt(ctx, in, out, len); } static void aes_gcm_siv_clean_ctx(void *vctx) { PROV_AES_GCM_SIV_CTX *ctx = (PROV_AES_GCM_SIV_CTX *)vctx; EVP_CIPHER_CTX_free(ctx->ecb_ctx); ctx->ecb_ctx = NULL; } static int aes_gcm_siv_dup_ctx(void *vdst, void *vsrc) { PROV_AES_GCM_SIV_CTX *dst = (PROV_AES_GCM_SIV_CTX *)vdst; PROV_AES_GCM_SIV_CTX *src = (PROV_AES_GCM_SIV_CTX *)vsrc; dst->ecb_ctx = NULL; if (src->ecb_ctx != NULL) { if ((dst->ecb_ctx = EVP_CIPHER_CTX_new()) == NULL) goto err; if (!EVP_CIPHER_CTX_copy(dst->ecb_ctx, src->ecb_ctx)) goto err; } return 1; err: EVP_CIPHER_CTX_free(dst->ecb_ctx); dst->ecb_ctx = NULL; return 0; } static const PROV_CIPHER_HW_AES_GCM_SIV aes_gcm_siv_hw = { aes_gcm_siv_initkey, aes_gcm_siv_cipher, aes_gcm_siv_dup_ctx, aes_gcm_siv_clean_ctx, }; const PROV_CIPHER_HW_AES_GCM_SIV *ossl_prov_cipher_hw_aes_gcm_siv(size_t keybits) { return &aes_gcm_siv_hw; } /* AES-GCM-SIV needs AES-CTR32, which is different than the AES-CTR implementation */ static int aes_gcm_siv_ctr32(PROV_AES_GCM_SIV_CTX *ctx, const unsigned char *init_counter, unsigned char *out, const unsigned char *in, size_t len) { uint8_t keystream[BLOCK_SIZE]; int out_len; size_t i; size_t j; size_t todo; uint32_t counter; int error = 0; union { uint32_t x32[BLOCK_SIZE / sizeof(uint32_t)]; uint8_t x8[BLOCK_SIZE]; } block; DECLARE_IS_ENDIAN; memcpy(&block, init_counter, sizeof(block)); if (IS_BIG_ENDIAN) { counter = GSWAP4(block.x32[0]); } for (i = 0; i < len; i += sizeof(block)) { out_len = BLOCK_SIZE; error |= !EVP_EncryptUpdate(ctx->ecb_ctx, keystream, &out_len, (uint8_t*)&block, sizeof(block)); if (IS_LITTLE_ENDIAN) { block.x32[0]++; } else { counter++; block.x32[0] = GSWAP4(counter); } todo = len - i; if (todo > sizeof(keystream)) todo = sizeof(keystream); /* Non optimal, but avoids alignment issues */ for (j = 0; j < todo; j++) out[i + j] = in[i + j] ^ keystream[j]; } return !error; }
./openssl/providers/implementations/ciphers/cipher_aes_ccm.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * AES low level APIs are deprecated for public use, but still ok for internal * use where we're using them to implement the higher level EVP interface, as is * the case here. */ #include "internal/deprecated.h" /* Dispatch functions for AES CCM mode */ #include "cipher_aes_ccm.h" #include "prov/implementations.h" #include "prov/providercommon.h" static void *aes_ccm_newctx(void *provctx, size_t keybits) { PROV_AES_CCM_CTX *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) ossl_ccm_initctx(&ctx->base, keybits, ossl_prov_aes_hw_ccm(keybits)); return ctx; } static void *aes_ccm_dupctx(void *provctx) { PROV_AES_CCM_CTX *ctx = provctx; PROV_AES_CCM_CTX *dupctx = NULL; if (ctx == NULL) return NULL; dupctx = OPENSSL_memdup(provctx, sizeof(*ctx)); if (dupctx == NULL) return NULL; /* * ossl_cm_initctx, via the ossl_prov_aes_hw_ccm functions assign a * provctx->ccm.ks.ks to the ccm context key so we need to point it to * the memduped copy */ dupctx->base.ccm_ctx.key = &dupctx->ccm.ks.ks; return dupctx; } static OSSL_FUNC_cipher_freectx_fn aes_ccm_freectx; static void aes_ccm_freectx(void *vctx) { PROV_AES_CCM_CTX *ctx = (PROV_AES_CCM_CTX *)vctx; OPENSSL_clear_free(ctx, sizeof(*ctx)); } /* ossl_aes128ccm_functions */ IMPLEMENT_aead_cipher(aes, ccm, CCM, AEAD_FLAGS, 128, 8, 96); /* ossl_aes192ccm_functions */ IMPLEMENT_aead_cipher(aes, ccm, CCM, AEAD_FLAGS, 192, 8, 96); /* ossl_aes256ccm_functions */ IMPLEMENT_aead_cipher(aes, ccm, CCM, AEAD_FLAGS, 256, 8, 96);
./openssl/providers/implementations/ciphers/cipher_aes_ccm.h
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/aes.h> #include "prov/ciphercommon.h" #include "prov/ciphercommon_ccm.h" #include "crypto/aes_platform.h" typedef struct prov_aes_ccm_ctx_st { PROV_CCM_CTX base; /* Must be first */ union { OSSL_UNION_ALIGN; /*- * Padding is chosen so that s390x.kmac.k overlaps with ks.ks and * fc with ks.ks.rounds. Remember that on s390x, an AES_KEY's * rounds field is used to store the function code and that the key * schedule is not stored (if aes hardware support is detected). */ struct { unsigned char pad[16]; AES_KEY ks; } ks; #if defined(OPENSSL_CPUID_OBJ) && defined(__s390__) struct { S390X_KMAC_PARAMS kmac; unsigned long long blocks; union { unsigned long long g[2]; unsigned char b[AES_BLOCK_SIZE]; } nonce; union { unsigned long long g[2]; unsigned char b[AES_BLOCK_SIZE]; } buf; unsigned char dummy_pad[168]; unsigned int fc; /* fc has same offset as ks.ks.rounds */ } s390x; #endif /* defined(OPENSSL_CPUID_OBJ) && defined(__s390__) */ } ccm; } PROV_AES_CCM_CTX; const PROV_CCM_HW *ossl_prov_aes_hw_ccm(size_t keylen);
./openssl/providers/implementations/ciphers/cipher_rc4.h
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/rc4.h> #include "prov/ciphercommon.h" typedef struct prov_rc4_ctx_st { PROV_CIPHER_CTX base; /* Must be first */ union { OSSL_UNION_ALIGN; RC4_KEY ks; } ks; } PROV_RC4_CTX; const PROV_CIPHER_HW *ossl_prov_cipher_hw_rc4(size_t keybits);
./openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
/* * Copyright 2011-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * All low level APIs are deprecated for public use, but still ok for internal * use where we're using them to implement the higher level EVP interface, as is * the case here. */ #include "internal/deprecated.h" #include "cipher_aes_cbc_hmac_sha.h" #if !defined(AES_CBC_HMAC_SHA_CAPABLE) || !defined(AESNI_CAPABLE) int ossl_cipher_capable_aes_cbc_hmac_sha256(void) { return 0; } const PROV_CIPHER_HW_AES_HMAC_SHA *ossl_prov_cipher_hw_aes_cbc_hmac_sha256(void) { return NULL; } #else # include <openssl/rand.h> # include "crypto/evp.h" # include "internal/constant_time.h" void sha256_block_data_order(void *c, const void *p, size_t len); int aesni_cbc_sha256_enc(const void *inp, void *out, size_t blocks, const AES_KEY *key, unsigned char iv[16], SHA256_CTX *ctx, const void *in0); int ossl_cipher_capable_aes_cbc_hmac_sha256(void) { return AESNI_CBC_HMAC_SHA_CAPABLE && aesni_cbc_sha256_enc(NULL, NULL, 0, NULL, NULL, NULL, NULL); } static int aesni_cbc_hmac_sha256_init_key(PROV_CIPHER_CTX *vctx, const unsigned char *key, size_t keylen) { int ret; PROV_AES_HMAC_SHA_CTX *ctx = (PROV_AES_HMAC_SHA_CTX *)vctx; PROV_AES_HMAC_SHA256_CTX *sctx = (PROV_AES_HMAC_SHA256_CTX *)vctx; if (ctx->base.enc) ret = aesni_set_encrypt_key(key, ctx->base.keylen * 8, &ctx->ks); else ret = aesni_set_decrypt_key(key, ctx->base.keylen * 8, &ctx->ks); SHA256_Init(&sctx->head); /* handy when benchmarking */ sctx->tail = sctx->head; sctx->md = sctx->head; ctx->payload_length = NO_PAYLOAD_LENGTH; vctx->removetlspad = 1; vctx->removetlsfixed = SHA256_DIGEST_LENGTH + AES_BLOCK_SIZE; return ret < 0 ? 0 : 1; } void sha256_block_data_order(void *c, const void *p, size_t len); static void sha256_update(SHA256_CTX *c, const void *data, size_t len) { const unsigned char *ptr = data; size_t res; if ((res = c->num)) { res = SHA256_CBLOCK - res; if (len < res) res = len; SHA256_Update(c, ptr, res); ptr += res; len -= res; } res = len % SHA256_CBLOCK; len -= res; if (len) { sha256_block_data_order(c, ptr, len / SHA256_CBLOCK); ptr += len; c->Nh += len >> 29; c->Nl += len <<= 3; if (c->Nl < (unsigned int)len) c->Nh++; } if (res) SHA256_Update(c, ptr, res); } # if !defined(OPENSSL_NO_MULTIBLOCK) typedef struct { unsigned int A[8], B[8], C[8], D[8], E[8], F[8], G[8], H[8]; } SHA256_MB_CTX; typedef struct { const unsigned char *ptr; int blocks; } HASH_DESC; typedef struct { const unsigned char *inp; unsigned char *out; int blocks; u64 iv[2]; } CIPH_DESC; void sha256_multi_block(SHA256_MB_CTX *, const HASH_DESC *, int); void aesni_multi_cbc_encrypt(CIPH_DESC *, void *, int); static size_t tls1_multi_block_encrypt(void *vctx, unsigned char *out, const unsigned char *inp, size_t inp_len, int n4x) { /* n4x is 1 or 2 */ PROV_AES_HMAC_SHA_CTX *ctx = (PROV_AES_HMAC_SHA_CTX *)vctx; PROV_AES_HMAC_SHA256_CTX *sctx = (PROV_AES_HMAC_SHA256_CTX *)vctx; HASH_DESC hash_d[8], edges[8]; CIPH_DESC ciph_d[8]; unsigned char storage[sizeof(SHA256_MB_CTX) + 32]; union { u64 q[16]; u32 d[32]; u8 c[128]; } blocks[8]; SHA256_MB_CTX *mctx; unsigned int frag, last, packlen, i; unsigned int x4 = 4 * n4x, minblocks, processed = 0; size_t ret = 0; u8 *IVs; # if defined(BSWAP8) u64 seqnum; # endif /* ask for IVs in bulk */ if (RAND_bytes_ex(ctx->base.libctx, (IVs = blocks[0].c), 16 * x4, 0) <= 0) return 0; mctx = (SHA256_MB_CTX *) (storage + 32 - ((size_t)storage % 32)); /* align */ frag = (unsigned int)inp_len >> (1 + n4x); last = (unsigned int)inp_len + frag - (frag << (1 + n4x)); if (last > frag && ((last + 13 + 9) % 64) < (x4 - 1)) { frag++; last -= x4 - 1; } packlen = 5 + 16 + ((frag + 32 + 16) & -16); /* populate descriptors with pointers and IVs */ hash_d[0].ptr = inp; ciph_d[0].inp = inp; /* 5+16 is place for header and explicit IV */ ciph_d[0].out = out + 5 + 16; memcpy(ciph_d[0].out - 16, IVs, 16); memcpy(ciph_d[0].iv, IVs, 16); IVs += 16; for (i = 1; i < x4; i++) { ciph_d[i].inp = hash_d[i].ptr = hash_d[i - 1].ptr + frag; ciph_d[i].out = ciph_d[i - 1].out + packlen; memcpy(ciph_d[i].out - 16, IVs, 16); memcpy(ciph_d[i].iv, IVs, 16); IVs += 16; } # if defined(BSWAP8) memcpy(blocks[0].c, sctx->md.data, 8); seqnum = BSWAP8(blocks[0].q[0]); # endif for (i = 0; i < x4; i++) { unsigned int len = (i == (x4 - 1) ? last : frag); # if !defined(BSWAP8) unsigned int carry, j; # endif mctx->A[i] = sctx->md.h[0]; mctx->B[i] = sctx->md.h[1]; mctx->C[i] = sctx->md.h[2]; mctx->D[i] = sctx->md.h[3]; mctx->E[i] = sctx->md.h[4]; mctx->F[i] = sctx->md.h[5]; mctx->G[i] = sctx->md.h[6]; mctx->H[i] = sctx->md.h[7]; /* fix seqnum */ # if defined(BSWAP8) blocks[i].q[0] = BSWAP8(seqnum + i); # else for (carry = i, j = 8; j--;) { blocks[i].c[j] = ((u8 *)sctx->md.data)[j] + carry; carry = (blocks[i].c[j] - carry) >> (sizeof(carry) * 8 - 1); } # endif blocks[i].c[8] = ((u8 *)sctx->md.data)[8]; blocks[i].c[9] = ((u8 *)sctx->md.data)[9]; blocks[i].c[10] = ((u8 *)sctx->md.data)[10]; /* fix length */ blocks[i].c[11] = (u8)(len >> 8); blocks[i].c[12] = (u8)(len); memcpy(blocks[i].c + 13, hash_d[i].ptr, 64 - 13); hash_d[i].ptr += 64 - 13; hash_d[i].blocks = (len - (64 - 13)) / 64; edges[i].ptr = blocks[i].c; edges[i].blocks = 1; } /* hash 13-byte headers and first 64-13 bytes of inputs */ sha256_multi_block(mctx, edges, n4x); /* hash bulk inputs */ # define MAXCHUNKSIZE 2048 # if MAXCHUNKSIZE%64 # error "MAXCHUNKSIZE is not divisible by 64" # elif MAXCHUNKSIZE /* * goal is to minimize pressure on L1 cache by moving in shorter steps, * so that hashed data is still in the cache by the time we encrypt it */ minblocks = ((frag <= last ? frag : last) - (64 - 13)) / 64; if (minblocks > MAXCHUNKSIZE / 64) { for (i = 0; i < x4; i++) { edges[i].ptr = hash_d[i].ptr; edges[i].blocks = MAXCHUNKSIZE / 64; ciph_d[i].blocks = MAXCHUNKSIZE / 16; } do { sha256_multi_block(mctx, edges, n4x); aesni_multi_cbc_encrypt(ciph_d, &ctx->ks, n4x); for (i = 0; i < x4; i++) { edges[i].ptr = hash_d[i].ptr += MAXCHUNKSIZE; hash_d[i].blocks -= MAXCHUNKSIZE / 64; edges[i].blocks = MAXCHUNKSIZE / 64; ciph_d[i].inp += MAXCHUNKSIZE; ciph_d[i].out += MAXCHUNKSIZE; ciph_d[i].blocks = MAXCHUNKSIZE / 16; memcpy(ciph_d[i].iv, ciph_d[i].out - 16, 16); } processed += MAXCHUNKSIZE; minblocks -= MAXCHUNKSIZE / 64; } while (minblocks > MAXCHUNKSIZE / 64); } # endif # undef MAXCHUNKSIZE sha256_multi_block(mctx, hash_d, n4x); memset(blocks, 0, sizeof(blocks)); for (i = 0; i < x4; i++) { unsigned int len = (i == (x4 - 1) ? last : frag), off = hash_d[i].blocks * 64; const unsigned char *ptr = hash_d[i].ptr + off; off = (len - processed) - (64 - 13) - off; /* remainder actually */ memcpy(blocks[i].c, ptr, off); blocks[i].c[off] = 0x80; len += 64 + 13; /* 64 is HMAC header */ len *= 8; /* convert to bits */ if (off < (64 - 8)) { # ifdef BSWAP4 blocks[i].d[15] = BSWAP4(len); # else PUTU32(blocks[i].c + 60, len); # endif edges[i].blocks = 1; } else { # ifdef BSWAP4 blocks[i].d[31] = BSWAP4(len); # else PUTU32(blocks[i].c + 124, len); # endif edges[i].blocks = 2; } edges[i].ptr = blocks[i].c; } /* hash input tails and finalize */ sha256_multi_block(mctx, edges, n4x); memset(blocks, 0, sizeof(blocks)); for (i = 0; i < x4; i++) { # ifdef BSWAP4 blocks[i].d[0] = BSWAP4(mctx->A[i]); mctx->A[i] = sctx->tail.h[0]; blocks[i].d[1] = BSWAP4(mctx->B[i]); mctx->B[i] = sctx->tail.h[1]; blocks[i].d[2] = BSWAP4(mctx->C[i]); mctx->C[i] = sctx->tail.h[2]; blocks[i].d[3] = BSWAP4(mctx->D[i]); mctx->D[i] = sctx->tail.h[3]; blocks[i].d[4] = BSWAP4(mctx->E[i]); mctx->E[i] = sctx->tail.h[4]; blocks[i].d[5] = BSWAP4(mctx->F[i]); mctx->F[i] = sctx->tail.h[5]; blocks[i].d[6] = BSWAP4(mctx->G[i]); mctx->G[i] = sctx->tail.h[6]; blocks[i].d[7] = BSWAP4(mctx->H[i]); mctx->H[i] = sctx->tail.h[7]; blocks[i].c[32] = 0x80; blocks[i].d[15] = BSWAP4((64 + 32) * 8); # else PUTU32(blocks[i].c + 0, mctx->A[i]); mctx->A[i] = sctx->tail.h[0]; PUTU32(blocks[i].c + 4, mctx->B[i]); mctx->B[i] = sctx->tail.h[1]; PUTU32(blocks[i].c + 8, mctx->C[i]); mctx->C[i] = sctx->tail.h[2]; PUTU32(blocks[i].c + 12, mctx->D[i]); mctx->D[i] = sctx->tail.h[3]; PUTU32(blocks[i].c + 16, mctx->E[i]); mctx->E[i] = sctx->tail.h[4]; PUTU32(blocks[i].c + 20, mctx->F[i]); mctx->F[i] = sctx->tail.h[5]; PUTU32(blocks[i].c + 24, mctx->G[i]); mctx->G[i] = sctx->tail.h[6]; PUTU32(blocks[i].c + 28, mctx->H[i]); mctx->H[i] = sctx->tail.h[7]; blocks[i].c[32] = 0x80; PUTU32(blocks[i].c + 60, (64 + 32) * 8); # endif /* BSWAP */ edges[i].ptr = blocks[i].c; edges[i].blocks = 1; } /* finalize MACs */ sha256_multi_block(mctx, edges, n4x); for (i = 0; i < x4; i++) { unsigned int len = (i == (x4 - 1) ? last : frag), pad, j; unsigned char *out0 = out; memcpy(ciph_d[i].out, ciph_d[i].inp, len - processed); ciph_d[i].inp = ciph_d[i].out; out += 5 + 16 + len; /* write MAC */ PUTU32(out + 0, mctx->A[i]); PUTU32(out + 4, mctx->B[i]); PUTU32(out + 8, mctx->C[i]); PUTU32(out + 12, mctx->D[i]); PUTU32(out + 16, mctx->E[i]); PUTU32(out + 20, mctx->F[i]); PUTU32(out + 24, mctx->G[i]); PUTU32(out + 28, mctx->H[i]); out += 32; len += 32; /* pad */ pad = 15 - len % 16; for (j = 0; j <= pad; j++) *(out++) = pad; len += pad + 1; ciph_d[i].blocks = (len - processed) / 16; len += 16; /* account for explicit iv */ /* arrange header */ out0[0] = ((u8 *)sctx->md.data)[8]; out0[1] = ((u8 *)sctx->md.data)[9]; out0[2] = ((u8 *)sctx->md.data)[10]; out0[3] = (u8)(len >> 8); out0[4] = (u8)(len); ret += len + 5; inp += frag; } aesni_multi_cbc_encrypt(ciph_d, &ctx->ks, n4x); OPENSSL_cleanse(blocks, sizeof(blocks)); OPENSSL_cleanse(mctx, sizeof(*mctx)); ctx->multiblock_encrypt_len = ret; return ret; } # endif /* !OPENSSL_NO_MULTIBLOCK */ static int aesni_cbc_hmac_sha256_cipher(PROV_CIPHER_CTX *vctx, unsigned char *out, const unsigned char *in, size_t len) { PROV_AES_HMAC_SHA_CTX *ctx = (PROV_AES_HMAC_SHA_CTX *)vctx; PROV_AES_HMAC_SHA256_CTX *sctx = (PROV_AES_HMAC_SHA256_CTX *)vctx; unsigned int l; size_t plen = ctx->payload_length; size_t iv = 0; /* explicit IV in TLS 1.1 and * later */ size_t aes_off = 0, blocks; size_t sha_off = SHA256_CBLOCK - sctx->md.num; ctx->payload_length = NO_PAYLOAD_LENGTH; if (len % AES_BLOCK_SIZE) return 0; if (ctx->base.enc) { if (plen == NO_PAYLOAD_LENGTH) plen = len; else if (len != ((plen + SHA256_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE)) return 0; else if (ctx->aux.tls_ver >= TLS1_1_VERSION) iv = AES_BLOCK_SIZE; /* * Assembly stitch handles AVX-capable processors, but its * performance is not optimal on AMD Jaguar, ~40% worse, for * unknown reasons. Incidentally processor in question supports * AVX, but not AMD-specific XOP extension, which can be used * to identify it and avoid stitch invocation. So that after we * establish that current CPU supports AVX, we even see if it's * either even XOP-capable Bulldozer-based or GenuineIntel one. * But SHAEXT-capable go ahead... */ if (((OPENSSL_ia32cap_P[2] & (1 << 29)) || /* SHAEXT? */ ((OPENSSL_ia32cap_P[1] & (1 << (60 - 32))) && /* AVX? */ ((OPENSSL_ia32cap_P[1] & (1 << (43 - 32))) /* XOP? */ | (OPENSSL_ia32cap_P[0] & (1 << 30))))) && /* "Intel CPU"? */ plen > (sha_off + iv) && (blocks = (plen - (sha_off + iv)) / SHA256_CBLOCK)) { sha256_update(&sctx->md, in + iv, sha_off); (void)aesni_cbc_sha256_enc(in, out, blocks, &ctx->ks, ctx->base.iv, &sctx->md, in + iv + sha_off); blocks *= SHA256_CBLOCK; aes_off += blocks; sha_off += blocks; sctx->md.Nh += blocks >> 29; sctx->md.Nl += blocks <<= 3; if (sctx->md.Nl < (unsigned int)blocks) sctx->md.Nh++; } else { sha_off = 0; } sha_off += iv; sha256_update(&sctx->md, in + sha_off, plen - sha_off); if (plen != len) { /* "TLS" mode of operation */ if (in != out) memcpy(out + aes_off, in + aes_off, plen - aes_off); /* calculate HMAC and append it to payload */ SHA256_Final(out + plen, &sctx->md); sctx->md = sctx->tail; sha256_update(&sctx->md, out + plen, SHA256_DIGEST_LENGTH); SHA256_Final(out + plen, &sctx->md); /* pad the payload|hmac */ plen += SHA256_DIGEST_LENGTH; for (l = len - plen - 1; plen < len; plen++) out[plen] = l; /* encrypt HMAC|padding at once */ aesni_cbc_encrypt(out + aes_off, out + aes_off, len - aes_off, &ctx->ks, ctx->base.iv, 1); } else { aesni_cbc_encrypt(in + aes_off, out + aes_off, len - aes_off, &ctx->ks, ctx->base.iv, 1); } } else { union { unsigned int u[SHA256_DIGEST_LENGTH / sizeof(unsigned int)]; unsigned char c[64 + SHA256_DIGEST_LENGTH]; } mac, *pmac; /* arrange cache line alignment */ pmac = (void *)(((size_t)mac.c + 63) & ((size_t)0 - 64)); /* decrypt HMAC|padding at once */ aesni_cbc_encrypt(in, out, len, &ctx->ks, ctx->base.iv, 0); if (plen != NO_PAYLOAD_LENGTH) { /* "TLS" mode of operation */ size_t inp_len, mask, j, i; unsigned int res, maxpad, pad, bitlen; int ret = 1; union { unsigned int u[SHA_LBLOCK]; unsigned char c[SHA256_CBLOCK]; } *data = (void *)sctx->md.data; if ((ctx->aux.tls_aad[plen - 4] << 8 | ctx->aux.tls_aad[plen - 3]) >= TLS1_1_VERSION) iv = AES_BLOCK_SIZE; if (len < (iv + SHA256_DIGEST_LENGTH + 1)) return 0; /* omit explicit iv */ out += iv; len -= iv; /* figure out payload length */ pad = out[len - 1]; maxpad = len - (SHA256_DIGEST_LENGTH + 1); maxpad |= (255 - maxpad) >> (sizeof(maxpad) * 8 - 8); maxpad &= 255; mask = constant_time_ge(maxpad, pad); ret &= mask; /* * If pad is invalid then we will fail the above test but we must * continue anyway because we are in constant time code. However, * we'll use the maxpad value instead of the supplied pad to make * sure we perform well defined pointer arithmetic. */ pad = constant_time_select(mask, pad, maxpad); inp_len = len - (SHA256_DIGEST_LENGTH + pad + 1); ctx->aux.tls_aad[plen - 2] = inp_len >> 8; ctx->aux.tls_aad[plen - 1] = inp_len; /* calculate HMAC */ sctx->md = sctx->head; sha256_update(&sctx->md, ctx->aux.tls_aad, plen); /* code with lucky-13 fix */ len -= SHA256_DIGEST_LENGTH; /* amend mac */ if (len >= (256 + SHA256_CBLOCK)) { j = (len - (256 + SHA256_CBLOCK)) & (0 - SHA256_CBLOCK); j += SHA256_CBLOCK - sctx->md.num; sha256_update(&sctx->md, out, j); out += j; len -= j; inp_len -= j; } /* but pretend as if we hashed padded payload */ bitlen = sctx->md.Nl + (inp_len << 3); /* at most 18 bits */ # ifdef BSWAP4 bitlen = BSWAP4(bitlen); # else mac.c[0] = 0; mac.c[1] = (unsigned char)(bitlen >> 16); mac.c[2] = (unsigned char)(bitlen >> 8); mac.c[3] = (unsigned char)bitlen; bitlen = mac.u[0]; # endif /* BSWAP */ pmac->u[0] = 0; pmac->u[1] = 0; pmac->u[2] = 0; pmac->u[3] = 0; pmac->u[4] = 0; pmac->u[5] = 0; pmac->u[6] = 0; pmac->u[7] = 0; for (res = sctx->md.num, j = 0; j < len; j++) { size_t c = out[j]; mask = (j - inp_len) >> (sizeof(j) * 8 - 8); c &= mask; c |= 0x80 & ~mask & ~((inp_len - j) >> (sizeof(j) * 8 - 8)); data->c[res++] = (unsigned char)c; if (res != SHA256_CBLOCK) continue; /* j is not incremented yet */ mask = 0 - ((inp_len + 7 - j) >> (sizeof(j) * 8 - 1)); data->u[SHA_LBLOCK - 1] |= bitlen & mask; sha256_block_data_order(&sctx->md, data, 1); mask &= 0 - ((j - inp_len - 72) >> (sizeof(j) * 8 - 1)); pmac->u[0] |= sctx->md.h[0] & mask; pmac->u[1] |= sctx->md.h[1] & mask; pmac->u[2] |= sctx->md.h[2] & mask; pmac->u[3] |= sctx->md.h[3] & mask; pmac->u[4] |= sctx->md.h[4] & mask; pmac->u[5] |= sctx->md.h[5] & mask; pmac->u[6] |= sctx->md.h[6] & mask; pmac->u[7] |= sctx->md.h[7] & mask; res = 0; } for (i = res; i < SHA256_CBLOCK; i++, j++) data->c[i] = 0; if (res > SHA256_CBLOCK - 8) { mask = 0 - ((inp_len + 8 - j) >> (sizeof(j) * 8 - 1)); data->u[SHA_LBLOCK - 1] |= bitlen & mask; sha256_block_data_order(&sctx->md, data, 1); mask &= 0 - ((j - inp_len - 73) >> (sizeof(j) * 8 - 1)); pmac->u[0] |= sctx->md.h[0] & mask; pmac->u[1] |= sctx->md.h[1] & mask; pmac->u[2] |= sctx->md.h[2] & mask; pmac->u[3] |= sctx->md.h[3] & mask; pmac->u[4] |= sctx->md.h[4] & mask; pmac->u[5] |= sctx->md.h[5] & mask; pmac->u[6] |= sctx->md.h[6] & mask; pmac->u[7] |= sctx->md.h[7] & mask; memset(data, 0, SHA256_CBLOCK); j += 64; } data->u[SHA_LBLOCK - 1] = bitlen; sha256_block_data_order(&sctx->md, data, 1); mask = 0 - ((j - inp_len - 73) >> (sizeof(j) * 8 - 1)); pmac->u[0] |= sctx->md.h[0] & mask; pmac->u[1] |= sctx->md.h[1] & mask; pmac->u[2] |= sctx->md.h[2] & mask; pmac->u[3] |= sctx->md.h[3] & mask; pmac->u[4] |= sctx->md.h[4] & mask; pmac->u[5] |= sctx->md.h[5] & mask; pmac->u[6] |= sctx->md.h[6] & mask; pmac->u[7] |= sctx->md.h[7] & mask; # ifdef BSWAP4 pmac->u[0] = BSWAP4(pmac->u[0]); pmac->u[1] = BSWAP4(pmac->u[1]); pmac->u[2] = BSWAP4(pmac->u[2]); pmac->u[3] = BSWAP4(pmac->u[3]); pmac->u[4] = BSWAP4(pmac->u[4]); pmac->u[5] = BSWAP4(pmac->u[5]); pmac->u[6] = BSWAP4(pmac->u[6]); pmac->u[7] = BSWAP4(pmac->u[7]); # else for (i = 0; i < 8; i++) { res = pmac->u[i]; pmac->c[4 * i + 0] = (unsigned char)(res >> 24); pmac->c[4 * i + 1] = (unsigned char)(res >> 16); pmac->c[4 * i + 2] = (unsigned char)(res >> 8); pmac->c[4 * i + 3] = (unsigned char)res; } # endif /* BSWAP */ len += SHA256_DIGEST_LENGTH; sctx->md = sctx->tail; sha256_update(&sctx->md, pmac->c, SHA256_DIGEST_LENGTH); SHA256_Final(pmac->c, &sctx->md); /* verify HMAC */ out += inp_len; len -= inp_len; /* code containing lucky-13 fix */ { unsigned char *p = out + len - 1 - maxpad - SHA256_DIGEST_LENGTH; size_t off = out - p; unsigned int c, cmask; for (res = 0, i = 0, j = 0; j < maxpad + SHA256_DIGEST_LENGTH; j++) { c = p[j]; cmask = ((int)(j - off - SHA256_DIGEST_LENGTH)) >> (sizeof(int) * 8 - 1); res |= (c ^ pad) & ~cmask; /* ... and padding */ cmask &= ((int)(off - 1 - j)) >> (sizeof(int) * 8 - 1); res |= (c ^ pmac->c[i]) & cmask; i += 1 & cmask; } res = 0 - ((0 - res) >> (sizeof(res) * 8 - 1)); ret &= (int)~res; } return ret; } else { sha256_update(&sctx->md, out, len); } } return 1; } /* EVP_CTRL_AEAD_SET_MAC_KEY */ static void aesni_cbc_hmac_sha256_set_mac_key(void *vctx, const unsigned char *mackey, size_t len) { PROV_AES_HMAC_SHA256_CTX *ctx = (PROV_AES_HMAC_SHA256_CTX *)vctx; unsigned int i; unsigned char hmac_key[64]; memset(hmac_key, 0, sizeof(hmac_key)); if (len > sizeof(hmac_key)) { SHA256_Init(&ctx->head); sha256_update(&ctx->head, mackey, len); SHA256_Final(hmac_key, &ctx->head); } else { memcpy(hmac_key, mackey, len); } for (i = 0; i < sizeof(hmac_key); i++) hmac_key[i] ^= 0x36; /* ipad */ SHA256_Init(&ctx->head); sha256_update(&ctx->head, hmac_key, sizeof(hmac_key)); for (i = 0; i < sizeof(hmac_key); i++) hmac_key[i] ^= 0x36 ^ 0x5c; /* opad */ SHA256_Init(&ctx->tail); sha256_update(&ctx->tail, hmac_key, sizeof(hmac_key)); OPENSSL_cleanse(hmac_key, sizeof(hmac_key)); } /* EVP_CTRL_AEAD_TLS1_AAD */ static int aesni_cbc_hmac_sha256_set_tls1_aad(void *vctx, unsigned char *aad_rec, int aad_len) { PROV_AES_HMAC_SHA_CTX *ctx = (PROV_AES_HMAC_SHA_CTX *)vctx; PROV_AES_HMAC_SHA256_CTX *sctx = (PROV_AES_HMAC_SHA256_CTX *)vctx; unsigned char *p = aad_rec; unsigned int len; if (aad_len != EVP_AEAD_TLS1_AAD_LEN) return -1; len = p[aad_len - 2] << 8 | p[aad_len - 1]; if (ctx->base.enc) { ctx->payload_length = len; if ((ctx->aux.tls_ver = p[aad_len - 4] << 8 | p[aad_len - 3]) >= TLS1_1_VERSION) { if (len < AES_BLOCK_SIZE) return 0; len -= AES_BLOCK_SIZE; p[aad_len - 2] = len >> 8; p[aad_len - 1] = len; } sctx->md = sctx->head; sha256_update(&sctx->md, p, aad_len); ctx->tls_aad_pad = (int)(((len + SHA256_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE) - len); return 1; } else { memcpy(ctx->aux.tls_aad, p, aad_len); ctx->payload_length = aad_len; ctx->tls_aad_pad = SHA256_DIGEST_LENGTH; return 1; } } # if !defined(OPENSSL_NO_MULTIBLOCK) /* EVP_CTRL_TLS1_1_MULTIBLOCK_MAX_BUFSIZE */ static int aesni_cbc_hmac_sha256_tls1_multiblock_max_bufsize( void *vctx) { PROV_AES_HMAC_SHA_CTX *ctx = (PROV_AES_HMAC_SHA_CTX *)vctx; OPENSSL_assert(ctx->multiblock_max_send_fragment != 0); return (int)(5 + 16 + (((int)ctx->multiblock_max_send_fragment + 32 + 16) & -16)); } /* EVP_CTRL_TLS1_1_MULTIBLOCK_AAD */ static int aesni_cbc_hmac_sha256_tls1_multiblock_aad( void *vctx, EVP_CTRL_TLS1_1_MULTIBLOCK_PARAM *param) { PROV_AES_HMAC_SHA_CTX *ctx = (PROV_AES_HMAC_SHA_CTX *)vctx; PROV_AES_HMAC_SHA256_CTX *sctx = (PROV_AES_HMAC_SHA256_CTX *)vctx; unsigned int n4x = 1, x4; unsigned int frag, last, packlen, inp_len; inp_len = param->inp[11] << 8 | param->inp[12]; if (ctx->base.enc) { if ((param->inp[9] << 8 | param->inp[10]) < TLS1_1_VERSION) return -1; if (inp_len) { if (inp_len < 4096) return 0; /* too short */ if (inp_len >= 8192 && OPENSSL_ia32cap_P[2] & (1 << 5)) n4x = 2; /* AVX2 */ } else if ((n4x = param->interleave / 4) && n4x <= 2) inp_len = param->len; else return -1; sctx->md = sctx->head; sha256_update(&sctx->md, param->inp, 13); x4 = 4 * n4x; n4x += 1; frag = inp_len >> n4x; last = inp_len + frag - (frag << n4x); if (last > frag && ((last + 13 + 9) % 64 < (x4 - 1))) { frag++; last -= x4 - 1; } packlen = 5 + 16 + ((frag + 32 + 16) & -16); packlen = (packlen << n4x) - packlen; packlen += 5 + 16 + ((last + 32 + 16) & -16); param->interleave = x4; /* The returned values used by get need to be stored */ ctx->multiblock_interleave = x4; ctx->multiblock_aad_packlen = packlen; return 1; } return -1; /* not yet */ } /* EVP_CTRL_TLS1_1_MULTIBLOCK_ENCRYPT */ static int aesni_cbc_hmac_sha256_tls1_multiblock_encrypt( void *ctx, EVP_CTRL_TLS1_1_MULTIBLOCK_PARAM *param) { return (int)tls1_multi_block_encrypt(ctx, param->out, param->inp, param->len, param->interleave / 4); } # endif static const PROV_CIPHER_HW_AES_HMAC_SHA cipher_hw_aes_hmac_sha256 = { { aesni_cbc_hmac_sha256_init_key, aesni_cbc_hmac_sha256_cipher }, aesni_cbc_hmac_sha256_set_mac_key, aesni_cbc_hmac_sha256_set_tls1_aad, # if !defined(OPENSSL_NO_MULTIBLOCK) aesni_cbc_hmac_sha256_tls1_multiblock_max_bufsize, aesni_cbc_hmac_sha256_tls1_multiblock_aad, aesni_cbc_hmac_sha256_tls1_multiblock_encrypt # endif }; const PROV_CIPHER_HW_AES_HMAC_SHA *ossl_prov_cipher_hw_aes_cbc_hmac_sha256(void) { return &cipher_hw_aes_hmac_sha256; } #endif /* !defined(AES_CBC_HMAC_SHA_CAPABLE) || !defined(AESNI_CAPABLE) */
./openssl/providers/implementations/ciphers/cipher_des.h
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/des.h> #include "crypto/des_platform.h" #define TDES_FLAGS 0 typedef struct prov_des_ctx_st { PROV_CIPHER_CTX base; /* Must be first */ union { OSSL_UNION_ALIGN; DES_key_schedule ks; } dks; union { void (*cbc) (const void *, void *, size_t, const DES_key_schedule *, unsigned char *); } dstream; } PROV_DES_CTX; const PROV_CIPHER_HW *ossl_prov_cipher_hw_des_cbc(void); const PROV_CIPHER_HW *ossl_prov_cipher_hw_des_ecb(void); const PROV_CIPHER_HW *ossl_prov_cipher_hw_des_ofb64(void); const PROV_CIPHER_HW *ossl_prov_cipher_hw_des_cfb64(void); const PROV_CIPHER_HW *ossl_prov_cipher_hw_des_cfb1(void); const PROV_CIPHER_HW *ossl_prov_cipher_hw_des_cfb8(void);
./openssl/providers/implementations/ciphers/cipher_aes_xts.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * AES low level APIs are deprecated for public use, but still ok for internal * use where we're using them to implement the higher level EVP interface, as is * the case here. */ #include "internal/deprecated.h" #include <openssl/proverr.h> #include "cipher_aes_xts.h" #include "prov/implementations.h" #include "prov/providercommon.h" #define AES_XTS_FLAGS PROV_CIPHER_FLAG_CUSTOM_IV #define AES_XTS_IV_BITS 128 #define AES_XTS_BLOCK_BITS 8 /* forward declarations */ static OSSL_FUNC_cipher_encrypt_init_fn aes_xts_einit; static OSSL_FUNC_cipher_decrypt_init_fn aes_xts_dinit; static OSSL_FUNC_cipher_update_fn aes_xts_stream_update; static OSSL_FUNC_cipher_final_fn aes_xts_stream_final; static OSSL_FUNC_cipher_cipher_fn aes_xts_cipher; static OSSL_FUNC_cipher_freectx_fn aes_xts_freectx; static OSSL_FUNC_cipher_dupctx_fn aes_xts_dupctx; static OSSL_FUNC_cipher_set_ctx_params_fn aes_xts_set_ctx_params; static OSSL_FUNC_cipher_settable_ctx_params_fn aes_xts_settable_ctx_params; /* * Verify that the two keys are different. * * This addresses the vulnerability described in Rogaway's * September 2004 paper: * * "Efficient Instantiations of Tweakable Blockciphers and * Refinements to Modes OCB and PMAC". * (http://web.cs.ucdavis.edu/~rogaway/papers/offsets.pdf) * * FIPS 140-2 IG A.9 XTS-AES Key Generation Requirements states * that: * "The check for Key_1 != Key_2 shall be done at any place * BEFORE using the keys in the XTS-AES algorithm to process * data with them." */ static int aes_xts_check_keys_differ(const unsigned char *key, size_t bytes, int enc) { if ((!ossl_aes_xts_allow_insecure_decrypt || enc) && CRYPTO_memcmp(key, key + bytes, bytes) == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_XTS_DUPLICATED_KEYS); return 0; } return 1; } /*- * Provider dispatch functions */ static int aes_xts_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) { PROV_AES_XTS_CTX *xctx = (PROV_AES_XTS_CTX *)vctx; PROV_CIPHER_CTX *ctx = &xctx->base; if (!ossl_prov_is_running()) return 0; ctx->enc = enc; if (iv != NULL) { if (!ossl_cipher_generic_initiv(vctx, iv, ivlen)) return 0; } if (key != NULL) { if (keylen != ctx->keylen) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } if (!aes_xts_check_keys_differ(key, keylen / 2, enc)) return 0; if (!ctx->hw->init(ctx, key, keylen)) return 0; } return aes_xts_set_ctx_params(ctx, params); } static int aes_xts_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return aes_xts_init(vctx, key, keylen, iv, ivlen, params, 1); } static int aes_xts_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return aes_xts_init(vctx, key, keylen, iv, ivlen, params, 0); } static void *aes_xts_newctx(void *provctx, unsigned int mode, uint64_t flags, size_t kbits, size_t blkbits, size_t ivbits) { PROV_AES_XTS_CTX *ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) { ossl_cipher_generic_initkey(&ctx->base, kbits, blkbits, ivbits, mode, flags, ossl_prov_cipher_hw_aes_xts(kbits), NULL); } return ctx; } static void aes_xts_freectx(void *vctx) { PROV_AES_XTS_CTX *ctx = (PROV_AES_XTS_CTX *)vctx; ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } static void *aes_xts_dupctx(void *vctx) { PROV_AES_XTS_CTX *in = (PROV_AES_XTS_CTX *)vctx; PROV_AES_XTS_CTX *ret = NULL; if (!ossl_prov_is_running()) return NULL; if (in->xts.key1 != NULL) { if (in->xts.key1 != &in->ks1) return NULL; } if (in->xts.key2 != NULL) { if (in->xts.key2 != &in->ks2) return NULL; } ret = OPENSSL_malloc(sizeof(*ret)); if (ret == NULL) return NULL; in->base.hw->copyctx(&ret->base, &in->base); return ret; } static int aes_xts_cipher(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { PROV_AES_XTS_CTX *ctx = (PROV_AES_XTS_CTX *)vctx; if (!ossl_prov_is_running() || ctx->xts.key1 == NULL || ctx->xts.key2 == NULL || !ctx->base.iv_set || out == NULL || in == NULL || inl < AES_BLOCK_SIZE) return 0; /* * Impose a limit of 2^20 blocks per data unit as specified by * IEEE Std 1619-2018. The earlier and obsolete IEEE Std 1619-2007 * indicated that this was a SHOULD NOT rather than a MUST NOT. * NIST SP 800-38E mandates the same limit. */ if (inl > XTS_MAX_BLOCKS_PER_DATA_UNIT * AES_BLOCK_SIZE) { ERR_raise(ERR_LIB_PROV, PROV_R_XTS_DATA_UNIT_IS_TOO_LARGE); return 0; } if (ctx->stream != NULL) (*ctx->stream)(in, out, inl, ctx->xts.key1, ctx->xts.key2, ctx->base.iv); else if (CRYPTO_xts128_encrypt(&ctx->xts, ctx->base.iv, in, out, inl, ctx->base.enc)) return 0; *outl = inl; return 1; } static int aes_xts_stream_update(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { PROV_AES_XTS_CTX *ctx = (PROV_AES_XTS_CTX *)vctx; if (outsize < inl) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } if (!aes_xts_cipher(ctx, out, outl, outsize, in, inl)) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } return 1; } static int aes_xts_stream_final(void *vctx, unsigned char *out, size_t *outl, size_t outsize) { if (!ossl_prov_is_running()) return 0; *outl = 0; return 1; } static const OSSL_PARAM aes_xts_known_settable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), OSSL_PARAM_END }; static const OSSL_PARAM *aes_xts_settable_ctx_params(ossl_unused void *cctx, ossl_unused void *provctx) { return aes_xts_known_settable_ctx_params; } static int aes_xts_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; const OSSL_PARAM *p; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL) { size_t keylen; if (!OSSL_PARAM_get_size_t(p, &keylen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } /* The key length can not be modified for xts mode */ if (keylen != ctx->keylen) return 0; } return 1; } #define IMPLEMENT_cipher(lcmode, UCMODE, kbits, flags) \ static OSSL_FUNC_cipher_get_params_fn aes_##kbits##_##lcmode##_get_params; \ static int aes_##kbits##_##lcmode##_get_params(OSSL_PARAM params[]) \ { \ return ossl_cipher_generic_get_params(params, EVP_CIPH_##UCMODE##_MODE, \ flags, 2 * kbits, AES_XTS_BLOCK_BITS, \ AES_XTS_IV_BITS); \ } \ static OSSL_FUNC_cipher_newctx_fn aes_##kbits##_xts_newctx; \ static void *aes_##kbits##_xts_newctx(void *provctx) \ { \ return aes_xts_newctx(provctx, EVP_CIPH_##UCMODE##_MODE, flags, 2 * kbits, \ AES_XTS_BLOCK_BITS, AES_XTS_IV_BITS); \ } \ const OSSL_DISPATCH ossl_aes##kbits##xts_functions[] = { \ { OSSL_FUNC_CIPHER_NEWCTX, (void (*)(void))aes_##kbits##_xts_newctx }, \ { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))aes_xts_einit }, \ { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))aes_xts_dinit }, \ { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))aes_xts_stream_update }, \ { OSSL_FUNC_CIPHER_FINAL, (void (*)(void))aes_xts_stream_final }, \ { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))aes_xts_cipher }, \ { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))aes_xts_freectx }, \ { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))aes_xts_dupctx }, \ { OSSL_FUNC_CIPHER_GET_PARAMS, \ (void (*)(void))aes_##kbits##_##lcmode##_get_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_params }, \ { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_get_ctx_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_ctx_params }, \ { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, \ (void (*)(void))aes_xts_set_ctx_params }, \ { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, \ (void (*)(void))aes_xts_settable_ctx_params }, \ OSSL_DISPATCH_END \ } IMPLEMENT_cipher(xts, XTS, 256, AES_XTS_FLAGS); IMPLEMENT_cipher(xts, XTS, 128, AES_XTS_FLAGS);
./openssl/providers/implementations/ciphers/cipher_sm4_xts_hw.c
/* * Copyright 2022-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "cipher_sm4_xts.h" #define XTS_SET_KEY_FN(fn_set_enc_key, fn_set_dec_key, \ fn_block_enc, fn_block_dec, \ fn_stream, fn_stream_gb) { \ size_t bytes = keylen / 2; \ \ if (ctx->enc) { \ fn_set_enc_key(key, &xctx->ks1.ks); \ xctx->xts.block1 = (block128_f)fn_block_enc; \ } else { \ fn_set_dec_key(key, &xctx->ks1.ks); \ xctx->xts.block1 = (block128_f)fn_block_dec; \ } \ fn_set_enc_key(key + bytes, &xctx->ks2.ks); \ xctx->xts.block2 = (block128_f)fn_block_enc; \ xctx->xts.key1 = &xctx->ks1; \ xctx->xts.key2 = &xctx->ks2; \ xctx->stream = fn_stream; \ xctx->stream_gb = fn_stream_gb; \ } static int cipher_hw_sm4_xts_generic_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_SM4_XTS_CTX *xctx = (PROV_SM4_XTS_CTX *)ctx; OSSL_xts_stream_fn stream = NULL; OSSL_xts_stream_fn stream_gb = NULL; #ifdef HWSM4_CAPABLE if (HWSM4_CAPABLE) { XTS_SET_KEY_FN(HWSM4_set_encrypt_key, HWSM4_set_decrypt_key, HWSM4_encrypt, HWSM4_decrypt, stream, stream_gb); return 1; } else #endif /* HWSM4_CAPABLE */ #ifdef VPSM4_EX_CAPABLE if (VPSM4_EX_CAPABLE) { stream = vpsm4_ex_xts_encrypt; stream_gb = vpsm4_ex_xts_encrypt_gb; XTS_SET_KEY_FN(vpsm4_ex_set_encrypt_key, vpsm4_ex_set_decrypt_key, vpsm4_ex_encrypt, vpsm4_ex_decrypt, stream, stream_gb); return 1; } else #endif /* VPSM4_EX_CAPABLE */ #ifdef VPSM4_CAPABLE if (VPSM4_CAPABLE) { stream = vpsm4_xts_encrypt; stream_gb = vpsm4_xts_encrypt_gb; XTS_SET_KEY_FN(vpsm4_set_encrypt_key, vpsm4_set_decrypt_key, vpsm4_encrypt, vpsm4_decrypt, stream, stream_gb); return 1; } else #endif /* VPSM4_CAPABLE */ { (void)0; } { XTS_SET_KEY_FN(ossl_sm4_set_key, ossl_sm4_set_key, ossl_sm4_encrypt, ossl_sm4_decrypt, stream, stream_gb); } return 1; } static void cipher_hw_sm4_xts_copyctx(PROV_CIPHER_CTX *dst, const PROV_CIPHER_CTX *src) { PROV_SM4_XTS_CTX *sctx = (PROV_SM4_XTS_CTX *)src; PROV_SM4_XTS_CTX *dctx = (PROV_SM4_XTS_CTX *)dst; *dctx = *sctx; dctx->xts.key1 = &dctx->ks1.ks; dctx->xts.key2 = &dctx->ks2.ks; } static const PROV_CIPHER_HW sm4_generic_xts = { cipher_hw_sm4_xts_generic_initkey, NULL, cipher_hw_sm4_xts_copyctx }; #if defined(__riscv) && __riscv_xlen == 64 # include "cipher_sm4_xts_hw_rv64i.inc" #else const PROV_CIPHER_HW *ossl_prov_cipher_hw_sm4_xts(size_t keybits) { return &sm4_generic_xts; } #endif
./openssl/providers/implementations/ciphers/ciphercommon_local.h
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "prov/ciphercommon.h" void ossl_cipher_padblock(unsigned char *buf, size_t *buflen, size_t blocksize); int ossl_cipher_unpadblock(unsigned char *buf, size_t *buflen, size_t blocksize); int ossl_cipher_tlsunpadblock(OSSL_LIB_CTX *libctx, unsigned int tlsversion, unsigned char *buf, size_t *buflen, size_t blocksize, unsigned char **mac, int *alloced, size_t macsize, int aead);
./openssl/providers/implementations/ciphers/cipher_camellia.h
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/camellia.h> #include "prov/ciphercommon.h" #include "crypto/cmll_platform.h" typedef struct prov_camellia_ctx_st { PROV_CIPHER_CTX base; /* Must be first */ union { OSSL_UNION_ALIGN; CAMELLIA_KEY ks; } ks; } PROV_CAMELLIA_CTX; #define ossl_prov_cipher_hw_camellia_ofb ossl_prov_cipher_hw_camellia_ofb128 #define ossl_prov_cipher_hw_camellia_cfb ossl_prov_cipher_hw_camellia_cfb128 const PROV_CIPHER_HW *ossl_prov_cipher_hw_camellia_ecb(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_camellia_cbc(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_camellia_ofb128(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_camellia_cfb128(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_camellia_cfb1(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_camellia_cfb8(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_camellia_ctr(size_t keybits);
./openssl/providers/implementations/ciphers/cipher_null.c
/* * Copyright 2020-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <string.h> #include <openssl/crypto.h> #include <openssl/core_dispatch.h> #include <openssl/proverr.h> #include "prov/implementations.h" #include "prov/ciphercommon.h" #include "prov/providercommon.h" typedef struct prov_cipher_null_ctx_st { int enc; size_t tlsmacsize; const unsigned char *tlsmac; } PROV_CIPHER_NULL_CTX; static OSSL_FUNC_cipher_newctx_fn null_newctx; static void *null_newctx(void *provctx) { if (!ossl_prov_is_running()) return NULL; return OPENSSL_zalloc(sizeof(PROV_CIPHER_NULL_CTX)); } static OSSL_FUNC_cipher_freectx_fn null_freectx; static void null_freectx(void *vctx) { OPENSSL_free(vctx); } static OSSL_FUNC_cipher_encrypt_init_fn null_einit; static int null_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { PROV_CIPHER_NULL_CTX *ctx = (PROV_CIPHER_NULL_CTX *)vctx; if (!ossl_prov_is_running()) return 0; ctx->enc = 1; return 1; } static OSSL_FUNC_cipher_decrypt_init_fn null_dinit; static int null_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { if (!ossl_prov_is_running()) return 0; return 1; } static OSSL_FUNC_cipher_cipher_fn null_cipher; static int null_cipher(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { PROV_CIPHER_NULL_CTX *ctx = (PROV_CIPHER_NULL_CTX *)vctx; if (!ossl_prov_is_running()) return 0; if (!ctx->enc && ctx->tlsmacsize > 0) { /* * TLS NULL cipher as per: * https://tools.ietf.org/html/rfc5246#section-6.2.3.1 */ if (inl < ctx->tlsmacsize) return 0; ctx->tlsmac = in + inl - ctx->tlsmacsize; inl -= ctx->tlsmacsize; } if (outsize < inl) return 0; if (in != out) memcpy(out, in, inl); *outl = inl; return 1; } static OSSL_FUNC_cipher_final_fn null_final; static int null_final(void *vctx, unsigned char *out, size_t *outl, size_t outsize) { if (!ossl_prov_is_running()) return 0; *outl = 0; return 1; } static OSSL_FUNC_cipher_get_params_fn null_get_params; static int null_get_params(OSSL_PARAM params[]) { return ossl_cipher_generic_get_params(params, 0, 0, 0, 8, 0); } static const OSSL_PARAM null_known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL), { OSSL_CIPHER_PARAM_TLS_MAC, OSSL_PARAM_OCTET_PTR, NULL, 0, OSSL_PARAM_UNMODIFIED }, OSSL_PARAM_END }; static OSSL_FUNC_cipher_gettable_ctx_params_fn null_gettable_ctx_params; static const OSSL_PARAM *null_gettable_ctx_params(ossl_unused void *cctx, ossl_unused void *provctx) { return null_known_gettable_ctx_params; } static OSSL_FUNC_cipher_get_ctx_params_fn null_get_ctx_params; static int null_get_ctx_params(void *vctx, OSSL_PARAM params[]) { PROV_CIPHER_NULL_CTX *ctx = (PROV_CIPHER_NULL_CTX *)vctx; OSSL_PARAM *p; p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IVLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, 0)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, 0)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_TLS_MAC); if (p != NULL && !OSSL_PARAM_set_octet_ptr(p, ctx->tlsmac, ctx->tlsmacsize)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } return 1; } static const OSSL_PARAM null_known_settable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_TLS_MAC_SIZE, NULL), OSSL_PARAM_END }; static OSSL_FUNC_cipher_settable_ctx_params_fn null_settable_ctx_params; static const OSSL_PARAM *null_settable_ctx_params(ossl_unused void *cctx, ossl_unused void *provctx) { return null_known_settable_ctx_params; } static OSSL_FUNC_cipher_set_ctx_params_fn null_set_ctx_params; static int null_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { PROV_CIPHER_NULL_CTX *ctx = (PROV_CIPHER_NULL_CTX *)vctx; const OSSL_PARAM *p; p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_TLS_MAC_SIZE); if (p != NULL) { if (!OSSL_PARAM_get_size_t(p, &ctx->tlsmacsize)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } } return 1; } const OSSL_DISPATCH ossl_null_functions[] = { { OSSL_FUNC_CIPHER_NEWCTX, (void (*)(void)) null_newctx }, { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void)) null_freectx }, { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void)) null_newctx }, { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))null_einit }, { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))null_dinit }, { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))null_cipher }, { OSSL_FUNC_CIPHER_FINAL, (void (*)(void))null_final }, { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))null_cipher }, { OSSL_FUNC_CIPHER_GET_PARAMS, (void (*)(void)) null_get_params }, { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, (void (*)(void))ossl_cipher_generic_gettable_params }, { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, (void (*)(void))null_get_ctx_params }, { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, (void (*)(void))null_gettable_ctx_params }, { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, (void (*)(void))null_set_ctx_params }, { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, (void (*)(void))null_settable_ctx_params }, OSSL_DISPATCH_END };
./openssl/providers/implementations/ciphers/cipher_camellia.c
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * Camellia low level APIs are deprecated for public use, but still ok for * internal use. */ #include "internal/deprecated.h" /* Dispatch functions for CAMELLIA cipher modes ecb, cbc, ofb, cfb, ctr */ #include "cipher_camellia.h" #include "prov/implementations.h" #include "prov/providercommon.h" static OSSL_FUNC_cipher_freectx_fn camellia_freectx; static OSSL_FUNC_cipher_dupctx_fn camellia_dupctx; static void camellia_freectx(void *vctx) { PROV_CAMELLIA_CTX *ctx = (PROV_CAMELLIA_CTX *)vctx; ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } static void *camellia_dupctx(void *ctx) { PROV_CAMELLIA_CTX *in = (PROV_CAMELLIA_CTX *)ctx; PROV_CAMELLIA_CTX *ret; if (!ossl_prov_is_running()) return NULL; ret = OPENSSL_malloc(sizeof(*ret)); if (ret == NULL) return NULL; in->base.hw->copyctx(&ret->base, &in->base); return ret; } /* ossl_camellia256ecb_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, ecb, ECB, 0, 256, 128, 0, block) /* ossl_camellia192ecb_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, ecb, ECB, 0, 192, 128, 0, block) /* ossl_camellia128ecb_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, ecb, ECB, 0, 128, 128, 0, block) /* ossl_camellia256cbc_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, cbc, CBC, 0, 256, 128, 128, block) /* ossl_camellia192cbc_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, cbc, CBC, 0, 192, 128, 128, block) /* ossl_camellia128cbc_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, cbc, CBC, 0, 128, 128, 128, block) /* ossl_camellia256ofb_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, ofb, OFB, 0, 256, 8, 128, stream) /* ossl_camellia192ofb_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, ofb, OFB, 0, 192, 8, 128, stream) /* ossl_camellia128ofb_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, ofb, OFB, 0, 128, 8, 128, stream) /* ossl_camellia256cfb_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, cfb, CFB, 0, 256, 8, 128, stream) /* ossl_camellia192cfb_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, cfb, CFB, 0, 192, 8, 128, stream) /* ossl_camellia128cfb_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, cfb, CFB, 0, 128, 8, 128, stream) /* ossl_camellia256cfb1_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, cfb1, CFB, 0, 256, 8, 128, stream) /* ossl_camellia192cfb1_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, cfb1, CFB, 0, 192, 8, 128, stream) /* ossl_camellia128cfb1_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, cfb1, CFB, 0, 128, 8, 128, stream) /* ossl_camellia256cfb8_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, cfb8, CFB, 0, 256, 8, 128, stream) /* ossl_camellia192cfb8_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, cfb8, CFB, 0, 192, 8, 128, stream) /* ossl_camellia128cfb8_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, cfb8, CFB, 0, 128, 8, 128, stream) /* ossl_camellia256ctr_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, ctr, CTR, 0, 256, 8, 128, stream) /* ossl_camellia192ctr_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, ctr, CTR, 0, 192, 8, 128, stream) /* ossl_camellia128ctr_functions */ IMPLEMENT_generic_cipher(camellia, CAMELLIA, ctr, CTR, 0, 128, 8, 128, stream) #include "cipher_camellia_cts.inc"
./openssl/providers/implementations/ciphers/cipher_aes_gcm_hw.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for AES GCM mode */ /* * This file uses the low level AES functions (which are deprecated for * non-internal use) in order to implement provider AES ciphers. */ #include "internal/deprecated.h" #include "cipher_aes_gcm.h" static int aes_gcm_initkey(PROV_GCM_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_AES_GCM_CTX *actx = (PROV_AES_GCM_CTX *)ctx; AES_KEY *ks = &actx->ks.ks; # ifdef HWAES_CAPABLE if (HWAES_CAPABLE) { # ifdef HWAES_ctr32_encrypt_blocks GCM_HW_SET_KEY_CTR_FN(ks, HWAES_set_encrypt_key, HWAES_encrypt, HWAES_ctr32_encrypt_blocks); # else GCM_HW_SET_KEY_CTR_FN(ks, HWAES_set_encrypt_key, HWAES_encrypt, NULL); # endif /* HWAES_ctr32_encrypt_blocks */ } else # endif /* HWAES_CAPABLE */ # ifdef BSAES_CAPABLE if (BSAES_CAPABLE) { GCM_HW_SET_KEY_CTR_FN(ks, AES_set_encrypt_key, AES_encrypt, ossl_bsaes_ctr32_encrypt_blocks); } else # endif /* BSAES_CAPABLE */ # ifdef VPAES_CAPABLE if (VPAES_CAPABLE) { GCM_HW_SET_KEY_CTR_FN(ks, vpaes_set_encrypt_key, vpaes_encrypt, NULL); } else # endif /* VPAES_CAPABLE */ { # ifdef AES_CTR_ASM GCM_HW_SET_KEY_CTR_FN(ks, AES_set_encrypt_key, AES_encrypt, AES_ctr32_encrypt); # else GCM_HW_SET_KEY_CTR_FN(ks, AES_set_encrypt_key, AES_encrypt, NULL); # endif /* AES_CTR_ASM */ } return 1; } static int generic_aes_gcm_cipher_update(PROV_GCM_CTX *ctx, const unsigned char *in, size_t len, unsigned char *out) { if (ctx->enc) { if (ctx->ctr != NULL) { #if defined(AES_GCM_ASM) size_t bulk = 0; if (len >= AES_GCM_ENC_BYTES && AES_GCM_ASM(ctx)) { size_t res = (16 - ctx->gcm.mres) % 16; if (CRYPTO_gcm128_encrypt(&ctx->gcm, in, out, res)) return 0; bulk = AES_gcm_encrypt(in + res, out + res, len - res, ctx->gcm.key, ctx->gcm.Yi.c, ctx->gcm.Xi.u); ctx->gcm.len.u[1] += bulk; bulk += res; } if (CRYPTO_gcm128_encrypt_ctr32(&ctx->gcm, in + bulk, out + bulk, len - bulk, ctx->ctr)) return 0; #else if (CRYPTO_gcm128_encrypt_ctr32(&ctx->gcm, in, out, len, ctx->ctr)) return 0; #endif /* AES_GCM_ASM */ } else { if (CRYPTO_gcm128_encrypt(&ctx->gcm, in, out, len)) return 0; } } else { if (ctx->ctr != NULL) { #if defined(AES_GCM_ASM) size_t bulk = 0; if (len >= AES_GCM_DEC_BYTES && AES_GCM_ASM(ctx)) { size_t res = (16 - ctx->gcm.mres) % 16; if (CRYPTO_gcm128_decrypt(&ctx->gcm, in, out, res)) return 0; bulk = AES_gcm_decrypt(in + res, out + res, len - res, ctx->gcm.key, ctx->gcm.Yi.c, ctx->gcm.Xi.u); ctx->gcm.len.u[1] += bulk; bulk += res; } if (CRYPTO_gcm128_decrypt_ctr32(&ctx->gcm, in + bulk, out + bulk, len - bulk, ctx->ctr)) return 0; #else if (CRYPTO_gcm128_decrypt_ctr32(&ctx->gcm, in, out, len, ctx->ctr)) return 0; #endif /* AES_GCM_ASM */ } else { if (CRYPTO_gcm128_decrypt(&ctx->gcm, in, out, len)) return 0; } } return 1; } static const PROV_GCM_HW aes_gcm = { aes_gcm_initkey, ossl_gcm_setiv, ossl_gcm_aad_update, generic_aes_gcm_cipher_update, ossl_gcm_cipher_final, ossl_gcm_one_shot }; #if defined(S390X_aes_128_CAPABLE) # include "cipher_aes_gcm_hw_s390x.inc" #elif defined(AESNI_CAPABLE) # include "cipher_aes_gcm_hw_aesni.inc" #elif defined(SPARC_AES_CAPABLE) # include "cipher_aes_gcm_hw_t4.inc" #elif defined(AES_PMULL_CAPABLE) && defined(AES_GCM_ASM) # include "cipher_aes_gcm_hw_armv8.inc" #elif defined(PPC_AES_GCM_CAPABLE) && defined(_ARCH_PPC64) # include "cipher_aes_gcm_hw_ppc.inc" #elif defined(__riscv) && __riscv_xlen == 64 # include "cipher_aes_gcm_hw_rv64i.inc" #elif defined(__riscv) && __riscv_xlen == 32 # include "cipher_aes_gcm_hw_rv32i.inc" #else const PROV_GCM_HW *ossl_prov_aes_hw_gcm(size_t keybits) { return &aes_gcm; } #endif
./openssl/providers/implementations/ciphers/cipher_seed.c
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for Seed cipher modes ecb, cbc, ofb, cfb */ /* * SEED low level APIs are deprecated for public use, but still ok for * internal use. */ #include "internal/deprecated.h" #include "cipher_seed.h" #include "prov/implementations.h" #include "prov/providercommon.h" static OSSL_FUNC_cipher_freectx_fn seed_freectx; static OSSL_FUNC_cipher_dupctx_fn seed_dupctx; static void seed_freectx(void *vctx) { PROV_SEED_CTX *ctx = (PROV_SEED_CTX *)vctx; ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } static void *seed_dupctx(void *ctx) { PROV_SEED_CTX *in = (PROV_SEED_CTX *)ctx; PROV_SEED_CTX *ret; if (!ossl_prov_is_running()) return NULL; ret = OPENSSL_malloc(sizeof(*ret)); if (ret == NULL) return NULL; *ret = *in; return ret; } /* ossl_seed128ecb_functions */ IMPLEMENT_generic_cipher(seed, SEED, ecb, ECB, 0, 128, 128, 0, block) /* ossl_seed128cbc_functions */ IMPLEMENT_generic_cipher(seed, SEED, cbc, CBC, 0, 128, 128, 128, block) /* ossl_seed128ofb128_functions */ IMPLEMENT_generic_cipher(seed, SEED, ofb128, OFB, 0, 128, 8, 128, stream) /* ossl_seed128cfb128_functions */ IMPLEMENT_generic_cipher(seed, SEED, cfb128, CFB, 0, 128, 8, 128, stream)
./openssl/providers/implementations/ciphers/cipher_chacha20_poly1305.h
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for chacha20_poly1305 cipher */ #include "include/crypto/poly1305.h" #include "cipher_chacha20.h" #define NO_TLS_PAYLOAD_LENGTH ((size_t)-1) #define CHACHA20_POLY1305_IVLEN 12 typedef struct { PROV_CIPHER_CTX base; /* must be first */ PROV_CHACHA20_CTX chacha; POLY1305 poly1305; unsigned int nonce[12 / 4]; unsigned char tag[POLY1305_BLOCK_SIZE]; unsigned char tls_aad[POLY1305_BLOCK_SIZE]; struct { uint64_t aad, text; } len; unsigned int aad : 1; unsigned int mac_inited : 1; size_t tag_len; size_t tls_payload_length; size_t tls_aad_pad_sz; } PROV_CHACHA20_POLY1305_CTX; typedef struct prov_cipher_hw_chacha_aead_st { PROV_CIPHER_HW base; /* must be first */ int (*aead_cipher)(PROV_CIPHER_CTX *dat, unsigned char *out, size_t *outl, const unsigned char *in, size_t len); int (*initiv)(PROV_CIPHER_CTX *ctx); int (*tls_init)(PROV_CIPHER_CTX *ctx, unsigned char *aad, size_t alen); int (*tls_iv_set_fixed)(PROV_CIPHER_CTX *ctx, unsigned char *fixed, size_t flen); } PROV_CIPHER_HW_CHACHA20_POLY1305; const PROV_CIPHER_HW *ossl_prov_cipher_hw_chacha20_poly1305(size_t keybits);
./openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * AES low level APIs are deprecated for public use, but still ok for internal * use where we're using them to implement the higher level EVP interface, as is * the case here. */ #include "internal/deprecated.h" /* Dispatch functions for AES_CBC_HMAC_SHA ciphers */ /* For SSL3_VERSION and TLS1_VERSION */ #include <openssl/prov_ssl.h> #include <openssl/proverr.h> #include "cipher_aes_cbc_hmac_sha.h" #include "prov/implementations.h" #include "prov/providercommon.h" #ifndef AES_CBC_HMAC_SHA_CAPABLE # define IMPLEMENT_CIPHER(nm, sub, kbits, blkbits, ivbits, flags) \ const OSSL_DISPATCH ossl_##nm##kbits##sub##_functions[] = { \ OSSL_DISPATCH_END \ }; #else # define AES_CBC_HMAC_SHA_FLAGS (PROV_CIPHER_FLAG_AEAD \ | PROV_CIPHER_FLAG_TLS1_MULTIBLOCK) static OSSL_FUNC_cipher_encrypt_init_fn aes_einit; static OSSL_FUNC_cipher_decrypt_init_fn aes_dinit; static OSSL_FUNC_cipher_freectx_fn aes_cbc_hmac_sha1_freectx; static OSSL_FUNC_cipher_freectx_fn aes_cbc_hmac_sha256_freectx; static OSSL_FUNC_cipher_get_ctx_params_fn aes_get_ctx_params; static OSSL_FUNC_cipher_gettable_ctx_params_fn aes_gettable_ctx_params; static OSSL_FUNC_cipher_set_ctx_params_fn aes_set_ctx_params; static OSSL_FUNC_cipher_settable_ctx_params_fn aes_settable_ctx_params; # define aes_gettable_params ossl_cipher_generic_gettable_params # define aes_update ossl_cipher_generic_stream_update # define aes_final ossl_cipher_generic_stream_final # define aes_cipher ossl_cipher_generic_cipher static int aes_einit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL)) return 0; return aes_set_ctx_params(ctx, params); } static int aes_dinit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL)) return 0; return aes_set_ctx_params(ctx, params); } static const OSSL_PARAM cipher_aes_known_settable_ctx_params[] = { OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_MAC_KEY, NULL, 0), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TLS1_AAD, NULL, 0), # if !defined(OPENSSL_NO_MULTIBLOCK) OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_MAX_SEND_FRAGMENT, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_AAD, NULL), OSSL_PARAM_uint(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_INTERLEAVE, NULL), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_ENC, NULL, 0), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_ENC_IN, NULL, 0), # endif /* !defined(OPENSSL_NO_MULTIBLOCK) */ OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), OSSL_PARAM_END }; const OSSL_PARAM *aes_settable_ctx_params(ossl_unused void *cctx, ossl_unused void *provctx) { return cipher_aes_known_settable_ctx_params; } static int aes_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { PROV_AES_HMAC_SHA_CTX *ctx = (PROV_AES_HMAC_SHA_CTX *)vctx; PROV_CIPHER_HW_AES_HMAC_SHA *hw = (PROV_CIPHER_HW_AES_HMAC_SHA *)ctx->hw; const OSSL_PARAM *p; int ret = 1; # if !defined(OPENSSL_NO_MULTIBLOCK) EVP_CTRL_TLS1_1_MULTIBLOCK_PARAM mb_param; # endif if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_AEAD_MAC_KEY); if (p != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } hw->init_mac_key(ctx, p->data, p->data_size); } # if !defined(OPENSSL_NO_MULTIBLOCK) p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_MAX_SEND_FRAGMENT); if (p != NULL && !OSSL_PARAM_get_size_t(p, &ctx->multiblock_max_send_fragment)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } /* * The inputs to tls1_multiblock_aad are: * mb_param->inp * mb_param->len * mb_param->interleave * The outputs of tls1_multiblock_aad are written to: * ctx->multiblock_interleave * ctx->multiblock_aad_packlen */ p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_AAD); if (p != NULL) { const OSSL_PARAM *p1 = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_INTERLEAVE); if (p->data_type != OSSL_PARAM_OCTET_STRING || p1 == NULL || !OSSL_PARAM_get_uint(p1, &mb_param.interleave)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } mb_param.inp = p->data; mb_param.len = p->data_size; if (hw->tls1_multiblock_aad(vctx, &mb_param) <= 0) return 0; } /* * The inputs to tls1_multiblock_encrypt are: * mb_param->inp * mb_param->len * mb_param->interleave * mb_param->out * The outputs of tls1_multiblock_encrypt are: * ctx->multiblock_encrypt_len */ p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_ENC); if (p != NULL) { const OSSL_PARAM *p1 = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_INTERLEAVE); const OSSL_PARAM *pin = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_ENC_IN); if (p->data_type != OSSL_PARAM_OCTET_STRING || pin == NULL || pin->data_type != OSSL_PARAM_OCTET_STRING || p1 == NULL || !OSSL_PARAM_get_uint(p1, &mb_param.interleave)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } mb_param.out = p->data; mb_param.inp = pin->data; mb_param.len = pin->data_size; if (hw->tls1_multiblock_encrypt(vctx, &mb_param) <= 0) return 0; } # endif /* !defined(OPENSSL_NO_MULTIBLOCK) */ p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_AEAD_TLS1_AAD); if (p != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (hw->set_tls1_aad(ctx, p->data, p->data_size) <= 0) return 0; } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL) { size_t keylen; if (!OSSL_PARAM_get_size_t(p, &keylen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (ctx->base.keylen != keylen) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_TLS_VERSION); if (p != NULL) { if (!OSSL_PARAM_get_uint(p, &ctx->base.tlsversion)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (ctx->base.tlsversion == SSL3_VERSION || ctx->base.tlsversion == TLS1_VERSION) { if (!ossl_assert(ctx->base.removetlsfixed >= AES_BLOCK_SIZE)) { ERR_raise(ERR_LIB_PROV, ERR_R_INTERNAL_ERROR); return 0; } /* * There is no explicit IV with these TLS versions, so don't attempt * to remove it. */ ctx->base.removetlsfixed -= AES_BLOCK_SIZE; } } return ret; } static int aes_get_ctx_params(void *vctx, OSSL_PARAM params[]) { PROV_AES_HMAC_SHA_CTX *ctx = (PROV_AES_HMAC_SHA_CTX *)vctx; OSSL_PARAM *p; # if !defined(OPENSSL_NO_MULTIBLOCK) p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_MAX_BUFSIZE); if (p != NULL) { PROV_CIPHER_HW_AES_HMAC_SHA *hw = (PROV_CIPHER_HW_AES_HMAC_SHA *)ctx->hw; size_t len = hw->tls1_multiblock_max_bufsize(ctx); if (!OSSL_PARAM_set_size_t(p, len)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_INTERLEAVE); if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->multiblock_interleave)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_AAD_PACKLEN); if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->multiblock_aad_packlen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_ENC_LEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->multiblock_encrypt_len)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } # endif /* !defined(OPENSSL_NO_MULTIBLOCK) */ p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_AEAD_TLS1_AAD_PAD); if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->tls_aad_pad)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->base.keylen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IVLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->base.ivlen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IV); if (p != NULL && !OSSL_PARAM_set_octet_string(p, ctx->base.oiv, ctx->base.ivlen) && !OSSL_PARAM_set_octet_ptr(p, &ctx->base.oiv, ctx->base.ivlen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_UPDATED_IV); if (p != NULL && !OSSL_PARAM_set_octet_string(p, ctx->base.iv, ctx->base.ivlen) && !OSSL_PARAM_set_octet_ptr(p, &ctx->base.iv, ctx->base.ivlen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } return 1; } static const OSSL_PARAM cipher_aes_known_gettable_ctx_params[] = { # if !defined(OPENSSL_NO_MULTIBLOCK) OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_MAX_BUFSIZE, NULL), OSSL_PARAM_uint(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_INTERLEAVE, NULL), OSSL_PARAM_uint(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_AAD_PACKLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_ENC_LEN, NULL), # endif /* !defined(OPENSSL_NO_MULTIBLOCK) */ OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_AEAD_TLS1_AAD_PAD, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_IV, NULL, 0), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_UPDATED_IV, NULL, 0), OSSL_PARAM_END }; const OSSL_PARAM *aes_gettable_ctx_params(ossl_unused void *cctx, ossl_unused void *provctx) { return cipher_aes_known_gettable_ctx_params; } static void base_init(void *provctx, PROV_AES_HMAC_SHA_CTX *ctx, const PROV_CIPHER_HW_AES_HMAC_SHA *meths, size_t kbits, size_t blkbits, size_t ivbits, uint64_t flags) { ossl_cipher_generic_initkey(&ctx->base, kbits, blkbits, ivbits, EVP_CIPH_CBC_MODE, flags, &meths->base, provctx); ctx->hw = (PROV_CIPHER_HW_AES_HMAC_SHA *)ctx->base.hw; } static void *aes_cbc_hmac_sha1_newctx(void *provctx, size_t kbits, size_t blkbits, size_t ivbits, uint64_t flags) { PROV_AES_HMAC_SHA1_CTX *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) base_init(provctx, &ctx->base_ctx, ossl_prov_cipher_hw_aes_cbc_hmac_sha1(), kbits, blkbits, ivbits, flags); return ctx; } static void *aes_cbc_hmac_sha1_dupctx(void *provctx) { PROV_AES_HMAC_SHA1_CTX *ctx = provctx; if (ctx == NULL) return NULL; return OPENSSL_memdup(ctx, sizeof(*ctx)); } static void aes_cbc_hmac_sha1_freectx(void *vctx) { PROV_AES_HMAC_SHA1_CTX *ctx = (PROV_AES_HMAC_SHA1_CTX *)vctx; if (ctx != NULL) { ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } } static void *aes_cbc_hmac_sha256_newctx(void *provctx, size_t kbits, size_t blkbits, size_t ivbits, uint64_t flags) { PROV_AES_HMAC_SHA256_CTX *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) base_init(provctx, &ctx->base_ctx, ossl_prov_cipher_hw_aes_cbc_hmac_sha256(), kbits, blkbits, ivbits, flags); return ctx; } static void *aes_cbc_hmac_sha256_dupctx(void *provctx) { PROV_AES_HMAC_SHA256_CTX *ctx = provctx; return OPENSSL_memdup(ctx, sizeof(*ctx)); } static void aes_cbc_hmac_sha256_freectx(void *vctx) { PROV_AES_HMAC_SHA256_CTX *ctx = (PROV_AES_HMAC_SHA256_CTX *)vctx; if (ctx != NULL) { ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } } # define IMPLEMENT_CIPHER(nm, sub, kbits, blkbits, ivbits, flags) \ static OSSL_FUNC_cipher_newctx_fn nm##_##kbits##_##sub##_newctx; \ static void *nm##_##kbits##_##sub##_newctx(void *provctx) \ { \ return nm##_##sub##_newctx(provctx, kbits, blkbits, ivbits, flags); \ } \ static OSSL_FUNC_cipher_get_params_fn nm##_##kbits##_##sub##_get_params; \ static int nm##_##kbits##_##sub##_get_params(OSSL_PARAM params[]) \ { \ return ossl_cipher_generic_get_params(params, EVP_CIPH_CBC_MODE, \ flags, kbits, blkbits, ivbits); \ } \ const OSSL_DISPATCH ossl_##nm##kbits##sub##_functions[] = { \ { OSSL_FUNC_CIPHER_NEWCTX, (void (*)(void))nm##_##kbits##_##sub##_newctx },\ { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))nm##_##sub##_freectx }, \ { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))nm##_##sub##_dupctx}, \ { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))nm##_einit }, \ { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))nm##_dinit }, \ { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))nm##_update }, \ { OSSL_FUNC_CIPHER_FINAL, (void (*)(void))nm##_final }, \ { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))nm##_cipher }, \ { OSSL_FUNC_CIPHER_GET_PARAMS, \ (void (*)(void))nm##_##kbits##_##sub##_get_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, \ (void (*)(void))nm##_gettable_params }, \ { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, \ (void (*)(void))nm##_get_ctx_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, \ (void (*)(void))nm##_gettable_ctx_params }, \ { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, \ (void (*)(void))nm##_set_ctx_params }, \ { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, \ (void (*)(void))nm##_settable_ctx_params }, \ OSSL_DISPATCH_END \ }; #endif /* AES_CBC_HMAC_SHA_CAPABLE */ /* ossl_aes128cbc_hmac_sha1_functions */ IMPLEMENT_CIPHER(aes, cbc_hmac_sha1, 128, 128, 128, AES_CBC_HMAC_SHA_FLAGS) /* ossl_aes256cbc_hmac_sha1_functions */ IMPLEMENT_CIPHER(aes, cbc_hmac_sha1, 256, 128, 128, AES_CBC_HMAC_SHA_FLAGS) /* ossl_aes128cbc_hmac_sha256_functions */ IMPLEMENT_CIPHER(aes, cbc_hmac_sha256, 128, 128, 128, AES_CBC_HMAC_SHA_FLAGS) /* ossl_aes256cbc_hmac_sha256_functions */ IMPLEMENT_CIPHER(aes, cbc_hmac_sha256, 256, 128, 128, AES_CBC_HMAC_SHA_FLAGS)
./openssl/providers/implementations/ciphers/cipher_aria_gcm.h
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "crypto/aria.h" #include "prov/ciphercommon.h" #include "prov/ciphercommon_gcm.h" typedef struct prov_aria_gcm_ctx_st { PROV_GCM_CTX base; /* must be first entry in struct */ union { OSSL_UNION_ALIGN; ARIA_KEY ks; } ks; } PROV_ARIA_GCM_CTX; const PROV_GCM_HW *ossl_prov_aria_hw_gcm(size_t keybits);
./openssl/providers/implementations/ciphers/cipher_aes_ocb_hw.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * This file uses the low level AES functions (which are deprecated for * non-internal use) in order to implement provider AES ciphers. */ #include "internal/deprecated.h" #include "cipher_aes_ocb.h" #define OCB_SET_KEY_FN(fn_set_enc_key, fn_set_dec_key, \ fn_block_enc, fn_block_dec, \ fn_stream_enc, fn_stream_dec) \ CRYPTO_ocb128_cleanup(&ctx->ocb); \ fn_set_enc_key(key, keylen * 8, &ctx->ksenc.ks); \ fn_set_dec_key(key, keylen * 8, &ctx->ksdec.ks); \ if (!CRYPTO_ocb128_init(&ctx->ocb, &ctx->ksenc.ks, &ctx->ksdec.ks, \ (block128_f)fn_block_enc, (block128_f)fn_block_dec, \ ctx->base.enc ? (ocb128_f)fn_stream_enc : \ (ocb128_f)fn_stream_dec)) \ return 0; \ ctx->key_set = 1 static int cipher_hw_aes_ocb_generic_initkey(PROV_CIPHER_CTX *vctx, const unsigned char *key, size_t keylen) { PROV_AES_OCB_CTX *ctx = (PROV_AES_OCB_CTX *)vctx; /* * We set both the encrypt and decrypt key here because decrypt * needs both. (i.e- AAD uses encrypt). */ # ifdef HWAES_CAPABLE if (HWAES_CAPABLE) { OCB_SET_KEY_FN(HWAES_set_encrypt_key, HWAES_set_decrypt_key, HWAES_encrypt, HWAES_decrypt, HWAES_ocb_encrypt, HWAES_ocb_decrypt); } else # endif # ifdef VPAES_CAPABLE if (VPAES_CAPABLE) { OCB_SET_KEY_FN(vpaes_set_encrypt_key, vpaes_set_decrypt_key, vpaes_encrypt, vpaes_decrypt, NULL, NULL); } else # endif { OCB_SET_KEY_FN(AES_set_encrypt_key, AES_set_decrypt_key, AES_encrypt, AES_decrypt, NULL, NULL); } return 1; } # if defined(AESNI_CAPABLE) static int cipher_hw_aes_ocb_aesni_initkey(PROV_CIPHER_CTX *vctx, const unsigned char *key, size_t keylen) { PROV_AES_OCB_CTX *ctx = (PROV_AES_OCB_CTX *)vctx; OCB_SET_KEY_FN(aesni_set_encrypt_key, aesni_set_decrypt_key, aesni_encrypt, aesni_decrypt, aesni_ocb_encrypt, aesni_ocb_decrypt); return 1; } # define PROV_CIPHER_HW_declare() \ static const PROV_CIPHER_HW aesni_ocb = { \ cipher_hw_aes_ocb_aesni_initkey, \ NULL \ }; # define PROV_CIPHER_HW_select() \ if (AESNI_CAPABLE) \ return &aesni_ocb; #elif defined(SPARC_AES_CAPABLE) static int cipher_hw_aes_ocb_t4_initkey(PROV_CIPHER_CTX *vctx, const unsigned char *key, size_t keylen) { PROV_AES_OCB_CTX *ctx = (PROV_AES_OCB_CTX *)vctx; OCB_SET_KEY_FN(aes_t4_set_encrypt_key, aes_t4_set_decrypt_key, aes_t4_encrypt, aes_t4_decrypt, NULL, NULL); return 1; } # define PROV_CIPHER_HW_declare() \ static const PROV_CIPHER_HW aes_t4_ocb = { \ cipher_hw_aes_ocb_t4_initkey, \ NULL \ }; # define PROV_CIPHER_HW_select() \ if (SPARC_AES_CAPABLE) \ return &aes_t4_ocb; #elif defined(__riscv) && __riscv_xlen == 64 static int cipher_hw_aes_ocb_rv64i_zknd_zkne_initkey(PROV_CIPHER_CTX *vctx, const unsigned char *key, size_t keylen) { PROV_AES_OCB_CTX *ctx = (PROV_AES_OCB_CTX *)vctx; OCB_SET_KEY_FN(rv64i_zkne_set_encrypt_key, rv64i_zknd_set_decrypt_key, rv64i_zkne_encrypt, rv64i_zknd_decrypt, NULL, NULL); return 1; } static int cipher_hw_aes_ocb_rv64i_zvkned_initkey(PROV_CIPHER_CTX *vctx, const unsigned char *key, size_t keylen) { PROV_AES_OCB_CTX *ctx = (PROV_AES_OCB_CTX *)vctx; /* Zvkned only supports 128 and 256 bit keys. */ if (keylen * 8 == 128 || keylen * 8 == 256) { OCB_SET_KEY_FN(rv64i_zvkned_set_encrypt_key, rv64i_zvkned_set_decrypt_key, rv64i_zvkned_encrypt, rv64i_zvkned_decrypt, NULL, NULL); } else { OCB_SET_KEY_FN(AES_set_encrypt_key, AES_set_encrypt_key, rv64i_zvkned_encrypt, rv64i_zvkned_decrypt, NULL, NULL); } return 1; } # define PROV_CIPHER_HW_declare() \ static const PROV_CIPHER_HW aes_rv64i_zknd_zkne_ocb = { \ cipher_hw_aes_ocb_rv64i_zknd_zkne_initkey, \ NULL \ }; \ static const PROV_CIPHER_HW aes_rv64i_zvkned_ocb = { \ cipher_hw_aes_ocb_rv64i_zvkned_initkey, \ NULL \ }; # define PROV_CIPHER_HW_select() \ if (RISCV_HAS_ZVKNED() && riscv_vlen() >= 128) \ return &aes_rv64i_zvkned_ocb; \ else if (RISCV_HAS_ZKND_AND_ZKNE()) \ return &aes_rv64i_zknd_zkne_ocb; #elif defined(__riscv) && __riscv_xlen == 32 static int cipher_hw_aes_ocb_rv32i_zknd_zkne_initkey(PROV_CIPHER_CTX *vctx, const unsigned char *key, size_t keylen) { PROV_AES_OCB_CTX *ctx = (PROV_AES_OCB_CTX *)vctx; OCB_SET_KEY_FN(rv32i_zkne_set_encrypt_key, rv32i_zknd_zkne_set_decrypt_key, rv32i_zkne_encrypt, rv32i_zknd_decrypt, NULL, NULL); return 1; } static int cipher_hw_aes_ocb_rv32i_zbkb_zknd_zkne_initkey(PROV_CIPHER_CTX *vctx, const unsigned char *key, size_t keylen) { PROV_AES_OCB_CTX *ctx = (PROV_AES_OCB_CTX *)vctx; OCB_SET_KEY_FN(rv32i_zbkb_zkne_set_encrypt_key, rv32i_zbkb_zknd_zkne_set_decrypt_key, rv32i_zkne_encrypt, rv32i_zknd_decrypt, NULL, NULL); return 1; } # define PROV_CIPHER_HW_declare() \ static const PROV_CIPHER_HW aes_rv32i_zknd_zkne_ocb = { \ cipher_hw_aes_ocb_rv32i_zknd_zkne_initkey, \ NULL \ }; \ static const PROV_CIPHER_HW aes_rv32i_zbkb_zknd_zkne_ocb = { \ cipher_hw_aes_ocb_rv32i_zbkb_zknd_zkne_initkey, \ NULL \ }; # define PROV_CIPHER_HW_select() \ if (RISCV_HAS_ZBKB_AND_ZKND_AND_ZKNE()) \ return &aes_rv32i_zbkb_zknd_zkne_ocb; \ if (RISCV_HAS_ZKND_AND_ZKNE()) \ return &aes_rv32i_zknd_zkne_ocb; #else # define PROV_CIPHER_HW_declare() # define PROV_CIPHER_HW_select() # endif static const PROV_CIPHER_HW aes_generic_ocb = { cipher_hw_aes_ocb_generic_initkey, NULL }; PROV_CIPHER_HW_declare() const PROV_CIPHER_HW *ossl_prov_cipher_hw_aes_ocb(size_t keybits) { PROV_CIPHER_HW_select() return &aes_generic_ocb; }
./openssl/providers/implementations/ciphers/cipher_rc2.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for RC2 cipher modes ecb, cbc, ofb, cfb */ /* * RC2 low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include <openssl/proverr.h> #include "cipher_rc2.h" #include "prov/implementations.h" #include "prov/providercommon.h" #define RC2_40_MAGIC 0xa0 #define RC2_64_MAGIC 0x78 #define RC2_128_MAGIC 0x3a #define RC2_FLAGS PROV_CIPHER_FLAG_VARIABLE_LENGTH static OSSL_FUNC_cipher_encrypt_init_fn rc2_einit; static OSSL_FUNC_cipher_decrypt_init_fn rc2_dinit; static OSSL_FUNC_cipher_freectx_fn rc2_freectx; static OSSL_FUNC_cipher_dupctx_fn rc2_dupctx; static OSSL_FUNC_cipher_gettable_ctx_params_fn rc2_gettable_ctx_params; static OSSL_FUNC_cipher_settable_ctx_params_fn rc2_settable_ctx_params; static OSSL_FUNC_cipher_set_ctx_params_fn rc2_set_ctx_params; static void rc2_freectx(void *vctx) { PROV_RC2_CTX *ctx = (PROV_RC2_CTX *)vctx; ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } static void *rc2_dupctx(void *ctx) { PROV_RC2_CTX *in = (PROV_RC2_CTX *)ctx; PROV_RC2_CTX *ret; if (!ossl_prov_is_running()) return NULL; ret = OPENSSL_malloc(sizeof(*ret)); if (ret == NULL) return NULL; *ret = *in; return ret; } static int rc2_keybits_to_magic(int keybits) { switch (keybits) { case 128: return RC2_128_MAGIC; case 64: return RC2_64_MAGIC; case 40: return RC2_40_MAGIC; } ERR_raise(ERR_LIB_PROV, PROV_R_UNSUPPORTED_KEY_SIZE); return 0; } static int rc2_magic_to_keybits(int magic) { switch (magic) { case RC2_128_MAGIC: return 128; case RC2_64_MAGIC: return 64; case RC2_40_MAGIC: return 40; } ERR_raise(ERR_LIB_PROV, PROV_R_UNSUPPORTED_KEY_SIZE); return 0; } static int rc2_einit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL)) return 0; return rc2_set_ctx_params(ctx, params); } static int rc2_dinit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL)) return 0; return rc2_set_ctx_params(ctx, params); } static int rc2_get_ctx_params(void *vctx, OSSL_PARAM params[]) { PROV_RC2_CTX *ctx = (PROV_RC2_CTX *)vctx; OSSL_PARAM *p; if (!ossl_cipher_generic_get_ctx_params(vctx, params)) return 0; p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_RC2_KEYBITS); if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->key_bits)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_ALGORITHM_ID_PARAMS); if (p != NULL) { long num; int i; ASN1_TYPE *type; unsigned char *d = p->data; unsigned char **dd = d == NULL ? NULL : &d; if (p->data_type != OSSL_PARAM_OCTET_STRING) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } if ((type = ASN1_TYPE_new()) == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_ASN1_LIB); return 0; } /* Is this the original IV or the running IV? */ num = rc2_keybits_to_magic(ctx->key_bits); if (!ASN1_TYPE_set_int_octetstring(type, num, ctx->base.iv, ctx->base.ivlen)) { ASN1_TYPE_free(type); ERR_raise(ERR_LIB_PROV, ERR_R_ASN1_LIB); return 0; } /* * IF the caller has a buffer, we pray to the gods they got the * size right. There's no way to tell the i2d functions... */ i = i2d_ASN1_TYPE(type, dd); if (i >= 0) p->return_size = (size_t)i; ASN1_TYPE_free(type); if (i < 0) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } } return 1; } static int rc2_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { PROV_RC2_CTX *ctx = (PROV_RC2_CTX *)vctx; const OSSL_PARAM *p; if (params == NULL) return 1; if (!ossl_cipher_var_keylen_set_ctx_params(vctx, params)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_RC2_KEYBITS); if (p != NULL) { if (!OSSL_PARAM_get_size_t(p, &ctx->key_bits)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_ALGORITHM_ID_PARAMS); if (p != NULL) { ASN1_TYPE *type = NULL; long num = 0; const unsigned char *d = p->data; int ret = 1; unsigned char iv[16]; if (p->data_type != OSSL_PARAM_OCTET_STRING || ctx->base.ivlen > sizeof(iv) || (type = d2i_ASN1_TYPE(NULL, &d, p->data_size)) == NULL || ((size_t)ASN1_TYPE_get_int_octetstring(type, &num, iv, ctx->base.ivlen) != ctx->base.ivlen) || !ossl_cipher_generic_initiv(&ctx->base, iv, ctx->base.ivlen) || (ctx->key_bits = rc2_magic_to_keybits(num)) == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); ret = 0; } ASN1_TYPE_free(type); if (ret == 0) return 0; /* * This code assumes that the caller will call * EVP_CipherInit_ex() with a non NULL key in order to setup a key that * uses the keylen and keybits that were set here. */ ctx->base.keylen = ctx->key_bits / 8; } return 1; } CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_START(rc2) OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_RC2_KEYBITS, NULL), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_ALGORITHM_ID_PARAMS, NULL, 0), CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_END(rc2) CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_START(rc2) OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_RC2_KEYBITS, NULL), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_ALGORITHM_ID_PARAMS, NULL, 0), CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_END(rc2) #define IMPLEMENT_cipher(alg, UCALG, lcmode, UCMODE, flags, kbits, blkbits, \ ivbits, typ) \ static OSSL_FUNC_cipher_get_params_fn alg##_##kbits##_##lcmode##_get_params; \ static int alg##_##kbits##_##lcmode##_get_params(OSSL_PARAM params[]) \ { \ return ossl_cipher_generic_get_params(params, EVP_CIPH_##UCMODE##_MODE, \ flags, kbits, blkbits, ivbits); \ } \ static OSSL_FUNC_cipher_newctx_fn alg##_##kbits##_##lcmode##_newctx; \ static void *alg##_##kbits##_##lcmode##_newctx(void *provctx) \ { \ PROV_##UCALG##_CTX *ctx; \ if (!ossl_prov_is_running()) \ return NULL; \ ctx = OPENSSL_zalloc(sizeof(*ctx)); \ if (ctx != NULL) { \ ossl_cipher_generic_initkey(ctx, kbits, blkbits, ivbits, \ EVP_CIPH_##UCMODE##_MODE, flags, \ ossl_prov_cipher_hw_##alg##_##lcmode(kbits), \ NULL); \ ctx->key_bits = kbits; \ } \ return ctx; \ } \ const OSSL_DISPATCH ossl_##alg##kbits##lcmode##_functions[] = { \ { OSSL_FUNC_CIPHER_NEWCTX, \ (void (*)(void)) alg##_##kbits##_##lcmode##_newctx }, \ { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void)) alg##_freectx }, \ { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void)) alg##_dupctx }, \ { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))rc2_einit }, \ { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))rc2_dinit }, \ { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))ossl_cipher_generic_##typ##_update },\ { OSSL_FUNC_CIPHER_FINAL, (void (*)(void))ossl_cipher_generic_##typ##_final }, \ { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))ossl_cipher_generic_cipher }, \ { OSSL_FUNC_CIPHER_GET_PARAMS, \ (void (*)(void)) alg##_##kbits##_##lcmode##_get_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_params }, \ { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, \ (void (*)(void))rc2_get_ctx_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, \ (void (*)(void))rc2_gettable_ctx_params }, \ { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, \ (void (*)(void))rc2_set_ctx_params }, \ { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, \ (void (*)(void))rc2_settable_ctx_params }, \ OSSL_DISPATCH_END \ }; /* ossl_rc2128ecb_functions */ IMPLEMENT_cipher(rc2, RC2, ecb, ECB, RC2_FLAGS, 128, 64, 0, block) /* ossl_rc2128cbc_functions */ IMPLEMENT_cipher(rc2, RC2, cbc, CBC, RC2_FLAGS, 128, 64, 64, block) /* ossl_rc240cbc_functions */ IMPLEMENT_cipher(rc2, RC2, cbc, CBC, RC2_FLAGS, 40, 64, 64, block) /* ossl_rc264cbc_functions */ IMPLEMENT_cipher(rc2, RC2, cbc, CBC, RC2_FLAGS, 64, 64, 64, block) /* ossl_rc2128ofb128_functions */ IMPLEMENT_cipher(rc2, RC2, ofb128, OFB, RC2_FLAGS, 128, 8, 64, stream) /* ossl_rc2128cfb128_functions */ IMPLEMENT_cipher(rc2, RC2, cfb128, CFB, RC2_FLAGS, 128, 8, 64, stream)
./openssl/providers/implementations/ciphers/cipher_blowfish.c
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for Blowfish cipher modes ecb, cbc, ofb, cfb */ /* * BF low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include "cipher_blowfish.h" #include "prov/implementations.h" #include "prov/providercommon.h" #define BF_FLAGS PROV_CIPHER_FLAG_VARIABLE_LENGTH static OSSL_FUNC_cipher_freectx_fn blowfish_freectx; static OSSL_FUNC_cipher_dupctx_fn blowfish_dupctx; static void blowfish_freectx(void *vctx) { PROV_BLOWFISH_CTX *ctx = (PROV_BLOWFISH_CTX *)vctx; ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } static void *blowfish_dupctx(void *ctx) { PROV_BLOWFISH_CTX *in = (PROV_BLOWFISH_CTX *)ctx; PROV_BLOWFISH_CTX *ret; if (!ossl_prov_is_running()) return NULL; ret = OPENSSL_malloc(sizeof(*ret)); if (ret == NULL) return NULL; *ret = *in; return ret; } /* bf_ecb_functions */ IMPLEMENT_var_keylen_cipher(blowfish, BLOWFISH, ecb, ECB, BF_FLAGS, 128, 64, 0, block) /* bf_cbc_functions */ IMPLEMENT_var_keylen_cipher(blowfish, BLOWFISH, cbc, CBC, BF_FLAGS, 128, 64, 64, block) /* bf_ofb_functions */ IMPLEMENT_var_keylen_cipher(blowfish, BLOWFISH, ofb64, OFB, BF_FLAGS, 128, 8, 64, stream) /* bf_cfb_functions */ IMPLEMENT_var_keylen_cipher(blowfish, BLOWFISH, cfb64, CFB, BF_FLAGS, 128, 8, 64, stream)
./openssl/providers/implementations/ciphers/cipher_aes_siv_hw.c
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * This file uses the low level AES functions (which are deprecated for * non-internal use) in order to implement provider AES ciphers. */ #include "internal/deprecated.h" #include "cipher_aes_siv.h" static void aes_siv_cleanup(void *vctx); static int aes_siv_initkey(void *vctx, const unsigned char *key, size_t keylen) { PROV_AES_SIV_CTX *ctx = (PROV_AES_SIV_CTX *)vctx; SIV128_CONTEXT *sctx = &ctx->siv; size_t klen = keylen / 2; OSSL_LIB_CTX *libctx = ctx->libctx; const char *propq = NULL; EVP_CIPHER_free(ctx->cbc); EVP_CIPHER_free(ctx->ctr); ctx->cbc = NULL; ctx->ctr = NULL; switch (klen) { case 16: ctx->cbc = EVP_CIPHER_fetch(libctx, "AES-128-CBC", propq); ctx->ctr = EVP_CIPHER_fetch(libctx, "AES-128-CTR", propq); break; case 24: ctx->cbc = EVP_CIPHER_fetch(libctx, "AES-192-CBC", propq); ctx->ctr = EVP_CIPHER_fetch(libctx, "AES-192-CTR", propq); break; case 32: ctx->cbc = EVP_CIPHER_fetch(libctx, "AES-256-CBC", propq); ctx->ctr = EVP_CIPHER_fetch(libctx, "AES-256-CTR", propq); break; default: break; } if (ctx->cbc == NULL || ctx->ctr == NULL) return 0; /* * klen is the length of the underlying cipher, not the input key, * which should be twice as long */ return ossl_siv128_init(sctx, key, klen, ctx->cbc, ctx->ctr, libctx, propq); } static int aes_siv_dupctx(void *in_vctx, void *out_vctx) { PROV_AES_SIV_CTX *in = (PROV_AES_SIV_CTX *)in_vctx; PROV_AES_SIV_CTX *out = (PROV_AES_SIV_CTX *)out_vctx; *out = *in; out->siv.cipher_ctx = NULL; out->siv.mac_ctx_init = NULL; out->siv.mac = NULL; if (!ossl_siv128_copy_ctx(&out->siv, &in->siv)) return 0; if (out->cbc != NULL) EVP_CIPHER_up_ref(out->cbc); if (out->ctr != NULL) EVP_CIPHER_up_ref(out->ctr); return 1; } static int aes_siv_settag(void *vctx, const unsigned char *tag, size_t tagl) { PROV_AES_SIV_CTX *ctx = (PROV_AES_SIV_CTX *)vctx; SIV128_CONTEXT *sctx = &ctx->siv; return ossl_siv128_set_tag(sctx, tag, tagl); } static void aes_siv_setspeed(void *vctx, int speed) { PROV_AES_SIV_CTX *ctx = (PROV_AES_SIV_CTX *)vctx; SIV128_CONTEXT *sctx = &ctx->siv; ossl_siv128_speed(sctx, (int)speed); } static void aes_siv_cleanup(void *vctx) { PROV_AES_SIV_CTX *ctx = (PROV_AES_SIV_CTX *)vctx; SIV128_CONTEXT *sctx = &ctx->siv; ossl_siv128_cleanup(sctx); EVP_CIPHER_free(ctx->cbc); EVP_CIPHER_free(ctx->ctr); } static int aes_siv_cipher(void *vctx, unsigned char *out, const unsigned char *in, size_t len) { PROV_AES_SIV_CTX *ctx = (PROV_AES_SIV_CTX *)vctx; SIV128_CONTEXT *sctx = &ctx->siv; /* EncryptFinal or DecryptFinal */ if (in == NULL) return ossl_siv128_finish(sctx) == 0; /* Deal with associated data */ if (out == NULL) return (ossl_siv128_aad(sctx, in, len) == 1); if (ctx->enc) return ossl_siv128_encrypt(sctx, in, out, len) > 0; return ossl_siv128_decrypt(sctx, in, out, len) > 0; } static const PROV_CIPHER_HW_AES_SIV aes_siv_hw = { aes_siv_initkey, aes_siv_cipher, aes_siv_setspeed, aes_siv_settag, aes_siv_cleanup, aes_siv_dupctx, }; const PROV_CIPHER_HW_AES_SIV *ossl_prov_cipher_hw_aes_siv(size_t keybits) { return &aes_siv_hw; }
./openssl/providers/implementations/ciphers/cipher_aes_wrp.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * This file uses the low level AES functions (which are deprecated for * non-internal use) in order to implement provider AES ciphers. */ #include "internal/deprecated.h" #include <openssl/proverr.h> #include "cipher_aes.h" #include "prov/providercommon.h" #include "prov/implementations.h" /* AES wrap with padding has IV length of 4, without padding 8 */ #define AES_WRAP_PAD_IVLEN 4 #define AES_WRAP_NOPAD_IVLEN 8 #define WRAP_FLAGS (PROV_CIPHER_FLAG_CUSTOM_IV) #define WRAP_FLAGS_INV (WRAP_FLAGS | PROV_CIPHER_FLAG_INVERSE_CIPHER) typedef size_t (*aeswrap_fn)(void *key, const unsigned char *iv, unsigned char *out, const unsigned char *in, size_t inlen, block128_f block); static OSSL_FUNC_cipher_encrypt_init_fn aes_wrap_einit; static OSSL_FUNC_cipher_decrypt_init_fn aes_wrap_dinit; static OSSL_FUNC_cipher_update_fn aes_wrap_cipher; static OSSL_FUNC_cipher_final_fn aes_wrap_final; static OSSL_FUNC_cipher_freectx_fn aes_wrap_freectx; static OSSL_FUNC_cipher_set_ctx_params_fn aes_wrap_set_ctx_params; typedef struct prov_aes_wrap_ctx_st { PROV_CIPHER_CTX base; union { OSSL_UNION_ALIGN; AES_KEY ks; } ks; aeswrap_fn wrapfn; } PROV_AES_WRAP_CTX; static void *aes_wrap_newctx(size_t kbits, size_t blkbits, size_t ivbits, unsigned int mode, uint64_t flags) { PROV_AES_WRAP_CTX *wctx; PROV_CIPHER_CTX *ctx; if (!ossl_prov_is_running()) return NULL; wctx = OPENSSL_zalloc(sizeof(*wctx)); ctx = (PROV_CIPHER_CTX *)wctx; if (ctx != NULL) { ossl_cipher_generic_initkey(ctx, kbits, blkbits, ivbits, mode, flags, NULL, NULL); ctx->pad = (ctx->ivlen == AES_WRAP_PAD_IVLEN); } return wctx; } static void *aes_wrap_dupctx(void *wctx) { PROV_AES_WRAP_CTX *ctx = wctx; PROV_AES_WRAP_CTX *dctx = wctx; if (ctx == NULL) return NULL; dctx = OPENSSL_memdup(ctx, sizeof(*ctx)); if (dctx != NULL && dctx->base.tlsmac != NULL && dctx->base.alloced) { dctx->base.tlsmac = OPENSSL_memdup(dctx->base.tlsmac, dctx->base.tlsmacsize); if (dctx->base.tlsmac == NULL) { OPENSSL_free(dctx); dctx = NULL; } } return dctx; } static void aes_wrap_freectx(void *vctx) { PROV_AES_WRAP_CTX *wctx = (PROV_AES_WRAP_CTX *)vctx; ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(wctx, sizeof(*wctx)); } static int aes_wrap_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; PROV_AES_WRAP_CTX *wctx = (PROV_AES_WRAP_CTX *)vctx; if (!ossl_prov_is_running()) return 0; ctx->enc = enc; if (ctx->pad) wctx->wrapfn = enc ? CRYPTO_128_wrap_pad : CRYPTO_128_unwrap_pad; else wctx->wrapfn = enc ? CRYPTO_128_wrap : CRYPTO_128_unwrap; if (iv != NULL) { if (!ossl_cipher_generic_initiv(ctx, iv, ivlen)) return 0; } if (key != NULL) { int use_forward_transform; if (keylen != ctx->keylen) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } /* * See SP800-38F : Section 5.1 * The forward and inverse transformations for the AES block * cipher—called “cipher” and “inverse cipher” are informally known as * the AES encryption and AES decryption functions, respectively. * If the designated cipher function for a key-wrap algorithm is chosen * to be the AES decryption function, then CIPH-1K will be the AES * encryption function. */ if (ctx->inverse_cipher == 0) use_forward_transform = ctx->enc; else use_forward_transform = !ctx->enc; if (use_forward_transform) { AES_set_encrypt_key(key, keylen * 8, &wctx->ks.ks); ctx->block = (block128_f)AES_encrypt; } else { AES_set_decrypt_key(key, keylen * 8, &wctx->ks.ks); ctx->block = (block128_f)AES_decrypt; } } return aes_wrap_set_ctx_params(ctx, params); } static int aes_wrap_einit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return aes_wrap_init(ctx, key, keylen, iv, ivlen, params, 1); } static int aes_wrap_dinit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return aes_wrap_init(ctx, key, keylen, iv, ivlen, params, 0); } static int aes_wrap_cipher_internal(void *vctx, unsigned char *out, const unsigned char *in, size_t inlen) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; PROV_AES_WRAP_CTX *wctx = (PROV_AES_WRAP_CTX *)vctx; size_t rv; int pad = ctx->pad; /* No final operation so always return zero length */ if (in == NULL) return 0; /* Input length must always be non-zero */ if (inlen == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_INPUT_LENGTH); return -1; } /* If decrypting need at least 16 bytes and multiple of 8 */ if (!ctx->enc && (inlen < 16 || inlen & 0x7)) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_INPUT_LENGTH); return -1; } /* If not padding input must be multiple of 8 */ if (!pad && inlen & 0x7) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_INPUT_LENGTH); return -1; } if (out == NULL) { if (ctx->enc) { /* If padding round up to multiple of 8 */ if (pad) inlen = (inlen + 7) / 8 * 8; /* 8 byte prefix */ return inlen + 8; } else { /* * If not padding output will be exactly 8 bytes smaller than * input. If padding it will be at least 8 bytes smaller but we * don't know how much. */ return inlen - 8; } } rv = wctx->wrapfn(&wctx->ks.ks, ctx->iv_set ? ctx->iv : NULL, out, in, inlen, ctx->block); if (!rv) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return -1; } if (rv > INT_MAX) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_OUTPUT_LENGTH); return -1; } return (int)rv; } static int aes_wrap_final(void *vctx, unsigned char *out, size_t *outl, size_t outsize) { if (!ossl_prov_is_running()) return 0; *outl = 0; return 1; } static int aes_wrap_cipher(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { PROV_AES_WRAP_CTX *ctx = (PROV_AES_WRAP_CTX *)vctx; size_t len; if (!ossl_prov_is_running()) return 0; if (inl == 0) { *outl = 0; return 1; } if (outsize < inl) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } len = aes_wrap_cipher_internal(ctx, out, in, inl); if (len <= 0) return 0; *outl = len; return 1; } static int aes_wrap_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; const OSSL_PARAM *p; size_t keylen = 0; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL) { if (!OSSL_PARAM_get_size_t(p, &keylen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (ctx->keylen != keylen) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } } return 1; } #define IMPLEMENT_cipher(mode, fname, UCMODE, flags, kbits, blkbits, ivbits) \ static OSSL_FUNC_cipher_get_params_fn aes_##kbits##_##fname##_get_params; \ static int aes_##kbits##_##fname##_get_params(OSSL_PARAM params[]) \ { \ return ossl_cipher_generic_get_params(params, EVP_CIPH_##UCMODE##_MODE,\ flags, kbits, blkbits, ivbits); \ } \ static OSSL_FUNC_cipher_newctx_fn aes_##kbits##fname##_newctx; \ static void *aes_##kbits##fname##_newctx(void *provctx) \ { \ return aes_##mode##_newctx(kbits, blkbits, ivbits, \ EVP_CIPH_##UCMODE##_MODE, flags); \ } \ const OSSL_DISPATCH ossl_##aes##kbits##fname##_functions[] = { \ { OSSL_FUNC_CIPHER_NEWCTX, \ (void (*)(void))aes_##kbits##fname##_newctx }, \ { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))aes_##mode##_einit }, \ { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))aes_##mode##_dinit }, \ { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))aes_##mode##_cipher }, \ { OSSL_FUNC_CIPHER_FINAL, (void (*)(void))aes_##mode##_final }, \ { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))aes_##mode##_freectx }, \ { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))aes_##mode##_dupctx }, \ { OSSL_FUNC_CIPHER_GET_PARAMS, \ (void (*)(void))aes_##kbits##_##fname##_get_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_params }, \ { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_get_ctx_params }, \ { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, \ (void (*)(void))aes_wrap_set_ctx_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_ctx_params }, \ { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_settable_ctx_params }, \ OSSL_DISPATCH_END \ } IMPLEMENT_cipher(wrap, wrap, WRAP, WRAP_FLAGS, 256, 64, AES_WRAP_NOPAD_IVLEN * 8); IMPLEMENT_cipher(wrap, wrap, WRAP, WRAP_FLAGS, 192, 64, AES_WRAP_NOPAD_IVLEN * 8); IMPLEMENT_cipher(wrap, wrap, WRAP, WRAP_FLAGS, 128, 64, AES_WRAP_NOPAD_IVLEN * 8); IMPLEMENT_cipher(wrap, wrappad, WRAP, WRAP_FLAGS, 256, 64, AES_WRAP_PAD_IVLEN * 8); IMPLEMENT_cipher(wrap, wrappad, WRAP, WRAP_FLAGS, 192, 64, AES_WRAP_PAD_IVLEN * 8); IMPLEMENT_cipher(wrap, wrappad, WRAP, WRAP_FLAGS, 128, 64, AES_WRAP_PAD_IVLEN * 8); IMPLEMENT_cipher(wrap, wrapinv, WRAP, WRAP_FLAGS_INV, 256, 64, AES_WRAP_NOPAD_IVLEN * 8); IMPLEMENT_cipher(wrap, wrapinv, WRAP, WRAP_FLAGS_INV, 192, 64, AES_WRAP_NOPAD_IVLEN * 8); IMPLEMENT_cipher(wrap, wrapinv, WRAP, WRAP_FLAGS_INV, 128, 64, AES_WRAP_NOPAD_IVLEN * 8); IMPLEMENT_cipher(wrap, wrappadinv, WRAP, WRAP_FLAGS_INV, 256, 64, AES_WRAP_PAD_IVLEN * 8); IMPLEMENT_cipher(wrap, wrappadinv, WRAP, WRAP_FLAGS_INV, 192, 64, AES_WRAP_PAD_IVLEN * 8); IMPLEMENT_cipher(wrap, wrappadinv, WRAP, WRAP_FLAGS_INV, 128, 64, AES_WRAP_PAD_IVLEN * 8);
./openssl/providers/implementations/ciphers/cipher_aes_ccm_hw.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* AES CCM mode */ /* * This file uses the low level AES functions (which are deprecated for * non-internal use) in order to implement provider AES ciphers. */ #include "internal/deprecated.h" #include "cipher_aes_ccm.h" #define AES_HW_CCM_SET_KEY_FN(fn_set_enc_key, fn_blk, fn_ccm_enc, fn_ccm_dec) \ fn_set_enc_key(key, keylen * 8, &actx->ccm.ks.ks); \ CRYPTO_ccm128_init(&ctx->ccm_ctx, ctx->m, ctx->l, &actx->ccm.ks.ks, \ (block128_f)fn_blk); \ ctx->str = ctx->enc ? (ccm128_f)fn_ccm_enc : (ccm128_f)fn_ccm_dec; \ ctx->key_set = 1; static int ccm_generic_aes_initkey(PROV_CCM_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_AES_CCM_CTX *actx = (PROV_AES_CCM_CTX *)ctx; #ifdef HWAES_CAPABLE if (HWAES_CAPABLE) { AES_HW_CCM_SET_KEY_FN(HWAES_set_encrypt_key, HWAES_encrypt, NULL, NULL); } else #endif /* HWAES_CAPABLE */ #ifdef VPAES_CAPABLE if (VPAES_CAPABLE) { AES_HW_CCM_SET_KEY_FN(vpaes_set_encrypt_key, vpaes_encrypt, NULL, NULL); } else #endif { AES_HW_CCM_SET_KEY_FN(AES_set_encrypt_key, AES_encrypt, NULL, NULL) } return 1; } static const PROV_CCM_HW aes_ccm = { ccm_generic_aes_initkey, ossl_ccm_generic_setiv, ossl_ccm_generic_setaad, ossl_ccm_generic_auth_encrypt, ossl_ccm_generic_auth_decrypt, ossl_ccm_generic_gettag }; #if defined(S390X_aes_128_CAPABLE) # include "cipher_aes_ccm_hw_s390x.inc" #elif defined(AESNI_CAPABLE) # include "cipher_aes_ccm_hw_aesni.inc" #elif defined(SPARC_AES_CAPABLE) # include "cipher_aes_ccm_hw_t4.inc" #elif defined(OPENSSL_CPUID_OBJ) && defined(__riscv) && __riscv_xlen == 64 # include "cipher_aes_ccm_hw_rv64i.inc" #elif defined(OPENSSL_CPUID_OBJ) && defined(__riscv) && __riscv_xlen == 32 # include "cipher_aes_ccm_hw_rv32i.inc" #else const PROV_CCM_HW *ossl_prov_aes_hw_ccm(size_t keybits) { return &aes_ccm; } #endif
./openssl/providers/implementations/ciphers/cipher_aria_gcm_hw.c
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /*- * Generic support for ARIA GCM. */ #include "cipher_aria_gcm.h" static int aria_gcm_initkey(PROV_GCM_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_ARIA_GCM_CTX *actx = (PROV_ARIA_GCM_CTX *)ctx; ARIA_KEY *ks = &actx->ks.ks; GCM_HW_SET_KEY_CTR_FN(ks, ossl_aria_set_encrypt_key, ossl_aria_encrypt, NULL); return 1; } static const PROV_GCM_HW aria_gcm = { aria_gcm_initkey, ossl_gcm_setiv, ossl_gcm_aad_update, ossl_gcm_cipher_update, ossl_gcm_cipher_final, ossl_gcm_one_shot }; const PROV_GCM_HW *ossl_prov_aria_hw_gcm(size_t keybits) { return &aria_gcm; }
./openssl/providers/implementations/ciphers/cipher_aes_siv.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for AES SIV mode */ /* * This file uses the low level AES functions (which are deprecated for * non-internal use) in order to implement provider AES ciphers. */ #include "internal/deprecated.h" #include <openssl/proverr.h> #include "cipher_aes_siv.h" #include "prov/implementations.h" #include "prov/providercommon.h" #include "prov/ciphercommon_aead.h" #include "prov/provider_ctx.h" #define siv_stream_update siv_cipher #define SIV_FLAGS AEAD_FLAGS static OSSL_FUNC_cipher_set_ctx_params_fn aes_siv_set_ctx_params; static void *aes_siv_newctx(void *provctx, size_t keybits, unsigned int mode, uint64_t flags) { PROV_AES_SIV_CTX *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) { ctx->taglen = SIV_LEN; ctx->mode = mode; ctx->keylen = keybits / 8; ctx->hw = ossl_prov_cipher_hw_aes_siv(keybits); ctx->libctx = PROV_LIBCTX_OF(provctx); } return ctx; } static void aes_siv_freectx(void *vctx) { PROV_AES_SIV_CTX *ctx = (PROV_AES_SIV_CTX *)vctx; if (ctx != NULL) { ctx->hw->cleanup(ctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } } static void *siv_dupctx(void *vctx) { PROV_AES_SIV_CTX *in = (PROV_AES_SIV_CTX *)vctx; PROV_AES_SIV_CTX *ret; if (!ossl_prov_is_running()) return NULL; ret = OPENSSL_malloc(sizeof(*ret)); if (ret == NULL) return NULL; if (!in->hw->dupctx(in, ret)) { OPENSSL_free(ret); ret = NULL; } return ret; } static int siv_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) { PROV_AES_SIV_CTX *ctx = (PROV_AES_SIV_CTX *)vctx; if (!ossl_prov_is_running()) return 0; ctx->enc = enc; if (key != NULL) { if (keylen != ctx->keylen) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } if (!ctx->hw->initkey(ctx, key, ctx->keylen)) return 0; } return aes_siv_set_ctx_params(ctx, params); } static int siv_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return siv_init(vctx, key, keylen, iv, ivlen, params, 1); } static int siv_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return siv_init(vctx, key, keylen, iv, ivlen, params, 0); } static int siv_cipher(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { PROV_AES_SIV_CTX *ctx = (PROV_AES_SIV_CTX *)vctx; if (!ossl_prov_is_running()) return 0; /* Ignore just empty encryption/decryption call and not AAD. */ if (out != NULL) { if (inl == 0) { if (outl != NULL) *outl = 0; return 1; } if (outsize < inl) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } } if (ctx->hw->cipher(ctx, out, in, inl) <= 0) return 0; if (outl != NULL) *outl = inl; return 1; } static int siv_stream_final(void *vctx, unsigned char *out, size_t *outl, size_t outsize) { PROV_AES_SIV_CTX *ctx = (PROV_AES_SIV_CTX *)vctx; if (!ossl_prov_is_running()) return 0; if (!ctx->hw->cipher(vctx, out, NULL, 0)) return 0; if (outl != NULL) *outl = 0; return 1; } static int aes_siv_get_ctx_params(void *vctx, OSSL_PARAM params[]) { PROV_AES_SIV_CTX *ctx = (PROV_AES_SIV_CTX *)vctx; SIV128_CONTEXT *sctx = &ctx->siv; OSSL_PARAM *p; p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_AEAD_TAG); if (p != NULL && p->data_type == OSSL_PARAM_OCTET_STRING) { if (!ctx->enc || p->data_size != ctx->taglen || !OSSL_PARAM_set_octet_string(p, &sctx->tag.byte, ctx->taglen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_AEAD_TAGLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->taglen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->keylen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } return 1; } static const OSSL_PARAM aes_siv_known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_AEAD_TAGLEN, NULL), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TAG, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *aes_siv_gettable_ctx_params(ossl_unused void *cctx, ossl_unused void *provctx) { return aes_siv_known_gettable_ctx_params; } static int aes_siv_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { PROV_AES_SIV_CTX *ctx = (PROV_AES_SIV_CTX *)vctx; const OSSL_PARAM *p; unsigned int speed = 0; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_AEAD_TAG); if (p != NULL) { if (ctx->enc) return 1; if (p->data_type != OSSL_PARAM_OCTET_STRING || !ctx->hw->settag(ctx, p->data, p->data_size)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_SPEED); if (p != NULL) { if (!OSSL_PARAM_get_uint(p, &speed)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } ctx->hw->setspeed(ctx, (int)speed); } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL) { size_t keylen; if (!OSSL_PARAM_get_size_t(p, &keylen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } /* The key length can not be modified */ if (keylen != ctx->keylen) return 0; } return 1; } static const OSSL_PARAM aes_siv_known_settable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), OSSL_PARAM_uint(OSSL_CIPHER_PARAM_SPEED, NULL), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TAG, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *aes_siv_settable_ctx_params(ossl_unused void *cctx, ossl_unused void *provctx) { return aes_siv_known_settable_ctx_params; } #define IMPLEMENT_cipher(alg, lc, UCMODE, flags, kbits, blkbits, ivbits) \ static OSSL_FUNC_cipher_newctx_fn alg##kbits##lc##_newctx; \ static OSSL_FUNC_cipher_freectx_fn alg##_##lc##_freectx; \ static OSSL_FUNC_cipher_dupctx_fn lc##_dupctx; \ static OSSL_FUNC_cipher_encrypt_init_fn lc##_einit; \ static OSSL_FUNC_cipher_decrypt_init_fn lc##_dinit; \ static OSSL_FUNC_cipher_update_fn lc##_stream_update; \ static OSSL_FUNC_cipher_final_fn lc##_stream_final; \ static OSSL_FUNC_cipher_cipher_fn lc##_cipher; \ static OSSL_FUNC_cipher_get_params_fn alg##_##kbits##_##lc##_get_params; \ static OSSL_FUNC_cipher_get_ctx_params_fn alg##_##lc##_get_ctx_params; \ static OSSL_FUNC_cipher_gettable_ctx_params_fn \ alg##_##lc##_gettable_ctx_params; \ static OSSL_FUNC_cipher_set_ctx_params_fn alg##_##lc##_set_ctx_params; \ static OSSL_FUNC_cipher_settable_ctx_params_fn \ alg##_##lc##_settable_ctx_params; \ static int alg##_##kbits##_##lc##_get_params(OSSL_PARAM params[]) \ { \ return ossl_cipher_generic_get_params(params, EVP_CIPH_##UCMODE##_MODE, \ flags, 2*kbits, blkbits, ivbits); \ } \ static void *alg##kbits##lc##_newctx(void *provctx) \ { \ return alg##_##lc##_newctx(provctx, 2*kbits, EVP_CIPH_##UCMODE##_MODE, \ flags); \ } \ const OSSL_DISPATCH ossl_##alg##kbits##lc##_functions[] = { \ { OSSL_FUNC_CIPHER_NEWCTX, (void (*)(void))alg##kbits##lc##_newctx }, \ { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))alg##_##lc##_freectx }, \ { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void)) lc##_dupctx }, \ { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void)) lc##_einit }, \ { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void)) lc##_dinit }, \ { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void)) lc##_stream_update }, \ { OSSL_FUNC_CIPHER_FINAL, (void (*)(void)) lc##_stream_final }, \ { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void)) lc##_cipher }, \ { OSSL_FUNC_CIPHER_GET_PARAMS, \ (void (*)(void)) alg##_##kbits##_##lc##_get_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_params }, \ { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, \ (void (*)(void)) alg##_##lc##_get_ctx_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, \ (void (*)(void)) alg##_##lc##_gettable_ctx_params }, \ { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, \ (void (*)(void)) alg##_##lc##_set_ctx_params }, \ { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, \ (void (*)(void)) alg##_##lc##_settable_ctx_params }, \ OSSL_DISPATCH_END \ }; IMPLEMENT_cipher(aes, siv, SIV, SIV_FLAGS, 128, 8, 0) IMPLEMENT_cipher(aes, siv, SIV, SIV_FLAGS, 192, 8, 0) IMPLEMENT_cipher(aes, siv, SIV, SIV_FLAGS, 256, 8, 0)
./openssl/providers/implementations/ciphers/ciphercommon_ccm.c
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for ccm mode */ #include <openssl/proverr.h> #include "prov/ciphercommon.h" #include "prov/ciphercommon_ccm.h" #include "prov/providercommon.h" static int ccm_cipher_internal(PROV_CCM_CTX *ctx, unsigned char *out, size_t *padlen, const unsigned char *in, size_t len); static int ccm_tls_init(PROV_CCM_CTX *ctx, unsigned char *aad, size_t alen) { size_t len; if (!ossl_prov_is_running() || alen != EVP_AEAD_TLS1_AAD_LEN) return 0; /* Save the aad for later use. */ memcpy(ctx->buf, aad, alen); ctx->tls_aad_len = alen; len = ctx->buf[alen - 2] << 8 | ctx->buf[alen - 1]; if (len < EVP_CCM_TLS_EXPLICIT_IV_LEN) return 0; /* Correct length for explicit iv. */ len -= EVP_CCM_TLS_EXPLICIT_IV_LEN; if (!ctx->enc) { if (len < ctx->m) return 0; /* Correct length for tag. */ len -= ctx->m; } ctx->buf[alen - 2] = (unsigned char)(len >> 8); ctx->buf[alen - 1] = (unsigned char)(len & 0xff); /* Extra padding: tag appended to record. */ return ctx->m; } static int ccm_tls_iv_set_fixed(PROV_CCM_CTX *ctx, unsigned char *fixed, size_t flen) { if (flen != EVP_CCM_TLS_FIXED_IV_LEN) return 0; /* Copy to first part of the iv. */ memcpy(ctx->iv, fixed, flen); return 1; } static size_t ccm_get_ivlen(PROV_CCM_CTX *ctx) { return 15 - ctx->l; } int ossl_ccm_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { PROV_CCM_CTX *ctx = (PROV_CCM_CTX *)vctx; const OSSL_PARAM *p; size_t sz; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_AEAD_TAG); if (p != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if ((p->data_size & 1) || (p->data_size < 4) || p->data_size > 16) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_TAG_LENGTH); return 0; } if (p->data != NULL) { if (ctx->enc) { ERR_raise(ERR_LIB_PROV, PROV_R_TAG_NOT_NEEDED); return 0; } memcpy(ctx->buf, p->data, p->data_size); ctx->tag_set = 1; } ctx->m = p->data_size; } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_AEAD_IVLEN); if (p != NULL) { size_t ivlen; if (!OSSL_PARAM_get_size_t(p, &sz)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } ivlen = 15 - sz; if (ivlen < 2 || ivlen > 8) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH); return 0; } if (ctx->l != ivlen) { ctx->l = ivlen; ctx->iv_set = 0; } } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_AEAD_TLS1_AAD); if (p != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } sz = ccm_tls_init(ctx, p->data, p->data_size); if (sz == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_DATA); return 0; } ctx->tls_aad_pad_sz = sz; } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_AEAD_TLS1_IV_FIXED); if (p != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (ccm_tls_iv_set_fixed(ctx, p->data, p->data_size) == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH); return 0; } } return 1; } int ossl_ccm_get_ctx_params(void *vctx, OSSL_PARAM params[]) { PROV_CCM_CTX *ctx = (PROV_CCM_CTX *)vctx; OSSL_PARAM *p; p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IVLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, ccm_get_ivlen(ctx))) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_AEAD_TAGLEN); if (p != NULL) { size_t m = ctx->m; if (!OSSL_PARAM_set_size_t(p, m)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IV); if (p != NULL) { if (ccm_get_ivlen(ctx) > p->data_size) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH); return 0; } if (!OSSL_PARAM_set_octet_string(p, ctx->iv, p->data_size) && !OSSL_PARAM_set_octet_ptr(p, &ctx->iv, p->data_size)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_UPDATED_IV); if (p != NULL) { if (ccm_get_ivlen(ctx) > p->data_size) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH); return 0; } if (!OSSL_PARAM_set_octet_string(p, ctx->iv, p->data_size) && !OSSL_PARAM_set_octet_ptr(p, &ctx->iv, p->data_size)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->keylen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_AEAD_TLS1_AAD_PAD); if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->tls_aad_pad_sz)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_AEAD_TAG); if (p != NULL) { if (!ctx->enc || !ctx->tag_set) { ERR_raise(ERR_LIB_PROV, PROV_R_TAG_NOT_SET); return 0; } if (p->data_type != OSSL_PARAM_OCTET_STRING) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } if (!ctx->hw->gettag(ctx, p->data, p->data_size)) return 0; ctx->tag_set = 0; ctx->iv_set = 0; ctx->len_set = 0; } return 1; } static int ccm_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) { PROV_CCM_CTX *ctx = (PROV_CCM_CTX *)vctx; if (!ossl_prov_is_running()) return 0; ctx->enc = enc; if (iv != NULL) { if (ivlen != ccm_get_ivlen(ctx)) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH); return 0; } memcpy(ctx->iv, iv, ivlen); ctx->iv_set = 1; } if (key != NULL) { if (keylen != ctx->keylen) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } if (!ctx->hw->setkey(ctx, key, keylen)) return 0; } return ossl_ccm_set_ctx_params(ctx, params); } int ossl_ccm_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return ccm_init(vctx, key, keylen, iv, ivlen, params, 1); } int ossl_ccm_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return ccm_init(vctx, key, keylen, iv, ivlen, params, 0); } int ossl_ccm_stream_update(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { PROV_CCM_CTX *ctx = (PROV_CCM_CTX *)vctx; if (outsize < inl) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } if (!ccm_cipher_internal(ctx, out, outl, in, inl)) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } return 1; } int ossl_ccm_stream_final(void *vctx, unsigned char *out, size_t *outl, size_t outsize) { PROV_CCM_CTX *ctx = (PROV_CCM_CTX *)vctx; int i; if (!ossl_prov_is_running()) return 0; i = ccm_cipher_internal(ctx, out, outl, NULL, 0); if (i <= 0) return 0; *outl = 0; return 1; } int ossl_ccm_cipher(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { PROV_CCM_CTX *ctx = (PROV_CCM_CTX *)vctx; if (!ossl_prov_is_running()) return 0; if (outsize < inl) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } if (ccm_cipher_internal(ctx, out, outl, in, inl) <= 0) return 0; *outl = inl; return 1; } /* Copy the buffered iv */ static int ccm_set_iv(PROV_CCM_CTX *ctx, size_t mlen) { const PROV_CCM_HW *hw = ctx->hw; if (!hw->setiv(ctx, ctx->iv, ccm_get_ivlen(ctx), mlen)) return 0; ctx->len_set = 1; return 1; } static int ccm_tls_cipher(PROV_CCM_CTX *ctx, unsigned char *out, size_t *padlen, const unsigned char *in, size_t len) { int rv = 0; size_t olen = 0; if (!ossl_prov_is_running()) goto err; /* Encrypt/decrypt must be performed in place */ if (in == NULL || out != in || len < EVP_CCM_TLS_EXPLICIT_IV_LEN + ctx->m) goto err; /* If encrypting set explicit IV from sequence number (start of AAD) */ if (ctx->enc) memcpy(out, ctx->buf, EVP_CCM_TLS_EXPLICIT_IV_LEN); /* Get rest of IV from explicit IV */ memcpy(ctx->iv + EVP_CCM_TLS_FIXED_IV_LEN, in, EVP_CCM_TLS_EXPLICIT_IV_LEN); /* Correct length value */ len -= EVP_CCM_TLS_EXPLICIT_IV_LEN + ctx->m; if (!ccm_set_iv(ctx, len)) goto err; /* Use saved AAD */ if (!ctx->hw->setaad(ctx, ctx->buf, ctx->tls_aad_len)) goto err; /* Fix buffer to point to payload */ in += EVP_CCM_TLS_EXPLICIT_IV_LEN; out += EVP_CCM_TLS_EXPLICIT_IV_LEN; if (ctx->enc) { if (!ctx->hw->auth_encrypt(ctx, in, out, len, out + len, ctx->m)) goto err; olen = len + EVP_CCM_TLS_EXPLICIT_IV_LEN + ctx->m; } else { if (!ctx->hw->auth_decrypt(ctx, in, out, len, (unsigned char *)in + len, ctx->m)) goto err; olen = len; } rv = 1; err: *padlen = olen; return rv; } static int ccm_cipher_internal(PROV_CCM_CTX *ctx, unsigned char *out, size_t *padlen, const unsigned char *in, size_t len) { int rv = 0; size_t olen = 0; const PROV_CCM_HW *hw = ctx->hw; /* If no key set, return error */ if (!ctx->key_set) return 0; if (ctx->tls_aad_len != UNINITIALISED_SIZET) return ccm_tls_cipher(ctx, out, padlen, in, len); /* EVP_*Final() doesn't return any data */ if (in == NULL && out != NULL) goto finish; if (!ctx->iv_set) goto err; if (out == NULL) { if (in == NULL) { if (!ccm_set_iv(ctx, len)) goto err; } else { /* If we have AAD, we need a message length */ if (!ctx->len_set && len) goto err; if (!hw->setaad(ctx, in, len)) goto err; } } else { /* If not set length yet do it */ if (!ctx->len_set && !ccm_set_iv(ctx, len)) goto err; if (ctx->enc) { if (!hw->auth_encrypt(ctx, in, out, len, NULL, 0)) goto err; ctx->tag_set = 1; } else { /* The tag must be set before actually decrypting data */ if (!ctx->tag_set) goto err; if (!hw->auth_decrypt(ctx, in, out, len, ctx->buf, ctx->m)) goto err; /* Finished - reset flags so calling this method again will fail */ ctx->iv_set = 0; ctx->tag_set = 0; ctx->len_set = 0; } } olen = len; finish: rv = 1; err: *padlen = olen; return rv; } void ossl_ccm_initctx(PROV_CCM_CTX *ctx, size_t keybits, const PROV_CCM_HW *hw) { ctx->keylen = keybits / 8; ctx->key_set = 0; ctx->iv_set = 0; ctx->tag_set = 0; ctx->len_set = 0; ctx->l = 8; ctx->m = 12; ctx->tls_aad_len = UNINITIALISED_SIZET; ctx->hw = hw; }
./openssl/providers/implementations/ciphers/cipher_rc4.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for RC4 ciphers */ /* * RC4 low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include "cipher_rc4.h" #include "prov/implementations.h" #include "prov/providercommon.h" #define RC4_FLAGS PROV_CIPHER_FLAG_VARIABLE_LENGTH static OSSL_FUNC_cipher_encrypt_init_fn rc4_einit; static OSSL_FUNC_cipher_decrypt_init_fn rc4_dinit; static OSSL_FUNC_cipher_freectx_fn rc4_freectx; static OSSL_FUNC_cipher_dupctx_fn rc4_dupctx; static void rc4_freectx(void *vctx) { PROV_RC4_CTX *ctx = (PROV_RC4_CTX *)vctx; ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } static void *rc4_dupctx(void *ctx) { PROV_RC4_CTX *in = (PROV_RC4_CTX *)ctx; PROV_RC4_CTX *ret; if (!ossl_prov_is_running()) return NULL; ret = OPENSSL_malloc(sizeof(*ret)); if (ret == NULL) return NULL; *ret = *in; return ret; } static int rc4_einit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL)) return 0; return ossl_cipher_var_keylen_set_ctx_params(ctx, params); } static int rc4_dinit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL)) return 0; return ossl_cipher_var_keylen_set_ctx_params(ctx, params); } #define IMPLEMENT_cipher(alg, UCALG, flags, kbits, blkbits, ivbits, typ) \ static OSSL_FUNC_cipher_get_params_fn alg##_##kbits##_get_params; \ static int alg##_##kbits##_get_params(OSSL_PARAM params[]) \ { \ return ossl_cipher_generic_get_params(params, 0, flags, \ kbits, blkbits, ivbits); \ } \ static OSSL_FUNC_cipher_newctx_fn alg##_##kbits##_newctx; \ static void *alg##_##kbits##_newctx(void *provctx) \ { \ PROV_##UCALG##_CTX *ctx; \ if (!ossl_prov_is_running()) \ return NULL; \ ctx = OPENSSL_zalloc(sizeof(*ctx)); \ if (ctx != NULL) { \ ossl_cipher_generic_initkey(ctx, kbits, blkbits, ivbits, 0, flags, \ ossl_prov_cipher_hw_##alg(kbits), NULL); \ } \ return ctx; \ } \ const OSSL_DISPATCH ossl_##alg##kbits##_functions[] = { \ { OSSL_FUNC_CIPHER_NEWCTX, \ (void (*)(void)) alg##_##kbits##_newctx }, \ { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void)) alg##_freectx }, \ { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void)) alg##_dupctx }, \ { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))rc4_einit }, \ { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))rc4_dinit }, \ { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))ossl_cipher_generic_##typ##_update },\ { OSSL_FUNC_CIPHER_FINAL, (void (*)(void))ossl_cipher_generic_##typ##_final }, \ { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))ossl_cipher_generic_cipher }, \ { OSSL_FUNC_CIPHER_GET_PARAMS, \ (void (*)(void)) alg##_##kbits##_get_params }, \ { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_get_ctx_params }, \ { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, \ (void (*)(void))ossl_cipher_var_keylen_set_ctx_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_ctx_params }, \ { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, \ (void (*)(void))ossl_cipher_var_keylen_settable_ctx_params }, \ OSSL_DISPATCH_END \ }; /* ossl_rc440_functions */ IMPLEMENT_cipher(rc4, RC4, RC4_FLAGS, 40, 8, 0, stream) /* ossl_rc4128_functions */ IMPLEMENT_cipher(rc4, RC4, RC4_FLAGS, 128, 8, 0, stream)
./openssl/providers/implementations/ciphers/cipher_tdes.c
/* * Copyright 2019-2022 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * DES low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include <openssl/rand.h> #include <openssl/proverr.h> #include "prov/ciphercommon.h" #include "cipher_tdes.h" #include "prov/implementations.h" /* ossl_tdes_ede3_ecb_functions */ IMPLEMENT_tdes_cipher(ede3, EDE3, ecb, ECB, TDES_FLAGS, 64*3, 64, 0, block); /* ossl_tdes_ede3_cbc_functions */ IMPLEMENT_tdes_cipher(ede3, EDE3, cbc, CBC, TDES_FLAGS, 64*3, 64, 64, block);
./openssl/providers/implementations/ciphers/cipher_aes_ocb.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * AES low level APIs are deprecated for public use, but still ok for internal * use where we're using them to implement the higher level EVP interface, as is * the case here. */ #include "internal/deprecated.h" #include <openssl/proverr.h> #include "cipher_aes_ocb.h" #include "prov/providercommon.h" #include "prov/ciphercommon_aead.h" #include "prov/implementations.h" #define AES_OCB_FLAGS AEAD_FLAGS #define OCB_DEFAULT_TAG_LEN 16 #define OCB_DEFAULT_IV_LEN 12 #define OCB_MIN_IV_LEN 1 #define OCB_MAX_IV_LEN 15 PROV_CIPHER_FUNC(int, ocb_cipher, (PROV_AES_OCB_CTX *ctx, const unsigned char *in, unsigned char *out, size_t nextblock)); /* forward declarations */ static OSSL_FUNC_cipher_encrypt_init_fn aes_ocb_einit; static OSSL_FUNC_cipher_decrypt_init_fn aes_ocb_dinit; static OSSL_FUNC_cipher_update_fn aes_ocb_block_update; static OSSL_FUNC_cipher_final_fn aes_ocb_block_final; static OSSL_FUNC_cipher_cipher_fn aes_ocb_cipher; static OSSL_FUNC_cipher_freectx_fn aes_ocb_freectx; static OSSL_FUNC_cipher_dupctx_fn aes_ocb_dupctx; static OSSL_FUNC_cipher_get_ctx_params_fn aes_ocb_get_ctx_params; static OSSL_FUNC_cipher_set_ctx_params_fn aes_ocb_set_ctx_params; static OSSL_FUNC_cipher_gettable_ctx_params_fn cipher_ocb_gettable_ctx_params; static OSSL_FUNC_cipher_settable_ctx_params_fn cipher_ocb_settable_ctx_params; /* * The following methods could be moved into PROV_AES_OCB_HW if * multiple hardware implementations are ever needed. */ static ossl_inline int aes_generic_ocb_setiv(PROV_AES_OCB_CTX *ctx, const unsigned char *iv, size_t ivlen, size_t taglen) { return (CRYPTO_ocb128_setiv(&ctx->ocb, iv, ivlen, taglen) == 1); } static ossl_inline int aes_generic_ocb_setaad(PROV_AES_OCB_CTX *ctx, const unsigned char *aad, size_t alen) { return CRYPTO_ocb128_aad(&ctx->ocb, aad, alen) == 1; } static ossl_inline int aes_generic_ocb_gettag(PROV_AES_OCB_CTX *ctx, unsigned char *tag, size_t tlen) { return CRYPTO_ocb128_tag(&ctx->ocb, tag, tlen) > 0; } static ossl_inline int aes_generic_ocb_final(PROV_AES_OCB_CTX *ctx) { return (CRYPTO_ocb128_finish(&ctx->ocb, ctx->tag, ctx->taglen) == 0); } static ossl_inline void aes_generic_ocb_cleanup(PROV_AES_OCB_CTX *ctx) { CRYPTO_ocb128_cleanup(&ctx->ocb); } static ossl_inline int aes_generic_ocb_cipher(PROV_AES_OCB_CTX *ctx, const unsigned char *in, unsigned char *out, size_t len) { if (ctx->base.enc) { if (!CRYPTO_ocb128_encrypt(&ctx->ocb, in, out, len)) return 0; } else { if (!CRYPTO_ocb128_decrypt(&ctx->ocb, in, out, len)) return 0; } return 1; } static ossl_inline int aes_generic_ocb_copy_ctx(PROV_AES_OCB_CTX *dst, PROV_AES_OCB_CTX *src) { return CRYPTO_ocb128_copy_ctx(&dst->ocb, &src->ocb, &dst->ksenc.ks, &dst->ksdec.ks); } /*- * Provider dispatch functions */ static int aes_ocb_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) { PROV_AES_OCB_CTX *ctx = (PROV_AES_OCB_CTX *)vctx; if (!ossl_prov_is_running()) return 0; ctx->aad_buf_len = 0; ctx->data_buf_len = 0; ctx->base.enc = enc; if (iv != NULL) { if (ivlen != ctx->base.ivlen) { /* IV len must be 1 to 15 */ if (ivlen < OCB_MIN_IV_LEN || ivlen > OCB_MAX_IV_LEN) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH); return 0; } ctx->base.ivlen = ivlen; } if (!ossl_cipher_generic_initiv(&ctx->base, iv, ivlen)) return 0; ctx->iv_state = IV_STATE_BUFFERED; } if (key != NULL) { if (keylen != ctx->base.keylen) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } if (!ctx->base.hw->init(&ctx->base, key, keylen)) return 0; } return aes_ocb_set_ctx_params(ctx, params); } static int aes_ocb_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return aes_ocb_init(vctx, key, keylen, iv, ivlen, params, 1); } static int aes_ocb_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return aes_ocb_init(vctx, key, keylen, iv, ivlen, params, 0); } /* * Because of the way OCB works, both the AAD and data are buffered in the * same way. Only the last block can be a partial block. */ static int aes_ocb_block_update_internal(PROV_AES_OCB_CTX *ctx, unsigned char *buf, size_t *bufsz, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl, OSSL_ocb_cipher_fn ciph) { size_t nextblocks; size_t outlint = 0; if (*bufsz != 0) nextblocks = ossl_cipher_fillblock(buf, bufsz, AES_BLOCK_SIZE, &in, &inl); else nextblocks = inl & ~(AES_BLOCK_SIZE-1); if (*bufsz == AES_BLOCK_SIZE) { if (outsize < AES_BLOCK_SIZE) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } if (!ciph(ctx, buf, out, AES_BLOCK_SIZE)) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } *bufsz = 0; outlint = AES_BLOCK_SIZE; if (out != NULL) out += AES_BLOCK_SIZE; } if (nextblocks > 0) { outlint += nextblocks; if (outsize < outlint) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } if (!ciph(ctx, in, out, nextblocks)) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } in += nextblocks; inl -= nextblocks; } if (inl != 0 && !ossl_cipher_trailingdata(buf, bufsz, AES_BLOCK_SIZE, &in, &inl)) { /* PROVerr already called */ return 0; } *outl = outlint; return inl == 0; } /* A wrapper function that has the same signature as cipher */ static int cipher_updateaad(PROV_AES_OCB_CTX *ctx, const unsigned char *in, unsigned char *out, size_t len) { return aes_generic_ocb_setaad(ctx, in, len); } static int update_iv(PROV_AES_OCB_CTX *ctx) { if (ctx->iv_state == IV_STATE_FINISHED || ctx->iv_state == IV_STATE_UNINITIALISED) return 0; if (ctx->iv_state == IV_STATE_BUFFERED) { if (!aes_generic_ocb_setiv(ctx, ctx->base.iv, ctx->base.ivlen, ctx->taglen)) return 0; ctx->iv_state = IV_STATE_COPIED; } return 1; } static int aes_ocb_block_update(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { PROV_AES_OCB_CTX *ctx = (PROV_AES_OCB_CTX *)vctx; unsigned char *buf; size_t *buflen; OSSL_ocb_cipher_fn fn; if (!ctx->key_set || !update_iv(ctx)) return 0; if (inl == 0) { *outl = 0; return 1; } /* Are we dealing with AAD or normal data here? */ if (out == NULL) { buf = ctx->aad_buf; buflen = &ctx->aad_buf_len; fn = cipher_updateaad; } else { buf = ctx->data_buf; buflen = &ctx->data_buf_len; fn = aes_generic_ocb_cipher; } return aes_ocb_block_update_internal(ctx, buf, buflen, out, outl, outsize, in, inl, fn); } static int aes_ocb_block_final(void *vctx, unsigned char *out, size_t *outl, size_t outsize) { PROV_AES_OCB_CTX *ctx = (PROV_AES_OCB_CTX *)vctx; if (!ossl_prov_is_running()) return 0; /* If no block_update has run then the iv still needs to be set */ if (!ctx->key_set || !update_iv(ctx)) return 0; /* * Empty the buffer of any partial block that we might have been provided, * both for data and AAD */ *outl = 0; if (ctx->data_buf_len > 0) { if (!aes_generic_ocb_cipher(ctx, ctx->data_buf, out, ctx->data_buf_len)) return 0; *outl = ctx->data_buf_len; ctx->data_buf_len = 0; } if (ctx->aad_buf_len > 0) { if (!aes_generic_ocb_setaad(ctx, ctx->aad_buf, ctx->aad_buf_len)) return 0; ctx->aad_buf_len = 0; } if (ctx->base.enc) { /* If encrypting then just get the tag */ if (!aes_generic_ocb_gettag(ctx, ctx->tag, ctx->taglen)) return 0; } else { /* If decrypting then verify */ if (ctx->taglen == 0) return 0; if (!aes_generic_ocb_final(ctx)) return 0; } /* Don't reuse the IV */ ctx->iv_state = IV_STATE_FINISHED; return 1; } static void *aes_ocb_newctx(void *provctx, size_t kbits, size_t blkbits, size_t ivbits, unsigned int mode, uint64_t flags) { PROV_AES_OCB_CTX *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) { ossl_cipher_generic_initkey(ctx, kbits, blkbits, ivbits, mode, flags, ossl_prov_cipher_hw_aes_ocb(kbits), NULL); ctx->taglen = OCB_DEFAULT_TAG_LEN; } return ctx; } static void aes_ocb_freectx(void *vctx) { PROV_AES_OCB_CTX *ctx = (PROV_AES_OCB_CTX *)vctx; if (ctx != NULL) { aes_generic_ocb_cleanup(ctx); ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } } static void *aes_ocb_dupctx(void *vctx) { PROV_AES_OCB_CTX *in = (PROV_AES_OCB_CTX *)vctx; PROV_AES_OCB_CTX *ret; if (!ossl_prov_is_running()) return NULL; ret = OPENSSL_malloc(sizeof(*ret)); if (ret == NULL) return NULL; *ret = *in; if (!aes_generic_ocb_copy_ctx(ret, in)) { OPENSSL_free(ret); ret = NULL; } return ret; } static int aes_ocb_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { PROV_AES_OCB_CTX *ctx = (PROV_AES_OCB_CTX *)vctx; const OSSL_PARAM *p; size_t sz; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_AEAD_TAG); if (p != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (p->data == NULL) { /* Tag len must be 0 to 16 */ if (p->data_size > OCB_MAX_TAG_LEN) return 0; ctx->taglen = p->data_size; } else { if (p->data_size != ctx->taglen || ctx->base.enc) return 0; memcpy(ctx->tag, p->data, p->data_size); } } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_AEAD_IVLEN); if (p != NULL) { if (!OSSL_PARAM_get_size_t(p, &sz)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } /* IV len must be 1 to 15 */ if (sz < OCB_MIN_IV_LEN || sz > OCB_MAX_IV_LEN) return 0; if (ctx->base.ivlen != sz) { ctx->base.ivlen = sz; ctx->iv_state = IV_STATE_UNINITIALISED; } } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL) { size_t keylen; if (!OSSL_PARAM_get_size_t(p, &keylen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (ctx->base.keylen != keylen) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } } return 1; } static int aes_ocb_get_ctx_params(void *vctx, OSSL_PARAM params[]) { PROV_AES_OCB_CTX *ctx = (PROV_AES_OCB_CTX *)vctx; OSSL_PARAM *p; p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IVLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->base.ivlen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->base.keylen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_AEAD_TAGLEN); if (p != NULL) { if (!OSSL_PARAM_set_size_t(p, ctx->taglen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IV); if (p != NULL) { if (ctx->base.ivlen > p->data_size) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH); return 0; } if (!OSSL_PARAM_set_octet_string(p, ctx->base.oiv, ctx->base.ivlen) && !OSSL_PARAM_set_octet_ptr(p, &ctx->base.oiv, ctx->base.ivlen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_UPDATED_IV); if (p != NULL) { if (ctx->base.ivlen > p->data_size) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH); return 0; } if (!OSSL_PARAM_set_octet_string(p, ctx->base.iv, ctx->base.ivlen) && !OSSL_PARAM_set_octet_ptr(p, &ctx->base.iv, ctx->base.ivlen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_AEAD_TAG); if (p != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (!ctx->base.enc || p->data_size != ctx->taglen) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_TAG_LENGTH); return 0; } memcpy(p->data, ctx->tag, ctx->taglen); } return 1; } static const OSSL_PARAM cipher_ocb_known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_AEAD_TAGLEN, NULL), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_IV, NULL, 0), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_UPDATED_IV, NULL, 0), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TAG, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *cipher_ocb_gettable_ctx_params(ossl_unused void *cctx, ossl_unused void *p_ctx) { return cipher_ocb_known_gettable_ctx_params; } static const OSSL_PARAM cipher_ocb_known_settable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_AEAD_IVLEN, NULL), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TAG, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *cipher_ocb_settable_ctx_params(ossl_unused void *cctx, ossl_unused void *p_ctx) { return cipher_ocb_known_settable_ctx_params; } static int aes_ocb_cipher(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { PROV_AES_OCB_CTX *ctx = (PROV_AES_OCB_CTX *)vctx; if (!ossl_prov_is_running()) return 0; if (outsize < inl) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } if (!aes_generic_ocb_cipher(ctx, in, out, inl)) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } *outl = inl; return 1; } #define IMPLEMENT_cipher(mode, UCMODE, flags, kbits, blkbits, ivbits) \ static OSSL_FUNC_cipher_get_params_fn aes_##kbits##_##mode##_get_params; \ static int aes_##kbits##_##mode##_get_params(OSSL_PARAM params[]) \ { \ return ossl_cipher_generic_get_params(params, EVP_CIPH_##UCMODE##_MODE, \ flags, kbits, blkbits, ivbits); \ } \ static OSSL_FUNC_cipher_newctx_fn aes_##kbits##_##mode##_newctx; \ static void *aes_##kbits##_##mode##_newctx(void *provctx) \ { \ return aes_##mode##_newctx(provctx, kbits, blkbits, ivbits, \ EVP_CIPH_##UCMODE##_MODE, flags); \ } \ const OSSL_DISPATCH ossl_##aes##kbits##mode##_functions[] = { \ { OSSL_FUNC_CIPHER_NEWCTX, \ (void (*)(void))aes_##kbits##_##mode##_newctx }, \ { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))aes_##mode##_einit }, \ { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))aes_##mode##_dinit }, \ { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))aes_##mode##_block_update }, \ { OSSL_FUNC_CIPHER_FINAL, (void (*)(void))aes_##mode##_block_final }, \ { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))aes_ocb_cipher }, \ { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))aes_##mode##_freectx }, \ { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))aes_##mode##_dupctx }, \ { OSSL_FUNC_CIPHER_GET_PARAMS, \ (void (*)(void))aes_##kbits##_##mode##_get_params }, \ { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, \ (void (*)(void))aes_##mode##_get_ctx_params }, \ { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, \ (void (*)(void))aes_##mode##_set_ctx_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, \ (void (*)(void))cipher_ocb_gettable_ctx_params }, \ { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, \ (void (*)(void))cipher_ocb_settable_ctx_params }, \ OSSL_DISPATCH_END \ } IMPLEMENT_cipher(ocb, OCB, AES_OCB_FLAGS, 256, 128, OCB_DEFAULT_IV_LEN * 8); IMPLEMENT_cipher(ocb, OCB, AES_OCB_FLAGS, 192, 128, OCB_DEFAULT_IV_LEN * 8); IMPLEMENT_cipher(ocb, OCB, AES_OCB_FLAGS, 128, 128, OCB_DEFAULT_IV_LEN * 8);
./openssl/providers/implementations/ciphers/cipher_sm4_xts.c
/* * Copyright 2022-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for SM4 XTS mode */ #include <openssl/proverr.h> #include "cipher_sm4_xts.h" #include "prov/implementations.h" #include "prov/providercommon.h" #define SM4_XTS_FLAGS PROV_CIPHER_FLAG_CUSTOM_IV #define SM4_XTS_IV_BITS 128 #define SM4_XTS_BLOCK_BITS 8 /* forward declarations */ static OSSL_FUNC_cipher_encrypt_init_fn sm4_xts_einit; static OSSL_FUNC_cipher_decrypt_init_fn sm4_xts_dinit; static OSSL_FUNC_cipher_update_fn sm4_xts_stream_update; static OSSL_FUNC_cipher_final_fn sm4_xts_stream_final; static OSSL_FUNC_cipher_cipher_fn sm4_xts_cipher; static OSSL_FUNC_cipher_freectx_fn sm4_xts_freectx; static OSSL_FUNC_cipher_dupctx_fn sm4_xts_dupctx; static OSSL_FUNC_cipher_set_ctx_params_fn sm4_xts_set_ctx_params; static OSSL_FUNC_cipher_settable_ctx_params_fn sm4_xts_settable_ctx_params; /*- * Provider dispatch functions */ static int sm4_xts_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) { PROV_SM4_XTS_CTX *xctx = (PROV_SM4_XTS_CTX *)vctx; PROV_CIPHER_CTX *ctx = &xctx->base; if (!ossl_prov_is_running()) return 0; ctx->enc = enc; if (iv != NULL) { if (!ossl_cipher_generic_initiv(vctx, iv, ivlen)) return 0; } if (key != NULL) { if (keylen != ctx->keylen) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } if (!ctx->hw->init(ctx, key, keylen)) return 0; } return sm4_xts_set_ctx_params(xctx, params); } static int sm4_xts_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return sm4_xts_init(vctx, key, keylen, iv, ivlen, params, 1); } static int sm4_xts_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return sm4_xts_init(vctx, key, keylen, iv, ivlen, params, 0); } static void *sm4_xts_newctx(void *provctx, unsigned int mode, uint64_t flags, size_t kbits, size_t blkbits, size_t ivbits) { PROV_SM4_XTS_CTX *ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) { ossl_cipher_generic_initkey(&ctx->base, kbits, blkbits, ivbits, mode, flags, ossl_prov_cipher_hw_sm4_xts(kbits), NULL); } return ctx; } static void sm4_xts_freectx(void *vctx) { PROV_SM4_XTS_CTX *ctx = (PROV_SM4_XTS_CTX *)vctx; ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } static void *sm4_xts_dupctx(void *vctx) { PROV_SM4_XTS_CTX *in = (PROV_SM4_XTS_CTX *)vctx; PROV_SM4_XTS_CTX *ret = NULL; if (!ossl_prov_is_running()) return NULL; if (in->xts.key1 != NULL) { if (in->xts.key1 != &in->ks1) return NULL; } if (in->xts.key2 != NULL) { if (in->xts.key2 != &in->ks2) return NULL; } ret = OPENSSL_malloc(sizeof(*ret)); if (ret == NULL) return NULL; in->base.hw->copyctx(&ret->base, &in->base); return ret; } static int sm4_xts_cipher(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { PROV_SM4_XTS_CTX *ctx = (PROV_SM4_XTS_CTX *)vctx; if (!ossl_prov_is_running() || ctx->xts.key1 == NULL || ctx->xts.key2 == NULL || !ctx->base.iv_set || out == NULL || in == NULL || inl < SM4_BLOCK_SIZE) return 0; /* * Impose a limit of 2^20 blocks per data unit as specified by * IEEE Std 1619-2018. The earlier and obsolete IEEE Std 1619-2007 * indicated that this was a SHOULD NOT rather than a MUST NOT. * NIST SP 800-38E mandates the same limit. */ if (inl > XTS_MAX_BLOCKS_PER_DATA_UNIT * SM4_BLOCK_SIZE) { ERR_raise(ERR_LIB_PROV, PROV_R_XTS_DATA_UNIT_IS_TOO_LARGE); return 0; } if (ctx->xts_standard) { if (ctx->stream != NULL) (*ctx->stream)(in, out, inl, ctx->xts.key1, ctx->xts.key2, ctx->base.iv, ctx->base.enc); else if (CRYPTO_xts128_encrypt(&ctx->xts, ctx->base.iv, in, out, inl, ctx->base.enc)) return 0; } else { if (ctx->stream_gb != NULL) (*ctx->stream_gb)(in, out, inl, ctx->xts.key1, ctx->xts.key2, ctx->base.iv, ctx->base.enc); else if (ossl_crypto_xts128gb_encrypt(&ctx->xts, ctx->base.iv, in, out, inl, ctx->base.enc)) return 0; } *outl = inl; return 1; } static int sm4_xts_stream_update(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { PROV_SM4_XTS_CTX *ctx = (PROV_SM4_XTS_CTX *)vctx; if (outsize < inl) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } if (!sm4_xts_cipher(ctx, out, outl, outsize, in, inl)) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } return 1; } static int sm4_xts_stream_final(void *vctx, unsigned char *out, size_t *outl, size_t outsize) { if (!ossl_prov_is_running()) return 0; *outl = 0; return 1; } static const OSSL_PARAM sm4_xts_known_settable_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_CIPHER_PARAM_XTS_STANDARD, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *sm4_xts_settable_ctx_params(ossl_unused void *cctx, ossl_unused void *provctx) { return sm4_xts_known_settable_ctx_params; } static int sm4_xts_set_ctx_params(void *vxctx, const OSSL_PARAM params[]) { PROV_SM4_XTS_CTX *xctx = (PROV_SM4_XTS_CTX *)vxctx; const OSSL_PARAM *p; if (params == NULL) return 1; /*- * Sets the XTS standard to use with SM4-XTS algorithm. * * Must be utf8 string "GB" or "IEEE", * "GB" means the GB/T 17964-2021 standard * "IEEE" means the IEEE Std 1619-2007 standard */ p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_XTS_STANDARD); if (p != NULL) { const char *xts_standard = NULL; if (p->data_type != OSSL_PARAM_UTF8_STRING) return 0; if (!OSSL_PARAM_get_utf8_string_ptr(p, &xts_standard)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (OPENSSL_strcasecmp(xts_standard, "GB") == 0) { xctx->xts_standard = 0; } else if (OPENSSL_strcasecmp(xts_standard, "IEEE") == 0) { xctx->xts_standard = 1; } else { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } } return 1; } #define IMPLEMENT_cipher(lcmode, UCMODE, kbits, flags) \ static OSSL_FUNC_cipher_get_params_fn sm4_##kbits##_##lcmode##_get_params; \ static int sm4_##kbits##_##lcmode##_get_params(OSSL_PARAM params[]) \ { \ return ossl_cipher_generic_get_params(params, EVP_CIPH_##UCMODE##_MODE, \ flags, 2 * kbits, SM4_XTS_BLOCK_BITS,\ SM4_XTS_IV_BITS); \ } \ static OSSL_FUNC_cipher_newctx_fn sm4_##kbits##_xts_newctx; \ static void *sm4_##kbits##_xts_newctx(void *provctx) \ { \ return sm4_xts_newctx(provctx, EVP_CIPH_##UCMODE##_MODE, flags, 2 * kbits, \ SM4_XTS_BLOCK_BITS, SM4_XTS_IV_BITS); \ } \ const OSSL_DISPATCH ossl_sm4##kbits##xts_functions[] = { \ { OSSL_FUNC_CIPHER_NEWCTX, (void (*)(void))sm4_##kbits##_xts_newctx }, \ { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))sm4_xts_einit }, \ { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))sm4_xts_dinit }, \ { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))sm4_xts_stream_update }, \ { OSSL_FUNC_CIPHER_FINAL, (void (*)(void))sm4_xts_stream_final }, \ { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))sm4_xts_cipher }, \ { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))sm4_xts_freectx }, \ { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))sm4_xts_dupctx }, \ { OSSL_FUNC_CIPHER_GET_PARAMS, \ (void (*)(void))sm4_##kbits##_##lcmode##_get_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_params }, \ { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_get_ctx_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_ctx_params }, \ { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, \ (void (*)(void))sm4_xts_set_ctx_params }, \ { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, \ (void (*)(void))sm4_xts_settable_ctx_params }, \ OSSL_DISPATCH_END \ } /* ossl_sm4128xts_functions */ IMPLEMENT_cipher(xts, XTS, 128, SM4_XTS_FLAGS);
./openssl/providers/implementations/ciphers/cipher_sm4_ccm.h
/* * Copyright 2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "crypto/sm4.h" #include "prov/ciphercommon.h" #include "prov/ciphercommon_ccm.h" #include "crypto/sm4_platform.h" typedef struct prov_sm4_ccm_ctx_st { PROV_CCM_CTX base; /* Must be first */ union { OSSL_UNION_ALIGN; SM4_KEY ks; } ks; /* SM4 key schedule to use */ } PROV_SM4_CCM_CTX; const PROV_CCM_HW *ossl_prov_sm4_hw_ccm(size_t keylen);
./openssl/providers/implementations/ciphers/cipher_camellia_hw.c
/* * Copyright 2001-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * Camellia low level APIs are deprecated for public use, but still ok for * internal use. */ #include "internal/deprecated.h" #include <openssl/camellia.h> #include <openssl/proverr.h> #include "cipher_camellia.h" static int cipher_hw_camellia_initkey(PROV_CIPHER_CTX *dat, const unsigned char *key, size_t keylen) { int ret, mode = dat->mode; PROV_CAMELLIA_CTX *adat = (PROV_CAMELLIA_CTX *)dat; CAMELLIA_KEY *ks = &adat->ks.ks; dat->ks = ks; ret = Camellia_set_key(key, keylen * 8, ks); if (ret < 0) { ERR_raise(ERR_LIB_PROV, PROV_R_KEY_SETUP_FAILED); return 0; } if (dat->enc || (mode != EVP_CIPH_ECB_MODE && mode != EVP_CIPH_CBC_MODE)) { dat->block = (block128_f) Camellia_encrypt; dat->stream.cbc = mode == EVP_CIPH_CBC_MODE ? (cbc128_f) Camellia_cbc_encrypt : NULL; } else { dat->block = (block128_f) Camellia_decrypt; dat->stream.cbc = mode == EVP_CIPH_CBC_MODE ? (cbc128_f) Camellia_cbc_encrypt : NULL; } return 1; } IMPLEMENT_CIPHER_HW_COPYCTX(cipher_hw_camellia_copyctx, PROV_CAMELLIA_CTX) # if defined(SPARC_CMLL_CAPABLE) # include "cipher_camellia_hw_t4.inc" # else /* The generic case */ # define PROV_CIPHER_HW_declare(mode) # define PROV_CIPHER_HW_select(mode) # endif /* SPARC_CMLL_CAPABLE */ #define PROV_CIPHER_HW_camellia_mode(mode) \ static const PROV_CIPHER_HW camellia_##mode = { \ cipher_hw_camellia_initkey, \ ossl_cipher_hw_generic_##mode, \ cipher_hw_camellia_copyctx \ }; \ PROV_CIPHER_HW_declare(mode) \ const PROV_CIPHER_HW *ossl_prov_cipher_hw_camellia_##mode(size_t keybits) \ { \ PROV_CIPHER_HW_select(mode) \ return &camellia_##mode; \ } PROV_CIPHER_HW_camellia_mode(cbc) PROV_CIPHER_HW_camellia_mode(ecb) PROV_CIPHER_HW_camellia_mode(ofb128) PROV_CIPHER_HW_camellia_mode(cfb128) PROV_CIPHER_HW_camellia_mode(cfb1) PROV_CIPHER_HW_camellia_mode(cfb8) PROV_CIPHER_HW_camellia_mode(ctr)
./openssl/providers/implementations/ciphers/cipher_chacha20_poly1305_hw.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* chacha20_poly1305 cipher implementation */ #include "internal/endian.h" #include "cipher_chacha20_poly1305.h" static int chacha_poly1305_tls_init(PROV_CIPHER_CTX *bctx, unsigned char *aad, size_t alen) { unsigned int len; PROV_CHACHA20_POLY1305_CTX *ctx = (PROV_CHACHA20_POLY1305_CTX *)bctx; if (alen != EVP_AEAD_TLS1_AAD_LEN) return 0; memcpy(ctx->tls_aad, aad, EVP_AEAD_TLS1_AAD_LEN); len = aad[EVP_AEAD_TLS1_AAD_LEN - 2] << 8 | aad[EVP_AEAD_TLS1_AAD_LEN - 1]; aad = ctx->tls_aad; if (!bctx->enc) { if (len < POLY1305_BLOCK_SIZE) return 0; len -= POLY1305_BLOCK_SIZE; /* discount attached tag */ aad[EVP_AEAD_TLS1_AAD_LEN - 2] = (unsigned char)(len >> 8); aad[EVP_AEAD_TLS1_AAD_LEN - 1] = (unsigned char)len; } ctx->tls_payload_length = len; /* merge record sequence number as per RFC7905 */ ctx->chacha.counter[1] = ctx->nonce[0]; ctx->chacha.counter[2] = ctx->nonce[1] ^ CHACHA_U8TOU32(aad); ctx->chacha.counter[3] = ctx->nonce[2] ^ CHACHA_U8TOU32(aad+4); ctx->mac_inited = 0; return POLY1305_BLOCK_SIZE; /* tag length */ } static int chacha_poly1305_tls_iv_set_fixed(PROV_CIPHER_CTX *bctx, unsigned char *fixed, size_t flen) { PROV_CHACHA20_POLY1305_CTX *ctx = (PROV_CHACHA20_POLY1305_CTX *)bctx; if (flen != CHACHA20_POLY1305_IVLEN) return 0; ctx->nonce[0] = ctx->chacha.counter[1] = CHACHA_U8TOU32(fixed); ctx->nonce[1] = ctx->chacha.counter[2] = CHACHA_U8TOU32(fixed + 4); ctx->nonce[2] = ctx->chacha.counter[3] = CHACHA_U8TOU32(fixed + 8); return 1; } static int chacha20_poly1305_initkey(PROV_CIPHER_CTX *bctx, const unsigned char *key, size_t keylen) { PROV_CHACHA20_POLY1305_CTX *ctx = (PROV_CHACHA20_POLY1305_CTX *)bctx; ctx->len.aad = 0; ctx->len.text = 0; ctx->aad = 0; ctx->mac_inited = 0; ctx->tls_payload_length = NO_TLS_PAYLOAD_LENGTH; if (bctx->enc) return ossl_chacha20_einit(&ctx->chacha, key, keylen, NULL, 0, NULL); else return ossl_chacha20_dinit(&ctx->chacha, key, keylen, NULL, 0, NULL); } static int chacha20_poly1305_initiv(PROV_CIPHER_CTX *bctx) { PROV_CHACHA20_POLY1305_CTX *ctx = (PROV_CHACHA20_POLY1305_CTX *)bctx; unsigned char tempiv[CHACHA_CTR_SIZE] = { 0 }; int ret = 1; size_t noncelen = CHACHA20_POLY1305_IVLEN; ctx->len.aad = 0; ctx->len.text = 0; ctx->aad = 0; ctx->mac_inited = 0; ctx->tls_payload_length = NO_TLS_PAYLOAD_LENGTH; /* pad on the left */ memcpy(tempiv + CHACHA_CTR_SIZE - noncelen, bctx->oiv, noncelen); if (bctx->enc) ret = ossl_chacha20_einit(&ctx->chacha, NULL, 0, tempiv, sizeof(tempiv), NULL); else ret = ossl_chacha20_dinit(&ctx->chacha, NULL, 0, tempiv, sizeof(tempiv), NULL); ctx->nonce[0] = ctx->chacha.counter[1]; ctx->nonce[1] = ctx->chacha.counter[2]; ctx->nonce[2] = ctx->chacha.counter[3]; bctx->iv_set = 1; return ret; } #if !defined(OPENSSL_SMALL_FOOTPRINT) # if defined(POLY1305_ASM) && (defined(__x86_64) || defined(__x86_64__) \ || defined(_M_AMD64) || defined(_M_X64)) # define XOR128_HELPERS void *xor128_encrypt_n_pad(void *out, const void *inp, void *otp, size_t len); void *xor128_decrypt_n_pad(void *out, const void *inp, void *otp, size_t len); static const unsigned char zero[4 * CHACHA_BLK_SIZE] = { 0 }; # else static const unsigned char zero[2 * CHACHA_BLK_SIZE] = { 0 }; # endif static int chacha20_poly1305_tls_cipher(PROV_CIPHER_CTX *bctx, unsigned char *out, size_t *out_padlen, const unsigned char *in, size_t len) { PROV_CHACHA20_POLY1305_CTX *ctx = (PROV_CHACHA20_POLY1305_CTX *)bctx; POLY1305 *poly = &ctx->poly1305; size_t tail, tohash_len, buf_len, plen = ctx->tls_payload_length; unsigned char *buf, *tohash, *ctr, storage[sizeof(zero) + 32]; DECLARE_IS_ENDIAN; buf = storage + ((0 - (size_t)storage) & 15); /* align */ ctr = buf + CHACHA_BLK_SIZE; tohash = buf + CHACHA_BLK_SIZE - POLY1305_BLOCK_SIZE; # ifdef XOR128_HELPERS if (plen <= 3 * CHACHA_BLK_SIZE) { ctx->chacha.counter[0] = 0; buf_len = (plen + 2 * CHACHA_BLK_SIZE - 1) & (0 - CHACHA_BLK_SIZE); ChaCha20_ctr32(buf, zero, buf_len, ctx->chacha.key.d, ctx->chacha.counter); Poly1305_Init(poly, buf); ctx->chacha.partial_len = 0; memcpy(tohash, ctx->tls_aad, POLY1305_BLOCK_SIZE); tohash_len = POLY1305_BLOCK_SIZE; ctx->len.aad = EVP_AEAD_TLS1_AAD_LEN; ctx->len.text = plen; if (plen) { if (bctx->enc) ctr = xor128_encrypt_n_pad(out, in, ctr, plen); else ctr = xor128_decrypt_n_pad(out, in, ctr, plen); in += plen; out += plen; tohash_len = (size_t)(ctr - tohash); } } # else if (plen <= CHACHA_BLK_SIZE) { size_t i; ctx->chacha.counter[0] = 0; ChaCha20_ctr32(buf, zero, (buf_len = 2 * CHACHA_BLK_SIZE), ctx->chacha.key.d, ctx->chacha.counter); Poly1305_Init(poly, buf); ctx->chacha.partial_len = 0; memcpy(tohash, ctx->tls_aad, POLY1305_BLOCK_SIZE); tohash_len = POLY1305_BLOCK_SIZE; ctx->len.aad = EVP_AEAD_TLS1_AAD_LEN; ctx->len.text = plen; if (bctx->enc) { for (i = 0; i < plen; i++) out[i] = ctr[i] ^= in[i]; } else { for (i = 0; i < plen; i++) { unsigned char c = in[i]; out[i] = ctr[i] ^ c; ctr[i] = c; } } in += i; out += i; tail = (0 - i) & (POLY1305_BLOCK_SIZE - 1); memset(ctr + i, 0, tail); ctr += i + tail; tohash_len += i + tail; } # endif else { ctx->chacha.counter[0] = 0; ChaCha20_ctr32(buf, zero, (buf_len = CHACHA_BLK_SIZE), ctx->chacha.key.d, ctx->chacha.counter); Poly1305_Init(poly, buf); ctx->chacha.counter[0] = 1; ctx->chacha.partial_len = 0; Poly1305_Update(poly, ctx->tls_aad, POLY1305_BLOCK_SIZE); tohash = ctr; tohash_len = 0; ctx->len.aad = EVP_AEAD_TLS1_AAD_LEN; ctx->len.text = plen; if (bctx->enc) { ChaCha20_ctr32(out, in, plen, ctx->chacha.key.d, ctx->chacha.counter); Poly1305_Update(poly, out, plen); } else { Poly1305_Update(poly, in, plen); ChaCha20_ctr32(out, in, plen, ctx->chacha.key.d, ctx->chacha.counter); } in += plen; out += plen; tail = (0 - plen) & (POLY1305_BLOCK_SIZE - 1); Poly1305_Update(poly, zero, tail); } if (IS_LITTLE_ENDIAN) { memcpy(ctr, (unsigned char *)&ctx->len, POLY1305_BLOCK_SIZE); } else { ctr[0] = (unsigned char)(ctx->len.aad); ctr[1] = (unsigned char)(ctx->len.aad>>8); ctr[2] = (unsigned char)(ctx->len.aad>>16); ctr[3] = (unsigned char)(ctx->len.aad>>24); ctr[4] = (unsigned char)(ctx->len.aad>>32); ctr[5] = (unsigned char)(ctx->len.aad>>40); ctr[6] = (unsigned char)(ctx->len.aad>>48); ctr[7] = (unsigned char)(ctx->len.aad>>56); ctr[8] = (unsigned char)(ctx->len.text); ctr[9] = (unsigned char)(ctx->len.text>>8); ctr[10] = (unsigned char)(ctx->len.text>>16); ctr[11] = (unsigned char)(ctx->len.text>>24); ctr[12] = (unsigned char)(ctx->len.text>>32); ctr[13] = (unsigned char)(ctx->len.text>>40); ctr[14] = (unsigned char)(ctx->len.text>>48); ctr[15] = (unsigned char)(ctx->len.text>>56); } tohash_len += POLY1305_BLOCK_SIZE; Poly1305_Update(poly, tohash, tohash_len); OPENSSL_cleanse(buf, buf_len); Poly1305_Final(poly, bctx->enc ? ctx->tag : tohash); ctx->tls_payload_length = NO_TLS_PAYLOAD_LENGTH; if (bctx->enc) { memcpy(out, ctx->tag, POLY1305_BLOCK_SIZE); } else { if (CRYPTO_memcmp(tohash, in, POLY1305_BLOCK_SIZE)) { if (len > POLY1305_BLOCK_SIZE) memset(out - (len - POLY1305_BLOCK_SIZE), 0, len - POLY1305_BLOCK_SIZE); return 0; } /* Strip the tag */ len -= POLY1305_BLOCK_SIZE; } *out_padlen = len; return 1; } #else static const unsigned char zero[CHACHA_BLK_SIZE] = { 0 }; #endif /* OPENSSL_SMALL_FOOTPRINT */ static int chacha20_poly1305_aead_cipher(PROV_CIPHER_CTX *bctx, unsigned char *out, size_t *outl, const unsigned char *in, size_t inl) { PROV_CHACHA20_POLY1305_CTX *ctx = (PROV_CHACHA20_POLY1305_CTX *)bctx; POLY1305 *poly = &ctx->poly1305; size_t rem, plen = ctx->tls_payload_length; size_t olen = 0; int rv = 0; DECLARE_IS_ENDIAN; if (!ctx->mac_inited) { if (plen != NO_TLS_PAYLOAD_LENGTH && out != NULL) { if (inl != plen + POLY1305_BLOCK_SIZE) return 0; #if !defined(OPENSSL_SMALL_FOOTPRINT) return chacha20_poly1305_tls_cipher(bctx, out, outl, in, inl); #endif } ctx->chacha.counter[0] = 0; ChaCha20_ctr32(ctx->chacha.buf, zero, CHACHA_BLK_SIZE, ctx->chacha.key.d, ctx->chacha.counter); Poly1305_Init(poly, ctx->chacha.buf); ctx->chacha.counter[0] = 1; ctx->chacha.partial_len = 0; ctx->len.aad = ctx->len.text = 0; ctx->mac_inited = 1; if (plen != NO_TLS_PAYLOAD_LENGTH) { Poly1305_Update(poly, ctx->tls_aad, EVP_AEAD_TLS1_AAD_LEN); ctx->len.aad = EVP_AEAD_TLS1_AAD_LEN; ctx->aad = 1; } } if (in != NULL) { /* aad or text */ if (out == NULL) { /* aad */ Poly1305_Update(poly, in, inl); ctx->len.aad += inl; ctx->aad = 1; goto finish; } else { /* plain- or ciphertext */ if (ctx->aad) { /* wrap up aad */ if ((rem = (size_t)ctx->len.aad % POLY1305_BLOCK_SIZE)) Poly1305_Update(poly, zero, POLY1305_BLOCK_SIZE - rem); ctx->aad = 0; } ctx->tls_payload_length = NO_TLS_PAYLOAD_LENGTH; if (plen == NO_TLS_PAYLOAD_LENGTH) plen = inl; else if (inl != plen + POLY1305_BLOCK_SIZE) goto err; if (bctx->enc) { /* plaintext */ ctx->chacha.base.hw->cipher(&ctx->chacha.base, out, in, plen); Poly1305_Update(poly, out, plen); in += plen; out += plen; ctx->len.text += plen; } else { /* ciphertext */ Poly1305_Update(poly, in, plen); ctx->chacha.base.hw->cipher(&ctx->chacha.base, out, in, plen); in += plen; out += plen; ctx->len.text += plen; } } } /* explicit final, or tls mode */ if (in == NULL || inl != plen) { unsigned char temp[POLY1305_BLOCK_SIZE]; if (ctx->aad) { /* wrap up aad */ if ((rem = (size_t)ctx->len.aad % POLY1305_BLOCK_SIZE)) Poly1305_Update(poly, zero, POLY1305_BLOCK_SIZE - rem); ctx->aad = 0; } if ((rem = (size_t)ctx->len.text % POLY1305_BLOCK_SIZE)) Poly1305_Update(poly, zero, POLY1305_BLOCK_SIZE - rem); if (IS_LITTLE_ENDIAN) { Poly1305_Update(poly, (unsigned char *)&ctx->len, POLY1305_BLOCK_SIZE); } else { temp[0] = (unsigned char)(ctx->len.aad); temp[1] = (unsigned char)(ctx->len.aad>>8); temp[2] = (unsigned char)(ctx->len.aad>>16); temp[3] = (unsigned char)(ctx->len.aad>>24); temp[4] = (unsigned char)(ctx->len.aad>>32); temp[5] = (unsigned char)(ctx->len.aad>>40); temp[6] = (unsigned char)(ctx->len.aad>>48); temp[7] = (unsigned char)(ctx->len.aad>>56); temp[8] = (unsigned char)(ctx->len.text); temp[9] = (unsigned char)(ctx->len.text>>8); temp[10] = (unsigned char)(ctx->len.text>>16); temp[11] = (unsigned char)(ctx->len.text>>24); temp[12] = (unsigned char)(ctx->len.text>>32); temp[13] = (unsigned char)(ctx->len.text>>40); temp[14] = (unsigned char)(ctx->len.text>>48); temp[15] = (unsigned char)(ctx->len.text>>56); Poly1305_Update(poly, temp, POLY1305_BLOCK_SIZE); } Poly1305_Final(poly, bctx->enc ? ctx->tag : temp); ctx->mac_inited = 0; if (in != NULL && inl != plen) { if (bctx->enc) { memcpy(out, ctx->tag, POLY1305_BLOCK_SIZE); } else { if (CRYPTO_memcmp(temp, in, POLY1305_BLOCK_SIZE)) { memset(out - plen, 0, plen); goto err; } /* Strip the tag */ inl -= POLY1305_BLOCK_SIZE; } } else if (!bctx->enc) { if (CRYPTO_memcmp(temp, ctx->tag, ctx->tag_len)) goto err; } } finish: olen = inl; rv = 1; err: *outl = olen; return rv; } static const PROV_CIPHER_HW_CHACHA20_POLY1305 chacha20poly1305_hw = { { chacha20_poly1305_initkey, NULL }, chacha20_poly1305_aead_cipher, chacha20_poly1305_initiv, chacha_poly1305_tls_init, chacha_poly1305_tls_iv_set_fixed }; const PROV_CIPHER_HW *ossl_prov_cipher_hw_chacha20_poly1305(size_t keybits) { return (PROV_CIPHER_HW *)&chacha20poly1305_hw; }
./openssl/providers/implementations/ciphers/cipher_sm4_gcm.h
/* * Copyright 2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "crypto/sm4.h" #include "prov/ciphercommon.h" #include "prov/ciphercommon_gcm.h" typedef struct prov_sm4_gcm_ctx_st { PROV_GCM_CTX base; /* must be first entry in struct */ union { OSSL_UNION_ALIGN; SM4_KEY ks; } ks; } PROV_SM4_GCM_CTX; const PROV_GCM_HW *ossl_prov_sm4_hw_gcm(size_t keybits);
./openssl/providers/implementations/ciphers/cipher_blowfish_hw.c
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * BF low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include "cipher_blowfish.h" static int cipher_hw_blowfish_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_BLOWFISH_CTX *bctx = (PROV_BLOWFISH_CTX *)ctx; BF_set_key(&bctx->ks.ks, keylen, key); return 1; } # define PROV_CIPHER_HW_blowfish_mode(mode, UCMODE) \ IMPLEMENT_CIPHER_HW_##UCMODE(mode, blowfish, PROV_BLOWFISH_CTX, BF_KEY, \ BF_##mode) \ static const PROV_CIPHER_HW bf_##mode = { \ cipher_hw_blowfish_initkey, \ cipher_hw_blowfish_##mode##_cipher \ }; \ const PROV_CIPHER_HW *ossl_prov_cipher_hw_blowfish_##mode(size_t keybits) \ { \ return &bf_##mode; \ } PROV_CIPHER_HW_blowfish_mode(cbc, CBC) PROV_CIPHER_HW_blowfish_mode(ecb, ECB) PROV_CIPHER_HW_blowfish_mode(ofb64, OFB) PROV_CIPHER_HW_blowfish_mode(cfb64, CFB)
./openssl/providers/implementations/ciphers/cipher_tdes_default.h
/* * Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "prov/ciphercommon.h" #include "cipher_tdes.h" const PROV_CIPHER_HW *ossl_prov_cipher_hw_tdes_ede3_ofb(void); const PROV_CIPHER_HW *ossl_prov_cipher_hw_tdes_ede3_cfb(void); const PROV_CIPHER_HW *ossl_prov_cipher_hw_tdes_ede3_cfb1(void); const PROV_CIPHER_HW *ossl_prov_cipher_hw_tdes_ede3_cfb8(void); const PROV_CIPHER_HW *ossl_prov_cipher_hw_tdes_ede2_cbc(void); const PROV_CIPHER_HW *ossl_prov_cipher_hw_tdes_ede2_ecb(void); const PROV_CIPHER_HW *ossl_prov_cipher_hw_tdes_ede2_ofb(void); const PROV_CIPHER_HW *ossl_prov_cipher_hw_tdes_ede2_cfb(void); const PROV_CIPHER_HW *ossl_prov_cipher_hw_tdes_desx_cbc(void); const PROV_CIPHER_HW *ossl_prov_cipher_hw_tdes_wrap_cbc(void);
./openssl/providers/implementations/ciphers/cipher_aria_ccm.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for ARIA CCM mode */ #include "cipher_aria_ccm.h" #include "prov/implementations.h" #include "prov/providercommon.h" static OSSL_FUNC_cipher_freectx_fn aria_ccm_freectx; static void *aria_ccm_newctx(void *provctx, size_t keybits) { PROV_ARIA_CCM_CTX *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) ossl_ccm_initctx(&ctx->base, keybits, ossl_prov_aria_hw_ccm(keybits)); return ctx; } static void *aria_ccm_dupctx(void *provctx) { PROV_ARIA_CCM_CTX *ctx = provctx; PROV_ARIA_CCM_CTX *dctx = NULL; if (ctx == NULL) return NULL; dctx = OPENSSL_memdup(ctx, sizeof(*ctx)); if (dctx != NULL && dctx->base.ccm_ctx.key != NULL) dctx->base.ccm_ctx.key = &dctx->ks.ks; return dctx; } static void aria_ccm_freectx(void *vctx) { PROV_ARIA_CCM_CTX *ctx = (PROV_ARIA_CCM_CTX *)vctx; OPENSSL_clear_free(ctx, sizeof(*ctx)); } /* aria128ccm functions */ IMPLEMENT_aead_cipher(aria, ccm, CCM, AEAD_FLAGS, 128, 8, 96); /* aria192ccm functions */ IMPLEMENT_aead_cipher(aria, ccm, CCM, AEAD_FLAGS, 192, 8, 96); /* aria256ccm functions */ IMPLEMENT_aead_cipher(aria, ccm, CCM, AEAD_FLAGS, 256, 8, 96);
./openssl/providers/implementations/ciphers/cipher_aes_hw.c
/* * Copyright 2001-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * This file uses the low level AES functions (which are deprecated for * non-internal use) in order to implement provider AES ciphers. */ #include "internal/deprecated.h" #include <openssl/proverr.h> #include "cipher_aes.h" static int cipher_hw_aes_initkey(PROV_CIPHER_CTX *dat, const unsigned char *key, size_t keylen) { int ret; PROV_AES_CTX *adat = (PROV_AES_CTX *)dat; AES_KEY *ks = &adat->ks.ks; dat->ks = ks; if ((dat->mode == EVP_CIPH_ECB_MODE || dat->mode == EVP_CIPH_CBC_MODE) && !dat->enc) { #ifdef HWAES_CAPABLE if (HWAES_CAPABLE) { ret = HWAES_set_decrypt_key(key, keylen * 8, ks); dat->block = (block128_f)HWAES_decrypt; dat->stream.cbc = NULL; # ifdef HWAES_cbc_encrypt if (dat->mode == EVP_CIPH_CBC_MODE) dat->stream.cbc = (cbc128_f)HWAES_cbc_encrypt; # endif # ifdef HWAES_ecb_encrypt if (dat->mode == EVP_CIPH_ECB_MODE) dat->stream.ecb = (ecb128_f)HWAES_ecb_encrypt; # endif } else #endif #ifdef BSAES_CAPABLE if (BSAES_CAPABLE && dat->mode == EVP_CIPH_CBC_MODE) { ret = AES_set_decrypt_key(key, keylen * 8, ks); dat->block = (block128_f)AES_decrypt; dat->stream.cbc = (cbc128_f)ossl_bsaes_cbc_encrypt; } else #endif #ifdef VPAES_CAPABLE if (VPAES_CAPABLE) { ret = vpaes_set_decrypt_key(key, keylen * 8, ks); dat->block = (block128_f)vpaes_decrypt; dat->stream.cbc = (dat->mode == EVP_CIPH_CBC_MODE) ?(cbc128_f)vpaes_cbc_encrypt : NULL; } else #endif { ret = AES_set_decrypt_key(key, keylen * 8, ks); dat->block = (block128_f)AES_decrypt; dat->stream.cbc = (dat->mode == EVP_CIPH_CBC_MODE) ? (cbc128_f)AES_cbc_encrypt : NULL; } } else #ifdef HWAES_CAPABLE if (HWAES_CAPABLE) { ret = HWAES_set_encrypt_key(key, keylen * 8, ks); dat->block = (block128_f)HWAES_encrypt; dat->stream.cbc = NULL; # ifdef HWAES_cbc_encrypt if (dat->mode == EVP_CIPH_CBC_MODE) dat->stream.cbc = (cbc128_f)HWAES_cbc_encrypt; else # endif # ifdef HWAES_ecb_encrypt if (dat->mode == EVP_CIPH_ECB_MODE) dat->stream.ecb = (ecb128_f)HWAES_ecb_encrypt; else # endif # ifdef HWAES_ctr32_encrypt_blocks if (dat->mode == EVP_CIPH_CTR_MODE) dat->stream.ctr = (ctr128_f)HWAES_ctr32_encrypt_blocks; else # endif (void)0; /* terminate potentially open 'else' */ } else #endif #ifdef BSAES_CAPABLE if (BSAES_CAPABLE && dat->mode == EVP_CIPH_CTR_MODE) { ret = AES_set_encrypt_key(key, keylen * 8, ks); dat->block = (block128_f)AES_encrypt; dat->stream.ctr = (ctr128_f)ossl_bsaes_ctr32_encrypt_blocks; } else #endif #ifdef VPAES_CAPABLE if (VPAES_CAPABLE) { ret = vpaes_set_encrypt_key(key, keylen * 8, ks); dat->block = (block128_f)vpaes_encrypt; dat->stream.cbc = (dat->mode == EVP_CIPH_CBC_MODE) ? (cbc128_f)vpaes_cbc_encrypt : NULL; } else #endif { ret = AES_set_encrypt_key(key, keylen * 8, ks); dat->block = (block128_f)AES_encrypt; dat->stream.cbc = (dat->mode == EVP_CIPH_CBC_MODE) ? (cbc128_f)AES_cbc_encrypt : NULL; #ifdef AES_CTR_ASM if (dat->mode == EVP_CIPH_CTR_MODE) dat->stream.ctr = (ctr128_f)AES_ctr32_encrypt; #endif } if (ret < 0) { ERR_raise(ERR_LIB_PROV, PROV_R_KEY_SETUP_FAILED); return 0; } return 1; } IMPLEMENT_CIPHER_HW_COPYCTX(cipher_hw_aes_copyctx, PROV_AES_CTX) #define PROV_CIPHER_HW_aes_mode(mode) \ static const PROV_CIPHER_HW aes_##mode = { \ cipher_hw_aes_initkey, \ ossl_cipher_hw_generic_##mode, \ cipher_hw_aes_copyctx \ }; \ PROV_CIPHER_HW_declare(mode) \ const PROV_CIPHER_HW *ossl_prov_cipher_hw_aes_##mode(size_t keybits) \ { \ PROV_CIPHER_HW_select(mode) \ return &aes_##mode; \ } #if defined(AESNI_CAPABLE) # include "cipher_aes_hw_aesni.inc" #elif defined(SPARC_AES_CAPABLE) # include "cipher_aes_hw_t4.inc" #elif defined(S390X_aes_128_CAPABLE) # include "cipher_aes_hw_s390x.inc" #elif defined(__riscv) && __riscv_xlen == 64 # include "cipher_aes_hw_rv64i.inc" #elif defined(__riscv) && __riscv_xlen == 32 # include "cipher_aes_hw_rv32i.inc" #elif defined (ARMv8_HWAES_CAPABLE) # include "cipher_aes_hw_armv8.inc" #else /* The generic case */ # define PROV_CIPHER_HW_declare(mode) # define PROV_CIPHER_HW_select(mode) #endif PROV_CIPHER_HW_aes_mode(cbc) PROV_CIPHER_HW_aes_mode(ecb) PROV_CIPHER_HW_aes_mode(ofb128) PROV_CIPHER_HW_aes_mode(cfb128) PROV_CIPHER_HW_aes_mode(cfb1) PROV_CIPHER_HW_aes_mode(cfb8) PROV_CIPHER_HW_aes_mode(ctr)
./openssl/providers/implementations/ciphers/ciphercommon_gcm.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for gcm mode */ #include <openssl/rand.h> #include <openssl/proverr.h> #include "prov/ciphercommon.h" #include "prov/ciphercommon_gcm.h" #include "prov/providercommon.h" #include "prov/provider_ctx.h" #include "internal/param_names.h" static int gcm_tls_init(PROV_GCM_CTX *dat, unsigned char *aad, size_t aad_len); static int gcm_tls_iv_set_fixed(PROV_GCM_CTX *ctx, unsigned char *iv, size_t len); static int gcm_tls_cipher(PROV_GCM_CTX *ctx, unsigned char *out, size_t *padlen, const unsigned char *in, size_t len); static int gcm_cipher_internal(PROV_GCM_CTX *ctx, unsigned char *out, size_t *padlen, const unsigned char *in, size_t len); /* * Called from EVP_CipherInit when there is currently no context via * the new_ctx() function */ void ossl_gcm_initctx(void *provctx, PROV_GCM_CTX *ctx, size_t keybits, const PROV_GCM_HW *hw) { ctx->pad = 1; ctx->mode = EVP_CIPH_GCM_MODE; ctx->taglen = UNINITIALISED_SIZET; ctx->tls_aad_len = UNINITIALISED_SIZET; ctx->ivlen = (EVP_GCM_TLS_FIXED_IV_LEN + EVP_GCM_TLS_EXPLICIT_IV_LEN); ctx->keylen = keybits / 8; ctx->hw = hw; ctx->libctx = PROV_LIBCTX_OF(provctx); } /* * Called by EVP_CipherInit via the _einit and _dinit functions */ static int gcm_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) { PROV_GCM_CTX *ctx = (PROV_GCM_CTX *)vctx; if (!ossl_prov_is_running()) return 0; ctx->enc = enc; if (iv != NULL) { if (ivlen == 0 || ivlen > sizeof(ctx->iv)) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH); return 0; } ctx->ivlen = ivlen; memcpy(ctx->iv, iv, ivlen); ctx->iv_state = IV_STATE_BUFFERED; } if (key != NULL) { if (keylen != ctx->keylen) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } if (!ctx->hw->setkey(ctx, key, ctx->keylen)) return 0; ctx->tls_enc_records = 0; } return ossl_gcm_set_ctx_params(ctx, params); } int ossl_gcm_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return gcm_init(vctx, key, keylen, iv, ivlen, params, 1); } int ossl_gcm_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return gcm_init(vctx, key, keylen, iv, ivlen, params, 0); } /* increment counter (64-bit int) by 1 */ static void ctr64_inc(unsigned char *counter) { int n = 8; unsigned char c; do { --n; c = counter[n]; ++c; counter[n] = c; if (c > 0) return; } while (n > 0); } static int getivgen(PROV_GCM_CTX *ctx, unsigned char *out, size_t olen) { if (!ctx->iv_gen || !ctx->key_set || !ctx->hw->setiv(ctx, ctx->iv, ctx->ivlen)) return 0; if (olen == 0 || olen > ctx->ivlen) olen = ctx->ivlen; memcpy(out, ctx->iv + ctx->ivlen - olen, olen); /* * Invocation field will be at least 8 bytes in size and so no need * to check wrap around or increment more than last 8 bytes. */ ctr64_inc(ctx->iv + ctx->ivlen - 8); ctx->iv_state = IV_STATE_COPIED; return 1; } static int setivinv(PROV_GCM_CTX *ctx, unsigned char *in, size_t inl) { if (!ctx->iv_gen || !ctx->key_set || ctx->enc) return 0; memcpy(ctx->iv + ctx->ivlen - inl, in, inl); if (!ctx->hw->setiv(ctx, ctx->iv, ctx->ivlen)) return 0; ctx->iv_state = IV_STATE_COPIED; return 1; } int ossl_gcm_get_ctx_params(void *vctx, OSSL_PARAM params[]) { PROV_GCM_CTX *ctx = (PROV_GCM_CTX *)vctx; OSSL_PARAM *p; size_t sz; int type; for (p = params; p->key != NULL; p++) { type = ossl_param_find_pidx(p->key); switch (type) { default: break; case PIDX_CIPHER_PARAM_IVLEN: if (!OSSL_PARAM_set_size_t(p, ctx->ivlen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } break; case PIDX_CIPHER_PARAM_KEYLEN: if (!OSSL_PARAM_set_size_t(p, ctx->keylen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } break; case PIDX_CIPHER_PARAM_AEAD_TAGLEN: { size_t taglen = (ctx->taglen != UNINITIALISED_SIZET) ? ctx->taglen : GCM_TAG_MAX_SIZE; if (!OSSL_PARAM_set_size_t(p, taglen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } } break; case PIDX_CIPHER_PARAM_IV: if (ctx->iv_state == IV_STATE_UNINITIALISED) return 0; if (ctx->ivlen > p->data_size) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH); return 0; } if (!OSSL_PARAM_set_octet_string(p, ctx->iv, ctx->ivlen) && !OSSL_PARAM_set_octet_ptr(p, &ctx->iv, ctx->ivlen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } break; case PIDX_CIPHER_PARAM_UPDATED_IV: if (ctx->iv_state == IV_STATE_UNINITIALISED) return 0; if (ctx->ivlen > p->data_size) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH); return 0; } if (!OSSL_PARAM_set_octet_string(p, ctx->iv, ctx->ivlen) && !OSSL_PARAM_set_octet_ptr(p, &ctx->iv, ctx->ivlen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } break; case PIDX_CIPHER_PARAM_AEAD_TLS1_AAD_PAD: if (!OSSL_PARAM_set_size_t(p, ctx->tls_aad_pad_sz)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } break; case PIDX_CIPHER_PARAM_AEAD_TAG: sz = p->data_size; if (sz == 0 || sz > EVP_GCM_TLS_TAG_LEN || !ctx->enc || ctx->taglen == UNINITIALISED_SIZET) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_TAG); return 0; } if (!OSSL_PARAM_set_octet_string(p, ctx->buf, sz)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } break; case PIDX_CIPHER_PARAM_AEAD_TLS1_GET_IV_GEN: if (p->data == NULL || p->data_type != OSSL_PARAM_OCTET_STRING || !getivgen(ctx, p->data, p->data_size)) return 0; break; } } return 1; } int ossl_gcm_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { PROV_GCM_CTX *ctx = (PROV_GCM_CTX *)vctx; const OSSL_PARAM *p; size_t sz; void *vp; int type; if (params == NULL) return 1; for (p = params; p->key != NULL; p++) { type = ossl_param_find_pidx(p->key); switch (type) { default: break; case PIDX_CIPHER_PARAM_AEAD_TAG: vp = ctx->buf; if (!OSSL_PARAM_get_octet_string(p, &vp, EVP_GCM_TLS_TAG_LEN, &sz)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (sz == 0 || ctx->enc) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_TAG); return 0; } ctx->taglen = sz; break; case PIDX_CIPHER_PARAM_AEAD_IVLEN: if (!OSSL_PARAM_get_size_t(p, &sz)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (sz == 0 || sz > sizeof(ctx->iv)) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH); return 0; } if (ctx->ivlen != sz) { /* If the iv was already set or autogenerated, it is invalid. */ if (ctx->iv_state != IV_STATE_UNINITIALISED) ctx->iv_state = IV_STATE_FINISHED; ctx->ivlen = sz; } break; case PIDX_CIPHER_PARAM_AEAD_TLS1_AAD: if (p->data_type != OSSL_PARAM_OCTET_STRING) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } sz = gcm_tls_init(ctx, p->data, p->data_size); if (sz == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_AAD); return 0; } ctx->tls_aad_pad_sz = sz; break; case PIDX_CIPHER_PARAM_AEAD_TLS1_IV_FIXED: if (p->data_type != OSSL_PARAM_OCTET_STRING) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (gcm_tls_iv_set_fixed(ctx, p->data, p->data_size) == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } break; case PIDX_CIPHER_PARAM_AEAD_TLS1_SET_IV_INV: if (p->data == NULL || p->data_type != OSSL_PARAM_OCTET_STRING || !setivinv(ctx, p->data, p->data_size)) return 0; break; } } return 1; } int ossl_gcm_stream_update(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { PROV_GCM_CTX *ctx = (PROV_GCM_CTX *)vctx; if (inl == 0) { *outl = 0; return 1; } if (outsize < inl) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } if (gcm_cipher_internal(ctx, out, outl, in, inl) <= 0) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } return 1; } int ossl_gcm_stream_final(void *vctx, unsigned char *out, size_t *outl, size_t outsize) { PROV_GCM_CTX *ctx = (PROV_GCM_CTX *)vctx; int i; if (!ossl_prov_is_running()) return 0; i = gcm_cipher_internal(ctx, out, outl, NULL, 0); if (i <= 0) return 0; *outl = 0; return 1; } int ossl_gcm_cipher(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { PROV_GCM_CTX *ctx = (PROV_GCM_CTX *)vctx; if (!ossl_prov_is_running()) return 0; if (outsize < inl) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } if (gcm_cipher_internal(ctx, out, outl, in, inl) <= 0) return 0; *outl = inl; return 1; } /* * See SP800-38D (GCM) Section 8 "Uniqueness requirement on IVS and keys" * * See also 8.2.2 RBG-based construction. * Random construction consists of a free field (which can be NULL) and a * random field which will use a DRBG that can return at least 96 bits of * entropy strength. (The DRBG must be seeded by the FIPS module). */ static int gcm_iv_generate(PROV_GCM_CTX *ctx, int offset) { int sz = ctx->ivlen - offset; /* Must be at least 96 bits */ if (sz <= 0 || ctx->ivlen < GCM_IV_DEFAULT_SIZE) return 0; /* Use DRBG to generate random iv */ if (RAND_bytes_ex(ctx->libctx, ctx->iv + offset, sz, 0) <= 0) return 0; ctx->iv_state = IV_STATE_BUFFERED; ctx->iv_gen_rand = 1; return 1; } static int gcm_cipher_internal(PROV_GCM_CTX *ctx, unsigned char *out, size_t *padlen, const unsigned char *in, size_t len) { size_t olen = 0; int rv = 0; const PROV_GCM_HW *hw = ctx->hw; if (ctx->tls_aad_len != UNINITIALISED_SIZET) return gcm_tls_cipher(ctx, out, padlen, in, len); if (!ctx->key_set || ctx->iv_state == IV_STATE_FINISHED) goto err; /* * FIPS requires generation of AES-GCM IV's inside the FIPS module. * The IV can still be set externally (the security policy will state that * this is not FIPS compliant). There are some applications * where setting the IV externally is the only option available. */ if (ctx->iv_state == IV_STATE_UNINITIALISED) { if (!ctx->enc || !gcm_iv_generate(ctx, 0)) goto err; } if (ctx->iv_state == IV_STATE_BUFFERED) { if (!hw->setiv(ctx, ctx->iv, ctx->ivlen)) goto err; ctx->iv_state = IV_STATE_COPIED; } if (in != NULL) { /* The input is AAD if out is NULL */ if (out == NULL) { if (!hw->aadupdate(ctx, in, len)) goto err; } else { /* The input is ciphertext OR plaintext */ if (!hw->cipherupdate(ctx, in, len, out)) goto err; } } else { /* The tag must be set before actually decrypting data */ if (!ctx->enc && ctx->taglen == UNINITIALISED_SIZET) goto err; if (!hw->cipherfinal(ctx, ctx->buf)) goto err; ctx->iv_state = IV_STATE_FINISHED; /* Don't reuse the IV */ goto finish; } olen = len; finish: rv = 1; err: *padlen = olen; return rv; } static int gcm_tls_init(PROV_GCM_CTX *dat, unsigned char *aad, size_t aad_len) { unsigned char *buf; size_t len; if (!ossl_prov_is_running() || aad_len != EVP_AEAD_TLS1_AAD_LEN) return 0; /* Save the aad for later use. */ buf = dat->buf; memcpy(buf, aad, aad_len); dat->tls_aad_len = aad_len; len = buf[aad_len - 2] << 8 | buf[aad_len - 1]; /* Correct length for explicit iv. */ if (len < EVP_GCM_TLS_EXPLICIT_IV_LEN) return 0; len -= EVP_GCM_TLS_EXPLICIT_IV_LEN; /* If decrypting correct for tag too. */ if (!dat->enc) { if (len < EVP_GCM_TLS_TAG_LEN) return 0; len -= EVP_GCM_TLS_TAG_LEN; } buf[aad_len - 2] = (unsigned char)(len >> 8); buf[aad_len - 1] = (unsigned char)(len & 0xff); /* Extra padding: tag appended to record. */ return EVP_GCM_TLS_TAG_LEN; } static int gcm_tls_iv_set_fixed(PROV_GCM_CTX *ctx, unsigned char *iv, size_t len) { /* Special case: -1 length restores whole IV */ if (len == (size_t)-1) { memcpy(ctx->iv, iv, ctx->ivlen); ctx->iv_gen = 1; ctx->iv_state = IV_STATE_BUFFERED; return 1; } /* Fixed field must be at least 4 bytes and invocation field at least 8 */ if ((len < EVP_GCM_TLS_FIXED_IV_LEN) || (ctx->ivlen - (int)len) < EVP_GCM_TLS_EXPLICIT_IV_LEN) return 0; if (len > 0) memcpy(ctx->iv, iv, len); if (ctx->enc && RAND_bytes_ex(ctx->libctx, ctx->iv + len, ctx->ivlen - len, 0) <= 0) return 0; ctx->iv_gen = 1; ctx->iv_state = IV_STATE_BUFFERED; return 1; } /* * Handle TLS GCM packet format. This consists of the last portion of the IV * followed by the payload and finally the tag. On encrypt generate IV, * encrypt payload and write the tag. On verify retrieve IV, decrypt payload * and verify tag. */ static int gcm_tls_cipher(PROV_GCM_CTX *ctx, unsigned char *out, size_t *padlen, const unsigned char *in, size_t len) { int rv = 0; size_t arg = EVP_GCM_TLS_EXPLICIT_IV_LEN; size_t plen = 0; unsigned char *tag = NULL; if (!ossl_prov_is_running() || !ctx->key_set) goto err; /* Encrypt/decrypt must be performed in place */ if (out != in || len < (EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN)) goto err; /* * Check for too many keys as per FIPS 140-2 IG A.5 "Key/IV Pair Uniqueness * Requirements from SP 800-38D". The requirements is for one party to the * communication to fail after 2^64 - 1 keys. We do this on the encrypting * side only. */ if (ctx->enc && ++ctx->tls_enc_records == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_TOO_MANY_RECORDS); goto err; } /* * Set IV from start of buffer or generate IV and write to start of * buffer. */ if (ctx->enc) { if (!getivgen(ctx, out, arg)) goto err; } else { if (!setivinv(ctx, out, arg)) goto err; } /* Fix buffer and length to point to payload */ in += EVP_GCM_TLS_EXPLICIT_IV_LEN; out += EVP_GCM_TLS_EXPLICIT_IV_LEN; len -= EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN; tag = ctx->enc ? out + len : (unsigned char *)in + len; if (!ctx->hw->oneshot(ctx, ctx->buf, ctx->tls_aad_len, in, len, out, tag, EVP_GCM_TLS_TAG_LEN)) { if (!ctx->enc) OPENSSL_cleanse(out, len); goto err; } if (ctx->enc) plen = len + EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN; else plen = len; rv = 1; err: ctx->iv_state = IV_STATE_FINISHED; ctx->tls_aad_len = UNINITIALISED_SIZET; *padlen = plen; return rv; }
./openssl/providers/implementations/ciphers/cipher_tdes.h
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/des.h> #include <openssl/core_dispatch.h> #include "crypto/des_platform.h" #define DES_BLOCK_SIZE 8 #define TDES_IVLEN 8 #define TDES_FLAGS PROV_CIPHER_FLAG_RAND_KEY typedef struct prov_tdes_ctx_st { PROV_CIPHER_CTX base; /* Must be first */ union { OSSL_UNION_ALIGN; DES_key_schedule ks[3]; } tks; union { void (*cbc) (const void *, void *, size_t, const DES_key_schedule *, unsigned char *); } tstream; } PROV_TDES_CTX; #define IMPLEMENT_tdes_cipher(type, UCTYPE, lcmode, UCMODE, flags, \ kbits, blkbits, ivbits, block) \ static OSSL_FUNC_cipher_newctx_fn tdes_##type##_##lcmode##_newctx; \ static void *tdes_##type##_##lcmode##_newctx(void *provctx) \ { \ return ossl_tdes_newctx(provctx, EVP_CIPH_##UCMODE##_MODE, kbits, blkbits, \ ivbits, flags, \ ossl_prov_cipher_hw_tdes_##type##_##lcmode()); \ } \ static OSSL_FUNC_cipher_get_params_fn tdes_##type##_##lcmode##_get_params; \ static int tdes_##type##_##lcmode##_get_params(OSSL_PARAM params[]) \ { \ return ossl_cipher_generic_get_params(params, EVP_CIPH_##UCMODE##_MODE, \ flags, kbits, blkbits, ivbits); \ } \ const OSSL_DISPATCH ossl_tdes_##type##_##lcmode##_functions[] = { \ { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))ossl_tdes_einit }, \ { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))ossl_tdes_dinit }, \ { OSSL_FUNC_CIPHER_UPDATE, \ (void (*)(void))ossl_cipher_generic_##block##_update }, \ { OSSL_FUNC_CIPHER_FINAL, \ (void (*)(void))ossl_cipher_generic_##block##_final }, \ { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))ossl_cipher_generic_cipher }, \ { OSSL_FUNC_CIPHER_NEWCTX, \ (void (*)(void))tdes_##type##_##lcmode##_newctx }, \ { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))ossl_tdes_dupctx }, \ { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))ossl_tdes_freectx }, \ { OSSL_FUNC_CIPHER_GET_PARAMS, \ (void (*)(void))tdes_##type##_##lcmode##_get_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_params }, \ { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, \ (void (*)(void))ossl_tdes_get_ctx_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, \ (void (*)(void))ossl_tdes_gettable_ctx_params }, \ { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_set_ctx_params }, \ { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_settable_ctx_params }, \ OSSL_DISPATCH_END \ } void *ossl_tdes_newctx(void *provctx, int mode, size_t kbits, size_t blkbits, size_t ivbits, uint64_t flags, const PROV_CIPHER_HW *hw); OSSL_FUNC_cipher_dupctx_fn ossl_tdes_dupctx; OSSL_FUNC_cipher_freectx_fn ossl_tdes_freectx; OSSL_FUNC_cipher_encrypt_init_fn ossl_tdes_einit; OSSL_FUNC_cipher_decrypt_init_fn ossl_tdes_dinit; OSSL_FUNC_cipher_get_ctx_params_fn ossl_tdes_get_ctx_params; OSSL_FUNC_cipher_gettable_ctx_params_fn ossl_tdes_gettable_ctx_params; #define PROV_CIPHER_HW_tdes_mode(type, mode) \ static const PROV_CIPHER_HW type##_##mode = { \ ossl_cipher_hw_tdes_##type##_initkey, \ ossl_cipher_hw_tdes_##mode, \ ossl_cipher_hw_tdes_copyctx \ }; \ const PROV_CIPHER_HW *ossl_prov_cipher_hw_tdes_##type##_##mode(void) \ { \ return &type##_##mode; \ } int ossl_cipher_hw_tdes_ede3_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen); void ossl_cipher_hw_tdes_copyctx(PROV_CIPHER_CTX *dst, const PROV_CIPHER_CTX *src); int ossl_cipher_hw_tdes_cbc(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl); int ossl_cipher_hw_tdes_ecb(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t len); const PROV_CIPHER_HW *ossl_prov_cipher_hw_tdes_ede3_cbc(void); const PROV_CIPHER_HW *ossl_prov_cipher_hw_tdes_ede3_ecb(void);
./openssl/providers/implementations/ciphers/cipher_rc4_hw.c
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * RC4 low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include "cipher_rc4.h" static int cipher_hw_rc4_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_RC4_CTX *rctx = (PROV_RC4_CTX *)ctx; RC4_set_key(&rctx->ks.ks, keylen, key); return 1; } static int cipher_hw_rc4_cipher(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t len) { PROV_RC4_CTX *rctx = (PROV_RC4_CTX *)ctx; RC4(&rctx->ks.ks, len, in, out); return 1; } static const PROV_CIPHER_HW rc4_hw = { cipher_hw_rc4_initkey, cipher_hw_rc4_cipher }; const PROV_CIPHER_HW *ossl_prov_cipher_hw_rc4(size_t keybits) { return &rc4_hw; }
./openssl/providers/implementations/ciphers/cipher_chacha20_poly1305.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for chacha20_poly1305 cipher */ #include <openssl/proverr.h> #include "cipher_chacha20_poly1305.h" #include "prov/implementations.h" #include "prov/providercommon.h" #define CHACHA20_POLY1305_KEYLEN CHACHA_KEY_SIZE #define CHACHA20_POLY1305_BLKLEN 1 #define CHACHA20_POLY1305_MAX_IVLEN 12 #define CHACHA20_POLY1305_MODE 0 #define CHACHA20_POLY1305_FLAGS (PROV_CIPHER_FLAG_AEAD \ | PROV_CIPHER_FLAG_CUSTOM_IV) static OSSL_FUNC_cipher_newctx_fn chacha20_poly1305_newctx; static OSSL_FUNC_cipher_freectx_fn chacha20_poly1305_freectx; static OSSL_FUNC_cipher_dupctx_fn chacha20_poly1305_dupctx; static OSSL_FUNC_cipher_encrypt_init_fn chacha20_poly1305_einit; static OSSL_FUNC_cipher_decrypt_init_fn chacha20_poly1305_dinit; static OSSL_FUNC_cipher_get_params_fn chacha20_poly1305_get_params; static OSSL_FUNC_cipher_get_ctx_params_fn chacha20_poly1305_get_ctx_params; static OSSL_FUNC_cipher_set_ctx_params_fn chacha20_poly1305_set_ctx_params; static OSSL_FUNC_cipher_cipher_fn chacha20_poly1305_cipher; static OSSL_FUNC_cipher_final_fn chacha20_poly1305_final; static OSSL_FUNC_cipher_gettable_ctx_params_fn chacha20_poly1305_gettable_ctx_params; #define chacha20_poly1305_settable_ctx_params ossl_cipher_aead_settable_ctx_params #define chacha20_poly1305_gettable_params ossl_cipher_generic_gettable_params #define chacha20_poly1305_update chacha20_poly1305_cipher static void *chacha20_poly1305_newctx(void *provctx) { PROV_CHACHA20_POLY1305_CTX *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) { ossl_cipher_generic_initkey(&ctx->base, CHACHA20_POLY1305_KEYLEN * 8, CHACHA20_POLY1305_BLKLEN * 8, CHACHA20_POLY1305_IVLEN * 8, CHACHA20_POLY1305_MODE, CHACHA20_POLY1305_FLAGS, ossl_prov_cipher_hw_chacha20_poly1305( CHACHA20_POLY1305_KEYLEN * 8), NULL); ctx->tls_payload_length = NO_TLS_PAYLOAD_LENGTH; ossl_chacha20_initctx(&ctx->chacha); } return ctx; } static void *chacha20_poly1305_dupctx(void *provctx) { PROV_CHACHA20_POLY1305_CTX *ctx = provctx; PROV_CHACHA20_POLY1305_CTX *dctx = NULL; if (ctx == NULL) return NULL; dctx = OPENSSL_memdup(ctx, sizeof(*ctx)); if (dctx != NULL && dctx->base.tlsmac != NULL && dctx->base.alloced) { dctx->base.tlsmac = OPENSSL_memdup(dctx->base.tlsmac, dctx->base.tlsmacsize); if (dctx->base.tlsmac == NULL) { OPENSSL_free(dctx); dctx = NULL; } } return dctx; } static void chacha20_poly1305_freectx(void *vctx) { PROV_CHACHA20_POLY1305_CTX *ctx = (PROV_CHACHA20_POLY1305_CTX *)vctx; if (ctx != NULL) { ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } } static int chacha20_poly1305_get_params(OSSL_PARAM params[]) { return ossl_cipher_generic_get_params(params, 0, CHACHA20_POLY1305_FLAGS, CHACHA20_POLY1305_KEYLEN * 8, CHACHA20_POLY1305_BLKLEN * 8, CHACHA20_POLY1305_IVLEN * 8); } static int chacha20_poly1305_get_ctx_params(void *vctx, OSSL_PARAM params[]) { PROV_CHACHA20_POLY1305_CTX *ctx = (PROV_CHACHA20_POLY1305_CTX *)vctx; OSSL_PARAM *p; p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IVLEN); if (p != NULL) { if (!OSSL_PARAM_set_size_t(p, CHACHA20_POLY1305_IVLEN)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, CHACHA20_POLY1305_KEYLEN)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_AEAD_TAGLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->tag_len)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_AEAD_TLS1_AAD_PAD); if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->tls_aad_pad_sz)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_AEAD_TAG); if (p != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } if (!ctx->base.enc) { ERR_raise(ERR_LIB_PROV, PROV_R_TAG_NOT_SET); return 0; } if (p->data_size == 0 || p->data_size > POLY1305_BLOCK_SIZE) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_TAG_LENGTH); return 0; } memcpy(p->data, ctx->tag, p->data_size); } return 1; } static const OSSL_PARAM chacha20_poly1305_known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_AEAD_TAGLEN, NULL), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TAG, NULL, 0), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_AEAD_TLS1_AAD_PAD, NULL), OSSL_PARAM_END }; static const OSSL_PARAM *chacha20_poly1305_gettable_ctx_params (ossl_unused void *cctx, ossl_unused void *provctx) { return chacha20_poly1305_known_gettable_ctx_params; } static int chacha20_poly1305_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { const OSSL_PARAM *p; size_t len; PROV_CHACHA20_POLY1305_CTX *ctx = (PROV_CHACHA20_POLY1305_CTX *)vctx; PROV_CIPHER_HW_CHACHA20_POLY1305 *hw = (PROV_CIPHER_HW_CHACHA20_POLY1305 *)ctx->base.hw; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL) { if (!OSSL_PARAM_get_size_t(p, &len)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (len != CHACHA20_POLY1305_KEYLEN) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_IVLEN); if (p != NULL) { if (!OSSL_PARAM_get_size_t(p, &len)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (len != CHACHA20_POLY1305_MAX_IVLEN) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH); return 0; } } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_AEAD_TAG); if (p != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (p->data_size == 0 || p->data_size > POLY1305_BLOCK_SIZE) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_TAG_LENGTH); return 0; } if (p->data != NULL) { if (ctx->base.enc) { ERR_raise(ERR_LIB_PROV, PROV_R_TAG_NOT_NEEDED); return 0; } memcpy(ctx->tag, p->data, p->data_size); } ctx->tag_len = p->data_size; } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_AEAD_TLS1_AAD); if (p != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } len = hw->tls_init(&ctx->base, p->data, p->data_size); if (len == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_DATA); return 0; } ctx->tls_aad_pad_sz = len; } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_AEAD_TLS1_IV_FIXED); if (p != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (hw->tls_iv_set_fixed(&ctx->base, p->data, p->data_size) == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH); return 0; } } /* ignore OSSL_CIPHER_PARAM_AEAD_MAC_KEY */ return 1; } static int chacha20_poly1305_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { int ret; /* The generic function checks for ossl_prov_is_running() */ ret = ossl_cipher_generic_einit(vctx, key, keylen, iv, ivlen, NULL); if (ret && iv != NULL) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; PROV_CIPHER_HW_CHACHA20_POLY1305 *hw = (PROV_CIPHER_HW_CHACHA20_POLY1305 *)ctx->hw; hw->initiv(ctx); } if (ret && !chacha20_poly1305_set_ctx_params(vctx, params)) ret = 0; return ret; } static int chacha20_poly1305_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { int ret; /* The generic function checks for ossl_prov_is_running() */ ret = ossl_cipher_generic_dinit(vctx, key, keylen, iv, ivlen, NULL); if (ret && iv != NULL) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; PROV_CIPHER_HW_CHACHA20_POLY1305 *hw = (PROV_CIPHER_HW_CHACHA20_POLY1305 *)ctx->hw; hw->initiv(ctx); } if (ret && !chacha20_poly1305_set_ctx_params(vctx, params)) ret = 0; return ret; } static int chacha20_poly1305_cipher(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; PROV_CIPHER_HW_CHACHA20_POLY1305 *hw = (PROV_CIPHER_HW_CHACHA20_POLY1305 *)ctx->hw; if (!ossl_prov_is_running()) return 0; if (inl == 0) { *outl = 0; return 1; } if (outsize < inl) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } if (!hw->aead_cipher(ctx, out, outl, in, inl)) return 0; return 1; } static int chacha20_poly1305_final(void *vctx, unsigned char *out, size_t *outl, size_t outsize) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; PROV_CIPHER_HW_CHACHA20_POLY1305 *hw = (PROV_CIPHER_HW_CHACHA20_POLY1305 *)ctx->hw; if (!ossl_prov_is_running()) return 0; if (hw->aead_cipher(ctx, out, outl, NULL, 0) <= 0) return 0; *outl = 0; return 1; } /* ossl_chacha20_ossl_poly1305_functions */ const OSSL_DISPATCH ossl_chacha20_ossl_poly1305_functions[] = { { OSSL_FUNC_CIPHER_NEWCTX, (void (*)(void))chacha20_poly1305_newctx }, { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))chacha20_poly1305_freectx }, { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))chacha20_poly1305_dupctx }, { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))chacha20_poly1305_einit }, { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))chacha20_poly1305_dinit }, { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))chacha20_poly1305_update }, { OSSL_FUNC_CIPHER_FINAL, (void (*)(void))chacha20_poly1305_final }, { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))chacha20_poly1305_cipher }, { OSSL_FUNC_CIPHER_GET_PARAMS, (void (*)(void))chacha20_poly1305_get_params }, { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, (void (*)(void))chacha20_poly1305_gettable_params }, { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, (void (*)(void))chacha20_poly1305_get_ctx_params }, { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, (void (*)(void))chacha20_poly1305_gettable_ctx_params }, { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, (void (*)(void))chacha20_poly1305_set_ctx_params }, { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, (void (*)(void))chacha20_poly1305_settable_ctx_params }, OSSL_DISPATCH_END };
./openssl/providers/implementations/ciphers/cipher_sm4_ccm_hw.c
/* * Copyright 2021-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /*- * Generic support for SM4 CCM. */ #include "cipher_sm4_ccm.h" #include "crypto/sm4_platform.h" #define SM4_HW_CCM_SET_KEY_FN(fn_set_enc_key, fn_blk, fn_ccm_enc, fn_ccm_dec) \ fn_set_enc_key(key, &actx->ks.ks); \ CRYPTO_ccm128_init(&ctx->ccm_ctx, ctx->m, ctx->l, &actx->ks.ks, \ (block128_f)fn_blk); \ ctx->str = ctx->enc ? (ccm128_f)fn_ccm_enc : (ccm128_f)fn_ccm_dec; \ ctx->key_set = 1; static int ccm_sm4_initkey(PROV_CCM_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_SM4_CCM_CTX *actx = (PROV_SM4_CCM_CTX *)ctx; #ifdef HWSM4_CAPABLE if (HWSM4_CAPABLE) { SM4_HW_CCM_SET_KEY_FN(HWSM4_set_encrypt_key, HWSM4_encrypt, NULL, NULL); } else #endif /* HWSM4_CAPABLE */ #ifdef VPSM4_EX_CAPABLE if (VPSM4_EX_CAPABLE) { SM4_HW_CCM_SET_KEY_FN(vpsm4_ex_set_encrypt_key, vpsm4_ex_encrypt, NULL, NULL); } else #endif /* VPSM4_EX_CAPABLE */ #ifdef VPSM4_CAPABLE if (VPSM4_CAPABLE) { SM4_HW_CCM_SET_KEY_FN(vpsm4_set_encrypt_key, vpsm4_encrypt, NULL, NULL); } else #endif /* VPSM4_CAPABLE */ { SM4_HW_CCM_SET_KEY_FN(ossl_sm4_set_key, ossl_sm4_encrypt, NULL, NULL); } return 1; } static const PROV_CCM_HW ccm_sm4 = { ccm_sm4_initkey, ossl_ccm_generic_setiv, ossl_ccm_generic_setaad, ossl_ccm_generic_auth_encrypt, ossl_ccm_generic_auth_decrypt, ossl_ccm_generic_gettag }; #if defined(__riscv) && __riscv_xlen == 64 # include "cipher_sm4_ccm_hw_rv64i.inc" #else const PROV_CCM_HW *ossl_prov_sm4_hw_ccm(size_t keybits) { return &ccm_sm4; } #endif
./openssl/providers/implementations/ciphers/cipher_rc5_hw.c
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * RC5 low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include "cipher_rc5.h" static int cipher_hw_rc5_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_RC5_CTX *rctx = (PROV_RC5_CTX *)ctx; return RC5_32_set_key(&rctx->ks.ks, keylen, key, rctx->rounds); } # define PROV_CIPHER_HW_rc5_mode(mode, UCMODE) \ IMPLEMENT_CIPHER_HW_##UCMODE(mode, rc5, PROV_RC5_CTX, RC5_32_KEY, \ RC5_32_##mode) \ static const PROV_CIPHER_HW rc5_##mode = { \ cipher_hw_rc5_initkey, \ cipher_hw_rc5_##mode##_cipher \ }; \ const PROV_CIPHER_HW *ossl_prov_cipher_hw_rc5_##mode(size_t keybits) \ { \ return &rc5_##mode; \ } PROV_CIPHER_HW_rc5_mode(cbc, CBC) PROV_CIPHER_HW_rc5_mode(ecb, ECB) PROV_CIPHER_HW_rc5_mode(ofb64, OFB) PROV_CIPHER_HW_rc5_mode(cfb64, CFB)
./openssl/providers/implementations/ciphers/cipher_rc4_hmac_md5.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for RC4_HMAC_MD5 cipher */ /* * MD5 and RC4 low level APIs are deprecated for public use, but still ok for * internal use. */ #include "internal/deprecated.h" #include <openssl/proverr.h> #include "cipher_rc4_hmac_md5.h" #include "prov/implementations.h" #include "prov/providercommon.h" #define RC4_HMAC_MD5_FLAGS (PROV_CIPHER_FLAG_VARIABLE_LENGTH \ | PROV_CIPHER_FLAG_AEAD) #define RC4_HMAC_MD5_KEY_BITS (16 * 8) #define RC4_HMAC_MD5_BLOCK_BITS (1 * 8) #define RC4_HMAC_MD5_IV_BITS 0 #define RC4_HMAC_MD5_MODE 0 #define GET_HW(ctx) ((PROV_CIPHER_HW_RC4_HMAC_MD5 *)ctx->base.hw) static OSSL_FUNC_cipher_encrypt_init_fn rc4_hmac_md5_einit; static OSSL_FUNC_cipher_decrypt_init_fn rc4_hmac_md5_dinit; static OSSL_FUNC_cipher_newctx_fn rc4_hmac_md5_newctx; static OSSL_FUNC_cipher_freectx_fn rc4_hmac_md5_freectx; static OSSL_FUNC_cipher_dupctx_fn rc4_hmac_md5_dupctx; static OSSL_FUNC_cipher_get_ctx_params_fn rc4_hmac_md5_get_ctx_params; static OSSL_FUNC_cipher_gettable_ctx_params_fn rc4_hmac_md5_gettable_ctx_params; static OSSL_FUNC_cipher_set_ctx_params_fn rc4_hmac_md5_set_ctx_params; static OSSL_FUNC_cipher_settable_ctx_params_fn rc4_hmac_md5_settable_ctx_params; static OSSL_FUNC_cipher_get_params_fn rc4_hmac_md5_get_params; #define rc4_hmac_md5_gettable_params ossl_cipher_generic_gettable_params #define rc4_hmac_md5_update ossl_cipher_generic_stream_update #define rc4_hmac_md5_final ossl_cipher_generic_stream_final #define rc4_hmac_md5_cipher ossl_cipher_generic_cipher static void *rc4_hmac_md5_newctx(void *provctx) { PROV_RC4_HMAC_MD5_CTX *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) ossl_cipher_generic_initkey(ctx, RC4_HMAC_MD5_KEY_BITS, RC4_HMAC_MD5_BLOCK_BITS, RC4_HMAC_MD5_IV_BITS, RC4_HMAC_MD5_MODE, RC4_HMAC_MD5_FLAGS, ossl_prov_cipher_hw_rc4_hmac_md5( RC4_HMAC_MD5_KEY_BITS ), NULL); return ctx; } static void rc4_hmac_md5_freectx(void *vctx) { PROV_RC4_HMAC_MD5_CTX *ctx = (PROV_RC4_HMAC_MD5_CTX *)vctx; ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } static void *rc4_hmac_md5_dupctx(void *vctx) { PROV_RC4_HMAC_MD5_CTX *ctx = vctx; if (ctx == NULL) return NULL; return OPENSSL_memdup(ctx, sizeof(*ctx)); } static int rc4_hmac_md5_einit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL)) return 0; return rc4_hmac_md5_set_ctx_params(ctx, params); } static int rc4_hmac_md5_dinit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL)) return 0; return rc4_hmac_md5_set_ctx_params(ctx, params); } static const OSSL_PARAM rc4_hmac_md5_known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_AEAD_TLS1_AAD_PAD, NULL), OSSL_PARAM_END }; const OSSL_PARAM *rc4_hmac_md5_gettable_ctx_params(ossl_unused void *cctx, ossl_unused void *provctx) { return rc4_hmac_md5_known_gettable_ctx_params; } static int rc4_hmac_md5_get_ctx_params(void *vctx, OSSL_PARAM params[]) { PROV_RC4_HMAC_MD5_CTX *ctx = (PROV_RC4_HMAC_MD5_CTX *)vctx; OSSL_PARAM *p; p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->base.keylen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IVLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->base.ivlen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_AEAD_TLS1_AAD_PAD); if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->tls_aad_pad_sz)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } return 1; } static const OSSL_PARAM rc4_hmac_md5_known_settable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TLS1_AAD, NULL, 0), OSSL_PARAM_END }; const OSSL_PARAM *rc4_hmac_md5_settable_ctx_params(ossl_unused void *cctx, ossl_unused void *provctx) { return rc4_hmac_md5_known_settable_ctx_params; } static int rc4_hmac_md5_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { PROV_RC4_HMAC_MD5_CTX *ctx = (PROV_RC4_HMAC_MD5_CTX *)vctx; const OSSL_PARAM *p; size_t sz; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL) { if (!OSSL_PARAM_get_size_t(p, &sz)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (ctx->base.keylen != sz) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_IVLEN); if (p != NULL) { if (!OSSL_PARAM_get_size_t(p, &sz)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (ctx->base.ivlen != sz) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH); return 0; } } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_AEAD_TLS1_AAD); if (p != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } sz = GET_HW(ctx)->tls_init(&ctx->base, p->data, p->data_size); if (sz == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_DATA); return 0; } ctx->tls_aad_pad_sz = sz; } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_AEAD_MAC_KEY); if (p != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } GET_HW(ctx)->init_mackey(&ctx->base, p->data, p->data_size); } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_TLS_VERSION); if (p != NULL) { if (!OSSL_PARAM_get_uint(p, &ctx->base.tlsversion)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } } return 1; } static int rc4_hmac_md5_get_params(OSSL_PARAM params[]) { return ossl_cipher_generic_get_params(params, RC4_HMAC_MD5_MODE, RC4_HMAC_MD5_FLAGS, RC4_HMAC_MD5_KEY_BITS, RC4_HMAC_MD5_BLOCK_BITS, RC4_HMAC_MD5_IV_BITS); } const OSSL_DISPATCH ossl_rc4_hmac_ossl_md5_functions[] = { { OSSL_FUNC_CIPHER_NEWCTX, (void (*)(void))rc4_hmac_md5_newctx }, { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))rc4_hmac_md5_freectx }, { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))rc4_hmac_md5_dupctx }, { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))rc4_hmac_md5_einit }, { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))rc4_hmac_md5_dinit }, { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))rc4_hmac_md5_update }, { OSSL_FUNC_CIPHER_FINAL, (void (*)(void))rc4_hmac_md5_final }, { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))rc4_hmac_md5_cipher }, { OSSL_FUNC_CIPHER_GET_PARAMS, (void (*)(void))rc4_hmac_md5_get_params }, { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, (void (*)(void))rc4_hmac_md5_gettable_params }, { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, (void (*)(void))rc4_hmac_md5_get_ctx_params }, { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, (void (*)(void))rc4_hmac_md5_gettable_ctx_params }, { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, (void (*)(void))rc4_hmac_md5_set_ctx_params }, { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, (void (*)(void))rc4_hmac_md5_settable_ctx_params }, OSSL_DISPATCH_END };
./openssl/providers/implementations/ciphers/cipher_rc2_hw.c
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * RC2 low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include "cipher_rc2.h" static int cipher_hw_rc2_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_RC2_CTX *rctx = (PROV_RC2_CTX *)ctx; RC2_KEY *ks = &(rctx->ks.ks); RC2_set_key(ks, (int)ctx->keylen, key, (int)rctx->key_bits); return 1; } # define PROV_CIPHER_HW_rc2_mode(mode, UCMODE) \ IMPLEMENT_CIPHER_HW_##UCMODE(mode, rc2, PROV_RC2_CTX, RC2_KEY, \ RC2_##mode) \ static const PROV_CIPHER_HW rc2_##mode = { \ cipher_hw_rc2_initkey, \ cipher_hw_rc2_##mode##_cipher \ }; \ const PROV_CIPHER_HW *ossl_prov_cipher_hw_rc2_##mode(size_t keybits) \ { \ return &rc2_##mode; \ } PROV_CIPHER_HW_rc2_mode(cbc, CBC) PROV_CIPHER_HW_rc2_mode(ecb, ECB) PROV_CIPHER_HW_rc2_mode(ofb64, OFB) PROV_CIPHER_HW_rc2_mode(cfb64, CFB)
./openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha.h
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "prov/ciphercommon.h" #include "crypto/aes_platform.h" int ossl_cipher_capable_aes_cbc_hmac_sha1(void); int ossl_cipher_capable_aes_cbc_hmac_sha256(void); typedef struct prov_cipher_hw_aes_hmac_sha_ctx_st { PROV_CIPHER_HW base; /* must be first */ void (*init_mac_key)(void *ctx, const unsigned char *inkey, size_t inlen); int (*set_tls1_aad)(void *ctx, unsigned char *aad_rec, int aad_len); # if !defined(OPENSSL_NO_MULTIBLOCK) int (*tls1_multiblock_max_bufsize)(void *ctx); int (*tls1_multiblock_aad)( void *vctx, EVP_CTRL_TLS1_1_MULTIBLOCK_PARAM *param); int (*tls1_multiblock_encrypt)( void *ctx, EVP_CTRL_TLS1_1_MULTIBLOCK_PARAM *param); # endif /* OPENSSL_NO_MULTIBLOCK) */ } PROV_CIPHER_HW_AES_HMAC_SHA; const PROV_CIPHER_HW_AES_HMAC_SHA *ossl_prov_cipher_hw_aes_cbc_hmac_sha1(void); const PROV_CIPHER_HW_AES_HMAC_SHA *ossl_prov_cipher_hw_aes_cbc_hmac_sha256(void); #ifdef AES_CBC_HMAC_SHA_CAPABLE # include <openssl/aes.h> # include <openssl/sha.h> typedef struct prov_aes_hmac_sha_ctx_st { PROV_CIPHER_CTX base; AES_KEY ks; size_t payload_length; /* AAD length in decrypt case */ union { unsigned int tls_ver; unsigned char tls_aad[16]; /* 13 used */ } aux; const PROV_CIPHER_HW_AES_HMAC_SHA *hw; /* some value that are setup by set methods - that can be retrieved */ unsigned int multiblock_interleave; unsigned int multiblock_aad_packlen; size_t multiblock_max_send_fragment; size_t multiblock_encrypt_len; size_t tls_aad_pad; } PROV_AES_HMAC_SHA_CTX; typedef struct prov_aes_hmac_sha1_ctx_st { PROV_AES_HMAC_SHA_CTX base_ctx; SHA_CTX head, tail, md; } PROV_AES_HMAC_SHA1_CTX; typedef struct prov_aes_hmac_sha256_ctx_st { PROV_AES_HMAC_SHA_CTX base_ctx; SHA256_CTX head, tail, md; } PROV_AES_HMAC_SHA256_CTX; # define NO_PAYLOAD_LENGTH ((size_t)-1) #endif /* AES_CBC_HMAC_SHA_CAPABLE */
./openssl/providers/implementations/ciphers/cipher_cast.h
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/cast.h> #include "prov/ciphercommon.h" typedef struct prov_cast_ctx_st { PROV_CIPHER_CTX base; /* Must be first */ union { OSSL_UNION_ALIGN; CAST_KEY ks; } ks; } PROV_CAST_CTX; const PROV_CIPHER_HW *ossl_prov_cipher_hw_cast5_cbc(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_cast5_ecb(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_cast5_ofb64(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_cast5_cfb64(size_t keybits);
./openssl/providers/implementations/ciphers/cipher_aes_siv.h
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "prov/ciphercommon.h" #include "crypto/aes_platform.h" #include "crypto/siv.h" typedef struct prov_cipher_hw_aes_siv_st { int (*initkey)(void *ctx, const uint8_t *key, size_t keylen); int (*cipher)(void *ctx, unsigned char *out, const unsigned char *in, size_t len); void (*setspeed)(void *ctx, int speed); int (*settag)(void *ctx, const unsigned char *tag, size_t tagl); void (*cleanup)(void *ctx); int (*dupctx)(void *src, void *dst); } PROV_CIPHER_HW_AES_SIV; typedef struct prov_siv_ctx_st { unsigned int mode; /* The mode that we are using */ unsigned int enc : 1; /* Set to 1 if we are encrypting or 0 otherwise */ size_t keylen; /* The input keylength (twice the alg key length) */ size_t taglen; /* the taglen is the same as the sivlen */ SIV128_CONTEXT siv; EVP_CIPHER *ctr; /* These are fetched - so we need to free them */ EVP_CIPHER *cbc; const PROV_CIPHER_HW_AES_SIV *hw; OSSL_LIB_CTX *libctx; } PROV_AES_SIV_CTX; const PROV_CIPHER_HW_AES_SIV *ossl_prov_cipher_hw_aes_siv(size_t keybits);
./openssl/providers/implementations/ciphers/cipher_aes_ocb.h
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/aes.h> #include "prov/ciphercommon.h" #include "crypto/aes_platform.h" #define OCB_MAX_TAG_LEN AES_BLOCK_SIZE #define OCB_MAX_DATA_LEN AES_BLOCK_SIZE #define OCB_MAX_AAD_LEN AES_BLOCK_SIZE typedef struct prov_aes_ocb_ctx_st { PROV_CIPHER_CTX base; /* Must be first */ union { OSSL_UNION_ALIGN; AES_KEY ks; } ksenc; /* AES key schedule to use for encryption/aad */ union { OSSL_UNION_ALIGN; AES_KEY ks; } ksdec; /* AES key schedule to use for decryption */ OCB128_CONTEXT ocb; unsigned int iv_state; /* set to one of IV_STATE_XXX */ unsigned int key_set : 1; size_t taglen; size_t data_buf_len; size_t aad_buf_len; unsigned char tag[OCB_MAX_TAG_LEN]; unsigned char data_buf[OCB_MAX_DATA_LEN]; /* Store partial data blocks */ unsigned char aad_buf[OCB_MAX_AAD_LEN]; /* Store partial AAD blocks */ } PROV_AES_OCB_CTX; const PROV_CIPHER_HW *ossl_prov_cipher_hw_aes_ocb(size_t keybits);
./openssl/providers/implementations/ciphers/cipher_desx.c
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * DES low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include "cipher_tdes_default.h" #include "prov/implementations.h" /* desx_cbc_functions */ IMPLEMENT_tdes_cipher(desx, DESX, cbc, CBC, TDES_FLAGS, 64*3, 64, 64, block);
./openssl/providers/implementations/ciphers/cipher_tdes_common.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * DES low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include <openssl/rand.h> #include <openssl/proverr.h> #include "prov/ciphercommon.h" #include "cipher_tdes.h" #include "prov/implementations.h" #include "prov/providercommon.h" void *ossl_tdes_newctx(void *provctx, int mode, size_t kbits, size_t blkbits, size_t ivbits, uint64_t flags, const PROV_CIPHER_HW *hw) { PROV_TDES_CTX *tctx; if (!ossl_prov_is_running()) return NULL; tctx = OPENSSL_zalloc(sizeof(*tctx)); if (tctx != NULL) ossl_cipher_generic_initkey(tctx, kbits, blkbits, ivbits, mode, flags, hw, provctx); return tctx; } void *ossl_tdes_dupctx(void *ctx) { PROV_TDES_CTX *in = (PROV_TDES_CTX *)ctx; PROV_TDES_CTX *ret; if (!ossl_prov_is_running()) return NULL; ret = OPENSSL_malloc(sizeof(*ret)); if (ret == NULL) return NULL; in->base.hw->copyctx(&ret->base, &in->base); return ret; } void ossl_tdes_freectx(void *vctx) { PROV_TDES_CTX *ctx = (PROV_TDES_CTX *)vctx; ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } static int tdes_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; if (!ossl_prov_is_running()) return 0; ctx->num = 0; ctx->bufsz = 0; ctx->enc = enc; if (iv != NULL) { if (!ossl_cipher_generic_initiv(ctx, iv, ivlen)) return 0; } else if (ctx->iv_set && (ctx->mode == EVP_CIPH_CBC_MODE || ctx->mode == EVP_CIPH_CFB_MODE || ctx->mode == EVP_CIPH_OFB_MODE)) { /* reset IV to keep compatibility with 1.1.1 */ memcpy(ctx->iv, ctx->oiv, ctx->ivlen); } if (key != NULL) { if (keylen != ctx->keylen) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } if (!ctx->hw->init(ctx, key, ctx->keylen)) return 0; ctx->key_set = 1; } return ossl_cipher_generic_set_ctx_params(ctx, params); } int ossl_tdes_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return tdes_init(vctx, key, keylen, iv, ivlen, params, 1); } int ossl_tdes_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return tdes_init(vctx, key, keylen, iv, ivlen, params, 0); } CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_START(ossl_tdes) OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_RANDOM_KEY, NULL, 0), CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_END(ossl_tdes) static int tdes_generatekey(PROV_CIPHER_CTX *ctx, void *ptr) { DES_cblock *deskey = ptr; size_t kl = ctx->keylen; if (kl == 0 || RAND_priv_bytes_ex(ctx->libctx, ptr, kl, 0) <= 0) return 0; DES_set_odd_parity(deskey); if (kl >= 16) { DES_set_odd_parity(deskey + 1); if (kl >= 24) DES_set_odd_parity(deskey + 2); } return 1; } int ossl_tdes_get_ctx_params(void *vctx, OSSL_PARAM params[]) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; OSSL_PARAM *p; if (!ossl_cipher_generic_get_ctx_params(vctx, params)) return 0; p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_RANDOM_KEY); if (p != NULL && !tdes_generatekey(ctx, p->data)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GENERATE_KEY); return 0; } return 1; }
./openssl/providers/implementations/ciphers/cipher_rc5.h
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/rc5.h> #include "prov/ciphercommon.h" typedef struct prov_rc5_ctx_st { PROV_CIPHER_CTX base; /* Must be first */ union { OSSL_UNION_ALIGN; RC5_32_KEY ks; /* key schedule */ } ks; unsigned int rounds; /* number of rounds */ } PROV_RC5_CTX; const PROV_CIPHER_HW *ossl_prov_cipher_hw_rc5_cbc(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_rc5_ecb(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_rc5_ofb64(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_rc5_cfb64(size_t keybits);
./openssl/providers/implementations/ciphers/cipher_seed.h
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/seed.h> #include "prov/ciphercommon.h" typedef struct prov_seed_ctx_st { PROV_CIPHER_CTX base; /* Must be first */ union { OSSL_UNION_ALIGN; SEED_KEY_SCHEDULE ks; } ks; } PROV_SEED_CTX; const PROV_CIPHER_HW *ossl_prov_cipher_hw_seed_cbc(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_seed_ecb(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_seed_ofb128(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_seed_cfb128(size_t keybits);
./openssl/providers/implementations/ciphers/cipher_aes.c
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * AES low level APIs are deprecated for public use, but still ok for internal * use where we're using them to implement the higher level EVP interface, as is * the case here. */ #include "internal/deprecated.h" /* Dispatch functions for AES cipher modes ecb, cbc, ofb, cfb, ctr */ #include "cipher_aes.h" #include "prov/implementations.h" #include "prov/providercommon.h" static OSSL_FUNC_cipher_freectx_fn aes_freectx; static OSSL_FUNC_cipher_dupctx_fn aes_dupctx; static void aes_freectx(void *vctx) { PROV_AES_CTX *ctx = (PROV_AES_CTX *)vctx; ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } static void *aes_dupctx(void *ctx) { PROV_AES_CTX *in = (PROV_AES_CTX *)ctx; PROV_AES_CTX *ret; if (!ossl_prov_is_running()) return NULL; ret = OPENSSL_malloc(sizeof(*ret)); if (ret == NULL) return NULL; in->base.hw->copyctx(&ret->base, &in->base); return ret; } /* ossl_aes256ecb_functions */ IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 256, 128, 0, block) /* ossl_aes192ecb_functions */ IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 192, 128, 0, block) /* ossl_aes128ecb_functions */ IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 128, 128, 0, block) /* ossl_aes256cbc_functions */ IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 256, 128, 128, block) /* ossl_aes192cbc_functions */ IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 192, 128, 128, block) /* ossl_aes128cbc_functions */ IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 128, 128, 128, block) /* ossl_aes256ofb_functions */ IMPLEMENT_generic_cipher(aes, AES, ofb, OFB, 0, 256, 8, 128, stream) /* ossl_aes192ofb_functions */ IMPLEMENT_generic_cipher(aes, AES, ofb, OFB, 0, 192, 8, 128, stream) /* ossl_aes128ofb_functions */ IMPLEMENT_generic_cipher(aes, AES, ofb, OFB, 0, 128, 8, 128, stream) /* ossl_aes256cfb_functions */ IMPLEMENT_generic_cipher(aes, AES, cfb, CFB, 0, 256, 8, 128, stream) /* ossl_aes192cfb_functions */ IMPLEMENT_generic_cipher(aes, AES, cfb, CFB, 0, 192, 8, 128, stream) /* ossl_aes128cfb_functions */ IMPLEMENT_generic_cipher(aes, AES, cfb, CFB, 0, 128, 8, 128, stream) /* ossl_aes256cfb1_functions */ IMPLEMENT_generic_cipher(aes, AES, cfb1, CFB, 0, 256, 8, 128, stream) /* ossl_aes192cfb1_functions */ IMPLEMENT_generic_cipher(aes, AES, cfb1, CFB, 0, 192, 8, 128, stream) /* ossl_aes128cfb1_functions */ IMPLEMENT_generic_cipher(aes, AES, cfb1, CFB, 0, 128, 8, 128, stream) /* ossl_aes256cfb8_functions */ IMPLEMENT_generic_cipher(aes, AES, cfb8, CFB, 0, 256, 8, 128, stream) /* ossl_aes192cfb8_functions */ IMPLEMENT_generic_cipher(aes, AES, cfb8, CFB, 0, 192, 8, 128, stream) /* ossl_aes128cfb8_functions */ IMPLEMENT_generic_cipher(aes, AES, cfb8, CFB, 0, 128, 8, 128, stream) /* ossl_aes256ctr_functions */ IMPLEMENT_generic_cipher(aes, AES, ctr, CTR, 0, 256, 8, 128, stream) /* ossl_aes192ctr_functions */ IMPLEMENT_generic_cipher(aes, AES, ctr, CTR, 0, 192, 8, 128, stream) /* ossl_aes128ctr_functions */ IMPLEMENT_generic_cipher(aes, AES, ctr, CTR, 0, 128, 8, 128, stream) #include "cipher_aes_cts.inc"
./openssl/providers/implementations/ciphers/cipher_sm4_xts.h
/* * Copyright 2022-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <crypto/sm4.h> #include "prov/ciphercommon.h" #include "crypto/sm4_platform.h" PROV_CIPHER_FUNC(void, xts_stream, (const unsigned char *in, unsigned char *out, size_t len, const SM4_KEY *key1, const SM4_KEY *key2, const unsigned char iv[16], const int enc)); typedef struct prov_sm4_xts_ctx_st { /* Must be first */ PROV_CIPHER_CTX base; /* SM4 key schedules to use */ union { OSSL_UNION_ALIGN; SM4_KEY ks; } ks1, ks2; /*- * XTS standard to use with SM4-XTS algorithm * * Must be 0 or 1, * 0 for XTS mode specified by GB/T 17964-2021 * 1 for XTS mode specified by IEEE Std 1619-2007 */ int xts_standard; XTS128_CONTEXT xts; /* Stream function for XTS mode specified by GB/T 17964-2021 */ OSSL_xts_stream_fn stream_gb; /* Stream function for XTS mode specified by IEEE Std 1619-2007 */ OSSL_xts_stream_fn stream; } PROV_SM4_XTS_CTX; const PROV_CIPHER_HW *ossl_prov_cipher_hw_sm4_xts(size_t keybits);
./openssl/providers/implementations/ciphers/ciphercommon.c
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * Generic dispatch table functions for ciphers. */ /* For SSL3_VERSION */ #include <openssl/prov_ssl.h> #include <openssl/proverr.h> #include "ciphercommon_local.h" #include "prov/provider_ctx.h" #include "prov/providercommon.h" /*- * Generic cipher functions for OSSL_PARAM gettables and settables */ static const OSSL_PARAM cipher_known_gettable_params[] = { OSSL_PARAM_uint(OSSL_CIPHER_PARAM_MODE, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_BLOCK_SIZE, NULL), OSSL_PARAM_int(OSSL_CIPHER_PARAM_AEAD, NULL), OSSL_PARAM_int(OSSL_CIPHER_PARAM_CUSTOM_IV, NULL), OSSL_PARAM_int(OSSL_CIPHER_PARAM_CTS, NULL), OSSL_PARAM_int(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK, NULL), OSSL_PARAM_int(OSSL_CIPHER_PARAM_HAS_RAND_KEY, NULL), OSSL_PARAM_END }; const OSSL_PARAM *ossl_cipher_generic_gettable_params(ossl_unused void *provctx) { return cipher_known_gettable_params; } int ossl_cipher_generic_get_params(OSSL_PARAM params[], unsigned int md, uint64_t flags, size_t kbits, size_t blkbits, size_t ivbits) { OSSL_PARAM *p; p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_MODE); if (p != NULL && !OSSL_PARAM_set_uint(p, md)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_AEAD); if (p != NULL && !OSSL_PARAM_set_int(p, (flags & PROV_CIPHER_FLAG_AEAD) != 0)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_CUSTOM_IV); if (p != NULL && !OSSL_PARAM_set_int(p, (flags & PROV_CIPHER_FLAG_CUSTOM_IV) != 0)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_CTS); if (p != NULL && !OSSL_PARAM_set_int(p, (flags & PROV_CIPHER_FLAG_CTS) != 0)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK); if (p != NULL && !OSSL_PARAM_set_int(p, (flags & PROV_CIPHER_FLAG_TLS1_MULTIBLOCK) != 0)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_HAS_RAND_KEY); if (p != NULL && !OSSL_PARAM_set_int(p, (flags & PROV_CIPHER_FLAG_RAND_KEY) != 0)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, kbits / 8)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_BLOCK_SIZE); if (p != NULL && !OSSL_PARAM_set_size_t(p, blkbits / 8)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IVLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, ivbits / 8)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } return 1; } CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_START(ossl_cipher_generic) { OSSL_CIPHER_PARAM_TLS_MAC, OSSL_PARAM_OCTET_PTR, NULL, 0, OSSL_PARAM_UNMODIFIED }, CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_END(ossl_cipher_generic) CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_START(ossl_cipher_generic) OSSL_PARAM_uint(OSSL_CIPHER_PARAM_USE_BITS, NULL), OSSL_PARAM_uint(OSSL_CIPHER_PARAM_TLS_VERSION, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_TLS_MAC_SIZE, NULL), CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_END(ossl_cipher_generic) /* * Variable key length cipher functions for OSSL_PARAM settables */ int ossl_cipher_var_keylen_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; const OSSL_PARAM *p; if (params == NULL) return 1; if (!ossl_cipher_generic_set_ctx_params(vctx, params)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL) { size_t keylen; if (!OSSL_PARAM_get_size_t(p, &keylen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (ctx->keylen != keylen) { ctx->keylen = keylen; ctx->key_set = 0; } } return 1; } CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_START(ossl_cipher_var_keylen) OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_END(ossl_cipher_var_keylen) /*- * AEAD cipher functions for OSSL_PARAM gettables and settables */ static const OSSL_PARAM cipher_aead_known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_AEAD_TAGLEN, NULL), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_IV, NULL, 0), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_UPDATED_IV, NULL, 0), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TAG, NULL, 0), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_AEAD_TLS1_AAD_PAD, NULL), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TLS1_GET_IV_GEN, NULL, 0), OSSL_PARAM_END }; const OSSL_PARAM *ossl_cipher_aead_gettable_ctx_params( ossl_unused void *cctx, ossl_unused void *provctx ) { return cipher_aead_known_gettable_ctx_params; } static const OSSL_PARAM cipher_aead_known_settable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_AEAD_IVLEN, NULL), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TAG, NULL, 0), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TLS1_AAD, NULL, 0), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TLS1_IV_FIXED, NULL, 0), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TLS1_SET_IV_INV, NULL, 0), OSSL_PARAM_END }; const OSSL_PARAM *ossl_cipher_aead_settable_ctx_params( ossl_unused void *cctx, ossl_unused void *provctx ) { return cipher_aead_known_settable_ctx_params; } void ossl_cipher_generic_reset_ctx(PROV_CIPHER_CTX *ctx) { if (ctx != NULL && ctx->alloced) { OPENSSL_free(ctx->tlsmac); ctx->alloced = 0; ctx->tlsmac = NULL; } } static int cipher_generic_init_internal(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) { ctx->num = 0; ctx->bufsz = 0; ctx->updated = 0; ctx->enc = enc ? 1 : 0; if (!ossl_prov_is_running()) return 0; if (iv != NULL && ctx->mode != EVP_CIPH_ECB_MODE) { if (!ossl_cipher_generic_initiv(ctx, iv, ivlen)) return 0; } if (iv == NULL && ctx->iv_set && (ctx->mode == EVP_CIPH_CBC_MODE || ctx->mode == EVP_CIPH_CFB_MODE || ctx->mode == EVP_CIPH_OFB_MODE)) /* reset IV for these modes to keep compatibility with 1.1.1 */ memcpy(ctx->iv, ctx->oiv, ctx->ivlen); if (key != NULL) { if (ctx->variable_keylength == 0) { if (keylen != ctx->keylen) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } } else { ctx->keylen = keylen; } if (!ctx->hw->init(ctx, key, ctx->keylen)) return 0; ctx->key_set = 1; } return ossl_cipher_generic_set_ctx_params(ctx, params); } int ossl_cipher_generic_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return cipher_generic_init_internal((PROV_CIPHER_CTX *)vctx, key, keylen, iv, ivlen, params, 1); } int ossl_cipher_generic_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return cipher_generic_init_internal((PROV_CIPHER_CTX *)vctx, key, keylen, iv, ivlen, params, 0); } /* Max padding including padding length byte */ #define MAX_PADDING 256 int ossl_cipher_generic_block_update(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { size_t outlint = 0; PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; size_t blksz = ctx->blocksize; size_t nextblocks; if (!ctx->key_set) { ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET); return 0; } if (ctx->tlsversion > 0) { /* * Each update call corresponds to a TLS record and is individually * padded */ /* Sanity check inputs */ if (in == NULL || in != out || outsize < inl || !ctx->pad) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } if (ctx->enc) { unsigned char padval; size_t padnum, loop; /* Add padding */ padnum = blksz - (inl % blksz); if (outsize < inl + padnum) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } if (padnum > MAX_PADDING) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } padval = (unsigned char)(padnum - 1); if (ctx->tlsversion == SSL3_VERSION) { if (padnum > 1) memset(out + inl, 0, padnum - 1); *(out + inl + padnum - 1) = padval; } else { /* we need to add 'padnum' padding bytes of value padval */ for (loop = inl; loop < inl + padnum; loop++) out[loop] = padval; } inl += padnum; } if ((inl % blksz) != 0) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } /* Shouldn't normally fail */ if (!ctx->hw->cipher(ctx, out, in, inl)) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } if (ctx->alloced) { OPENSSL_free(ctx->tlsmac); ctx->alloced = 0; ctx->tlsmac = NULL; } /* This only fails if padding is publicly invalid */ *outl = inl; if (!ctx->enc && !ossl_cipher_tlsunpadblock(ctx->libctx, ctx->tlsversion, out, outl, blksz, &ctx->tlsmac, &ctx->alloced, ctx->tlsmacsize, 0)) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } return 1; } if (ctx->bufsz != 0) nextblocks = ossl_cipher_fillblock(ctx->buf, &ctx->bufsz, blksz, &in, &inl); else nextblocks = inl & ~(blksz-1); /* * If we're decrypting and we end an update on a block boundary we hold * the last block back in case this is the last update call and the last * block is padded. */ if (ctx->bufsz == blksz && (ctx->enc || inl > 0 || !ctx->pad)) { if (outsize < blksz) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } if (!ctx->hw->cipher(ctx, out, ctx->buf, blksz)) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } ctx->bufsz = 0; outlint = blksz; out += blksz; } if (nextblocks > 0) { if (!ctx->enc && ctx->pad && nextblocks == inl) { if (!ossl_assert(inl >= blksz)) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } nextblocks -= blksz; } outlint += nextblocks; if (outsize < outlint) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } } if (nextblocks > 0) { if (!ctx->hw->cipher(ctx, out, in, nextblocks)) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } in += nextblocks; inl -= nextblocks; } if (inl != 0 && !ossl_cipher_trailingdata(ctx->buf, &ctx->bufsz, blksz, &in, &inl)) { /* ERR_raise already called */ return 0; } *outl = outlint; return inl == 0; } int ossl_cipher_generic_block_final(void *vctx, unsigned char *out, size_t *outl, size_t outsize) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; size_t blksz = ctx->blocksize; if (!ossl_prov_is_running()) return 0; if (!ctx->key_set) { ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET); return 0; } if (ctx->tlsversion > 0) { /* We never finalize TLS, so this is an error */ ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } if (ctx->enc) { if (ctx->pad) { ossl_cipher_padblock(ctx->buf, &ctx->bufsz, blksz); } else if (ctx->bufsz == 0) { *outl = 0; return 1; } else if (ctx->bufsz != blksz) { ERR_raise(ERR_LIB_PROV, PROV_R_WRONG_FINAL_BLOCK_LENGTH); return 0; } if (outsize < blksz) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } if (!ctx->hw->cipher(ctx, out, ctx->buf, blksz)) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } ctx->bufsz = 0; *outl = blksz; return 1; } /* Decrypting */ if (ctx->bufsz != blksz) { if (ctx->bufsz == 0 && !ctx->pad) { *outl = 0; return 1; } ERR_raise(ERR_LIB_PROV, PROV_R_WRONG_FINAL_BLOCK_LENGTH); return 0; } if (!ctx->hw->cipher(ctx, ctx->buf, ctx->buf, blksz)) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } if (ctx->pad && !ossl_cipher_unpadblock(ctx->buf, &ctx->bufsz, blksz)) { /* ERR_raise already called */ return 0; } if (outsize < ctx->bufsz) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } memcpy(out, ctx->buf, ctx->bufsz); *outl = ctx->bufsz; ctx->bufsz = 0; return 1; } int ossl_cipher_generic_stream_update(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; if (!ctx->key_set) { ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET); return 0; } if (inl == 0) { *outl = 0; return 1; } if (outsize < inl) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } if (!ctx->hw->cipher(ctx, out, in, inl)) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } *outl = inl; if (!ctx->enc && ctx->tlsversion > 0) { /* * Remove any TLS padding. Only used by cipher_aes_cbc_hmac_sha1_hw.c and * cipher_aes_cbc_hmac_sha256_hw.c */ if (ctx->removetlspad) { /* * We should have already failed in the cipher() call above if this * isn't true. */ if (!ossl_assert(*outl >= (size_t)(out[inl - 1] + 1))) return 0; /* The actual padding length */ *outl -= out[inl - 1] + 1; } /* TLS MAC and explicit IV if relevant. We should have already failed * in the cipher() call above if *outl is too short. */ if (!ossl_assert(*outl >= ctx->removetlsfixed)) return 0; *outl -= ctx->removetlsfixed; /* Extract the MAC if there is one */ if (ctx->tlsmacsize > 0) { if (*outl < ctx->tlsmacsize) return 0; ctx->tlsmac = out + *outl - ctx->tlsmacsize; *outl -= ctx->tlsmacsize; } } return 1; } int ossl_cipher_generic_stream_final(void *vctx, unsigned char *out, size_t *outl, size_t outsize) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; if (!ossl_prov_is_running()) return 0; if (!ctx->key_set) { ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET); return 0; } *outl = 0; return 1; } int ossl_cipher_generic_cipher(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; if (!ossl_prov_is_running()) return 0; if (!ctx->key_set) { ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET); return 0; } if (outsize < inl) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } if (!ctx->hw->cipher(ctx, out, in, inl)) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } *outl = inl; return 1; } int ossl_cipher_generic_get_ctx_params(void *vctx, OSSL_PARAM params[]) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; OSSL_PARAM *p; p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IVLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->ivlen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_PADDING); if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->pad)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IV); if (p != NULL && !OSSL_PARAM_set_octet_ptr(p, &ctx->oiv, ctx->ivlen) && !OSSL_PARAM_set_octet_string(p, &ctx->oiv, ctx->ivlen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_UPDATED_IV); if (p != NULL && !OSSL_PARAM_set_octet_ptr(p, &ctx->iv, ctx->ivlen) && !OSSL_PARAM_set_octet_string(p, &ctx->iv, ctx->ivlen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_NUM); if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->num)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->keylen)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_TLS_MAC); if (p != NULL && !OSSL_PARAM_set_octet_ptr(p, ctx->tlsmac, ctx->tlsmacsize)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } return 1; } int ossl_cipher_generic_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; const OSSL_PARAM *p; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_PADDING); if (p != NULL) { unsigned int pad; if (!OSSL_PARAM_get_uint(p, &pad)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } ctx->pad = pad ? 1 : 0; } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_USE_BITS); if (p != NULL) { unsigned int bits; if (!OSSL_PARAM_get_uint(p, &bits)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } ctx->use_bits = bits ? 1 : 0; } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_TLS_VERSION); if (p != NULL) { if (!OSSL_PARAM_get_uint(p, &ctx->tlsversion)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_TLS_MAC_SIZE); if (p != NULL) { if (!OSSL_PARAM_get_size_t(p, &ctx->tlsmacsize)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_NUM); if (p != NULL) { unsigned int num; if (!OSSL_PARAM_get_uint(p, &num)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } ctx->num = num; } return 1; } int ossl_cipher_generic_initiv(PROV_CIPHER_CTX *ctx, const unsigned char *iv, size_t ivlen) { if (ivlen != ctx->ivlen || ivlen > sizeof(ctx->iv)) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH); return 0; } ctx->iv_set = 1; memcpy(ctx->iv, iv, ivlen); memcpy(ctx->oiv, iv, ivlen); return 1; } void ossl_cipher_generic_initkey(void *vctx, size_t kbits, size_t blkbits, size_t ivbits, unsigned int mode, uint64_t flags, const PROV_CIPHER_HW *hw, void *provctx) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; if ((flags & PROV_CIPHER_FLAG_INVERSE_CIPHER) != 0) ctx->inverse_cipher = 1; if ((flags & PROV_CIPHER_FLAG_VARIABLE_LENGTH) != 0) ctx->variable_keylength = 1; ctx->pad = 1; ctx->keylen = ((kbits) / 8); ctx->ivlen = ((ivbits) / 8); ctx->hw = hw; ctx->mode = mode; ctx->blocksize = blkbits / 8; if (provctx != NULL) ctx->libctx = PROV_LIBCTX_OF(provctx); /* used for rand */ }
./openssl/providers/implementations/ciphers/cipher_tdes_default.c
/* * Copyright 2019-2022 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * DES low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include "cipher_tdes_default.h" #include "prov/implementations.h" /* ossl_tdes_ede3_ofb_functions */ IMPLEMENT_tdes_cipher(ede3, EDE3, ofb, OFB, TDES_FLAGS, 64*3, 8, 64, stream); /* ossl_tdes_ede3_cfb_functions */ IMPLEMENT_tdes_cipher(ede3, EDE3, cfb, CFB, TDES_FLAGS, 64*3, 8, 64, stream); /* ossl_tdes_ede3_cfb1_functions */ IMPLEMENT_tdes_cipher(ede3, EDE3, cfb1, CFB, TDES_FLAGS, 64*3, 8, 64, stream); /* ossl_tdes_ede3_cfb8_functions */ IMPLEMENT_tdes_cipher(ede3, EDE3, cfb8, CFB, TDES_FLAGS, 64*3, 8, 64, stream); /* ossl_tdes_ede2_ecb_functions */ IMPLEMENT_tdes_cipher(ede2, EDE2, ecb, ECB, TDES_FLAGS, 64*2, 64, 0, block); /* ossl_tdes_ede2_cbc_functions */ IMPLEMENT_tdes_cipher(ede2, EDE2, cbc, CBC, TDES_FLAGS, 64*2, 64, 64, block); /* ossl_tdes_ede2_ofb_functions */ IMPLEMENT_tdes_cipher(ede2, EDE2, ofb, OFB, TDES_FLAGS, 64*2, 8, 64, stream); /* ossl_tdes_ede2_cfb_functions */ IMPLEMENT_tdes_cipher(ede2, EDE2, cfb, CFB, TDES_FLAGS, 64*2, 8, 64, stream);
./openssl/providers/implementations/ciphers/cipher_sm4_hw.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "cipher_sm4.h" static int cipher_hw_sm4_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_SM4_CTX *sctx = (PROV_SM4_CTX *)ctx; SM4_KEY *ks = &sctx->ks.ks; ctx->ks = ks; if (ctx->enc || (ctx->mode != EVP_CIPH_ECB_MODE && ctx->mode != EVP_CIPH_CBC_MODE)) { #ifdef HWSM4_CAPABLE if (HWSM4_CAPABLE) { HWSM4_set_encrypt_key(key, ks); ctx->block = (block128_f)HWSM4_encrypt; ctx->stream.cbc = NULL; #ifdef HWSM4_cbc_encrypt if (ctx->mode == EVP_CIPH_CBC_MODE) ctx->stream.cbc = (cbc128_f)HWSM4_cbc_encrypt; else #endif #ifdef HWSM4_ecb_encrypt if (ctx->mode == EVP_CIPH_ECB_MODE) ctx->stream.ecb = (ecb128_f)HWSM4_ecb_encrypt; else #endif #ifdef HWSM4_ctr32_encrypt_blocks if (ctx->mode == EVP_CIPH_CTR_MODE) ctx->stream.ctr = (ctr128_f)HWSM4_ctr32_encrypt_blocks; else #endif (void)0; /* terminate potentially open 'else' */ } else #endif #ifdef VPSM4_EX_CAPABLE if (VPSM4_EX_CAPABLE) { vpsm4_ex_set_encrypt_key(key, ks); ctx->block = (block128_f)vpsm4_ex_encrypt; ctx->stream.cbc = NULL; if (ctx->mode == EVP_CIPH_CBC_MODE) ctx->stream.cbc = (cbc128_f)vpsm4_ex_cbc_encrypt; else if (ctx->mode == EVP_CIPH_ECB_MODE) ctx->stream.ecb = (ecb128_f)vpsm4_ex_ecb_encrypt; else if (ctx->mode == EVP_CIPH_CTR_MODE) ctx->stream.ctr = (ctr128_f)vpsm4_ex_ctr32_encrypt_blocks; } else #endif #ifdef VPSM4_CAPABLE if (VPSM4_CAPABLE) { vpsm4_set_encrypt_key(key, ks); ctx->block = (block128_f)vpsm4_encrypt; ctx->stream.cbc = NULL; if (ctx->mode == EVP_CIPH_CBC_MODE) ctx->stream.cbc = (cbc128_f)vpsm4_cbc_encrypt; else if (ctx->mode == EVP_CIPH_ECB_MODE) ctx->stream.ecb = (ecb128_f)vpsm4_ecb_encrypt; else if (ctx->mode == EVP_CIPH_CTR_MODE) ctx->stream.ctr = (ctr128_f)vpsm4_ctr32_encrypt_blocks; } else #endif { ossl_sm4_set_key(key, ks); ctx->block = (block128_f)ossl_sm4_encrypt; } } else { #ifdef HWSM4_CAPABLE if (HWSM4_CAPABLE) { HWSM4_set_decrypt_key(key, ks); ctx->block = (block128_f)HWSM4_decrypt; ctx->stream.cbc = NULL; #ifdef HWSM4_cbc_encrypt if (ctx->mode == EVP_CIPH_CBC_MODE) ctx->stream.cbc = (cbc128_f)HWSM4_cbc_encrypt; #endif #ifdef HWSM4_ecb_encrypt if (ctx->mode == EVP_CIPH_ECB_MODE) ctx->stream.ecb = (ecb128_f)HWSM4_ecb_encrypt; #endif } else #endif #ifdef VPSM4_EX_CAPABLE if (VPSM4_EX_CAPABLE) { vpsm4_ex_set_decrypt_key(key, ks); ctx->block = (block128_f)vpsm4_ex_decrypt; ctx->stream.cbc = NULL; if (ctx->mode == EVP_CIPH_CBC_MODE) ctx->stream.cbc = (cbc128_f)vpsm4_ex_cbc_encrypt; else if (ctx->mode == EVP_CIPH_ECB_MODE) ctx->stream.ecb = (ecb128_f)vpsm4_ex_ecb_encrypt; } else #endif #ifdef VPSM4_CAPABLE if (VPSM4_CAPABLE) { vpsm4_set_decrypt_key(key, ks); ctx->block = (block128_f)vpsm4_decrypt; ctx->stream.cbc = NULL; if (ctx->mode == EVP_CIPH_CBC_MODE) ctx->stream.cbc = (cbc128_f)vpsm4_cbc_encrypt; else if (ctx->mode == EVP_CIPH_ECB_MODE) ctx->stream.ecb = (ecb128_f)vpsm4_ecb_encrypt; } else #endif { ossl_sm4_set_key(key, ks); ctx->block = (block128_f)ossl_sm4_decrypt; } } return 1; } IMPLEMENT_CIPHER_HW_COPYCTX(cipher_hw_sm4_copyctx, PROV_SM4_CTX) # define PROV_CIPHER_HW_sm4_mode(mode) \ static const PROV_CIPHER_HW sm4_##mode = { \ cipher_hw_sm4_initkey, \ ossl_cipher_hw_generic_##mode, \ cipher_hw_sm4_copyctx \ }; \ PROV_CIPHER_HW_declare(mode) \ const PROV_CIPHER_HW *ossl_prov_cipher_hw_sm4_##mode(size_t keybits) \ { \ PROV_CIPHER_HW_select(mode) \ return &sm4_##mode; \ } #if defined(__riscv) && __riscv_xlen == 64 # include "cipher_sm4_hw_rv64i.inc" #else /* The generic case */ # define PROV_CIPHER_HW_declare(mode) # define PROV_CIPHER_HW_select(mode) #endif PROV_CIPHER_HW_sm4_mode(cbc) PROV_CIPHER_HW_sm4_mode(ecb) PROV_CIPHER_HW_sm4_mode(ofb128) PROV_CIPHER_HW_sm4_mode(cfb128) PROV_CIPHER_HW_sm4_mode(ctr)
./openssl/providers/implementations/ciphers/cipher_sm4.h
/* * Copyright 2019-2022 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "prov/ciphercommon.h" #include "crypto/sm4.h" #include "crypto/sm4_platform.h" typedef struct prov_cast_ctx_st { PROV_CIPHER_CTX base; /* Must be first */ union { OSSL_UNION_ALIGN; SM4_KEY ks; } ks; } PROV_SM4_CTX; const PROV_CIPHER_HW *ossl_prov_cipher_hw_sm4_cbc(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_sm4_ecb(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_sm4_ctr(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_sm4_ofb128(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_sm4_cfb128(size_t keybits);
./openssl/providers/implementations/ciphers/cipher_idea.c
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * IDEA low level APIs are deprecated for public use, but still ok for internal * use where we're using them to implement the higher level EVP interface, as is * the case here. */ #include "internal/deprecated.h" /* Dispatch functions for Idea cipher modes ecb, cbc, ofb, cfb */ #include "cipher_idea.h" #include "prov/implementations.h" #include "prov/providercommon.h" static OSSL_FUNC_cipher_freectx_fn idea_freectx; static OSSL_FUNC_cipher_dupctx_fn idea_dupctx; static void idea_freectx(void *vctx) { PROV_IDEA_CTX *ctx = (PROV_IDEA_CTX *)vctx; ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } static void *idea_dupctx(void *ctx) { PROV_IDEA_CTX *in = (PROV_IDEA_CTX *)ctx; PROV_IDEA_CTX *ret; if (!ossl_prov_is_running()) return NULL; ret = OPENSSL_malloc(sizeof(*ret)); if (ret == NULL) return NULL; *ret = *in; return ret; } /* ossl_idea128ecb_functions */ IMPLEMENT_generic_cipher(idea, IDEA, ecb, ECB, 0, 128, 64, 0, block) /* ossl_idea128cbc_functions */ IMPLEMENT_generic_cipher(idea, IDEA, cbc, CBC, 0, 128, 64, 64, block) /* ossl_idea128ofb64_functions */ IMPLEMENT_generic_cipher(idea, IDEA, ofb64, OFB, 0, 128, 8, 64, stream) /* ossl_idea128cfb64_functions */ IMPLEMENT_generic_cipher(idea, IDEA, cfb64, CFB, 0, 128, 8, 64, stream)
./openssl/providers/implementations/ciphers/cipher_tdes_wrap.c
/* * Copyright 1995-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * DES and SHA-1 low level APIs are deprecated for public use, but still ok for * internal use. */ #include "internal/deprecated.h" #include <openssl/sha.h> #include <openssl/rand.h> #include <openssl/proverr.h> #include "cipher_tdes_default.h" #include "crypto/evp.h" #include "crypto/sha.h" #include "prov/implementations.h" #include "prov/providercommon.h" #define TDES_WRAP_FLAGS PROV_CIPHER_FLAG_CUSTOM_IV | PROV_CIPHER_FLAG_RAND_KEY static OSSL_FUNC_cipher_update_fn tdes_wrap_update; static OSSL_FUNC_cipher_cipher_fn tdes_wrap_cipher; static const unsigned char wrap_iv[8] = { 0x4a, 0xdd, 0xa2, 0x2c, 0x79, 0xe8, 0x21, 0x05 }; static int des_ede3_unwrap(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { unsigned char icv[8], iv[TDES_IVLEN], sha1tmp[SHA_DIGEST_LENGTH]; int rv = -1; if (inl < 24) return -1; if (out == NULL) return inl - 16; memcpy(ctx->iv, wrap_iv, 8); /* Decrypt first block which will end up as icv */ ctx->hw->cipher(ctx, icv, in, 8); /* Decrypt central blocks */ /* * If decrypting in place move whole output along a block so the next * des_ede_cbc_cipher is in place. */ if (out == in) { memmove(out, out + 8, inl - 8); in -= 8; } ctx->hw->cipher(ctx, out, in + 8, inl - 16); /* Decrypt final block which will be IV */ ctx->hw->cipher(ctx, iv, in + inl - 8, 8); /* Reverse order of everything */ BUF_reverse(icv, NULL, 8); BUF_reverse(out, NULL, inl - 16); BUF_reverse(ctx->iv, iv, 8); /* Decrypt again using new IV */ ctx->hw->cipher(ctx, out, out, inl - 16); ctx->hw->cipher(ctx, icv, icv, 8); if (ossl_sha1(out, inl - 16, sha1tmp) /* Work out hash of first portion */ && CRYPTO_memcmp(sha1tmp, icv, 8) == 0) rv = inl - 16; OPENSSL_cleanse(icv, 8); OPENSSL_cleanse(sha1tmp, SHA_DIGEST_LENGTH); OPENSSL_cleanse(iv, 8); OPENSSL_cleanse(ctx->iv, sizeof(ctx->iv)); if (rv == -1) OPENSSL_cleanse(out, inl - 16); return rv; } static int des_ede3_wrap(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { unsigned char sha1tmp[SHA_DIGEST_LENGTH]; size_t ivlen = TDES_IVLEN; size_t icvlen = TDES_IVLEN; size_t len = inl + ivlen + icvlen; if (out == NULL) return len; /* Copy input to output buffer + 8 so we have space for IV */ memmove(out + ivlen, in, inl); /* Work out ICV */ if (!ossl_sha1(in, inl, sha1tmp)) return 0; memcpy(out + inl + ivlen, sha1tmp, icvlen); OPENSSL_cleanse(sha1tmp, SHA_DIGEST_LENGTH); /* Generate random IV */ if (RAND_bytes_ex(ctx->libctx, ctx->iv, ivlen, 0) <= 0) return 0; memcpy(out, ctx->iv, ivlen); /* Encrypt everything after IV in place */ ctx->hw->cipher(ctx, out + ivlen, out + ivlen, inl + ivlen); BUF_reverse(out, NULL, len); memcpy(ctx->iv, wrap_iv, ivlen); ctx->hw->cipher(ctx, out, out, len); return len; } static int tdes_wrap_cipher_internal(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { /* * Sanity check input length: we typically only wrap keys so EVP_MAXCHUNK * is more than will ever be needed. Also input length must be a multiple * of 8 bits. */ if (inl >= EVP_MAXCHUNK || inl % 8) return -1; if (ctx->enc) return des_ede3_wrap(ctx, out, in, inl); else return des_ede3_unwrap(ctx, out, in, inl); } static int tdes_wrap_cipher(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; int ret; *outl = 0; if (!ossl_prov_is_running()) return 0; if (outsize < inl) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } ret = tdes_wrap_cipher_internal(ctx, out, in, inl); if (ret <= 0) return 0; *outl = ret; return 1; } static int tdes_wrap_update(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { *outl = 0; if (inl == 0) return 1; if (outsize < inl) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } if (!tdes_wrap_cipher(vctx, out, outl, outsize, in, inl)) { ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED); return 0; } return 1; } # define IMPLEMENT_WRAP_CIPHER(flags, kbits, blkbits, ivbits) \ static OSSL_FUNC_cipher_newctx_fn tdes_wrap_newctx; \ static void *tdes_wrap_newctx(void *provctx) \ { \ return ossl_tdes_newctx(provctx, EVP_CIPH_WRAP_MODE, kbits, blkbits, \ ivbits, flags, \ ossl_prov_cipher_hw_tdes_wrap_cbc()); \ } \ static OSSL_FUNC_cipher_get_params_fn tdes_wrap_get_params; \ static int tdes_wrap_get_params(OSSL_PARAM params[]) \ { \ return ossl_cipher_generic_get_params(params, EVP_CIPH_WRAP_MODE, flags, \ kbits, blkbits, ivbits); \ } \ const OSSL_DISPATCH ossl_tdes_wrap_cbc_functions[] = \ { \ { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void)) ossl_tdes_einit }, \ { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void)) ossl_tdes_dinit }, \ { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))tdes_wrap_cipher }, \ { OSSL_FUNC_CIPHER_NEWCTX, (void (*)(void))tdes_wrap_newctx }, \ { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))ossl_tdes_freectx }, \ { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))tdes_wrap_update }, \ { OSSL_FUNC_CIPHER_FINAL, \ (void (*)(void))ossl_cipher_generic_stream_final }, \ { OSSL_FUNC_CIPHER_GET_PARAMS, (void (*)(void))tdes_wrap_get_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_params }, \ { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, \ (void (*)(void))ossl_tdes_get_ctx_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, \ (void (*)(void))ossl_tdes_gettable_ctx_params }, \ { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_set_ctx_params }, \ { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, \ (void (*)(void))ossl_cipher_generic_settable_ctx_params }, \ OSSL_DISPATCH_END \ } /* ossl_tdes_wrap_cbc_functions */ IMPLEMENT_WRAP_CIPHER(TDES_WRAP_FLAGS, 64*3, 64, 0);
./openssl/providers/implementations/ciphers/cipher_sm4_gcm_hw.c
/* * Copyright 2021-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /*- * Generic support for SM4 GCM. */ #include "cipher_sm4_gcm.h" #include "crypto/sm4_platform.h" # define SM4_GCM_HW_SET_KEY_CTR_FN(ks, fn_set_enc_key, fn_block, fn_ctr) \ fn_set_enc_key(key, ks); \ CRYPTO_gcm128_init(&ctx->gcm, ks, (block128_f)fn_block); \ ctx->ctr = (ctr128_f)fn_ctr; \ ctx->key_set = 1; static int sm4_gcm_initkey(PROV_GCM_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_SM4_GCM_CTX *actx = (PROV_SM4_GCM_CTX *)ctx; SM4_KEY *ks = &actx->ks.ks; # ifdef HWSM4_CAPABLE if (HWSM4_CAPABLE) { # ifdef HWSM4_ctr32_encrypt_blocks SM4_GCM_HW_SET_KEY_CTR_FN(ks, HWSM4_set_encrypt_key, HWSM4_encrypt, HWSM4_ctr32_encrypt_blocks); # else /* HWSM4_ctr32_encrypt_blocks */ SM4_GCM_HW_SET_KEY_CTR_FN(ks, HWSM4_set_encrypt_key, HWSM4_encrypt, NULL); # endif } else # endif /* HWSM4_CAPABLE */ #ifdef VPSM4_EX_CAPABLE if (VPSM4_EX_CAPABLE) { SM4_GCM_HW_SET_KEY_CTR_FN(ks, vpsm4_ex_set_encrypt_key, vpsm4_ex_encrypt, vpsm4_ex_ctr32_encrypt_blocks); } else #endif /* VPSM4_EX_CAPABLE */ # ifdef VPSM4_CAPABLE if (VPSM4_CAPABLE) { SM4_GCM_HW_SET_KEY_CTR_FN(ks, vpsm4_set_encrypt_key, vpsm4_encrypt, vpsm4_ctr32_encrypt_blocks); } else # endif /* VPSM4_CAPABLE */ { SM4_GCM_HW_SET_KEY_CTR_FN(ks, ossl_sm4_set_key, ossl_sm4_encrypt, NULL); } return 1; } static int hw_gcm_cipher_update(PROV_GCM_CTX *ctx, const unsigned char *in, size_t len, unsigned char *out) { if (ctx->enc) { if (ctx->ctr != NULL) { if (CRYPTO_gcm128_encrypt_ctr32(&ctx->gcm, in, out, len, ctx->ctr)) return 0; } else { if (CRYPTO_gcm128_encrypt(&ctx->gcm, in, out, len)) return 0; } } else { if (ctx->ctr != NULL) { if (CRYPTO_gcm128_decrypt_ctr32(&ctx->gcm, in, out, len, ctx->ctr)) return 0; } else { if (CRYPTO_gcm128_decrypt(&ctx->gcm, in, out, len)) return 0; } } return 1; } static const PROV_GCM_HW sm4_gcm = { sm4_gcm_initkey, ossl_gcm_setiv, ossl_gcm_aad_update, hw_gcm_cipher_update, ossl_gcm_cipher_final, ossl_gcm_one_shot }; #if defined(__riscv) && __riscv_xlen == 64 # include "cipher_sm4_gcm_hw_rv64i.inc" #else const PROV_GCM_HW *ossl_prov_sm4_hw_gcm(size_t keybits) { return &sm4_gcm; } #endif
./openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for AES SIV mode */ /* * This file uses the low level AES functions (which are deprecated for * non-internal use) in order to implement provider AES ciphers. */ #include "internal/deprecated.h" #include <openssl/proverr.h> #include "prov/implementations.h" #include "prov/providercommon.h" #include "prov/ciphercommon_aead.h" #include "prov/provider_ctx.h" #include "cipher_aes_gcm_siv.h" static int ossl_aes_gcm_siv_set_ctx_params(void *vctx, const OSSL_PARAM params[]); static void *ossl_aes_gcm_siv_newctx(void *provctx, size_t keybits) { PROV_AES_GCM_SIV_CTX *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) { ctx->key_len = keybits / 8; ctx->hw = ossl_prov_cipher_hw_aes_gcm_siv(keybits); ctx->libctx = PROV_LIBCTX_OF(provctx); ctx->provctx = provctx; } return ctx; } static void ossl_aes_gcm_siv_freectx(void *vctx) { PROV_AES_GCM_SIV_CTX *ctx = (PROV_AES_GCM_SIV_CTX *)vctx; if (ctx == NULL) return; OPENSSL_clear_free(ctx->aad, ctx->aad_len); ctx->hw->clean_ctx(ctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } static void *ossl_aes_gcm_siv_dupctx(void *vctx) { PROV_AES_GCM_SIV_CTX *in = (PROV_AES_GCM_SIV_CTX *)vctx; PROV_AES_GCM_SIV_CTX *ret; if (!ossl_prov_is_running()) return NULL; if (in->hw == NULL) return NULL; ret = OPENSSL_memdup(in, sizeof(*in)); if (ret == NULL) return NULL; /* NULL-out these things we create later */ ret->aad = NULL; ret->ecb_ctx = NULL; if (in->aad != NULL) { if ((ret->aad = OPENSSL_memdup(in->aad, UP16(ret->aad_len))) == NULL) goto err; } if (!in->hw->dup_ctx(ret, in)) goto err; return ret; err: if (ret != NULL) { OPENSSL_clear_free(ret->aad, ret->aad_len); OPENSSL_free(ret); } return NULL; } static int ossl_aes_gcm_siv_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) { PROV_AES_GCM_SIV_CTX *ctx = (PROV_AES_GCM_SIV_CTX *)vctx; if (!ossl_prov_is_running()) return 0; ctx->enc = enc; if (key != NULL) { if (keylen != ctx->key_len) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } memcpy(ctx->key_gen_key, key, ctx->key_len); } if (iv != NULL) { if (ivlen != sizeof(ctx->nonce)) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH); return 0; } memcpy(ctx->nonce, iv, sizeof(ctx->nonce)); } if (!ctx->hw->initkey(ctx)) return 0; return ossl_aes_gcm_siv_set_ctx_params(ctx, params); } static int ossl_aes_gcm_siv_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return ossl_aes_gcm_siv_init(vctx, key, keylen, iv, ivlen, params, 1); } static int ossl_aes_gcm_siv_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) { return ossl_aes_gcm_siv_init(vctx, key, keylen, iv, ivlen, params, 0); } #define ossl_aes_gcm_siv_stream_update ossl_aes_gcm_siv_cipher static int ossl_aes_gcm_siv_cipher(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { PROV_AES_GCM_SIV_CTX *ctx = (PROV_AES_GCM_SIV_CTX *)vctx; int error = 0; if (!ossl_prov_is_running()) return 0; /* The RFC has a test case for this, but we don't try to do anything */ if (inl == 0) { if (outl != NULL) *outl = 0; return 1; } if (outsize < inl) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } error |= !ctx->hw->cipher(ctx, out, in, inl); if (outl != NULL && !error) *outl = inl; return !error; } static int ossl_aes_gcm_siv_stream_final(void *vctx, unsigned char *out, size_t *outl, size_t outsize) { PROV_AES_GCM_SIV_CTX *ctx = (PROV_AES_GCM_SIV_CTX *)vctx; int error = 0; if (!ossl_prov_is_running()) return 0; error |= !ctx->hw->cipher(vctx, out, NULL, 0); if (outl != NULL && !error) *outl = 0; return !error; } static int ossl_aes_gcm_siv_get_ctx_params(void *vctx, OSSL_PARAM params[]) { PROV_AES_GCM_SIV_CTX *ctx = (PROV_AES_GCM_SIV_CTX *)vctx; OSSL_PARAM *p; p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_AEAD_TAG); if (p != NULL && p->data_type == OSSL_PARAM_OCTET_STRING) { if (!ctx->enc || !ctx->generated_tag || p->data_size != sizeof(ctx->tag) || !OSSL_PARAM_set_octet_string(p, ctx->tag, sizeof(ctx->tag))) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_AEAD_TAGLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, sizeof(ctx->tag))) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->key_len)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } return 1; } static const OSSL_PARAM aes_gcm_siv_known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_AEAD_TAGLEN, NULL), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TAG, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *ossl_aes_gcm_siv_gettable_ctx_params(ossl_unused void *cctx, ossl_unused void *provctx) { return aes_gcm_siv_known_gettable_ctx_params; } static int ossl_aes_gcm_siv_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { PROV_AES_GCM_SIV_CTX *ctx = (PROV_AES_GCM_SIV_CTX *)vctx; const OSSL_PARAM *p; unsigned int speed = 0; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_AEAD_TAG); if (p != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING || p->data_size != sizeof(ctx->user_tag)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } if (!ctx->enc) { memcpy(ctx->user_tag, p->data, sizeof(ctx->tag)); ctx->have_user_tag = 1; } } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_SPEED); if (p != NULL) { if (!OSSL_PARAM_get_uint(p, &speed)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } ctx->speed = !!speed; } p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_KEYLEN); if (p != NULL) { size_t key_len; if (!OSSL_PARAM_get_size_t(p, &key_len)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } /* The key length can not be modified */ if (key_len != ctx->key_len) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } } return 1; } static const OSSL_PARAM aes_gcm_siv_known_settable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL), OSSL_PARAM_uint(OSSL_CIPHER_PARAM_SPEED, NULL), OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TAG, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *ossl_aes_gcm_siv_settable_ctx_params(ossl_unused void *cctx, ossl_unused void *provctx) { return aes_gcm_siv_known_settable_ctx_params; } #define IMPLEMENT_cipher(alg, lc, UCMODE, flags, kbits, blkbits, ivbits) \ static OSSL_FUNC_cipher_newctx_fn ossl_##alg##kbits##_##lc##_newctx; \ static OSSL_FUNC_cipher_freectx_fn ossl_##alg##_##lc##_freectx; \ static OSSL_FUNC_cipher_dupctx_fn ossl_##alg##_##lc##_dupctx; \ static OSSL_FUNC_cipher_encrypt_init_fn ossl_##alg##_##lc##_einit; \ static OSSL_FUNC_cipher_decrypt_init_fn ossl_##alg##_##lc##_dinit; \ static OSSL_FUNC_cipher_update_fn ossl_##alg##_##lc##_stream_update; \ static OSSL_FUNC_cipher_final_fn ossl_##alg##_##lc##_stream_final; \ static OSSL_FUNC_cipher_cipher_fn ossl_##alg##_##lc##_cipher; \ static OSSL_FUNC_cipher_get_params_fn ossl_##alg##_##kbits##_##lc##_get_params; \ static OSSL_FUNC_cipher_get_ctx_params_fn ossl_##alg##_##lc##_get_ctx_params; \ static OSSL_FUNC_cipher_gettable_ctx_params_fn ossl_##alg##_##lc##_gettable_ctx_params; \ static OSSL_FUNC_cipher_set_ctx_params_fn ossl_##alg##_##lc##_set_ctx_params; \ static OSSL_FUNC_cipher_settable_ctx_params_fn ossl_##alg##_##lc##_settable_ctx_params; \ static int ossl_##alg##_##kbits##_##lc##_get_params(OSSL_PARAM params[]) \ { \ return ossl_cipher_generic_get_params(params, EVP_CIPH_##UCMODE##_MODE, \ flags, kbits, blkbits, ivbits); \ } \ static void *ossl_##alg##kbits##_##lc##_newctx(void *provctx) \ { \ return ossl_##alg##_##lc##_newctx(provctx, kbits); \ } \ const OSSL_DISPATCH ossl_##alg##kbits##lc##_functions[] = { \ { OSSL_FUNC_CIPHER_NEWCTX, (void (*)(void))ossl_##alg##kbits##_##lc##_newctx }, \ { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))ossl_##alg##_##lc##_freectx }, \ { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))ossl_##alg##_##lc##_dupctx }, \ { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))ossl_##alg##_##lc##_einit }, \ { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))ossl_##alg##_##lc##_dinit }, \ { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))ossl_##alg##_##lc##_stream_update }, \ { OSSL_FUNC_CIPHER_FINAL, (void (*)(void))ossl_##alg##_##lc##_stream_final }, \ { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))ossl_##alg##_##lc##_cipher }, \ { OSSL_FUNC_CIPHER_GET_PARAMS, (void (*)(void))ossl_##alg##_##kbits##_##lc##_get_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, (void (*)(void))ossl_cipher_generic_gettable_params }, \ { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, (void (*)(void))ossl_##alg##_##lc##_get_ctx_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, (void (*)(void))ossl_##alg##_##lc##_gettable_ctx_params }, \ { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, (void (*)(void))ossl_##alg##_##lc##_set_ctx_params }, \ { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, (void (*)(void))ossl_##alg##_##lc##_settable_ctx_params }, \ OSSL_DISPATCH_END \ } IMPLEMENT_cipher(aes, gcm_siv, GCM_SIV, AEAD_FLAGS, 128, 8, 96); IMPLEMENT_cipher(aes, gcm_siv, GCM_SIV, AEAD_FLAGS, 192, 8, 96); IMPLEMENT_cipher(aes, gcm_siv, GCM_SIV, AEAD_FLAGS, 256, 8, 96);
./openssl/providers/implementations/ciphers/cipher_desx_hw.c
/* * Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * DES low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include <openssl/des.h> #include "cipher_tdes_default.h" /* * Note the PROV_TDES_CTX has been used for the DESX cipher, just to reduce * code size. */ #define ks1 tks.ks[0] #define ks2 tks.ks[1].ks[0].cblock #define ks3 tks.ks[2].ks[0].cblock static int cipher_hw_desx_cbc_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_TDES_CTX *tctx = (PROV_TDES_CTX *)ctx; DES_cblock *deskey = (DES_cblock *)key; DES_set_key_unchecked(deskey, &tctx->ks1); memcpy(&tctx->ks2, &key[8], 8); memcpy(&tctx->ks3, &key[16], 8); return 1; } static void cipher_hw_desx_copyctx(PROV_CIPHER_CTX *dst, const PROV_CIPHER_CTX *src) { PROV_TDES_CTX *sctx = (PROV_TDES_CTX *)src; PROV_TDES_CTX *dctx = (PROV_TDES_CTX *)dst; *dctx = *sctx; dst->ks = &dctx->tks.ks; } static int cipher_hw_desx_cbc(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { PROV_TDES_CTX *tctx = (PROV_TDES_CTX *)ctx; while (inl >= MAXCHUNK) { DES_xcbc_encrypt(in, out, (long)MAXCHUNK, &tctx->ks1, (DES_cblock *)ctx->iv, &tctx->ks2, &tctx->ks3, ctx->enc); inl -= MAXCHUNK; in += MAXCHUNK; out += MAXCHUNK; } if (inl > 0) DES_xcbc_encrypt(in, out, (long)inl, &tctx->ks1, (DES_cblock *)ctx->iv, &tctx->ks2, &tctx->ks3, ctx->enc); return 1; } static const PROV_CIPHER_HW desx_cbc = { cipher_hw_desx_cbc_initkey, cipher_hw_desx_cbc, cipher_hw_desx_copyctx }; const PROV_CIPHER_HW *ossl_prov_cipher_hw_tdes_desx_cbc(void) { return &desx_cbc; }
./openssl/providers/implementations/ciphers/cipher_tdes_default_hw.c
/* * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * DES low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include "cipher_tdes_default.h" #define ks1 tks.ks[0] #define ks2 tks.ks[1] #define ks3 tks.ks[2] static int ossl_cipher_hw_tdes_ede2_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) { PROV_TDES_CTX *tctx = (PROV_TDES_CTX *)ctx; DES_cblock *deskey = (DES_cblock *)key; tctx->tstream.cbc = NULL; # if defined(SPARC_DES_CAPABLE) if (SPARC_DES_CAPABLE) { if (ctx->mode == EVP_CIPH_CBC_MODE) { des_t4_key_expand(&deskey[0], &tctx->ks1); des_t4_key_expand(&deskey[1], &tctx->ks2); memcpy(&tctx->ks3, &tctx->ks1, sizeof(tctx->ks1)); tctx->tstream.cbc = ctx->enc ? des_t4_ede3_cbc_encrypt : des_t4_ede3_cbc_decrypt; return 1; } } # endif DES_set_key_unchecked(&deskey[0], &tctx->ks1); DES_set_key_unchecked(&deskey[1], &tctx->ks2); memcpy(&tctx->ks3, &tctx->ks1, sizeof(tctx->ks1)); return 1; } static int ossl_cipher_hw_tdes_ofb(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { PROV_TDES_CTX *tctx = (PROV_TDES_CTX *)ctx; int num = ctx->num; while (inl >= MAXCHUNK) { DES_ede3_ofb64_encrypt(in, out, (long)MAXCHUNK, &tctx->ks1, &tctx->ks2, &tctx->ks3, (DES_cblock *)ctx->iv, &num); inl -= MAXCHUNK; in += MAXCHUNK; out += MAXCHUNK; } if (inl > 0) { DES_ede3_ofb64_encrypt(in, out, (long)inl, &tctx->ks1, &tctx->ks2, &tctx->ks3, (DES_cblock *)ctx->iv, &num); } ctx->num = num; return 1; } static int ossl_cipher_hw_tdes_cfb(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { PROV_TDES_CTX *tctx = (PROV_TDES_CTX *)ctx; int num = ctx->num; while (inl >= MAXCHUNK) { DES_ede3_cfb64_encrypt(in, out, (long)MAXCHUNK, &tctx->ks1, &tctx->ks2, &tctx->ks3, (DES_cblock *)ctx->iv, &num, ctx->enc); inl -= MAXCHUNK; in += MAXCHUNK; out += MAXCHUNK; } if (inl > 0) { DES_ede3_cfb64_encrypt(in, out, (long)inl, &tctx->ks1, &tctx->ks2, &tctx->ks3, (DES_cblock *)ctx->iv, &num, ctx->enc); } ctx->num = num; return 1; } /* * Although we have a CFB-r implementation for 3-DES, it doesn't pack the * right way, so wrap it here */ static int ossl_cipher_hw_tdes_cfb1(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { PROV_TDES_CTX *tctx = (PROV_TDES_CTX *)ctx; size_t n; unsigned char c[1]; unsigned char d[1] = { 0 }; if (ctx->use_bits == 0) inl *= 8; for (n = 0; n < inl; ++n) { c[0] = (in[n / 8] & (1 << (7 - n % 8))) ? 0x80 : 0; DES_ede3_cfb_encrypt(c, d, 1, 1, &tctx->ks1, &tctx->ks2, &tctx->ks3, (DES_cblock *)ctx->iv, ctx->enc); out[n / 8] = (out[n / 8] & ~(0x80 >> (unsigned int)(n % 8))) | ((d[0] & 0x80) >> (unsigned int)(n % 8)); } return 1; } static int ossl_cipher_hw_tdes_cfb8(PROV_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { PROV_TDES_CTX *tctx = (PROV_TDES_CTX *)ctx; while (inl >= MAXCHUNK) { DES_ede3_cfb_encrypt(in, out, 8, (long)MAXCHUNK, &tctx->ks1, &tctx->ks2, &tctx->ks3, (DES_cblock *)ctx->iv, ctx->enc); inl -= MAXCHUNK; in += MAXCHUNK; out += MAXCHUNK; } if (inl > 0) DES_ede3_cfb_encrypt(in, out, 8, (long)inl, &tctx->ks1, &tctx->ks2, &tctx->ks3, (DES_cblock *)ctx->iv, ctx->enc); return 1; } PROV_CIPHER_HW_tdes_mode(ede3, ofb) PROV_CIPHER_HW_tdes_mode(ede3, cfb) PROV_CIPHER_HW_tdes_mode(ede3, cfb1) PROV_CIPHER_HW_tdes_mode(ede3, cfb8) PROV_CIPHER_HW_tdes_mode(ede2, ecb) PROV_CIPHER_HW_tdes_mode(ede2, cbc) PROV_CIPHER_HW_tdes_mode(ede2, ofb) PROV_CIPHER_HW_tdes_mode(ede2, cfb)
./openssl/providers/implementations/ciphers/cipher_aes_gcm_siv_polyval.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * AES low level APIs are deprecated for public use, but still ok for internal * use where we're using them to implement the higher level EVP interface, as is * the case here. */ #include "internal/deprecated.h" #include <openssl/evp.h> #include <internal/endian.h> #include <prov/implementations.h> #include "cipher_aes_gcm_siv.h" static ossl_inline void mulx_ghash(uint64_t *a) { uint64_t t[2], mask; DECLARE_IS_ENDIAN; if (IS_LITTLE_ENDIAN) { t[0] = GSWAP8(a[0]); t[1] = GSWAP8(a[1]); } else { t[0] = a[0]; t[1] = a[1]; } mask = -(int64_t)(t[1] & 1) & 0xe1; mask <<= 56; if (IS_LITTLE_ENDIAN) { a[1] = GSWAP8((t[1] >> 1) ^ (t[0] << 63)); a[0] = GSWAP8((t[0] >> 1) ^ mask); } else { a[1] = (t[1] >> 1) ^ (t[0] << 63); a[0] = (t[0] >> 1) ^ mask; } } #define aligned64(p) (((uintptr_t)p & 0x07) == 0) static ossl_inline void byte_reverse16(uint8_t *out, const uint8_t *in) { if (aligned64(out) && aligned64(in)) { ((uint64_t *)out)[0] = GSWAP8(((uint64_t *)in)[1]); ((uint64_t *)out)[1] = GSWAP8(((uint64_t *)in)[0]); } else { int i; for (i = 0; i < 16; i++) out[i] = in[15 - i]; } } /* Initialization of POLYVAL via existing GHASH implementation */ void ossl_polyval_ghash_init(u128 Htable[16], const uint64_t H[2]) { uint64_t tmp[2]; DECLARE_IS_ENDIAN; byte_reverse16((uint8_t *)tmp, (const uint8_t *)H); mulx_ghash(tmp); if (IS_LITTLE_ENDIAN) { /* "H is stored in host byte order" */ tmp[0] = GSWAP8(tmp[0]); tmp[1] = GSWAP8(tmp[1]); } ossl_gcm_init_4bit(Htable, (u64*)tmp); } /* Implementation of POLYVAL via existing GHASH implementation */ void ossl_polyval_ghash_hash(const u128 Htable[16], uint8_t *tag, const uint8_t *inp, size_t len) { uint64_t out[2]; uint64_t tmp[2]; size_t i; byte_reverse16((uint8_t *)out, (uint8_t *)tag); /* * This implementation doesn't deal with partials, callers do, * so, len is a multiple of 16 */ for (i = 0; i < len; i += 16) { byte_reverse16((uint8_t *)tmp, &inp[i]); ossl_gcm_ghash_4bit((u64*)out, Htable, (uint8_t *)tmp, 16); } byte_reverse16(tag, (uint8_t *)out); }
./openssl/providers/implementations/ciphers/cipher_blowfish.h
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/blowfish.h> #include "prov/ciphercommon.h" typedef struct prov_blowfish_ctx_st { PROV_CIPHER_CTX base; /* Must be first */ union { OSSL_UNION_ALIGN; BF_KEY ks; } ks; } PROV_BLOWFISH_CTX; const PROV_CIPHER_HW *ossl_prov_cipher_hw_blowfish_cbc(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_blowfish_ecb(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_blowfish_ofb64(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_blowfish_cfb64(size_t keybits);
./openssl/providers/implementations/ciphers/cipher_sm4.c
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for cast cipher modes ecb, cbc, ofb, cfb */ #include "cipher_sm4.h" #include "prov/implementations.h" #include "prov/providercommon.h" static OSSL_FUNC_cipher_freectx_fn sm4_freectx; static OSSL_FUNC_cipher_dupctx_fn sm4_dupctx; static void sm4_freectx(void *vctx) { PROV_SM4_CTX *ctx = (PROV_SM4_CTX *)vctx; ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } static void *sm4_dupctx(void *ctx) { PROV_SM4_CTX *in = (PROV_SM4_CTX *)ctx; PROV_SM4_CTX *ret; if (!ossl_prov_is_running()) return NULL; ret = OPENSSL_malloc(sizeof(*ret)); if (ret == NULL) return NULL; in->base.hw->copyctx(&ret->base, &in->base); return ret; } /* ossl_sm4128ecb_functions */ IMPLEMENT_generic_cipher(sm4, SM4, ecb, ECB, 0, 128, 128, 0, block) /* ossl_sm4128cbc_functions */ IMPLEMENT_generic_cipher(sm4, SM4, cbc, CBC, 0, 128, 128, 128, block) /* ossl_sm4128ctr_functions */ IMPLEMENT_generic_cipher(sm4, SM4, ctr, CTR, 0, 128, 8, 128, stream) /* ossl_sm4128ofb128_functions */ IMPLEMENT_generic_cipher(sm4, SM4, ofb128, OFB, 0, 128, 8, 128, stream) /* ossl_sm4128cfb128_functions */ IMPLEMENT_generic_cipher(sm4, SM4, cfb128, CFB, 0, 128, 8, 128, stream)
./openssl/providers/implementations/ciphers/cipher_aes_gcm.h
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/aes.h> #include "prov/ciphercommon.h" #include "prov/ciphercommon_gcm.h" #include "crypto/aes_platform.h" typedef struct prov_aes_gcm_ctx_st { PROV_GCM_CTX base; /* must be first entry in struct */ union { OSSL_UNION_ALIGN; AES_KEY ks; } ks; /* AES key schedule to use */ /* Platform specific data */ union { int dummy; #if defined(OPENSSL_CPUID_OBJ) && defined(__s390__) struct { union { OSSL_UNION_ALIGN; S390X_KMA_PARAMS kma; } param; unsigned int fc; unsigned int hsflag; /* hash subkey set flag */ unsigned char ares[16]; unsigned char mres[16]; unsigned char kres[16]; int areslen; int mreslen; int kreslen; int res; } s390x; #endif /* defined(OPENSSL_CPUID_OBJ) && defined(__s390__) */ } plat; } PROV_AES_GCM_CTX; const PROV_GCM_HW *ossl_prov_aes_hw_gcm(size_t keybits);
./openssl/providers/implementations/ciphers/cipher_aria_hw.c
/* * Copyright 2001-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/proverr.h> #include "cipher_aria.h" static int cipher_hw_aria_initkey(PROV_CIPHER_CTX *dat, const unsigned char *key, size_t keylen) { int ret, mode = dat->mode; PROV_ARIA_CTX *adat = (PROV_ARIA_CTX *)dat; ARIA_KEY *ks = &adat->ks.ks; if (dat->enc || (mode != EVP_CIPH_ECB_MODE && mode != EVP_CIPH_CBC_MODE)) ret = ossl_aria_set_encrypt_key(key, keylen * 8, ks); else ret = ossl_aria_set_decrypt_key(key, keylen * 8, ks); if (ret < 0) { ERR_raise(ERR_LIB_PROV, PROV_R_KEY_SETUP_FAILED); return 0; } dat->ks = ks; dat->block = (block128_f)ossl_aria_encrypt; return 1; } IMPLEMENT_CIPHER_HW_COPYCTX(cipher_hw_aria_copyctx, PROV_ARIA_CTX) # define PROV_CIPHER_HW_aria_mode(mode) \ static const PROV_CIPHER_HW aria_##mode = { \ cipher_hw_aria_initkey, \ ossl_cipher_hw_chunked_##mode, \ cipher_hw_aria_copyctx \ }; \ const PROV_CIPHER_HW *ossl_prov_cipher_hw_aria_##mode(size_t keybits) \ { \ return &aria_##mode; \ } PROV_CIPHER_HW_aria_mode(cbc) PROV_CIPHER_HW_aria_mode(ecb) PROV_CIPHER_HW_aria_mode(ofb128) PROV_CIPHER_HW_aria_mode(cfb128) PROV_CIPHER_HW_aria_mode(cfb1) PROV_CIPHER_HW_aria_mode(cfb8) PROV_CIPHER_HW_aria_mode(ctr)
./openssl/providers/implementations/ciphers/cipher_aria.h
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "crypto/aria.h" #include "prov/ciphercommon.h" typedef struct prov_aria_ctx_st { PROV_CIPHER_CTX base; /* Must be first */ union { OSSL_UNION_ALIGN; ARIA_KEY ks; } ks; } PROV_ARIA_CTX; #define ossl_prov_cipher_hw_aria_ofb ossl_prov_cipher_hw_aria_ofb128 #define ossl_prov_cipher_hw_aria_cfb ossl_prov_cipher_hw_aria_cfb128 const PROV_CIPHER_HW *ossl_prov_cipher_hw_aria_ecb(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_aria_cbc(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_aria_ofb128(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_aria_cfb128(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_aria_cfb1(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_aria_cfb8(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_aria_ctr(size_t keybits);
./openssl/providers/implementations/ciphers/cipher_cts.c
/* * Copyright 2020-2022 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * Helper functions for 128 bit CBC CTS ciphers (Currently AES and Camellia). * * The function dispatch tables are embedded into cipher_aes.c * and cipher_camellia.c using cipher_aes_cts.inc and cipher_camellia_cts.inc */ /* * Refer to SP800-38A-Addendum * * Ciphertext stealing encrypts plaintext using a block cipher, without padding * the message to a multiple of the block size, so the ciphertext is the same * size as the plaintext. * It does this by altering processing of the last two blocks of the message. * The processing of all but the last two blocks is unchanged, but a portion of * the second-last block's ciphertext is "stolen" to pad the last plaintext * block. The padded final block is then encrypted as usual. * The final ciphertext for the last two blocks, consists of the partial block * (with the "stolen" portion omitted) plus the full final block, * which are the same size as the original plaintext. * Decryption requires decrypting the final block first, then restoring the * stolen ciphertext to the partial block, which can then be decrypted as usual. * AES_CBC_CTS has 3 variants: * (1) CS1 The NIST variant. * If the length is a multiple of the blocksize it is the same as CBC mode. * otherwise it produces C1||C2||(C(n-1))*||Cn. * Where C(n-1)* is a partial block. * (2) CS2 * If the length is a multiple of the blocksize it is the same as CBC mode. * otherwise it produces C1||C2||Cn||(C(n-1))*. * Where C(n-1)* is a partial block. * (3) CS3 The Kerberos5 variant. * Produces C1||C2||Cn||(C(n-1))* regardless of the length. * If the length is a multiple of the blocksize it looks similar to CBC mode * with the last 2 blocks swapped. * Otherwise it is the same as CS2. */ #include <openssl/core_names.h> #include "prov/ciphercommon.h" #include "internal/nelem.h" #include "cipher_cts.h" /* The value assigned to 0 is the default */ #define CTS_CS1 0 #define CTS_CS2 1 #define CTS_CS3 2 #define CTS_BLOCK_SIZE 16 typedef union { size_t align; unsigned char c[CTS_BLOCK_SIZE]; } aligned_16bytes; typedef struct cts_mode_name2id_st { unsigned int id; const char *name; } CTS_MODE_NAME2ID; static CTS_MODE_NAME2ID cts_modes[] = { { CTS_CS1, OSSL_CIPHER_CTS_MODE_CS1 }, { CTS_CS2, OSSL_CIPHER_CTS_MODE_CS2 }, { CTS_CS3, OSSL_CIPHER_CTS_MODE_CS3 }, }; const char *ossl_cipher_cbc_cts_mode_id2name(unsigned int id) { size_t i; for (i = 0; i < OSSL_NELEM(cts_modes); ++i) { if (cts_modes[i].id == id) return cts_modes[i].name; } return NULL; } int ossl_cipher_cbc_cts_mode_name2id(const char *name) { size_t i; for (i = 0; i < OSSL_NELEM(cts_modes); ++i) { if (OPENSSL_strcasecmp(name, cts_modes[i].name) == 0) return (int)cts_modes[i].id; } return -1; } static size_t cts128_cs1_encrypt(PROV_CIPHER_CTX *ctx, const unsigned char *in, unsigned char *out, size_t len) { aligned_16bytes tmp_in; size_t residue; residue = len % CTS_BLOCK_SIZE; len -= residue; if (!ctx->hw->cipher(ctx, out, in, len)) return 0; if (residue == 0) return len; in += len; out += len; memset(tmp_in.c, 0, sizeof(tmp_in)); memcpy(tmp_in.c, in, residue); if (!ctx->hw->cipher(ctx, out - CTS_BLOCK_SIZE + residue, tmp_in.c, CTS_BLOCK_SIZE)) return 0; return len + residue; } static void do_xor(const unsigned char *in1, const unsigned char *in2, size_t len, unsigned char *out) { size_t i; for (i = 0; i < len; ++i) out[i] = in1[i] ^ in2[i]; } static size_t cts128_cs1_decrypt(PROV_CIPHER_CTX *ctx, const unsigned char *in, unsigned char *out, size_t len) { aligned_16bytes mid_iv, ct_mid, cn, pt_last; size_t residue; residue = len % CTS_BLOCK_SIZE; if (residue == 0) { /* If there are no partial blocks then it is the same as CBC mode */ if (!ctx->hw->cipher(ctx, out, in, len)) return 0; return len; } /* Process blocks at the start - but leave the last 2 blocks */ len -= CTS_BLOCK_SIZE + residue; if (len > 0) { if (!ctx->hw->cipher(ctx, out, in, len)) return 0; in += len; out += len; } /* Save the iv that will be used by the second last block */ memcpy(mid_iv.c, ctx->iv, CTS_BLOCK_SIZE); /* Save the C(n) block */ memcpy(cn.c, in + residue, CTS_BLOCK_SIZE); /* Decrypt the last block first using an iv of zero */ memset(ctx->iv, 0, CTS_BLOCK_SIZE); if (!ctx->hw->cipher(ctx, pt_last.c, in + residue, CTS_BLOCK_SIZE)) return 0; /* * Rebuild the ciphertext of the second last block as a combination of * the decrypted last block + replace the start with the ciphertext bytes * of the partial second last block. */ memcpy(ct_mid.c, in, residue); memcpy(ct_mid.c + residue, pt_last.c + residue, CTS_BLOCK_SIZE - residue); /* * Restore the last partial ciphertext block. * Now that we have the cipher text of the second last block, apply * that to the partial plaintext end block. We have already decrypted the * block using an IV of zero. For decryption the IV is just XORed after * doing an Cipher CBC block - so just XOR in the cipher text. */ do_xor(ct_mid.c, pt_last.c, residue, out + CTS_BLOCK_SIZE); /* Restore the iv needed by the second last block */ memcpy(ctx->iv, mid_iv.c, CTS_BLOCK_SIZE); /* * Decrypt the second last plaintext block now that we have rebuilt the * ciphertext. */ if (!ctx->hw->cipher(ctx, out, ct_mid.c, CTS_BLOCK_SIZE)) return 0; /* The returned iv is the C(n) block */ memcpy(ctx->iv, cn.c, CTS_BLOCK_SIZE); return len + CTS_BLOCK_SIZE + residue; } static size_t cts128_cs3_encrypt(PROV_CIPHER_CTX *ctx, const unsigned char *in, unsigned char *out, size_t len) { aligned_16bytes tmp_in; size_t residue; if (len < CTS_BLOCK_SIZE) /* CS3 requires at least one block */ return 0; /* If we only have one block then just process the aligned block */ if (len == CTS_BLOCK_SIZE) return ctx->hw->cipher(ctx, out, in, len) ? len : 0; residue = len % CTS_BLOCK_SIZE; if (residue == 0) residue = CTS_BLOCK_SIZE; len -= residue; if (!ctx->hw->cipher(ctx, out, in, len)) return 0; in += len; out += len; memset(tmp_in.c, 0, sizeof(tmp_in)); memcpy(tmp_in.c, in, residue); memcpy(out, out - CTS_BLOCK_SIZE, residue); if (!ctx->hw->cipher(ctx, out - CTS_BLOCK_SIZE, tmp_in.c, CTS_BLOCK_SIZE)) return 0; return len + residue; } /* * Note: * The cipher text (in) is of the form C(0), C(1), ., C(n), C(n-1)* where * C(n) is a full block and C(n-1)* can be a partial block * (but could be a full block). * This means that the output plaintext (out) needs to swap the plaintext of * the last two decoded ciphertext blocks. */ static size_t cts128_cs3_decrypt(PROV_CIPHER_CTX *ctx, const unsigned char *in, unsigned char *out, size_t len) { aligned_16bytes mid_iv, ct_mid, cn, pt_last; size_t residue; if (len < CTS_BLOCK_SIZE) /* CS3 requires at least one block */ return 0; /* If we only have one block then just process the aligned block */ if (len == CTS_BLOCK_SIZE) return ctx->hw->cipher(ctx, out, in, len) ? len : 0; /* Process blocks at the start - but leave the last 2 blocks */ residue = len % CTS_BLOCK_SIZE; if (residue == 0) residue = CTS_BLOCK_SIZE; len -= CTS_BLOCK_SIZE + residue; if (len > 0) { if (!ctx->hw->cipher(ctx, out, in, len)) return 0; in += len; out += len; } /* Save the iv that will be used by the second last block */ memcpy(mid_iv.c, ctx->iv, CTS_BLOCK_SIZE); /* Save the C(n) block : For CS3 it is C(1)||...||C(n-2)||C(n)||C(n-1)* */ memcpy(cn.c, in, CTS_BLOCK_SIZE); /* Decrypt the C(n) block first using an iv of zero */ memset(ctx->iv, 0, CTS_BLOCK_SIZE); if (!ctx->hw->cipher(ctx, pt_last.c, in, CTS_BLOCK_SIZE)) return 0; /* * Rebuild the ciphertext of C(n-1) as a combination of * the decrypted C(n) block + replace the start with the ciphertext bytes * of the partial last block. */ memcpy(ct_mid.c, in + CTS_BLOCK_SIZE, residue); if (residue != CTS_BLOCK_SIZE) memcpy(ct_mid.c + residue, pt_last.c + residue, CTS_BLOCK_SIZE - residue); /* * Restore the last partial ciphertext block. * Now that we have the cipher text of the second last block, apply * that to the partial plaintext end block. We have already decrypted the * block using an IV of zero. For decryption the IV is just XORed after * doing an AES block - so just XOR in the ciphertext. */ do_xor(ct_mid.c, pt_last.c, residue, out + CTS_BLOCK_SIZE); /* Restore the iv needed by the second last block */ memcpy(ctx->iv, mid_iv.c, CTS_BLOCK_SIZE); /* * Decrypt the second last plaintext block now that we have rebuilt the * ciphertext. */ if (!ctx->hw->cipher(ctx, out, ct_mid.c, CTS_BLOCK_SIZE)) return 0; /* The returned iv is the C(n) block */ memcpy(ctx->iv, cn.c, CTS_BLOCK_SIZE); return len + CTS_BLOCK_SIZE + residue; } static size_t cts128_cs2_encrypt(PROV_CIPHER_CTX *ctx, const unsigned char *in, unsigned char *out, size_t len) { if (len % CTS_BLOCK_SIZE == 0) { /* If there are no partial blocks then it is the same as CBC mode */ if (!ctx->hw->cipher(ctx, out, in, len)) return 0; return len; } /* For partial blocks CS2 is equivalent to CS3 */ return cts128_cs3_encrypt(ctx, in, out, len); } static size_t cts128_cs2_decrypt(PROV_CIPHER_CTX *ctx, const unsigned char *in, unsigned char *out, size_t len) { if (len % CTS_BLOCK_SIZE == 0) { /* If there are no partial blocks then it is the same as CBC mode */ if (!ctx->hw->cipher(ctx, out, in, len)) return 0; return len; } /* For partial blocks CS2 is equivalent to CS3 */ return cts128_cs3_decrypt(ctx, in, out, len); } int ossl_cipher_cbc_cts_block_update(void *vctx, unsigned char *out, size_t *outl, size_t outsize, const unsigned char *in, size_t inl) { PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx; size_t sz = 0; if (inl < CTS_BLOCK_SIZE) /* There must be at least one block for CTS mode */ return 0; if (outsize < inl) return 0; if (out == NULL) { *outl = inl; return 1; } /* * Return an error if the update is called multiple times, only one shot * is supported. */ if (ctx->updated == 1) return 0; if (ctx->enc) { if (ctx->cts_mode == CTS_CS1) sz = cts128_cs1_encrypt(ctx, in, out, inl); else if (ctx->cts_mode == CTS_CS2) sz = cts128_cs2_encrypt(ctx, in, out, inl); else if (ctx->cts_mode == CTS_CS3) sz = cts128_cs3_encrypt(ctx, in, out, inl); } else { if (ctx->cts_mode == CTS_CS1) sz = cts128_cs1_decrypt(ctx, in, out, inl); else if (ctx->cts_mode == CTS_CS2) sz = cts128_cs2_decrypt(ctx, in, out, inl); else if (ctx->cts_mode == CTS_CS3) sz = cts128_cs3_decrypt(ctx, in, out, inl); } if (sz == 0) return 0; ctx->updated = 1; /* Stop multiple updates being allowed */ *outl = sz; return 1; } int ossl_cipher_cbc_cts_block_final(void *vctx, unsigned char *out, size_t *outl, size_t outsize) { *outl = 0; return 1; }
./openssl/providers/implementations/ciphers/cipher_cts.h
/* * Copyright 2020-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "crypto/evp.h" /* NOTE: The underlying block cipher is CBC so we reuse most of the code */ #define IMPLEMENT_cts_cipher(alg, UCALG, lcmode, UCMODE, flags, kbits, \ blkbits, ivbits, typ) \ static OSSL_FUNC_cipher_get_params_fn alg##_##kbits##_##lcmode##_get_params; \ static int alg##_cts_##kbits##_##lcmode##_get_params(OSSL_PARAM params[]) \ { \ return ossl_cipher_generic_get_params(params, EVP_CIPH_##UCMODE##_MODE, \ flags, kbits, blkbits, ivbits); \ } \ const OSSL_DISPATCH ossl_##alg##kbits##lcmode##_cts_functions[] = { \ { OSSL_FUNC_CIPHER_NEWCTX, \ (void (*)(void)) alg##_##kbits##_##lcmode##_newctx }, \ { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void)) alg##_freectx }, \ { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void)) alg##_dupctx }, \ { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void)) alg##_cbc_cts_einit }, \ { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void)) alg##_cbc_cts_dinit }, \ { OSSL_FUNC_CIPHER_UPDATE, \ (void (*)(void)) ossl_cipher_cbc_cts_block_update }, \ { OSSL_FUNC_CIPHER_FINAL, \ (void (*)(void)) ossl_cipher_cbc_cts_block_final }, \ { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))ossl_cipher_generic_cipher }, \ { OSSL_FUNC_CIPHER_GET_PARAMS, \ (void (*)(void)) alg##_cts_##kbits##_##lcmode##_get_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_PARAMS, \ (void (*)(void))ossl_cipher_generic_gettable_params }, \ { OSSL_FUNC_CIPHER_GET_CTX_PARAMS, \ (void (*)(void)) alg##_cbc_cts_get_ctx_params }, \ { OSSL_FUNC_CIPHER_SET_CTX_PARAMS, \ (void (*)(void)) alg##_cbc_cts_set_ctx_params }, \ { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, \ (void (*)(void)) alg##_cbc_cts_gettable_ctx_params }, \ { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, \ (void (*)(void)) alg##_cbc_cts_settable_ctx_params }, \ OSSL_DISPATCH_END \ }; OSSL_FUNC_cipher_update_fn ossl_cipher_cbc_cts_block_update; OSSL_FUNC_cipher_final_fn ossl_cipher_cbc_cts_block_final; const char *ossl_cipher_cbc_cts_mode_id2name(unsigned int id); int ossl_cipher_cbc_cts_mode_name2id(const char *name);
./openssl/providers/implementations/ciphers/ciphercommon_block.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <assert.h> /* For SSL3_VERSION, TLS1_VERSION etc */ #include <openssl/prov_ssl.h> #include <openssl/rand.h> #include <openssl/proverr.h> #include "internal/constant_time.h" #include "internal/ssl3_cbc.h" #include "ciphercommon_local.h" /* * Fills a single block of buffered data from the input, and returns the amount * of data remaining in the input that is a multiple of the blocksize. The buffer * is only filled if it already has some data in it, isn't full already or we * don't have at least one block in the input. * * buf: a buffer of blocksize bytes * buflen: contains the amount of data already in buf on entry. Updated with the * amount of data in buf at the end. On entry *buflen must always be * less than the blocksize * blocksize: size of a block. Must be greater than 0 and a power of 2 * in: pointer to a pointer containing the input data * inlen: amount of input data available * * On return buf is filled with as much data as possible up to a full block, * *buflen is updated containing the amount of data in buf. *in is updated to * the new location where input data should be read from, *inlen is updated with * the remaining amount of data in *in. Returns the largest value <= *inlen * which is a multiple of the blocksize. */ size_t ossl_cipher_fillblock(unsigned char *buf, size_t *buflen, size_t blocksize, const unsigned char **in, size_t *inlen) { size_t blockmask = ~(blocksize - 1); size_t bufremain = blocksize - *buflen; assert(*buflen <= blocksize); assert(blocksize > 0 && (blocksize & (blocksize - 1)) == 0); if (*inlen < bufremain) bufremain = *inlen; memcpy(buf + *buflen, *in, bufremain); *in += bufremain; *inlen -= bufremain; *buflen += bufremain; return *inlen & blockmask; } /* * Fills the buffer with trailing data from an encryption/decryption that didn't * fit into a full block. */ int ossl_cipher_trailingdata(unsigned char *buf, size_t *buflen, size_t blocksize, const unsigned char **in, size_t *inlen) { if (*inlen == 0) return 1; if (*buflen + *inlen > blocksize) { ERR_raise(ERR_LIB_PROV, ERR_R_INTERNAL_ERROR); return 0; } memcpy(buf + *buflen, *in, *inlen); *buflen += *inlen; *inlen = 0; return 1; } /* Pad the final block for encryption */ void ossl_cipher_padblock(unsigned char *buf, size_t *buflen, size_t blocksize) { size_t i; unsigned char pad = (unsigned char)(blocksize - *buflen); for (i = *buflen; i < blocksize; i++) buf[i] = pad; } int ossl_cipher_unpadblock(unsigned char *buf, size_t *buflen, size_t blocksize) { size_t pad, i; size_t len = *buflen; if (len != blocksize) { ERR_raise(ERR_LIB_PROV, ERR_R_INTERNAL_ERROR); return 0; } /* * The following assumes that the ciphertext has been authenticated. * Otherwise it provides a padding oracle. */ pad = buf[blocksize - 1]; if (pad == 0 || pad > blocksize) { ERR_raise(ERR_LIB_PROV, PROV_R_BAD_DECRYPT); return 0; } for (i = 0; i < pad; i++) { if (buf[--len] != pad) { ERR_raise(ERR_LIB_PROV, PROV_R_BAD_DECRYPT); return 0; } } *buflen = len; return 1; } /*- * ossl_cipher_tlsunpadblock removes the CBC padding from the decrypted, TLS, CBC * record in constant time. Also removes the MAC from the record in constant * time. * * libctx: Our library context * tlsversion: The TLS version in use, e.g. SSL3_VERSION, TLS1_VERSION, etc * buf: The decrypted TLS record data * buflen: The length of the decrypted TLS record data. Updated with the new * length after the padding is removed * block_size: the block size of the cipher used to encrypt the record. * mac: Location to store the pointer to the MAC * alloced: Whether the MAC is stored in a newly allocated buffer, or whether * *mac points into *buf * macsize: the size of the MAC inside the record (or 0 if there isn't one) * aead: whether this is an aead cipher * returns: * 0: (in non-constant time) if the record is publicly invalid. * 1: (in constant time) Record is publicly valid. If padding is invalid then * the mac is random */ int ossl_cipher_tlsunpadblock(OSSL_LIB_CTX *libctx, unsigned int tlsversion, unsigned char *buf, size_t *buflen, size_t blocksize, unsigned char **mac, int *alloced, size_t macsize, int aead) { int ret; switch (tlsversion) { case SSL3_VERSION: return ssl3_cbc_remove_padding_and_mac(buflen, *buflen, buf, mac, alloced, blocksize, macsize, libctx); case TLS1_2_VERSION: case DTLS1_2_VERSION: case TLS1_1_VERSION: case DTLS1_VERSION: case DTLS1_BAD_VER: /* Remove the explicit IV */ buf += blocksize; *buflen -= blocksize; /* Fall through */ case TLS1_VERSION: ret = tls1_cbc_remove_padding_and_mac(buflen, *buflen, buf, mac, alloced, blocksize, macsize, aead, libctx); return ret; default: return 0; } }
./openssl/providers/implementations/ciphers/cipher_cast5.c
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * CAST low level APIs are deprecated for public use, but still ok for * internal use. */ #include "internal/deprecated.h" /* Dispatch functions for cast cipher modes ecb, cbc, ofb, cfb */ #include <openssl/proverr.h> #include "cipher_cast.h" #include "prov/implementations.h" #include "prov/providercommon.h" #define CAST5_FLAGS PROV_CIPHER_FLAG_VARIABLE_LENGTH static OSSL_FUNC_cipher_freectx_fn cast5_freectx; static OSSL_FUNC_cipher_dupctx_fn cast5_dupctx; static void cast5_freectx(void *vctx) { PROV_CAST_CTX *ctx = (PROV_CAST_CTX *)vctx; ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx); OPENSSL_clear_free(ctx, sizeof(*ctx)); } static void *cast5_dupctx(void *ctx) { PROV_CAST_CTX *in = (PROV_CAST_CTX *)ctx; PROV_CAST_CTX *ret; if (!ossl_prov_is_running()) return NULL; ret = OPENSSL_malloc(sizeof(*ret)); if (ret == NULL) return NULL; *ret = *in; return ret; } /* ossl_cast5128ecb_functions */ IMPLEMENT_var_keylen_cipher(cast5, CAST, ecb, ECB, CAST5_FLAGS, 128, 64, 0, block) /* ossl_cast5128cbc_functions */ IMPLEMENT_var_keylen_cipher(cast5, CAST, cbc, CBC, CAST5_FLAGS, 128, 64, 64, block) /* ossl_cast5128ofb64_functions */ IMPLEMENT_var_keylen_cipher(cast5, CAST, ofb64, OFB, CAST5_FLAGS, 128, 8, 64, stream) /* ossl_cast5128cfb64_functions */ IMPLEMENT_var_keylen_cipher(cast5, CAST, cfb64, CFB, CAST5_FLAGS, 128, 8, 64, stream)
./openssl/providers/implementations/ciphers/cipher_sm4_gcm.c
/* * Copyright 2021-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for SM4 GCM mode */ #include "cipher_sm4_gcm.h" #include "prov/implementations.h" #include "prov/providercommon.h" static OSSL_FUNC_cipher_freectx_fn sm4_gcm_freectx; static void *sm4_gcm_newctx(void *provctx, size_t keybits) { PROV_SM4_GCM_CTX *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) ossl_gcm_initctx(provctx, &ctx->base, keybits, ossl_prov_sm4_hw_gcm(keybits)); return ctx; } static void *sm4_gcm_dupctx(void *provctx) { PROV_SM4_GCM_CTX *ctx = provctx; PROV_SM4_GCM_CTX *dctx = NULL; if (ctx == NULL) return NULL; dctx = OPENSSL_memdup(ctx, sizeof(*ctx)); if (dctx != NULL && dctx->base.gcm.key != NULL) dctx->base.gcm.key = &dctx->ks.ks; return dctx; } static void sm4_gcm_freectx(void *vctx) { PROV_SM4_GCM_CTX *ctx = (PROV_SM4_GCM_CTX *)vctx; OPENSSL_clear_free(ctx, sizeof(*ctx)); } /* ossl_sm4128gcm_functions */ IMPLEMENT_aead_cipher(sm4, gcm, GCM, AEAD_FLAGS, 128, 8, 96);
./openssl/providers/implementations/ciphers/cipher_aria_gcm.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Dispatch functions for ARIA GCM mode */ #include "cipher_aria_gcm.h" #include "prov/implementations.h" #include "prov/providercommon.h" static void *aria_gcm_newctx(void *provctx, size_t keybits) { PROV_ARIA_GCM_CTX *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) ossl_gcm_initctx(provctx, &ctx->base, keybits, ossl_prov_aria_hw_gcm(keybits)); return ctx; } static void *aria_gcm_dupctx(void *provctx) { PROV_ARIA_GCM_CTX *ctx = provctx; PROV_ARIA_GCM_CTX *dctx = NULL; if (ctx == NULL) return NULL; dctx = OPENSSL_memdup(ctx, sizeof(*ctx)); if (dctx != NULL && dctx->base.gcm.key != NULL) dctx->base.gcm.key = &dctx->ks.ks; return dctx; } static OSSL_FUNC_cipher_freectx_fn aria_gcm_freectx; static void aria_gcm_freectx(void *vctx) { PROV_ARIA_GCM_CTX *ctx = (PROV_ARIA_GCM_CTX *)vctx; OPENSSL_clear_free(ctx, sizeof(*ctx)); } /* ossl_aria128gcm_functions */ IMPLEMENT_aead_cipher(aria, gcm, GCM, AEAD_FLAGS, 128, 8, 96); /* ossl_aria192gcm_functions */ IMPLEMENT_aead_cipher(aria, gcm, GCM, AEAD_FLAGS, 192, 8, 96); /* ossl_aria256gcm_functions */ IMPLEMENT_aead_cipher(aria, gcm, GCM, AEAD_FLAGS, 256, 8, 96);
./openssl/providers/implementations/ciphers/cipher_aria_ccm.h
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "crypto/aria.h" #include "prov/ciphercommon.h" #include "prov/ciphercommon_ccm.h" typedef struct prov_aria_ccm_ctx_st { PROV_CCM_CTX base; /* Must be first */ union { OSSL_UNION_ALIGN; ARIA_KEY ks; } ks; /* ARIA key schedule to use */ } PROV_ARIA_CCM_CTX; const PROV_CCM_HW *ossl_prov_aria_hw_ccm(size_t keylen);
./openssl/providers/implementations/ciphers/cipher_rc4_hmac_md5_hw.c
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* RC4_HMAC_MD5 cipher implementation */ /* * MD5 and RC4 low level APIs are deprecated for public use, but still ok for * internal use. */ #include "internal/deprecated.h" #include "cipher_rc4_hmac_md5.h" #define NO_PAYLOAD_LENGTH ((size_t)-1) #if defined(RC4_ASM) \ && defined(MD5_ASM) \ && (defined(__x86_64) \ || defined(__x86_64__) \ || defined(_M_AMD64) \ || defined(_M_X64)) # define STITCHED_CALL # define MOD 32 /* 32 is $MOD from rc4_md5-x86_64.pl */ #else # define rc4_off 0 # define md5_off 0 #endif static int cipher_hw_rc4_hmac_md5_initkey(PROV_CIPHER_CTX *bctx, const uint8_t *key, size_t keylen) { PROV_RC4_HMAC_MD5_CTX *ctx = (PROV_RC4_HMAC_MD5_CTX *)bctx; RC4_set_key(&ctx->ks.ks, keylen, key); MD5_Init(&ctx->head); /* handy when benchmarking */ ctx->tail = ctx->head; ctx->md = ctx->head; ctx->payload_length = NO_PAYLOAD_LENGTH; bctx->removetlsfixed = MD5_DIGEST_LENGTH; return 1; } static int cipher_hw_rc4_hmac_md5_cipher(PROV_CIPHER_CTX *bctx, unsigned char *out, const unsigned char *in, size_t len) { PROV_RC4_HMAC_MD5_CTX *ctx = (PROV_RC4_HMAC_MD5_CTX *)bctx; RC4_KEY *ks = &ctx->ks.ks; #if defined(STITCHED_CALL) size_t rc4_off = MOD - 1 - (ks->x & (MOD - 1)); size_t md5_off = MD5_CBLOCK - ctx->md.num, blocks; unsigned int l; #endif size_t plen = ctx->payload_length; if (plen != NO_PAYLOAD_LENGTH && len != (plen + MD5_DIGEST_LENGTH)) return 0; if (ctx->base.enc) { if (plen == NO_PAYLOAD_LENGTH) plen = len; #if defined(STITCHED_CALL) /* cipher has to "fall behind" */ if (rc4_off > md5_off) md5_off += MD5_CBLOCK; if (plen > md5_off && (blocks = (plen - md5_off) / MD5_CBLOCK) && (OPENSSL_ia32cap_P[0] & (1 << 20)) == 0) { MD5_Update(&ctx->md, in, md5_off); RC4(ks, rc4_off, in, out); rc4_md5_enc(ks, in + rc4_off, out + rc4_off, &ctx->md, in + md5_off, blocks); blocks *= MD5_CBLOCK; rc4_off += blocks; md5_off += blocks; ctx->md.Nh += blocks >> 29; ctx->md.Nl += blocks <<= 3; if (ctx->md.Nl < (unsigned int)blocks) ctx->md.Nh++; } else { rc4_off = 0; md5_off = 0; } #endif MD5_Update(&ctx->md, in + md5_off, plen - md5_off); if (plen != len) { /* "TLS" mode of operation */ if (in != out) memcpy(out + rc4_off, in + rc4_off, plen - rc4_off); /* calculate HMAC and append it to payload */ MD5_Final(out + plen, &ctx->md); ctx->md = ctx->tail; MD5_Update(&ctx->md, out + plen, MD5_DIGEST_LENGTH); MD5_Final(out + plen, &ctx->md); /* encrypt HMAC at once */ RC4(ks, len - rc4_off, out + rc4_off, out + rc4_off); } else { RC4(ks, len - rc4_off, in + rc4_off, out + rc4_off); } } else { unsigned char mac[MD5_DIGEST_LENGTH]; #if defined(STITCHED_CALL) /* digest has to "fall behind" */ if (md5_off > rc4_off) rc4_off += 2 * MD5_CBLOCK; else rc4_off += MD5_CBLOCK; if (len > rc4_off && (blocks = (len - rc4_off) / MD5_CBLOCK) && (OPENSSL_ia32cap_P[0] & (1 << 20)) == 0) { RC4(ks, rc4_off, in, out); MD5_Update(&ctx->md, out, md5_off); rc4_md5_enc(ks, in + rc4_off, out + rc4_off, &ctx->md, out + md5_off, blocks); blocks *= MD5_CBLOCK; rc4_off += blocks; md5_off += blocks; l = (ctx->md.Nl + (blocks << 3)) & 0xffffffffU; if (l < ctx->md.Nl) ctx->md.Nh++; ctx->md.Nl = l; ctx->md.Nh += blocks >> 29; } else { md5_off = 0; rc4_off = 0; } #endif /* decrypt HMAC at once */ RC4(ks, len - rc4_off, in + rc4_off, out + rc4_off); if (plen != NO_PAYLOAD_LENGTH) { /* "TLS" mode of operation */ MD5_Update(&ctx->md, out + md5_off, plen - md5_off); /* calculate HMAC and verify it */ MD5_Final(mac, &ctx->md); ctx->md = ctx->tail; MD5_Update(&ctx->md, mac, MD5_DIGEST_LENGTH); MD5_Final(mac, &ctx->md); if (CRYPTO_memcmp(out + plen, mac, MD5_DIGEST_LENGTH)) return 0; } else { MD5_Update(&ctx->md, out + md5_off, len - md5_off); } } ctx->payload_length = NO_PAYLOAD_LENGTH; return 1; } static int cipher_hw_rc4_hmac_md5_tls_init(PROV_CIPHER_CTX *bctx, unsigned char *aad, size_t aad_len) { PROV_RC4_HMAC_MD5_CTX *ctx = (PROV_RC4_HMAC_MD5_CTX *)bctx; unsigned int len; if (aad_len != EVP_AEAD_TLS1_AAD_LEN) return 0; len = aad[aad_len - 2] << 8 | aad[aad_len - 1]; if (!bctx->enc) { if (len < MD5_DIGEST_LENGTH) return 0; len -= MD5_DIGEST_LENGTH; aad[aad_len - 2] = len >> 8; aad[aad_len - 1] = len; } ctx->payload_length = len; ctx->md = ctx->head; MD5_Update(&ctx->md, aad, aad_len); return MD5_DIGEST_LENGTH; } static void cipher_hw_rc4_hmac_md5_init_mackey(PROV_CIPHER_CTX *bctx, const unsigned char *key, size_t len) { PROV_RC4_HMAC_MD5_CTX *ctx = (PROV_RC4_HMAC_MD5_CTX *)bctx; unsigned int i; unsigned char hmac_key[64]; memset(hmac_key, 0, sizeof(hmac_key)); if (len > (int)sizeof(hmac_key)) { MD5_Init(&ctx->head); MD5_Update(&ctx->head, key, len); MD5_Final(hmac_key, &ctx->head); } else { memcpy(hmac_key, key, len); } for (i = 0; i < sizeof(hmac_key); i++) hmac_key[i] ^= 0x36; /* ipad */ MD5_Init(&ctx->head); MD5_Update(&ctx->head, hmac_key, sizeof(hmac_key)); for (i = 0; i < sizeof(hmac_key); i++) hmac_key[i] ^= 0x36 ^ 0x5c; /* opad */ MD5_Init(&ctx->tail); MD5_Update(&ctx->tail, hmac_key, sizeof(hmac_key)); OPENSSL_cleanse(hmac_key, sizeof(hmac_key)); } static const PROV_CIPHER_HW_RC4_HMAC_MD5 rc4_hmac_md5_hw = { { cipher_hw_rc4_hmac_md5_initkey, cipher_hw_rc4_hmac_md5_cipher }, cipher_hw_rc4_hmac_md5_tls_init, cipher_hw_rc4_hmac_md5_init_mackey }; const PROV_CIPHER_HW *ossl_prov_cipher_hw_rc4_hmac_md5(size_t keybits) { return (PROV_CIPHER_HW *)&rc4_hmac_md5_hw; }
./openssl/providers/implementations/ciphers/cipher_chacha20_hw.c
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* chacha20 cipher implementation */ #include "cipher_chacha20.h" static int chacha20_initkey(PROV_CIPHER_CTX *bctx, const uint8_t *key, size_t keylen) { PROV_CHACHA20_CTX *ctx = (PROV_CHACHA20_CTX *)bctx; unsigned int i; if (key != NULL) { for (i = 0; i < CHACHA_KEY_SIZE; i += 4) ctx->key.d[i / 4] = CHACHA_U8TOU32(key + i); } ctx->partial_len = 0; return 1; } static int chacha20_initiv(PROV_CIPHER_CTX *bctx) { PROV_CHACHA20_CTX *ctx = (PROV_CHACHA20_CTX *)bctx; unsigned int i; if (bctx->iv_set) { for (i = 0; i < CHACHA_CTR_SIZE; i += 4) ctx->counter[i / 4] = CHACHA_U8TOU32(bctx->oiv + i); } ctx->partial_len = 0; return 1; } static int chacha20_cipher(PROV_CIPHER_CTX *bctx, unsigned char *out, const unsigned char *in, size_t inl) { PROV_CHACHA20_CTX *ctx = (PROV_CHACHA20_CTX *)bctx; unsigned int n, rem, ctr32; n = ctx->partial_len; if (n > 0) { while (inl > 0 && n < CHACHA_BLK_SIZE) { *out++ = *in++ ^ ctx->buf[n++]; inl--; } ctx->partial_len = n; if (inl == 0) return 1; if (n == CHACHA_BLK_SIZE) { ctx->partial_len = 0; ctx->counter[0]++; if (ctx->counter[0] == 0) ctx->counter[1]++; } } rem = (unsigned int)(inl % CHACHA_BLK_SIZE); inl -= rem; ctr32 = ctx->counter[0]; while (inl >= CHACHA_BLK_SIZE) { size_t blocks = inl / CHACHA_BLK_SIZE; /* * 1<<28 is just a not-so-small yet not-so-large number... * Below condition is practically never met, but it has to * be checked for code correctness. */ if (sizeof(size_t) > sizeof(unsigned int) && blocks > (1U << 28)) blocks = (1U << 28); /* * As ChaCha20_ctr32 operates on 32-bit counter, caller * has to handle overflow. 'if' below detects the * overflow, which is then handled by limiting the * amount of blocks to the exact overflow point... */ ctr32 += (unsigned int)blocks; if (ctr32 < blocks) { blocks -= ctr32; ctr32 = 0; } blocks *= CHACHA_BLK_SIZE; ChaCha20_ctr32(out, in, blocks, ctx->key.d, ctx->counter); inl -= blocks; in += blocks; out += blocks; ctx->counter[0] = ctr32; if (ctr32 == 0) ctx->counter[1]++; } if (rem > 0) { memset(ctx->buf, 0, sizeof(ctx->buf)); ChaCha20_ctr32(ctx->buf, ctx->buf, CHACHA_BLK_SIZE, ctx->key.d, ctx->counter); for (n = 0; n < rem; n++) out[n] = in[n] ^ ctx->buf[n]; ctx->partial_len = rem; } return 1; } static const PROV_CIPHER_HW_CHACHA20 chacha20_hw = { { chacha20_initkey, chacha20_cipher }, chacha20_initiv }; const PROV_CIPHER_HW *ossl_prov_cipher_hw_chacha20(size_t keybits) { return (PROV_CIPHER_HW *)&chacha20_hw; }
./openssl/providers/implementations/ciphers/cipher_aes.h
/* * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/aes.h> #include "prov/ciphercommon.h" #include "crypto/aes_platform.h" typedef struct prov_aes_ctx_st { PROV_CIPHER_CTX base; /* Must be first */ union { OSSL_UNION_ALIGN; AES_KEY ks; } ks; /* Platform specific data */ union { int dummy; #if defined(OPENSSL_CPUID_OBJ) && defined(__s390__) struct { union { OSSL_UNION_ALIGN; /*- * KM-AES parameter block - begin * (see z/Architecture Principles of Operation >= SA22-7832-06) */ struct { unsigned char k[32]; } km; /* KM-AES parameter block - end */ /*- * KMO-AES/KMF-AES parameter block - begin * (see z/Architecture Principles of Operation >= SA22-7832-08) */ struct { unsigned char cv[16]; unsigned char k[32]; } kmo_kmf; /* KMO-AES/KMF-AES parameter block - end */ } param; unsigned int fc; } s390x; #endif /* defined(OPENSSL_CPUID_OBJ) && defined(__s390__) */ } plat; } PROV_AES_CTX; #define ossl_prov_cipher_hw_aes_ofb ossl_prov_cipher_hw_aes_ofb128 #define ossl_prov_cipher_hw_aes_cfb ossl_prov_cipher_hw_aes_cfb128 const PROV_CIPHER_HW *ossl_prov_cipher_hw_aes_ecb(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_aes_cbc(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_aes_ofb128(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_aes_cfb128(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_aes_cfb1(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_aes_cfb8(size_t keybits); const PROV_CIPHER_HW *ossl_prov_cipher_hw_aes_ctr(size_t keybits);
./openssl/providers/implementations/kem/rsa_kem.c
/* * Copyright 2020-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * RSA low level APIs are deprecated for public use, but still ok for * internal use. */ #include "internal/deprecated.h" #include "internal/nelem.h" #include <openssl/crypto.h> #include <openssl/evp.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/rsa.h> #include <openssl/params.h> #include <openssl/err.h> #include "crypto/rsa.h" #include <openssl/proverr.h> #include "internal/nelem.h" #include "prov/provider_ctx.h" #include "prov/implementations.h" #include "prov/securitycheck.h" static OSSL_FUNC_kem_newctx_fn rsakem_newctx; static OSSL_FUNC_kem_encapsulate_init_fn rsakem_encapsulate_init; static OSSL_FUNC_kem_encapsulate_fn rsakem_generate; static OSSL_FUNC_kem_decapsulate_init_fn rsakem_decapsulate_init; static OSSL_FUNC_kem_decapsulate_fn rsakem_recover; static OSSL_FUNC_kem_freectx_fn rsakem_freectx; static OSSL_FUNC_kem_dupctx_fn rsakem_dupctx; static OSSL_FUNC_kem_get_ctx_params_fn rsakem_get_ctx_params; static OSSL_FUNC_kem_gettable_ctx_params_fn rsakem_gettable_ctx_params; static OSSL_FUNC_kem_set_ctx_params_fn rsakem_set_ctx_params; static OSSL_FUNC_kem_settable_ctx_params_fn rsakem_settable_ctx_params; /* * Only the KEM for RSASVE as defined in SP800-56b r2 is implemented * currently. */ #define KEM_OP_UNDEFINED -1 #define KEM_OP_RSASVE 0 /* * What's passed as an actual key is defined by the KEYMGMT interface. * We happen to know that our KEYMGMT simply passes RSA structures, so * we use that here too. */ typedef struct { OSSL_LIB_CTX *libctx; RSA *rsa; int op; } PROV_RSA_CTX; static const OSSL_ITEM rsakem_opname_id_map[] = { { KEM_OP_RSASVE, OSSL_KEM_PARAM_OPERATION_RSASVE }, }; static int name2id(const char *name, const OSSL_ITEM *map, size_t sz) { size_t i; if (name == NULL) return -1; for (i = 0; i < sz; ++i) { if (OPENSSL_strcasecmp(map[i].ptr, name) == 0) return map[i].id; } return -1; } static int rsakem_opname2id(const char *name) { return name2id(name, rsakem_opname_id_map, OSSL_NELEM(rsakem_opname_id_map)); } static void *rsakem_newctx(void *provctx) { PROV_RSA_CTX *prsactx = OPENSSL_zalloc(sizeof(PROV_RSA_CTX)); if (prsactx == NULL) return NULL; prsactx->libctx = PROV_LIBCTX_OF(provctx); prsactx->op = KEM_OP_UNDEFINED; return prsactx; } static void rsakem_freectx(void *vprsactx) { PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx; RSA_free(prsactx->rsa); OPENSSL_free(prsactx); } static void *rsakem_dupctx(void *vprsactx) { PROV_RSA_CTX *srcctx = (PROV_RSA_CTX *)vprsactx; PROV_RSA_CTX *dstctx; dstctx = OPENSSL_zalloc(sizeof(*srcctx)); if (dstctx == NULL) return NULL; *dstctx = *srcctx; if (dstctx->rsa != NULL && !RSA_up_ref(dstctx->rsa)) { OPENSSL_free(dstctx); return NULL; } return dstctx; } static int rsakem_init(void *vprsactx, void *vrsa, const OSSL_PARAM params[], int operation) { PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx; if (prsactx == NULL || vrsa == NULL) return 0; if (!ossl_rsa_check_key(prsactx->libctx, vrsa, operation)) return 0; if (!RSA_up_ref(vrsa)) return 0; RSA_free(prsactx->rsa); prsactx->rsa = vrsa; return rsakem_set_ctx_params(prsactx, params); } static int rsakem_encapsulate_init(void *vprsactx, void *vrsa, const OSSL_PARAM params[]) { return rsakem_init(vprsactx, vrsa, params, EVP_PKEY_OP_ENCAPSULATE); } static int rsakem_decapsulate_init(void *vprsactx, void *vrsa, const OSSL_PARAM params[]) { return rsakem_init(vprsactx, vrsa, params, EVP_PKEY_OP_DECAPSULATE); } static int rsakem_get_ctx_params(void *vprsactx, OSSL_PARAM *params) { PROV_RSA_CTX *ctx = (PROV_RSA_CTX *)vprsactx; return ctx != NULL; } static const OSSL_PARAM known_gettable_rsakem_ctx_params[] = { OSSL_PARAM_END }; static const OSSL_PARAM *rsakem_gettable_ctx_params(ossl_unused void *vprsactx, ossl_unused void *provctx) { return known_gettable_rsakem_ctx_params; } static int rsakem_set_ctx_params(void *vprsactx, const OSSL_PARAM params[]) { PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx; const OSSL_PARAM *p; int op; if (prsactx == NULL) return 0; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_KEM_PARAM_OPERATION); if (p != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING) return 0; op = rsakem_opname2id(p->data); if (op < 0) return 0; prsactx->op = op; } return 1; } static const OSSL_PARAM known_settable_rsakem_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_KEM_PARAM_OPERATION, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *rsakem_settable_ctx_params(ossl_unused void *vprsactx, ossl_unused void *provctx) { return known_settable_rsakem_ctx_params; } /* * NIST.SP.800-56Br2 * 7.2.1.2 RSASVE Generate Operation (RSASVE.GENERATE). * * Generate a random in the range 1 < z < (n – 1) */ static int rsasve_gen_rand_bytes(RSA *rsa_pub, unsigned char *out, int outlen) { int ret = 0; BN_CTX *bnctx; BIGNUM *z, *nminus3; bnctx = BN_CTX_secure_new_ex(ossl_rsa_get0_libctx(rsa_pub)); if (bnctx == NULL) return 0; /* * Generate a random in the range 1 < z < (n – 1). * Since BN_priv_rand_range_ex() returns a value in range 0 <= r < max * We can achieve this by adding 2.. but then we need to subtract 3 from * the upper bound i.e: 2 + (0 <= r < (n - 3)) */ BN_CTX_start(bnctx); nminus3 = BN_CTX_get(bnctx); z = BN_CTX_get(bnctx); ret = (z != NULL && (BN_copy(nminus3, RSA_get0_n(rsa_pub)) != NULL) && BN_sub_word(nminus3, 3) && BN_priv_rand_range_ex(z, nminus3, 0, bnctx) && BN_add_word(z, 2) && (BN_bn2binpad(z, out, outlen) == outlen)); BN_CTX_end(bnctx); BN_CTX_free(bnctx); return ret; } /* * NIST.SP.800-56Br2 * 7.2.1.2 RSASVE Generate Operation (RSASVE.GENERATE). */ static int rsasve_generate(PROV_RSA_CTX *prsactx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) { int ret; size_t nlen; /* Step (1): nlen = Ceil(len(n)/8) */ nlen = RSA_size(prsactx->rsa); if (out == NULL) { if (nlen == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY); return 0; } if (outlen == NULL && secretlen == NULL) return 0; if (outlen != NULL) *outlen = nlen; if (secretlen != NULL) *secretlen = nlen; return 1; } /* * Step (2): Generate a random byte string z of nlen bytes where * 1 < z < n - 1 */ if (!rsasve_gen_rand_bytes(prsactx->rsa, secret, nlen)) return 0; /* Step(3): out = RSAEP((n,e), z) */ ret = RSA_public_encrypt(nlen, secret, out, prsactx->rsa, RSA_NO_PADDING); if (ret) { ret = 1; if (outlen != NULL) *outlen = nlen; if (secretlen != NULL) *secretlen = nlen; } else { OPENSSL_cleanse(secret, nlen); } return ret; } /* * NIST.SP.800-56Br2 * 7.2.1.3 RSASVE Recovery Operation (RSASVE.RECOVER). */ static int rsasve_recover(PROV_RSA_CTX *prsactx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen) { size_t nlen; /* Step (1): get the byte length of n */ nlen = RSA_size(prsactx->rsa); if (out == NULL) { if (nlen == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY); return 0; } *outlen = nlen; return 1; } /* Step (2): check the input ciphertext 'inlen' matches the nlen */ if (inlen != nlen) { ERR_raise(ERR_LIB_PROV, PROV_R_BAD_LENGTH); return 0; } /* Step (3): out = RSADP((n,d), in) */ return (RSA_private_decrypt(inlen, in, out, prsactx->rsa, RSA_NO_PADDING) > 0); } static int rsakem_generate(void *vprsactx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) { PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx; switch (prsactx->op) { case KEM_OP_RSASVE: return rsasve_generate(prsactx, out, outlen, secret, secretlen); default: return -2; } } static int rsakem_recover(void *vprsactx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen) { PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx; switch (prsactx->op) { case KEM_OP_RSASVE: return rsasve_recover(prsactx, out, outlen, in, inlen); default: return -2; } } const OSSL_DISPATCH ossl_rsa_asym_kem_functions[] = { { OSSL_FUNC_KEM_NEWCTX, (void (*)(void))rsakem_newctx }, { OSSL_FUNC_KEM_ENCAPSULATE_INIT, (void (*)(void))rsakem_encapsulate_init }, { OSSL_FUNC_KEM_ENCAPSULATE, (void (*)(void))rsakem_generate }, { OSSL_FUNC_KEM_DECAPSULATE_INIT, (void (*)(void))rsakem_decapsulate_init }, { OSSL_FUNC_KEM_DECAPSULATE, (void (*)(void))rsakem_recover }, { OSSL_FUNC_KEM_FREECTX, (void (*)(void))rsakem_freectx }, { OSSL_FUNC_KEM_DUPCTX, (void (*)(void))rsakem_dupctx }, { OSSL_FUNC_KEM_GET_CTX_PARAMS, (void (*)(void))rsakem_get_ctx_params }, { OSSL_FUNC_KEM_GETTABLE_CTX_PARAMS, (void (*)(void))rsakem_gettable_ctx_params }, { OSSL_FUNC_KEM_SET_CTX_PARAMS, (void (*)(void))rsakem_set_ctx_params }, { OSSL_FUNC_KEM_SETTABLE_CTX_PARAMS, (void (*)(void))rsakem_settable_ctx_params }, OSSL_DISPATCH_END };
./openssl/providers/implementations/kem/kem_util.c
/* * Copyright 2022 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <string.h> /* for memcpy() */ #include <openssl/core_names.h> #include <openssl/crypto.h> #include "eckem.h" typedef struct { unsigned int id; const char *mode; } KEM_MODE; static const KEM_MODE eckem_modename_id_map[] = { { KEM_MODE_DHKEM, OSSL_KEM_PARAM_OPERATION_DHKEM }, { 0, NULL } }; int ossl_eckem_modename2id(const char *name) { size_t i; if (name == NULL) return KEM_MODE_UNDEFINED; for (i = 0; eckem_modename_id_map[i].mode != NULL; ++i) { if (OPENSSL_strcasecmp(name, eckem_modename_id_map[i].mode) == 0) return eckem_modename_id_map[i].id; } return KEM_MODE_UNDEFINED; }
./openssl/providers/implementations/kem/ec_kem.c
/* * Copyright 2022-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * The following implementation is part of RFC 9180 related to DHKEM using * EC keys (i.e. P-256, P-384 and P-521) * References to Sections in the comments below refer to RFC 9180. */ #include "internal/deprecated.h" #include <openssl/crypto.h> #include <openssl/evp.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/ec.h> #include <openssl/params.h> #include <openssl/err.h> #include <openssl/proverr.h> #include <openssl/kdf.h> #include <openssl/rand.h> #include "prov/provider_ctx.h" #include "prov/implementations.h" #include "prov/securitycheck.h" #include "prov/providercommon.h" #include <openssl/hpke.h> #include "internal/hpke_util.h" #include "crypto/ec.h" #include "prov/ecx.h" #include "eckem.h" typedef struct { EC_KEY *recipient_key; EC_KEY *sender_authkey; OSSL_LIB_CTX *libctx; char *propq; unsigned int mode; unsigned int op; unsigned char *ikm; size_t ikmlen; const char *kdfname; const OSSL_HPKE_KEM_INFO *info; } PROV_EC_CTX; static OSSL_FUNC_kem_newctx_fn eckem_newctx; static OSSL_FUNC_kem_encapsulate_init_fn eckem_encapsulate_init; static OSSL_FUNC_kem_auth_encapsulate_init_fn eckem_auth_encapsulate_init; static OSSL_FUNC_kem_encapsulate_fn eckem_encapsulate; static OSSL_FUNC_kem_decapsulate_init_fn eckem_decapsulate_init; static OSSL_FUNC_kem_auth_decapsulate_init_fn eckem_auth_decapsulate_init; static OSSL_FUNC_kem_decapsulate_fn eckem_decapsulate; static OSSL_FUNC_kem_freectx_fn eckem_freectx; static OSSL_FUNC_kem_set_ctx_params_fn eckem_set_ctx_params; static OSSL_FUNC_kem_settable_ctx_params_fn eckem_settable_ctx_params; /* ASCII: "KEM", in hex for EBCDIC compatibility */ static const char LABEL_KEM[] = "\x4b\x45\x4d"; static int eckey_check(const EC_KEY *ec, int requires_privatekey) { int rv = 0; BN_CTX *bnctx = NULL; BIGNUM *rem = NULL; const BIGNUM *priv = EC_KEY_get0_private_key(ec); const EC_POINT *pub = EC_KEY_get0_public_key(ec); /* Keys always require a public component */ if (pub == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY); return 0; } if (priv == NULL) { return (requires_privatekey == 0); } else { /* If there is a private key, check that is non zero (mod order) */ const EC_GROUP *group = EC_KEY_get0_group(ec); const BIGNUM *order = EC_GROUP_get0_order(group); bnctx = BN_CTX_new_ex(ossl_ec_key_get_libctx(ec)); rem = BN_new(); if (order != NULL && rem != NULL && bnctx != NULL) { rv = BN_mod(rem, priv, order, bnctx) && !BN_is_zero(rem); } } BN_free(rem); BN_CTX_free(bnctx); return rv; } /* Returns NULL if the curve is not supported */ static const char *ec_curvename_get0(const EC_KEY *ec) { const EC_GROUP *group = EC_KEY_get0_group(ec); return EC_curve_nid2nist(EC_GROUP_get_curve_name(group)); } /* * Set the recipient key, and free any existing key. * ec can be NULL. * The ec key may have only a private or public component * (but it must have a group). */ static int recipient_key_set(PROV_EC_CTX *ctx, EC_KEY *ec) { EC_KEY_free(ctx->recipient_key); ctx->recipient_key = NULL; if (ec != NULL) { const char *curve = ec_curvename_get0(ec); if (curve == NULL) return -2; ctx->info = ossl_HPKE_KEM_INFO_find_curve(curve); if (ctx->info == NULL) return -2; if (!EC_KEY_up_ref(ec)) return 0; ctx->recipient_key = ec; ctx->kdfname = "HKDF"; } return 1; } /* * Set the senders auth key, and free any existing auth key. * ec can be NULL. */ static int sender_authkey_set(PROV_EC_CTX *ctx, EC_KEY *ec) { EC_KEY_free(ctx->sender_authkey); ctx->sender_authkey = NULL; if (ec != NULL) { if (!EC_KEY_up_ref(ec)) return 0; ctx->sender_authkey = ec; } return 1; } /* * Serializes a encoded public key buffer into a EC public key. * Params: * in Contains the group. * pubbuf The encoded public key buffer * Returns: The created public EC key, or NULL if there is an error. */ static EC_KEY *eckey_frompub(EC_KEY *in, const unsigned char *pubbuf, size_t pubbuflen) { EC_KEY *key; key = EC_KEY_new_ex(ossl_ec_key_get_libctx(in), ossl_ec_key_get0_propq(in)); if (key == NULL) goto err; if (!EC_KEY_set_group(key, EC_KEY_get0_group(in))) goto err; if (!EC_KEY_oct2key(key, pubbuf, pubbuflen, NULL)) goto err; return key; err: EC_KEY_free(key); return NULL; } /* * Deserialises a EC public key into a encoded byte array. * Returns: 1 if successful or 0 otherwise. */ static int ecpubkey_todata(const EC_KEY *ec, unsigned char *out, size_t *outlen, size_t maxoutlen) { const EC_POINT *pub; const EC_GROUP *group; group = EC_KEY_get0_group(ec); pub = EC_KEY_get0_public_key(ec); *outlen = EC_POINT_point2oct(group, pub, POINT_CONVERSION_UNCOMPRESSED, out, maxoutlen, NULL); return *outlen != 0; } static void *eckem_newctx(void *provctx) { PROV_EC_CTX *ctx = OPENSSL_zalloc(sizeof(PROV_EC_CTX)); if (ctx == NULL) return NULL; ctx->libctx = PROV_LIBCTX_OF(provctx); return ctx; } static void eckem_freectx(void *vectx) { PROV_EC_CTX *ctx = (PROV_EC_CTX *)vectx; OPENSSL_clear_free(ctx->ikm, ctx->ikmlen); recipient_key_set(ctx, NULL); sender_authkey_set(ctx, NULL); OPENSSL_free(ctx); } static int ossl_ec_match_params(const EC_KEY *key1, const EC_KEY *key2) { int ret; BN_CTX *ctx = NULL; const EC_GROUP *group1 = EC_KEY_get0_group(key1); const EC_GROUP *group2 = EC_KEY_get0_group(key2); ctx = BN_CTX_new_ex(ossl_ec_key_get_libctx(key1)); if (ctx == NULL) return 0; ret = group1 != NULL && group2 != NULL && EC_GROUP_cmp(group1, group2, ctx) == 0; if (!ret) ERR_raise(ERR_LIB_PROV, PROV_R_MISMATCHING_DOMAIN_PARAMETERS); BN_CTX_free(ctx); return ret; } static int eckem_init(void *vctx, int operation, void *vec, void *vauth, const OSSL_PARAM params[]) { int rv; PROV_EC_CTX *ctx = (PROV_EC_CTX *)vctx; EC_KEY *ec = vec; EC_KEY *auth = vauth; if (!ossl_prov_is_running()) return 0; if (!eckey_check(ec, operation == EVP_PKEY_OP_DECAPSULATE)) return 0; rv = recipient_key_set(ctx, ec); if (rv <= 0) return rv; if (auth != NULL) { if (!ossl_ec_match_params(ec, auth) || !eckey_check(auth, operation == EVP_PKEY_OP_ENCAPSULATE) || !sender_authkey_set(ctx, auth)) return 0; } ctx->op = operation; return eckem_set_ctx_params(vctx, params); } static int eckem_encapsulate_init(void *vctx, void *vec, const OSSL_PARAM params[]) { return eckem_init(vctx, EVP_PKEY_OP_ENCAPSULATE, vec, NULL, params); } static int eckem_decapsulate_init(void *vctx, void *vec, const OSSL_PARAM params[]) { return eckem_init(vctx, EVP_PKEY_OP_DECAPSULATE, vec, NULL, params); } static int eckem_auth_encapsulate_init(void *vctx, void *vecx, void *vauthpriv, const OSSL_PARAM params[]) { return eckem_init(vctx, EVP_PKEY_OP_ENCAPSULATE, vecx, vauthpriv, params); } static int eckem_auth_decapsulate_init(void *vctx, void *vecx, void *vauthpub, const OSSL_PARAM params[]) { return eckem_init(vctx, EVP_PKEY_OP_DECAPSULATE, vecx, vauthpub, params); } static int eckem_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { PROV_EC_CTX *ctx = (PROV_EC_CTX *)vctx; const OSSL_PARAM *p; int mode; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_KEM_PARAM_IKME); if (p != NULL) { void *tmp = NULL; size_t tmplen = 0; if (p->data != NULL && p->data_size != 0) { if (!OSSL_PARAM_get_octet_string(p, &tmp, 0, &tmplen)) return 0; } OPENSSL_clear_free(ctx->ikm, ctx->ikmlen); /* Set the ephemeral seed */ ctx->ikm = tmp; ctx->ikmlen = tmplen; } p = OSSL_PARAM_locate_const(params, OSSL_KEM_PARAM_OPERATION); if (p != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING) return 0; mode = ossl_eckem_modename2id(p->data); if (mode == KEM_MODE_UNDEFINED) return 0; ctx->mode = mode; } return 1; } static const OSSL_PARAM known_settable_eckem_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_KEM_PARAM_OPERATION, NULL, 0), OSSL_PARAM_octet_string(OSSL_KEM_PARAM_IKME, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *eckem_settable_ctx_params(ossl_unused void *vctx, ossl_unused void *provctx) { return known_settable_eckem_ctx_params; } /* * See Section 4.1 DH-Based KEM (DHKEM) ExtractAndExpand */ static int dhkem_extract_and_expand(EVP_KDF_CTX *kctx, unsigned char *okm, size_t okmlen, uint16_t kemid, const unsigned char *dhkm, size_t dhkmlen, const unsigned char *kemctx, size_t kemctxlen) { uint8_t suiteid[2]; uint8_t prk[EVP_MAX_MD_SIZE]; size_t prklen = okmlen; int ret; if (prklen > sizeof(prk)) return 0; suiteid[0] = (kemid >> 8) & 0xff; suiteid[1] = kemid & 0xff; ret = ossl_hpke_labeled_extract(kctx, prk, prklen, NULL, 0, LABEL_KEM, suiteid, sizeof(suiteid), OSSL_DHKEM_LABEL_EAE_PRK, dhkm, dhkmlen) && ossl_hpke_labeled_expand(kctx, okm, okmlen, prk, prklen, LABEL_KEM, suiteid, sizeof(suiteid), OSSL_DHKEM_LABEL_SHARED_SECRET, kemctx, kemctxlen); OPENSSL_cleanse(prk, prklen); return ret; } /* * See Section 7.1.3 DeriveKeyPair. * * This function is used by ec keygen. * (For this reason it does not use any of the state stored in PROV_EC_CTX). * * Params: * ec An initialized ec key. * priv The buffer to store the generated private key into (it is assumed * this is of length alg->encodedprivlen). * ikm buffer containing the input key material (seed). This must be set. * ikmlen size of the ikm buffer in bytes * Returns: * 1 if successful or 0 otherwise. */ int ossl_ec_dhkem_derive_private(EC_KEY *ec, BIGNUM *priv, const unsigned char *ikm, size_t ikmlen) { int ret = 0; EVP_KDF_CTX *kdfctx = NULL; uint8_t suiteid[2]; unsigned char prk[OSSL_HPKE_MAX_SECRET]; unsigned char privbuf[OSSL_HPKE_MAX_PRIVATE]; const BIGNUM *order; unsigned char counter = 0; const char *curve = ec_curvename_get0(ec); const OSSL_HPKE_KEM_INFO *info; if (curve == NULL) return -2; info = ossl_HPKE_KEM_INFO_find_curve(curve); if (info == NULL) return -2; kdfctx = ossl_kdf_ctx_create("HKDF", info->mdname, ossl_ec_key_get_libctx(ec), ossl_ec_key_get0_propq(ec)); if (kdfctx == NULL) return 0; /* ikmlen should have a length of at least Nsk */ if (ikmlen < info->Nsecret) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_INPUT_LENGTH, "ikm length is :%zu, should be at least %zu", ikmlen, info->Nsecret); goto err; } suiteid[0] = info->kem_id / 256; suiteid[1] = info->kem_id % 256; if (!ossl_hpke_labeled_extract(kdfctx, prk, info->Nsecret, NULL, 0, LABEL_KEM, suiteid, sizeof(suiteid), OSSL_DHKEM_LABEL_DKP_PRK, ikm, ikmlen)) goto err; order = EC_GROUP_get0_order(EC_KEY_get0_group(ec)); do { if (!ossl_hpke_labeled_expand(kdfctx, privbuf, info->Nsk, prk, info->Nsecret, LABEL_KEM, suiteid, sizeof(suiteid), OSSL_DHKEM_LABEL_CANDIDATE, &counter, 1)) goto err; privbuf[0] &= info->bitmask; if (BN_bin2bn(privbuf, info->Nsk, priv) == NULL) goto err; if (counter == 0xFF) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GENERATE_KEY); goto err; } counter++; } while (BN_is_zero(priv) || BN_cmp(priv, order) >= 0); ret = 1; err: OPENSSL_cleanse(prk, sizeof(prk)); OPENSSL_cleanse(privbuf, sizeof(privbuf)); EVP_KDF_CTX_free(kdfctx); return ret; } /* * Do a keygen operation without having to use EVP_PKEY. * Params: * ctx Context object * ikm The seed material - if this is NULL, then a random seed is used. * Returns: * The generated EC key, or NULL on failure. */ static EC_KEY *derivekey(PROV_EC_CTX *ctx, const unsigned char *ikm, size_t ikmlen) { int ret = 0; EC_KEY *key; unsigned char *seed = (unsigned char *)ikm; size_t seedlen = ikmlen; unsigned char tmpbuf[OSSL_HPKE_MAX_PRIVATE]; key = EC_KEY_new_ex(ctx->libctx, ctx->propq); if (key == NULL) goto err; if (!EC_KEY_set_group(key, EC_KEY_get0_group(ctx->recipient_key))) goto err; /* Generate a random seed if there is no input ikm */ if (seed == NULL || seedlen == 0) { seedlen = ctx->info->Nsk; if (seedlen > sizeof(tmpbuf)) goto err; if (RAND_priv_bytes_ex(ctx->libctx, tmpbuf, seedlen, 0) <= 0) goto err; seed = tmpbuf; } ret = ossl_ec_generate_key_dhkem(key, seed, seedlen); err: if (seed != ikm) OPENSSL_cleanse(seed, seedlen); if (ret <= 0) { EC_KEY_free(key); key = NULL; } return key; } /* * Before doing a key exchange the public key of the peer needs to be checked * Note that the group check is not done here as we have already checked * that it only uses one of the approved curve names when the key was set. * * Returns 1 if the public key is valid, or 0 if it fails. */ static int check_publickey(const EC_KEY *pub) { int ret = 0; BN_CTX *bnctx = BN_CTX_new_ex(ossl_ec_key_get_libctx(pub)); if (bnctx == NULL) return 0; ret = ossl_ec_key_public_check(pub, bnctx); BN_CTX_free(bnctx); return ret; } /* * Do an ecdh key exchange. * dhkm = DH(sender, peer) * * NOTE: Instead of using EVP_PKEY_derive() API's, we use EC_KEY operations * to avoid messy conversions back to EVP_PKEY. * * Returns the size of the secret if successful, or 0 otherwise, */ static int generate_ecdhkm(const EC_KEY *sender, const EC_KEY *peer, unsigned char *out, size_t maxout, unsigned int secretsz) { const EC_GROUP *group = EC_KEY_get0_group(sender); size_t secretlen = (EC_GROUP_get_degree(group) + 7) / 8; if (secretlen != secretsz || secretlen > maxout) { ERR_raise_data(ERR_LIB_PROV, PROV_R_BAD_LENGTH, "secretsz invalid"); return 0; } if (!check_publickey(peer)) return 0; return ECDH_compute_key(out, secretlen, EC_KEY_get0_public_key(peer), sender, NULL) > 0; } /* * Derive a secret using ECDH (code is shared by the encap and decap) * * dhkm = Concat(ecdh(privkey1, peerkey1), ecdh(privkey2, peerkey2) * kemctx = Concat(sender_pub, recipient_pub, ctx->sender_authkey) * secret = dhkem_extract_and_expand(kemid, dhkm, kemctx); * * Params: * ctx Object that contains algorithm state and constants. * secret The returned secret (with a length ctx->alg->secretlen bytes). * privkey1 A private key used for ECDH key derivation. * peerkey1 A public key used for ECDH key derivation with privkey1 * privkey2 A optional private key used for a second ECDH key derivation. * It can be NULL. * peerkey2 A optional public key used for a second ECDH key derivation * with privkey2,. It can be NULL. * sender_pub The senders public key in encoded form. * recipient_pub The recipients public key in encoded form. * Notes: * The second ecdh() is only used for the HPKE auth modes when both privkey2 * and peerkey2 are non NULL (i.e. ctx->sender_authkey is not NULL). */ static int derive_secret(PROV_EC_CTX *ctx, unsigned char *secret, const EC_KEY *privkey1, const EC_KEY *peerkey1, const EC_KEY *privkey2, const EC_KEY *peerkey2, const unsigned char *sender_pub, const unsigned char *recipient_pub) { int ret = 0; EVP_KDF_CTX *kdfctx = NULL; unsigned char sender_authpub[OSSL_HPKE_MAX_PUBLIC]; unsigned char dhkm[OSSL_HPKE_MAX_PRIVATE * 2]; unsigned char kemctx[OSSL_HPKE_MAX_PUBLIC * 3]; size_t sender_authpublen; size_t kemctxlen = 0, dhkmlen = 0; const OSSL_HPKE_KEM_INFO *info = ctx->info; size_t encodedpublen = info->Npk; size_t encodedprivlen = info->Nsk; int auth = ctx->sender_authkey != NULL; if (!generate_ecdhkm(privkey1, peerkey1, dhkm, sizeof(dhkm), encodedprivlen)) goto err; dhkmlen = encodedprivlen; kemctxlen = 2 * encodedpublen; /* Concat the optional second ECDH (used for Auth) */ if (auth) { /* Get the public key of the auth sender in encoded form */ if (!ecpubkey_todata(ctx->sender_authkey, sender_authpub, &sender_authpublen, sizeof(sender_authpub))) goto err; if (sender_authpublen != encodedpublen) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_KEY, "Invalid sender auth public key"); goto err; } if (!generate_ecdhkm(privkey2, peerkey2, dhkm + dhkmlen, sizeof(dhkm) - dhkmlen, encodedprivlen)) goto err; dhkmlen += encodedprivlen; kemctxlen += encodedpublen; } if (kemctxlen > sizeof(kemctx)) goto err; /* kemctx is the concat of both sides encoded public key */ memcpy(kemctx, sender_pub, info->Npk); memcpy(kemctx + info->Npk, recipient_pub, info->Npk); if (auth) memcpy(kemctx + 2 * encodedpublen, sender_authpub, encodedpublen); kdfctx = ossl_kdf_ctx_create(ctx->kdfname, info->mdname, ctx->libctx, ctx->propq); if (kdfctx == NULL) goto err; if (!dhkem_extract_and_expand(kdfctx, secret, info->Nsecret, info->kem_id, dhkm, dhkmlen, kemctx, kemctxlen)) goto err; ret = 1; err: OPENSSL_cleanse(dhkm, dhkmlen); EVP_KDF_CTX_free(kdfctx); return ret; } /* * Do a DHKEM encapsulate operation. * * See Section 4.1 Encap() and AuthEncap() * * Params: * ctx A context object holding the recipients public key and the * optional senders auth private key. * enc A buffer to return the senders ephemeral public key. * Setting this to NULL allows the enclen and secretlen to return * values, without calculating the secret. * enclen Passes in the max size of the enc buffer and returns the * encoded public key length. * secret A buffer to return the calculated shared secret. * secretlen Passes in the max size of the secret buffer and returns the * secret length. * Returns: 1 on success or 0 otherwise. */ static int dhkem_encap(PROV_EC_CTX *ctx, unsigned char *enc, size_t *enclen, unsigned char *secret, size_t *secretlen) { int ret = 0; EC_KEY *sender_ephemkey = NULL; unsigned char sender_pub[OSSL_HPKE_MAX_PUBLIC]; unsigned char recipient_pub[OSSL_HPKE_MAX_PUBLIC]; size_t sender_publen, recipient_publen; const OSSL_HPKE_KEM_INFO *info = ctx->info; if (enc == NULL) { if (enclen == NULL && secretlen == NULL) return 0; if (enclen != NULL) *enclen = info->Nenc; if (secretlen != NULL) *secretlen = info->Nsecret; return 1; } if (*secretlen < info->Nsecret) { ERR_raise_data(ERR_LIB_PROV, PROV_R_BAD_LENGTH, "*secretlen too small"); return 0; } if (*enclen < info->Nenc) { ERR_raise_data(ERR_LIB_PROV, PROV_R_BAD_LENGTH, "*enclen too small"); return 0; } /* Create an ephemeral key */ sender_ephemkey = derivekey(ctx, ctx->ikm, ctx->ikmlen); if (sender_ephemkey == NULL) goto err; if (!ecpubkey_todata(sender_ephemkey, sender_pub, &sender_publen, sizeof(sender_pub)) || !ecpubkey_todata(ctx->recipient_key, recipient_pub, &recipient_publen, sizeof(recipient_pub))) goto err; if (sender_publen != info->Npk || recipient_publen != sender_publen) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_KEY, "Invalid public key"); goto err; } if (!derive_secret(ctx, secret, sender_ephemkey, ctx->recipient_key, ctx->sender_authkey, ctx->recipient_key, sender_pub, recipient_pub)) goto err; /* Return the senders ephemeral public key in encoded form */ memcpy(enc, sender_pub, sender_publen); *enclen = sender_publen; *secretlen = info->Nsecret; ret = 1; err: EC_KEY_free(sender_ephemkey); return ret; } /* * Do a DHKEM decapsulate operation. * See Section 4.1 Decap() and Auth Decap() * * Params: * ctx A context object holding the recipients private key and the * optional senders auth public key. * secret A buffer to return the calculated shared secret. Setting this to * NULL can be used to return the secretlen. * secretlen Passes in the max size of the secret buffer and returns the * secret length. * enc A buffer containing the senders ephemeral public key that was returned * from dhkem_encap(). * enclen The length in bytes of enc. * Returns: 1 If the shared secret is returned or 0 on error. */ static int dhkem_decap(PROV_EC_CTX *ctx, unsigned char *secret, size_t *secretlen, const unsigned char *enc, size_t enclen) { int ret = 0; EC_KEY *sender_ephempubkey = NULL; const OSSL_HPKE_KEM_INFO *info = ctx->info; unsigned char recipient_pub[OSSL_HPKE_MAX_PUBLIC]; size_t recipient_publen; size_t encodedpublen = info->Npk; if (secret == NULL) { *secretlen = info->Nsecret; return 1; } if (*secretlen < info->Nsecret) { ERR_raise_data(ERR_LIB_PROV, PROV_R_BAD_LENGTH, "*secretlen too small"); return 0; } if (enclen != encodedpublen) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_KEY, "Invalid enc public key"); return 0; } sender_ephempubkey = eckey_frompub(ctx->recipient_key, enc, enclen); if (sender_ephempubkey == NULL) goto err; if (!ecpubkey_todata(ctx->recipient_key, recipient_pub, &recipient_publen, sizeof(recipient_pub))) goto err; if (recipient_publen != encodedpublen) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_KEY, "Invalid recipient public key"); goto err; } if (!derive_secret(ctx, secret, ctx->recipient_key, sender_ephempubkey, ctx->recipient_key, ctx->sender_authkey, enc, recipient_pub)) goto err; *secretlen = info->Nsecret; ret = 1; err: EC_KEY_free(sender_ephempubkey); return ret; } static int eckem_encapsulate(void *vctx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) { PROV_EC_CTX *ctx = (PROV_EC_CTX *)vctx; switch (ctx->mode) { case KEM_MODE_DHKEM: return dhkem_encap(ctx, out, outlen, secret, secretlen); default: ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_MODE); return -2; } } static int eckem_decapsulate(void *vctx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen) { PROV_EC_CTX *ctx = (PROV_EC_CTX *)vctx; switch (ctx->mode) { case KEM_MODE_DHKEM: return dhkem_decap(ctx, out, outlen, in, inlen); default: ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_MODE); return -2; } } const OSSL_DISPATCH ossl_ec_asym_kem_functions[] = { { OSSL_FUNC_KEM_NEWCTX, (void (*)(void))eckem_newctx }, { OSSL_FUNC_KEM_ENCAPSULATE_INIT, (void (*)(void))eckem_encapsulate_init }, { OSSL_FUNC_KEM_ENCAPSULATE, (void (*)(void))eckem_encapsulate }, { OSSL_FUNC_KEM_DECAPSULATE_INIT, (void (*)(void))eckem_decapsulate_init }, { OSSL_FUNC_KEM_DECAPSULATE, (void (*)(void))eckem_decapsulate }, { OSSL_FUNC_KEM_FREECTX, (void (*)(void))eckem_freectx }, { OSSL_FUNC_KEM_SET_CTX_PARAMS, (void (*)(void))eckem_set_ctx_params }, { OSSL_FUNC_KEM_SETTABLE_CTX_PARAMS, (void (*)(void))eckem_settable_ctx_params }, { OSSL_FUNC_KEM_AUTH_ENCAPSULATE_INIT, (void (*)(void))eckem_auth_encapsulate_init }, { OSSL_FUNC_KEM_AUTH_DECAPSULATE_INIT, (void (*)(void))eckem_auth_decapsulate_init }, OSSL_DISPATCH_END };
./openssl/providers/implementations/kem/eckem.h
/* * Copyright 2022 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #define KEM_MODE_UNDEFINED 0 #define KEM_MODE_DHKEM 1 int ossl_eckem_modename2id(const char *name);
./openssl/providers/implementations/kem/ecx_kem.c
/* * Copyright 2022-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * The following implementation is part of RFC 9180 related to DHKEM using * ECX keys (i.e. X25519 and X448) * References to Sections in the comments below refer to RFC 9180. */ #include "internal/deprecated.h" #include <string.h> #include <openssl/crypto.h> #include <openssl/evp.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/params.h> #include <openssl/kdf.h> #include <openssl/err.h> #include <openssl/sha.h> #include <openssl/rand.h> #include <openssl/proverr.h> #include "prov/provider_ctx.h" #include "prov/implementations.h" #include "prov/securitycheck.h" #include "prov/providercommon.h" #include "prov/ecx.h" #include "crypto/ecx.h" #include <openssl/hpke.h> #include "internal/hpke_util.h" #include "eckem.h" #define MAX_ECX_KEYLEN X448_KEYLEN /* KEM identifiers from Section 7.1 "Table 2 KEM IDs" */ #define KEMID_X25519_HKDF_SHA256 0x20 #define KEMID_X448_HKDF_SHA512 0x21 /* ASCII: "KEM", in hex for EBCDIC compatibility */ static const char LABEL_KEM[] = "\x4b\x45\x4d"; typedef struct { ECX_KEY *recipient_key; ECX_KEY *sender_authkey; OSSL_LIB_CTX *libctx; char *propq; unsigned int mode; unsigned int op; unsigned char *ikm; size_t ikmlen; const char *kdfname; const OSSL_HPKE_KEM_INFO *info; } PROV_ECX_CTX; static OSSL_FUNC_kem_newctx_fn ecxkem_newctx; static OSSL_FUNC_kem_encapsulate_init_fn ecxkem_encapsulate_init; static OSSL_FUNC_kem_encapsulate_fn ecxkem_encapsulate; static OSSL_FUNC_kem_decapsulate_init_fn ecxkem_decapsulate_init; static OSSL_FUNC_kem_decapsulate_fn ecxkem_decapsulate; static OSSL_FUNC_kem_freectx_fn ecxkem_freectx; static OSSL_FUNC_kem_set_ctx_params_fn ecxkem_set_ctx_params; static OSSL_FUNC_kem_auth_encapsulate_init_fn ecxkem_auth_encapsulate_init; static OSSL_FUNC_kem_auth_decapsulate_init_fn ecxkem_auth_decapsulate_init; /* * Set KEM values as specified in Section 7.1 "Table 2 KEM IDs" * There is only one set of values for X25519 and X448. * Additional values could be set via set_params if required. */ static const OSSL_HPKE_KEM_INFO *get_kem_info(ECX_KEY *ecx) { const char *name = NULL; if (ecx->type == ECX_KEY_TYPE_X25519) name = SN_X25519; else name = SN_X448; return ossl_HPKE_KEM_INFO_find_curve(name); } /* * Set the recipient key, and free any existing key. * ecx can be NULL. The ecx key may have only a private or public component. */ static int recipient_key_set(PROV_ECX_CTX *ctx, ECX_KEY *ecx) { ossl_ecx_key_free(ctx->recipient_key); ctx->recipient_key = NULL; if (ecx != NULL) { ctx->info = get_kem_info(ecx); if (ctx->info == NULL) return -2; ctx->kdfname = "HKDF"; if (!ossl_ecx_key_up_ref(ecx)) return 0; ctx->recipient_key = ecx; } return 1; } /* * Set the senders auth key, and free any existing auth key. * ecx can be NULL. */ static int sender_authkey_set(PROV_ECX_CTX *ctx, ECX_KEY *ecx) { ossl_ecx_key_free(ctx->sender_authkey); ctx->sender_authkey = NULL; if (ecx != NULL) { if (!ossl_ecx_key_up_ref(ecx)) return 0; ctx->sender_authkey = ecx; } return 1; } /* * Serialize a public key from byte array's for the encoded public keys. * ctx is used to access the key type. * Returns: The created ECX_KEY or NULL on error. */ static ECX_KEY *ecxkey_pubfromdata(PROV_ECX_CTX *ctx, const unsigned char *pubbuf, size_t pubbuflen) { ECX_KEY *ecx = NULL; OSSL_PARAM params[2], *p = params; *p++ = OSSL_PARAM_construct_octet_string(OSSL_PKEY_PARAM_PUB_KEY, (char *)pubbuf, pubbuflen); *p = OSSL_PARAM_construct_end(); ecx = ossl_ecx_key_new(ctx->libctx, ctx->recipient_key->type, 1, ctx->propq); if (ecx == NULL) return NULL; if (ossl_ecx_key_fromdata(ecx, params, 0) <= 0) { ossl_ecx_key_free(ecx); ecx = NULL; } return ecx; } static unsigned char *ecx_pubkey(ECX_KEY *ecx) { if (ecx == NULL || !ecx->haspubkey) { ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY); return 0; } return ecx->pubkey; } static void *ecxkem_newctx(void *provctx) { PROV_ECX_CTX *ctx = OPENSSL_zalloc(sizeof(PROV_ECX_CTX)); if (ctx == NULL) return NULL; ctx->libctx = PROV_LIBCTX_OF(provctx); return ctx; } static void ecxkem_freectx(void *vectx) { PROV_ECX_CTX *ctx = (PROV_ECX_CTX *)vectx; OPENSSL_clear_free(ctx->ikm, ctx->ikmlen); recipient_key_set(ctx, NULL); sender_authkey_set(ctx, NULL); OPENSSL_free(ctx); } static int ecx_match_params(const ECX_KEY *key1, const ECX_KEY *key2) { return (key1->type == key2->type && key1->keylen == key2->keylen); } static int ecx_key_check(const ECX_KEY *ecx, int requires_privatekey) { if (ecx->privkey == NULL) return (requires_privatekey == 0); return 1; } static int ecxkem_init(void *vecxctx, int operation, void *vecx, void *vauth, ossl_unused const OSSL_PARAM params[]) { int rv; PROV_ECX_CTX *ctx = (PROV_ECX_CTX *)vecxctx; ECX_KEY *ecx = vecx; ECX_KEY *auth = vauth; if (!ossl_prov_is_running()) return 0; if (!ecx_key_check(ecx, operation == EVP_PKEY_OP_DECAPSULATE)) return 0; rv = recipient_key_set(ctx, ecx); if (rv <= 0) return rv; if (auth != NULL) { if (!ecx_match_params(auth, ctx->recipient_key) || !ecx_key_check(auth, operation == EVP_PKEY_OP_ENCAPSULATE) || !sender_authkey_set(ctx, auth)) return 0; } ctx->op = operation; return ecxkem_set_ctx_params(vecxctx, params); } static int ecxkem_encapsulate_init(void *vecxctx, void *vecx, const OSSL_PARAM params[]) { return ecxkem_init(vecxctx, EVP_PKEY_OP_ENCAPSULATE, vecx, NULL, params); } static int ecxkem_decapsulate_init(void *vecxctx, void *vecx, const OSSL_PARAM params[]) { return ecxkem_init(vecxctx, EVP_PKEY_OP_DECAPSULATE, vecx, NULL, params); } static int ecxkem_auth_encapsulate_init(void *vctx, void *vecx, void *vauthpriv, const OSSL_PARAM params[]) { return ecxkem_init(vctx, EVP_PKEY_OP_ENCAPSULATE, vecx, vauthpriv, params); } static int ecxkem_auth_decapsulate_init(void *vctx, void *vecx, void *vauthpub, const OSSL_PARAM params[]) { return ecxkem_init(vctx, EVP_PKEY_OP_DECAPSULATE, vecx, vauthpub, params); } static int ecxkem_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { PROV_ECX_CTX *ctx = (PROV_ECX_CTX *)vctx; const OSSL_PARAM *p; int mode; if (ctx == NULL) return 0; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_KEM_PARAM_IKME); if (p != NULL) { void *tmp = NULL; size_t tmplen = 0; if (p->data != NULL && p->data_size != 0) { if (!OSSL_PARAM_get_octet_string(p, &tmp, 0, &tmplen)) return 0; } OPENSSL_clear_free(ctx->ikm, ctx->ikmlen); ctx->ikm = tmp; ctx->ikmlen = tmplen; } p = OSSL_PARAM_locate_const(params, OSSL_KEM_PARAM_OPERATION); if (p != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING) return 0; mode = ossl_eckem_modename2id(p->data); if (mode == KEM_MODE_UNDEFINED) return 0; ctx->mode = mode; } return 1; } static const OSSL_PARAM known_settable_ecxkem_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_KEM_PARAM_OPERATION, NULL, 0), OSSL_PARAM_octet_string(OSSL_KEM_PARAM_IKME, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *ecxkem_settable_ctx_params(ossl_unused void *vctx, ossl_unused void *provctx) { return known_settable_ecxkem_ctx_params; } /* * See Section 4.1 DH-Based KEM (DHKEM) ExtractAndExpand */ static int dhkem_extract_and_expand(EVP_KDF_CTX *kctx, unsigned char *okm, size_t okmlen, uint16_t kemid, const unsigned char *dhkm, size_t dhkmlen, const unsigned char *kemctx, size_t kemctxlen) { uint8_t suiteid[2]; uint8_t prk[EVP_MAX_MD_SIZE]; size_t prklen = okmlen; /* Nh */ int ret; if (prklen > sizeof(prk)) return 0; suiteid[0] = (kemid >> 8) &0xff; suiteid[1] = kemid & 0xff; ret = ossl_hpke_labeled_extract(kctx, prk, prklen, NULL, 0, LABEL_KEM, suiteid, sizeof(suiteid), OSSL_DHKEM_LABEL_EAE_PRK, dhkm, dhkmlen) && ossl_hpke_labeled_expand(kctx, okm, okmlen, prk, prklen, LABEL_KEM, suiteid, sizeof(suiteid), OSSL_DHKEM_LABEL_SHARED_SECRET, kemctx, kemctxlen); OPENSSL_cleanse(prk, prklen); return ret; } /* * See Section 7.1.3 DeriveKeyPair. * * This function is used by ecx keygen. * (For this reason it does not use any of the state stored in PROV_ECX_CTX). * * Params: * ecx An initialized ecx key. * privout The buffer to store the generated private key into (it is assumed * this is of length ecx->keylen). * ikm buffer containing the input key material (seed). This must be non NULL. * ikmlen size of the ikm buffer in bytes * Returns: * 1 if successful or 0 otherwise. */ int ossl_ecx_dhkem_derive_private(ECX_KEY *ecx, unsigned char *privout, const unsigned char *ikm, size_t ikmlen) { int ret = 0; EVP_KDF_CTX *kdfctx = NULL; unsigned char prk[EVP_MAX_MD_SIZE]; uint8_t suiteid[2]; const OSSL_HPKE_KEM_INFO *info = get_kem_info(ecx); /* ikmlen should have a length of at least Nsk */ if (ikmlen < info->Nsk) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_INPUT_LENGTH, "ikm length is :%zu, should be at least %zu", ikmlen, info->Nsk); goto err; } kdfctx = ossl_kdf_ctx_create("HKDF", info->mdname, ecx->libctx, ecx->propq); if (kdfctx == NULL) return 0; suiteid[0] = info->kem_id / 256; suiteid[1] = info->kem_id % 256; if (!ossl_hpke_labeled_extract(kdfctx, prk, info->Nsecret, NULL, 0, LABEL_KEM, suiteid, sizeof(suiteid), OSSL_DHKEM_LABEL_DKP_PRK, ikm, ikmlen)) goto err; if (!ossl_hpke_labeled_expand(kdfctx, privout, info->Nsk, prk, info->Nsecret, LABEL_KEM, suiteid, sizeof(suiteid), OSSL_DHKEM_LABEL_SK, NULL, 0)) goto err; ret = 1; err: OPENSSL_cleanse(prk, sizeof(prk)); EVP_KDF_CTX_free(kdfctx); return ret; } /* * Do a keygen operation without having to use EVP_PKEY. * Params: * ctx Context object * ikm The seed material - if this is NULL, then a random seed is used. * Returns: * The generated ECX key, or NULL on failure. */ static ECX_KEY *derivekey(PROV_ECX_CTX *ctx, const unsigned char *ikm, size_t ikmlen) { int ok = 0; ECX_KEY *key; unsigned char *privkey; unsigned char *seed = (unsigned char *)ikm; size_t seedlen = ikmlen; unsigned char tmpbuf[OSSL_HPKE_MAX_PRIVATE]; const OSSL_HPKE_KEM_INFO *info = ctx->info; key = ossl_ecx_key_new(ctx->libctx, ctx->recipient_key->type, 0, ctx->propq); if (key == NULL) return NULL; privkey = ossl_ecx_key_allocate_privkey(key); if (privkey == NULL) goto err; /* Generate a random seed if there is no input ikm */ if (seed == NULL || seedlen == 0) { if (info->Nsk > sizeof(tmpbuf)) goto err; if (RAND_priv_bytes_ex(ctx->libctx, tmpbuf, info->Nsk, 0) <= 0) goto err; seed = tmpbuf; seedlen = info->Nsk; } if (!ossl_ecx_dhkem_derive_private(key, privkey, seed, seedlen)) goto err; if (!ossl_ecx_public_from_private(key)) goto err; key->haspubkey = 1; ok = 1; err: if (!ok) { ossl_ecx_key_free(key); key = NULL; } if (seed != ikm) OPENSSL_cleanse(seed, seedlen); return key; } /* * Do an ecxdh key exchange. * dhkm = DH(sender, peer) * * NOTE: Instead of using EVP_PKEY_derive() API's, we use ECX_KEY operations * to avoid messy conversions back to EVP_PKEY. * * Returns the size of the secret if successful, or 0 otherwise, */ static int generate_ecxdhkm(const ECX_KEY *sender, const ECX_KEY *peer, unsigned char *out, size_t maxout, unsigned int secretsz) { size_t len = 0; /* NOTE: ossl_ecx_compute_key checks for shared secret being all zeros */ return ossl_ecx_compute_key((ECX_KEY *)peer, (ECX_KEY *)sender, sender->keylen, out, &len, maxout); } /* * Derive a secret using ECXDH (code is shared by the encap and decap) * * dhkm = Concat(ecxdh(privkey1, peerkey1), ecdh(privkey2, peerkey2) * kemctx = Concat(sender_pub, recipient_pub, ctx->sender_authkey) * secret = dhkem_extract_and_expand(kemid, dhkm, kemctx); * * Params: * ctx Object that contains algorithm state and constants. * secret The returned secret (with a length ctx->alg->secretlen bytes). * privkey1 A private key used for ECXDH key derivation. * peerkey1 A public key used for ECXDH key derivation with privkey1 * privkey2 A optional private key used for a second ECXDH key derivation. * It can be NULL. * peerkey2 A optional public key used for a second ECXDH key derivation * with privkey2,. It can be NULL. * sender_pub The senders public key in encoded form. * recipient_pub The recipients public key in encoded form. * Notes: * The second ecdh() is only used for the HPKE auth modes when both privkey2 * and peerkey2 are non NULL (i.e. ctx->sender_authkey is not NULL). */ static int derive_secret(PROV_ECX_CTX *ctx, unsigned char *secret, const ECX_KEY *privkey1, const ECX_KEY *peerkey1, const ECX_KEY *privkey2, const ECX_KEY *peerkey2, const unsigned char *sender_pub, const unsigned char *recipient_pub) { int ret = 0; EVP_KDF_CTX *kdfctx = NULL; unsigned char *sender_authpub = NULL; unsigned char dhkm[MAX_ECX_KEYLEN * 2]; unsigned char kemctx[MAX_ECX_KEYLEN * 3]; size_t kemctxlen = 0, dhkmlen = 0; const OSSL_HPKE_KEM_INFO *info = ctx->info; int auth = ctx->sender_authkey != NULL; size_t encodedkeylen = info->Npk; if (!generate_ecxdhkm(privkey1, peerkey1, dhkm, sizeof(dhkm), encodedkeylen)) goto err; dhkmlen = encodedkeylen; /* Concat the optional second ECXDH (used for Auth) */ if (auth) { if (!generate_ecxdhkm(privkey2, peerkey2, dhkm + dhkmlen, sizeof(dhkm) - dhkmlen, encodedkeylen)) goto err; /* Get the public key of the auth sender in encoded form */ sender_authpub = ecx_pubkey(ctx->sender_authkey); if (sender_authpub == NULL) goto err; dhkmlen += encodedkeylen; } kemctxlen = encodedkeylen + dhkmlen; if (kemctxlen > sizeof(kemctx)) goto err; /* kemctx is the concat of both sides encoded public key */ memcpy(kemctx, sender_pub, encodedkeylen); memcpy(kemctx + encodedkeylen, recipient_pub, encodedkeylen); if (auth) memcpy(kemctx + 2 * encodedkeylen, sender_authpub, encodedkeylen); kdfctx = ossl_kdf_ctx_create(ctx->kdfname, info->mdname, ctx->libctx, ctx->propq); if (kdfctx == NULL) goto err; if (!dhkem_extract_and_expand(kdfctx, secret, info->Nsecret, info->kem_id, dhkm, dhkmlen, kemctx, kemctxlen)) goto err; ret = 1; err: OPENSSL_cleanse(dhkm, dhkmlen); EVP_KDF_CTX_free(kdfctx); return ret; } /* * Do a DHKEM encapsulate operation. * * See Section 4.1 Encap() and AuthEncap() * * Params: * ctx A context object holding the recipients public key and the * optional senders auth private key. * enc A buffer to return the senders ephemeral public key. * Setting this to NULL allows the enclen and secretlen to return * values, without calculating the secret. * enclen Passes in the max size of the enc buffer and returns the * encoded public key length. * secret A buffer to return the calculated shared secret. * secretlen Passes in the max size of the secret buffer and returns the * secret length. * Returns: 1 on success or 0 otherwise. */ static int dhkem_encap(PROV_ECX_CTX *ctx, unsigned char *enc, size_t *enclen, unsigned char *secret, size_t *secretlen) { int ret = 0; ECX_KEY *sender_ephemkey = NULL; unsigned char *sender_ephempub, *recipient_pub; const OSSL_HPKE_KEM_INFO *info = ctx->info; if (enc == NULL) { if (enclen == NULL && secretlen == NULL) return 0; if (enclen != NULL) *enclen = info->Nenc; if (secretlen != NULL) *secretlen = info->Nsecret; return 1; } if (*secretlen < info->Nsecret) { ERR_raise_data(ERR_LIB_PROV, PROV_R_BAD_LENGTH, "*secretlen too small"); return 0; } if (*enclen < info->Nenc) { ERR_raise_data(ERR_LIB_PROV, PROV_R_BAD_LENGTH, "*enclen too small"); return 0; } /* Create an ephemeral key */ sender_ephemkey = derivekey(ctx, ctx->ikm, ctx->ikmlen); sender_ephempub = ecx_pubkey(sender_ephemkey); recipient_pub = ecx_pubkey(ctx->recipient_key); if (sender_ephempub == NULL || recipient_pub == NULL) goto err; if (!derive_secret(ctx, secret, sender_ephemkey, ctx->recipient_key, ctx->sender_authkey, ctx->recipient_key, sender_ephempub, recipient_pub)) goto err; /* Return the public part of the ephemeral key */ memcpy(enc, sender_ephempub, info->Nenc); *enclen = info->Nenc; *secretlen = info->Nsecret; ret = 1; err: ossl_ecx_key_free(sender_ephemkey); return ret; } /* * Do a DHKEM decapsulate operation. * See Section 4.1 Decap() and Auth Decap() * * Params: * ctx A context object holding the recipients private key and the * optional senders auth public key. * secret A buffer to return the calculated shared secret. Setting this to * NULL can be used to return the secretlen. * secretlen Passes in the max size of the secret buffer and returns the * secret length. * enc A buffer containing the senders ephemeral public key that was returned * from dhkem_encap(). * enclen The length in bytes of enc. * Returns: 1 If the shared secret is returned or 0 on error. */ static int dhkem_decap(PROV_ECX_CTX *ctx, unsigned char *secret, size_t *secretlen, const unsigned char *enc, size_t enclen) { int ret = 0; ECX_KEY *recipient_privkey = ctx->recipient_key; ECX_KEY *sender_ephempubkey = NULL; const OSSL_HPKE_KEM_INFO *info = ctx->info; unsigned char *recipient_pub; if (secret == NULL) { *secretlen = info->Nsecret; return 1; } if (*secretlen < info->Nsecret) { ERR_raise_data(ERR_LIB_PROV, PROV_R_BAD_LENGTH, "*secretlen too small"); return 0; } if (enclen != info->Nenc) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_KEY, "Invalid enc public key"); return 0; } /* Get the public part of the ephemeral key created by encap */ sender_ephempubkey = ecxkey_pubfromdata(ctx, enc, enclen); if (sender_ephempubkey == NULL) goto err; recipient_pub = ecx_pubkey(recipient_privkey); if (recipient_pub == NULL) goto err; if (!derive_secret(ctx, secret, ctx->recipient_key, sender_ephempubkey, ctx->recipient_key, ctx->sender_authkey, enc, recipient_pub)) goto err; *secretlen = info->Nsecret; ret = 1; err: ossl_ecx_key_free(sender_ephempubkey); return ret; } static int ecxkem_encapsulate(void *vctx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) { PROV_ECX_CTX *ctx = (PROV_ECX_CTX *)vctx; switch (ctx->mode) { case KEM_MODE_DHKEM: return dhkem_encap(ctx, out, outlen, secret, secretlen); default: ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_MODE); return -2; } } static int ecxkem_decapsulate(void *vctx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen) { PROV_ECX_CTX *ctx = (PROV_ECX_CTX *)vctx; switch (ctx->mode) { case KEM_MODE_DHKEM: return dhkem_decap(vctx, out, outlen, in, inlen); default: ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_MODE); return -2; } } const OSSL_DISPATCH ossl_ecx_asym_kem_functions[] = { { OSSL_FUNC_KEM_NEWCTX, (void (*)(void))ecxkem_newctx }, { OSSL_FUNC_KEM_ENCAPSULATE_INIT, (void (*)(void))ecxkem_encapsulate_init }, { OSSL_FUNC_KEM_ENCAPSULATE, (void (*)(void))ecxkem_encapsulate }, { OSSL_FUNC_KEM_DECAPSULATE_INIT, (void (*)(void))ecxkem_decapsulate_init }, { OSSL_FUNC_KEM_DECAPSULATE, (void (*)(void))ecxkem_decapsulate }, { OSSL_FUNC_KEM_FREECTX, (void (*)(void))ecxkem_freectx }, { OSSL_FUNC_KEM_SET_CTX_PARAMS, (void (*)(void))ecxkem_set_ctx_params }, { OSSL_FUNC_KEM_SETTABLE_CTX_PARAMS, (void (*)(void))ecxkem_settable_ctx_params }, { OSSL_FUNC_KEM_AUTH_ENCAPSULATE_INIT, (void (*)(void))ecxkem_auth_encapsulate_init }, { OSSL_FUNC_KEM_AUTH_DECAPSULATE_INIT, (void (*)(void))ecxkem_auth_decapsulate_init }, OSSL_DISPATCH_END };
./openssl/providers/implementations/kdfs/scrypt.c
/* * Copyright 2017-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <stdlib.h> #include <stdarg.h> #include <string.h> #include <openssl/evp.h> #include <openssl/kdf.h> #include <openssl/err.h> #include <openssl/core_names.h> #include <openssl/proverr.h> #include "crypto/evp.h" #include "internal/numbers.h" #include "prov/implementations.h" #include "prov/provider_ctx.h" #include "prov/providercommon.h" #include "prov/provider_util.h" #ifndef OPENSSL_NO_SCRYPT static OSSL_FUNC_kdf_newctx_fn kdf_scrypt_new; static OSSL_FUNC_kdf_dupctx_fn kdf_scrypt_dup; static OSSL_FUNC_kdf_freectx_fn kdf_scrypt_free; static OSSL_FUNC_kdf_reset_fn kdf_scrypt_reset; static OSSL_FUNC_kdf_derive_fn kdf_scrypt_derive; static OSSL_FUNC_kdf_settable_ctx_params_fn kdf_scrypt_settable_ctx_params; static OSSL_FUNC_kdf_set_ctx_params_fn kdf_scrypt_set_ctx_params; static OSSL_FUNC_kdf_gettable_ctx_params_fn kdf_scrypt_gettable_ctx_params; static OSSL_FUNC_kdf_get_ctx_params_fn kdf_scrypt_get_ctx_params; static int scrypt_alg(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen, EVP_MD *sha256, OSSL_LIB_CTX *libctx, const char *propq); typedef struct { OSSL_LIB_CTX *libctx; char *propq; unsigned char *pass; size_t pass_len; unsigned char *salt; size_t salt_len; uint64_t N; uint64_t r, p; uint64_t maxmem_bytes; EVP_MD *sha256; } KDF_SCRYPT; static void kdf_scrypt_init(KDF_SCRYPT *ctx); static void *kdf_scrypt_new_inner(OSSL_LIB_CTX *libctx) { KDF_SCRYPT *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx == NULL) return NULL; ctx->libctx = libctx; kdf_scrypt_init(ctx); return ctx; } static void *kdf_scrypt_new(void *provctx) { return kdf_scrypt_new_inner(PROV_LIBCTX_OF(provctx)); } static void kdf_scrypt_free(void *vctx) { KDF_SCRYPT *ctx = (KDF_SCRYPT *)vctx; if (ctx != NULL) { OPENSSL_free(ctx->propq); EVP_MD_free(ctx->sha256); kdf_scrypt_reset(ctx); OPENSSL_free(ctx); } } static void kdf_scrypt_reset(void *vctx) { KDF_SCRYPT *ctx = (KDF_SCRYPT *)vctx; OPENSSL_free(ctx->salt); OPENSSL_clear_free(ctx->pass, ctx->pass_len); kdf_scrypt_init(ctx); } static void *kdf_scrypt_dup(void *vctx) { const KDF_SCRYPT *src = (const KDF_SCRYPT *)vctx; KDF_SCRYPT *dest; dest = kdf_scrypt_new_inner(src->libctx); if (dest != NULL) { if (src->sha256 != NULL && !EVP_MD_up_ref(src->sha256)) goto err; if (src->propq != NULL) { dest->propq = OPENSSL_strdup(src->propq); if (dest->propq == NULL) goto err; } if (!ossl_prov_memdup(src->salt, src->salt_len, &dest->salt, &dest->salt_len) || !ossl_prov_memdup(src->pass, src->pass_len, &dest->pass , &dest->pass_len)) goto err; dest->N = src->N; dest->r = src->r; dest->p = src->p; dest->maxmem_bytes = src->maxmem_bytes; dest->sha256 = src->sha256; } return dest; err: kdf_scrypt_free(dest); return NULL; } static void kdf_scrypt_init(KDF_SCRYPT *ctx) { /* Default values are the most conservative recommendation given in the * original paper of C. Percival. Derivation uses roughly 1 GiB of memory * for this parameter choice (approx. 128 * r * N * p bytes). */ ctx->N = 1 << 20; ctx->r = 8; ctx->p = 1; ctx->maxmem_bytes = 1025 * 1024 * 1024; } static int scrypt_set_membuf(unsigned char **buffer, size_t *buflen, const OSSL_PARAM *p) { OPENSSL_clear_free(*buffer, *buflen); *buffer = NULL; *buflen = 0; if (p->data_size == 0) { if ((*buffer = OPENSSL_malloc(1)) == NULL) return 0; } else if (p->data != NULL) { if (!OSSL_PARAM_get_octet_string(p, (void **)buffer, 0, buflen)) return 0; } return 1; } static int set_digest(KDF_SCRYPT *ctx) { EVP_MD_free(ctx->sha256); ctx->sha256 = EVP_MD_fetch(ctx->libctx, "sha256", ctx->propq); if (ctx->sha256 == NULL) { OPENSSL_free(ctx); ERR_raise(ERR_LIB_PROV, PROV_R_UNABLE_TO_LOAD_SHA256); return 0; } return 1; } static int set_property_query(KDF_SCRYPT *ctx, const char *propq) { OPENSSL_free(ctx->propq); ctx->propq = NULL; if (propq != NULL) { ctx->propq = OPENSSL_strdup(propq); if (ctx->propq == NULL) return 0; } return 1; } static int kdf_scrypt_derive(void *vctx, unsigned char *key, size_t keylen, const OSSL_PARAM params[]) { KDF_SCRYPT *ctx = (KDF_SCRYPT *)vctx; if (!ossl_prov_is_running() || !kdf_scrypt_set_ctx_params(ctx, params)) return 0; if (ctx->pass == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_PASS); return 0; } if (ctx->salt == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_SALT); return 0; } if (ctx->sha256 == NULL && !set_digest(ctx)) return 0; return scrypt_alg((char *)ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, ctx->N, ctx->r, ctx->p, ctx->maxmem_bytes, key, keylen, ctx->sha256, ctx->libctx, ctx->propq); } static int is_power_of_two(uint64_t value) { return (value != 0) && ((value & (value - 1)) == 0); } static int kdf_scrypt_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { const OSSL_PARAM *p; KDF_SCRYPT *ctx = vctx; uint64_t u64_value; if (params == NULL) return 1; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_PASSWORD)) != NULL) if (!scrypt_set_membuf(&ctx->pass, &ctx->pass_len, p)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_SALT)) != NULL) if (!scrypt_set_membuf(&ctx->salt, &ctx->salt_len, p)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_SCRYPT_N)) != NULL) { if (!OSSL_PARAM_get_uint64(p, &u64_value) || u64_value <= 1 || !is_power_of_two(u64_value)) return 0; ctx->N = u64_value; } if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_SCRYPT_R)) != NULL) { if (!OSSL_PARAM_get_uint64(p, &u64_value) || u64_value < 1) return 0; ctx->r = u64_value; } if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_SCRYPT_P)) != NULL) { if (!OSSL_PARAM_get_uint64(p, &u64_value) || u64_value < 1) return 0; ctx->p = u64_value; } if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_SCRYPT_MAXMEM)) != NULL) { if (!OSSL_PARAM_get_uint64(p, &u64_value) || u64_value < 1) return 0; ctx->maxmem_bytes = u64_value; } p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_PROPERTIES); if (p != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING || !set_property_query(ctx, p->data) || !set_digest(ctx)) return 0; } return 1; } static const OSSL_PARAM *kdf_scrypt_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *p_ctx) { static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_octet_string(OSSL_KDF_PARAM_PASSWORD, NULL, 0), OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0), OSSL_PARAM_uint64(OSSL_KDF_PARAM_SCRYPT_N, NULL), OSSL_PARAM_uint32(OSSL_KDF_PARAM_SCRYPT_R, NULL), OSSL_PARAM_uint32(OSSL_KDF_PARAM_SCRYPT_P, NULL), OSSL_PARAM_uint64(OSSL_KDF_PARAM_SCRYPT_MAXMEM, NULL), OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_END }; return known_settable_ctx_params; } static int kdf_scrypt_get_ctx_params(void *vctx, OSSL_PARAM params[]) { OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_KDF_PARAM_SIZE)) != NULL) return OSSL_PARAM_set_size_t(p, SIZE_MAX); return -2; } static const OSSL_PARAM *kdf_scrypt_gettable_ctx_params(ossl_unused void *ctx, ossl_unused void *p_ctx) { static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL), OSSL_PARAM_END }; return known_gettable_ctx_params; } const OSSL_DISPATCH ossl_kdf_scrypt_functions[] = { { OSSL_FUNC_KDF_NEWCTX, (void(*)(void))kdf_scrypt_new }, { OSSL_FUNC_KDF_DUPCTX, (void(*)(void))kdf_scrypt_dup }, { OSSL_FUNC_KDF_FREECTX, (void(*)(void))kdf_scrypt_free }, { OSSL_FUNC_KDF_RESET, (void(*)(void))kdf_scrypt_reset }, { OSSL_FUNC_KDF_DERIVE, (void(*)(void))kdf_scrypt_derive }, { OSSL_FUNC_KDF_SETTABLE_CTX_PARAMS, (void(*)(void))kdf_scrypt_settable_ctx_params }, { OSSL_FUNC_KDF_SET_CTX_PARAMS, (void(*)(void))kdf_scrypt_set_ctx_params }, { OSSL_FUNC_KDF_GETTABLE_CTX_PARAMS, (void(*)(void))kdf_scrypt_gettable_ctx_params }, { OSSL_FUNC_KDF_GET_CTX_PARAMS, (void(*)(void))kdf_scrypt_get_ctx_params }, OSSL_DISPATCH_END }; #define R(a,b) (((a) << (b)) | ((a) >> (32 - (b)))) static void salsa208_word_specification(uint32_t inout[16]) { int i; uint32_t x[16]; memcpy(x, inout, sizeof(x)); for (i = 8; i > 0; i -= 2) { x[4] ^= R(x[0] + x[12], 7); x[8] ^= R(x[4] + x[0], 9); x[12] ^= R(x[8] + x[4], 13); x[0] ^= R(x[12] + x[8], 18); x[9] ^= R(x[5] + x[1], 7); x[13] ^= R(x[9] + x[5], 9); x[1] ^= R(x[13] + x[9], 13); x[5] ^= R(x[1] + x[13], 18); x[14] ^= R(x[10] + x[6], 7); x[2] ^= R(x[14] + x[10], 9); x[6] ^= R(x[2] + x[14], 13); x[10] ^= R(x[6] + x[2], 18); x[3] ^= R(x[15] + x[11], 7); x[7] ^= R(x[3] + x[15], 9); x[11] ^= R(x[7] + x[3], 13); x[15] ^= R(x[11] + x[7], 18); x[1] ^= R(x[0] + x[3], 7); x[2] ^= R(x[1] + x[0], 9); x[3] ^= R(x[2] + x[1], 13); x[0] ^= R(x[3] + x[2], 18); x[6] ^= R(x[5] + x[4], 7); x[7] ^= R(x[6] + x[5], 9); x[4] ^= R(x[7] + x[6], 13); x[5] ^= R(x[4] + x[7], 18); x[11] ^= R(x[10] + x[9], 7); x[8] ^= R(x[11] + x[10], 9); x[9] ^= R(x[8] + x[11], 13); x[10] ^= R(x[9] + x[8], 18); x[12] ^= R(x[15] + x[14], 7); x[13] ^= R(x[12] + x[15], 9); x[14] ^= R(x[13] + x[12], 13); x[15] ^= R(x[14] + x[13], 18); } for (i = 0; i < 16; ++i) inout[i] += x[i]; OPENSSL_cleanse(x, sizeof(x)); } static void scryptBlockMix(uint32_t *B_, uint32_t *B, uint64_t r) { uint64_t i, j; uint32_t X[16], *pB; memcpy(X, B + (r * 2 - 1) * 16, sizeof(X)); pB = B; for (i = 0; i < r * 2; i++) { for (j = 0; j < 16; j++) X[j] ^= *pB++; salsa208_word_specification(X); memcpy(B_ + (i / 2 + (i & 1) * r) * 16, X, sizeof(X)); } OPENSSL_cleanse(X, sizeof(X)); } static void scryptROMix(unsigned char *B, uint64_t r, uint64_t N, uint32_t *X, uint32_t *T, uint32_t *V) { unsigned char *pB; uint32_t *pV; uint64_t i, k; /* Convert from little endian input */ for (pV = V, i = 0, pB = B; i < 32 * r; i++, pV++) { *pV = *pB++; *pV |= *pB++ << 8; *pV |= *pB++ << 16; *pV |= (uint32_t)*pB++ << 24; } for (i = 1; i < N; i++, pV += 32 * r) scryptBlockMix(pV, pV - 32 * r, r); scryptBlockMix(X, V + (N - 1) * 32 * r, r); for (i = 0; i < N; i++) { uint32_t j; j = X[16 * (2 * r - 1)] % N; pV = V + 32 * r * j; for (k = 0; k < 32 * r; k++) T[k] = X[k] ^ *pV++; scryptBlockMix(X, T, r); } /* Convert output to little endian */ for (i = 0, pB = B; i < 32 * r; i++) { uint32_t xtmp = X[i]; *pB++ = xtmp & 0xff; *pB++ = (xtmp >> 8) & 0xff; *pB++ = (xtmp >> 16) & 0xff; *pB++ = (xtmp >> 24) & 0xff; } } #ifndef SIZE_MAX # define SIZE_MAX ((size_t)-1) #endif /* * Maximum power of two that will fit in uint64_t: this should work on * most (all?) platforms. */ #define LOG2_UINT64_MAX (sizeof(uint64_t) * 8 - 1) /* * Maximum value of p * r: * p <= ((2^32-1) * hLen) / MFLen => * p <= ((2^32-1) * 32) / (128 * r) => * p * r <= (2^30-1) */ #define SCRYPT_PR_MAX ((1 << 30) - 1) static int scrypt_alg(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen, EVP_MD *sha256, OSSL_LIB_CTX *libctx, const char *propq) { int rv = 0; unsigned char *B; uint32_t *X, *V, *T; uint64_t i, Blen, Vlen; /* Sanity check parameters */ /* initial check, r,p must be non zero, N >= 2 and a power of 2 */ if (r == 0 || p == 0 || N < 2 || (N & (N - 1))) return 0; /* Check p * r < SCRYPT_PR_MAX avoiding overflow */ if (p > SCRYPT_PR_MAX / r) { ERR_raise(ERR_LIB_EVP, EVP_R_MEMORY_LIMIT_EXCEEDED); return 0; } /* * Need to check N: if 2^(128 * r / 8) overflows limit this is * automatically satisfied since N <= UINT64_MAX. */ if (16 * r <= LOG2_UINT64_MAX) { if (N >= (((uint64_t)1) << (16 * r))) { ERR_raise(ERR_LIB_EVP, EVP_R_MEMORY_LIMIT_EXCEEDED); return 0; } } /* Memory checks: check total allocated buffer size fits in uint64_t */ /* * B size in section 5 step 1.S * Note: we know p * 128 * r < UINT64_MAX because we already checked * p * r < SCRYPT_PR_MAX */ Blen = p * 128 * r; /* * Yet we pass it as integer to PKCS5_PBKDF2_HMAC... [This would * have to be revised when/if PKCS5_PBKDF2_HMAC accepts size_t.] */ if (Blen > INT_MAX) { ERR_raise(ERR_LIB_EVP, EVP_R_MEMORY_LIMIT_EXCEEDED); return 0; } /* * Check 32 * r * (N + 2) * sizeof(uint32_t) fits in uint64_t * This is combined size V, X and T (section 4) */ i = UINT64_MAX / (32 * sizeof(uint32_t)); if (N + 2 > i / r) { ERR_raise(ERR_LIB_EVP, EVP_R_MEMORY_LIMIT_EXCEEDED); return 0; } Vlen = 32 * r * (N + 2) * sizeof(uint32_t); /* check total allocated size fits in uint64_t */ if (Blen > UINT64_MAX - Vlen) { ERR_raise(ERR_LIB_EVP, EVP_R_MEMORY_LIMIT_EXCEEDED); return 0; } /* Check that the maximum memory doesn't exceed a size_t limits */ if (maxmem > SIZE_MAX) maxmem = SIZE_MAX; if (Blen + Vlen > maxmem) { ERR_raise(ERR_LIB_EVP, EVP_R_MEMORY_LIMIT_EXCEEDED); return 0; } /* If no key return to indicate parameters are OK */ if (key == NULL) return 1; B = OPENSSL_malloc((size_t)(Blen + Vlen)); if (B == NULL) return 0; X = (uint32_t *)(B + Blen); T = X + 32 * r; V = T + 32 * r; if (ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, 1, sha256, (int)Blen, B, libctx, propq) == 0) goto err; for (i = 0; i < p; i++) scryptROMix(B + 128 * r * i, r, N, X, T, V); if (ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, B, (int)Blen, 1, sha256, keylen, key, libctx, propq) == 0) goto err; rv = 1; err: if (rv == 0) ERR_raise(ERR_LIB_EVP, EVP_R_PBKDF2_ERROR); OPENSSL_clear_free(B, (size_t)(Blen + Vlen)); return rv; } #endif
./openssl/providers/implementations/kdfs/pbkdf1.c
/* * Copyright 1999-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/trace.h> #include <stdlib.h> #include <stdarg.h> #include <string.h> #include <openssl/evp.h> #include <openssl/kdf.h> #include <openssl/core_names.h> #include <openssl/proverr.h> #include "internal/cryptlib.h" #include "internal/numbers.h" #include "crypto/evp.h" #include "prov/provider_ctx.h" #include "prov/providercommon.h" #include "prov/implementations.h" #include "prov/provider_util.h" static OSSL_FUNC_kdf_newctx_fn kdf_pbkdf1_new; static OSSL_FUNC_kdf_dupctx_fn kdf_pbkdf1_dup; static OSSL_FUNC_kdf_freectx_fn kdf_pbkdf1_free; static OSSL_FUNC_kdf_reset_fn kdf_pbkdf1_reset; static OSSL_FUNC_kdf_derive_fn kdf_pbkdf1_derive; static OSSL_FUNC_kdf_settable_ctx_params_fn kdf_pbkdf1_settable_ctx_params; static OSSL_FUNC_kdf_set_ctx_params_fn kdf_pbkdf1_set_ctx_params; static OSSL_FUNC_kdf_gettable_ctx_params_fn kdf_pbkdf1_gettable_ctx_params; static OSSL_FUNC_kdf_get_ctx_params_fn kdf_pbkdf1_get_ctx_params; typedef struct { void *provctx; PROV_DIGEST digest; unsigned char *pass; size_t pass_len; unsigned char *salt; size_t salt_len; uint64_t iter; } KDF_PBKDF1; /* * PKCS5 PBKDF1 compatible key/IV generation as specified in: * https://tools.ietf.org/html/rfc8018#page-10 */ static int kdf_pbkdf1_do_derive(const unsigned char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t iter, const EVP_MD *md_type, unsigned char *out, size_t n) { uint64_t i; int mdsize, ret = 0; unsigned char md_tmp[EVP_MAX_MD_SIZE]; EVP_MD_CTX *ctx = NULL; ctx = EVP_MD_CTX_new(); if (ctx == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_EVP_LIB); goto err; } if (!EVP_DigestInit_ex(ctx, md_type, NULL) || !EVP_DigestUpdate(ctx, pass, passlen) || !EVP_DigestUpdate(ctx, salt, saltlen) || !EVP_DigestFinal_ex(ctx, md_tmp, NULL)) goto err; mdsize = EVP_MD_size(md_type); if (mdsize < 0) goto err; if (n > (size_t)mdsize) { ERR_raise(ERR_LIB_PROV, PROV_R_LENGTH_TOO_LARGE); goto err; } for (i = 1; i < iter; i++) { if (!EVP_DigestInit_ex(ctx, md_type, NULL)) goto err; if (!EVP_DigestUpdate(ctx, md_tmp, mdsize)) goto err; if (!EVP_DigestFinal_ex(ctx, md_tmp, NULL)) goto err; } memcpy(out, md_tmp, n); ret = 1; err: OPENSSL_cleanse(md_tmp, EVP_MAX_MD_SIZE); EVP_MD_CTX_free(ctx); return ret; } static void *kdf_pbkdf1_new(void *provctx) { KDF_PBKDF1 *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx == NULL) return NULL; ctx->provctx = provctx; return ctx; } static void kdf_pbkdf1_cleanup(KDF_PBKDF1 *ctx) { ossl_prov_digest_reset(&ctx->digest); OPENSSL_free(ctx->salt); OPENSSL_clear_free(ctx->pass, ctx->pass_len); memset(ctx, 0, sizeof(*ctx)); } static void kdf_pbkdf1_free(void *vctx) { KDF_PBKDF1 *ctx = (KDF_PBKDF1 *)vctx; if (ctx != NULL) { kdf_pbkdf1_cleanup(ctx); OPENSSL_free(ctx); } } static void kdf_pbkdf1_reset(void *vctx) { KDF_PBKDF1 *ctx = (KDF_PBKDF1 *)vctx; void *provctx = ctx->provctx; kdf_pbkdf1_cleanup(ctx); ctx->provctx = provctx; } static void *kdf_pbkdf1_dup(void *vctx) { const KDF_PBKDF1 *src = (const KDF_PBKDF1 *)vctx; KDF_PBKDF1 *dest; dest = kdf_pbkdf1_new(src->provctx); if (dest != NULL) { if (!ossl_prov_memdup(src->salt, src->salt_len, &dest->salt, &dest->salt_len) || !ossl_prov_memdup(src->pass, src->pass_len, &dest->pass , &dest->pass_len) || !ossl_prov_digest_copy(&dest->digest, &src->digest)) goto err; dest->iter = src->iter; } return dest; err: kdf_pbkdf1_free(dest); return NULL; } static int kdf_pbkdf1_set_membuf(unsigned char **buffer, size_t *buflen, const OSSL_PARAM *p) { OPENSSL_clear_free(*buffer, *buflen); *buffer = NULL; *buflen = 0; if (p->data_size == 0) { if ((*buffer = OPENSSL_malloc(1)) == NULL) return 0; } else if (p->data != NULL) { if (!OSSL_PARAM_get_octet_string(p, (void **)buffer, 0, buflen)) return 0; } return 1; } static int kdf_pbkdf1_derive(void *vctx, unsigned char *key, size_t keylen, const OSSL_PARAM params[]) { KDF_PBKDF1 *ctx = (KDF_PBKDF1 *)vctx; const EVP_MD *md; if (!ossl_prov_is_running() || !kdf_pbkdf1_set_ctx_params(ctx, params)) return 0; if (ctx->pass == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_PASS); return 0; } if (ctx->salt == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_SALT); return 0; } md = ossl_prov_digest_md(&ctx->digest); return kdf_pbkdf1_do_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, ctx->iter, md, key, keylen); } static int kdf_pbkdf1_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { const OSSL_PARAM *p; KDF_PBKDF1 *ctx = vctx; OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(ctx->provctx); if (!ossl_prov_digest_load_from_params(&ctx->digest, params, libctx)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_PASSWORD)) != NULL) if (!kdf_pbkdf1_set_membuf(&ctx->pass, &ctx->pass_len, p)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_SALT)) != NULL) if (!kdf_pbkdf1_set_membuf(&ctx->salt, &ctx->salt_len, p)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_ITER)) != NULL) if (!OSSL_PARAM_get_uint64(p, &ctx->iter)) return 0; return 1; } static const OSSL_PARAM *kdf_pbkdf1_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *p_ctx) { static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0), OSSL_PARAM_octet_string(OSSL_KDF_PARAM_PASSWORD, NULL, 0), OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0), OSSL_PARAM_uint64(OSSL_KDF_PARAM_ITER, NULL), OSSL_PARAM_END }; return known_settable_ctx_params; } static int kdf_pbkdf1_get_ctx_params(void *vctx, OSSL_PARAM params[]) { OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_KDF_PARAM_SIZE)) != NULL) return OSSL_PARAM_set_size_t(p, SIZE_MAX); return -2; } static const OSSL_PARAM *kdf_pbkdf1_gettable_ctx_params(ossl_unused void *ctx, ossl_unused void *p_ctx) { static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL), OSSL_PARAM_END }; return known_gettable_ctx_params; } const OSSL_DISPATCH ossl_kdf_pbkdf1_functions[] = { { OSSL_FUNC_KDF_NEWCTX, (void(*)(void))kdf_pbkdf1_new }, { OSSL_FUNC_KDF_DUPCTX, (void(*)(void))kdf_pbkdf1_dup }, { OSSL_FUNC_KDF_FREECTX, (void(*)(void))kdf_pbkdf1_free }, { OSSL_FUNC_KDF_RESET, (void(*)(void))kdf_pbkdf1_reset }, { OSSL_FUNC_KDF_DERIVE, (void(*)(void))kdf_pbkdf1_derive }, { OSSL_FUNC_KDF_SETTABLE_CTX_PARAMS, (void(*)(void))kdf_pbkdf1_settable_ctx_params }, { OSSL_FUNC_KDF_SET_CTX_PARAMS, (void(*)(void))kdf_pbkdf1_set_ctx_params }, { OSSL_FUNC_KDF_GETTABLE_CTX_PARAMS, (void(*)(void))kdf_pbkdf1_gettable_ctx_params }, { OSSL_FUNC_KDF_GET_CTX_PARAMS, (void(*)(void))kdf_pbkdf1_get_ctx_params }, OSSL_DISPATCH_END };
./openssl/providers/implementations/kdfs/kbkdf.c
/* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * Copyright 2019 Red Hat, Inc. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * This implements https://csrc.nist.gov/publications/detail/sp/800-108/final * section 5.1 ("counter mode") and section 5.2 ("feedback mode") in both HMAC * and CMAC. That document does not name the KDFs it defines; the name is * derived from * https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Key-Derivation * * Note that section 5.3 ("double-pipeline mode") is not implemented, though * it would be possible to do so in the future. * * These versions all assume the counter is used. It would be relatively * straightforward to expose a configuration handle should the need arise. * * Variable names attempt to match those of SP800-108. */ #include <stdarg.h> #include <stdlib.h> #include <string.h> #include <openssl/core_names.h> #include <openssl/evp.h> #include <openssl/hmac.h> #include <openssl/kdf.h> #include <openssl/params.h> #include <openssl/proverr.h> #include "internal/cryptlib.h" #include "crypto/evp.h" #include "internal/numbers.h" #include "internal/endian.h" #include "prov/implementations.h" #include "prov/provider_ctx.h" #include "prov/provider_util.h" #include "prov/providercommon.h" #include "internal/e_os.h" #include "internal/params.h" #define ossl_min(a, b) ((a) < (b)) ? (a) : (b) typedef enum { COUNTER = 0, FEEDBACK } kbkdf_mode; /* Our context structure. */ typedef struct { void *provctx; kbkdf_mode mode; EVP_MAC_CTX *ctx_init; /* Names are lowercased versions of those found in SP800-108. */ int r; unsigned char *ki; size_t ki_len; unsigned char *label; size_t label_len; unsigned char *context; size_t context_len; unsigned char *iv; size_t iv_len; int use_l; int is_kmac; int use_separator; } KBKDF; /* Definitions needed for typechecking. */ static OSSL_FUNC_kdf_newctx_fn kbkdf_new; static OSSL_FUNC_kdf_dupctx_fn kbkdf_dup; static OSSL_FUNC_kdf_freectx_fn kbkdf_free; static OSSL_FUNC_kdf_reset_fn kbkdf_reset; static OSSL_FUNC_kdf_derive_fn kbkdf_derive; static OSSL_FUNC_kdf_settable_ctx_params_fn kbkdf_settable_ctx_params; static OSSL_FUNC_kdf_set_ctx_params_fn kbkdf_set_ctx_params; static OSSL_FUNC_kdf_gettable_ctx_params_fn kbkdf_gettable_ctx_params; static OSSL_FUNC_kdf_get_ctx_params_fn kbkdf_get_ctx_params; /* Not all platforms have htobe32(). */ static uint32_t be32(uint32_t host) { uint32_t big = 0; DECLARE_IS_ENDIAN; if (!IS_LITTLE_ENDIAN) return host; big |= (host & 0xff000000) >> 24; big |= (host & 0x00ff0000) >> 8; big |= (host & 0x0000ff00) << 8; big |= (host & 0x000000ff) << 24; return big; } static void init(KBKDF *ctx) { ctx->r = 32; ctx->use_l = 1; ctx->use_separator = 1; ctx->is_kmac = 0; } static void *kbkdf_new(void *provctx) { KBKDF *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx == NULL) return NULL; ctx->provctx = provctx; init(ctx); return ctx; } static void kbkdf_free(void *vctx) { KBKDF *ctx = (KBKDF *)vctx; if (ctx != NULL) { kbkdf_reset(ctx); OPENSSL_free(ctx); } } static void kbkdf_reset(void *vctx) { KBKDF *ctx = (KBKDF *)vctx; void *provctx = ctx->provctx; EVP_MAC_CTX_free(ctx->ctx_init); OPENSSL_clear_free(ctx->context, ctx->context_len); OPENSSL_clear_free(ctx->label, ctx->label_len); OPENSSL_clear_free(ctx->ki, ctx->ki_len); OPENSSL_clear_free(ctx->iv, ctx->iv_len); memset(ctx, 0, sizeof(*ctx)); ctx->provctx = provctx; init(ctx); } static void *kbkdf_dup(void *vctx) { const KBKDF *src = (const KBKDF *)vctx; KBKDF *dest; dest = kbkdf_new(src->provctx); if (dest != NULL) { dest->ctx_init = EVP_MAC_CTX_dup(src->ctx_init); if (dest->ctx_init == NULL || !ossl_prov_memdup(src->ki, src->ki_len, &dest->ki, &dest->ki_len) || !ossl_prov_memdup(src->label, src->label_len, &dest->label, &dest->label_len) || !ossl_prov_memdup(src->context, src->context_len, &dest->context, &dest->context_len) || !ossl_prov_memdup(src->iv, src->iv_len, &dest->iv, &dest->iv_len)) goto err; dest->mode = src->mode; dest->r = src->r; dest->use_l = src->use_l; dest->use_separator = src->use_separator; dest->is_kmac = src->is_kmac; } return dest; err: kbkdf_free(dest); return NULL; } /* SP800-108 section 5.1 or section 5.2 depending on mode. */ static int derive(EVP_MAC_CTX *ctx_init, kbkdf_mode mode, unsigned char *iv, size_t iv_len, unsigned char *label, size_t label_len, unsigned char *context, size_t context_len, unsigned char *k_i, size_t h, uint32_t l, int has_separator, unsigned char *ko, size_t ko_len, int r) { int ret = 0; EVP_MAC_CTX *ctx = NULL; size_t written = 0, to_write, k_i_len = iv_len; const unsigned char zero = 0; uint32_t counter, i; /* * From SP800-108: * The fixed input data is a concatenation of a Label, * a separation indicator 0x00, the Context, and L. * One or more of these fixed input data fields may be omitted. * * has_separator == 0 means that the separator is omitted. * Passing a value of l == 0 means that L is omitted. * The Context and L are omitted automatically if a NULL buffer is passed. */ int has_l = (l != 0); /* Setup K(0) for feedback mode. */ if (iv_len > 0) memcpy(k_i, iv, iv_len); for (counter = 1; written < ko_len; counter++) { i = be32(counter); ctx = EVP_MAC_CTX_dup(ctx_init); if (ctx == NULL) goto done; /* Perform feedback, if appropriate. */ if (mode == FEEDBACK && !EVP_MAC_update(ctx, k_i, k_i_len)) goto done; if (!EVP_MAC_update(ctx, 4 - (r / 8) + (unsigned char *)&i, r / 8) || !EVP_MAC_update(ctx, label, label_len) || (has_separator && !EVP_MAC_update(ctx, &zero, 1)) || !EVP_MAC_update(ctx, context, context_len) || (has_l && !EVP_MAC_update(ctx, (unsigned char *)&l, 4)) || !EVP_MAC_final(ctx, k_i, NULL, h)) goto done; to_write = ko_len - written; memcpy(ko + written, k_i, ossl_min(to_write, h)); written += h; k_i_len = h; EVP_MAC_CTX_free(ctx); ctx = NULL; } ret = 1; done: EVP_MAC_CTX_free(ctx); return ret; } /* This must be run before the key is set */ static int kmac_init(EVP_MAC_CTX *ctx, const unsigned char *custom, size_t customlen) { OSSL_PARAM params[2]; if (custom == NULL || customlen == 0) return 1; params[0] = OSSL_PARAM_construct_octet_string(OSSL_MAC_PARAM_CUSTOM, (void *)custom, customlen); params[1] = OSSL_PARAM_construct_end(); return EVP_MAC_CTX_set_params(ctx, params) > 0; } static int kmac_derive(EVP_MAC_CTX *ctx, unsigned char *out, size_t outlen, const unsigned char *context, size_t contextlen) { OSSL_PARAM params[2]; params[0] = OSSL_PARAM_construct_size_t(OSSL_MAC_PARAM_SIZE, &outlen); params[1] = OSSL_PARAM_construct_end(); return EVP_MAC_CTX_set_params(ctx, params) > 0 && EVP_MAC_update(ctx, context, contextlen) && EVP_MAC_final(ctx, out, NULL, outlen); } static int kbkdf_derive(void *vctx, unsigned char *key, size_t keylen, const OSSL_PARAM params[]) { KBKDF *ctx = (KBKDF *)vctx; int ret = 0; unsigned char *k_i = NULL; uint32_t l = 0; size_t h = 0; uint64_t counter_max; if (!ossl_prov_is_running() || !kbkdf_set_ctx_params(ctx, params)) return 0; /* label, context, and iv are permitted to be empty. Check everything * else. */ if (ctx->ctx_init == NULL) { if (ctx->ki_len == 0 || ctx->ki == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET); return 0; } /* Could either be missing MAC or missing message digest or missing * cipher - arbitrarily, I pick this one. */ ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_MAC); return 0; } /* Fail if the output length is zero */ if (keylen == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } if (ctx->is_kmac) { ret = kmac_derive(ctx->ctx_init, key, keylen, ctx->context, ctx->context_len); goto done; } h = EVP_MAC_CTX_get_mac_size(ctx->ctx_init); if (h == 0) goto done; if (ctx->iv_len != 0 && ctx->iv_len != h) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_SEED_LENGTH); goto done; } if (ctx->mode == COUNTER) { /* Fail if keylen is too large for r */ counter_max = (uint64_t)1 << (uint64_t)ctx->r; if ((uint64_t)(keylen / h) >= counter_max) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); goto done; } } if (ctx->use_l != 0) l = be32(keylen * 8); k_i = OPENSSL_zalloc(h); if (k_i == NULL) goto done; ret = derive(ctx->ctx_init, ctx->mode, ctx->iv, ctx->iv_len, ctx->label, ctx->label_len, ctx->context, ctx->context_len, k_i, h, l, ctx->use_separator, key, keylen, ctx->r); done: if (ret != 1) OPENSSL_cleanse(key, keylen); OPENSSL_clear_free(k_i, h); return ret; } static int kbkdf_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { KBKDF *ctx = (KBKDF *)vctx; OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(ctx->provctx); const OSSL_PARAM *p; if (params == NULL) return 1; if (!ossl_prov_macctx_load_from_params(&ctx->ctx_init, params, NULL, NULL, NULL, libctx)) return 0; else if (ctx->ctx_init != NULL) { if (EVP_MAC_is_a(EVP_MAC_CTX_get0_mac(ctx->ctx_init), OSSL_MAC_NAME_KMAC128) || EVP_MAC_is_a(EVP_MAC_CTX_get0_mac(ctx->ctx_init), OSSL_MAC_NAME_KMAC256)) { ctx->is_kmac = 1; } else if (!EVP_MAC_is_a(EVP_MAC_CTX_get0_mac(ctx->ctx_init), OSSL_MAC_NAME_HMAC) && !EVP_MAC_is_a(EVP_MAC_CTX_get0_mac(ctx->ctx_init), OSSL_MAC_NAME_CMAC)) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_MAC); return 0; } } p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_MODE); if (p != NULL && OPENSSL_strncasecmp("counter", p->data, p->data_size) == 0) { ctx->mode = COUNTER; } else if (p != NULL && OPENSSL_strncasecmp("feedback", p->data, p->data_size) == 0) { ctx->mode = FEEDBACK; } else if (p != NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_MODE); return 0; } if (ossl_param_get1_octet_string(params, OSSL_KDF_PARAM_KEY, &ctx->ki, &ctx->ki_len) == 0) return 0; if (ossl_param_get1_octet_string(params, OSSL_KDF_PARAM_SALT, &ctx->label, &ctx->label_len) == 0) return 0; if (ossl_param_get1_concat_octet_string(params, OSSL_KDF_PARAM_INFO, &ctx->context, &ctx->context_len, 0) == 0) return 0; if (ossl_param_get1_octet_string(params, OSSL_KDF_PARAM_SEED, &ctx->iv, &ctx->iv_len) == 0) return 0; p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_KBKDF_USE_L); if (p != NULL && !OSSL_PARAM_get_int(p, &ctx->use_l)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_KBKDF_R); if (p != NULL) { int new_r = 0; if (!OSSL_PARAM_get_int(p, &new_r)) return 0; if (new_r != 8 && new_r != 16 && new_r != 24 && new_r != 32) return 0; ctx->r = new_r; } p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_KBKDF_USE_SEPARATOR); if (p != NULL && !OSSL_PARAM_get_int(p, &ctx->use_separator)) return 0; /* Set up digest context, if we can. */ if (ctx->ctx_init != NULL && ctx->ki_len != 0) { if ((ctx->is_kmac && !kmac_init(ctx->ctx_init, ctx->label, ctx->label_len)) || !EVP_MAC_init(ctx->ctx_init, ctx->ki, ctx->ki_len, NULL)) return 0; } return 1; } static const OSSL_PARAM *kbkdf_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_octet_string(OSSL_KDF_PARAM_INFO, NULL, 0), OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0), OSSL_PARAM_octet_string(OSSL_KDF_PARAM_KEY, NULL, 0), OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SEED, NULL, 0), OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0), OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_CIPHER, NULL, 0), OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_MAC, NULL, 0), OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_MODE, NULL, 0), OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_int(OSSL_KDF_PARAM_KBKDF_USE_L, NULL), OSSL_PARAM_int(OSSL_KDF_PARAM_KBKDF_USE_SEPARATOR, NULL), OSSL_PARAM_int(OSSL_KDF_PARAM_KBKDF_R, NULL), OSSL_PARAM_END, }; return known_settable_ctx_params; } static int kbkdf_get_ctx_params(void *vctx, OSSL_PARAM params[]) { OSSL_PARAM *p; p = OSSL_PARAM_locate(params, OSSL_KDF_PARAM_SIZE); if (p == NULL) return -2; /* KBKDF can produce results as large as you like. */ return OSSL_PARAM_set_size_t(p, SIZE_MAX); } static const OSSL_PARAM *kbkdf_gettable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL), OSSL_PARAM_END }; return known_gettable_ctx_params; } const OSSL_DISPATCH ossl_kdf_kbkdf_functions[] = { { OSSL_FUNC_KDF_NEWCTX, (void(*)(void))kbkdf_new }, { OSSL_FUNC_KDF_DUPCTX, (void(*)(void))kbkdf_dup }, { OSSL_FUNC_KDF_FREECTX, (void(*)(void))kbkdf_free }, { OSSL_FUNC_KDF_RESET, (void(*)(void))kbkdf_reset }, { OSSL_FUNC_KDF_DERIVE, (void(*)(void))kbkdf_derive }, { OSSL_FUNC_KDF_SETTABLE_CTX_PARAMS, (void(*)(void))kbkdf_settable_ctx_params }, { OSSL_FUNC_KDF_SET_CTX_PARAMS, (void(*)(void))kbkdf_set_ctx_params }, { OSSL_FUNC_KDF_GETTABLE_CTX_PARAMS, (void(*)(void))kbkdf_gettable_ctx_params }, { OSSL_FUNC_KDF_GET_CTX_PARAMS, (void(*)(void))kbkdf_get_ctx_params }, OSSL_DISPATCH_END, };
./openssl/providers/implementations/kdfs/pbkdf2.h
/* * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * Available in pbkdfe_fips.c, and compiled with different values depending * on we're in the FIPS module or not. */ extern const int ossl_kdf_pbkdf2_default_checks;
./openssl/providers/implementations/kdfs/pkcs12kdf.c
/* * Copyright 1999-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/trace.h> #include <stdlib.h> #include <stdarg.h> #include <string.h> #include <openssl/evp.h> #include <openssl/kdf.h> #include <openssl/core_names.h> #include <openssl/proverr.h> #include "internal/cryptlib.h" #include "internal/numbers.h" #include "crypto/evp.h" #include "prov/provider_ctx.h" #include "prov/providercommon.h" #include "prov/implementations.h" #include "prov/provider_util.h" static OSSL_FUNC_kdf_newctx_fn kdf_pkcs12_new; static OSSL_FUNC_kdf_dupctx_fn kdf_pkcs12_dup; static OSSL_FUNC_kdf_freectx_fn kdf_pkcs12_free; static OSSL_FUNC_kdf_reset_fn kdf_pkcs12_reset; static OSSL_FUNC_kdf_derive_fn kdf_pkcs12_derive; static OSSL_FUNC_kdf_settable_ctx_params_fn kdf_pkcs12_settable_ctx_params; static OSSL_FUNC_kdf_set_ctx_params_fn kdf_pkcs12_set_ctx_params; static OSSL_FUNC_kdf_gettable_ctx_params_fn kdf_pkcs12_gettable_ctx_params; static OSSL_FUNC_kdf_get_ctx_params_fn kdf_pkcs12_get_ctx_params; typedef struct { void *provctx; PROV_DIGEST digest; unsigned char *pass; size_t pass_len; unsigned char *salt; size_t salt_len; uint64_t iter; int id; } KDF_PKCS12; /* PKCS12 compatible key/IV generation */ static int pkcs12kdf_derive(const unsigned char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, int id, uint64_t iter, const EVP_MD *md_type, unsigned char *out, size_t n) { unsigned char *B = NULL, *D = NULL, *I = NULL, *p = NULL, *Ai = NULL; size_t Slen, Plen, Ilen; size_t i, j, k, u, v; uint64_t iter_cnt; int ret = 0, ui, vi; EVP_MD_CTX *ctx = NULL; ctx = EVP_MD_CTX_new(); if (ctx == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_EVP_LIB); goto end; } vi = EVP_MD_get_block_size(md_type); ui = EVP_MD_get_size(md_type); if (ui <= 0 || vi <= 0) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_DIGEST_SIZE); goto end; } u = (size_t)ui; v = (size_t)vi; D = OPENSSL_malloc(v); Ai = OPENSSL_malloc(u); B = OPENSSL_malloc(v + 1); Slen = v * ((saltlen + v - 1) / v); if (passlen != 0) Plen = v * ((passlen + v - 1) / v); else Plen = 0; Ilen = Slen + Plen; I = OPENSSL_malloc(Ilen); if (D == NULL || Ai == NULL || B == NULL || I == NULL) goto end; for (i = 0; i < v; i++) D[i] = id; p = I; for (i = 0; i < Slen; i++) *p++ = salt[i % saltlen]; for (i = 0; i < Plen; i++) *p++ = pass[i % passlen]; for (;;) { if (!EVP_DigestInit_ex(ctx, md_type, NULL) || !EVP_DigestUpdate(ctx, D, v) || !EVP_DigestUpdate(ctx, I, Ilen) || !EVP_DigestFinal_ex(ctx, Ai, NULL)) goto end; for (iter_cnt = 1; iter_cnt < iter; iter_cnt++) { if (!EVP_DigestInit_ex(ctx, md_type, NULL) || !EVP_DigestUpdate(ctx, Ai, u) || !EVP_DigestFinal_ex(ctx, Ai, NULL)) goto end; } memcpy(out, Ai, n < u ? n : u); if (u >= n) { ret = 1; break; } n -= u; out += u; for (j = 0; j < v; j++) B[j] = Ai[j % u]; for (j = 0; j < Ilen; j += v) { unsigned char *Ij = I + j; uint16_t c = 1; /* Work out Ij = Ij + B + 1 */ for (k = v; k > 0;) { k--; c += Ij[k] + B[k]; Ij[k] = (unsigned char)c; c >>= 8; } } } end: OPENSSL_free(Ai); OPENSSL_free(B); OPENSSL_free(D); OPENSSL_free(I); EVP_MD_CTX_free(ctx); return ret; } static void *kdf_pkcs12_new(void *provctx) { KDF_PKCS12 *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx == NULL) return NULL; ctx->provctx = provctx; return ctx; } static void kdf_pkcs12_cleanup(KDF_PKCS12 *ctx) { ossl_prov_digest_reset(&ctx->digest); OPENSSL_free(ctx->salt); OPENSSL_clear_free(ctx->pass, ctx->pass_len); memset(ctx, 0, sizeof(*ctx)); } static void kdf_pkcs12_free(void *vctx) { KDF_PKCS12 *ctx = (KDF_PKCS12 *)vctx; if (ctx != NULL) { kdf_pkcs12_cleanup(ctx); OPENSSL_free(ctx); } } static void kdf_pkcs12_reset(void *vctx) { KDF_PKCS12 *ctx = (KDF_PKCS12 *)vctx; void *provctx = ctx->provctx; kdf_pkcs12_cleanup(ctx); ctx->provctx = provctx; } static void *kdf_pkcs12_dup(void *vctx) { const KDF_PKCS12 *src = (const KDF_PKCS12 *)vctx; KDF_PKCS12 *dest; dest = kdf_pkcs12_new(src->provctx); if (dest != NULL) { if (!ossl_prov_memdup(src->salt, src->salt_len, &dest->salt, &dest->salt_len) || !ossl_prov_memdup(src->pass, src->pass_len, &dest->pass , &dest->pass_len) || !ossl_prov_digest_copy(&dest->digest, &src->digest)) goto err; dest->iter = src->iter; dest->id = src->id; } return dest; err: kdf_pkcs12_free(dest); return NULL; } static int pkcs12kdf_set_membuf(unsigned char **buffer, size_t *buflen, const OSSL_PARAM *p) { OPENSSL_clear_free(*buffer, *buflen); *buffer = NULL; *buflen = 0; if (p->data_size == 0) { if ((*buffer = OPENSSL_malloc(1)) == NULL) return 0; } else if (p->data != NULL) { if (!OSSL_PARAM_get_octet_string(p, (void **)buffer, 0, buflen)) return 0; } return 1; } static int kdf_pkcs12_derive(void *vctx, unsigned char *key, size_t keylen, const OSSL_PARAM params[]) { KDF_PKCS12 *ctx = (KDF_PKCS12 *)vctx; const EVP_MD *md; if (!ossl_prov_is_running() || !kdf_pkcs12_set_ctx_params(ctx, params)) return 0; if (ctx->pass == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_PASS); return 0; } if (ctx->salt == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_SALT); return 0; } md = ossl_prov_digest_md(&ctx->digest); return pkcs12kdf_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, ctx->id, ctx->iter, md, key, keylen); } static int kdf_pkcs12_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { const OSSL_PARAM *p; KDF_PKCS12 *ctx = vctx; OSSL_LIB_CTX *provctx = PROV_LIBCTX_OF(ctx->provctx); if (params == NULL) return 1; if (!ossl_prov_digest_load_from_params(&ctx->digest, params, provctx)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_PASSWORD)) != NULL) if (!pkcs12kdf_set_membuf(&ctx->pass, &ctx->pass_len, p)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_SALT)) != NULL) if (!pkcs12kdf_set_membuf(&ctx->salt, &ctx->salt_len, p)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_PKCS12_ID)) != NULL) if (!OSSL_PARAM_get_int(p, &ctx->id)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_ITER)) != NULL) if (!OSSL_PARAM_get_uint64(p, &ctx->iter)) return 0; return 1; } static const OSSL_PARAM *kdf_pkcs12_settable_ctx_params( ossl_unused void *ctx, ossl_unused void *provctx) { static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0), OSSL_PARAM_octet_string(OSSL_KDF_PARAM_PASSWORD, NULL, 0), OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0), OSSL_PARAM_uint64(OSSL_KDF_PARAM_ITER, NULL), OSSL_PARAM_int(OSSL_KDF_PARAM_PKCS12_ID, NULL), OSSL_PARAM_END }; return known_settable_ctx_params; } static int kdf_pkcs12_get_ctx_params(void *vctx, OSSL_PARAM params[]) { OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_KDF_PARAM_SIZE)) != NULL) return OSSL_PARAM_set_size_t(p, SIZE_MAX); return -2; } static const OSSL_PARAM *kdf_pkcs12_gettable_ctx_params( ossl_unused void *ctx, ossl_unused void *provctx) { static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL), OSSL_PARAM_END }; return known_gettable_ctx_params; } const OSSL_DISPATCH ossl_kdf_pkcs12_functions[] = { { OSSL_FUNC_KDF_NEWCTX, (void(*)(void))kdf_pkcs12_new }, { OSSL_FUNC_KDF_DUPCTX, (void(*)(void))kdf_pkcs12_dup }, { OSSL_FUNC_KDF_FREECTX, (void(*)(void))kdf_pkcs12_free }, { OSSL_FUNC_KDF_RESET, (void(*)(void))kdf_pkcs12_reset }, { OSSL_FUNC_KDF_DERIVE, (void(*)(void))kdf_pkcs12_derive }, { OSSL_FUNC_KDF_SETTABLE_CTX_PARAMS, (void(*)(void))kdf_pkcs12_settable_ctx_params }, { OSSL_FUNC_KDF_SET_CTX_PARAMS, (void(*)(void))kdf_pkcs12_set_ctx_params }, { OSSL_FUNC_KDF_GETTABLE_CTX_PARAMS, (void(*)(void))kdf_pkcs12_gettable_ctx_params }, { OSSL_FUNC_KDF_GET_CTX_PARAMS, (void(*)(void))kdf_pkcs12_get_ctx_params }, OSSL_DISPATCH_END };
./openssl/providers/implementations/kdfs/sshkdf.c
/* * Copyright 2018-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <stdlib.h> #include <stdarg.h> #include <string.h> #include <openssl/evp.h> #include <openssl/kdf.h> #include <openssl/core_names.h> #include <openssl/proverr.h> #include "internal/cryptlib.h" #include "internal/numbers.h" #include "crypto/evp.h" #include "prov/provider_ctx.h" #include "prov/providercommon.h" #include "prov/implementations.h" #include "prov/provider_util.h" /* See RFC 4253, Section 7.2 */ static OSSL_FUNC_kdf_newctx_fn kdf_sshkdf_new; static OSSL_FUNC_kdf_dupctx_fn kdf_sshkdf_dup; static OSSL_FUNC_kdf_freectx_fn kdf_sshkdf_free; static OSSL_FUNC_kdf_reset_fn kdf_sshkdf_reset; static OSSL_FUNC_kdf_derive_fn kdf_sshkdf_derive; static OSSL_FUNC_kdf_settable_ctx_params_fn kdf_sshkdf_settable_ctx_params; static OSSL_FUNC_kdf_set_ctx_params_fn kdf_sshkdf_set_ctx_params; static OSSL_FUNC_kdf_gettable_ctx_params_fn kdf_sshkdf_gettable_ctx_params; static OSSL_FUNC_kdf_get_ctx_params_fn kdf_sshkdf_get_ctx_params; static int SSHKDF(const EVP_MD *evp_md, const unsigned char *key, size_t key_len, const unsigned char *xcghash, size_t xcghash_len, const unsigned char *session_id, size_t session_id_len, char type, unsigned char *okey, size_t okey_len); typedef struct { void *provctx; PROV_DIGEST digest; unsigned char *key; /* K */ size_t key_len; unsigned char *xcghash; /* H */ size_t xcghash_len; char type; /* X */ unsigned char *session_id; size_t session_id_len; } KDF_SSHKDF; static void *kdf_sshkdf_new(void *provctx) { KDF_SSHKDF *ctx; if (!ossl_prov_is_running()) return NULL; if ((ctx = OPENSSL_zalloc(sizeof(*ctx))) != NULL) ctx->provctx = provctx; return ctx; } static void kdf_sshkdf_free(void *vctx) { KDF_SSHKDF *ctx = (KDF_SSHKDF *)vctx; if (ctx != NULL) { kdf_sshkdf_reset(ctx); OPENSSL_free(ctx); } } static void kdf_sshkdf_reset(void *vctx) { KDF_SSHKDF *ctx = (KDF_SSHKDF *)vctx; void *provctx = ctx->provctx; ossl_prov_digest_reset(&ctx->digest); OPENSSL_clear_free(ctx->key, ctx->key_len); OPENSSL_clear_free(ctx->xcghash, ctx->xcghash_len); OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); memset(ctx, 0, sizeof(*ctx)); ctx->provctx = provctx; } static void *kdf_sshkdf_dup(void *vctx) { const KDF_SSHKDF *src = (const KDF_SSHKDF *)vctx; KDF_SSHKDF *dest; dest = kdf_sshkdf_new(src->provctx); if (dest != NULL) { if (!ossl_prov_memdup(src->key, src->key_len, &dest->key, &dest->key_len) || !ossl_prov_memdup(src->xcghash, src->xcghash_len, &dest->xcghash , &dest->xcghash_len) || !ossl_prov_memdup(src->session_id, src->session_id_len, &dest->session_id , &dest->session_id_len) || !ossl_prov_digest_copy(&dest->digest, &src->digest)) goto err; dest->type = src->type; } return dest; err: kdf_sshkdf_free(dest); return NULL; } static int sshkdf_set_membuf(unsigned char **dst, size_t *dst_len, const OSSL_PARAM *p) { OPENSSL_clear_free(*dst, *dst_len); *dst = NULL; *dst_len = 0; return OSSL_PARAM_get_octet_string(p, (void **)dst, 0, dst_len); } static int kdf_sshkdf_derive(void *vctx, unsigned char *key, size_t keylen, const OSSL_PARAM params[]) { KDF_SSHKDF *ctx = (KDF_SSHKDF *)vctx; const EVP_MD *md; if (!ossl_prov_is_running() || !kdf_sshkdf_set_ctx_params(ctx, params)) return 0; md = ossl_prov_digest_md(&ctx->digest); if (md == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_MESSAGE_DIGEST); return 0; } if (ctx->key == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_KEY); return 0; } if (ctx->xcghash == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_XCGHASH); return 0; } if (ctx->session_id == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_SESSION_ID); return 0; } if (ctx->type == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_TYPE); return 0; } return SSHKDF(md, ctx->key, ctx->key_len, ctx->xcghash, ctx->xcghash_len, ctx->session_id, ctx->session_id_len, ctx->type, key, keylen); } static int kdf_sshkdf_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { const OSSL_PARAM *p; KDF_SSHKDF *ctx = vctx; OSSL_LIB_CTX *provctx = PROV_LIBCTX_OF(ctx->provctx); if (params == NULL) return 1; if (!ossl_prov_digest_load_from_params(&ctx->digest, params, provctx)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_KEY)) != NULL) if (!sshkdf_set_membuf(&ctx->key, &ctx->key_len, p)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_SSHKDF_XCGHASH)) != NULL) if (!sshkdf_set_membuf(&ctx->xcghash, &ctx->xcghash_len, p)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_SSHKDF_SESSION_ID)) != NULL) if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_SSHKDF_TYPE)) != NULL) { const char *kdftype; if (!OSSL_PARAM_get_utf8_string_ptr(p, &kdftype)) return 0; /* Expect one character (byte in this case) */ if (kdftype == NULL || p->data_size != 1) return 0; if (kdftype[0] < 65 || kdftype[0] > 70) { ERR_raise(ERR_LIB_PROV, PROV_R_VALUE_ERROR); return 0; } ctx->type = kdftype[0]; } return 1; } static const OSSL_PARAM *kdf_sshkdf_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *p_ctx) { static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0), OSSL_PARAM_octet_string(OSSL_KDF_PARAM_KEY, NULL, 0), OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SSHKDF_XCGHASH, NULL, 0), OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SSHKDF_SESSION_ID, NULL, 0), OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_SSHKDF_TYPE, NULL, 0), OSSL_PARAM_END }; return known_settable_ctx_params; } static int kdf_sshkdf_get_ctx_params(void *vctx, OSSL_PARAM params[]) { OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_KDF_PARAM_SIZE)) != NULL) return OSSL_PARAM_set_size_t(p, SIZE_MAX); return -2; } static const OSSL_PARAM *kdf_sshkdf_gettable_ctx_params(ossl_unused void *ctx, ossl_unused void *p_ctx) { static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL), OSSL_PARAM_END }; return known_gettable_ctx_params; } const OSSL_DISPATCH ossl_kdf_sshkdf_functions[] = { { OSSL_FUNC_KDF_NEWCTX, (void(*)(void))kdf_sshkdf_new }, { OSSL_FUNC_KDF_DUPCTX, (void(*)(void))kdf_sshkdf_dup }, { OSSL_FUNC_KDF_FREECTX, (void(*)(void))kdf_sshkdf_free }, { OSSL_FUNC_KDF_RESET, (void(*)(void))kdf_sshkdf_reset }, { OSSL_FUNC_KDF_DERIVE, (void(*)(void))kdf_sshkdf_derive }, { OSSL_FUNC_KDF_SETTABLE_CTX_PARAMS, (void(*)(void))kdf_sshkdf_settable_ctx_params }, { OSSL_FUNC_KDF_SET_CTX_PARAMS, (void(*)(void))kdf_sshkdf_set_ctx_params }, { OSSL_FUNC_KDF_GETTABLE_CTX_PARAMS, (void(*)(void))kdf_sshkdf_gettable_ctx_params }, { OSSL_FUNC_KDF_GET_CTX_PARAMS, (void(*)(void))kdf_sshkdf_get_ctx_params }, OSSL_DISPATCH_END }; static int SSHKDF(const EVP_MD *evp_md, const unsigned char *key, size_t key_len, const unsigned char *xcghash, size_t xcghash_len, const unsigned char *session_id, size_t session_id_len, char type, unsigned char *okey, size_t okey_len) { EVP_MD_CTX *md = NULL; unsigned char digest[EVP_MAX_MD_SIZE]; unsigned int dsize = 0; size_t cursize = 0; int ret = 0; md = EVP_MD_CTX_new(); if (md == NULL) return 0; if (!EVP_DigestInit_ex(md, evp_md, NULL)) goto out; if (!EVP_DigestUpdate(md, key, key_len)) goto out; if (!EVP_DigestUpdate(md, xcghash, xcghash_len)) goto out; if (!EVP_DigestUpdate(md, &type, 1)) goto out; if (!EVP_DigestUpdate(md, session_id, session_id_len)) goto out; if (!EVP_DigestFinal_ex(md, digest, &dsize)) goto out; if (okey_len < dsize) { memcpy(okey, digest, okey_len); ret = 1; goto out; } memcpy(okey, digest, dsize); for (cursize = dsize; cursize < okey_len; cursize += dsize) { if (!EVP_DigestInit_ex(md, evp_md, NULL)) goto out; if (!EVP_DigestUpdate(md, key, key_len)) goto out; if (!EVP_DigestUpdate(md, xcghash, xcghash_len)) goto out; if (!EVP_DigestUpdate(md, okey, cursize)) goto out; if (!EVP_DigestFinal_ex(md, digest, &dsize)) goto out; if (okey_len < cursize + dsize) { memcpy(okey + cursize, digest, okey_len - cursize); ret = 1; goto out; } memcpy(okey + cursize, digest, dsize); } ret = 1; out: EVP_MD_CTX_free(md); OPENSSL_cleanse(digest, EVP_MAX_MD_SIZE); return ret; }
./openssl/providers/implementations/kdfs/argon2.c
/* * Copyright 2022-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html * * RFC 9106 Argon2 (see https://www.rfc-editor.org/rfc/rfc9106.txt) * */ #include <stdlib.h> #include <stddef.h> #include <stdarg.h> #include <string.h> #include <openssl/e_os2.h> #include <openssl/evp.h> #include <openssl/objects.h> #include <openssl/crypto.h> #include <openssl/kdf.h> #include <openssl/err.h> #include <openssl/core_names.h> #include <openssl/params.h> #include <openssl/thread.h> #include <openssl/proverr.h> #include "internal/thread.h" #include "internal/numbers.h" #include "internal/endian.h" #include "crypto/evp.h" #include "prov/implementations.h" #include "prov/provider_ctx.h" #include "prov/providercommon.h" #include "prov/blake2.h" #if defined(OPENSSL_NO_DEFAULT_THREAD_POOL) && defined(OPENSSL_NO_THREAD_POOL) # define ARGON2_NO_THREADS #endif #if !defined(OPENSSL_THREADS) # define ARGON2_NO_THREADS #endif #ifndef OPENSSL_NO_ARGON2 # define ARGON2_MIN_LANES 1u # define ARGON2_MAX_LANES 0xFFFFFFu # define ARGON2_MIN_THREADS 1u # define ARGON2_MAX_THREADS 0xFFFFFFu # define ARGON2_SYNC_POINTS 4u # define ARGON2_MIN_OUT_LENGTH 4u # define ARGON2_MAX_OUT_LENGTH 0xFFFFFFFFu # define ARGON2_MIN_MEMORY (2 * ARGON2_SYNC_POINTS) # define ARGON2_MIN(a, b) ((a) < (b) ? (a) : (b)) # define ARGON2_MAX_MEMORY 0xFFFFFFFFu # define ARGON2_MIN_TIME 1u # define ARGON2_MAX_TIME 0xFFFFFFFFu # define ARGON2_MIN_PWD_LENGTH 0u # define ARGON2_MAX_PWD_LENGTH 0xFFFFFFFFu # define ARGON2_MIN_AD_LENGTH 0u # define ARGON2_MAX_AD_LENGTH 0xFFFFFFFFu # define ARGON2_MIN_SALT_LENGTH 8u # define ARGON2_MAX_SALT_LENGTH 0xFFFFFFFFu # define ARGON2_MIN_SECRET 0u # define ARGON2_MAX_SECRET 0xFFFFFFFFu # define ARGON2_BLOCK_SIZE 1024 # define ARGON2_QWORDS_IN_BLOCK ((ARGON2_BLOCK_SIZE) / 8) # define ARGON2_OWORDS_IN_BLOCK ((ARGON2_BLOCK_SIZE) / 16) # define ARGON2_HWORDS_IN_BLOCK ((ARGON2_BLOCK_SIZE) / 32) # define ARGON2_512BIT_WORDS_IN_BLOCK ((ARGON2_BLOCK_SIZE) / 64) # define ARGON2_ADDRESSES_IN_BLOCK 128 # define ARGON2_PREHASH_DIGEST_LENGTH 64 # define ARGON2_PREHASH_SEED_LENGTH \ (ARGON2_PREHASH_DIGEST_LENGTH + (2 * sizeof(uint32_t))) # define ARGON2_DEFAULT_OUTLEN 64u # define ARGON2_DEFAULT_T_COST 3u # define ARGON2_DEFAULT_M_COST ARGON2_MIN_MEMORY # define ARGON2_DEFAULT_LANES 1u # define ARGON2_DEFAULT_THREADS 1u # define ARGON2_DEFAULT_VERSION ARGON2_VERSION_NUMBER # undef G # define G(a, b, c, d) \ do { \ a = a + b + 2 * mul_lower(a, b); \ d = rotr64(d ^ a, 32); \ c = c + d + 2 * mul_lower(c, d); \ b = rotr64(b ^ c, 24); \ a = a + b + 2 * mul_lower(a, b); \ d = rotr64(d ^ a, 16); \ c = c + d + 2 * mul_lower(c, d); \ b = rotr64(b ^ c, 63); \ } while ((void)0, 0) # undef PERMUTATION_P # define PERMUTATION_P(v0, v1, v2, v3, v4, v5, v6, v7, v8, v9, v10, v11, \ v12, v13, v14, v15) \ do { \ G(v0, v4, v8, v12); \ G(v1, v5, v9, v13); \ G(v2, v6, v10, v14); \ G(v3, v7, v11, v15); \ G(v0, v5, v10, v15); \ G(v1, v6, v11, v12); \ G(v2, v7, v8, v13); \ G(v3, v4, v9, v14); \ } while ((void)0, 0) # undef PERMUTATION_P_COLUMN # define PERMUTATION_P_COLUMN(x, i) \ do { \ uint64_t *base = &x[16 * i]; \ PERMUTATION_P( \ *base, *(base + 1), *(base + 2), *(base + 3), \ *(base + 4), *(base + 5), *(base + 6), *(base + 7), \ *(base + 8), *(base + 9), *(base + 10), *(base + 11), \ *(base + 12), *(base + 13), *(base + 14), *(base + 15) \ ); \ } while ((void)0, 0) # undef PERMUTATION_P_ROW # define PERMUTATION_P_ROW(x, i) \ do { \ uint64_t *base = &x[2 * i]; \ PERMUTATION_P( \ *base, *(base + 1), *(base + 16), *(base + 17), \ *(base + 32), *(base + 33), *(base + 48), *(base + 49), \ *(base + 64), *(base + 65), *(base + 80), *(base + 81), \ *(base + 96), *(base + 97), *(base + 112), *(base + 113) \ ); \ } while ((void)0, 0) typedef struct { uint64_t v[ARGON2_QWORDS_IN_BLOCK]; } BLOCK; typedef enum { ARGON2_VERSION_10 = 0x10, ARGON2_VERSION_13 = 0x13, ARGON2_VERSION_NUMBER = ARGON2_VERSION_13 } ARGON2_VERSION; typedef enum { ARGON2_D = 0, ARGON2_I = 1, ARGON2_ID = 2 } ARGON2_TYPE; typedef struct { uint32_t pass; uint32_t lane; uint8_t slice; uint32_t index; } ARGON2_POS; typedef struct { void *provctx; uint32_t outlen; uint8_t *pwd; uint32_t pwdlen; uint8_t *salt; uint32_t saltlen; uint8_t *secret; uint32_t secretlen; uint8_t *ad; uint32_t adlen; uint32_t t_cost; uint32_t m_cost; uint32_t lanes; uint32_t threads; uint32_t version; uint32_t early_clean; ARGON2_TYPE type; BLOCK *memory; uint32_t passes; uint32_t memory_blocks; uint32_t segment_length; uint32_t lane_length; OSSL_LIB_CTX *libctx; EVP_MD *md; EVP_MAC *mac; char *propq; } KDF_ARGON2; typedef struct { ARGON2_POS pos; KDF_ARGON2 *ctx; } ARGON2_THREAD_DATA; static OSSL_FUNC_kdf_newctx_fn kdf_argon2i_new; static OSSL_FUNC_kdf_newctx_fn kdf_argon2d_new; static OSSL_FUNC_kdf_newctx_fn kdf_argon2id_new; static OSSL_FUNC_kdf_freectx_fn kdf_argon2_free; static OSSL_FUNC_kdf_reset_fn kdf_argon2_reset; static OSSL_FUNC_kdf_derive_fn kdf_argon2_derive; static OSSL_FUNC_kdf_settable_ctx_params_fn kdf_argon2_settable_ctx_params; static OSSL_FUNC_kdf_set_ctx_params_fn kdf_argon2_set_ctx_params; static void kdf_argon2_init(KDF_ARGON2 *ctx, ARGON2_TYPE t); static void *kdf_argon2d_new(void *provctx); static void *kdf_argon2i_new(void *provctx); static void *kdf_argon2id_new(void *provctx); static void kdf_argon2_free(void *vctx); static int kdf_argon2_derive(void *vctx, unsigned char *out, size_t outlen, const OSSL_PARAM params[]); static void kdf_argon2_reset(void *vctx); static int kdf_argon2_ctx_set_threads(KDF_ARGON2 *ctx, uint32_t threads); static int kdf_argon2_ctx_set_lanes(KDF_ARGON2 *ctx, uint32_t lanes); static int kdf_argon2_ctx_set_t_cost(KDF_ARGON2 *ctx, uint32_t t_cost); static int kdf_argon2_ctx_set_m_cost(KDF_ARGON2 *ctx, uint32_t m_cost); static int kdf_argon2_ctx_set_out_length(KDF_ARGON2 *ctx, uint32_t outlen); static int kdf_argon2_ctx_set_secret(KDF_ARGON2 *ctx, const OSSL_PARAM *p); static int kdf_argon2_ctx_set_pwd(KDF_ARGON2 *ctx, const OSSL_PARAM *p); static int kdf_argon2_ctx_set_salt(KDF_ARGON2 *ctx, const OSSL_PARAM *p); static int kdf_argon2_ctx_set_ad(KDF_ARGON2 *ctx, const OSSL_PARAM *p); static int kdf_argon2_set_ctx_params(void *vctx, const OSSL_PARAM params[]); static int kdf_argon2_get_ctx_params(void *vctx, OSSL_PARAM params[]); static int kdf_argon2_ctx_set_version(KDF_ARGON2 *ctx, uint32_t version); static const OSSL_PARAM *kdf_argon2_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *p_ctx); static const OSSL_PARAM *kdf_argon2_gettable_ctx_params(ossl_unused void *ctx, ossl_unused void *p_ctx); static ossl_inline uint64_t load64(const uint8_t *src); static ossl_inline void store32(uint8_t *dst, uint32_t w); static ossl_inline void store64(uint8_t *dst, uint64_t w); static ossl_inline uint64_t rotr64(const uint64_t w, const unsigned int c); static ossl_inline uint64_t mul_lower(uint64_t x, uint64_t y); static void init_block_value(BLOCK *b, uint8_t in); static void copy_block(BLOCK *dst, const BLOCK *src); static void xor_block(BLOCK *dst, const BLOCK *src); static void load_block(BLOCK *dst, const void *input); static void store_block(void *output, const BLOCK *src); static void fill_first_blocks(uint8_t *blockhash, const KDF_ARGON2 *ctx); static void fill_block(const BLOCK *prev, const BLOCK *ref, BLOCK *next, int with_xor); static void next_addresses(BLOCK *address_block, BLOCK *input_block, const BLOCK *zero_block); static int data_indep_addressing(const KDF_ARGON2 *ctx, uint32_t pass, uint8_t slice); static uint32_t index_alpha(const KDF_ARGON2 *ctx, uint32_t pass, uint8_t slice, uint32_t index, uint32_t pseudo_rand, int same_lane); static void fill_segment(const KDF_ARGON2 *ctx, uint32_t pass, uint32_t lane, uint8_t slice); # if !defined(ARGON2_NO_THREADS) static uint32_t fill_segment_thr(void *thread_data); static int fill_mem_blocks_mt(KDF_ARGON2 *ctx); # endif static int fill_mem_blocks_st(KDF_ARGON2 *ctx); static ossl_inline int fill_memory_blocks(KDF_ARGON2 *ctx); static void initial_hash(uint8_t *blockhash, KDF_ARGON2 *ctx); static int initialize(KDF_ARGON2 *ctx); static void finalize(const KDF_ARGON2 *ctx, void *out); static int blake2b(EVP_MD *md, EVP_MAC *mac, void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen); static int blake2b_long(EVP_MD *md, EVP_MAC *mac, unsigned char *out, size_t outlen, const void *in, size_t inlen); static ossl_inline uint64_t load64(const uint8_t *src) { return (((uint64_t)src[0]) << 0) | (((uint64_t)src[1]) << 8) | (((uint64_t)src[2]) << 16) | (((uint64_t)src[3]) << 24) | (((uint64_t)src[4]) << 32) | (((uint64_t)src[5]) << 40) | (((uint64_t)src[6]) << 48) | (((uint64_t)src[7]) << 56); } static ossl_inline void store32(uint8_t *dst, uint32_t w) { dst[0] = (uint8_t)(w >> 0); dst[1] = (uint8_t)(w >> 8); dst[2] = (uint8_t)(w >> 16); dst[3] = (uint8_t)(w >> 24); } static ossl_inline void store64(uint8_t *dst, uint64_t w) { dst[0] = (uint8_t)(w >> 0); dst[1] = (uint8_t)(w >> 8); dst[2] = (uint8_t)(w >> 16); dst[3] = (uint8_t)(w >> 24); dst[4] = (uint8_t)(w >> 32); dst[5] = (uint8_t)(w >> 40); dst[6] = (uint8_t)(w >> 48); dst[7] = (uint8_t)(w >> 56); } static ossl_inline uint64_t rotr64(const uint64_t w, const unsigned int c) { return (w >> c) | (w << (64 - c)); } static ossl_inline uint64_t mul_lower(uint64_t x, uint64_t y) { const uint64_t m = 0xFFFFFFFFUL; return (x & m) * (y & m); } static void init_block_value(BLOCK *b, uint8_t in) { memset(b->v, in, sizeof(b->v)); } static void copy_block(BLOCK *dst, const BLOCK *src) { memcpy(dst->v, src->v, sizeof(uint64_t) * ARGON2_QWORDS_IN_BLOCK); } static void xor_block(BLOCK *dst, const BLOCK *src) { int i; for (i = 0; i < ARGON2_QWORDS_IN_BLOCK; ++i) dst->v[i] ^= src->v[i]; } static void load_block(BLOCK *dst, const void *input) { unsigned i; for (i = 0; i < ARGON2_QWORDS_IN_BLOCK; ++i) dst->v[i] = load64((const uint8_t *)input + i * sizeof(dst->v[i])); } static void store_block(void *output, const BLOCK *src) { unsigned i; for (i = 0; i < ARGON2_QWORDS_IN_BLOCK; ++i) store64((uint8_t *)output + i * sizeof(src->v[i]), src->v[i]); } static void fill_first_blocks(uint8_t *blockhash, const KDF_ARGON2 *ctx) { uint32_t l; uint8_t blockhash_bytes[ARGON2_BLOCK_SIZE]; /* * Make the first and second block in each lane as G(H0||0||i) * or G(H0||1||i). */ for (l = 0; l < ctx->lanes; ++l) { store32(blockhash + ARGON2_PREHASH_DIGEST_LENGTH, 0); store32(blockhash + ARGON2_PREHASH_DIGEST_LENGTH + 4, l); blake2b_long(ctx->md, ctx->mac, blockhash_bytes, ARGON2_BLOCK_SIZE, blockhash, ARGON2_PREHASH_SEED_LENGTH); load_block(&ctx->memory[l * ctx->lane_length + 0], blockhash_bytes); store32(blockhash + ARGON2_PREHASH_DIGEST_LENGTH, 1); blake2b_long(ctx->md, ctx->mac, blockhash_bytes, ARGON2_BLOCK_SIZE, blockhash, ARGON2_PREHASH_SEED_LENGTH); load_block(&ctx->memory[l * ctx->lane_length + 1], blockhash_bytes); } OPENSSL_cleanse(blockhash_bytes, ARGON2_BLOCK_SIZE); } static void fill_block(const BLOCK *prev, const BLOCK *ref, BLOCK *next, int with_xor) { BLOCK blockR, tmp; unsigned i; copy_block(&blockR, ref); xor_block(&blockR, prev); copy_block(&tmp, &blockR); if (with_xor) xor_block(&tmp, next); for (i = 0; i < 8; ++i) PERMUTATION_P_COLUMN(blockR.v, i); for (i = 0; i < 8; ++i) PERMUTATION_P_ROW(blockR.v, i); copy_block(next, &tmp); xor_block(next, &blockR); } static void next_addresses(BLOCK *address_block, BLOCK *input_block, const BLOCK *zero_block) { input_block->v[6]++; fill_block(zero_block, input_block, address_block, 0); fill_block(zero_block, address_block, address_block, 0); } static int data_indep_addressing(const KDF_ARGON2 *ctx, uint32_t pass, uint8_t slice) { switch (ctx->type) { case ARGON2_I: return 1; case ARGON2_ID: return (pass == 0) && (slice < ARGON2_SYNC_POINTS / 2); case ARGON2_D: default: return 0; } } /* * Pass 0 (pass = 0): * This lane: all already finished segments plus already constructed blocks * in this segment * Other lanes: all already finished segments * * Pass 1+: * This lane: (SYNC_POINTS - 1) last segments plus already constructed * blocks in this segment * Other lanes: (SYNC_POINTS - 1) last segments */ static uint32_t index_alpha(const KDF_ARGON2 *ctx, uint32_t pass, uint8_t slice, uint32_t index, uint32_t pseudo_rand, int same_lane) { uint32_t ref_area_sz; uint64_t rel_pos; uint32_t start_pos, abs_pos; start_pos = 0; switch (pass) { case 0: if (slice == 0) ref_area_sz = index - 1; else if (same_lane) ref_area_sz = slice * ctx->segment_length + index - 1; else ref_area_sz = slice * ctx->segment_length + ((index == 0) ? (-1) : 0); break; default: if (same_lane) ref_area_sz = ctx->lane_length - ctx->segment_length + index - 1; else ref_area_sz = ctx->lane_length - ctx->segment_length + ((index == 0) ? (-1) : 0); if (slice != ARGON2_SYNC_POINTS - 1) start_pos = (slice + 1) * ctx->segment_length; break; } rel_pos = pseudo_rand; rel_pos = rel_pos * rel_pos >> 32; rel_pos = ref_area_sz - 1 - (ref_area_sz * rel_pos >> 32); abs_pos = (start_pos + rel_pos) % ctx->lane_length; return abs_pos; } static void fill_segment(const KDF_ARGON2 *ctx, uint32_t pass, uint32_t lane, uint8_t slice) { BLOCK *ref_block = NULL, *curr_block = NULL; BLOCK address_block, input_block, zero_block; uint64_t rnd, ref_index, ref_lane; uint32_t prev_offset; uint32_t start_idx; uint32_t j; uint32_t curr_offset; /* Offset of the current block */ memset(&input_block, 0, sizeof(BLOCK)); if (ctx == NULL) return; if (data_indep_addressing(ctx, pass, slice)) { init_block_value(&zero_block, 0); init_block_value(&input_block, 0); input_block.v[0] = pass; input_block.v[1] = lane; input_block.v[2] = slice; input_block.v[3] = ctx->memory_blocks; input_block.v[4] = ctx->passes; input_block.v[5] = ctx->type; } start_idx = 0; /* We've generated the first two blocks. Generate the 1st block of addrs. */ if ((pass == 0) && (slice == 0)) { start_idx = 2; if (data_indep_addressing(ctx, pass, slice)) next_addresses(&address_block, &input_block, &zero_block); } curr_offset = lane * ctx->lane_length + slice * ctx->segment_length + start_idx; if ((curr_offset % ctx->lane_length) == 0) prev_offset = curr_offset + ctx->lane_length - 1; else prev_offset = curr_offset - 1; for (j = start_idx; j < ctx->segment_length; ++j, ++curr_offset, ++prev_offset) { if (curr_offset % ctx->lane_length == 1) prev_offset = curr_offset - 1; /* Taking pseudo-random value from the previous block. */ if (data_indep_addressing(ctx, pass, slice)) { if (j % ARGON2_ADDRESSES_IN_BLOCK == 0) next_addresses(&address_block, &input_block, &zero_block); rnd = address_block.v[j % ARGON2_ADDRESSES_IN_BLOCK]; } else { rnd = ctx->memory[prev_offset].v[0]; } /* Computing the lane of the reference block */ ref_lane = ((rnd >> 32)) % ctx->lanes; /* Can not reference other lanes yet */ if ((pass == 0) && (slice == 0)) ref_lane = lane; /* Computing the number of possible reference block within the lane. */ ref_index = index_alpha(ctx, pass, slice, j, rnd & 0xFFFFFFFF, ref_lane == lane); /* Creating a new block */ ref_block = ctx->memory + ctx->lane_length * ref_lane + ref_index; curr_block = ctx->memory + curr_offset; if (ARGON2_VERSION_10 == ctx->version) { /* Version 1.2.1 and earlier: overwrite, not XOR */ fill_block(ctx->memory + prev_offset, ref_block, curr_block, 0); continue; } fill_block(ctx->memory + prev_offset, ref_block, curr_block, pass == 0 ? 0 : 1); } } # if !defined(ARGON2_NO_THREADS) static uint32_t fill_segment_thr(void *thread_data) { ARGON2_THREAD_DATA *my_data; my_data = (ARGON2_THREAD_DATA *) thread_data; fill_segment(my_data->ctx, my_data->pos.pass, my_data->pos.lane, my_data->pos.slice); return 0; } static int fill_mem_blocks_mt(KDF_ARGON2 *ctx) { uint32_t r, s, l, ll; void **t; ARGON2_THREAD_DATA *t_data; t = OPENSSL_zalloc(sizeof(void *)*ctx->lanes); t_data = OPENSSL_zalloc(ctx->lanes * sizeof(ARGON2_THREAD_DATA)); if (t == NULL || t_data == NULL) goto fail; for (r = 0; r < ctx->passes; ++r) { for (s = 0; s < ARGON2_SYNC_POINTS; ++s) { for (l = 0; l < ctx->lanes; ++l) { ARGON2_POS p; if (l >= ctx->threads) { if (ossl_crypto_thread_join(t[l - ctx->threads], NULL) == 0) goto fail; if (ossl_crypto_thread_clean(t[l - ctx->threads]) == 0) goto fail; t[l] = NULL; } p.pass = r; p.lane = l; p.slice = (uint8_t)s; p.index = 0; t_data[l].ctx = ctx; memcpy(&(t_data[l].pos), &p, sizeof(ARGON2_POS)); t[l] = ossl_crypto_thread_start(ctx->libctx, &fill_segment_thr, (void *) &t_data[l]); if (t[l] == NULL) { for (ll = 0; ll < l; ++ll) { if (ossl_crypto_thread_join(t[ll], NULL) == 0) goto fail; if (ossl_crypto_thread_clean(t[ll]) == 0) goto fail; t[ll] = NULL; } goto fail; } } for (l = ctx->lanes - ctx->threads; l < ctx->lanes; ++l) { if (ossl_crypto_thread_join(t[l], NULL) == 0) goto fail; if (ossl_crypto_thread_clean(t[l]) == 0) goto fail; t[l] = NULL; } } } OPENSSL_free(t_data); OPENSSL_free(t); return 1; fail: if (t_data != NULL) OPENSSL_free(t_data); if (t != NULL) OPENSSL_free(t); return 0; } # endif /* !defined(ARGON2_NO_THREADS) */ static int fill_mem_blocks_st(KDF_ARGON2 *ctx) { uint32_t r, s, l; for (r = 0; r < ctx->passes; ++r) for (s = 0; s < ARGON2_SYNC_POINTS; ++s) for (l = 0; l < ctx->lanes; ++l) fill_segment(ctx, r, l, s); return 1; } static ossl_inline int fill_memory_blocks(KDF_ARGON2 *ctx) { # if !defined(ARGON2_NO_THREADS) return ctx->threads == 1 ? fill_mem_blocks_st(ctx) : fill_mem_blocks_mt(ctx); # else return ctx->threads == 1 ? fill_mem_blocks_st(ctx) : 0; # endif } static void initial_hash(uint8_t *blockhash, KDF_ARGON2 *ctx) { EVP_MD_CTX *mdctx; uint8_t value[sizeof(uint32_t)]; unsigned int tmp; uint32_t args[7]; if (ctx == NULL || blockhash == NULL) return; args[0] = ctx->lanes; args[1] = ctx->outlen; args[2] = ctx->m_cost; args[3] = ctx->t_cost; args[4] = ctx->version; args[5] = (uint32_t) ctx->type; args[6] = ctx->pwdlen; mdctx = EVP_MD_CTX_create(); if (mdctx == NULL || EVP_DigestInit_ex(mdctx, ctx->md, NULL) != 1) goto fail; for (tmp = 0; tmp < sizeof(args) / sizeof(uint32_t); ++tmp) { store32((uint8_t *) &value, args[tmp]); if (EVP_DigestUpdate(mdctx, &value, sizeof(value)) != 1) goto fail; } if (ctx->pwd != NULL) { if (EVP_DigestUpdate(mdctx, ctx->pwd, ctx->pwdlen) != 1) goto fail; if (ctx->early_clean) { OPENSSL_cleanse(ctx->pwd, ctx->pwdlen); ctx->pwdlen = 0; } } store32((uint8_t *) &value, ctx->saltlen); if (EVP_DigestUpdate(mdctx, &value, sizeof(value)) != 1) goto fail; if (ctx->salt != NULL) if (EVP_DigestUpdate(mdctx, ctx->salt, ctx->saltlen) != 1) goto fail; store32((uint8_t *) &value, ctx->secretlen); if (EVP_DigestUpdate(mdctx, &value, sizeof(value)) != 1) goto fail; if (ctx->secret != NULL) { if (EVP_DigestUpdate(mdctx, ctx->secret, ctx->secretlen) != 1) goto fail; if (ctx->early_clean) { OPENSSL_cleanse(ctx->secret, ctx->secretlen); ctx->secretlen = 0; } } store32((uint8_t *) &value, ctx->adlen); if (EVP_DigestUpdate(mdctx, &value, sizeof(value)) != 1) goto fail; if (ctx->ad != NULL) if (EVP_DigestUpdate(mdctx, ctx->ad, ctx->adlen) != 1) goto fail; tmp = ARGON2_PREHASH_DIGEST_LENGTH; if (EVP_DigestFinal_ex(mdctx, blockhash, &tmp) != 1) goto fail; fail: EVP_MD_CTX_destroy(mdctx); } static int initialize(KDF_ARGON2 *ctx) { uint8_t blockhash[ARGON2_PREHASH_SEED_LENGTH]; if (ctx == NULL) return 0; if (ctx->memory_blocks * sizeof(BLOCK) / sizeof(BLOCK) != ctx->memory_blocks) return 0; if (ctx->type != ARGON2_D) ctx->memory = OPENSSL_secure_zalloc(ctx->memory_blocks * sizeof(BLOCK)); else ctx->memory = OPENSSL_zalloc(ctx->memory_blocks * sizeof(BLOCK)); if (ctx->memory == NULL) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_MEMORY_SIZE, "cannot allocate required memory"); return 0; } initial_hash(blockhash, ctx); OPENSSL_cleanse(blockhash + ARGON2_PREHASH_DIGEST_LENGTH, ARGON2_PREHASH_SEED_LENGTH - ARGON2_PREHASH_DIGEST_LENGTH); fill_first_blocks(blockhash, ctx); OPENSSL_cleanse(blockhash, ARGON2_PREHASH_SEED_LENGTH); return 1; } static void finalize(const KDF_ARGON2 *ctx, void *out) { BLOCK blockhash; uint8_t blockhash_bytes[ARGON2_BLOCK_SIZE]; uint32_t last_block_in_lane; uint32_t l; if (ctx == NULL) return; copy_block(&blockhash, ctx->memory + ctx->lane_length - 1); /* XOR the last blocks */ for (l = 1; l < ctx->lanes; ++l) { last_block_in_lane = l * ctx->lane_length + (ctx->lane_length - 1); xor_block(&blockhash, ctx->memory + last_block_in_lane); } /* Hash the result */ store_block(blockhash_bytes, &blockhash); blake2b_long(ctx->md, ctx->mac, out, ctx->outlen, blockhash_bytes, ARGON2_BLOCK_SIZE); OPENSSL_cleanse(blockhash.v, ARGON2_BLOCK_SIZE); OPENSSL_cleanse(blockhash_bytes, ARGON2_BLOCK_SIZE); if (ctx->type != ARGON2_D) OPENSSL_secure_clear_free(ctx->memory, ctx->memory_blocks * sizeof(BLOCK)); else OPENSSL_clear_free(ctx->memory, ctx->memory_blocks * sizeof(BLOCK)); } static int blake2b_mac(EVP_MAC *mac, void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen) { int ret = 0; size_t par_n = 0, out_written; EVP_MAC_CTX *ctx = NULL; OSSL_PARAM par[3]; if ((ctx = EVP_MAC_CTX_new(mac)) == NULL) goto fail; par[par_n++] = OSSL_PARAM_construct_octet_string(OSSL_MAC_PARAM_KEY, (void *) key, keylen); par[par_n++] = OSSL_PARAM_construct_size_t(OSSL_MAC_PARAM_SIZE, &outlen); par[par_n++] = OSSL_PARAM_construct_end(); ret = EVP_MAC_CTX_set_params(ctx, par) == 1 && EVP_MAC_init(ctx, NULL, 0, NULL) == 1 && EVP_MAC_update(ctx, in, inlen) == 1 && EVP_MAC_final(ctx, out, (size_t *) &out_written, outlen) == 1; fail: EVP_MAC_CTX_free(ctx); return ret; } static int blake2b_md(EVP_MD *md, void *out, size_t outlen, const void *in, size_t inlen) { int ret = 0; EVP_MD_CTX *ctx = NULL; OSSL_PARAM par[2]; if ((ctx = EVP_MD_CTX_create()) == NULL) return 0; par[0] = OSSL_PARAM_construct_size_t(OSSL_DIGEST_PARAM_SIZE, &outlen); par[1] = OSSL_PARAM_construct_end(); ret = EVP_DigestInit_ex2(ctx, md, par) == 1 && EVP_DigestUpdate(ctx, in, inlen) == 1 && EVP_DigestFinal_ex(ctx, out, NULL) == 1; EVP_MD_CTX_free(ctx); return ret; } static int blake2b(EVP_MD *md, EVP_MAC *mac, void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen) { if (out == NULL || outlen == 0) return 0; if (key == NULL || keylen == 0) return blake2b_md(md, out, outlen, in, inlen); return blake2b_mac(mac, out, outlen, in, inlen, key, keylen); } static int blake2b_long(EVP_MD *md, EVP_MAC *mac, unsigned char *out, size_t outlen, const void *in, size_t inlen) { int ret = 0; EVP_MD_CTX *ctx = NULL; uint32_t outlen_curr; uint8_t outbuf[BLAKE2B_OUTBYTES]; uint8_t inbuf[BLAKE2B_OUTBYTES]; uint8_t outlen_bytes[sizeof(uint32_t)] = {0}; OSSL_PARAM par[2]; size_t outlen_md; if (out == NULL || outlen == 0) return 0; /* Ensure little-endian byte order */ store32(outlen_bytes, (uint32_t)outlen); if ((ctx = EVP_MD_CTX_create()) == NULL) return 0; outlen_md = (outlen <= BLAKE2B_OUTBYTES) ? outlen : BLAKE2B_OUTBYTES; par[0] = OSSL_PARAM_construct_size_t(OSSL_DIGEST_PARAM_SIZE, &outlen_md); par[1] = OSSL_PARAM_construct_end(); ret = EVP_DigestInit_ex2(ctx, md, par) == 1 && EVP_DigestUpdate(ctx, outlen_bytes, sizeof(outlen_bytes)) == 1 && EVP_DigestUpdate(ctx, in, inlen) == 1 && EVP_DigestFinal_ex(ctx, (outlen > BLAKE2B_OUTBYTES) ? outbuf : out, NULL) == 1; if (ret == 0) goto fail; if (outlen > BLAKE2B_OUTBYTES) { memcpy(out, outbuf, BLAKE2B_OUTBYTES / 2); out += BLAKE2B_OUTBYTES / 2; outlen_curr = (uint32_t) outlen - BLAKE2B_OUTBYTES / 2; while (outlen_curr > BLAKE2B_OUTBYTES) { memcpy(inbuf, outbuf, BLAKE2B_OUTBYTES); if (blake2b(md, mac, outbuf, BLAKE2B_OUTBYTES, inbuf, BLAKE2B_OUTBYTES, NULL, 0) != 1) goto fail; memcpy(out, outbuf, BLAKE2B_OUTBYTES / 2); out += BLAKE2B_OUTBYTES / 2; outlen_curr -= BLAKE2B_OUTBYTES / 2; } memcpy(inbuf, outbuf, BLAKE2B_OUTBYTES); if (blake2b(md, mac, outbuf, outlen_curr, inbuf, BLAKE2B_OUTBYTES, NULL, 0) != 1) goto fail; memcpy(out, outbuf, outlen_curr); } ret = 1; fail: EVP_MD_CTX_free(ctx); return ret; } static void kdf_argon2_init(KDF_ARGON2 *c, ARGON2_TYPE type) { OSSL_LIB_CTX *libctx; libctx = c->libctx; memset(c, 0, sizeof(*c)); c->libctx = libctx; c->outlen = ARGON2_DEFAULT_OUTLEN; c->t_cost = ARGON2_DEFAULT_T_COST; c->m_cost = ARGON2_DEFAULT_M_COST; c->lanes = ARGON2_DEFAULT_LANES; c->threads = ARGON2_DEFAULT_THREADS; c->version = ARGON2_DEFAULT_VERSION; c->type = type; } static void *kdf_argon2d_new(void *provctx) { KDF_ARGON2 *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE); return NULL; } ctx->libctx = PROV_LIBCTX_OF(provctx); kdf_argon2_init(ctx, ARGON2_D); return ctx; } static void *kdf_argon2i_new(void *provctx) { KDF_ARGON2 *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE); return NULL; } ctx->libctx = PROV_LIBCTX_OF(provctx); kdf_argon2_init(ctx, ARGON2_I); return ctx; } static void *kdf_argon2id_new(void *provctx) { KDF_ARGON2 *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE); return NULL; } ctx->libctx = PROV_LIBCTX_OF(provctx); kdf_argon2_init(ctx, ARGON2_ID); return ctx; } static void kdf_argon2_free(void *vctx) { KDF_ARGON2 *ctx = (KDF_ARGON2 *)vctx; if (ctx == NULL) return; if (ctx->pwd != NULL) OPENSSL_clear_free(ctx->pwd, ctx->pwdlen); if (ctx->salt != NULL) OPENSSL_clear_free(ctx->salt, ctx->saltlen); if (ctx->secret != NULL) OPENSSL_clear_free(ctx->secret, ctx->secretlen); if (ctx->ad != NULL) OPENSSL_clear_free(ctx->ad, ctx->adlen); EVP_MD_free(ctx->md); EVP_MAC_free(ctx->mac); OPENSSL_free(ctx->propq); memset(ctx, 0, sizeof(*ctx)); OPENSSL_free(ctx); } static int kdf_argon2_derive(void *vctx, unsigned char *out, size_t outlen, const OSSL_PARAM params[]) { KDF_ARGON2 *ctx; uint32_t memory_blocks, segment_length; ctx = (KDF_ARGON2 *)vctx; if (!ossl_prov_is_running() || !kdf_argon2_set_ctx_params(vctx, params)) return 0; if (ctx->mac == NULL) ctx->mac = EVP_MAC_fetch(ctx->libctx, "blake2bmac", ctx->propq); if (ctx->mac == NULL) { ERR_raise_data(ERR_LIB_PROV, PROV_R_MISSING_MAC, "cannot fetch blake2bmac"); return 0; } if (ctx->md == NULL) ctx->md = EVP_MD_fetch(ctx->libctx, "blake2b512", ctx->propq); if (ctx->md == NULL) { ERR_raise_data(ERR_LIB_PROV, PROV_R_MISSING_MESSAGE_DIGEST, "cannot fetch blake2b512"); return 0; } if (ctx->salt == NULL || ctx->saltlen == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_SALT); return 0; } if (outlen != ctx->outlen) { if (OSSL_PARAM_locate((OSSL_PARAM *)params, "size") != NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL); return 0; } if (!kdf_argon2_ctx_set_out_length(ctx, (uint32_t) outlen)) return 0; } switch (ctx->type) { case ARGON2_D: case ARGON2_I: case ARGON2_ID: break; default: ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_MODE, "invalid Argon2 type"); return 0; } if (ctx->threads > 1) { # ifdef ARGON2_NO_THREADS ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_THREAD_POOL_SIZE, "requested %u threads, single-threaded mode supported only", ctx->threads); return 0; # else if (ctx->threads > ossl_get_avail_threads(ctx->libctx)) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_THREAD_POOL_SIZE, "requested %u threads, available: 1", ossl_get_avail_threads(ctx->libctx)); return 0; } # endif if (ctx->threads > ctx->lanes) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_THREAD_POOL_SIZE, "requested more threads (%u) than lanes (%u)", ctx->threads, ctx->lanes); return 0; } } if (ctx->m_cost < 8 * ctx->lanes) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_MEMORY_SIZE, "m_cost must be greater or equal than 8 times the number of lanes"); return 0; } memory_blocks = ctx->m_cost; if (memory_blocks < 2 * ARGON2_SYNC_POINTS * ctx->lanes) memory_blocks = 2 * ARGON2_SYNC_POINTS * ctx->lanes; /* Ensure that all segments have equal length */ segment_length = memory_blocks / (ctx->lanes * ARGON2_SYNC_POINTS); memory_blocks = segment_length * (ctx->lanes * ARGON2_SYNC_POINTS); ctx->memory = NULL; ctx->memory_blocks = memory_blocks; ctx->segment_length = segment_length; ctx->passes = ctx->t_cost; ctx->lane_length = segment_length * ARGON2_SYNC_POINTS; if (initialize(ctx) != 1) return 0; if (fill_memory_blocks(ctx) != 1) return 0; finalize(ctx, out); return 1; } static void kdf_argon2_reset(void *vctx) { OSSL_LIB_CTX *libctx; KDF_ARGON2 *ctx; ARGON2_TYPE type; ctx = (KDF_ARGON2 *) vctx; type = ctx->type; libctx = ctx->libctx; EVP_MD_free(ctx->md); EVP_MAC_free(ctx->mac); OPENSSL_free(ctx->propq); if (ctx->pwd != NULL) OPENSSL_clear_free(ctx->pwd, ctx->pwdlen); if (ctx->salt != NULL) OPENSSL_clear_free(ctx->salt, ctx->saltlen); if (ctx->secret != NULL) OPENSSL_clear_free(ctx->secret, ctx->secretlen); if (ctx->ad != NULL) OPENSSL_clear_free(ctx->ad, ctx->adlen); memset(ctx, 0, sizeof(*ctx)); ctx->libctx = libctx; kdf_argon2_init(ctx, type); } static int kdf_argon2_ctx_set_threads(KDF_ARGON2 *ctx, uint32_t threads) { if (threads < ARGON2_MIN_THREADS) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_THREAD_POOL_SIZE, "min threads: %u", ARGON2_MIN_THREADS); return 0; } if (threads > ARGON2_MAX_THREADS) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_THREAD_POOL_SIZE, "max threads: %u", ARGON2_MAX_THREADS); return 0; } ctx->threads = threads; return 1; } static int kdf_argon2_ctx_set_lanes(KDF_ARGON2 *ctx, uint32_t lanes) { if (lanes > ARGON2_MAX_LANES) { ERR_raise_data(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER, "max lanes: %u", ARGON2_MAX_LANES); return 0; } if (lanes < ARGON2_MIN_LANES) { ERR_raise_data(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER, "min lanes: %u", ARGON2_MIN_LANES); return 0; } ctx->lanes = lanes; return 1; } static int kdf_argon2_ctx_set_t_cost(KDF_ARGON2 *ctx, uint32_t t_cost) { /* ARGON2_MAX_MEMORY == max m_cost value, so skip check */ if (t_cost < ARGON2_MIN_TIME) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_ITERATION_COUNT, "min: %u", ARGON2_MIN_TIME); return 0; } ctx->t_cost = t_cost; return 1; } static int kdf_argon2_ctx_set_m_cost(KDF_ARGON2 *ctx, uint32_t m_cost) { /* ARGON2_MAX_MEMORY == max m_cost value, so skip check */ if (m_cost < ARGON2_MIN_MEMORY) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_MEMORY_SIZE, "min: %u", ARGON2_MIN_MEMORY); return 0; } ctx->m_cost = m_cost; return 1; } static int kdf_argon2_ctx_set_out_length(KDF_ARGON2 *ctx, uint32_t outlen) { /* * ARGON2_MAX_OUT_LENGTH == max outlen value, so upper bounds checks * are always satisfied; to suppress compiler if statement tautology * warnings, these checks are skipped. */ if (outlen < ARGON2_MIN_OUT_LENGTH) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_OUTPUT_LENGTH, "min: %u", ARGON2_MIN_OUT_LENGTH); return 0; } ctx->outlen = outlen; return 1; } static int kdf_argon2_ctx_set_secret(KDF_ARGON2 *ctx, const OSSL_PARAM *p) { size_t buflen; if (p->data == NULL) return 0; if (ctx->secret != NULL) { OPENSSL_clear_free(ctx->secret, ctx->secretlen); ctx->secret = NULL; ctx->secretlen = 0U; } if (!OSSL_PARAM_get_octet_string(p, (void **)&ctx->secret, 0, &buflen)) return 0; if (buflen > ARGON2_MAX_SECRET) { OPENSSL_free(ctx->secret); ctx->secret = NULL; ctx->secretlen = 0U; return 0; } ctx->secretlen = (uint32_t) buflen; return 1; } static int kdf_argon2_ctx_set_pwd(KDF_ARGON2 *ctx, const OSSL_PARAM *p) { size_t buflen; if (p->data == NULL) return 0; if (ctx->pwd != NULL) { OPENSSL_clear_free(ctx->pwd, ctx->pwdlen); ctx->pwd = NULL; ctx->pwdlen = 0U; } if (!OSSL_PARAM_get_octet_string(p, (void **)&ctx->pwd, 0, &buflen)) return 0; if (buflen > ARGON2_MAX_PWD_LENGTH) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_SALT_LENGTH, "max: %u", ARGON2_MAX_PWD_LENGTH); goto fail; } ctx->pwdlen = (uint32_t) buflen; return 1; fail: OPENSSL_free(ctx->pwd); ctx->pwd = NULL; ctx->pwdlen = 0U; return 0; } static int kdf_argon2_ctx_set_salt(KDF_ARGON2 *ctx, const OSSL_PARAM *p) { size_t buflen; if (p->data == NULL) return 0; if (ctx->salt != NULL) { OPENSSL_clear_free(ctx->salt, ctx->saltlen); ctx->salt = NULL; ctx->saltlen = 0U; } if (!OSSL_PARAM_get_octet_string(p, (void **)&ctx->salt, 0, &buflen)) return 0; if (buflen < ARGON2_MIN_SALT_LENGTH) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_SALT_LENGTH, "min: %u", ARGON2_MIN_SALT_LENGTH); goto fail; } if (buflen > ARGON2_MAX_SALT_LENGTH) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_SALT_LENGTH, "max: %u", ARGON2_MAX_SALT_LENGTH); goto fail; } ctx->saltlen = (uint32_t) buflen; return 1; fail: OPENSSL_free(ctx->salt); ctx->salt = NULL; ctx->saltlen = 0U; return 0; } static int kdf_argon2_ctx_set_ad(KDF_ARGON2 *ctx, const OSSL_PARAM *p) { size_t buflen; if (p->data == NULL) return 0; if (ctx->ad != NULL) { OPENSSL_clear_free(ctx->ad, ctx->adlen); ctx->ad = NULL; ctx->adlen = 0U; } if (!OSSL_PARAM_get_octet_string(p, (void **)&ctx->ad, 0, &buflen)) return 0; if (buflen > ARGON2_MAX_AD_LENGTH) { OPENSSL_free(ctx->ad); ctx->ad = NULL; ctx->adlen = 0U; return 0; } ctx->adlen = (uint32_t) buflen; return 1; } static void kdf_argon2_ctx_set_flag_early_clean(KDF_ARGON2 *ctx, uint32_t f) { ctx->early_clean = !!(f); } static int kdf_argon2_ctx_set_version(KDF_ARGON2 *ctx, uint32_t version) { switch (version) { case ARGON2_VERSION_10: case ARGON2_VERSION_13: ctx->version = version; return 1; default: ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_MODE, "invalid Argon2 version"); return 0; } } static int set_property_query(KDF_ARGON2 *ctx, const char *propq) { OPENSSL_free(ctx->propq); ctx->propq = NULL; if (propq != NULL) { ctx->propq = OPENSSL_strdup(propq); if (ctx->propq == NULL) return 0; } EVP_MD_free(ctx->md); ctx->md = NULL; EVP_MAC_free(ctx->mac); ctx->mac = NULL; return 1; } static int kdf_argon2_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { const OSSL_PARAM *p; KDF_ARGON2 *ctx; uint32_t u32_value; if (params == NULL) return 1; ctx = (KDF_ARGON2 *) vctx; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_PASSWORD)) != NULL) if (!kdf_argon2_ctx_set_pwd(ctx, p)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_SALT)) != NULL) if (!kdf_argon2_ctx_set_salt(ctx, p)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_SECRET)) != NULL) if (!kdf_argon2_ctx_set_secret(ctx, p)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_ARGON2_AD)) != NULL) if (!kdf_argon2_ctx_set_ad(ctx, p)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_SIZE)) != NULL) { if (!OSSL_PARAM_get_uint32(p, &u32_value)) return 0; if (!kdf_argon2_ctx_set_out_length(ctx, u32_value)) return 0; } if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_ITER)) != NULL) { if (!OSSL_PARAM_get_uint32(p, &u32_value)) return 0; if (!kdf_argon2_ctx_set_t_cost(ctx, u32_value)) return 0; } if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_THREADS)) != NULL) { if (!OSSL_PARAM_get_uint32(p, &u32_value)) return 0; if (!kdf_argon2_ctx_set_threads(ctx, u32_value)) return 0; } if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_ARGON2_LANES)) != NULL) { if (!OSSL_PARAM_get_uint32(p, &u32_value)) return 0; if (!kdf_argon2_ctx_set_lanes(ctx, u32_value)) return 0; } if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_ARGON2_MEMCOST)) != NULL) { if (!OSSL_PARAM_get_uint32(p, &u32_value)) return 0; if (!kdf_argon2_ctx_set_m_cost(ctx, u32_value)) return 0; } if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_EARLY_CLEAN)) != NULL) { if (!OSSL_PARAM_get_uint32(p, &u32_value)) return 0; kdf_argon2_ctx_set_flag_early_clean(ctx, u32_value); } if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_ARGON2_VERSION)) != NULL) { if (!OSSL_PARAM_get_uint32(p, &u32_value)) return 0; if (!kdf_argon2_ctx_set_version(ctx, u32_value)) return 0; } if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_PROPERTIES)) != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING || !set_property_query(ctx, p->data)) return 0; } return 1; } static const OSSL_PARAM *kdf_argon2_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *p_ctx) { static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_octet_string(OSSL_KDF_PARAM_PASSWORD, NULL, 0), OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0), OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SECRET, NULL, 0), OSSL_PARAM_octet_string(OSSL_KDF_PARAM_ARGON2_AD, NULL, 0), OSSL_PARAM_uint32(OSSL_KDF_PARAM_SIZE, NULL), OSSL_PARAM_uint32(OSSL_KDF_PARAM_ITER, NULL), OSSL_PARAM_uint32(OSSL_KDF_PARAM_THREADS, NULL), OSSL_PARAM_uint32(OSSL_KDF_PARAM_ARGON2_LANES, NULL), OSSL_PARAM_uint32(OSSL_KDF_PARAM_ARGON2_MEMCOST, NULL), OSSL_PARAM_uint32(OSSL_KDF_PARAM_EARLY_CLEAN, NULL), OSSL_PARAM_uint32(OSSL_KDF_PARAM_ARGON2_VERSION, NULL), OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_END }; return known_settable_ctx_params; } static int kdf_argon2_get_ctx_params(void *vctx, OSSL_PARAM params[]) { OSSL_PARAM *p; (void) vctx; if ((p = OSSL_PARAM_locate(params, OSSL_KDF_PARAM_SIZE)) != NULL) return OSSL_PARAM_set_size_t(p, SIZE_MAX); return -2; } static const OSSL_PARAM *kdf_argon2_gettable_ctx_params(ossl_unused void *ctx, ossl_unused void *p_ctx) { static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL), OSSL_PARAM_END }; return known_gettable_ctx_params; } const OSSL_DISPATCH ossl_kdf_argon2i_functions[] = { { OSSL_FUNC_KDF_NEWCTX, (void(*)(void))kdf_argon2i_new }, { OSSL_FUNC_KDF_FREECTX, (void(*)(void))kdf_argon2_free }, { OSSL_FUNC_KDF_RESET, (void(*)(void))kdf_argon2_reset }, { OSSL_FUNC_KDF_DERIVE, (void(*)(void))kdf_argon2_derive }, { OSSL_FUNC_KDF_SETTABLE_CTX_PARAMS, (void(*)(void))kdf_argon2_settable_ctx_params }, { OSSL_FUNC_KDF_SET_CTX_PARAMS, (void(*)(void))kdf_argon2_set_ctx_params }, { OSSL_FUNC_KDF_GETTABLE_CTX_PARAMS, (void(*)(void))kdf_argon2_gettable_ctx_params }, { OSSL_FUNC_KDF_GET_CTX_PARAMS, (void(*)(void))kdf_argon2_get_ctx_params }, OSSL_DISPATCH_END }; const OSSL_DISPATCH ossl_kdf_argon2d_functions[] = { { OSSL_FUNC_KDF_NEWCTX, (void(*)(void))kdf_argon2d_new }, { OSSL_FUNC_KDF_FREECTX, (void(*)(void))kdf_argon2_free }, { OSSL_FUNC_KDF_RESET, (void(*)(void))kdf_argon2_reset }, { OSSL_FUNC_KDF_DERIVE, (void(*)(void))kdf_argon2_derive }, { OSSL_FUNC_KDF_SETTABLE_CTX_PARAMS, (void(*)(void))kdf_argon2_settable_ctx_params }, { OSSL_FUNC_KDF_SET_CTX_PARAMS, (void(*)(void))kdf_argon2_set_ctx_params }, { OSSL_FUNC_KDF_GETTABLE_CTX_PARAMS, (void(*)(void))kdf_argon2_gettable_ctx_params }, { OSSL_FUNC_KDF_GET_CTX_PARAMS, (void(*)(void))kdf_argon2_get_ctx_params }, OSSL_DISPATCH_END }; const OSSL_DISPATCH ossl_kdf_argon2id_functions[] = { { OSSL_FUNC_KDF_NEWCTX, (void(*)(void))kdf_argon2id_new }, { OSSL_FUNC_KDF_FREECTX, (void(*)(void))kdf_argon2_free }, { OSSL_FUNC_KDF_RESET, (void(*)(void))kdf_argon2_reset }, { OSSL_FUNC_KDF_DERIVE, (void(*)(void))kdf_argon2_derive }, { OSSL_FUNC_KDF_SETTABLE_CTX_PARAMS, (void(*)(void))kdf_argon2_settable_ctx_params }, { OSSL_FUNC_KDF_SET_CTX_PARAMS, (void(*)(void))kdf_argon2_set_ctx_params }, { OSSL_FUNC_KDF_GETTABLE_CTX_PARAMS, (void(*)(void))kdf_argon2_gettable_ctx_params }, { OSSL_FUNC_KDF_GET_CTX_PARAMS, (void(*)(void))kdf_argon2_get_ctx_params }, OSSL_DISPATCH_END }; #endif
./openssl/providers/implementations/kdfs/pbkdf2.c
/* * Copyright 2018-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * HMAC low level APIs are deprecated for public use, but still ok for internal * use. */ #include "internal/deprecated.h" #include <stdlib.h> #include <stdarg.h> #include <string.h> #include <openssl/hmac.h> #include <openssl/evp.h> #include <openssl/kdf.h> #include <openssl/core_names.h> #include <openssl/proverr.h> #include "internal/cryptlib.h" #include "internal/numbers.h" #include "crypto/evp.h" #include "prov/provider_ctx.h" #include "prov/providercommon.h" #include "prov/implementations.h" #include "prov/provider_util.h" #include "pbkdf2.h" /* Constants specified in SP800-132 */ #define KDF_PBKDF2_MIN_KEY_LEN_BITS 112 #define KDF_PBKDF2_MAX_KEY_LEN_DIGEST_RATIO 0xFFFFFFFF #define KDF_PBKDF2_MIN_ITERATIONS 1000 #define KDF_PBKDF2_MIN_SALT_LEN (128 / 8) static OSSL_FUNC_kdf_newctx_fn kdf_pbkdf2_new; static OSSL_FUNC_kdf_dupctx_fn kdf_pbkdf2_dup; static OSSL_FUNC_kdf_freectx_fn kdf_pbkdf2_free; static OSSL_FUNC_kdf_reset_fn kdf_pbkdf2_reset; static OSSL_FUNC_kdf_derive_fn kdf_pbkdf2_derive; static OSSL_FUNC_kdf_settable_ctx_params_fn kdf_pbkdf2_settable_ctx_params; static OSSL_FUNC_kdf_set_ctx_params_fn kdf_pbkdf2_set_ctx_params; static OSSL_FUNC_kdf_gettable_ctx_params_fn kdf_pbkdf2_gettable_ctx_params; static OSSL_FUNC_kdf_get_ctx_params_fn kdf_pbkdf2_get_ctx_params; static int pbkdf2_derive(const char *pass, size_t passlen, const unsigned char *salt, int saltlen, uint64_t iter, const EVP_MD *digest, unsigned char *key, size_t keylen, int extra_checks); typedef struct { void *provctx; unsigned char *pass; size_t pass_len; unsigned char *salt; size_t salt_len; uint64_t iter; PROV_DIGEST digest; int lower_bound_checks; } KDF_PBKDF2; static void kdf_pbkdf2_init(KDF_PBKDF2 *ctx); static void *kdf_pbkdf2_new_no_init(void *provctx) { KDF_PBKDF2 *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx == NULL) return NULL; ctx->provctx = provctx; return ctx; } static void *kdf_pbkdf2_new(void *provctx) { KDF_PBKDF2 *ctx = kdf_pbkdf2_new_no_init(provctx); if (ctx != NULL) kdf_pbkdf2_init(ctx); return ctx; } static void kdf_pbkdf2_cleanup(KDF_PBKDF2 *ctx) { ossl_prov_digest_reset(&ctx->digest); OPENSSL_free(ctx->salt); OPENSSL_clear_free(ctx->pass, ctx->pass_len); memset(ctx, 0, sizeof(*ctx)); } static void kdf_pbkdf2_free(void *vctx) { KDF_PBKDF2 *ctx = (KDF_PBKDF2 *)vctx; if (ctx != NULL) { kdf_pbkdf2_cleanup(ctx); OPENSSL_free(ctx); } } static void kdf_pbkdf2_reset(void *vctx) { KDF_PBKDF2 *ctx = (KDF_PBKDF2 *)vctx; void *provctx = ctx->provctx; kdf_pbkdf2_cleanup(ctx); ctx->provctx = provctx; kdf_pbkdf2_init(ctx); } static void *kdf_pbkdf2_dup(void *vctx) { const KDF_PBKDF2 *src = (const KDF_PBKDF2 *)vctx; KDF_PBKDF2 *dest; /* We need a new PBKDF2 object but uninitialised since we're filling it */ dest = kdf_pbkdf2_new_no_init(src->provctx); if (dest != NULL) { if (!ossl_prov_memdup(src->salt, src->salt_len, &dest->salt, &dest->salt_len) || !ossl_prov_memdup(src->pass, src->pass_len, &dest->pass, &dest->pass_len) || !ossl_prov_digest_copy(&dest->digest, &src->digest)) goto err; dest->iter = src->iter; dest->lower_bound_checks = src->lower_bound_checks; } return dest; err: kdf_pbkdf2_free(dest); return NULL; } static void kdf_pbkdf2_init(KDF_PBKDF2 *ctx) { OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; OSSL_LIB_CTX *provctx = PROV_LIBCTX_OF(ctx->provctx); params[0] = OSSL_PARAM_construct_utf8_string(OSSL_KDF_PARAM_DIGEST, SN_sha1, 0); if (!ossl_prov_digest_load_from_params(&ctx->digest, params, provctx)) /* This is an error, but there is no way to indicate such directly */ ossl_prov_digest_reset(&ctx->digest); ctx->iter = PKCS5_DEFAULT_ITER; ctx->lower_bound_checks = ossl_kdf_pbkdf2_default_checks; } static int pbkdf2_set_membuf(unsigned char **buffer, size_t *buflen, const OSSL_PARAM *p) { OPENSSL_clear_free(*buffer, *buflen); *buffer = NULL; *buflen = 0; if (p->data_size == 0) { if ((*buffer = OPENSSL_malloc(1)) == NULL) return 0; } else if (p->data != NULL) { if (!OSSL_PARAM_get_octet_string(p, (void **)buffer, 0, buflen)) return 0; } return 1; } static int kdf_pbkdf2_derive(void *vctx, unsigned char *key, size_t keylen, const OSSL_PARAM params[]) { KDF_PBKDF2 *ctx = (KDF_PBKDF2 *)vctx; const EVP_MD *md; if (!ossl_prov_is_running() || !kdf_pbkdf2_set_ctx_params(ctx, params)) return 0; if (ctx->pass == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_PASS); return 0; } if (ctx->salt == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_SALT); return 0; } md = ossl_prov_digest_md(&ctx->digest); return pbkdf2_derive((char *)ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, ctx->iter, md, key, keylen, ctx->lower_bound_checks); } static int kdf_pbkdf2_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { const OSSL_PARAM *p; KDF_PBKDF2 *ctx = vctx; OSSL_LIB_CTX *provctx = PROV_LIBCTX_OF(ctx->provctx); int pkcs5; uint64_t iter, min_iter; if (params == NULL) return 1; if (!ossl_prov_digest_load_from_params(&ctx->digest, params, provctx)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_PKCS5)) != NULL) { if (!OSSL_PARAM_get_int(p, &pkcs5)) return 0; ctx->lower_bound_checks = pkcs5 == 0; } if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_PASSWORD)) != NULL) if (!pbkdf2_set_membuf(&ctx->pass, &ctx->pass_len, p)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_SALT)) != NULL) { if (ctx->lower_bound_checks != 0 && p->data_size < KDF_PBKDF2_MIN_SALT_LEN) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_SALT_LENGTH); return 0; } if (!pbkdf2_set_membuf(&ctx->salt, &ctx->salt_len, p)) return 0; } if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_ITER)) != NULL) { if (!OSSL_PARAM_get_uint64(p, &iter)) return 0; min_iter = ctx->lower_bound_checks != 0 ? KDF_PBKDF2_MIN_ITERATIONS : 1; if (iter < min_iter) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_ITERATION_COUNT); return 0; } ctx->iter = iter; } return 1; } static const OSSL_PARAM *kdf_pbkdf2_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *p_ctx) { static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0), OSSL_PARAM_octet_string(OSSL_KDF_PARAM_PASSWORD, NULL, 0), OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0), OSSL_PARAM_uint64(OSSL_KDF_PARAM_ITER, NULL), OSSL_PARAM_int(OSSL_KDF_PARAM_PKCS5, NULL), OSSL_PARAM_END }; return known_settable_ctx_params; } static int kdf_pbkdf2_get_ctx_params(void *vctx, OSSL_PARAM params[]) { OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_KDF_PARAM_SIZE)) != NULL) return OSSL_PARAM_set_size_t(p, SIZE_MAX); return -2; } static const OSSL_PARAM *kdf_pbkdf2_gettable_ctx_params(ossl_unused void *ctx, ossl_unused void *p_ctx) { static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL), OSSL_PARAM_END }; return known_gettable_ctx_params; } const OSSL_DISPATCH ossl_kdf_pbkdf2_functions[] = { { OSSL_FUNC_KDF_NEWCTX, (void(*)(void))kdf_pbkdf2_new }, { OSSL_FUNC_KDF_DUPCTX, (void(*)(void))kdf_pbkdf2_dup }, { OSSL_FUNC_KDF_FREECTX, (void(*)(void))kdf_pbkdf2_free }, { OSSL_FUNC_KDF_RESET, (void(*)(void))kdf_pbkdf2_reset }, { OSSL_FUNC_KDF_DERIVE, (void(*)(void))kdf_pbkdf2_derive }, { OSSL_FUNC_KDF_SETTABLE_CTX_PARAMS, (void(*)(void))kdf_pbkdf2_settable_ctx_params }, { OSSL_FUNC_KDF_SET_CTX_PARAMS, (void(*)(void))kdf_pbkdf2_set_ctx_params }, { OSSL_FUNC_KDF_GETTABLE_CTX_PARAMS, (void(*)(void))kdf_pbkdf2_gettable_ctx_params }, { OSSL_FUNC_KDF_GET_CTX_PARAMS, (void(*)(void))kdf_pbkdf2_get_ctx_params }, OSSL_DISPATCH_END }; /* * This is an implementation of PKCS#5 v2.0 password based encryption key * derivation function PBKDF2. SHA1 version verified against test vectors * posted by Peter Gutmann to the PKCS-TNG mailing list. * * The constraints specified by SP800-132 have been added i.e. * - Check the range of the key length. * - Minimum iteration count of 1000. * - Randomly-generated portion of the salt shall be at least 128 bits. */ static int pbkdf2_derive(const char *pass, size_t passlen, const unsigned char *salt, int saltlen, uint64_t iter, const EVP_MD *digest, unsigned char *key, size_t keylen, int lower_bound_checks) { int ret = 0; unsigned char digtmp[EVP_MAX_MD_SIZE], *p, itmp[4]; int cplen, k, tkeylen, mdlen; uint64_t j; unsigned long i = 1; HMAC_CTX *hctx_tpl = NULL, *hctx = NULL; mdlen = EVP_MD_get_size(digest); if (mdlen <= 0) return 0; /* * This check should always be done because keylen / mdlen >= (2^32 - 1) * results in an overflow of the loop counter 'i'. */ if ((keylen / mdlen) >= KDF_PBKDF2_MAX_KEY_LEN_DIGEST_RATIO) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } if (lower_bound_checks) { if ((keylen * 8) < KDF_PBKDF2_MIN_KEY_LEN_BITS) { ERR_raise(ERR_LIB_PROV, PROV_R_KEY_SIZE_TOO_SMALL); return 0; } if (saltlen < KDF_PBKDF2_MIN_SALT_LEN) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_SALT_LENGTH); return 0; } if (iter < KDF_PBKDF2_MIN_ITERATIONS) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_ITERATION_COUNT); return 0; } } hctx_tpl = HMAC_CTX_new(); if (hctx_tpl == NULL) return 0; p = key; tkeylen = keylen; if (!HMAC_Init_ex(hctx_tpl, pass, passlen, digest, NULL)) goto err; hctx = HMAC_CTX_new(); if (hctx == NULL) goto err; while (tkeylen) { if (tkeylen > mdlen) cplen = mdlen; else cplen = tkeylen; /* * We are unlikely to ever use more than 256 blocks (5120 bits!) but * just in case... */ itmp[0] = (unsigned char)((i >> 24) & 0xff); itmp[1] = (unsigned char)((i >> 16) & 0xff); itmp[2] = (unsigned char)((i >> 8) & 0xff); itmp[3] = (unsigned char)(i & 0xff); if (!HMAC_CTX_copy(hctx, hctx_tpl)) goto err; if (!HMAC_Update(hctx, salt, saltlen) || !HMAC_Update(hctx, itmp, 4) || !HMAC_Final(hctx, digtmp, NULL)) goto err; memcpy(p, digtmp, cplen); for (j = 1; j < iter; j++) { if (!HMAC_CTX_copy(hctx, hctx_tpl)) goto err; if (!HMAC_Update(hctx, digtmp, mdlen) || !HMAC_Final(hctx, digtmp, NULL)) goto err; for (k = 0; k < cplen; k++) p[k] ^= digtmp[k]; } tkeylen -= cplen; i++; p += cplen; } ret = 1; err: HMAC_CTX_free(hctx); HMAC_CTX_free(hctx_tpl); return ret; }
./openssl/providers/implementations/kdfs/pvkkdf.c
/* * Copyright 2018-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <openssl/evp.h> #include <openssl/core_names.h> #include <openssl/proverr.h> #include <openssl/err.h> #include "internal/numbers.h" /* SIZE_MAX */ #include "prov/provider_ctx.h" #include "prov/providercommon.h" #include "prov/implementations.h" #include "prov/provider_util.h" static OSSL_FUNC_kdf_newctx_fn kdf_pvk_new; static OSSL_FUNC_kdf_dupctx_fn kdf_pvk_dup; static OSSL_FUNC_kdf_freectx_fn kdf_pvk_free; static OSSL_FUNC_kdf_reset_fn kdf_pvk_reset; static OSSL_FUNC_kdf_derive_fn kdf_pvk_derive; static OSSL_FUNC_kdf_settable_ctx_params_fn kdf_pvk_settable_ctx_params; static OSSL_FUNC_kdf_set_ctx_params_fn kdf_pvk_set_ctx_params; static OSSL_FUNC_kdf_gettable_ctx_params_fn kdf_pvk_gettable_ctx_params; static OSSL_FUNC_kdf_get_ctx_params_fn kdf_pvk_get_ctx_params; typedef struct { void *provctx; unsigned char *pass; size_t pass_len; unsigned char *salt; size_t salt_len; PROV_DIGEST digest; } KDF_PVK; static void kdf_pvk_init(KDF_PVK *ctx); static void *kdf_pvk_new(void *provctx) { KDF_PVK *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx == NULL) return NULL; ctx->provctx = provctx; kdf_pvk_init(ctx); return ctx; } static void kdf_pvk_cleanup(KDF_PVK *ctx) { ossl_prov_digest_reset(&ctx->digest); OPENSSL_free(ctx->salt); OPENSSL_clear_free(ctx->pass, ctx->pass_len); OPENSSL_cleanse(ctx, sizeof(*ctx)); } static void kdf_pvk_free(void *vctx) { KDF_PVK *ctx = (KDF_PVK *)vctx; if (ctx != NULL) { kdf_pvk_cleanup(ctx); OPENSSL_free(ctx); } } static void *kdf_pvk_dup(void *vctx) { const KDF_PVK *src = (const KDF_PVK *)vctx; KDF_PVK *dest; dest = kdf_pvk_new(src->provctx); if (dest != NULL) if (!ossl_prov_memdup(src->salt, src->salt_len, &dest->salt, &dest->salt_len) || !ossl_prov_memdup(src->pass, src->pass_len, &dest->pass , &dest->pass_len) || !ossl_prov_digest_copy(&dest->digest, &src->digest)) goto err; return dest; err: kdf_pvk_free(dest); return NULL; } static void kdf_pvk_reset(void *vctx) { KDF_PVK *ctx = (KDF_PVK *)vctx; void *provctx = ctx->provctx; kdf_pvk_cleanup(ctx); ctx->provctx = provctx; kdf_pvk_init(ctx); } static void kdf_pvk_init(KDF_PVK *ctx) { OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; OSSL_LIB_CTX *provctx = PROV_LIBCTX_OF(ctx->provctx); params[0] = OSSL_PARAM_construct_utf8_string(OSSL_KDF_PARAM_DIGEST, SN_sha1, 0); if (!ossl_prov_digest_load_from_params(&ctx->digest, params, provctx)) /* This is an error, but there is no way to indicate such directly */ ossl_prov_digest_reset(&ctx->digest); } static int pvk_set_membuf(unsigned char **buffer, size_t *buflen, const OSSL_PARAM *p) { OPENSSL_clear_free(*buffer, *buflen); *buffer = NULL; *buflen = 0; if (p->data_size == 0) { if ((*buffer = OPENSSL_malloc(1)) == NULL) return 0; } else if (p->data != NULL) { if (!OSSL_PARAM_get_octet_string(p, (void **)buffer, 0, buflen)) return 0; } return 1; } static int kdf_pvk_derive(void *vctx, unsigned char *key, size_t keylen, const OSSL_PARAM params[]) { KDF_PVK *ctx = (KDF_PVK *)vctx; const EVP_MD *md; EVP_MD_CTX *mctx; int res; if (!ossl_prov_is_running() || !kdf_pvk_set_ctx_params(ctx, params)) return 0; if (ctx->pass == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_PASS); return 0; } if (ctx->salt == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_SALT); return 0; } md = ossl_prov_digest_md(&ctx->digest); if (md == NULL) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_DIGEST); return 0; } res = EVP_MD_get_size(md); if (res <= 0) { ERR_raise(ERR_LIB_PROV, PROV_R_BAD_LENGTH); return 0; } if ((size_t)res > keylen) { ERR_raise(ERR_LIB_PROV, PROV_R_LENGTH_TOO_LARGE); return 0; } mctx = EVP_MD_CTX_new(); res = mctx != NULL && EVP_DigestInit_ex(mctx, md, NULL) && EVP_DigestUpdate(mctx, ctx->salt, ctx->salt_len) && EVP_DigestUpdate(mctx, ctx->pass, ctx->pass_len) && EVP_DigestFinal_ex(mctx, key, NULL); EVP_MD_CTX_free(mctx); return res; } static int kdf_pvk_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { const OSSL_PARAM *p; KDF_PVK *ctx = vctx; OSSL_LIB_CTX *provctx = PROV_LIBCTX_OF(ctx->provctx); if (params == NULL) return 1; if (!ossl_prov_digest_load_from_params(&ctx->digest, params, provctx)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_PASSWORD)) != NULL) if (!pvk_set_membuf(&ctx->pass, &ctx->pass_len, p)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_SALT)) != NULL) { if (!pvk_set_membuf(&ctx->salt, &ctx->salt_len, p)) return 0; } return 1; } static const OSSL_PARAM *kdf_pvk_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *p_ctx) { static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0), OSSL_PARAM_octet_string(OSSL_KDF_PARAM_PASSWORD, NULL, 0), OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0), OSSL_PARAM_END }; return known_settable_ctx_params; } static int kdf_pvk_get_ctx_params(void *vctx, OSSL_PARAM params[]) { OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_KDF_PARAM_SIZE)) != NULL) return OSSL_PARAM_set_size_t(p, SIZE_MAX); return -2; } static const OSSL_PARAM *kdf_pvk_gettable_ctx_params(ossl_unused void *ctx, ossl_unused void *p_ctx) { static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL), OSSL_PARAM_END }; return known_gettable_ctx_params; } const OSSL_DISPATCH ossl_kdf_pvk_functions[] = { { OSSL_FUNC_KDF_NEWCTX, (void(*)(void))kdf_pvk_new }, { OSSL_FUNC_KDF_DUPCTX, (void(*)(void))kdf_pvk_dup }, { OSSL_FUNC_KDF_FREECTX, (void(*)(void))kdf_pvk_free }, { OSSL_FUNC_KDF_RESET, (void(*)(void))kdf_pvk_reset }, { OSSL_FUNC_KDF_DERIVE, (void(*)(void))kdf_pvk_derive }, { OSSL_FUNC_KDF_SETTABLE_CTX_PARAMS, (void(*)(void))kdf_pvk_settable_ctx_params }, { OSSL_FUNC_KDF_SET_CTX_PARAMS, (void(*)(void))kdf_pvk_set_ctx_params }, { OSSL_FUNC_KDF_GETTABLE_CTX_PARAMS, (void(*)(void))kdf_pvk_gettable_ctx_params }, { OSSL_FUNC_KDF_GET_CTX_PARAMS, (void(*)(void))kdf_pvk_get_ctx_params }, OSSL_DISPATCH_END };