| OLD | NEW |
| (Empty) |
| 1 /* crypto/evp/evp_enc.c */ | |
| 2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | |
| 3 * All rights reserved. | |
| 4 * | |
| 5 * This package is an SSL implementation written | |
| 6 * by Eric Young (eay@cryptsoft.com). | |
| 7 * The implementation was written so as to conform with Netscapes SSL. | |
| 8 * | |
| 9 * This library is free for commercial and non-commercial use as long as | |
| 10 * the following conditions are aheared to. The following conditions | |
| 11 * apply to all code found in this distribution, be it the RC4, RSA, | |
| 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation | |
| 13 * included with this distribution is covered by the same copyright terms | |
| 14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). | |
| 15 * | |
| 16 * Copyright remains Eric Young's, and as such any Copyright notices in | |
| 17 * the code are not to be removed. | |
| 18 * If this package is used in a product, Eric Young should be given attribution | |
| 19 * as the author of the parts of the library used. | |
| 20 * This can be in the form of a textual message at program startup or | |
| 21 * in documentation (online or textual) provided with the package. | |
| 22 * | |
| 23 * Redistribution and use in source and binary forms, with or without | |
| 24 * modification, are permitted provided that the following conditions | |
| 25 * are met: | |
| 26 * 1. Redistributions of source code must retain the copyright | |
| 27 * notice, this list of conditions and the following disclaimer. | |
| 28 * 2. Redistributions in binary form must reproduce the above copyright | |
| 29 * notice, this list of conditions and the following disclaimer in the | |
| 30 * documentation and/or other materials provided with the distribution. | |
| 31 * 3. All advertising materials mentioning features or use of this software | |
| 32 * must display the following acknowledgement: | |
| 33 * "This product includes cryptographic software written by | |
| 34 * Eric Young (eay@cryptsoft.com)" | |
| 35 * The word 'cryptographic' can be left out if the rouines from the library | |
| 36 * being used are not cryptographic related :-). | |
| 37 * 4. If you include any Windows specific code (or a derivative thereof) from | |
| 38 * the apps directory (application code) you must include an acknowledgement: | |
| 39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | |
| 40 * | |
| 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | |
| 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
| 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
| 44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | |
| 45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
| 46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
| 47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
| 48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
| 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
| 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
| 51 * SUCH DAMAGE. | |
| 52 * | |
| 53 * The licence and distribution terms for any publically available version or | |
| 54 * derivative of this code cannot be changed. i.e. this code cannot simply be | |
| 55 * copied and put under another distribution licence | |
| 56 * [including the GNU Public Licence.] | |
| 57 */ | |
| 58 | |
| 59 #include <stdio.h> | |
| 60 #include "cryptlib.h" | |
| 61 #include <openssl/evp.h> | |
| 62 #include <openssl/err.h> | |
| 63 #include <openssl/rand.h> | |
| 64 #ifndef OPENSSL_NO_ENGINE | |
| 65 #include <openssl/engine.h> | |
| 66 #endif | |
| 67 #ifdef OPENSSL_FIPS | |
| 68 #include <openssl/fips.h> | |
| 69 #endif | |
| 70 #include "evp_locl.h" | |
| 71 | |
| 72 #ifdef OPENSSL_FIPS | |
| 73 #define M_do_cipher(ctx, out, in, inl) FIPS_cipher(ctx, out, in, inl) | |
| 74 #else | |
| 75 #define M_do_cipher(ctx, out, in, inl) ctx->cipher->do_cipher(ctx, out, in, inl) | |
| 76 #endif | |
| 77 | |
| 78 | |
| 79 const char EVP_version[]="EVP" OPENSSL_VERSION_PTEXT; | |
| 80 | |
| 81 void EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *ctx) | |
| 82 { | |
| 83 memset(ctx,0,sizeof(EVP_CIPHER_CTX)); | |
| 84 /* ctx->cipher=NULL; */ | |
| 85 } | |
| 86 | |
| 87 EVP_CIPHER_CTX *EVP_CIPHER_CTX_new(void) | |
| 88 { | |
| 89 EVP_CIPHER_CTX *ctx=OPENSSL_malloc(sizeof *ctx); | |
| 90 if (ctx) | |
| 91 EVP_CIPHER_CTX_init(ctx); | |
| 92 return ctx; | |
| 93 } | |
| 94 | |
| 95 int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, | |
| 96 const unsigned char *key, const unsigned char *iv, int enc) | |
| 97 { | |
| 98 if (cipher) | |
| 99 EVP_CIPHER_CTX_init(ctx); | |
| 100 return EVP_CipherInit_ex(ctx,cipher,NULL,key,iv,enc); | |
| 101 } | |
| 102 | |
| 103 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *imp
l, | |
| 104 const unsigned char *key, const unsigned char *iv, int enc) | |
| 105 { | |
| 106 if (enc == -1) | |
| 107 enc = ctx->encrypt; | |
| 108 else | |
| 109 { | |
| 110 if (enc) | |
| 111 enc = 1; | |
| 112 ctx->encrypt = enc; | |
| 113 } | |
| 114 #ifndef OPENSSL_NO_ENGINE | |
| 115 /* Whether it's nice or not, "Inits" can be used on "Final"'d contexts | |
| 116 * so this context may already have an ENGINE! Try to avoid releasing | |
| 117 * the previous handle, re-querying for an ENGINE, and having a | |
| 118 * reinitialisation, when it may all be unecessary. */ | |
| 119 if (ctx->engine && ctx->cipher && (!cipher || | |
| 120 (cipher && (cipher->nid == ctx->cipher->nid)))) | |
| 121 goto skip_to_init; | |
| 122 #endif | |
| 123 if (cipher) | |
| 124 { | |
| 125 /* Ensure a context left lying around from last time is cleared | |
| 126 * (the previous check attempted to avoid this if the same | |
| 127 * ENGINE and EVP_CIPHER could be used). */ | |
| 128 if (ctx->cipher) | |
| 129 { | |
| 130 unsigned long flags = ctx->flags; | |
| 131 EVP_CIPHER_CTX_cleanup(ctx); | |
| 132 /* Restore encrypt and flags */ | |
| 133 ctx->encrypt = enc; | |
| 134 ctx->flags = flags; | |
| 135 } | |
| 136 #ifndef OPENSSL_NO_ENGINE | |
| 137 if(impl) | |
| 138 { | |
| 139 if (!ENGINE_init(impl)) | |
| 140 { | |
| 141 EVPerr(EVP_F_EVP_CIPHERINIT_EX, EVP_R_INITIALIZA
TION_ERROR); | |
| 142 return 0; | |
| 143 } | |
| 144 } | |
| 145 else | |
| 146 /* Ask if an ENGINE is reserved for this job */ | |
| 147 impl = ENGINE_get_cipher_engine(cipher->nid); | |
| 148 if(impl) | |
| 149 { | |
| 150 /* There's an ENGINE for this job ... (apparently) */ | |
| 151 const EVP_CIPHER *c = ENGINE_get_cipher(impl, cipher->ni
d); | |
| 152 if(!c) | |
| 153 { | |
| 154 /* One positive side-effect of US's export | |
| 155 * control history, is that we should at least | |
| 156 * be able to avoid using US mispellings of | |
| 157 * "initialisation"? */ | |
| 158 EVPerr(EVP_F_EVP_CIPHERINIT_EX, EVP_R_INITIALIZA
TION_ERROR); | |
| 159 return 0; | |
| 160 } | |
| 161 /* We'll use the ENGINE's private cipher definition */ | |
| 162 cipher = c; | |
| 163 /* Store the ENGINE functional reference so we know | |
| 164 * 'cipher' came from an ENGINE and we need to release | |
| 165 * it when done. */ | |
| 166 ctx->engine = impl; | |
| 167 } | |
| 168 else | |
| 169 ctx->engine = NULL; | |
| 170 #endif | |
| 171 | |
| 172 #ifdef OPENSSL_FIPS | |
| 173 if (FIPS_mode()) | |
| 174 return FIPS_cipherinit(ctx, cipher, key, iv, enc); | |
| 175 #endif | |
| 176 ctx->cipher=cipher; | |
| 177 if (ctx->cipher->ctx_size) | |
| 178 { | |
| 179 ctx->cipher_data=OPENSSL_malloc(ctx->cipher->ctx_size); | |
| 180 if (!ctx->cipher_data) | |
| 181 { | |
| 182 EVPerr(EVP_F_EVP_CIPHERINIT_EX, ERR_R_MALLOC_FAI
LURE); | |
| 183 return 0; | |
| 184 } | |
| 185 } | |
| 186 else | |
| 187 { | |
| 188 ctx->cipher_data = NULL; | |
| 189 } | |
| 190 ctx->key_len = cipher->key_len; | |
| 191 ctx->flags = 0; | |
| 192 if(ctx->cipher->flags & EVP_CIPH_CTRL_INIT) | |
| 193 { | |
| 194 if(!EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_INIT, 0, NULL)) | |
| 195 { | |
| 196 EVPerr(EVP_F_EVP_CIPHERINIT_EX, EVP_R_INITIALIZA
TION_ERROR); | |
| 197 return 0; | |
| 198 } | |
| 199 } | |
| 200 } | |
| 201 else if(!ctx->cipher) | |
| 202 { | |
| 203 EVPerr(EVP_F_EVP_CIPHERINIT_EX, EVP_R_NO_CIPHER_SET); | |
| 204 return 0; | |
| 205 } | |
| 206 #ifndef OPENSSL_NO_ENGINE | |
| 207 skip_to_init: | |
| 208 #endif | |
| 209 #ifdef OPENSSL_FIPS | |
| 210 if (FIPS_mode()) | |
| 211 return FIPS_cipherinit(ctx, cipher, key, iv, enc); | |
| 212 #endif | |
| 213 /* we assume block size is a power of 2 in *cryptUpdate */ | |
| 214 OPENSSL_assert(ctx->cipher->block_size == 1 | |
| 215 || ctx->cipher->block_size == 8 | |
| 216 || ctx->cipher->block_size == 16); | |
| 217 | |
| 218 if(!(EVP_CIPHER_CTX_flags(ctx) & EVP_CIPH_CUSTOM_IV)) { | |
| 219 switch(EVP_CIPHER_CTX_mode(ctx)) { | |
| 220 | |
| 221 case EVP_CIPH_STREAM_CIPHER: | |
| 222 case EVP_CIPH_ECB_MODE: | |
| 223 break; | |
| 224 | |
| 225 case EVP_CIPH_CFB_MODE: | |
| 226 case EVP_CIPH_OFB_MODE: | |
| 227 | |
| 228 ctx->num = 0; | |
| 229 /* fall-through */ | |
| 230 | |
| 231 case EVP_CIPH_CBC_MODE: | |
| 232 | |
| 233 OPENSSL_assert(EVP_CIPHER_CTX_iv_length(ctx) <= | |
| 234 (int)sizeof(ctx->iv)); | |
| 235 if(iv) memcpy(ctx->oiv, iv, EVP_CIPHER_CTX_iv_length(ctx
)); | |
| 236 memcpy(ctx->iv, ctx->oiv, EVP_CIPHER_CTX_iv_length(ctx))
; | |
| 237 break; | |
| 238 | |
| 239 case EVP_CIPH_CTR_MODE: | |
| 240 ctx->num = 0; | |
| 241 /* Don't reuse IV for CTR mode */ | |
| 242 if(iv) | |
| 243 memcpy(ctx->iv, iv, EVP_CIPHER_CTX_iv_length(ctx
)); | |
| 244 break; | |
| 245 | |
| 246 default: | |
| 247 return 0; | |
| 248 break; | |
| 249 } | |
| 250 } | |
| 251 | |
| 252 if(key || (ctx->cipher->flags & EVP_CIPH_ALWAYS_CALL_INIT)) { | |
| 253 if(!ctx->cipher->init(ctx,key,iv,enc)) return 0; | |
| 254 } | |
| 255 ctx->buf_len=0; | |
| 256 ctx->final_used=0; | |
| 257 ctx->block_mask=ctx->cipher->block_size-1; | |
| 258 return 1; | |
| 259 } | |
| 260 | |
| 261 int EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |
| 262 const unsigned char *in, int inl) | |
| 263 { | |
| 264 if (ctx->encrypt) | |
| 265 return EVP_EncryptUpdate(ctx,out,outl,in,inl); | |
| 266 else return EVP_DecryptUpdate(ctx,out,outl,in,inl); | |
| 267 } | |
| 268 | |
| 269 int EVP_CipherFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |
| 270 { | |
| 271 if (ctx->encrypt) | |
| 272 return EVP_EncryptFinal_ex(ctx,out,outl); | |
| 273 else return EVP_DecryptFinal_ex(ctx,out,outl); | |
| 274 } | |
| 275 | |
| 276 int EVP_CipherFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |
| 277 { | |
| 278 if (ctx->encrypt) | |
| 279 return EVP_EncryptFinal(ctx,out,outl); | |
| 280 else return EVP_DecryptFinal(ctx,out,outl); | |
| 281 } | |
| 282 | |
| 283 int EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, | |
| 284 const unsigned char *key, const unsigned char *iv) | |
| 285 { | |
| 286 return EVP_CipherInit(ctx, cipher, key, iv, 1); | |
| 287 } | |
| 288 | |
| 289 int EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, ENGINE *imp
l, | |
| 290 const unsigned char *key, const unsigned char *iv) | |
| 291 { | |
| 292 return EVP_CipherInit_ex(ctx, cipher, impl, key, iv, 1); | |
| 293 } | |
| 294 | |
| 295 int EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, | |
| 296 const unsigned char *key, const unsigned char *iv) | |
| 297 { | |
| 298 return EVP_CipherInit(ctx, cipher, key, iv, 0); | |
| 299 } | |
| 300 | |
| 301 int EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *im
pl, | |
| 302 const unsigned char *key, const unsigned char *iv) | |
| 303 { | |
| 304 return EVP_CipherInit_ex(ctx, cipher, impl, key, iv, 0); | |
| 305 } | |
| 306 | |
| 307 int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |
| 308 const unsigned char *in, int inl) | |
| 309 { | |
| 310 int i,j,bl; | |
| 311 | |
| 312 if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) | |
| 313 { | |
| 314 i = M_do_cipher(ctx, out, in, inl); | |
| 315 if (i < 0) | |
| 316 return 0; | |
| 317 else | |
| 318 *outl = i; | |
| 319 return 1; | |
| 320 } | |
| 321 | |
| 322 if (inl <= 0) | |
| 323 { | |
| 324 *outl = 0; | |
| 325 return inl == 0; | |
| 326 } | |
| 327 | |
| 328 if(ctx->buf_len == 0 && (inl&(ctx->block_mask)) == 0) | |
| 329 { | |
| 330 if(M_do_cipher(ctx,out,in,inl)) | |
| 331 { | |
| 332 *outl=inl; | |
| 333 return 1; | |
| 334 } | |
| 335 else | |
| 336 { | |
| 337 *outl=0; | |
| 338 return 0; | |
| 339 } | |
| 340 } | |
| 341 i=ctx->buf_len; | |
| 342 bl=ctx->cipher->block_size; | |
| 343 OPENSSL_assert(bl <= (int)sizeof(ctx->buf)); | |
| 344 if (i != 0) | |
| 345 { | |
| 346 if (i+inl < bl) | |
| 347 { | |
| 348 memcpy(&(ctx->buf[i]),in,inl); | |
| 349 ctx->buf_len+=inl; | |
| 350 *outl=0; | |
| 351 return 1; | |
| 352 } | |
| 353 else | |
| 354 { | |
| 355 j=bl-i; | |
| 356 memcpy(&(ctx->buf[i]),in,j); | |
| 357 if(!M_do_cipher(ctx,out,ctx->buf,bl)) return 0; | |
| 358 inl-=j; | |
| 359 in+=j; | |
| 360 out+=bl; | |
| 361 *outl=bl; | |
| 362 } | |
| 363 } | |
| 364 else | |
| 365 *outl = 0; | |
| 366 i=inl&(bl-1); | |
| 367 inl-=i; | |
| 368 if (inl > 0) | |
| 369 { | |
| 370 if(!M_do_cipher(ctx,out,in,inl)) return 0; | |
| 371 *outl+=inl; | |
| 372 } | |
| 373 | |
| 374 if (i != 0) | |
| 375 memcpy(ctx->buf,&(in[inl]),i); | |
| 376 ctx->buf_len=i; | |
| 377 return 1; | |
| 378 } | |
| 379 | |
| 380 int EVP_EncryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |
| 381 { | |
| 382 int ret; | |
| 383 ret = EVP_EncryptFinal_ex(ctx, out, outl); | |
| 384 return ret; | |
| 385 } | |
| 386 | |
| 387 int EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |
| 388 { | |
| 389 int n,ret; | |
| 390 unsigned int i, b, bl; | |
| 391 | |
| 392 if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) | |
| 393 { | |
| 394 ret = M_do_cipher(ctx, out, NULL, 0); | |
| 395 if (ret < 0) | |
| 396 return 0; | |
| 397 else | |
| 398 *outl = ret; | |
| 399 return 1; | |
| 400 } | |
| 401 | |
| 402 b=ctx->cipher->block_size; | |
| 403 OPENSSL_assert(b <= sizeof ctx->buf); | |
| 404 if (b == 1) | |
| 405 { | |
| 406 *outl=0; | |
| 407 return 1; | |
| 408 } | |
| 409 bl=ctx->buf_len; | |
| 410 if (ctx->flags & EVP_CIPH_NO_PADDING) | |
| 411 { | |
| 412 if(bl) | |
| 413 { | |
| 414 EVPerr(EVP_F_EVP_ENCRYPTFINAL_EX,EVP_R_DATA_NOT_MULTIPLE
_OF_BLOCK_LENGTH); | |
| 415 return 0; | |
| 416 } | |
| 417 *outl = 0; | |
| 418 return 1; | |
| 419 } | |
| 420 | |
| 421 n=b-bl; | |
| 422 for (i=bl; i<b; i++) | |
| 423 ctx->buf[i]=n; | |
| 424 ret=M_do_cipher(ctx,out,ctx->buf,b); | |
| 425 | |
| 426 | |
| 427 if(ret) | |
| 428 *outl=b; | |
| 429 | |
| 430 return ret; | |
| 431 } | |
| 432 | |
| 433 int EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |
| 434 const unsigned char *in, int inl) | |
| 435 { | |
| 436 int fix_len; | |
| 437 unsigned int b; | |
| 438 | |
| 439 if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) | |
| 440 { | |
| 441 fix_len = M_do_cipher(ctx, out, in, inl); | |
| 442 if (fix_len < 0) | |
| 443 { | |
| 444 *outl = 0; | |
| 445 return 0; | |
| 446 } | |
| 447 else | |
| 448 *outl = fix_len; | |
| 449 return 1; | |
| 450 } | |
| 451 | |
| 452 if (inl <= 0) | |
| 453 { | |
| 454 *outl = 0; | |
| 455 return inl == 0; | |
| 456 } | |
| 457 | |
| 458 if (ctx->flags & EVP_CIPH_NO_PADDING) | |
| 459 return EVP_EncryptUpdate(ctx, out, outl, in, inl); | |
| 460 | |
| 461 b=ctx->cipher->block_size; | |
| 462 OPENSSL_assert(b <= sizeof ctx->final); | |
| 463 | |
| 464 if(ctx->final_used) | |
| 465 { | |
| 466 memcpy(out,ctx->final,b); | |
| 467 out+=b; | |
| 468 fix_len = 1; | |
| 469 } | |
| 470 else | |
| 471 fix_len = 0; | |
| 472 | |
| 473 | |
| 474 if(!EVP_EncryptUpdate(ctx,out,outl,in,inl)) | |
| 475 return 0; | |
| 476 | |
| 477 /* if we have 'decrypted' a multiple of block size, make sure | |
| 478 * we have a copy of this last block */ | |
| 479 if (b > 1 && !ctx->buf_len) | |
| 480 { | |
| 481 *outl-=b; | |
| 482 ctx->final_used=1; | |
| 483 memcpy(ctx->final,&out[*outl],b); | |
| 484 } | |
| 485 else | |
| 486 ctx->final_used = 0; | |
| 487 | |
| 488 if (fix_len) | |
| 489 *outl += b; | |
| 490 | |
| 491 return 1; | |
| 492 } | |
| 493 | |
| 494 int EVP_DecryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |
| 495 { | |
| 496 int ret; | |
| 497 ret = EVP_DecryptFinal_ex(ctx, out, outl); | |
| 498 return ret; | |
| 499 } | |
| 500 | |
| 501 int EVP_DecryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |
| 502 { | |
| 503 int i,n; | |
| 504 unsigned int b; | |
| 505 *outl=0; | |
| 506 | |
| 507 if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) | |
| 508 { | |
| 509 i = M_do_cipher(ctx, out, NULL, 0); | |
| 510 if (i < 0) | |
| 511 return 0; | |
| 512 else | |
| 513 *outl = i; | |
| 514 return 1; | |
| 515 } | |
| 516 | |
| 517 b=ctx->cipher->block_size; | |
| 518 if (ctx->flags & EVP_CIPH_NO_PADDING) | |
| 519 { | |
| 520 if(ctx->buf_len) | |
| 521 { | |
| 522 EVPerr(EVP_F_EVP_DECRYPTFINAL_EX,EVP_R_DATA_NOT_MULTIPLE
_OF_BLOCK_LENGTH); | |
| 523 return 0; | |
| 524 } | |
| 525 *outl = 0; | |
| 526 return 1; | |
| 527 } | |
| 528 if (b > 1) | |
| 529 { | |
| 530 if (ctx->buf_len || !ctx->final_used) | |
| 531 { | |
| 532 EVPerr(EVP_F_EVP_DECRYPTFINAL_EX,EVP_R_WRONG_FINAL_BLOCK
_LENGTH); | |
| 533 return(0); | |
| 534 } | |
| 535 OPENSSL_assert(b <= sizeof ctx->final); | |
| 536 n=ctx->final[b-1]; | |
| 537 if (n == 0 || n > (int)b) | |
| 538 { | |
| 539 EVPerr(EVP_F_EVP_DECRYPTFINAL_EX,EVP_R_BAD_DECRYPT); | |
| 540 return(0); | |
| 541 } | |
| 542 for (i=0; i<n; i++) | |
| 543 { | |
| 544 if (ctx->final[--b] != n) | |
| 545 { | |
| 546 EVPerr(EVP_F_EVP_DECRYPTFINAL_EX,EVP_R_BAD_DECRY
PT); | |
| 547 return(0); | |
| 548 } | |
| 549 } | |
| 550 n=ctx->cipher->block_size-n; | |
| 551 for (i=0; i<n; i++) | |
| 552 out[i]=ctx->final[i]; | |
| 553 *outl=n; | |
| 554 } | |
| 555 else | |
| 556 *outl=0; | |
| 557 return(1); | |
| 558 } | |
| 559 | |
| 560 void EVP_CIPHER_CTX_free(EVP_CIPHER_CTX *ctx) | |
| 561 { | |
| 562 if (ctx) | |
| 563 { | |
| 564 EVP_CIPHER_CTX_cleanup(ctx); | |
| 565 OPENSSL_free(ctx); | |
| 566 } | |
| 567 } | |
| 568 | |
| 569 int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c) | |
| 570 { | |
| 571 #ifndef OPENSSL_FIPS | |
| 572 if (c->cipher != NULL) | |
| 573 { | |
| 574 if(c->cipher->cleanup && !c->cipher->cleanup(c)) | |
| 575 return 0; | |
| 576 /* Cleanse cipher context data */ | |
| 577 if (c->cipher_data) | |
| 578 OPENSSL_cleanse(c->cipher_data, c->cipher->ctx_size); | |
| 579 } | |
| 580 if (c->cipher_data) | |
| 581 OPENSSL_free(c->cipher_data); | |
| 582 #endif | |
| 583 #ifndef OPENSSL_NO_ENGINE | |
| 584 if (c->engine) | |
| 585 /* The EVP_CIPHER we used belongs to an ENGINE, release the | |
| 586 * functional reference we held for this reason. */ | |
| 587 ENGINE_finish(c->engine); | |
| 588 #endif | |
| 589 #ifdef OPENSSL_FIPS | |
| 590 FIPS_cipher_ctx_cleanup(c); | |
| 591 #endif | |
| 592 memset(c,0,sizeof(EVP_CIPHER_CTX)); | |
| 593 return 1; | |
| 594 } | |
| 595 | |
| 596 int EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *c, int keylen) | |
| 597 { | |
| 598 if(c->cipher->flags & EVP_CIPH_CUSTOM_KEY_LENGTH) | |
| 599 return EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_KEY_LENGTH, keylen, N
ULL); | |
| 600 if(c->key_len == keylen) return 1; | |
| 601 if((keylen > 0) && (c->cipher->flags & EVP_CIPH_VARIABLE_LENGTH)) | |
| 602 { | |
| 603 c->key_len = keylen; | |
| 604 return 1; | |
| 605 } | |
| 606 EVPerr(EVP_F_EVP_CIPHER_CTX_SET_KEY_LENGTH,EVP_R_INVALID_KEY_LENGTH); | |
| 607 return 0; | |
| 608 } | |
| 609 | |
| 610 int EVP_CIPHER_CTX_set_padding(EVP_CIPHER_CTX *ctx, int pad) | |
| 611 { | |
| 612 if (pad) ctx->flags &= ~EVP_CIPH_NO_PADDING; | |
| 613 else ctx->flags |= EVP_CIPH_NO_PADDING; | |
| 614 return 1; | |
| 615 } | |
| 616 | |
| 617 int EVP_CIPHER_CTX_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | |
| 618 { | |
| 619 int ret; | |
| 620 if(!ctx->cipher) { | |
| 621 EVPerr(EVP_F_EVP_CIPHER_CTX_CTRL, EVP_R_NO_CIPHER_SET); | |
| 622 return 0; | |
| 623 } | |
| 624 | |
| 625 if(!ctx->cipher->ctrl) { | |
| 626 EVPerr(EVP_F_EVP_CIPHER_CTX_CTRL, EVP_R_CTRL_NOT_IMPLEMENTED); | |
| 627 return 0; | |
| 628 } | |
| 629 | |
| 630 ret = ctx->cipher->ctrl(ctx, type, arg, ptr); | |
| 631 if(ret == -1) { | |
| 632 EVPerr(EVP_F_EVP_CIPHER_CTX_CTRL, EVP_R_CTRL_OPERATION_NOT_IMPLE
MENTED); | |
| 633 return 0; | |
| 634 } | |
| 635 return ret; | |
| 636 } | |
| 637 | |
| 638 int EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, unsigned char *key) | |
| 639 { | |
| 640 if (ctx->cipher->flags & EVP_CIPH_RAND_KEY) | |
| 641 return EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_RAND_KEY, 0, key); | |
| 642 if (RAND_bytes(key, ctx->key_len) <= 0) | |
| 643 return 0; | |
| 644 return 1; | |
| 645 } | |
| 646 | |
| 647 int EVP_CIPHER_CTX_copy(EVP_CIPHER_CTX *out, const EVP_CIPHER_CTX *in) | |
| 648 { | |
| 649 if ((in == NULL) || (in->cipher == NULL)) | |
| 650 { | |
| 651 EVPerr(EVP_F_EVP_CIPHER_CTX_COPY,EVP_R_INPUT_NOT_INITIALIZED); | |
| 652 return 0; | |
| 653 } | |
| 654 #ifndef OPENSSL_NO_ENGINE | |
| 655 /* Make sure it's safe to copy a cipher context using an ENGINE */ | |
| 656 if (in->engine && !ENGINE_init(in->engine)) | |
| 657 { | |
| 658 EVPerr(EVP_F_EVP_CIPHER_CTX_COPY,ERR_R_ENGINE_LIB); | |
| 659 return 0; | |
| 660 } | |
| 661 #endif | |
| 662 | |
| 663 EVP_CIPHER_CTX_cleanup(out); | |
| 664 memcpy(out,in,sizeof *out); | |
| 665 | |
| 666 if (in->cipher_data && in->cipher->ctx_size) | |
| 667 { | |
| 668 out->cipher_data=OPENSSL_malloc(in->cipher->ctx_size); | |
| 669 if (!out->cipher_data) | |
| 670 { | |
| 671 EVPerr(EVP_F_EVP_CIPHER_CTX_COPY,ERR_R_MALLOC_FAILURE); | |
| 672 return 0; | |
| 673 } | |
| 674 memcpy(out->cipher_data,in->cipher_data,in->cipher->ctx_size); | |
| 675 } | |
| 676 | |
| 677 if (in->cipher->flags & EVP_CIPH_CUSTOM_COPY) | |
| 678 return in->cipher->ctrl((EVP_CIPHER_CTX *)in, EVP_CTRL_COPY, 0,
out); | |
| 679 return 1; | |
| 680 } | |
| 681 | |
| OLD | NEW |