Coverage Report

Created: 2024-05-21 06:33

/src/openssl/providers/implementations/ciphers/cipher_tdes_common.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
/*
11
 * DES low level APIs are deprecated for public use, but still ok for internal
12
 * use.
13
 */
14
#include "internal/deprecated.h"
15
16
#include <openssl/rand.h>
17
#include <openssl/proverr.h>
18
#include "prov/ciphercommon.h"
19
#include "cipher_tdes.h"
20
#include "prov/implementations.h"
21
#include "prov/providercommon.h"
22
23
void *ossl_tdes_newctx(void *provctx, int mode, size_t kbits, size_t blkbits,
24
                       size_t ivbits, uint64_t flags, const PROV_CIPHER_HW *hw)
25
0
{
26
0
    PROV_TDES_CTX *tctx;
27
28
0
    if (!ossl_prov_is_running())
29
0
        return NULL;
30
31
0
    tctx = OPENSSL_zalloc(sizeof(*tctx));
32
0
    if (tctx != NULL)
33
0
        ossl_cipher_generic_initkey(tctx, kbits, blkbits, ivbits, mode, flags,
34
0
                                    hw, provctx);
35
0
    return tctx;
36
0
}
37
38
void *ossl_tdes_dupctx(void *ctx)
39
0
{
40
0
    PROV_TDES_CTX *in = (PROV_TDES_CTX *)ctx;
41
0
    PROV_TDES_CTX *ret;
42
43
0
    if (!ossl_prov_is_running())
44
0
        return NULL;
45
46
0
    ret = OPENSSL_malloc(sizeof(*ret));
47
0
    if (ret == NULL)
48
0
        return NULL;
49
0
    in->base.hw->copyctx(&ret->base, &in->base);
50
51
0
    return ret;
52
0
}
53
54
void ossl_tdes_freectx(void *vctx)
55
0
{
56
0
    PROV_TDES_CTX *ctx = (PROV_TDES_CTX *)vctx;
57
58
0
    ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx);
59
0
    OPENSSL_clear_free(ctx,  sizeof(*ctx));
60
0
}
61
62
static int tdes_init(void *vctx, const unsigned char *key, size_t keylen,
63
                     const unsigned char *iv, size_t ivlen,
64
                     const OSSL_PARAM params[], int enc)
65
0
{
66
0
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
67
68
0
    if (!ossl_prov_is_running())
69
0
        return 0;
70
71
0
    ctx->num = 0;
72
0
    ctx->bufsz = 0;
73
0
    ctx->enc = enc;
74
75
0
    if (iv != NULL) {
76
0
        if (!ossl_cipher_generic_initiv(ctx, iv, ivlen))
77
0
            return 0;
78
0
    } else if (ctx->iv_set
79
0
               && (ctx->mode == EVP_CIPH_CBC_MODE
80
0
                   || ctx->mode == EVP_CIPH_CFB_MODE
81
0
                   || ctx->mode == EVP_CIPH_OFB_MODE)) {
82
        /* reset IV to keep compatibility with 1.1.1 */
83
0
        memcpy(ctx->iv, ctx->oiv, ctx->ivlen);
84
0
    }
85
86
0
    if (key != NULL) {
87
0
        if (keylen != ctx->keylen) {
88
0
            ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH);
89
0
            return 0;
90
0
        }
91
0
        if (!ctx->hw->init(ctx, key, ctx->keylen))
92
0
            return 0;
93
0
        ctx->key_set = 1;
94
0
    }
95
0
    return ossl_cipher_generic_set_ctx_params(ctx, params);
96
0
}
97
98
int ossl_tdes_einit(void *vctx, const unsigned char *key, size_t keylen,
99
                    const unsigned char *iv, size_t ivlen,
100
                    const OSSL_PARAM params[])
101
0
{
102
0
    return tdes_init(vctx, key, keylen, iv, ivlen, params, 1);
103
0
}
104
105
int ossl_tdes_dinit(void *vctx, const unsigned char *key, size_t keylen,
106
                    const unsigned char *iv, size_t ivlen,
107
                    const OSSL_PARAM params[])
108
0
{
109
0
    return tdes_init(vctx, key, keylen, iv, ivlen, params, 0);
110
0
}
111
112
CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_START(ossl_tdes)
113
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_RANDOM_KEY, NULL, 0),
114
CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_END(ossl_tdes)
115
116
static int tdes_generatekey(PROV_CIPHER_CTX *ctx, void *ptr)
117
0
{
118
119
0
    DES_cblock *deskey = ptr;
120
0
    size_t kl = ctx->keylen;
121
122
0
    if (kl == 0 || RAND_priv_bytes_ex(ctx->libctx, ptr, kl, 0) <= 0)
123
0
        return 0;
124
0
    DES_set_odd_parity(deskey);
125
0
    if (kl >= 16) {
126
0
        DES_set_odd_parity(deskey + 1);
127
0
        if (kl >= 24)
128
0
            DES_set_odd_parity(deskey + 2);
129
0
    }
130
0
    return 1;
131
0
}
132
133
int ossl_tdes_get_ctx_params(void *vctx, OSSL_PARAM params[])
134
0
{
135
0
    PROV_CIPHER_CTX  *ctx = (PROV_CIPHER_CTX *)vctx;
136
0
    OSSL_PARAM *p;
137
138
0
    if (!ossl_cipher_generic_get_ctx_params(vctx, params))
139
0
        return 0;
140
141
0
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_RANDOM_KEY);
142
0
    if (p != NULL && !tdes_generatekey(ctx, p->data)) {
143
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GENERATE_KEY);
144
0
        return 0;
145
0
    }
146
0
    return 1;
147
0
}