Coverage Report

Created: 2025-06-22 06:56

/src/openssl/providers/implementations/ciphers/ciphercommon.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright 2019-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
/*
12
 * Generic dispatch table functions for ciphers.
13
 */
14
15
/* For SSL3_VERSION */
16
#include <string.h>
17
#include <openssl/prov_ssl.h>
18
#include <openssl/proverr.h>
19
#include "ciphercommon_local.h"
20
#include "prov/provider_ctx.h"
21
#include "prov/providercommon.h"
22
#include "internal/skey.h"
23
#include "internal/e_os.h"
24
#include "crypto/types.h"
25
26
/*-
27
 * Generic cipher functions for OSSL_PARAM gettables and settables
28
 */
29
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
30
#ifndef ossl_cipher_generic_get_ctx_params_list
31
static const OSSL_PARAM ossl_cipher_generic_get_ctx_params_list[] = {
32
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_MODE, NULL),
33
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL),
34
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL),
35
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_BLOCK_SIZE, NULL),
36
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_AEAD, NULL),
37
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_CUSTOM_IV, NULL),
38
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_CTS, NULL),
39
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK, NULL),
40
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_HAS_RAND_KEY, NULL),
41
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_ENCRYPT_THEN_MAC, NULL),
42
    OSSL_PARAM_END
43
};
44
#endif
45
46
#ifndef ossl_cipher_generic_get_ctx_params_st
47
struct ossl_cipher_generic_get_ctx_params_st {
48
    OSSL_PARAM *aead;
49
    OSSL_PARAM *bsize;
50
    OSSL_PARAM *cts;
51
    OSSL_PARAM *custiv;
52
    OSSL_PARAM *etm;
53
    OSSL_PARAM *ivlen;
54
    OSSL_PARAM *keylen;
55
    OSSL_PARAM *mb;
56
    OSSL_PARAM *mode;
57
    OSSL_PARAM *rand;
58
};
59
#endif
60
61
#ifndef ossl_cipher_generic_get_ctx_params_decoder
62
158
static struct ossl_cipher_generic_get_ctx_params_st ossl_cipher_generic_get_ctx_params_decoder(const OSSL_PARAM params[]) {
63
158
    struct ossl_cipher_generic_get_ctx_params_st r;
64
158
    const OSSL_PARAM *p;
65
158
    const char *s;
66
67
158
    memset(&r, 0, sizeof(r));
68
1.73k
    for (p = params; (s = p->key) != NULL; p++)
69
1.58k
        switch(s[0]) {
70
0
        default:
71
0
            break;
72
158
        case 'a':
73
158
            if (ossl_likely(r.aead == NULL && strcmp("ead", s + 1) == 0))
74
158
                r.aead = (OSSL_PARAM *)p;
75
158
            break;
76
158
        case 'b':
77
158
            if (ossl_likely(r.bsize == NULL && strcmp("locksize", s + 1) == 0))
78
158
                r.bsize = (OSSL_PARAM *)p;
79
158
            break;
80
316
        case 'c':
81
316
            switch(s[1]) {
82
0
            default:
83
0
                break;
84
158
            case 't':
85
158
                if (ossl_likely(r.cts == NULL && strcmp("s", s + 2) == 0))
86
158
                    r.cts = (OSSL_PARAM *)p;
87
158
                break;
88
158
            case 'u':
89
158
                if (ossl_likely(r.custiv == NULL && strcmp("stom-iv", s + 2) == 0))
90
158
                    r.custiv = (OSSL_PARAM *)p;
91
316
            }
92
316
            break;
93
316
        case 'e':
94
158
            if (ossl_likely(r.etm == NULL && strcmp("ncrypt-then-mac", s + 1) == 0))
95
158
                r.etm = (OSSL_PARAM *)p;
96
158
            break;
97
158
        case 'h':
98
158
            if (ossl_likely(r.rand == NULL && strcmp("as-randkey", s + 1) == 0))
99
158
                r.rand = (OSSL_PARAM *)p;
100
158
            break;
101
158
        case 'i':
102
158
            if (ossl_likely(r.ivlen == NULL && strcmp("vlen", s + 1) == 0))
103
158
                r.ivlen = (OSSL_PARAM *)p;
104
158
            break;
105
158
        case 'k':
106
158
            if (ossl_likely(r.keylen == NULL && strcmp("eylen", s + 1) == 0))
107
158
                r.keylen = (OSSL_PARAM *)p;
108
158
            break;
109
158
        case 'm':
110
158
            if (ossl_likely(r.mode == NULL && strcmp("ode", s + 1) == 0))
111
158
                r.mode = (OSSL_PARAM *)p;
112
158
            break;
113
158
        case 't':
114
158
            if (ossl_likely(r.mb == NULL && strcmp("ls-multi", s + 1) == 0))
115
158
                r.mb = (OSSL_PARAM *)p;
116
1.58k
        }
117
158
    return r;
118
158
}
119
#endif
120
/* End of machine generated */
121
122
const OSSL_PARAM *ossl_cipher_generic_gettable_params(ossl_unused void *provctx)
123
0
{
124
0
    return ossl_cipher_generic_get_ctx_params_list;
125
0
}
126
127
int ossl_cipher_generic_get_params(OSSL_PARAM params[], unsigned int md,
128
                                   uint64_t flags,
129
                                   size_t kbits, size_t blkbits, size_t ivbits)
130
158
{
131
158
    struct ossl_cipher_generic_get_ctx_params_st p;
132
133
158
    p = ossl_cipher_generic_get_ctx_params_decoder(params);
134
135
158
    if (p.mode != NULL && !OSSL_PARAM_set_uint(p.mode, md)) {
136
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
137
0
        return 0;
138
0
    }
139
158
    if (p.aead != NULL
140
158
            && !OSSL_PARAM_set_int(p.aead, (flags & PROV_CIPHER_FLAG_AEAD) != 0)) {
141
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
142
0
        return 0;
143
0
    }
144
158
    if (p.custiv != NULL
145
158
            && !OSSL_PARAM_set_int(p.custiv, (flags & PROV_CIPHER_FLAG_CUSTOM_IV) != 0)) {
146
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
147
0
        return 0;
148
0
    }
149
158
    if (p.cts != NULL
150
158
            && !OSSL_PARAM_set_int(p.cts, (flags & PROV_CIPHER_FLAG_CTS) != 0)) {
151
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
152
0
        return 0;
153
0
    }
154
158
    if (p.mb != NULL
155
158
            && !OSSL_PARAM_set_int(p.mb, (flags & PROV_CIPHER_FLAG_TLS1_MULTIBLOCK) != 0)) {
156
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
157
0
        return 0;
158
0
    }
159
158
    if (p.rand != NULL
160
158
            && !OSSL_PARAM_set_int(p.rand, (flags & PROV_CIPHER_FLAG_RAND_KEY) != 0)) {
161
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
162
0
        return 0;
163
0
    }
164
158
    if (p.etm != NULL
165
158
            && !OSSL_PARAM_set_int(p.etm, (flags & EVP_CIPH_FLAG_ENC_THEN_MAC) != 0)) {
166
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
167
0
        return 0;
168
0
    }
169
158
    if (p.keylen != NULL && !OSSL_PARAM_set_size_t(p.keylen, kbits / 8)) {
170
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
171
0
        return 0;
172
0
    }
173
158
    if (p.bsize != NULL && !OSSL_PARAM_set_size_t(p.bsize, blkbits / 8)) {
174
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
175
0
        return 0;
176
0
    }
177
158
    if (p.ivlen != NULL && !OSSL_PARAM_set_size_t(p.ivlen, ivbits / 8)) {
178
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
179
0
        return 0;
180
0
    }
181
158
    return 1;
182
158
}
183
184
CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_START(ossl_cipher_generic)
185
{ OSSL_CIPHER_PARAM_TLS_MAC, OSSL_PARAM_OCTET_PTR, NULL, 0, OSSL_PARAM_UNMODIFIED },
186
CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_END(ossl_cipher_generic)
187
188
CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_START(ossl_cipher_generic)
189
OSSL_PARAM_uint(OSSL_CIPHER_PARAM_USE_BITS, NULL),
190
OSSL_PARAM_uint(OSSL_CIPHER_PARAM_TLS_VERSION, NULL),
191
OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_TLS_MAC_SIZE, NULL),
192
CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_END(ossl_cipher_generic)
193
194
/*
195
 * Variable key length cipher functions for OSSL_PARAM settables
196
 */
197
int ossl_cipher_var_keylen_set_ctx_params(void *vctx, const OSSL_PARAM params[])
198
0
{
199
0
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
200
0
    const OSSL_PARAM *p;
201
202
0
    if (ossl_param_is_empty(params))
203
0
        return 1;
204
205
0
    if (!ossl_cipher_generic_set_ctx_params(vctx, params))
206
0
        return 0;
207
0
    p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_KEYLEN);
208
0
    if (p != NULL) {
209
0
        size_t keylen;
210
211
0
        if (!OSSL_PARAM_get_size_t(p, &keylen)) {
212
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
213
0
            return 0;
214
0
        }
215
0
        if (ctx->keylen != keylen) {
216
0
            ctx->keylen = keylen;
217
0
            ctx->key_set = 0;
218
0
        }
219
0
    }
220
0
    return 1;
221
0
}
222
223
CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_START(ossl_cipher_var_keylen)
224
OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL),
225
CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_END(ossl_cipher_var_keylen)
226
227
228
void ossl_cipher_generic_reset_ctx(PROV_CIPHER_CTX *ctx)
229
62
{
230
62
    if (ctx != NULL && ctx->alloced) {
231
0
        OPENSSL_free(ctx->tlsmac);
232
0
        ctx->alloced = 0;
233
0
        ctx->tlsmac = NULL;
234
0
    }
235
62
}
236
237
static int cipher_generic_init_internal(PROV_CIPHER_CTX *ctx,
238
                                        const unsigned char *key, size_t keylen,
239
                                        const unsigned char *iv, size_t ivlen,
240
                                        const OSSL_PARAM params[], int enc)
241
0
{
242
0
    ctx->num = 0;
243
0
    ctx->bufsz = 0;
244
0
    ctx->updated = 0;
245
0
    ctx->enc = enc ? 1 : 0;
246
247
0
    if (!ossl_prov_is_running())
248
0
        return 0;
249
250
0
    if (iv != NULL && ctx->mode != EVP_CIPH_ECB_MODE) {
251
0
        if (!ossl_cipher_generic_initiv(ctx, iv, ivlen))
252
0
            return 0;
253
0
    }
254
0
    if (iv == NULL && ctx->iv_set
255
0
        && (ctx->mode == EVP_CIPH_CBC_MODE
256
0
            || ctx->mode == EVP_CIPH_CFB_MODE
257
0
            || ctx->mode == EVP_CIPH_OFB_MODE))
258
        /* reset IV for these modes to keep compatibility with 1.1.1 */
259
0
        memcpy(ctx->iv, ctx->oiv, ctx->ivlen);
260
261
0
    if (key != NULL) {
262
0
        if (ctx->variable_keylength == 0) {
263
0
            if (keylen != ctx->keylen) {
264
0
                ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH);
265
0
                return 0;
266
0
            }
267
0
        } else {
268
0
            ctx->keylen = keylen;
269
0
        }
270
0
        if (!ctx->hw->init(ctx, key, ctx->keylen))
271
0
            return 0;
272
0
        ctx->key_set = 1;
273
0
    }
274
0
    return ossl_cipher_generic_set_ctx_params(ctx, params);
275
0
}
276
277
int ossl_cipher_generic_einit(void *vctx, const unsigned char *key,
278
                              size_t keylen, const unsigned char *iv,
279
                              size_t ivlen, const OSSL_PARAM params[])
280
0
{
281
0
    return cipher_generic_init_internal((PROV_CIPHER_CTX *)vctx, key, keylen,
282
0
                                        iv, ivlen, params, 1);
283
0
}
284
285
int ossl_cipher_generic_dinit(void *vctx, const unsigned char *key,
286
                              size_t keylen, const unsigned char *iv,
287
                              size_t ivlen, const OSSL_PARAM params[])
288
0
{
289
0
    return cipher_generic_init_internal((PROV_CIPHER_CTX *)vctx, key, keylen,
290
0
                                        iv, ivlen, params, 0);
291
0
}
292
293
int ossl_cipher_generic_skey_einit(void *vctx, void *skeydata,
294
                                   const unsigned char *iv, size_t ivlen,
295
                                   const OSSL_PARAM params[])
296
0
{
297
0
    PROV_SKEY *key = skeydata;
298
299
0
    return cipher_generic_init_internal((PROV_CIPHER_CTX *)vctx,
300
0
                                        key->data, key->length,
301
0
                                        iv, ivlen, params, 1);
302
0
}
303
304
int ossl_cipher_generic_skey_dinit(void *vctx, void *skeydata,
305
                                   const unsigned char *iv, size_t ivlen,
306
                                   const OSSL_PARAM params[])
307
0
{
308
0
    PROV_SKEY *key = skeydata;
309
310
0
    return cipher_generic_init_internal((PROV_CIPHER_CTX *)vctx,
311
0
                                        key->data, key->length,
312
0
                                        iv, ivlen, params, 0);
313
0
}
314
315
/* Max padding including padding length byte */
316
0
#define MAX_PADDING 256
317
318
int ossl_cipher_generic_block_update(void *vctx, unsigned char *out,
319
                                     size_t *outl, size_t outsize,
320
                                     const unsigned char *in, size_t inl)
321
0
{
322
0
    size_t outlint = 0;
323
0
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
324
0
    size_t blksz = ctx->blocksize;
325
0
    size_t nextblocks;
326
327
0
    if (!ctx->key_set) {
328
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
329
0
        return 0;
330
0
    }
331
332
0
    if (ctx->tlsversion > 0) {
333
        /*
334
         * Each update call corresponds to a TLS record and is individually
335
         * padded
336
         */
337
338
        /* Sanity check inputs */
339
0
        if (in == NULL
340
0
                || in != out
341
0
                || outsize < inl
342
0
                || !ctx->pad) {
343
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
344
0
            return 0;
345
0
        }
346
347
0
        if (ctx->enc) {
348
0
            unsigned char padval;
349
0
            size_t padnum, loop;
350
351
            /* Add padding */
352
353
0
            padnum = blksz - (inl % blksz);
354
355
0
            if (outsize < inl + padnum) {
356
0
                ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
357
0
                return 0;
358
0
            }
359
360
0
            if (padnum > MAX_PADDING) {
361
0
                ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
362
0
                return 0;
363
0
            }
364
0
            padval = (unsigned char)(padnum - 1);
365
0
            if (ctx->tlsversion == SSL3_VERSION) {
366
0
                if (padnum > 1)
367
0
                    memset(out + inl, 0, padnum - 1);
368
0
                *(out + inl + padnum - 1) = padval;
369
0
            } else {
370
                /* we need to add 'padnum' padding bytes of value padval */
371
0
                for (loop = inl; loop < inl + padnum; loop++)
372
0
                    out[loop] = padval;
373
0
            }
374
0
            inl += padnum;
375
0
        }
376
377
0
        if ((inl % blksz) != 0) {
378
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
379
0
            return 0;
380
0
        }
381
382
383
        /* Shouldn't normally fail */
384
0
        if (!ctx->hw->cipher(ctx, out, in, inl)) {
385
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
386
0
            return 0;
387
0
        }
388
389
0
        if (ctx->alloced) {
390
0
            OPENSSL_free(ctx->tlsmac);
391
0
            ctx->alloced = 0;
392
0
            ctx->tlsmac = NULL;
393
0
        }
394
395
        /* This only fails if padding is publicly invalid */
396
0
        *outl = inl;
397
0
        if (!ctx->enc
398
0
            && !ossl_cipher_tlsunpadblock(ctx->libctx, ctx->tlsversion,
399
0
                                          out, outl,
400
0
                                          blksz, &ctx->tlsmac, &ctx->alloced,
401
0
                                          ctx->tlsmacsize, 0)) {
402
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
403
0
            return 0;
404
0
        }
405
0
        return 1;
406
0
    }
407
408
0
    if (ctx->bufsz != 0)
409
0
        nextblocks = ossl_cipher_fillblock(ctx->buf, &ctx->bufsz, blksz,
410
0
                                           &in, &inl);
411
0
    else
412
0
        nextblocks = inl & ~(blksz-1);
413
414
    /*
415
     * If we're decrypting and we end an update on a block boundary we hold
416
     * the last block back in case this is the last update call and the last
417
     * block is padded.
418
     */
419
0
    if (ctx->bufsz == blksz && (ctx->enc || inl > 0 || !ctx->pad)) {
420
0
        if (outsize < blksz) {
421
0
            ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
422
0
            return 0;
423
0
        }
424
0
        if (!ctx->hw->cipher(ctx, out, ctx->buf, blksz)) {
425
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
426
0
            return 0;
427
0
        }
428
0
        ctx->bufsz = 0;
429
0
        outlint = blksz;
430
0
        out += blksz;
431
0
    }
432
0
    if (nextblocks > 0) {
433
0
        if (!ctx->enc && ctx->pad && nextblocks == inl) {
434
0
            if (!ossl_assert(inl >= blksz)) {
435
0
                ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
436
0
                return 0;
437
0
            }
438
0
            nextblocks -= blksz;
439
0
        }
440
0
        outlint += nextblocks;
441
0
        if (outsize < outlint) {
442
0
            ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
443
0
            return 0;
444
0
        }
445
0
    }
446
0
    if (nextblocks > 0) {
447
0
        if (!ctx->hw->cipher(ctx, out, in, nextblocks)) {
448
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
449
0
            return 0;
450
0
        }
451
0
        in += nextblocks;
452
0
        inl -= nextblocks;
453
0
    }
454
0
    if (inl != 0
455
0
        && !ossl_cipher_trailingdata(ctx->buf, &ctx->bufsz, blksz, &in, &inl)) {
456
        /* ERR_raise already called */
457
0
        return 0;
458
0
    }
459
460
0
    *outl = outlint;
461
0
    return inl == 0;
462
0
}
463
464
int ossl_cipher_generic_block_final(void *vctx, unsigned char *out,
465
                                    size_t *outl, size_t outsize)
466
0
{
467
0
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
468
0
    size_t blksz = ctx->blocksize;
469
470
0
    if (!ossl_prov_is_running())
471
0
        return 0;
472
473
0
    if (!ctx->key_set) {
474
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
475
0
        return 0;
476
0
    }
477
478
0
    if (ctx->tlsversion > 0) {
479
        /* We never finalize TLS, so this is an error */
480
0
        ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
481
0
        return 0;
482
0
    }
483
484
0
    if (ctx->enc) {
485
0
        if (ctx->pad) {
486
0
            ossl_cipher_padblock(ctx->buf, &ctx->bufsz, blksz);
487
0
        } else if (ctx->bufsz == 0) {
488
0
            *outl = 0;
489
0
            return 1;
490
0
        } else if (ctx->bufsz != blksz) {
491
0
            ERR_raise(ERR_LIB_PROV, PROV_R_WRONG_FINAL_BLOCK_LENGTH);
492
0
            return 0;
493
0
        }
494
495
0
        if (outsize < blksz) {
496
0
            ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
497
0
            return 0;
498
0
        }
499
0
        if (!ctx->hw->cipher(ctx, out, ctx->buf, blksz)) {
500
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
501
0
            return 0;
502
0
        }
503
0
        ctx->bufsz = 0;
504
0
        *outl = blksz;
505
0
        return 1;
506
0
    }
507
508
    /* Decrypting */
509
0
    if (ctx->bufsz != blksz) {
510
0
        if (ctx->bufsz == 0 && !ctx->pad) {
511
0
            *outl = 0;
512
0
            return 1;
513
0
        }
514
0
        ERR_raise(ERR_LIB_PROV, PROV_R_WRONG_FINAL_BLOCK_LENGTH);
515
0
        return 0;
516
0
    }
517
518
0
    if (!ctx->hw->cipher(ctx, ctx->buf, ctx->buf, blksz)) {
519
0
        ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
520
0
        return 0;
521
0
    }
522
523
0
    if (ctx->pad && !ossl_cipher_unpadblock(ctx->buf, &ctx->bufsz, blksz)) {
524
        /* ERR_raise already called */
525
0
        return 0;
526
0
    }
527
528
0
    if (outsize < ctx->bufsz) {
529
0
        ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
530
0
        return 0;
531
0
    }
532
0
    memcpy(out, ctx->buf, ctx->bufsz);
533
0
    *outl = ctx->bufsz;
534
0
    ctx->bufsz = 0;
535
0
    return 1;
536
0
}
537
538
int ossl_cipher_generic_stream_update(void *vctx, unsigned char *out,
539
                                      size_t *outl, size_t outsize,
540
                                      const unsigned char *in, size_t inl)
541
0
{
542
0
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
543
544
0
    if (!ctx->key_set) {
545
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
546
0
        return 0;
547
0
    }
548
549
0
    if (inl == 0) {
550
0
        *outl = 0;
551
0
        return 1;
552
0
    }
553
554
0
    if (outsize < inl) {
555
0
        ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
556
0
        return 0;
557
0
    }
558
559
0
    if (!ctx->hw->cipher(ctx, out, in, inl)) {
560
0
        ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
561
0
        return 0;
562
0
    }
563
564
0
    *outl = inl;
565
0
    if (!ctx->enc && ctx->tlsversion > 0) {
566
        /*
567
        * Remove any TLS padding. Only used by cipher_aes_cbc_hmac_sha1_hw.c and
568
        * cipher_aes_cbc_hmac_sha256_hw.c
569
        */
570
0
        if (ctx->removetlspad) {
571
            /*
572
             * We should have already failed in the cipher() call above if this
573
             * isn't true.
574
             */
575
0
            if (!ossl_assert(*outl >= (size_t)(out[inl - 1] + 1)))
576
0
                return 0;
577
            /* The actual padding length */
578
0
            *outl -= out[inl - 1] + 1;
579
0
        }
580
581
        /* TLS MAC and explicit IV if relevant. We should have already failed
582
         * in the cipher() call above if *outl is too short.
583
         */
584
0
        if (!ossl_assert(*outl >= ctx->removetlsfixed))
585
0
            return 0;
586
0
        *outl -= ctx->removetlsfixed;
587
588
        /* Extract the MAC if there is one */
589
0
        if (ctx->tlsmacsize > 0) {
590
0
            if (*outl < ctx->tlsmacsize)
591
0
                return 0;
592
593
0
            ctx->tlsmac = out + *outl - ctx->tlsmacsize;
594
0
            *outl -= ctx->tlsmacsize;
595
0
        }
596
0
    }
597
598
0
    return 1;
599
0
}
600
int ossl_cipher_generic_stream_final(void *vctx, unsigned char *out,
601
                                     size_t *outl, size_t outsize)
602
0
{
603
0
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
604
605
0
    if (!ossl_prov_is_running())
606
0
        return 0;
607
608
0
    if (!ctx->key_set) {
609
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
610
0
        return 0;
611
0
    }
612
613
0
    *outl = 0;
614
0
    return 1;
615
0
}
616
617
int ossl_cipher_generic_cipher(void *vctx, unsigned char *out, size_t *outl,
618
                               size_t outsize, const unsigned char *in,
619
                               size_t inl)
620
0
{
621
0
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
622
623
0
    if (!ossl_prov_is_running())
624
0
        return 0;
625
626
0
    if (!ctx->key_set) {
627
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
628
0
        return 0;
629
0
    }
630
631
0
    if (outsize < inl) {
632
0
        ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
633
0
        return 0;
634
0
    }
635
636
0
    if (!ctx->hw->cipher(ctx, out, in, inl)) {
637
0
        ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
638
0
        return 0;
639
0
    }
640
641
0
    *outl = inl;
642
0
    return 1;
643
0
}
644
645
int ossl_cipher_generic_get_ctx_params(void *vctx, OSSL_PARAM params[])
646
81
{
647
81
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
648
81
    OSSL_PARAM *p;
649
650
81
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IVLEN);
651
81
    if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->ivlen)) {
652
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
653
0
        return 0;
654
0
    }
655
81
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_PADDING);
656
81
    if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->pad)) {
657
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
658
0
        return 0;
659
0
    }
660
81
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IV);
661
81
    if (p != NULL
662
81
        && !OSSL_PARAM_set_octet_string_or_ptr(p, ctx->oiv, ctx->ivlen)) {
663
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
664
0
        return 0;
665
0
    }
666
81
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_UPDATED_IV);
667
81
    if (p != NULL
668
81
        && !OSSL_PARAM_set_octet_string_or_ptr(p, ctx->iv, ctx->ivlen)) {
669
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
670
0
        return 0;
671
0
    }
672
81
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_NUM);
673
81
    if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->num)) {
674
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
675
0
        return 0;
676
0
    }
677
81
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_KEYLEN);
678
81
    if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->keylen)) {
679
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
680
0
        return 0;
681
0
    }
682
81
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_TLS_MAC);
683
81
    if (p != NULL
684
81
        && !OSSL_PARAM_set_octet_ptr(p, ctx->tlsmac, ctx->tlsmacsize)) {
685
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
686
0
        return 0;
687
0
    }
688
81
    return 1;
689
81
}
690
691
int ossl_cipher_generic_set_ctx_params(void *vctx, const OSSL_PARAM params[])
692
0
{
693
0
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
694
0
    const OSSL_PARAM *p;
695
696
0
    if (ossl_param_is_empty(params))
697
0
        return 1;
698
699
0
    p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_PADDING);
700
0
    if (p != NULL) {
701
0
        unsigned int pad;
702
703
0
        if (!OSSL_PARAM_get_uint(p, &pad)) {
704
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
705
0
            return 0;
706
0
        }
707
0
        ctx->pad = pad ? 1 : 0;
708
0
    }
709
0
    p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_USE_BITS);
710
0
    if (p != NULL) {
711
0
        unsigned int bits;
712
713
0
        if (!OSSL_PARAM_get_uint(p, &bits)) {
714
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
715
0
            return 0;
716
0
        }
717
0
        ctx->use_bits = bits ? 1 : 0;
718
0
    }
719
0
    p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_TLS_VERSION);
720
0
    if (p != NULL) {
721
0
        if (!OSSL_PARAM_get_uint(p, &ctx->tlsversion)) {
722
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
723
0
            return 0;
724
0
        }
725
0
    }
726
0
    p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_TLS_MAC_SIZE);
727
0
    if (p != NULL) {
728
0
        if (!OSSL_PARAM_get_size_t(p, &ctx->tlsmacsize)) {
729
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
730
0
            return 0;
731
0
        }
732
0
    }
733
0
    p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_NUM);
734
0
    if (p != NULL) {
735
0
        unsigned int num;
736
737
0
        if (!OSSL_PARAM_get_uint(p, &num)) {
738
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
739
0
            return 0;
740
0
        }
741
0
        ctx->num = num;
742
0
    }
743
0
    return 1;
744
0
}
745
746
int ossl_cipher_generic_initiv(PROV_CIPHER_CTX *ctx, const unsigned char *iv,
747
                               size_t ivlen)
748
19
{
749
19
    if (ivlen != ctx->ivlen
750
19
        || ivlen > sizeof(ctx->iv)) {
751
0
        ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH);
752
0
        return 0;
753
0
    }
754
19
    ctx->iv_set = 1;
755
19
    memcpy(ctx->iv, iv, ivlen);
756
19
    memcpy(ctx->oiv, iv, ivlen);
757
19
    return 1;
758
19
}
759
760
void ossl_cipher_generic_initkey(void *vctx, size_t kbits, size_t blkbits,
761
                                 size_t ivbits, unsigned int mode,
762
                                 uint64_t flags, const PROV_CIPHER_HW *hw,
763
                                 void *provctx)
764
62
{
765
62
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
766
767
62
    if ((flags & PROV_CIPHER_FLAG_INVERSE_CIPHER) != 0)
768
0
        ctx->inverse_cipher = 1;
769
62
    if ((flags & PROV_CIPHER_FLAG_VARIABLE_LENGTH) != 0)
770
0
        ctx->variable_keylength = 1;
771
772
62
    ctx->pad = 1;
773
62
    ctx->keylen = ((kbits) / 8);
774
62
    ctx->ivlen = ((ivbits) / 8);
775
62
    ctx->hw = hw;
776
62
    ctx->mode = mode;
777
62
    ctx->blocksize = blkbits / 8;
778
62
    if (provctx != NULL)
779
0
        ctx->libctx = PROV_LIBCTX_OF(provctx); /* used for rand */
780
62
}