Coverage Report

Created: 2025-10-12 06:56

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/providers/implementations/ciphers/cipher_aes_siv.c
Line
Count
Source
1
/*
2
 * Copyright 2019-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
/* Dispatch functions for AES SIV mode */
12
13
/*
14
 * This file uses the low level AES functions (which are deprecated for
15
 * non-internal use) in order to implement provider AES ciphers.
16
 */
17
#include "internal/deprecated.h"
18
19
#include <openssl/proverr.h>
20
#include "cipher_aes_siv.h"
21
#include "prov/implementations.h"
22
#include "prov/providercommon.h"
23
#include "prov/ciphercommon_aead.h"
24
#include "prov/provider_ctx.h"
25
26
#define siv_stream_update siv_cipher
27
#define SIV_FLAGS AEAD_FLAGS
28
29
static OSSL_FUNC_cipher_set_ctx_params_fn aes_siv_set_ctx_params;
30
31
static void *aes_siv_newctx(void *provctx, size_t keybits, unsigned int mode,
32
                            uint64_t flags)
33
0
{
34
0
    PROV_AES_SIV_CTX *ctx;
35
36
0
    if (!ossl_prov_is_running())
37
0
        return NULL;
38
39
0
    ctx = OPENSSL_zalloc(sizeof(*ctx));
40
0
    if (ctx != NULL) {
41
0
        ctx->taglen = SIV_LEN;
42
0
        ctx->mode = mode;
43
0
        ctx->keylen = keybits / 8;
44
0
        ctx->hw = ossl_prov_cipher_hw_aes_siv(keybits);
45
0
        ctx->libctx = PROV_LIBCTX_OF(provctx);
46
0
    }
47
0
    return ctx;
48
0
}
49
50
static void aes_siv_freectx(void *vctx)
51
0
{
52
0
    PROV_AES_SIV_CTX *ctx = (PROV_AES_SIV_CTX *)vctx;
53
54
0
    if (ctx != NULL) {
55
0
        ctx->hw->cleanup(ctx);
56
0
        OPENSSL_clear_free(ctx,  sizeof(*ctx));
57
0
    }
58
0
}
59
60
static void *siv_dupctx(void *vctx)
61
0
{
62
0
    PROV_AES_SIV_CTX *in = (PROV_AES_SIV_CTX *)vctx;
63
0
    PROV_AES_SIV_CTX *ret;
64
65
0
    if (!ossl_prov_is_running())
66
0
        return NULL;
67
68
0
    ret = OPENSSL_malloc(sizeof(*ret));
69
0
    if (ret == NULL)
70
0
        return NULL;
71
0
    if (!in->hw->dupctx(in, ret)) {
72
0
        OPENSSL_free(ret);
73
0
        ret = NULL;
74
0
    }
75
0
    return ret;
76
0
}
77
78
static int siv_init(void *vctx, const unsigned char *key, size_t keylen,
79
                    const unsigned char *iv, size_t ivlen,
80
                    const OSSL_PARAM params[], int enc)
81
0
{
82
0
    PROV_AES_SIV_CTX *ctx = (PROV_AES_SIV_CTX *)vctx;
83
84
0
    if (!ossl_prov_is_running())
85
0
        return 0;
86
87
0
    ctx->enc = enc;
88
89
0
    if (key != NULL) {
90
0
        if (keylen != ctx->keylen) {
91
0
            ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH);
92
0
            return 0;
93
0
        }
94
0
        if (!ctx->hw->initkey(ctx, key, ctx->keylen))
95
0
            return 0;
96
0
    }
97
0
    return aes_siv_set_ctx_params(ctx, params);
98
0
}
99
100
static int siv_einit(void *vctx, const unsigned char *key, size_t keylen,
101
                     const unsigned char *iv, size_t ivlen,
102
                     const OSSL_PARAM params[])
103
0
{
104
0
    return siv_init(vctx, key, keylen, iv, ivlen, params, 1);
105
0
}
106
107
static int siv_dinit(void *vctx, const unsigned char *key, size_t keylen,
108
                     const unsigned char *iv, size_t ivlen,
109
                     const OSSL_PARAM params[])
110
0
{
111
0
    return siv_init(vctx, key, keylen, iv, ivlen, params, 0);
112
0
}
113
114
static int siv_cipher(void *vctx, unsigned char *out, size_t *outl,
115
                      size_t outsize, const unsigned char *in, size_t inl)
116
0
{
117
0
    PROV_AES_SIV_CTX *ctx = (PROV_AES_SIV_CTX *)vctx;
118
119
0
    if (!ossl_prov_is_running())
120
0
        return 0;
121
122
0
    if (out != NULL && outsize < inl) {
123
0
        ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
124
0
        return 0;
125
0
    }
126
127
0
    if (ctx->hw->cipher(ctx, out, in, inl) <= 0)
128
0
        return 0;
129
130
0
    if (outl != NULL)
131
0
        *outl = inl;
132
0
    return 1;
133
0
}
134
135
static int siv_stream_final(void *vctx, unsigned char *out, size_t *outl,
136
                            size_t outsize)
137
0
{
138
0
    PROV_AES_SIV_CTX *ctx = (PROV_AES_SIV_CTX *)vctx;
139
140
0
    if (!ossl_prov_is_running())
141
0
        return 0;
142
143
0
    if (!ctx->hw->cipher(vctx, out, NULL, 0))
144
0
        return 0;
145
146
0
    if (outl != NULL)
147
0
        *outl = 0;
148
0
    return 1;
149
0
}
150
151
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
152
#ifndef aes_siv_get_ctx_params_list
153
static const OSSL_PARAM aes_siv_get_ctx_params_list[] = {
154
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL),
155
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_AEAD_TAGLEN, NULL),
156
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TAG, NULL, 0),
157
    OSSL_PARAM_END
158
};
159
#endif
160
161
#ifndef aes_siv_get_ctx_params_st
162
struct aes_siv_get_ctx_params_st {
163
    OSSL_PARAM *keylen;
164
    OSSL_PARAM *tag;
165
    OSSL_PARAM *taglen;
166
};
167
#endif
168
169
#ifndef aes_siv_get_ctx_params_decoder
170
static int aes_siv_get_ctx_params_decoder
171
    (const OSSL_PARAM *p, struct aes_siv_get_ctx_params_st *r)
172
0
{
173
0
    const char *s;
174
175
0
    memset(r, 0, sizeof(*r));
176
0
    if (p != NULL)
177
0
        for (; (s = p->key) != NULL; p++)
178
0
            switch(s[0]) {
179
0
            default:
180
0
                break;
181
0
            case 'k':
182
0
                if (ossl_likely(strcmp("eylen", s + 1) == 0)) {
183
                    /* OSSL_CIPHER_PARAM_KEYLEN */
184
0
                    if (ossl_unlikely(r->keylen != NULL)) {
185
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
186
0
                                       "param %s is repeated", s);
187
0
                        return 0;
188
0
                    }
189
0
                    r->keylen = (OSSL_PARAM *)p;
190
0
                }
191
0
                break;
192
0
            case 't':
193
0
                switch(s[1]) {
194
0
                default:
195
0
                    break;
196
0
                case 'a':
197
0
                    switch(s[2]) {
198
0
                    default:
199
0
                        break;
200
0
                    case 'g':
201
0
                        switch(s[3]) {
202
0
                        default:
203
0
                            break;
204
0
                        case 'l':
205
0
                            if (ossl_likely(strcmp("en", s + 4) == 0)) {
206
                                /* OSSL_CIPHER_PARAM_AEAD_TAGLEN */
207
0
                                if (ossl_unlikely(r->taglen != NULL)) {
208
0
                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
209
0
                                                   "param %s is repeated", s);
210
0
                                    return 0;
211
0
                                }
212
0
                                r->taglen = (OSSL_PARAM *)p;
213
0
                            }
214
0
                            break;
215
0
                        case '\0':
216
0
                            if (ossl_unlikely(r->tag != NULL)) {
217
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
218
0
                                               "param %s is repeated", s);
219
0
                                return 0;
220
0
                            }
221
0
                            r->tag = (OSSL_PARAM *)p;
222
0
                        }
223
0
                    }
224
0
                }
225
0
            }
226
0
    return 1;
227
0
}
228
#endif
229
/* End of machine generated */
230
231
static int aes_siv_get_ctx_params(void *vctx, OSSL_PARAM params[])
232
0
{
233
0
    PROV_AES_SIV_CTX *ctx = (PROV_AES_SIV_CTX *)vctx;
234
0
    SIV128_CONTEXT *sctx;
235
0
    struct aes_siv_get_ctx_params_st p;
236
237
0
    if (ctx == NULL || !aes_siv_get_ctx_params_decoder(params, &p))
238
0
        return 0;
239
240
0
    sctx = &ctx->siv;
241
242
0
    if (p.tag != NULL) {
243
0
        if (!ctx->enc
244
0
            || p.tag->data_type != OSSL_PARAM_OCTET_STRING
245
0
            || p.tag->data_size != ctx->taglen
246
0
            || !OSSL_PARAM_set_octet_string(p.tag, &sctx->tag.byte,
247
0
                                            ctx->taglen)) {
248
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
249
0
            return 0;
250
0
        }
251
0
    }
252
253
0
    if (p.taglen != NULL && !OSSL_PARAM_set_size_t(p.taglen, ctx->taglen)) {
254
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
255
0
        return 0;
256
0
    }
257
258
0
    if (p.keylen != NULL && !OSSL_PARAM_set_size_t(p.keylen, ctx->keylen)) {
259
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
260
0
        return 0;
261
0
    }
262
0
    return 1;
263
0
}
264
265
static const OSSL_PARAM *aes_siv_gettable_ctx_params(ossl_unused void *cctx,
266
                                                     ossl_unused void *provctx)
267
3
{
268
3
    return aes_siv_get_ctx_params_list;
269
3
}
270
271
272
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
273
#ifndef aes_siv_set_ctx_params_list
274
static const OSSL_PARAM aes_siv_set_ctx_params_list[] = {
275
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL),
276
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_SPEED, NULL),
277
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TAG, NULL, 0),
278
    OSSL_PARAM_END
279
};
280
#endif
281
282
#ifndef aes_siv_set_ctx_params_st
283
struct aes_siv_set_ctx_params_st {
284
    OSSL_PARAM *keylen;
285
    OSSL_PARAM *speed;
286
    OSSL_PARAM *tag;
287
};
288
#endif
289
290
#ifndef aes_siv_set_ctx_params_decoder
291
static int aes_siv_set_ctx_params_decoder
292
    (const OSSL_PARAM *p, struct aes_siv_set_ctx_params_st *r)
293
0
{
294
0
    const char *s;
295
296
0
    memset(r, 0, sizeof(*r));
297
0
    if (p != NULL)
298
0
        for (; (s = p->key) != NULL; p++)
299
0
            switch(s[0]) {
300
0
            default:
301
0
                break;
302
0
            case 'k':
303
0
                if (ossl_likely(strcmp("eylen", s + 1) == 0)) {
304
                    /* OSSL_CIPHER_PARAM_KEYLEN */
305
0
                    if (ossl_unlikely(r->keylen != NULL)) {
306
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
307
0
                                       "param %s is repeated", s);
308
0
                        return 0;
309
0
                    }
310
0
                    r->keylen = (OSSL_PARAM *)p;
311
0
                }
312
0
                break;
313
0
            case 's':
314
0
                if (ossl_likely(strcmp("peed", s + 1) == 0)) {
315
                    /* OSSL_CIPHER_PARAM_SPEED */
316
0
                    if (ossl_unlikely(r->speed != NULL)) {
317
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
318
0
                                       "param %s is repeated", s);
319
0
                        return 0;
320
0
                    }
321
0
                    r->speed = (OSSL_PARAM *)p;
322
0
                }
323
0
                break;
324
0
            case 't':
325
0
                if (ossl_likely(strcmp("ag", s + 1) == 0)) {
326
                    /* OSSL_CIPHER_PARAM_AEAD_TAG */
327
0
                    if (ossl_unlikely(r->tag != NULL)) {
328
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
329
0
                                       "param %s is repeated", s);
330
0
                        return 0;
331
0
                    }
332
0
                    r->tag = (OSSL_PARAM *)p;
333
0
                }
334
0
            }
335
0
    return 1;
336
0
}
337
#endif
338
/* End of machine generated */
339
340
static int aes_siv_set_ctx_params(void *vctx, const OSSL_PARAM params[])
341
0
{
342
0
    PROV_AES_SIV_CTX *ctx = (PROV_AES_SIV_CTX *)vctx;
343
0
    struct aes_siv_set_ctx_params_st p;
344
0
    unsigned int speed = 0;
345
346
0
    if (ctx == NULL || !aes_siv_set_ctx_params_decoder(params, &p))
347
0
        return 0;
348
349
0
    if (p.tag != NULL) {
350
0
        if (ctx->enc)
351
0
            return 1;
352
0
        if (p.tag->data_type != OSSL_PARAM_OCTET_STRING
353
0
            || !ctx->hw->settag(ctx, p.tag->data, p.tag->data_size)) {
354
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
355
0
            return 0;
356
0
        }
357
0
    }
358
359
0
    if (p.speed != NULL) {
360
0
        if (!OSSL_PARAM_get_uint(p.speed, &speed)) {
361
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
362
0
            return 0;
363
0
        }
364
0
        ctx->hw->setspeed(ctx, (int)speed);
365
0
    }
366
367
0
    if (p.keylen != NULL) {
368
0
        size_t keylen;
369
370
0
        if (!OSSL_PARAM_get_size_t(p.keylen, &keylen)) {
371
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
372
0
            return 0;
373
0
        }
374
        /* The key length can not be modified */
375
0
        if (keylen != ctx->keylen)
376
0
            return 0;
377
0
    }
378
0
    return 1;
379
0
}
380
381
static const OSSL_PARAM *aes_siv_settable_ctx_params(ossl_unused void *cctx,
382
                                                     ossl_unused void *provctx)
383
0
{
384
0
    return aes_siv_set_ctx_params_list;
385
0
}
386
387
#define IMPLEMENT_cipher(alg, lc, UCMODE, flags, kbits, blkbits, ivbits)       \
388
static OSSL_FUNC_cipher_newctx_fn alg##kbits##lc##_newctx;                     \
389
static OSSL_FUNC_cipher_freectx_fn alg##_##lc##_freectx;                       \
390
static OSSL_FUNC_cipher_dupctx_fn lc##_dupctx;                                 \
391
static OSSL_FUNC_cipher_encrypt_init_fn lc##_einit;                            \
392
static OSSL_FUNC_cipher_decrypt_init_fn lc##_dinit;                            \
393
static OSSL_FUNC_cipher_update_fn lc##_stream_update;                          \
394
static OSSL_FUNC_cipher_final_fn lc##_stream_final;                            \
395
static OSSL_FUNC_cipher_cipher_fn lc##_cipher;                                 \
396
static OSSL_FUNC_cipher_get_params_fn alg##_##kbits##_##lc##_get_params;       \
397
static OSSL_FUNC_cipher_get_ctx_params_fn alg##_##lc##_get_ctx_params;         \
398
static OSSL_FUNC_cipher_gettable_ctx_params_fn                                 \
399
            alg##_##lc##_gettable_ctx_params;                                  \
400
static OSSL_FUNC_cipher_set_ctx_params_fn alg##_##lc##_set_ctx_params;         \
401
static OSSL_FUNC_cipher_settable_ctx_params_fn                                 \
402
            alg##_##lc##_settable_ctx_params;                                  \
403
3
static int alg##_##kbits##_##lc##_get_params(OSSL_PARAM params[])              \
404
3
{                                                                              \
405
3
    return ossl_cipher_generic_get_params(params, EVP_CIPH_##UCMODE##_MODE,    \
406
3
                                          flags, 2*kbits, blkbits, ivbits);    \
407
3
}                                                                              \
cipher_aes_siv.c:aes_128_siv_get_params
Line
Count
Source
403
1
static int alg##_##kbits##_##lc##_get_params(OSSL_PARAM params[])              \
404
1
{                                                                              \
405
1
    return ossl_cipher_generic_get_params(params, EVP_CIPH_##UCMODE##_MODE,    \
406
1
                                          flags, 2*kbits, blkbits, ivbits);    \
407
1
}                                                                              \
cipher_aes_siv.c:aes_192_siv_get_params
Line
Count
Source
403
1
static int alg##_##kbits##_##lc##_get_params(OSSL_PARAM params[])              \
404
1
{                                                                              \
405
1
    return ossl_cipher_generic_get_params(params, EVP_CIPH_##UCMODE##_MODE,    \
406
1
                                          flags, 2*kbits, blkbits, ivbits);    \
407
1
}                                                                              \
cipher_aes_siv.c:aes_256_siv_get_params
Line
Count
Source
403
1
static int alg##_##kbits##_##lc##_get_params(OSSL_PARAM params[])              \
404
1
{                                                                              \
405
1
    return ossl_cipher_generic_get_params(params, EVP_CIPH_##UCMODE##_MODE,    \
406
1
                                          flags, 2*kbits, blkbits, ivbits);    \
407
1
}                                                                              \
408
0
static void *alg##kbits##lc##_newctx(void *provctx)                            \
409
0
{                                                                              \
410
0
    return alg##_##lc##_newctx(provctx, 2*kbits, EVP_CIPH_##UCMODE##_MODE,     \
411
0
                               flags);                                         \
412
0
}                                                                              \
Unexecuted instantiation: cipher_aes_siv.c:aes128siv_newctx
Unexecuted instantiation: cipher_aes_siv.c:aes192siv_newctx
Unexecuted instantiation: cipher_aes_siv.c:aes256siv_newctx
413
const OSSL_DISPATCH ossl_##alg##kbits##lc##_functions[] = {                    \
414
    { OSSL_FUNC_CIPHER_NEWCTX, (void (*)(void))alg##kbits##lc##_newctx },      \
415
    { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))alg##_##lc##_freectx },        \
416
    { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void)) lc##_dupctx },                 \
417
    { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void)) lc##_einit },            \
418
    { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void)) lc##_dinit },            \
419
    { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void)) lc##_stream_update },          \
420
    { OSSL_FUNC_CIPHER_FINAL, (void (*)(void)) lc##_stream_final },            \
421
    { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void)) lc##_cipher },                 \
422
    { OSSL_FUNC_CIPHER_GET_PARAMS,                                             \
423
      (void (*)(void)) alg##_##kbits##_##lc##_get_params },                    \
424
    { OSSL_FUNC_CIPHER_GETTABLE_PARAMS,                                        \
425
      (void (*)(void))ossl_cipher_generic_gettable_params },                   \
426
    { OSSL_FUNC_CIPHER_GET_CTX_PARAMS,                                         \
427
      (void (*)(void)) alg##_##lc##_get_ctx_params },                          \
428
    { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS,                                    \
429
      (void (*)(void)) alg##_##lc##_gettable_ctx_params },                     \
430
    { OSSL_FUNC_CIPHER_SET_CTX_PARAMS,                                         \
431
      (void (*)(void)) alg##_##lc##_set_ctx_params },                          \
432
    { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS,                                    \
433
      (void (*)(void)) alg##_##lc##_settable_ctx_params },                     \
434
    OSSL_DISPATCH_END                                                          \
435
};
436
437
IMPLEMENT_cipher(aes, siv, SIV, SIV_FLAGS, 128, 8, 0)
438
IMPLEMENT_cipher(aes, siv, SIV, SIV_FLAGS, 192, 8, 0)
439
IMPLEMENT_cipher(aes, siv, SIV, SIV_FLAGS, 256, 8, 0)