Coverage Report

Created: 2023-09-25 06:45

/src/openssl30/providers/implementations/ciphers/cipher_tdes_common.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
/*
11
 * DES low level APIs are deprecated for public use, but still ok for internal
12
 * use.
13
 */
14
#include "internal/deprecated.h"
15
16
#include <openssl/rand.h>
17
#include <openssl/proverr.h>
18
#include "prov/ciphercommon.h"
19
#include "cipher_tdes.h"
20
#include "prov/implementations.h"
21
#include "prov/providercommon.h"
22
23
void *ossl_tdes_newctx(void *provctx, int mode, size_t kbits, size_t blkbits,
24
                       size_t ivbits, uint64_t flags, const PROV_CIPHER_HW *hw)
25
568
{
26
568
    PROV_TDES_CTX *tctx;
27
28
568
    if (!ossl_prov_is_running())
29
0
        return NULL;
30
31
568
    tctx = OPENSSL_zalloc(sizeof(*tctx));
32
568
    if (tctx != NULL)
33
568
        ossl_cipher_generic_initkey(tctx, kbits, blkbits, ivbits, mode, flags,
34
568
                                    hw, provctx);
35
568
    return tctx;
36
568
}
37
38
void *ossl_tdes_dupctx(void *ctx)
39
0
{
40
0
    PROV_TDES_CTX *in = (PROV_TDES_CTX *)ctx;
41
0
    PROV_TDES_CTX *ret;
42
43
0
    if (!ossl_prov_is_running())
44
0
        return NULL;
45
46
0
    ret = OPENSSL_malloc(sizeof(*ret));
47
0
    if (ret == NULL) {
48
0
        ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE);
49
0
        return NULL;
50
0
    }
51
0
    in->base.hw->copyctx(&ret->base, &in->base);
52
53
0
    return ret;
54
0
}
55
56
void ossl_tdes_freectx(void *vctx)
57
568
{
58
568
    PROV_TDES_CTX *ctx = (PROV_TDES_CTX *)vctx;
59
60
568
    ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx);
61
568
    OPENSSL_clear_free(ctx,  sizeof(*ctx));
62
568
}
63
64
static int tdes_init(void *vctx, const unsigned char *key, size_t keylen,
65
                     const unsigned char *iv, size_t ivlen,
66
                     const OSSL_PARAM params[], int enc)
67
568
{
68
568
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
69
70
568
    if (!ossl_prov_is_running())
71
0
        return 0;
72
73
568
    ctx->num = 0;
74
568
    ctx->bufsz = 0;
75
568
    ctx->enc = enc;
76
77
568
    if (iv != NULL) {
78
568
        if (!ossl_cipher_generic_initiv(ctx, iv, ivlen))
79
0
            return 0;
80
568
    } else if (ctx->iv_set
81
0
               && (ctx->mode == EVP_CIPH_CBC_MODE
82
0
                   || ctx->mode == EVP_CIPH_CFB_MODE
83
0
                   || ctx->mode == EVP_CIPH_OFB_MODE)) {
84
        /* reset IV to keep compatibility with 1.1.1 */
85
0
        memcpy(ctx->iv, ctx->oiv, ctx->ivlen);
86
0
    }
87
88
568
    if (key != NULL) {
89
568
        if (keylen != ctx->keylen) {
90
0
            ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH);
91
0
            return 0;
92
0
        }
93
568
        if (!ctx->hw->init(ctx, key, ctx->keylen))
94
0
            return 0;
95
568
    }
96
568
    return ossl_cipher_generic_set_ctx_params(ctx, params);
97
568
}
98
99
int ossl_tdes_einit(void *vctx, const unsigned char *key, size_t keylen,
100
                    const unsigned char *iv, size_t ivlen,
101
                    const OSSL_PARAM params[])
102
219
{
103
219
    return tdes_init(vctx, key, keylen, iv, ivlen, params, 1);
104
219
}
105
106
int ossl_tdes_dinit(void *vctx, const unsigned char *key, size_t keylen,
107
                    const unsigned char *iv, size_t ivlen,
108
                    const OSSL_PARAM params[])
109
349
{
110
349
    return tdes_init(vctx, key, keylen, iv, ivlen, params, 0);
111
349
}
112
113
CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_START(ossl_tdes)
114
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_RANDOM_KEY, NULL, 0),
115
CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_END(ossl_tdes)
116
117
static int tdes_generatekey(PROV_CIPHER_CTX *ctx, void *ptr)
118
0
{
119
120
0
    DES_cblock *deskey = ptr;
121
0
    size_t kl = ctx->keylen;
122
123
0
    if (kl == 0 || RAND_priv_bytes_ex(ctx->libctx, ptr, kl, 0) <= 0)
124
0
        return 0;
125
0
    DES_set_odd_parity(deskey);
126
0
    if (kl >= 16) {
127
0
        DES_set_odd_parity(deskey + 1);
128
0
        if (kl >= 24)
129
0
            DES_set_odd_parity(deskey + 2);
130
0
    }
131
0
    return 1;
132
0
}
133
134
int ossl_tdes_get_ctx_params(void *vctx, OSSL_PARAM params[])
135
1.48k
{
136
1.48k
    PROV_CIPHER_CTX  *ctx = (PROV_CIPHER_CTX *)vctx;
137
1.48k
    OSSL_PARAM *p;
138
139
1.48k
    if (!ossl_cipher_generic_get_ctx_params(vctx, params))
140
0
        return 0;
141
142
1.48k
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_RANDOM_KEY);
143
1.48k
    if (p != NULL && !tdes_generatekey(ctx, p->data)) {
144
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GENERATE_KEY);
145
0
        return 0;
146
0
    }
147
1.48k
    return 1;
148
1.48k
}