Coverage Report

Created: 2025-06-13 06:58

/src/openssl32/providers/implementations/ciphers/ciphercommon.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
/*
11
 * Generic dispatch table functions for ciphers.
12
 */
13
14
/* For SSL3_VERSION */
15
#include <openssl/prov_ssl.h>
16
#include <openssl/proverr.h>
17
#include "ciphercommon_local.h"
18
#include "prov/provider_ctx.h"
19
#include "prov/providercommon.h"
20
21
/*-
22
 * Generic cipher functions for OSSL_PARAM gettables and settables
23
 */
24
static const OSSL_PARAM cipher_known_gettable_params[] = {
25
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_MODE, NULL),
26
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL),
27
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL),
28
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_BLOCK_SIZE, NULL),
29
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_AEAD, NULL),
30
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_CUSTOM_IV, NULL),
31
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_CTS, NULL),
32
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK, NULL),
33
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_HAS_RAND_KEY, NULL),
34
    OSSL_PARAM_END
35
};
36
const OSSL_PARAM *ossl_cipher_generic_gettable_params(ossl_unused void *provctx)
37
0
{
38
0
    return cipher_known_gettable_params;
39
0
}
40
41
int ossl_cipher_generic_get_params(OSSL_PARAM params[], unsigned int md,
42
                                   uint64_t flags,
43
                                   size_t kbits, size_t blkbits, size_t ivbits)
44
1.27k
{
45
1.27k
    OSSL_PARAM *p;
46
47
1.27k
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_MODE);
48
1.27k
    if (p != NULL && !OSSL_PARAM_set_uint(p, md)) {
49
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
50
0
        return 0;
51
0
    }
52
1.27k
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_AEAD);
53
1.27k
    if (p != NULL
54
1.27k
        && !OSSL_PARAM_set_int(p, (flags & PROV_CIPHER_FLAG_AEAD) != 0)) {
55
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
56
0
        return 0;
57
0
    }
58
1.27k
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_CUSTOM_IV);
59
1.27k
    if (p != NULL
60
1.27k
        && !OSSL_PARAM_set_int(p, (flags & PROV_CIPHER_FLAG_CUSTOM_IV) != 0)) {
61
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
62
0
        return 0;
63
0
    }
64
1.27k
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_CTS);
65
1.27k
    if (p != NULL
66
1.27k
        && !OSSL_PARAM_set_int(p, (flags & PROV_CIPHER_FLAG_CTS) != 0)) {
67
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
68
0
        return 0;
69
0
    }
70
1.27k
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK);
71
1.27k
    if (p != NULL
72
1.27k
        && !OSSL_PARAM_set_int(p, (flags & PROV_CIPHER_FLAG_TLS1_MULTIBLOCK) != 0)) {
73
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
74
0
        return 0;
75
0
    }
76
1.27k
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_HAS_RAND_KEY);
77
1.27k
    if (p != NULL
78
1.27k
        && !OSSL_PARAM_set_int(p, (flags & PROV_CIPHER_FLAG_RAND_KEY) != 0)) {
79
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
80
0
        return 0;
81
0
    }
82
1.27k
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_KEYLEN);
83
1.27k
    if (p != NULL && !OSSL_PARAM_set_size_t(p, kbits / 8)) {
84
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
85
0
        return 0;
86
0
    }
87
1.27k
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_BLOCK_SIZE);
88
1.27k
    if (p != NULL && !OSSL_PARAM_set_size_t(p, blkbits / 8)) {
89
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
90
0
        return 0;
91
0
    }
92
1.27k
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IVLEN);
93
1.27k
    if (p != NULL && !OSSL_PARAM_set_size_t(p, ivbits / 8)) {
94
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
95
0
        return 0;
96
0
    }
97
1.27k
    return 1;
98
1.27k
}
99
100
CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_START(ossl_cipher_generic)
101
{ OSSL_CIPHER_PARAM_TLS_MAC, OSSL_PARAM_OCTET_PTR, NULL, 0, OSSL_PARAM_UNMODIFIED },
102
CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_END(ossl_cipher_generic)
103
104
CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_START(ossl_cipher_generic)
105
OSSL_PARAM_uint(OSSL_CIPHER_PARAM_USE_BITS, NULL),
106
OSSL_PARAM_uint(OSSL_CIPHER_PARAM_TLS_VERSION, NULL),
107
OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_TLS_MAC_SIZE, NULL),
108
CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_END(ossl_cipher_generic)
109
110
/*
111
 * Variable key length cipher functions for OSSL_PARAM settables
112
 */
113
int ossl_cipher_var_keylen_set_ctx_params(void *vctx, const OSSL_PARAM params[])
114
0
{
115
0
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
116
0
    const OSSL_PARAM *p;
117
118
0
    if (params == NULL)
119
0
        return 1;
120
121
0
    if (!ossl_cipher_generic_set_ctx_params(vctx, params))
122
0
        return 0;
123
0
    p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_KEYLEN);
124
0
    if (p != NULL) {
125
0
        size_t keylen;
126
127
0
        if (!OSSL_PARAM_get_size_t(p, &keylen)) {
128
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
129
0
            return 0;
130
0
        }
131
0
        if (ctx->keylen != keylen) {
132
0
            ctx->keylen = keylen;
133
0
            ctx->key_set = 0;
134
0
        }
135
0
    }
136
0
    return 1;
137
0
}
138
139
CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_START(ossl_cipher_var_keylen)
140
OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL),
141
CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_END(ossl_cipher_var_keylen)
142
143
/*-
144
 * AEAD cipher functions for OSSL_PARAM gettables and settables
145
 */
146
static const OSSL_PARAM cipher_aead_known_gettable_ctx_params[] = {
147
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL),
148
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL),
149
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_AEAD_TAGLEN, NULL),
150
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_IV, NULL, 0),
151
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_UPDATED_IV, NULL, 0),
152
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TAG, NULL, 0),
153
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_AEAD_TLS1_AAD_PAD, NULL),
154
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TLS1_GET_IV_GEN, NULL, 0),
155
    OSSL_PARAM_END
156
};
157
const OSSL_PARAM *ossl_cipher_aead_gettable_ctx_params(
158
        ossl_unused void *cctx, ossl_unused void *provctx
159
    )
160
344
{
161
344
    return cipher_aead_known_gettable_ctx_params;
162
344
}
163
164
static const OSSL_PARAM cipher_aead_known_settable_ctx_params[] = {
165
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_AEAD_IVLEN, NULL),
166
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TAG, NULL, 0),
167
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TLS1_AAD, NULL, 0),
168
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TLS1_IV_FIXED, NULL, 0),
169
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TLS1_SET_IV_INV, NULL, 0),
170
    OSSL_PARAM_END
171
};
172
const OSSL_PARAM *ossl_cipher_aead_settable_ctx_params(
173
        ossl_unused void *cctx, ossl_unused void *provctx
174
    )
175
2
{
176
2
    return cipher_aead_known_settable_ctx_params;
177
2
}
178
179
void ossl_cipher_generic_reset_ctx(PROV_CIPHER_CTX *ctx)
180
103k
{
181
103k
    if (ctx != NULL && ctx->alloced) {
182
1.58k
        OPENSSL_free(ctx->tlsmac);
183
1.58k
        ctx->alloced = 0;
184
1.58k
        ctx->tlsmac = NULL;
185
1.58k
    }
186
103k
}
187
188
static int cipher_generic_init_internal(PROV_CIPHER_CTX *ctx,
189
                                        const unsigned char *key, size_t keylen,
190
                                        const unsigned char *iv, size_t ivlen,
191
                                        const OSSL_PARAM params[], int enc)
192
1.99M
{
193
1.99M
    ctx->num = 0;
194
1.99M
    ctx->bufsz = 0;
195
1.99M
    ctx->updated = 0;
196
1.99M
    ctx->enc = enc ? 1 : 0;
197
198
1.99M
    if (!ossl_prov_is_running())
199
0
        return 0;
200
201
1.99M
    if (iv != NULL && ctx->mode != EVP_CIPH_ECB_MODE) {
202
383k
        if (!ossl_cipher_generic_initiv(ctx, iv, ivlen))
203
0
            return 0;
204
383k
    }
205
1.99M
    if (iv == NULL && ctx->iv_set
206
1.99M
        && (ctx->mode == EVP_CIPH_CBC_MODE
207
81.6k
            || ctx->mode == EVP_CIPH_CFB_MODE
208
81.6k
            || ctx->mode == EVP_CIPH_OFB_MODE))
209
        /* reset IV for these modes to keep compatibility with 1.1.1 */
210
0
        memcpy(ctx->iv, ctx->oiv, ctx->ivlen);
211
212
1.99M
    if (key != NULL) {
213
269k
        if (ctx->variable_keylength == 0) {
214
269k
            if (keylen != ctx->keylen) {
215
0
                ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH);
216
0
                return 0;
217
0
            }
218
269k
        } else {
219
0
            ctx->keylen = keylen;
220
0
        }
221
269k
        if (!ctx->hw->init(ctx, key, ctx->keylen))
222
0
            return 0;
223
269k
        ctx->key_set = 1;
224
269k
    }
225
1.99M
    return ossl_cipher_generic_set_ctx_params(ctx, params);
226
1.99M
}
227
228
int ossl_cipher_generic_einit(void *vctx, const unsigned char *key,
229
                              size_t keylen, const unsigned char *iv,
230
                              size_t ivlen, const OSSL_PARAM params[])
231
1.83M
{
232
1.83M
    return cipher_generic_init_internal((PROV_CIPHER_CTX *)vctx, key, keylen,
233
1.83M
                                        iv, ivlen, params, 1);
234
1.83M
}
235
236
int ossl_cipher_generic_dinit(void *vctx, const unsigned char *key,
237
                              size_t keylen, const unsigned char *iv,
238
                              size_t ivlen, const OSSL_PARAM params[])
239
164k
{
240
164k
    return cipher_generic_init_internal((PROV_CIPHER_CTX *)vctx, key, keylen,
241
164k
                                        iv, ivlen, params, 0);
242
164k
}
243
244
/* Max padding including padding length byte */
245
2.48k
#define MAX_PADDING 256
246
247
int ossl_cipher_generic_block_update(void *vctx, unsigned char *out,
248
                                     size_t *outl, size_t outsize,
249
                                     const unsigned char *in, size_t inl)
250
2.79M
{
251
2.79M
    size_t outlint = 0;
252
2.79M
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
253
2.79M
    size_t blksz = ctx->blocksize;
254
2.79M
    size_t nextblocks;
255
256
2.79M
    if (!ctx->key_set) {
257
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
258
0
        return 0;
259
0
    }
260
261
2.79M
    if (ctx->tlsversion > 0) {
262
        /*
263
         * Each update call corresponds to a TLS record and is individually
264
         * padded
265
         */
266
267
        /* Sanity check inputs */
268
54.8k
        if (in == NULL
269
54.8k
                || in != out
270
54.8k
                || outsize < inl
271
54.8k
                || !ctx->pad) {
272
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
273
0
            return 0;
274
0
        }
275
276
54.8k
        if (ctx->enc) {
277
2.48k
            unsigned char padval;
278
2.48k
            size_t padnum, loop;
279
280
            /* Add padding */
281
282
2.48k
            padnum = blksz - (inl % blksz);
283
284
2.48k
            if (outsize < inl + padnum) {
285
0
                ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
286
0
                return 0;
287
0
            }
288
289
2.48k
            if (padnum > MAX_PADDING) {
290
0
                ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
291
0
                return 0;
292
0
            }
293
2.48k
            padval = (unsigned char)(padnum - 1);
294
2.48k
            if (ctx->tlsversion == SSL3_VERSION) {
295
859
                if (padnum > 1)
296
859
                    memset(out + inl, 0, padnum - 1);
297
859
                *(out + inl + padnum - 1) = padval;
298
1.62k
            } else {
299
                /* we need to add 'padnum' padding bytes of value padval */
300
18.6k
                for (loop = inl; loop < inl + padnum; loop++)
301
17.0k
                    out[loop] = padval;
302
1.62k
            }
303
2.48k
            inl += padnum;
304
2.48k
        }
305
306
54.8k
        if ((inl % blksz) != 0) {
307
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
308
0
            return 0;
309
0
        }
310
311
312
        /* Shouldn't normally fail */
313
54.8k
        if (!ctx->hw->cipher(ctx, out, in, inl)) {
314
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
315
0
            return 0;
316
0
        }
317
318
54.8k
        if (ctx->alloced) {
319
43.8k
            OPENSSL_free(ctx->tlsmac);
320
43.8k
            ctx->alloced = 0;
321
43.8k
            ctx->tlsmac = NULL;
322
43.8k
        }
323
324
        /* This only fails if padding is publicly invalid */
325
54.8k
        *outl = inl;
326
54.8k
        if (!ctx->enc
327
54.8k
            && !ossl_cipher_tlsunpadblock(ctx->libctx, ctx->tlsversion,
328
52.3k
                                          out, outl,
329
52.3k
                                          blksz, &ctx->tlsmac, &ctx->alloced,
330
52.3k
                                          ctx->tlsmacsize, 0)) {
331
6.84k
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
332
6.84k
            return 0;
333
6.84k
        }
334
47.9k
        return 1;
335
54.8k
    }
336
337
2.73M
    if (ctx->bufsz != 0)
338
0
        nextblocks = ossl_cipher_fillblock(ctx->buf, &ctx->bufsz, blksz,
339
0
                                           &in, &inl);
340
2.73M
    else
341
2.73M
        nextblocks = inl & ~(blksz-1);
342
343
    /*
344
     * If we're decrypting and we end an update on a block boundary we hold
345
     * the last block back in case this is the last update call and the last
346
     * block is padded.
347
     */
348
2.73M
    if (ctx->bufsz == blksz && (ctx->enc || inl > 0 || !ctx->pad)) {
349
0
        if (outsize < blksz) {
350
0
            ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
351
0
            return 0;
352
0
        }
353
0
        if (!ctx->hw->cipher(ctx, out, ctx->buf, blksz)) {
354
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
355
0
            return 0;
356
0
        }
357
0
        ctx->bufsz = 0;
358
0
        outlint = blksz;
359
0
        out += blksz;
360
0
    }
361
2.73M
    if (nextblocks > 0) {
362
2.73M
        if (!ctx->enc && ctx->pad && nextblocks == inl) {
363
691
            if (!ossl_assert(inl >= blksz)) {
364
0
                ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
365
0
                return 0;
366
0
            }
367
691
            nextblocks -= blksz;
368
691
        }
369
2.73M
        outlint += nextblocks;
370
2.73M
        if (outsize < outlint) {
371
0
            ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
372
0
            return 0;
373
0
        }
374
2.73M
    }
375
2.73M
    if (nextblocks > 0) {
376
2.73M
        if (!ctx->hw->cipher(ctx, out, in, nextblocks)) {
377
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
378
0
            return 0;
379
0
        }
380
2.73M
        in += nextblocks;
381
2.73M
        inl -= nextblocks;
382
2.73M
    }
383
2.73M
    if (inl != 0
384
2.73M
        && !ossl_cipher_trailingdata(ctx->buf, &ctx->bufsz, blksz, &in, &inl)) {
385
        /* ERR_raise already called */
386
0
        return 0;
387
0
    }
388
389
2.73M
    *outl = outlint;
390
2.73M
    return inl == 0;
391
2.73M
}
392
393
int ossl_cipher_generic_block_final(void *vctx, unsigned char *out,
394
                                    size_t *outl, size_t outsize)
395
830
{
396
830
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
397
830
    size_t blksz = ctx->blocksize;
398
399
830
    if (!ossl_prov_is_running())
400
0
        return 0;
401
402
830
    if (!ctx->key_set) {
403
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
404
0
        return 0;
405
0
    }
406
407
830
    if (ctx->tlsversion > 0) {
408
        /* We never finalize TLS, so this is an error */
409
0
        ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
410
0
        return 0;
411
0
    }
412
413
830
    if (ctx->enc) {
414
116
        if (ctx->pad) {
415
96
            ossl_cipher_padblock(ctx->buf, &ctx->bufsz, blksz);
416
96
        } else if (ctx->bufsz == 0) {
417
20
            *outl = 0;
418
20
            return 1;
419
20
        } else if (ctx->bufsz != blksz) {
420
0
            ERR_raise(ERR_LIB_PROV, PROV_R_WRONG_FINAL_BLOCK_LENGTH);
421
0
            return 0;
422
0
        }
423
424
96
        if (outsize < blksz) {
425
0
            ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
426
0
            return 0;
427
0
        }
428
96
        if (!ctx->hw->cipher(ctx, out, ctx->buf, blksz)) {
429
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
430
0
            return 0;
431
0
        }
432
96
        ctx->bufsz = 0;
433
96
        *outl = blksz;
434
96
        return 1;
435
96
    }
436
437
    /* Decrypting */
438
714
    if (ctx->bufsz != blksz) {
439
23
        if (ctx->bufsz == 0 && !ctx->pad) {
440
0
            *outl = 0;
441
0
            return 1;
442
0
        }
443
23
        ERR_raise(ERR_LIB_PROV, PROV_R_WRONG_FINAL_BLOCK_LENGTH);
444
23
        return 0;
445
23
    }
446
447
691
    if (!ctx->hw->cipher(ctx, ctx->buf, ctx->buf, blksz)) {
448
0
        ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
449
0
        return 0;
450
0
    }
451
452
691
    if (ctx->pad && !ossl_cipher_unpadblock(ctx->buf, &ctx->bufsz, blksz)) {
453
        /* ERR_raise already called */
454
31
        return 0;
455
31
    }
456
457
660
    if (outsize < ctx->bufsz) {
458
0
        ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
459
0
        return 0;
460
0
    }
461
660
    memcpy(out, ctx->buf, ctx->bufsz);
462
660
    *outl = ctx->bufsz;
463
660
    ctx->bufsz = 0;
464
660
    return 1;
465
660
}
466
467
int ossl_cipher_generic_stream_update(void *vctx, unsigned char *out,
468
                                      size_t *outl, size_t outsize,
469
                                      const unsigned char *in, size_t inl)
470
131k
{
471
131k
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
472
473
131k
    if (!ctx->key_set) {
474
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
475
0
        return 0;
476
0
    }
477
478
131k
    if (inl == 0) {
479
0
        *outl = 0;
480
0
        return 1;
481
0
    }
482
483
131k
    if (outsize < inl) {
484
0
        ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
485
0
        return 0;
486
0
    }
487
488
131k
    if (!ctx->hw->cipher(ctx, out, in, inl)) {
489
312
        ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
490
312
        return 0;
491
312
    }
492
493
130k
    *outl = inl;
494
130k
    if (!ctx->enc && ctx->tlsversion > 0) {
495
        /*
496
        * Remove any TLS padding. Only used by cipher_aes_cbc_hmac_sha1_hw.c and
497
        * cipher_aes_cbc_hmac_sha256_hw.c
498
        */
499
0
        if (ctx->removetlspad) {
500
            /*
501
             * We should have already failed in the cipher() call above if this
502
             * isn't true.
503
             */
504
0
            if (!ossl_assert(*outl >= (size_t)(out[inl - 1] + 1)))
505
0
                return 0;
506
            /* The actual padding length */
507
0
            *outl -= out[inl - 1] + 1;
508
0
        }
509
510
        /* TLS MAC and explicit IV if relevant. We should have already failed
511
         * in the cipher() call above if *outl is too short.
512
         */
513
0
        if (!ossl_assert(*outl >= ctx->removetlsfixed))
514
0
            return 0;
515
0
        *outl -= ctx->removetlsfixed;
516
517
        /* Extract the MAC if there is one */
518
0
        if (ctx->tlsmacsize > 0) {
519
0
            if (*outl < ctx->tlsmacsize)
520
0
                return 0;
521
522
0
            ctx->tlsmac = out + *outl - ctx->tlsmacsize;
523
0
            *outl -= ctx->tlsmacsize;
524
0
        }
525
0
    }
526
527
130k
    return 1;
528
130k
}
529
int ossl_cipher_generic_stream_final(void *vctx, unsigned char *out,
530
                                     size_t *outl, size_t outsize)
531
0
{
532
0
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
533
534
0
    if (!ossl_prov_is_running())
535
0
        return 0;
536
537
0
    if (!ctx->key_set) {
538
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
539
0
        return 0;
540
0
    }
541
542
0
    *outl = 0;
543
0
    return 1;
544
0
}
545
546
int ossl_cipher_generic_cipher(void *vctx, unsigned char *out, size_t *outl,
547
                               size_t outsize, const unsigned char *in,
548
                               size_t inl)
549
7
{
550
7
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
551
552
7
    if (!ossl_prov_is_running())
553
0
        return 0;
554
555
7
    if (!ctx->key_set) {
556
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
557
0
        return 0;
558
0
    }
559
560
7
    if (outsize < inl) {
561
0
        ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
562
0
        return 0;
563
0
    }
564
565
7
    if (!ctx->hw->cipher(ctx, out, in, inl)) {
566
0
        ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
567
0
        return 0;
568
0
    }
569
570
7
    *outl = inl;
571
7
    return 1;
572
7
}
573
574
int ossl_cipher_generic_get_ctx_params(void *vctx, OSSL_PARAM params[])
575
99.4k
{
576
99.4k
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
577
99.4k
    OSSL_PARAM *p;
578
579
99.4k
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IVLEN);
580
99.4k
    if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->ivlen)) {
581
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
582
0
        return 0;
583
0
    }
584
99.4k
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_PADDING);
585
99.4k
    if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->pad)) {
586
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
587
0
        return 0;
588
0
    }
589
99.4k
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IV);
590
99.4k
    if (p != NULL
591
99.4k
        && !OSSL_PARAM_set_octet_ptr(p, &ctx->oiv, ctx->ivlen)
592
99.4k
        && !OSSL_PARAM_set_octet_string(p, &ctx->oiv, ctx->ivlen)) {
593
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
594
0
        return 0;
595
0
    }
596
99.4k
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_UPDATED_IV);
597
99.4k
    if (p != NULL
598
99.4k
        && !OSSL_PARAM_set_octet_ptr(p, &ctx->iv, ctx->ivlen)
599
99.4k
        && !OSSL_PARAM_set_octet_string(p, &ctx->iv, ctx->ivlen)) {
600
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
601
0
        return 0;
602
0
    }
603
99.4k
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_NUM);
604
99.4k
    if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->num)) {
605
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
606
0
        return 0;
607
0
    }
608
99.4k
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_KEYLEN);
609
99.4k
    if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->keylen)) {
610
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
611
0
        return 0;
612
0
    }
613
99.4k
    p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_TLS_MAC);
614
99.4k
    if (p != NULL
615
99.4k
        && !OSSL_PARAM_set_octet_ptr(p, ctx->tlsmac, ctx->tlsmacsize)) {
616
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
617
0
        return 0;
618
0
    }
619
99.4k
    return 1;
620
99.4k
}
621
622
int ossl_cipher_generic_set_ctx_params(void *vctx, const OSSL_PARAM params[])
623
1.10M
{
624
1.10M
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
625
1.10M
    const OSSL_PARAM *p;
626
627
1.10M
    if (params == NULL)
628
1.10M
        return 1;
629
630
2.33k
    p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_PADDING);
631
2.33k
    if (p != NULL) {
632
0
        unsigned int pad;
633
634
0
        if (!OSSL_PARAM_get_uint(p, &pad)) {
635
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
636
0
            return 0;
637
0
        }
638
0
        ctx->pad = pad ? 1 : 0;
639
0
    }
640
2.33k
    p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_USE_BITS);
641
2.33k
    if (p != NULL) {
642
0
        unsigned int bits;
643
644
0
        if (!OSSL_PARAM_get_uint(p, &bits)) {
645
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
646
0
            return 0;
647
0
        }
648
0
        ctx->use_bits = bits ? 1 : 0;
649
0
    }
650
2.33k
    p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_TLS_VERSION);
651
2.33k
    if (p != NULL) {
652
2.33k
        if (!OSSL_PARAM_get_uint(p, &ctx->tlsversion)) {
653
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
654
0
            return 0;
655
0
        }
656
2.33k
    }
657
2.33k
    p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_TLS_MAC_SIZE);
658
2.33k
    if (p != NULL) {
659
2.33k
        if (!OSSL_PARAM_get_size_t(p, &ctx->tlsmacsize)) {
660
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
661
0
            return 0;
662
0
        }
663
2.33k
    }
664
2.33k
    p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_NUM);
665
2.33k
    if (p != NULL) {
666
0
        unsigned int num;
667
668
0
        if (!OSSL_PARAM_get_uint(p, &num)) {
669
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
670
0
            return 0;
671
0
        }
672
0
        ctx->num = num;
673
0
    }
674
2.33k
    return 1;
675
2.33k
}
676
677
int ossl_cipher_generic_initiv(PROV_CIPHER_CTX *ctx, const unsigned char *iv,
678
                               size_t ivlen)
679
385k
{
680
385k
    if (ivlen != ctx->ivlen
681
385k
        || ivlen > sizeof(ctx->iv)) {
682
0
        ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH);
683
0
        return 0;
684
0
    }
685
385k
    ctx->iv_set = 1;
686
385k
    memcpy(ctx->iv, iv, ivlen);
687
385k
    memcpy(ctx->oiv, iv, ivlen);
688
385k
    return 1;
689
385k
}
690
691
void ossl_cipher_generic_initkey(void *vctx, size_t kbits, size_t blkbits,
692
                                 size_t ivbits, unsigned int mode,
693
                                 uint64_t flags, const PROV_CIPHER_HW *hw,
694
                                 void *provctx)
695
107k
{
696
107k
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
697
698
107k
    if ((flags & PROV_CIPHER_FLAG_INVERSE_CIPHER) != 0)
699
0
        ctx->inverse_cipher = 1;
700
107k
    if ((flags & PROV_CIPHER_FLAG_VARIABLE_LENGTH) != 0)
701
0
        ctx->variable_keylength = 1;
702
703
107k
    ctx->pad = 1;
704
107k
    ctx->keylen = ((kbits) / 8);
705
107k
    ctx->ivlen = ((ivbits) / 8);
706
107k
    ctx->hw = hw;
707
107k
    ctx->mode = mode;
708
107k
    ctx->blocksize = blkbits / 8;
709
107k
    if (provctx != NULL)
710
96.5k
        ctx->libctx = PROV_LIBCTX_OF(provctx); /* used for rand */
711
107k
}