Coverage Report

Created: 2025-08-03 07:12

/src/openssl/providers/implementations/ciphers/ciphercommon.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright 2019-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
/*
12
 * Generic dispatch table functions for ciphers.
13
 */
14
15
/* For SSL3_VERSION */
16
#include <string.h>
17
#include <openssl/prov_ssl.h>
18
#include <openssl/proverr.h>
19
#include "ciphercommon_local.h"
20
#include "prov/provider_ctx.h"
21
#include "prov/providercommon.h"
22
#include "internal/skey.h"
23
#include "internal/e_os.h"
24
#include "crypto/types.h"
25
26
/*-
27
 * Generic cipher functions for OSSL_PARAM gettables and settables
28
 */
29
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
30
#ifndef ossl_cipher_generic_get_params_list
31
static const OSSL_PARAM ossl_cipher_generic_get_params_list[] = {
32
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_MODE, NULL),
33
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL),
34
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL),
35
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_BLOCK_SIZE, NULL),
36
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_AEAD, NULL),
37
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_CUSTOM_IV, NULL),
38
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_CTS, NULL),
39
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK, NULL),
40
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_HAS_RAND_KEY, NULL),
41
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_ENCRYPT_THEN_MAC, NULL),
42
    OSSL_PARAM_END
43
};
44
#endif
45
46
#ifndef ossl_cipher_generic_get_params_st
47
struct ossl_cipher_generic_get_params_st {
48
    OSSL_PARAM *aead;
49
    OSSL_PARAM *bsize;
50
    OSSL_PARAM *cts;
51
    OSSL_PARAM *custiv;
52
    OSSL_PARAM *etm;
53
    OSSL_PARAM *ivlen;
54
    OSSL_PARAM *keylen;
55
    OSSL_PARAM *mb;
56
    OSSL_PARAM *mode;
57
    OSSL_PARAM *rand;
58
};
59
#endif
60
61
#ifndef ossl_cipher_generic_get_params_decoder
62
static int ossl_cipher_generic_get_params_decoder
63
    (const OSSL_PARAM *p, struct ossl_cipher_generic_get_params_st *r)
64
2.08k
{
65
2.08k
    const char *s;
66
67
2.08k
    memset(r, 0, sizeof(*r));
68
2.08k
    if (p != NULL)
69
22.8k
        for (; (s = p->key) != NULL; p++)
70
20.8k
            switch(s[0]) {
71
0
            default:
72
0
                break;
73
2.08k
            case 'a':
74
2.08k
                if (ossl_likely(strcmp("ead", s + 1) == 0)) {
75
2.08k
                    if (ossl_likely(r->aead == NULL))
76
2.08k
                        r->aead = (OSSL_PARAM *)p;
77
2.08k
                }
78
2.08k
                break;
79
2.08k
            case 'b':
80
2.08k
                if (ossl_likely(strcmp("locksize", s + 1) == 0)) {
81
2.08k
                    if (ossl_likely(r->bsize == NULL))
82
2.08k
                        r->bsize = (OSSL_PARAM *)p;
83
2.08k
                }
84
2.08k
                break;
85
4.16k
            case 'c':
86
4.16k
                switch(s[1]) {
87
0
                default:
88
0
                    break;
89
2.08k
                case 't':
90
2.08k
                    if (ossl_likely(strcmp("s", s + 2) == 0)) {
91
2.08k
                        if (ossl_likely(r->cts == NULL))
92
2.08k
                            r->cts = (OSSL_PARAM *)p;
93
2.08k
                    }
94
2.08k
                    break;
95
2.08k
                case 'u':
96
2.08k
                    if (ossl_likely(strcmp("stom-iv", s + 2) == 0)) {
97
2.08k
                        if (ossl_likely(r->custiv == NULL))
98
2.08k
                            r->custiv = (OSSL_PARAM *)p;
99
2.08k
                    }
100
4.16k
                }
101
4.16k
                break;
102
4.16k
            case 'e':
103
2.08k
                if (ossl_likely(strcmp("ncrypt-then-mac", s + 1) == 0)) {
104
2.08k
                    if (ossl_likely(r->etm == NULL))
105
2.08k
                        r->etm = (OSSL_PARAM *)p;
106
2.08k
                }
107
2.08k
                break;
108
2.08k
            case 'h':
109
2.08k
                if (ossl_likely(strcmp("as-randkey", s + 1) == 0)) {
110
2.08k
                    if (ossl_likely(r->rand == NULL))
111
2.08k
                        r->rand = (OSSL_PARAM *)p;
112
2.08k
                }
113
2.08k
                break;
114
2.08k
            case 'i':
115
2.08k
                if (ossl_likely(strcmp("vlen", s + 1) == 0)) {
116
2.08k
                    if (ossl_likely(r->ivlen == NULL))
117
2.08k
                        r->ivlen = (OSSL_PARAM *)p;
118
2.08k
                }
119
2.08k
                break;
120
2.08k
            case 'k':
121
2.08k
                if (ossl_likely(strcmp("eylen", s + 1) == 0)) {
122
2.08k
                    if (ossl_likely(r->keylen == NULL))
123
2.08k
                        r->keylen = (OSSL_PARAM *)p;
124
2.08k
                }
125
2.08k
                break;
126
2.08k
            case 'm':
127
2.08k
                if (ossl_likely(strcmp("ode", s + 1) == 0)) {
128
2.08k
                    if (ossl_likely(r->mode == NULL))
129
2.08k
                        r->mode = (OSSL_PARAM *)p;
130
2.08k
                }
131
2.08k
                break;
132
2.08k
            case 't':
133
2.08k
                if (ossl_likely(strcmp("ls-multi", s + 1) == 0)) {
134
2.08k
                    if (ossl_likely(r->mb == NULL))
135
2.08k
                        r->mb = (OSSL_PARAM *)p;
136
2.08k
                }
137
20.8k
            }
138
2.08k
    return 1;
139
2.08k
}
140
#endif
141
/* End of machine generated */
142
143
const OSSL_PARAM *ossl_cipher_generic_gettable_params(ossl_unused void *provctx)
144
0
{
145
0
    return ossl_cipher_generic_get_params_list;
146
0
}
147
148
int ossl_cipher_generic_get_params(OSSL_PARAM params[], unsigned int md,
149
                                   uint64_t flags,
150
                                   size_t kbits, size_t blkbits, size_t ivbits)
151
2.08k
{
152
2.08k
    struct ossl_cipher_generic_get_params_st p;
153
154
2.08k
    if (!ossl_cipher_generic_get_params_decoder(params, &p))
155
0
        return 0;
156
157
2.08k
    if (p.mode != NULL && !OSSL_PARAM_set_uint(p.mode, md)) {
158
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
159
0
        return 0;
160
0
    }
161
2.08k
    if (p.aead != NULL
162
2.08k
            && !OSSL_PARAM_set_int(p.aead, (flags & PROV_CIPHER_FLAG_AEAD) != 0)) {
163
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
164
0
        return 0;
165
0
    }
166
2.08k
    if (p.custiv != NULL
167
2.08k
            && !OSSL_PARAM_set_int(p.custiv, (flags & PROV_CIPHER_FLAG_CUSTOM_IV) != 0)) {
168
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
169
0
        return 0;
170
0
    }
171
2.08k
    if (p.cts != NULL
172
2.08k
            && !OSSL_PARAM_set_int(p.cts, (flags & PROV_CIPHER_FLAG_CTS) != 0)) {
173
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
174
0
        return 0;
175
0
    }
176
2.08k
    if (p.mb != NULL
177
2.08k
            && !OSSL_PARAM_set_int(p.mb, (flags & PROV_CIPHER_FLAG_TLS1_MULTIBLOCK) != 0)) {
178
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
179
0
        return 0;
180
0
    }
181
2.08k
    if (p.rand != NULL
182
2.08k
            && !OSSL_PARAM_set_int(p.rand, (flags & PROV_CIPHER_FLAG_RAND_KEY) != 0)) {
183
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
184
0
        return 0;
185
0
    }
186
2.08k
    if (p.etm != NULL
187
2.08k
            && !OSSL_PARAM_set_int(p.etm, (flags & EVP_CIPH_FLAG_ENC_THEN_MAC) != 0)) {
188
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
189
0
        return 0;
190
0
    }
191
2.08k
    if (p.keylen != NULL && !OSSL_PARAM_set_size_t(p.keylen, kbits / 8)) {
192
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
193
0
        return 0;
194
0
    }
195
2.08k
    if (p.bsize != NULL && !OSSL_PARAM_set_size_t(p.bsize, blkbits / 8)) {
196
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
197
0
        return 0;
198
0
    }
199
2.08k
    if (p.ivlen != NULL && !OSSL_PARAM_set_size_t(p.ivlen, ivbits / 8)) {
200
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
201
0
        return 0;
202
0
    }
203
2.08k
    return 1;
204
2.08k
}
205
206
#define cipher_generic_get_ctx_params_st    ossl_cipher_get_ctx_param_list_st
207
208
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
209
#ifndef cipher_generic_get_ctx_params_list
210
static const OSSL_PARAM cipher_generic_get_ctx_params_list[] = {
211
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL),
212
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL),
213
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_PADDING, NULL),
214
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_NUM, NULL),
215
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_IV, NULL, 0),
216
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_UPDATED_IV, NULL, 0),
217
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_TLS_MAC, NULL, 0),
218
    OSSL_PARAM_END
219
};
220
#endif
221
222
#ifndef cipher_generic_get_ctx_params_st
223
struct cipher_generic_get_ctx_params_st {
224
    OSSL_PARAM *iv;
225
    OSSL_PARAM *ivlen;
226
    OSSL_PARAM *keylen;
227
    OSSL_PARAM *num;
228
    OSSL_PARAM *pad;
229
    OSSL_PARAM *tlsmac;
230
    OSSL_PARAM *updiv;
231
};
232
#endif
233
234
#ifndef cipher_generic_get_ctx_params_decoder
235
static int cipher_generic_get_ctx_params_decoder
236
    (const OSSL_PARAM *p, struct cipher_generic_get_ctx_params_st *r)
237
128
{
238
128
    const char *s;
239
240
128
    memset(r, 0, sizeof(*r));
241
128
    if (p != NULL)
242
256
        for (; (s = p->key) != NULL; p++)
243
128
            switch(s[0]) {
244
0
            default:
245
0
                break;
246
32
            case 'i':
247
32
                switch(s[1]) {
248
0
                default:
249
0
                    break;
250
32
                case 'v':
251
32
                    switch(s[2]) {
252
0
                    default:
253
0
                        break;
254
32
                    case 'l':
255
32
                        if (ossl_likely(strcmp("en", s + 3) == 0)) {
256
32
                            if (ossl_likely(r->ivlen == NULL))
257
32
                                r->ivlen = (OSSL_PARAM *)p;
258
32
                        }
259
32
                        break;
260
0
                    case '\0':
261
0
                        if (ossl_likely(r->iv == NULL))
262
0
                            r->iv = (OSSL_PARAM *)p;
263
32
                    }
264
32
                }
265
32
                break;
266
96
            case 'k':
267
96
                if (ossl_likely(strcmp("eylen", s + 1) == 0)) {
268
96
                    if (ossl_likely(r->keylen == NULL))
269
96
                        r->keylen = (OSSL_PARAM *)p;
270
96
                }
271
96
                break;
272
0
            case 'n':
273
0
                if (ossl_likely(strcmp("um", s + 1) == 0)) {
274
0
                    if (ossl_likely(r->num == NULL))
275
0
                        r->num = (OSSL_PARAM *)p;
276
0
                }
277
0
                break;
278
0
            case 'p':
279
0
                if (ossl_likely(strcmp("adding", s + 1) == 0)) {
280
0
                    if (ossl_likely(r->pad == NULL))
281
0
                        r->pad = (OSSL_PARAM *)p;
282
0
                }
283
0
                break;
284
0
            case 't':
285
0
                if (ossl_likely(strcmp("ls-mac", s + 1) == 0)) {
286
0
                    if (ossl_likely(r->tlsmac == NULL))
287
0
                        r->tlsmac = (OSSL_PARAM *)p;
288
0
                }
289
0
                break;
290
0
            case 'u':
291
0
                if (ossl_likely(strcmp("pdated-iv", s + 1) == 0)) {
292
0
                    if (ossl_likely(r->updiv == NULL))
293
0
                        r->updiv = (OSSL_PARAM *)p;
294
0
                }
295
128
            }
296
128
    return 1;
297
128
}
298
#endif
299
/* End of machine generated */
300
301
const OSSL_PARAM *ossl_cipher_generic_gettable_ctx_params
302
        (ossl_unused void *cctx, ossl_unused void *provctx)
303
1.32k
{
304
1.32k
    return cipher_generic_get_ctx_params_list;
305
1.32k
}
306
307
#define cipher_generic_set_ctx_params_st    ossl_cipher_set_ctx_param_list_st
308
309
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
310
#ifndef cipher_generic_set_ctx_params_list
311
static const OSSL_PARAM cipher_generic_set_ctx_params_list[] = {
312
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_PADDING, NULL),
313
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_NUM, NULL),
314
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_USE_BITS, NULL),
315
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_TLS_VERSION, NULL),
316
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_TLS_MAC_SIZE, NULL),
317
    OSSL_PARAM_END
318
};
319
#endif
320
321
#ifndef cipher_generic_set_ctx_params_st
322
struct cipher_generic_set_ctx_params_st {
323
    OSSL_PARAM *bits;
324
    OSSL_PARAM *num;
325
    OSSL_PARAM *pad;
326
    OSSL_PARAM *tlsmacsize;
327
    OSSL_PARAM *tlsvers;
328
};
329
#endif
330
331
#ifndef cipher_generic_set_ctx_params_decoder
332
static int cipher_generic_set_ctx_params_decoder
333
    (const OSSL_PARAM *p, struct cipher_generic_set_ctx_params_st *r)
334
0
{
335
0
    const char *s;
336
337
0
    memset(r, 0, sizeof(*r));
338
0
    if (p != NULL)
339
0
        for (; (s = p->key) != NULL; p++)
340
0
            switch(s[0]) {
341
0
            default:
342
0
                break;
343
0
            case 'n':
344
0
                if (ossl_likely(strcmp("um", s + 1) == 0)) {
345
0
                    if (ossl_likely(r->num == NULL))
346
0
                        r->num = (OSSL_PARAM *)p;
347
0
                }
348
0
                break;
349
0
            case 'p':
350
0
                if (ossl_likely(strcmp("adding", s + 1) == 0)) {
351
0
                    if (ossl_likely(r->pad == NULL))
352
0
                        r->pad = (OSSL_PARAM *)p;
353
0
                }
354
0
                break;
355
0
            case 't':
356
0
                switch(s[1]) {
357
0
                default:
358
0
                    break;
359
0
                case 'l':
360
0
                    switch(s[2]) {
361
0
                    default:
362
0
                        break;
363
0
                    case 's':
364
0
                        switch(s[3]) {
365
0
                        default:
366
0
                            break;
367
0
                        case '-':
368
0
                            switch(s[4]) {
369
0
                            default:
370
0
                                break;
371
0
                            case 'm':
372
0
                                if (ossl_likely(strcmp("ac-size", s + 5) == 0)) {
373
0
                                    if (ossl_likely(r->tlsmacsize == NULL))
374
0
                                        r->tlsmacsize = (OSSL_PARAM *)p;
375
0
                                }
376
0
                                break;
377
0
                            case 'v':
378
0
                                if (ossl_likely(strcmp("ersion", s + 5) == 0)) {
379
0
                                    if (ossl_likely(r->tlsvers == NULL))
380
0
                                        r->tlsvers = (OSSL_PARAM *)p;
381
0
                                }
382
0
                            }
383
0
                        }
384
0
                    }
385
0
                }
386
0
                break;
387
0
            case 'u':
388
0
                if (ossl_likely(strcmp("se-bits", s + 1) == 0)) {
389
0
                    if (ossl_likely(r->bits == NULL))
390
0
                        r->bits = (OSSL_PARAM *)p;
391
0
                }
392
0
            }
393
0
    return 1;
394
0
}
395
#endif
396
/* End of machine generated */
397
398
const OSSL_PARAM *ossl_cipher_generic_settable_ctx_params
399
        (ossl_unused void *cctx, ossl_unused void *provctx)
400
0
{
401
0
    return cipher_generic_set_ctx_params_list;
402
0
}
403
404
/*
405
 * Variable key length cipher functions for OSSL_PARAM settables
406
 */
407
#define cipher_var_keylen_set_ctx_params_st ossl_cipher_set_ctx_param_list_st
408
409
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
410
#ifndef cipher_var_keylen_set_ctx_params_list
411
static const OSSL_PARAM cipher_var_keylen_set_ctx_params_list[] = {
412
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_PADDING, NULL),
413
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_NUM, NULL),
414
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_USE_BITS, NULL),
415
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_TLS_VERSION, NULL),
416
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_TLS_MAC_SIZE, NULL),
417
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL),
418
    OSSL_PARAM_END
419
};
420
#endif
421
422
#ifndef cipher_var_keylen_set_ctx_params_st
423
struct cipher_var_keylen_set_ctx_params_st {
424
    OSSL_PARAM *bits;
425
    OSSL_PARAM *keylen;
426
    OSSL_PARAM *num;
427
    OSSL_PARAM *pad;
428
    OSSL_PARAM *tlsmacsize;
429
    OSSL_PARAM *tlsvers;
430
};
431
#endif
432
433
#ifndef cipher_var_keylen_set_ctx_params_decoder
434
static int cipher_var_keylen_set_ctx_params_decoder
435
    (const OSSL_PARAM *p, struct cipher_var_keylen_set_ctx_params_st *r)
436
0
{
437
0
    const char *s;
438
439
0
    memset(r, 0, sizeof(*r));
440
0
    if (p != NULL)
441
0
        for (; (s = p->key) != NULL; p++)
442
0
            switch(s[0]) {
443
0
            default:
444
0
                break;
445
0
            case 'k':
446
0
                if (ossl_likely(strcmp("eylen", s + 1) == 0)) {
447
0
                    if (ossl_likely(r->keylen == NULL))
448
0
                        r->keylen = (OSSL_PARAM *)p;
449
0
                }
450
0
                break;
451
0
            case 'n':
452
0
                if (ossl_likely(strcmp("um", s + 1) == 0)) {
453
0
                    if (ossl_likely(r->num == NULL))
454
0
                        r->num = (OSSL_PARAM *)p;
455
0
                }
456
0
                break;
457
0
            case 'p':
458
0
                if (ossl_likely(strcmp("adding", s + 1) == 0)) {
459
0
                    if (ossl_likely(r->pad == NULL))
460
0
                        r->pad = (OSSL_PARAM *)p;
461
0
                }
462
0
                break;
463
0
            case 't':
464
0
                switch(s[1]) {
465
0
                default:
466
0
                    break;
467
0
                case 'l':
468
0
                    switch(s[2]) {
469
0
                    default:
470
0
                        break;
471
0
                    case 's':
472
0
                        switch(s[3]) {
473
0
                        default:
474
0
                            break;
475
0
                        case '-':
476
0
                            switch(s[4]) {
477
0
                            default:
478
0
                                break;
479
0
                            case 'm':
480
0
                                if (ossl_likely(strcmp("ac-size", s + 5) == 0)) {
481
0
                                    if (ossl_likely(r->tlsmacsize == NULL))
482
0
                                        r->tlsmacsize = (OSSL_PARAM *)p;
483
0
                                }
484
0
                                break;
485
0
                            case 'v':
486
0
                                if (ossl_likely(strcmp("ersion", s + 5) == 0)) {
487
0
                                    if (ossl_likely(r->tlsvers == NULL))
488
0
                                        r->tlsvers = (OSSL_PARAM *)p;
489
0
                                }
490
0
                            }
491
0
                        }
492
0
                    }
493
0
                }
494
0
                break;
495
0
            case 'u':
496
0
                if (ossl_likely(strcmp("se-bits", s + 1) == 0)) {
497
0
                    if (ossl_likely(r->bits == NULL))
498
0
                        r->bits = (OSSL_PARAM *)p;
499
0
                }
500
0
            }
501
0
    return 1;
502
0
}
503
#endif
504
/* End of machine generated */
505
506
const OSSL_PARAM *ossl_cipher_var_keylen_settable_ctx_params
507
        (ossl_unused void *cctx, ossl_unused void *provctx)
508
0
{
509
0
    return cipher_var_keylen_set_ctx_params_list;
510
0
}
511
512
int ossl_cipher_var_keylen_set_ctx_params(void *vctx, const OSSL_PARAM params[])
513
0
{
514
0
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
515
0
    struct ossl_cipher_set_ctx_param_list_st p;
516
517
0
    if (ctx == NULL
518
0
            || !cipher_var_keylen_set_ctx_params_decoder(params, &p)
519
0
            || !ossl_cipher_common_set_ctx_params(ctx, &p))
520
0
        return 0;
521
522
0
    if (p.keylen != NULL) {
523
0
        size_t keylen;
524
525
0
        if (!OSSL_PARAM_get_size_t(p.keylen, &keylen)) {
526
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
527
0
            return 0;
528
0
        }
529
0
        if (ctx->keylen != keylen) {
530
0
            ctx->keylen = keylen;
531
0
            ctx->key_set = 0;
532
0
        }
533
0
    }
534
0
    return 1;
535
0
}
536
537
void ossl_cipher_generic_reset_ctx(PROV_CIPHER_CTX *ctx)
538
96
{
539
96
    if (ctx != NULL && ctx->alloced) {
540
0
        OPENSSL_free(ctx->tlsmac);
541
0
        ctx->alloced = 0;
542
0
        ctx->tlsmac = NULL;
543
0
    }
544
96
}
545
546
static int cipher_generic_init_internal(PROV_CIPHER_CTX *ctx,
547
                                        const unsigned char *key, size_t keylen,
548
                                        const unsigned char *iv, size_t ivlen,
549
                                        const OSSL_PARAM params[], int enc)
550
656
{
551
656
    ctx->num = 0;
552
656
    ctx->bufsz = 0;
553
656
    ctx->updated = 0;
554
656
    ctx->enc = enc ? 1 : 0;
555
556
656
    if (!ossl_prov_is_running())
557
0
        return 0;
558
559
656
    if (iv != NULL && ctx->mode != EVP_CIPH_ECB_MODE) {
560
64
        if (!ossl_cipher_generic_initiv(ctx, iv, ivlen))
561
0
            return 0;
562
64
    }
563
656
    if (iv == NULL && ctx->iv_set
564
656
        && (ctx->mode == EVP_CIPH_CBC_MODE
565
80
            || ctx->mode == EVP_CIPH_CFB_MODE
566
80
            || ctx->mode == EVP_CIPH_OFB_MODE))
567
        /* reset IV for these modes to keep compatibility with 1.1.1 */
568
0
        memcpy(ctx->iv, ctx->oiv, ctx->ivlen);
569
570
656
    if (key != NULL) {
571
528
        if (ctx->variable_keylength == 0) {
572
528
            if (keylen != ctx->keylen) {
573
0
                ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH);
574
0
                return 0;
575
0
            }
576
528
        } else {
577
0
            ctx->keylen = keylen;
578
0
        }
579
528
        if (!ctx->hw->init(ctx, key, ctx->keylen))
580
0
            return 0;
581
528
        ctx->key_set = 1;
582
528
    }
583
656
    return ossl_cipher_generic_set_ctx_params(ctx, params);
584
656
}
585
586
int ossl_cipher_generic_einit(void *vctx, const unsigned char *key,
587
                              size_t keylen, const unsigned char *iv,
588
                              size_t ivlen, const OSSL_PARAM params[])
589
656
{
590
656
    return cipher_generic_init_internal((PROV_CIPHER_CTX *)vctx, key, keylen,
591
656
                                        iv, ivlen, params, 1);
592
656
}
593
594
int ossl_cipher_generic_dinit(void *vctx, const unsigned char *key,
595
                              size_t keylen, const unsigned char *iv,
596
                              size_t ivlen, const OSSL_PARAM params[])
597
0
{
598
0
    return cipher_generic_init_internal((PROV_CIPHER_CTX *)vctx, key, keylen,
599
0
                                        iv, ivlen, params, 0);
600
0
}
601
602
int ossl_cipher_generic_skey_einit(void *vctx, void *skeydata,
603
                                   const unsigned char *iv, size_t ivlen,
604
                                   const OSSL_PARAM params[])
605
0
{
606
0
    PROV_SKEY *key = skeydata;
607
608
0
    return cipher_generic_init_internal((PROV_CIPHER_CTX *)vctx,
609
0
                                        key->data, key->length,
610
0
                                        iv, ivlen, params, 1);
611
0
}
612
613
int ossl_cipher_generic_skey_dinit(void *vctx, void *skeydata,
614
                                   const unsigned char *iv, size_t ivlen,
615
                                   const OSSL_PARAM params[])
616
0
{
617
0
    PROV_SKEY *key = skeydata;
618
619
0
    return cipher_generic_init_internal((PROV_CIPHER_CTX *)vctx,
620
0
                                        key->data, key->length,
621
0
                                        iv, ivlen, params, 0);
622
0
}
623
624
/* Max padding including padding length byte */
625
0
#define MAX_PADDING 256
626
627
int ossl_cipher_generic_block_update(void *vctx, unsigned char *out,
628
                                     size_t *outl, size_t outsize,
629
                                     const unsigned char *in, size_t inl)
630
1.07k
{
631
1.07k
    size_t outlint = 0;
632
1.07k
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
633
1.07k
    size_t blksz = ctx->blocksize;
634
1.07k
    size_t nextblocks;
635
636
1.07k
    if (!ctx->key_set) {
637
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
638
0
        return 0;
639
0
    }
640
641
1.07k
    if (ctx->tlsversion > 0) {
642
        /*
643
         * Each update call corresponds to a TLS record and is individually
644
         * padded
645
         */
646
647
        /* Sanity check inputs */
648
0
        if (in == NULL
649
0
                || in != out
650
0
                || outsize < inl
651
0
                || !ctx->pad) {
652
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
653
0
            return 0;
654
0
        }
655
656
0
        if (ctx->enc) {
657
0
            unsigned char padval;
658
0
            size_t padnum, loop;
659
660
            /* Add padding */
661
662
0
            padnum = blksz - (inl % blksz);
663
664
0
            if (outsize < inl + padnum) {
665
0
                ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
666
0
                return 0;
667
0
            }
668
669
0
            if (padnum > MAX_PADDING) {
670
0
                ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
671
0
                return 0;
672
0
            }
673
0
            padval = (unsigned char)(padnum - 1);
674
0
            if (ctx->tlsversion == SSL3_VERSION) {
675
0
                if (padnum > 1)
676
0
                    memset(out + inl, 0, padnum - 1);
677
0
                *(out + inl + padnum - 1) = padval;
678
0
            } else {
679
                /* we need to add 'padnum' padding bytes of value padval */
680
0
                for (loop = inl; loop < inl + padnum; loop++)
681
0
                    out[loop] = padval;
682
0
            }
683
0
            inl += padnum;
684
0
        }
685
686
0
        if ((inl % blksz) != 0) {
687
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
688
0
            return 0;
689
0
        }
690
691
692
        /* Shouldn't normally fail */
693
0
        if (!ctx->hw->cipher(ctx, out, in, inl)) {
694
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
695
0
            return 0;
696
0
        }
697
698
0
        if (ctx->alloced) {
699
0
            OPENSSL_free(ctx->tlsmac);
700
0
            ctx->alloced = 0;
701
0
            ctx->tlsmac = NULL;
702
0
        }
703
704
        /* This only fails if padding is publicly invalid */
705
0
        *outl = inl;
706
0
        if (!ctx->enc
707
0
            && !ossl_cipher_tlsunpadblock(ctx->libctx, ctx->tlsversion,
708
0
                                          out, outl,
709
0
                                          blksz, &ctx->tlsmac, &ctx->alloced,
710
0
                                          ctx->tlsmacsize, 0)) {
711
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
712
0
            return 0;
713
0
        }
714
0
        return 1;
715
0
    }
716
717
1.07k
    if (ctx->bufsz != 0)
718
0
        nextblocks = ossl_cipher_fillblock(ctx->buf, &ctx->bufsz, blksz,
719
0
                                           &in, &inl);
720
1.07k
    else
721
1.07k
        nextblocks = inl & ~(blksz-1);
722
723
    /*
724
     * If we're decrypting and we end an update on a block boundary we hold
725
     * the last block back in case this is the last update call and the last
726
     * block is padded.
727
     */
728
1.07k
    if (ctx->bufsz == blksz && (ctx->enc || inl > 0 || !ctx->pad)) {
729
0
        if (outsize < blksz) {
730
0
            ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
731
0
            return 0;
732
0
        }
733
0
        if (!ctx->hw->cipher(ctx, out, ctx->buf, blksz)) {
734
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
735
0
            return 0;
736
0
        }
737
0
        ctx->bufsz = 0;
738
0
        outlint = blksz;
739
0
        out += blksz;
740
0
    }
741
1.07k
    if (nextblocks > 0) {
742
1.07k
        if (!ctx->enc && ctx->pad && nextblocks == inl) {
743
0
            if (!ossl_assert(inl >= blksz)) {
744
0
                ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
745
0
                return 0;
746
0
            }
747
0
            nextblocks -= blksz;
748
0
        }
749
1.07k
        outlint += nextblocks;
750
1.07k
        if (outsize < outlint) {
751
0
            ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
752
0
            return 0;
753
0
        }
754
1.07k
    }
755
1.07k
    if (nextblocks > 0) {
756
1.07k
        if (!ctx->hw->cipher(ctx, out, in, nextblocks)) {
757
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
758
0
            return 0;
759
0
        }
760
1.07k
        in += nextblocks;
761
1.07k
        inl -= nextblocks;
762
1.07k
    }
763
1.07k
    if (inl != 0
764
1.07k
        && !ossl_cipher_trailingdata(ctx->buf, &ctx->bufsz, blksz, &in, &inl)) {
765
        /* ERR_raise already called */
766
0
        return 0;
767
0
    }
768
769
1.07k
    *outl = outlint;
770
1.07k
    return inl == 0;
771
1.07k
}
772
773
int ossl_cipher_generic_block_final(void *vctx, unsigned char *out,
774
                                    size_t *outl, size_t outsize)
775
0
{
776
0
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
777
0
    size_t blksz = ctx->blocksize;
778
779
0
    if (!ossl_prov_is_running())
780
0
        return 0;
781
782
0
    if (!ctx->key_set) {
783
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
784
0
        return 0;
785
0
    }
786
787
0
    if (ctx->tlsversion > 0) {
788
        /* We never finalize TLS, so this is an error */
789
0
        ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
790
0
        return 0;
791
0
    }
792
793
0
    if (ctx->enc) {
794
0
        if (ctx->pad) {
795
0
            ossl_cipher_padblock(ctx->buf, &ctx->bufsz, blksz);
796
0
        } else if (ctx->bufsz == 0) {
797
0
            *outl = 0;
798
0
            return 1;
799
0
        } else if (ctx->bufsz != blksz) {
800
0
            ERR_raise(ERR_LIB_PROV, PROV_R_WRONG_FINAL_BLOCK_LENGTH);
801
0
            return 0;
802
0
        }
803
804
0
        if (outsize < blksz) {
805
0
            ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
806
0
            return 0;
807
0
        }
808
0
        if (!ctx->hw->cipher(ctx, out, ctx->buf, blksz)) {
809
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
810
0
            return 0;
811
0
        }
812
0
        ctx->bufsz = 0;
813
0
        *outl = blksz;
814
0
        return 1;
815
0
    }
816
817
    /* Decrypting */
818
0
    if (ctx->bufsz != blksz) {
819
0
        if (ctx->bufsz == 0 && !ctx->pad) {
820
0
            *outl = 0;
821
0
            return 1;
822
0
        }
823
0
        ERR_raise(ERR_LIB_PROV, PROV_R_WRONG_FINAL_BLOCK_LENGTH);
824
0
        return 0;
825
0
    }
826
827
0
    if (!ctx->hw->cipher(ctx, ctx->buf, ctx->buf, blksz)) {
828
0
        ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
829
0
        return 0;
830
0
    }
831
832
0
    if (ctx->pad && !ossl_cipher_unpadblock(ctx->buf, &ctx->bufsz, blksz)) {
833
        /* ERR_raise already called */
834
0
        return 0;
835
0
    }
836
837
0
    if (outsize < ctx->bufsz) {
838
0
        ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
839
0
        return 0;
840
0
    }
841
0
    memcpy(out, ctx->buf, ctx->bufsz);
842
0
    *outl = ctx->bufsz;
843
0
    ctx->bufsz = 0;
844
0
    return 1;
845
0
}
846
847
int ossl_cipher_generic_stream_update(void *vctx, unsigned char *out,
848
                                      size_t *outl, size_t outsize,
849
                                      const unsigned char *in, size_t inl)
850
64
{
851
64
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
852
853
64
    if (!ctx->key_set) {
854
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
855
0
        return 0;
856
0
    }
857
858
64
    if (inl == 0) {
859
0
        *outl = 0;
860
0
        return 1;
861
0
    }
862
863
64
    if (outsize < inl) {
864
0
        ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
865
0
        return 0;
866
0
    }
867
868
64
    if (!ctx->hw->cipher(ctx, out, in, inl)) {
869
0
        ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
870
0
        return 0;
871
0
    }
872
873
64
    *outl = inl;
874
64
    if (!ctx->enc && ctx->tlsversion > 0) {
875
        /*
876
        * Remove any TLS padding. Only used by cipher_aes_cbc_hmac_sha1_hw.c and
877
        * cipher_aes_cbc_hmac_sha256_hw.c
878
        */
879
0
        if (ctx->removetlspad) {
880
            /*
881
             * We should have already failed in the cipher() call above if this
882
             * isn't true.
883
             */
884
0
            if (!ossl_assert(*outl >= (size_t)(out[inl - 1] + 1)))
885
0
                return 0;
886
            /* The actual padding length */
887
0
            *outl -= out[inl - 1] + 1;
888
0
        }
889
890
        /* TLS MAC and explicit IV if relevant. We should have already failed
891
         * in the cipher() call above if *outl is too short.
892
         */
893
0
        if (!ossl_assert(*outl >= ctx->removetlsfixed))
894
0
            return 0;
895
0
        *outl -= ctx->removetlsfixed;
896
897
        /* Extract the MAC if there is one */
898
0
        if (ctx->tlsmacsize > 0) {
899
0
            if (*outl < ctx->tlsmacsize)
900
0
                return 0;
901
902
0
            ctx->tlsmac = out + *outl - ctx->tlsmacsize;
903
0
            *outl -= ctx->tlsmacsize;
904
0
        }
905
0
    }
906
907
64
    return 1;
908
64
}
909
int ossl_cipher_generic_stream_final(void *vctx, unsigned char *out,
910
                                     size_t *outl, size_t outsize)
911
0
{
912
0
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
913
914
0
    if (!ossl_prov_is_running())
915
0
        return 0;
916
917
0
    if (!ctx->key_set) {
918
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
919
0
        return 0;
920
0
    }
921
922
0
    *outl = 0;
923
0
    return 1;
924
0
}
925
926
int ossl_cipher_generic_cipher(void *vctx, unsigned char *out, size_t *outl,
927
                               size_t outsize, const unsigned char *in,
928
                               size_t inl)
929
0
{
930
0
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
931
932
0
    if (!ossl_prov_is_running())
933
0
        return 0;
934
935
0
    if (!ctx->key_set) {
936
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
937
0
        return 0;
938
0
    }
939
940
0
    if (outsize < inl) {
941
0
        ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
942
0
        return 0;
943
0
    }
944
945
0
    if (!ctx->hw->cipher(ctx, out, in, inl)) {
946
0
        ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
947
0
        return 0;
948
0
    }
949
950
0
    *outl = inl;
951
0
    return 1;
952
0
}
953
954
int ossl_cipher_common_get_ctx_params
955
    (PROV_CIPHER_CTX *ctx, const struct ossl_cipher_get_ctx_param_list_st *p)
956
128
{
957
128
    if (p->ivlen != NULL && !OSSL_PARAM_set_size_t(p->ivlen, ctx->ivlen)) {
958
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
959
0
        return 0;
960
0
    }
961
962
128
    if (p->pad != NULL && !OSSL_PARAM_set_uint(p->pad, ctx->pad)) {
963
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
964
0
        return 0;
965
0
    }
966
967
128
    if (p->iv != NULL
968
128
        && !OSSL_PARAM_set_octet_string_or_ptr(p->iv, ctx->oiv, ctx->ivlen)) {
969
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
970
0
        return 0;
971
0
    }
972
973
128
    if (p->updiv != NULL
974
128
        && !OSSL_PARAM_set_octet_string_or_ptr(p->updiv, ctx->iv, ctx->ivlen)) {
975
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
976
0
        return 0;
977
0
    }
978
979
128
    if (p->num != NULL && !OSSL_PARAM_set_uint(p->num, ctx->num)) {
980
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
981
0
        return 0;
982
0
    }
983
984
128
    if (p->keylen != NULL && !OSSL_PARAM_set_size_t(p->keylen, ctx->keylen)) {
985
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
986
0
        return 0;
987
0
    }
988
989
128
    if (p->tlsmac != NULL
990
128
        && !OSSL_PARAM_set_octet_ptr(p->tlsmac, ctx->tlsmac, ctx->tlsmacsize)) {
991
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
992
0
        return 0;
993
0
    }
994
128
    return 1;
995
128
}
996
997
int ossl_cipher_generic_get_ctx_params(void *vctx, OSSL_PARAM params[])
998
128
{
999
128
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
1000
128
    struct ossl_cipher_get_ctx_param_list_st p;
1001
1002
128
    if (ctx == NULL || !cipher_generic_get_ctx_params_decoder(params, &p))
1003
0
        return 0;
1004
128
    return ossl_cipher_common_get_ctx_params(ctx, &p);
1005
128
}
1006
1007
int ossl_cipher_common_set_ctx_params
1008
    (PROV_CIPHER_CTX *ctx, const struct ossl_cipher_set_ctx_param_list_st *p)
1009
0
{
1010
0
    if (p->pad != NULL) {
1011
0
        unsigned int pad;
1012
1013
0
        if (!OSSL_PARAM_get_uint(p->pad, &pad)) {
1014
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
1015
0
            return 0;
1016
0
        }
1017
0
        ctx->pad = pad ? 1 : 0;
1018
0
    }
1019
1020
0
    if (p->bits != NULL) {
1021
0
        unsigned int bits;
1022
1023
0
        if (!OSSL_PARAM_get_uint(p->bits, &bits)) {
1024
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
1025
0
            return 0;
1026
0
        }
1027
0
        ctx->use_bits = bits ? 1 : 0;
1028
0
    }
1029
1030
0
    if (p->tlsvers != NULL) {
1031
0
        if (!OSSL_PARAM_get_uint(p->tlsvers, &ctx->tlsversion)) {
1032
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
1033
0
            return 0;
1034
0
        }
1035
0
    }
1036
1037
0
    if (p->tlsmacsize != NULL) {
1038
0
        if (!OSSL_PARAM_get_size_t(p->tlsmacsize, &ctx->tlsmacsize)) {
1039
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
1040
0
            return 0;
1041
0
        }
1042
0
    }
1043
1044
0
    if (p->num != NULL) {
1045
0
        unsigned int num;
1046
1047
0
        if (!OSSL_PARAM_get_uint(p->num, &num)) {
1048
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
1049
0
            return 0;
1050
0
        }
1051
0
        ctx->num = num;
1052
0
    }
1053
0
    return 1;
1054
0
}
1055
1056
int ossl_cipher_generic_set_ctx_params(void *vctx, const OSSL_PARAM params[])
1057
656
{
1058
656
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
1059
656
    struct ossl_cipher_set_ctx_param_list_st p;
1060
1061
656
    if (ossl_param_is_empty(params))
1062
656
        return 1;
1063
1064
0
    if (ctx == NULL || !cipher_generic_set_ctx_params_decoder(params, &p))
1065
0
        return 0;
1066
0
    return ossl_cipher_common_set_ctx_params(ctx, &p);
1067
0
}
1068
1069
int ossl_cipher_generic_initiv(PROV_CIPHER_CTX *ctx, const unsigned char *iv,
1070
                               size_t ivlen)
1071
64
{
1072
64
    if (ivlen != ctx->ivlen
1073
64
        || ivlen > sizeof(ctx->iv)) {
1074
0
        ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH);
1075
0
        return 0;
1076
0
    }
1077
64
    ctx->iv_set = 1;
1078
64
    memcpy(ctx->iv, iv, ivlen);
1079
64
    memcpy(ctx->oiv, iv, ivlen);
1080
64
    return 1;
1081
64
}
1082
1083
void ossl_cipher_generic_initkey(void *vctx, size_t kbits, size_t blkbits,
1084
                                 size_t ivbits, unsigned int mode,
1085
                                 uint64_t flags, const PROV_CIPHER_HW *hw,
1086
                                 void *provctx)
1087
96
{
1088
96
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
1089
1090
96
    if ((flags & PROV_CIPHER_FLAG_INVERSE_CIPHER) != 0)
1091
0
        ctx->inverse_cipher = 1;
1092
96
    if ((flags & PROV_CIPHER_FLAG_VARIABLE_LENGTH) != 0)
1093
0
        ctx->variable_keylength = 1;
1094
1095
96
    ctx->pad = 1;
1096
96
    ctx->keylen = ((kbits) / 8);
1097
96
    ctx->ivlen = ((ivbits) / 8);
1098
96
    ctx->hw = hw;
1099
96
    ctx->mode = mode;
1100
96
    ctx->blocksize = blkbits / 8;
1101
96
    if (provctx != NULL)
1102
96
        ctx->libctx = PROV_LIBCTX_OF(provctx); /* used for rand */
1103
96
}