Coverage Report

Created: 2025-08-25 06:30

/src/openssl/providers/implementations/ciphers/ciphercommon.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright 2019-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
/*
12
 * Generic dispatch table functions for ciphers.
13
 */
14
15
/* For SSL3_VERSION */
16
#include <string.h>
17
#include <openssl/prov_ssl.h>
18
#include <openssl/proverr.h>
19
#include "ciphercommon_local.h"
20
#include "prov/provider_ctx.h"
21
#include "prov/providercommon.h"
22
#include "internal/skey.h"
23
#include "internal/e_os.h"
24
#include "crypto/types.h"
25
26
/*-
27
 * Generic cipher functions for OSSL_PARAM gettables and settables
28
 */
29
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
30
#ifndef ossl_cipher_generic_get_params_list
31
static const OSSL_PARAM ossl_cipher_generic_get_params_list[] = {
32
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_MODE, NULL),
33
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL),
34
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL),
35
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_BLOCK_SIZE, NULL),
36
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_AEAD, NULL),
37
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_CUSTOM_IV, NULL),
38
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_CTS, NULL),
39
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK, NULL),
40
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_HAS_RAND_KEY, NULL),
41
    OSSL_PARAM_int(OSSL_CIPHER_PARAM_ENCRYPT_THEN_MAC, NULL),
42
    OSSL_PARAM_END
43
};
44
#endif
45
46
#ifndef ossl_cipher_generic_get_params_st
47
struct ossl_cipher_generic_get_params_st {
48
    OSSL_PARAM *aead;
49
    OSSL_PARAM *bsize;
50
    OSSL_PARAM *cts;
51
    OSSL_PARAM *custiv;
52
    OSSL_PARAM *etm;
53
    OSSL_PARAM *ivlen;
54
    OSSL_PARAM *keylen;
55
    OSSL_PARAM *mb;
56
    OSSL_PARAM *mode;
57
    OSSL_PARAM *rand;
58
};
59
#endif
60
61
#ifndef ossl_cipher_generic_get_params_decoder
62
static int ossl_cipher_generic_get_params_decoder
63
    (const OSSL_PARAM *p, struct ossl_cipher_generic_get_params_st *r)
64
2.08k
{
65
2.08k
    const char *s;
66
67
2.08k
    memset(r, 0, sizeof(*r));
68
2.08k
    if (p != NULL)
69
22.8k
        for (; (s = p->key) != NULL; p++)
70
20.8k
            switch(s[0]) {
71
0
            default:
72
0
                break;
73
2.08k
            case 'a':
74
2.08k
                if (ossl_likely(strcmp("ead", s + 1) == 0)) {
75
                    /* CIPHER_PARAM_AEAD */
76
2.08k
                    if (ossl_unlikely(r->aead != NULL)) {
77
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
78
0
                                       "param %s is repeated", s);
79
0
                        return 0;
80
0
                    }
81
2.08k
                    r->aead = (OSSL_PARAM *)p;
82
2.08k
                }
83
2.08k
                break;
84
2.08k
            case 'b':
85
2.08k
                if (ossl_likely(strcmp("locksize", s + 1) == 0)) {
86
                    /* CIPHER_PARAM_BLOCK_SIZE */
87
2.08k
                    if (ossl_unlikely(r->bsize != NULL)) {
88
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
89
0
                                       "param %s is repeated", s);
90
0
                        return 0;
91
0
                    }
92
2.08k
                    r->bsize = (OSSL_PARAM *)p;
93
2.08k
                }
94
2.08k
                break;
95
4.16k
            case 'c':
96
4.16k
                switch(s[1]) {
97
0
                default:
98
0
                    break;
99
2.08k
                case 't':
100
2.08k
                    if (ossl_likely(strcmp("s", s + 2) == 0)) {
101
                        /* CIPHER_PARAM_CTS */
102
2.08k
                        if (ossl_unlikely(r->cts != NULL)) {
103
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
104
0
                                           "param %s is repeated", s);
105
0
                            return 0;
106
0
                        }
107
2.08k
                        r->cts = (OSSL_PARAM *)p;
108
2.08k
                    }
109
2.08k
                    break;
110
2.08k
                case 'u':
111
2.08k
                    if (ossl_likely(strcmp("stom-iv", s + 2) == 0)) {
112
                        /* CIPHER_PARAM_CUSTOM_IV */
113
2.08k
                        if (ossl_unlikely(r->custiv != NULL)) {
114
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
115
0
                                           "param %s is repeated", s);
116
0
                            return 0;
117
0
                        }
118
2.08k
                        r->custiv = (OSSL_PARAM *)p;
119
2.08k
                    }
120
4.16k
                }
121
4.16k
                break;
122
4.16k
            case 'e':
123
2.08k
                if (ossl_likely(strcmp("ncrypt-then-mac", s + 1) == 0)) {
124
                    /* CIPHER_PARAM_ENCRYPT_THEN_MAC */
125
2.08k
                    if (ossl_unlikely(r->etm != NULL)) {
126
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
127
0
                                       "param %s is repeated", s);
128
0
                        return 0;
129
0
                    }
130
2.08k
                    r->etm = (OSSL_PARAM *)p;
131
2.08k
                }
132
2.08k
                break;
133
2.08k
            case 'h':
134
2.08k
                if (ossl_likely(strcmp("as-randkey", s + 1) == 0)) {
135
                    /* CIPHER_PARAM_HAS_RAND_KEY */
136
2.08k
                    if (ossl_unlikely(r->rand != NULL)) {
137
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
138
0
                                       "param %s is repeated", s);
139
0
                        return 0;
140
0
                    }
141
2.08k
                    r->rand = (OSSL_PARAM *)p;
142
2.08k
                }
143
2.08k
                break;
144
2.08k
            case 'i':
145
2.08k
                if (ossl_likely(strcmp("vlen", s + 1) == 0)) {
146
                    /* CIPHER_PARAM_IVLEN */
147
2.08k
                    if (ossl_unlikely(r->ivlen != NULL)) {
148
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
149
0
                                       "param %s is repeated", s);
150
0
                        return 0;
151
0
                    }
152
2.08k
                    r->ivlen = (OSSL_PARAM *)p;
153
2.08k
                }
154
2.08k
                break;
155
2.08k
            case 'k':
156
2.08k
                if (ossl_likely(strcmp("eylen", s + 1) == 0)) {
157
                    /* CIPHER_PARAM_KEYLEN */
158
2.08k
                    if (ossl_unlikely(r->keylen != NULL)) {
159
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
160
0
                                       "param %s is repeated", s);
161
0
                        return 0;
162
0
                    }
163
2.08k
                    r->keylen = (OSSL_PARAM *)p;
164
2.08k
                }
165
2.08k
                break;
166
2.08k
            case 'm':
167
2.08k
                if (ossl_likely(strcmp("ode", s + 1) == 0)) {
168
                    /* CIPHER_PARAM_MODE */
169
2.08k
                    if (ossl_unlikely(r->mode != NULL)) {
170
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
171
0
                                       "param %s is repeated", s);
172
0
                        return 0;
173
0
                    }
174
2.08k
                    r->mode = (OSSL_PARAM *)p;
175
2.08k
                }
176
2.08k
                break;
177
2.08k
            case 't':
178
2.08k
                if (ossl_likely(strcmp("ls-multi", s + 1) == 0)) {
179
                    /* CIPHER_PARAM_TLS1_MULTIBLOCK */
180
2.08k
                    if (ossl_unlikely(r->mb != NULL)) {
181
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
182
0
                                       "param %s is repeated", s);
183
0
                        return 0;
184
0
                    }
185
2.08k
                    r->mb = (OSSL_PARAM *)p;
186
2.08k
                }
187
20.8k
            }
188
2.08k
    return 1;
189
2.08k
}
190
#endif
191
/* End of machine generated */
192
193
const OSSL_PARAM *ossl_cipher_generic_gettable_params(ossl_unused void *provctx)
194
0
{
195
0
    return ossl_cipher_generic_get_params_list;
196
0
}
197
198
int ossl_cipher_generic_get_params(OSSL_PARAM params[], unsigned int md,
199
                                   uint64_t flags,
200
                                   size_t kbits, size_t blkbits, size_t ivbits)
201
2.08k
{
202
2.08k
    struct ossl_cipher_generic_get_params_st p;
203
204
2.08k
    if (!ossl_cipher_generic_get_params_decoder(params, &p))
205
0
        return 0;
206
207
2.08k
    if (p.mode != NULL && !OSSL_PARAM_set_uint(p.mode, md)) {
208
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
209
0
        return 0;
210
0
    }
211
2.08k
    if (p.aead != NULL
212
2.08k
            && !OSSL_PARAM_set_int(p.aead, (flags & PROV_CIPHER_FLAG_AEAD) != 0)) {
213
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
214
0
        return 0;
215
0
    }
216
2.08k
    if (p.custiv != NULL
217
2.08k
            && !OSSL_PARAM_set_int(p.custiv, (flags & PROV_CIPHER_FLAG_CUSTOM_IV) != 0)) {
218
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
219
0
        return 0;
220
0
    }
221
2.08k
    if (p.cts != NULL
222
2.08k
            && !OSSL_PARAM_set_int(p.cts, (flags & PROV_CIPHER_FLAG_CTS) != 0)) {
223
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
224
0
        return 0;
225
0
    }
226
2.08k
    if (p.mb != NULL
227
2.08k
            && !OSSL_PARAM_set_int(p.mb, (flags & PROV_CIPHER_FLAG_TLS1_MULTIBLOCK) != 0)) {
228
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
229
0
        return 0;
230
0
    }
231
2.08k
    if (p.rand != NULL
232
2.08k
            && !OSSL_PARAM_set_int(p.rand, (flags & PROV_CIPHER_FLAG_RAND_KEY) != 0)) {
233
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
234
0
        return 0;
235
0
    }
236
2.08k
    if (p.etm != NULL
237
2.08k
            && !OSSL_PARAM_set_int(p.etm, (flags & EVP_CIPH_FLAG_ENC_THEN_MAC) != 0)) {
238
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
239
0
        return 0;
240
0
    }
241
2.08k
    if (p.keylen != NULL && !OSSL_PARAM_set_size_t(p.keylen, kbits / 8)) {
242
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
243
0
        return 0;
244
0
    }
245
2.08k
    if (p.bsize != NULL && !OSSL_PARAM_set_size_t(p.bsize, blkbits / 8)) {
246
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
247
0
        return 0;
248
0
    }
249
2.08k
    if (p.ivlen != NULL && !OSSL_PARAM_set_size_t(p.ivlen, ivbits / 8)) {
250
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
251
0
        return 0;
252
0
    }
253
2.08k
    return 1;
254
2.08k
}
255
256
#define cipher_generic_get_ctx_params_st    ossl_cipher_get_ctx_param_list_st
257
258
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
259
#ifndef cipher_generic_get_ctx_params_list
260
static const OSSL_PARAM cipher_generic_get_ctx_params_list[] = {
261
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL),
262
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL),
263
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_PADDING, NULL),
264
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_NUM, NULL),
265
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_IV, NULL, 0),
266
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_UPDATED_IV, NULL, 0),
267
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_TLS_MAC, NULL, 0),
268
    OSSL_PARAM_END
269
};
270
#endif
271
272
#ifndef cipher_generic_get_ctx_params_st
273
struct cipher_generic_get_ctx_params_st {
274
    OSSL_PARAM *iv;
275
    OSSL_PARAM *ivlen;
276
    OSSL_PARAM *keylen;
277
    OSSL_PARAM *num;
278
    OSSL_PARAM *pad;
279
    OSSL_PARAM *tlsmac;
280
    OSSL_PARAM *updiv;
281
};
282
#endif
283
284
#ifndef cipher_generic_get_ctx_params_decoder
285
static int cipher_generic_get_ctx_params_decoder
286
    (const OSSL_PARAM *p, struct cipher_generic_get_ctx_params_st *r)
287
128
{
288
128
    const char *s;
289
290
128
    memset(r, 0, sizeof(*r));
291
128
    if (p != NULL)
292
256
        for (; (s = p->key) != NULL; p++)
293
128
            switch(s[0]) {
294
0
            default:
295
0
                break;
296
32
            case 'i':
297
32
                switch(s[1]) {
298
0
                default:
299
0
                    break;
300
32
                case 'v':
301
32
                    switch(s[2]) {
302
0
                    default:
303
0
                        break;
304
32
                    case 'l':
305
32
                        if (ossl_likely(strcmp("en", s + 3) == 0)) {
306
                            /* CIPHER_PARAM_IVLEN */
307
32
                            if (ossl_unlikely(r->ivlen != NULL)) {
308
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
309
0
                                               "param %s is repeated", s);
310
0
                                return 0;
311
0
                            }
312
32
                            r->ivlen = (OSSL_PARAM *)p;
313
32
                        }
314
32
                        break;
315
32
                    case '\0':
316
0
                        if (ossl_unlikely(r->iv != NULL)) {
317
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
318
0
                                           "param %s is repeated", s);
319
0
                            return 0;
320
0
                        }
321
0
                        r->iv = (OSSL_PARAM *)p;
322
32
                    }
323
32
                }
324
32
                break;
325
96
            case 'k':
326
96
                if (ossl_likely(strcmp("eylen", s + 1) == 0)) {
327
                    /* CIPHER_PARAM_KEYLEN */
328
96
                    if (ossl_unlikely(r->keylen != NULL)) {
329
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
330
0
                                       "param %s is repeated", s);
331
0
                        return 0;
332
0
                    }
333
96
                    r->keylen = (OSSL_PARAM *)p;
334
96
                }
335
96
                break;
336
96
            case 'n':
337
0
                if (ossl_likely(strcmp("um", s + 1) == 0)) {
338
                    /* CIPHER_PARAM_NUM */
339
0
                    if (ossl_unlikely(r->num != NULL)) {
340
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
341
0
                                       "param %s is repeated", s);
342
0
                        return 0;
343
0
                    }
344
0
                    r->num = (OSSL_PARAM *)p;
345
0
                }
346
0
                break;
347
0
            case 'p':
348
0
                if (ossl_likely(strcmp("adding", s + 1) == 0)) {
349
                    /* CIPHER_PARAM_PADDING */
350
0
                    if (ossl_unlikely(r->pad != NULL)) {
351
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
352
0
                                       "param %s is repeated", s);
353
0
                        return 0;
354
0
                    }
355
0
                    r->pad = (OSSL_PARAM *)p;
356
0
                }
357
0
                break;
358
0
            case 't':
359
0
                if (ossl_likely(strcmp("ls-mac", s + 1) == 0)) {
360
                    /* CIPHER_PARAM_TLS_MAC */
361
0
                    if (ossl_unlikely(r->tlsmac != NULL)) {
362
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
363
0
                                       "param %s is repeated", s);
364
0
                        return 0;
365
0
                    }
366
0
                    r->tlsmac = (OSSL_PARAM *)p;
367
0
                }
368
0
                break;
369
0
            case 'u':
370
0
                if (ossl_likely(strcmp("pdated-iv", s + 1) == 0)) {
371
                    /* CIPHER_PARAM_UPDATED_IV */
372
0
                    if (ossl_unlikely(r->updiv != NULL)) {
373
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
374
0
                                       "param %s is repeated", s);
375
0
                        return 0;
376
0
                    }
377
0
                    r->updiv = (OSSL_PARAM *)p;
378
0
                }
379
128
            }
380
128
    return 1;
381
128
}
382
#endif
383
/* End of machine generated */
384
385
const OSSL_PARAM *ossl_cipher_generic_gettable_ctx_params
386
        (ossl_unused void *cctx, ossl_unused void *provctx)
387
1.32k
{
388
1.32k
    return cipher_generic_get_ctx_params_list;
389
1.32k
}
390
391
#define cipher_generic_set_ctx_params_st    ossl_cipher_set_ctx_param_list_st
392
393
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
394
#ifndef cipher_generic_set_ctx_params_list
395
static const OSSL_PARAM cipher_generic_set_ctx_params_list[] = {
396
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_PADDING, NULL),
397
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_NUM, NULL),
398
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_USE_BITS, NULL),
399
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_TLS_VERSION, NULL),
400
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_TLS_MAC_SIZE, NULL),
401
    OSSL_PARAM_END
402
};
403
#endif
404
405
#ifndef cipher_generic_set_ctx_params_st
406
struct cipher_generic_set_ctx_params_st {
407
    OSSL_PARAM *bits;
408
    OSSL_PARAM *num;
409
    OSSL_PARAM *pad;
410
    OSSL_PARAM *tlsmacsize;
411
    OSSL_PARAM *tlsvers;
412
};
413
#endif
414
415
#ifndef cipher_generic_set_ctx_params_decoder
416
static int cipher_generic_set_ctx_params_decoder
417
    (const OSSL_PARAM *p, struct cipher_generic_set_ctx_params_st *r)
418
0
{
419
0
    const char *s;
420
421
0
    memset(r, 0, sizeof(*r));
422
0
    if (p != NULL)
423
0
        for (; (s = p->key) != NULL; p++)
424
0
            switch(s[0]) {
425
0
            default:
426
0
                break;
427
0
            case 'n':
428
0
                if (ossl_likely(strcmp("um", s + 1) == 0)) {
429
                    /* CIPHER_PARAM_NUM */
430
0
                    if (ossl_unlikely(r->num != NULL)) {
431
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
432
0
                                       "param %s is repeated", s);
433
0
                        return 0;
434
0
                    }
435
0
                    r->num = (OSSL_PARAM *)p;
436
0
                }
437
0
                break;
438
0
            case 'p':
439
0
                if (ossl_likely(strcmp("adding", s + 1) == 0)) {
440
                    /* CIPHER_PARAM_PADDING */
441
0
                    if (ossl_unlikely(r->pad != NULL)) {
442
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
443
0
                                       "param %s is repeated", s);
444
0
                        return 0;
445
0
                    }
446
0
                    r->pad = (OSSL_PARAM *)p;
447
0
                }
448
0
                break;
449
0
            case 't':
450
0
                switch(s[1]) {
451
0
                default:
452
0
                    break;
453
0
                case 'l':
454
0
                    switch(s[2]) {
455
0
                    default:
456
0
                        break;
457
0
                    case 's':
458
0
                        switch(s[3]) {
459
0
                        default:
460
0
                            break;
461
0
                        case '-':
462
0
                            switch(s[4]) {
463
0
                            default:
464
0
                                break;
465
0
                            case 'm':
466
0
                                if (ossl_likely(strcmp("ac-size", s + 5) == 0)) {
467
                                    /* CIPHER_PARAM_TLS_MAC_SIZE */
468
0
                                    if (ossl_unlikely(r->tlsmacsize != NULL)) {
469
0
                                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
470
0
                                                       "param %s is repeated", s);
471
0
                                        return 0;
472
0
                                    }
473
0
                                    r->tlsmacsize = (OSSL_PARAM *)p;
474
0
                                }
475
0
                                break;
476
0
                            case 'v':
477
0
                                if (ossl_likely(strcmp("ersion", s + 5) == 0)) {
478
                                    /* CIPHER_PARAM_TLS_VERSION */
479
0
                                    if (ossl_unlikely(r->tlsvers != NULL)) {
480
0
                                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
481
0
                                                       "param %s is repeated", s);
482
0
                                        return 0;
483
0
                                    }
484
0
                                    r->tlsvers = (OSSL_PARAM *)p;
485
0
                                }
486
0
                            }
487
0
                        }
488
0
                    }
489
0
                }
490
0
                break;
491
0
            case 'u':
492
0
                if (ossl_likely(strcmp("se-bits", s + 1) == 0)) {
493
                    /* CIPHER_PARAM_USE_BITS */
494
0
                    if (ossl_unlikely(r->bits != NULL)) {
495
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
496
0
                                       "param %s is repeated", s);
497
0
                        return 0;
498
0
                    }
499
0
                    r->bits = (OSSL_PARAM *)p;
500
0
                }
501
0
            }
502
0
    return 1;
503
0
}
504
#endif
505
/* End of machine generated */
506
507
const OSSL_PARAM *ossl_cipher_generic_settable_ctx_params
508
        (ossl_unused void *cctx, ossl_unused void *provctx)
509
0
{
510
0
    return cipher_generic_set_ctx_params_list;
511
0
}
512
513
/*
514
 * Variable key length cipher functions for OSSL_PARAM settables
515
 */
516
#define cipher_var_keylen_set_ctx_params_st ossl_cipher_set_ctx_param_list_st
517
518
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
519
#ifndef cipher_var_keylen_set_ctx_params_list
520
static const OSSL_PARAM cipher_var_keylen_set_ctx_params_list[] = {
521
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_PADDING, NULL),
522
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_NUM, NULL),
523
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_USE_BITS, NULL),
524
    OSSL_PARAM_uint(OSSL_CIPHER_PARAM_TLS_VERSION, NULL),
525
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_TLS_MAC_SIZE, NULL),
526
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL),
527
    OSSL_PARAM_END
528
};
529
#endif
530
531
#ifndef cipher_var_keylen_set_ctx_params_st
532
struct cipher_var_keylen_set_ctx_params_st {
533
    OSSL_PARAM *bits;
534
    OSSL_PARAM *keylen;
535
    OSSL_PARAM *num;
536
    OSSL_PARAM *pad;
537
    OSSL_PARAM *tlsmacsize;
538
    OSSL_PARAM *tlsvers;
539
};
540
#endif
541
542
#ifndef cipher_var_keylen_set_ctx_params_decoder
543
static int cipher_var_keylen_set_ctx_params_decoder
544
    (const OSSL_PARAM *p, struct cipher_var_keylen_set_ctx_params_st *r)
545
0
{
546
0
    const char *s;
547
548
0
    memset(r, 0, sizeof(*r));
549
0
    if (p != NULL)
550
0
        for (; (s = p->key) != NULL; p++)
551
0
            switch(s[0]) {
552
0
            default:
553
0
                break;
554
0
            case 'k':
555
0
                if (ossl_likely(strcmp("eylen", s + 1) == 0)) {
556
                    /* CIPHER_PARAM_KEYLEN */
557
0
                    if (ossl_unlikely(r->keylen != NULL)) {
558
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
559
0
                                       "param %s is repeated", s);
560
0
                        return 0;
561
0
                    }
562
0
                    r->keylen = (OSSL_PARAM *)p;
563
0
                }
564
0
                break;
565
0
            case 'n':
566
0
                if (ossl_likely(strcmp("um", s + 1) == 0)) {
567
                    /* CIPHER_PARAM_NUM */
568
0
                    if (ossl_unlikely(r->num != NULL)) {
569
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
570
0
                                       "param %s is repeated", s);
571
0
                        return 0;
572
0
                    }
573
0
                    r->num = (OSSL_PARAM *)p;
574
0
                }
575
0
                break;
576
0
            case 'p':
577
0
                if (ossl_likely(strcmp("adding", s + 1) == 0)) {
578
                    /* CIPHER_PARAM_PADDING */
579
0
                    if (ossl_unlikely(r->pad != NULL)) {
580
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
581
0
                                       "param %s is repeated", s);
582
0
                        return 0;
583
0
                    }
584
0
                    r->pad = (OSSL_PARAM *)p;
585
0
                }
586
0
                break;
587
0
            case 't':
588
0
                switch(s[1]) {
589
0
                default:
590
0
                    break;
591
0
                case 'l':
592
0
                    switch(s[2]) {
593
0
                    default:
594
0
                        break;
595
0
                    case 's':
596
0
                        switch(s[3]) {
597
0
                        default:
598
0
                            break;
599
0
                        case '-':
600
0
                            switch(s[4]) {
601
0
                            default:
602
0
                                break;
603
0
                            case 'm':
604
0
                                if (ossl_likely(strcmp("ac-size", s + 5) == 0)) {
605
                                    /* CIPHER_PARAM_TLS_MAC_SIZE */
606
0
                                    if (ossl_unlikely(r->tlsmacsize != NULL)) {
607
0
                                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
608
0
                                                       "param %s is repeated", s);
609
0
                                        return 0;
610
0
                                    }
611
0
                                    r->tlsmacsize = (OSSL_PARAM *)p;
612
0
                                }
613
0
                                break;
614
0
                            case 'v':
615
0
                                if (ossl_likely(strcmp("ersion", s + 5) == 0)) {
616
                                    /* CIPHER_PARAM_TLS_VERSION */
617
0
                                    if (ossl_unlikely(r->tlsvers != NULL)) {
618
0
                                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
619
0
                                                       "param %s is repeated", s);
620
0
                                        return 0;
621
0
                                    }
622
0
                                    r->tlsvers = (OSSL_PARAM *)p;
623
0
                                }
624
0
                            }
625
0
                        }
626
0
                    }
627
0
                }
628
0
                break;
629
0
            case 'u':
630
0
                if (ossl_likely(strcmp("se-bits", s + 1) == 0)) {
631
                    /* CIPHER_PARAM_USE_BITS */
632
0
                    if (ossl_unlikely(r->bits != NULL)) {
633
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
634
0
                                       "param %s is repeated", s);
635
0
                        return 0;
636
0
                    }
637
0
                    r->bits = (OSSL_PARAM *)p;
638
0
                }
639
0
            }
640
0
    return 1;
641
0
}
642
#endif
643
/* End of machine generated */
644
645
const OSSL_PARAM *ossl_cipher_var_keylen_settable_ctx_params
646
        (ossl_unused void *cctx, ossl_unused void *provctx)
647
0
{
648
0
    return cipher_var_keylen_set_ctx_params_list;
649
0
}
650
651
int ossl_cipher_var_keylen_set_ctx_params(void *vctx, const OSSL_PARAM params[])
652
0
{
653
0
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
654
0
    struct ossl_cipher_set_ctx_param_list_st p;
655
656
0
    if (ctx == NULL
657
0
            || !cipher_var_keylen_set_ctx_params_decoder(params, &p)
658
0
            || !ossl_cipher_common_set_ctx_params(ctx, &p))
659
0
        return 0;
660
661
0
    if (p.keylen != NULL) {
662
0
        size_t keylen;
663
664
0
        if (!OSSL_PARAM_get_size_t(p.keylen, &keylen)) {
665
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
666
0
            return 0;
667
0
        }
668
0
        if (ctx->keylen != keylen) {
669
0
            ctx->keylen = keylen;
670
0
            ctx->key_set = 0;
671
0
        }
672
0
    }
673
0
    return 1;
674
0
}
675
676
void ossl_cipher_generic_reset_ctx(PROV_CIPHER_CTX *ctx)
677
96
{
678
96
    if (ctx != NULL && ctx->alloced) {
679
0
        OPENSSL_free(ctx->tlsmac);
680
0
        ctx->alloced = 0;
681
0
        ctx->tlsmac = NULL;
682
0
    }
683
96
}
684
685
static int cipher_generic_init_internal(PROV_CIPHER_CTX *ctx,
686
                                        const unsigned char *key, size_t keylen,
687
                                        const unsigned char *iv, size_t ivlen,
688
                                        const OSSL_PARAM params[], int enc)
689
656
{
690
656
    ctx->num = 0;
691
656
    ctx->bufsz = 0;
692
656
    ctx->updated = 0;
693
656
    ctx->enc = enc ? 1 : 0;
694
695
656
    if (!ossl_prov_is_running())
696
0
        return 0;
697
698
656
    if (iv != NULL && ctx->mode != EVP_CIPH_ECB_MODE) {
699
64
        if (!ossl_cipher_generic_initiv(ctx, iv, ivlen))
700
0
            return 0;
701
64
    }
702
656
    if (iv == NULL && ctx->iv_set
703
656
        && (ctx->mode == EVP_CIPH_CBC_MODE
704
80
            || ctx->mode == EVP_CIPH_CFB_MODE
705
80
            || ctx->mode == EVP_CIPH_OFB_MODE))
706
        /* reset IV for these modes to keep compatibility with 1.1.1 */
707
0
        memcpy(ctx->iv, ctx->oiv, ctx->ivlen);
708
709
656
    if (key != NULL) {
710
528
        if (ctx->variable_keylength == 0) {
711
528
            if (keylen != ctx->keylen) {
712
0
                ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH);
713
0
                return 0;
714
0
            }
715
528
        } else {
716
0
            ctx->keylen = keylen;
717
0
        }
718
528
        if (!ctx->hw->init(ctx, key, ctx->keylen))
719
0
            return 0;
720
528
        ctx->key_set = 1;
721
528
    }
722
656
    return ossl_cipher_generic_set_ctx_params(ctx, params);
723
656
}
724
725
int ossl_cipher_generic_einit(void *vctx, const unsigned char *key,
726
                              size_t keylen, const unsigned char *iv,
727
                              size_t ivlen, const OSSL_PARAM params[])
728
656
{
729
656
    return cipher_generic_init_internal((PROV_CIPHER_CTX *)vctx, key, keylen,
730
656
                                        iv, ivlen, params, 1);
731
656
}
732
733
int ossl_cipher_generic_dinit(void *vctx, const unsigned char *key,
734
                              size_t keylen, const unsigned char *iv,
735
                              size_t ivlen, const OSSL_PARAM params[])
736
0
{
737
0
    return cipher_generic_init_internal((PROV_CIPHER_CTX *)vctx, key, keylen,
738
0
                                        iv, ivlen, params, 0);
739
0
}
740
741
int ossl_cipher_generic_skey_einit(void *vctx, void *skeydata,
742
                                   const unsigned char *iv, size_t ivlen,
743
                                   const OSSL_PARAM params[])
744
0
{
745
0
    PROV_SKEY *key = skeydata;
746
747
0
    return cipher_generic_init_internal((PROV_CIPHER_CTX *)vctx,
748
0
                                        key->data, key->length,
749
0
                                        iv, ivlen, params, 1);
750
0
}
751
752
int ossl_cipher_generic_skey_dinit(void *vctx, void *skeydata,
753
                                   const unsigned char *iv, size_t ivlen,
754
                                   const OSSL_PARAM params[])
755
0
{
756
0
    PROV_SKEY *key = skeydata;
757
758
0
    return cipher_generic_init_internal((PROV_CIPHER_CTX *)vctx,
759
0
                                        key->data, key->length,
760
0
                                        iv, ivlen, params, 0);
761
0
}
762
763
/* Max padding including padding length byte */
764
0
#define MAX_PADDING 256
765
766
int ossl_cipher_generic_block_update(void *vctx, unsigned char *out,
767
                                     size_t *outl, size_t outsize,
768
                                     const unsigned char *in, size_t inl)
769
1.07k
{
770
1.07k
    size_t outlint = 0;
771
1.07k
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
772
1.07k
    size_t blksz = ctx->blocksize;
773
1.07k
    size_t nextblocks;
774
775
1.07k
    if (!ctx->key_set) {
776
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
777
0
        return 0;
778
0
    }
779
780
1.07k
    if (ctx->tlsversion > 0) {
781
        /*
782
         * Each update call corresponds to a TLS record and is individually
783
         * padded
784
         */
785
786
        /* Sanity check inputs */
787
0
        if (in == NULL
788
0
                || in != out
789
0
                || outsize < inl
790
0
                || !ctx->pad) {
791
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
792
0
            return 0;
793
0
        }
794
795
0
        if (ctx->enc) {
796
0
            unsigned char padval;
797
0
            size_t padnum, loop;
798
799
            /* Add padding */
800
801
0
            padnum = blksz - (inl % blksz);
802
803
0
            if (outsize < inl + padnum) {
804
0
                ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
805
0
                return 0;
806
0
            }
807
808
0
            if (padnum > MAX_PADDING) {
809
0
                ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
810
0
                return 0;
811
0
            }
812
0
            padval = (unsigned char)(padnum - 1);
813
0
            if (ctx->tlsversion == SSL3_VERSION) {
814
0
                if (padnum > 1)
815
0
                    memset(out + inl, 0, padnum - 1);
816
0
                *(out + inl + padnum - 1) = padval;
817
0
            } else {
818
                /* we need to add 'padnum' padding bytes of value padval */
819
0
                for (loop = inl; loop < inl + padnum; loop++)
820
0
                    out[loop] = padval;
821
0
            }
822
0
            inl += padnum;
823
0
        }
824
825
0
        if ((inl % blksz) != 0) {
826
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
827
0
            return 0;
828
0
        }
829
830
831
        /* Shouldn't normally fail */
832
0
        if (!ctx->hw->cipher(ctx, out, in, inl)) {
833
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
834
0
            return 0;
835
0
        }
836
837
0
        if (ctx->alloced) {
838
0
            OPENSSL_free(ctx->tlsmac);
839
0
            ctx->alloced = 0;
840
0
            ctx->tlsmac = NULL;
841
0
        }
842
843
        /* This only fails if padding is publicly invalid */
844
0
        *outl = inl;
845
0
        if (!ctx->enc
846
0
            && !ossl_cipher_tlsunpadblock(ctx->libctx, ctx->tlsversion,
847
0
                                          out, outl,
848
0
                                          blksz, &ctx->tlsmac, &ctx->alloced,
849
0
                                          ctx->tlsmacsize, 0)) {
850
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
851
0
            return 0;
852
0
        }
853
0
        return 1;
854
0
    }
855
856
1.07k
    if (ctx->bufsz != 0)
857
0
        nextblocks = ossl_cipher_fillblock(ctx->buf, &ctx->bufsz, blksz,
858
0
                                           &in, &inl);
859
1.07k
    else
860
1.07k
        nextblocks = inl & ~(blksz-1);
861
862
    /*
863
     * If we're decrypting and we end an update on a block boundary we hold
864
     * the last block back in case this is the last update call and the last
865
     * block is padded.
866
     */
867
1.07k
    if (ctx->bufsz == blksz && (ctx->enc || inl > 0 || !ctx->pad)) {
868
0
        if (outsize < blksz) {
869
0
            ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
870
0
            return 0;
871
0
        }
872
0
        if (!ctx->hw->cipher(ctx, out, ctx->buf, blksz)) {
873
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
874
0
            return 0;
875
0
        }
876
0
        ctx->bufsz = 0;
877
0
        outlint = blksz;
878
0
        out += blksz;
879
0
    }
880
1.07k
    if (nextblocks > 0) {
881
1.07k
        if (!ctx->enc && ctx->pad && nextblocks == inl) {
882
0
            if (!ossl_assert(inl >= blksz)) {
883
0
                ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
884
0
                return 0;
885
0
            }
886
0
            nextblocks -= blksz;
887
0
        }
888
1.07k
        outlint += nextblocks;
889
1.07k
        if (outsize < outlint) {
890
0
            ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
891
0
            return 0;
892
0
        }
893
1.07k
    }
894
1.07k
    if (nextblocks > 0) {
895
1.07k
        if (!ctx->hw->cipher(ctx, out, in, nextblocks)) {
896
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
897
0
            return 0;
898
0
        }
899
1.07k
        in += nextblocks;
900
1.07k
        inl -= nextblocks;
901
1.07k
    }
902
1.07k
    if (inl != 0
903
1.07k
        && !ossl_cipher_trailingdata(ctx->buf, &ctx->bufsz, blksz, &in, &inl)) {
904
        /* ERR_raise already called */
905
0
        return 0;
906
0
    }
907
908
1.07k
    *outl = outlint;
909
1.07k
    return inl == 0;
910
1.07k
}
911
912
int ossl_cipher_generic_block_final(void *vctx, unsigned char *out,
913
                                    size_t *outl, size_t outsize)
914
0
{
915
0
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
916
0
    size_t blksz = ctx->blocksize;
917
918
0
    if (!ossl_prov_is_running())
919
0
        return 0;
920
921
0
    if (!ctx->key_set) {
922
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
923
0
        return 0;
924
0
    }
925
926
0
    if (ctx->tlsversion > 0) {
927
        /* We never finalize TLS, so this is an error */
928
0
        ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
929
0
        return 0;
930
0
    }
931
932
0
    if (ctx->enc) {
933
0
        if (ctx->pad) {
934
0
            ossl_cipher_padblock(ctx->buf, &ctx->bufsz, blksz);
935
0
        } else if (ctx->bufsz == 0) {
936
0
            *outl = 0;
937
0
            return 1;
938
0
        } else if (ctx->bufsz != blksz) {
939
0
            ERR_raise(ERR_LIB_PROV, PROV_R_WRONG_FINAL_BLOCK_LENGTH);
940
0
            return 0;
941
0
        }
942
943
0
        if (outsize < blksz) {
944
0
            ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
945
0
            return 0;
946
0
        }
947
0
        if (!ctx->hw->cipher(ctx, out, ctx->buf, blksz)) {
948
0
            ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
949
0
            return 0;
950
0
        }
951
0
        ctx->bufsz = 0;
952
0
        *outl = blksz;
953
0
        return 1;
954
0
    }
955
956
    /* Decrypting */
957
0
    if (ctx->bufsz != blksz) {
958
0
        if (ctx->bufsz == 0 && !ctx->pad) {
959
0
            *outl = 0;
960
0
            return 1;
961
0
        }
962
0
        ERR_raise(ERR_LIB_PROV, PROV_R_WRONG_FINAL_BLOCK_LENGTH);
963
0
        return 0;
964
0
    }
965
966
0
    if (!ctx->hw->cipher(ctx, ctx->buf, ctx->buf, blksz)) {
967
0
        ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
968
0
        return 0;
969
0
    }
970
971
0
    if (ctx->pad && !ossl_cipher_unpadblock(ctx->buf, &ctx->bufsz, blksz)) {
972
        /* ERR_raise already called */
973
0
        return 0;
974
0
    }
975
976
0
    if (outsize < ctx->bufsz) {
977
0
        ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
978
0
        return 0;
979
0
    }
980
0
    memcpy(out, ctx->buf, ctx->bufsz);
981
0
    *outl = ctx->bufsz;
982
0
    ctx->bufsz = 0;
983
0
    return 1;
984
0
}
985
986
int ossl_cipher_generic_stream_update(void *vctx, unsigned char *out,
987
                                      size_t *outl, size_t outsize,
988
                                      const unsigned char *in, size_t inl)
989
64
{
990
64
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
991
992
64
    if (!ctx->key_set) {
993
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
994
0
        return 0;
995
0
    }
996
997
64
    if (inl == 0) {
998
0
        *outl = 0;
999
0
        return 1;
1000
0
    }
1001
1002
64
    if (outsize < inl) {
1003
0
        ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
1004
0
        return 0;
1005
0
    }
1006
1007
64
    if (!ctx->hw->cipher(ctx, out, in, inl)) {
1008
0
        ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
1009
0
        return 0;
1010
0
    }
1011
1012
64
    *outl = inl;
1013
64
    if (!ctx->enc && ctx->tlsversion > 0) {
1014
        /*
1015
        * Remove any TLS padding. Only used by cipher_aes_cbc_hmac_sha1_hw.c and
1016
        * cipher_aes_cbc_hmac_sha256_hw.c
1017
        */
1018
0
        if (ctx->removetlspad) {
1019
            /*
1020
             * We should have already failed in the cipher() call above if this
1021
             * isn't true.
1022
             */
1023
0
            if (!ossl_assert(*outl >= (size_t)(out[inl - 1] + 1)))
1024
0
                return 0;
1025
            /* The actual padding length */
1026
0
            *outl -= out[inl - 1] + 1;
1027
0
        }
1028
1029
        /* TLS MAC and explicit IV if relevant. We should have already failed
1030
         * in the cipher() call above if *outl is too short.
1031
         */
1032
0
        if (!ossl_assert(*outl >= ctx->removetlsfixed))
1033
0
            return 0;
1034
0
        *outl -= ctx->removetlsfixed;
1035
1036
        /* Extract the MAC if there is one */
1037
0
        if (ctx->tlsmacsize > 0) {
1038
0
            if (*outl < ctx->tlsmacsize)
1039
0
                return 0;
1040
1041
0
            ctx->tlsmac = out + *outl - ctx->tlsmacsize;
1042
0
            *outl -= ctx->tlsmacsize;
1043
0
        }
1044
0
    }
1045
1046
64
    return 1;
1047
64
}
1048
int ossl_cipher_generic_stream_final(void *vctx, unsigned char *out,
1049
                                     size_t *outl, size_t outsize)
1050
0
{
1051
0
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
1052
1053
0
    if (!ossl_prov_is_running())
1054
0
        return 0;
1055
1056
0
    if (!ctx->key_set) {
1057
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
1058
0
        return 0;
1059
0
    }
1060
1061
0
    *outl = 0;
1062
0
    return 1;
1063
0
}
1064
1065
int ossl_cipher_generic_cipher(void *vctx, unsigned char *out, size_t *outl,
1066
                               size_t outsize, const unsigned char *in,
1067
                               size_t inl)
1068
0
{
1069
0
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
1070
1071
0
    if (!ossl_prov_is_running())
1072
0
        return 0;
1073
1074
0
    if (!ctx->key_set) {
1075
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
1076
0
        return 0;
1077
0
    }
1078
1079
0
    if (outsize < inl) {
1080
0
        ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
1081
0
        return 0;
1082
0
    }
1083
1084
0
    if (!ctx->hw->cipher(ctx, out, in, inl)) {
1085
0
        ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
1086
0
        return 0;
1087
0
    }
1088
1089
0
    *outl = inl;
1090
0
    return 1;
1091
0
}
1092
1093
int ossl_cipher_common_get_ctx_params
1094
    (PROV_CIPHER_CTX *ctx, const struct ossl_cipher_get_ctx_param_list_st *p)
1095
128
{
1096
128
    if (p->ivlen != NULL && !OSSL_PARAM_set_size_t(p->ivlen, ctx->ivlen)) {
1097
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
1098
0
        return 0;
1099
0
    }
1100
1101
128
    if (p->pad != NULL && !OSSL_PARAM_set_uint(p->pad, ctx->pad)) {
1102
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
1103
0
        return 0;
1104
0
    }
1105
1106
128
    if (p->iv != NULL
1107
128
        && !OSSL_PARAM_set_octet_string_or_ptr(p->iv, ctx->oiv, ctx->ivlen)) {
1108
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
1109
0
        return 0;
1110
0
    }
1111
1112
128
    if (p->updiv != NULL
1113
128
        && !OSSL_PARAM_set_octet_string_or_ptr(p->updiv, ctx->iv, ctx->ivlen)) {
1114
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
1115
0
        return 0;
1116
0
    }
1117
1118
128
    if (p->num != NULL && !OSSL_PARAM_set_uint(p->num, ctx->num)) {
1119
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
1120
0
        return 0;
1121
0
    }
1122
1123
128
    if (p->keylen != NULL && !OSSL_PARAM_set_size_t(p->keylen, ctx->keylen)) {
1124
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
1125
0
        return 0;
1126
0
    }
1127
1128
128
    if (p->tlsmac != NULL
1129
128
        && !OSSL_PARAM_set_octet_ptr(p->tlsmac, ctx->tlsmac, ctx->tlsmacsize)) {
1130
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
1131
0
        return 0;
1132
0
    }
1133
128
    return 1;
1134
128
}
1135
1136
int ossl_cipher_generic_get_ctx_params(void *vctx, OSSL_PARAM params[])
1137
128
{
1138
128
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
1139
128
    struct ossl_cipher_get_ctx_param_list_st p;
1140
1141
128
    if (ctx == NULL || !cipher_generic_get_ctx_params_decoder(params, &p))
1142
0
        return 0;
1143
128
    return ossl_cipher_common_get_ctx_params(ctx, &p);
1144
128
}
1145
1146
int ossl_cipher_common_set_ctx_params
1147
    (PROV_CIPHER_CTX *ctx, const struct ossl_cipher_set_ctx_param_list_st *p)
1148
0
{
1149
0
    if (p->pad != NULL) {
1150
0
        unsigned int pad;
1151
1152
0
        if (!OSSL_PARAM_get_uint(p->pad, &pad)) {
1153
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
1154
0
            return 0;
1155
0
        }
1156
0
        ctx->pad = pad ? 1 : 0;
1157
0
    }
1158
1159
0
    if (p->bits != NULL) {
1160
0
        unsigned int bits;
1161
1162
0
        if (!OSSL_PARAM_get_uint(p->bits, &bits)) {
1163
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
1164
0
            return 0;
1165
0
        }
1166
0
        ctx->use_bits = bits ? 1 : 0;
1167
0
    }
1168
1169
0
    if (p->tlsvers != NULL) {
1170
0
        if (!OSSL_PARAM_get_uint(p->tlsvers, &ctx->tlsversion)) {
1171
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
1172
0
            return 0;
1173
0
        }
1174
0
    }
1175
1176
0
    if (p->tlsmacsize != NULL) {
1177
0
        if (!OSSL_PARAM_get_size_t(p->tlsmacsize, &ctx->tlsmacsize)) {
1178
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
1179
0
            return 0;
1180
0
        }
1181
0
    }
1182
1183
0
    if (p->num != NULL) {
1184
0
        unsigned int num;
1185
1186
0
        if (!OSSL_PARAM_get_uint(p->num, &num)) {
1187
0
            ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
1188
0
            return 0;
1189
0
        }
1190
0
        ctx->num = num;
1191
0
    }
1192
0
    return 1;
1193
0
}
1194
1195
int ossl_cipher_generic_set_ctx_params(void *vctx, const OSSL_PARAM params[])
1196
656
{
1197
656
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
1198
656
    struct ossl_cipher_set_ctx_param_list_st p;
1199
1200
656
    if (ossl_param_is_empty(params))
1201
656
        return 1;
1202
1203
0
    if (ctx == NULL || !cipher_generic_set_ctx_params_decoder(params, &p))
1204
0
        return 0;
1205
0
    return ossl_cipher_common_set_ctx_params(ctx, &p);
1206
0
}
1207
1208
int ossl_cipher_generic_initiv(PROV_CIPHER_CTX *ctx, const unsigned char *iv,
1209
                               size_t ivlen)
1210
64
{
1211
64
    if (ivlen != ctx->ivlen
1212
64
        || ivlen > sizeof(ctx->iv)) {
1213
0
        ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_IV_LENGTH);
1214
0
        return 0;
1215
0
    }
1216
64
    ctx->iv_set = 1;
1217
64
    memcpy(ctx->iv, iv, ivlen);
1218
64
    memcpy(ctx->oiv, iv, ivlen);
1219
64
    return 1;
1220
64
}
1221
1222
void ossl_cipher_generic_initkey(void *vctx, size_t kbits, size_t blkbits,
1223
                                 size_t ivbits, unsigned int mode,
1224
                                 uint64_t flags, const PROV_CIPHER_HW *hw,
1225
                                 void *provctx)
1226
96
{
1227
96
    PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
1228
1229
96
    if ((flags & PROV_CIPHER_FLAG_INVERSE_CIPHER) != 0)
1230
0
        ctx->inverse_cipher = 1;
1231
96
    if ((flags & PROV_CIPHER_FLAG_VARIABLE_LENGTH) != 0)
1232
0
        ctx->variable_keylength = 1;
1233
1234
96
    ctx->pad = 1;
1235
96
    ctx->keylen = ((kbits) / 8);
1236
96
    ctx->ivlen = ((ivbits) / 8);
1237
96
    ctx->hw = hw;
1238
96
    ctx->mode = mode;
1239
96
    ctx->blocksize = blkbits / 8;
1240
96
    if (provctx != NULL)
1241
96
        ctx->libctx = PROV_LIBCTX_OF(provctx); /* used for rand */
1242
96
}