evp.c 203 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501450245034504450545064507450845094510451145124513451445154516451745184519452045214522452345244525452645274528452945304531453245334534453545364537453845394540454145424543454445454546454745484549455045514552455345544555455645574558455945604561456245634564456545664567456845694570457145724573457445754576457745784579458045814582458345844585458645874588458945904591459245934594459545964597459845994600460146024603460446054606460746084609461046114612461346144615461646174618461946204621462246234624462546264627462846294630463146324633463446354636463746384639464046414642464346444645464646474648464946504651465246534654465546564657465846594660466146624663466446654666466746684669467046714672467346744675467646774678467946804681468246834684468546864687468846894690469146924693469446954696469746984699470047014702470347044705470647074708470947104711471247134714471547164717471847194720472147224723472447254726472747284729473047314732473347344735473647374738473947404741474247434744474547464747474847494750475147524753475447554756475747584759476047614762476347644765476647674768476947704771477247734774477547764777477847794780478147824783478447854786478747884789479047914792479347944795479647974798479948004801480248034804480548064807480848094810481148124813481448154816481748184819482048214822482348244825482648274828482948304831483248334834483548364837483848394840484148424843484448454846484748484849485048514852485348544855485648574858485948604861486248634864486548664867486848694870487148724873487448754876487748784879488048814882488348844885488648874888488948904891489248934894489548964897489848994900490149024903490449054906490749084909491049114912491349144915491649174918491949204921492249234924492549264927492849294930493149324933493449354936493749384939494049414942494349444945494649474948494949504951495249534954495549564957495849594960496149624963496449654966496749684969497049714972497349744975497649774978497949804981498249834984498549864987498849894990499149924993499449954996499749984999500050015002500350045005500650075008500950105011501250135014501550165017501850195020502150225023502450255026502750285029503050315032503350345035503650375038503950405041504250435044504550465047504850495050505150525053505450555056505750585059506050615062506350645065506650675068506950705071507250735074507550765077507850795080508150825083508450855086508750885089509050915092509350945095509650975098509951005101510251035104510551065107510851095110511151125113511451155116511751185119512051215122512351245125512651275128512951305131513251335134513551365137513851395140514151425143514451455146514751485149515051515152515351545155515651575158515951605161516251635164516551665167516851695170517151725173517451755176517751785179518051815182518351845185518651875188518951905191519251935194519551965197519851995200520152025203520452055206520752085209521052115212521352145215521652175218521952205221522252235224522552265227522852295230523152325233523452355236523752385239524052415242524352445245524652475248524952505251525252535254525552565257525852595260526152625263526452655266526752685269527052715272527352745275527652775278527952805281528252835284528552865287528852895290529152925293529452955296529752985299530053015302530353045305530653075308530953105311531253135314531553165317531853195320532153225323532453255326532753285329533053315332533353345335533653375338533953405341534253435344534553465347534853495350535153525353535453555356535753585359536053615362536353645365536653675368536953705371537253735374537553765377537853795380538153825383538453855386538753885389539053915392539353945395539653975398539954005401540254035404540554065407540854095410541154125413541454155416541754185419542054215422542354245425542654275428542954305431543254335434543554365437543854395440544154425443544454455446544754485449545054515452545354545455545654575458545954605461546254635464546554665467546854695470547154725473547454755476547754785479548054815482548354845485548654875488548954905491549254935494549554965497549854995500550155025503550455055506550755085509551055115512551355145515551655175518551955205521552255235524552555265527552855295530553155325533553455355536553755385539554055415542554355445545554655475548554955505551555255535554555555565557555855595560556155625563556455655566556755685569557055715572557355745575557655775578557955805581558255835584558555865587558855895590559155925593559455955596559755985599560056015602560356045605560656075608560956105611561256135614561556165617561856195620562156225623562456255626562756285629563056315632563356345635563656375638563956405641564256435644564556465647564856495650565156525653565456555656565756585659566056615662566356645665566656675668566956705671567256735674567556765677567856795680568156825683568456855686568756885689569056915692569356945695569656975698569957005701570257035704570557065707570857095710571157125713571457155716571757185719572057215722572357245725572657275728572957305731573257335734573557365737573857395740574157425743574457455746574757485749575057515752575357545755575657575758575957605761576257635764576557665767576857695770577157725773577457755776577757785779578057815782578357845785578657875788578957905791579257935794579557965797579857995800580158025803580458055806580758085809581058115812581358145815581658175818581958205821582258235824582558265827582858295830583158325833583458355836583758385839584058415842584358445845584658475848584958505851585258535854585558565857585858595860586158625863586458655866586758685869587058715872587358745875587658775878587958805881588258835884588558865887588858895890589158925893589458955896589758985899590059015902590359045905590659075908590959105911591259135914591559165917591859195920592159225923592459255926592759285929593059315932593359345935593659375938593959405941594259435944594559465947594859495950595159525953595459555956595759585959596059615962596359645965596659675968596959705971597259735974597559765977597859795980598159825983598459855986598759885989599059915992599359945995599659975998599960006001600260036004600560066007600860096010601160126013601460156016601760186019602060216022602360246025602660276028602960306031603260336034603560366037603860396040604160426043604460456046604760486049605060516052605360546055605660576058605960606061606260636064606560666067606860696070607160726073607460756076607760786079608060816082608360846085608660876088608960906091609260936094609560966097609860996100610161026103610461056106610761086109611061116112611361146115611661176118611961206121612261236124612561266127612861296130613161326133613461356136613761386139614061416142614361446145614661476148614961506151615261536154615561566157615861596160616161626163616461656166616761686169617061716172617361746175617661776178617961806181618261836184618561866187618861896190619161926193619461956196619761986199620062016202620362046205620662076208620962106211621262136214621562166217621862196220622162226223622462256226622762286229623062316232623362346235623662376238623962406241624262436244624562466247624862496250625162526253625462556256625762586259626062616262626362646265626662676268626962706271627262736274627562766277627862796280628162826283628462856286628762886289629062916292629362946295629662976298629963006301630263036304630563066307630863096310631163126313631463156316631763186319632063216322632363246325632663276328632963306331633263336334633563366337633863396340634163426343634463456346634763486349635063516352635363546355635663576358635963606361636263636364636563666367636863696370637163726373637463756376637763786379638063816382638363846385638663876388638963906391639263936394639563966397639863996400640164026403640464056406640764086409641064116412641364146415641664176418641964206421642264236424642564266427642864296430643164326433643464356436643764386439644064416442644364446445644664476448644964506451645264536454645564566457645864596460646164626463646464656466646764686469647064716472647364746475647664776478647964806481648264836484648564866487648864896490649164926493649464956496649764986499650065016502650365046505650665076508650965106511651265136514651565166517651865196520652165226523652465256526652765286529653065316532653365346535653665376538653965406541654265436544654565466547654865496550655165526553655465556556655765586559656065616562656365646565656665676568656965706571657265736574657565766577657865796580658165826583658465856586658765886589659065916592659365946595659665976598659966006601660266036604660566066607660866096610661166126613661466156616661766186619662066216622662366246625662666276628662966306631663266336634663566366637663866396640664166426643664466456646664766486649665066516652665366546655665666576658665966606661666266636664666566666667666866696670667166726673667466756676667766786679668066816682668366846685668666876688668966906691669266936694669566966697669866996700670167026703670467056706670767086709671067116712671367146715671667176718671967206721672267236724672567266727
  1. /* evp.c
  2. *
  3. * Copyright (C) 2006-2020 wolfSSL Inc.
  4. *
  5. * This file is part of wolfSSL.
  6. *
  7. * wolfSSL is free software; you can redistribute it and/or modify
  8. * it under the terms of the GNU General Public License as published by
  9. * the Free Software Foundation; either version 2 of the License, or
  10. * (at your option) any later version.
  11. *
  12. * wolfSSL is distributed in the hope that it will be useful,
  13. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  15. * GNU General Public License for more details.
  16. *
  17. * You should have received a copy of the GNU General Public License
  18. * along with this program; if not, write to the Free Software
  19. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
  20. */
  21. #ifdef HAVE_CONFIG_H
  22. #include <config.h>
  23. #endif
  24. #include <wolfssl/wolfcrypt/settings.h>
  25. #if !defined(WOLFSSL_EVP_INCLUDED)
  26. #ifndef WOLFSSL_IGNORE_FILE_WARN
  27. #warning evp.c does not need to be compiled separately from ssl.c
  28. #endif
  29. #elif defined(WOLFCRYPT_ONLY)
  30. #else
  31. #if defined(OPENSSL_EXTRA)
  32. #if !defined(HAVE_PKCS7) && \
  33. ((defined(HAVE_FIPS) && defined(HAVE_FIPS_VERSION) && \
  34. (HAVE_FIPS_VERSION >= 2)) || defined(HAVE_SELFTEST))
  35. enum {
  36. /* In the event of fips cert 3389 or CAVP selftest build, these enums are
  37. * not in aes.h for use with evp so enumerate it here outside the fips
  38. * boundary */
  39. GCM_NONCE_MID_SZ = 12, /* The usual default nonce size for AES-GCM. */
  40. CCM_NONCE_MIN_SZ = 7,
  41. };
  42. #endif
  43. #include <wolfssl/openssl/ecdsa.h>
  44. #include <wolfssl/openssl/evp.h>
  45. #ifndef NO_AES
  46. #ifdef HAVE_AES_CBC
  47. #ifdef WOLFSSL_AES_128
  48. static char *EVP_AES_128_CBC = NULL;
  49. #endif
  50. #ifdef WOLFSSL_AES_192
  51. static char *EVP_AES_192_CBC = NULL;
  52. #endif
  53. #ifdef WOLFSSL_AES_256
  54. static char *EVP_AES_256_CBC = NULL;
  55. #endif
  56. #endif /* HAVE_AES_CBC */
  57. #ifdef WOLFSSL_AES_OFB
  58. #ifdef WOLFSSL_AES_128
  59. static char *EVP_AES_128_OFB = NULL;
  60. #endif
  61. #ifdef WOLFSSL_AES_192
  62. static char *EVP_AES_192_OFB = NULL;
  63. #endif
  64. #ifdef WOLFSSL_AES_256
  65. static char *EVP_AES_256_OFB = NULL;
  66. #endif
  67. #endif /* WOLFSSL_AES_OFB */
  68. #ifdef WOLFSSL_AES_XTS
  69. #ifdef WOLFSSL_AES_128
  70. static char *EVP_AES_128_XTS = NULL;
  71. #endif
  72. #ifdef WOLFSSL_AES_256
  73. static char *EVP_AES_256_XTS = NULL;
  74. #endif
  75. #endif /* WOLFSSL_AES_XTS */
  76. #ifdef WOLFSSL_AES_CFB
  77. #ifdef WOLFSSL_AES_128
  78. static char *EVP_AES_128_CFB1 = NULL;
  79. #endif
  80. #ifdef WOLFSSL_AES_192
  81. static char *EVP_AES_192_CFB1 = NULL;
  82. #endif
  83. #ifdef WOLFSSL_AES_256
  84. static char *EVP_AES_256_CFB1 = NULL;
  85. #endif
  86. #ifdef WOLFSSL_AES_128
  87. static char *EVP_AES_128_CFB8 = NULL;
  88. #endif
  89. #ifdef WOLFSSL_AES_192
  90. static char *EVP_AES_192_CFB8 = NULL;
  91. #endif
  92. #ifdef WOLFSSL_AES_256
  93. static char *EVP_AES_256_CFB8 = NULL;
  94. #endif
  95. #ifdef WOLFSSL_AES_128
  96. static char *EVP_AES_128_CFB128 = NULL;
  97. #endif
  98. #ifdef WOLFSSL_AES_192
  99. static char *EVP_AES_192_CFB128 = NULL;
  100. #endif
  101. #ifdef WOLFSSL_AES_256
  102. static char *EVP_AES_256_CFB128 = NULL;
  103. #endif
  104. #endif /* WOLFSSL_AES_CFB */
  105. #ifdef HAVE_AESGCM
  106. #ifdef WOLFSSL_AES_128
  107. static char *EVP_AES_128_GCM = NULL;
  108. #endif
  109. #ifdef WOLFSSL_AES_192
  110. static char *EVP_AES_192_GCM = NULL;
  111. #endif
  112. #ifdef WOLFSSL_AES_256
  113. static char *EVP_AES_256_GCM = NULL;
  114. #endif
  115. #endif /* HAVE_AESGCM */
  116. #ifdef WOLFSSL_AES_128
  117. static char *EVP_AES_128_CTR = NULL;
  118. #endif
  119. #ifdef WOLFSSL_AES_192
  120. static char *EVP_AES_192_CTR = NULL;
  121. #endif
  122. #ifdef WOLFSSL_AES_256
  123. static char *EVP_AES_256_CTR = NULL;
  124. #endif
  125. #ifdef WOLFSSL_AES_128
  126. static char *EVP_AES_128_ECB = NULL;
  127. #endif
  128. #ifdef WOLFSSL_AES_192
  129. static char *EVP_AES_192_ECB = NULL;
  130. #endif
  131. #ifdef WOLFSSL_AES_256
  132. static char *EVP_AES_256_ECB = NULL;
  133. #endif
  134. #define EVP_AES_SIZE 11
  135. #ifdef WOLFSSL_AES_CFB
  136. #define EVP_AESCFB_SIZE 14
  137. #endif
  138. #endif
  139. #ifndef NO_DES3
  140. static char *EVP_DES_CBC = NULL;
  141. static char *EVP_DES_ECB = NULL;
  142. static char *EVP_DES_EDE3_CBC = NULL;
  143. static char *EVP_DES_EDE3_ECB = NULL;
  144. #define EVP_DES_SIZE 7
  145. #define EVP_DES_EDE3_SIZE 12
  146. #endif
  147. #ifdef HAVE_IDEA
  148. static char *EVP_IDEA_CBC;
  149. #define EVP_IDEA_SIZE 8
  150. #endif
  151. static unsigned int cipherType(const WOLFSSL_EVP_CIPHER *cipher);
  152. /* Getter function for cipher key length
  153. *
  154. * c WOLFSSL_EVP_CIPHER structure to get key length from
  155. *
  156. * NOTE: OpenSSL_add_all_ciphers() should be called first before using this
  157. * function
  158. *
  159. * Returns size of key in bytes
  160. */
  161. int wolfSSL_EVP_Cipher_key_length(const WOLFSSL_EVP_CIPHER* c)
  162. {
  163. WOLFSSL_ENTER("wolfSSL_EVP_Cipher_key_length");
  164. if (c == NULL) {
  165. return 0;
  166. }
  167. switch (cipherType(c)) {
  168. #if !defined(NO_AES)
  169. #if defined(HAVE_AES_CBC)
  170. case AES_128_CBC_TYPE: return 16;
  171. case AES_192_CBC_TYPE: return 24;
  172. case AES_256_CBC_TYPE: return 32;
  173. #endif
  174. #if defined(WOLFSSL_AES_CFB)
  175. case AES_128_CFB1_TYPE: return 16;
  176. case AES_192_CFB1_TYPE: return 24;
  177. case AES_256_CFB1_TYPE: return 32;
  178. case AES_128_CFB8_TYPE: return 16;
  179. case AES_192_CFB8_TYPE: return 24;
  180. case AES_256_CFB8_TYPE: return 32;
  181. case AES_128_CFB128_TYPE: return 16;
  182. case AES_192_CFB128_TYPE: return 24;
  183. case AES_256_CFB128_TYPE: return 32;
  184. #endif
  185. #if defined(WOLFSSL_AES_OFB)
  186. case AES_128_OFB_TYPE: return 16;
  187. case AES_192_OFB_TYPE: return 24;
  188. case AES_256_OFB_TYPE: return 32;
  189. #endif
  190. #if defined(WOLFSSL_AES_XTS)
  191. case AES_128_XTS_TYPE: return 16;
  192. case AES_256_XTS_TYPE: return 32;
  193. #endif
  194. #if defined(HAVE_AESGCM)
  195. case AES_128_GCM_TYPE: return 16;
  196. case AES_192_GCM_TYPE: return 24;
  197. case AES_256_GCM_TYPE: return 32;
  198. #endif
  199. #if defined(WOLFSSL_AES_COUNTER)
  200. case AES_128_CTR_TYPE: return 16;
  201. case AES_192_CTR_TYPE: return 24;
  202. case AES_256_CTR_TYPE: return 32;
  203. #endif
  204. #if defined(HAVE_AES_ECB)
  205. case AES_128_ECB_TYPE: return 16;
  206. case AES_192_ECB_TYPE: return 24;
  207. case AES_256_ECB_TYPE: return 32;
  208. #endif
  209. #endif /* !NO_AES */
  210. #ifndef NO_DES3
  211. case DES_CBC_TYPE: return 8;
  212. case DES_EDE3_CBC_TYPE: return 24;
  213. case DES_ECB_TYPE: return 8;
  214. case DES_EDE3_ECB_TYPE: return 24;
  215. #endif
  216. default:
  217. return 0;
  218. }
  219. }
  220. int wolfSSL_EVP_EncryptInit(WOLFSSL_EVP_CIPHER_CTX* ctx,
  221. const WOLFSSL_EVP_CIPHER* type,
  222. const unsigned char* key,
  223. const unsigned char* iv)
  224. {
  225. return wolfSSL_EVP_CipherInit(ctx, type, (byte*)key, (byte*)iv, 1);
  226. }
  227. int wolfSSL_EVP_EncryptInit_ex(WOLFSSL_EVP_CIPHER_CTX* ctx,
  228. const WOLFSSL_EVP_CIPHER* type,
  229. WOLFSSL_ENGINE *impl,
  230. const unsigned char* key,
  231. const unsigned char* iv)
  232. {
  233. (void) impl;
  234. return wolfSSL_EVP_CipherInit(ctx, type, (byte*)key, (byte*)iv, 1);
  235. }
  236. int wolfSSL_EVP_DecryptInit(WOLFSSL_EVP_CIPHER_CTX* ctx,
  237. const WOLFSSL_EVP_CIPHER* type,
  238. const unsigned char* key,
  239. const unsigned char* iv)
  240. {
  241. WOLFSSL_ENTER("wolfSSL_EVP_CipherInit");
  242. return wolfSSL_EVP_CipherInit(ctx, type, (byte*)key, (byte*)iv, 0);
  243. }
  244. int wolfSSL_EVP_DecryptInit_ex(WOLFSSL_EVP_CIPHER_CTX* ctx,
  245. const WOLFSSL_EVP_CIPHER* type,
  246. WOLFSSL_ENGINE *impl,
  247. const unsigned char* key,
  248. const unsigned char* iv)
  249. {
  250. (void) impl;
  251. WOLFSSL_ENTER("wolfSSL_EVP_DecryptInit");
  252. return wolfSSL_EVP_CipherInit(ctx, type, (byte*)key, (byte*)iv, 0);
  253. }
  254. WOLFSSL_EVP_CIPHER_CTX *wolfSSL_EVP_CIPHER_CTX_new(void)
  255. {
  256. WOLFSSL_EVP_CIPHER_CTX *ctx = (WOLFSSL_EVP_CIPHER_CTX*)XMALLOC(sizeof *ctx,
  257. NULL, DYNAMIC_TYPE_TMP_BUFFER);
  258. if (ctx) {
  259. WOLFSSL_ENTER("wolfSSL_EVP_CIPHER_CTX_new");
  260. wolfSSL_EVP_CIPHER_CTX_init(ctx);
  261. }
  262. return ctx;
  263. }
  264. void wolfSSL_EVP_CIPHER_CTX_free(WOLFSSL_EVP_CIPHER_CTX *ctx)
  265. {
  266. if (ctx) {
  267. WOLFSSL_ENTER("wolfSSL_EVP_CIPHER_CTX_free");
  268. wolfSSL_EVP_CIPHER_CTX_cleanup(ctx);
  269. XFREE(ctx, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  270. }
  271. }
  272. int wolfSSL_EVP_CIPHER_CTX_reset(WOLFSSL_EVP_CIPHER_CTX *ctx)
  273. {
  274. int ret = WOLFSSL_FAILURE;
  275. if (ctx != NULL) {
  276. WOLFSSL_ENTER("wolfSSL_EVP_CIPHER_CTX_reset");
  277. wolfSSL_EVP_CIPHER_CTX_cleanup(ctx);
  278. ret = WOLFSSL_SUCCESS;
  279. }
  280. return ret;
  281. }
  282. unsigned long wolfSSL_EVP_CIPHER_CTX_mode(const WOLFSSL_EVP_CIPHER_CTX *ctx)
  283. {
  284. if (ctx == NULL) return 0;
  285. return ctx->flags & WOLFSSL_EVP_CIPH_MODE;
  286. }
  287. int wolfSSL_EVP_EncryptFinal(WOLFSSL_EVP_CIPHER_CTX *ctx,
  288. unsigned char *out, int *outl)
  289. {
  290. if (ctx && ctx->enc) {
  291. WOLFSSL_ENTER("wolfSSL_EVP_EncryptFinal");
  292. return wolfSSL_EVP_CipherFinal(ctx, out, outl);
  293. }
  294. else
  295. return WOLFSSL_FAILURE;
  296. }
  297. int wolfSSL_EVP_CipherInit_ex(WOLFSSL_EVP_CIPHER_CTX* ctx,
  298. const WOLFSSL_EVP_CIPHER* type,
  299. WOLFSSL_ENGINE *impl,
  300. const unsigned char* key,
  301. const unsigned char* iv,
  302. int enc)
  303. {
  304. (void)impl;
  305. return wolfSSL_EVP_CipherInit(ctx, type, key, iv, enc);
  306. }
  307. int wolfSSL_EVP_EncryptFinal_ex(WOLFSSL_EVP_CIPHER_CTX *ctx,
  308. unsigned char *out, int *outl)
  309. {
  310. if (ctx && ctx->enc) {
  311. WOLFSSL_ENTER("wolfSSL_EVP_EncryptFinal_ex");
  312. return wolfSSL_EVP_CipherFinal(ctx, out, outl);
  313. }
  314. else
  315. return WOLFSSL_FAILURE;
  316. }
  317. int wolfSSL_EVP_DecryptFinal(WOLFSSL_EVP_CIPHER_CTX *ctx,
  318. unsigned char *out, int *outl)
  319. {
  320. if (ctx && !ctx->enc) {
  321. WOLFSSL_ENTER("wolfSSL_EVP_DecryptFinal");
  322. return wolfSSL_EVP_CipherFinal(ctx, out, outl);
  323. }
  324. else {
  325. return WOLFSSL_FAILURE;
  326. }
  327. }
  328. int wolfSSL_EVP_DecryptFinal_ex(WOLFSSL_EVP_CIPHER_CTX *ctx,
  329. unsigned char *out, int *outl)
  330. {
  331. if (ctx && !ctx->enc) {
  332. WOLFSSL_ENTER("wolfSSL_EVP_DecryptFinal_ex");
  333. return wolfSSL_EVP_CipherFinal(ctx, out, outl);
  334. }
  335. else {
  336. return WOLFSSL_FAILURE;
  337. }
  338. }
  339. int wolfSSL_EVP_DigestInit_ex(WOLFSSL_EVP_MD_CTX* ctx,
  340. const WOLFSSL_EVP_MD* type,
  341. WOLFSSL_ENGINE *impl)
  342. {
  343. (void) impl;
  344. WOLFSSL_ENTER("wolfSSL_EVP_DigestInit_ex");
  345. return wolfSSL_EVP_DigestInit(ctx, type);
  346. }
  347. #ifdef DEBUG_WOLFSSL_EVP
  348. #define PRINT_BUF(b, sz) { int _i; for(_i=0; _i<(sz); _i++) { \
  349. printf("%02x(%c),", (b)[_i], (b)[_i]); if ((_i+1)%8==0)printf("\n");}}
  350. #else
  351. #define PRINT_BUF(b, sz)
  352. #endif
  353. static int fillBuff(WOLFSSL_EVP_CIPHER_CTX *ctx, const unsigned char *in, int sz)
  354. {
  355. int fill;
  356. if (sz > 0) {
  357. if ((sz+ctx->bufUsed) > ctx->block_size) {
  358. fill = ctx->block_size - ctx->bufUsed;
  359. } else {
  360. fill = sz;
  361. }
  362. XMEMCPY(&(ctx->buf[ctx->bufUsed]), in, fill);
  363. ctx->bufUsed += fill;
  364. return fill;
  365. } else return 0;
  366. }
  367. static int evpCipherBlock(WOLFSSL_EVP_CIPHER_CTX *ctx,
  368. unsigned char *out,
  369. const unsigned char *in, int inl)
  370. {
  371. int ret = 0;
  372. switch (ctx->cipherType) {
  373. #if !defined(NO_AES)
  374. #if defined(HAVE_AES_CBC)
  375. case AES_128_CBC_TYPE:
  376. case AES_192_CBC_TYPE:
  377. case AES_256_CBC_TYPE:
  378. if (ctx->enc)
  379. ret = wc_AesCbcEncrypt(&ctx->cipher.aes, out, in, inl);
  380. else
  381. ret = wc_AesCbcDecrypt(&ctx->cipher.aes, out, in, inl);
  382. break;
  383. #endif
  384. #if defined(WOLFSSL_AES_COUNTER)
  385. case AES_128_CTR_TYPE:
  386. case AES_192_CTR_TYPE:
  387. case AES_256_CTR_TYPE:
  388. ret = wc_AesCtrEncrypt(&ctx->cipher.aes, out, in, inl);
  389. break;
  390. #endif
  391. #if defined(HAVE_AES_ECB)
  392. case AES_128_ECB_TYPE:
  393. case AES_192_ECB_TYPE:
  394. case AES_256_ECB_TYPE:
  395. if (ctx->enc)
  396. ret = wc_AesEcbEncrypt(&ctx->cipher.aes, out, in, inl);
  397. else
  398. ret = wc_AesEcbDecrypt(&ctx->cipher.aes, out, in, inl);
  399. break;
  400. #endif
  401. #if defined(WOLFSSL_AES_OFB)
  402. case AES_128_OFB_TYPE:
  403. case AES_192_OFB_TYPE:
  404. case AES_256_OFB_TYPE:
  405. if (ctx->enc)
  406. ret = wc_AesOfbEncrypt(&ctx->cipher.aes, out, in, inl);
  407. else
  408. ret = wc_AesOfbDecrypt(&ctx->cipher.aes, out, in, inl);
  409. break;
  410. #endif
  411. #if defined(WOLFSSL_AES_CFB)
  412. #if !defined(HAVE_SELFTEST) && !defined(HAVE_FIPS)
  413. case AES_128_CFB1_TYPE:
  414. case AES_192_CFB1_TYPE:
  415. case AES_256_CFB1_TYPE:
  416. if (ctx->enc)
  417. ret = wc_AesCfb1Encrypt(&ctx->cipher.aes, out, in,
  418. inl * WOLFSSL_BIT_SIZE);
  419. else
  420. ret = wc_AesCfb1Decrypt(&ctx->cipher.aes, out, in,
  421. inl * WOLFSSL_BIT_SIZE);
  422. break;
  423. case AES_128_CFB8_TYPE:
  424. case AES_192_CFB8_TYPE:
  425. case AES_256_CFB8_TYPE:
  426. if (ctx->enc)
  427. ret = wc_AesCfb8Encrypt(&ctx->cipher.aes, out, in, inl);
  428. else
  429. ret = wc_AesCfb8Decrypt(&ctx->cipher.aes, out, in, inl);
  430. break;
  431. #endif /* !HAVE_SELFTEST && !HAVE_FIPS */
  432. case AES_128_CFB128_TYPE:
  433. case AES_192_CFB128_TYPE:
  434. case AES_256_CFB128_TYPE:
  435. if (ctx->enc)
  436. ret = wc_AesCfbEncrypt(&ctx->cipher.aes, out, in, inl);
  437. else
  438. ret = wc_AesCfbDecrypt(&ctx->cipher.aes, out, in, inl);
  439. break;
  440. #endif
  441. #if defined(WOLFSSL_AES_XTS)
  442. case AES_128_XTS_TYPE:
  443. case AES_256_XTS_TYPE:
  444. if (ctx->enc)
  445. ret = wc_AesXtsEncrypt(&ctx->cipher.xts, out, in, inl,
  446. ctx->iv, ctx->ivSz);
  447. else
  448. ret = wc_AesXtsDecrypt(&ctx->cipher.xts, out, in, inl,
  449. ctx->iv, ctx->ivSz);
  450. break;
  451. #endif
  452. #endif /* !NO_AES */
  453. #ifndef NO_DES3
  454. case DES_CBC_TYPE:
  455. if (ctx->enc)
  456. ret = wc_Des_CbcEncrypt(&ctx->cipher.des, out, in, inl);
  457. else
  458. ret = wc_Des_CbcDecrypt(&ctx->cipher.des, out, in, inl);
  459. break;
  460. case DES_EDE3_CBC_TYPE:
  461. if (ctx->enc)
  462. ret = wc_Des3_CbcEncrypt(&ctx->cipher.des3, out, in, inl);
  463. else
  464. ret = wc_Des3_CbcDecrypt(&ctx->cipher.des3, out, in, inl);
  465. break;
  466. #if defined(WOLFSSL_DES_ECB)
  467. case DES_ECB_TYPE:
  468. ret = wc_Des_EcbEncrypt(&ctx->cipher.des, out, in, inl);
  469. break;
  470. case DES_EDE3_ECB_TYPE:
  471. ret = wc_Des3_EcbEncrypt(&ctx->cipher.des3, out, in, inl);
  472. break;
  473. #endif
  474. #endif
  475. #ifndef NO_RC4
  476. case ARC4_TYPE:
  477. wc_Arc4Process(&ctx->cipher.arc4, out, in, inl);
  478. break;
  479. #endif
  480. default:
  481. return WOLFSSL_FAILURE;
  482. }
  483. if (ret != 0)
  484. return WOLFSSL_FAILURE; /* failure */
  485. (void)in;
  486. (void)inl;
  487. (void)out;
  488. return WOLFSSL_SUCCESS; /* success */
  489. }
  490. #if defined(HAVE_AESGCM)
  491. static int wolfSSL_EVP_CipherUpdate_GCM(WOLFSSL_EVP_CIPHER_CTX *ctx,
  492. unsigned char *out, int *outl,
  493. const unsigned char *in, int inl)
  494. {
  495. int ret = 0;
  496. *outl = inl;
  497. if (ctx->enc) {
  498. if (out) {
  499. /* encrypt confidential data*/
  500. ret = wc_AesGcmEncrypt(&ctx->cipher.aes, out, in, inl,
  501. ctx->iv, ctx->ivSz, ctx->authTag, ctx->authTagSz,
  502. NULL, 0);
  503. }
  504. else {
  505. /* authenticated, non-confidential data */
  506. XMEMSET(ctx->authTag, 0, ctx->authTagSz);
  507. ret = wc_AesGcmEncrypt(&ctx->cipher.aes, NULL, NULL, 0,
  508. ctx->iv, ctx->ivSz, ctx->authTag, ctx->authTagSz,
  509. in, inl);
  510. /* Reset partial authTag error for AAD*/
  511. if (ret == AES_GCM_AUTH_E)
  512. ret = 0;
  513. }
  514. }
  515. else {
  516. if (out) {
  517. byte* tmp;
  518. tmp = (byte*)XREALLOC(ctx->gcmDecryptBuffer,
  519. ctx->gcmDecryptBufferLen + inl, NULL,
  520. DYNAMIC_TYPE_OPENSSL);
  521. if (tmp) {
  522. XMEMCPY(tmp + ctx->gcmDecryptBufferLen, in, inl);
  523. ctx->gcmDecryptBufferLen += inl;
  524. ctx->gcmDecryptBuffer = tmp;
  525. *outl = 0;
  526. }
  527. else {
  528. ret = WOLFSSL_FAILURE;
  529. }
  530. }
  531. else {
  532. /* authenticated, non-confidential data*/
  533. ret = wc_AesGcmDecrypt(&ctx->cipher.aes, NULL, NULL, 0,
  534. ctx->iv, ctx->ivSz,
  535. ctx->authTag, ctx->authTagSz,
  536. in, inl);
  537. /* Reset partial authTag error for AAD*/
  538. if (ret == AES_GCM_AUTH_E)
  539. ret = 0;
  540. }
  541. }
  542. if (ret != 0) {
  543. *outl = 0;
  544. return WOLFSSL_FAILURE;
  545. }
  546. return WOLFSSL_SUCCESS;
  547. }
  548. #endif
  549. /* returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on failure */
  550. WOLFSSL_API int wolfSSL_EVP_CipherUpdate(WOLFSSL_EVP_CIPHER_CTX *ctx,
  551. unsigned char *out, int *outl,
  552. const unsigned char *in, int inl)
  553. {
  554. int blocks;
  555. int fill;
  556. WOLFSSL_ENTER("wolfSSL_EVP_CipherUpdate");
  557. if ((ctx == NULL) || (inl < 0) || (outl == NULL)|| (in == NULL)) {
  558. WOLFSSL_MSG("Bad argument");
  559. return WOLFSSL_FAILURE;
  560. }
  561. *outl = 0;
  562. if (inl == 0) {
  563. return WOLFSSL_SUCCESS;
  564. }
  565. #if !defined(NO_AES) && defined(HAVE_AESGCM)
  566. switch (ctx->cipherType) {
  567. case AES_128_GCM_TYPE:
  568. case AES_192_GCM_TYPE:
  569. case AES_256_GCM_TYPE:
  570. /* if out == NULL, in/inl contains the additional authenticated data for GCM */
  571. return wolfSSL_EVP_CipherUpdate_GCM(ctx, out, outl, in, inl);
  572. default:
  573. /* fall-through */
  574. break;
  575. }
  576. #endif /* !defined(NO_AES) && defined(HAVE_AESGCM) */
  577. if (out == NULL) {
  578. return WOLFSSL_FAILURE;
  579. }
  580. if (ctx->bufUsed > 0) { /* concatenate them if there is anything */
  581. fill = fillBuff(ctx, in, inl);
  582. inl -= fill;
  583. in += fill;
  584. }
  585. /* check if the buff is full, and if so flash it out */
  586. if (ctx->bufUsed == ctx->block_size) {
  587. byte* output = out;
  588. /* During decryption we save the last block to check padding on Final.
  589. * Update the last block stored if one has already been stored */
  590. if (ctx->enc == 0) {
  591. if (ctx->lastUsed == 1) {
  592. XMEMCPY(out, ctx->lastBlock, ctx->block_size);
  593. *outl+= ctx->block_size;
  594. out += ctx->block_size;
  595. }
  596. output = ctx->lastBlock; /* redirect output to last block buffer */
  597. ctx->lastUsed = 1;
  598. }
  599. PRINT_BUF(ctx->buf, ctx->block_size);
  600. if (evpCipherBlock(ctx, output, ctx->buf, ctx->block_size) == 0) {
  601. return WOLFSSL_FAILURE;
  602. }
  603. PRINT_BUF(out, ctx->block_size);
  604. ctx->bufUsed = 0;
  605. /* if doing encryption update the new output block, decryption will
  606. * always have the last block saved for when Final is called */
  607. if ((ctx->enc != 0)) {
  608. *outl+= ctx->block_size;
  609. out += ctx->block_size;
  610. }
  611. }
  612. blocks = inl / ctx->block_size;
  613. if (blocks > 0) {
  614. /* During decryption we save the last block to check padding on Final.
  615. * Update the last block stored if one has already been stored */
  616. if ((ctx->enc == 0) && (ctx->lastUsed == 1)) {
  617. PRINT_BUF(ctx->lastBlock, ctx->block_size);
  618. XMEMCPY(out, ctx->lastBlock, ctx->block_size);
  619. *outl += ctx->block_size;
  620. out += ctx->block_size;
  621. ctx->lastUsed = 0;
  622. }
  623. /* process blocks */
  624. if (evpCipherBlock(ctx, out, in, blocks * ctx->block_size) == 0) {
  625. return WOLFSSL_FAILURE;
  626. }
  627. PRINT_BUF(in, ctx->block_size*blocks);
  628. PRINT_BUF(out,ctx->block_size*blocks);
  629. inl -= ctx->block_size * blocks;
  630. in += ctx->block_size * blocks;
  631. if (ctx->enc == 0) {
  632. if ((ctx->flags & WOLFSSL_EVP_CIPH_NO_PADDING) ||
  633. (ctx->block_size == 1)) {
  634. ctx->lastUsed = 0;
  635. *outl += ctx->block_size * blocks;
  636. } else {
  637. /* in the case of decryption and padding, store the last block
  638. * here in order to verify the padding when Final is called */
  639. if (inl == 0) { /* if not 0 then we know leftovers are checked*/
  640. ctx->lastUsed = 1;
  641. blocks = blocks - 1; /* save last block to check padding in
  642. * EVP_CipherFinal call */
  643. XMEMCPY(ctx->lastBlock, &out[ctx->block_size * blocks],
  644. ctx->block_size);
  645. }
  646. *outl += ctx->block_size * blocks;
  647. }
  648. } else {
  649. *outl += ctx->block_size * blocks;
  650. }
  651. }
  652. if (inl > 0) {
  653. /* put fraction into buff */
  654. fillBuff(ctx, in, inl);
  655. /* no increase of outl */
  656. }
  657. (void)out; /* silence warning in case not read */
  658. return WOLFSSL_SUCCESS;
  659. }
  660. static void padBlock(WOLFSSL_EVP_CIPHER_CTX *ctx)
  661. {
  662. int i;
  663. for (i = ctx->bufUsed; i < ctx->block_size; i++)
  664. ctx->buf[i] = (byte)(ctx->block_size - ctx->bufUsed);
  665. }
  666. static int checkPad(WOLFSSL_EVP_CIPHER_CTX *ctx, unsigned char *buff)
  667. {
  668. int i;
  669. int n;
  670. n = buff[ctx->block_size-1];
  671. if (n > ctx->block_size) return -1;
  672. for (i = 0; i < n; i++) {
  673. if (buff[ctx->block_size-i-1] != n)
  674. return -1;
  675. }
  676. return ctx->block_size - n;
  677. }
  678. int wolfSSL_EVP_CipherFinal(WOLFSSL_EVP_CIPHER_CTX *ctx,
  679. unsigned char *out, int *outl)
  680. {
  681. int fl;
  682. int ret = WOLFSSL_SUCCESS;
  683. if (!ctx || !outl)
  684. return WOLFSSL_FAILURE;
  685. WOLFSSL_ENTER("wolfSSL_EVP_CipherFinal");
  686. switch (ctx->cipherType) {
  687. #if !defined(NO_AES) && defined(HAVE_AESGCM)
  688. case AES_128_GCM_TYPE:
  689. case AES_192_GCM_TYPE:
  690. case AES_256_GCM_TYPE:
  691. if (!ctx->enc && ctx->gcmDecryptBuffer &&
  692. ctx->gcmDecryptBufferLen > 0) {
  693. /* decrypt confidential data*/
  694. ret = wc_AesGcmDecrypt(&ctx->cipher.aes, out,
  695. ctx->gcmDecryptBuffer, ctx->gcmDecryptBufferLen,
  696. ctx->iv, ctx->ivSz, ctx->authTag, ctx->authTagSz,
  697. NULL, 0);
  698. if (ret == 0) {
  699. ret = WOLFSSL_SUCCESS;
  700. *outl = ctx->gcmDecryptBufferLen;
  701. }
  702. else {
  703. ret = WOLFSSL_FAILURE;
  704. *outl = 0;
  705. }
  706. XFREE(ctx->gcmDecryptBuffer, NULL, DYNAMIC_TYPE_OPENSSL);
  707. ctx->gcmDecryptBuffer = NULL;
  708. ctx->gcmDecryptBufferLen = 0;
  709. }
  710. else {
  711. *outl = 0;
  712. }
  713. /* Clear IV, since IV reuse is not recommended for AES GCM. */
  714. XMEMSET(ctx->iv, 0, AES_BLOCK_SIZE);
  715. break;
  716. #endif /* !NO_AES && HAVE_AESGCM */
  717. default:
  718. if (!out)
  719. return WOLFSSL_FAILURE;
  720. if (ctx->flags & WOLFSSL_EVP_CIPH_NO_PADDING) {
  721. if (ctx->bufUsed != 0) return WOLFSSL_FAILURE;
  722. *outl = 0;
  723. }
  724. else if (ctx->enc) {
  725. if (ctx->block_size == 1) {
  726. *outl = 0;
  727. }
  728. else if ((ctx->bufUsed >= 0) && (ctx->block_size != 1)) {
  729. padBlock(ctx);
  730. PRINT_BUF(ctx->buf, ctx->block_size);
  731. if (evpCipherBlock(ctx, out, ctx->buf, ctx->block_size) == 0) {
  732. WOLFSSL_MSG("Final Cipher Block failed");
  733. ret = WOLFSSL_FAILURE;
  734. }
  735. else {
  736. PRINT_BUF(out, ctx->block_size);
  737. *outl = ctx->block_size;
  738. }
  739. }
  740. }
  741. else {
  742. if (ctx->block_size == 1) {
  743. *outl = 0;
  744. }
  745. else if ((ctx->bufUsed % ctx->block_size) != 0) {
  746. *outl = 0;
  747. /* not enough padding for decrypt */
  748. WOLFSSL_MSG("Final Cipher Block not enough padding");
  749. ret = WOLFSSL_FAILURE;
  750. }
  751. else if (ctx->lastUsed) {
  752. PRINT_BUF(ctx->lastBlock, ctx->block_size);
  753. if ((fl = checkPad(ctx, ctx->lastBlock)) >= 0) {
  754. XMEMCPY(out, ctx->lastBlock, fl);
  755. *outl = fl;
  756. if (ctx->lastUsed == 0 && ctx->bufUsed == 0) {
  757. /* return error in cases where the block length is
  758. * incorrect */
  759. WOLFSSL_MSG("Final Cipher Block bad length");
  760. ret = WOLFSSL_FAILURE;
  761. }
  762. }
  763. else {
  764. ret = WOLFSSL_FAILURE;
  765. }
  766. }
  767. else if (ctx->lastUsed == 0 && ctx->bufUsed == 0) {
  768. /* return error in cases where the block length is
  769. * incorrect */
  770. ret = WOLFSSL_FAILURE;
  771. }
  772. }
  773. break;
  774. }
  775. if (ret == WOLFSSL_SUCCESS) {
  776. /* reset cipher state after final */
  777. ret = wolfSSL_EVP_CipherInit(ctx, NULL, NULL, NULL, -1);
  778. }
  779. return ret;
  780. }
  781. #ifdef WOLFSSL_EVP_DECRYPT_LEGACY
  782. /* This is a version of DecryptFinal to work with data encrypted with
  783. * wolfSSL_EVP_EncryptFinal() with the broken padding. (pre-v3.12.0)
  784. * Only call this after wolfSSL_EVP_CipherFinal() fails on a decrypt.
  785. * Note, you don't know if the padding is good or bad with the old
  786. * encrypt, but it is likely to be or bad. It will update the output
  787. * length with the block_size so the last block is still captured. */
  788. WOLFSSL_API int wolfSSL_EVP_DecryptFinal_legacy(WOLFSSL_EVP_CIPHER_CTX *ctx,
  789. unsigned char *out, int *outl)
  790. {
  791. int fl;
  792. if (ctx == NULL || out == NULL || outl == NULL)
  793. return BAD_FUNC_ARG;
  794. WOLFSSL_ENTER("wolfSSL_EVP_DecryptFinal_legacy");
  795. if (ctx->block_size == 1) {
  796. *outl = 0;
  797. return WOLFSSL_SUCCESS;
  798. }
  799. if ((ctx->bufUsed % ctx->block_size) != 0) {
  800. *outl = 0;
  801. /* not enough padding for decrypt */
  802. return WOLFSSL_FAILURE;
  803. }
  804. /* The original behavior of CipherFinal() was like it is now,
  805. * but checkPad would return 0 in case of a bad pad. It would
  806. * treat the pad as 0, and leave the data in the output buffer,
  807. * and not try to copy anything. This converts checkPad's -1 error
  808. * code to block_size.
  809. */
  810. if (ctx->lastUsed) {
  811. PRINT_BUF(ctx->lastBlock, ctx->block_size);
  812. if ((fl = checkPad(ctx, ctx->lastBlock)) < 0) {
  813. fl = ctx->block_size;
  814. }
  815. else {
  816. XMEMCPY(out, ctx->lastBlock, fl);
  817. }
  818. *outl = fl;
  819. }
  820. /* return error in cases where the block length is incorrect */
  821. if (ctx->lastUsed == 0 && ctx->bufUsed == 0) {
  822. return WOLFSSL_FAILURE;
  823. }
  824. return WOLFSSL_SUCCESS;
  825. }
  826. #endif
  827. int wolfSSL_EVP_CIPHER_CTX_block_size(const WOLFSSL_EVP_CIPHER_CTX *ctx)
  828. {
  829. if (ctx == NULL) return BAD_FUNC_ARG;
  830. switch (ctx->cipherType) {
  831. #if !defined(NO_AES) || !defined(NO_DES3)
  832. #if !defined(NO_AES)
  833. #if defined(HAVE_AES_CBC)
  834. case AES_128_CBC_TYPE:
  835. case AES_192_CBC_TYPE:
  836. case AES_256_CBC_TYPE:
  837. #endif
  838. #if defined(HAVE_AESGCM)
  839. case AES_128_GCM_TYPE:
  840. case AES_192_GCM_TYPE:
  841. case AES_256_GCM_TYPE:
  842. #endif
  843. #if defined(WOLFSSL_AES_COUNTER)
  844. case AES_128_CTR_TYPE:
  845. case AES_192_CTR_TYPE:
  846. case AES_256_CTR_TYPE:
  847. #endif
  848. #if defined(WOLFSSL_AES_CFB)
  849. case AES_128_CFB1_TYPE:
  850. case AES_192_CFB1_TYPE:
  851. case AES_256_CFB1_TYPE:
  852. case AES_128_CFB8_TYPE:
  853. case AES_192_CFB8_TYPE:
  854. case AES_256_CFB8_TYPE:
  855. case AES_128_CFB128_TYPE:
  856. case AES_192_CFB128_TYPE:
  857. case AES_256_CFB128_TYPE:
  858. #endif
  859. #if defined(WOLFSSL_AES_OFB)
  860. case AES_128_OFB_TYPE:
  861. case AES_192_OFB_TYPE:
  862. case AES_256_OFB_TYPE:
  863. #endif
  864. #if defined(WOLFSSL_AES_XTS)
  865. case AES_128_XTS_TYPE:
  866. case AES_256_XTS_TYPE:
  867. #endif
  868. case AES_128_ECB_TYPE:
  869. case AES_192_ECB_TYPE:
  870. case AES_256_ECB_TYPE:
  871. #endif /* !NO_AES */
  872. #ifndef NO_DES3
  873. case DES_CBC_TYPE:
  874. case DES_ECB_TYPE:
  875. case DES_EDE3_CBC_TYPE:
  876. case DES_EDE3_ECB_TYPE:
  877. #endif
  878. return ctx->block_size;
  879. #endif /* !NO_AES || !NO_DES3 */
  880. default:
  881. return 0;
  882. }
  883. }
  884. static unsigned int cipherType(const WOLFSSL_EVP_CIPHER *cipher)
  885. {
  886. if (cipher == NULL) return 0; /* dummy for #ifdef */
  887. #ifndef NO_DES3
  888. else if (EVP_DES_CBC && XSTRNCMP(cipher, EVP_DES_CBC, EVP_DES_SIZE) == 0)
  889. return DES_CBC_TYPE;
  890. else if (EVP_DES_EDE3_CBC && XSTRNCMP(cipher, EVP_DES_EDE3_CBC, EVP_DES_EDE3_SIZE) == 0)
  891. return DES_EDE3_CBC_TYPE;
  892. #if !defined(NO_DES3)
  893. else if (EVP_DES_ECB && XSTRNCMP(cipher, EVP_DES_ECB, EVP_DES_SIZE) == 0)
  894. return DES_ECB_TYPE;
  895. else if (EVP_DES_EDE3_ECB && XSTRNCMP(cipher, EVP_DES_EDE3_ECB, EVP_DES_EDE3_SIZE) == 0)
  896. return DES_EDE3_ECB_TYPE;
  897. #endif /* NO_DES3 && HAVE_AES_ECB */
  898. #endif
  899. #if !defined(NO_AES)
  900. #if defined(HAVE_AES_CBC)
  901. #ifdef WOLFSSL_AES_128
  902. else if (EVP_AES_128_CBC && XSTRNCMP(cipher, EVP_AES_128_CBC, EVP_AES_SIZE) == 0)
  903. return AES_128_CBC_TYPE;
  904. #endif
  905. #ifdef WOLFSSL_AES_192
  906. else if (EVP_AES_192_CBC && XSTRNCMP(cipher, EVP_AES_192_CBC, EVP_AES_SIZE) == 0)
  907. return AES_192_CBC_TYPE;
  908. #endif
  909. #ifdef WOLFSSL_AES_256
  910. else if (EVP_AES_256_CBC && XSTRNCMP(cipher, EVP_AES_256_CBC, EVP_AES_SIZE) == 0)
  911. return AES_256_CBC_TYPE;
  912. #endif
  913. #endif /* HAVE_AES_CBC */
  914. #if defined(HAVE_AESGCM)
  915. #ifdef WOLFSSL_AES_128
  916. else if (EVP_AES_128_GCM && XSTRNCMP(cipher, EVP_AES_128_GCM, EVP_AES_SIZE) == 0)
  917. return AES_128_GCM_TYPE;
  918. #endif
  919. #ifdef WOLFSSL_AES_192
  920. else if (EVP_AES_192_GCM && XSTRNCMP(cipher, EVP_AES_192_GCM, EVP_AES_SIZE) == 0)
  921. return AES_192_GCM_TYPE;
  922. #endif
  923. #ifdef WOLFSSL_AES_256
  924. else if (EVP_AES_256_GCM && XSTRNCMP(cipher, EVP_AES_256_GCM, EVP_AES_SIZE) == 0)
  925. return AES_256_GCM_TYPE;
  926. #endif
  927. #endif /* HAVE_AESGCM */
  928. #if defined(WOLFSSL_AES_COUNTER)
  929. #ifdef WOLFSSL_AES_128
  930. else if (EVP_AES_128_CTR && XSTRNCMP(cipher, EVP_AES_128_CTR, EVP_AES_SIZE) == 0)
  931. return AES_128_CTR_TYPE;
  932. #endif
  933. #ifdef WOLFSSL_AES_192
  934. else if (EVP_AES_192_CTR && XSTRNCMP(cipher, EVP_AES_192_CTR, EVP_AES_SIZE) == 0)
  935. return AES_192_CTR_TYPE;
  936. #endif
  937. #ifdef WOLFSSL_AES_256
  938. else if (EVP_AES_256_CTR && XSTRNCMP(cipher, EVP_AES_256_CTR, EVP_AES_SIZE) == 0)
  939. return AES_256_CTR_TYPE;
  940. #endif
  941. #endif /* HAVE_AES_CBC */
  942. #if defined(HAVE_AES_ECB)
  943. #ifdef WOLFSSL_AES_128
  944. else if (EVP_AES_128_ECB && XSTRNCMP(cipher, EVP_AES_128_ECB, EVP_AES_SIZE) == 0)
  945. return AES_128_ECB_TYPE;
  946. #endif
  947. #ifdef WOLFSSL_AES_192
  948. else if (EVP_AES_192_ECB && XSTRNCMP(cipher, EVP_AES_192_ECB, EVP_AES_SIZE) == 0)
  949. return AES_192_ECB_TYPE;
  950. #endif
  951. #ifdef WOLFSSL_AES_256
  952. else if (EVP_AES_256_ECB && XSTRNCMP(cipher, EVP_AES_256_ECB, EVP_AES_SIZE) == 0)
  953. return AES_256_ECB_TYPE;
  954. #endif
  955. #endif /*HAVE_AES_CBC */
  956. #if defined(WOLFSSL_AES_XTS)
  957. #ifdef WOLFSSL_AES_128
  958. else if (EVP_AES_128_XTS && XSTRNCMP(cipher, EVP_AES_128_XTS, EVP_AES_SIZE) == 0)
  959. return AES_128_XTS_TYPE;
  960. #endif
  961. #ifdef WOLFSSL_AES_256
  962. else if (EVP_AES_256_XTS && XSTRNCMP(cipher, EVP_AES_256_XTS, EVP_AES_SIZE) == 0)
  963. return AES_256_XTS_TYPE;
  964. #endif
  965. #endif /* WOLFSSL_AES_XTS */
  966. #if defined(WOLFSSL_AES_CFB)
  967. #ifdef WOLFSSL_AES_128
  968. else if (EVP_AES_128_CFB1 && XSTRNCMP(cipher, EVP_AES_128_CFB1, EVP_AESCFB_SIZE) == 0)
  969. return AES_128_CFB1_TYPE;
  970. #endif
  971. #ifdef WOLFSSL_AES_192
  972. else if (EVP_AES_192_CFB1 && XSTRNCMP(cipher, EVP_AES_192_CFB1, EVP_AESCFB_SIZE) == 0)
  973. return AES_192_CFB1_TYPE;
  974. #endif
  975. #ifdef WOLFSSL_AES_256
  976. else if (EVP_AES_256_CFB1 && XSTRNCMP(cipher, EVP_AES_256_CFB1, EVP_AESCFB_SIZE) == 0)
  977. return AES_256_CFB1_TYPE;
  978. #endif
  979. #ifdef WOLFSSL_AES_128
  980. else if (EVP_AES_128_CFB8 && XSTRNCMP(cipher, EVP_AES_128_CFB8, EVP_AESCFB_SIZE) == 0)
  981. return AES_128_CFB8_TYPE;
  982. #endif
  983. #ifdef WOLFSSL_AES_192
  984. else if (EVP_AES_192_CFB8 && XSTRNCMP(cipher, EVP_AES_192_CFB8, EVP_AESCFB_SIZE) == 0)
  985. return AES_192_CFB8_TYPE;
  986. #endif
  987. #ifdef WOLFSSL_AES_256
  988. else if (EVP_AES_256_CFB8 && XSTRNCMP(cipher, EVP_AES_256_CFB8, EVP_AESCFB_SIZE) == 0)
  989. return AES_256_CFB8_TYPE;
  990. #endif
  991. #ifdef WOLFSSL_AES_128
  992. else if (EVP_AES_128_CFB128 && XSTRNCMP(cipher, EVP_AES_128_CFB128, EVP_AESCFB_SIZE) == 0)
  993. return AES_128_CFB128_TYPE;
  994. #endif
  995. #ifdef WOLFSSL_AES_192
  996. else if (EVP_AES_192_CFB128 && XSTRNCMP(cipher, EVP_AES_192_CFB128, EVP_AESCFB_SIZE) == 0)
  997. return AES_192_CFB128_TYPE;
  998. #endif
  999. #ifdef WOLFSSL_AES_256
  1000. else if (EVP_AES_256_CFB128 && XSTRNCMP(cipher, EVP_AES_256_CFB128, EVP_AESCFB_SIZE) == 0)
  1001. return AES_256_CFB128_TYPE;
  1002. #endif
  1003. #endif /*HAVE_AES_CBC */
  1004. #endif /* !NO_AES */
  1005. else return 0;
  1006. }
  1007. int wolfSSL_EVP_CIPHER_block_size(const WOLFSSL_EVP_CIPHER *cipher)
  1008. {
  1009. if (cipher == NULL) return BAD_FUNC_ARG;
  1010. switch (cipherType(cipher)) {
  1011. #if !defined(NO_AES)
  1012. #if defined(HAVE_AES_CBC)
  1013. case AES_128_CBC_TYPE:
  1014. case AES_192_CBC_TYPE:
  1015. case AES_256_CBC_TYPE:
  1016. return AES_BLOCK_SIZE;
  1017. #endif
  1018. #if defined(HAVE_AESGCM)
  1019. case AES_128_GCM_TYPE:
  1020. case AES_192_GCM_TYPE:
  1021. case AES_256_GCM_TYPE:
  1022. return AES_BLOCK_SIZE;
  1023. #endif
  1024. #if defined(WOLFSSL_AES_COUNTER)
  1025. case AES_128_CTR_TYPE:
  1026. case AES_192_CTR_TYPE:
  1027. case AES_256_CTR_TYPE:
  1028. return AES_BLOCK_SIZE;
  1029. #endif
  1030. #if defined(HAVE_AES_ECB)
  1031. case AES_128_ECB_TYPE:
  1032. case AES_192_ECB_TYPE:
  1033. case AES_256_ECB_TYPE:
  1034. return AES_BLOCK_SIZE;
  1035. #endif
  1036. #endif /* NO_AES */
  1037. #ifndef NO_DES3
  1038. case DES_CBC_TYPE: return 8;
  1039. case DES_EDE3_CBC_TYPE: return 8;
  1040. case DES_ECB_TYPE: return 8;
  1041. case DES_EDE3_ECB_TYPE: return 8;
  1042. #endif
  1043. default:
  1044. return 0;
  1045. }
  1046. }
  1047. unsigned long WOLFSSL_CIPHER_mode(const WOLFSSL_EVP_CIPHER *cipher)
  1048. {
  1049. switch (cipherType(cipher)) {
  1050. #if !defined(NO_AES)
  1051. #if defined(HAVE_AES_CBC)
  1052. case AES_128_CBC_TYPE:
  1053. case AES_192_CBC_TYPE:
  1054. case AES_256_CBC_TYPE:
  1055. return WOLFSSL_EVP_CIPH_CBC_MODE;
  1056. #endif
  1057. #if defined(HAVE_AESGCM)
  1058. case AES_128_GCM_TYPE:
  1059. case AES_192_GCM_TYPE:
  1060. case AES_256_GCM_TYPE:
  1061. return WOLFSSL_EVP_CIPH_GCM_MODE;
  1062. #endif
  1063. #if defined(WOLFSSL_AES_COUNTER)
  1064. case AES_128_CTR_TYPE:
  1065. case AES_192_CTR_TYPE:
  1066. case AES_256_CTR_TYPE:
  1067. return WOLFSSL_EVP_CIPH_CTR_MODE;
  1068. #endif
  1069. case AES_128_ECB_TYPE:
  1070. case AES_192_ECB_TYPE:
  1071. case AES_256_ECB_TYPE:
  1072. return WOLFSSL_EVP_CIPH_ECB_MODE;
  1073. #endif /* NO_ASE */
  1074. #ifndef NO_DES3
  1075. case DES_CBC_TYPE:
  1076. case DES_EDE3_CBC_TYPE:
  1077. return WOLFSSL_EVP_CIPH_CBC_MODE;
  1078. case DES_ECB_TYPE:
  1079. case DES_EDE3_ECB_TYPE:
  1080. return WOLFSSL_EVP_CIPH_ECB_MODE;
  1081. #endif
  1082. #ifndef NO_RC4
  1083. case ARC4_TYPE:
  1084. return EVP_CIPH_STREAM_CIPHER;
  1085. #endif
  1086. default:
  1087. return 0;
  1088. }
  1089. }
  1090. unsigned long WOLFSSL_EVP_CIPHER_mode(const WOLFSSL_EVP_CIPHER *cipher)
  1091. {
  1092. if (cipher == NULL) return 0;
  1093. return WOLFSSL_CIPHER_mode(cipher);
  1094. }
  1095. void wolfSSL_EVP_CIPHER_CTX_set_flags(WOLFSSL_EVP_CIPHER_CTX *ctx, int flags)
  1096. {
  1097. if (ctx != NULL) {
  1098. ctx->flags |= flags;
  1099. }
  1100. }
  1101. void wolfSSL_EVP_CIPHER_CTX_clear_flags(WOLFSSL_EVP_CIPHER_CTX *ctx, int flags)
  1102. {
  1103. if (ctx != NULL) {
  1104. ctx->flags &= ~flags;
  1105. }
  1106. }
  1107. unsigned long wolfSSL_EVP_CIPHER_flags(const WOLFSSL_EVP_CIPHER *cipher)
  1108. {
  1109. if (cipher == NULL) return 0;
  1110. return WOLFSSL_CIPHER_mode(cipher);
  1111. }
  1112. int wolfSSL_EVP_CIPHER_CTX_set_padding(WOLFSSL_EVP_CIPHER_CTX *ctx, int padding)
  1113. {
  1114. if (ctx == NULL) return BAD_FUNC_ARG;
  1115. if (padding) {
  1116. ctx->flags &= ~WOLFSSL_EVP_CIPH_NO_PADDING;
  1117. }
  1118. else {
  1119. ctx->flags |= WOLFSSL_EVP_CIPH_NO_PADDING;
  1120. }
  1121. return 1;
  1122. }
  1123. int wolfSSL_EVP_add_digest(const WOLFSSL_EVP_MD *digest)
  1124. {
  1125. (void)digest;
  1126. /* nothing to do */
  1127. return 0;
  1128. }
  1129. /* Frees the WOLFSSL_EVP_PKEY_CTX passed in.
  1130. *
  1131. * return WOLFSSL_SUCCESS on success
  1132. */
  1133. int wolfSSL_EVP_PKEY_CTX_free(WOLFSSL_EVP_PKEY_CTX *ctx)
  1134. {
  1135. if (ctx == NULL) return 0;
  1136. WOLFSSL_ENTER("EVP_PKEY_CTX_free");
  1137. if (ctx->pkey != NULL)
  1138. wolfSSL_EVP_PKEY_free(ctx->pkey);
  1139. if (ctx->peerKey != NULL)
  1140. wolfSSL_EVP_PKEY_free(ctx->peerKey);
  1141. XFREE(ctx, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
  1142. return WOLFSSL_SUCCESS;
  1143. }
  1144. /* Creates a new WOLFSSL_EVP_PKEY_CTX structure.
  1145. *
  1146. * pkey key structure to use with new WOLFSSL_EVP_PEKY_CTX
  1147. * e engine to use. It should be NULL at this time.
  1148. *
  1149. * return the new structure on success and NULL if failed.
  1150. */
  1151. WOLFSSL_EVP_PKEY_CTX *wolfSSL_EVP_PKEY_CTX_new(WOLFSSL_EVP_PKEY *pkey, WOLFSSL_ENGINE *e)
  1152. {
  1153. WOLFSSL_EVP_PKEY_CTX* ctx;
  1154. int type = NID_undef;
  1155. if (pkey == NULL) return 0;
  1156. if (e != NULL) return 0;
  1157. WOLFSSL_ENTER("EVP_PKEY_CTX_new");
  1158. ctx = (WOLFSSL_EVP_PKEY_CTX*)XMALLOC(sizeof(WOLFSSL_EVP_PKEY_CTX), NULL,
  1159. DYNAMIC_TYPE_PUBLIC_KEY);
  1160. if (ctx == NULL) return NULL;
  1161. XMEMSET(ctx, 0, sizeof(WOLFSSL_EVP_PKEY_CTX));
  1162. ctx->pkey = pkey;
  1163. #if !defined(NO_RSA) && !defined(HAVE_USER_RSA)
  1164. ctx->padding = RSA_PKCS1_PADDING;
  1165. #endif
  1166. type = wolfSSL_EVP_PKEY_type(pkey->type);
  1167. if (type != NID_undef) {
  1168. if (wc_LockMutex(&pkey->refMutex) != 0) {
  1169. WOLFSSL_MSG("Couldn't lock pkey mutex");
  1170. }
  1171. pkey->references++;
  1172. wc_UnLockMutex(&pkey->refMutex);
  1173. }
  1174. return ctx;
  1175. }
  1176. /* Sets the type of RSA padding to use.
  1177. *
  1178. * ctx structure to set padding in.
  1179. * padding RSA padding type
  1180. *
  1181. * returns WOLFSSL_SUCCESS on success.
  1182. */
  1183. int wolfSSL_EVP_PKEY_CTX_set_rsa_padding(WOLFSSL_EVP_PKEY_CTX *ctx, int padding)
  1184. {
  1185. if (ctx == NULL) return 0;
  1186. WOLFSSL_ENTER("EVP_PKEY_CTX_set_rsa_padding");
  1187. ctx->padding = padding;
  1188. return WOLFSSL_SUCCESS;
  1189. }
  1190. /* create a PKEY contxt and return it */
  1191. WOLFSSL_EVP_PKEY_CTX *wolfSSL_EVP_PKEY_CTX_new_id(int id, WOLFSSL_ENGINE *e)
  1192. {
  1193. WOLFSSL_EVP_PKEY* pkey;
  1194. WOLFSSL_EVP_PKEY_CTX* ctx = NULL;
  1195. WOLFSSL_ENTER("wolfSSL_EVP_PKEY_CTX_new_id");
  1196. pkey = wolfSSL_EVP_PKEY_new_ex(NULL);
  1197. if (pkey) {
  1198. pkey->type = id;
  1199. ctx = wolfSSL_EVP_PKEY_CTX_new(pkey, e);
  1200. if (ctx == NULL) {
  1201. wolfSSL_EVP_PKEY_free(pkey);
  1202. }
  1203. }
  1204. return ctx;
  1205. }
  1206. /* Returns WOLFSSL_SUCCESS or error */
  1207. int wolfSSL_EVP_PKEY_CTX_set_rsa_keygen_bits(WOLFSSL_EVP_PKEY_CTX *ctx, int bits)
  1208. {
  1209. if (ctx) {
  1210. ctx->nbits = bits;
  1211. }
  1212. return WOLFSSL_SUCCESS;
  1213. }
  1214. int wolfSSL_EVP_PKEY_derive_init(WOLFSSL_EVP_PKEY_CTX *ctx)
  1215. {
  1216. WOLFSSL_ENTER("wolfSSL_EVP_PKEY_derive_init");
  1217. if (!ctx) {
  1218. return WOLFSSL_FAILURE;
  1219. }
  1220. wolfSSL_EVP_PKEY_free(ctx->peerKey);
  1221. ctx->op = EVP_PKEY_OP_DERIVE;
  1222. ctx->padding = 0;
  1223. ctx->nbits = 0;
  1224. return WOLFSSL_SUCCESS;
  1225. }
  1226. int wolfSSL_EVP_PKEY_derive_set_peer(WOLFSSL_EVP_PKEY_CTX *ctx, WOLFSSL_EVP_PKEY *peer)
  1227. {
  1228. WOLFSSL_ENTER("wolfSSL_EVP_PKEY_derive_set_peer");
  1229. if (!ctx || ctx->op != EVP_PKEY_OP_DERIVE) {
  1230. return WOLFSSL_FAILURE;
  1231. }
  1232. wolfSSL_EVP_PKEY_free(ctx->peerKey);
  1233. ctx->peerKey = peer;
  1234. if (!wolfSSL_EVP_PKEY_up_ref(peer)) {
  1235. ctx->peerKey = NULL;
  1236. return WOLFSSL_FAILURE;
  1237. }
  1238. return WOLFSSL_SUCCESS;
  1239. }
  1240. #if !defined(NO_DH) && defined(HAVE_ECC)
  1241. #if !defined(HAVE_FIPS) || (defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION>2))
  1242. int wolfSSL_EVP_PKEY_derive(WOLFSSL_EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen)
  1243. {
  1244. int len;
  1245. WOLFSSL_ENTER("wolfSSL_EVP_PKEY_derive");
  1246. if (!ctx || ctx->op != EVP_PKEY_OP_DERIVE || !ctx->pkey || !ctx->peerKey || !keylen
  1247. || ctx->pkey->type != ctx->peerKey->type) {
  1248. return WOLFSSL_FAILURE;
  1249. }
  1250. switch (ctx->pkey->type) {
  1251. #ifndef NO_DH
  1252. case EVP_PKEY_DH:
  1253. /* Use DH */
  1254. if (!ctx->pkey->dh || !ctx->peerKey->dh || !ctx->peerKey->dh->pub_key) {
  1255. return WOLFSSL_FAILURE;
  1256. }
  1257. if ((len = wolfSSL_DH_size(ctx->pkey->dh)) <= 0) {
  1258. return WOLFSSL_FAILURE;
  1259. }
  1260. if (key) {
  1261. if (*keylen < (size_t)len) {
  1262. return WOLFSSL_FAILURE;
  1263. }
  1264. if (wolfSSL_DH_compute_key(key, ctx->peerKey->dh->pub_key,
  1265. ctx->pkey->dh) != len) {
  1266. return WOLFSSL_FAILURE;
  1267. }
  1268. }
  1269. *keylen = (size_t)len;
  1270. break;
  1271. #endif
  1272. #ifdef HAVE_ECC
  1273. case EVP_PKEY_EC:
  1274. /* Use ECDH */
  1275. if (!ctx->pkey->ecc || !ctx->peerKey->ecc) {
  1276. return WOLFSSL_FAILURE;
  1277. }
  1278. /* set internal key if not done */
  1279. if (!ctx->pkey->ecc->inSet) {
  1280. if (SetECKeyInternal(ctx->pkey->ecc) != WOLFSSL_SUCCESS) {
  1281. WOLFSSL_MSG("SetECKeyInternal failed");
  1282. return WOLFSSL_FAILURE;
  1283. }
  1284. }
  1285. if (!ctx->peerKey->ecc->exSet || !ctx->peerKey->ecc->pub_key->internal) {
  1286. if (SetECKeyExternal(ctx->peerKey->ecc) != WOLFSSL_SUCCESS) {
  1287. WOLFSSL_MSG("SetECKeyExternal failed");
  1288. return WOLFSSL_FAILURE;
  1289. }
  1290. }
  1291. if (!(len = wc_ecc_size((ecc_key*)ctx->pkey->ecc->internal))) {
  1292. return WOLFSSL_FAILURE;
  1293. }
  1294. if (key) {
  1295. word32 len32 = (word32)len;
  1296. #if defined(ECC_TIMING_RESISTANT) && !defined(HAVE_FIPS) && \
  1297. !defined(HAVE_SELFTEST)
  1298. WC_RNG rng;
  1299. if (wc_InitRng(&rng) != MP_OKAY) {
  1300. WOLFSSL_MSG("Init RNG failed");
  1301. return WOLFSSL_FAILURE;
  1302. }
  1303. ((ecc_key*)ctx->pkey->ecc->internal)->rng = &rng;
  1304. #endif
  1305. if (*keylen < len32) {
  1306. WOLFSSL_MSG("buffer too short");
  1307. #if defined(ECC_TIMING_RESISTANT) && !defined(HAVE_FIPS) && \
  1308. !defined(HAVE_SELFTEST)
  1309. ((ecc_key*)ctx->pkey->ecc->internal)->rng = NULL;
  1310. wc_FreeRng(&rng);
  1311. #endif
  1312. return WOLFSSL_FAILURE;
  1313. }
  1314. if (wc_ecc_shared_secret_ssh((ecc_key*)ctx->pkey->ecc->internal,
  1315. (ecc_point*)ctx->peerKey->ecc->pub_key->internal,
  1316. key, &len32) != MP_OKAY) {
  1317. WOLFSSL_MSG("wc_ecc_shared_secret failed");
  1318. #if defined(ECC_TIMING_RESISTANT) && !defined(HAVE_FIPS) && \
  1319. !defined(HAVE_SELFTEST)
  1320. ((ecc_key*)ctx->pkey->ecc->internal)->rng = NULL;
  1321. wc_FreeRng(&rng);
  1322. #endif
  1323. return WOLFSSL_FAILURE;
  1324. }
  1325. #if defined(ECC_TIMING_RESISTANT) && !defined(HAVE_FIPS) && \
  1326. !defined(HAVE_SELFTEST)
  1327. ((ecc_key*)ctx->pkey->ecc->internal)->rng = NULL;
  1328. wc_FreeRng(&rng);
  1329. #endif
  1330. len = (int)len32;
  1331. }
  1332. *keylen = (size_t)len;
  1333. break;
  1334. #endif
  1335. default:
  1336. WOLFSSL_MSG("Unknown key type");
  1337. return WOLFSSL_FAILURE;
  1338. }
  1339. return WOLFSSL_SUCCESS;
  1340. }
  1341. #endif /* !HAVE_FIPS || HAVE_FIPS_VERSION > 2 */
  1342. #endif
  1343. /* Uses the WOLFSSL_EVP_PKEY_CTX to decrypt a buffer.
  1344. *
  1345. * ctx structure to decrypt with
  1346. * out buffer to hold the results
  1347. * outlen initially holds size of out buffer and gets set to decrypt result size
  1348. * in buffer decrypt
  1349. * inlen length of in buffer
  1350. *
  1351. * returns WOLFSSL_SUCCESS on success.
  1352. */
  1353. int wolfSSL_EVP_PKEY_decrypt(WOLFSSL_EVP_PKEY_CTX *ctx,
  1354. unsigned char *out, size_t *outlen,
  1355. const unsigned char *in, size_t inlen)
  1356. {
  1357. int len = 0;
  1358. if (ctx == NULL) return 0;
  1359. WOLFSSL_ENTER("EVP_PKEY_decrypt");
  1360. (void)out;
  1361. (void)outlen;
  1362. (void)in;
  1363. (void)inlen;
  1364. (void)len;
  1365. switch (ctx->pkey->type) {
  1366. #if !defined(NO_RSA) && !defined(HAVE_USER_RSA)
  1367. case EVP_PKEY_RSA:
  1368. len = wolfSSL_RSA_private_decrypt((int)inlen, (unsigned char*)in, out,
  1369. ctx->pkey->rsa, ctx->padding);
  1370. if (len < 0) break;
  1371. else {
  1372. *outlen = len;
  1373. return WOLFSSL_SUCCESS;
  1374. }
  1375. #endif /* NO_RSA */
  1376. case EVP_PKEY_EC:
  1377. WOLFSSL_MSG("not implemented");
  1378. FALL_THROUGH;
  1379. default:
  1380. break;
  1381. }
  1382. return WOLFSSL_FAILURE;
  1383. }
  1384. /* Initialize a WOLFSSL_EVP_PKEY_CTX structure for decryption
  1385. *
  1386. * ctx WOLFSSL_EVP_PKEY_CTX structure to use with decryption
  1387. *
  1388. * Returns WOLFSSL_FAILURE on failure and WOLFSSL_SUCCESS on success
  1389. */
  1390. int wolfSSL_EVP_PKEY_decrypt_init(WOLFSSL_EVP_PKEY_CTX *ctx)
  1391. {
  1392. if (ctx == NULL) return WOLFSSL_FAILURE;
  1393. WOLFSSL_ENTER("EVP_PKEY_decrypt_init");
  1394. switch (ctx->pkey->type) {
  1395. case EVP_PKEY_RSA:
  1396. ctx->op = EVP_PKEY_OP_DECRYPT;
  1397. return WOLFSSL_SUCCESS;
  1398. case EVP_PKEY_EC:
  1399. WOLFSSL_MSG("not implemented");
  1400. FALL_THROUGH;
  1401. default:
  1402. break;
  1403. }
  1404. return WOLFSSL_FAILURE;
  1405. }
  1406. /* Use a WOLFSSL_EVP_PKEY_CTX structure to encrypt data
  1407. *
  1408. * ctx WOLFSSL_EVP_PKEY_CTX structure to use with encryption
  1409. * out buffer to hold encrypted data
  1410. * outlen length of out buffer
  1411. * in data to be encrypted
  1412. * inlen length of in buffer
  1413. *
  1414. * Returns WOLFSSL_FAILURE on failure and WOLFSSL_SUCCESS on success
  1415. */
  1416. int wolfSSL_EVP_PKEY_encrypt(WOLFSSL_EVP_PKEY_CTX *ctx,
  1417. unsigned char *out, size_t *outlen,
  1418. const unsigned char *in, size_t inlen)
  1419. {
  1420. int len = 0;
  1421. if (ctx == NULL) return WOLFSSL_FAILURE;
  1422. WOLFSSL_ENTER("EVP_PKEY_encrypt");
  1423. if (ctx->op != EVP_PKEY_OP_ENCRYPT) return WOLFSSL_FAILURE;
  1424. (void)out;
  1425. (void)outlen;
  1426. (void)in;
  1427. (void)inlen;
  1428. (void)len;
  1429. switch (ctx->pkey->type) {
  1430. #if !defined(NO_RSA) && !defined(HAVE_USER_RSA)
  1431. case EVP_PKEY_RSA:
  1432. len = wolfSSL_RSA_public_encrypt((int)inlen, (unsigned char *)in, out,
  1433. ctx->pkey->rsa, ctx->padding);
  1434. if (len < 0)
  1435. break;
  1436. else {
  1437. *outlen = len;
  1438. return WOLFSSL_SUCCESS;
  1439. }
  1440. #endif /* NO_RSA */
  1441. case EVP_PKEY_EC:
  1442. WOLFSSL_MSG("not implemented");
  1443. FALL_THROUGH;
  1444. default:
  1445. break;
  1446. }
  1447. return WOLFSSL_FAILURE;
  1448. }
  1449. /* Initialize a WOLFSSL_EVP_PKEY_CTX structure to encrypt data
  1450. *
  1451. * ctx WOLFSSL_EVP_PKEY_CTX structure to use with encryption
  1452. *
  1453. * Returns WOLFSSL_FAILURE on failure and WOLFSSL_SUCCESS on success
  1454. */
  1455. int wolfSSL_EVP_PKEY_encrypt_init(WOLFSSL_EVP_PKEY_CTX *ctx)
  1456. {
  1457. if (ctx == NULL) return WOLFSSL_FAILURE;
  1458. WOLFSSL_ENTER("EVP_PKEY_encrypt_init");
  1459. switch (ctx->pkey->type) {
  1460. case EVP_PKEY_RSA:
  1461. ctx->op = EVP_PKEY_OP_ENCRYPT;
  1462. return WOLFSSL_SUCCESS;
  1463. case EVP_PKEY_EC:
  1464. WOLFSSL_MSG("not implemented");
  1465. FALL_THROUGH;
  1466. default:
  1467. break;
  1468. }
  1469. return WOLFSSL_FAILURE;
  1470. }
  1471. /******************************************************************************
  1472. * wolfSSL_EVP_PKEY_sign_init - initializes a public key algorithm context for
  1473. * a signing operation.
  1474. *
  1475. * RETURNS:
  1476. * returns WOLFSSL_SUCCESS on success, otherwise returns -2
  1477. */
  1478. WOLFSSL_API int wolfSSL_EVP_PKEY_sign_init(WOLFSSL_EVP_PKEY_CTX *ctx)
  1479. {
  1480. int ret = -2;
  1481. WOLFSSL_MSG("wolfSSL_EVP_PKEY_sign_init");
  1482. if (!ctx || !ctx->pkey)
  1483. return ret;
  1484. switch (ctx->pkey->type) {
  1485. case EVP_PKEY_RSA:
  1486. ctx->op = EVP_PKEY_OP_SIGN;
  1487. ret = WOLFSSL_SUCCESS;
  1488. break;
  1489. case EVP_PKEY_EC:
  1490. WOLFSSL_MSG("not implemented");
  1491. FALL_THROUGH;
  1492. default:
  1493. ret = -2;
  1494. }
  1495. return ret;
  1496. }
  1497. /******************************************************************************
  1498. * wolfSSL_EVP_PKEY_sign - performs a public key signing operation using ctx
  1499. * The data to be signed should be hashed since the function does not hash the data.
  1500. *
  1501. * RETURNS:
  1502. * returns WOLFSSL_SUCCESS on success, otherwise returns WOLFSSL_FAILURE
  1503. */
  1504. WOLFSSL_API int wolfSSL_EVP_PKEY_sign(WOLFSSL_EVP_PKEY_CTX *ctx, unsigned char *sig,
  1505. size_t *siglen, const unsigned char *tbs, size_t tbslen)
  1506. {
  1507. int len = 0;
  1508. WOLFSSL_MSG("wolfSSL_EVP_PKEY_sign");
  1509. if (!ctx || ctx->op != EVP_PKEY_OP_SIGN || !ctx->pkey)
  1510. return WOLFSSL_FAILURE;
  1511. (void)sig;
  1512. (void)siglen;
  1513. (void)tbs;
  1514. (void)tbslen;
  1515. (void)len;
  1516. switch (ctx->pkey->type) {
  1517. #if !defined(NO_RSA) && !defined(HAVE_USER_RSA)
  1518. case EVP_PKEY_RSA:
  1519. len = wolfSSL_RSA_private_encrypt((int)tbslen, (unsigned char*)tbs, sig,
  1520. ctx->pkey->rsa, ctx->padding);
  1521. if (len < 0)
  1522. break;
  1523. else {
  1524. *siglen = len;
  1525. return WOLFSSL_SUCCESS;
  1526. }
  1527. #endif /* NO_RSA */
  1528. case EVP_PKEY_EC:
  1529. WOLFSSL_MSG("not implemented");
  1530. FALL_THROUGH;
  1531. default:
  1532. break;
  1533. }
  1534. return WOLFSSL_FAILURE;
  1535. }
  1536. /* Get the size in bits for WOLFSSL_EVP_PKEY key
  1537. *
  1538. * pkey WOLFSSL_EVP_PKEY structure to get key size of
  1539. *
  1540. * returns the size in bits of key on success
  1541. */
  1542. int wolfSSL_EVP_PKEY_bits(const WOLFSSL_EVP_PKEY *pkey)
  1543. {
  1544. int bytes;
  1545. if (pkey == NULL) return 0;
  1546. WOLFSSL_ENTER("EVP_PKEY_bits");
  1547. if ((bytes = wolfSSL_EVP_PKEY_size((WOLFSSL_EVP_PKEY*)pkey)) ==0) return 0;
  1548. return bytes*8;
  1549. }
  1550. int wolfSSL_EVP_PKEY_keygen_init(WOLFSSL_EVP_PKEY_CTX *ctx)
  1551. {
  1552. (void)ctx;
  1553. return WOLFSSL_SUCCESS;
  1554. }
  1555. int wolfSSL_EVP_PKEY_keygen(WOLFSSL_EVP_PKEY_CTX *ctx,
  1556. WOLFSSL_EVP_PKEY **ppkey)
  1557. {
  1558. int ret = WOLFSSL_FAILURE;
  1559. int ownPkey = 0;
  1560. WOLFSSL_EVP_PKEY* pkey;
  1561. if (ctx == NULL || ppkey == NULL) {
  1562. return BAD_FUNC_ARG;
  1563. }
  1564. pkey = *ppkey;
  1565. if (pkey == NULL) {
  1566. ownPkey = 1;
  1567. pkey = wolfSSL_EVP_PKEY_new();
  1568. if (pkey == NULL)
  1569. return ret;
  1570. }
  1571. switch (pkey->type) {
  1572. #if !defined(HAVE_FAST_RSA) && defined(WOLFSSL_KEY_GEN) && \
  1573. !defined(NO_RSA) && !defined(HAVE_USER_RSA)
  1574. case EVP_PKEY_RSA:
  1575. pkey->rsa = wolfSSL_RSA_generate_key(ctx->nbits, WC_RSA_EXPONENT,
  1576. NULL, NULL);
  1577. if (pkey->rsa) {
  1578. pkey->ownRsa = 1;
  1579. pkey->pkey_sz = wolfSSL_i2d_RSAPrivateKey(pkey->rsa,
  1580. (unsigned char**)&pkey->pkey.ptr);
  1581. ret = WOLFSSL_SUCCESS;
  1582. }
  1583. break;
  1584. #endif
  1585. #ifdef HAVE_ECC
  1586. case EVP_PKEY_EC:
  1587. pkey->ecc = wolfSSL_EC_KEY_new();
  1588. if (pkey->ecc) {
  1589. ret = wolfSSL_EC_KEY_generate_key(pkey->ecc);
  1590. if (ret == WOLFSSL_SUCCESS) {
  1591. pkey->ownEcc = 1;
  1592. }
  1593. }
  1594. #endif
  1595. default:
  1596. break;
  1597. }
  1598. if (ret != WOLFSSL_SUCCESS && ownPkey) {
  1599. wolfSSL_EVP_PKEY_free(pkey);
  1600. pkey = NULL;
  1601. }
  1602. *ppkey = pkey;
  1603. return ret;
  1604. }
  1605. /* Get the size in bytes for WOLFSSL_EVP_PKEY key
  1606. *
  1607. * pkey WOLFSSL_EVP_PKEY structure to get key size of
  1608. *
  1609. * returns the size of a key on success which is the maximum size of a
  1610. * signature
  1611. */
  1612. int wolfSSL_EVP_PKEY_size(WOLFSSL_EVP_PKEY *pkey)
  1613. {
  1614. if (pkey == NULL) return 0;
  1615. WOLFSSL_ENTER("EVP_PKEY_size");
  1616. switch (pkey->type) {
  1617. #ifndef NO_RSA
  1618. case EVP_PKEY_RSA:
  1619. return (int)wolfSSL_RSA_size((const WOLFSSL_RSA*)(pkey->rsa));
  1620. #endif /* !NO_RSA */
  1621. #ifdef HAVE_ECC
  1622. case EVP_PKEY_EC:
  1623. if (pkey->ecc == NULL || pkey->ecc->internal == NULL) {
  1624. WOLFSSL_MSG("No ECC key has been set");
  1625. break;
  1626. }
  1627. return wc_ecc_size((ecc_key*)(pkey->ecc->internal));
  1628. #endif /* HAVE_ECC */
  1629. default:
  1630. break;
  1631. }
  1632. return 0;
  1633. }
  1634. #ifndef NO_WOLFSSL_STUB
  1635. WOLFSSL_API int wolfSSL_EVP_PKEY_missing_parameters(WOLFSSL_EVP_PKEY *pkey)
  1636. {
  1637. (void)pkey;
  1638. /* not using missing params callback and returning zero to indicate success */
  1639. return 0;
  1640. }
  1641. #endif
  1642. WOLFSSL_API int wolfSSL_EVP_PKEY_cmp(const WOLFSSL_EVP_PKEY *a, const WOLFSSL_EVP_PKEY *b)
  1643. {
  1644. int ret = -1; /* failure */
  1645. int a_sz = 0, b_sz = 0;
  1646. if (a == NULL || b == NULL)
  1647. return ret;
  1648. /* check its the same type of key */
  1649. if (a->type != b->type)
  1650. return ret;
  1651. /* get size based on key type */
  1652. switch (a->type) {
  1653. #ifndef NO_RSA
  1654. case EVP_PKEY_RSA:
  1655. a_sz = (int)wolfSSL_RSA_size((const WOLFSSL_RSA*)(a->rsa));
  1656. b_sz = (int)wolfSSL_RSA_size((const WOLFSSL_RSA*)(b->rsa));
  1657. break;
  1658. #endif /* !NO_RSA */
  1659. #ifdef HAVE_ECC
  1660. case EVP_PKEY_EC:
  1661. if (a->ecc == NULL || a->ecc->internal == NULL ||
  1662. b->ecc == NULL || b->ecc->internal == NULL) {
  1663. return ret;
  1664. }
  1665. a_sz = wc_ecc_size((ecc_key*)(a->ecc->internal));
  1666. b_sz = wc_ecc_size((ecc_key*)(b->ecc->internal));
  1667. break;
  1668. #endif /* HAVE_ECC */
  1669. default:
  1670. break;
  1671. } /* switch (a->type) */
  1672. /* check size */
  1673. if (a_sz <= 0 || b_sz <= 0 || a_sz != b_sz) {
  1674. return ret;
  1675. }
  1676. /* check public key size */
  1677. if (a->pkey_sz > 0 && b->pkey_sz > 0 && a->pkey_sz != b->pkey_sz) {
  1678. return ret;
  1679. }
  1680. /* check public key */
  1681. if (a->pkey.ptr && b->pkey.ptr) {
  1682. if (XMEMCMP(a->pkey.ptr, b->pkey.ptr, a->pkey_sz) != 0) {
  1683. return ret;
  1684. }
  1685. }
  1686. ret = 0; /* success */
  1687. return ret;
  1688. }
  1689. /* Initialize structure for signing
  1690. *
  1691. * ctx WOLFSSL_EVP_MD_CTX structure to initialize
  1692. * type is the type of message digest to use
  1693. *
  1694. * returns WOLFSSL_SUCCESS on success
  1695. */
  1696. int wolfSSL_EVP_SignInit(WOLFSSL_EVP_MD_CTX *ctx, const WOLFSSL_EVP_MD *type)
  1697. {
  1698. if (ctx == NULL) return WOLFSSL_FAILURE;
  1699. WOLFSSL_ENTER("EVP_SignInit");
  1700. return wolfSSL_EVP_DigestInit(ctx,type);
  1701. }
  1702. WOLFSSL_API int wolfSSL_EVP_SignInit_ex(WOLFSSL_EVP_MD_CTX* ctx,
  1703. const WOLFSSL_EVP_MD* type,
  1704. WOLFSSL_ENGINE *impl)
  1705. {
  1706. if (ctx == NULL) return WOLFSSL_FAILURE;
  1707. WOLFSSL_ENTER("EVP_SignInit");
  1708. return wolfSSL_EVP_DigestInit_ex(ctx,type,impl);
  1709. }
  1710. /* Update structure with data for signing
  1711. *
  1712. * ctx WOLFSSL_EVP_MD_CTX structure to update
  1713. * data buffer holding data to update with for sign
  1714. * len length of data buffer
  1715. *
  1716. * returns WOLFSSL_SUCCESS on success
  1717. */
  1718. int wolfSSL_EVP_SignUpdate(WOLFSSL_EVP_MD_CTX *ctx, const void *data, size_t len)
  1719. {
  1720. if (ctx == NULL) return 0;
  1721. WOLFSSL_ENTER("EVP_SignUpdate(");
  1722. return wolfSSL_EVP_DigestUpdate(ctx, data, len);
  1723. }
  1724. static const struct s_ent {
  1725. const enum wc_HashType macType;
  1726. const int nid;
  1727. const char *name;
  1728. } md_tbl[] = {
  1729. #ifndef NO_MD4
  1730. {WC_HASH_TYPE_MD4, NID_md4, "MD4"},
  1731. #endif /* NO_MD4 */
  1732. #ifndef NO_MD5
  1733. {WC_HASH_TYPE_MD5, NID_md5, "MD5"},
  1734. #endif /* NO_MD5 */
  1735. #ifndef NO_SHA
  1736. {WC_HASH_TYPE_SHA, NID_sha1, "SHA"},
  1737. #endif /* NO_SHA */
  1738. #ifdef WOLFSSL_SHA224
  1739. {WC_HASH_TYPE_SHA224, NID_sha224, "SHA224"},
  1740. #endif /* WOLFSSL_SHA224 */
  1741. #ifndef NO_SHA256
  1742. {WC_HASH_TYPE_SHA256, NID_sha256, "SHA256"},
  1743. #endif
  1744. #ifdef WOLFSSL_SHA384
  1745. {WC_HASH_TYPE_SHA384, NID_sha384, "SHA384"},
  1746. #endif /* WOLFSSL_SHA384 */
  1747. #ifdef WOLFSSL_SHA512
  1748. {WC_HASH_TYPE_SHA512, NID_sha512, "SHA512"},
  1749. #endif /* WOLFSSL_SHA512 */
  1750. #ifndef WOLFSSL_NOSHA3_224
  1751. {WC_HASH_TYPE_SHA3_224, NID_sha3_224, "SHA3_224"},
  1752. #endif
  1753. #ifndef WOLFSSL_NOSHA3_256
  1754. {WC_HASH_TYPE_SHA3_256, NID_sha3_256, "SHA3_256"},
  1755. #endif
  1756. {WC_HASH_TYPE_SHA3_384, NID_sha3_384, "SHA3_384"},
  1757. #ifndef WOLFSSL_NOSHA3_512
  1758. {WC_HASH_TYPE_SHA3_512, NID_sha3_512, "SHA3_512"},
  1759. #endif
  1760. {WC_HASH_TYPE_NONE, 0, NULL}
  1761. };
  1762. static enum wc_HashType wolfSSL_EVP_md2macType(const WOLFSSL_EVP_MD *md)
  1763. {
  1764. const struct s_ent *ent ;
  1765. if (md != NULL) {
  1766. for( ent = md_tbl; ent->name != NULL; ent++) {
  1767. if(XSTRNCMP((const char *)md, ent->name, XSTRLEN(ent->name)+1) == 0) {
  1768. return ent->macType;
  1769. }
  1770. }
  1771. }
  1772. return WC_HASH_TYPE_NONE;
  1773. }
  1774. /* Finalize structure for signing
  1775. *
  1776. * ctx WOLFSSL_EVP_MD_CTX structure to finalize
  1777. * sigret buffer to hold resulting signature
  1778. * siglen length of sigret buffer
  1779. * pkey key to sign with
  1780. *
  1781. * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on failure
  1782. */
  1783. int wolfSSL_EVP_SignFinal(WOLFSSL_EVP_MD_CTX *ctx, unsigned char *sigret,
  1784. unsigned int *siglen, WOLFSSL_EVP_PKEY *pkey)
  1785. {
  1786. unsigned int mdsize;
  1787. unsigned char md[WC_MAX_DIGEST_SIZE];
  1788. int ret;
  1789. if (ctx == NULL) return WOLFSSL_FAILURE;
  1790. WOLFSSL_ENTER("EVP_SignFinal");
  1791. ret = wolfSSL_EVP_DigestFinal(ctx, md, &mdsize);
  1792. if (ret <= 0) return ret;
  1793. (void)sigret;
  1794. (void)siglen;
  1795. switch (pkey->type) {
  1796. #if !defined(NO_RSA) && !defined(HAVE_USER_RSA)
  1797. case EVP_PKEY_RSA: {
  1798. int nid = wolfSSL_EVP_MD_type(wolfSSL_EVP_MD_CTX_md(ctx));
  1799. if (nid < 0) break;
  1800. return wolfSSL_RSA_sign(nid, md, mdsize, sigret,
  1801. siglen, pkey->rsa);
  1802. }
  1803. #endif /* NO_RSA */
  1804. case EVP_PKEY_DSA:
  1805. case EVP_PKEY_EC:
  1806. WOLFSSL_MSG("not implemented");
  1807. FALL_THROUGH;
  1808. default:
  1809. break;
  1810. }
  1811. return WOLFSSL_FAILURE;
  1812. }
  1813. /* Initialize structure for verifying signature
  1814. *
  1815. * ctx WOLFSSL_EVP_MD_CTX structure to initialize
  1816. * type is the type of message digest to use
  1817. *
  1818. * returns WOLFSSL_SUCCESS on success
  1819. */
  1820. int wolfSSL_EVP_VerifyInit(WOLFSSL_EVP_MD_CTX *ctx, const WOLFSSL_EVP_MD *type)
  1821. {
  1822. if (ctx == NULL) return WOLFSSL_FAILURE;
  1823. WOLFSSL_ENTER("EVP_VerifyInit");
  1824. return wolfSSL_EVP_DigestInit(ctx,type);
  1825. }
  1826. /* Update structure for verifying signature
  1827. *
  1828. * ctx WOLFSSL_EVP_MD_CTX structure to update
  1829. * data buffer holding data to update with for verify
  1830. * len length of data buffer
  1831. *
  1832. * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on failure
  1833. */
  1834. int wolfSSL_EVP_VerifyUpdate(WOLFSSL_EVP_MD_CTX *ctx, const void *data, size_t len)
  1835. {
  1836. if (ctx == NULL) return WOLFSSL_FAILURE;
  1837. WOLFSSL_ENTER("EVP_VerifyUpdate");
  1838. return wolfSSL_EVP_DigestUpdate(ctx, data, len);
  1839. }
  1840. /* Finalize structure for verifying signature
  1841. *
  1842. * ctx WOLFSSL_EVP_MD_CTX structure to finalize
  1843. * sig buffer holding signature
  1844. * siglen length of sig buffer
  1845. * pkey key to verify with
  1846. *
  1847. * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on failure
  1848. */
  1849. int wolfSSL_EVP_VerifyFinal(WOLFSSL_EVP_MD_CTX *ctx,
  1850. unsigned char*sig, unsigned int siglen, WOLFSSL_EVP_PKEY *pkey)
  1851. {
  1852. int ret;
  1853. unsigned char md[WC_MAX_DIGEST_SIZE];
  1854. unsigned int mdsize;
  1855. if (ctx == NULL) return WOLFSSL_FAILURE;
  1856. WOLFSSL_ENTER("EVP_VerifyFinal");
  1857. ret = wolfSSL_EVP_DigestFinal(ctx, md, &mdsize);
  1858. if (ret <= 0) return ret;
  1859. (void)sig;
  1860. (void)siglen;
  1861. switch (pkey->type) {
  1862. #if !defined(NO_RSA) && !defined(HAVE_USER_RSA)
  1863. case EVP_PKEY_RSA: {
  1864. int nid = wolfSSL_EVP_MD_type(wolfSSL_EVP_MD_CTX_md(ctx));
  1865. if (nid < 0) break;
  1866. return wolfSSL_RSA_verify(nid, md, mdsize, sig,
  1867. (unsigned int)siglen, pkey->rsa);
  1868. }
  1869. #endif /* NO_RSA */
  1870. case EVP_PKEY_DSA:
  1871. case EVP_PKEY_EC:
  1872. WOLFSSL_MSG("not implemented");
  1873. FALL_THROUGH;
  1874. default:
  1875. break;
  1876. }
  1877. return WOLFSSL_FAILURE;
  1878. }
  1879. int wolfSSL_EVP_add_cipher(const WOLFSSL_EVP_CIPHER *cipher)
  1880. {
  1881. (void)cipher;
  1882. /* nothing to do */
  1883. return 0;
  1884. }
  1885. WOLFSSL_EVP_PKEY* wolfSSL_EVP_PKEY_new_mac_key(int type, ENGINE* e,
  1886. const unsigned char* key, int keylen)
  1887. {
  1888. WOLFSSL_EVP_PKEY* pkey;
  1889. (void)e;
  1890. if (type != EVP_PKEY_HMAC || (key == NULL && keylen != 0))
  1891. return NULL;
  1892. pkey = wolfSSL_EVP_PKEY_new();
  1893. if (pkey != NULL) {
  1894. pkey->pkey.ptr = (char*)XMALLOC(keylen, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
  1895. if (pkey->pkey.ptr == NULL && keylen > 0) {
  1896. wolfSSL_EVP_PKEY_free(pkey);
  1897. pkey = NULL;
  1898. }
  1899. else {
  1900. XMEMCPY(pkey->pkey.ptr, key, keylen);
  1901. pkey->pkey_sz = keylen;
  1902. pkey->type = pkey->save_type = type;
  1903. }
  1904. }
  1905. return pkey;
  1906. }
  1907. const unsigned char* wolfSSL_EVP_PKEY_get0_hmac(const WOLFSSL_EVP_PKEY* pkey,
  1908. size_t* len)
  1909. {
  1910. if (pkey == NULL || len == NULL)
  1911. return NULL;
  1912. *len = (size_t)pkey->pkey_sz;
  1913. return (const unsigned char*)pkey->pkey.ptr;
  1914. }
  1915. /* Initialize an EVP_DigestSign/Verify operation.
  1916. * Initialize a digest for RSA and ECC keys, or HMAC for HMAC key.
  1917. */
  1918. static int wolfSSL_evp_digest_pk_init(WOLFSSL_EVP_MD_CTX *ctx,
  1919. WOLFSSL_EVP_PKEY_CTX **pctx,
  1920. const WOLFSSL_EVP_MD *type,
  1921. WOLFSSL_ENGINE *e,
  1922. WOLFSSL_EVP_PKEY *pkey)
  1923. {
  1924. if (pkey->type == EVP_PKEY_HMAC) {
  1925. int hashType;
  1926. const unsigned char* key;
  1927. size_t keySz;
  1928. if (XSTRNCMP(type, "SHA256", 6) == 0) {
  1929. hashType = WC_SHA256;
  1930. }
  1931. #ifdef WOLFSSL_SHA224
  1932. else if (XSTRNCMP(type, "SHA224", 6) == 0) {
  1933. hashType = WC_SHA224;
  1934. }
  1935. #endif
  1936. #ifdef WOLFSSL_SHA384
  1937. else if (XSTRNCMP(type, "SHA384", 6) == 0) {
  1938. hashType = WC_SHA384;
  1939. }
  1940. #endif
  1941. #ifdef WOLFSSL_SHA512
  1942. else if (XSTRNCMP(type, "SHA512", 6) == 0) {
  1943. hashType = WC_SHA512;
  1944. }
  1945. #endif
  1946. #ifndef NO_MD5
  1947. else if (XSTRNCMP(type, "MD5", 3) == 0) {
  1948. hashType = WC_MD5;
  1949. }
  1950. #endif
  1951. #ifndef NO_SHA
  1952. /* has to be last since would pick or 224, 256, 384, or 512 too */
  1953. else if (XSTRNCMP(type, "SHA", 3) == 0) {
  1954. hashType = WC_SHA;
  1955. }
  1956. #endif /* NO_SHA */
  1957. else
  1958. return BAD_FUNC_ARG;
  1959. key = wolfSSL_EVP_PKEY_get0_hmac(pkey, &keySz);
  1960. if (wc_HmacInit(&ctx->hash.hmac, NULL, INVALID_DEVID) != 0)
  1961. return WOLFSSL_FAILURE;
  1962. if (wc_HmacSetKey(&ctx->hash.hmac, hashType, key, (word32)keySz) != 0)
  1963. return WOLFSSL_FAILURE;
  1964. ctx->isHMAC = 1;
  1965. }
  1966. else {
  1967. int ret;
  1968. if (ctx->pctx == NULL) {
  1969. ctx->pctx = wolfSSL_EVP_PKEY_CTX_new(pkey, e);
  1970. if (ctx->pctx == NULL)
  1971. return WOLFSSL_FAILURE;
  1972. }
  1973. ret = wolfSSL_EVP_DigestInit(ctx, type);
  1974. if (ret == WOLFSSL_SUCCESS && pctx != NULL)
  1975. *pctx = ctx->pctx;
  1976. return ret;
  1977. }
  1978. return WOLFSSL_SUCCESS;
  1979. }
  1980. /* Update an EVP_DigestSign/Verify operation.
  1981. * Update a digest for RSA and ECC keys, or HMAC for HMAC key.
  1982. */
  1983. static int wolfssl_evp_digest_pk_update(WOLFSSL_EVP_MD_CTX *ctx,
  1984. const void *d, unsigned int cnt)
  1985. {
  1986. if (ctx->pctx == NULL) {
  1987. if (!ctx->isHMAC)
  1988. return WOLFSSL_FAILURE;
  1989. if (wc_HmacUpdate(&ctx->hash.hmac, (const byte *)d, cnt) != 0)
  1990. return WOLFSSL_FAILURE;
  1991. return WOLFSSL_SUCCESS;
  1992. }
  1993. else
  1994. return wolfSSL_EVP_DigestUpdate(ctx, d, cnt);
  1995. }
  1996. /* Finalize an EVP_DigestSign/Verify operation - common part only.
  1997. * Finalize a digest for RSA and ECC keys, or HMAC for HMAC key.
  1998. * Copies the digest so that you can keep updating.
  1999. */
  2000. static int wolfssl_evp_digest_pk_final(WOLFSSL_EVP_MD_CTX *ctx,
  2001. unsigned char *md, unsigned int* mdlen)
  2002. {
  2003. int ret;
  2004. if (ctx->pctx == NULL) {
  2005. Hmac hmacCopy;
  2006. if (!ctx->isHMAC)
  2007. return WOLFSSL_FAILURE;
  2008. if (wolfSSL_HmacCopy(&hmacCopy, &ctx->hash.hmac) != WOLFSSL_SUCCESS)
  2009. return WOLFSSL_FAILURE;
  2010. ret = wc_HmacFinal(&hmacCopy, md) == 0;
  2011. wc_HmacFree(&hmacCopy);
  2012. return ret;
  2013. }
  2014. else {
  2015. WOLFSSL_EVP_MD_CTX ctxCopy;
  2016. if (wolfSSL_EVP_MD_CTX_copy_ex(&ctxCopy, ctx) != WOLFSSL_SUCCESS)
  2017. return WOLFSSL_FAILURE;
  2018. ret = wolfSSL_EVP_DigestFinal(&ctxCopy, md, mdlen);
  2019. wolfSSL_EVP_MD_CTX_cleanup(&ctxCopy);
  2020. return ret;
  2021. }
  2022. }
  2023. /* Get the length of the mac based on the digest algorithm. */
  2024. static int wolfssl_mac_len(unsigned char macType)
  2025. {
  2026. int hashLen;
  2027. switch (macType) {
  2028. #ifndef NO_MD5
  2029. case WC_MD5:
  2030. hashLen = WC_MD5_DIGEST_SIZE;
  2031. break;
  2032. #endif /* !NO_MD5 */
  2033. #ifndef NO_SHA
  2034. case WC_SHA:
  2035. hashLen = WC_SHA_DIGEST_SIZE;
  2036. break;
  2037. #endif /* !NO_SHA */
  2038. #ifdef WOLFSSL_SHA224
  2039. case WC_SHA224:
  2040. hashLen = WC_SHA224_DIGEST_SIZE;
  2041. break;
  2042. #endif /* WOLFSSL_SHA224 */
  2043. #ifndef NO_SHA256
  2044. case WC_SHA256:
  2045. hashLen = WC_SHA256_DIGEST_SIZE;
  2046. break;
  2047. #endif /* !NO_SHA256 */
  2048. #ifdef WOLFSSL_SHA384
  2049. case WC_SHA384:
  2050. hashLen = WC_SHA384_DIGEST_SIZE;
  2051. break;
  2052. #endif /* WOLFSSL_SHA384 */
  2053. #ifdef WOLFSSL_SHA512
  2054. case WC_SHA512:
  2055. hashLen = WC_SHA512_DIGEST_SIZE;
  2056. break;
  2057. #endif /* WOLFSSL_SHA512 */
  2058. #ifdef HAVE_BLAKE2
  2059. case BLAKE2B_ID:
  2060. hashLen = BLAKE2B_OUTBYTES;
  2061. break;
  2062. #endif /* HAVE_BLAKE2 */
  2063. default:
  2064. hashLen = 0;
  2065. }
  2066. return hashLen;
  2067. }
  2068. int wolfSSL_EVP_DigestSignInit(WOLFSSL_EVP_MD_CTX *ctx,
  2069. WOLFSSL_EVP_PKEY_CTX **pctx,
  2070. const WOLFSSL_EVP_MD *type,
  2071. WOLFSSL_ENGINE *e,
  2072. WOLFSSL_EVP_PKEY *pkey)
  2073. {
  2074. WOLFSSL_ENTER("EVP_DigestSignInit");
  2075. if (ctx == NULL || type == NULL || pkey == NULL)
  2076. return BAD_FUNC_ARG;
  2077. return wolfSSL_evp_digest_pk_init(ctx, pctx, type, e, pkey);
  2078. }
  2079. int wolfSSL_EVP_DigestSignUpdate(WOLFSSL_EVP_MD_CTX *ctx, const void *d,
  2080. unsigned int cnt)
  2081. {
  2082. WOLFSSL_ENTER("EVP_DigestSignUpdate");
  2083. if (ctx == NULL || d == NULL)
  2084. return BAD_FUNC_ARG;
  2085. return wolfssl_evp_digest_pk_update(ctx, d, cnt);
  2086. }
  2087. int wolfSSL_EVP_DigestSignFinal(WOLFSSL_EVP_MD_CTX *ctx, unsigned char *sig,
  2088. size_t *siglen)
  2089. {
  2090. unsigned char digest[WC_MAX_DIGEST_SIZE];
  2091. unsigned int hashLen;
  2092. int ret = WOLFSSL_FAILURE;
  2093. WOLFSSL_ENTER("EVP_DigestSignFinal");
  2094. if (ctx == NULL || siglen == NULL)
  2095. return WOLFSSL_FAILURE;
  2096. /* Return the maximum size of the signaure when sig is NULL. */
  2097. if (ctx->pctx == NULL) {
  2098. if (!ctx->isHMAC)
  2099. return WOLFSSL_FAILURE;
  2100. hashLen = wolfssl_mac_len(ctx->hash.hmac.macType);
  2101. if (sig == NULL) {
  2102. *siglen = hashLen;
  2103. return WOLFSSL_SUCCESS;
  2104. }
  2105. }
  2106. #ifndef NO_RSA
  2107. else if (ctx->pctx->pkey->type == EVP_PKEY_RSA) {
  2108. if (sig == NULL) {
  2109. *siglen = wolfSSL_RSA_size(ctx->pctx->pkey->rsa);
  2110. return WOLFSSL_SUCCESS;
  2111. }
  2112. }
  2113. #endif /* !NO_RSA */
  2114. #ifdef HAVE_ECC
  2115. else if (ctx->pctx->pkey->type == EVP_PKEY_EC) {
  2116. if (sig == NULL) {
  2117. /* SEQ + INT + INT */
  2118. *siglen = ecc_sets[ctx->pctx->pkey->ecc->group->curve_idx].size * 2
  2119. + 8;
  2120. return WOLFSSL_SUCCESS;
  2121. }
  2122. }
  2123. #endif
  2124. if (wolfssl_evp_digest_pk_final(ctx, digest, &hashLen) <= 0)
  2125. return WOLFSSL_FAILURE;
  2126. if (ctx->pctx == NULL) {
  2127. /* Copy the HMAC result as signature. */
  2128. if ((unsigned int)(*siglen) > hashLen)
  2129. *siglen = hashLen;
  2130. /* May be a truncated signature. */
  2131. XMEMCPY(sig, digest, *siglen);
  2132. ret = WOLFSSL_SUCCESS;
  2133. }
  2134. else {
  2135. /* Sign the digest. */
  2136. switch (ctx->pctx->pkey->type) {
  2137. #if !defined(NO_RSA) && !defined(HAVE_USER_RSA)
  2138. case EVP_PKEY_RSA: {
  2139. unsigned int sigSz;
  2140. int nid = wolfSSL_EVP_MD_type(wolfSSL_EVP_MD_CTX_md(ctx));
  2141. if (nid < 0)
  2142. break;
  2143. ret = wolfSSL_RSA_sign(nid, digest, hashLen, sig, &sigSz,
  2144. ctx->pctx->pkey->rsa);
  2145. if (ret >= 0)
  2146. *siglen = sigSz;
  2147. break;
  2148. }
  2149. #endif /* NO_RSA */
  2150. #ifdef HAVE_ECC
  2151. case EVP_PKEY_EC: {
  2152. WOLFSSL_ECDSA_SIG *ecdsaSig;
  2153. ecdsaSig = wolfSSL_ECDSA_do_sign(digest, hashLen,
  2154. ctx->pctx->pkey->ecc);
  2155. if (ecdsaSig == NULL)
  2156. break;
  2157. *siglen = wolfSSL_i2d_ECDSA_SIG(ecdsaSig, &sig);
  2158. wolfSSL_ECDSA_SIG_free(ecdsaSig);
  2159. ret = WOLFSSL_SUCCESS;
  2160. break;
  2161. }
  2162. #endif
  2163. default:
  2164. break;
  2165. }
  2166. }
  2167. ForceZero(digest, sizeof(digest));
  2168. return ret;
  2169. }
  2170. int wolfSSL_EVP_DigestVerifyInit(WOLFSSL_EVP_MD_CTX *ctx,
  2171. WOLFSSL_EVP_PKEY_CTX **pctx,
  2172. const WOLFSSL_EVP_MD *type,
  2173. WOLFSSL_ENGINE *e,
  2174. WOLFSSL_EVP_PKEY *pkey)
  2175. {
  2176. WOLFSSL_ENTER("EVP_DigestVerifyInit");
  2177. if (ctx == NULL || type == NULL || pkey == NULL)
  2178. return BAD_FUNC_ARG;
  2179. return wolfSSL_evp_digest_pk_init(ctx, pctx, type, e, pkey);
  2180. }
  2181. int wolfSSL_EVP_DigestVerifyUpdate(WOLFSSL_EVP_MD_CTX *ctx, const void *d,
  2182. size_t cnt)
  2183. {
  2184. WOLFSSL_ENTER("EVP_DigestVerifyUpdate");
  2185. if (ctx == NULL || d == NULL)
  2186. return BAD_FUNC_ARG;
  2187. return wolfssl_evp_digest_pk_update(ctx, d, (unsigned int)cnt);
  2188. }
  2189. int wolfSSL_EVP_DigestVerifyFinal(WOLFSSL_EVP_MD_CTX *ctx,
  2190. const unsigned char *sig, size_t siglen)
  2191. {
  2192. unsigned char digest[WC_MAX_DIGEST_SIZE];
  2193. unsigned int hashLen;
  2194. WOLFSSL_ENTER("EVP_DigestVerifyFinal");
  2195. if (ctx == NULL || sig == NULL)
  2196. return WOLFSSL_FAILURE;
  2197. if (ctx->pctx == NULL) {
  2198. if (!ctx->isHMAC)
  2199. return WOLFSSL_FAILURE;
  2200. hashLen = wolfssl_mac_len(ctx->hash.hmac.macType);
  2201. if (siglen > hashLen)
  2202. return WOLFSSL_FAILURE;
  2203. /* May be a truncated signature. */
  2204. }
  2205. if (wolfssl_evp_digest_pk_final(ctx, digest, &hashLen) <= 0)
  2206. return WOLFSSL_FAILURE;
  2207. if (ctx->pctx == NULL) {
  2208. /* Check HMAC result matches the signature. */
  2209. if (XMEMCMP(sig, digest, siglen) == 0)
  2210. return WOLFSSL_SUCCESS;
  2211. return WOLFSSL_FAILURE;
  2212. }
  2213. else {
  2214. /* Verify the signature with the digest. */
  2215. switch (ctx->pctx->pkey->type) {
  2216. #if !defined(NO_RSA) && !defined(HAVE_USER_RSA)
  2217. case EVP_PKEY_RSA: {
  2218. int nid = wolfSSL_EVP_MD_type(wolfSSL_EVP_MD_CTX_md(ctx));
  2219. if (nid < 0)
  2220. return WOLFSSL_FAILURE;
  2221. return wolfSSL_RSA_verify(nid, digest, hashLen, sig,
  2222. (unsigned int)siglen,
  2223. ctx->pctx->pkey->rsa);
  2224. }
  2225. #endif /* NO_RSA */
  2226. #ifdef HAVE_ECC
  2227. case EVP_PKEY_EC: {
  2228. int ret;
  2229. WOLFSSL_ECDSA_SIG *ecdsaSig;
  2230. ecdsaSig = wolfSSL_d2i_ECDSA_SIG(NULL, &sig, (long)siglen);
  2231. if (ecdsaSig == NULL)
  2232. return WOLFSSL_FAILURE;
  2233. ret = wolfSSL_ECDSA_do_verify(digest, hashLen, ecdsaSig,
  2234. ctx->pctx->pkey->ecc);
  2235. wolfSSL_ECDSA_SIG_free(ecdsaSig);
  2236. return ret;
  2237. }
  2238. #endif
  2239. default:
  2240. break;
  2241. }
  2242. }
  2243. return WOLFSSL_FAILURE;
  2244. }
  2245. #ifdef WOLFSSL_APACHE_HTTPD
  2246. #if !defined(USE_WINDOWS_API) && !defined(MICROCHIP_PIC32)
  2247. #include <termios.h>
  2248. #endif
  2249. #ifndef XGETPASSWD
  2250. static int XGETPASSWD(char* buf, int bufSz) {
  2251. int ret = WOLFSSL_SUCCESS;
  2252. /* turn off echo for passwords */
  2253. #ifdef USE_WINDOWS_API
  2254. DWORD originalTerm;
  2255. DWORD newTerm;
  2256. CONSOLE_SCREEN_BUFFER_INFO screenOrig;
  2257. HANDLE stdinHandle = GetStdHandle(STD_INPUT_HANDLE);
  2258. if (GetConsoleMode(stdinHandle, &originalTerm) == 0) {
  2259. WOLFSSL_MSG("Couldn't get the original terminal settings");
  2260. return WOLFSSL_FAILURE;
  2261. }
  2262. newTerm = originalTerm;
  2263. newTerm &= ~ENABLE_ECHO_INPUT;
  2264. if (SetConsoleMode(stdinHandle, newTerm) == 0) {
  2265. WOLFSSL_MSG("Couldn't turn off echo");
  2266. return WOLFSSL_FAILURE;
  2267. }
  2268. #else
  2269. struct termios originalTerm;
  2270. struct termios newTerm;
  2271. if (tcgetattr(STDIN_FILENO, &originalTerm) != 0) {
  2272. WOLFSSL_MSG("Couldn't get the original terminal settings");
  2273. return WOLFSSL_FAILURE;
  2274. }
  2275. XMEMCPY(&newTerm, &originalTerm, sizeof(struct termios));
  2276. newTerm.c_lflag &= ~ECHO;
  2277. newTerm.c_lflag |= (ICANON | ECHONL);
  2278. if (tcsetattr(STDIN_FILENO, TCSANOW, &newTerm) != 0) {
  2279. WOLFSSL_MSG("Couldn't turn off echo");
  2280. return WOLFSSL_FAILURE;
  2281. }
  2282. #endif
  2283. if (XFGETS(buf, bufSz, stdin) == NULL) {
  2284. ret = WOLFSSL_FAILURE;
  2285. }
  2286. /* restore default echo */
  2287. #ifdef USE_WINDOWS_API
  2288. if (SetConsoleMode(stdinHandle, originalTerm) == 0) {
  2289. WOLFSSL_MSG("Couldn't restore the terminal settings");
  2290. return WOLFSSL_FAILURE;
  2291. }
  2292. #else
  2293. if (tcsetattr(STDIN_FILENO, TCSANOW, &originalTerm) != 0) {
  2294. WOLFSSL_MSG("Couldn't restore the terminal settings");
  2295. return WOLFSSL_FAILURE;
  2296. }
  2297. #endif
  2298. return ret;
  2299. }
  2300. #endif
  2301. /* returns 0 on success and -2 or -1 on failure */
  2302. int wolfSSL_EVP_read_pw_string(char* buf, int bufSz, const char* banner, int v)
  2303. {
  2304. printf("%s", banner);
  2305. if (XGETPASSWD(buf, bufSz) == WOLFSSL_FAILURE) {
  2306. return -1;
  2307. }
  2308. (void)v; /* fgets always sanity checks size of input vs buffer */
  2309. return 0;
  2310. }
  2311. #endif /* WOLFSSL_APACHE_HTTPD */
  2312. #if !defined(NO_PWDBASED) && !defined(NO_SHA)
  2313. int wolfSSL_PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen,
  2314. const unsigned char *salt,
  2315. int saltlen, int iter,
  2316. int keylen, unsigned char *out)
  2317. {
  2318. const char *nostring = "";
  2319. int ret = 0;
  2320. if (pass == NULL) {
  2321. passlen = 0;
  2322. pass = nostring;
  2323. }
  2324. else if (passlen == -1) {
  2325. passlen = (int)XSTRLEN(pass);
  2326. }
  2327. ret = wc_PBKDF2((byte*)out, (byte*)pass, passlen, (byte*)salt, saltlen,
  2328. iter, keylen, WC_SHA);
  2329. if (ret == 0)
  2330. return WOLFSSL_SUCCESS;
  2331. else
  2332. return WOLFSSL_FAILURE;
  2333. }
  2334. #endif /* !NO_PWDBASED !NO_SHA*/
  2335. #if !defined(NO_PWDBASED)
  2336. WOLFSSL_API int wolfSSL_PKCS5_PBKDF2_HMAC(const char *pass, int passlen,
  2337. const unsigned char *salt,
  2338. int saltlen, int iter,
  2339. const WOLFSSL_EVP_MD *digest,
  2340. int keylen, unsigned char *out)
  2341. {
  2342. const char *nostring = "";
  2343. int ret = 0;
  2344. if (pass == NULL) {
  2345. passlen = 0;
  2346. pass = nostring;
  2347. } else if (passlen == -1) {
  2348. passlen = (int)XSTRLEN(pass);
  2349. }
  2350. ret = wc_PBKDF2((byte*)out, (byte*)pass, passlen, (byte*)salt, saltlen,
  2351. iter, keylen, wolfSSL_EVP_md2macType(digest));
  2352. if (ret == 0)
  2353. return WOLFSSL_SUCCESS;
  2354. else
  2355. return WOLFSSL_FAILURE;
  2356. }
  2357. #endif /* !NO_PWDBASED */
  2358. static const struct cipher{
  2359. unsigned char type;
  2360. const char *name;
  2361. int nid;
  2362. } cipher_tbl[] = {
  2363. #ifndef NO_AES
  2364. #ifdef WOLFSSL_AES_128
  2365. {AES_128_CBC_TYPE, "AES-128-CBC", NID_aes_128_cbc},
  2366. #endif
  2367. #ifdef WOLFSSL_AES_192
  2368. {AES_192_CBC_TYPE, "AES-192-CBC", NID_aes_192_cbc},
  2369. #endif
  2370. #ifdef WOLFSSL_AES_256
  2371. {AES_256_CBC_TYPE, "AES-256-CBC", NID_aes_256_cbc},
  2372. #endif
  2373. #ifdef WOLFSSL_AES_128
  2374. {AES_128_CFB1_TYPE, "AES-128-CFB1", NID_aes_128_cfb1},
  2375. #endif
  2376. #ifdef WOLFSSL_AES_192
  2377. {AES_192_CFB1_TYPE, "AES-192-CFB1", NID_aes_192_cfb1},
  2378. #endif
  2379. #ifdef WOLFSSL_AES_256
  2380. {AES_256_CFB1_TYPE, "AES-256-CFB1", NID_aes_256_cfb1},
  2381. #endif
  2382. #ifdef WOLFSSL_AES_128
  2383. {AES_128_CFB8_TYPE, "AES-128-CFB8", NID_aes_128_cfb8},
  2384. #endif
  2385. #ifdef WOLFSSL_AES_192
  2386. {AES_192_CFB8_TYPE, "AES-192-CFB8", NID_aes_192_cfb8},
  2387. #endif
  2388. #ifdef WOLFSSL_AES_256
  2389. {AES_256_CFB8_TYPE, "AES-256-CFB8", NID_aes_256_cfb8},
  2390. #endif
  2391. #ifdef WOLFSSL_AES_128
  2392. {AES_128_CFB128_TYPE, "AES-128-CFB128", NID_aes_128_cfb128},
  2393. #endif
  2394. #ifdef WOLFSSL_AES_192
  2395. {AES_192_CFB128_TYPE, "AES-192-CFB128", NID_aes_192_cfb128},
  2396. #endif
  2397. #ifdef WOLFSSL_AES_256
  2398. {AES_256_CFB128_TYPE, "AES-256-CFB128", NID_aes_256_cfb128},
  2399. #endif
  2400. #ifdef WOLFSSL_AES_128
  2401. {AES_128_OFB_TYPE, "AES-128-OFB", NID_aes_128_ofb},
  2402. #endif
  2403. #ifdef WOLFSSL_AES_192
  2404. {AES_192_OFB_TYPE, "AES-192-OFB", NID_aes_192_ofb},
  2405. #endif
  2406. #ifdef WOLFSSL_AES_256
  2407. {AES_256_OFB_TYPE, "AES-256-OFB", NID_aes_256_ofb},
  2408. #endif
  2409. #ifdef WOLFSSL_AES_128
  2410. {AES_128_XTS_TYPE, "AES-128-XTS", NID_aes_128_xts},
  2411. #endif
  2412. #ifdef WOLFSSL_AES_256
  2413. {AES_256_XTS_TYPE, "AES-256-XTS", NID_aes_256_xts},
  2414. #endif
  2415. #ifdef WOLFSSL_AES_128
  2416. {AES_128_GCM_TYPE, "AES-128-GCM", NID_aes_128_gcm},
  2417. #endif
  2418. #ifdef WOLFSSL_AES_192
  2419. {AES_192_GCM_TYPE, "AES-192-GCM", NID_aes_192_gcm},
  2420. #endif
  2421. #ifdef WOLFSSL_AES_256
  2422. {AES_256_GCM_TYPE, "AES-256-GCM", NID_aes_256_gcm},
  2423. #endif
  2424. #ifdef WOLFSSL_AES_128
  2425. {AES_128_CTR_TYPE, "AES-128-CTR", NID_aes_128_ctr},
  2426. #endif
  2427. #ifdef WOLFSSL_AES_192
  2428. {AES_192_CTR_TYPE, "AES-192-CTR", NID_aes_192_ctr},
  2429. #endif
  2430. #ifdef WOLFSSL_AES_256
  2431. {AES_256_CTR_TYPE, "AES-256-CTR", NID_aes_256_ctr},
  2432. #endif
  2433. #ifdef WOLFSSL_AES_128
  2434. {AES_128_ECB_TYPE, "AES-128-ECB", NID_aes_128_ecb},
  2435. #endif
  2436. #ifdef WOLFSSL_AES_192
  2437. {AES_192_ECB_TYPE, "AES-192-ECB", NID_aes_192_ecb},
  2438. #endif
  2439. #ifdef WOLFSSL_AES_256
  2440. {AES_256_ECB_TYPE, "AES-256-ECB", NID_aes_256_ecb},
  2441. #endif
  2442. #endif
  2443. #ifndef NO_DES3
  2444. {DES_CBC_TYPE, "DES-CBC", NID_des_cbc},
  2445. {DES_ECB_TYPE, "DES-ECB", NID_des_ecb},
  2446. {DES_EDE3_CBC_TYPE, "DES-EDE3-CBC", NID_des_ede3_cbc},
  2447. {DES_EDE3_ECB_TYPE, "DES-EDE3-ECB", NID_des_ede3_ecb},
  2448. #endif
  2449. #ifndef NO_RC4
  2450. {ARC4_TYPE, "ARC4", NID_undef},
  2451. #endif
  2452. #ifdef HAVE_IDEA
  2453. {IDEA_CBC_TYPE, "IDEA-CBC", NID_idea_cbc},
  2454. #endif
  2455. { 0, NULL, 0}
  2456. };
  2457. /* returns cipher using provided ctx type */
  2458. const WOLFSSL_EVP_CIPHER *wolfSSL_EVP_CIPHER_CTX_cipher(
  2459. const WOLFSSL_EVP_CIPHER_CTX *ctx)
  2460. {
  2461. const struct cipher* c;
  2462. if (!ctx || !ctx->cipherType) {
  2463. return NULL;
  2464. }
  2465. for (c = cipher_tbl; c->type != 0; c++) {
  2466. if (ctx->cipherType == c->type) {
  2467. return wolfSSL_EVP_get_cipherbyname(c->name);
  2468. }
  2469. }
  2470. return NULL;
  2471. }
  2472. int wolfSSL_EVP_CIPHER_nid(const WOLFSSL_EVP_CIPHER *cipher)
  2473. {
  2474. const struct cipher* c;
  2475. if (!cipher) {
  2476. return 0;
  2477. }
  2478. for (c = cipher_tbl; c->type != 0; c++) {
  2479. if (XSTRNCMP(cipher, c->name, XSTRLEN(c->name)+1) == 0) {
  2480. return c->nid;
  2481. }
  2482. }
  2483. return 0;
  2484. }
  2485. const WOLFSSL_EVP_CIPHER *wolfSSL_EVP_get_cipherbyname(const char *name)
  2486. {
  2487. static const struct alias {
  2488. const char *name;
  2489. const char *alias;
  2490. } alias_tbl[] =
  2491. {
  2492. #ifndef NO_DES3
  2493. {"DES-CBC", "DES"},
  2494. {"DES-CBC", "des"},
  2495. {"DES-ECB", "DES-ECB"},
  2496. {"DES-ECB", "des-ecb"},
  2497. {"DES-EDE3-CBC", "DES3"},
  2498. {"DES-EDE3-CBC", "des3"},
  2499. {"DES-EDE3-ECB", "DES-EDE3"},
  2500. {"DES-EDE3-ECB", "des-ede3"},
  2501. {"DES-EDE3-ECB", "des-ede3-ecb"},
  2502. #endif
  2503. #ifdef HAVE_IDEA
  2504. {"IDEA-CBC", "IDEA"},
  2505. {"IDEA-CBC", "idea"},
  2506. #endif
  2507. #ifndef NO_AES
  2508. #ifdef HAVE_AES_CBC
  2509. #ifdef WOLFSSL_AES_128
  2510. {"AES-128-CBC", "AES128-CBC"},
  2511. {"AES-128-CBC", "aes128-cbc"},
  2512. #endif
  2513. #ifdef WOLFSSL_AES_192
  2514. {"AES-192-CBC", "AES192-CBC"},
  2515. {"AES-192-CBC", "aes192-cbc"},
  2516. #endif
  2517. #ifdef WOLFSSL_AES_256
  2518. {"AES-256-CBC", "AES256-CBC"},
  2519. {"AES-256-CBC", "aes256-cbc"},
  2520. #endif
  2521. #endif
  2522. #ifdef WOLFSSL_AES_128
  2523. {"AES-128-ECB", "AES128-ECB"},
  2524. {"AES-128-ECB", "aes128-ecb"},
  2525. #endif
  2526. #ifdef WOLFSSL_AES_192
  2527. {"AES-192-ECB", "AES192-ECB"},
  2528. {"AES-192-ECB", "aes192-ecb"},
  2529. #endif
  2530. #ifdef WOLFSSL_AES_256
  2531. {"AES-256-ECB", "AES256-ECB"},
  2532. #endif
  2533. #ifdef HAVE_AESGCM
  2534. #ifdef WOLFSSL_AES_128
  2535. {"AES-128-GCM", "aes-128-gcm"},
  2536. {"AES-128-GCM", "id-aes128-GCM"},
  2537. #endif
  2538. #ifdef WOLFSSL_AES_192
  2539. {"AES-192-GCM", "aes-192-gcm"},
  2540. {"AES-192-GCM", "id-aes192-GCM"},
  2541. #endif
  2542. #ifdef WOLFSSL_AES_256
  2543. {"AES-256-GCM", "aes-256-gcm"},
  2544. {"AES-256-GCM", "id-aes256-GCM"},
  2545. #endif
  2546. #endif
  2547. #endif
  2548. #ifndef NO_RC4
  2549. {"ARC4", "RC4"},
  2550. #endif
  2551. { NULL, NULL}
  2552. };
  2553. const struct cipher *ent;
  2554. const struct alias *al;
  2555. WOLFSSL_ENTER("EVP_get_cipherbyname");
  2556. for( al = alias_tbl; al->name != NULL; al++)
  2557. if(XSTRNCMP(name, al->alias, XSTRLEN(al->alias)+1) == 0) {
  2558. name = al->name;
  2559. break;
  2560. }
  2561. for( ent = cipher_tbl; ent->name != NULL; ent++)
  2562. if(XSTRNCMP(name, ent->name, XSTRLEN(ent->name)+1) == 0) {
  2563. return (WOLFSSL_EVP_CIPHER *)ent->name;
  2564. }
  2565. return NULL;
  2566. }
  2567. /*
  2568. * return an EVP_CIPHER structure when cipher NID is passed.
  2569. *
  2570. * id cipher NID
  2571. *
  2572. * return WOLFSSL_EVP_CIPHER
  2573. */
  2574. const WOLFSSL_EVP_CIPHER *wolfSSL_EVP_get_cipherbynid(int id)
  2575. {
  2576. WOLFSSL_ENTER("EVP_get_cipherbynid");
  2577. switch(id) {
  2578. #ifndef NO_AES
  2579. #ifdef HAVE_AES_CBC
  2580. #ifdef WOLFSSL_AES_128
  2581. case NID_aes_128_cbc:
  2582. return wolfSSL_EVP_aes_128_cbc();
  2583. #endif
  2584. #ifdef WOLFSSL_AES_192
  2585. case NID_aes_192_cbc:
  2586. return wolfSSL_EVP_aes_192_cbc();
  2587. #endif
  2588. #ifdef WOLFSSL_AES_256
  2589. case NID_aes_256_cbc:
  2590. return wolfSSL_EVP_aes_256_cbc();
  2591. #endif
  2592. #endif
  2593. #ifdef WOLFSSL_AES_COUNTER
  2594. #ifdef WOLFSSL_AES_128
  2595. case NID_aes_128_ctr:
  2596. return wolfSSL_EVP_aes_128_ctr();
  2597. #endif
  2598. #ifdef WOLFSSL_AES_192
  2599. case NID_aes_192_ctr:
  2600. return wolfSSL_EVP_aes_192_ctr();
  2601. #endif
  2602. #ifdef WOLFSSL_AES_256
  2603. case NID_aes_256_ctr:
  2604. return wolfSSL_EVP_aes_256_ctr();
  2605. #endif
  2606. #endif /* WOLFSSL_AES_COUNTER */
  2607. #ifdef HAVE_AES_ECB
  2608. #ifdef WOLFSSL_AES_128
  2609. case NID_aes_128_ecb:
  2610. return wolfSSL_EVP_aes_128_ecb();
  2611. #endif
  2612. #ifdef WOLFSSL_AES_192
  2613. case NID_aes_192_ecb:
  2614. return wolfSSL_EVP_aes_192_ecb();
  2615. #endif
  2616. #ifdef WOLFSSL_AES_256
  2617. case NID_aes_256_ecb:
  2618. return wolfSSL_EVP_aes_256_ecb();
  2619. #endif
  2620. #endif /* HAVE_AES_ECB */
  2621. #ifdef HAVE_AESGCM
  2622. #ifdef WOLFSSL_AES_128
  2623. case NID_aes_128_gcm:
  2624. return wolfSSL_EVP_aes_128_gcm();
  2625. #endif
  2626. #ifdef WOLFSSL_AES_192
  2627. case NID_aes_192_gcm:
  2628. return wolfSSL_EVP_aes_192_gcm();
  2629. #endif
  2630. #ifdef WOLFSSL_AES_256
  2631. case NID_aes_256_gcm:
  2632. return wolfSSL_EVP_aes_256_gcm();
  2633. #endif
  2634. #endif
  2635. #endif
  2636. #ifndef NO_DES3
  2637. case NID_des_cbc:
  2638. return wolfSSL_EVP_des_cbc();
  2639. #ifdef WOLFSSL_DES_ECB
  2640. case NID_des_ecb:
  2641. return wolfSSL_EVP_des_ecb();
  2642. #endif
  2643. case NID_des_ede3_cbc:
  2644. return wolfSSL_EVP_des_ede3_cbc();
  2645. #ifdef WOLFSSL_DES_ECB
  2646. case NID_des_ede3_ecb:
  2647. return wolfSSL_EVP_des_ede3_ecb();
  2648. #endif
  2649. #endif /*NO_DES3*/
  2650. #ifdef HAVE_IDEA
  2651. case NID_idea_cbc:
  2652. return wolfSSL_EVP_idea_cbc();
  2653. #endif
  2654. default:
  2655. WOLFSSL_MSG("Bad cipher id value");
  2656. }
  2657. return NULL;
  2658. }
  2659. void wolfSSL_EVP_init(void)
  2660. {
  2661. #ifndef NO_AES
  2662. #ifdef HAVE_AES_CBC
  2663. #ifdef WOLFSSL_AES_128
  2664. EVP_AES_128_CBC = (char *)EVP_get_cipherbyname("AES-128-CBC");
  2665. #endif
  2666. #ifdef WOLFSSL_AES_192
  2667. EVP_AES_192_CBC = (char *)EVP_get_cipherbyname("AES-192-CBC");
  2668. #endif
  2669. #ifdef WOLFSSL_AES_256
  2670. EVP_AES_256_CBC = (char *)EVP_get_cipherbyname("AES-256-CBC");
  2671. #endif
  2672. #endif /* HAVE_AES_CBC */
  2673. #ifdef WOLFSSL_AES_CFB
  2674. #ifdef WOLFSSL_AES_128
  2675. EVP_AES_128_CFB1 = (char *)EVP_get_cipherbyname("AES-128-CFB1");
  2676. #endif
  2677. #ifdef WOLFSSL_AES_192
  2678. EVP_AES_192_CFB1 = (char *)EVP_get_cipherbyname("AES-192-CFB1");
  2679. #endif
  2680. #ifdef WOLFSSL_AES_256
  2681. EVP_AES_256_CFB1 = (char *)EVP_get_cipherbyname("AES-256-CFB1");
  2682. #endif
  2683. #ifdef WOLFSSL_AES_128
  2684. EVP_AES_128_CFB8 = (char *)EVP_get_cipherbyname("AES-128-CFB8");
  2685. #endif
  2686. #ifdef WOLFSSL_AES_192
  2687. EVP_AES_192_CFB8 = (char *)EVP_get_cipherbyname("AES-192-CFB8");
  2688. #endif
  2689. #ifdef WOLFSSL_AES_256
  2690. EVP_AES_256_CFB8 = (char *)EVP_get_cipherbyname("AES-256-CFB8");
  2691. #endif
  2692. #ifdef WOLFSSL_AES_128
  2693. EVP_AES_128_CFB128 = (char *)EVP_get_cipherbyname("AES-128-CFB128");
  2694. #endif
  2695. #ifdef WOLFSSL_AES_192
  2696. EVP_AES_192_CFB128 = (char *)EVP_get_cipherbyname("AES-192-CFB128");
  2697. #endif
  2698. #ifdef WOLFSSL_AES_256
  2699. EVP_AES_256_CFB128 = (char *)EVP_get_cipherbyname("AES-256-CFB128");
  2700. #endif
  2701. #endif /* WOLFSSL_AES_CFB */
  2702. #ifdef WOLFSSL_AES_OFB
  2703. #ifdef WOLFSSL_AES_128
  2704. EVP_AES_128_OFB = (char *)EVP_get_cipherbyname("AES-128-OFB");
  2705. #endif
  2706. #ifdef WOLFSSL_AES_192
  2707. EVP_AES_192_OFB = (char *)EVP_get_cipherbyname("AES-192-OFB");
  2708. #endif
  2709. #ifdef WOLFSSL_AES_256
  2710. EVP_AES_256_OFB = (char *)EVP_get_cipherbyname("AES-256-OFB");
  2711. #endif
  2712. #endif /* WOLFSSL_AES_OFB */
  2713. #ifdef WOLFSSL_AES_XTS
  2714. #ifdef WOLFSSL_AES_128
  2715. EVP_AES_128_XTS = (char *)EVP_get_cipherbyname("AES-128-XTS");
  2716. #endif
  2717. #ifdef WOLFSSL_AES_256
  2718. EVP_AES_256_XTS = (char *)EVP_get_cipherbyname("AES-256-XTS");
  2719. #endif
  2720. #endif /* WOLFSSL_AES_XTS */
  2721. #ifdef HAVE_AESGCM
  2722. #ifdef WOLFSSL_AES_128
  2723. EVP_AES_128_GCM = (char *)EVP_get_cipherbyname("AES-128-GCM");
  2724. #endif
  2725. #ifdef WOLFSSL_AES_192
  2726. EVP_AES_192_GCM = (char *)EVP_get_cipherbyname("AES-192-GCM");
  2727. #endif
  2728. #ifdef WOLFSSL_AES_256
  2729. EVP_AES_256_GCM = (char *)EVP_get_cipherbyname("AES-256-GCM");
  2730. #endif
  2731. #endif /* HAVE_AESGCM*/
  2732. #ifdef WOLFSSL_AES_128
  2733. EVP_AES_128_CTR = (char *)EVP_get_cipherbyname("AES-128-CTR");
  2734. #endif
  2735. #ifdef WOLFSSL_AES_192
  2736. EVP_AES_192_CTR = (char *)EVP_get_cipherbyname("AES-192-CTR");
  2737. #endif
  2738. #ifdef WOLFSSL_AES_256
  2739. EVP_AES_256_CTR = (char *)EVP_get_cipherbyname("AES-256-CTR");
  2740. #endif
  2741. #ifdef WOLFSSL_AES_128
  2742. EVP_AES_128_ECB = (char *)EVP_get_cipherbyname("AES-128-ECB");
  2743. #endif
  2744. #ifdef WOLFSSL_AES_192
  2745. EVP_AES_192_ECB = (char *)EVP_get_cipherbyname("AES-192-ECB");
  2746. #endif
  2747. #ifdef WOLFSSL_AES_256
  2748. EVP_AES_256_ECB = (char *)EVP_get_cipherbyname("AES-256-ECB");
  2749. #endif
  2750. #endif /* ifndef NO_AES*/
  2751. #ifndef NO_DES3
  2752. EVP_DES_CBC = (char *)EVP_get_cipherbyname("DES-CBC");
  2753. EVP_DES_ECB = (char *)EVP_get_cipherbyname("DES-ECB");
  2754. EVP_DES_EDE3_CBC = (char *)EVP_get_cipherbyname("DES-EDE3-CBC");
  2755. EVP_DES_EDE3_ECB = (char *)EVP_get_cipherbyname("DES-EDE3-ECB");
  2756. #endif
  2757. #ifdef HAVE_IDEA
  2758. EVP_IDEA_CBC = (char *)EVP_get_cipherbyname("IDEA-CBC");
  2759. #endif
  2760. }
  2761. #if !defined(NO_PWDBASED)
  2762. int wolfSSL_EVP_get_hashinfo(const WOLFSSL_EVP_MD* evp,
  2763. int* pHash, int* pHashSz)
  2764. {
  2765. enum wc_HashType hash = WC_HASH_TYPE_NONE;
  2766. int hashSz;
  2767. if (XSTRLEN(evp) < 3) {
  2768. /* do not try comparing strings if size is too small */
  2769. return WOLFSSL_FAILURE;
  2770. }
  2771. if (XSTRNCMP("SHA", evp, 3) == 0) {
  2772. if (XSTRLEN(evp) > 3) {
  2773. #ifndef NO_SHA256
  2774. if (XSTRNCMP("SHA256", evp, 6) == 0) {
  2775. hash = WC_HASH_TYPE_SHA256;
  2776. }
  2777. else
  2778. #endif
  2779. #ifdef WOLFSSL_SHA384
  2780. if (XSTRNCMP("SHA384", evp, 6) == 0) {
  2781. hash = WC_HASH_TYPE_SHA384;
  2782. }
  2783. else
  2784. #endif
  2785. #ifdef WOLFSSL_SHA512
  2786. if (XSTRNCMP("SHA512", evp, 6) == 0) {
  2787. hash = WC_HASH_TYPE_SHA512;
  2788. }
  2789. else
  2790. #endif
  2791. {
  2792. WOLFSSL_MSG("Unknown SHA hash");
  2793. }
  2794. }
  2795. else {
  2796. hash = WC_HASH_TYPE_SHA;
  2797. }
  2798. }
  2799. #ifdef WOLFSSL_MD2
  2800. else if (XSTRNCMP("MD2", evp, 3) == 0) {
  2801. hash = WC_HASH_TYPE_MD2;
  2802. }
  2803. #endif
  2804. #ifndef NO_MD4
  2805. else if (XSTRNCMP("MD4", evp, 3) == 0) {
  2806. hash = WC_HASH_TYPE_MD4;
  2807. }
  2808. #endif
  2809. #ifndef NO_MD5
  2810. else if (XSTRNCMP("MD5", evp, 3) == 0) {
  2811. hash = WC_HASH_TYPE_MD5;
  2812. }
  2813. #endif
  2814. if (pHash)
  2815. *pHash = hash;
  2816. hashSz = wc_HashGetDigestSize(hash);
  2817. if (pHashSz)
  2818. *pHashSz = hashSz;
  2819. if (hashSz < 0) {
  2820. return WOLFSSL_FAILURE;
  2821. }
  2822. return WOLFSSL_SUCCESS;
  2823. }
  2824. /* this function makes the assumption that out buffer is big enough for digest*/
  2825. int wolfSSL_EVP_Digest(const unsigned char* in, int inSz, unsigned char* out,
  2826. unsigned int* outSz, const WOLFSSL_EVP_MD* evp,
  2827. WOLFSSL_ENGINE* eng)
  2828. {
  2829. int err;
  2830. int hashType = WC_HASH_TYPE_NONE;
  2831. int hashSz;
  2832. WOLFSSL_ENTER("wolfSSL_EVP_Digest");
  2833. if (in == NULL || out == NULL || evp == NULL) {
  2834. WOLFSSL_MSG("Null argument passed in");
  2835. return WOLFSSL_FAILURE;
  2836. }
  2837. err = wolfSSL_EVP_get_hashinfo(evp, &hashType, &hashSz);
  2838. if (err != WOLFSSL_SUCCESS)
  2839. return err;
  2840. if (wc_Hash((enum wc_HashType)hashType, in, inSz, out, hashSz) != 0) {
  2841. return WOLFSSL_FAILURE;
  2842. }
  2843. if (outSz != NULL)
  2844. *outSz = hashSz;
  2845. (void)eng;
  2846. return WOLFSSL_SUCCESS;
  2847. }
  2848. #endif
  2849. const WOLFSSL_EVP_MD *wolfSSL_EVP_get_digestbyname(const char *name)
  2850. {
  2851. static const struct alias {
  2852. const char *name;
  2853. const char *alias;
  2854. } alias_tbl[] =
  2855. {
  2856. {"MD4", "ssl3-md4"},
  2857. {"MD5", "ssl3-md5"},
  2858. {"SHA", "ssl3-sha1"},
  2859. {"SHA", "SHA1"},
  2860. { NULL, NULL}
  2861. };
  2862. const struct alias *al;
  2863. const struct s_ent *ent;
  2864. for (al = alias_tbl; al->name != NULL; al++)
  2865. if(XSTRNCMP(name, al->alias, XSTRLEN(al->alias)+1) == 0) {
  2866. name = al->name;
  2867. break;
  2868. }
  2869. for (ent = md_tbl; ent->name != NULL; ent++)
  2870. if(XSTRNCMP(name, ent->name, XSTRLEN(ent->name)+1) == 0) {
  2871. return (EVP_MD *)ent->name;
  2872. }
  2873. return NULL;
  2874. }
  2875. int wolfSSL_EVP_MD_type(const WOLFSSL_EVP_MD *md)
  2876. {
  2877. const struct s_ent *ent ;
  2878. WOLFSSL_ENTER("EVP_MD_type");
  2879. for( ent = md_tbl; ent->name != NULL; ent++){
  2880. if(XSTRNCMP((const char *)md, ent->name, XSTRLEN(ent->name)+1) == 0) {
  2881. return ent->nid;
  2882. }
  2883. }
  2884. return 0;
  2885. }
  2886. #ifndef NO_MD4
  2887. /* return a pointer to MD4 EVP type */
  2888. const WOLFSSL_EVP_MD* wolfSSL_EVP_md4(void)
  2889. {
  2890. WOLFSSL_ENTER("wolfSSL_EVP_md4");
  2891. return EVP_get_digestbyname("MD4");
  2892. }
  2893. #endif /* !NO_MD4 */
  2894. #ifndef NO_MD5
  2895. const WOLFSSL_EVP_MD* wolfSSL_EVP_md5(void)
  2896. {
  2897. WOLFSSL_ENTER("EVP_md5");
  2898. return EVP_get_digestbyname("MD5");
  2899. }
  2900. #endif /* !NO_MD5 */
  2901. #ifndef NO_WOLFSSL_STUB
  2902. const WOLFSSL_EVP_MD* wolfSSL_EVP_mdc2(void)
  2903. {
  2904. WOLFSSL_STUB("EVP_mdc2");
  2905. return NULL;
  2906. }
  2907. #endif
  2908. #ifndef NO_SHA
  2909. const WOLFSSL_EVP_MD* wolfSSL_EVP_sha1(void)
  2910. {
  2911. WOLFSSL_ENTER("EVP_sha1");
  2912. return EVP_get_digestbyname("SHA");
  2913. }
  2914. #endif /* NO_SHA */
  2915. #ifdef WOLFSSL_SHA224
  2916. const WOLFSSL_EVP_MD* wolfSSL_EVP_sha224(void)
  2917. {
  2918. WOLFSSL_ENTER("EVP_sha224");
  2919. return EVP_get_digestbyname("SHA224");
  2920. }
  2921. #endif /* WOLFSSL_SHA224 */
  2922. const WOLFSSL_EVP_MD* wolfSSL_EVP_sha256(void)
  2923. {
  2924. WOLFSSL_ENTER("EVP_sha256");
  2925. return EVP_get_digestbyname("SHA256");
  2926. }
  2927. #ifdef WOLFSSL_SHA384
  2928. const WOLFSSL_EVP_MD* wolfSSL_EVP_sha384(void)
  2929. {
  2930. WOLFSSL_ENTER("EVP_sha384");
  2931. return EVP_get_digestbyname("SHA384");
  2932. }
  2933. #endif /* WOLFSSL_SHA384 */
  2934. #ifdef WOLFSSL_SHA512
  2935. const WOLFSSL_EVP_MD* wolfSSL_EVP_sha512(void)
  2936. {
  2937. WOLFSSL_ENTER("EVP_sha512");
  2938. return EVP_get_digestbyname("SHA512");
  2939. }
  2940. #endif /* WOLFSSL_SHA512 */
  2941. #ifdef WOLFSSL_SHA3
  2942. #ifndef WOLFSSL_NOSHA3_224
  2943. const WOLFSSL_EVP_MD* wolfSSL_EVP_sha3_224(void)
  2944. {
  2945. WOLFSSL_ENTER("EVP_sha3_224");
  2946. return EVP_get_digestbyname("SHA3_224");
  2947. }
  2948. #endif /* WOLFSSL_NOSHA3_224 */
  2949. #ifndef WOLFSSL_NOSHA3_256
  2950. const WOLFSSL_EVP_MD* wolfSSL_EVP_sha3_256(void)
  2951. {
  2952. WOLFSSL_ENTER("EVP_sha3_256");
  2953. return EVP_get_digestbyname("SHA3_256");
  2954. }
  2955. #endif /* WOLFSSL_NOSHA3_256 */
  2956. const WOLFSSL_EVP_MD* wolfSSL_EVP_sha3_384(void)
  2957. {
  2958. WOLFSSL_ENTER("EVP_sha3_384");
  2959. return EVP_get_digestbyname("SHA3_384");
  2960. }
  2961. #ifndef WOLFSSL_NOSHA3_512
  2962. const WOLFSSL_EVP_MD* wolfSSL_EVP_sha3_512(void)
  2963. {
  2964. WOLFSSL_ENTER("EVP_sha3_512");
  2965. return EVP_get_digestbyname("SHA3_512");
  2966. }
  2967. #endif /* WOLFSSL_NOSHA3_512 */
  2968. #endif /* WOLFSSL_SHA3 */
  2969. WOLFSSL_EVP_MD_CTX *wolfSSL_EVP_MD_CTX_new(void)
  2970. {
  2971. WOLFSSL_EVP_MD_CTX* ctx;
  2972. WOLFSSL_ENTER("EVP_MD_CTX_new");
  2973. ctx = (WOLFSSL_EVP_MD_CTX*)XMALLOC(sizeof *ctx, NULL,
  2974. DYNAMIC_TYPE_OPENSSL);
  2975. if (ctx){
  2976. wolfSSL_EVP_MD_CTX_init(ctx);
  2977. }
  2978. return ctx;
  2979. }
  2980. WOLFSSL_API void wolfSSL_EVP_MD_CTX_free(WOLFSSL_EVP_MD_CTX *ctx)
  2981. {
  2982. if (ctx) {
  2983. WOLFSSL_ENTER("EVP_MD_CTX_free");
  2984. wolfSSL_EVP_MD_CTX_cleanup(ctx);
  2985. XFREE(ctx, NULL, DYNAMIC_TYPE_OPENSSL);
  2986. }
  2987. }
  2988. /* returns the NID of message digest used by the ctx */
  2989. int wolfSSL_EVP_MD_CTX_type(const WOLFSSL_EVP_MD_CTX *ctx)
  2990. {
  2991. const struct s_ent *ent;
  2992. WOLFSSL_ENTER("EVP_MD_CTX_type");
  2993. if (ctx) {
  2994. if (ctx->isHMAC) {
  2995. return NID_hmac;
  2996. }
  2997. for(ent = md_tbl; ent->name != NULL; ent++) {
  2998. if (ctx->macType == ent->macType) {
  2999. return ent->nid;
  3000. }
  3001. }
  3002. /* Return whatever we got */
  3003. return ctx->macType;
  3004. }
  3005. return 0;
  3006. }
  3007. /* returns WOLFSSL_SUCCESS on success */
  3008. int wolfSSL_EVP_MD_CTX_copy(WOLFSSL_EVP_MD_CTX *out, const WOLFSSL_EVP_MD_CTX *in)
  3009. {
  3010. return wolfSSL_EVP_MD_CTX_copy_ex(out, in);
  3011. }
  3012. /* returns digest size */
  3013. int wolfSSL_EVP_MD_CTX_size(const WOLFSSL_EVP_MD_CTX *ctx) {
  3014. return(wolfSSL_EVP_MD_size(wolfSSL_EVP_MD_CTX_md(ctx)));
  3015. }
  3016. /* returns block size */
  3017. int wolfSSL_EVP_MD_CTX_block_size(const WOLFSSL_EVP_MD_CTX *ctx) {
  3018. return(wolfSSL_EVP_MD_block_size(wolfSSL_EVP_MD_CTX_md(ctx)));
  3019. }
  3020. /* Deep copy of EVP_MD hasher
  3021. * return WOLFSSL_SUCCESS on success */
  3022. static int wolfSSL_EVP_MD_Copy_Hasher(WOLFSSL_EVP_MD_CTX* des,
  3023. const WOLFSSL_EVP_MD_CTX* src)
  3024. {
  3025. int ret;
  3026. if (src->isHMAC) {
  3027. ret = wolfSSL_HmacCopy(&des->hash.hmac, (Hmac*)&src->hash.hmac);
  3028. }
  3029. else {
  3030. switch (src->macType) {
  3031. case WC_HASH_TYPE_MD5:
  3032. #ifndef NO_MD5
  3033. ret = wc_Md5Copy((wc_Md5*)&src->hash.digest,
  3034. (wc_Md5*)&des->hash.digest);
  3035. #else
  3036. ret = NOT_COMPILED_IN;
  3037. #endif /* !NO_MD5 */
  3038. break;
  3039. case WC_HASH_TYPE_SHA:
  3040. #ifndef NO_SHA
  3041. ret = wc_ShaCopy((wc_Sha*)&src->hash.digest,
  3042. (wc_Sha*)&des->hash.digest);
  3043. #else
  3044. ret = NOT_COMPILED_IN;
  3045. #endif /* !NO_SHA */
  3046. break;
  3047. case WC_HASH_TYPE_SHA224:
  3048. #ifdef WOLFSSL_SHA224
  3049. ret = wc_Sha224Copy((wc_Sha224*)&src->hash.digest,
  3050. (wc_Sha224*)&des->hash.digest);
  3051. #else
  3052. ret = NOT_COMPILED_IN;
  3053. #endif /* WOLFSSL_SHA224 */
  3054. break;
  3055. case WC_HASH_TYPE_SHA256:
  3056. #ifndef NO_SHA256
  3057. ret = wc_Sha256Copy((wc_Sha256*)&src->hash.digest,
  3058. (wc_Sha256*)&des->hash.digest);
  3059. #else
  3060. ret = NOT_COMPILED_IN;
  3061. #endif /* !NO_SHA256 */
  3062. break;
  3063. case WC_HASH_TYPE_SHA384:
  3064. #ifdef WOLFSSL_SHA384
  3065. ret = wc_Sha384Copy((wc_Sha384*)&src->hash.digest,
  3066. (wc_Sha384*)&des->hash.digest);
  3067. #else
  3068. ret = NOT_COMPILED_IN;
  3069. #endif /* WOLFSSL_SHA384 */
  3070. break;
  3071. case WC_HASH_TYPE_SHA512:
  3072. #ifdef WOLFSSL_SHA512
  3073. ret = wc_Sha512Copy((wc_Sha512*)&src->hash.digest,
  3074. (wc_Sha512*)&des->hash.digest);
  3075. #else
  3076. ret = NOT_COMPILED_IN;
  3077. #endif /* WOLFSSL_SHA512 */
  3078. break;
  3079. case WC_HASH_TYPE_SHA3_224:
  3080. #if defined(WOLFSSL_SHA3) && !defined(WOLFSSL_NOSHA3_224)
  3081. ret = wc_Sha3_224_Copy((wc_Sha3*)&src->hash.digest,
  3082. (wc_Sha3*)&des->hash.digest);
  3083. #else
  3084. ret = NOT_COMPILED_IN;
  3085. #endif
  3086. break;
  3087. case WC_HASH_TYPE_SHA3_256:
  3088. #if defined(WOLFSSL_SHA3) && !defined(WOLFSSL_NOSHA3_256)
  3089. ret = wc_Sha3_256_Copy((wc_Sha3*)&src->hash.digest,
  3090. (wc_Sha3*)&des->hash.digest);
  3091. #else
  3092. ret = NOT_COMPILED_IN;
  3093. #endif
  3094. break;
  3095. case WC_HASH_TYPE_SHA3_384:
  3096. #if defined(WOLFSSL_SHA3)
  3097. ret = wc_Sha3_384_Copy((wc_Sha3*)&src->hash.digest,
  3098. (wc_Sha3*)&des->hash.digest);
  3099. #else
  3100. ret = NOT_COMPILED_IN;
  3101. #endif
  3102. break;
  3103. case WC_HASH_TYPE_SHA3_512:
  3104. #if defined(WOLFSSL_SHA3) && !defined(WOLFSSL_NOSHA3_512)
  3105. ret = wc_Sha3_512_Copy((wc_Sha3*)&src->hash.digest,
  3106. (wc_Sha3*)&des->hash.digest);
  3107. #else
  3108. ret = NOT_COMPILED_IN;
  3109. #endif
  3110. break;
  3111. case WC_HASH_TYPE_NONE:
  3112. case WC_HASH_TYPE_MD2:
  3113. case WC_HASH_TYPE_MD4:
  3114. case WC_HASH_TYPE_MD5_SHA:
  3115. case WC_HASH_TYPE_BLAKE2B:
  3116. case WC_HASH_TYPE_BLAKE2S:
  3117. default:
  3118. ret = BAD_FUNC_ARG;
  3119. break;
  3120. }
  3121. }
  3122. return ret == 0 ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  3123. }
  3124. /* copies structure in to the structure out
  3125. *
  3126. * returns WOLFSSL_SUCCESS on success */
  3127. int wolfSSL_EVP_MD_CTX_copy_ex(WOLFSSL_EVP_MD_CTX *out, const WOLFSSL_EVP_MD_CTX *in)
  3128. {
  3129. if ((out == NULL) || (in == NULL)) return WOLFSSL_FAILURE;
  3130. WOLFSSL_ENTER("EVP_CIPHER_MD_CTX_copy_ex");
  3131. XMEMCPY(out, in, sizeof(WOLFSSL_EVP_MD_CTX));
  3132. if (in->pctx != NULL) {
  3133. out->pctx = wolfSSL_EVP_PKEY_CTX_new(in->pctx->pkey, NULL);
  3134. if (out->pctx == NULL)
  3135. return WOLFSSL_FAILURE;
  3136. }
  3137. return wolfSSL_EVP_MD_Copy_Hasher(out, (WOLFSSL_EVP_MD_CTX*)in);
  3138. }
  3139. void wolfSSL_EVP_MD_CTX_init(WOLFSSL_EVP_MD_CTX* ctx)
  3140. {
  3141. WOLFSSL_ENTER("EVP_CIPHER_MD_CTX_init");
  3142. XMEMSET(ctx, 0, sizeof(WOLFSSL_EVP_MD_CTX));
  3143. }
  3144. const WOLFSSL_EVP_MD *wolfSSL_EVP_MD_CTX_md(const WOLFSSL_EVP_MD_CTX *ctx)
  3145. {
  3146. const struct s_ent *ent;
  3147. if (ctx == NULL)
  3148. return NULL;
  3149. WOLFSSL_ENTER("EVP_MD_CTX_md");
  3150. if (ctx->isHMAC) {
  3151. return "HMAC";
  3152. }
  3153. for(ent = md_tbl; ent->name != NULL; ent++) {
  3154. if(ctx->macType == ent->macType) {
  3155. return (const WOLFSSL_EVP_MD *)ent->name;
  3156. }
  3157. }
  3158. return (WOLFSSL_EVP_MD *)NULL;
  3159. }
  3160. #ifndef NO_AES
  3161. #ifdef HAVE_AES_CBC
  3162. #ifdef WOLFSSL_AES_128
  3163. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_128_cbc(void)
  3164. {
  3165. WOLFSSL_ENTER("wolfSSL_EVP_aes_128_cbc");
  3166. if (EVP_AES_128_CBC == NULL)
  3167. wolfSSL_EVP_init();
  3168. return EVP_AES_128_CBC;
  3169. }
  3170. #endif /* WOLFSSL_AES_128 */
  3171. #ifdef WOLFSSL_AES_192
  3172. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_192_cbc(void)
  3173. {
  3174. WOLFSSL_ENTER("wolfSSL_EVP_aes_192_cbc");
  3175. if (EVP_AES_192_CBC == NULL)
  3176. wolfSSL_EVP_init();
  3177. return EVP_AES_192_CBC;
  3178. }
  3179. #endif /* WOLFSSL_AES_192 */
  3180. #ifdef WOLFSSL_AES_256
  3181. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_256_cbc(void)
  3182. {
  3183. WOLFSSL_ENTER("wolfSSL_EVP_aes_256_cbc");
  3184. if (EVP_AES_256_CBC == NULL)
  3185. wolfSSL_EVP_init();
  3186. return EVP_AES_256_CBC;
  3187. }
  3188. #endif /* WOLFSSL_AES_256 */
  3189. #endif /* HAVE_AES_CBC */
  3190. #ifdef WOLFSSL_AES_CFB
  3191. #if !defined(HAVE_SELFTEST) && !defined(HAVE_FIPS)
  3192. #ifdef WOLFSSL_AES_128
  3193. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_128_cfb1(void)
  3194. {
  3195. WOLFSSL_ENTER("wolfSSL_EVP_aes_128_cfb1");
  3196. if (EVP_AES_128_CFB1 == NULL)
  3197. wolfSSL_EVP_init();
  3198. return EVP_AES_128_CFB1;
  3199. }
  3200. #endif /* WOLFSSL_AES_128 */
  3201. #ifdef WOLFSSL_AES_192
  3202. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_192_cfb1(void)
  3203. {
  3204. WOLFSSL_ENTER("wolfSSL_EVP_aes_192_cfb1");
  3205. if (EVP_AES_192_CFB1 == NULL)
  3206. wolfSSL_EVP_init();
  3207. return EVP_AES_192_CFB1;
  3208. }
  3209. #endif /* WOLFSSL_AES_192 */
  3210. #ifdef WOLFSSL_AES_256
  3211. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_256_cfb1(void)
  3212. {
  3213. WOLFSSL_ENTER("wolfSSL_EVP_aes_256_cfb1");
  3214. if (EVP_AES_256_CFB1 == NULL)
  3215. wolfSSL_EVP_init();
  3216. return EVP_AES_256_CFB1;
  3217. }
  3218. #endif /* WOLFSSL_AES_256 */
  3219. #ifdef WOLFSSL_AES_128
  3220. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_128_cfb8(void)
  3221. {
  3222. WOLFSSL_ENTER("wolfSSL_EVP_aes_128_cfb8");
  3223. if (EVP_AES_128_CFB8 == NULL)
  3224. wolfSSL_EVP_init();
  3225. return EVP_AES_128_CFB8;
  3226. }
  3227. #endif /* WOLFSSL_AES_128 */
  3228. #ifdef WOLFSSL_AES_192
  3229. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_192_cfb8(void)
  3230. {
  3231. WOLFSSL_ENTER("wolfSSL_EVP_aes_192_cfb8");
  3232. if (EVP_AES_192_CFB8 == NULL)
  3233. wolfSSL_EVP_init();
  3234. return EVP_AES_192_CFB8;
  3235. }
  3236. #endif /* WOLFSSL_AES_192 */
  3237. #ifdef WOLFSSL_AES_256
  3238. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_256_cfb8(void)
  3239. {
  3240. WOLFSSL_ENTER("wolfSSL_EVP_aes_256_cfb8");
  3241. if (EVP_AES_256_CFB8 == NULL)
  3242. wolfSSL_EVP_init();
  3243. return EVP_AES_256_CFB8;
  3244. }
  3245. #endif /* WOLFSSL_AES_256 */
  3246. #endif /* !HAVE_SELFTEST && !HAVE_FIPS */
  3247. #ifdef WOLFSSL_AES_128
  3248. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_128_cfb128(void)
  3249. {
  3250. WOLFSSL_ENTER("wolfSSL_EVP_aes_128_cfb128");
  3251. if (EVP_AES_128_CFB128 == NULL)
  3252. wolfSSL_EVP_init();
  3253. return EVP_AES_128_CFB128;
  3254. }
  3255. #endif /* WOLFSSL_AES_128 */
  3256. #ifdef WOLFSSL_AES_192
  3257. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_192_cfb128(void)
  3258. {
  3259. WOLFSSL_ENTER("wolfSSL_EVP_aes_192_cfb128");
  3260. if (EVP_AES_192_CFB128 == NULL)
  3261. wolfSSL_EVP_init();
  3262. return EVP_AES_192_CFB128;
  3263. }
  3264. #endif /* WOLFSSL_AES_192 */
  3265. #ifdef WOLFSSL_AES_256
  3266. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_256_cfb128(void)
  3267. {
  3268. WOLFSSL_ENTER("wolfSSL_EVP_aes_256_cfb128");
  3269. if (EVP_AES_256_CFB128 == NULL)
  3270. wolfSSL_EVP_init();
  3271. return EVP_AES_256_CFB128;
  3272. }
  3273. #endif /* WOLFSSL_AES_256 */
  3274. #endif /* WOLFSSL_AES_CFB */
  3275. #ifdef WOLFSSL_AES_OFB
  3276. #ifdef WOLFSSL_AES_128
  3277. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_128_ofb(void)
  3278. {
  3279. WOLFSSL_ENTER("wolfSSL_EVP_aes_128_ofb");
  3280. if (EVP_AES_128_OFB == NULL)
  3281. wolfSSL_EVP_init();
  3282. return EVP_AES_128_OFB;
  3283. }
  3284. #endif /* WOLFSSL_AES_128 */
  3285. #ifdef WOLFSSL_AES_192
  3286. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_192_ofb(void)
  3287. {
  3288. WOLFSSL_ENTER("wolfSSL_EVP_aes_192_ofb");
  3289. if (EVP_AES_192_OFB == NULL)
  3290. wolfSSL_EVP_init();
  3291. return EVP_AES_192_OFB;
  3292. }
  3293. #endif /* WOLFSSL_AES_192 */
  3294. #ifdef WOLFSSL_AES_256
  3295. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_256_ofb(void)
  3296. {
  3297. WOLFSSL_ENTER("wolfSSL_EVP_aes_256_ofb");
  3298. if (EVP_AES_256_OFB == NULL)
  3299. wolfSSL_EVP_init();
  3300. return EVP_AES_256_OFB;
  3301. }
  3302. #endif /* WOLFSSL_AES_256 */
  3303. #endif /* WOLFSSL_AES_OFB */
  3304. #ifdef WOLFSSL_AES_XTS
  3305. #ifdef WOLFSSL_AES_128
  3306. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_128_xts(void)
  3307. {
  3308. WOLFSSL_ENTER("wolfSSL_EVP_aes_128_xts");
  3309. if (EVP_AES_128_XTS == NULL)
  3310. wolfSSL_EVP_init();
  3311. return EVP_AES_128_XTS;
  3312. }
  3313. #endif /* WOLFSSL_AES_128 */
  3314. #ifdef WOLFSSL_AES_256
  3315. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_256_xts(void)
  3316. {
  3317. WOLFSSL_ENTER("wolfSSL_EVP_aes_256_xts");
  3318. if (EVP_AES_256_XTS == NULL)
  3319. wolfSSL_EVP_init();
  3320. return EVP_AES_256_XTS;
  3321. }
  3322. #endif /* WOLFSSL_AES_256 */
  3323. #endif /* WOLFSSL_AES_XTS */
  3324. #ifdef HAVE_AESGCM
  3325. #ifdef WOLFSSL_AES_128
  3326. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_128_gcm(void)
  3327. {
  3328. WOLFSSL_ENTER("wolfSSL_EVP_aes_128_gcm");
  3329. if (EVP_AES_128_GCM == NULL)
  3330. wolfSSL_EVP_init();
  3331. return EVP_AES_128_GCM;
  3332. }
  3333. #endif /* WOLFSSL_GCM_128 */
  3334. #ifdef WOLFSSL_AES_192
  3335. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_192_gcm(void)
  3336. {
  3337. WOLFSSL_ENTER("wolfSSL_EVP_aes_192_gcm");
  3338. if (EVP_AES_192_GCM == NULL)
  3339. wolfSSL_EVP_init();
  3340. return EVP_AES_192_GCM;
  3341. }
  3342. #endif /* WOLFSSL_AES_192 */
  3343. #ifdef WOLFSSL_AES_256
  3344. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_256_gcm(void)
  3345. {
  3346. WOLFSSL_ENTER("wolfSSL_EVP_aes_256_gcm");
  3347. if (EVP_AES_256_GCM == NULL)
  3348. wolfSSL_EVP_init();
  3349. return EVP_AES_256_GCM;
  3350. }
  3351. #endif /* WOLFSSL_AES_256 */
  3352. #endif /* HAVE_AESGCM */
  3353. #ifdef WOLFSSL_AES_128
  3354. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_128_ctr(void)
  3355. {
  3356. WOLFSSL_ENTER("wolfSSL_EVP_aes_128_ctr");
  3357. if (EVP_AES_128_CTR == NULL)
  3358. wolfSSL_EVP_init();
  3359. return EVP_AES_128_CTR;
  3360. }
  3361. #endif /* WOLFSSL_AES_2128 */
  3362. #ifdef WOLFSSL_AES_192
  3363. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_192_ctr(void)
  3364. {
  3365. WOLFSSL_ENTER("wolfSSL_EVP_aes_192_ctr");
  3366. if (EVP_AES_192_CTR == NULL)
  3367. wolfSSL_EVP_init();
  3368. return EVP_AES_192_CTR;
  3369. }
  3370. #endif /* WOLFSSL_AES_192 */
  3371. #ifdef WOLFSSL_AES_256
  3372. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_256_ctr(void)
  3373. {
  3374. WOLFSSL_ENTER("wolfSSL_EVP_aes_256_ctr");
  3375. if (EVP_AES_256_CTR == NULL)
  3376. wolfSSL_EVP_init();
  3377. return EVP_AES_256_CTR;
  3378. }
  3379. #endif /* WOLFSSL_AES_256 */
  3380. #ifdef WOLFSSL_AES_128
  3381. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_128_ecb(void)
  3382. {
  3383. WOLFSSL_ENTER("wolfSSL_EVP_aes_128_ecb");
  3384. if (EVP_AES_128_ECB == NULL)
  3385. wolfSSL_EVP_init();
  3386. return EVP_AES_128_ECB;
  3387. }
  3388. #endif /* WOLFSSL_AES_128 */
  3389. #ifdef WOLFSSL_AES_192
  3390. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_192_ecb(void)
  3391. {
  3392. WOLFSSL_ENTER("wolfSSL_EVP_aes_192_ecb");
  3393. if (EVP_AES_192_ECB == NULL)
  3394. wolfSSL_EVP_init();
  3395. return EVP_AES_192_ECB;
  3396. }
  3397. #endif /* WOLFSSL_AES_192*/
  3398. #ifdef WOLFSSL_AES_256
  3399. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_256_ecb(void)
  3400. {
  3401. WOLFSSL_ENTER("wolfSSL_EVP_aes_256_ecb");
  3402. if (EVP_AES_256_ECB == NULL)
  3403. wolfSSL_EVP_init();
  3404. return EVP_AES_256_ECB;
  3405. }
  3406. #endif /* WOLFSSL_AES_256 */
  3407. #endif /* NO_AES */
  3408. #ifndef NO_DES3
  3409. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_des_cbc(void)
  3410. {
  3411. WOLFSSL_ENTER("wolfSSL_EVP_des_cbc");
  3412. if (EVP_DES_CBC == NULL)
  3413. wolfSSL_EVP_init();
  3414. return EVP_DES_CBC;
  3415. }
  3416. #ifdef WOLFSSL_DES_ECB
  3417. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_des_ecb(void)
  3418. {
  3419. WOLFSSL_ENTER("wolfSSL_EVP_des_ecb");
  3420. if (EVP_DES_ECB == NULL)
  3421. wolfSSL_EVP_init();
  3422. return EVP_DES_ECB;
  3423. }
  3424. #endif
  3425. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_des_ede3_cbc(void)
  3426. {
  3427. WOLFSSL_ENTER("wolfSSL_EVP_des_ede3_cbc");
  3428. if (EVP_DES_EDE3_CBC == NULL)
  3429. wolfSSL_EVP_init();
  3430. return EVP_DES_EDE3_CBC;
  3431. }
  3432. #ifdef WOLFSSL_DES_ECB
  3433. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_des_ede3_ecb(void)
  3434. {
  3435. WOLFSSL_ENTER("wolfSSL_EVP_des_ede3_ecb");
  3436. if (EVP_DES_EDE3_ECB == NULL)
  3437. wolfSSL_EVP_init();
  3438. return EVP_DES_EDE3_ECB;
  3439. }
  3440. #endif
  3441. #endif /* NO_DES3 */
  3442. #ifndef NO_RC4
  3443. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_rc4(void)
  3444. {
  3445. static const char* type = "ARC4";
  3446. WOLFSSL_ENTER("wolfSSL_EVP_rc4");
  3447. return type;
  3448. }
  3449. #endif
  3450. #ifdef HAVE_IDEA
  3451. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_idea_cbc(void)
  3452. {
  3453. WOLFSSL_ENTER("wolfSSL_EVP_idea_cbc");
  3454. if (EVP_IDEA_CBC == NULL)
  3455. wolfSSL_EVP_init();
  3456. return EVP_IDEA_CBC;
  3457. }
  3458. #endif
  3459. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_enc_null(void)
  3460. {
  3461. static const char* type = "NULL";
  3462. WOLFSSL_ENTER("wolfSSL_EVP_enc_null");
  3463. return type;
  3464. }
  3465. int wolfSSL_EVP_MD_CTX_cleanup(WOLFSSL_EVP_MD_CTX* ctx)
  3466. {
  3467. int ret = WOLFSSL_SUCCESS;
  3468. WOLFSSL_ENTER("EVP_MD_CTX_cleanup");
  3469. if (ctx->pctx != NULL)
  3470. wolfSSL_EVP_PKEY_CTX_free(ctx->pctx);
  3471. if (ctx->isHMAC) {
  3472. wc_HmacFree(&ctx->hash.hmac);
  3473. }
  3474. else {
  3475. switch (ctx->macType) {
  3476. case WC_HASH_TYPE_MD5:
  3477. #ifndef NO_MD5
  3478. wc_Md5Free((wc_Md5*)&ctx->hash.digest);
  3479. #endif /* !NO_MD5 */
  3480. break;
  3481. case WC_HASH_TYPE_SHA:
  3482. #ifndef NO_SHA
  3483. wc_ShaFree((wc_Sha*)&ctx->hash.digest);
  3484. #endif /* !NO_SHA */
  3485. break;
  3486. case WC_HASH_TYPE_SHA224:
  3487. #ifdef WOLFSSL_SHA224
  3488. wc_Sha224Free((wc_Sha224*)&ctx->hash.digest);
  3489. #endif /* WOLFSSL_SHA224 */
  3490. break;
  3491. case WC_HASH_TYPE_SHA256:
  3492. #ifndef NO_SHA256
  3493. wc_Sha256Free((wc_Sha256*)&ctx->hash.digest);
  3494. #endif /* !NO_SHA256 */
  3495. break;
  3496. case WC_HASH_TYPE_SHA384:
  3497. #ifdef WOLFSSL_SHA384
  3498. wc_Sha384Free((wc_Sha384*)&ctx->hash.digest);
  3499. #endif /* WOLFSSL_SHA384 */
  3500. break;
  3501. case WC_HASH_TYPE_SHA512:
  3502. #ifdef WOLFSSL_SHA512
  3503. wc_Sha512Free((wc_Sha512*)&ctx->hash.digest);
  3504. #endif /* WOLFSSL_SHA512 */
  3505. break;
  3506. case WC_HASH_TYPE_SHA3_224:
  3507. #if defined(WOLFSSL_SHA3) && !defined(WOLFSSL_NOSHA3_224)
  3508. wc_Sha3_224_Free((wc_Sha3*)&ctx->hash.digest);
  3509. #endif
  3510. break;
  3511. case WC_HASH_TYPE_SHA3_256:
  3512. #if defined(WOLFSSL_SHA3) && !defined(WOLFSSL_NOSHA3_256)
  3513. wc_Sha3_256_Free((wc_Sha3*)&ctx->hash.digest);
  3514. #endif
  3515. break;
  3516. case WC_HASH_TYPE_SHA3_384:
  3517. #if defined(WOLFSSL_SHA3)
  3518. wc_Sha3_384_Free((wc_Sha3*)&ctx->hash.digest);
  3519. #endif
  3520. break;
  3521. case WC_HASH_TYPE_SHA3_512:
  3522. #if defined(WOLFSSL_SHA3) && !defined(WOLFSSL_NOSHA3_512)
  3523. wc_Sha3_512_Free((wc_Sha3*)&ctx->hash.digest);
  3524. #endif
  3525. break;
  3526. case WC_HASH_TYPE_NONE:
  3527. case WC_HASH_TYPE_MD2:
  3528. case WC_HASH_TYPE_MD4:
  3529. case WC_HASH_TYPE_MD5_SHA:
  3530. case WC_HASH_TYPE_BLAKE2B:
  3531. case WC_HASH_TYPE_BLAKE2S:
  3532. default:
  3533. ret = WOLFSSL_FAILURE;
  3534. break;
  3535. }
  3536. }
  3537. ForceZero(ctx, sizeof(*ctx));
  3538. ctx->macType = WC_HASH_TYPE_NONE;
  3539. return ret;
  3540. }
  3541. void wolfSSL_EVP_CIPHER_CTX_init(WOLFSSL_EVP_CIPHER_CTX* ctx)
  3542. {
  3543. WOLFSSL_ENTER("EVP_CIPHER_CTX_init");
  3544. if (ctx) {
  3545. XMEMSET(ctx, 0, sizeof(WOLFSSL_EVP_CIPHER_CTX));
  3546. ctx->cipherType = WOLFSSL_EVP_CIPH_TYPE_INIT; /* not yet initialized */
  3547. ctx->keyLen = 0;
  3548. ctx->enc = 1; /* start in encrypt mode */
  3549. }
  3550. }
  3551. #if defined(HAVE_AESGCM) && !defined(HAVE_SELFTEST)
  3552. static WC_INLINE void IncCtr(byte* ctr, word32 ctrSz)
  3553. {
  3554. int i;
  3555. for (i = ctrSz-1; i >= 0; i--) {
  3556. if (++ctr[i])
  3557. break;
  3558. }
  3559. }
  3560. #endif
  3561. /* This function allows cipher specific parameters to be
  3562. determined and set. */
  3563. int wolfSSL_EVP_CIPHER_CTX_ctrl(WOLFSSL_EVP_CIPHER_CTX *ctx, int type, \
  3564. int arg, void *ptr)
  3565. {
  3566. int ret = WOLFSSL_FAILURE;
  3567. #if defined(HAVE_AESGCM) && !defined(HAVE_SELFTEST) && !defined(WC_NO_RNG)
  3568. WC_RNG rng;
  3569. #endif
  3570. if (ctx == NULL)
  3571. return WOLFSSL_FAILURE;
  3572. (void)arg;
  3573. (void)ptr;
  3574. WOLFSSL_ENTER("EVP_CIPHER_CTX_ctrl");
  3575. switch(type) {
  3576. case EVP_CTRL_INIT:
  3577. wolfSSL_EVP_CIPHER_CTX_init(ctx);
  3578. if(ctx)
  3579. ret = WOLFSSL_SUCCESS;
  3580. break;
  3581. case EVP_CTRL_SET_KEY_LENGTH:
  3582. ret = wolfSSL_EVP_CIPHER_CTX_set_key_length(ctx, arg);
  3583. break;
  3584. #if defined(HAVE_AESGCM) && !defined(HAVE_SELFTEST) && !defined(WC_NO_RNG)
  3585. case EVP_CTRL_GCM_SET_IVLEN:
  3586. if(arg <= 0 || arg > 16)
  3587. return WOLFSSL_FAILURE;
  3588. ret = wolfSSL_EVP_CIPHER_CTX_set_iv_length(ctx, arg);
  3589. break;
  3590. case EVP_CTRL_AEAD_SET_IV_FIXED:
  3591. if (arg == -1) {
  3592. /* arg == -1 copies ctx->ivSz from ptr */
  3593. ret = wolfSSL_EVP_CIPHER_CTX_set_iv(ctx, (byte*)ptr, ctx->ivSz);
  3594. }
  3595. else {
  3596. /*
  3597. * Fixed field must be at least 4 bytes and invocation
  3598. * field at least 8.
  3599. */
  3600. if ((arg < 4) || (ctx->ivSz - arg) < 8) {
  3601. WOLFSSL_MSG("Fixed field or invocation field too short");
  3602. ret = WOLFSSL_FAILURE;
  3603. break;
  3604. }
  3605. if (wc_InitRng(&rng) != 0) {
  3606. WOLFSSL_MSG("wc_InitRng failed");
  3607. ret = WOLFSSL_FAILURE;
  3608. break;
  3609. }
  3610. if (arg) {
  3611. XMEMCPY(ctx->iv, ptr, arg);
  3612. }
  3613. if (wc_RNG_GenerateBlock(&rng, ctx->iv + arg,
  3614. ctx->ivSz - arg) != 0) {
  3615. /* rng is freed immediately after if block so no need
  3616. * to do it here
  3617. */
  3618. WOLFSSL_MSG("wc_RNG_GenerateBlock failed");
  3619. ret = WOLFSSL_FAILURE;
  3620. }
  3621. if (wc_FreeRng(&rng) != 0) {
  3622. WOLFSSL_MSG("wc_FreeRng failed");
  3623. ret = WOLFSSL_FAILURE;
  3624. break;
  3625. }
  3626. }
  3627. break;
  3628. #if !defined(_WIN32) && !defined(HAVE_FIPS)
  3629. case EVP_CTRL_GCM_IV_GEN:
  3630. if (ctx->cipher.aes.keylen == 0 || ctx->ivSz == 0) {
  3631. ret = WOLFSSL_FAILURE;
  3632. WOLFSSL_MSG("Key or IV not set");
  3633. break;
  3634. }
  3635. if ((ret = wc_AesGcmSetExtIV(&ctx->cipher.aes, ctx->iv, ctx->ivSz)) != 0) {
  3636. WOLFSSL_MSG("wc_AesGcmSetIV failed");
  3637. ret = WOLFSSL_FAILURE;
  3638. }
  3639. /* OpenSSL increments the IV. Not sure why */
  3640. IncCtr(ctx->iv, ctx->ivSz);
  3641. break;
  3642. #endif
  3643. case EVP_CTRL_AEAD_SET_TAG:
  3644. if(arg <= 0 || arg > 16 || (ptr == NULL))
  3645. return WOLFSSL_FAILURE;
  3646. XMEMCPY(ctx->authTag, ptr, arg);
  3647. ctx->authTagSz = arg;
  3648. ret = WOLFSSL_SUCCESS;
  3649. break;
  3650. case EVP_CTRL_AEAD_GET_TAG:
  3651. if(arg <= 0 || arg > 16)
  3652. return WOLFSSL_FAILURE;
  3653. XMEMCPY(ptr, ctx->authTag, arg);
  3654. ret = WOLFSSL_SUCCESS;
  3655. break;
  3656. #endif /* HAVE_AESGCM && !HAVE_SELFTEST && !WC_NO_RNG */
  3657. default:
  3658. WOLFSSL_MSG("EVP_CIPHER_CTX_ctrl operation not yet handled");
  3659. ret = WOLFSSL_FAILURE;
  3660. }
  3661. return ret;
  3662. }
  3663. /* WOLFSSL_SUCCESS on ok */
  3664. int wolfSSL_EVP_CIPHER_CTX_cleanup(WOLFSSL_EVP_CIPHER_CTX* ctx)
  3665. {
  3666. WOLFSSL_ENTER("EVP_CIPHER_CTX_cleanup");
  3667. if (ctx) {
  3668. ctx->cipherType = WOLFSSL_EVP_CIPH_TYPE_INIT; /* not yet initialized */
  3669. ctx->keyLen = 0;
  3670. #ifdef HAVE_AESGCM
  3671. if (ctx->gcmDecryptBuffer) {
  3672. XFREE(ctx->gcmDecryptBuffer, NULL, DYNAMIC_TYPE_OPENSSL);
  3673. ctx->gcmDecryptBuffer = NULL;
  3674. }
  3675. ctx->gcmDecryptBufferLen = 0;
  3676. #endif
  3677. }
  3678. return WOLFSSL_SUCCESS;
  3679. }
  3680. /* Permanent stub for Qt compilation. */
  3681. #if defined(WOLFSSL_QT) && !defined(NO_WOLFSSL_STUB)
  3682. const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_rc2_cbc(void)
  3683. {
  3684. WOLFSSL_ENTER("wolfSSL_EVP_rc2_cbc");
  3685. WOLFSSL_STUB("EVP_rc2_cbc");
  3686. return NULL;
  3687. }
  3688. #endif
  3689. #if defined(WOLFSSL_ENCRYPTED_KEYS) && !defined(NO_PWDBASED)
  3690. int wolfSSL_EVP_BytesToKey(const WOLFSSL_EVP_CIPHER* type,
  3691. const WOLFSSL_EVP_MD* md, const byte* salt,
  3692. const byte* data, int sz, int count, byte* key, byte* iv)
  3693. {
  3694. int ret;
  3695. int hashType = WC_HASH_TYPE_NONE;
  3696. #ifdef WOLFSSL_SMALL_STACK
  3697. EncryptedInfo* info;
  3698. #else
  3699. EncryptedInfo info[1];
  3700. #endif
  3701. #ifdef WOLFSSL_SMALL_STACK
  3702. info = (EncryptedInfo*)XMALLOC(sizeof(EncryptedInfo), NULL,
  3703. DYNAMIC_TYPE_ENCRYPTEDINFO);
  3704. if (info == NULL) {
  3705. WOLFSSL_MSG("malloc failed");
  3706. return WOLFSSL_FAILURE;
  3707. }
  3708. #endif
  3709. XMEMSET(info, 0, sizeof(EncryptedInfo));
  3710. ret = wc_EncryptedInfoGet(info, type);
  3711. if (ret < 0)
  3712. goto end;
  3713. if (data == NULL) {
  3714. ret = info->keySz;
  3715. goto end;
  3716. }
  3717. ret = wolfSSL_EVP_get_hashinfo(md, &hashType, NULL);
  3718. if (ret == WOLFSSL_FAILURE)
  3719. goto end;
  3720. ret = wc_PBKDF1_ex(key, info->keySz, iv, info->ivSz, data, sz, salt,
  3721. EVP_SALT_SIZE, count, hashType, NULL);
  3722. if (ret == 0)
  3723. ret = info->keySz;
  3724. end:
  3725. #ifdef WOLFSSL_SMALL_STACK
  3726. XFREE(info, NULL, DYNAMIC_TYPE_ENCRYPTEDINFO);
  3727. #endif
  3728. if (ret < 0)
  3729. return 0; /* failure - for compatibility */
  3730. return ret;
  3731. }
  3732. #endif /* WOLFSSL_ENCRYPTED_KEYS && !NO_PWDBASED */
  3733. #ifndef NO_AES
  3734. static int AesSetKey_ex(Aes* aes, const byte* key, word32 len,
  3735. const byte* iv, int dir, int direct)
  3736. {
  3737. int ret;
  3738. /* wc_AesSetKey clear aes.reg if iv == NULL.
  3739. Keep IV for openSSL compatibility */
  3740. if (iv == NULL)
  3741. XMEMCPY((byte *)aes->tmp, (byte *)aes->reg, AES_BLOCK_SIZE);
  3742. if (direct) {
  3743. #if defined(WOLFSSL_AES_DIRECT)
  3744. ret = wc_AesSetKeyDirect(aes, key, len, iv, dir);
  3745. #else
  3746. ret = NOT_COMPILED_IN;
  3747. #endif
  3748. }
  3749. else {
  3750. ret = wc_AesSetKey(aes, key, len, iv, dir);
  3751. }
  3752. if (iv == NULL)
  3753. XMEMCPY((byte *)aes->reg, (byte *)aes->tmp, AES_BLOCK_SIZE);
  3754. return ret;
  3755. }
  3756. #endif
  3757. /* return WOLFSSL_SUCCESS on ok, 0 on failure to match API compatibility */
  3758. int wolfSSL_EVP_CipherInit(WOLFSSL_EVP_CIPHER_CTX* ctx,
  3759. const WOLFSSL_EVP_CIPHER* type, const byte* key,
  3760. const byte* iv, int enc)
  3761. {
  3762. int ret = 0;
  3763. (void)key;
  3764. (void)iv;
  3765. (void)enc;
  3766. WOLFSSL_ENTER("wolfSSL_EVP_CipherInit");
  3767. if (ctx == NULL) {
  3768. WOLFSSL_MSG("no ctx");
  3769. return WOLFSSL_FAILURE;
  3770. }
  3771. if (type == NULL && ctx->cipherType == WOLFSSL_EVP_CIPH_TYPE_INIT) {
  3772. WOLFSSL_MSG("no type set");
  3773. return WOLFSSL_FAILURE;
  3774. }
  3775. if (ctx->cipherType == WOLFSSL_EVP_CIPH_TYPE_INIT){
  3776. /* only first EVP_CipherInit invoke. ctx->cipherType is set below */
  3777. XMEMSET(&ctx->cipher, 0, sizeof(ctx->cipher));
  3778. ctx->flags = 0;
  3779. }
  3780. /* always clear buffer state */
  3781. ctx->bufUsed = 0;
  3782. ctx->lastUsed = 0;
  3783. #ifdef HAVE_WOLFSSL_EVP_CIPHER_CTX_IV
  3784. if (!iv && ctx->ivSz) {
  3785. iv = ctx->iv;
  3786. }
  3787. #endif
  3788. #ifndef NO_AES
  3789. #ifdef HAVE_AES_CBC
  3790. #ifdef WOLFSSL_AES_128
  3791. if (ctx->cipherType == AES_128_CBC_TYPE ||
  3792. (type && XSTRNCMP(type, EVP_AES_128_CBC, EVP_AES_SIZE) == 0)) {
  3793. WOLFSSL_MSG("EVP_AES_128_CBC");
  3794. ctx->cipherType = AES_128_CBC_TYPE;
  3795. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  3796. ctx->flags |= WOLFSSL_EVP_CIPH_CBC_MODE;
  3797. ctx->keyLen = 16;
  3798. ctx->block_size = AES_BLOCK_SIZE;
  3799. ctx->ivSz = AES_BLOCK_SIZE;
  3800. if (enc == 0 || enc == 1)
  3801. ctx->enc = enc ? 1 : 0;
  3802. if (key) {
  3803. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, iv,
  3804. ctx->enc ? AES_ENCRYPTION : AES_DECRYPTION, 0);
  3805. if (ret != 0)
  3806. return WOLFSSL_FAILURE;
  3807. }
  3808. if (iv && key == NULL) {
  3809. ret = wc_AesSetIV(&ctx->cipher.aes, iv);
  3810. if (ret != 0)
  3811. return WOLFSSL_FAILURE;
  3812. }
  3813. }
  3814. #endif /* WOLFSSL_AES_128 */
  3815. #ifdef WOLFSSL_AES_192
  3816. if (ctx->cipherType == AES_192_CBC_TYPE ||
  3817. (type && XSTRNCMP(type, EVP_AES_192_CBC, EVP_AES_SIZE) == 0)) {
  3818. WOLFSSL_MSG("EVP_AES_192_CBC");
  3819. ctx->cipherType = AES_192_CBC_TYPE;
  3820. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  3821. ctx->flags |= WOLFSSL_EVP_CIPH_CBC_MODE;
  3822. ctx->keyLen = 24;
  3823. ctx->block_size = AES_BLOCK_SIZE;
  3824. ctx->ivSz = AES_BLOCK_SIZE;
  3825. if (enc == 0 || enc == 1)
  3826. ctx->enc = enc ? 1 : 0;
  3827. if (key) {
  3828. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, iv,
  3829. ctx->enc ? AES_ENCRYPTION : AES_DECRYPTION, 0);
  3830. if (ret != 0)
  3831. return WOLFSSL_FAILURE;
  3832. }
  3833. if (iv && key == NULL) {
  3834. ret = wc_AesSetIV(&ctx->cipher.aes, iv);
  3835. if (ret != 0)
  3836. return WOLFSSL_FAILURE;
  3837. }
  3838. }
  3839. #endif /* WOLFSSL_AES_192 */
  3840. #ifdef WOLFSSL_AES_256
  3841. if (ctx->cipherType == AES_256_CBC_TYPE ||
  3842. (type && XSTRNCMP(type, EVP_AES_256_CBC, EVP_AES_SIZE) == 0)) {
  3843. WOLFSSL_MSG("EVP_AES_256_CBC");
  3844. ctx->cipherType = AES_256_CBC_TYPE;
  3845. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  3846. ctx->flags |= WOLFSSL_EVP_CIPH_CBC_MODE;
  3847. ctx->keyLen = 32;
  3848. ctx->block_size = AES_BLOCK_SIZE;
  3849. ctx->ivSz = AES_BLOCK_SIZE;
  3850. if (enc == 0 || enc == 1)
  3851. ctx->enc = enc ? 1 : 0;
  3852. if (key) {
  3853. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, iv,
  3854. ctx->enc ? AES_ENCRYPTION : AES_DECRYPTION, 0);
  3855. if (ret != 0){
  3856. WOLFSSL_MSG("AesSetKey() failed");
  3857. return WOLFSSL_FAILURE;
  3858. }
  3859. }
  3860. if (iv && key == NULL) {
  3861. ret = wc_AesSetIV(&ctx->cipher.aes, iv);
  3862. if (ret != 0){
  3863. WOLFSSL_MSG("wc_AesSetIV() failed");
  3864. return WOLFSSL_FAILURE;
  3865. }
  3866. }
  3867. }
  3868. #endif /* WOLFSSL_AES_256 */
  3869. #endif /* HAVE_AES_CBC */
  3870. #if (!defined(HAVE_FIPS) && !defined(HAVE_SELFTEST)) || \
  3871. (defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION >= 2))
  3872. #ifdef HAVE_AESGCM
  3873. #ifdef WOLFSSL_AES_128
  3874. if (ctx->cipherType == AES_128_GCM_TYPE ||
  3875. (type && XSTRNCMP(type, EVP_AES_128_GCM, EVP_AES_SIZE) == 0)) {
  3876. WOLFSSL_MSG("EVP_AES_128_GCM");
  3877. ctx->cipherType = AES_128_GCM_TYPE;
  3878. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  3879. ctx->flags |= WOLFSSL_EVP_CIPH_GCM_MODE;
  3880. ctx->keyLen = 16;
  3881. ctx->block_size = AES_BLOCK_SIZE;
  3882. ctx->authTagSz = AES_BLOCK_SIZE;
  3883. ctx->ivSz = GCM_NONCE_MID_SZ;
  3884. if (key && wc_AesGcmSetKey(&ctx->cipher.aes, key, ctx->keyLen)) {
  3885. WOLFSSL_MSG("wc_AesGcmSetKey() failed");
  3886. return WOLFSSL_FAILURE;
  3887. }
  3888. if (iv && wc_AesGcmSetExtIV(&ctx->cipher.aes, iv, GCM_NONCE_MID_SZ)) {
  3889. WOLFSSL_MSG("wc_AesGcmSetExtIV() failed");
  3890. return WOLFSSL_FAILURE;
  3891. }
  3892. if (enc == 0 || enc == 1)
  3893. ctx->enc = enc ? 1 : 0;
  3894. }
  3895. #endif /* WOLFSSL_AES_128 */
  3896. #ifdef WOLFSSL_AES_192
  3897. if (ctx->cipherType == AES_192_GCM_TYPE ||
  3898. (type && XSTRNCMP(type, EVP_AES_192_GCM, EVP_AES_SIZE) == 0)) {
  3899. WOLFSSL_MSG("EVP_AES_192_GCM");
  3900. ctx->cipherType = AES_192_GCM_TYPE;
  3901. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  3902. ctx->flags |= WOLFSSL_EVP_CIPH_GCM_MODE;
  3903. ctx->keyLen = 24;
  3904. ctx->block_size = AES_BLOCK_SIZE;
  3905. ctx->authTagSz = AES_BLOCK_SIZE;
  3906. ctx->ivSz = GCM_NONCE_MID_SZ;
  3907. if (key && wc_AesGcmSetKey(&ctx->cipher.aes, key, ctx->keyLen)) {
  3908. WOLFSSL_MSG("wc_AesGcmSetKey() failed");
  3909. return WOLFSSL_FAILURE;
  3910. }
  3911. if (iv && wc_AesGcmSetExtIV(&ctx->cipher.aes, iv, GCM_NONCE_MID_SZ)) {
  3912. WOLFSSL_MSG("wc_AesGcmSetExtIV() failed");
  3913. return WOLFSSL_FAILURE;
  3914. }
  3915. if (enc == 0 || enc == 1)
  3916. ctx->enc = enc ? 1 : 0;
  3917. }
  3918. #endif /* WOLFSSL_AES_192 */
  3919. #ifdef WOLFSSL_AES_256
  3920. if (ctx->cipherType == AES_256_GCM_TYPE ||
  3921. (type && XSTRNCMP(type, EVP_AES_256_GCM, EVP_AES_SIZE) == 0)) {
  3922. WOLFSSL_MSG("EVP_AES_256_GCM");
  3923. ctx->cipherType = AES_256_GCM_TYPE;
  3924. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  3925. ctx->flags |= WOLFSSL_EVP_CIPH_GCM_MODE;
  3926. ctx->keyLen = 32;
  3927. ctx->block_size = AES_BLOCK_SIZE;
  3928. ctx->authTagSz = AES_BLOCK_SIZE;
  3929. ctx->ivSz = GCM_NONCE_MID_SZ;
  3930. if (key && wc_AesGcmSetKey(&ctx->cipher.aes, key, ctx->keyLen)) {
  3931. WOLFSSL_MSG("wc_AesGcmSetKey() failed");
  3932. return WOLFSSL_FAILURE;
  3933. }
  3934. if (iv && wc_AesGcmSetExtIV(&ctx->cipher.aes, iv, GCM_NONCE_MID_SZ)) {
  3935. WOLFSSL_MSG("wc_AesGcmSetExtIV() failed");
  3936. return WOLFSSL_FAILURE;
  3937. }
  3938. if (enc == 0 || enc == 1)
  3939. ctx->enc = enc ? 1 : 0;
  3940. }
  3941. #endif /* WOLFSSL_AES_256 */
  3942. #endif /* HAVE_AESGCM */
  3943. #endif /*!HAVE_FIPS && !HAVE_SELFTEST ||(HAVE_FIPS_VERSION && HAVE_FIPS_VERSION >= 2)*/
  3944. #ifdef WOLFSSL_AES_COUNTER
  3945. #ifdef WOLFSSL_AES_128
  3946. if (ctx->cipherType == AES_128_CTR_TYPE ||
  3947. (type && XSTRNCMP(type, EVP_AES_128_CTR, EVP_AES_SIZE) == 0)) {
  3948. WOLFSSL_MSG("EVP_AES_128_CTR");
  3949. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  3950. ctx->cipherType = AES_128_CTR_TYPE;
  3951. ctx->flags |= WOLFSSL_EVP_CIPH_CTR_MODE;
  3952. ctx->keyLen = 16;
  3953. ctx->block_size = NO_PADDING_BLOCK_SIZE;
  3954. ctx->ivSz = AES_BLOCK_SIZE;
  3955. #if defined(WOLFSSL_AES_COUNTER) || defined(WOLFSSL_AES_CFB)
  3956. ctx->cipher.aes.left = 0;
  3957. #endif
  3958. if (enc == 0 || enc == 1)
  3959. ctx->enc = enc ? 1 : 0;
  3960. if (key) {
  3961. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, iv,
  3962. AES_ENCRYPTION, 1);
  3963. if (ret != 0)
  3964. return WOLFSSL_FAILURE;
  3965. }
  3966. if (iv && key == NULL) {
  3967. ret = wc_AesSetIV(&ctx->cipher.aes, iv);
  3968. if (ret != 0)
  3969. return WOLFSSL_FAILURE;
  3970. }
  3971. }
  3972. #endif /* WOLFSSL_AES_128 */
  3973. #ifdef WOLFSSL_AES_192
  3974. if (ctx->cipherType == AES_192_CTR_TYPE ||
  3975. (type && XSTRNCMP(type, EVP_AES_192_CTR, EVP_AES_SIZE) == 0)) {
  3976. WOLFSSL_MSG("EVP_AES_192_CTR");
  3977. ctx->cipherType = AES_192_CTR_TYPE;
  3978. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  3979. ctx->flags |= WOLFSSL_EVP_CIPH_CTR_MODE;
  3980. ctx->keyLen = 24;
  3981. ctx->block_size = NO_PADDING_BLOCK_SIZE;
  3982. ctx->ivSz = AES_BLOCK_SIZE;
  3983. #if defined(WOLFSSL_AES_COUNTER) || defined(WOLFSSL_AES_CFB)
  3984. ctx->cipher.aes.left = 0;
  3985. #endif
  3986. if (enc == 0 || enc == 1)
  3987. ctx->enc = enc ? 1 : 0;
  3988. if (key) {
  3989. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, iv,
  3990. AES_ENCRYPTION, 1);
  3991. if (ret != 0)
  3992. return WOLFSSL_FAILURE;
  3993. }
  3994. if (iv && key == NULL) {
  3995. ret = wc_AesSetIV(&ctx->cipher.aes, iv);
  3996. if (ret != 0)
  3997. return WOLFSSL_FAILURE;
  3998. }
  3999. }
  4000. #endif /* WOLFSSL_AES_192 */
  4001. #ifdef WOLFSSL_AES_256
  4002. if (ctx->cipherType == AES_256_CTR_TYPE ||
  4003. (type && XSTRNCMP(type, EVP_AES_256_CTR, EVP_AES_SIZE) == 0)) {
  4004. WOLFSSL_MSG("EVP_AES_256_CTR");
  4005. ctx->cipherType = AES_256_CTR_TYPE;
  4006. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4007. ctx->flags |= WOLFSSL_EVP_CIPH_CTR_MODE;
  4008. ctx->keyLen = 32;
  4009. ctx->block_size = NO_PADDING_BLOCK_SIZE;
  4010. ctx->ivSz = AES_BLOCK_SIZE;
  4011. #if defined(WOLFSSL_AES_COUNTER) || defined(WOLFSSL_AES_CFB)
  4012. ctx->cipher.aes.left = 0;
  4013. #endif
  4014. if (enc == 0 || enc == 1)
  4015. ctx->enc = enc ? 1 : 0;
  4016. if (key) {
  4017. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, iv,
  4018. AES_ENCRYPTION, 1);
  4019. if (ret != 0)
  4020. return WOLFSSL_FAILURE;
  4021. }
  4022. if (iv && key == NULL) {
  4023. ret = wc_AesSetIV(&ctx->cipher.aes, iv);
  4024. if (ret != 0)
  4025. return WOLFSSL_FAILURE;
  4026. }
  4027. }
  4028. #endif /* WOLFSSL_AES_256 */
  4029. #endif /* WOLFSSL_AES_COUNTER */
  4030. #ifdef WOLFSSL_AES_128
  4031. if (ctx->cipherType == AES_128_ECB_TYPE ||
  4032. (type && XSTRNCMP(type, EVP_AES_128_ECB, EVP_AES_SIZE) == 0)) {
  4033. WOLFSSL_MSG("EVP_AES_128_ECB");
  4034. ctx->cipherType = AES_128_ECB_TYPE;
  4035. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4036. ctx->flags |= WOLFSSL_EVP_CIPH_ECB_MODE;
  4037. ctx->keyLen = 16;
  4038. ctx->block_size = AES_BLOCK_SIZE;
  4039. if (enc == 0 || enc == 1)
  4040. ctx->enc = enc ? 1 : 0;
  4041. if (key) {
  4042. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, NULL,
  4043. ctx->enc ? AES_ENCRYPTION : AES_DECRYPTION, 1);
  4044. }
  4045. if (ret != 0)
  4046. return WOLFSSL_FAILURE;
  4047. }
  4048. #endif /* WOLFSSL_AES_128 */
  4049. #ifdef WOLFSSL_AES_192
  4050. if (ctx->cipherType == AES_192_ECB_TYPE ||
  4051. (type && XSTRNCMP(type, EVP_AES_192_ECB, EVP_AES_SIZE) == 0)) {
  4052. WOLFSSL_MSG("EVP_AES_192_ECB");
  4053. ctx->cipherType = AES_192_ECB_TYPE;
  4054. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4055. ctx->flags |= WOLFSSL_EVP_CIPH_ECB_MODE;
  4056. ctx->keyLen = 24;
  4057. ctx->block_size = AES_BLOCK_SIZE;
  4058. if (enc == 0 || enc == 1)
  4059. ctx->enc = enc ? 1 : 0;
  4060. if (key) {
  4061. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, NULL,
  4062. ctx->enc ? AES_ENCRYPTION : AES_DECRYPTION, 1);
  4063. }
  4064. if (ret != 0)
  4065. return WOLFSSL_FAILURE;
  4066. }
  4067. #endif /* WOLFSSL_AES_192 */
  4068. #ifdef WOLFSSL_AES_256
  4069. if (ctx->cipherType == AES_256_ECB_TYPE ||
  4070. (type && XSTRNCMP(type, EVP_AES_256_ECB, EVP_AES_SIZE) == 0)) {
  4071. WOLFSSL_MSG("EVP_AES_256_ECB");
  4072. ctx->cipherType = AES_256_ECB_TYPE;
  4073. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4074. ctx->flags |= WOLFSSL_EVP_CIPH_ECB_MODE;
  4075. ctx->keyLen = 32;
  4076. ctx->block_size = AES_BLOCK_SIZE;
  4077. if (enc == 0 || enc == 1)
  4078. ctx->enc = enc ? 1 : 0;
  4079. if (key) {
  4080. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, NULL,
  4081. ctx->enc ? AES_ENCRYPTION : AES_DECRYPTION, 1);
  4082. }
  4083. if (ret != 0)
  4084. return WOLFSSL_FAILURE;
  4085. }
  4086. #endif /* WOLFSSL_AES_256 */
  4087. #ifdef WOLFSSL_AES_CFB
  4088. #ifdef WOLFSSL_AES_128
  4089. if (ctx->cipherType == AES_128_CFB1_TYPE ||
  4090. (type && XSTRNCMP(type, EVP_AES_128_CFB1, EVP_AESCFB_SIZE) == 0)) {
  4091. WOLFSSL_MSG("EVP_AES_128_CFB1");
  4092. ctx->cipherType = AES_128_CFB1_TYPE;
  4093. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4094. ctx->flags |= WOLFSSL_EVP_CIPH_CFB_MODE;
  4095. ctx->keyLen = 16;
  4096. ctx->block_size = 1;
  4097. if (enc == 0 || enc == 1)
  4098. ctx->enc = enc ? 1 : 0;
  4099. if (key) {
  4100. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, iv,
  4101. AES_ENCRYPTION, 0);
  4102. if (ret != 0)
  4103. return WOLFSSL_FAILURE;
  4104. }
  4105. if (iv && key == NULL) {
  4106. ret = wc_AesSetIV(&ctx->cipher.aes, iv);
  4107. if (ret != 0)
  4108. return WOLFSSL_FAILURE;
  4109. }
  4110. }
  4111. #endif /* WOLFSSL_AES_128 */
  4112. #ifdef WOLFSSL_AES_192
  4113. if (ctx->cipherType == AES_192_CFB1_TYPE ||
  4114. (type && XSTRNCMP(type, EVP_AES_192_CFB1, EVP_AESCFB_SIZE) == 0)) {
  4115. WOLFSSL_MSG("EVP_AES_192_CFB1");
  4116. ctx->cipherType = AES_192_CFB1_TYPE;
  4117. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4118. ctx->flags |= WOLFSSL_EVP_CIPH_CFB_MODE;
  4119. ctx->keyLen = 24;
  4120. ctx->block_size = 1;
  4121. if (enc == 0 || enc == 1)
  4122. ctx->enc = enc ? 1 : 0;
  4123. if (key) {
  4124. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, iv,
  4125. AES_ENCRYPTION, 0);
  4126. if (ret != 0)
  4127. return WOLFSSL_FAILURE;
  4128. }
  4129. if (iv && key == NULL) {
  4130. ret = wc_AesSetIV(&ctx->cipher.aes, iv);
  4131. if (ret != 0)
  4132. return WOLFSSL_FAILURE;
  4133. }
  4134. }
  4135. #endif /* WOLFSSL_AES_192 */
  4136. #ifdef WOLFSSL_AES_256
  4137. if (ctx->cipherType == AES_256_CFB1_TYPE ||
  4138. (type && XSTRNCMP(type, EVP_AES_256_CFB1, EVP_AESCFB_SIZE) == 0)) {
  4139. WOLFSSL_MSG("EVP_AES_256_CFB1");
  4140. ctx->cipherType = AES_256_CFB1_TYPE;
  4141. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4142. ctx->flags |= WOLFSSL_EVP_CIPH_CFB_MODE;
  4143. ctx->keyLen = 32;
  4144. ctx->block_size = 1;
  4145. if (enc == 0 || enc == 1)
  4146. ctx->enc = enc ? 1 : 0;
  4147. if (key) {
  4148. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, iv,
  4149. AES_ENCRYPTION, 0);
  4150. if (ret != 0){
  4151. WOLFSSL_MSG("AesSetKey() failed");
  4152. return WOLFSSL_FAILURE;
  4153. }
  4154. }
  4155. if (iv && key == NULL) {
  4156. ret = wc_AesSetIV(&ctx->cipher.aes, iv);
  4157. if (ret != 0){
  4158. WOLFSSL_MSG("wc_AesSetIV() failed");
  4159. return WOLFSSL_FAILURE;
  4160. }
  4161. }
  4162. }
  4163. #endif /* WOLFSSL_AES_256 */
  4164. #ifdef WOLFSSL_AES_128
  4165. if (ctx->cipherType == AES_128_CFB8_TYPE ||
  4166. (type && XSTRNCMP(type, EVP_AES_128_CFB8, EVP_AESCFB_SIZE) == 0)) {
  4167. WOLFSSL_MSG("EVP_AES_128_CFB8");
  4168. ctx->cipherType = AES_128_CFB8_TYPE;
  4169. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4170. ctx->flags |= WOLFSSL_EVP_CIPH_CFB_MODE;
  4171. ctx->keyLen = 16;
  4172. ctx->block_size = 1;
  4173. if (enc == 0 || enc == 1)
  4174. ctx->enc = enc ? 1 : 0;
  4175. if (key) {
  4176. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, iv,
  4177. AES_ENCRYPTION, 0);
  4178. if (ret != 0)
  4179. return WOLFSSL_FAILURE;
  4180. }
  4181. if (iv && key == NULL) {
  4182. ret = wc_AesSetIV(&ctx->cipher.aes, iv);
  4183. if (ret != 0)
  4184. return WOLFSSL_FAILURE;
  4185. }
  4186. }
  4187. #endif /* WOLFSSL_AES_128 */
  4188. #ifdef WOLFSSL_AES_192
  4189. if (ctx->cipherType == AES_192_CFB8_TYPE ||
  4190. (type && XSTRNCMP(type, EVP_AES_192_CFB8, EVP_AESCFB_SIZE) == 0)) {
  4191. WOLFSSL_MSG("EVP_AES_192_CFB8");
  4192. ctx->cipherType = AES_192_CFB8_TYPE;
  4193. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4194. ctx->flags |= WOLFSSL_EVP_CIPH_CFB_MODE;
  4195. ctx->keyLen = 24;
  4196. ctx->block_size = 1;
  4197. if (enc == 0 || enc == 1)
  4198. ctx->enc = enc ? 1 : 0;
  4199. if (key) {
  4200. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, iv,
  4201. AES_ENCRYPTION, 0);
  4202. if (ret != 0)
  4203. return WOLFSSL_FAILURE;
  4204. }
  4205. if (iv && key == NULL) {
  4206. ret = wc_AesSetIV(&ctx->cipher.aes, iv);
  4207. if (ret != 0)
  4208. return WOLFSSL_FAILURE;
  4209. }
  4210. }
  4211. #endif /* WOLFSSL_AES_192 */
  4212. #ifdef WOLFSSL_AES_256
  4213. if (ctx->cipherType == AES_256_CFB8_TYPE ||
  4214. (type && XSTRNCMP(type, EVP_AES_256_CFB8, EVP_AESCFB_SIZE) == 0)) {
  4215. WOLFSSL_MSG("EVP_AES_256_CFB8");
  4216. ctx->cipherType = AES_256_CFB8_TYPE;
  4217. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4218. ctx->flags |= WOLFSSL_EVP_CIPH_CFB_MODE;
  4219. ctx->keyLen = 32;
  4220. ctx->block_size = 1;
  4221. if (enc == 0 || enc == 1)
  4222. ctx->enc = enc ? 1 : 0;
  4223. if (key) {
  4224. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, iv,
  4225. AES_ENCRYPTION, 0);
  4226. if (ret != 0){
  4227. WOLFSSL_MSG("AesSetKey() failed");
  4228. return WOLFSSL_FAILURE;
  4229. }
  4230. }
  4231. if (iv && key == NULL) {
  4232. ret = wc_AesSetIV(&ctx->cipher.aes, iv);
  4233. if (ret != 0){
  4234. WOLFSSL_MSG("wc_AesSetIV() failed");
  4235. return WOLFSSL_FAILURE;
  4236. }
  4237. }
  4238. }
  4239. #endif /* WOLFSSL_AES_256 */
  4240. #ifdef WOLFSSL_AES_128
  4241. if (ctx->cipherType == AES_128_CFB128_TYPE ||
  4242. (type && XSTRNCMP(type, EVP_AES_128_CFB128, EVP_AESCFB_SIZE) == 0)) {
  4243. WOLFSSL_MSG("EVP_AES_128_CFB128");
  4244. ctx->cipherType = AES_128_CFB128_TYPE;
  4245. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4246. ctx->flags |= WOLFSSL_EVP_CIPH_CFB_MODE;
  4247. ctx->keyLen = 16;
  4248. ctx->block_size = 1;
  4249. if (enc == 0 || enc == 1)
  4250. ctx->enc = enc ? 1 : 0;
  4251. if (key) {
  4252. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, iv,
  4253. AES_ENCRYPTION, 0);
  4254. if (ret != 0)
  4255. return WOLFSSL_FAILURE;
  4256. }
  4257. if (iv && key == NULL) {
  4258. ret = wc_AesSetIV(&ctx->cipher.aes, iv);
  4259. if (ret != 0)
  4260. return WOLFSSL_FAILURE;
  4261. }
  4262. }
  4263. #endif /* WOLFSSL_AES_128 */
  4264. #ifdef WOLFSSL_AES_192
  4265. if (ctx->cipherType == AES_192_CFB128_TYPE ||
  4266. (type && XSTRNCMP(type, EVP_AES_192_CFB128, EVP_AESCFB_SIZE) == 0)) {
  4267. WOLFSSL_MSG("EVP_AES_192_CFB128");
  4268. ctx->cipherType = AES_192_CFB128_TYPE;
  4269. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4270. ctx->flags |= WOLFSSL_EVP_CIPH_CFB_MODE;
  4271. ctx->keyLen = 24;
  4272. ctx->block_size = 1;
  4273. if (enc == 0 || enc == 1)
  4274. ctx->enc = enc ? 1 : 0;
  4275. if (key) {
  4276. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, iv,
  4277. AES_ENCRYPTION, 0);
  4278. if (ret != 0)
  4279. return WOLFSSL_FAILURE;
  4280. }
  4281. if (iv && key == NULL) {
  4282. ret = wc_AesSetIV(&ctx->cipher.aes, iv);
  4283. if (ret != 0)
  4284. return WOLFSSL_FAILURE;
  4285. }
  4286. }
  4287. #endif /* WOLFSSL_AES_192 */
  4288. #ifdef WOLFSSL_AES_256
  4289. if (ctx->cipherType == AES_256_CFB128_TYPE ||
  4290. (type && XSTRNCMP(type, EVP_AES_256_CFB128, EVP_AESCFB_SIZE) == 0)) {
  4291. WOLFSSL_MSG("EVP_AES_256_CFB128");
  4292. ctx->cipherType = AES_256_CFB128_TYPE;
  4293. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4294. ctx->flags |= WOLFSSL_EVP_CIPH_CFB_MODE;
  4295. ctx->keyLen = 32;
  4296. ctx->block_size = 1;
  4297. if (enc == 0 || enc == 1)
  4298. ctx->enc = enc ? 1 : 0;
  4299. if (key) {
  4300. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, iv,
  4301. AES_ENCRYPTION, 0);
  4302. if (ret != 0){
  4303. WOLFSSL_MSG("AesSetKey() failed");
  4304. return WOLFSSL_FAILURE;
  4305. }
  4306. }
  4307. if (iv && key == NULL) {
  4308. ret = wc_AesSetIV(&ctx->cipher.aes, iv);
  4309. if (ret != 0){
  4310. WOLFSSL_MSG("wc_AesSetIV() failed");
  4311. return WOLFSSL_FAILURE;
  4312. }
  4313. }
  4314. }
  4315. #endif /* WOLFSSL_AES_256 */
  4316. #endif /* HAVE_AES_CFB */
  4317. #ifdef WOLFSSL_AES_OFB
  4318. #ifdef WOLFSSL_AES_128
  4319. if (ctx->cipherType == AES_128_OFB_TYPE ||
  4320. (type && XSTRNCMP(type, EVP_AES_128_OFB, EVP_AES_SIZE) == 0)) {
  4321. WOLFSSL_MSG("EVP_AES_128_OFB");
  4322. ctx->cipherType = AES_128_OFB_TYPE;
  4323. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4324. ctx->flags |= WOLFSSL_EVP_CIPH_OFB_MODE;
  4325. ctx->keyLen = 16;
  4326. ctx->block_size = 1;
  4327. if (enc == 0 || enc == 1)
  4328. ctx->enc = enc ? 1 : 0;
  4329. if (key) {
  4330. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, iv,
  4331. AES_ENCRYPTION, 0);
  4332. if (ret != 0)
  4333. return WOLFSSL_FAILURE;
  4334. }
  4335. if (iv && key == NULL) {
  4336. ret = wc_AesSetIV(&ctx->cipher.aes, iv);
  4337. if (ret != 0)
  4338. return WOLFSSL_FAILURE;
  4339. }
  4340. }
  4341. #endif /* WOLFSSL_AES_128 */
  4342. #ifdef WOLFSSL_AES_192
  4343. if (ctx->cipherType == AES_192_OFB_TYPE ||
  4344. (type && XSTRNCMP(type, EVP_AES_192_OFB, EVP_AES_SIZE) == 0)) {
  4345. WOLFSSL_MSG("EVP_AES_192_OFB");
  4346. ctx->cipherType = AES_192_OFB_TYPE;
  4347. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4348. ctx->flags |= WOLFSSL_EVP_CIPH_OFB_MODE;
  4349. ctx->keyLen = 24;
  4350. ctx->block_size = 1;
  4351. if (enc == 0 || enc == 1)
  4352. ctx->enc = enc ? 1 : 0;
  4353. if (key) {
  4354. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, iv,
  4355. AES_ENCRYPTION, 0);
  4356. if (ret != 0)
  4357. return WOLFSSL_FAILURE;
  4358. }
  4359. if (iv && key == NULL) {
  4360. ret = wc_AesSetIV(&ctx->cipher.aes, iv);
  4361. if (ret != 0)
  4362. return WOLFSSL_FAILURE;
  4363. }
  4364. }
  4365. #endif /* WOLFSSL_AES_192 */
  4366. #ifdef WOLFSSL_AES_256
  4367. if (ctx->cipherType == AES_256_OFB_TYPE ||
  4368. (type && XSTRNCMP(type, EVP_AES_256_OFB, EVP_AES_SIZE) == 0)) {
  4369. WOLFSSL_MSG("EVP_AES_256_OFB");
  4370. ctx->cipherType = AES_256_OFB_TYPE;
  4371. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4372. ctx->flags |= WOLFSSL_EVP_CIPH_OFB_MODE;
  4373. ctx->keyLen = 32;
  4374. ctx->block_size = 1;
  4375. if (enc == 0 || enc == 1)
  4376. ctx->enc = enc ? 1 : 0;
  4377. if (key) {
  4378. ret = AesSetKey_ex(&ctx->cipher.aes, key, ctx->keyLen, iv,
  4379. AES_ENCRYPTION, 0);
  4380. if (ret != 0){
  4381. WOLFSSL_MSG("AesSetKey() failed");
  4382. return WOLFSSL_FAILURE;
  4383. }
  4384. }
  4385. if (iv && key == NULL) {
  4386. ret = wc_AesSetIV(&ctx->cipher.aes, iv);
  4387. if (ret != 0){
  4388. WOLFSSL_MSG("wc_AesSetIV() failed");
  4389. return WOLFSSL_FAILURE;
  4390. }
  4391. }
  4392. }
  4393. #endif /* WOLFSSL_AES_256 */
  4394. #endif /* HAVE_AES_OFB */
  4395. #ifdef WOLFSSL_AES_XTS
  4396. #ifdef WOLFSSL_AES_128
  4397. if (ctx->cipherType == AES_128_XTS_TYPE ||
  4398. (type && XSTRNCMP(type, EVP_AES_128_XTS, EVP_AES_SIZE) == 0)) {
  4399. WOLFSSL_MSG("EVP_AES_128_XTS");
  4400. ctx->cipherType = AES_128_XTS_TYPE;
  4401. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4402. ctx->flags |= WOLFSSL_EVP_CIPH_XTS_MODE;
  4403. ctx->keyLen = 32;
  4404. ctx->block_size = 1;
  4405. ctx->ivSz = AES_BLOCK_SIZE;
  4406. if (iv != NULL) {
  4407. if (iv != ctx->iv) /* Valgrind error when src == dst */
  4408. XMEMCPY(ctx->iv, iv, ctx->ivSz);
  4409. }
  4410. else
  4411. XMEMSET(ctx->iv, 0, AES_BLOCK_SIZE);
  4412. if (enc == 0 || enc == 1)
  4413. ctx->enc = enc ? 1 : 0;
  4414. if (key) {
  4415. ret = wc_AesXtsSetKey(&ctx->cipher.xts, key, ctx->keyLen,
  4416. ctx->enc ? AES_ENCRYPTION : AES_DECRYPTION, NULL, 0);
  4417. if (ret != 0) {
  4418. WOLFSSL_MSG("wc_AesXtsSetKey() failed");
  4419. return WOLFSSL_FAILURE;
  4420. }
  4421. }
  4422. }
  4423. #endif /* WOLFSSL_AES_128 */
  4424. #ifdef WOLFSSL_AES_256
  4425. if (ctx->cipherType == AES_256_XTS_TYPE ||
  4426. (type && XSTRNCMP(type, EVP_AES_256_XTS, EVP_AES_SIZE) == 0)) {
  4427. WOLFSSL_MSG("EVP_AES_256_XTS");
  4428. ctx->cipherType = AES_256_XTS_TYPE;
  4429. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4430. ctx->flags |= WOLFSSL_EVP_CIPH_XTS_MODE;
  4431. ctx->keyLen = 64;
  4432. ctx->block_size = 1;
  4433. ctx->ivSz = AES_BLOCK_SIZE;
  4434. if (iv != NULL) {
  4435. if (iv != ctx->iv) /* Valgrind error when src == dst */
  4436. XMEMCPY(ctx->iv, iv, ctx->ivSz);
  4437. }
  4438. else
  4439. XMEMSET(ctx->iv, 0, AES_BLOCK_SIZE);
  4440. if (enc == 0 || enc == 1)
  4441. ctx->enc = enc ? 1 : 0;
  4442. if (key) {
  4443. ret = wc_AesXtsSetKey(&ctx->cipher.xts, key, ctx->keyLen,
  4444. ctx->enc ? AES_ENCRYPTION : AES_DECRYPTION, NULL, 0);
  4445. if (ret != 0) {
  4446. WOLFSSL_MSG("wc_AesXtsSetKey() failed");
  4447. return WOLFSSL_FAILURE;
  4448. }
  4449. }
  4450. }
  4451. #endif /* WOLFSSL_AES_256 */
  4452. #endif /* HAVE_AES_XTS */
  4453. #endif /* NO_AES */
  4454. #ifndef NO_DES3
  4455. if (ctx->cipherType == DES_CBC_TYPE ||
  4456. (type && XSTRNCMP(type, EVP_DES_CBC, EVP_DES_SIZE) == 0)) {
  4457. WOLFSSL_MSG("EVP_DES_CBC");
  4458. ctx->cipherType = DES_CBC_TYPE;
  4459. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4460. ctx->flags |= WOLFSSL_EVP_CIPH_CBC_MODE;
  4461. ctx->keyLen = 8;
  4462. ctx->block_size = DES_BLOCK_SIZE;
  4463. ctx->ivSz = DES_BLOCK_SIZE;
  4464. if (enc == 0 || enc == 1)
  4465. ctx->enc = enc ? 1 : 0;
  4466. if (key) {
  4467. ret = wc_Des_SetKey(&ctx->cipher.des, key, iv,
  4468. ctx->enc ? DES_ENCRYPTION : DES_DECRYPTION);
  4469. if (ret != 0)
  4470. return WOLFSSL_FAILURE;
  4471. }
  4472. if (iv && key == NULL)
  4473. wc_Des_SetIV(&ctx->cipher.des, iv);
  4474. }
  4475. #ifdef WOLFSSL_DES_ECB
  4476. else if (ctx->cipherType == DES_ECB_TYPE ||
  4477. (type && XSTRNCMP(type, EVP_DES_ECB, EVP_DES_SIZE) == 0)) {
  4478. WOLFSSL_MSG("EVP_DES_ECB");
  4479. ctx->cipherType = DES_ECB_TYPE;
  4480. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4481. ctx->flags |= WOLFSSL_EVP_CIPH_ECB_MODE;
  4482. ctx->keyLen = 8;
  4483. ctx->block_size = DES_BLOCK_SIZE;
  4484. if (enc == 0 || enc == 1)
  4485. ctx->enc = enc ? 1 : 0;
  4486. if (key) {
  4487. WOLFSSL_MSG("Des_SetKey");
  4488. ret = wc_Des_SetKey(&ctx->cipher.des, key, NULL,
  4489. ctx->enc ? DES_ENCRYPTION : DES_DECRYPTION);
  4490. if (ret != 0)
  4491. return WOLFSSL_FAILURE;
  4492. }
  4493. }
  4494. #endif
  4495. else if (ctx->cipherType == DES_EDE3_CBC_TYPE ||
  4496. (type &&
  4497. XSTRNCMP(type, EVP_DES_EDE3_CBC, EVP_DES_EDE3_SIZE) == 0)) {
  4498. WOLFSSL_MSG("EVP_DES_EDE3_CBC");
  4499. ctx->cipherType = DES_EDE3_CBC_TYPE;
  4500. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4501. ctx->flags |= WOLFSSL_EVP_CIPH_CBC_MODE;
  4502. ctx->keyLen = 24;
  4503. ctx->block_size = DES_BLOCK_SIZE;
  4504. ctx->ivSz = DES_BLOCK_SIZE;
  4505. if (enc == 0 || enc == 1)
  4506. ctx->enc = enc ? 1 : 0;
  4507. if (key) {
  4508. ret = wc_Des3_SetKey(&ctx->cipher.des3, key, iv,
  4509. ctx->enc ? DES_ENCRYPTION : DES_DECRYPTION);
  4510. if (ret != 0)
  4511. return WOLFSSL_FAILURE;
  4512. }
  4513. if (iv && key == NULL) {
  4514. ret = wc_Des3_SetIV(&ctx->cipher.des3, iv);
  4515. if (ret != 0)
  4516. return WOLFSSL_FAILURE;
  4517. }
  4518. }
  4519. else if (ctx->cipherType == DES_EDE3_ECB_TYPE ||
  4520. (type &&
  4521. XSTRNCMP(type, EVP_DES_EDE3_ECB, EVP_DES_EDE3_SIZE) == 0)) {
  4522. WOLFSSL_MSG("EVP_DES_EDE3_ECB");
  4523. ctx->cipherType = DES_EDE3_ECB_TYPE;
  4524. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4525. ctx->flags |= WOLFSSL_EVP_CIPH_ECB_MODE;
  4526. ctx->keyLen = 24;
  4527. ctx->block_size = DES_BLOCK_SIZE;
  4528. if (enc == 0 || enc == 1)
  4529. ctx->enc = enc ? 1 : 0;
  4530. if (key) {
  4531. ret = wc_Des3_SetKey(&ctx->cipher.des3, key, NULL,
  4532. ctx->enc ? DES_ENCRYPTION : DES_DECRYPTION);
  4533. if (ret != 0)
  4534. return WOLFSSL_FAILURE;
  4535. }
  4536. }
  4537. #endif /* NO_DES3 */
  4538. #ifndef NO_RC4
  4539. if (ctx->cipherType == ARC4_TYPE || (type &&
  4540. XSTRNCMP(type, "ARC4", 4) == 0)) {
  4541. WOLFSSL_MSG("ARC4");
  4542. ctx->cipherType = ARC4_TYPE;
  4543. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4544. ctx->flags |= WOLFSSL_EVP_CIPH_STREAM_CIPHER;
  4545. ctx->block_size = 1;
  4546. if (ctx->keyLen == 0) /* user may have already set */
  4547. ctx->keyLen = 16; /* default to 128 */
  4548. if (key)
  4549. wc_Arc4SetKey(&ctx->cipher.arc4, key, ctx->keyLen);
  4550. }
  4551. #endif /* NO_RC4 */
  4552. #ifdef HAVE_IDEA
  4553. if (ctx->cipherType == IDEA_CBC_TYPE ||
  4554. (type && XSTRNCMP(type, EVP_IDEA_CBC, EVP_IDEA_SIZE) == 0)) {
  4555. WOLFSSL_MSG("EVP_IDEA_CBC");
  4556. ctx->cipherType = IDEA_CBC_TYPE;
  4557. ctx->flags &= ~WOLFSSL_EVP_CIPH_MODE;
  4558. ctx->flags |= WOLFSSL_EVP_CIPH_CBC_MODE;
  4559. ctx->keyLen = IDEA_KEY_SIZE;
  4560. ctx->block_size = 8;
  4561. ctx->ivSz = IDEA_BLOCK_SIZE;
  4562. if (enc == 0 || enc == 1)
  4563. ctx->enc = enc ? 1 : 0;
  4564. if (key) {
  4565. ret = wc_IdeaSetKey(&ctx->cipher.idea, key, (word16)ctx->keyLen,
  4566. iv, ctx->enc ? IDEA_ENCRYPTION :
  4567. IDEA_DECRYPTION);
  4568. if (ret != 0)
  4569. return WOLFSSL_FAILURE;
  4570. }
  4571. if (iv && key == NULL)
  4572. wc_IdeaSetIV(&ctx->cipher.idea, iv);
  4573. }
  4574. #endif /* HAVE_IDEA */
  4575. if (ctx->cipherType == NULL_CIPHER_TYPE || (type &&
  4576. XSTRNCMP(type, "NULL", 4) == 0)) {
  4577. WOLFSSL_MSG("NULL cipher");
  4578. ctx->cipherType = NULL_CIPHER_TYPE;
  4579. ctx->keyLen = 0;
  4580. ctx->block_size = 16;
  4581. }
  4582. #ifdef HAVE_WOLFSSL_EVP_CIPHER_CTX_IV
  4583. if (iv && iv != ctx->iv) {
  4584. if (wolfSSL_StoreExternalIV(ctx) != WOLFSSL_SUCCESS) {
  4585. return WOLFSSL_FAILURE;
  4586. }
  4587. }
  4588. #endif
  4589. (void)ret; /* remove warning. If execution reaches this point, ret=0 */
  4590. return WOLFSSL_SUCCESS;
  4591. }
  4592. /* WOLFSSL_SUCCESS on ok */
  4593. int wolfSSL_EVP_CIPHER_CTX_key_length(WOLFSSL_EVP_CIPHER_CTX* ctx)
  4594. {
  4595. WOLFSSL_ENTER("wolfSSL_EVP_CIPHER_CTX_key_length");
  4596. if (ctx)
  4597. return ctx->keyLen;
  4598. return 0; /* failure */
  4599. }
  4600. /* WOLFSSL_SUCCESS on ok */
  4601. int wolfSSL_EVP_CIPHER_CTX_set_key_length(WOLFSSL_EVP_CIPHER_CTX* ctx,
  4602. int keylen)
  4603. {
  4604. WOLFSSL_ENTER("wolfSSL_EVP_CIPHER_CTX_set_key_length");
  4605. if (ctx)
  4606. ctx->keyLen = keylen;
  4607. else
  4608. return 0; /* failure */
  4609. return WOLFSSL_SUCCESS;
  4610. }
  4611. #if defined(HAVE_AESGCM)
  4612. /* returns WOLFSSL_SUCCESS on success, otherwise returns WOLFSSL_FAILURE */
  4613. int wolfSSL_EVP_CIPHER_CTX_set_iv_length(WOLFSSL_EVP_CIPHER_CTX* ctx,
  4614. int ivLen)
  4615. {
  4616. WOLFSSL_ENTER("wolfSSL_EVP_CIPHER_CTX_set_iv_length");
  4617. if (ctx)
  4618. ctx->ivSz= ivLen;
  4619. else
  4620. return WOLFSSL_FAILURE;
  4621. return WOLFSSL_SUCCESS;
  4622. }
  4623. /* returns WOLFSSL_SUCCESS on success, otherwise returns WOLFSSL_FAILURE */
  4624. int wolfSSL_EVP_CIPHER_CTX_set_iv(WOLFSSL_EVP_CIPHER_CTX* ctx, byte* iv,
  4625. int ivLen)
  4626. {
  4627. int expectedIvLen;
  4628. WOLFSSL_ENTER("wolfSSL_EVP_CIPHER_CTX_set_iv_length");
  4629. if (!ctx || !iv || !ivLen) {
  4630. return WOLFSSL_FAILURE;
  4631. }
  4632. expectedIvLen = wolfSSL_EVP_CIPHER_CTX_iv_length(ctx);
  4633. if (expectedIvLen == 0 || expectedIvLen != ivLen) {
  4634. WOLFSSL_MSG("Wrong ivLen value");
  4635. return WOLFSSL_FAILURE;
  4636. }
  4637. return wolfSSL_EVP_CipherInit(ctx, NULL, NULL, iv, -1);
  4638. }
  4639. #endif
  4640. /* WOLFSSL_SUCCESS on ok */
  4641. int wolfSSL_EVP_Cipher(WOLFSSL_EVP_CIPHER_CTX* ctx, byte* dst, byte* src,
  4642. word32 len)
  4643. {
  4644. int ret = 0;
  4645. WOLFSSL_ENTER("wolfSSL_EVP_Cipher");
  4646. if (ctx == NULL || src == NULL ||
  4647. (dst == NULL &&
  4648. ctx->cipherType != AES_128_GCM_TYPE &&
  4649. ctx->cipherType != AES_192_GCM_TYPE &&
  4650. ctx->cipherType != AES_256_GCM_TYPE)) {
  4651. WOLFSSL_MSG("Bad function argument");
  4652. return 0; /* failure */
  4653. }
  4654. if (ctx->cipherType == 0xff) {
  4655. WOLFSSL_MSG("no init");
  4656. return 0; /* failure */
  4657. }
  4658. switch (ctx->cipherType) {
  4659. #ifndef NO_AES
  4660. #ifdef HAVE_AES_CBC
  4661. case AES_128_CBC_TYPE :
  4662. case AES_192_CBC_TYPE :
  4663. case AES_256_CBC_TYPE :
  4664. WOLFSSL_MSG("AES CBC");
  4665. if (ctx->enc)
  4666. ret = wc_AesCbcEncrypt(&ctx->cipher.aes, dst, src, len);
  4667. else
  4668. ret = wc_AesCbcDecrypt(&ctx->cipher.aes, dst, src, len);
  4669. break;
  4670. #endif /* HAVE_AES_CBC */
  4671. #ifdef WOLFSSL_AES_CFB
  4672. #if !defined(HAVE_SELFTEST) && !defined(HAVE_FIPS)
  4673. case AES_128_CFB1_TYPE:
  4674. case AES_192_CFB1_TYPE:
  4675. case AES_256_CFB1_TYPE:
  4676. WOLFSSL_MSG("AES CFB1");
  4677. if (ctx->enc)
  4678. ret = wc_AesCfb1Encrypt(&ctx->cipher.aes, dst, src, len);
  4679. else
  4680. ret = wc_AesCfb1Decrypt(&ctx->cipher.aes, dst, src, len);
  4681. break;
  4682. case AES_128_CFB8_TYPE:
  4683. case AES_192_CFB8_TYPE:
  4684. case AES_256_CFB8_TYPE:
  4685. WOLFSSL_MSG("AES CFB8");
  4686. if (ctx->enc)
  4687. ret = wc_AesCfb8Encrypt(&ctx->cipher.aes, dst, src, len);
  4688. else
  4689. ret = wc_AesCfb8Decrypt(&ctx->cipher.aes, dst, src, len);
  4690. break;
  4691. #endif /* !HAVE_SELFTEST && !HAVE_FIPS */
  4692. case AES_128_CFB128_TYPE:
  4693. case AES_192_CFB128_TYPE:
  4694. case AES_256_CFB128_TYPE:
  4695. WOLFSSL_MSG("AES CFB128");
  4696. if (ctx->enc)
  4697. ret = wc_AesCfbEncrypt(&ctx->cipher.aes, dst, src, len);
  4698. else
  4699. ret = wc_AesCfbDecrypt(&ctx->cipher.aes, dst, src, len);
  4700. break;
  4701. #endif /* WOLFSSL_AES_CFB */
  4702. #if defined(WOLFSSL_AES_OFB)
  4703. case AES_128_OFB_TYPE:
  4704. case AES_192_OFB_TYPE:
  4705. case AES_256_OFB_TYPE:
  4706. WOLFSSL_MSG("AES OFB");
  4707. if (ctx->enc)
  4708. ret = wc_AesOfbEncrypt(&ctx->cipher.aes, dst, src, len);
  4709. else
  4710. ret = wc_AesOfbDecrypt(&ctx->cipher.aes, dst, src, len);
  4711. break;
  4712. #endif /* WOLFSSL_AES_OFB */
  4713. #if defined(WOLFSSL_AES_XTS)
  4714. case AES_128_XTS_TYPE:
  4715. case AES_256_XTS_TYPE:
  4716. WOLFSSL_MSG("AES XTS");
  4717. if (ctx->enc)
  4718. ret = wc_AesXtsEncrypt(&ctx->cipher.xts, dst, src, len,
  4719. ctx->iv, ctx->ivSz);
  4720. else
  4721. ret = wc_AesXtsDecrypt(&ctx->cipher.xts, dst, src, len,
  4722. ctx->iv, ctx->ivSz);
  4723. break;
  4724. #endif /* WOLFSSL_AES_XTS */
  4725. #ifdef HAVE_AESGCM
  4726. case AES_128_GCM_TYPE :
  4727. case AES_192_GCM_TYPE :
  4728. case AES_256_GCM_TYPE :
  4729. WOLFSSL_MSG("AES GCM");
  4730. if (ctx->enc) {
  4731. if (dst){
  4732. /* encrypt confidential data*/
  4733. ret = wc_AesGcmEncrypt(&ctx->cipher.aes, dst, src, len,
  4734. ctx->iv, ctx->ivSz, ctx->authTag, ctx->authTagSz,
  4735. NULL, 0);
  4736. }
  4737. else {
  4738. /* authenticated, non-confidential data */
  4739. ret = wc_AesGcmEncrypt(&ctx->cipher.aes, NULL, NULL, 0,
  4740. ctx->iv, ctx->ivSz, ctx->authTag, ctx->authTagSz,
  4741. src, len);
  4742. /* Reset partial authTag error for AAD*/
  4743. if (ret == AES_GCM_AUTH_E)
  4744. ret = 0;
  4745. }
  4746. }
  4747. else {
  4748. if (dst){
  4749. /* decrypt confidential data*/
  4750. ret = wc_AesGcmDecrypt(&ctx->cipher.aes, dst, src, len,
  4751. ctx->iv, ctx->ivSz, ctx->authTag, ctx->authTagSz,
  4752. NULL, 0);
  4753. }
  4754. else {
  4755. /* authenticated, non-confidential data*/
  4756. ret = wc_AesGcmDecrypt(&ctx->cipher.aes, NULL, NULL, 0,
  4757. ctx->iv, ctx->ivSz,
  4758. ctx->authTag, ctx->authTagSz,
  4759. src, len);
  4760. /* Reset partial authTag error for AAD*/
  4761. if (ret == AES_GCM_AUTH_E)
  4762. ret = 0;
  4763. }
  4764. }
  4765. break;
  4766. #endif /* HAVE_AESGCM */
  4767. #ifdef HAVE_AES_ECB
  4768. case AES_128_ECB_TYPE :
  4769. case AES_192_ECB_TYPE :
  4770. case AES_256_ECB_TYPE :
  4771. WOLFSSL_MSG("AES ECB");
  4772. if (ctx->enc)
  4773. ret = wc_AesEcbEncrypt(&ctx->cipher.aes, dst, src, len);
  4774. else
  4775. ret = wc_AesEcbDecrypt(&ctx->cipher.aes, dst, src, len);
  4776. break;
  4777. #endif
  4778. #ifdef WOLFSSL_AES_COUNTER
  4779. case AES_128_CTR_TYPE :
  4780. case AES_192_CTR_TYPE :
  4781. case AES_256_CTR_TYPE :
  4782. WOLFSSL_MSG("AES CTR");
  4783. ret = wc_AesCtrEncrypt(&ctx->cipher.aes, dst, src, len);
  4784. break;
  4785. #endif /* WOLFSSL_AES_COUNTER */
  4786. #endif /* NO_AES */
  4787. #ifndef NO_DES3
  4788. case DES_CBC_TYPE :
  4789. WOLFSSL_MSG("DES CBC");
  4790. if (ctx->enc)
  4791. wc_Des_CbcEncrypt(&ctx->cipher.des, dst, src, len);
  4792. else
  4793. wc_Des_CbcDecrypt(&ctx->cipher.des, dst, src, len);
  4794. break;
  4795. case DES_EDE3_CBC_TYPE :
  4796. WOLFSSL_MSG("DES3 CBC");
  4797. if (ctx->enc)
  4798. ret = wc_Des3_CbcEncrypt(&ctx->cipher.des3, dst, src, len);
  4799. else
  4800. ret = wc_Des3_CbcDecrypt(&ctx->cipher.des3, dst, src, len);
  4801. break;
  4802. #ifdef WOLFSSL_DES_ECB
  4803. case DES_ECB_TYPE :
  4804. WOLFSSL_MSG("DES ECB");
  4805. ret = wc_Des_EcbEncrypt(&ctx->cipher.des, dst, src, len);
  4806. break;
  4807. case DES_EDE3_ECB_TYPE :
  4808. WOLFSSL_MSG("DES3 ECB");
  4809. ret = wc_Des3_EcbEncrypt(&ctx->cipher.des3, dst, src, len);
  4810. break;
  4811. #endif
  4812. #endif /* !NO_DES3 */
  4813. #ifndef NO_RC4
  4814. case ARC4_TYPE :
  4815. WOLFSSL_MSG("ARC4");
  4816. wc_Arc4Process(&ctx->cipher.arc4, dst, src, len);
  4817. break;
  4818. #endif
  4819. #ifdef HAVE_IDEA
  4820. case IDEA_CBC_TYPE :
  4821. WOLFSSL_MSG("IDEA CBC");
  4822. if (ctx->enc)
  4823. wc_IdeaCbcEncrypt(&ctx->cipher.idea, dst, src, len);
  4824. else
  4825. wc_IdeaCbcDecrypt(&ctx->cipher.idea, dst, src, len);
  4826. break;
  4827. #endif
  4828. case NULL_CIPHER_TYPE :
  4829. WOLFSSL_MSG("NULL CIPHER");
  4830. XMEMCPY(dst, src, len);
  4831. break;
  4832. default: {
  4833. WOLFSSL_MSG("bad type");
  4834. return 0; /* failure */
  4835. }
  4836. }
  4837. if (ret != 0) {
  4838. WOLFSSL_MSG("wolfSSL_EVP_Cipher failure");
  4839. return 0; /* failure */
  4840. }
  4841. if (wolfSSL_StoreExternalIV(ctx) != WOLFSSL_SUCCESS) {
  4842. return WOLFSSL_FAILURE;
  4843. }
  4844. WOLFSSL_MSG("wolfSSL_EVP_Cipher success");
  4845. return WOLFSSL_SUCCESS; /* success */
  4846. }
  4847. /* WOLFSSL_SUCCESS on ok */
  4848. int wolfSSL_EVP_DigestInit(WOLFSSL_EVP_MD_CTX* ctx,
  4849. const WOLFSSL_EVP_MD* md)
  4850. {
  4851. int ret = WOLFSSL_SUCCESS;
  4852. WOLFSSL_ENTER("EVP_DigestInit");
  4853. if (ctx == NULL || md == NULL) {
  4854. return BAD_FUNC_ARG;
  4855. }
  4856. #ifdef WOLFSSL_ASYNC_CRYPT
  4857. /* compile-time validation of ASYNC_CTX_SIZE */
  4858. typedef char async_test[WC_ASYNC_DEV_SIZE >= sizeof(WC_ASYNC_DEV) ?
  4859. 1 : -1];
  4860. (void)sizeof(async_test);
  4861. #endif
  4862. /* Set to 0 if no match */
  4863. ctx->macType = wolfSSL_EVP_md2macType(md);
  4864. if (XSTRNCMP(md, "SHA256", 6) == 0) {
  4865. ret = wolfSSL_SHA256_Init(&(ctx->hash.digest.sha256));
  4866. }
  4867. #ifdef WOLFSSL_SHA224
  4868. else if (XSTRNCMP(md, "SHA224", 6) == 0) {
  4869. ret = wolfSSL_SHA224_Init(&(ctx->hash.digest.sha224));
  4870. }
  4871. #endif
  4872. #ifdef WOLFSSL_SHA384
  4873. else if (XSTRNCMP(md, "SHA384", 6) == 0) {
  4874. ret = wolfSSL_SHA384_Init(&(ctx->hash.digest.sha384));
  4875. }
  4876. #endif
  4877. #ifdef WOLFSSL_SHA512
  4878. else if (XSTRNCMP(md, "SHA512", 6) == 0) {
  4879. ret = wolfSSL_SHA512_Init(&(ctx->hash.digest.sha512));
  4880. }
  4881. #endif
  4882. #ifndef NO_MD4
  4883. else if (XSTRNCMP(md, "MD4", 3) == 0) {
  4884. wolfSSL_MD4_Init(&(ctx->hash.digest.md4));
  4885. }
  4886. #endif
  4887. #ifndef NO_MD5
  4888. else if (XSTRNCMP(md, "MD5", 3) == 0) {
  4889. ret = wolfSSL_MD5_Init(&(ctx->hash.digest.md5));
  4890. }
  4891. #endif
  4892. #ifdef WOLFSSL_SHA3
  4893. #ifndef WOLFSSL_NOSHA3_224
  4894. else if (XSTRNCMP(md, "SHA3_224", 8) == 0) {
  4895. ret = wolfSSL_SHA3_224_Init(&(ctx->hash.digest.sha3_224));
  4896. }
  4897. #endif
  4898. #ifndef WOLFSSL_NOSHA3_256
  4899. else if (XSTRNCMP(md, "SHA3_256", 8) == 0) {
  4900. ret = wolfSSL_SHA3_256_Init(&(ctx->hash.digest.sha3_256));
  4901. }
  4902. #endif
  4903. else if (XSTRNCMP(md, "SHA3_384", 8) == 0) {
  4904. ret = wolfSSL_SHA3_384_Init(&(ctx->hash.digest.sha3_384));
  4905. }
  4906. #ifndef WOLFSSL_NOSHA3_512
  4907. else if (XSTRNCMP(md, "SHA3_512", 8) == 0) {
  4908. ret = wolfSSL_SHA3_512_Init(&(ctx->hash.digest.sha3_512));
  4909. }
  4910. #endif
  4911. #endif
  4912. #ifndef NO_SHA
  4913. /* has to be last since would pick or 224, 256, 384, or 512 too */
  4914. else if (XSTRNCMP(md, "SHA", 3) == 0) {
  4915. ret = wolfSSL_SHA_Init(&(ctx->hash.digest.sha));
  4916. }
  4917. #endif /* NO_SHA */
  4918. else {
  4919. ctx->macType = WC_HASH_TYPE_NONE;
  4920. return BAD_FUNC_ARG;
  4921. }
  4922. return ret;
  4923. }
  4924. /* WOLFSSL_SUCCESS on ok, WOLFSSL_FAILURE on failure */
  4925. int wolfSSL_EVP_DigestUpdate(WOLFSSL_EVP_MD_CTX* ctx, const void* data,
  4926. size_t sz)
  4927. {
  4928. int ret = WOLFSSL_FAILURE;
  4929. enum wc_HashType macType;
  4930. WOLFSSL_ENTER("EVP_DigestUpdate");
  4931. macType = wolfSSL_EVP_md2macType(EVP_MD_CTX_md(ctx));
  4932. switch (macType) {
  4933. case WC_HASH_TYPE_MD4:
  4934. #ifndef NO_MD4
  4935. wolfSSL_MD4_Update((MD4_CTX*)&ctx->hash, data,
  4936. (unsigned long)sz);
  4937. ret = WOLFSSL_SUCCESS;
  4938. #endif
  4939. break;
  4940. case WC_HASH_TYPE_MD5:
  4941. #ifndef NO_MD5
  4942. ret = wolfSSL_MD5_Update((MD5_CTX*)&ctx->hash, data,
  4943. (unsigned long)sz);
  4944. #endif
  4945. break;
  4946. case WC_HASH_TYPE_SHA:
  4947. #ifndef NO_SHA
  4948. ret = wolfSSL_SHA_Update((SHA_CTX*)&ctx->hash, data,
  4949. (unsigned long)sz);
  4950. #endif
  4951. break;
  4952. case WC_HASH_TYPE_SHA224:
  4953. #ifdef WOLFSSL_SHA224
  4954. ret = wolfSSL_SHA224_Update((SHA224_CTX*)&ctx->hash, data,
  4955. (unsigned long)sz);
  4956. #endif
  4957. break;
  4958. case WC_HASH_TYPE_SHA256:
  4959. #ifndef NO_SHA256
  4960. ret = wolfSSL_SHA256_Update((SHA256_CTX*)&ctx->hash, data,
  4961. (unsigned long)sz);
  4962. #endif /* !NO_SHA256 */
  4963. break;
  4964. case WC_HASH_TYPE_SHA384:
  4965. #ifdef WOLFSSL_SHA384
  4966. ret = wolfSSL_SHA384_Update((SHA384_CTX*)&ctx->hash, data,
  4967. (unsigned long)sz);
  4968. #endif
  4969. break;
  4970. case WC_HASH_TYPE_SHA512:
  4971. #ifdef WOLFSSL_SHA512
  4972. ret = wolfSSL_SHA512_Update((SHA512_CTX*)&ctx->hash, data,
  4973. (unsigned long)sz);
  4974. #endif /* WOLFSSL_SHA512 */
  4975. break;
  4976. case WC_HASH_TYPE_SHA3_224:
  4977. #if defined(WOLFSSL_SHA3) && !defined(WOLFSSL_NOSHA3_224)
  4978. ret = wolfSSL_SHA3_224_Update((SHA3_224_CTX*)&ctx->hash, data,
  4979. (unsigned long)sz);
  4980. #endif
  4981. break;
  4982. case WC_HASH_TYPE_SHA3_256:
  4983. #if defined(WOLFSSL_SHA3) && !defined(WOLFSSL_NOSHA3_256)
  4984. ret = wolfSSL_SHA3_256_Update((SHA3_256_CTX*)&ctx->hash, data,
  4985. (unsigned long)sz);
  4986. #endif
  4987. break;
  4988. case WC_HASH_TYPE_SHA3_384:
  4989. #if defined(WOLFSSL_SHA3)
  4990. ret = wolfSSL_SHA3_384_Update((SHA3_384_CTX*)&ctx->hash, data,
  4991. (unsigned long)sz);
  4992. #endif
  4993. break;
  4994. case WC_HASH_TYPE_SHA3_512:
  4995. #if defined(WOLFSSL_SHA3) && !defined(WOLFSSL_NOSHA3_512)
  4996. wolfSSL_SHA3_512_Update((SHA3_512_CTX*)&ctx->hash, data,
  4997. (unsigned long)sz);
  4998. #endif
  4999. break;
  5000. case WC_HASH_TYPE_NONE:
  5001. case WC_HASH_TYPE_MD2:
  5002. case WC_HASH_TYPE_MD5_SHA:
  5003. case WC_HASH_TYPE_BLAKE2B:
  5004. case WC_HASH_TYPE_BLAKE2S:
  5005. default:
  5006. return WOLFSSL_FAILURE;
  5007. }
  5008. return ret;
  5009. }
  5010. /* WOLFSSL_SUCCESS on ok */
  5011. int wolfSSL_EVP_DigestFinal(WOLFSSL_EVP_MD_CTX* ctx, unsigned char* md,
  5012. unsigned int* s)
  5013. {
  5014. int ret = WOLFSSL_FAILURE;
  5015. enum wc_HashType macType;
  5016. WOLFSSL_ENTER("EVP_DigestFinal");
  5017. macType = wolfSSL_EVP_md2macType(EVP_MD_CTX_md(ctx));
  5018. switch (macType) {
  5019. case WC_HASH_TYPE_MD4:
  5020. #ifndef NO_MD4
  5021. wolfSSL_MD4_Final(md, (MD4_CTX*)&ctx->hash);
  5022. if (s) *s = MD4_DIGEST_SIZE;
  5023. ret = WOLFSSL_SUCCESS;
  5024. #endif
  5025. break;
  5026. case WC_HASH_TYPE_MD5:
  5027. #ifndef NO_MD5
  5028. ret = wolfSSL_MD5_Final(md, (MD5_CTX*)&ctx->hash);
  5029. if (s) *s = WC_MD5_DIGEST_SIZE;
  5030. #endif
  5031. break;
  5032. case WC_HASH_TYPE_SHA:
  5033. #ifndef NO_SHA
  5034. ret = wolfSSL_SHA_Final(md, (SHA_CTX*)&ctx->hash);
  5035. if (s) *s = WC_SHA_DIGEST_SIZE;
  5036. #endif
  5037. break;
  5038. case WC_HASH_TYPE_SHA224:
  5039. #ifdef WOLFSSL_SHA224
  5040. ret = wolfSSL_SHA224_Final(md, (SHA224_CTX*)&ctx->hash);
  5041. if (s) *s = WC_SHA224_DIGEST_SIZE;
  5042. #endif
  5043. break;
  5044. case WC_HASH_TYPE_SHA256:
  5045. #ifndef NO_SHA256
  5046. ret = wolfSSL_SHA256_Final(md, (SHA256_CTX*)&ctx->hash);
  5047. if (s) *s = WC_SHA256_DIGEST_SIZE;
  5048. #endif /* !NO_SHA256 */
  5049. break;
  5050. case WC_HASH_TYPE_SHA384:
  5051. #ifdef WOLFSSL_SHA384
  5052. ret = wolfSSL_SHA384_Final(md, (SHA384_CTX*)&ctx->hash);
  5053. if (s) *s = WC_SHA384_DIGEST_SIZE;
  5054. #endif
  5055. break;
  5056. case WC_HASH_TYPE_SHA512:
  5057. #ifdef WOLFSSL_SHA512
  5058. ret = wolfSSL_SHA512_Final(md, (SHA512_CTX*)&ctx->hash);
  5059. if (s) *s = WC_SHA512_DIGEST_SIZE;
  5060. #endif /* WOLFSSL_SHA512 */
  5061. break;
  5062. case WC_HASH_TYPE_SHA3_224:
  5063. #if defined(WOLFSSL_SHA3) && !defined(WOLFSSL_NOSHA3_224)
  5064. ret = wolfSSL_SHA3_224_Final(md, (SHA3_224_CTX*)&ctx->hash);
  5065. if (s) *s = WC_SHA3_224_DIGEST_SIZE;
  5066. #endif
  5067. break;
  5068. case WC_HASH_TYPE_SHA3_256:
  5069. #if defined(WOLFSSL_SHA3) && !defined(WOLFSSL_NOSHA3_256)
  5070. ret = wolfSSL_SHA3_256_Final(md, (SHA3_256_CTX*)&ctx->hash);
  5071. if (s) *s = WC_SHA3_256_DIGEST_SIZE;
  5072. #endif
  5073. break;
  5074. case WC_HASH_TYPE_SHA3_384:
  5075. #if defined(WOLFSSL_SHA3)
  5076. ret = wolfSSL_SHA3_384_Final(md, (SHA3_384_CTX*)&ctx->hash);
  5077. if (s) *s = WC_SHA3_384_DIGEST_SIZE;
  5078. #endif
  5079. break;
  5080. case WC_HASH_TYPE_SHA3_512:
  5081. #if defined(WOLFSSL_SHA3) && !defined(WOLFSSL_NOSHA3_512)
  5082. ret = wolfSSL_SHA3_512_Final(md, (SHA3_512_CTX*)&ctx->hash);
  5083. if (s) *s = WC_SHA3_512_DIGEST_SIZE;
  5084. #endif
  5085. break;
  5086. case WC_HASH_TYPE_NONE:
  5087. case WC_HASH_TYPE_MD2:
  5088. case WC_HASH_TYPE_MD5_SHA:
  5089. case WC_HASH_TYPE_BLAKE2B:
  5090. case WC_HASH_TYPE_BLAKE2S:
  5091. default:
  5092. return WOLFSSL_FAILURE;
  5093. }
  5094. return ret;
  5095. }
  5096. /* WOLFSSL_SUCCESS on ok */
  5097. int wolfSSL_EVP_DigestFinal_ex(WOLFSSL_EVP_MD_CTX* ctx, unsigned char* md,
  5098. unsigned int* s)
  5099. {
  5100. WOLFSSL_ENTER("EVP_DigestFinal_ex");
  5101. return EVP_DigestFinal(ctx, md, s);
  5102. }
  5103. void wolfSSL_EVP_cleanup(void)
  5104. {
  5105. /* nothing to do here */
  5106. }
  5107. const WOLFSSL_EVP_MD* wolfSSL_EVP_get_digestbynid(int id)
  5108. {
  5109. WOLFSSL_MSG("wolfSSL_get_digestbynid");
  5110. switch(id) {
  5111. #ifndef NO_MD5
  5112. case NID_md5:
  5113. return wolfSSL_EVP_md5();
  5114. #endif
  5115. #ifndef NO_SHA
  5116. case NID_sha1:
  5117. return wolfSSL_EVP_sha1();
  5118. #endif
  5119. default:
  5120. WOLFSSL_MSG("Bad digest id value");
  5121. }
  5122. return NULL;
  5123. }
  5124. #ifndef NO_RSA
  5125. WOLFSSL_RSA* wolfSSL_EVP_PKEY_get0_RSA(WOLFSSL_EVP_PKEY *pkey)
  5126. {
  5127. if (!pkey) {
  5128. return NULL;
  5129. }
  5130. return pkey->rsa;
  5131. }
  5132. WOLFSSL_RSA* wolfSSL_EVP_PKEY_get1_RSA(WOLFSSL_EVP_PKEY* key)
  5133. {
  5134. WOLFSSL_RSA* local;
  5135. WOLFSSL_MSG("wolfSSL_EVP_PKEY_get1_RSA");
  5136. if (key == NULL) {
  5137. return NULL;
  5138. }
  5139. local = wolfSSL_RSA_new();
  5140. if (local == NULL) {
  5141. WOLFSSL_MSG("Error creating a new WOLFSSL_RSA structure");
  5142. return NULL;
  5143. }
  5144. if (key->type == EVP_PKEY_RSA) {
  5145. if (wolfSSL_RSA_LoadDer(local, (const unsigned char*)key->pkey.ptr,
  5146. key->pkey_sz) != SSL_SUCCESS) {
  5147. /* now try public key */
  5148. if (wolfSSL_RSA_LoadDer_ex(local,
  5149. (const unsigned char*)key->pkey.ptr, key->pkey_sz,
  5150. WOLFSSL_RSA_LOAD_PUBLIC) != SSL_SUCCESS) {
  5151. wolfSSL_RSA_free(local);
  5152. local = NULL;
  5153. }
  5154. }
  5155. }
  5156. else {
  5157. WOLFSSL_MSG("WOLFSSL_EVP_PKEY does not hold an RSA key");
  5158. wolfSSL_RSA_free(local);
  5159. local = NULL;
  5160. }
  5161. return local;
  5162. }
  5163. /* with set1 functions the pkey struct does not own the RSA structure
  5164. *
  5165. * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on failure
  5166. */
  5167. int wolfSSL_EVP_PKEY_set1_RSA(WOLFSSL_EVP_PKEY *pkey, WOLFSSL_RSA *key)
  5168. {
  5169. #if defined(WOLFSSL_KEY_GEN) && !defined(HAVE_USER_RSA)
  5170. int derMax = 0;
  5171. int derSz = 0;
  5172. byte* derBuf = NULL;
  5173. RsaKey* rsa = NULL;
  5174. #endif
  5175. WOLFSSL_ENTER("wolfSSL_EVP_PKEY_set1_RSA");
  5176. if ((pkey == NULL) || (key == NULL))
  5177. return WOLFSSL_FAILURE;
  5178. if (pkey->rsa != NULL && pkey->ownRsa == 1) {
  5179. wolfSSL_RSA_free(pkey->rsa);
  5180. }
  5181. pkey->rsa = key;
  5182. pkey->ownRsa = 0; /* pkey does not own RSA */
  5183. pkey->type = EVP_PKEY_RSA;
  5184. if (key->inSet == 0) {
  5185. if (SetRsaInternal(key) != WOLFSSL_SUCCESS) {
  5186. WOLFSSL_MSG("SetRsaInternal failed");
  5187. return WOLFSSL_FAILURE;
  5188. }
  5189. }
  5190. #if defined(WOLFSSL_KEY_GEN) && !defined(HAVE_USER_RSA)
  5191. rsa = (RsaKey*)key->internal;
  5192. /* 5 > size of n, d, p, q, d%(p-1), d(q-1), 1/q%p, e + ASN.1 additional
  5193. * information */
  5194. derMax = 5 * wolfSSL_RSA_size(key) + (2 * AES_BLOCK_SIZE);
  5195. derBuf = (byte*)XMALLOC(derMax, pkey->heap, DYNAMIC_TYPE_TMP_BUFFER);
  5196. if (derBuf == NULL) {
  5197. WOLFSSL_MSG("malloc failed");
  5198. return WOLFSSL_FAILURE;
  5199. }
  5200. if (rsa->type == RSA_PRIVATE) {
  5201. /* Private key to DER */
  5202. derSz = wc_RsaKeyToDer(rsa, derBuf, derMax);
  5203. }
  5204. else {
  5205. /* Public key to DER */
  5206. derSz = wc_RsaKeyToPublicDer(rsa, derBuf, derMax);
  5207. }
  5208. if (derSz < 0) {
  5209. if (rsa->type == RSA_PRIVATE) {
  5210. WOLFSSL_MSG("wc_RsaKeyToDer failed");
  5211. }
  5212. else {
  5213. WOLFSSL_MSG("wc_RsaKeyToPublicDer failed");
  5214. }
  5215. XFREE(derBuf, pkey->heap, DYNAMIC_TYPE_TMP_BUFFER);
  5216. return WOLFSSL_FAILURE;
  5217. }
  5218. pkey->pkey.ptr = (char*)XMALLOC(derSz, pkey->heap, DYNAMIC_TYPE_DER);
  5219. if (pkey->pkey.ptr == NULL) {
  5220. WOLFSSL_MSG("key malloc failed");
  5221. XFREE(derBuf, pkey->heap, DYNAMIC_TYPE_TMP_BUFFER);
  5222. return WOLFSSL_FAILURE;
  5223. }
  5224. pkey->pkey_sz = derSz;
  5225. XMEMCPY(pkey->pkey.ptr, derBuf, derSz);
  5226. XFREE(derBuf, pkey->heap, DYNAMIC_TYPE_TMP_BUFFER);
  5227. #endif /* WOLFSSL_KEY_GEN && !HAVE_USER_RSA */
  5228. #ifdef WC_RSA_BLINDING
  5229. if (key->ownRng == 0) {
  5230. if (wc_RsaSetRNG((RsaKey*)(pkey->rsa->internal), &(pkey->rng)) != 0) {
  5231. WOLFSSL_MSG("Error setting RSA rng");
  5232. return WOLFSSL_FAILURE;
  5233. }
  5234. }
  5235. #endif
  5236. return WOLFSSL_SUCCESS;
  5237. }
  5238. #endif /* !NO_RSA */
  5239. #if !defined (NO_DSA) && !defined(HAVE_SELFTEST) && defined(WOLFSSL_KEY_GEN)
  5240. /* with set1 functions the pkey struct does not own the DSA structure
  5241. *
  5242. * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on failure
  5243. */
  5244. int wolfSSL_EVP_PKEY_set1_DSA(WOLFSSL_EVP_PKEY *pkey, WOLFSSL_DSA *key)
  5245. {
  5246. int derMax = 0;
  5247. int derSz = 0;
  5248. DsaKey* dsa = NULL;
  5249. byte* derBuf = NULL;
  5250. WOLFSSL_ENTER("wolfSSL_EVP_PKEY_set1_DSA");
  5251. if((pkey == NULL) || (key == NULL))return WOLFSSL_FAILURE;
  5252. if (pkey->dsa != NULL && pkey->ownDsa == 1) {
  5253. wolfSSL_DSA_free(pkey->dsa);
  5254. }
  5255. pkey->dsa = key;
  5256. pkey->ownDsa = 0; /* pkey does not own DSA */
  5257. pkey->type = EVP_PKEY_DSA;
  5258. if (key->inSet == 0) {
  5259. if (SetDsaInternal(key) != WOLFSSL_SUCCESS) {
  5260. WOLFSSL_MSG("SetDsaInternal failed");
  5261. return WOLFSSL_FAILURE;
  5262. }
  5263. }
  5264. dsa = (DsaKey*)key->internal;
  5265. /* 4 > size of pub, priv, p, q, g + ASN.1 additional information */
  5266. derMax = 4 * wolfSSL_BN_num_bytes(key->g) + AES_BLOCK_SIZE;
  5267. derBuf = (byte*)XMALLOC(derMax, pkey->heap, DYNAMIC_TYPE_TMP_BUFFER);
  5268. if (derBuf == NULL) {
  5269. WOLFSSL_MSG("malloc failed");
  5270. return WOLFSSL_FAILURE;
  5271. }
  5272. if (dsa->type == DSA_PRIVATE) {
  5273. /* Private key to DER */
  5274. derSz = wc_DsaKeyToDer(dsa, derBuf, derMax);
  5275. }
  5276. else {
  5277. /* Public key to DER */
  5278. derSz = wc_DsaKeyToPublicDer(dsa, derBuf, derMax);
  5279. }
  5280. if (derSz < 0) {
  5281. if (dsa->type == DSA_PRIVATE) {
  5282. WOLFSSL_MSG("wc_DsaKeyToDer failed");
  5283. }
  5284. else {
  5285. WOLFSSL_MSG("wc_DsaKeyToPublicDer failed");
  5286. }
  5287. XFREE(derBuf, pkey->heap, DYNAMIC_TYPE_TMP_BUFFER);
  5288. return WOLFSSL_FAILURE;
  5289. }
  5290. pkey->pkey.ptr = (char*)XMALLOC(derSz, pkey->heap, DYNAMIC_TYPE_DER);
  5291. if (pkey->pkey.ptr == NULL) {
  5292. WOLFSSL_MSG("key malloc failed");
  5293. XFREE(derBuf, pkey->heap, DYNAMIC_TYPE_TMP_BUFFER);
  5294. return WOLFSSL_FAILURE;
  5295. }
  5296. pkey->pkey_sz = derSz;
  5297. XMEMCPY(pkey->pkey.ptr, derBuf, derSz);
  5298. XFREE(derBuf, pkey->heap, DYNAMIC_TYPE_TMP_BUFFER);
  5299. return WOLFSSL_SUCCESS;
  5300. }
  5301. WOLFSSL_DSA* wolfSSL_EVP_PKEY_get0_DSA(struct WOLFSSL_EVP_PKEY *pkey)
  5302. {
  5303. if (!pkey) {
  5304. return NULL;
  5305. }
  5306. return pkey->dsa;
  5307. }
  5308. WOLFSSL_DSA* wolfSSL_EVP_PKEY_get1_DSA(WOLFSSL_EVP_PKEY* key)
  5309. {
  5310. WOLFSSL_DSA* local;
  5311. WOLFSSL_ENTER("wolfSSL_EVP_PKEY_get1_DSA");
  5312. if (key == NULL) {
  5313. WOLFSSL_MSG("Bad function argument");
  5314. return NULL;
  5315. }
  5316. local = wolfSSL_DSA_new();
  5317. if (local == NULL) {
  5318. WOLFSSL_MSG("Error creating a new WOLFSSL_DSA structure");
  5319. return NULL;
  5320. }
  5321. if (key->type == EVP_PKEY_DSA) {
  5322. if (wolfSSL_DSA_LoadDer(local, (const unsigned char*)key->pkey.ptr,
  5323. key->pkey_sz) != SSL_SUCCESS) {
  5324. /* now try public key */
  5325. if (wolfSSL_DSA_LoadDer_ex(local,
  5326. (const unsigned char*)key->pkey.ptr, key->pkey_sz,
  5327. WOLFSSL_DSA_LOAD_PUBLIC) != SSL_SUCCESS) {
  5328. wolfSSL_DSA_free(local);
  5329. local = NULL;
  5330. }
  5331. }
  5332. }
  5333. else {
  5334. WOLFSSL_MSG("WOLFSSL_EVP_PKEY does not hold a DSA key");
  5335. wolfSSL_DSA_free(local);
  5336. local = NULL;
  5337. }
  5338. return local;
  5339. }
  5340. #endif /* !NO_DSA && !HAVE_SELFTEST && WOLFSSL_KEY_GEN */
  5341. #ifdef HAVE_ECC
  5342. WOLFSSL_EC_KEY *wolfSSL_EVP_PKEY_get0_EC_KEY(WOLFSSL_EVP_PKEY *pkey)
  5343. {
  5344. WOLFSSL_EC_KEY *eckey = NULL;
  5345. if (pkey) {
  5346. #ifdef HAVE_ECC
  5347. eckey = pkey->ecc;
  5348. #endif
  5349. }
  5350. return eckey;
  5351. }
  5352. WOLFSSL_EC_KEY* wolfSSL_EVP_PKEY_get1_EC_KEY(WOLFSSL_EVP_PKEY* key)
  5353. {
  5354. WOLFSSL_EC_KEY* local;
  5355. WOLFSSL_ENTER("wolfSSL_EVP_PKEY_get1_EC_KEY");
  5356. if (key == NULL) {
  5357. return NULL;
  5358. }
  5359. local = wolfSSL_EC_KEY_new();
  5360. if (local == NULL) {
  5361. WOLFSSL_MSG("Error creating a new WOLFSSL_EC_KEY structure");
  5362. return NULL;
  5363. }
  5364. if (key->type == EVP_PKEY_EC) {
  5365. if (wolfSSL_EC_KEY_LoadDer(local, (const unsigned char*)key->pkey.ptr,
  5366. key->pkey_sz) != SSL_SUCCESS) {
  5367. /* now try public key */
  5368. if (wolfSSL_EC_KEY_LoadDer_ex(local,
  5369. (const unsigned char*)key->pkey.ptr,
  5370. key->pkey_sz, WOLFSSL_EC_KEY_LOAD_PUBLIC) != SSL_SUCCESS) {
  5371. wolfSSL_EC_KEY_free(local);
  5372. local = NULL;
  5373. }
  5374. }
  5375. }
  5376. else {
  5377. WOLFSSL_MSG("WOLFSSL_EVP_PKEY does not hold an EC key");
  5378. wolfSSL_EC_KEY_free(local);
  5379. local = NULL;
  5380. }
  5381. #ifdef OPENSSL_ALL
  5382. if (!local && key->ecc) {
  5383. local = wolfSSL_EC_KEY_dup(key->ecc);
  5384. }
  5385. #endif
  5386. return local;
  5387. }
  5388. #endif /* HAVE_ECC */
  5389. #if defined(OPENSSL_ALL) || defined(WOLFSSL_QT)
  5390. #if !defined(NO_DH) && !defined(NO_FILESYSTEM)
  5391. #if !defined(HAVE_FIPS) || (defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION>2))
  5392. /* with set1 functions the pkey struct does not own the DH structure
  5393. * Build the following DH Key format from the passed in WOLFSSL_DH
  5394. * then store in WOLFSSL_EVP_PKEY in DER format.
  5395. *
  5396. * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on failure
  5397. */
  5398. int wolfSSL_EVP_PKEY_set1_DH(WOLFSSL_EVP_PKEY *pkey, WOLFSSL_DH *key)
  5399. {
  5400. byte havePublic = 0, havePrivate = 0;
  5401. int ret;
  5402. word32 derSz = 0;
  5403. byte* derBuf = NULL;
  5404. DhKey* dhkey = NULL;
  5405. WOLFSSL_ENTER("wolfSSL_EVP_PKEY_set1_DH");
  5406. if (pkey == NULL || key == NULL)
  5407. return WOLFSSL_FAILURE;
  5408. if (pkey->dh != NULL && pkey->ownDh == 1)
  5409. wolfSSL_DH_free(pkey->dh);
  5410. pkey->dh = key;
  5411. pkey->ownDh = 0; /* pkey does not own DH */
  5412. pkey->type = EVP_PKEY_DH;
  5413. if (key->inSet == 0) {
  5414. if (SetDhInternal(key) != WOLFSSL_SUCCESS) {
  5415. WOLFSSL_MSG("SetDhInternal failed");
  5416. return WOLFSSL_FAILURE;
  5417. }
  5418. }
  5419. dhkey = (DhKey*)key->internal;
  5420. havePublic = mp_unsigned_bin_size(&dhkey->pub) > 0;
  5421. havePrivate = mp_unsigned_bin_size(&dhkey->priv) > 0;
  5422. /* Get size of DER buffer only */
  5423. if (havePublic && !havePrivate) {
  5424. ret = wc_DhPubKeyToDer(dhkey, NULL, &derSz);
  5425. } else if (havePrivate && !havePublic) {
  5426. ret = wc_DhPrivKeyToDer(dhkey, NULL, &derSz);
  5427. } else {
  5428. ret = wc_DhParamsToDer(dhkey,NULL,&derSz);
  5429. }
  5430. if (derSz <= 0 || ret != LENGTH_ONLY_E) {
  5431. WOLFSSL_MSG("Failed to get size of DH Key");
  5432. return WOLFSSL_FAILURE;
  5433. }
  5434. derBuf = (byte*)XMALLOC(derSz, pkey->heap, DYNAMIC_TYPE_TMP_BUFFER);
  5435. if (derBuf == NULL) {
  5436. WOLFSSL_MSG("malloc failed");
  5437. return WOLFSSL_FAILURE;
  5438. }
  5439. /* Fill DER buffer */
  5440. if (havePublic && !havePrivate) {
  5441. ret = wc_DhPubKeyToDer(dhkey, derBuf, &derSz);
  5442. } else if (havePrivate && !havePublic) {
  5443. ret = wc_DhPrivKeyToDer(dhkey, derBuf, &derSz);
  5444. } else {
  5445. ret = wc_DhParamsToDer(dhkey,derBuf,&derSz);
  5446. }
  5447. if (ret <= 0) {
  5448. WOLFSSL_MSG("Failed to export DH Key");
  5449. XFREE(derBuf, pkey->heap, DYNAMIC_TYPE_TMP_BUFFER);
  5450. return WOLFSSL_FAILURE;
  5451. }
  5452. /* Store DH key into pkey (DER format) */
  5453. pkey->pkey.ptr = (char*)derBuf;
  5454. pkey->pkey_sz = derSz;
  5455. return WOLFSSL_SUCCESS;
  5456. }
  5457. #endif /* !HAVE_FIPS || HAVE_FIPS_VERSION > 2 */
  5458. WOLFSSL_DH* wolfSSL_EVP_PKEY_get0_DH(WOLFSSL_EVP_PKEY* key)
  5459. {
  5460. if (!key) {
  5461. return NULL;
  5462. }
  5463. return key->dh;
  5464. }
  5465. #if !defined(HAVE_FIPS) || (defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION>2))
  5466. WOLFSSL_DH* wolfSSL_EVP_PKEY_get1_DH(WOLFSSL_EVP_PKEY* key)
  5467. {
  5468. WOLFSSL_DH* local = NULL;
  5469. WOLFSSL_ENTER("wolfSSL_EVP_PKEY_get1_DH");
  5470. if (key == NULL || key->dh == NULL) {
  5471. WOLFSSL_MSG("Bad function argument");
  5472. return NULL;
  5473. }
  5474. if (key->type == EVP_PKEY_DH) {
  5475. local = wolfSSL_DH_new();
  5476. if (local == NULL) {
  5477. WOLFSSL_MSG("Error creating a new WOLFSSL_DH structure");
  5478. return NULL;
  5479. }
  5480. if (wolfSSL_DH_LoadDer(local, (const unsigned char*)key->pkey.ptr,
  5481. key->pkey_sz) != SSL_SUCCESS) {
  5482. wolfSSL_DH_free(local);
  5483. WOLFSSL_MSG("Error wolfSSL_DH_LoadDer");
  5484. local = NULL;
  5485. }
  5486. }
  5487. else {
  5488. WOLFSSL_MSG("WOLFSSL_EVP_PKEY does not hold a DH key");
  5489. wolfSSL_DH_free(local);
  5490. return NULL;
  5491. }
  5492. return local;
  5493. }
  5494. #endif /* !HAVE_FIPS || HAVE_FIPS_VERSION > 2 */
  5495. #endif /* NO_DH && NO_FILESYSTEM */
  5496. int wolfSSL_EVP_PKEY_assign(WOLFSSL_EVP_PKEY *pkey, int type, void *key)
  5497. {
  5498. int ret;
  5499. WOLFSSL_ENTER("wolfSSL_EVP_PKEY_assign");
  5500. /* pkey and key checked if NULL in subsequent assign functions */
  5501. switch(type) {
  5502. #ifndef NO_RSA
  5503. case EVP_PKEY_RSA:
  5504. ret = wolfSSL_EVP_PKEY_assign_RSA(pkey, (WOLFSSL_RSA*)key);
  5505. break;
  5506. #endif
  5507. #ifndef NO_DSA
  5508. case EVP_PKEY_DSA:
  5509. ret = wolfSSL_EVP_PKEY_assign_DSA(pkey, (WOLFSSL_DSA*)key);
  5510. break;
  5511. #endif
  5512. #ifdef HAVE_ECC
  5513. case EVP_PKEY_EC:
  5514. ret = wolfSSL_EVP_PKEY_assign_EC_KEY(pkey, (WOLFSSL_EC_KEY*)key);
  5515. break;
  5516. #endif
  5517. #ifdef NO_DH
  5518. case EVP_PKEY_DH:
  5519. ret = wolfSSL_EVP_PKEY_assign_DH(pkey, (WOLFSSL_DH*)key);
  5520. break;
  5521. #endif
  5522. default:
  5523. WOLFSSL_MSG("Unknown EVP_PKEY type in wolfSSL_EVP_PKEY_assign.");
  5524. ret = WOLFSSL_FAILURE;
  5525. }
  5526. return ret;
  5527. }
  5528. #endif /* WOLFSSL_QT || OPENSSL_ALL */
  5529. #if defined(HAVE_ECC)
  5530. /* try and populate public pkey_sz and pkey.ptr */
  5531. static void ECC_populate_EVP_PKEY(EVP_PKEY* pkey, ecc_key* ecc)
  5532. {
  5533. int ret;
  5534. if (!pkey || !ecc)
  5535. return;
  5536. if ((ret = wc_EccPublicKeyDerSize(ecc, 1)) > 0) {
  5537. int derSz = ret;
  5538. char* derBuf = (char*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  5539. if (derBuf) {
  5540. ret = wc_EccPublicKeyToDer(ecc, (byte*)derBuf, derSz, 1);
  5541. if (ret >= 0) {
  5542. if (pkey->pkey.ptr) {
  5543. XFREE(pkey->pkey.ptr, NULL, DYNAMIC_TYPE_OPENSSL);
  5544. }
  5545. pkey->pkey_sz = ret;
  5546. pkey->pkey.ptr = derBuf;
  5547. }
  5548. else { /* failure - okay to ignore */
  5549. XFREE(derBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  5550. derBuf = NULL;
  5551. }
  5552. }
  5553. }
  5554. }
  5555. WOLFSSL_API int wolfSSL_EVP_PKEY_set1_EC_KEY(WOLFSSL_EVP_PKEY *pkey, WOLFSSL_EC_KEY *key)
  5556. {
  5557. #ifdef HAVE_ECC
  5558. if((pkey == NULL) || (key ==NULL))return WOLFSSL_FAILURE;
  5559. WOLFSSL_ENTER("wolfSSL_EVP_PKEY_set1_EC_KEY");
  5560. #ifndef NO_RSA
  5561. if (pkey->rsa != NULL && pkey->ownRsa == 1) {
  5562. wolfSSL_RSA_free(pkey->rsa);
  5563. }
  5564. pkey->ownRsa = 0;
  5565. #endif
  5566. #ifndef NO_DSA
  5567. if (pkey->dsa != NULL && pkey->ownDsa == 1) {
  5568. wolfSSL_DSA_free(pkey->dsa);
  5569. }
  5570. pkey->ownDsa = 0;
  5571. #endif
  5572. #ifndef NO_DH
  5573. if (pkey->dh != NULL && pkey->ownDh == 1) {
  5574. wolfSSL_DH_free(pkey->dh);
  5575. }
  5576. pkey->ownDh = 0;
  5577. #endif
  5578. if (pkey->ecc != NULL && pkey->ownEcc == 1) {
  5579. wolfSSL_EC_KEY_free(pkey->ecc);
  5580. }
  5581. pkey->ecc = key;
  5582. pkey->ownEcc = 0; /* pkey does not own EC key */
  5583. pkey->type = EVP_PKEY_EC;
  5584. ECC_populate_EVP_PKEY(pkey, (ecc_key*)key->internal);
  5585. return WOLFSSL_SUCCESS;
  5586. #else
  5587. (void)pkey;
  5588. (void)key;
  5589. return WOLFSSL_FAILURE;
  5590. #endif
  5591. }
  5592. void* wolfSSL_EVP_X_STATE(const WOLFSSL_EVP_CIPHER_CTX* ctx)
  5593. {
  5594. WOLFSSL_MSG("wolfSSL_EVP_X_STATE");
  5595. if (ctx) {
  5596. switch (ctx->cipherType) {
  5597. case ARC4_TYPE:
  5598. WOLFSSL_MSG("returning arc4 state");
  5599. return (void*)&ctx->cipher.arc4.x;
  5600. default:
  5601. WOLFSSL_MSG("bad x state type");
  5602. return 0;
  5603. }
  5604. }
  5605. return NULL;
  5606. }
  5607. int wolfSSL_EVP_PKEY_assign_EC_KEY(EVP_PKEY* pkey, WOLFSSL_EC_KEY* key)
  5608. {
  5609. if (pkey == NULL || key == NULL)
  5610. return WOLFSSL_FAILURE;
  5611. pkey->type = EVP_PKEY_EC;
  5612. pkey->ecc = key;
  5613. pkey->ownEcc = 1;
  5614. /* try and populate public pkey_sz and pkey.ptr */
  5615. ECC_populate_EVP_PKEY(pkey, (ecc_key*)key->internal);
  5616. return WOLFSSL_SUCCESS;
  5617. }
  5618. #endif /* HAVE_ECC */
  5619. #ifndef NO_WOLFSSL_STUB
  5620. const WOLFSSL_EVP_MD* wolfSSL_EVP_ripemd160(void)
  5621. {
  5622. WOLFSSL_MSG("wolfSSL_ripemd160");
  5623. WOLFSSL_STUB("EVP_ripemd160");
  5624. return NULL;
  5625. }
  5626. #endif
  5627. int wolfSSL_EVP_MD_block_size(const WOLFSSL_EVP_MD* type)
  5628. {
  5629. WOLFSSL_MSG("wolfSSL_EVP_MD_block_size");
  5630. if (type == NULL) {
  5631. WOLFSSL_MSG("No md type arg");
  5632. return BAD_FUNC_ARG;
  5633. }
  5634. if (XSTRNCMP(type, "SHA256", 6) == 0) {
  5635. return WC_SHA256_BLOCK_SIZE;
  5636. }
  5637. #ifndef NO_MD5
  5638. else if (XSTRNCMP(type, "MD5", 3) == 0) {
  5639. return WC_MD5_BLOCK_SIZE;
  5640. }
  5641. #endif
  5642. #ifdef WOLFSSL_SHA224
  5643. else if (XSTRNCMP(type, "SHA224", 6) == 0) {
  5644. return WC_SHA224_BLOCK_SIZE;
  5645. }
  5646. #endif
  5647. #ifdef WOLFSSL_SHA384
  5648. else if (XSTRNCMP(type, "SHA384", 6) == 0) {
  5649. return WC_SHA384_BLOCK_SIZE;
  5650. }
  5651. #endif
  5652. #ifdef WOLFSSL_SHA512
  5653. else if (XSTRNCMP(type, "SHA512", 6) == 0) {
  5654. return WC_SHA512_BLOCK_SIZE;
  5655. }
  5656. #endif
  5657. #ifndef NO_SHA
  5658. /* has to be last since would pick or 256, 384, or 512 too */
  5659. else if (XSTRNCMP(type, "SHA", 3) == 0) {
  5660. return WC_SHA_BLOCK_SIZE;
  5661. }
  5662. #endif
  5663. return BAD_FUNC_ARG;
  5664. }
  5665. int wolfSSL_EVP_MD_size(const WOLFSSL_EVP_MD* type)
  5666. {
  5667. WOLFSSL_MSG("wolfSSL_EVP_MD_size");
  5668. if (type == NULL) {
  5669. WOLFSSL_MSG("No md type arg");
  5670. return BAD_FUNC_ARG;
  5671. }
  5672. if (XSTRNCMP(type, "SHA256", 6) == 0) {
  5673. return WC_SHA256_DIGEST_SIZE;
  5674. }
  5675. #ifndef NO_MD5
  5676. else if (XSTRNCMP(type, "MD5", 3) == 0) {
  5677. return WC_MD5_DIGEST_SIZE;
  5678. }
  5679. #endif
  5680. #ifdef WOLFSSL_SHA224
  5681. else if (XSTRNCMP(type, "SHA224", 6) == 0) {
  5682. return WC_SHA224_DIGEST_SIZE;
  5683. }
  5684. #endif
  5685. #ifdef WOLFSSL_SHA384
  5686. else if (XSTRNCMP(type, "SHA384", 6) == 0) {
  5687. return WC_SHA384_DIGEST_SIZE;
  5688. }
  5689. #endif
  5690. #ifdef WOLFSSL_SHA512
  5691. else if (XSTRNCMP(type, "SHA512", 6) == 0) {
  5692. return WC_SHA512_DIGEST_SIZE;
  5693. }
  5694. #endif
  5695. #ifndef NO_SHA
  5696. /* has to be last since would pick or 256, 384, or 512 too */
  5697. else if (XSTRNCMP(type, "SHA", 3) == 0) {
  5698. return WC_SHA_DIGEST_SIZE;
  5699. }
  5700. #endif
  5701. return BAD_FUNC_ARG;
  5702. }
  5703. int wolfSSL_EVP_CIPHER_CTX_iv_length(const WOLFSSL_EVP_CIPHER_CTX* ctx)
  5704. {
  5705. WOLFSSL_MSG("wolfSSL_EVP_CIPHER_CTX_iv_length");
  5706. switch (ctx->cipherType) {
  5707. #ifdef HAVE_AES_CBC
  5708. case AES_128_CBC_TYPE :
  5709. case AES_192_CBC_TYPE :
  5710. case AES_256_CBC_TYPE :
  5711. WOLFSSL_MSG("AES CBC");
  5712. return AES_BLOCK_SIZE;
  5713. #endif
  5714. #ifdef HAVE_AESGCM
  5715. case AES_128_GCM_TYPE :
  5716. case AES_192_GCM_TYPE :
  5717. case AES_256_GCM_TYPE :
  5718. WOLFSSL_MSG("AES GCM");
  5719. return GCM_NONCE_MID_SZ;
  5720. #endif
  5721. #ifdef WOLFSSL_AES_COUNTER
  5722. case AES_128_CTR_TYPE :
  5723. case AES_192_CTR_TYPE :
  5724. case AES_256_CTR_TYPE :
  5725. WOLFSSL_MSG("AES CTR");
  5726. return AES_BLOCK_SIZE;
  5727. #endif
  5728. #ifndef NO_DES3
  5729. case DES_CBC_TYPE :
  5730. WOLFSSL_MSG("DES CBC");
  5731. return DES_BLOCK_SIZE;
  5732. case DES_EDE3_CBC_TYPE :
  5733. WOLFSSL_MSG("DES EDE3 CBC");
  5734. return DES_BLOCK_SIZE;
  5735. #endif
  5736. #ifdef HAVE_IDEA
  5737. case IDEA_CBC_TYPE :
  5738. WOLFSSL_MSG("IDEA CBC");
  5739. return IDEA_BLOCK_SIZE;
  5740. #endif
  5741. #ifndef NO_RC4
  5742. case ARC4_TYPE :
  5743. WOLFSSL_MSG("ARC4");
  5744. return 0;
  5745. #endif
  5746. #ifdef WOLFSSL_AES_CFB
  5747. #if !defined(HAVE_SELFTEST) && !defined(HAVE_FIPS)
  5748. case AES_128_CFB1_TYPE:
  5749. case AES_192_CFB1_TYPE:
  5750. case AES_256_CFB1_TYPE:
  5751. WOLFSSL_MSG("AES CFB1");
  5752. return AES_BLOCK_SIZE;
  5753. case AES_128_CFB8_TYPE:
  5754. case AES_192_CFB8_TYPE:
  5755. case AES_256_CFB8_TYPE:
  5756. WOLFSSL_MSG("AES CFB8");
  5757. return AES_BLOCK_SIZE;
  5758. #endif /* !HAVE_SELFTEST && !HAVE_FIPS */
  5759. case AES_128_CFB128_TYPE:
  5760. case AES_192_CFB128_TYPE:
  5761. case AES_256_CFB128_TYPE:
  5762. WOLFSSL_MSG("AES CFB128");
  5763. return AES_BLOCK_SIZE;
  5764. #endif /* WOLFSSL_AES_CFB */
  5765. #if defined(WOLFSSL_AES_OFB)
  5766. case AES_128_OFB_TYPE:
  5767. case AES_192_OFB_TYPE:
  5768. case AES_256_OFB_TYPE:
  5769. WOLFSSL_MSG("AES OFB");
  5770. return AES_BLOCK_SIZE;
  5771. #endif /* WOLFSSL_AES_OFB */
  5772. #ifdef WOLFSSL_AES_XTS
  5773. case AES_128_XTS_TYPE:
  5774. case AES_256_XTS_TYPE:
  5775. WOLFSSL_MSG("AES XTS");
  5776. return AES_BLOCK_SIZE;
  5777. #endif /* WOLFSSL_AES_XTS */
  5778. case NULL_CIPHER_TYPE :
  5779. WOLFSSL_MSG("NULL");
  5780. return 0;
  5781. default: {
  5782. WOLFSSL_MSG("bad type");
  5783. }
  5784. }
  5785. return 0;
  5786. }
  5787. int wolfSSL_EVP_CIPHER_iv_length(const WOLFSSL_EVP_CIPHER* cipher)
  5788. {
  5789. const char *name = (const char *)cipher;
  5790. WOLFSSL_MSG("wolfSSL_EVP_CIPHER_iv_length");
  5791. #ifndef NO_AES
  5792. #ifdef HAVE_AES_CBC
  5793. #ifdef WOLFSSL_AES_128
  5794. if (EVP_AES_128_CBC && XSTRNCMP(name, EVP_AES_128_CBC, XSTRLEN(EVP_AES_128_CBC)) == 0)
  5795. return AES_BLOCK_SIZE;
  5796. #endif
  5797. #ifdef WOLFSSL_AES_192
  5798. if (EVP_AES_192_CBC && XSTRNCMP(name, EVP_AES_192_CBC, XSTRLEN(EVP_AES_192_CBC)) == 0)
  5799. return AES_BLOCK_SIZE;
  5800. #endif
  5801. #ifdef WOLFSSL_AES_256
  5802. if (EVP_AES_256_CBC && XSTRNCMP(name, EVP_AES_256_CBC, XSTRLEN(EVP_AES_256_CBC)) == 0)
  5803. return AES_BLOCK_SIZE;
  5804. #endif
  5805. #endif /* HAVE_AES_CBC */
  5806. #ifdef HAVE_AESGCM
  5807. #ifdef WOLFSSL_AES_128
  5808. if (EVP_AES_128_GCM && XSTRNCMP(name, EVP_AES_128_GCM, XSTRLEN(EVP_AES_128_GCM)) == 0)
  5809. return GCM_NONCE_MID_SZ;
  5810. #endif
  5811. #ifdef WOLFSSL_AES_192
  5812. if (EVP_AES_192_GCM && XSTRNCMP(name, EVP_AES_192_GCM, XSTRLEN(EVP_AES_192_GCM)) == 0)
  5813. return GCM_NONCE_MID_SZ;
  5814. #endif
  5815. #ifdef WOLFSSL_AES_256
  5816. if (EVP_AES_256_GCM && XSTRNCMP(name, EVP_AES_256_GCM, XSTRLEN(EVP_AES_256_GCM)) == 0)
  5817. return GCM_NONCE_MID_SZ;
  5818. #endif
  5819. #endif /* HAVE_AESGCM */
  5820. #ifdef WOLFSSL_AES_COUNTER
  5821. #ifdef WOLFSSL_AES_128
  5822. if (EVP_AES_128_CTR && XSTRNCMP(name, EVP_AES_128_CTR, XSTRLEN(EVP_AES_128_CTR)) == 0)
  5823. return AES_BLOCK_SIZE;
  5824. #endif
  5825. #ifdef WOLFSSL_AES_192
  5826. if (EVP_AES_192_CTR && XSTRNCMP(name, EVP_AES_192_CTR, XSTRLEN(EVP_AES_192_CTR)) == 0)
  5827. return AES_BLOCK_SIZE;
  5828. #endif
  5829. #ifdef WOLFSSL_AES_256
  5830. if (EVP_AES_256_CTR && XSTRNCMP(name, EVP_AES_256_CTR, XSTRLEN(EVP_AES_256_CTR)) == 0)
  5831. return AES_BLOCK_SIZE;
  5832. #endif
  5833. #endif
  5834. #ifdef WOLFSSL_AES_XTS
  5835. #ifdef WOLFSSL_AES_128
  5836. if (EVP_AES_128_XTS && XSTRNCMP(name, EVP_AES_128_XTS, XSTRLEN(EVP_AES_128_XTS)) == 0)
  5837. return AES_BLOCK_SIZE;
  5838. #endif /* WOLFSSL_AES_128 */
  5839. #ifdef WOLFSSL_AES_256
  5840. if (EVP_AES_256_XTS && XSTRNCMP(name, EVP_AES_256_XTS, XSTRLEN(EVP_AES_256_XTS)) == 0)
  5841. return AES_BLOCK_SIZE;
  5842. #endif /* WOLFSSL_AES_256 */
  5843. #endif /* WOLFSSL_AES_XTS */
  5844. #endif
  5845. #ifndef NO_DES3
  5846. if ((EVP_DES_CBC && XSTRNCMP(name, EVP_DES_CBC, XSTRLEN(EVP_DES_CBC)) == 0) ||
  5847. (EVP_DES_EDE3_CBC && XSTRNCMP(name, EVP_DES_EDE3_CBC, XSTRLEN(EVP_DES_EDE3_CBC)) == 0)) {
  5848. return DES_BLOCK_SIZE;
  5849. }
  5850. #endif
  5851. #ifdef HAVE_IDEA
  5852. if (EVP_IDEA_CBC && XSTRNCMP(name, EVP_IDEA_CBC, XSTRLEN(EVP_IDEA_CBC)) == 0)
  5853. return IDEA_BLOCK_SIZE;
  5854. #endif
  5855. (void)name;
  5856. return 0;
  5857. }
  5858. int wolfSSL_EVP_X_STATE_LEN(const WOLFSSL_EVP_CIPHER_CTX* ctx)
  5859. {
  5860. WOLFSSL_MSG("wolfSSL_EVP_X_STATE_LEN");
  5861. if (ctx) {
  5862. switch (ctx->cipherType) {
  5863. case ARC4_TYPE:
  5864. WOLFSSL_MSG("returning arc4 state size");
  5865. return sizeof(Arc4);
  5866. default:
  5867. WOLFSSL_MSG("bad x state type");
  5868. return 0;
  5869. }
  5870. }
  5871. return 0;
  5872. }
  5873. /* return of pkey->type which will be EVP_PKEY_RSA for example.
  5874. *
  5875. * type type of EVP_PKEY
  5876. *
  5877. * returns type or if type is not found then NID_undef
  5878. */
  5879. int wolfSSL_EVP_PKEY_type(int type)
  5880. {
  5881. WOLFSSL_MSG("wolfSSL_EVP_PKEY_type");
  5882. switch (type) {
  5883. case EVP_PKEY_RSA:
  5884. return EVP_PKEY_RSA;
  5885. case EVP_PKEY_DSA:
  5886. return EVP_PKEY_DSA;
  5887. case EVP_PKEY_EC:
  5888. return EVP_PKEY_EC;
  5889. case EVP_PKEY_DH:
  5890. return EVP_PKEY_DH;
  5891. default:
  5892. return NID_undef;
  5893. }
  5894. }
  5895. int wolfSSL_EVP_PKEY_id(const EVP_PKEY *pkey)
  5896. {
  5897. if (pkey != NULL)
  5898. return pkey->type;
  5899. return 0;
  5900. }
  5901. int wolfSSL_EVP_PKEY_base_id(const EVP_PKEY *pkey)
  5902. {
  5903. if (pkey == NULL)
  5904. return NID_undef;
  5905. return wolfSSL_EVP_PKEY_type(pkey->type);
  5906. }
  5907. /* increments ref count of WOLFSSL_EVP_PKEY. Return 1 on success, 0 on error */
  5908. int wolfSSL_EVP_PKEY_up_ref(WOLFSSL_EVP_PKEY* pkey)
  5909. {
  5910. if (pkey) {
  5911. if (wc_LockMutex(&pkey->refMutex) != 0) {
  5912. WOLFSSL_MSG("Failed to lock pkey mutex");
  5913. }
  5914. pkey->references++;
  5915. wc_UnLockMutex(&pkey->refMutex);
  5916. return 1;
  5917. }
  5918. return 0;
  5919. }
  5920. #ifndef NO_RSA
  5921. int wolfSSL_EVP_PKEY_assign_RSA(EVP_PKEY* pkey, WOLFSSL_RSA* key)
  5922. {
  5923. if (pkey == NULL || key == NULL)
  5924. return WOLFSSL_FAILURE;
  5925. pkey->type = EVP_PKEY_RSA;
  5926. pkey->rsa = key;
  5927. pkey->ownRsa = 1;
  5928. /* try and populate public pkey_sz and pkey.ptr */
  5929. if (key->internal) {
  5930. RsaKey* rsa = (RsaKey*)key->internal;
  5931. int ret = wc_RsaPublicKeyDerSize(rsa, 1);
  5932. if (ret > 0) {
  5933. int derSz = ret;
  5934. char* derBuf = (char*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  5935. if (derBuf) {
  5936. ret = wc_RsaKeyToPublicDer(rsa, (byte*)derBuf, derSz);
  5937. if (ret >= 0) {
  5938. pkey->pkey_sz = ret;
  5939. pkey->pkey.ptr = derBuf;
  5940. }
  5941. else { /* failure - okay to ignore */
  5942. XFREE(derBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  5943. derBuf = NULL;
  5944. }
  5945. }
  5946. }
  5947. }
  5948. return WOLFSSL_SUCCESS;
  5949. }
  5950. #endif /* !NO_RSA */
  5951. #ifndef NO_DSA
  5952. int wolfSSL_EVP_PKEY_assign_DSA(EVP_PKEY* pkey, WOLFSSL_DSA* key)
  5953. {
  5954. if (pkey == NULL || key == NULL)
  5955. return WOLFSSL_FAILURE;
  5956. pkey->type = EVP_PKEY_DSA;
  5957. pkey->dsa = key;
  5958. pkey->ownDsa = 1;
  5959. return WOLFSSL_SUCCESS;
  5960. }
  5961. #endif /* !NO_DSA */
  5962. #ifndef NO_DH
  5963. int wolfSSL_EVP_PKEY_assign_DH(EVP_PKEY* pkey, WOLFSSL_DH* key)
  5964. {
  5965. if (pkey == NULL || key == NULL)
  5966. return WOLFSSL_FAILURE;
  5967. pkey->type = EVP_PKEY_DH;
  5968. pkey->dh = key;
  5969. pkey->ownDh = 1;
  5970. return WOLFSSL_SUCCESS;
  5971. }
  5972. #endif /* !NO_DH */
  5973. #endif /* OPENSSL_EXTRA */
  5974. #if defined(OPENSSL_EXTRA_X509_SMALL)
  5975. /* Subset of OPENSSL_EXTRA for PKEY operations PKEY free is needed by the
  5976. * subset of X509 API */
  5977. WOLFSSL_EVP_PKEY* wolfSSL_EVP_PKEY_new(void){
  5978. return wolfSSL_EVP_PKEY_new_ex(NULL);
  5979. }
  5980. WOLFSSL_EVP_PKEY* wolfSSL_EVP_PKEY_new_ex(void* heap)
  5981. {
  5982. WOLFSSL_EVP_PKEY* pkey;
  5983. int ret;
  5984. WOLFSSL_ENTER("wolfSSL_EVP_PKEY_new_ex");
  5985. pkey = (WOLFSSL_EVP_PKEY*)XMALLOC(sizeof(WOLFSSL_EVP_PKEY), heap,
  5986. DYNAMIC_TYPE_PUBLIC_KEY);
  5987. if (pkey != NULL) {
  5988. XMEMSET(pkey, 0, sizeof(WOLFSSL_EVP_PKEY));
  5989. pkey->heap = heap;
  5990. pkey->type = WOLFSSL_EVP_PKEY_DEFAULT;
  5991. #ifndef HAVE_FIPS
  5992. ret = wc_InitRng_ex(&pkey->rng, heap, INVALID_DEVID);
  5993. #else
  5994. ret = wc_InitRng(&pkey->rng);
  5995. #endif
  5996. if (ret != 0){
  5997. wolfSSL_EVP_PKEY_free(pkey);
  5998. WOLFSSL_MSG("memory failure");
  5999. return NULL;
  6000. }
  6001. pkey->references = 1;
  6002. wc_InitMutex(&pkey->refMutex);
  6003. }
  6004. else {
  6005. WOLFSSL_MSG("memory failure");
  6006. }
  6007. return pkey;
  6008. }
  6009. void wolfSSL_EVP_PKEY_free(WOLFSSL_EVP_PKEY* key)
  6010. {
  6011. int doFree = 0;
  6012. WOLFSSL_ENTER("wolfSSL_EVP_PKEY_free");
  6013. if (key != NULL) {
  6014. if (wc_LockMutex(&key->refMutex) != 0) {
  6015. WOLFSSL_MSG("Couldn't lock pkey mutex");
  6016. }
  6017. /* only free if all references to it are done */
  6018. key->references--;
  6019. if (key->references == 0) {
  6020. doFree = 1;
  6021. }
  6022. wc_UnLockMutex(&key->refMutex);
  6023. if (doFree) {
  6024. wc_FreeRng(&key->rng);
  6025. if (key->pkey.ptr != NULL) {
  6026. XFREE(key->pkey.ptr, key->heap, DYNAMIC_TYPE_PUBLIC_KEY);
  6027. key->pkey.ptr = NULL;
  6028. }
  6029. switch(key->type)
  6030. {
  6031. #ifndef NO_RSA
  6032. case EVP_PKEY_RSA:
  6033. if (key->rsa != NULL && key->ownRsa == 1) {
  6034. wolfSSL_RSA_free(key->rsa);
  6035. key->rsa = NULL;
  6036. }
  6037. break;
  6038. #endif /* NO_RSA */
  6039. #if defined(HAVE_ECC) && defined(OPENSSL_EXTRA)
  6040. case EVP_PKEY_EC:
  6041. if (key->ecc != NULL && key->ownEcc == 1) {
  6042. wolfSSL_EC_KEY_free(key->ecc);
  6043. key->ecc = NULL;
  6044. }
  6045. break;
  6046. #endif /* HAVE_ECC && OPENSSL_EXTRA */
  6047. #ifndef NO_DSA
  6048. case EVP_PKEY_DSA:
  6049. if (key->dsa != NULL && key->ownDsa == 1) {
  6050. wolfSSL_DSA_free(key->dsa);
  6051. key->dsa = NULL;
  6052. }
  6053. break;
  6054. #endif /* NO_DSA */
  6055. #if !defined(NO_DH) && (defined(WOLFSSL_QT) || defined(OPENSSL_ALL))
  6056. case EVP_PKEY_DH:
  6057. if (key->dh != NULL && key->ownDh == 1) {
  6058. wolfSSL_DH_free(key->dh);
  6059. key->dh = NULL;
  6060. }
  6061. break;
  6062. #endif /* ! NO_DH ... */
  6063. default:
  6064. break;
  6065. }
  6066. if (wc_FreeMutex(&key->refMutex) != 0) {
  6067. WOLFSSL_MSG("Couldn't free pkey mutex");
  6068. }
  6069. XFREE(key, key->heap, DYNAMIC_TYPE_PUBLIC_KEY);
  6070. }
  6071. }
  6072. }
  6073. #endif /* OPENSSL_EXTRA_X509_SMALL */
  6074. #endif /* WOLFSSL_EVP_INCLUDED */