VirtualBox

source: vbox/trunk/src/libs/openssl-3.1.0/providers/common/provider_util.c@ 100908

最後變更 在這個檔案從100908是 99366,由 vboxsync 提交於 22 月 前

openssl-3.1.0: Applied and adjusted our OpenSSL changes to 3.0.7. bugref:10418

檔案大小: 10.7 KB
 
1/*
2 * Copyright 2019-2022 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10/* We need to use some engine deprecated APIs */
11#define OPENSSL_SUPPRESS_DEPRECATED
12
13#include <openssl/evp.h>
14#include <openssl/core_names.h>
15#include <openssl/err.h>
16#include <openssl/proverr.h>
17#ifndef FIPS_MODULE
18# include <openssl/engine.h>
19# include "crypto/evp.h"
20#endif
21#include "prov/provider_util.h"
22
23void ossl_prov_cipher_reset(PROV_CIPHER *pc)
24{
25 EVP_CIPHER_free(pc->alloc_cipher);
26 pc->alloc_cipher = NULL;
27 pc->cipher = NULL;
28#if !defined(FIPS_MODULE) && !defined(OPENSSL_NO_ENGINE)
29 ENGINE_finish(pc->engine);
30#endif
31 pc->engine = NULL;
32}
33
34int ossl_prov_cipher_copy(PROV_CIPHER *dst, const PROV_CIPHER *src)
35{
36 if (src->alloc_cipher != NULL && !EVP_CIPHER_up_ref(src->alloc_cipher))
37 return 0;
38#if !defined(FIPS_MODULE) && !defined(OPENSSL_NO_ENGINE)
39 if (src->engine != NULL && !ENGINE_init(src->engine)) {
40 EVP_CIPHER_free(src->alloc_cipher);
41 return 0;
42 }
43#endif
44 dst->engine = src->engine;
45 dst->cipher = src->cipher;
46 dst->alloc_cipher = src->alloc_cipher;
47 return 1;
48}
49
50static int load_common(const OSSL_PARAM params[], const char **propquery,
51 ENGINE **engine)
52{
53 const OSSL_PARAM *p;
54
55 *propquery = NULL;
56 p = OSSL_PARAM_locate_const(params, OSSL_ALG_PARAM_PROPERTIES);
57 if (p != NULL) {
58 if (p->data_type != OSSL_PARAM_UTF8_STRING)
59 return 0;
60 *propquery = p->data;
61 }
62
63#if !defined(FIPS_MODULE) && !defined(OPENSSL_NO_ENGINE)
64 ENGINE_finish(*engine);
65#endif
66 *engine = NULL;
67 /* Inside the FIPS module, we don't support legacy ciphers */
68#if !defined(FIPS_MODULE) && !defined(OPENSSL_NO_ENGINE)
69 p = OSSL_PARAM_locate_const(params, OSSL_ALG_PARAM_ENGINE);
70 if (p != NULL) {
71 if (p->data_type != OSSL_PARAM_UTF8_STRING)
72 return 0;
73 /* Get a structural reference */
74 *engine = ENGINE_by_id(p->data);
75 if (*engine == NULL)
76 return 0;
77 /* Get a functional reference */
78 if (!ENGINE_init(*engine)) {
79 ENGINE_free(*engine);
80 *engine = NULL;
81 return 0;
82 }
83 /* Free the structural reference */
84 ENGINE_free(*engine);
85 }
86#endif
87 return 1;
88}
89
90int ossl_prov_cipher_load_from_params(PROV_CIPHER *pc,
91 const OSSL_PARAM params[],
92 OSSL_LIB_CTX *ctx)
93{
94 const OSSL_PARAM *p;
95 const char *propquery;
96
97 if (params == NULL)
98 return 1;
99
100 if (!load_common(params, &propquery, &pc->engine))
101 return 0;
102
103 p = OSSL_PARAM_locate_const(params, OSSL_ALG_PARAM_CIPHER);
104 if (p == NULL)
105 return 1;
106 if (p->data_type != OSSL_PARAM_UTF8_STRING)
107 return 0;
108
109 EVP_CIPHER_free(pc->alloc_cipher);
110 ERR_set_mark();
111 pc->cipher = pc->alloc_cipher = EVP_CIPHER_fetch(ctx, p->data, propquery);
112#ifndef FIPS_MODULE /* Inside the FIPS module, we don't support legacy ciphers */
113 if (pc->cipher == NULL) {
114 const EVP_CIPHER *cipher;
115
116 cipher = EVP_get_cipherbyname(p->data);
117 /* Do not use global EVP_CIPHERs */
118 if (cipher != NULL && cipher->origin != EVP_ORIG_GLOBAL)
119 pc->cipher = cipher;
120 }
121#endif
122 if (pc->cipher != NULL)
123 ERR_pop_to_mark();
124 else
125 ERR_clear_last_mark();
126 return pc->cipher != NULL;
127}
128
129const EVP_CIPHER *ossl_prov_cipher_cipher(const PROV_CIPHER *pc)
130{
131 return pc->cipher;
132}
133
134ENGINE *ossl_prov_cipher_engine(const PROV_CIPHER *pc)
135{
136 return pc->engine;
137}
138
139void ossl_prov_digest_reset(PROV_DIGEST *pd)
140{
141 EVP_MD_free(pd->alloc_md);
142 pd->alloc_md = NULL;
143 pd->md = NULL;
144#if !defined(FIPS_MODULE) && !defined(OPENSSL_NO_ENGINE)
145 ENGINE_finish(pd->engine);
146#endif
147 pd->engine = NULL;
148}
149
150int ossl_prov_digest_copy(PROV_DIGEST *dst, const PROV_DIGEST *src)
151{
152 if (src->alloc_md != NULL && !EVP_MD_up_ref(src->alloc_md))
153 return 0;
154#if !defined(FIPS_MODULE) && !defined(OPENSSL_NO_ENGINE)
155 if (src->engine != NULL && !ENGINE_init(src->engine)) {
156 EVP_MD_free(src->alloc_md);
157 return 0;
158 }
159#endif
160 dst->engine = src->engine;
161 dst->md = src->md;
162 dst->alloc_md = src->alloc_md;
163 return 1;
164}
165
166const EVP_MD *ossl_prov_digest_fetch(PROV_DIGEST *pd, OSSL_LIB_CTX *libctx,
167 const char *mdname, const char *propquery)
168{
169 EVP_MD_free(pd->alloc_md);
170 pd->md = pd->alloc_md = EVP_MD_fetch(libctx, mdname, propquery);
171
172 return pd->md;
173}
174
175int ossl_prov_digest_load_from_params(PROV_DIGEST *pd,
176 const OSSL_PARAM params[],
177 OSSL_LIB_CTX *ctx)
178{
179 const OSSL_PARAM *p;
180 const char *propquery;
181
182 if (params == NULL)
183 return 1;
184
185 if (!load_common(params, &propquery, &pd->engine))
186 return 0;
187
188 p = OSSL_PARAM_locate_const(params, OSSL_ALG_PARAM_DIGEST);
189 if (p == NULL)
190 return 1;
191 if (p->data_type != OSSL_PARAM_UTF8_STRING)
192 return 0;
193
194 ERR_set_mark();
195 ossl_prov_digest_fetch(pd, ctx, p->data, propquery);
196#ifndef FIPS_MODULE /* Inside the FIPS module, we don't support legacy digests */
197 if (pd->md == NULL) {
198 const EVP_MD *md;
199
200 md = EVP_get_digestbyname(p->data);
201 /* Do not use global EVP_MDs */
202 if (md != NULL && md->origin != EVP_ORIG_GLOBAL)
203 pd->md = md;
204 }
205#endif
206 if (pd->md != NULL)
207 ERR_pop_to_mark();
208 else
209 ERR_clear_last_mark();
210 return pd->md != NULL;
211}
212
213const EVP_MD *ossl_prov_digest_md(const PROV_DIGEST *pd)
214{
215 return pd->md;
216}
217
218ENGINE *ossl_prov_digest_engine(const PROV_DIGEST *pd)
219{
220 return pd->engine;
221}
222
223int ossl_prov_set_macctx(EVP_MAC_CTX *macctx,
224 const OSSL_PARAM params[],
225 const char *ciphername,
226 const char *mdname,
227 const char *engine,
228 const char *properties,
229 const unsigned char *key,
230 size_t keylen)
231{
232 const OSSL_PARAM *p;
233 OSSL_PARAM mac_params[6], *mp = mac_params;
234
235 if (params != NULL) {
236 if (mdname == NULL) {
237 if ((p = OSSL_PARAM_locate_const(params,
238 OSSL_ALG_PARAM_DIGEST)) != NULL) {
239 if (p->data_type != OSSL_PARAM_UTF8_STRING)
240 return 0;
241 mdname = p->data;
242 }
243 }
244 if (ciphername == NULL) {
245 if ((p = OSSL_PARAM_locate_const(params,
246 OSSL_ALG_PARAM_CIPHER)) != NULL) {
247 if (p->data_type != OSSL_PARAM_UTF8_STRING)
248 return 0;
249 ciphername = p->data;
250 }
251 }
252 if (engine == NULL) {
253 if ((p = OSSL_PARAM_locate_const(params, OSSL_ALG_PARAM_ENGINE))
254 != NULL) {
255 if (p->data_type != OSSL_PARAM_UTF8_STRING)
256 return 0;
257 engine = p->data;
258 }
259 }
260 }
261
262 if (mdname != NULL)
263 *mp++ = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST,
264 (char *)mdname, 0);
265 if (ciphername != NULL)
266 *mp++ = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_CIPHER,
267 (char *)ciphername, 0);
268 if (properties != NULL)
269 *mp++ = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_PROPERTIES,
270 (char *)properties, 0);
271
272#if !defined(OPENSSL_NO_ENGINE) && !defined(FIPS_MODULE)
273 if (engine != NULL)
274 *mp++ = OSSL_PARAM_construct_utf8_string(OSSL_ALG_PARAM_ENGINE,
275 (char *) engine, 0);
276#endif
277
278 if (key != NULL)
279 *mp++ = OSSL_PARAM_construct_octet_string(OSSL_MAC_PARAM_KEY,
280 (unsigned char *)key,
281 keylen);
282
283 *mp = OSSL_PARAM_construct_end();
284
285 return EVP_MAC_CTX_set_params(macctx, mac_params);
286
287}
288
289int ossl_prov_macctx_load_from_params(EVP_MAC_CTX **macctx,
290 const OSSL_PARAM params[],
291 const char *macname,
292 const char *ciphername,
293 const char *mdname,
294 OSSL_LIB_CTX *libctx)
295{
296 const OSSL_PARAM *p;
297 const char *properties = NULL;
298
299 if (macname == NULL
300 && (p = OSSL_PARAM_locate_const(params, OSSL_ALG_PARAM_MAC)) != NULL) {
301 if (p->data_type != OSSL_PARAM_UTF8_STRING)
302 return 0;
303 macname = p->data;
304 }
305 if ((p = OSSL_PARAM_locate_const(params,
306 OSSL_ALG_PARAM_PROPERTIES)) != NULL) {
307 if (p->data_type != OSSL_PARAM_UTF8_STRING)
308 return 0;
309 properties = p->data;
310 }
311
312 /* If we got a new mac name, we make a new EVP_MAC_CTX */
313 if (macname != NULL) {
314 EVP_MAC *mac = EVP_MAC_fetch(libctx, macname, properties);
315
316 EVP_MAC_CTX_free(*macctx);
317 *macctx = mac == NULL ? NULL : EVP_MAC_CTX_new(mac);
318 /* The context holds on to the MAC */
319 EVP_MAC_free(mac);
320 if (*macctx == NULL)
321 return 0;
322 }
323
324 /*
325 * If there is no MAC yet (and therefore, no MAC context), we ignore
326 * all other parameters.
327 */
328 if (*macctx == NULL)
329 return 1;
330
331 if (ossl_prov_set_macctx(*macctx, params, ciphername, mdname, NULL,
332 properties, NULL, 0))
333 return 1;
334
335 EVP_MAC_CTX_free(*macctx);
336 *macctx = NULL;
337 return 0;
338}
339
340void ossl_prov_cache_exported_algorithms(const OSSL_ALGORITHM_CAPABLE *in,
341 OSSL_ALGORITHM *out)
342{
343 int i, j;
344
345 if (out[0].algorithm_names == NULL) {
346 for (i = j = 0; in[i].alg.algorithm_names != NULL; ++i) {
347 if (in[i].capable == NULL || in[i].capable())
348 out[j++] = in[i].alg;
349 }
350 out[j++] = in[i].alg;
351 }
352}
353
354/* Duplicate a lump of memory safely */
355int ossl_prov_memdup(const void *src, size_t src_len,
356 unsigned char **dest, size_t *dest_len)
357{
358 if (src != NULL) {
359 if ((*dest = OPENSSL_memdup(src, src_len)) == NULL) {
360 ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE);
361 return 0;
362 }
363 *dest_len = src_len;
364 } else {
365 *dest = NULL;
366 *dest_len = 0;
367 }
368 return 1;
369}
注意: 瀏覽 TracBrowser 來幫助您使用儲存庫瀏覽器

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette