You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
713 lines
20 KiB
713 lines
20 KiB
/* |
|
* Demo of how to construct your own engine and using it. The basis of this |
|
* engine is RSAref, an old reference of the RSA algorithm which can still be |
|
* found a little here and there. |
|
*/ |
|
|
|
#include <stdio.h> |
|
#include <string.h> |
|
#include "./source/global.h" |
|
#include "./source/rsaref.h" |
|
#include "./source/rsa.h" |
|
#include "./source/des.h" |
|
#include <openssl/err.h> |
|
#define OPENSSL_NO_MD2 |
|
#define OPENSSL_NO_MD5 |
|
#include <openssl/evp.h> |
|
#include <openssl/bn.h> |
|
#include <openssl/engine.h> |
|
|
|
#define RSAREF_LIB_NAME "rsaref engine" |
|
#include "rsaref_err.c" |
|
|
|
/***************************************************************************** |
|
*** Function declarations and global variable definitions *** |
|
*****************************************************************************/ |
|
|
|
/***************************************************************************** |
|
* Constants used when creating the ENGINE |
|
**/ |
|
static const char *engine_rsaref_id = "rsaref"; |
|
static const char *engine_rsaref_name = "RSAref engine support"; |
|
|
|
/***************************************************************************** |
|
* Functions to handle the engine |
|
**/ |
|
static int rsaref_destroy(ENGINE *e); |
|
static int rsaref_init(ENGINE *e); |
|
static int rsaref_finish(ENGINE *e); |
|
#if 0 |
|
static int rsaref_ctrl(ENGINE *e, int cmd, long i, void *p, void (*f) ()); |
|
#endif |
|
|
|
/***************************************************************************** |
|
* Engine commands |
|
**/ |
|
static const ENGINE_CMD_DEFN rsaref_cmd_defns[] = { |
|
{0, NULL, NULL, 0} |
|
}; |
|
|
|
/***************************************************************************** |
|
* RSA functions |
|
**/ |
|
static int rsaref_private_decrypt(int len, const unsigned char *from, |
|
unsigned char *to, RSA *rsa, int padding); |
|
static int rsaref_private_encrypt(int len, const unsigned char *from, |
|
unsigned char *to, RSA *rsa, int padding); |
|
static int rsaref_public_encrypt(int len, const unsigned char *from, |
|
unsigned char *to, RSA *rsa, int padding); |
|
static int rsaref_public_decrypt(int len, const unsigned char *from, |
|
unsigned char *to, RSA *rsa, int padding); |
|
static int bnref_mod_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, |
|
const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx); |
|
static int rsaref_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa); |
|
|
|
/***************************************************************************** |
|
* Our RSA method |
|
**/ |
|
static RSA_METHOD rsaref_rsa = { |
|
"RSAref PKCS#1 RSA", |
|
rsaref_public_encrypt, |
|
rsaref_public_decrypt, |
|
rsaref_private_encrypt, |
|
rsaref_private_decrypt, |
|
rsaref_mod_exp, |
|
bnref_mod_exp, |
|
NULL, |
|
NULL, |
|
0, |
|
NULL, |
|
NULL, |
|
NULL |
|
}; |
|
|
|
/***************************************************************************** |
|
* Symetric cipher and digest function registrars |
|
**/ |
|
static int rsaref_ciphers(ENGINE *e, const EVP_CIPHER **cipher, |
|
const int **nids, int nid); |
|
static int rsaref_digests(ENGINE *e, const EVP_MD **digest, |
|
const int **nids, int nid); |
|
|
|
static int rsaref_cipher_nids[] = |
|
{ NID_des_cbc, NID_des_ede3_cbc, NID_desx_cbc, 0 }; |
|
static int rsaref_digest_nids[] = { NID_md2, NID_md5, 0 }; |
|
|
|
/***************************************************************************** |
|
* DES functions |
|
**/ |
|
static int cipher_des_cbc_init(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
|
const unsigned char *iv, int enc); |
|
static int cipher_des_cbc_code(EVP_CIPHER_CTX *ctx, unsigned char *out, |
|
const unsigned char *in, unsigned int inl); |
|
static int cipher_des_cbc_clean(EVP_CIPHER_CTX *); |
|
static int cipher_des_ede3_cbc_init(EVP_CIPHER_CTX *ctx, |
|
const unsigned char *key, |
|
const unsigned char *iv, int enc); |
|
static int cipher_des_ede3_cbc_code(EVP_CIPHER_CTX *ctx, unsigned char *out, |
|
const unsigned char *in, |
|
unsigned int inl); |
|
static int cipher_des_ede3_cbc_clean(EVP_CIPHER_CTX *); |
|
static int cipher_desx_cbc_init(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
|
const unsigned char *iv, int enc); |
|
static int cipher_desx_cbc_code(EVP_CIPHER_CTX *ctx, unsigned char *out, |
|
const unsigned char *in, unsigned int inl); |
|
static int cipher_desx_cbc_clean(EVP_CIPHER_CTX *); |
|
|
|
/***************************************************************************** |
|
* Our DES ciphers |
|
**/ |
|
static const EVP_CIPHER cipher_des_cbc = { |
|
NID_des_cbc, |
|
8, 8, 8, |
|
0 | EVP_CIPH_CBC_MODE, |
|
cipher_des_cbc_init, |
|
cipher_des_cbc_code, |
|
cipher_des_cbc_clean, |
|
sizeof(DES_CBC_CTX), |
|
NULL, |
|
NULL, |
|
NULL, |
|
NULL |
|
}; |
|
|
|
static const EVP_CIPHER cipher_des_ede3_cbc = { |
|
NID_des_ede3_cbc, |
|
8, 24, 8, |
|
0 | EVP_CIPH_CBC_MODE, |
|
cipher_des_ede3_cbc_init, |
|
cipher_des_ede3_cbc_code, |
|
cipher_des_ede3_cbc_clean, |
|
sizeof(DES3_CBC_CTX), |
|
NULL, |
|
NULL, |
|
NULL, |
|
NULL |
|
}; |
|
|
|
static const EVP_CIPHER cipher_desx_cbc = { |
|
NID_desx_cbc, |
|
8, 24, 8, |
|
0 | EVP_CIPH_CBC_MODE, |
|
cipher_desx_cbc_init, |
|
cipher_desx_cbc_code, |
|
cipher_desx_cbc_clean, |
|
sizeof(DESX_CBC_CTX), |
|
NULL, |
|
NULL, |
|
NULL, |
|
NULL |
|
}; |
|
|
|
/***************************************************************************** |
|
* MD functions |
|
**/ |
|
static int digest_md2_init(EVP_MD_CTX *ctx); |
|
static int digest_md2_update(EVP_MD_CTX *ctx, const void *data, |
|
unsigned long count); |
|
static int digest_md2_final(EVP_MD_CTX *ctx, unsigned char *md); |
|
static int digest_md5_init(EVP_MD_CTX *ctx); |
|
static int digest_md5_update(EVP_MD_CTX *ctx, const void *data, |
|
unsigned long count); |
|
static int digest_md5_final(EVP_MD_CTX *ctx, unsigned char *md); |
|
|
|
/***************************************************************************** |
|
* Our MD digests |
|
**/ |
|
static const EVP_MD digest_md2 = { |
|
NID_md2, |
|
NID_md2WithRSAEncryption, |
|
16, |
|
0, |
|
digest_md2_init, |
|
digest_md2_update, |
|
digest_md2_final, |
|
NULL, |
|
NULL, |
|
EVP_PKEY_RSA_method, |
|
16, |
|
sizeof(MD2_CTX) |
|
}; |
|
|
|
static const EVP_MD digest_md5 = { |
|
NID_md5, |
|
NID_md5WithRSAEncryption, |
|
16, |
|
0, |
|
digest_md5_init, |
|
digest_md5_update, |
|
digest_md5_final, |
|
NULL, |
|
NULL, |
|
EVP_PKEY_RSA_method, |
|
64, |
|
sizeof(MD5_CTX) |
|
}; |
|
|
|
/***************************************************************************** |
|
*** Function definitions *** |
|
*****************************************************************************/ |
|
|
|
/***************************************************************************** |
|
* Functions to handle the engine |
|
**/ |
|
|
|
static int bind_rsaref(ENGINE *e) |
|
{ |
|
const RSA_METHOD *meth1; |
|
if (!ENGINE_set_id(e, engine_rsaref_id) |
|
|| !ENGINE_set_name(e, engine_rsaref_name) |
|
|| !ENGINE_set_RSA(e, &rsaref_rsa) |
|
|| !ENGINE_set_ciphers(e, rsaref_ciphers) |
|
|| !ENGINE_set_digests(e, rsaref_digests) |
|
|| !ENGINE_set_destroy_function(e, rsaref_destroy) |
|
|| !ENGINE_set_init_function(e, rsaref_init) |
|
|| !ENGINE_set_finish_function(e, rsaref_finish) |
|
/* || !ENGINE_set_ctrl_function(e, rsaref_ctrl) */ |
|
/* |
|
* || !ENGINE_set_cmd_defns(e, rsaref_cmd_defns) |
|
*/ ) |
|
return 0; |
|
|
|
/* Ensure the rsaref error handling is set up */ |
|
ERR_load_RSAREF_strings(); |
|
return 1; |
|
} |
|
|
|
#ifdef ENGINE_DYNAMIC_SUPPORT |
|
static int bind_helper(ENGINE *e, const char *id) |
|
{ |
|
if (id && (strcmp(id, engine_rsaref_id) != 0)) |
|
return 0; |
|
if (!bind_rsaref(e)) |
|
return 0; |
|
return 1; |
|
} |
|
|
|
IMPLEMENT_DYNAMIC_CHECK_FN() |
|
IMPLEMENT_DYNAMIC_BIND_FN(bind_helper) |
|
#else |
|
static ENGINE *engine_rsaref(void) |
|
{ |
|
ENGINE *ret = ENGINE_new(); |
|
if (!ret) |
|
return NULL; |
|
if (!bind_rsaref(ret)) { |
|
ENGINE_free(ret); |
|
return NULL; |
|
} |
|
return ret; |
|
} |
|
|
|
void ENGINE_load_rsaref(void) |
|
{ |
|
/* Copied from eng_[openssl|dyn].c */ |
|
ENGINE *toadd = engine_rsaref(); |
|
if (!toadd) |
|
return; |
|
ENGINE_add(toadd); |
|
ENGINE_free(toadd); |
|
ERR_clear_error(); |
|
} |
|
#endif |
|
|
|
/* Initiator which is only present to make sure this engine looks available */ |
|
static int rsaref_init(ENGINE *e) |
|
{ |
|
return 1; |
|
} |
|
|
|
/* Finisher which is only present to make sure this engine looks available */ |
|
static int rsaref_finish(ENGINE *e) |
|
{ |
|
return 1; |
|
} |
|
|
|
/* Destructor (complements the "ENGINE_ncipher()" constructor) */ |
|
static int rsaref_destroy(ENGINE *e) |
|
{ |
|
ERR_unload_RSAREF_strings(); |
|
return 1; |
|
} |
|
|
|
/***************************************************************************** |
|
* RSA functions |
|
**/ |
|
|
|
static int rsaref_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa) |
|
{ |
|
RSAREFerr(RSAREF_F_RSAREF_MOD_EXP, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); |
|
return (0); |
|
} |
|
|
|
static int bnref_mod_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, |
|
const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx) |
|
{ |
|
RSAREFerr(RSAREF_F_BNREF_MOD_EXP, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); |
|
return (0); |
|
} |
|
|
|
/* unsigned char *to: [max] */ |
|
static int RSAref_bn2bin(BIGNUM *from, unsigned char *to, int max) |
|
{ |
|
int i; |
|
|
|
i = BN_num_bytes(from); |
|
if (i > max) { |
|
RSAREFerr(RSAREF_F_RSAREF_BN2BIN, RSAREF_R_LEN); |
|
return (0); |
|
} |
|
|
|
memset(to, 0, (unsigned int)max); |
|
if (!BN_bn2bin(from, &(to[max - i]))) |
|
return (0); |
|
return (1); |
|
} |
|
|
|
#ifdef undef |
|
/* unsigned char *from: [max] */ |
|
static BIGNUM *RSAref_bin2bn(unsigned char *from, BIGNUM *to, int max) |
|
{ |
|
int i; |
|
BIGNUM *ret; |
|
|
|
for (i = 0; i < max; i++) |
|
if (from[i]) |
|
break; |
|
|
|
ret = BN_bin2bn(&(from[i]), max - i, to); |
|
return (ret); |
|
} |
|
|
|
static int RSAref_Public_ref2eay(RSArefPublicKey * from, RSA *to) |
|
{ |
|
to->n = RSAref_bin2bn(from->m, NULL, RSAref_MAX_LEN); |
|
to->e = RSAref_bin2bn(from->e, NULL, RSAref_MAX_LEN); |
|
if ((to->n == NULL) || (to->e == NULL)) |
|
return (0); |
|
return (1); |
|
} |
|
#endif |
|
|
|
static int RSAref_Public_eay2ref(RSA *from, R_RSA_PUBLIC_KEY * to) |
|
{ |
|
to->bits = BN_num_bits(from->n); |
|
if (!RSAref_bn2bin(from->n, to->modulus, MAX_RSA_MODULUS_LEN)) |
|
return (0); |
|
if (!RSAref_bn2bin(from->e, to->exponent, MAX_RSA_MODULUS_LEN)) |
|
return (0); |
|
return (1); |
|
} |
|
|
|
#ifdef undef |
|
static int RSAref_Private_ref2eay(RSArefPrivateKey * from, RSA *to) |
|
{ |
|
if ((to->n = RSAref_bin2bn(from->m, NULL, RSAref_MAX_LEN)) == NULL) |
|
return (0); |
|
if ((to->e = RSAref_bin2bn(from->e, NULL, RSAref_MAX_LEN)) == NULL) |
|
return (0); |
|
if ((to->d = RSAref_bin2bn(from->d, NULL, RSAref_MAX_LEN)) == NULL) |
|
return (0); |
|
if ((to->p = |
|
RSAref_bin2bn(from->prime[0], NULL, RSAref_MAX_PLEN)) == NULL) |
|
return (0); |
|
if ((to->q = |
|
RSAref_bin2bn(from->prime[1], NULL, RSAref_MAX_PLEN)) == NULL) |
|
return (0); |
|
if ((to->dmp1 = RSAref_bin2bn(from->pexp[0], NULL, RSAref_MAX_PLEN)) |
|
== NULL) |
|
return (0); |
|
if ((to->dmq1 = RSAref_bin2bn(from->pexp[1], NULL, RSAref_MAX_PLEN)) |
|
== NULL) |
|
return (0); |
|
if ((to->iqmp = RSAref_bin2bn(from->coef, NULL, RSAref_MAX_PLEN)) == NULL) |
|
return (0); |
|
return (1); |
|
} |
|
#endif |
|
|
|
static int RSAref_Private_eay2ref(RSA *from, R_RSA_PRIVATE_KEY * to) |
|
{ |
|
to->bits = BN_num_bits(from->n); |
|
if (!RSAref_bn2bin(from->n, to->modulus, MAX_RSA_MODULUS_LEN)) |
|
return (0); |
|
if (!RSAref_bn2bin(from->e, to->publicExponent, MAX_RSA_MODULUS_LEN)) |
|
return (0); |
|
if (!RSAref_bn2bin(from->d, to->exponent, MAX_RSA_MODULUS_LEN)) |
|
return (0); |
|
if (!RSAref_bn2bin(from->p, to->prime[0], MAX_RSA_PRIME_LEN)) |
|
return (0); |
|
if (!RSAref_bn2bin(from->q, to->prime[1], MAX_RSA_PRIME_LEN)) |
|
return (0); |
|
if (!RSAref_bn2bin(from->dmp1, to->primeExponent[0], MAX_RSA_PRIME_LEN)) |
|
return (0); |
|
if (!RSAref_bn2bin(from->dmq1, to->primeExponent[1], MAX_RSA_PRIME_LEN)) |
|
return (0); |
|
if (!RSAref_bn2bin(from->iqmp, to->coefficient, MAX_RSA_PRIME_LEN)) |
|
return (0); |
|
return (1); |
|
} |
|
|
|
static int rsaref_private_decrypt(int len, const unsigned char *from, |
|
unsigned char *to, RSA *rsa, int padding) |
|
{ |
|
int i, outlen = -1; |
|
R_RSA_PRIVATE_KEY RSAkey; |
|
|
|
if (!RSAref_Private_eay2ref(rsa, &RSAkey)) |
|
goto err; |
|
if ((i = |
|
RSAPrivateDecrypt(to, (unsigned int *)&outlen, (unsigned char *)from, |
|
len, &RSAkey)) != 0) { |
|
RSAREFerr(RSAREF_F_RSAREF_PRIVATE_DECRYPT, i); |
|
outlen = -1; |
|
} |
|
err: |
|
memset(&RSAkey, 0, sizeof(RSAkey)); |
|
return (outlen); |
|
} |
|
|
|
static int rsaref_private_encrypt(int len, const unsigned char *from, |
|
unsigned char *to, RSA *rsa, int padding) |
|
{ |
|
int i, outlen = -1; |
|
R_RSA_PRIVATE_KEY RSAkey; |
|
|
|
if (padding != RSA_PKCS1_PADDING) { |
|
RSAREFerr(RSAREF_F_RSAREF_PRIVATE_ENCRYPT, |
|
RSA_R_UNKNOWN_PADDING_TYPE); |
|
goto err; |
|
} |
|
if (!RSAref_Private_eay2ref(rsa, &RSAkey)) |
|
goto err; |
|
if ((i = |
|
RSAPrivateEncrypt(to, (unsigned int *)&outlen, (unsigned char *)from, |
|
len, &RSAkey)) != 0) { |
|
RSAREFerr(RSAREF_F_RSAREF_PRIVATE_ENCRYPT, i); |
|
outlen = -1; |
|
} |
|
err: |
|
memset(&RSAkey, 0, sizeof(RSAkey)); |
|
return (outlen); |
|
} |
|
|
|
static int rsaref_public_decrypt(int len, const unsigned char *from, |
|
unsigned char *to, RSA *rsa, int padding) |
|
{ |
|
int i, outlen = -1; |
|
R_RSA_PUBLIC_KEY RSAkey; |
|
|
|
if (!RSAref_Public_eay2ref(rsa, &RSAkey)) |
|
goto err; |
|
if ((i = |
|
RSAPublicDecrypt(to, (unsigned int *)&outlen, (unsigned char *)from, |
|
len, &RSAkey)) != 0) { |
|
RSAREFerr(RSAREF_F_RSAREF_PUBLIC_DECRYPT, i); |
|
outlen = -1; |
|
} |
|
err: |
|
memset(&RSAkey, 0, sizeof(RSAkey)); |
|
return (outlen); |
|
} |
|
|
|
static int rsaref_public_encrypt(int len, const unsigned char *from, |
|
unsigned char *to, RSA *rsa, int padding) |
|
{ |
|
int outlen = -1; |
|
int i; |
|
R_RSA_PUBLIC_KEY RSAkey; |
|
R_RANDOM_STRUCT rnd; |
|
unsigned char buf[16]; |
|
|
|
if (padding != RSA_PKCS1_PADDING && padding != RSA_SSLV23_PADDING) { |
|
RSAREFerr(RSAREF_F_RSAREF_PUBLIC_ENCRYPT, RSA_R_UNKNOWN_PADDING_TYPE); |
|
goto err; |
|
} |
|
|
|
R_RandomInit(&rnd); |
|
R_GetRandomBytesNeeded((unsigned int *)&i, &rnd); |
|
while (i > 0) { |
|
if (RAND_bytes(buf, 16) <= 0) |
|
goto err; |
|
R_RandomUpdate(&rnd, buf, (unsigned int)((i > 16) ? 16 : i)); |
|
i -= 16; |
|
} |
|
|
|
if (!RSAref_Public_eay2ref(rsa, &RSAkey)) |
|
goto err; |
|
if ((i = |
|
RSAPublicEncrypt(to, (unsigned int *)&outlen, (unsigned char *)from, |
|
len, &RSAkey, &rnd)) != 0) { |
|
RSAREFerr(RSAREF_F_RSAREF_PUBLIC_ENCRYPT, i); |
|
outlen = -1; |
|
goto err; |
|
} |
|
err: |
|
memset(&RSAkey, 0, sizeof(RSAkey)); |
|
R_RandomFinal(&rnd); |
|
memset(&rnd, 0, sizeof(rnd)); |
|
return (outlen); |
|
} |
|
|
|
/***************************************************************************** |
|
* Symetric cipher and digest function registrars |
|
**/ |
|
static int rsaref_ciphers(ENGINE *e, const EVP_CIPHER **cipher, |
|
const int **nids, int nid) |
|
{ |
|
int ok = 1; |
|
if (!cipher) { |
|
/* We are returning a list of supported nids */ |
|
*nids = rsaref_cipher_nids; |
|
return (sizeof(rsaref_cipher_nids) - |
|
1) / sizeof(rsaref_cipher_nids[0]); |
|
} |
|
/* We are being asked for a specific cipher */ |
|
switch (nid) { |
|
case NID_des_cbc: |
|
*cipher = &cipher_des_cbc; |
|
break; |
|
case NID_des_ede3_cbc: |
|
*cipher = &cipher_des_ede3_cbc; |
|
break; |
|
case NID_desx_cbc: |
|
*cipher = &cipher_desx_cbc; |
|
break; |
|
default: |
|
ok = 0; |
|
*cipher = NULL; |
|
break; |
|
} |
|
return ok; |
|
} |
|
|
|
static int rsaref_digests(ENGINE *e, const EVP_MD **digest, |
|
const int **nids, int nid) |
|
{ |
|
int ok = 1; |
|
if (!digest) { |
|
/* We are returning a list of supported nids */ |
|
*nids = rsaref_digest_nids; |
|
return (sizeof(rsaref_digest_nids) - |
|
1) / sizeof(rsaref_digest_nids[0]); |
|
} |
|
/* We are being asked for a specific digest */ |
|
switch (nid) { |
|
case NID_md2: |
|
*digest = &digest_md2; |
|
break; |
|
case NID_md5: |
|
*digest = &digest_md5; |
|
break; |
|
default: |
|
ok = 0; |
|
*digest = NULL; |
|
break; |
|
} |
|
return ok; |
|
} |
|
|
|
/***************************************************************************** |
|
* DES functions |
|
**/ |
|
#undef data |
|
#define data(ctx) ((DES_CBC_CTX *)(ctx)->cipher_data) |
|
static int cipher_des_cbc_init(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
|
const unsigned char *iv, int enc) |
|
{ |
|
DES_CBCInit(data(ctx), (unsigned char *)key, (unsigned char *)iv, enc); |
|
return 1; |
|
} |
|
|
|
static int cipher_des_cbc_code(EVP_CIPHER_CTX *ctx, unsigned char *out, |
|
const unsigned char *in, unsigned int inl) |
|
{ |
|
int ret = DES_CBCUpdate(data(ctx), out, (unsigned char *)in, inl); |
|
switch (ret) { |
|
case RE_LEN: |
|
RSAREFerr(RSAREF_F_CIPHER_DES_CBC_CODE, |
|
RSAREF_R_LENGTH_NOT_BLOCK_ALIGNED); |
|
break; |
|
case 0: |
|
break; |
|
default: |
|
RSAREFerr(RSAREF_F_CIPHER_DES_CBC_CODE, RSAREF_R_UNKNOWN_FAULT); |
|
} |
|
return !ret; |
|
} |
|
|
|
static int cipher_des_cbc_clean(EVP_CIPHER_CTX *ctx) |
|
{ |
|
memset(data(ctx), 0, ctx->cipher->ctx_size); |
|
return 1; |
|
} |
|
|
|
#undef data |
|
#define data(ctx) ((DES3_CBC_CTX *)(ctx)->cipher_data) |
|
static int cipher_des_ede3_cbc_init(EVP_CIPHER_CTX *ctx, |
|
const unsigned char *key, |
|
const unsigned char *iv, int enc) |
|
{ |
|
DES3_CBCInit(data(ctx), (unsigned char *)key, (unsigned char *)iv, enc); |
|
return 1; |
|
} |
|
|
|
static int cipher_des_ede3_cbc_code(EVP_CIPHER_CTX *ctx, unsigned char *out, |
|
const unsigned char *in, unsigned int inl) |
|
{ |
|
int ret = DES3_CBCUpdate(data(ctx), out, (unsigned char *)in, inl); |
|
switch (ret) { |
|
case RE_LEN: |
|
RSAREFerr(RSAREF_F_CIPHER_DES_CBC_CODE, |
|
RSAREF_R_LENGTH_NOT_BLOCK_ALIGNED); |
|
break; |
|
case 0: |
|
break; |
|
default: |
|
RSAREFerr(RSAREF_F_CIPHER_DES_CBC_CODE, RSAREF_R_UNKNOWN_FAULT); |
|
} |
|
return !ret; |
|
} |
|
|
|
static int cipher_des_ede3_cbc_clean(EVP_CIPHER_CTX *ctx) |
|
{ |
|
memset(data(ctx), 0, ctx->cipher->ctx_size); |
|
return 1; |
|
} |
|
|
|
#undef data |
|
#define data(ctx) ((DESX_CBC_CTX *)(ctx)->cipher_data) |
|
static int cipher_desx_cbc_init(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
|
const unsigned char *iv, int enc) |
|
{ |
|
DESX_CBCInit(data(ctx), (unsigned char *)key, (unsigned char *)iv, enc); |
|
return 1; |
|
} |
|
|
|
static int cipher_desx_cbc_code(EVP_CIPHER_CTX *ctx, unsigned char *out, |
|
const unsigned char *in, unsigned int inl) |
|
{ |
|
int ret = DESX_CBCUpdate(data(ctx), out, (unsigned char *)in, inl); |
|
switch (ret) { |
|
case RE_LEN: |
|
RSAREFerr(RSAREF_F_CIPHER_DES_CBC_CODE, |
|
RSAREF_R_LENGTH_NOT_BLOCK_ALIGNED); |
|
break; |
|
case 0: |
|
break; |
|
default: |
|
RSAREFerr(RSAREF_F_CIPHER_DES_CBC_CODE, RSAREF_R_UNKNOWN_FAULT); |
|
} |
|
return !ret; |
|
} |
|
|
|
static int cipher_desx_cbc_clean(EVP_CIPHER_CTX *ctx) |
|
{ |
|
memset(data(ctx), 0, ctx->cipher->ctx_size); |
|
return 1; |
|
} |
|
|
|
/***************************************************************************** |
|
* MD functions |
|
**/ |
|
#undef data |
|
#define data(ctx) ((MD2_CTX *)(ctx)->md_data) |
|
static int digest_md2_init(EVP_MD_CTX *ctx) |
|
{ |
|
MD2Init(data(ctx)); |
|
return 1; |
|
} |
|
|
|
static int digest_md2_update(EVP_MD_CTX *ctx, const void *data, |
|
unsigned long count) |
|
{ |
|
MD2Update(data(ctx), (unsigned char *)data, (unsigned int)count); |
|
return 1; |
|
} |
|
|
|
static int digest_md2_final(EVP_MD_CTX *ctx, unsigned char *md) |
|
{ |
|
MD2Final(md, data(ctx)); |
|
return 1; |
|
} |
|
|
|
#undef data |
|
#define data(ctx) ((MD5_CTX *)(ctx)->md_data) |
|
static int digest_md5_init(EVP_MD_CTX *ctx) |
|
{ |
|
MD5Init(data(ctx)); |
|
return 1; |
|
} |
|
|
|
static int digest_md5_update(EVP_MD_CTX *ctx, const void *data, |
|
unsigned long count) |
|
{ |
|
MD5Update(data(ctx), (unsigned char *)data, (unsigned int)count); |
|
return 1; |
|
} |
|
|
|
static int digest_md5_final(EVP_MD_CTX *ctx, unsigned char *md) |
|
{ |
|
MD5Final(md, data(ctx)); |
|
return 1; |
|
}
|
|
|