Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
freebsd
GitHub Repository: freebsd/freebsd-src
Path: blob/main/crypto/heimdal/lib/krb5/crypto-evp.c
34878 views
1
/*
2
* Copyright (c) 1997 - 2008 Kungliga Tekniska Högskolan
3
* (Royal Institute of Technology, Stockholm, Sweden).
4
* All rights reserved.
5
*
6
* Redistribution and use in source and binary forms, with or without
7
* modification, are permitted provided that the following conditions
8
* are met:
9
*
10
* 1. Redistributions of source code must retain the above copyright
11
* notice, this list of conditions and the following disclaimer.
12
*
13
* 2. Redistributions in binary form must reproduce the above copyright
14
* notice, this list of conditions and the following disclaimer in the
15
* documentation and/or other materials provided with the distribution.
16
*
17
* 3. Neither the name of the Institute nor the names of its contributors
18
* may be used to endorse or promote products derived from this software
19
* without specific prior written permission.
20
*
21
* THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24
* ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31
* SUCH DAMAGE.
32
*/
33
34
#include "krb5_locl.h"
35
36
void
37
_krb5_evp_schedule(krb5_context context,
38
struct _krb5_key_type *kt,
39
struct _krb5_key_data *kd)
40
{
41
struct _krb5_evp_schedule *key = kd->schedule->data;
42
const EVP_CIPHER *c = (*kt->evp)();
43
44
key->ectx = EVP_CIPHER_CTX_new();
45
key->dctx = EVP_CIPHER_CTX_new();
46
if (key->ectx == NULL || key->dctx == NULL)
47
krb5_abort(context, ENOMEM, "malloc failed");
48
49
EVP_CipherInit_ex(key->ectx, c, NULL, kd->key->keyvalue.data, NULL, 1);
50
EVP_CipherInit_ex(key->dctx, c, NULL, kd->key->keyvalue.data, NULL, 0);
51
}
52
53
void
54
_krb5_evp_cleanup(krb5_context context, struct _krb5_key_data *kd)
55
{
56
struct _krb5_evp_schedule *key = kd->schedule->data;
57
EVP_CIPHER_CTX_free(key->ectx);
58
EVP_CIPHER_CTX_free(key->dctx);
59
}
60
61
krb5_error_code
62
_krb5_evp_encrypt(krb5_context context,
63
struct _krb5_key_data *key,
64
void *data,
65
size_t len,
66
krb5_boolean encryptp,
67
int usage,
68
void *ivec)
69
{
70
struct _krb5_evp_schedule *ctx = key->schedule->data;
71
EVP_CIPHER_CTX *c;
72
c = encryptp ? ctx->ectx : ctx->dctx;
73
if (ivec == NULL) {
74
/* alloca ? */
75
size_t len2 = EVP_CIPHER_CTX_iv_length(c);
76
void *loiv = malloc(len2);
77
if (loiv == NULL) {
78
krb5_clear_error_message(context);
79
return ENOMEM;
80
}
81
memset(loiv, 0, len2);
82
EVP_CipherInit_ex(c, NULL, NULL, NULL, loiv, -1);
83
free(loiv);
84
} else
85
EVP_CipherInit_ex(c, NULL, NULL, NULL, ivec, -1);
86
EVP_Cipher(c, data, data, len);
87
return 0;
88
}
89
90
static const unsigned char zero_ivec[EVP_MAX_BLOCK_LENGTH] = { 0 };
91
92
krb5_error_code
93
_krb5_evp_encrypt_cts(krb5_context context,
94
struct _krb5_key_data *key,
95
void *data,
96
size_t len,
97
krb5_boolean encryptp,
98
int usage,
99
void *ivec)
100
{
101
size_t i, blocksize;
102
struct _krb5_evp_schedule *ctx = key->schedule->data;
103
unsigned char tmp[EVP_MAX_BLOCK_LENGTH], ivec2[EVP_MAX_BLOCK_LENGTH];
104
EVP_CIPHER_CTX *c;
105
unsigned char *p;
106
107
c = encryptp ? ctx->ectx : ctx->dctx;
108
109
blocksize = EVP_CIPHER_CTX_block_size(c);
110
111
if (len < blocksize) {
112
krb5_set_error_message(context, EINVAL,
113
"message block too short");
114
return EINVAL;
115
} else if (len == blocksize) {
116
EVP_CipherInit_ex(c, NULL, NULL, NULL, zero_ivec, -1);
117
EVP_Cipher(c, data, data, len);
118
return 0;
119
}
120
121
if (ivec)
122
EVP_CipherInit_ex(c, NULL, NULL, NULL, ivec, -1);
123
else
124
EVP_CipherInit_ex(c, NULL, NULL, NULL, zero_ivec, -1);
125
126
if (encryptp) {
127
128
p = data;
129
i = ((len - 1) / blocksize) * blocksize;
130
EVP_Cipher(c, p, p, i);
131
p += i - blocksize;
132
len -= i;
133
memcpy(ivec2, p, blocksize);
134
135
for (i = 0; i < len; i++)
136
tmp[i] = p[i + blocksize] ^ ivec2[i];
137
for (; i < blocksize; i++)
138
tmp[i] = 0 ^ ivec2[i];
139
140
EVP_CipherInit_ex(c, NULL, NULL, NULL, zero_ivec, -1);
141
EVP_Cipher(c, p, tmp, blocksize);
142
143
memcpy(p + blocksize, ivec2, len);
144
if (ivec)
145
memcpy(ivec, p, blocksize);
146
} else {
147
unsigned char tmp2[EVP_MAX_BLOCK_LENGTH], tmp3[EVP_MAX_BLOCK_LENGTH];
148
149
p = data;
150
if (len > blocksize * 2) {
151
/* remove last two blocks and round up, decrypt this with cbc, then do cts dance */
152
i = ((((len - blocksize * 2) + blocksize - 1) / blocksize) * blocksize);
153
memcpy(ivec2, p + i - blocksize, blocksize);
154
EVP_Cipher(c, p, p, i);
155
p += i;
156
len -= i + blocksize;
157
} else {
158
if (ivec)
159
memcpy(ivec2, ivec, blocksize);
160
else
161
memcpy(ivec2, zero_ivec, blocksize);
162
len -= blocksize;
163
}
164
165
memcpy(tmp, p, blocksize);
166
EVP_CipherInit_ex(c, NULL, NULL, NULL, zero_ivec, -1);
167
EVP_Cipher(c, tmp2, p, blocksize);
168
169
memcpy(tmp3, p + blocksize, len);
170
memcpy(tmp3 + len, tmp2 + len, blocksize - len); /* xor 0 */
171
172
for (i = 0; i < len; i++)
173
p[i + blocksize] = tmp2[i] ^ tmp3[i];
174
175
EVP_CipherInit_ex(c, NULL, NULL, NULL, zero_ivec, -1);
176
EVP_Cipher(c, p, tmp3, blocksize);
177
178
for (i = 0; i < blocksize; i++)
179
p[i] ^= ivec2[i];
180
if (ivec)
181
memcpy(ivec, tmp, blocksize);
182
}
183
return 0;
184
}
185
186