1 /* crypto/evp/bio_enc.c */ 2 /* Copyright (C) 1995-1998 Eric Young (eay (at) cryptsoft.com) 3 * All rights reserved. 4 * 5 * This package is an SSL implementation written 6 * by Eric Young (eay (at) cryptsoft.com). 7 * The implementation was written so as to conform with Netscapes SSL. 8 * 9 * This library is free for commercial and non-commercial use as long as 10 * the following conditions are aheared to. The following conditions 11 * apply to all code found in this distribution, be it the RC4, RSA, 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 13 * included with this distribution is covered by the same copyright terms 14 * except that the holder is Tim Hudson (tjh (at) cryptsoft.com). 15 * 16 * Copyright remains Eric Young's, and as such any Copyright notices in 17 * the code are not to be removed. 18 * If this package is used in a product, Eric Young should be given attribution 19 * as the author of the parts of the library used. 20 * This can be in the form of a textual message at program startup or 21 * in documentation (online or textual) provided with the package. 22 * 23 * Redistribution and use in source and binary forms, with or without 24 * modification, are permitted provided that the following conditions 25 * are met: 26 * 1. Redistributions of source code must retain the copyright 27 * notice, this list of conditions and the following disclaimer. 28 * 2. Redistributions in binary form must reproduce the above copyright 29 * notice, this list of conditions and the following disclaimer in the 30 * documentation and/or other materials provided with the distribution. 31 * 3. All advertising materials mentioning features or use of this software 32 * must display the following acknowledgement: 33 * "This product includes cryptographic software written by 34 * Eric Young (eay (at) cryptsoft.com)" 35 * The word 'cryptographic' can be left out if the rouines from the library 36 * being used are not cryptographic related :-). 37 * 4. If you include any Windows specific code (or a derivative thereof) from 38 * the apps directory (application code) you must include an acknowledgement: 39 * "This product includes software written by Tim Hudson (tjh (at) cryptsoft.com)" 40 * 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 51 * SUCH DAMAGE. 52 * 53 * The licence and distribution terms for any publically available version or 54 * derivative of this code cannot be changed. i.e. this code cannot simply be 55 * copied and put under another distribution licence 56 * [including the GNU Public Licence.] 57 */ 58 59 #include <stdio.h> 60 #include <errno.h> 61 #include "cryptlib.h" 62 #include <openssl/buffer.h> 63 #include <openssl/evp.h> 64 65 static int enc_write(BIO *h, const char *buf, int num); 66 static int enc_read(BIO *h, char *buf, int size); 67 /*static int enc_puts(BIO *h, const char *str); */ 68 /*static int enc_gets(BIO *h, char *str, int size); */ 69 static long enc_ctrl(BIO *h, int cmd, long arg1, void *arg2); 70 static int enc_new(BIO *h); 71 static int enc_free(BIO *data); 72 static long enc_callback_ctrl(BIO *h, int cmd, bio_info_cb *fps); 73 #define ENC_BLOCK_SIZE (1024*4) 74 #define BUF_OFFSET (EVP_MAX_BLOCK_LENGTH*2) 75 76 typedef struct enc_struct 77 { 78 int buf_len; 79 int buf_off; 80 int cont; /* <= 0 when finished */ 81 int finished; 82 int ok; /* bad decrypt */ 83 EVP_CIPHER_CTX cipher; 84 /* buf is larger than ENC_BLOCK_SIZE because EVP_DecryptUpdate 85 * can return up to a block more data than is presented to it 86 */ 87 char buf[ENC_BLOCK_SIZE+BUF_OFFSET+2]; 88 } BIO_ENC_CTX; 89 90 static BIO_METHOD methods_enc= 91 { 92 BIO_TYPE_CIPHER,"cipher", 93 enc_write, 94 enc_read, 95 NULL, /* enc_puts, */ 96 NULL, /* enc_gets, */ 97 enc_ctrl, 98 enc_new, 99 enc_free, 100 enc_callback_ctrl, 101 }; 102 103 BIO_METHOD *BIO_f_cipher(void) 104 { 105 return(&methods_enc); 106 } 107 108 static int enc_new(BIO *bi) 109 { 110 BIO_ENC_CTX *ctx; 111 112 ctx=(BIO_ENC_CTX *)OPENSSL_malloc(sizeof(BIO_ENC_CTX)); 113 if (ctx == NULL) return(0); 114 EVP_CIPHER_CTX_init(&ctx->cipher); 115 116 ctx->buf_len=0; 117 ctx->buf_off=0; 118 ctx->cont=1; 119 ctx->finished=0; 120 ctx->ok=1; 121 122 bi->init=0; 123 bi->ptr=(char *)ctx; 124 bi->flags=0; 125 return(1); 126 } 127 128 static int enc_free(BIO *a) 129 { 130 BIO_ENC_CTX *b; 131 132 if (a == NULL) return(0); 133 b=(BIO_ENC_CTX *)a->ptr; 134 EVP_CIPHER_CTX_cleanup(&(b->cipher)); 135 OPENSSL_cleanse(a->ptr,sizeof(BIO_ENC_CTX)); 136 OPENSSL_free(a->ptr); 137 a->ptr=NULL; 138 a->init=0; 139 a->flags=0; 140 return(1); 141 } 142 143 static int enc_read(BIO *b, char *out, int outl) 144 { 145 int ret=0,i; 146 BIO_ENC_CTX *ctx; 147 148 if (out == NULL) return(0); 149 ctx=(BIO_ENC_CTX *)b->ptr; 150 151 if ((ctx == NULL) || (b->next_bio == NULL)) return(0); 152 153 /* First check if there are bytes decoded/encoded */ 154 if (ctx->buf_len > 0) 155 { 156 i=ctx->buf_len-ctx->buf_off; 157 if (i > outl) i=outl; 158 memcpy(out,&(ctx->buf[ctx->buf_off]),i); 159 ret=i; 160 out+=i; 161 outl-=i; 162 ctx->buf_off+=i; 163 if (ctx->buf_len == ctx->buf_off) 164 { 165 ctx->buf_len=0; 166 ctx->buf_off=0; 167 } 168 } 169 170 /* At this point, we have room of outl bytes and an empty 171 * buffer, so we should read in some more. */ 172 173 while (outl > 0) 174 { 175 if (ctx->cont <= 0) break; 176 177 /* read in at IV offset, read the EVP_Cipher 178 * documentation about why */ 179 i=BIO_read(b->next_bio,&(ctx->buf[BUF_OFFSET]),ENC_BLOCK_SIZE); 180 181 if (i <= 0) 182 { 183 /* Should be continue next time we are called? */ 184 if (!BIO_should_retry(b->next_bio)) 185 { 186 ctx->cont=i; 187 i=EVP_CipherFinal_ex(&(ctx->cipher), 188 (unsigned char *)ctx->buf, 189 &(ctx->buf_len)); 190 ctx->ok=i; 191 ctx->buf_off=0; 192 } 193 else 194 { 195 ret=(ret == 0)?i:ret; 196 break; 197 } 198 } 199 else 200 { 201 EVP_CipherUpdate(&(ctx->cipher), 202 (unsigned char *)ctx->buf,&ctx->buf_len, 203 (unsigned char *)&(ctx->buf[BUF_OFFSET]),i); 204 ctx->cont=1; 205 /* Note: it is possible for EVP_CipherUpdate to 206 * decrypt zero bytes because this is or looks like 207 * the final block: if this happens we should retry 208 * and either read more data or decrypt the final 209 * block 210 */ 211 if(ctx->buf_len == 0) continue; 212 } 213 214 if (ctx->buf_len <= outl) 215 i=ctx->buf_len; 216 else 217 i=outl; 218 if (i <= 0) break; 219 memcpy(out,ctx->buf,i); 220 ret+=i; 221 ctx->buf_off=i; 222 outl-=i; 223 out+=i; 224 } 225 226 BIO_clear_retry_flags(b); 227 BIO_copy_next_retry(b); 228 return((ret == 0)?ctx->cont:ret); 229 } 230 231 static int enc_write(BIO *b, const char *in, int inl) 232 { 233 int ret=0,n,i; 234 BIO_ENC_CTX *ctx; 235 236 ctx=(BIO_ENC_CTX *)b->ptr; 237 ret=inl; 238 239 BIO_clear_retry_flags(b); 240 n=ctx->buf_len-ctx->buf_off; 241 while (n > 0) 242 { 243 i=BIO_write(b->next_bio,&(ctx->buf[ctx->buf_off]),n); 244 if (i <= 0) 245 { 246 BIO_copy_next_retry(b); 247 return(i); 248 } 249 ctx->buf_off+=i; 250 n-=i; 251 } 252 /* at this point all pending data has been written */ 253 254 if ((in == NULL) || (inl <= 0)) return(0); 255 256 ctx->buf_off=0; 257 while (inl > 0) 258 { 259 n=(inl > ENC_BLOCK_SIZE)?ENC_BLOCK_SIZE:inl; 260 EVP_CipherUpdate(&(ctx->cipher), 261 (unsigned char *)ctx->buf,&ctx->buf_len, 262 (unsigned char *)in,n); 263 inl-=n; 264 in+=n; 265 266 ctx->buf_off=0; 267 n=ctx->buf_len; 268 while (n > 0) 269 { 270 i=BIO_write(b->next_bio,&(ctx->buf[ctx->buf_off]),n); 271 if (i <= 0) 272 { 273 BIO_copy_next_retry(b); 274 return (ret == inl) ? i : ret - inl; 275 } 276 n-=i; 277 ctx->buf_off+=i; 278 } 279 ctx->buf_len=0; 280 ctx->buf_off=0; 281 } 282 BIO_copy_next_retry(b); 283 return(ret); 284 } 285 286 static long enc_ctrl(BIO *b, int cmd, long num, void *ptr) 287 { 288 BIO *dbio; 289 BIO_ENC_CTX *ctx,*dctx; 290 long ret=1; 291 int i; 292 EVP_CIPHER_CTX **c_ctx; 293 294 ctx=(BIO_ENC_CTX *)b->ptr; 295 296 switch (cmd) 297 { 298 case BIO_CTRL_RESET: 299 ctx->ok=1; 300 ctx->finished=0; 301 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL, 302 ctx->cipher.encrypt); 303 ret=BIO_ctrl(b->next_bio,cmd,num,ptr); 304 break; 305 case BIO_CTRL_EOF: /* More to read */ 306 if (ctx->cont <= 0) 307 ret=1; 308 else 309 ret=BIO_ctrl(b->next_bio,cmd,num,ptr); 310 break; 311 case BIO_CTRL_WPENDING: 312 ret=ctx->buf_len-ctx->buf_off; 313 if (ret <= 0) 314 ret=BIO_ctrl(b->next_bio,cmd,num,ptr); 315 break; 316 case BIO_CTRL_PENDING: /* More to read in buffer */ 317 ret=ctx->buf_len-ctx->buf_off; 318 if (ret <= 0) 319 ret=BIO_ctrl(b->next_bio,cmd,num,ptr); 320 break; 321 case BIO_CTRL_FLUSH: 322 /* do a final write */ 323 again: 324 while (ctx->buf_len != ctx->buf_off) 325 { 326 i=enc_write(b,NULL,0); 327 if (i < 0) 328 return i; 329 } 330 331 if (!ctx->finished) 332 { 333 ctx->finished=1; 334 ctx->buf_off=0; 335 ret=EVP_CipherFinal_ex(&(ctx->cipher), 336 (unsigned char *)ctx->buf, 337 &(ctx->buf_len)); 338 ctx->ok=(int)ret; 339 if (ret <= 0) break; 340 341 /* push out the bytes */ 342 goto again; 343 } 344 345 /* Finally flush the underlying BIO */ 346 ret=BIO_ctrl(b->next_bio,cmd,num,ptr); 347 break; 348 case BIO_C_GET_CIPHER_STATUS: 349 ret=(long)ctx->ok; 350 break; 351 case BIO_C_DO_STATE_MACHINE: 352 BIO_clear_retry_flags(b); 353 ret=BIO_ctrl(b->next_bio,cmd,num,ptr); 354 BIO_copy_next_retry(b); 355 break; 356 case BIO_C_GET_CIPHER_CTX: 357 c_ctx=(EVP_CIPHER_CTX **)ptr; 358 (*c_ctx)= &(ctx->cipher); 359 b->init=1; 360 break; 361 case BIO_CTRL_DUP: 362 dbio=(BIO *)ptr; 363 dctx=(BIO_ENC_CTX *)dbio->ptr; 364 EVP_CIPHER_CTX_init(&dctx->cipher); 365 ret = EVP_CIPHER_CTX_copy(&dctx->cipher,&ctx->cipher); 366 if (ret) 367 dbio->init=1; 368 break; 369 default: 370 ret=BIO_ctrl(b->next_bio,cmd,num,ptr); 371 break; 372 } 373 return(ret); 374 } 375 376 static long enc_callback_ctrl(BIO *b, int cmd, bio_info_cb *fp) 377 { 378 long ret=1; 379 380 if (b->next_bio == NULL) return(0); 381 switch (cmd) 382 { 383 default: 384 ret=BIO_callback_ctrl(b->next_bio,cmd,fp); 385 break; 386 } 387 return(ret); 388 } 389 390 /* 391 void BIO_set_cipher_ctx(b,c) 392 BIO *b; 393 EVP_CIPHER_ctx *c; 394 { 395 if (b == NULL) return; 396 397 if ((b->callback != NULL) && 398 (b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,0L) <= 0)) 399 return; 400 401 b->init=1; 402 ctx=(BIO_ENC_CTX *)b->ptr; 403 memcpy(ctx->cipher,c,sizeof(EVP_CIPHER_CTX)); 404 405 if (b->callback != NULL) 406 b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,1L); 407 } 408 */ 409 410 void BIO_set_cipher(BIO *b, const EVP_CIPHER *c, const unsigned char *k, 411 const unsigned char *i, int e) 412 { 413 BIO_ENC_CTX *ctx; 414 415 if (b == NULL) return; 416 417 if ((b->callback != NULL) && 418 (b->callback(b,BIO_CB_CTRL,(const char *)c,BIO_CTRL_SET,e,0L) <= 0)) 419 return; 420 421 b->init=1; 422 ctx=(BIO_ENC_CTX *)b->ptr; 423 EVP_CipherInit_ex(&(ctx->cipher),c,NULL, k,i,e); 424 425 if (b->callback != NULL) 426 b->callback(b,BIO_CB_CTRL,(const char *)c,BIO_CTRL_SET,e,1L); 427 } 428 429