| 
									
										
										
										
											2016-05-18 02:20:24 +08:00
										 |  |  | /*
 | 
					
						
							| 
									
										
										
										
											2021-06-17 20:24:59 +08:00
										 |  |  |  * Copyright 2004-2021 The OpenSSL Project Authors. All Rights Reserved. | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  |  * | 
					
						
							| 
									
										
										
										
											2018-12-06 21:07:27 +08:00
										 |  |  |  * Licensed under the Apache License 2.0 (the "License").  You may not use | 
					
						
							| 
									
										
										
										
											2016-05-18 02:20:24 +08:00
										 |  |  |  * this file except in compliance with the License.  You can obtain a copy | 
					
						
							|  |  |  |  * in the file LICENSE in the source distribution or at | 
					
						
							|  |  |  |  * https://www.openssl.org/source/license.html
 | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  |  */ | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-12-06 01:09:49 +08:00
										 |  |  | /*
 | 
					
						
							| 
									
										
										
										
											2020-07-14 07:38:22 +08:00
										 |  |  |  * This file uses the low level AES and engine functions (which are deprecated | 
					
						
							|  |  |  |  * for non-internal use) in order to implement the padlock engine AES ciphers. | 
					
						
							| 
									
										
										
										
											2019-12-06 01:09:49 +08:00
										 |  |  |  */ | 
					
						
							|  |  |  | #define OPENSSL_SUPPRESS_DEPRECATED
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | #include <stdio.h>
 | 
					
						
							|  |  |  | #include <string.h>
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2005-06-01 02:22:53 +08:00
										 |  |  | #include <openssl/opensslconf.h>
 | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | #include <openssl/crypto.h>
 | 
					
						
							|  |  |  | #include <openssl/engine.h>
 | 
					
						
							|  |  |  | #include <openssl/evp.h>
 | 
					
						
							| 
									
										
										
										
											2016-04-13 18:28:45 +08:00
										 |  |  | #include <openssl/aes.h>
 | 
					
						
							| 
									
										
										
										
											2004-09-25 07:37:52 +08:00
										 |  |  | #include <openssl/rand.h>
 | 
					
						
							| 
									
										
										
										
											2005-07-16 20:37:36 +08:00
										 |  |  | #include <openssl/err.h>
 | 
					
						
							| 
									
										
										
										
											2011-10-06 01:03:44 +08:00
										 |  |  | #include <openssl/modes.h>
 | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #ifndef OPENSSL_NO_PADLOCKENG
 | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | /*
 | 
					
						
							|  |  |  |  * VIA PadLock AES is available *ONLY* on some x86 CPUs. Not only that it | 
					
						
							|  |  |  |  * doesn't exist elsewhere, but it even can't be compiled on other platforms! | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | # undef COMPILE_PADLOCKENG
 | 
					
						
							|  |  |  | # if defined(PADLOCK_ASM)
 | 
					
						
							|  |  |  | #  define COMPILE_PADLOCKENG
 | 
					
						
							|  |  |  | #  ifdef OPENSSL_NO_DYNAMIC_ENGINE
 | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | static ENGINE *ENGINE_padlock(void); | 
					
						
							| 
									
										
										
										
											2011-01-30 09:30:48 +08:00
										 |  |  | #  endif
 | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | # endif
 | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | # ifdef OPENSSL_NO_DYNAMIC_ENGINE
 | 
					
						
							| 
									
										
										
										
											2016-04-12 19:20:16 +08:00
										 |  |  | void engine_load_padlock_int(void); | 
					
						
							|  |  |  | void engine_load_padlock_int(void) | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | { | 
					
						
							|  |  |  | /* On non-x86 CPUs it just returns. */ | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #  ifdef COMPILE_PADLOCKENG
 | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     ENGINE *toadd = ENGINE_padlock(); | 
					
						
							|  |  |  |     if (!toadd) | 
					
						
							|  |  |  |         return; | 
					
						
							| 
									
										
										
										
											2020-11-04 19:34:15 +08:00
										 |  |  |     ERR_set_mark(); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     ENGINE_add(toadd); | 
					
						
							| 
									
										
										
										
											2020-11-04 19:34:15 +08:00
										 |  |  |     /*
 | 
					
						
							|  |  |  |      * If the "add" worked, it gets a structural reference. So either way, we | 
					
						
							|  |  |  |      * release our just-created reference. | 
					
						
							|  |  |  |      */ | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     ENGINE_free(toadd); | 
					
						
							| 
									
										
										
										
											2020-11-04 19:34:15 +08:00
										 |  |  |     /*
 | 
					
						
							|  |  |  |      * If the "add" didn't work, it was probably a conflict because it was | 
					
						
							|  |  |  |      * already added (eg. someone calling ENGINE_load_blah then calling | 
					
						
							|  |  |  |      * ENGINE_load_builtin_engines() perhaps). | 
					
						
							|  |  |  |      */ | 
					
						
							|  |  |  |     ERR_pop_to_mark(); | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #  endif
 | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | # endif
 | 
					
						
							| 
									
										
										
										
											2011-01-30 09:30:48 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | # ifdef COMPILE_PADLOCKENG
 | 
					
						
							| 
									
										
										
										
											2004-09-28 05:59:44 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | /* Function for ENGINE detection and control */ | 
					
						
							|  |  |  | static int padlock_available(void); | 
					
						
							|  |  |  | static int padlock_init(ENGINE *e); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /* RNG Stuff */ | 
					
						
							|  |  |  | static RAND_METHOD padlock_rand; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /* Cipher Stuff */ | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | static int padlock_ciphers(ENGINE *e, const EVP_CIPHER **cipher, | 
					
						
							|  |  |  |                            const int **nids, int nid); | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | /* Engine names */ | 
					
						
							|  |  |  | static const char *padlock_id = "padlock"; | 
					
						
							|  |  |  | static char padlock_name[100]; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /* Available features */ | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | static int padlock_use_ace = 0; /* Advanced Cryptography Engine */ | 
					
						
							|  |  |  | static int padlock_use_rng = 0; /* Random Number Generator */ | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | /* ===== Engine "management" functions ===== */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /* Prepare the ENGINE structure for registration */ | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | static int padlock_bind_helper(ENGINE *e) | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | { | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     /* Check available features */ | 
					
						
							|  |  |  |     padlock_available(); | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-02-06 23:54:20 +08:00
										 |  |  |     /*
 | 
					
						
							|  |  |  |      * RNG is currently disabled for reasons discussed in commentary just | 
					
						
							|  |  |  |      * before padlock_rand_bytes function. | 
					
						
							|  |  |  |      */ | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     padlock_use_rng = 0; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     /* Generate a nice engine name with available features */ | 
					
						
							|  |  |  |     BIO_snprintf(padlock_name, sizeof(padlock_name), | 
					
						
							|  |  |  |                  "VIA PadLock (%s, %s)", | 
					
						
							|  |  |  |                  padlock_use_rng ? "RNG" : "no-RNG", | 
					
						
							|  |  |  |                  padlock_use_ace ? "ACE" : "no-ACE"); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     /* Register everything or return with an error */ | 
					
						
							|  |  |  |     if (!ENGINE_set_id(e, padlock_id) || | 
					
						
							|  |  |  |         !ENGINE_set_name(e, padlock_name) || | 
					
						
							|  |  |  |         !ENGINE_set_init_function(e, padlock_init) || | 
					
						
							|  |  |  |         (padlock_use_ace && !ENGINE_set_ciphers(e, padlock_ciphers)) || | 
					
						
							|  |  |  |         (padlock_use_rng && !ENGINE_set_RAND(e, &padlock_rand))) { | 
					
						
							|  |  |  |         return 0; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     /* Everything looks good */ | 
					
						
							|  |  |  |     return 1; | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #  ifdef OPENSSL_NO_DYNAMIC_ENGINE
 | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | /* Constructor */ | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | static ENGINE *ENGINE_padlock(void) | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | { | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     ENGINE *eng = ENGINE_new(); | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-10-30 19:22:31 +08:00
										 |  |  |     if (eng == NULL) { | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         return NULL; | 
					
						
							|  |  |  |     } | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     if (!padlock_bind_helper(eng)) { | 
					
						
							|  |  |  |         ENGINE_free(eng); | 
					
						
							|  |  |  |         return NULL; | 
					
						
							|  |  |  |     } | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     return eng; | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | } | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #  endif
 | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | /* Check availability of the engine */ | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | static int padlock_init(ENGINE *e) | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | { | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     return (padlock_use_rng || padlock_use_ace); | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | /*
 | 
					
						
							|  |  |  |  * This stuff is needed if this ENGINE is being compiled into a | 
					
						
							|  |  |  |  * self-contained shared-library. | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  |  */ | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #  ifndef OPENSSL_NO_DYNAMIC_ENGINE
 | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | static int padlock_bind_fn(ENGINE *e, const char *id) | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | { | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     if (id && (strcmp(id, padlock_id) != 0)) { | 
					
						
							|  |  |  |         return 0; | 
					
						
							|  |  |  |     } | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     if (!padlock_bind_helper(e)) { | 
					
						
							|  |  |  |         return 0; | 
					
						
							|  |  |  |     } | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     return 1; | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2007-11-21 01:52:02 +08:00
										 |  |  | IMPLEMENT_DYNAMIC_CHECK_FN() | 
					
						
							| 
									
										
										
										
											2016-03-17 20:20:56 +08:00
										 |  |  | IMPLEMENT_DYNAMIC_BIND_FN(padlock_bind_fn) | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #  endif                       /* !OPENSSL_NO_DYNAMIC_ENGINE */
 | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | /* ===== Here comes the "real" engine ===== */ | 
					
						
							| 
									
										
										
										
											2016-04-13 18:28:45 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | /* Some AES-related constants */ | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #  define AES_BLOCK_SIZE          16
 | 
					
						
							|  |  |  | #  define AES_KEY_SIZE_128        16
 | 
					
						
							|  |  |  | #  define AES_KEY_SIZE_192        24
 | 
					
						
							|  |  |  | #  define AES_KEY_SIZE_256        32
 | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     /*
 | 
					
						
							|  |  |  |      * Here we store the status information relevant to the current context. | 
					
						
							|  |  |  |      */ | 
					
						
							|  |  |  |     /*
 | 
					
						
							|  |  |  |      * BIG FAT WARNING: Inline assembler in PADLOCK_XCRYPT_ASM() depends on | 
					
						
							|  |  |  |      * the order of items in this structure.  Don't blindly modify, reorder, | 
					
						
							|  |  |  |      * etc! | 
					
						
							|  |  |  |      */ | 
					
						
							|  |  |  | struct padlock_cipher_data { | 
					
						
							|  |  |  |     unsigned char iv[AES_BLOCK_SIZE]; /* Initialization vector */ | 
					
						
							|  |  |  |     union { | 
					
						
							|  |  |  |         unsigned int pad[4]; | 
					
						
							|  |  |  |         struct { | 
					
						
							|  |  |  |             int rounds:4; | 
					
						
							|  |  |  |             int dgst:1;         /* n/a in C3 */ | 
					
						
							|  |  |  |             int align:1;        /* n/a in C3 */ | 
					
						
							|  |  |  |             int ciphr:1;        /* n/a in C3 */ | 
					
						
							|  |  |  |             unsigned int keygen:1; | 
					
						
							|  |  |  |             int interm:1; | 
					
						
							|  |  |  |             unsigned int encdec:1; | 
					
						
							|  |  |  |             int ksize:2; | 
					
						
							|  |  |  |         } b; | 
					
						
							|  |  |  |     } cword;                    /* Control word */ | 
					
						
							|  |  |  |     AES_KEY ks;                 /* Encryption key */ | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | }; | 
					
						
							| 
									
										
										
										
											2009-04-27 02:14:58 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2011-09-07 04:45:36 +08:00
										 |  |  | /* Interface to assembler module */ | 
					
						
							| 
									
										
										
										
											2018-06-22 05:59:58 +08:00
										 |  |  | unsigned int padlock_capability(void); | 
					
						
							| 
									
										
										
										
											2011-09-07 04:45:36 +08:00
										 |  |  | void padlock_key_bswap(AES_KEY *key); | 
					
						
							|  |  |  | void padlock_verify_context(struct padlock_cipher_data *ctx); | 
					
						
							| 
									
										
										
										
											2018-06-22 05:59:58 +08:00
										 |  |  | void padlock_reload_key(void); | 
					
						
							| 
									
										
										
										
											2011-09-07 04:45:36 +08:00
										 |  |  | void padlock_aes_block(void *out, const void *inp, | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |                        struct padlock_cipher_data *ctx); | 
					
						
							|  |  |  | int padlock_ecb_encrypt(void *out, const void *inp, | 
					
						
							|  |  |  |                         struct padlock_cipher_data *ctx, size_t len); | 
					
						
							|  |  |  | int padlock_cbc_encrypt(void *out, const void *inp, | 
					
						
							|  |  |  |                         struct padlock_cipher_data *ctx, size_t len); | 
					
						
							|  |  |  | int padlock_cfb_encrypt(void *out, const void *inp, | 
					
						
							|  |  |  |                         struct padlock_cipher_data *ctx, size_t len); | 
					
						
							|  |  |  | int padlock_ofb_encrypt(void *out, const void *inp, | 
					
						
							|  |  |  |                         struct padlock_cipher_data *ctx, size_t len); | 
					
						
							|  |  |  | int padlock_ctr32_encrypt(void *out, const void *inp, | 
					
						
							|  |  |  |                           struct padlock_cipher_data *ctx, size_t len); | 
					
						
							|  |  |  | int padlock_xstore(void *out, int edx); | 
					
						
							|  |  |  | void padlock_sha1_oneshot(void *ctx, const void *inp, size_t len); | 
					
						
							|  |  |  | void padlock_sha1(void *ctx, const void *inp, size_t len); | 
					
						
							|  |  |  | void padlock_sha256_oneshot(void *ctx, const void *inp, size_t len); | 
					
						
							|  |  |  | void padlock_sha256(void *ctx, const void *inp, size_t len); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /*
 | 
					
						
							|  |  |  |  * Load supported features of the CPU to see if the PadLock is available. | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | static int padlock_available(void) | 
					
						
							| 
									
										
										
										
											2009-04-27 02:14:58 +08:00
										 |  |  | { | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     unsigned int edx = padlock_capability(); | 
					
						
							| 
									
										
										
										
											2009-04-27 02:14:58 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     /* Fill up some flags */ | 
					
						
							|  |  |  |     padlock_use_ace = ((edx & (0x3 << 6)) == (0x3 << 6)); | 
					
						
							|  |  |  |     padlock_use_rng = ((edx & (0x3 << 2)) == (0x3 << 2)); | 
					
						
							| 
									
										
										
										
											2009-04-27 02:14:58 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     return padlock_use_ace + padlock_use_rng; | 
					
						
							| 
									
										
										
										
											2009-04-27 02:14:58 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | /* ===== AES encryption/decryption ===== */ | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #  if defined(NID_aes_128_cfb128) && ! defined (NID_aes_128_cfb)
 | 
					
						
							|  |  |  | #   define NID_aes_128_cfb NID_aes_128_cfb128
 | 
					
						
							|  |  |  | #  endif
 | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #  if defined(NID_aes_128_ofb128) && ! defined (NID_aes_128_ofb)
 | 
					
						
							|  |  |  | #   define NID_aes_128_ofb NID_aes_128_ofb128
 | 
					
						
							|  |  |  | #  endif
 | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #  if defined(NID_aes_192_cfb128) && ! defined (NID_aes_192_cfb)
 | 
					
						
							|  |  |  | #   define NID_aes_192_cfb NID_aes_192_cfb128
 | 
					
						
							|  |  |  | #  endif
 | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #  if defined(NID_aes_192_ofb128) && ! defined (NID_aes_192_ofb)
 | 
					
						
							|  |  |  | #   define NID_aes_192_ofb NID_aes_192_ofb128
 | 
					
						
							|  |  |  | #  endif
 | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #  if defined(NID_aes_256_cfb128) && ! defined (NID_aes_256_cfb)
 | 
					
						
							|  |  |  | #   define NID_aes_256_cfb NID_aes_256_cfb128
 | 
					
						
							|  |  |  | #  endif
 | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #  if defined(NID_aes_256_ofb128) && ! defined (NID_aes_256_ofb)
 | 
					
						
							|  |  |  | #   define NID_aes_256_ofb NID_aes_256_ofb128
 | 
					
						
							|  |  |  | #  endif
 | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | /* List of supported ciphers. */ | 
					
						
							| 
									
										
										
										
											2014-08-18 23:01:15 +08:00
										 |  |  | static const int padlock_cipher_nids[] = { | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     NID_aes_128_ecb, | 
					
						
							|  |  |  |     NID_aes_128_cbc, | 
					
						
							|  |  |  |     NID_aes_128_cfb, | 
					
						
							|  |  |  |     NID_aes_128_ofb, | 
					
						
							|  |  |  |     NID_aes_128_ctr, | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     NID_aes_192_ecb, | 
					
						
							|  |  |  |     NID_aes_192_cbc, | 
					
						
							|  |  |  |     NID_aes_192_cfb, | 
					
						
							|  |  |  |     NID_aes_192_ofb, | 
					
						
							|  |  |  |     NID_aes_192_ctr, | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     NID_aes_256_ecb, | 
					
						
							|  |  |  |     NID_aes_256_cbc, | 
					
						
							|  |  |  |     NID_aes_256_cfb, | 
					
						
							|  |  |  |     NID_aes_256_ofb, | 
					
						
							|  |  |  |     NID_aes_256_ctr | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | }; | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | static int padlock_cipher_nids_num = (sizeof(padlock_cipher_nids) / | 
					
						
							|  |  |  |                                       sizeof(padlock_cipher_nids[0])); | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | /* Function prototypes ... */ | 
					
						
							|  |  |  | static int padlock_aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |                                 const unsigned char *iv, int enc); | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #  define NEAREST_ALIGNED(ptr) ( (unsigned char *)(ptr) +         \
 | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         ( (0x10 - ((size_t)(ptr) & 0x0F)) & 0x0F )      ) | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #  define ALIGNED_CIPHER_DATA(ctx) ((struct padlock_cipher_data *)\
 | 
					
						
							| 
									
										
										
										
											2016-03-07 18:17:27 +08:00
										 |  |  |         NEAREST_ALIGNED(EVP_CIPHER_CTX_get_cipher_data(ctx))) | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2011-09-07 04:45:36 +08:00
										 |  |  | static int | 
					
						
							|  |  |  | padlock_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out_arg, | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |                    const unsigned char *in_arg, size_t nbytes) | 
					
						
							| 
									
										
										
										
											2011-09-07 04:45:36 +08:00
										 |  |  | { | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     return padlock_ecb_encrypt(out_arg, in_arg, | 
					
						
							|  |  |  |                                ALIGNED_CIPHER_DATA(ctx), nbytes); | 
					
						
							| 
									
										
										
										
											2011-09-07 04:45:36 +08:00
										 |  |  | } | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2011-09-07 04:45:36 +08:00
										 |  |  | static int | 
					
						
							|  |  |  | padlock_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out_arg, | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |                    const unsigned char *in_arg, size_t nbytes) | 
					
						
							| 
									
										
										
										
											2011-09-07 04:45:36 +08:00
										 |  |  | { | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     struct padlock_cipher_data *cdata = ALIGNED_CIPHER_DATA(ctx); | 
					
						
							|  |  |  |     int ret; | 
					
						
							| 
									
										
										
										
											2011-09-07 04:45:36 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-12-14 05:06:14 +08:00
										 |  |  |     memcpy(cdata->iv, EVP_CIPHER_CTX_iv(ctx), AES_BLOCK_SIZE); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     if ((ret = padlock_cbc_encrypt(out_arg, in_arg, cdata, nbytes))) | 
					
						
							| 
									
										
										
										
											2015-12-14 05:06:14 +08:00
										 |  |  |         memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), cdata->iv, AES_BLOCK_SIZE); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     return ret; | 
					
						
							| 
									
										
										
										
											2011-09-07 04:45:36 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | static int | 
					
						
							|  |  |  | padlock_cfb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out_arg, | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |                    const unsigned char *in_arg, size_t nbytes) | 
					
						
							| 
									
										
										
										
											2011-09-07 04:45:36 +08:00
										 |  |  | { | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     struct padlock_cipher_data *cdata = ALIGNED_CIPHER_DATA(ctx); | 
					
						
							|  |  |  |     size_t chunk; | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
											
												Rename all getters to use get/get0 in name
For functions that exist in 1.1.1 provide a simple aliases via #define.
Fixes #15236
Functions with OSSL_DECODER_, OSSL_ENCODER_, OSSL_STORE_LOADER_,
EVP_KEYEXCH_, EVP_KEM_, EVP_ASYM_CIPHER_, EVP_SIGNATURE_,
EVP_KEYMGMT_, EVP_RAND_, EVP_MAC_, EVP_KDF_, EVP_PKEY_,
EVP_MD_, and EVP_CIPHER_ prefixes are renamed.
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/15405)
											
										 
											2021-05-21 22:58:08 +08:00
										 |  |  |     if ((chunk = EVP_CIPHER_CTX_get_num(ctx))) {   /* borrow chunk variable */ | 
					
						
							| 
									
										
										
										
											2015-12-14 05:06:14 +08:00
										 |  |  |         unsigned char *ivp = EVP_CIPHER_CTX_iv_noconst(ctx); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  |         if (chunk >= AES_BLOCK_SIZE) | 
					
						
							|  |  |  |             return 0;           /* bogus value */ | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
											
												Rename all getters to use get/get0 in name
For functions that exist in 1.1.1 provide a simple aliases via #define.
Fixes #15236
Functions with OSSL_DECODER_, OSSL_ENCODER_, OSSL_STORE_LOADER_,
EVP_KEYEXCH_, EVP_KEM_, EVP_ASYM_CIPHER_, EVP_SIGNATURE_,
EVP_KEYMGMT_, EVP_RAND_, EVP_MAC_, EVP_KDF_, EVP_PKEY_,
EVP_MD_, and EVP_CIPHER_ prefixes are renamed.
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/15405)
											
										 
											2021-05-21 22:58:08 +08:00
										 |  |  |         if (EVP_CIPHER_CTX_is_encrypting(ctx)) | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |             while (chunk < AES_BLOCK_SIZE && nbytes != 0) { | 
					
						
							|  |  |  |                 ivp[chunk] = *(out_arg++) = *(in_arg++) ^ ivp[chunk]; | 
					
						
							|  |  |  |                 chunk++, nbytes--; | 
					
						
							|  |  |  |         } else | 
					
						
							|  |  |  |             while (chunk < AES_BLOCK_SIZE && nbytes != 0) { | 
					
						
							|  |  |  |                 unsigned char c = *(in_arg++); | 
					
						
							|  |  |  |                 *(out_arg++) = c ^ ivp[chunk]; | 
					
						
							|  |  |  |                 ivp[chunk++] = c, nbytes--; | 
					
						
							|  |  |  |             } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-12-14 05:06:14 +08:00
										 |  |  |         EVP_CIPHER_CTX_set_num(ctx, chunk % AES_BLOCK_SIZE); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if (nbytes == 0) | 
					
						
							|  |  |  |         return 1; | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-12-14 05:06:14 +08:00
										 |  |  |     memcpy(cdata->iv, EVP_CIPHER_CTX_iv(ctx), AES_BLOCK_SIZE); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  |     if ((chunk = nbytes & ~(AES_BLOCK_SIZE - 1))) { | 
					
						
							|  |  |  |         if (!padlock_cfb_encrypt(out_arg, in_arg, cdata, chunk)) | 
					
						
							|  |  |  |             return 0; | 
					
						
							|  |  |  |         nbytes -= chunk; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if (nbytes) { | 
					
						
							|  |  |  |         unsigned char *ivp = cdata->iv; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         out_arg += chunk; | 
					
						
							|  |  |  |         in_arg += chunk; | 
					
						
							| 
									
										
										
										
											2015-12-14 05:06:14 +08:00
										 |  |  |         EVP_CIPHER_CTX_set_num(ctx, nbytes); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         if (cdata->cword.b.encdec) { | 
					
						
							|  |  |  |             cdata->cword.b.encdec = 0; | 
					
						
							|  |  |  |             padlock_reload_key(); | 
					
						
							|  |  |  |             padlock_aes_block(ivp, ivp, cdata); | 
					
						
							|  |  |  |             cdata->cword.b.encdec = 1; | 
					
						
							|  |  |  |             padlock_reload_key(); | 
					
						
							|  |  |  |             while (nbytes) { | 
					
						
							|  |  |  |                 unsigned char c = *(in_arg++); | 
					
						
							|  |  |  |                 *(out_arg++) = c ^ *ivp; | 
					
						
							|  |  |  |                 *(ivp++) = c, nbytes--; | 
					
						
							|  |  |  |             } | 
					
						
							|  |  |  |         } else { | 
					
						
							|  |  |  |             padlock_reload_key(); | 
					
						
							|  |  |  |             padlock_aes_block(ivp, ivp, cdata); | 
					
						
							|  |  |  |             padlock_reload_key(); | 
					
						
							|  |  |  |             while (nbytes) { | 
					
						
							|  |  |  |                 *ivp = *(out_arg++) = *(in_arg++) ^ *ivp; | 
					
						
							|  |  |  |                 ivp++, nbytes--; | 
					
						
							|  |  |  |             } | 
					
						
							|  |  |  |         } | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-12-14 05:06:14 +08:00
										 |  |  |     memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), cdata->iv, AES_BLOCK_SIZE); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  |     return 1; | 
					
						
							| 
									
										
										
										
											2011-09-07 04:45:36 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | static int | 
					
						
							|  |  |  | padlock_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out_arg, | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |                    const unsigned char *in_arg, size_t nbytes) | 
					
						
							| 
									
										
										
										
											2011-09-07 04:45:36 +08:00
										 |  |  | { | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     struct padlock_cipher_data *cdata = ALIGNED_CIPHER_DATA(ctx); | 
					
						
							|  |  |  |     size_t chunk; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     /*
 | 
					
						
							|  |  |  |      * ctx->num is maintained in byte-oriented modes, such as CFB and OFB... | 
					
						
							|  |  |  |      */ | 
					
						
							| 
									
										
										
											
												Rename all getters to use get/get0 in name
For functions that exist in 1.1.1 provide a simple aliases via #define.
Fixes #15236
Functions with OSSL_DECODER_, OSSL_ENCODER_, OSSL_STORE_LOADER_,
EVP_KEYEXCH_, EVP_KEM_, EVP_ASYM_CIPHER_, EVP_SIGNATURE_,
EVP_KEYMGMT_, EVP_RAND_, EVP_MAC_, EVP_KDF_, EVP_PKEY_,
EVP_MD_, and EVP_CIPHER_ prefixes are renamed.
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/15405)
											
										 
											2021-05-21 22:58:08 +08:00
										 |  |  |     if ((chunk = EVP_CIPHER_CTX_get_num(ctx))) {   /* borrow chunk variable */ | 
					
						
							| 
									
										
										
										
											2015-12-14 05:06:14 +08:00
										 |  |  |         unsigned char *ivp = EVP_CIPHER_CTX_iv_noconst(ctx); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  |         if (chunk >= AES_BLOCK_SIZE) | 
					
						
							|  |  |  |             return 0;           /* bogus value */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         while (chunk < AES_BLOCK_SIZE && nbytes != 0) { | 
					
						
							|  |  |  |             *(out_arg++) = *(in_arg++) ^ ivp[chunk]; | 
					
						
							|  |  |  |             chunk++, nbytes--; | 
					
						
							|  |  |  |         } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-12-14 05:06:14 +08:00
										 |  |  |         EVP_CIPHER_CTX_set_num(ctx, chunk % AES_BLOCK_SIZE); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if (nbytes == 0) | 
					
						
							|  |  |  |         return 1; | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-12-14 05:06:14 +08:00
										 |  |  |     memcpy(cdata->iv, EVP_CIPHER_CTX_iv(ctx), AES_BLOCK_SIZE); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  |     if ((chunk = nbytes & ~(AES_BLOCK_SIZE - 1))) { | 
					
						
							|  |  |  |         if (!padlock_ofb_encrypt(out_arg, in_arg, cdata, chunk)) | 
					
						
							|  |  |  |             return 0; | 
					
						
							|  |  |  |         nbytes -= chunk; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if (nbytes) { | 
					
						
							|  |  |  |         unsigned char *ivp = cdata->iv; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         out_arg += chunk; | 
					
						
							|  |  |  |         in_arg += chunk; | 
					
						
							| 
									
										
										
										
											2015-12-14 05:06:14 +08:00
										 |  |  |         EVP_CIPHER_CTX_set_num(ctx, nbytes); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         padlock_reload_key();   /* empirically found */ | 
					
						
							|  |  |  |         padlock_aes_block(ivp, ivp, cdata); | 
					
						
							|  |  |  |         padlock_reload_key();   /* empirically found */ | 
					
						
							|  |  |  |         while (nbytes) { | 
					
						
							|  |  |  |             *(out_arg++) = *(in_arg++) ^ *ivp; | 
					
						
							|  |  |  |             ivp++, nbytes--; | 
					
						
							|  |  |  |         } | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-12-14 05:06:14 +08:00
										 |  |  |     memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), cdata->iv, AES_BLOCK_SIZE); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  |     return 1; | 
					
						
							| 
									
										
										
										
											2011-09-07 04:45:36 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2011-10-06 01:03:44 +08:00
										 |  |  | static void padlock_ctr32_encrypt_glue(const unsigned char *in, | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |                                        unsigned char *out, size_t blocks, | 
					
						
							|  |  |  |                                        struct padlock_cipher_data *ctx, | 
					
						
							|  |  |  |                                        const unsigned char *ivec) | 
					
						
							| 
									
										
										
										
											2011-10-06 01:03:44 +08:00
										 |  |  | { | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     memcpy(ctx->iv, ivec, AES_BLOCK_SIZE); | 
					
						
							|  |  |  |     padlock_ctr32_encrypt(out, in, ctx, AES_BLOCK_SIZE * blocks); | 
					
						
							| 
									
										
										
										
											2011-10-06 01:03:44 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | static int | 
					
						
							|  |  |  | padlock_ctr_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out_arg, | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |                    const unsigned char *in_arg, size_t nbytes) | 
					
						
							| 
									
										
										
										
											2011-10-06 01:03:44 +08:00
										 |  |  | { | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     struct padlock_cipher_data *cdata = ALIGNED_CIPHER_DATA(ctx); | 
					
						
							| 
									
										
										
										
											2021-06-07 07:23:41 +08:00
										 |  |  |     int n = EVP_CIPHER_CTX_get_num(ctx); | 
					
						
							|  |  |  |     unsigned int num; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if (n < 0) | 
					
						
							|  |  |  |         return 0; | 
					
						
							|  |  |  |     num = (unsigned int)n; | 
					
						
							| 
									
										
										
										
											2011-10-06 01:03:44 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     CRYPTO_ctr128_encrypt_ctr32(in_arg, out_arg, nbytes, | 
					
						
							| 
									
										
										
										
											2015-12-14 05:06:14 +08:00
										 |  |  |                                 cdata, EVP_CIPHER_CTX_iv_noconst(ctx), | 
					
						
							|  |  |  |                                 EVP_CIPHER_CTX_buf_noconst(ctx), &num, | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |                                 (ctr128_f) padlock_ctr32_encrypt_glue); | 
					
						
							| 
									
										
										
										
											2011-10-06 01:03:44 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-12-14 05:06:14 +08:00
										 |  |  |     EVP_CIPHER_CTX_set_num(ctx, (size_t)num); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     return 1; | 
					
						
							| 
									
										
										
										
											2011-10-06 01:03:44 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #  define EVP_CIPHER_block_size_ECB       AES_BLOCK_SIZE
 | 
					
						
							|  |  |  | #  define EVP_CIPHER_block_size_CBC       AES_BLOCK_SIZE
 | 
					
						
							|  |  |  | #  define EVP_CIPHER_block_size_OFB       1
 | 
					
						
							|  |  |  | #  define EVP_CIPHER_block_size_CFB       1
 | 
					
						
							|  |  |  | #  define EVP_CIPHER_block_size_CTR       1
 | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | /*
 | 
					
						
							|  |  |  |  * Declaring so many ciphers by hand would be a pain. Instead introduce a bit | 
					
						
							|  |  |  |  * of preprocessor magic :-) | 
					
						
							|  |  |  |  */ | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #  define DECLARE_AES_EVP(ksize,lmode,umode)      \
 | 
					
						
							| 
									
										
										
										
											2015-12-19 00:05:57 +08:00
										 |  |  | static EVP_CIPHER *_hidden_aes_##ksize##_##lmode = NULL; \ | 
					
						
							|  |  |  | static const EVP_CIPHER *padlock_aes_##ksize##_##lmode(void) \ | 
					
						
							|  |  |  | {                                                                       \ | 
					
						
							|  |  |  |     if (_hidden_aes_##ksize##_##lmode == NULL                           \ | 
					
						
							|  |  |  |         && ((_hidden_aes_##ksize##_##lmode =                            \ | 
					
						
							|  |  |  |              EVP_CIPHER_meth_new(NID_aes_##ksize##_##lmode,             \ | 
					
						
							|  |  |  |                                  EVP_CIPHER_block_size_##umode,         \ | 
					
						
							|  |  |  |                                  AES_KEY_SIZE_##ksize)) == NULL         \ | 
					
						
							|  |  |  |             || !EVP_CIPHER_meth_set_iv_length(_hidden_aes_##ksize##_##lmode, \ | 
					
						
							|  |  |  |                                               AES_BLOCK_SIZE)           \ | 
					
						
							|  |  |  |             || !EVP_CIPHER_meth_set_flags(_hidden_aes_##ksize##_##lmode, \ | 
					
						
							|  |  |  |                                           0 | EVP_CIPH_##umode##_MODE)  \ | 
					
						
							|  |  |  |             || !EVP_CIPHER_meth_set_init(_hidden_aes_##ksize##_##lmode, \ | 
					
						
							|  |  |  |                                          padlock_aes_init_key)          \ | 
					
						
							|  |  |  |             || !EVP_CIPHER_meth_set_do_cipher(_hidden_aes_##ksize##_##lmode, \ | 
					
						
							|  |  |  |                                               padlock_##lmode##_cipher) \ | 
					
						
							|  |  |  |             || !EVP_CIPHER_meth_set_impl_ctx_size(_hidden_aes_##ksize##_##lmode, \ | 
					
						
							|  |  |  |                                                   sizeof(struct padlock_cipher_data) + 16) \ | 
					
						
							|  |  |  |             || !EVP_CIPHER_meth_set_set_asn1_params(_hidden_aes_##ksize##_##lmode, \ | 
					
						
							|  |  |  |                                                     EVP_CIPHER_set_asn1_iv) \ | 
					
						
							|  |  |  |             || !EVP_CIPHER_meth_set_get_asn1_params(_hidden_aes_##ksize##_##lmode, \ | 
					
						
							|  |  |  |                                                     EVP_CIPHER_get_asn1_iv))) { \ | 
					
						
							|  |  |  |         EVP_CIPHER_meth_free(_hidden_aes_##ksize##_##lmode);            \ | 
					
						
							|  |  |  |         _hidden_aes_##ksize##_##lmode = NULL;                           \ | 
					
						
							|  |  |  |     }                                                                   \ | 
					
						
							|  |  |  |     return _hidden_aes_##ksize##_##lmode;                               \ | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-12-19 00:05:57 +08:00
										 |  |  | DECLARE_AES_EVP(128, ecb, ECB) | 
					
						
							|  |  |  | DECLARE_AES_EVP(128, cbc, CBC) | 
					
						
							|  |  |  | DECLARE_AES_EVP(128, cfb, CFB) | 
					
						
							|  |  |  | DECLARE_AES_EVP(128, ofb, OFB) | 
					
						
							|  |  |  | DECLARE_AES_EVP(128, ctr, CTR) | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-12-19 00:05:57 +08:00
										 |  |  | DECLARE_AES_EVP(192, ecb, ECB) | 
					
						
							|  |  |  | DECLARE_AES_EVP(192, cbc, CBC) | 
					
						
							|  |  |  | DECLARE_AES_EVP(192, cfb, CFB) | 
					
						
							|  |  |  | DECLARE_AES_EVP(192, ofb, OFB) | 
					
						
							|  |  |  | DECLARE_AES_EVP(192, ctr, CTR) | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-12-19 00:05:57 +08:00
										 |  |  | DECLARE_AES_EVP(256, ecb, ECB) | 
					
						
							|  |  |  | DECLARE_AES_EVP(256, cbc, CBC) | 
					
						
							|  |  |  | DECLARE_AES_EVP(256, cfb, CFB) | 
					
						
							|  |  |  | DECLARE_AES_EVP(256, ofb, OFB) | 
					
						
							|  |  |  | DECLARE_AES_EVP(256, ctr, CTR) | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | static int | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | padlock_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, | 
					
						
							|  |  |  |                 int nid) | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | { | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     /* No specific cipher => return a list of supported nids ... */ | 
					
						
							|  |  |  |     if (!cipher) { | 
					
						
							|  |  |  |         *nids = padlock_cipher_nids; | 
					
						
							|  |  |  |         return padlock_cipher_nids_num; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     /* ... or the requested "cipher" otherwise */ | 
					
						
							|  |  |  |     switch (nid) { | 
					
						
							|  |  |  |     case NID_aes_128_ecb: | 
					
						
							| 
									
										
										
										
											2015-12-19 00:05:57 +08:00
										 |  |  |         *cipher = padlock_aes_128_ecb(); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         break; | 
					
						
							|  |  |  |     case NID_aes_128_cbc: | 
					
						
							| 
									
										
										
										
											2015-12-19 00:05:57 +08:00
										 |  |  |         *cipher = padlock_aes_128_cbc(); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         break; | 
					
						
							|  |  |  |     case NID_aes_128_cfb: | 
					
						
							| 
									
										
										
										
											2015-12-19 00:05:57 +08:00
										 |  |  |         *cipher = padlock_aes_128_cfb(); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         break; | 
					
						
							|  |  |  |     case NID_aes_128_ofb: | 
					
						
							| 
									
										
										
										
											2015-12-19 00:05:57 +08:00
										 |  |  |         *cipher = padlock_aes_128_ofb(); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         break; | 
					
						
							|  |  |  |     case NID_aes_128_ctr: | 
					
						
							| 
									
										
										
										
											2015-12-19 00:05:57 +08:00
										 |  |  |         *cipher = padlock_aes_128_ctr(); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         break; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     case NID_aes_192_ecb: | 
					
						
							| 
									
										
										
										
											2015-12-19 00:05:57 +08:00
										 |  |  |         *cipher = padlock_aes_192_ecb(); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         break; | 
					
						
							|  |  |  |     case NID_aes_192_cbc: | 
					
						
							| 
									
										
										
										
											2015-12-19 00:05:57 +08:00
										 |  |  |         *cipher = padlock_aes_192_cbc(); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         break; | 
					
						
							|  |  |  |     case NID_aes_192_cfb: | 
					
						
							| 
									
										
										
										
											2015-12-19 00:05:57 +08:00
										 |  |  |         *cipher = padlock_aes_192_cfb(); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         break; | 
					
						
							|  |  |  |     case NID_aes_192_ofb: | 
					
						
							| 
									
										
										
										
											2015-12-19 00:05:57 +08:00
										 |  |  |         *cipher = padlock_aes_192_ofb(); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         break; | 
					
						
							|  |  |  |     case NID_aes_192_ctr: | 
					
						
							| 
									
										
										
										
											2015-12-19 00:05:57 +08:00
										 |  |  |         *cipher = padlock_aes_192_ctr(); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         break; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     case NID_aes_256_ecb: | 
					
						
							| 
									
										
										
										
											2015-12-19 00:05:57 +08:00
										 |  |  |         *cipher = padlock_aes_256_ecb(); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         break; | 
					
						
							|  |  |  |     case NID_aes_256_cbc: | 
					
						
							| 
									
										
										
										
											2015-12-19 00:05:57 +08:00
										 |  |  |         *cipher = padlock_aes_256_cbc(); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         break; | 
					
						
							|  |  |  |     case NID_aes_256_cfb: | 
					
						
							| 
									
										
										
										
											2015-12-19 00:05:57 +08:00
										 |  |  |         *cipher = padlock_aes_256_cfb(); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         break; | 
					
						
							|  |  |  |     case NID_aes_256_ofb: | 
					
						
							| 
									
										
										
										
											2015-12-19 00:05:57 +08:00
										 |  |  |         *cipher = padlock_aes_256_ofb(); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         break; | 
					
						
							|  |  |  |     case NID_aes_256_ctr: | 
					
						
							| 
									
										
										
										
											2015-12-19 00:05:57 +08:00
										 |  |  |         *cipher = padlock_aes_256_ctr(); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         break; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     default: | 
					
						
							|  |  |  |         /* Sorry, we don't support this NID */ | 
					
						
							|  |  |  |         *cipher = NULL; | 
					
						
							|  |  |  |         return 0; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     return 1; | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /* Prepare the encryption key for PadLock usage */ | 
					
						
							|  |  |  | static int | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | padlock_aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 
					
						
							|  |  |  |                      const unsigned char *iv, int enc) | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | { | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     struct padlock_cipher_data *cdata; | 
					
						
							| 
									
										
										
											
												Rename all getters to use get/get0 in name
For functions that exist in 1.1.1 provide a simple aliases via #define.
Fixes #15236
Functions with OSSL_DECODER_, OSSL_ENCODER_, OSSL_STORE_LOADER_,
EVP_KEYEXCH_, EVP_KEM_, EVP_ASYM_CIPHER_, EVP_SIGNATURE_,
EVP_KEYMGMT_, EVP_RAND_, EVP_MAC_, EVP_KDF_, EVP_PKEY_,
EVP_MD_, and EVP_CIPHER_ prefixes are renamed.
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/15405)
											
										 
											2021-05-21 22:58:08 +08:00
										 |  |  |     int key_len = EVP_CIPHER_CTX_get_key_length(ctx) * 8; | 
					
						
							|  |  |  |     unsigned long mode = EVP_CIPHER_CTX_get_mode(ctx); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  |     if (key == NULL) | 
					
						
							|  |  |  |         return 0;               /* ERROR */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     cdata = ALIGNED_CIPHER_DATA(ctx); | 
					
						
							| 
									
										
										
										
											2015-05-05 06:00:15 +08:00
										 |  |  |     memset(cdata, 0, sizeof(*cdata)); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  |     /* Prepare Control word. */ | 
					
						
							|  |  |  |     if (mode == EVP_CIPH_OFB_MODE || mode == EVP_CIPH_CTR_MODE) | 
					
						
							|  |  |  |         cdata->cword.b.encdec = 0; | 
					
						
							|  |  |  |     else | 
					
						
							| 
									
										
										
											
												Rename all getters to use get/get0 in name
For functions that exist in 1.1.1 provide a simple aliases via #define.
Fixes #15236
Functions with OSSL_DECODER_, OSSL_ENCODER_, OSSL_STORE_LOADER_,
EVP_KEYEXCH_, EVP_KEM_, EVP_ASYM_CIPHER_, EVP_SIGNATURE_,
EVP_KEYMGMT_, EVP_RAND_, EVP_MAC_, EVP_KDF_, EVP_PKEY_,
EVP_MD_, and EVP_CIPHER_ prefixes are renamed.
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/15405)
											
										 
											2021-05-21 22:58:08 +08:00
										 |  |  |         cdata->cword.b.encdec = (EVP_CIPHER_CTX_is_encrypting(ctx) == 0); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     cdata->cword.b.rounds = 10 + (key_len - 128) / 32; | 
					
						
							|  |  |  |     cdata->cword.b.ksize = (key_len - 128) / 64; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     switch (key_len) { | 
					
						
							|  |  |  |     case 128: | 
					
						
							|  |  |  |         /*
 | 
					
						
							|  |  |  |          * PadLock can generate an extended key for AES128 in hardware | 
					
						
							|  |  |  |          */ | 
					
						
							|  |  |  |         memcpy(cdata->ks.rd_key, key, AES_KEY_SIZE_128); | 
					
						
							|  |  |  |         cdata->cword.b.keygen = 0; | 
					
						
							|  |  |  |         break; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     case 192: | 
					
						
							|  |  |  |     case 256: | 
					
						
							|  |  |  |         /*
 | 
					
						
							|  |  |  |          * Generate an extended AES key in software. Needed for AES192/AES256 | 
					
						
							|  |  |  |          */ | 
					
						
							|  |  |  |         /*
 | 
					
						
							|  |  |  |          * Well, the above applies to Stepping 8 CPUs and is listed as | 
					
						
							|  |  |  |          * hardware errata. They most likely will fix it at some point and | 
					
						
							|  |  |  |          * then a check for stepping would be due here. | 
					
						
							|  |  |  |          */ | 
					
						
							|  |  |  |         if ((mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE) | 
					
						
							|  |  |  |             && !enc) | 
					
						
							|  |  |  |             AES_set_decrypt_key(key, key_len, &cdata->ks); | 
					
						
							|  |  |  |         else | 
					
						
							|  |  |  |             AES_set_encrypt_key(key, key_len, &cdata->ks); | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #  ifndef AES_ASM
 | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         /*
 | 
					
						
							|  |  |  |          * OpenSSL C functions use byte-swapped extended key. | 
					
						
							|  |  |  |          */ | 
					
						
							|  |  |  |         padlock_key_bswap(&cdata->ks); | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #  endif
 | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |         cdata->cword.b.keygen = 1; | 
					
						
							|  |  |  |         break; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     default: | 
					
						
							|  |  |  |         /* ERROR */ | 
					
						
							|  |  |  |         return 0; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     /*
 | 
					
						
							|  |  |  |      * This is done to cover for cases when user reuses the | 
					
						
							|  |  |  |      * context for new key. The catch is that if we don't do | 
					
						
							|  |  |  |      * this, padlock_eas_cipher might proceed with old key... | 
					
						
							|  |  |  |      */ | 
					
						
							|  |  |  |     padlock_reload_key(); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     return 1; | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /* ===== Random Number Generator ===== */ | 
					
						
							|  |  |  | /*
 | 
					
						
							|  |  |  |  * This code is not engaged. The reason is that it does not comply | 
					
						
							|  |  |  |  * with recommendations for VIA RNG usage for secure applications | 
					
						
							|  |  |  |  * (posted at http://www.via.com.tw/en/viac3/c3.jsp) nor does it
 | 
					
						
							|  |  |  |  * provide meaningful error control... | 
					
						
							|  |  |  |  */ | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | /*
 | 
					
						
							|  |  |  |  * Wrapper that provides an interface between the API and the raw PadLock | 
					
						
							|  |  |  |  * RNG | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | static int padlock_rand_bytes(unsigned char *output, int count) | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | { | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     unsigned int eax, buf; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     while (count >= 8) { | 
					
						
							|  |  |  |         eax = padlock_xstore(output, 0); | 
					
						
							|  |  |  |         if (!(eax & (1 << 6))) | 
					
						
							|  |  |  |             return 0;           /* RNG disabled */ | 
					
						
							|  |  |  |         /* this ---vv--- covers DC bias, Raw Bits and String Filter */ | 
					
						
							|  |  |  |         if (eax & (0x1F << 10)) | 
					
						
							|  |  |  |             return 0; | 
					
						
							|  |  |  |         if ((eax & 0x1F) == 0) | 
					
						
							|  |  |  |             continue;           /* no data, retry... */ | 
					
						
							|  |  |  |         if ((eax & 0x1F) != 8) | 
					
						
							|  |  |  |             return 0;           /* fatal failure...  */ | 
					
						
							|  |  |  |         output += 8; | 
					
						
							|  |  |  |         count -= 8; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     while (count > 0) { | 
					
						
							|  |  |  |         eax = padlock_xstore(&buf, 3); | 
					
						
							|  |  |  |         if (!(eax & (1 << 6))) | 
					
						
							|  |  |  |             return 0;           /* RNG disabled */ | 
					
						
							|  |  |  |         /* this ---vv--- covers DC bias, Raw Bits and String Filter */ | 
					
						
							|  |  |  |         if (eax & (0x1F << 10)) | 
					
						
							|  |  |  |             return 0; | 
					
						
							|  |  |  |         if ((eax & 0x1F) == 0) | 
					
						
							|  |  |  |             continue;           /* no data, retry... */ | 
					
						
							|  |  |  |         if ((eax & 0x1F) != 1) | 
					
						
							|  |  |  |             return 0;           /* fatal failure...  */ | 
					
						
							|  |  |  |         *output++ = (unsigned char)buf; | 
					
						
							|  |  |  |         count--; | 
					
						
							|  |  |  |     } | 
					
						
							| 
									
										
										
										
											2016-04-04 22:55:12 +08:00
										 |  |  |     OPENSSL_cleanse(&buf, sizeof(buf)); | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  |     return 1; | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /* Dummy but necessary function */ | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | static int padlock_rand_status(void) | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | { | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     return 1; | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /* Prepare structure for registration */ | 
					
						
							|  |  |  | static RAND_METHOD padlock_rand = { | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     NULL,                       /* seed */ | 
					
						
							|  |  |  |     padlock_rand_bytes,         /* bytes */ | 
					
						
							|  |  |  |     NULL,                       /* cleanup */ | 
					
						
							|  |  |  |     NULL,                       /* add */ | 
					
						
							|  |  |  |     padlock_rand_bytes,         /* pseudorand */ | 
					
						
							|  |  |  |     padlock_rand_status,        /* rand status */ | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | }; | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | # endif                        /* COMPILE_PADLOCKENG */
 | 
					
						
							|  |  |  | #endif                         /* !OPENSSL_NO_PADLOCKENG */
 | 
					
						
							| 
									
										
										
										
											2016-03-17 20:20:56 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-01 20:18:11 +08:00
										 |  |  | #if defined(OPENSSL_NO_PADLOCKENG) || !defined(COMPILE_PADLOCKENG)
 | 
					
						
							| 
									
										
										
										
											2016-03-17 20:20:56 +08:00
										 |  |  | # ifndef OPENSSL_NO_DYNAMIC_ENGINE
 | 
					
						
							| 
									
										
										
										
											2009-05-06 21:55:40 +08:00
										 |  |  | OPENSSL_EXPORT | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     int bind_engine(ENGINE *e, const char *id, const dynamic_fns *fns); | 
					
						
							| 
									
										
										
										
											2011-01-30 09:30:48 +08:00
										 |  |  | OPENSSL_EXPORT | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  |     int bind_engine(ENGINE *e, const char *id, const dynamic_fns *fns) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     return 0; | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2004-08-03 05:48:11 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-01-22 11:40:55 +08:00
										 |  |  | IMPLEMENT_DYNAMIC_CHECK_FN() | 
					
						
							| 
									
										
										
										
											2016-03-17 20:20:56 +08:00
										 |  |  | # endif
 | 
					
						
							|  |  |  | #endif
 |