mirror of
https://github.com/openssl/openssl.git
synced 2024-11-30 21:44:16 +08:00
9311d0c471
This includes error reporting for libcrypto sub-libraries in surprising places. This was done using util/err-to-raise Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/13318)
197 lines
5.7 KiB
C
197 lines
5.7 KiB
C
/*
|
|
* Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <openssl/evp.h>
|
|
#include <openssl/err.h>
|
|
#include <openssl/core.h>
|
|
#include <openssl/core_dispatch.h>
|
|
#include <openssl/kdf.h>
|
|
#include "crypto/evp.h"
|
|
#include "internal/provider.h"
|
|
#include "evp_local.h"
|
|
|
|
static int evp_kdf_up_ref(void *vkdf)
|
|
{
|
|
EVP_KDF *kdf = (EVP_KDF *)vkdf;
|
|
int ref = 0;
|
|
|
|
CRYPTO_UP_REF(&kdf->refcnt, &ref, kdf->lock);
|
|
return 1;
|
|
}
|
|
|
|
static void evp_kdf_free(void *vkdf){
|
|
EVP_KDF *kdf = (EVP_KDF *)vkdf;
|
|
int ref = 0;
|
|
|
|
if (kdf != NULL) {
|
|
CRYPTO_DOWN_REF(&kdf->refcnt, &ref, kdf->lock);
|
|
if (ref <= 0) {
|
|
ossl_provider_free(kdf->prov);
|
|
CRYPTO_THREAD_lock_free(kdf->lock);
|
|
OPENSSL_free(kdf);
|
|
}
|
|
}
|
|
}
|
|
|
|
static void *evp_kdf_new(void)
|
|
{
|
|
EVP_KDF *kdf = NULL;
|
|
|
|
if ((kdf = OPENSSL_zalloc(sizeof(*kdf))) == NULL
|
|
|| (kdf->lock = CRYPTO_THREAD_lock_new()) == NULL) {
|
|
OPENSSL_free(kdf);
|
|
return NULL;
|
|
}
|
|
kdf->refcnt = 1;
|
|
return kdf;
|
|
}
|
|
|
|
static void *evp_kdf_from_dispatch(int name_id,
|
|
const OSSL_DISPATCH *fns,
|
|
OSSL_PROVIDER *prov)
|
|
{
|
|
EVP_KDF *kdf = NULL;
|
|
int fnkdfcnt = 0, fnctxcnt = 0;
|
|
|
|
if ((kdf = evp_kdf_new()) == NULL) {
|
|
ERR_raise(ERR_LIB_EVP, ERR_R_MALLOC_FAILURE);
|
|
return NULL;
|
|
}
|
|
kdf->name_id = name_id;
|
|
|
|
for (; fns->function_id != 0; fns++) {
|
|
switch (fns->function_id) {
|
|
case OSSL_FUNC_KDF_NEWCTX:
|
|
if (kdf->newctx != NULL)
|
|
break;
|
|
kdf->newctx = OSSL_FUNC_kdf_newctx(fns);
|
|
fnctxcnt++;
|
|
break;
|
|
case OSSL_FUNC_KDF_DUPCTX:
|
|
if (kdf->dupctx != NULL)
|
|
break;
|
|
kdf->dupctx = OSSL_FUNC_kdf_dupctx(fns);
|
|
break;
|
|
case OSSL_FUNC_KDF_FREECTX:
|
|
if (kdf->freectx != NULL)
|
|
break;
|
|
kdf->freectx = OSSL_FUNC_kdf_freectx(fns);
|
|
fnctxcnt++;
|
|
break;
|
|
case OSSL_FUNC_KDF_RESET:
|
|
if (kdf->reset != NULL)
|
|
break;
|
|
kdf->reset = OSSL_FUNC_kdf_reset(fns);
|
|
break;
|
|
case OSSL_FUNC_KDF_DERIVE:
|
|
if (kdf->derive != NULL)
|
|
break;
|
|
kdf->derive = OSSL_FUNC_kdf_derive(fns);
|
|
fnkdfcnt++;
|
|
break;
|
|
case OSSL_FUNC_KDF_GETTABLE_PARAMS:
|
|
if (kdf->gettable_params != NULL)
|
|
break;
|
|
kdf->gettable_params =
|
|
OSSL_FUNC_kdf_gettable_params(fns);
|
|
break;
|
|
case OSSL_FUNC_KDF_GETTABLE_CTX_PARAMS:
|
|
if (kdf->gettable_ctx_params != NULL)
|
|
break;
|
|
kdf->gettable_ctx_params =
|
|
OSSL_FUNC_kdf_gettable_ctx_params(fns);
|
|
break;
|
|
case OSSL_FUNC_KDF_SETTABLE_CTX_PARAMS:
|
|
if (kdf->settable_ctx_params != NULL)
|
|
break;
|
|
kdf->settable_ctx_params =
|
|
OSSL_FUNC_kdf_settable_ctx_params(fns);
|
|
break;
|
|
case OSSL_FUNC_KDF_GET_PARAMS:
|
|
if (kdf->get_params != NULL)
|
|
break;
|
|
kdf->get_params = OSSL_FUNC_kdf_get_params(fns);
|
|
break;
|
|
case OSSL_FUNC_KDF_GET_CTX_PARAMS:
|
|
if (kdf->get_ctx_params != NULL)
|
|
break;
|
|
kdf->get_ctx_params = OSSL_FUNC_kdf_get_ctx_params(fns);
|
|
break;
|
|
case OSSL_FUNC_KDF_SET_CTX_PARAMS:
|
|
if (kdf->set_ctx_params != NULL)
|
|
break;
|
|
kdf->set_ctx_params = OSSL_FUNC_kdf_set_ctx_params(fns);
|
|
break;
|
|
}
|
|
}
|
|
if (fnkdfcnt != 1 || fnctxcnt != 2) {
|
|
/*
|
|
* In order to be a consistent set of functions we must have at least
|
|
* a derive function, and a complete set of context management
|
|
* functions.
|
|
*/
|
|
evp_kdf_free(kdf);
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_INVALID_PROVIDER_FUNCTIONS);
|
|
return NULL;
|
|
}
|
|
kdf->prov = prov;
|
|
if (prov != NULL)
|
|
ossl_provider_up_ref(prov);
|
|
|
|
return kdf;
|
|
}
|
|
|
|
EVP_KDF *EVP_KDF_fetch(OSSL_LIB_CTX *libctx, const char *algorithm,
|
|
const char *properties)
|
|
{
|
|
return evp_generic_fetch(libctx, OSSL_OP_KDF, algorithm, properties,
|
|
evp_kdf_from_dispatch, evp_kdf_up_ref,
|
|
evp_kdf_free);
|
|
}
|
|
|
|
int EVP_KDF_up_ref(EVP_KDF *kdf)
|
|
{
|
|
return evp_kdf_up_ref(kdf);
|
|
}
|
|
|
|
void EVP_KDF_free(EVP_KDF *kdf)
|
|
{
|
|
evp_kdf_free(kdf);
|
|
}
|
|
|
|
const OSSL_PARAM *EVP_KDF_gettable_params(const EVP_KDF *kdf)
|
|
{
|
|
if (kdf->gettable_params == NULL)
|
|
return NULL;
|
|
return kdf->gettable_params(ossl_provider_ctx(EVP_KDF_provider(kdf)));
|
|
}
|
|
|
|
const OSSL_PARAM *EVP_KDF_gettable_ctx_params(const EVP_KDF *kdf)
|
|
{
|
|
if (kdf->gettable_ctx_params == NULL)
|
|
return NULL;
|
|
return kdf->gettable_ctx_params(ossl_provider_ctx(EVP_KDF_provider(kdf)));
|
|
}
|
|
|
|
const OSSL_PARAM *EVP_KDF_settable_ctx_params(const EVP_KDF *kdf)
|
|
{
|
|
if (kdf->settable_ctx_params == NULL)
|
|
return NULL;
|
|
return kdf->settable_ctx_params(ossl_provider_ctx(EVP_KDF_provider(kdf)));
|
|
}
|
|
|
|
void EVP_KDF_do_all_provided(OSSL_LIB_CTX *libctx,
|
|
void (*fn)(EVP_KDF *kdf, void *arg),
|
|
void *arg)
|
|
{
|
|
evp_generic_do_all(libctx, OSSL_OP_KDF,
|
|
(void (*)(void *, void *))fn, arg,
|
|
evp_kdf_from_dispatch, evp_kdf_free);
|
|
}
|