Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 1 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 2 | * All rights reserved. |
| 3 | * |
| 4 | * This package is an SSL implementation written |
| 5 | * by Eric Young (eay@cryptsoft.com). |
| 6 | * The implementation was written so as to conform with Netscapes SSL. |
| 7 | * |
| 8 | * This library is free for commercial and non-commercial use as long as |
| 9 | * the following conditions are aheared to. The following conditions |
| 10 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 11 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 12 | * included with this distribution is covered by the same copyright terms |
| 13 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 14 | * |
| 15 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 16 | * the code are not to be removed. |
| 17 | * If this package is used in a product, Eric Young should be given attribution |
| 18 | * as the author of the parts of the library used. |
| 19 | * This can be in the form of a textual message at program startup or |
| 20 | * in documentation (online or textual) provided with the package. |
| 21 | * |
| 22 | * Redistribution and use in source and binary forms, with or without |
| 23 | * modification, are permitted provided that the following conditions |
| 24 | * are met: |
| 25 | * 1. Redistributions of source code must retain the copyright |
| 26 | * notice, this list of conditions and the following disclaimer. |
| 27 | * 2. Redistributions in binary form must reproduce the above copyright |
| 28 | * notice, this list of conditions and the following disclaimer in the |
| 29 | * documentation and/or other materials provided with the distribution. |
| 30 | * 3. All advertising materials mentioning features or use of this software |
| 31 | * must display the following acknowledgement: |
| 32 | * "This product includes cryptographic software written by |
| 33 | * Eric Young (eay@cryptsoft.com)" |
| 34 | * The word 'cryptographic' can be left out if the rouines from the library |
| 35 | * being used are not cryptographic related :-). |
| 36 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 37 | * the apps directory (application code) you must include an acknowledgement: |
| 38 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 39 | * |
| 40 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 41 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 42 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| 43 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE |
| 44 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
| 45 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
| 46 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| 47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
| 48 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 49 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 50 | * SUCH DAMAGE. |
| 51 | * |
| 52 | * The licence and distribution terms for any publically available version or |
| 53 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 54 | * copied and put under another distribution licence |
| 55 | * [including the GNU Public Licence.] */ |
| 56 | |
| 57 | #ifndef OPENSSL_HEADER_CIPHER_INTERNAL_H |
| 58 | #define OPENSSL_HEADER_CIPHER_INTERNAL_H |
| 59 | |
| 60 | #include <openssl/base.h> |
| 61 | |
David Benjamin | b34f510 | 2015-02-28 03:59:33 -0500 | [diff] [blame] | 62 | #include <openssl/aead.h> |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 63 | |
| 64 | #if defined(__cplusplus) |
| 65 | extern "C" { |
| 66 | #endif |
| 67 | |
| 68 | |
| 69 | struct evp_cipher_st { |
Brian Smith | 7d897a1 | 2015-03-16 01:19:32 -1000 | [diff] [blame] | 70 | /* type contains a NID identifing the cipher. (e.g. NID_aes_128_gcm.) */ |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 71 | int nid; |
| 72 | |
| 73 | /* block_size contains the block size, in bytes, of the cipher, or 1 for a |
| 74 | * stream cipher. */ |
| 75 | unsigned block_size; |
| 76 | |
| 77 | /* key_len contains the key size, in bytes, for the cipher. If the cipher |
| 78 | * takes a variable key size then this contains the default size. */ |
| 79 | unsigned key_len; |
| 80 | |
| 81 | /* iv_len contains the IV size, in bytes, or zero if inapplicable. */ |
| 82 | unsigned iv_len; |
| 83 | |
| 84 | /* ctx_size contains the size, in bytes, of the per-key context for this |
| 85 | * cipher. */ |
| 86 | unsigned ctx_size; |
| 87 | |
| 88 | /* flags contains the OR of a number of flags. See |EVP_CIPH_*|. */ |
| 89 | uint32_t flags; |
| 90 | |
| 91 | /* app_data is a pointer to opaque, user data. */ |
| 92 | void *app_data; |
| 93 | |
| 94 | int (*init)(EVP_CIPHER_CTX *ctx, const uint8_t *key, const uint8_t *iv, |
| 95 | int enc); |
| 96 | |
| 97 | int (*cipher)(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, |
| 98 | size_t inl); |
| 99 | |
David Benjamin | 3f5917f | 2015-02-23 02:15:50 -0500 | [diff] [blame] | 100 | void (*cleanup)(EVP_CIPHER_CTX *); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 101 | |
| 102 | int (*ctrl)(EVP_CIPHER_CTX *, int type, int arg, void *ptr); |
| 103 | }; |
| 104 | |
| 105 | /* EVP_CIPH_MODE_MASK contains the bits of |flags| that represent the mode. */ |
| 106 | #define EVP_CIPH_MODE_MASK 0x3f |
| 107 | |
| 108 | |
Adam Langley | fd772a5 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 109 | struct evp_aead_ctx_st; |
| 110 | |
| 111 | /* EVP_AEAD represents a specific AEAD algorithm. */ |
| 112 | struct evp_aead_st { |
| 113 | uint8_t key_len; |
| 114 | uint8_t nonce_len; |
| 115 | uint8_t overhead; |
| 116 | uint8_t max_tag_len; |
| 117 | |
| 118 | int (*init)(struct evp_aead_ctx_st *, const uint8_t *key, |
| 119 | size_t key_len, size_t tag_len); |
David Benjamin | b34f510 | 2015-02-28 03:59:33 -0500 | [diff] [blame] | 120 | int (*init_with_direction)(struct evp_aead_ctx_st *, const uint8_t *key, |
| 121 | size_t key_len, size_t tag_len, |
| 122 | enum evp_aead_direction_t dir); |
Adam Langley | fd772a5 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 123 | void (*cleanup)(struct evp_aead_ctx_st *); |
| 124 | |
| 125 | int (*seal)(const struct evp_aead_ctx_st *ctx, uint8_t *out, |
| 126 | size_t *out_len, size_t max_out_len, const uint8_t *nonce, |
| 127 | size_t nonce_len, const uint8_t *in, size_t in_len, |
| 128 | const uint8_t *ad, size_t ad_len); |
| 129 | |
| 130 | int (*open)(const struct evp_aead_ctx_st *ctx, uint8_t *out, |
| 131 | size_t *out_len, size_t max_out_len, const uint8_t *nonce, |
| 132 | size_t nonce_len, const uint8_t *in, size_t in_len, |
| 133 | const uint8_t *ad, size_t ad_len); |
Adam Langley | 3f92d21 | 2015-02-20 15:32:52 -0800 | [diff] [blame] | 134 | |
| 135 | int (*get_rc4_state)(const struct evp_aead_ctx_st *ctx, |
| 136 | const RC4_KEY **out_key); |
Adam Langley | fd772a5 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 137 | }; |
| 138 | |
David Benjamin | df109ab | 2014-12-20 11:13:41 -0500 | [diff] [blame] | 139 | |
David Benjamin | bbd8444 | 2014-12-22 07:23:54 -0500 | [diff] [blame] | 140 | /* EVP_tls_cbc_get_padding determines the padding from the decrypted, TLS, CBC |
David Benjamin | df109ab | 2014-12-20 11:13:41 -0500 | [diff] [blame] | 141 | * record in |in|. This decrypted record should not include any "decrypted" |
| 142 | * explicit IV. It sets |*out_len| to the length with the padding removed or |
| 143 | * |in_len| if invalid. |
| 144 | * |
| 145 | * block_size: the block size of the cipher used to encrypt the record. |
| 146 | * returns: |
| 147 | * 0: (in non-constant time) if the record is publicly invalid. |
| 148 | * 1: if the padding was valid |
| 149 | * -1: otherwise. */ |
David Benjamin | bbd8444 | 2014-12-22 07:23:54 -0500 | [diff] [blame] | 150 | int EVP_tls_cbc_remove_padding(unsigned *out_len, |
| 151 | const uint8_t *in, unsigned in_len, |
| 152 | unsigned block_size, unsigned mac_size); |
David Benjamin | df109ab | 2014-12-20 11:13:41 -0500 | [diff] [blame] | 153 | |
David Benjamin | bbd8444 | 2014-12-22 07:23:54 -0500 | [diff] [blame] | 154 | /* EVP_tls_cbc_copy_mac copies |md_size| bytes from the end of the first |
David Benjamin | df109ab | 2014-12-20 11:13:41 -0500 | [diff] [blame] | 155 | * |in_len| bytes of |in| to |out| in constant time (independent of the concrete |
| 156 | * value of |in_len|, which may vary within a 256-byte window). |in| must point |
| 157 | * to a buffer of |orig_len| bytes. |
| 158 | * |
| 159 | * On entry: |
| 160 | * orig_len >= in_len >= md_size |
| 161 | * md_size <= EVP_MAX_MD_SIZE */ |
David Benjamin | bbd8444 | 2014-12-22 07:23:54 -0500 | [diff] [blame] | 162 | void EVP_tls_cbc_copy_mac(uint8_t *out, unsigned md_size, |
| 163 | const uint8_t *in, unsigned in_len, |
| 164 | unsigned orig_len); |
David Benjamin | df109ab | 2014-12-20 11:13:41 -0500 | [diff] [blame] | 165 | |
David Benjamin | bbd8444 | 2014-12-22 07:23:54 -0500 | [diff] [blame] | 166 | /* EVP_tls_cbc_record_digest_supported returns 1 iff |md| is a hash function |
| 167 | * which EVP_tls_cbc_digest_record supports. */ |
| 168 | int EVP_tls_cbc_record_digest_supported(const EVP_MD *md); |
David Benjamin | df109ab | 2014-12-20 11:13:41 -0500 | [diff] [blame] | 169 | |
David Benjamin | bbd8444 | 2014-12-22 07:23:54 -0500 | [diff] [blame] | 170 | /* EVP_tls_cbc_digest_record computes the MAC of a decrypted, padded TLS |
David Benjamin | df109ab | 2014-12-20 11:13:41 -0500 | [diff] [blame] | 171 | * record. |
| 172 | * |
David Benjamin | bbd8444 | 2014-12-22 07:23:54 -0500 | [diff] [blame] | 173 | * md: the hash function used in the HMAC. |
David Benjamin | 7f1d5d5 | 2015-01-14 17:24:53 -0500 | [diff] [blame] | 174 | * EVP_tls_cbc_record_digest_supported must return true for this hash. |
David Benjamin | df109ab | 2014-12-20 11:13:41 -0500 | [diff] [blame] | 175 | * md_out: the digest output. At most EVP_MAX_MD_SIZE bytes will be written. |
| 176 | * md_out_size: the number of output bytes is written here. |
| 177 | * header: the 13-byte, TLS record header. |
| 178 | * data: the record data itself |
| 179 | * data_plus_mac_size: the secret, reported length of the data and MAC |
| 180 | * once the padding has been removed. |
| 181 | * data_plus_mac_plus_padding_size: the public length of the whole |
| 182 | * record, including padding. |
David Benjamin | df109ab | 2014-12-20 11:13:41 -0500 | [diff] [blame] | 183 | * |
| 184 | * On entry: by virtue of having been through one of the remove_padding |
| 185 | * functions, above, we know that data_plus_mac_size is large enough to contain |
| 186 | * a padding byte and MAC. (If the padding was invalid, it might contain the |
| 187 | * padding too. ) */ |
David Benjamin | bbd8444 | 2014-12-22 07:23:54 -0500 | [diff] [blame] | 188 | int EVP_tls_cbc_digest_record(const EVP_MD *md, uint8_t *md_out, |
| 189 | size_t *md_out_size, const uint8_t header[13], |
| 190 | const uint8_t *data, size_t data_plus_mac_size, |
| 191 | size_t data_plus_mac_plus_padding_size, |
| 192 | const uint8_t *mac_secret, |
| 193 | unsigned mac_secret_length); |
David Benjamin | df109ab | 2014-12-20 11:13:41 -0500 | [diff] [blame] | 194 | |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 195 | #if defined(__cplusplus) |
| 196 | } /* extern C */ |
| 197 | #endif |
| 198 | |
| 199 | #endif /* OPENSSL_HEADER_CIPHER_INTERNAL_H */ |