xref: /openbsd-src/lib/libcrypto/evp/p_legacy.c (revision 68dd5bb1859285b71cb62a10bf107b8ad54064d9)
1 /*	$OpenBSD: p_legacy.c,v 1.2 2023/12/20 13:52:17 tb Exp $ */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  *
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  *
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  *
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  *
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  *
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 
59 #include <stdlib.h>
60 
61 #include <openssl/evp.h>
62 #include <openssl/err.h>
63 
64 #include <openssl/rsa.h>
65 
66 #include "evp_local.h"
67 
68 int
69 EVP_PKEY_decrypt_old(unsigned char *to, const unsigned char *from, int from_len,
70     EVP_PKEY *pkey)
71 {
72 	if (pkey->type != EVP_PKEY_RSA) {
73 		EVPerror(EVP_R_PUBLIC_KEY_NOT_RSA);
74 		return -1;
75 	}
76 
77 	return RSA_private_decrypt(from_len, from, to, pkey->pkey.rsa,
78 	    RSA_PKCS1_PADDING);
79 }
80 
81 int
82 EVP_PKEY_encrypt_old(unsigned char *to, const unsigned char *from, int from_len,
83     EVP_PKEY *pkey)
84 {
85 	if (pkey->type != EVP_PKEY_RSA) {
86 		EVPerror(EVP_R_PUBLIC_KEY_NOT_RSA);
87 		return 0;
88 	}
89 
90 	return RSA_public_encrypt(from_len, from, to, pkey->pkey.rsa,
91 	    RSA_PKCS1_PADDING);
92 }
93 
94 int
95 EVP_OpenInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type,
96     const unsigned char *ek, int ekl, const unsigned char *iv, EVP_PKEY *priv)
97 {
98 	unsigned char *key = NULL;
99 	int i, size = 0, ret = 0;
100 
101 	if (type) {
102 		EVP_CIPHER_CTX_init(ctx);
103 		if (!EVP_DecryptInit_ex(ctx, type, NULL, NULL, NULL))
104 			return 0;
105 	}
106 
107 	if (!priv)
108 		return 1;
109 
110 	if (priv->type != EVP_PKEY_RSA) {
111 		EVPerror(EVP_R_PUBLIC_KEY_NOT_RSA);
112 		goto err;
113 	}
114 
115 	size = RSA_size(priv->pkey.rsa);
116 	key = malloc(size + 2);
117 	if (key == NULL) {
118 		/* ERROR */
119 		EVPerror(ERR_R_MALLOC_FAILURE);
120 		goto err;
121 	}
122 
123 	i = EVP_PKEY_decrypt_old(key, ek, ekl, priv);
124 	if ((i <= 0) || !EVP_CIPHER_CTX_set_key_length(ctx, i)) {
125 		/* ERROR */
126 		goto err;
127 	}
128 	if (!EVP_DecryptInit_ex(ctx, NULL, NULL, key, iv))
129 		goto err;
130 
131 	ret = 1;
132 
133 err:
134 	freezero(key, size);
135 	return (ret);
136 }
137 
138 int
139 EVP_OpenFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
140 {
141 	int i;
142 
143 	i = EVP_DecryptFinal_ex(ctx, out, outl);
144 	if (i)
145 		i = EVP_DecryptInit_ex(ctx, NULL, NULL, NULL, NULL);
146 	return (i);
147 }
148 
149 int
150 EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, unsigned char **ek,
151     int *ekl, unsigned char *iv, EVP_PKEY **pubk, int npubk)
152 {
153 	unsigned char key[EVP_MAX_KEY_LENGTH];
154 	int i, iv_len;
155 
156 	if (type) {
157 		EVP_CIPHER_CTX_init(ctx);
158 		if (!EVP_EncryptInit_ex(ctx, type, NULL, NULL, NULL))
159 			return 0;
160 	}
161 	if ((npubk <= 0) || !pubk)
162 		return 1;
163 	if (EVP_CIPHER_CTX_rand_key(ctx, key) <= 0)
164 		return 0;
165 	/* XXX - upper bound? */
166 	if ((iv_len = EVP_CIPHER_CTX_iv_length(ctx)) < 0)
167 		return 0;
168 	if (iv_len > 0)
169 		arc4random_buf(iv, iv_len);
170 
171 	if (!EVP_EncryptInit_ex(ctx, NULL, NULL, key, iv))
172 		return 0;
173 
174 	for (i = 0; i < npubk; i++) {
175 		ekl[i] = EVP_PKEY_encrypt_old(ek[i], key,
176 		    EVP_CIPHER_CTX_key_length(ctx), pubk[i]);
177 		if (ekl[i] <= 0)
178 			return (-1);
179 	}
180 	return (npubk);
181 }
182 
183 int
184 EVP_SealFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
185 {
186 	int i;
187 
188 	i = EVP_EncryptFinal_ex(ctx, out, outl);
189 	if (i)
190 		i = EVP_EncryptInit_ex(ctx, NULL, NULL, NULL, NULL);
191 	return i;
192 }
193