| /* Demo of how to construct your own engine and using it. The basis of this |
| engine is RSAref, an old reference of the RSA algorithm which can still |
| be found a little here and there. */ |
| |
| #include <stdio.h> |
| #include <string.h> |
| #include "./source/global.h" |
| #include "./source/rsaref.h" |
| #include "./source/rsa.h" |
| #include "./source/des.h" |
| #include <openssl/err.h> |
| #define OPENSSL_NO_MD2 |
| #define OPENSSL_NO_MD5 |
| #include <openssl/evp.h> |
| #include <openssl/bn.h> |
| #include <openssl/engine.h> |
| |
| #define RSAREF_LIB_NAME "rsaref engine" |
| #include "rsaref_err.c" |
| |
| /***************************************************************************** |
| *** Function declarations and global variable definitions *** |
| *****************************************************************************/ |
| |
| /***************************************************************************** |
| * Constants used when creating the ENGINE |
| **/ |
| static const char *engine_rsaref_id = "rsaref"; |
| static const char *engine_rsaref_name = "RSAref engine support"; |
| |
| /***************************************************************************** |
| * Functions to handle the engine |
| **/ |
| static int rsaref_destroy(ENGINE *e); |
| static int rsaref_init(ENGINE *e); |
| static int rsaref_finish(ENGINE *e); |
| #if 0 |
| static int rsaref_ctrl(ENGINE *e, int cmd, long i, void *p, void (*f)()); |
| #endif |
| |
| /***************************************************************************** |
| * Engine commands |
| **/ |
| static const ENGINE_CMD_DEFN rsaref_cmd_defns[] = { |
| {0, NULL, NULL, 0} |
| }; |
| |
| /***************************************************************************** |
| * RSA functions |
| **/ |
| static int rsaref_private_decrypt(int len, const unsigned char *from, |
| unsigned char *to, RSA *rsa, int padding); |
| static int rsaref_private_encrypt(int len, const unsigned char *from, |
| unsigned char *to, RSA *rsa, int padding); |
| static int rsaref_public_encrypt(int len, const unsigned char *from, |
| unsigned char *to, RSA *rsa, int padding); |
| static int rsaref_public_decrypt(int len, const unsigned char *from, |
| unsigned char *to, RSA *rsa, int padding); |
| static int bnref_mod_exp(BIGNUM *r,const BIGNUM *a,const BIGNUM *p,const BIGNUM *m, |
| BN_CTX *ctx, BN_MONT_CTX *m_ctx); |
| static int rsaref_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa); |
| |
| /***************************************************************************** |
| * Our RSA method |
| **/ |
| static RSA_METHOD rsaref_rsa = |
| { |
| "RSAref PKCS#1 RSA", |
| rsaref_public_encrypt, |
| rsaref_public_decrypt, |
| rsaref_private_encrypt, |
| rsaref_private_decrypt, |
| rsaref_mod_exp, |
| bnref_mod_exp, |
| NULL, |
| NULL, |
| 0, |
| NULL, |
| NULL, |
| NULL |
| }; |
| |
| /***************************************************************************** |
| * Symetric cipher and digest function registrars |
| **/ |
| static int rsaref_ciphers(ENGINE *e, const EVP_CIPHER **cipher, |
| const int **nids, int nid); |
| static int rsaref_digests(ENGINE *e, const EVP_MD **digest, |
| const int **nids, int nid); |
| |
| static int rsaref_cipher_nids[] = |
| { NID_des_cbc, NID_des_ede3_cbc, NID_desx_cbc, 0 }; |
| static int rsaref_digest_nids[] = |
| { NID_md2, NID_md5, 0 }; |
| |
| /***************************************************************************** |
| * DES functions |
| **/ |
| static int cipher_des_cbc_init(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| const unsigned char *iv, int enc); |
| static int cipher_des_cbc_code(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| const unsigned char *in, unsigned int inl); |
| static int cipher_des_cbc_clean(EVP_CIPHER_CTX *); |
| static int cipher_des_ede3_cbc_init(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| const unsigned char *iv, int enc); |
| static int cipher_des_ede3_cbc_code(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| const unsigned char *in, unsigned int inl); |
| static int cipher_des_ede3_cbc_clean(EVP_CIPHER_CTX *); |
| static int cipher_desx_cbc_init(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| const unsigned char *iv, int enc); |
| static int cipher_desx_cbc_code(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| const unsigned char *in, unsigned int inl); |
| static int cipher_desx_cbc_clean(EVP_CIPHER_CTX *); |
| |
| /***************************************************************************** |
| * Our DES ciphers |
| **/ |
| static const EVP_CIPHER cipher_des_cbc = |
| { |
| NID_des_cbc, |
| 8, 8, 8, |
| 0 | EVP_CIPH_CBC_MODE, |
| cipher_des_cbc_init, |
| cipher_des_cbc_code, |
| cipher_des_cbc_clean, |
| sizeof(DES_CBC_CTX), |
| NULL, |
| NULL, |
| NULL, |
| NULL |
| }; |
| |
| static const EVP_CIPHER cipher_des_ede3_cbc = |
| { |
| NID_des_ede3_cbc, |
| 8, 24, 8, |
| 0 | EVP_CIPH_CBC_MODE, |
| cipher_des_ede3_cbc_init, |
| cipher_des_ede3_cbc_code, |
| cipher_des_ede3_cbc_clean, |
| sizeof(DES3_CBC_CTX), |
| NULL, |
| NULL, |
| NULL, |
| NULL |
| }; |
| |
| static const EVP_CIPHER cipher_desx_cbc = |
| { |
| NID_desx_cbc, |
| 8, 24, 8, |
| 0 | EVP_CIPH_CBC_MODE, |
| cipher_desx_cbc_init, |
| cipher_desx_cbc_code, |
| cipher_desx_cbc_clean, |
| sizeof(DESX_CBC_CTX), |
| NULL, |
| NULL, |
| NULL, |
| NULL |
| }; |
| |
| /***************************************************************************** |
| * MD functions |
| **/ |
| static int digest_md2_init(EVP_MD_CTX *ctx); |
| static int digest_md2_update(EVP_MD_CTX *ctx,const void *data, |
| unsigned long count); |
| static int digest_md2_final(EVP_MD_CTX *ctx,unsigned char *md); |
| static int digest_md5_init(EVP_MD_CTX *ctx); |
| static int digest_md5_update(EVP_MD_CTX *ctx,const void *data, |
| unsigned long count); |
| static int digest_md5_final(EVP_MD_CTX *ctx,unsigned char *md); |
| |
| /***************************************************************************** |
| * Our MD digests |
| **/ |
| static const EVP_MD digest_md2 = |
| { |
| NID_md2, |
| NID_md2WithRSAEncryption, |
| 16, |
| 0, |
| digest_md2_init, |
| digest_md2_update, |
| digest_md2_final, |
| NULL, |
| NULL, |
| EVP_PKEY_RSA_method, |
| 16, |
| sizeof(MD2_CTX) |
| }; |
| |
| static const EVP_MD digest_md5 = |
| { |
| NID_md5, |
| NID_md5WithRSAEncryption, |
| 16, |
| 0, |
| digest_md5_init, |
| digest_md5_update, |
| digest_md5_final, |
| NULL, |
| NULL, |
| EVP_PKEY_RSA_method, |
| 64, |
| sizeof(MD5_CTX) |
| }; |
| |
| /***************************************************************************** |
| *** Function definitions *** |
| *****************************************************************************/ |
| |
| /***************************************************************************** |
| * Functions to handle the engine |
| **/ |
| |
| static int bind_rsaref(ENGINE *e) |
| { |
| const RSA_METHOD *meth1; |
| if(!ENGINE_set_id(e, engine_rsaref_id) |
| || !ENGINE_set_name(e, engine_rsaref_name) |
| || !ENGINE_set_RSA(e, &rsaref_rsa) |
| || !ENGINE_set_ciphers(e, rsaref_ciphers) |
| || !ENGINE_set_digests(e, rsaref_digests) |
| || !ENGINE_set_destroy_function(e, rsaref_destroy) |
| || !ENGINE_set_init_function(e, rsaref_init) |
| || !ENGINE_set_finish_function(e, rsaref_finish) |
| /* || !ENGINE_set_ctrl_function(e, rsaref_ctrl) */ |
| /* || !ENGINE_set_cmd_defns(e, rsaref_cmd_defns) */) |
| return 0; |
| |
| /* Ensure the rsaref error handling is set up */ |
| ERR_load_RSAREF_strings(); |
| return 1; |
| } |
| |
| #ifdef ENGINE_DYNAMIC_SUPPORT |
| static int bind_helper(ENGINE *e, const char *id) |
| { |
| if(id && (strcmp(id, engine_rsaref_id) != 0)) |
| return 0; |
| if(!bind_rsaref(e)) |
| return 0; |
| return 1; |
| } |
| IMPLEMENT_DYNAMIC_CHECK_FN() |
| IMPLEMENT_DYNAMIC_BIND_FN(bind_helper) |
| #else |
| static ENGINE *engine_rsaref(void) |
| { |
| ENGINE *ret = ENGINE_new(); |
| if(!ret) |
| return NULL; |
| if(!bind_rsaref(ret)) |
| { |
| ENGINE_free(ret); |
| return NULL; |
| } |
| return ret; |
| } |
| |
| void ENGINE_load_rsaref(void) |
| { |
| /* Copied from eng_[openssl|dyn].c */ |
| ENGINE *toadd = engine_rsaref(); |
| if(!toadd) return; |
| ENGINE_add(toadd); |
| ENGINE_free(toadd); |
| ERR_clear_error(); |
| } |
| #endif |
| |
| /* Initiator which is only present to make sure this engine looks available */ |
| static int rsaref_init(ENGINE *e) |
| { |
| return 1; |
| } |
| |
| /* Finisher which is only present to make sure this engine looks available */ |
| static int rsaref_finish(ENGINE *e) |
| { |
| return 1; |
| } |
| |
| /* Destructor (complements the "ENGINE_ncipher()" constructor) */ |
| static int rsaref_destroy(ENGINE *e) |
| { |
| ERR_unload_RSAREF_strings(); |
| return 1; |
| } |
| |
| /***************************************************************************** |
| * RSA functions |
| **/ |
| |
| static int rsaref_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa) |
| { |
| RSAREFerr(RSAREF_F_RSAREF_MOD_EXP,ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); |
| return(0); |
| } |
| |
| static int bnref_mod_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, |
| const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx) |
| { |
| RSAREFerr(RSAREF_F_BNREF_MOD_EXP,ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); |
| return(0); |
| } |
| |
| /* unsigned char *to: [max] */ |
| static int RSAref_bn2bin(BIGNUM *from, unsigned char *to, int max) |
| { |
| int i; |
| |
| i=BN_num_bytes(from); |
| if (i > max) |
| { |
| RSAREFerr(RSAREF_F_RSAREF_BN2BIN,RSAREF_R_LEN); |
| return(0); |
| } |
| |
| memset(to,0,(unsigned int)max); |
| if (!BN_bn2bin(from,&(to[max-i]))) |
| return(0); |
| return(1); |
| } |
| |
| #ifdef undef |
| /* unsigned char *from: [max] */ |
| static BIGNUM *RSAref_bin2bn(unsigned char *from, BIGNUM *to, int max) |
| { |
| int i; |
| BIGNUM *ret; |
| |
| for (i=0; i<max; i++) |
| if (from[i]) break; |
| |
| ret=BN_bin2bn(&(from[i]),max-i,to); |
| return(ret); |
| } |
| |
| static int RSAref_Public_ref2eay(RSArefPublicKey *from, RSA *to) |
| { |
| to->n=RSAref_bin2bn(from->m,NULL,RSAref_MAX_LEN); |
| to->e=RSAref_bin2bn(from->e,NULL,RSAref_MAX_LEN); |
| if ((to->n == NULL) || (to->e == NULL)) return(0); |
| return(1); |
| } |
| #endif |
| |
| static int RSAref_Public_eay2ref(RSA *from, R_RSA_PUBLIC_KEY *to) |
| { |
| to->bits=BN_num_bits(from->n); |
| if (!RSAref_bn2bin(from->n,to->modulus,MAX_RSA_MODULUS_LEN)) return(0); |
| if (!RSAref_bn2bin(from->e,to->exponent,MAX_RSA_MODULUS_LEN)) return(0); |
| return(1); |
| } |
| |
| #ifdef undef |
| static int RSAref_Private_ref2eay(RSArefPrivateKey *from, RSA *to) |
| { |
| if ((to->n=RSAref_bin2bn(from->m,NULL,RSAref_MAX_LEN)) == NULL) |
| return(0); |
| if ((to->e=RSAref_bin2bn(from->e,NULL,RSAref_MAX_LEN)) == NULL) |
| return(0); |
| if ((to->d=RSAref_bin2bn(from->d,NULL,RSAref_MAX_LEN)) == NULL) |
| return(0); |
| if ((to->p=RSAref_bin2bn(from->prime[0],NULL,RSAref_MAX_PLEN)) == NULL) |
| return(0); |
| if ((to->q=RSAref_bin2bn(from->prime[1],NULL,RSAref_MAX_PLEN)) == NULL) |
| return(0); |
| if ((to->dmp1=RSAref_bin2bn(from->pexp[0],NULL,RSAref_MAX_PLEN)) |
| == NULL) |
| return(0); |
| if ((to->dmq1=RSAref_bin2bn(from->pexp[1],NULL,RSAref_MAX_PLEN)) |
| == NULL) |
| return(0); |
| if ((to->iqmp=RSAref_bin2bn(from->coef,NULL,RSAref_MAX_PLEN)) == NULL) |
| return(0); |
| return(1); |
| } |
| #endif |
| |
| static int RSAref_Private_eay2ref(RSA *from, R_RSA_PRIVATE_KEY *to) |
| { |
| to->bits=BN_num_bits(from->n); |
| if (!RSAref_bn2bin(from->n,to->modulus,MAX_RSA_MODULUS_LEN)) return(0); |
| if (!RSAref_bn2bin(from->e,to->publicExponent,MAX_RSA_MODULUS_LEN)) return(0); |
| if (!RSAref_bn2bin(from->d,to->exponent,MAX_RSA_MODULUS_LEN)) return(0); |
| if (!RSAref_bn2bin(from->p,to->prime[0],MAX_RSA_PRIME_LEN)) return(0); |
| if (!RSAref_bn2bin(from->q,to->prime[1],MAX_RSA_PRIME_LEN)) return(0); |
| if (!RSAref_bn2bin(from->dmp1,to->primeExponent[0],MAX_RSA_PRIME_LEN)) return(0); |
| if (!RSAref_bn2bin(from->dmq1,to->primeExponent[1],MAX_RSA_PRIME_LEN)) return(0); |
| if (!RSAref_bn2bin(from->iqmp,to->coefficient,MAX_RSA_PRIME_LEN)) return(0); |
| return(1); |
| } |
| |
| static int rsaref_private_decrypt(int len, const unsigned char *from, unsigned char *to, |
| RSA *rsa, int padding) |
| { |
| int i,outlen= -1; |
| R_RSA_PRIVATE_KEY RSAkey; |
| |
| if (!RSAref_Private_eay2ref(rsa,&RSAkey)) |
| goto err; |
| if ((i=RSAPrivateDecrypt(to,(unsigned int *)&outlen,(unsigned char *)from,len,&RSAkey)) != 0) |
| { |
| RSAREFerr(RSAREF_F_RSAREF_PRIVATE_DECRYPT,i); |
| outlen= -1; |
| } |
| err: |
| memset(&RSAkey,0,sizeof(RSAkey)); |
| return(outlen); |
| } |
| |
| static int rsaref_private_encrypt(int len, const unsigned char *from, unsigned char *to, |
| RSA *rsa, int padding) |
| { |
| int i,outlen= -1; |
| R_RSA_PRIVATE_KEY RSAkey; |
| |
| if (padding != RSA_PKCS1_PADDING) |
| { |
| RSAREFerr(RSAREF_F_RSAREF_PRIVATE_ENCRYPT, RSA_R_UNKNOWN_PADDING_TYPE); |
| goto err; |
| } |
| if (!RSAref_Private_eay2ref(rsa,&RSAkey)) |
| goto err; |
| if ((i=RSAPrivateEncrypt(to,(unsigned int *)&outlen,(unsigned char *)from,len,&RSAkey)) != 0) |
| { |
| RSAREFerr(RSAREF_F_RSAREF_PRIVATE_ENCRYPT,i); |
| outlen= -1; |
| } |
| err: |
| memset(&RSAkey,0,sizeof(RSAkey)); |
| return(outlen); |
| } |
| |
| static int rsaref_public_decrypt(int len, const unsigned char *from, unsigned char *to, |
| RSA *rsa, int padding) |
| { |
| int i,outlen= -1; |
| R_RSA_PUBLIC_KEY RSAkey; |
| |
| if (!RSAref_Public_eay2ref(rsa,&RSAkey)) |
| goto err; |
| if ((i=RSAPublicDecrypt(to,(unsigned int *)&outlen,(unsigned char *)from,len,&RSAkey)) != 0) |
| { |
| RSAREFerr(RSAREF_F_RSAREF_PUBLIC_DECRYPT,i); |
| outlen= -1; |
| } |
| err: |
| memset(&RSAkey,0,sizeof(RSAkey)); |
| return(outlen); |
| } |
| |
| static int rsaref_public_encrypt(int len, const unsigned char *from, unsigned char *to, |
| RSA *rsa, int padding) |
| { |
| int outlen= -1; |
| int i; |
| R_RSA_PUBLIC_KEY RSAkey; |
| R_RANDOM_STRUCT rnd; |
| unsigned char buf[16]; |
| |
| if (padding != RSA_PKCS1_PADDING && padding != RSA_SSLV23_PADDING) |
| { |
| RSAREFerr(RSAREF_F_RSAREF_PUBLIC_ENCRYPT, RSA_R_UNKNOWN_PADDING_TYPE); |
| goto err; |
| } |
| |
| R_RandomInit(&rnd); |
| R_GetRandomBytesNeeded((unsigned int *)&i,&rnd); |
| while (i > 0) |
| { |
| if (RAND_bytes(buf,16) <= 0) |
| goto err; |
| R_RandomUpdate(&rnd,buf,(unsigned int)((i>16)?16:i)); |
| i-=16; |
| } |
| |
| if (!RSAref_Public_eay2ref(rsa,&RSAkey)) |
| goto err; |
| if ((i=RSAPublicEncrypt(to,(unsigned int *)&outlen,(unsigned char *)from,len,&RSAkey,&rnd)) != 0) |
| { |
| RSAREFerr(RSAREF_F_RSAREF_PUBLIC_ENCRYPT,i); |
| outlen= -1; |
| goto err; |
| } |
| err: |
| memset(&RSAkey,0,sizeof(RSAkey)); |
| R_RandomFinal(&rnd); |
| memset(&rnd,0,sizeof(rnd)); |
| return(outlen); |
| } |
| |
| /***************************************************************************** |
| * Symetric cipher and digest function registrars |
| **/ |
| static int rsaref_ciphers(ENGINE *e, const EVP_CIPHER **cipher, |
| const int **nids, int nid) |
| { |
| int ok = 1; |
| if(!cipher) |
| { |
| /* We are returning a list of supported nids */ |
| *nids = rsaref_cipher_nids; |
| return (sizeof(rsaref_cipher_nids)-1)/sizeof(rsaref_cipher_nids[0]); |
| } |
| /* We are being asked for a specific cipher */ |
| switch (nid) |
| { |
| case NID_des_cbc: |
| *cipher = &cipher_des_cbc; break; |
| case NID_des_ede3_cbc: |
| *cipher = &cipher_des_ede3_cbc; break; |
| case NID_desx_cbc: |
| *cipher = &cipher_desx_cbc; break; |
| default: |
| ok = 0; |
| *cipher = NULL; |
| break; |
| } |
| return ok; |
| } |
| static int rsaref_digests(ENGINE *e, const EVP_MD **digest, |
| const int **nids, int nid) |
| { |
| int ok = 1; |
| if(!digest) |
| { |
| /* We are returning a list of supported nids */ |
| *nids = rsaref_digest_nids; |
| return (sizeof(rsaref_digest_nids)-1)/sizeof(rsaref_digest_nids[0]); |
| } |
| /* We are being asked for a specific digest */ |
| switch (nid) |
| { |
| case NID_md2: |
| *digest = &digest_md2; break; |
| case NID_md5: |
| *digest = &digest_md5; break; |
| default: |
| ok = 0; |
| *digest = NULL; |
| break; |
| } |
| return ok; |
| } |
| |
| /***************************************************************************** |
| * DES functions |
| **/ |
| #undef data |
| #define data(ctx) ((DES_CBC_CTX *)(ctx)->cipher_data) |
| static int cipher_des_cbc_init(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| const unsigned char *iv, int enc) |
| { |
| DES_CBCInit(data(ctx), (unsigned char *)key, (unsigned char *)iv, enc); |
| return 1; |
| } |
| static int cipher_des_cbc_code(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| const unsigned char *in, unsigned int inl) |
| { |
| int ret = DES_CBCUpdate(data(ctx), out, (unsigned char *)in, inl); |
| switch (ret) |
| { |
| case RE_LEN: |
| RSAREFerr(RSAREF_F_CIPHER_DES_CBC_CODE,RSAREF_R_LENGTH_NOT_BLOCK_ALIGNED); |
| break; |
| case 0: |
| break; |
| default: |
| RSAREFerr(RSAREF_F_CIPHER_DES_CBC_CODE,RSAREF_R_UNKNOWN_FAULT); |
| } |
| return !ret; |
| } |
| static int cipher_des_cbc_clean(EVP_CIPHER_CTX *ctx) |
| { |
| memset(data(ctx), 0, ctx->cipher->ctx_size); |
| return 1; |
| } |
| |
| #undef data |
| #define data(ctx) ((DES3_CBC_CTX *)(ctx)->cipher_data) |
| static int cipher_des_ede3_cbc_init(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| const unsigned char *iv, int enc) |
| { |
| DES3_CBCInit(data(ctx), (unsigned char *)key, (unsigned char *)iv, |
| enc); |
| return 1; |
| } |
| static int cipher_des_ede3_cbc_code(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| const unsigned char *in, unsigned int inl) |
| { |
| int ret = DES3_CBCUpdate(data(ctx), out, (unsigned char *)in, inl); |
| switch (ret) |
| { |
| case RE_LEN: |
| RSAREFerr(RSAREF_F_CIPHER_DES_CBC_CODE,RSAREF_R_LENGTH_NOT_BLOCK_ALIGNED); |
| break; |
| case 0: |
| break; |
| default: |
| RSAREFerr(RSAREF_F_CIPHER_DES_CBC_CODE,RSAREF_R_UNKNOWN_FAULT); |
| } |
| return !ret; |
| } |
| static int cipher_des_ede3_cbc_clean(EVP_CIPHER_CTX *ctx) |
| { |
| memset(data(ctx), 0, ctx->cipher->ctx_size); |
| return 1; |
| } |
| |
| #undef data |
| #define data(ctx) ((DESX_CBC_CTX *)(ctx)->cipher_data) |
| static int cipher_desx_cbc_init(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| const unsigned char *iv, int enc) |
| { |
| DESX_CBCInit(data(ctx), (unsigned char *)key, (unsigned char *)iv, |
| enc); |
| return 1; |
| } |
| static int cipher_desx_cbc_code(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| const unsigned char *in, unsigned int inl) |
| { |
| int ret = DESX_CBCUpdate(data(ctx), out, (unsigned char *)in, inl); |
| switch (ret) |
| { |
| case RE_LEN: |
| RSAREFerr(RSAREF_F_CIPHER_DES_CBC_CODE,RSAREF_R_LENGTH_NOT_BLOCK_ALIGNED); |
| break; |
| case 0: |
| break; |
| default: |
| RSAREFerr(RSAREF_F_CIPHER_DES_CBC_CODE,RSAREF_R_UNKNOWN_FAULT); |
| } |
| return !ret; |
| } |
| static int cipher_desx_cbc_clean(EVP_CIPHER_CTX *ctx) |
| { |
| memset(data(ctx), 0, ctx->cipher->ctx_size); |
| return 1; |
| } |
| |
| /***************************************************************************** |
| * MD functions |
| **/ |
| #undef data |
| #define data(ctx) ((MD2_CTX *)(ctx)->md_data) |
| static int digest_md2_init(EVP_MD_CTX *ctx) |
| { |
| MD2Init(data(ctx)); |
| return 1; |
| } |
| static int digest_md2_update(EVP_MD_CTX *ctx,const void *data, |
| unsigned long count) |
| { |
| MD2Update(data(ctx), (unsigned char *)data, (unsigned int)count); |
| return 1; |
| } |
| static int digest_md2_final(EVP_MD_CTX *ctx,unsigned char *md) |
| { |
| MD2Final(md, data(ctx)); |
| return 1; |
| } |
| |
| #undef data |
| #define data(ctx) ((MD5_CTX *)(ctx)->md_data) |
| static int digest_md5_init(EVP_MD_CTX *ctx) |
| { |
| MD5Init(data(ctx)); |
| return 1; |
| } |
| static int digest_md5_update(EVP_MD_CTX *ctx,const void *data, |
| unsigned long count) |
| { |
| MD5Update(data(ctx), (unsigned char *)data, (unsigned int)count); |
| return 1; |
| } |
| static int digest_md5_final(EVP_MD_CTX *ctx,unsigned char *md) |
| { |
| MD5Final(md, data(ctx)); |
| return 1; |
| } |