@@ -11,6 +11,8 @@ import (
11
11
"strconv"
12
12
"sync"
13
13
"unsafe"
14
+
15
+ "github.com/golang-fips/openssl/v2/internal/ossl"
14
16
)
15
17
16
18
type cipherKind int8
@@ -74,70 +76,70 @@ type cacheCipherKey struct {
74
76
}
75
77
76
78
// loadCipher returns a cipher object for the given k.
77
- func loadCipher (k cipherKind , mode cipherMode ) (cipher _EVP_CIPHER_PTR ) {
79
+ func loadCipher (k cipherKind , mode cipherMode ) (cipher ossl. EVP_CIPHER_PTR ) {
78
80
if v , ok := cacheCipher .Load (cacheCipherKey {k , mode }); ok {
79
- return v .(_EVP_CIPHER_PTR )
81
+ return v .(ossl. EVP_CIPHER_PTR )
80
82
}
81
83
defer func () {
82
84
if cipher != nil && vMajor == 3 {
83
85
// On OpenSSL 3, directly operating on a EVP_CIPHER object
84
86
// not created by EVP_CIPHER has negative performance
85
87
// implications, as cipher operations will have
86
88
// to fetch it on every call. Better to just fetch it once here.
87
- cipher , _ = go_openssl_EVP_CIPHER_fetch (nil , go_openssl_EVP_CIPHER_get0_name (cipher ), nil )
89
+ cipher , _ = ossl . EVP_CIPHER_fetch (nil , ossl . EVP_CIPHER_get0_name (cipher ), nil )
88
90
}
89
91
cacheCipher .Store (cacheCipherKey {k , mode }, cipher )
90
92
}()
91
93
switch k {
92
94
case cipherAES128 :
93
95
switch mode {
94
96
case cipherModeECB :
95
- cipher = go_openssl_EVP_aes_128_ecb ()
97
+ cipher = ossl . EVP_aes_128_ecb ()
96
98
case cipherModeCBC :
97
- cipher = go_openssl_EVP_aes_128_cbc ()
99
+ cipher = ossl . EVP_aes_128_cbc ()
98
100
case cipherModeCTR :
99
- cipher = go_openssl_EVP_aes_128_ctr ()
101
+ cipher = ossl . EVP_aes_128_ctr ()
100
102
case cipherModeGCM :
101
- cipher = go_openssl_EVP_aes_128_gcm ()
103
+ cipher = ossl . EVP_aes_128_gcm ()
102
104
}
103
105
case cipherAES192 :
104
106
switch mode {
105
107
case cipherModeECB :
106
- cipher = go_openssl_EVP_aes_192_ecb ()
108
+ cipher = ossl . EVP_aes_192_ecb ()
107
109
case cipherModeCBC :
108
- cipher = go_openssl_EVP_aes_192_cbc ()
110
+ cipher = ossl . EVP_aes_192_cbc ()
109
111
case cipherModeCTR :
110
- cipher = go_openssl_EVP_aes_192_ctr ()
112
+ cipher = ossl . EVP_aes_192_ctr ()
111
113
case cipherModeGCM :
112
- cipher = go_openssl_EVP_aes_192_gcm ()
114
+ cipher = ossl . EVP_aes_192_gcm ()
113
115
}
114
116
case cipherAES256 :
115
117
switch mode {
116
118
case cipherModeECB :
117
- cipher = go_openssl_EVP_aes_256_ecb ()
119
+ cipher = ossl . EVP_aes_256_ecb ()
118
120
case cipherModeCBC :
119
- cipher = go_openssl_EVP_aes_256_cbc ()
121
+ cipher = ossl . EVP_aes_256_cbc ()
120
122
case cipherModeCTR :
121
- cipher = go_openssl_EVP_aes_256_ctr ()
123
+ cipher = ossl . EVP_aes_256_ctr ()
122
124
case cipherModeGCM :
123
- cipher = go_openssl_EVP_aes_256_gcm ()
125
+ cipher = ossl . EVP_aes_256_gcm ()
124
126
}
125
127
case cipherDES :
126
128
switch mode {
127
129
case cipherModeECB :
128
- cipher = go_openssl_EVP_des_ecb ()
130
+ cipher = ossl . EVP_des_ecb ()
129
131
case cipherModeCBC :
130
- cipher = go_openssl_EVP_des_cbc ()
132
+ cipher = ossl . EVP_des_cbc ()
131
133
}
132
134
case cipherDES3 :
133
135
switch mode {
134
136
case cipherModeECB :
135
- cipher = go_openssl_EVP_des_ede3_ecb ()
137
+ cipher = ossl . EVP_des_ede3_ecb ()
136
138
case cipherModeCBC :
137
- cipher = go_openssl_EVP_des_ede3_cbc ()
139
+ cipher = ossl . EVP_des_ede3_cbc ()
138
140
}
139
141
case cipherRC4 :
140
- cipher = go_openssl_EVP_rc4 ()
142
+ cipher = ossl . EVP_rc4 ()
141
143
}
142
144
return cipher
143
145
}
@@ -155,7 +157,7 @@ func newEVPCipher(key []byte, kind cipherKind) (*evpCipher, error) {
155
157
}
156
158
c := & evpCipher {key : make ([]byte , len (key )), kind : kind }
157
159
copy (c .key , key )
158
- c .blockSize = int (go_openssl_EVP_CIPHER_get_block_size (cipher ))
160
+ c .blockSize = int (ossl . EVP_CIPHER_get_block_size (cipher ))
159
161
return c , nil
160
162
}
161
163
@@ -175,10 +177,10 @@ func (c *evpCipher) encrypt(dst, src []byte) error {
175
177
if err != nil {
176
178
return err
177
179
}
178
- defer go_openssl_EVP_CIPHER_CTX_free (enc_ctx )
180
+ defer ossl . EVP_CIPHER_CTX_free (enc_ctx )
179
181
180
182
var outl int32
181
- if _ , err := go_openssl_EVP_EncryptUpdate (enc_ctx , base (dst ), & outl , base (src ), int32 (c .blockSize )); err != nil {
183
+ if _ , err := ossl . EVP_EncryptUpdate (enc_ctx , base (dst ), & outl , base (src ), int32 (c .blockSize )); err != nil {
182
184
return err
183
185
}
184
186
runtime .KeepAlive (c )
@@ -201,25 +203,25 @@ func (c *evpCipher) decrypt(dst, src []byte) error {
201
203
if err != nil {
202
204
return err
203
205
}
204
- defer go_openssl_EVP_CIPHER_CTX_free (dec_ctx )
206
+ defer ossl . EVP_CIPHER_CTX_free (dec_ctx )
205
207
206
- if _ , err := go_openssl_EVP_CIPHER_CTX_set_padding (dec_ctx , 0 ); err != nil {
208
+ if _ , err := ossl . EVP_CIPHER_CTX_set_padding (dec_ctx , 0 ); err != nil {
207
209
return err
208
210
}
209
211
210
212
var outl int32
211
- go_openssl_EVP_DecryptUpdate (dec_ctx , base (dst ), & outl , base (src ), int32 (c .blockSize ))
213
+ ossl . EVP_DecryptUpdate (dec_ctx , base (dst ), & outl , base (src ), int32 (c .blockSize ))
212
214
runtime .KeepAlive (c )
213
215
return nil
214
216
}
215
217
216
218
type cipherCBC struct {
217
- ctx _EVP_CIPHER_CTX_PTR
219
+ ctx ossl. EVP_CIPHER_CTX_PTR
218
220
blockSize int
219
221
}
220
222
221
223
func (c * cipherCBC ) finalize () {
222
- go_openssl_EVP_CIPHER_CTX_free (c .ctx )
224
+ ossl . EVP_CIPHER_CTX_free (c .ctx )
223
225
}
224
226
225
227
func (x * cipherCBC ) BlockSize () int { return x .blockSize }
@@ -236,7 +238,7 @@ func (x *cipherCBC) CryptBlocks(dst, src []byte) {
236
238
}
237
239
if len (src ) > 0 {
238
240
var outl int32
239
- if _ , err := go_openssl_EVP_CipherUpdate (x .ctx , base (dst ), & outl , base (src ), int32 (len (src ))); err != nil {
241
+ if _ , err := ossl . EVP_CipherUpdate (x .ctx , base (dst ), & outl , base (src ), int32 (len (src ))); err != nil {
240
242
panic ("crypto/cipher: " + err .Error ())
241
243
}
242
244
runtime .KeepAlive (x )
@@ -247,7 +249,7 @@ func (x *cipherCBC) SetIV(iv []byte) {
247
249
if len (iv ) != x .blockSize {
248
250
panic ("crypto/cipher: incorrect length IV" )
249
251
}
250
- if _ , err := go_openssl_EVP_CipherInit_ex (x .ctx , nil , nil , nil , base (iv ), int32 (cipherOpNone )); err != nil {
252
+ if _ , err := ossl . EVP_CipherInit_ex (x .ctx , nil , nil , nil , base (iv ), int32 (cipherOpNone )); err != nil {
251
253
panic ("crypto/cipher: " + err .Error ())
252
254
}
253
255
}
@@ -259,14 +261,14 @@ func (c *evpCipher) newCBC(iv []byte, op cipherOp) cipher.BlockMode {
259
261
}
260
262
x := & cipherCBC {ctx : ctx , blockSize : c .blockSize }
261
263
runtime .SetFinalizer (x , (* cipherCBC ).finalize )
262
- if _ , err := go_openssl_EVP_CIPHER_CTX_set_padding (x .ctx , 0 ); err != nil {
264
+ if _ , err := ossl . EVP_CIPHER_CTX_set_padding (x .ctx , 0 ); err != nil {
263
265
panic ("crypto/cipher: " + err .Error ())
264
266
}
265
267
return x
266
268
}
267
269
268
270
type cipherCTR struct {
269
- ctx _EVP_CIPHER_CTX_PTR
271
+ ctx ossl. EVP_CIPHER_CTX_PTR
270
272
}
271
273
272
274
func (x * cipherCTR ) XORKeyStream (dst , src []byte ) {
@@ -280,7 +282,7 @@ func (x *cipherCTR) XORKeyStream(dst, src []byte) {
280
282
return
281
283
}
282
284
var outl int32
283
- if _ , err := go_openssl_EVP_EncryptUpdate (x .ctx , base (dst ), & outl , base (src ), int32 (len (src ))); err != nil {
285
+ if _ , err := ossl . EVP_EncryptUpdate (x .ctx , base (dst ), & outl , base (src ), int32 (len (src ))); err != nil {
284
286
panic ("crypto/cipher: " + err .Error ())
285
287
}
286
288
runtime .KeepAlive (x )
@@ -297,7 +299,7 @@ func (c *evpCipher) newCTR(iv []byte) cipher.Stream {
297
299
}
298
300
299
301
func (c * cipherCTR ) finalize () {
300
- go_openssl_EVP_CIPHER_CTX_free (c .ctx )
302
+ ossl . EVP_CIPHER_CTX_free (c .ctx )
301
303
}
302
304
303
305
type cipherGCMTLS uint8
@@ -447,31 +449,31 @@ func (g *cipherGCM) Seal(dst, nonce, plaintext, aad []byte) []byte {
447
449
if err != nil {
448
450
panic (err )
449
451
}
450
- defer go_openssl_EVP_CIPHER_CTX_free (ctx )
452
+ defer ossl . EVP_CIPHER_CTX_free (ctx )
451
453
// Encrypt additional data.
452
454
// When sealing a TLS payload, OpenSSL app sets the additional data using
453
455
// '_EVP_CIPHER_CTX_ctrl(g.ctx, _EVP_CTRL_AEAD_TLS1_AAD, _EVP_AEAD_TLS1_AAD_LEN, base(additionalData))'.
454
456
// This makes the explicit nonce component to monotonically increase on every Seal operation without
455
457
// relying in the explicit nonce being securely set externally,
456
458
// and it also gives some interesting speed gains.
457
459
// Unfortunately we can't use it because Go expects AEAD.Seal to honor the provided nonce.
458
- if _ , err := go_openssl_EVP_EncryptInit_ex (ctx , nil , nil , nil , base (nonce )); err != nil {
460
+ if _ , err := ossl . EVP_EncryptInit_ex (ctx , nil , nil , nil , base (nonce )); err != nil {
459
461
panic (err )
460
462
}
461
463
var outl , discard int32
462
- if _ , err := go_openssl_EVP_EncryptUpdate (ctx , nil , & discard , baseNeverEmpty (aad ), int32 (len (aad ))); err != nil {
464
+ if _ , err := ossl . EVP_EncryptUpdate (ctx , nil , & discard , baseNeverEmpty (aad ), int32 (len (aad ))); err != nil {
463
465
panic (err )
464
466
}
465
- if _ , err := go_openssl_EVP_EncryptUpdate (ctx , base (out ), & outl , baseNeverEmpty (plaintext ), int32 (len (plaintext ))); err != nil {
467
+ if _ , err := ossl . EVP_EncryptUpdate (ctx , base (out ), & outl , baseNeverEmpty (plaintext ), int32 (len (plaintext ))); err != nil {
466
468
panic (err )
467
469
}
468
470
if len (plaintext ) != int (outl ) {
469
471
panic ("cipher: incorrect length returned from GCM EncryptUpdate" )
470
472
}
471
- if _ , err := go_openssl_EVP_EncryptFinal_ex (ctx , base (out [outl :]), & discard ); err != nil {
473
+ if _ , err := ossl . EVP_EncryptFinal_ex (ctx , base (out [outl :]), & discard ); err != nil {
472
474
panic (err )
473
475
}
474
- if _ , err := go_openssl_EVP_CIPHER_CTX_ctrl (ctx , _EVP_CTRL_GCM_GET_TAG , 16 , unsafe .Pointer (base (out [outl :]))); err != nil {
476
+ if _ , err := ossl . EVP_CIPHER_CTX_ctrl (ctx , ossl . EVP_CTRL_GCM_GET_TAG , 16 , unsafe .Pointer (base (out [outl :]))); err != nil {
475
477
panic (err )
476
478
}
477
479
runtime .KeepAlive (g )
@@ -507,7 +509,7 @@ func (g *cipherGCM) Open(dst, nonce, ciphertext, aad []byte) (_ []byte, err erro
507
509
if err != nil {
508
510
return nil , err
509
511
}
510
- defer go_openssl_EVP_CIPHER_CTX_free (ctx )
512
+ defer ossl . EVP_CIPHER_CTX_free (ctx )
511
513
512
514
defer func () {
513
515
if err != nil {
@@ -517,23 +519,23 @@ func (g *cipherGCM) Open(dst, nonce, ciphertext, aad []byte) (_ []byte, err erro
517
519
}
518
520
}
519
521
}()
520
- if _ , err := go_openssl_EVP_DecryptInit_ex (ctx , nil , nil , nil , base (nonce )); err != nil {
522
+ if _ , err := ossl . EVP_DecryptInit_ex (ctx , nil , nil , nil , base (nonce )); err != nil {
521
523
return nil , errOpen
522
524
}
523
- if _ , err := go_openssl_EVP_CIPHER_CTX_ctrl (ctx , _EVP_CTRL_GCM_SET_TAG , 16 , unsafe .Pointer (base (tag ))); err != nil {
525
+ if _ , err := ossl . EVP_CIPHER_CTX_ctrl (ctx , ossl . EVP_CTRL_GCM_SET_TAG , 16 , unsafe .Pointer (base (tag ))); err != nil {
524
526
return nil , errOpen
525
527
}
526
528
var outl , discard int32
527
- if _ , err := go_openssl_EVP_DecryptUpdate (ctx , nil , & discard , baseNeverEmpty (aad ), int32 (len (aad ))); err != nil {
529
+ if _ , err := ossl . EVP_DecryptUpdate (ctx , nil , & discard , baseNeverEmpty (aad ), int32 (len (aad ))); err != nil {
528
530
return nil , errOpen
529
531
}
530
- if _ , err := go_openssl_EVP_DecryptUpdate (ctx , base (out ), & outl , baseNeverEmpty (ciphertext ), int32 (len (ciphertext ))); err != nil {
532
+ if _ , err := ossl . EVP_DecryptUpdate (ctx , base (out ), & outl , baseNeverEmpty (ciphertext ), int32 (len (ciphertext ))); err != nil {
531
533
return nil , errOpen
532
534
}
533
535
if len (ciphertext ) != int (outl ) {
534
536
return nil , errOpen
535
537
}
536
- if _ , err := go_openssl_EVP_DecryptFinal_ex (ctx , base (out [outl :]), & discard ); err != nil {
538
+ if _ , err := ossl . EVP_DecryptFinal_ex (ctx , base (out [outl :]), & discard ); err != nil {
537
539
return nil , errOpen
538
540
}
539
541
runtime .KeepAlive (g )
@@ -552,34 +554,34 @@ func sliceForAppend(in []byte, n int) (head, tail []byte) {
552
554
return
553
555
}
554
556
555
- func newCipherCtx (kind cipherKind , mode cipherMode , encrypt cipherOp , key , iv []byte ) (_ _EVP_CIPHER_CTX_PTR , err error ) {
557
+ func newCipherCtx (kind cipherKind , mode cipherMode , encrypt cipherOp , key , iv []byte ) (_ ossl. EVP_CIPHER_CTX_PTR , err error ) {
556
558
cipher := loadCipher (kind , mode )
557
559
if cipher == nil {
558
560
panic ("crypto/cipher: unsupported cipher: " + kind .String ())
559
561
}
560
- ctx , err := go_openssl_EVP_CIPHER_CTX_new ()
562
+ ctx , err := ossl . EVP_CIPHER_CTX_new ()
561
563
if err != nil {
562
564
return nil , err
563
565
}
564
566
defer func () {
565
567
if err != nil {
566
- go_openssl_EVP_CIPHER_CTX_free (ctx )
568
+ ossl . EVP_CIPHER_CTX_free (ctx )
567
569
}
568
570
}()
569
571
if kind == cipherRC4 {
570
572
// RC4 cipher supports a variable key length.
571
573
// We need to set the key length before setting the key,
572
574
// and to do so we need to have an initialized cipher ctx.
573
- if _ , err := go_openssl_EVP_CipherInit_ex (ctx , cipher , nil , nil , nil , int32 (encrypt )); err != nil {
575
+ if _ , err := ossl . EVP_CipherInit_ex (ctx , cipher , nil , nil , nil , int32 (encrypt )); err != nil {
574
576
return nil , err
575
577
}
576
- if _ , err := go_openssl_EVP_CIPHER_CTX_set_key_length (ctx , int32 (len (key ))); err != nil {
578
+ if _ , err := ossl . EVP_CIPHER_CTX_set_key_length (ctx , int32 (len (key ))); err != nil {
577
579
return nil , err
578
580
}
579
581
// Pass nil to the next call to EVP_CipherInit_ex to avoid resetting ctx's cipher.
580
582
cipher = nil
581
583
}
582
- if _ , err := go_openssl_EVP_CipherInit_ex (ctx , cipher , nil , base (key ), base (iv ), int32 (encrypt )); err != nil {
584
+ if _ , err := ossl . EVP_CipherInit_ex (ctx , cipher , nil , base (key ), base (iv ), int32 (encrypt )); err != nil {
583
585
return nil , err
584
586
}
585
587
return ctx , nil
0 commit comments