summaryrefslogtreecommitdiffstats
path: root/vendor/openssl/src/cipher.rs
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/openssl/src/cipher.rs')
-rw-r--r--vendor/openssl/src/cipher.rs536
1 files changed, 536 insertions, 0 deletions
diff --git a/vendor/openssl/src/cipher.rs b/vendor/openssl/src/cipher.rs
new file mode 100644
index 0000000..2b89861
--- /dev/null
+++ b/vendor/openssl/src/cipher.rs
@@ -0,0 +1,536 @@
+//! Symmetric ciphers.
+
+#[cfg(ossl300)]
+use crate::cvt_p;
+#[cfg(ossl300)]
+use crate::error::ErrorStack;
+#[cfg(ossl300)]
+use crate::lib_ctx::LibCtxRef;
+use crate::nid::Nid;
+use cfg_if::cfg_if;
+use foreign_types::{ForeignTypeRef, Opaque};
+use openssl_macros::corresponds;
+#[cfg(ossl300)]
+use std::ffi::CString;
+use std::ops::{Deref, DerefMut};
+#[cfg(ossl300)]
+use std::ptr;
+
+cfg_if! {
+ if #[cfg(any(boringssl, ossl110, libressl273))] {
+ use ffi::{EVP_CIPHER_block_size, EVP_CIPHER_iv_length, EVP_CIPHER_key_length};
+ } else {
+ use libc::c_int;
+
+ #[allow(bad_style)]
+ pub unsafe fn EVP_CIPHER_iv_length(ptr: *const ffi::EVP_CIPHER) -> c_int {
+ (*ptr).iv_len
+ }
+
+ #[allow(bad_style)]
+ pub unsafe fn EVP_CIPHER_block_size(ptr: *const ffi::EVP_CIPHER) -> c_int {
+ (*ptr).block_size
+ }
+
+ #[allow(bad_style)]
+ pub unsafe fn EVP_CIPHER_key_length(ptr: *const ffi::EVP_CIPHER) -> c_int {
+ (*ptr).key_len
+ }
+ }
+}
+
+cfg_if! {
+ if #[cfg(ossl300)] {
+ use foreign_types::ForeignType;
+
+ type Inner = *mut ffi::EVP_CIPHER;
+
+ impl Drop for Cipher {
+ #[inline]
+ fn drop(&mut self) {
+ unsafe {
+ ffi::EVP_CIPHER_free(self.as_ptr());
+ }
+ }
+ }
+
+ impl ForeignType for Cipher {
+ type CType = ffi::EVP_CIPHER;
+ type Ref = CipherRef;
+
+ #[inline]
+ unsafe fn from_ptr(ptr: *mut Self::CType) -> Self {
+ Cipher(ptr)
+ }
+
+ #[inline]
+ fn as_ptr(&self) -> *mut Self::CType {
+ self.0
+ }
+ }
+
+ impl Deref for Cipher {
+ type Target = CipherRef;
+
+ #[inline]
+ fn deref(&self) -> &Self::Target {
+ unsafe {
+ CipherRef::from_ptr(self.as_ptr())
+ }
+ }
+ }
+
+ impl DerefMut for Cipher {
+ #[inline]
+ fn deref_mut(&mut self) -> &mut Self::Target {
+ unsafe {
+ CipherRef::from_ptr_mut(self.as_ptr())
+ }
+ }
+ }
+ } else {
+ enum Inner {}
+
+ impl Deref for Cipher {
+ type Target = CipherRef;
+
+ #[inline]
+ fn deref(&self) -> &Self::Target {
+ match self.0 {}
+ }
+ }
+
+ impl DerefMut for Cipher {
+ #[inline]
+ fn deref_mut(&mut self) -> &mut Self::Target {
+ match self.0 {}
+ }
+ }
+ }
+}
+
+/// A symmetric cipher.
+pub struct Cipher(Inner);
+
+unsafe impl Sync for Cipher {}
+unsafe impl Send for Cipher {}
+
+impl Cipher {
+ /// Looks up the cipher for a certain nid.
+ #[corresponds(EVP_get_cipherbynid)]
+ pub fn from_nid(nid: Nid) -> Option<&'static CipherRef> {
+ unsafe {
+ let ptr = ffi::EVP_get_cipherbyname(ffi::OBJ_nid2sn(nid.as_raw()));
+ if ptr.is_null() {
+ None
+ } else {
+ Some(CipherRef::from_ptr(ptr as *mut _))
+ }
+ }
+ }
+
+ /// Fetches a cipher object corresponding to the specified algorithm name and properties.
+ ///
+ /// Requires OpenSSL 3.0.0 or newer.
+ #[corresponds(EVP_CIPHER_fetch)]
+ #[cfg(ossl300)]
+ pub fn fetch(
+ ctx: Option<&LibCtxRef>,
+ algorithm: &str,
+ properties: Option<&str>,
+ ) -> Result<Self, ErrorStack> {
+ let algorithm = CString::new(algorithm).unwrap();
+ let properties = properties.map(|s| CString::new(s).unwrap());
+
+ unsafe {
+ let ptr = cvt_p(ffi::EVP_CIPHER_fetch(
+ ctx.map_or(ptr::null_mut(), ForeignTypeRef::as_ptr),
+ algorithm.as_ptr(),
+ properties.map_or(ptr::null_mut(), |s| s.as_ptr()),
+ ))?;
+
+ Ok(Cipher::from_ptr(ptr))
+ }
+ }
+
+ pub fn aes_128_ecb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_128_ecb() as *mut _) }
+ }
+
+ pub fn aes_128_cbc() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_128_cbc() as *mut _) }
+ }
+
+ #[cfg(not(boringssl))]
+ pub fn aes_128_xts() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_128_xts() as *mut _) }
+ }
+
+ #[cfg(not(boringssl))]
+ pub fn aes_128_ctr() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_128_ctr() as *mut _) }
+ }
+
+ #[cfg(not(boringssl))]
+ pub fn aes_128_cfb1() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_128_cfb1() as *mut _) }
+ }
+
+ #[cfg(not(boringssl))]
+ pub fn aes_128_cfb128() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_128_cfb128() as *mut _) }
+ }
+
+ #[cfg(not(boringssl))]
+ pub fn aes_128_cfb8() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_128_cfb8() as *mut _) }
+ }
+
+ pub fn aes_128_gcm() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_128_gcm() as *mut _) }
+ }
+
+ #[cfg(not(boringssl))]
+ pub fn aes_128_ccm() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_128_ccm() as *mut _) }
+ }
+
+ #[cfg(not(boringssl))]
+ pub fn aes_128_ofb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_128_ofb() as *mut _) }
+ }
+
+ /// Requires OpenSSL 1.1.0 or newer.
+ #[cfg(ossl110)]
+ pub fn aes_128_ocb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_128_ocb() as *mut _) }
+ }
+
+ /// Requires OpenSSL 1.0.2 or newer.
+ #[cfg(ossl102)]
+ pub fn aes_128_wrap() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_128_wrap() as *mut _) }
+ }
+
+ /// Requires OpenSSL 1.1.0 or newer.
+ #[cfg(ossl110)]
+ pub fn aes_128_wrap_pad() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_128_wrap_pad() as *mut _) }
+ }
+
+ pub fn aes_192_ecb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_192_ecb() as *mut _) }
+ }
+
+ pub fn aes_192_cbc() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_192_cbc() as *mut _) }
+ }
+
+ pub fn aes_192_ctr() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_192_ctr() as *mut _) }
+ }
+
+ #[cfg(not(boringssl))]
+ pub fn aes_192_cfb1() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_192_cfb1() as *mut _) }
+ }
+
+ pub fn aes_192_cfb128() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_192_cfb128() as *mut _) }
+ }
+
+ #[cfg(not(boringssl))]
+ pub fn aes_192_cfb8() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_192_cfb8() as *mut _) }
+ }
+
+ pub fn aes_192_gcm() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_192_gcm() as *mut _) }
+ }
+
+ #[cfg(not(boringssl))]
+ pub fn aes_192_ccm() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_192_ccm() as *mut _) }
+ }
+
+ pub fn aes_192_ofb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_192_ofb() as *mut _) }
+ }
+
+ /// Requires OpenSSL 1.1.0 or newer.
+ #[cfg(ossl110)]
+ pub fn aes_192_ocb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_192_ocb() as *mut _) }
+ }
+
+ /// Requires OpenSSL 1.0.2 or newer.
+ #[cfg(ossl102)]
+ pub fn aes_192_wrap() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_192_wrap() as *mut _) }
+ }
+
+ /// Requires OpenSSL 1.1.0 or newer.
+ #[cfg(ossl110)]
+ pub fn aes_192_wrap_pad() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_192_wrap_pad() as *mut _) }
+ }
+
+ pub fn aes_256_ecb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_256_ecb() as *mut _) }
+ }
+
+ pub fn aes_256_cbc() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_256_cbc() as *mut _) }
+ }
+
+ pub fn aes_256_ctr() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_256_ctr() as *mut _) }
+ }
+
+ #[cfg(not(boringssl))]
+ pub fn aes_256_cfb1() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_256_cfb1() as *mut _) }
+ }
+
+ pub fn aes_256_cfb128() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_256_cfb128() as *mut _) }
+ }
+
+ #[cfg(not(boringssl))]
+ pub fn aes_256_cfb8() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_256_cfb8() as *mut _) }
+ }
+
+ pub fn aes_256_gcm() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_256_gcm() as *mut _) }
+ }
+
+ #[cfg(not(boringssl))]
+ pub fn aes_256_ccm() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_256_ccm() as *mut _) }
+ }
+
+ pub fn aes_256_ofb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_256_ofb() as *mut _) }
+ }
+
+ /// Requires OpenSSL 1.1.0 or newer.
+ #[cfg(ossl110)]
+ pub fn aes_256_ocb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_256_ocb() as *mut _) }
+ }
+
+ /// Requires OpenSSL 1.0.2 or newer.
+ #[cfg(ossl102)]
+ pub fn aes_256_wrap() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_256_wrap() as *mut _) }
+ }
+
+ /// Requires OpenSSL 1.1.0 or newer.
+ #[cfg(ossl110)]
+ pub fn aes_256_wrap_pad() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_aes_256_wrap_pad() as *mut _) }
+ }
+
+ #[cfg(not(osslconf = "OPENSSL_NO_BF"))]
+ pub fn bf_cbc() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_bf_cbc() as *mut _) }
+ }
+
+ #[cfg(not(osslconf = "OPENSSL_NO_BF"))]
+ pub fn bf_ecb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_bf_ecb() as *mut _) }
+ }
+
+ #[cfg(not(osslconf = "OPENSSL_NO_BF"))]
+ #[cfg(not(boringssl))]
+ pub fn bf_cfb64() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_bf_cfb64() as *mut _) }
+ }
+
+ #[cfg(not(osslconf = "OPENSSL_NO_BF"))]
+ #[cfg(not(boringssl))]
+ pub fn bf_ofb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_bf_ofb() as *mut _) }
+ }
+
+ pub fn des_cbc() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_des_cbc() as *mut _) }
+ }
+
+ pub fn des_ecb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_des_ecb() as *mut _) }
+ }
+
+ pub fn des_ede3() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_des_ede3() as *mut _) }
+ }
+
+ pub fn des_ede3_cbc() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_des_ede3_cbc() as *mut _) }
+ }
+
+ #[cfg(not(boringssl))]
+ pub fn des_ede3_cfb64() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_des_ede3_cfb64() as *mut _) }
+ }
+
+ #[cfg(not(osslconf = "OPENSSL_NO_RC4"))]
+ pub fn rc4() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_rc4() as *mut _) }
+ }
+
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_CAMELLIA")))]
+ pub fn camellia128_cfb128() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_camellia_128_cfb128() as *mut _) }
+ }
+
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_CAMELLIA")))]
+ pub fn camellia128_ecb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_camellia_128_ecb() as *mut _) }
+ }
+
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_CAMELLIA")))]
+ pub fn camellia192_cfb128() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_camellia_192_cfb128() as *mut _) }
+ }
+
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_CAMELLIA")))]
+ pub fn camellia192_ecb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_camellia_192_ecb() as *mut _) }
+ }
+
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_CAMELLIA")))]
+ pub fn camellia256_cfb128() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_camellia_256_cfb128() as *mut _) }
+ }
+
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_CAMELLIA")))]
+ pub fn camellia256_ecb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_camellia_256_ecb() as *mut _) }
+ }
+
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_CAST")))]
+ pub fn cast5_cfb64() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_cast5_cfb64() as *mut _) }
+ }
+
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_CAST")))]
+ pub fn cast5_ecb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_cast5_ecb() as *mut _) }
+ }
+
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_IDEA")))]
+ pub fn idea_cfb64() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_idea_cfb64() as *mut _) }
+ }
+
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_IDEA")))]
+ pub fn idea_ecb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_idea_ecb() as *mut _) }
+ }
+
+ #[cfg(all(ossl110, not(osslconf = "OPENSSL_NO_CHACHA")))]
+ pub fn chacha20() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_chacha20() as *mut _) }
+ }
+
+ #[cfg(all(any(ossl110, libressl360), not(osslconf = "OPENSSL_NO_CHACHA")))]
+ pub fn chacha20_poly1305() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_chacha20_poly1305() as *mut _) }
+ }
+
+ #[cfg(not(osslconf = "OPENSSL_NO_SEED"))]
+ #[cfg(not(boringssl))]
+ pub fn seed_cbc() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_seed_cbc() as *mut _) }
+ }
+
+ #[cfg(not(osslconf = "OPENSSL_NO_SEED"))]
+ #[cfg(not(boringssl))]
+ pub fn seed_cfb128() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_seed_cfb128() as *mut _) }
+ }
+
+ #[cfg(not(osslconf = "OPENSSL_NO_SEED"))]
+ #[cfg(not(boringssl))]
+ pub fn seed_ecb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_seed_ecb() as *mut _) }
+ }
+
+ #[cfg(not(osslconf = "OPENSSL_NO_SEED"))]
+ #[cfg(not(boringssl))]
+ pub fn seed_ofb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_seed_ofb() as *mut _) }
+ }
+
+ #[cfg(all(any(ossl111, libressl291), not(osslconf = "OPENSSL_NO_SM4")))]
+ pub fn sm4_ecb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_sm4_ecb() as *mut _) }
+ }
+
+ #[cfg(all(any(ossl111, libressl291), not(osslconf = "OPENSSL_NO_SM4")))]
+ pub fn sm4_cbc() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_sm4_cbc() as *mut _) }
+ }
+
+ #[cfg(all(any(ossl111, libressl291), not(osslconf = "OPENSSL_NO_SM4")))]
+ pub fn sm4_ctr() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_sm4_ctr() as *mut _) }
+ }
+
+ #[cfg(all(any(ossl111, libressl291), not(osslconf = "OPENSSL_NO_SM4")))]
+ pub fn sm4_cfb128() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_sm4_cfb128() as *mut _) }
+ }
+
+ #[cfg(all(any(ossl111, libressl291), not(osslconf = "OPENSSL_NO_SM4")))]
+ pub fn sm4_ofb() -> &'static CipherRef {
+ unsafe { CipherRef::from_ptr(ffi::EVP_sm4_ofb() as *mut _) }
+ }
+}
+
+/// A reference to a [`Cipher`].
+pub struct CipherRef(Opaque);
+
+impl ForeignTypeRef for CipherRef {
+ type CType = ffi::EVP_CIPHER;
+}
+
+unsafe impl Sync for CipherRef {}
+unsafe impl Send for CipherRef {}
+
+impl CipherRef {
+ /// Returns the cipher's Nid.
+ #[corresponds(EVP_CIPHER_nid)]
+ pub fn nid(&self) -> Nid {
+ let nid = unsafe { ffi::EVP_CIPHER_nid(self.as_ptr()) };
+ Nid::from_raw(nid)
+ }
+
+ /// Returns the length of keys used with this cipher.
+ #[corresponds(EVP_CIPHER_key_length)]
+ pub fn key_length(&self) -> usize {
+ unsafe { EVP_CIPHER_key_length(self.as_ptr()) as usize }
+ }
+
+ /// Returns the length of the IV used with this cipher.
+ ///
+ /// # Note
+ ///
+ /// Ciphers that do not use an IV have an IV length of 0.
+ #[corresponds(EVP_CIPHER_iv_length)]
+ pub fn iv_length(&self) -> usize {
+ unsafe { EVP_CIPHER_iv_length(self.as_ptr()) as usize }
+ }
+
+ /// Returns the block size of the cipher.
+ ///
+ /// # Note
+ ///
+ /// Stream ciphers have a block size of 1.
+ #[corresponds(EVP_CIPHER_block_size)]
+ pub fn block_size(&self) -> usize {
+ unsafe { EVP_CIPHER_block_size(self.as_ptr()) as usize }
+ }
+}