Skip to content

Commit 13e70e5

Browse files
committed
use ossl instead of direct cgo calls
1 parent d00b580 commit 13e70e5

26 files changed

+1131
-2078
lines changed

aes.go

+1-3
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,7 @@
1-
//go:build !cmd_go_bootstrap
1+
//go:build !cmd_go_bootstrap && cgo
22

33
package openssl
44

5-
// #include "goopenssl.h"
6-
import "C"
75
import (
86
"crypto/cipher"
97
"errors"

cipher.go

+56-57
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,7 @@
1-
//go:build !cmd_go_bootstrap
1+
//go:build !cmd_go_bootstrap && cgo
22

33
package openssl
44

5-
// #include "goopenssl.h"
6-
import "C"
7-
85
import (
96
"crypto/cipher"
107
"encoding/binary"
@@ -13,6 +10,8 @@ import (
1310
"strconv"
1411
"sync"
1512
"unsafe"
13+
14+
"github.com/golang-fips/openssl/v2/internal/ossl"
1615
)
1716

1817
type cipherKind int8
@@ -76,70 +75,70 @@ type cacheCipherKey struct {
7675
}
7776

7877
// loadCipher returns a cipher object for the given k.
79-
func loadCipher(k cipherKind, mode cipherMode) (cipher C.GO_EVP_CIPHER_PTR) {
78+
func loadCipher(k cipherKind, mode cipherMode) (cipher ossl.EVP_CIPHER_PTR) {
8079
if v, ok := cacheCipher.Load(cacheCipherKey{k, mode}); ok {
81-
return v.(C.GO_EVP_CIPHER_PTR)
80+
return v.(ossl.EVP_CIPHER_PTR)
8281
}
8382
defer func() {
8483
if cipher != nil && vMajor == 3 {
8584
// On OpenSSL 3, directly operating on a EVP_CIPHER object
8685
// not created by EVP_CIPHER has negative performance
8786
// implications, as cipher operations will have
8887
// to fetch it on every call. Better to just fetch it once here.
89-
cipher = C.go_openssl_EVP_CIPHER_fetch(nil, C.go_openssl_EVP_CIPHER_get0_name(cipher), nil)
88+
cipher, _ = ossl.EVP_CIPHER_fetch(nil, ossl.EVP_CIPHER_get0_name(cipher), nil)
9089
}
9190
cacheCipher.Store(cacheCipherKey{k, mode}, cipher)
9291
}()
9392
switch k {
9493
case cipherAES128:
9594
switch mode {
9695
case cipherModeECB:
97-
cipher = C.go_openssl_EVP_aes_128_ecb()
96+
cipher = ossl.EVP_aes_128_ecb()
9897
case cipherModeCBC:
99-
cipher = C.go_openssl_EVP_aes_128_cbc()
98+
cipher = ossl.EVP_aes_128_cbc()
10099
case cipherModeCTR:
101-
cipher = C.go_openssl_EVP_aes_128_ctr()
100+
cipher = ossl.EVP_aes_128_ctr()
102101
case cipherModeGCM:
103-
cipher = C.go_openssl_EVP_aes_128_gcm()
102+
cipher = ossl.EVP_aes_128_gcm()
104103
}
105104
case cipherAES192:
106105
switch mode {
107106
case cipherModeECB:
108-
cipher = C.go_openssl_EVP_aes_192_ecb()
107+
cipher = ossl.EVP_aes_192_ecb()
109108
case cipherModeCBC:
110-
cipher = C.go_openssl_EVP_aes_192_cbc()
109+
cipher = ossl.EVP_aes_192_cbc()
111110
case cipherModeCTR:
112-
cipher = C.go_openssl_EVP_aes_192_ctr()
111+
cipher = ossl.EVP_aes_192_ctr()
113112
case cipherModeGCM:
114-
cipher = C.go_openssl_EVP_aes_192_gcm()
113+
cipher = ossl.EVP_aes_192_gcm()
115114
}
116115
case cipherAES256:
117116
switch mode {
118117
case cipherModeECB:
119-
cipher = C.go_openssl_EVP_aes_256_ecb()
118+
cipher = ossl.EVP_aes_256_ecb()
120119
case cipherModeCBC:
121-
cipher = C.go_openssl_EVP_aes_256_cbc()
120+
cipher = ossl.EVP_aes_256_cbc()
122121
case cipherModeCTR:
123-
cipher = C.go_openssl_EVP_aes_256_ctr()
122+
cipher = ossl.EVP_aes_256_ctr()
124123
case cipherModeGCM:
125-
cipher = C.go_openssl_EVP_aes_256_gcm()
124+
cipher = ossl.EVP_aes_256_gcm()
126125
}
127126
case cipherDES:
128127
switch mode {
129128
case cipherModeECB:
130-
cipher = C.go_openssl_EVP_des_ecb()
129+
cipher = ossl.EVP_des_ecb()
131130
case cipherModeCBC:
132-
cipher = C.go_openssl_EVP_des_cbc()
131+
cipher = ossl.EVP_des_cbc()
133132
}
134133
case cipherDES3:
135134
switch mode {
136135
case cipherModeECB:
137-
cipher = C.go_openssl_EVP_des_ede3_ecb()
136+
cipher = ossl.EVP_des_ede3_ecb()
138137
case cipherModeCBC:
139-
cipher = C.go_openssl_EVP_des_ede3_cbc()
138+
cipher = ossl.EVP_des_ede3_cbc()
140139
}
141140
case cipherRC4:
142-
cipher = C.go_openssl_EVP_rc4()
141+
cipher = ossl.EVP_rc4()
143142
}
144143
return cipher
145144
}
@@ -157,7 +156,7 @@ func newEVPCipher(key []byte, kind cipherKind) (*evpCipher, error) {
157156
}
158157
c := &evpCipher{key: make([]byte, len(key)), kind: kind}
159158
copy(c.key, key)
160-
c.blockSize = int(C.go_openssl_EVP_CIPHER_get_block_size(cipher))
159+
c.blockSize = int(ossl.EVP_CIPHER_get_block_size(cipher))
161160
return c, nil
162161
}
163162

@@ -177,9 +176,9 @@ func (c *evpCipher) encrypt(dst, src []byte) error {
177176
if err != nil {
178177
return err
179178
}
180-
defer C.go_openssl_EVP_CIPHER_CTX_free(enc_ctx)
179+
defer ossl.EVP_CIPHER_CTX_free(enc_ctx)
181180

182-
if C.go_openssl_EVP_EncryptUpdate_wrapper(enc_ctx, base(dst), base(src), C.int(c.blockSize)) != 1 {
181+
if ossl.EVP_EncryptUpdate_wrapper(enc_ctx, unsafe.SliceData(dst), unsafe.SliceData(src), int32(c.blockSize)) != nil {
183182
return errors.New("EncryptUpdate failed")
184183
}
185184
runtime.KeepAlive(c)
@@ -202,24 +201,24 @@ func (c *evpCipher) decrypt(dst, src []byte) error {
202201
if err != nil {
203202
return err
204203
}
205-
defer C.go_openssl_EVP_CIPHER_CTX_free(dec_ctx)
204+
defer ossl.EVP_CIPHER_CTX_free(dec_ctx)
206205

207-
if C.go_openssl_EVP_CIPHER_CTX_set_padding(dec_ctx, 0) != 1 {
206+
if ossl.EVP_CIPHER_CTX_set_padding(dec_ctx, 0) != nil {
208207
return errors.New("could not disable cipher padding")
209208
}
210209

211-
C.go_openssl_EVP_DecryptUpdate_wrapper(dec_ctx, base(dst), base(src), C.int(c.blockSize))
210+
ossl.EVP_DecryptUpdate_wrapper(dec_ctx, unsafe.SliceData(dst), unsafe.SliceData(src), int32(c.blockSize))
212211
runtime.KeepAlive(c)
213212
return nil
214213
}
215214

216215
type cipherCBC struct {
217-
ctx C.GO_EVP_CIPHER_CTX_PTR
216+
ctx ossl.EVP_CIPHER_CTX_PTR
218217
blockSize int
219218
}
220219

221220
func (c *cipherCBC) finalize() {
222-
C.go_openssl_EVP_CIPHER_CTX_free(c.ctx)
221+
ossl.EVP_CIPHER_CTX_free(c.ctx)
223222
}
224223

225224
func (x *cipherCBC) BlockSize() int { return x.blockSize }
@@ -235,7 +234,7 @@ func (x *cipherCBC) CryptBlocks(dst, src []byte) {
235234
panic("crypto/cipher: output smaller than input")
236235
}
237236
if len(src) > 0 {
238-
if C.go_openssl_EVP_CipherUpdate_wrapper(x.ctx, base(dst), base(src), C.int(len(src))) != 1 {
237+
if ossl.EVP_CipherUpdate_wrapper(x.ctx, unsafe.SliceData(dst), unsafe.SliceData(src), int32(len(src))) != nil {
239238
panic("crypto/cipher: CipherUpdate failed")
240239
}
241240
runtime.KeepAlive(x)
@@ -246,7 +245,7 @@ func (x *cipherCBC) SetIV(iv []byte) {
246245
if len(iv) != x.blockSize {
247246
panic("cipher: incorrect length IV")
248247
}
249-
if C.go_openssl_EVP_CipherInit_ex(x.ctx, nil, nil, nil, base(iv), C.int(cipherOpNone)) != 1 {
248+
if ossl.EVP_CipherInit_ex(x.ctx, nil, nil, nil, unsafe.SliceData(iv), int32(cipherOpNone)) != nil {
250249
panic("cipher: unable to initialize EVP cipher ctx")
251250
}
252251
}
@@ -258,14 +257,14 @@ func (c *evpCipher) newCBC(iv []byte, op cipherOp) cipher.BlockMode {
258257
}
259258
x := &cipherCBC{ctx: ctx, blockSize: c.blockSize}
260259
runtime.SetFinalizer(x, (*cipherCBC).finalize)
261-
if C.go_openssl_EVP_CIPHER_CTX_set_padding(x.ctx, 0) != 1 {
260+
if ossl.EVP_CIPHER_CTX_set_padding(x.ctx, 0) != nil {
262261
panic("cipher: unable to set padding")
263262
}
264263
return x
265264
}
266265

267266
type cipherCTR struct {
268-
ctx C.GO_EVP_CIPHER_CTX_PTR
267+
ctx ossl.EVP_CIPHER_CTX_PTR
269268
}
270269

271270
func (x *cipherCTR) XORKeyStream(dst, src []byte) {
@@ -278,7 +277,7 @@ func (x *cipherCTR) XORKeyStream(dst, src []byte) {
278277
if len(src) == 0 {
279278
return
280279
}
281-
if C.go_openssl_EVP_EncryptUpdate_wrapper(x.ctx, base(dst), base(src), C.int(len(src))) != 1 {
280+
if ossl.EVP_EncryptUpdate_wrapper(x.ctx, base(dst), base(src), int32(len(src))) != nil {
282281
panic("crypto/cipher: EncryptUpdate failed")
283282
}
284283
runtime.KeepAlive(x)
@@ -295,7 +294,7 @@ func (c *evpCipher) newCTR(iv []byte) cipher.Stream {
295294
}
296295

297296
func (c *cipherCTR) finalize() {
298-
C.go_openssl_EVP_CIPHER_CTX_free(c.ctx)
297+
ossl.EVP_CIPHER_CTX_free(c.ctx)
299298
}
300299

301300
type cipherGCMTLS uint8
@@ -445,17 +444,17 @@ func (g *cipherGCM) Seal(dst, nonce, plaintext, additionalData []byte) []byte {
445444
if err != nil {
446445
panic(err)
447446
}
448-
defer C.go_openssl_EVP_CIPHER_CTX_free(ctx)
447+
defer ossl.EVP_CIPHER_CTX_free(ctx)
449448
// Encrypt additional data.
450449
// When sealing a TLS payload, OpenSSL app sets the additional data using
451450
// 'EVP_CIPHER_CTX_ctrl(g.ctx, C.EVP_CTRL_AEAD_TLS1_AAD, C.EVP_AEAD_TLS1_AAD_LEN, base(additionalData))'.
452451
// This makes the explicit nonce component to monotonically increase on every Seal operation without
453452
// relying in the explicit nonce being securely set externally,
454453
// and it also gives some interesting speed gains.
455454
// Unfortunately we can't use it because Go expects AEAD.Seal to honor the provided nonce.
456-
if C.go_openssl_EVP_CIPHER_CTX_seal_wrapper(ctx, base(out), base(nonce),
457-
base(plaintext), C.int(len(plaintext)),
458-
base(additionalData), C.int(len(additionalData))) != 1 {
455+
if ossl.EVP_CIPHER_CTX_seal_wrapper(ctx, base(out), base(nonce),
456+
base(plaintext), int32(len(plaintext)),
457+
base(additionalData), int32(len(additionalData))) != nil {
459458

460459
panic(fail("EVP_CIPHER_CTX_seal"))
461460
}
@@ -492,13 +491,13 @@ func (g *cipherGCM) Open(dst, nonce, ciphertext, additionalData []byte) ([]byte,
492491
if err != nil {
493492
return nil, err
494493
}
495-
defer C.go_openssl_EVP_CIPHER_CTX_free(ctx)
496-
ok := C.go_openssl_EVP_CIPHER_CTX_open_wrapper(
494+
defer ossl.EVP_CIPHER_CTX_free(ctx)
495+
err = ossl.EVP_CIPHER_CTX_open_wrapper(
497496
ctx, base(out), base(nonce),
498-
base(ciphertext), C.int(len(ciphertext)),
499-
base(additionalData), C.int(len(additionalData)), base(tag))
497+
base(ciphertext), int32(len(ciphertext)),
498+
base(additionalData), int32(len(additionalData)), base(tag))
500499
runtime.KeepAlive(g)
501-
if ok == 0 {
500+
if err != nil {
502501
// Zero output buffer on error.
503502
for i := range out {
504503
out[i] = 0
@@ -520,35 +519,35 @@ func sliceForAppend(in []byte, n int) (head, tail []byte) {
520519
return
521520
}
522521

523-
func newCipherCtx(kind cipherKind, mode cipherMode, encrypt cipherOp, key, iv []byte) (_ C.GO_EVP_CIPHER_CTX_PTR, err error) {
522+
func newCipherCtx(kind cipherKind, mode cipherMode, encrypt cipherOp, key, iv []byte) (_ ossl.EVP_CIPHER_CTX_PTR, err error) {
524523
cipher := loadCipher(kind, mode)
525524
if cipher == nil {
526525
panic("crypto/cipher: unsupported cipher: " + kind.String())
527526
}
528-
ctx := C.go_openssl_EVP_CIPHER_CTX_new()
529-
if ctx == nil {
527+
ctx, err := ossl.EVP_CIPHER_CTX_new()
528+
if err != nil {
530529
return nil, fail("unable to create EVP cipher ctx")
531530
}
532531
defer func() {
533532
if err != nil {
534-
C.go_openssl_EVP_CIPHER_CTX_free(ctx)
533+
ossl.EVP_CIPHER_CTX_free(ctx)
535534
}
536535
}()
537536
if kind == cipherRC4 {
538537
// RC4 cipher supports a variable key length.
539538
// We need to set the key length before setting the key,
540539
// and to do so we need to have an initialized cipher ctx.
541-
if C.go_openssl_EVP_CipherInit_ex(ctx, cipher, nil, nil, nil, C.int(encrypt)) != 1 {
542-
return nil, newOpenSSLError("EVP_CipherInit_ex")
540+
if err := ossl.EVP_CipherInit_ex(ctx, cipher, nil, nil, nil, int32(encrypt)); err != nil {
541+
return nil, err
543542
}
544-
if C.go_openssl_EVP_CIPHER_CTX_set_key_length(ctx, C.int(len(key))) != 1 {
545-
return nil, newOpenSSLError("EVP_CIPHER_CTX_set_key_length")
543+
if err := ossl.EVP_CIPHER_CTX_set_key_length(ctx, int32(len(key))); err != nil {
544+
return nil, err
546545
}
547546
// Pass nil to the next call to EVP_CipherInit_ex to avoid resetting ctx's cipher.
548547
cipher = nil
549548
}
550-
if C.go_openssl_EVP_CipherInit_ex(ctx, cipher, nil, base(key), base(iv), C.int(encrypt)) != 1 {
551-
return nil, newOpenSSLError("unable to initialize EVP cipher ctx")
549+
if err := ossl.EVP_CipherInit_ex(ctx, cipher, nil, base(key), base(iv), int32(encrypt)); err != nil {
550+
return nil, err
552551
}
553552
return ctx, nil
554553
}

des.go

+1-3
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,7 @@
1-
//go:build !cmd_go_bootstrap
1+
//go:build !cmd_go_bootstrap && cgo
22

33
package openssl
44

5-
// #include "goopenssl.h"
6-
import "C"
75
import (
86
"crypto/cipher"
97
"errors"

0 commit comments

Comments
 (0)