1
- //go:build !cmd_go_bootstrap
1
+ //go:build !cmd_go_bootstrap && cgo
2
2
3
3
package openssl
4
4
5
- // #include "goopenssl.h"
6
- import "C"
7
-
8
5
import (
9
6
"crypto/cipher"
10
7
"encoding/binary"
@@ -13,6 +10,8 @@ import (
13
10
"strconv"
14
11
"sync"
15
12
"unsafe"
13
+
14
+ "github.com/golang-fips/openssl/v2/internal/ossl"
16
15
)
17
16
18
17
type cipherKind int8
@@ -76,70 +75,70 @@ type cacheCipherKey struct {
76
75
}
77
76
78
77
// loadCipher returns a cipher object for the given k.
79
- func loadCipher (k cipherKind , mode cipherMode ) (cipher C. GO_EVP_CIPHER_PTR ) {
78
+ func loadCipher (k cipherKind , mode cipherMode ) (cipher ossl. EVP_CIPHER_PTR ) {
80
79
if v , ok := cacheCipher .Load (cacheCipherKey {k , mode }); ok {
81
- return v .(C. GO_EVP_CIPHER_PTR )
80
+ return v .(ossl. EVP_CIPHER_PTR )
82
81
}
83
82
defer func () {
84
83
if cipher != nil && vMajor == 3 {
85
84
// On OpenSSL 3, directly operating on a EVP_CIPHER object
86
85
// not created by EVP_CIPHER has negative performance
87
86
// implications, as cipher operations will have
88
87
// to fetch it on every call. Better to just fetch it once here.
89
- cipher = C . go_openssl_EVP_CIPHER_fetch (nil , C . go_openssl_EVP_CIPHER_get0_name (cipher ), nil )
88
+ cipher , _ = ossl . EVP_CIPHER_fetch (nil , ossl . EVP_CIPHER_get0_name (cipher ), nil )
90
89
}
91
90
cacheCipher .Store (cacheCipherKey {k , mode }, cipher )
92
91
}()
93
92
switch k {
94
93
case cipherAES128 :
95
94
switch mode {
96
95
case cipherModeECB :
97
- cipher = C . go_openssl_EVP_aes_128_ecb ()
96
+ cipher = ossl . EVP_aes_128_ecb ()
98
97
case cipherModeCBC :
99
- cipher = C . go_openssl_EVP_aes_128_cbc ()
98
+ cipher = ossl . EVP_aes_128_cbc ()
100
99
case cipherModeCTR :
101
- cipher = C . go_openssl_EVP_aes_128_ctr ()
100
+ cipher = ossl . EVP_aes_128_ctr ()
102
101
case cipherModeGCM :
103
- cipher = C . go_openssl_EVP_aes_128_gcm ()
102
+ cipher = ossl . EVP_aes_128_gcm ()
104
103
}
105
104
case cipherAES192 :
106
105
switch mode {
107
106
case cipherModeECB :
108
- cipher = C . go_openssl_EVP_aes_192_ecb ()
107
+ cipher = ossl . EVP_aes_192_ecb ()
109
108
case cipherModeCBC :
110
- cipher = C . go_openssl_EVP_aes_192_cbc ()
109
+ cipher = ossl . EVP_aes_192_cbc ()
111
110
case cipherModeCTR :
112
- cipher = C . go_openssl_EVP_aes_192_ctr ()
111
+ cipher = ossl . EVP_aes_192_ctr ()
113
112
case cipherModeGCM :
114
- cipher = C . go_openssl_EVP_aes_192_gcm ()
113
+ cipher = ossl . EVP_aes_192_gcm ()
115
114
}
116
115
case cipherAES256 :
117
116
switch mode {
118
117
case cipherModeECB :
119
- cipher = C . go_openssl_EVP_aes_256_ecb ()
118
+ cipher = ossl . EVP_aes_256_ecb ()
120
119
case cipherModeCBC :
121
- cipher = C . go_openssl_EVP_aes_256_cbc ()
120
+ cipher = ossl . EVP_aes_256_cbc ()
122
121
case cipherModeCTR :
123
- cipher = C . go_openssl_EVP_aes_256_ctr ()
122
+ cipher = ossl . EVP_aes_256_ctr ()
124
123
case cipherModeGCM :
125
- cipher = C . go_openssl_EVP_aes_256_gcm ()
124
+ cipher = ossl . EVP_aes_256_gcm ()
126
125
}
127
126
case cipherDES :
128
127
switch mode {
129
128
case cipherModeECB :
130
- cipher = C . go_openssl_EVP_des_ecb ()
129
+ cipher = ossl . EVP_des_ecb ()
131
130
case cipherModeCBC :
132
- cipher = C . go_openssl_EVP_des_cbc ()
131
+ cipher = ossl . EVP_des_cbc ()
133
132
}
134
133
case cipherDES3 :
135
134
switch mode {
136
135
case cipherModeECB :
137
- cipher = C . go_openssl_EVP_des_ede3_ecb ()
136
+ cipher = ossl . EVP_des_ede3_ecb ()
138
137
case cipherModeCBC :
139
- cipher = C . go_openssl_EVP_des_ede3_cbc ()
138
+ cipher = ossl . EVP_des_ede3_cbc ()
140
139
}
141
140
case cipherRC4 :
142
- cipher = C . go_openssl_EVP_rc4 ()
141
+ cipher = ossl . EVP_rc4 ()
143
142
}
144
143
return cipher
145
144
}
@@ -157,7 +156,7 @@ func newEVPCipher(key []byte, kind cipherKind) (*evpCipher, error) {
157
156
}
158
157
c := & evpCipher {key : make ([]byte , len (key )), kind : kind }
159
158
copy (c .key , key )
160
- c .blockSize = int (C . go_openssl_EVP_CIPHER_get_block_size (cipher ))
159
+ c .blockSize = int (ossl . EVP_CIPHER_get_block_size (cipher ))
161
160
return c , nil
162
161
}
163
162
@@ -177,9 +176,9 @@ func (c *evpCipher) encrypt(dst, src []byte) error {
177
176
if err != nil {
178
177
return err
179
178
}
180
- defer C . go_openssl_EVP_CIPHER_CTX_free (enc_ctx )
179
+ defer ossl . EVP_CIPHER_CTX_free (enc_ctx )
181
180
182
- if C . go_openssl_EVP_EncryptUpdate_wrapper (enc_ctx , base (dst ), base (src ), C . int (c .blockSize )) != 1 {
181
+ if ossl . EVP_EncryptUpdate_wrapper (enc_ctx , unsafe . SliceData (dst ), unsafe . SliceData (src ), int32 (c .blockSize )) != nil {
183
182
return errors .New ("EncryptUpdate failed" )
184
183
}
185
184
runtime .KeepAlive (c )
@@ -202,24 +201,24 @@ func (c *evpCipher) decrypt(dst, src []byte) error {
202
201
if err != nil {
203
202
return err
204
203
}
205
- defer C . go_openssl_EVP_CIPHER_CTX_free (dec_ctx )
204
+ defer ossl . EVP_CIPHER_CTX_free (dec_ctx )
206
205
207
- if C . go_openssl_EVP_CIPHER_CTX_set_padding (dec_ctx , 0 ) != 1 {
206
+ if ossl . EVP_CIPHER_CTX_set_padding (dec_ctx , 0 ) != nil {
208
207
return errors .New ("could not disable cipher padding" )
209
208
}
210
209
211
- C . go_openssl_EVP_DecryptUpdate_wrapper (dec_ctx , base (dst ), base (src ), C . int (c .blockSize ))
210
+ ossl . EVP_DecryptUpdate_wrapper (dec_ctx , unsafe . SliceData (dst ), unsafe . SliceData (src ), int32 (c .blockSize ))
212
211
runtime .KeepAlive (c )
213
212
return nil
214
213
}
215
214
216
215
type cipherCBC struct {
217
- ctx C. GO_EVP_CIPHER_CTX_PTR
216
+ ctx ossl. EVP_CIPHER_CTX_PTR
218
217
blockSize int
219
218
}
220
219
221
220
func (c * cipherCBC ) finalize () {
222
- C . go_openssl_EVP_CIPHER_CTX_free (c .ctx )
221
+ ossl . EVP_CIPHER_CTX_free (c .ctx )
223
222
}
224
223
225
224
func (x * cipherCBC ) BlockSize () int { return x .blockSize }
@@ -235,7 +234,7 @@ func (x *cipherCBC) CryptBlocks(dst, src []byte) {
235
234
panic ("crypto/cipher: output smaller than input" )
236
235
}
237
236
if len (src ) > 0 {
238
- if C . go_openssl_EVP_CipherUpdate_wrapper (x .ctx , base (dst ), base (src ), C . int (len (src ))) != 1 {
237
+ if ossl . EVP_CipherUpdate_wrapper (x .ctx , unsafe . SliceData (dst ), unsafe . SliceData (src ), int32 (len (src ))) != nil {
239
238
panic ("crypto/cipher: CipherUpdate failed" )
240
239
}
241
240
runtime .KeepAlive (x )
@@ -246,7 +245,7 @@ func (x *cipherCBC) SetIV(iv []byte) {
246
245
if len (iv ) != x .blockSize {
247
246
panic ("cipher: incorrect length IV" )
248
247
}
249
- if C . go_openssl_EVP_CipherInit_ex (x .ctx , nil , nil , nil , base (iv ), C . int (cipherOpNone )) != 1 {
248
+ if ossl . EVP_CipherInit_ex (x .ctx , nil , nil , nil , unsafe . SliceData (iv ), int32 (cipherOpNone )) != nil {
250
249
panic ("cipher: unable to initialize EVP cipher ctx" )
251
250
}
252
251
}
@@ -258,14 +257,14 @@ func (c *evpCipher) newCBC(iv []byte, op cipherOp) cipher.BlockMode {
258
257
}
259
258
x := & cipherCBC {ctx : ctx , blockSize : c .blockSize }
260
259
runtime .SetFinalizer (x , (* cipherCBC ).finalize )
261
- if C . go_openssl_EVP_CIPHER_CTX_set_padding (x .ctx , 0 ) != 1 {
260
+ if ossl . EVP_CIPHER_CTX_set_padding (x .ctx , 0 ) != nil {
262
261
panic ("cipher: unable to set padding" )
263
262
}
264
263
return x
265
264
}
266
265
267
266
type cipherCTR struct {
268
- ctx C. GO_EVP_CIPHER_CTX_PTR
267
+ ctx ossl. EVP_CIPHER_CTX_PTR
269
268
}
270
269
271
270
func (x * cipherCTR ) XORKeyStream (dst , src []byte ) {
@@ -278,7 +277,7 @@ func (x *cipherCTR) XORKeyStream(dst, src []byte) {
278
277
if len (src ) == 0 {
279
278
return
280
279
}
281
- if C . go_openssl_EVP_EncryptUpdate_wrapper (x .ctx , base (dst ), base (src ), C . int (len (src ))) != 1 {
280
+ if ossl . EVP_EncryptUpdate_wrapper (x .ctx , base (dst ), base (src ), int32 (len (src ))) != nil {
282
281
panic ("crypto/cipher: EncryptUpdate failed" )
283
282
}
284
283
runtime .KeepAlive (x )
@@ -295,7 +294,7 @@ func (c *evpCipher) newCTR(iv []byte) cipher.Stream {
295
294
}
296
295
297
296
func (c * cipherCTR ) finalize () {
298
- C . go_openssl_EVP_CIPHER_CTX_free (c .ctx )
297
+ ossl . EVP_CIPHER_CTX_free (c .ctx )
299
298
}
300
299
301
300
type cipherGCMTLS uint8
@@ -445,17 +444,17 @@ func (g *cipherGCM) Seal(dst, nonce, plaintext, additionalData []byte) []byte {
445
444
if err != nil {
446
445
panic (err )
447
446
}
448
- defer C . go_openssl_EVP_CIPHER_CTX_free (ctx )
447
+ defer ossl . EVP_CIPHER_CTX_free (ctx )
449
448
// Encrypt additional data.
450
449
// When sealing a TLS payload, OpenSSL app sets the additional data using
451
450
// 'EVP_CIPHER_CTX_ctrl(g.ctx, C.EVP_CTRL_AEAD_TLS1_AAD, C.EVP_AEAD_TLS1_AAD_LEN, base(additionalData))'.
452
451
// This makes the explicit nonce component to monotonically increase on every Seal operation without
453
452
// relying in the explicit nonce being securely set externally,
454
453
// and it also gives some interesting speed gains.
455
454
// Unfortunately we can't use it because Go expects AEAD.Seal to honor the provided nonce.
456
- if C . go_openssl_EVP_CIPHER_CTX_seal_wrapper (ctx , base (out ), base (nonce ),
457
- base (plaintext ), C . int (len (plaintext )),
458
- base (additionalData ), C . int (len (additionalData ))) != 1 {
455
+ if ossl . EVP_CIPHER_CTX_seal_wrapper (ctx , base (out ), base (nonce ),
456
+ base (plaintext ), int32 (len (plaintext )),
457
+ base (additionalData ), int32 (len (additionalData ))) != nil {
459
458
460
459
panic (fail ("EVP_CIPHER_CTX_seal" ))
461
460
}
@@ -492,13 +491,13 @@ func (g *cipherGCM) Open(dst, nonce, ciphertext, additionalData []byte) ([]byte,
492
491
if err != nil {
493
492
return nil , err
494
493
}
495
- defer C . go_openssl_EVP_CIPHER_CTX_free (ctx )
496
- ok := C . go_openssl_EVP_CIPHER_CTX_open_wrapper (
494
+ defer ossl . EVP_CIPHER_CTX_free (ctx )
495
+ err = ossl . EVP_CIPHER_CTX_open_wrapper (
497
496
ctx , base (out ), base (nonce ),
498
- base (ciphertext ), C . int (len (ciphertext )),
499
- base (additionalData ), C . int (len (additionalData )), base (tag ))
497
+ base (ciphertext ), int32 (len (ciphertext )),
498
+ base (additionalData ), int32 (len (additionalData )), base (tag ))
500
499
runtime .KeepAlive (g )
501
- if ok == 0 {
500
+ if err != nil {
502
501
// Zero output buffer on error.
503
502
for i := range out {
504
503
out [i ] = 0
@@ -520,35 +519,35 @@ func sliceForAppend(in []byte, n int) (head, tail []byte) {
520
519
return
521
520
}
522
521
523
- func newCipherCtx (kind cipherKind , mode cipherMode , encrypt cipherOp , key , iv []byte ) (_ C. GO_EVP_CIPHER_CTX_PTR , err error ) {
522
+ func newCipherCtx (kind cipherKind , mode cipherMode , encrypt cipherOp , key , iv []byte ) (_ ossl. EVP_CIPHER_CTX_PTR , err error ) {
524
523
cipher := loadCipher (kind , mode )
525
524
if cipher == nil {
526
525
panic ("crypto/cipher: unsupported cipher: " + kind .String ())
527
526
}
528
- ctx := C . go_openssl_EVP_CIPHER_CTX_new ()
529
- if ctx = = nil {
527
+ ctx , err := ossl . EVP_CIPHER_CTX_new ()
528
+ if err ! = nil {
530
529
return nil , fail ("unable to create EVP cipher ctx" )
531
530
}
532
531
defer func () {
533
532
if err != nil {
534
- C . go_openssl_EVP_CIPHER_CTX_free (ctx )
533
+ ossl . EVP_CIPHER_CTX_free (ctx )
535
534
}
536
535
}()
537
536
if kind == cipherRC4 {
538
537
// RC4 cipher supports a variable key length.
539
538
// We need to set the key length before setting the key,
540
539
// and to do so we need to have an initialized cipher ctx.
541
- if C . go_openssl_EVP_CipherInit_ex (ctx , cipher , nil , nil , nil , C . int (encrypt )) != 1 {
542
- return nil , newOpenSSLError ( "EVP_CipherInit_ex" )
540
+ if err := ossl . EVP_CipherInit_ex (ctx , cipher , nil , nil , nil , int32 (encrypt )); err != nil {
541
+ return nil , err
543
542
}
544
- if C . go_openssl_EVP_CIPHER_CTX_set_key_length (ctx , C . int (len (key ))) != 1 {
545
- return nil , newOpenSSLError ( "EVP_CIPHER_CTX_set_key_length" )
543
+ if err := ossl . EVP_CIPHER_CTX_set_key_length (ctx , int32 (len (key ))); err != nil {
544
+ return nil , err
546
545
}
547
546
// Pass nil to the next call to EVP_CipherInit_ex to avoid resetting ctx's cipher.
548
547
cipher = nil
549
548
}
550
- if C . go_openssl_EVP_CipherInit_ex (ctx , cipher , nil , base (key ), base (iv ), C . int (encrypt )) != 1 {
551
- return nil , newOpenSSLError ( "unable to initialize EVP cipher ctx" )
549
+ if err := ossl . EVP_CipherInit_ex (ctx , cipher , nil , base (key ), base (iv ), int32 (encrypt )); err != nil {
550
+ return nil , err
552
551
}
553
552
return ctx , nil
554
553
}
0 commit comments