2 * Copyright 2019 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
10 #include <openssl/evp.h>
11 #include <openssl/err.h>
12 #include <openssl/core.h>
13 #include <openssl/core_numbers.h>
14 #include <openssl/kdf.h>
15 #include "crypto/evp.h"
16 #include "internal/provider.h"
17 #include "evp_local.h"
19 static int evp_kdf_up_ref(void *vkdf)
21 EVP_KDF *kdf = (EVP_KDF *)vkdf;
24 CRYPTO_UP_REF(&kdf->refcnt, &ref, kdf->lock);
28 static void evp_kdf_free(void *vkdf){
29 EVP_KDF *kdf = (EVP_KDF *)vkdf;
33 CRYPTO_DOWN_REF(&kdf->refcnt, &ref, kdf->lock);
35 ossl_provider_free(kdf->prov);
36 CRYPTO_THREAD_lock_free(kdf->lock);
42 static void *evp_kdf_new(void)
46 if ((kdf = OPENSSL_zalloc(sizeof(*kdf))) == NULL
47 || (kdf->lock = CRYPTO_THREAD_lock_new()) == NULL) {
55 static void *evp_kdf_from_dispatch(int name_id,
56 const OSSL_DISPATCH *fns,
60 int fnkdfcnt = 0, fnctxcnt = 0;
62 if ((kdf = evp_kdf_new()) == NULL) {
63 EVPerr(0, ERR_R_MALLOC_FAILURE);
66 kdf->name_id = name_id;
68 for (; fns->function_id != 0; fns++) {
69 switch (fns->function_id) {
70 case OSSL_FUNC_KDF_NEWCTX:
71 if (kdf->newctx != NULL)
73 kdf->newctx = OSSL_get_OP_kdf_newctx(fns);
76 case OSSL_FUNC_KDF_DUPCTX:
77 if (kdf->dupctx != NULL)
79 kdf->dupctx = OSSL_get_OP_kdf_dupctx(fns);
81 case OSSL_FUNC_KDF_FREECTX:
82 if (kdf->freectx != NULL)
84 kdf->freectx = OSSL_get_OP_kdf_freectx(fns);
87 case OSSL_FUNC_KDF_RESET:
88 if (kdf->reset != NULL)
90 kdf->reset = OSSL_get_OP_kdf_reset(fns);
92 case OSSL_FUNC_KDF_DERIVE:
93 if (kdf->derive != NULL)
95 kdf->derive = OSSL_get_OP_kdf_derive(fns);
98 case OSSL_FUNC_KDF_GETTABLE_PARAMS:
99 if (kdf->gettable_params != NULL)
101 kdf->gettable_params =
102 OSSL_get_OP_kdf_gettable_params(fns);
104 case OSSL_FUNC_KDF_GETTABLE_CTX_PARAMS:
105 if (kdf->gettable_ctx_params != NULL)
107 kdf->gettable_ctx_params =
108 OSSL_get_OP_kdf_gettable_ctx_params(fns);
110 case OSSL_FUNC_KDF_SETTABLE_CTX_PARAMS:
111 if (kdf->settable_ctx_params != NULL)
113 kdf->settable_ctx_params =
114 OSSL_get_OP_kdf_settable_ctx_params(fns);
116 case OSSL_FUNC_KDF_GET_PARAMS:
117 if (kdf->get_params != NULL)
119 kdf->get_params = OSSL_get_OP_kdf_get_params(fns);
121 case OSSL_FUNC_KDF_GET_CTX_PARAMS:
122 if (kdf->get_ctx_params != NULL)
124 kdf->get_ctx_params = OSSL_get_OP_kdf_get_ctx_params(fns);
126 case OSSL_FUNC_KDF_SET_CTX_PARAMS:
127 if (kdf->set_ctx_params != NULL)
129 kdf->set_ctx_params = OSSL_get_OP_kdf_set_ctx_params(fns);
133 if (fnkdfcnt != 1 || fnctxcnt != 2) {
135 * In order to be a consistent set of functions we must have at least
136 * a derive function, and a complete set of context management
140 ERR_raise(ERR_LIB_EVP, EVP_R_INVALID_PROVIDER_FUNCTIONS);
145 ossl_provider_up_ref(prov);
150 EVP_KDF *EVP_KDF_fetch(OPENSSL_CTX *libctx, const char *algorithm,
151 const char *properties)
153 return evp_generic_fetch(libctx, OSSL_OP_KDF, algorithm, properties,
154 evp_kdf_from_dispatch, evp_kdf_up_ref,
158 int EVP_KDF_up_ref(EVP_KDF *kdf)
160 return evp_kdf_up_ref(kdf);
163 void EVP_KDF_free(EVP_KDF *kdf)
168 const OSSL_PARAM *EVP_KDF_gettable_params(const EVP_KDF *kdf)
170 if (kdf->gettable_params == NULL)
172 return kdf->gettable_params();
175 const OSSL_PARAM *EVP_KDF_gettable_ctx_params(const EVP_KDF *kdf)
177 if (kdf->gettable_ctx_params == NULL)
179 return kdf->gettable_ctx_params();
182 const OSSL_PARAM *EVP_KDF_settable_ctx_params(const EVP_KDF *kdf)
184 if (kdf->settable_ctx_params == NULL)
186 return kdf->settable_ctx_params();
189 void EVP_KDF_do_all_provided(OPENSSL_CTX *libctx,
190 void (*fn)(EVP_KDF *kdf, void *arg),
193 evp_generic_do_all(libctx, OSSL_OP_KDF,
194 (void (*)(void *, void *))fn, arg,
195 evp_kdf_from_dispatch, evp_kdf_free);