2019-08-22 09:42:54 +08:00
|
|
|
/*
|
2023-09-28 21:23:29 +08:00
|
|
|
* Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved.
|
2019-08-22 09:42:54 +08:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* Dispatch functions for ARIA GCM mode */
|
|
|
|
|
2019-08-26 15:05:08 +08:00
|
|
|
#include "cipher_aria_gcm.h"
|
2019-10-04 21:20:48 +08:00
|
|
|
#include "prov/implementations.h"
|
2020-09-08 10:56:34 +08:00
|
|
|
#include "prov/providercommon.h"
|
2019-08-22 09:42:54 +08:00
|
|
|
|
|
|
|
static void *aria_gcm_newctx(void *provctx, size_t keybits)
|
|
|
|
{
|
2020-09-08 10:56:34 +08:00
|
|
|
PROV_ARIA_GCM_CTX *ctx;
|
2019-08-22 09:42:54 +08:00
|
|
|
|
2020-09-08 10:56:34 +08:00
|
|
|
if (!ossl_prov_is_running())
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
ctx = OPENSSL_zalloc(sizeof(*ctx));
|
2019-08-22 09:42:54 +08:00
|
|
|
if (ctx != NULL)
|
Fix external symbols in the provider cipher implementations.
Partial fix for #12964
This add ossl_ names for the following symbols.
chacha20_dinit, chacha20_einit, chacha20_initctx,
ccm_cipher, ccm_dinit, ccm_einit, ccm_generic_auth_decrypt, ccm_generic_auth_encrypt,
ccm_generic_gettag, ccm_generic_setaad, ccm_generic_setiv, ccm_get_ctx_params,
ccm_initctx, ccm_set_ctx_params, ccm_stream_final, ccm_stream_update
gcm_aad_update, gcm_cipher, gcm_cipher_final, gcm_cipher_update
gcm_dinit, gcm_einit, gcm_get_ctx_params, gcm_initctx, gcm_one_shot
gcm_set_ctx_params, gcm_setiv, gcm_stream_final, gcm_stream_update
tdes_dinit, tdes_dupctx, tdes_einit, tdes_freectx
tdes_get_ctx_params, tdes_gettable_ctx_params, tdes_newctx
PROV_CIPHER_HW_des_*,
padblock, unpadblock, tlsunpadblock, fillblock, trailingdata
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/14209)
2021-02-17 15:54:29 +08:00
|
|
|
ossl_gcm_initctx(provctx, &ctx->base, keybits,
|
2021-07-13 16:40:01 +08:00
|
|
|
ossl_prov_aria_hw_gcm(keybits));
|
2019-08-22 09:42:54 +08:00
|
|
|
return ctx;
|
|
|
|
}
|
|
|
|
|
2023-09-01 21:10:35 +08:00
|
|
|
static void *aria_gcm_dupctx(void *provctx)
|
|
|
|
{
|
|
|
|
PROV_ARIA_GCM_CTX *ctx = provctx;
|
2023-09-13 05:09:06 +08:00
|
|
|
PROV_ARIA_GCM_CTX *dctx = NULL;
|
2023-09-01 21:10:35 +08:00
|
|
|
|
|
|
|
if (ctx == NULL)
|
|
|
|
return NULL;
|
2023-09-13 05:09:06 +08:00
|
|
|
|
|
|
|
dctx = OPENSSL_memdup(ctx, sizeof(*ctx));
|
|
|
|
if (dctx != NULL && dctx->base.gcm.key != NULL)
|
|
|
|
dctx->base.gcm.key = &dctx->ks.ks;
|
|
|
|
|
|
|
|
return dctx;
|
2023-09-01 21:10:35 +08:00
|
|
|
}
|
|
|
|
|
2020-06-21 07:19:16 +08:00
|
|
|
static OSSL_FUNC_cipher_freectx_fn aria_gcm_freectx;
|
2019-08-22 09:42:54 +08:00
|
|
|
static void aria_gcm_freectx(void *vctx)
|
|
|
|
{
|
|
|
|
PROV_ARIA_GCM_CTX *ctx = (PROV_ARIA_GCM_CTX *)vctx;
|
|
|
|
|
|
|
|
OPENSSL_clear_free(ctx, sizeof(*ctx));
|
|
|
|
}
|
|
|
|
|
2020-09-28 10:28:29 +08:00
|
|
|
/* ossl_aria128gcm_functions */
|
2019-08-22 09:42:54 +08:00
|
|
|
IMPLEMENT_aead_cipher(aria, gcm, GCM, AEAD_FLAGS, 128, 8, 96);
|
2020-09-28 10:28:29 +08:00
|
|
|
/* ossl_aria192gcm_functions */
|
2019-08-22 09:42:54 +08:00
|
|
|
IMPLEMENT_aead_cipher(aria, gcm, GCM, AEAD_FLAGS, 192, 8, 96);
|
2020-09-28 10:28:29 +08:00
|
|
|
/* ossl_aria256gcm_functions */
|
2019-08-22 09:42:54 +08:00
|
|
|
IMPLEMENT_aead_cipher(aria, gcm, GCM, AEAD_FLAGS, 256, 8, 96);
|
|
|
|
|