2019-08-22 09:42:54 +08:00
|
|
|
/*
|
2023-09-28 21:23:29 +08:00
|
|
|
* Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved.
|
2019-08-22 09:42:54 +08:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
|
|
|
*/
|
|
|
|
|
2019-12-06 01:09:49 +08:00
|
|
|
/*
|
|
|
|
* AES low level APIs are deprecated for public use, but still ok for internal
|
|
|
|
* use where we're using them to implement the higher level EVP interface, as is
|
|
|
|
* the case here.
|
|
|
|
*/
|
|
|
|
#include "internal/deprecated.h"
|
|
|
|
|
2019-08-22 09:42:54 +08:00
|
|
|
/* Dispatch functions for AES CCM mode */
|
|
|
|
|
2019-12-11 20:11:34 +08:00
|
|
|
#include "cipher_aes_ccm.h"
|
2019-10-04 21:20:48 +08:00
|
|
|
#include "prov/implementations.h"
|
2020-09-08 10:56:34 +08:00
|
|
|
#include "prov/providercommon.h"
|
2019-08-22 09:42:54 +08:00
|
|
|
|
|
|
|
static void *aes_ccm_newctx(void *provctx, size_t keybits)
|
|
|
|
{
|
2020-09-08 10:56:34 +08:00
|
|
|
PROV_AES_CCM_CTX *ctx;
|
2019-08-22 09:42:54 +08:00
|
|
|
|
2020-09-08 10:56:34 +08:00
|
|
|
if (!ossl_prov_is_running())
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
ctx = OPENSSL_zalloc(sizeof(*ctx));
|
2019-08-22 09:42:54 +08:00
|
|
|
if (ctx != NULL)
|
Fix external symbols in the provider cipher implementations.
Partial fix for #12964
This add ossl_ names for the following symbols.
chacha20_dinit, chacha20_einit, chacha20_initctx,
ccm_cipher, ccm_dinit, ccm_einit, ccm_generic_auth_decrypt, ccm_generic_auth_encrypt,
ccm_generic_gettag, ccm_generic_setaad, ccm_generic_setiv, ccm_get_ctx_params,
ccm_initctx, ccm_set_ctx_params, ccm_stream_final, ccm_stream_update
gcm_aad_update, gcm_cipher, gcm_cipher_final, gcm_cipher_update
gcm_dinit, gcm_einit, gcm_get_ctx_params, gcm_initctx, gcm_one_shot
gcm_set_ctx_params, gcm_setiv, gcm_stream_final, gcm_stream_update
tdes_dinit, tdes_dupctx, tdes_einit, tdes_freectx
tdes_get_ctx_params, tdes_gettable_ctx_params, tdes_newctx
PROV_CIPHER_HW_des_*,
padblock, unpadblock, tlsunpadblock, fillblock, trailingdata
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/14209)
2021-02-17 15:54:29 +08:00
|
|
|
ossl_ccm_initctx(&ctx->base, keybits, ossl_prov_aes_hw_ccm(keybits));
|
2019-08-22 09:42:54 +08:00
|
|
|
return ctx;
|
|
|
|
}
|
|
|
|
|
2023-09-01 21:10:35 +08:00
|
|
|
static void *aes_ccm_dupctx(void *provctx)
|
|
|
|
{
|
|
|
|
PROV_AES_CCM_CTX *ctx = provctx;
|
|
|
|
PROV_AES_CCM_CTX *dupctx = NULL;
|
|
|
|
|
|
|
|
if (ctx == NULL)
|
|
|
|
return NULL;
|
|
|
|
dupctx = OPENSSL_memdup(provctx, sizeof(*ctx));
|
|
|
|
if (dupctx == NULL)
|
|
|
|
return NULL;
|
|
|
|
/*
|
|
|
|
* ossl_cm_initctx, via the ossl_prov_aes_hw_ccm functions assign a
|
|
|
|
* provctx->ccm.ks.ks to the ccm context key so we need to point it to
|
|
|
|
* the memduped copy
|
|
|
|
*/
|
|
|
|
dupctx->base.ccm_ctx.key = &dupctx->ccm.ks.ks;
|
|
|
|
|
|
|
|
return dupctx;
|
|
|
|
}
|
|
|
|
|
2020-06-21 07:19:16 +08:00
|
|
|
static OSSL_FUNC_cipher_freectx_fn aes_ccm_freectx;
|
2019-08-22 09:42:54 +08:00
|
|
|
static void aes_ccm_freectx(void *vctx)
|
|
|
|
{
|
|
|
|
PROV_AES_CCM_CTX *ctx = (PROV_AES_CCM_CTX *)vctx;
|
|
|
|
|
|
|
|
OPENSSL_clear_free(ctx, sizeof(*ctx));
|
|
|
|
}
|
|
|
|
|
2020-09-28 10:28:29 +08:00
|
|
|
/* ossl_aes128ccm_functions */
|
2019-08-22 09:42:54 +08:00
|
|
|
IMPLEMENT_aead_cipher(aes, ccm, CCM, AEAD_FLAGS, 128, 8, 96);
|
2020-09-28 10:28:29 +08:00
|
|
|
/* ossl_aes192ccm_functions */
|
2019-08-22 09:42:54 +08:00
|
|
|
IMPLEMENT_aead_cipher(aes, ccm, CCM, AEAD_FLAGS, 192, 8, 96);
|
2020-09-28 10:28:29 +08:00
|
|
|
/* ossl_aes256ccm_functions */
|
2019-08-22 09:42:54 +08:00
|
|
|
IMPLEMENT_aead_cipher(aes, ccm, CCM, AEAD_FLAGS, 256, 8, 96);
|