2019-08-22 11:42:54 +10:00
|
|
|
/*
|
2021-03-11 13:27:36 +00:00
|
|
|
* Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved.
|
2019-08-22 11:42:54 +10:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
|
|
|
*/
|
|
|
|
|
2019-12-05 17:09:49 +00:00
|
|
|
/*
|
|
|
|
* AES low level APIs are deprecated for public use, but still ok for internal
|
|
|
|
* use where we're using them to implement the higher level EVP interface, as is
|
|
|
|
* the case here.
|
|
|
|
*/
|
|
|
|
#include "internal/deprecated.h"
|
|
|
|
|
2019-08-22 11:42:54 +10:00
|
|
|
/* Dispatch functions for AES GCM mode */
|
|
|
|
|
2019-12-11 13:43:24 +01:00
|
|
|
#include "cipher_aes_gcm.h"
|
2019-10-04 15:20:48 +02:00
|
|
|
#include "prov/implementations.h"
|
2020-09-08 12:56:34 +10:00
|
|
|
#include "prov/providercommon.h"
|
2019-08-22 11:42:54 +10:00
|
|
|
|
2020-09-15 11:08:27 +10:00
|
|
|
#define AES_GCM_IV_MIN_SIZE (64 / 8) /* size in bytes */
|
|
|
|
/* Note: GCM_IV_MAX_SIZE is listed in ciphercommon_gcm.h */
|
|
|
|
|
2019-08-22 11:42:54 +10:00
|
|
|
static void *aes_gcm_newctx(void *provctx, size_t keybits)
|
|
|
|
{
|
2020-09-08 12:56:34 +10:00
|
|
|
PROV_AES_GCM_CTX *ctx;
|
2019-08-22 11:42:54 +10:00
|
|
|
|
2020-09-08 12:56:34 +10:00
|
|
|
if (!ossl_prov_is_running())
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
ctx = OPENSSL_zalloc(sizeof(*ctx));
|
2019-08-22 11:42:54 +10:00
|
|
|
if (ctx != NULL)
|
Fix external symbols in the provider cipher implementations.
Partial fix for #12964
This add ossl_ names for the following symbols.
chacha20_dinit, chacha20_einit, chacha20_initctx,
ccm_cipher, ccm_dinit, ccm_einit, ccm_generic_auth_decrypt, ccm_generic_auth_encrypt,
ccm_generic_gettag, ccm_generic_setaad, ccm_generic_setiv, ccm_get_ctx_params,
ccm_initctx, ccm_set_ctx_params, ccm_stream_final, ccm_stream_update
gcm_aad_update, gcm_cipher, gcm_cipher_final, gcm_cipher_update
gcm_dinit, gcm_einit, gcm_get_ctx_params, gcm_initctx, gcm_one_shot
gcm_set_ctx_params, gcm_setiv, gcm_stream_final, gcm_stream_update
tdes_dinit, tdes_dupctx, tdes_einit, tdes_freectx
tdes_get_ctx_params, tdes_gettable_ctx_params, tdes_newctx
PROV_CIPHER_HW_des_*,
padblock, unpadblock, tlsunpadblock, fillblock, trailingdata
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/14209)
2021-02-17 17:54:29 +10:00
|
|
|
ossl_gcm_initctx(provctx, &ctx->base, keybits,
|
|
|
|
ossl_prov_aes_hw_gcm(keybits), AES_GCM_IV_MIN_SIZE);
|
2019-08-22 11:42:54 +10:00
|
|
|
return ctx;
|
|
|
|
}
|
|
|
|
|
2020-06-21 01:19:16 +02:00
|
|
|
static OSSL_FUNC_cipher_freectx_fn aes_gcm_freectx;
|
2019-08-22 11:42:54 +10:00
|
|
|
static void aes_gcm_freectx(void *vctx)
|
|
|
|
{
|
|
|
|
PROV_AES_GCM_CTX *ctx = (PROV_AES_GCM_CTX *)vctx;
|
|
|
|
|
|
|
|
OPENSSL_clear_free(ctx, sizeof(*ctx));
|
|
|
|
}
|
|
|
|
|
2020-09-28 12:28:29 +10:00
|
|
|
/* ossl_aes128gcm_functions */
|
2019-08-22 11:42:54 +10:00
|
|
|
IMPLEMENT_aead_cipher(aes, gcm, GCM, AEAD_FLAGS, 128, 8, 96);
|
2020-09-28 12:28:29 +10:00
|
|
|
/* ossl_aes192gcm_functions */
|
2019-08-22 11:42:54 +10:00
|
|
|
IMPLEMENT_aead_cipher(aes, gcm, GCM, AEAD_FLAGS, 192, 8, 96);
|
2020-09-28 12:28:29 +10:00
|
|
|
/* ossl_aes256gcm_functions */
|
2019-08-22 11:42:54 +10:00
|
|
|
IMPLEMENT_aead_cipher(aes, gcm, GCM, AEAD_FLAGS, 256, 8, 96);
|