mirror of
https://github.com/QuasarApp/openssl.git
synced 2025-05-08 07:29:41 +00:00
PROV: Move AES_CCM specialisation away from common cipher header
The AES_CCM specialisation was defined in the common cipher header providers/implementations/include/prov/ciphercommon_ccm.h, when it should in fact be in a local providers/implementations/ciphers/ header. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/10606)
This commit is contained in:
parent
3dbc5156b0
commit
e85f3a14f8
@ -59,4 +59,3 @@ const PROV_CIPHER_HW *PROV_CIPHER_HW_aes_cfb128(size_t keybits);
|
|||||||
const PROV_CIPHER_HW *PROV_CIPHER_HW_aes_cfb1(size_t keybits);
|
const PROV_CIPHER_HW *PROV_CIPHER_HW_aes_cfb1(size_t keybits);
|
||||||
const PROV_CIPHER_HW *PROV_CIPHER_HW_aes_cfb8(size_t keybits);
|
const PROV_CIPHER_HW *PROV_CIPHER_HW_aes_cfb8(size_t keybits);
|
||||||
const PROV_CIPHER_HW *PROV_CIPHER_HW_aes_ctr(size_t keybits);
|
const PROV_CIPHER_HW *PROV_CIPHER_HW_aes_ctr(size_t keybits);
|
||||||
|
|
||||||
|
@ -9,8 +9,7 @@
|
|||||||
|
|
||||||
/* Dispatch functions for AES CCM mode */
|
/* Dispatch functions for AES CCM mode */
|
||||||
|
|
||||||
#include "prov/ciphercommon.h"
|
#include "cipher_aes_ccm.h"
|
||||||
#include "prov/ciphercommon_ccm.h"
|
|
||||||
#include "prov/implementations.h"
|
#include "prov/implementations.h"
|
||||||
|
|
||||||
static void *aes_ccm_newctx(void *provctx, size_t keybits)
|
static void *aes_ccm_newctx(void *provctx, size_t keybits)
|
||||||
|
47
providers/implementations/ciphers/cipher_aes_ccm.h
Normal file
47
providers/implementations/ciphers/cipher_aes_ccm.h
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
/*
|
||||||
|
* Copyright 2019 The OpenSSL Project Authors. All Rights Reserved.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
||||||
|
* this file except in compliance with the License. You can obtain a copy
|
||||||
|
* in the file LICENSE in the source distribution or at
|
||||||
|
* https://www.openssl.org/source/license.html
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <openssl/aes.h>
|
||||||
|
#include "prov/ciphercommon.h"
|
||||||
|
#include "prov/ciphercommon_ccm.h"
|
||||||
|
|
||||||
|
typedef struct prov_aes_ccm_ctx_st {
|
||||||
|
PROV_CCM_CTX base; /* Must be first */
|
||||||
|
union {
|
||||||
|
OSSL_UNION_ALIGN;
|
||||||
|
/*-
|
||||||
|
* Padding is chosen so that s390x.kmac.k overlaps with ks.ks and
|
||||||
|
* fc with ks.ks.rounds. Remember that on s390x, an AES_KEY's
|
||||||
|
* rounds field is used to store the function code and that the key
|
||||||
|
* schedule is not stored (if aes hardware support is detected).
|
||||||
|
*/
|
||||||
|
struct {
|
||||||
|
unsigned char pad[16];
|
||||||
|
AES_KEY ks;
|
||||||
|
} ks;
|
||||||
|
#if defined(OPENSSL_CPUID_OBJ) && defined(__s390__)
|
||||||
|
struct {
|
||||||
|
S390X_KMAC_PARAMS kmac;
|
||||||
|
unsigned long long blocks;
|
||||||
|
union {
|
||||||
|
unsigned long long g[2];
|
||||||
|
unsigned char b[AES_BLOCK_SIZE];
|
||||||
|
} nonce;
|
||||||
|
union {
|
||||||
|
unsigned long long g[2];
|
||||||
|
unsigned char b[AES_BLOCK_SIZE];
|
||||||
|
} buf;
|
||||||
|
unsigned char dummy_pad[168];
|
||||||
|
unsigned int fc; /* fc has same offset as ks.ks.rounds */
|
||||||
|
} s390x;
|
||||||
|
#endif /* defined(OPENSSL_CPUID_OBJ) && defined(__s390__) */
|
||||||
|
} ccm;
|
||||||
|
} PROV_AES_CCM_CTX;
|
||||||
|
|
||||||
|
const PROV_CCM_HW *PROV_AES_HW_ccm(size_t keylen);
|
@ -9,8 +9,7 @@
|
|||||||
|
|
||||||
/* AES CCM mode */
|
/* AES CCM mode */
|
||||||
|
|
||||||
#include "prov/ciphercommon.h"
|
#include "cipher_aes_ccm.h"
|
||||||
#include "prov/ciphercommon_ccm.h"
|
|
||||||
|
|
||||||
#define AES_HW_CCM_SET_KEY_FN(fn_set_enc_key, fn_blk, fn_ccm_enc, fn_ccm_dec) \
|
#define AES_HW_CCM_SET_KEY_FN(fn_set_enc_key, fn_blk, fn_ccm_enc, fn_ccm_dec) \
|
||||||
fn_set_enc_key(key, keylen * 8, &actx->ccm.ks.ks); \
|
fn_set_enc_key(key, keylen * 8, &actx->ccm.ks.ks); \
|
||||||
|
@ -37,46 +37,13 @@ typedef struct prov_ccm_st {
|
|||||||
size_t keylen;
|
size_t keylen;
|
||||||
size_t tls_aad_len; /* TLS AAD length */
|
size_t tls_aad_len; /* TLS AAD length */
|
||||||
size_t tls_aad_pad_sz;
|
size_t tls_aad_pad_sz;
|
||||||
unsigned char iv[AES_BLOCK_SIZE];
|
unsigned char iv[GENERIC_BLOCK_SIZE];
|
||||||
unsigned char buf[AES_BLOCK_SIZE];
|
unsigned char buf[GENERIC_BLOCK_SIZE];
|
||||||
CCM128_CONTEXT ccm_ctx;
|
CCM128_CONTEXT ccm_ctx;
|
||||||
ccm128_f str;
|
ccm128_f str;
|
||||||
const PROV_CCM_HW *hw; /* hardware specific methods */
|
const PROV_CCM_HW *hw; /* hardware specific methods */
|
||||||
} PROV_CCM_CTX;
|
} PROV_CCM_CTX;
|
||||||
|
|
||||||
typedef struct prov_aes_ccm_ctx_st {
|
|
||||||
PROV_CCM_CTX base; /* Must be first */
|
|
||||||
union {
|
|
||||||
OSSL_UNION_ALIGN;
|
|
||||||
/*-
|
|
||||||
* Padding is chosen so that s390x.kmac.k overlaps with ks.ks and
|
|
||||||
* fc with ks.ks.rounds. Remember that on s390x, an AES_KEY's
|
|
||||||
* rounds field is used to store the function code and that the key
|
|
||||||
* schedule is not stored (if aes hardware support is detected).
|
|
||||||
*/
|
|
||||||
struct {
|
|
||||||
unsigned char pad[16];
|
|
||||||
AES_KEY ks;
|
|
||||||
} ks;
|
|
||||||
#if defined(OPENSSL_CPUID_OBJ) && defined(__s390__)
|
|
||||||
struct {
|
|
||||||
S390X_KMAC_PARAMS kmac;
|
|
||||||
unsigned long long blocks;
|
|
||||||
union {
|
|
||||||
unsigned long long g[2];
|
|
||||||
unsigned char b[AES_BLOCK_SIZE];
|
|
||||||
} nonce;
|
|
||||||
union {
|
|
||||||
unsigned long long g[2];
|
|
||||||
unsigned char b[AES_BLOCK_SIZE];
|
|
||||||
} buf;
|
|
||||||
unsigned char dummy_pad[168];
|
|
||||||
unsigned int fc; /* fc has same offset as ks.ks.rounds */
|
|
||||||
} s390x;
|
|
||||||
#endif /* defined(OPENSSL_CPUID_OBJ) && defined(__s390__) */
|
|
||||||
} ccm;
|
|
||||||
} PROV_AES_CCM_CTX;
|
|
||||||
|
|
||||||
PROV_CIPHER_FUNC(int, CCM_cipher, (PROV_CCM_CTX *ctx, unsigned char *out, \
|
PROV_CIPHER_FUNC(int, CCM_cipher, (PROV_CCM_CTX *ctx, unsigned char *out, \
|
||||||
size_t *padlen, const unsigned char *in, \
|
size_t *padlen, const unsigned char *in, \
|
||||||
size_t len));
|
size_t len));
|
||||||
@ -111,8 +78,6 @@ struct prov_ccm_hw_st {
|
|||||||
OSSL_CCM_gettag_fn gettag;
|
OSSL_CCM_gettag_fn gettag;
|
||||||
};
|
};
|
||||||
|
|
||||||
const PROV_CCM_HW *PROV_AES_HW_ccm(size_t keylen);
|
|
||||||
|
|
||||||
OSSL_OP_cipher_encrypt_init_fn ccm_einit;
|
OSSL_OP_cipher_encrypt_init_fn ccm_einit;
|
||||||
OSSL_OP_cipher_decrypt_init_fn ccm_dinit;
|
OSSL_OP_cipher_decrypt_init_fn ccm_dinit;
|
||||||
OSSL_OP_cipher_get_ctx_params_fn ccm_get_ctx_params;
|
OSSL_OP_cipher_get_ctx_params_fn ccm_get_ctx_params;
|
||||||
|
Loading…
x
Reference in New Issue
Block a user