summaryrefslogtreecommitdiff
path: root/src/lib
diff options
context:
space:
mode:
authormiod <>2014-07-12 20:37:07 +0000
committermiod <>2014-07-12 20:37:07 +0000
commit88f737c074f7fdc1e089af4d15ae3c420ff0d092 (patch)
treee67071d02cca9a7404ea722ca23c1c7db6394a98 /src/lib
parentf9a1965b55172034933a39d8fb8dfd6a6d32c7a7 (diff)
downloadopenbsd-88f737c074f7fdc1e089af4d15ae3c420ff0d092.tar.gz
openbsd-88f737c074f7fdc1e089af4d15ae3c420ff0d092.tar.bz2
openbsd-88f737c074f7fdc1e089af4d15ae3c420ff0d092.zip
We have EVP_CIPH_FLAG_DEFAULT_ASN1 in evp.h; no need to keep constructs to
build on pre-EVP_CIPH_FLAG_DEFAULT_ASN1 codebases. ok jsing@
Diffstat (limited to 'src/lib')
-rw-r--r--src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c62
-rw-r--r--src/lib/libssl/src/crypto/evp/e_aes_cbc_hmac_sha1.c62
2 files changed, 56 insertions, 68 deletions
diff --git a/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c b/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c
index a9a5cf1ca5..7c23face34 100644
--- a/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c
+++ b/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: e_aes_cbc_hmac_sha1.c,v 1.7 2014/07/10 22:45:57 jsing Exp $ */ 1/* $OpenBSD: e_aes_cbc_hmac_sha1.c,v 1.8 2014/07/12 20:37:07 miod Exp $ */
2/* ==================================================================== 2/* ====================================================================
3 * Copyright (c) 2011-2013 The OpenSSL Project. All rights reserved. 3 * Copyright (c) 2011-2013 The OpenSSL Project. All rights reserved.
4 * 4 *
@@ -67,10 +67,6 @@
67#define EVP_CTRL_AEAD_SET_MAC_KEY 0x17 67#define EVP_CTRL_AEAD_SET_MAC_KEY 0x17
68#endif 68#endif
69 69
70#if !defined(EVP_CIPH_FLAG_DEFAULT_ASN1)
71#define EVP_CIPH_FLAG_DEFAULT_ASN1 0
72#endif
73
74#define TLS1_1_VERSION 0x0302 70#define TLS1_1_VERSION 0x0302
75 71
76typedef struct { 72typedef struct {
@@ -486,7 +482,7 @@ aesni_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr)
486 unsigned int i; 482 unsigned int i;
487 unsigned char hmac_key[64]; 483 unsigned char hmac_key[64];
488 484
489 memset (hmac_key, 0, sizeof(hmac_key)); 485 memset(hmac_key, 0, sizeof(hmac_key));
490 486
491 if (arg > (int)sizeof(hmac_key)) { 487 if (arg > (int)sizeof(hmac_key)) {
492 SHA1_Init(&key->head); 488 SHA1_Init(&key->head);
@@ -544,52 +540,50 @@ aesni_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr)
544 540
545static EVP_CIPHER aesni_128_cbc_hmac_sha1_cipher = { 541static EVP_CIPHER aesni_128_cbc_hmac_sha1_cipher = {
546#ifdef NID_aes_128_cbc_hmac_sha1 542#ifdef NID_aes_128_cbc_hmac_sha1
547 NID_aes_128_cbc_hmac_sha1, 543 .nid = NID_aes_128_cbc_hmac_sha1,
548#else 544#else
549 NID_undef, 545 .nid = NID_undef,
550#endif 546#endif
551 16, 16, 16, 547 .block_size = 16,
552 EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, 548 .key_len = 16,
553 aesni_cbc_hmac_sha1_init_key, 549 .iv_len = 16,
554 aesni_cbc_hmac_sha1_cipher, 550 .flags = EVP_CIPH_CBC_MODE | EVP_CIPH_FLAG_DEFAULT_ASN1 |
555 NULL, 551 EVP_CIPH_FLAG_AEAD_CIPHER,
556 sizeof(EVP_AES_HMAC_SHA1), 552 .init = aesni_cbc_hmac_sha1_init_key,
557 EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_set_asn1_iv, 553 .do_cipher = aesni_cbc_hmac_sha1_cipher,
558 EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_get_asn1_iv, 554 .ctx_size = sizeof(EVP_AES_HMAC_SHA1),
559 aesni_cbc_hmac_sha1_ctrl, 555 .ctrl = aesni_cbc_hmac_sha1_ctrl
560 NULL
561}; 556};
562 557
563static EVP_CIPHER aesni_256_cbc_hmac_sha1_cipher = { 558static EVP_CIPHER aesni_256_cbc_hmac_sha1_cipher = {
564#ifdef NID_aes_256_cbc_hmac_sha1 559#ifdef NID_aes_256_cbc_hmac_sha1
565 NID_aes_256_cbc_hmac_sha1, 560 .nid = NID_aes_256_cbc_hmac_sha1,
566#else 561#else
567 NID_undef, 562 .nid = NID_undef,
568#endif 563#endif
569 16, 32, 16, 564 .block_size = 16,
570 EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, 565 .key_len = 32,
571 aesni_cbc_hmac_sha1_init_key, 566 .iv_len = 16,
572 aesni_cbc_hmac_sha1_cipher, 567 .flags = EVP_CIPH_CBC_MODE | EVP_CIPH_FLAG_DEFAULT_ASN1 |
573 NULL, 568 EVP_CIPH_FLAG_AEAD_CIPHER,
574 sizeof(EVP_AES_HMAC_SHA1), 569 .init = aesni_cbc_hmac_sha1_init_key,
575 EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_set_asn1_iv, 570 .do_cipher = aesni_cbc_hmac_sha1_cipher,
576 EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_get_asn1_iv, 571 .ctx_size = sizeof(EVP_AES_HMAC_SHA1),
577 aesni_cbc_hmac_sha1_ctrl, 572 .ctrl = aesni_cbc_hmac_sha1_ctrl
578 NULL
579}; 573};
580 574
581const EVP_CIPHER * 575const EVP_CIPHER *
582EVP_aes_128_cbc_hmac_sha1(void) 576EVP_aes_128_cbc_hmac_sha1(void)
583{ 577{
584 return(OPENSSL_ia32cap_P[1] & AESNI_CAPABLE? 578 return OPENSSL_ia32cap_P[1] & AESNI_CAPABLE ?
585 &aesni_128_cbc_hmac_sha1_cipher : NULL); 579 &aesni_128_cbc_hmac_sha1_cipher : NULL;
586} 580}
587 581
588const EVP_CIPHER * 582const EVP_CIPHER *
589EVP_aes_256_cbc_hmac_sha1(void) 583EVP_aes_256_cbc_hmac_sha1(void)
590{ 584{
591 return(OPENSSL_ia32cap_P[1] & AESNI_CAPABLE? 585 return OPENSSL_ia32cap_P[1] & AESNI_CAPABLE ?
592 &aesni_256_cbc_hmac_sha1_cipher : NULL); 586 &aesni_256_cbc_hmac_sha1_cipher : NULL;
593} 587}
594#else 588#else
595const EVP_CIPHER * 589const EVP_CIPHER *
diff --git a/src/lib/libssl/src/crypto/evp/e_aes_cbc_hmac_sha1.c b/src/lib/libssl/src/crypto/evp/e_aes_cbc_hmac_sha1.c
index a9a5cf1ca5..7c23face34 100644
--- a/src/lib/libssl/src/crypto/evp/e_aes_cbc_hmac_sha1.c
+++ b/src/lib/libssl/src/crypto/evp/e_aes_cbc_hmac_sha1.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: e_aes_cbc_hmac_sha1.c,v 1.7 2014/07/10 22:45:57 jsing Exp $ */ 1/* $OpenBSD: e_aes_cbc_hmac_sha1.c,v 1.8 2014/07/12 20:37:07 miod Exp $ */
2/* ==================================================================== 2/* ====================================================================
3 * Copyright (c) 2011-2013 The OpenSSL Project. All rights reserved. 3 * Copyright (c) 2011-2013 The OpenSSL Project. All rights reserved.
4 * 4 *
@@ -67,10 +67,6 @@
67#define EVP_CTRL_AEAD_SET_MAC_KEY 0x17 67#define EVP_CTRL_AEAD_SET_MAC_KEY 0x17
68#endif 68#endif
69 69
70#if !defined(EVP_CIPH_FLAG_DEFAULT_ASN1)
71#define EVP_CIPH_FLAG_DEFAULT_ASN1 0
72#endif
73
74#define TLS1_1_VERSION 0x0302 70#define TLS1_1_VERSION 0x0302
75 71
76typedef struct { 72typedef struct {
@@ -486,7 +482,7 @@ aesni_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr)
486 unsigned int i; 482 unsigned int i;
487 unsigned char hmac_key[64]; 483 unsigned char hmac_key[64];
488 484
489 memset (hmac_key, 0, sizeof(hmac_key)); 485 memset(hmac_key, 0, sizeof(hmac_key));
490 486
491 if (arg > (int)sizeof(hmac_key)) { 487 if (arg > (int)sizeof(hmac_key)) {
492 SHA1_Init(&key->head); 488 SHA1_Init(&key->head);
@@ -544,52 +540,50 @@ aesni_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr)
544 540
545static EVP_CIPHER aesni_128_cbc_hmac_sha1_cipher = { 541static EVP_CIPHER aesni_128_cbc_hmac_sha1_cipher = {
546#ifdef NID_aes_128_cbc_hmac_sha1 542#ifdef NID_aes_128_cbc_hmac_sha1
547 NID_aes_128_cbc_hmac_sha1, 543 .nid = NID_aes_128_cbc_hmac_sha1,
548#else 544#else
549 NID_undef, 545 .nid = NID_undef,
550#endif 546#endif
551 16, 16, 16, 547 .block_size = 16,
552 EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, 548 .key_len = 16,
553 aesni_cbc_hmac_sha1_init_key, 549 .iv_len = 16,
554 aesni_cbc_hmac_sha1_cipher, 550 .flags = EVP_CIPH_CBC_MODE | EVP_CIPH_FLAG_DEFAULT_ASN1 |
555 NULL, 551 EVP_CIPH_FLAG_AEAD_CIPHER,
556 sizeof(EVP_AES_HMAC_SHA1), 552 .init = aesni_cbc_hmac_sha1_init_key,
557 EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_set_asn1_iv, 553 .do_cipher = aesni_cbc_hmac_sha1_cipher,
558 EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_get_asn1_iv, 554 .ctx_size = sizeof(EVP_AES_HMAC_SHA1),
559 aesni_cbc_hmac_sha1_ctrl, 555 .ctrl = aesni_cbc_hmac_sha1_ctrl
560 NULL
561}; 556};
562 557
563static EVP_CIPHER aesni_256_cbc_hmac_sha1_cipher = { 558static EVP_CIPHER aesni_256_cbc_hmac_sha1_cipher = {
564#ifdef NID_aes_256_cbc_hmac_sha1 559#ifdef NID_aes_256_cbc_hmac_sha1
565 NID_aes_256_cbc_hmac_sha1, 560 .nid = NID_aes_256_cbc_hmac_sha1,
566#else 561#else
567 NID_undef, 562 .nid = NID_undef,
568#endif 563#endif
569 16, 32, 16, 564 .block_size = 16,
570 EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, 565 .key_len = 32,
571 aesni_cbc_hmac_sha1_init_key, 566 .iv_len = 16,
572 aesni_cbc_hmac_sha1_cipher, 567 .flags = EVP_CIPH_CBC_MODE | EVP_CIPH_FLAG_DEFAULT_ASN1 |
573 NULL, 568 EVP_CIPH_FLAG_AEAD_CIPHER,
574 sizeof(EVP_AES_HMAC_SHA1), 569 .init = aesni_cbc_hmac_sha1_init_key,
575 EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_set_asn1_iv, 570 .do_cipher = aesni_cbc_hmac_sha1_cipher,
576 EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_get_asn1_iv, 571 .ctx_size = sizeof(EVP_AES_HMAC_SHA1),
577 aesni_cbc_hmac_sha1_ctrl, 572 .ctrl = aesni_cbc_hmac_sha1_ctrl
578 NULL
579}; 573};
580 574
581const EVP_CIPHER * 575const EVP_CIPHER *
582EVP_aes_128_cbc_hmac_sha1(void) 576EVP_aes_128_cbc_hmac_sha1(void)
583{ 577{
584 return(OPENSSL_ia32cap_P[1] & AESNI_CAPABLE? 578 return OPENSSL_ia32cap_P[1] & AESNI_CAPABLE ?
585 &aesni_128_cbc_hmac_sha1_cipher : NULL); 579 &aesni_128_cbc_hmac_sha1_cipher : NULL;
586} 580}
587 581
588const EVP_CIPHER * 582const EVP_CIPHER *
589EVP_aes_256_cbc_hmac_sha1(void) 583EVP_aes_256_cbc_hmac_sha1(void)
590{ 584{
591 return(OPENSSL_ia32cap_P[1] & AESNI_CAPABLE? 585 return OPENSSL_ia32cap_P[1] & AESNI_CAPABLE ?
592 &aesni_256_cbc_hmac_sha1_cipher : NULL); 586 &aesni_256_cbc_hmac_sha1_cipher : NULL;
593} 587}
594#else 588#else
595const EVP_CIPHER * 589const EVP_CIPHER *