diff options
author | miod <> | 2014-07-12 20:37:07 +0000 |
---|---|---|
committer | miod <> | 2014-07-12 20:37:07 +0000 |
commit | 88f737c074f7fdc1e089af4d15ae3c420ff0d092 (patch) | |
tree | e67071d02cca9a7404ea722ca23c1c7db6394a98 /src | |
parent | f9a1965b55172034933a39d8fb8dfd6a6d32c7a7 (diff) | |
download | openbsd-88f737c074f7fdc1e089af4d15ae3c420ff0d092.tar.gz openbsd-88f737c074f7fdc1e089af4d15ae3c420ff0d092.tar.bz2 openbsd-88f737c074f7fdc1e089af4d15ae3c420ff0d092.zip |
We have EVP_CIPH_FLAG_DEFAULT_ASN1 in evp.h; no need to keep constructs to
build on pre-EVP_CIPH_FLAG_DEFAULT_ASN1 codebases.
ok jsing@
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c | 62 | ||||
-rw-r--r-- | src/lib/libssl/src/crypto/evp/e_aes_cbc_hmac_sha1.c | 62 |
2 files changed, 56 insertions, 68 deletions
diff --git a/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c b/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c index a9a5cf1ca5..7c23face34 100644 --- a/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c +++ b/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: e_aes_cbc_hmac_sha1.c,v 1.7 2014/07/10 22:45:57 jsing Exp $ */ | 1 | /* $OpenBSD: e_aes_cbc_hmac_sha1.c,v 1.8 2014/07/12 20:37:07 miod Exp $ */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 2011-2013 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 2011-2013 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
@@ -67,10 +67,6 @@ | |||
67 | #define EVP_CTRL_AEAD_SET_MAC_KEY 0x17 | 67 | #define EVP_CTRL_AEAD_SET_MAC_KEY 0x17 |
68 | #endif | 68 | #endif |
69 | 69 | ||
70 | #if !defined(EVP_CIPH_FLAG_DEFAULT_ASN1) | ||
71 | #define EVP_CIPH_FLAG_DEFAULT_ASN1 0 | ||
72 | #endif | ||
73 | |||
74 | #define TLS1_1_VERSION 0x0302 | 70 | #define TLS1_1_VERSION 0x0302 |
75 | 71 | ||
76 | typedef struct { | 72 | typedef struct { |
@@ -486,7 +482,7 @@ aesni_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | |||
486 | unsigned int i; | 482 | unsigned int i; |
487 | unsigned char hmac_key[64]; | 483 | unsigned char hmac_key[64]; |
488 | 484 | ||
489 | memset (hmac_key, 0, sizeof(hmac_key)); | 485 | memset(hmac_key, 0, sizeof(hmac_key)); |
490 | 486 | ||
491 | if (arg > (int)sizeof(hmac_key)) { | 487 | if (arg > (int)sizeof(hmac_key)) { |
492 | SHA1_Init(&key->head); | 488 | SHA1_Init(&key->head); |
@@ -544,52 +540,50 @@ aesni_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | |||
544 | 540 | ||
545 | static EVP_CIPHER aesni_128_cbc_hmac_sha1_cipher = { | 541 | static EVP_CIPHER aesni_128_cbc_hmac_sha1_cipher = { |
546 | #ifdef NID_aes_128_cbc_hmac_sha1 | 542 | #ifdef NID_aes_128_cbc_hmac_sha1 |
547 | NID_aes_128_cbc_hmac_sha1, | 543 | .nid = NID_aes_128_cbc_hmac_sha1, |
548 | #else | 544 | #else |
549 | NID_undef, | 545 | .nid = NID_undef, |
550 | #endif | 546 | #endif |
551 | 16, 16, 16, | 547 | .block_size = 16, |
552 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, | 548 | .key_len = 16, |
553 | aesni_cbc_hmac_sha1_init_key, | 549 | .iv_len = 16, |
554 | aesni_cbc_hmac_sha1_cipher, | 550 | .flags = EVP_CIPH_CBC_MODE | EVP_CIPH_FLAG_DEFAULT_ASN1 | |
555 | NULL, | 551 | EVP_CIPH_FLAG_AEAD_CIPHER, |
556 | sizeof(EVP_AES_HMAC_SHA1), | 552 | .init = aesni_cbc_hmac_sha1_init_key, |
557 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_set_asn1_iv, | 553 | .do_cipher = aesni_cbc_hmac_sha1_cipher, |
558 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_get_asn1_iv, | 554 | .ctx_size = sizeof(EVP_AES_HMAC_SHA1), |
559 | aesni_cbc_hmac_sha1_ctrl, | 555 | .ctrl = aesni_cbc_hmac_sha1_ctrl |
560 | NULL | ||
561 | }; | 556 | }; |
562 | 557 | ||
563 | static EVP_CIPHER aesni_256_cbc_hmac_sha1_cipher = { | 558 | static EVP_CIPHER aesni_256_cbc_hmac_sha1_cipher = { |
564 | #ifdef NID_aes_256_cbc_hmac_sha1 | 559 | #ifdef NID_aes_256_cbc_hmac_sha1 |
565 | NID_aes_256_cbc_hmac_sha1, | 560 | .nid = NID_aes_256_cbc_hmac_sha1, |
566 | #else | 561 | #else |
567 | NID_undef, | 562 | .nid = NID_undef, |
568 | #endif | 563 | #endif |
569 | 16, 32, 16, | 564 | .block_size = 16, |
570 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, | 565 | .key_len = 32, |
571 | aesni_cbc_hmac_sha1_init_key, | 566 | .iv_len = 16, |
572 | aesni_cbc_hmac_sha1_cipher, | 567 | .flags = EVP_CIPH_CBC_MODE | EVP_CIPH_FLAG_DEFAULT_ASN1 | |
573 | NULL, | 568 | EVP_CIPH_FLAG_AEAD_CIPHER, |
574 | sizeof(EVP_AES_HMAC_SHA1), | 569 | .init = aesni_cbc_hmac_sha1_init_key, |
575 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_set_asn1_iv, | 570 | .do_cipher = aesni_cbc_hmac_sha1_cipher, |
576 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_get_asn1_iv, | 571 | .ctx_size = sizeof(EVP_AES_HMAC_SHA1), |
577 | aesni_cbc_hmac_sha1_ctrl, | 572 | .ctrl = aesni_cbc_hmac_sha1_ctrl |
578 | NULL | ||
579 | }; | 573 | }; |
580 | 574 | ||
581 | const EVP_CIPHER * | 575 | const EVP_CIPHER * |
582 | EVP_aes_128_cbc_hmac_sha1(void) | 576 | EVP_aes_128_cbc_hmac_sha1(void) |
583 | { | 577 | { |
584 | return(OPENSSL_ia32cap_P[1] & AESNI_CAPABLE? | 578 | return OPENSSL_ia32cap_P[1] & AESNI_CAPABLE ? |
585 | &aesni_128_cbc_hmac_sha1_cipher : NULL); | 579 | &aesni_128_cbc_hmac_sha1_cipher : NULL; |
586 | } | 580 | } |
587 | 581 | ||
588 | const EVP_CIPHER * | 582 | const EVP_CIPHER * |
589 | EVP_aes_256_cbc_hmac_sha1(void) | 583 | EVP_aes_256_cbc_hmac_sha1(void) |
590 | { | 584 | { |
591 | return(OPENSSL_ia32cap_P[1] & AESNI_CAPABLE? | 585 | return OPENSSL_ia32cap_P[1] & AESNI_CAPABLE ? |
592 | &aesni_256_cbc_hmac_sha1_cipher : NULL); | 586 | &aesni_256_cbc_hmac_sha1_cipher : NULL; |
593 | } | 587 | } |
594 | #else | 588 | #else |
595 | const EVP_CIPHER * | 589 | const EVP_CIPHER * |
diff --git a/src/lib/libssl/src/crypto/evp/e_aes_cbc_hmac_sha1.c b/src/lib/libssl/src/crypto/evp/e_aes_cbc_hmac_sha1.c index a9a5cf1ca5..7c23face34 100644 --- a/src/lib/libssl/src/crypto/evp/e_aes_cbc_hmac_sha1.c +++ b/src/lib/libssl/src/crypto/evp/e_aes_cbc_hmac_sha1.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: e_aes_cbc_hmac_sha1.c,v 1.7 2014/07/10 22:45:57 jsing Exp $ */ | 1 | /* $OpenBSD: e_aes_cbc_hmac_sha1.c,v 1.8 2014/07/12 20:37:07 miod Exp $ */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 2011-2013 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 2011-2013 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
@@ -67,10 +67,6 @@ | |||
67 | #define EVP_CTRL_AEAD_SET_MAC_KEY 0x17 | 67 | #define EVP_CTRL_AEAD_SET_MAC_KEY 0x17 |
68 | #endif | 68 | #endif |
69 | 69 | ||
70 | #if !defined(EVP_CIPH_FLAG_DEFAULT_ASN1) | ||
71 | #define EVP_CIPH_FLAG_DEFAULT_ASN1 0 | ||
72 | #endif | ||
73 | |||
74 | #define TLS1_1_VERSION 0x0302 | 70 | #define TLS1_1_VERSION 0x0302 |
75 | 71 | ||
76 | typedef struct { | 72 | typedef struct { |
@@ -486,7 +482,7 @@ aesni_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | |||
486 | unsigned int i; | 482 | unsigned int i; |
487 | unsigned char hmac_key[64]; | 483 | unsigned char hmac_key[64]; |
488 | 484 | ||
489 | memset (hmac_key, 0, sizeof(hmac_key)); | 485 | memset(hmac_key, 0, sizeof(hmac_key)); |
490 | 486 | ||
491 | if (arg > (int)sizeof(hmac_key)) { | 487 | if (arg > (int)sizeof(hmac_key)) { |
492 | SHA1_Init(&key->head); | 488 | SHA1_Init(&key->head); |
@@ -544,52 +540,50 @@ aesni_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | |||
544 | 540 | ||
545 | static EVP_CIPHER aesni_128_cbc_hmac_sha1_cipher = { | 541 | static EVP_CIPHER aesni_128_cbc_hmac_sha1_cipher = { |
546 | #ifdef NID_aes_128_cbc_hmac_sha1 | 542 | #ifdef NID_aes_128_cbc_hmac_sha1 |
547 | NID_aes_128_cbc_hmac_sha1, | 543 | .nid = NID_aes_128_cbc_hmac_sha1, |
548 | #else | 544 | #else |
549 | NID_undef, | 545 | .nid = NID_undef, |
550 | #endif | 546 | #endif |
551 | 16, 16, 16, | 547 | .block_size = 16, |
552 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, | 548 | .key_len = 16, |
553 | aesni_cbc_hmac_sha1_init_key, | 549 | .iv_len = 16, |
554 | aesni_cbc_hmac_sha1_cipher, | 550 | .flags = EVP_CIPH_CBC_MODE | EVP_CIPH_FLAG_DEFAULT_ASN1 | |
555 | NULL, | 551 | EVP_CIPH_FLAG_AEAD_CIPHER, |
556 | sizeof(EVP_AES_HMAC_SHA1), | 552 | .init = aesni_cbc_hmac_sha1_init_key, |
557 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_set_asn1_iv, | 553 | .do_cipher = aesni_cbc_hmac_sha1_cipher, |
558 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_get_asn1_iv, | 554 | .ctx_size = sizeof(EVP_AES_HMAC_SHA1), |
559 | aesni_cbc_hmac_sha1_ctrl, | 555 | .ctrl = aesni_cbc_hmac_sha1_ctrl |
560 | NULL | ||
561 | }; | 556 | }; |
562 | 557 | ||
563 | static EVP_CIPHER aesni_256_cbc_hmac_sha1_cipher = { | 558 | static EVP_CIPHER aesni_256_cbc_hmac_sha1_cipher = { |
564 | #ifdef NID_aes_256_cbc_hmac_sha1 | 559 | #ifdef NID_aes_256_cbc_hmac_sha1 |
565 | NID_aes_256_cbc_hmac_sha1, | 560 | .nid = NID_aes_256_cbc_hmac_sha1, |
566 | #else | 561 | #else |
567 | NID_undef, | 562 | .nid = NID_undef, |
568 | #endif | 563 | #endif |
569 | 16, 32, 16, | 564 | .block_size = 16, |
570 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, | 565 | .key_len = 32, |
571 | aesni_cbc_hmac_sha1_init_key, | 566 | .iv_len = 16, |
572 | aesni_cbc_hmac_sha1_cipher, | 567 | .flags = EVP_CIPH_CBC_MODE | EVP_CIPH_FLAG_DEFAULT_ASN1 | |
573 | NULL, | 568 | EVP_CIPH_FLAG_AEAD_CIPHER, |
574 | sizeof(EVP_AES_HMAC_SHA1), | 569 | .init = aesni_cbc_hmac_sha1_init_key, |
575 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_set_asn1_iv, | 570 | .do_cipher = aesni_cbc_hmac_sha1_cipher, |
576 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_get_asn1_iv, | 571 | .ctx_size = sizeof(EVP_AES_HMAC_SHA1), |
577 | aesni_cbc_hmac_sha1_ctrl, | 572 | .ctrl = aesni_cbc_hmac_sha1_ctrl |
578 | NULL | ||
579 | }; | 573 | }; |
580 | 574 | ||
581 | const EVP_CIPHER * | 575 | const EVP_CIPHER * |
582 | EVP_aes_128_cbc_hmac_sha1(void) | 576 | EVP_aes_128_cbc_hmac_sha1(void) |
583 | { | 577 | { |
584 | return(OPENSSL_ia32cap_P[1] & AESNI_CAPABLE? | 578 | return OPENSSL_ia32cap_P[1] & AESNI_CAPABLE ? |
585 | &aesni_128_cbc_hmac_sha1_cipher : NULL); | 579 | &aesni_128_cbc_hmac_sha1_cipher : NULL; |
586 | } | 580 | } |
587 | 581 | ||
588 | const EVP_CIPHER * | 582 | const EVP_CIPHER * |
589 | EVP_aes_256_cbc_hmac_sha1(void) | 583 | EVP_aes_256_cbc_hmac_sha1(void) |
590 | { | 584 | { |
591 | return(OPENSSL_ia32cap_P[1] & AESNI_CAPABLE? | 585 | return OPENSSL_ia32cap_P[1] & AESNI_CAPABLE ? |
592 | &aesni_256_cbc_hmac_sha1_cipher : NULL); | 586 | &aesni_256_cbc_hmac_sha1_cipher : NULL; |
593 | } | 587 | } |
594 | #else | 588 | #else |
595 | const EVP_CIPHER * | 589 | const EVP_CIPHER * |