diff options
Diffstat (limited to 'src/lib/libcrypto/evp/e_aes.c')
| -rw-r--r-- | src/lib/libcrypto/evp/e_aes.c | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/src/lib/libcrypto/evp/e_aes.c b/src/lib/libcrypto/evp/e_aes.c index b20543a90c..71a18363f1 100644 --- a/src/lib/libcrypto/evp/e_aes.c +++ b/src/lib/libcrypto/evp/e_aes.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_aes.c,v 1.31 2016/11/04 17:30:30 miod Exp $ */ | 1 | /* $OpenBSD: e_aes.c,v 1.32 2017/01/29 17:49:23 beck Exp $ */ |
| 2 | /* ==================================================================== | 2 | /* ==================================================================== |
| 3 | * Copyright (c) 2001-2011 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 2001-2011 The OpenSSL Project. All rights reserved. |
| 4 | * | 4 | * |
| @@ -225,7 +225,7 @@ aesni_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | |||
| 225 | } | 225 | } |
| 226 | 226 | ||
| 227 | if (ret < 0) { | 227 | if (ret < 0) { |
| 228 | EVPerr(EVP_F_AESNI_INIT_KEY, EVP_R_AES_KEY_SETUP_FAILED); | 228 | EVPerror(EVP_R_AES_KEY_SETUP_FAILED); |
| 229 | return 0; | 229 | return 0; |
| 230 | } | 230 | } |
| 231 | 231 | ||
| @@ -563,7 +563,7 @@ aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | |||
| 563 | } | 563 | } |
| 564 | 564 | ||
| 565 | if (ret < 0) { | 565 | if (ret < 0) { |
| 566 | EVPerr(EVP_F_AES_INIT_KEY, EVP_R_AES_KEY_SETUP_FAILED); | 566 | EVPerror(EVP_R_AES_KEY_SETUP_FAILED); |
| 567 | return 0; | 567 | return 0; |
| 568 | } | 568 | } |
| 569 | 569 | ||
| @@ -1378,7 +1378,7 @@ aead_aes_gcm_init(EVP_AEAD_CTX *ctx, const unsigned char *key, size_t key_len, | |||
| 1378 | 1378 | ||
| 1379 | /* EVP_AEAD_CTX_init should catch this. */ | 1379 | /* EVP_AEAD_CTX_init should catch this. */ |
| 1380 | if (key_bits != 128 && key_bits != 256) { | 1380 | if (key_bits != 128 && key_bits != 256) { |
| 1381 | EVPerr(EVP_F_AEAD_AES_GCM_INIT, EVP_R_BAD_KEY_LENGTH); | 1381 | EVPerror(EVP_R_BAD_KEY_LENGTH); |
| 1382 | return 0; | 1382 | return 0; |
| 1383 | } | 1383 | } |
| 1384 | 1384 | ||
| @@ -1386,7 +1386,7 @@ aead_aes_gcm_init(EVP_AEAD_CTX *ctx, const unsigned char *key, size_t key_len, | |||
| 1386 | tag_len = EVP_AEAD_AES_GCM_TAG_LEN; | 1386 | tag_len = EVP_AEAD_AES_GCM_TAG_LEN; |
| 1387 | 1387 | ||
| 1388 | if (tag_len > EVP_AEAD_AES_GCM_TAG_LEN) { | 1388 | if (tag_len > EVP_AEAD_AES_GCM_TAG_LEN) { |
| 1389 | EVPerr(EVP_F_AEAD_AES_GCM_INIT, EVP_R_TAG_TOO_LARGE); | 1389 | EVPerror(EVP_R_TAG_TOO_LARGE); |
| 1390 | return 0; | 1390 | return 0; |
| 1391 | } | 1391 | } |
| 1392 | 1392 | ||
| @@ -1432,7 +1432,7 @@ aead_aes_gcm_seal(const EVP_AEAD_CTX *ctx, unsigned char *out, size_t *out_len, | |||
| 1432 | size_t bulk = 0; | 1432 | size_t bulk = 0; |
| 1433 | 1433 | ||
| 1434 | if (max_out_len < in_len + gcm_ctx->tag_len) { | 1434 | if (max_out_len < in_len + gcm_ctx->tag_len) { |
| 1435 | EVPerr(EVP_F_AEAD_AES_GCM_SEAL, EVP_R_BUFFER_TOO_SMALL); | 1435 | EVPerror(EVP_R_BUFFER_TOO_SMALL); |
| 1436 | return 0; | 1436 | return 0; |
| 1437 | } | 1437 | } |
| 1438 | 1438 | ||
| @@ -1471,14 +1471,14 @@ aead_aes_gcm_open(const EVP_AEAD_CTX *ctx, unsigned char *out, size_t *out_len, | |||
| 1471 | size_t bulk = 0; | 1471 | size_t bulk = 0; |
| 1472 | 1472 | ||
| 1473 | if (in_len < gcm_ctx->tag_len) { | 1473 | if (in_len < gcm_ctx->tag_len) { |
| 1474 | EVPerr(EVP_F_AEAD_AES_GCM_OPEN, EVP_R_BAD_DECRYPT); | 1474 | EVPerror(EVP_R_BAD_DECRYPT); |
| 1475 | return 0; | 1475 | return 0; |
| 1476 | } | 1476 | } |
| 1477 | 1477 | ||
| 1478 | plaintext_len = in_len - gcm_ctx->tag_len; | 1478 | plaintext_len = in_len - gcm_ctx->tag_len; |
| 1479 | 1479 | ||
| 1480 | if (max_out_len < plaintext_len) { | 1480 | if (max_out_len < plaintext_len) { |
| 1481 | EVPerr(EVP_F_AEAD_AES_GCM_OPEN, EVP_R_BUFFER_TOO_SMALL); | 1481 | EVPerror(EVP_R_BUFFER_TOO_SMALL); |
| 1482 | return 0; | 1482 | return 0; |
| 1483 | } | 1483 | } |
| 1484 | 1484 | ||
| @@ -1500,7 +1500,7 @@ aead_aes_gcm_open(const EVP_AEAD_CTX *ctx, unsigned char *out, size_t *out_len, | |||
| 1500 | 1500 | ||
| 1501 | CRYPTO_gcm128_tag(&gcm, tag, gcm_ctx->tag_len); | 1501 | CRYPTO_gcm128_tag(&gcm, tag, gcm_ctx->tag_len); |
| 1502 | if (timingsafe_memcmp(tag, in + plaintext_len, gcm_ctx->tag_len) != 0) { | 1502 | if (timingsafe_memcmp(tag, in + plaintext_len, gcm_ctx->tag_len) != 0) { |
| 1503 | EVPerr(EVP_F_AEAD_AES_GCM_OPEN, EVP_R_BAD_DECRYPT); | 1503 | EVPerror(EVP_R_BAD_DECRYPT); |
| 1504 | return 0; | 1504 | return 0; |
| 1505 | } | 1505 | } |
| 1506 | 1506 | ||
