diff options
Diffstat (limited to 'src/lib/libcrypto/evp/e_aes.c')
-rw-r--r-- | src/lib/libcrypto/evp/e_aes.c | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/src/lib/libcrypto/evp/e_aes.c b/src/lib/libcrypto/evp/e_aes.c index b20543a90c..71a18363f1 100644 --- a/src/lib/libcrypto/evp/e_aes.c +++ b/src/lib/libcrypto/evp/e_aes.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: e_aes.c,v 1.31 2016/11/04 17:30:30 miod Exp $ */ | 1 | /* $OpenBSD: e_aes.c,v 1.32 2017/01/29 17:49:23 beck Exp $ */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 2001-2011 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 2001-2011 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
@@ -225,7 +225,7 @@ aesni_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | |||
225 | } | 225 | } |
226 | 226 | ||
227 | if (ret < 0) { | 227 | if (ret < 0) { |
228 | EVPerr(EVP_F_AESNI_INIT_KEY, EVP_R_AES_KEY_SETUP_FAILED); | 228 | EVPerror(EVP_R_AES_KEY_SETUP_FAILED); |
229 | return 0; | 229 | return 0; |
230 | } | 230 | } |
231 | 231 | ||
@@ -563,7 +563,7 @@ aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | |||
563 | } | 563 | } |
564 | 564 | ||
565 | if (ret < 0) { | 565 | if (ret < 0) { |
566 | EVPerr(EVP_F_AES_INIT_KEY, EVP_R_AES_KEY_SETUP_FAILED); | 566 | EVPerror(EVP_R_AES_KEY_SETUP_FAILED); |
567 | return 0; | 567 | return 0; |
568 | } | 568 | } |
569 | 569 | ||
@@ -1378,7 +1378,7 @@ aead_aes_gcm_init(EVP_AEAD_CTX *ctx, const unsigned char *key, size_t key_len, | |||
1378 | 1378 | ||
1379 | /* EVP_AEAD_CTX_init should catch this. */ | 1379 | /* EVP_AEAD_CTX_init should catch this. */ |
1380 | if (key_bits != 128 && key_bits != 256) { | 1380 | if (key_bits != 128 && key_bits != 256) { |
1381 | EVPerr(EVP_F_AEAD_AES_GCM_INIT, EVP_R_BAD_KEY_LENGTH); | 1381 | EVPerror(EVP_R_BAD_KEY_LENGTH); |
1382 | return 0; | 1382 | return 0; |
1383 | } | 1383 | } |
1384 | 1384 | ||
@@ -1386,7 +1386,7 @@ aead_aes_gcm_init(EVP_AEAD_CTX *ctx, const unsigned char *key, size_t key_len, | |||
1386 | tag_len = EVP_AEAD_AES_GCM_TAG_LEN; | 1386 | tag_len = EVP_AEAD_AES_GCM_TAG_LEN; |
1387 | 1387 | ||
1388 | if (tag_len > EVP_AEAD_AES_GCM_TAG_LEN) { | 1388 | if (tag_len > EVP_AEAD_AES_GCM_TAG_LEN) { |
1389 | EVPerr(EVP_F_AEAD_AES_GCM_INIT, EVP_R_TAG_TOO_LARGE); | 1389 | EVPerror(EVP_R_TAG_TOO_LARGE); |
1390 | return 0; | 1390 | return 0; |
1391 | } | 1391 | } |
1392 | 1392 | ||
@@ -1432,7 +1432,7 @@ aead_aes_gcm_seal(const EVP_AEAD_CTX *ctx, unsigned char *out, size_t *out_len, | |||
1432 | size_t bulk = 0; | 1432 | size_t bulk = 0; |
1433 | 1433 | ||
1434 | if (max_out_len < in_len + gcm_ctx->tag_len) { | 1434 | if (max_out_len < in_len + gcm_ctx->tag_len) { |
1435 | EVPerr(EVP_F_AEAD_AES_GCM_SEAL, EVP_R_BUFFER_TOO_SMALL); | 1435 | EVPerror(EVP_R_BUFFER_TOO_SMALL); |
1436 | return 0; | 1436 | return 0; |
1437 | } | 1437 | } |
1438 | 1438 | ||
@@ -1471,14 +1471,14 @@ aead_aes_gcm_open(const EVP_AEAD_CTX *ctx, unsigned char *out, size_t *out_len, | |||
1471 | size_t bulk = 0; | 1471 | size_t bulk = 0; |
1472 | 1472 | ||
1473 | if (in_len < gcm_ctx->tag_len) { | 1473 | if (in_len < gcm_ctx->tag_len) { |
1474 | EVPerr(EVP_F_AEAD_AES_GCM_OPEN, EVP_R_BAD_DECRYPT); | 1474 | EVPerror(EVP_R_BAD_DECRYPT); |
1475 | return 0; | 1475 | return 0; |
1476 | } | 1476 | } |
1477 | 1477 | ||
1478 | plaintext_len = in_len - gcm_ctx->tag_len; | 1478 | plaintext_len = in_len - gcm_ctx->tag_len; |
1479 | 1479 | ||
1480 | if (max_out_len < plaintext_len) { | 1480 | if (max_out_len < plaintext_len) { |
1481 | EVPerr(EVP_F_AEAD_AES_GCM_OPEN, EVP_R_BUFFER_TOO_SMALL); | 1481 | EVPerror(EVP_R_BUFFER_TOO_SMALL); |
1482 | return 0; | 1482 | return 0; |
1483 | } | 1483 | } |
1484 | 1484 | ||
@@ -1500,7 +1500,7 @@ aead_aes_gcm_open(const EVP_AEAD_CTX *ctx, unsigned char *out, size_t *out_len, | |||
1500 | 1500 | ||
1501 | CRYPTO_gcm128_tag(&gcm, tag, gcm_ctx->tag_len); | 1501 | CRYPTO_gcm128_tag(&gcm, tag, gcm_ctx->tag_len); |
1502 | if (timingsafe_memcmp(tag, in + plaintext_len, gcm_ctx->tag_len) != 0) { | 1502 | if (timingsafe_memcmp(tag, in + plaintext_len, gcm_ctx->tag_len) != 0) { |
1503 | EVPerr(EVP_F_AEAD_AES_GCM_OPEN, EVP_R_BAD_DECRYPT); | 1503 | EVPerror(EVP_R_BAD_DECRYPT); |
1504 | return 0; | 1504 | return 0; |
1505 | } | 1505 | } |
1506 | 1506 | ||