summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/evp/e_aes.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libcrypto/evp/e_aes.c')
-rw-r--r--src/lib/libcrypto/evp/e_aes.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/src/lib/libcrypto/evp/e_aes.c b/src/lib/libcrypto/evp/e_aes.c
index b20543a90c..71a18363f1 100644
--- a/src/lib/libcrypto/evp/e_aes.c
+++ b/src/lib/libcrypto/evp/e_aes.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: e_aes.c,v 1.31 2016/11/04 17:30:30 miod Exp $ */ 1/* $OpenBSD: e_aes.c,v 1.32 2017/01/29 17:49:23 beck Exp $ */
2/* ==================================================================== 2/* ====================================================================
3 * Copyright (c) 2001-2011 The OpenSSL Project. All rights reserved. 3 * Copyright (c) 2001-2011 The OpenSSL Project. All rights reserved.
4 * 4 *
@@ -225,7 +225,7 @@ aesni_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
225 } 225 }
226 226
227 if (ret < 0) { 227 if (ret < 0) {
228 EVPerr(EVP_F_AESNI_INIT_KEY, EVP_R_AES_KEY_SETUP_FAILED); 228 EVPerror(EVP_R_AES_KEY_SETUP_FAILED);
229 return 0; 229 return 0;
230 } 230 }
231 231
@@ -563,7 +563,7 @@ aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
563 } 563 }
564 564
565 if (ret < 0) { 565 if (ret < 0) {
566 EVPerr(EVP_F_AES_INIT_KEY, EVP_R_AES_KEY_SETUP_FAILED); 566 EVPerror(EVP_R_AES_KEY_SETUP_FAILED);
567 return 0; 567 return 0;
568 } 568 }
569 569
@@ -1378,7 +1378,7 @@ aead_aes_gcm_init(EVP_AEAD_CTX *ctx, const unsigned char *key, size_t key_len,
1378 1378
1379 /* EVP_AEAD_CTX_init should catch this. */ 1379 /* EVP_AEAD_CTX_init should catch this. */
1380 if (key_bits != 128 && key_bits != 256) { 1380 if (key_bits != 128 && key_bits != 256) {
1381 EVPerr(EVP_F_AEAD_AES_GCM_INIT, EVP_R_BAD_KEY_LENGTH); 1381 EVPerror(EVP_R_BAD_KEY_LENGTH);
1382 return 0; 1382 return 0;
1383 } 1383 }
1384 1384
@@ -1386,7 +1386,7 @@ aead_aes_gcm_init(EVP_AEAD_CTX *ctx, const unsigned char *key, size_t key_len,
1386 tag_len = EVP_AEAD_AES_GCM_TAG_LEN; 1386 tag_len = EVP_AEAD_AES_GCM_TAG_LEN;
1387 1387
1388 if (tag_len > EVP_AEAD_AES_GCM_TAG_LEN) { 1388 if (tag_len > EVP_AEAD_AES_GCM_TAG_LEN) {
1389 EVPerr(EVP_F_AEAD_AES_GCM_INIT, EVP_R_TAG_TOO_LARGE); 1389 EVPerror(EVP_R_TAG_TOO_LARGE);
1390 return 0; 1390 return 0;
1391 } 1391 }
1392 1392
@@ -1432,7 +1432,7 @@ aead_aes_gcm_seal(const EVP_AEAD_CTX *ctx, unsigned char *out, size_t *out_len,
1432 size_t bulk = 0; 1432 size_t bulk = 0;
1433 1433
1434 if (max_out_len < in_len + gcm_ctx->tag_len) { 1434 if (max_out_len < in_len + gcm_ctx->tag_len) {
1435 EVPerr(EVP_F_AEAD_AES_GCM_SEAL, EVP_R_BUFFER_TOO_SMALL); 1435 EVPerror(EVP_R_BUFFER_TOO_SMALL);
1436 return 0; 1436 return 0;
1437 } 1437 }
1438 1438
@@ -1471,14 +1471,14 @@ aead_aes_gcm_open(const EVP_AEAD_CTX *ctx, unsigned char *out, size_t *out_len,
1471 size_t bulk = 0; 1471 size_t bulk = 0;
1472 1472
1473 if (in_len < gcm_ctx->tag_len) { 1473 if (in_len < gcm_ctx->tag_len) {
1474 EVPerr(EVP_F_AEAD_AES_GCM_OPEN, EVP_R_BAD_DECRYPT); 1474 EVPerror(EVP_R_BAD_DECRYPT);
1475 return 0; 1475 return 0;
1476 } 1476 }
1477 1477
1478 plaintext_len = in_len - gcm_ctx->tag_len; 1478 plaintext_len = in_len - gcm_ctx->tag_len;
1479 1479
1480 if (max_out_len < plaintext_len) { 1480 if (max_out_len < plaintext_len) {
1481 EVPerr(EVP_F_AEAD_AES_GCM_OPEN, EVP_R_BUFFER_TOO_SMALL); 1481 EVPerror(EVP_R_BUFFER_TOO_SMALL);
1482 return 0; 1482 return 0;
1483 } 1483 }
1484 1484
@@ -1500,7 +1500,7 @@ aead_aes_gcm_open(const EVP_AEAD_CTX *ctx, unsigned char *out, size_t *out_len,
1500 1500
1501 CRYPTO_gcm128_tag(&gcm, tag, gcm_ctx->tag_len); 1501 CRYPTO_gcm128_tag(&gcm, tag, gcm_ctx->tag_len);
1502 if (timingsafe_memcmp(tag, in + plaintext_len, gcm_ctx->tag_len) != 0) { 1502 if (timingsafe_memcmp(tag, in + plaintext_len, gcm_ctx->tag_len) != 0) {
1503 EVPerr(EVP_F_AEAD_AES_GCM_OPEN, EVP_R_BAD_DECRYPT); 1503 EVPerror(EVP_R_BAD_DECRYPT);
1504 return 0; 1504 return 0;
1505 } 1505 }
1506 1506