diff options
Diffstat (limited to 'src')
| -rw-r--r-- | src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c | 62 | ||||
| -rw-r--r-- | src/lib/libssl/src/crypto/evp/e_aes_cbc_hmac_sha1.c | 62 |
2 files changed, 56 insertions, 68 deletions
diff --git a/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c b/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c index a9a5cf1ca5..7c23face34 100644 --- a/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c +++ b/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_aes_cbc_hmac_sha1.c,v 1.7 2014/07/10 22:45:57 jsing Exp $ */ | 1 | /* $OpenBSD: e_aes_cbc_hmac_sha1.c,v 1.8 2014/07/12 20:37:07 miod Exp $ */ |
| 2 | /* ==================================================================== | 2 | /* ==================================================================== |
| 3 | * Copyright (c) 2011-2013 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 2011-2013 The OpenSSL Project. All rights reserved. |
| 4 | * | 4 | * |
| @@ -67,10 +67,6 @@ | |||
| 67 | #define EVP_CTRL_AEAD_SET_MAC_KEY 0x17 | 67 | #define EVP_CTRL_AEAD_SET_MAC_KEY 0x17 |
| 68 | #endif | 68 | #endif |
| 69 | 69 | ||
| 70 | #if !defined(EVP_CIPH_FLAG_DEFAULT_ASN1) | ||
| 71 | #define EVP_CIPH_FLAG_DEFAULT_ASN1 0 | ||
| 72 | #endif | ||
| 73 | |||
| 74 | #define TLS1_1_VERSION 0x0302 | 70 | #define TLS1_1_VERSION 0x0302 |
| 75 | 71 | ||
| 76 | typedef struct { | 72 | typedef struct { |
| @@ -486,7 +482,7 @@ aesni_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | |||
| 486 | unsigned int i; | 482 | unsigned int i; |
| 487 | unsigned char hmac_key[64]; | 483 | unsigned char hmac_key[64]; |
| 488 | 484 | ||
| 489 | memset (hmac_key, 0, sizeof(hmac_key)); | 485 | memset(hmac_key, 0, sizeof(hmac_key)); |
| 490 | 486 | ||
| 491 | if (arg > (int)sizeof(hmac_key)) { | 487 | if (arg > (int)sizeof(hmac_key)) { |
| 492 | SHA1_Init(&key->head); | 488 | SHA1_Init(&key->head); |
| @@ -544,52 +540,50 @@ aesni_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | |||
| 544 | 540 | ||
| 545 | static EVP_CIPHER aesni_128_cbc_hmac_sha1_cipher = { | 541 | static EVP_CIPHER aesni_128_cbc_hmac_sha1_cipher = { |
| 546 | #ifdef NID_aes_128_cbc_hmac_sha1 | 542 | #ifdef NID_aes_128_cbc_hmac_sha1 |
| 547 | NID_aes_128_cbc_hmac_sha1, | 543 | .nid = NID_aes_128_cbc_hmac_sha1, |
| 548 | #else | 544 | #else |
| 549 | NID_undef, | 545 | .nid = NID_undef, |
| 550 | #endif | 546 | #endif |
| 551 | 16, 16, 16, | 547 | .block_size = 16, |
| 552 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, | 548 | .key_len = 16, |
| 553 | aesni_cbc_hmac_sha1_init_key, | 549 | .iv_len = 16, |
| 554 | aesni_cbc_hmac_sha1_cipher, | 550 | .flags = EVP_CIPH_CBC_MODE | EVP_CIPH_FLAG_DEFAULT_ASN1 | |
| 555 | NULL, | 551 | EVP_CIPH_FLAG_AEAD_CIPHER, |
| 556 | sizeof(EVP_AES_HMAC_SHA1), | 552 | .init = aesni_cbc_hmac_sha1_init_key, |
| 557 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_set_asn1_iv, | 553 | .do_cipher = aesni_cbc_hmac_sha1_cipher, |
| 558 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_get_asn1_iv, | 554 | .ctx_size = sizeof(EVP_AES_HMAC_SHA1), |
| 559 | aesni_cbc_hmac_sha1_ctrl, | 555 | .ctrl = aesni_cbc_hmac_sha1_ctrl |
| 560 | NULL | ||
| 561 | }; | 556 | }; |
| 562 | 557 | ||
| 563 | static EVP_CIPHER aesni_256_cbc_hmac_sha1_cipher = { | 558 | static EVP_CIPHER aesni_256_cbc_hmac_sha1_cipher = { |
| 564 | #ifdef NID_aes_256_cbc_hmac_sha1 | 559 | #ifdef NID_aes_256_cbc_hmac_sha1 |
| 565 | NID_aes_256_cbc_hmac_sha1, | 560 | .nid = NID_aes_256_cbc_hmac_sha1, |
| 566 | #else | 561 | #else |
| 567 | NID_undef, | 562 | .nid = NID_undef, |
| 568 | #endif | 563 | #endif |
| 569 | 16, 32, 16, | 564 | .block_size = 16, |
| 570 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, | 565 | .key_len = 32, |
| 571 | aesni_cbc_hmac_sha1_init_key, | 566 | .iv_len = 16, |
| 572 | aesni_cbc_hmac_sha1_cipher, | 567 | .flags = EVP_CIPH_CBC_MODE | EVP_CIPH_FLAG_DEFAULT_ASN1 | |
| 573 | NULL, | 568 | EVP_CIPH_FLAG_AEAD_CIPHER, |
| 574 | sizeof(EVP_AES_HMAC_SHA1), | 569 | .init = aesni_cbc_hmac_sha1_init_key, |
| 575 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_set_asn1_iv, | 570 | .do_cipher = aesni_cbc_hmac_sha1_cipher, |
| 576 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_get_asn1_iv, | 571 | .ctx_size = sizeof(EVP_AES_HMAC_SHA1), |
| 577 | aesni_cbc_hmac_sha1_ctrl, | 572 | .ctrl = aesni_cbc_hmac_sha1_ctrl |
| 578 | NULL | ||
| 579 | }; | 573 | }; |
| 580 | 574 | ||
| 581 | const EVP_CIPHER * | 575 | const EVP_CIPHER * |
| 582 | EVP_aes_128_cbc_hmac_sha1(void) | 576 | EVP_aes_128_cbc_hmac_sha1(void) |
| 583 | { | 577 | { |
| 584 | return(OPENSSL_ia32cap_P[1] & AESNI_CAPABLE? | 578 | return OPENSSL_ia32cap_P[1] & AESNI_CAPABLE ? |
| 585 | &aesni_128_cbc_hmac_sha1_cipher : NULL); | 579 | &aesni_128_cbc_hmac_sha1_cipher : NULL; |
| 586 | } | 580 | } |
| 587 | 581 | ||
| 588 | const EVP_CIPHER * | 582 | const EVP_CIPHER * |
| 589 | EVP_aes_256_cbc_hmac_sha1(void) | 583 | EVP_aes_256_cbc_hmac_sha1(void) |
| 590 | { | 584 | { |
| 591 | return(OPENSSL_ia32cap_P[1] & AESNI_CAPABLE? | 585 | return OPENSSL_ia32cap_P[1] & AESNI_CAPABLE ? |
| 592 | &aesni_256_cbc_hmac_sha1_cipher : NULL); | 586 | &aesni_256_cbc_hmac_sha1_cipher : NULL; |
| 593 | } | 587 | } |
| 594 | #else | 588 | #else |
| 595 | const EVP_CIPHER * | 589 | const EVP_CIPHER * |
diff --git a/src/lib/libssl/src/crypto/evp/e_aes_cbc_hmac_sha1.c b/src/lib/libssl/src/crypto/evp/e_aes_cbc_hmac_sha1.c index a9a5cf1ca5..7c23face34 100644 --- a/src/lib/libssl/src/crypto/evp/e_aes_cbc_hmac_sha1.c +++ b/src/lib/libssl/src/crypto/evp/e_aes_cbc_hmac_sha1.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_aes_cbc_hmac_sha1.c,v 1.7 2014/07/10 22:45:57 jsing Exp $ */ | 1 | /* $OpenBSD: e_aes_cbc_hmac_sha1.c,v 1.8 2014/07/12 20:37:07 miod Exp $ */ |
| 2 | /* ==================================================================== | 2 | /* ==================================================================== |
| 3 | * Copyright (c) 2011-2013 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 2011-2013 The OpenSSL Project. All rights reserved. |
| 4 | * | 4 | * |
| @@ -67,10 +67,6 @@ | |||
| 67 | #define EVP_CTRL_AEAD_SET_MAC_KEY 0x17 | 67 | #define EVP_CTRL_AEAD_SET_MAC_KEY 0x17 |
| 68 | #endif | 68 | #endif |
| 69 | 69 | ||
| 70 | #if !defined(EVP_CIPH_FLAG_DEFAULT_ASN1) | ||
| 71 | #define EVP_CIPH_FLAG_DEFAULT_ASN1 0 | ||
| 72 | #endif | ||
| 73 | |||
| 74 | #define TLS1_1_VERSION 0x0302 | 70 | #define TLS1_1_VERSION 0x0302 |
| 75 | 71 | ||
| 76 | typedef struct { | 72 | typedef struct { |
| @@ -486,7 +482,7 @@ aesni_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | |||
| 486 | unsigned int i; | 482 | unsigned int i; |
| 487 | unsigned char hmac_key[64]; | 483 | unsigned char hmac_key[64]; |
| 488 | 484 | ||
| 489 | memset (hmac_key, 0, sizeof(hmac_key)); | 485 | memset(hmac_key, 0, sizeof(hmac_key)); |
| 490 | 486 | ||
| 491 | if (arg > (int)sizeof(hmac_key)) { | 487 | if (arg > (int)sizeof(hmac_key)) { |
| 492 | SHA1_Init(&key->head); | 488 | SHA1_Init(&key->head); |
| @@ -544,52 +540,50 @@ aesni_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | |||
| 544 | 540 | ||
| 545 | static EVP_CIPHER aesni_128_cbc_hmac_sha1_cipher = { | 541 | static EVP_CIPHER aesni_128_cbc_hmac_sha1_cipher = { |
| 546 | #ifdef NID_aes_128_cbc_hmac_sha1 | 542 | #ifdef NID_aes_128_cbc_hmac_sha1 |
| 547 | NID_aes_128_cbc_hmac_sha1, | 543 | .nid = NID_aes_128_cbc_hmac_sha1, |
| 548 | #else | 544 | #else |
| 549 | NID_undef, | 545 | .nid = NID_undef, |
| 550 | #endif | 546 | #endif |
| 551 | 16, 16, 16, | 547 | .block_size = 16, |
| 552 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, | 548 | .key_len = 16, |
| 553 | aesni_cbc_hmac_sha1_init_key, | 549 | .iv_len = 16, |
| 554 | aesni_cbc_hmac_sha1_cipher, | 550 | .flags = EVP_CIPH_CBC_MODE | EVP_CIPH_FLAG_DEFAULT_ASN1 | |
| 555 | NULL, | 551 | EVP_CIPH_FLAG_AEAD_CIPHER, |
| 556 | sizeof(EVP_AES_HMAC_SHA1), | 552 | .init = aesni_cbc_hmac_sha1_init_key, |
| 557 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_set_asn1_iv, | 553 | .do_cipher = aesni_cbc_hmac_sha1_cipher, |
| 558 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_get_asn1_iv, | 554 | .ctx_size = sizeof(EVP_AES_HMAC_SHA1), |
| 559 | aesni_cbc_hmac_sha1_ctrl, | 555 | .ctrl = aesni_cbc_hmac_sha1_ctrl |
| 560 | NULL | ||
| 561 | }; | 556 | }; |
| 562 | 557 | ||
| 563 | static EVP_CIPHER aesni_256_cbc_hmac_sha1_cipher = { | 558 | static EVP_CIPHER aesni_256_cbc_hmac_sha1_cipher = { |
| 564 | #ifdef NID_aes_256_cbc_hmac_sha1 | 559 | #ifdef NID_aes_256_cbc_hmac_sha1 |
| 565 | NID_aes_256_cbc_hmac_sha1, | 560 | .nid = NID_aes_256_cbc_hmac_sha1, |
| 566 | #else | 561 | #else |
| 567 | NID_undef, | 562 | .nid = NID_undef, |
| 568 | #endif | 563 | #endif |
| 569 | 16, 32, 16, | 564 | .block_size = 16, |
| 570 | EVP_CIPH_CBC_MODE|EVP_CIPH_FLAG_DEFAULT_ASN1|EVP_CIPH_FLAG_AEAD_CIPHER, | 565 | .key_len = 32, |
| 571 | aesni_cbc_hmac_sha1_init_key, | 566 | .iv_len = 16, |
| 572 | aesni_cbc_hmac_sha1_cipher, | 567 | .flags = EVP_CIPH_CBC_MODE | EVP_CIPH_FLAG_DEFAULT_ASN1 | |
| 573 | NULL, | 568 | EVP_CIPH_FLAG_AEAD_CIPHER, |
| 574 | sizeof(EVP_AES_HMAC_SHA1), | 569 | .init = aesni_cbc_hmac_sha1_init_key, |
| 575 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_set_asn1_iv, | 570 | .do_cipher = aesni_cbc_hmac_sha1_cipher, |
| 576 | EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_get_asn1_iv, | 571 | .ctx_size = sizeof(EVP_AES_HMAC_SHA1), |
| 577 | aesni_cbc_hmac_sha1_ctrl, | 572 | .ctrl = aesni_cbc_hmac_sha1_ctrl |
| 578 | NULL | ||
| 579 | }; | 573 | }; |
| 580 | 574 | ||
| 581 | const EVP_CIPHER * | 575 | const EVP_CIPHER * |
| 582 | EVP_aes_128_cbc_hmac_sha1(void) | 576 | EVP_aes_128_cbc_hmac_sha1(void) |
| 583 | { | 577 | { |
| 584 | return(OPENSSL_ia32cap_P[1] & AESNI_CAPABLE? | 578 | return OPENSSL_ia32cap_P[1] & AESNI_CAPABLE ? |
| 585 | &aesni_128_cbc_hmac_sha1_cipher : NULL); | 579 | &aesni_128_cbc_hmac_sha1_cipher : NULL; |
| 586 | } | 580 | } |
| 587 | 581 | ||
| 588 | const EVP_CIPHER * | 582 | const EVP_CIPHER * |
| 589 | EVP_aes_256_cbc_hmac_sha1(void) | 583 | EVP_aes_256_cbc_hmac_sha1(void) |
| 590 | { | 584 | { |
| 591 | return(OPENSSL_ia32cap_P[1] & AESNI_CAPABLE? | 585 | return OPENSSL_ia32cap_P[1] & AESNI_CAPABLE ? |
| 592 | &aesni_256_cbc_hmac_sha1_cipher : NULL); | 586 | &aesni_256_cbc_hmac_sha1_cipher : NULL; |
| 593 | } | 587 | } |
| 594 | #else | 588 | #else |
| 595 | const EVP_CIPHER * | 589 | const EVP_CIPHER * |
