Remove AES-GCM support.
This commit is contained in:
parent
128a373974
commit
b78436ff1e
2 changed files with 0 additions and 134 deletions
|
|
@ -34,16 +34,8 @@ extern size_t cipher_keylength(const cipher_t *);
|
||||||
extern void cipher_get_key(const cipher_t *, void *);
|
extern void cipher_get_key(const cipher_t *, void *);
|
||||||
extern bool cipher_set_key(cipher_t *, void *, bool) __attribute__ ((__warn_unused_result__));
|
extern bool cipher_set_key(cipher_t *, void *, bool) __attribute__ ((__warn_unused_result__));
|
||||||
extern bool cipher_set_key_from_rsa(cipher_t *, void *, size_t, bool) __attribute__ ((__warn_unused_result__));
|
extern bool cipher_set_key_from_rsa(cipher_t *, void *, size_t, bool) __attribute__ ((__warn_unused_result__));
|
||||||
extern bool cipher_set_counter(cipher_t *, const void *, size_t) __attribute__ ((__warn_unused_result__));
|
|
||||||
extern bool cipher_set_counter_key(cipher_t *, void *) __attribute__ ((__warn_unused_result__));
|
|
||||||
extern bool cipher_encrypt(cipher_t *, const void *indata, size_t inlen, void *outdata, size_t *outlen, bool oneshot) __attribute__ ((__warn_unused_result__));
|
extern bool cipher_encrypt(cipher_t *, const void *indata, size_t inlen, void *outdata, size_t *outlen, bool oneshot) __attribute__ ((__warn_unused_result__));
|
||||||
extern bool cipher_decrypt(cipher_t *, const void *indata, size_t inlen, void *outdata, size_t *outlen, bool oneshot) __attribute__ ((__warn_unused_result__));
|
extern bool cipher_decrypt(cipher_t *, const void *indata, size_t inlen, void *outdata, size_t *outlen, bool oneshot) __attribute__ ((__warn_unused_result__));
|
||||||
extern bool cipher_gcm_encrypt(cipher_t *, const void *indata, size_t inlen, void *outdata, size_t *outlen) __attribute__ ((__warn_unused_result__));
|
|
||||||
extern bool cipher_gcm_encrypt_start(cipher_t *, const void *indata, size_t inlen, void *outdata, size_t *outlen) __attribute__ ((__warn_unused_result__));
|
|
||||||
extern bool cipher_gcm_encrypt_finish(cipher_t *, const void *indata, size_t inlen, void *outdata, size_t *outlen) __attribute__ ((__warn_unused_result__));
|
|
||||||
extern bool cipher_gcm_decrypt(cipher_t *, const void *indata, size_t inlen, void *outdata, size_t *outlen) __attribute__ ((__warn_unused_result__));
|
|
||||||
extern bool cipher_gcm_decrypt_start(cipher_t *, const void *indata, size_t inlen, void *outdata, size_t *outlen) __attribute__ ((__warn_unused_result__));
|
|
||||||
extern bool cipher_gcm_decrypt_finish(cipher_t *, const void *indata, size_t inlen, void *outdata, size_t *outlen) __attribute__ ((__warn_unused_result__));
|
|
||||||
extern int cipher_get_nid(const cipher_t *);
|
extern int cipher_get_nid(const cipher_t *);
|
||||||
extern bool cipher_active(const cipher_t *);
|
extern bool cipher_active(const cipher_t *);
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -30,15 +30,8 @@
|
||||||
struct cipher {
|
struct cipher {
|
||||||
EVP_CIPHER_CTX ctx;
|
EVP_CIPHER_CTX ctx;
|
||||||
const EVP_CIPHER *cipher;
|
const EVP_CIPHER *cipher;
|
||||||
struct cipher_counter *counter;
|
|
||||||
};
|
};
|
||||||
|
|
||||||
typedef struct cipher_counter {
|
|
||||||
unsigned char counter[CIPHER_MAX_IV_SIZE];
|
|
||||||
unsigned char block[CIPHER_MAX_IV_SIZE];
|
|
||||||
int n;
|
|
||||||
} cipher_counter_t;
|
|
||||||
|
|
||||||
static cipher_t *cipher_open(const EVP_CIPHER *evp_cipher) {
|
static cipher_t *cipher_open(const EVP_CIPHER *evp_cipher) {
|
||||||
cipher_t *cipher = xzalloc(sizeof *cipher);
|
cipher_t *cipher = xzalloc(sizeof *cipher);
|
||||||
cipher->cipher = evp_cipher;
|
cipher->cipher = evp_cipher;
|
||||||
|
|
@ -76,7 +69,6 @@ void cipher_close(cipher_t *cipher) {
|
||||||
return;
|
return;
|
||||||
|
|
||||||
EVP_CIPHER_CTX_cleanup(&cipher->ctx);
|
EVP_CIPHER_CTX_cleanup(&cipher->ctx);
|
||||||
free(cipher->counter);
|
|
||||||
free(cipher);
|
free(cipher);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -117,124 +109,6 @@ bool cipher_set_key_from_rsa(cipher_t *cipher, void *key, size_t len, bool encry
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool cipher_set_counter(cipher_t *cipher, const void *counter, size_t len) {
|
|
||||||
if(len > cipher->cipher->iv_len - 4) {
|
|
||||||
logger(DEBUG_ALWAYS, LOG_ERR, "Counter too long");
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
memcpy(cipher->counter->counter, counter, len);
|
|
||||||
cipher->counter->n = 0;
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
bool cipher_set_counter_key(cipher_t *cipher, void *key) {
|
|
||||||
int result = EVP_EncryptInit_ex(&cipher->ctx, cipher->cipher, NULL, (unsigned char *)key, NULL);
|
|
||||||
if(!result) {
|
|
||||||
logger(DEBUG_ALWAYS, LOG_ERR, "Error while setting key: %s", ERR_error_string(ERR_get_error(), NULL));
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
if(!cipher->counter)
|
|
||||||
cipher->counter = xzalloc(sizeof *cipher->counter);
|
|
||||||
else
|
|
||||||
cipher->counter->n = 0;
|
|
||||||
|
|
||||||
memcpy(cipher->counter->counter, (unsigned char *)key + cipher->cipher->key_len, cipher->cipher->iv_len);
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
bool cipher_gcm_encrypt_start(cipher_t *cipher, const void *indata, size_t inlen, void *outdata, size_t *outlen) {
|
|
||||||
int len = 0;
|
|
||||||
if(!EVP_EncryptInit_ex(&cipher->ctx, NULL, NULL, NULL, cipher->counter->counter)
|
|
||||||
|| (inlen && !EVP_EncryptUpdate(&cipher->ctx, (unsigned char *)outdata, &len, (unsigned char *)indata, inlen))) {
|
|
||||||
logger(DEBUG_ALWAYS, LOG_ERR, "Error while encrypting: %s", ERR_error_string(ERR_get_error(), NULL));
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
if(outlen)
|
|
||||||
*outlen = len;
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
bool cipher_gcm_encrypt_finish(cipher_t *cipher, const void *indata, size_t inlen, void *outdata, size_t *outlen) {
|
|
||||||
int len = 0, pad = 0;
|
|
||||||
if((inlen && !EVP_EncryptUpdate(&cipher->ctx, (unsigned char *)outdata, &len, (unsigned char *)indata, inlen))
|
|
||||||
|| !EVP_EncryptFinal(&cipher->ctx, (unsigned char *)outdata + len, &pad)) {
|
|
||||||
logger(DEBUG_ALWAYS, LOG_ERR, "Error while encrypting: %s", ERR_error_string(ERR_get_error(), NULL));
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
EVP_CIPHER_CTX_ctrl(&cipher->ctx, EVP_CTRL_GCM_GET_TAG, 16, (unsigned char *)outdata + len + pad);
|
|
||||||
if(outlen)
|
|
||||||
*outlen = len + pad + 16;
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
bool cipher_gcm_encrypt(cipher_t *cipher, const void *indata, size_t inlen, void *outdata, size_t *outlen) {
|
|
||||||
int len = 0, pad = 0;
|
|
||||||
if(!EVP_EncryptInit_ex(&cipher->ctx, NULL, NULL, NULL, cipher->counter->counter) ||
|
|
||||||
!EVP_EncryptUpdate(&cipher->ctx, (unsigned char *)outdata, &len, (unsigned char *)indata, inlen) ||
|
|
||||||
!EVP_EncryptFinal(&cipher->ctx, (unsigned char *)outdata + len, &pad)) {
|
|
||||||
logger(DEBUG_ALWAYS, LOG_ERR, "Error while encrypting: %s", ERR_error_string(ERR_get_error(), NULL));
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
EVP_CIPHER_CTX_ctrl(&cipher->ctx, EVP_CTRL_GCM_GET_TAG, 16, (unsigned char *)outdata + len + pad);
|
|
||||||
if(outlen)
|
|
||||||
*outlen = len + pad + 16;
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
bool cipher_gcm_decrypt(cipher_t *cipher, const void *indata, size_t inlen, void *outdata, size_t *outlen) {
|
|
||||||
if(inlen < 16)
|
|
||||||
return false;
|
|
||||||
|
|
||||||
int len = 0, pad = 0;
|
|
||||||
if(!EVP_DecryptInit_ex(&cipher->ctx, NULL, NULL, NULL, cipher->counter->counter)) {
|
|
||||||
logger(DEBUG_ALWAYS, LOG_ERR, "Error while decrypting: %s", ERR_error_string(ERR_get_error(), NULL));
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
EVP_CIPHER_CTX_ctrl(&cipher->ctx, EVP_CTRL_GCM_SET_TAG, 16, (unsigned char *)indata + inlen - 16);
|
|
||||||
|
|
||||||
if(!EVP_DecryptUpdate(&cipher->ctx, (unsigned char *)outdata, &len, (unsigned char *)indata, inlen - 16) ||
|
|
||||||
!EVP_DecryptFinal(&cipher->ctx, (unsigned char *)outdata + len, &pad)) {
|
|
||||||
logger(DEBUG_ALWAYS, LOG_ERR, "Error while decrypting: %s", ERR_error_string(ERR_get_error(), NULL));
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
if(outlen)
|
|
||||||
*outlen = len;
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
bool cipher_gcm_decrypt_start(cipher_t *cipher, const void *indata, size_t inlen, void *outdata, size_t *outlen) {
|
|
||||||
int len = 0;
|
|
||||||
if(!EVP_DecryptInit_ex(&cipher->ctx, NULL, NULL, NULL, cipher->counter->counter)
|
|
||||||
|| (inlen && !EVP_DecryptUpdate(&cipher->ctx, (unsigned char *)outdata, &len, (unsigned char *)indata, inlen))) {
|
|
||||||
logger(DEBUG_ALWAYS, LOG_ERR, "Error while decrypting: %s", ERR_error_string(ERR_get_error(), NULL));
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
if(outlen)
|
|
||||||
*outlen = len;
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
bool cipher_gcm_decrypt_finish(cipher_t *cipher, const void *indata, size_t inlen, void *outdata, size_t *outlen) {
|
|
||||||
if(inlen < 16)
|
|
||||||
return false;
|
|
||||||
|
|
||||||
EVP_CIPHER_CTX_ctrl(&cipher->ctx, EVP_CTRL_GCM_SET_TAG, 16, (unsigned char *)indata + inlen - 16);
|
|
||||||
|
|
||||||
int len = 0, pad = 0;
|
|
||||||
if((inlen > 16 && !EVP_DecryptUpdate(&cipher->ctx, (unsigned char *)outdata, &len, (unsigned char *)indata, inlen - 16))
|
|
||||||
|| !EVP_DecryptFinal(&cipher->ctx, (unsigned char *)outdata + len, &pad)) {
|
|
||||||
logger(DEBUG_ALWAYS, LOG_ERR, "Error while decrypting: %s", ERR_error_string(ERR_get_error(), NULL));
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
bool cipher_encrypt(cipher_t *cipher, const void *indata, size_t inlen, void *outdata, size_t *outlen, bool oneshot) {
|
bool cipher_encrypt(cipher_t *cipher, const void *indata, size_t inlen, void *outdata, size_t *outlen, bool oneshot) {
|
||||||
if(oneshot) {
|
if(oneshot) {
|
||||||
int len, pad;
|
int len, pad;
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue