/openssl/util/ |
H A D | cavs-to-evptest.pl | 25 my $taglen = 0; 55 $taglen = $2; 72 $ct = substr($2, 0, length($2) - ($taglen * 2)); 73 $tag = substr($2, $taglen * -2); 85 $taglen = $2; 99 if ($taglen > 0) {
|
/openssl/ssl/record/ |
H A D | ssl3_record_tls13.c | 29 size_t taglen, offset, loop, hdrlen; in tls13_enc() local 93 taglen = EVP_CCM8_TLS_TAG_LEN; in tls13_enc() 95 taglen = EVP_CCM_TLS_TAG_LEN; in tls13_enc() 96 if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, taglen, NULL) <= 0) { in tls13_enc() 101 taglen = EVP_GCM_TLS_TAG_LEN; in tls13_enc() 103 taglen = EVP_CHACHAPOLY_TLS_TAG_LEN; in tls13_enc() 140 || !WPACKET_put_bytes_u16(&wpkt, rec->length + taglen) in tls13_enc() 166 if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, taglen, in tls13_enc() 171 rec->length += taglen; in tls13_enc()
|
/openssl/ssl/record/methods/ |
H A D | tls13_meth.c | 21 size_t taglen, in tls13_set_crypto_state() argument 41 rl->taglen = taglen; in tls13_set_crypto_state() 49 && EVP_CIPHER_CTX_ctrl(ciph_ctx, EVP_CTRL_AEAD_SET_TAG, taglen, in tls13_set_crypto_state() 108 if (rec->length < rl->taglen + 1) in tls13_cipher() 110 rec->length -= rl->taglen; in tls13_cipher() 137 rl->taglen, in tls13_cipher() 147 || !WPACKET_put_bytes_u16(&wpkt, rec->length + rl->taglen) in tls13_cipher() 173 if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, rl->taglen, in tls13_cipher() 178 rec->length += rl->taglen; in tls13_cipher()
|
H A D | ktls_meth.c | 27 const EVP_MD *md, size_t taglen) in ktls_check_supported_cipher() argument 73 size_t taglen) in ktls_int_check_supported_cipher() argument 173 const EVP_MD *md, size_t taglen) 190 || taglen != EVP_CCM_TLS_TAG_LEN) 215 size_t taglen) 232 || taglen != EVP_CCM_TLS_TAG_LEN) 375 size_t taglen, 404 if (!ktls_int_check_supported_cipher(rl, ciph, md, taglen)) 499 const EVP_CIPHER *ciph, size_t taglen, 511 ciph, taglen, mactype, md, comp, prev, [all …]
|
H A D | recmethod_local.h | 36 size_t taglen, 175 size_t taglen; member 262 const EVP_CIPHER *ciph, size_t taglen,
|
/openssl/test/ |
H A D | aesgcmtest.c | 97 int ctlen = 0, taglen = 0; in kat_test() local 99 return do_encrypt(NULL, ct, &ctlen, tag, &taglen) in kat_test() 101 && TEST_mem_eq(gcm_tag, sizeof(gcm_tag), tag, taglen) in kat_test() 102 && do_decrypt(gcm_iv, ct, ctlen, tag, taglen); in kat_test() 125 int ctlen = 0, taglen = 0; in ivgen_test() local 127 return do_encrypt(iv_gen, ct, &ctlen, tag, &taglen) in ivgen_test() 128 && do_decrypt(iv_gen, ct, ctlen, tag, taglen); in ivgen_test()
|
/openssl/providers/implementations/ciphers/ |
H A D | ciphercommon_ccm_hw.c | 33 unsigned char *tag, size_t taglen) in ossl_ccm_generic_auth_encrypt() argument 44 rv = (CRYPTO_ccm128_tag(&ctx->ccm_ctx, tag, taglen) > 0); in ossl_ccm_generic_auth_encrypt() 50 unsigned char *expected_tag, size_t taglen) in ossl_ccm_generic_auth_decrypt() argument 62 if (!CRYPTO_ccm128_tag(&ctx->ccm_ctx, tag, taglen) in ossl_ccm_generic_auth_decrypt() 63 || CRYPTO_memcmp(tag, expected_tag, taglen) != 0) in ossl_ccm_generic_auth_decrypt()
|
H A D | cipher_aes_ocb.c | 52 size_t ivlen, size_t taglen) in aes_generic_ocb_setiv() argument 54 return (CRYPTO_ocb128_setiv(&ctx->ocb, iv, ivlen, taglen) == 1); in aes_generic_ocb_setiv() 224 ctx->taglen)) in update_iv() 292 if (!aes_generic_ocb_gettag(ctx, ctx->tag, ctx->taglen)) in aes_ocb_block_final() 296 if (ctx->taglen == 0) in aes_ocb_block_final() 318 ctx->taglen = OCB_DEFAULT_TAG_LEN; in aes_ocb_newctx() 374 ctx->taglen = p->data_size; in aes_ocb_set_ctx_params() 376 if (p->data_size != ctx->taglen || ctx->base.enc) in aes_ocb_set_ctx_params() 425 if (!OSSL_PARAM_set_size_t(p, ctx->taglen)) { in aes_ocb_get_ctx_params() 461 if (!ctx->base.enc || p->data_size != ctx->taglen) { in aes_ocb_get_ctx_params() [all …]
|
H A D | ciphercommon_gcm_hw.c | 43 ctx->taglen = GCM_TAG_MAX_SIZE; in ossl_gcm_cipher_final() 45 if (CRYPTO_gcm128_finish(&ctx->gcm, tag, ctx->taglen) != 0) in ossl_gcm_cipher_final() 62 ctx->taglen = GCM_TAG_MAX_SIZE; in ossl_gcm_one_shot()
|
H A D | ciphercommon_gcm.c | 37 ctx->taglen = UNINITIALISED_SIZET; in ossl_gcm_initctx() 161 size_t taglen = (ctx->taglen != UNINITIALISED_SIZET) ? ctx->taglen : in ossl_gcm_get_ctx_params() local 164 if (!OSSL_PARAM_set_size_t(p, taglen)) { in ossl_gcm_get_ctx_params() 211 || ctx->taglen == UNINITIALISED_SIZET) { in ossl_gcm_get_ctx_params() 251 ctx->taglen = sz; in ossl_gcm_set_ctx_params() 431 if (!ctx->enc && ctx->taglen == UNINITIALISED_SIZET) in gcm_cipher_internal()
|
H A D | cipher_aes_siv.c | 40 ctx->taglen = SIV_LEN; in aes_siv_newctx() 166 || p->data_size != ctx->taglen in aes_siv_get_ctx_params() 167 || !OSSL_PARAM_set_octet_string(p, &sctx->tag.byte, ctx->taglen)) { in aes_siv_get_ctx_params() 173 if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->taglen)) { in aes_siv_get_ctx_params()
|
H A D | cipher_aes_gcm_hw_vaes_avx512.inc | 184 ctx->taglen = GCM_TAG_MAX_SIZE; 186 ctx->taglen <= sizeof(gcmctx->Xi.c) ? ctx->taglen : 190 return !CRYPTO_memcmp(gcmctx->Xi.c, tag, ctx->taglen);
|
H A D | cipher_aes_gcm_hw_s390x.inc | 103 ctx->taglen = GCM_TAG_MAX_SIZE; 104 memcpy(tag, kma->t.b, ctx->taglen); 107 rc = (CRYPTO_memcmp(tag, kma->t.b, ctx->taglen) == 0); 116 unsigned char *tag, size_t taglen) 129 memcpy(tag, kma->t.b, taglen); 132 rc = (CRYPTO_memcmp(tag, kma->t.b, taglen) == 0);
|
H A D | cipher_aes_ocb.h | 31 size_t taglen; member
|
H A D | cipher_aes_siv.h | 28 size_t taglen; /* the taglen is the same as the sivlen */ member
|
H A D | cipher_aes_ccm_hw_s390x.inc | 223 unsigned char *tag, size_t taglen) 229 rv = s390x_aes_ccm_gettag(ctx, tag, taglen); 237 size_t taglen)
|
/openssl/providers/implementations/include/prov/ |
H A D | ciphercommon_ccm.h | 64 unsigned char *tag, size_t taglen)); 68 unsigned char *tag, size_t taglen)); 70 unsigned char *tag, size_t taglen)); 101 unsigned char *tag, size_t taglen); 104 unsigned char *expected_tag, size_t taglen);
|
H A D | ciphercommon_gcm.h | 55 size_t taglen; member 98 unsigned char *tag, size_t taglen));
|
/openssl/ssl/ |
H A D | tls13_enc.c | 349 size_t *taglen, in derive_secret_key_and_iv() argument 389 *taglen = EVP_CCM8_TLS_TAG_LEN; in derive_secret_key_and_iv() 391 *taglen = EVP_CCM_TLS_TAG_LEN; in derive_secret_key_and_iv() 396 *taglen = EVP_GCM_TLS_TAG_LEN; in derive_secret_key_and_iv() 399 *taglen = EVP_CHACHAPOLY_TLS_TAG_LEN; in derive_secret_key_and_iv() 466 size_t keylen, ivlen, taglen; in tls13_change_cipher_state() local 669 &keylen, iv, &ivlen, &taglen, ciph_ctx)) { in tls13_change_cipher_state() 721 cipher, taglen, NID_undef, NULL, NULL)) { in tls13_change_cipher_state() 744 if (!ktls_check_supported_cipher(s, cipher, NULL, taglen)) in tls13_change_cipher_state() 807 size_t keylen, ivlen, taglen; in tls13_update_key() local [all …]
|
H A D | t1_enc.c | 178 size_t taglen = 0; in tls1_change_cipher_state() local 224 taglen = EVP_CCM8_TLS_TAG_LEN; in tls1_change_cipher_state() 226 taglen = EVP_CCM_TLS_TAG_LEN; in tls1_change_cipher_state() 249 mac_secret_size, c, taglen, mac_type, in tls1_change_cipher_state() 356 || (EVP_CIPHER_CTX_ctrl(dd, EVP_CTRL_AEAD_SET_TAG, taglen, NULL) <= 0) in tls1_change_cipher_state() 391 if (!ktls_check_supported_cipher(s, c, m, taglen)) in tls1_change_cipher_state()
|
/openssl/crypto/evp/ |
H A D | e_aria.c | 39 int taglen; member 266 gctx->taglen = -1; in aria_gcm_ctrl() 294 gctx->taglen = arg; in aria_gcm_ctrl() 299 || gctx->taglen < 0) in aria_gcm_ctrl() 486 if (gctx->taglen < 0) in aria_gcm_cipher() 490 gctx->taglen) != 0) in aria_gcm_cipher() 496 gctx->taglen = 16; in aria_gcm_cipher()
|
H A D | e_aes.c | 54 int taglen; member 115 int taglen; member 946 int taglen; member 1457 gctx->taglen = -1; in s390x_aes_gcm_ctrl() 1497 gctx->taglen = arg; in s390x_aes_gcm_ctrl() 1757 gctx->taglen = 16; in s390x_aes_gcm_cipher() 2669 gctx->taglen = -1; in aes_gcm_ctrl() 2697 gctx->taglen = arg; in aes_gcm_ctrl() 3185 gctx->taglen = 16; in aes_gcm_cipher() 3873 octx->taglen = 16; in aes_ocb_ctrl() [all …]
|
/openssl/crypto/modes/ |
H A D | ocb128.c | 218 size_t len, size_t taglen) in CRYPTO_ocb128_setiv() argument 228 if ((len > 15) || (len < 1) || (taglen > 16) || (taglen < 1)) { in CRYPTO_ocb128_setiv() 236 nonce[0] = ((taglen * 8) % 128) << 1; in CRYPTO_ocb128_setiv()
|
/openssl/crypto/cms/ |
H A D | cms_enc.c | 103 if (ec->taglen > 0 in ossl_cms_EncryptedContent_init_bio() 105 ec->taglen, ec->tag) <= 0) { in ossl_cms_EncryptedContent_init_bio()
|
H A D | cms_env.c | 1220 ec->taglen = aenv->mac->length; in ossl_cms_AuthEnvelopedData_init_bio() 1294 int taglen, ok = 0; in ossl_cms_AuthEnvelopedData_final() local 1305 taglen = EVP_CIPHER_CTX_get_tag_length(ctx); in ossl_cms_AuthEnvelopedData_final() 1306 if (taglen <= 0 in ossl_cms_AuthEnvelopedData_final() 1307 || (tag = OPENSSL_malloc(taglen)) == NULL in ossl_cms_AuthEnvelopedData_final() 1308 || EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, taglen, in ossl_cms_AuthEnvelopedData_final() 1314 if (!ASN1_OCTET_STRING_set(cms->d.authEnvelopedData->mac, tag, taglen)) in ossl_cms_AuthEnvelopedData_final()
|