mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-08-24 11:08:45 +00:00
LibreSSL 3.5.0 fails to compile with these shims. We could have just removed the LibreSSL check from the pre-processor condition, but it seems that these shims are no longer needed because all the supported versions of OpenSSL and LibreSSL have those functions. According to EVP_ENCRYPTINIT(3) manual page in LibreSSL, EVP_CIPHER_CTX_new() and EVP_CIPHER_CTX_free() first appeared in OpenSSL 0.9.8b, and have been available since OpenBSD 4.5.
72 lines
1.9 KiB
C
72 lines
1.9 KiB
C
/*
|
|
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
|
*
|
|
* SPDX-License-Identifier: MPL-2.0
|
|
*
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
|
|
*
|
|
* See the COPYRIGHT file distributed with this work for additional
|
|
* information regarding copyright ownership.
|
|
*/
|
|
|
|
/*! \file isc/aes.c */
|
|
|
|
#include <openssl/evp.h>
|
|
#include <openssl/opensslv.h>
|
|
|
|
#include <isc/aes.h>
|
|
#include <isc/assertions.h>
|
|
#include <isc/string.h>
|
|
#include <isc/types.h>
|
|
#include <isc/util.h>
|
|
|
|
void
|
|
isc_aes128_crypt(const unsigned char *key, const unsigned char *in,
|
|
unsigned char *out) {
|
|
EVP_CIPHER_CTX *c;
|
|
int len;
|
|
|
|
c = EVP_CIPHER_CTX_new();
|
|
RUNTIME_CHECK(c != NULL);
|
|
RUNTIME_CHECK(EVP_EncryptInit(c, EVP_aes_128_ecb(), key, NULL) == 1);
|
|
EVP_CIPHER_CTX_set_padding(c, 0);
|
|
RUNTIME_CHECK(
|
|
EVP_EncryptUpdate(c, out, &len, in, ISC_AES_BLOCK_LENGTH) == 1);
|
|
RUNTIME_CHECK(len == ISC_AES_BLOCK_LENGTH);
|
|
EVP_CIPHER_CTX_free(c);
|
|
}
|
|
|
|
void
|
|
isc_aes192_crypt(const unsigned char *key, const unsigned char *in,
|
|
unsigned char *out) {
|
|
EVP_CIPHER_CTX *c;
|
|
int len;
|
|
|
|
c = EVP_CIPHER_CTX_new();
|
|
RUNTIME_CHECK(c != NULL);
|
|
RUNTIME_CHECK(EVP_EncryptInit(c, EVP_aes_192_ecb(), key, NULL) == 1);
|
|
EVP_CIPHER_CTX_set_padding(c, 0);
|
|
RUNTIME_CHECK(
|
|
EVP_EncryptUpdate(c, out, &len, in, ISC_AES_BLOCK_LENGTH) == 1);
|
|
RUNTIME_CHECK(len == ISC_AES_BLOCK_LENGTH);
|
|
EVP_CIPHER_CTX_free(c);
|
|
}
|
|
|
|
void
|
|
isc_aes256_crypt(const unsigned char *key, const unsigned char *in,
|
|
unsigned char *out) {
|
|
EVP_CIPHER_CTX *c;
|
|
int len;
|
|
|
|
c = EVP_CIPHER_CTX_new();
|
|
RUNTIME_CHECK(c != NULL);
|
|
RUNTIME_CHECK(EVP_EncryptInit(c, EVP_aes_256_ecb(), key, NULL) == 1);
|
|
EVP_CIPHER_CTX_set_padding(c, 0);
|
|
RUNTIME_CHECK(
|
|
EVP_EncryptUpdate(c, out, &len, in, ISC_AES_BLOCK_LENGTH) == 1);
|
|
RUNTIME_CHECK(len == ISC_AES_BLOCK_LENGTH);
|
|
EVP_CIPHER_CTX_free(c);
|
|
}
|