]> git.ipfire.org Git - thirdparty/openssl.git/commitdiff
Revert "Add dupctx support to aead ciphers"
authorTomas Mraz <tomas@openssl.org>
Tue, 12 Sep 2023 16:54:55 +0000 (18:54 +0200)
committerTomas Mraz <tomas@openssl.org>
Wed, 13 Sep 2023 11:17:12 +0000 (13:17 +0200)
This reverts commit a982016c56f8c631e0906b0a33f4feaf3d20a2ff.

Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/22081)

providers/implementations/ciphers/cipher_aes_ccm.c
providers/implementations/ciphers/cipher_aes_gcm.c
providers/implementations/ciphers/cipher_aria_ccm.c
providers/implementations/ciphers/cipher_aria_gcm.c
providers/implementations/ciphers/cipher_sm4_ccm.c
providers/implementations/ciphers/cipher_sm4_gcm.c
providers/implementations/include/prov/ciphercommon_aead.h

index 3930f52d60650e5ab4ab8adf0771c465f9094f48..bb4b1e1e64907a4fc204b6811bbd6cebc7a0f322 100644 (file)
@@ -33,26 +33,6 @@ static void *aes_ccm_newctx(void *provctx, size_t keybits)
     return ctx;
 }
 
-static void *aes_ccm_dupctx(void *provctx)
-{
-    PROV_AES_CCM_CTX *ctx = provctx;
-    PROV_AES_CCM_CTX *dupctx = NULL;
-
-    if (ctx == NULL)
-        return NULL;
-    dupctx = OPENSSL_memdup(provctx, sizeof(*ctx));
-    if (dupctx == NULL)
-        return NULL;
-    /*
-     * ossl_cm_initctx, via the ossl_prov_aes_hw_ccm functions assign a
-     * provctx->ccm.ks.ks to the ccm context key so we need to point it to
-     * the memduped copy
-     */
-    dupctx->base.ccm_ctx.key = &dupctx->ccm.ks.ks;
-
-    return dupctx;
-}
-
 static OSSL_FUNC_cipher_freectx_fn aes_ccm_freectx;
 static void aes_ccm_freectx(void *vctx)
 {
index 0a15693cc1a4cf6b109868243d61f9f7f335ee98..0081ca6cd776fc4f8f2a0718f8e1becc966150c9 100644 (file)
@@ -34,15 +34,6 @@ static void *aes_gcm_newctx(void *provctx, size_t keybits)
     return ctx;
 }
 
-static void *aes_gcm_dupctx(void *provctx)
-{
-    PROV_AES_GCM_CTX *ctx = provctx;
-
-    if (ctx == NULL)
-        return NULL;
-    return OPENSSL_memdup(ctx, sizeof(*ctx));
-}
-
 static OSSL_FUNC_cipher_freectx_fn aes_gcm_freectx;
 static void aes_gcm_freectx(void *vctx)
 {
index 39a96a6f1404d6b7281befb7e2d04e1b6e309f07..d6b5517ee0965f62a7123c357a3e6342c4138374 100644 (file)
@@ -28,15 +28,6 @@ static void *aria_ccm_newctx(void *provctx, size_t keybits)
     return ctx;
 }
 
-static void *aria_ccm_dupctx(void *provctx)
-{
-    PROV_ARIA_CCM_CTX *ctx = provctx;
-
-    if (ctx == NULL)
-        return NULL;
-    return OPENSSL_memdup(ctx, sizeof(*ctx));
-}
-
 static void aria_ccm_freectx(void *vctx)
 {
     PROV_ARIA_CCM_CTX *ctx = (PROV_ARIA_CCM_CTX *)vctx;
index 6ffa0910fa21ddb799714ace09373af5db9dea45..b412bd3202f82e470372695c02ddc9775e993e37 100644 (file)
@@ -27,15 +27,6 @@ static void *aria_gcm_newctx(void *provctx, size_t keybits)
     return ctx;
 }
 
-static void *aria_gcm_dupctx(void *provctx)
-{
-    PROV_ARIA_GCM_CTX *ctx = provctx;
-
-    if (ctx == NULL)
-        return NULL;
-    return OPENSSL_memdup(ctx, sizeof(*ctx));
-}
-
 static OSSL_FUNC_cipher_freectx_fn aria_gcm_freectx;
 static void aria_gcm_freectx(void *vctx)
 {
index fa4b216a024804c6a2720428a6e2cfd68043515c..38e75016e930fcf78b8209228f28005c0d7222bc 100644 (file)
@@ -28,15 +28,6 @@ static void *sm4_ccm_newctx(void *provctx, size_t keybits)
     return ctx;
 }
 
-static void *sm4_ccm_dupctx(void *provctx)
-{
-    PROV_SM4_CCM_CTX *ctx = provctx;
-
-    if (ctx == NULL)
-        return NULL;
-    return OPENSSL_memdup(ctx, sizeof(*ctx));
-}
-
 static void sm4_ccm_freectx(void *vctx)
 {
     PROV_SM4_CCM_CTX *ctx = (PROV_SM4_CCM_CTX *)vctx;
index 88761a30f04f5af5feefa9205a70ff6553c55453..ce1aa2b07d548c591cb0696cbfffa786576e8e85 100644 (file)
@@ -29,15 +29,6 @@ static void *sm4_gcm_newctx(void *provctx, size_t keybits)
     return ctx;
 }
 
-static void *sm4_gcm_dupctx(void *provctx)
-{
-    PROV_SM4_GCM_CTX *ctx = provctx;
-
-    if (ctx == NULL)
-        return NULL;
-    return OPENSSL_memdup(ctx, sizeof(*ctx));
-}
-
 static void sm4_gcm_freectx(void *vctx)
 {
     PROV_SM4_GCM_CTX *ctx = (PROV_SM4_GCM_CTX *)vctx;
index de3dd52ee7c451c74517e8b4cc6fe7e7cab2751a..1d017175d320160a9f4fffcbd122bb9ff29ca9a8 100644 (file)
@@ -23,14 +23,9 @@ static void * alg##kbits##lc##_newctx(void *provctx)                           \
 {                                                                              \
     return alg##_##lc##_newctx(provctx, kbits);                                \
 }                                                                              \
-static void * alg##kbits##lc##_dupctx(void *src)                               \
-{                                                                              \
-    return alg##_##lc##_dupctx(src);                                           \
-}                                                                              \
 const OSSL_DISPATCH ossl_##alg##kbits##lc##_functions[] = {                    \
     { OSSL_FUNC_CIPHER_NEWCTX, (void (*)(void))alg##kbits##lc##_newctx },      \
     { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))alg##_##lc##_freectx },        \
-    { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))alg##kbits##lc##_dupctx },      \
     { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))ossl_##lc##_einit },      \
     { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))ossl_##lc##_dinit },      \
     { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))ossl_##lc##_stream_update },    \