xref: /src/crypto/openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha.c (revision f25b8c9fb4f58cf61adb47d7570abe7caa6d385d)
1 /*
2  * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved.
3  *
4  * Licensed under the Apache License 2.0 (the "License").  You may not use
5  * this file except in compliance with the License.  You can obtain a copy
6  * in the file LICENSE in the source distribution or at
7  * https://www.openssl.org/source/license.html
8  */
9 
10 /*
11  * AES low level APIs are deprecated for public use, but still ok for internal
12  * use where we're using them to implement the higher level EVP interface, as is
13  * the case here.
14  */
15 #include "internal/deprecated.h"
16 
17 /* Dispatch functions for AES_CBC_HMAC_SHA ciphers */
18 
19 /* For SSL3_VERSION and TLS1_VERSION */
20 #include <openssl/prov_ssl.h>
21 #include <openssl/proverr.h>
22 #include "cipher_aes_cbc_hmac_sha.h"
23 #include "prov/implementations.h"
24 #include "prov/providercommon.h"
25 
26 #ifndef AES_CBC_HMAC_SHA_CAPABLE
27 #define IMPLEMENT_CIPHER(nm, sub, kbits, blkbits, ivbits, flags) \
28     const OSSL_DISPATCH ossl_##nm##kbits##sub##_functions[] = {  \
29         OSSL_DISPATCH_END                                        \
30     };
31 #else
32 
33 #define AES_CBC_HMAC_SHA_FLAGS (PROV_CIPHER_FLAG_AEAD \
34     | PROV_CIPHER_FLAG_TLS1_MULTIBLOCK)
35 
36 static OSSL_FUNC_cipher_encrypt_init_fn aes_einit;
37 static OSSL_FUNC_cipher_decrypt_init_fn aes_dinit;
38 static OSSL_FUNC_cipher_freectx_fn aes_cbc_hmac_sha1_freectx;
39 static OSSL_FUNC_cipher_freectx_fn aes_cbc_hmac_sha256_freectx;
40 static OSSL_FUNC_cipher_get_ctx_params_fn aes_get_ctx_params;
41 static OSSL_FUNC_cipher_gettable_ctx_params_fn aes_gettable_ctx_params;
42 static OSSL_FUNC_cipher_set_ctx_params_fn aes_set_ctx_params;
43 static OSSL_FUNC_cipher_settable_ctx_params_fn aes_settable_ctx_params;
44 #define aes_gettable_params ossl_cipher_generic_gettable_params
45 #define aes_update ossl_cipher_generic_stream_update
46 #define aes_final ossl_cipher_generic_stream_final
47 #define aes_cipher ossl_cipher_generic_cipher
48 
aes_einit(void * ctx,const unsigned char * key,size_t keylen,const unsigned char * iv,size_t ivlen,const OSSL_PARAM params[])49 static int aes_einit(void *ctx, const unsigned char *key, size_t keylen,
50     const unsigned char *iv, size_t ivlen,
51     const OSSL_PARAM params[])
52 {
53     if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL))
54         return 0;
55     return aes_set_ctx_params(ctx, params);
56 }
57 
aes_dinit(void * ctx,const unsigned char * key,size_t keylen,const unsigned char * iv,size_t ivlen,const OSSL_PARAM params[])58 static int aes_dinit(void *ctx, const unsigned char *key, size_t keylen,
59     const unsigned char *iv, size_t ivlen,
60     const OSSL_PARAM params[])
61 {
62     if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL))
63         return 0;
64     return aes_set_ctx_params(ctx, params);
65 }
66 
67 static const OSSL_PARAM cipher_aes_known_settable_ctx_params[] = {
68     OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_MAC_KEY, NULL, 0),
69     OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TLS1_AAD, NULL, 0),
70 #if !defined(OPENSSL_NO_MULTIBLOCK)
71     OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_MAX_SEND_FRAGMENT, NULL),
72     OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_AAD, NULL),
73     OSSL_PARAM_uint(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_INTERLEAVE, NULL),
74     OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_ENC, NULL, 0),
75     OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_ENC_IN, NULL, 0),
76 #endif /* !defined(OPENSSL_NO_MULTIBLOCK) */
77     OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL),
78     OSSL_PARAM_END
79 };
aes_settable_ctx_params(ossl_unused void * cctx,ossl_unused void * provctx)80 const OSSL_PARAM *aes_settable_ctx_params(ossl_unused void *cctx,
81     ossl_unused void *provctx)
82 {
83     return cipher_aes_known_settable_ctx_params;
84 }
85 
aes_set_ctx_params(void * vctx,const OSSL_PARAM params[])86 static int aes_set_ctx_params(void *vctx, const OSSL_PARAM params[])
87 {
88     PROV_AES_HMAC_SHA_CTX *ctx = (PROV_AES_HMAC_SHA_CTX *)vctx;
89     PROV_CIPHER_HW_AES_HMAC_SHA *hw = (PROV_CIPHER_HW_AES_HMAC_SHA *)ctx->hw;
90     const OSSL_PARAM *p;
91     int ret = 1;
92 #if !defined(OPENSSL_NO_MULTIBLOCK)
93     EVP_CTRL_TLS1_1_MULTIBLOCK_PARAM mb_param;
94 #endif
95 
96     if (ossl_param_is_empty(params))
97         return 1;
98 
99     p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_AEAD_MAC_KEY);
100     if (p != NULL) {
101         if (p->data_type != OSSL_PARAM_OCTET_STRING) {
102             ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
103             return 0;
104         }
105         hw->init_mac_key(ctx, p->data, p->data_size);
106     }
107 
108 #if !defined(OPENSSL_NO_MULTIBLOCK)
109     p = OSSL_PARAM_locate_const(params,
110         OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_MAX_SEND_FRAGMENT);
111     if (p != NULL
112         && !OSSL_PARAM_get_size_t(p, &ctx->multiblock_max_send_fragment)) {
113         ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
114         return 0;
115     }
116     /*
117      * The inputs to tls1_multiblock_aad are:
118      *   mb_param->inp
119      *   mb_param->len
120      *   mb_param->interleave
121      * The outputs of tls1_multiblock_aad are written to:
122      *   ctx->multiblock_interleave
123      *   ctx->multiblock_aad_packlen
124      */
125     p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_AAD);
126     if (p != NULL) {
127         const OSSL_PARAM *p1 = OSSL_PARAM_locate_const(params,
128             OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_INTERLEAVE);
129         if (p->data_type != OSSL_PARAM_OCTET_STRING
130             || p1 == NULL
131             || !OSSL_PARAM_get_uint(p1, &mb_param.interleave)) {
132             ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
133             return 0;
134         }
135         mb_param.inp = p->data;
136         mb_param.len = p->data_size;
137         if (hw->tls1_multiblock_aad(vctx, &mb_param) <= 0)
138             return 0;
139     }
140 
141     /*
142      * The inputs to tls1_multiblock_encrypt are:
143      *   mb_param->inp
144      *   mb_param->len
145      *   mb_param->interleave
146      *   mb_param->out
147      * The outputs of tls1_multiblock_encrypt are:
148      *   ctx->multiblock_encrypt_len
149      */
150     p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_ENC);
151     if (p != NULL) {
152         const OSSL_PARAM *p1 = OSSL_PARAM_locate_const(params,
153             OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_INTERLEAVE);
154         const OSSL_PARAM *pin = OSSL_PARAM_locate_const(params,
155             OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_ENC_IN);
156 
157         if (p->data_type != OSSL_PARAM_OCTET_STRING
158             || pin == NULL
159             || pin->data_type != OSSL_PARAM_OCTET_STRING
160             || p1 == NULL
161             || !OSSL_PARAM_get_uint(p1, &mb_param.interleave)) {
162             ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
163             return 0;
164         }
165         mb_param.out = p->data;
166         mb_param.inp = pin->data;
167         mb_param.len = pin->data_size;
168         if (hw->tls1_multiblock_encrypt(vctx, &mb_param) <= 0)
169             return 0;
170     }
171 #endif /* !defined(OPENSSL_NO_MULTIBLOCK) */
172 
173     p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_AEAD_TLS1_AAD);
174     if (p != NULL) {
175         if (p->data_type != OSSL_PARAM_OCTET_STRING) {
176             ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
177             return 0;
178         }
179         if (hw->set_tls1_aad(ctx, p->data, p->data_size) <= 0)
180             return 0;
181     }
182 
183     p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_KEYLEN);
184     if (p != NULL) {
185         size_t keylen;
186 
187         if (!OSSL_PARAM_get_size_t(p, &keylen)) {
188             ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
189             return 0;
190         }
191         if (ctx->base.keylen != keylen) {
192             ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH);
193             return 0;
194         }
195     }
196 
197     p = OSSL_PARAM_locate_const(params, OSSL_CIPHER_PARAM_TLS_VERSION);
198     if (p != NULL) {
199         if (!OSSL_PARAM_get_uint(p, &ctx->base.tlsversion)) {
200             ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER);
201             return 0;
202         }
203         if (ctx->base.tlsversion == SSL3_VERSION
204             || ctx->base.tlsversion == TLS1_VERSION) {
205             if (!ossl_assert(ctx->base.removetlsfixed >= AES_BLOCK_SIZE)) {
206                 ERR_raise(ERR_LIB_PROV, ERR_R_INTERNAL_ERROR);
207                 return 0;
208             }
209             /*
210              * There is no explicit IV with these TLS versions, so don't attempt
211              * to remove it.
212              */
213             ctx->base.removetlsfixed -= AES_BLOCK_SIZE;
214         }
215     }
216     return ret;
217 }
218 
aes_get_ctx_params(void * vctx,OSSL_PARAM params[])219 static int aes_get_ctx_params(void *vctx, OSSL_PARAM params[])
220 {
221     PROV_AES_HMAC_SHA_CTX *ctx = (PROV_AES_HMAC_SHA_CTX *)vctx;
222     OSSL_PARAM *p;
223 
224 #if !defined(OPENSSL_NO_MULTIBLOCK)
225     p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_MAX_BUFSIZE);
226     if (p != NULL) {
227         PROV_CIPHER_HW_AES_HMAC_SHA *hw = (PROV_CIPHER_HW_AES_HMAC_SHA *)ctx->hw;
228         size_t len = hw->tls1_multiblock_max_bufsize(ctx);
229 
230         if (!OSSL_PARAM_set_size_t(p, len)) {
231             ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
232             return 0;
233         }
234     }
235 
236     p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_INTERLEAVE);
237     if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->multiblock_interleave)) {
238         ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
239         return 0;
240     }
241 
242     p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_AAD_PACKLEN);
243     if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->multiblock_aad_packlen)) {
244         ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
245         return 0;
246     }
247 
248     p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_ENC_LEN);
249     if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->multiblock_encrypt_len)) {
250         ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
251         return 0;
252     }
253 #endif /* !defined(OPENSSL_NO_MULTIBLOCK) */
254 
255     p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_AEAD_TLS1_AAD_PAD);
256     if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->tls_aad_pad)) {
257         ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
258         return 0;
259     }
260     p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_KEYLEN);
261     if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->base.keylen)) {
262         ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
263         return 0;
264     }
265     p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IVLEN);
266     if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->base.ivlen)) {
267         ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
268         return 0;
269     }
270     p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_IV);
271     if (p != NULL
272         && !OSSL_PARAM_set_octet_string(p, ctx->base.oiv, ctx->base.ivlen)
273         && !OSSL_PARAM_set_octet_ptr(p, &ctx->base.oiv, ctx->base.ivlen)) {
274         ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
275         return 0;
276     }
277     p = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_UPDATED_IV);
278     if (p != NULL
279         && !OSSL_PARAM_set_octet_string(p, ctx->base.iv, ctx->base.ivlen)
280         && !OSSL_PARAM_set_octet_ptr(p, &ctx->base.iv, ctx->base.ivlen)) {
281         ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
282         return 0;
283     }
284     return 1;
285 }
286 
287 static const OSSL_PARAM cipher_aes_known_gettable_ctx_params[] = {
288 #if !defined(OPENSSL_NO_MULTIBLOCK)
289     OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_MAX_BUFSIZE, NULL),
290     OSSL_PARAM_uint(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_INTERLEAVE, NULL),
291     OSSL_PARAM_uint(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_AAD_PACKLEN, NULL),
292     OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_TLS1_MULTIBLOCK_ENC_LEN, NULL),
293 #endif /* !defined(OPENSSL_NO_MULTIBLOCK) */
294     OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_AEAD_TLS1_AAD_PAD, NULL),
295     OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL),
296     OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL),
297     OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_IV, NULL, 0),
298     OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_UPDATED_IV, NULL, 0),
299     OSSL_PARAM_END
300 };
aes_gettable_ctx_params(ossl_unused void * cctx,ossl_unused void * provctx)301 const OSSL_PARAM *aes_gettable_ctx_params(ossl_unused void *cctx,
302     ossl_unused void *provctx)
303 {
304     return cipher_aes_known_gettable_ctx_params;
305 }
306 
base_init(void * provctx,PROV_AES_HMAC_SHA_CTX * ctx,const PROV_CIPHER_HW_AES_HMAC_SHA * meths,size_t kbits,size_t blkbits,size_t ivbits,uint64_t flags)307 static void base_init(void *provctx, PROV_AES_HMAC_SHA_CTX *ctx,
308     const PROV_CIPHER_HW_AES_HMAC_SHA *meths,
309     size_t kbits, size_t blkbits, size_t ivbits,
310     uint64_t flags)
311 {
312     ossl_cipher_generic_initkey(&ctx->base, kbits, blkbits, ivbits,
313         EVP_CIPH_CBC_MODE, flags,
314         &meths->base, provctx);
315     ctx->hw = (PROV_CIPHER_HW_AES_HMAC_SHA *)ctx->base.hw;
316 }
317 
aes_cbc_hmac_sha1_newctx(void * provctx,size_t kbits,size_t blkbits,size_t ivbits,uint64_t flags)318 static void *aes_cbc_hmac_sha1_newctx(void *provctx, size_t kbits,
319     size_t blkbits, size_t ivbits,
320     uint64_t flags)
321 {
322     PROV_AES_HMAC_SHA1_CTX *ctx;
323 
324     if (!ossl_prov_is_running())
325         return NULL;
326 
327     ctx = OPENSSL_zalloc(sizeof(*ctx));
328     if (ctx != NULL)
329         base_init(provctx, &ctx->base_ctx,
330             ossl_prov_cipher_hw_aes_cbc_hmac_sha1(), kbits, blkbits,
331             ivbits, flags);
332     return ctx;
333 }
334 
aes_cbc_hmac_sha1_dupctx(void * provctx)335 static void *aes_cbc_hmac_sha1_dupctx(void *provctx)
336 {
337     PROV_AES_HMAC_SHA1_CTX *ctx = provctx;
338 
339     if (!ossl_prov_is_running())
340         return NULL;
341 
342     if (ctx == NULL)
343         return NULL;
344 
345     return OPENSSL_memdup(ctx, sizeof(*ctx));
346 }
347 
aes_cbc_hmac_sha1_freectx(void * vctx)348 static void aes_cbc_hmac_sha1_freectx(void *vctx)
349 {
350     PROV_AES_HMAC_SHA1_CTX *ctx = (PROV_AES_HMAC_SHA1_CTX *)vctx;
351 
352     if (ctx != NULL) {
353         ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx);
354         OPENSSL_clear_free(ctx, sizeof(*ctx));
355     }
356 }
357 
aes_cbc_hmac_sha256_newctx(void * provctx,size_t kbits,size_t blkbits,size_t ivbits,uint64_t flags)358 static void *aes_cbc_hmac_sha256_newctx(void *provctx, size_t kbits,
359     size_t blkbits, size_t ivbits,
360     uint64_t flags)
361 {
362     PROV_AES_HMAC_SHA256_CTX *ctx;
363 
364     if (!ossl_prov_is_running())
365         return NULL;
366 
367     ctx = OPENSSL_zalloc(sizeof(*ctx));
368     if (ctx != NULL)
369         base_init(provctx, &ctx->base_ctx,
370             ossl_prov_cipher_hw_aes_cbc_hmac_sha256(), kbits, blkbits,
371             ivbits, flags);
372     return ctx;
373 }
374 
aes_cbc_hmac_sha256_dupctx(void * provctx)375 static void *aes_cbc_hmac_sha256_dupctx(void *provctx)
376 {
377     PROV_AES_HMAC_SHA256_CTX *ctx = provctx;
378 
379     if (!ossl_prov_is_running())
380         return NULL;
381 
382     return OPENSSL_memdup(ctx, sizeof(*ctx));
383 }
384 
aes_cbc_hmac_sha256_freectx(void * vctx)385 static void aes_cbc_hmac_sha256_freectx(void *vctx)
386 {
387     PROV_AES_HMAC_SHA256_CTX *ctx = (PROV_AES_HMAC_SHA256_CTX *)vctx;
388 
389     if (ctx != NULL) {
390         ossl_cipher_generic_reset_ctx((PROV_CIPHER_CTX *)vctx);
391         OPENSSL_clear_free(ctx, sizeof(*ctx));
392     }
393 }
394 
395 #define IMPLEMENT_CIPHER(nm, sub, kbits, blkbits, ivbits, flags)                    \
396     static OSSL_FUNC_cipher_newctx_fn nm##_##kbits##_##sub##_newctx;                \
397     static void *nm##_##kbits##_##sub##_newctx(void *provctx)                       \
398     {                                                                               \
399         return nm##_##sub##_newctx(provctx, kbits, blkbits, ivbits, flags);         \
400     }                                                                               \
401     static OSSL_FUNC_cipher_get_params_fn nm##_##kbits##_##sub##_get_params;        \
402     static int nm##_##kbits##_##sub##_get_params(OSSL_PARAM params[])               \
403     {                                                                               \
404         return ossl_cipher_generic_get_params(params, EVP_CIPH_CBC_MODE,            \
405             flags, kbits, blkbits, ivbits);                                         \
406     }                                                                               \
407     const OSSL_DISPATCH ossl_##nm##kbits##sub##_functions[] = {                     \
408         { OSSL_FUNC_CIPHER_NEWCTX, (void (*)(void))nm##_##kbits##_##sub##_newctx }, \
409         { OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))nm##_##sub##_freectx },         \
410         { OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))nm##_##sub##_dupctx },           \
411         { OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))nm##_einit },              \
412         { OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))nm##_dinit },              \
413         { OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))nm##_update },                   \
414         { OSSL_FUNC_CIPHER_FINAL, (void (*)(void))nm##_final },                     \
415         { OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))nm##_cipher },                   \
416         { OSSL_FUNC_CIPHER_GET_PARAMS,                                              \
417             (void (*)(void))nm##_##kbits##_##sub##_get_params },                    \
418         { OSSL_FUNC_CIPHER_GETTABLE_PARAMS,                                         \
419             (void (*)(void))nm##_gettable_params },                                 \
420         { OSSL_FUNC_CIPHER_GET_CTX_PARAMS,                                          \
421             (void (*)(void))nm##_get_ctx_params },                                  \
422         { OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS,                                     \
423             (void (*)(void))nm##_gettable_ctx_params },                             \
424         { OSSL_FUNC_CIPHER_SET_CTX_PARAMS,                                          \
425             (void (*)(void))nm##_set_ctx_params },                                  \
426         { OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS,                                     \
427             (void (*)(void))nm##_settable_ctx_params },                             \
428         OSSL_DISPATCH_END                                                           \
429     };
430 
431 #endif /* AES_CBC_HMAC_SHA_CAPABLE */
432 
433 /* ossl_aes128cbc_hmac_sha1_functions */
434 IMPLEMENT_CIPHER(aes, cbc_hmac_sha1, 128, 128, 128, AES_CBC_HMAC_SHA_FLAGS)
435 /* ossl_aes256cbc_hmac_sha1_functions */
436 IMPLEMENT_CIPHER(aes, cbc_hmac_sha1, 256, 128, 128, AES_CBC_HMAC_SHA_FLAGS)
437 /* ossl_aes128cbc_hmac_sha256_functions */
438 IMPLEMENT_CIPHER(aes, cbc_hmac_sha256, 128, 128, 128, AES_CBC_HMAC_SHA_FLAGS)
439 /* ossl_aes256cbc_hmac_sha256_functions */
440 IMPLEMENT_CIPHER(aes, cbc_hmac_sha256, 256, 128, 128, AES_CBC_HMAC_SHA_FLAGS)
441