If currently gcrypt/nettle doesn't support AEAD alg, then we should implement some no-op funcs.
Signed-off-by: Longpeng(Mike) <longpe...@huawei.com> --- crypto/aead.c | 44 ++++++++++++++++++++++++++++++++++++++++++-- 1 file changed, 42 insertions(+), 2 deletions(-) diff --git a/crypto/aead.c b/crypto/aead.c index 47639b7..effe45e 100644 --- a/crypto/aead.c +++ b/crypto/aead.c @@ -16,18 +16,58 @@ #include "qapi/error.h" #include "crypto/aead.h" +#if defined(CONFIG_NETTLE_AEAD) || defined(CONFIG_GCRYPT_AEAD) + +static size_t alg_key_len[QCRYPTO_AEAD_ALG__MAX] = { + [QCRYPTO_CIPHER_ALG_AES_128] = 16, + [QCRYPTO_CIPHER_ALG_AES_192] = 24, + [QCRYPTO_CIPHER_ALG_AES_256] = 32, +}; + bool qcrypto_aead_supports(QCryptoCipherAlgorithm alg, QCryptoCipherMode mode) { + switch (alg) { + case QCRYPTO_CIPHER_ALG_AES_128: + case QCRYPTO_CIPHER_ALG_AES_192: + case QCRYPTO_CIPHER_ALG_AES_256: + break; + default: + return false; + } + + switch (mode) { + case QCRYPTO_CIPHER_MODE_CCM: + case QCRYPTO_CIPHER_MODE_GCM: + return true; + default: + break; + } + return false; } size_t qcrypto_aead_get_key_len(QCryptoCipherAlgorithm alg) { - return -1; + if (alg > G_N_ELEMENTS(alg_key_len)) { + return 0; + } + + return alg_key_len[alg]; } -#if !defined(CONFIG_NETTLE_AEAD) && !defined(CONFIG_GCRYPT_AEAD) +#else + +bool qcrypto_aead_supports(QCryptoCipherAlgorithm alg, + QCryptoCipherMode mode) +{ + return false; +} + +size_t qcrypto_aead_get_key_len(QCryptoCipherAlgorithm alg) +{ + return -1; +} QCryptoAead *qcrypto_aead_new(QCryptoCipherAlgorithm alg, QCryptoCipherMode mode, -- 1.8.3.1