Skip to content

Conversation

@jordikroon
Copy link
Contributor

@jordikroon jordikroon commented Jan 6, 2026

Fixes #20851

Add support for AEAD ciphers like AES-SIV by detecting and initializing AEAD flags during cipher mode loading.
Includes test case for AES-256-SIV encryption/decryption roundtrip.

@jordikroon jordikroon changed the title properly initialize AEAD cipher flags in OpenSSL backend Properly initialize AEAD cipher flags in OpenSSL backend Jan 6, 2026
@jordikroon jordikroon requested a review from kocsismate as a code owner January 7, 2026 19:09
@jordikroon
Copy link
Contributor Author

Please review commits 1 by 1 since I am not sure if the change from string $aad = "" to ?string $aad = "" is acceptable.
The first commit only fixes SIV Synthetic Initialization Vector where it generates its own IV. It was not respected.

The second commit allows AAD to be null since it behaves differently than when only an empty string is given. The matches other implementations like cryptography in python.

Copy link
Member

@bukka bukka left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This looks reasonable. Just some minor things really.

Comment on lines +1641 to +1645
#if defined(EVP_CIPH_FLAG_AEAD_CIPHER)
if (EVP_CIPHER_flags(cipher_type) & EVP_CIPH_FLAG_AEAD_CIPHER) {
php_openssl_set_aead_flags(mode);
}
#endif
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It would be better to add EVP_CIPH_SIV_MODE to the switch if exists and set the right mode if there are some differences.

Comment on lines +1807 to +1809
/* Only pass AAD to OpenSSL if caller provided it.
This makes NULL mean zero AAD items, while "" with len 0 means one empty AAD item. */
if (mode->is_aead && aad != NULL && !EVP_CipherUpdate(cipher_ctx, NULL, &i, (const unsigned char *)aad, (int)aad_len)) {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this for SIV or is this for all modes. I thought that empty string won't make difference but I guess it might.

In general allowing null should be fine for master so it's not really a problem. Just want to know the reasoning as I haven't checked this propertly.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

AES SIV cipher algorithms implemented incorrectly in openssl module

2 participants