mbed-os

Dependents:   cobaLCDJoyMotor_Thread odometry_omni_3roda_v3 odometry_omni_3roda_v1 odometry_omni_3roda_v2 ... more

Committer:
be_bryan
Date:
Mon Dec 11 17:54:04 2017 +0000
Revision:
0:b74591d5ab33
motor ++

Who changed what in which revision?

UserRevisionLine numberNew contents of line
be_bryan 0:b74591d5ab33 1 /**
be_bryan 0:b74591d5ab33 2 * \file cipher.c
be_bryan 0:b74591d5ab33 3 *
be_bryan 0:b74591d5ab33 4 * \brief Generic cipher wrapper for mbed TLS
be_bryan 0:b74591d5ab33 5 *
be_bryan 0:b74591d5ab33 6 * \author Adriaan de Jong <dejong@fox-it.com>
be_bryan 0:b74591d5ab33 7 *
be_bryan 0:b74591d5ab33 8 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
be_bryan 0:b74591d5ab33 9 * SPDX-License-Identifier: Apache-2.0
be_bryan 0:b74591d5ab33 10 *
be_bryan 0:b74591d5ab33 11 * Licensed under the Apache License, Version 2.0 (the "License"); you may
be_bryan 0:b74591d5ab33 12 * not use this file except in compliance with the License.
be_bryan 0:b74591d5ab33 13 * You may obtain a copy of the License at
be_bryan 0:b74591d5ab33 14 *
be_bryan 0:b74591d5ab33 15 * http://www.apache.org/licenses/LICENSE-2.0
be_bryan 0:b74591d5ab33 16 *
be_bryan 0:b74591d5ab33 17 * Unless required by applicable law or agreed to in writing, software
be_bryan 0:b74591d5ab33 18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
be_bryan 0:b74591d5ab33 19 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
be_bryan 0:b74591d5ab33 20 * See the License for the specific language governing permissions and
be_bryan 0:b74591d5ab33 21 * limitations under the License.
be_bryan 0:b74591d5ab33 22 *
be_bryan 0:b74591d5ab33 23 * This file is part of mbed TLS (https://tls.mbed.org)
be_bryan 0:b74591d5ab33 24 */
be_bryan 0:b74591d5ab33 25
be_bryan 0:b74591d5ab33 26 #if !defined(MBEDTLS_CONFIG_FILE)
be_bryan 0:b74591d5ab33 27 #include "mbedtls/config.h"
be_bryan 0:b74591d5ab33 28 #else
be_bryan 0:b74591d5ab33 29 #include MBEDTLS_CONFIG_FILE
be_bryan 0:b74591d5ab33 30 #endif
be_bryan 0:b74591d5ab33 31
be_bryan 0:b74591d5ab33 32 #if defined(MBEDTLS_CIPHER_C)
be_bryan 0:b74591d5ab33 33
be_bryan 0:b74591d5ab33 34 #include "mbedtls/cipher.h"
be_bryan 0:b74591d5ab33 35 #include "mbedtls/cipher_internal.h"
be_bryan 0:b74591d5ab33 36
be_bryan 0:b74591d5ab33 37 #include <stdlib.h>
be_bryan 0:b74591d5ab33 38 #include <string.h>
be_bryan 0:b74591d5ab33 39
be_bryan 0:b74591d5ab33 40 #if defined(MBEDTLS_GCM_C)
be_bryan 0:b74591d5ab33 41 #include "mbedtls/gcm.h"
be_bryan 0:b74591d5ab33 42 #endif
be_bryan 0:b74591d5ab33 43
be_bryan 0:b74591d5ab33 44 #if defined(MBEDTLS_CCM_C)
be_bryan 0:b74591d5ab33 45 #include "mbedtls/ccm.h"
be_bryan 0:b74591d5ab33 46 #endif
be_bryan 0:b74591d5ab33 47
be_bryan 0:b74591d5ab33 48 #if defined(MBEDTLS_CMAC_C)
be_bryan 0:b74591d5ab33 49 #include "mbedtls/cmac.h"
be_bryan 0:b74591d5ab33 50 #endif
be_bryan 0:b74591d5ab33 51
be_bryan 0:b74591d5ab33 52 #if defined(MBEDTLS_PLATFORM_C)
be_bryan 0:b74591d5ab33 53 #include "mbedtls/platform.h"
be_bryan 0:b74591d5ab33 54 #else
be_bryan 0:b74591d5ab33 55 #define mbedtls_calloc calloc
be_bryan 0:b74591d5ab33 56 #define mbedtls_free free
be_bryan 0:b74591d5ab33 57 #endif
be_bryan 0:b74591d5ab33 58
be_bryan 0:b74591d5ab33 59 #if defined(MBEDTLS_ARC4_C) || defined(MBEDTLS_CIPHER_NULL_CIPHER)
be_bryan 0:b74591d5ab33 60 #define MBEDTLS_CIPHER_MODE_STREAM
be_bryan 0:b74591d5ab33 61 #endif
be_bryan 0:b74591d5ab33 62
be_bryan 0:b74591d5ab33 63 /* Implementation that should never be optimized out by the compiler */
be_bryan 0:b74591d5ab33 64 static void mbedtls_zeroize( void *v, size_t n ) {
be_bryan 0:b74591d5ab33 65 volatile unsigned char *p = (unsigned char*)v; while( n-- ) *p++ = 0;
be_bryan 0:b74591d5ab33 66 }
be_bryan 0:b74591d5ab33 67
be_bryan 0:b74591d5ab33 68 static int supported_init = 0;
be_bryan 0:b74591d5ab33 69
be_bryan 0:b74591d5ab33 70 const int *mbedtls_cipher_list( void )
be_bryan 0:b74591d5ab33 71 {
be_bryan 0:b74591d5ab33 72 const mbedtls_cipher_definition_t *def;
be_bryan 0:b74591d5ab33 73 int *type;
be_bryan 0:b74591d5ab33 74
be_bryan 0:b74591d5ab33 75 if( ! supported_init )
be_bryan 0:b74591d5ab33 76 {
be_bryan 0:b74591d5ab33 77 def = mbedtls_cipher_definitions;
be_bryan 0:b74591d5ab33 78 type = mbedtls_cipher_supported;
be_bryan 0:b74591d5ab33 79
be_bryan 0:b74591d5ab33 80 while( def->type != 0 )
be_bryan 0:b74591d5ab33 81 *type++ = (*def++).type;
be_bryan 0:b74591d5ab33 82
be_bryan 0:b74591d5ab33 83 *type = 0;
be_bryan 0:b74591d5ab33 84
be_bryan 0:b74591d5ab33 85 supported_init = 1;
be_bryan 0:b74591d5ab33 86 }
be_bryan 0:b74591d5ab33 87
be_bryan 0:b74591d5ab33 88 return( mbedtls_cipher_supported );
be_bryan 0:b74591d5ab33 89 }
be_bryan 0:b74591d5ab33 90
be_bryan 0:b74591d5ab33 91 const mbedtls_cipher_info_t *mbedtls_cipher_info_from_type( const mbedtls_cipher_type_t cipher_type )
be_bryan 0:b74591d5ab33 92 {
be_bryan 0:b74591d5ab33 93 const mbedtls_cipher_definition_t *def;
be_bryan 0:b74591d5ab33 94
be_bryan 0:b74591d5ab33 95 for( def = mbedtls_cipher_definitions; def->info != NULL; def++ )
be_bryan 0:b74591d5ab33 96 if( def->type == cipher_type )
be_bryan 0:b74591d5ab33 97 return( def->info );
be_bryan 0:b74591d5ab33 98
be_bryan 0:b74591d5ab33 99 return( NULL );
be_bryan 0:b74591d5ab33 100 }
be_bryan 0:b74591d5ab33 101
be_bryan 0:b74591d5ab33 102 const mbedtls_cipher_info_t *mbedtls_cipher_info_from_string( const char *cipher_name )
be_bryan 0:b74591d5ab33 103 {
be_bryan 0:b74591d5ab33 104 const mbedtls_cipher_definition_t *def;
be_bryan 0:b74591d5ab33 105
be_bryan 0:b74591d5ab33 106 if( NULL == cipher_name )
be_bryan 0:b74591d5ab33 107 return( NULL );
be_bryan 0:b74591d5ab33 108
be_bryan 0:b74591d5ab33 109 for( def = mbedtls_cipher_definitions; def->info != NULL; def++ )
be_bryan 0:b74591d5ab33 110 if( ! strcmp( def->info->name, cipher_name ) )
be_bryan 0:b74591d5ab33 111 return( def->info );
be_bryan 0:b74591d5ab33 112
be_bryan 0:b74591d5ab33 113 return( NULL );
be_bryan 0:b74591d5ab33 114 }
be_bryan 0:b74591d5ab33 115
be_bryan 0:b74591d5ab33 116 const mbedtls_cipher_info_t *mbedtls_cipher_info_from_values( const mbedtls_cipher_id_t cipher_id,
be_bryan 0:b74591d5ab33 117 int key_bitlen,
be_bryan 0:b74591d5ab33 118 const mbedtls_cipher_mode_t mode )
be_bryan 0:b74591d5ab33 119 {
be_bryan 0:b74591d5ab33 120 const mbedtls_cipher_definition_t *def;
be_bryan 0:b74591d5ab33 121
be_bryan 0:b74591d5ab33 122 for( def = mbedtls_cipher_definitions; def->info != NULL; def++ )
be_bryan 0:b74591d5ab33 123 if( def->info->base->cipher == cipher_id &&
be_bryan 0:b74591d5ab33 124 def->info->key_bitlen == (unsigned) key_bitlen &&
be_bryan 0:b74591d5ab33 125 def->info->mode == mode )
be_bryan 0:b74591d5ab33 126 return( def->info );
be_bryan 0:b74591d5ab33 127
be_bryan 0:b74591d5ab33 128 return( NULL );
be_bryan 0:b74591d5ab33 129 }
be_bryan 0:b74591d5ab33 130
be_bryan 0:b74591d5ab33 131 void mbedtls_cipher_init( mbedtls_cipher_context_t *ctx )
be_bryan 0:b74591d5ab33 132 {
be_bryan 0:b74591d5ab33 133 memset( ctx, 0, sizeof( mbedtls_cipher_context_t ) );
be_bryan 0:b74591d5ab33 134 }
be_bryan 0:b74591d5ab33 135
be_bryan 0:b74591d5ab33 136 void mbedtls_cipher_free( mbedtls_cipher_context_t *ctx )
be_bryan 0:b74591d5ab33 137 {
be_bryan 0:b74591d5ab33 138 if( ctx == NULL )
be_bryan 0:b74591d5ab33 139 return;
be_bryan 0:b74591d5ab33 140
be_bryan 0:b74591d5ab33 141 #if defined(MBEDTLS_CMAC_C)
be_bryan 0:b74591d5ab33 142 if( ctx->cmac_ctx )
be_bryan 0:b74591d5ab33 143 {
be_bryan 0:b74591d5ab33 144 mbedtls_zeroize( ctx->cmac_ctx, sizeof( mbedtls_cmac_context_t ) );
be_bryan 0:b74591d5ab33 145 mbedtls_free( ctx->cmac_ctx );
be_bryan 0:b74591d5ab33 146 }
be_bryan 0:b74591d5ab33 147 #endif
be_bryan 0:b74591d5ab33 148
be_bryan 0:b74591d5ab33 149 if( ctx->cipher_ctx )
be_bryan 0:b74591d5ab33 150 ctx->cipher_info->base->ctx_free_func( ctx->cipher_ctx );
be_bryan 0:b74591d5ab33 151
be_bryan 0:b74591d5ab33 152 mbedtls_zeroize( ctx, sizeof(mbedtls_cipher_context_t) );
be_bryan 0:b74591d5ab33 153 }
be_bryan 0:b74591d5ab33 154
be_bryan 0:b74591d5ab33 155 int mbedtls_cipher_setup( mbedtls_cipher_context_t *ctx, const mbedtls_cipher_info_t *cipher_info )
be_bryan 0:b74591d5ab33 156 {
be_bryan 0:b74591d5ab33 157 if( NULL == cipher_info || NULL == ctx )
be_bryan 0:b74591d5ab33 158 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 159
be_bryan 0:b74591d5ab33 160 memset( ctx, 0, sizeof( mbedtls_cipher_context_t ) );
be_bryan 0:b74591d5ab33 161
be_bryan 0:b74591d5ab33 162 if( NULL == ( ctx->cipher_ctx = cipher_info->base->ctx_alloc_func() ) )
be_bryan 0:b74591d5ab33 163 return( MBEDTLS_ERR_CIPHER_ALLOC_FAILED );
be_bryan 0:b74591d5ab33 164
be_bryan 0:b74591d5ab33 165 ctx->cipher_info = cipher_info;
be_bryan 0:b74591d5ab33 166
be_bryan 0:b74591d5ab33 167 #if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
be_bryan 0:b74591d5ab33 168 /*
be_bryan 0:b74591d5ab33 169 * Ignore possible errors caused by a cipher mode that doesn't use padding
be_bryan 0:b74591d5ab33 170 */
be_bryan 0:b74591d5ab33 171 #if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
be_bryan 0:b74591d5ab33 172 (void) mbedtls_cipher_set_padding_mode( ctx, MBEDTLS_PADDING_PKCS7 );
be_bryan 0:b74591d5ab33 173 #else
be_bryan 0:b74591d5ab33 174 (void) mbedtls_cipher_set_padding_mode( ctx, MBEDTLS_PADDING_NONE );
be_bryan 0:b74591d5ab33 175 #endif
be_bryan 0:b74591d5ab33 176 #endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
be_bryan 0:b74591d5ab33 177
be_bryan 0:b74591d5ab33 178 return( 0 );
be_bryan 0:b74591d5ab33 179 }
be_bryan 0:b74591d5ab33 180
be_bryan 0:b74591d5ab33 181 int mbedtls_cipher_setkey( mbedtls_cipher_context_t *ctx, const unsigned char *key,
be_bryan 0:b74591d5ab33 182 int key_bitlen, const mbedtls_operation_t operation )
be_bryan 0:b74591d5ab33 183 {
be_bryan 0:b74591d5ab33 184 if( NULL == ctx || NULL == ctx->cipher_info )
be_bryan 0:b74591d5ab33 185 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 186
be_bryan 0:b74591d5ab33 187 if( ( ctx->cipher_info->flags & MBEDTLS_CIPHER_VARIABLE_KEY_LEN ) == 0 &&
be_bryan 0:b74591d5ab33 188 (int) ctx->cipher_info->key_bitlen != key_bitlen )
be_bryan 0:b74591d5ab33 189 {
be_bryan 0:b74591d5ab33 190 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 191 }
be_bryan 0:b74591d5ab33 192
be_bryan 0:b74591d5ab33 193 ctx->key_bitlen = key_bitlen;
be_bryan 0:b74591d5ab33 194 ctx->operation = operation;
be_bryan 0:b74591d5ab33 195
be_bryan 0:b74591d5ab33 196 /*
be_bryan 0:b74591d5ab33 197 * For CFB and CTR mode always use the encryption key schedule
be_bryan 0:b74591d5ab33 198 */
be_bryan 0:b74591d5ab33 199 if( MBEDTLS_ENCRYPT == operation ||
be_bryan 0:b74591d5ab33 200 MBEDTLS_MODE_CFB == ctx->cipher_info->mode ||
be_bryan 0:b74591d5ab33 201 MBEDTLS_MODE_CTR == ctx->cipher_info->mode )
be_bryan 0:b74591d5ab33 202 {
be_bryan 0:b74591d5ab33 203 return ctx->cipher_info->base->setkey_enc_func( ctx->cipher_ctx, key,
be_bryan 0:b74591d5ab33 204 ctx->key_bitlen );
be_bryan 0:b74591d5ab33 205 }
be_bryan 0:b74591d5ab33 206
be_bryan 0:b74591d5ab33 207 if( MBEDTLS_DECRYPT == operation )
be_bryan 0:b74591d5ab33 208 return ctx->cipher_info->base->setkey_dec_func( ctx->cipher_ctx, key,
be_bryan 0:b74591d5ab33 209 ctx->key_bitlen );
be_bryan 0:b74591d5ab33 210
be_bryan 0:b74591d5ab33 211 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 212 }
be_bryan 0:b74591d5ab33 213
be_bryan 0:b74591d5ab33 214 int mbedtls_cipher_set_iv( mbedtls_cipher_context_t *ctx,
be_bryan 0:b74591d5ab33 215 const unsigned char *iv, size_t iv_len )
be_bryan 0:b74591d5ab33 216 {
be_bryan 0:b74591d5ab33 217 size_t actual_iv_size;
be_bryan 0:b74591d5ab33 218
be_bryan 0:b74591d5ab33 219 if( NULL == ctx || NULL == ctx->cipher_info || NULL == iv )
be_bryan 0:b74591d5ab33 220 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 221
be_bryan 0:b74591d5ab33 222 /* avoid buffer overflow in ctx->iv */
be_bryan 0:b74591d5ab33 223 if( iv_len > MBEDTLS_MAX_IV_LENGTH )
be_bryan 0:b74591d5ab33 224 return( MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
be_bryan 0:b74591d5ab33 225
be_bryan 0:b74591d5ab33 226 if( ( ctx->cipher_info->flags & MBEDTLS_CIPHER_VARIABLE_IV_LEN ) != 0 )
be_bryan 0:b74591d5ab33 227 actual_iv_size = iv_len;
be_bryan 0:b74591d5ab33 228 else
be_bryan 0:b74591d5ab33 229 {
be_bryan 0:b74591d5ab33 230 actual_iv_size = ctx->cipher_info->iv_size;
be_bryan 0:b74591d5ab33 231
be_bryan 0:b74591d5ab33 232 /* avoid reading past the end of input buffer */
be_bryan 0:b74591d5ab33 233 if( actual_iv_size > iv_len )
be_bryan 0:b74591d5ab33 234 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 235 }
be_bryan 0:b74591d5ab33 236
be_bryan 0:b74591d5ab33 237 memcpy( ctx->iv, iv, actual_iv_size );
be_bryan 0:b74591d5ab33 238 ctx->iv_size = actual_iv_size;
be_bryan 0:b74591d5ab33 239
be_bryan 0:b74591d5ab33 240 return( 0 );
be_bryan 0:b74591d5ab33 241 }
be_bryan 0:b74591d5ab33 242
be_bryan 0:b74591d5ab33 243 int mbedtls_cipher_reset( mbedtls_cipher_context_t *ctx )
be_bryan 0:b74591d5ab33 244 {
be_bryan 0:b74591d5ab33 245 if( NULL == ctx || NULL == ctx->cipher_info )
be_bryan 0:b74591d5ab33 246 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 247
be_bryan 0:b74591d5ab33 248 ctx->unprocessed_len = 0;
be_bryan 0:b74591d5ab33 249
be_bryan 0:b74591d5ab33 250 return( 0 );
be_bryan 0:b74591d5ab33 251 }
be_bryan 0:b74591d5ab33 252
be_bryan 0:b74591d5ab33 253 #if defined(MBEDTLS_GCM_C)
be_bryan 0:b74591d5ab33 254 int mbedtls_cipher_update_ad( mbedtls_cipher_context_t *ctx,
be_bryan 0:b74591d5ab33 255 const unsigned char *ad, size_t ad_len )
be_bryan 0:b74591d5ab33 256 {
be_bryan 0:b74591d5ab33 257 if( NULL == ctx || NULL == ctx->cipher_info )
be_bryan 0:b74591d5ab33 258 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 259
be_bryan 0:b74591d5ab33 260 if( MBEDTLS_MODE_GCM == ctx->cipher_info->mode )
be_bryan 0:b74591d5ab33 261 {
be_bryan 0:b74591d5ab33 262 return mbedtls_gcm_starts( (mbedtls_gcm_context *) ctx->cipher_ctx, ctx->operation,
be_bryan 0:b74591d5ab33 263 ctx->iv, ctx->iv_size, ad, ad_len );
be_bryan 0:b74591d5ab33 264 }
be_bryan 0:b74591d5ab33 265
be_bryan 0:b74591d5ab33 266 return( 0 );
be_bryan 0:b74591d5ab33 267 }
be_bryan 0:b74591d5ab33 268 #endif /* MBEDTLS_GCM_C */
be_bryan 0:b74591d5ab33 269
be_bryan 0:b74591d5ab33 270 int mbedtls_cipher_update( mbedtls_cipher_context_t *ctx, const unsigned char *input,
be_bryan 0:b74591d5ab33 271 size_t ilen, unsigned char *output, size_t *olen )
be_bryan 0:b74591d5ab33 272 {
be_bryan 0:b74591d5ab33 273 int ret;
be_bryan 0:b74591d5ab33 274 size_t block_size = 0;
be_bryan 0:b74591d5ab33 275
be_bryan 0:b74591d5ab33 276 if( NULL == ctx || NULL == ctx->cipher_info || NULL == olen )
be_bryan 0:b74591d5ab33 277 {
be_bryan 0:b74591d5ab33 278 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 279 }
be_bryan 0:b74591d5ab33 280
be_bryan 0:b74591d5ab33 281 *olen = 0;
be_bryan 0:b74591d5ab33 282 block_size = mbedtls_cipher_get_block_size( ctx );
be_bryan 0:b74591d5ab33 283
be_bryan 0:b74591d5ab33 284 if( ctx->cipher_info->mode == MBEDTLS_MODE_ECB )
be_bryan 0:b74591d5ab33 285 {
be_bryan 0:b74591d5ab33 286 if( ilen != block_size )
be_bryan 0:b74591d5ab33 287 return( MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED );
be_bryan 0:b74591d5ab33 288
be_bryan 0:b74591d5ab33 289 *olen = ilen;
be_bryan 0:b74591d5ab33 290
be_bryan 0:b74591d5ab33 291 if( 0 != ( ret = ctx->cipher_info->base->ecb_func( ctx->cipher_ctx,
be_bryan 0:b74591d5ab33 292 ctx->operation, input, output ) ) )
be_bryan 0:b74591d5ab33 293 {
be_bryan 0:b74591d5ab33 294 return( ret );
be_bryan 0:b74591d5ab33 295 }
be_bryan 0:b74591d5ab33 296
be_bryan 0:b74591d5ab33 297 return( 0 );
be_bryan 0:b74591d5ab33 298 }
be_bryan 0:b74591d5ab33 299
be_bryan 0:b74591d5ab33 300 #if defined(MBEDTLS_GCM_C)
be_bryan 0:b74591d5ab33 301 if( ctx->cipher_info->mode == MBEDTLS_MODE_GCM )
be_bryan 0:b74591d5ab33 302 {
be_bryan 0:b74591d5ab33 303 *olen = ilen;
be_bryan 0:b74591d5ab33 304 return mbedtls_gcm_update( (mbedtls_gcm_context *) ctx->cipher_ctx, ilen, input,
be_bryan 0:b74591d5ab33 305 output );
be_bryan 0:b74591d5ab33 306 }
be_bryan 0:b74591d5ab33 307 #endif
be_bryan 0:b74591d5ab33 308
be_bryan 0:b74591d5ab33 309 if ( 0 == block_size )
be_bryan 0:b74591d5ab33 310 {
be_bryan 0:b74591d5ab33 311 return MBEDTLS_ERR_CIPHER_INVALID_CONTEXT;
be_bryan 0:b74591d5ab33 312 }
be_bryan 0:b74591d5ab33 313
be_bryan 0:b74591d5ab33 314 if( input == output &&
be_bryan 0:b74591d5ab33 315 ( ctx->unprocessed_len != 0 || ilen % block_size ) )
be_bryan 0:b74591d5ab33 316 {
be_bryan 0:b74591d5ab33 317 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 318 }
be_bryan 0:b74591d5ab33 319
be_bryan 0:b74591d5ab33 320 #if defined(MBEDTLS_CIPHER_MODE_CBC)
be_bryan 0:b74591d5ab33 321 if( ctx->cipher_info->mode == MBEDTLS_MODE_CBC )
be_bryan 0:b74591d5ab33 322 {
be_bryan 0:b74591d5ab33 323 size_t copy_len = 0;
be_bryan 0:b74591d5ab33 324
be_bryan 0:b74591d5ab33 325 /*
be_bryan 0:b74591d5ab33 326 * If there is not enough data for a full block, cache it.
be_bryan 0:b74591d5ab33 327 */
be_bryan 0:b74591d5ab33 328 if( ( ctx->operation == MBEDTLS_DECRYPT &&
be_bryan 0:b74591d5ab33 329 ilen <= block_size - ctx->unprocessed_len ) ||
be_bryan 0:b74591d5ab33 330 ( ctx->operation == MBEDTLS_ENCRYPT &&
be_bryan 0:b74591d5ab33 331 ilen < block_size - ctx->unprocessed_len ) )
be_bryan 0:b74591d5ab33 332 {
be_bryan 0:b74591d5ab33 333 memcpy( &( ctx->unprocessed_data[ctx->unprocessed_len] ), input,
be_bryan 0:b74591d5ab33 334 ilen );
be_bryan 0:b74591d5ab33 335
be_bryan 0:b74591d5ab33 336 ctx->unprocessed_len += ilen;
be_bryan 0:b74591d5ab33 337 return( 0 );
be_bryan 0:b74591d5ab33 338 }
be_bryan 0:b74591d5ab33 339
be_bryan 0:b74591d5ab33 340 /*
be_bryan 0:b74591d5ab33 341 * Process cached data first
be_bryan 0:b74591d5ab33 342 */
be_bryan 0:b74591d5ab33 343 if( 0 != ctx->unprocessed_len )
be_bryan 0:b74591d5ab33 344 {
be_bryan 0:b74591d5ab33 345 copy_len = block_size - ctx->unprocessed_len;
be_bryan 0:b74591d5ab33 346
be_bryan 0:b74591d5ab33 347 memcpy( &( ctx->unprocessed_data[ctx->unprocessed_len] ), input,
be_bryan 0:b74591d5ab33 348 copy_len );
be_bryan 0:b74591d5ab33 349
be_bryan 0:b74591d5ab33 350 if( 0 != ( ret = ctx->cipher_info->base->cbc_func( ctx->cipher_ctx,
be_bryan 0:b74591d5ab33 351 ctx->operation, block_size, ctx->iv,
be_bryan 0:b74591d5ab33 352 ctx->unprocessed_data, output ) ) )
be_bryan 0:b74591d5ab33 353 {
be_bryan 0:b74591d5ab33 354 return( ret );
be_bryan 0:b74591d5ab33 355 }
be_bryan 0:b74591d5ab33 356
be_bryan 0:b74591d5ab33 357 *olen += block_size;
be_bryan 0:b74591d5ab33 358 output += block_size;
be_bryan 0:b74591d5ab33 359 ctx->unprocessed_len = 0;
be_bryan 0:b74591d5ab33 360
be_bryan 0:b74591d5ab33 361 input += copy_len;
be_bryan 0:b74591d5ab33 362 ilen -= copy_len;
be_bryan 0:b74591d5ab33 363 }
be_bryan 0:b74591d5ab33 364
be_bryan 0:b74591d5ab33 365 /*
be_bryan 0:b74591d5ab33 366 * Cache final, incomplete block
be_bryan 0:b74591d5ab33 367 */
be_bryan 0:b74591d5ab33 368 if( 0 != ilen )
be_bryan 0:b74591d5ab33 369 {
be_bryan 0:b74591d5ab33 370 if( 0 == block_size )
be_bryan 0:b74591d5ab33 371 {
be_bryan 0:b74591d5ab33 372 return MBEDTLS_ERR_CIPHER_INVALID_CONTEXT;
be_bryan 0:b74591d5ab33 373 }
be_bryan 0:b74591d5ab33 374
be_bryan 0:b74591d5ab33 375 copy_len = ilen % block_size;
be_bryan 0:b74591d5ab33 376 if( copy_len == 0 && ctx->operation == MBEDTLS_DECRYPT )
be_bryan 0:b74591d5ab33 377 copy_len = block_size;
be_bryan 0:b74591d5ab33 378
be_bryan 0:b74591d5ab33 379 memcpy( ctx->unprocessed_data, &( input[ilen - copy_len] ),
be_bryan 0:b74591d5ab33 380 copy_len );
be_bryan 0:b74591d5ab33 381
be_bryan 0:b74591d5ab33 382 ctx->unprocessed_len += copy_len;
be_bryan 0:b74591d5ab33 383 ilen -= copy_len;
be_bryan 0:b74591d5ab33 384 }
be_bryan 0:b74591d5ab33 385
be_bryan 0:b74591d5ab33 386 /*
be_bryan 0:b74591d5ab33 387 * Process remaining full blocks
be_bryan 0:b74591d5ab33 388 */
be_bryan 0:b74591d5ab33 389 if( ilen )
be_bryan 0:b74591d5ab33 390 {
be_bryan 0:b74591d5ab33 391 if( 0 != ( ret = ctx->cipher_info->base->cbc_func( ctx->cipher_ctx,
be_bryan 0:b74591d5ab33 392 ctx->operation, ilen, ctx->iv, input, output ) ) )
be_bryan 0:b74591d5ab33 393 {
be_bryan 0:b74591d5ab33 394 return( ret );
be_bryan 0:b74591d5ab33 395 }
be_bryan 0:b74591d5ab33 396
be_bryan 0:b74591d5ab33 397 *olen += ilen;
be_bryan 0:b74591d5ab33 398 }
be_bryan 0:b74591d5ab33 399
be_bryan 0:b74591d5ab33 400 return( 0 );
be_bryan 0:b74591d5ab33 401 }
be_bryan 0:b74591d5ab33 402 #endif /* MBEDTLS_CIPHER_MODE_CBC */
be_bryan 0:b74591d5ab33 403
be_bryan 0:b74591d5ab33 404 #if defined(MBEDTLS_CIPHER_MODE_CFB)
be_bryan 0:b74591d5ab33 405 if( ctx->cipher_info->mode == MBEDTLS_MODE_CFB )
be_bryan 0:b74591d5ab33 406 {
be_bryan 0:b74591d5ab33 407 if( 0 != ( ret = ctx->cipher_info->base->cfb_func( ctx->cipher_ctx,
be_bryan 0:b74591d5ab33 408 ctx->operation, ilen, &ctx->unprocessed_len, ctx->iv,
be_bryan 0:b74591d5ab33 409 input, output ) ) )
be_bryan 0:b74591d5ab33 410 {
be_bryan 0:b74591d5ab33 411 return( ret );
be_bryan 0:b74591d5ab33 412 }
be_bryan 0:b74591d5ab33 413
be_bryan 0:b74591d5ab33 414 *olen = ilen;
be_bryan 0:b74591d5ab33 415
be_bryan 0:b74591d5ab33 416 return( 0 );
be_bryan 0:b74591d5ab33 417 }
be_bryan 0:b74591d5ab33 418 #endif /* MBEDTLS_CIPHER_MODE_CFB */
be_bryan 0:b74591d5ab33 419
be_bryan 0:b74591d5ab33 420 #if defined(MBEDTLS_CIPHER_MODE_CTR)
be_bryan 0:b74591d5ab33 421 if( ctx->cipher_info->mode == MBEDTLS_MODE_CTR )
be_bryan 0:b74591d5ab33 422 {
be_bryan 0:b74591d5ab33 423 if( 0 != ( ret = ctx->cipher_info->base->ctr_func( ctx->cipher_ctx,
be_bryan 0:b74591d5ab33 424 ilen, &ctx->unprocessed_len, ctx->iv,
be_bryan 0:b74591d5ab33 425 ctx->unprocessed_data, input, output ) ) )
be_bryan 0:b74591d5ab33 426 {
be_bryan 0:b74591d5ab33 427 return( ret );
be_bryan 0:b74591d5ab33 428 }
be_bryan 0:b74591d5ab33 429
be_bryan 0:b74591d5ab33 430 *olen = ilen;
be_bryan 0:b74591d5ab33 431
be_bryan 0:b74591d5ab33 432 return( 0 );
be_bryan 0:b74591d5ab33 433 }
be_bryan 0:b74591d5ab33 434 #endif /* MBEDTLS_CIPHER_MODE_CTR */
be_bryan 0:b74591d5ab33 435
be_bryan 0:b74591d5ab33 436 #if defined(MBEDTLS_CIPHER_MODE_STREAM)
be_bryan 0:b74591d5ab33 437 if( ctx->cipher_info->mode == MBEDTLS_MODE_STREAM )
be_bryan 0:b74591d5ab33 438 {
be_bryan 0:b74591d5ab33 439 if( 0 != ( ret = ctx->cipher_info->base->stream_func( ctx->cipher_ctx,
be_bryan 0:b74591d5ab33 440 ilen, input, output ) ) )
be_bryan 0:b74591d5ab33 441 {
be_bryan 0:b74591d5ab33 442 return( ret );
be_bryan 0:b74591d5ab33 443 }
be_bryan 0:b74591d5ab33 444
be_bryan 0:b74591d5ab33 445 *olen = ilen;
be_bryan 0:b74591d5ab33 446
be_bryan 0:b74591d5ab33 447 return( 0 );
be_bryan 0:b74591d5ab33 448 }
be_bryan 0:b74591d5ab33 449 #endif /* MBEDTLS_CIPHER_MODE_STREAM */
be_bryan 0:b74591d5ab33 450
be_bryan 0:b74591d5ab33 451 return( MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
be_bryan 0:b74591d5ab33 452 }
be_bryan 0:b74591d5ab33 453
be_bryan 0:b74591d5ab33 454 #if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
be_bryan 0:b74591d5ab33 455 #if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
be_bryan 0:b74591d5ab33 456 /*
be_bryan 0:b74591d5ab33 457 * PKCS7 (and PKCS5) padding: fill with ll bytes, with ll = padding_len
be_bryan 0:b74591d5ab33 458 */
be_bryan 0:b74591d5ab33 459 static void add_pkcs_padding( unsigned char *output, size_t output_len,
be_bryan 0:b74591d5ab33 460 size_t data_len )
be_bryan 0:b74591d5ab33 461 {
be_bryan 0:b74591d5ab33 462 size_t padding_len = output_len - data_len;
be_bryan 0:b74591d5ab33 463 unsigned char i;
be_bryan 0:b74591d5ab33 464
be_bryan 0:b74591d5ab33 465 for( i = 0; i < padding_len; i++ )
be_bryan 0:b74591d5ab33 466 output[data_len + i] = (unsigned char) padding_len;
be_bryan 0:b74591d5ab33 467 }
be_bryan 0:b74591d5ab33 468
be_bryan 0:b74591d5ab33 469 static int get_pkcs_padding( unsigned char *input, size_t input_len,
be_bryan 0:b74591d5ab33 470 size_t *data_len )
be_bryan 0:b74591d5ab33 471 {
be_bryan 0:b74591d5ab33 472 size_t i, pad_idx;
be_bryan 0:b74591d5ab33 473 unsigned char padding_len, bad = 0;
be_bryan 0:b74591d5ab33 474
be_bryan 0:b74591d5ab33 475 if( NULL == input || NULL == data_len )
be_bryan 0:b74591d5ab33 476 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 477
be_bryan 0:b74591d5ab33 478 padding_len = input[input_len - 1];
be_bryan 0:b74591d5ab33 479 *data_len = input_len - padding_len;
be_bryan 0:b74591d5ab33 480
be_bryan 0:b74591d5ab33 481 /* Avoid logical || since it results in a branch */
be_bryan 0:b74591d5ab33 482 bad |= padding_len > input_len;
be_bryan 0:b74591d5ab33 483 bad |= padding_len == 0;
be_bryan 0:b74591d5ab33 484
be_bryan 0:b74591d5ab33 485 /* The number of bytes checked must be independent of padding_len,
be_bryan 0:b74591d5ab33 486 * so pick input_len, which is usually 8 or 16 (one block) */
be_bryan 0:b74591d5ab33 487 pad_idx = input_len - padding_len;
be_bryan 0:b74591d5ab33 488 for( i = 0; i < input_len; i++ )
be_bryan 0:b74591d5ab33 489 bad |= ( input[i] ^ padding_len ) * ( i >= pad_idx );
be_bryan 0:b74591d5ab33 490
be_bryan 0:b74591d5ab33 491 return( MBEDTLS_ERR_CIPHER_INVALID_PADDING * ( bad != 0 ) );
be_bryan 0:b74591d5ab33 492 }
be_bryan 0:b74591d5ab33 493 #endif /* MBEDTLS_CIPHER_PADDING_PKCS7 */
be_bryan 0:b74591d5ab33 494
be_bryan 0:b74591d5ab33 495 #if defined(MBEDTLS_CIPHER_PADDING_ONE_AND_ZEROS)
be_bryan 0:b74591d5ab33 496 /*
be_bryan 0:b74591d5ab33 497 * One and zeros padding: fill with 80 00 ... 00
be_bryan 0:b74591d5ab33 498 */
be_bryan 0:b74591d5ab33 499 static void add_one_and_zeros_padding( unsigned char *output,
be_bryan 0:b74591d5ab33 500 size_t output_len, size_t data_len )
be_bryan 0:b74591d5ab33 501 {
be_bryan 0:b74591d5ab33 502 size_t padding_len = output_len - data_len;
be_bryan 0:b74591d5ab33 503 unsigned char i = 0;
be_bryan 0:b74591d5ab33 504
be_bryan 0:b74591d5ab33 505 output[data_len] = 0x80;
be_bryan 0:b74591d5ab33 506 for( i = 1; i < padding_len; i++ )
be_bryan 0:b74591d5ab33 507 output[data_len + i] = 0x00;
be_bryan 0:b74591d5ab33 508 }
be_bryan 0:b74591d5ab33 509
be_bryan 0:b74591d5ab33 510 static int get_one_and_zeros_padding( unsigned char *input, size_t input_len,
be_bryan 0:b74591d5ab33 511 size_t *data_len )
be_bryan 0:b74591d5ab33 512 {
be_bryan 0:b74591d5ab33 513 size_t i;
be_bryan 0:b74591d5ab33 514 unsigned char done = 0, prev_done, bad;
be_bryan 0:b74591d5ab33 515
be_bryan 0:b74591d5ab33 516 if( NULL == input || NULL == data_len )
be_bryan 0:b74591d5ab33 517 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 518
be_bryan 0:b74591d5ab33 519 bad = 0xFF;
be_bryan 0:b74591d5ab33 520 *data_len = 0;
be_bryan 0:b74591d5ab33 521 for( i = input_len; i > 0; i-- )
be_bryan 0:b74591d5ab33 522 {
be_bryan 0:b74591d5ab33 523 prev_done = done;
be_bryan 0:b74591d5ab33 524 done |= ( input[i-1] != 0 );
be_bryan 0:b74591d5ab33 525 *data_len |= ( i - 1 ) * ( done != prev_done );
be_bryan 0:b74591d5ab33 526 bad &= ( input[i-1] ^ 0x80 ) | ( done == prev_done );
be_bryan 0:b74591d5ab33 527 }
be_bryan 0:b74591d5ab33 528
be_bryan 0:b74591d5ab33 529 return( MBEDTLS_ERR_CIPHER_INVALID_PADDING * ( bad != 0 ) );
be_bryan 0:b74591d5ab33 530
be_bryan 0:b74591d5ab33 531 }
be_bryan 0:b74591d5ab33 532 #endif /* MBEDTLS_CIPHER_PADDING_ONE_AND_ZEROS */
be_bryan 0:b74591d5ab33 533
be_bryan 0:b74591d5ab33 534 #if defined(MBEDTLS_CIPHER_PADDING_ZEROS_AND_LEN)
be_bryan 0:b74591d5ab33 535 /*
be_bryan 0:b74591d5ab33 536 * Zeros and len padding: fill with 00 ... 00 ll, where ll is padding length
be_bryan 0:b74591d5ab33 537 */
be_bryan 0:b74591d5ab33 538 static void add_zeros_and_len_padding( unsigned char *output,
be_bryan 0:b74591d5ab33 539 size_t output_len, size_t data_len )
be_bryan 0:b74591d5ab33 540 {
be_bryan 0:b74591d5ab33 541 size_t padding_len = output_len - data_len;
be_bryan 0:b74591d5ab33 542 unsigned char i = 0;
be_bryan 0:b74591d5ab33 543
be_bryan 0:b74591d5ab33 544 for( i = 1; i < padding_len; i++ )
be_bryan 0:b74591d5ab33 545 output[data_len + i - 1] = 0x00;
be_bryan 0:b74591d5ab33 546 output[output_len - 1] = (unsigned char) padding_len;
be_bryan 0:b74591d5ab33 547 }
be_bryan 0:b74591d5ab33 548
be_bryan 0:b74591d5ab33 549 static int get_zeros_and_len_padding( unsigned char *input, size_t input_len,
be_bryan 0:b74591d5ab33 550 size_t *data_len )
be_bryan 0:b74591d5ab33 551 {
be_bryan 0:b74591d5ab33 552 size_t i, pad_idx;
be_bryan 0:b74591d5ab33 553 unsigned char padding_len, bad = 0;
be_bryan 0:b74591d5ab33 554
be_bryan 0:b74591d5ab33 555 if( NULL == input || NULL == data_len )
be_bryan 0:b74591d5ab33 556 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 557
be_bryan 0:b74591d5ab33 558 padding_len = input[input_len - 1];
be_bryan 0:b74591d5ab33 559 *data_len = input_len - padding_len;
be_bryan 0:b74591d5ab33 560
be_bryan 0:b74591d5ab33 561 /* Avoid logical || since it results in a branch */
be_bryan 0:b74591d5ab33 562 bad |= padding_len > input_len;
be_bryan 0:b74591d5ab33 563 bad |= padding_len == 0;
be_bryan 0:b74591d5ab33 564
be_bryan 0:b74591d5ab33 565 /* The number of bytes checked must be independent of padding_len */
be_bryan 0:b74591d5ab33 566 pad_idx = input_len - padding_len;
be_bryan 0:b74591d5ab33 567 for( i = 0; i < input_len - 1; i++ )
be_bryan 0:b74591d5ab33 568 bad |= input[i] * ( i >= pad_idx );
be_bryan 0:b74591d5ab33 569
be_bryan 0:b74591d5ab33 570 return( MBEDTLS_ERR_CIPHER_INVALID_PADDING * ( bad != 0 ) );
be_bryan 0:b74591d5ab33 571 }
be_bryan 0:b74591d5ab33 572 #endif /* MBEDTLS_CIPHER_PADDING_ZEROS_AND_LEN */
be_bryan 0:b74591d5ab33 573
be_bryan 0:b74591d5ab33 574 #if defined(MBEDTLS_CIPHER_PADDING_ZEROS)
be_bryan 0:b74591d5ab33 575 /*
be_bryan 0:b74591d5ab33 576 * Zero padding: fill with 00 ... 00
be_bryan 0:b74591d5ab33 577 */
be_bryan 0:b74591d5ab33 578 static void add_zeros_padding( unsigned char *output,
be_bryan 0:b74591d5ab33 579 size_t output_len, size_t data_len )
be_bryan 0:b74591d5ab33 580 {
be_bryan 0:b74591d5ab33 581 size_t i;
be_bryan 0:b74591d5ab33 582
be_bryan 0:b74591d5ab33 583 for( i = data_len; i < output_len; i++ )
be_bryan 0:b74591d5ab33 584 output[i] = 0x00;
be_bryan 0:b74591d5ab33 585 }
be_bryan 0:b74591d5ab33 586
be_bryan 0:b74591d5ab33 587 static int get_zeros_padding( unsigned char *input, size_t input_len,
be_bryan 0:b74591d5ab33 588 size_t *data_len )
be_bryan 0:b74591d5ab33 589 {
be_bryan 0:b74591d5ab33 590 size_t i;
be_bryan 0:b74591d5ab33 591 unsigned char done = 0, prev_done;
be_bryan 0:b74591d5ab33 592
be_bryan 0:b74591d5ab33 593 if( NULL == input || NULL == data_len )
be_bryan 0:b74591d5ab33 594 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 595
be_bryan 0:b74591d5ab33 596 *data_len = 0;
be_bryan 0:b74591d5ab33 597 for( i = input_len; i > 0; i-- )
be_bryan 0:b74591d5ab33 598 {
be_bryan 0:b74591d5ab33 599 prev_done = done;
be_bryan 0:b74591d5ab33 600 done |= ( input[i-1] != 0 );
be_bryan 0:b74591d5ab33 601 *data_len |= i * ( done != prev_done );
be_bryan 0:b74591d5ab33 602 }
be_bryan 0:b74591d5ab33 603
be_bryan 0:b74591d5ab33 604 return( 0 );
be_bryan 0:b74591d5ab33 605 }
be_bryan 0:b74591d5ab33 606 #endif /* MBEDTLS_CIPHER_PADDING_ZEROS */
be_bryan 0:b74591d5ab33 607
be_bryan 0:b74591d5ab33 608 /*
be_bryan 0:b74591d5ab33 609 * No padding: don't pad :)
be_bryan 0:b74591d5ab33 610 *
be_bryan 0:b74591d5ab33 611 * There is no add_padding function (check for NULL in mbedtls_cipher_finish)
be_bryan 0:b74591d5ab33 612 * but a trivial get_padding function
be_bryan 0:b74591d5ab33 613 */
be_bryan 0:b74591d5ab33 614 static int get_no_padding( unsigned char *input, size_t input_len,
be_bryan 0:b74591d5ab33 615 size_t *data_len )
be_bryan 0:b74591d5ab33 616 {
be_bryan 0:b74591d5ab33 617 if( NULL == input || NULL == data_len )
be_bryan 0:b74591d5ab33 618 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 619
be_bryan 0:b74591d5ab33 620 *data_len = input_len;
be_bryan 0:b74591d5ab33 621
be_bryan 0:b74591d5ab33 622 return( 0 );
be_bryan 0:b74591d5ab33 623 }
be_bryan 0:b74591d5ab33 624 #endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
be_bryan 0:b74591d5ab33 625
be_bryan 0:b74591d5ab33 626 int mbedtls_cipher_finish( mbedtls_cipher_context_t *ctx,
be_bryan 0:b74591d5ab33 627 unsigned char *output, size_t *olen )
be_bryan 0:b74591d5ab33 628 {
be_bryan 0:b74591d5ab33 629 if( NULL == ctx || NULL == ctx->cipher_info || NULL == olen )
be_bryan 0:b74591d5ab33 630 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 631
be_bryan 0:b74591d5ab33 632 *olen = 0;
be_bryan 0:b74591d5ab33 633
be_bryan 0:b74591d5ab33 634 if( MBEDTLS_MODE_CFB == ctx->cipher_info->mode ||
be_bryan 0:b74591d5ab33 635 MBEDTLS_MODE_CTR == ctx->cipher_info->mode ||
be_bryan 0:b74591d5ab33 636 MBEDTLS_MODE_GCM == ctx->cipher_info->mode ||
be_bryan 0:b74591d5ab33 637 MBEDTLS_MODE_STREAM == ctx->cipher_info->mode )
be_bryan 0:b74591d5ab33 638 {
be_bryan 0:b74591d5ab33 639 return( 0 );
be_bryan 0:b74591d5ab33 640 }
be_bryan 0:b74591d5ab33 641
be_bryan 0:b74591d5ab33 642 if( MBEDTLS_MODE_ECB == ctx->cipher_info->mode )
be_bryan 0:b74591d5ab33 643 {
be_bryan 0:b74591d5ab33 644 if( ctx->unprocessed_len != 0 )
be_bryan 0:b74591d5ab33 645 return( MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED );
be_bryan 0:b74591d5ab33 646
be_bryan 0:b74591d5ab33 647 return( 0 );
be_bryan 0:b74591d5ab33 648 }
be_bryan 0:b74591d5ab33 649
be_bryan 0:b74591d5ab33 650 #if defined(MBEDTLS_CIPHER_MODE_CBC)
be_bryan 0:b74591d5ab33 651 if( MBEDTLS_MODE_CBC == ctx->cipher_info->mode )
be_bryan 0:b74591d5ab33 652 {
be_bryan 0:b74591d5ab33 653 int ret = 0;
be_bryan 0:b74591d5ab33 654
be_bryan 0:b74591d5ab33 655 if( MBEDTLS_ENCRYPT == ctx->operation )
be_bryan 0:b74591d5ab33 656 {
be_bryan 0:b74591d5ab33 657 /* check for 'no padding' mode */
be_bryan 0:b74591d5ab33 658 if( NULL == ctx->add_padding )
be_bryan 0:b74591d5ab33 659 {
be_bryan 0:b74591d5ab33 660 if( 0 != ctx->unprocessed_len )
be_bryan 0:b74591d5ab33 661 return( MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED );
be_bryan 0:b74591d5ab33 662
be_bryan 0:b74591d5ab33 663 return( 0 );
be_bryan 0:b74591d5ab33 664 }
be_bryan 0:b74591d5ab33 665
be_bryan 0:b74591d5ab33 666 ctx->add_padding( ctx->unprocessed_data, mbedtls_cipher_get_iv_size( ctx ),
be_bryan 0:b74591d5ab33 667 ctx->unprocessed_len );
be_bryan 0:b74591d5ab33 668 }
be_bryan 0:b74591d5ab33 669 else if( mbedtls_cipher_get_block_size( ctx ) != ctx->unprocessed_len )
be_bryan 0:b74591d5ab33 670 {
be_bryan 0:b74591d5ab33 671 /*
be_bryan 0:b74591d5ab33 672 * For decrypt operations, expect a full block,
be_bryan 0:b74591d5ab33 673 * or an empty block if no padding
be_bryan 0:b74591d5ab33 674 */
be_bryan 0:b74591d5ab33 675 if( NULL == ctx->add_padding && 0 == ctx->unprocessed_len )
be_bryan 0:b74591d5ab33 676 return( 0 );
be_bryan 0:b74591d5ab33 677
be_bryan 0:b74591d5ab33 678 return( MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED );
be_bryan 0:b74591d5ab33 679 }
be_bryan 0:b74591d5ab33 680
be_bryan 0:b74591d5ab33 681 /* cipher block */
be_bryan 0:b74591d5ab33 682 if( 0 != ( ret = ctx->cipher_info->base->cbc_func( ctx->cipher_ctx,
be_bryan 0:b74591d5ab33 683 ctx->operation, mbedtls_cipher_get_block_size( ctx ), ctx->iv,
be_bryan 0:b74591d5ab33 684 ctx->unprocessed_data, output ) ) )
be_bryan 0:b74591d5ab33 685 {
be_bryan 0:b74591d5ab33 686 return( ret );
be_bryan 0:b74591d5ab33 687 }
be_bryan 0:b74591d5ab33 688
be_bryan 0:b74591d5ab33 689 /* Set output size for decryption */
be_bryan 0:b74591d5ab33 690 if( MBEDTLS_DECRYPT == ctx->operation )
be_bryan 0:b74591d5ab33 691 return ctx->get_padding( output, mbedtls_cipher_get_block_size( ctx ),
be_bryan 0:b74591d5ab33 692 olen );
be_bryan 0:b74591d5ab33 693
be_bryan 0:b74591d5ab33 694 /* Set output size for encryption */
be_bryan 0:b74591d5ab33 695 *olen = mbedtls_cipher_get_block_size( ctx );
be_bryan 0:b74591d5ab33 696 return( 0 );
be_bryan 0:b74591d5ab33 697 }
be_bryan 0:b74591d5ab33 698 #else
be_bryan 0:b74591d5ab33 699 ((void) output);
be_bryan 0:b74591d5ab33 700 #endif /* MBEDTLS_CIPHER_MODE_CBC */
be_bryan 0:b74591d5ab33 701
be_bryan 0:b74591d5ab33 702 return( MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
be_bryan 0:b74591d5ab33 703 }
be_bryan 0:b74591d5ab33 704
be_bryan 0:b74591d5ab33 705 #if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
be_bryan 0:b74591d5ab33 706 int mbedtls_cipher_set_padding_mode( mbedtls_cipher_context_t *ctx, mbedtls_cipher_padding_t mode )
be_bryan 0:b74591d5ab33 707 {
be_bryan 0:b74591d5ab33 708 if( NULL == ctx ||
be_bryan 0:b74591d5ab33 709 MBEDTLS_MODE_CBC != ctx->cipher_info->mode )
be_bryan 0:b74591d5ab33 710 {
be_bryan 0:b74591d5ab33 711 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 712 }
be_bryan 0:b74591d5ab33 713
be_bryan 0:b74591d5ab33 714 switch( mode )
be_bryan 0:b74591d5ab33 715 {
be_bryan 0:b74591d5ab33 716 #if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
be_bryan 0:b74591d5ab33 717 case MBEDTLS_PADDING_PKCS7:
be_bryan 0:b74591d5ab33 718 ctx->add_padding = add_pkcs_padding;
be_bryan 0:b74591d5ab33 719 ctx->get_padding = get_pkcs_padding;
be_bryan 0:b74591d5ab33 720 break;
be_bryan 0:b74591d5ab33 721 #endif
be_bryan 0:b74591d5ab33 722 #if defined(MBEDTLS_CIPHER_PADDING_ONE_AND_ZEROS)
be_bryan 0:b74591d5ab33 723 case MBEDTLS_PADDING_ONE_AND_ZEROS:
be_bryan 0:b74591d5ab33 724 ctx->add_padding = add_one_and_zeros_padding;
be_bryan 0:b74591d5ab33 725 ctx->get_padding = get_one_and_zeros_padding;
be_bryan 0:b74591d5ab33 726 break;
be_bryan 0:b74591d5ab33 727 #endif
be_bryan 0:b74591d5ab33 728 #if defined(MBEDTLS_CIPHER_PADDING_ZEROS_AND_LEN)
be_bryan 0:b74591d5ab33 729 case MBEDTLS_PADDING_ZEROS_AND_LEN:
be_bryan 0:b74591d5ab33 730 ctx->add_padding = add_zeros_and_len_padding;
be_bryan 0:b74591d5ab33 731 ctx->get_padding = get_zeros_and_len_padding;
be_bryan 0:b74591d5ab33 732 break;
be_bryan 0:b74591d5ab33 733 #endif
be_bryan 0:b74591d5ab33 734 #if defined(MBEDTLS_CIPHER_PADDING_ZEROS)
be_bryan 0:b74591d5ab33 735 case MBEDTLS_PADDING_ZEROS:
be_bryan 0:b74591d5ab33 736 ctx->add_padding = add_zeros_padding;
be_bryan 0:b74591d5ab33 737 ctx->get_padding = get_zeros_padding;
be_bryan 0:b74591d5ab33 738 break;
be_bryan 0:b74591d5ab33 739 #endif
be_bryan 0:b74591d5ab33 740 case MBEDTLS_PADDING_NONE:
be_bryan 0:b74591d5ab33 741 ctx->add_padding = NULL;
be_bryan 0:b74591d5ab33 742 ctx->get_padding = get_no_padding;
be_bryan 0:b74591d5ab33 743 break;
be_bryan 0:b74591d5ab33 744
be_bryan 0:b74591d5ab33 745 default:
be_bryan 0:b74591d5ab33 746 return( MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
be_bryan 0:b74591d5ab33 747 }
be_bryan 0:b74591d5ab33 748
be_bryan 0:b74591d5ab33 749 return( 0 );
be_bryan 0:b74591d5ab33 750 }
be_bryan 0:b74591d5ab33 751 #endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
be_bryan 0:b74591d5ab33 752
be_bryan 0:b74591d5ab33 753 #if defined(MBEDTLS_GCM_C)
be_bryan 0:b74591d5ab33 754 int mbedtls_cipher_write_tag( mbedtls_cipher_context_t *ctx,
be_bryan 0:b74591d5ab33 755 unsigned char *tag, size_t tag_len )
be_bryan 0:b74591d5ab33 756 {
be_bryan 0:b74591d5ab33 757 if( NULL == ctx || NULL == ctx->cipher_info || NULL == tag )
be_bryan 0:b74591d5ab33 758 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 759
be_bryan 0:b74591d5ab33 760 if( MBEDTLS_ENCRYPT != ctx->operation )
be_bryan 0:b74591d5ab33 761 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 762
be_bryan 0:b74591d5ab33 763 if( MBEDTLS_MODE_GCM == ctx->cipher_info->mode )
be_bryan 0:b74591d5ab33 764 return mbedtls_gcm_finish( (mbedtls_gcm_context *) ctx->cipher_ctx, tag, tag_len );
be_bryan 0:b74591d5ab33 765
be_bryan 0:b74591d5ab33 766 return( 0 );
be_bryan 0:b74591d5ab33 767 }
be_bryan 0:b74591d5ab33 768
be_bryan 0:b74591d5ab33 769 int mbedtls_cipher_check_tag( mbedtls_cipher_context_t *ctx,
be_bryan 0:b74591d5ab33 770 const unsigned char *tag, size_t tag_len )
be_bryan 0:b74591d5ab33 771 {
be_bryan 0:b74591d5ab33 772 int ret;
be_bryan 0:b74591d5ab33 773
be_bryan 0:b74591d5ab33 774 if( NULL == ctx || NULL == ctx->cipher_info ||
be_bryan 0:b74591d5ab33 775 MBEDTLS_DECRYPT != ctx->operation )
be_bryan 0:b74591d5ab33 776 {
be_bryan 0:b74591d5ab33 777 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 778 }
be_bryan 0:b74591d5ab33 779
be_bryan 0:b74591d5ab33 780 if( MBEDTLS_MODE_GCM == ctx->cipher_info->mode )
be_bryan 0:b74591d5ab33 781 {
be_bryan 0:b74591d5ab33 782 unsigned char check_tag[16];
be_bryan 0:b74591d5ab33 783 size_t i;
be_bryan 0:b74591d5ab33 784 int diff;
be_bryan 0:b74591d5ab33 785
be_bryan 0:b74591d5ab33 786 if( tag_len > sizeof( check_tag ) )
be_bryan 0:b74591d5ab33 787 return( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 788
be_bryan 0:b74591d5ab33 789 if( 0 != ( ret = mbedtls_gcm_finish( (mbedtls_gcm_context *) ctx->cipher_ctx,
be_bryan 0:b74591d5ab33 790 check_tag, tag_len ) ) )
be_bryan 0:b74591d5ab33 791 {
be_bryan 0:b74591d5ab33 792 return( ret );
be_bryan 0:b74591d5ab33 793 }
be_bryan 0:b74591d5ab33 794
be_bryan 0:b74591d5ab33 795 /* Check the tag in "constant-time" */
be_bryan 0:b74591d5ab33 796 for( diff = 0, i = 0; i < tag_len; i++ )
be_bryan 0:b74591d5ab33 797 diff |= tag[i] ^ check_tag[i];
be_bryan 0:b74591d5ab33 798
be_bryan 0:b74591d5ab33 799 if( diff != 0 )
be_bryan 0:b74591d5ab33 800 return( MBEDTLS_ERR_CIPHER_AUTH_FAILED );
be_bryan 0:b74591d5ab33 801
be_bryan 0:b74591d5ab33 802 return( 0 );
be_bryan 0:b74591d5ab33 803 }
be_bryan 0:b74591d5ab33 804
be_bryan 0:b74591d5ab33 805 return( 0 );
be_bryan 0:b74591d5ab33 806 }
be_bryan 0:b74591d5ab33 807 #endif /* MBEDTLS_GCM_C */
be_bryan 0:b74591d5ab33 808
be_bryan 0:b74591d5ab33 809 /*
be_bryan 0:b74591d5ab33 810 * Packet-oriented wrapper for non-AEAD modes
be_bryan 0:b74591d5ab33 811 */
be_bryan 0:b74591d5ab33 812 int mbedtls_cipher_crypt( mbedtls_cipher_context_t *ctx,
be_bryan 0:b74591d5ab33 813 const unsigned char *iv, size_t iv_len,
be_bryan 0:b74591d5ab33 814 const unsigned char *input, size_t ilen,
be_bryan 0:b74591d5ab33 815 unsigned char *output, size_t *olen )
be_bryan 0:b74591d5ab33 816 {
be_bryan 0:b74591d5ab33 817 int ret;
be_bryan 0:b74591d5ab33 818 size_t finish_olen;
be_bryan 0:b74591d5ab33 819
be_bryan 0:b74591d5ab33 820 if( ( ret = mbedtls_cipher_set_iv( ctx, iv, iv_len ) ) != 0 )
be_bryan 0:b74591d5ab33 821 return( ret );
be_bryan 0:b74591d5ab33 822
be_bryan 0:b74591d5ab33 823 if( ( ret = mbedtls_cipher_reset( ctx ) ) != 0 )
be_bryan 0:b74591d5ab33 824 return( ret );
be_bryan 0:b74591d5ab33 825
be_bryan 0:b74591d5ab33 826 if( ( ret = mbedtls_cipher_update( ctx, input, ilen, output, olen ) ) != 0 )
be_bryan 0:b74591d5ab33 827 return( ret );
be_bryan 0:b74591d5ab33 828
be_bryan 0:b74591d5ab33 829 if( ( ret = mbedtls_cipher_finish( ctx, output + *olen, &finish_olen ) ) != 0 )
be_bryan 0:b74591d5ab33 830 return( ret );
be_bryan 0:b74591d5ab33 831
be_bryan 0:b74591d5ab33 832 *olen += finish_olen;
be_bryan 0:b74591d5ab33 833
be_bryan 0:b74591d5ab33 834 return( 0 );
be_bryan 0:b74591d5ab33 835 }
be_bryan 0:b74591d5ab33 836
be_bryan 0:b74591d5ab33 837 #if defined(MBEDTLS_CIPHER_MODE_AEAD)
be_bryan 0:b74591d5ab33 838 /*
be_bryan 0:b74591d5ab33 839 * Packet-oriented encryption for AEAD modes
be_bryan 0:b74591d5ab33 840 */
be_bryan 0:b74591d5ab33 841 int mbedtls_cipher_auth_encrypt( mbedtls_cipher_context_t *ctx,
be_bryan 0:b74591d5ab33 842 const unsigned char *iv, size_t iv_len,
be_bryan 0:b74591d5ab33 843 const unsigned char *ad, size_t ad_len,
be_bryan 0:b74591d5ab33 844 const unsigned char *input, size_t ilen,
be_bryan 0:b74591d5ab33 845 unsigned char *output, size_t *olen,
be_bryan 0:b74591d5ab33 846 unsigned char *tag, size_t tag_len )
be_bryan 0:b74591d5ab33 847 {
be_bryan 0:b74591d5ab33 848 #if defined(MBEDTLS_GCM_C)
be_bryan 0:b74591d5ab33 849 if( MBEDTLS_MODE_GCM == ctx->cipher_info->mode )
be_bryan 0:b74591d5ab33 850 {
be_bryan 0:b74591d5ab33 851 *olen = ilen;
be_bryan 0:b74591d5ab33 852 return( mbedtls_gcm_crypt_and_tag( ctx->cipher_ctx, MBEDTLS_GCM_ENCRYPT, ilen,
be_bryan 0:b74591d5ab33 853 iv, iv_len, ad, ad_len, input, output,
be_bryan 0:b74591d5ab33 854 tag_len, tag ) );
be_bryan 0:b74591d5ab33 855 }
be_bryan 0:b74591d5ab33 856 #endif /* MBEDTLS_GCM_C */
be_bryan 0:b74591d5ab33 857 #if defined(MBEDTLS_CCM_C)
be_bryan 0:b74591d5ab33 858 if( MBEDTLS_MODE_CCM == ctx->cipher_info->mode )
be_bryan 0:b74591d5ab33 859 {
be_bryan 0:b74591d5ab33 860 *olen = ilen;
be_bryan 0:b74591d5ab33 861 return( mbedtls_ccm_encrypt_and_tag( ctx->cipher_ctx, ilen,
be_bryan 0:b74591d5ab33 862 iv, iv_len, ad, ad_len, input, output,
be_bryan 0:b74591d5ab33 863 tag, tag_len ) );
be_bryan 0:b74591d5ab33 864 }
be_bryan 0:b74591d5ab33 865 #endif /* MBEDTLS_CCM_C */
be_bryan 0:b74591d5ab33 866
be_bryan 0:b74591d5ab33 867 return( MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
be_bryan 0:b74591d5ab33 868 }
be_bryan 0:b74591d5ab33 869
be_bryan 0:b74591d5ab33 870 /*
be_bryan 0:b74591d5ab33 871 * Packet-oriented decryption for AEAD modes
be_bryan 0:b74591d5ab33 872 */
be_bryan 0:b74591d5ab33 873 int mbedtls_cipher_auth_decrypt( mbedtls_cipher_context_t *ctx,
be_bryan 0:b74591d5ab33 874 const unsigned char *iv, size_t iv_len,
be_bryan 0:b74591d5ab33 875 const unsigned char *ad, size_t ad_len,
be_bryan 0:b74591d5ab33 876 const unsigned char *input, size_t ilen,
be_bryan 0:b74591d5ab33 877 unsigned char *output, size_t *olen,
be_bryan 0:b74591d5ab33 878 const unsigned char *tag, size_t tag_len )
be_bryan 0:b74591d5ab33 879 {
be_bryan 0:b74591d5ab33 880 #if defined(MBEDTLS_GCM_C)
be_bryan 0:b74591d5ab33 881 if( MBEDTLS_MODE_GCM == ctx->cipher_info->mode )
be_bryan 0:b74591d5ab33 882 {
be_bryan 0:b74591d5ab33 883 int ret;
be_bryan 0:b74591d5ab33 884
be_bryan 0:b74591d5ab33 885 *olen = ilen;
be_bryan 0:b74591d5ab33 886 ret = mbedtls_gcm_auth_decrypt( ctx->cipher_ctx, ilen,
be_bryan 0:b74591d5ab33 887 iv, iv_len, ad, ad_len,
be_bryan 0:b74591d5ab33 888 tag, tag_len, input, output );
be_bryan 0:b74591d5ab33 889
be_bryan 0:b74591d5ab33 890 if( ret == MBEDTLS_ERR_GCM_AUTH_FAILED )
be_bryan 0:b74591d5ab33 891 ret = MBEDTLS_ERR_CIPHER_AUTH_FAILED;
be_bryan 0:b74591d5ab33 892
be_bryan 0:b74591d5ab33 893 return( ret );
be_bryan 0:b74591d5ab33 894 }
be_bryan 0:b74591d5ab33 895 #endif /* MBEDTLS_GCM_C */
be_bryan 0:b74591d5ab33 896 #if defined(MBEDTLS_CCM_C)
be_bryan 0:b74591d5ab33 897 if( MBEDTLS_MODE_CCM == ctx->cipher_info->mode )
be_bryan 0:b74591d5ab33 898 {
be_bryan 0:b74591d5ab33 899 int ret;
be_bryan 0:b74591d5ab33 900
be_bryan 0:b74591d5ab33 901 *olen = ilen;
be_bryan 0:b74591d5ab33 902 ret = mbedtls_ccm_auth_decrypt( ctx->cipher_ctx, ilen,
be_bryan 0:b74591d5ab33 903 iv, iv_len, ad, ad_len,
be_bryan 0:b74591d5ab33 904 input, output, tag, tag_len );
be_bryan 0:b74591d5ab33 905
be_bryan 0:b74591d5ab33 906 if( ret == MBEDTLS_ERR_CCM_AUTH_FAILED )
be_bryan 0:b74591d5ab33 907 ret = MBEDTLS_ERR_CIPHER_AUTH_FAILED;
be_bryan 0:b74591d5ab33 908
be_bryan 0:b74591d5ab33 909 return( ret );
be_bryan 0:b74591d5ab33 910 }
be_bryan 0:b74591d5ab33 911 #endif /* MBEDTLS_CCM_C */
be_bryan 0:b74591d5ab33 912
be_bryan 0:b74591d5ab33 913 return( MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
be_bryan 0:b74591d5ab33 914 }
be_bryan 0:b74591d5ab33 915 #endif /* MBEDTLS_CIPHER_MODE_AEAD */
be_bryan 0:b74591d5ab33 916
be_bryan 0:b74591d5ab33 917 #endif /* MBEDTLS_CIPHER_C */