Webserver+3d print

Dependents:   Nucleo

Revision:
0:8918a71cdbe9
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/cyclone_crypto/chacha20_poly1305.c	Sat Feb 04 18:15:49 2017 +0000
@@ -0,0 +1,256 @@
+/**
+ * @file chacha20_poly1305.c
+ * @brief ChaCha20Poly1305 AEAD
+ *
+ * @section License
+ *
+ * Copyright (C) 2010-2017 Oryx Embedded SARL. All rights reserved.
+ *
+ * This file is part of CycloneCrypto Open.
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU General Public License
+ * as published by the Free Software Foundation; either version 2
+ * of the License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301, USA.
+ *
+ * @author Oryx Embedded SARL (www.oryx-embedded.com)
+ * @version 1.7.6
+ **/
+
+//Switch to the appropriate trace level
+#define TRACE_LEVEL CRYPTO_TRACE_LEVEL
+
+//Dependencies
+#include <string.h>
+#include "crypto.h"
+#include "chacha.h"
+#include "poly1305.h"
+#include "chacha20_poly1305.h"
+#include "debug.h"
+
+//Check crypto library configuration
+#if (CHACHA20_POLY1305_SUPPORT == ENABLED)
+
+
+/**
+ * @brief Authenticated encryption using ChaCha20Poly1305
+ * @param[in] k key
+ * @param[in] kLen Length of the key
+ * @param[in] n Nonce
+ * @param[in] nLen Length of the nonce
+ * @param[in] a Additional authenticated data
+ * @param[in] aLen Length of the additional data
+ * @param[in] p Plaintext to be encrypted
+ * @param[out] c Ciphertext resulting from the encryption
+ * @param[in] length Total number of data bytes to be encrypted
+ * @param[out] t MAC resulting from the encryption process
+ * @param[in] tLen Length of the MAC
+ * @return Error code
+ **/
+
+error_t chacha20Poly1305Encrypt(const uint8_t *k, size_t kLen,
+   const uint8_t *n, size_t nLen, const uint8_t *a, size_t aLen,
+   const uint8_t *p, uint8_t *c, size_t length, uint8_t *t, size_t tLen)
+{
+   error_t error;
+   size_t paddingLen;
+   ChachaContext chachaContext;
+   Poly1305Context poly1305Context;
+   uint8_t temp[32];
+
+   //Check the length of the message-authentication code
+   if(tLen != 16)
+      return ERROR_INVALID_LENGTH;
+
+   //Initialize ChaCha20 context
+   error = chachaInit(&chachaContext, 20, k, kLen, n, nLen);
+   //Any error to report?
+   if(error)
+      return error;
+
+   //First, a Poly1305 one-time key is generated from the 256-bit key
+   //and nonce
+   chachaCipher(&chachaContext, NULL, temp, 32);
+
+   //The other 256 bits of the Chacha20 block are discarded
+   chachaCipher(&chachaContext, NULL, NULL, 32);
+
+   //Next, the ChaCha20 encryption function is called to encrypt the
+   //plaintext, using the same key and nonce
+   chachaCipher(&chachaContext, p, c, length);
+
+   //Initialize the Poly1305 function with the key calculated above
+   poly1305Init(&poly1305Context, temp);
+
+   //Compute MAC over the AAD
+   poly1305Update(&poly1305Context, a, aLen);
+
+   //If the length of the AAD is not an integral multiple of 16 bytes,
+   //then padding is required
+   if(aLen % 16)
+   {
+      //Compute the number of padding bytes
+      paddingLen = 16 - (aLen % 16);
+
+      //The padding is up to 15 zero bytes, and it brings the total
+      //length so far to an integral multiple of 16
+      memset(temp, 0, paddingLen);
+
+      //Compute MAC over the padding
+      poly1305Update(&poly1305Context, temp, paddingLen);
+   }
+
+   //Compute MAC over the ciphertext
+   poly1305Update(&poly1305Context, c, length);
+
+   //If the length of the ciphertext is not an integral multiple of 16 bytes,
+   //then padding is required
+   if(length % 16)
+   {
+      //Compute the number of padding bytes
+      paddingLen = 16 - (length % 16);
+
+      //The padding is up to 15 zero bytes, and it brings the total
+      //length so far to an integral multiple of 16
+      memset(temp, 0, paddingLen);
+
+      //Compute MAC over the padding
+      poly1305Update(&poly1305Context, temp, paddingLen);
+   }
+
+   //Encode the length of the AAD as a 64-bit little-endian integer
+   STORE64LE(aLen, temp);
+   //Compute MAC over the length field
+   poly1305Update(&poly1305Context, temp, sizeof(uint64_t));
+
+   //Encode the length of the ciphertext as a 64-bit little-endian integer
+   STORE64LE(length, temp);
+   //Compute MAC over the length field
+   poly1305Update(&poly1305Context, temp, sizeof(uint64_t));
+
+   //Compute message-authentication code
+   poly1305Final(&poly1305Context, t);
+
+   //Successful encryption
+   return NO_ERROR;
+}
+
+
+/**
+ * @brief Authenticated decryption using ChaCha20Poly1305
+ * @param[in] k key
+ * @param[in] kLen Length of the key
+ * @param[in] n Nonce
+ * @param[in] nLen Length of the nonce
+ * @param[in] a Additional authenticated data
+ * @param[in] aLen Length of the additional data
+ * @param[in] c Ciphertext to be decrypted
+ * @param[out] p Plaintext resulting from the decryption
+ * @param[in] length Total number of data bytes to be decrypted
+ * @param[in] t MAC to be verified
+ * @param[in] tLen Length of the MAC
+ * @return Error code
+ **/
+
+error_t chacha20Poly1305Decrypt(const uint8_t *k, size_t kLen,
+   const uint8_t *n, size_t nLen, const uint8_t *a, size_t aLen,
+   const uint8_t *c, uint8_t *p, size_t length, const uint8_t *t, size_t tLen)
+{
+   error_t error;
+   size_t paddingLen;
+   ChachaContext chachaContext;
+   Poly1305Context poly1305Context;
+   uint8_t temp[32];
+
+   //Check the length of the message-authentication code
+   if(tLen != 16)
+      return ERROR_INVALID_LENGTH;
+
+   //Initialize ChaCha20 context
+   error = chachaInit(&chachaContext, 20, k, kLen, n, nLen);
+   //Any error to report?
+   if(error)
+      return error;
+
+   //First, a Poly1305 one-time key is generated from the 256-bit key
+   //and nonce
+   chachaCipher(&chachaContext, NULL, temp, 32);
+
+   //The other 256 bits of the Chacha20 block are discarded
+   chachaCipher(&chachaContext, NULL, NULL, 32);
+
+   //Initialize the Poly1305 function with the key calculated above
+   poly1305Init(&poly1305Context, temp);
+
+   //Compute MAC over the AAD
+   poly1305Update(&poly1305Context, a, aLen);
+
+   //If the length of the AAD is not an integral multiple of 16 bytes,
+   //then padding is required
+   if(aLen % 16)
+   {
+      //Compute the number of padding bytes
+      paddingLen = 16 - (aLen % 16);
+
+      //The padding is up to 15 zero bytes, and it brings the total
+      //length so far to an integral multiple of 16
+      memset(temp, 0, paddingLen);
+
+      //Compute MAC over the padding
+      poly1305Update(&poly1305Context, temp, paddingLen);
+   }
+
+   //Compute MAC over the ciphertext
+   poly1305Update(&poly1305Context, c, length);
+
+   //If the length of the ciphertext is not an integral multiple of 16 bytes,
+   //then padding is required
+   if(length % 16)
+   {
+      //Compute the number of padding bytes
+      paddingLen = 16 - (length % 16);
+
+      //The padding is up to 15 zero bytes, and it brings the total
+      //length so far to an integral multiple of 16
+      memset(temp, 0, paddingLen);
+
+      //Compute MAC over the padding
+      poly1305Update(&poly1305Context, temp, paddingLen);
+   }
+
+   //Encode the length of the AAD as a 64-bit little-endian integer
+   STORE64LE(aLen, temp);
+   //Compute MAC over the length field
+   poly1305Update(&poly1305Context, temp, sizeof(uint64_t));
+
+   //Encode the length of the ciphertext as a 64-bit little-endian integer
+   STORE64LE(length, temp);
+   //Compute MAC over the length field
+   poly1305Update(&poly1305Context, temp, sizeof(uint64_t));
+
+   //Compute message-authentication code
+   poly1305Final(&poly1305Context, temp);
+
+   //Finally, we decrypt the ciphertext
+   chachaCipher(&chachaContext, c, p, length);
+
+   //The calculated tag is bitwise compared to the received tag. The
+   //message is authenticated if and only if the tags match
+   if(memcmp(temp, t, tLen))
+      return ERROR_FAILURE;
+
+   //Successful encryption
+   return NO_ERROR;
+}
+
+#endif
+