Important changes to repositories hosted on mbed.com
Mbed hosted mercurial repositories are deprecated and are due to be permanently deleted in July 2026.
To keep a copy of this software download the repository Zip archive or clone locally using Mercurial.
It is also possible to export all your personal repositories from the account settings page.
mbed-os/features/mbedtls/src/ccm.c@3:f3764f852aa8, 2018-10-11 (annotated)
- Committer:
- kadonotakashi
- Date:
- Thu Oct 11 02:27:46 2018 +0000
- Revision:
- 3:f3764f852aa8
- Parent:
- 0:8fdf9a60065b
Nucreo 446 + SSD1331 test version;
Who changed what in which revision?
| User | Revision | Line number | New contents of line | 
|---|---|---|---|
| kadonotakashi | 0:8fdf9a60065b | 1 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 2 | * NIST SP800-38C compliant CCM implementation | 
| kadonotakashi | 0:8fdf9a60065b | 3 | * | 
| kadonotakashi | 0:8fdf9a60065b | 4 | * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved | 
| kadonotakashi | 0:8fdf9a60065b | 5 | * SPDX-License-Identifier: Apache-2.0 | 
| kadonotakashi | 0:8fdf9a60065b | 6 | * | 
| kadonotakashi | 0:8fdf9a60065b | 7 | * Licensed under the Apache License, Version 2.0 (the "License"); you may | 
| kadonotakashi | 0:8fdf9a60065b | 8 | * not use this file except in compliance with the License. | 
| kadonotakashi | 0:8fdf9a60065b | 9 | * You may obtain a copy of the License at | 
| kadonotakashi | 0:8fdf9a60065b | 10 | * | 
| kadonotakashi | 0:8fdf9a60065b | 11 | * http://www.apache.org/licenses/LICENSE-2.0 | 
| kadonotakashi | 0:8fdf9a60065b | 12 | * | 
| kadonotakashi | 0:8fdf9a60065b | 13 | * Unless required by applicable law or agreed to in writing, software | 
| kadonotakashi | 0:8fdf9a60065b | 14 | * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT | 
| kadonotakashi | 0:8fdf9a60065b | 15 | * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
| kadonotakashi | 0:8fdf9a60065b | 16 | * See the License for the specific language governing permissions and | 
| kadonotakashi | 0:8fdf9a60065b | 17 | * limitations under the License. | 
| kadonotakashi | 0:8fdf9a60065b | 18 | * | 
| kadonotakashi | 0:8fdf9a60065b | 19 | * This file is part of mbed TLS (https://tls.mbed.org) | 
| kadonotakashi | 0:8fdf9a60065b | 20 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 21 | |
| kadonotakashi | 0:8fdf9a60065b | 22 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 23 | * Definition of CCM: | 
| kadonotakashi | 0:8fdf9a60065b | 24 | * http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C_updated-July20_2007.pdf | 
| kadonotakashi | 0:8fdf9a60065b | 25 | * RFC 3610 "Counter with CBC-MAC (CCM)" | 
| kadonotakashi | 0:8fdf9a60065b | 26 | * | 
| kadonotakashi | 0:8fdf9a60065b | 27 | * Related: | 
| kadonotakashi | 0:8fdf9a60065b | 28 | * RFC 5116 "An Interface and Algorithms for Authenticated Encryption" | 
| kadonotakashi | 0:8fdf9a60065b | 29 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 30 | |
| kadonotakashi | 0:8fdf9a60065b | 31 | #if !defined(MBEDTLS_CONFIG_FILE) | 
| kadonotakashi | 0:8fdf9a60065b | 32 | #include "mbedtls/config.h" | 
| kadonotakashi | 0:8fdf9a60065b | 33 | #else | 
| kadonotakashi | 0:8fdf9a60065b | 34 | #include MBEDTLS_CONFIG_FILE | 
| kadonotakashi | 0:8fdf9a60065b | 35 | #endif | 
| kadonotakashi | 0:8fdf9a60065b | 36 | |
| kadonotakashi | 0:8fdf9a60065b | 37 | #if defined(MBEDTLS_CCM_C) | 
| kadonotakashi | 0:8fdf9a60065b | 38 | |
| kadonotakashi | 0:8fdf9a60065b | 39 | #include "mbedtls/ccm.h" | 
| kadonotakashi | 0:8fdf9a60065b | 40 | #include "mbedtls/platform_util.h" | 
| kadonotakashi | 0:8fdf9a60065b | 41 | |
| kadonotakashi | 0:8fdf9a60065b | 42 | #include <string.h> | 
| kadonotakashi | 0:8fdf9a60065b | 43 | |
| kadonotakashi | 0:8fdf9a60065b | 44 | #if defined(MBEDTLS_SELF_TEST) && defined(MBEDTLS_AES_C) | 
| kadonotakashi | 0:8fdf9a60065b | 45 | #if defined(MBEDTLS_PLATFORM_C) | 
| kadonotakashi | 0:8fdf9a60065b | 46 | #include "mbedtls/platform.h" | 
| kadonotakashi | 0:8fdf9a60065b | 47 | #else | 
| kadonotakashi | 0:8fdf9a60065b | 48 | #include <stdio.h> | 
| kadonotakashi | 0:8fdf9a60065b | 49 | #define mbedtls_printf printf | 
| kadonotakashi | 0:8fdf9a60065b | 50 | #endif /* MBEDTLS_PLATFORM_C */ | 
| kadonotakashi | 0:8fdf9a60065b | 51 | #endif /* MBEDTLS_SELF_TEST && MBEDTLS_AES_C */ | 
| kadonotakashi | 0:8fdf9a60065b | 52 | |
| kadonotakashi | 0:8fdf9a60065b | 53 | #if !defined(MBEDTLS_CCM_ALT) | 
| kadonotakashi | 0:8fdf9a60065b | 54 | |
| kadonotakashi | 0:8fdf9a60065b | 55 | #define CCM_ENCRYPT 0 | 
| kadonotakashi | 0:8fdf9a60065b | 56 | #define CCM_DECRYPT 1 | 
| kadonotakashi | 0:8fdf9a60065b | 57 | |
| kadonotakashi | 0:8fdf9a60065b | 58 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 59 | * Initialize context | 
| kadonotakashi | 0:8fdf9a60065b | 60 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 61 | void mbedtls_ccm_init( mbedtls_ccm_context *ctx ) | 
| kadonotakashi | 0:8fdf9a60065b | 62 | { | 
| kadonotakashi | 0:8fdf9a60065b | 63 | memset( ctx, 0, sizeof( mbedtls_ccm_context ) ); | 
| kadonotakashi | 0:8fdf9a60065b | 64 | } | 
| kadonotakashi | 0:8fdf9a60065b | 65 | |
| kadonotakashi | 0:8fdf9a60065b | 66 | int mbedtls_ccm_setkey( mbedtls_ccm_context *ctx, | 
| kadonotakashi | 0:8fdf9a60065b | 67 | mbedtls_cipher_id_t cipher, | 
| kadonotakashi | 0:8fdf9a60065b | 68 | const unsigned char *key, | 
| kadonotakashi | 0:8fdf9a60065b | 69 | unsigned int keybits ) | 
| kadonotakashi | 0:8fdf9a60065b | 70 | { | 
| kadonotakashi | 0:8fdf9a60065b | 71 | int ret; | 
| kadonotakashi | 0:8fdf9a60065b | 72 | const mbedtls_cipher_info_t *cipher_info; | 
| kadonotakashi | 0:8fdf9a60065b | 73 | |
| kadonotakashi | 0:8fdf9a60065b | 74 | cipher_info = mbedtls_cipher_info_from_values( cipher, keybits, MBEDTLS_MODE_ECB ); | 
| kadonotakashi | 0:8fdf9a60065b | 75 | if( cipher_info == NULL ) | 
| kadonotakashi | 0:8fdf9a60065b | 76 | return( MBEDTLS_ERR_CCM_BAD_INPUT ); | 
| kadonotakashi | 0:8fdf9a60065b | 77 | |
| kadonotakashi | 0:8fdf9a60065b | 78 | if( cipher_info->block_size != 16 ) | 
| kadonotakashi | 0:8fdf9a60065b | 79 | return( MBEDTLS_ERR_CCM_BAD_INPUT ); | 
| kadonotakashi | 0:8fdf9a60065b | 80 | |
| kadonotakashi | 0:8fdf9a60065b | 81 | mbedtls_cipher_free( &ctx->cipher_ctx ); | 
| kadonotakashi | 0:8fdf9a60065b | 82 | |
| kadonotakashi | 0:8fdf9a60065b | 83 | if( ( ret = mbedtls_cipher_setup( &ctx->cipher_ctx, cipher_info ) ) != 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 84 | return( ret ); | 
| kadonotakashi | 0:8fdf9a60065b | 85 | |
| kadonotakashi | 0:8fdf9a60065b | 86 | if( ( ret = mbedtls_cipher_setkey( &ctx->cipher_ctx, key, keybits, | 
| kadonotakashi | 0:8fdf9a60065b | 87 | MBEDTLS_ENCRYPT ) ) != 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 88 | { | 
| kadonotakashi | 0:8fdf9a60065b | 89 | return( ret ); | 
| kadonotakashi | 0:8fdf9a60065b | 90 | } | 
| kadonotakashi | 0:8fdf9a60065b | 91 | |
| kadonotakashi | 0:8fdf9a60065b | 92 | return( 0 ); | 
| kadonotakashi | 0:8fdf9a60065b | 93 | } | 
| kadonotakashi | 0:8fdf9a60065b | 94 | |
| kadonotakashi | 0:8fdf9a60065b | 95 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 96 | * Free context | 
| kadonotakashi | 0:8fdf9a60065b | 97 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 98 | void mbedtls_ccm_free( mbedtls_ccm_context *ctx ) | 
| kadonotakashi | 0:8fdf9a60065b | 99 | { | 
| kadonotakashi | 0:8fdf9a60065b | 100 | mbedtls_cipher_free( &ctx->cipher_ctx ); | 
| kadonotakashi | 0:8fdf9a60065b | 101 | mbedtls_platform_zeroize( ctx, sizeof( mbedtls_ccm_context ) ); | 
| kadonotakashi | 0:8fdf9a60065b | 102 | } | 
| kadonotakashi | 0:8fdf9a60065b | 103 | |
| kadonotakashi | 0:8fdf9a60065b | 104 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 105 | * Macros for common operations. | 
| kadonotakashi | 0:8fdf9a60065b | 106 | * Results in smaller compiled code than static inline functions. | 
| kadonotakashi | 0:8fdf9a60065b | 107 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 108 | |
| kadonotakashi | 0:8fdf9a60065b | 109 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 110 | * Update the CBC-MAC state in y using a block in b | 
| kadonotakashi | 0:8fdf9a60065b | 111 | * (Always using b as the source helps the compiler optimise a bit better.) | 
| kadonotakashi | 0:8fdf9a60065b | 112 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 113 | #define UPDATE_CBC_MAC \ | 
| kadonotakashi | 0:8fdf9a60065b | 114 | for( i = 0; i < 16; i++ ) \ | 
| kadonotakashi | 0:8fdf9a60065b | 115 | y[i] ^= b[i]; \ | 
| kadonotakashi | 0:8fdf9a60065b | 116 | \ | 
| kadonotakashi | 0:8fdf9a60065b | 117 | if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, y, 16, y, &olen ) ) != 0 ) \ | 
| kadonotakashi | 0:8fdf9a60065b | 118 | return( ret ); | 
| kadonotakashi | 0:8fdf9a60065b | 119 | |
| kadonotakashi | 0:8fdf9a60065b | 120 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 121 | * Encrypt or decrypt a partial block with CTR | 
| kadonotakashi | 0:8fdf9a60065b | 122 | * Warning: using b for temporary storage! src and dst must not be b! | 
| kadonotakashi | 0:8fdf9a60065b | 123 | * This avoids allocating one more 16 bytes buffer while allowing src == dst. | 
| kadonotakashi | 0:8fdf9a60065b | 124 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 125 | #define CTR_CRYPT( dst, src, len ) \ | 
| kadonotakashi | 0:8fdf9a60065b | 126 | if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctr, 16, b, &olen ) ) != 0 ) \ | 
| kadonotakashi | 0:8fdf9a60065b | 127 | return( ret ); \ | 
| kadonotakashi | 0:8fdf9a60065b | 128 | \ | 
| kadonotakashi | 0:8fdf9a60065b | 129 | for( i = 0; i < len; i++ ) \ | 
| kadonotakashi | 0:8fdf9a60065b | 130 | dst[i] = src[i] ^ b[i]; | 
| kadonotakashi | 0:8fdf9a60065b | 131 | |
| kadonotakashi | 0:8fdf9a60065b | 132 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 133 | * Authenticated encryption or decryption | 
| kadonotakashi | 0:8fdf9a60065b | 134 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 135 | static int ccm_auth_crypt( mbedtls_ccm_context *ctx, int mode, size_t length, | 
| kadonotakashi | 0:8fdf9a60065b | 136 | const unsigned char *iv, size_t iv_len, | 
| kadonotakashi | 0:8fdf9a60065b | 137 | const unsigned char *add, size_t add_len, | 
| kadonotakashi | 0:8fdf9a60065b | 138 | const unsigned char *input, unsigned char *output, | 
| kadonotakashi | 0:8fdf9a60065b | 139 | unsigned char *tag, size_t tag_len ) | 
| kadonotakashi | 0:8fdf9a60065b | 140 | { | 
| kadonotakashi | 0:8fdf9a60065b | 141 | int ret; | 
| kadonotakashi | 0:8fdf9a60065b | 142 | unsigned char i; | 
| kadonotakashi | 0:8fdf9a60065b | 143 | unsigned char q; | 
| kadonotakashi | 0:8fdf9a60065b | 144 | size_t len_left, olen; | 
| kadonotakashi | 0:8fdf9a60065b | 145 | unsigned char b[16]; | 
| kadonotakashi | 0:8fdf9a60065b | 146 | unsigned char y[16]; | 
| kadonotakashi | 0:8fdf9a60065b | 147 | unsigned char ctr[16]; | 
| kadonotakashi | 0:8fdf9a60065b | 148 | const unsigned char *src; | 
| kadonotakashi | 0:8fdf9a60065b | 149 | unsigned char *dst; | 
| kadonotakashi | 0:8fdf9a60065b | 150 | |
| kadonotakashi | 0:8fdf9a60065b | 151 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 152 | * Check length requirements: SP800-38C A.1 | 
| kadonotakashi | 0:8fdf9a60065b | 153 | * Additional requirement: a < 2^16 - 2^8 to simplify the code. | 
| kadonotakashi | 0:8fdf9a60065b | 154 | * 'length' checked later (when writing it to the first block) | 
| kadonotakashi | 0:8fdf9a60065b | 155 | * | 
| kadonotakashi | 0:8fdf9a60065b | 156 | * Also, loosen the requirements to enable support for CCM* (IEEE 802.15.4). | 
| kadonotakashi | 0:8fdf9a60065b | 157 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 158 | if( tag_len == 2 || tag_len > 16 || tag_len % 2 != 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 159 | return( MBEDTLS_ERR_CCM_BAD_INPUT ); | 
| kadonotakashi | 0:8fdf9a60065b | 160 | |
| kadonotakashi | 0:8fdf9a60065b | 161 | /* Also implies q is within bounds */ | 
| kadonotakashi | 0:8fdf9a60065b | 162 | if( iv_len < 7 || iv_len > 13 ) | 
| kadonotakashi | 0:8fdf9a60065b | 163 | return( MBEDTLS_ERR_CCM_BAD_INPUT ); | 
| kadonotakashi | 0:8fdf9a60065b | 164 | |
| kadonotakashi | 0:8fdf9a60065b | 165 | if( add_len > 0xFF00 ) | 
| kadonotakashi | 0:8fdf9a60065b | 166 | return( MBEDTLS_ERR_CCM_BAD_INPUT ); | 
| kadonotakashi | 0:8fdf9a60065b | 167 | |
| kadonotakashi | 0:8fdf9a60065b | 168 | q = 16 - 1 - (unsigned char) iv_len; | 
| kadonotakashi | 0:8fdf9a60065b | 169 | |
| kadonotakashi | 0:8fdf9a60065b | 170 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 171 | * First block B_0: | 
| kadonotakashi | 0:8fdf9a60065b | 172 | * 0 .. 0 flags | 
| kadonotakashi | 0:8fdf9a60065b | 173 | * 1 .. iv_len nonce (aka iv) | 
| kadonotakashi | 0:8fdf9a60065b | 174 | * iv_len+1 .. 15 length | 
| kadonotakashi | 0:8fdf9a60065b | 175 | * | 
| kadonotakashi | 0:8fdf9a60065b | 176 | * With flags as (bits): | 
| kadonotakashi | 0:8fdf9a60065b | 177 | * 7 0 | 
| kadonotakashi | 0:8fdf9a60065b | 178 | * 6 add present? | 
| kadonotakashi | 0:8fdf9a60065b | 179 | * 5 .. 3 (t - 2) / 2 | 
| kadonotakashi | 0:8fdf9a60065b | 180 | * 2 .. 0 q - 1 | 
| kadonotakashi | 0:8fdf9a60065b | 181 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 182 | b[0] = 0; | 
| kadonotakashi | 0:8fdf9a60065b | 183 | b[0] |= ( add_len > 0 ) << 6; | 
| kadonotakashi | 0:8fdf9a60065b | 184 | b[0] |= ( ( tag_len - 2 ) / 2 ) << 3; | 
| kadonotakashi | 0:8fdf9a60065b | 185 | b[0] |= q - 1; | 
| kadonotakashi | 0:8fdf9a60065b | 186 | |
| kadonotakashi | 0:8fdf9a60065b | 187 | memcpy( b + 1, iv, iv_len ); | 
| kadonotakashi | 0:8fdf9a60065b | 188 | |
| kadonotakashi | 0:8fdf9a60065b | 189 | for( i = 0, len_left = length; i < q; i++, len_left >>= 8 ) | 
| kadonotakashi | 0:8fdf9a60065b | 190 | b[15-i] = (unsigned char)( len_left & 0xFF ); | 
| kadonotakashi | 0:8fdf9a60065b | 191 | |
| kadonotakashi | 0:8fdf9a60065b | 192 | if( len_left > 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 193 | return( MBEDTLS_ERR_CCM_BAD_INPUT ); | 
| kadonotakashi | 0:8fdf9a60065b | 194 | |
| kadonotakashi | 0:8fdf9a60065b | 195 | |
| kadonotakashi | 0:8fdf9a60065b | 196 | /* Start CBC-MAC with first block */ | 
| kadonotakashi | 0:8fdf9a60065b | 197 | memset( y, 0, 16 ); | 
| kadonotakashi | 0:8fdf9a60065b | 198 | UPDATE_CBC_MAC; | 
| kadonotakashi | 0:8fdf9a60065b | 199 | |
| kadonotakashi | 0:8fdf9a60065b | 200 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 201 | * If there is additional data, update CBC-MAC with | 
| kadonotakashi | 0:8fdf9a60065b | 202 | * add_len, add, 0 (padding to a block boundary) | 
| kadonotakashi | 0:8fdf9a60065b | 203 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 204 | if( add_len > 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 205 | { | 
| kadonotakashi | 0:8fdf9a60065b | 206 | size_t use_len; | 
| kadonotakashi | 0:8fdf9a60065b | 207 | len_left = add_len; | 
| kadonotakashi | 0:8fdf9a60065b | 208 | src = add; | 
| kadonotakashi | 0:8fdf9a60065b | 209 | |
| kadonotakashi | 0:8fdf9a60065b | 210 | memset( b, 0, 16 ); | 
| kadonotakashi | 0:8fdf9a60065b | 211 | b[0] = (unsigned char)( ( add_len >> 8 ) & 0xFF ); | 
| kadonotakashi | 0:8fdf9a60065b | 212 | b[1] = (unsigned char)( ( add_len ) & 0xFF ); | 
| kadonotakashi | 0:8fdf9a60065b | 213 | |
| kadonotakashi | 0:8fdf9a60065b | 214 | use_len = len_left < 16 - 2 ? len_left : 16 - 2; | 
| kadonotakashi | 0:8fdf9a60065b | 215 | memcpy( b + 2, src, use_len ); | 
| kadonotakashi | 0:8fdf9a60065b | 216 | len_left -= use_len; | 
| kadonotakashi | 0:8fdf9a60065b | 217 | src += use_len; | 
| kadonotakashi | 0:8fdf9a60065b | 218 | |
| kadonotakashi | 0:8fdf9a60065b | 219 | UPDATE_CBC_MAC; | 
| kadonotakashi | 0:8fdf9a60065b | 220 | |
| kadonotakashi | 0:8fdf9a60065b | 221 | while( len_left > 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 222 | { | 
| kadonotakashi | 0:8fdf9a60065b | 223 | use_len = len_left > 16 ? 16 : len_left; | 
| kadonotakashi | 0:8fdf9a60065b | 224 | |
| kadonotakashi | 0:8fdf9a60065b | 225 | memset( b, 0, 16 ); | 
| kadonotakashi | 0:8fdf9a60065b | 226 | memcpy( b, src, use_len ); | 
| kadonotakashi | 0:8fdf9a60065b | 227 | UPDATE_CBC_MAC; | 
| kadonotakashi | 0:8fdf9a60065b | 228 | |
| kadonotakashi | 0:8fdf9a60065b | 229 | len_left -= use_len; | 
| kadonotakashi | 0:8fdf9a60065b | 230 | src += use_len; | 
| kadonotakashi | 0:8fdf9a60065b | 231 | } | 
| kadonotakashi | 0:8fdf9a60065b | 232 | } | 
| kadonotakashi | 0:8fdf9a60065b | 233 | |
| kadonotakashi | 0:8fdf9a60065b | 234 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 235 | * Prepare counter block for encryption: | 
| kadonotakashi | 0:8fdf9a60065b | 236 | * 0 .. 0 flags | 
| kadonotakashi | 0:8fdf9a60065b | 237 | * 1 .. iv_len nonce (aka iv) | 
| kadonotakashi | 0:8fdf9a60065b | 238 | * iv_len+1 .. 15 counter (initially 1) | 
| kadonotakashi | 0:8fdf9a60065b | 239 | * | 
| kadonotakashi | 0:8fdf9a60065b | 240 | * With flags as (bits): | 
| kadonotakashi | 0:8fdf9a60065b | 241 | * 7 .. 3 0 | 
| kadonotakashi | 0:8fdf9a60065b | 242 | * 2 .. 0 q - 1 | 
| kadonotakashi | 0:8fdf9a60065b | 243 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 244 | ctr[0] = q - 1; | 
| kadonotakashi | 0:8fdf9a60065b | 245 | memcpy( ctr + 1, iv, iv_len ); | 
| kadonotakashi | 0:8fdf9a60065b | 246 | memset( ctr + 1 + iv_len, 0, q ); | 
| kadonotakashi | 0:8fdf9a60065b | 247 | ctr[15] = 1; | 
| kadonotakashi | 0:8fdf9a60065b | 248 | |
| kadonotakashi | 0:8fdf9a60065b | 249 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 250 | * Authenticate and {en,de}crypt the message. | 
| kadonotakashi | 0:8fdf9a60065b | 251 | * | 
| kadonotakashi | 0:8fdf9a60065b | 252 | * The only difference between encryption and decryption is | 
| kadonotakashi | 0:8fdf9a60065b | 253 | * the respective order of authentication and {en,de}cryption. | 
| kadonotakashi | 0:8fdf9a60065b | 254 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 255 | len_left = length; | 
| kadonotakashi | 0:8fdf9a60065b | 256 | src = input; | 
| kadonotakashi | 0:8fdf9a60065b | 257 | dst = output; | 
| kadonotakashi | 0:8fdf9a60065b | 258 | |
| kadonotakashi | 0:8fdf9a60065b | 259 | while( len_left > 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 260 | { | 
| kadonotakashi | 0:8fdf9a60065b | 261 | size_t use_len = len_left > 16 ? 16 : len_left; | 
| kadonotakashi | 0:8fdf9a60065b | 262 | |
| kadonotakashi | 0:8fdf9a60065b | 263 | if( mode == CCM_ENCRYPT ) | 
| kadonotakashi | 0:8fdf9a60065b | 264 | { | 
| kadonotakashi | 0:8fdf9a60065b | 265 | memset( b, 0, 16 ); | 
| kadonotakashi | 0:8fdf9a60065b | 266 | memcpy( b, src, use_len ); | 
| kadonotakashi | 0:8fdf9a60065b | 267 | UPDATE_CBC_MAC; | 
| kadonotakashi | 0:8fdf9a60065b | 268 | } | 
| kadonotakashi | 0:8fdf9a60065b | 269 | |
| kadonotakashi | 0:8fdf9a60065b | 270 | CTR_CRYPT( dst, src, use_len ); | 
| kadonotakashi | 0:8fdf9a60065b | 271 | |
| kadonotakashi | 0:8fdf9a60065b | 272 | if( mode == CCM_DECRYPT ) | 
| kadonotakashi | 0:8fdf9a60065b | 273 | { | 
| kadonotakashi | 0:8fdf9a60065b | 274 | memset( b, 0, 16 ); | 
| kadonotakashi | 0:8fdf9a60065b | 275 | memcpy( b, dst, use_len ); | 
| kadonotakashi | 0:8fdf9a60065b | 276 | UPDATE_CBC_MAC; | 
| kadonotakashi | 0:8fdf9a60065b | 277 | } | 
| kadonotakashi | 0:8fdf9a60065b | 278 | |
| kadonotakashi | 0:8fdf9a60065b | 279 | dst += use_len; | 
| kadonotakashi | 0:8fdf9a60065b | 280 | src += use_len; | 
| kadonotakashi | 0:8fdf9a60065b | 281 | len_left -= use_len; | 
| kadonotakashi | 0:8fdf9a60065b | 282 | |
| kadonotakashi | 0:8fdf9a60065b | 283 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 284 | * Increment counter. | 
| kadonotakashi | 0:8fdf9a60065b | 285 | * No need to check for overflow thanks to the length check above. | 
| kadonotakashi | 0:8fdf9a60065b | 286 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 287 | for( i = 0; i < q; i++ ) | 
| kadonotakashi | 0:8fdf9a60065b | 288 | if( ++ctr[15-i] != 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 289 | break; | 
| kadonotakashi | 0:8fdf9a60065b | 290 | } | 
| kadonotakashi | 0:8fdf9a60065b | 291 | |
| kadonotakashi | 0:8fdf9a60065b | 292 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 293 | * Authentication: reset counter and crypt/mask internal tag | 
| kadonotakashi | 0:8fdf9a60065b | 294 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 295 | for( i = 0; i < q; i++ ) | 
| kadonotakashi | 0:8fdf9a60065b | 296 | ctr[15-i] = 0; | 
| kadonotakashi | 0:8fdf9a60065b | 297 | |
| kadonotakashi | 0:8fdf9a60065b | 298 | CTR_CRYPT( y, y, 16 ); | 
| kadonotakashi | 0:8fdf9a60065b | 299 | memcpy( tag, y, tag_len ); | 
| kadonotakashi | 0:8fdf9a60065b | 300 | |
| kadonotakashi | 0:8fdf9a60065b | 301 | return( 0 ); | 
| kadonotakashi | 0:8fdf9a60065b | 302 | } | 
| kadonotakashi | 0:8fdf9a60065b | 303 | |
| kadonotakashi | 0:8fdf9a60065b | 304 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 305 | * Authenticated encryption | 
| kadonotakashi | 0:8fdf9a60065b | 306 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 307 | int mbedtls_ccm_star_encrypt_and_tag( mbedtls_ccm_context *ctx, size_t length, | 
| kadonotakashi | 0:8fdf9a60065b | 308 | const unsigned char *iv, size_t iv_len, | 
| kadonotakashi | 0:8fdf9a60065b | 309 | const unsigned char *add, size_t add_len, | 
| kadonotakashi | 0:8fdf9a60065b | 310 | const unsigned char *input, unsigned char *output, | 
| kadonotakashi | 0:8fdf9a60065b | 311 | unsigned char *tag, size_t tag_len ) | 
| kadonotakashi | 0:8fdf9a60065b | 312 | { | 
| kadonotakashi | 0:8fdf9a60065b | 313 | return( ccm_auth_crypt( ctx, CCM_ENCRYPT, length, iv, iv_len, | 
| kadonotakashi | 0:8fdf9a60065b | 314 | add, add_len, input, output, tag, tag_len ) ); | 
| kadonotakashi | 0:8fdf9a60065b | 315 | } | 
| kadonotakashi | 0:8fdf9a60065b | 316 | |
| kadonotakashi | 0:8fdf9a60065b | 317 | int mbedtls_ccm_encrypt_and_tag( mbedtls_ccm_context *ctx, size_t length, | 
| kadonotakashi | 0:8fdf9a60065b | 318 | const unsigned char *iv, size_t iv_len, | 
| kadonotakashi | 0:8fdf9a60065b | 319 | const unsigned char *add, size_t add_len, | 
| kadonotakashi | 0:8fdf9a60065b | 320 | const unsigned char *input, unsigned char *output, | 
| kadonotakashi | 0:8fdf9a60065b | 321 | unsigned char *tag, size_t tag_len ) | 
| kadonotakashi | 0:8fdf9a60065b | 322 | { | 
| kadonotakashi | 0:8fdf9a60065b | 323 | if( tag_len == 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 324 | return( MBEDTLS_ERR_CCM_BAD_INPUT ); | 
| kadonotakashi | 0:8fdf9a60065b | 325 | |
| kadonotakashi | 0:8fdf9a60065b | 326 | return( mbedtls_ccm_star_encrypt_and_tag( ctx, length, iv, iv_len, add, | 
| kadonotakashi | 0:8fdf9a60065b | 327 | add_len, input, output, tag, tag_len ) ); | 
| kadonotakashi | 0:8fdf9a60065b | 328 | } | 
| kadonotakashi | 0:8fdf9a60065b | 329 | |
| kadonotakashi | 0:8fdf9a60065b | 330 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 331 | * Authenticated decryption | 
| kadonotakashi | 0:8fdf9a60065b | 332 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 333 | int mbedtls_ccm_star_auth_decrypt( mbedtls_ccm_context *ctx, size_t length, | 
| kadonotakashi | 0:8fdf9a60065b | 334 | const unsigned char *iv, size_t iv_len, | 
| kadonotakashi | 0:8fdf9a60065b | 335 | const unsigned char *add, size_t add_len, | 
| kadonotakashi | 0:8fdf9a60065b | 336 | const unsigned char *input, unsigned char *output, | 
| kadonotakashi | 0:8fdf9a60065b | 337 | const unsigned char *tag, size_t tag_len ) | 
| kadonotakashi | 0:8fdf9a60065b | 338 | { | 
| kadonotakashi | 0:8fdf9a60065b | 339 | int ret; | 
| kadonotakashi | 0:8fdf9a60065b | 340 | unsigned char check_tag[16]; | 
| kadonotakashi | 0:8fdf9a60065b | 341 | unsigned char i; | 
| kadonotakashi | 0:8fdf9a60065b | 342 | int diff; | 
| kadonotakashi | 0:8fdf9a60065b | 343 | |
| kadonotakashi | 0:8fdf9a60065b | 344 | if( ( ret = ccm_auth_crypt( ctx, CCM_DECRYPT, length, | 
| kadonotakashi | 0:8fdf9a60065b | 345 | iv, iv_len, add, add_len, | 
| kadonotakashi | 0:8fdf9a60065b | 346 | input, output, check_tag, tag_len ) ) != 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 347 | { | 
| kadonotakashi | 0:8fdf9a60065b | 348 | return( ret ); | 
| kadonotakashi | 0:8fdf9a60065b | 349 | } | 
| kadonotakashi | 0:8fdf9a60065b | 350 | |
| kadonotakashi | 0:8fdf9a60065b | 351 | /* Check tag in "constant-time" */ | 
| kadonotakashi | 0:8fdf9a60065b | 352 | for( diff = 0, i = 0; i < tag_len; i++ ) | 
| kadonotakashi | 0:8fdf9a60065b | 353 | diff |= tag[i] ^ check_tag[i]; | 
| kadonotakashi | 0:8fdf9a60065b | 354 | |
| kadonotakashi | 0:8fdf9a60065b | 355 | if( diff != 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 356 | { | 
| kadonotakashi | 0:8fdf9a60065b | 357 | mbedtls_platform_zeroize( output, length ); | 
| kadonotakashi | 0:8fdf9a60065b | 358 | return( MBEDTLS_ERR_CCM_AUTH_FAILED ); | 
| kadonotakashi | 0:8fdf9a60065b | 359 | } | 
| kadonotakashi | 0:8fdf9a60065b | 360 | |
| kadonotakashi | 0:8fdf9a60065b | 361 | return( 0 ); | 
| kadonotakashi | 0:8fdf9a60065b | 362 | } | 
| kadonotakashi | 0:8fdf9a60065b | 363 | |
| kadonotakashi | 0:8fdf9a60065b | 364 | int mbedtls_ccm_auth_decrypt( mbedtls_ccm_context *ctx, size_t length, | 
| kadonotakashi | 0:8fdf9a60065b | 365 | const unsigned char *iv, size_t iv_len, | 
| kadonotakashi | 0:8fdf9a60065b | 366 | const unsigned char *add, size_t add_len, | 
| kadonotakashi | 0:8fdf9a60065b | 367 | const unsigned char *input, unsigned char *output, | 
| kadonotakashi | 0:8fdf9a60065b | 368 | const unsigned char *tag, size_t tag_len ) | 
| kadonotakashi | 0:8fdf9a60065b | 369 | { | 
| kadonotakashi | 0:8fdf9a60065b | 370 | if( tag_len == 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 371 | return( MBEDTLS_ERR_CCM_BAD_INPUT ); | 
| kadonotakashi | 0:8fdf9a60065b | 372 | |
| kadonotakashi | 0:8fdf9a60065b | 373 | return( mbedtls_ccm_star_auth_decrypt( ctx, length, iv, iv_len, add, | 
| kadonotakashi | 0:8fdf9a60065b | 374 | add_len, input, output, tag, tag_len ) ); | 
| kadonotakashi | 0:8fdf9a60065b | 375 | } | 
| kadonotakashi | 0:8fdf9a60065b | 376 | #endif /* !MBEDTLS_CCM_ALT */ | 
| kadonotakashi | 0:8fdf9a60065b | 377 | |
| kadonotakashi | 0:8fdf9a60065b | 378 | #if defined(MBEDTLS_SELF_TEST) && defined(MBEDTLS_AES_C) | 
| kadonotakashi | 0:8fdf9a60065b | 379 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 380 | * Examples 1 to 3 from SP800-38C Appendix C | 
| kadonotakashi | 0:8fdf9a60065b | 381 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 382 | |
| kadonotakashi | 0:8fdf9a60065b | 383 | #define NB_TESTS 3 | 
| kadonotakashi | 0:8fdf9a60065b | 384 | #define CCM_SELFTEST_PT_MAX_LEN 24 | 
| kadonotakashi | 0:8fdf9a60065b | 385 | #define CCM_SELFTEST_CT_MAX_LEN 32 | 
| kadonotakashi | 0:8fdf9a60065b | 386 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 387 | * The data is the same for all tests, only the used length changes | 
| kadonotakashi | 0:8fdf9a60065b | 388 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 389 | static const unsigned char key[] = { | 
| kadonotakashi | 0:8fdf9a60065b | 390 | 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, | 
| kadonotakashi | 0:8fdf9a60065b | 391 | 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f | 
| kadonotakashi | 0:8fdf9a60065b | 392 | }; | 
| kadonotakashi | 0:8fdf9a60065b | 393 | |
| kadonotakashi | 0:8fdf9a60065b | 394 | static const unsigned char iv[] = { | 
| kadonotakashi | 0:8fdf9a60065b | 395 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 
| kadonotakashi | 0:8fdf9a60065b | 396 | 0x18, 0x19, 0x1a, 0x1b | 
| kadonotakashi | 0:8fdf9a60065b | 397 | }; | 
| kadonotakashi | 0:8fdf9a60065b | 398 | |
| kadonotakashi | 0:8fdf9a60065b | 399 | static const unsigned char ad[] = { | 
| kadonotakashi | 0:8fdf9a60065b | 400 | 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 
| kadonotakashi | 0:8fdf9a60065b | 401 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 
| kadonotakashi | 0:8fdf9a60065b | 402 | 0x10, 0x11, 0x12, 0x13 | 
| kadonotakashi | 0:8fdf9a60065b | 403 | }; | 
| kadonotakashi | 0:8fdf9a60065b | 404 | |
| kadonotakashi | 0:8fdf9a60065b | 405 | static const unsigned char msg[CCM_SELFTEST_PT_MAX_LEN] = { | 
| kadonotakashi | 0:8fdf9a60065b | 406 | 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, | 
| kadonotakashi | 0:8fdf9a60065b | 407 | 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, | 
| kadonotakashi | 0:8fdf9a60065b | 408 | 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 
| kadonotakashi | 0:8fdf9a60065b | 409 | }; | 
| kadonotakashi | 0:8fdf9a60065b | 410 | |
| kadonotakashi | 0:8fdf9a60065b | 411 | static const size_t iv_len [NB_TESTS] = { 7, 8, 12 }; | 
| kadonotakashi | 0:8fdf9a60065b | 412 | static const size_t add_len[NB_TESTS] = { 8, 16, 20 }; | 
| kadonotakashi | 0:8fdf9a60065b | 413 | static const size_t msg_len[NB_TESTS] = { 4, 16, 24 }; | 
| kadonotakashi | 0:8fdf9a60065b | 414 | static const size_t tag_len[NB_TESTS] = { 4, 6, 8 }; | 
| kadonotakashi | 0:8fdf9a60065b | 415 | |
| kadonotakashi | 0:8fdf9a60065b | 416 | static const unsigned char res[NB_TESTS][CCM_SELFTEST_CT_MAX_LEN] = { | 
| kadonotakashi | 0:8fdf9a60065b | 417 | { 0x71, 0x62, 0x01, 0x5b, 0x4d, 0xac, 0x25, 0x5d }, | 
| kadonotakashi | 0:8fdf9a60065b | 418 | { 0xd2, 0xa1, 0xf0, 0xe0, 0x51, 0xea, 0x5f, 0x62, | 
| kadonotakashi | 0:8fdf9a60065b | 419 | 0x08, 0x1a, 0x77, 0x92, 0x07, 0x3d, 0x59, 0x3d, | 
| kadonotakashi | 0:8fdf9a60065b | 420 | 0x1f, 0xc6, 0x4f, 0xbf, 0xac, 0xcd }, | 
| kadonotakashi | 0:8fdf9a60065b | 421 | { 0xe3, 0xb2, 0x01, 0xa9, 0xf5, 0xb7, 0x1a, 0x7a, | 
| kadonotakashi | 0:8fdf9a60065b | 422 | 0x9b, 0x1c, 0xea, 0xec, 0xcd, 0x97, 0xe7, 0x0b, | 
| kadonotakashi | 0:8fdf9a60065b | 423 | 0x61, 0x76, 0xaa, 0xd9, 0xa4, 0x42, 0x8a, 0xa5, | 
| kadonotakashi | 0:8fdf9a60065b | 424 | 0x48, 0x43, 0x92, 0xfb, 0xc1, 0xb0, 0x99, 0x51 } | 
| kadonotakashi | 0:8fdf9a60065b | 425 | }; | 
| kadonotakashi | 0:8fdf9a60065b | 426 | |
| kadonotakashi | 0:8fdf9a60065b | 427 | int mbedtls_ccm_self_test( int verbose ) | 
| kadonotakashi | 0:8fdf9a60065b | 428 | { | 
| kadonotakashi | 0:8fdf9a60065b | 429 | mbedtls_ccm_context ctx; | 
| kadonotakashi | 0:8fdf9a60065b | 430 | /* | 
| kadonotakashi | 0:8fdf9a60065b | 431 | * Some hardware accelerators require the input and output buffers | 
| kadonotakashi | 0:8fdf9a60065b | 432 | * would be in RAM, because the flash is not accessible. | 
| kadonotakashi | 0:8fdf9a60065b | 433 | * Use buffers on the stack to hold the test vectors data. | 
| kadonotakashi | 0:8fdf9a60065b | 434 | */ | 
| kadonotakashi | 0:8fdf9a60065b | 435 | unsigned char plaintext[CCM_SELFTEST_PT_MAX_LEN]; | 
| kadonotakashi | 0:8fdf9a60065b | 436 | unsigned char ciphertext[CCM_SELFTEST_CT_MAX_LEN]; | 
| kadonotakashi | 0:8fdf9a60065b | 437 | size_t i; | 
| kadonotakashi | 0:8fdf9a60065b | 438 | int ret; | 
| kadonotakashi | 0:8fdf9a60065b | 439 | |
| kadonotakashi | 0:8fdf9a60065b | 440 | mbedtls_ccm_init( &ctx ); | 
| kadonotakashi | 0:8fdf9a60065b | 441 | |
| kadonotakashi | 0:8fdf9a60065b | 442 | if( mbedtls_ccm_setkey( &ctx, MBEDTLS_CIPHER_ID_AES, key, 8 * sizeof key ) != 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 443 | { | 
| kadonotakashi | 0:8fdf9a60065b | 444 | if( verbose != 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 445 | mbedtls_printf( " CCM: setup failed" ); | 
| kadonotakashi | 0:8fdf9a60065b | 446 | |
| kadonotakashi | 0:8fdf9a60065b | 447 | return( 1 ); | 
| kadonotakashi | 0:8fdf9a60065b | 448 | } | 
| kadonotakashi | 0:8fdf9a60065b | 449 | |
| kadonotakashi | 0:8fdf9a60065b | 450 | for( i = 0; i < NB_TESTS; i++ ) | 
| kadonotakashi | 0:8fdf9a60065b | 451 | { | 
| kadonotakashi | 0:8fdf9a60065b | 452 | if( verbose != 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 453 | mbedtls_printf( " CCM-AES #%u: ", (unsigned int) i + 1 ); | 
| kadonotakashi | 0:8fdf9a60065b | 454 | |
| kadonotakashi | 0:8fdf9a60065b | 455 | memset( plaintext, 0, CCM_SELFTEST_PT_MAX_LEN ); | 
| kadonotakashi | 0:8fdf9a60065b | 456 | memset( ciphertext, 0, CCM_SELFTEST_CT_MAX_LEN ); | 
| kadonotakashi | 0:8fdf9a60065b | 457 | memcpy( plaintext, msg, msg_len[i] ); | 
| kadonotakashi | 0:8fdf9a60065b | 458 | |
| kadonotakashi | 0:8fdf9a60065b | 459 | ret = mbedtls_ccm_encrypt_and_tag( &ctx, msg_len[i], | 
| kadonotakashi | 0:8fdf9a60065b | 460 | iv, iv_len[i], ad, add_len[i], | 
| kadonotakashi | 0:8fdf9a60065b | 461 | plaintext, ciphertext, | 
| kadonotakashi | 0:8fdf9a60065b | 462 | ciphertext + msg_len[i], tag_len[i] ); | 
| kadonotakashi | 0:8fdf9a60065b | 463 | |
| kadonotakashi | 0:8fdf9a60065b | 464 | if( ret != 0 || | 
| kadonotakashi | 0:8fdf9a60065b | 465 | memcmp( ciphertext, res[i], msg_len[i] + tag_len[i] ) != 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 466 | { | 
| kadonotakashi | 0:8fdf9a60065b | 467 | if( verbose != 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 468 | mbedtls_printf( "failed\n" ); | 
| kadonotakashi | 0:8fdf9a60065b | 469 | |
| kadonotakashi | 0:8fdf9a60065b | 470 | return( 1 ); | 
| kadonotakashi | 0:8fdf9a60065b | 471 | } | 
| kadonotakashi | 0:8fdf9a60065b | 472 | memset( plaintext, 0, CCM_SELFTEST_PT_MAX_LEN ); | 
| kadonotakashi | 0:8fdf9a60065b | 473 | |
| kadonotakashi | 0:8fdf9a60065b | 474 | ret = mbedtls_ccm_auth_decrypt( &ctx, msg_len[i], | 
| kadonotakashi | 0:8fdf9a60065b | 475 | iv, iv_len[i], ad, add_len[i], | 
| kadonotakashi | 0:8fdf9a60065b | 476 | ciphertext, plaintext, | 
| kadonotakashi | 0:8fdf9a60065b | 477 | ciphertext + msg_len[i], tag_len[i] ); | 
| kadonotakashi | 0:8fdf9a60065b | 478 | |
| kadonotakashi | 0:8fdf9a60065b | 479 | if( ret != 0 || | 
| kadonotakashi | 0:8fdf9a60065b | 480 | memcmp( plaintext, msg, msg_len[i] ) != 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 481 | { | 
| kadonotakashi | 0:8fdf9a60065b | 482 | if( verbose != 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 483 | mbedtls_printf( "failed\n" ); | 
| kadonotakashi | 0:8fdf9a60065b | 484 | |
| kadonotakashi | 0:8fdf9a60065b | 485 | return( 1 ); | 
| kadonotakashi | 0:8fdf9a60065b | 486 | } | 
| kadonotakashi | 0:8fdf9a60065b | 487 | |
| kadonotakashi | 0:8fdf9a60065b | 488 | if( verbose != 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 489 | mbedtls_printf( "passed\n" ); | 
| kadonotakashi | 0:8fdf9a60065b | 490 | } | 
| kadonotakashi | 0:8fdf9a60065b | 491 | |
| kadonotakashi | 0:8fdf9a60065b | 492 | mbedtls_ccm_free( &ctx ); | 
| kadonotakashi | 0:8fdf9a60065b | 493 | |
| kadonotakashi | 0:8fdf9a60065b | 494 | if( verbose != 0 ) | 
| kadonotakashi | 0:8fdf9a60065b | 495 | mbedtls_printf( "\n" ); | 
| kadonotakashi | 0:8fdf9a60065b | 496 | |
| kadonotakashi | 0:8fdf9a60065b | 497 | return( 0 ); | 
| kadonotakashi | 0:8fdf9a60065b | 498 | } | 
| kadonotakashi | 0:8fdf9a60065b | 499 | |
| kadonotakashi | 0:8fdf9a60065b | 500 | #endif /* MBEDTLS_SELF_TEST && MBEDTLS_AES_C */ | 
| kadonotakashi | 0:8fdf9a60065b | 501 | |
| kadonotakashi | 0:8fdf9a60065b | 502 | #endif /* MBEDTLS_CCM_C */ |