I added functionality to get the RSSI, BER, and Cell Neighbor for reporting connection issues to M2X

Dependencies:   WncControllerK64F

Committer:
JMF
Date:
Thu Nov 17 16:13:29 2016 +0000
Revision:
18:198e9b0acf11
Parent:
12:0071cb144c7a
Updates to mbed os resulted in mutex.h going away and rtos.h needed to be used; This fixes the Mutex typedef failure.  Also cast data buffers from 'char *' to (const std::uint8_t*) to conform with Fred's changes in WncController

Who changed what in which revision?

UserRevisionLine numberNew contents of line
JMF 12:0071cb144c7a 1 /*
JMF 12:0071cb144c7a 2 * NIST SP800-38D compliant GCM implementation
JMF 12:0071cb144c7a 3 *
JMF 12:0071cb144c7a 4 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
JMF 12:0071cb144c7a 5 * SPDX-License-Identifier: Apache-2.0
JMF 12:0071cb144c7a 6 *
JMF 12:0071cb144c7a 7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
JMF 12:0071cb144c7a 8 * not use this file except in compliance with the License.
JMF 12:0071cb144c7a 9 * You may obtain a copy of the License at
JMF 12:0071cb144c7a 10 *
JMF 12:0071cb144c7a 11 * http://www.apache.org/licenses/LICENSE-2.0
JMF 12:0071cb144c7a 12 *
JMF 12:0071cb144c7a 13 * Unless required by applicable law or agreed to in writing, software
JMF 12:0071cb144c7a 14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
JMF 12:0071cb144c7a 15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
JMF 12:0071cb144c7a 16 * See the License for the specific language governing permissions and
JMF 12:0071cb144c7a 17 * limitations under the License.
JMF 12:0071cb144c7a 18 *
JMF 12:0071cb144c7a 19 * This file is part of mbed TLS (https://tls.mbed.org)
JMF 12:0071cb144c7a 20 */
JMF 12:0071cb144c7a 21
JMF 12:0071cb144c7a 22 /*
JMF 12:0071cb144c7a 23 * http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf
JMF 12:0071cb144c7a 24 *
JMF 12:0071cb144c7a 25 * See also:
JMF 12:0071cb144c7a 26 * [MGV] http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/gcm/gcm-revised-spec.pdf
JMF 12:0071cb144c7a 27 *
JMF 12:0071cb144c7a 28 * We use the algorithm described as Shoup's method with 4-bit tables in
JMF 12:0071cb144c7a 29 * [MGV] 4.1, pp. 12-13, to enhance speed without using too much memory.
JMF 12:0071cb144c7a 30 */
JMF 12:0071cb144c7a 31
JMF 12:0071cb144c7a 32 #if !defined(MBEDTLS_CONFIG_FILE)
JMF 12:0071cb144c7a 33 #include "mbedtls/config.h"
JMF 12:0071cb144c7a 34 #else
JMF 12:0071cb144c7a 35 #include MBEDTLS_CONFIG_FILE
JMF 12:0071cb144c7a 36 #endif
JMF 12:0071cb144c7a 37
JMF 12:0071cb144c7a 38 #if defined(MBEDTLS_GCM_C)
JMF 12:0071cb144c7a 39
JMF 12:0071cb144c7a 40 #include "mbedtls/gcm.h"
JMF 12:0071cb144c7a 41
JMF 12:0071cb144c7a 42 #include <string.h>
JMF 12:0071cb144c7a 43
JMF 12:0071cb144c7a 44 #if defined(MBEDTLS_AESNI_C)
JMF 12:0071cb144c7a 45 #include "mbedtls/aesni.h"
JMF 12:0071cb144c7a 46 #endif
JMF 12:0071cb144c7a 47
JMF 12:0071cb144c7a 48 #if defined(MBEDTLS_SELF_TEST) && defined(MBEDTLS_AES_C)
JMF 12:0071cb144c7a 49 #if defined(MBEDTLS_PLATFORM_C)
JMF 12:0071cb144c7a 50 #include "mbedtls/platform.h"
JMF 12:0071cb144c7a 51 #else
JMF 12:0071cb144c7a 52 #include <stdio.h>
JMF 12:0071cb144c7a 53 #define mbedtls_printf pc.printf
JMF 12:0071cb144c7a 54 #endif /* MBEDTLS_PLATFORM_C */
JMF 12:0071cb144c7a 55 #endif /* MBEDTLS_SELF_TEST && MBEDTLS_AES_C */
JMF 12:0071cb144c7a 56
JMF 12:0071cb144c7a 57 /*
JMF 12:0071cb144c7a 58 * 32-bit integer manipulation macros (big endian)
JMF 12:0071cb144c7a 59 */
JMF 12:0071cb144c7a 60 #ifndef GET_UINT32_BE
JMF 12:0071cb144c7a 61 #define GET_UINT32_BE(n,b,i) \
JMF 12:0071cb144c7a 62 { \
JMF 12:0071cb144c7a 63 (n) = ( (uint32_t) (b)[(i) ] << 24 ) \
JMF 12:0071cb144c7a 64 | ( (uint32_t) (b)[(i) + 1] << 16 ) \
JMF 12:0071cb144c7a 65 | ( (uint32_t) (b)[(i) + 2] << 8 ) \
JMF 12:0071cb144c7a 66 | ( (uint32_t) (b)[(i) + 3] ); \
JMF 12:0071cb144c7a 67 }
JMF 12:0071cb144c7a 68 #endif
JMF 12:0071cb144c7a 69
JMF 12:0071cb144c7a 70 #ifndef PUT_UINT32_BE
JMF 12:0071cb144c7a 71 #define PUT_UINT32_BE(n,b,i) \
JMF 12:0071cb144c7a 72 { \
JMF 12:0071cb144c7a 73 (b)[(i) ] = (unsigned char) ( (n) >> 24 ); \
JMF 12:0071cb144c7a 74 (b)[(i) + 1] = (unsigned char) ( (n) >> 16 ); \
JMF 12:0071cb144c7a 75 (b)[(i) + 2] = (unsigned char) ( (n) >> 8 ); \
JMF 12:0071cb144c7a 76 (b)[(i) + 3] = (unsigned char) ( (n) ); \
JMF 12:0071cb144c7a 77 }
JMF 12:0071cb144c7a 78 #endif
JMF 12:0071cb144c7a 79
JMF 12:0071cb144c7a 80 /* Implementation that should never be optimized out by the compiler */
JMF 12:0071cb144c7a 81 static void mbedtls_zeroize( void *v, size_t n ) {
JMF 12:0071cb144c7a 82 volatile unsigned char *p = v; while( n-- ) *p++ = 0;
JMF 12:0071cb144c7a 83 }
JMF 12:0071cb144c7a 84
JMF 12:0071cb144c7a 85 /*
JMF 12:0071cb144c7a 86 * Initialize a context
JMF 12:0071cb144c7a 87 */
JMF 12:0071cb144c7a 88 void mbedtls_gcm_init( mbedtls_gcm_context *ctx )
JMF 12:0071cb144c7a 89 {
JMF 12:0071cb144c7a 90 memset( ctx, 0, sizeof( mbedtls_gcm_context ) );
JMF 12:0071cb144c7a 91 }
JMF 12:0071cb144c7a 92
JMF 12:0071cb144c7a 93 /*
JMF 12:0071cb144c7a 94 * Precompute small multiples of H, that is set
JMF 12:0071cb144c7a 95 * HH[i] || HL[i] = H times i,
JMF 12:0071cb144c7a 96 * where i is seen as a field element as in [MGV], ie high-order bits
JMF 12:0071cb144c7a 97 * correspond to low powers of P. The result is stored in the same way, that
JMF 12:0071cb144c7a 98 * is the high-order bit of HH corresponds to P^0 and the low-order bit of HL
JMF 12:0071cb144c7a 99 * corresponds to P^127.
JMF 12:0071cb144c7a 100 */
JMF 12:0071cb144c7a 101 static int gcm_gen_table( mbedtls_gcm_context *ctx )
JMF 12:0071cb144c7a 102 {
JMF 12:0071cb144c7a 103 int ret, i, j;
JMF 12:0071cb144c7a 104 uint64_t hi, lo;
JMF 12:0071cb144c7a 105 uint64_t vl, vh;
JMF 12:0071cb144c7a 106 unsigned char h[16];
JMF 12:0071cb144c7a 107 size_t olen = 0;
JMF 12:0071cb144c7a 108
JMF 12:0071cb144c7a 109 memset( h, 0, 16 );
JMF 12:0071cb144c7a 110 if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, h, 16, h, &olen ) ) != 0 )
JMF 12:0071cb144c7a 111 return( ret );
JMF 12:0071cb144c7a 112
JMF 12:0071cb144c7a 113 /* pack h as two 64-bits ints, big-endian */
JMF 12:0071cb144c7a 114 GET_UINT32_BE( hi, h, 0 );
JMF 12:0071cb144c7a 115 GET_UINT32_BE( lo, h, 4 );
JMF 12:0071cb144c7a 116 vh = (uint64_t) hi << 32 | lo;
JMF 12:0071cb144c7a 117
JMF 12:0071cb144c7a 118 GET_UINT32_BE( hi, h, 8 );
JMF 12:0071cb144c7a 119 GET_UINT32_BE( lo, h, 12 );
JMF 12:0071cb144c7a 120 vl = (uint64_t) hi << 32 | lo;
JMF 12:0071cb144c7a 121
JMF 12:0071cb144c7a 122 /* 8 = 1000 corresponds to 1 in GF(2^128) */
JMF 12:0071cb144c7a 123 ctx->HL[8] = vl;
JMF 12:0071cb144c7a 124 ctx->HH[8] = vh;
JMF 12:0071cb144c7a 125
JMF 12:0071cb144c7a 126 #if defined(MBEDTLS_AESNI_C) && defined(MBEDTLS_HAVE_X86_64)
JMF 12:0071cb144c7a 127 /* With CLMUL support, we need only h, not the rest of the table */
JMF 12:0071cb144c7a 128 if( mbedtls_aesni_has_support( MBEDTLS_AESNI_CLMUL ) )
JMF 12:0071cb144c7a 129 return( 0 );
JMF 12:0071cb144c7a 130 #endif
JMF 12:0071cb144c7a 131
JMF 12:0071cb144c7a 132 /* 0 corresponds to 0 in GF(2^128) */
JMF 12:0071cb144c7a 133 ctx->HH[0] = 0;
JMF 12:0071cb144c7a 134 ctx->HL[0] = 0;
JMF 12:0071cb144c7a 135
JMF 12:0071cb144c7a 136 for( i = 4; i > 0; i >>= 1 )
JMF 12:0071cb144c7a 137 {
JMF 12:0071cb144c7a 138 uint32_t T = ( vl & 1 ) * 0xe1000000U;
JMF 12:0071cb144c7a 139 vl = ( vh << 63 ) | ( vl >> 1 );
JMF 12:0071cb144c7a 140 vh = ( vh >> 1 ) ^ ( (uint64_t) T << 32);
JMF 12:0071cb144c7a 141
JMF 12:0071cb144c7a 142 ctx->HL[i] = vl;
JMF 12:0071cb144c7a 143 ctx->HH[i] = vh;
JMF 12:0071cb144c7a 144 }
JMF 12:0071cb144c7a 145
JMF 12:0071cb144c7a 146 for( i = 2; i <= 8; i *= 2 )
JMF 12:0071cb144c7a 147 {
JMF 12:0071cb144c7a 148 uint64_t *HiL = ctx->HL + i, *HiH = ctx->HH + i;
JMF 12:0071cb144c7a 149 vh = *HiH;
JMF 12:0071cb144c7a 150 vl = *HiL;
JMF 12:0071cb144c7a 151 for( j = 1; j < i; j++ )
JMF 12:0071cb144c7a 152 {
JMF 12:0071cb144c7a 153 HiH[j] = vh ^ ctx->HH[j];
JMF 12:0071cb144c7a 154 HiL[j] = vl ^ ctx->HL[j];
JMF 12:0071cb144c7a 155 }
JMF 12:0071cb144c7a 156 }
JMF 12:0071cb144c7a 157
JMF 12:0071cb144c7a 158 return( 0 );
JMF 12:0071cb144c7a 159 }
JMF 12:0071cb144c7a 160
JMF 12:0071cb144c7a 161 int mbedtls_gcm_setkey( mbedtls_gcm_context *ctx,
JMF 12:0071cb144c7a 162 mbedtls_cipher_id_t cipher,
JMF 12:0071cb144c7a 163 const unsigned char *key,
JMF 12:0071cb144c7a 164 unsigned int keybits )
JMF 12:0071cb144c7a 165 {
JMF 12:0071cb144c7a 166 int ret;
JMF 12:0071cb144c7a 167 const mbedtls_cipher_info_t *cipher_info;
JMF 12:0071cb144c7a 168
JMF 12:0071cb144c7a 169 cipher_info = mbedtls_cipher_info_from_values( cipher, keybits, MBEDTLS_MODE_ECB );
JMF 12:0071cb144c7a 170 if( cipher_info == NULL )
JMF 12:0071cb144c7a 171 return( MBEDTLS_ERR_GCM_BAD_INPUT );
JMF 12:0071cb144c7a 172
JMF 12:0071cb144c7a 173 if( cipher_info->block_size != 16 )
JMF 12:0071cb144c7a 174 return( MBEDTLS_ERR_GCM_BAD_INPUT );
JMF 12:0071cb144c7a 175
JMF 12:0071cb144c7a 176 mbedtls_cipher_free( &ctx->cipher_ctx );
JMF 12:0071cb144c7a 177
JMF 12:0071cb144c7a 178 if( ( ret = mbedtls_cipher_setup( &ctx->cipher_ctx, cipher_info ) ) != 0 )
JMF 12:0071cb144c7a 179 return( ret );
JMF 12:0071cb144c7a 180
JMF 12:0071cb144c7a 181 if( ( ret = mbedtls_cipher_setkey( &ctx->cipher_ctx, key, keybits,
JMF 12:0071cb144c7a 182 MBEDTLS_ENCRYPT ) ) != 0 )
JMF 12:0071cb144c7a 183 {
JMF 12:0071cb144c7a 184 return( ret );
JMF 12:0071cb144c7a 185 }
JMF 12:0071cb144c7a 186
JMF 12:0071cb144c7a 187 if( ( ret = gcm_gen_table( ctx ) ) != 0 )
JMF 12:0071cb144c7a 188 return( ret );
JMF 12:0071cb144c7a 189
JMF 12:0071cb144c7a 190 return( 0 );
JMF 12:0071cb144c7a 191 }
JMF 12:0071cb144c7a 192
JMF 12:0071cb144c7a 193 /*
JMF 12:0071cb144c7a 194 * Shoup's method for multiplication use this table with
JMF 12:0071cb144c7a 195 * last4[x] = x times P^128
JMF 12:0071cb144c7a 196 * where x and last4[x] are seen as elements of GF(2^128) as in [MGV]
JMF 12:0071cb144c7a 197 */
JMF 12:0071cb144c7a 198 static const uint64_t last4[16] =
JMF 12:0071cb144c7a 199 {
JMF 12:0071cb144c7a 200 0x0000, 0x1c20, 0x3840, 0x2460,
JMF 12:0071cb144c7a 201 0x7080, 0x6ca0, 0x48c0, 0x54e0,
JMF 12:0071cb144c7a 202 0xe100, 0xfd20, 0xd940, 0xc560,
JMF 12:0071cb144c7a 203 0x9180, 0x8da0, 0xa9c0, 0xb5e0
JMF 12:0071cb144c7a 204 };
JMF 12:0071cb144c7a 205
JMF 12:0071cb144c7a 206 /*
JMF 12:0071cb144c7a 207 * Sets output to x times H using the precomputed tables.
JMF 12:0071cb144c7a 208 * x and output are seen as elements of GF(2^128) as in [MGV].
JMF 12:0071cb144c7a 209 */
JMF 12:0071cb144c7a 210 static void gcm_mult( mbedtls_gcm_context *ctx, const unsigned char x[16],
JMF 12:0071cb144c7a 211 unsigned char output[16] )
JMF 12:0071cb144c7a 212 {
JMF 12:0071cb144c7a 213 int i = 0;
JMF 12:0071cb144c7a 214 unsigned char lo, hi, rem;
JMF 12:0071cb144c7a 215 uint64_t zh, zl;
JMF 12:0071cb144c7a 216
JMF 12:0071cb144c7a 217 #if defined(MBEDTLS_AESNI_C) && defined(MBEDTLS_HAVE_X86_64)
JMF 12:0071cb144c7a 218 if( mbedtls_aesni_has_support( MBEDTLS_AESNI_CLMUL ) ) {
JMF 12:0071cb144c7a 219 unsigned char h[16];
JMF 12:0071cb144c7a 220
JMF 12:0071cb144c7a 221 PUT_UINT32_BE( ctx->HH[8] >> 32, h, 0 );
JMF 12:0071cb144c7a 222 PUT_UINT32_BE( ctx->HH[8], h, 4 );
JMF 12:0071cb144c7a 223 PUT_UINT32_BE( ctx->HL[8] >> 32, h, 8 );
JMF 12:0071cb144c7a 224 PUT_UINT32_BE( ctx->HL[8], h, 12 );
JMF 12:0071cb144c7a 225
JMF 12:0071cb144c7a 226 mbedtls_aesni_gcm_mult( output, x, h );
JMF 12:0071cb144c7a 227 return;
JMF 12:0071cb144c7a 228 }
JMF 12:0071cb144c7a 229 #endif /* MBEDTLS_AESNI_C && MBEDTLS_HAVE_X86_64 */
JMF 12:0071cb144c7a 230
JMF 12:0071cb144c7a 231 lo = x[15] & 0xf;
JMF 12:0071cb144c7a 232
JMF 12:0071cb144c7a 233 zh = ctx->HH[lo];
JMF 12:0071cb144c7a 234 zl = ctx->HL[lo];
JMF 12:0071cb144c7a 235
JMF 12:0071cb144c7a 236 for( i = 15; i >= 0; i-- )
JMF 12:0071cb144c7a 237 {
JMF 12:0071cb144c7a 238 lo = x[i] & 0xf;
JMF 12:0071cb144c7a 239 hi = x[i] >> 4;
JMF 12:0071cb144c7a 240
JMF 12:0071cb144c7a 241 if( i != 15 )
JMF 12:0071cb144c7a 242 {
JMF 12:0071cb144c7a 243 rem = (unsigned char) zl & 0xf;
JMF 12:0071cb144c7a 244 zl = ( zh << 60 ) | ( zl >> 4 );
JMF 12:0071cb144c7a 245 zh = ( zh >> 4 );
JMF 12:0071cb144c7a 246 zh ^= (uint64_t) last4[rem] << 48;
JMF 12:0071cb144c7a 247 zh ^= ctx->HH[lo];
JMF 12:0071cb144c7a 248 zl ^= ctx->HL[lo];
JMF 12:0071cb144c7a 249
JMF 12:0071cb144c7a 250 }
JMF 12:0071cb144c7a 251
JMF 12:0071cb144c7a 252 rem = (unsigned char) zl & 0xf;
JMF 12:0071cb144c7a 253 zl = ( zh << 60 ) | ( zl >> 4 );
JMF 12:0071cb144c7a 254 zh = ( zh >> 4 );
JMF 12:0071cb144c7a 255 zh ^= (uint64_t) last4[rem] << 48;
JMF 12:0071cb144c7a 256 zh ^= ctx->HH[hi];
JMF 12:0071cb144c7a 257 zl ^= ctx->HL[hi];
JMF 12:0071cb144c7a 258 }
JMF 12:0071cb144c7a 259
JMF 12:0071cb144c7a 260 PUT_UINT32_BE( zh >> 32, output, 0 );
JMF 12:0071cb144c7a 261 PUT_UINT32_BE( zh, output, 4 );
JMF 12:0071cb144c7a 262 PUT_UINT32_BE( zl >> 32, output, 8 );
JMF 12:0071cb144c7a 263 PUT_UINT32_BE( zl, output, 12 );
JMF 12:0071cb144c7a 264 }
JMF 12:0071cb144c7a 265
JMF 12:0071cb144c7a 266 int mbedtls_gcm_starts( mbedtls_gcm_context *ctx,
JMF 12:0071cb144c7a 267 int mode,
JMF 12:0071cb144c7a 268 const unsigned char *iv,
JMF 12:0071cb144c7a 269 size_t iv_len,
JMF 12:0071cb144c7a 270 const unsigned char *add,
JMF 12:0071cb144c7a 271 size_t add_len )
JMF 12:0071cb144c7a 272 {
JMF 12:0071cb144c7a 273 int ret;
JMF 12:0071cb144c7a 274 unsigned char work_buf[16];
JMF 12:0071cb144c7a 275 size_t i;
JMF 12:0071cb144c7a 276 const unsigned char *p;
JMF 12:0071cb144c7a 277 size_t use_len, olen = 0;
JMF 12:0071cb144c7a 278
JMF 12:0071cb144c7a 279 /* IV and AD are limited to 2^64 bits, so 2^61 bytes */
JMF 12:0071cb144c7a 280 if( ( (uint64_t) iv_len ) >> 61 != 0 ||
JMF 12:0071cb144c7a 281 ( (uint64_t) add_len ) >> 61 != 0 )
JMF 12:0071cb144c7a 282 {
JMF 12:0071cb144c7a 283 return( MBEDTLS_ERR_GCM_BAD_INPUT );
JMF 12:0071cb144c7a 284 }
JMF 12:0071cb144c7a 285
JMF 12:0071cb144c7a 286 memset( ctx->y, 0x00, sizeof(ctx->y) );
JMF 12:0071cb144c7a 287 memset( ctx->buf, 0x00, sizeof(ctx->buf) );
JMF 12:0071cb144c7a 288
JMF 12:0071cb144c7a 289 ctx->mode = mode;
JMF 12:0071cb144c7a 290 ctx->len = 0;
JMF 12:0071cb144c7a 291 ctx->add_len = 0;
JMF 12:0071cb144c7a 292
JMF 12:0071cb144c7a 293 if( iv_len == 12 )
JMF 12:0071cb144c7a 294 {
JMF 12:0071cb144c7a 295 memcpy( ctx->y, iv, iv_len );
JMF 12:0071cb144c7a 296 ctx->y[15] = 1;
JMF 12:0071cb144c7a 297 }
JMF 12:0071cb144c7a 298 else
JMF 12:0071cb144c7a 299 {
JMF 12:0071cb144c7a 300 memset( work_buf, 0x00, 16 );
JMF 12:0071cb144c7a 301 PUT_UINT32_BE( iv_len * 8, work_buf, 12 );
JMF 12:0071cb144c7a 302
JMF 12:0071cb144c7a 303 p = iv;
JMF 12:0071cb144c7a 304 while( iv_len > 0 )
JMF 12:0071cb144c7a 305 {
JMF 12:0071cb144c7a 306 use_len = ( iv_len < 16 ) ? iv_len : 16;
JMF 12:0071cb144c7a 307
JMF 12:0071cb144c7a 308 for( i = 0; i < use_len; i++ )
JMF 12:0071cb144c7a 309 ctx->y[i] ^= p[i];
JMF 12:0071cb144c7a 310
JMF 12:0071cb144c7a 311 gcm_mult( ctx, ctx->y, ctx->y );
JMF 12:0071cb144c7a 312
JMF 12:0071cb144c7a 313 iv_len -= use_len;
JMF 12:0071cb144c7a 314 p += use_len;
JMF 12:0071cb144c7a 315 }
JMF 12:0071cb144c7a 316
JMF 12:0071cb144c7a 317 for( i = 0; i < 16; i++ )
JMF 12:0071cb144c7a 318 ctx->y[i] ^= work_buf[i];
JMF 12:0071cb144c7a 319
JMF 12:0071cb144c7a 320 gcm_mult( ctx, ctx->y, ctx->y );
JMF 12:0071cb144c7a 321 }
JMF 12:0071cb144c7a 322
JMF 12:0071cb144c7a 323 if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->y, 16, ctx->base_ectr,
JMF 12:0071cb144c7a 324 &olen ) ) != 0 )
JMF 12:0071cb144c7a 325 {
JMF 12:0071cb144c7a 326 return( ret );
JMF 12:0071cb144c7a 327 }
JMF 12:0071cb144c7a 328
JMF 12:0071cb144c7a 329 ctx->add_len = add_len;
JMF 12:0071cb144c7a 330 p = add;
JMF 12:0071cb144c7a 331 while( add_len > 0 )
JMF 12:0071cb144c7a 332 {
JMF 12:0071cb144c7a 333 use_len = ( add_len < 16 ) ? add_len : 16;
JMF 12:0071cb144c7a 334
JMF 12:0071cb144c7a 335 for( i = 0; i < use_len; i++ )
JMF 12:0071cb144c7a 336 ctx->buf[i] ^= p[i];
JMF 12:0071cb144c7a 337
JMF 12:0071cb144c7a 338 gcm_mult( ctx, ctx->buf, ctx->buf );
JMF 12:0071cb144c7a 339
JMF 12:0071cb144c7a 340 add_len -= use_len;
JMF 12:0071cb144c7a 341 p += use_len;
JMF 12:0071cb144c7a 342 }
JMF 12:0071cb144c7a 343
JMF 12:0071cb144c7a 344 return( 0 );
JMF 12:0071cb144c7a 345 }
JMF 12:0071cb144c7a 346
JMF 12:0071cb144c7a 347 int mbedtls_gcm_update( mbedtls_gcm_context *ctx,
JMF 12:0071cb144c7a 348 size_t length,
JMF 12:0071cb144c7a 349 const unsigned char *input,
JMF 12:0071cb144c7a 350 unsigned char *output )
JMF 12:0071cb144c7a 351 {
JMF 12:0071cb144c7a 352 int ret;
JMF 12:0071cb144c7a 353 unsigned char ectr[16];
JMF 12:0071cb144c7a 354 size_t i;
JMF 12:0071cb144c7a 355 const unsigned char *p;
JMF 12:0071cb144c7a 356 unsigned char *out_p = output;
JMF 12:0071cb144c7a 357 size_t use_len, olen = 0;
JMF 12:0071cb144c7a 358
JMF 12:0071cb144c7a 359 if( output > input && (size_t) ( output - input ) < length )
JMF 12:0071cb144c7a 360 return( MBEDTLS_ERR_GCM_BAD_INPUT );
JMF 12:0071cb144c7a 361
JMF 12:0071cb144c7a 362 /* Total length is restricted to 2^39 - 256 bits, ie 2^36 - 2^5 bytes
JMF 12:0071cb144c7a 363 * Also check for possible overflow */
JMF 12:0071cb144c7a 364 if( ctx->len + length < ctx->len ||
JMF 12:0071cb144c7a 365 (uint64_t) ctx->len + length > 0xFFFFFFFE0ull )
JMF 12:0071cb144c7a 366 {
JMF 12:0071cb144c7a 367 return( MBEDTLS_ERR_GCM_BAD_INPUT );
JMF 12:0071cb144c7a 368 }
JMF 12:0071cb144c7a 369
JMF 12:0071cb144c7a 370 ctx->len += length;
JMF 12:0071cb144c7a 371
JMF 12:0071cb144c7a 372 p = input;
JMF 12:0071cb144c7a 373 while( length > 0 )
JMF 12:0071cb144c7a 374 {
JMF 12:0071cb144c7a 375 use_len = ( length < 16 ) ? length : 16;
JMF 12:0071cb144c7a 376
JMF 12:0071cb144c7a 377 for( i = 16; i > 12; i-- )
JMF 12:0071cb144c7a 378 if( ++ctx->y[i - 1] != 0 )
JMF 12:0071cb144c7a 379 break;
JMF 12:0071cb144c7a 380
JMF 12:0071cb144c7a 381 if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->y, 16, ectr,
JMF 12:0071cb144c7a 382 &olen ) ) != 0 )
JMF 12:0071cb144c7a 383 {
JMF 12:0071cb144c7a 384 return( ret );
JMF 12:0071cb144c7a 385 }
JMF 12:0071cb144c7a 386
JMF 12:0071cb144c7a 387 for( i = 0; i < use_len; i++ )
JMF 12:0071cb144c7a 388 {
JMF 12:0071cb144c7a 389 if( ctx->mode == MBEDTLS_GCM_DECRYPT )
JMF 12:0071cb144c7a 390 ctx->buf[i] ^= p[i];
JMF 12:0071cb144c7a 391 out_p[i] = ectr[i] ^ p[i];
JMF 12:0071cb144c7a 392 if( ctx->mode == MBEDTLS_GCM_ENCRYPT )
JMF 12:0071cb144c7a 393 ctx->buf[i] ^= out_p[i];
JMF 12:0071cb144c7a 394 }
JMF 12:0071cb144c7a 395
JMF 12:0071cb144c7a 396 gcm_mult( ctx, ctx->buf, ctx->buf );
JMF 12:0071cb144c7a 397
JMF 12:0071cb144c7a 398 length -= use_len;
JMF 12:0071cb144c7a 399 p += use_len;
JMF 12:0071cb144c7a 400 out_p += use_len;
JMF 12:0071cb144c7a 401 }
JMF 12:0071cb144c7a 402
JMF 12:0071cb144c7a 403 return( 0 );
JMF 12:0071cb144c7a 404 }
JMF 12:0071cb144c7a 405
JMF 12:0071cb144c7a 406 int mbedtls_gcm_finish( mbedtls_gcm_context *ctx,
JMF 12:0071cb144c7a 407 unsigned char *tag,
JMF 12:0071cb144c7a 408 size_t tag_len )
JMF 12:0071cb144c7a 409 {
JMF 12:0071cb144c7a 410 unsigned char work_buf[16];
JMF 12:0071cb144c7a 411 size_t i;
JMF 12:0071cb144c7a 412 uint64_t orig_len = ctx->len * 8;
JMF 12:0071cb144c7a 413 uint64_t orig_add_len = ctx->add_len * 8;
JMF 12:0071cb144c7a 414
JMF 12:0071cb144c7a 415 if( tag_len > 16 || tag_len < 4 )
JMF 12:0071cb144c7a 416 return( MBEDTLS_ERR_GCM_BAD_INPUT );
JMF 12:0071cb144c7a 417
JMF 12:0071cb144c7a 418 if( tag_len != 0 )
JMF 12:0071cb144c7a 419 memcpy( tag, ctx->base_ectr, tag_len );
JMF 12:0071cb144c7a 420
JMF 12:0071cb144c7a 421 if( orig_len || orig_add_len )
JMF 12:0071cb144c7a 422 {
JMF 12:0071cb144c7a 423 memset( work_buf, 0x00, 16 );
JMF 12:0071cb144c7a 424
JMF 12:0071cb144c7a 425 PUT_UINT32_BE( ( orig_add_len >> 32 ), work_buf, 0 );
JMF 12:0071cb144c7a 426 PUT_UINT32_BE( ( orig_add_len ), work_buf, 4 );
JMF 12:0071cb144c7a 427 PUT_UINT32_BE( ( orig_len >> 32 ), work_buf, 8 );
JMF 12:0071cb144c7a 428 PUT_UINT32_BE( ( orig_len ), work_buf, 12 );
JMF 12:0071cb144c7a 429
JMF 12:0071cb144c7a 430 for( i = 0; i < 16; i++ )
JMF 12:0071cb144c7a 431 ctx->buf[i] ^= work_buf[i];
JMF 12:0071cb144c7a 432
JMF 12:0071cb144c7a 433 gcm_mult( ctx, ctx->buf, ctx->buf );
JMF 12:0071cb144c7a 434
JMF 12:0071cb144c7a 435 for( i = 0; i < tag_len; i++ )
JMF 12:0071cb144c7a 436 tag[i] ^= ctx->buf[i];
JMF 12:0071cb144c7a 437 }
JMF 12:0071cb144c7a 438
JMF 12:0071cb144c7a 439 return( 0 );
JMF 12:0071cb144c7a 440 }
JMF 12:0071cb144c7a 441
JMF 12:0071cb144c7a 442 int mbedtls_gcm_crypt_and_tag( mbedtls_gcm_context *ctx,
JMF 12:0071cb144c7a 443 int mode,
JMF 12:0071cb144c7a 444 size_t length,
JMF 12:0071cb144c7a 445 const unsigned char *iv,
JMF 12:0071cb144c7a 446 size_t iv_len,
JMF 12:0071cb144c7a 447 const unsigned char *add,
JMF 12:0071cb144c7a 448 size_t add_len,
JMF 12:0071cb144c7a 449 const unsigned char *input,
JMF 12:0071cb144c7a 450 unsigned char *output,
JMF 12:0071cb144c7a 451 size_t tag_len,
JMF 12:0071cb144c7a 452 unsigned char *tag )
JMF 12:0071cb144c7a 453 {
JMF 12:0071cb144c7a 454 int ret;
JMF 12:0071cb144c7a 455
JMF 12:0071cb144c7a 456 if( ( ret = mbedtls_gcm_starts( ctx, mode, iv, iv_len, add, add_len ) ) != 0 )
JMF 12:0071cb144c7a 457 return( ret );
JMF 12:0071cb144c7a 458
JMF 12:0071cb144c7a 459 if( ( ret = mbedtls_gcm_update( ctx, length, input, output ) ) != 0 )
JMF 12:0071cb144c7a 460 return( ret );
JMF 12:0071cb144c7a 461
JMF 12:0071cb144c7a 462 if( ( ret = mbedtls_gcm_finish( ctx, tag, tag_len ) ) != 0 )
JMF 12:0071cb144c7a 463 return( ret );
JMF 12:0071cb144c7a 464
JMF 12:0071cb144c7a 465 return( 0 );
JMF 12:0071cb144c7a 466 }
JMF 12:0071cb144c7a 467
JMF 12:0071cb144c7a 468 int mbedtls_gcm_auth_decrypt( mbedtls_gcm_context *ctx,
JMF 12:0071cb144c7a 469 size_t length,
JMF 12:0071cb144c7a 470 const unsigned char *iv,
JMF 12:0071cb144c7a 471 size_t iv_len,
JMF 12:0071cb144c7a 472 const unsigned char *add,
JMF 12:0071cb144c7a 473 size_t add_len,
JMF 12:0071cb144c7a 474 const unsigned char *tag,
JMF 12:0071cb144c7a 475 size_t tag_len,
JMF 12:0071cb144c7a 476 const unsigned char *input,
JMF 12:0071cb144c7a 477 unsigned char *output )
JMF 12:0071cb144c7a 478 {
JMF 12:0071cb144c7a 479 int ret;
JMF 12:0071cb144c7a 480 unsigned char check_tag[16];
JMF 12:0071cb144c7a 481 size_t i;
JMF 12:0071cb144c7a 482 int diff;
JMF 12:0071cb144c7a 483
JMF 12:0071cb144c7a 484 if( ( ret = mbedtls_gcm_crypt_and_tag( ctx, MBEDTLS_GCM_DECRYPT, length,
JMF 12:0071cb144c7a 485 iv, iv_len, add, add_len,
JMF 12:0071cb144c7a 486 input, output, tag_len, check_tag ) ) != 0 )
JMF 12:0071cb144c7a 487 {
JMF 12:0071cb144c7a 488 return( ret );
JMF 12:0071cb144c7a 489 }
JMF 12:0071cb144c7a 490
JMF 12:0071cb144c7a 491 /* Check tag in "constant-time" */
JMF 12:0071cb144c7a 492 for( diff = 0, i = 0; i < tag_len; i++ )
JMF 12:0071cb144c7a 493 diff |= tag[i] ^ check_tag[i];
JMF 12:0071cb144c7a 494
JMF 12:0071cb144c7a 495 if( diff != 0 )
JMF 12:0071cb144c7a 496 {
JMF 12:0071cb144c7a 497 mbedtls_zeroize( output, length );
JMF 12:0071cb144c7a 498 return( MBEDTLS_ERR_GCM_AUTH_FAILED );
JMF 12:0071cb144c7a 499 }
JMF 12:0071cb144c7a 500
JMF 12:0071cb144c7a 501 return( 0 );
JMF 12:0071cb144c7a 502 }
JMF 12:0071cb144c7a 503
JMF 12:0071cb144c7a 504 void mbedtls_gcm_free( mbedtls_gcm_context *ctx )
JMF 12:0071cb144c7a 505 {
JMF 12:0071cb144c7a 506 mbedtls_cipher_free( &ctx->cipher_ctx );
JMF 12:0071cb144c7a 507 mbedtls_zeroize( ctx, sizeof( mbedtls_gcm_context ) );
JMF 12:0071cb144c7a 508 }
JMF 12:0071cb144c7a 509
JMF 12:0071cb144c7a 510 #if defined(MBEDTLS_SELF_TEST) && defined(MBEDTLS_AES_C)
JMF 12:0071cb144c7a 511 /*
JMF 12:0071cb144c7a 512 * AES-GCM test vectors from:
JMF 12:0071cb144c7a 513 *
JMF 12:0071cb144c7a 514 * http://csrc.nist.gov/groups/STM/cavp/documents/mac/gcmtestvectors.zip
JMF 12:0071cb144c7a 515 */
JMF 12:0071cb144c7a 516 #define MAX_TESTS 6
JMF 12:0071cb144c7a 517
JMF 12:0071cb144c7a 518 static const int key_index[MAX_TESTS] =
JMF 12:0071cb144c7a 519 { 0, 0, 1, 1, 1, 1 };
JMF 12:0071cb144c7a 520
JMF 12:0071cb144c7a 521 static const unsigned char key[MAX_TESTS][32] =
JMF 12:0071cb144c7a 522 {
JMF 12:0071cb144c7a 523 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
JMF 12:0071cb144c7a 524 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
JMF 12:0071cb144c7a 525 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
JMF 12:0071cb144c7a 526 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
JMF 12:0071cb144c7a 527 { 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c,
JMF 12:0071cb144c7a 528 0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08,
JMF 12:0071cb144c7a 529 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c,
JMF 12:0071cb144c7a 530 0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08 },
JMF 12:0071cb144c7a 531 };
JMF 12:0071cb144c7a 532
JMF 12:0071cb144c7a 533 static const size_t iv_len[MAX_TESTS] =
JMF 12:0071cb144c7a 534 { 12, 12, 12, 12, 8, 60 };
JMF 12:0071cb144c7a 535
JMF 12:0071cb144c7a 536 static const int iv_index[MAX_TESTS] =
JMF 12:0071cb144c7a 537 { 0, 0, 1, 1, 1, 2 };
JMF 12:0071cb144c7a 538
JMF 12:0071cb144c7a 539 static const unsigned char iv[MAX_TESTS][64] =
JMF 12:0071cb144c7a 540 {
JMF 12:0071cb144c7a 541 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
JMF 12:0071cb144c7a 542 0x00, 0x00, 0x00, 0x00 },
JMF 12:0071cb144c7a 543 { 0xca, 0xfe, 0xba, 0xbe, 0xfa, 0xce, 0xdb, 0xad,
JMF 12:0071cb144c7a 544 0xde, 0xca, 0xf8, 0x88 },
JMF 12:0071cb144c7a 545 { 0x93, 0x13, 0x22, 0x5d, 0xf8, 0x84, 0x06, 0xe5,
JMF 12:0071cb144c7a 546 0x55, 0x90, 0x9c, 0x5a, 0xff, 0x52, 0x69, 0xaa,
JMF 12:0071cb144c7a 547 0x6a, 0x7a, 0x95, 0x38, 0x53, 0x4f, 0x7d, 0xa1,
JMF 12:0071cb144c7a 548 0xe4, 0xc3, 0x03, 0xd2, 0xa3, 0x18, 0xa7, 0x28,
JMF 12:0071cb144c7a 549 0xc3, 0xc0, 0xc9, 0x51, 0x56, 0x80, 0x95, 0x39,
JMF 12:0071cb144c7a 550 0xfc, 0xf0, 0xe2, 0x42, 0x9a, 0x6b, 0x52, 0x54,
JMF 12:0071cb144c7a 551 0x16, 0xae, 0xdb, 0xf5, 0xa0, 0xde, 0x6a, 0x57,
JMF 12:0071cb144c7a 552 0xa6, 0x37, 0xb3, 0x9b },
JMF 12:0071cb144c7a 553 };
JMF 12:0071cb144c7a 554
JMF 12:0071cb144c7a 555 static const size_t add_len[MAX_TESTS] =
JMF 12:0071cb144c7a 556 { 0, 0, 0, 20, 20, 20 };
JMF 12:0071cb144c7a 557
JMF 12:0071cb144c7a 558 static const int add_index[MAX_TESTS] =
JMF 12:0071cb144c7a 559 { 0, 0, 0, 1, 1, 1 };
JMF 12:0071cb144c7a 560
JMF 12:0071cb144c7a 561 static const unsigned char additional[MAX_TESTS][64] =
JMF 12:0071cb144c7a 562 {
JMF 12:0071cb144c7a 563 { 0x00 },
JMF 12:0071cb144c7a 564 { 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef,
JMF 12:0071cb144c7a 565 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef,
JMF 12:0071cb144c7a 566 0xab, 0xad, 0xda, 0xd2 },
JMF 12:0071cb144c7a 567 };
JMF 12:0071cb144c7a 568
JMF 12:0071cb144c7a 569 static const size_t pt_len[MAX_TESTS] =
JMF 12:0071cb144c7a 570 { 0, 16, 64, 60, 60, 60 };
JMF 12:0071cb144c7a 571
JMF 12:0071cb144c7a 572 static const int pt_index[MAX_TESTS] =
JMF 12:0071cb144c7a 573 { 0, 0, 1, 1, 1, 1 };
JMF 12:0071cb144c7a 574
JMF 12:0071cb144c7a 575 static const unsigned char pt[MAX_TESTS][64] =
JMF 12:0071cb144c7a 576 {
JMF 12:0071cb144c7a 577 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
JMF 12:0071cb144c7a 578 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
JMF 12:0071cb144c7a 579 { 0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,
JMF 12:0071cb144c7a 580 0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,
JMF 12:0071cb144c7a 581 0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,
JMF 12:0071cb144c7a 582 0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,
JMF 12:0071cb144c7a 583 0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,
JMF 12:0071cb144c7a 584 0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,
JMF 12:0071cb144c7a 585 0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,
JMF 12:0071cb144c7a 586 0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55 },
JMF 12:0071cb144c7a 587 };
JMF 12:0071cb144c7a 588
JMF 12:0071cb144c7a 589 static const unsigned char ct[MAX_TESTS * 3][64] =
JMF 12:0071cb144c7a 590 {
JMF 12:0071cb144c7a 591 { 0x00 },
JMF 12:0071cb144c7a 592 { 0x03, 0x88, 0xda, 0xce, 0x60, 0xb6, 0xa3, 0x92,
JMF 12:0071cb144c7a 593 0xf3, 0x28, 0xc2, 0xb9, 0x71, 0xb2, 0xfe, 0x78 },
JMF 12:0071cb144c7a 594 { 0x42, 0x83, 0x1e, 0xc2, 0x21, 0x77, 0x74, 0x24,
JMF 12:0071cb144c7a 595 0x4b, 0x72, 0x21, 0xb7, 0x84, 0xd0, 0xd4, 0x9c,
JMF 12:0071cb144c7a 596 0xe3, 0xaa, 0x21, 0x2f, 0x2c, 0x02, 0xa4, 0xe0,
JMF 12:0071cb144c7a 597 0x35, 0xc1, 0x7e, 0x23, 0x29, 0xac, 0xa1, 0x2e,
JMF 12:0071cb144c7a 598 0x21, 0xd5, 0x14, 0xb2, 0x54, 0x66, 0x93, 0x1c,
JMF 12:0071cb144c7a 599 0x7d, 0x8f, 0x6a, 0x5a, 0xac, 0x84, 0xaa, 0x05,
JMF 12:0071cb144c7a 600 0x1b, 0xa3, 0x0b, 0x39, 0x6a, 0x0a, 0xac, 0x97,
JMF 12:0071cb144c7a 601 0x3d, 0x58, 0xe0, 0x91, 0x47, 0x3f, 0x59, 0x85 },
JMF 12:0071cb144c7a 602 { 0x42, 0x83, 0x1e, 0xc2, 0x21, 0x77, 0x74, 0x24,
JMF 12:0071cb144c7a 603 0x4b, 0x72, 0x21, 0xb7, 0x84, 0xd0, 0xd4, 0x9c,
JMF 12:0071cb144c7a 604 0xe3, 0xaa, 0x21, 0x2f, 0x2c, 0x02, 0xa4, 0xe0,
JMF 12:0071cb144c7a 605 0x35, 0xc1, 0x7e, 0x23, 0x29, 0xac, 0xa1, 0x2e,
JMF 12:0071cb144c7a 606 0x21, 0xd5, 0x14, 0xb2, 0x54, 0x66, 0x93, 0x1c,
JMF 12:0071cb144c7a 607 0x7d, 0x8f, 0x6a, 0x5a, 0xac, 0x84, 0xaa, 0x05,
JMF 12:0071cb144c7a 608 0x1b, 0xa3, 0x0b, 0x39, 0x6a, 0x0a, 0xac, 0x97,
JMF 12:0071cb144c7a 609 0x3d, 0x58, 0xe0, 0x91 },
JMF 12:0071cb144c7a 610 { 0x61, 0x35, 0x3b, 0x4c, 0x28, 0x06, 0x93, 0x4a,
JMF 12:0071cb144c7a 611 0x77, 0x7f, 0xf5, 0x1f, 0xa2, 0x2a, 0x47, 0x55,
JMF 12:0071cb144c7a 612 0x69, 0x9b, 0x2a, 0x71, 0x4f, 0xcd, 0xc6, 0xf8,
JMF 12:0071cb144c7a 613 0x37, 0x66, 0xe5, 0xf9, 0x7b, 0x6c, 0x74, 0x23,
JMF 12:0071cb144c7a 614 0x73, 0x80, 0x69, 0x00, 0xe4, 0x9f, 0x24, 0xb2,
JMF 12:0071cb144c7a 615 0x2b, 0x09, 0x75, 0x44, 0xd4, 0x89, 0x6b, 0x42,
JMF 12:0071cb144c7a 616 0x49, 0x89, 0xb5, 0xe1, 0xeb, 0xac, 0x0f, 0x07,
JMF 12:0071cb144c7a 617 0xc2, 0x3f, 0x45, 0x98 },
JMF 12:0071cb144c7a 618 { 0x8c, 0xe2, 0x49, 0x98, 0x62, 0x56, 0x15, 0xb6,
JMF 12:0071cb144c7a 619 0x03, 0xa0, 0x33, 0xac, 0xa1, 0x3f, 0xb8, 0x94,
JMF 12:0071cb144c7a 620 0xbe, 0x91, 0x12, 0xa5, 0xc3, 0xa2, 0x11, 0xa8,
JMF 12:0071cb144c7a 621 0xba, 0x26, 0x2a, 0x3c, 0xca, 0x7e, 0x2c, 0xa7,
JMF 12:0071cb144c7a 622 0x01, 0xe4, 0xa9, 0xa4, 0xfb, 0xa4, 0x3c, 0x90,
JMF 12:0071cb144c7a 623 0xcc, 0xdc, 0xb2, 0x81, 0xd4, 0x8c, 0x7c, 0x6f,
JMF 12:0071cb144c7a 624 0xd6, 0x28, 0x75, 0xd2, 0xac, 0xa4, 0x17, 0x03,
JMF 12:0071cb144c7a 625 0x4c, 0x34, 0xae, 0xe5 },
JMF 12:0071cb144c7a 626 { 0x00 },
JMF 12:0071cb144c7a 627 { 0x98, 0xe7, 0x24, 0x7c, 0x07, 0xf0, 0xfe, 0x41,
JMF 12:0071cb144c7a 628 0x1c, 0x26, 0x7e, 0x43, 0x84, 0xb0, 0xf6, 0x00 },
JMF 12:0071cb144c7a 629 { 0x39, 0x80, 0xca, 0x0b, 0x3c, 0x00, 0xe8, 0x41,
JMF 12:0071cb144c7a 630 0xeb, 0x06, 0xfa, 0xc4, 0x87, 0x2a, 0x27, 0x57,
JMF 12:0071cb144c7a 631 0x85, 0x9e, 0x1c, 0xea, 0xa6, 0xef, 0xd9, 0x84,
JMF 12:0071cb144c7a 632 0x62, 0x85, 0x93, 0xb4, 0x0c, 0xa1, 0xe1, 0x9c,
JMF 12:0071cb144c7a 633 0x7d, 0x77, 0x3d, 0x00, 0xc1, 0x44, 0xc5, 0x25,
JMF 12:0071cb144c7a 634 0xac, 0x61, 0x9d, 0x18, 0xc8, 0x4a, 0x3f, 0x47,
JMF 12:0071cb144c7a 635 0x18, 0xe2, 0x44, 0x8b, 0x2f, 0xe3, 0x24, 0xd9,
JMF 12:0071cb144c7a 636 0xcc, 0xda, 0x27, 0x10, 0xac, 0xad, 0xe2, 0x56 },
JMF 12:0071cb144c7a 637 { 0x39, 0x80, 0xca, 0x0b, 0x3c, 0x00, 0xe8, 0x41,
JMF 12:0071cb144c7a 638 0xeb, 0x06, 0xfa, 0xc4, 0x87, 0x2a, 0x27, 0x57,
JMF 12:0071cb144c7a 639 0x85, 0x9e, 0x1c, 0xea, 0xa6, 0xef, 0xd9, 0x84,
JMF 12:0071cb144c7a 640 0x62, 0x85, 0x93, 0xb4, 0x0c, 0xa1, 0xe1, 0x9c,
JMF 12:0071cb144c7a 641 0x7d, 0x77, 0x3d, 0x00, 0xc1, 0x44, 0xc5, 0x25,
JMF 12:0071cb144c7a 642 0xac, 0x61, 0x9d, 0x18, 0xc8, 0x4a, 0x3f, 0x47,
JMF 12:0071cb144c7a 643 0x18, 0xe2, 0x44, 0x8b, 0x2f, 0xe3, 0x24, 0xd9,
JMF 12:0071cb144c7a 644 0xcc, 0xda, 0x27, 0x10 },
JMF 12:0071cb144c7a 645 { 0x0f, 0x10, 0xf5, 0x99, 0xae, 0x14, 0xa1, 0x54,
JMF 12:0071cb144c7a 646 0xed, 0x24, 0xb3, 0x6e, 0x25, 0x32, 0x4d, 0xb8,
JMF 12:0071cb144c7a 647 0xc5, 0x66, 0x63, 0x2e, 0xf2, 0xbb, 0xb3, 0x4f,
JMF 12:0071cb144c7a 648 0x83, 0x47, 0x28, 0x0f, 0xc4, 0x50, 0x70, 0x57,
JMF 12:0071cb144c7a 649 0xfd, 0xdc, 0x29, 0xdf, 0x9a, 0x47, 0x1f, 0x75,
JMF 12:0071cb144c7a 650 0xc6, 0x65, 0x41, 0xd4, 0xd4, 0xda, 0xd1, 0xc9,
JMF 12:0071cb144c7a 651 0xe9, 0x3a, 0x19, 0xa5, 0x8e, 0x8b, 0x47, 0x3f,
JMF 12:0071cb144c7a 652 0xa0, 0xf0, 0x62, 0xf7 },
JMF 12:0071cb144c7a 653 { 0xd2, 0x7e, 0x88, 0x68, 0x1c, 0xe3, 0x24, 0x3c,
JMF 12:0071cb144c7a 654 0x48, 0x30, 0x16, 0x5a, 0x8f, 0xdc, 0xf9, 0xff,
JMF 12:0071cb144c7a 655 0x1d, 0xe9, 0xa1, 0xd8, 0xe6, 0xb4, 0x47, 0xef,
JMF 12:0071cb144c7a 656 0x6e, 0xf7, 0xb7, 0x98, 0x28, 0x66, 0x6e, 0x45,
JMF 12:0071cb144c7a 657 0x81, 0xe7, 0x90, 0x12, 0xaf, 0x34, 0xdd, 0xd9,
JMF 12:0071cb144c7a 658 0xe2, 0xf0, 0x37, 0x58, 0x9b, 0x29, 0x2d, 0xb3,
JMF 12:0071cb144c7a 659 0xe6, 0x7c, 0x03, 0x67, 0x45, 0xfa, 0x22, 0xe7,
JMF 12:0071cb144c7a 660 0xe9, 0xb7, 0x37, 0x3b },
JMF 12:0071cb144c7a 661 { 0x00 },
JMF 12:0071cb144c7a 662 { 0xce, 0xa7, 0x40, 0x3d, 0x4d, 0x60, 0x6b, 0x6e,
JMF 12:0071cb144c7a 663 0x07, 0x4e, 0xc5, 0xd3, 0xba, 0xf3, 0x9d, 0x18 },
JMF 12:0071cb144c7a 664 { 0x52, 0x2d, 0xc1, 0xf0, 0x99, 0x56, 0x7d, 0x07,
JMF 12:0071cb144c7a 665 0xf4, 0x7f, 0x37, 0xa3, 0x2a, 0x84, 0x42, 0x7d,
JMF 12:0071cb144c7a 666 0x64, 0x3a, 0x8c, 0xdc, 0xbf, 0xe5, 0xc0, 0xc9,
JMF 12:0071cb144c7a 667 0x75, 0x98, 0xa2, 0xbd, 0x25, 0x55, 0xd1, 0xaa,
JMF 12:0071cb144c7a 668 0x8c, 0xb0, 0x8e, 0x48, 0x59, 0x0d, 0xbb, 0x3d,
JMF 12:0071cb144c7a 669 0xa7, 0xb0, 0x8b, 0x10, 0x56, 0x82, 0x88, 0x38,
JMF 12:0071cb144c7a 670 0xc5, 0xf6, 0x1e, 0x63, 0x93, 0xba, 0x7a, 0x0a,
JMF 12:0071cb144c7a 671 0xbc, 0xc9, 0xf6, 0x62, 0x89, 0x80, 0x15, 0xad },
JMF 12:0071cb144c7a 672 { 0x52, 0x2d, 0xc1, 0xf0, 0x99, 0x56, 0x7d, 0x07,
JMF 12:0071cb144c7a 673 0xf4, 0x7f, 0x37, 0xa3, 0x2a, 0x84, 0x42, 0x7d,
JMF 12:0071cb144c7a 674 0x64, 0x3a, 0x8c, 0xdc, 0xbf, 0xe5, 0xc0, 0xc9,
JMF 12:0071cb144c7a 675 0x75, 0x98, 0xa2, 0xbd, 0x25, 0x55, 0xd1, 0xaa,
JMF 12:0071cb144c7a 676 0x8c, 0xb0, 0x8e, 0x48, 0x59, 0x0d, 0xbb, 0x3d,
JMF 12:0071cb144c7a 677 0xa7, 0xb0, 0x8b, 0x10, 0x56, 0x82, 0x88, 0x38,
JMF 12:0071cb144c7a 678 0xc5, 0xf6, 0x1e, 0x63, 0x93, 0xba, 0x7a, 0x0a,
JMF 12:0071cb144c7a 679 0xbc, 0xc9, 0xf6, 0x62 },
JMF 12:0071cb144c7a 680 { 0xc3, 0x76, 0x2d, 0xf1, 0xca, 0x78, 0x7d, 0x32,
JMF 12:0071cb144c7a 681 0xae, 0x47, 0xc1, 0x3b, 0xf1, 0x98, 0x44, 0xcb,
JMF 12:0071cb144c7a 682 0xaf, 0x1a, 0xe1, 0x4d, 0x0b, 0x97, 0x6a, 0xfa,
JMF 12:0071cb144c7a 683 0xc5, 0x2f, 0xf7, 0xd7, 0x9b, 0xba, 0x9d, 0xe0,
JMF 12:0071cb144c7a 684 0xfe, 0xb5, 0x82, 0xd3, 0x39, 0x34, 0xa4, 0xf0,
JMF 12:0071cb144c7a 685 0x95, 0x4c, 0xc2, 0x36, 0x3b, 0xc7, 0x3f, 0x78,
JMF 12:0071cb144c7a 686 0x62, 0xac, 0x43, 0x0e, 0x64, 0xab, 0xe4, 0x99,
JMF 12:0071cb144c7a 687 0xf4, 0x7c, 0x9b, 0x1f },
JMF 12:0071cb144c7a 688 { 0x5a, 0x8d, 0xef, 0x2f, 0x0c, 0x9e, 0x53, 0xf1,
JMF 12:0071cb144c7a 689 0xf7, 0x5d, 0x78, 0x53, 0x65, 0x9e, 0x2a, 0x20,
JMF 12:0071cb144c7a 690 0xee, 0xb2, 0xb2, 0x2a, 0xaf, 0xde, 0x64, 0x19,
JMF 12:0071cb144c7a 691 0xa0, 0x58, 0xab, 0x4f, 0x6f, 0x74, 0x6b, 0xf4,
JMF 12:0071cb144c7a 692 0x0f, 0xc0, 0xc3, 0xb7, 0x80, 0xf2, 0x44, 0x45,
JMF 12:0071cb144c7a 693 0x2d, 0xa3, 0xeb, 0xf1, 0xc5, 0xd8, 0x2c, 0xde,
JMF 12:0071cb144c7a 694 0xa2, 0x41, 0x89, 0x97, 0x20, 0x0e, 0xf8, 0x2e,
JMF 12:0071cb144c7a 695 0x44, 0xae, 0x7e, 0x3f },
JMF 12:0071cb144c7a 696 };
JMF 12:0071cb144c7a 697
JMF 12:0071cb144c7a 698 static const unsigned char tag[MAX_TESTS * 3][16] =
JMF 12:0071cb144c7a 699 {
JMF 12:0071cb144c7a 700 { 0x58, 0xe2, 0xfc, 0xce, 0xfa, 0x7e, 0x30, 0x61,
JMF 12:0071cb144c7a 701 0x36, 0x7f, 0x1d, 0x57, 0xa4, 0xe7, 0x45, 0x5a },
JMF 12:0071cb144c7a 702 { 0xab, 0x6e, 0x47, 0xd4, 0x2c, 0xec, 0x13, 0xbd,
JMF 12:0071cb144c7a 703 0xf5, 0x3a, 0x67, 0xb2, 0x12, 0x57, 0xbd, 0xdf },
JMF 12:0071cb144c7a 704 { 0x4d, 0x5c, 0x2a, 0xf3, 0x27, 0xcd, 0x64, 0xa6,
JMF 12:0071cb144c7a 705 0x2c, 0xf3, 0x5a, 0xbd, 0x2b, 0xa6, 0xfa, 0xb4 },
JMF 12:0071cb144c7a 706 { 0x5b, 0xc9, 0x4f, 0xbc, 0x32, 0x21, 0xa5, 0xdb,
JMF 12:0071cb144c7a 707 0x94, 0xfa, 0xe9, 0x5a, 0xe7, 0x12, 0x1a, 0x47 },
JMF 12:0071cb144c7a 708 { 0x36, 0x12, 0xd2, 0xe7, 0x9e, 0x3b, 0x07, 0x85,
JMF 12:0071cb144c7a 709 0x56, 0x1b, 0xe1, 0x4a, 0xac, 0xa2, 0xfc, 0xcb },
JMF 12:0071cb144c7a 710 { 0x61, 0x9c, 0xc5, 0xae, 0xff, 0xfe, 0x0b, 0xfa,
JMF 12:0071cb144c7a 711 0x46, 0x2a, 0xf4, 0x3c, 0x16, 0x99, 0xd0, 0x50 },
JMF 12:0071cb144c7a 712 { 0xcd, 0x33, 0xb2, 0x8a, 0xc7, 0x73, 0xf7, 0x4b,
JMF 12:0071cb144c7a 713 0xa0, 0x0e, 0xd1, 0xf3, 0x12, 0x57, 0x24, 0x35 },
JMF 12:0071cb144c7a 714 { 0x2f, 0xf5, 0x8d, 0x80, 0x03, 0x39, 0x27, 0xab,
JMF 12:0071cb144c7a 715 0x8e, 0xf4, 0xd4, 0x58, 0x75, 0x14, 0xf0, 0xfb },
JMF 12:0071cb144c7a 716 { 0x99, 0x24, 0xa7, 0xc8, 0x58, 0x73, 0x36, 0xbf,
JMF 12:0071cb144c7a 717 0xb1, 0x18, 0x02, 0x4d, 0xb8, 0x67, 0x4a, 0x14 },
JMF 12:0071cb144c7a 718 { 0x25, 0x19, 0x49, 0x8e, 0x80, 0xf1, 0x47, 0x8f,
JMF 12:0071cb144c7a 719 0x37, 0xba, 0x55, 0xbd, 0x6d, 0x27, 0x61, 0x8c },
JMF 12:0071cb144c7a 720 { 0x65, 0xdc, 0xc5, 0x7f, 0xcf, 0x62, 0x3a, 0x24,
JMF 12:0071cb144c7a 721 0x09, 0x4f, 0xcc, 0xa4, 0x0d, 0x35, 0x33, 0xf8 },
JMF 12:0071cb144c7a 722 { 0xdc, 0xf5, 0x66, 0xff, 0x29, 0x1c, 0x25, 0xbb,
JMF 12:0071cb144c7a 723 0xb8, 0x56, 0x8f, 0xc3, 0xd3, 0x76, 0xa6, 0xd9 },
JMF 12:0071cb144c7a 724 { 0x53, 0x0f, 0x8a, 0xfb, 0xc7, 0x45, 0x36, 0xb9,
JMF 12:0071cb144c7a 725 0xa9, 0x63, 0xb4, 0xf1, 0xc4, 0xcb, 0x73, 0x8b },
JMF 12:0071cb144c7a 726 { 0xd0, 0xd1, 0xc8, 0xa7, 0x99, 0x99, 0x6b, 0xf0,
JMF 12:0071cb144c7a 727 0x26, 0x5b, 0x98, 0xb5, 0xd4, 0x8a, 0xb9, 0x19 },
JMF 12:0071cb144c7a 728 { 0xb0, 0x94, 0xda, 0xc5, 0xd9, 0x34, 0x71, 0xbd,
JMF 12:0071cb144c7a 729 0xec, 0x1a, 0x50, 0x22, 0x70, 0xe3, 0xcc, 0x6c },
JMF 12:0071cb144c7a 730 { 0x76, 0xfc, 0x6e, 0xce, 0x0f, 0x4e, 0x17, 0x68,
JMF 12:0071cb144c7a 731 0xcd, 0xdf, 0x88, 0x53, 0xbb, 0x2d, 0x55, 0x1b },
JMF 12:0071cb144c7a 732 { 0x3a, 0x33, 0x7d, 0xbf, 0x46, 0xa7, 0x92, 0xc4,
JMF 12:0071cb144c7a 733 0x5e, 0x45, 0x49, 0x13, 0xfe, 0x2e, 0xa8, 0xf2 },
JMF 12:0071cb144c7a 734 { 0xa4, 0x4a, 0x82, 0x66, 0xee, 0x1c, 0x8e, 0xb0,
JMF 12:0071cb144c7a 735 0xc8, 0xb5, 0xd4, 0xcf, 0x5a, 0xe9, 0xf1, 0x9a },
JMF 12:0071cb144c7a 736 };
JMF 12:0071cb144c7a 737
JMF 12:0071cb144c7a 738 int mbedtls_gcm_self_test( int verbose )
JMF 12:0071cb144c7a 739 {
JMF 12:0071cb144c7a 740 mbedtls_gcm_context ctx;
JMF 12:0071cb144c7a 741 unsigned char buf[64];
JMF 12:0071cb144c7a 742 unsigned char tag_buf[16];
JMF 12:0071cb144c7a 743 int i, j, ret;
JMF 12:0071cb144c7a 744 mbedtls_cipher_id_t cipher = MBEDTLS_CIPHER_ID_AES;
JMF 12:0071cb144c7a 745
JMF 12:0071cb144c7a 746 mbedtls_gcm_init( &ctx );
JMF 12:0071cb144c7a 747
JMF 12:0071cb144c7a 748 for( j = 0; j < 3; j++ )
JMF 12:0071cb144c7a 749 {
JMF 12:0071cb144c7a 750 int key_len = 128 + 64 * j;
JMF 12:0071cb144c7a 751
JMF 12:0071cb144c7a 752 for( i = 0; i < MAX_TESTS; i++ )
JMF 12:0071cb144c7a 753 {
JMF 12:0071cb144c7a 754 if( verbose != 0 )
JMF 12:0071cb144c7a 755 mbedtls_printf( " AES-GCM-%3d #%d (%s): ",
JMF 12:0071cb144c7a 756 key_len, i, "enc" );
JMF 12:0071cb144c7a 757
JMF 12:0071cb144c7a 758 mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len );
JMF 12:0071cb144c7a 759
JMF 12:0071cb144c7a 760 ret = mbedtls_gcm_crypt_and_tag( &ctx, MBEDTLS_GCM_ENCRYPT,
JMF 12:0071cb144c7a 761 pt_len[i],
JMF 12:0071cb144c7a 762 iv[iv_index[i]], iv_len[i],
JMF 12:0071cb144c7a 763 additional[add_index[i]], add_len[i],
JMF 12:0071cb144c7a 764 pt[pt_index[i]], buf, 16, tag_buf );
JMF 12:0071cb144c7a 765
JMF 12:0071cb144c7a 766 if( ret != 0 ||
JMF 12:0071cb144c7a 767 memcmp( buf, ct[j * 6 + i], pt_len[i] ) != 0 ||
JMF 12:0071cb144c7a 768 memcmp( tag_buf, tag[j * 6 + i], 16 ) != 0 )
JMF 12:0071cb144c7a 769 {
JMF 12:0071cb144c7a 770 if( verbose != 0 )
JMF 12:0071cb144c7a 771 mbedtls_printf( "failed\n" );
JMF 12:0071cb144c7a 772
JMF 12:0071cb144c7a 773 return( 1 );
JMF 12:0071cb144c7a 774 }
JMF 12:0071cb144c7a 775
JMF 12:0071cb144c7a 776 mbedtls_gcm_free( &ctx );
JMF 12:0071cb144c7a 777
JMF 12:0071cb144c7a 778 if( verbose != 0 )
JMF 12:0071cb144c7a 779 mbedtls_printf( "passed\n" );
JMF 12:0071cb144c7a 780
JMF 12:0071cb144c7a 781 if( verbose != 0 )
JMF 12:0071cb144c7a 782 mbedtls_printf( " AES-GCM-%3d #%d (%s): ",
JMF 12:0071cb144c7a 783 key_len, i, "dec" );
JMF 12:0071cb144c7a 784
JMF 12:0071cb144c7a 785 mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len );
JMF 12:0071cb144c7a 786
JMF 12:0071cb144c7a 787 ret = mbedtls_gcm_crypt_and_tag( &ctx, MBEDTLS_GCM_DECRYPT,
JMF 12:0071cb144c7a 788 pt_len[i],
JMF 12:0071cb144c7a 789 iv[iv_index[i]], iv_len[i],
JMF 12:0071cb144c7a 790 additional[add_index[i]], add_len[i],
JMF 12:0071cb144c7a 791 ct[j * 6 + i], buf, 16, tag_buf );
JMF 12:0071cb144c7a 792
JMF 12:0071cb144c7a 793 if( ret != 0 ||
JMF 12:0071cb144c7a 794 memcmp( buf, pt[pt_index[i]], pt_len[i] ) != 0 ||
JMF 12:0071cb144c7a 795 memcmp( tag_buf, tag[j * 6 + i], 16 ) != 0 )
JMF 12:0071cb144c7a 796 {
JMF 12:0071cb144c7a 797 if( verbose != 0 )
JMF 12:0071cb144c7a 798 mbedtls_printf( "failed\n" );
JMF 12:0071cb144c7a 799
JMF 12:0071cb144c7a 800 return( 1 );
JMF 12:0071cb144c7a 801 }
JMF 12:0071cb144c7a 802
JMF 12:0071cb144c7a 803 mbedtls_gcm_free( &ctx );
JMF 12:0071cb144c7a 804
JMF 12:0071cb144c7a 805 if( verbose != 0 )
JMF 12:0071cb144c7a 806 mbedtls_printf( "passed\n" );
JMF 12:0071cb144c7a 807
JMF 12:0071cb144c7a 808 if( verbose != 0 )
JMF 12:0071cb144c7a 809 mbedtls_printf( " AES-GCM-%3d #%d split (%s): ",
JMF 12:0071cb144c7a 810 key_len, i, "enc" );
JMF 12:0071cb144c7a 811
JMF 12:0071cb144c7a 812 mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len );
JMF 12:0071cb144c7a 813
JMF 12:0071cb144c7a 814 ret = mbedtls_gcm_starts( &ctx, MBEDTLS_GCM_ENCRYPT,
JMF 12:0071cb144c7a 815 iv[iv_index[i]], iv_len[i],
JMF 12:0071cb144c7a 816 additional[add_index[i]], add_len[i] );
JMF 12:0071cb144c7a 817 if( ret != 0 )
JMF 12:0071cb144c7a 818 {
JMF 12:0071cb144c7a 819 if( verbose != 0 )
JMF 12:0071cb144c7a 820 mbedtls_printf( "failed\n" );
JMF 12:0071cb144c7a 821
JMF 12:0071cb144c7a 822 return( 1 );
JMF 12:0071cb144c7a 823 }
JMF 12:0071cb144c7a 824
JMF 12:0071cb144c7a 825 if( pt_len[i] > 32 )
JMF 12:0071cb144c7a 826 {
JMF 12:0071cb144c7a 827 size_t rest_len = pt_len[i] - 32;
JMF 12:0071cb144c7a 828 ret = mbedtls_gcm_update( &ctx, 32, pt[pt_index[i]], buf );
JMF 12:0071cb144c7a 829 if( ret != 0 )
JMF 12:0071cb144c7a 830 {
JMF 12:0071cb144c7a 831 if( verbose != 0 )
JMF 12:0071cb144c7a 832 mbedtls_printf( "failed\n" );
JMF 12:0071cb144c7a 833
JMF 12:0071cb144c7a 834 return( 1 );
JMF 12:0071cb144c7a 835 }
JMF 12:0071cb144c7a 836
JMF 12:0071cb144c7a 837 ret = mbedtls_gcm_update( &ctx, rest_len, pt[pt_index[i]] + 32,
JMF 12:0071cb144c7a 838 buf + 32 );
JMF 12:0071cb144c7a 839 if( ret != 0 )
JMF 12:0071cb144c7a 840 {
JMF 12:0071cb144c7a 841 if( verbose != 0 )
JMF 12:0071cb144c7a 842 mbedtls_printf( "failed\n" );
JMF 12:0071cb144c7a 843
JMF 12:0071cb144c7a 844 return( 1 );
JMF 12:0071cb144c7a 845 }
JMF 12:0071cb144c7a 846 }
JMF 12:0071cb144c7a 847 else
JMF 12:0071cb144c7a 848 {
JMF 12:0071cb144c7a 849 ret = mbedtls_gcm_update( &ctx, pt_len[i], pt[pt_index[i]], buf );
JMF 12:0071cb144c7a 850 if( ret != 0 )
JMF 12:0071cb144c7a 851 {
JMF 12:0071cb144c7a 852 if( verbose != 0 )
JMF 12:0071cb144c7a 853 mbedtls_printf( "failed\n" );
JMF 12:0071cb144c7a 854
JMF 12:0071cb144c7a 855 return( 1 );
JMF 12:0071cb144c7a 856 }
JMF 12:0071cb144c7a 857 }
JMF 12:0071cb144c7a 858
JMF 12:0071cb144c7a 859 ret = mbedtls_gcm_finish( &ctx, tag_buf, 16 );
JMF 12:0071cb144c7a 860 if( ret != 0 ||
JMF 12:0071cb144c7a 861 memcmp( buf, ct[j * 6 + i], pt_len[i] ) != 0 ||
JMF 12:0071cb144c7a 862 memcmp( tag_buf, tag[j * 6 + i], 16 ) != 0 )
JMF 12:0071cb144c7a 863 {
JMF 12:0071cb144c7a 864 if( verbose != 0 )
JMF 12:0071cb144c7a 865 mbedtls_printf( "failed\n" );
JMF 12:0071cb144c7a 866
JMF 12:0071cb144c7a 867 return( 1 );
JMF 12:0071cb144c7a 868 }
JMF 12:0071cb144c7a 869
JMF 12:0071cb144c7a 870 mbedtls_gcm_free( &ctx );
JMF 12:0071cb144c7a 871
JMF 12:0071cb144c7a 872 if( verbose != 0 )
JMF 12:0071cb144c7a 873 mbedtls_printf( "passed\n" );
JMF 12:0071cb144c7a 874
JMF 12:0071cb144c7a 875 if( verbose != 0 )
JMF 12:0071cb144c7a 876 mbedtls_printf( " AES-GCM-%3d #%d split (%s): ",
JMF 12:0071cb144c7a 877 key_len, i, "dec" );
JMF 12:0071cb144c7a 878
JMF 12:0071cb144c7a 879 mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len );
JMF 12:0071cb144c7a 880
JMF 12:0071cb144c7a 881 ret = mbedtls_gcm_starts( &ctx, MBEDTLS_GCM_DECRYPT,
JMF 12:0071cb144c7a 882 iv[iv_index[i]], iv_len[i],
JMF 12:0071cb144c7a 883 additional[add_index[i]], add_len[i] );
JMF 12:0071cb144c7a 884 if( ret != 0 )
JMF 12:0071cb144c7a 885 {
JMF 12:0071cb144c7a 886 if( verbose != 0 )
JMF 12:0071cb144c7a 887 mbedtls_printf( "failed\n" );
JMF 12:0071cb144c7a 888
JMF 12:0071cb144c7a 889 return( 1 );
JMF 12:0071cb144c7a 890 }
JMF 12:0071cb144c7a 891
JMF 12:0071cb144c7a 892 if( pt_len[i] > 32 )
JMF 12:0071cb144c7a 893 {
JMF 12:0071cb144c7a 894 size_t rest_len = pt_len[i] - 32;
JMF 12:0071cb144c7a 895 ret = mbedtls_gcm_update( &ctx, 32, ct[j * 6 + i], buf );
JMF 12:0071cb144c7a 896 if( ret != 0 )
JMF 12:0071cb144c7a 897 {
JMF 12:0071cb144c7a 898 if( verbose != 0 )
JMF 12:0071cb144c7a 899 mbedtls_printf( "failed\n" );
JMF 12:0071cb144c7a 900
JMF 12:0071cb144c7a 901 return( 1 );
JMF 12:0071cb144c7a 902 }
JMF 12:0071cb144c7a 903
JMF 12:0071cb144c7a 904 ret = mbedtls_gcm_update( &ctx, rest_len, ct[j * 6 + i] + 32,
JMF 12:0071cb144c7a 905 buf + 32 );
JMF 12:0071cb144c7a 906 if( ret != 0 )
JMF 12:0071cb144c7a 907 {
JMF 12:0071cb144c7a 908 if( verbose != 0 )
JMF 12:0071cb144c7a 909 mbedtls_printf( "failed\n" );
JMF 12:0071cb144c7a 910
JMF 12:0071cb144c7a 911 return( 1 );
JMF 12:0071cb144c7a 912 }
JMF 12:0071cb144c7a 913 }
JMF 12:0071cb144c7a 914 else
JMF 12:0071cb144c7a 915 {
JMF 12:0071cb144c7a 916 ret = mbedtls_gcm_update( &ctx, pt_len[i], ct[j * 6 + i], buf );
JMF 12:0071cb144c7a 917 if( ret != 0 )
JMF 12:0071cb144c7a 918 {
JMF 12:0071cb144c7a 919 if( verbose != 0 )
JMF 12:0071cb144c7a 920 mbedtls_printf( "failed\n" );
JMF 12:0071cb144c7a 921
JMF 12:0071cb144c7a 922 return( 1 );
JMF 12:0071cb144c7a 923 }
JMF 12:0071cb144c7a 924 }
JMF 12:0071cb144c7a 925
JMF 12:0071cb144c7a 926 ret = mbedtls_gcm_finish( &ctx, tag_buf, 16 );
JMF 12:0071cb144c7a 927 if( ret != 0 ||
JMF 12:0071cb144c7a 928 memcmp( buf, pt[pt_index[i]], pt_len[i] ) != 0 ||
JMF 12:0071cb144c7a 929 memcmp( tag_buf, tag[j * 6 + i], 16 ) != 0 )
JMF 12:0071cb144c7a 930 {
JMF 12:0071cb144c7a 931 if( verbose != 0 )
JMF 12:0071cb144c7a 932 mbedtls_printf( "failed\n" );
JMF 12:0071cb144c7a 933
JMF 12:0071cb144c7a 934 return( 1 );
JMF 12:0071cb144c7a 935 }
JMF 12:0071cb144c7a 936
JMF 12:0071cb144c7a 937 mbedtls_gcm_free( &ctx );
JMF 12:0071cb144c7a 938
JMF 12:0071cb144c7a 939 if( verbose != 0 )
JMF 12:0071cb144c7a 940 mbedtls_printf( "passed\n" );
JMF 12:0071cb144c7a 941
JMF 12:0071cb144c7a 942 }
JMF 12:0071cb144c7a 943 }
JMF 12:0071cb144c7a 944
JMF 12:0071cb144c7a 945 if( verbose != 0 )
JMF 12:0071cb144c7a 946 mbedtls_printf( "\n" );
JMF 12:0071cb144c7a 947
JMF 12:0071cb144c7a 948 return( 0 );
JMF 12:0071cb144c7a 949 }
JMF 12:0071cb144c7a 950
JMF 12:0071cb144c7a 951 #endif /* MBEDTLS_SELF_TEST && MBEDTLS_AES_C */
JMF 12:0071cb144c7a 952
JMF 12:0071cb144c7a 953 #endif /* MBEDTLS_GCM_C */