1*c6672fdcSEdison Ai // SPDX-License-Identifier: Apache-2.0 2817466cbSJens Wiklander /* 3817466cbSJens Wiklander * NIST SP800-38D compliant GCM implementation 4817466cbSJens Wiklander * 5817466cbSJens Wiklander * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved 6817466cbSJens Wiklander * 7817466cbSJens Wiklander * Licensed under the Apache License, Version 2.0 (the "License"); you may 8817466cbSJens Wiklander * not use this file except in compliance with the License. 9817466cbSJens Wiklander * You may obtain a copy of the License at 10817466cbSJens Wiklander * 11817466cbSJens Wiklander * http://www.apache.org/licenses/LICENSE-2.0 12817466cbSJens Wiklander * 13817466cbSJens Wiklander * Unless required by applicable law or agreed to in writing, software 14817466cbSJens Wiklander * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 15817466cbSJens Wiklander * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16817466cbSJens Wiklander * See the License for the specific language governing permissions and 17817466cbSJens Wiklander * limitations under the License. 18817466cbSJens Wiklander * 19817466cbSJens Wiklander * This file is part of mbed TLS (https://tls.mbed.org) 20817466cbSJens Wiklander */ 21817466cbSJens Wiklander 22817466cbSJens Wiklander /* 23817466cbSJens Wiklander * http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf 24817466cbSJens Wiklander * 25817466cbSJens Wiklander * See also: 26817466cbSJens Wiklander * [MGV] http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/gcm/gcm-revised-spec.pdf 27817466cbSJens Wiklander * 28817466cbSJens Wiklander * We use the algorithm described as Shoup's method with 4-bit tables in 29817466cbSJens Wiklander * [MGV] 4.1, pp. 12-13, to enhance speed without using too much memory. 30817466cbSJens Wiklander */ 31817466cbSJens Wiklander 32817466cbSJens Wiklander #if !defined(MBEDTLS_CONFIG_FILE) 33817466cbSJens Wiklander #include "mbedtls/config.h" 34817466cbSJens Wiklander #else 35817466cbSJens Wiklander #include MBEDTLS_CONFIG_FILE 36817466cbSJens Wiklander #endif 37817466cbSJens Wiklander 38817466cbSJens Wiklander #if defined(MBEDTLS_GCM_C) 39817466cbSJens Wiklander 40817466cbSJens Wiklander #include "mbedtls/gcm.h" 41817466cbSJens Wiklander 42817466cbSJens Wiklander #include <string.h> 43817466cbSJens Wiklander 44817466cbSJens Wiklander #if defined(MBEDTLS_AESNI_C) 45817466cbSJens Wiklander #include "mbedtls/aesni.h" 46817466cbSJens Wiklander #endif 47817466cbSJens Wiklander 48817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) && defined(MBEDTLS_AES_C) 49817466cbSJens Wiklander #if defined(MBEDTLS_PLATFORM_C) 50817466cbSJens Wiklander #include "mbedtls/platform.h" 51817466cbSJens Wiklander #else 52817466cbSJens Wiklander #include <stdio.h> 53817466cbSJens Wiklander #define mbedtls_printf printf 54817466cbSJens Wiklander #endif /* MBEDTLS_PLATFORM_C */ 55817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST && MBEDTLS_AES_C */ 56817466cbSJens Wiklander 57817466cbSJens Wiklander /* 58817466cbSJens Wiklander * 32-bit integer manipulation macros (big endian) 59817466cbSJens Wiklander */ 60817466cbSJens Wiklander #ifndef GET_UINT32_BE 61817466cbSJens Wiklander #define GET_UINT32_BE(n,b,i) \ 62817466cbSJens Wiklander { \ 63817466cbSJens Wiklander (n) = ( (uint32_t) (b)[(i) ] << 24 ) \ 64817466cbSJens Wiklander | ( (uint32_t) (b)[(i) + 1] << 16 ) \ 65817466cbSJens Wiklander | ( (uint32_t) (b)[(i) + 2] << 8 ) \ 66817466cbSJens Wiklander | ( (uint32_t) (b)[(i) + 3] ); \ 67817466cbSJens Wiklander } 68817466cbSJens Wiklander #endif 69817466cbSJens Wiklander 70817466cbSJens Wiklander #ifndef PUT_UINT32_BE 71817466cbSJens Wiklander #define PUT_UINT32_BE(n,b,i) \ 72817466cbSJens Wiklander { \ 73817466cbSJens Wiklander (b)[(i) ] = (unsigned char) ( (n) >> 24 ); \ 74817466cbSJens Wiklander (b)[(i) + 1] = (unsigned char) ( (n) >> 16 ); \ 75817466cbSJens Wiklander (b)[(i) + 2] = (unsigned char) ( (n) >> 8 ); \ 76817466cbSJens Wiklander (b)[(i) + 3] = (unsigned char) ( (n) ); \ 77817466cbSJens Wiklander } 78817466cbSJens Wiklander #endif 79817466cbSJens Wiklander 80817466cbSJens Wiklander /* Implementation that should never be optimized out by the compiler */ 81817466cbSJens Wiklander static void mbedtls_zeroize( void *v, size_t n ) { 82817466cbSJens Wiklander volatile unsigned char *p = v; while( n-- ) *p++ = 0; 83817466cbSJens Wiklander } 84817466cbSJens Wiklander 85817466cbSJens Wiklander /* 86817466cbSJens Wiklander * Initialize a context 87817466cbSJens Wiklander */ 88817466cbSJens Wiklander void mbedtls_gcm_init( mbedtls_gcm_context *ctx ) 89817466cbSJens Wiklander { 90817466cbSJens Wiklander memset( ctx, 0, sizeof( mbedtls_gcm_context ) ); 91817466cbSJens Wiklander } 92817466cbSJens Wiklander 93817466cbSJens Wiklander /* 94817466cbSJens Wiklander * Precompute small multiples of H, that is set 95817466cbSJens Wiklander * HH[i] || HL[i] = H times i, 96817466cbSJens Wiklander * where i is seen as a field element as in [MGV], ie high-order bits 97817466cbSJens Wiklander * correspond to low powers of P. The result is stored in the same way, that 98817466cbSJens Wiklander * is the high-order bit of HH corresponds to P^0 and the low-order bit of HL 99817466cbSJens Wiklander * corresponds to P^127. 100817466cbSJens Wiklander */ 101817466cbSJens Wiklander static int gcm_gen_table( mbedtls_gcm_context *ctx ) 102817466cbSJens Wiklander { 103817466cbSJens Wiklander int ret, i, j; 104817466cbSJens Wiklander uint64_t hi, lo; 105817466cbSJens Wiklander uint64_t vl, vh; 106817466cbSJens Wiklander unsigned char h[16]; 107817466cbSJens Wiklander size_t olen = 0; 108817466cbSJens Wiklander 109817466cbSJens Wiklander memset( h, 0, 16 ); 110817466cbSJens Wiklander if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, h, 16, h, &olen ) ) != 0 ) 111817466cbSJens Wiklander return( ret ); 112817466cbSJens Wiklander 113817466cbSJens Wiklander /* pack h as two 64-bits ints, big-endian */ 114817466cbSJens Wiklander GET_UINT32_BE( hi, h, 0 ); 115817466cbSJens Wiklander GET_UINT32_BE( lo, h, 4 ); 116817466cbSJens Wiklander vh = (uint64_t) hi << 32 | lo; 117817466cbSJens Wiklander 118817466cbSJens Wiklander GET_UINT32_BE( hi, h, 8 ); 119817466cbSJens Wiklander GET_UINT32_BE( lo, h, 12 ); 120817466cbSJens Wiklander vl = (uint64_t) hi << 32 | lo; 121817466cbSJens Wiklander 122817466cbSJens Wiklander /* 8 = 1000 corresponds to 1 in GF(2^128) */ 123817466cbSJens Wiklander ctx->HL[8] = vl; 124817466cbSJens Wiklander ctx->HH[8] = vh; 125817466cbSJens Wiklander 126817466cbSJens Wiklander #if defined(MBEDTLS_AESNI_C) && defined(MBEDTLS_HAVE_X86_64) 127817466cbSJens Wiklander /* With CLMUL support, we need only h, not the rest of the table */ 128817466cbSJens Wiklander if( mbedtls_aesni_has_support( MBEDTLS_AESNI_CLMUL ) ) 129817466cbSJens Wiklander return( 0 ); 130817466cbSJens Wiklander #endif 131817466cbSJens Wiklander 132817466cbSJens Wiklander /* 0 corresponds to 0 in GF(2^128) */ 133817466cbSJens Wiklander ctx->HH[0] = 0; 134817466cbSJens Wiklander ctx->HL[0] = 0; 135817466cbSJens Wiklander 136817466cbSJens Wiklander for( i = 4; i > 0; i >>= 1 ) 137817466cbSJens Wiklander { 138817466cbSJens Wiklander uint32_t T = ( vl & 1 ) * 0xe1000000U; 139817466cbSJens Wiklander vl = ( vh << 63 ) | ( vl >> 1 ); 140817466cbSJens Wiklander vh = ( vh >> 1 ) ^ ( (uint64_t) T << 32); 141817466cbSJens Wiklander 142817466cbSJens Wiklander ctx->HL[i] = vl; 143817466cbSJens Wiklander ctx->HH[i] = vh; 144817466cbSJens Wiklander } 145817466cbSJens Wiklander 146817466cbSJens Wiklander for( i = 2; i <= 8; i *= 2 ) 147817466cbSJens Wiklander { 148817466cbSJens Wiklander uint64_t *HiL = ctx->HL + i, *HiH = ctx->HH + i; 149817466cbSJens Wiklander vh = *HiH; 150817466cbSJens Wiklander vl = *HiL; 151817466cbSJens Wiklander for( j = 1; j < i; j++ ) 152817466cbSJens Wiklander { 153817466cbSJens Wiklander HiH[j] = vh ^ ctx->HH[j]; 154817466cbSJens Wiklander HiL[j] = vl ^ ctx->HL[j]; 155817466cbSJens Wiklander } 156817466cbSJens Wiklander } 157817466cbSJens Wiklander 158817466cbSJens Wiklander return( 0 ); 159817466cbSJens Wiklander } 160817466cbSJens Wiklander 161817466cbSJens Wiklander int mbedtls_gcm_setkey( mbedtls_gcm_context *ctx, 162817466cbSJens Wiklander mbedtls_cipher_id_t cipher, 163817466cbSJens Wiklander const unsigned char *key, 164817466cbSJens Wiklander unsigned int keybits ) 165817466cbSJens Wiklander { 166817466cbSJens Wiklander int ret; 167817466cbSJens Wiklander const mbedtls_cipher_info_t *cipher_info; 168817466cbSJens Wiklander 169817466cbSJens Wiklander cipher_info = mbedtls_cipher_info_from_values( cipher, keybits, MBEDTLS_MODE_ECB ); 170817466cbSJens Wiklander if( cipher_info == NULL ) 171817466cbSJens Wiklander return( MBEDTLS_ERR_GCM_BAD_INPUT ); 172817466cbSJens Wiklander 173817466cbSJens Wiklander if( cipher_info->block_size != 16 ) 174817466cbSJens Wiklander return( MBEDTLS_ERR_GCM_BAD_INPUT ); 175817466cbSJens Wiklander 176817466cbSJens Wiklander mbedtls_cipher_free( &ctx->cipher_ctx ); 177817466cbSJens Wiklander 178817466cbSJens Wiklander if( ( ret = mbedtls_cipher_setup( &ctx->cipher_ctx, cipher_info ) ) != 0 ) 179817466cbSJens Wiklander return( ret ); 180817466cbSJens Wiklander 181817466cbSJens Wiklander if( ( ret = mbedtls_cipher_setkey( &ctx->cipher_ctx, key, keybits, 182817466cbSJens Wiklander MBEDTLS_ENCRYPT ) ) != 0 ) 183817466cbSJens Wiklander { 184817466cbSJens Wiklander return( ret ); 185817466cbSJens Wiklander } 186817466cbSJens Wiklander 187817466cbSJens Wiklander if( ( ret = gcm_gen_table( ctx ) ) != 0 ) 188817466cbSJens Wiklander return( ret ); 189817466cbSJens Wiklander 190817466cbSJens Wiklander return( 0 ); 191817466cbSJens Wiklander } 192817466cbSJens Wiklander 193817466cbSJens Wiklander /* 194817466cbSJens Wiklander * Shoup's method for multiplication use this table with 195817466cbSJens Wiklander * last4[x] = x times P^128 196817466cbSJens Wiklander * where x and last4[x] are seen as elements of GF(2^128) as in [MGV] 197817466cbSJens Wiklander */ 198817466cbSJens Wiklander static const uint64_t last4[16] = 199817466cbSJens Wiklander { 200817466cbSJens Wiklander 0x0000, 0x1c20, 0x3840, 0x2460, 201817466cbSJens Wiklander 0x7080, 0x6ca0, 0x48c0, 0x54e0, 202817466cbSJens Wiklander 0xe100, 0xfd20, 0xd940, 0xc560, 203817466cbSJens Wiklander 0x9180, 0x8da0, 0xa9c0, 0xb5e0 204817466cbSJens Wiklander }; 205817466cbSJens Wiklander 206817466cbSJens Wiklander /* 207817466cbSJens Wiklander * Sets output to x times H using the precomputed tables. 208817466cbSJens Wiklander * x and output are seen as elements of GF(2^128) as in [MGV]. 209817466cbSJens Wiklander */ 210817466cbSJens Wiklander static void gcm_mult( mbedtls_gcm_context *ctx, const unsigned char x[16], 211817466cbSJens Wiklander unsigned char output[16] ) 212817466cbSJens Wiklander { 213817466cbSJens Wiklander int i = 0; 214817466cbSJens Wiklander unsigned char lo, hi, rem; 215817466cbSJens Wiklander uint64_t zh, zl; 216817466cbSJens Wiklander 217817466cbSJens Wiklander #if defined(MBEDTLS_AESNI_C) && defined(MBEDTLS_HAVE_X86_64) 218817466cbSJens Wiklander if( mbedtls_aesni_has_support( MBEDTLS_AESNI_CLMUL ) ) { 219817466cbSJens Wiklander unsigned char h[16]; 220817466cbSJens Wiklander 221817466cbSJens Wiklander PUT_UINT32_BE( ctx->HH[8] >> 32, h, 0 ); 222817466cbSJens Wiklander PUT_UINT32_BE( ctx->HH[8], h, 4 ); 223817466cbSJens Wiklander PUT_UINT32_BE( ctx->HL[8] >> 32, h, 8 ); 224817466cbSJens Wiklander PUT_UINT32_BE( ctx->HL[8], h, 12 ); 225817466cbSJens Wiklander 226817466cbSJens Wiklander mbedtls_aesni_gcm_mult( output, x, h ); 227817466cbSJens Wiklander return; 228817466cbSJens Wiklander } 229817466cbSJens Wiklander #endif /* MBEDTLS_AESNI_C && MBEDTLS_HAVE_X86_64 */ 230817466cbSJens Wiklander 231817466cbSJens Wiklander lo = x[15] & 0xf; 232817466cbSJens Wiklander 233817466cbSJens Wiklander zh = ctx->HH[lo]; 234817466cbSJens Wiklander zl = ctx->HL[lo]; 235817466cbSJens Wiklander 236817466cbSJens Wiklander for( i = 15; i >= 0; i-- ) 237817466cbSJens Wiklander { 238817466cbSJens Wiklander lo = x[i] & 0xf; 239817466cbSJens Wiklander hi = x[i] >> 4; 240817466cbSJens Wiklander 241817466cbSJens Wiklander if( i != 15 ) 242817466cbSJens Wiklander { 243817466cbSJens Wiklander rem = (unsigned char) zl & 0xf; 244817466cbSJens Wiklander zl = ( zh << 60 ) | ( zl >> 4 ); 245817466cbSJens Wiklander zh = ( zh >> 4 ); 246817466cbSJens Wiklander zh ^= (uint64_t) last4[rem] << 48; 247817466cbSJens Wiklander zh ^= ctx->HH[lo]; 248817466cbSJens Wiklander zl ^= ctx->HL[lo]; 249817466cbSJens Wiklander 250817466cbSJens Wiklander } 251817466cbSJens Wiklander 252817466cbSJens Wiklander rem = (unsigned char) zl & 0xf; 253817466cbSJens Wiklander zl = ( zh << 60 ) | ( zl >> 4 ); 254817466cbSJens Wiklander zh = ( zh >> 4 ); 255817466cbSJens Wiklander zh ^= (uint64_t) last4[rem] << 48; 256817466cbSJens Wiklander zh ^= ctx->HH[hi]; 257817466cbSJens Wiklander zl ^= ctx->HL[hi]; 258817466cbSJens Wiklander } 259817466cbSJens Wiklander 260817466cbSJens Wiklander PUT_UINT32_BE( zh >> 32, output, 0 ); 261817466cbSJens Wiklander PUT_UINT32_BE( zh, output, 4 ); 262817466cbSJens Wiklander PUT_UINT32_BE( zl >> 32, output, 8 ); 263817466cbSJens Wiklander PUT_UINT32_BE( zl, output, 12 ); 264817466cbSJens Wiklander } 265817466cbSJens Wiklander 266817466cbSJens Wiklander int mbedtls_gcm_starts( mbedtls_gcm_context *ctx, 267817466cbSJens Wiklander int mode, 268817466cbSJens Wiklander const unsigned char *iv, 269817466cbSJens Wiklander size_t iv_len, 270817466cbSJens Wiklander const unsigned char *add, 271817466cbSJens Wiklander size_t add_len ) 272817466cbSJens Wiklander { 273817466cbSJens Wiklander int ret; 274817466cbSJens Wiklander unsigned char work_buf[16]; 275817466cbSJens Wiklander size_t i; 276817466cbSJens Wiklander const unsigned char *p; 277817466cbSJens Wiklander size_t use_len, olen = 0; 278817466cbSJens Wiklander 279817466cbSJens Wiklander /* IV and AD are limited to 2^64 bits, so 2^61 bytes */ 280817466cbSJens Wiklander /* IV is not allowed to be zero length */ 281817466cbSJens Wiklander if( iv_len == 0 || 282817466cbSJens Wiklander ( (uint64_t) iv_len ) >> 61 != 0 || 283817466cbSJens Wiklander ( (uint64_t) add_len ) >> 61 != 0 ) 284817466cbSJens Wiklander { 285817466cbSJens Wiklander return( MBEDTLS_ERR_GCM_BAD_INPUT ); 286817466cbSJens Wiklander } 287817466cbSJens Wiklander 288817466cbSJens Wiklander memset( ctx->y, 0x00, sizeof(ctx->y) ); 289817466cbSJens Wiklander memset( ctx->buf, 0x00, sizeof(ctx->buf) ); 290817466cbSJens Wiklander 291817466cbSJens Wiklander ctx->mode = mode; 292817466cbSJens Wiklander ctx->len = 0; 293817466cbSJens Wiklander ctx->add_len = 0; 294817466cbSJens Wiklander 295817466cbSJens Wiklander if( iv_len == 12 ) 296817466cbSJens Wiklander { 297817466cbSJens Wiklander memcpy( ctx->y, iv, iv_len ); 298817466cbSJens Wiklander ctx->y[15] = 1; 299817466cbSJens Wiklander } 300817466cbSJens Wiklander else 301817466cbSJens Wiklander { 302817466cbSJens Wiklander memset( work_buf, 0x00, 16 ); 303817466cbSJens Wiklander PUT_UINT32_BE( iv_len * 8, work_buf, 12 ); 304817466cbSJens Wiklander 305817466cbSJens Wiklander p = iv; 306817466cbSJens Wiklander while( iv_len > 0 ) 307817466cbSJens Wiklander { 308817466cbSJens Wiklander use_len = ( iv_len < 16 ) ? iv_len : 16; 309817466cbSJens Wiklander 310817466cbSJens Wiklander for( i = 0; i < use_len; i++ ) 311817466cbSJens Wiklander ctx->y[i] ^= p[i]; 312817466cbSJens Wiklander 313817466cbSJens Wiklander gcm_mult( ctx, ctx->y, ctx->y ); 314817466cbSJens Wiklander 315817466cbSJens Wiklander iv_len -= use_len; 316817466cbSJens Wiklander p += use_len; 317817466cbSJens Wiklander } 318817466cbSJens Wiklander 319817466cbSJens Wiklander for( i = 0; i < 16; i++ ) 320817466cbSJens Wiklander ctx->y[i] ^= work_buf[i]; 321817466cbSJens Wiklander 322817466cbSJens Wiklander gcm_mult( ctx, ctx->y, ctx->y ); 323817466cbSJens Wiklander } 324817466cbSJens Wiklander 325817466cbSJens Wiklander if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->y, 16, ctx->base_ectr, 326817466cbSJens Wiklander &olen ) ) != 0 ) 327817466cbSJens Wiklander { 328817466cbSJens Wiklander return( ret ); 329817466cbSJens Wiklander } 330817466cbSJens Wiklander 331817466cbSJens Wiklander ctx->add_len = add_len; 332817466cbSJens Wiklander p = add; 333817466cbSJens Wiklander while( add_len > 0 ) 334817466cbSJens Wiklander { 335817466cbSJens Wiklander use_len = ( add_len < 16 ) ? add_len : 16; 336817466cbSJens Wiklander 337817466cbSJens Wiklander for( i = 0; i < use_len; i++ ) 338817466cbSJens Wiklander ctx->buf[i] ^= p[i]; 339817466cbSJens Wiklander 340817466cbSJens Wiklander gcm_mult( ctx, ctx->buf, ctx->buf ); 341817466cbSJens Wiklander 342817466cbSJens Wiklander add_len -= use_len; 343817466cbSJens Wiklander p += use_len; 344817466cbSJens Wiklander } 345817466cbSJens Wiklander 346817466cbSJens Wiklander return( 0 ); 347817466cbSJens Wiklander } 348817466cbSJens Wiklander 349817466cbSJens Wiklander int mbedtls_gcm_update( mbedtls_gcm_context *ctx, 350817466cbSJens Wiklander size_t length, 351817466cbSJens Wiklander const unsigned char *input, 352817466cbSJens Wiklander unsigned char *output ) 353817466cbSJens Wiklander { 354817466cbSJens Wiklander int ret; 355817466cbSJens Wiklander unsigned char ectr[16]; 356817466cbSJens Wiklander size_t i; 357817466cbSJens Wiklander const unsigned char *p; 358817466cbSJens Wiklander unsigned char *out_p = output; 359817466cbSJens Wiklander size_t use_len, olen = 0; 360817466cbSJens Wiklander 361817466cbSJens Wiklander if( output > input && (size_t) ( output - input ) < length ) 362817466cbSJens Wiklander return( MBEDTLS_ERR_GCM_BAD_INPUT ); 363817466cbSJens Wiklander 364817466cbSJens Wiklander /* Total length is restricted to 2^39 - 256 bits, ie 2^36 - 2^5 bytes 365817466cbSJens Wiklander * Also check for possible overflow */ 366817466cbSJens Wiklander if( ctx->len + length < ctx->len || 367817466cbSJens Wiklander (uint64_t) ctx->len + length > 0xFFFFFFFE0ull ) 368817466cbSJens Wiklander { 369817466cbSJens Wiklander return( MBEDTLS_ERR_GCM_BAD_INPUT ); 370817466cbSJens Wiklander } 371817466cbSJens Wiklander 372817466cbSJens Wiklander ctx->len += length; 373817466cbSJens Wiklander 374817466cbSJens Wiklander p = input; 375817466cbSJens Wiklander while( length > 0 ) 376817466cbSJens Wiklander { 377817466cbSJens Wiklander use_len = ( length < 16 ) ? length : 16; 378817466cbSJens Wiklander 379817466cbSJens Wiklander for( i = 16; i > 12; i-- ) 380817466cbSJens Wiklander if( ++ctx->y[i - 1] != 0 ) 381817466cbSJens Wiklander break; 382817466cbSJens Wiklander 383817466cbSJens Wiklander if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->y, 16, ectr, 384817466cbSJens Wiklander &olen ) ) != 0 ) 385817466cbSJens Wiklander { 386817466cbSJens Wiklander return( ret ); 387817466cbSJens Wiklander } 388817466cbSJens Wiklander 389817466cbSJens Wiklander for( i = 0; i < use_len; i++ ) 390817466cbSJens Wiklander { 391817466cbSJens Wiklander if( ctx->mode == MBEDTLS_GCM_DECRYPT ) 392817466cbSJens Wiklander ctx->buf[i] ^= p[i]; 393817466cbSJens Wiklander out_p[i] = ectr[i] ^ p[i]; 394817466cbSJens Wiklander if( ctx->mode == MBEDTLS_GCM_ENCRYPT ) 395817466cbSJens Wiklander ctx->buf[i] ^= out_p[i]; 396817466cbSJens Wiklander } 397817466cbSJens Wiklander 398817466cbSJens Wiklander gcm_mult( ctx, ctx->buf, ctx->buf ); 399817466cbSJens Wiklander 400817466cbSJens Wiklander length -= use_len; 401817466cbSJens Wiklander p += use_len; 402817466cbSJens Wiklander out_p += use_len; 403817466cbSJens Wiklander } 404817466cbSJens Wiklander 405817466cbSJens Wiklander return( 0 ); 406817466cbSJens Wiklander } 407817466cbSJens Wiklander 408817466cbSJens Wiklander int mbedtls_gcm_finish( mbedtls_gcm_context *ctx, 409817466cbSJens Wiklander unsigned char *tag, 410817466cbSJens Wiklander size_t tag_len ) 411817466cbSJens Wiklander { 412817466cbSJens Wiklander unsigned char work_buf[16]; 413817466cbSJens Wiklander size_t i; 414817466cbSJens Wiklander uint64_t orig_len = ctx->len * 8; 415817466cbSJens Wiklander uint64_t orig_add_len = ctx->add_len * 8; 416817466cbSJens Wiklander 417817466cbSJens Wiklander if( tag_len > 16 || tag_len < 4 ) 418817466cbSJens Wiklander return( MBEDTLS_ERR_GCM_BAD_INPUT ); 419817466cbSJens Wiklander 420817466cbSJens Wiklander memcpy( tag, ctx->base_ectr, tag_len ); 421817466cbSJens Wiklander 422817466cbSJens Wiklander if( orig_len || orig_add_len ) 423817466cbSJens Wiklander { 424817466cbSJens Wiklander memset( work_buf, 0x00, 16 ); 425817466cbSJens Wiklander 426817466cbSJens Wiklander PUT_UINT32_BE( ( orig_add_len >> 32 ), work_buf, 0 ); 427817466cbSJens Wiklander PUT_UINT32_BE( ( orig_add_len ), work_buf, 4 ); 428817466cbSJens Wiklander PUT_UINT32_BE( ( orig_len >> 32 ), work_buf, 8 ); 429817466cbSJens Wiklander PUT_UINT32_BE( ( orig_len ), work_buf, 12 ); 430817466cbSJens Wiklander 431817466cbSJens Wiklander for( i = 0; i < 16; i++ ) 432817466cbSJens Wiklander ctx->buf[i] ^= work_buf[i]; 433817466cbSJens Wiklander 434817466cbSJens Wiklander gcm_mult( ctx, ctx->buf, ctx->buf ); 435817466cbSJens Wiklander 436817466cbSJens Wiklander for( i = 0; i < tag_len; i++ ) 437817466cbSJens Wiklander tag[i] ^= ctx->buf[i]; 438817466cbSJens Wiklander } 439817466cbSJens Wiklander 440817466cbSJens Wiklander return( 0 ); 441817466cbSJens Wiklander } 442817466cbSJens Wiklander 443817466cbSJens Wiklander int mbedtls_gcm_crypt_and_tag( mbedtls_gcm_context *ctx, 444817466cbSJens Wiklander int mode, 445817466cbSJens Wiklander size_t length, 446817466cbSJens Wiklander const unsigned char *iv, 447817466cbSJens Wiklander size_t iv_len, 448817466cbSJens Wiklander const unsigned char *add, 449817466cbSJens Wiklander size_t add_len, 450817466cbSJens Wiklander const unsigned char *input, 451817466cbSJens Wiklander unsigned char *output, 452817466cbSJens Wiklander size_t tag_len, 453817466cbSJens Wiklander unsigned char *tag ) 454817466cbSJens Wiklander { 455817466cbSJens Wiklander int ret; 456817466cbSJens Wiklander 457817466cbSJens Wiklander if( ( ret = mbedtls_gcm_starts( ctx, mode, iv, iv_len, add, add_len ) ) != 0 ) 458817466cbSJens Wiklander return( ret ); 459817466cbSJens Wiklander 460817466cbSJens Wiklander if( ( ret = mbedtls_gcm_update( ctx, length, input, output ) ) != 0 ) 461817466cbSJens Wiklander return( ret ); 462817466cbSJens Wiklander 463817466cbSJens Wiklander if( ( ret = mbedtls_gcm_finish( ctx, tag, tag_len ) ) != 0 ) 464817466cbSJens Wiklander return( ret ); 465817466cbSJens Wiklander 466817466cbSJens Wiklander return( 0 ); 467817466cbSJens Wiklander } 468817466cbSJens Wiklander 469817466cbSJens Wiklander int mbedtls_gcm_auth_decrypt( mbedtls_gcm_context *ctx, 470817466cbSJens Wiklander size_t length, 471817466cbSJens Wiklander const unsigned char *iv, 472817466cbSJens Wiklander size_t iv_len, 473817466cbSJens Wiklander const unsigned char *add, 474817466cbSJens Wiklander size_t add_len, 475817466cbSJens Wiklander const unsigned char *tag, 476817466cbSJens Wiklander size_t tag_len, 477817466cbSJens Wiklander const unsigned char *input, 478817466cbSJens Wiklander unsigned char *output ) 479817466cbSJens Wiklander { 480817466cbSJens Wiklander int ret; 481817466cbSJens Wiklander unsigned char check_tag[16]; 482817466cbSJens Wiklander size_t i; 483817466cbSJens Wiklander int diff; 484817466cbSJens Wiklander 485817466cbSJens Wiklander if( ( ret = mbedtls_gcm_crypt_and_tag( ctx, MBEDTLS_GCM_DECRYPT, length, 486817466cbSJens Wiklander iv, iv_len, add, add_len, 487817466cbSJens Wiklander input, output, tag_len, check_tag ) ) != 0 ) 488817466cbSJens Wiklander { 489817466cbSJens Wiklander return( ret ); 490817466cbSJens Wiklander } 491817466cbSJens Wiklander 492817466cbSJens Wiklander /* Check tag in "constant-time" */ 493817466cbSJens Wiklander for( diff = 0, i = 0; i < tag_len; i++ ) 494817466cbSJens Wiklander diff |= tag[i] ^ check_tag[i]; 495817466cbSJens Wiklander 496817466cbSJens Wiklander if( diff != 0 ) 497817466cbSJens Wiklander { 498817466cbSJens Wiklander mbedtls_zeroize( output, length ); 499817466cbSJens Wiklander return( MBEDTLS_ERR_GCM_AUTH_FAILED ); 500817466cbSJens Wiklander } 501817466cbSJens Wiklander 502817466cbSJens Wiklander return( 0 ); 503817466cbSJens Wiklander } 504817466cbSJens Wiklander 505817466cbSJens Wiklander void mbedtls_gcm_free( mbedtls_gcm_context *ctx ) 506817466cbSJens Wiklander { 507817466cbSJens Wiklander mbedtls_cipher_free( &ctx->cipher_ctx ); 508817466cbSJens Wiklander mbedtls_zeroize( ctx, sizeof( mbedtls_gcm_context ) ); 509817466cbSJens Wiklander } 510817466cbSJens Wiklander 511817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) && defined(MBEDTLS_AES_C) 512817466cbSJens Wiklander /* 513817466cbSJens Wiklander * AES-GCM test vectors from: 514817466cbSJens Wiklander * 515817466cbSJens Wiklander * http://csrc.nist.gov/groups/STM/cavp/documents/mac/gcmtestvectors.zip 516817466cbSJens Wiklander */ 517817466cbSJens Wiklander #define MAX_TESTS 6 518817466cbSJens Wiklander 519817466cbSJens Wiklander static const int key_index[MAX_TESTS] = 520817466cbSJens Wiklander { 0, 0, 1, 1, 1, 1 }; 521817466cbSJens Wiklander 522817466cbSJens Wiklander static const unsigned char key[MAX_TESTS][32] = 523817466cbSJens Wiklander { 524817466cbSJens Wiklander { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 525817466cbSJens Wiklander 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 526817466cbSJens Wiklander 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 527817466cbSJens Wiklander 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 528817466cbSJens Wiklander { 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, 529817466cbSJens Wiklander 0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08, 530817466cbSJens Wiklander 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, 531817466cbSJens Wiklander 0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08 }, 532817466cbSJens Wiklander }; 533817466cbSJens Wiklander 534817466cbSJens Wiklander static const size_t iv_len[MAX_TESTS] = 535817466cbSJens Wiklander { 12, 12, 12, 12, 8, 60 }; 536817466cbSJens Wiklander 537817466cbSJens Wiklander static const int iv_index[MAX_TESTS] = 538817466cbSJens Wiklander { 0, 0, 1, 1, 1, 2 }; 539817466cbSJens Wiklander 540817466cbSJens Wiklander static const unsigned char iv[MAX_TESTS][64] = 541817466cbSJens Wiklander { 542817466cbSJens Wiklander { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 543817466cbSJens Wiklander 0x00, 0x00, 0x00, 0x00 }, 544817466cbSJens Wiklander { 0xca, 0xfe, 0xba, 0xbe, 0xfa, 0xce, 0xdb, 0xad, 545817466cbSJens Wiklander 0xde, 0xca, 0xf8, 0x88 }, 546817466cbSJens Wiklander { 0x93, 0x13, 0x22, 0x5d, 0xf8, 0x84, 0x06, 0xe5, 547817466cbSJens Wiklander 0x55, 0x90, 0x9c, 0x5a, 0xff, 0x52, 0x69, 0xaa, 548817466cbSJens Wiklander 0x6a, 0x7a, 0x95, 0x38, 0x53, 0x4f, 0x7d, 0xa1, 549817466cbSJens Wiklander 0xe4, 0xc3, 0x03, 0xd2, 0xa3, 0x18, 0xa7, 0x28, 550817466cbSJens Wiklander 0xc3, 0xc0, 0xc9, 0x51, 0x56, 0x80, 0x95, 0x39, 551817466cbSJens Wiklander 0xfc, 0xf0, 0xe2, 0x42, 0x9a, 0x6b, 0x52, 0x54, 552817466cbSJens Wiklander 0x16, 0xae, 0xdb, 0xf5, 0xa0, 0xde, 0x6a, 0x57, 553817466cbSJens Wiklander 0xa6, 0x37, 0xb3, 0x9b }, 554817466cbSJens Wiklander }; 555817466cbSJens Wiklander 556817466cbSJens Wiklander static const size_t add_len[MAX_TESTS] = 557817466cbSJens Wiklander { 0, 0, 0, 20, 20, 20 }; 558817466cbSJens Wiklander 559817466cbSJens Wiklander static const int add_index[MAX_TESTS] = 560817466cbSJens Wiklander { 0, 0, 0, 1, 1, 1 }; 561817466cbSJens Wiklander 562817466cbSJens Wiklander static const unsigned char additional[MAX_TESTS][64] = 563817466cbSJens Wiklander { 564817466cbSJens Wiklander { 0x00 }, 565817466cbSJens Wiklander { 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef, 566817466cbSJens Wiklander 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef, 567817466cbSJens Wiklander 0xab, 0xad, 0xda, 0xd2 }, 568817466cbSJens Wiklander }; 569817466cbSJens Wiklander 570817466cbSJens Wiklander static const size_t pt_len[MAX_TESTS] = 571817466cbSJens Wiklander { 0, 16, 64, 60, 60, 60 }; 572817466cbSJens Wiklander 573817466cbSJens Wiklander static const int pt_index[MAX_TESTS] = 574817466cbSJens Wiklander { 0, 0, 1, 1, 1, 1 }; 575817466cbSJens Wiklander 576817466cbSJens Wiklander static const unsigned char pt[MAX_TESTS][64] = 577817466cbSJens Wiklander { 578817466cbSJens Wiklander { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 579817466cbSJens Wiklander 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 580817466cbSJens Wiklander { 0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5, 581817466cbSJens Wiklander 0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a, 582817466cbSJens Wiklander 0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda, 583817466cbSJens Wiklander 0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72, 584817466cbSJens Wiklander 0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53, 585817466cbSJens Wiklander 0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25, 586817466cbSJens Wiklander 0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57, 587817466cbSJens Wiklander 0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55 }, 588817466cbSJens Wiklander }; 589817466cbSJens Wiklander 590817466cbSJens Wiklander static const unsigned char ct[MAX_TESTS * 3][64] = 591817466cbSJens Wiklander { 592817466cbSJens Wiklander { 0x00 }, 593817466cbSJens Wiklander { 0x03, 0x88, 0xda, 0xce, 0x60, 0xb6, 0xa3, 0x92, 594817466cbSJens Wiklander 0xf3, 0x28, 0xc2, 0xb9, 0x71, 0xb2, 0xfe, 0x78 }, 595817466cbSJens Wiklander { 0x42, 0x83, 0x1e, 0xc2, 0x21, 0x77, 0x74, 0x24, 596817466cbSJens Wiklander 0x4b, 0x72, 0x21, 0xb7, 0x84, 0xd0, 0xd4, 0x9c, 597817466cbSJens Wiklander 0xe3, 0xaa, 0x21, 0x2f, 0x2c, 0x02, 0xa4, 0xe0, 598817466cbSJens Wiklander 0x35, 0xc1, 0x7e, 0x23, 0x29, 0xac, 0xa1, 0x2e, 599817466cbSJens Wiklander 0x21, 0xd5, 0x14, 0xb2, 0x54, 0x66, 0x93, 0x1c, 600817466cbSJens Wiklander 0x7d, 0x8f, 0x6a, 0x5a, 0xac, 0x84, 0xaa, 0x05, 601817466cbSJens Wiklander 0x1b, 0xa3, 0x0b, 0x39, 0x6a, 0x0a, 0xac, 0x97, 602817466cbSJens Wiklander 0x3d, 0x58, 0xe0, 0x91, 0x47, 0x3f, 0x59, 0x85 }, 603817466cbSJens Wiklander { 0x42, 0x83, 0x1e, 0xc2, 0x21, 0x77, 0x74, 0x24, 604817466cbSJens Wiklander 0x4b, 0x72, 0x21, 0xb7, 0x84, 0xd0, 0xd4, 0x9c, 605817466cbSJens Wiklander 0xe3, 0xaa, 0x21, 0x2f, 0x2c, 0x02, 0xa4, 0xe0, 606817466cbSJens Wiklander 0x35, 0xc1, 0x7e, 0x23, 0x29, 0xac, 0xa1, 0x2e, 607817466cbSJens Wiklander 0x21, 0xd5, 0x14, 0xb2, 0x54, 0x66, 0x93, 0x1c, 608817466cbSJens Wiklander 0x7d, 0x8f, 0x6a, 0x5a, 0xac, 0x84, 0xaa, 0x05, 609817466cbSJens Wiklander 0x1b, 0xa3, 0x0b, 0x39, 0x6a, 0x0a, 0xac, 0x97, 610817466cbSJens Wiklander 0x3d, 0x58, 0xe0, 0x91 }, 611817466cbSJens Wiklander { 0x61, 0x35, 0x3b, 0x4c, 0x28, 0x06, 0x93, 0x4a, 612817466cbSJens Wiklander 0x77, 0x7f, 0xf5, 0x1f, 0xa2, 0x2a, 0x47, 0x55, 613817466cbSJens Wiklander 0x69, 0x9b, 0x2a, 0x71, 0x4f, 0xcd, 0xc6, 0xf8, 614817466cbSJens Wiklander 0x37, 0x66, 0xe5, 0xf9, 0x7b, 0x6c, 0x74, 0x23, 615817466cbSJens Wiklander 0x73, 0x80, 0x69, 0x00, 0xe4, 0x9f, 0x24, 0xb2, 616817466cbSJens Wiklander 0x2b, 0x09, 0x75, 0x44, 0xd4, 0x89, 0x6b, 0x42, 617817466cbSJens Wiklander 0x49, 0x89, 0xb5, 0xe1, 0xeb, 0xac, 0x0f, 0x07, 618817466cbSJens Wiklander 0xc2, 0x3f, 0x45, 0x98 }, 619817466cbSJens Wiklander { 0x8c, 0xe2, 0x49, 0x98, 0x62, 0x56, 0x15, 0xb6, 620817466cbSJens Wiklander 0x03, 0xa0, 0x33, 0xac, 0xa1, 0x3f, 0xb8, 0x94, 621817466cbSJens Wiklander 0xbe, 0x91, 0x12, 0xa5, 0xc3, 0xa2, 0x11, 0xa8, 622817466cbSJens Wiklander 0xba, 0x26, 0x2a, 0x3c, 0xca, 0x7e, 0x2c, 0xa7, 623817466cbSJens Wiklander 0x01, 0xe4, 0xa9, 0xa4, 0xfb, 0xa4, 0x3c, 0x90, 624817466cbSJens Wiklander 0xcc, 0xdc, 0xb2, 0x81, 0xd4, 0x8c, 0x7c, 0x6f, 625817466cbSJens Wiklander 0xd6, 0x28, 0x75, 0xd2, 0xac, 0xa4, 0x17, 0x03, 626817466cbSJens Wiklander 0x4c, 0x34, 0xae, 0xe5 }, 627817466cbSJens Wiklander { 0x00 }, 628817466cbSJens Wiklander { 0x98, 0xe7, 0x24, 0x7c, 0x07, 0xf0, 0xfe, 0x41, 629817466cbSJens Wiklander 0x1c, 0x26, 0x7e, 0x43, 0x84, 0xb0, 0xf6, 0x00 }, 630817466cbSJens Wiklander { 0x39, 0x80, 0xca, 0x0b, 0x3c, 0x00, 0xe8, 0x41, 631817466cbSJens Wiklander 0xeb, 0x06, 0xfa, 0xc4, 0x87, 0x2a, 0x27, 0x57, 632817466cbSJens Wiklander 0x85, 0x9e, 0x1c, 0xea, 0xa6, 0xef, 0xd9, 0x84, 633817466cbSJens Wiklander 0x62, 0x85, 0x93, 0xb4, 0x0c, 0xa1, 0xe1, 0x9c, 634817466cbSJens Wiklander 0x7d, 0x77, 0x3d, 0x00, 0xc1, 0x44, 0xc5, 0x25, 635817466cbSJens Wiklander 0xac, 0x61, 0x9d, 0x18, 0xc8, 0x4a, 0x3f, 0x47, 636817466cbSJens Wiklander 0x18, 0xe2, 0x44, 0x8b, 0x2f, 0xe3, 0x24, 0xd9, 637817466cbSJens Wiklander 0xcc, 0xda, 0x27, 0x10, 0xac, 0xad, 0xe2, 0x56 }, 638817466cbSJens Wiklander { 0x39, 0x80, 0xca, 0x0b, 0x3c, 0x00, 0xe8, 0x41, 639817466cbSJens Wiklander 0xeb, 0x06, 0xfa, 0xc4, 0x87, 0x2a, 0x27, 0x57, 640817466cbSJens Wiklander 0x85, 0x9e, 0x1c, 0xea, 0xa6, 0xef, 0xd9, 0x84, 641817466cbSJens Wiklander 0x62, 0x85, 0x93, 0xb4, 0x0c, 0xa1, 0xe1, 0x9c, 642817466cbSJens Wiklander 0x7d, 0x77, 0x3d, 0x00, 0xc1, 0x44, 0xc5, 0x25, 643817466cbSJens Wiklander 0xac, 0x61, 0x9d, 0x18, 0xc8, 0x4a, 0x3f, 0x47, 644817466cbSJens Wiklander 0x18, 0xe2, 0x44, 0x8b, 0x2f, 0xe3, 0x24, 0xd9, 645817466cbSJens Wiklander 0xcc, 0xda, 0x27, 0x10 }, 646817466cbSJens Wiklander { 0x0f, 0x10, 0xf5, 0x99, 0xae, 0x14, 0xa1, 0x54, 647817466cbSJens Wiklander 0xed, 0x24, 0xb3, 0x6e, 0x25, 0x32, 0x4d, 0xb8, 648817466cbSJens Wiklander 0xc5, 0x66, 0x63, 0x2e, 0xf2, 0xbb, 0xb3, 0x4f, 649817466cbSJens Wiklander 0x83, 0x47, 0x28, 0x0f, 0xc4, 0x50, 0x70, 0x57, 650817466cbSJens Wiklander 0xfd, 0xdc, 0x29, 0xdf, 0x9a, 0x47, 0x1f, 0x75, 651817466cbSJens Wiklander 0xc6, 0x65, 0x41, 0xd4, 0xd4, 0xda, 0xd1, 0xc9, 652817466cbSJens Wiklander 0xe9, 0x3a, 0x19, 0xa5, 0x8e, 0x8b, 0x47, 0x3f, 653817466cbSJens Wiklander 0xa0, 0xf0, 0x62, 0xf7 }, 654817466cbSJens Wiklander { 0xd2, 0x7e, 0x88, 0x68, 0x1c, 0xe3, 0x24, 0x3c, 655817466cbSJens Wiklander 0x48, 0x30, 0x16, 0x5a, 0x8f, 0xdc, 0xf9, 0xff, 656817466cbSJens Wiklander 0x1d, 0xe9, 0xa1, 0xd8, 0xe6, 0xb4, 0x47, 0xef, 657817466cbSJens Wiklander 0x6e, 0xf7, 0xb7, 0x98, 0x28, 0x66, 0x6e, 0x45, 658817466cbSJens Wiklander 0x81, 0xe7, 0x90, 0x12, 0xaf, 0x34, 0xdd, 0xd9, 659817466cbSJens Wiklander 0xe2, 0xf0, 0x37, 0x58, 0x9b, 0x29, 0x2d, 0xb3, 660817466cbSJens Wiklander 0xe6, 0x7c, 0x03, 0x67, 0x45, 0xfa, 0x22, 0xe7, 661817466cbSJens Wiklander 0xe9, 0xb7, 0x37, 0x3b }, 662817466cbSJens Wiklander { 0x00 }, 663817466cbSJens Wiklander { 0xce, 0xa7, 0x40, 0x3d, 0x4d, 0x60, 0x6b, 0x6e, 664817466cbSJens Wiklander 0x07, 0x4e, 0xc5, 0xd3, 0xba, 0xf3, 0x9d, 0x18 }, 665817466cbSJens Wiklander { 0x52, 0x2d, 0xc1, 0xf0, 0x99, 0x56, 0x7d, 0x07, 666817466cbSJens Wiklander 0xf4, 0x7f, 0x37, 0xa3, 0x2a, 0x84, 0x42, 0x7d, 667817466cbSJens Wiklander 0x64, 0x3a, 0x8c, 0xdc, 0xbf, 0xe5, 0xc0, 0xc9, 668817466cbSJens Wiklander 0x75, 0x98, 0xa2, 0xbd, 0x25, 0x55, 0xd1, 0xaa, 669817466cbSJens Wiklander 0x8c, 0xb0, 0x8e, 0x48, 0x59, 0x0d, 0xbb, 0x3d, 670817466cbSJens Wiklander 0xa7, 0xb0, 0x8b, 0x10, 0x56, 0x82, 0x88, 0x38, 671817466cbSJens Wiklander 0xc5, 0xf6, 0x1e, 0x63, 0x93, 0xba, 0x7a, 0x0a, 672817466cbSJens Wiklander 0xbc, 0xc9, 0xf6, 0x62, 0x89, 0x80, 0x15, 0xad }, 673817466cbSJens Wiklander { 0x52, 0x2d, 0xc1, 0xf0, 0x99, 0x56, 0x7d, 0x07, 674817466cbSJens Wiklander 0xf4, 0x7f, 0x37, 0xa3, 0x2a, 0x84, 0x42, 0x7d, 675817466cbSJens Wiklander 0x64, 0x3a, 0x8c, 0xdc, 0xbf, 0xe5, 0xc0, 0xc9, 676817466cbSJens Wiklander 0x75, 0x98, 0xa2, 0xbd, 0x25, 0x55, 0xd1, 0xaa, 677817466cbSJens Wiklander 0x8c, 0xb0, 0x8e, 0x48, 0x59, 0x0d, 0xbb, 0x3d, 678817466cbSJens Wiklander 0xa7, 0xb0, 0x8b, 0x10, 0x56, 0x82, 0x88, 0x38, 679817466cbSJens Wiklander 0xc5, 0xf6, 0x1e, 0x63, 0x93, 0xba, 0x7a, 0x0a, 680817466cbSJens Wiklander 0xbc, 0xc9, 0xf6, 0x62 }, 681817466cbSJens Wiklander { 0xc3, 0x76, 0x2d, 0xf1, 0xca, 0x78, 0x7d, 0x32, 682817466cbSJens Wiklander 0xae, 0x47, 0xc1, 0x3b, 0xf1, 0x98, 0x44, 0xcb, 683817466cbSJens Wiklander 0xaf, 0x1a, 0xe1, 0x4d, 0x0b, 0x97, 0x6a, 0xfa, 684817466cbSJens Wiklander 0xc5, 0x2f, 0xf7, 0xd7, 0x9b, 0xba, 0x9d, 0xe0, 685817466cbSJens Wiklander 0xfe, 0xb5, 0x82, 0xd3, 0x39, 0x34, 0xa4, 0xf0, 686817466cbSJens Wiklander 0x95, 0x4c, 0xc2, 0x36, 0x3b, 0xc7, 0x3f, 0x78, 687817466cbSJens Wiklander 0x62, 0xac, 0x43, 0x0e, 0x64, 0xab, 0xe4, 0x99, 688817466cbSJens Wiklander 0xf4, 0x7c, 0x9b, 0x1f }, 689817466cbSJens Wiklander { 0x5a, 0x8d, 0xef, 0x2f, 0x0c, 0x9e, 0x53, 0xf1, 690817466cbSJens Wiklander 0xf7, 0x5d, 0x78, 0x53, 0x65, 0x9e, 0x2a, 0x20, 691817466cbSJens Wiklander 0xee, 0xb2, 0xb2, 0x2a, 0xaf, 0xde, 0x64, 0x19, 692817466cbSJens Wiklander 0xa0, 0x58, 0xab, 0x4f, 0x6f, 0x74, 0x6b, 0xf4, 693817466cbSJens Wiklander 0x0f, 0xc0, 0xc3, 0xb7, 0x80, 0xf2, 0x44, 0x45, 694817466cbSJens Wiklander 0x2d, 0xa3, 0xeb, 0xf1, 0xc5, 0xd8, 0x2c, 0xde, 695817466cbSJens Wiklander 0xa2, 0x41, 0x89, 0x97, 0x20, 0x0e, 0xf8, 0x2e, 696817466cbSJens Wiklander 0x44, 0xae, 0x7e, 0x3f }, 697817466cbSJens Wiklander }; 698817466cbSJens Wiklander 699817466cbSJens Wiklander static const unsigned char tag[MAX_TESTS * 3][16] = 700817466cbSJens Wiklander { 701817466cbSJens Wiklander { 0x58, 0xe2, 0xfc, 0xce, 0xfa, 0x7e, 0x30, 0x61, 702817466cbSJens Wiklander 0x36, 0x7f, 0x1d, 0x57, 0xa4, 0xe7, 0x45, 0x5a }, 703817466cbSJens Wiklander { 0xab, 0x6e, 0x47, 0xd4, 0x2c, 0xec, 0x13, 0xbd, 704817466cbSJens Wiklander 0xf5, 0x3a, 0x67, 0xb2, 0x12, 0x57, 0xbd, 0xdf }, 705817466cbSJens Wiklander { 0x4d, 0x5c, 0x2a, 0xf3, 0x27, 0xcd, 0x64, 0xa6, 706817466cbSJens Wiklander 0x2c, 0xf3, 0x5a, 0xbd, 0x2b, 0xa6, 0xfa, 0xb4 }, 707817466cbSJens Wiklander { 0x5b, 0xc9, 0x4f, 0xbc, 0x32, 0x21, 0xa5, 0xdb, 708817466cbSJens Wiklander 0x94, 0xfa, 0xe9, 0x5a, 0xe7, 0x12, 0x1a, 0x47 }, 709817466cbSJens Wiklander { 0x36, 0x12, 0xd2, 0xe7, 0x9e, 0x3b, 0x07, 0x85, 710817466cbSJens Wiklander 0x56, 0x1b, 0xe1, 0x4a, 0xac, 0xa2, 0xfc, 0xcb }, 711817466cbSJens Wiklander { 0x61, 0x9c, 0xc5, 0xae, 0xff, 0xfe, 0x0b, 0xfa, 712817466cbSJens Wiklander 0x46, 0x2a, 0xf4, 0x3c, 0x16, 0x99, 0xd0, 0x50 }, 713817466cbSJens Wiklander { 0xcd, 0x33, 0xb2, 0x8a, 0xc7, 0x73, 0xf7, 0x4b, 714817466cbSJens Wiklander 0xa0, 0x0e, 0xd1, 0xf3, 0x12, 0x57, 0x24, 0x35 }, 715817466cbSJens Wiklander { 0x2f, 0xf5, 0x8d, 0x80, 0x03, 0x39, 0x27, 0xab, 716817466cbSJens Wiklander 0x8e, 0xf4, 0xd4, 0x58, 0x75, 0x14, 0xf0, 0xfb }, 717817466cbSJens Wiklander { 0x99, 0x24, 0xa7, 0xc8, 0x58, 0x73, 0x36, 0xbf, 718817466cbSJens Wiklander 0xb1, 0x18, 0x02, 0x4d, 0xb8, 0x67, 0x4a, 0x14 }, 719817466cbSJens Wiklander { 0x25, 0x19, 0x49, 0x8e, 0x80, 0xf1, 0x47, 0x8f, 720817466cbSJens Wiklander 0x37, 0xba, 0x55, 0xbd, 0x6d, 0x27, 0x61, 0x8c }, 721817466cbSJens Wiklander { 0x65, 0xdc, 0xc5, 0x7f, 0xcf, 0x62, 0x3a, 0x24, 722817466cbSJens Wiklander 0x09, 0x4f, 0xcc, 0xa4, 0x0d, 0x35, 0x33, 0xf8 }, 723817466cbSJens Wiklander { 0xdc, 0xf5, 0x66, 0xff, 0x29, 0x1c, 0x25, 0xbb, 724817466cbSJens Wiklander 0xb8, 0x56, 0x8f, 0xc3, 0xd3, 0x76, 0xa6, 0xd9 }, 725817466cbSJens Wiklander { 0x53, 0x0f, 0x8a, 0xfb, 0xc7, 0x45, 0x36, 0xb9, 726817466cbSJens Wiklander 0xa9, 0x63, 0xb4, 0xf1, 0xc4, 0xcb, 0x73, 0x8b }, 727817466cbSJens Wiklander { 0xd0, 0xd1, 0xc8, 0xa7, 0x99, 0x99, 0x6b, 0xf0, 728817466cbSJens Wiklander 0x26, 0x5b, 0x98, 0xb5, 0xd4, 0x8a, 0xb9, 0x19 }, 729817466cbSJens Wiklander { 0xb0, 0x94, 0xda, 0xc5, 0xd9, 0x34, 0x71, 0xbd, 730817466cbSJens Wiklander 0xec, 0x1a, 0x50, 0x22, 0x70, 0xe3, 0xcc, 0x6c }, 731817466cbSJens Wiklander { 0x76, 0xfc, 0x6e, 0xce, 0x0f, 0x4e, 0x17, 0x68, 732817466cbSJens Wiklander 0xcd, 0xdf, 0x88, 0x53, 0xbb, 0x2d, 0x55, 0x1b }, 733817466cbSJens Wiklander { 0x3a, 0x33, 0x7d, 0xbf, 0x46, 0xa7, 0x92, 0xc4, 734817466cbSJens Wiklander 0x5e, 0x45, 0x49, 0x13, 0xfe, 0x2e, 0xa8, 0xf2 }, 735817466cbSJens Wiklander { 0xa4, 0x4a, 0x82, 0x66, 0xee, 0x1c, 0x8e, 0xb0, 736817466cbSJens Wiklander 0xc8, 0xb5, 0xd4, 0xcf, 0x5a, 0xe9, 0xf1, 0x9a }, 737817466cbSJens Wiklander }; 738817466cbSJens Wiklander 739817466cbSJens Wiklander int mbedtls_gcm_self_test( int verbose ) 740817466cbSJens Wiklander { 741817466cbSJens Wiklander mbedtls_gcm_context ctx; 742817466cbSJens Wiklander unsigned char buf[64]; 743817466cbSJens Wiklander unsigned char tag_buf[16]; 744817466cbSJens Wiklander int i, j, ret; 745817466cbSJens Wiklander mbedtls_cipher_id_t cipher = MBEDTLS_CIPHER_ID_AES; 746817466cbSJens Wiklander 747817466cbSJens Wiklander mbedtls_gcm_init( &ctx ); 748817466cbSJens Wiklander 749817466cbSJens Wiklander for( j = 0; j < 3; j++ ) 750817466cbSJens Wiklander { 751817466cbSJens Wiklander int key_len = 128 + 64 * j; 752817466cbSJens Wiklander 753817466cbSJens Wiklander for( i = 0; i < MAX_TESTS; i++ ) 754817466cbSJens Wiklander { 755817466cbSJens Wiklander if( verbose != 0 ) 756817466cbSJens Wiklander mbedtls_printf( " AES-GCM-%3d #%d (%s): ", 757817466cbSJens Wiklander key_len, i, "enc" ); 758817466cbSJens Wiklander 759817466cbSJens Wiklander mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len ); 760817466cbSJens Wiklander 761817466cbSJens Wiklander ret = mbedtls_gcm_crypt_and_tag( &ctx, MBEDTLS_GCM_ENCRYPT, 762817466cbSJens Wiklander pt_len[i], 763817466cbSJens Wiklander iv[iv_index[i]], iv_len[i], 764817466cbSJens Wiklander additional[add_index[i]], add_len[i], 765817466cbSJens Wiklander pt[pt_index[i]], buf, 16, tag_buf ); 766817466cbSJens Wiklander 767817466cbSJens Wiklander if( ret != 0 || 768817466cbSJens Wiklander memcmp( buf, ct[j * 6 + i], pt_len[i] ) != 0 || 769817466cbSJens Wiklander memcmp( tag_buf, tag[j * 6 + i], 16 ) != 0 ) 770817466cbSJens Wiklander { 771817466cbSJens Wiklander if( verbose != 0 ) 772817466cbSJens Wiklander mbedtls_printf( "failed\n" ); 773817466cbSJens Wiklander 774817466cbSJens Wiklander return( 1 ); 775817466cbSJens Wiklander } 776817466cbSJens Wiklander 777817466cbSJens Wiklander mbedtls_gcm_free( &ctx ); 778817466cbSJens Wiklander 779817466cbSJens Wiklander if( verbose != 0 ) 780817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 781817466cbSJens Wiklander 782817466cbSJens Wiklander if( verbose != 0 ) 783817466cbSJens Wiklander mbedtls_printf( " AES-GCM-%3d #%d (%s): ", 784817466cbSJens Wiklander key_len, i, "dec" ); 785817466cbSJens Wiklander 786817466cbSJens Wiklander mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len ); 787817466cbSJens Wiklander 788817466cbSJens Wiklander ret = mbedtls_gcm_crypt_and_tag( &ctx, MBEDTLS_GCM_DECRYPT, 789817466cbSJens Wiklander pt_len[i], 790817466cbSJens Wiklander iv[iv_index[i]], iv_len[i], 791817466cbSJens Wiklander additional[add_index[i]], add_len[i], 792817466cbSJens Wiklander ct[j * 6 + i], buf, 16, tag_buf ); 793817466cbSJens Wiklander 794817466cbSJens Wiklander if( ret != 0 || 795817466cbSJens Wiklander memcmp( buf, pt[pt_index[i]], pt_len[i] ) != 0 || 796817466cbSJens Wiklander memcmp( tag_buf, tag[j * 6 + i], 16 ) != 0 ) 797817466cbSJens Wiklander { 798817466cbSJens Wiklander if( verbose != 0 ) 799817466cbSJens Wiklander mbedtls_printf( "failed\n" ); 800817466cbSJens Wiklander 801817466cbSJens Wiklander return( 1 ); 802817466cbSJens Wiklander } 803817466cbSJens Wiklander 804817466cbSJens Wiklander mbedtls_gcm_free( &ctx ); 805817466cbSJens Wiklander 806817466cbSJens Wiklander if( verbose != 0 ) 807817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 808817466cbSJens Wiklander 809817466cbSJens Wiklander if( verbose != 0 ) 810817466cbSJens Wiklander mbedtls_printf( " AES-GCM-%3d #%d split (%s): ", 811817466cbSJens Wiklander key_len, i, "enc" ); 812817466cbSJens Wiklander 813817466cbSJens Wiklander mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len ); 814817466cbSJens Wiklander 815817466cbSJens Wiklander ret = mbedtls_gcm_starts( &ctx, MBEDTLS_GCM_ENCRYPT, 816817466cbSJens Wiklander iv[iv_index[i]], iv_len[i], 817817466cbSJens Wiklander additional[add_index[i]], add_len[i] ); 818817466cbSJens Wiklander if( ret != 0 ) 819817466cbSJens Wiklander { 820817466cbSJens Wiklander if( verbose != 0 ) 821817466cbSJens Wiklander mbedtls_printf( "failed\n" ); 822817466cbSJens Wiklander 823817466cbSJens Wiklander return( 1 ); 824817466cbSJens Wiklander } 825817466cbSJens Wiklander 826817466cbSJens Wiklander if( pt_len[i] > 32 ) 827817466cbSJens Wiklander { 828817466cbSJens Wiklander size_t rest_len = pt_len[i] - 32; 829817466cbSJens Wiklander ret = mbedtls_gcm_update( &ctx, 32, pt[pt_index[i]], buf ); 830817466cbSJens Wiklander if( ret != 0 ) 831817466cbSJens Wiklander { 832817466cbSJens Wiklander if( verbose != 0 ) 833817466cbSJens Wiklander mbedtls_printf( "failed\n" ); 834817466cbSJens Wiklander 835817466cbSJens Wiklander return( 1 ); 836817466cbSJens Wiklander } 837817466cbSJens Wiklander 838817466cbSJens Wiklander ret = mbedtls_gcm_update( &ctx, rest_len, pt[pt_index[i]] + 32, 839817466cbSJens Wiklander buf + 32 ); 840817466cbSJens Wiklander if( ret != 0 ) 841817466cbSJens Wiklander { 842817466cbSJens Wiklander if( verbose != 0 ) 843817466cbSJens Wiklander mbedtls_printf( "failed\n" ); 844817466cbSJens Wiklander 845817466cbSJens Wiklander return( 1 ); 846817466cbSJens Wiklander } 847817466cbSJens Wiklander } 848817466cbSJens Wiklander else 849817466cbSJens Wiklander { 850817466cbSJens Wiklander ret = mbedtls_gcm_update( &ctx, pt_len[i], pt[pt_index[i]], buf ); 851817466cbSJens Wiklander if( ret != 0 ) 852817466cbSJens Wiklander { 853817466cbSJens Wiklander if( verbose != 0 ) 854817466cbSJens Wiklander mbedtls_printf( "failed\n" ); 855817466cbSJens Wiklander 856817466cbSJens Wiklander return( 1 ); 857817466cbSJens Wiklander } 858817466cbSJens Wiklander } 859817466cbSJens Wiklander 860817466cbSJens Wiklander ret = mbedtls_gcm_finish( &ctx, tag_buf, 16 ); 861817466cbSJens Wiklander if( ret != 0 || 862817466cbSJens Wiklander memcmp( buf, ct[j * 6 + i], pt_len[i] ) != 0 || 863817466cbSJens Wiklander memcmp( tag_buf, tag[j * 6 + i], 16 ) != 0 ) 864817466cbSJens Wiklander { 865817466cbSJens Wiklander if( verbose != 0 ) 866817466cbSJens Wiklander mbedtls_printf( "failed\n" ); 867817466cbSJens Wiklander 868817466cbSJens Wiklander return( 1 ); 869817466cbSJens Wiklander } 870817466cbSJens Wiklander 871817466cbSJens Wiklander mbedtls_gcm_free( &ctx ); 872817466cbSJens Wiklander 873817466cbSJens Wiklander if( verbose != 0 ) 874817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 875817466cbSJens Wiklander 876817466cbSJens Wiklander if( verbose != 0 ) 877817466cbSJens Wiklander mbedtls_printf( " AES-GCM-%3d #%d split (%s): ", 878817466cbSJens Wiklander key_len, i, "dec" ); 879817466cbSJens Wiklander 880817466cbSJens Wiklander mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len ); 881817466cbSJens Wiklander 882817466cbSJens Wiklander ret = mbedtls_gcm_starts( &ctx, MBEDTLS_GCM_DECRYPT, 883817466cbSJens Wiklander iv[iv_index[i]], iv_len[i], 884817466cbSJens Wiklander additional[add_index[i]], add_len[i] ); 885817466cbSJens Wiklander if( ret != 0 ) 886817466cbSJens Wiklander { 887817466cbSJens Wiklander if( verbose != 0 ) 888817466cbSJens Wiklander mbedtls_printf( "failed\n" ); 889817466cbSJens Wiklander 890817466cbSJens Wiklander return( 1 ); 891817466cbSJens Wiklander } 892817466cbSJens Wiklander 893817466cbSJens Wiklander if( pt_len[i] > 32 ) 894817466cbSJens Wiklander { 895817466cbSJens Wiklander size_t rest_len = pt_len[i] - 32; 896817466cbSJens Wiklander ret = mbedtls_gcm_update( &ctx, 32, ct[j * 6 + i], buf ); 897817466cbSJens Wiklander if( ret != 0 ) 898817466cbSJens Wiklander { 899817466cbSJens Wiklander if( verbose != 0 ) 900817466cbSJens Wiklander mbedtls_printf( "failed\n" ); 901817466cbSJens Wiklander 902817466cbSJens Wiklander return( 1 ); 903817466cbSJens Wiklander } 904817466cbSJens Wiklander 905817466cbSJens Wiklander ret = mbedtls_gcm_update( &ctx, rest_len, ct[j * 6 + i] + 32, 906817466cbSJens Wiklander buf + 32 ); 907817466cbSJens Wiklander if( ret != 0 ) 908817466cbSJens Wiklander { 909817466cbSJens Wiklander if( verbose != 0 ) 910817466cbSJens Wiklander mbedtls_printf( "failed\n" ); 911817466cbSJens Wiklander 912817466cbSJens Wiklander return( 1 ); 913817466cbSJens Wiklander } 914817466cbSJens Wiklander } 915817466cbSJens Wiklander else 916817466cbSJens Wiklander { 917817466cbSJens Wiklander ret = mbedtls_gcm_update( &ctx, pt_len[i], ct[j * 6 + i], buf ); 918817466cbSJens Wiklander if( ret != 0 ) 919817466cbSJens Wiklander { 920817466cbSJens Wiklander if( verbose != 0 ) 921817466cbSJens Wiklander mbedtls_printf( "failed\n" ); 922817466cbSJens Wiklander 923817466cbSJens Wiklander return( 1 ); 924817466cbSJens Wiklander } 925817466cbSJens Wiklander } 926817466cbSJens Wiklander 927817466cbSJens Wiklander ret = mbedtls_gcm_finish( &ctx, tag_buf, 16 ); 928817466cbSJens Wiklander if( ret != 0 || 929817466cbSJens Wiklander memcmp( buf, pt[pt_index[i]], pt_len[i] ) != 0 || 930817466cbSJens Wiklander memcmp( tag_buf, tag[j * 6 + i], 16 ) != 0 ) 931817466cbSJens Wiklander { 932817466cbSJens Wiklander if( verbose != 0 ) 933817466cbSJens Wiklander mbedtls_printf( "failed\n" ); 934817466cbSJens Wiklander 935817466cbSJens Wiklander return( 1 ); 936817466cbSJens Wiklander } 937817466cbSJens Wiklander 938817466cbSJens Wiklander mbedtls_gcm_free( &ctx ); 939817466cbSJens Wiklander 940817466cbSJens Wiklander if( verbose != 0 ) 941817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 942817466cbSJens Wiklander 943817466cbSJens Wiklander } 944817466cbSJens Wiklander } 945817466cbSJens Wiklander 946817466cbSJens Wiklander if( verbose != 0 ) 947817466cbSJens Wiklander mbedtls_printf( "\n" ); 948817466cbSJens Wiklander 949817466cbSJens Wiklander return( 0 ); 950817466cbSJens Wiklander } 951817466cbSJens Wiklander 952817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST && MBEDTLS_AES_C */ 953817466cbSJens Wiklander 954817466cbSJens Wiklander #endif /* MBEDTLS_GCM_C */ 955