ReactOS 0.4.16-dev-329-g9223134
gcm.c
Go to the documentation of this file.
1/*
2 * NIST SP800-38D compliant GCM implementation
3 *
4 * Copyright The Mbed TLS Contributors
5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
6 *
7 * This file is provided under the Apache License 2.0, or the
8 * GNU General Public License v2.0 or later.
9 *
10 * **********
11 * Apache License 2.0:
12 *
13 * Licensed under the Apache License, Version 2.0 (the "License"); you may
14 * not use this file except in compliance with the License.
15 * You may obtain a copy of the License at
16 *
17 * http://www.apache.org/licenses/LICENSE-2.0
18 *
19 * Unless required by applicable law or agreed to in writing, software
20 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
21 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
22 * See the License for the specific language governing permissions and
23 * limitations under the License.
24 *
25 * **********
26 *
27 * **********
28 * GNU General Public License v2.0 or later:
29 *
30 * This program is free software; you can redistribute it and/or modify
31 * it under the terms of the GNU General Public License as published by
32 * the Free Software Foundation; either version 2 of the License, or
33 * (at your option) any later version.
34 *
35 * This program is distributed in the hope that it will be useful,
36 * but WITHOUT ANY WARRANTY; without even the implied warranty of
37 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
38 * GNU General Public License for more details.
39 *
40 * You should have received a copy of the GNU General Public License along
41 * with this program; if not, write to the Free Software Foundation, Inc.,
42 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
43 *
44 * **********
45 */
46
47/*
48 * http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf
49 *
50 * See also:
51 * [MGV] http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/gcm/gcm-revised-spec.pdf
52 *
53 * We use the algorithm described as Shoup's method with 4-bit tables in
54 * [MGV] 4.1, pp. 12-13, to enhance speed without using too much memory.
55 */
56
57#if !defined(MBEDTLS_CONFIG_FILE)
58#include "mbedtls/config.h"
59#else
60#include MBEDTLS_CONFIG_FILE
61#endif
62
63#if defined(MBEDTLS_GCM_C)
64
65#include "mbedtls/gcm.h"
67
68#include <string.h>
69
70#if defined(MBEDTLS_AESNI_C)
71#include "mbedtls/aesni.h"
72#endif
73
74#if defined(MBEDTLS_SELF_TEST) && defined(MBEDTLS_AES_C)
75#include "mbedtls/aes.h"
76#include "mbedtls/platform.h"
77#if !defined(MBEDTLS_PLATFORM_C)
78#include <stdio.h>
79#define mbedtls_printf printf
80#endif /* MBEDTLS_PLATFORM_C */
81#endif /* MBEDTLS_SELF_TEST && MBEDTLS_AES_C */
82
83#if !defined(MBEDTLS_GCM_ALT)
84
85/* Parameter validation macros */
86#define GCM_VALIDATE_RET( cond ) \
87 MBEDTLS_INTERNAL_VALIDATE_RET( cond, MBEDTLS_ERR_GCM_BAD_INPUT )
88#define GCM_VALIDATE( cond ) \
89 MBEDTLS_INTERNAL_VALIDATE( cond )
90
91/*
92 * 32-bit integer manipulation macros (big endian)
93 */
94#ifndef GET_UINT32_BE
95#define GET_UINT32_BE(n,b,i) \
96{ \
97 (n) = ( (uint32_t) (b)[(i) ] << 24 ) \
98 | ( (uint32_t) (b)[(i) + 1] << 16 ) \
99 | ( (uint32_t) (b)[(i) + 2] << 8 ) \
100 | ( (uint32_t) (b)[(i) + 3] ); \
101}
102#endif
103
104#ifndef PUT_UINT32_BE
105#define PUT_UINT32_BE(n,b,i) \
106{ \
107 (b)[(i) ] = (unsigned char) ( (n) >> 24 ); \
108 (b)[(i) + 1] = (unsigned char) ( (n) >> 16 ); \
109 (b)[(i) + 2] = (unsigned char) ( (n) >> 8 ); \
110 (b)[(i) + 3] = (unsigned char) ( (n) ); \
111}
112#endif
113
114/*
115 * Initialize a context
116 */
118{
119 GCM_VALIDATE( ctx != NULL );
120 memset( ctx, 0, sizeof( mbedtls_gcm_context ) );
121}
122
123/*
124 * Precompute small multiples of H, that is set
125 * HH[i] || HL[i] = H times i,
126 * where i is seen as a field element as in [MGV], ie high-order bits
127 * correspond to low powers of P. The result is stored in the same way, that
128 * is the high-order bit of HH corresponds to P^0 and the low-order bit of HL
129 * corresponds to P^127.
130 */
131static int gcm_gen_table( mbedtls_gcm_context *ctx )
132{
133 int ret, i, j;
134 uint64_t hi, lo;
135 uint64_t vl, vh;
136 unsigned char h[16];
137 size_t olen = 0;
138
139 memset( h, 0, 16 );
140 if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, h, 16, h, &olen ) ) != 0 )
141 return( ret );
142
143 /* pack h as two 64-bits ints, big-endian */
144 GET_UINT32_BE( hi, h, 0 );
145 GET_UINT32_BE( lo, h, 4 );
146 vh = (uint64_t) hi << 32 | lo;
147
148 GET_UINT32_BE( hi, h, 8 );
149 GET_UINT32_BE( lo, h, 12 );
150 vl = (uint64_t) hi << 32 | lo;
151
152 /* 8 = 1000 corresponds to 1 in GF(2^128) */
153 ctx->HL[8] = vl;
154 ctx->HH[8] = vh;
155
156#if defined(MBEDTLS_AESNI_C) && defined(MBEDTLS_HAVE_X86_64)
157 /* With CLMUL support, we need only h, not the rest of the table */
158 if( mbedtls_aesni_has_support( MBEDTLS_AESNI_CLMUL ) )
159 return( 0 );
160#endif
161
162 /* 0 corresponds to 0 in GF(2^128) */
163 ctx->HH[0] = 0;
164 ctx->HL[0] = 0;
165
166 for( i = 4; i > 0; i >>= 1 )
167 {
168 uint32_t T = ( vl & 1 ) * 0xe1000000U;
169 vl = ( vh << 63 ) | ( vl >> 1 );
170 vh = ( vh >> 1 ) ^ ( (uint64_t) T << 32);
171
172 ctx->HL[i] = vl;
173 ctx->HH[i] = vh;
174 }
175
176 for( i = 2; i <= 8; i *= 2 )
177 {
178 uint64_t *HiL = ctx->HL + i, *HiH = ctx->HH + i;
179 vh = *HiH;
180 vl = *HiL;
181 for( j = 1; j < i; j++ )
182 {
183 HiH[j] = vh ^ ctx->HH[j];
184 HiL[j] = vl ^ ctx->HL[j];
185 }
186 }
187
188 return( 0 );
189}
190
193 const unsigned char *key,
194 unsigned int keybits )
195{
196 int ret;
197 const mbedtls_cipher_info_t *cipher_info;
198
199 GCM_VALIDATE_RET( ctx != NULL );
200 GCM_VALIDATE_RET( key != NULL );
201 GCM_VALIDATE_RET( keybits == 128 || keybits == 192 || keybits == 256 );
202
204 if( cipher_info == NULL )
206
207 if( cipher_info->block_size != 16 )
209
210 mbedtls_cipher_free( &ctx->cipher_ctx );
211
212 if( ( ret = mbedtls_cipher_setup( &ctx->cipher_ctx, cipher_info ) ) != 0 )
213 return( ret );
214
215 if( ( ret = mbedtls_cipher_setkey( &ctx->cipher_ctx, key, keybits,
216 MBEDTLS_ENCRYPT ) ) != 0 )
217 {
218 return( ret );
219 }
220
221 if( ( ret = gcm_gen_table( ctx ) ) != 0 )
222 return( ret );
223
224 return( 0 );
225}
226
227/*
228 * Shoup's method for multiplication use this table with
229 * last4[x] = x times P^128
230 * where x and last4[x] are seen as elements of GF(2^128) as in [MGV]
231 */
232static const uint64_t last4[16] =
233{
234 0x0000, 0x1c20, 0x3840, 0x2460,
235 0x7080, 0x6ca0, 0x48c0, 0x54e0,
236 0xe100, 0xfd20, 0xd940, 0xc560,
237 0x9180, 0x8da0, 0xa9c0, 0xb5e0
238};
239
240/*
241 * Sets output to x times H using the precomputed tables.
242 * x and output are seen as elements of GF(2^128) as in [MGV].
243 */
244static void gcm_mult( mbedtls_gcm_context *ctx, const unsigned char x[16],
245 unsigned char output[16] )
246{
247 int i = 0;
248 unsigned char lo, hi, rem;
249 uint64_t zh, zl;
250
251#if defined(MBEDTLS_AESNI_C) && defined(MBEDTLS_HAVE_X86_64)
252 if( mbedtls_aesni_has_support( MBEDTLS_AESNI_CLMUL ) ) {
253 unsigned char h[16];
254
255 PUT_UINT32_BE( ctx->HH[8] >> 32, h, 0 );
256 PUT_UINT32_BE( ctx->HH[8], h, 4 );
257 PUT_UINT32_BE( ctx->HL[8] >> 32, h, 8 );
258 PUT_UINT32_BE( ctx->HL[8], h, 12 );
259
260 mbedtls_aesni_gcm_mult( output, x, h );
261 return;
262 }
263#endif /* MBEDTLS_AESNI_C && MBEDTLS_HAVE_X86_64 */
264
265 lo = x[15] & 0xf;
266
267 zh = ctx->HH[lo];
268 zl = ctx->HL[lo];
269
270 for( i = 15; i >= 0; i-- )
271 {
272 lo = x[i] & 0xf;
273 hi = x[i] >> 4;
274
275 if( i != 15 )
276 {
277 rem = (unsigned char) zl & 0xf;
278 zl = ( zh << 60 ) | ( zl >> 4 );
279 zh = ( zh >> 4 );
280 zh ^= (uint64_t) last4[rem] << 48;
281 zh ^= ctx->HH[lo];
282 zl ^= ctx->HL[lo];
283
284 }
285
286 rem = (unsigned char) zl & 0xf;
287 zl = ( zh << 60 ) | ( zl >> 4 );
288 zh = ( zh >> 4 );
289 zh ^= (uint64_t) last4[rem] << 48;
290 zh ^= ctx->HH[hi];
291 zl ^= ctx->HL[hi];
292 }
293
294 PUT_UINT32_BE( zh >> 32, output, 0 );
295 PUT_UINT32_BE( zh, output, 4 );
296 PUT_UINT32_BE( zl >> 32, output, 8 );
297 PUT_UINT32_BE( zl, output, 12 );
298}
299
301 int mode,
302 const unsigned char *iv,
303 size_t iv_len,
304 const unsigned char *add,
305 size_t add_len )
306{
307 int ret;
308 unsigned char work_buf[16];
309 size_t i;
310 const unsigned char *p;
311 size_t use_len, olen = 0;
312
313 GCM_VALIDATE_RET( ctx != NULL );
314 GCM_VALIDATE_RET( iv != NULL );
315 GCM_VALIDATE_RET( add_len == 0 || add != NULL );
316
317 /* IV and AD are limited to 2^64 bits, so 2^61 bytes */
318 /* IV is not allowed to be zero length */
319 if( iv_len == 0 ||
320 ( (uint64_t) iv_len ) >> 61 != 0 ||
321 ( (uint64_t) add_len ) >> 61 != 0 )
322 {
324 }
325
326 memset( ctx->y, 0x00, sizeof(ctx->y) );
327 memset( ctx->buf, 0x00, sizeof(ctx->buf) );
328
329 ctx->mode = mode;
330 ctx->len = 0;
331 ctx->add_len = 0;
332
333 if( iv_len == 12 )
334 {
335 memcpy( ctx->y, iv, iv_len );
336 ctx->y[15] = 1;
337 }
338 else
339 {
340 memset( work_buf, 0x00, 16 );
341 PUT_UINT32_BE( iv_len * 8, work_buf, 12 );
342
343 p = iv;
344 while( iv_len > 0 )
345 {
346 use_len = ( iv_len < 16 ) ? iv_len : 16;
347
348 for( i = 0; i < use_len; i++ )
349 ctx->y[i] ^= p[i];
350
351 gcm_mult( ctx, ctx->y, ctx->y );
352
353 iv_len -= use_len;
354 p += use_len;
355 }
356
357 for( i = 0; i < 16; i++ )
358 ctx->y[i] ^= work_buf[i];
359
360 gcm_mult( ctx, ctx->y, ctx->y );
361 }
362
363 if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->y, 16, ctx->base_ectr,
364 &olen ) ) != 0 )
365 {
366 return( ret );
367 }
368
369 ctx->add_len = add_len;
370 p = add;
371 while( add_len > 0 )
372 {
373 use_len = ( add_len < 16 ) ? add_len : 16;
374
375 for( i = 0; i < use_len; i++ )
376 ctx->buf[i] ^= p[i];
377
378 gcm_mult( ctx, ctx->buf, ctx->buf );
379
380 add_len -= use_len;
381 p += use_len;
382 }
383
384 return( 0 );
385}
386
388 size_t length,
389 const unsigned char *input,
390 unsigned char *output )
391{
392 int ret;
393 unsigned char ectr[16];
394 size_t i;
395 const unsigned char *p;
396 unsigned char *out_p = output;
397 size_t use_len, olen = 0;
398
399 GCM_VALIDATE_RET( ctx != NULL );
400 GCM_VALIDATE_RET( length == 0 || input != NULL );
401 GCM_VALIDATE_RET( length == 0 || output != NULL );
402
403 if( output > input && (size_t) ( output - input ) < length )
405
406 /* Total length is restricted to 2^39 - 256 bits, ie 2^36 - 2^5 bytes
407 * Also check for possible overflow */
408 if( ctx->len + length < ctx->len ||
409 (uint64_t) ctx->len + length > 0xFFFFFFFE0ull )
410 {
412 }
413
414 ctx->len += length;
415
416 p = input;
417 while( length > 0 )
418 {
419 use_len = ( length < 16 ) ? length : 16;
420
421 for( i = 16; i > 12; i-- )
422 if( ++ctx->y[i - 1] != 0 )
423 break;
424
425 if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->y, 16, ectr,
426 &olen ) ) != 0 )
427 {
428 return( ret );
429 }
430
431 for( i = 0; i < use_len; i++ )
432 {
433 if( ctx->mode == MBEDTLS_GCM_DECRYPT )
434 ctx->buf[i] ^= p[i];
435 out_p[i] = ectr[i] ^ p[i];
436 if( ctx->mode == MBEDTLS_GCM_ENCRYPT )
437 ctx->buf[i] ^= out_p[i];
438 }
439
440 gcm_mult( ctx, ctx->buf, ctx->buf );
441
442 length -= use_len;
443 p += use_len;
444 out_p += use_len;
445 }
446
447 return( 0 );
448}
449
451 unsigned char *tag,
452 size_t tag_len )
453{
454 unsigned char work_buf[16];
455 size_t i;
456 uint64_t orig_len;
457 uint64_t orig_add_len;
458
459 GCM_VALIDATE_RET( ctx != NULL );
460 GCM_VALIDATE_RET( tag != NULL );
461
462 orig_len = ctx->len * 8;
463 orig_add_len = ctx->add_len * 8;
464
465 if( tag_len > 16 || tag_len < 4 )
467
468 memcpy( tag, ctx->base_ectr, tag_len );
469
470 if( orig_len || orig_add_len )
471 {
472 memset( work_buf, 0x00, 16 );
473
474 PUT_UINT32_BE( ( orig_add_len >> 32 ), work_buf, 0 );
475 PUT_UINT32_BE( ( orig_add_len ), work_buf, 4 );
476 PUT_UINT32_BE( ( orig_len >> 32 ), work_buf, 8 );
477 PUT_UINT32_BE( ( orig_len ), work_buf, 12 );
478
479 for( i = 0; i < 16; i++ )
480 ctx->buf[i] ^= work_buf[i];
481
482 gcm_mult( ctx, ctx->buf, ctx->buf );
483
484 for( i = 0; i < tag_len; i++ )
485 tag[i] ^= ctx->buf[i];
486 }
487
488 return( 0 );
489}
490
492 int mode,
493 size_t length,
494 const unsigned char *iv,
495 size_t iv_len,
496 const unsigned char *add,
497 size_t add_len,
498 const unsigned char *input,
499 unsigned char *output,
500 size_t tag_len,
501 unsigned char *tag )
502{
503 int ret;
504
505 GCM_VALIDATE_RET( ctx != NULL );
506 GCM_VALIDATE_RET( iv != NULL );
507 GCM_VALIDATE_RET( add_len == 0 || add != NULL );
508 GCM_VALIDATE_RET( length == 0 || input != NULL );
509 GCM_VALIDATE_RET( length == 0 || output != NULL );
510 GCM_VALIDATE_RET( tag != NULL );
511
512 if( ( ret = mbedtls_gcm_starts( ctx, mode, iv, iv_len, add, add_len ) ) != 0 )
513 return( ret );
514
515 if( ( ret = mbedtls_gcm_update( ctx, length, input, output ) ) != 0 )
516 return( ret );
517
518 if( ( ret = mbedtls_gcm_finish( ctx, tag, tag_len ) ) != 0 )
519 return( ret );
520
521 return( 0 );
522}
523
525 size_t length,
526 const unsigned char *iv,
527 size_t iv_len,
528 const unsigned char *add,
529 size_t add_len,
530 const unsigned char *tag,
531 size_t tag_len,
532 const unsigned char *input,
533 unsigned char *output )
534{
535 int ret;
536 unsigned char check_tag[16];
537 size_t i;
538 int diff;
539
540 GCM_VALIDATE_RET( ctx != NULL );
541 GCM_VALIDATE_RET( iv != NULL );
542 GCM_VALIDATE_RET( add_len == 0 || add != NULL );
543 GCM_VALIDATE_RET( tag != NULL );
544 GCM_VALIDATE_RET( length == 0 || input != NULL );
545 GCM_VALIDATE_RET( length == 0 || output != NULL );
546
548 iv, iv_len, add, add_len,
549 input, output, tag_len, check_tag ) ) != 0 )
550 {
551 return( ret );
552 }
553
554 /* Check tag in "constant-time" */
555 for( diff = 0, i = 0; i < tag_len; i++ )
556 diff |= tag[i] ^ check_tag[i];
557
558 if( diff != 0 )
559 {
562 }
563
564 return( 0 );
565}
566
568{
569 if( ctx == NULL )
570 return;
571 mbedtls_cipher_free( &ctx->cipher_ctx );
573}
574
575#endif /* !MBEDTLS_GCM_ALT */
576
577#if defined(MBEDTLS_SELF_TEST) && defined(MBEDTLS_AES_C)
578/*
579 * AES-GCM test vectors from:
580 *
581 * http://csrc.nist.gov/groups/STM/cavp/documents/mac/gcmtestvectors.zip
582 */
583#define MAX_TESTS 6
584
585static const int key_index[MAX_TESTS] =
586 { 0, 0, 1, 1, 1, 1 };
587
588static const unsigned char key[MAX_TESTS][32] =
589{
590 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
591 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
592 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
593 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
594 { 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c,
595 0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08,
596 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c,
597 0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08 },
598};
599
600static const size_t iv_len[MAX_TESTS] =
601 { 12, 12, 12, 12, 8, 60 };
602
603static const int iv_index[MAX_TESTS] =
604 { 0, 0, 1, 1, 1, 2 };
605
606static const unsigned char iv[MAX_TESTS][64] =
607{
608 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
609 0x00, 0x00, 0x00, 0x00 },
610 { 0xca, 0xfe, 0xba, 0xbe, 0xfa, 0xce, 0xdb, 0xad,
611 0xde, 0xca, 0xf8, 0x88 },
612 { 0x93, 0x13, 0x22, 0x5d, 0xf8, 0x84, 0x06, 0xe5,
613 0x55, 0x90, 0x9c, 0x5a, 0xff, 0x52, 0x69, 0xaa,
614 0x6a, 0x7a, 0x95, 0x38, 0x53, 0x4f, 0x7d, 0xa1,
615 0xe4, 0xc3, 0x03, 0xd2, 0xa3, 0x18, 0xa7, 0x28,
616 0xc3, 0xc0, 0xc9, 0x51, 0x56, 0x80, 0x95, 0x39,
617 0xfc, 0xf0, 0xe2, 0x42, 0x9a, 0x6b, 0x52, 0x54,
618 0x16, 0xae, 0xdb, 0xf5, 0xa0, 0xde, 0x6a, 0x57,
619 0xa6, 0x37, 0xb3, 0x9b },
620};
621
622static const size_t add_len[MAX_TESTS] =
623 { 0, 0, 0, 20, 20, 20 };
624
625static const int add_index[MAX_TESTS] =
626 { 0, 0, 0, 1, 1, 1 };
627
628static const unsigned char additional[MAX_TESTS][64] =
629{
630 { 0x00 },
631 { 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef,
632 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef,
633 0xab, 0xad, 0xda, 0xd2 },
634};
635
636static const size_t pt_len[MAX_TESTS] =
637 { 0, 16, 64, 60, 60, 60 };
638
639static const int pt_index[MAX_TESTS] =
640 { 0, 0, 1, 1, 1, 1 };
641
642static const unsigned char pt[MAX_TESTS][64] =
643{
644 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
645 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
646 { 0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,
647 0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,
648 0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,
649 0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,
650 0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,
651 0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,
652 0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,
653 0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55 },
654};
655
656static const unsigned char ct[MAX_TESTS * 3][64] =
657{
658 { 0x00 },
659 { 0x03, 0x88, 0xda, 0xce, 0x60, 0xb6, 0xa3, 0x92,
660 0xf3, 0x28, 0xc2, 0xb9, 0x71, 0xb2, 0xfe, 0x78 },
661 { 0x42, 0x83, 0x1e, 0xc2, 0x21, 0x77, 0x74, 0x24,
662 0x4b, 0x72, 0x21, 0xb7, 0x84, 0xd0, 0xd4, 0x9c,
663 0xe3, 0xaa, 0x21, 0x2f, 0x2c, 0x02, 0xa4, 0xe0,
664 0x35, 0xc1, 0x7e, 0x23, 0x29, 0xac, 0xa1, 0x2e,
665 0x21, 0xd5, 0x14, 0xb2, 0x54, 0x66, 0x93, 0x1c,
666 0x7d, 0x8f, 0x6a, 0x5a, 0xac, 0x84, 0xaa, 0x05,
667 0x1b, 0xa3, 0x0b, 0x39, 0x6a, 0x0a, 0xac, 0x97,
668 0x3d, 0x58, 0xe0, 0x91, 0x47, 0x3f, 0x59, 0x85 },
669 { 0x42, 0x83, 0x1e, 0xc2, 0x21, 0x77, 0x74, 0x24,
670 0x4b, 0x72, 0x21, 0xb7, 0x84, 0xd0, 0xd4, 0x9c,
671 0xe3, 0xaa, 0x21, 0x2f, 0x2c, 0x02, 0xa4, 0xe0,
672 0x35, 0xc1, 0x7e, 0x23, 0x29, 0xac, 0xa1, 0x2e,
673 0x21, 0xd5, 0x14, 0xb2, 0x54, 0x66, 0x93, 0x1c,
674 0x7d, 0x8f, 0x6a, 0x5a, 0xac, 0x84, 0xaa, 0x05,
675 0x1b, 0xa3, 0x0b, 0x39, 0x6a, 0x0a, 0xac, 0x97,
676 0x3d, 0x58, 0xe0, 0x91 },
677 { 0x61, 0x35, 0x3b, 0x4c, 0x28, 0x06, 0x93, 0x4a,
678 0x77, 0x7f, 0xf5, 0x1f, 0xa2, 0x2a, 0x47, 0x55,
679 0x69, 0x9b, 0x2a, 0x71, 0x4f, 0xcd, 0xc6, 0xf8,
680 0x37, 0x66, 0xe5, 0xf9, 0x7b, 0x6c, 0x74, 0x23,
681 0x73, 0x80, 0x69, 0x00, 0xe4, 0x9f, 0x24, 0xb2,
682 0x2b, 0x09, 0x75, 0x44, 0xd4, 0x89, 0x6b, 0x42,
683 0x49, 0x89, 0xb5, 0xe1, 0xeb, 0xac, 0x0f, 0x07,
684 0xc2, 0x3f, 0x45, 0x98 },
685 { 0x8c, 0xe2, 0x49, 0x98, 0x62, 0x56, 0x15, 0xb6,
686 0x03, 0xa0, 0x33, 0xac, 0xa1, 0x3f, 0xb8, 0x94,
687 0xbe, 0x91, 0x12, 0xa5, 0xc3, 0xa2, 0x11, 0xa8,
688 0xba, 0x26, 0x2a, 0x3c, 0xca, 0x7e, 0x2c, 0xa7,
689 0x01, 0xe4, 0xa9, 0xa4, 0xfb, 0xa4, 0x3c, 0x90,
690 0xcc, 0xdc, 0xb2, 0x81, 0xd4, 0x8c, 0x7c, 0x6f,
691 0xd6, 0x28, 0x75, 0xd2, 0xac, 0xa4, 0x17, 0x03,
692 0x4c, 0x34, 0xae, 0xe5 },
693 { 0x00 },
694 { 0x98, 0xe7, 0x24, 0x7c, 0x07, 0xf0, 0xfe, 0x41,
695 0x1c, 0x26, 0x7e, 0x43, 0x84, 0xb0, 0xf6, 0x00 },
696 { 0x39, 0x80, 0xca, 0x0b, 0x3c, 0x00, 0xe8, 0x41,
697 0xeb, 0x06, 0xfa, 0xc4, 0x87, 0x2a, 0x27, 0x57,
698 0x85, 0x9e, 0x1c, 0xea, 0xa6, 0xef, 0xd9, 0x84,
699 0x62, 0x85, 0x93, 0xb4, 0x0c, 0xa1, 0xe1, 0x9c,
700 0x7d, 0x77, 0x3d, 0x00, 0xc1, 0x44, 0xc5, 0x25,
701 0xac, 0x61, 0x9d, 0x18, 0xc8, 0x4a, 0x3f, 0x47,
702 0x18, 0xe2, 0x44, 0x8b, 0x2f, 0xe3, 0x24, 0xd9,
703 0xcc, 0xda, 0x27, 0x10, 0xac, 0xad, 0xe2, 0x56 },
704 { 0x39, 0x80, 0xca, 0x0b, 0x3c, 0x00, 0xe8, 0x41,
705 0xeb, 0x06, 0xfa, 0xc4, 0x87, 0x2a, 0x27, 0x57,
706 0x85, 0x9e, 0x1c, 0xea, 0xa6, 0xef, 0xd9, 0x84,
707 0x62, 0x85, 0x93, 0xb4, 0x0c, 0xa1, 0xe1, 0x9c,
708 0x7d, 0x77, 0x3d, 0x00, 0xc1, 0x44, 0xc5, 0x25,
709 0xac, 0x61, 0x9d, 0x18, 0xc8, 0x4a, 0x3f, 0x47,
710 0x18, 0xe2, 0x44, 0x8b, 0x2f, 0xe3, 0x24, 0xd9,
711 0xcc, 0xda, 0x27, 0x10 },
712 { 0x0f, 0x10, 0xf5, 0x99, 0xae, 0x14, 0xa1, 0x54,
713 0xed, 0x24, 0xb3, 0x6e, 0x25, 0x32, 0x4d, 0xb8,
714 0xc5, 0x66, 0x63, 0x2e, 0xf2, 0xbb, 0xb3, 0x4f,
715 0x83, 0x47, 0x28, 0x0f, 0xc4, 0x50, 0x70, 0x57,
716 0xfd, 0xdc, 0x29, 0xdf, 0x9a, 0x47, 0x1f, 0x75,
717 0xc6, 0x65, 0x41, 0xd4, 0xd4, 0xda, 0xd1, 0xc9,
718 0xe9, 0x3a, 0x19, 0xa5, 0x8e, 0x8b, 0x47, 0x3f,
719 0xa0, 0xf0, 0x62, 0xf7 },
720 { 0xd2, 0x7e, 0x88, 0x68, 0x1c, 0xe3, 0x24, 0x3c,
721 0x48, 0x30, 0x16, 0x5a, 0x8f, 0xdc, 0xf9, 0xff,
722 0x1d, 0xe9, 0xa1, 0xd8, 0xe6, 0xb4, 0x47, 0xef,
723 0x6e, 0xf7, 0xb7, 0x98, 0x28, 0x66, 0x6e, 0x45,
724 0x81, 0xe7, 0x90, 0x12, 0xaf, 0x34, 0xdd, 0xd9,
725 0xe2, 0xf0, 0x37, 0x58, 0x9b, 0x29, 0x2d, 0xb3,
726 0xe6, 0x7c, 0x03, 0x67, 0x45, 0xfa, 0x22, 0xe7,
727 0xe9, 0xb7, 0x37, 0x3b },
728 { 0x00 },
729 { 0xce, 0xa7, 0x40, 0x3d, 0x4d, 0x60, 0x6b, 0x6e,
730 0x07, 0x4e, 0xc5, 0xd3, 0xba, 0xf3, 0x9d, 0x18 },
731 { 0x52, 0x2d, 0xc1, 0xf0, 0x99, 0x56, 0x7d, 0x07,
732 0xf4, 0x7f, 0x37, 0xa3, 0x2a, 0x84, 0x42, 0x7d,
733 0x64, 0x3a, 0x8c, 0xdc, 0xbf, 0xe5, 0xc0, 0xc9,
734 0x75, 0x98, 0xa2, 0xbd, 0x25, 0x55, 0xd1, 0xaa,
735 0x8c, 0xb0, 0x8e, 0x48, 0x59, 0x0d, 0xbb, 0x3d,
736 0xa7, 0xb0, 0x8b, 0x10, 0x56, 0x82, 0x88, 0x38,
737 0xc5, 0xf6, 0x1e, 0x63, 0x93, 0xba, 0x7a, 0x0a,
738 0xbc, 0xc9, 0xf6, 0x62, 0x89, 0x80, 0x15, 0xad },
739 { 0x52, 0x2d, 0xc1, 0xf0, 0x99, 0x56, 0x7d, 0x07,
740 0xf4, 0x7f, 0x37, 0xa3, 0x2a, 0x84, 0x42, 0x7d,
741 0x64, 0x3a, 0x8c, 0xdc, 0xbf, 0xe5, 0xc0, 0xc9,
742 0x75, 0x98, 0xa2, 0xbd, 0x25, 0x55, 0xd1, 0xaa,
743 0x8c, 0xb0, 0x8e, 0x48, 0x59, 0x0d, 0xbb, 0x3d,
744 0xa7, 0xb0, 0x8b, 0x10, 0x56, 0x82, 0x88, 0x38,
745 0xc5, 0xf6, 0x1e, 0x63, 0x93, 0xba, 0x7a, 0x0a,
746 0xbc, 0xc9, 0xf6, 0x62 },
747 { 0xc3, 0x76, 0x2d, 0xf1, 0xca, 0x78, 0x7d, 0x32,
748 0xae, 0x47, 0xc1, 0x3b, 0xf1, 0x98, 0x44, 0xcb,
749 0xaf, 0x1a, 0xe1, 0x4d, 0x0b, 0x97, 0x6a, 0xfa,
750 0xc5, 0x2f, 0xf7, 0xd7, 0x9b, 0xba, 0x9d, 0xe0,
751 0xfe, 0xb5, 0x82, 0xd3, 0x39, 0x34, 0xa4, 0xf0,
752 0x95, 0x4c, 0xc2, 0x36, 0x3b, 0xc7, 0x3f, 0x78,
753 0x62, 0xac, 0x43, 0x0e, 0x64, 0xab, 0xe4, 0x99,
754 0xf4, 0x7c, 0x9b, 0x1f },
755 { 0x5a, 0x8d, 0xef, 0x2f, 0x0c, 0x9e, 0x53, 0xf1,
756 0xf7, 0x5d, 0x78, 0x53, 0x65, 0x9e, 0x2a, 0x20,
757 0xee, 0xb2, 0xb2, 0x2a, 0xaf, 0xde, 0x64, 0x19,
758 0xa0, 0x58, 0xab, 0x4f, 0x6f, 0x74, 0x6b, 0xf4,
759 0x0f, 0xc0, 0xc3, 0xb7, 0x80, 0xf2, 0x44, 0x45,
760 0x2d, 0xa3, 0xeb, 0xf1, 0xc5, 0xd8, 0x2c, 0xde,
761 0xa2, 0x41, 0x89, 0x97, 0x20, 0x0e, 0xf8, 0x2e,
762 0x44, 0xae, 0x7e, 0x3f },
763};
764
765static const unsigned char tag[MAX_TESTS * 3][16] =
766{
767 { 0x58, 0xe2, 0xfc, 0xce, 0xfa, 0x7e, 0x30, 0x61,
768 0x36, 0x7f, 0x1d, 0x57, 0xa4, 0xe7, 0x45, 0x5a },
769 { 0xab, 0x6e, 0x47, 0xd4, 0x2c, 0xec, 0x13, 0xbd,
770 0xf5, 0x3a, 0x67, 0xb2, 0x12, 0x57, 0xbd, 0xdf },
771 { 0x4d, 0x5c, 0x2a, 0xf3, 0x27, 0xcd, 0x64, 0xa6,
772 0x2c, 0xf3, 0x5a, 0xbd, 0x2b, 0xa6, 0xfa, 0xb4 },
773 { 0x5b, 0xc9, 0x4f, 0xbc, 0x32, 0x21, 0xa5, 0xdb,
774 0x94, 0xfa, 0xe9, 0x5a, 0xe7, 0x12, 0x1a, 0x47 },
775 { 0x36, 0x12, 0xd2, 0xe7, 0x9e, 0x3b, 0x07, 0x85,
776 0x56, 0x1b, 0xe1, 0x4a, 0xac, 0xa2, 0xfc, 0xcb },
777 { 0x61, 0x9c, 0xc5, 0xae, 0xff, 0xfe, 0x0b, 0xfa,
778 0x46, 0x2a, 0xf4, 0x3c, 0x16, 0x99, 0xd0, 0x50 },
779 { 0xcd, 0x33, 0xb2, 0x8a, 0xc7, 0x73, 0xf7, 0x4b,
780 0xa0, 0x0e, 0xd1, 0xf3, 0x12, 0x57, 0x24, 0x35 },
781 { 0x2f, 0xf5, 0x8d, 0x80, 0x03, 0x39, 0x27, 0xab,
782 0x8e, 0xf4, 0xd4, 0x58, 0x75, 0x14, 0xf0, 0xfb },
783 { 0x99, 0x24, 0xa7, 0xc8, 0x58, 0x73, 0x36, 0xbf,
784 0xb1, 0x18, 0x02, 0x4d, 0xb8, 0x67, 0x4a, 0x14 },
785 { 0x25, 0x19, 0x49, 0x8e, 0x80, 0xf1, 0x47, 0x8f,
786 0x37, 0xba, 0x55, 0xbd, 0x6d, 0x27, 0x61, 0x8c },
787 { 0x65, 0xdc, 0xc5, 0x7f, 0xcf, 0x62, 0x3a, 0x24,
788 0x09, 0x4f, 0xcc, 0xa4, 0x0d, 0x35, 0x33, 0xf8 },
789 { 0xdc, 0xf5, 0x66, 0xff, 0x29, 0x1c, 0x25, 0xbb,
790 0xb8, 0x56, 0x8f, 0xc3, 0xd3, 0x76, 0xa6, 0xd9 },
791 { 0x53, 0x0f, 0x8a, 0xfb, 0xc7, 0x45, 0x36, 0xb9,
792 0xa9, 0x63, 0xb4, 0xf1, 0xc4, 0xcb, 0x73, 0x8b },
793 { 0xd0, 0xd1, 0xc8, 0xa7, 0x99, 0x99, 0x6b, 0xf0,
794 0x26, 0x5b, 0x98, 0xb5, 0xd4, 0x8a, 0xb9, 0x19 },
795 { 0xb0, 0x94, 0xda, 0xc5, 0xd9, 0x34, 0x71, 0xbd,
796 0xec, 0x1a, 0x50, 0x22, 0x70, 0xe3, 0xcc, 0x6c },
797 { 0x76, 0xfc, 0x6e, 0xce, 0x0f, 0x4e, 0x17, 0x68,
798 0xcd, 0xdf, 0x88, 0x53, 0xbb, 0x2d, 0x55, 0x1b },
799 { 0x3a, 0x33, 0x7d, 0xbf, 0x46, 0xa7, 0x92, 0xc4,
800 0x5e, 0x45, 0x49, 0x13, 0xfe, 0x2e, 0xa8, 0xf2 },
801 { 0xa4, 0x4a, 0x82, 0x66, 0xee, 0x1c, 0x8e, 0xb0,
802 0xc8, 0xb5, 0xd4, 0xcf, 0x5a, 0xe9, 0xf1, 0x9a },
803};
804
805int mbedtls_gcm_self_test( int verbose )
806{
808 unsigned char buf[64];
809 unsigned char tag_buf[16];
810 int i, j, ret;
812
813 for( j = 0; j < 3; j++ )
814 {
815 int key_len = 128 + 64 * j;
816
817 for( i = 0; i < MAX_TESTS; i++ )
818 {
820
821 if( verbose != 0 )
822 mbedtls_printf( " AES-GCM-%3d #%d (%s): ",
823 key_len, i, "enc" );
824
825 ret = mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]],
826 key_len );
827 /*
828 * AES-192 is an optional feature that may be unavailable when
829 * there is an alternative underlying implementation i.e. when
830 * MBEDTLS_AES_ALT is defined.
831 */
832 if( ret == MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED && key_len == 192 )
833 {
834 mbedtls_printf( "skipped\n" );
835 break;
836 }
837 else if( ret != 0 )
838 {
839 goto exit;
840 }
841
843 pt_len[i],
844 iv[iv_index[i]], iv_len[i],
845 additional[add_index[i]], add_len[i],
846 pt[pt_index[i]], buf, 16, tag_buf );
847 if( ret != 0 )
848 goto exit;
849
850 if ( memcmp( buf, ct[j * 6 + i], pt_len[i] ) != 0 ||
851 memcmp( tag_buf, tag[j * 6 + i], 16 ) != 0 )
852 {
853 ret = 1;
854 goto exit;
855 }
856
858
859 if( verbose != 0 )
860 mbedtls_printf( "passed\n" );
861
863
864 if( verbose != 0 )
865 mbedtls_printf( " AES-GCM-%3d #%d (%s): ",
866 key_len, i, "dec" );
867
868 ret = mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]],
869 key_len );
870 if( ret != 0 )
871 goto exit;
872
874 pt_len[i],
875 iv[iv_index[i]], iv_len[i],
876 additional[add_index[i]], add_len[i],
877 ct[j * 6 + i], buf, 16, tag_buf );
878
879 if( ret != 0 )
880 goto exit;
881
882 if( memcmp( buf, pt[pt_index[i]], pt_len[i] ) != 0 ||
883 memcmp( tag_buf, tag[j * 6 + i], 16 ) != 0 )
884 {
885 ret = 1;
886 goto exit;
887 }
888
890
891 if( verbose != 0 )
892 mbedtls_printf( "passed\n" );
893
895
896 if( verbose != 0 )
897 mbedtls_printf( " AES-GCM-%3d #%d split (%s): ",
898 key_len, i, "enc" );
899
900 ret = mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]],
901 key_len );
902 if( ret != 0 )
903 goto exit;
904
906 iv[iv_index[i]], iv_len[i],
907 additional[add_index[i]], add_len[i] );
908 if( ret != 0 )
909 goto exit;
910
911 if( pt_len[i] > 32 )
912 {
913 size_t rest_len = pt_len[i] - 32;
914 ret = mbedtls_gcm_update( &ctx, 32, pt[pt_index[i]], buf );
915 if( ret != 0 )
916 goto exit;
917
918 ret = mbedtls_gcm_update( &ctx, rest_len, pt[pt_index[i]] + 32,
919 buf + 32 );
920 if( ret != 0 )
921 goto exit;
922 }
923 else
924 {
925 ret = mbedtls_gcm_update( &ctx, pt_len[i], pt[pt_index[i]], buf );
926 if( ret != 0 )
927 goto exit;
928 }
929
930 ret = mbedtls_gcm_finish( &ctx, tag_buf, 16 );
931 if( ret != 0 )
932 goto exit;
933
934 if( memcmp( buf, ct[j * 6 + i], pt_len[i] ) != 0 ||
935 memcmp( tag_buf, tag[j * 6 + i], 16 ) != 0 )
936 {
937 ret = 1;
938 goto exit;
939 }
940
942
943 if( verbose != 0 )
944 mbedtls_printf( "passed\n" );
945
947
948 if( verbose != 0 )
949 mbedtls_printf( " AES-GCM-%3d #%d split (%s): ",
950 key_len, i, "dec" );
951
952 ret = mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]],
953 key_len );
954 if( ret != 0 )
955 goto exit;
956
958 iv[iv_index[i]], iv_len[i],
959 additional[add_index[i]], add_len[i] );
960 if( ret != 0 )
961 goto exit;
962
963 if( pt_len[i] > 32 )
964 {
965 size_t rest_len = pt_len[i] - 32;
966 ret = mbedtls_gcm_update( &ctx, 32, ct[j * 6 + i], buf );
967 if( ret != 0 )
968 goto exit;
969
970 ret = mbedtls_gcm_update( &ctx, rest_len, ct[j * 6 + i] + 32,
971 buf + 32 );
972 if( ret != 0 )
973 goto exit;
974 }
975 else
976 {
977 ret = mbedtls_gcm_update( &ctx, pt_len[i], ct[j * 6 + i],
978 buf );
979 if( ret != 0 )
980 goto exit;
981 }
982
983 ret = mbedtls_gcm_finish( &ctx, tag_buf, 16 );
984 if( ret != 0 )
985 goto exit;
986
987 if( memcmp( buf, pt[pt_index[i]], pt_len[i] ) != 0 ||
988 memcmp( tag_buf, tag[j * 6 + i], 16 ) != 0 )
989 {
990 ret = 1;
991 goto exit;
992 }
993
995
996 if( verbose != 0 )
997 mbedtls_printf( "passed\n" );
998 }
999 }
1000
1001 if( verbose != 0 )
1002 mbedtls_printf( "\n" );
1003
1004 ret = 0;
1005
1006exit:
1007 if( ret != 0 )
1008 {
1009 if( verbose != 0 )
1010 mbedtls_printf( "failed\n" );
1012 }
1013
1014 return( ret );
1015}
1016
1017#endif /* MBEDTLS_SELF_TEST && MBEDTLS_AES_C */
1018
1019#endif /* MBEDTLS_GCM_C */
int memcmp(void *Buffer1, void *Buffer2, ACPI_SIZE Count)
Definition: utclib.c:112
This file contains AES definitions and functions.
AES-NI for hardware AES acceleration on some Intel processors.
#define MBEDTLS_AESNI_CLMUL
Definition: aesni.h:64
int mbedtls_cipher_setup(mbedtls_cipher_context_t *ctx, const mbedtls_cipher_info_t *cipher_info)
This function initializes and fills the cipher-context structure with the appropriate values....
int mbedtls_cipher_setkey(mbedtls_cipher_context_t *ctx, const unsigned char *key, int key_bitlen, const mbedtls_operation_t operation)
This function sets the key to use with the given context.
const mbedtls_cipher_info_t * mbedtls_cipher_info_from_values(const mbedtls_cipher_id_t cipher_id, int key_bitlen, const mbedtls_cipher_mode_t mode)
This function retrieves the cipher-information structure associated with the given cipher ID,...
void mbedtls_cipher_free(mbedtls_cipher_context_t *ctx)
This function frees and clears the cipher-specific context of ctx. Freeing ctx itself remains the res...
int mbedtls_cipher_update(mbedtls_cipher_context_t *ctx, const unsigned char *input, size_t ilen, unsigned char *output, size_t *olen)
The generic cipher update function. It encrypts or decrypts using the given cipher context....
@ MBEDTLS_ENCRYPT
Definition: cipher.h:234
@ MBEDTLS_MODE_ECB
Definition: cipher.h:209
mbedtls_cipher_id_t
Supported cipher types.
Definition: cipher.h:109
@ MBEDTLS_CIPHER_ID_AES
Definition: cipher.h:112
#define NULL
Definition: types.h:112
UINT32 uint32_t
Definition: types.h:75
UINT64 uint64_t
Definition: types.h:77
unsigned char
Definition: typeof.h:29
#define pt(x, y)
Definition: drawing.c:79
This file contains GCM definitions and functions.
#define MBEDTLS_GCM_ENCRYPT
Definition: gcm.h:71
int mbedtls_gcm_starts(mbedtls_gcm_context *ctx, int mode, const unsigned char *iv, size_t iv_len, const unsigned char *add, size_t add_len)
This function starts a GCM encryption or decryption operation.
int mbedtls_gcm_crypt_and_tag(mbedtls_gcm_context *ctx, int mode, size_t length, const unsigned char *iv, size_t iv_len, const unsigned char *add, size_t add_len, const unsigned char *input, unsigned char *output, size_t tag_len, unsigned char *tag)
This function performs GCM encryption or decryption of a buffer.
int mbedtls_gcm_finish(mbedtls_gcm_context *ctx, unsigned char *tag, size_t tag_len)
This function finishes the GCM operation and generates the authentication tag.
#define MBEDTLS_ERR_GCM_AUTH_FAILED
Definition: gcm.h:74
#define MBEDTLS_ERR_GCM_BAD_INPUT
Definition: gcm.h:79
#define MBEDTLS_GCM_DECRYPT
Definition: gcm.h:72
int mbedtls_gcm_update(mbedtls_gcm_context *ctx, size_t length, const unsigned char *input, unsigned char *output)
This function feeds an input buffer into an ongoing GCM encryption or decryption operation.
void mbedtls_gcm_init(mbedtls_gcm_context *ctx)
This function initializes the specified GCM context, to make references valid, and prepares the conte...
int mbedtls_gcm_setkey(mbedtls_gcm_context *ctx, mbedtls_cipher_id_t cipher, const unsigned char *key, unsigned int keybits)
This function associates a GCM context with a cipher algorithm and a key.
void mbedtls_gcm_free(mbedtls_gcm_context *ctx)
This function clears a GCM context and the underlying cipher sub-context.
int mbedtls_gcm_auth_decrypt(mbedtls_gcm_context *ctx, size_t length, const unsigned char *iv, size_t iv_len, const unsigned char *add, size_t add_len, const unsigned char *tag, size_t tag_len, const unsigned char *input, unsigned char *output)
This function performs a GCM authenticated decryption of a buffer.
GLint GLint GLint GLint GLint x
Definition: gl.h:1548
GLenum mode
Definition: glext.h:6217
GLenum GLuint GLenum GLsizei const GLchar * buf
Definition: glext.h:7751
GLuint GLsizei GLsizei * length
Definition: glext.h:6040
GLfloat GLfloat p
Definition: glext.h:8902
GLenum GLsizei len
Definition: glext.h:6722
GLenum GLenum GLenum input
Definition: glext.h:9031
GLfloat GLfloat GLfloat GLfloat h
Definition: glext.h:7723
GLsizei GLenum const GLvoid GLsizei GLenum GLbyte GLbyte GLbyte GLdouble GLdouble GLdouble GLfloat GLfloat GLfloat GLint GLint GLint GLshort GLshort GLshort GLubyte GLubyte GLubyte GLuint GLuint GLuint GLushort GLushort GLushort GLbyte GLbyte GLbyte GLbyte GLdouble GLdouble GLdouble GLdouble GLfloat GLfloat GLfloat GLfloat GLint GLint GLint GLint GLshort GLshort GLshort GLshort GLubyte GLubyte GLubyte GLubyte GLuint GLuint GLuint GLuint GLushort GLushort GLushort GLushort GLboolean const GLdouble const GLfloat const GLint const GLshort const GLbyte const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLdouble const GLfloat const GLfloat const GLint const GLint const GLshort const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort GLenum GLenum GLenum GLfloat GLenum GLint GLenum GLenum GLenum GLfloat GLenum GLenum GLint GLenum GLfloat GLenum GLint GLint GLushort GLenum GLenum GLfloat GLenum GLenum GLint GLfloat const GLubyte GLenum GLenum GLenum const GLfloat GLenum GLenum const GLint GLenum GLint GLint GLsizei GLsizei GLint GLenum GLenum const GLvoid GLenum GLenum const GLfloat GLenum GLenum const GLint GLenum GLenum const GLdouble GLenum GLenum const GLfloat GLenum GLenum const GLint GLsizei GLuint GLfloat GLuint GLbitfield GLfloat GLint GLuint GLboolean GLenum GLfloat GLenum GLbitfield GLenum GLfloat GLfloat GLint GLint const GLfloat GLenum GLfloat GLfloat GLint GLint GLfloat GLfloat GLint GLint const GLfloat GLint GLfloat GLfloat GLint GLfloat GLfloat GLint GLfloat GLfloat const GLdouble const GLfloat const GLdouble const GLfloat GLint i
Definition: glfuncs.h:248
GLsizei GLenum const GLvoid GLsizei GLenum GLbyte GLbyte GLbyte GLdouble GLdouble GLdouble GLfloat GLfloat GLfloat GLint GLint GLint GLshort GLshort GLshort GLubyte GLubyte GLubyte GLuint GLuint GLuint GLushort GLushort GLushort GLbyte GLbyte GLbyte GLbyte GLdouble GLdouble GLdouble GLdouble GLfloat GLfloat GLfloat GLfloat GLint GLint GLint GLint GLshort GLshort GLshort GLshort GLubyte GLubyte GLubyte GLubyte GLuint GLuint GLuint GLuint GLushort GLushort GLushort GLushort GLboolean const GLdouble const GLfloat const GLint const GLshort const GLbyte const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLdouble const GLfloat const GLfloat const GLint const GLint const GLshort const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort GLenum GLenum GLenum GLfloat GLenum GLint GLenum GLenum GLenum GLfloat GLenum GLenum GLint GLenum GLfloat GLenum GLint GLint GLushort GLenum GLenum GLfloat GLenum GLenum GLint GLfloat const GLubyte GLenum GLenum GLenum const GLfloat GLenum GLenum const GLint GLenum GLint GLint GLsizei GLsizei GLint GLenum GLenum const GLvoid GLenum GLenum const GLfloat GLenum GLenum const GLint GLenum GLenum const GLdouble GLenum GLenum const GLfloat GLenum GLenum const GLint GLsizei GLuint GLfloat GLuint GLbitfield GLfloat GLint GLuint GLboolean GLenum GLfloat GLenum GLbitfield GLenum GLfloat GLfloat GLint GLint const GLfloat GLenum GLfloat GLfloat GLint GLint GLfloat GLfloat GLint GLint const GLfloat GLint GLfloat GLfloat GLint GLfloat GLfloat GLint GLfloat GLfloat const GLdouble const GLfloat const GLdouble const GLfloat GLint GLint GLint j
Definition: glfuncs.h:250
#define T
Definition: mbstring.h:31
#define memcpy(s1, s2, n)
Definition: mkisofs.h:878
static DATA_BLOB cipher
Definition: protectdata.c:38
#define uint64_t
Definition: nsiface.idl:62
void mbedtls_platform_zeroize(void *buf, size_t len)
Securely zeroize a buffer.
Definition: platform_util.c:98
Common and shared functions used by multiple modules in the Mbed TLS library.
#define verbose
Definition: rosglue.h:36
Configuration options (set of defines)
This file contains the definitions and functions of the Mbed TLS platform abstraction layer.
#define MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED
Definition: platform.h:72
#define exit(n)
Definition: config.h:202
#define memset(x, y, z)
Definition: compat.h:39
Definition: copy.c:22
unsigned int block_size
Definition: cipher.h:299
The GCM context structure.
Definition: gcm.h:91
Definition: ecma_167.h:138
#define mbedtls_printf
Definition: timing.c:57
int ret
static int add_index(struct sltg_data *index, const char *name)
Definition: write_sltg.c:264