blob: 5ce27f2103ff086bd6f9490dfece807bee8fd900 [file] [log] [blame]
Daniel Kingb8025c52016-05-17 14:43:01 -03001/**
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +02002 * \file chachapoly.c
Daniel Kingb8025c52016-05-17 14:43:01 -03003 *
4 * \brief ChaCha20-Poly1305 AEAD construction based on RFC 7539.
5 *
6 * Copyright (C) 2006-2016, ARM Limited, All Rights Reserved
7 * SPDX-License-Identifier: Apache-2.0
8 *
9 * Licensed under the Apache License, Version 2.0 (the "License"); you may
10 * not use this file except in compliance with the License.
11 * You may obtain a copy of the License at
12 *
13 * http://www.apache.org/licenses/LICENSE-2.0
14 *
15 * Unless required by applicable law or agreed to in writing, software
16 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
17 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
18 * See the License for the specific language governing permissions and
19 * limitations under the License.
20 *
21 * This file is part of mbed TLS (https://tls.mbed.org)
22 */
23#if !defined(MBEDTLS_CONFIG_FILE)
24#include "mbedtls/config.h"
25#else
26#include MBEDTLS_CONFIG_FILE
27#endif
28
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +020029#if defined(MBEDTLS_CHACHAPOLY_C)
Daniel Kingb8025c52016-05-17 14:43:01 -030030
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +020031#include "mbedtls/chachapoly.h"
Manuel Pégourié-Gonnardfb78c902018-05-24 13:46:15 +020032#include "mbedtls/platform_util.h"
33
Daniel Kingb8025c52016-05-17 14:43:01 -030034#include <string.h>
35
36#if defined(MBEDTLS_SELF_TEST)
37#if defined(MBEDTLS_PLATFORM_C)
38#include "mbedtls/platform.h"
39#else
40#include <stdio.h>
41#define mbedtls_printf printf
42#endif /* MBEDTLS_PLATFORM_C */
43#endif /* MBEDTLS_SELF_TEST */
44
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +020045#if !defined(MBEDTLS_CHACHAPOLY_ALT)
Daniel Kingb8025c52016-05-17 14:43:01 -030046
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +020047#define CHACHAPOLY_STATE_INIT ( 0 )
48#define CHACHAPOLY_STATE_AAD ( 1 )
49#define CHACHAPOLY_STATE_CIPHERTEXT ( 2 ) /* Encrypting or decrypting */
50#define CHACHAPOLY_STATE_FINISHED ( 3 )
Daniel Kingb8025c52016-05-17 14:43:01 -030051
Daniel Kingb8025c52016-05-17 14:43:01 -030052/**
53 * \brief Adds padding bytes (zeroes) to pad the AAD for Poly1305.
54 *
55 * \param ctx The ChaCha20-Poly1305 context.
56 */
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +020057static void mbedtls_chachapoly_pad_aad( mbedtls_chachapoly_context *ctx )
Daniel Kingb8025c52016-05-17 14:43:01 -030058{
Daniel Kinge6e79682016-05-24 11:16:17 -030059 uint32_t partial_block_len = (uint32_t) ( ctx->aad_len % 16U );
Daniel Kingb8025c52016-05-17 14:43:01 -030060 unsigned char zeroes[15];
61
62 if ( partial_block_len > 0U )
63 {
Daniel Kinge6e79682016-05-24 11:16:17 -030064 memset( zeroes, 0, sizeof( zeroes ) );
65 (void) mbedtls_poly1305_update( &ctx->poly1305_ctx,
Manuel Pégourié-Gonnardb1ac5e72018-05-09 09:25:00 +020066 zeroes,
67 16U - partial_block_len );
Daniel Kingb8025c52016-05-17 14:43:01 -030068 }
69}
70
71/**
72 * \brief Adds padding bytes (zeroes) to pad the ciphertext for Poly1305.
73 *
74 * \param ctx The ChaCha20-Poly1305 context.
75 */
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +020076static void mbedtls_chachapoly_pad_ciphertext( mbedtls_chachapoly_context *ctx )
Daniel Kingb8025c52016-05-17 14:43:01 -030077{
Daniel Kinge6e79682016-05-24 11:16:17 -030078 uint32_t partial_block_len = (uint32_t) ( ctx->ciphertext_len % 16U );
Daniel Kingb8025c52016-05-17 14:43:01 -030079 unsigned char zeroes[15];
80
81 if ( partial_block_len > 0U )
82 {
Daniel Kinge6e79682016-05-24 11:16:17 -030083 memset( zeroes, 0, sizeof( zeroes ) );
84 (void) mbedtls_poly1305_update( &ctx->poly1305_ctx,
Manuel Pégourié-Gonnardb1ac5e72018-05-09 09:25:00 +020085 zeroes,
86 16U - partial_block_len );
Daniel Kingb8025c52016-05-17 14:43:01 -030087 }
88}
89
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +020090void mbedtls_chachapoly_init( mbedtls_chachapoly_context *ctx )
Daniel Kingb8025c52016-05-17 14:43:01 -030091{
92 if ( ctx != NULL )
93 {
94 mbedtls_chacha20_init( &ctx->chacha20_ctx );
95 mbedtls_poly1305_init( &ctx->poly1305_ctx );
96 ctx->aad_len = 0U;
97 ctx->ciphertext_len = 0U;
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +020098 ctx->state = CHACHAPOLY_STATE_INIT;
99 ctx->mode = MBEDTLS_CHACHAPOLY_ENCRYPT;
Daniel Kingb8025c52016-05-17 14:43:01 -0300100 }
101}
102
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200103void mbedtls_chachapoly_free( mbedtls_chachapoly_context *ctx )
Daniel Kingb8025c52016-05-17 14:43:01 -0300104{
105 if ( ctx != NULL )
106 {
107 mbedtls_chacha20_free( &ctx->chacha20_ctx );
108 mbedtls_poly1305_free( &ctx->poly1305_ctx );
109 ctx->aad_len = 0U;
110 ctx->ciphertext_len = 0U;
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200111 ctx->state = CHACHAPOLY_STATE_INIT;
112 ctx->mode = MBEDTLS_CHACHAPOLY_ENCRYPT;
Daniel Kingb8025c52016-05-17 14:43:01 -0300113 }
114}
115
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200116int mbedtls_chachapoly_setkey( mbedtls_chachapoly_context *ctx,
117 const unsigned char key[32] )
Daniel Kingb8025c52016-05-17 14:43:01 -0300118{
119 int result;
120
121 if ( ( ctx == NULL ) || ( key == NULL ) )
122 {
Manuel Pégourié-Gonnard3798b6b2018-05-24 13:27:45 +0200123 return( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA );
Daniel Kingb8025c52016-05-17 14:43:01 -0300124 }
125
126 result = mbedtls_chacha20_setkey( &ctx->chacha20_ctx, key );
127
128 return( result );
129}
130
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200131int mbedtls_chachapoly_starts( mbedtls_chachapoly_context *ctx,
132 const unsigned char nonce[12],
133 mbedtls_chachapoly_mode_t mode )
Daniel Kingb8025c52016-05-17 14:43:01 -0300134{
135 int result;
136 unsigned char poly1305_key[64];
137
138 if ( ( ctx == NULL ) || ( nonce == NULL ) )
139 {
Manuel Pégourié-Gonnard3798b6b2018-05-24 13:27:45 +0200140 return( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA );
Daniel Kingb8025c52016-05-17 14:43:01 -0300141 }
142
Manuel Pégourié-Gonnard56206c42018-05-07 12:18:34 +0200143 /* Set counter = 0, will be update to 1 when generating Poly1305 key */
144 result = mbedtls_chacha20_starts( &ctx->chacha20_ctx, nonce, 0U );
Daniel Kingb8025c52016-05-17 14:43:01 -0300145 if ( result != 0 )
146 goto cleanup;
147
148 /* Generate the Poly1305 key by getting the ChaCha20 keystream output with counter = 0.
Manuel Pégourié-Gonnard56206c42018-05-07 12:18:34 +0200149 * This is the same as encrypting a buffer of zeroes.
Daniel Kingb8025c52016-05-17 14:43:01 -0300150 * Only the first 256-bits (32 bytes) of the key is used for Poly1305.
151 * The other 256 bits are discarded.
152 */
Manuel Pégourié-Gonnard56206c42018-05-07 12:18:34 +0200153 memset( poly1305_key, 0, sizeof( poly1305_key ) );
154 result = mbedtls_chacha20_update( &ctx->chacha20_ctx, sizeof( poly1305_key ),
155 poly1305_key, poly1305_key );
Daniel Kingb8025c52016-05-17 14:43:01 -0300156 if ( result != 0 )
157 goto cleanup;
158
Manuel Pégourié-Gonnard4edd51b2018-05-07 10:21:56 +0200159 result = mbedtls_poly1305_starts( &ctx->poly1305_ctx, poly1305_key );
Daniel Kingb8025c52016-05-17 14:43:01 -0300160
161 if ( result == 0 )
162 {
163 ctx->aad_len = 0U;
164 ctx->ciphertext_len = 0U;
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200165 ctx->state = CHACHAPOLY_STATE_AAD;
Daniel Kingb8025c52016-05-17 14:43:01 -0300166 ctx->mode = mode;
167 }
168
169cleanup:
Manuel Pégourié-Gonnardfb78c902018-05-24 13:46:15 +0200170 mbedtls_platform_zeroize( poly1305_key, 64U );
Daniel Kingb8025c52016-05-17 14:43:01 -0300171 return( result );
172}
173
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200174int mbedtls_chachapoly_update_aad( mbedtls_chachapoly_context *ctx,
Manuel Pégourié-Gonnard5ef92d32018-05-09 09:34:25 +0200175 const unsigned char *aad,
176 size_t aad_len )
Daniel Kingb8025c52016-05-17 14:43:01 -0300177{
Daniel Kinga310c5e2016-05-17 15:56:26 -0300178 if ( ctx == NULL )
Daniel Kingb8025c52016-05-17 14:43:01 -0300179 {
Manuel Pégourié-Gonnard3798b6b2018-05-24 13:27:45 +0200180 return( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA );
Daniel Kingb8025c52016-05-17 14:43:01 -0300181 }
Daniel Kinga310c5e2016-05-17 15:56:26 -0300182 else if ( ( aad_len > 0U ) && ( aad == NULL ) )
183 {
184 /* aad pointer is allowed to be NULL if aad_len == 0 */
Manuel Pégourié-Gonnard3798b6b2018-05-24 13:27:45 +0200185 return( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA );
Daniel Kinga310c5e2016-05-17 15:56:26 -0300186 }
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200187 else if ( ctx->state != CHACHAPOLY_STATE_AAD )
Daniel Kingb8025c52016-05-17 14:43:01 -0300188 {
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200189 return(MBEDTLS_ERR_CHACHAPOLY_BAD_STATE );
Daniel Kingb8025c52016-05-17 14:43:01 -0300190 }
191
192 ctx->aad_len += aad_len;
193
Manuel Pégourié-Gonnardb1ac5e72018-05-09 09:25:00 +0200194 return( mbedtls_poly1305_update( &ctx->poly1305_ctx, aad, aad_len ) );
Daniel Kingb8025c52016-05-17 14:43:01 -0300195}
196
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200197int mbedtls_chachapoly_update( mbedtls_chachapoly_context *ctx,
198 size_t len,
199 const unsigned char *input,
200 unsigned char *output )
Daniel Kingb8025c52016-05-17 14:43:01 -0300201{
Manuel Pégourié-Gonnard59d2c302018-05-10 10:39:32 +0200202 if ( ctx == NULL )
Daniel Kingb8025c52016-05-17 14:43:01 -0300203 {
Manuel Pégourié-Gonnard3798b6b2018-05-24 13:27:45 +0200204 return( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA );
Daniel Kingb8025c52016-05-17 14:43:01 -0300205 }
Daniel Kinga310c5e2016-05-17 15:56:26 -0300206 else if ( ( len > 0U ) && ( ( input == NULL ) || ( output == NULL ) ) )
207 {
208 /* input and output pointers are allowed to be NULL if len == 0 */
Manuel Pégourié-Gonnard3798b6b2018-05-24 13:27:45 +0200209 return( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA );
Daniel Kinga310c5e2016-05-17 15:56:26 -0300210 }
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200211 else if ( ( ctx->state != CHACHAPOLY_STATE_AAD ) &&
212 ( ctx->state != CHACHAPOLY_STATE_CIPHERTEXT ) )
Daniel Kingb8025c52016-05-17 14:43:01 -0300213 {
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200214 return( MBEDTLS_ERR_CHACHAPOLY_BAD_STATE );
Daniel Kingb8025c52016-05-17 14:43:01 -0300215 }
216
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200217 if ( ctx->state == CHACHAPOLY_STATE_AAD )
Daniel Kingb8025c52016-05-17 14:43:01 -0300218 {
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200219 ctx->state = CHACHAPOLY_STATE_CIPHERTEXT;
Daniel Kingb8025c52016-05-17 14:43:01 -0300220
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200221 mbedtls_chachapoly_pad_aad( ctx );
Daniel Kingb8025c52016-05-17 14:43:01 -0300222 }
223
224 ctx->ciphertext_len += len;
225
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200226 if ( ctx->mode == MBEDTLS_CHACHAPOLY_ENCRYPT )
Daniel Kingb8025c52016-05-17 14:43:01 -0300227 {
228 /* Note: the following functions return an error only if one or more of
229 * the input pointers are NULL. Since we have checked their validity
230 * above, we can safety ignore the return value.
231 */
Daniel Kinge6e79682016-05-24 11:16:17 -0300232 (void) mbedtls_chacha20_update( &ctx->chacha20_ctx, len, input, output );
Manuel Pégourié-Gonnardb1ac5e72018-05-09 09:25:00 +0200233 (void) mbedtls_poly1305_update( &ctx->poly1305_ctx, output, len );
Daniel Kingb8025c52016-05-17 14:43:01 -0300234 }
235 else /* DECRYPT */
236 {
Manuel Pégourié-Gonnardb1ac5e72018-05-09 09:25:00 +0200237 (void) mbedtls_poly1305_update( &ctx->poly1305_ctx, input, len );
Daniel Kinge6e79682016-05-24 11:16:17 -0300238 (void) mbedtls_chacha20_update( &ctx->chacha20_ctx, len, input, output );
Daniel Kingb8025c52016-05-17 14:43:01 -0300239 }
240
241 return( 0 );
242}
243
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200244int mbedtls_chachapoly_finish( mbedtls_chachapoly_context *ctx,
245 unsigned char mac[16] )
Daniel Kingb8025c52016-05-17 14:43:01 -0300246{
247 unsigned char len_block[16];
248
249 if ( ( ctx == NULL ) || ( mac == NULL ) )
250 {
Manuel Pégourié-Gonnard3798b6b2018-05-24 13:27:45 +0200251 return( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA );
Daniel Kingb8025c52016-05-17 14:43:01 -0300252 }
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200253 else if ( ctx->state == CHACHAPOLY_STATE_INIT )
Daniel Kingb8025c52016-05-17 14:43:01 -0300254 {
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200255 return( MBEDTLS_ERR_CHACHAPOLY_BAD_STATE );
Daniel Kingb8025c52016-05-17 14:43:01 -0300256 }
257
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200258 if ( ctx->state == CHACHAPOLY_STATE_AAD )
Daniel Kingb8025c52016-05-17 14:43:01 -0300259 {
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200260 mbedtls_chachapoly_pad_aad( ctx );
Daniel Kingb8025c52016-05-17 14:43:01 -0300261 }
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200262 else if ( ctx->state == CHACHAPOLY_STATE_CIPHERTEXT )
Daniel Kingb8025c52016-05-17 14:43:01 -0300263 {
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200264 mbedtls_chachapoly_pad_ciphertext( ctx );
Daniel Kingb8025c52016-05-17 14:43:01 -0300265 }
266
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200267 ctx->state = CHACHAPOLY_STATE_FINISHED;
Daniel Kingb8025c52016-05-17 14:43:01 -0300268
269 /* The lengths of the AAD and ciphertext are processed by
270 * Poly1305 as the final 128-bit block, encoded as little-endian integers.
271 */
Daniel Kinge6e79682016-05-24 11:16:17 -0300272 len_block[0] = (unsigned char) ctx->aad_len;
273 len_block[1] = (unsigned char) ( ctx->aad_len >> 8 );
274 len_block[2] = (unsigned char) ( ctx->aad_len >> 16 );
275 len_block[3] = (unsigned char) ( ctx->aad_len >> 24 );
276 len_block[4] = (unsigned char) ( ctx->aad_len >> 32 );
277 len_block[5] = (unsigned char) ( ctx->aad_len >> 40 );
278 len_block[6] = (unsigned char) ( ctx->aad_len >> 48 );
279 len_block[7] = (unsigned char) ( ctx->aad_len >> 56 );
280 len_block[8] = (unsigned char) ctx->ciphertext_len;
281 len_block[9] = (unsigned char) ( ctx->ciphertext_len >> 8 );
282 len_block[10] = (unsigned char) ( ctx->ciphertext_len >> 16 );
283 len_block[11] = (unsigned char) ( ctx->ciphertext_len >> 24 );
284 len_block[12] = (unsigned char) ( ctx->ciphertext_len >> 32 );
285 len_block[13] = (unsigned char) ( ctx->ciphertext_len >> 40 );
286 len_block[14] = (unsigned char) ( ctx->ciphertext_len >> 48 );
287 len_block[15] = (unsigned char) ( ctx->ciphertext_len >> 56 );
Daniel Kingb8025c52016-05-17 14:43:01 -0300288
Manuel Pégourié-Gonnardb1ac5e72018-05-09 09:25:00 +0200289 (void) mbedtls_poly1305_update( &ctx->poly1305_ctx, len_block, 16U );
Daniel Kinge6e79682016-05-24 11:16:17 -0300290 (void) mbedtls_poly1305_finish( &ctx->poly1305_ctx, mac );
Daniel Kingb8025c52016-05-17 14:43:01 -0300291
292 return( 0 );
293}
294
Manuel Pégourié-Gonnard346b8d52018-05-07 12:56:36 +0200295int mbedtls_chachapoly_crypt_and_tag( mbedtls_chachapoly_context *ctx,
296 mbedtls_chachapoly_mode_t mode,
297 size_t length,
298 const unsigned char nonce[12],
299 const unsigned char *aad,
300 size_t aad_len,
301 const unsigned char *input,
302 unsigned char *output,
303 unsigned char tag[16] )
Daniel Kingb8025c52016-05-17 14:43:01 -0300304{
Daniel Kingb8025c52016-05-17 14:43:01 -0300305 int result;
306
Manuel Pégourié-Gonnard346b8d52018-05-07 12:56:36 +0200307 result = mbedtls_chachapoly_starts( ctx, nonce, mode );
Daniel Kingb8025c52016-05-17 14:43:01 -0300308 if ( result != 0 )
309 goto cleanup;
310
Manuel Pégourié-Gonnard5ef92d32018-05-09 09:34:25 +0200311 result = mbedtls_chachapoly_update_aad( ctx, aad, aad_len );
Daniel Kingb8025c52016-05-17 14:43:01 -0300312 if ( result != 0 )
313 goto cleanup;
314
Manuel Pégourié-Gonnard346b8d52018-05-07 12:56:36 +0200315 result = mbedtls_chachapoly_update( ctx, length, input, output );
Daniel Kingb8025c52016-05-17 14:43:01 -0300316 if ( result != 0 )
317 goto cleanup;
318
Manuel Pégourié-Gonnard346b8d52018-05-07 12:56:36 +0200319 result = mbedtls_chachapoly_finish( ctx, tag );
Daniel Kingb8025c52016-05-17 14:43:01 -0300320
321cleanup:
Daniel Kingb8025c52016-05-17 14:43:01 -0300322 return( result );
323}
324
Manuel Pégourié-Gonnard346b8d52018-05-07 12:56:36 +0200325int mbedtls_chachapoly_auth_decrypt( mbedtls_chachapoly_context *ctx,
326 size_t length,
327 const unsigned char nonce[12],
328 const unsigned char *aad,
329 size_t aad_len,
330 const unsigned char tag[16],
331 const unsigned char *input,
332 unsigned char *output )
333{
334 int ret;
335 unsigned char check_tag[16];
336 size_t i;
337 int diff;
338
Manuel Pégourié-Gonnard59d2c302018-05-10 10:39:32 +0200339 if( tag == NULL )
Manuel Pégourié-Gonnard3798b6b2018-05-24 13:27:45 +0200340 return( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA );
Manuel Pégourié-Gonnard59d2c302018-05-10 10:39:32 +0200341
Manuel Pégourié-Gonnard346b8d52018-05-07 12:56:36 +0200342 if( ( ret = mbedtls_chachapoly_crypt_and_tag( ctx,
343 MBEDTLS_CHACHAPOLY_DECRYPT, length, nonce,
344 aad, aad_len, input, output, check_tag ) ) != 0 )
345 {
346 return( ret );
347 }
348
349 /* Check tag in "constant-time" */
350 for( diff = 0, i = 0; i < sizeof( check_tag ); i++ )
351 diff |= tag[i] ^ check_tag[i];
352
353 if( diff != 0 )
354 {
Manuel Pégourié-Gonnardfb78c902018-05-24 13:46:15 +0200355 mbedtls_platform_zeroize( output, length );
Manuel Pégourié-Gonnard346b8d52018-05-07 12:56:36 +0200356 return( MBEDTLS_ERR_CHACHAPOLY_AUTH_FAILED );
357 }
358
359 return( 0 );
360}
361
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200362#endif /* MBEDTLS_CHACHAPOLY_ALT */
Manuel Pégourié-Gonnard95d0bdb2018-05-07 09:58:35 +0200363
Daniel Kingb8025c52016-05-17 14:43:01 -0300364#if defined(MBEDTLS_SELF_TEST)
365
366static const unsigned char test_key[1][32] =
367{
368 {
369 0x80, 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87,
370 0x88, 0x89, 0x8a, 0x8b, 0x8c, 0x8d, 0x8e, 0x8f,
371 0x90, 0x91, 0x92, 0x93, 0x94, 0x95, 0x96, 0x97,
372 0x98, 0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f
373 }
374};
375
376static const unsigned char test_nonce[1][12] =
377{
378 {
379 0x07, 0x00, 0x00, 0x00, /* 32-bit common part */
380 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47 /* 64-bit IV */
381 }
382};
383
384static const unsigned char test_aad[1][12] =
385{
386 {
387 0x50, 0x51, 0x52, 0x53, 0xc0, 0xc1, 0xc2, 0xc3,
388 0xc4, 0xc5, 0xc6, 0xc7
389 }
390};
391
392static const size_t test_aad_len[1] =
393{
394 12U
395};
396
397static const unsigned char test_input[1][114] =
398{
399 {
400 0x4c, 0x61, 0x64, 0x69, 0x65, 0x73, 0x20, 0x61,
401 0x6e, 0x64, 0x20, 0x47, 0x65, 0x6e, 0x74, 0x6c,
402 0x65, 0x6d, 0x65, 0x6e, 0x20, 0x6f, 0x66, 0x20,
403 0x74, 0x68, 0x65, 0x20, 0x63, 0x6c, 0x61, 0x73,
404 0x73, 0x20, 0x6f, 0x66, 0x20, 0x27, 0x39, 0x39,
405 0x3a, 0x20, 0x49, 0x66, 0x20, 0x49, 0x20, 0x63,
406 0x6f, 0x75, 0x6c, 0x64, 0x20, 0x6f, 0x66, 0x66,
407 0x65, 0x72, 0x20, 0x79, 0x6f, 0x75, 0x20, 0x6f,
408 0x6e, 0x6c, 0x79, 0x20, 0x6f, 0x6e, 0x65, 0x20,
409 0x74, 0x69, 0x70, 0x20, 0x66, 0x6f, 0x72, 0x20,
410 0x74, 0x68, 0x65, 0x20, 0x66, 0x75, 0x74, 0x75,
411 0x72, 0x65, 0x2c, 0x20, 0x73, 0x75, 0x6e, 0x73,
412 0x63, 0x72, 0x65, 0x65, 0x6e, 0x20, 0x77, 0x6f,
413 0x75, 0x6c, 0x64, 0x20, 0x62, 0x65, 0x20, 0x69,
414 0x74, 0x2e
415 }
416};
417
418static const unsigned char test_output[1][114] =
419{
420 {
421 0xd3, 0x1a, 0x8d, 0x34, 0x64, 0x8e, 0x60, 0xdb,
422 0x7b, 0x86, 0xaf, 0xbc, 0x53, 0xef, 0x7e, 0xc2,
423 0xa4, 0xad, 0xed, 0x51, 0x29, 0x6e, 0x08, 0xfe,
424 0xa9, 0xe2, 0xb5, 0xa7, 0x36, 0xee, 0x62, 0xd6,
425 0x3d, 0xbe, 0xa4, 0x5e, 0x8c, 0xa9, 0x67, 0x12,
426 0x82, 0xfa, 0xfb, 0x69, 0xda, 0x92, 0x72, 0x8b,
427 0x1a, 0x71, 0xde, 0x0a, 0x9e, 0x06, 0x0b, 0x29,
428 0x05, 0xd6, 0xa5, 0xb6, 0x7e, 0xcd, 0x3b, 0x36,
429 0x92, 0xdd, 0xbd, 0x7f, 0x2d, 0x77, 0x8b, 0x8c,
430 0x98, 0x03, 0xae, 0xe3, 0x28, 0x09, 0x1b, 0x58,
431 0xfa, 0xb3, 0x24, 0xe4, 0xfa, 0xd6, 0x75, 0x94,
432 0x55, 0x85, 0x80, 0x8b, 0x48, 0x31, 0xd7, 0xbc,
433 0x3f, 0xf4, 0xde, 0xf0, 0x8e, 0x4b, 0x7a, 0x9d,
434 0xe5, 0x76, 0xd2, 0x65, 0x86, 0xce, 0xc6, 0x4b,
435 0x61, 0x16
436 }
437};
438
439static const size_t test_input_len[1] =
440{
441 114U
442};
443
444static const unsigned char test_mac[1][16] =
445{
446 {
447 0x1a, 0xe1, 0x0b, 0x59, 0x4f, 0x09, 0xe2, 0x6a,
448 0x7e, 0x90, 0x2e, 0xcb, 0xd0, 0x60, 0x06, 0x91
449 }
450};
451
Manuel Pégourié-Gonnardc0dfcd42018-05-10 11:42:07 +0200452#define ASSERT( cond, args ) \
453 do \
454 { \
455 if( ! ( cond ) ) \
456 { \
457 if( verbose != 0 ) \
458 mbedtls_printf args; \
459 \
460 return( -1 ); \
461 } \
462 } \
463 while( 0 )
464
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200465int mbedtls_chachapoly_self_test( int verbose )
Daniel Kingb8025c52016-05-17 14:43:01 -0300466{
Manuel Pégourié-Gonnard346b8d52018-05-07 12:56:36 +0200467 mbedtls_chachapoly_context ctx;
Manuel Pégourié-Gonnardb7e99002018-05-07 10:14:18 +0200468 unsigned i;
Daniel Kingb8025c52016-05-17 14:43:01 -0300469 int result;
470 unsigned char output[200];
471 unsigned char mac[16];
472
Manuel Pégourié-Gonnardc0dfcd42018-05-10 11:42:07 +0200473 for( i = 0U; i < 1U; i++ )
Daniel Kingb8025c52016-05-17 14:43:01 -0300474 {
Manuel Pégourié-Gonnardc0dfcd42018-05-10 11:42:07 +0200475 if( verbose != 0 )
Manuel Pégourié-Gonnardb7e99002018-05-07 10:14:18 +0200476 mbedtls_printf( " ChaCha20-Poly1305 test %u ", i );
Daniel Kingdedf4a32016-05-18 10:07:53 -0300477
Manuel Pégourié-Gonnard346b8d52018-05-07 12:56:36 +0200478 mbedtls_chachapoly_init( &ctx );
479
480 result = mbedtls_chachapoly_setkey( &ctx, test_key[i] );
Manuel Pégourié-Gonnardc0dfcd42018-05-10 11:42:07 +0200481 ASSERT( 0 == result, ( "setkey() error code: %i\n", result ) );
Manuel Pégourié-Gonnard346b8d52018-05-07 12:56:36 +0200482
483 result = mbedtls_chachapoly_crypt_and_tag( &ctx,
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200484 MBEDTLS_CHACHAPOLY_ENCRYPT,
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200485 test_input_len[i],
Manuel Pégourié-Gonnard346b8d52018-05-07 12:56:36 +0200486 test_nonce[i],
487 test_aad[i],
488 test_aad_len[i],
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200489 test_input[i],
490 output,
491 mac );
Daniel Kingb8025c52016-05-17 14:43:01 -0300492
Manuel Pégourié-Gonnardc0dfcd42018-05-10 11:42:07 +0200493 ASSERT( 0 == result, ( "crypt_and_tag() error code: %i\n", result ) );
Daniel Kingb8025c52016-05-17 14:43:01 -0300494
Manuel Pégourié-Gonnardc0dfcd42018-05-10 11:42:07 +0200495 ASSERT( 0 == memcmp( output, test_output[i], test_input_len[i] ),
496 ( "failure (wrong output)\n" ) );
497
498 ASSERT( 0 == memcmp( mac, test_mac[i], 16U ),
499 ( "failure (wrong MAC)\n" ) );
Daniel Kingdedf4a32016-05-18 10:07:53 -0300500
Manuel Pégourié-Gonnard346b8d52018-05-07 12:56:36 +0200501 mbedtls_chachapoly_free( &ctx );
502
Manuel Pégourié-Gonnardc0dfcd42018-05-10 11:42:07 +0200503 if( verbose != 0 )
Daniel Kingdedf4a32016-05-18 10:07:53 -0300504 mbedtls_printf( "passed\n" );
Daniel Kingdedf4a32016-05-18 10:07:53 -0300505 }
506
507 if( verbose != 0 )
Daniel Kingdedf4a32016-05-18 10:07:53 -0300508 mbedtls_printf( "\n" );
Daniel Kingb8025c52016-05-17 14:43:01 -0300509
510 return( 0 );
511}
512
513#endif /* MBEDTLS_SELF_TEST */
514
Manuel Pégourié-Gonnarddca3a5d2018-05-07 10:43:27 +0200515#endif /* MBEDTLS_CHACHAPOLY_C */