xref: /aosp_15_r20/external/mbedtls/library/poly1305.c (revision 62c56f9862f102b96d72393aff6076c951fb8148)
1*62c56f98SSadaf Ebrahimi /**
2*62c56f98SSadaf Ebrahimi  * \file poly1305.c
3*62c56f98SSadaf Ebrahimi  *
4*62c56f98SSadaf Ebrahimi  * \brief Poly1305 authentication algorithm.
5*62c56f98SSadaf Ebrahimi  *
6*62c56f98SSadaf Ebrahimi  *  Copyright The Mbed TLS Contributors
7*62c56f98SSadaf Ebrahimi  *  SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
8*62c56f98SSadaf Ebrahimi  */
9*62c56f98SSadaf Ebrahimi #include "common.h"
10*62c56f98SSadaf Ebrahimi 
11*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_POLY1305_C)
12*62c56f98SSadaf Ebrahimi 
13*62c56f98SSadaf Ebrahimi #include "mbedtls/poly1305.h"
14*62c56f98SSadaf Ebrahimi #include "mbedtls/platform_util.h"
15*62c56f98SSadaf Ebrahimi #include "mbedtls/error.h"
16*62c56f98SSadaf Ebrahimi 
17*62c56f98SSadaf Ebrahimi #include <string.h>
18*62c56f98SSadaf Ebrahimi 
19*62c56f98SSadaf Ebrahimi #include "mbedtls/platform.h"
20*62c56f98SSadaf Ebrahimi 
21*62c56f98SSadaf Ebrahimi #if !defined(MBEDTLS_POLY1305_ALT)
22*62c56f98SSadaf Ebrahimi 
23*62c56f98SSadaf Ebrahimi #define POLY1305_BLOCK_SIZE_BYTES (16U)
24*62c56f98SSadaf Ebrahimi 
25*62c56f98SSadaf Ebrahimi /*
26*62c56f98SSadaf Ebrahimi  * Our implementation is tuned for 32-bit platforms with a 64-bit multiplier.
27*62c56f98SSadaf Ebrahimi  * However we provided an alternative for platforms without such a multiplier.
28*62c56f98SSadaf Ebrahimi  */
29*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_NO_64BIT_MULTIPLICATION)
mul64(uint32_t a,uint32_t b)30*62c56f98SSadaf Ebrahimi static uint64_t mul64(uint32_t a, uint32_t b)
31*62c56f98SSadaf Ebrahimi {
32*62c56f98SSadaf Ebrahimi     /* a = al + 2**16 ah, b = bl + 2**16 bh */
33*62c56f98SSadaf Ebrahimi     const uint16_t al = (uint16_t) a;
34*62c56f98SSadaf Ebrahimi     const uint16_t bl = (uint16_t) b;
35*62c56f98SSadaf Ebrahimi     const uint16_t ah = a >> 16;
36*62c56f98SSadaf Ebrahimi     const uint16_t bh = b >> 16;
37*62c56f98SSadaf Ebrahimi 
38*62c56f98SSadaf Ebrahimi     /* ab = al*bl + 2**16 (ah*bl + bl*bh) + 2**32 ah*bh */
39*62c56f98SSadaf Ebrahimi     const uint32_t lo = (uint32_t) al * bl;
40*62c56f98SSadaf Ebrahimi     const uint64_t me = (uint64_t) ((uint32_t) ah * bl) + (uint32_t) al * bh;
41*62c56f98SSadaf Ebrahimi     const uint32_t hi = (uint32_t) ah * bh;
42*62c56f98SSadaf Ebrahimi 
43*62c56f98SSadaf Ebrahimi     return lo + (me << 16) + ((uint64_t) hi << 32);
44*62c56f98SSadaf Ebrahimi }
45*62c56f98SSadaf Ebrahimi #else
mul64(uint32_t a,uint32_t b)46*62c56f98SSadaf Ebrahimi static inline uint64_t mul64(uint32_t a, uint32_t b)
47*62c56f98SSadaf Ebrahimi {
48*62c56f98SSadaf Ebrahimi     return (uint64_t) a * b;
49*62c56f98SSadaf Ebrahimi }
50*62c56f98SSadaf Ebrahimi #endif
51*62c56f98SSadaf Ebrahimi 
52*62c56f98SSadaf Ebrahimi 
53*62c56f98SSadaf Ebrahimi /**
54*62c56f98SSadaf Ebrahimi  * \brief                   Process blocks with Poly1305.
55*62c56f98SSadaf Ebrahimi  *
56*62c56f98SSadaf Ebrahimi  * \param ctx               The Poly1305 context.
57*62c56f98SSadaf Ebrahimi  * \param nblocks           Number of blocks to process. Note that this
58*62c56f98SSadaf Ebrahimi  *                          function only processes full blocks.
59*62c56f98SSadaf Ebrahimi  * \param input             Buffer containing the input block(s).
60*62c56f98SSadaf Ebrahimi  * \param needs_padding     Set to 0 if the padding bit has already been
61*62c56f98SSadaf Ebrahimi  *                          applied to the input data before calling this
62*62c56f98SSadaf Ebrahimi  *                          function.  Otherwise, set this parameter to 1.
63*62c56f98SSadaf Ebrahimi  */
poly1305_process(mbedtls_poly1305_context * ctx,size_t nblocks,const unsigned char * input,uint32_t needs_padding)64*62c56f98SSadaf Ebrahimi static void poly1305_process(mbedtls_poly1305_context *ctx,
65*62c56f98SSadaf Ebrahimi                              size_t nblocks,
66*62c56f98SSadaf Ebrahimi                              const unsigned char *input,
67*62c56f98SSadaf Ebrahimi                              uint32_t needs_padding)
68*62c56f98SSadaf Ebrahimi {
69*62c56f98SSadaf Ebrahimi     uint64_t d0, d1, d2, d3;
70*62c56f98SSadaf Ebrahimi     uint32_t acc0, acc1, acc2, acc3, acc4;
71*62c56f98SSadaf Ebrahimi     uint32_t r0, r1, r2, r3;
72*62c56f98SSadaf Ebrahimi     uint32_t rs1, rs2, rs3;
73*62c56f98SSadaf Ebrahimi     size_t offset  = 0U;
74*62c56f98SSadaf Ebrahimi     size_t i;
75*62c56f98SSadaf Ebrahimi 
76*62c56f98SSadaf Ebrahimi     r0 = ctx->r[0];
77*62c56f98SSadaf Ebrahimi     r1 = ctx->r[1];
78*62c56f98SSadaf Ebrahimi     r2 = ctx->r[2];
79*62c56f98SSadaf Ebrahimi     r3 = ctx->r[3];
80*62c56f98SSadaf Ebrahimi 
81*62c56f98SSadaf Ebrahimi     rs1 = r1 + (r1 >> 2U);
82*62c56f98SSadaf Ebrahimi     rs2 = r2 + (r2 >> 2U);
83*62c56f98SSadaf Ebrahimi     rs3 = r3 + (r3 >> 2U);
84*62c56f98SSadaf Ebrahimi 
85*62c56f98SSadaf Ebrahimi     acc0 = ctx->acc[0];
86*62c56f98SSadaf Ebrahimi     acc1 = ctx->acc[1];
87*62c56f98SSadaf Ebrahimi     acc2 = ctx->acc[2];
88*62c56f98SSadaf Ebrahimi     acc3 = ctx->acc[3];
89*62c56f98SSadaf Ebrahimi     acc4 = ctx->acc[4];
90*62c56f98SSadaf Ebrahimi 
91*62c56f98SSadaf Ebrahimi     /* Process full blocks */
92*62c56f98SSadaf Ebrahimi     for (i = 0U; i < nblocks; i++) {
93*62c56f98SSadaf Ebrahimi         /* The input block is treated as a 128-bit little-endian integer */
94*62c56f98SSadaf Ebrahimi         d0   = MBEDTLS_GET_UINT32_LE(input, offset + 0);
95*62c56f98SSadaf Ebrahimi         d1   = MBEDTLS_GET_UINT32_LE(input, offset + 4);
96*62c56f98SSadaf Ebrahimi         d2   = MBEDTLS_GET_UINT32_LE(input, offset + 8);
97*62c56f98SSadaf Ebrahimi         d3   = MBEDTLS_GET_UINT32_LE(input, offset + 12);
98*62c56f98SSadaf Ebrahimi 
99*62c56f98SSadaf Ebrahimi         /* Compute: acc += (padded) block as a 130-bit integer */
100*62c56f98SSadaf Ebrahimi         d0  += (uint64_t) acc0;
101*62c56f98SSadaf Ebrahimi         d1  += (uint64_t) acc1 + (d0 >> 32U);
102*62c56f98SSadaf Ebrahimi         d2  += (uint64_t) acc2 + (d1 >> 32U);
103*62c56f98SSadaf Ebrahimi         d3  += (uint64_t) acc3 + (d2 >> 32U);
104*62c56f98SSadaf Ebrahimi         acc0 = (uint32_t) d0;
105*62c56f98SSadaf Ebrahimi         acc1 = (uint32_t) d1;
106*62c56f98SSadaf Ebrahimi         acc2 = (uint32_t) d2;
107*62c56f98SSadaf Ebrahimi         acc3 = (uint32_t) d3;
108*62c56f98SSadaf Ebrahimi         acc4 += (uint32_t) (d3 >> 32U) + needs_padding;
109*62c56f98SSadaf Ebrahimi 
110*62c56f98SSadaf Ebrahimi         /* Compute: acc *= r */
111*62c56f98SSadaf Ebrahimi         d0 = mul64(acc0, r0) +
112*62c56f98SSadaf Ebrahimi              mul64(acc1, rs3) +
113*62c56f98SSadaf Ebrahimi              mul64(acc2, rs2) +
114*62c56f98SSadaf Ebrahimi              mul64(acc3, rs1);
115*62c56f98SSadaf Ebrahimi         d1 = mul64(acc0, r1) +
116*62c56f98SSadaf Ebrahimi              mul64(acc1, r0) +
117*62c56f98SSadaf Ebrahimi              mul64(acc2, rs3) +
118*62c56f98SSadaf Ebrahimi              mul64(acc3, rs2) +
119*62c56f98SSadaf Ebrahimi              mul64(acc4, rs1);
120*62c56f98SSadaf Ebrahimi         d2 = mul64(acc0, r2) +
121*62c56f98SSadaf Ebrahimi              mul64(acc1, r1) +
122*62c56f98SSadaf Ebrahimi              mul64(acc2, r0) +
123*62c56f98SSadaf Ebrahimi              mul64(acc3, rs3) +
124*62c56f98SSadaf Ebrahimi              mul64(acc4, rs2);
125*62c56f98SSadaf Ebrahimi         d3 = mul64(acc0, r3) +
126*62c56f98SSadaf Ebrahimi              mul64(acc1, r2) +
127*62c56f98SSadaf Ebrahimi              mul64(acc2, r1) +
128*62c56f98SSadaf Ebrahimi              mul64(acc3, r0) +
129*62c56f98SSadaf Ebrahimi              mul64(acc4, rs3);
130*62c56f98SSadaf Ebrahimi         acc4 *= r0;
131*62c56f98SSadaf Ebrahimi 
132*62c56f98SSadaf Ebrahimi         /* Compute: acc %= (2^130 - 5) (partial remainder) */
133*62c56f98SSadaf Ebrahimi         d1 += (d0 >> 32);
134*62c56f98SSadaf Ebrahimi         d2 += (d1 >> 32);
135*62c56f98SSadaf Ebrahimi         d3 += (d2 >> 32);
136*62c56f98SSadaf Ebrahimi         acc0 = (uint32_t) d0;
137*62c56f98SSadaf Ebrahimi         acc1 = (uint32_t) d1;
138*62c56f98SSadaf Ebrahimi         acc2 = (uint32_t) d2;
139*62c56f98SSadaf Ebrahimi         acc3 = (uint32_t) d3;
140*62c56f98SSadaf Ebrahimi         acc4 = (uint32_t) (d3 >> 32) + acc4;
141*62c56f98SSadaf Ebrahimi 
142*62c56f98SSadaf Ebrahimi         d0 = (uint64_t) acc0 + (acc4 >> 2) + (acc4 & 0xFFFFFFFCU);
143*62c56f98SSadaf Ebrahimi         acc4 &= 3U;
144*62c56f98SSadaf Ebrahimi         acc0 = (uint32_t) d0;
145*62c56f98SSadaf Ebrahimi         d0 = (uint64_t) acc1 + (d0 >> 32U);
146*62c56f98SSadaf Ebrahimi         acc1 = (uint32_t) d0;
147*62c56f98SSadaf Ebrahimi         d0 = (uint64_t) acc2 + (d0 >> 32U);
148*62c56f98SSadaf Ebrahimi         acc2 = (uint32_t) d0;
149*62c56f98SSadaf Ebrahimi         d0 = (uint64_t) acc3 + (d0 >> 32U);
150*62c56f98SSadaf Ebrahimi         acc3 = (uint32_t) d0;
151*62c56f98SSadaf Ebrahimi         d0 = (uint64_t) acc4 + (d0 >> 32U);
152*62c56f98SSadaf Ebrahimi         acc4 = (uint32_t) d0;
153*62c56f98SSadaf Ebrahimi 
154*62c56f98SSadaf Ebrahimi         offset    += POLY1305_BLOCK_SIZE_BYTES;
155*62c56f98SSadaf Ebrahimi     }
156*62c56f98SSadaf Ebrahimi 
157*62c56f98SSadaf Ebrahimi     ctx->acc[0] = acc0;
158*62c56f98SSadaf Ebrahimi     ctx->acc[1] = acc1;
159*62c56f98SSadaf Ebrahimi     ctx->acc[2] = acc2;
160*62c56f98SSadaf Ebrahimi     ctx->acc[3] = acc3;
161*62c56f98SSadaf Ebrahimi     ctx->acc[4] = acc4;
162*62c56f98SSadaf Ebrahimi }
163*62c56f98SSadaf Ebrahimi 
164*62c56f98SSadaf Ebrahimi /**
165*62c56f98SSadaf Ebrahimi  * \brief                   Compute the Poly1305 MAC
166*62c56f98SSadaf Ebrahimi  *
167*62c56f98SSadaf Ebrahimi  * \param ctx               The Poly1305 context.
168*62c56f98SSadaf Ebrahimi  * \param mac               The buffer to where the MAC is written. Must be
169*62c56f98SSadaf Ebrahimi  *                          big enough to contain the 16-byte MAC.
170*62c56f98SSadaf Ebrahimi  */
poly1305_compute_mac(const mbedtls_poly1305_context * ctx,unsigned char mac[16])171*62c56f98SSadaf Ebrahimi static void poly1305_compute_mac(const mbedtls_poly1305_context *ctx,
172*62c56f98SSadaf Ebrahimi                                  unsigned char mac[16])
173*62c56f98SSadaf Ebrahimi {
174*62c56f98SSadaf Ebrahimi     uint64_t d;
175*62c56f98SSadaf Ebrahimi     uint32_t g0, g1, g2, g3, g4;
176*62c56f98SSadaf Ebrahimi     uint32_t acc0, acc1, acc2, acc3, acc4;
177*62c56f98SSadaf Ebrahimi     uint32_t mask;
178*62c56f98SSadaf Ebrahimi     uint32_t mask_inv;
179*62c56f98SSadaf Ebrahimi 
180*62c56f98SSadaf Ebrahimi     acc0 = ctx->acc[0];
181*62c56f98SSadaf Ebrahimi     acc1 = ctx->acc[1];
182*62c56f98SSadaf Ebrahimi     acc2 = ctx->acc[2];
183*62c56f98SSadaf Ebrahimi     acc3 = ctx->acc[3];
184*62c56f98SSadaf Ebrahimi     acc4 = ctx->acc[4];
185*62c56f98SSadaf Ebrahimi 
186*62c56f98SSadaf Ebrahimi     /* Before adding 's' we ensure that the accumulator is mod 2^130 - 5.
187*62c56f98SSadaf Ebrahimi      * We do this by calculating acc - (2^130 - 5), then checking if
188*62c56f98SSadaf Ebrahimi      * the 131st bit is set. If it is, then reduce: acc -= (2^130 - 5)
189*62c56f98SSadaf Ebrahimi      */
190*62c56f98SSadaf Ebrahimi 
191*62c56f98SSadaf Ebrahimi     /* Calculate acc + -(2^130 - 5) */
192*62c56f98SSadaf Ebrahimi     d  = ((uint64_t) acc0 + 5U);
193*62c56f98SSadaf Ebrahimi     g0 = (uint32_t) d;
194*62c56f98SSadaf Ebrahimi     d  = ((uint64_t) acc1 + (d >> 32));
195*62c56f98SSadaf Ebrahimi     g1 = (uint32_t) d;
196*62c56f98SSadaf Ebrahimi     d  = ((uint64_t) acc2 + (d >> 32));
197*62c56f98SSadaf Ebrahimi     g2 = (uint32_t) d;
198*62c56f98SSadaf Ebrahimi     d  = ((uint64_t) acc3 + (d >> 32));
199*62c56f98SSadaf Ebrahimi     g3 = (uint32_t) d;
200*62c56f98SSadaf Ebrahimi     g4 = acc4 + (uint32_t) (d >> 32U);
201*62c56f98SSadaf Ebrahimi 
202*62c56f98SSadaf Ebrahimi     /* mask == 0xFFFFFFFF if 131st bit is set, otherwise mask == 0 */
203*62c56f98SSadaf Ebrahimi     mask = (uint32_t) 0U - (g4 >> 2U);
204*62c56f98SSadaf Ebrahimi     mask_inv = ~mask;
205*62c56f98SSadaf Ebrahimi 
206*62c56f98SSadaf Ebrahimi     /* If 131st bit is set then acc=g, otherwise, acc is unmodified */
207*62c56f98SSadaf Ebrahimi     acc0 = (acc0 & mask_inv) | (g0 & mask);
208*62c56f98SSadaf Ebrahimi     acc1 = (acc1 & mask_inv) | (g1 & mask);
209*62c56f98SSadaf Ebrahimi     acc2 = (acc2 & mask_inv) | (g2 & mask);
210*62c56f98SSadaf Ebrahimi     acc3 = (acc3 & mask_inv) | (g3 & mask);
211*62c56f98SSadaf Ebrahimi 
212*62c56f98SSadaf Ebrahimi     /* Add 's' */
213*62c56f98SSadaf Ebrahimi     d = (uint64_t) acc0 + ctx->s[0];
214*62c56f98SSadaf Ebrahimi     acc0 = (uint32_t) d;
215*62c56f98SSadaf Ebrahimi     d = (uint64_t) acc1 + ctx->s[1] + (d >> 32U);
216*62c56f98SSadaf Ebrahimi     acc1 = (uint32_t) d;
217*62c56f98SSadaf Ebrahimi     d = (uint64_t) acc2 + ctx->s[2] + (d >> 32U);
218*62c56f98SSadaf Ebrahimi     acc2 = (uint32_t) d;
219*62c56f98SSadaf Ebrahimi     acc3 += ctx->s[3] + (uint32_t) (d >> 32U);
220*62c56f98SSadaf Ebrahimi 
221*62c56f98SSadaf Ebrahimi     /* Compute MAC (128 least significant bits of the accumulator) */
222*62c56f98SSadaf Ebrahimi     MBEDTLS_PUT_UINT32_LE(acc0, mac,  0);
223*62c56f98SSadaf Ebrahimi     MBEDTLS_PUT_UINT32_LE(acc1, mac,  4);
224*62c56f98SSadaf Ebrahimi     MBEDTLS_PUT_UINT32_LE(acc2, mac,  8);
225*62c56f98SSadaf Ebrahimi     MBEDTLS_PUT_UINT32_LE(acc3, mac, 12);
226*62c56f98SSadaf Ebrahimi }
227*62c56f98SSadaf Ebrahimi 
mbedtls_poly1305_init(mbedtls_poly1305_context * ctx)228*62c56f98SSadaf Ebrahimi void mbedtls_poly1305_init(mbedtls_poly1305_context *ctx)
229*62c56f98SSadaf Ebrahimi {
230*62c56f98SSadaf Ebrahimi     mbedtls_platform_zeroize(ctx, sizeof(mbedtls_poly1305_context));
231*62c56f98SSadaf Ebrahimi }
232*62c56f98SSadaf Ebrahimi 
mbedtls_poly1305_free(mbedtls_poly1305_context * ctx)233*62c56f98SSadaf Ebrahimi void mbedtls_poly1305_free(mbedtls_poly1305_context *ctx)
234*62c56f98SSadaf Ebrahimi {
235*62c56f98SSadaf Ebrahimi     if (ctx == NULL) {
236*62c56f98SSadaf Ebrahimi         return;
237*62c56f98SSadaf Ebrahimi     }
238*62c56f98SSadaf Ebrahimi 
239*62c56f98SSadaf Ebrahimi     mbedtls_platform_zeroize(ctx, sizeof(mbedtls_poly1305_context));
240*62c56f98SSadaf Ebrahimi }
241*62c56f98SSadaf Ebrahimi 
mbedtls_poly1305_starts(mbedtls_poly1305_context * ctx,const unsigned char key[32])242*62c56f98SSadaf Ebrahimi int mbedtls_poly1305_starts(mbedtls_poly1305_context *ctx,
243*62c56f98SSadaf Ebrahimi                             const unsigned char key[32])
244*62c56f98SSadaf Ebrahimi {
245*62c56f98SSadaf Ebrahimi     /* r &= 0x0ffffffc0ffffffc0ffffffc0fffffff */
246*62c56f98SSadaf Ebrahimi     ctx->r[0] = MBEDTLS_GET_UINT32_LE(key, 0)  & 0x0FFFFFFFU;
247*62c56f98SSadaf Ebrahimi     ctx->r[1] = MBEDTLS_GET_UINT32_LE(key, 4)  & 0x0FFFFFFCU;
248*62c56f98SSadaf Ebrahimi     ctx->r[2] = MBEDTLS_GET_UINT32_LE(key, 8)  & 0x0FFFFFFCU;
249*62c56f98SSadaf Ebrahimi     ctx->r[3] = MBEDTLS_GET_UINT32_LE(key, 12) & 0x0FFFFFFCU;
250*62c56f98SSadaf Ebrahimi 
251*62c56f98SSadaf Ebrahimi     ctx->s[0] = MBEDTLS_GET_UINT32_LE(key, 16);
252*62c56f98SSadaf Ebrahimi     ctx->s[1] = MBEDTLS_GET_UINT32_LE(key, 20);
253*62c56f98SSadaf Ebrahimi     ctx->s[2] = MBEDTLS_GET_UINT32_LE(key, 24);
254*62c56f98SSadaf Ebrahimi     ctx->s[3] = MBEDTLS_GET_UINT32_LE(key, 28);
255*62c56f98SSadaf Ebrahimi 
256*62c56f98SSadaf Ebrahimi     /* Initial accumulator state */
257*62c56f98SSadaf Ebrahimi     ctx->acc[0] = 0U;
258*62c56f98SSadaf Ebrahimi     ctx->acc[1] = 0U;
259*62c56f98SSadaf Ebrahimi     ctx->acc[2] = 0U;
260*62c56f98SSadaf Ebrahimi     ctx->acc[3] = 0U;
261*62c56f98SSadaf Ebrahimi     ctx->acc[4] = 0U;
262*62c56f98SSadaf Ebrahimi 
263*62c56f98SSadaf Ebrahimi     /* Queue initially empty */
264*62c56f98SSadaf Ebrahimi     mbedtls_platform_zeroize(ctx->queue, sizeof(ctx->queue));
265*62c56f98SSadaf Ebrahimi     ctx->queue_len = 0U;
266*62c56f98SSadaf Ebrahimi 
267*62c56f98SSadaf Ebrahimi     return 0;
268*62c56f98SSadaf Ebrahimi }
269*62c56f98SSadaf Ebrahimi 
mbedtls_poly1305_update(mbedtls_poly1305_context * ctx,const unsigned char * input,size_t ilen)270*62c56f98SSadaf Ebrahimi int mbedtls_poly1305_update(mbedtls_poly1305_context *ctx,
271*62c56f98SSadaf Ebrahimi                             const unsigned char *input,
272*62c56f98SSadaf Ebrahimi                             size_t ilen)
273*62c56f98SSadaf Ebrahimi {
274*62c56f98SSadaf Ebrahimi     size_t offset    = 0U;
275*62c56f98SSadaf Ebrahimi     size_t remaining = ilen;
276*62c56f98SSadaf Ebrahimi     size_t queue_free_len;
277*62c56f98SSadaf Ebrahimi     size_t nblocks;
278*62c56f98SSadaf Ebrahimi 
279*62c56f98SSadaf Ebrahimi     if ((remaining > 0U) && (ctx->queue_len > 0U)) {
280*62c56f98SSadaf Ebrahimi         queue_free_len = (POLY1305_BLOCK_SIZE_BYTES - ctx->queue_len);
281*62c56f98SSadaf Ebrahimi 
282*62c56f98SSadaf Ebrahimi         if (ilen < queue_free_len) {
283*62c56f98SSadaf Ebrahimi             /* Not enough data to complete the block.
284*62c56f98SSadaf Ebrahimi              * Store this data with the other leftovers.
285*62c56f98SSadaf Ebrahimi              */
286*62c56f98SSadaf Ebrahimi             memcpy(&ctx->queue[ctx->queue_len],
287*62c56f98SSadaf Ebrahimi                    input,
288*62c56f98SSadaf Ebrahimi                    ilen);
289*62c56f98SSadaf Ebrahimi 
290*62c56f98SSadaf Ebrahimi             ctx->queue_len += ilen;
291*62c56f98SSadaf Ebrahimi 
292*62c56f98SSadaf Ebrahimi             remaining = 0U;
293*62c56f98SSadaf Ebrahimi         } else {
294*62c56f98SSadaf Ebrahimi             /* Enough data to produce a complete block */
295*62c56f98SSadaf Ebrahimi             memcpy(&ctx->queue[ctx->queue_len],
296*62c56f98SSadaf Ebrahimi                    input,
297*62c56f98SSadaf Ebrahimi                    queue_free_len);
298*62c56f98SSadaf Ebrahimi 
299*62c56f98SSadaf Ebrahimi             ctx->queue_len = 0U;
300*62c56f98SSadaf Ebrahimi 
301*62c56f98SSadaf Ebrahimi             poly1305_process(ctx, 1U, ctx->queue, 1U);   /* add padding bit */
302*62c56f98SSadaf Ebrahimi 
303*62c56f98SSadaf Ebrahimi             offset    += queue_free_len;
304*62c56f98SSadaf Ebrahimi             remaining -= queue_free_len;
305*62c56f98SSadaf Ebrahimi         }
306*62c56f98SSadaf Ebrahimi     }
307*62c56f98SSadaf Ebrahimi 
308*62c56f98SSadaf Ebrahimi     if (remaining >= POLY1305_BLOCK_SIZE_BYTES) {
309*62c56f98SSadaf Ebrahimi         nblocks = remaining / POLY1305_BLOCK_SIZE_BYTES;
310*62c56f98SSadaf Ebrahimi 
311*62c56f98SSadaf Ebrahimi         poly1305_process(ctx, nblocks, &input[offset], 1U);
312*62c56f98SSadaf Ebrahimi 
313*62c56f98SSadaf Ebrahimi         offset += nblocks * POLY1305_BLOCK_SIZE_BYTES;
314*62c56f98SSadaf Ebrahimi         remaining %= POLY1305_BLOCK_SIZE_BYTES;
315*62c56f98SSadaf Ebrahimi     }
316*62c56f98SSadaf Ebrahimi 
317*62c56f98SSadaf Ebrahimi     if (remaining > 0U) {
318*62c56f98SSadaf Ebrahimi         /* Store partial block */
319*62c56f98SSadaf Ebrahimi         ctx->queue_len = remaining;
320*62c56f98SSadaf Ebrahimi         memcpy(ctx->queue, &input[offset], remaining);
321*62c56f98SSadaf Ebrahimi     }
322*62c56f98SSadaf Ebrahimi 
323*62c56f98SSadaf Ebrahimi     return 0;
324*62c56f98SSadaf Ebrahimi }
325*62c56f98SSadaf Ebrahimi 
mbedtls_poly1305_finish(mbedtls_poly1305_context * ctx,unsigned char mac[16])326*62c56f98SSadaf Ebrahimi int mbedtls_poly1305_finish(mbedtls_poly1305_context *ctx,
327*62c56f98SSadaf Ebrahimi                             unsigned char mac[16])
328*62c56f98SSadaf Ebrahimi {
329*62c56f98SSadaf Ebrahimi     /* Process any leftover data */
330*62c56f98SSadaf Ebrahimi     if (ctx->queue_len > 0U) {
331*62c56f98SSadaf Ebrahimi         /* Add padding bit */
332*62c56f98SSadaf Ebrahimi         ctx->queue[ctx->queue_len] = 1U;
333*62c56f98SSadaf Ebrahimi         ctx->queue_len++;
334*62c56f98SSadaf Ebrahimi 
335*62c56f98SSadaf Ebrahimi         /* Pad with zeroes */
336*62c56f98SSadaf Ebrahimi         memset(&ctx->queue[ctx->queue_len],
337*62c56f98SSadaf Ebrahimi                0,
338*62c56f98SSadaf Ebrahimi                POLY1305_BLOCK_SIZE_BYTES - ctx->queue_len);
339*62c56f98SSadaf Ebrahimi 
340*62c56f98SSadaf Ebrahimi         poly1305_process(ctx, 1U,           /* Process 1 block */
341*62c56f98SSadaf Ebrahimi                          ctx->queue, 0U);   /* Already padded above */
342*62c56f98SSadaf Ebrahimi     }
343*62c56f98SSadaf Ebrahimi 
344*62c56f98SSadaf Ebrahimi     poly1305_compute_mac(ctx, mac);
345*62c56f98SSadaf Ebrahimi 
346*62c56f98SSadaf Ebrahimi     return 0;
347*62c56f98SSadaf Ebrahimi }
348*62c56f98SSadaf Ebrahimi 
mbedtls_poly1305_mac(const unsigned char key[32],const unsigned char * input,size_t ilen,unsigned char mac[16])349*62c56f98SSadaf Ebrahimi int mbedtls_poly1305_mac(const unsigned char key[32],
350*62c56f98SSadaf Ebrahimi                          const unsigned char *input,
351*62c56f98SSadaf Ebrahimi                          size_t ilen,
352*62c56f98SSadaf Ebrahimi                          unsigned char mac[16])
353*62c56f98SSadaf Ebrahimi {
354*62c56f98SSadaf Ebrahimi     mbedtls_poly1305_context ctx;
355*62c56f98SSadaf Ebrahimi     int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
356*62c56f98SSadaf Ebrahimi 
357*62c56f98SSadaf Ebrahimi     mbedtls_poly1305_init(&ctx);
358*62c56f98SSadaf Ebrahimi 
359*62c56f98SSadaf Ebrahimi     ret = mbedtls_poly1305_starts(&ctx, key);
360*62c56f98SSadaf Ebrahimi     if (ret != 0) {
361*62c56f98SSadaf Ebrahimi         goto cleanup;
362*62c56f98SSadaf Ebrahimi     }
363*62c56f98SSadaf Ebrahimi 
364*62c56f98SSadaf Ebrahimi     ret = mbedtls_poly1305_update(&ctx, input, ilen);
365*62c56f98SSadaf Ebrahimi     if (ret != 0) {
366*62c56f98SSadaf Ebrahimi         goto cleanup;
367*62c56f98SSadaf Ebrahimi     }
368*62c56f98SSadaf Ebrahimi 
369*62c56f98SSadaf Ebrahimi     ret = mbedtls_poly1305_finish(&ctx, mac);
370*62c56f98SSadaf Ebrahimi 
371*62c56f98SSadaf Ebrahimi cleanup:
372*62c56f98SSadaf Ebrahimi     mbedtls_poly1305_free(&ctx);
373*62c56f98SSadaf Ebrahimi     return ret;
374*62c56f98SSadaf Ebrahimi }
375*62c56f98SSadaf Ebrahimi 
376*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_POLY1305_ALT */
377*62c56f98SSadaf Ebrahimi 
378*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_SELF_TEST)
379*62c56f98SSadaf Ebrahimi 
380*62c56f98SSadaf Ebrahimi static const unsigned char test_keys[2][32] =
381*62c56f98SSadaf Ebrahimi {
382*62c56f98SSadaf Ebrahimi     {
383*62c56f98SSadaf Ebrahimi         0x85, 0xd6, 0xbe, 0x78, 0x57, 0x55, 0x6d, 0x33,
384*62c56f98SSadaf Ebrahimi         0x7f, 0x44, 0x52, 0xfe, 0x42, 0xd5, 0x06, 0xa8,
385*62c56f98SSadaf Ebrahimi         0x01, 0x03, 0x80, 0x8a, 0xfb, 0x0d, 0xb2, 0xfd,
386*62c56f98SSadaf Ebrahimi         0x4a, 0xbf, 0xf6, 0xaf, 0x41, 0x49, 0xf5, 0x1b
387*62c56f98SSadaf Ebrahimi     },
388*62c56f98SSadaf Ebrahimi     {
389*62c56f98SSadaf Ebrahimi         0x1c, 0x92, 0x40, 0xa5, 0xeb, 0x55, 0xd3, 0x8a,
390*62c56f98SSadaf Ebrahimi         0xf3, 0x33, 0x88, 0x86, 0x04, 0xf6, 0xb5, 0xf0,
391*62c56f98SSadaf Ebrahimi         0x47, 0x39, 0x17, 0xc1, 0x40, 0x2b, 0x80, 0x09,
392*62c56f98SSadaf Ebrahimi         0x9d, 0xca, 0x5c, 0xbc, 0x20, 0x70, 0x75, 0xc0
393*62c56f98SSadaf Ebrahimi     }
394*62c56f98SSadaf Ebrahimi };
395*62c56f98SSadaf Ebrahimi 
396*62c56f98SSadaf Ebrahimi static const unsigned char test_data[2][127] =
397*62c56f98SSadaf Ebrahimi {
398*62c56f98SSadaf Ebrahimi     {
399*62c56f98SSadaf Ebrahimi         0x43, 0x72, 0x79, 0x70, 0x74, 0x6f, 0x67, 0x72,
400*62c56f98SSadaf Ebrahimi         0x61, 0x70, 0x68, 0x69, 0x63, 0x20, 0x46, 0x6f,
401*62c56f98SSadaf Ebrahimi         0x72, 0x75, 0x6d, 0x20, 0x52, 0x65, 0x73, 0x65,
402*62c56f98SSadaf Ebrahimi         0x61, 0x72, 0x63, 0x68, 0x20, 0x47, 0x72, 0x6f,
403*62c56f98SSadaf Ebrahimi         0x75, 0x70
404*62c56f98SSadaf Ebrahimi     },
405*62c56f98SSadaf Ebrahimi     {
406*62c56f98SSadaf Ebrahimi         0x27, 0x54, 0x77, 0x61, 0x73, 0x20, 0x62, 0x72,
407*62c56f98SSadaf Ebrahimi         0x69, 0x6c, 0x6c, 0x69, 0x67, 0x2c, 0x20, 0x61,
408*62c56f98SSadaf Ebrahimi         0x6e, 0x64, 0x20, 0x74, 0x68, 0x65, 0x20, 0x73,
409*62c56f98SSadaf Ebrahimi         0x6c, 0x69, 0x74, 0x68, 0x79, 0x20, 0x74, 0x6f,
410*62c56f98SSadaf Ebrahimi         0x76, 0x65, 0x73, 0x0a, 0x44, 0x69, 0x64, 0x20,
411*62c56f98SSadaf Ebrahimi         0x67, 0x79, 0x72, 0x65, 0x20, 0x61, 0x6e, 0x64,
412*62c56f98SSadaf Ebrahimi         0x20, 0x67, 0x69, 0x6d, 0x62, 0x6c, 0x65, 0x20,
413*62c56f98SSadaf Ebrahimi         0x69, 0x6e, 0x20, 0x74, 0x68, 0x65, 0x20, 0x77,
414*62c56f98SSadaf Ebrahimi         0x61, 0x62, 0x65, 0x3a, 0x0a, 0x41, 0x6c, 0x6c,
415*62c56f98SSadaf Ebrahimi         0x20, 0x6d, 0x69, 0x6d, 0x73, 0x79, 0x20, 0x77,
416*62c56f98SSadaf Ebrahimi         0x65, 0x72, 0x65, 0x20, 0x74, 0x68, 0x65, 0x20,
417*62c56f98SSadaf Ebrahimi         0x62, 0x6f, 0x72, 0x6f, 0x67, 0x6f, 0x76, 0x65,
418*62c56f98SSadaf Ebrahimi         0x73, 0x2c, 0x0a, 0x41, 0x6e, 0x64, 0x20, 0x74,
419*62c56f98SSadaf Ebrahimi         0x68, 0x65, 0x20, 0x6d, 0x6f, 0x6d, 0x65, 0x20,
420*62c56f98SSadaf Ebrahimi         0x72, 0x61, 0x74, 0x68, 0x73, 0x20, 0x6f, 0x75,
421*62c56f98SSadaf Ebrahimi         0x74, 0x67, 0x72, 0x61, 0x62, 0x65, 0x2e
422*62c56f98SSadaf Ebrahimi     }
423*62c56f98SSadaf Ebrahimi };
424*62c56f98SSadaf Ebrahimi 
425*62c56f98SSadaf Ebrahimi static const size_t test_data_len[2] =
426*62c56f98SSadaf Ebrahimi {
427*62c56f98SSadaf Ebrahimi     34U,
428*62c56f98SSadaf Ebrahimi     127U
429*62c56f98SSadaf Ebrahimi };
430*62c56f98SSadaf Ebrahimi 
431*62c56f98SSadaf Ebrahimi static const unsigned char test_mac[2][16] =
432*62c56f98SSadaf Ebrahimi {
433*62c56f98SSadaf Ebrahimi     {
434*62c56f98SSadaf Ebrahimi         0xa8, 0x06, 0x1d, 0xc1, 0x30, 0x51, 0x36, 0xc6,
435*62c56f98SSadaf Ebrahimi         0xc2, 0x2b, 0x8b, 0xaf, 0x0c, 0x01, 0x27, 0xa9
436*62c56f98SSadaf Ebrahimi     },
437*62c56f98SSadaf Ebrahimi     {
438*62c56f98SSadaf Ebrahimi         0x45, 0x41, 0x66, 0x9a, 0x7e, 0xaa, 0xee, 0x61,
439*62c56f98SSadaf Ebrahimi         0xe7, 0x08, 0xdc, 0x7c, 0xbc, 0xc5, 0xeb, 0x62
440*62c56f98SSadaf Ebrahimi     }
441*62c56f98SSadaf Ebrahimi };
442*62c56f98SSadaf Ebrahimi 
443*62c56f98SSadaf Ebrahimi /* Make sure no other definition is already present. */
444*62c56f98SSadaf Ebrahimi #undef ASSERT
445*62c56f98SSadaf Ebrahimi 
446*62c56f98SSadaf Ebrahimi #define ASSERT(cond, args)            \
447*62c56f98SSadaf Ebrahimi     do                                  \
448*62c56f98SSadaf Ebrahimi     {                                   \
449*62c56f98SSadaf Ebrahimi         if (!(cond))                \
450*62c56f98SSadaf Ebrahimi         {                               \
451*62c56f98SSadaf Ebrahimi             if (verbose != 0)          \
452*62c56f98SSadaf Ebrahimi             mbedtls_printf args;    \
453*62c56f98SSadaf Ebrahimi                                         \
454*62c56f98SSadaf Ebrahimi             return -1;               \
455*62c56f98SSadaf Ebrahimi         }                               \
456*62c56f98SSadaf Ebrahimi     }                                   \
457*62c56f98SSadaf Ebrahimi     while (0)
458*62c56f98SSadaf Ebrahimi 
mbedtls_poly1305_self_test(int verbose)459*62c56f98SSadaf Ebrahimi int mbedtls_poly1305_self_test(int verbose)
460*62c56f98SSadaf Ebrahimi {
461*62c56f98SSadaf Ebrahimi     unsigned char mac[16];
462*62c56f98SSadaf Ebrahimi     unsigned i;
463*62c56f98SSadaf Ebrahimi     int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
464*62c56f98SSadaf Ebrahimi 
465*62c56f98SSadaf Ebrahimi     for (i = 0U; i < 2U; i++) {
466*62c56f98SSadaf Ebrahimi         if (verbose != 0) {
467*62c56f98SSadaf Ebrahimi             mbedtls_printf("  Poly1305 test %u ", i);
468*62c56f98SSadaf Ebrahimi         }
469*62c56f98SSadaf Ebrahimi 
470*62c56f98SSadaf Ebrahimi         ret = mbedtls_poly1305_mac(test_keys[i],
471*62c56f98SSadaf Ebrahimi                                    test_data[i],
472*62c56f98SSadaf Ebrahimi                                    test_data_len[i],
473*62c56f98SSadaf Ebrahimi                                    mac);
474*62c56f98SSadaf Ebrahimi         ASSERT(0 == ret, ("error code: %i\n", ret));
475*62c56f98SSadaf Ebrahimi 
476*62c56f98SSadaf Ebrahimi         ASSERT(0 == memcmp(mac, test_mac[i], 16U), ("failed (mac)\n"));
477*62c56f98SSadaf Ebrahimi 
478*62c56f98SSadaf Ebrahimi         if (verbose != 0) {
479*62c56f98SSadaf Ebrahimi             mbedtls_printf("passed\n");
480*62c56f98SSadaf Ebrahimi         }
481*62c56f98SSadaf Ebrahimi     }
482*62c56f98SSadaf Ebrahimi 
483*62c56f98SSadaf Ebrahimi     if (verbose != 0) {
484*62c56f98SSadaf Ebrahimi         mbedtls_printf("\n");
485*62c56f98SSadaf Ebrahimi     }
486*62c56f98SSadaf Ebrahimi 
487*62c56f98SSadaf Ebrahimi     return 0;
488*62c56f98SSadaf Ebrahimi }
489*62c56f98SSadaf Ebrahimi 
490*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_SELF_TEST */
491*62c56f98SSadaf Ebrahimi 
492*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_POLY1305_C */
493