1*62c56f98SSadaf Ebrahimi /**
2*62c56f98SSadaf Ebrahimi * \file poly1305.c
3*62c56f98SSadaf Ebrahimi *
4*62c56f98SSadaf Ebrahimi * \brief Poly1305 authentication algorithm.
5*62c56f98SSadaf Ebrahimi *
6*62c56f98SSadaf Ebrahimi * Copyright The Mbed TLS Contributors
7*62c56f98SSadaf Ebrahimi * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
8*62c56f98SSadaf Ebrahimi */
9*62c56f98SSadaf Ebrahimi #include "common.h"
10*62c56f98SSadaf Ebrahimi
11*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_POLY1305_C)
12*62c56f98SSadaf Ebrahimi
13*62c56f98SSadaf Ebrahimi #include "mbedtls/poly1305.h"
14*62c56f98SSadaf Ebrahimi #include "mbedtls/platform_util.h"
15*62c56f98SSadaf Ebrahimi #include "mbedtls/error.h"
16*62c56f98SSadaf Ebrahimi
17*62c56f98SSadaf Ebrahimi #include <string.h>
18*62c56f98SSadaf Ebrahimi
19*62c56f98SSadaf Ebrahimi #include "mbedtls/platform.h"
20*62c56f98SSadaf Ebrahimi
21*62c56f98SSadaf Ebrahimi #if !defined(MBEDTLS_POLY1305_ALT)
22*62c56f98SSadaf Ebrahimi
23*62c56f98SSadaf Ebrahimi #define POLY1305_BLOCK_SIZE_BYTES (16U)
24*62c56f98SSadaf Ebrahimi
25*62c56f98SSadaf Ebrahimi /*
26*62c56f98SSadaf Ebrahimi * Our implementation is tuned for 32-bit platforms with a 64-bit multiplier.
27*62c56f98SSadaf Ebrahimi * However we provided an alternative for platforms without such a multiplier.
28*62c56f98SSadaf Ebrahimi */
29*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_NO_64BIT_MULTIPLICATION)
mul64(uint32_t a,uint32_t b)30*62c56f98SSadaf Ebrahimi static uint64_t mul64(uint32_t a, uint32_t b)
31*62c56f98SSadaf Ebrahimi {
32*62c56f98SSadaf Ebrahimi /* a = al + 2**16 ah, b = bl + 2**16 bh */
33*62c56f98SSadaf Ebrahimi const uint16_t al = (uint16_t) a;
34*62c56f98SSadaf Ebrahimi const uint16_t bl = (uint16_t) b;
35*62c56f98SSadaf Ebrahimi const uint16_t ah = a >> 16;
36*62c56f98SSadaf Ebrahimi const uint16_t bh = b >> 16;
37*62c56f98SSadaf Ebrahimi
38*62c56f98SSadaf Ebrahimi /* ab = al*bl + 2**16 (ah*bl + bl*bh) + 2**32 ah*bh */
39*62c56f98SSadaf Ebrahimi const uint32_t lo = (uint32_t) al * bl;
40*62c56f98SSadaf Ebrahimi const uint64_t me = (uint64_t) ((uint32_t) ah * bl) + (uint32_t) al * bh;
41*62c56f98SSadaf Ebrahimi const uint32_t hi = (uint32_t) ah * bh;
42*62c56f98SSadaf Ebrahimi
43*62c56f98SSadaf Ebrahimi return lo + (me << 16) + ((uint64_t) hi << 32);
44*62c56f98SSadaf Ebrahimi }
45*62c56f98SSadaf Ebrahimi #else
mul64(uint32_t a,uint32_t b)46*62c56f98SSadaf Ebrahimi static inline uint64_t mul64(uint32_t a, uint32_t b)
47*62c56f98SSadaf Ebrahimi {
48*62c56f98SSadaf Ebrahimi return (uint64_t) a * b;
49*62c56f98SSadaf Ebrahimi }
50*62c56f98SSadaf Ebrahimi #endif
51*62c56f98SSadaf Ebrahimi
52*62c56f98SSadaf Ebrahimi
53*62c56f98SSadaf Ebrahimi /**
54*62c56f98SSadaf Ebrahimi * \brief Process blocks with Poly1305.
55*62c56f98SSadaf Ebrahimi *
56*62c56f98SSadaf Ebrahimi * \param ctx The Poly1305 context.
57*62c56f98SSadaf Ebrahimi * \param nblocks Number of blocks to process. Note that this
58*62c56f98SSadaf Ebrahimi * function only processes full blocks.
59*62c56f98SSadaf Ebrahimi * \param input Buffer containing the input block(s).
60*62c56f98SSadaf Ebrahimi * \param needs_padding Set to 0 if the padding bit has already been
61*62c56f98SSadaf Ebrahimi * applied to the input data before calling this
62*62c56f98SSadaf Ebrahimi * function. Otherwise, set this parameter to 1.
63*62c56f98SSadaf Ebrahimi */
poly1305_process(mbedtls_poly1305_context * ctx,size_t nblocks,const unsigned char * input,uint32_t needs_padding)64*62c56f98SSadaf Ebrahimi static void poly1305_process(mbedtls_poly1305_context *ctx,
65*62c56f98SSadaf Ebrahimi size_t nblocks,
66*62c56f98SSadaf Ebrahimi const unsigned char *input,
67*62c56f98SSadaf Ebrahimi uint32_t needs_padding)
68*62c56f98SSadaf Ebrahimi {
69*62c56f98SSadaf Ebrahimi uint64_t d0, d1, d2, d3;
70*62c56f98SSadaf Ebrahimi uint32_t acc0, acc1, acc2, acc3, acc4;
71*62c56f98SSadaf Ebrahimi uint32_t r0, r1, r2, r3;
72*62c56f98SSadaf Ebrahimi uint32_t rs1, rs2, rs3;
73*62c56f98SSadaf Ebrahimi size_t offset = 0U;
74*62c56f98SSadaf Ebrahimi size_t i;
75*62c56f98SSadaf Ebrahimi
76*62c56f98SSadaf Ebrahimi r0 = ctx->r[0];
77*62c56f98SSadaf Ebrahimi r1 = ctx->r[1];
78*62c56f98SSadaf Ebrahimi r2 = ctx->r[2];
79*62c56f98SSadaf Ebrahimi r3 = ctx->r[3];
80*62c56f98SSadaf Ebrahimi
81*62c56f98SSadaf Ebrahimi rs1 = r1 + (r1 >> 2U);
82*62c56f98SSadaf Ebrahimi rs2 = r2 + (r2 >> 2U);
83*62c56f98SSadaf Ebrahimi rs3 = r3 + (r3 >> 2U);
84*62c56f98SSadaf Ebrahimi
85*62c56f98SSadaf Ebrahimi acc0 = ctx->acc[0];
86*62c56f98SSadaf Ebrahimi acc1 = ctx->acc[1];
87*62c56f98SSadaf Ebrahimi acc2 = ctx->acc[2];
88*62c56f98SSadaf Ebrahimi acc3 = ctx->acc[3];
89*62c56f98SSadaf Ebrahimi acc4 = ctx->acc[4];
90*62c56f98SSadaf Ebrahimi
91*62c56f98SSadaf Ebrahimi /* Process full blocks */
92*62c56f98SSadaf Ebrahimi for (i = 0U; i < nblocks; i++) {
93*62c56f98SSadaf Ebrahimi /* The input block is treated as a 128-bit little-endian integer */
94*62c56f98SSadaf Ebrahimi d0 = MBEDTLS_GET_UINT32_LE(input, offset + 0);
95*62c56f98SSadaf Ebrahimi d1 = MBEDTLS_GET_UINT32_LE(input, offset + 4);
96*62c56f98SSadaf Ebrahimi d2 = MBEDTLS_GET_UINT32_LE(input, offset + 8);
97*62c56f98SSadaf Ebrahimi d3 = MBEDTLS_GET_UINT32_LE(input, offset + 12);
98*62c56f98SSadaf Ebrahimi
99*62c56f98SSadaf Ebrahimi /* Compute: acc += (padded) block as a 130-bit integer */
100*62c56f98SSadaf Ebrahimi d0 += (uint64_t) acc0;
101*62c56f98SSadaf Ebrahimi d1 += (uint64_t) acc1 + (d0 >> 32U);
102*62c56f98SSadaf Ebrahimi d2 += (uint64_t) acc2 + (d1 >> 32U);
103*62c56f98SSadaf Ebrahimi d3 += (uint64_t) acc3 + (d2 >> 32U);
104*62c56f98SSadaf Ebrahimi acc0 = (uint32_t) d0;
105*62c56f98SSadaf Ebrahimi acc1 = (uint32_t) d1;
106*62c56f98SSadaf Ebrahimi acc2 = (uint32_t) d2;
107*62c56f98SSadaf Ebrahimi acc3 = (uint32_t) d3;
108*62c56f98SSadaf Ebrahimi acc4 += (uint32_t) (d3 >> 32U) + needs_padding;
109*62c56f98SSadaf Ebrahimi
110*62c56f98SSadaf Ebrahimi /* Compute: acc *= r */
111*62c56f98SSadaf Ebrahimi d0 = mul64(acc0, r0) +
112*62c56f98SSadaf Ebrahimi mul64(acc1, rs3) +
113*62c56f98SSadaf Ebrahimi mul64(acc2, rs2) +
114*62c56f98SSadaf Ebrahimi mul64(acc3, rs1);
115*62c56f98SSadaf Ebrahimi d1 = mul64(acc0, r1) +
116*62c56f98SSadaf Ebrahimi mul64(acc1, r0) +
117*62c56f98SSadaf Ebrahimi mul64(acc2, rs3) +
118*62c56f98SSadaf Ebrahimi mul64(acc3, rs2) +
119*62c56f98SSadaf Ebrahimi mul64(acc4, rs1);
120*62c56f98SSadaf Ebrahimi d2 = mul64(acc0, r2) +
121*62c56f98SSadaf Ebrahimi mul64(acc1, r1) +
122*62c56f98SSadaf Ebrahimi mul64(acc2, r0) +
123*62c56f98SSadaf Ebrahimi mul64(acc3, rs3) +
124*62c56f98SSadaf Ebrahimi mul64(acc4, rs2);
125*62c56f98SSadaf Ebrahimi d3 = mul64(acc0, r3) +
126*62c56f98SSadaf Ebrahimi mul64(acc1, r2) +
127*62c56f98SSadaf Ebrahimi mul64(acc2, r1) +
128*62c56f98SSadaf Ebrahimi mul64(acc3, r0) +
129*62c56f98SSadaf Ebrahimi mul64(acc4, rs3);
130*62c56f98SSadaf Ebrahimi acc4 *= r0;
131*62c56f98SSadaf Ebrahimi
132*62c56f98SSadaf Ebrahimi /* Compute: acc %= (2^130 - 5) (partial remainder) */
133*62c56f98SSadaf Ebrahimi d1 += (d0 >> 32);
134*62c56f98SSadaf Ebrahimi d2 += (d1 >> 32);
135*62c56f98SSadaf Ebrahimi d3 += (d2 >> 32);
136*62c56f98SSadaf Ebrahimi acc0 = (uint32_t) d0;
137*62c56f98SSadaf Ebrahimi acc1 = (uint32_t) d1;
138*62c56f98SSadaf Ebrahimi acc2 = (uint32_t) d2;
139*62c56f98SSadaf Ebrahimi acc3 = (uint32_t) d3;
140*62c56f98SSadaf Ebrahimi acc4 = (uint32_t) (d3 >> 32) + acc4;
141*62c56f98SSadaf Ebrahimi
142*62c56f98SSadaf Ebrahimi d0 = (uint64_t) acc0 + (acc4 >> 2) + (acc4 & 0xFFFFFFFCU);
143*62c56f98SSadaf Ebrahimi acc4 &= 3U;
144*62c56f98SSadaf Ebrahimi acc0 = (uint32_t) d0;
145*62c56f98SSadaf Ebrahimi d0 = (uint64_t) acc1 + (d0 >> 32U);
146*62c56f98SSadaf Ebrahimi acc1 = (uint32_t) d0;
147*62c56f98SSadaf Ebrahimi d0 = (uint64_t) acc2 + (d0 >> 32U);
148*62c56f98SSadaf Ebrahimi acc2 = (uint32_t) d0;
149*62c56f98SSadaf Ebrahimi d0 = (uint64_t) acc3 + (d0 >> 32U);
150*62c56f98SSadaf Ebrahimi acc3 = (uint32_t) d0;
151*62c56f98SSadaf Ebrahimi d0 = (uint64_t) acc4 + (d0 >> 32U);
152*62c56f98SSadaf Ebrahimi acc4 = (uint32_t) d0;
153*62c56f98SSadaf Ebrahimi
154*62c56f98SSadaf Ebrahimi offset += POLY1305_BLOCK_SIZE_BYTES;
155*62c56f98SSadaf Ebrahimi }
156*62c56f98SSadaf Ebrahimi
157*62c56f98SSadaf Ebrahimi ctx->acc[0] = acc0;
158*62c56f98SSadaf Ebrahimi ctx->acc[1] = acc1;
159*62c56f98SSadaf Ebrahimi ctx->acc[2] = acc2;
160*62c56f98SSadaf Ebrahimi ctx->acc[3] = acc3;
161*62c56f98SSadaf Ebrahimi ctx->acc[4] = acc4;
162*62c56f98SSadaf Ebrahimi }
163*62c56f98SSadaf Ebrahimi
164*62c56f98SSadaf Ebrahimi /**
165*62c56f98SSadaf Ebrahimi * \brief Compute the Poly1305 MAC
166*62c56f98SSadaf Ebrahimi *
167*62c56f98SSadaf Ebrahimi * \param ctx The Poly1305 context.
168*62c56f98SSadaf Ebrahimi * \param mac The buffer to where the MAC is written. Must be
169*62c56f98SSadaf Ebrahimi * big enough to contain the 16-byte MAC.
170*62c56f98SSadaf Ebrahimi */
poly1305_compute_mac(const mbedtls_poly1305_context * ctx,unsigned char mac[16])171*62c56f98SSadaf Ebrahimi static void poly1305_compute_mac(const mbedtls_poly1305_context *ctx,
172*62c56f98SSadaf Ebrahimi unsigned char mac[16])
173*62c56f98SSadaf Ebrahimi {
174*62c56f98SSadaf Ebrahimi uint64_t d;
175*62c56f98SSadaf Ebrahimi uint32_t g0, g1, g2, g3, g4;
176*62c56f98SSadaf Ebrahimi uint32_t acc0, acc1, acc2, acc3, acc4;
177*62c56f98SSadaf Ebrahimi uint32_t mask;
178*62c56f98SSadaf Ebrahimi uint32_t mask_inv;
179*62c56f98SSadaf Ebrahimi
180*62c56f98SSadaf Ebrahimi acc0 = ctx->acc[0];
181*62c56f98SSadaf Ebrahimi acc1 = ctx->acc[1];
182*62c56f98SSadaf Ebrahimi acc2 = ctx->acc[2];
183*62c56f98SSadaf Ebrahimi acc3 = ctx->acc[3];
184*62c56f98SSadaf Ebrahimi acc4 = ctx->acc[4];
185*62c56f98SSadaf Ebrahimi
186*62c56f98SSadaf Ebrahimi /* Before adding 's' we ensure that the accumulator is mod 2^130 - 5.
187*62c56f98SSadaf Ebrahimi * We do this by calculating acc - (2^130 - 5), then checking if
188*62c56f98SSadaf Ebrahimi * the 131st bit is set. If it is, then reduce: acc -= (2^130 - 5)
189*62c56f98SSadaf Ebrahimi */
190*62c56f98SSadaf Ebrahimi
191*62c56f98SSadaf Ebrahimi /* Calculate acc + -(2^130 - 5) */
192*62c56f98SSadaf Ebrahimi d = ((uint64_t) acc0 + 5U);
193*62c56f98SSadaf Ebrahimi g0 = (uint32_t) d;
194*62c56f98SSadaf Ebrahimi d = ((uint64_t) acc1 + (d >> 32));
195*62c56f98SSadaf Ebrahimi g1 = (uint32_t) d;
196*62c56f98SSadaf Ebrahimi d = ((uint64_t) acc2 + (d >> 32));
197*62c56f98SSadaf Ebrahimi g2 = (uint32_t) d;
198*62c56f98SSadaf Ebrahimi d = ((uint64_t) acc3 + (d >> 32));
199*62c56f98SSadaf Ebrahimi g3 = (uint32_t) d;
200*62c56f98SSadaf Ebrahimi g4 = acc4 + (uint32_t) (d >> 32U);
201*62c56f98SSadaf Ebrahimi
202*62c56f98SSadaf Ebrahimi /* mask == 0xFFFFFFFF if 131st bit is set, otherwise mask == 0 */
203*62c56f98SSadaf Ebrahimi mask = (uint32_t) 0U - (g4 >> 2U);
204*62c56f98SSadaf Ebrahimi mask_inv = ~mask;
205*62c56f98SSadaf Ebrahimi
206*62c56f98SSadaf Ebrahimi /* If 131st bit is set then acc=g, otherwise, acc is unmodified */
207*62c56f98SSadaf Ebrahimi acc0 = (acc0 & mask_inv) | (g0 & mask);
208*62c56f98SSadaf Ebrahimi acc1 = (acc1 & mask_inv) | (g1 & mask);
209*62c56f98SSadaf Ebrahimi acc2 = (acc2 & mask_inv) | (g2 & mask);
210*62c56f98SSadaf Ebrahimi acc3 = (acc3 & mask_inv) | (g3 & mask);
211*62c56f98SSadaf Ebrahimi
212*62c56f98SSadaf Ebrahimi /* Add 's' */
213*62c56f98SSadaf Ebrahimi d = (uint64_t) acc0 + ctx->s[0];
214*62c56f98SSadaf Ebrahimi acc0 = (uint32_t) d;
215*62c56f98SSadaf Ebrahimi d = (uint64_t) acc1 + ctx->s[1] + (d >> 32U);
216*62c56f98SSadaf Ebrahimi acc1 = (uint32_t) d;
217*62c56f98SSadaf Ebrahimi d = (uint64_t) acc2 + ctx->s[2] + (d >> 32U);
218*62c56f98SSadaf Ebrahimi acc2 = (uint32_t) d;
219*62c56f98SSadaf Ebrahimi acc3 += ctx->s[3] + (uint32_t) (d >> 32U);
220*62c56f98SSadaf Ebrahimi
221*62c56f98SSadaf Ebrahimi /* Compute MAC (128 least significant bits of the accumulator) */
222*62c56f98SSadaf Ebrahimi MBEDTLS_PUT_UINT32_LE(acc0, mac, 0);
223*62c56f98SSadaf Ebrahimi MBEDTLS_PUT_UINT32_LE(acc1, mac, 4);
224*62c56f98SSadaf Ebrahimi MBEDTLS_PUT_UINT32_LE(acc2, mac, 8);
225*62c56f98SSadaf Ebrahimi MBEDTLS_PUT_UINT32_LE(acc3, mac, 12);
226*62c56f98SSadaf Ebrahimi }
227*62c56f98SSadaf Ebrahimi
mbedtls_poly1305_init(mbedtls_poly1305_context * ctx)228*62c56f98SSadaf Ebrahimi void mbedtls_poly1305_init(mbedtls_poly1305_context *ctx)
229*62c56f98SSadaf Ebrahimi {
230*62c56f98SSadaf Ebrahimi mbedtls_platform_zeroize(ctx, sizeof(mbedtls_poly1305_context));
231*62c56f98SSadaf Ebrahimi }
232*62c56f98SSadaf Ebrahimi
mbedtls_poly1305_free(mbedtls_poly1305_context * ctx)233*62c56f98SSadaf Ebrahimi void mbedtls_poly1305_free(mbedtls_poly1305_context *ctx)
234*62c56f98SSadaf Ebrahimi {
235*62c56f98SSadaf Ebrahimi if (ctx == NULL) {
236*62c56f98SSadaf Ebrahimi return;
237*62c56f98SSadaf Ebrahimi }
238*62c56f98SSadaf Ebrahimi
239*62c56f98SSadaf Ebrahimi mbedtls_platform_zeroize(ctx, sizeof(mbedtls_poly1305_context));
240*62c56f98SSadaf Ebrahimi }
241*62c56f98SSadaf Ebrahimi
mbedtls_poly1305_starts(mbedtls_poly1305_context * ctx,const unsigned char key[32])242*62c56f98SSadaf Ebrahimi int mbedtls_poly1305_starts(mbedtls_poly1305_context *ctx,
243*62c56f98SSadaf Ebrahimi const unsigned char key[32])
244*62c56f98SSadaf Ebrahimi {
245*62c56f98SSadaf Ebrahimi /* r &= 0x0ffffffc0ffffffc0ffffffc0fffffff */
246*62c56f98SSadaf Ebrahimi ctx->r[0] = MBEDTLS_GET_UINT32_LE(key, 0) & 0x0FFFFFFFU;
247*62c56f98SSadaf Ebrahimi ctx->r[1] = MBEDTLS_GET_UINT32_LE(key, 4) & 0x0FFFFFFCU;
248*62c56f98SSadaf Ebrahimi ctx->r[2] = MBEDTLS_GET_UINT32_LE(key, 8) & 0x0FFFFFFCU;
249*62c56f98SSadaf Ebrahimi ctx->r[3] = MBEDTLS_GET_UINT32_LE(key, 12) & 0x0FFFFFFCU;
250*62c56f98SSadaf Ebrahimi
251*62c56f98SSadaf Ebrahimi ctx->s[0] = MBEDTLS_GET_UINT32_LE(key, 16);
252*62c56f98SSadaf Ebrahimi ctx->s[1] = MBEDTLS_GET_UINT32_LE(key, 20);
253*62c56f98SSadaf Ebrahimi ctx->s[2] = MBEDTLS_GET_UINT32_LE(key, 24);
254*62c56f98SSadaf Ebrahimi ctx->s[3] = MBEDTLS_GET_UINT32_LE(key, 28);
255*62c56f98SSadaf Ebrahimi
256*62c56f98SSadaf Ebrahimi /* Initial accumulator state */
257*62c56f98SSadaf Ebrahimi ctx->acc[0] = 0U;
258*62c56f98SSadaf Ebrahimi ctx->acc[1] = 0U;
259*62c56f98SSadaf Ebrahimi ctx->acc[2] = 0U;
260*62c56f98SSadaf Ebrahimi ctx->acc[3] = 0U;
261*62c56f98SSadaf Ebrahimi ctx->acc[4] = 0U;
262*62c56f98SSadaf Ebrahimi
263*62c56f98SSadaf Ebrahimi /* Queue initially empty */
264*62c56f98SSadaf Ebrahimi mbedtls_platform_zeroize(ctx->queue, sizeof(ctx->queue));
265*62c56f98SSadaf Ebrahimi ctx->queue_len = 0U;
266*62c56f98SSadaf Ebrahimi
267*62c56f98SSadaf Ebrahimi return 0;
268*62c56f98SSadaf Ebrahimi }
269*62c56f98SSadaf Ebrahimi
mbedtls_poly1305_update(mbedtls_poly1305_context * ctx,const unsigned char * input,size_t ilen)270*62c56f98SSadaf Ebrahimi int mbedtls_poly1305_update(mbedtls_poly1305_context *ctx,
271*62c56f98SSadaf Ebrahimi const unsigned char *input,
272*62c56f98SSadaf Ebrahimi size_t ilen)
273*62c56f98SSadaf Ebrahimi {
274*62c56f98SSadaf Ebrahimi size_t offset = 0U;
275*62c56f98SSadaf Ebrahimi size_t remaining = ilen;
276*62c56f98SSadaf Ebrahimi size_t queue_free_len;
277*62c56f98SSadaf Ebrahimi size_t nblocks;
278*62c56f98SSadaf Ebrahimi
279*62c56f98SSadaf Ebrahimi if ((remaining > 0U) && (ctx->queue_len > 0U)) {
280*62c56f98SSadaf Ebrahimi queue_free_len = (POLY1305_BLOCK_SIZE_BYTES - ctx->queue_len);
281*62c56f98SSadaf Ebrahimi
282*62c56f98SSadaf Ebrahimi if (ilen < queue_free_len) {
283*62c56f98SSadaf Ebrahimi /* Not enough data to complete the block.
284*62c56f98SSadaf Ebrahimi * Store this data with the other leftovers.
285*62c56f98SSadaf Ebrahimi */
286*62c56f98SSadaf Ebrahimi memcpy(&ctx->queue[ctx->queue_len],
287*62c56f98SSadaf Ebrahimi input,
288*62c56f98SSadaf Ebrahimi ilen);
289*62c56f98SSadaf Ebrahimi
290*62c56f98SSadaf Ebrahimi ctx->queue_len += ilen;
291*62c56f98SSadaf Ebrahimi
292*62c56f98SSadaf Ebrahimi remaining = 0U;
293*62c56f98SSadaf Ebrahimi } else {
294*62c56f98SSadaf Ebrahimi /* Enough data to produce a complete block */
295*62c56f98SSadaf Ebrahimi memcpy(&ctx->queue[ctx->queue_len],
296*62c56f98SSadaf Ebrahimi input,
297*62c56f98SSadaf Ebrahimi queue_free_len);
298*62c56f98SSadaf Ebrahimi
299*62c56f98SSadaf Ebrahimi ctx->queue_len = 0U;
300*62c56f98SSadaf Ebrahimi
301*62c56f98SSadaf Ebrahimi poly1305_process(ctx, 1U, ctx->queue, 1U); /* add padding bit */
302*62c56f98SSadaf Ebrahimi
303*62c56f98SSadaf Ebrahimi offset += queue_free_len;
304*62c56f98SSadaf Ebrahimi remaining -= queue_free_len;
305*62c56f98SSadaf Ebrahimi }
306*62c56f98SSadaf Ebrahimi }
307*62c56f98SSadaf Ebrahimi
308*62c56f98SSadaf Ebrahimi if (remaining >= POLY1305_BLOCK_SIZE_BYTES) {
309*62c56f98SSadaf Ebrahimi nblocks = remaining / POLY1305_BLOCK_SIZE_BYTES;
310*62c56f98SSadaf Ebrahimi
311*62c56f98SSadaf Ebrahimi poly1305_process(ctx, nblocks, &input[offset], 1U);
312*62c56f98SSadaf Ebrahimi
313*62c56f98SSadaf Ebrahimi offset += nblocks * POLY1305_BLOCK_SIZE_BYTES;
314*62c56f98SSadaf Ebrahimi remaining %= POLY1305_BLOCK_SIZE_BYTES;
315*62c56f98SSadaf Ebrahimi }
316*62c56f98SSadaf Ebrahimi
317*62c56f98SSadaf Ebrahimi if (remaining > 0U) {
318*62c56f98SSadaf Ebrahimi /* Store partial block */
319*62c56f98SSadaf Ebrahimi ctx->queue_len = remaining;
320*62c56f98SSadaf Ebrahimi memcpy(ctx->queue, &input[offset], remaining);
321*62c56f98SSadaf Ebrahimi }
322*62c56f98SSadaf Ebrahimi
323*62c56f98SSadaf Ebrahimi return 0;
324*62c56f98SSadaf Ebrahimi }
325*62c56f98SSadaf Ebrahimi
mbedtls_poly1305_finish(mbedtls_poly1305_context * ctx,unsigned char mac[16])326*62c56f98SSadaf Ebrahimi int mbedtls_poly1305_finish(mbedtls_poly1305_context *ctx,
327*62c56f98SSadaf Ebrahimi unsigned char mac[16])
328*62c56f98SSadaf Ebrahimi {
329*62c56f98SSadaf Ebrahimi /* Process any leftover data */
330*62c56f98SSadaf Ebrahimi if (ctx->queue_len > 0U) {
331*62c56f98SSadaf Ebrahimi /* Add padding bit */
332*62c56f98SSadaf Ebrahimi ctx->queue[ctx->queue_len] = 1U;
333*62c56f98SSadaf Ebrahimi ctx->queue_len++;
334*62c56f98SSadaf Ebrahimi
335*62c56f98SSadaf Ebrahimi /* Pad with zeroes */
336*62c56f98SSadaf Ebrahimi memset(&ctx->queue[ctx->queue_len],
337*62c56f98SSadaf Ebrahimi 0,
338*62c56f98SSadaf Ebrahimi POLY1305_BLOCK_SIZE_BYTES - ctx->queue_len);
339*62c56f98SSadaf Ebrahimi
340*62c56f98SSadaf Ebrahimi poly1305_process(ctx, 1U, /* Process 1 block */
341*62c56f98SSadaf Ebrahimi ctx->queue, 0U); /* Already padded above */
342*62c56f98SSadaf Ebrahimi }
343*62c56f98SSadaf Ebrahimi
344*62c56f98SSadaf Ebrahimi poly1305_compute_mac(ctx, mac);
345*62c56f98SSadaf Ebrahimi
346*62c56f98SSadaf Ebrahimi return 0;
347*62c56f98SSadaf Ebrahimi }
348*62c56f98SSadaf Ebrahimi
mbedtls_poly1305_mac(const unsigned char key[32],const unsigned char * input,size_t ilen,unsigned char mac[16])349*62c56f98SSadaf Ebrahimi int mbedtls_poly1305_mac(const unsigned char key[32],
350*62c56f98SSadaf Ebrahimi const unsigned char *input,
351*62c56f98SSadaf Ebrahimi size_t ilen,
352*62c56f98SSadaf Ebrahimi unsigned char mac[16])
353*62c56f98SSadaf Ebrahimi {
354*62c56f98SSadaf Ebrahimi mbedtls_poly1305_context ctx;
355*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
356*62c56f98SSadaf Ebrahimi
357*62c56f98SSadaf Ebrahimi mbedtls_poly1305_init(&ctx);
358*62c56f98SSadaf Ebrahimi
359*62c56f98SSadaf Ebrahimi ret = mbedtls_poly1305_starts(&ctx, key);
360*62c56f98SSadaf Ebrahimi if (ret != 0) {
361*62c56f98SSadaf Ebrahimi goto cleanup;
362*62c56f98SSadaf Ebrahimi }
363*62c56f98SSadaf Ebrahimi
364*62c56f98SSadaf Ebrahimi ret = mbedtls_poly1305_update(&ctx, input, ilen);
365*62c56f98SSadaf Ebrahimi if (ret != 0) {
366*62c56f98SSadaf Ebrahimi goto cleanup;
367*62c56f98SSadaf Ebrahimi }
368*62c56f98SSadaf Ebrahimi
369*62c56f98SSadaf Ebrahimi ret = mbedtls_poly1305_finish(&ctx, mac);
370*62c56f98SSadaf Ebrahimi
371*62c56f98SSadaf Ebrahimi cleanup:
372*62c56f98SSadaf Ebrahimi mbedtls_poly1305_free(&ctx);
373*62c56f98SSadaf Ebrahimi return ret;
374*62c56f98SSadaf Ebrahimi }
375*62c56f98SSadaf Ebrahimi
376*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_POLY1305_ALT */
377*62c56f98SSadaf Ebrahimi
378*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_SELF_TEST)
379*62c56f98SSadaf Ebrahimi
380*62c56f98SSadaf Ebrahimi static const unsigned char test_keys[2][32] =
381*62c56f98SSadaf Ebrahimi {
382*62c56f98SSadaf Ebrahimi {
383*62c56f98SSadaf Ebrahimi 0x85, 0xd6, 0xbe, 0x78, 0x57, 0x55, 0x6d, 0x33,
384*62c56f98SSadaf Ebrahimi 0x7f, 0x44, 0x52, 0xfe, 0x42, 0xd5, 0x06, 0xa8,
385*62c56f98SSadaf Ebrahimi 0x01, 0x03, 0x80, 0x8a, 0xfb, 0x0d, 0xb2, 0xfd,
386*62c56f98SSadaf Ebrahimi 0x4a, 0xbf, 0xf6, 0xaf, 0x41, 0x49, 0xf5, 0x1b
387*62c56f98SSadaf Ebrahimi },
388*62c56f98SSadaf Ebrahimi {
389*62c56f98SSadaf Ebrahimi 0x1c, 0x92, 0x40, 0xa5, 0xeb, 0x55, 0xd3, 0x8a,
390*62c56f98SSadaf Ebrahimi 0xf3, 0x33, 0x88, 0x86, 0x04, 0xf6, 0xb5, 0xf0,
391*62c56f98SSadaf Ebrahimi 0x47, 0x39, 0x17, 0xc1, 0x40, 0x2b, 0x80, 0x09,
392*62c56f98SSadaf Ebrahimi 0x9d, 0xca, 0x5c, 0xbc, 0x20, 0x70, 0x75, 0xc0
393*62c56f98SSadaf Ebrahimi }
394*62c56f98SSadaf Ebrahimi };
395*62c56f98SSadaf Ebrahimi
396*62c56f98SSadaf Ebrahimi static const unsigned char test_data[2][127] =
397*62c56f98SSadaf Ebrahimi {
398*62c56f98SSadaf Ebrahimi {
399*62c56f98SSadaf Ebrahimi 0x43, 0x72, 0x79, 0x70, 0x74, 0x6f, 0x67, 0x72,
400*62c56f98SSadaf Ebrahimi 0x61, 0x70, 0x68, 0x69, 0x63, 0x20, 0x46, 0x6f,
401*62c56f98SSadaf Ebrahimi 0x72, 0x75, 0x6d, 0x20, 0x52, 0x65, 0x73, 0x65,
402*62c56f98SSadaf Ebrahimi 0x61, 0x72, 0x63, 0x68, 0x20, 0x47, 0x72, 0x6f,
403*62c56f98SSadaf Ebrahimi 0x75, 0x70
404*62c56f98SSadaf Ebrahimi },
405*62c56f98SSadaf Ebrahimi {
406*62c56f98SSadaf Ebrahimi 0x27, 0x54, 0x77, 0x61, 0x73, 0x20, 0x62, 0x72,
407*62c56f98SSadaf Ebrahimi 0x69, 0x6c, 0x6c, 0x69, 0x67, 0x2c, 0x20, 0x61,
408*62c56f98SSadaf Ebrahimi 0x6e, 0x64, 0x20, 0x74, 0x68, 0x65, 0x20, 0x73,
409*62c56f98SSadaf Ebrahimi 0x6c, 0x69, 0x74, 0x68, 0x79, 0x20, 0x74, 0x6f,
410*62c56f98SSadaf Ebrahimi 0x76, 0x65, 0x73, 0x0a, 0x44, 0x69, 0x64, 0x20,
411*62c56f98SSadaf Ebrahimi 0x67, 0x79, 0x72, 0x65, 0x20, 0x61, 0x6e, 0x64,
412*62c56f98SSadaf Ebrahimi 0x20, 0x67, 0x69, 0x6d, 0x62, 0x6c, 0x65, 0x20,
413*62c56f98SSadaf Ebrahimi 0x69, 0x6e, 0x20, 0x74, 0x68, 0x65, 0x20, 0x77,
414*62c56f98SSadaf Ebrahimi 0x61, 0x62, 0x65, 0x3a, 0x0a, 0x41, 0x6c, 0x6c,
415*62c56f98SSadaf Ebrahimi 0x20, 0x6d, 0x69, 0x6d, 0x73, 0x79, 0x20, 0x77,
416*62c56f98SSadaf Ebrahimi 0x65, 0x72, 0x65, 0x20, 0x74, 0x68, 0x65, 0x20,
417*62c56f98SSadaf Ebrahimi 0x62, 0x6f, 0x72, 0x6f, 0x67, 0x6f, 0x76, 0x65,
418*62c56f98SSadaf Ebrahimi 0x73, 0x2c, 0x0a, 0x41, 0x6e, 0x64, 0x20, 0x74,
419*62c56f98SSadaf Ebrahimi 0x68, 0x65, 0x20, 0x6d, 0x6f, 0x6d, 0x65, 0x20,
420*62c56f98SSadaf Ebrahimi 0x72, 0x61, 0x74, 0x68, 0x73, 0x20, 0x6f, 0x75,
421*62c56f98SSadaf Ebrahimi 0x74, 0x67, 0x72, 0x61, 0x62, 0x65, 0x2e
422*62c56f98SSadaf Ebrahimi }
423*62c56f98SSadaf Ebrahimi };
424*62c56f98SSadaf Ebrahimi
425*62c56f98SSadaf Ebrahimi static const size_t test_data_len[2] =
426*62c56f98SSadaf Ebrahimi {
427*62c56f98SSadaf Ebrahimi 34U,
428*62c56f98SSadaf Ebrahimi 127U
429*62c56f98SSadaf Ebrahimi };
430*62c56f98SSadaf Ebrahimi
431*62c56f98SSadaf Ebrahimi static const unsigned char test_mac[2][16] =
432*62c56f98SSadaf Ebrahimi {
433*62c56f98SSadaf Ebrahimi {
434*62c56f98SSadaf Ebrahimi 0xa8, 0x06, 0x1d, 0xc1, 0x30, 0x51, 0x36, 0xc6,
435*62c56f98SSadaf Ebrahimi 0xc2, 0x2b, 0x8b, 0xaf, 0x0c, 0x01, 0x27, 0xa9
436*62c56f98SSadaf Ebrahimi },
437*62c56f98SSadaf Ebrahimi {
438*62c56f98SSadaf Ebrahimi 0x45, 0x41, 0x66, 0x9a, 0x7e, 0xaa, 0xee, 0x61,
439*62c56f98SSadaf Ebrahimi 0xe7, 0x08, 0xdc, 0x7c, 0xbc, 0xc5, 0xeb, 0x62
440*62c56f98SSadaf Ebrahimi }
441*62c56f98SSadaf Ebrahimi };
442*62c56f98SSadaf Ebrahimi
443*62c56f98SSadaf Ebrahimi /* Make sure no other definition is already present. */
444*62c56f98SSadaf Ebrahimi #undef ASSERT
445*62c56f98SSadaf Ebrahimi
446*62c56f98SSadaf Ebrahimi #define ASSERT(cond, args) \
447*62c56f98SSadaf Ebrahimi do \
448*62c56f98SSadaf Ebrahimi { \
449*62c56f98SSadaf Ebrahimi if (!(cond)) \
450*62c56f98SSadaf Ebrahimi { \
451*62c56f98SSadaf Ebrahimi if (verbose != 0) \
452*62c56f98SSadaf Ebrahimi mbedtls_printf args; \
453*62c56f98SSadaf Ebrahimi \
454*62c56f98SSadaf Ebrahimi return -1; \
455*62c56f98SSadaf Ebrahimi } \
456*62c56f98SSadaf Ebrahimi } \
457*62c56f98SSadaf Ebrahimi while (0)
458*62c56f98SSadaf Ebrahimi
mbedtls_poly1305_self_test(int verbose)459*62c56f98SSadaf Ebrahimi int mbedtls_poly1305_self_test(int verbose)
460*62c56f98SSadaf Ebrahimi {
461*62c56f98SSadaf Ebrahimi unsigned char mac[16];
462*62c56f98SSadaf Ebrahimi unsigned i;
463*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
464*62c56f98SSadaf Ebrahimi
465*62c56f98SSadaf Ebrahimi for (i = 0U; i < 2U; i++) {
466*62c56f98SSadaf Ebrahimi if (verbose != 0) {
467*62c56f98SSadaf Ebrahimi mbedtls_printf(" Poly1305 test %u ", i);
468*62c56f98SSadaf Ebrahimi }
469*62c56f98SSadaf Ebrahimi
470*62c56f98SSadaf Ebrahimi ret = mbedtls_poly1305_mac(test_keys[i],
471*62c56f98SSadaf Ebrahimi test_data[i],
472*62c56f98SSadaf Ebrahimi test_data_len[i],
473*62c56f98SSadaf Ebrahimi mac);
474*62c56f98SSadaf Ebrahimi ASSERT(0 == ret, ("error code: %i\n", ret));
475*62c56f98SSadaf Ebrahimi
476*62c56f98SSadaf Ebrahimi ASSERT(0 == memcmp(mac, test_mac[i], 16U), ("failed (mac)\n"));
477*62c56f98SSadaf Ebrahimi
478*62c56f98SSadaf Ebrahimi if (verbose != 0) {
479*62c56f98SSadaf Ebrahimi mbedtls_printf("passed\n");
480*62c56f98SSadaf Ebrahimi }
481*62c56f98SSadaf Ebrahimi }
482*62c56f98SSadaf Ebrahimi
483*62c56f98SSadaf Ebrahimi if (verbose != 0) {
484*62c56f98SSadaf Ebrahimi mbedtls_printf("\n");
485*62c56f98SSadaf Ebrahimi }
486*62c56f98SSadaf Ebrahimi
487*62c56f98SSadaf Ebrahimi return 0;
488*62c56f98SSadaf Ebrahimi }
489*62c56f98SSadaf Ebrahimi
490*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_SELF_TEST */
491*62c56f98SSadaf Ebrahimi
492*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_POLY1305_C */
493