| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 1 | /** | 
|  | 2 | * \file gcm.h | 
|  | 3 | * | 
| Rose Zadik | d8c4f61 | 2018-03-27 11:43:04 +0100 | [diff] [blame] | 4 | * \brief This file contains GCM definitions and functions. | 
|  | 5 | * | 
|  | 6 | * The Galois/Counter Mode (GCM) for 128-bit block ciphers is defined | 
|  | 7 | * in <em>D. McGrew, J. Viega, The Galois/Counter Mode of Operation | 
|  | 8 | * (GCM), Natl. Inst. Stand. Technol.</em> | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 9 | * | 
|  | 10 | * For more information on GCM, see <em>NIST SP 800-38D: Recommendation for | 
|  | 11 | * Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC</em>. | 
|  | 12 | * | 
| Darryl Green | a40a101 | 2018-01-05 15:33:17 +0000 | [diff] [blame] | 13 | */ | 
|  | 14 | /* | 
| Bence Szépkúti | 1e14827 | 2020-08-07 13:07:28 +0200 | [diff] [blame] | 15 | *  Copyright The Mbed TLS Contributors | 
| Manuel Pégourié-Gonnard | 37ff140 | 2015-09-04 14:21:07 +0200 | [diff] [blame] | 16 | *  SPDX-License-Identifier: Apache-2.0 | 
|  | 17 | * | 
|  | 18 | *  Licensed under the Apache License, Version 2.0 (the "License"); you may | 
|  | 19 | *  not use this file except in compliance with the License. | 
|  | 20 | *  You may obtain a copy of the License at | 
|  | 21 | * | 
|  | 22 | *  http://www.apache.org/licenses/LICENSE-2.0 | 
|  | 23 | * | 
|  | 24 | *  Unless required by applicable law or agreed to in writing, software | 
|  | 25 | *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT | 
|  | 26 | *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | 27 | *  See the License for the specific language governing permissions and | 
|  | 28 | *  limitations under the License. | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 29 | */ | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 30 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 31 | #ifndef MBEDTLS_GCM_H | 
|  | 32 | #define MBEDTLS_GCM_H | 
| Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 33 | #include "mbedtls/private_access.h" | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 34 |  | 
| Bence Szépkúti | c662b36 | 2021-05-27 11:25:03 +0200 | [diff] [blame] | 35 | #include "mbedtls/build_info.h" | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 36 |  | 
| Jaeden Amero | c49fbbf | 2019-07-04 20:01:14 +0100 | [diff] [blame] | 37 | #include "mbedtls/cipher.h" | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 38 |  | 
|  | 39 | #include <stdint.h> | 
|  | 40 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 41 | #define MBEDTLS_GCM_ENCRYPT     1 | 
|  | 42 | #define MBEDTLS_GCM_DECRYPT     0 | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 43 |  | 
| Gilles Peskine | d297157 | 2021-07-26 18:48:10 +0200 | [diff] [blame] | 44 | /** Authenticated decryption failed. */ | 
|  | 45 | #define MBEDTLS_ERR_GCM_AUTH_FAILED                       -0x0012 | 
|  | 46 | /** Bad input parameters to function. */ | 
|  | 47 | #define MBEDTLS_ERR_GCM_BAD_INPUT                         -0x0014 | 
| Mateusz Starzyk | f28261f | 2021-09-30 16:39:07 +0200 | [diff] [blame] | 48 | /** An output buffer is too small. */ | 
| Mateusz Starzyk | 30bd7fa | 2021-10-22 10:33:25 +0200 | [diff] [blame] | 49 | #define MBEDTLS_ERR_GCM_BUFFER_TOO_SMALL                  -0x0016 | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 50 |  | 
| Paul Bakker | 407a0da | 2013-06-27 14:29:21 +0200 | [diff] [blame] | 51 | #ifdef __cplusplus | 
|  | 52 | extern "C" { | 
|  | 53 | #endif | 
|  | 54 |  | 
| Ron Eldor | 4e6d55d | 2018-02-07 16:36:15 +0200 | [diff] [blame] | 55 | #if !defined(MBEDTLS_GCM_ALT) | 
|  | 56 |  | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 57 | /** | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 58 | * \brief          The GCM context structure. | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 59 | */ | 
| Dawid Drozd | 428cc52 | 2018-07-24 10:02:47 +0200 | [diff] [blame] | 60 | typedef struct mbedtls_gcm_context | 
|  | 61 | { | 
| Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 62 | mbedtls_cipher_context_t MBEDTLS_PRIVATE(cipher_ctx);  /*!< The cipher context used. */ | 
|  | 63 | uint64_t MBEDTLS_PRIVATE(HL)[16];                      /*!< Precalculated HTable low. */ | 
|  | 64 | uint64_t MBEDTLS_PRIVATE(HH)[16];                      /*!< Precalculated HTable high. */ | 
|  | 65 | uint64_t MBEDTLS_PRIVATE(len);                         /*!< The total length of the encrypted data. */ | 
|  | 66 | uint64_t MBEDTLS_PRIVATE(add_len);                     /*!< The total length of the additional data. */ | 
|  | 67 | unsigned char MBEDTLS_PRIVATE(base_ectr)[16];          /*!< The first ECTR for tag. */ | 
|  | 68 | unsigned char MBEDTLS_PRIVATE(y)[16];                  /*!< The Y working value. */ | 
|  | 69 | unsigned char MBEDTLS_PRIVATE(buf)[16];                /*!< The buf working value. */ | 
|  | 70 | int MBEDTLS_PRIVATE(mode);                             /*!< The operation to perform: | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 71 | #MBEDTLS_GCM_ENCRYPT or | 
|  | 72 | #MBEDTLS_GCM_DECRYPT. */ | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 73 | } | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 74 | mbedtls_gcm_context; | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 75 |  | 
| Ron Eldor | 4e6d55d | 2018-02-07 16:36:15 +0200 | [diff] [blame] | 76 | #else  /* !MBEDTLS_GCM_ALT */ | 
|  | 77 | #include "gcm_alt.h" | 
|  | 78 | #endif /* !MBEDTLS_GCM_ALT */ | 
|  | 79 |  | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 80 | /** | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 81 | * \brief           This function initializes the specified GCM context, | 
|  | 82 | *                  to make references valid, and prepares the context | 
|  | 83 | *                  for mbedtls_gcm_setkey() or mbedtls_gcm_free(). | 
| Manuel Pégourié-Gonnard | c34e8dd | 2015-04-28 21:42:17 +0200 | [diff] [blame] | 84 | * | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 85 | *                  The function does not bind the GCM context to a particular | 
|  | 86 | *                  cipher, nor set the key. For this purpose, use | 
|  | 87 | *                  mbedtls_gcm_setkey(). | 
|  | 88 | * | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 89 | * \param ctx       The GCM context to initialize. This must not be \c NULL. | 
| Manuel Pégourié-Gonnard | c34e8dd | 2015-04-28 21:42:17 +0200 | [diff] [blame] | 90 | */ | 
|  | 91 | void mbedtls_gcm_init( mbedtls_gcm_context *ctx ); | 
|  | 92 |  | 
|  | 93 | /** | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 94 | * \brief           This function associates a GCM context with a | 
|  | 95 | *                  cipher algorithm and a key. | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 96 | * | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 97 | * \param ctx       The GCM context. This must be initialized. | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 98 | * \param cipher    The 128-bit block cipher to use. | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 99 | * \param key       The encryption key. This must be a readable buffer of at | 
|  | 100 | *                  least \p keybits bits. | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 101 | * \param keybits   The key size in bits. Valid options are: | 
|  | 102 | *                  <ul><li>128 bits</li> | 
|  | 103 | *                  <li>192 bits</li> | 
|  | 104 | *                  <li>256 bits</li></ul> | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 105 | * | 
| Rose Zadik | d8c4f61 | 2018-03-27 11:43:04 +0100 | [diff] [blame] | 106 | * \return          \c 0 on success. | 
|  | 107 | * \return          A cipher-specific error code on failure. | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 108 | */ | 
| Manuel Pégourié-Gonnard | c34e8dd | 2015-04-28 21:42:17 +0200 | [diff] [blame] | 109 | int mbedtls_gcm_setkey( mbedtls_gcm_context *ctx, | 
|  | 110 | mbedtls_cipher_id_t cipher, | 
|  | 111 | const unsigned char *key, | 
| Manuel Pégourié-Gonnard | b8186a5 | 2015-06-18 14:58:58 +0200 | [diff] [blame] | 112 | unsigned int keybits ); | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 113 |  | 
|  | 114 | /** | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 115 | * \brief           This function performs GCM encryption or decryption of a buffer. | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 116 | * | 
| Rose Zadik | d8c4f61 | 2018-03-27 11:43:04 +0100 | [diff] [blame] | 117 | * \note            For encryption, the output buffer can be the same as the | 
|  | 118 | *                  input buffer. For decryption, the output buffer cannot be | 
|  | 119 | *                  the same as input buffer. If the buffers overlap, the output | 
|  | 120 | *                  buffer must trail at least 8 Bytes behind the input buffer. | 
| Paul Bakker | ca4ab49 | 2012-04-18 14:23:57 +0000 | [diff] [blame] | 121 | * | 
| Gilles Peskine | 80f679b | 2018-06-01 17:55:41 +0200 | [diff] [blame] | 122 | * \warning         When this function performs a decryption, it outputs the | 
|  | 123 | *                  authentication tag and does not verify that the data is | 
|  | 124 | *                  authentic. You should use this function to perform encryption | 
|  | 125 | *                  only. For decryption, use mbedtls_gcm_auth_decrypt() instead. | 
|  | 126 | * | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 127 | * \param ctx       The GCM context to use for encryption or decryption. This | 
|  | 128 | *                  must be initialized. | 
| Gilles Peskine | 0a0e08a | 2018-06-07 14:46:02 +0200 | [diff] [blame] | 129 | * \param mode      The operation to perform: | 
|  | 130 | *                  - #MBEDTLS_GCM_ENCRYPT to perform authenticated encryption. | 
|  | 131 | *                    The ciphertext is written to \p output and the | 
|  | 132 | *                    authentication tag is written to \p tag. | 
|  | 133 | *                  - #MBEDTLS_GCM_DECRYPT to perform decryption. | 
|  | 134 | *                    The plaintext is written to \p output and the | 
|  | 135 | *                    authentication tag is written to \p tag. | 
|  | 136 | *                    Note that this mode is not recommended, because it does | 
|  | 137 | *                    not verify the authenticity of the data. For this reason, | 
|  | 138 | *                    you should use mbedtls_gcm_auth_decrypt() instead of | 
|  | 139 | *                    calling this function in decryption mode. | 
| Gilles Peskine | 80f679b | 2018-06-01 17:55:41 +0200 | [diff] [blame] | 140 | * \param length    The length of the input data, which is equal to the length | 
|  | 141 | *                  of the output data. | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 142 | * \param iv        The initialization vector. This must be a readable buffer of | 
|  | 143 | *                  at least \p iv_len Bytes. | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 144 | * \param iv_len    The length of the IV. | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 145 | * \param add       The buffer holding the additional data. This must be of at | 
|  | 146 | *                  least that size in Bytes. | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 147 | * \param add_len   The length of the additional data. | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 148 | * \param input     The buffer holding the input data. If \p length is greater | 
|  | 149 | *                  than zero, this must be a readable buffer of at least that | 
|  | 150 | *                  size in Bytes. | 
|  | 151 | * \param output    The buffer for holding the output data. If \p length is greater | 
|  | 152 | *                  than zero, this must be a writable buffer of at least that | 
|  | 153 | *                  size in Bytes. | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 154 | * \param tag_len   The length of the tag to generate. | 
| Yonatan Goldschmidt | 6e2af09 | 2020-09-12 00:19:52 +0300 | [diff] [blame] | 155 | * \param tag       The buffer for holding the tag. This must be a writable | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 156 | *                  buffer of at least \p tag_len Bytes. | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 157 | * | 
| Gilles Peskine | 80f679b | 2018-06-01 17:55:41 +0200 | [diff] [blame] | 158 | * \return          \c 0 if the encryption or decryption was performed | 
|  | 159 | *                  successfully. Note that in #MBEDTLS_GCM_DECRYPT mode, | 
|  | 160 | *                  this does not indicate that the data is authentic. | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 161 | * \return          #MBEDTLS_ERR_GCM_BAD_INPUT if the lengths or pointers are | 
|  | 162 | *                  not valid or a cipher-specific error code if the encryption | 
| Ron Eldor | 9924bdc | 2018-10-04 10:59:13 +0300 | [diff] [blame] | 163 | *                  or decryption failed. | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 164 | */ | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 165 | int mbedtls_gcm_crypt_and_tag( mbedtls_gcm_context *ctx, | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 166 | int mode, | 
|  | 167 | size_t length, | 
|  | 168 | const unsigned char *iv, | 
|  | 169 | size_t iv_len, | 
|  | 170 | const unsigned char *add, | 
|  | 171 | size_t add_len, | 
|  | 172 | const unsigned char *input, | 
|  | 173 | unsigned char *output, | 
|  | 174 | size_t tag_len, | 
|  | 175 | unsigned char *tag ); | 
|  | 176 |  | 
|  | 177 | /** | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 178 | * \brief           This function performs a GCM authenticated decryption of a | 
|  | 179 | *                  buffer. | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 180 | * | 
| Rose Zadik | d8c4f61 | 2018-03-27 11:43:04 +0100 | [diff] [blame] | 181 | * \note            For decryption, the output buffer cannot be the same as | 
|  | 182 | *                  input buffer. If the buffers overlap, the output buffer | 
|  | 183 | *                  must trail at least 8 Bytes behind the input buffer. | 
| Paul Bakker | ca4ab49 | 2012-04-18 14:23:57 +0000 | [diff] [blame] | 184 | * | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 185 | * \param ctx       The GCM context. This must be initialized. | 
| Gilles Peskine | 80f679b | 2018-06-01 17:55:41 +0200 | [diff] [blame] | 186 | * \param length    The length of the ciphertext to decrypt, which is also | 
|  | 187 | *                  the length of the decrypted plaintext. | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 188 | * \param iv        The initialization vector. This must be a readable buffer | 
|  | 189 | *                  of at least \p iv_len Bytes. | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 190 | * \param iv_len    The length of the IV. | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 191 | * \param add       The buffer holding the additional data. This must be of at | 
|  | 192 | *                  least that size in Bytes. | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 193 | * \param add_len   The length of the additional data. | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 194 | * \param tag       The buffer holding the tag to verify. This must be a | 
|  | 195 | *                  readable buffer of at least \p tag_len Bytes. | 
| Gilles Peskine | 80f679b | 2018-06-01 17:55:41 +0200 | [diff] [blame] | 196 | * \param tag_len   The length of the tag to verify. | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 197 | * \param input     The buffer holding the ciphertext. If \p length is greater | 
|  | 198 | *                  than zero, this must be a readable buffer of at least that | 
|  | 199 | *                  size. | 
|  | 200 | * \param output    The buffer for holding the decrypted plaintext. If \p length | 
|  | 201 | *                  is greater than zero, this must be a writable buffer of at | 
|  | 202 | *                  least that size. | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 203 | * | 
| Gilles Peskine | 80f679b | 2018-06-01 17:55:41 +0200 | [diff] [blame] | 204 | * \return          \c 0 if successful and authenticated. | 
|  | 205 | * \return          #MBEDTLS_ERR_GCM_AUTH_FAILED if the tag does not match. | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 206 | * \return          #MBEDTLS_ERR_GCM_BAD_INPUT if the lengths or pointers are | 
|  | 207 | *                  not valid or a cipher-specific error code if the decryption | 
|  | 208 | *                  failed. | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 209 | */ | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 210 | int mbedtls_gcm_auth_decrypt( mbedtls_gcm_context *ctx, | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 211 | size_t length, | 
|  | 212 | const unsigned char *iv, | 
|  | 213 | size_t iv_len, | 
|  | 214 | const unsigned char *add, | 
|  | 215 | size_t add_len, | 
| Paul Bakker | b9d3cfa | 2013-06-26 15:07:16 +0200 | [diff] [blame] | 216 | const unsigned char *tag, | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 217 | size_t tag_len, | 
|  | 218 | const unsigned char *input, | 
|  | 219 | unsigned char *output ); | 
|  | 220 |  | 
|  | 221 | /** | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 222 | * \brief           This function starts a GCM encryption or decryption | 
|  | 223 | *                  operation. | 
| Paul Bakker | b9d3cfa | 2013-06-26 15:07:16 +0200 | [diff] [blame] | 224 | * | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 225 | * \param ctx       The GCM context. This must be initialized. | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 226 | * \param mode      The operation to perform: #MBEDTLS_GCM_ENCRYPT or | 
|  | 227 | *                  #MBEDTLS_GCM_DECRYPT. | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 228 | * \param iv        The initialization vector. This must be a readable buffer of | 
|  | 229 | *                  at least \p iv_len Bytes. | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 230 | * \param iv_len    The length of the IV. | 
| Gilles Peskine | 295fc13 | 2021-04-15 18:32:23 +0200 | [diff] [blame] | 231 | * | 
|  | 232 | * \return          \c 0 on success. | 
|  | 233 | */ | 
|  | 234 | int mbedtls_gcm_starts( mbedtls_gcm_context *ctx, | 
|  | 235 | int mode, | 
|  | 236 | const unsigned char *iv, | 
|  | 237 | size_t iv_len ); | 
|  | 238 |  | 
|  | 239 | /** | 
| Gilles Peskine | 5211818 | 2021-05-18 20:38:33 +0200 | [diff] [blame] | 240 | * \brief           This function feeds an input buffer as associated data | 
|  | 241 | *                  (authenticated but not encrypted data) in a GCM | 
|  | 242 | *                  encryption or decryption operation. | 
| Gilles Peskine | 295fc13 | 2021-04-15 18:32:23 +0200 | [diff] [blame] | 243 | * | 
| Gilles Peskine | 8e8cdd1 | 2021-05-18 21:02:13 +0200 | [diff] [blame] | 244 | *                  Call this function after mbedtls_gcm_starts() to pass | 
|  | 245 | *                  the associated data. If the associated data is empty, | 
|  | 246 | *                  you do not need to call this function. You may not | 
|  | 247 | *                  call this function after calling mbedtls_cipher_update(). | 
|  | 248 | * | 
| Gilles Peskine | 295fc13 | 2021-04-15 18:32:23 +0200 | [diff] [blame] | 249 | * \param ctx       The GCM context. This must have been started with | 
|  | 250 | *                  mbedtls_gcm_starts() and must not have yet received | 
|  | 251 | *                  any input with mbedtls_gcm_update(). | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 252 | * \param add       The buffer holding the additional data, or \c NULL | 
|  | 253 | *                  if \p add_len is \c 0. | 
|  | 254 | * \param add_len   The length of the additional data. If \c 0, | 
|  | 255 | *                  \p add may be \c NULL. | 
| Paul Bakker | b9d3cfa | 2013-06-26 15:07:16 +0200 | [diff] [blame] | 256 | * | 
| Rose Zadik | d8c4f61 | 2018-03-27 11:43:04 +0100 | [diff] [blame] | 257 | * \return          \c 0 on success. | 
| Paul Bakker | b9d3cfa | 2013-06-26 15:07:16 +0200 | [diff] [blame] | 258 | */ | 
| Gilles Peskine | 295fc13 | 2021-04-15 18:32:23 +0200 | [diff] [blame] | 259 | int mbedtls_gcm_update_ad( mbedtls_gcm_context *ctx, | 
|  | 260 | const unsigned char *add, | 
|  | 261 | size_t add_len ); | 
| Paul Bakker | b9d3cfa | 2013-06-26 15:07:16 +0200 | [diff] [blame] | 262 |  | 
|  | 263 | /** | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 264 | * \brief           This function feeds an input buffer into an ongoing GCM | 
|  | 265 | *                  encryption or decryption operation. | 
| Paul Bakker | b9d3cfa | 2013-06-26 15:07:16 +0200 | [diff] [blame] | 266 | * | 
| Gilles Peskine | 8e8cdd1 | 2021-05-18 21:02:13 +0200 | [diff] [blame] | 267 | *                  You may call this function zero, one or more times | 
|  | 268 | *                  to pass successive parts of the input: the plaintext to | 
|  | 269 | *                  encrypt, or the ciphertext (not including the tag) to | 
|  | 270 | *                  decrypt. After the last part of the input, call | 
|  | 271 | *                  mbedtls_gcm_finish(). | 
|  | 272 | * | 
| Gilles Peskine | b7bb0687 | 2021-05-18 22:31:53 +0200 | [diff] [blame] | 273 | *                  This function may produce output in one of the following | 
|  | 274 | *                  ways: | 
|  | 275 | *                  - Immediate output: the output length is always equal | 
|  | 276 | *                    to the input length. | 
|  | 277 | *                  - Buffered output: the output consists of a whole number | 
|  | 278 | *                    of 16-byte blocks. If the total input length so far | 
|  | 279 | *                    (not including associated data) is 16 \* *B* + *A* | 
|  | 280 | *                    with *A* < 16 then the total output length is 16 \* *B*. | 
|  | 281 | * | 
|  | 282 | *                  In particular: | 
|  | 283 | *                  - It is always correct to call this function with | 
| Gilles Peskine | af5b26a | 2021-05-19 12:24:33 +0200 | [diff] [blame] | 284 | *                    \p output_size >= \p input_length + 15. | 
|  | 285 | *                  - If \p input_length is a multiple of 16 for all the calls | 
| Gilles Peskine | b7bb0687 | 2021-05-18 22:31:53 +0200 | [diff] [blame] | 286 | *                    to this function during an operation, then it is | 
| Gilles Peskine | af5b26a | 2021-05-19 12:24:33 +0200 | [diff] [blame] | 287 | *                    correct to use \p output_size = \p input_length. | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 288 | * | 
| Rose Zadik | d8c4f61 | 2018-03-27 11:43:04 +0100 | [diff] [blame] | 289 | * \note            For decryption, the output buffer cannot be the same as | 
|  | 290 | *                  input buffer. If the buffers overlap, the output buffer | 
|  | 291 | *                  must trail at least 8 Bytes behind the input buffer. | 
| Paul Bakker | b9d3cfa | 2013-06-26 15:07:16 +0200 | [diff] [blame] | 292 | * | 
| Gilles Peskine | a56c448 | 2021-04-15 17:22:35 +0200 | [diff] [blame] | 293 | * \param ctx           The GCM context. This must be initialized. | 
|  | 294 | * \param input         The buffer holding the input data. If \p input_length | 
|  | 295 | *                      is greater than zero, this must be a readable buffer | 
|  | 296 | *                      of at least \p input_length bytes. | 
|  | 297 | * \param input_length  The length of the input data in bytes. | 
| Gilles Peskine | 518fdb0 | 2021-05-18 20:43:31 +0200 | [diff] [blame] | 298 | * \param output        The buffer for the output data. If \p output_size | 
| Gilles Peskine | a56c448 | 2021-04-15 17:22:35 +0200 | [diff] [blame] | 299 | *                      is greater than zero, this must be a writable buffer of | 
|  | 300 | *                      of at least \p output_size bytes. | 
| Gilles Peskine | a56c448 | 2021-04-15 17:22:35 +0200 | [diff] [blame] | 301 | * \param output_size   The size of the output buffer in bytes. | 
| Gilles Peskine | b7bb0687 | 2021-05-18 22:31:53 +0200 | [diff] [blame] | 302 | *                      See the function description regarding the output size. | 
| Gilles Peskine | a56c448 | 2021-04-15 17:22:35 +0200 | [diff] [blame] | 303 | * \param output_length On success, \p *output_length contains the actual | 
|  | 304 | *                      length of the output written in \p output. | 
|  | 305 | *                      On failure, the content of \p *output_length is | 
|  | 306 | *                      unspecified. | 
| Paul Bakker | b9d3cfa | 2013-06-26 15:07:16 +0200 | [diff] [blame] | 307 | * | 
| Rose Zadik | d8c4f61 | 2018-03-27 11:43:04 +0100 | [diff] [blame] | 308 | * \return         \c 0 on success. | 
| Gilles Peskine | d9380b5 | 2021-05-18 21:02:52 +0200 | [diff] [blame] | 309 | * \return         #MBEDTLS_ERR_GCM_BAD_INPUT on failure: | 
|  | 310 | *                 total input length too long, | 
|  | 311 | *                 unsupported input/output buffer overlap detected, | 
|  | 312 | *                 or \p output_size too small. | 
| Paul Bakker | b9d3cfa | 2013-06-26 15:07:16 +0200 | [diff] [blame] | 313 | */ | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 314 | int mbedtls_gcm_update( mbedtls_gcm_context *ctx, | 
| Gilles Peskine | a56c448 | 2021-04-15 17:22:35 +0200 | [diff] [blame] | 315 | const unsigned char *input, size_t input_length, | 
|  | 316 | unsigned char *output, size_t output_size, | 
|  | 317 | size_t *output_length ); | 
| Paul Bakker | b9d3cfa | 2013-06-26 15:07:16 +0200 | [diff] [blame] | 318 |  | 
|  | 319 | /** | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 320 | * \brief           This function finishes the GCM operation and generates | 
|  | 321 | *                  the authentication tag. | 
| Paul Bakker | b9d3cfa | 2013-06-26 15:07:16 +0200 | [diff] [blame] | 322 | * | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 323 | *                  It wraps up the GCM stream, and generates the | 
|  | 324 | *                  tag. The tag can have a maximum length of 16 Bytes. | 
| Paul Bakker | b9d3cfa | 2013-06-26 15:07:16 +0200 | [diff] [blame] | 325 | * | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 326 | * \param ctx       The GCM context. This must be initialized. | 
| Yonatan Goldschmidt | 6e2af09 | 2020-09-12 00:19:52 +0300 | [diff] [blame] | 327 | * \param tag       The buffer for holding the tag. This must be a writable | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 328 | *                  buffer of at least \p tag_len Bytes. | 
|  | 329 | * \param tag_len   The length of the tag to generate. This must be at least | 
|  | 330 | *                  four. | 
| Gilles Peskine | 9461e45 | 2021-04-15 16:48:32 +0200 | [diff] [blame] | 331 | * \param output    The buffer for the final output. | 
| Gilles Peskine | b7bb0687 | 2021-05-18 22:31:53 +0200 | [diff] [blame] | 332 | *                  If \p output_size is nonzero, this must be a writable | 
|  | 333 | *                  buffer of at least \p output_size bytes. | 
|  | 334 | * \param output_size  The size of the \p output buffer in bytes. | 
|  | 335 | *                  This must be large enough for the output that | 
|  | 336 | *                  mbedtls_gcm_update() has not produced. In particular: | 
|  | 337 | *                  - If mbedtls_gcm_update() produces immediate output, | 
|  | 338 | *                    or if the total input size is a multiple of \c 16, | 
|  | 339 | *                    then mbedtls_gcm_finish() never produces any output, | 
|  | 340 | *                    so \p output_size can be \c 0. | 
|  | 341 | *                  - \p output_size never needs to be more than \c 15. | 
| Gilles Peskine | 5a7be10 | 2021-06-23 21:51:32 +0200 | [diff] [blame] | 342 | * \param output_length On success, \p *output_length contains the actual | 
|  | 343 | *                      length of the output written in \p output. | 
|  | 344 | *                      On failure, the content of \p *output_length is | 
|  | 345 | *                      unspecified. | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 346 | * | 
| Rose Zadik | d8c4f61 | 2018-03-27 11:43:04 +0100 | [diff] [blame] | 347 | * \return          \c 0 on success. | 
| Gilles Peskine | d9380b5 | 2021-05-18 21:02:52 +0200 | [diff] [blame] | 348 | * \return          #MBEDTLS_ERR_GCM_BAD_INPUT on failure: | 
|  | 349 | *                  invalid value of \p tag_len, | 
| Gilles Peskine | af5b26a | 2021-05-19 12:24:33 +0200 | [diff] [blame] | 350 | *                  or \p output_size too small. | 
| Paul Bakker | b9d3cfa | 2013-06-26 15:07:16 +0200 | [diff] [blame] | 351 | */ | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 352 | int mbedtls_gcm_finish( mbedtls_gcm_context *ctx, | 
| Gilles Peskine | b7bb0687 | 2021-05-18 22:31:53 +0200 | [diff] [blame] | 353 | unsigned char *output, size_t output_size, | 
| Gilles Peskine | 5a7be10 | 2021-06-23 21:51:32 +0200 | [diff] [blame] | 354 | size_t *output_length, | 
| Gilles Peskine | 9461e45 | 2021-04-15 16:48:32 +0200 | [diff] [blame] | 355 | unsigned char *tag, size_t tag_len ); | 
| Paul Bakker | b9d3cfa | 2013-06-26 15:07:16 +0200 | [diff] [blame] | 356 |  | 
|  | 357 | /** | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 358 | * \brief           This function clears a GCM context and the underlying | 
|  | 359 | *                  cipher sub-context. | 
| Manuel Pégourié-Gonnard | 4fe9200 | 2013-09-13 13:45:58 +0200 | [diff] [blame] | 360 | * | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 361 | * \param ctx       The GCM context to clear. If this is \c NULL, the call has | 
|  | 362 | *                  no effect. Otherwise, this must be initialized. | 
| Manuel Pégourié-Gonnard | 4fe9200 | 2013-09-13 13:45:58 +0200 | [diff] [blame] | 363 | */ | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 364 | void mbedtls_gcm_free( mbedtls_gcm_context *ctx ); | 
| Manuel Pégourié-Gonnard | 4fe9200 | 2013-09-13 13:45:58 +0200 | [diff] [blame] | 365 |  | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 366 | #if defined(MBEDTLS_SELF_TEST) | 
|  | 367 |  | 
| Manuel Pégourié-Gonnard | 4fe9200 | 2013-09-13 13:45:58 +0200 | [diff] [blame] | 368 | /** | 
| Rose Zadik | 17b4f7f | 2018-01-26 10:56:42 +0000 | [diff] [blame] | 369 | * \brief          The GCM checkup routine. | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 370 | * | 
| Rose Zadik | d8c4f61 | 2018-03-27 11:43:04 +0100 | [diff] [blame] | 371 | * \return         \c 0 on success. | 
|  | 372 | * \return         \c 1 on failure. | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 373 | */ | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 374 | int mbedtls_gcm_self_test( int verbose ); | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 375 |  | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 376 | #endif /* MBEDTLS_SELF_TEST */ | 
|  | 377 |  | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 378 | #ifdef __cplusplus | 
|  | 379 | } | 
|  | 380 | #endif | 
|  | 381 |  | 
| Jaeden Amero | 1526330 | 2017-09-21 12:53:48 +0100 | [diff] [blame] | 382 |  | 
| Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 383 | #endif /* gcm.h */ |