blob: 9e981d92c3e3e015cf32683a800158c53218db8e [file] [log] [blame]
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +00001/**
2 * \file aria.h
3 *
4 * \brief ARIA block cipher
5 *
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +01006 * The ARIA algorithm is a symmetric block cipher that can encrypt and
7 * decrypt information. It is defined by the Korean Agency for
8 * Technology and Standards (KATS) in <em>KS X 1213:2004</em> (in
9 * Korean, but see http://210.104.33.10/ARIA/index-e.html in English)
10 * and also described by the IETF in <em>RFC 5794</em>.
11 */
12/* Copyright (C) 2006-2018, ARM Limited, All Rights Reserved
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +000013 * SPDX-License-Identifier: Apache-2.0
14 *
15 * Licensed under the Apache License, Version 2.0 (the "License"); you may
16 * not use this file except in compliance with the License.
17 * You may obtain a copy of the License at
18 *
19 * http://www.apache.org/licenses/LICENSE-2.0
20 *
21 * Unless required by applicable law or agreed to in writing, software
22 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
23 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
24 * See the License for the specific language governing permissions and
25 * limitations under the License.
26 *
27 * This file is part of mbed TLS (https://tls.mbed.org)
28 */
29
30#ifndef MBEDTLS_ARIA_H
31#define MBEDTLS_ARIA_H
32
33#if !defined(MBEDTLS_CONFIG_FILE)
34#include "config.h"
35#else
36#include MBEDTLS_CONFIG_FILE
37#endif
38
39#include <stddef.h>
40#include <stdint.h>
41
Hanno Becker2f475502018-12-17 13:19:06 +000042#include "platform_util.h"
43
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +010044#define MBEDTLS_ARIA_ENCRYPT 1 /**< ARIA encryption. */
45#define MBEDTLS_ARIA_DECRYPT 0 /**< ARIA decryption. */
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +000046
Manuel Pégourié-Gonnard8abc3492018-03-01 10:02:47 +010047#define MBEDTLS_ARIA_BLOCKSIZE 16 /**< ARIA block size in bytes. */
48#define MBEDTLS_ARIA_MAX_ROUNDS 16 /**< Maxiumum number of rounds in ARIA. */
49#define MBEDTLS_ARIA_MAX_KEYSIZE 32 /**< Maximum size of an ARIA key in bytes. */
Manuel Pégourié-Gonnard5ad88b62018-03-01 09:20:47 +010050
Hanno Becker2f475502018-12-17 13:19:06 +000051#if !defined(MBEDTLS_DEPRECATED_REMOVED)
52#define MBEDTLS_ERR_ARIA_INVALID_KEY_LENGTH MBEDTLS_DEPRECATED_NUMERIC_CONSTANT( -0x005C )
Hanno Becker2f475502018-12-17 13:19:06 +000053#endif /* !MBEDTLS_DEPRECATED_REMOVED */
54#define MBEDTLS_ERR_ARIA_BAD_INPUT_DATA -0x005C /**< Bad input data. */
Ron Eldor9924bdc2018-10-04 10:59:13 +030055
Hanno Beckera0343692018-12-18 09:42:58 +000056#define MBEDTLS_ERR_ARIA_INVALID_INPUT_LENGTH -0x005E /**< Invalid data input length. */
57
Ron Eldor9924bdc2018-10-04 10:59:13 +030058/* MBEDTLS_ERR_ARIA_FEATURE_UNAVAILABLE is deprecated and should not be used.
59 */
Manuel Pégourié-Gonnard3c800092018-03-01 09:02:16 +010060#define MBEDTLS_ERR_ARIA_FEATURE_UNAVAILABLE -0x005A /**< Feature not available. For example, an unsupported ARIA key size. */
Ron Eldor9924bdc2018-10-04 10:59:13 +030061
62/* MBEDTLS_ERR_ARIA_HW_ACCEL_FAILED is deprecated and should not be used. */
Manuel Pégourié-Gonnard3c800092018-03-01 09:02:16 +010063#define MBEDTLS_ERR_ARIA_HW_ACCEL_FAILED -0x0058 /**< ARIA hardware accelerator failed. */
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +000064
65#if !defined(MBEDTLS_ARIA_ALT)
66// Regular implementation
67//
68
69#ifdef __cplusplus
70extern "C" {
71#endif
72
73/**
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +010074 * \brief The ARIA context-type definition.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +000075 */
Dawid Drozd428cc522018-07-24 10:02:47 +020076typedef struct mbedtls_aria_context
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +000077{
Manuel Pégourié-Gonnard906bc902018-03-01 09:39:01 +010078 unsigned char nr; /*!< The number of rounds (12, 14 or 16) */
Manuel Pégourié-Gonnard5ad88b62018-03-01 09:20:47 +010079 /*! The ARIA round keys. */
80 uint32_t rk[MBEDTLS_ARIA_MAX_ROUNDS + 1][MBEDTLS_ARIA_BLOCKSIZE / 4];
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +000081}
82mbedtls_aria_context;
83
Manuel Pégourié-Gonnard0960b802018-05-22 15:22:07 +020084#else /* MBEDTLS_ARIA_ALT */
85#include "aria_alt.h"
86#endif /* MBEDTLS_ARIA_ALT */
87
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +000088/**
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +010089 * \brief This function initializes the specified ARIA context.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +000090 *
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +010091 * It must be the first API called before using
92 * the context.
93 *
94 * \param ctx The ARIA context to initialize.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +000095 */
96void mbedtls_aria_init( mbedtls_aria_context *ctx );
97
98/**
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +010099 * \brief This function releases and clears the specified ARIA context.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000100 *
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100101 * \param ctx The ARIA context to clear.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000102 */
103void mbedtls_aria_free( mbedtls_aria_context *ctx );
104
105/**
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100106 * \brief This function sets the encryption key.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000107 *
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100108 * \param ctx The ARIA context to which the key should be bound.
109 * \param key The encryption key.
110 * \param keybits The size of data passed in bits. Valid options are:
111 * <ul><li>128 bits</li>
112 * <li>192 bits</li>
113 * <li>256 bits</li></ul>
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000114 *
Hanno Becker4fb258a2018-12-17 16:09:15 +0000115 * \return \c 0 on success or #MBEDTLS_ERR_ARIA_BAD_INPUT_DATA
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100116 * on failure.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000117 */
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +0100118int mbedtls_aria_setkey_enc( mbedtls_aria_context *ctx,
119 const unsigned char *key,
120 unsigned int keybits );
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000121
122/**
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100123 * \brief This function sets the decryption key.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000124 *
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100125 * \param ctx The ARIA context to which the key should be bound.
126 * \param key The decryption key.
127 * \param keybits The size of data passed. Valid options are:
128 * <ul><li>128 bits</li>
129 * <li>192 bits</li>
130 * <li>256 bits</li></ul>
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000131 *
Hanno Becker4fb258a2018-12-17 16:09:15 +0000132 * \return \c 0 on success, or #MBEDTLS_ERR_ARIA_BAD_INPUT_DATA on failure.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000133 */
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +0100134int mbedtls_aria_setkey_dec( mbedtls_aria_context *ctx,
135 const unsigned char *key,
136 unsigned int keybits );
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000137
138/**
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100139 * \brief This function performs an ARIA single-block encryption or
140 * decryption operation.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000141 *
Manuel Pégourié-Gonnard08c337d2018-05-22 13:18:01 +0200142 * It performs encryption or decryption (depending on whether
143 * the key was set for encryption on decryption) on the input
144 * data buffer defined in the \p input parameter.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000145 *
Manuel Pégourié-Gonnard9d410732018-05-22 12:49:22 +0200146 * mbedtls_aria_init(), and either mbedtls_aria_setkey_enc() or
147 * mbedtls_aria_setkey_dec() must be called before the first
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100148 * call to this API with the same context.
149 *
150 * \param ctx The ARIA context to use for encryption or decryption.
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100151 * \param input The 16-Byte buffer holding the input data.
152 * \param output The 16-Byte buffer holding the output data.
153
154 * \return \c 0 on success.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000155 */
156int mbedtls_aria_crypt_ecb( mbedtls_aria_context *ctx,
Manuel Pégourié-Gonnard5ad88b62018-03-01 09:20:47 +0100157 const unsigned char input[MBEDTLS_ARIA_BLOCKSIZE],
158 unsigned char output[MBEDTLS_ARIA_BLOCKSIZE] );
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000159
160#if defined(MBEDTLS_CIPHER_MODE_CBC)
161/**
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100162 * \brief This function performs an ARIA-CBC encryption or decryption operation
163 * on full blocks.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000164 *
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100165 * It performs the operation defined in the \p mode
166 * parameter (encrypt/decrypt), on the input data buffer defined in
167 * the \p input parameter.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000168 *
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100169 * It can be called as many times as needed, until all the input
Manuel Pégourié-Gonnard9d410732018-05-22 12:49:22 +0200170 * data is processed. mbedtls_aria_init(), and either
171 * mbedtls_aria_setkey_enc() or mbedtls_aria_setkey_dec() must be called
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100172 * before the first call to this API with the same context.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000173 *
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100174 * \note This function operates on aligned blocks, that is, the input size
175 * must be a multiple of the ARIA block size of 16 Bytes.
176 *
177 * \note Upon exit, the content of the IV is updated so that you can
178 * call the same function again on the next
179 * block(s) of data and get the same result as if it was
180 * encrypted in one call. This allows a "streaming" usage.
181 * If you need to retain the contents of the IV, you should
182 * either save it manually or use the cipher module instead.
183 *
184 *
185 * \param ctx The ARIA context to use for encryption or decryption.
186 * \param mode The ARIA operation: #MBEDTLS_ARIA_ENCRYPT or
187 * #MBEDTLS_ARIA_DECRYPT.
188 * \param length The length of the input data in Bytes. This must be a
189 * multiple of the block size (16 Bytes).
190 * \param iv Initialization vector (updated after use).
191 * \param input The buffer holding the input data.
192 * \param output The buffer holding the output data.
193 *
Hanno Becker4fb258a2018-12-17 16:09:15 +0000194 * \return \c 0 on success, or #MBEDTLS_ERR_ARIA_BAD_INPUT_DATA
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100195 * on failure.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000196 */
197int mbedtls_aria_crypt_cbc( mbedtls_aria_context *ctx,
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +0100198 int mode,
199 size_t length,
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100200 unsigned char iv[MBEDTLS_ARIA_BLOCKSIZE],
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +0100201 const unsigned char *input,
202 unsigned char *output );
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000203#endif /* MBEDTLS_CIPHER_MODE_CBC */
204
205#if defined(MBEDTLS_CIPHER_MODE_CFB)
206/**
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100207 * \brief This function performs an ARIA-CFB128 encryption or decryption
208 * operation.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000209 *
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100210 * It performs the operation defined in the \p mode
211 * parameter (encrypt or decrypt), on the input data buffer
212 * defined in the \p input parameter.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000213 *
Manuel Pégourié-Gonnard9d410732018-05-22 12:49:22 +0200214 * For CFB, you must set up the context with mbedtls_aria_setkey_enc(),
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100215 * regardless of whether you are performing an encryption or decryption
216 * operation, that is, regardless of the \p mode parameter. This is
217 * because CFB mode uses the same key schedule for encryption and
218 * decryption.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000219 *
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100220 * \note Upon exit, the content of the IV is updated so that you can
221 * call the same function again on the next
222 * block(s) of data and get the same result as if it was
223 * encrypted in one call. This allows a "streaming" usage.
224 * If you need to retain the contents of the
225 * IV, you must either save it manually or use the cipher
226 * module instead.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000227 *
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100228 *
229 * \param ctx The ARIA context to use for encryption or decryption.
230 * \param mode The ARIA operation: #MBEDTLS_ARIA_ENCRYPT or
231 * #MBEDTLS_ARIA_DECRYPT.
232 * \param length The length of the input data.
233 * \param iv_off The offset in IV (updated after use).
234 * \param iv The initialization vector (updated after use).
235 * \param input The buffer holding the input data.
236 * \param output The buffer holding the output data.
237 *
238 * \return \c 0 on success.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000239 */
240int mbedtls_aria_crypt_cfb128( mbedtls_aria_context *ctx,
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +0100241 int mode,
242 size_t length,
243 size_t *iv_off,
Manuel Pégourié-Gonnard5ad88b62018-03-01 09:20:47 +0100244 unsigned char iv[MBEDTLS_ARIA_BLOCKSIZE],
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +0100245 const unsigned char *input,
246 unsigned char *output );
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000247#endif /* MBEDTLS_CIPHER_MODE_CFB */
248
249#if defined(MBEDTLS_CIPHER_MODE_CTR)
250/**
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100251 * \brief This function performs an ARIA-CTR encryption or decryption
252 * operation.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000253 *
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100254 * This function performs the operation defined in the \p mode
255 * parameter (encrypt/decrypt), on the input data buffer
256 * defined in the \p input parameter.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000257 *
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100258 * Due to the nature of CTR, you must use the same key schedule
259 * for both encryption and decryption operations. Therefore, you
Manuel Pégourié-Gonnard9d410732018-05-22 12:49:22 +0200260 * must use the context initialized with mbedtls_aria_setkey_enc()
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100261 * for both #MBEDTLS_ARIA_ENCRYPT and #MBEDTLS_ARIA_DECRYPT.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000262 *
Manuel Pégourié-Gonnard22997b72018-02-28 12:29:41 +0100263 * \warning You must never reuse a nonce value with the same key. Doing so
264 * would void the encryption for the two messages encrypted with
265 * the same nonce and key.
266 *
267 * There are two common strategies for managing nonces with CTR:
268 *
Manuel Pégourié-Gonnard8a1b2c82018-05-23 13:26:22 +0200269 * 1. You can handle everything as a single message processed over
270 * successive calls to this function. In that case, you want to
271 * set \p nonce_counter and \p nc_off to 0 for the first call, and
272 * then preserve the values of \p nonce_counter, \p nc_off and \p
273 * stream_block across calls to this function as they will be
274 * updated by this function.
275 *
276 * With this strategy, you must not encrypt more than 2**128
Manuel Pégourié-Gonnardf5842862018-05-24 11:51:58 +0200277 * blocks of data with the same key.
Manuel Pégourié-Gonnard22997b72018-02-28 12:29:41 +0100278 *
Manuel Pégourié-Gonnard8a1b2c82018-05-23 13:26:22 +0200279 * 2. You can encrypt separate messages by dividing the \p
280 * nonce_counter buffer in two areas: the first one used for a
281 * per-message nonce, handled by yourself, and the second one
282 * updated by this function internally.
283 *
284 * For example, you might reserve the first 12 bytes for the
285 * per-message nonce, and the last 4 bytes for internal use. In that
286 * case, before calling this function on a new message you need to
287 * set the first 12 bytes of \p nonce_counter to your chosen nonce
288 * value, the last 4 to 0, and \p nc_off to 0 (which will cause \p
289 * stream_block to be ignored). That way, you can encrypt at most
Manuel Pégourié-Gonnardf5842862018-05-24 11:51:58 +0200290 * 2**96 messages of up to 2**32 blocks each with the same key.
Manuel Pégourié-Gonnard8a1b2c82018-05-23 13:26:22 +0200291 *
292 * The per-message nonce (or information sufficient to reconstruct
293 * it) needs to be communicated with the ciphertext and must be unique.
294 * The recommended way to ensure uniqueness is to use a message
295 * counter. An alternative is to generate random nonces, but this
296 * limits the number of messages that can be securely encrypted:
297 * for example, with 96-bit random nonces, you should not encrypt
298 * more than 2**32 messages with the same key.
299 *
Manuel Pégourié-Gonnardf5842862018-05-24 11:51:58 +0200300 * Note that for both stategies, sizes are measured in blocks and
301 * that an ARIA block is 16 bytes.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000302 *
Manuel Pégourié-Gonnardfa0c47d2018-05-24 19:02:06 +0200303 * \warning Upon return, \p stream_block contains sensitive data. Its
Manuel Pégourié-Gonnard8a1b2c82018-05-23 13:26:22 +0200304 * content must not be written to insecure storage and should be
305 * securely discarded as soon as it's no longer needed.
306 *
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100307 * \param ctx The ARIA context to use for encryption or decryption.
308 * \param length The length of the input data.
309 * \param nc_off The offset in the current \p stream_block, for
310 * resuming within the current cipher stream. The
311 * offset pointer should be 0 at the start of a stream.
312 * \param nonce_counter The 128-bit nonce and counter.
313 * \param stream_block The saved stream block for resuming. This is
314 * overwritten by the function.
315 * \param input The buffer holding the input data.
316 * \param output The buffer holding the output data.
317 *
318 * \return \c 0 on success.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000319 */
320int mbedtls_aria_crypt_ctr( mbedtls_aria_context *ctx,
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +0100321 size_t length,
322 size_t *nc_off,
Manuel Pégourié-Gonnard5ad88b62018-03-01 09:20:47 +0100323 unsigned char nonce_counter[MBEDTLS_ARIA_BLOCKSIZE],
324 unsigned char stream_block[MBEDTLS_ARIA_BLOCKSIZE],
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +0100325 const unsigned char *input,
326 unsigned char *output );
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000327#endif /* MBEDTLS_CIPHER_MODE_CTR */
328
Manuel Pégourié-Gonnardc0893122018-05-22 15:17:20 +0200329#if defined(MBEDTLS_SELF_TEST)
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000330/**
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100331 * \brief Checkup routine.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000332 *
Manuel Pégourié-Gonnard5aa4e3b2018-02-28 11:55:49 +0100333 * \return \c 0 on success, or \c 1 on failure.
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000334 */
335int mbedtls_aria_self_test( int verbose );
Manuel Pégourié-Gonnardc0893122018-05-22 15:17:20 +0200336#endif /* MBEDTLS_SELF_TEST */
Markku-Juhani O. Saarinen41efbaa2017-11-30 11:37:55 +0000337
338#ifdef __cplusplus
339}
340#endif
341
342#endif /* aria.h */