| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 1 | /** | 
|  | 2 | * \file cmac.h | 
|  | 3 | * | 
| Rose Zadik | 8c15493 | 2018-03-27 10:45:16 +0100 | [diff] [blame] | 4 | * \brief This file contains CMAC definitions and functions. | 
|  | 5 | * | 
|  | 6 | * The Cipher-based Message Authentication Code (CMAC) Mode for | 
|  | 7 | * Authentication is defined in <em>RFC-4493: The AES-CMAC Algorithm</em>. | 
| Darryl Green | a40a101 | 2018-01-05 15:33:17 +0000 | [diff] [blame] | 8 | */ | 
|  | 9 | /* | 
| Bence Szépkúti | 1e14827 | 2020-08-07 13:07:28 +0200 | [diff] [blame] | 10 | *  Copyright The Mbed TLS Contributors | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 11 | *  SPDX-License-Identifier: Apache-2.0 | 
|  | 12 | * | 
|  | 13 | *  Licensed under the Apache License, Version 2.0 (the "License"); you may | 
|  | 14 | *  not use this file except in compliance with the License. | 
|  | 15 | *  You may obtain a copy of the License at | 
|  | 16 | * | 
|  | 17 | *  http://www.apache.org/licenses/LICENSE-2.0 | 
|  | 18 | * | 
|  | 19 | *  Unless required by applicable law or agreed to in writing, software | 
|  | 20 | *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT | 
|  | 21 | *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | 22 | *  See the License for the specific language governing permissions and | 
|  | 23 | *  limitations under the License. | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 24 | */ | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 25 |  | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 26 | #ifndef MBEDTLS_CMAC_H | 
|  | 27 | #define MBEDTLS_CMAC_H | 
|  | 28 |  | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 29 | #if !defined(MBEDTLS_CONFIG_FILE) | 
| Jaeden Amero | c49fbbf | 2019-07-04 20:01:14 +0100 | [diff] [blame] | 30 | #include "mbedtls/config.h" | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 31 | #else | 
|  | 32 | #include MBEDTLS_CONFIG_FILE | 
|  | 33 | #endif | 
|  | 34 |  | 
| Jaeden Amero | c49fbbf | 2019-07-04 20:01:14 +0100 | [diff] [blame] | 35 | #include "mbedtls/cipher.h" | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 36 |  | 
|  | 37 | #ifdef __cplusplus | 
|  | 38 | extern "C" { | 
|  | 39 | #endif | 
|  | 40 |  | 
| Ron Eldor | 9924bdc | 2018-10-04 10:59:13 +0300 | [diff] [blame] | 41 | /* MBEDTLS_ERR_CMAC_HW_ACCEL_FAILED is deprecated and should not be used. */ | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 42 | #define MBEDTLS_ERR_CMAC_HW_ACCEL_FAILED -0x007A  /**< CMAC hardware accelerator failed. */ | 
| Gilles Peskine | 7ecab3d | 2018-01-26 17:56:38 +0100 | [diff] [blame] | 43 |  | 
| Simon Butcher | 69283e5 | 2016-10-06 12:49:58 +0100 | [diff] [blame] | 44 | #define MBEDTLS_AES_BLOCK_SIZE          16 | 
|  | 45 | #define MBEDTLS_DES3_BLOCK_SIZE         8 | 
|  | 46 |  | 
| Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 47 | #if defined(MBEDTLS_AES_C) | 
| Rose Zadik | 8c15493 | 2018-03-27 10:45:16 +0100 | [diff] [blame] | 48 | #define MBEDTLS_CIPHER_BLKSIZE_MAX      16  /**< The longest block used by CMAC is that of AES. */ | 
| Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 49 | #else | 
| Rose Zadik | 8c15493 | 2018-03-27 10:45:16 +0100 | [diff] [blame] | 50 | #define MBEDTLS_CIPHER_BLKSIZE_MAX      8   /**< The longest block used by CMAC is that of 3DES. */ | 
| Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 51 | #endif | 
|  | 52 |  | 
| Steven Cooreman | 6334277 | 2017-04-04 11:47:16 +0200 | [diff] [blame] | 53 | #if !defined(MBEDTLS_CMAC_ALT) | 
|  | 54 |  | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 55 | /** | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 56 | * The CMAC context structure. | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 57 | */ | 
| Simon Butcher | 8308a44 | 2016-10-05 15:12:59 +0100 | [diff] [blame] | 58 | struct mbedtls_cmac_context_t | 
|  | 59 | { | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 60 | /** The internal state of the CMAC algorithm.  */ | 
| Simon Butcher | 69283e5 | 2016-10-06 12:49:58 +0100 | [diff] [blame] | 61 | unsigned char       state[MBEDTLS_CIPHER_BLKSIZE_MAX]; | 
| Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 62 |  | 
| Andres AG | a592dcc | 2016-10-06 15:23:39 +0100 | [diff] [blame] | 63 | /** Unprocessed data - either data that was not block aligned and is still | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 64 | *  pending processing, or the final block. */ | 
| Simon Butcher | 69283e5 | 2016-10-06 12:49:58 +0100 | [diff] [blame] | 65 | unsigned char       unprocessed_block[MBEDTLS_CIPHER_BLKSIZE_MAX]; | 
| Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 66 |  | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 67 | /** The length of data pending processing. */ | 
| Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 68 | size_t              unprocessed_len; | 
| Simon Butcher | 8308a44 | 2016-10-05 15:12:59 +0100 | [diff] [blame] | 69 | }; | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 70 |  | 
| Ron Eldor | 4e6d55d | 2018-02-07 16:36:15 +0200 | [diff] [blame] | 71 | #else  /* !MBEDTLS_CMAC_ALT */ | 
|  | 72 | #include "cmac_alt.h" | 
|  | 73 | #endif /* !MBEDTLS_CMAC_ALT */ | 
|  | 74 |  | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 75 | /** | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 76 | * \brief               This function sets the CMAC key, and prepares to authenticate | 
|  | 77 | *                      the input data. | 
|  | 78 | *                      Must be called with an initialized cipher context. | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 79 | * | 
| Steven Cooreman | 5d342bf | 2021-04-26 11:24:44 +0200 | [diff] [blame] | 80 | * \note                When the CMAC implementation is supplied by an alternate | 
|  | 81 | *                      implementation (through #MBEDTLS_CMAC_ALT), some ciphers | 
|  | 82 | *                      may not be supported by that implementation, and thus | 
|  | 83 | *                      return an error. Alternate implementations must support | 
|  | 84 | *                      AES-128 and AES-256, and may support AES-192 and 3DES. | 
|  | 85 | * | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 86 | * \param ctx           The cipher context used for the CMAC operation, initialized | 
| Rose Zadik | 8c15493 | 2018-03-27 10:45:16 +0100 | [diff] [blame] | 87 | *                      as one of the following types: MBEDTLS_CIPHER_AES_128_ECB, | 
|  | 88 | *                      MBEDTLS_CIPHER_AES_192_ECB, MBEDTLS_CIPHER_AES_256_ECB, | 
|  | 89 | *                      or MBEDTLS_CIPHER_DES_EDE3_ECB. | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 90 | * \param key           The CMAC key. | 
|  | 91 | * \param keybits       The length of the CMAC key in bits. | 
|  | 92 | *                      Must be supported by the cipher. | 
| Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 93 | * | 
| Rose Zadik | c138bb7 | 2018-04-16 11:11:25 +0100 | [diff] [blame] | 94 | * \return              \c 0 on success. | 
|  | 95 | * \return              A cipher-specific error code on failure. | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 96 | */ | 
| Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 97 | int mbedtls_cipher_cmac_starts( mbedtls_cipher_context_t *ctx, | 
| Simon Butcher | 94ffde7 | 2016-10-05 15:33:53 +0100 | [diff] [blame] | 98 | const unsigned char *key, size_t keybits ); | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 99 |  | 
|  | 100 | /** | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 101 | * \brief               This function feeds an input buffer into an ongoing CMAC | 
|  | 102 | *                      computation. | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 103 | * | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 104 | *                      It is called between mbedtls_cipher_cmac_starts() or | 
|  | 105 | *                      mbedtls_cipher_cmac_reset(), and mbedtls_cipher_cmac_finish(). | 
|  | 106 | *                      Can be called repeatedly. | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 107 | * | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 108 | * \param ctx           The cipher context used for the CMAC operation. | 
|  | 109 | * \param input         The buffer holding the input data. | 
|  | 110 | * \param ilen          The length of the input data. | 
|  | 111 | * | 
| Rose Zadik | c138bb7 | 2018-04-16 11:11:25 +0100 | [diff] [blame] | 112 | * \return             \c 0 on success. | 
|  | 113 | * \return             #MBEDTLS_ERR_MD_BAD_INPUT_DATA | 
| Rose Zadik | 8c15493 | 2018-03-27 10:45:16 +0100 | [diff] [blame] | 114 | *                     if parameter verification fails. | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 115 | */ | 
| Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 116 | int mbedtls_cipher_cmac_update( mbedtls_cipher_context_t *ctx, | 
|  | 117 | const unsigned char *input, size_t ilen ); | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 118 |  | 
|  | 119 | /** | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 120 | * \brief               This function finishes the CMAC operation, and writes | 
|  | 121 | *                      the result to the output buffer. | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 122 | * | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 123 | *                      It is called after mbedtls_cipher_cmac_update(). | 
|  | 124 | *                      It can be followed by mbedtls_cipher_cmac_reset() and | 
|  | 125 | *                      mbedtls_cipher_cmac_update(), or mbedtls_cipher_free(). | 
| Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 126 | * | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 127 | * \param ctx           The cipher context used for the CMAC operation. | 
|  | 128 | * \param output        The output buffer for the CMAC checksum result. | 
|  | 129 | * | 
| Rose Zadik | c138bb7 | 2018-04-16 11:11:25 +0100 | [diff] [blame] | 130 | * \return              \c 0 on success. | 
|  | 131 | * \return              #MBEDTLS_ERR_MD_BAD_INPUT_DATA | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 132 | *                      if parameter verification fails. | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 133 | */ | 
| Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 134 | int mbedtls_cipher_cmac_finish( mbedtls_cipher_context_t *ctx, | 
|  | 135 | unsigned char *output ); | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 136 |  | 
|  | 137 | /** | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 138 | * \brief               This function prepares the authentication of another | 
|  | 139 | *                      message with the same key as the previous CMAC | 
|  | 140 | *                      operation. | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 141 | * | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 142 | *                      It is called after mbedtls_cipher_cmac_finish() | 
|  | 143 | *                      and before mbedtls_cipher_cmac_update(). | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 144 | * | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 145 | * \param ctx           The cipher context used for the CMAC operation. | 
|  | 146 | * | 
| Rose Zadik | c138bb7 | 2018-04-16 11:11:25 +0100 | [diff] [blame] | 147 | * \return              \c 0 on success. | 
|  | 148 | * \return              #MBEDTLS_ERR_MD_BAD_INPUT_DATA | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 149 | *                      if parameter verification fails. | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 150 | */ | 
| Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 151 | int mbedtls_cipher_cmac_reset( mbedtls_cipher_context_t *ctx ); | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 152 |  | 
|  | 153 | /** | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 154 | * \brief               This function calculates the full generic CMAC | 
|  | 155 | *                      on the input buffer with the provided key. | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 156 | * | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 157 | *                      The function allocates the context, performs the | 
|  | 158 | *                      calculation, and frees the context. | 
| Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 159 | * | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 160 | *                      The CMAC result is calculated as | 
|  | 161 | *                      output = generic CMAC(cmac key, input buffer). | 
|  | 162 | * | 
| Steven Cooreman | 5d342bf | 2021-04-26 11:24:44 +0200 | [diff] [blame] | 163 | * \note                When the CMAC implementation is supplied by an alternate | 
|  | 164 | *                      implementation (through #MBEDTLS_CMAC_ALT), some ciphers | 
|  | 165 | *                      may not be supported by that implementation, and thus | 
|  | 166 | *                      return an error. Alternate implementations must support | 
|  | 167 | *                      AES-128 and AES-256, and may support AES-192 and 3DES. | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 168 | * | 
|  | 169 | * \param cipher_info   The cipher information. | 
|  | 170 | * \param key           The CMAC key. | 
|  | 171 | * \param keylen        The length of the CMAC key in bits. | 
|  | 172 | * \param input         The buffer holding the input data. | 
|  | 173 | * \param ilen          The length of the input data. | 
|  | 174 | * \param output        The buffer for the generic CMAC result. | 
|  | 175 | * | 
| Rose Zadik | c138bb7 | 2018-04-16 11:11:25 +0100 | [diff] [blame] | 176 | * \return              \c 0 on success. | 
|  | 177 | * \return              #MBEDTLS_ERR_MD_BAD_INPUT_DATA | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 178 | *                      if parameter verification fails. | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 179 | */ | 
| Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 180 | int mbedtls_cipher_cmac( const mbedtls_cipher_info_t *cipher_info, | 
|  | 181 | const unsigned char *key, size_t keylen, | 
|  | 182 | const unsigned char *input, size_t ilen, | 
|  | 183 | unsigned char *output ); | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 184 |  | 
| Simon Butcher | 69283e5 | 2016-10-06 12:49:58 +0100 | [diff] [blame] | 185 | #if defined(MBEDTLS_AES_C) | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 186 | /** | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 187 | * \brief           This function implements the AES-CMAC-PRF-128 pseudorandom | 
|  | 188 | *                  function, as defined in | 
|  | 189 | *                  <em>RFC-4615: The Advanced Encryption Standard-Cipher-based | 
|  | 190 | *                  Message Authentication Code-Pseudo-Random Function-128 | 
|  | 191 | *                  (AES-CMAC-PRF-128) Algorithm for the Internet Key | 
|  | 192 | *                  Exchange Protocol (IKE).</em> | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 193 | * | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 194 | * \param key       The key to use. | 
|  | 195 | * \param key_len   The key length in Bytes. | 
|  | 196 | * \param input     The buffer holding the input data. | 
|  | 197 | * \param in_len    The length of the input data in Bytes. | 
|  | 198 | * \param output    The buffer holding the generated 16 Bytes of | 
|  | 199 | *                  pseudorandom output. | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 200 | * | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 201 | * \return          \c 0 on success. | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 202 | */ | 
| Brian Murray | b0c3c43 | 2016-05-18 14:29:51 -0700 | [diff] [blame] | 203 | int mbedtls_aes_cmac_prf_128( const unsigned char *key, size_t key_len, | 
| Manuel Pégourié-Gonnard | 690083c | 2016-01-13 10:48:02 +0000 | [diff] [blame] | 204 | const unsigned char *input, size_t in_len, | 
| Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 205 | unsigned char output[16] ); | 
| Brian Murray | b439d45 | 2016-05-19 16:02:42 -0700 | [diff] [blame] | 206 | #endif /* MBEDTLS_AES_C */ | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 207 |  | 
| Brian Murray | b439d45 | 2016-05-19 16:02:42 -0700 | [diff] [blame] | 208 | #if defined(MBEDTLS_SELF_TEST) && ( defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) ) | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 209 | /** | 
| Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 210 | * \brief          The CMAC checkup routine. | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 211 | * | 
| Steven Cooreman | 91e2bab | 2021-04-23 08:19:43 +0200 | [diff] [blame] | 212 | * \note           In case the CMAC routines are provided by an alternative | 
|  | 213 | *                 implementation (i.e. #MBEDTLS_CMAC_ALT is defined), the | 
|  | 214 | *                 checkup routine will succeed even if the implementation does | 
|  | 215 | *                 not support the less widely used AES-192 or 3DES primitives. | 
|  | 216 | *                 The self-test requires at least AES-128 and AES-256 to be | 
|  | 217 | *                 supported by the underlying implementation. | 
|  | 218 | * | 
| Rose Zadik | 8c15493 | 2018-03-27 10:45:16 +0100 | [diff] [blame] | 219 | * \return         \c 0 on success. | 
|  | 220 | * \return         \c 1 on failure. | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 221 | */ | 
|  | 222 | int mbedtls_cmac_self_test( int verbose ); | 
| Brian Murray | b439d45 | 2016-05-19 16:02:42 -0700 | [diff] [blame] | 223 | #endif /* MBEDTLS_SELF_TEST && ( MBEDTLS_AES_C || MBEDTLS_DES_C ) */ | 
| Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 224 |  | 
|  | 225 | #ifdef __cplusplus | 
|  | 226 | } | 
|  | 227 | #endif | 
|  | 228 |  | 
|  | 229 | #endif /* MBEDTLS_CMAC_H */ |