| Manuel Pégourié-Gonnard | a6916fa | 2014-05-02 15:17:29 +0200 | [diff] [blame] | 1 | /** | 
|  | 2 | * \file ccm.h | 
|  | 3 | * | 
| Rose Zadik | 477dce1 | 2018-04-17 16:31:22 +0100 | [diff] [blame] | 4 | * \brief This file provides an API for the CCM authenticated encryption | 
|  | 5 | *        mode for block ciphers. | 
| Rose Zadik | 4ee9d24 | 2018-03-26 17:18:44 +0100 | [diff] [blame] | 6 | * | 
|  | 7 | * CCM combines Counter mode encryption with CBC-MAC authentication | 
|  | 8 | * for 128-bit block ciphers. | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 9 | * | 
|  | 10 | * Input to CCM includes the following elements: | 
|  | 11 | * <ul><li>Payload - data that is both authenticated and encrypted.</li> | 
|  | 12 | * <li>Associated data (Adata) - data that is authenticated but not | 
|  | 13 | * encrypted, For example, a header.</li> | 
|  | 14 | * <li>Nonce - A unique value that is assigned to the payload and the | 
|  | 15 | * associated data.</li></ul> | 
|  | 16 | * | 
| Janos Follath | 6b4bd3d | 2018-05-29 11:30:26 +0100 | [diff] [blame] | 17 | * Definition of CCM: | 
|  | 18 | * http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C_updated-July20_2007.pdf | 
|  | 19 | * RFC 3610 "Counter with CBC-MAC (CCM)" | 
|  | 20 | * | 
|  | 21 | * Related: | 
|  | 22 | * RFC 5116 "An Interface and Algorithms for Authenticated Encryption" | 
|  | 23 | * | 
|  | 24 | * Definition of CCM*: | 
|  | 25 | * IEEE 802.15.4 - IEEE Standard for Local and metropolitan area networks | 
|  | 26 | * Integer representation is fixed most-significant-octet-first order and | 
|  | 27 | * the representation of octets is most-significant-bit-first order. This is | 
|  | 28 | * consistent with RFC 3610. | 
| Darryl Green | a40a101 | 2018-01-05 15:33:17 +0000 | [diff] [blame] | 29 | */ | 
|  | 30 | /* | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 31 | *  Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved | 
| Manuel Pégourié-Gonnard | 37ff140 | 2015-09-04 14:21:07 +0200 | [diff] [blame] | 32 | *  SPDX-License-Identifier: Apache-2.0 | 
|  | 33 | * | 
|  | 34 | *  Licensed under the Apache License, Version 2.0 (the "License"); you may | 
|  | 35 | *  not use this file except in compliance with the License. | 
|  | 36 | *  You may obtain a copy of the License at | 
|  | 37 | * | 
|  | 38 | *  http://www.apache.org/licenses/LICENSE-2.0 | 
|  | 39 | * | 
|  | 40 | *  Unless required by applicable law or agreed to in writing, software | 
|  | 41 | *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT | 
|  | 42 | *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | 43 | *  See the License for the specific language governing permissions and | 
|  | 44 | *  limitations under the License. | 
| Manuel Pégourié-Gonnard | a6916fa | 2014-05-02 15:17:29 +0200 | [diff] [blame] | 45 | * | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 46 | *  This file is part of Mbed TLS (https://tls.mbed.org) | 
| Manuel Pégourié-Gonnard | a6916fa | 2014-05-02 15:17:29 +0200 | [diff] [blame] | 47 | */ | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 48 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 49 | #ifndef MBEDTLS_CCM_H | 
|  | 50 | #define MBEDTLS_CCM_H | 
| Manuel Pégourié-Gonnard | a6916fa | 2014-05-02 15:17:29 +0200 | [diff] [blame] | 51 |  | 
|  | 52 | #include "cipher.h" | 
|  | 53 |  | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 54 | #define MBEDTLS_ERR_CCM_BAD_INPUT       -0x000D /**< Bad input parameters to the function. */ | 
|  | 55 | #define MBEDTLS_ERR_CCM_AUTH_FAILED     -0x000F /**< Authenticated decryption failed. */ | 
| Ron Eldor | 9924bdc | 2018-10-04 10:59:13 +0300 | [diff] [blame] | 56 |  | 
|  | 57 | /* MBEDTLS_ERR_CCM_HW_ACCEL_FAILED is deprecated and should not be used. */ | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 58 | #define MBEDTLS_ERR_CCM_HW_ACCEL_FAILED -0x0011 /**< CCM hardware accelerator failed. */ | 
| Manuel Pégourié-Gonnard | a6916fa | 2014-05-02 15:17:29 +0200 | [diff] [blame] | 59 |  | 
| Steven Cooreman | 222e2ff | 2017-04-04 11:37:15 +0200 | [diff] [blame] | 60 |  | 
| Manuel Pégourié-Gonnard | a6916fa | 2014-05-02 15:17:29 +0200 | [diff] [blame] | 61 | #ifdef __cplusplus | 
|  | 62 | extern "C" { | 
|  | 63 | #endif | 
|  | 64 |  | 
| Ron Eldor | 4e6d55d | 2018-02-07 16:36:15 +0200 | [diff] [blame] | 65 | #if !defined(MBEDTLS_CCM_ALT) | 
|  | 66 | // Regular implementation | 
|  | 67 | // | 
|  | 68 |  | 
| Manuel Pégourié-Gonnard | 9fe0d13 | 2014-05-06 12:12:45 +0200 | [diff] [blame] | 69 | /** | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 70 | * \brief    The CCM context-type definition. The CCM context is passed | 
|  | 71 | *           to the APIs called. | 
| Manuel Pégourié-Gonnard | 9fe0d13 | 2014-05-06 12:12:45 +0200 | [diff] [blame] | 72 | */ | 
| Dawid Drozd | 428cc52 | 2018-07-24 10:02:47 +0200 | [diff] [blame] | 73 | typedef struct mbedtls_ccm_context | 
|  | 74 | { | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 75 | mbedtls_cipher_context_t cipher_ctx;    /*!< The cipher context used. */ | 
| Manuel Pégourié-Gonnard | 9fe0d13 | 2014-05-06 12:12:45 +0200 | [diff] [blame] | 76 | } | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 77 | mbedtls_ccm_context; | 
| Manuel Pégourié-Gonnard | 9fe0d13 | 2014-05-06 12:12:45 +0200 | [diff] [blame] | 78 |  | 
| Ron Eldor | 4e6d55d | 2018-02-07 16:36:15 +0200 | [diff] [blame] | 79 | #else  /* MBEDTLS_CCM_ALT */ | 
|  | 80 | #include "ccm_alt.h" | 
|  | 81 | #endif /* MBEDTLS_CCM_ALT */ | 
|  | 82 |  | 
| Manuel Pégourié-Gonnard | 9fe0d13 | 2014-05-06 12:12:45 +0200 | [diff] [blame] | 83 | /** | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 84 | * \brief           This function initializes the specified CCM context, | 
|  | 85 | *                  to make references valid, and prepare the context | 
|  | 86 | *                  for mbedtls_ccm_setkey() or mbedtls_ccm_free(). | 
| Manuel Pégourié-Gonnard | 6963ff0 | 2015-04-28 18:02:54 +0200 | [diff] [blame] | 87 | * | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 88 | * \param ctx       The CCM context to initialize. | 
| Manuel Pégourié-Gonnard | 6963ff0 | 2015-04-28 18:02:54 +0200 | [diff] [blame] | 89 | */ | 
|  | 90 | void mbedtls_ccm_init( mbedtls_ccm_context *ctx ); | 
|  | 91 |  | 
|  | 92 | /** | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 93 | * \brief           This function initializes the CCM context set in the | 
|  | 94 | *                  \p ctx parameter and sets the encryption key. | 
| Manuel Pégourié-Gonnard | 9fe0d13 | 2014-05-06 12:12:45 +0200 | [diff] [blame] | 95 | * | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 96 | * \param ctx       The CCM context to initialize. | 
|  | 97 | * \param cipher    The 128-bit block cipher to use. | 
|  | 98 | * \param key       The encryption key. | 
|  | 99 | * \param keybits   The key size in bits. This must be acceptable by the cipher. | 
| Manuel Pégourié-Gonnard | 9fe0d13 | 2014-05-06 12:12:45 +0200 | [diff] [blame] | 100 | * | 
| Rose Zadik | 4ee9d24 | 2018-03-26 17:18:44 +0100 | [diff] [blame] | 101 | * \return          \c 0 on success. | 
| Rose Zadik | ef87179 | 2018-04-17 10:41:48 +0100 | [diff] [blame] | 102 | * \return          A CCM or cipher-specific error code on failure. | 
| Manuel Pégourié-Gonnard | 9fe0d13 | 2014-05-06 12:12:45 +0200 | [diff] [blame] | 103 | */ | 
| Manuel Pégourié-Gonnard | 6963ff0 | 2015-04-28 18:02:54 +0200 | [diff] [blame] | 104 | int mbedtls_ccm_setkey( mbedtls_ccm_context *ctx, | 
|  | 105 | mbedtls_cipher_id_t cipher, | 
|  | 106 | const unsigned char *key, | 
| Manuel Pégourié-Gonnard | b8186a5 | 2015-06-18 14:58:58 +0200 | [diff] [blame] | 107 | unsigned int keybits ); | 
| Manuel Pégourié-Gonnard | 9fe0d13 | 2014-05-06 12:12:45 +0200 | [diff] [blame] | 108 |  | 
|  | 109 | /** | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 110 | * \brief   This function releases and clears the specified CCM context | 
|  | 111 | *          and underlying cipher sub-context. | 
| Manuel Pégourié-Gonnard | 9fe0d13 | 2014-05-06 12:12:45 +0200 | [diff] [blame] | 112 | * | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 113 | * \param ctx       The CCM context to clear. | 
| Manuel Pégourié-Gonnard | 9fe0d13 | 2014-05-06 12:12:45 +0200 | [diff] [blame] | 114 | */ | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 115 | void mbedtls_ccm_free( mbedtls_ccm_context *ctx ); | 
| Manuel Pégourié-Gonnard | 9fe0d13 | 2014-05-06 12:12:45 +0200 | [diff] [blame] | 116 |  | 
| Manuel Pégourié-Gonnard | 637eb3d | 2014-05-06 12:13:09 +0200 | [diff] [blame] | 117 | /** | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 118 | * \brief           This function encrypts a buffer using CCM. | 
| Manuel Pégourié-Gonnard | 637eb3d | 2014-05-06 12:13:09 +0200 | [diff] [blame] | 119 | * | 
| Rose Zadik | 4ee9d24 | 2018-03-26 17:18:44 +0100 | [diff] [blame] | 120 | * \note            The tag is written to a separate buffer. To concatenate | 
|  | 121 | *                  the \p tag with the \p output, as done in <em>RFC-3610: | 
|  | 122 | *                  Counter with CBC-MAC (CCM)</em>, use | 
|  | 123 | *                  \p tag = \p output + \p length, and make sure that the | 
|  | 124 | *                  output buffer is at least \p length + \p tag_len wide. | 
|  | 125 | * | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 126 | * \param ctx       The CCM context to use for encryption. | 
|  | 127 | * \param length    The length of the input data in Bytes. | 
|  | 128 | * \param iv        Initialization vector (nonce). | 
| Janos Follath | 6b4bd3d | 2018-05-29 11:30:26 +0100 | [diff] [blame] | 129 | * \param iv_len    The length of the nonce in Bytes: 7, 8, 9, 10, 11, 12, | 
|  | 130 | *                  or 13. The length L of the message length field is | 
|  | 131 | *                  15 - \p iv_len. | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 132 | * \param add       The additional data field. | 
|  | 133 | * \param add_len   The length of additional data in Bytes. | 
|  | 134 | *                  Must be less than 2^16 - 2^8. | 
|  | 135 | * \param input     The buffer holding the input data. | 
|  | 136 | * \param output    The buffer holding the output data. | 
|  | 137 | *                  Must be at least \p length Bytes wide. | 
| Janos Follath | 6b4bd3d | 2018-05-29 11:30:26 +0100 | [diff] [blame] | 138 | * \param tag       The buffer holding the authentication field. | 
|  | 139 | * \param tag_len   The length of the authentication field to generate in Bytes: | 
| Mathieu Briand | ffb6efd | 2018-02-07 10:29:27 +0100 | [diff] [blame] | 140 | *                  4, 6, 8, 10, 12, 14 or 16. | 
| Manuel Pégourié-Gonnard | 637eb3d | 2014-05-06 12:13:09 +0200 | [diff] [blame] | 141 | * | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 142 | * \return          \c 0 on success. | 
| Rose Zadik | ef87179 | 2018-04-17 10:41:48 +0100 | [diff] [blame] | 143 | * \return          A CCM or cipher-specific error code on failure. | 
| Manuel Pégourié-Gonnard | 637eb3d | 2014-05-06 12:13:09 +0200 | [diff] [blame] | 144 | */ | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 145 | int mbedtls_ccm_encrypt_and_tag( mbedtls_ccm_context *ctx, size_t length, | 
| Manuel Pégourié-Gonnard | 0023233 | 2014-05-06 15:56:07 +0200 | [diff] [blame] | 146 | const unsigned char *iv, size_t iv_len, | 
|  | 147 | const unsigned char *add, size_t add_len, | 
|  | 148 | const unsigned char *input, unsigned char *output, | 
|  | 149 | unsigned char *tag, size_t tag_len ); | 
| Manuel Pégourié-Gonnard | 637eb3d | 2014-05-06 12:13:09 +0200 | [diff] [blame] | 150 |  | 
| Manuel Pégourié-Gonnard | 0023233 | 2014-05-06 15:56:07 +0200 | [diff] [blame] | 151 | /** | 
| Janos Follath | 5dc8cfa | 2018-04-27 14:45:49 +0100 | [diff] [blame] | 152 | * \brief           This function encrypts a buffer using CCM*. | 
|  | 153 | * | 
|  | 154 | * \note            The tag is written to a separate buffer. To concatenate | 
|  | 155 | *                  the \p tag with the \p output, as done in <em>RFC-3610: | 
|  | 156 | *                  Counter with CBC-MAC (CCM)</em>, use | 
|  | 157 | *                  \p tag = \p output + \p length, and make sure that the | 
|  | 158 | *                  output buffer is at least \p length + \p tag_len wide. | 
|  | 159 | * | 
|  | 160 | * \note            When using this function in a variable tag length context, | 
|  | 161 | *                  the tag length has to be encoded into the \p iv passed to | 
|  | 162 | *                  this function. | 
|  | 163 | * | 
|  | 164 | * \param ctx       The CCM context to use for encryption. | 
|  | 165 | * \param length    The length of the input data in Bytes. | 
|  | 166 | * \param iv        Initialization vector (nonce). | 
| Janos Follath | 6b4bd3d | 2018-05-29 11:30:26 +0100 | [diff] [blame] | 167 | * \param iv_len    The length of the nonce in Bytes: 7, 8, 9, 10, 11, 12, | 
|  | 168 | *                  or 13. The length L of the message length field is | 
|  | 169 | *                  15 - \p iv_len. | 
| Janos Follath | 5dc8cfa | 2018-04-27 14:45:49 +0100 | [diff] [blame] | 170 | * \param add       The additional data field. | 
|  | 171 | * \param add_len   The length of additional data in Bytes. | 
|  | 172 | *                  Must be less than 2^16 - 2^8. | 
|  | 173 | * \param input     The buffer holding the input data. | 
|  | 174 | * \param output    The buffer holding the output data. | 
|  | 175 | *                  Must be at least \p length Bytes wide. | 
| Janos Follath | 6b4bd3d | 2018-05-29 11:30:26 +0100 | [diff] [blame] | 176 | * \param tag       The buffer holding the authentication field. | 
|  | 177 | * \param tag_len   The length of the authentication field to generate in Bytes: | 
| Janos Follath | 5dc8cfa | 2018-04-27 14:45:49 +0100 | [diff] [blame] | 178 | *                  0, 4, 6, 8, 10, 12, 14 or 16. | 
|  | 179 | * | 
|  | 180 | * \warning         Passing 0 as \p tag_len means that the message is no | 
|  | 181 | *                  longer authenticated. | 
|  | 182 | * | 
|  | 183 | * \return          \c 0 on success. | 
|  | 184 | * \return          A CCM or cipher-specific error code on failure. | 
|  | 185 | */ | 
|  | 186 | int mbedtls_ccm_star_encrypt_and_tag( mbedtls_ccm_context *ctx, size_t length, | 
|  | 187 | const unsigned char *iv, size_t iv_len, | 
|  | 188 | const unsigned char *add, size_t add_len, | 
|  | 189 | const unsigned char *input, unsigned char *output, | 
|  | 190 | unsigned char *tag, size_t tag_len ); | 
|  | 191 |  | 
|  | 192 | /** | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 193 | * \brief           This function performs a CCM authenticated decryption of a | 
|  | 194 | *                  buffer. | 
| Manuel Pégourié-Gonnard | 0023233 | 2014-05-06 15:56:07 +0200 | [diff] [blame] | 195 | * | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 196 | * \param ctx       The CCM context to use for decryption. | 
|  | 197 | * \param length    The length of the input data in Bytes. | 
| Janos Follath | 143b319 | 2018-05-30 13:57:29 +0100 | [diff] [blame] | 198 | * \param iv        Initialization vector (nonce). | 
| Janos Follath | 6b4bd3d | 2018-05-29 11:30:26 +0100 | [diff] [blame] | 199 | * \param iv_len    The length of the nonce in Bytes: 7, 8, 9, 10, 11, 12, | 
|  | 200 | *                  or 13. The length L of the message length field is | 
|  | 201 | *                  15 - \p iv_len. | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 202 | * \param add       The additional data field. | 
|  | 203 | * \param add_len   The length of additional data in Bytes. | 
| Mathieu Briand | ffb6efd | 2018-02-07 10:29:27 +0100 | [diff] [blame] | 204 | *                  Must be less than 2^16 - 2^8. | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 205 | * \param input     The buffer holding the input data. | 
|  | 206 | * \param output    The buffer holding the output data. | 
| Mathieu Briand | ffb6efd | 2018-02-07 10:29:27 +0100 | [diff] [blame] | 207 | *                  Must be at least \p length Bytes wide. | 
| Janos Follath | 6b4bd3d | 2018-05-29 11:30:26 +0100 | [diff] [blame] | 208 | * \param tag       The buffer holding the authentication field. | 
|  | 209 | * \param tag_len   The length of the authentication field in Bytes. | 
| Mathieu Briand | ffb6efd | 2018-02-07 10:29:27 +0100 | [diff] [blame] | 210 | *                  4, 6, 8, 10, 12, 14 or 16. | 
| Manuel Pégourié-Gonnard | 0023233 | 2014-05-06 15:56:07 +0200 | [diff] [blame] | 211 | * | 
| Rose Zadik | 379b95c | 2018-04-17 16:43:00 +0100 | [diff] [blame] | 212 | * \return          \c 0 on success. This indicates that the message is authentic. | 
|  | 213 | * \return          #MBEDTLS_ERR_CCM_AUTH_FAILED if the tag does not match. | 
|  | 214 | * \return          A cipher-specific error code on calculation failure. | 
| Manuel Pégourié-Gonnard | 0023233 | 2014-05-06 15:56:07 +0200 | [diff] [blame] | 215 | */ | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 216 | int mbedtls_ccm_auth_decrypt( mbedtls_ccm_context *ctx, size_t length, | 
| Manuel Pégourié-Gonnard | 0023233 | 2014-05-06 15:56:07 +0200 | [diff] [blame] | 217 | const unsigned char *iv, size_t iv_len, | 
|  | 218 | const unsigned char *add, size_t add_len, | 
|  | 219 | const unsigned char *input, unsigned char *output, | 
|  | 220 | const unsigned char *tag, size_t tag_len ); | 
| Manuel Pégourié-Gonnard | 637eb3d | 2014-05-06 12:13:09 +0200 | [diff] [blame] | 221 |  | 
| Janos Follath | 5dc8cfa | 2018-04-27 14:45:49 +0100 | [diff] [blame] | 222 | /** | 
|  | 223 | * \brief           This function performs a CCM* authenticated decryption of a | 
|  | 224 | *                  buffer. | 
|  | 225 | * | 
|  | 226 | * \note            When using this function in a variable tag length context, | 
|  | 227 | *                  the tag length has to be decoded from \p iv and passed to | 
|  | 228 | *                  this function as \p tag_len. (\p tag needs to be adjusted | 
|  | 229 | *                  accordingly.) | 
|  | 230 | * | 
|  | 231 | * \param ctx       The CCM context to use for decryption. | 
|  | 232 | * \param length    The length of the input data in Bytes. | 
| Janos Follath | 143b319 | 2018-05-30 13:57:29 +0100 | [diff] [blame] | 233 | * \param iv        Initialization vector (nonce). | 
| Janos Follath | 6b4bd3d | 2018-05-29 11:30:26 +0100 | [diff] [blame] | 234 | * \param iv_len    The length of the nonce in Bytes: 7, 8, 9, 10, 11, 12, | 
|  | 235 | *                  or 13. The length L of the message length field is | 
|  | 236 | *                  15 - \p iv_len. | 
| Janos Follath | 5dc8cfa | 2018-04-27 14:45:49 +0100 | [diff] [blame] | 237 | * \param add       The additional data field. | 
|  | 238 | * \param add_len   The length of additional data in Bytes. | 
|  | 239 | *                  Must be less than 2^16 - 2^8. | 
|  | 240 | * \param input     The buffer holding the input data. | 
|  | 241 | * \param output    The buffer holding the output data. | 
|  | 242 | *                  Must be at least \p length Bytes wide. | 
| Janos Follath | 6b4bd3d | 2018-05-29 11:30:26 +0100 | [diff] [blame] | 243 | * \param tag       The buffer holding the authentication field. | 
|  | 244 | * \param tag_len   The length of the authentication field in Bytes. | 
| Janos Follath | 5dc8cfa | 2018-04-27 14:45:49 +0100 | [diff] [blame] | 245 | *                  0, 4, 6, 8, 10, 12, 14 or 16. | 
|  | 246 | * | 
|  | 247 | * \warning         Passing 0 as \p tag_len means that the message is no | 
|  | 248 | *                  longer authenticated. | 
|  | 249 | * | 
| Janos Follath | 143b319 | 2018-05-30 13:57:29 +0100 | [diff] [blame] | 250 | * \return          \c 0 on success. | 
| Janos Follath | 5dc8cfa | 2018-04-27 14:45:49 +0100 | [diff] [blame] | 251 | * \return          #MBEDTLS_ERR_CCM_AUTH_FAILED if the tag does not match. | 
|  | 252 | * \return          A cipher-specific error code on calculation failure. | 
|  | 253 | */ | 
|  | 254 | int mbedtls_ccm_star_auth_decrypt( mbedtls_ccm_context *ctx, size_t length, | 
|  | 255 | const unsigned char *iv, size_t iv_len, | 
|  | 256 | const unsigned char *add, size_t add_len, | 
|  | 257 | const unsigned char *input, unsigned char *output, | 
|  | 258 | const unsigned char *tag, size_t tag_len ); | 
| Steven Cooreman | 222e2ff | 2017-04-04 11:37:15 +0200 | [diff] [blame] | 259 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 260 | #if defined(MBEDTLS_SELF_TEST) && defined(MBEDTLS_AES_C) | 
| Manuel Pégourié-Gonnard | a6916fa | 2014-05-02 15:17:29 +0200 | [diff] [blame] | 261 | /** | 
| Rose Zadik | eecdbea | 2018-01-24 12:56:53 +0000 | [diff] [blame] | 262 | * \brief          The CCM checkup routine. | 
| Manuel Pégourié-Gonnard | a6916fa | 2014-05-02 15:17:29 +0200 | [diff] [blame] | 263 | * | 
| Rose Zadik | 4ee9d24 | 2018-03-26 17:18:44 +0100 | [diff] [blame] | 264 | * \return         \c 0 on success. | 
|  | 265 | * \return         \c 1 on failure. | 
| Manuel Pégourié-Gonnard | a6916fa | 2014-05-02 15:17:29 +0200 | [diff] [blame] | 266 | */ | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 267 | int mbedtls_ccm_self_test( int verbose ); | 
|  | 268 | #endif /* MBEDTLS_SELF_TEST && MBEDTLS_AES_C */ | 
| Manuel Pégourié-Gonnard | a6916fa | 2014-05-02 15:17:29 +0200 | [diff] [blame] | 269 |  | 
|  | 270 | #ifdef __cplusplus | 
|  | 271 | } | 
|  | 272 | #endif | 
|  | 273 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 274 | #endif /* MBEDTLS_CCM_H */ |