blob: f40f0d4f5e515344fd21adf25313ba7e9d046551 [file] [log] [blame]
Manuel Pégourié-Gonnard045f0942020-07-02 11:34:02 +02001/**
2 * \file ssl_invasive.h
3 *
4 * \brief SSL module: interfaces for invasive testing only.
5 *
6 * The interfaces in this file are intended for testing purposes only.
7 * They SHOULD NOT be made available in library integrations except when
8 * building the library for testing.
9 */
10/*
11 * Copyright (C) 2020, ARM Limited, All Rights Reserved
12 * SPDX-License-Identifier: Apache-2.0
13 *
14 * Licensed under the Apache License, Version 2.0 (the "License"); you may
15 * not use this file except in compliance with the License.
16 * You may obtain a copy of the License at
17 *
18 * http://www.apache.org/licenses/LICENSE-2.0
19 *
20 * Unless required by applicable law or agreed to in writing, software
21 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
22 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
23 * See the License for the specific language governing permissions and
24 * limitations under the License.
25 *
26 * This file is part of mbed TLS (https://tls.mbed.org)
27 */
28#ifndef MBEDTLS_SSL_INVASIVE_H
29#define MBEDTLS_SSL_INVASIVE_H
30
31#include "common.h"
32#include "mbedtls/md.h"
33
Manuel Pégourié-Gonnard65a6fa32020-07-09 09:52:17 +020034#if defined(MBEDTLS_TEST_HOOKS) && \
35 defined(MBEDTLS_SSL_SOME_SUITES_USE_CBC) && \
Manuel Pégourié-Gonnard045f0942020-07-02 11:34:02 +020036 ( defined(MBEDTLS_SSL_PROTO_TLS1) || \
37 defined(MBEDTLS_SSL_PROTO_TLS1_1) | \
38 defined(MBEDTLS_SSL_PROTO_TLS1_2) )
39/** \brief Compute the HMAC of variable-length data with constant flow.
40 *
41 * This function computes the HMAC of the concatenation of \p add_data and \p
42 * data, and does with a code flow and memory access pattern that does not
43 * depend on \p data_len_secret, but only on \p min_data_len and \p
44 * max_data_len. In particular, this function always reads exactly \p
45 * max_data_len bytes from \p data.
46 *
47 * \param ctx The HMAC context. It must have keys configured
48 * with mbedtls_md_hmac_starts(). It is reset using
49 * mbedtls_md_hmac_reset() after the computation is
50 * complete to prepare for the next computation.
51 * \param add_data The additional data prepended to \p data. This
52 * must point to a readable buffer of \p add_data_len
53 * bytes.
54 * \param add_data_len The length of \p add_data in bytes.
55 * \param data The data appended to \p add_data. This must point
56 * to a readable buffer of \p max_data_len bytes.
57 * \param data_len_secret The length of the data to process in \p data.
58 * This must be no less than \p min_data_len and no
59 * greated than \p max_data_len.
60 * \param min_data_len The minimal length of \p data in bytes.
61 * \param max_data_len The maximal length of \p data in bytes.
62 * \param output The HMAC will be written here. This must point to
63 * a writeable buffer of sufficient size to hold the
64 * HMAC value.
65 *
66 * \retval 0
67 * Success.
68 * \retval MBEDTLS_ERR_PLATFORM_HW_ACCEL_FAILED
69 * The hardware accelerator failed.
70 */
71int mbedtls_ssl_cf_hmac(
72 mbedtls_md_context_t *ctx,
73 const unsigned char *add_data, size_t add_data_len,
74 const unsigned char *data, size_t data_len_secret,
75 size_t min_data_len, size_t max_data_len,
76 unsigned char *output );
Manuel Pégourié-Gonnard65a6fa32020-07-09 09:52:17 +020077#endif /* MBEDTLS_TEST_HOOKS && MBEDTLS_SSL_SOME_SUITES_USE_CBC && TLS 1.0-1.2 */
Manuel Pégourié-Gonnard045f0942020-07-02 11:34:02 +020078
79#endif /* MBEDTLS_SSL_INVASIVE_H */