123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254 |
- #include <tinycrypt/aes.h>
- #include <tinycrypt/cmac_mode.h>
- #include <tinycrypt/constants.h>
- #include <tinycrypt/utils.h>
- const static uint64_t MAX_CALLS = ((uint64_t)1 << 48);
- const unsigned char gf_wrap = 0x87;
- void gf_double(uint8_t *out, uint8_t *in)
- {
-
- uint8_t *x = in + (TC_AES_BLOCK_SIZE - 1);
-
- uint8_t carry = (in[0] >> 7) ? gf_wrap : 0;
- out += (TC_AES_BLOCK_SIZE - 1);
- for (;;) {
- *out-- = (*x << 1) ^ carry;
- if (x == in) {
- break;
- }
- carry = *x-- >> 7;
- }
- }
- int tc_cmac_setup(TCCmacState_t s, const uint8_t *key, TCAesKeySched_t sched)
- {
-
- if (s == (TCCmacState_t) 0 ||
- key == (const uint8_t *) 0) {
- return TC_CRYPTO_FAIL;
- }
-
- _set(s, 0, sizeof(*s));
- s->sched = sched;
-
- tc_aes128_set_encrypt_key(s->sched, key);
-
- _set(s->iv, 0, TC_AES_BLOCK_SIZE);
- tc_aes_encrypt(s->iv, s->iv, s->sched);
- gf_double (s->K1, s->iv);
- gf_double (s->K2, s->K1);
-
- tc_cmac_init(s);
- return TC_CRYPTO_SUCCESS;
- }
- int tc_cmac_erase(TCCmacState_t s)
- {
- if (s == (TCCmacState_t) 0) {
- return TC_CRYPTO_FAIL;
- }
-
- _set(s, 0, sizeof(*s));
- return TC_CRYPTO_SUCCESS;
- }
- int tc_cmac_init(TCCmacState_t s)
- {
-
- if (s == (TCCmacState_t) 0) {
- return TC_CRYPTO_FAIL;
- }
-
- _set(s->iv, 0, TC_AES_BLOCK_SIZE);
-
- _set(s->leftover, 0, TC_AES_BLOCK_SIZE);
- s->leftover_offset = 0;
-
- s->countdown = MAX_CALLS;
- return TC_CRYPTO_SUCCESS;
- }
- int tc_cmac_update(TCCmacState_t s, const uint8_t *data, size_t data_length)
- {
- unsigned int i;
-
- if (s == (TCCmacState_t) 0) {
- return TC_CRYPTO_FAIL;
- }
- if (data_length == 0) {
- return TC_CRYPTO_SUCCESS;
- }
- if (data == (const uint8_t *) 0) {
- return TC_CRYPTO_FAIL;
- }
- if (s->countdown == 0) {
- return TC_CRYPTO_FAIL;
- }
- s->countdown--;
- if (s->leftover_offset > 0) {
-
- size_t remaining_space = TC_AES_BLOCK_SIZE - s->leftover_offset;
- if (data_length < remaining_space) {
-
- _copy(&s->leftover[s->leftover_offset], data_length, data, data_length);
- s->leftover_offset += data_length;
- return TC_CRYPTO_SUCCESS;
- }
-
- _copy(&s->leftover[s->leftover_offset],
- remaining_space,
- data,
- remaining_space);
- data_length -= remaining_space;
- data += remaining_space;
- s->leftover_offset = 0;
- for (i = 0; i < TC_AES_BLOCK_SIZE; ++i) {
- s->iv[i] ^= s->leftover[i];
- }
- tc_aes_encrypt(s->iv, s->iv, s->sched);
- }
-
- while (data_length > TC_AES_BLOCK_SIZE) {
- for (i = 0; i < TC_AES_BLOCK_SIZE; ++i) {
- s->iv[i] ^= data[i];
- }
- tc_aes_encrypt(s->iv, s->iv, s->sched);
- data += TC_AES_BLOCK_SIZE;
- data_length -= TC_AES_BLOCK_SIZE;
- }
- if (data_length > 0) {
-
- _copy(s->leftover, data_length, data, data_length);
- s->leftover_offset = data_length;
- }
- return TC_CRYPTO_SUCCESS;
- }
- int tc_cmac_final(uint8_t *tag, TCCmacState_t s)
- {
- uint8_t *k;
- unsigned int i;
-
- if (tag == (uint8_t *) 0 ||
- s == (TCCmacState_t) 0) {
- return TC_CRYPTO_FAIL;
- }
- if (s->leftover_offset == TC_AES_BLOCK_SIZE) {
-
- k = (uint8_t *) s->K1;
- } else {
-
- size_t remaining = TC_AES_BLOCK_SIZE - s->leftover_offset;
- _set(&s->leftover[s->leftover_offset], 0, remaining);
- s->leftover[s->leftover_offset] = TC_CMAC_PADDING;
- k = (uint8_t *) s->K2;
- }
- for (i = 0; i < TC_AES_BLOCK_SIZE; ++i) {
- s->iv[i] ^= s->leftover[i] ^ k[i];
- }
- tc_aes_encrypt(tag, s->iv, s->sched);
-
- tc_cmac_erase(s);
- return TC_CRYPTO_SUCCESS;
- }
|