Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
godotengine
GitHub Repository: godotengine/godot
Path: blob/master/thirdparty/mbedtls/include/mbedtls/aria.h
9903 views
1
/**
2
* \file aria.h
3
*
4
* \brief ARIA block cipher
5
*
6
* The ARIA algorithm is a symmetric block cipher that can encrypt and
7
* decrypt information. It is defined by the Korean Agency for
8
* Technology and Standards (KATS) in <em>KS X 1213:2004</em> (in
9
* Korean, but see http://210.104.33.10/ARIA/index-e.html in English)
10
* and also described by the IETF in <em>RFC 5794</em>.
11
*/
12
/*
13
* Copyright The Mbed TLS Contributors
14
* SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
15
*/
16
17
#ifndef MBEDTLS_ARIA_H
18
#define MBEDTLS_ARIA_H
19
#include "mbedtls/private_access.h"
20
21
#include "mbedtls/build_info.h"
22
23
#include <stddef.h>
24
#include <stdint.h>
25
26
#include "mbedtls/platform_util.h"
27
28
#define MBEDTLS_ARIA_ENCRYPT 1 /**< ARIA encryption. */
29
#define MBEDTLS_ARIA_DECRYPT 0 /**< ARIA decryption. */
30
31
#define MBEDTLS_ARIA_BLOCKSIZE 16 /**< ARIA block size in bytes. */
32
#define MBEDTLS_ARIA_MAX_ROUNDS 16 /**< Maximum number of rounds in ARIA. */
33
#define MBEDTLS_ARIA_MAX_KEYSIZE 32 /**< Maximum size of an ARIA key in bytes. */
34
35
/** Bad input data. */
36
#define MBEDTLS_ERR_ARIA_BAD_INPUT_DATA -0x005C
37
38
/** Invalid data input length. */
39
#define MBEDTLS_ERR_ARIA_INVALID_INPUT_LENGTH -0x005E
40
41
#ifdef __cplusplus
42
extern "C" {
43
#endif
44
45
#if !defined(MBEDTLS_ARIA_ALT)
46
// Regular implementation
47
//
48
49
/**
50
* \brief The ARIA context-type definition.
51
*/
52
typedef struct mbedtls_aria_context {
53
unsigned char MBEDTLS_PRIVATE(nr); /*!< The number of rounds (12, 14 or 16) */
54
/*! The ARIA round keys. */
55
uint32_t MBEDTLS_PRIVATE(rk)[MBEDTLS_ARIA_MAX_ROUNDS + 1][MBEDTLS_ARIA_BLOCKSIZE / 4];
56
}
57
mbedtls_aria_context;
58
59
#else /* MBEDTLS_ARIA_ALT */
60
#include "aria_alt.h"
61
#endif /* MBEDTLS_ARIA_ALT */
62
63
/**
64
* \brief This function initializes the specified ARIA context.
65
*
66
* It must be the first API called before using
67
* the context.
68
*
69
* \param ctx The ARIA context to initialize. This must not be \c NULL.
70
*/
71
void mbedtls_aria_init(mbedtls_aria_context *ctx);
72
73
/**
74
* \brief This function releases and clears the specified ARIA context.
75
*
76
* \param ctx The ARIA context to clear. This may be \c NULL, in which
77
* case this function returns immediately. If it is not \c NULL,
78
* it must point to an initialized ARIA context.
79
*/
80
void mbedtls_aria_free(mbedtls_aria_context *ctx);
81
82
/**
83
* \brief This function sets the encryption key.
84
*
85
* \param ctx The ARIA context to which the key should be bound.
86
* This must be initialized.
87
* \param key The encryption key. This must be a readable buffer
88
* of size \p keybits Bits.
89
* \param keybits The size of \p key in Bits. Valid options are:
90
* <ul><li>128 bits</li>
91
* <li>192 bits</li>
92
* <li>256 bits</li></ul>
93
*
94
* \return \c 0 on success.
95
* \return A negative error code on failure.
96
*/
97
int mbedtls_aria_setkey_enc(mbedtls_aria_context *ctx,
98
const unsigned char *key,
99
unsigned int keybits);
100
101
#if !defined(MBEDTLS_BLOCK_CIPHER_NO_DECRYPT)
102
/**
103
* \brief This function sets the decryption key.
104
*
105
* \param ctx The ARIA context to which the key should be bound.
106
* This must be initialized.
107
* \param key The decryption key. This must be a readable buffer
108
* of size \p keybits Bits.
109
* \param keybits The size of data passed. Valid options are:
110
* <ul><li>128 bits</li>
111
* <li>192 bits</li>
112
* <li>256 bits</li></ul>
113
*
114
* \return \c 0 on success.
115
* \return A negative error code on failure.
116
*/
117
int mbedtls_aria_setkey_dec(mbedtls_aria_context *ctx,
118
const unsigned char *key,
119
unsigned int keybits);
120
#endif /* !MBEDTLS_BLOCK_CIPHER_NO_DECRYPT */
121
122
/**
123
* \brief This function performs an ARIA single-block encryption or
124
* decryption operation.
125
*
126
* It performs encryption or decryption (depending on whether
127
* the key was set for encryption on decryption) on the input
128
* data buffer defined in the \p input parameter.
129
*
130
* mbedtls_aria_init(), and either mbedtls_aria_setkey_enc() or
131
* mbedtls_aria_setkey_dec() must be called before the first
132
* call to this API with the same context.
133
*
134
* \param ctx The ARIA context to use for encryption or decryption.
135
* This must be initialized and bound to a key.
136
* \param input The 16-Byte buffer holding the input data.
137
* \param output The 16-Byte buffer holding the output data.
138
139
* \return \c 0 on success.
140
* \return A negative error code on failure.
141
*/
142
int mbedtls_aria_crypt_ecb(mbedtls_aria_context *ctx,
143
const unsigned char input[MBEDTLS_ARIA_BLOCKSIZE],
144
unsigned char output[MBEDTLS_ARIA_BLOCKSIZE]);
145
146
#if defined(MBEDTLS_CIPHER_MODE_CBC)
147
/**
148
* \brief This function performs an ARIA-CBC encryption or decryption operation
149
* on full blocks.
150
*
151
* It performs the operation defined in the \p mode
152
* parameter (encrypt/decrypt), on the input data buffer defined in
153
* the \p input parameter.
154
*
155
* It can be called as many times as needed, until all the input
156
* data is processed. mbedtls_aria_init(), and either
157
* mbedtls_aria_setkey_enc() or mbedtls_aria_setkey_dec() must be called
158
* before the first call to this API with the same context.
159
*
160
* \note This function operates on aligned blocks, that is, the input size
161
* must be a multiple of the ARIA block size of 16 Bytes.
162
*
163
* \note Upon exit, the content of the IV is updated so that you can
164
* call the same function again on the next
165
* block(s) of data and get the same result as if it was
166
* encrypted in one call. This allows a "streaming" usage.
167
* If you need to retain the contents of the IV, you should
168
* either save it manually or use the cipher module instead.
169
*
170
*
171
* \param ctx The ARIA context to use for encryption or decryption.
172
* This must be initialized and bound to a key.
173
* \param mode The mode of operation. This must be either
174
* #MBEDTLS_ARIA_ENCRYPT for encryption, or
175
* #MBEDTLS_ARIA_DECRYPT for decryption.
176
* \param length The length of the input data in Bytes. This must be a
177
* multiple of the block size (16 Bytes).
178
* \param iv Initialization vector (updated after use).
179
* This must be a readable buffer of size 16 Bytes.
180
* \param input The buffer holding the input data. This must
181
* be a readable buffer of length \p length Bytes.
182
* \param output The buffer holding the output data. This must
183
* be a writable buffer of length \p length Bytes.
184
*
185
* \return \c 0 on success.
186
* \return A negative error code on failure.
187
*/
188
int mbedtls_aria_crypt_cbc(mbedtls_aria_context *ctx,
189
int mode,
190
size_t length,
191
unsigned char iv[MBEDTLS_ARIA_BLOCKSIZE],
192
const unsigned char *input,
193
unsigned char *output);
194
#endif /* MBEDTLS_CIPHER_MODE_CBC */
195
196
#if defined(MBEDTLS_CIPHER_MODE_CFB)
197
/**
198
* \brief This function performs an ARIA-CFB128 encryption or decryption
199
* operation.
200
*
201
* It performs the operation defined in the \p mode
202
* parameter (encrypt or decrypt), on the input data buffer
203
* defined in the \p input parameter.
204
*
205
* For CFB, you must set up the context with mbedtls_aria_setkey_enc(),
206
* regardless of whether you are performing an encryption or decryption
207
* operation, that is, regardless of the \p mode parameter. This is
208
* because CFB mode uses the same key schedule for encryption and
209
* decryption.
210
*
211
* \note Upon exit, the content of the IV is updated so that you can
212
* call the same function again on the next
213
* block(s) of data and get the same result as if it was
214
* encrypted in one call. This allows a "streaming" usage.
215
* If you need to retain the contents of the
216
* IV, you must either save it manually or use the cipher
217
* module instead.
218
*
219
*
220
* \param ctx The ARIA context to use for encryption or decryption.
221
* This must be initialized and bound to a key.
222
* \param mode The mode of operation. This must be either
223
* #MBEDTLS_ARIA_ENCRYPT for encryption, or
224
* #MBEDTLS_ARIA_DECRYPT for decryption.
225
* \param length The length of the input data \p input in Bytes.
226
* \param iv_off The offset in IV (updated after use).
227
* This must not be larger than 15.
228
* \param iv The initialization vector (updated after use).
229
* This must be a readable buffer of size 16 Bytes.
230
* \param input The buffer holding the input data. This must
231
* be a readable buffer of length \p length Bytes.
232
* \param output The buffer holding the output data. This must
233
* be a writable buffer of length \p length Bytes.
234
*
235
* \return \c 0 on success.
236
* \return A negative error code on failure.
237
*/
238
int mbedtls_aria_crypt_cfb128(mbedtls_aria_context *ctx,
239
int mode,
240
size_t length,
241
size_t *iv_off,
242
unsigned char iv[MBEDTLS_ARIA_BLOCKSIZE],
243
const unsigned char *input,
244
unsigned char *output);
245
#endif /* MBEDTLS_CIPHER_MODE_CFB */
246
247
#if defined(MBEDTLS_CIPHER_MODE_CTR)
248
/**
249
* \brief This function performs an ARIA-CTR encryption or decryption
250
* operation.
251
*
252
* Due to the nature of CTR, you must use the same key schedule
253
* for both encryption and decryption operations. Therefore, you
254
* must use the context initialized with mbedtls_aria_setkey_enc()
255
* for both #MBEDTLS_ARIA_ENCRYPT and #MBEDTLS_ARIA_DECRYPT.
256
*
257
* \warning You must never reuse a nonce value with the same key. Doing so
258
* would void the encryption for the two messages encrypted with
259
* the same nonce and key.
260
*
261
* There are two common strategies for managing nonces with CTR:
262
*
263
* 1. You can handle everything as a single message processed over
264
* successive calls to this function. In that case, you want to
265
* set \p nonce_counter and \p nc_off to 0 for the first call, and
266
* then preserve the values of \p nonce_counter, \p nc_off and \p
267
* stream_block across calls to this function as they will be
268
* updated by this function.
269
*
270
* With this strategy, you must not encrypt more than 2**128
271
* blocks of data with the same key.
272
*
273
* 2. You can encrypt separate messages by dividing the \p
274
* nonce_counter buffer in two areas: the first one used for a
275
* per-message nonce, handled by yourself, and the second one
276
* updated by this function internally.
277
*
278
* For example, you might reserve the first 12 bytes for the
279
* per-message nonce, and the last 4 bytes for internal use. In that
280
* case, before calling this function on a new message you need to
281
* set the first 12 bytes of \p nonce_counter to your chosen nonce
282
* value, the last 4 to 0, and \p nc_off to 0 (which will cause \p
283
* stream_block to be ignored). That way, you can encrypt at most
284
* 2**96 messages of up to 2**32 blocks each with the same key.
285
*
286
* The per-message nonce (or information sufficient to reconstruct
287
* it) needs to be communicated with the ciphertext and must be unique.
288
* The recommended way to ensure uniqueness is to use a message
289
* counter. An alternative is to generate random nonces, but this
290
* limits the number of messages that can be securely encrypted:
291
* for example, with 96-bit random nonces, you should not encrypt
292
* more than 2**32 messages with the same key.
293
*
294
* Note that for both strategies, sizes are measured in blocks and
295
* that an ARIA block is 16 bytes.
296
*
297
* \warning Upon return, \p stream_block contains sensitive data. Its
298
* content must not be written to insecure storage and should be
299
* securely discarded as soon as it's no longer needed.
300
*
301
* \param ctx The ARIA context to use for encryption or decryption.
302
* This must be initialized and bound to a key.
303
* \param length The length of the input data \p input in Bytes.
304
* \param nc_off The offset in Bytes in the current \p stream_block,
305
* for resuming within the current cipher stream. The
306
* offset pointer should be \c 0 at the start of a
307
* stream. This must not be larger than \c 15 Bytes.
308
* \param nonce_counter The 128-bit nonce and counter. This must point to
309
* a read/write buffer of length \c 16 bytes.
310
* \param stream_block The saved stream block for resuming. This must
311
* point to a read/write buffer of length \c 16 bytes.
312
* This is overwritten by the function.
313
* \param input The buffer holding the input data. This must
314
* be a readable buffer of length \p length Bytes.
315
* \param output The buffer holding the output data. This must
316
* be a writable buffer of length \p length Bytes.
317
*
318
* \return \c 0 on success.
319
* \return A negative error code on failure.
320
*/
321
int mbedtls_aria_crypt_ctr(mbedtls_aria_context *ctx,
322
size_t length,
323
size_t *nc_off,
324
unsigned char nonce_counter[MBEDTLS_ARIA_BLOCKSIZE],
325
unsigned char stream_block[MBEDTLS_ARIA_BLOCKSIZE],
326
const unsigned char *input,
327
unsigned char *output);
328
#endif /* MBEDTLS_CIPHER_MODE_CTR */
329
330
#if defined(MBEDTLS_SELF_TEST)
331
/**
332
* \brief Checkup routine.
333
*
334
* \return \c 0 on success, or \c 1 on failure.
335
*/
336
int mbedtls_aria_self_test(int verbose);
337
#endif /* MBEDTLS_SELF_TEST */
338
339
#ifdef __cplusplus
340
}
341
#endif
342
343
#endif /* aria.h */
344
345