@@ -42,18 +42,18 @@ int mbedtls_ccm_setkey( mbedtls_ccm_context *ctx,
42
42
unsigned int keybits )
43
43
{
44
44
if ( ctx == NULL )
45
- return ( MBEDTLS_ERR_CCM_BAD_INPUT );
45
+ return ( MBEDTLS_ERR_CCM_BAD_INPUT );
46
46
47
47
if ( cipher != MBEDTLS_CIPHER_ID_AES ||
48
48
keybits != 128 )
49
49
{
50
- return ( MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED );
50
+ return ( MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED );
51
51
}
52
52
53
53
memcpy ( ctx -> cipher_key , key , keybits / 8 );
54
- ctx -> keySize_ID = CRYS_AES_Key128BitSize ;
54
+ ctx -> key_size = CRYS_AES_Key128BitSize ;
55
55
56
- return ( 0 );
56
+ return ( 0 );
57
57
58
58
}
59
59
@@ -62,52 +62,55 @@ int mbedtls_ccm_setkey( mbedtls_ccm_context *ctx,
62
62
*/
63
63
64
64
int mbedtls_ccm_encrypt_and_tag ( mbedtls_ccm_context * ctx , size_t length ,
65
- const unsigned char * iv , size_t iv_len ,
66
- const unsigned char * add , size_t add_len ,
67
- const unsigned char * input , unsigned char * output ,
68
- unsigned char * tag , size_t tag_len )
65
+ const unsigned char * iv , size_t iv_len ,
66
+ const unsigned char * add , size_t add_len ,
67
+ const unsigned char * input ,
68
+ unsigned char * output ,
69
+ unsigned char * tag , size_t tag_len )
69
70
70
71
{
71
- CRYSError_t CrysRet = CRYS_OK ;
72
- CRYS_AESCCM_Mac_Res_t CC_Mac_Res = { 0 };
72
+ CRYSError_t crys_ret = CRYS_OK ;
73
+ CRYS_AESCCM_Mac_Res_t cc_mac_res = { 0 };
73
74
int ret = 0 ;
74
75
/*
75
76
* Check length requirements: SP800-38C A.1
76
77
* Additional requirement: a < 2^16 - 2^8 to simplify the code.
77
78
* 'length' checked later (when writing it to the first block)
78
79
*/
79
80
if ( tag_len < 4 || tag_len > 16 || tag_len % 2 != 0 )
80
- return ( MBEDTLS_ERR_CCM_BAD_INPUT );
81
+ return ( MBEDTLS_ERR_CCM_BAD_INPUT );
81
82
82
- if ( tag_len > sizeof ( CC_Mac_Res ) )
83
- return ( MBEDTLS_ERR_CCM_BAD_INPUT );
83
+ if ( tag_len > sizeof ( cc_mac_res ) )
84
+ return ( MBEDTLS_ERR_CCM_BAD_INPUT );
84
85
85
86
/* Also implies q is within bounds */
86
87
if ( iv_len < 7 || iv_len > 13 )
87
- return ( MBEDTLS_ERR_CCM_BAD_INPUT );
88
+ return ( MBEDTLS_ERR_CCM_BAD_INPUT );
88
89
89
90
#if SIZE_MAX > UINT_MAX
90
91
if ( length > 0xFFFFFFFF || add_len > 0xFFFFFFFF )
91
- return ( MBEDTLS_ERR_CCM_BAD_INPUT );
92
+ return ( MBEDTLS_ERR_CCM_BAD_INPUT );
92
93
#endif
93
94
94
- CrysRet = CRYS_AESCCM ( SASI_AES_ENCRYPT , ctx -> cipher_key , ctx -> keySize_ID , (uint8_t * )iv , iv_len ,
95
- (uint8_t * )add , add_len , (uint8_t * )input , length , output , tag_len , CC_Mac_Res );
96
- if ( CrysRet == CRYS_AESCCM_ILLEGAL_PARAMETER_SIZE_ERROR )
95
+ crys_ret = CRYS_AESCCM ( SASI_AES_ENCRYPT , ctx -> cipher_key , ctx -> key_size ,
96
+ (uint8_t * )iv , iv_len , (uint8_t * )add , add_len ,
97
+ (uint8_t * )input , length , output , tag_len ,
98
+ cc_mac_res );
99
+ if ( crys_ret == CRYS_AESCCM_ILLEGAL_PARAMETER_SIZE_ERROR )
97
100
{
98
- ret = MBEDTLS_ERR_CCM_BAD_INPUT ;
99
- goto exit ;
101
+ ret = MBEDTLS_ERR_CCM_BAD_INPUT ;
102
+ goto exit ;
100
103
}
101
- else if ( CrysRet != CRYS_OK )
104
+ else if ( crys_ret != CRYS_OK )
102
105
{
103
106
ret = MBEDTLS_ERR_PLATFORM_HW_ACCEL_FAILED ;
104
107
goto exit ;
105
108
}
106
109
107
- memcpy ( tag , CC_Mac_Res , tag_len );
110
+ memcpy ( tag , cc_mac_res , tag_len );
108
111
109
112
exit :
110
- return ( ret );
113
+ return ( ret );
111
114
112
115
}
113
116
@@ -121,28 +124,30 @@ int mbedtls_ccm_auth_decrypt( mbedtls_ccm_context *ctx, size_t length,
121
124
const unsigned char * tag , size_t tag_len )
122
125
123
126
{
124
- CRYSError_t CrysRet = CRYS_OK ;
127
+ CRYSError_t crys_ret = CRYS_OK ;
125
128
int ret = 0 ;
126
129
/*
127
130
* Check length requirements: SP800-38C A.1
128
131
* Additional requirement: a < 2^16 - 2^8 to simplify the code.
129
132
* 'length' checked later (when writing it to the first block)
130
133
*/
131
134
if ( tag_len < 4 || tag_len > 16 || tag_len % 2 != 0 )
132
- return ( MBEDTLS_ERR_CCM_BAD_INPUT );
135
+ return ( MBEDTLS_ERR_CCM_BAD_INPUT );
133
136
134
137
/* Also implies q is within bounds */
135
138
if ( iv_len < 7 || iv_len > 13 )
136
- return ( MBEDTLS_ERR_CCM_BAD_INPUT );
139
+ return ( MBEDTLS_ERR_CCM_BAD_INPUT );
137
140
138
141
#if SIZE_MAX > UINT_MAX
139
142
if ( length > 0xFFFFFFFF || add_len > 0xFFFFFFFF )
140
- return ( MBEDTLS_ERR_CCM_BAD_INPUT );
143
+ return ( MBEDTLS_ERR_CCM_BAD_INPUT );
141
144
#endif
142
145
143
- CrysRet = CRYS_AESCCM ( SASI_AES_DECRYPT , ctx -> cipher_key , ctx -> keySize_ID ,(uint8_t * )iv , iv_len ,
144
- (uint8_t * )add , add_len , (uint8_t * )input , length , output , tag_len , (uint8_t * )tag );
145
- if ( CrysRet == CRYS_AESCCM_ILLEGAL_PARAMETER_SIZE_ERROR )
146
+ crys_ret = CRYS_AESCCM ( SASI_AES_DECRYPT , ctx -> cipher_key , ctx -> key_size ,
147
+ (uint8_t * )iv , iv_len , (uint8_t * )add , add_len ,
148
+ (uint8_t * )input , length , output , tag_len ,
149
+ (uint8_t * )tag );
150
+ if ( crys_ret == CRYS_AESCCM_ILLEGAL_PARAMETER_SIZE_ERROR )
146
151
{
147
152
/*
148
153
* When CRYS_AESCCM_ILLEGAL_PARAMETER_SIZE_ERROR is returned,
@@ -151,9 +156,9 @@ int mbedtls_ccm_auth_decrypt( mbedtls_ccm_context *ctx, size_t length,
151
156
* returning this error code, and we don't want to overflow
152
157
* the output buffer.
153
158
*/
154
- return ( MBEDTLS_ERR_CCM_BAD_INPUT );
159
+ return ( MBEDTLS_ERR_CCM_BAD_INPUT );
155
160
}
156
- else if ( CrysRet == CRYS_FATAL_ERROR )
161
+ else if ( crys_ret == CRYS_FATAL_ERROR )
157
162
{
158
163
/*
159
164
* Unfortunately, Crys AESCCM returns CRYS_FATAL_ERROR when
@@ -162,7 +167,7 @@ int mbedtls_ccm_auth_decrypt( mbedtls_ccm_context *ctx, size_t length,
162
167
ret = MBEDTLS_ERR_CCM_AUTH_FAILED ;
163
168
goto exit ;
164
169
}
165
- else if ( CrysRet != CRYS_OK )
170
+ else if ( crys_ret != CRYS_OK )
166
171
{
167
172
ret = MBEDTLS_ERR_PLATFORM_HW_ACCEL_FAILED ;
168
173
goto exit ;
@@ -176,24 +181,23 @@ int mbedtls_ccm_auth_decrypt( mbedtls_ccm_context *ctx, size_t length,
176
181
}
177
182
178
183
int mbedtls_ccm_star_encrypt_and_tag ( mbedtls_ccm_context * ctx , size_t length ,
179
- const unsigned char * iv , size_t iv_len ,
180
- const unsigned char * add , size_t add_len ,
181
- const unsigned char * input , unsigned char * output ,
182
- unsigned char * tag , size_t tag_len )
184
+ const unsigned char * iv , size_t iv_len ,
185
+ const unsigned char * add , size_t add_len ,
186
+ const unsigned char * input ,
187
+ unsigned char * output ,
188
+ unsigned char * tag , size_t tag_len )
183
189
{
184
-
185
190
return ( MBEDTLS_ERR_AES_FEATURE_UNAVAILABLE );
186
-
187
191
}
188
192
189
193
int mbedtls_ccm_star_auth_decrypt ( mbedtls_ccm_context * ctx , size_t length ,
190
- const unsigned char * iv , size_t iv_len ,
191
- const unsigned char * add , size_t add_len ,
192
- const unsigned char * input , unsigned char * output ,
193
- const unsigned char * tag , size_t tag_len )
194
+ const unsigned char * iv , size_t iv_len ,
195
+ const unsigned char * add , size_t add_len ,
196
+ const unsigned char * input ,
197
+ unsigned char * output ,
198
+ const unsigned char * tag , size_t tag_len )
194
199
{
195
200
return ( MBEDTLS_ERR_AES_FEATURE_UNAVAILABLE );
196
-
197
201
}
198
202
199
203
#endif
0 commit comments