aria.c 37 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047
  1. /*
  2. * ARIA implementation
  3. *
  4. * Copyright The Mbed TLS Contributors
  5. * SPDX-License-Identifier: Apache-2.0
  6. *
  7. * Licensed under the Apache License, Version 2.0 (the "License"); you may
  8. * not use this file except in compliance with the License.
  9. * You may obtain a copy of the License at
  10. *
  11. * http://www.apache.org/licenses/LICENSE-2.0
  12. *
  13. * Unless required by applicable law or agreed to in writing, software
  14. * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
  15. * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  16. * See the License for the specific language governing permissions and
  17. * limitations under the License.
  18. */
  19. /*
  20. * This implementation is based on the following standards:
  21. * [1] http://210.104.33.10/ARIA/doc/ARIA-specification-e.pdf
  22. * [2] https://tools.ietf.org/html/rfc5794
  23. */
  24. #include "common.h"
  25. #if defined(MBEDTLS_ARIA_C)
  26. #include "mbedtls/aria.h"
  27. #include <string.h>
  28. #include "mbedtls/platform.h"
  29. #if !defined(MBEDTLS_ARIA_ALT)
  30. #include "mbedtls/platform_util.h"
  31. /* Parameter validation macros */
  32. #define ARIA_VALIDATE_RET(cond) \
  33. MBEDTLS_INTERNAL_VALIDATE_RET(cond, MBEDTLS_ERR_ARIA_BAD_INPUT_DATA)
  34. #define ARIA_VALIDATE(cond) \
  35. MBEDTLS_INTERNAL_VALIDATE(cond)
  36. /*
  37. * modify byte order: ( A B C D ) -> ( B A D C ), i.e. swap pairs of bytes
  38. *
  39. * This is submatrix P1 in [1] Appendix B.1
  40. *
  41. * Common compilers fail to translate this to minimal number of instructions,
  42. * so let's provide asm versions for common platforms with C fallback.
  43. */
  44. #if defined(MBEDTLS_HAVE_ASM)
  45. #if defined(__arm__) /* rev16 available from v6 up */
  46. /* armcc5 --gnu defines __GNUC__ but doesn't support GNU's extended asm */
  47. #if defined(__GNUC__) && \
  48. (!defined(__ARMCC_VERSION) || __ARMCC_VERSION >= 6000000) && \
  49. __ARM_ARCH >= 6
  50. static inline uint32_t aria_p1(uint32_t x)
  51. {
  52. uint32_t r;
  53. __asm("rev16 %0, %1" : "=l" (r) : "l" (x));
  54. return r;
  55. }
  56. #define ARIA_P1 aria_p1
  57. #elif defined(__ARMCC_VERSION) && __ARMCC_VERSION < 6000000 && \
  58. (__TARGET_ARCH_ARM >= 6 || __TARGET_ARCH_THUMB >= 3)
  59. static inline uint32_t aria_p1(uint32_t x)
  60. {
  61. uint32_t r;
  62. __asm("rev16 r, x");
  63. return r;
  64. }
  65. #define ARIA_P1 aria_p1
  66. #endif
  67. #endif /* arm */
  68. #if defined(__GNUC__) && \
  69. defined(__i386__) || defined(__amd64__) || defined(__x86_64__)
  70. /* I couldn't find an Intel equivalent of rev16, so two instructions */
  71. #define ARIA_P1(x) ARIA_P2(ARIA_P3(x))
  72. #endif /* x86 gnuc */
  73. #endif /* MBEDTLS_HAVE_ASM && GNUC */
  74. #if !defined(ARIA_P1)
  75. #define ARIA_P1(x) ((((x) >> 8) & 0x00FF00FF) ^ (((x) & 0x00FF00FF) << 8))
  76. #endif
  77. /*
  78. * modify byte order: ( A B C D ) -> ( C D A B ), i.e. rotate by 16 bits
  79. *
  80. * This is submatrix P2 in [1] Appendix B.1
  81. *
  82. * Common compilers will translate this to a single instruction.
  83. */
  84. #define ARIA_P2(x) (((x) >> 16) ^ ((x) << 16))
  85. /*
  86. * modify byte order: ( A B C D ) -> ( D C B A ), i.e. change endianness
  87. *
  88. * This is submatrix P3 in [1] Appendix B.1
  89. *
  90. * Some compilers fail to translate this to a single instruction,
  91. * so let's provide asm versions for common platforms with C fallback.
  92. */
  93. #if defined(MBEDTLS_HAVE_ASM)
  94. #if defined(__arm__) /* rev available from v6 up */
  95. /* armcc5 --gnu defines __GNUC__ but doesn't support GNU's extended asm */
  96. #if defined(__GNUC__) && \
  97. (!defined(__ARMCC_VERSION) || __ARMCC_VERSION >= 6000000) && \
  98. __ARM_ARCH >= 6
  99. static inline uint32_t aria_p3(uint32_t x)
  100. {
  101. uint32_t r;
  102. __asm("rev %0, %1" : "=l" (r) : "l" (x));
  103. return r;
  104. }
  105. #define ARIA_P3 aria_p3
  106. #elif defined(__ARMCC_VERSION) && __ARMCC_VERSION < 6000000 && \
  107. (__TARGET_ARCH_ARM >= 6 || __TARGET_ARCH_THUMB >= 3)
  108. static inline uint32_t aria_p3(uint32_t x)
  109. {
  110. uint32_t r;
  111. __asm("rev r, x");
  112. return r;
  113. }
  114. #define ARIA_P3 aria_p3
  115. #endif
  116. #endif /* arm */
  117. #if defined(__GNUC__) && \
  118. defined(__i386__) || defined(__amd64__) || defined(__x86_64__)
  119. static inline uint32_t aria_p3(uint32_t x)
  120. {
  121. __asm("bswap %0" : "=r" (x) : "0" (x));
  122. return x;
  123. }
  124. #define ARIA_P3 aria_p3
  125. #endif /* x86 gnuc */
  126. #endif /* MBEDTLS_HAVE_ASM && GNUC */
  127. #if !defined(ARIA_P3)
  128. #define ARIA_P3(x) ARIA_P2(ARIA_P1(x))
  129. #endif
  130. /*
  131. * ARIA Affine Transform
  132. * (a, b, c, d) = state in/out
  133. *
  134. * If we denote the first byte of input by 0, ..., the last byte by f,
  135. * then inputs are: a = 0123, b = 4567, c = 89ab, d = cdef.
  136. *
  137. * Reading [1] 2.4 or [2] 2.4.3 in columns and performing simple
  138. * rearrangements on adjacent pairs, output is:
  139. *
  140. * a = 3210 + 4545 + 6767 + 88aa + 99bb + dccd + effe
  141. * = 3210 + 4567 + 6745 + 89ab + 98ba + dcfe + efcd
  142. * b = 0101 + 2323 + 5476 + 8998 + baab + eecc + ffdd
  143. * = 0123 + 2301 + 5476 + 89ab + ba98 + efcd + fedc
  144. * c = 0022 + 1133 + 4554 + 7667 + ab89 + dcdc + fefe
  145. * = 0123 + 1032 + 4567 + 7654 + ab89 + dcfe + fedc
  146. * d = 1001 + 2332 + 6644 + 7755 + 9898 + baba + cdef
  147. * = 1032 + 2301 + 6745 + 7654 + 98ba + ba98 + cdef
  148. *
  149. * Note: another presentation of the A transform can be found as the first
  150. * half of App. B.1 in [1] in terms of 4-byte operators P1, P2, P3 and P4.
  151. * The implementation below uses only P1 and P2 as they are sufficient.
  152. */
  153. static inline void aria_a(uint32_t *a, uint32_t *b,
  154. uint32_t *c, uint32_t *d)
  155. {
  156. uint32_t ta, tb, tc;
  157. ta = *b; // 4567
  158. *b = *a; // 0123
  159. *a = ARIA_P2(ta); // 6745
  160. tb = ARIA_P2(*d); // efcd
  161. *d = ARIA_P1(*c); // 98ba
  162. *c = ARIA_P1(tb); // fedc
  163. ta ^= *d; // 4567+98ba
  164. tc = ARIA_P2(*b); // 2301
  165. ta = ARIA_P1(ta) ^ tc ^ *c; // 2301+5476+89ab+fedc
  166. tb ^= ARIA_P2(*d); // ba98+efcd
  167. tc ^= ARIA_P1(*a); // 2301+7654
  168. *b ^= ta ^ tb; // 0123+2301+5476+89ab+ba98+efcd+fedc OUT
  169. tb = ARIA_P2(tb) ^ ta; // 2301+5476+89ab+98ba+cdef+fedc
  170. *a ^= ARIA_P1(tb); // 3210+4567+6745+89ab+98ba+dcfe+efcd OUT
  171. ta = ARIA_P2(ta); // 0123+7654+ab89+dcfe
  172. *d ^= ARIA_P1(ta) ^ tc; // 1032+2301+6745+7654+98ba+ba98+cdef OUT
  173. tc = ARIA_P2(tc); // 0123+5476
  174. *c ^= ARIA_P1(tc) ^ ta; // 0123+1032+4567+7654+ab89+dcfe+fedc OUT
  175. }
  176. /*
  177. * ARIA Substitution Layer SL1 / SL2
  178. * (a, b, c, d) = state in/out
  179. * (sa, sb, sc, sd) = 256 8-bit S-Boxes (see below)
  180. *
  181. * By passing sb1, sb2, is1, is2 as S-Boxes you get SL1
  182. * By passing is1, is2, sb1, sb2 as S-Boxes you get SL2
  183. */
  184. static inline void aria_sl(uint32_t *a, uint32_t *b,
  185. uint32_t *c, uint32_t *d,
  186. const uint8_t sa[256], const uint8_t sb[256],
  187. const uint8_t sc[256], const uint8_t sd[256])
  188. {
  189. *a = ((uint32_t) sa[MBEDTLS_BYTE_0(*a)]) ^
  190. (((uint32_t) sb[MBEDTLS_BYTE_1(*a)]) << 8) ^
  191. (((uint32_t) sc[MBEDTLS_BYTE_2(*a)]) << 16) ^
  192. (((uint32_t) sd[MBEDTLS_BYTE_3(*a)]) << 24);
  193. *b = ((uint32_t) sa[MBEDTLS_BYTE_0(*b)]) ^
  194. (((uint32_t) sb[MBEDTLS_BYTE_1(*b)]) << 8) ^
  195. (((uint32_t) sc[MBEDTLS_BYTE_2(*b)]) << 16) ^
  196. (((uint32_t) sd[MBEDTLS_BYTE_3(*b)]) << 24);
  197. *c = ((uint32_t) sa[MBEDTLS_BYTE_0(*c)]) ^
  198. (((uint32_t) sb[MBEDTLS_BYTE_1(*c)]) << 8) ^
  199. (((uint32_t) sc[MBEDTLS_BYTE_2(*c)]) << 16) ^
  200. (((uint32_t) sd[MBEDTLS_BYTE_3(*c)]) << 24);
  201. *d = ((uint32_t) sa[MBEDTLS_BYTE_0(*d)]) ^
  202. (((uint32_t) sb[MBEDTLS_BYTE_1(*d)]) << 8) ^
  203. (((uint32_t) sc[MBEDTLS_BYTE_2(*d)]) << 16) ^
  204. (((uint32_t) sd[MBEDTLS_BYTE_3(*d)]) << 24);
  205. }
  206. /*
  207. * S-Boxes
  208. */
  209. static const uint8_t aria_sb1[256] =
  210. {
  211. 0x63, 0x7C, 0x77, 0x7B, 0xF2, 0x6B, 0x6F, 0xC5, 0x30, 0x01, 0x67, 0x2B,
  212. 0xFE, 0xD7, 0xAB, 0x76, 0xCA, 0x82, 0xC9, 0x7D, 0xFA, 0x59, 0x47, 0xF0,
  213. 0xAD, 0xD4, 0xA2, 0xAF, 0x9C, 0xA4, 0x72, 0xC0, 0xB7, 0xFD, 0x93, 0x26,
  214. 0x36, 0x3F, 0xF7, 0xCC, 0x34, 0xA5, 0xE5, 0xF1, 0x71, 0xD8, 0x31, 0x15,
  215. 0x04, 0xC7, 0x23, 0xC3, 0x18, 0x96, 0x05, 0x9A, 0x07, 0x12, 0x80, 0xE2,
  216. 0xEB, 0x27, 0xB2, 0x75, 0x09, 0x83, 0x2C, 0x1A, 0x1B, 0x6E, 0x5A, 0xA0,
  217. 0x52, 0x3B, 0xD6, 0xB3, 0x29, 0xE3, 0x2F, 0x84, 0x53, 0xD1, 0x00, 0xED,
  218. 0x20, 0xFC, 0xB1, 0x5B, 0x6A, 0xCB, 0xBE, 0x39, 0x4A, 0x4C, 0x58, 0xCF,
  219. 0xD0, 0xEF, 0xAA, 0xFB, 0x43, 0x4D, 0x33, 0x85, 0x45, 0xF9, 0x02, 0x7F,
  220. 0x50, 0x3C, 0x9F, 0xA8, 0x51, 0xA3, 0x40, 0x8F, 0x92, 0x9D, 0x38, 0xF5,
  221. 0xBC, 0xB6, 0xDA, 0x21, 0x10, 0xFF, 0xF3, 0xD2, 0xCD, 0x0C, 0x13, 0xEC,
  222. 0x5F, 0x97, 0x44, 0x17, 0xC4, 0xA7, 0x7E, 0x3D, 0x64, 0x5D, 0x19, 0x73,
  223. 0x60, 0x81, 0x4F, 0xDC, 0x22, 0x2A, 0x90, 0x88, 0x46, 0xEE, 0xB8, 0x14,
  224. 0xDE, 0x5E, 0x0B, 0xDB, 0xE0, 0x32, 0x3A, 0x0A, 0x49, 0x06, 0x24, 0x5C,
  225. 0xC2, 0xD3, 0xAC, 0x62, 0x91, 0x95, 0xE4, 0x79, 0xE7, 0xC8, 0x37, 0x6D,
  226. 0x8D, 0xD5, 0x4E, 0xA9, 0x6C, 0x56, 0xF4, 0xEA, 0x65, 0x7A, 0xAE, 0x08,
  227. 0xBA, 0x78, 0x25, 0x2E, 0x1C, 0xA6, 0xB4, 0xC6, 0xE8, 0xDD, 0x74, 0x1F,
  228. 0x4B, 0xBD, 0x8B, 0x8A, 0x70, 0x3E, 0xB5, 0x66, 0x48, 0x03, 0xF6, 0x0E,
  229. 0x61, 0x35, 0x57, 0xB9, 0x86, 0xC1, 0x1D, 0x9E, 0xE1, 0xF8, 0x98, 0x11,
  230. 0x69, 0xD9, 0x8E, 0x94, 0x9B, 0x1E, 0x87, 0xE9, 0xCE, 0x55, 0x28, 0xDF,
  231. 0x8C, 0xA1, 0x89, 0x0D, 0xBF, 0xE6, 0x42, 0x68, 0x41, 0x99, 0x2D, 0x0F,
  232. 0xB0, 0x54, 0xBB, 0x16
  233. };
  234. static const uint8_t aria_sb2[256] =
  235. {
  236. 0xE2, 0x4E, 0x54, 0xFC, 0x94, 0xC2, 0x4A, 0xCC, 0x62, 0x0D, 0x6A, 0x46,
  237. 0x3C, 0x4D, 0x8B, 0xD1, 0x5E, 0xFA, 0x64, 0xCB, 0xB4, 0x97, 0xBE, 0x2B,
  238. 0xBC, 0x77, 0x2E, 0x03, 0xD3, 0x19, 0x59, 0xC1, 0x1D, 0x06, 0x41, 0x6B,
  239. 0x55, 0xF0, 0x99, 0x69, 0xEA, 0x9C, 0x18, 0xAE, 0x63, 0xDF, 0xE7, 0xBB,
  240. 0x00, 0x73, 0x66, 0xFB, 0x96, 0x4C, 0x85, 0xE4, 0x3A, 0x09, 0x45, 0xAA,
  241. 0x0F, 0xEE, 0x10, 0xEB, 0x2D, 0x7F, 0xF4, 0x29, 0xAC, 0xCF, 0xAD, 0x91,
  242. 0x8D, 0x78, 0xC8, 0x95, 0xF9, 0x2F, 0xCE, 0xCD, 0x08, 0x7A, 0x88, 0x38,
  243. 0x5C, 0x83, 0x2A, 0x28, 0x47, 0xDB, 0xB8, 0xC7, 0x93, 0xA4, 0x12, 0x53,
  244. 0xFF, 0x87, 0x0E, 0x31, 0x36, 0x21, 0x58, 0x48, 0x01, 0x8E, 0x37, 0x74,
  245. 0x32, 0xCA, 0xE9, 0xB1, 0xB7, 0xAB, 0x0C, 0xD7, 0xC4, 0x56, 0x42, 0x26,
  246. 0x07, 0x98, 0x60, 0xD9, 0xB6, 0xB9, 0x11, 0x40, 0xEC, 0x20, 0x8C, 0xBD,
  247. 0xA0, 0xC9, 0x84, 0x04, 0x49, 0x23, 0xF1, 0x4F, 0x50, 0x1F, 0x13, 0xDC,
  248. 0xD8, 0xC0, 0x9E, 0x57, 0xE3, 0xC3, 0x7B, 0x65, 0x3B, 0x02, 0x8F, 0x3E,
  249. 0xE8, 0x25, 0x92, 0xE5, 0x15, 0xDD, 0xFD, 0x17, 0xA9, 0xBF, 0xD4, 0x9A,
  250. 0x7E, 0xC5, 0x39, 0x67, 0xFE, 0x76, 0x9D, 0x43, 0xA7, 0xE1, 0xD0, 0xF5,
  251. 0x68, 0xF2, 0x1B, 0x34, 0x70, 0x05, 0xA3, 0x8A, 0xD5, 0x79, 0x86, 0xA8,
  252. 0x30, 0xC6, 0x51, 0x4B, 0x1E, 0xA6, 0x27, 0xF6, 0x35, 0xD2, 0x6E, 0x24,
  253. 0x16, 0x82, 0x5F, 0xDA, 0xE6, 0x75, 0xA2, 0xEF, 0x2C, 0xB2, 0x1C, 0x9F,
  254. 0x5D, 0x6F, 0x80, 0x0A, 0x72, 0x44, 0x9B, 0x6C, 0x90, 0x0B, 0x5B, 0x33,
  255. 0x7D, 0x5A, 0x52, 0xF3, 0x61, 0xA1, 0xF7, 0xB0, 0xD6, 0x3F, 0x7C, 0x6D,
  256. 0xED, 0x14, 0xE0, 0xA5, 0x3D, 0x22, 0xB3, 0xF8, 0x89, 0xDE, 0x71, 0x1A,
  257. 0xAF, 0xBA, 0xB5, 0x81
  258. };
  259. static const uint8_t aria_is1[256] =
  260. {
  261. 0x52, 0x09, 0x6A, 0xD5, 0x30, 0x36, 0xA5, 0x38, 0xBF, 0x40, 0xA3, 0x9E,
  262. 0x81, 0xF3, 0xD7, 0xFB, 0x7C, 0xE3, 0x39, 0x82, 0x9B, 0x2F, 0xFF, 0x87,
  263. 0x34, 0x8E, 0x43, 0x44, 0xC4, 0xDE, 0xE9, 0xCB, 0x54, 0x7B, 0x94, 0x32,
  264. 0xA6, 0xC2, 0x23, 0x3D, 0xEE, 0x4C, 0x95, 0x0B, 0x42, 0xFA, 0xC3, 0x4E,
  265. 0x08, 0x2E, 0xA1, 0x66, 0x28, 0xD9, 0x24, 0xB2, 0x76, 0x5B, 0xA2, 0x49,
  266. 0x6D, 0x8B, 0xD1, 0x25, 0x72, 0xF8, 0xF6, 0x64, 0x86, 0x68, 0x98, 0x16,
  267. 0xD4, 0xA4, 0x5C, 0xCC, 0x5D, 0x65, 0xB6, 0x92, 0x6C, 0x70, 0x48, 0x50,
  268. 0xFD, 0xED, 0xB9, 0xDA, 0x5E, 0x15, 0x46, 0x57, 0xA7, 0x8D, 0x9D, 0x84,
  269. 0x90, 0xD8, 0xAB, 0x00, 0x8C, 0xBC, 0xD3, 0x0A, 0xF7, 0xE4, 0x58, 0x05,
  270. 0xB8, 0xB3, 0x45, 0x06, 0xD0, 0x2C, 0x1E, 0x8F, 0xCA, 0x3F, 0x0F, 0x02,
  271. 0xC1, 0xAF, 0xBD, 0x03, 0x01, 0x13, 0x8A, 0x6B, 0x3A, 0x91, 0x11, 0x41,
  272. 0x4F, 0x67, 0xDC, 0xEA, 0x97, 0xF2, 0xCF, 0xCE, 0xF0, 0xB4, 0xE6, 0x73,
  273. 0x96, 0xAC, 0x74, 0x22, 0xE7, 0xAD, 0x35, 0x85, 0xE2, 0xF9, 0x37, 0xE8,
  274. 0x1C, 0x75, 0xDF, 0x6E, 0x47, 0xF1, 0x1A, 0x71, 0x1D, 0x29, 0xC5, 0x89,
  275. 0x6F, 0xB7, 0x62, 0x0E, 0xAA, 0x18, 0xBE, 0x1B, 0xFC, 0x56, 0x3E, 0x4B,
  276. 0xC6, 0xD2, 0x79, 0x20, 0x9A, 0xDB, 0xC0, 0xFE, 0x78, 0xCD, 0x5A, 0xF4,
  277. 0x1F, 0xDD, 0xA8, 0x33, 0x88, 0x07, 0xC7, 0x31, 0xB1, 0x12, 0x10, 0x59,
  278. 0x27, 0x80, 0xEC, 0x5F, 0x60, 0x51, 0x7F, 0xA9, 0x19, 0xB5, 0x4A, 0x0D,
  279. 0x2D, 0xE5, 0x7A, 0x9F, 0x93, 0xC9, 0x9C, 0xEF, 0xA0, 0xE0, 0x3B, 0x4D,
  280. 0xAE, 0x2A, 0xF5, 0xB0, 0xC8, 0xEB, 0xBB, 0x3C, 0x83, 0x53, 0x99, 0x61,
  281. 0x17, 0x2B, 0x04, 0x7E, 0xBA, 0x77, 0xD6, 0x26, 0xE1, 0x69, 0x14, 0x63,
  282. 0x55, 0x21, 0x0C, 0x7D
  283. };
  284. static const uint8_t aria_is2[256] =
  285. {
  286. 0x30, 0x68, 0x99, 0x1B, 0x87, 0xB9, 0x21, 0x78, 0x50, 0x39, 0xDB, 0xE1,
  287. 0x72, 0x09, 0x62, 0x3C, 0x3E, 0x7E, 0x5E, 0x8E, 0xF1, 0xA0, 0xCC, 0xA3,
  288. 0x2A, 0x1D, 0xFB, 0xB6, 0xD6, 0x20, 0xC4, 0x8D, 0x81, 0x65, 0xF5, 0x89,
  289. 0xCB, 0x9D, 0x77, 0xC6, 0x57, 0x43, 0x56, 0x17, 0xD4, 0x40, 0x1A, 0x4D,
  290. 0xC0, 0x63, 0x6C, 0xE3, 0xB7, 0xC8, 0x64, 0x6A, 0x53, 0xAA, 0x38, 0x98,
  291. 0x0C, 0xF4, 0x9B, 0xED, 0x7F, 0x22, 0x76, 0xAF, 0xDD, 0x3A, 0x0B, 0x58,
  292. 0x67, 0x88, 0x06, 0xC3, 0x35, 0x0D, 0x01, 0x8B, 0x8C, 0xC2, 0xE6, 0x5F,
  293. 0x02, 0x24, 0x75, 0x93, 0x66, 0x1E, 0xE5, 0xE2, 0x54, 0xD8, 0x10, 0xCE,
  294. 0x7A, 0xE8, 0x08, 0x2C, 0x12, 0x97, 0x32, 0xAB, 0xB4, 0x27, 0x0A, 0x23,
  295. 0xDF, 0xEF, 0xCA, 0xD9, 0xB8, 0xFA, 0xDC, 0x31, 0x6B, 0xD1, 0xAD, 0x19,
  296. 0x49, 0xBD, 0x51, 0x96, 0xEE, 0xE4, 0xA8, 0x41, 0xDA, 0xFF, 0xCD, 0x55,
  297. 0x86, 0x36, 0xBE, 0x61, 0x52, 0xF8, 0xBB, 0x0E, 0x82, 0x48, 0x69, 0x9A,
  298. 0xE0, 0x47, 0x9E, 0x5C, 0x04, 0x4B, 0x34, 0x15, 0x79, 0x26, 0xA7, 0xDE,
  299. 0x29, 0xAE, 0x92, 0xD7, 0x84, 0xE9, 0xD2, 0xBA, 0x5D, 0xF3, 0xC5, 0xB0,
  300. 0xBF, 0xA4, 0x3B, 0x71, 0x44, 0x46, 0x2B, 0xFC, 0xEB, 0x6F, 0xD5, 0xF6,
  301. 0x14, 0xFE, 0x7C, 0x70, 0x5A, 0x7D, 0xFD, 0x2F, 0x18, 0x83, 0x16, 0xA5,
  302. 0x91, 0x1F, 0x05, 0x95, 0x74, 0xA9, 0xC1, 0x5B, 0x4A, 0x85, 0x6D, 0x13,
  303. 0x07, 0x4F, 0x4E, 0x45, 0xB2, 0x0F, 0xC9, 0x1C, 0xA6, 0xBC, 0xEC, 0x73,
  304. 0x90, 0x7B, 0xCF, 0x59, 0x8F, 0xA1, 0xF9, 0x2D, 0xF2, 0xB1, 0x00, 0x94,
  305. 0x37, 0x9F, 0xD0, 0x2E, 0x9C, 0x6E, 0x28, 0x3F, 0x80, 0xF0, 0x3D, 0xD3,
  306. 0x25, 0x8A, 0xB5, 0xE7, 0x42, 0xB3, 0xC7, 0xEA, 0xF7, 0x4C, 0x11, 0x33,
  307. 0x03, 0xA2, 0xAC, 0x60
  308. };
  309. /*
  310. * Helper for key schedule: r = FO( p, k ) ^ x
  311. */
  312. static void aria_fo_xor(uint32_t r[4], const uint32_t p[4],
  313. const uint32_t k[4], const uint32_t x[4])
  314. {
  315. uint32_t a, b, c, d;
  316. a = p[0] ^ k[0];
  317. b = p[1] ^ k[1];
  318. c = p[2] ^ k[2];
  319. d = p[3] ^ k[3];
  320. aria_sl(&a, &b, &c, &d, aria_sb1, aria_sb2, aria_is1, aria_is2);
  321. aria_a(&a, &b, &c, &d);
  322. r[0] = a ^ x[0];
  323. r[1] = b ^ x[1];
  324. r[2] = c ^ x[2];
  325. r[3] = d ^ x[3];
  326. }
  327. /*
  328. * Helper for key schedule: r = FE( p, k ) ^ x
  329. */
  330. static void aria_fe_xor(uint32_t r[4], const uint32_t p[4],
  331. const uint32_t k[4], const uint32_t x[4])
  332. {
  333. uint32_t a, b, c, d;
  334. a = p[0] ^ k[0];
  335. b = p[1] ^ k[1];
  336. c = p[2] ^ k[2];
  337. d = p[3] ^ k[3];
  338. aria_sl(&a, &b, &c, &d, aria_is1, aria_is2, aria_sb1, aria_sb2);
  339. aria_a(&a, &b, &c, &d);
  340. r[0] = a ^ x[0];
  341. r[1] = b ^ x[1];
  342. r[2] = c ^ x[2];
  343. r[3] = d ^ x[3];
  344. }
  345. /*
  346. * Big endian 128-bit rotation: r = a ^ (b <<< n), used only in key setup.
  347. *
  348. * We chose to store bytes into 32-bit words in little-endian format (see
  349. * MBEDTLS_GET_UINT32_LE / MBEDTLS_PUT_UINT32_LE ) so we need to reverse
  350. * bytes here.
  351. */
  352. static void aria_rot128(uint32_t r[4], const uint32_t a[4],
  353. const uint32_t b[4], uint8_t n)
  354. {
  355. uint8_t i, j;
  356. uint32_t t, u;
  357. const uint8_t n1 = n % 32; // bit offset
  358. const uint8_t n2 = n1 ? 32 - n1 : 0; // reverse bit offset
  359. j = (n / 32) % 4; // initial word offset
  360. t = ARIA_P3(b[j]); // big endian
  361. for (i = 0; i < 4; i++) {
  362. j = (j + 1) % 4; // get next word, big endian
  363. u = ARIA_P3(b[j]);
  364. t <<= n1; // rotate
  365. t |= u >> n2;
  366. t = ARIA_P3(t); // back to little endian
  367. r[i] = a[i] ^ t; // store
  368. t = u; // move to next word
  369. }
  370. }
  371. /*
  372. * Set encryption key
  373. */
  374. int mbedtls_aria_setkey_enc(mbedtls_aria_context *ctx,
  375. const unsigned char *key, unsigned int keybits)
  376. {
  377. /* round constant masks */
  378. const uint32_t rc[3][4] =
  379. {
  380. { 0xB7C17C51, 0x940A2227, 0xE8AB13FE, 0xE06E9AFA },
  381. { 0xCC4AB16D, 0x20C8219E, 0xD5B128FF, 0xB0E25DEF },
  382. { 0x1D3792DB, 0x70E92621, 0x75972403, 0x0EC9E804 }
  383. };
  384. int i;
  385. uint32_t w[4][4], *w2;
  386. ARIA_VALIDATE_RET(ctx != NULL);
  387. ARIA_VALIDATE_RET(key != NULL);
  388. if (keybits != 128 && keybits != 192 && keybits != 256) {
  389. return MBEDTLS_ERR_ARIA_BAD_INPUT_DATA;
  390. }
  391. /* Copy key to W0 (and potential remainder to W1) */
  392. w[0][0] = MBEDTLS_GET_UINT32_LE(key, 0);
  393. w[0][1] = MBEDTLS_GET_UINT32_LE(key, 4);
  394. w[0][2] = MBEDTLS_GET_UINT32_LE(key, 8);
  395. w[0][3] = MBEDTLS_GET_UINT32_LE(key, 12);
  396. memset(w[1], 0, 16);
  397. if (keybits >= 192) {
  398. w[1][0] = MBEDTLS_GET_UINT32_LE(key, 16); // 192 bit key
  399. w[1][1] = MBEDTLS_GET_UINT32_LE(key, 20);
  400. }
  401. if (keybits == 256) {
  402. w[1][2] = MBEDTLS_GET_UINT32_LE(key, 24); // 256 bit key
  403. w[1][3] = MBEDTLS_GET_UINT32_LE(key, 28);
  404. }
  405. i = (keybits - 128) >> 6; // index: 0, 1, 2
  406. ctx->nr = 12 + 2 * i; // no. rounds: 12, 14, 16
  407. aria_fo_xor(w[1], w[0], rc[i], w[1]); // W1 = FO(W0, CK1) ^ KR
  408. i = i < 2 ? i + 1 : 0;
  409. aria_fe_xor(w[2], w[1], rc[i], w[0]); // W2 = FE(W1, CK2) ^ W0
  410. i = i < 2 ? i + 1 : 0;
  411. aria_fo_xor(w[3], w[2], rc[i], w[1]); // W3 = FO(W2, CK3) ^ W1
  412. for (i = 0; i < 4; i++) { // create round keys
  413. w2 = w[(i + 1) & 3];
  414. aria_rot128(ctx->rk[i], w[i], w2, 128 - 19);
  415. aria_rot128(ctx->rk[i + 4], w[i], w2, 128 - 31);
  416. aria_rot128(ctx->rk[i + 8], w[i], w2, 61);
  417. aria_rot128(ctx->rk[i + 12], w[i], w2, 31);
  418. }
  419. aria_rot128(ctx->rk[16], w[0], w[1], 19);
  420. /* w holds enough info to reconstruct the round keys */
  421. mbedtls_platform_zeroize(w, sizeof(w));
  422. return 0;
  423. }
  424. /*
  425. * Set decryption key
  426. */
  427. int mbedtls_aria_setkey_dec(mbedtls_aria_context *ctx,
  428. const unsigned char *key, unsigned int keybits)
  429. {
  430. int i, j, k, ret;
  431. ARIA_VALIDATE_RET(ctx != NULL);
  432. ARIA_VALIDATE_RET(key != NULL);
  433. ret = mbedtls_aria_setkey_enc(ctx, key, keybits);
  434. if (ret != 0) {
  435. return ret;
  436. }
  437. /* flip the order of round keys */
  438. for (i = 0, j = ctx->nr; i < j; i++, j--) {
  439. for (k = 0; k < 4; k++) {
  440. uint32_t t = ctx->rk[i][k];
  441. ctx->rk[i][k] = ctx->rk[j][k];
  442. ctx->rk[j][k] = t;
  443. }
  444. }
  445. /* apply affine transform to middle keys */
  446. for (i = 1; i < ctx->nr; i++) {
  447. aria_a(&ctx->rk[i][0], &ctx->rk[i][1],
  448. &ctx->rk[i][2], &ctx->rk[i][3]);
  449. }
  450. return 0;
  451. }
  452. /*
  453. * Encrypt a block
  454. */
  455. int mbedtls_aria_crypt_ecb(mbedtls_aria_context *ctx,
  456. const unsigned char input[MBEDTLS_ARIA_BLOCKSIZE],
  457. unsigned char output[MBEDTLS_ARIA_BLOCKSIZE])
  458. {
  459. int i;
  460. uint32_t a, b, c, d;
  461. ARIA_VALIDATE_RET(ctx != NULL);
  462. ARIA_VALIDATE_RET(input != NULL);
  463. ARIA_VALIDATE_RET(output != NULL);
  464. a = MBEDTLS_GET_UINT32_LE(input, 0);
  465. b = MBEDTLS_GET_UINT32_LE(input, 4);
  466. c = MBEDTLS_GET_UINT32_LE(input, 8);
  467. d = MBEDTLS_GET_UINT32_LE(input, 12);
  468. i = 0;
  469. while (1) {
  470. a ^= ctx->rk[i][0];
  471. b ^= ctx->rk[i][1];
  472. c ^= ctx->rk[i][2];
  473. d ^= ctx->rk[i][3];
  474. i++;
  475. aria_sl(&a, &b, &c, &d, aria_sb1, aria_sb2, aria_is1, aria_is2);
  476. aria_a(&a, &b, &c, &d);
  477. a ^= ctx->rk[i][0];
  478. b ^= ctx->rk[i][1];
  479. c ^= ctx->rk[i][2];
  480. d ^= ctx->rk[i][3];
  481. i++;
  482. aria_sl(&a, &b, &c, &d, aria_is1, aria_is2, aria_sb1, aria_sb2);
  483. if (i >= ctx->nr) {
  484. break;
  485. }
  486. aria_a(&a, &b, &c, &d);
  487. }
  488. /* final key mixing */
  489. a ^= ctx->rk[i][0];
  490. b ^= ctx->rk[i][1];
  491. c ^= ctx->rk[i][2];
  492. d ^= ctx->rk[i][3];
  493. MBEDTLS_PUT_UINT32_LE(a, output, 0);
  494. MBEDTLS_PUT_UINT32_LE(b, output, 4);
  495. MBEDTLS_PUT_UINT32_LE(c, output, 8);
  496. MBEDTLS_PUT_UINT32_LE(d, output, 12);
  497. return 0;
  498. }
  499. /* Initialize context */
  500. void mbedtls_aria_init(mbedtls_aria_context *ctx)
  501. {
  502. ARIA_VALIDATE(ctx != NULL);
  503. memset(ctx, 0, sizeof(mbedtls_aria_context));
  504. }
  505. /* Clear context */
  506. void mbedtls_aria_free(mbedtls_aria_context *ctx)
  507. {
  508. if (ctx == NULL) {
  509. return;
  510. }
  511. mbedtls_platform_zeroize(ctx, sizeof(mbedtls_aria_context));
  512. }
  513. #if defined(MBEDTLS_CIPHER_MODE_CBC)
  514. /*
  515. * ARIA-CBC buffer encryption/decryption
  516. */
  517. int mbedtls_aria_crypt_cbc(mbedtls_aria_context *ctx,
  518. int mode,
  519. size_t length,
  520. unsigned char iv[MBEDTLS_ARIA_BLOCKSIZE],
  521. const unsigned char *input,
  522. unsigned char *output)
  523. {
  524. int i;
  525. unsigned char temp[MBEDTLS_ARIA_BLOCKSIZE];
  526. ARIA_VALIDATE_RET(ctx != NULL);
  527. ARIA_VALIDATE_RET(mode == MBEDTLS_ARIA_ENCRYPT ||
  528. mode == MBEDTLS_ARIA_DECRYPT);
  529. ARIA_VALIDATE_RET(length == 0 || input != NULL);
  530. ARIA_VALIDATE_RET(length == 0 || output != NULL);
  531. ARIA_VALIDATE_RET(iv != NULL);
  532. if (length % MBEDTLS_ARIA_BLOCKSIZE) {
  533. return MBEDTLS_ERR_ARIA_INVALID_INPUT_LENGTH;
  534. }
  535. if (mode == MBEDTLS_ARIA_DECRYPT) {
  536. while (length > 0) {
  537. memcpy(temp, input, MBEDTLS_ARIA_BLOCKSIZE);
  538. mbedtls_aria_crypt_ecb(ctx, input, output);
  539. for (i = 0; i < MBEDTLS_ARIA_BLOCKSIZE; i++) {
  540. output[i] = (unsigned char) (output[i] ^ iv[i]);
  541. }
  542. memcpy(iv, temp, MBEDTLS_ARIA_BLOCKSIZE);
  543. input += MBEDTLS_ARIA_BLOCKSIZE;
  544. output += MBEDTLS_ARIA_BLOCKSIZE;
  545. length -= MBEDTLS_ARIA_BLOCKSIZE;
  546. }
  547. } else {
  548. while (length > 0) {
  549. for (i = 0; i < MBEDTLS_ARIA_BLOCKSIZE; i++) {
  550. output[i] = (unsigned char) (input[i] ^ iv[i]);
  551. }
  552. mbedtls_aria_crypt_ecb(ctx, output, output);
  553. memcpy(iv, output, MBEDTLS_ARIA_BLOCKSIZE);
  554. input += MBEDTLS_ARIA_BLOCKSIZE;
  555. output += MBEDTLS_ARIA_BLOCKSIZE;
  556. length -= MBEDTLS_ARIA_BLOCKSIZE;
  557. }
  558. }
  559. return 0;
  560. }
  561. #endif /* MBEDTLS_CIPHER_MODE_CBC */
  562. #if defined(MBEDTLS_CIPHER_MODE_CFB)
  563. /*
  564. * ARIA-CFB128 buffer encryption/decryption
  565. */
  566. int mbedtls_aria_crypt_cfb128(mbedtls_aria_context *ctx,
  567. int mode,
  568. size_t length,
  569. size_t *iv_off,
  570. unsigned char iv[MBEDTLS_ARIA_BLOCKSIZE],
  571. const unsigned char *input,
  572. unsigned char *output)
  573. {
  574. unsigned char c;
  575. size_t n;
  576. ARIA_VALIDATE_RET(ctx != NULL);
  577. ARIA_VALIDATE_RET(mode == MBEDTLS_ARIA_ENCRYPT ||
  578. mode == MBEDTLS_ARIA_DECRYPT);
  579. ARIA_VALIDATE_RET(length == 0 || input != NULL);
  580. ARIA_VALIDATE_RET(length == 0 || output != NULL);
  581. ARIA_VALIDATE_RET(iv != NULL);
  582. ARIA_VALIDATE_RET(iv_off != NULL);
  583. n = *iv_off;
  584. /* An overly large value of n can lead to an unlimited
  585. * buffer overflow. Therefore, guard against this
  586. * outside of parameter validation. */
  587. if (n >= MBEDTLS_ARIA_BLOCKSIZE) {
  588. return MBEDTLS_ERR_ARIA_BAD_INPUT_DATA;
  589. }
  590. if (mode == MBEDTLS_ARIA_DECRYPT) {
  591. while (length--) {
  592. if (n == 0) {
  593. mbedtls_aria_crypt_ecb(ctx, iv, iv);
  594. }
  595. c = *input++;
  596. *output++ = c ^ iv[n];
  597. iv[n] = c;
  598. n = (n + 1) & 0x0F;
  599. }
  600. } else {
  601. while (length--) {
  602. if (n == 0) {
  603. mbedtls_aria_crypt_ecb(ctx, iv, iv);
  604. }
  605. iv[n] = *output++ = (unsigned char) (iv[n] ^ *input++);
  606. n = (n + 1) & 0x0F;
  607. }
  608. }
  609. *iv_off = n;
  610. return 0;
  611. }
  612. #endif /* MBEDTLS_CIPHER_MODE_CFB */
  613. #if defined(MBEDTLS_CIPHER_MODE_CTR)
  614. /*
  615. * ARIA-CTR buffer encryption/decryption
  616. */
  617. int mbedtls_aria_crypt_ctr(mbedtls_aria_context *ctx,
  618. size_t length,
  619. size_t *nc_off,
  620. unsigned char nonce_counter[MBEDTLS_ARIA_BLOCKSIZE],
  621. unsigned char stream_block[MBEDTLS_ARIA_BLOCKSIZE],
  622. const unsigned char *input,
  623. unsigned char *output)
  624. {
  625. int c, i;
  626. size_t n;
  627. ARIA_VALIDATE_RET(ctx != NULL);
  628. ARIA_VALIDATE_RET(length == 0 || input != NULL);
  629. ARIA_VALIDATE_RET(length == 0 || output != NULL);
  630. ARIA_VALIDATE_RET(nonce_counter != NULL);
  631. ARIA_VALIDATE_RET(stream_block != NULL);
  632. ARIA_VALIDATE_RET(nc_off != NULL);
  633. n = *nc_off;
  634. /* An overly large value of n can lead to an unlimited
  635. * buffer overflow. Therefore, guard against this
  636. * outside of parameter validation. */
  637. if (n >= MBEDTLS_ARIA_BLOCKSIZE) {
  638. return MBEDTLS_ERR_ARIA_BAD_INPUT_DATA;
  639. }
  640. while (length--) {
  641. if (n == 0) {
  642. mbedtls_aria_crypt_ecb(ctx, nonce_counter,
  643. stream_block);
  644. for (i = MBEDTLS_ARIA_BLOCKSIZE; i > 0; i--) {
  645. if (++nonce_counter[i - 1] != 0) {
  646. break;
  647. }
  648. }
  649. }
  650. c = *input++;
  651. *output++ = (unsigned char) (c ^ stream_block[n]);
  652. n = (n + 1) & 0x0F;
  653. }
  654. *nc_off = n;
  655. return 0;
  656. }
  657. #endif /* MBEDTLS_CIPHER_MODE_CTR */
  658. #endif /* !MBEDTLS_ARIA_ALT */
  659. #if defined(MBEDTLS_SELF_TEST)
  660. /*
  661. * Basic ARIA ECB test vectors from RFC 5794
  662. */
  663. static const uint8_t aria_test1_ecb_key[32] = // test key
  664. {
  665. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, // 128 bit
  666. 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
  667. 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, // 192 bit
  668. 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F // 256 bit
  669. };
  670. static const uint8_t aria_test1_ecb_pt[MBEDTLS_ARIA_BLOCKSIZE] = // plaintext
  671. {
  672. 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, // same for all
  673. 0x88, 0x99, 0xAA, 0xBB, 0xCC, 0xDD, 0xEE, 0xFF // key sizes
  674. };
  675. static const uint8_t aria_test1_ecb_ct[3][MBEDTLS_ARIA_BLOCKSIZE] = // ciphertext
  676. {
  677. { 0xD7, 0x18, 0xFB, 0xD6, 0xAB, 0x64, 0x4C, 0x73, // 128 bit
  678. 0x9D, 0xA9, 0x5F, 0x3B, 0xE6, 0x45, 0x17, 0x78 },
  679. { 0x26, 0x44, 0x9C, 0x18, 0x05, 0xDB, 0xE7, 0xAA, // 192 bit
  680. 0x25, 0xA4, 0x68, 0xCE, 0x26, 0x3A, 0x9E, 0x79 },
  681. { 0xF9, 0x2B, 0xD7, 0xC7, 0x9F, 0xB7, 0x2E, 0x2F, // 256 bit
  682. 0x2B, 0x8F, 0x80, 0xC1, 0x97, 0x2D, 0x24, 0xFC }
  683. };
  684. /*
  685. * Mode tests from "Test Vectors for ARIA" Version 1.0
  686. * http://210.104.33.10/ARIA/doc/ARIA-testvector-e.pdf
  687. */
  688. #if (defined(MBEDTLS_CIPHER_MODE_CBC) || defined(MBEDTLS_CIPHER_MODE_CFB) || \
  689. defined(MBEDTLS_CIPHER_MODE_CTR))
  690. static const uint8_t aria_test2_key[32] =
  691. {
  692. 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, // 128 bit
  693. 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff,
  694. 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, // 192 bit
  695. 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff // 256 bit
  696. };
  697. static const uint8_t aria_test2_pt[48] =
  698. {
  699. 0x11, 0x11, 0x11, 0x11, 0xaa, 0xaa, 0xaa, 0xaa, // same for all
  700. 0x11, 0x11, 0x11, 0x11, 0xbb, 0xbb, 0xbb, 0xbb,
  701. 0x11, 0x11, 0x11, 0x11, 0xcc, 0xcc, 0xcc, 0xcc,
  702. 0x11, 0x11, 0x11, 0x11, 0xdd, 0xdd, 0xdd, 0xdd,
  703. 0x22, 0x22, 0x22, 0x22, 0xaa, 0xaa, 0xaa, 0xaa,
  704. 0x22, 0x22, 0x22, 0x22, 0xbb, 0xbb, 0xbb, 0xbb,
  705. };
  706. #endif
  707. #if (defined(MBEDTLS_CIPHER_MODE_CBC) || defined(MBEDTLS_CIPHER_MODE_CFB))
  708. static const uint8_t aria_test2_iv[MBEDTLS_ARIA_BLOCKSIZE] =
  709. {
  710. 0x0f, 0x1e, 0x2d, 0x3c, 0x4b, 0x5a, 0x69, 0x78, // same for CBC, CFB
  711. 0x87, 0x96, 0xa5, 0xb4, 0xc3, 0xd2, 0xe1, 0xf0 // CTR has zero IV
  712. };
  713. #endif
  714. #if defined(MBEDTLS_CIPHER_MODE_CBC)
  715. static const uint8_t aria_test2_cbc_ct[3][48] = // CBC ciphertext
  716. {
  717. { 0x49, 0xd6, 0x18, 0x60, 0xb1, 0x49, 0x09, 0x10, // 128-bit key
  718. 0x9c, 0xef, 0x0d, 0x22, 0xa9, 0x26, 0x81, 0x34,
  719. 0xfa, 0xdf, 0x9f, 0xb2, 0x31, 0x51, 0xe9, 0x64,
  720. 0x5f, 0xba, 0x75, 0x01, 0x8b, 0xdb, 0x15, 0x38,
  721. 0xb5, 0x33, 0x34, 0x63, 0x4b, 0xbf, 0x7d, 0x4c,
  722. 0xd4, 0xb5, 0x37, 0x70, 0x33, 0x06, 0x0c, 0x15 },
  723. { 0xaf, 0xe6, 0xcf, 0x23, 0x97, 0x4b, 0x53, 0x3c, // 192-bit key
  724. 0x67, 0x2a, 0x82, 0x62, 0x64, 0xea, 0x78, 0x5f,
  725. 0x4e, 0x4f, 0x7f, 0x78, 0x0d, 0xc7, 0xf3, 0xf1,
  726. 0xe0, 0x96, 0x2b, 0x80, 0x90, 0x23, 0x86, 0xd5,
  727. 0x14, 0xe9, 0xc3, 0xe7, 0x72, 0x59, 0xde, 0x92,
  728. 0xdd, 0x11, 0x02, 0xff, 0xab, 0x08, 0x6c, 0x1e },
  729. { 0x52, 0x3a, 0x8a, 0x80, 0x6a, 0xe6, 0x21, 0xf1, // 256-bit key
  730. 0x55, 0xfd, 0xd2, 0x8d, 0xbc, 0x34, 0xe1, 0xab,
  731. 0x7b, 0x9b, 0x42, 0x43, 0x2a, 0xd8, 0xb2, 0xef,
  732. 0xb9, 0x6e, 0x23, 0xb1, 0x3f, 0x0a, 0x6e, 0x52,
  733. 0xf3, 0x61, 0x85, 0xd5, 0x0a, 0xd0, 0x02, 0xc5,
  734. 0xf6, 0x01, 0xbe, 0xe5, 0x49, 0x3f, 0x11, 0x8b }
  735. };
  736. #endif /* MBEDTLS_CIPHER_MODE_CBC */
  737. #if defined(MBEDTLS_CIPHER_MODE_CFB)
  738. static const uint8_t aria_test2_cfb_ct[3][48] = // CFB ciphertext
  739. {
  740. { 0x37, 0x20, 0xe5, 0x3b, 0xa7, 0xd6, 0x15, 0x38, // 128-bit key
  741. 0x34, 0x06, 0xb0, 0x9f, 0x0a, 0x05, 0xa2, 0x00,
  742. 0xc0, 0x7c, 0x21, 0xe6, 0x37, 0x0f, 0x41, 0x3a,
  743. 0x5d, 0x13, 0x25, 0x00, 0xa6, 0x82, 0x85, 0x01,
  744. 0x7c, 0x61, 0xb4, 0x34, 0xc7, 0xb7, 0xca, 0x96,
  745. 0x85, 0xa5, 0x10, 0x71, 0x86, 0x1e, 0x4d, 0x4b },
  746. { 0x41, 0x71, 0xf7, 0x19, 0x2b, 0xf4, 0x49, 0x54, // 192-bit key
  747. 0x94, 0xd2, 0x73, 0x61, 0x29, 0x64, 0x0f, 0x5c,
  748. 0x4d, 0x87, 0xa9, 0xa2, 0x13, 0x66, 0x4c, 0x94,
  749. 0x48, 0x47, 0x7c, 0x6e, 0xcc, 0x20, 0x13, 0x59,
  750. 0x8d, 0x97, 0x66, 0x95, 0x2d, 0xd8, 0xc3, 0x86,
  751. 0x8f, 0x17, 0xe3, 0x6e, 0xf6, 0x6f, 0xd8, 0x4b },
  752. { 0x26, 0x83, 0x47, 0x05, 0xb0, 0xf2, 0xc0, 0xe2, // 256-bit key
  753. 0x58, 0x8d, 0x4a, 0x7f, 0x09, 0x00, 0x96, 0x35,
  754. 0xf2, 0x8b, 0xb9, 0x3d, 0x8c, 0x31, 0xf8, 0x70,
  755. 0xec, 0x1e, 0x0b, 0xdb, 0x08, 0x2b, 0x66, 0xfa,
  756. 0x40, 0x2d, 0xd9, 0xc2, 0x02, 0xbe, 0x30, 0x0c,
  757. 0x45, 0x17, 0xd1, 0x96, 0xb1, 0x4d, 0x4c, 0xe1 }
  758. };
  759. #endif /* MBEDTLS_CIPHER_MODE_CFB */
  760. #if defined(MBEDTLS_CIPHER_MODE_CTR)
  761. static const uint8_t aria_test2_ctr_ct[3][48] = // CTR ciphertext
  762. {
  763. { 0xac, 0x5d, 0x7d, 0xe8, 0x05, 0xa0, 0xbf, 0x1c, // 128-bit key
  764. 0x57, 0xc8, 0x54, 0x50, 0x1a, 0xf6, 0x0f, 0xa1,
  765. 0x14, 0x97, 0xe2, 0xa3, 0x45, 0x19, 0xde, 0xa1,
  766. 0x56, 0x9e, 0x91, 0xe5, 0xb5, 0xcc, 0xae, 0x2f,
  767. 0xf3, 0xbf, 0xa1, 0xbf, 0x97, 0x5f, 0x45, 0x71,
  768. 0xf4, 0x8b, 0xe1, 0x91, 0x61, 0x35, 0x46, 0xc3 },
  769. { 0x08, 0x62, 0x5c, 0xa8, 0xfe, 0x56, 0x9c, 0x19, // 192-bit key
  770. 0xba, 0x7a, 0xf3, 0x76, 0x0a, 0x6e, 0xd1, 0xce,
  771. 0xf4, 0xd1, 0x99, 0x26, 0x3e, 0x99, 0x9d, 0xde,
  772. 0x14, 0x08, 0x2d, 0xbb, 0xa7, 0x56, 0x0b, 0x79,
  773. 0xa4, 0xc6, 0xb4, 0x56, 0xb8, 0x70, 0x7d, 0xce,
  774. 0x75, 0x1f, 0x98, 0x54, 0xf1, 0x88, 0x93, 0xdf },
  775. { 0x30, 0x02, 0x6c, 0x32, 0x96, 0x66, 0x14, 0x17, // 256-bit key
  776. 0x21, 0x17, 0x8b, 0x99, 0xc0, 0xa1, 0xf1, 0xb2,
  777. 0xf0, 0x69, 0x40, 0x25, 0x3f, 0x7b, 0x30, 0x89,
  778. 0xe2, 0xa3, 0x0e, 0xa8, 0x6a, 0xa3, 0xc8, 0x8f,
  779. 0x59, 0x40, 0xf0, 0x5a, 0xd7, 0xee, 0x41, 0xd7,
  780. 0x13, 0x47, 0xbb, 0x72, 0x61, 0xe3, 0x48, 0xf1 }
  781. };
  782. #endif /* MBEDTLS_CIPHER_MODE_CFB */
  783. #define ARIA_SELF_TEST_ASSERT(cond) \
  784. do { \
  785. if (cond) { \
  786. if (verbose) \
  787. mbedtls_printf("failed\n"); \
  788. goto exit; \
  789. } else { \
  790. if (verbose) \
  791. mbedtls_printf("passed\n"); \
  792. } \
  793. } while (0)
  794. /*
  795. * Checkup routine
  796. */
  797. int mbedtls_aria_self_test(int verbose)
  798. {
  799. int i;
  800. uint8_t blk[MBEDTLS_ARIA_BLOCKSIZE];
  801. mbedtls_aria_context ctx;
  802. int ret = 1;
  803. #if (defined(MBEDTLS_CIPHER_MODE_CFB) || defined(MBEDTLS_CIPHER_MODE_CTR))
  804. size_t j;
  805. #endif
  806. #if (defined(MBEDTLS_CIPHER_MODE_CBC) || \
  807. defined(MBEDTLS_CIPHER_MODE_CFB) || \
  808. defined(MBEDTLS_CIPHER_MODE_CTR))
  809. uint8_t buf[48], iv[MBEDTLS_ARIA_BLOCKSIZE];
  810. #endif
  811. mbedtls_aria_init(&ctx);
  812. /*
  813. * Test set 1
  814. */
  815. for (i = 0; i < 3; i++) {
  816. /* test ECB encryption */
  817. if (verbose) {
  818. mbedtls_printf(" ARIA-ECB-%d (enc): ", 128 + 64 * i);
  819. }
  820. mbedtls_aria_setkey_enc(&ctx, aria_test1_ecb_key, 128 + 64 * i);
  821. mbedtls_aria_crypt_ecb(&ctx, aria_test1_ecb_pt, blk);
  822. ARIA_SELF_TEST_ASSERT(
  823. memcmp(blk, aria_test1_ecb_ct[i], MBEDTLS_ARIA_BLOCKSIZE)
  824. != 0);
  825. /* test ECB decryption */
  826. if (verbose) {
  827. mbedtls_printf(" ARIA-ECB-%d (dec): ", 128 + 64 * i);
  828. }
  829. mbedtls_aria_setkey_dec(&ctx, aria_test1_ecb_key, 128 + 64 * i);
  830. mbedtls_aria_crypt_ecb(&ctx, aria_test1_ecb_ct[i], blk);
  831. ARIA_SELF_TEST_ASSERT(
  832. memcmp(blk, aria_test1_ecb_pt, MBEDTLS_ARIA_BLOCKSIZE)
  833. != 0);
  834. }
  835. if (verbose) {
  836. mbedtls_printf("\n");
  837. }
  838. /*
  839. * Test set 2
  840. */
  841. #if defined(MBEDTLS_CIPHER_MODE_CBC)
  842. for (i = 0; i < 3; i++) {
  843. /* Test CBC encryption */
  844. if (verbose) {
  845. mbedtls_printf(" ARIA-CBC-%d (enc): ", 128 + 64 * i);
  846. }
  847. mbedtls_aria_setkey_enc(&ctx, aria_test2_key, 128 + 64 * i);
  848. memcpy(iv, aria_test2_iv, MBEDTLS_ARIA_BLOCKSIZE);
  849. memset(buf, 0x55, sizeof(buf));
  850. mbedtls_aria_crypt_cbc(&ctx, MBEDTLS_ARIA_ENCRYPT, 48, iv,
  851. aria_test2_pt, buf);
  852. ARIA_SELF_TEST_ASSERT(memcmp(buf, aria_test2_cbc_ct[i], 48)
  853. != 0);
  854. /* Test CBC decryption */
  855. if (verbose) {
  856. mbedtls_printf(" ARIA-CBC-%d (dec): ", 128 + 64 * i);
  857. }
  858. mbedtls_aria_setkey_dec(&ctx, aria_test2_key, 128 + 64 * i);
  859. memcpy(iv, aria_test2_iv, MBEDTLS_ARIA_BLOCKSIZE);
  860. memset(buf, 0xAA, sizeof(buf));
  861. mbedtls_aria_crypt_cbc(&ctx, MBEDTLS_ARIA_DECRYPT, 48, iv,
  862. aria_test2_cbc_ct[i], buf);
  863. ARIA_SELF_TEST_ASSERT(memcmp(buf, aria_test2_pt, 48) != 0);
  864. }
  865. if (verbose) {
  866. mbedtls_printf("\n");
  867. }
  868. #endif /* MBEDTLS_CIPHER_MODE_CBC */
  869. #if defined(MBEDTLS_CIPHER_MODE_CFB)
  870. for (i = 0; i < 3; i++) {
  871. /* Test CFB encryption */
  872. if (verbose) {
  873. mbedtls_printf(" ARIA-CFB-%d (enc): ", 128 + 64 * i);
  874. }
  875. mbedtls_aria_setkey_enc(&ctx, aria_test2_key, 128 + 64 * i);
  876. memcpy(iv, aria_test2_iv, MBEDTLS_ARIA_BLOCKSIZE);
  877. memset(buf, 0x55, sizeof(buf));
  878. j = 0;
  879. mbedtls_aria_crypt_cfb128(&ctx, MBEDTLS_ARIA_ENCRYPT, 48, &j, iv,
  880. aria_test2_pt, buf);
  881. ARIA_SELF_TEST_ASSERT(memcmp(buf, aria_test2_cfb_ct[i], 48) != 0);
  882. /* Test CFB decryption */
  883. if (verbose) {
  884. mbedtls_printf(" ARIA-CFB-%d (dec): ", 128 + 64 * i);
  885. }
  886. mbedtls_aria_setkey_enc(&ctx, aria_test2_key, 128 + 64 * i);
  887. memcpy(iv, aria_test2_iv, MBEDTLS_ARIA_BLOCKSIZE);
  888. memset(buf, 0xAA, sizeof(buf));
  889. j = 0;
  890. mbedtls_aria_crypt_cfb128(&ctx, MBEDTLS_ARIA_DECRYPT, 48, &j,
  891. iv, aria_test2_cfb_ct[i], buf);
  892. ARIA_SELF_TEST_ASSERT(memcmp(buf, aria_test2_pt, 48) != 0);
  893. }
  894. if (verbose) {
  895. mbedtls_printf("\n");
  896. }
  897. #endif /* MBEDTLS_CIPHER_MODE_CFB */
  898. #if defined(MBEDTLS_CIPHER_MODE_CTR)
  899. for (i = 0; i < 3; i++) {
  900. /* Test CTR encryption */
  901. if (verbose) {
  902. mbedtls_printf(" ARIA-CTR-%d (enc): ", 128 + 64 * i);
  903. }
  904. mbedtls_aria_setkey_enc(&ctx, aria_test2_key, 128 + 64 * i);
  905. memset(iv, 0, MBEDTLS_ARIA_BLOCKSIZE); // IV = 0
  906. memset(buf, 0x55, sizeof(buf));
  907. j = 0;
  908. mbedtls_aria_crypt_ctr(&ctx, 48, &j, iv, blk,
  909. aria_test2_pt, buf);
  910. ARIA_SELF_TEST_ASSERT(memcmp(buf, aria_test2_ctr_ct[i], 48) != 0);
  911. /* Test CTR decryption */
  912. if (verbose) {
  913. mbedtls_printf(" ARIA-CTR-%d (dec): ", 128 + 64 * i);
  914. }
  915. mbedtls_aria_setkey_enc(&ctx, aria_test2_key, 128 + 64 * i);
  916. memset(iv, 0, MBEDTLS_ARIA_BLOCKSIZE); // IV = 0
  917. memset(buf, 0xAA, sizeof(buf));
  918. j = 0;
  919. mbedtls_aria_crypt_ctr(&ctx, 48, &j, iv, blk,
  920. aria_test2_ctr_ct[i], buf);
  921. ARIA_SELF_TEST_ASSERT(memcmp(buf, aria_test2_pt, 48) != 0);
  922. }
  923. if (verbose) {
  924. mbedtls_printf("\n");
  925. }
  926. #endif /* MBEDTLS_CIPHER_MODE_CTR */
  927. ret = 0;
  928. exit:
  929. mbedtls_aria_free(&ctx);
  930. return ret;
  931. }
  932. #endif /* MBEDTLS_SELF_TEST */
  933. #endif /* MBEDTLS_ARIA_C */