aria.c 39 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106
  1. /*
  2. * ARIA implementation
  3. *
  4. * Copyright (C) 2006-2017, ARM Limited, All Rights Reserved
  5. * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
  6. *
  7. * This file is provided under the Apache License 2.0, or the
  8. * GNU General Public License v2.0 or later.
  9. *
  10. * **********
  11. * Apache License 2.0:
  12. *
  13. * Licensed under the Apache License, Version 2.0 (the "License"); you may
  14. * not use this file except in compliance with the License.
  15. * You may obtain a copy of the License at
  16. *
  17. * http://www.apache.org/licenses/LICENSE-2.0
  18. *
  19. * Unless required by applicable law or agreed to in writing, software
  20. * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
  21. * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  22. * See the License for the specific language governing permissions and
  23. * limitations under the License.
  24. *
  25. * **********
  26. *
  27. * **********
  28. * GNU General Public License v2.0 or later:
  29. *
  30. * This program is free software; you can redistribute it and/or modify
  31. * it under the terms of the GNU General Public License as published by
  32. * the Free Software Foundation; either version 2 of the License, or
  33. * (at your option) any later version.
  34. *
  35. * This program is distributed in the hope that it will be useful,
  36. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  37. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  38. * GNU General Public License for more details.
  39. *
  40. * You should have received a copy of the GNU General Public License along
  41. * with this program; if not, write to the Free Software Foundation, Inc.,
  42. * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  43. *
  44. * **********
  45. *
  46. * This file is part of mbed TLS (https://tls.mbed.org)
  47. */
  48. /*
  49. * This implementation is based on the following standards:
  50. * [1] http://210.104.33.10/ARIA/doc/ARIA-specification-e.pdf
  51. * [2] https://tools.ietf.org/html/rfc5794
  52. */
  53. #if !defined(MBEDTLS_CONFIG_FILE)
  54. #include "mbedtls/config.h"
  55. #else
  56. #include MBEDTLS_CONFIG_FILE
  57. #endif
  58. #if defined(MBEDTLS_ARIA_C)
  59. #include "mbedtls/aria.h"
  60. #include <string.h>
  61. #if defined(MBEDTLS_SELF_TEST)
  62. #if defined(MBEDTLS_PLATFORM_C)
  63. #include "mbedtls/platform.h"
  64. #else
  65. #include <stdio.h>
  66. #define mbedtls_printf printf
  67. #endif /* MBEDTLS_PLATFORM_C */
  68. #endif /* MBEDTLS_SELF_TEST */
  69. #if !defined(MBEDTLS_ARIA_ALT)
  70. #include "mbedtls/platform_util.h"
  71. #if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \
  72. !defined(inline) && !defined(__cplusplus)
  73. #define inline __inline
  74. #endif
  75. /* Parameter validation macros */
  76. #define ARIA_VALIDATE_RET( cond ) \
  77. MBEDTLS_INTERNAL_VALIDATE_RET( cond, MBEDTLS_ERR_ARIA_BAD_INPUT_DATA )
  78. #define ARIA_VALIDATE( cond ) \
  79. MBEDTLS_INTERNAL_VALIDATE( cond )
  80. /*
  81. * 32-bit integer manipulation macros (little endian)
  82. */
  83. #ifndef GET_UINT32_LE
  84. #define GET_UINT32_LE( n, b, i ) \
  85. { \
  86. (n) = ( (uint32_t) (b)[(i) ] ) \
  87. | ( (uint32_t) (b)[(i) + 1] << 8 ) \
  88. | ( (uint32_t) (b)[(i) + 2] << 16 ) \
  89. | ( (uint32_t) (b)[(i) + 3] << 24 ); \
  90. }
  91. #endif
  92. #ifndef PUT_UINT32_LE
  93. #define PUT_UINT32_LE( n, b, i ) \
  94. { \
  95. (b)[(i) ] = (unsigned char) ( ( (n) ) & 0xFF ); \
  96. (b)[(i) + 1] = (unsigned char) ( ( (n) >> 8 ) & 0xFF ); \
  97. (b)[(i) + 2] = (unsigned char) ( ( (n) >> 16 ) & 0xFF ); \
  98. (b)[(i) + 3] = (unsigned char) ( ( (n) >> 24 ) & 0xFF ); \
  99. }
  100. #endif
  101. /*
  102. * modify byte order: ( A B C D ) -> ( B A D C ), i.e. swap pairs of bytes
  103. *
  104. * This is submatrix P1 in [1] Appendix B.1
  105. *
  106. * Common compilers fail to translate this to minimal number of instructions,
  107. * so let's provide asm versions for common platforms with C fallback.
  108. */
  109. #if defined(MBEDTLS_HAVE_ASM)
  110. #if defined(__arm__) /* rev16 available from v6 up */
  111. /* armcc5 --gnu defines __GNUC__ but doesn't support GNU's extended asm */
  112. #if defined(__GNUC__) && \
  113. ( !defined(__ARMCC_VERSION) || __ARMCC_VERSION >= 6000000 ) && \
  114. __ARM_ARCH >= 6
  115. static inline uint32_t aria_p1( uint32_t x )
  116. {
  117. uint32_t r;
  118. __asm( "rev16 %0, %1" : "=l" (r) : "l" (x) );
  119. return( r );
  120. }
  121. #define ARIA_P1 aria_p1
  122. #elif defined(__ARMCC_VERSION) && __ARMCC_VERSION < 6000000 && \
  123. ( __TARGET_ARCH_ARM >= 6 || __TARGET_ARCH_THUMB >= 3 )
  124. static inline uint32_t aria_p1( uint32_t x )
  125. {
  126. uint32_t r;
  127. __asm( "rev16 r, x" );
  128. return( r );
  129. }
  130. #define ARIA_P1 aria_p1
  131. #endif
  132. #endif /* arm */
  133. #if defined(__GNUC__) && \
  134. defined(__i386__) || defined(__amd64__) || defined( __x86_64__)
  135. /* I couldn't find an Intel equivalent of rev16, so two instructions */
  136. #define ARIA_P1(x) ARIA_P2( ARIA_P3( x ) )
  137. #endif /* x86 gnuc */
  138. #endif /* MBEDTLS_HAVE_ASM && GNUC */
  139. #if !defined(ARIA_P1)
  140. #define ARIA_P1(x) ((((x) >> 8) & 0x00FF00FF) ^ (((x) & 0x00FF00FF) << 8))
  141. #endif
  142. /*
  143. * modify byte order: ( A B C D ) -> ( C D A B ), i.e. rotate by 16 bits
  144. *
  145. * This is submatrix P2 in [1] Appendix B.1
  146. *
  147. * Common compilers will translate this to a single instruction.
  148. */
  149. #define ARIA_P2(x) (((x) >> 16) ^ ((x) << 16))
  150. /*
  151. * modify byte order: ( A B C D ) -> ( D C B A ), i.e. change endianness
  152. *
  153. * This is submatrix P3 in [1] Appendix B.1
  154. *
  155. * Some compilers fail to translate this to a single instruction,
  156. * so let's provide asm versions for common platforms with C fallback.
  157. */
  158. #if defined(MBEDTLS_HAVE_ASM)
  159. #if defined(__arm__) /* rev available from v6 up */
  160. /* armcc5 --gnu defines __GNUC__ but doesn't support GNU's extended asm */
  161. #if defined(__GNUC__) && \
  162. ( !defined(__ARMCC_VERSION) || __ARMCC_VERSION >= 6000000 ) && \
  163. __ARM_ARCH >= 6
  164. static inline uint32_t aria_p3( uint32_t x )
  165. {
  166. uint32_t r;
  167. __asm( "rev %0, %1" : "=l" (r) : "l" (x) );
  168. return( r );
  169. }
  170. #define ARIA_P3 aria_p3
  171. #elif defined(__ARMCC_VERSION) && __ARMCC_VERSION < 6000000 && \
  172. ( __TARGET_ARCH_ARM >= 6 || __TARGET_ARCH_THUMB >= 3 )
  173. static inline uint32_t aria_p3( uint32_t x )
  174. {
  175. uint32_t r;
  176. __asm( "rev r, x" );
  177. return( r );
  178. }
  179. #define ARIA_P3 aria_p3
  180. #endif
  181. #endif /* arm */
  182. #if defined(__GNUC__) && \
  183. defined(__i386__) || defined(__amd64__) || defined( __x86_64__)
  184. static inline uint32_t aria_p3( uint32_t x )
  185. {
  186. __asm( "bswap %0" : "=r" (x) : "0" (x) );
  187. return( x );
  188. }
  189. #define ARIA_P3 aria_p3
  190. #endif /* x86 gnuc */
  191. #endif /* MBEDTLS_HAVE_ASM && GNUC */
  192. #if !defined(ARIA_P3)
  193. #define ARIA_P3(x) ARIA_P2( ARIA_P1 ( x ) )
  194. #endif
  195. /*
  196. * ARIA Affine Transform
  197. * (a, b, c, d) = state in/out
  198. *
  199. * If we denote the first byte of input by 0, ..., the last byte by f,
  200. * then inputs are: a = 0123, b = 4567, c = 89ab, d = cdef.
  201. *
  202. * Reading [1] 2.4 or [2] 2.4.3 in columns and performing simple
  203. * rearrangements on adjacent pairs, output is:
  204. *
  205. * a = 3210 + 4545 + 6767 + 88aa + 99bb + dccd + effe
  206. * = 3210 + 4567 + 6745 + 89ab + 98ba + dcfe + efcd
  207. * b = 0101 + 2323 + 5476 + 8998 + baab + eecc + ffdd
  208. * = 0123 + 2301 + 5476 + 89ab + ba98 + efcd + fedc
  209. * c = 0022 + 1133 + 4554 + 7667 + ab89 + dcdc + fefe
  210. * = 0123 + 1032 + 4567 + 7654 + ab89 + dcfe + fedc
  211. * d = 1001 + 2332 + 6644 + 7755 + 9898 + baba + cdef
  212. * = 1032 + 2301 + 6745 + 7654 + 98ba + ba98 + cdef
  213. *
  214. * Note: another presentation of the A transform can be found as the first
  215. * half of App. B.1 in [1] in terms of 4-byte operators P1, P2, P3 and P4.
  216. * The implementation below uses only P1 and P2 as they are sufficient.
  217. */
  218. static inline void aria_a( uint32_t *a, uint32_t *b,
  219. uint32_t *c, uint32_t *d )
  220. {
  221. uint32_t ta, tb, tc;
  222. ta = *b; // 4567
  223. *b = *a; // 0123
  224. *a = ARIA_P2( ta ); // 6745
  225. tb = ARIA_P2( *d ); // efcd
  226. *d = ARIA_P1( *c ); // 98ba
  227. *c = ARIA_P1( tb ); // fedc
  228. ta ^= *d; // 4567+98ba
  229. tc = ARIA_P2( *b ); // 2301
  230. ta = ARIA_P1( ta ) ^ tc ^ *c; // 2301+5476+89ab+fedc
  231. tb ^= ARIA_P2( *d ); // ba98+efcd
  232. tc ^= ARIA_P1( *a ); // 2301+7654
  233. *b ^= ta ^ tb; // 0123+2301+5476+89ab+ba98+efcd+fedc OUT
  234. tb = ARIA_P2( tb ) ^ ta; // 2301+5476+89ab+98ba+cdef+fedc
  235. *a ^= ARIA_P1( tb ); // 3210+4567+6745+89ab+98ba+dcfe+efcd OUT
  236. ta = ARIA_P2( ta ); // 0123+7654+ab89+dcfe
  237. *d ^= ARIA_P1( ta ) ^ tc; // 1032+2301+6745+7654+98ba+ba98+cdef OUT
  238. tc = ARIA_P2( tc ); // 0123+5476
  239. *c ^= ARIA_P1( tc ) ^ ta; // 0123+1032+4567+7654+ab89+dcfe+fedc OUT
  240. }
  241. /*
  242. * ARIA Substitution Layer SL1 / SL2
  243. * (a, b, c, d) = state in/out
  244. * (sa, sb, sc, sd) = 256 8-bit S-Boxes (see below)
  245. *
  246. * By passing sb1, sb2, is1, is2 as S-Boxes you get SL1
  247. * By passing is1, is2, sb1, sb2 as S-Boxes you get SL2
  248. */
  249. static inline void aria_sl( uint32_t *a, uint32_t *b,
  250. uint32_t *c, uint32_t *d,
  251. const uint8_t sa[256], const uint8_t sb[256],
  252. const uint8_t sc[256], const uint8_t sd[256] )
  253. {
  254. *a = ( (uint32_t) sa[ *a & 0xFF] ) ^
  255. (((uint32_t) sb[(*a >> 8) & 0xFF]) << 8) ^
  256. (((uint32_t) sc[(*a >> 16) & 0xFF]) << 16) ^
  257. (((uint32_t) sd[ *a >> 24 ]) << 24);
  258. *b = ( (uint32_t) sa[ *b & 0xFF] ) ^
  259. (((uint32_t) sb[(*b >> 8) & 0xFF]) << 8) ^
  260. (((uint32_t) sc[(*b >> 16) & 0xFF]) << 16) ^
  261. (((uint32_t) sd[ *b >> 24 ]) << 24);
  262. *c = ( (uint32_t) sa[ *c & 0xFF] ) ^
  263. (((uint32_t) sb[(*c >> 8) & 0xFF]) << 8) ^
  264. (((uint32_t) sc[(*c >> 16) & 0xFF]) << 16) ^
  265. (((uint32_t) sd[ *c >> 24 ]) << 24);
  266. *d = ( (uint32_t) sa[ *d & 0xFF] ) ^
  267. (((uint32_t) sb[(*d >> 8) & 0xFF]) << 8) ^
  268. (((uint32_t) sc[(*d >> 16) & 0xFF]) << 16) ^
  269. (((uint32_t) sd[ *d >> 24 ]) << 24);
  270. }
  271. /*
  272. * S-Boxes
  273. */
  274. static const uint8_t aria_sb1[256] =
  275. {
  276. 0x63, 0x7C, 0x77, 0x7B, 0xF2, 0x6B, 0x6F, 0xC5, 0x30, 0x01, 0x67, 0x2B,
  277. 0xFE, 0xD7, 0xAB, 0x76, 0xCA, 0x82, 0xC9, 0x7D, 0xFA, 0x59, 0x47, 0xF0,
  278. 0xAD, 0xD4, 0xA2, 0xAF, 0x9C, 0xA4, 0x72, 0xC0, 0xB7, 0xFD, 0x93, 0x26,
  279. 0x36, 0x3F, 0xF7, 0xCC, 0x34, 0xA5, 0xE5, 0xF1, 0x71, 0xD8, 0x31, 0x15,
  280. 0x04, 0xC7, 0x23, 0xC3, 0x18, 0x96, 0x05, 0x9A, 0x07, 0x12, 0x80, 0xE2,
  281. 0xEB, 0x27, 0xB2, 0x75, 0x09, 0x83, 0x2C, 0x1A, 0x1B, 0x6E, 0x5A, 0xA0,
  282. 0x52, 0x3B, 0xD6, 0xB3, 0x29, 0xE3, 0x2F, 0x84, 0x53, 0xD1, 0x00, 0xED,
  283. 0x20, 0xFC, 0xB1, 0x5B, 0x6A, 0xCB, 0xBE, 0x39, 0x4A, 0x4C, 0x58, 0xCF,
  284. 0xD0, 0xEF, 0xAA, 0xFB, 0x43, 0x4D, 0x33, 0x85, 0x45, 0xF9, 0x02, 0x7F,
  285. 0x50, 0x3C, 0x9F, 0xA8, 0x51, 0xA3, 0x40, 0x8F, 0x92, 0x9D, 0x38, 0xF5,
  286. 0xBC, 0xB6, 0xDA, 0x21, 0x10, 0xFF, 0xF3, 0xD2, 0xCD, 0x0C, 0x13, 0xEC,
  287. 0x5F, 0x97, 0x44, 0x17, 0xC4, 0xA7, 0x7E, 0x3D, 0x64, 0x5D, 0x19, 0x73,
  288. 0x60, 0x81, 0x4F, 0xDC, 0x22, 0x2A, 0x90, 0x88, 0x46, 0xEE, 0xB8, 0x14,
  289. 0xDE, 0x5E, 0x0B, 0xDB, 0xE0, 0x32, 0x3A, 0x0A, 0x49, 0x06, 0x24, 0x5C,
  290. 0xC2, 0xD3, 0xAC, 0x62, 0x91, 0x95, 0xE4, 0x79, 0xE7, 0xC8, 0x37, 0x6D,
  291. 0x8D, 0xD5, 0x4E, 0xA9, 0x6C, 0x56, 0xF4, 0xEA, 0x65, 0x7A, 0xAE, 0x08,
  292. 0xBA, 0x78, 0x25, 0x2E, 0x1C, 0xA6, 0xB4, 0xC6, 0xE8, 0xDD, 0x74, 0x1F,
  293. 0x4B, 0xBD, 0x8B, 0x8A, 0x70, 0x3E, 0xB5, 0x66, 0x48, 0x03, 0xF6, 0x0E,
  294. 0x61, 0x35, 0x57, 0xB9, 0x86, 0xC1, 0x1D, 0x9E, 0xE1, 0xF8, 0x98, 0x11,
  295. 0x69, 0xD9, 0x8E, 0x94, 0x9B, 0x1E, 0x87, 0xE9, 0xCE, 0x55, 0x28, 0xDF,
  296. 0x8C, 0xA1, 0x89, 0x0D, 0xBF, 0xE6, 0x42, 0x68, 0x41, 0x99, 0x2D, 0x0F,
  297. 0xB0, 0x54, 0xBB, 0x16
  298. };
  299. static const uint8_t aria_sb2[256] =
  300. {
  301. 0xE2, 0x4E, 0x54, 0xFC, 0x94, 0xC2, 0x4A, 0xCC, 0x62, 0x0D, 0x6A, 0x46,
  302. 0x3C, 0x4D, 0x8B, 0xD1, 0x5E, 0xFA, 0x64, 0xCB, 0xB4, 0x97, 0xBE, 0x2B,
  303. 0xBC, 0x77, 0x2E, 0x03, 0xD3, 0x19, 0x59, 0xC1, 0x1D, 0x06, 0x41, 0x6B,
  304. 0x55, 0xF0, 0x99, 0x69, 0xEA, 0x9C, 0x18, 0xAE, 0x63, 0xDF, 0xE7, 0xBB,
  305. 0x00, 0x73, 0x66, 0xFB, 0x96, 0x4C, 0x85, 0xE4, 0x3A, 0x09, 0x45, 0xAA,
  306. 0x0F, 0xEE, 0x10, 0xEB, 0x2D, 0x7F, 0xF4, 0x29, 0xAC, 0xCF, 0xAD, 0x91,
  307. 0x8D, 0x78, 0xC8, 0x95, 0xF9, 0x2F, 0xCE, 0xCD, 0x08, 0x7A, 0x88, 0x38,
  308. 0x5C, 0x83, 0x2A, 0x28, 0x47, 0xDB, 0xB8, 0xC7, 0x93, 0xA4, 0x12, 0x53,
  309. 0xFF, 0x87, 0x0E, 0x31, 0x36, 0x21, 0x58, 0x48, 0x01, 0x8E, 0x37, 0x74,
  310. 0x32, 0xCA, 0xE9, 0xB1, 0xB7, 0xAB, 0x0C, 0xD7, 0xC4, 0x56, 0x42, 0x26,
  311. 0x07, 0x98, 0x60, 0xD9, 0xB6, 0xB9, 0x11, 0x40, 0xEC, 0x20, 0x8C, 0xBD,
  312. 0xA0, 0xC9, 0x84, 0x04, 0x49, 0x23, 0xF1, 0x4F, 0x50, 0x1F, 0x13, 0xDC,
  313. 0xD8, 0xC0, 0x9E, 0x57, 0xE3, 0xC3, 0x7B, 0x65, 0x3B, 0x02, 0x8F, 0x3E,
  314. 0xE8, 0x25, 0x92, 0xE5, 0x15, 0xDD, 0xFD, 0x17, 0xA9, 0xBF, 0xD4, 0x9A,
  315. 0x7E, 0xC5, 0x39, 0x67, 0xFE, 0x76, 0x9D, 0x43, 0xA7, 0xE1, 0xD0, 0xF5,
  316. 0x68, 0xF2, 0x1B, 0x34, 0x70, 0x05, 0xA3, 0x8A, 0xD5, 0x79, 0x86, 0xA8,
  317. 0x30, 0xC6, 0x51, 0x4B, 0x1E, 0xA6, 0x27, 0xF6, 0x35, 0xD2, 0x6E, 0x24,
  318. 0x16, 0x82, 0x5F, 0xDA, 0xE6, 0x75, 0xA2, 0xEF, 0x2C, 0xB2, 0x1C, 0x9F,
  319. 0x5D, 0x6F, 0x80, 0x0A, 0x72, 0x44, 0x9B, 0x6C, 0x90, 0x0B, 0x5B, 0x33,
  320. 0x7D, 0x5A, 0x52, 0xF3, 0x61, 0xA1, 0xF7, 0xB0, 0xD6, 0x3F, 0x7C, 0x6D,
  321. 0xED, 0x14, 0xE0, 0xA5, 0x3D, 0x22, 0xB3, 0xF8, 0x89, 0xDE, 0x71, 0x1A,
  322. 0xAF, 0xBA, 0xB5, 0x81
  323. };
  324. static const uint8_t aria_is1[256] =
  325. {
  326. 0x52, 0x09, 0x6A, 0xD5, 0x30, 0x36, 0xA5, 0x38, 0xBF, 0x40, 0xA3, 0x9E,
  327. 0x81, 0xF3, 0xD7, 0xFB, 0x7C, 0xE3, 0x39, 0x82, 0x9B, 0x2F, 0xFF, 0x87,
  328. 0x34, 0x8E, 0x43, 0x44, 0xC4, 0xDE, 0xE9, 0xCB, 0x54, 0x7B, 0x94, 0x32,
  329. 0xA6, 0xC2, 0x23, 0x3D, 0xEE, 0x4C, 0x95, 0x0B, 0x42, 0xFA, 0xC3, 0x4E,
  330. 0x08, 0x2E, 0xA1, 0x66, 0x28, 0xD9, 0x24, 0xB2, 0x76, 0x5B, 0xA2, 0x49,
  331. 0x6D, 0x8B, 0xD1, 0x25, 0x72, 0xF8, 0xF6, 0x64, 0x86, 0x68, 0x98, 0x16,
  332. 0xD4, 0xA4, 0x5C, 0xCC, 0x5D, 0x65, 0xB6, 0x92, 0x6C, 0x70, 0x48, 0x50,
  333. 0xFD, 0xED, 0xB9, 0xDA, 0x5E, 0x15, 0x46, 0x57, 0xA7, 0x8D, 0x9D, 0x84,
  334. 0x90, 0xD8, 0xAB, 0x00, 0x8C, 0xBC, 0xD3, 0x0A, 0xF7, 0xE4, 0x58, 0x05,
  335. 0xB8, 0xB3, 0x45, 0x06, 0xD0, 0x2C, 0x1E, 0x8F, 0xCA, 0x3F, 0x0F, 0x02,
  336. 0xC1, 0xAF, 0xBD, 0x03, 0x01, 0x13, 0x8A, 0x6B, 0x3A, 0x91, 0x11, 0x41,
  337. 0x4F, 0x67, 0xDC, 0xEA, 0x97, 0xF2, 0xCF, 0xCE, 0xF0, 0xB4, 0xE6, 0x73,
  338. 0x96, 0xAC, 0x74, 0x22, 0xE7, 0xAD, 0x35, 0x85, 0xE2, 0xF9, 0x37, 0xE8,
  339. 0x1C, 0x75, 0xDF, 0x6E, 0x47, 0xF1, 0x1A, 0x71, 0x1D, 0x29, 0xC5, 0x89,
  340. 0x6F, 0xB7, 0x62, 0x0E, 0xAA, 0x18, 0xBE, 0x1B, 0xFC, 0x56, 0x3E, 0x4B,
  341. 0xC6, 0xD2, 0x79, 0x20, 0x9A, 0xDB, 0xC0, 0xFE, 0x78, 0xCD, 0x5A, 0xF4,
  342. 0x1F, 0xDD, 0xA8, 0x33, 0x88, 0x07, 0xC7, 0x31, 0xB1, 0x12, 0x10, 0x59,
  343. 0x27, 0x80, 0xEC, 0x5F, 0x60, 0x51, 0x7F, 0xA9, 0x19, 0xB5, 0x4A, 0x0D,
  344. 0x2D, 0xE5, 0x7A, 0x9F, 0x93, 0xC9, 0x9C, 0xEF, 0xA0, 0xE0, 0x3B, 0x4D,
  345. 0xAE, 0x2A, 0xF5, 0xB0, 0xC8, 0xEB, 0xBB, 0x3C, 0x83, 0x53, 0x99, 0x61,
  346. 0x17, 0x2B, 0x04, 0x7E, 0xBA, 0x77, 0xD6, 0x26, 0xE1, 0x69, 0x14, 0x63,
  347. 0x55, 0x21, 0x0C, 0x7D
  348. };
  349. static const uint8_t aria_is2[256] =
  350. {
  351. 0x30, 0x68, 0x99, 0x1B, 0x87, 0xB9, 0x21, 0x78, 0x50, 0x39, 0xDB, 0xE1,
  352. 0x72, 0x09, 0x62, 0x3C, 0x3E, 0x7E, 0x5E, 0x8E, 0xF1, 0xA0, 0xCC, 0xA3,
  353. 0x2A, 0x1D, 0xFB, 0xB6, 0xD6, 0x20, 0xC4, 0x8D, 0x81, 0x65, 0xF5, 0x89,
  354. 0xCB, 0x9D, 0x77, 0xC6, 0x57, 0x43, 0x56, 0x17, 0xD4, 0x40, 0x1A, 0x4D,
  355. 0xC0, 0x63, 0x6C, 0xE3, 0xB7, 0xC8, 0x64, 0x6A, 0x53, 0xAA, 0x38, 0x98,
  356. 0x0C, 0xF4, 0x9B, 0xED, 0x7F, 0x22, 0x76, 0xAF, 0xDD, 0x3A, 0x0B, 0x58,
  357. 0x67, 0x88, 0x06, 0xC3, 0x35, 0x0D, 0x01, 0x8B, 0x8C, 0xC2, 0xE6, 0x5F,
  358. 0x02, 0x24, 0x75, 0x93, 0x66, 0x1E, 0xE5, 0xE2, 0x54, 0xD8, 0x10, 0xCE,
  359. 0x7A, 0xE8, 0x08, 0x2C, 0x12, 0x97, 0x32, 0xAB, 0xB4, 0x27, 0x0A, 0x23,
  360. 0xDF, 0xEF, 0xCA, 0xD9, 0xB8, 0xFA, 0xDC, 0x31, 0x6B, 0xD1, 0xAD, 0x19,
  361. 0x49, 0xBD, 0x51, 0x96, 0xEE, 0xE4, 0xA8, 0x41, 0xDA, 0xFF, 0xCD, 0x55,
  362. 0x86, 0x36, 0xBE, 0x61, 0x52, 0xF8, 0xBB, 0x0E, 0x82, 0x48, 0x69, 0x9A,
  363. 0xE0, 0x47, 0x9E, 0x5C, 0x04, 0x4B, 0x34, 0x15, 0x79, 0x26, 0xA7, 0xDE,
  364. 0x29, 0xAE, 0x92, 0xD7, 0x84, 0xE9, 0xD2, 0xBA, 0x5D, 0xF3, 0xC5, 0xB0,
  365. 0xBF, 0xA4, 0x3B, 0x71, 0x44, 0x46, 0x2B, 0xFC, 0xEB, 0x6F, 0xD5, 0xF6,
  366. 0x14, 0xFE, 0x7C, 0x70, 0x5A, 0x7D, 0xFD, 0x2F, 0x18, 0x83, 0x16, 0xA5,
  367. 0x91, 0x1F, 0x05, 0x95, 0x74, 0xA9, 0xC1, 0x5B, 0x4A, 0x85, 0x6D, 0x13,
  368. 0x07, 0x4F, 0x4E, 0x45, 0xB2, 0x0F, 0xC9, 0x1C, 0xA6, 0xBC, 0xEC, 0x73,
  369. 0x90, 0x7B, 0xCF, 0x59, 0x8F, 0xA1, 0xF9, 0x2D, 0xF2, 0xB1, 0x00, 0x94,
  370. 0x37, 0x9F, 0xD0, 0x2E, 0x9C, 0x6E, 0x28, 0x3F, 0x80, 0xF0, 0x3D, 0xD3,
  371. 0x25, 0x8A, 0xB5, 0xE7, 0x42, 0xB3, 0xC7, 0xEA, 0xF7, 0x4C, 0x11, 0x33,
  372. 0x03, 0xA2, 0xAC, 0x60
  373. };
  374. /*
  375. * Helper for key schedule: r = FO( p, k ) ^ x
  376. */
  377. static void aria_fo_xor( uint32_t r[4], const uint32_t p[4],
  378. const uint32_t k[4], const uint32_t x[4] )
  379. {
  380. uint32_t a, b, c, d;
  381. a = p[0] ^ k[0];
  382. b = p[1] ^ k[1];
  383. c = p[2] ^ k[2];
  384. d = p[3] ^ k[3];
  385. aria_sl( &a, &b, &c, &d, aria_sb1, aria_sb2, aria_is1, aria_is2 );
  386. aria_a( &a, &b, &c, &d );
  387. r[0] = a ^ x[0];
  388. r[1] = b ^ x[1];
  389. r[2] = c ^ x[2];
  390. r[3] = d ^ x[3];
  391. }
  392. /*
  393. * Helper for key schedule: r = FE( p, k ) ^ x
  394. */
  395. static void aria_fe_xor( uint32_t r[4], const uint32_t p[4],
  396. const uint32_t k[4], const uint32_t x[4] )
  397. {
  398. uint32_t a, b, c, d;
  399. a = p[0] ^ k[0];
  400. b = p[1] ^ k[1];
  401. c = p[2] ^ k[2];
  402. d = p[3] ^ k[3];
  403. aria_sl( &a, &b, &c, &d, aria_is1, aria_is2, aria_sb1, aria_sb2 );
  404. aria_a( &a, &b, &c, &d );
  405. r[0] = a ^ x[0];
  406. r[1] = b ^ x[1];
  407. r[2] = c ^ x[2];
  408. r[3] = d ^ x[3];
  409. }
  410. /*
  411. * Big endian 128-bit rotation: r = a ^ (b <<< n), used only in key setup.
  412. *
  413. * We chose to store bytes into 32-bit words in little-endian format (see
  414. * GET/PUT_UINT32_LE) so we need to reverse bytes here.
  415. */
  416. static void aria_rot128( uint32_t r[4], const uint32_t a[4],
  417. const uint32_t b[4], uint8_t n )
  418. {
  419. uint8_t i, j;
  420. uint32_t t, u;
  421. const uint8_t n1 = n % 32; // bit offset
  422. const uint8_t n2 = n1 ? 32 - n1 : 0; // reverse bit offset
  423. j = ( n / 32 ) % 4; // initial word offset
  424. t = ARIA_P3( b[j] ); // big endian
  425. for( i = 0; i < 4; i++ )
  426. {
  427. j = ( j + 1 ) % 4; // get next word, big endian
  428. u = ARIA_P3( b[j] );
  429. t <<= n1; // rotate
  430. t |= u >> n2;
  431. t = ARIA_P3( t ); // back to little endian
  432. r[i] = a[i] ^ t; // store
  433. t = u; // move to next word
  434. }
  435. }
  436. /*
  437. * Set encryption key
  438. */
  439. int mbedtls_aria_setkey_enc( mbedtls_aria_context *ctx,
  440. const unsigned char *key, unsigned int keybits )
  441. {
  442. /* round constant masks */
  443. const uint32_t rc[3][4] =
  444. {
  445. { 0xB7C17C51, 0x940A2227, 0xE8AB13FE, 0xE06E9AFA },
  446. { 0xCC4AB16D, 0x20C8219E, 0xD5B128FF, 0xB0E25DEF },
  447. { 0x1D3792DB, 0x70E92621, 0x75972403, 0x0EC9E804 }
  448. };
  449. int i;
  450. uint32_t w[4][4], *w2;
  451. ARIA_VALIDATE_RET( ctx != NULL );
  452. ARIA_VALIDATE_RET( key != NULL );
  453. if( keybits != 128 && keybits != 192 && keybits != 256 )
  454. return( MBEDTLS_ERR_ARIA_BAD_INPUT_DATA );
  455. /* Copy key to W0 (and potential remainder to W1) */
  456. GET_UINT32_LE( w[0][0], key, 0 );
  457. GET_UINT32_LE( w[0][1], key, 4 );
  458. GET_UINT32_LE( w[0][2], key, 8 );
  459. GET_UINT32_LE( w[0][3], key, 12 );
  460. memset( w[1], 0, 16 );
  461. if( keybits >= 192 )
  462. {
  463. GET_UINT32_LE( w[1][0], key, 16 ); // 192 bit key
  464. GET_UINT32_LE( w[1][1], key, 20 );
  465. }
  466. if( keybits == 256 )
  467. {
  468. GET_UINT32_LE( w[1][2], key, 24 ); // 256 bit key
  469. GET_UINT32_LE( w[1][3], key, 28 );
  470. }
  471. i = ( keybits - 128 ) >> 6; // index: 0, 1, 2
  472. ctx->nr = 12 + 2 * i; // no. rounds: 12, 14, 16
  473. aria_fo_xor( w[1], w[0], rc[i], w[1] ); // W1 = FO(W0, CK1) ^ KR
  474. i = i < 2 ? i + 1 : 0;
  475. aria_fe_xor( w[2], w[1], rc[i], w[0] ); // W2 = FE(W1, CK2) ^ W0
  476. i = i < 2 ? i + 1 : 0;
  477. aria_fo_xor( w[3], w[2], rc[i], w[1] ); // W3 = FO(W2, CK3) ^ W1
  478. for( i = 0; i < 4; i++ ) // create round keys
  479. {
  480. w2 = w[(i + 1) & 3];
  481. aria_rot128( ctx->rk[i ], w[i], w2, 128 - 19 );
  482. aria_rot128( ctx->rk[i + 4], w[i], w2, 128 - 31 );
  483. aria_rot128( ctx->rk[i + 8], w[i], w2, 61 );
  484. aria_rot128( ctx->rk[i + 12], w[i], w2, 31 );
  485. }
  486. aria_rot128( ctx->rk[16], w[0], w[1], 19 );
  487. /* w holds enough info to reconstruct the round keys */
  488. mbedtls_platform_zeroize( w, sizeof( w ) );
  489. return( 0 );
  490. }
  491. /*
  492. * Set decryption key
  493. */
  494. int mbedtls_aria_setkey_dec( mbedtls_aria_context *ctx,
  495. const unsigned char *key, unsigned int keybits )
  496. {
  497. int i, j, k, ret;
  498. ARIA_VALIDATE_RET( ctx != NULL );
  499. ARIA_VALIDATE_RET( key != NULL );
  500. ret = mbedtls_aria_setkey_enc( ctx, key, keybits );
  501. if( ret != 0 )
  502. return( ret );
  503. /* flip the order of round keys */
  504. for( i = 0, j = ctx->nr; i < j; i++, j-- )
  505. {
  506. for( k = 0; k < 4; k++ )
  507. {
  508. uint32_t t = ctx->rk[i][k];
  509. ctx->rk[i][k] = ctx->rk[j][k];
  510. ctx->rk[j][k] = t;
  511. }
  512. }
  513. /* apply affine transform to middle keys */
  514. for( i = 1; i < ctx->nr; i++ )
  515. {
  516. aria_a( &ctx->rk[i][0], &ctx->rk[i][1],
  517. &ctx->rk[i][2], &ctx->rk[i][3] );
  518. }
  519. return( 0 );
  520. }
  521. /*
  522. * Encrypt a block
  523. */
  524. int mbedtls_aria_crypt_ecb( mbedtls_aria_context *ctx,
  525. const unsigned char input[MBEDTLS_ARIA_BLOCKSIZE],
  526. unsigned char output[MBEDTLS_ARIA_BLOCKSIZE] )
  527. {
  528. int i;
  529. uint32_t a, b, c, d;
  530. ARIA_VALIDATE_RET( ctx != NULL );
  531. ARIA_VALIDATE_RET( input != NULL );
  532. ARIA_VALIDATE_RET( output != NULL );
  533. GET_UINT32_LE( a, input, 0 );
  534. GET_UINT32_LE( b, input, 4 );
  535. GET_UINT32_LE( c, input, 8 );
  536. GET_UINT32_LE( d, input, 12 );
  537. i = 0;
  538. while( 1 )
  539. {
  540. a ^= ctx->rk[i][0];
  541. b ^= ctx->rk[i][1];
  542. c ^= ctx->rk[i][2];
  543. d ^= ctx->rk[i][3];
  544. i++;
  545. aria_sl( &a, &b, &c, &d, aria_sb1, aria_sb2, aria_is1, aria_is2 );
  546. aria_a( &a, &b, &c, &d );
  547. a ^= ctx->rk[i][0];
  548. b ^= ctx->rk[i][1];
  549. c ^= ctx->rk[i][2];
  550. d ^= ctx->rk[i][3];
  551. i++;
  552. aria_sl( &a, &b, &c, &d, aria_is1, aria_is2, aria_sb1, aria_sb2 );
  553. if( i >= ctx->nr )
  554. break;
  555. aria_a( &a, &b, &c, &d );
  556. }
  557. /* final key mixing */
  558. a ^= ctx->rk[i][0];
  559. b ^= ctx->rk[i][1];
  560. c ^= ctx->rk[i][2];
  561. d ^= ctx->rk[i][3];
  562. PUT_UINT32_LE( a, output, 0 );
  563. PUT_UINT32_LE( b, output, 4 );
  564. PUT_UINT32_LE( c, output, 8 );
  565. PUT_UINT32_LE( d, output, 12 );
  566. return( 0 );
  567. }
  568. /* Initialize context */
  569. void mbedtls_aria_init( mbedtls_aria_context *ctx )
  570. {
  571. ARIA_VALIDATE( ctx != NULL );
  572. memset( ctx, 0, sizeof( mbedtls_aria_context ) );
  573. }
  574. /* Clear context */
  575. void mbedtls_aria_free( mbedtls_aria_context *ctx )
  576. {
  577. if( ctx == NULL )
  578. return;
  579. mbedtls_platform_zeroize( ctx, sizeof( mbedtls_aria_context ) );
  580. }
  581. #if defined(MBEDTLS_CIPHER_MODE_CBC)
  582. /*
  583. * ARIA-CBC buffer encryption/decryption
  584. */
  585. int mbedtls_aria_crypt_cbc( mbedtls_aria_context *ctx,
  586. int mode,
  587. size_t length,
  588. unsigned char iv[MBEDTLS_ARIA_BLOCKSIZE],
  589. const unsigned char *input,
  590. unsigned char *output )
  591. {
  592. int i;
  593. unsigned char temp[MBEDTLS_ARIA_BLOCKSIZE];
  594. ARIA_VALIDATE_RET( ctx != NULL );
  595. ARIA_VALIDATE_RET( mode == MBEDTLS_ARIA_ENCRYPT ||
  596. mode == MBEDTLS_ARIA_DECRYPT );
  597. ARIA_VALIDATE_RET( length == 0 || input != NULL );
  598. ARIA_VALIDATE_RET( length == 0 || output != NULL );
  599. ARIA_VALIDATE_RET( iv != NULL );
  600. if( length % MBEDTLS_ARIA_BLOCKSIZE )
  601. return( MBEDTLS_ERR_ARIA_INVALID_INPUT_LENGTH );
  602. if( mode == MBEDTLS_ARIA_DECRYPT )
  603. {
  604. while( length > 0 )
  605. {
  606. memcpy( temp, input, MBEDTLS_ARIA_BLOCKSIZE );
  607. mbedtls_aria_crypt_ecb( ctx, input, output );
  608. for( i = 0; i < MBEDTLS_ARIA_BLOCKSIZE; i++ )
  609. output[i] = (unsigned char)( output[i] ^ iv[i] );
  610. memcpy( iv, temp, MBEDTLS_ARIA_BLOCKSIZE );
  611. input += MBEDTLS_ARIA_BLOCKSIZE;
  612. output += MBEDTLS_ARIA_BLOCKSIZE;
  613. length -= MBEDTLS_ARIA_BLOCKSIZE;
  614. }
  615. }
  616. else
  617. {
  618. while( length > 0 )
  619. {
  620. for( i = 0; i < MBEDTLS_ARIA_BLOCKSIZE; i++ )
  621. output[i] = (unsigned char)( input[i] ^ iv[i] );
  622. mbedtls_aria_crypt_ecb( ctx, output, output );
  623. memcpy( iv, output, MBEDTLS_ARIA_BLOCKSIZE );
  624. input += MBEDTLS_ARIA_BLOCKSIZE;
  625. output += MBEDTLS_ARIA_BLOCKSIZE;
  626. length -= MBEDTLS_ARIA_BLOCKSIZE;
  627. }
  628. }
  629. return( 0 );
  630. }
  631. #endif /* MBEDTLS_CIPHER_MODE_CBC */
  632. #if defined(MBEDTLS_CIPHER_MODE_CFB)
  633. /*
  634. * ARIA-CFB128 buffer encryption/decryption
  635. */
  636. int mbedtls_aria_crypt_cfb128( mbedtls_aria_context *ctx,
  637. int mode,
  638. size_t length,
  639. size_t *iv_off,
  640. unsigned char iv[MBEDTLS_ARIA_BLOCKSIZE],
  641. const unsigned char *input,
  642. unsigned char *output )
  643. {
  644. unsigned char c;
  645. size_t n;
  646. ARIA_VALIDATE_RET( ctx != NULL );
  647. ARIA_VALIDATE_RET( mode == MBEDTLS_ARIA_ENCRYPT ||
  648. mode == MBEDTLS_ARIA_DECRYPT );
  649. ARIA_VALIDATE_RET( length == 0 || input != NULL );
  650. ARIA_VALIDATE_RET( length == 0 || output != NULL );
  651. ARIA_VALIDATE_RET( iv != NULL );
  652. ARIA_VALIDATE_RET( iv_off != NULL );
  653. n = *iv_off;
  654. /* An overly large value of n can lead to an unlimited
  655. * buffer overflow. Therefore, guard against this
  656. * outside of parameter validation. */
  657. if( n >= MBEDTLS_ARIA_BLOCKSIZE )
  658. return( MBEDTLS_ERR_ARIA_BAD_INPUT_DATA );
  659. if( mode == MBEDTLS_ARIA_DECRYPT )
  660. {
  661. while( length-- )
  662. {
  663. if( n == 0 )
  664. mbedtls_aria_crypt_ecb( ctx, iv, iv );
  665. c = *input++;
  666. *output++ = c ^ iv[n];
  667. iv[n] = c;
  668. n = ( n + 1 ) & 0x0F;
  669. }
  670. }
  671. else
  672. {
  673. while( length-- )
  674. {
  675. if( n == 0 )
  676. mbedtls_aria_crypt_ecb( ctx, iv, iv );
  677. iv[n] = *output++ = (unsigned char)( iv[n] ^ *input++ );
  678. n = ( n + 1 ) & 0x0F;
  679. }
  680. }
  681. *iv_off = n;
  682. return( 0 );
  683. }
  684. #endif /* MBEDTLS_CIPHER_MODE_CFB */
  685. #if defined(MBEDTLS_CIPHER_MODE_CTR)
  686. /*
  687. * ARIA-CTR buffer encryption/decryption
  688. */
  689. int mbedtls_aria_crypt_ctr( mbedtls_aria_context *ctx,
  690. size_t length,
  691. size_t *nc_off,
  692. unsigned char nonce_counter[MBEDTLS_ARIA_BLOCKSIZE],
  693. unsigned char stream_block[MBEDTLS_ARIA_BLOCKSIZE],
  694. const unsigned char *input,
  695. unsigned char *output )
  696. {
  697. int c, i;
  698. size_t n;
  699. ARIA_VALIDATE_RET( ctx != NULL );
  700. ARIA_VALIDATE_RET( length == 0 || input != NULL );
  701. ARIA_VALIDATE_RET( length == 0 || output != NULL );
  702. ARIA_VALIDATE_RET( nonce_counter != NULL );
  703. ARIA_VALIDATE_RET( stream_block != NULL );
  704. ARIA_VALIDATE_RET( nc_off != NULL );
  705. n = *nc_off;
  706. /* An overly large value of n can lead to an unlimited
  707. * buffer overflow. Therefore, guard against this
  708. * outside of parameter validation. */
  709. if( n >= MBEDTLS_ARIA_BLOCKSIZE )
  710. return( MBEDTLS_ERR_ARIA_BAD_INPUT_DATA );
  711. while( length-- )
  712. {
  713. if( n == 0 ) {
  714. mbedtls_aria_crypt_ecb( ctx, nonce_counter,
  715. stream_block );
  716. for( i = MBEDTLS_ARIA_BLOCKSIZE; i > 0; i-- )
  717. if( ++nonce_counter[i - 1] != 0 )
  718. break;
  719. }
  720. c = *input++;
  721. *output++ = (unsigned char)( c ^ stream_block[n] );
  722. n = ( n + 1 ) & 0x0F;
  723. }
  724. *nc_off = n;
  725. return( 0 );
  726. }
  727. #endif /* MBEDTLS_CIPHER_MODE_CTR */
  728. #endif /* !MBEDTLS_ARIA_ALT */
  729. #if defined(MBEDTLS_SELF_TEST)
  730. /*
  731. * Basic ARIA ECB test vectors from RFC 5794
  732. */
  733. static const uint8_t aria_test1_ecb_key[32] = // test key
  734. {
  735. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, // 128 bit
  736. 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
  737. 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, // 192 bit
  738. 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F // 256 bit
  739. };
  740. static const uint8_t aria_test1_ecb_pt[MBEDTLS_ARIA_BLOCKSIZE] = // plaintext
  741. {
  742. 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, // same for all
  743. 0x88, 0x99, 0xAA, 0xBB, 0xCC, 0xDD, 0xEE, 0xFF // key sizes
  744. };
  745. static const uint8_t aria_test1_ecb_ct[3][MBEDTLS_ARIA_BLOCKSIZE] = // ciphertext
  746. {
  747. { 0xD7, 0x18, 0xFB, 0xD6, 0xAB, 0x64, 0x4C, 0x73, // 128 bit
  748. 0x9D, 0xA9, 0x5F, 0x3B, 0xE6, 0x45, 0x17, 0x78 },
  749. { 0x26, 0x44, 0x9C, 0x18, 0x05, 0xDB, 0xE7, 0xAA, // 192 bit
  750. 0x25, 0xA4, 0x68, 0xCE, 0x26, 0x3A, 0x9E, 0x79 },
  751. { 0xF9, 0x2B, 0xD7, 0xC7, 0x9F, 0xB7, 0x2E, 0x2F, // 256 bit
  752. 0x2B, 0x8F, 0x80, 0xC1, 0x97, 0x2D, 0x24, 0xFC }
  753. };
  754. /*
  755. * Mode tests from "Test Vectors for ARIA" Version 1.0
  756. * http://210.104.33.10/ARIA/doc/ARIA-testvector-e.pdf
  757. */
  758. #if (defined(MBEDTLS_CIPHER_MODE_CBC) || defined(MBEDTLS_CIPHER_MODE_CFB) || \
  759. defined(MBEDTLS_CIPHER_MODE_CTR))
  760. static const uint8_t aria_test2_key[32] =
  761. {
  762. 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, // 128 bit
  763. 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff,
  764. 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, // 192 bit
  765. 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff // 256 bit
  766. };
  767. static const uint8_t aria_test2_pt[48] =
  768. {
  769. 0x11, 0x11, 0x11, 0x11, 0xaa, 0xaa, 0xaa, 0xaa, // same for all
  770. 0x11, 0x11, 0x11, 0x11, 0xbb, 0xbb, 0xbb, 0xbb,
  771. 0x11, 0x11, 0x11, 0x11, 0xcc, 0xcc, 0xcc, 0xcc,
  772. 0x11, 0x11, 0x11, 0x11, 0xdd, 0xdd, 0xdd, 0xdd,
  773. 0x22, 0x22, 0x22, 0x22, 0xaa, 0xaa, 0xaa, 0xaa,
  774. 0x22, 0x22, 0x22, 0x22, 0xbb, 0xbb, 0xbb, 0xbb,
  775. };
  776. #endif
  777. #if (defined(MBEDTLS_CIPHER_MODE_CBC) || defined(MBEDTLS_CIPHER_MODE_CFB))
  778. static const uint8_t aria_test2_iv[MBEDTLS_ARIA_BLOCKSIZE] =
  779. {
  780. 0x0f, 0x1e, 0x2d, 0x3c, 0x4b, 0x5a, 0x69, 0x78, // same for CBC, CFB
  781. 0x87, 0x96, 0xa5, 0xb4, 0xc3, 0xd2, 0xe1, 0xf0 // CTR has zero IV
  782. };
  783. #endif
  784. #if defined(MBEDTLS_CIPHER_MODE_CBC)
  785. static const uint8_t aria_test2_cbc_ct[3][48] = // CBC ciphertext
  786. {
  787. { 0x49, 0xd6, 0x18, 0x60, 0xb1, 0x49, 0x09, 0x10, // 128-bit key
  788. 0x9c, 0xef, 0x0d, 0x22, 0xa9, 0x26, 0x81, 0x34,
  789. 0xfa, 0xdf, 0x9f, 0xb2, 0x31, 0x51, 0xe9, 0x64,
  790. 0x5f, 0xba, 0x75, 0x01, 0x8b, 0xdb, 0x15, 0x38,
  791. 0xb5, 0x33, 0x34, 0x63, 0x4b, 0xbf, 0x7d, 0x4c,
  792. 0xd4, 0xb5, 0x37, 0x70, 0x33, 0x06, 0x0c, 0x15 },
  793. { 0xaf, 0xe6, 0xcf, 0x23, 0x97, 0x4b, 0x53, 0x3c, // 192-bit key
  794. 0x67, 0x2a, 0x82, 0x62, 0x64, 0xea, 0x78, 0x5f,
  795. 0x4e, 0x4f, 0x7f, 0x78, 0x0d, 0xc7, 0xf3, 0xf1,
  796. 0xe0, 0x96, 0x2b, 0x80, 0x90, 0x23, 0x86, 0xd5,
  797. 0x14, 0xe9, 0xc3, 0xe7, 0x72, 0x59, 0xde, 0x92,
  798. 0xdd, 0x11, 0x02, 0xff, 0xab, 0x08, 0x6c, 0x1e },
  799. { 0x52, 0x3a, 0x8a, 0x80, 0x6a, 0xe6, 0x21, 0xf1, // 256-bit key
  800. 0x55, 0xfd, 0xd2, 0x8d, 0xbc, 0x34, 0xe1, 0xab,
  801. 0x7b, 0x9b, 0x42, 0x43, 0x2a, 0xd8, 0xb2, 0xef,
  802. 0xb9, 0x6e, 0x23, 0xb1, 0x3f, 0x0a, 0x6e, 0x52,
  803. 0xf3, 0x61, 0x85, 0xd5, 0x0a, 0xd0, 0x02, 0xc5,
  804. 0xf6, 0x01, 0xbe, 0xe5, 0x49, 0x3f, 0x11, 0x8b }
  805. };
  806. #endif /* MBEDTLS_CIPHER_MODE_CBC */
  807. #if defined(MBEDTLS_CIPHER_MODE_CFB)
  808. static const uint8_t aria_test2_cfb_ct[3][48] = // CFB ciphertext
  809. {
  810. { 0x37, 0x20, 0xe5, 0x3b, 0xa7, 0xd6, 0x15, 0x38, // 128-bit key
  811. 0x34, 0x06, 0xb0, 0x9f, 0x0a, 0x05, 0xa2, 0x00,
  812. 0xc0, 0x7c, 0x21, 0xe6, 0x37, 0x0f, 0x41, 0x3a,
  813. 0x5d, 0x13, 0x25, 0x00, 0xa6, 0x82, 0x85, 0x01,
  814. 0x7c, 0x61, 0xb4, 0x34, 0xc7, 0xb7, 0xca, 0x96,
  815. 0x85, 0xa5, 0x10, 0x71, 0x86, 0x1e, 0x4d, 0x4b },
  816. { 0x41, 0x71, 0xf7, 0x19, 0x2b, 0xf4, 0x49, 0x54, // 192-bit key
  817. 0x94, 0xd2, 0x73, 0x61, 0x29, 0x64, 0x0f, 0x5c,
  818. 0x4d, 0x87, 0xa9, 0xa2, 0x13, 0x66, 0x4c, 0x94,
  819. 0x48, 0x47, 0x7c, 0x6e, 0xcc, 0x20, 0x13, 0x59,
  820. 0x8d, 0x97, 0x66, 0x95, 0x2d, 0xd8, 0xc3, 0x86,
  821. 0x8f, 0x17, 0xe3, 0x6e, 0xf6, 0x6f, 0xd8, 0x4b },
  822. { 0x26, 0x83, 0x47, 0x05, 0xb0, 0xf2, 0xc0, 0xe2, // 256-bit key
  823. 0x58, 0x8d, 0x4a, 0x7f, 0x09, 0x00, 0x96, 0x35,
  824. 0xf2, 0x8b, 0xb9, 0x3d, 0x8c, 0x31, 0xf8, 0x70,
  825. 0xec, 0x1e, 0x0b, 0xdb, 0x08, 0x2b, 0x66, 0xfa,
  826. 0x40, 0x2d, 0xd9, 0xc2, 0x02, 0xbe, 0x30, 0x0c,
  827. 0x45, 0x17, 0xd1, 0x96, 0xb1, 0x4d, 0x4c, 0xe1 }
  828. };
  829. #endif /* MBEDTLS_CIPHER_MODE_CFB */
  830. #if defined(MBEDTLS_CIPHER_MODE_CTR)
  831. static const uint8_t aria_test2_ctr_ct[3][48] = // CTR ciphertext
  832. {
  833. { 0xac, 0x5d, 0x7d, 0xe8, 0x05, 0xa0, 0xbf, 0x1c, // 128-bit key
  834. 0x57, 0xc8, 0x54, 0x50, 0x1a, 0xf6, 0x0f, 0xa1,
  835. 0x14, 0x97, 0xe2, 0xa3, 0x45, 0x19, 0xde, 0xa1,
  836. 0x56, 0x9e, 0x91, 0xe5, 0xb5, 0xcc, 0xae, 0x2f,
  837. 0xf3, 0xbf, 0xa1, 0xbf, 0x97, 0x5f, 0x45, 0x71,
  838. 0xf4, 0x8b, 0xe1, 0x91, 0x61, 0x35, 0x46, 0xc3 },
  839. { 0x08, 0x62, 0x5c, 0xa8, 0xfe, 0x56, 0x9c, 0x19, // 192-bit key
  840. 0xba, 0x7a, 0xf3, 0x76, 0x0a, 0x6e, 0xd1, 0xce,
  841. 0xf4, 0xd1, 0x99, 0x26, 0x3e, 0x99, 0x9d, 0xde,
  842. 0x14, 0x08, 0x2d, 0xbb, 0xa7, 0x56, 0x0b, 0x79,
  843. 0xa4, 0xc6, 0xb4, 0x56, 0xb8, 0x70, 0x7d, 0xce,
  844. 0x75, 0x1f, 0x98, 0x54, 0xf1, 0x88, 0x93, 0xdf },
  845. { 0x30, 0x02, 0x6c, 0x32, 0x96, 0x66, 0x14, 0x17, // 256-bit key
  846. 0x21, 0x17, 0x8b, 0x99, 0xc0, 0xa1, 0xf1, 0xb2,
  847. 0xf0, 0x69, 0x40, 0x25, 0x3f, 0x7b, 0x30, 0x89,
  848. 0xe2, 0xa3, 0x0e, 0xa8, 0x6a, 0xa3, 0xc8, 0x8f,
  849. 0x59, 0x40, 0xf0, 0x5a, 0xd7, 0xee, 0x41, 0xd7,
  850. 0x13, 0x47, 0xbb, 0x72, 0x61, 0xe3, 0x48, 0xf1 }
  851. };
  852. #endif /* MBEDTLS_CIPHER_MODE_CFB */
  853. #define ARIA_SELF_TEST_IF_FAIL \
  854. { \
  855. if( verbose ) \
  856. mbedtls_printf( "failed\n" ); \
  857. return( 1 ); \
  858. } else { \
  859. if( verbose ) \
  860. mbedtls_printf( "passed\n" ); \
  861. }
  862. /*
  863. * Checkup routine
  864. */
  865. int mbedtls_aria_self_test( int verbose )
  866. {
  867. int i;
  868. uint8_t blk[MBEDTLS_ARIA_BLOCKSIZE];
  869. mbedtls_aria_context ctx;
  870. #if (defined(MBEDTLS_CIPHER_MODE_CFB) || defined(MBEDTLS_CIPHER_MODE_CTR))
  871. size_t j;
  872. #endif
  873. #if (defined(MBEDTLS_CIPHER_MODE_CBC) || \
  874. defined(MBEDTLS_CIPHER_MODE_CFB) || \
  875. defined(MBEDTLS_CIPHER_MODE_CTR))
  876. uint8_t buf[48], iv[MBEDTLS_ARIA_BLOCKSIZE];
  877. #endif
  878. /*
  879. * Test set 1
  880. */
  881. for( i = 0; i < 3; i++ )
  882. {
  883. /* test ECB encryption */
  884. if( verbose )
  885. mbedtls_printf( " ARIA-ECB-%d (enc): ", 128 + 64 * i );
  886. mbedtls_aria_setkey_enc( &ctx, aria_test1_ecb_key, 128 + 64 * i );
  887. mbedtls_aria_crypt_ecb( &ctx, aria_test1_ecb_pt, blk );
  888. if( memcmp( blk, aria_test1_ecb_ct[i], MBEDTLS_ARIA_BLOCKSIZE ) != 0 )
  889. ARIA_SELF_TEST_IF_FAIL;
  890. /* test ECB decryption */
  891. if( verbose )
  892. mbedtls_printf( " ARIA-ECB-%d (dec): ", 128 + 64 * i );
  893. mbedtls_aria_setkey_dec( &ctx, aria_test1_ecb_key, 128 + 64 * i );
  894. mbedtls_aria_crypt_ecb( &ctx, aria_test1_ecb_ct[i], blk );
  895. if( memcmp( blk, aria_test1_ecb_pt, MBEDTLS_ARIA_BLOCKSIZE ) != 0 )
  896. ARIA_SELF_TEST_IF_FAIL;
  897. }
  898. if( verbose )
  899. mbedtls_printf( "\n" );
  900. /*
  901. * Test set 2
  902. */
  903. #if defined(MBEDTLS_CIPHER_MODE_CBC)
  904. for( i = 0; i < 3; i++ )
  905. {
  906. /* Test CBC encryption */
  907. if( verbose )
  908. mbedtls_printf( " ARIA-CBC-%d (enc): ", 128 + 64 * i );
  909. mbedtls_aria_setkey_enc( &ctx, aria_test2_key, 128 + 64 * i );
  910. memcpy( iv, aria_test2_iv, MBEDTLS_ARIA_BLOCKSIZE );
  911. memset( buf, 0x55, sizeof( buf ) );
  912. mbedtls_aria_crypt_cbc( &ctx, MBEDTLS_ARIA_ENCRYPT, 48, iv,
  913. aria_test2_pt, buf );
  914. if( memcmp( buf, aria_test2_cbc_ct[i], 48 ) != 0 )
  915. ARIA_SELF_TEST_IF_FAIL;
  916. /* Test CBC decryption */
  917. if( verbose )
  918. mbedtls_printf( " ARIA-CBC-%d (dec): ", 128 + 64 * i );
  919. mbedtls_aria_setkey_dec( &ctx, aria_test2_key, 128 + 64 * i );
  920. memcpy( iv, aria_test2_iv, MBEDTLS_ARIA_BLOCKSIZE );
  921. memset( buf, 0xAA, sizeof( buf ) );
  922. mbedtls_aria_crypt_cbc( &ctx, MBEDTLS_ARIA_DECRYPT, 48, iv,
  923. aria_test2_cbc_ct[i], buf );
  924. if( memcmp( buf, aria_test2_pt, 48 ) != 0 )
  925. ARIA_SELF_TEST_IF_FAIL;
  926. }
  927. if( verbose )
  928. mbedtls_printf( "\n" );
  929. #endif /* MBEDTLS_CIPHER_MODE_CBC */
  930. #if defined(MBEDTLS_CIPHER_MODE_CFB)
  931. for( i = 0; i < 3; i++ )
  932. {
  933. /* Test CFB encryption */
  934. if( verbose )
  935. mbedtls_printf( " ARIA-CFB-%d (enc): ", 128 + 64 * i );
  936. mbedtls_aria_setkey_enc( &ctx, aria_test2_key, 128 + 64 * i );
  937. memcpy( iv, aria_test2_iv, MBEDTLS_ARIA_BLOCKSIZE );
  938. memset( buf, 0x55, sizeof( buf ) );
  939. j = 0;
  940. mbedtls_aria_crypt_cfb128( &ctx, MBEDTLS_ARIA_ENCRYPT, 48, &j, iv,
  941. aria_test2_pt, buf );
  942. if( memcmp( buf, aria_test2_cfb_ct[i], 48 ) != 0 )
  943. ARIA_SELF_TEST_IF_FAIL;
  944. /* Test CFB decryption */
  945. if( verbose )
  946. mbedtls_printf( " ARIA-CFB-%d (dec): ", 128 + 64 * i );
  947. mbedtls_aria_setkey_enc( &ctx, aria_test2_key, 128 + 64 * i );
  948. memcpy( iv, aria_test2_iv, MBEDTLS_ARIA_BLOCKSIZE );
  949. memset( buf, 0xAA, sizeof( buf ) );
  950. j = 0;
  951. mbedtls_aria_crypt_cfb128( &ctx, MBEDTLS_ARIA_DECRYPT, 48, &j,
  952. iv, aria_test2_cfb_ct[i], buf );
  953. if( memcmp( buf, aria_test2_pt, 48 ) != 0 )
  954. ARIA_SELF_TEST_IF_FAIL;
  955. }
  956. if( verbose )
  957. mbedtls_printf( "\n" );
  958. #endif /* MBEDTLS_CIPHER_MODE_CFB */
  959. #if defined(MBEDTLS_CIPHER_MODE_CTR)
  960. for( i = 0; i < 3; i++ )
  961. {
  962. /* Test CTR encryption */
  963. if( verbose )
  964. mbedtls_printf( " ARIA-CTR-%d (enc): ", 128 + 64 * i );
  965. mbedtls_aria_setkey_enc( &ctx, aria_test2_key, 128 + 64 * i );
  966. memset( iv, 0, MBEDTLS_ARIA_BLOCKSIZE ); // IV = 0
  967. memset( buf, 0x55, sizeof( buf ) );
  968. j = 0;
  969. mbedtls_aria_crypt_ctr( &ctx, 48, &j, iv, blk,
  970. aria_test2_pt, buf );
  971. if( memcmp( buf, aria_test2_ctr_ct[i], 48 ) != 0 )
  972. ARIA_SELF_TEST_IF_FAIL;
  973. /* Test CTR decryption */
  974. if( verbose )
  975. mbedtls_printf( " ARIA-CTR-%d (dec): ", 128 + 64 * i );
  976. mbedtls_aria_setkey_enc( &ctx, aria_test2_key, 128 + 64 * i );
  977. memset( iv, 0, MBEDTLS_ARIA_BLOCKSIZE ); // IV = 0
  978. memset( buf, 0xAA, sizeof( buf ) );
  979. j = 0;
  980. mbedtls_aria_crypt_ctr( &ctx, 48, &j, iv, blk,
  981. aria_test2_ctr_ct[i], buf );
  982. if( memcmp( buf, aria_test2_pt, 48 ) != 0 )
  983. ARIA_SELF_TEST_IF_FAIL;
  984. }
  985. if( verbose )
  986. mbedtls_printf( "\n" );
  987. #endif /* MBEDTLS_CIPHER_MODE_CTR */
  988. return( 0 );
  989. }
  990. #endif /* MBEDTLS_SELF_TEST */
  991. #endif /* MBEDTLS_ARIA_C */