blob: 2ae5e6e5f4ee8ae0967af68a36272bb191412eb7 [file] [log] [blame]
Daniel King34b822c2016-05-15 17:28:08 -03001/**
2 * \file chacha20.h
3 *
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +02004 * \brief This file contains ChaCha20 definitions and functions.
5 *
6 * ChaCha20 is a stream cipher that can encrypt and decrypt
7 * information. ChaCha was created by Daniel Bernstein as a variant of
8 * its Salsa cipher https://cr.yp.to/chacha/chacha-20080128.pdf
9 * ChaCha20 is the variant with 20 rounds, that was also standardized
10 * in RFC 7539.
Daniel King34b822c2016-05-15 17:28:08 -030011 *
12 * \author Daniel King <damaki.gh@gmail.com>
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +020013 */
14
15/* Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved.
Daniel King34b822c2016-05-15 17:28:08 -030016 * SPDX-License-Identifier: Apache-2.0
17 *
18 * Licensed under the Apache License, Version 2.0 (the "License"); you may
19 * not use this file except in compliance with the License.
20 * You may obtain a copy of the License at
21 *
22 * http://www.apache.org/licenses/LICENSE-2.0
23 *
24 * Unless required by applicable law or agreed to in writing, software
25 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
26 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
27 * See the License for the specific language governing permissions and
28 * limitations under the License.
29 *
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +020030 * This file is part of Mbed TLS (https://tls.mbed.org)
Daniel King34b822c2016-05-15 17:28:08 -030031 */
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +020032
Daniel King34b822c2016-05-15 17:28:08 -030033#ifndef MBEDTLS_CHACHA20_H
34#define MBEDTLS_CHACHA20_H
35
36#if !defined(MBEDTLS_CONFIG_FILE)
37#include "config.h"
38#else
39#include MBEDTLS_CONFIG_FILE
40#endif
41
Daniel King34b822c2016-05-15 17:28:08 -030042#include <stdint.h>
43#include <stddef.h>
44
Manuel Pégourié-Gonnard3798b6b2018-05-24 13:27:45 +020045#define MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA -0x0051 /**< Invalid input parameter(s). */
Ron Eldor9924bdc2018-10-04 10:59:13 +030046
47/* MBEDTLS_ERR_CHACHA20_FEATURE_UNAVAILABLE is deprecated and should not be
48 * used. */
Manuel Pégourié-Gonnard3798b6b2018-05-24 13:27:45 +020049#define MBEDTLS_ERR_CHACHA20_FEATURE_UNAVAILABLE -0x0053 /**< Feature not available. For example, s part of the API is not implemented. */
Ron Eldor9924bdc2018-10-04 10:59:13 +030050
51/* MBEDTLS_ERR_CHACHA20_HW_ACCEL_FAILED is deprecated and should not be used.
52 */
Manuel Pégourié-Gonnard3798b6b2018-05-24 13:27:45 +020053#define MBEDTLS_ERR_CHACHA20_HW_ACCEL_FAILED -0x0055 /**< Chacha20 hardware accelerator failed. */
Daniel King34b822c2016-05-15 17:28:08 -030054
Manuel Pégourié-Gonnard823b7a02018-05-07 10:10:30 +020055#ifdef __cplusplus
56extern "C" {
57#endif
58
Manuel Pégourié-Gonnard95d0bdb2018-05-07 09:58:35 +020059#if !defined(MBEDTLS_CHACHA20_ALT)
60
Dawid Drozd428cc522018-07-24 10:02:47 +020061typedef struct mbedtls_chacha20_context
Daniel King34b822c2016-05-15 17:28:08 -030062{
Manuel Pégourié-Gonnard98fae6d2018-05-24 17:23:41 +020063 uint32_t state[16]; /*! The state (before round operations). */
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +020064 uint8_t keystream8[64]; /*! Leftover keystream bytes. */
65 size_t keystream_bytes_used; /*! Number of keystream bytes already used. */
Daniel King34b822c2016-05-15 17:28:08 -030066}
67mbedtls_chacha20_context;
68
Manuel Pégourié-Gonnard95d0bdb2018-05-07 09:58:35 +020069#else /* MBEDTLS_CHACHA20_ALT */
70#include "chacha20_alt.h"
71#endif /* MBEDTLS_CHACHA20_ALT */
72
Daniel King34b822c2016-05-15 17:28:08 -030073/**
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +020074 * \brief This function initializes the specified ChaCha20 context.
Daniel King34b822c2016-05-15 17:28:08 -030075 *
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +020076 * It must be the first API called before using
77 * the context.
78 *
79 * It is usually followed by calls to
80 * \c mbedtls_chacha20_setkey() and
81 * \c mbedtls_chacha20_starts(), then one or more calls to
82 * to \c mbedtls_chacha20_update(), and finally to
83 * \c mbedtls_chacha20_free().
84 *
Hanno Beckere463c422018-12-12 14:00:26 +000085 * \param ctx The ChaCha20 context to initialize.
86 * This must not be \c NULL.
Daniel King34b822c2016-05-15 17:28:08 -030087 */
88void mbedtls_chacha20_init( mbedtls_chacha20_context *ctx );
89
90/**
Hanno Beckerad7581f2018-12-17 09:43:21 +000091 * \brief This function releases and clears the specified
92 * ChaCha20 context.
Daniel King34b822c2016-05-15 17:28:08 -030093 *
Hanno Beckerad7581f2018-12-17 09:43:21 +000094 * \param ctx The ChaCha20 context to clear. This may be \c NULL,
Hanno Beckere463c422018-12-12 14:00:26 +000095 * in which case this function is a no-op. If it is not
96 * \c NULL, it must point to an initialized context.
97 *
Daniel King34b822c2016-05-15 17:28:08 -030098 */
99void mbedtls_chacha20_free( mbedtls_chacha20_context *ctx );
100
101/**
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200102 * \brief This function sets the encryption/decryption key.
Daniel King34b822c2016-05-15 17:28:08 -0300103 *
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200104 * \note After using this function, you must also call
105 * \c mbedtls_chacha20_starts() to set a nonce before you
106 * start encrypting/decrypting data with
107 * \c mbedtls_chacha_update().
Daniel King34b822c2016-05-15 17:28:08 -0300108 *
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200109 * \param ctx The ChaCha20 context to which the key should be bound.
Hanno Beckere463c422018-12-12 14:00:26 +0000110 * It must be initialized.
Hanno Beckerad7581f2018-12-17 09:43:21 +0000111 * \param key The encryption/decryption key. This must be \c 32 Bytes
112 * in length.
Daniel King34b822c2016-05-15 17:28:08 -0300113 *
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200114 * \return \c 0 on success.
115 * \return #MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA if ctx or key is NULL.
Daniel King34b822c2016-05-15 17:28:08 -0300116 */
117int mbedtls_chacha20_setkey( mbedtls_chacha20_context *ctx,
118 const unsigned char key[32] );
119
120/**
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200121 * \brief This function sets the nonce and initial counter value.
Daniel King34b822c2016-05-15 17:28:08 -0300122 *
123 * \note A ChaCha20 context can be re-used with the same key by
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200124 * calling this function to change the nonce.
Daniel King34b822c2016-05-15 17:28:08 -0300125 *
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200126 * \warning You must never use the same nonce twice with the same key.
127 * This would void any confidentiality guarantees for the
128 * messages encrypted with the same nonce and key.
Daniel King34b822c2016-05-15 17:28:08 -0300129 *
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200130 * \param ctx The ChaCha20 context to which the nonce should be bound.
Hanno Beckere463c422018-12-12 14:00:26 +0000131 * It must be initialized and bound to a key.
Hanno Beckerad7581f2018-12-17 09:43:21 +0000132 * \param nonce The nonce. This must be \c 12 Bytes in size.
133 * \param counter The initial counter value. This is usually \c 0.
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200134 *
135 * \return \c 0 on success.
136 * \return #MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA if ctx or nonce is
137 * NULL.
Daniel King34b822c2016-05-15 17:28:08 -0300138 */
139int mbedtls_chacha20_starts( mbedtls_chacha20_context* ctx,
140 const unsigned char nonce[12],
141 uint32_t counter );
142
143/**
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200144 * \brief This function encrypts or decrypts data.
Daniel King34b822c2016-05-15 17:28:08 -0300145 *
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200146 * Since ChaCha20 is a stream cipher, the same operation is
147 * used for encrypting and decrypting data.
Daniel King34b822c2016-05-15 17:28:08 -0300148 *
Manuel Pégourié-Gonnard502f1892018-05-07 11:57:05 +0200149 * \note The \p input and \p output pointers must either be equal or
150 * point to non-overlapping buffers.
Daniel King34b822c2016-05-15 17:28:08 -0300151 *
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200152 * \note \c mbedtls_chacha20_setkey() and
153 * \c mbedtls_chacha20_starts() must be called at least once
154 * to setup the context before this function can be called.
Daniel King34b822c2016-05-15 17:28:08 -0300155 *
Manuel Pégourié-Gonnardc7bc9e12018-06-18 10:30:30 +0200156 * \note This function can be called multiple times in a row in
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200157 * order to encrypt of decrypt data piecewise with the same
158 * key and nonce.
159 *
160 * \param ctx The ChaCha20 context to use for encryption or decryption.
Hanno Beckere463c422018-12-12 14:00:26 +0000161 * It must be initialized and bound to a key and nonce.
Hanno Beckerad7581f2018-12-17 09:43:21 +0000162 * \param size The length of the input data in Bytes.
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200163 * \param input The buffer holding the input data.
Hanno Beckerb3c10b32018-12-11 14:52:01 +0000164 * This pointer can be \c NULL if `size == 0`.
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200165 * \param output The buffer holding the output data.
Hanno Beckerad7581f2018-12-17 09:43:21 +0000166 * This must be able to hold \p size Bytes.
Hanno Beckerb3c10b32018-12-11 14:52:01 +0000167 * This pointer can be \c NULL if `size == 0`.
Daniel King34b822c2016-05-15 17:28:08 -0300168 *
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200169 * \return \c 0 on success.
Hanno Beckerb3c10b32018-12-11 14:52:01 +0000170 * \return A negative error code on failure.
Daniel King34b822c2016-05-15 17:28:08 -0300171 */
Daniel Kingbd920622016-05-15 19:56:20 -0300172int mbedtls_chacha20_update( mbedtls_chacha20_context *ctx,
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200173 size_t size,
174 const unsigned char *input,
175 unsigned char *output );
Daniel King34b822c2016-05-15 17:28:08 -0300176
Daniel King34b822c2016-05-15 17:28:08 -0300177/**
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200178 * \brief This function encrypts or decrypts data with ChaCha20 and
179 * the given key and nonce.
Daniel King34b822c2016-05-15 17:28:08 -0300180 *
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200181 * Since ChaCha20 is a stream cipher, the same operation is
182 * used for encrypting and decrypting data.
Daniel King34b822c2016-05-15 17:28:08 -0300183 *
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200184 * \warning You must never use the same (key, nonce) pair more than
185 * once. This would void any confidentiality guarantees for
186 * the messages encrypted with the same nonce and key.
Daniel King34b822c2016-05-15 17:28:08 -0300187 *
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200188 * \note The \p input and \p output pointers must either be equal or
189 * point to non-overlapping buffers.
190 *
Hanno Beckerad7581f2018-12-17 09:43:21 +0000191 * \param key The encryption/decryption key.
192 * This must be \c 32 Bytes in length.
193 * \param nonce The nonce. This must be \c 12 Bytes in size.
194 * \param counter The initial counter value. This is usually \c 0.
195 * \param size The length of the input data in Bytes.
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200196 * \param input The buffer holding the input data.
Hanno Beckerb3c10b32018-12-11 14:52:01 +0000197 * This pointer can be \c NULL if `size == 0`.
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200198 * \param output The buffer holding the output data.
Hanno Beckerad7581f2018-12-17 09:43:21 +0000199 * This must be able to hold \p size Bytes.
Hanno Beckerb3c10b32018-12-11 14:52:01 +0000200 * This pointer can be \c NULL if `size == 0`.
Daniel King34b822c2016-05-15 17:28:08 -0300201 *
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200202 * \return \c 0 on success.
Hanno Beckerb3c10b32018-12-11 14:52:01 +0000203 * \return A negative error code on failure.
Daniel King34b822c2016-05-15 17:28:08 -0300204 */
205int mbedtls_chacha20_crypt( const unsigned char key[32],
206 const unsigned char nonce[12],
207 uint32_t counter,
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200208 size_t size,
Daniel King34b822c2016-05-15 17:28:08 -0300209 const unsigned char* input,
210 unsigned char* output );
211
Manuel Pégourié-Gonnardc22e61a2018-05-24 13:51:05 +0200212#if defined(MBEDTLS_SELF_TEST)
Daniel King34b822c2016-05-15 17:28:08 -0300213/**
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200214 * \brief The ChaCha20 checkup routine.
Daniel King34b822c2016-05-15 17:28:08 -0300215 *
Manuel Pégourié-Gonnardb500f8b2018-05-08 12:43:48 +0200216 * \return \c 0 on success.
217 * \return \c 1 on failure.
Daniel King34b822c2016-05-15 17:28:08 -0300218 */
219int mbedtls_chacha20_self_test( int verbose );
Manuel Pégourié-Gonnardc22e61a2018-05-24 13:51:05 +0200220#endif /* MBEDTLS_SELF_TEST */
Daniel King34b822c2016-05-15 17:28:08 -0300221
Manuel Pégourié-Gonnard823b7a02018-05-07 10:10:30 +0200222#ifdef __cplusplus
223}
224#endif
225
Daniel King34b822c2016-05-15 17:28:08 -0300226#endif /* MBEDTLS_CHACHA20_H */