1
0
mirror of https://github.com/ARMmbed/mbedtls.git synced 2025-06-04 22:13:31 +08:00

Misc style adjustments

- fix some whitespace
- fix most overlong lines
- remove some superfluous parentheses
- s/result/ret/ for consistency with the rest of the library
This commit is contained in:
Manuel Pégourié-Gonnard 2018-05-24 17:53:41 +02:00
parent 98fae6d800
commit 1729789075
3 changed files with 189 additions and 182 deletions

View File

@ -55,7 +55,8 @@
| (uint32_t) ( (uint32_t) data[( offset ) + 3] << 24 ) \ | (uint32_t) ( (uint32_t) data[( offset ) + 3] << 24 ) \
) )
#define ROTL32( value, amount ) ( (uint32_t) ( value << amount ) | ( value >> ( 32 - amount ) ) ) #define ROTL32( value, amount ) \
( (uint32_t) ( value << amount ) | ( value >> ( 32 - amount ) ) )
#define CHACHA20_CTR_INDEX ( 12U ) #define CHACHA20_CTR_INDEX ( 12U )
@ -127,7 +128,7 @@ static void chacha20_inner_block( uint32_t state[16] )
/** /**
* \brief Generates a keystream block. * \brief Generates a keystream block.
* *
* \param initial_state The initial ChaCha20 state (containing the key, nonce, counter). * \param initial_state The initial ChaCha20 state (key, nonce, counter).
* \param keystream Generated keystream bytes are written to this buffer. * \param keystream Generated keystream bytes are written to this buffer.
*/ */
static void chacha20_block( const uint32_t initial_state[16], static void chacha20_block( const uint32_t initial_state[16],
@ -164,7 +165,7 @@ static void chacha20_block( const uint32_t initial_state[16],
{ {
size_t offset = i * 4U; size_t offset = i * 4U;
keystream[offset ] = (unsigned char) working_state[i]; keystream[offset ] = (unsigned char)( working_state[i] );
keystream[offset + 1U] = (unsigned char)( working_state[i] >> 8 ); keystream[offset + 1U] = (unsigned char)( working_state[i] >> 8 );
keystream[offset + 2U] = (unsigned char)( working_state[i] >> 16 ); keystream[offset + 2U] = (unsigned char)( working_state[i] >> 16 );
keystream[offset + 3U] = (unsigned char)( working_state[i] >> 24 ); keystream[offset + 3U] = (unsigned char)( working_state[i] >> 24 );
@ -264,9 +265,10 @@ int mbedtls_chacha20_update( mbedtls_chacha20_context *ctx,
} }
/* Use leftover keystream bytes, if available */ /* Use leftover keystream bytes, if available */
while ( ( size > 0U ) && ( ctx->keystream_bytes_used < CHACHA20_BLOCK_SIZE_BYTES ) ) while( size > 0U && ctx->keystream_bytes_used < CHACHA20_BLOCK_SIZE_BYTES )
{ {
output[offset] = input[offset] ^ ctx->keystream8[ctx->keystream_bytes_used]; output[offset] = input[offset]
^ ctx->keystream8[ctx->keystream_bytes_used];
ctx->keystream_bytes_used++; ctx->keystream_bytes_used++;
offset++; offset++;
@ -283,13 +285,13 @@ int mbedtls_chacha20_update( mbedtls_chacha20_context *ctx,
for( i = 0U; i < 64U; i += 8U ) for( i = 0U; i < 64U; i += 8U )
{ {
output[offset + i ] = input[offset + i ] ^ ctx->keystream8[i ]; output[offset + i ] = input[offset + i ] ^ ctx->keystream8[i ];
output[offset + i + 1U ] = input[offset + i + 1U ] ^ ctx->keystream8[i + 1U ]; output[offset + i+1] = input[offset + i+1] ^ ctx->keystream8[i+1];
output[offset + i + 2U ] = input[offset + i + 2U ] ^ ctx->keystream8[i + 2U ]; output[offset + i+2] = input[offset + i+2] ^ ctx->keystream8[i+2];
output[offset + i + 3U ] = input[offset + i + 3U ] ^ ctx->keystream8[i + 3U ]; output[offset + i+3] = input[offset + i+3] ^ ctx->keystream8[i+3];
output[offset + i + 4U ] = input[offset + i + 4U ] ^ ctx->keystream8[i + 4U ]; output[offset + i+4] = input[offset + i+4] ^ ctx->keystream8[i+4];
output[offset + i + 5U ] = input[offset + i + 5U ] ^ ctx->keystream8[i + 5U ]; output[offset + i+5] = input[offset + i+5] ^ ctx->keystream8[i+5];
output[offset + i + 6U ] = input[offset + i + 6U ] ^ ctx->keystream8[i + 6U ]; output[offset + i+6] = input[offset + i+6] ^ ctx->keystream8[i+6];
output[offset + i + 7U ] = input[offset + i + 7U ] ^ ctx->keystream8[i + 7U ]; output[offset + i+7] = input[offset + i+7] ^ ctx->keystream8[i+7];
} }
offset += CHACHA20_BLOCK_SIZE_BYTES; offset += CHACHA20_BLOCK_SIZE_BYTES;
@ -323,23 +325,23 @@ int mbedtls_chacha20_crypt( const unsigned char key[32],
unsigned char* output ) unsigned char* output )
{ {
mbedtls_chacha20_context ctx; mbedtls_chacha20_context ctx;
int result; int ret;
mbedtls_chacha20_init( &ctx ); mbedtls_chacha20_init( &ctx );
result = mbedtls_chacha20_setkey( &ctx, key ); ret = mbedtls_chacha20_setkey( &ctx, key );
if ( result != 0 ) if( ret != 0 )
goto cleanup; goto cleanup;
result = mbedtls_chacha20_starts( &ctx, nonce, counter ); ret = mbedtls_chacha20_starts( &ctx, nonce, counter );
if ( result != 0 ) if( ret != 0 )
goto cleanup; goto cleanup;
result = mbedtls_chacha20_update( &ctx, data_len, input, output ); ret = mbedtls_chacha20_update( &ctx, data_len, input, output );
cleanup: cleanup:
mbedtls_chacha20_free( &ctx ); mbedtls_chacha20_free( &ctx );
return( result ); return( ret );
} }
#endif /* !MBEDTLS_CHACHA20_ALT */ #endif /* !MBEDTLS_CHACHA20_ALT */
@ -529,21 +531,21 @@ int mbedtls_chacha20_self_test( int verbose )
{ {
unsigned char output[381]; unsigned char output[381];
unsigned i; unsigned i;
int result; int ret;
for( i = 0U; i < 2U; i++ ) for( i = 0U; i < 2U; i++ )
{ {
if( verbose != 0 ) if( verbose != 0 )
mbedtls_printf( " ChaCha20 test %u ", i ); mbedtls_printf( " ChaCha20 test %u ", i );
result = mbedtls_chacha20_crypt( test_keys[i], ret = mbedtls_chacha20_crypt( test_keys[i],
test_nonces[i], test_nonces[i],
test_counters[i], test_counters[i],
test_lengths[i], test_lengths[i],
test_input[i], test_input[i],
output ); output );
ASSERT( 0 == result, ( "error code: %i\n", result ) ); ASSERT( 0 == ret, ( "error code: %i\n", ret ) );
ASSERT( 0 == memcmp( output, test_output[i], test_lengths[i] ), ASSERT( 0 == memcmp( output, test_output[i], test_lengths[i] ),
( "failed (output)\n" ) ); ( "failed (output)\n" ) );

View File

@ -50,7 +50,7 @@
#define CHACHAPOLY_STATE_FINISHED ( 3 ) #define CHACHAPOLY_STATE_FINISHED ( 3 )
/** /**
* \brief Adds padding bytes (zeroes) to pad the AAD for Poly1305. * \brief Adds nul bytes to pad the AAD for Poly1305.
* *
* \param ctx The ChaCha20-Poly1305 context. * \param ctx The ChaCha20-Poly1305 context.
*/ */
@ -69,7 +69,7 @@ static void chachapoly_pad_aad( mbedtls_chachapoly_context *ctx )
} }
/** /**
* \brief Adds padding bytes (zeroes) to pad the ciphertext for Poly1305. * \brief Adds nul bytes to pad the ciphertext for Poly1305.
* *
* \param ctx The ChaCha20-Poly1305 context. * \param ctx The ChaCha20-Poly1305 context.
*/ */
@ -116,23 +116,23 @@ void mbedtls_chachapoly_free( mbedtls_chachapoly_context *ctx )
int mbedtls_chachapoly_setkey( mbedtls_chachapoly_context *ctx, int mbedtls_chachapoly_setkey( mbedtls_chachapoly_context *ctx,
const unsigned char key[32] ) const unsigned char key[32] )
{ {
int result; int ret;
if( ( ctx == NULL ) || ( key == NULL ) ) if( ( ctx == NULL ) || ( key == NULL ) )
{ {
return( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA ); return( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA );
} }
result = mbedtls_chacha20_setkey( &ctx->chacha20_ctx, key ); ret = mbedtls_chacha20_setkey( &ctx->chacha20_ctx, key );
return( result ); return( ret );
} }
int mbedtls_chachapoly_starts( mbedtls_chachapoly_context *ctx, int mbedtls_chachapoly_starts( mbedtls_chachapoly_context *ctx,
const unsigned char nonce[12], const unsigned char nonce[12],
mbedtls_chachapoly_mode_t mode ) mbedtls_chachapoly_mode_t mode )
{ {
int result; int ret;
unsigned char poly1305_key[64]; unsigned char poly1305_key[64];
if( ( ctx == NULL ) || ( nonce == NULL ) ) if( ( ctx == NULL ) || ( nonce == NULL ) )
@ -141,24 +141,24 @@ int mbedtls_chachapoly_starts( mbedtls_chachapoly_context *ctx,
} }
/* Set counter = 0, will be update to 1 when generating Poly1305 key */ /* Set counter = 0, will be update to 1 when generating Poly1305 key */
result = mbedtls_chacha20_starts( &ctx->chacha20_ctx, nonce, 0U ); ret = mbedtls_chacha20_starts( &ctx->chacha20_ctx, nonce, 0U );
if ( result != 0 ) if( ret != 0 )
goto cleanup; goto cleanup;
/* Generate the Poly1305 key by getting the ChaCha20 keystream output with counter = 0. /* Generate the Poly1305 key by getting the ChaCha20 keystream output with
* This is the same as encrypting a buffer of zeroes. * counter = 0. This is the same as encrypting a buffer of zeroes.
* Only the first 256-bits (32 bytes) of the key is used for Poly1305. * Only the first 256-bits (32 bytes) of the key is used for Poly1305.
* The other 256 bits are discarded. * The other 256 bits are discarded.
*/ */
memset( poly1305_key, 0, sizeof( poly1305_key ) ); memset( poly1305_key, 0, sizeof( poly1305_key ) );
result = mbedtls_chacha20_update( &ctx->chacha20_ctx, sizeof( poly1305_key ), ret = mbedtls_chacha20_update( &ctx->chacha20_ctx, sizeof( poly1305_key ),
poly1305_key, poly1305_key ); poly1305_key, poly1305_key );
if ( result != 0 ) if( ret != 0 )
goto cleanup; goto cleanup;
result = mbedtls_poly1305_starts( &ctx->poly1305_ctx, poly1305_key ); ret = mbedtls_poly1305_starts( &ctx->poly1305_ctx, poly1305_key );
if ( result == 0 ) if( ret == 0 )
{ {
ctx->aad_len = 0U; ctx->aad_len = 0U;
ctx->ciphertext_len = 0U; ctx->ciphertext_len = 0U;
@ -168,7 +168,7 @@ int mbedtls_chachapoly_starts( mbedtls_chachapoly_context *ctx,
cleanup: cleanup:
mbedtls_platform_zeroize( poly1305_key, 64U ); mbedtls_platform_zeroize( poly1305_key, 64U );
return( result ); return( ret );
} }
int mbedtls_chachapoly_update_aad( mbedtls_chachapoly_context *ctx, int mbedtls_chachapoly_update_aad( mbedtls_chachapoly_context *ctx,
@ -226,8 +226,8 @@ int mbedtls_chachapoly_update( mbedtls_chachapoly_context *ctx,
if( ctx->mode == MBEDTLS_CHACHAPOLY_ENCRYPT ) if( ctx->mode == MBEDTLS_CHACHAPOLY_ENCRYPT )
{ {
/* Note: the following functions return an error only if one or more of /* Note: the following functions return an error only if one or more of
* the input pointers are NULL. Since we have checked their validity * the input pointers are NULL. Since we have checked their
* above, we can safety ignore the return value. * validity above, we can safety ignore the return value.
*/ */
(void) mbedtls_chacha20_update( &ctx->chacha20_ctx, len, input, output ); (void) mbedtls_chacha20_update( &ctx->chacha20_ctx, len, input, output );
(void) mbedtls_poly1305_update( &ctx->poly1305_ctx, output, len ); (void) mbedtls_poly1305_update( &ctx->poly1305_ctx, output, len );
@ -269,7 +269,7 @@ int mbedtls_chachapoly_finish( mbedtls_chachapoly_context *ctx,
/* The lengths of the AAD and ciphertext are processed by /* The lengths of the AAD and ciphertext are processed by
* Poly1305 as the final 128-bit block, encoded as little-endian integers. * Poly1305 as the final 128-bit block, encoded as little-endian integers.
*/ */
len_block[0] = (unsigned char) ctx->aad_len; len_block[ 0] = (unsigned char)( ctx->aad_len );
len_block[ 1] = (unsigned char)( ctx->aad_len >> 8 ); len_block[ 1] = (unsigned char)( ctx->aad_len >> 8 );
len_block[ 2] = (unsigned char)( ctx->aad_len >> 16 ); len_block[ 2] = (unsigned char)( ctx->aad_len >> 16 );
len_block[ 3] = (unsigned char)( ctx->aad_len >> 24 ); len_block[ 3] = (unsigned char)( ctx->aad_len >> 24 );
@ -277,7 +277,7 @@ int mbedtls_chachapoly_finish( mbedtls_chachapoly_context *ctx,
len_block[ 5] = (unsigned char)( ctx->aad_len >> 40 ); len_block[ 5] = (unsigned char)( ctx->aad_len >> 40 );
len_block[ 6] = (unsigned char)( ctx->aad_len >> 48 ); len_block[ 6] = (unsigned char)( ctx->aad_len >> 48 );
len_block[ 7] = (unsigned char)( ctx->aad_len >> 56 ); len_block[ 7] = (unsigned char)( ctx->aad_len >> 56 );
len_block[8] = (unsigned char) ctx->ciphertext_len; len_block[ 8] = (unsigned char)( ctx->ciphertext_len );
len_block[ 9] = (unsigned char)( ctx->ciphertext_len >> 8 ); len_block[ 9] = (unsigned char)( ctx->ciphertext_len >> 8 );
len_block[10] = (unsigned char)( ctx->ciphertext_len >> 16 ); len_block[10] = (unsigned char)( ctx->ciphertext_len >> 16 );
len_block[11] = (unsigned char)( ctx->ciphertext_len >> 24 ); len_block[11] = (unsigned char)( ctx->ciphertext_len >> 24 );
@ -302,24 +302,24 @@ int mbedtls_chachapoly_crypt_and_tag( mbedtls_chachapoly_context *ctx,
unsigned char *output, unsigned char *output,
unsigned char tag[16] ) unsigned char tag[16] )
{ {
int result; int ret;
result = mbedtls_chachapoly_starts( ctx, nonce, mode ); ret = mbedtls_chachapoly_starts( ctx, nonce, mode );
if ( result != 0 ) if( ret != 0 )
goto cleanup; goto cleanup;
result = mbedtls_chachapoly_update_aad( ctx, aad, aad_len ); ret = mbedtls_chachapoly_update_aad( ctx, aad, aad_len );
if ( result != 0 ) if( ret != 0 )
goto cleanup; goto cleanup;
result = mbedtls_chachapoly_update( ctx, length, input, output ); ret = mbedtls_chachapoly_update( ctx, length, input, output );
if ( result != 0 ) if( ret != 0 )
goto cleanup; goto cleanup;
result = mbedtls_chachapoly_finish( ctx, tag ); ret = mbedtls_chachapoly_finish( ctx, tag );
cleanup: cleanup:
return( result ); return( ret );
} }
int mbedtls_chachapoly_auth_decrypt( mbedtls_chachapoly_context *ctx, int mbedtls_chachapoly_auth_decrypt( mbedtls_chachapoly_context *ctx,
@ -466,7 +466,7 @@ int mbedtls_chachapoly_self_test( int verbose )
{ {
mbedtls_chachapoly_context ctx; mbedtls_chachapoly_context ctx;
unsigned i; unsigned i;
int result; int ret;
unsigned char output[200]; unsigned char output[200];
unsigned char mac[16]; unsigned char mac[16];
@ -477,10 +477,10 @@ int mbedtls_chachapoly_self_test( int verbose )
mbedtls_chachapoly_init( &ctx ); mbedtls_chachapoly_init( &ctx );
result = mbedtls_chachapoly_setkey( &ctx, test_key[i] ); ret = mbedtls_chachapoly_setkey( &ctx, test_key[i] );
ASSERT( 0 == result, ( "setkey() error code: %i\n", result ) ); ASSERT( 0 == ret, ( "setkey() error code: %i\n", ret ) );
result = mbedtls_chachapoly_crypt_and_tag( &ctx, ret = mbedtls_chachapoly_crypt_and_tag( &ctx,
MBEDTLS_CHACHAPOLY_ENCRYPT, MBEDTLS_CHACHAPOLY_ENCRYPT,
test_input_len[i], test_input_len[i],
test_nonce[i], test_nonce[i],
@ -490,7 +490,7 @@ int mbedtls_chachapoly_self_test( int verbose )
output, output,
mac ); mac );
ASSERT( 0 == result, ( "crypt_and_tag() error code: %i\n", result ) ); ASSERT( 0 == ret, ( "crypt_and_tag() error code: %i\n", ret ) );
ASSERT( 0 == memcmp( output, test_output[i], test_input_len[i] ), ASSERT( 0 == memcmp( output, test_output[i], test_input_len[i] ),
( "failure (wrong output)\n" ) ); ( "failure (wrong output)\n" ) );

View File

@ -57,12 +57,12 @@
* \brief Process blocks with Poly1305. * \brief Process blocks with Poly1305.
* *
* \param ctx The Poly1305 context. * \param ctx The Poly1305 context.
* \param nblocks Number of blocks to process. Note that this function * \param nblocks Number of blocks to process. Note that this
* only processes full blocks. * function only processes full blocks.
* \param input Buffer containing the input block(s). * \param input Buffer containing the input block(s).
* \param needs_padding Set to 0 if the padding bit has already been applied * \param needs_padding Set to 0 if the padding bit has already been
* to the input data before calling this function. * applied to the input data before calling this
* Otherwise, set this parameter to 1. * function. Otherwise, set this parameter to 1.
*/ */
static void poly1305_process( mbedtls_poly1305_context *ctx, static void poly1305_process( mbedtls_poly1305_context *ctx,
size_t nblocks, size_t nblocks,
@ -94,12 +94,17 @@ static void poly1305_process( mbedtls_poly1305_context *ctx,
/* Process full blocks */ /* Process full blocks */
for( i = 0U; i < nblocks; i++ ) for( i = 0U; i < nblocks; i++ )
{ {
/* Compute: acc += block */ /* The input block is treated as a 128-bit little-endian integer */
/* Note that the input block is treated as a 128-bit little-endian integer */ d0 = BYTES_TO_U32_LE( input, offset + 0 );
d0 = (uint64_t) acc0 + BYTES_TO_U32_LE( input, offset + 0 ); d1 = BYTES_TO_U32_LE( input, offset + 4 );
d1 = (uint64_t) acc1 + BYTES_TO_U32_LE( input, offset + 4 ) + ( d0 >> 32U ); d2 = BYTES_TO_U32_LE( input, offset + 8 );
d2 = (uint64_t) acc2 + BYTES_TO_U32_LE( input, offset + 8 ) + ( d1 >> 32U ); d3 = BYTES_TO_U32_LE( input, offset + 12 );
d3 = (uint64_t) acc3 + BYTES_TO_U32_LE( input, offset + 12 ) + ( d2 >> 32U );
/* Compute: acc += (padded) block as a 130-bit integer */
d0 += (uint64_t) acc0;
d1 += (uint64_t) acc1 + ( d0 >> 32U );
d2 += (uint64_t) acc2 + ( d1 >> 32U );
d3 += (uint64_t) acc3 + ( d2 >> 32U );
acc0 = (uint32_t) d0; acc0 = (uint32_t) d0;
acc1 = (uint32_t) d1; acc1 = (uint32_t) d1;
acc2 = (uint32_t) d2; acc2 = (uint32_t) d2;
@ -182,7 +187,7 @@ static void poly1305_compute_mac( const mbedtls_poly1305_context *ctx,
acc3 = ctx->acc[3]; acc3 = ctx->acc[3];
acc4 = ctx->acc[4]; acc4 = ctx->acc[4];
/* Before adding 's' we need to ensure that the accumulator is mod 2^130 - 5. /* Before adding 's' we ensure that the accumulator is mod 2^130 - 5.
* We do this by calculating acc - (2^130 - 5), then checking if * We do this by calculating acc - (2^130 - 5), then checking if
* the 131st bit is set. If it is, then reduce: acc -= (2^130 - 5) * the 131st bit is set. If it is, then reduce: acc -= (2^130 - 5)
*/ */
@ -218,19 +223,19 @@ static void poly1305_compute_mac( const mbedtls_poly1305_context *ctx,
acc3 += ctx->s[3] + (uint32_t) ( d >> 32U ); acc3 += ctx->s[3] + (uint32_t) ( d >> 32U );
/* Compute MAC (128 least significant bits of the accumulator) */ /* Compute MAC (128 least significant bits of the accumulator) */
mac[0] = (unsigned char) acc0; mac[ 0] = (unsigned char)( acc0 );
mac[ 1] = (unsigned char)( acc0 >> 8 ); mac[ 1] = (unsigned char)( acc0 >> 8 );
mac[ 2] = (unsigned char)( acc0 >> 16 ); mac[ 2] = (unsigned char)( acc0 >> 16 );
mac[ 3] = (unsigned char)( acc0 >> 24 ); mac[ 3] = (unsigned char)( acc0 >> 24 );
mac[4] = (unsigned char) acc1; mac[ 4] = (unsigned char)( acc1 );
mac[ 5] = (unsigned char)( acc1 >> 8 ); mac[ 5] = (unsigned char)( acc1 >> 8 );
mac[ 6] = (unsigned char)( acc1 >> 16 ); mac[ 6] = (unsigned char)( acc1 >> 16 );
mac[ 7] = (unsigned char)( acc1 >> 24 ); mac[ 7] = (unsigned char)( acc1 >> 24 );
mac[8] = (unsigned char) acc2; mac[ 8] = (unsigned char)( acc2 );
mac[ 9] = (unsigned char)( acc2 >> 8 ); mac[ 9] = (unsigned char)( acc2 >> 8 );
mac[10] = (unsigned char)( acc2 >> 16 ); mac[10] = (unsigned char)( acc2 >> 16 );
mac[11] = (unsigned char)( acc2 >> 24 ); mac[11] = (unsigned char)( acc2 >> 24 );
mac[12] = (unsigned char) acc3; mac[12] = (unsigned char)( acc3 );
mac[13] = (unsigned char)( acc3 >> 8 ); mac[13] = (unsigned char)( acc3 >> 8 );
mac[14] = (unsigned char)( acc3 >> 16 ); mac[14] = (unsigned char)( acc3 >> 16 );
mac[15] = (unsigned char)( acc3 >> 24 ); mac[15] = (unsigned char)( acc3 >> 24 );
@ -378,7 +383,7 @@ int mbedtls_poly1305_finish( mbedtls_poly1305_context *ctx,
POLY1305_BLOCK_SIZE_BYTES - ctx->queue_len ); POLY1305_BLOCK_SIZE_BYTES - ctx->queue_len );
poly1305_process( ctx, 1U, /* Process 1 block */ poly1305_process( ctx, 1U, /* Process 1 block */
ctx->queue, 0U ); /* Don't add padding bit (it was just added above) */ ctx->queue, 0U ); /* Already padded above */
} }
poly1305_compute_mac( ctx, mac ); poly1305_compute_mac( ctx, mac );
@ -392,23 +397,23 @@ int mbedtls_poly1305_mac( const unsigned char key[32],
unsigned char mac[16] ) unsigned char mac[16] )
{ {
mbedtls_poly1305_context ctx; mbedtls_poly1305_context ctx;
int result; int ret;
mbedtls_poly1305_init( &ctx ); mbedtls_poly1305_init( &ctx );
result = mbedtls_poly1305_starts( &ctx, key ); ret = mbedtls_poly1305_starts( &ctx, key );
if ( result != 0 ) if( ret != 0 )
goto cleanup; goto cleanup;
result = mbedtls_poly1305_update( &ctx, input, ilen ); ret = mbedtls_poly1305_update( &ctx, input, ilen );
if ( result != 0 ) if( ret != 0 )
goto cleanup; goto cleanup;
result = mbedtls_poly1305_finish( &ctx, mac ); ret = mbedtls_poly1305_finish( &ctx, mac );
cleanup: cleanup:
mbedtls_poly1305_free( &ctx ); mbedtls_poly1305_free( &ctx );
return( result ); return( ret );
} }
#endif /* MBEDTLS_POLY1305_ALT */ #endif /* MBEDTLS_POLY1305_ALT */
@ -495,18 +500,18 @@ int mbedtls_poly1305_self_test( int verbose )
{ {
unsigned char mac[16]; unsigned char mac[16];
unsigned i; unsigned i;
int result; int ret;
for( i = 0U; i < 2U; i++ ) for( i = 0U; i < 2U; i++ )
{ {
if( verbose != 0 ) if( verbose != 0 )
mbedtls_printf( " Poly1305 test %u ", i ); mbedtls_printf( " Poly1305 test %u ", i );
result = mbedtls_poly1305_mac( test_keys[i], ret = mbedtls_poly1305_mac( test_keys[i],
test_data[i], test_data[i],
test_data_len[i], test_data_len[i],
mac ); mac );
ASSERT( 0 == result, ( "error code: %i\n", result ) ); ASSERT( 0 == ret, ( "error code: %i\n", ret ) );
ASSERT( 0 == memcmp( mac, test_mac[i], 16U ), ( "failed (mac)\n" ) ); ASSERT( 0 == memcmp( mac, test_mac[i], 16U ), ( "failed (mac)\n" ) );