/* ChibiOS - Copyright (C) 2006..2018 Giovanni Di Sirio Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ /** * @file CRYPv1/hal_crypto_lld.c * @brief STM32 cryptographic subsystem low level driver source. * * @addtogroup CRYPTO * @{ */ #include #include "hal.h" #if (HAL_USE_CRY == TRUE) || defined(__DOXYGEN__) /*===========================================================================*/ /* Driver local definitions. */ /*===========================================================================*/ #define HASH1_DMA_CHANNEL \ STM32_DMA_GETCHANNEL(STM32_CRY_HASH1_DMA_STREAM, \ STM32_HASH1_DMA_CHN) /*===========================================================================*/ /* Driver exported variables. */ /*===========================================================================*/ /** @brief CRY1 driver identifier.*/ #if (STM32_CRY_ENABLED1 == TRUE) || defined(__DOXYGEN__) CRYDriver CRYD1; #endif /*===========================================================================*/ /* Driver local variables and types. */ /*===========================================================================*/ /*===========================================================================*/ /* Driver local functions. */ /*===========================================================================*/ #if (STM32_CRY_HASH_SIZE_THRESHOLD != 0) || defined (__DOXYGEN__) /** * @brief Shared end-of-rx service routine. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] flags pre-shifted content of the ISR register */ static void cry_lld_serve_hash_interrupt(CRYDriver *cryp, uint32_t flags) { /* DMA errors handling.*/ #if defined(STM32_HASH_DMA_ERROR_HOOK) if ((flags & (STM32_DMA_ISR_TEIF | STM32_DMA_ISR_DMEIF)) != 0U) { STM32_CRY_HASH_DMA_ERROR_HOOK(cryp); } #endif if ((flags & STM32_DMA_ISR_TCIF) != 0U) { /* End buffer interrupt.*/ /* Resuming waiting thread.*/ osalSysLockFromISR(); osalThreadResumeI(&cryp->hash_tr, MSG_OK); osalSysUnlockFromISR(); } } #endif /** * @brief Pushes a series of words into the hash engine. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] n the number of words to be pushed * @param[in] p pointer to the words buffer */ static void cry_lld_hash_push(CRYDriver *cryp, uint32_t n, const uint32_t *p) { (void)cryp; /* Not touched in some cases, needs this.*/ /* Data is processed in 32kB blocks because DMA size limitations.*/ while (n > 0U) { uint32_t chunk = n > 0x8000U ? 0x8000U : n; n -= chunk; #if STM32_CRY_HASH_SIZE_THRESHOLD > 1 if (chunk >= STM32_CRY_HASH_SIZE_THRESHOLD) #endif #if STM32_CRY_HASH_SIZE_THRESHOLD != 0 { /* Setting up transfer.*/ dmaStreamSetTransactionSize(cryp->dma_hash, chunk); dmaStreamSetPeripheral(cryp->dma_hash, p); p += chunk; osalSysLock(); /* Enabling DMA channel then HASH engine.*/ dmaStreamEnable(cryp->dma_hash); /* Waiting for DMA operation completion.*/ osalThreadSuspendS(&cryp->hash_tr); osalSysUnlock(); } #endif #if STM32_CRY_HASH_SIZE_THRESHOLD > 1 else #endif #if STM32_CRY_HASH_SIZE_THRESHOLD != 1 { /* Small chunk, just pushing data without touching DMA.*/ do { HASH->DIN = *p++; chunk--; } while (chunk > 0U); } #endif } } /*===========================================================================*/ /* Driver interrupt handlers. */ /*===========================================================================*/ /*===========================================================================*/ /* Driver exported functions. */ /*===========================================================================*/ /** * @brief Low level crypto driver initialization. * * @notapi */ void cry_lld_init(void) { #if STM32_CRY_ENABLED1 cryObjectInit(&CRYD1); #if STM32_CRY_USE_CRYP1 #endif #if STM32_CRY_USE_HASH1 #if STM32_CRY_HASH_SIZE_THRESHOLD != 0 CRYD1.hash_tr = NULL; CRYD1.dma_hash = NULL; #endif /* STM32_CRY_HASH_SIZE_THRESHOLD != 0 */ #endif /* STM32_CRY_USE_HASH1 */ #endif /* STM32_CRY_ENABLED1 */ } /** * @brief Configures and activates the crypto peripheral. * * @param[in] cryp pointer to the @p CRYDriver object * * @notapi */ void cry_lld_start(CRYDriver *cryp) { if (cryp->state == CRY_STOP) { #if STM32_CRY_ENABLED1 if (&CRYD1 == cryp) { #if STM32_CRY_USE_CRYP1 rccEnableCRYP(true); #endif #if STM32_CRY_USE_HASH1 #if STM32_CRY_HASH_SIZE_THRESHOLD != 0 cryp->dma_hash = dmaStreamAllocI(STM32_CRY_HASH1_DMA_STREAM, STM32_CRY_HASH1_IRQ_PRIORITY, (stm32_dmaisr_t)cry_lld_serve_hash_interrupt, (void *)cryp); osalDbgAssert(cryp->dma_hash != NULL, "unable to allocate stream"); /* Preparing the DMA channel.*/ dmaStreamSetMode(cryp->dma_hash, STM32_DMA_CR_CHSEL(HASH1_DMA_CHANNEL) | STM32_DMA_CR_PL(STM32_CRY_HASH1_DMA_PRIORITY) | STM32_DMA_CR_PINC | STM32_DMA_CR_DIR_M2M | STM32_DMA_CR_MSIZE_WORD | STM32_DMA_CR_PSIZE_WORD | STM32_DMA_CR_DMEIE | STM32_DMA_CR_TEIE | STM32_DMA_CR_TCIE); dmaStreamSetMemory0(cryp->dma_hash, &HASH->DIN); dmaStreamSetFIFO(cryp->dma_hash, STM32_DMA_FCR_DMDIS); #if STM32_DMA_SUPPORTS_DMAMUX dmaSetRequestSource(cryp->dma_hash, STM32_DMAMUX1_HASH); #endif #endif /* STM32_CRY_HASH_SIZE_THRESHOLD != 0 */ rccEnableHASH(true); #endif } #endif } #if STM32_CRY_USE_CRYP1 /* CRYP setup and enable.*/ #endif #if STM32_CRY_USE_HASH1 /* HASH setup and enable.*/ #endif } /** * @brief Deactivates the crypto peripheral. * * @param[in] cryp pointer to the @p CRYDriver object * * @notapi */ void cry_lld_stop(CRYDriver *cryp) { if (cryp->state == CRY_READY) { #if STM32_CRY_ENABLED1 if (&CRYD1 == cryp) { #if STM32_CRY_USE_CRYP1 rccDisableCRYP(); #endif #if STM32_CRY_USE_HASH1 #if STM32_CRY_HASH_SIZE_THRESHOLD != 0 dmaStreamFreeI(cryp->dma_hash); cryp->dma_hash = NULL; #endif rccDisableHASH(); #endif } #endif } } #if (CRY_LLD_SUPPORTS_AES == TRUE) || defined(__DOXYGEN__) /** * @brief Initializes the AES transient key. * @note It is the underlying implementation to decide which key sizes are * allowable. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] size key size in bytes * @param[in] keyp pointer to the key data * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the algorithm is unsupported. * @retval CRY_ERR_INV_KEY_SIZE if the specified key size is invalid for * the specified algorithm. * * @notapi */ cryerror_t cry_lld_aes_loadkey(CRYDriver *cryp, size_t size, const uint8_t *keyp) { osalDbgCheck((cryp != NULL) && (keyp != NULL)); #if CRY_LLD_SUPPORTS_AES == TRUE return cry_lld_aes_loadkey(cryp, size, keyp); #elif HAL_CRY_USE_FALLBACK == TRUE return cry_fallback_aes_loadkey(cryp, size, keyp); #else (void)cryp; (void)size; (void)keyp; return CRY_ERR_INV_ALGO; #endif } /** * @brief Encryption of a single block using AES. * @note The implementation of this function must guarantee that it can * be called from any context. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] key_id the key to be used for the operation, zero is * the transient key, other values are keys stored * in an unspecified way * @param[in] in buffer containing the input plaintext * @param[out] out buffer for the output cyphertext * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_INV_KEY_TYPE the selected key is invalid for this operation. * @retval CRY_ERR_INV_KEY_ID if the specified key identifier is invalid * or refers to an empty key slot. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_encrypt_AES(CRYDriver *cryp, crykey_t key_id, const uint8_t *in, uint8_t *out) { (void)cryp; (void)key_id; (void)in; (void)out; return CRY_ERR_INV_ALGO; } /** * @brief Decryption of a single block using AES. * @note The implementation of this function must guarantee that it can * be called from any context. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] key_id the key to be used for the operation, zero is * the transient key, other values are keys stored * in an unspecified way * @param[in] in buffer containing the input cyphertext * @param[out] out buffer for the output plaintext * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_INV_KEY_TYPE the selected key is invalid for this operation. * @retval CRY_ERR_INV_KEY_ID if the specified key identifier is invalid * or refers to an empty key slot. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_decrypt_AES(CRYDriver *cryp, crykey_t key_id, const uint8_t *in, uint8_t *out) { (void)cryp; (void)key_id; (void)in; (void)out; return CRY_ERR_INV_ALGO; } #endif #if (CRY_LLD_SUPPORTS_AES_ECB == TRUE) || defined(__DOXYGEN__) /** * @brief Encryption operation using AES-ECB. * @note The function operates on data buffers whose lenght is a multiple * of an AES block, this means that padding must be done by the * caller. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] key_id the key to be used for the operation, zero is * the transient key, other values are keys stored * in an unspecified way * @param[in] size size of the plaintext buffer, this number must * be a multiple of the selected key size * @param[in] in buffer containing the input plaintext * @param[out] out buffer for the output cyphertext * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_INV_KEY_TYPE the selected key is invalid for this operation. * @retval CRY_ERR_INV_KEY_ID if the specified key identifier is invalid * or refers to an empty key slot. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_encrypt_AES_ECB(CRYDriver *cryp, crykey_t key_id, size_t size, const uint8_t *in, uint8_t *out) { (void)cryp; (void)key_id; (void)size; (void)in; (void)out; return CRY_ERR_INV_ALGO; } /** * @brief Decryption operation using AES-ECB. * @note The function operates on data buffers whose lenght is a multiple * of an AES block, this means that padding must be done by the * caller. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] key_id the key to be used for the operation, zero is * the transient key, other values are keys stored * in an unspecified way * @param[in] size size of the plaintext buffer, this number must * be a multiple of the selected key size * @param[in] in buffer containing the input plaintext * @param[out] out buffer for the output cyphertext * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_INV_KEY_TYPE the selected key is invalid for this operation. * @retval CRY_ERR_INV_KEY_ID if the specified key identifier is invalid * or refers to an empty key slot. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_decrypt_AES_ECB(CRYDriver *cryp, crykey_t key_id, size_t size, const uint8_t *in, uint8_t *out) { (void)cryp; (void)key_id; (void)size; (void)in; (void)out; return CRY_ERR_INV_ALGO; } #endif #if (CRY_LLD_SUPPORTS_AES_CBC == TRUE) || defined(__DOXYGEN__) /** * @brief Encryption operation using AES-CBC. * @note The function operates on data buffers whose lenght is a multiple * of an AES block, this means that padding must be done by the * caller. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] key_id the key to be used for the operation, zero is * the transient key, other values are keys stored * in an unspecified way * @param[in] size size of the plaintext buffer, this number must * be a multiple of the selected key size * @param[in] in buffer containing the input plaintext * @param[out] out buffer for the output cyphertext * @param[in] iv 128 bits initial vector * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_INV_KEY_TYPE the selected key is invalid for this operation. * @retval CRY_ERR_INV_KEY_ID if the specified key identifier is invalid * or refers to an empty key slot. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_encrypt_AES_CBC(CRYDriver *cryp, crykey_t key_id, size_t size, const uint8_t *in, uint8_t *out, const uint8_t *iv) { (void)cryp; (void)key_id; (void)size; (void)in; (void)out; (void)iv; return CRY_ERR_INV_ALGO; } /** * @brief Decryption operation using AES-CBC. * @note The function operates on data buffers whose lenght is a multiple * of an AES block, this means that padding must be done by the * caller. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] key_id the key to be used for the operation, zero is * the transient key, other values are keys stored * in an unspecified way * @param[in] size size of the plaintext buffer, this number must * be a multiple of the selected key size * @param[in] in buffer containing the input plaintext * @param[out] out buffer for the output cyphertext * @param[in] iv 128 bits initial vector * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_INV_KEY_TYPE the selected key is invalid for this operation. * @retval CRY_ERR_INV_KEY_ID if the specified key identifier is invalid * or refers to an empty key slot. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_decrypt_AES_CBC(CRYDriver *cryp, crykey_t key_id, size_t size, const uint8_t *in, uint8_t *out, const uint8_t *iv) { (void)cryp; (void)key_id; (void)size; (void)in; (void)out; (void)iv; return CRY_ERR_INV_ALGO; } #endif #if (CRY_LLD_SUPPORTS_AES_CFB == TRUE) || defined(__DOXYGEN__) /** * @brief Encryption operation using AES-CFB. * @note The function operates on data buffers whose lenght is a multiple * of an AES block, this means that padding must be done by the * caller. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] key_id the key to be used for the operation, zero is * the transient key, other values are keys stored * in an unspecified way * @param[in] size size of the plaintext buffer, this number must * be a multiple of the selected key size * @param[in] in buffer containing the input plaintext * @param[out] out buffer for the output cyphertext * @param[in] iv 128 bits initial vector * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_INV_KEY_TYPE the selected key is invalid for this operation. * @retval CRY_ERR_INV_KEY_ID if the specified key identifier is invalid * or refers to an empty key slot. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_encrypt_AES_CFB(CRYDriver *cryp, crykey_t key_id, size_t size, const uint8_t *in, uint8_t *out, const uint8_t *iv) { (void)cryp; (void)key_id; (void)size; (void)in; (void)out; (void)iv; return CRY_ERR_INV_ALGO; } /** * @brief Decryption operation using AES-CFB. * @note The function operates on data buffers whose lenght is a multiple * of an AES block, this means that padding must be done by the * caller. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] key_id the key to be used for the operation, zero is * the transient key, other values are keys stored * in an unspecified way * @param[in] size size of the plaintext buffer, this number must * be a multiple of the selected key size * @param[in] in buffer containing the input plaintext * @param[out] out buffer for the output cyphertext * @param[in] iv 128 bits initial vector * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_INV_KEY_TYPE the selected key is invalid for this operation. * @retval CRY_ERR_INV_KEY_ID if the specified key identifier is invalid * or refers to an empty key slot. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_decrypt_AES_CFB(CRYDriver *cryp, crykey_t key_id, size_t size, const uint8_t *in, uint8_t *out, const uint8_t *iv) { (void)cryp; (void)key_id; (void)size; (void)in; (void)out; (void)iv; return CRY_ERR_INV_ALGO; } #endif #if (CRY_LLD_SUPPORTS_AES_CTR == TRUE) || defined(__DOXYGEN__) /** * @brief Encryption operation using AES-CTR. * @note The function operates on data buffers whose lenght is a multiple * of an AES block, this means that padding must be done by the * caller. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] key_id the key to be used for the operation, zero is * the transient key, other values are keys stored * in an unspecified way * @param[in] size size of the plaintext buffer, this number must * be a multiple of 16 * @param[in] in buffer containing the input plaintext * @param[out] out buffer for the output cyphertext * @param[in] iv 128 bits initial vector + counter, it contains * a 96 bits IV and a 32 bits counter * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_INV_KEY_TYPE the selected key is invalid for this operation. * @retval CRY_ERR_INV_KEY_ID if the specified key identifier is invalid * or refers to an empty key slot. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_encrypt_AES_CTR(CRYDriver *cryp, crykey_t key_id, size_t size, const uint8_t *in, uint8_t *out, const uint8_t *iv) { (void)cryp; (void)key_id; (void)size; (void)in; (void)out; (void)iv; return CRY_ERR_INV_ALGO; } /** * @brief Decryption operation using AES-CTR. * @note The function operates on data buffers whose lenght is a multiple * of an AES block, this means that padding must be done by the * caller. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] key_id the key to be used for the operation, zero is * the transient key, other values are keys stored * in an unspecified way * @param[in] size size of the plaintext buffer, this number must * be a multiple of 16 * @param[in] in buffer containing the input cyphertext * @param[out] out buffer for the output plaintext * @param[in] iv 128 bits initial vector + counter, it contains * a 96 bits IV and a 32 bits counter * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_INV_KEY_TYPE the selected key is invalid for this operation. * @retval CRY_ERR_INV_KEY_ID if the specified key identifier is invalid * or refers to an empty key slot. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_decrypt_AES_CTR(CRYDriver *cryp, crykey_t key_id, size_t size, const uint8_t *in, uint8_t *out, const uint8_t *iv) { (void)cryp; (void)key_id; (void)size; (void)in; (void)out; (void)iv; return CRY_ERR_INV_ALGO; } #endif #if (CRY_LLD_SUPPORTS_AES_GCM == TRUE) || defined(__DOXYGEN__) /** * @brief Encryption operation using AES-GCM. * @note The function operates on data buffers whose lenght is a multiple * of an AES block, this means that padding must be done by the * caller. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] key_id the key to be used for the operation, zero is * the transient key, other values are keys stored * in an unspecified way * @param[in] auth_size size of the data buffer to be authenticated * @param[in] auth_in buffer containing the data to be authenticated * @param[in] text_size size of the text buffer, this number must be a * multiple of 16 * @param[in] text_in buffer containing the input plaintext * @param[out] text_out buffer for the output cyphertext * @param[in] iv 128 bits input vector * @param[in] tag_size size of the authentication tag, this number * must be between 1 and 16 * @param[out] tag_out buffer for the generated authentication tag * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_INV_KEY_TYPE the selected key is invalid for this operation. * @retval CRY_ERR_INV_KEY_ID if the specified key identifier is invalid * or refers to an empty key slot. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_encrypt_AES_GCM(CRYDriver *cryp, crykey_t key_id, size_t auth_size, const uint8_t *auth_in, size_t text_size, const uint8_t *text_in, uint8_t *text_out, const uint8_t *iv, size_t tag_size, uint8_t *tag_out) { (void)cryp; (void)key_id; (void)auth_size; (void)auth_in; (void)text_size; (void)text_in; (void)text_out; (void)iv; (void)tag_size; (void)tag_out; return CRY_ERR_INV_ALGO; } /** * @brief Decryption operation using AES-GCM. * @note The function operates on data buffers whose lenght is a multiple * of an AES block, this means that padding must be done by the * caller. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] key_id the key to be used for the operation, zero is * the transient key, other values are keys stored * in an unspecified way * @param[in] auth_size size of the data buffer to be authenticated * @param[in] auth_in buffer containing the data to be authenticated * @param[in] text_size size of the text buffer, this number must be a * multiple of 16 * @param[in] text_in buffer containing the input plaintext * @param[out] text_out buffer for the output cyphertext * @param[in] iv 128 bits input vector * @param[in] tag_size size of the authentication tag, this number * must be between 1 and 16 * @param[in] tag_in buffer for the generated authentication tag * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_INV_KEY_TYPE the selected key is invalid for this operation. * @retval CRY_ERR_INV_KEY_ID if the specified key identifier is invalid * or refers to an empty key slot. * @retval CRY_ERR_AUTH_FAILED authentication failed * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_decrypt_AES_GCM(CRYDriver *cryp, crykey_t key_id, size_t auth_size, const uint8_t *auth_in, size_t text_size, const uint8_t *text_in, uint8_t *text_out, const uint8_t *iv, size_t tag_size, const uint8_t *tag_in) { (void)cryp; (void)key_id; (void)auth_size; (void)auth_in; (void)text_size; (void)text_in; (void)text_out; (void)iv; (void)tag_size; (void)tag_in; return CRY_ERR_INV_ALGO; } #endif #if (CRY_LLD_SUPPORTS_DES == TRUE) || defined(__DOXYGEN__) /** * @brief Initializes the DES transient key. * @note It is the underlying implementation to decide which key sizes are * allowable. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] size key size in bytes * @param[in] keyp pointer to the key data * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the algorithm is unsupported. * @retval CRY_ERR_INV_KEY_SIZE if the specified key size is invalid for * the specified algorithm. * * @notapi */ cryerror_t cry_lld_des_loadkey(CRYDriver *cryp, size_t size, const uint8_t *keyp) { osalDbgCheck((cryp != NULL) && (keyp != NULL)); #if CRY_LLD_SUPPORTS_DES == TRUE return cry_lld_des_loadkey(cryp, size, keyp); #elif HAL_CRY_USE_FALLBACK == TRUE return cry_fallback_des_loadkey(cryp, size, keyp); #else (void)cryp; (void)size; (void)keyp; return CRY_ERR_INV_ALGO; #endif } /** * @brief Encryption of a single block using (T)DES. * @note The implementation of this function must guarantee that it can * be called from any context. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] key_id the key to be used for the operation, zero is * the transient key, other values are keys stored * in an unspecified way * @param[in] in buffer containing the input plaintext * @param[out] out buffer for the output cyphertext * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_INV_KEY_TYPE the selected key is invalid for this operation. * @retval CRY_ERR_INV_KEY_ID if the specified key identifier is invalid * or refers to an empty key slot. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_encrypt_DES(CRYDriver *cryp, crykey_t key_id, const uint8_t *in, uint8_t *out) { (void)cryp; (void)key_id; (void)in; (void)out; return CRY_ERR_INV_ALGO; } /** * @brief Decryption of a single block using (T)DES. * @note The implementation of this function must guarantee that it can * be called from any context. * * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] key_id the key to be used for the operation, zero is * the transient key, other values are keys stored * in an unspecified way * @param[in] in buffer containing the input cyphertext * @param[out] out buffer for the output plaintext * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_INV_KEY_TYPE the selected key is invalid for this operation. * @retval CRY_ERR_INV_KEY_ID if the specified key identifier is invalid * or refers to an empty key slot. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_decrypt_DES(CRYDriver *cryp, crykey_t key_id, const uint8_t *in, uint8_t *out) { (void)cryp; (void)key_id; (void)in; (void)out; return CRY_ERR_INV_ALGO; } #endif #if (CRY_LLD_SUPPORTS_DES_ECB == TRUE) || defined(__DOXYGEN__) /** * @brief Encryption operation using (T)DES-ECB. * @note The function operates on data buffers whose length is a multiple * of an DES block, this means that padding must be done by the * caller. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] key_id the key to be used for the operation, zero is * the transient key, other values are keys stored * in an unspecified way * @param[in] size size of the plaintext buffer, this number must * be a multiple of 8 * @param[in] in buffer containing the input plaintext * @param[out] out buffer for the output cyphertext * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_INV_KEY_TYPE the selected key is invalid for this operation. * @retval CRY_ERR_INV_KEY_ID if the specified key identifier is invalid * or refers to an empty key slot. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_encrypt_DES_ECB(CRYDriver *cryp, crykey_t key_id, size_t size, const uint8_t *in, uint8_t *out) { (void)cryp; (void)key_id; (void)size; (void)in; (void)out; return CRY_ERR_INV_ALGO; } /** * @brief Decryption operation using (T)DES-ECB. * @note The function operates on data buffers whose length is a multiple * of an DES block, this means that padding must be done by the * caller. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] key_id the key to be used for the operation, zero is * the transient key, other values are keys stored * in an unspecified way * @param[in] size size of the plaintext buffer, this number must * be a multiple of 8 * @param[in] in buffer containing the input cyphertext * @param[out] out buffer for the output plaintext * @return T he operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_INV_KEY_TYPE the selected key is invalid for this operation. * @retval CRY_ERR_INV_KEY_ID if the specified key identifier is invalid * or refers to an empty key slot. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_decrypt_DES_ECB(CRYDriver *cryp, crykey_t key_id, size_t size, const uint8_t *in, uint8_t *out) { (void)cryp; (void)key_id; (void)size; (void)in; (void)out; return CRY_ERR_INV_ALGO; } #endif #if (CRY_LLD_SUPPORTS_DES_CBC == TRUE) || defined(__DOXYGEN__) /** * @brief Encryption operation using (T)DES-CBC. * @note The function operates on data buffers whose length is a multiple * of an DES block, this means that padding must be done by the * caller. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] key_id the key to be used for the operation, zero is * the transient key, other values are keys stored * in an unspecified way * @param[in] size size of the plaintext buffer, this number must * be a multiple of 8 * @param[in] in buffer containing the input plaintext * @param[out] out buffer for the output cyphertext * @param[in] iv 64 bits input vector * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_INV_KEY_TYPE the selected key is invalid for this operation. * @retval CRY_ERR_INV_KEY_ID if the specified key identifier is invalid * or refers to an empty key slot. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_encrypt_DES_CBC(CRYDriver *cryp, crykey_t key_id, size_t size, const uint8_t *in, uint8_t *out, const uint8_t *iv) { (void)cryp; (void)key_id; (void)size; (void)in; (void)out; (void)iv; return CRY_ERR_INV_ALGO; } /** * @brief Decryption operation using (T)DES-CBC. * @note The function operates on data buffers whose length is a multiple * of an DES block, this means that padding must be done by the * caller. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] key_id the key to be used for the operation, zero is * the transient key, other values are keys stored * in an unspecified way * @param[in] size size of the plaintext buffer, this number must * be a multiple of 8 * @param[in] in buffer containing the input cyphertext * @param[out] out buffer for the output plaintext * @param[in] iv 64 bits input vector * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_INV_KEY_TYPE the selected key is invalid for this operation. * @retval CRY_ERR_INV_KEY_ID if the specified key identifier is invalid * or refers to an empty key slot. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_decrypt_DES_CBC(CRYDriver *cryp, crykey_t key_id, size_t size, const uint8_t *in, uint8_t *out, const uint8_t *iv) { (void)cryp; (void)key_id; (void)size; (void)in; (void)out; (void)iv; return CRY_ERR_INV_ALGO; } #endif #if (CRY_LLD_SUPPORTS_SHA1 == TRUE) || defined(__DOXYGEN__) /** * @brief Hash initialization using SHA1. * @note Use of this algorithm is not recommended because proven weak. * * @param[in] cryp pointer to the @p CRYDriver object * @param[out] sha1ctxp pointer to a SHA1 context to be initialized * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_SHA1_init(CRYDriver *cryp, SHA1Context *sha1ctxp) { (void)cryp; (void)sha1ctxp; return CRY_ERR_INV_ALGO; } /** * @brief Hash update using SHA1. * @note Use of this algorithm is not recommended because proven weak. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] sha1ctxp pointer to a SHA1 context * @param[in] size size of input buffer * @param[in] in buffer containing the input text * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_SHA1_update(CRYDriver *cryp, SHA1Context *sha1ctxp, size_t size, const uint8_t *in) { (void)cryp; (void)sha1ctxp; (void)size; (void)in; return CRY_ERR_INV_ALGO; } /** * @brief Hash finalization using SHA1. * @note Use of this algorithm is not recommended because proven weak. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] sha1ctxp pointer to a SHA1 context * @param[out] out 160 bits output buffer * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_SHA1_final(CRYDriver *cryp, SHA1Context *sha1ctxp, uint8_t *out) { (void)cryp; (void)sha1ctxp; (void)out; return CRY_ERR_INV_ALGO; } #endif #if (CRY_LLD_SUPPORTS_SHA256 == TRUE) || defined(__DOXYGEN__) /** * @brief Hash initialization using SHA256. * * @param[in] cryp pointer to the @p CRYDriver object * @param[out] sha256ctxp pointer to a SHA256 context to be initialized * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_SHA256_init(CRYDriver *cryp, SHA256Context *sha256ctxp) { (void)cryp; /* Initializing context structure.*/ sha256ctxp->last_data = 0U; sha256ctxp->last_size = 0U; /* Initializing operation.*/ HASH->CR = /*HASH_CR_MDMAT |*/ HASH_CR_ALGO_1 | HASH_CR_ALGO_0 | HASH_CR_DATATYPE_1 | HASH_CR_INIT; return CRY_NOERROR; } /** * @brief Hash update using SHA256. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] sha256ctxp pointer to a SHA256 context * @param[in] size size of input buffer * @param[in] in buffer containing the input text * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_SHA256_update(CRYDriver *cryp, SHA256Context *sha256ctxp, size_t size, const uint8_t *in) { const uint32_t *wp = (const uint32_t *)(const void *)in; /* This HW is unable to hash blocks that are not a multiple of 4 bytes except for the last block in the stream which is handled in the "final" function.*/ if (sha256ctxp->last_size != 0U) { return CRY_ERR_OP_FAILURE; } /* Any unaligned data is deferred to the "final" function.*/ sha256ctxp->last_size = 8U * (size % sizeof (uint32_t)); if (sha256ctxp->last_size > 0U) { sha256ctxp->last_data = wp[size / sizeof (uint32_t)]; } /* Pushing data.*/ cry_lld_hash_push(cryp, (uint32_t)(size / sizeof (uint32_t)), wp); return CRY_NOERROR; } /** * @brief Hash finalization using SHA256. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] sha256ctxp pointer to a SHA256 context * @param[out] out 256 bits output buffer * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_SHA256_final(CRYDriver *cryp, SHA256Context *sha256ctxp, uint8_t *out) { uint32_t digest[8]; (void)cryp; if (sha256ctxp->last_size > 0U) { HASH->DIN = sha256ctxp->last_data; } /* Triggering final calculation and wait for result.*/ HASH->SR = 0U; HASH->STR = sha256ctxp->last_size; HASH->STR = sha256ctxp->last_size | HASH_STR_DCAL; while ((HASH->SR & HASH_SR_DCIS) == 0U) { } /* Reading digest.*/ digest[0] = HASH_DIGEST->HR[0]; digest[1] = HASH_DIGEST->HR[1]; digest[2] = HASH_DIGEST->HR[2]; digest[3] = HASH_DIGEST->HR[3]; digest[4] = HASH_DIGEST->HR[4]; digest[5] = HASH_DIGEST->HR[5]; digest[6] = HASH_DIGEST->HR[6]; digest[7] = HASH_DIGEST->HR[7]; memcpy((void *)out, (const void *)digest, sizeof digest); return CRY_NOERROR; } #endif #if (CRY_LLD_SUPPORTS_SHA512 == TRUE) || defined(__DOXYGEN__) /** * @brief Hash initialization using SHA512. * * @param[in] cryp pointer to the @p CRYDriver object * @param[out] sha512ctxp pointer to a SHA512 context to be initialized * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_SHA512_init(CRYDriver *cryp, SHA512Context *sha512ctxp) { (void)cryp; (void)sha512ctxp; return CRY_ERR_INV_ALGO; } /** * @brief Hash update using SHA512. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] sha512ctxp pointer to a SHA512 context * @param[in] size size of input buffer * @param[in] in buffer containing the input text * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_SHA512_update(CRYDriver *cryp, SHA512Context *sha512ctxp, size_t size, const uint8_t *in) { (void)cryp; (void)sha512ctxp; (void)size; (void)in; return CRY_ERR_INV_ALGO; } /** * @brief Hash finalization using SHA512. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] sha512ctxp pointer to a SHA512 context * @param[out] out 512 bits output buffer * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_SHA512_final(CRYDriver *cryp, SHA512Context *sha512ctxp, uint8_t *out) { (void)cryp; (void)sha512ctxp; (void)out; return CRY_ERR_INV_ALGO; } #endif #if (CRY_LLD_SUPPORTS_HMAC_SHA256 == TRUE) || defined(__DOXYGEN__) /** * @brief Initializes the HMAC transient key. * @note It is the underlying implementation to decide which key sizes are * allowable. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] size key size in bytes * @param[in] keyp pointer to the key data * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the algorithm is unsupported. * @retval CRY_ERR_INV_KEY_SIZE if the specified key size is invalid for * the specified algorithm. * * @notapi */ cryerror_t cry_lld_hmac_loadkey(CRYDriver *cryp, size_t size, const uint8_t *keyp) { osalDbgCheck((cryp != NULL) && (keyp != NULL)); #if (CRY_LLD_SUPPORTS_HMAC_SHA256 == TRUE) || \ (CRY_LLD_SUPPORTS_HMAC_SHA512 == TRUE) return cry_lld_hmac_loadkey(cryp, size, keyp); #elif HAL_CRY_USE_FALLBACK == TRUE return cry_fallback_hmac_loadkey(cryp, size, keyp); #else (void)cryp; (void)size; (void)keyp; return CRY_ERR_INV_ALGO; #endif } /** * @brief Hash initialization using HMAC_SHA256. * * @param[in] cryp pointer to the @p CRYDriver object * @param[out] hmacsha256ctxp pointer to a HMAC_SHA256 context to be * initialized * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_HMACSHA256_init(CRYDriver *cryp, HMACSHA256Context *hmacsha256ctxp) { (void)cryp; (void)hmacsha256ctxp; return CRY_ERR_INV_ALGO; } /** * @brief Hash update using HMAC. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] hmacsha256ctxp pointer to a HMAC_SHA256 context * @param[in] size size of input buffer * @param[in] in buffer containing the input text * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_HMACSHA256_update(CRYDriver *cryp, HMACSHA256Context *hmacsha256ctxp, size_t size, const uint8_t *in) { (void)cryp; (void)hmacsha256ctxp; (void)size; (void)in; return CRY_ERR_INV_ALGO; } /** * @brief Hash finalization using HMAC. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] hmacsha256ctxp pointer to a HMAC_SHA256 context * @param[out] out 256 bits output buffer * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_HMACSHA256_final(CRYDriver *cryp, HMACSHA256Context *hmacsha256ctxp, uint8_t *out) { (void)cryp; (void)hmacsha256ctxp; (void)out; return CRY_ERR_INV_ALGO; } #endif #if (CRY_LLD_SUPPORTS_HMAC_SHA512 == TRUE) || defined(__DOXYGEN__) /** * @brief Hash initialization using HMAC_SHA512. * * @param[in] cryp pointer to the @p CRYDriver object * @param[out] hmacsha512ctxp pointer to a HMAC_SHA512 context to be * initialized * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_HMACSHA512_init(CRYDriver *cryp, HMACSHA512Context *hmacsha512ctxp) { (void)cryp; (void)hmacsha512ctxp; return CRY_ERR_INV_ALGO; } /** * @brief Hash update using HMAC. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] hmacsha512ctxp pointer to a HMAC_SHA512 context * @param[in] size size of input buffer * @param[in] in buffer containing the input text * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_HMACSHA512_update(CRYDriver *cryp, HMACSHA512Context *hmacsha512ctxp, size_t size, const uint8_t *in) { (void)cryp; (void)hmacsha512ctxp; (void)size; (void)in; return CRY_ERR_INV_ALGO; } /** * @brief Hash finalization using HMAC. * * @param[in] cryp pointer to the @p CRYDriver object * @param[in] hmacsha512ctxp pointer to a HMAC_SHA512 context * @param[out] out 512 bits output buffer * @return The operation status. * @retval CRY_NOERROR if the operation succeeded. * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this * device instance. * @retval CRY_ERR_OP_FAILURE if the operation failed, implementation * dependent. * * @notapi */ cryerror_t cry_lld_HMACSHA512_final(CRYDriver *cryp, HMACSHA512Context *hmacsha512ctxp, uint8_t *out) { (void)cryp; (void)hmacsha512ctxp; (void)out; return CRY_ERR_INV_ALGO; } #endif #endif /* HAL_USE_CRY == TRUE */ /** @} */