1*96098f01SJens Wiklander // SPDX-License-Identifier: BSD-2-Clause 2*96098f01SJens Wiklander /* 3*96098f01SJens Wiklander * Copyright (c) 2014-2019, Linaro Limited 4*96098f01SJens Wiklander */ 5*96098f01SJens Wiklander 6*96098f01SJens Wiklander #include <assert.h> 7*96098f01SJens Wiklander #include <crypto/crypto.h> 8*96098f01SJens Wiklander #include <crypto/crypto_impl.h> 9*96098f01SJens Wiklander #include <stdlib.h> 10*96098f01SJens Wiklander #include <tee_api_types.h> 11*96098f01SJens Wiklander #include <tomcrypt.h> 12*96098f01SJens Wiklander #include <util.h> 13*96098f01SJens Wiklander 14*96098f01SJens Wiklander struct ltc_ctr_ctx { 15*96098f01SJens Wiklander struct crypto_cipher_ctx ctx; 16*96098f01SJens Wiklander int cipher_idx; 17*96098f01SJens Wiklander int (*update)(const unsigned char *src, unsigned char *dst, 18*96098f01SJens Wiklander unsigned long len, symmetric_CTR *ctr); 19*96098f01SJens Wiklander symmetric_CTR state; 20*96098f01SJens Wiklander }; 21*96098f01SJens Wiklander 22*96098f01SJens Wiklander static const struct crypto_cipher_ops ltc_ctr_ops; 23*96098f01SJens Wiklander 24*96098f01SJens Wiklander static struct ltc_ctr_ctx *to_ctr_ctx(struct crypto_cipher_ctx *ctx) 25*96098f01SJens Wiklander { 26*96098f01SJens Wiklander assert(ctx && ctx->ops == <c_ctr_ops); 27*96098f01SJens Wiklander 28*96098f01SJens Wiklander return container_of(ctx, struct ltc_ctr_ctx, ctx); 29*96098f01SJens Wiklander } 30*96098f01SJens Wiklander 31*96098f01SJens Wiklander static TEE_Result ltc_ctr_init(struct crypto_cipher_ctx *ctx, 32*96098f01SJens Wiklander TEE_OperationMode mode, const uint8_t *key1, 33*96098f01SJens Wiklander size_t key1_len, const uint8_t *key2 __unused, 34*96098f01SJens Wiklander size_t key2_len __unused, 35*96098f01SJens Wiklander const uint8_t *iv __unused, 36*96098f01SJens Wiklander size_t iv_len __unused) 37*96098f01SJens Wiklander { 38*96098f01SJens Wiklander struct ltc_ctr_ctx *c = to_ctr_ctx(ctx); 39*96098f01SJens Wiklander 40*96098f01SJens Wiklander if ((int)iv_len != cipher_descriptor[c->cipher_idx]->block_length) 41*96098f01SJens Wiklander return TEE_ERROR_BAD_PARAMETERS; 42*96098f01SJens Wiklander 43*96098f01SJens Wiklander if (mode == TEE_MODE_ENCRYPT) 44*96098f01SJens Wiklander c->update = ctr_encrypt; 45*96098f01SJens Wiklander else 46*96098f01SJens Wiklander c->update = ctr_decrypt; 47*96098f01SJens Wiklander 48*96098f01SJens Wiklander if (ctr_start(c->cipher_idx, iv, key1, key1_len, 0, 49*96098f01SJens Wiklander CTR_COUNTER_BIG_ENDIAN, &c->state) == CRYPT_OK) 50*96098f01SJens Wiklander return TEE_SUCCESS; 51*96098f01SJens Wiklander else 52*96098f01SJens Wiklander return TEE_ERROR_BAD_STATE; 53*96098f01SJens Wiklander } 54*96098f01SJens Wiklander 55*96098f01SJens Wiklander static TEE_Result ltc_ctr_update(struct crypto_cipher_ctx *ctx, 56*96098f01SJens Wiklander bool last_block __unused, 57*96098f01SJens Wiklander const uint8_t *data, size_t len, uint8_t *dst) 58*96098f01SJens Wiklander { 59*96098f01SJens Wiklander struct ltc_ctr_ctx *c = to_ctr_ctx(ctx); 60*96098f01SJens Wiklander 61*96098f01SJens Wiklander if (c->update && c->update(data, dst, len, &c->state) == CRYPT_OK) 62*96098f01SJens Wiklander return TEE_SUCCESS; 63*96098f01SJens Wiklander else 64*96098f01SJens Wiklander return TEE_ERROR_BAD_STATE; 65*96098f01SJens Wiklander } 66*96098f01SJens Wiklander 67*96098f01SJens Wiklander static void ltc_ctr_final(struct crypto_cipher_ctx *ctx) 68*96098f01SJens Wiklander { 69*96098f01SJens Wiklander ctr_done(&to_ctr_ctx(ctx)->state); 70*96098f01SJens Wiklander } 71*96098f01SJens Wiklander 72*96098f01SJens Wiklander static void ltc_ctr_free_ctx(struct crypto_cipher_ctx *ctx) 73*96098f01SJens Wiklander { 74*96098f01SJens Wiklander free(to_ctr_ctx(ctx)); 75*96098f01SJens Wiklander } 76*96098f01SJens Wiklander 77*96098f01SJens Wiklander static void ltc_ctr_copy_state(struct crypto_cipher_ctx *dst_ctx, 78*96098f01SJens Wiklander struct crypto_cipher_ctx *src_ctx) 79*96098f01SJens Wiklander { 80*96098f01SJens Wiklander struct ltc_ctr_ctx *src = to_ctr_ctx(src_ctx); 81*96098f01SJens Wiklander struct ltc_ctr_ctx *dst = to_ctr_ctx(dst_ctx); 82*96098f01SJens Wiklander 83*96098f01SJens Wiklander assert(src->cipher_idx == dst->cipher_idx); 84*96098f01SJens Wiklander dst->update = src->update; 85*96098f01SJens Wiklander dst->state = src->state; 86*96098f01SJens Wiklander } 87*96098f01SJens Wiklander 88*96098f01SJens Wiklander static const struct crypto_cipher_ops ltc_ctr_ops = { 89*96098f01SJens Wiklander .init = ltc_ctr_init, 90*96098f01SJens Wiklander .update = ltc_ctr_update, 91*96098f01SJens Wiklander .final = ltc_ctr_final, 92*96098f01SJens Wiklander .free_ctx = ltc_ctr_free_ctx, 93*96098f01SJens Wiklander .copy_state = ltc_ctr_copy_state, 94*96098f01SJens Wiklander }; 95*96098f01SJens Wiklander 96*96098f01SJens Wiklander TEE_Result crypto_aes_ctr_alloc_ctx(struct crypto_cipher_ctx **ctx_ret) 97*96098f01SJens Wiklander { 98*96098f01SJens Wiklander struct ltc_ctr_ctx *c = NULL; 99*96098f01SJens Wiklander int cipher_idx = find_cipher("aes"); 100*96098f01SJens Wiklander 101*96098f01SJens Wiklander if (cipher_idx < 0) 102*96098f01SJens Wiklander return TEE_ERROR_NOT_SUPPORTED; 103*96098f01SJens Wiklander 104*96098f01SJens Wiklander c = calloc(1, sizeof(*c)); 105*96098f01SJens Wiklander if (!c) 106*96098f01SJens Wiklander return TEE_ERROR_OUT_OF_MEMORY; 107*96098f01SJens Wiklander 108*96098f01SJens Wiklander c->ctx.ops = <c_ctr_ops; 109*96098f01SJens Wiklander c->cipher_idx = cipher_idx; 110*96098f01SJens Wiklander *ctx_ret = &c->ctx; 111*96098f01SJens Wiklander 112*96098f01SJens Wiklander return TEE_SUCCESS; 113*96098f01SJens Wiklander } 114