xref: /optee_os/lib/libmbedtls/core/des3_cbc.c (revision d2e5e90e5e4f73d7284b312e47726d1f8379c16e)
1*d2e5e90eSEdison Ai // SPDX-License-Identifier: BSD-2-Clause
2*d2e5e90eSEdison Ai /*
3*d2e5e90eSEdison Ai  * Copyright (C) 2019, Linaro Limited
4*d2e5e90eSEdison Ai  */
5*d2e5e90eSEdison Ai 
6*d2e5e90eSEdison Ai #include <assert.h>
7*d2e5e90eSEdison Ai #include <compiler.h>
8*d2e5e90eSEdison Ai #include <crypto/crypto.h>
9*d2e5e90eSEdison Ai #include <crypto/crypto_impl.h>
10*d2e5e90eSEdison Ai #include <mbedtls/des.h>
11*d2e5e90eSEdison Ai #include <stdlib.h>
12*d2e5e90eSEdison Ai #include <string.h>
13*d2e5e90eSEdison Ai #include <tee_api_types.h>
14*d2e5e90eSEdison Ai #include <utee_defines.h>
15*d2e5e90eSEdison Ai #include <util.h>
16*d2e5e90eSEdison Ai 
17*d2e5e90eSEdison Ai struct mbed_des3_cbc_ctx {
18*d2e5e90eSEdison Ai 	struct crypto_cipher_ctx ctx;
19*d2e5e90eSEdison Ai 	int mbed_mode;
20*d2e5e90eSEdison Ai 	mbedtls_des3_context des3_ctx;
21*d2e5e90eSEdison Ai 	unsigned char iv[TEE_DES_BLOCK_SIZE];
22*d2e5e90eSEdison Ai };
23*d2e5e90eSEdison Ai 
24*d2e5e90eSEdison Ai static const struct crypto_cipher_ops mbed_des3_cbc_ops;
25*d2e5e90eSEdison Ai 
to_des3_cbc_ctx(struct crypto_cipher_ctx * ctx)26*d2e5e90eSEdison Ai static struct mbed_des3_cbc_ctx *to_des3_cbc_ctx(struct crypto_cipher_ctx *ctx)
27*d2e5e90eSEdison Ai {
28*d2e5e90eSEdison Ai 	assert(ctx && ctx->ops == &mbed_des3_cbc_ops);
29*d2e5e90eSEdison Ai 
30*d2e5e90eSEdison Ai 	return container_of(ctx, struct mbed_des3_cbc_ctx, ctx);
31*d2e5e90eSEdison Ai }
32*d2e5e90eSEdison Ai 
mbed_des3_cbc_init(struct crypto_cipher_ctx * ctx,TEE_OperationMode mode,const uint8_t * key1,size_t key1_len,const uint8_t * key2 __unused,size_t key2_len __unused,const uint8_t * iv __unused,size_t iv_len __unused)33*d2e5e90eSEdison Ai static TEE_Result mbed_des3_cbc_init(struct crypto_cipher_ctx *ctx,
34*d2e5e90eSEdison Ai 				     TEE_OperationMode mode,
35*d2e5e90eSEdison Ai 				     const uint8_t *key1, size_t key1_len,
36*d2e5e90eSEdison Ai 				     const uint8_t *key2 __unused,
37*d2e5e90eSEdison Ai 				     size_t key2_len __unused,
38*d2e5e90eSEdison Ai 				     const uint8_t *iv __unused,
39*d2e5e90eSEdison Ai 				     size_t iv_len  __unused)
40*d2e5e90eSEdison Ai {
41*d2e5e90eSEdison Ai 	struct mbed_des3_cbc_ctx *c = to_des3_cbc_ctx(ctx);
42*d2e5e90eSEdison Ai 	int mbed_res = 0;
43*d2e5e90eSEdison Ai 
44*d2e5e90eSEdison Ai 	if (key1_len != MBEDTLS_DES_KEY_SIZE * 2 &&
45*d2e5e90eSEdison Ai 	    key1_len != MBEDTLS_DES_KEY_SIZE * 3)
46*d2e5e90eSEdison Ai 		return TEE_ERROR_BAD_PARAMETERS;
47*d2e5e90eSEdison Ai 	if (iv_len != sizeof(c->iv))
48*d2e5e90eSEdison Ai 		return TEE_ERROR_BAD_PARAMETERS;
49*d2e5e90eSEdison Ai 	memcpy(c->iv, iv, sizeof(c->iv));
50*d2e5e90eSEdison Ai 
51*d2e5e90eSEdison Ai 	mbedtls_des3_init(&c->des3_ctx);
52*d2e5e90eSEdison Ai 
53*d2e5e90eSEdison Ai 	if (mode == TEE_MODE_ENCRYPT) {
54*d2e5e90eSEdison Ai 		c->mbed_mode = MBEDTLS_DES_ENCRYPT;
55*d2e5e90eSEdison Ai 		if (key1_len == MBEDTLS_DES_KEY_SIZE * 3)
56*d2e5e90eSEdison Ai 			mbed_res = mbedtls_des3_set3key_enc(&c->des3_ctx, key1);
57*d2e5e90eSEdison Ai 		else
58*d2e5e90eSEdison Ai 			mbed_res = mbedtls_des3_set2key_enc(&c->des3_ctx, key1);
59*d2e5e90eSEdison Ai 	} else {
60*d2e5e90eSEdison Ai 		c->mbed_mode = MBEDTLS_DES_DECRYPT;
61*d2e5e90eSEdison Ai 		if (key1_len == MBEDTLS_DES_KEY_SIZE * 3)
62*d2e5e90eSEdison Ai 			mbed_res = mbedtls_des3_set3key_dec(&c->des3_ctx, key1);
63*d2e5e90eSEdison Ai 		else
64*d2e5e90eSEdison Ai 			mbed_res = mbedtls_des3_set2key_dec(&c->des3_ctx, key1);
65*d2e5e90eSEdison Ai 	}
66*d2e5e90eSEdison Ai 
67*d2e5e90eSEdison Ai 	if (mbed_res)
68*d2e5e90eSEdison Ai 		return TEE_ERROR_BAD_STATE;
69*d2e5e90eSEdison Ai 
70*d2e5e90eSEdison Ai 	return TEE_SUCCESS;
71*d2e5e90eSEdison Ai }
72*d2e5e90eSEdison Ai 
mbed_des3_cbc_update(struct crypto_cipher_ctx * ctx,bool last_block __unused,const uint8_t * data,size_t len,uint8_t * dst)73*d2e5e90eSEdison Ai static TEE_Result mbed_des3_cbc_update(struct crypto_cipher_ctx *ctx,
74*d2e5e90eSEdison Ai 				       bool last_block __unused,
75*d2e5e90eSEdison Ai 				       const uint8_t *data, size_t len,
76*d2e5e90eSEdison Ai 				       uint8_t *dst)
77*d2e5e90eSEdison Ai {
78*d2e5e90eSEdison Ai 	struct mbed_des3_cbc_ctx *c = to_des3_cbc_ctx(ctx);
79*d2e5e90eSEdison Ai 
80*d2e5e90eSEdison Ai 	if (mbedtls_des3_crypt_cbc(&c->des3_ctx, c->mbed_mode, len, c->iv,
81*d2e5e90eSEdison Ai 				   data, dst))
82*d2e5e90eSEdison Ai 		return TEE_ERROR_BAD_STATE;
83*d2e5e90eSEdison Ai 
84*d2e5e90eSEdison Ai 	return TEE_SUCCESS;
85*d2e5e90eSEdison Ai }
86*d2e5e90eSEdison Ai 
mbed_des3_cbc_final(struct crypto_cipher_ctx * ctx)87*d2e5e90eSEdison Ai static void mbed_des3_cbc_final(struct crypto_cipher_ctx *ctx)
88*d2e5e90eSEdison Ai {
89*d2e5e90eSEdison Ai 	mbedtls_des3_free(&to_des3_cbc_ctx(ctx)->des3_ctx);
90*d2e5e90eSEdison Ai }
91*d2e5e90eSEdison Ai 
mbed_des3_cbc_free_ctx(struct crypto_cipher_ctx * ctx)92*d2e5e90eSEdison Ai static void mbed_des3_cbc_free_ctx(struct crypto_cipher_ctx *ctx)
93*d2e5e90eSEdison Ai {
94*d2e5e90eSEdison Ai 	free(to_des3_cbc_ctx(ctx));
95*d2e5e90eSEdison Ai }
96*d2e5e90eSEdison Ai 
mbed_des3_cbc_copy_state(struct crypto_cipher_ctx * dst_ctx,struct crypto_cipher_ctx * src_ctx)97*d2e5e90eSEdison Ai static void mbed_des3_cbc_copy_state(struct crypto_cipher_ctx *dst_ctx,
98*d2e5e90eSEdison Ai 				     struct crypto_cipher_ctx *src_ctx)
99*d2e5e90eSEdison Ai {
100*d2e5e90eSEdison Ai 	struct mbed_des3_cbc_ctx *src = to_des3_cbc_ctx(src_ctx);
101*d2e5e90eSEdison Ai 	struct mbed_des3_cbc_ctx *dst = to_des3_cbc_ctx(dst_ctx);
102*d2e5e90eSEdison Ai 
103*d2e5e90eSEdison Ai 	memcpy(dst->iv, src->iv, sizeof(dst->iv));
104*d2e5e90eSEdison Ai 	dst->mbed_mode = src->mbed_mode;
105*d2e5e90eSEdison Ai 	dst->des3_ctx = src->des3_ctx;
106*d2e5e90eSEdison Ai }
107*d2e5e90eSEdison Ai 
108*d2e5e90eSEdison Ai static const struct crypto_cipher_ops mbed_des3_cbc_ops = {
109*d2e5e90eSEdison Ai 	.init = mbed_des3_cbc_init,
110*d2e5e90eSEdison Ai 	.update = mbed_des3_cbc_update,
111*d2e5e90eSEdison Ai 	.final = mbed_des3_cbc_final,
112*d2e5e90eSEdison Ai 	.free_ctx = mbed_des3_cbc_free_ctx,
113*d2e5e90eSEdison Ai 	.copy_state = mbed_des3_cbc_copy_state,
114*d2e5e90eSEdison Ai };
115*d2e5e90eSEdison Ai 
crypto_des3_cbc_alloc_ctx(struct crypto_cipher_ctx ** ctx_ret)116*d2e5e90eSEdison Ai TEE_Result crypto_des3_cbc_alloc_ctx(struct crypto_cipher_ctx **ctx_ret)
117*d2e5e90eSEdison Ai {
118*d2e5e90eSEdison Ai 	struct mbed_des3_cbc_ctx *c = NULL;
119*d2e5e90eSEdison Ai 
120*d2e5e90eSEdison Ai 	c = calloc(1, sizeof(*c));
121*d2e5e90eSEdison Ai 	if (!c)
122*d2e5e90eSEdison Ai 		return TEE_ERROR_OUT_OF_MEMORY;
123*d2e5e90eSEdison Ai 
124*d2e5e90eSEdison Ai 	c->ctx.ops = &mbed_des3_cbc_ops;
125*d2e5e90eSEdison Ai 	*ctx_ret = &c->ctx;
126*d2e5e90eSEdison Ai 
127*d2e5e90eSEdison Ai 	return TEE_SUCCESS;
128*d2e5e90eSEdison Ai }
129