2012-04-05 11:54:58 +00:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2011 The Chromium OS Authors.
|
|
|
|
* (C) Copyright 2010 - 2011 NVIDIA Corporation <www.nvidia.com>
|
|
|
|
*
|
2013-07-08 07:37:19 +00:00
|
|
|
* SPDX-License-Identifier: GPL-2.0+
|
2012-04-05 11:54:58 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef _AES_REF_H_
|
|
|
|
#define _AES_REF_H_
|
|
|
|
|
2014-03-05 18:59:52 +00:00
|
|
|
#ifdef USE_HOSTCC
|
|
|
|
/* Define compat stuff for use in fw_* tools. */
|
|
|
|
typedef unsigned char u8;
|
|
|
|
typedef unsigned int u32;
|
|
|
|
#define debug(...) do {} while (0)
|
|
|
|
#endif
|
|
|
|
|
2012-04-05 11:54:58 +00:00
|
|
|
/*
|
|
|
|
* AES encryption library, with small code size, supporting only 128-bit AES
|
|
|
|
*
|
|
|
|
* AES is a stream cipher which works a block at a time, with each block
|
|
|
|
* in this case being AES_KEY_LENGTH bytes.
|
|
|
|
*/
|
|
|
|
|
|
|
|
enum {
|
|
|
|
AES_STATECOLS = 4, /* columns in the state & expanded key */
|
|
|
|
AES_KEYCOLS = 4, /* columns in a key */
|
|
|
|
AES_ROUNDS = 10, /* rounds in encryption */
|
|
|
|
|
|
|
|
AES_KEY_LENGTH = 128 / 8,
|
|
|
|
AES_EXPAND_KEY_LENGTH = 4 * AES_STATECOLS * (AES_ROUNDS + 1),
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
2014-03-05 18:58:36 +00:00
|
|
|
* aes_expand_key() - Expand the AES key
|
|
|
|
*
|
2012-04-05 11:54:58 +00:00
|
|
|
* Expand a key into a key schedule, which is then used for the other
|
|
|
|
* operations.
|
|
|
|
*
|
2014-03-05 18:58:36 +00:00
|
|
|
* @key Key, of length AES_KEY_LENGTH bytes
|
|
|
|
* @expkey Buffer to place expanded key, AES_EXPAND_KEY_LENGTH
|
2012-04-05 11:54:58 +00:00
|
|
|
*/
|
|
|
|
void aes_expand_key(u8 *key, u8 *expkey);
|
|
|
|
|
|
|
|
/**
|
2014-03-05 18:58:36 +00:00
|
|
|
* aes_encrypt() - Encrypt single block of data with AES 128
|
2012-04-05 11:54:58 +00:00
|
|
|
*
|
2014-03-05 18:58:36 +00:00
|
|
|
* @in Input data
|
|
|
|
* @expkey Expanded key to use for encryption (from aes_expand_key())
|
|
|
|
* @out Output data
|
2012-04-05 11:54:58 +00:00
|
|
|
*/
|
|
|
|
void aes_encrypt(u8 *in, u8 *expkey, u8 *out);
|
|
|
|
|
|
|
|
/**
|
2014-03-05 18:58:36 +00:00
|
|
|
* aes_decrypt() - Decrypt single block of data with AES 128
|
2012-04-05 11:54:58 +00:00
|
|
|
*
|
2014-03-05 18:58:36 +00:00
|
|
|
* @in Input data
|
|
|
|
* @expkey Expanded key to use for decryption (from aes_expand_key())
|
|
|
|
* @out Output data
|
2012-04-05 11:54:58 +00:00
|
|
|
*/
|
|
|
|
void aes_decrypt(u8 *in, u8 *expkey, u8 *out);
|
|
|
|
|
2014-04-18 16:28:58 +00:00
|
|
|
/**
|
|
|
|
* Apply chain data to the destination using EOR
|
|
|
|
*
|
|
|
|
* Each array is of length AES_KEY_LENGTH.
|
|
|
|
*
|
|
|
|
* @cbc_chain_data Chain data
|
|
|
|
* @src Source data
|
|
|
|
* @dst Destination data, which is modified here
|
|
|
|
*/
|
|
|
|
void aes_apply_cbc_chain_data(u8 *cbc_chain_data, u8 *src, u8 *dst);
|
|
|
|
|
2014-03-05 18:58:37 +00:00
|
|
|
/**
|
|
|
|
* aes_cbc_encrypt_blocks() - Encrypt multiple blocks of data with AES CBC.
|
|
|
|
*
|
|
|
|
* @key_exp Expanded key to use
|
2018-01-03 12:43:56 +00:00
|
|
|
* @iv Initialization vector
|
2014-03-05 18:58:37 +00:00
|
|
|
* @src Source data to encrypt
|
|
|
|
* @dst Destination buffer
|
|
|
|
* @num_aes_blocks Number of AES blocks to encrypt
|
|
|
|
*/
|
2018-01-03 12:43:56 +00:00
|
|
|
void aes_cbc_encrypt_blocks(u8 *key_exp, u8 *iv, u8 *src, u8 *dst,
|
|
|
|
u32 num_aes_blocks);
|
2014-03-05 18:58:37 +00:00
|
|
|
|
2014-03-05 18:58:38 +00:00
|
|
|
/**
|
|
|
|
* Decrypt multiple blocks of data with AES CBC.
|
|
|
|
*
|
|
|
|
* @key_exp Expanded key to use
|
2018-01-03 12:43:56 +00:00
|
|
|
* @iv Initialization vector
|
2014-03-05 18:58:38 +00:00
|
|
|
* @src Source data to decrypt
|
|
|
|
* @dst Destination buffer
|
|
|
|
* @num_aes_blocks Number of AES blocks to decrypt
|
|
|
|
*/
|
2018-01-03 12:43:56 +00:00
|
|
|
void aes_cbc_decrypt_blocks(u8 *key_exp, u8 *iv, u8 *src, u8 *dst,
|
|
|
|
u32 num_aes_blocks);
|
2014-03-05 18:58:38 +00:00
|
|
|
|
2012-04-05 11:54:58 +00:00
|
|
|
#endif /* _AES_REF_H_ */
|