mirror of
https://github.com/espressif/esp-idf.git
synced 2024-10-05 20:47:46 -04:00
900df44546
wpa_supplicant is using MbedTLS API's for crypto algorithms. For calling them a duplicate set of modules is maintained prepended with 'fast_'. Remove these and use flag USE_MBEDTLS_CRYPTO instead to separate modules calling MbedTLS API's from native implementation.
171 lines
4.2 KiB
C
171 lines
4.2 KiB
C
/*
|
|
* AES-128 CBC
|
|
*
|
|
* Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* Alternatively, this software may be distributed under the terms of BSD
|
|
* license.
|
|
*
|
|
* See README and COPYING for more details.
|
|
*/
|
|
/*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Hardware crypto support Copyright 2017-2019 Espressif Systems (Shanghai) PTE LTD
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include "utils/includes.h"
|
|
|
|
#include "utils/common.h"
|
|
#include "crypto/aes.h"
|
|
#include "crypto/aes_wrap.h"
|
|
|
|
#ifdef USE_MBEDTLS_CRYPTO
|
|
#include "mbedtls/aes.h"
|
|
|
|
/**
|
|
* aes_128_cbc_encrypt - AES-128 CBC encryption
|
|
* @key: Encryption key
|
|
* @iv: Encryption IV for CBC mode (16 bytes)
|
|
* @data: Data to encrypt in-place
|
|
* @data_len: Length of data in bytes (must be divisible by 16)
|
|
* Returns: 0 on success, -1 on failure
|
|
*/
|
|
int
|
|
aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len)
|
|
{
|
|
int ret = 0;
|
|
mbedtls_aes_context ctx;
|
|
u8 cbc[AES_BLOCK_SIZE];
|
|
|
|
mbedtls_aes_init(&ctx);
|
|
|
|
ret = mbedtls_aes_setkey_enc(&ctx, key, 128);
|
|
if(ret < 0) {
|
|
mbedtls_aes_free(&ctx);
|
|
return ret;
|
|
}
|
|
|
|
os_memcpy(cbc, iv, AES_BLOCK_SIZE);
|
|
ret = mbedtls_aes_crypt_cbc(&ctx, MBEDTLS_AES_ENCRYPT, data_len, cbc, data, data);
|
|
mbedtls_aes_free(&ctx);
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
/**
|
|
* aes_128_cbc_decrypt - AES-128 CBC decryption
|
|
* @key: Decryption key
|
|
* @iv: Decryption IV for CBC mode (16 bytes)
|
|
* @data: Data to decrypt in-place
|
|
* @data_len: Length of data in bytes (must be divisible by 16)
|
|
* Returns: 0 on success, -1 on failure
|
|
*/
|
|
int
|
|
aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len)
|
|
{
|
|
int ret = 0;
|
|
mbedtls_aes_context ctx;
|
|
u8 cbc[AES_BLOCK_SIZE];
|
|
|
|
mbedtls_aes_init(&ctx);
|
|
|
|
ret = mbedtls_aes_setkey_dec(&ctx, key, 128);
|
|
if(ret < 0) {
|
|
mbedtls_aes_free(&ctx);
|
|
return ret;
|
|
}
|
|
|
|
os_memcpy(cbc, iv, AES_BLOCK_SIZE);
|
|
ret = mbedtls_aes_crypt_cbc(&ctx, MBEDTLS_AES_DECRYPT, data_len, cbc, data, data);
|
|
mbedtls_aes_free(&ctx);
|
|
|
|
return ret;
|
|
|
|
}
|
|
#else /* USE_MBEDTLS_CRYPTO */
|
|
|
|
/**
|
|
* aes_128_cbc_encrypt - AES-128 CBC encryption
|
|
* @key: Encryption key
|
|
* @iv: Encryption IV for CBC mode (16 bytes)
|
|
* @data: Data to encrypt in-place
|
|
* @data_len: Length of data in bytes (must be divisible by 16)
|
|
* Returns: 0 on success, -1 on failure
|
|
*/
|
|
int
|
|
aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len)
|
|
{
|
|
void *ctx;
|
|
u8 cbc[AES_BLOCK_SIZE];
|
|
u8 *pos = data;
|
|
int i, j, blocks;
|
|
|
|
ctx = aes_encrypt_init(key, 16);
|
|
if (ctx == NULL)
|
|
return -1;
|
|
os_memcpy(cbc, iv, AES_BLOCK_SIZE);
|
|
|
|
blocks = data_len / AES_BLOCK_SIZE;
|
|
for (i = 0; i < blocks; i++) {
|
|
for (j = 0; j < AES_BLOCK_SIZE; j++)
|
|
cbc[j] ^= pos[j];
|
|
aes_encrypt(ctx, cbc, cbc);
|
|
os_memcpy(pos, cbc, AES_BLOCK_SIZE);
|
|
pos += AES_BLOCK_SIZE;
|
|
}
|
|
aes_encrypt_deinit(ctx);
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* aes_128_cbc_decrypt - AES-128 CBC decryption
|
|
* @key: Decryption key
|
|
* @iv: Decryption IV for CBC mode (16 bytes)
|
|
* @data: Data to decrypt in-place
|
|
* @data_len: Length of data in bytes (must be divisible by 16)
|
|
* Returns: 0 on success, -1 on failure
|
|
*/
|
|
int
|
|
aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len)
|
|
{
|
|
void *ctx;
|
|
u8 cbc[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE];
|
|
u8 *pos = data;
|
|
int i, j, blocks;
|
|
|
|
ctx = aes_decrypt_init(key, 16);
|
|
if (ctx == NULL)
|
|
return -1;
|
|
os_memcpy(cbc, iv, AES_BLOCK_SIZE);
|
|
|
|
blocks = data_len / AES_BLOCK_SIZE;
|
|
for (i = 0; i < blocks; i++) {
|
|
os_memcpy(tmp, pos, AES_BLOCK_SIZE);
|
|
aes_decrypt(ctx, pos, pos);
|
|
for (j = 0; j < AES_BLOCK_SIZE; j++)
|
|
pos[j] ^= cbc[j];
|
|
os_memcpy(cbc, tmp, AES_BLOCK_SIZE);
|
|
pos += AES_BLOCK_SIZE;
|
|
}
|
|
aes_decrypt_deinit(ctx);
|
|
return 0;
|
|
}
|
|
#endif /* USE_MBEDTLS_CRYPTO */
|