mirror of
https://github.com/espressif/esp-idf.git
synced 2024-10-05 20:47:46 -04:00
321 lines
7.7 KiB
C
321 lines
7.7 KiB
C
// Copyright 2020-2021 Espressif Systems (Shanghai) CO LTD
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
#pragma once
|
|
|
|
#include <stdbool.h>
|
|
#include <string.h>
|
|
#include "soc/hwcrypto_reg.h"
|
|
#include "hal/aes_types.h"
|
|
|
|
#ifdef __cplusplus
|
|
extern "C" {
|
|
#endif
|
|
|
|
|
|
/**
|
|
* @brief State of AES accelerator, busy, idle or done
|
|
*
|
|
*/
|
|
typedef enum {
|
|
ESP_AES_STATE_IDLE = 0, /* AES accelerator is idle */
|
|
ESP_AES_STATE_BUSY, /* Transform in progress */
|
|
ESP_AES_STATE_DONE, /* Transform completed */
|
|
} esp_aes_state_t;
|
|
|
|
|
|
/**
|
|
* @brief Write the encryption/decryption key to hardware
|
|
*
|
|
* @param key Key to be written to the AES hardware
|
|
* @param key_word_len Number of words in the key
|
|
*
|
|
* @return Number of bytes written to hardware, used for fault injection check
|
|
*/
|
|
static inline uint8_t aes_ll_write_key(const uint8_t *key, size_t key_word_len)
|
|
{
|
|
/* This variable is used for fault injection checks, so marked volatile to avoid optimisation */
|
|
volatile uint8_t key_in_hardware = 0;
|
|
/* Memcpy to avoid potential unaligned access */
|
|
uint32_t key_word;
|
|
for (int i = 0; i < key_word_len; i++) {
|
|
memcpy(&key_word, key + 4 * i, 4);
|
|
REG_WRITE(AES_KEY_BASE + i * 4, key_word);
|
|
key_in_hardware += 4;
|
|
}
|
|
return key_in_hardware;
|
|
}
|
|
|
|
/**
|
|
* @brief Sets the mode
|
|
*
|
|
* @param mode ESP_AES_ENCRYPT = 1, or ESP_AES_DECRYPT = 0
|
|
* @param key_bytes Number of bytes in the key
|
|
*/
|
|
static inline void aes_ll_set_mode(int mode, uint8_t key_bytes)
|
|
{
|
|
const uint32_t MODE_DECRYPT_BIT = 4;
|
|
unsigned mode_reg_base = (mode == ESP_AES_ENCRYPT) ? 0 : MODE_DECRYPT_BIT;
|
|
|
|
/* See TRM for the mapping between keylength and mode bit */
|
|
REG_WRITE(AES_MODE_REG, mode_reg_base + ((key_bytes / 8) - 2));
|
|
}
|
|
|
|
/**
|
|
* @brief Writes message block to AES hardware
|
|
*
|
|
* @param input Block to be written
|
|
*/
|
|
static inline void aes_ll_write_block(const void *input)
|
|
{
|
|
uint32_t input_word;
|
|
|
|
for (int i = 0; i < AES_BLOCK_WORDS; i++) {
|
|
memcpy(&input_word, (uint8_t*)input + 4 * i, 4);
|
|
REG_WRITE(AES_TEXT_IN_BASE + i * 4, input_word);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @brief Read the AES block
|
|
*
|
|
* @param output the output of the transform, length = AES_BLOCK_BYTES
|
|
*/
|
|
static inline void aes_ll_read_block(void *output)
|
|
{
|
|
uint32_t output_word;
|
|
const size_t REG_WIDTH = sizeof(uint32_t);
|
|
|
|
for (size_t i = 0; i < AES_BLOCK_WORDS; i++) {
|
|
output_word = REG_READ(AES_TEXT_OUT_BASE + (i * REG_WIDTH));
|
|
/* Memcpy to avoid potential unaligned access */
|
|
memcpy( (uint8_t*)output + i * 4, &output_word, sizeof(output_word));
|
|
}
|
|
}
|
|
|
|
|
|
/**
|
|
* @brief Starts block transform
|
|
*
|
|
*/
|
|
static inline void aes_ll_start_transform(void)
|
|
{
|
|
REG_WRITE(AES_TRIGGER_REG, 1);
|
|
}
|
|
|
|
/**
|
|
* @brief Continue a previous started transform
|
|
*
|
|
* @note Only used when doing GCM
|
|
*/
|
|
static inline void aes_ll_cont_transform(void)
|
|
{
|
|
REG_WRITE(AES_CONTINUE_REG, 1);
|
|
}
|
|
|
|
/**
|
|
* @brief Read state of AES accelerator
|
|
*
|
|
* @return esp_aes_state_t
|
|
*/
|
|
static inline esp_aes_state_t aes_ll_get_state(void)
|
|
{
|
|
return REG_READ(AES_STATE_REG);
|
|
}
|
|
|
|
|
|
/**
|
|
* @brief Set mode of operation
|
|
*
|
|
* @note Only used for DMA transforms
|
|
*
|
|
* @param mode
|
|
*/
|
|
static inline void aes_ll_set_block_mode(esp_aes_mode_t mode)
|
|
{
|
|
REG_WRITE(AES_BLOCK_MODE_REG, mode);
|
|
}
|
|
|
|
/**
|
|
* @brief Set AES-CTR counter to INC32
|
|
*
|
|
* @note Only affects AES-CTR mode
|
|
*
|
|
*/
|
|
static inline void aes_ll_set_inc(void)
|
|
{
|
|
REG_WRITE(AES_INC_SEL_REG, 0);
|
|
}
|
|
|
|
/**
|
|
* @brief Release the DMA
|
|
*
|
|
*/
|
|
static inline void aes_ll_dma_exit(void)
|
|
{
|
|
REG_WRITE(AES_DMA_EXIT_REG, 0);
|
|
}
|
|
|
|
/**
|
|
* @brief Sets the number of blocks to be transformed
|
|
*
|
|
* @note Only used for DMA transforms
|
|
*
|
|
* @param num_blocks Number of blocks to transform
|
|
*/
|
|
static inline void aes_ll_set_num_blocks(size_t num_blocks)
|
|
{
|
|
REG_WRITE(AES_BLOCK_NUM_REG, num_blocks);
|
|
}
|
|
|
|
/*
|
|
* Write IV to hardware iv registers
|
|
*/
|
|
static inline void aes_ll_set_iv(const uint8_t *iv)
|
|
{
|
|
uint32_t *reg_addr_buf = (uint32_t *)(AES_IV_BASE);
|
|
uint32_t iv_word;
|
|
|
|
for (int i = 0; i < IV_WORDS; i++ ) {
|
|
/* Memcpy to avoid potential unaligned access */
|
|
memcpy(&iv_word, iv + 4 * i, sizeof(iv_word));
|
|
REG_WRITE(®_addr_buf[i], iv_word);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Read IV from hardware iv registers
|
|
*/
|
|
static inline void aes_ll_read_iv(uint8_t *iv)
|
|
{
|
|
uint32_t iv_word;
|
|
const size_t REG_WIDTH = sizeof(uint32_t);
|
|
|
|
for (size_t i = 0; i < IV_WORDS; i++) {
|
|
iv_word = REG_READ(AES_IV_BASE + (i * REG_WIDTH));
|
|
/* Memcpy to avoid potential unaligned access */
|
|
memcpy(iv + i * 4, &iv_word, sizeof(iv_word));
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @brief Enable or disable DMA mode
|
|
*
|
|
* @param enable true to enable, false to disable.
|
|
*/
|
|
static inline void aes_ll_dma_enable(bool enable)
|
|
{
|
|
REG_WRITE(AES_DMA_ENABLE_REG, enable);
|
|
}
|
|
|
|
/**
|
|
* @brief Enable or disable transform completed interrupt
|
|
*
|
|
* @param enable true to enable, false to disable.
|
|
*/
|
|
static inline void aes_ll_interrupt_enable(bool enable)
|
|
{
|
|
REG_WRITE(AES_INT_ENA_REG, enable);
|
|
}
|
|
|
|
/**
|
|
* @brief Clears the interrupt
|
|
*
|
|
*/
|
|
static inline void aes_ll_interrupt_clear(void)
|
|
{
|
|
REG_WRITE(AES_INT_CLR_REG, 1);
|
|
}
|
|
|
|
/**
|
|
* @brief Reads the AES-GCM hash sub-key H
|
|
*
|
|
* @param gcm_hash hash value
|
|
*/
|
|
static inline void aes_ll_gcm_read_hash(uint8_t *gcm_hash)
|
|
{
|
|
const size_t REG_WIDTH = sizeof(uint32_t);
|
|
uint32_t hash_word;
|
|
|
|
for (size_t i = 0; i < AES_BLOCK_WORDS; i++) {
|
|
hash_word = REG_READ(AES_H_BASE + (i * REG_WIDTH));
|
|
/* Memcpy to avoid potential unaligned access */
|
|
memcpy(gcm_hash + i * 4, &hash_word, sizeof(hash_word));
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @brief Sets the number of Additional Authenticated Data (AAD) blocks
|
|
*
|
|
* @note Only affects AES-GCM
|
|
*
|
|
* @param aad_num_blocks the number of Additional Authenticated Data (AAD) blocks
|
|
*/
|
|
static inline void aes_ll_gcm_set_aad_num_blocks(size_t aad_num_blocks)
|
|
{
|
|
REG_WRITE(AES_AAD_BLOCK_NUM_REG, aad_num_blocks);
|
|
}
|
|
|
|
/**
|
|
* @brief Sets the J0 value, for more information see the GCM subchapter in the TRM
|
|
*
|
|
* @note Only affects AES-GCM
|
|
*
|
|
* @param j0 J0 value
|
|
*/
|
|
static inline void aes_ll_gcm_set_j0(const uint8_t *j0)
|
|
{
|
|
uint32_t *reg_addr_buf = (uint32_t *)(AES_J_BASE);
|
|
uint32_t j0_word;
|
|
|
|
for (int i = 0; i < AES_BLOCK_WORDS; i++ ) {
|
|
/* Memcpy to avoid potential unaligned access */
|
|
memcpy(&j0_word, j0 + 4 * i, sizeof(j0_word));
|
|
REG_WRITE(®_addr_buf[i], j0_word);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @brief Sets the number of effective bits of incomplete blocks in plaintext/cipertext.
|
|
*
|
|
* @note Only affects AES-GCM
|
|
*
|
|
* @param num_valid_bits the number of effective bits of incomplete blocks in plaintext/cipertext.
|
|
*/
|
|
static inline void aes_ll_gcm_set_num_valid_bit(size_t num_valid_bits)
|
|
{
|
|
REG_WRITE(AES_BIT_VALID_NUM_REG, num_valid_bits);
|
|
}
|
|
|
|
/**
|
|
* @brief Read the tag after a AES-GCM transform
|
|
*
|
|
* @param tag Pointer to where to store the result with length TAG_WORDS
|
|
*/
|
|
static inline void aes_ll_gcm_read_tag(uint8_t *tag)
|
|
{
|
|
uint32_t tag_word;
|
|
const size_t REG_WIDTH = sizeof(uint32_t);
|
|
|
|
for (size_t i = 0; i < TAG_WORDS; i++) {
|
|
tag_word = REG_READ(AES_T_BASE + (i * REG_WIDTH));
|
|
/* Memcpy to avoid potential unaligned access */
|
|
memcpy(tag + i * 4, &tag_word, sizeof(tag_word));
|
|
}
|
|
}
|
|
|
|
#ifdef __cplusplus
|
|
}
|
|
#endif
|