blob: d2583bed9920ad57c01ef1e34b008e5c92282be5 [file] [log] [blame]
Tom Rini10e47792018-05-06 17:58:06 -04001/* SPDX-License-Identifier: GPL-2.0+ */
Yen Lin2f879032012-04-05 11:54:58 +00002/*
3 * Copyright (c) 2011 The Chromium OS Authors.
4 * (C) Copyright 2010 - 2011 NVIDIA Corporation <www.nvidia.com>
Yen Lin2f879032012-04-05 11:54:58 +00005 */
6
7#ifndef _AES_REF_H_
8#define _AES_REF_H_
9
Marek Vasut05ed2a52014-03-05 19:59:52 +010010#ifdef USE_HOSTCC
11/* Define compat stuff for use in fw_* tools. */
12typedef unsigned char u8;
13typedef unsigned int u32;
14#define debug(...) do {} while (0)
15#endif
16
Yen Lin2f879032012-04-05 11:54:58 +000017/*
18 * AES encryption library, with small code size, supporting only 128-bit AES
19 *
20 * AES is a stream cipher which works a block at a time, with each block
Philippe Reynes458db3c2020-01-06 15:22:34 +010021 * in this case being AES_BLOCK_LENGTH bytes.
Yen Lin2f879032012-04-05 11:54:58 +000022 */
23
24enum {
25 AES_STATECOLS = 4, /* columns in the state & expanded key */
Philippe Reynesa40315e2020-01-06 15:22:35 +010026 AES128_KEYCOLS = 4, /* columns in a key for aes128 */
27 AES192_KEYCOLS = 6, /* columns in a key for aes128 */
28 AES256_KEYCOLS = 8, /* columns in a key for aes128 */
29 AES128_ROUNDS = 10, /* rounds in encryption for aes128 */
30 AES192_ROUNDS = 12, /* rounds in encryption for aes192 */
31 AES256_ROUNDS = 14, /* rounds in encryption for aes256 */
32 AES128_KEY_LENGTH = 128 / 8,
33 AES192_KEY_LENGTH = 192 / 8,
34 AES256_KEY_LENGTH = 256 / 8,
35 AES128_EXPAND_KEY_LENGTH = 4 * AES_STATECOLS * (AES128_ROUNDS + 1),
36 AES192_EXPAND_KEY_LENGTH = 4 * AES_STATECOLS * (AES192_ROUNDS + 1),
37 AES256_EXPAND_KEY_LENGTH = 4 * AES_STATECOLS * (AES256_ROUNDS + 1),
Philippe Reynes458db3c2020-01-06 15:22:34 +010038 AES_BLOCK_LENGTH = 128 / 8,
Yen Lin2f879032012-04-05 11:54:58 +000039};
40
41/**
Marek Vasut01655ef2014-03-05 19:58:36 +010042 * aes_expand_key() - Expand the AES key
43 *
Yen Lin2f879032012-04-05 11:54:58 +000044 * Expand a key into a key schedule, which is then used for the other
45 * operations.
46 *
Philippe Reynesa40315e2020-01-06 15:22:35 +010047 * @key Key
48 * @key_size Size of the key (in bits)
Marek Vasut01655ef2014-03-05 19:58:36 +010049 * @expkey Buffer to place expanded key, AES_EXPAND_KEY_LENGTH
Yen Lin2f879032012-04-05 11:54:58 +000050 */
Philippe Reynesa40315e2020-01-06 15:22:35 +010051void aes_expand_key(u8 *key, u32 key_size, u8 *expkey);
Yen Lin2f879032012-04-05 11:54:58 +000052
53/**
Marek Vasut01655ef2014-03-05 19:58:36 +010054 * aes_encrypt() - Encrypt single block of data with AES 128
Yen Lin2f879032012-04-05 11:54:58 +000055 *
Philippe Reynesa40315e2020-01-06 15:22:35 +010056 * @key_size Size of the aes key (in bits)
Marek Vasut01655ef2014-03-05 19:58:36 +010057 * @in Input data
58 * @expkey Expanded key to use for encryption (from aes_expand_key())
59 * @out Output data
Yen Lin2f879032012-04-05 11:54:58 +000060 */
Philippe Reynesa40315e2020-01-06 15:22:35 +010061void aes_encrypt(u32 key_size, u8 *in, u8 *expkey, u8 *out);
Yen Lin2f879032012-04-05 11:54:58 +000062
63/**
Marek Vasut01655ef2014-03-05 19:58:36 +010064 * aes_decrypt() - Decrypt single block of data with AES 128
Yen Lin2f879032012-04-05 11:54:58 +000065 *
Philippe Reynesa40315e2020-01-06 15:22:35 +010066 * @key_size Size of the aes key (in bits)
Marek Vasut01655ef2014-03-05 19:58:36 +010067 * @in Input data
68 * @expkey Expanded key to use for decryption (from aes_expand_key())
69 * @out Output data
Yen Lin2f879032012-04-05 11:54:58 +000070 */
Philippe Reynesa40315e2020-01-06 15:22:35 +010071void aes_decrypt(u32 key_size, u8 *in, u8 *expkey, u8 *out);
Yen Lin2f879032012-04-05 11:54:58 +000072
Marek Vasut23ec68c2014-03-05 19:58:37 +010073/**
Stephen Warren398c70c2014-04-18 10:28:58 -060074 * Apply chain data to the destination using EOR
75 *
Philippe Reynes458db3c2020-01-06 15:22:34 +010076 * Each array is of length AES_BLOCK_LENGTH.
Stephen Warren398c70c2014-04-18 10:28:58 -060077 *
78 * @cbc_chain_data Chain data
79 * @src Source data
80 * @dst Destination data, which is modified here
81 */
82void aes_apply_cbc_chain_data(u8 *cbc_chain_data, u8 *src, u8 *dst);
83
84/**
Marek Vasut23ec68c2014-03-05 19:58:37 +010085 * aes_cbc_encrypt_blocks() - Encrypt multiple blocks of data with AES CBC.
86 *
Philippe Reynesa40315e2020-01-06 15:22:35 +010087 * @key_size Size of the aes key (in bits)
Marek Vasut23ec68c2014-03-05 19:58:37 +010088 * @key_exp Expanded key to use
Андрей Мозжухин9aaa2362018-01-03 15:43:56 +030089 * @iv Initialization vector
Marek Vasut23ec68c2014-03-05 19:58:37 +010090 * @src Source data to encrypt
91 * @dst Destination buffer
92 * @num_aes_blocks Number of AES blocks to encrypt
93 */
Philippe Reynesa40315e2020-01-06 15:22:35 +010094void aes_cbc_encrypt_blocks(u32 key_size, u8 *key_exp, u8 *iv, u8 *src, u8 *dst,
Андрей Мозжухин9aaa2362018-01-03 15:43:56 +030095 u32 num_aes_blocks);
Marek Vasut23ec68c2014-03-05 19:58:37 +010096
Marek Vasutde5a0532014-03-05 19:58:38 +010097/**
98 * Decrypt multiple blocks of data with AES CBC.
99 *
Philippe Reynesa40315e2020-01-06 15:22:35 +0100100 * @key_size Size of the aes key (in bits)
Marek Vasutde5a0532014-03-05 19:58:38 +0100101 * @key_exp Expanded key to use
Андрей Мозжухин9aaa2362018-01-03 15:43:56 +0300102 * @iv Initialization vector
Marek Vasutde5a0532014-03-05 19:58:38 +0100103 * @src Source data to decrypt
104 * @dst Destination buffer
105 * @num_aes_blocks Number of AES blocks to decrypt
106 */
Philippe Reynesa40315e2020-01-06 15:22:35 +0100107void aes_cbc_decrypt_blocks(u32 key_size, u8 *key_exp, u8 *iv, u8 *src, u8 *dst,
Андрей Мозжухин9aaa2362018-01-03 15:43:56 +0300108 u32 num_aes_blocks);
Marek Vasutde5a0532014-03-05 19:58:38 +0100109
Yen Lin2f879032012-04-05 11:54:58 +0000110#endif /* _AES_REF_H_ */