Tom Rini | 10e4779 | 2018-05-06 17:58:06 -0400 | [diff] [blame] | 1 | /* SPDX-License-Identifier: GPL-2.0+ */ |
Yen Lin | 2f87903 | 2012-04-05 11:54:58 +0000 | [diff] [blame] | 2 | /* |
| 3 | * Copyright (c) 2011 The Chromium OS Authors. |
| 4 | * (C) Copyright 2010 - 2011 NVIDIA Corporation <www.nvidia.com> |
Yen Lin | 2f87903 | 2012-04-05 11:54:58 +0000 | [diff] [blame] | 5 | */ |
| 6 | |
| 7 | #ifndef _AES_REF_H_ |
| 8 | #define _AES_REF_H_ |
| 9 | |
Marek Vasut | 05ed2a5 | 2014-03-05 19:59:52 +0100 | [diff] [blame] | 10 | #ifdef USE_HOSTCC |
| 11 | /* Define compat stuff for use in fw_* tools. */ |
| 12 | typedef unsigned char u8; |
| 13 | typedef unsigned int u32; |
| 14 | #define debug(...) do {} while (0) |
| 15 | #endif |
| 16 | |
Yen Lin | 2f87903 | 2012-04-05 11:54:58 +0000 | [diff] [blame] | 17 | /* |
| 18 | * AES encryption library, with small code size, supporting only 128-bit AES |
| 19 | * |
| 20 | * AES is a stream cipher which works a block at a time, with each block |
Philippe Reynes | 458db3c | 2020-01-06 15:22:34 +0100 | [diff] [blame] | 21 | * in this case being AES_BLOCK_LENGTH bytes. |
Yen Lin | 2f87903 | 2012-04-05 11:54:58 +0000 | [diff] [blame] | 22 | */ |
| 23 | |
| 24 | enum { |
| 25 | AES_STATECOLS = 4, /* columns in the state & expanded key */ |
Philippe Reynes | a40315e | 2020-01-06 15:22:35 +0100 | [diff] [blame] | 26 | AES128_KEYCOLS = 4, /* columns in a key for aes128 */ |
| 27 | AES192_KEYCOLS = 6, /* columns in a key for aes128 */ |
| 28 | AES256_KEYCOLS = 8, /* columns in a key for aes128 */ |
| 29 | AES128_ROUNDS = 10, /* rounds in encryption for aes128 */ |
| 30 | AES192_ROUNDS = 12, /* rounds in encryption for aes192 */ |
| 31 | AES256_ROUNDS = 14, /* rounds in encryption for aes256 */ |
| 32 | AES128_KEY_LENGTH = 128 / 8, |
| 33 | AES192_KEY_LENGTH = 192 / 8, |
| 34 | AES256_KEY_LENGTH = 256 / 8, |
| 35 | AES128_EXPAND_KEY_LENGTH = 4 * AES_STATECOLS * (AES128_ROUNDS + 1), |
| 36 | AES192_EXPAND_KEY_LENGTH = 4 * AES_STATECOLS * (AES192_ROUNDS + 1), |
| 37 | AES256_EXPAND_KEY_LENGTH = 4 * AES_STATECOLS * (AES256_ROUNDS + 1), |
Philippe Reynes | 458db3c | 2020-01-06 15:22:34 +0100 | [diff] [blame] | 38 | AES_BLOCK_LENGTH = 128 / 8, |
Yen Lin | 2f87903 | 2012-04-05 11:54:58 +0000 | [diff] [blame] | 39 | }; |
| 40 | |
| 41 | /** |
Marek Vasut | 01655ef | 2014-03-05 19:58:36 +0100 | [diff] [blame] | 42 | * aes_expand_key() - Expand the AES key |
| 43 | * |
Yen Lin | 2f87903 | 2012-04-05 11:54:58 +0000 | [diff] [blame] | 44 | * Expand a key into a key schedule, which is then used for the other |
| 45 | * operations. |
| 46 | * |
Philippe Reynes | a40315e | 2020-01-06 15:22:35 +0100 | [diff] [blame] | 47 | * @key Key |
| 48 | * @key_size Size of the key (in bits) |
Marek Vasut | 01655ef | 2014-03-05 19:58:36 +0100 | [diff] [blame] | 49 | * @expkey Buffer to place expanded key, AES_EXPAND_KEY_LENGTH |
Yen Lin | 2f87903 | 2012-04-05 11:54:58 +0000 | [diff] [blame] | 50 | */ |
Philippe Reynes | a40315e | 2020-01-06 15:22:35 +0100 | [diff] [blame] | 51 | void aes_expand_key(u8 *key, u32 key_size, u8 *expkey); |
Yen Lin | 2f87903 | 2012-04-05 11:54:58 +0000 | [diff] [blame] | 52 | |
| 53 | /** |
Marek Vasut | 01655ef | 2014-03-05 19:58:36 +0100 | [diff] [blame] | 54 | * aes_encrypt() - Encrypt single block of data with AES 128 |
Yen Lin | 2f87903 | 2012-04-05 11:54:58 +0000 | [diff] [blame] | 55 | * |
Philippe Reynes | a40315e | 2020-01-06 15:22:35 +0100 | [diff] [blame] | 56 | * @key_size Size of the aes key (in bits) |
Marek Vasut | 01655ef | 2014-03-05 19:58:36 +0100 | [diff] [blame] | 57 | * @in Input data |
| 58 | * @expkey Expanded key to use for encryption (from aes_expand_key()) |
| 59 | * @out Output data |
Yen Lin | 2f87903 | 2012-04-05 11:54:58 +0000 | [diff] [blame] | 60 | */ |
Philippe Reynes | a40315e | 2020-01-06 15:22:35 +0100 | [diff] [blame] | 61 | void aes_encrypt(u32 key_size, u8 *in, u8 *expkey, u8 *out); |
Yen Lin | 2f87903 | 2012-04-05 11:54:58 +0000 | [diff] [blame] | 62 | |
| 63 | /** |
Marek Vasut | 01655ef | 2014-03-05 19:58:36 +0100 | [diff] [blame] | 64 | * aes_decrypt() - Decrypt single block of data with AES 128 |
Yen Lin | 2f87903 | 2012-04-05 11:54:58 +0000 | [diff] [blame] | 65 | * |
Philippe Reynes | a40315e | 2020-01-06 15:22:35 +0100 | [diff] [blame] | 66 | * @key_size Size of the aes key (in bits) |
Marek Vasut | 01655ef | 2014-03-05 19:58:36 +0100 | [diff] [blame] | 67 | * @in Input data |
| 68 | * @expkey Expanded key to use for decryption (from aes_expand_key()) |
| 69 | * @out Output data |
Yen Lin | 2f87903 | 2012-04-05 11:54:58 +0000 | [diff] [blame] | 70 | */ |
Philippe Reynes | a40315e | 2020-01-06 15:22:35 +0100 | [diff] [blame] | 71 | void aes_decrypt(u32 key_size, u8 *in, u8 *expkey, u8 *out); |
Yen Lin | 2f87903 | 2012-04-05 11:54:58 +0000 | [diff] [blame] | 72 | |
Marek Vasut | 23ec68c | 2014-03-05 19:58:37 +0100 | [diff] [blame] | 73 | /** |
Stephen Warren | 398c70c | 2014-04-18 10:28:58 -0600 | [diff] [blame] | 74 | * Apply chain data to the destination using EOR |
| 75 | * |
Philippe Reynes | 458db3c | 2020-01-06 15:22:34 +0100 | [diff] [blame] | 76 | * Each array is of length AES_BLOCK_LENGTH. |
Stephen Warren | 398c70c | 2014-04-18 10:28:58 -0600 | [diff] [blame] | 77 | * |
| 78 | * @cbc_chain_data Chain data |
| 79 | * @src Source data |
| 80 | * @dst Destination data, which is modified here |
| 81 | */ |
| 82 | void aes_apply_cbc_chain_data(u8 *cbc_chain_data, u8 *src, u8 *dst); |
| 83 | |
| 84 | /** |
Marek Vasut | 23ec68c | 2014-03-05 19:58:37 +0100 | [diff] [blame] | 85 | * aes_cbc_encrypt_blocks() - Encrypt multiple blocks of data with AES CBC. |
| 86 | * |
Philippe Reynes | a40315e | 2020-01-06 15:22:35 +0100 | [diff] [blame] | 87 | * @key_size Size of the aes key (in bits) |
Marek Vasut | 23ec68c | 2014-03-05 19:58:37 +0100 | [diff] [blame] | 88 | * @key_exp Expanded key to use |
Андрей Мозжухин | 9aaa236 | 2018-01-03 15:43:56 +0300 | [diff] [blame] | 89 | * @iv Initialization vector |
Marek Vasut | 23ec68c | 2014-03-05 19:58:37 +0100 | [diff] [blame] | 90 | * @src Source data to encrypt |
| 91 | * @dst Destination buffer |
| 92 | * @num_aes_blocks Number of AES blocks to encrypt |
| 93 | */ |
Philippe Reynes | a40315e | 2020-01-06 15:22:35 +0100 | [diff] [blame] | 94 | void aes_cbc_encrypt_blocks(u32 key_size, u8 *key_exp, u8 *iv, u8 *src, u8 *dst, |
Андрей Мозжухин | 9aaa236 | 2018-01-03 15:43:56 +0300 | [diff] [blame] | 95 | u32 num_aes_blocks); |
Marek Vasut | 23ec68c | 2014-03-05 19:58:37 +0100 | [diff] [blame] | 96 | |
Marek Vasut | de5a053 | 2014-03-05 19:58:38 +0100 | [diff] [blame] | 97 | /** |
| 98 | * Decrypt multiple blocks of data with AES CBC. |
| 99 | * |
Philippe Reynes | a40315e | 2020-01-06 15:22:35 +0100 | [diff] [blame] | 100 | * @key_size Size of the aes key (in bits) |
Marek Vasut | de5a053 | 2014-03-05 19:58:38 +0100 | [diff] [blame] | 101 | * @key_exp Expanded key to use |
Андрей Мозжухин | 9aaa236 | 2018-01-03 15:43:56 +0300 | [diff] [blame] | 102 | * @iv Initialization vector |
Marek Vasut | de5a053 | 2014-03-05 19:58:38 +0100 | [diff] [blame] | 103 | * @src Source data to decrypt |
| 104 | * @dst Destination buffer |
| 105 | * @num_aes_blocks Number of AES blocks to decrypt |
| 106 | */ |
Philippe Reynes | a40315e | 2020-01-06 15:22:35 +0100 | [diff] [blame] | 107 | void aes_cbc_decrypt_blocks(u32 key_size, u8 *key_exp, u8 *iv, u8 *src, u8 *dst, |
Андрей Мозжухин | 9aaa236 | 2018-01-03 15:43:56 +0300 | [diff] [blame] | 108 | u32 num_aes_blocks); |
Marek Vasut | de5a053 | 2014-03-05 19:58:38 +0100 | [diff] [blame] | 109 | |
Yen Lin | 2f87903 | 2012-04-05 11:54:58 +0000 | [diff] [blame] | 110 | #endif /* _AES_REF_H_ */ |