]> git.saurik.com Git - apple/xnu.git/blobdiff - libkern/crypto/corecrypto_aes.c
xnu-3789.1.32.tar.gz
[apple/xnu.git] / libkern / crypto / corecrypto_aes.c
index f70fc0cb89a27d0b6d290a61968b7deda84b7d1e..b73ff2f34184ac03782608a65f1eacab9e9a4672 100644 (file)
@@ -57,7 +57,7 @@ aes_rval aes_encrypt_cbc(const unsigned char *in_blk, const unsigned char *in_iv
        return aes_good;
 }
 
-#if defined (__i386__) || defined (__x86_64__)
+#if defined (__i386__) || defined (__x86_64__) || defined (__arm64__)
 /* This does one block of ECB, using the CBC implementation - this allow to use the same context for both CBC and ECB */
 aes_rval aes_encrypt(const unsigned char *in_blk, unsigned char *out_blk, aes_encrypt_ctx cx[1])
 {
@@ -90,7 +90,7 @@ aes_rval aes_decrypt_cbc(const unsigned char *in_blk, const unsigned char *in_iv
        return aes_good;
 }
 
-#if defined (__i386__) || defined (__x86_64__)
+#if defined (__i386__) || defined (__x86_64__) || defined (__arm64__)
 /* This does one block of ECB, using the CBC implementation - this allow to use the same context for both CBC and ECB */
 aes_rval aes_decrypt(const unsigned char *in_blk, unsigned char *out_blk, aes_decrypt_ctx cx[1])
 {
@@ -118,3 +118,136 @@ aes_rval aes_decrypt_key256(const unsigned char *key, aes_decrypt_ctx cx[1])
 {
        return aes_decrypt_key(key, 32, cx);
 }
+
+aes_rval aes_encrypt_key_gcm(const unsigned char *key, int key_len, ccgcm_ctx *ctx)
+{
+       const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_encrypt;
+       if (!gcm) {
+               return aes_error;
+       }
+
+       ccgcm_init(gcm, ctx, key_len, key);
+       return aes_good;
+}
+
+aes_rval aes_encrypt_set_iv_gcm(const unsigned char *in_iv, unsigned int len, ccgcm_ctx *ctx)
+{
+       const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_encrypt;
+       if (!gcm) {
+               return aes_error;
+       }
+
+       ccgcm_set_iv(gcm, ctx, len, in_iv);
+       return aes_good;
+}
+
+aes_rval aes_encrypt_aad_gcm(const unsigned char *aad, unsigned int aad_bytes, ccgcm_ctx *ctx)
+{
+       const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_encrypt;
+       if (!gcm) {
+               return aes_error;
+       }
+
+       ccgcm_gmac(gcm, ctx, aad_bytes, aad);
+       return aes_good;
+}
+
+aes_rval aes_encrypt_gcm(const unsigned char *in_blk, unsigned int num_bytes, 
+                        unsigned char *out_blk, ccgcm_ctx *ctx)
+{
+       const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_encrypt;
+       if (!gcm) {
+               return aes_error;
+       }
+
+       ccgcm_update(gcm, ctx, num_bytes, in_blk, out_blk);     //Actually gcm encrypt.
+       return aes_good;
+}
+
+aes_rval aes_encrypt_finalize_gcm(unsigned char *tag, unsigned int tag_bytes, ccgcm_ctx *ctx)
+{
+       const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_encrypt;
+       if (!gcm) {
+               return aes_error;
+       }
+
+       ccgcm_finalize(gcm, ctx, tag_bytes, tag);
+       ccgcm_reset(gcm, ctx);
+       return aes_good;
+}
+
+aes_rval aes_decrypt_key_gcm(const unsigned char *key, int key_len, ccgcm_ctx *ctx)
+{
+       const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_decrypt;
+       if (!gcm) {
+               return aes_error;
+       }
+
+       ccgcm_init(gcm, ctx, key_len, key);
+       return aes_good;
+}
+
+aes_rval aes_decrypt_set_iv_gcm(const unsigned char *in_iv, unsigned int len, ccgcm_ctx *ctx)
+{
+       const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_decrypt;
+       if (!gcm) {
+               return aes_error;
+       }
+
+       ccgcm_set_iv(gcm, ctx, len, in_iv);
+       return aes_good;
+}
+
+aes_rval aes_decrypt_aad_gcm(const unsigned char *aad, unsigned int aad_bytes, ccgcm_ctx *ctx)
+{
+       const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_decrypt;
+       if (!gcm) {
+               return aes_error;
+       }
+
+       ccgcm_gmac(gcm, ctx, aad_bytes, aad);
+       return aes_good;
+}
+
+aes_rval aes_decrypt_gcm(const unsigned char *in_blk, unsigned int num_bytes,
+                        unsigned char *out_blk, ccgcm_ctx *ctx)
+{
+       const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_decrypt;
+       if (!gcm) {
+               return aes_error;
+       }
+
+       ccgcm_update(gcm, ctx, num_bytes, in_blk, out_blk);     //Actually gcm decrypt.
+       return aes_good;
+}
+
+aes_rval aes_decrypt_finalize_gcm(unsigned char *tag, unsigned int tag_bytes, ccgcm_ctx *ctx)
+{
+       const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_decrypt;
+       if (!gcm) {
+               return aes_error;
+       }
+
+       ccgcm_finalize(gcm, ctx, tag_bytes, tag);
+       ccgcm_reset(gcm, ctx);
+       return aes_good;
+}
+
+unsigned aes_encrypt_get_ctx_size_gcm(void)
+{
+       const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_encrypt;
+       if (!gcm) {
+               return 0;
+       }
+       return (cc_ctx_sizeof(ccgcm_ctx, gcm->size));
+}
+
+unsigned aes_decrypt_get_ctx_size_gcm(void)
+{
+       const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_decrypt;
+       if (!gcm) {
+               return 0;
+       }
+       return (cc_ctx_sizeof(ccgcm_ctx, gcm->size));
+}
+