* Copyright (c) 2012 Apple Computer, Inc. All rights reserved.
*
* @APPLE_OSREFERENCE_LICENSE_HEADER_START@
- *
+ *
* This file contains Original Code and/or Modifications of Original Code
* as defined in and that are subject to the Apple Public Source License
* Version 2.0 (the 'License'). You may not use this file except in
* unlawful or unlicensed copies of an Apple operating system, or to
* circumvent, violate, or enable the circumvention or violation of, any
* terms of an Apple operating system software license agreement.
- *
+ *
* Please obtain a copy of the License at
* http://www.opensource.apple.com/apsl/ and read it before using this file.
- *
+ *
* The Original Code and all software distributed under the License are
* distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
* EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
* FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
* Please see the License for the specific language governing rights and
* limitations under the License.
- *
+ *
* @APPLE_OSREFERENCE_LICENSE_HEADER_END@
*/
#include <corecrypto/ccaes.h>
#include <kern/debug.h>
-aes_rval aes_encrypt_key(const unsigned char *key, int key_len, aes_encrypt_ctx cx[1])
+aes_rval
+aes_encrypt_key(const unsigned char *key, int key_len, aes_encrypt_ctx cx[1])
{
const struct ccmode_cbc *cbc = g_crypto_funcs->ccaes_cbc_encrypt;
- /* Make sure the context size for the mode fits in the one we have */
- if(cbc->size>sizeof(aes_encrypt_ctx))
- panic("%s: inconsistent size for AES encrypt context", __FUNCTION__);
-
- cccbc_init(cbc, cx[0].ctx, key_len, key);
+ /* Make sure the context size for the mode fits in the one we have */
+ if (cbc->size > sizeof(aes_encrypt_ctx)) {
+ panic("%s: inconsistent size for AES encrypt context", __FUNCTION__);
+ }
- return aes_good;
+ return cccbc_init(cbc, cx[0].ctx, key_len, key);
}
-aes_rval aes_encrypt_cbc(const unsigned char *in_blk, const unsigned char *in_iv, unsigned int num_blk,
- unsigned char *out_blk, aes_encrypt_ctx cx[1])
+aes_rval
+aes_encrypt_cbc(const unsigned char *in_blk, const unsigned char *in_iv, unsigned int num_blk,
+ unsigned char *out_blk, aes_encrypt_ctx cx[1])
{
const struct ccmode_cbc *cbc = g_crypto_funcs->ccaes_cbc_encrypt;
cccbc_iv_decl(cbc->block_size, ctx_iv);
- cccbc_set_iv(cbc, ctx_iv, in_iv);
- cccbc_update(cbc, cx[0].ctx, ctx_iv, num_blk, in_blk, out_blk); //Actually cbc encrypt.
+ int rc = cccbc_set_iv(cbc, ctx_iv, in_iv);
+ if (rc) {
+ return rc;
+ }
- return aes_good;
+ return cccbc_update(cbc, cx[0].ctx, ctx_iv, num_blk, in_blk, out_blk); //Actually cbc encrypt.
}
#if defined (__i386__) || defined (__x86_64__) || defined (__arm64__)
/* This does one block of ECB, using the CBC implementation - this allow to use the same context for both CBC and ECB */
-aes_rval aes_encrypt(const unsigned char *in_blk, unsigned char *out_blk, aes_encrypt_ctx cx[1])
+aes_rval
+aes_encrypt(const unsigned char *in_blk, unsigned char *out_blk, aes_encrypt_ctx cx[1])
{
- return aes_encrypt_cbc(in_blk, NULL, 1, out_blk, cx);
+ return aes_encrypt_cbc(in_blk, NULL, 1, out_blk, cx);
}
#endif
-aes_rval aes_decrypt_key(const unsigned char *key, int key_len, aes_decrypt_ctx cx[1])
+aes_rval
+aes_decrypt_key(const unsigned char *key, int key_len, aes_decrypt_ctx cx[1])
{
const struct ccmode_cbc *cbc = g_crypto_funcs->ccaes_cbc_decrypt;
- /* Make sure the context size for the mode fits in the one we have */
- if(cbc->size>sizeof(aes_decrypt_ctx))
- panic("%s: inconsistent size for AES decrypt context", __FUNCTION__);
-
- cccbc_init(cbc, cx[0].ctx, key_len, key);
+ /* Make sure the context size for the mode fits in the one we have */
+ if (cbc->size > sizeof(aes_decrypt_ctx)) {
+ panic("%s: inconsistent size for AES decrypt context", __FUNCTION__);
+ }
- return aes_good;
+ return cccbc_init(cbc, cx[0].ctx, key_len, key);
}
-aes_rval aes_decrypt_cbc(const unsigned char *in_blk, const unsigned char *in_iv, unsigned int num_blk,
- unsigned char *out_blk, aes_decrypt_ctx cx[1])
+aes_rval
+aes_decrypt_cbc(const unsigned char *in_blk, const unsigned char *in_iv, unsigned int num_blk,
+ unsigned char *out_blk, aes_decrypt_ctx cx[1])
{
const struct ccmode_cbc *cbc = g_crypto_funcs->ccaes_cbc_decrypt;
cccbc_iv_decl(cbc->block_size, ctx_iv);
- cccbc_set_iv(cbc, ctx_iv, in_iv);
- cccbc_update(cbc, cx[0].ctx, ctx_iv, num_blk, in_blk, out_blk); //Actually cbc decrypt.
+ int rc = cccbc_set_iv(cbc, ctx_iv, in_iv);
+ if (rc) {
+ return rc;
+ }
- return aes_good;
+ return cccbc_update(cbc, cx[0].ctx, ctx_iv, num_blk, in_blk, out_blk); //Actually cbc decrypt.
}
#if defined (__i386__) || defined (__x86_64__) || defined (__arm64__)
/* This does one block of ECB, using the CBC implementation - this allow to use the same context for both CBC and ECB */
-aes_rval aes_decrypt(const unsigned char *in_blk, unsigned char *out_blk, aes_decrypt_ctx cx[1])
+aes_rval
+aes_decrypt(const unsigned char *in_blk, unsigned char *out_blk, aes_decrypt_ctx cx[1])
{
return aes_decrypt_cbc(in_blk, NULL, 1, out_blk, cx);
}
#endif
-aes_rval aes_encrypt_key128(const unsigned char *key, aes_encrypt_ctx cx[1])
+aes_rval
+aes_encrypt_key128(const unsigned char *key, aes_encrypt_ctx cx[1])
{
return aes_encrypt_key(key, 16, cx);
}
-aes_rval aes_decrypt_key128(const unsigned char *key, aes_decrypt_ctx cx[1])
+aes_rval
+aes_decrypt_key128(const unsigned char *key, aes_decrypt_ctx cx[1])
{
return aes_decrypt_key(key, 16, cx);
}
-aes_rval aes_encrypt_key256(const unsigned char *key, aes_encrypt_ctx cx[1])
+aes_rval
+aes_encrypt_key256(const unsigned char *key, aes_encrypt_ctx cx[1])
{
return aes_encrypt_key(key, 32, cx);
}
-aes_rval aes_decrypt_key256(const unsigned char *key, aes_decrypt_ctx cx[1])
+aes_rval
+aes_decrypt_key256(const unsigned char *key, aes_decrypt_ctx cx[1])
{
return aes_decrypt_key(key, 32, cx);
}
-aes_rval aes_encrypt_key_gcm(const unsigned char *key, int key_len, ccgcm_ctx *ctx)
+aes_rval
+aes_encrypt_key_gcm(const unsigned char *key, int key_len, ccgcm_ctx *ctx)
+{
+ const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_encrypt;
+ if (!gcm) {
+ return aes_error;
+ }
+
+ return ccgcm_init(gcm, ctx, key_len, key);
+}
+
+aes_rval
+aes_encrypt_key_with_iv_gcm(const unsigned char *key, int key_len, const unsigned char *in_iv, ccgcm_ctx *ctx)
{
const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_encrypt;
if (!gcm) {
- return aes_error;
+ return aes_error;
}
- ccgcm_init(gcm, ctx, key_len, key);
- return aes_good;
+ return g_crypto_funcs->ccgcm_init_with_iv_fn(gcm, ctx, key_len, key, in_iv);
}
-aes_rval aes_encrypt_set_iv_gcm(const unsigned char *in_iv, unsigned int len, ccgcm_ctx *ctx)
+aes_rval
+aes_encrypt_set_iv_gcm(const unsigned char *in_iv, unsigned int len, ccgcm_ctx *ctx)
{
const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_encrypt;
if (!gcm) {
- return aes_error;
+ return aes_error;
}
- ccgcm_set_iv(gcm, ctx, len, in_iv);
- return aes_good;
+ return ccgcm_set_iv(gcm, ctx, len, in_iv);
}
-aes_rval aes_encrypt_aad_gcm(const unsigned char *aad, unsigned int aad_bytes, ccgcm_ctx *ctx)
+aes_rval
+aes_encrypt_reset_gcm(ccgcm_ctx *ctx)
{
const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_encrypt;
if (!gcm) {
- return aes_error;
+ return aes_error;
}
- ccgcm_gmac(gcm, ctx, aad_bytes, aad);
- return aes_good;
+ return ccgcm_reset(gcm, ctx);
}
-aes_rval aes_encrypt_gcm(const unsigned char *in_blk, unsigned int num_bytes,
- unsigned char *out_blk, ccgcm_ctx *ctx)
+aes_rval
+aes_encrypt_inc_iv_gcm(unsigned char *out_iv, ccgcm_ctx *ctx)
{
const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_encrypt;
if (!gcm) {
- return aes_error;
+ return aes_error;
}
- ccgcm_update(gcm, ctx, num_bytes, in_blk, out_blk); //Actually gcm encrypt.
- return aes_good;
+ return g_crypto_funcs->ccgcm_inc_iv_fn(gcm, ctx, out_iv);
}
-aes_rval aes_encrypt_finalize_gcm(unsigned char *tag, unsigned int tag_bytes, ccgcm_ctx *ctx)
+aes_rval
+aes_encrypt_aad_gcm(const unsigned char *aad, unsigned int aad_bytes, ccgcm_ctx *ctx)
{
const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_encrypt;
if (!gcm) {
- return aes_error;
+ return aes_error;
}
- ccgcm_finalize(gcm, ctx, tag_bytes, tag);
- ccgcm_reset(gcm, ctx);
- return aes_good;
+ return ccgcm_aad(gcm, ctx, aad_bytes, aad);
}
-aes_rval aes_decrypt_key_gcm(const unsigned char *key, int key_len, ccgcm_ctx *ctx)
+aes_rval
+aes_encrypt_gcm(const unsigned char *in_blk, unsigned int num_bytes,
+ unsigned char *out_blk, ccgcm_ctx *ctx)
+{
+ const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_encrypt;
+ if (!gcm) {
+ return aes_error;
+ }
+
+ return ccgcm_update(gcm, ctx, num_bytes, in_blk, out_blk); //Actually gcm encrypt.
+}
+
+aes_rval
+aes_encrypt_finalize_gcm(unsigned char *tag, unsigned int tag_bytes, ccgcm_ctx *ctx)
+{
+ const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_encrypt;
+ if (!gcm) {
+ return aes_error;
+ }
+
+ int rc = ccgcm_finalize(gcm, ctx, tag_bytes, tag);
+ if (rc) {
+ return rc;
+ }
+
+ return ccgcm_reset(gcm, ctx);
+}
+
+aes_rval
+aes_decrypt_key_gcm(const unsigned char *key, int key_len, ccgcm_ctx *ctx)
{
const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_decrypt;
if (!gcm) {
- return aes_error;
+ return aes_error;
}
- ccgcm_init(gcm, ctx, key_len, key);
- return aes_good;
+ return ccgcm_init(gcm, ctx, key_len, key);
}
-aes_rval aes_decrypt_set_iv_gcm(const unsigned char *in_iv, unsigned int len, ccgcm_ctx *ctx)
+aes_rval
+aes_decrypt_key_with_iv_gcm(const unsigned char *key, int key_len, const unsigned char *in_iv, ccgcm_ctx *ctx)
{
const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_decrypt;
if (!gcm) {
- return aes_error;
+ return aes_error;
}
- ccgcm_set_iv(gcm, ctx, len, in_iv);
- return aes_good;
+ return g_crypto_funcs->ccgcm_init_with_iv_fn(gcm, ctx, key_len, key, in_iv);
}
-aes_rval aes_decrypt_aad_gcm(const unsigned char *aad, unsigned int aad_bytes, ccgcm_ctx *ctx)
+aes_rval
+aes_decrypt_set_iv_gcm(const unsigned char *in_iv, unsigned int len, ccgcm_ctx *ctx)
{
const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_decrypt;
if (!gcm) {
- return aes_error;
+ return aes_error;
+ }
+
+ int rc = ccgcm_reset(gcm, ctx);
+ if (rc) {
+ return rc;
}
- ccgcm_gmac(gcm, ctx, aad_bytes, aad);
- return aes_good;
+ return ccgcm_set_iv(gcm, ctx, len, in_iv);
}
-aes_rval aes_decrypt_gcm(const unsigned char *in_blk, unsigned int num_bytes,
- unsigned char *out_blk, ccgcm_ctx *ctx)
+aes_rval
+aes_decrypt_reset_gcm(ccgcm_ctx *ctx)
{
const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_decrypt;
if (!gcm) {
- return aes_error;
+ return aes_error;
}
- ccgcm_update(gcm, ctx, num_bytes, in_blk, out_blk); //Actually gcm decrypt.
- return aes_good;
+ return ccgcm_reset(gcm, ctx);
}
-aes_rval aes_decrypt_finalize_gcm(unsigned char *tag, unsigned int tag_bytes, ccgcm_ctx *ctx)
+aes_rval
+aes_decrypt_inc_iv_gcm(unsigned char *out_iv, ccgcm_ctx *ctx)
{
const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_decrypt;
if (!gcm) {
- return aes_error;
+ return aes_error;
}
- ccgcm_finalize(gcm, ctx, tag_bytes, tag);
- ccgcm_reset(gcm, ctx);
- return aes_good;
+ return g_crypto_funcs->ccgcm_inc_iv_fn(gcm, ctx, out_iv);
}
-unsigned aes_encrypt_get_ctx_size_gcm(void)
+aes_rval
+aes_decrypt_aad_gcm(const unsigned char *aad, unsigned int aad_bytes, ccgcm_ctx *ctx)
{
- const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_encrypt;
+ const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_decrypt;
if (!gcm) {
- return 0;
+ return aes_error;
}
- return (cc_ctx_sizeof(ccgcm_ctx, gcm->size));
+
+ return ccgcm_aad(gcm, ctx, aad_bytes, aad);
}
-unsigned aes_decrypt_get_ctx_size_gcm(void)
+aes_rval
+aes_decrypt_gcm(const unsigned char *in_blk, unsigned int num_bytes,
+ unsigned char *out_blk, ccgcm_ctx *ctx)
{
const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_decrypt;
if (!gcm) {
- return 0;
+ return aes_error;
}
- return (cc_ctx_sizeof(ccgcm_ctx, gcm->size));
+
+ return ccgcm_update(gcm, ctx, num_bytes, in_blk, out_blk); //Actually gcm decrypt.
}
+aes_rval
+aes_decrypt_finalize_gcm(unsigned char *tag, unsigned int tag_bytes, ccgcm_ctx *ctx)
+{
+ const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_decrypt;
+ if (!gcm) {
+ return aes_error;
+ }
+
+ int rc = ccgcm_finalize(gcm, ctx, tag_bytes, tag);
+ if (rc) {
+ return rc;
+ }
+
+ return ccgcm_reset(gcm, ctx);
+}
+
+unsigned
+aes_encrypt_get_ctx_size_gcm(void)
+{
+ const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_encrypt;
+ if (!gcm) {
+ return 0;
+ }
+ return cc_ctx_sizeof(ccgcm_ctx, gcm->size);
+}
+
+unsigned
+aes_decrypt_get_ctx_size_gcm(void)
+{
+ const struct ccmode_gcm *gcm = g_crypto_funcs->ccaes_gcm_decrypt;
+ if (!gcm) {
+ return 0;
+ }
+ return cc_ctx_sizeof(ccgcm_ctx, gcm->size);
+}