2023-01-10 09:57:21 +01:00
|
|
|
/**
|
|
|
|
* \file aesce.h
|
|
|
|
*
|
2023-03-17 18:52:23 +01:00
|
|
|
* \brief Support hardware AES acceleration on Armv8-A processors with
|
|
|
|
* the Armv8-A Cryptographic Extension in AArch64 execution state.
|
2023-01-10 09:57:21 +01:00
|
|
|
*
|
|
|
|
* \warning These functions are only for internal use by other library
|
|
|
|
* functions; you must not call them directly.
|
|
|
|
*/
|
|
|
|
/*
|
|
|
|
* Copyright The Mbed TLS Contributors
|
2023-11-02 20:47:20 +01:00
|
|
|
* SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
|
2023-01-10 09:57:21 +01:00
|
|
|
*/
|
|
|
|
#ifndef MBEDTLS_AESCE_H
|
|
|
|
#define MBEDTLS_AESCE_H
|
|
|
|
|
|
|
|
#include "mbedtls/build_info.h"
|
|
|
|
|
|
|
|
#include "mbedtls/aes.h"
|
|
|
|
|
2023-08-18 10:31:01 +02:00
|
|
|
|
|
|
|
#if defined(MBEDTLS_AESCE_C) && defined(MBEDTLS_ARCH_IS_ARM64)
|
2023-01-10 09:57:21 +01:00
|
|
|
|
2023-08-18 10:31:01 +02:00
|
|
|
#define MBEDTLS_AESCE_HAVE_CODE
|
2023-01-10 09:57:21 +01:00
|
|
|
|
|
|
|
#ifdef __cplusplus
|
|
|
|
extern "C" {
|
|
|
|
#endif
|
2023-01-10 09:59:51 +01:00
|
|
|
|
2023-08-04 13:31:58 +02:00
|
|
|
#if defined(__linux__) && !defined(MBEDTLS_AES_USE_HARDWARE_ONLY)
|
|
|
|
|
2023-08-04 13:52:51 +02:00
|
|
|
extern signed char mbedtls_aesce_has_support_result;
|
2023-08-04 13:31:58 +02:00
|
|
|
|
2023-01-10 09:59:51 +01:00
|
|
|
/**
|
2023-02-21 07:49:02 +01:00
|
|
|
* \brief Internal function to detect the crypto extension in CPUs.
|
2023-01-10 09:59:51 +01:00
|
|
|
*
|
|
|
|
* \return 1 if CPU has support for the feature, 0 otherwise
|
|
|
|
*/
|
2023-08-04 13:31:58 +02:00
|
|
|
int mbedtls_aesce_has_support_impl(void);
|
|
|
|
|
2023-08-04 15:27:58 +02:00
|
|
|
#define MBEDTLS_AESCE_HAS_SUPPORT() (mbedtls_aesce_has_support_result == -1 ? \
|
2023-08-04 13:31:58 +02:00
|
|
|
mbedtls_aesce_has_support_impl() : \
|
|
|
|
mbedtls_aesce_has_support_result)
|
|
|
|
|
|
|
|
#else /* defined(__linux__) && !defined(MBEDTLS_AES_USE_HARDWARE_ONLY) */
|
|
|
|
|
|
|
|
/* If we are not on Linux, we can't detect support so assume that it's supported.
|
|
|
|
* Similarly, assume support if MBEDTLS_AES_USE_HARDWARE_ONLY is set.
|
|
|
|
*/
|
2023-08-04 15:27:58 +02:00
|
|
|
#define MBEDTLS_AESCE_HAS_SUPPORT() 1
|
2023-03-31 08:32:47 +02:00
|
|
|
|
2023-08-04 13:31:58 +02:00
|
|
|
#endif /* defined(__linux__) && !defined(MBEDTLS_AES_USE_HARDWARE_ONLY) */
|
2023-01-10 09:59:51 +01:00
|
|
|
|
2023-01-10 10:38:26 +01:00
|
|
|
/**
|
|
|
|
* \brief Internal AES-ECB block encryption and decryption
|
|
|
|
*
|
2023-06-16 10:36:50 +02:00
|
|
|
* \warning This assumes that the context specifies either 10, 12 or 14
|
|
|
|
* rounds and will behave incorrectly if this is not the case.
|
2023-06-15 17:21:31 +02:00
|
|
|
*
|
2023-01-10 10:38:26 +01:00
|
|
|
* \param ctx AES context
|
|
|
|
* \param mode MBEDTLS_AES_ENCRYPT or MBEDTLS_AES_DECRYPT
|
|
|
|
* \param input 16-byte input block
|
|
|
|
* \param output 16-byte output block
|
|
|
|
*
|
|
|
|
* \return 0 on success (cannot fail)
|
|
|
|
*/
|
|
|
|
int mbedtls_aesce_crypt_ecb(mbedtls_aes_context *ctx,
|
|
|
|
int mode,
|
|
|
|
const unsigned char input[16],
|
|
|
|
unsigned char output[16]);
|
|
|
|
|
2023-01-10 11:17:15 +01:00
|
|
|
/**
|
|
|
|
* \brief Internal GCM multiplication: c = a * b in GF(2^128)
|
|
|
|
*
|
|
|
|
* \note This function is only for internal use by other library
|
|
|
|
* functions; you must not call it directly.
|
|
|
|
*
|
|
|
|
* \param c Result
|
|
|
|
* \param a First operand
|
|
|
|
* \param b Second operand
|
|
|
|
*
|
|
|
|
* \note Both operands and result are bit strings interpreted as
|
|
|
|
* elements of GF(2^128) as per the GCM spec.
|
|
|
|
*/
|
|
|
|
void mbedtls_aesce_gcm_mult(unsigned char c[16],
|
|
|
|
const unsigned char a[16],
|
|
|
|
const unsigned char b[16]);
|
|
|
|
|
|
|
|
|
2023-01-10 10:07:01 +01:00
|
|
|
/**
|
|
|
|
* \brief Internal round key inversion. This function computes
|
|
|
|
* decryption round keys from the encryption round keys.
|
|
|
|
*
|
|
|
|
* \param invkey Round keys for the equivalent inverse cipher
|
|
|
|
* \param fwdkey Original round keys (for encryption)
|
|
|
|
* \param nr Number of rounds (that is, number of round keys minus one)
|
|
|
|
*/
|
|
|
|
void mbedtls_aesce_inverse_key(unsigned char *invkey,
|
|
|
|
const unsigned char *fwdkey,
|
|
|
|
int nr);
|
|
|
|
|
2023-01-10 10:05:42 +01:00
|
|
|
/**
|
|
|
|
* \brief Internal key expansion for encryption
|
|
|
|
*
|
|
|
|
* \param rk Destination buffer where the round keys are written
|
|
|
|
* \param key Encryption key
|
|
|
|
* \param bits Key size in bits (must be 128, 192 or 256)
|
|
|
|
*
|
|
|
|
* \return 0 if successful, or MBEDTLS_ERR_AES_INVALID_KEY_LENGTH
|
|
|
|
*/
|
|
|
|
int mbedtls_aesce_setkey_enc(unsigned char *rk,
|
|
|
|
const unsigned char *key,
|
|
|
|
size_t bits);
|
|
|
|
|
2023-01-10 09:57:21 +01:00
|
|
|
#ifdef __cplusplus
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2023-08-18 10:31:01 +02:00
|
|
|
#endif /* MBEDTLS_AESCE_C && MBEDTLS_ARCH_IS_ARM64 */
|
2023-01-10 09:57:21 +01:00
|
|
|
|
|
|
|
#endif /* MBEDTLS_AESCE_H */
|