1 /*
2 * Copyright (C) 2022 Huawei Technologies Co., Ltd.
3 * Licensed under the Mulan PSL v2.
4 * You can use this software according to the terms and conditions of the Mulan PSL v2.
5 * You may obtain a copy of Mulan PSL v2 at:
6 * http://license.coscl.org.cn/MulanPSL2
7 * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESS OR
8 * IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, MERCHANTABILITY OR FIT FOR A PARTICULAR
9 * PURPOSE.
10 * See the Mulan PSL v2 for more details.
11 */
12
13 #include "crypto_hal_ec.h"
14 #include <tee_log.h>
15 #include <tee_crypto_hal.h>
16 #include "crypto_manager.h"
17 #include "soft_ec_api.h"
18
19 #define BITS_OF_BYTE 8
20
tee_crypto_ecc_generate_keypair(uint32_t key_size,uint32_t curve,struct ecc_pub_key_t * public_key,struct ecc_priv_key_t * private_key,uint32_t engine)21 int32_t tee_crypto_ecc_generate_keypair(uint32_t key_size, uint32_t curve,
22 struct ecc_pub_key_t *public_key, struct ecc_priv_key_t *private_key, uint32_t engine)
23 {
24 if ((public_key == NULL) || (private_key == NULL)) {
25 tloge("Invalid params\n");
26 return CRYPTO_BAD_PARAMETERS;
27 }
28
29 if (engine == SOFT_CRYPTO) {
30 public_key->x_len = sizeof(public_key->x);
31 public_key->y_len = sizeof(public_key->y);
32 private_key->r_len = sizeof(private_key->r);
33 return soft_crypto_ecc_generate_keypair(key_size, curve, public_key, private_key);
34 }
35
36 public_key->x_len = key_size / BITS_OF_BYTE;
37 public_key->y_len = key_size / BITS_OF_BYTE;
38 private_key->r_len = key_size / BITS_OF_BYTE;
39
40 return crypto_driver_ecc_generate_keypair(key_size, curve, public_key, private_key, engine);
41 }
42
tee_crypto_ecc_encrypt(uint32_t alg_type,const struct ecc_pub_key_t * public_key,const struct asymmetric_params_t * ec_params,const struct memref_t * data_in,struct memref_t * data_out,uint32_t engine)43 int32_t tee_crypto_ecc_encrypt(uint32_t alg_type, const struct ecc_pub_key_t *public_key,
44 const struct asymmetric_params_t *ec_params, const struct memref_t *data_in,
45 struct memref_t *data_out, uint32_t engine)
46 {
47 if ((public_key == NULL) || (data_in == NULL) || (data_out == NULL)) {
48 tloge("Invalid params\n");
49 return CRYPTO_BAD_PARAMETERS;
50 }
51 if (engine == SOFT_CRYPTO)
52 return soft_crypto_ecc_encrypt(alg_type, public_key, ec_params, data_in, data_out);
53 return crypto_driver_ecc_encrypt(alg_type, public_key, ec_params, data_in, data_out, engine);
54 }
55
tee_crypto_ecc_decrypt(uint32_t alg_type,const struct ecc_priv_key_t * private_key,const struct asymmetric_params_t * ec_params,const struct memref_t * data_in,struct memref_t * data_out,uint32_t engine)56 int32_t tee_crypto_ecc_decrypt(uint32_t alg_type, const struct ecc_priv_key_t *private_key,
57 const struct asymmetric_params_t *ec_params, const struct memref_t *data_in,
58 struct memref_t *data_out, uint32_t engine)
59 {
60 if ((private_key == NULL) || (data_in == NULL) || (data_out == NULL)) {
61 tloge("Invalid params\n");
62 return CRYPTO_BAD_PARAMETERS;
63 }
64 if (engine == SOFT_CRYPTO)
65 return soft_crypto_ecc_decrypt(alg_type, private_key, ec_params, data_in, data_out);
66 return crypto_driver_ecc_decrypt(alg_type, private_key, ec_params, data_in, data_out, engine);
67 }
68
tee_crypto_ecc_sign_digest(uint32_t alg_type,const struct ecc_priv_key_t * private_key,const struct asymmetric_params_t * ec_params,const struct memref_t * digest,struct memref_t * signature,uint32_t engine)69 int32_t tee_crypto_ecc_sign_digest(uint32_t alg_type, const struct ecc_priv_key_t *private_key,
70 const struct asymmetric_params_t *ec_params, const struct memref_t *digest,
71 struct memref_t *signature, uint32_t engine)
72 {
73 if ((private_key == NULL) || (digest == NULL) || (signature == NULL)) {
74 tloge("Invalid params\n");
75 return CRYPTO_BAD_PARAMETERS;
76 }
77 if (engine == SOFT_CRYPTO)
78 return soft_crypto_ecc_sign_digest(alg_type, private_key, ec_params, digest, signature);
79 return crypto_driver_ecc_sign_digest(alg_type, private_key, ec_params, digest, signature, engine);
80 }
81
tee_crypto_ecc_verify_digest(uint32_t alg_type,const struct ecc_pub_key_t * public_key,const struct asymmetric_params_t * ec_params,const struct memref_t * digest,const struct memref_t * signature,uint32_t engine)82 int32_t tee_crypto_ecc_verify_digest(uint32_t alg_type, const struct ecc_pub_key_t *public_key,
83 const struct asymmetric_params_t *ec_params, const struct memref_t *digest,
84 const struct memref_t *signature, uint32_t engine)
85 {
86 if ((public_key == NULL) || (digest == NULL) || (signature == NULL)) {
87 tloge("Invalid params\n");
88 return CRYPTO_BAD_PARAMETERS;
89 }
90 if (engine == SOFT_CRYPTO)
91 return soft_crypto_ecc_verify_digest(alg_type, public_key, ec_params, digest, signature);
92 return crypto_driver_ecc_verify_digest(alg_type, public_key, ec_params, digest, signature, engine);
93 }
94