• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2022 Huawei Technologies Co., Ltd.
3  * Licensed under the Mulan PSL v2.
4  * You can use this software according to the terms and conditions of the Mulan PSL v2.
5  * You may obtain a copy of Mulan PSL v2 at:
6  *     http://license.coscl.org.cn/MulanPSL2
7  * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESS OR
8  * IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, MERCHANTABILITY OR FIT FOR A PARTICULAR
9  * PURPOSE.
10  * See the Mulan PSL v2 for more details.
11  */
12 
13 #include "crypto_hal_ec.h"
14 #include <tee_log.h>
15 #include <tee_crypto_hal.h>
16 #include "crypto_manager.h"
17 #include "soft_ec_api.h"
18 
19 #define BITS_OF_BYTE 8
20 
tee_crypto_ecc_generate_keypair(uint32_t key_size,uint32_t curve,struct ecc_pub_key_t * public_key,struct ecc_priv_key_t * private_key,uint32_t engine)21 int32_t tee_crypto_ecc_generate_keypair(uint32_t key_size, uint32_t curve,
22     struct ecc_pub_key_t *public_key, struct ecc_priv_key_t *private_key, uint32_t engine)
23 {
24     if ((public_key == NULL) || (private_key == NULL)) {
25         tloge("Invalid params\n");
26         return CRYPTO_BAD_PARAMETERS;
27     }
28 
29     if (engine == SOFT_CRYPTO) {
30         public_key->x_len = sizeof(public_key->x);
31         public_key->y_len = sizeof(public_key->y);
32         private_key->r_len = sizeof(private_key->r);
33         return soft_crypto_ecc_generate_keypair(key_size, curve, public_key, private_key);
34     }
35 
36     public_key->x_len = key_size / BITS_OF_BYTE;
37     public_key->y_len = key_size / BITS_OF_BYTE;
38     private_key->r_len = key_size / BITS_OF_BYTE;
39 
40     return crypto_driver_ecc_generate_keypair(key_size, curve, public_key, private_key, engine);
41 }
42 
tee_crypto_ecc_encrypt(uint32_t alg_type,const struct ecc_pub_key_t * public_key,const struct asymmetric_params_t * ec_params,const struct memref_t * data_in,struct memref_t * data_out,uint32_t engine)43 int32_t tee_crypto_ecc_encrypt(uint32_t alg_type, const struct ecc_pub_key_t *public_key,
44     const struct asymmetric_params_t *ec_params, const struct memref_t *data_in,
45     struct memref_t *data_out, uint32_t engine)
46 {
47     if ((public_key == NULL) || (data_in == NULL) || (data_out == NULL)) {
48         tloge("Invalid params\n");
49         return CRYPTO_BAD_PARAMETERS;
50     }
51     if (engine == SOFT_CRYPTO)
52         return soft_crypto_ecc_encrypt(alg_type, public_key, ec_params, data_in, data_out);
53     return crypto_driver_ecc_encrypt(alg_type, public_key, ec_params, data_in, data_out, engine);
54 }
55 
tee_crypto_ecc_decrypt(uint32_t alg_type,const struct ecc_priv_key_t * private_key,const struct asymmetric_params_t * ec_params,const struct memref_t * data_in,struct memref_t * data_out,uint32_t engine)56 int32_t tee_crypto_ecc_decrypt(uint32_t alg_type, const struct ecc_priv_key_t *private_key,
57     const struct asymmetric_params_t *ec_params, const struct memref_t *data_in,
58     struct memref_t *data_out, uint32_t engine)
59 {
60     if ((private_key == NULL) || (data_in == NULL) || (data_out == NULL)) {
61         tloge("Invalid params\n");
62         return CRYPTO_BAD_PARAMETERS;
63     }
64     if (engine == SOFT_CRYPTO)
65         return soft_crypto_ecc_decrypt(alg_type, private_key, ec_params, data_in, data_out);
66     return crypto_driver_ecc_decrypt(alg_type, private_key, ec_params, data_in, data_out, engine);
67 }
68 
tee_crypto_ecc_sign_digest(uint32_t alg_type,const struct ecc_priv_key_t * private_key,const struct asymmetric_params_t * ec_params,const struct memref_t * digest,struct memref_t * signature,uint32_t engine)69 int32_t tee_crypto_ecc_sign_digest(uint32_t alg_type, const struct ecc_priv_key_t *private_key,
70     const struct asymmetric_params_t *ec_params, const struct memref_t *digest,
71     struct memref_t *signature, uint32_t engine)
72 {
73     if ((private_key == NULL) || (digest == NULL) || (signature == NULL)) {
74         tloge("Invalid params\n");
75         return CRYPTO_BAD_PARAMETERS;
76     }
77     if (engine == SOFT_CRYPTO)
78         return soft_crypto_ecc_sign_digest(alg_type, private_key, ec_params, digest, signature);
79     return crypto_driver_ecc_sign_digest(alg_type, private_key, ec_params, digest, signature, engine);
80 }
81 
tee_crypto_ecc_verify_digest(uint32_t alg_type,const struct ecc_pub_key_t * public_key,const struct asymmetric_params_t * ec_params,const struct memref_t * digest,const struct memref_t * signature,uint32_t engine)82 int32_t tee_crypto_ecc_verify_digest(uint32_t alg_type, const struct ecc_pub_key_t *public_key,
83     const struct asymmetric_params_t *ec_params, const struct memref_t *digest,
84     const struct memref_t *signature, uint32_t engine)
85 {
86     if ((public_key == NULL) || (digest == NULL) || (signature == NULL)) {
87         tloge("Invalid params\n");
88         return CRYPTO_BAD_PARAMETERS;
89     }
90     if (engine == SOFT_CRYPTO)
91         return soft_crypto_ecc_verify_digest(alg_type, public_key, ec_params, digest, signature);
92     return crypto_driver_ecc_verify_digest(alg_type, public_key, ec_params, digest, signature, engine);
93 }
94