aboutsummaryrefslogtreecommitdiff
path: root/extmod/moducryptolib.c
diff options
context:
space:
mode:
authorYonatan Goldschmidt <yon.goldschmidt@gmail.com>2018-06-16 01:16:57 +0300
committerDamien George <damien.p.george@gmail.com>2018-06-27 16:44:59 +1000
commiteacb233b8f274a4867a34ca4478e42ba3ae97a5b (patch)
tree0b463b7be469318067508970adac37ccb9969c89 /extmod/moducryptolib.c
parente328b4593c4bc84d159c772c1b0f1880f565f5f3 (diff)
extmod/moducryptolib: Add an mbedTLS implementation for this module.
Diffstat (limited to 'extmod/moducryptolib.c')
-rw-r--r--extmod/moducryptolib.c54
1 files changed, 54 insertions, 0 deletions
diff --git a/extmod/moducryptolib.c b/extmod/moducryptolib.c
index 23178acf2..ba64f04f9 100644
--- a/extmod/moducryptolib.c
+++ b/extmod/moducryptolib.c
@@ -54,6 +54,24 @@ enum {
#define AES_CTX_IMPL AES_CTX
#endif
+#if MICROPY_SSL_MBEDTLS
+#include <mbedtls/aes.h>
+
+// we can't run mbedtls AES key schedule until we know whether we're used for encrypt or decrypt.
+// therefore, we store the key & keysize and on the first call to encrypt/decrypt we override them
+// with the mbedtls_aes_context, as they are not longer required. (this is done to save space)
+struct mbedtls_aes_ctx_with_key {
+ union {
+ mbedtls_aes_context mbedtls_ctx;
+ struct {
+ uint8_t key[32];
+ uint8_t keysize;
+ } init_data;
+ } u;
+ unsigned char iv[16];
+};
+#define AES_CTX_IMPL struct mbedtls_aes_ctx_with_key
+#endif
typedef struct _mp_obj_aes_t {
mp_obj_base_t base;
@@ -104,6 +122,42 @@ STATIC void aes_process_cbc_impl(AES_CTX_IMPL *ctx, const uint8_t *in, uint8_t *
}
#endif
+#if MICROPY_SSL_MBEDTLS
+STATIC void aes_initial_set_key_impl(AES_CTX_IMPL *ctx, const uint8_t *key, size_t keysize, const uint8_t iv[16]) {
+ ctx->u.init_data.keysize = keysize;
+ memcpy(ctx->u.init_data.key, key, keysize);
+
+ if (NULL != iv) {
+ memcpy(ctx->iv, iv, sizeof(ctx->iv));
+ }
+}
+
+STATIC void aes_final_set_key_impl(AES_CTX_IMPL *ctx, bool encrypt) {
+ // first, copy key aside
+ uint8_t key[32];
+ uint8_t keysize = ctx->u.init_data.keysize;
+ memcpy(key, ctx->u.init_data.key, keysize);
+ // now, override key with the mbedtls context object
+ mbedtls_aes_init(&ctx->u.mbedtls_ctx);
+
+ // setkey call will succeed, we've already checked the keysize earlier.
+ assert(16 == keysize || 32 == keysize);
+ if (encrypt) {
+ mbedtls_aes_setkey_enc(&ctx->u.mbedtls_ctx, key, keysize * 8);
+ } else {
+ mbedtls_aes_setkey_dec(&ctx->u.mbedtls_ctx, key, keysize * 8);
+ }
+}
+
+STATIC void aes_process_ecb_impl(AES_CTX_IMPL *ctx, const uint8_t in[16], uint8_t out[16], bool encrypt) {
+ mbedtls_aes_crypt_ecb(&ctx->u.mbedtls_ctx, encrypt ? MBEDTLS_AES_ENCRYPT : MBEDTLS_AES_DECRYPT, in, out);
+}
+
+STATIC void aes_process_cbc_impl(AES_CTX_IMPL *ctx, const uint8_t *in, uint8_t *out, size_t in_len, bool encrypt) {
+ mbedtls_aes_crypt_cbc(&ctx->u.mbedtls_ctx, encrypt ? MBEDTLS_AES_ENCRYPT : MBEDTLS_AES_DECRYPT, in_len, ctx->iv, in, out);
+}
+#endif
+
STATIC mp_obj_t aes_make_new(const mp_obj_type_t *type, size_t n_args, size_t n_kw, const mp_obj_t *args) {
mp_arg_check_num(n_args, n_kw, 2, 3, false);
mp_obj_aes_t *o = m_new_obj(mp_obj_aes_t);