mirror of
https://github.com/acidanthera/audk.git
synced 2025-04-08 17:05:09 +02:00
CryptoPkg: Add AeadAesGcm based on Mbedtls
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4177 AeadAesGcm implementation based on Mbedtls. Cc: Jiewen Yao <jiewen.yao@intel.com> Cc: Yi Li <yi1.li@intel.com> Signed-off-by: Wenxing Hou <wenxing.hou@intel.com> Reviewed-by: Yi Li <yi1.li@intel.com> Acked-by: Jiewen Yao <Jiewen.yao@intel.com>
This commit is contained in:
parent
88a4de450f
commit
1d8fedb0cd
227
CryptoPkg/Library/BaseCryptLibMbedTls/Cipher/CryptAeadAesGcm.c
Normal file
227
CryptoPkg/Library/BaseCryptLibMbedTls/Cipher/CryptAeadAesGcm.c
Normal file
@ -0,0 +1,227 @@
|
||||
/** @file
|
||||
AEAD (AES-GCM) Wrapper Implementation over MbedTLS.
|
||||
|
||||
RFC 5116 - An Interface and Algorithms for Authenticated Encryption
|
||||
NIST SP800-38d - Cipher Modes of Operation: Galois / Counter Mode(GCM) and GMAC
|
||||
|
||||
Copyright (c) 2024, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
||||
#include "InternalCryptLib.h"
|
||||
#include <mbedtls/gcm.h>
|
||||
|
||||
/**
|
||||
Performs AEAD AES-GCM authenticated encryption on a data buffer and additional authenticated data (AAD).
|
||||
|
||||
IvSize must be 12, otherwise FALSE is returned.
|
||||
KeySize must be 16, 24 or 32, otherwise FALSE is returned.
|
||||
TagSize must be 12, 13, 14, 15, 16, otherwise FALSE is returned.
|
||||
|
||||
@param[in] Key Pointer to the encryption key.
|
||||
@param[in] KeySize Size of the encryption key in bytes.
|
||||
@param[in] Iv Pointer to the IV value.
|
||||
@param[in] IvSize Size of the IV value in bytes.
|
||||
@param[in] AData Pointer to the additional authenticated data (AAD).
|
||||
@param[in] ADataSize Size of the additional authenticated data (AAD) in bytes.
|
||||
@param[in] DataIn Pointer to the input data buffer to be encrypted.
|
||||
@param[in] DataInSize Size of the input data buffer in bytes.
|
||||
@param[out] TagOut Pointer to a buffer that receives the authentication tag output.
|
||||
@param[in] TagSize Size of the authentication tag in bytes.
|
||||
@param[out] DataOut Pointer to a buffer that receives the encryption output.
|
||||
@param[out] DataOutSize Size of the output data buffer in bytes.
|
||||
|
||||
@retval TRUE AEAD AES-GCM authenticated encryption succeeded.
|
||||
@retval FALSE AEAD AES-GCM authenticated encryption failed.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
AeadAesGcmEncrypt (
|
||||
IN CONST UINT8 *Key,
|
||||
IN UINTN KeySize,
|
||||
IN CONST UINT8 *Iv,
|
||||
IN UINTN IvSize,
|
||||
IN CONST UINT8 *AData,
|
||||
IN UINTN ADataSize,
|
||||
IN CONST UINT8 *DataIn,
|
||||
IN UINTN DataInSize,
|
||||
OUT UINT8 *TagOut,
|
||||
IN UINTN TagSize,
|
||||
OUT UINT8 *DataOut,
|
||||
OUT UINTN *DataOutSize
|
||||
)
|
||||
{
|
||||
mbedtls_gcm_context Ctx;
|
||||
INT32 Ret;
|
||||
|
||||
if (DataInSize > INT_MAX) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
if (ADataSize > INT_MAX) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
if (IvSize != 12) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
switch (KeySize) {
|
||||
case 16:
|
||||
case 24:
|
||||
case 32:
|
||||
break;
|
||||
default:
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
if ((TagSize != 12) && (TagSize != 13) && (TagSize != 14) && (TagSize != 15) && (TagSize != 16)) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
if (DataOutSize != NULL) {
|
||||
if ((*DataOutSize > INT_MAX) || (*DataOutSize < DataInSize)) {
|
||||
return FALSE;
|
||||
}
|
||||
}
|
||||
|
||||
mbedtls_gcm_init (&Ctx);
|
||||
|
||||
Ret = mbedtls_gcm_setkey (&Ctx, MBEDTLS_CIPHER_ID_AES, Key, (UINT32)(KeySize * 8));
|
||||
if (Ret != 0) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
Ret = mbedtls_gcm_crypt_and_tag (
|
||||
&Ctx,
|
||||
MBEDTLS_GCM_ENCRYPT,
|
||||
(UINT32)DataInSize,
|
||||
Iv,
|
||||
(UINT32)IvSize,
|
||||
AData,
|
||||
(UINT32)ADataSize,
|
||||
DataIn,
|
||||
DataOut,
|
||||
TagSize,
|
||||
TagOut
|
||||
);
|
||||
mbedtls_gcm_free (&Ctx);
|
||||
if (Ret != 0) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
if (DataOutSize != NULL) {
|
||||
*DataOutSize = DataInSize;
|
||||
}
|
||||
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
/**
|
||||
Performs AEAD AES-GCM authenticated decryption on a data buffer and additional authenticated data (AAD).
|
||||
|
||||
IvSize must be 12, otherwise FALSE is returned.
|
||||
KeySize must be 16, 24 or 32, otherwise FALSE is returned.
|
||||
TagSize must be 12, 13, 14, 15, 16, otherwise FALSE is returned.
|
||||
If additional authenticated data verification fails, FALSE is returned.
|
||||
|
||||
@param[in] Key Pointer to the encryption key.
|
||||
@param[in] KeySize Size of the encryption key in bytes.
|
||||
@param[in] Iv Pointer to the IV value.
|
||||
@param[in] IvSize Size of the IV value in bytes.
|
||||
@param[in] AData Pointer to the additional authenticated data (AAD).
|
||||
@param[in] ADataSize Size of the additional authenticated data (AAD) in bytes.
|
||||
@param[in] DataIn Pointer to the input data buffer to be decrypted.
|
||||
@param[in] DataInSize Size of the input data buffer in bytes.
|
||||
@param[in] Tag Pointer to a buffer that contains the authentication tag.
|
||||
@param[in] TagSize Size of the authentication tag in bytes.
|
||||
@param[out] DataOut Pointer to a buffer that receives the decryption output.
|
||||
@param[out] DataOutSize Size of the output data buffer in bytes.
|
||||
|
||||
@retval TRUE AEAD AES-GCM authenticated decryption succeeded.
|
||||
@retval FALSE AEAD AES-GCM authenticated decryption failed.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
AeadAesGcmDecrypt (
|
||||
IN CONST UINT8 *Key,
|
||||
IN UINTN KeySize,
|
||||
IN CONST UINT8 *Iv,
|
||||
IN UINTN IvSize,
|
||||
IN CONST UINT8 *AData,
|
||||
IN UINTN ADataSize,
|
||||
IN CONST UINT8 *DataIn,
|
||||
IN UINTN DataInSize,
|
||||
IN CONST UINT8 *Tag,
|
||||
IN UINTN TagSize,
|
||||
OUT UINT8 *DataOut,
|
||||
OUT UINTN *DataOutSize
|
||||
)
|
||||
{
|
||||
mbedtls_gcm_context Ctx;
|
||||
INT32 Ret;
|
||||
|
||||
if (DataInSize > INT_MAX) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
if (ADataSize > INT_MAX) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
if (IvSize != 12) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
switch (KeySize) {
|
||||
case 16:
|
||||
case 24:
|
||||
case 32:
|
||||
break;
|
||||
default:
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
if ((TagSize != 12) && (TagSize != 13) && (TagSize != 14) && (TagSize != 15) && (TagSize != 16)) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
if (DataOutSize != NULL) {
|
||||
if ((*DataOutSize > INT_MAX) || (*DataOutSize < DataInSize)) {
|
||||
return FALSE;
|
||||
}
|
||||
}
|
||||
|
||||
mbedtls_gcm_init (&Ctx);
|
||||
|
||||
Ret = mbedtls_gcm_setkey (&Ctx, MBEDTLS_CIPHER_ID_AES, Key, (UINT32)(KeySize * 8));
|
||||
if (Ret != 0) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
Ret = mbedtls_gcm_auth_decrypt (
|
||||
&Ctx,
|
||||
(UINT32)DataInSize,
|
||||
Iv,
|
||||
(UINT32)IvSize,
|
||||
AData,
|
||||
(UINT32)ADataSize,
|
||||
Tag,
|
||||
(UINT32)TagSize,
|
||||
DataIn,
|
||||
DataOut
|
||||
);
|
||||
mbedtls_gcm_free (&Ctx);
|
||||
if (Ret != 0) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
if (DataOutSize != NULL) {
|
||||
*DataOutSize = DataInSize;
|
||||
}
|
||||
|
||||
return TRUE;
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user