1214 lines
		
	
	
		
			42 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
		
		
			
		
	
	
			1214 lines
		
	
	
		
			42 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
|  | /**
 | ||
|  |  * Copyright (c) 2018 - 2020, Nordic Semiconductor ASA | ||
|  |  * | ||
|  |  * All rights reserved. | ||
|  |  * | ||
|  |  * Redistribution and use in source and binary forms, with or without modification, | ||
|  |  * are permitted provided that the following conditions are met: | ||
|  |  * | ||
|  |  * 1. Redistributions of source code must retain the above copyright notice, this | ||
|  |  *    list of conditions and the following disclaimer. | ||
|  |  * | ||
|  |  * 2. Redistributions in binary form, except as embedded into a Nordic | ||
|  |  *    Semiconductor ASA integrated circuit in a product or a software update for | ||
|  |  *    such product, must reproduce the above copyright notice, this list of | ||
|  |  *    conditions and the following disclaimer in the documentation and/or other | ||
|  |  *    materials provided with the distribution. | ||
|  |  * | ||
|  |  * 3. Neither the name of Nordic Semiconductor ASA nor the names of its | ||
|  |  *    contributors may be used to endorse or promote products derived from this | ||
|  |  *    software without specific prior written permission. | ||
|  |  * | ||
|  |  * 4. This software, with or without modification, must only be used with a | ||
|  |  *    Nordic Semiconductor ASA integrated circuit. | ||
|  |  * | ||
|  |  * 5. Any software provided in binary form under this license must not be reverse | ||
|  |  *    engineered, decompiled, modified and/or disassembled. | ||
|  |  * | ||
|  |  * THIS SOFTWARE IS PROVIDED BY NORDIC SEMICONDUCTOR ASA "AS IS" AND ANY EXPRESS | ||
|  |  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES | ||
|  |  * OF MERCHANTABILITY, NONINFRINGEMENT, AND FITNESS FOR A PARTICULAR PURPOSE ARE | ||
|  |  * DISCLAIMED. IN NO EVENT SHALL NORDIC SEMICONDUCTOR ASA OR CONTRIBUTORS BE | ||
|  |  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR | ||
|  |  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE | ||
|  |  * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
|  |  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
|  |  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT | ||
|  |  * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | ||
|  |  * | ||
|  |  */ | ||
|  | 
 | ||
|  | #include "sdk_common.h"
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO)
 | ||
|  | 
 | ||
|  | /*lint -save -e????*/ | ||
|  | #include "mbedtls/md.h"
 | ||
|  | #include "mbedtls/aes.h"
 | ||
|  | #include "mbedtls/cipher.h"
 | ||
|  | /*lint -restore*/ | ||
|  | #include "nrf_crypto_error.h"
 | ||
|  | #include "mbedtls_backend_aes.h"
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_MBEDTLS_AES)
 | ||
|  | 
 | ||
|  | /* macro changing bits to bytes */ | ||
|  | #define BITS_TO_BYTES(bits)     ((bits)>>3)
 | ||
|  | #define BACKEND_ERROR_CHECK(error)      \
 | ||
|  |     do {                                \ | ||
|  |         if ((error) != 0)               \ | ||
|  |         {                               \ | ||
|  |             return result_get((error)); \ | ||
|  |         }                               \ | ||
|  |     } while (0); | ||
|  | 
 | ||
|  | /**@internal @brief Type declarations of templates matching all possible context sizes
 | ||
|  |  *                  for this backend. | ||
|  |  */ | ||
|  | typedef struct | ||
|  | { | ||
|  |     nrf_crypto_aes_internal_context_t header;       /**< Common header for context. */ | ||
|  |     nrf_crypto_backend_aes_ctx_t      backend;      /**< Backend-specific internal context. */ | ||
|  |     uint32_t                          context[1];   /**< AES context internal to mbed TLS. */ | ||
|  | } nrf_crypto_backend_mbedtls_aes_any_context_t; | ||
|  | 
 | ||
|  | /**@internal @brief Type declarations of templates matching all possible context sizes
 | ||
|  |  *                  for this backend. | ||
|  |  */ | ||
|  | typedef union | ||
|  | { | ||
|  |     nrf_crypto_backend_mbedtls_aes_any_context_t any;      /**< Common for all contexts. */ | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_ECB)
 | ||
|  |     nrf_crypto_backend_aes_ecb_context_t ecb; | ||
|  | #endif
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CBC)
 | ||
|  |     nrf_crypto_backend_aes_cbc_context_t cbc; | ||
|  | #endif
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CTR)
 | ||
|  |     nrf_crypto_backend_aes_ctr_context_t ctr; | ||
|  | #endif
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CFB)
 | ||
|  |     nrf_crypto_backend_aes_cfb_context_t cfb; | ||
|  | #endif
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CBC_MAC)
 | ||
|  |     nrf_crypto_backend_aes_cbc_mac_context_t cbc_mac; | ||
|  | #endif
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CMAC)
 | ||
|  |     nrf_crypto_backend_aes_cmac_context_t cmac; | ||
|  | #endif
 | ||
|  | } nrf_crypto_backend_mbedtls_aes_context_t; | ||
|  | 
 | ||
|  | 
 | ||
|  | static ret_code_t result_get(int error) | ||
|  | { | ||
|  |     ret_code_t ret_val; | ||
|  |     switch (error) | ||
|  |     { | ||
|  |         case 0: | ||
|  |             ret_val = NRF_SUCCESS; | ||
|  |             break; | ||
|  | 
 | ||
|  |         case MBEDTLS_ERR_AES_INVALID_INPUT_LENGTH: | ||
|  |             ret_val = NRF_ERROR_CRYPTO_INPUT_LENGTH; | ||
|  |             break; | ||
|  | 
 | ||
|  |         case MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA: | ||
|  |             ret_val = NRF_ERROR_CRYPTO_INPUT_LENGTH; | ||
|  |             break; | ||
|  | 
 | ||
|  |         case MBEDTLS_ERR_CIPHER_ALLOC_FAILED: | ||
|  |             ret_val = NRF_ERROR_CRYPTO_ALLOC_FAILED; | ||
|  |             break; | ||
|  | 
 | ||
|  |         case MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE: | ||
|  |             ret_val = NRF_ERROR_CRYPTO_FEATURE_UNAVAILABLE; | ||
|  |             break; | ||
|  | 
 | ||
|  |         case MBEDTLS_ERR_MD_BAD_INPUT_DATA: | ||
|  |             ret_val = NRF_ERROR_CRYPTO_INVALID_PARAM; | ||
|  |             break; | ||
|  | 
 | ||
|  |         default: | ||
|  |             ret_val = NRF_ERROR_CRYPTO_INTERNAL; | ||
|  |             break; | ||
|  |     } | ||
|  | 
 | ||
|  |     return ret_val; | ||
|  | } | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CMAC)
 | ||
|  | static ret_code_t backend_cmac_init(nrf_crypto_backend_aes_cmac_context_t * const p_cmac_ctx) | ||
|  | { | ||
|  |     int error; | ||
|  | 
 | ||
|  |     mbedtls_cipher_type_t         cipher_type; | ||
|  |     mbedtls_cipher_info_t const * p_cipher_info; | ||
|  | 
 | ||
|  |     mbedtls_cipher_init(&p_cmac_ctx->context); | ||
|  | 
 | ||
|  |     switch (p_cmac_ctx->header.p_info->key_size) | ||
|  |     { | ||
|  |         case NRF_CRYPTO_KEY_SIZE_128: | ||
|  |                 cipher_type = MBEDTLS_CIPHER_AES_128_ECB; | ||
|  |                 break; | ||
|  | 
 | ||
|  |         case NRF_CRYPTO_KEY_SIZE_192: | ||
|  |             cipher_type = MBEDTLS_CIPHER_AES_192_ECB; | ||
|  |             break; | ||
|  | 
 | ||
|  |         case NRF_CRYPTO_KEY_SIZE_256: | ||
|  |             cipher_type = MBEDTLS_CIPHER_AES_256_ECB; | ||
|  |             break; | ||
|  | 
 | ||
|  |         default: | ||
|  |                 return NRF_ERROR_CRYPTO_CONTEXT_NOT_INITIALIZED; | ||
|  |     } | ||
|  | 
 | ||
|  |     p_cipher_info = mbedtls_cipher_info_from_type(cipher_type); | ||
|  | 
 | ||
|  |     if (p_cipher_info == NULL) | ||
|  |     { | ||
|  |         return NRF_ERROR_CRYPTO_INTERNAL; | ||
|  |     } | ||
|  | 
 | ||
|  |     error = mbedtls_cipher_setup(&p_cmac_ctx->context, p_cipher_info); | ||
|  |     BACKEND_ERROR_CHECK(error); | ||
|  | 
 | ||
|  |     return NRF_SUCCESS; | ||
|  | } | ||
|  | #endif
 | ||
|  | 
 | ||
|  | static ret_code_t backend_mbedtls_init(void * const p_context, nrf_crypto_operation_t operation) | ||
|  | { | ||
|  |     ret_code_t ret_val = NRF_SUCCESS; | ||
|  | 
 | ||
|  |     nrf_crypto_backend_mbedtls_aes_context_t * p_ctx = | ||
|  |         (nrf_crypto_backend_mbedtls_aes_context_t *)p_context; | ||
|  | 
 | ||
|  |     switch (p_ctx->any.header.p_info->key_size) | ||
|  |     { | ||
|  |         case NRF_CRYPTO_KEY_SIZE_128: | ||
|  |         case NRF_CRYPTO_KEY_SIZE_192: | ||
|  |         case NRF_CRYPTO_KEY_SIZE_256: | ||
|  |             break; | ||
|  | 
 | ||
|  |         default: | ||
|  |             return NRF_ERROR_CRYPTO_KEY_SIZE; | ||
|  |     } | ||
|  | 
 | ||
|  |     switch (p_ctx->any.header.p_info->mode) | ||
|  |     { | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CBC)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_CBC: | ||
|  |         case NRF_CRYPTO_AES_MODE_CBC_PAD_PCKS7: | ||
|  |             VERIFY_FALSE(((operation != NRF_CRYPTO_ENCRYPT) && (operation != NRF_CRYPTO_DECRYPT)), | ||
|  |                          NRF_ERROR_CRYPTO_INVALID_PARAM); | ||
|  |             memset(&p_ctx->cbc.backend, 0, sizeof(p_ctx->cbc.backend)); | ||
|  | 
 | ||
|  |             mbedtls_aes_init(&p_ctx->cbc.context); | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CTR)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_CTR: | ||
|  |             VERIFY_FALSE(((operation != NRF_CRYPTO_ENCRYPT) && (operation != NRF_CRYPTO_DECRYPT)), | ||
|  |                          NRF_ERROR_CRYPTO_INVALID_PARAM); | ||
|  |             memset(&p_ctx->ctr.backend, 0, sizeof(p_ctx->ctr.backend)); | ||
|  | 
 | ||
|  |             mbedtls_aes_init(&p_ctx->ctr.context); | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CFB)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_CFB: | ||
|  |             VERIFY_FALSE(((operation != NRF_CRYPTO_ENCRYPT) && (operation != NRF_CRYPTO_DECRYPT)), | ||
|  |                          NRF_ERROR_CRYPTO_INVALID_PARAM); | ||
|  |             memset(&p_ctx->cfb.backend, 0, sizeof(p_ctx->cfb.backend)); | ||
|  | 
 | ||
|  |             mbedtls_aes_init(&p_ctx->cfb.context); | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_ECB)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_ECB: | ||
|  |         case NRF_CRYPTO_AES_MODE_ECB_PAD_PCKS7: | ||
|  |             VERIFY_FALSE(((operation != NRF_CRYPTO_ENCRYPT) && (operation != NRF_CRYPTO_DECRYPT)), | ||
|  |                          NRF_ERROR_CRYPTO_INVALID_PARAM); | ||
|  |             memset(&p_ctx->ecb.backend, 0, sizeof(p_ctx->ecb.backend)); | ||
|  | 
 | ||
|  |             mbedtls_aes_init(&p_ctx->ecb.context); | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CBC_MAC)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_CBC_MAC: | ||
|  |         case NRF_CRYPTO_AES_MODE_CBC_MAC_PAD_PCKS7: | ||
|  |             VERIFY_TRUE((operation == NRF_CRYPTO_MAC_CALCULATE), NRF_ERROR_CRYPTO_INVALID_PARAM); | ||
|  |             memset(&p_ctx->cbc_mac.backend, 0, sizeof(p_ctx->cbc_mac.backend)); | ||
|  | 
 | ||
|  |             mbedtls_aes_init(&p_ctx->cbc_mac.context); | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CMAC)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_CMAC: | ||
|  |             VERIFY_TRUE((operation == NRF_CRYPTO_MAC_CALCULATE), NRF_ERROR_CRYPTO_INVALID_PARAM); | ||
|  | 
 | ||
|  |             ret_val = backend_cmac_init(&p_ctx->cmac); | ||
|  |             break; | ||
|  | #endif
 | ||
|  |         default: | ||
|  |             ret_val = NRF_ERROR_CRYPTO_FEATURE_UNAVAILABLE; | ||
|  |             break; | ||
|  |     } | ||
|  | 
 | ||
|  |     p_ctx->any.backend.operation = operation; | ||
|  | 
 | ||
|  |     return ret_val; | ||
|  | } | ||
|  | 
 | ||
|  | static ret_code_t backend_mbedtls_uninit(void * const p_context) | ||
|  | { | ||
|  |     nrf_crypto_backend_mbedtls_aes_context_t * p_ctx = | ||
|  |         (nrf_crypto_backend_mbedtls_aes_context_t *)p_context; | ||
|  | 
 | ||
|  |     switch (p_ctx->any.header.p_info->mode) | ||
|  |     { | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CBC)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_CBC: | ||
|  |         case NRF_CRYPTO_AES_MODE_CBC_PAD_PCKS7: | ||
|  |             mbedtls_aes_free(&p_ctx->cbc.context); | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CTR)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_CTR: | ||
|  |             mbedtls_aes_free(&p_ctx->ctr.context); | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CFB)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_CFB: | ||
|  |             mbedtls_aes_free(&p_ctx->cfb.context); | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_ECB)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_ECB: | ||
|  |         case NRF_CRYPTO_AES_MODE_ECB_PAD_PCKS7: | ||
|  |             mbedtls_aes_free(&p_ctx->ecb.context); | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CBC_MAC)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_CBC_MAC: | ||
|  |         case NRF_CRYPTO_AES_MODE_CBC_MAC_PAD_PCKS7: | ||
|  |             mbedtls_aes_free(&p_ctx->cbc_mac.context); | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CMAC)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_CMAC: | ||
|  |             mbedtls_cipher_free(&p_ctx->cmac.context); | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  |         default: | ||
|  |             return NRF_ERROR_CRYPTO_FEATURE_UNAVAILABLE; | ||
|  |     } | ||
|  | 
 | ||
|  |     return NRF_SUCCESS; | ||
|  | } | ||
|  | 
 | ||
|  | static ret_code_t backend_mbedtls_key_set(void * const p_context, uint8_t * p_key) | ||
|  | { | ||
|  |     int        error; | ||
|  |     ret_code_t ret_val; | ||
|  | 
 | ||
|  |     nrf_crypto_backend_mbedtls_aes_context_t * p_ctx = | ||
|  |         (nrf_crypto_backend_mbedtls_aes_context_t *)p_context; | ||
|  | 
 | ||
|  |     switch (p_ctx->any.header.p_info->mode) | ||
|  |     { | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CBC)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_CBC: | ||
|  |         case NRF_CRYPTO_AES_MODE_CBC_PAD_PCKS7: | ||
|  |             if (p_ctx->cbc.backend.operation == NRF_CRYPTO_ENCRYPT) | ||
|  |             { | ||
|  |                 error = mbedtls_aes_setkey_enc(&p_ctx->cbc.context, | ||
|  |                                                (uint8_t const *)p_key, | ||
|  |                                                p_ctx->cbc.header.p_info->key_size); | ||
|  |             } | ||
|  |             else | ||
|  |             { | ||
|  |                 error = mbedtls_aes_setkey_dec(&p_ctx->cbc.context, | ||
|  |                                                (uint8_t const *)p_key, | ||
|  |                                                p_ctx->cbc.header.p_info->key_size); | ||
|  |             } | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CTR)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_CTR: | ||
|  |             /* Due to the nature of CFB / CTR, you should use the same key schedule for both
 | ||
|  |                encryption and decryption.*/ | ||
|  |             error = mbedtls_aes_setkey_enc(&p_ctx->ctr.context, | ||
|  |                                            (uint8_t const *)p_key, | ||
|  |                                            p_ctx->ctr.header.p_info->key_size); | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CFB)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_CFB: | ||
|  |             /* Due to the nature of CFB / CTR, you should use the same key schedule for both
 | ||
|  |                encryption and decryption.*/ | ||
|  |             error = mbedtls_aes_setkey_enc(&p_ctx->cfb.context, | ||
|  |                                            (uint8_t const *)p_key, | ||
|  |                                            p_ctx->cfb.header.p_info->key_size); | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_ECB)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_ECB: | ||
|  |         case NRF_CRYPTO_AES_MODE_ECB_PAD_PCKS7: | ||
|  |             if (p_ctx->ecb.backend.operation == NRF_CRYPTO_ENCRYPT) | ||
|  |             { | ||
|  |                 error = mbedtls_aes_setkey_enc(&p_ctx->ecb.context, | ||
|  |                                                (uint8_t const *)p_key, | ||
|  |                                                p_ctx->ecb.header.p_info->key_size); | ||
|  |             } | ||
|  |             else | ||
|  |             { | ||
|  |                 error = mbedtls_aes_setkey_dec(&p_ctx->ecb.context, | ||
|  |                                                (uint8_t const *)p_key, | ||
|  |                                                p_ctx->ecb.header.p_info->key_size); | ||
|  |             } | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CBC_MAC)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_CBC_MAC: | ||
|  |         case NRF_CRYPTO_AES_MODE_CBC_MAC_PAD_PCKS7: | ||
|  |             error = mbedtls_aes_setkey_enc(&p_ctx->cbc_mac.context, | ||
|  |                                            (uint8_t const *)p_key, | ||
|  |                                            p_ctx->cbc_mac.header.p_info->key_size); | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CMAC)
 | ||
|  |                 case NRF_CRYPTO_AES_MODE_CMAC: | ||
|  |                     error = mbedtls_cipher_cmac_starts(&p_ctx->cmac.context, | ||
|  |                                                        p_key, | ||
|  |                                                        p_ctx->cmac.header.p_info->key_size); | ||
|  |                     break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  |         default: | ||
|  |             return NRF_ERROR_CRYPTO_FEATURE_UNAVAILABLE; | ||
|  |     } | ||
|  | 
 | ||
|  |     ret_val = result_get(error); | ||
|  | 
 | ||
|  |     return ret_val; | ||
|  | } | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CBC)      ||  \
 | ||
|  |     NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CTR)      ||  \ | ||
|  |     NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CFB)      ||  \ | ||
|  |     NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CBC_MAC) | ||
|  | static ret_code_t backend_mbedtls_iv_set(void * const p_context, uint8_t * p_iv) | ||
|  | { | ||
|  |     nrf_crypto_backend_mbedtls_aes_context_t * p_ctx = | ||
|  |         (nrf_crypto_backend_mbedtls_aes_context_t *)p_context; | ||
|  | 
 | ||
|  |     memcpy(&p_ctx->any.backend.iv[0], p_iv, sizeof(p_ctx->any.backend.iv)); | ||
|  | 
 | ||
|  |     return NRF_SUCCESS; | ||
|  | } | ||
|  | 
 | ||
|  | static ret_code_t backend_mbedtls_iv_get(void * const p_context, uint8_t * p_iv) | ||
|  | { | ||
|  |     nrf_crypto_backend_mbedtls_aes_context_t * p_ctx = | ||
|  |         (nrf_crypto_backend_mbedtls_aes_context_t *)p_context; | ||
|  | 
 | ||
|  |     memcpy(p_iv, p_ctx->any.backend.iv, sizeof(p_ctx->any.backend.iv)); | ||
|  | 
 | ||
|  |     return NRF_SUCCESS; | ||
|  | } | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_ECB)
 | ||
|  | /* Function extending mbedtls_aes_crypt_ecb functionality. It allows to process more than 1
 | ||
|  |    data block. It is returning MBEDTLS error type. */ | ||
|  | static int backend_mbedtls_ecb_crypt(nrf_crypto_backend_aes_ecb_context_t * const p_ctx, | ||
|  |                                      uint8_t *                                    p_text_in, | ||
|  |                                      uint8_t *                                    p_text_out, | ||
|  |                                      size_t                                       text_size) | ||
|  | { | ||
|  |     int    error        = 0; | ||
|  |     size_t crypted_text = 0; | ||
|  | 
 | ||
|  |     if ((text_size & 0x0F) != 0) | ||
|  |     { | ||
|  |         return MBEDTLS_ERR_AES_INVALID_INPUT_LENGTH; | ||
|  |     } | ||
|  | 
 | ||
|  |     while (crypted_text < text_size) | ||
|  |     { | ||
|  |         error = mbedtls_aes_crypt_ecb(&p_ctx->context, | ||
|  |                                       (int)p_ctx->backend.operation, | ||
|  |                                       p_text_in  + crypted_text, | ||
|  |                                       p_text_out + crypted_text); | ||
|  |         if (error != 0) | ||
|  |         { | ||
|  |             break; | ||
|  |         } | ||
|  |         crypted_text += NRF_CRYPTO_AES_BLOCK_SIZE; | ||
|  |     } | ||
|  | 
 | ||
|  |     return error; | ||
|  | } | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CBC_MAC)
 | ||
|  | static int backend_mbedtls_cbc_mac_update(void * const p_context, | ||
|  |                                           uint8_t *    p_data_in, | ||
|  |                                           size_t       data_size, | ||
|  |                                           uint8_t *    p_data_out) | ||
|  | { | ||
|  |     int error = 0; | ||
|  | 
 | ||
|  |     nrf_crypto_backend_mbedtls_aes_context_t * p_ctx = | ||
|  |         (nrf_crypto_backend_mbedtls_aes_context_t *)p_context; | ||
|  | 
 | ||
|  |     for (size_t i = 0; i < data_size; i += NRF_CRYPTO_AES_BLOCK_SIZE) | ||
|  |     { | ||
|  |         error = mbedtls_aes_crypt_cbc(&p_ctx->cbc_mac.context, | ||
|  |                                       MBEDTLS_AES_ENCRYPT, | ||
|  |                                       NRF_CRYPTO_AES_BLOCK_SIZE, | ||
|  |                                       p_ctx->cbc_mac.backend.iv, | ||
|  |                                       (uint8_t const *)p_data_in + i, | ||
|  |                                       p_data_out); | ||
|  |         if (error != 0) | ||
|  |         { | ||
|  |             return error; | ||
|  |         } | ||
|  |     } | ||
|  | 
 | ||
|  |     return error; | ||
|  | } | ||
|  | 
 | ||
|  | static ret_code_t backend_mbedtls_cbc_mac_finalize(void * const p_context, | ||
|  |                                                    uint8_t *    p_data_in, | ||
|  |                                                    size_t       data_size, | ||
|  |                                                    uint8_t *    p_data_out, | ||
|  |                                                    size_t *     p_data_out_size) | ||
|  | { | ||
|  |     int error; | ||
|  | 
 | ||
|  |     if (*p_data_out_size < NRF_CRYPTO_AES_BLOCK_SIZE) | ||
|  |     { | ||
|  |         return NRF_ERROR_CRYPTO_OUTPUT_LENGTH; | ||
|  |     } | ||
|  | 
 | ||
|  |     /* this function does not support padding */ | ||
|  |     if ((data_size & 0xF) != 0) | ||
|  |     { | ||
|  |         return NRF_ERROR_CRYPTO_INPUT_LENGTH; | ||
|  |     } | ||
|  | 
 | ||
|  |     error = backend_mbedtls_cbc_mac_update(p_context, p_data_in, data_size, p_data_out); | ||
|  |     BACKEND_ERROR_CHECK(error); | ||
|  | 
 | ||
|  |     *p_data_out_size = NRF_CRYPTO_AES_BLOCK_SIZE; | ||
|  | 
 | ||
|  |     return NRF_SUCCESS; | ||
|  | } | ||
|  | 
 | ||
|  | static ret_code_t backend_mbedtls_cbc_mac_padding_finalize(void * const p_context, | ||
|  |                                                            uint8_t *    p_data_in, | ||
|  |                                                            size_t       data_size, | ||
|  |                                                            uint8_t *    p_data_out, | ||
|  |                                                            size_t *     p_data_out_size) | ||
|  | { | ||
|  |     ret_code_t  ret_val; | ||
|  |     uint8_t     padding_buffer[NRF_CRYPTO_AES_BLOCK_SIZE] = {0}; | ||
|  |     uint8_t     msg_ending = (uint8_t)(data_size & (size_t)0x0F); | ||
|  | 
 | ||
|  |     if (*p_data_out_size < NRF_CRYPTO_AES_BLOCK_SIZE) | ||
|  |     { | ||
|  |         /* output buffer too small */ | ||
|  |         return NRF_ERROR_CRYPTO_OUTPUT_LENGTH; | ||
|  |     } | ||
|  | 
 | ||
|  |     data_size -= msg_ending; | ||
|  | 
 | ||
|  |     if (data_size > 0) | ||
|  |     { | ||
|  |         ret_val = backend_mbedtls_cbc_mac_update(p_context, | ||
|  |                                                  p_data_in, | ||
|  |                                                  data_size, | ||
|  |                                                  p_data_out); | ||
|  |         VERIFY_SUCCESS(ret_val); | ||
|  |     } | ||
|  | 
 | ||
|  |     ret_val = padding_pkcs7_add(&padding_buffer[0], | ||
|  |                                 p_data_in + data_size, | ||
|  |                                 msg_ending); | ||
|  |     VERIFY_SUCCESS(ret_val); | ||
|  | 
 | ||
|  |     ret_val = backend_mbedtls_cbc_mac_finalize(p_context, | ||
|  |                                                &padding_buffer[0], | ||
|  |                                                NRF_CRYPTO_AES_BLOCK_SIZE, | ||
|  |                                                p_data_out, | ||
|  |                                                p_data_out_size); | ||
|  |     VERIFY_SUCCESS(ret_val); | ||
|  | 
 | ||
|  |     return ret_val; | ||
|  | } | ||
|  | #endif
 | ||
|  | 
 | ||
|  | static ret_code_t backend_mbedtls_update(void * const p_context, | ||
|  |                                          uint8_t *    p_data_in, | ||
|  |                                          size_t       data_size, | ||
|  |                                          uint8_t *    p_data_out) | ||
|  | { | ||
|  |     int error; | ||
|  | 
 | ||
|  |     nrf_crypto_backend_mbedtls_aes_context_t * p_ctx = | ||
|  |         (nrf_crypto_backend_mbedtls_aes_context_t *)p_context; | ||
|  | 
 | ||
|  |     switch (p_ctx->any.header.p_info->mode) | ||
|  |     { | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CBC)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_CBC: | ||
|  |         case NRF_CRYPTO_AES_MODE_CBC_PAD_PCKS7: | ||
|  |             error = mbedtls_aes_crypt_cbc(&p_ctx->cbc.context, | ||
|  |                                           (int)p_ctx->cbc.backend.operation, | ||
|  |                                           data_size, | ||
|  |                                           p_ctx->cbc.backend.iv, | ||
|  |                                           (uint8_t const *)p_data_in, | ||
|  |                                           p_data_out); | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CTR)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_CTR: | ||
|  |         { | ||
|  |             size_t  nc_off = 0; | ||
|  |             uint8_t stream_block[NRF_CRYPTO_AES_BLOCK_SIZE]; | ||
|  | 
 | ||
|  |             error = mbedtls_aes_crypt_ctr(&p_ctx->ctr.context, | ||
|  |                                           data_size, | ||
|  |                                           &nc_off, | ||
|  |                                           p_ctx->ctr.backend.iv, | ||
|  |                                           stream_block, | ||
|  |                                           (uint8_t const *)p_data_in, | ||
|  |                                           p_data_out); | ||
|  |             break; | ||
|  |         } | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CFB)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_CFB: | ||
|  |             error = mbedtls_aes_crypt_cfb8(&p_ctx->cfb.context, | ||
|  |                                            (int)p_ctx->cfb.backend.operation, | ||
|  |                                            data_size, | ||
|  |                                            p_ctx->cfb.backend.iv, | ||
|  |                                            (uint8_t const *)p_data_in, | ||
|  |                                            p_data_out); | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_ECB)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_ECB: | ||
|  |         case NRF_CRYPTO_AES_MODE_ECB_PAD_PCKS7: | ||
|  |             error = backend_mbedtls_ecb_crypt(&p_ctx->ecb, p_data_in, p_data_out, data_size); | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CBC_MAC)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_CBC_MAC: | ||
|  |         case NRF_CRYPTO_AES_MODE_CBC_MAC_PAD_PCKS7: | ||
|  |             error = backend_mbedtls_cbc_mac_update(p_context, p_data_in, data_size, p_data_out); | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CMAC)
 | ||
|  |         case NRF_CRYPTO_AES_MODE_CMAC: | ||
|  |             error = mbedtls_cipher_cmac_update(&p_ctx->cmac.context, | ||
|  |                                                p_data_in, | ||
|  |                                                data_size); | ||
|  |             break; | ||
|  | #endif
 | ||
|  | 
 | ||
|  |         default: | ||
|  |             return NRF_ERROR_CRYPTO_CONTEXT_NOT_INITIALIZED; | ||
|  |     } | ||
|  |     BACKEND_ERROR_CHECK(error); | ||
|  | 
 | ||
|  |     return NRF_SUCCESS; | ||
|  | } | ||
|  | 
 | ||
|  | static ret_code_t backend_mbedtls_finalize(void * const p_context, | ||
|  |                                            uint8_t *    p_data_in, | ||
|  |                                            size_t       data_size, | ||
|  |                                            uint8_t *    p_data_out, | ||
|  |                                            size_t *     p_data_out_size) | ||
|  | { | ||
|  |     ret_code_t ret_val; | ||
|  | 
 | ||
|  |     nrf_crypto_backend_mbedtls_aes_context_t * p_ctx = | ||
|  |         (nrf_crypto_backend_mbedtls_aes_context_t *)p_context; | ||
|  | 
 | ||
|  |     if (*p_data_out_size < data_size) | ||
|  |     { | ||
|  |         return NRF_ERROR_CRYPTO_OUTPUT_LENGTH; | ||
|  |     } | ||
|  | 
 | ||
|  |     /* data is not multiple of 16 bytes */ | ||
|  |     if ((data_size & 0x0F) != 0) | ||
|  |     { | ||
|  |         if ((p_ctx->any.header.p_info->mode != NRF_CRYPTO_AES_MODE_CTR) && | ||
|  |             (p_ctx->any.header.p_info->mode != NRF_CRYPTO_AES_MODE_CFB)) | ||
|  |         { | ||
|  |             /* There are separate handlers for AES modes with padding and for MAC modes. */ | ||
|  |             return NRF_ERROR_CRYPTO_INPUT_LENGTH; | ||
|  |         } | ||
|  |     } | ||
|  | 
 | ||
|  |     ret_val = backend_mbedtls_update(p_context, p_data_in, data_size, p_data_out); | ||
|  |     VERIFY_SUCCESS(ret_val); | ||
|  | 
 | ||
|  |     *p_data_out_size = data_size; | ||
|  | 
 | ||
|  |     return ret_val; | ||
|  | } | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CMAC)
 | ||
|  | static ret_code_t backend_mbedtls_cmac_finalize(void * const p_context, | ||
|  |                                                 uint8_t *    p_data_in, | ||
|  |                                                 size_t       data_size, | ||
|  |                                                 uint8_t *    p_data_out, | ||
|  |                                                 size_t *     p_data_out_size) | ||
|  | { | ||
|  |     int        error; | ||
|  | 
 | ||
|  |     nrf_crypto_backend_mbedtls_aes_context_t * p_ctx = | ||
|  |         (nrf_crypto_backend_mbedtls_aes_context_t *)p_context; | ||
|  | 
 | ||
|  |     if (*p_data_out_size < NRF_CRYPTO_AES_BLOCK_SIZE) | ||
|  |     { | ||
|  |         return NRF_ERROR_CRYPTO_OUTPUT_LENGTH; | ||
|  |     } | ||
|  | 
 | ||
|  |     error = mbedtls_cipher_cmac_update(&p_ctx->cmac.context, p_data_in, data_size); | ||
|  |     BACKEND_ERROR_CHECK(error); | ||
|  | 
 | ||
|  |     error = mbedtls_cipher_cmac_finish(&p_ctx->cmac.context, p_data_out); | ||
|  |     BACKEND_ERROR_CHECK(error); | ||
|  | 
 | ||
|  |     *p_data_out_size = NRF_CRYPTO_AES_BLOCK_SIZE; | ||
|  | 
 | ||
|  |     return NRF_SUCCESS; | ||
|  | } | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CBC) || \
 | ||
|  |     NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_ECB) | ||
|  | static ret_code_t backend_mbedtls_padding_finalize(void * const p_context, | ||
|  |                                                    uint8_t *    p_data_in, | ||
|  |                                                    size_t       data_size, | ||
|  |                                                    uint8_t *    p_data_out, | ||
|  |                                                    size_t *     p_data_out_size) | ||
|  | { | ||
|  |     ret_code_t ret_val; | ||
|  |     size_t     buff_out_size; | ||
|  |     uint8_t    padding_buffer[NRF_CRYPTO_AES_BLOCK_SIZE] = {0}; | ||
|  |     uint8_t    msg_ending = (uint8_t)(data_size & (size_t)0x0F); | ||
|  | 
 | ||
|  |     nrf_crypto_backend_mbedtls_aes_context_t * p_ctx = | ||
|  |         (nrf_crypto_backend_mbedtls_aes_context_t *)p_context; | ||
|  | 
 | ||
|  |     if (p_ctx->any.backend.operation == NRF_CRYPTO_DECRYPT) | ||
|  |     { | ||
|  |         ret_val = backend_mbedtls_finalize(p_context, | ||
|  |                                            p_data_in, | ||
|  |                                            data_size, | ||
|  |                                            p_data_out, | ||
|  |                                            p_data_out_size); | ||
|  |         VERIFY_SUCCESS(ret_val); | ||
|  | 
 | ||
|  |         ret_val = padding_pkcs7_remove(p_data_out, | ||
|  |                                        p_data_out_size); | ||
|  |         return ret_val; | ||
|  |     } | ||
|  | 
 | ||
|  |     /* -------------- ENCRYPTION --------------*/ | ||
|  |     data_size -= msg_ending; | ||
|  | 
 | ||
|  |     if (*p_data_out_size < (data_size + NRF_CRYPTO_AES_BLOCK_SIZE)) | ||
|  |     { | ||
|  |         /* no space for padding */ | ||
|  |         return NRF_ERROR_CRYPTO_OUTPUT_LENGTH; | ||
|  |     } | ||
|  | 
 | ||
|  |     if (data_size > 0) | ||
|  |     { | ||
|  |         /* Encrypt 16 byte blocks */ | ||
|  |         ret_val = backend_mbedtls_update(p_context, | ||
|  |                                          p_data_in, | ||
|  |                                          data_size, | ||
|  |                                          p_data_out); | ||
|  |         VERIFY_SUCCESS(ret_val); | ||
|  |     } | ||
|  | 
 | ||
|  |     ret_val = padding_pkcs7_add(&padding_buffer[0], | ||
|  |                                 p_data_in + data_size, | ||
|  |                                 msg_ending); | ||
|  |     VERIFY_SUCCESS(ret_val); | ||
|  | 
 | ||
|  |     buff_out_size = *p_data_out_size - data_size; | ||
|  | 
 | ||
|  |     ret_val = backend_mbedtls_finalize(p_context, | ||
|  |                                        &padding_buffer[0], | ||
|  |                                        NRF_CRYPTO_AES_BLOCK_SIZE, | ||
|  |                                        p_data_out + data_size, | ||
|  |                                        &buff_out_size); | ||
|  |     VERIFY_SUCCESS(ret_val); | ||
|  | 
 | ||
|  |     *p_data_out_size = buff_out_size + data_size; | ||
|  | 
 | ||
|  |     return ret_val; | ||
|  | } | ||
|  | #endif
 | ||
|  | 
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CBC)
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_cbc_128_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CBC, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_128, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_cbc_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = backend_mbedtls_iv_set, | ||
|  |     .iv_get_fn      = backend_mbedtls_iv_get, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_cbc_192_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CBC, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_192, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_cbc_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = backend_mbedtls_iv_set, | ||
|  |     .iv_get_fn      = backend_mbedtls_iv_get, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_cbc_256_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CBC, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_256, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_cbc_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = backend_mbedtls_iv_set, | ||
|  |     .iv_get_fn      = backend_mbedtls_iv_get, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_cbc_128_pad_pkcs7_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CBC_PAD_PCKS7, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_128, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_cbc_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = backend_mbedtls_iv_set, | ||
|  |     .iv_get_fn      = backend_mbedtls_iv_get, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_padding_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_cbc_192_pad_pkcs7_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CBC_PAD_PCKS7, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_192, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_cbc_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = backend_mbedtls_iv_set, | ||
|  |     .iv_get_fn      = backend_mbedtls_iv_get, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_padding_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_cbc_256_pad_pkcs7_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CBC_PAD_PCKS7, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_256, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_cbc_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = backend_mbedtls_iv_set, | ||
|  |     .iv_get_fn      = backend_mbedtls_iv_get, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_padding_finalize | ||
|  | }; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CTR)
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_ctr_128_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CTR, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_128, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_ctr_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = backend_mbedtls_iv_set, | ||
|  |     .iv_get_fn      = backend_mbedtls_iv_get, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_ctr_192_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CTR, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_192, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_ctr_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = backend_mbedtls_iv_set, | ||
|  |     .iv_get_fn      = backend_mbedtls_iv_get, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_ctr_256_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CTR, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_256, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_ctr_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = backend_mbedtls_iv_set, | ||
|  |     .iv_get_fn      = backend_mbedtls_iv_get, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_finalize | ||
|  | }; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | // CFB
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CFB)
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_cfb_128_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CFB, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_128, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_cfb_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = backend_mbedtls_iv_set, | ||
|  |     .iv_get_fn      = backend_mbedtls_iv_get, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_cfb_192_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CFB, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_192, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_cfb_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = backend_mbedtls_iv_set, | ||
|  |     .iv_get_fn      = backend_mbedtls_iv_get, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_cfb_256_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CFB, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_256, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_cfb_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = backend_mbedtls_iv_set, | ||
|  |     .iv_get_fn      = backend_mbedtls_iv_get, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_finalize | ||
|  | }; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_ECB)
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_ecb_128_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_ECB, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_128, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_ecb_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = NULL, | ||
|  |     .iv_get_fn      = NULL, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_ecb_192_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_ECB, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_192, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_ecb_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = NULL, | ||
|  |     .iv_get_fn      = NULL, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_ecb_256_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_ECB, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_256, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_ecb_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = NULL, | ||
|  |     .iv_get_fn      = NULL, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_ecb_128_pad_pkcs7_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_ECB_PAD_PCKS7, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_128, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_ecb_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = NULL, | ||
|  |     .iv_get_fn      = NULL, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_padding_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_ecb_192_pad_pkcs7_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_ECB_PAD_PCKS7, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_192, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_ecb_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = NULL, | ||
|  |     .iv_get_fn      = NULL, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_padding_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_ecb_256_pad_pkcs7_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_ECB_PAD_PCKS7, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_256, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_ecb_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = NULL, | ||
|  |     .iv_get_fn      = NULL, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_padding_finalize | ||
|  | }; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | 
 | ||
|  | // CBC MAC
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CBC_MAC)
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_cbc_mac_128_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CBC_MAC, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_128, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_cbc_mac_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = backend_mbedtls_iv_set, | ||
|  |     .iv_get_fn      = backend_mbedtls_iv_get, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_cbc_mac_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_cbc_mac_192_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CBC_MAC, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_192, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_cbc_mac_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = backend_mbedtls_iv_set, | ||
|  |     .iv_get_fn      = backend_mbedtls_iv_get, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_cbc_mac_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_cbc_mac_256_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CBC_MAC, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_256, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_cbc_mac_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = backend_mbedtls_iv_set, | ||
|  |     .iv_get_fn      = backend_mbedtls_iv_get, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_cbc_mac_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_cbc_mac_128_pad_pkcs7_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CBC_MAC_PAD_PCKS7, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_128, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_cbc_mac_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = backend_mbedtls_iv_set, | ||
|  |     .iv_get_fn      = backend_mbedtls_iv_get, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_cbc_mac_padding_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_cbc_mac_192_pad_pkcs7_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CBC_MAC_PAD_PCKS7, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_192, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_cbc_mac_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = backend_mbedtls_iv_set, | ||
|  |     .iv_get_fn      = backend_mbedtls_iv_get, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_cbc_mac_padding_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_cbc_mac_256_pad_pkcs7_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CBC_MAC_PAD_PCKS7, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_256, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_cbc_mac_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = backend_mbedtls_iv_set, | ||
|  |     .iv_get_fn      = backend_mbedtls_iv_get, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_cbc_mac_padding_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | #endif
 | ||
|  | 
 | ||
|  | // CMAC
 | ||
|  | #if NRF_MODULE_ENABLED(NRF_CRYPTO_BACKEND_MBEDTLS_AES_CMAC)
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_cmac_128_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CMAC, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_128, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_cmac_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = NULL, | ||
|  |     .iv_get_fn      = NULL, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_cmac_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_cmac_192_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CMAC, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_192, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_cmac_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = NULL, | ||
|  |     .iv_get_fn      = NULL, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_cmac_finalize | ||
|  | }; | ||
|  | 
 | ||
|  | nrf_crypto_aes_info_t const g_nrf_crypto_aes_cmac_256_info = | ||
|  | { | ||
|  |     .mode           = NRF_CRYPTO_AES_MODE_CMAC, | ||
|  |     .key_size       = NRF_CRYPTO_KEY_SIZE_256, | ||
|  |     .context_size   = sizeof(nrf_crypto_backend_aes_cmac_context_t), | ||
|  | 
 | ||
|  |     .init_fn        = backend_mbedtls_init, | ||
|  |     .uninit_fn      = backend_mbedtls_uninit, | ||
|  |     .key_set_fn     = backend_mbedtls_key_set, | ||
|  |     .iv_set_fn      = NULL, | ||
|  |     .iv_get_fn      = NULL, | ||
|  |     .update_fn      = backend_mbedtls_update, | ||
|  |     .finalize_fn    = backend_mbedtls_cmac_finalize | ||
|  | }; | ||
|  | #endif
 | ||
|  | 
 | ||
|  | #endif // #if NRF_MODULE_ENABLED(NRF_CRYPTO_MBEDTLS_AES)
 | ||
|  | #endif // MODULE_ENABLED(NRF_CRYPTO)
 | ||
|  | 
 |