283 lines
7.1 KiB
C
283 lines
7.1 KiB
C
|
/*
|
||
|
* SPDX-FileCopyrightText: Copyright (c) 2023 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||
|
* SPDX-License-Identifier: MIT
|
||
|
*
|
||
|
* Permission is hereby granted, free of charge, to any person obtaining a
|
||
|
* copy of this software and associated documentation files (the "Software"),
|
||
|
* to deal in the Software without restriction, including without limitation
|
||
|
* the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
||
|
* and/or sell copies of the Software, and to permit persons to whom the
|
||
|
* Software is furnished to do so, subject to the following conditions:
|
||
|
*
|
||
|
* The above copyright notice and this permission notice shall be included in
|
||
|
* all copies or substantial portions of the Software.
|
||
|
*
|
||
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
|
||
|
* THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||
|
* FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
|
||
|
* DEALINGS IN THE SOFTWARE.
|
||
|
*
|
||
|
* Prototypes and checks taken from DMTF: Copyright 2021-2022 DMTF. All rights reserved.
|
||
|
* License: BSD 3-Clause License. For full text see link: https://github.com/DMTF/libspdm/blob/main/LICENSE.md
|
||
|
*/
|
||
|
|
||
|
#include "internal_crypt_lib.h"
|
||
|
|
||
|
void *libspdm_hmac_sha256_new(void)
|
||
|
{
|
||
|
return lkca_hash_new("hmac(sha256)");
|
||
|
}
|
||
|
|
||
|
void libspdm_hmac_sha256_free(void *hmac_sha256_ctx)
|
||
|
{
|
||
|
lkca_hash_free(hmac_sha256_ctx);
|
||
|
}
|
||
|
|
||
|
bool libspdm_hmac_sha256_set_key(void *hmac_sha256_ctx, const uint8_t *key,
|
||
|
size_t key_size)
|
||
|
{
|
||
|
if (hmac_sha256_ctx == NULL)
|
||
|
return false;
|
||
|
|
||
|
return lkca_hmac_set_key(hmac_sha256_ctx, key, key_size);
|
||
|
}
|
||
|
|
||
|
bool libspdm_hmac_sha256_duplicate(const void *hmac_sha256_ctx,
|
||
|
void *new_hmac_sha256_ctx)
|
||
|
{
|
||
|
if (hmac_sha256_ctx == NULL || new_hmac_sha256_ctx == NULL) {
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
return lkca_hmac_duplicate(new_hmac_sha256_ctx, hmac_sha256_ctx);
|
||
|
}
|
||
|
|
||
|
bool libspdm_hmac_sha256_update(void *hmac_sha256_ctx, const void *data,
|
||
|
size_t data_size)
|
||
|
{
|
||
|
int32_t ret;
|
||
|
|
||
|
if (hmac_sha256_ctx == NULL) {
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
if (data == NULL && data_size != 0) {
|
||
|
return false;
|
||
|
}
|
||
|
if (data_size > INT_MAX) {
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
ret = crypto_shash_update(hmac_sha256_ctx, data, data_size);
|
||
|
if (ret != 0) {
|
||
|
return false;
|
||
|
}
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
bool libspdm_hmac_sha256_final(void *hmac_sha256_ctx, uint8_t *hmac_value)
|
||
|
{
|
||
|
int32_t ret;
|
||
|
|
||
|
if (hmac_sha256_ctx == NULL || hmac_value == NULL) {
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
ret = crypto_shash_final(hmac_sha256_ctx, hmac_value);
|
||
|
|
||
|
if (ret != 0) {
|
||
|
return false;
|
||
|
}
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
bool libspdm_hmac_sha256_all(const void *data, size_t data_size,
|
||
|
const uint8_t *key, size_t key_size,
|
||
|
uint8_t *hmac_value)
|
||
|
{
|
||
|
if (hmac_value == NULL) {
|
||
|
return false;
|
||
|
}
|
||
|
if (data == NULL && data_size != 0) {
|
||
|
return false;
|
||
|
}
|
||
|
if (data_size > INT_MAX) {
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
return lkca_hmac_all("hmac(sha256)", key, key_size, data, data_size, hmac_value);
|
||
|
}
|
||
|
|
||
|
void *libspdm_hmac_sha384_new(void)
|
||
|
{
|
||
|
return lkca_hash_new("hmac(sha384)");
|
||
|
}
|
||
|
|
||
|
void libspdm_hmac_sha384_free(void *hmac_sha384_ctx)
|
||
|
{
|
||
|
lkca_hash_free(hmac_sha384_ctx);
|
||
|
}
|
||
|
|
||
|
bool libspdm_hmac_sha384_set_key(void *hmac_sha384_ctx, const uint8_t *key,
|
||
|
size_t key_size)
|
||
|
{
|
||
|
if (hmac_sha384_ctx == NULL)
|
||
|
return false;
|
||
|
|
||
|
return lkca_hmac_set_key(hmac_sha384_ctx, key, key_size);
|
||
|
}
|
||
|
|
||
|
bool libspdm_hmac_sha384_duplicate(const void *hmac_sha384_ctx,
|
||
|
void *new_hmac_sha384_ctx)
|
||
|
{
|
||
|
if (hmac_sha384_ctx == NULL || new_hmac_sha384_ctx == NULL) {
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
return lkca_hmac_duplicate(new_hmac_sha384_ctx, hmac_sha384_ctx);
|
||
|
}
|
||
|
|
||
|
bool libspdm_hmac_sha384_update(void *hmac_sha384_ctx, const void *data,
|
||
|
size_t data_size)
|
||
|
{
|
||
|
int32_t ret;
|
||
|
|
||
|
if (hmac_sha384_ctx == NULL) {
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
if (data == NULL && data_size != 0) {
|
||
|
return false;
|
||
|
}
|
||
|
if (data_size > INT_MAX) {
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
ret = crypto_shash_update(hmac_sha384_ctx, data, data_size);
|
||
|
if (ret != 0) {
|
||
|
return false;
|
||
|
}
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
bool libspdm_hmac_sha384_final(void *hmac_sha384_ctx, uint8_t *hmac_value)
|
||
|
{
|
||
|
int32_t ret;
|
||
|
|
||
|
if (hmac_sha384_ctx == NULL || hmac_value == NULL) {
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
ret = crypto_shash_final(hmac_sha384_ctx, hmac_value);
|
||
|
|
||
|
if (ret != 0) {
|
||
|
return false;
|
||
|
}
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
bool libspdm_hmac_sha384_all(const void *data, size_t data_size,
|
||
|
const uint8_t *key, size_t key_size,
|
||
|
uint8_t *hmac_value)
|
||
|
{
|
||
|
if (hmac_value == NULL) {
|
||
|
return false;
|
||
|
}
|
||
|
if (data == NULL && data_size != 0) {
|
||
|
return false;
|
||
|
}
|
||
|
if (data_size > INT_MAX) {
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
return lkca_hmac_all("hmac(sha384)", key, key_size, data, data_size, hmac_value);
|
||
|
}
|
||
|
|
||
|
void *libspdm_hmac_sha512_new(void)
|
||
|
{
|
||
|
return lkca_hash_new("hmac(sha512)");
|
||
|
}
|
||
|
|
||
|
void libspdm_hmac_sha512_free(void *hmac_sha512_ctx)
|
||
|
{
|
||
|
lkca_hash_free(hmac_sha512_ctx);
|
||
|
}
|
||
|
|
||
|
bool libspdm_hmac_sha512_set_key(void *hmac_sha512_ctx, const uint8_t *key,
|
||
|
size_t key_size)
|
||
|
{
|
||
|
if (hmac_sha512_ctx == NULL)
|
||
|
return false;
|
||
|
|
||
|
return lkca_hmac_set_key(hmac_sha512_ctx, key, key_size);
|
||
|
}
|
||
|
|
||
|
bool libspdm_hmac_sha512_duplicate(const void *hmac_sha512_ctx,
|
||
|
void *new_hmac_sha512_ctx)
|
||
|
{
|
||
|
if (new_hmac_sha512_ctx == NULL || new_hmac_sha512_ctx == NULL) {
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
return lkca_hmac_duplicate(new_hmac_sha512_ctx, hmac_sha512_ctx);
|
||
|
}
|
||
|
|
||
|
bool libspdm_hmac_sha512_update(void *hmac_sha512_ctx, const void *data,
|
||
|
size_t data_size)
|
||
|
{
|
||
|
int32_t ret;
|
||
|
|
||
|
if (hmac_sha512_ctx == NULL) {
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
if (data == NULL && data_size != 0) {
|
||
|
return false;
|
||
|
}
|
||
|
if (data_size > INT_MAX) {
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
ret = crypto_shash_update(hmac_sha512_ctx, data, data_size);
|
||
|
if (ret != 0) {
|
||
|
return false;
|
||
|
}
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
bool libspdm_hmac_sha512_final(void *hmac_sha512_ctx, uint8_t *hmac_value)
|
||
|
{
|
||
|
int32_t ret;
|
||
|
|
||
|
if (hmac_sha512_ctx == NULL || hmac_value == NULL) {
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
ret = crypto_shash_final(hmac_sha512_ctx, hmac_value);
|
||
|
|
||
|
if (ret != 0) {
|
||
|
return false;
|
||
|
}
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
bool libspdm_hmac_sha512_all(const void *data, size_t data_size,
|
||
|
const uint8_t *key, size_t key_size,
|
||
|
uint8_t *hmac_value)
|
||
|
{
|
||
|
if (hmac_value == NULL) {
|
||
|
return false;
|
||
|
}
|
||
|
if (data == NULL && data_size != 0) {
|
||
|
return false;
|
||
|
}
|
||
|
if (data_size > INT_MAX) {
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
return lkca_hmac_all("hmac(sha512)", key, key_size, data, data_size, hmac_value);
|
||
|
}
|