maxq10xx.c 101 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415
  1. /* maxq10xx.c
  2. *
  3. * Copyright (C) 2006-2023 wolfSSL Inc.
  4. *
  5. * This file is part of wolfSSL.
  6. *
  7. * wolfSSL is free software; you can redistribute it and/or modify
  8. * it under the terms of the GNU General Public License as published by
  9. * the Free Software Foundation; either version 2 of the License, or
  10. * (at your option) any later version.
  11. *
  12. * wolfSSL is distributed in the hope that it will be useful,
  13. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  15. * GNU General Public License for more details.
  16. *
  17. * You should have received a copy of the GNU General Public License
  18. * along with this program; if not, write to the Free Software
  19. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
  20. */
  21. #ifdef HAVE_CONFIG_H
  22. #include <config.h>
  23. #endif
  24. #include <wolfssl/wolfcrypt/types.h>
  25. #if defined(WOLFSSL_MAXQ1065) || defined(WOLFSSL_MAXQ108X)
  26. #include <wolfssl/wolfcrypt/port/maxim/maxq10xx.h>
  27. #ifdef NO_INLINE
  28. #include <wolfssl/wolfcrypt/misc.h>
  29. #else
  30. #define WOLFSSL_MISC_INCLUDED
  31. #include <wolfcrypt/src/misc.c>
  32. #endif
  33. #include <stdint.h>
  34. #include <wolfssl/internal.h>
  35. #include <wolfssl/wolfcrypt/cryptocb.h>
  36. #include <wolfssl/wolfcrypt/error-crypt.h>
  37. #include <wolfssl/wolfcrypt/logging.h>
  38. #include <wolfssl/wolfcrypt/port/maxim/MXQ_API.h>
  39. #ifndef WOLFSSL_HAVE_ECC_KEY_GET_PRIV
  40. /* FIPS build has replaced ecc.h. */
  41. #define wc_ecc_key_get_priv(key) (&((key)->k))
  42. #define WOLFSSL_HAVE_ECC_KEY_GET_PRIV
  43. #endif
  44. #ifdef MAXQ_DEBUG
  45. void dbg_dumphex(const char *identifier, const uint8_t* pdata, uint32_t plen);
  46. #else
  47. #define dbg_dumphex(identifier, pdata, plen) WC_DO_NOTHING
  48. #endif /* MAXQ_DEBUG */
  49. #if defined(USE_WINDOWS_API)
  50. # define maxq_CryptHwMutexTryLock() 0
  51. #endif
  52. #define AES_KEY_ID_START (0x2000)
  53. #define AES_KEY_ID_MAX_NUM (32)
  54. #define ECC_KEY_ID_START (AES_KEY_ID_START + AES_KEY_ID_MAX_NUM)
  55. #define ECC_KEY_ID_MAX_NUM (32)
  56. #define TEMP_KEY_ID_START (0)
  57. #if defined(WOLFSSL_MAXQ108X)
  58. #define TEMP_KEY_ID_MAX_NUM (16)
  59. #else
  60. #define TEMP_KEY_ID_MAX_NUM (2)
  61. #endif
  62. #define PUBKEY_IMPORT_OBJID 0x1000
  63. #define ROOT_CA_CERT_OBJ_ID 0x1003
  64. #define DEVICE_CERT_OBJ_ID 0x1002
  65. #define DEVICE_KEY_PAIR_OBJ_ID 0x1004
  66. #define PSK_OBJ_ID 0x1236
  67. #define K_CHUNKSIZE 2032
  68. #define K_CIPHER_BLOCKSIZE 16
  69. #define ECC256_KEYSIZE 32
  70. #define MAX_HASH_CHUNKSIZE 2000
  71. #define MAX_CERT_DATASIZE 2048
  72. #define MAX_KEY_DATASIZE 256
  73. #define MAX_SIGNKEY_DATASIZE 96
  74. #define MAX_SIG_DATASIZE 64
  75. #define ECC_KEYCOMPLEN 32
  76. #ifdef WOLFSSL_MAXQ108X
  77. #define PSK_KID (0x1235)
  78. static unsigned char tls13active = 0;
  79. static unsigned char tls13early = 0;
  80. static int tls13_dh_obj_id = -1;
  81. static int tls13_ecc_obj_id = -1;
  82. static int tls13_hs_early_secret_obj_id = -1;
  83. static int tls13_binder_key_obj_id = -1;
  84. static int tls13_shared_secret_obj_id = -1;
  85. static int tls13_early_secret_obj_id = -1;
  86. static int tls13_derived_secret_obj_id = -1;
  87. static int tls13_handshake_secret_obj_id = -1;
  88. static int tls13_master_secret_obj_id = -1;
  89. static int tls13_client_secret_obj_id = -1;
  90. static int tls13_server_secret_obj_id = -1;
  91. static int tls13_client_hs_key_obj_id = -1;
  92. static int tls13_server_hs_key_obj_id = -1;
  93. static int tls13_client_app_key_obj_id = -1;
  94. static int tls13_server_app_key_obj_id = -1;
  95. static int tls13_server_finish_obj_id = -1;
  96. static int tls13_client_finish_obj_id = -1;
  97. static int *tls13_server_key_id = NULL;
  98. static int *tls13_client_key_id = NULL;
  99. static int tls13_res_master_obj_id = -1;
  100. static int tls13_server_cert_id = -1;
  101. static int tls13_server_key_algo = -1;
  102. static int tls13_server_key_len = -1;
  103. #endif /* WOLFSSL_MAXQ108X */
  104. /* Please define MAXQ10XX_PRODUCTION_KEY in your build scripts once you have a
  105. * production key. */
  106. #if defined(MAXQ10XX_PRODUCTION_KEY) || !defined(DEBUG_WOLFSSL)
  107. #include "maxq10xx_key.h"
  108. #else
  109. /* TEST KEY. This must be changed for production environments!! */
  110. static const mxq_u1 KeyPairImport[] = {
  111. 0xd0,0x97,0x31,0xc7,0x63,0xc0,0x9e,0xe3,0x9a,0xb4,0xd0,0xce,0xa7,0x89,0xab,
  112. 0x52,0xc8,0x80,0x3a,0x91,0x77,0x29,0xc3,0xa0,0x79,0x2e,0xe6,0x61,0x8b,0x2d,
  113. 0x53,0x70,0xcc,0xa4,0x62,0xd5,0x4a,0x47,0x74,0xea,0x22,0xfa,0xa9,0xd4,0x95,
  114. 0x4e,0xca,0x32,0x70,0x88,0xd6,0xeb,0x58,0x24,0xa3,0xc5,0xbf,0x29,0xdc,0xfd,
  115. 0xe5,0xde,0x8f,0x48,0x19,0xe8,0xc6,0x4f,0xf2,0x46,0x10,0xe2,0x58,0xb9,0xb6,
  116. 0x72,0x5e,0x88,0xaf,0xc2,0xee,0x8b,0x6f,0xe5,0x36,0xe3,0x60,0x7c,0xf8,0x2c,
  117. 0xea,0x3a,0x4f,0xe3,0x6d,0x73
  118. };
  119. #endif /* MAXQ10XX_PRODUCTION_KEY || !DEBUG_WOLFSSL */
  120. #if defined(WOLFSSL_MAXQ108X) && defined(HAVE_HKDF)
  121. /* These are from Section 7.1 of the TLS 1.3 specification (RFC 8446). */
  122. static const char derivedLabel[] = "derived";
  123. static const char cHsTrafficLabel[] = "c hs traffic";
  124. static const char sHsTrafficLabel[] = "s hs traffic";
  125. static const char cAppTrafficLabel[] = "c ap traffic";
  126. static const char sAppTrafficLabel[] = "s ap traffic";
  127. static const char appTrafUpdLabel[] = "traffic upd";
  128. static const char keyLabel[] = "key";
  129. static const char ivLabel[] = "iv";
  130. static const char finishedLabel[] = "finished";
  131. static const char resMasterLabel[] = "res master";
  132. static const char extBinderLabel[] = "ext binder";
  133. static int local_is_psk = 0;
  134. static int is_hs_key = 0;
  135. #endif /* WOLFSSL_MAXQ108X && HAVE_HKDF */
  136. static int aes_key_id_arr[AES_KEY_ID_MAX_NUM];
  137. static int ecc_key_id_arr[ECC_KEY_ID_MAX_NUM];
  138. static int init_pk_callbacks = 0;
  139. static int device_key_len = 32;
  140. #if defined(WOLFSSL_MAXQ108X)
  141. static int temp_key_id_arr[TEMP_KEY_ID_MAX_NUM] = {0};
  142. static int *mac_key_obj_id = NULL;
  143. static int mac_comp_active = 0;
  144. #endif /* WOLFSSL_MAXQ108X */
  145. #ifdef WOLFSSL_MAXQ10XX_CRYPTO
  146. /*
  147. * Helper Functions
  148. */
  149. static int crypto_sha256(const uint8_t *buf, uint32_t len, uint8_t *hash,
  150. uint32_t hashSz, uint32_t blkSz)
  151. {
  152. int ret;
  153. uint32_t i = 0, chunk;
  154. wc_Sha256 sha256;
  155. /* validate arguments */
  156. if ((buf == NULL && len > 0) || hash == NULL ||
  157. hashSz < WC_SHA256_DIGEST_SIZE || blkSz == 0) {
  158. return BAD_FUNC_ARG;
  159. }
  160. /* Init Sha256 structure */
  161. ret = wc_InitSha256(&sha256);
  162. if (ret != 0) {
  163. return ret;
  164. }
  165. sha256.maxq_ctx.soft_hash = 1;
  166. while (i < len) {
  167. chunk = blkSz;
  168. if ((chunk + i) > len) {
  169. chunk = len - i;
  170. }
  171. /* Perform chunked update */
  172. ret = wc_Sha256Update(&sha256, (buf + i), chunk);
  173. if (ret != 0) {
  174. break;
  175. }
  176. i += chunk;
  177. }
  178. if (ret == 0) {
  179. /* Get final digest result */
  180. ret = wc_Sha256Final(&sha256, hash);
  181. }
  182. return ret;
  183. }
  184. static int crypto_ecc_sign(const uint8_t *key, uint32_t keySz,
  185. const uint8_t *hash, uint32_t hashSz, uint8_t *sig, uint32_t* sigSz,
  186. uint32_t curveSz, int curveId, WC_RNG* rng)
  187. {
  188. int ret;
  189. mp_int r, s;
  190. ecc_key ecc;
  191. /* validate arguments */
  192. if (key == NULL || hash == NULL || sig == NULL || sigSz == NULL ||
  193. curveSz == 0 || hashSz == 0 || keySz < curveSz ||
  194. *sigSz < (curveSz * 2)) {
  195. return BAD_FUNC_ARG;
  196. }
  197. /* Initialize signature result */
  198. XMEMSET(sig, 0, curveSz * 2);
  199. /* Setup the ECC key */
  200. ret = wc_ecc_init(&ecc);
  201. if (ret < 0) {
  202. return ret;
  203. }
  204. ecc.maxq_ctx.hw_ecc = -1;
  205. /* Setup the signature r/s variables */
  206. ret = mp_init(&r);
  207. if (ret != MP_OKAY) {
  208. wc_ecc_free(&ecc);
  209. return ret;
  210. }
  211. ret = mp_init(&s);
  212. if (ret != MP_OKAY) {
  213. mp_clear(&r);
  214. wc_ecc_free(&ecc);
  215. return ret;
  216. }
  217. /* Import private key "k" */
  218. ret = wc_ecc_import_private_key_ex(key, keySz, /* private key "d" */
  219. NULL, 0, /* public (optional) */
  220. &ecc, curveId);
  221. if (ret == 0) {
  222. ret = wc_ecc_sign_hash_ex(hash, hashSz, /* computed hash digest */
  223. rng, &ecc, /* random and key context */
  224. &r, &s);
  225. }
  226. if (ret == 0) {
  227. /* export r/s */
  228. mp_to_unsigned_bin_len(&r, sig, curveSz);
  229. mp_to_unsigned_bin_len(&s, sig + curveSz, curveSz);
  230. }
  231. mp_clear(&r);
  232. mp_clear(&s);
  233. wc_ecc_free(&ecc);
  234. return ret;
  235. }
  236. #ifdef MAXQ_DEBUG
  237. void dbg_dumphex(const char *identifier, const uint8_t* pdata, uint32_t plen)
  238. {
  239. uint32_t i;
  240. printf("%s\n", identifier);
  241. for (i = 0; i < plen; ++i) {
  242. if ((i > 0) && !(i % 16)) {
  243. printf("\n");
  244. }
  245. printf("%02X ", pdata[i]);
  246. }
  247. printf("\n");
  248. }
  249. #endif /* MAXQ_DEBUG */
  250. /*
  251. * Personalized Utility Functions
  252. */
  253. static void LoadDefaultImportKey(unsigned char* key, int* keylen,
  254. int* curve, int* type)
  255. {
  256. *curve = MXQ_KEYPARAM_EC_P256R1;
  257. *type = MXQ_KEYTYPE_ECC;
  258. *keylen = 32;
  259. XMEMCPY(key, KeyPairImport, sizeof(KeyPairImport));
  260. }
  261. static int getSignAlgoFromCurve(int c)
  262. {
  263. switch(c) {
  264. case MXQ_KEYPARAM_EC_P256R1: return ALGO_ECDSA_SHA_256;
  265. case MXQ_KEYPARAM_EC_P384R1: return ALGO_ECDSA_SHA_384;
  266. case MXQ_KEYPARAM_EC_P521R1: return ALGO_ECDSA_SHA_512;
  267. #ifdef HAVE_ECC_BRAINPOOL
  268. case MXQ_KEYPARAM_EC_BP256R1: return ALGO_ECDSA_SHA_256;
  269. case MXQ_KEYPARAM_EC_BP384R1: return ALGO_ECDSA_SHA_384;
  270. case MXQ_KEYPARAM_EC_BP512R1: return ALGO_ECDSA_SHA_512;
  271. #endif
  272. }
  273. return BAD_FUNC_ARG;
  274. }
  275. #ifdef WOLFSSL_MAXQ108X
  276. static int wc_MAXQ10XX_HmacSetKey(int type);
  277. static int wc_MAXQ10XX_HmacUpdate(const byte* msg, word32 length);
  278. static int wc_MAXQ10XX_HmacFinal(byte* hash);
  279. static int getMaxqKeyParamFromCurve(int c)
  280. {
  281. switch(c) {
  282. case ECC_SECP256R1: return MXQ_KEYPARAM_EC_P256R1;
  283. case ECC_SECP384R1: return MXQ_KEYPARAM_EC_P384R1;
  284. case ECC_SECP521R1: return MXQ_KEYPARAM_EC_P521R1;
  285. case ECC_BRAINPOOLP256R1: return MXQ_KEYPARAM_EC_BP256R1;
  286. case ECC_BRAINPOOLP384R1: return MXQ_KEYPARAM_EC_BP384R1;
  287. case ECC_BRAINPOOLP512R1: return MXQ_KEYPARAM_EC_BP512R1;
  288. }
  289. return BAD_FUNC_ARG;
  290. }
  291. #endif /* WOLFSSL_MAXQ108X */
  292. static int ECDSA_sign(mxq_u1* dest, int* signlen, mxq_u1* key,
  293. mxq_u1* data, mxq_length data_length, int curve)
  294. {
  295. int ret;
  296. int hashlen = WC_SHA256_DIGEST_SIZE;
  297. unsigned char hash[WC_SHA256_DIGEST_SIZE];
  298. WC_RNG rng;
  299. int algo = 0;
  300. int wc_curve_id = ECC_SECP256R1;
  301. int wc_curve_size = 32;
  302. uint32_t sigSz = 0;
  303. if (curve != MXQ_KEYPARAM_EC_P256R1) {
  304. return BAD_FUNC_ARG;
  305. }
  306. algo = getSignAlgoFromCurve(curve);
  307. if (algo != ALGO_ECDSA_SHA_256) {
  308. return BAD_FUNC_ARG;
  309. }
  310. sigSz = (2 * wc_curve_size);
  311. if (*signlen < (int)sigSz) {
  312. return BAD_FUNC_ARG;
  313. }
  314. ret = wc_InitRng(&rng);
  315. if (ret != 0) {
  316. return ret;
  317. }
  318. ret = crypto_sha256(data, data_length, /* input message */
  319. hash, hashlen, /* hash digest result */
  320. 32 /* configurable block/chunk size */
  321. );
  322. if (ret == 0) {
  323. ret = crypto_ecc_sign(
  324. (key + (2 * wc_curve_size)), wc_curve_size, /* private key */
  325. hash, hashlen, /* computed hash digest */
  326. dest, &sigSz, /* signature r/s */
  327. wc_curve_size, /* curve size in bytes */
  328. wc_curve_id, /* curve id */
  329. &rng);
  330. *signlen = sigSz;
  331. }
  332. wc_FreeRng(&rng);
  333. return ret;
  334. }
  335. #ifdef MAXQ_AESGCM
  336. static int alloc_aes_key_id(void)
  337. {
  338. int i;
  339. for (i = 0; i < AES_KEY_ID_MAX_NUM; ++i) {
  340. if (aes_key_id_arr[i] == 0) {
  341. aes_key_id_arr[i] = AES_KEY_ID_START + i;
  342. break;
  343. }
  344. }
  345. if (i == AES_KEY_ID_MAX_NUM) {
  346. return 0;
  347. }
  348. else {
  349. return aes_key_id_arr[i];
  350. }
  351. }
  352. #endif /* MAXQ_AESGCM */
  353. static void free_aes_key_id(int obj_id)
  354. {
  355. int idx_for_arr = obj_id - AES_KEY_ID_START;
  356. if ((idx_for_arr >= 0) && (idx_for_arr < AES_KEY_ID_MAX_NUM)) {
  357. aes_key_id_arr[idx_for_arr] = 0;
  358. }
  359. }
  360. #ifdef MAXQ_ECC
  361. static int alloc_ecc_key_id(void)
  362. {
  363. int i;
  364. for (i = 0; i < ECC_KEY_ID_MAX_NUM; ++i) {
  365. if (ecc_key_id_arr[i] == 0) {
  366. ecc_key_id_arr[i] = ECC_KEY_ID_START + i;
  367. break;
  368. }
  369. }
  370. if (i == ECC_KEY_ID_MAX_NUM) {
  371. return 0;
  372. }
  373. else {
  374. return ecc_key_id_arr[i];
  375. }
  376. }
  377. #endif /* MAXQ_ECC */
  378. static void free_ecc_key_id(int obj_id)
  379. {
  380. int idx_for_arr = obj_id - ECC_KEY_ID_START;
  381. if ((idx_for_arr >= 0) && (idx_for_arr < ECC_KEY_ID_MAX_NUM)) {
  382. ecc_key_id_arr[idx_for_arr] = 0;
  383. }
  384. }
  385. #ifdef WOLFSSL_MAXQ108X
  386. static int alloc_temp_key_id(void)
  387. {
  388. int i;
  389. for (i = 0; i < TEMP_KEY_ID_MAX_NUM; ++i) {
  390. if (temp_key_id_arr[i] == 0) {
  391. temp_key_id_arr[i] = 1;
  392. break;
  393. }
  394. }
  395. if (i == TEMP_KEY_ID_MAX_NUM) {
  396. return -1;
  397. }
  398. else {
  399. return i;
  400. }
  401. }
  402. static void free_temp_key_id(int obj_id)
  403. {
  404. int idx_for_arr = obj_id - TEMP_KEY_ID_START;
  405. if (idx_for_arr >=0 && idx_for_arr < TEMP_KEY_ID_MAX_NUM) {
  406. temp_key_id_arr[idx_for_arr] = 0;
  407. }
  408. }
  409. #endif /* WOLFSSL_MAXQ108X */
  410. /*
  411. * WolfCrypt Functions
  412. */
  413. int wc_MAXQ10XX_AesSetKey(Aes* aes, const byte* userKey, word32 keylen)
  414. {
  415. XMEMCPY(aes->maxq_ctx.key, userKey, keylen);
  416. aes->maxq_ctx.key_pending = 1;
  417. return 0;
  418. }
  419. int wc_MAXQ10XX_EccSetKey(ecc_key* key, word32 keysize)
  420. {
  421. int err = 0;
  422. int keytype = key->type;
  423. word32 bufflen = 0;
  424. if (key->maxq_ctx.hw_ecc == -1) {
  425. err = WC_HW_E;
  426. }
  427. if (err == 0) {
  428. if (key->dp->id != ECC_SECP256R1) {
  429. err = ECC_CURVE_OID_E;
  430. }
  431. }
  432. if (err == 0) {
  433. if ((keytype != ECC_PUBLICKEY) && (keytype != ECC_PRIVATEKEY) &&
  434. (keytype != ECC_PRIVATEKEY_ONLY)) {
  435. err = BAD_FUNC_ARG;
  436. }
  437. }
  438. if (err == 0) {
  439. bufflen = keysize;
  440. if ((keytype == ECC_PUBLICKEY) || (keytype == ECC_PRIVATEKEY)) {
  441. err = wc_export_int(key->pubkey.x, key->maxq_ctx.ecc_key,
  442. &bufflen, keysize, WC_TYPE_UNSIGNED_BIN);
  443. }
  444. }
  445. if (err == 0) {
  446. if ((keytype == ECC_PUBLICKEY) || (keytype == ECC_PRIVATEKEY)) {
  447. err = wc_export_int(key->pubkey.y, key->maxq_ctx.ecc_key + keysize,
  448. &bufflen, keysize, WC_TYPE_UNSIGNED_BIN);
  449. }
  450. }
  451. if (err == 0) {
  452. if ((keytype == ECC_PRIVATEKEY) || (keytype == ECC_PRIVATEKEY_ONLY)) {
  453. err = wc_export_int(wc_ecc_key_get_priv(key),
  454. key->maxq_ctx.ecc_key + (2 * keysize), &bufflen, keysize,
  455. WC_TYPE_UNSIGNED_BIN);
  456. }
  457. }
  458. if (err == 0) {
  459. key->maxq_ctx.hw_ecc = 1;
  460. key->maxq_ctx.key_pending = 1;
  461. }
  462. else {
  463. key->maxq_ctx.hw_ecc = -1;
  464. }
  465. return err;
  466. }
  467. #ifdef MAXQ_AESGCM
  468. static int aes_set_key(Aes* aes, const byte* userKey, word32 keylen)
  469. {
  470. mxq_u1 key_buff[MAX_KEY_DATASIZE];
  471. mxq_err_t mxq_rc;
  472. int rc;
  473. unsigned char sign_key[MAX_SIGNKEY_DATASIZE];
  474. int sign_key_len, sign_key_curve, sign_key_type;
  475. mxq_u1 signature[MAX_SIG_DATASIZE];
  476. int signature_len = (int)sizeof(signature);
  477. if (aes == NULL || (keylen != AES_128_KEY_SIZE &&
  478. #ifdef WOLFSSL_AES_192
  479. keylen != AES_192_KEY_SIZE &&
  480. #endif
  481. keylen != AES_256_KEY_SIZE)) {
  482. return BAD_FUNC_ARG;
  483. }
  484. rc = maxq_CryptHwMutexTryLock();
  485. if (rc != 0) {
  486. WOLFSSL_ERROR_MSG("MAXQ: aes_set_key() lock could not be acquired");
  487. rc = NOT_COMPILED_IN;
  488. return rc;
  489. }
  490. if (aes->maxq_ctx.key_obj_id) {
  491. wc_MAXQ10XX_AesFree(aes);
  492. }
  493. int obj_id = alloc_aes_key_id();
  494. if (!obj_id) {
  495. WOLFSSL_ERROR_MSG("MAXQ: alloc_aes_key_id() failed");
  496. rc = NOT_COMPILED_IN;
  497. goto end_AesSetKey;
  498. }
  499. mxq_rc = MXQ_CreateObject(obj_id, keylen, MXQ_OBJTYPE_SECRETKEY,
  500. OBJPROP_PERSISTENT,
  501. (char *)"ahs=rwdgx:ahs=rwdgx:ahs=rwdgx");
  502. if (mxq_rc) {
  503. WOLFSSL_ERROR_MSG("MAXQ: MXQ_CreateObject() failed");
  504. rc = NOT_COMPILED_IN;
  505. goto end_AesSetKey;
  506. }
  507. /* store the object id in the context */
  508. aes->maxq_ctx.key_obj_id = obj_id;
  509. mxq_length key_buff_len = sizeof(key_buff);
  510. mxq_rc = MXQ_BuildKey(key_buff, &key_buff_len, MXQ_KEYTYPE_AES, 0xff,
  511. keylen, keylen, MXQ_KEYUSE_ENCRYPTION,
  512. ALGO_CIPHER_AES_ECB, MXQ_KEYUSE_NONE, ALGO_NONE,
  513. (mxq_u1 *)userKey);
  514. if (mxq_rc) {
  515. WOLFSSL_ERROR_MSG("MAXQ: MXQ_BuildKey() failed");
  516. rc = WC_HW_E;
  517. goto end_AesSetKey;
  518. }
  519. LoadDefaultImportKey(sign_key, &sign_key_len, &sign_key_curve,
  520. &sign_key_type);
  521. rc = ECDSA_sign(signature, &signature_len, sign_key, key_buff, key_buff_len,
  522. sign_key_curve);
  523. if (rc) {
  524. WOLFSSL_ERROR_MSG("MAXQ: ECDSA_sign() failed");
  525. goto end_AesSetKey;
  526. }
  527. mxq_rc = MXQ_ImportKey(obj_id, getSignAlgoFromCurve(sign_key_curve),
  528. PUBKEY_IMPORT_OBJID, key_buff, key_buff_len,
  529. signature, signature_len);
  530. if (mxq_rc) {
  531. WOLFSSL_ERROR_MSG("MAXQ: MXQ_ImportKey() failed");
  532. rc = WC_HW_E;
  533. goto end_AesSetKey;
  534. }
  535. /* key stored successfully */
  536. aes->maxq_ctx.key_pending = 0;
  537. end_AesSetKey:
  538. wolfSSL_CryptHwMutexUnLock();
  539. return rc;
  540. }
  541. #endif /* MAXQ_AESGCM */
  542. void wc_MAXQ10XX_AesFree(Aes* aes)
  543. {
  544. mxq_err_t mxq_rc;
  545. int rc = 1;
  546. if (aes->maxq_ctx.key_obj_id != 0) {
  547. rc = 0;
  548. }
  549. if (rc == 0) {
  550. rc = wolfSSL_CryptHwMutexLock();
  551. }
  552. if (rc == 0) {
  553. mxq_rc = MXQ_DeleteObject(aes->maxq_ctx.key_obj_id);
  554. if (mxq_rc) {
  555. WOLFSSL_ERROR_MSG("MAXQ: MXQ_DeleteObject() failed");
  556. rc = 1;
  557. }
  558. if (rc == 0) {
  559. free_aes_key_id(aes->maxq_ctx.key_obj_id);
  560. aes->maxq_ctx.key_obj_id = 0;
  561. }
  562. wolfSSL_CryptHwMutexUnLock();
  563. }
  564. }
  565. #ifdef MAXQ_ECC
  566. static int ecc_set_key(ecc_key* key, const byte* userKey, word32 keycomplen)
  567. {
  568. mxq_err_t mxq_rc;
  569. int rc;
  570. word32 keylen;
  571. int objtype;
  572. mxq_u1 key_buff[MAX_KEY_DATASIZE];
  573. mxq_length key_buff_len = sizeof(key_buff);
  574. unsigned char sign_key[MAX_SIGNKEY_DATASIZE];
  575. int sign_key_len, sign_key_curve, sign_key_type;
  576. mxq_u1 signature[MAX_SIG_DATASIZE];
  577. int signature_len = (int)sizeof(signature);
  578. if ((key->type != ECC_PUBLICKEY) && (key->type != ECC_PRIVATEKEY) &&
  579. (key->type != ECC_PRIVATEKEY_ONLY)) {
  580. return BAD_FUNC_ARG;
  581. }
  582. if (key->type == ECC_PUBLICKEY) {
  583. keylen = keycomplen * 2;
  584. objtype = MXQ_OBJTYPE_PUBKEY;
  585. }
  586. else {
  587. keylen = keycomplen * 3;
  588. objtype = MXQ_OBJTYPE_KEYPAIR;
  589. }
  590. rc = maxq_CryptHwMutexTryLock();
  591. if (rc != 0) {
  592. WOLFSSL_ERROR_MSG("MAXQ: ecc_set_key() lock could not be acquired");
  593. rc = NOT_COMPILED_IN;
  594. return rc;
  595. }
  596. if (key->maxq_ctx.key_obj_id) {
  597. wc_MAXQ10XX_EccFree(key);
  598. }
  599. int obj_id = alloc_ecc_key_id();
  600. if (!obj_id) {
  601. WOLFSSL_ERROR_MSG("MAXQ: alloc_ecc_key_id() failed");
  602. rc = NOT_COMPILED_IN;
  603. goto end_EccSetKey;
  604. }
  605. mxq_rc = MXQ_CreateObject(obj_id, keylen, objtype, OBJPROP_PERSISTENT,
  606. (char *)"ahs=rwdgx:ahs=rwdgx:ahs=rwdgx");
  607. if (mxq_rc) {
  608. WOLFSSL_ERROR_MSG("MAXQ: MXQ_CreateObject() failed");
  609. rc = NOT_COMPILED_IN;
  610. goto end_EccSetKey;
  611. }
  612. /* store the object id in the context */
  613. key->maxq_ctx.key_obj_id = obj_id;
  614. mxq_rc = MXQ_BuildKey(key_buff, &key_buff_len, MXQ_KEYTYPE_ECC,
  615. MXQ_KEYPARAM_EC_P256R1, keycomplen, keylen,
  616. MXQ_KEYUSE_DATASIGNATURE, ALGO_ECDSA_SHA_256,
  617. MXQ_KEYUSE_NONE, ALGO_NONE, (mxq_u1 *)userKey);
  618. if (mxq_rc) {
  619. WOLFSSL_ERROR_MSG("MAXQ: MXQ_BuildKey() failed");
  620. rc = WC_HW_E;
  621. goto end_EccSetKey;
  622. }
  623. LoadDefaultImportKey(sign_key, &sign_key_len, &sign_key_curve,
  624. &sign_key_type);
  625. rc = ECDSA_sign(signature, &signature_len, sign_key, key_buff, key_buff_len,
  626. sign_key_curve);
  627. if (rc) {
  628. WOLFSSL_ERROR_MSG("MAXQ: ECDSA_sign() failed");
  629. goto end_EccSetKey;
  630. }
  631. mxq_rc = MXQ_ImportKey(obj_id, getSignAlgoFromCurve(sign_key_curve),
  632. PUBKEY_IMPORT_OBJID, key_buff, key_buff_len,
  633. signature, signature_len);
  634. if (mxq_rc) {
  635. WOLFSSL_ERROR_MSG("MAXQ: MXQ_ImportKey() failed");
  636. rc = WC_HW_E;
  637. goto end_EccSetKey;
  638. }
  639. /* key stored successfully */
  640. key->maxq_ctx.key_pending = 0;
  641. end_EccSetKey:
  642. wolfSSL_CryptHwMutexUnLock();
  643. return rc;
  644. }
  645. #endif /* MAXQ_ECC */
  646. void wc_MAXQ10XX_EccFree(ecc_key* key)
  647. {
  648. if (key->maxq_ctx.key_obj_id == 0) {
  649. return;
  650. }
  651. int rc = wolfSSL_CryptHwMutexLock();
  652. if (rc != 0) {
  653. return;
  654. }
  655. mxq_err_t mxq_rc = MXQ_DeleteObject(key->maxq_ctx.key_obj_id);
  656. if (mxq_rc) {
  657. WOLFSSL_ERROR_MSG("MAXQ: MXQ_DeleteObject() failed");
  658. wolfSSL_CryptHwMutexUnLock();
  659. return;
  660. }
  661. free_ecc_key_id(key->maxq_ctx.key_obj_id);
  662. key->maxq_ctx.key_obj_id = 0;
  663. wolfSSL_CryptHwMutexUnLock();
  664. }
  665. void wc_MAXQ10XX_Sha256Copy(wc_Sha256* sha256)
  666. {
  667. /* during copying, change to soft hash mode for one context */
  668. if (sha256->maxq_ctx.hash_running) {
  669. sha256->maxq_ctx.hash_running = 0;
  670. sha256->maxq_ctx.soft_hash = 1;
  671. }
  672. }
  673. void wc_MAXQ10XX_Sha256Free(wc_Sha256* sha256)
  674. {
  675. /* release the mutex if a hash operation is running on the maxq10xx device
  676. */
  677. if (sha256->maxq_ctx.hash_running) {
  678. sha256->maxq_ctx.hash_running = 0;
  679. sha256->maxq_ctx.soft_hash = 1;
  680. wolfSSL_CryptHwMutexUnLock();
  681. }
  682. }
  683. #endif /* WOLFSSL_MAXQ10XX_CRYPTO */
  684. #ifdef WOLF_CRYPTO_CB
  685. #ifdef MAXQ_SHA256
  686. static int maxq10xx_hash_update_sha256(const mxq_u1* psrc, mxq_length inlen,
  687. int running)
  688. {
  689. mxq_err_t mxq_rc;
  690. if (running == 0) {
  691. mxq_rc = MXQ_MD_Init(ALGO_MD_SHA256);
  692. if (mxq_rc) {
  693. WOLFSSL_ERROR_MSG("MAXQ: MXQ_MD_Init() failed");
  694. return WC_HW_E;
  695. }
  696. }
  697. mxq_length data_offset = 0;
  698. mxq_length data_len;
  699. while (inlen) {
  700. data_len = (inlen < MAX_HASH_CHUNKSIZE) ? inlen : MAX_HASH_CHUNKSIZE;
  701. mxq_rc = MXQ_MD_Update(&psrc[data_offset], data_len);
  702. if (mxq_rc) {
  703. WOLFSSL_ERROR_MSG("MAXQ: MXQ_MD_Update() failed");
  704. return WC_HW_E;
  705. }
  706. data_offset += data_len;
  707. inlen -= data_len;
  708. }
  709. return 0;
  710. }
  711. static int maxq10xx_hash_finish_sha256(mxq_u1* pdest)
  712. {
  713. mxq_err_t mxq_rc;
  714. mxq_length hashlen = WC_SHA256_DIGEST_SIZE;
  715. mxq_rc = MXQ_MD_Finish(pdest, &hashlen);
  716. if (mxq_rc) {
  717. WOLFSSL_ERROR_MSG("MAXQ: MXQ_MD_Finish() failed");
  718. return WC_HW_E;
  719. }
  720. return 0;
  721. }
  722. #endif /* MAXQ_SHA256 */
  723. static int maxq10xx_cipher_do(mxq_algo_id_t algo_id, mxq_u1 encrypt,
  724. mxq_u2 key_id, mxq_u1* p_in, mxq_u1* p_out,
  725. mxq_length data_size, mxq_u1* p_iv,
  726. mxq_length iv_len, mxq_u1* p_aad,
  727. mxq_length aad_len, mxq_u1* p_tag,
  728. mxq_length tag_len)
  729. {
  730. mxq_err_t mxq_rc;
  731. ciph_params_t cparams;
  732. mxq_u1 internal_data[K_CHUNKSIZE + K_CIPHER_BLOCKSIZE];
  733. mxq_u1 *p_int_data = internal_data;
  734. mxq_length data_offset = 0;
  735. mxq_length proc_len = 0, req_len = 0;
  736. XMEMSET(&cparams, 0, sizeof(cparams));
  737. cparams.data_length = data_size;
  738. cparams.p_iv = p_iv;
  739. cparams.iv_length = iv_len;
  740. cparams.p_aad = p_aad;
  741. cparams.aad_length = aad_len;
  742. if (encrypt) {
  743. cparams.aead_tag_len = tag_len;
  744. }
  745. else {
  746. XMEMCPY(cparams.aead_tag, p_tag, tag_len);
  747. cparams.aead_tag_len = tag_len;
  748. }
  749. mxq_rc = MXQ_Cipher_Init(encrypt, algo_id, key_id, &cparams, 0);
  750. if (mxq_rc) {
  751. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Cipher_Init() failed");
  752. return WC_HW_E;
  753. }
  754. while (data_size) {
  755. proc_len = (data_size < K_CHUNKSIZE) ? data_size : K_CHUNKSIZE;
  756. req_len = proc_len;
  757. mxq_rc = MXQ_Cipher_Update(&p_out, &p_in[data_offset], &proc_len);
  758. if (mxq_rc) {
  759. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Cipher_Update() failed");
  760. return WC_HW_E;
  761. }
  762. data_offset += req_len;
  763. data_size -= req_len;
  764. }
  765. if (encrypt) {
  766. proc_len = tag_len;
  767. mxq_rc = MXQ_Cipher_Finish(&p_int_data, &proc_len);
  768. if (mxq_rc) {
  769. WOLFSSL_ERROR_MSG("MAXQ: Encrypt, MXQ_Cipher_Finish() failed");
  770. return WC_HW_E;
  771. }
  772. if (proc_len > tag_len) {
  773. XMEMCPY(p_out, internal_data, proc_len - tag_len);
  774. }
  775. if ((tag_len != 0) && (proc_len >= tag_len)) {
  776. XMEMCPY(p_tag, &internal_data[proc_len - tag_len], tag_len);
  777. }
  778. }
  779. else {
  780. internal_data[0] = 0xDE;
  781. XMEMCPY(&internal_data[1], p_tag, tag_len);
  782. proc_len = tag_len;
  783. mxq_rc = MXQ_Cipher_Finish(&p_int_data, &proc_len);
  784. if (mxq_rc) {
  785. WOLFSSL_ERROR_MSG("MAXQ: Decrypt, MXQ_Cipher_Finish() failed");
  786. return WC_HW_E;
  787. }
  788. if (proc_len) {
  789. XMEMCPY(p_out, internal_data, proc_len);
  790. }
  791. }
  792. return 0;
  793. }
  794. static int maxq10xx_ecc_sign_local(mxq_u2 key_id,
  795. mxq_u1* p_in, mxq_u2 data_size,
  796. mxq_u1* p_sign_out, mxq_length* sign_len,
  797. mxq_length keycomplen)
  798. {
  799. mxq_err_t mxq_rc;
  800. int rc;
  801. mxq_u1 *input_digest = NULL;
  802. mxq_u1 *buff_sign = NULL;
  803. mxq_length buff_len = keycomplen * 2;
  804. byte *r = NULL;
  805. byte *s = NULL;
  806. input_digest = (mxq_u1 *)XMALLOC(keycomplen, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  807. buff_sign = (mxq_u1 *)XMALLOC(keycomplen * 2, NULL,
  808. DYNAMIC_TYPE_TMP_BUFFER);
  809. if (input_digest == NULL || buff_sign == NULL) {
  810. XFREE(input_digest, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  811. XFREE(buff_sign, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  812. return MEMORY_E;
  813. }
  814. r = &buff_sign[0];
  815. s = &buff_sign[keycomplen];
  816. /* truncate input to match key size */
  817. if (data_size > keycomplen) {
  818. data_size = keycomplen;
  819. }
  820. /* build input digest */
  821. XMEMSET(input_digest, 0, keycomplen);
  822. XMEMCPY(&input_digest[keycomplen - data_size], p_in, data_size);
  823. mxq_rc = MXQ_Sign(ALGO_ECDSA_PLAIN, key_id, input_digest,
  824. keycomplen, buff_sign, &buff_len);
  825. if (mxq_rc) {
  826. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Sign() failed");
  827. return WC_HW_E;
  828. }
  829. /* convert r and s to signature */
  830. rc = wc_ecc_rs_raw_to_sig((const byte *)r, keycomplen, (const byte *)s,
  831. keycomplen, p_sign_out, sign_len);
  832. if (rc != 0) {
  833. WOLFSSL_ERROR_MSG("MAXQ: converting r and s to signature failed");
  834. }
  835. XFREE(input_digest, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  836. XFREE(buff_sign, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  837. return rc;
  838. }
  839. #ifdef MAXQ_ECC
  840. static int maxq10xx_ecc_verify_local(
  841. mxq_u2 key_id, mxq_u1* p_in, mxq_u2 data_size,
  842. mxq_u1* p_sign, mxq_u1 sign_len, int *result,
  843. mxq_length keycomplen)
  844. {
  845. int rc;
  846. mxq_err_t mxq_rc;
  847. mxq_u1 *buff_rs = NULL;
  848. mxq_u1 *input_digest = NULL;
  849. mxq_u1 *buff_signature = NULL;
  850. byte *r = NULL;
  851. byte *s = NULL;
  852. word32 r_len = keycomplen;
  853. word32 s_len = keycomplen;
  854. input_digest = (mxq_u1 *)XMALLOC(keycomplen, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  855. buff_rs = (mxq_u1 *)XMALLOC(keycomplen * 2, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  856. buff_signature = (mxq_u1 *)XMALLOC(keycomplen * 2, NULL,
  857. DYNAMIC_TYPE_TMP_BUFFER);
  858. if (input_digest == NULL || buff_rs == NULL || buff_signature == NULL) {
  859. XFREE(input_digest, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  860. XFREE(buff_rs, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  861. XFREE(buff_signature, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  862. return MEMORY_E;
  863. }
  864. r = &buff_rs[0];
  865. s = &buff_rs[keycomplen];
  866. /* truncate input to match key size */
  867. if (data_size > keycomplen) {
  868. data_size = keycomplen;
  869. }
  870. /* build input digest */
  871. XMEMSET(input_digest, 0, keycomplen);
  872. XMEMCPY(&input_digest[keycomplen - data_size], p_in, data_size);
  873. /* extract r and s from signature */
  874. XMEMSET(buff_rs, 0, keycomplen * 2);
  875. rc = wc_ecc_sig_to_rs(p_sign, sign_len, r, &r_len, s, &s_len);
  876. if (rc != 0) {
  877. XFREE(input_digest, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  878. XFREE(buff_rs, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  879. XFREE(buff_signature, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  880. WOLFSSL_ERROR_MSG("MAXQ: extracting r and s from signature failed");
  881. *result = 0;
  882. return rc;
  883. }
  884. if ((r_len > keycomplen) || (s_len > keycomplen)) {
  885. XFREE(input_digest, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  886. XFREE(buff_rs, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  887. XFREE(buff_signature, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  888. WOLFSSL_ERROR_MSG("MAXQ: r and s corrupted");
  889. *result = 0;
  890. return BUFFER_E;
  891. }
  892. /* prepare raw signature */
  893. XMEMSET(buff_signature, 0, keycomplen * 2);
  894. /* add leading zeros if necessary */
  895. XMEMCPY(&buff_signature[keycomplen - r_len], r, r_len);
  896. XMEMCPY(&buff_signature[(keycomplen * 2) - s_len], s, s_len);
  897. mxq_rc = MXQ_Verify(ALGO_ECDSA_PLAIN, key_id, input_digest,
  898. keycomplen, buff_signature, keycomplen * 2);
  899. XFREE(input_digest, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  900. XFREE(buff_rs, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  901. XFREE(buff_signature, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  902. *result = (mxq_rc ? 0 : 1);
  903. return 0;
  904. }
  905. #endif /* MAXQ_ECC */
  906. #ifdef MAXQ_RNG
  907. static int maxq10xx_random(byte* output, unsigned short sz)
  908. {
  909. #if defined(WOLFSSL_MAXQ108X)
  910. if (!tls13active) {
  911. return NOT_COMPILED_IN;
  912. }
  913. #endif
  914. if (output == NULL) {
  915. return BUFFER_E;
  916. }
  917. int ret = maxq_CryptHwMutexTryLock();
  918. if (ret != 0) {
  919. WOLFSSL_ERROR_MSG("MAXQ: maxq10xx_random() lock could not be acquired");
  920. ret = NOT_COMPILED_IN;
  921. return ret;
  922. }
  923. if (MXQ_Get_Random_Ext(output, sz, 0)) {
  924. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Get_Random_Ext() failed");
  925. wolfSSL_CryptHwMutexUnLock();
  926. return WC_HW_E;
  927. }
  928. wolfSSL_CryptHwMutexUnLock();
  929. return 0;
  930. }
  931. #endif /* MAXQ_RNG */
  932. #if !defined(NO_AES) && defined(HAVE_AESGCM) && defined(MAXQ_AESGCM)
  933. static int do_aesgcm(wc_CryptoInfo* info)
  934. {
  935. int rc;
  936. if (info->cipher.enc) {
  937. if (info->cipher.aesgcm_enc.authTagSz > 16) {
  938. return CRYPTOCB_UNAVAILABLE;
  939. }
  940. if (info->cipher.aesgcm_enc.sz == 0) {
  941. return CRYPTOCB_UNAVAILABLE;
  942. }
  943. if (info->cipher.aesgcm_enc.ivSz != 12) {
  944. return CRYPTOCB_UNAVAILABLE;
  945. }
  946. if (info->cipher.aesgcm_enc.aes->maxq_ctx.key_pending) {
  947. rc = aes_set_key(
  948. info->cipher.aesgcm_enc.aes,
  949. (const byte *)info->cipher.aesgcm_enc.aes->maxq_ctx.key,
  950. info->cipher.aesgcm_enc.aes->keylen);
  951. if (rc != 0) {
  952. return rc;
  953. }
  954. }
  955. rc = wolfSSL_CryptHwMutexLock();
  956. if (rc != 0) {
  957. return rc;
  958. }
  959. rc = maxq10xx_cipher_do(
  960. ALGO_CIPHER_AES_GCM,
  961. 1,
  962. info->cipher.aesgcm_enc.aes->maxq_ctx.key_obj_id,
  963. (byte *)info->cipher.aesgcm_enc.in,
  964. (byte *)info->cipher.aesgcm_enc.out,
  965. info->cipher.aesgcm_enc.sz,
  966. (byte *)info->cipher.aesgcm_enc.iv,
  967. info->cipher.aesgcm_enc.ivSz,
  968. (byte *)info->cipher.aesgcm_enc.authIn,
  969. info->cipher.aesgcm_enc.authInSz,
  970. (byte *)info->cipher.aesgcm_enc.authTag,
  971. info->cipher.aesgcm_enc.authTagSz);
  972. if (rc != 0) {
  973. wolfSSL_CryptHwMutexUnLock();
  974. return rc;
  975. }
  976. wolfSSL_CryptHwMutexUnLock();
  977. }
  978. else {
  979. if (info->cipher.aesgcm_dec.authTagSz != 16) {
  980. return CRYPTOCB_UNAVAILABLE;
  981. }
  982. if (info->cipher.aesgcm_dec.sz == 0) {
  983. return CRYPTOCB_UNAVAILABLE;
  984. }
  985. if (info->cipher.aesgcm_dec.ivSz != 12) {
  986. return CRYPTOCB_UNAVAILABLE;
  987. }
  988. if (info->cipher.aesgcm_dec.aes->maxq_ctx.key_pending) {
  989. rc = aes_set_key(
  990. info->cipher.aesgcm_dec.aes,
  991. (const byte *)info->cipher.aesgcm_dec.aes->maxq_ctx.key,
  992. info->cipher.aesgcm_dec.aes->keylen);
  993. if (rc != 0) {
  994. return rc;
  995. }
  996. }
  997. rc = wolfSSL_CryptHwMutexLock();
  998. if (rc != 0) {
  999. return rc;
  1000. }
  1001. rc = maxq10xx_cipher_do(
  1002. ALGO_CIPHER_AES_GCM,
  1003. 0,
  1004. info->cipher.aesgcm_dec.aes->maxq_ctx.key_obj_id,
  1005. (byte *)info->cipher.aesgcm_dec.in,
  1006. (byte *)info->cipher.aesgcm_dec.out,
  1007. info->cipher.aesgcm_dec.sz,
  1008. (byte *)info->cipher.aesgcm_dec.iv,
  1009. info->cipher.aesgcm_dec.ivSz,
  1010. (byte *)info->cipher.aesgcm_dec.authIn,
  1011. info->cipher.aesgcm_dec.authInSz,
  1012. (byte *)info->cipher.aesgcm_dec.authTag,
  1013. info->cipher.aesgcm_dec.authTagSz);
  1014. if (rc != 0) {
  1015. wolfSSL_CryptHwMutexUnLock();
  1016. return rc;
  1017. }
  1018. wolfSSL_CryptHwMutexUnLock();
  1019. }
  1020. /* done */
  1021. return 0;
  1022. }
  1023. #endif /* !NO_AES && HAVE_AESGCM && MAXQ_AESGCM */
  1024. #if !defined(NO_SHA) && !defined(NO_SHA256) && defined(MAXQ_SHA256)
  1025. static int do_sha256(wc_CryptoInfo* info)
  1026. {
  1027. int rc;
  1028. if (info->hash.sha256->maxq_ctx.soft_hash) {
  1029. return CRYPTOCB_UNAVAILABLE;
  1030. }
  1031. if ((info->hash.in == NULL) && (info->hash.digest == NULL)) {
  1032. return WC_HW_E;
  1033. }
  1034. if (info->hash.sha256->maxq_ctx.hash_running == 0) {
  1035. rc = maxq_CryptHwMutexTryLock();
  1036. if (rc != 0) {
  1037. info->hash.sha256->maxq_ctx.soft_hash = 1;
  1038. return CRYPTOCB_UNAVAILABLE;
  1039. }
  1040. }
  1041. if (info->hash.in != NULL) {
  1042. /* wc_Sha256Update */
  1043. if ((info->hash.sha256->maxq_ctx.hash_running == 0) &&
  1044. (info->hash.inSz == 0)) {
  1045. info->hash.sha256->maxq_ctx.soft_hash = 1;
  1046. wolfSSL_CryptHwMutexUnLock();
  1047. return CRYPTOCB_UNAVAILABLE;
  1048. }
  1049. rc = maxq10xx_hash_update_sha256(info->hash.in, info->hash.inSz,
  1050. info->hash.sha256->maxq_ctx.hash_running);
  1051. if (rc != 0) {
  1052. info->hash.sha256->maxq_ctx.hash_running = 0;
  1053. wolfSSL_CryptHwMutexUnLock();
  1054. return rc;
  1055. }
  1056. info->hash.sha256->maxq_ctx.hash_running = 1;
  1057. /* save soft hash context in case of wc_Sha256Copy */
  1058. return CRYPTOCB_UNAVAILABLE;
  1059. }
  1060. else if (info->hash.digest != NULL) {
  1061. /* wc_Sha256Final */
  1062. if (info->hash.sha256->maxq_ctx.hash_running == 0) {
  1063. info->hash.sha256->maxq_ctx.soft_hash = 1;
  1064. wolfSSL_CryptHwMutexUnLock();
  1065. return CRYPTOCB_UNAVAILABLE;
  1066. }
  1067. rc = maxq10xx_hash_finish_sha256(info->hash.digest);
  1068. if (rc != 0) {
  1069. info->hash.sha256->maxq_ctx.hash_running = 0;
  1070. wolfSSL_CryptHwMutexUnLock();
  1071. return rc;
  1072. }
  1073. info->hash.sha256->maxq_ctx.hash_running = 0;
  1074. wolfSSL_CryptHwMutexUnLock();
  1075. /* done */
  1076. rc = 0;
  1077. }
  1078. return rc;
  1079. }
  1080. #endif /* !NO_SHA && !NO_SHA256 && MAXQ_SHA256 */
  1081. int wolfSSL_MAXQ10XX_CryptoDevCb(int devId, wc_CryptoInfo* info, void* ctx)
  1082. {
  1083. int rc = CRYPTOCB_UNAVAILABLE;
  1084. (void)devId;
  1085. (void)ctx;
  1086. #if defined(WOLFSSL_MAXQ108X)
  1087. if (!tls13active)
  1088. #endif
  1089. return CRYPTOCB_UNAVAILABLE;
  1090. if (info->algo_type == WC_ALGO_TYPE_CIPHER) {
  1091. #if !defined(NO_AES) || !defined(NO_DES3)
  1092. #if defined(HAVE_AESGCM) && defined(MAXQ_AESGCM)
  1093. if (info->cipher.type == WC_CIPHER_AES_GCM) {
  1094. rc = do_aesgcm(info);
  1095. }
  1096. #endif /* HAVE_AESGCM && MAXQ_AESGCM */
  1097. #ifdef HAVE_AES_CBC
  1098. if (info->cipher.type == WC_CIPHER_AES_CBC) {
  1099. /* TODO */
  1100. return CRYPTOCB_UNAVAILABLE;
  1101. }
  1102. #endif /* HAVE_AES_CBC */
  1103. #endif /* !NO_AES || !NO_DES3 */
  1104. }
  1105. #if !defined(NO_SHA) || !defined(NO_SHA256)
  1106. else if (info->algo_type == WC_ALGO_TYPE_HASH) {
  1107. #if !defined(NO_SHA) && defined(MAXQ_SHA1)
  1108. if (info->hash.type == WC_HASH_TYPE_SHA) {
  1109. /* TODO */
  1110. return CRYPTOCB_UNAVAILABLE;
  1111. }
  1112. else
  1113. #endif /* !NO_SHA && MAXQ_SHA1 */
  1114. #if !defined(NO_SHA256) && defined(MAXQ_SHA256)
  1115. if (info->hash.type == WC_HASH_TYPE_SHA256) {
  1116. rc = do_sha256(info);
  1117. }
  1118. #endif /* !NO_SHA256 && MAXQ_SHA256 */
  1119. }
  1120. #endif /* !NO_SHA || !NO_SHA256 */
  1121. #if !defined(WC_NO_RNG) && defined(MAXQ_RNG)
  1122. else if (info->algo_type == WC_ALGO_TYPE_SEED) {
  1123. rc = maxq10xx_random(info->seed.seed, info->seed.sz);
  1124. }
  1125. else if (info->algo_type == WC_ALGO_TYPE_RNG) {
  1126. rc = maxq10xx_random(info->rng.out, info->rng.sz);
  1127. }
  1128. #endif /* !WC_NO_RNG && MAXQ_RNG */
  1129. else if (info->algo_type == WC_ALGO_TYPE_PK) {
  1130. #if defined(HAVE_ECC) && defined(MAXQ_ECC)
  1131. if (info->pk.type == WC_PK_TYPE_EC_KEYGEN) {
  1132. /* TODO */
  1133. return CRYPTOCB_UNAVAILABLE;
  1134. }
  1135. else if (info->pk.type == WC_PK_TYPE_ECDH) {
  1136. /* TODO */
  1137. return CRYPTOCB_UNAVAILABLE;
  1138. }
  1139. else if (info->pk.type == WC_PK_TYPE_ECDSA_SIGN) {
  1140. if (info->pk.eccsign.key->maxq_ctx.hw_ecc == 0) {
  1141. rc = wc_MAXQ10XX_EccSetKey(info->pk.eccsign.key,
  1142. info->pk.eccsign.key->dp->size);
  1143. if (rc != 0) {
  1144. return rc;
  1145. }
  1146. }
  1147. if (info->pk.eccsign.key->maxq_ctx.hw_ecc == -1) {
  1148. return CRYPTOCB_UNAVAILABLE;
  1149. }
  1150. if (info->pk.eccsign.key->maxq_ctx.key_pending) {
  1151. rc = ecc_set_key(info->pk.eccsign.key,
  1152. info->pk.eccsign.key->maxq_ctx.ecc_key,
  1153. info->pk.eccsign.key->dp->size);
  1154. if (rc != 0) {
  1155. return rc;
  1156. }
  1157. }
  1158. rc = wolfSSL_CryptHwMutexLock();
  1159. if (rc != 0) {
  1160. return rc;
  1161. }
  1162. rc = maxq10xx_ecc_sign_local(
  1163. info->pk.eccsign.key->maxq_ctx.key_obj_id,
  1164. (byte *)info->pk.eccsign.in, info->pk.eccsign.inlen,
  1165. info->pk.eccsign.out, info->pk.eccsign.outlen,
  1166. info->pk.eccsign.key->dp->size);
  1167. if (rc != 0) {
  1168. wolfSSL_CryptHwMutexUnLock();
  1169. return rc;
  1170. }
  1171. wolfSSL_CryptHwMutexUnLock();
  1172. /* done */
  1173. rc = 0;
  1174. }
  1175. else if (info->pk.type == WC_PK_TYPE_ECDSA_VERIFY) {
  1176. if (info->pk.eccverify.key->type == ECC_PRIVATEKEY_ONLY) {
  1177. return CRYPTOCB_UNAVAILABLE;
  1178. }
  1179. if (info->pk.eccverify.key->maxq_ctx.hw_ecc == 0) {
  1180. rc = wc_MAXQ10XX_EccSetKey(info->pk.eccverify.key,
  1181. info->pk.eccverify.key->dp->size);
  1182. if (rc != 0) {
  1183. return rc;
  1184. }
  1185. }
  1186. if (info->pk.eccverify.key->maxq_ctx.hw_ecc == -1) {
  1187. return CRYPTOCB_UNAVAILABLE;
  1188. }
  1189. if (info->pk.eccverify.key->maxq_ctx.key_pending) {
  1190. rc = ecc_set_key(info->pk.eccverify.key,
  1191. info->pk.eccverify.key->maxq_ctx.ecc_key,
  1192. info->pk.eccverify.key->dp->size);
  1193. if (rc != 0) {
  1194. return rc;
  1195. }
  1196. }
  1197. rc = wolfSSL_CryptHwMutexLock();
  1198. if (rc != 0) {
  1199. return rc;
  1200. }
  1201. rc =
  1202. maxq10xx_ecc_verify_local(
  1203. info->pk.eccverify.key->maxq_ctx.key_obj_id,
  1204. (byte *)info->pk.eccverify.hash,
  1205. info->pk.eccverify.hashlen,
  1206. (byte *)info->pk.eccverify.sig,
  1207. info->pk.eccverify.siglen,
  1208. info->pk.eccverify.res,
  1209. info->pk.eccverify.key->dp->size);
  1210. wolfSSL_CryptHwMutexUnLock();
  1211. if (rc != 0) {
  1212. return rc;
  1213. }
  1214. /* Success */
  1215. rc = 0;
  1216. }
  1217. #endif /* HAVE_ECC && MAXQ_ECC */
  1218. }
  1219. #ifdef WOLFSSL_MAXQ108X
  1220. else if (info->algo_type == WC_ALGO_TYPE_HMAC) {
  1221. if (info->hmac.in != NULL && info->hmac.digest == NULL) {
  1222. rc = 0;
  1223. if (mac_comp_active == 0) {
  1224. rc = wc_MAXQ10XX_HmacSetKey(info->hmac.macType);
  1225. }
  1226. if (rc == 0) {
  1227. rc = wc_MAXQ10XX_HmacUpdate(info->hmac.in, info->hmac.inSz);
  1228. }
  1229. }
  1230. else if (info->hmac.in == NULL && info->hmac.digest != NULL) {
  1231. rc = wc_MAXQ10XX_HmacFinal(info->hmac.digest);
  1232. }
  1233. else {
  1234. rc = BAD_FUNC_ARG;
  1235. }
  1236. }
  1237. #endif /* WOLFSSL_MAXQ108X */
  1238. if (rc != 0 && rc != CRYPTOCB_UNAVAILABLE) {
  1239. rc = WC_HW_E;
  1240. }
  1241. return rc;
  1242. }
  1243. static int wolfSSL_Soft_CryptoDevCb(int devId, wc_CryptoInfo* info, void* ctx)
  1244. {
  1245. (void)devId;
  1246. (void)info;
  1247. (void)ctx;
  1248. return CRYPTOCB_UNAVAILABLE;
  1249. }
  1250. #endif /* WOLF_CRYPTO_CB */
  1251. #ifdef WOLFSSL_MAXQ10XX_TLS
  1252. #ifdef WOLFSSL_MAXQ108X
  1253. static int calculate_modulus_offset(const unsigned char * cert_data, int offset)
  1254. {
  1255. int i;
  1256. int l_offset = offset;
  1257. for (i = 0; i < 2; i++) {
  1258. if ((cert_data[l_offset]) & 0x80) {
  1259. if ((cert_data[l_offset] & 0x7f) == 1) {
  1260. l_offset += 3;
  1261. }
  1262. if ((cert_data[l_offset] & 0x7f) == 2) {
  1263. l_offset += 4;
  1264. }
  1265. }
  1266. else {
  1267. l_offset += 2;
  1268. }
  1269. }
  1270. return l_offset;
  1271. }
  1272. static int maxq_curve_wolfssl_id2mxq_id(word32 curve_id, mxq_length *keycomplen)
  1273. {
  1274. switch (curve_id) {
  1275. case ECC_SECP256R1_OID:
  1276. *keycomplen = 32;
  1277. return MXQ_KEYPARAM_EC_P256R1;
  1278. case ECC_SECP384R1_OID:
  1279. *keycomplen = 48;
  1280. return MXQ_KEYPARAM_EC_P384R1;
  1281. case ECC_SECP521R1_OID:
  1282. *keycomplen = 66;
  1283. return MXQ_KEYPARAM_EC_P521R1;
  1284. case ECC_BRAINPOOLP256R1_OID:
  1285. *keycomplen = 32;
  1286. return MXQ_KEYPARAM_EC_BP256R1;
  1287. case ECC_BRAINPOOLP384R1_OID:
  1288. *keycomplen = 48;
  1289. return MXQ_KEYPARAM_EC_BP384R1;
  1290. case ECC_BRAINPOOLP512R1_OID:
  1291. *keycomplen = 64;
  1292. return MXQ_KEYPARAM_EC_BP512R1;
  1293. default:
  1294. return MXQ_UNKNOWN_CURVE;
  1295. }
  1296. }
  1297. static int mxq_get_sign_alg_from_sig_oid(word32 maxq_id) {
  1298. switch (maxq_id) {
  1299. case CTC_SHA256wECDSA:
  1300. return ALGO_ECDSA_SHA_256;
  1301. case CTC_SHA384wECDSA:
  1302. return ALGO_ECDSA_SHA_384;
  1303. case CTC_SHA512wECDSA:
  1304. return ALGO_ECDSA_SHA_512;
  1305. case CTC_SHA256wRSA:
  1306. return ALGO_RSASSAPSSPKCS1_V1_5_SHA256;
  1307. case CTC_SHA384wRSA:
  1308. return ALGO_RSASSAPSSPKCS1_V1_5_SHA384;
  1309. case CTC_SHA512wRSA:
  1310. return ALGO_RSASSAPSSPKCS1_V1_5_SHA512;
  1311. default:
  1312. return ALGO_INVALID;
  1313. }
  1314. }
  1315. #endif /* WOLFSSL_MAXQ108X */
  1316. /* TODO: Get rid of publicKeyIndex. Pass in the information it is parsing.
  1317. * Then Improve this to pass in the parts of decoded cert it needs.
  1318. */
  1319. static int maxq10xx_process_server_certificate(WOLFSSL* ssl,
  1320. DecodedCert* p_cert)
  1321. {
  1322. mxq_keytype_id_t key_type = MXQ_KEYTYPE_ECC;
  1323. mxq_keyparam_id_t keyparam = MXQ_KEYPARAM_EC_P256R1;
  1324. mxq_length totalkeylen;
  1325. mxq_algo_id_t sign_algo = ALGO_ECDSA_SHA_256;
  1326. int pk_offset = p_cert->publicKeyIndex;
  1327. mxq_length keycomplen = ECC_KEYCOMPLEN;
  1328. int rc;
  1329. mxq_err_t mxq_rc;
  1330. mxq_u1 certdata[MAX_CERT_DATASIZE];
  1331. mxq_length certdatalen = sizeof(certdata);
  1332. (void)ssl;
  1333. #if defined(WOLFSSL_MAXQ1065)
  1334. if (p_cert->signatureOID != CTC_SHA256wECDSA) {
  1335. WOLFSSL_MSG("MAXQ: signature algo not supported");
  1336. return NOT_COMPILED_IN;
  1337. }
  1338. if (p_cert->keyOID != ECDSAk) {
  1339. WOLFSSL_MSG("MAXQ: key algo not supported");
  1340. return NOT_COMPILED_IN;
  1341. }
  1342. if (p_cert->pkCurveOID != ECC_SECP256R1_OID) {
  1343. WOLFSSL_MSG("MAXQ: key curve not supported");
  1344. return NOT_COMPILED_IN;
  1345. }
  1346. totalkeylen = keycomplen * 2;
  1347. #elif defined(WOLFSSL_MAXQ108X)
  1348. if (p_cert->keyOID == ECDSAk )
  1349. {
  1350. keyparam = maxq_curve_wolfssl_id2mxq_id(p_cert->pkCurveOID,
  1351. &keycomplen);
  1352. if (keyparam == MXQ_UNKNOWN_CURVE) {
  1353. WOLFSSL_MSG("MAXQ: key curve not supported");
  1354. return NOT_COMPILED_IN;
  1355. }
  1356. totalkeylen = keycomplen * 2;
  1357. }
  1358. else if (p_cert->keyOID == RSAk) {
  1359. pk_offset = calculate_modulus_offset(p_cert->source,
  1360. p_cert->publicKeyIndex+1);
  1361. keycomplen = ((p_cert->source[pk_offset-2] << 8) |
  1362. p_cert->source[pk_offset-1]);
  1363. /* Is there a more elegant way for checking pub key??? */
  1364. if (p_cert->publicKey[p_cert->pubKeySize-1] == 0x03 &&
  1365. p_cert->publicKey[p_cert->pubKeySize-2] == 0x01) {
  1366. keyparam = MXQ_KEYPARAM_RSA_PUB3;
  1367. }
  1368. else if (p_cert->publicKey[p_cert->pubKeySize-1] == 0x01 &&
  1369. p_cert->publicKey[p_cert->pubKeySize-2] == 0x00 &&
  1370. p_cert->publicKey[p_cert->pubKeySize-3] == 0x01 &&
  1371. p_cert->publicKey[p_cert->pubKeySize-4] == 0x03) {
  1372. keyparam = MXQ_KEYPARAM_RSA_PUB65537;
  1373. }
  1374. else {
  1375. WOLFSSL_MSG("MAXQ: RSA public key not supported");
  1376. return NOT_COMPILED_IN;
  1377. }
  1378. key_type = MXQ_KEYTYPE_RSA;
  1379. totalkeylen = keycomplen;
  1380. }
  1381. else {
  1382. WOLFSSL_MSG("MAXQ: key algo not supported");
  1383. return NOT_COMPILED_IN;
  1384. }
  1385. tls13_server_key_algo = p_cert->keyOID;
  1386. tls13_server_key_len = keycomplen;
  1387. sign_algo = mxq_get_sign_alg_from_sig_oid(p_cert->signatureOID);
  1388. if (sign_algo == ALGO_INVALID) {
  1389. WOLFSSL_MSG("MAXQ: signature algo not supported");
  1390. return NOT_COMPILED_IN;
  1391. }
  1392. #endif
  1393. rc = wolfSSL_CryptHwMutexLock();
  1394. if (rc != 0) {
  1395. return rc;
  1396. }
  1397. mxq_rc = MXQ_Build_EC_Cert(certdata, &certdatalen, key_type, keyparam,
  1398. keycomplen, totalkeylen, pk_offset,
  1399. p_cert->certBegin,
  1400. (p_cert->sigIndex - p_cert->certBegin),
  1401. p_cert->maxIdx, sign_algo, ROOT_CA_CERT_OBJ_ID,
  1402. MXQ_KEYUSE_VERIFY_KEY_CERT, ALGO_ECDSA_SHA_any,
  1403. MXQ_KEYUSE_DATASIGNATURE, ALGO_ECDSA_SHA_any,
  1404. (mxq_u1 *)p_cert->source);
  1405. if (mxq_rc) {
  1406. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Build_EC_Cert() failed");
  1407. wolfSSL_CryptHwMutexUnLock();
  1408. return WC_HW_E;
  1409. }
  1410. #if defined(WOLFSSL_MAXQ108X)
  1411. if (tls13_server_cert_id == -1) {
  1412. tls13_server_cert_id = alloc_temp_key_id();
  1413. if (tls13_server_cert_id == -1) {
  1414. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  1415. wolfSSL_CryptHwMutexUnLock();
  1416. return WC_HW_E;
  1417. }
  1418. }
  1419. /* temporary certificate stored in object id cert_id */
  1420. mxq_rc = MXQ_ImportChildCert(tls13_server_cert_id, certdata, certdatalen);
  1421. #else
  1422. /* temporary certificate stored in object id 0 */
  1423. mxq_rc = MXQ_ImportChildCert(0, certdata, certdatalen);
  1424. #endif
  1425. if (mxq_rc) {
  1426. WOLFSSL_ERROR_MSG("MAXQ: MXQ_ImportChildCert() failed");
  1427. wolfSSL_CryptHwMutexUnLock();
  1428. return WC_HW_E;
  1429. }
  1430. wolfSSL_CryptHwMutexUnLock();
  1431. return 0;
  1432. }
  1433. static int maxq10xx_process_server_sig_kex(WOLFSSL* ssl, byte p_sig_algo,
  1434. const byte* p_sig, word32 p_sig_len,
  1435. const byte* p_rand, word32 p_rand_len,
  1436. const byte* p_server_params, word32 p_server_params_len)
  1437. {
  1438. int rc;
  1439. mxq_err_t mxq_rc;
  1440. if (ssl->specs.kea != ecc_diffie_hellman_kea) {
  1441. WOLFSSL_MSG("MAXQ: key exchange algo not supported");
  1442. return NOT_COMPILED_IN;
  1443. }
  1444. if (ssl->ecdhCurveOID != ECC_SECP256R1_OID) {
  1445. WOLFSSL_MSG("MAXQ: key curve not supported");
  1446. return NOT_COMPILED_IN;
  1447. }
  1448. if (p_sig_algo != ecc_dsa_sa_algo) {
  1449. WOLFSSL_MSG("MAXQ: signature algo not supported");
  1450. return NOT_COMPILED_IN;
  1451. }
  1452. rc = wolfSSL_CryptHwMutexLock();
  1453. if (rc != 0) {
  1454. return rc;
  1455. }
  1456. /* NOTE: this function also does verification of the signature as well! */
  1457. mxq_rc = MXQ_SetECDHEKey(ALGO_ECDSA_SHA_256, MXQ_KEYPARAM_EC_P256R1, 0,
  1458. (mxq_u1 *)p_rand, p_rand_len,
  1459. (mxq_u1 *)p_server_params, p_server_params_len,
  1460. (mxq_u1 *)p_sig, p_sig_len);
  1461. if (mxq_rc) {
  1462. WOLFSSL_ERROR_MSG("MAXQ: MXQ_SetECDHEKey() failed");
  1463. wolfSSL_CryptHwMutexUnLock();
  1464. return WC_HW_E;
  1465. }
  1466. wolfSSL_CryptHwMutexUnLock();
  1467. return 0;
  1468. }
  1469. static int maxq10xx_gen_tls_master_secret(WOLFSSL* ssl, void *ctx)
  1470. {
  1471. int rc;
  1472. mxq_err_t mxq_rc;
  1473. mxq_secret_context_api_t secret_conf;
  1474. mxq_u1 tls_rand[SEED_LEN];
  1475. (void)ctx;
  1476. if ((ssl->specs.kea != ecc_diffie_hellman_kea) &&
  1477. (ssl->specs.kea != psk_kea)) {
  1478. WOLFSSL_MSG("MAXQ: key exchange algo not supported");
  1479. return NOT_COMPILED_IN;
  1480. }
  1481. if (ssl->specs.kea == ecc_diffie_hellman_kea) {
  1482. if ((ssl->hsKey == NULL ) ||
  1483. (((ecc_key*)ssl->hsKey)->maxq_ctx.hw_storage == 0)) {
  1484. return NOT_COMPILED_IN;
  1485. }
  1486. }
  1487. XMEMCPY(tls_rand, ssl->arrays->clientRandom, RAN_LEN);
  1488. XMEMCPY(&tls_rand[RAN_LEN], ssl->arrays->serverRandom, RAN_LEN);
  1489. XMEMSET(&secret_conf, 0 ,sizeof(secret_conf));
  1490. secret_conf.pass = 0;
  1491. secret_conf.CSID = ssl->options.cipherSuite |
  1492. (ssl->options.cipherSuite0 << 8);
  1493. secret_conf.Random = tls_rand;
  1494. secret_conf.Random_size = SEED_LEN;
  1495. secret_conf.is_session_key_secret = 1;
  1496. if (ssl->specs.kea == psk_kea) {
  1497. secret_conf.PSK_info.psk_id = PSK_OBJ_ID;
  1498. }
  1499. rc = wolfSSL_CryptHwMutexLock();
  1500. if (rc != 0) {
  1501. return rc;
  1502. }
  1503. mxq_rc = MXQ_Perform_Key_Exchange(&secret_conf);
  1504. if (mxq_rc) {
  1505. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Perform_Key_Exchange() failed");
  1506. wolfSSL_CryptHwMutexUnLock();
  1507. return WC_HW_E;
  1508. }
  1509. ssl->maxq_ctx.use_hw_keys = 1;
  1510. wolfSSL_CryptHwMutexUnLock();
  1511. #ifdef MAXQ_EXPORT_TLS_KEYS
  1512. rc = StoreKeys(ssl, secret_conf.PSK_info.psk_key_bloc,
  1513. PROVISION_CLIENT_SERVER);
  1514. if (rc != 0) {
  1515. WOLFSSL_ERROR_MSG("MAXQ: StoreKeys() failed");
  1516. return rc;
  1517. }
  1518. #endif
  1519. return 0;
  1520. }
  1521. static int maxq10xx_perform_client_finished(WOLFSSL* ssl, const byte* p_label,
  1522. const byte* p_seed, word32 seedSz, byte* p_dest, void* ctx)
  1523. {
  1524. int rc;
  1525. mxq_err_t mxq_rc;
  1526. (void)ssl;
  1527. (void)ctx;
  1528. rc = wolfSSL_CryptHwMutexLock();
  1529. if (rc != 0) {
  1530. return rc;
  1531. }
  1532. mxq_rc = MXQ_tls_prf_sha_256(0, p_label, FINISHED_LABEL_SZ,
  1533. p_seed, seedSz,
  1534. p_dest, TLS_FINISHED_SZ);
  1535. if (mxq_rc) {
  1536. WOLFSSL_ERROR_MSG("MAXQ: MXQ_tls_prf_sha_256() failed");
  1537. wolfSSL_CryptHwMutexUnLock();
  1538. return WC_HW_E;
  1539. }
  1540. wolfSSL_CryptHwMutexUnLock();
  1541. return 0;
  1542. }
  1543. static int maxq10xx_perform_tls12_record_processing(WOLFSSL* ssl,
  1544. int is_encrypt,
  1545. byte* out, const byte* in, word32 sz,
  1546. const byte* iv, word32 ivSz,
  1547. byte* authTag, word32 authTagSz,
  1548. const byte* authIn, word32 authInSz)
  1549. {
  1550. int rc;
  1551. mxq_err_t mxq_rc;
  1552. mxq_u2 key_id = (is_encrypt == 1) ? 1 : 0;
  1553. mxq_algo_id_t algo_id = 0;
  1554. if (! ssl->maxq_ctx.use_hw_keys) {
  1555. return NOT_COMPILED_IN;
  1556. }
  1557. if ((ssl->specs.bulk_cipher_algorithm != wolfssl_aes_gcm) &&
  1558. (ssl->specs.bulk_cipher_algorithm != wolfssl_aes_ccm)) {
  1559. WOLFSSL_MSG("MAXQ: tls record cipher algo not supported");
  1560. return NOT_COMPILED_IN;
  1561. }
  1562. if (ssl->specs.bulk_cipher_algorithm == wolfssl_aes_gcm) {
  1563. algo_id = ALGO_CIPHER_AES_GCM;
  1564. }
  1565. else if (ssl->specs.bulk_cipher_algorithm == wolfssl_aes_ccm) {
  1566. algo_id = ALGO_CIPHER_AES_CCM;
  1567. }
  1568. rc = wolfSSL_CryptHwMutexLock();
  1569. if (rc != 0) {
  1570. return rc;
  1571. }
  1572. mxq_rc = maxq10xx_cipher_do(algo_id, is_encrypt, key_id, (mxq_u1 *)in,
  1573. out, sz, (mxq_u1 *)iv, ivSz,
  1574. (mxq_u1 *)authIn, authInSz, authTag, authTagSz);
  1575. if (mxq_rc) {
  1576. WOLFSSL_ERROR_MSG("MAXQ: maxq10xx_cipher_do() failed");
  1577. wolfSSL_CryptHwMutexUnLock();
  1578. return WC_HW_E;
  1579. }
  1580. wolfSSL_CryptHwMutexUnLock();
  1581. return 0;
  1582. }
  1583. static int maxq10xx_read_device_cert_der(byte* p_dest_buff, word32* p_len)
  1584. {
  1585. int rc;
  1586. mxq_err_t mxq_rc;
  1587. word32 cert_size = 0;
  1588. #if defined(WOLFSSL_MAXQ108X)
  1589. DecodedCert decoded;
  1590. mxq_keyparam_id_t keyparam = MXQ_KEYPARAM_EC_P256R1;
  1591. int pk_offset = 0;
  1592. #endif
  1593. WOLFSSL_ENTER("maxq10xx_read_device_cert_der");
  1594. if (!p_dest_buff || !p_len) {
  1595. return BAD_FUNC_ARG;
  1596. }
  1597. if (*p_len < 1024) {
  1598. WOLFSSL_ERROR_MSG("MAXQ: insufficient buffer length");
  1599. return BAD_FUNC_ARG;
  1600. }
  1601. rc = wolfSSL_CryptHwMutexLock();
  1602. if (rc != 0) {
  1603. return rc;
  1604. }
  1605. mxq_rc = MXQ_ReadObject(DEVICE_CERT_OBJ_ID, 24, p_dest_buff, p_len);
  1606. if (mxq_rc) {
  1607. WOLFSSL_ERROR_MSG("MAXQ: MXQ_ReadObject() failed");
  1608. wolfSSL_CryptHwMutexUnLock();
  1609. return WC_HW_E;
  1610. }
  1611. wolfSSL_CryptHwMutexUnLock();
  1612. #if defined(WOLFSSL_MAXQ108X)
  1613. wc_InitDecodedCert(&decoded, p_dest_buff, *p_len, NULL);
  1614. wc_ParseCert(&decoded, CERT_TYPE, NO_VERIFY, NULL);
  1615. pk_offset = decoded.publicKeyIndex;
  1616. if (decoded.keyOID == ECDSAk ) {
  1617. keyparam = maxq_curve_wolfssl_id2mxq_id(decoded.pkCurveOID,
  1618. (unsigned int *)&device_key_len);
  1619. if (keyparam == MXQ_UNKNOWN_CURVE) {
  1620. WOLFSSL_MSG("MAXQ: key curve not supported");
  1621. return NOT_COMPILED_IN;
  1622. }
  1623. }
  1624. else if (decoded.keyOID == RSAk) {
  1625. pk_offset = calculate_modulus_offset(decoded.source,
  1626. decoded.publicKeyIndex+1);
  1627. device_key_len = ((decoded.source[pk_offset-2] << 8) |
  1628. decoded.source[pk_offset-1]);
  1629. }
  1630. #endif
  1631. cert_size = (p_dest_buff[2] << 8) + p_dest_buff[3] + 4;
  1632. if (*p_len < cert_size) {
  1633. return BUFFER_E;
  1634. }
  1635. *p_len = cert_size;
  1636. return 0;
  1637. }
  1638. #if defined(WOLFSSL_MAXQ10XX_TLS)
  1639. int wolfSSL_maxq10xx_load_certificate(WOLFSSL *ssl) {
  1640. DerBuffer* maxq_der = NULL;
  1641. int ret = 0;
  1642. ret = AllocDer(&maxq_der, FILE_BUFFER_SIZE, CERT_TYPE, ssl->heap);
  1643. if (ret != 0) {
  1644. return ret;
  1645. }
  1646. ret = maxq10xx_read_device_cert_der(maxq_der->buffer,
  1647. &maxq_der->length);
  1648. if (ret != 0) {
  1649. return ret;
  1650. }
  1651. ssl->maxq_ctx.device_cert = maxq_der;
  1652. if (ssl->buffers.weOwnCert) {
  1653. FreeDer(&ssl->buffers.certificate);
  1654. }
  1655. ssl->buffers.certificate = maxq_der;
  1656. ssl->buffers.weOwnCert = 1;
  1657. return WOLFSSL_SUCCESS;
  1658. }
  1659. #endif /* WOLFSSL_MAXQ10XX_TLS */
  1660. static int maxq10xx_ecc_sign(WOLFSSL* ssl,
  1661. const unsigned char* p_in, unsigned int p_in_len,
  1662. unsigned char* p_out, word32* p_out_len,
  1663. const unsigned char* keyDer, unsigned int keySz, void* ctx)
  1664. {
  1665. int rc;
  1666. (void)ssl;
  1667. (void)keyDer;
  1668. (void)keySz;
  1669. (void)ctx;
  1670. rc = wolfSSL_CryptHwMutexLock();
  1671. if (rc != 0) {
  1672. return rc;
  1673. }
  1674. rc = maxq10xx_ecc_sign_local(DEVICE_KEY_PAIR_OBJ_ID, (byte *)p_in, p_in_len,
  1675. p_out, p_out_len, device_key_len);
  1676. wolfSSL_CryptHwMutexUnLock();
  1677. if (rc) {
  1678. WOLFSSL_ERROR_MSG("MAXQ: maxq10xx_ecc_sign() failed");
  1679. return rc;
  1680. }
  1681. return 0;
  1682. }
  1683. #endif /* WOLFSSL_MAXQ10XX_TLS */
  1684. int maxq10xx_port_init(void)
  1685. {
  1686. int ret = 0;
  1687. mxq_err_t mxq_rc;
  1688. #ifdef WOLF_CRYPTO_CB
  1689. ret = wc_CryptoCb_RegisterDevice(0, wolfSSL_Soft_CryptoDevCb, NULL);
  1690. if (ret != 0) {
  1691. WOLFSSL_ERROR_MSG("MAXQ: wolfSSL_Soft_CryptoDevCb, "
  1692. "wc_CryptoCb_RegisterDevice() failed");
  1693. return ret;
  1694. }
  1695. #endif
  1696. ret = maxq_CryptHwMutexTryLock();
  1697. if (ret) {
  1698. WOLFSSL_ERROR_MSG("MAXQ: maxq10xx_port_init() -> device is busy "
  1699. "(switching to soft mode)");
  1700. return 0;
  1701. }
  1702. mxq_rc = MXQ_Module_Init();
  1703. if (mxq_rc) {
  1704. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Module_Init() failed");
  1705. ret = WC_HW_E;
  1706. }
  1707. wolfSSL_CryptHwMutexUnLock();
  1708. #if defined(WOLF_CRYPTO_CB)
  1709. if (ret == 0) {
  1710. ret = wc_CryptoCb_RegisterDevice(MAXQ_DEVICE_ID,
  1711. wolfSSL_MAXQ10XX_CryptoDevCb, NULL);
  1712. if (ret != 0) {
  1713. WOLFSSL_ERROR_MSG("MAXQ: wolfSSL_MAXQ10XX_CryptoDevCb, "
  1714. "wc_CryptoCb_RegisterDevice() failed");
  1715. }
  1716. }
  1717. #endif
  1718. return ret;
  1719. }
  1720. /* This basically does all the work that SendClientKeyExchange() does in the
  1721. * case of ECDSA. That's because if a callback is defined, almost nothing is
  1722. * done in SendClientKeyExchange(). */
  1723. static int maxq10xx_tls12_ecc_shared_secret(WOLFSSL* ssl, ecc_key* otherKey,
  1724. unsigned char* pubKeyDer, word32* pubKeySz,
  1725. unsigned char* out, word32* outlen,
  1726. int side, void* ctx)
  1727. {
  1728. int rc;
  1729. mxq_err_t mxq_rc;
  1730. ecc_key *p_key = NULL;
  1731. mxq_length key_len_param;
  1732. mxq_u1* server_public_key_param;
  1733. mxq_u2 csid_param = ssl->options.cipherSuite |
  1734. (ssl->options.cipherSuite0 << 8);
  1735. byte result_public_key[1 + (2 * ECC256_KEYSIZE)];
  1736. (void)ctx;
  1737. (void)otherKey;
  1738. (void)out;
  1739. (void)outlen;
  1740. (void)side;
  1741. WOLFSSL_ENTER("maxq10xx_ecc_shared_secret");
  1742. if (ssl->specs.kea != ecc_diffie_hellman_kea) {
  1743. WOLFSSL_MSG("MAXQ: key exchange algo not supported");
  1744. return NOT_COMPILED_IN;
  1745. }
  1746. if (ssl->ecdhCurveOID != ECC_SECP256R1_OID) {
  1747. WOLFSSL_MSG("MAXQ: key curve not supported");
  1748. return NOT_COMPILED_IN;
  1749. }
  1750. ssl->hsType = DYNAMIC_TYPE_ECC;
  1751. rc = AllocKey(ssl, ssl->hsType, &ssl->hsKey);
  1752. if (rc != 0) {
  1753. return rc;
  1754. }
  1755. p_key = (ecc_key*)ssl->hsKey;
  1756. rc = wolfSSL_CryptHwMutexLock();
  1757. if (rc != 0) {
  1758. return rc;
  1759. }
  1760. XMEMSET(result_public_key, 0, sizeof(result_public_key));
  1761. server_public_key_param = NULL;
  1762. key_len_param = sizeof(result_public_key);
  1763. mxq_rc = MXQ_Ecdh_Compute_Shared(MXQ_KEYPARAM_EC_P256R1,
  1764. server_public_key_param, result_public_key,
  1765. key_len_param, csid_param);
  1766. if (mxq_rc) {
  1767. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Ecdh_Compute_Shared() failed");
  1768. wolfSSL_CryptHwMutexUnLock();
  1769. return WC_HW_E;
  1770. }
  1771. wolfSSL_CryptHwMutexUnLock();
  1772. /* client public key */
  1773. p_key->state = 0;
  1774. rc = wc_ecc_set_curve(p_key, ECC256_KEYSIZE, ECC_SECP256R1);
  1775. if (rc != 0) {
  1776. WOLFSSL_ERROR_MSG("MAXQ: wc_ecc_set_curve() failed");
  1777. return rc;
  1778. }
  1779. p_key->flags = WC_ECC_FLAG_NONE;
  1780. p_key->type = ECC_PUBLICKEY;
  1781. rc = mp_read_unsigned_bin(p_key->pubkey.x, &result_public_key[1],
  1782. ECC256_KEYSIZE);
  1783. if (rc != 0) {
  1784. WOLFSSL_ERROR_MSG("MAXQ: mp_read_unsigned_bin() failed");
  1785. return rc;
  1786. }
  1787. rc = mp_read_unsigned_bin(p_key->pubkey.y,
  1788. &result_public_key[1 + ECC256_KEYSIZE],
  1789. ECC256_KEYSIZE);
  1790. if (rc != 0) {
  1791. WOLFSSL_ERROR_MSG("MAXQ: mp_read_unsigned_bin() failed");
  1792. return rc;
  1793. }
  1794. p_key->maxq_ctx.hw_storage = 1;
  1795. PRIVATE_KEY_UNLOCK();
  1796. rc = wc_ecc_export_x963(p_key, pubKeyDer, pubKeySz);
  1797. PRIVATE_KEY_LOCK();
  1798. return rc;
  1799. }
  1800. #ifdef WOLFSSL_MAXQ108X
  1801. static int wc_MAXQ10XX_HmacSetKey(int type)
  1802. {
  1803. mxq_algo_id_t algo;
  1804. int rc;
  1805. mxq_err_t mxq_rc;
  1806. if (!tls13active) {
  1807. return NOT_COMPILED_IN;
  1808. }
  1809. if (type == WC_SHA256) {
  1810. algo = ALGO_HMAC_SHA256;
  1811. }
  1812. else if (type == WC_SHA384) {
  1813. algo = ALGO_HMAC_SHA384;
  1814. }
  1815. else {
  1816. return NOT_COMPILED_IN;
  1817. }
  1818. if (tls13_server_finish_obj_id != -1) {
  1819. free_temp_key_id(*tls13_server_key_id);
  1820. *tls13_server_key_id = -1;
  1821. mac_key_obj_id = &tls13_server_finish_obj_id;
  1822. }
  1823. else if (tls13_client_finish_obj_id != -1) {
  1824. mac_key_obj_id = &tls13_client_finish_obj_id;
  1825. }
  1826. if (mac_key_obj_id == NULL) {
  1827. WOLFSSL_MSG("MAXQ: wc_MAXQ10XX_HmacSetKey No MAC Key is set");
  1828. return NOT_COMPILED_IN;
  1829. }
  1830. rc = wolfSSL_CryptHwMutexLock();
  1831. if (rc != 0) {
  1832. return rc;
  1833. }
  1834. mxq_rc = MXQ_MAC_Init(0x02, algo, *mac_key_obj_id, NULL, 0);
  1835. wolfSSL_CryptHwMutexUnLock();
  1836. if (mxq_rc == 0) {
  1837. mac_comp_active = 1;
  1838. }
  1839. else {
  1840. WOLFSSL_ERROR_MSG("MAXQ: MXQ_MAC_Init() failed");
  1841. rc = WC_HW_E;
  1842. }
  1843. return rc;
  1844. }
  1845. static int wc_MAXQ10XX_HmacUpdate(const byte* msg, word32 length)
  1846. {
  1847. int rc;
  1848. mxq_err_t mxq_rc;
  1849. if (!tls13active || !mac_comp_active) {
  1850. return NOT_COMPILED_IN;
  1851. }
  1852. rc = wolfSSL_CryptHwMutexLock();
  1853. if (rc != 0) {
  1854. return rc;
  1855. }
  1856. mxq_rc = MXQ_MAC_Update((unsigned char *)msg, length);
  1857. wolfSSL_CryptHwMutexUnLock();
  1858. if (mxq_rc) {
  1859. WOLFSSL_ERROR_MSG("MAXQ: MXQ_MAC_Update() failed");
  1860. rc = WC_HW_E;
  1861. }
  1862. return rc;
  1863. }
  1864. static int wc_MAXQ10XX_HmacFinal(byte* hash)
  1865. {
  1866. int rc;
  1867. mxq_err_t mxq_rc;
  1868. mxq_length maclen = 64;
  1869. if (!tls13active || !mac_comp_active) {
  1870. return NOT_COMPILED_IN;
  1871. }
  1872. rc = wolfSSL_CryptHwMutexLock();
  1873. if (rc != 0) {
  1874. return rc;
  1875. }
  1876. mxq_rc = MXQ_MAC_Finish(hash, &maclen);
  1877. wolfSSL_CryptHwMutexUnLock();
  1878. if (mxq_rc) {
  1879. WOLFSSL_ERROR_MSG("MAXQ: MXQ_MAC_Finish() failed");
  1880. rc = WC_HW_E;
  1881. }
  1882. free_temp_key_id(*mac_key_obj_id);
  1883. *mac_key_obj_id = -1;
  1884. mac_key_obj_id = NULL;
  1885. mac_comp_active = 0;
  1886. return rc;
  1887. }
  1888. static int maxq10xx_create_dh_key(byte* p, word32 pSz, byte* g, word32 gSz,
  1889. byte* pub, word32* pubSz)
  1890. {
  1891. int rc;
  1892. mxq_err_t mxq_rc;
  1893. WOLFSSL_ENTER("maxq10xx_create_dh_key");
  1894. if (!tls13active) {
  1895. return NOT_COMPILED_IN;
  1896. }
  1897. *pubSz = pSz;
  1898. if (tls13_dh_obj_id == -1) {
  1899. tls13_dh_obj_id = alloc_temp_key_id();
  1900. if (tls13_dh_obj_id == -1) {
  1901. WOLFSSL_MSG("MAXQ: alloc_temp_key_id() failed");
  1902. rc = NOT_COMPILED_IN;
  1903. return rc;
  1904. }
  1905. }
  1906. rc = wolfSSL_CryptHwMutexLock();
  1907. if (rc != 0) {
  1908. return rc;
  1909. }
  1910. mxq_rc = MXQ_TLS13_Generate_Key(pub, tls13_dh_obj_id, 0, MXQ_KEYPARAM_DHE,
  1911. pSz, p, gSz, g);
  1912. wolfSSL_CryptHwMutexUnLock();
  1913. if (mxq_rc) {
  1914. WOLFSSL_ERROR_MSG("MAXQ: MXQ_TLS13_Generate_Key() failed");
  1915. rc = WC_HW_E;
  1916. }
  1917. return rc;
  1918. }
  1919. static int maxq10xx_dh_gen_key_pair(DhKey* key, WC_RNG* rng,
  1920. byte* priv, word32* privSz,
  1921. byte* pub, word32* pubSz) {
  1922. word32 p_size, g_size;
  1923. unsigned char pbuf[256], gbuf[4];
  1924. (void)rng;
  1925. (void)priv;
  1926. (void)privSz;
  1927. p_size = mp_unsigned_bin_size(&key->p);
  1928. mp_to_unsigned_bin(&key->p, pbuf);
  1929. g_size = mp_unsigned_bin_size(&key->g);
  1930. mp_to_unsigned_bin(&key->g, gbuf);
  1931. return maxq10xx_create_dh_key(pbuf, p_size, gbuf, g_size, pub, pubSz);
  1932. }
  1933. static int maxq10xx_dh_agree(WOLFSSL* ssl, struct DhKey* key,
  1934. const unsigned char* priv, unsigned int privSz,
  1935. const unsigned char* pubKeyDer, unsigned int pubKeySz,
  1936. unsigned char* out, unsigned int* outlen,
  1937. void* ctx)
  1938. {
  1939. int rc;
  1940. mxq_err_t mxq_rc;
  1941. (void)ctx;
  1942. (void)key;
  1943. (void)priv;
  1944. (void)privSz;
  1945. WOLFSSL_ENTER("maxq10xx_dh_agree");
  1946. mxq_u2 csid_param = ssl->options.cipherSuite |
  1947. (ssl->options.cipherSuite0 << 8);
  1948. if (tls13_dh_obj_id == -1) {
  1949. WOLFSSL_ERROR_MSG("MAXQ: DH key is not created before");
  1950. rc = NOT_COMPILED_IN;
  1951. return rc;
  1952. }
  1953. if (tls13_shared_secret_obj_id == -1) {
  1954. tls13_shared_secret_obj_id = alloc_temp_key_id();
  1955. if (tls13_shared_secret_obj_id == -1) {
  1956. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  1957. return NOT_COMPILED_IN;
  1958. }
  1959. }
  1960. rc = wolfSSL_CryptHwMutexLock();
  1961. if (rc != 0) {
  1962. return rc;
  1963. }
  1964. mxq_rc = MXQ_TLS13_Create_Secret((unsigned char*)pubKeyDer, pubKeySz,
  1965. tls13_dh_obj_id, 0, MXQ_KEYPARAM_DHE,
  1966. csid_param, tls13_shared_secret_obj_id,
  1967. out, outlen);
  1968. wolfSSL_CryptHwMutexUnLock();
  1969. if (mxq_rc) {
  1970. WOLFSSL_ERROR_MSG("MAXQ: wolfSSL_CryptHwMutexUnLock() failed");
  1971. rc = WC_HW_E;
  1972. }
  1973. *outlen = pubKeySz;
  1974. free_temp_key_id(tls13_dh_obj_id);
  1975. tls13_dh_obj_id = -1;
  1976. free_temp_key_id(tls13_ecc_obj_id);
  1977. tls13_ecc_obj_id = -1;
  1978. return rc;
  1979. }
  1980. static int maxq10xx_ecc_key_gen(WOLFSSL* ssl, ecc_key* key, word32 keySz,
  1981. int ecc_curve, void* ctx)
  1982. {
  1983. int rc;
  1984. mxq_err_t mxq_rc;
  1985. unsigned char mxq_key[MAX_EC_KEY_SIZE];
  1986. (void)ctx;
  1987. (void)ssl;
  1988. WOLFSSL_ENTER("maxq10xx_ecc_key_gen");
  1989. if (tls13_ecc_obj_id == -1) {
  1990. tls13_ecc_obj_id = alloc_temp_key_id();
  1991. if (tls13_ecc_obj_id == -1) {
  1992. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  1993. rc = NOT_COMPILED_IN;
  1994. return rc;
  1995. }
  1996. }
  1997. rc = wolfSSL_CryptHwMutexLock();
  1998. if (rc != 0) {
  1999. return rc;
  2000. }
  2001. mxq_rc = MXQ_TLS13_Generate_Key(mxq_key, tls13_ecc_obj_id, MXQ_KEYTYPE_ECC,
  2002. getMaxqKeyParamFromCurve(key->dp->id),
  2003. keySz, NULL, 0, NULL);
  2004. wolfSSL_CryptHwMutexUnLock();
  2005. if (mxq_rc) {
  2006. WOLFSSL_ERROR_MSG("MAXQ: MXQ_TLS13_Generate_Key() failed");
  2007. return WC_HW_E;
  2008. }
  2009. rc = wc_ecc_import_unsigned(key, (byte*)mxq_key, (byte*)mxq_key + keySz,
  2010. NULL, ecc_curve);
  2011. if (rc) {
  2012. WOLFSSL_ERROR_MSG("MAXQ: wc_ecc_import_raw_ex() failed");
  2013. }
  2014. return rc;
  2015. }
  2016. static int maxq10xx_ecc_verify(WOLFSSL* ssl, const byte* sig,
  2017. word32 sigSz, const byte* hash,
  2018. word32 hashSz, const byte* key,
  2019. word32 keySz, int* result, void* ctx)
  2020. {
  2021. int rc;
  2022. (void)ssl;
  2023. (void)key;
  2024. (void)keySz;
  2025. (void)ctx;
  2026. WOLFSSL_ENTER("maxq10xx_ecc_verify");
  2027. if (!tls13active) {
  2028. return CRYPTOCB_UNAVAILABLE;
  2029. }
  2030. if (tls13_server_key_algo != ECDSAk) {
  2031. return CRYPTOCB_UNAVAILABLE;
  2032. }
  2033. rc = wolfSSL_CryptHwMutexLock();
  2034. if (rc != 0) {
  2035. return rc;
  2036. }
  2037. rc = maxq10xx_ecc_verify_local(tls13_server_cert_id, (mxq_u1*)hash, hashSz,
  2038. (mxq_u1*)sig, sigSz,
  2039. result, tls13_server_key_len);
  2040. wolfSSL_CryptHwMutexUnLock();
  2041. return rc;
  2042. }
  2043. static int maxq10xx_tls13_ecc_shared_secret(WOLFSSL* ssl, ecc_key* otherKey,
  2044. unsigned char* pubKeyDer, word32* pubKeySz,
  2045. unsigned char* out, word32* outlen,
  2046. int side, void* ctx)
  2047. {
  2048. int rc;
  2049. mxq_err_t mxq_rc;
  2050. word32 peerKeySz = otherKey->dp->size;
  2051. uint8_t peerKeyBuf[MAX_EC_KEY_SIZE];
  2052. uint8_t* peerKey = peerKeyBuf;
  2053. uint8_t* qx = peerKey;
  2054. uint8_t* qy = &peerKey[peerKeySz];
  2055. word32 qxLen = peerKeySz, qyLen = peerKeySz;
  2056. mxq_u2 csid_param = ssl->options.cipherSuite |
  2057. (ssl->options.cipherSuite0 << 8);
  2058. (void)ctx;
  2059. (void)pubKeyDer;
  2060. (void)side;
  2061. (void)pubKeySz;
  2062. WOLFSSL_ENTER("maxq10xx_ecc_shared_secret");
  2063. rc = wc_ecc_export_public_raw(otherKey, qx, &qxLen, qy, &qyLen);
  2064. if (tls13_ecc_obj_id == -1) {
  2065. WOLFSSL_ERROR_MSG("MAXQ: ECDHE key is not created before");
  2066. rc = NOT_COMPILED_IN;
  2067. return rc;
  2068. }
  2069. if (tls13_shared_secret_obj_id == -1) {
  2070. tls13_shared_secret_obj_id = alloc_temp_key_id();
  2071. if (tls13_shared_secret_obj_id == -1) {
  2072. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2073. return NOT_COMPILED_IN;
  2074. }
  2075. }
  2076. rc = wolfSSL_CryptHwMutexLock();
  2077. if (rc != 0) {
  2078. return rc;
  2079. }
  2080. mxq_rc = MXQ_TLS13_Create_Secret(peerKey, (2*peerKeySz), tls13_ecc_obj_id,
  2081. MXQ_KEYTYPE_ECC,
  2082. getMaxqKeyParamFromCurve(otherKey->dp->id),
  2083. csid_param, tls13_shared_secret_obj_id,
  2084. out, outlen);
  2085. wolfSSL_CryptHwMutexUnLock();
  2086. if (mxq_rc) {
  2087. WOLFSSL_ERROR_MSG("MAXQ: MXQ_TLS13_Create_Secret() failed");
  2088. rc = WC_HW_E;
  2089. }
  2090. *outlen = otherKey->dp->size;
  2091. free_temp_key_id(tls13_dh_obj_id);
  2092. tls13_dh_obj_id = -1;
  2093. free_temp_key_id(tls13_ecc_obj_id);
  2094. tls13_ecc_obj_id = -1;
  2095. return rc;
  2096. }
  2097. static int maxq10xx_rsa_pss_verify_ex(WOLFSSL* ssl,
  2098. byte* hashed_msg, word32 hashed_msg_sz,
  2099. byte* pss_sign, word32 pss_signlen,
  2100. int isCertId)
  2101. {
  2102. mxq_u2 pubkey_objectid;
  2103. int ret;
  2104. mxq_err_t mxq_rc;
  2105. (void)ssl;
  2106. WOLFSSL_ENTER("maxq10xx_rsa_pss_verify_ex");
  2107. if (!tls13active) {
  2108. return NOT_COMPILED_IN;
  2109. }
  2110. if (isCertId) {
  2111. pubkey_objectid = tls13_server_cert_id;
  2112. }
  2113. else {
  2114. pubkey_objectid = DEVICE_KEY_PAIR_OBJ_ID;
  2115. }
  2116. ret = wolfSSL_CryptHwMutexLock();
  2117. if (ret != 0) {
  2118. return ret;
  2119. }
  2120. mxq_rc = MXQ_Verify(ALGO_RSASSAPSSPKCS1_V2_1_PLAIN, pubkey_objectid,
  2121. hashed_msg, hashed_msg_sz, pss_sign, pss_signlen);
  2122. wolfSSL_CryptHwMutexUnLock();
  2123. if (mxq_rc) {
  2124. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Verify() failed");
  2125. ret = WC_HW_E;
  2126. }
  2127. return ret;
  2128. }
  2129. /* This will do all the work that is normally done in RsaVerify() and
  2130. * CheckRSASignature(). That is why at the bottom, we release the key. Because
  2131. * verification has been completed and CheckRSASignature() should be skipped.
  2132. * The same reasoning for maxq10xx_RsaSkipSignCheck() doing nothing. */
  2133. static int maxq10xx_rsa_pss_verify(WOLFSSL* ssl,
  2134. unsigned char* in, unsigned int inSz,
  2135. unsigned char** out, int hash, int mgf,
  2136. const unsigned char* key, unsigned int keySz,
  2137. void* ctx) {
  2138. int ret = 0;
  2139. byte sigData[MAX_SIG_DATA_SZ];
  2140. word16 sigDataSz;
  2141. word32 sigSz;
  2142. (void)out;
  2143. (void)mgf;
  2144. (void)key;
  2145. (void)keySz;
  2146. (void)ctx;
  2147. if (hash == SHA256h) {
  2148. hash = sha256_mac;
  2149. }
  2150. else if (hash == SHA384h) {
  2151. hash = sha384_mac;
  2152. }
  2153. else if (hash == SHA512h) {
  2154. hash = sha512_mac;
  2155. }
  2156. else {
  2157. return BAD_FUNC_ARG;
  2158. }
  2159. ret = CreateSigData(ssl, sigData, &sigDataSz, 1);
  2160. if (ret != 0)
  2161. return ret;
  2162. /* PSS signature can be done in-place */
  2163. ret = CreateRSAEncodedSig(sigData, sigData, sigDataSz,
  2164. rsa_pss_sa_algo, hash);
  2165. if (ret < 0)
  2166. return ret;
  2167. sigSz = ret;
  2168. ret = maxq10xx_rsa_pss_verify_ex(ssl, sigData, sigSz, in, inSz, 1);
  2169. if (ret == 0) {
  2170. /* This ensures call to CheckRSASignature() is skipped. */
  2171. ssl->peerRsaKeyPresent = 0;
  2172. FreeKey(ssl, DYNAMIC_TYPE_RSA, (void**)&ssl->peerRsaKey);
  2173. ssl->options.peerAuthGood = 1;
  2174. }
  2175. return ret;
  2176. }
  2177. static int maxq10xx_skip_sign_check(WOLFSSL* ssl,
  2178. unsigned char* sig, unsigned int sigSz,
  2179. unsigned char** out, int hash, int mgf,
  2180. const unsigned char* key, unsigned int keySz,
  2181. void* ctx) {
  2182. (void)ssl;
  2183. (void)sig;
  2184. (void)sigSz;
  2185. (void)out;
  2186. (void)hash;
  2187. (void)mgf;
  2188. (void)key;
  2189. (void)keySz;
  2190. (void)ctx;
  2191. return 0;
  2192. }
  2193. static int maxq10xx_rsa_pss_sign(WOLFSSL* ssl, const byte* in, word32 inSz,
  2194. byte* out, word32* outSz, int hash, int mgf,
  2195. const byte* key, word32 keySz, void* ctx)
  2196. {
  2197. int ret;
  2198. mxq_err_t mxq_rc;
  2199. (void)ssl;
  2200. (void)hash;
  2201. (void)mgf;
  2202. (void)key;
  2203. (void)keySz;
  2204. (void)ctx;
  2205. WOLFSSL_ENTER("maxq10xx_rsa_pss_sign");
  2206. if (!tls13active) {
  2207. return NOT_COMPILED_IN;
  2208. }
  2209. ret = wolfSSL_CryptHwMutexLock();
  2210. if (ret != 0) {
  2211. return ret;
  2212. }
  2213. mxq_rc = MXQ_Sign(ALGO_RSASSAPSSPKCS1_V2_1_PLAIN, DEVICE_KEY_PAIR_OBJ_ID,
  2214. in, inSz, out, outSz);
  2215. wolfSSL_CryptHwMutexUnLock();
  2216. if (mxq_rc) {
  2217. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Sign() failed");
  2218. return WC_HW_E;
  2219. }
  2220. ret = wolfSSL_CryptHwMutexLock();
  2221. if (ret != 0) {
  2222. return ret;
  2223. }
  2224. mxq_rc = MXQ_Verify(ALGO_RSASSAPSSPKCS1_V2_1_PLAIN, DEVICE_KEY_PAIR_OBJ_ID,
  2225. in, inSz, out, *outSz);
  2226. wolfSSL_CryptHwMutexUnLock();
  2227. if (mxq_rc) {
  2228. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Verify() failed");
  2229. return WC_HW_E;
  2230. }
  2231. return ret;
  2232. }
  2233. #ifdef HAVE_HKDF
  2234. static int maxq10xx_hkdf_extract(byte* prk, const byte* salt, word32 saltLen,
  2235. byte* ikm, word32 ikmLen, int digest, void* ctx)
  2236. {
  2237. int rc;
  2238. mxq_err_t mxq_rc;
  2239. mxq_length prk_len = 0;
  2240. mxq_algo_id_t mxq_digest_id = ALGO_INVALID;
  2241. int salt_kid = -1, ikm_kid = -1, ret_kid = -1;
  2242. (void)ctx;
  2243. switch (digest) {
  2244. #ifndef NO_SHA256
  2245. case WC_SHA256:
  2246. prk_len = WC_SHA256_DIGEST_SIZE;
  2247. mxq_digest_id = ALGO_MD_SHA256;
  2248. break;
  2249. #endif
  2250. #ifdef WOLFSSL_SHA384
  2251. case WC_SHA384:
  2252. prk_len = WC_SHA384_DIGEST_SIZE;
  2253. mxq_digest_id = ALGO_MD_SHA384;
  2254. break;
  2255. #endif
  2256. #ifdef WOLFSSL_TLS13_SHA512
  2257. case WC_SHA512:
  2258. prk_len = WC_SHA512_DIGEST_SIZE;
  2259. mxq_digest_id = ALGO_MD_SHA512;
  2260. break;
  2261. #endif
  2262. default:
  2263. return BAD_FUNC_ARG;
  2264. }
  2265. /* Prepare key id parameters */
  2266. if (saltLen != 0 && ikmLen != 0) {
  2267. /* handshake_secret = HKDF-Extract(salt: derived_secret,
  2268. * key: shared_secret) */
  2269. if (tls13_handshake_secret_obj_id == -1) {
  2270. tls13_handshake_secret_obj_id = alloc_temp_key_id();
  2271. if (tls13_handshake_secret_obj_id == -1) {
  2272. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2273. return NOT_COMPILED_IN;
  2274. }
  2275. }
  2276. salt_kid = tls13_derived_secret_obj_id;
  2277. ikm_kid = tls13_shared_secret_obj_id;
  2278. ret_kid = tls13_handshake_secret_obj_id;
  2279. free_temp_key_id(tls13_derived_secret_obj_id);
  2280. tls13_derived_secret_obj_id = -1;
  2281. }
  2282. else if (saltLen != 0 && ikmLen == 0) {
  2283. /* master_secret = HKDF-Extract(salt: derived_secret,
  2284. * key: 00...) */
  2285. if (tls13_master_secret_obj_id == -1) {
  2286. tls13_master_secret_obj_id = alloc_temp_key_id();
  2287. if (tls13_master_secret_obj_id == -1) {
  2288. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2289. return NOT_COMPILED_IN;
  2290. }
  2291. }
  2292. salt_kid = tls13_derived_secret_obj_id;
  2293. ikm_kid = -1;
  2294. ret_kid = tls13_master_secret_obj_id;
  2295. free_temp_key_id(tls13_derived_secret_obj_id);
  2296. tls13_derived_secret_obj_id = -1;
  2297. }
  2298. else if (saltLen == 0 && ikmLen == 0) {
  2299. /* early_secret = HKDF-Extract(salt: 00, key: 00...) */
  2300. if (tls13_early_secret_obj_id == -1) {
  2301. tls13_early_secret_obj_id = alloc_temp_key_id();
  2302. if (tls13_early_secret_obj_id == -1) {
  2303. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2304. return NOT_COMPILED_IN;
  2305. }
  2306. }
  2307. salt_kid = -1;
  2308. ikm_kid = -1;
  2309. ret_kid = tls13_early_secret_obj_id;
  2310. tls13early = 1;
  2311. }
  2312. else if (saltLen == 0 && ikmLen != 0) {
  2313. /* early_secret = HKDF-Extract(salt: 00, key: 00...) */
  2314. if (tls13_hs_early_secret_obj_id == -1) {
  2315. tls13_hs_early_secret_obj_id = alloc_temp_key_id();
  2316. if (tls13_hs_early_secret_obj_id == -1) {
  2317. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2318. return NOT_COMPILED_IN;
  2319. }
  2320. }
  2321. salt_kid = -1;
  2322. ikm_kid = PSK_KID;
  2323. ret_kid = tls13_hs_early_secret_obj_id;
  2324. tls13early = 1;
  2325. }
  2326. else {
  2327. WOLFSSL_MSG("MAXQ: MXQ_TLS13_Extract_Secret() does not support");
  2328. return NOT_COMPILED_IN;
  2329. }
  2330. /* When length is 0 then use zeroed data of digest length. */
  2331. if (ikmLen == 0) {
  2332. ikmLen = prk_len;
  2333. XMEMSET(ikm, 0, prk_len);
  2334. }
  2335. if (salt_kid != -1) {
  2336. saltLen = 0;
  2337. }
  2338. if (ikm_kid != -1) {
  2339. ikmLen = 0;
  2340. }
  2341. if (ret_kid != -1) {
  2342. XMEMSET(prk, 0, prk_len);
  2343. prk_len = 0;
  2344. }
  2345. rc = wolfSSL_CryptHwMutexLock();
  2346. if (rc != 0) {
  2347. return rc;
  2348. }
  2349. mxq_rc = MXQ_TLS13_Extract_Secret(mxq_digest_id, (mxq_u2)ret_kid,
  2350. prk, &prk_len, (mxq_u2)salt_kid,
  2351. salt, (mxq_u2)saltLen,
  2352. (mxq_u2)ikm_kid, ikm, (mxq_u2)ikmLen);
  2353. if (mxq_rc) {
  2354. WOLFSSL_ERROR_MSG("MAXQ: MXQ_TLS13_Extract_Secret() failed");
  2355. wolfSSL_CryptHwMutexUnLock();
  2356. return WC_HW_E;
  2357. }
  2358. wolfSSL_CryptHwMutexUnLock();
  2359. return 0;
  2360. }
  2361. static char *strstr_with_size(char *str, const char *substr, size_t n)
  2362. {
  2363. char *p = str, *pEnd = str + n;
  2364. size_t substr_len = XSTRLEN(substr);
  2365. if (substr_len == 0) {
  2366. return str;
  2367. }
  2368. pEnd -= (substr_len - 1);
  2369. for (;p < pEnd; ++p) {
  2370. if (0 == XSTRNCMP(p, substr, substr_len))
  2371. return p;
  2372. }
  2373. return NULL;
  2374. }
  2375. static int maxq10xx_HkdfExpand(int digest, const byte* inKey, word32 inKeySz,
  2376. const byte* info, word32 infoSz, byte* out,
  2377. word32 outSz, int side)
  2378. {
  2379. int rc;
  2380. mxq_err_t mxq_rc;
  2381. mxq_algo_id_t mxq_digest_id = ALGO_INVALID;
  2382. mxq_keytype_id_t ret_keytype = MXQ_KEYTYPE_IKM;
  2383. int prk_kid = -1, ret_kid = -1;
  2384. int ret_isiv = 0;
  2385. switch (digest) {
  2386. #ifndef NO_SHA256
  2387. case WC_SHA256:
  2388. mxq_digest_id = ALGO_MD_SHA256;
  2389. break;
  2390. #endif
  2391. #ifdef WOLFSSL_SHA384
  2392. case WC_SHA384:
  2393. mxq_digest_id = ALGO_MD_SHA384;
  2394. break;
  2395. #endif
  2396. #ifdef WOLFSSL_TLS13_SHA512
  2397. case WC_SHA512:
  2398. mxq_digest_id = ALGO_MD_SHA512;
  2399. break;
  2400. #endif
  2401. default:
  2402. return BAD_FUNC_ARG;
  2403. }
  2404. /* Prepare key id parameters */
  2405. if (strstr_with_size((char *)info, derivedLabel, infoSz) != NULL) {
  2406. if (tls13early) {
  2407. if (local_is_psk) {
  2408. if (tls13_hs_early_secret_obj_id == -1) {
  2409. WOLFSSL_ERROR_MSG("MAXQ: Handshake early secret is not "
  2410. "created yet");
  2411. return NOT_COMPILED_IN;
  2412. }
  2413. tls13_derived_secret_obj_id = alloc_temp_key_id();
  2414. if (tls13_derived_secret_obj_id == -1) {
  2415. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2416. return NOT_COMPILED_IN;
  2417. }
  2418. prk_kid = tls13_hs_early_secret_obj_id;
  2419. ret_kid = tls13_derived_secret_obj_id;
  2420. ret_keytype = MXQ_KEYTYPE_IKM;
  2421. free_temp_key_id(tls13_hs_early_secret_obj_id);
  2422. tls13_hs_early_secret_obj_id = -1;
  2423. }
  2424. else {
  2425. /* derived_secret = HKDF-Expand-Label(key: early_secret,
  2426. * label: "derived", ctx: empty_hash) */
  2427. tls13_derived_secret_obj_id = alloc_temp_key_id();
  2428. if (tls13_derived_secret_obj_id == -1) {
  2429. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2430. return NOT_COMPILED_IN;
  2431. }
  2432. prk_kid = tls13_early_secret_obj_id;
  2433. ret_kid = tls13_derived_secret_obj_id;
  2434. ret_keytype = MXQ_KEYTYPE_IKM;
  2435. free_temp_key_id(tls13_early_secret_obj_id);
  2436. tls13_early_secret_obj_id = -1;
  2437. }
  2438. ret_isiv = 0;
  2439. tls13early = 0;
  2440. }
  2441. else {
  2442. /* derived_secret = HKDF-Expand-Label(key: handshake_secret,
  2443. * label: "derived", ctx: empty_hash) */
  2444. tls13_derived_secret_obj_id = alloc_temp_key_id();
  2445. if (tls13_derived_secret_obj_id == -1) {
  2446. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2447. return NOT_COMPILED_IN;
  2448. }
  2449. prk_kid = tls13_handshake_secret_obj_id;
  2450. ret_kid = tls13_derived_secret_obj_id;
  2451. ret_keytype = MXQ_KEYTYPE_IKM;
  2452. free_temp_key_id(tls13_handshake_secret_obj_id);
  2453. tls13_handshake_secret_obj_id = -1;
  2454. ret_isiv = 0;
  2455. }
  2456. }
  2457. else if (strstr_with_size((char *)info, cHsTrafficLabel, infoSz)
  2458. != NULL) {
  2459. is_hs_key = 1;
  2460. /* client_secret = HKDF-Expand-Label(key: handshake_secret,
  2461. * label: "c hs traffic", ctx: hello_hash) */
  2462. if (tls13_client_secret_obj_id == -1) {
  2463. tls13_client_secret_obj_id = alloc_temp_key_id();
  2464. if (tls13_client_secret_obj_id == -1) {
  2465. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2466. return NOT_COMPILED_IN;
  2467. }
  2468. }
  2469. prk_kid = tls13_handshake_secret_obj_id;
  2470. ret_kid = tls13_client_secret_obj_id;
  2471. ret_keytype = MXQ_KEYTYPE_IKM;
  2472. ret_isiv = 0;
  2473. }
  2474. else if (strstr_with_size((char *)info, sHsTrafficLabel, infoSz)
  2475. != NULL) {
  2476. /* client_secret = HKDF-Expand-Label(key: handshake_secret,
  2477. * label: "s hs traffic", ctx: hello_hash) */
  2478. if (tls13_server_secret_obj_id == -1) {
  2479. tls13_server_secret_obj_id = alloc_temp_key_id();
  2480. if (tls13_server_secret_obj_id == -1) {
  2481. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2482. return NOT_COMPILED_IN;
  2483. }
  2484. }
  2485. prk_kid = tls13_handshake_secret_obj_id;
  2486. ret_kid = tls13_server_secret_obj_id;
  2487. ret_keytype = MXQ_KEYTYPE_IKM;
  2488. ret_isiv = 0;
  2489. }
  2490. else if (strstr_with_size((char *)info, cAppTrafficLabel, infoSz)
  2491. != NULL) {
  2492. is_hs_key = 0;
  2493. /* client_secret = HKDF-Expand-Label(key: master_secret,
  2494. * label: "c ap traffic", ctx: handshake_hash) */
  2495. if (tls13_client_secret_obj_id == -1) {
  2496. tls13_client_secret_obj_id = alloc_temp_key_id();
  2497. if (tls13_client_secret_obj_id == -1) {
  2498. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2499. return NOT_COMPILED_IN;
  2500. }
  2501. }
  2502. prk_kid = tls13_master_secret_obj_id;
  2503. ret_kid = tls13_client_secret_obj_id;
  2504. ret_keytype = MXQ_KEYTYPE_IKM;
  2505. ret_isiv = 0;
  2506. }
  2507. else if (strstr_with_size((char *)info, sAppTrafficLabel, infoSz)
  2508. != NULL) {
  2509. /* server_secret = HKDF-Expand-Label(key: master_secret,
  2510. * label: "s ap traffic", ctx: handshake_hash) */
  2511. tls13_server_secret_obj_id = alloc_temp_key_id();
  2512. if (tls13_server_secret_obj_id == -1) {
  2513. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2514. return NOT_COMPILED_IN;
  2515. }
  2516. prk_kid = tls13_master_secret_obj_id;
  2517. ret_kid = tls13_server_secret_obj_id;
  2518. ret_keytype = MXQ_KEYTYPE_IKM;
  2519. ret_isiv = 0;
  2520. }
  2521. else if (strstr_with_size((char *)info, keyLabel, infoSz) != NULL) {
  2522. /* first client key then server */
  2523. if (side == WOLFSSL_CLIENT_END) {
  2524. /* client_handshake_key = HKDF-Expand-Label(key: client_secret,
  2525. * label: "key", ctx: "")
  2526. * client_application_key = HKDF-Expand-Label(key: client_secret,
  2527. * label: "key", ctx: "") */
  2528. int tls13_client_key_obj_id = -1;
  2529. if (is_hs_key) {
  2530. if (tls13_client_hs_key_obj_id == -1) {
  2531. tls13_client_hs_key_obj_id = alloc_temp_key_id();
  2532. if (tls13_client_hs_key_obj_id == -1) {
  2533. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2534. return NOT_COMPILED_IN;
  2535. }
  2536. }
  2537. tls13_client_key_obj_id = tls13_client_hs_key_obj_id;
  2538. }
  2539. else {
  2540. if (tls13_client_app_key_obj_id == -1) {
  2541. tls13_client_app_key_obj_id = alloc_temp_key_id();
  2542. if (tls13_client_app_key_obj_id == -1) {
  2543. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2544. return NOT_COMPILED_IN;
  2545. }
  2546. }
  2547. tls13_client_key_obj_id = tls13_client_app_key_obj_id;
  2548. }
  2549. prk_kid = tls13_client_secret_obj_id;
  2550. ret_kid = tls13_client_key_obj_id;
  2551. ret_keytype = MXQ_KEYTYPE_AES;
  2552. ret_isiv = 0;
  2553. }
  2554. else {
  2555. /* server_handshake_key = HKDF-Expand-Label(key: server_secret,
  2556. * label: "key", ctx: "")
  2557. * server_application_key = HKDF-Expand-Label(key: server_secret,
  2558. label: "key", ctx: "") */
  2559. int tls13_server_key_obj_id = -1;
  2560. if (is_hs_key) {
  2561. if (tls13_server_hs_key_obj_id == -1) {
  2562. tls13_server_hs_key_obj_id = alloc_temp_key_id();
  2563. if (tls13_server_hs_key_obj_id == -1) {
  2564. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2565. return NOT_COMPILED_IN;
  2566. }
  2567. }
  2568. tls13_server_key_obj_id = tls13_server_hs_key_obj_id;
  2569. }
  2570. else {
  2571. if (tls13_server_app_key_obj_id == -1) {
  2572. tls13_server_app_key_obj_id = alloc_temp_key_id();
  2573. if (tls13_server_app_key_obj_id == -1) {
  2574. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2575. return NOT_COMPILED_IN;
  2576. }
  2577. }
  2578. tls13_server_key_obj_id = tls13_server_app_key_obj_id;
  2579. }
  2580. prk_kid = tls13_server_secret_obj_id;
  2581. ret_kid = tls13_server_key_obj_id;
  2582. ret_keytype = MXQ_KEYTYPE_AES;
  2583. ret_isiv = 0;
  2584. }
  2585. }
  2586. else if (strstr_with_size((char *)info, ivLabel, infoSz) != NULL) {
  2587. /* first client key then server */
  2588. if (side == WOLFSSL_CLIENT_END) {
  2589. /* client_handshake_iv = HKDF-Expand-Label(key: client_secret,
  2590. * label: "iv", ctx: "")
  2591. * cient_application_iv = HKDF-Expand-Label(key: client_secret,
  2592. * label: "iv", ctx: "") */
  2593. int tls13_client_iv_obj_id = -1;
  2594. if (is_hs_key) {
  2595. if (tls13_client_hs_key_obj_id == -1) {
  2596. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2597. return NOT_COMPILED_IN;
  2598. }
  2599. tls13_client_iv_obj_id = tls13_client_hs_key_obj_id;
  2600. }
  2601. else {
  2602. if (tls13_client_app_key_obj_id == -1) {
  2603. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2604. return NOT_COMPILED_IN;
  2605. }
  2606. tls13_client_iv_obj_id = tls13_client_app_key_obj_id;
  2607. }
  2608. prk_kid = tls13_client_secret_obj_id;
  2609. ret_kid = tls13_client_iv_obj_id;
  2610. ret_keytype = MXQ_KEYTYPE_AES;
  2611. ret_isiv = 1;
  2612. }
  2613. else {
  2614. /* server_handshake_iv = HKDF-Expand-Label(key: server_secret,
  2615. * label: "iv", ctx: "")
  2616. * server_application_iv = HKDF-Expand-Label(key: server_secret,
  2617. * label: "iv", ctx: "") */
  2618. int tls13_server_iv_obj_id = -1;
  2619. if (is_hs_key) {
  2620. if (tls13_server_hs_key_obj_id == -1) {
  2621. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2622. return NOT_COMPILED_IN;
  2623. }
  2624. tls13_server_iv_obj_id = tls13_server_hs_key_obj_id;
  2625. }
  2626. else {
  2627. if (tls13_server_app_key_obj_id == -1) {
  2628. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2629. return NOT_COMPILED_IN;
  2630. }
  2631. tls13_server_iv_obj_id = tls13_server_app_key_obj_id;
  2632. }
  2633. prk_kid = tls13_server_secret_obj_id;
  2634. ret_kid = tls13_server_iv_obj_id;
  2635. ret_keytype = MXQ_KEYTYPE_AES;
  2636. ret_isiv = 1;
  2637. local_is_psk = 0;
  2638. }
  2639. }
  2640. else if (strstr_with_size((char *)info, finishedLabel, infoSz) != NULL) {
  2641. if (local_is_psk) {
  2642. if (tls13_client_finish_obj_id == -1) {
  2643. tls13_client_finish_obj_id = alloc_temp_key_id();
  2644. if (tls13_client_finish_obj_id == -1) {
  2645. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2646. return NOT_COMPILED_IN;
  2647. }
  2648. }
  2649. if (tls13_binder_key_obj_id == -1) {
  2650. WOLFSSL_ERROR_MSG("MAXQ: Binder key is not created yet");
  2651. return NOT_COMPILED_IN;
  2652. }
  2653. prk_kid = tls13_binder_key_obj_id;
  2654. ret_kid = tls13_client_finish_obj_id;
  2655. tls13_client_key_id = &tls13_binder_key_obj_id;
  2656. ret_keytype = MXQ_KEYTYPE_HMAC;
  2657. ret_isiv = 0;
  2658. }
  2659. else {
  2660. /* first client key then server */
  2661. if (side == WOLFSSL_CLIENT_END) {
  2662. /* finished_key = HKDF-Expand-Label(key: client_secret,
  2663. * label: "finished", ctx: "") */
  2664. if (is_hs_key) {
  2665. tls13_client_key_id = &tls13_client_hs_key_obj_id;
  2666. }
  2667. else {
  2668. tls13_client_key_id = &tls13_client_app_key_obj_id;
  2669. }
  2670. if (tls13_client_finish_obj_id == -1) {
  2671. tls13_client_finish_obj_id = alloc_temp_key_id();
  2672. if (tls13_client_finish_obj_id == -1) {
  2673. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2674. return NOT_COMPILED_IN;
  2675. }
  2676. }
  2677. prk_kid = tls13_client_secret_obj_id;
  2678. ret_kid = tls13_client_finish_obj_id;
  2679. ret_keytype = MXQ_KEYTYPE_HMAC;
  2680. ret_isiv = 0;
  2681. free_temp_key_id(tls13_client_secret_obj_id);
  2682. tls13_client_secret_obj_id = -1;
  2683. }
  2684. else {
  2685. /* finished_key = HKDF-Expand-Label(key: server_secret,
  2686. * label: "finished", ctx: "") */
  2687. if (is_hs_key) {
  2688. tls13_server_key_id = &tls13_server_hs_key_obj_id;
  2689. }
  2690. else {
  2691. tls13_server_key_id = &tls13_server_app_key_obj_id;
  2692. }
  2693. if (tls13_server_finish_obj_id == -1) {
  2694. tls13_server_finish_obj_id = alloc_temp_key_id();
  2695. if (tls13_server_finish_obj_id == -1) {
  2696. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2697. return NOT_COMPILED_IN;
  2698. }
  2699. }
  2700. prk_kid = tls13_server_secret_obj_id;
  2701. ret_kid = tls13_server_finish_obj_id;
  2702. ret_keytype = MXQ_KEYTYPE_HMAC;
  2703. ret_isiv = 0;
  2704. free_temp_key_id(tls13_server_secret_obj_id);
  2705. tls13_server_secret_obj_id = -1;
  2706. }
  2707. }
  2708. }
  2709. else if (strstr_with_size((char *)info, extBinderLabel, infoSz) != NULL) {
  2710. /* binder_key = HKDF-Expand-Label(key: hs_early_secret,
  2711. * label: "ext binder", ctx: empty_hash) */
  2712. tls13_binder_key_obj_id = alloc_temp_key_id();
  2713. if (tls13_binder_key_obj_id == -1) {
  2714. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2715. return NOT_COMPILED_IN;
  2716. }
  2717. prk_kid = tls13_hs_early_secret_obj_id;
  2718. ret_kid = tls13_binder_key_obj_id;
  2719. ret_keytype = MXQ_KEYTYPE_IKM;
  2720. ret_isiv = 0;
  2721. local_is_psk = 1;
  2722. }
  2723. else if (strstr_with_size((char *)info, resMasterLabel, infoSz) != NULL) {
  2724. /* TODO: */
  2725. tls13_res_master_obj_id = alloc_temp_key_id();
  2726. if (tls13_res_master_obj_id == -1) {
  2727. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2728. return NOT_COMPILED_IN;
  2729. }
  2730. prk_kid = tls13_master_secret_obj_id;
  2731. ret_kid = tls13_res_master_obj_id;
  2732. ret_keytype = MXQ_KEYTYPE_IKM;
  2733. ret_isiv = 0;
  2734. free_temp_key_id(*tls13_client_key_id);
  2735. *tls13_client_key_id = -1;
  2736. }
  2737. else if (strstr_with_size((char *)info, appTrafUpdLabel, infoSz) != NULL) {
  2738. if (side == WOLFSSL_CLIENT_END) {
  2739. /* updated_client_secret = HKDF-Expand-Label(key: client_secret,
  2740. * label: "traffic upd", ctx: "") */
  2741. if (tls13_client_app_key_obj_id == -1) {
  2742. WOLFSSL_ERROR_MSG("MAXQ: Client Application Key was not set");
  2743. return NOT_COMPILED_IN;
  2744. }
  2745. prk_kid = tls13_client_secret_obj_id;
  2746. ret_kid = tls13_client_secret_obj_id;
  2747. ret_keytype = MXQ_KEYTYPE_IKM;
  2748. ret_isiv = 0;
  2749. }
  2750. else {
  2751. /* updated_server_secret = HKDF-Expand-Label(key: server_secret,
  2752. * label: "traffic upd", ctx: "") */
  2753. if (tls13_server_app_key_obj_id == -1) {
  2754. WOLFSSL_ERROR_MSG("MAXQ: Client Application Key was not set");
  2755. return NOT_COMPILED_IN;
  2756. }
  2757. prk_kid = tls13_server_secret_obj_id;
  2758. ret_kid = tls13_server_secret_obj_id;
  2759. ret_keytype = MXQ_KEYTYPE_IKM;
  2760. ret_isiv = 0;
  2761. }
  2762. }
  2763. else {
  2764. WOLFSSL_ERROR_MSG("MAXQ: MXQ_TLS13_Expand_Secret() does not support");
  2765. return NOT_COMPILED_IN;
  2766. }
  2767. if (prk_kid != -1) {
  2768. inKeySz = 0;
  2769. }
  2770. if (ret_kid != -1) {
  2771. XMEMSET(out, 0, outSz);
  2772. }
  2773. rc = wolfSSL_CryptHwMutexLock();
  2774. if (rc != 0) {
  2775. return rc;
  2776. }
  2777. mxq_rc = MXQ_TLS13_Expand_Secret(mxq_digest_id, (mxq_u2)ret_kid,
  2778. ret_keytype, ret_isiv, out, &outSz,
  2779. (mxq_u2)prk_kid, inKey, inKeySz,
  2780. info, infoSz );
  2781. if (mxq_rc) {
  2782. WOLFSSL_ERROR_MSG("MAXQ: MXQ_TLS13_Expand_Secret() failed");
  2783. wolfSSL_CryptHwMutexUnLock();
  2784. return WC_HW_E;
  2785. }
  2786. wolfSSL_CryptHwMutexUnLock();
  2787. return 0;
  2788. }
  2789. static int maxq10xx_hkdf_expand_label(byte* okm, word32 okmLen,
  2790. const byte* prk, word32 prkLen,
  2791. const byte* protocol, word32 protocolLen,
  2792. const byte* label, word32 labelLen,
  2793. const byte* info, word32 infoLen,
  2794. int digest, int side)
  2795. {
  2796. int ret = 0;
  2797. int idx = 0;
  2798. byte data[MAX_TLS13_HKDF_LABEL_SZ];
  2799. /* Output length. */
  2800. data[idx++] = (byte)(okmLen >> 8);
  2801. data[idx++] = (byte)okmLen;
  2802. /* Length of protocol | label. */
  2803. data[idx++] = (byte)(protocolLen + labelLen);
  2804. /* Protocol */
  2805. XMEMCPY(&data[idx], protocol, protocolLen);
  2806. idx += protocolLen;
  2807. /* Label */
  2808. XMEMCPY(&data[idx], label, labelLen);
  2809. idx += labelLen;
  2810. /* Length of hash of messages */
  2811. data[idx++] = (byte)infoLen;
  2812. /* Hash of messages */
  2813. XMEMCPY(&data[idx], info, infoLen);
  2814. idx += infoLen;
  2815. #ifdef WOLFSSL_CHECK_MEM_ZERO
  2816. wc_MemZero_Add("wc_Tls13_HKDF_Expand_Label data", data, idx);
  2817. #endif
  2818. ret = maxq10xx_HkdfExpand(digest, prk, prkLen, data, idx, okm, okmLen,
  2819. side);
  2820. ForceZero(data, idx);
  2821. #ifdef WOLFSSL_CHECK_MEM_ZERO
  2822. wc_MemZero_Check(data, MAX_TLS13_HKDF_LABEL_SZ);
  2823. #endif
  2824. return ret;
  2825. }
  2826. static int maxq10xx_perform_tls13_record_processing(WOLFSSL* ssl,
  2827. int is_encrypt, byte* out, const byte* in,
  2828. word32 sz, const byte* iv, word32 ivSz,
  2829. byte* authTag, word32 authTagSz,
  2830. const byte* authIn, word32 authInSz)
  2831. {
  2832. int rc;
  2833. mxq_err_t mxq_rc;
  2834. mxq_u2 key_id;
  2835. if (!tls13active) {
  2836. return NOT_COMPILED_IN;
  2837. }
  2838. if ((ssl->specs.bulk_cipher_algorithm != wolfssl_aes_gcm) &&
  2839. (ssl->specs.bulk_cipher_algorithm != wolfssl_aes_ccm)) {
  2840. WOLFSSL_MSG("MAXQ: tls record cipher algo not supported");
  2841. return NOT_COMPILED_IN;
  2842. }
  2843. if (is_encrypt) {
  2844. if (tls13_client_hs_key_obj_id != -1) {
  2845. key_id = tls13_client_hs_key_obj_id;
  2846. }
  2847. else if (tls13_client_app_key_obj_id != -1) {
  2848. key_id = tls13_client_app_key_obj_id;
  2849. }
  2850. else {
  2851. WOLFSSL_ERROR_MSG("MAXQ: tls record enc key was not selected");
  2852. }
  2853. }
  2854. else {
  2855. if (tls13_server_hs_key_obj_id != -1) {
  2856. key_id = tls13_server_hs_key_obj_id;
  2857. }
  2858. else if (tls13_server_app_key_obj_id != -1) {
  2859. key_id = tls13_server_app_key_obj_id;
  2860. }
  2861. else {
  2862. WOLFSSL_ERROR_MSG("MAXQ: tls record dec key was not selected");
  2863. }
  2864. }
  2865. mxq_algo_id_t algo_id = 0;
  2866. if (ssl->specs.bulk_cipher_algorithm == wolfssl_aes_gcm) {
  2867. algo_id = ALGO_CIPHER_AES_GCM;
  2868. }
  2869. else if (ssl->specs.bulk_cipher_algorithm == wolfssl_aes_ccm) {
  2870. algo_id = ALGO_CIPHER_AES_CCM;
  2871. }
  2872. rc = wolfSSL_CryptHwMutexLock();
  2873. if (rc != 0) {
  2874. return rc;
  2875. }
  2876. WOLFSSL_MSG("MAXQ: MXQ_TLS13_Update_IV");
  2877. mxq_rc = MXQ_TLS13_Update_IV( key_id, (mxq_u1 *)iv, ivSz);
  2878. if (mxq_rc) {
  2879. WOLFSSL_ERROR_MSG("MAXQ: MXQ_TLS13_Update_IV() failed");
  2880. wolfSSL_CryptHwMutexUnLock();
  2881. return WC_HW_E;
  2882. }
  2883. mxq_rc = maxq10xx_cipher_do(algo_id, is_encrypt, key_id, (mxq_u1 *)in, out,
  2884. sz, (mxq_u1 *)iv, ivSz, (mxq_u1 *)authIn,
  2885. authInSz, authTag, authTagSz);
  2886. if (mxq_rc) {
  2887. WOLFSSL_ERROR_MSG("MAXQ: maxq10xx_cipher_do() failed");
  2888. wolfSSL_CryptHwMutexUnLock();
  2889. return WC_HW_E;
  2890. }
  2891. wolfSSL_CryptHwMutexUnLock();
  2892. return 0;
  2893. }
  2894. #endif /* HAVE_HKDF */
  2895. #endif /* WOLFSSL_MAXQ108X */
  2896. void maxq10xx_SetupPkCallbacks(struct WOLFSSL_CTX* ctx, ProtocolVersion *pv)
  2897. {
  2898. (void)pv;
  2899. if (pv == NULL) {
  2900. return;
  2901. }
  2902. WOLFSSL_ENTER("maxq10xx_SetupPkCallbacks");
  2903. if (init_pk_callbacks) {
  2904. return;
  2905. }
  2906. #ifdef WOLFSSL_MAXQ108X
  2907. #ifdef HAVE_HKDF
  2908. wolfSSL_CTX_SetHKDFExtractCb(ctx, maxq10xx_hkdf_extract);
  2909. wolfSSL_CTX_SetHKDFExpandLabelCb(ctx, maxq10xx_hkdf_expand_label);
  2910. #endif
  2911. if ((pv->major == SSLv3_MAJOR) && (pv->minor == WOLFSSL_TLSV1_3)) {
  2912. tls13active = 1;
  2913. wolfSSL_CTX_SetEccKeyGenCb(ctx, maxq10xx_ecc_key_gen);
  2914. wolfSSL_CTX_SetEccSharedSecretCb(ctx, maxq10xx_tls13_ecc_shared_secret);
  2915. wolfSSL_CTX_SetEccVerifyCb(ctx, maxq10xx_ecc_verify);
  2916. wolfSSL_CTX_SetDhGenerateKeyPair(ctx, maxq10xx_dh_gen_key_pair);
  2917. wolfSSL_CTX_SetDhAgreeCb(ctx, maxq10xx_dh_agree);
  2918. wolfSSL_CTX_SetRsaPssSignCb(ctx, maxq10xx_rsa_pss_sign);
  2919. wolfSSL_CTX_SetRsaPssSignCheckCb(ctx, maxq10xx_skip_sign_check);
  2920. wolfSSL_CTX_SetRsaPssVerifyCb(ctx, maxq10xx_rsa_pss_verify);
  2921. wolfSSL_CTX_SetPerformTlsRecordProcessingCb(ctx,
  2922. maxq10xx_perform_tls13_record_processing);
  2923. }
  2924. else
  2925. #endif /* WOLFSSL_MAXQ108X */
  2926. {
  2927. wolfSSL_CTX_SetEccSharedSecretCb(ctx, maxq10xx_tls12_ecc_shared_secret);
  2928. wolfSSL_CTX_SetPerformTlsRecordProcessingCb(ctx,
  2929. maxq10xx_perform_tls12_record_processing);
  2930. }
  2931. wolfSSL_CTX_SetProcessPeerCertCb(ctx, maxq10xx_process_server_certificate);
  2932. wolfSSL_CTX_SetProcessServerSigKexCb(ctx, maxq10xx_process_server_sig_kex);
  2933. wolfSSL_CTX_SetGenMasterSecretCb(ctx, maxq10xx_gen_tls_master_secret);
  2934. wolfSSL_CTX_SetTlsFinishedCb(ctx, maxq10xx_perform_client_finished);
  2935. wolfSSL_CTX_SetEccSignCb(ctx, maxq10xx_ecc_sign);
  2936. init_pk_callbacks = 1;
  2937. }
  2938. #endif /* WOLFSSL_MAXQ1065 || WOLFSSL_MAXQ108X */