maxq10xx.c 101 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408
  1. /* maxq10xx.c
  2. *
  3. * Copyright (C) 2006-2023 wolfSSL Inc.
  4. *
  5. * This file is part of wolfSSL.
  6. *
  7. * wolfSSL is free software; you can redistribute it and/or modify
  8. * it under the terms of the GNU General Public License as published by
  9. * the Free Software Foundation; either version 2 of the License, or
  10. * (at your option) any later version.
  11. *
  12. * wolfSSL is distributed in the hope that it will be useful,
  13. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  15. * GNU General Public License for more details.
  16. *
  17. * You should have received a copy of the GNU General Public License
  18. * along with this program; if not, write to the Free Software
  19. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
  20. */
  21. #ifdef HAVE_CONFIG_H
  22. #include <config.h>
  23. #endif
  24. #include <wolfssl/wolfcrypt/settings.h>
  25. #if defined(WOLFSSL_MAXQ1065) || defined(WOLFSSL_MAXQ108X)
  26. #include <wolfssl/wolfcrypt/port/maxim/maxq10xx.h>
  27. #ifdef NO_INLINE
  28. #include <wolfssl/wolfcrypt/misc.h>
  29. #else
  30. #define WOLFSSL_MISC_INCLUDED
  31. #include <wolfcrypt/src/misc.c>
  32. #endif
  33. #include <stdint.h>
  34. #include <wolfssl/internal.h>
  35. #include <wolfssl/wolfcrypt/cryptocb.h>
  36. #include <wolfssl/wolfcrypt/error-crypt.h>
  37. #include <wolfssl/wolfcrypt/logging.h>
  38. #include <wolfssl/wolfcrypt/port/maxim/MXQ_API.h>
  39. #ifdef MAXQ_DEBUG
  40. void dbg_dumphex(const char *identifier, const uint8_t* pdata, uint32_t plen);
  41. #else
  42. #define dbg_dumphex(identifier, pdata, plen)
  43. #endif /* MAXQ_DEBUG */
  44. #if defined(USE_WINDOWS_API)
  45. # define maxq_CryptHwMutexTryLock() (0)
  46. #endif
  47. #define AES_KEY_ID_START (0x2000)
  48. #define AES_KEY_ID_MAX_NUM (32)
  49. #define ECC_KEY_ID_START (AES_KEY_ID_START + AES_KEY_ID_MAX_NUM)
  50. #define ECC_KEY_ID_MAX_NUM (32)
  51. #define TEMP_KEY_ID_START (0)
  52. #if defined(WOLFSSL_MAXQ108X)
  53. #define TEMP_KEY_ID_MAX_NUM (16)
  54. #else
  55. #define TEMP_KEY_ID_MAX_NUM (2)
  56. #endif
  57. #define PUBKEY_IMPORT_OBJID 0x1000
  58. #define ROOT_CA_CERT_OBJ_ID 0x1003
  59. #define DEVICE_CERT_OBJ_ID 0x1002
  60. #define DEVICE_KEY_PAIR_OBJ_ID 0x1004
  61. #define PSK_OBJ_ID 0x1236
  62. #define K_CHUNKSIZE 2032
  63. #define K_CIPHER_BLOCKSIZE 16
  64. #define ECC256_KEYSIZE 32
  65. #define MAX_HASH_CHUNKSIZE 2000
  66. #define MAX_CERT_DATASIZE 2048
  67. #define MAX_KEY_DATASIZE 256
  68. #define MAX_SIGNKEY_DATASIZE 96
  69. #define MAX_SIG_DATASIZE 64
  70. #define ECC_KEYCOMPLEN 32
  71. #ifdef WOLFSSL_MAXQ108X
  72. #define PSK_KID (0x1235)
  73. static unsigned char tls13active = 0;
  74. static unsigned char tls13early = 0;
  75. static int tls13_dh_obj_id = -1;
  76. static int tls13_ecc_obj_id = -1;
  77. static int tls13_hs_early_secret_obj_id = -1;
  78. static int tls13_binder_key_obj_id = -1;
  79. static int tls13_shared_secret_obj_id = -1;
  80. static int tls13_early_secret_obj_id = -1;
  81. static int tls13_derived_secret_obj_id = -1;
  82. static int tls13_handshake_secret_obj_id = -1;
  83. static int tls13_master_secret_obj_id = -1;
  84. static int tls13_client_secret_obj_id = -1;
  85. static int tls13_server_secret_obj_id = -1;
  86. static int tls13_client_hs_key_obj_id = -1;
  87. static int tls13_server_hs_key_obj_id = -1;
  88. static int tls13_client_app_key_obj_id = -1;
  89. static int tls13_server_app_key_obj_id = -1;
  90. static int tls13_server_finish_obj_id = -1;
  91. static int tls13_client_finish_obj_id = -1;
  92. static int *tls13_server_key_id = NULL;
  93. static int *tls13_client_key_id = NULL;
  94. static int tls13_res_master_obj_id = -1;
  95. static int tls13_server_cert_id = -1;
  96. static int tls13_server_key_algo = -1;
  97. static int tls13_server_key_len = -1;
  98. #endif /* WOLFSSL_MAXQ108X */
  99. /* Please define MAXQ10XX_PRODUCTION_KEY in your build scripts once you have a
  100. * production key. */
  101. #if defined(MAXQ10XX_PRODUCTION_KEY) || !defined(DEBUG_WOLFSSL)
  102. #include "maxq10xx_key.h"
  103. #else
  104. /* TEST KEY. This must be changed for production environments!! */
  105. static const mxq_u1 KeyPairImport[] = {
  106. 0xd0,0x97,0x31,0xc7,0x63,0xc0,0x9e,0xe3,0x9a,0xb4,0xd0,0xce,0xa7,0x89,0xab,
  107. 0x52,0xc8,0x80,0x3a,0x91,0x77,0x29,0xc3,0xa0,0x79,0x2e,0xe6,0x61,0x8b,0x2d,
  108. 0x53,0x70,0xcc,0xa4,0x62,0xd5,0x4a,0x47,0x74,0xea,0x22,0xfa,0xa9,0xd4,0x95,
  109. 0x4e,0xca,0x32,0x70,0x88,0xd6,0xeb,0x58,0x24,0xa3,0xc5,0xbf,0x29,0xdc,0xfd,
  110. 0xe5,0xde,0x8f,0x48,0x19,0xe8,0xc6,0x4f,0xf2,0x46,0x10,0xe2,0x58,0xb9,0xb6,
  111. 0x72,0x5e,0x88,0xaf,0xc2,0xee,0x8b,0x6f,0xe5,0x36,0xe3,0x60,0x7c,0xf8,0x2c,
  112. 0xea,0x3a,0x4f,0xe3,0x6d,0x73
  113. };
  114. #endif /* MAXQ10XX_PRODUCTION_KEY || !DEBUG_WOLFSSL */
  115. #if defined(WOLFSSL_MAXQ108X) && defined(HAVE_HKDF)
  116. /* These are from Section 7.1 of the TLS 1.3 specification (RFC 8446). */
  117. static const char derivedLabel[] = "derived";
  118. static const char cHsTrafficLabel[] = "c hs traffic";
  119. static const char sHsTrafficLabel[] = "s hs traffic";
  120. static const char cAppTrafficLabel[] = "c ap traffic";
  121. static const char sAppTrafficLabel[] = "s ap traffic";
  122. static const char appTrafUpdLabel[] = "traffic upd";
  123. static const char keyLabel[] = "key";
  124. static const char ivLabel[] = "iv";
  125. static const char finishedLabel[] = "finished";
  126. static const char resMasterLabel[] = "res master";
  127. static const char extBinderLabel[] = "ext binder";
  128. static int local_is_psk = 0;
  129. static int is_hs_key = 0;
  130. #endif /* WOLFSSL_MAXQ108X && HAVE_HKDF */
  131. static int aes_key_id_arr[AES_KEY_ID_MAX_NUM];
  132. static int ecc_key_id_arr[ECC_KEY_ID_MAX_NUM];
  133. static int init_pk_callbacks = 0;
  134. static int device_key_len = 32;
  135. #if defined(WOLFSSL_MAXQ108X)
  136. static int temp_key_id_arr[TEMP_KEY_ID_MAX_NUM] = {0};
  137. static int *mac_key_obj_id = NULL;
  138. static int mac_comp_active = 0;
  139. #endif /* WOLFSSL_MAXQ108X */
  140. #ifdef WOLFSSL_MAXQ10XX_CRYPTO
  141. /*
  142. * Helper Functions
  143. */
  144. static int crypto_sha256(const uint8_t *buf, uint32_t len, uint8_t *hash,
  145. uint32_t hashSz, uint32_t blkSz)
  146. {
  147. int ret;
  148. uint32_t i = 0, chunk;
  149. wc_Sha256 sha256;
  150. /* validate arguments */
  151. if ((buf == NULL && len > 0) || hash == NULL ||
  152. hashSz < WC_SHA256_DIGEST_SIZE || blkSz == 0) {
  153. return BAD_FUNC_ARG;
  154. }
  155. /* Init Sha256 structure */
  156. ret = wc_InitSha256(&sha256);
  157. if (ret != 0) {
  158. return ret;
  159. }
  160. sha256.maxq_ctx.soft_hash = 1;
  161. while (i < len) {
  162. chunk = blkSz;
  163. if ((chunk + i) > len) {
  164. chunk = len - i;
  165. }
  166. /* Perform chunked update */
  167. ret = wc_Sha256Update(&sha256, (buf + i), chunk);
  168. if (ret != 0) {
  169. break;
  170. }
  171. i += chunk;
  172. }
  173. if (ret == 0) {
  174. /* Get final digest result */
  175. ret = wc_Sha256Final(&sha256, hash);
  176. }
  177. return ret;
  178. }
  179. static int crypto_ecc_sign(const uint8_t *key, uint32_t keySz,
  180. const uint8_t *hash, uint32_t hashSz, uint8_t *sig, uint32_t* sigSz,
  181. uint32_t curveSz, int curveId, WC_RNG* rng)
  182. {
  183. int ret;
  184. mp_int r, s;
  185. ecc_key ecc;
  186. /* validate arguments */
  187. if (key == NULL || hash == NULL || sig == NULL || sigSz == NULL ||
  188. curveSz == 0 || hashSz == 0 || keySz < curveSz ||
  189. *sigSz < (curveSz * 2)) {
  190. return BAD_FUNC_ARG;
  191. }
  192. /* Initialize signature result */
  193. XMEMSET(sig, 0, curveSz * 2);
  194. /* Setup the ECC key */
  195. ret = wc_ecc_init(&ecc);
  196. if (ret < 0) {
  197. return ret;
  198. }
  199. ecc.maxq_ctx.hw_ecc = -1;
  200. /* Setup the signature r/s variables */
  201. ret = mp_init(&r);
  202. if (ret != MP_OKAY) {
  203. wc_ecc_free(&ecc);
  204. return ret;
  205. }
  206. ret = mp_init(&s);
  207. if (ret != MP_OKAY) {
  208. mp_clear(&r);
  209. wc_ecc_free(&ecc);
  210. return ret;
  211. }
  212. /* Import private key "k" */
  213. ret = wc_ecc_import_private_key_ex(key, keySz, /* private key "d" */
  214. NULL, 0, /* public (optional) */
  215. &ecc, curveId);
  216. if (ret == 0) {
  217. ret = wc_ecc_sign_hash_ex(hash, hashSz, /* computed hash digest */
  218. rng, &ecc, /* random and key context */
  219. &r, &s);
  220. }
  221. if (ret == 0) {
  222. /* export r/s */
  223. mp_to_unsigned_bin_len(&r, sig, curveSz);
  224. mp_to_unsigned_bin_len(&s, sig + curveSz, curveSz);
  225. }
  226. mp_clear(&r);
  227. mp_clear(&s);
  228. wc_ecc_free(&ecc);
  229. return ret;
  230. }
  231. #ifdef MAXQ_DEBUG
  232. void dbg_dumphex(const char *identifier, const uint8_t* pdata, uint32_t plen)
  233. {
  234. uint32_t i;
  235. printf("%s\n", identifier);
  236. for (i = 0; i < plen; ++i) {
  237. if ((i > 0) && !(i % 16)) {
  238. printf("\n");
  239. }
  240. printf("%02X ", pdata[i]);
  241. }
  242. printf("\n");
  243. }
  244. #endif /* MAXQ_DEBUG */
  245. /*
  246. * Personalized Utility Functions
  247. */
  248. static void LoadDefaultImportKey(unsigned char* key, int* keylen,
  249. int* curve, int* type)
  250. {
  251. *curve = MXQ_KEYPARAM_EC_P256R1;
  252. *type = MXQ_KEYTYPE_ECC;
  253. *keylen = 32;
  254. XMEMCPY(key, KeyPairImport, sizeof(KeyPairImport));
  255. }
  256. static int getSignAlgoFromCurve(int c)
  257. {
  258. switch(c) {
  259. case MXQ_KEYPARAM_EC_P256R1: return ALGO_ECDSA_SHA_256;
  260. case MXQ_KEYPARAM_EC_P384R1: return ALGO_ECDSA_SHA_384;
  261. case MXQ_KEYPARAM_EC_P521R1: return ALGO_ECDSA_SHA_512;
  262. #ifdef HAVE_ECC_BRAINPOOL
  263. case MXQ_KEYPARAM_EC_BP256R1: return ALGO_ECDSA_SHA_256;
  264. case MXQ_KEYPARAM_EC_BP384R1: return ALGO_ECDSA_SHA_384;
  265. case MXQ_KEYPARAM_EC_BP512R1: return ALGO_ECDSA_SHA_512;
  266. #endif
  267. }
  268. return BAD_FUNC_ARG;
  269. }
  270. #ifdef WOLFSSL_MAXQ108X
  271. static int wc_MAXQ10XX_HmacSetKey(int type);
  272. static int wc_MAXQ10XX_HmacUpdate(const byte* msg, word32 length);
  273. static int wc_MAXQ10XX_HmacFinal(byte* hash);
  274. static int getMaxqKeyParamFromCurve(int c)
  275. {
  276. switch(c) {
  277. case ECC_SECP256R1: return MXQ_KEYPARAM_EC_P256R1;
  278. case ECC_SECP384R1: return MXQ_KEYPARAM_EC_P384R1;
  279. case ECC_SECP521R1: return MXQ_KEYPARAM_EC_P521R1;
  280. case ECC_BRAINPOOLP256R1: return MXQ_KEYPARAM_EC_BP256R1;
  281. case ECC_BRAINPOOLP384R1: return MXQ_KEYPARAM_EC_BP384R1;
  282. case ECC_BRAINPOOLP512R1: return MXQ_KEYPARAM_EC_BP512R1;
  283. }
  284. return BAD_FUNC_ARG;
  285. }
  286. #endif /* WOLFSSL_MAXQ108X */
  287. static int ECDSA_sign(mxq_u1* dest, int* signlen, mxq_u1* key,
  288. mxq_u1* data, mxq_length data_length, int curve)
  289. {
  290. int ret;
  291. int hashlen = WC_SHA256_DIGEST_SIZE;
  292. unsigned char hash[WC_SHA256_DIGEST_SIZE];
  293. WC_RNG rng;
  294. int algo = 0;
  295. int wc_curve_id = ECC_SECP256R1;
  296. int wc_curve_size = 32;
  297. uint32_t sigSz = 0;
  298. if (curve != MXQ_KEYPARAM_EC_P256R1) {
  299. return BAD_FUNC_ARG;
  300. }
  301. algo = getSignAlgoFromCurve(curve);
  302. if (algo != ALGO_ECDSA_SHA_256) {
  303. return BAD_FUNC_ARG;
  304. }
  305. sigSz = (2 * wc_curve_size);
  306. if (*signlen < (int)sigSz) {
  307. return BAD_FUNC_ARG;
  308. }
  309. ret = wc_InitRng(&rng);
  310. if (ret != 0) {
  311. return ret;
  312. }
  313. ret = crypto_sha256(data, data_length, /* input message */
  314. hash, hashlen, /* hash digest result */
  315. 32 /* configurable block/chunk size */
  316. );
  317. if (ret == 0) {
  318. ret = crypto_ecc_sign(
  319. (key + (2 * wc_curve_size)), wc_curve_size, /* private key */
  320. hash, hashlen, /* computed hash digest */
  321. dest, &sigSz, /* signature r/s */
  322. wc_curve_size, /* curve size in bytes */
  323. wc_curve_id, /* curve id */
  324. &rng);
  325. *signlen = sigSz;
  326. }
  327. wc_FreeRng(&rng);
  328. return ret;
  329. }
  330. #ifdef MAXQ_AESGCM
  331. static int alloc_aes_key_id(void)
  332. {
  333. int i;
  334. for (i = 0; i < AES_KEY_ID_MAX_NUM; ++i) {
  335. if (aes_key_id_arr[i] == 0) {
  336. aes_key_id_arr[i] = AES_KEY_ID_START + i;
  337. break;
  338. }
  339. }
  340. if (i == AES_KEY_ID_MAX_NUM) {
  341. return 0;
  342. }
  343. else {
  344. return aes_key_id_arr[i];
  345. }
  346. }
  347. #endif /* MAXQ_AESGCM */
  348. static void free_aes_key_id(int obj_id)
  349. {
  350. int idx_for_arr = obj_id - AES_KEY_ID_START;
  351. if ((idx_for_arr >= 0) && (idx_for_arr < AES_KEY_ID_MAX_NUM)) {
  352. aes_key_id_arr[idx_for_arr] = 0;
  353. }
  354. }
  355. #ifdef MAXQ_ECC
  356. static int alloc_ecc_key_id(void)
  357. {
  358. int i;
  359. for (i = 0; i < ECC_KEY_ID_MAX_NUM; ++i) {
  360. if (ecc_key_id_arr[i] == 0) {
  361. ecc_key_id_arr[i] = ECC_KEY_ID_START + i;
  362. break;
  363. }
  364. }
  365. if (i == ECC_KEY_ID_MAX_NUM) {
  366. return 0;
  367. }
  368. else {
  369. return ecc_key_id_arr[i];
  370. }
  371. }
  372. #endif /* MAXQ_ECC */
  373. static void free_ecc_key_id(int obj_id)
  374. {
  375. int idx_for_arr = obj_id - ECC_KEY_ID_START;
  376. if ((idx_for_arr >= 0) && (idx_for_arr < ECC_KEY_ID_MAX_NUM)) {
  377. ecc_key_id_arr[idx_for_arr] = 0;
  378. }
  379. }
  380. #ifdef WOLFSSL_MAXQ108X
  381. static int alloc_temp_key_id(void)
  382. {
  383. int i;
  384. for (i = 0; i < TEMP_KEY_ID_MAX_NUM; ++i) {
  385. if (temp_key_id_arr[i] == 0) {
  386. temp_key_id_arr[i] = 1;
  387. break;
  388. }
  389. }
  390. if (i == TEMP_KEY_ID_MAX_NUM) {
  391. return -1;
  392. }
  393. else {
  394. return i;
  395. }
  396. }
  397. static void free_temp_key_id(int obj_id)
  398. {
  399. int idx_for_arr = obj_id - TEMP_KEY_ID_START;
  400. if (idx_for_arr >=0 && idx_for_arr < TEMP_KEY_ID_MAX_NUM) {
  401. temp_key_id_arr[idx_for_arr] = 0;
  402. }
  403. }
  404. #endif /* WOLFSSL_MAXQ108X */
  405. /*
  406. * WolfCrypt Functions
  407. */
  408. int wc_MAXQ10XX_AesSetKey(Aes* aes, const byte* userKey, word32 keylen)
  409. {
  410. XMEMCPY(aes->maxq_ctx.key, userKey, keylen);
  411. aes->maxq_ctx.key_pending = 1;
  412. return 0;
  413. }
  414. int wc_MAXQ10XX_EccSetKey(ecc_key* key, word32 keysize)
  415. {
  416. int err = 0;
  417. int keytype = key->type;
  418. word32 bufflen = 0;
  419. if (key->maxq_ctx.hw_ecc == -1) {
  420. err = WC_HW_E;
  421. }
  422. if (err == 0) {
  423. if (key->dp->id != ECC_SECP256R1) {
  424. err = ECC_CURVE_OID_E;
  425. }
  426. }
  427. if (err == 0) {
  428. if ((keytype != ECC_PUBLICKEY) && (keytype != ECC_PRIVATEKEY) &&
  429. (keytype != ECC_PRIVATEKEY_ONLY)) {
  430. err = BAD_FUNC_ARG;
  431. }
  432. }
  433. if (err == 0) {
  434. bufflen = keysize;
  435. if ((keytype == ECC_PUBLICKEY) || (keytype == ECC_PRIVATEKEY)) {
  436. err = wc_export_int(key->pubkey.x, key->maxq_ctx.ecc_key,
  437. &bufflen, keysize, WC_TYPE_UNSIGNED_BIN);
  438. }
  439. }
  440. if (err == 0) {
  441. if ((keytype == ECC_PUBLICKEY) || (keytype == ECC_PRIVATEKEY)) {
  442. err = wc_export_int(key->pubkey.y, key->maxq_ctx.ecc_key + keysize,
  443. &bufflen, keysize, WC_TYPE_UNSIGNED_BIN);
  444. }
  445. }
  446. if (err == 0) {
  447. if ((keytype == ECC_PRIVATEKEY) || (keytype == ECC_PRIVATEKEY_ONLY)) {
  448. err = wc_export_int(&key->k, key->maxq_ctx.ecc_key + (2 * keysize),
  449. &bufflen, keysize, WC_TYPE_UNSIGNED_BIN);
  450. }
  451. }
  452. if (err == 0) {
  453. key->maxq_ctx.hw_ecc = 1;
  454. key->maxq_ctx.key_pending = 1;
  455. }
  456. else {
  457. key->maxq_ctx.hw_ecc = -1;
  458. }
  459. return err;
  460. }
  461. #ifdef MAXQ_AESGCM
  462. static int aes_set_key(Aes* aes, const byte* userKey, word32 keylen)
  463. {
  464. mxq_u1 key_buff[MAX_KEY_DATASIZE];
  465. mxq_err_t mxq_rc;
  466. int rc;
  467. unsigned char sign_key[MAX_SIGNKEY_DATASIZE];
  468. int sign_key_len, sign_key_curve, sign_key_type;
  469. mxq_u1 signature[MAX_SIG_DATASIZE];
  470. int signature_len = (int)sizeof(signature);
  471. if (aes == NULL || (keylen != AES_128_KEY_SIZE &&
  472. #ifdef WOLFSSL_AES_192
  473. keylen != AES_192_KEY_SIZE &&
  474. #endif
  475. keylen != AES_256_KEY_SIZE)) {
  476. return BAD_FUNC_ARG;
  477. }
  478. rc = maxq_CryptHwMutexTryLock();
  479. if (rc != 0) {
  480. WOLFSSL_ERROR_MSG("MAXQ: aes_set_key() lock could not be acquired");
  481. rc = NOT_COMPILED_IN;
  482. return rc;
  483. }
  484. if (aes->maxq_ctx.key_obj_id) {
  485. wc_MAXQ10XX_AesFree(aes);
  486. }
  487. int obj_id = alloc_aes_key_id();
  488. if (!obj_id) {
  489. WOLFSSL_ERROR_MSG("MAXQ: alloc_aes_key_id() failed");
  490. rc = NOT_COMPILED_IN;
  491. goto end_AesSetKey;
  492. }
  493. mxq_rc = MXQ_CreateObject(obj_id, keylen, MXQ_OBJTYPE_SECRETKEY,
  494. OBJPROP_PERSISTENT,
  495. (char *)"ahs=rwdgx:ahs=rwdgx:ahs=rwdgx");
  496. if (mxq_rc) {
  497. WOLFSSL_ERROR_MSG("MAXQ: MXQ_CreateObject() failed");
  498. rc = NOT_COMPILED_IN;
  499. goto end_AesSetKey;
  500. }
  501. /* store the object id in the context */
  502. aes->maxq_ctx.key_obj_id = obj_id;
  503. mxq_length key_buff_len = sizeof(key_buff);
  504. mxq_rc = MXQ_BuildKey(key_buff, &key_buff_len, MXQ_KEYTYPE_AES, 0xff,
  505. keylen, keylen, MXQ_KEYUSE_ENCRYPTION,
  506. ALGO_CIPHER_AES_ECB, MXQ_KEYUSE_NONE, ALGO_NONE,
  507. (mxq_u1 *)userKey);
  508. if (mxq_rc) {
  509. WOLFSSL_ERROR_MSG("MAXQ: MXQ_BuildKey() failed");
  510. rc = WC_HW_E;
  511. goto end_AesSetKey;
  512. }
  513. LoadDefaultImportKey(sign_key, &sign_key_len, &sign_key_curve,
  514. &sign_key_type);
  515. rc = ECDSA_sign(signature, &signature_len, sign_key, key_buff, key_buff_len,
  516. sign_key_curve);
  517. if (rc) {
  518. WOLFSSL_ERROR_MSG("MAXQ: ECDSA_sign() failed");
  519. goto end_AesSetKey;
  520. }
  521. mxq_rc = MXQ_ImportKey(obj_id, getSignAlgoFromCurve(sign_key_curve),
  522. PUBKEY_IMPORT_OBJID, key_buff, key_buff_len,
  523. signature, signature_len);
  524. if (mxq_rc) {
  525. WOLFSSL_ERROR_MSG("MAXQ: MXQ_ImportKey() failed");
  526. rc = WC_HW_E;
  527. goto end_AesSetKey;
  528. }
  529. /* key stored successfully */
  530. aes->maxq_ctx.key_pending = 0;
  531. end_AesSetKey:
  532. wolfSSL_CryptHwMutexUnLock();
  533. return rc;
  534. }
  535. #endif /* MAXQ_AESGCM */
  536. void wc_MAXQ10XX_AesFree(Aes* aes)
  537. {
  538. mxq_err_t mxq_rc;
  539. int rc = 1;
  540. if (aes->maxq_ctx.key_obj_id != 0) {
  541. rc = 0;
  542. }
  543. if (rc == 0) {
  544. rc = wolfSSL_CryptHwMutexLock();
  545. }
  546. if (rc == 0) {
  547. mxq_rc = MXQ_DeleteObject(aes->maxq_ctx.key_obj_id);
  548. if (mxq_rc) {
  549. WOLFSSL_ERROR_MSG("MAXQ: MXQ_DeleteObject() failed");
  550. rc = 1;
  551. }
  552. if (rc == 0) {
  553. free_aes_key_id(aes->maxq_ctx.key_obj_id);
  554. aes->maxq_ctx.key_obj_id = 0;
  555. }
  556. wolfSSL_CryptHwMutexUnLock();
  557. }
  558. }
  559. #ifdef MAXQ_ECC
  560. static int ecc_set_key(ecc_key* key, const byte* userKey, word32 keycomplen)
  561. {
  562. mxq_err_t mxq_rc;
  563. int rc;
  564. word32 keylen;
  565. int objtype;
  566. mxq_u1 key_buff[MAX_KEY_DATASIZE];
  567. mxq_length key_buff_len = sizeof(key_buff);
  568. unsigned char sign_key[MAX_SIGNKEY_DATASIZE];
  569. int sign_key_len, sign_key_curve, sign_key_type;
  570. mxq_u1 signature[MAX_SIG_DATASIZE];
  571. int signature_len = (int)sizeof(signature);
  572. if ((key->type != ECC_PUBLICKEY) && (key->type != ECC_PRIVATEKEY) &&
  573. (key->type != ECC_PRIVATEKEY_ONLY)) {
  574. return BAD_FUNC_ARG;
  575. }
  576. if (key->type == ECC_PUBLICKEY) {
  577. keylen = keycomplen * 2;
  578. objtype = MXQ_OBJTYPE_PUBKEY;
  579. }
  580. else {
  581. keylen = keycomplen * 3;
  582. objtype = MXQ_OBJTYPE_KEYPAIR;
  583. }
  584. rc = maxq_CryptHwMutexTryLock();
  585. if (rc != 0) {
  586. WOLFSSL_ERROR_MSG("MAXQ: ecc_set_key() lock could not be acquired");
  587. rc = NOT_COMPILED_IN;
  588. return rc;
  589. }
  590. if (key->maxq_ctx.key_obj_id) {
  591. wc_MAXQ10XX_EccFree(key);
  592. }
  593. int obj_id = alloc_ecc_key_id();
  594. if (!obj_id) {
  595. WOLFSSL_ERROR_MSG("MAXQ: alloc_ecc_key_id() failed");
  596. rc = NOT_COMPILED_IN;
  597. goto end_EccSetKey;
  598. }
  599. mxq_rc = MXQ_CreateObject(obj_id, keylen, objtype, OBJPROP_PERSISTENT,
  600. (char *)"ahs=rwdgx:ahs=rwdgx:ahs=rwdgx");
  601. if (mxq_rc) {
  602. WOLFSSL_ERROR_MSG("MAXQ: MXQ_CreateObject() failed");
  603. rc = NOT_COMPILED_IN;
  604. goto end_EccSetKey;
  605. }
  606. /* store the object id in the context */
  607. key->maxq_ctx.key_obj_id = obj_id;
  608. mxq_rc = MXQ_BuildKey(key_buff, &key_buff_len, MXQ_KEYTYPE_ECC,
  609. MXQ_KEYPARAM_EC_P256R1, keycomplen, keylen,
  610. MXQ_KEYUSE_DATASIGNATURE, ALGO_ECDSA_SHA_256,
  611. MXQ_KEYUSE_NONE, ALGO_NONE, (mxq_u1 *)userKey);
  612. if (mxq_rc) {
  613. WOLFSSL_ERROR_MSG("MAXQ: MXQ_BuildKey() failed");
  614. rc = WC_HW_E;
  615. goto end_EccSetKey;
  616. }
  617. LoadDefaultImportKey(sign_key, &sign_key_len, &sign_key_curve,
  618. &sign_key_type);
  619. rc = ECDSA_sign(signature, &signature_len, sign_key, key_buff, key_buff_len,
  620. sign_key_curve);
  621. if (rc) {
  622. WOLFSSL_ERROR_MSG("MAXQ: ECDSA_sign() failed");
  623. goto end_EccSetKey;
  624. }
  625. mxq_rc = MXQ_ImportKey(obj_id, getSignAlgoFromCurve(sign_key_curve),
  626. PUBKEY_IMPORT_OBJID, key_buff, key_buff_len,
  627. signature, signature_len);
  628. if (mxq_rc) {
  629. WOLFSSL_ERROR_MSG("MAXQ: MXQ_ImportKey() failed");
  630. rc = WC_HW_E;
  631. goto end_EccSetKey;
  632. }
  633. /* key stored successfully */
  634. key->maxq_ctx.key_pending = 0;
  635. end_EccSetKey:
  636. wolfSSL_CryptHwMutexUnLock();
  637. return rc;
  638. }
  639. #endif /* MAXQ_ECC */
  640. void wc_MAXQ10XX_EccFree(ecc_key* key)
  641. {
  642. if (key->maxq_ctx.key_obj_id == 0) {
  643. return;
  644. }
  645. int rc = wolfSSL_CryptHwMutexLock();
  646. if (rc != 0) {
  647. return;
  648. }
  649. mxq_err_t mxq_rc = MXQ_DeleteObject(key->maxq_ctx.key_obj_id);
  650. if (mxq_rc) {
  651. WOLFSSL_ERROR_MSG("MAXQ: MXQ_DeleteObject() failed");
  652. wolfSSL_CryptHwMutexUnLock();
  653. return;
  654. }
  655. free_ecc_key_id(key->maxq_ctx.key_obj_id);
  656. key->maxq_ctx.key_obj_id = 0;
  657. wolfSSL_CryptHwMutexUnLock();
  658. }
  659. void wc_MAXQ10XX_Sha256Copy(wc_Sha256* sha256)
  660. {
  661. /* during copying, change to soft hash mode for one context */
  662. if (sha256->maxq_ctx.hash_running) {
  663. sha256->maxq_ctx.hash_running = 0;
  664. sha256->maxq_ctx.soft_hash = 1;
  665. }
  666. }
  667. void wc_MAXQ10XX_Sha256Free(wc_Sha256* sha256)
  668. {
  669. /* release the mutex if a hash operation is running on the maxq10xx device
  670. */
  671. if (sha256->maxq_ctx.hash_running) {
  672. sha256->maxq_ctx.hash_running = 0;
  673. sha256->maxq_ctx.soft_hash = 1;
  674. wolfSSL_CryptHwMutexUnLock();
  675. }
  676. }
  677. #endif /* WOLFSSL_MAXQ10XX_CRYPTO */
  678. #ifdef WOLF_CRYPTO_CB
  679. #ifdef MAXQ_SHA256
  680. static int maxq10xx_hash_update_sha256(const mxq_u1* psrc, mxq_length inlen,
  681. int running)
  682. {
  683. mxq_err_t mxq_rc;
  684. if (running == 0) {
  685. mxq_rc = MXQ_MD_Init(ALGO_MD_SHA256);
  686. if (mxq_rc) {
  687. WOLFSSL_ERROR_MSG("MAXQ: MXQ_MD_Init() failed");
  688. return WC_HW_E;
  689. }
  690. }
  691. mxq_length data_offset = 0;
  692. mxq_length data_len;
  693. while (inlen) {
  694. data_len = (inlen < MAX_HASH_CHUNKSIZE) ? inlen : MAX_HASH_CHUNKSIZE;
  695. mxq_rc = MXQ_MD_Update(&psrc[data_offset], data_len);
  696. if (mxq_rc) {
  697. WOLFSSL_ERROR_MSG("MAXQ: MXQ_MD_Update() failed");
  698. return WC_HW_E;
  699. }
  700. data_offset += data_len;
  701. inlen -= data_len;
  702. }
  703. return 0;
  704. }
  705. static int maxq10xx_hash_finish_sha256(mxq_u1* pdest)
  706. {
  707. mxq_err_t mxq_rc;
  708. mxq_length hashlen = WC_SHA256_DIGEST_SIZE;
  709. mxq_rc = MXQ_MD_Finish(pdest, &hashlen);
  710. if (mxq_rc) {
  711. WOLFSSL_ERROR_MSG("MAXQ: MXQ_MD_Finish() failed");
  712. return WC_HW_E;
  713. }
  714. return 0;
  715. }
  716. #endif /* MAXQ_SHA256 */
  717. static int maxq10xx_cipher_do(mxq_algo_id_t algo_id, mxq_u1 encrypt,
  718. mxq_u2 key_id, mxq_u1* p_in, mxq_u1* p_out,
  719. mxq_length data_size, mxq_u1* p_iv,
  720. mxq_length iv_len, mxq_u1* p_aad,
  721. mxq_length aad_len, mxq_u1* p_tag,
  722. mxq_length tag_len)
  723. {
  724. mxq_err_t mxq_rc;
  725. ciph_params_t cparams;
  726. mxq_u1 internal_data[K_CHUNKSIZE + K_CIPHER_BLOCKSIZE];
  727. mxq_u1 *p_int_data = internal_data;
  728. mxq_length data_offset = 0;
  729. mxq_length proc_len = 0, req_len = 0;
  730. XMEMSET(&cparams, 0, sizeof(cparams));
  731. cparams.data_length = data_size;
  732. cparams.p_iv = p_iv;
  733. cparams.iv_length = iv_len;
  734. cparams.p_aad = p_aad;
  735. cparams.aad_length = aad_len;
  736. if (encrypt) {
  737. cparams.aead_tag_len = tag_len;
  738. }
  739. else {
  740. XMEMCPY(cparams.aead_tag, p_tag, tag_len);
  741. cparams.aead_tag_len = tag_len;
  742. }
  743. mxq_rc = MXQ_Cipher_Init(encrypt, algo_id, key_id, &cparams, 0);
  744. if (mxq_rc) {
  745. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Cipher_Init() failed");
  746. return WC_HW_E;
  747. }
  748. while (data_size) {
  749. proc_len = (data_size < K_CHUNKSIZE) ? data_size : K_CHUNKSIZE;
  750. req_len = proc_len;
  751. mxq_rc = MXQ_Cipher_Update(&p_out, &p_in[data_offset], &proc_len);
  752. if (mxq_rc) {
  753. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Cipher_Update() failed");
  754. return WC_HW_E;
  755. }
  756. data_offset += req_len;
  757. data_size -= req_len;
  758. }
  759. if (encrypt) {
  760. proc_len = tag_len;
  761. mxq_rc = MXQ_Cipher_Finish(&p_int_data, &proc_len);
  762. if (mxq_rc) {
  763. WOLFSSL_ERROR_MSG("MAXQ: Encrypt, MXQ_Cipher_Finish() failed");
  764. return WC_HW_E;
  765. }
  766. if (proc_len > tag_len) {
  767. XMEMCPY(p_out, internal_data, proc_len - tag_len);
  768. }
  769. if ((tag_len != 0) && (proc_len >= tag_len)) {
  770. XMEMCPY(p_tag, &internal_data[proc_len - tag_len], tag_len);
  771. }
  772. }
  773. else {
  774. internal_data[0] = 0xDE;
  775. XMEMCPY(&internal_data[1], p_tag, tag_len);
  776. proc_len = tag_len;
  777. mxq_rc = MXQ_Cipher_Finish(&p_int_data, &proc_len);
  778. if (mxq_rc) {
  779. WOLFSSL_ERROR_MSG("MAXQ: Decrypt, MXQ_Cipher_Finish() failed");
  780. return WC_HW_E;
  781. }
  782. if (proc_len) {
  783. XMEMCPY(p_out, internal_data, proc_len);
  784. }
  785. }
  786. return 0;
  787. }
  788. static int maxq10xx_ecc_sign_local(mxq_u2 key_id,
  789. mxq_u1* p_in, mxq_u2 data_size,
  790. mxq_u1* p_sign_out, mxq_length* sign_len,
  791. mxq_length keycomplen)
  792. {
  793. mxq_err_t mxq_rc;
  794. int rc;
  795. mxq_u1 *input_digest = NULL;
  796. mxq_u1 *buff_sign = NULL;
  797. mxq_length buff_len = keycomplen * 2;
  798. byte *r = NULL;
  799. byte *s = NULL;
  800. input_digest = (mxq_u1 *)XMALLOC(keycomplen, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  801. buff_sign = (mxq_u1 *)XMALLOC(keycomplen * 2, NULL,
  802. DYNAMIC_TYPE_TMP_BUFFER);
  803. if (input_digest == NULL || buff_sign == NULL) {
  804. XFREE(input_digest, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  805. XFREE(buff_sign, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  806. return MEMORY_E;
  807. }
  808. r = &buff_sign[0];
  809. s = &buff_sign[keycomplen];
  810. /* truncate input to match key size */
  811. if (data_size > keycomplen) {
  812. data_size = keycomplen;
  813. }
  814. /* build input digest */
  815. XMEMSET(input_digest, 0, keycomplen);
  816. XMEMCPY(&input_digest[keycomplen - data_size], p_in, data_size);
  817. mxq_rc = MXQ_Sign(ALGO_ECDSA_PLAIN, key_id, input_digest,
  818. keycomplen, buff_sign, &buff_len);
  819. if (mxq_rc) {
  820. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Sign() failed");
  821. return WC_HW_E;
  822. }
  823. /* convert r and s to signature */
  824. rc = wc_ecc_rs_raw_to_sig((const byte *)r, keycomplen, (const byte *)s,
  825. keycomplen, p_sign_out, sign_len);
  826. if (rc != 0) {
  827. WOLFSSL_ERROR_MSG("MAXQ: converting r and s to signature failed");
  828. }
  829. XFREE(input_digest, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  830. XFREE(buff_sign, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  831. return rc;
  832. }
  833. #ifdef MAXQ_ECC
  834. static int maxq10xx_ecc_verify_local(
  835. mxq_u2 key_id, mxq_u1* p_in, mxq_u2 data_size,
  836. mxq_u1* p_sign, mxq_u1 sign_len, int *result,
  837. mxq_length keycomplen)
  838. {
  839. int rc;
  840. mxq_err_t mxq_rc;
  841. mxq_u1 *buff_rs = NULL;
  842. mxq_u1 *input_digest = NULL;
  843. mxq_u1 *buff_signature = NULL;
  844. byte *r = NULL;
  845. byte *s = NULL;
  846. word32 r_len = keycomplen;
  847. word32 s_len = keycomplen;
  848. input_digest = (mxq_u1 *)XMALLOC(keycomplen, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  849. buff_rs = (mxq_u1 *)XMALLOC(keycomplen * 2, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  850. buff_signature = (mxq_u1 *)XMALLOC(keycomplen * 2, NULL,
  851. DYNAMIC_TYPE_TMP_BUFFER);
  852. if (input_digest == NULL || buff_rs == NULL || buff_signature == NULL) {
  853. XFREE(input_digest, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  854. XFREE(buff_rs, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  855. XFREE(buff_signature, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  856. return MEMORY_E;
  857. }
  858. r = &buff_rs[0];
  859. s = &buff_rs[keycomplen];
  860. /* truncate input to match key size */
  861. if (data_size > keycomplen) {
  862. data_size = keycomplen;
  863. }
  864. /* build input digest */
  865. XMEMSET(input_digest, 0, keycomplen);
  866. XMEMCPY(&input_digest[keycomplen - data_size], p_in, data_size);
  867. /* extract r and s from signature */
  868. XMEMSET(buff_rs, 0, keycomplen * 2);
  869. rc = wc_ecc_sig_to_rs(p_sign, sign_len, r, &r_len, s, &s_len);
  870. if (rc != 0) {
  871. XFREE(input_digest, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  872. XFREE(buff_rs, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  873. XFREE(buff_signature, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  874. WOLFSSL_ERROR_MSG("MAXQ: extracting r and s from signature failed");
  875. *result = 0;
  876. return rc;
  877. }
  878. if ((r_len > keycomplen) || (s_len > keycomplen)) {
  879. XFREE(input_digest, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  880. XFREE(buff_rs, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  881. XFREE(buff_signature, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  882. WOLFSSL_ERROR_MSG("MAXQ: r and s corrupted");
  883. *result = 0;
  884. return BUFFER_E;
  885. }
  886. /* prepare raw signature */
  887. XMEMSET(buff_signature, 0, keycomplen * 2);
  888. /* add leading zeros if necessary */
  889. XMEMCPY(&buff_signature[keycomplen - r_len], r, r_len);
  890. XMEMCPY(&buff_signature[(keycomplen * 2) - s_len], s, s_len);
  891. mxq_rc = MXQ_Verify(ALGO_ECDSA_PLAIN, key_id, input_digest,
  892. keycomplen, buff_signature, keycomplen * 2);
  893. XFREE(input_digest, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  894. XFREE(buff_rs, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  895. XFREE(buff_signature, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  896. *result = (mxq_rc ? 0 : 1);
  897. return 0;
  898. }
  899. #endif /* MAXQ_ECC */
  900. #ifdef MAXQ_RNG
  901. static int maxq10xx_random(byte* output, unsigned short sz)
  902. {
  903. #if defined(WOLFSSL_MAXQ108X)
  904. if (!tls13active) {
  905. return NOT_COMPILED_IN;
  906. }
  907. #endif
  908. if (output == NULL) {
  909. return BUFFER_E;
  910. }
  911. int ret = maxq_CryptHwMutexTryLock();
  912. if (ret != 0) {
  913. WOLFSSL_ERROR_MSG("MAXQ: maxq10xx_random() lock could not be acquired");
  914. ret = NOT_COMPILED_IN;
  915. return ret;
  916. }
  917. if (MXQ_Get_Random_Ext(output, sz, 0)) {
  918. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Get_Random_Ext() failed");
  919. wolfSSL_CryptHwMutexUnLock();
  920. return WC_HW_E;
  921. }
  922. wolfSSL_CryptHwMutexUnLock();
  923. return 0;
  924. }
  925. #endif /* MAXQ_RNG */
  926. #if !defined(NO_AES) && defined(HAVE_AESGCM) && defined(MAXQ_AESGCM)
  927. static int do_aesgcm(wc_CryptoInfo* info)
  928. {
  929. int rc;
  930. if (info->cipher.enc) {
  931. if (info->cipher.aesgcm_enc.authTagSz > 16) {
  932. return CRYPTOCB_UNAVAILABLE;
  933. }
  934. if (info->cipher.aesgcm_enc.sz == 0) {
  935. return CRYPTOCB_UNAVAILABLE;
  936. }
  937. if (info->cipher.aesgcm_enc.ivSz != 12) {
  938. return CRYPTOCB_UNAVAILABLE;
  939. }
  940. if (info->cipher.aesgcm_enc.aes->maxq_ctx.key_pending) {
  941. rc = aes_set_key(
  942. info->cipher.aesgcm_enc.aes,
  943. (const byte *)info->cipher.aesgcm_enc.aes->maxq_ctx.key,
  944. info->cipher.aesgcm_enc.aes->keylen);
  945. if (rc != 0) {
  946. return rc;
  947. }
  948. }
  949. rc = wolfSSL_CryptHwMutexLock();
  950. if (rc != 0) {
  951. return rc;
  952. }
  953. rc = maxq10xx_cipher_do(
  954. ALGO_CIPHER_AES_GCM,
  955. 1,
  956. info->cipher.aesgcm_enc.aes->maxq_ctx.key_obj_id,
  957. (byte *)info->cipher.aesgcm_enc.in,
  958. (byte *)info->cipher.aesgcm_enc.out,
  959. info->cipher.aesgcm_enc.sz,
  960. (byte *)info->cipher.aesgcm_enc.iv,
  961. info->cipher.aesgcm_enc.ivSz,
  962. (byte *)info->cipher.aesgcm_enc.authIn,
  963. info->cipher.aesgcm_enc.authInSz,
  964. (byte *)info->cipher.aesgcm_enc.authTag,
  965. info->cipher.aesgcm_enc.authTagSz);
  966. if (rc != 0) {
  967. wolfSSL_CryptHwMutexUnLock();
  968. return rc;
  969. }
  970. wolfSSL_CryptHwMutexUnLock();
  971. }
  972. else {
  973. if (info->cipher.aesgcm_dec.authTagSz != 16) {
  974. return CRYPTOCB_UNAVAILABLE;
  975. }
  976. if (info->cipher.aesgcm_dec.sz == 0) {
  977. return CRYPTOCB_UNAVAILABLE;
  978. }
  979. if (info->cipher.aesgcm_dec.ivSz != 12) {
  980. return CRYPTOCB_UNAVAILABLE;
  981. }
  982. if (info->cipher.aesgcm_dec.aes->maxq_ctx.key_pending) {
  983. rc = aes_set_key(
  984. info->cipher.aesgcm_dec.aes,
  985. (const byte *)info->cipher.aesgcm_dec.aes->maxq_ctx.key,
  986. info->cipher.aesgcm_dec.aes->keylen);
  987. if (rc != 0) {
  988. return rc;
  989. }
  990. }
  991. rc = wolfSSL_CryptHwMutexLock();
  992. if (rc != 0) {
  993. return rc;
  994. }
  995. rc = maxq10xx_cipher_do(
  996. ALGO_CIPHER_AES_GCM,
  997. 0,
  998. info->cipher.aesgcm_dec.aes->maxq_ctx.key_obj_id,
  999. (byte *)info->cipher.aesgcm_dec.in,
  1000. (byte *)info->cipher.aesgcm_dec.out,
  1001. info->cipher.aesgcm_dec.sz,
  1002. (byte *)info->cipher.aesgcm_dec.iv,
  1003. info->cipher.aesgcm_dec.ivSz,
  1004. (byte *)info->cipher.aesgcm_dec.authIn,
  1005. info->cipher.aesgcm_dec.authInSz,
  1006. (byte *)info->cipher.aesgcm_dec.authTag,
  1007. info->cipher.aesgcm_dec.authTagSz);
  1008. if (rc != 0) {
  1009. wolfSSL_CryptHwMutexUnLock();
  1010. return rc;
  1011. }
  1012. wolfSSL_CryptHwMutexUnLock();
  1013. }
  1014. /* done */
  1015. return 0;
  1016. }
  1017. #endif /* !NO_AES && HAVE_AESGCM && MAXQ_AESGCM */
  1018. #if !defined(NO_SHA) && !defined(NO_SHA256) && defined(MAXQ_SHA256)
  1019. static int do_sha256(wc_CryptoInfo* info)
  1020. {
  1021. int rc;
  1022. if (info->hash.sha256->maxq_ctx.soft_hash) {
  1023. return CRYPTOCB_UNAVAILABLE;
  1024. }
  1025. if ((info->hash.in == NULL) && (info->hash.digest == NULL)) {
  1026. return WC_HW_E;
  1027. }
  1028. if (info->hash.sha256->maxq_ctx.hash_running == 0) {
  1029. rc = maxq_CryptHwMutexTryLock();
  1030. if (rc != 0) {
  1031. info->hash.sha256->maxq_ctx.soft_hash = 1;
  1032. return CRYPTOCB_UNAVAILABLE;
  1033. }
  1034. }
  1035. if (info->hash.in != NULL) {
  1036. /* wc_Sha256Update */
  1037. if ((info->hash.sha256->maxq_ctx.hash_running == 0) &&
  1038. (info->hash.inSz == 0)) {
  1039. info->hash.sha256->maxq_ctx.soft_hash = 1;
  1040. wolfSSL_CryptHwMutexUnLock();
  1041. return CRYPTOCB_UNAVAILABLE;
  1042. }
  1043. rc = maxq10xx_hash_update_sha256(info->hash.in, info->hash.inSz,
  1044. info->hash.sha256->maxq_ctx.hash_running);
  1045. if (rc != 0) {
  1046. info->hash.sha256->maxq_ctx.hash_running = 0;
  1047. wolfSSL_CryptHwMutexUnLock();
  1048. return rc;
  1049. }
  1050. info->hash.sha256->maxq_ctx.hash_running = 1;
  1051. /* save soft hash context in case of wc_Sha256Copy */
  1052. return CRYPTOCB_UNAVAILABLE;
  1053. }
  1054. else if (info->hash.digest != NULL) {
  1055. /* wc_Sha256Final */
  1056. if (info->hash.sha256->maxq_ctx.hash_running == 0) {
  1057. info->hash.sha256->maxq_ctx.soft_hash = 1;
  1058. wolfSSL_CryptHwMutexUnLock();
  1059. return CRYPTOCB_UNAVAILABLE;
  1060. }
  1061. rc = maxq10xx_hash_finish_sha256(info->hash.digest);
  1062. if (rc != 0) {
  1063. info->hash.sha256->maxq_ctx.hash_running = 0;
  1064. wolfSSL_CryptHwMutexUnLock();
  1065. return rc;
  1066. }
  1067. info->hash.sha256->maxq_ctx.hash_running = 0;
  1068. wolfSSL_CryptHwMutexUnLock();
  1069. /* done */
  1070. rc = 0;
  1071. }
  1072. return rc;
  1073. }
  1074. #endif /* !NO_SHA && !NO_SHA256 && MAXQ_SHA256 */
  1075. int wolfSSL_MAXQ10XX_CryptoDevCb(int devId, wc_CryptoInfo* info, void* ctx)
  1076. {
  1077. int rc = CRYPTOCB_UNAVAILABLE;
  1078. (void)devId;
  1079. (void)ctx;
  1080. #if defined(WOLFSSL_MAXQ108X)
  1081. if (!tls13active)
  1082. #endif
  1083. return CRYPTOCB_UNAVAILABLE;
  1084. if (info->algo_type == WC_ALGO_TYPE_CIPHER) {
  1085. #if !defined(NO_AES) || !defined(NO_DES3)
  1086. #if defined(HAVE_AESGCM) && defined(MAXQ_AESGCM)
  1087. if (info->cipher.type == WC_CIPHER_AES_GCM) {
  1088. rc = do_aesgcm(info);
  1089. }
  1090. #endif /* HAVE_AESGCM && MAXQ_AESGCM */
  1091. #ifdef HAVE_AES_CBC
  1092. if (info->cipher.type == WC_CIPHER_AES_CBC) {
  1093. /* TODO */
  1094. return CRYPTOCB_UNAVAILABLE;
  1095. }
  1096. #endif /* HAVE_AES_CBC */
  1097. #endif /* !NO_AES || !NO_DES3 */
  1098. }
  1099. #if !defined(NO_SHA) || !defined(NO_SHA256)
  1100. else if (info->algo_type == WC_ALGO_TYPE_HASH) {
  1101. #if !defined(NO_SHA) && defined(MAXQ_SHA1)
  1102. if (info->hash.type == WC_HASH_TYPE_SHA) {
  1103. /* TODO */
  1104. return CRYPTOCB_UNAVAILABLE;
  1105. }
  1106. else
  1107. #endif /* !NO_SHA && MAXQ_SHA1 */
  1108. #if !defined(NO_SHA256) && defined(MAXQ_SHA256)
  1109. if (info->hash.type == WC_HASH_TYPE_SHA256) {
  1110. rc = do_sha256(info);
  1111. }
  1112. #endif /* !NO_SHA256 && MAXQ_SHA256 */
  1113. }
  1114. #endif /* !NO_SHA || !NO_SHA256 */
  1115. #if !defined(WC_NO_RNG) && defined(MAXQ_RNG)
  1116. else if (info->algo_type == WC_ALGO_TYPE_SEED) {
  1117. rc = maxq10xx_random(info->seed.seed, info->seed.sz);
  1118. }
  1119. else if (info->algo_type == WC_ALGO_TYPE_RNG) {
  1120. rc = maxq10xx_random(info->rng.out, info->rng.sz);
  1121. }
  1122. #endif /* !WC_NO_RNG && MAXQ_RNG */
  1123. else if (info->algo_type == WC_ALGO_TYPE_PK) {
  1124. #if defined(HAVE_ECC) && defined(MAXQ_ECC)
  1125. if (info->pk.type == WC_PK_TYPE_EC_KEYGEN) {
  1126. /* TODO */
  1127. return CRYPTOCB_UNAVAILABLE;
  1128. }
  1129. else if (info->pk.type == WC_PK_TYPE_ECDH) {
  1130. /* TODO */
  1131. return CRYPTOCB_UNAVAILABLE;
  1132. }
  1133. else if (info->pk.type == WC_PK_TYPE_ECDSA_SIGN) {
  1134. if (info->pk.eccsign.key->maxq_ctx.hw_ecc == 0) {
  1135. rc = wc_MAXQ10XX_EccSetKey(info->pk.eccsign.key,
  1136. info->pk.eccsign.key->dp->size);
  1137. if (rc != 0) {
  1138. return rc;
  1139. }
  1140. }
  1141. if (info->pk.eccsign.key->maxq_ctx.hw_ecc == -1) {
  1142. return CRYPTOCB_UNAVAILABLE;
  1143. }
  1144. if (info->pk.eccsign.key->maxq_ctx.key_pending) {
  1145. rc = ecc_set_key(info->pk.eccsign.key,
  1146. info->pk.eccsign.key->maxq_ctx.ecc_key,
  1147. info->pk.eccsign.key->dp->size);
  1148. if (rc != 0) {
  1149. return rc;
  1150. }
  1151. }
  1152. rc = wolfSSL_CryptHwMutexLock();
  1153. if (rc != 0) {
  1154. return rc;
  1155. }
  1156. rc = maxq10xx_ecc_sign_local(
  1157. info->pk.eccsign.key->maxq_ctx.key_obj_id,
  1158. (byte *)info->pk.eccsign.in, info->pk.eccsign.inlen,
  1159. info->pk.eccsign.out, info->pk.eccsign.outlen,
  1160. info->pk.eccsign.key->dp->size);
  1161. if (rc != 0) {
  1162. wolfSSL_CryptHwMutexUnLock();
  1163. return rc;
  1164. }
  1165. wolfSSL_CryptHwMutexUnLock();
  1166. /* done */
  1167. rc = 0;
  1168. }
  1169. else if (info->pk.type == WC_PK_TYPE_ECDSA_VERIFY) {
  1170. if (info->pk.eccverify.key->type == ECC_PRIVATEKEY_ONLY) {
  1171. return CRYPTOCB_UNAVAILABLE;
  1172. }
  1173. if (info->pk.eccverify.key->maxq_ctx.hw_ecc == 0) {
  1174. rc = wc_MAXQ10XX_EccSetKey(info->pk.eccverify.key,
  1175. info->pk.eccverify.key->dp->size);
  1176. if (rc != 0) {
  1177. return rc;
  1178. }
  1179. }
  1180. if (info->pk.eccverify.key->maxq_ctx.hw_ecc == -1) {
  1181. return CRYPTOCB_UNAVAILABLE;
  1182. }
  1183. if (info->pk.eccverify.key->maxq_ctx.key_pending) {
  1184. rc = ecc_set_key(info->pk.eccverify.key,
  1185. info->pk.eccverify.key->maxq_ctx.ecc_key,
  1186. info->pk.eccverify.key->dp->size);
  1187. if (rc != 0) {
  1188. return rc;
  1189. }
  1190. }
  1191. rc = wolfSSL_CryptHwMutexLock();
  1192. if (rc != 0) {
  1193. return rc;
  1194. }
  1195. rc =
  1196. maxq10xx_ecc_verify_local(
  1197. info->pk.eccverify.key->maxq_ctx.key_obj_id,
  1198. (byte *)info->pk.eccverify.hash,
  1199. info->pk.eccverify.hashlen,
  1200. (byte *)info->pk.eccverify.sig,
  1201. info->pk.eccverify.siglen,
  1202. info->pk.eccverify.res,
  1203. info->pk.eccverify.key->dp->size);
  1204. wolfSSL_CryptHwMutexUnLock();
  1205. if (rc != 0) {
  1206. return rc;
  1207. }
  1208. /* Success */
  1209. rc = 0;
  1210. }
  1211. #endif /* HAVE_ECC && MAXQ_ECC */
  1212. }
  1213. #ifdef WOLFSSL_MAXQ108X
  1214. else if (info->algo_type == WC_ALGO_TYPE_HMAC) {
  1215. if (info->hmac.in != NULL && info->hmac.digest == NULL) {
  1216. rc = 0;
  1217. if (mac_comp_active == 0) {
  1218. rc = wc_MAXQ10XX_HmacSetKey(info->hmac.macType);
  1219. }
  1220. if (rc == 0) {
  1221. rc = wc_MAXQ10XX_HmacUpdate(info->hmac.in, info->hmac.inSz);
  1222. }
  1223. }
  1224. else if (info->hmac.in == NULL && info->hmac.digest != NULL) {
  1225. rc = wc_MAXQ10XX_HmacFinal(info->hmac.digest);
  1226. }
  1227. else {
  1228. rc = BAD_FUNC_ARG;
  1229. }
  1230. }
  1231. #endif /* WOLFSSL_MAXQ108X */
  1232. if (rc != 0 && rc != CRYPTOCB_UNAVAILABLE) {
  1233. rc = WC_HW_E;
  1234. }
  1235. return rc;
  1236. }
  1237. static int wolfSSL_Soft_CryptoDevCb(int devId, wc_CryptoInfo* info, void* ctx)
  1238. {
  1239. (void)devId;
  1240. (void)info;
  1241. (void)ctx;
  1242. return CRYPTOCB_UNAVAILABLE;
  1243. }
  1244. #endif /* WOLF_CRYPTO_CB */
  1245. #ifdef WOLFSSL_MAXQ10XX_TLS
  1246. #ifdef WOLFSSL_MAXQ108X
  1247. static int calculate_modulus_offset(const unsigned char * cert_data, int offset)
  1248. {
  1249. int i;
  1250. int l_offset = offset;
  1251. for (i = 0; i < 2; i++) {
  1252. if ((cert_data[l_offset]) & 0x80) {
  1253. if ((cert_data[l_offset] & 0x7f) == 1) {
  1254. l_offset += 3;
  1255. }
  1256. if ((cert_data[l_offset] & 0x7f) == 2) {
  1257. l_offset += 4;
  1258. }
  1259. }
  1260. else {
  1261. l_offset += 2;
  1262. }
  1263. }
  1264. return l_offset;
  1265. }
  1266. static int maxq_curve_wolfssl_id2mxq_id(word32 curve_id, mxq_length *keycomplen)
  1267. {
  1268. switch (curve_id) {
  1269. case ECC_SECP256R1_OID:
  1270. *keycomplen = 32;
  1271. return MXQ_KEYPARAM_EC_P256R1;
  1272. case ECC_SECP384R1_OID:
  1273. *keycomplen = 48;
  1274. return MXQ_KEYPARAM_EC_P384R1;
  1275. case ECC_SECP521R1_OID:
  1276. *keycomplen = 66;
  1277. return MXQ_KEYPARAM_EC_P521R1;
  1278. case ECC_BRAINPOOLP256R1_OID:
  1279. *keycomplen = 32;
  1280. return MXQ_KEYPARAM_EC_BP256R1;
  1281. case ECC_BRAINPOOLP384R1_OID:
  1282. *keycomplen = 48;
  1283. return MXQ_KEYPARAM_EC_BP384R1;
  1284. case ECC_BRAINPOOLP512R1_OID:
  1285. *keycomplen = 64;
  1286. return MXQ_KEYPARAM_EC_BP512R1;
  1287. default:
  1288. return MXQ_UNKNOWN_CURVE;
  1289. }
  1290. }
  1291. static int mxq_get_sign_alg_from_sig_oid(word32 maxq_id) {
  1292. switch (maxq_id) {
  1293. case CTC_SHA256wECDSA:
  1294. return ALGO_ECDSA_SHA_256;
  1295. case CTC_SHA384wECDSA:
  1296. return ALGO_ECDSA_SHA_384;
  1297. case CTC_SHA512wECDSA:
  1298. return ALGO_ECDSA_SHA_512;
  1299. case CTC_SHA256wRSA:
  1300. return ALGO_RSASSAPSSPKCS1_V1_5_SHA256;
  1301. case CTC_SHA384wRSA:
  1302. return ALGO_RSASSAPSSPKCS1_V1_5_SHA384;
  1303. case CTC_SHA512wRSA:
  1304. return ALGO_RSASSAPSSPKCS1_V1_5_SHA512;
  1305. default:
  1306. return ALGO_INVALID;
  1307. }
  1308. }
  1309. #endif /* WOLFSSL_MAXQ108X */
  1310. /* TODO: Get rid of publicKeyIndex. Pass in the information it is parsing.
  1311. * Then Improve this to pass in the parts of decoded cert it needs.
  1312. */
  1313. static int maxq10xx_process_server_certificate(WOLFSSL* ssl,
  1314. DecodedCert* p_cert)
  1315. {
  1316. mxq_keytype_id_t key_type = MXQ_KEYTYPE_ECC;
  1317. mxq_keyparam_id_t keyparam = MXQ_KEYPARAM_EC_P256R1;
  1318. mxq_length totalkeylen;
  1319. mxq_algo_id_t sign_algo = ALGO_ECDSA_SHA_256;
  1320. int pk_offset = p_cert->publicKeyIndex;
  1321. mxq_length keycomplen = ECC_KEYCOMPLEN;
  1322. int rc;
  1323. mxq_err_t mxq_rc;
  1324. mxq_u1 certdata[MAX_CERT_DATASIZE];
  1325. mxq_length certdatalen = sizeof(certdata);
  1326. (void)ssl;
  1327. #if defined(WOLFSSL_MAXQ1065)
  1328. if (p_cert->signatureOID != CTC_SHA256wECDSA) {
  1329. WOLFSSL_MSG("MAXQ: signature algo not supported");
  1330. return NOT_COMPILED_IN;
  1331. }
  1332. if (p_cert->keyOID != ECDSAk) {
  1333. WOLFSSL_MSG("MAXQ: key algo not supported");
  1334. return NOT_COMPILED_IN;
  1335. }
  1336. if (p_cert->pkCurveOID != ECC_SECP256R1_OID) {
  1337. WOLFSSL_MSG("MAXQ: key curve not supported");
  1338. return NOT_COMPILED_IN;
  1339. }
  1340. totalkeylen = keycomplen * 2;
  1341. #elif defined(WOLFSSL_MAXQ108X)
  1342. if (p_cert->keyOID == ECDSAk )
  1343. {
  1344. keyparam = maxq_curve_wolfssl_id2mxq_id(p_cert->pkCurveOID,
  1345. &keycomplen);
  1346. if (keyparam == MXQ_UNKNOWN_CURVE) {
  1347. WOLFSSL_MSG("MAXQ: key curve not supported");
  1348. return NOT_COMPILED_IN;
  1349. }
  1350. totalkeylen = keycomplen * 2;
  1351. }
  1352. else if (p_cert->keyOID == RSAk) {
  1353. pk_offset = calculate_modulus_offset(p_cert->source,
  1354. p_cert->publicKeyIndex+1);
  1355. keycomplen = ((p_cert->source[pk_offset-2] << 8) |
  1356. p_cert->source[pk_offset-1]);
  1357. /* Is there a more elegant way for checking pub key??? */
  1358. if (p_cert->publicKey[p_cert->pubKeySize-1] == 0x03 &&
  1359. p_cert->publicKey[p_cert->pubKeySize-2] == 0x01) {
  1360. keyparam = MXQ_KEYPARAM_RSA_PUB3;
  1361. }
  1362. else if (p_cert->publicKey[p_cert->pubKeySize-1] == 0x01 &&
  1363. p_cert->publicKey[p_cert->pubKeySize-2] == 0x00 &&
  1364. p_cert->publicKey[p_cert->pubKeySize-3] == 0x01 &&
  1365. p_cert->publicKey[p_cert->pubKeySize-4] == 0x03) {
  1366. keyparam = MXQ_KEYPARAM_RSA_PUB65537;
  1367. }
  1368. else {
  1369. WOLFSSL_MSG("MAXQ: RSA public key not supported");
  1370. return NOT_COMPILED_IN;
  1371. }
  1372. key_type = MXQ_KEYTYPE_RSA;
  1373. totalkeylen = keycomplen;
  1374. }
  1375. else {
  1376. WOLFSSL_MSG("MAXQ: key algo not supported");
  1377. return NOT_COMPILED_IN;
  1378. }
  1379. tls13_server_key_algo = p_cert->keyOID;
  1380. tls13_server_key_len = keycomplen;
  1381. sign_algo = mxq_get_sign_alg_from_sig_oid(p_cert->signatureOID);
  1382. if (sign_algo == ALGO_INVALID) {
  1383. WOLFSSL_MSG("MAXQ: signature algo not supported");
  1384. return NOT_COMPILED_IN;
  1385. }
  1386. #endif
  1387. rc = wolfSSL_CryptHwMutexLock();
  1388. if (rc != 0) {
  1389. return rc;
  1390. }
  1391. mxq_rc = MXQ_Build_EC_Cert(certdata, &certdatalen, key_type, keyparam,
  1392. keycomplen, totalkeylen, pk_offset,
  1393. p_cert->certBegin,
  1394. (p_cert->sigIndex - p_cert->certBegin),
  1395. p_cert->maxIdx, sign_algo, ROOT_CA_CERT_OBJ_ID,
  1396. MXQ_KEYUSE_VERIFY_KEY_CERT, ALGO_ECDSA_SHA_any,
  1397. MXQ_KEYUSE_DATASIGNATURE, ALGO_ECDSA_SHA_any,
  1398. (mxq_u1 *)p_cert->source);
  1399. if (mxq_rc) {
  1400. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Build_EC_Cert() failed");
  1401. wolfSSL_CryptHwMutexUnLock();
  1402. return WC_HW_E;
  1403. }
  1404. #if defined(WOLFSSL_MAXQ108X)
  1405. if (tls13_server_cert_id == -1) {
  1406. tls13_server_cert_id = alloc_temp_key_id();
  1407. if (tls13_server_cert_id == -1) {
  1408. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  1409. wolfSSL_CryptHwMutexUnLock();
  1410. return WC_HW_E;
  1411. }
  1412. }
  1413. /* temporary certificate stored in object id cert_id */
  1414. mxq_rc = MXQ_ImportChildCert(tls13_server_cert_id, certdata, certdatalen);
  1415. #else
  1416. /* temporary certificate stored in object id 0 */
  1417. mxq_rc = MXQ_ImportChildCert(0, certdata, certdatalen);
  1418. #endif
  1419. if (mxq_rc) {
  1420. WOLFSSL_ERROR_MSG("MAXQ: MXQ_ImportChildCert() failed");
  1421. wolfSSL_CryptHwMutexUnLock();
  1422. return WC_HW_E;
  1423. }
  1424. wolfSSL_CryptHwMutexUnLock();
  1425. return 0;
  1426. }
  1427. static int maxq10xx_process_server_sig_kex(WOLFSSL* ssl, byte p_sig_algo,
  1428. const byte* p_sig, word32 p_sig_len,
  1429. const byte* p_rand, word32 p_rand_len,
  1430. const byte* p_server_params, word32 p_server_params_len)
  1431. {
  1432. int rc;
  1433. mxq_err_t mxq_rc;
  1434. if (ssl->specs.kea != ecc_diffie_hellman_kea) {
  1435. WOLFSSL_MSG("MAXQ: key exchange algo not supported");
  1436. return NOT_COMPILED_IN;
  1437. }
  1438. if (ssl->ecdhCurveOID != ECC_SECP256R1_OID) {
  1439. WOLFSSL_MSG("MAXQ: key curve not supported");
  1440. return NOT_COMPILED_IN;
  1441. }
  1442. if (p_sig_algo != ecc_dsa_sa_algo) {
  1443. WOLFSSL_MSG("MAXQ: signature algo not supported");
  1444. return NOT_COMPILED_IN;
  1445. }
  1446. rc = wolfSSL_CryptHwMutexLock();
  1447. if (rc != 0) {
  1448. return rc;
  1449. }
  1450. /* NOTE: this function also does verification of the signature as well! */
  1451. mxq_rc = MXQ_SetECDHEKey(ALGO_ECDSA_SHA_256, MXQ_KEYPARAM_EC_P256R1, 0,
  1452. (mxq_u1 *)p_rand, p_rand_len,
  1453. (mxq_u1 *)p_server_params, p_server_params_len,
  1454. (mxq_u1 *)p_sig, p_sig_len);
  1455. if (mxq_rc) {
  1456. WOLFSSL_ERROR_MSG("MAXQ: MXQ_SetECDHEKey() failed");
  1457. wolfSSL_CryptHwMutexUnLock();
  1458. return WC_HW_E;
  1459. }
  1460. wolfSSL_CryptHwMutexUnLock();
  1461. return 0;
  1462. }
  1463. static int maxq10xx_gen_tls_master_secret(WOLFSSL* ssl, void *ctx)
  1464. {
  1465. int rc;
  1466. mxq_err_t mxq_rc;
  1467. mxq_secret_context_api_t secret_conf;
  1468. mxq_u1 tls_rand[SEED_LEN];
  1469. (void)ctx;
  1470. if ((ssl->specs.kea != ecc_diffie_hellman_kea) &&
  1471. (ssl->specs.kea != psk_kea)) {
  1472. WOLFSSL_MSG("MAXQ: key exchange algo not supported");
  1473. return NOT_COMPILED_IN;
  1474. }
  1475. if (ssl->specs.kea == ecc_diffie_hellman_kea) {
  1476. if ((ssl->hsKey == NULL ) ||
  1477. (((ecc_key*)ssl->hsKey)->maxq_ctx.hw_storage == 0)) {
  1478. return NOT_COMPILED_IN;
  1479. }
  1480. }
  1481. XMEMCPY(tls_rand, ssl->arrays->clientRandom, RAN_LEN);
  1482. XMEMCPY(&tls_rand[RAN_LEN], ssl->arrays->serverRandom, RAN_LEN);
  1483. XMEMSET(&secret_conf, 0 ,sizeof(secret_conf));
  1484. secret_conf.pass = 0;
  1485. secret_conf.CSID = ssl->options.cipherSuite |
  1486. (ssl->options.cipherSuite0 << 8);
  1487. secret_conf.Random = tls_rand;
  1488. secret_conf.Random_size = SEED_LEN;
  1489. secret_conf.is_session_key_secret = 1;
  1490. if (ssl->specs.kea == psk_kea) {
  1491. secret_conf.PSK_info.psk_id = PSK_OBJ_ID;
  1492. }
  1493. rc = wolfSSL_CryptHwMutexLock();
  1494. if (rc != 0) {
  1495. return rc;
  1496. }
  1497. mxq_rc = MXQ_Perform_Key_Exchange(&secret_conf);
  1498. if (mxq_rc) {
  1499. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Perform_Key_Exchange() failed");
  1500. wolfSSL_CryptHwMutexUnLock();
  1501. return WC_HW_E;
  1502. }
  1503. ssl->maxq_ctx.use_hw_keys = 1;
  1504. wolfSSL_CryptHwMutexUnLock();
  1505. #ifdef MAXQ_EXPORT_TLS_KEYS
  1506. rc = StoreKeys(ssl, secret_conf.PSK_info.psk_key_bloc,
  1507. PROVISION_CLIENT_SERVER);
  1508. if (rc != 0) {
  1509. WOLFSSL_ERROR_MSG("MAXQ: StoreKeys() failed");
  1510. return rc;
  1511. }
  1512. #endif
  1513. return 0;
  1514. }
  1515. static int maxq10xx_perform_client_finished(WOLFSSL* ssl, const byte* p_label,
  1516. const byte* p_seed, word32 seedSz, byte* p_dest, void* ctx)
  1517. {
  1518. int rc;
  1519. mxq_err_t mxq_rc;
  1520. (void)ssl;
  1521. (void)ctx;
  1522. rc = wolfSSL_CryptHwMutexLock();
  1523. if (rc != 0) {
  1524. return rc;
  1525. }
  1526. mxq_rc = MXQ_tls_prf_sha_256(0, p_label, FINISHED_LABEL_SZ,
  1527. p_seed, seedSz,
  1528. p_dest, TLS_FINISHED_SZ);
  1529. if (mxq_rc) {
  1530. WOLFSSL_ERROR_MSG("MAXQ: MXQ_tls_prf_sha_256() failed");
  1531. wolfSSL_CryptHwMutexUnLock();
  1532. return WC_HW_E;
  1533. }
  1534. wolfSSL_CryptHwMutexUnLock();
  1535. return 0;
  1536. }
  1537. static int maxq10xx_perform_tls12_record_processing(WOLFSSL* ssl,
  1538. int is_encrypt,
  1539. byte* out, const byte* in, word32 sz,
  1540. const byte* iv, word32 ivSz,
  1541. byte* authTag, word32 authTagSz,
  1542. const byte* authIn, word32 authInSz)
  1543. {
  1544. int rc;
  1545. mxq_err_t mxq_rc;
  1546. mxq_u2 key_id = (is_encrypt == 1) ? 1 : 0;
  1547. mxq_algo_id_t algo_id = 0;
  1548. if (! ssl->maxq_ctx.use_hw_keys) {
  1549. return NOT_COMPILED_IN;
  1550. }
  1551. if ((ssl->specs.bulk_cipher_algorithm != wolfssl_aes_gcm) &&
  1552. (ssl->specs.bulk_cipher_algorithm != wolfssl_aes_ccm)) {
  1553. WOLFSSL_MSG("MAXQ: tls record cipher algo not supported");
  1554. return NOT_COMPILED_IN;
  1555. }
  1556. if (ssl->specs.bulk_cipher_algorithm == wolfssl_aes_gcm) {
  1557. algo_id = ALGO_CIPHER_AES_GCM;
  1558. }
  1559. else if (ssl->specs.bulk_cipher_algorithm == wolfssl_aes_ccm) {
  1560. algo_id = ALGO_CIPHER_AES_CCM;
  1561. }
  1562. rc = wolfSSL_CryptHwMutexLock();
  1563. if (rc != 0) {
  1564. return rc;
  1565. }
  1566. mxq_rc = maxq10xx_cipher_do(algo_id, is_encrypt, key_id, (mxq_u1 *)in,
  1567. out, sz, (mxq_u1 *)iv, ivSz,
  1568. (mxq_u1 *)authIn, authInSz, authTag, authTagSz);
  1569. if (mxq_rc) {
  1570. WOLFSSL_ERROR_MSG("MAXQ: maxq10xx_cipher_do() failed");
  1571. wolfSSL_CryptHwMutexUnLock();
  1572. return WC_HW_E;
  1573. }
  1574. wolfSSL_CryptHwMutexUnLock();
  1575. return 0;
  1576. }
  1577. static int maxq10xx_read_device_cert_der(byte* p_dest_buff, word32* p_len)
  1578. {
  1579. int rc;
  1580. mxq_err_t mxq_rc;
  1581. word32 cert_size = 0;
  1582. #if defined(WOLFSSL_MAXQ108X)
  1583. DecodedCert decoded;
  1584. mxq_keyparam_id_t keyparam = MXQ_KEYPARAM_EC_P256R1;
  1585. int pk_offset = 0;
  1586. #endif
  1587. WOLFSSL_ENTER("maxq10xx_read_device_cert_der");
  1588. if (!p_dest_buff || !p_len) {
  1589. return BAD_FUNC_ARG;
  1590. }
  1591. if (*p_len < 1024) {
  1592. WOLFSSL_ERROR_MSG("MAXQ: insufficient buffer length");
  1593. return BAD_FUNC_ARG;
  1594. }
  1595. rc = wolfSSL_CryptHwMutexLock();
  1596. if (rc != 0) {
  1597. return rc;
  1598. }
  1599. mxq_rc = MXQ_ReadObject(DEVICE_CERT_OBJ_ID, 24, p_dest_buff, p_len);
  1600. if (mxq_rc) {
  1601. WOLFSSL_ERROR_MSG("MAXQ: MXQ_ReadObject() failed");
  1602. wolfSSL_CryptHwMutexUnLock();
  1603. return WC_HW_E;
  1604. }
  1605. wolfSSL_CryptHwMutexUnLock();
  1606. #if defined(WOLFSSL_MAXQ108X)
  1607. wc_InitDecodedCert(&decoded, p_dest_buff, *p_len, NULL);
  1608. wc_ParseCert(&decoded, CERT_TYPE, NO_VERIFY, NULL);
  1609. pk_offset = decoded.publicKeyIndex;
  1610. if (decoded.keyOID == ECDSAk ) {
  1611. keyparam = maxq_curve_wolfssl_id2mxq_id(decoded.pkCurveOID,
  1612. (unsigned int *)&device_key_len);
  1613. if (keyparam == MXQ_UNKNOWN_CURVE) {
  1614. WOLFSSL_MSG("MAXQ: key curve not supported");
  1615. return NOT_COMPILED_IN;
  1616. }
  1617. }
  1618. else if (decoded.keyOID == RSAk) {
  1619. pk_offset = calculate_modulus_offset(decoded.source,
  1620. decoded.publicKeyIndex+1);
  1621. device_key_len = ((decoded.source[pk_offset-2] << 8) |
  1622. decoded.source[pk_offset-1]);
  1623. }
  1624. #endif
  1625. cert_size = (p_dest_buff[2] << 8) + p_dest_buff[3] + 4;
  1626. if (*p_len < cert_size) {
  1627. return BUFFER_E;
  1628. }
  1629. *p_len = cert_size;
  1630. return 0;
  1631. }
  1632. #if defined(WOLFSSL_MAXQ10XX_TLS)
  1633. int wolfSSL_maxq10xx_load_certificate(WOLFSSL *ssl) {
  1634. DerBuffer* maxq_der = NULL;
  1635. int ret = 0;
  1636. ret = AllocDer(&maxq_der, FILE_BUFFER_SIZE, CERT_TYPE, ssl->heap);
  1637. if (ret != 0) {
  1638. return ret;
  1639. }
  1640. ret = maxq10xx_read_device_cert_der(maxq_der->buffer,
  1641. &maxq_der->length);
  1642. if (ret != 0) {
  1643. return ret;
  1644. }
  1645. ssl->maxq_ctx.device_cert = maxq_der;
  1646. if (ssl->buffers.weOwnCert) {
  1647. FreeDer(&ssl->buffers.certificate);
  1648. }
  1649. ssl->buffers.certificate = maxq_der;
  1650. ssl->buffers.weOwnCert = 1;
  1651. return WOLFSSL_SUCCESS;
  1652. }
  1653. #endif /* WOLFSSL_MAXQ10XX_TLS */
  1654. static int maxq10xx_ecc_sign(WOLFSSL* ssl,
  1655. const unsigned char* p_in, unsigned int p_in_len,
  1656. unsigned char* p_out, word32* p_out_len,
  1657. const unsigned char* keyDer, unsigned int keySz, void* ctx)
  1658. {
  1659. int rc;
  1660. (void)ssl;
  1661. (void)keyDer;
  1662. (void)keySz;
  1663. (void)ctx;
  1664. rc = wolfSSL_CryptHwMutexLock();
  1665. if (rc != 0) {
  1666. return rc;
  1667. }
  1668. rc = maxq10xx_ecc_sign_local(DEVICE_KEY_PAIR_OBJ_ID, (byte *)p_in, p_in_len,
  1669. p_out, p_out_len, device_key_len);
  1670. wolfSSL_CryptHwMutexUnLock();
  1671. if (rc) {
  1672. WOLFSSL_ERROR_MSG("MAXQ: maxq10xx_ecc_sign() failed");
  1673. return rc;
  1674. }
  1675. return 0;
  1676. }
  1677. #endif /* WOLFSSL_MAXQ10XX_TLS */
  1678. int maxq10xx_port_init(void)
  1679. {
  1680. int ret = 0;
  1681. mxq_err_t mxq_rc;
  1682. #ifdef WOLF_CRYPTO_CB
  1683. ret = wc_CryptoCb_RegisterDevice(0, wolfSSL_Soft_CryptoDevCb, NULL);
  1684. if (ret != 0) {
  1685. WOLFSSL_ERROR_MSG("MAXQ: wolfSSL_Soft_CryptoDevCb, "
  1686. "wc_CryptoCb_RegisterDevice() failed");
  1687. return ret;
  1688. }
  1689. #endif
  1690. ret = maxq_CryptHwMutexTryLock();
  1691. if (ret) {
  1692. WOLFSSL_ERROR_MSG("MAXQ: maxq10xx_port_init() -> device is busy "
  1693. "(switching to soft mode)");
  1694. return 0;
  1695. }
  1696. mxq_rc = MXQ_Module_Init();
  1697. if (mxq_rc) {
  1698. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Module_Init() failed");
  1699. ret = WC_HW_E;
  1700. }
  1701. wolfSSL_CryptHwMutexUnLock();
  1702. #if defined(WOLF_CRYPTO_CB)
  1703. if (ret == 0) {
  1704. ret = wc_CryptoCb_RegisterDevice(MAXQ_DEVICE_ID,
  1705. wolfSSL_MAXQ10XX_CryptoDevCb, NULL);
  1706. if (ret != 0) {
  1707. WOLFSSL_ERROR_MSG("MAXQ: wolfSSL_MAXQ10XX_CryptoDevCb, "
  1708. "wc_CryptoCb_RegisterDevice() failed");
  1709. }
  1710. }
  1711. #endif
  1712. return ret;
  1713. }
  1714. /* This basically does all the work that SendClientKeyExchange() does in the
  1715. * case of ECDSA. That's because if a callback is defined, almost nothing is
  1716. * done in SendClientKeyExchange(). */
  1717. static int maxq10xx_tls12_ecc_shared_secret(WOLFSSL* ssl, ecc_key* otherKey,
  1718. unsigned char* pubKeyDer, word32* pubKeySz,
  1719. unsigned char* out, word32* outlen,
  1720. int side, void* ctx)
  1721. {
  1722. int rc;
  1723. mxq_err_t mxq_rc;
  1724. ecc_key *p_key = NULL;
  1725. mxq_length key_len_param;
  1726. mxq_u1* server_public_key_param;
  1727. mxq_u2 csid_param = ssl->options.cipherSuite |
  1728. (ssl->options.cipherSuite0 << 8);
  1729. byte result_public_key[1 + (2 * ECC256_KEYSIZE)];
  1730. (void)ctx;
  1731. (void)otherKey;
  1732. (void)out;
  1733. (void)outlen;
  1734. (void)side;
  1735. WOLFSSL_ENTER("maxq10xx_ecc_shared_secret");
  1736. if (ssl->specs.kea != ecc_diffie_hellman_kea) {
  1737. WOLFSSL_MSG("MAXQ: key exchange algo not supported");
  1738. return NOT_COMPILED_IN;
  1739. }
  1740. if (ssl->ecdhCurveOID != ECC_SECP256R1_OID) {
  1741. WOLFSSL_MSG("MAXQ: key curve not supported");
  1742. return NOT_COMPILED_IN;
  1743. }
  1744. ssl->hsType = DYNAMIC_TYPE_ECC;
  1745. rc = AllocKey(ssl, ssl->hsType, &ssl->hsKey);
  1746. if (rc != 0) {
  1747. return rc;
  1748. }
  1749. p_key = (ecc_key*)ssl->hsKey;
  1750. rc = wolfSSL_CryptHwMutexLock();
  1751. if (rc != 0) {
  1752. return rc;
  1753. }
  1754. XMEMSET(result_public_key, 0, sizeof(result_public_key));
  1755. server_public_key_param = NULL;
  1756. key_len_param = sizeof(result_public_key);
  1757. mxq_rc = MXQ_Ecdh_Compute_Shared(MXQ_KEYPARAM_EC_P256R1,
  1758. server_public_key_param, result_public_key,
  1759. key_len_param, csid_param);
  1760. if (mxq_rc) {
  1761. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Ecdh_Compute_Shared() failed");
  1762. wolfSSL_CryptHwMutexUnLock();
  1763. return WC_HW_E;
  1764. }
  1765. wolfSSL_CryptHwMutexUnLock();
  1766. /* client public key */
  1767. p_key->state = 0;
  1768. rc = wc_ecc_set_curve(p_key, ECC256_KEYSIZE, ECC_SECP256R1);
  1769. if (rc != 0) {
  1770. WOLFSSL_ERROR_MSG("MAXQ: wc_ecc_set_curve() failed");
  1771. return rc;
  1772. }
  1773. p_key->flags = WC_ECC_FLAG_NONE;
  1774. p_key->type = ECC_PUBLICKEY;
  1775. rc = mp_read_unsigned_bin(p_key->pubkey.x, &result_public_key[1],
  1776. ECC256_KEYSIZE);
  1777. if (rc != 0) {
  1778. WOLFSSL_ERROR_MSG("MAXQ: mp_read_unsigned_bin() failed");
  1779. return rc;
  1780. }
  1781. rc = mp_read_unsigned_bin(p_key->pubkey.y,
  1782. &result_public_key[1 + ECC256_KEYSIZE],
  1783. ECC256_KEYSIZE);
  1784. if (rc != 0) {
  1785. WOLFSSL_ERROR_MSG("MAXQ: mp_read_unsigned_bin() failed");
  1786. return rc;
  1787. }
  1788. p_key->maxq_ctx.hw_storage = 1;
  1789. PRIVATE_KEY_UNLOCK();
  1790. rc = wc_ecc_export_x963(p_key, pubKeyDer, pubKeySz);
  1791. PRIVATE_KEY_LOCK();
  1792. return rc;
  1793. }
  1794. #ifdef WOLFSSL_MAXQ108X
  1795. static int wc_MAXQ10XX_HmacSetKey(int type)
  1796. {
  1797. mxq_algo_id_t algo;
  1798. int rc;
  1799. mxq_err_t mxq_rc;
  1800. if (!tls13active) {
  1801. return NOT_COMPILED_IN;
  1802. }
  1803. if (type == WC_SHA256) {
  1804. algo = ALGO_HMAC_SHA256;
  1805. }
  1806. else if (type == WC_SHA384) {
  1807. algo = ALGO_HMAC_SHA384;
  1808. }
  1809. else {
  1810. return NOT_COMPILED_IN;
  1811. }
  1812. if (tls13_server_finish_obj_id != -1) {
  1813. free_temp_key_id(*tls13_server_key_id);
  1814. *tls13_server_key_id = -1;
  1815. mac_key_obj_id = &tls13_server_finish_obj_id;
  1816. }
  1817. else if (tls13_client_finish_obj_id != -1) {
  1818. mac_key_obj_id = &tls13_client_finish_obj_id;
  1819. }
  1820. if (mac_key_obj_id == NULL) {
  1821. WOLFSSL_MSG("MAXQ: wc_MAXQ10XX_HmacSetKey No MAC Key is set");
  1822. return NOT_COMPILED_IN;
  1823. }
  1824. rc = wolfSSL_CryptHwMutexLock();
  1825. if (rc != 0) {
  1826. return rc;
  1827. }
  1828. mxq_rc = MXQ_MAC_Init(0x02, algo, *mac_key_obj_id, NULL, 0);
  1829. wolfSSL_CryptHwMutexUnLock();
  1830. if (mxq_rc == 0) {
  1831. mac_comp_active = 1;
  1832. }
  1833. else {
  1834. WOLFSSL_ERROR_MSG("MAXQ: MXQ_MAC_Init() failed");
  1835. rc = WC_HW_E;
  1836. }
  1837. return rc;
  1838. }
  1839. static int wc_MAXQ10XX_HmacUpdate(const byte* msg, word32 length)
  1840. {
  1841. int rc;
  1842. mxq_err_t mxq_rc;
  1843. if (!tls13active || !mac_comp_active) {
  1844. return NOT_COMPILED_IN;
  1845. }
  1846. rc = wolfSSL_CryptHwMutexLock();
  1847. if (rc != 0) {
  1848. return rc;
  1849. }
  1850. mxq_rc = MXQ_MAC_Update((unsigned char *)msg, length);
  1851. wolfSSL_CryptHwMutexUnLock();
  1852. if (mxq_rc) {
  1853. WOLFSSL_ERROR_MSG("MAXQ: MXQ_MAC_Update() failed");
  1854. rc = WC_HW_E;
  1855. }
  1856. return rc;
  1857. }
  1858. static int wc_MAXQ10XX_HmacFinal(byte* hash)
  1859. {
  1860. int rc;
  1861. mxq_err_t mxq_rc;
  1862. mxq_length maclen = 64;
  1863. if (!tls13active || !mac_comp_active) {
  1864. return NOT_COMPILED_IN;
  1865. }
  1866. rc = wolfSSL_CryptHwMutexLock();
  1867. if (rc != 0) {
  1868. return rc;
  1869. }
  1870. mxq_rc = MXQ_MAC_Finish(hash, &maclen);
  1871. wolfSSL_CryptHwMutexUnLock();
  1872. if (mxq_rc) {
  1873. WOLFSSL_ERROR_MSG("MAXQ: MXQ_MAC_Finish() failed");
  1874. rc = WC_HW_E;
  1875. }
  1876. free_temp_key_id(*mac_key_obj_id);
  1877. *mac_key_obj_id = -1;
  1878. mac_key_obj_id = NULL;
  1879. mac_comp_active = 0;
  1880. return rc;
  1881. }
  1882. static int maxq10xx_create_dh_key(byte* p, word32 pSz, byte* g, word32 gSz,
  1883. byte* pub, word32* pubSz)
  1884. {
  1885. int rc;
  1886. mxq_err_t mxq_rc;
  1887. WOLFSSL_ENTER("maxq10xx_create_dh_key");
  1888. if (!tls13active) {
  1889. return NOT_COMPILED_IN;
  1890. }
  1891. *pubSz = pSz;
  1892. if (tls13_dh_obj_id == -1) {
  1893. tls13_dh_obj_id = alloc_temp_key_id();
  1894. if (tls13_dh_obj_id == -1) {
  1895. WOLFSSL_MSG("MAXQ: alloc_temp_key_id() failed");
  1896. rc = NOT_COMPILED_IN;
  1897. return rc;
  1898. }
  1899. }
  1900. rc = wolfSSL_CryptHwMutexLock();
  1901. if (rc != 0) {
  1902. return rc;
  1903. }
  1904. mxq_rc = MXQ_TLS13_Generate_Key(pub, tls13_dh_obj_id, 0, MXQ_KEYPARAM_DHE,
  1905. pSz, p, gSz, g);
  1906. wolfSSL_CryptHwMutexUnLock();
  1907. if (mxq_rc) {
  1908. WOLFSSL_ERROR_MSG("MAXQ: MXQ_TLS13_Generate_Key() failed");
  1909. rc = WC_HW_E;
  1910. }
  1911. return rc;
  1912. }
  1913. static int maxq10xx_dh_gen_key_pair(DhKey* key, WC_RNG* rng,
  1914. byte* priv, word32* privSz,
  1915. byte* pub, word32* pubSz) {
  1916. word32 p_size, g_size;
  1917. unsigned char pbuf[256], gbuf[4];
  1918. (void)rng;
  1919. (void)priv;
  1920. (void)privSz;
  1921. p_size = mp_unsigned_bin_size(&key->p);
  1922. mp_to_unsigned_bin(&key->p, pbuf);
  1923. g_size = mp_unsigned_bin_size(&key->g);
  1924. mp_to_unsigned_bin(&key->g, gbuf);
  1925. return maxq10xx_create_dh_key(pbuf, p_size, gbuf, g_size, pub, pubSz);
  1926. }
  1927. static int maxq10xx_dh_agree(WOLFSSL* ssl, struct DhKey* key,
  1928. const unsigned char* priv, unsigned int privSz,
  1929. const unsigned char* pubKeyDer, unsigned int pubKeySz,
  1930. unsigned char* out, unsigned int* outlen,
  1931. void* ctx)
  1932. {
  1933. int rc;
  1934. mxq_err_t mxq_rc;
  1935. (void)ctx;
  1936. (void)key;
  1937. (void)priv;
  1938. (void)privSz;
  1939. WOLFSSL_ENTER("maxq10xx_dh_agree");
  1940. mxq_u2 csid_param = ssl->options.cipherSuite |
  1941. (ssl->options.cipherSuite0 << 8);
  1942. if (tls13_dh_obj_id == -1) {
  1943. WOLFSSL_ERROR_MSG("MAXQ: DH key is not created before");
  1944. rc = NOT_COMPILED_IN;
  1945. return rc;
  1946. }
  1947. if (tls13_shared_secret_obj_id == -1) {
  1948. tls13_shared_secret_obj_id = alloc_temp_key_id();
  1949. if (tls13_shared_secret_obj_id == -1) {
  1950. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  1951. return NOT_COMPILED_IN;
  1952. }
  1953. }
  1954. rc = wolfSSL_CryptHwMutexLock();
  1955. if (rc != 0) {
  1956. return rc;
  1957. }
  1958. mxq_rc = MXQ_TLS13_Create_Secret((unsigned char*)pubKeyDer, pubKeySz,
  1959. tls13_dh_obj_id, 0, MXQ_KEYPARAM_DHE,
  1960. csid_param, tls13_shared_secret_obj_id,
  1961. out, outlen);
  1962. wolfSSL_CryptHwMutexUnLock();
  1963. if (mxq_rc) {
  1964. WOLFSSL_ERROR_MSG("MAXQ: wolfSSL_CryptHwMutexUnLock() failed");
  1965. rc = WC_HW_E;
  1966. }
  1967. *outlen = pubKeySz;
  1968. free_temp_key_id(tls13_dh_obj_id);
  1969. tls13_dh_obj_id = -1;
  1970. free_temp_key_id(tls13_ecc_obj_id);
  1971. tls13_ecc_obj_id = -1;
  1972. return rc;
  1973. }
  1974. static int maxq10xx_ecc_key_gen(WOLFSSL* ssl, ecc_key* key, word32 keySz,
  1975. int ecc_curve, void* ctx)
  1976. {
  1977. int rc;
  1978. mxq_err_t mxq_rc;
  1979. unsigned char mxq_key[MAX_EC_KEY_SIZE];
  1980. (void)ctx;
  1981. (void)ssl;
  1982. WOLFSSL_ENTER("maxq10xx_ecc_key_gen");
  1983. if (tls13_ecc_obj_id == -1) {
  1984. tls13_ecc_obj_id = alloc_temp_key_id();
  1985. if (tls13_ecc_obj_id == -1) {
  1986. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  1987. rc = NOT_COMPILED_IN;
  1988. return rc;
  1989. }
  1990. }
  1991. rc = wolfSSL_CryptHwMutexLock();
  1992. if (rc != 0) {
  1993. return rc;
  1994. }
  1995. mxq_rc = MXQ_TLS13_Generate_Key(mxq_key, tls13_ecc_obj_id, MXQ_KEYTYPE_ECC,
  1996. getMaxqKeyParamFromCurve(key->dp->id),
  1997. keySz, NULL, 0, NULL);
  1998. wolfSSL_CryptHwMutexUnLock();
  1999. if (mxq_rc) {
  2000. WOLFSSL_ERROR_MSG("MAXQ: MXQ_TLS13_Generate_Key() failed");
  2001. return WC_HW_E;
  2002. }
  2003. rc = wc_ecc_import_unsigned(key, (byte*)mxq_key, (byte*)mxq_key + keySz,
  2004. NULL, ecc_curve);
  2005. if (rc) {
  2006. WOLFSSL_ERROR_MSG("MAXQ: wc_ecc_import_raw_ex() failed");
  2007. }
  2008. return rc;
  2009. }
  2010. static int maxq10xx_ecc_verify(WOLFSSL* ssl, const byte* sig,
  2011. word32 sigSz, const byte* hash,
  2012. word32 hashSz, const byte* key,
  2013. word32 keySz, int* result, void* ctx)
  2014. {
  2015. int rc;
  2016. (void)ssl;
  2017. (void)key;
  2018. (void)keySz;
  2019. (void)ctx;
  2020. WOLFSSL_ENTER("maxq10xx_ecc_verify");
  2021. if (!tls13active) {
  2022. return CRYPTOCB_UNAVAILABLE;
  2023. }
  2024. if (tls13_server_key_algo != ECDSAk) {
  2025. return CRYPTOCB_UNAVAILABLE;
  2026. }
  2027. rc = wolfSSL_CryptHwMutexLock();
  2028. if (rc != 0) {
  2029. return rc;
  2030. }
  2031. rc = maxq10xx_ecc_verify_local(tls13_server_cert_id, (mxq_u1*)hash, hashSz,
  2032. (mxq_u1*)sig, sigSz,
  2033. result, tls13_server_key_len);
  2034. wolfSSL_CryptHwMutexUnLock();
  2035. return rc;
  2036. }
  2037. static int maxq10xx_tls13_ecc_shared_secret(WOLFSSL* ssl, ecc_key* otherKey,
  2038. unsigned char* pubKeyDer, word32* pubKeySz,
  2039. unsigned char* out, word32* outlen,
  2040. int side, void* ctx)
  2041. {
  2042. int rc;
  2043. mxq_err_t mxq_rc;
  2044. word32 peerKeySz = otherKey->dp->size;
  2045. uint8_t peerKeyBuf[MAX_EC_KEY_SIZE];
  2046. uint8_t* peerKey = peerKeyBuf;
  2047. uint8_t* qx = peerKey;
  2048. uint8_t* qy = &peerKey[peerKeySz];
  2049. word32 qxLen = peerKeySz, qyLen = peerKeySz;
  2050. mxq_u2 csid_param = ssl->options.cipherSuite |
  2051. (ssl->options.cipherSuite0 << 8);
  2052. (void)ctx;
  2053. (void)pubKeyDer;
  2054. (void)side;
  2055. (void)pubKeySz;
  2056. WOLFSSL_ENTER("maxq10xx_ecc_shared_secret");
  2057. rc = wc_ecc_export_public_raw(otherKey, qx, &qxLen, qy, &qyLen);
  2058. if (tls13_ecc_obj_id == -1) {
  2059. WOLFSSL_ERROR_MSG("MAXQ: ECDHE key is not created before");
  2060. rc = NOT_COMPILED_IN;
  2061. return rc;
  2062. }
  2063. if (tls13_shared_secret_obj_id == -1) {
  2064. tls13_shared_secret_obj_id = alloc_temp_key_id();
  2065. if (tls13_shared_secret_obj_id == -1) {
  2066. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2067. return NOT_COMPILED_IN;
  2068. }
  2069. }
  2070. rc = wolfSSL_CryptHwMutexLock();
  2071. if (rc != 0) {
  2072. return rc;
  2073. }
  2074. mxq_rc = MXQ_TLS13_Create_Secret(peerKey, (2*peerKeySz), tls13_ecc_obj_id,
  2075. MXQ_KEYTYPE_ECC,
  2076. getMaxqKeyParamFromCurve(otherKey->dp->id),
  2077. csid_param, tls13_shared_secret_obj_id,
  2078. out, outlen);
  2079. wolfSSL_CryptHwMutexUnLock();
  2080. if (mxq_rc) {
  2081. WOLFSSL_ERROR_MSG("MAXQ: MXQ_TLS13_Create_Secret() failed");
  2082. rc = WC_HW_E;
  2083. }
  2084. *outlen = otherKey->dp->size;
  2085. free_temp_key_id(tls13_dh_obj_id);
  2086. tls13_dh_obj_id = -1;
  2087. free_temp_key_id(tls13_ecc_obj_id);
  2088. tls13_ecc_obj_id = -1;
  2089. return rc;
  2090. }
  2091. static int maxq10xx_rsa_pss_verify_ex(WOLFSSL* ssl,
  2092. byte* hashed_msg, word32 hashed_msg_sz,
  2093. byte* pss_sign, word32 pss_signlen,
  2094. int isCertId)
  2095. {
  2096. mxq_u2 pubkey_objectid;
  2097. int ret;
  2098. mxq_err_t mxq_rc;
  2099. (void)ssl;
  2100. WOLFSSL_ENTER("maxq10xx_rsa_pss_verify_ex");
  2101. if (!tls13active) {
  2102. return NOT_COMPILED_IN;
  2103. }
  2104. if (isCertId) {
  2105. pubkey_objectid = tls13_server_cert_id;
  2106. }
  2107. else {
  2108. pubkey_objectid = DEVICE_KEY_PAIR_OBJ_ID;
  2109. }
  2110. ret = wolfSSL_CryptHwMutexLock();
  2111. if (ret != 0) {
  2112. return ret;
  2113. }
  2114. mxq_rc = MXQ_Verify(ALGO_RSASSAPSSPKCS1_V2_1_PLAIN, pubkey_objectid,
  2115. hashed_msg, hashed_msg_sz, pss_sign, pss_signlen);
  2116. wolfSSL_CryptHwMutexUnLock();
  2117. if (mxq_rc) {
  2118. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Verify() failed");
  2119. ret = WC_HW_E;
  2120. }
  2121. return ret;
  2122. }
  2123. /* This will do all the work that is normally done in RsaVerify() and
  2124. * CheckRSASignature(). That is why at the bottom, we release the key. Because
  2125. * verification has been completed and CheckRSASignature() should be skipped.
  2126. * The same reasoning for maxq10xx_RsaSkipSignCheck() doing nothing. */
  2127. static int maxq10xx_rsa_pss_verify(WOLFSSL* ssl,
  2128. unsigned char* in, unsigned int inSz,
  2129. unsigned char** out, int hash, int mgf,
  2130. const unsigned char* key, unsigned int keySz,
  2131. void* ctx) {
  2132. int ret = 0;
  2133. byte sigData[MAX_SIG_DATA_SZ];
  2134. word16 sigDataSz;
  2135. word32 sigSz;
  2136. (void)out;
  2137. (void)mgf;
  2138. (void)key;
  2139. (void)keySz;
  2140. (void)ctx;
  2141. if (hash == SHA256h) {
  2142. hash = sha256_mac;
  2143. }
  2144. else if (hash == SHA384h) {
  2145. hash = sha384_mac;
  2146. }
  2147. else if (hash == SHA512h) {
  2148. hash = sha512_mac;
  2149. }
  2150. else {
  2151. return BAD_FUNC_ARG;
  2152. }
  2153. ret = CreateSigData(ssl, sigData, &sigDataSz, 1);
  2154. if (ret != 0)
  2155. return ret;
  2156. /* PSS signature can be done in-place */
  2157. ret = CreateRSAEncodedSig(sigData, sigData, sigDataSz,
  2158. rsa_pss_sa_algo, hash);
  2159. if (ret < 0)
  2160. return ret;
  2161. sigSz = ret;
  2162. ret = maxq10xx_rsa_pss_verify_ex(ssl, sigData, sigSz, in, inSz, 1);
  2163. if (ret == 0) {
  2164. /* This ensures call to CheckRSASignature() is skipped. */
  2165. ssl->peerRsaKeyPresent = 0;
  2166. FreeKey(ssl, DYNAMIC_TYPE_RSA, (void**)&ssl->peerRsaKey);
  2167. ssl->options.peerAuthGood = 1;
  2168. }
  2169. return ret;
  2170. }
  2171. static int maxq10xx_skip_sign_check(WOLFSSL* ssl,
  2172. unsigned char* sig, unsigned int sigSz,
  2173. unsigned char** out, int hash, int mgf,
  2174. const unsigned char* key, unsigned int keySz,
  2175. void* ctx) {
  2176. (void)ssl;
  2177. (void)sig;
  2178. (void)sigSz;
  2179. (void)out;
  2180. (void)hash;
  2181. (void)mgf;
  2182. (void)key;
  2183. (void)keySz;
  2184. (void)ctx;
  2185. return 0;
  2186. }
  2187. static int maxq10xx_rsa_pss_sign(WOLFSSL* ssl, const byte* in, word32 inSz,
  2188. byte* out, word32* outSz, int hash, int mgf,
  2189. const byte* key, word32 keySz, void* ctx)
  2190. {
  2191. int ret;
  2192. mxq_err_t mxq_rc;
  2193. (void)ssl;
  2194. (void)hash;
  2195. (void)mgf;
  2196. (void)key;
  2197. (void)keySz;
  2198. (void)ctx;
  2199. WOLFSSL_ENTER("maxq10xx_rsa_pss_sign");
  2200. if (!tls13active) {
  2201. return NOT_COMPILED_IN;
  2202. }
  2203. ret = wolfSSL_CryptHwMutexLock();
  2204. if (ret != 0) {
  2205. return ret;
  2206. }
  2207. mxq_rc = MXQ_Sign(ALGO_RSASSAPSSPKCS1_V2_1_PLAIN, DEVICE_KEY_PAIR_OBJ_ID,
  2208. in, inSz, out, outSz);
  2209. wolfSSL_CryptHwMutexUnLock();
  2210. if (mxq_rc) {
  2211. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Sign() failed");
  2212. return WC_HW_E;
  2213. }
  2214. ret = wolfSSL_CryptHwMutexLock();
  2215. if (ret != 0) {
  2216. return ret;
  2217. }
  2218. mxq_rc = MXQ_Verify(ALGO_RSASSAPSSPKCS1_V2_1_PLAIN, DEVICE_KEY_PAIR_OBJ_ID,
  2219. in, inSz, out, *outSz);
  2220. wolfSSL_CryptHwMutexUnLock();
  2221. if (mxq_rc) {
  2222. WOLFSSL_ERROR_MSG("MAXQ: MXQ_Verify() failed");
  2223. return WC_HW_E;
  2224. }
  2225. return ret;
  2226. }
  2227. #ifdef HAVE_HKDF
  2228. static int maxq10xx_hkdf_extract(byte* prk, const byte* salt, word32 saltLen,
  2229. byte* ikm, word32 ikmLen, int digest, void* ctx)
  2230. {
  2231. int rc;
  2232. mxq_err_t mxq_rc;
  2233. mxq_length prk_len = 0;
  2234. mxq_algo_id_t mxq_digest_id = ALGO_INVALID;
  2235. int salt_kid = -1, ikm_kid = -1, ret_kid = -1;
  2236. (void)ctx;
  2237. switch (digest) {
  2238. #ifndef NO_SHA256
  2239. case WC_SHA256:
  2240. prk_len = WC_SHA256_DIGEST_SIZE;
  2241. mxq_digest_id = ALGO_MD_SHA256;
  2242. break;
  2243. #endif
  2244. #ifdef WOLFSSL_SHA384
  2245. case WC_SHA384:
  2246. prk_len = WC_SHA384_DIGEST_SIZE;
  2247. mxq_digest_id = ALGO_MD_SHA384;
  2248. break;
  2249. #endif
  2250. #ifdef WOLFSSL_TLS13_SHA512
  2251. case WC_SHA512:
  2252. prk_len = WC_SHA512_DIGEST_SIZE;
  2253. mxq_digest_id = ALGO_MD_SHA512;
  2254. break;
  2255. #endif
  2256. default:
  2257. return BAD_FUNC_ARG;
  2258. }
  2259. /* Prepare key id parameters */
  2260. if (saltLen != 0 && ikmLen != 0) {
  2261. /* handshake_secret = HKDF-Extract(salt: derived_secret,
  2262. * key: shared_secret) */
  2263. if (tls13_handshake_secret_obj_id == -1) {
  2264. tls13_handshake_secret_obj_id = alloc_temp_key_id();
  2265. if (tls13_handshake_secret_obj_id == -1) {
  2266. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2267. return NOT_COMPILED_IN;
  2268. }
  2269. }
  2270. salt_kid = tls13_derived_secret_obj_id;
  2271. ikm_kid = tls13_shared_secret_obj_id;
  2272. ret_kid = tls13_handshake_secret_obj_id;
  2273. free_temp_key_id(tls13_derived_secret_obj_id);
  2274. tls13_derived_secret_obj_id = -1;
  2275. }
  2276. else if (saltLen != 0 && ikmLen == 0) {
  2277. /* master_secret = HKDF-Extract(salt: derived_secret,
  2278. * key: 00...) */
  2279. if (tls13_master_secret_obj_id == -1) {
  2280. tls13_master_secret_obj_id = alloc_temp_key_id();
  2281. if (tls13_master_secret_obj_id == -1) {
  2282. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2283. return NOT_COMPILED_IN;
  2284. }
  2285. }
  2286. salt_kid = tls13_derived_secret_obj_id;
  2287. ikm_kid = -1;
  2288. ret_kid = tls13_master_secret_obj_id;
  2289. free_temp_key_id(tls13_derived_secret_obj_id);
  2290. tls13_derived_secret_obj_id = -1;
  2291. }
  2292. else if (saltLen == 0 && ikmLen == 0) {
  2293. /* early_secret = HKDF-Extract(salt: 00, key: 00...) */
  2294. if (tls13_early_secret_obj_id == -1) {
  2295. tls13_early_secret_obj_id = alloc_temp_key_id();
  2296. if (tls13_early_secret_obj_id == -1) {
  2297. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2298. return NOT_COMPILED_IN;
  2299. }
  2300. }
  2301. salt_kid = -1;
  2302. ikm_kid = -1;
  2303. ret_kid = tls13_early_secret_obj_id;
  2304. tls13early = 1;
  2305. }
  2306. else if (saltLen == 0 && ikmLen != 0) {
  2307. /* early_secret = HKDF-Extract(salt: 00, key: 00...) */
  2308. if (tls13_hs_early_secret_obj_id == -1) {
  2309. tls13_hs_early_secret_obj_id = alloc_temp_key_id();
  2310. if (tls13_hs_early_secret_obj_id == -1) {
  2311. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2312. return NOT_COMPILED_IN;
  2313. }
  2314. }
  2315. salt_kid = -1;
  2316. ikm_kid = PSK_KID;
  2317. ret_kid = tls13_hs_early_secret_obj_id;
  2318. tls13early = 1;
  2319. }
  2320. else {
  2321. WOLFSSL_MSG("MAXQ: MXQ_TLS13_Extract_Secret() does not support");
  2322. return NOT_COMPILED_IN;
  2323. }
  2324. /* When length is 0 then use zeroed data of digest length. */
  2325. if (ikmLen == 0) {
  2326. ikmLen = prk_len;
  2327. XMEMSET(ikm, 0, prk_len);
  2328. }
  2329. if (salt_kid != -1) {
  2330. saltLen = 0;
  2331. }
  2332. if (ikm_kid != -1) {
  2333. ikmLen = 0;
  2334. }
  2335. if (ret_kid != -1) {
  2336. XMEMSET(prk, 0, prk_len);
  2337. prk_len = 0;
  2338. }
  2339. rc = wolfSSL_CryptHwMutexLock();
  2340. if (rc != 0) {
  2341. return rc;
  2342. }
  2343. mxq_rc = MXQ_TLS13_Extract_Secret(mxq_digest_id, (mxq_u2)ret_kid,
  2344. prk, &prk_len, (mxq_u2)salt_kid,
  2345. salt, (mxq_u2)saltLen,
  2346. (mxq_u2)ikm_kid, ikm, (mxq_u2)ikmLen);
  2347. if (mxq_rc) {
  2348. WOLFSSL_ERROR_MSG("MAXQ: MXQ_TLS13_Extract_Secret() failed");
  2349. wolfSSL_CryptHwMutexUnLock();
  2350. return WC_HW_E;
  2351. }
  2352. wolfSSL_CryptHwMutexUnLock();
  2353. return 0;
  2354. }
  2355. static char *strstr_with_size(char *str, const char *substr, size_t n)
  2356. {
  2357. char *p = str, *pEnd = str + n;
  2358. size_t substr_len = XSTRLEN(substr);
  2359. if (substr_len == 0) {
  2360. return str;
  2361. }
  2362. pEnd -= (substr_len - 1);
  2363. for (;p < pEnd; ++p) {
  2364. if (0 == XSTRNCMP(p, substr, substr_len))
  2365. return p;
  2366. }
  2367. return NULL;
  2368. }
  2369. static int maxq10xx_HkdfExpand(int digest, const byte* inKey, word32 inKeySz,
  2370. const byte* info, word32 infoSz, byte* out,
  2371. word32 outSz, int side)
  2372. {
  2373. int rc;
  2374. mxq_err_t mxq_rc;
  2375. mxq_algo_id_t mxq_digest_id = ALGO_INVALID;
  2376. mxq_keytype_id_t ret_keytype = MXQ_KEYTYPE_IKM;
  2377. int prk_kid = -1, ret_kid = -1;
  2378. int ret_isiv = 0;
  2379. switch (digest) {
  2380. #ifndef NO_SHA256
  2381. case WC_SHA256:
  2382. mxq_digest_id = ALGO_MD_SHA256;
  2383. break;
  2384. #endif
  2385. #ifdef WOLFSSL_SHA384
  2386. case WC_SHA384:
  2387. mxq_digest_id = ALGO_MD_SHA384;
  2388. break;
  2389. #endif
  2390. #ifdef WOLFSSL_TLS13_SHA512
  2391. case WC_SHA512:
  2392. mxq_digest_id = ALGO_MD_SHA512;
  2393. break;
  2394. #endif
  2395. default:
  2396. return BAD_FUNC_ARG;
  2397. }
  2398. /* Prepare key id parameters */
  2399. if (strstr_with_size((char *)info, derivedLabel, infoSz) != NULL) {
  2400. if (tls13early) {
  2401. if (local_is_psk) {
  2402. if (tls13_hs_early_secret_obj_id == -1) {
  2403. WOLFSSL_ERROR_MSG("MAXQ: Handshake early secret is not "
  2404. "created yet");
  2405. return NOT_COMPILED_IN;
  2406. }
  2407. tls13_derived_secret_obj_id = alloc_temp_key_id();
  2408. if (tls13_derived_secret_obj_id == -1) {
  2409. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2410. return NOT_COMPILED_IN;
  2411. }
  2412. prk_kid = tls13_hs_early_secret_obj_id;
  2413. ret_kid = tls13_derived_secret_obj_id;
  2414. ret_keytype = MXQ_KEYTYPE_IKM;
  2415. free_temp_key_id(tls13_hs_early_secret_obj_id);
  2416. tls13_hs_early_secret_obj_id = -1;
  2417. }
  2418. else {
  2419. /* derived_secret = HKDF-Expand-Label(key: early_secret,
  2420. * label: "derived", ctx: empty_hash) */
  2421. tls13_derived_secret_obj_id = alloc_temp_key_id();
  2422. if (tls13_derived_secret_obj_id == -1) {
  2423. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2424. return NOT_COMPILED_IN;
  2425. }
  2426. prk_kid = tls13_early_secret_obj_id;
  2427. ret_kid = tls13_derived_secret_obj_id;
  2428. ret_keytype = MXQ_KEYTYPE_IKM;
  2429. free_temp_key_id(tls13_early_secret_obj_id);
  2430. tls13_early_secret_obj_id = -1;
  2431. }
  2432. ret_isiv = 0;
  2433. tls13early = 0;
  2434. }
  2435. else {
  2436. /* derived_secret = HKDF-Expand-Label(key: handshake_secret,
  2437. * label: "derived", ctx: empty_hash) */
  2438. tls13_derived_secret_obj_id = alloc_temp_key_id();
  2439. if (tls13_derived_secret_obj_id == -1) {
  2440. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2441. return NOT_COMPILED_IN;
  2442. }
  2443. prk_kid = tls13_handshake_secret_obj_id;
  2444. ret_kid = tls13_derived_secret_obj_id;
  2445. ret_keytype = MXQ_KEYTYPE_IKM;
  2446. free_temp_key_id(tls13_handshake_secret_obj_id);
  2447. tls13_handshake_secret_obj_id = -1;
  2448. ret_isiv = 0;
  2449. }
  2450. }
  2451. else if (strstr_with_size((char *)info, cHsTrafficLabel, infoSz)
  2452. != NULL) {
  2453. is_hs_key = 1;
  2454. /* client_secret = HKDF-Expand-Label(key: handshake_secret,
  2455. * label: "c hs traffic", ctx: hello_hash) */
  2456. if (tls13_client_secret_obj_id == -1) {
  2457. tls13_client_secret_obj_id = alloc_temp_key_id();
  2458. if (tls13_client_secret_obj_id == -1) {
  2459. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2460. return NOT_COMPILED_IN;
  2461. }
  2462. }
  2463. prk_kid = tls13_handshake_secret_obj_id;
  2464. ret_kid = tls13_client_secret_obj_id;
  2465. ret_keytype = MXQ_KEYTYPE_IKM;
  2466. ret_isiv = 0;
  2467. }
  2468. else if (strstr_with_size((char *)info, sHsTrafficLabel, infoSz)
  2469. != NULL) {
  2470. /* client_secret = HKDF-Expand-Label(key: handshake_secret,
  2471. * label: "s hs traffic", ctx: hello_hash) */
  2472. if (tls13_server_secret_obj_id == -1) {
  2473. tls13_server_secret_obj_id = alloc_temp_key_id();
  2474. if (tls13_server_secret_obj_id == -1) {
  2475. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2476. return NOT_COMPILED_IN;
  2477. }
  2478. }
  2479. prk_kid = tls13_handshake_secret_obj_id;
  2480. ret_kid = tls13_server_secret_obj_id;
  2481. ret_keytype = MXQ_KEYTYPE_IKM;
  2482. ret_isiv = 0;
  2483. }
  2484. else if (strstr_with_size((char *)info, cAppTrafficLabel, infoSz)
  2485. != NULL) {
  2486. is_hs_key = 0;
  2487. /* client_secret = HKDF-Expand-Label(key: master_secret,
  2488. * label: "c ap traffic", ctx: handshake_hash) */
  2489. if (tls13_client_secret_obj_id == -1) {
  2490. tls13_client_secret_obj_id = alloc_temp_key_id();
  2491. if (tls13_client_secret_obj_id == -1) {
  2492. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2493. return NOT_COMPILED_IN;
  2494. }
  2495. }
  2496. prk_kid = tls13_master_secret_obj_id;
  2497. ret_kid = tls13_client_secret_obj_id;
  2498. ret_keytype = MXQ_KEYTYPE_IKM;
  2499. ret_isiv = 0;
  2500. }
  2501. else if (strstr_with_size((char *)info, sAppTrafficLabel, infoSz)
  2502. != NULL) {
  2503. /* server_secret = HKDF-Expand-Label(key: master_secret,
  2504. * label: "s ap traffic", ctx: handshake_hash) */
  2505. tls13_server_secret_obj_id = alloc_temp_key_id();
  2506. if (tls13_server_secret_obj_id == -1) {
  2507. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2508. return NOT_COMPILED_IN;
  2509. }
  2510. prk_kid = tls13_master_secret_obj_id;
  2511. ret_kid = tls13_server_secret_obj_id;
  2512. ret_keytype = MXQ_KEYTYPE_IKM;
  2513. ret_isiv = 0;
  2514. }
  2515. else if (strstr_with_size((char *)info, keyLabel, infoSz) != NULL) {
  2516. /* first client key then server */
  2517. if (side == WOLFSSL_CLIENT_END) {
  2518. /* client_handshake_key = HKDF-Expand-Label(key: client_secret,
  2519. * label: "key", ctx: "")
  2520. * client_application_key = HKDF-Expand-Label(key: client_secret,
  2521. * label: "key", ctx: "") */
  2522. int tls13_client_key_obj_id = -1;
  2523. if (is_hs_key) {
  2524. if (tls13_client_hs_key_obj_id == -1) {
  2525. tls13_client_hs_key_obj_id = alloc_temp_key_id();
  2526. if (tls13_client_hs_key_obj_id == -1) {
  2527. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2528. return NOT_COMPILED_IN;
  2529. }
  2530. }
  2531. tls13_client_key_obj_id = tls13_client_hs_key_obj_id;
  2532. }
  2533. else {
  2534. if (tls13_client_app_key_obj_id == -1) {
  2535. tls13_client_app_key_obj_id = alloc_temp_key_id();
  2536. if (tls13_client_app_key_obj_id == -1) {
  2537. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2538. return NOT_COMPILED_IN;
  2539. }
  2540. }
  2541. tls13_client_key_obj_id = tls13_client_app_key_obj_id;
  2542. }
  2543. prk_kid = tls13_client_secret_obj_id;
  2544. ret_kid = tls13_client_key_obj_id;
  2545. ret_keytype = MXQ_KEYTYPE_AES;
  2546. ret_isiv = 0;
  2547. }
  2548. else {
  2549. /* server_handshake_key = HKDF-Expand-Label(key: server_secret,
  2550. * label: "key", ctx: "")
  2551. * server_application_key = HKDF-Expand-Label(key: server_secret,
  2552. label: "key", ctx: "") */
  2553. int tls13_server_key_obj_id = -1;
  2554. if (is_hs_key) {
  2555. if (tls13_server_hs_key_obj_id == -1) {
  2556. tls13_server_hs_key_obj_id = alloc_temp_key_id();
  2557. if (tls13_server_hs_key_obj_id == -1) {
  2558. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2559. return NOT_COMPILED_IN;
  2560. }
  2561. }
  2562. tls13_server_key_obj_id = tls13_server_hs_key_obj_id;
  2563. }
  2564. else {
  2565. if (tls13_server_app_key_obj_id == -1) {
  2566. tls13_server_app_key_obj_id = alloc_temp_key_id();
  2567. if (tls13_server_app_key_obj_id == -1) {
  2568. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2569. return NOT_COMPILED_IN;
  2570. }
  2571. }
  2572. tls13_server_key_obj_id = tls13_server_app_key_obj_id;
  2573. }
  2574. prk_kid = tls13_server_secret_obj_id;
  2575. ret_kid = tls13_server_key_obj_id;
  2576. ret_keytype = MXQ_KEYTYPE_AES;
  2577. ret_isiv = 0;
  2578. }
  2579. }
  2580. else if (strstr_with_size((char *)info, ivLabel, infoSz) != NULL) {
  2581. /* first client key then server */
  2582. if (side == WOLFSSL_CLIENT_END) {
  2583. /* client_handshake_iv = HKDF-Expand-Label(key: client_secret,
  2584. * label: "iv", ctx: "")
  2585. * cient_application_iv = HKDF-Expand-Label(key: client_secret,
  2586. * label: "iv", ctx: "") */
  2587. int tls13_client_iv_obj_id = -1;
  2588. if (is_hs_key) {
  2589. if (tls13_client_hs_key_obj_id == -1) {
  2590. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2591. return NOT_COMPILED_IN;
  2592. }
  2593. tls13_client_iv_obj_id = tls13_client_hs_key_obj_id;
  2594. }
  2595. else {
  2596. if (tls13_client_app_key_obj_id == -1) {
  2597. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2598. return NOT_COMPILED_IN;
  2599. }
  2600. tls13_client_iv_obj_id = tls13_client_app_key_obj_id;
  2601. }
  2602. prk_kid = tls13_client_secret_obj_id;
  2603. ret_kid = tls13_client_iv_obj_id;
  2604. ret_keytype = MXQ_KEYTYPE_AES;
  2605. ret_isiv = 1;
  2606. }
  2607. else {
  2608. /* server_handshake_iv = HKDF-Expand-Label(key: server_secret,
  2609. * label: "iv", ctx: "")
  2610. * server_application_iv = HKDF-Expand-Label(key: server_secret,
  2611. * label: "iv", ctx: "") */
  2612. int tls13_server_iv_obj_id = -1;
  2613. if (is_hs_key) {
  2614. if (tls13_server_hs_key_obj_id == -1) {
  2615. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2616. return NOT_COMPILED_IN;
  2617. }
  2618. tls13_server_iv_obj_id = tls13_server_hs_key_obj_id;
  2619. }
  2620. else {
  2621. if (tls13_server_app_key_obj_id == -1) {
  2622. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2623. return NOT_COMPILED_IN;
  2624. }
  2625. tls13_server_iv_obj_id = tls13_server_app_key_obj_id;
  2626. }
  2627. prk_kid = tls13_server_secret_obj_id;
  2628. ret_kid = tls13_server_iv_obj_id;
  2629. ret_keytype = MXQ_KEYTYPE_AES;
  2630. ret_isiv = 1;
  2631. local_is_psk = 0;
  2632. }
  2633. }
  2634. else if (strstr_with_size((char *)info, finishedLabel, infoSz) != NULL) {
  2635. if (local_is_psk) {
  2636. if (tls13_client_finish_obj_id == -1) {
  2637. tls13_client_finish_obj_id = alloc_temp_key_id();
  2638. if (tls13_client_finish_obj_id == -1) {
  2639. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2640. return NOT_COMPILED_IN;
  2641. }
  2642. }
  2643. if (tls13_binder_key_obj_id == -1) {
  2644. WOLFSSL_ERROR_MSG("MAXQ: Binder key is not created yet");
  2645. return NOT_COMPILED_IN;
  2646. }
  2647. prk_kid = tls13_binder_key_obj_id;
  2648. ret_kid = tls13_client_finish_obj_id;
  2649. tls13_client_key_id = &tls13_binder_key_obj_id;
  2650. ret_keytype = MXQ_KEYTYPE_HMAC;
  2651. ret_isiv = 0;
  2652. }
  2653. else {
  2654. /* first client key then server */
  2655. if (side == WOLFSSL_CLIENT_END) {
  2656. /* finished_key = HKDF-Expand-Label(key: client_secret,
  2657. * label: "finished", ctx: "") */
  2658. if (is_hs_key) {
  2659. tls13_client_key_id = &tls13_client_hs_key_obj_id;
  2660. }
  2661. else {
  2662. tls13_client_key_id = &tls13_client_app_key_obj_id;
  2663. }
  2664. if (tls13_client_finish_obj_id == -1) {
  2665. tls13_client_finish_obj_id = alloc_temp_key_id();
  2666. if (tls13_client_finish_obj_id == -1) {
  2667. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2668. return NOT_COMPILED_IN;
  2669. }
  2670. }
  2671. prk_kid = tls13_client_secret_obj_id;
  2672. ret_kid = tls13_client_finish_obj_id;
  2673. ret_keytype = MXQ_KEYTYPE_HMAC;
  2674. ret_isiv = 0;
  2675. free_temp_key_id(tls13_client_secret_obj_id);
  2676. tls13_client_secret_obj_id = -1;
  2677. }
  2678. else {
  2679. /* finished_key = HKDF-Expand-Label(key: server_secret,
  2680. * label: "finished", ctx: "") */
  2681. if (is_hs_key) {
  2682. tls13_server_key_id = &tls13_server_hs_key_obj_id;
  2683. }
  2684. else {
  2685. tls13_server_key_id = &tls13_server_app_key_obj_id;
  2686. }
  2687. if (tls13_server_finish_obj_id == -1) {
  2688. tls13_server_finish_obj_id = alloc_temp_key_id();
  2689. if (tls13_server_finish_obj_id == -1) {
  2690. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2691. return NOT_COMPILED_IN;
  2692. }
  2693. }
  2694. prk_kid = tls13_server_secret_obj_id;
  2695. ret_kid = tls13_server_finish_obj_id;
  2696. ret_keytype = MXQ_KEYTYPE_HMAC;
  2697. ret_isiv = 0;
  2698. free_temp_key_id(tls13_server_secret_obj_id);
  2699. tls13_server_secret_obj_id = -1;
  2700. }
  2701. }
  2702. }
  2703. else if (strstr_with_size((char *)info, extBinderLabel, infoSz) != NULL) {
  2704. /* binder_key = HKDF-Expand-Label(key: hs_early_secret,
  2705. * label: "ext binder", ctx: empty_hash) */
  2706. tls13_binder_key_obj_id = alloc_temp_key_id();
  2707. if (tls13_binder_key_obj_id == -1) {
  2708. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2709. return NOT_COMPILED_IN;
  2710. }
  2711. prk_kid = tls13_hs_early_secret_obj_id;
  2712. ret_kid = tls13_binder_key_obj_id;
  2713. ret_keytype = MXQ_KEYTYPE_IKM;
  2714. ret_isiv = 0;
  2715. local_is_psk = 1;
  2716. }
  2717. else if (strstr_with_size((char *)info, resMasterLabel, infoSz) != NULL) {
  2718. /* TODO: */
  2719. tls13_res_master_obj_id = alloc_temp_key_id();
  2720. if (tls13_res_master_obj_id == -1) {
  2721. WOLFSSL_ERROR_MSG("MAXQ: alloc_temp_key_id() failed");
  2722. return NOT_COMPILED_IN;
  2723. }
  2724. prk_kid = tls13_master_secret_obj_id;
  2725. ret_kid = tls13_res_master_obj_id;
  2726. ret_keytype = MXQ_KEYTYPE_IKM;
  2727. ret_isiv = 0;
  2728. free_temp_key_id(*tls13_client_key_id);
  2729. *tls13_client_key_id = -1;
  2730. }
  2731. else if (strstr_with_size((char *)info, appTrafUpdLabel, infoSz) != NULL) {
  2732. if (side == WOLFSSL_CLIENT_END) {
  2733. /* updated_client_secret = HKDF-Expand-Label(key: client_secret,
  2734. * label: "traffic upd", ctx: "") */
  2735. if (tls13_client_app_key_obj_id == -1) {
  2736. WOLFSSL_ERROR_MSG("MAXQ: Client Application Key was not set");
  2737. return NOT_COMPILED_IN;
  2738. }
  2739. prk_kid = tls13_client_secret_obj_id;
  2740. ret_kid = tls13_client_secret_obj_id;
  2741. ret_keytype = MXQ_KEYTYPE_IKM;
  2742. ret_isiv = 0;
  2743. }
  2744. else {
  2745. /* updated_server_secret = HKDF-Expand-Label(key: server_secret,
  2746. * label: "traffic upd", ctx: "") */
  2747. if (tls13_server_app_key_obj_id == -1) {
  2748. WOLFSSL_ERROR_MSG("MAXQ: Client Application Key was not set");
  2749. return NOT_COMPILED_IN;
  2750. }
  2751. prk_kid = tls13_server_secret_obj_id;
  2752. ret_kid = tls13_server_secret_obj_id;
  2753. ret_keytype = MXQ_KEYTYPE_IKM;
  2754. ret_isiv = 0;
  2755. }
  2756. }
  2757. else {
  2758. WOLFSSL_ERROR_MSG("MAXQ: MXQ_TLS13_Expand_Secret() does not support");
  2759. return NOT_COMPILED_IN;
  2760. }
  2761. if (prk_kid != -1) {
  2762. inKeySz = 0;
  2763. }
  2764. if (ret_kid != -1) {
  2765. XMEMSET(out, 0, outSz);
  2766. }
  2767. rc = wolfSSL_CryptHwMutexLock();
  2768. if (rc != 0) {
  2769. return rc;
  2770. }
  2771. mxq_rc = MXQ_TLS13_Expand_Secret(mxq_digest_id, (mxq_u2)ret_kid,
  2772. ret_keytype, ret_isiv, out, &outSz,
  2773. (mxq_u2)prk_kid, inKey, inKeySz,
  2774. info, infoSz );
  2775. if (mxq_rc) {
  2776. WOLFSSL_ERROR_MSG("MAXQ: MXQ_TLS13_Expand_Secret() failed");
  2777. wolfSSL_CryptHwMutexUnLock();
  2778. return WC_HW_E;
  2779. }
  2780. wolfSSL_CryptHwMutexUnLock();
  2781. return 0;
  2782. }
  2783. static int maxq10xx_hkdf_expand_label(byte* okm, word32 okmLen,
  2784. const byte* prk, word32 prkLen,
  2785. const byte* protocol, word32 protocolLen,
  2786. const byte* label, word32 labelLen,
  2787. const byte* info, word32 infoLen,
  2788. int digest, int side)
  2789. {
  2790. int ret = 0;
  2791. int idx = 0;
  2792. byte data[MAX_TLS13_HKDF_LABEL_SZ];
  2793. /* Output length. */
  2794. data[idx++] = (byte)(okmLen >> 8);
  2795. data[idx++] = (byte)okmLen;
  2796. /* Length of protocol | label. */
  2797. data[idx++] = (byte)(protocolLen + labelLen);
  2798. /* Protocol */
  2799. XMEMCPY(&data[idx], protocol, protocolLen);
  2800. idx += protocolLen;
  2801. /* Label */
  2802. XMEMCPY(&data[idx], label, labelLen);
  2803. idx += labelLen;
  2804. /* Length of hash of messages */
  2805. data[idx++] = (byte)infoLen;
  2806. /* Hash of messages */
  2807. XMEMCPY(&data[idx], info, infoLen);
  2808. idx += infoLen;
  2809. #ifdef WOLFSSL_CHECK_MEM_ZERO
  2810. wc_MemZero_Add("wc_Tls13_HKDF_Expand_Label data", data, idx);
  2811. #endif
  2812. ret = maxq10xx_HkdfExpand(digest, prk, prkLen, data, idx, okm, okmLen,
  2813. side);
  2814. ForceZero(data, idx);
  2815. #ifdef WOLFSSL_CHECK_MEM_ZERO
  2816. wc_MemZero_Check(data, MAX_TLS13_HKDF_LABEL_SZ);
  2817. #endif
  2818. return ret;
  2819. }
  2820. static int maxq10xx_perform_tls13_record_processing(WOLFSSL* ssl,
  2821. int is_encrypt, byte* out, const byte* in,
  2822. word32 sz, const byte* iv, word32 ivSz,
  2823. byte* authTag, word32 authTagSz,
  2824. const byte* authIn, word32 authInSz)
  2825. {
  2826. int rc;
  2827. mxq_err_t mxq_rc;
  2828. mxq_u2 key_id;
  2829. if (!tls13active) {
  2830. return NOT_COMPILED_IN;
  2831. }
  2832. if ((ssl->specs.bulk_cipher_algorithm != wolfssl_aes_gcm) &&
  2833. (ssl->specs.bulk_cipher_algorithm != wolfssl_aes_ccm)) {
  2834. WOLFSSL_MSG("MAXQ: tls record cipher algo not supported");
  2835. return NOT_COMPILED_IN;
  2836. }
  2837. if (is_encrypt) {
  2838. if (tls13_client_hs_key_obj_id != -1) {
  2839. key_id = tls13_client_hs_key_obj_id;
  2840. }
  2841. else if (tls13_client_app_key_obj_id != -1) {
  2842. key_id = tls13_client_app_key_obj_id;
  2843. }
  2844. else {
  2845. WOLFSSL_ERROR_MSG("MAXQ: tls record enc key was not selected");
  2846. }
  2847. }
  2848. else {
  2849. if (tls13_server_hs_key_obj_id != -1) {
  2850. key_id = tls13_server_hs_key_obj_id;
  2851. }
  2852. else if (tls13_server_app_key_obj_id != -1) {
  2853. key_id = tls13_server_app_key_obj_id;
  2854. }
  2855. else {
  2856. WOLFSSL_ERROR_MSG("MAXQ: tls record dec key was not selected");
  2857. }
  2858. }
  2859. mxq_algo_id_t algo_id = 0;
  2860. if (ssl->specs.bulk_cipher_algorithm == wolfssl_aes_gcm) {
  2861. algo_id = ALGO_CIPHER_AES_GCM;
  2862. }
  2863. else if (ssl->specs.bulk_cipher_algorithm == wolfssl_aes_ccm) {
  2864. algo_id = ALGO_CIPHER_AES_CCM;
  2865. }
  2866. rc = wolfSSL_CryptHwMutexLock();
  2867. if (rc != 0) {
  2868. return rc;
  2869. }
  2870. WOLFSSL_MSG("MAXQ: MXQ_TLS13_Update_IV");
  2871. mxq_rc = MXQ_TLS13_Update_IV( key_id, (mxq_u1 *)iv, ivSz);
  2872. if (mxq_rc) {
  2873. WOLFSSL_ERROR_MSG("MAXQ: MXQ_TLS13_Update_IV() failed");
  2874. wolfSSL_CryptHwMutexUnLock();
  2875. return WC_HW_E;
  2876. }
  2877. mxq_rc = maxq10xx_cipher_do(algo_id, is_encrypt, key_id, (mxq_u1 *)in, out,
  2878. sz, (mxq_u1 *)iv, ivSz, (mxq_u1 *)authIn,
  2879. authInSz, authTag, authTagSz);
  2880. if (mxq_rc) {
  2881. WOLFSSL_ERROR_MSG("MAXQ: maxq10xx_cipher_do() failed");
  2882. wolfSSL_CryptHwMutexUnLock();
  2883. return WC_HW_E;
  2884. }
  2885. wolfSSL_CryptHwMutexUnLock();
  2886. return 0;
  2887. }
  2888. #endif /* HAVE_HKDF */
  2889. #endif /* WOLFSSL_MAXQ108X */
  2890. void maxq10xx_SetupPkCallbacks(struct WOLFSSL_CTX* ctx, ProtocolVersion *pv)
  2891. {
  2892. (void)pv;
  2893. if (pv == NULL) {
  2894. return;
  2895. }
  2896. WOLFSSL_ENTER("maxq10xx_SetupPkCallbacks");
  2897. if (init_pk_callbacks) {
  2898. return;
  2899. }
  2900. #ifdef WOLFSSL_MAXQ108X
  2901. #ifdef HAVE_HKDF
  2902. wolfSSL_CTX_SetHKDFExtractCb(ctx, maxq10xx_hkdf_extract);
  2903. wolfSSL_CTX_SetHKDFExpandLabelCb(ctx, maxq10xx_hkdf_expand_label);
  2904. #endif
  2905. if ((pv->major == SSLv3_MAJOR) && (pv->minor == WOLFSSL_TLSV1_3)) {
  2906. tls13active = 1;
  2907. wolfSSL_CTX_SetEccKeyGenCb(ctx, maxq10xx_ecc_key_gen);
  2908. wolfSSL_CTX_SetEccSharedSecretCb(ctx, maxq10xx_tls13_ecc_shared_secret);
  2909. wolfSSL_CTX_SetEccVerifyCb(ctx, maxq10xx_ecc_verify);
  2910. wolfSSL_CTX_SetDhGenerateKeyPair(ctx, maxq10xx_dh_gen_key_pair);
  2911. wolfSSL_CTX_SetDhAgreeCb(ctx, maxq10xx_dh_agree);
  2912. wolfSSL_CTX_SetRsaPssSignCb(ctx, maxq10xx_rsa_pss_sign);
  2913. wolfSSL_CTX_SetRsaPssSignCheckCb(ctx, maxq10xx_skip_sign_check);
  2914. wolfSSL_CTX_SetRsaPssVerifyCb(ctx, maxq10xx_rsa_pss_verify);
  2915. wolfSSL_CTX_SetPerformTlsRecordProcessingCb(ctx,
  2916. maxq10xx_perform_tls13_record_processing);
  2917. }
  2918. else
  2919. #endif /* WOLFSSL_MAXQ108X */
  2920. {
  2921. wolfSSL_CTX_SetEccSharedSecretCb(ctx, maxq10xx_tls12_ecc_shared_secret);
  2922. wolfSSL_CTX_SetPerformTlsRecordProcessingCb(ctx,
  2923. maxq10xx_perform_tls12_record_processing);
  2924. }
  2925. wolfSSL_CTX_SetProcessPeerCertCb(ctx, maxq10xx_process_server_certificate);
  2926. wolfSSL_CTX_SetProcessServerSigKexCb(ctx, maxq10xx_process_server_sig_kex);
  2927. wolfSSL_CTX_SetGenMasterSecretCb(ctx, maxq10xx_gen_tls_master_secret);
  2928. wolfSSL_CTX_SetTlsFinishedCb(ctx, maxq10xx_perform_client_finished);
  2929. wolfSSL_CTX_SetEccSignCb(ctx, maxq10xx_ecc_sign);
  2930. init_pk_callbacks = 1;
  2931. }
  2932. #endif /* WOLFSSL_MAXQ1065 || WOLFSSL_MAXQ108X */