furi-hal-crypto.c 2.5 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091
  1. #include <furi-hal-crypto.h>
  2. #include <furi-hal-bt.h>
  3. #include <furi.h>
  4. #include <shci.h>
  5. #define TAG "FuriHalCrypto"
  6. CRYP_HandleTypeDef crypt;
  7. void furi_hal_crypto_init() {
  8. FURI_LOG_I(TAG, "Init OK");
  9. }
  10. bool furi_hal_crypto_store_add_key(FuriHalCryptoKey* key, uint8_t* slot) {
  11. furi_assert(key);
  12. furi_assert(slot);
  13. if(!furi_hal_bt_is_alive()) {
  14. return false;
  15. }
  16. SHCI_C2_FUS_StoreUsrKey_Cmd_Param_t pParam;
  17. size_t key_data_size = 0;
  18. if(key->type == FuriHalCryptoKeyTypeMaster) {
  19. pParam.KeyType = KEYTYPE_MASTER;
  20. } else if(key->type == FuriHalCryptoKeyTypeSimple) {
  21. pParam.KeyType = KEYTYPE_SIMPLE;
  22. } else if(key->type == FuriHalCryptoKeyTypeEncrypted) {
  23. pParam.KeyType = KEYTYPE_ENCRYPTED;
  24. key_data_size += 12;
  25. } else {
  26. furi_crash("Incorrect key type");
  27. }
  28. if(key->size == FuriHalCryptoKeySize128) {
  29. pParam.KeySize = KEYSIZE_16;
  30. key_data_size += 16;
  31. } else if(key->size == FuriHalCryptoKeySize256) {
  32. pParam.KeySize = KEYSIZE_32;
  33. key_data_size += 32;
  34. } else {
  35. furi_crash("Incorrect key size");
  36. }
  37. memcpy(pParam.KeyData, key->data, key_data_size);
  38. return SHCI_C2_FUS_StoreUsrKey(&pParam, slot) == SHCI_Success;
  39. }
  40. bool furi_hal_crypto_store_load_key(uint8_t slot, const uint8_t* iv) {
  41. furi_assert(slot > 0 && slot <= 100);
  42. if(!furi_hal_bt_is_alive()) {
  43. return false;
  44. }
  45. crypt.Instance = AES1;
  46. crypt.Init.DataType = CRYP_DATATYPE_32B;
  47. crypt.Init.KeySize = CRYP_KEYSIZE_256B;
  48. crypt.Init.Algorithm = CRYP_AES_CBC;
  49. crypt.Init.pInitVect = (uint32_t*)iv;
  50. crypt.Init.KeyIVConfigSkip = CRYP_KEYIVCONFIG_ONCE;
  51. crypt.Init.pKey = NULL;
  52. furi_check(HAL_CRYP_Init(&crypt) == HAL_OK);
  53. if(SHCI_C2_FUS_LoadUsrKey(slot) == SHCI_Success) {
  54. return true;
  55. } else {
  56. furi_check(HAL_CRYP_DeInit(&crypt) == HAL_OK);
  57. return false;
  58. }
  59. }
  60. bool furi_hal_crypto_store_unload_key(uint8_t slot) {
  61. if(!furi_hal_bt_is_alive()) {
  62. return false;
  63. }
  64. furi_check(HAL_CRYP_DeInit(&crypt) == HAL_OK);
  65. return SHCI_C2_FUS_UnloadUsrKey(slot) == SHCI_Success;
  66. }
  67. bool furi_hal_crypto_encrypt(const uint8_t* input, uint8_t* output, size_t size) {
  68. return HAL_CRYP_Encrypt(&crypt, (uint32_t*)input, size / 4, (uint32_t*)output, 1000) == HAL_OK;
  69. }
  70. bool furi_hal_crypto_decrypt(const uint8_t* input, uint8_t* output, size_t size) {
  71. return HAL_CRYP_Decrypt(&crypt, (uint32_t*)input, size / 4, (uint32_t*)output, 1000) == HAL_OK;
  72. }