mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-07-31 03:07:29 +02:00
Fix whitespace.
This commit is contained in:
@ -2974,22 +2974,22 @@ int wc_AesSetIV(Aes* aes, const byte* iv)
|
|||||||
hcryp.Init.pInitVect = (STM_CRYPT_TYPE*)aes->reg;
|
hcryp.Init.pInitVect = (STM_CRYPT_TYPE*)aes->reg;
|
||||||
HAL_CRYP_Init(&hcryp);
|
HAL_CRYP_Init(&hcryp);
|
||||||
|
|
||||||
#ifdef STM32_CRYPTO_AES_ONLY
|
#ifdef STM32_CRYPTO_AES_ONLY
|
||||||
ret = HAL_CRYPEx_AES(&hcryp, (uint8_t*)in, blocks * AES_BLOCK_SIZE,
|
ret = HAL_CRYPEx_AES(&hcryp, (uint8_t*)in, blocks * AES_BLOCK_SIZE,
|
||||||
out, STM32_HAL_TIMEOUT);
|
out, STM32_HAL_TIMEOUT);
|
||||||
#elif defined(STM32_HAL_V2)
|
#elif defined(STM32_HAL_V2)
|
||||||
ret = HAL_CRYP_Encrypt(&hcryp, (uint32_t*)in, blocks * AES_BLOCK_SIZE,
|
ret = HAL_CRYP_Encrypt(&hcryp, (uint32_t*)in, blocks * AES_BLOCK_SIZE,
|
||||||
(uint32_t*)out, STM32_HAL_TIMEOUT);
|
(uint32_t*)out, STM32_HAL_TIMEOUT);
|
||||||
#else
|
#else
|
||||||
ret = HAL_CRYP_AESCBC_Encrypt(&hcryp, (uint8_t*)in, blocks * AES_BLOCK_SIZE,
|
ret = HAL_CRYP_AESCBC_Encrypt(&hcryp, (uint8_t*)in, blocks * AES_BLOCK_SIZE,
|
||||||
out, STM32_HAL_TIMEOUT);
|
out, STM32_HAL_TIMEOUT);
|
||||||
#endif
|
#endif
|
||||||
if (ret != HAL_OK) {
|
if (ret != HAL_OK) {
|
||||||
ret = WC_TIMEOUT_E;
|
ret = WC_TIMEOUT_E;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* store iv for next call */
|
/* store iv for next call */
|
||||||
XMEMCPY(aes->reg, out + sz - AES_BLOCK_SIZE, AES_BLOCK_SIZE);
|
XMEMCPY(aes->reg, out + sz - AES_BLOCK_SIZE, AES_BLOCK_SIZE);
|
||||||
|
|
||||||
HAL_CRYP_DeInit(&hcryp);
|
HAL_CRYP_DeInit(&hcryp);
|
||||||
|
|
||||||
@ -3028,19 +3028,19 @@ int wc_AesSetIV(Aes* aes, const byte* iv)
|
|||||||
hcryp.Init.pInitVect = (STM_CRYPT_TYPE*)aes->reg;
|
hcryp.Init.pInitVect = (STM_CRYPT_TYPE*)aes->reg;
|
||||||
HAL_CRYP_Init(&hcryp);
|
HAL_CRYP_Init(&hcryp);
|
||||||
|
|
||||||
#ifdef STM32_CRYPTO_AES_ONLY
|
#ifdef STM32_CRYPTO_AES_ONLY
|
||||||
ret = HAL_CRYPEx_AES(&hcryp, (uint8_t*)in, blocks * AES_BLOCK_SIZE,
|
ret = HAL_CRYPEx_AES(&hcryp, (uint8_t*)in, blocks * AES_BLOCK_SIZE,
|
||||||
out, STM32_HAL_TIMEOUT);
|
out, STM32_HAL_TIMEOUT);
|
||||||
#elif defined(STM32_HAL_V2)
|
#elif defined(STM32_HAL_V2)
|
||||||
ret = HAL_CRYP_Decrypt(&hcryp, (uint32_t*)in, blocks * AES_BLOCK_SIZE,
|
ret = HAL_CRYP_Decrypt(&hcryp, (uint32_t*)in, blocks * AES_BLOCK_SIZE,
|
||||||
(uint32_t*)out, STM32_HAL_TIMEOUT);
|
(uint32_t*)out, STM32_HAL_TIMEOUT);
|
||||||
#else
|
#else
|
||||||
ret = HAL_CRYP_AESCBC_Decrypt(&hcryp, (uint8_t*)in, blocks * AES_BLOCK_SIZE,
|
ret = HAL_CRYP_AESCBC_Decrypt(&hcryp, (uint8_t*)in, blocks * AES_BLOCK_SIZE,
|
||||||
out, STM32_HAL_TIMEOUT);
|
out, STM32_HAL_TIMEOUT);
|
||||||
#endif
|
#endif
|
||||||
if (ret != HAL_OK) {
|
if (ret != HAL_OK) {
|
||||||
ret = WC_TIMEOUT_E;
|
ret = WC_TIMEOUT_E;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* store iv for next call */
|
/* store iv for next call */
|
||||||
XMEMCPY(aes->reg, aes->tmp, AES_BLOCK_SIZE);
|
XMEMCPY(aes->reg, aes->tmp, AES_BLOCK_SIZE);
|
||||||
@ -5960,16 +5960,16 @@ static int wc_AesGcmEncrypt_STM32(Aes* aes, byte* out, const byte* in, word32 sz
|
|||||||
if (authPadSz != 0) {
|
if (authPadSz != 0) {
|
||||||
authPadSz = authInSz + sizeof(word32) - authPadSz;
|
authPadSz = authInSz + sizeof(word32) - authPadSz;
|
||||||
if (authPadSz <= sizeof(authhdr)) {
|
if (authPadSz <= sizeof(authhdr)) {
|
||||||
authInPadded = (byte*)authhdr;
|
authInPadded = (byte*)authhdr;
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
authInPadded = (byte*)XMALLOC(authPadSz, aes->heap,
|
authInPadded = (byte*)XMALLOC(authPadSz, aes->heap,
|
||||||
DYNAMIC_TYPE_TMP_BUFFER);
|
DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
if (authInPadded == NULL) {
|
if (authInPadded == NULL) {
|
||||||
wolfSSL_CryptHwMutexUnLock();
|
wolfSSL_CryptHwMutexUnLock();
|
||||||
return MEMORY_E;
|
return MEMORY_E;
|
||||||
}
|
}
|
||||||
wasAlloc = 1;
|
wasAlloc = 1;
|
||||||
}
|
}
|
||||||
XMEMSET(authInPadded, 0, authPadSz);
|
XMEMSET(authInPadded, 0, authPadSz);
|
||||||
XMEMCPY(authInPadded, authIn, authInSz);
|
XMEMCPY(authInPadded, authIn, authInSz);
|
||||||
@ -6012,7 +6012,7 @@ static int wc_AesGcmEncrypt_STM32(Aes* aes, byte* out, const byte* in, word32 sz
|
|||||||
XMEMSET(partialBlock, 0, sizeof(partialBlock));
|
XMEMSET(partialBlock, 0, sizeof(partialBlock));
|
||||||
XMEMCPY(partialBlock, in + (blocks * AES_BLOCK_SIZE), partial);
|
XMEMCPY(partialBlock, in + (blocks * AES_BLOCK_SIZE), partial);
|
||||||
status = HAL_CRYPEx_AES_Auth(&hcryp, (uint8_t*)partialBlock, partial,
|
status = HAL_CRYPEx_AES_Auth(&hcryp, (uint8_t*)partialBlock, partial,
|
||||||
(uint8_t*)partialBlock, STM32_HAL_TIMEOUT);
|
(uint8_t*)partialBlock, STM32_HAL_TIMEOUT);
|
||||||
XMEMCPY(out + (blocks * AES_BLOCK_SIZE), partialBlock, partial);
|
XMEMCPY(out + (blocks * AES_BLOCK_SIZE), partialBlock, partial);
|
||||||
}
|
}
|
||||||
if (status == HAL_OK) {
|
if (status == HAL_OK) {
|
||||||
@ -6403,17 +6403,17 @@ static int wc_AesGcmDecrypt_STM32(Aes* aes, byte* out,
|
|||||||
if (authPadSz != 0) {
|
if (authPadSz != 0) {
|
||||||
authPadSz = authInSz + sizeof(word32) - authPadSz;
|
authPadSz = authInSz + sizeof(word32) - authPadSz;
|
||||||
if (authPadSz <= sizeof(authhdr)) {
|
if (authPadSz <= sizeof(authhdr)) {
|
||||||
authInPadded = (byte*)authhdr;
|
authInPadded = (byte*)authhdr;
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
authInPadded = (byte*)XMALLOC(authPadSz, aes->heap,
|
authInPadded = (byte*)XMALLOC(authPadSz, aes->heap,
|
||||||
DYNAMIC_TYPE_TMP_BUFFER);
|
DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
if (authInPadded == NULL) {
|
if (authInPadded == NULL) {
|
||||||
wolfSSL_CryptHwMutexUnLock();
|
wolfSSL_CryptHwMutexUnLock();
|
||||||
return MEMORY_E;
|
return MEMORY_E;
|
||||||
}
|
}
|
||||||
wasAlloc = 1;
|
wasAlloc = 1;
|
||||||
}
|
}
|
||||||
XMEMSET(authInPadded, 0, authPadSz);
|
XMEMSET(authInPadded, 0, authPadSz);
|
||||||
XMEMCPY(authInPadded, authIn, authInSz);
|
XMEMCPY(authInPadded, authIn, authInSz);
|
||||||
} else {
|
} else {
|
||||||
@ -6429,7 +6429,7 @@ static int wc_AesGcmDecrypt_STM32(Aes* aes, byte* out,
|
|||||||
/* Set the CRYP parameters */
|
/* Set the CRYP parameters */
|
||||||
hcryp.Init.HeaderSize = authPadSz;
|
hcryp.Init.HeaderSize = authPadSz;
|
||||||
if (authPadSz == 0)
|
if (authPadSz == 0)
|
||||||
hcryp.Init.Header = NULL; /* cannot pass pointer when authIn == 0 */
|
hcryp.Init.Header = NULL; /* cannot pass pointer when authIn == 0 */
|
||||||
hcryp.Init.ChainingMode = CRYP_CHAINMODE_AES_GCM_GMAC;
|
hcryp.Init.ChainingMode = CRYP_CHAINMODE_AES_GCM_GMAC;
|
||||||
hcryp.Init.OperatingMode = CRYP_ALGOMODE_DECRYPT;
|
hcryp.Init.OperatingMode = CRYP_ALGOMODE_DECRYPT;
|
||||||
hcryp.Init.GCMCMACPhase = CRYP_INIT_PHASE;
|
hcryp.Init.GCMCMACPhase = CRYP_INIT_PHASE;
|
||||||
|
Reference in New Issue
Block a user