blob: 9ab1157ead138848d3f87da03a2aa06e40ff5124 [file] [log] [blame]
Patrick Williams2390b1b2022-11-03 13:47:49 -05001Upstream-Status: Pending [Not submitted to upstream yet]
2Signed-off-by: Emekcan Aras <Emekcan.Aras@arm.com>
3
Patrick Williams975a06f2022-10-21 14:42:47 -05004From a1da63a8c4d55d52321608a72129af49e0a498b2 Mon Sep 17 00:00:00 2001
5From: Satish Kumar <satish.kumar01@arm.com>
6Date: Mon, 14 Feb 2022 08:22:25 +0000
7Subject: [PATCH 18/19] Fixes in AEAD for psa-arch test 54 and 58.
8
Patrick Williams975a06f2022-10-21 14:42:47 -05009Signed-off-by: Satish Kumar <satish.kumar01@arm.com>
10Signed-off-by: Rui Miguel Silva <rui.silva@linaro.org>
11---
12 .../crypto/client/caller/packed-c/crypto_caller_aead.h | 1 +
13 components/service/crypto/include/psa/crypto_sizes.h | 2 +-
14 .../crypto/provider/extension/aead/aead_provider.c | 8 ++++++--
15 .../extension/aead/serializer/aead_provider_serializer.h | 1 +
16 .../packed-c/packedc_aead_provider_serializer.c | 2 ++
17 protocols/service/crypto/packed-c/aead.h | 1 +
18 6 files changed, 12 insertions(+), 3 deletions(-)
19
20diff --git a/components/service/crypto/client/caller/packed-c/crypto_caller_aead.h b/components/service/crypto/client/caller/packed-c/crypto_caller_aead.h
21index c4ffb20cf7f8..a91f66c14008 100644
22--- a/components/service/crypto/client/caller/packed-c/crypto_caller_aead.h
23+++ b/components/service/crypto/client/caller/packed-c/crypto_caller_aead.h
24@@ -309,6 +309,7 @@ static inline psa_status_t crypto_caller_aead_update(struct service_client *cont
25 size_t req_len = req_fixed_len;
26
27 *output_length = 0;
28+ req_msg.output_size = output_size;
29 req_msg.op_handle = op_handle;
30
31 /* Mandatory input data parameter */
32diff --git a/components/service/crypto/include/psa/crypto_sizes.h b/components/service/crypto/include/psa/crypto_sizes.h
33index 4d7bf6e959b0..e3c4df2927b3 100644
34--- a/components/service/crypto/include/psa/crypto_sizes.h
35+++ b/components/service/crypto/include/psa/crypto_sizes.h
36@@ -351,7 +351,7 @@
37 * just the largest size that may be generated by
38 * #psa_aead_generate_nonce().
39 */
40-#define PSA_AEAD_NONCE_MAX_SIZE 12
41+#define PSA_AEAD_NONCE_MAX_SIZE 16
42
43 /** A sufficient output buffer size for psa_aead_update().
44 *
45diff --git a/components/service/crypto/provider/extension/aead/aead_provider.c b/components/service/crypto/provider/extension/aead/aead_provider.c
46index 14a25436b3f6..6b144db821de 100644
47--- a/components/service/crypto/provider/extension/aead/aead_provider.c
48+++ b/components/service/crypto/provider/extension/aead/aead_provider.c
49@@ -283,10 +283,11 @@ static rpc_status_t aead_update_handler(void *context, struct call_req *req)
50 uint32_t op_handle;
51 const uint8_t *input;
52 size_t input_len;
53+ uint32_t recv_output_size;
54
55 if (serializer)
56 rpc_status = serializer->deserialize_aead_update_req(req_buf, &op_handle,
57- &input, &input_len);
58+ &recv_output_size, &input, &input_len);
59
60 if (rpc_status == TS_RPC_CALL_ACCEPTED) {
61
62@@ -300,9 +301,12 @@ static rpc_status_t aead_update_handler(void *context, struct call_req *req)
63 if (crypto_context) {
64
65 size_t output_len = 0;
66- size_t output_size = PSA_AEAD_UPDATE_OUTPUT_MAX_SIZE(input_len);
67+ size_t output_size = PSA_AEAD_UPDATE_OUTPUT_MAX_SIZE(24);
68 uint8_t *output = malloc(output_size);
69
70+ if (recv_output_size < output_size) {
71+ output_size = recv_output_size;
72+ }
73 if (output) {
74
75 psa_status = psa_aead_update(&crypto_context->op.aead,
76diff --git a/components/service/crypto/provider/extension/aead/serializer/aead_provider_serializer.h b/components/service/crypto/provider/extension/aead/serializer/aead_provider_serializer.h
77index bb1a2a97e4b7..0156aaba3fe3 100644
78--- a/components/service/crypto/provider/extension/aead/serializer/aead_provider_serializer.h
79+++ b/components/service/crypto/provider/extension/aead/serializer/aead_provider_serializer.h
80@@ -51,6 +51,7 @@ struct aead_provider_serializer {
81 /* Operation: aead_update */
82 rpc_status_t (*deserialize_aead_update_req)(const struct call_param_buf *req_buf,
83 uint32_t *op_handle,
84+ uint32_t *output_size,
85 const uint8_t **input, size_t *input_len);
86
87 rpc_status_t (*serialize_aead_update_resp)(struct call_param_buf *resp_buf,
88diff --git a/components/service/crypto/provider/extension/aead/serializer/packed-c/packedc_aead_provider_serializer.c b/components/service/crypto/provider/extension/aead/serializer/packed-c/packedc_aead_provider_serializer.c
89index 6f00b3e3f6f1..45c739abcbb4 100644
90--- a/components/service/crypto/provider/extension/aead/serializer/packed-c/packedc_aead_provider_serializer.c
91+++ b/components/service/crypto/provider/extension/aead/serializer/packed-c/packedc_aead_provider_serializer.c
92@@ -192,6 +192,7 @@ static rpc_status_t deserialize_aead_update_ad_req(const struct call_param_buf *
93 /* Operation: aead_update */
94 static rpc_status_t deserialize_aead_update_req(const struct call_param_buf *req_buf,
95 uint32_t *op_handle,
96+ uint32_t *output_size,
97 const uint8_t **input, size_t *input_len)
98 {
99 rpc_status_t rpc_status = TS_RPC_ERROR_INVALID_REQ_BODY;
100@@ -208,6 +209,7 @@ static rpc_status_t deserialize_aead_update_req(const struct call_param_buf *req
101 memcpy(&recv_msg, req_buf->data, expected_fixed_len);
102
103 *op_handle = recv_msg.op_handle;
104+ *output_size = recv_msg.output_size;
105
106 tlv_const_iterator_begin(&req_iter,
107 (uint8_t*)req_buf->data + expected_fixed_len,
108diff --git a/protocols/service/crypto/packed-c/aead.h b/protocols/service/crypto/packed-c/aead.h
109index 0be266b52403..435fd3b523ce 100644
110--- a/protocols/service/crypto/packed-c/aead.h
111+++ b/protocols/service/crypto/packed-c/aead.h
112@@ -98,6 +98,7 @@ enum
113 struct __attribute__ ((__packed__)) ts_crypto_aead_update_in
114 {
115 uint32_t op_handle;
116+ uint32_t output_size;
117 };
118
119 /* Variable length input parameter tags */
120--
1212.38.0
122