/**
 * @file hal_sec_aes.c
 * @brief 
 * 
 * Copyright 2019-2030 Bouffalolab team
 * 
 * Licensed to the Apache Software Foundation (ASF) under one or more
 * contributor license agreements.  See the NOTICE file distributed with
 * this work for additional information regarding copyright ownership.  The
 * ASF licenses this file to you under the Apache License, Version 2.0 (the
 * "License"); you may not use this file except in compliance with the
 * License.  You may obtain a copy of the License at
 * 
 *   http://www.apache.org/licenses/LICENSE-2.0
 * 
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.  See the
 * License for the specific language governing permissions and limitations
 * under the License.
 * 
 */
#include "hal_sec_aes.h"
#include "bl702_sec_eng.h"

static SEC_Eng_AES_Ctx aesCtx;

int sec_aes_init(sec_aes_handle_t *handle,sec_aes_type aes_tye,sec_aes_key_type key_type)
{
    handle->aes_type=aes_tye;
    handle->key_type=key_type;

    return 0;
}

static SEC_ENG_AES_Key_Type sec_aes_get_key_type(sec_aes_handle_t *handle)
{
    SEC_ENG_AES_Key_Type type=0;

    switch(handle->key_type)
	{
		case SEC_ASE_KEY_128:
			type=SEC_ENG_AES_KEY_128BITS;
			break;
		case SEC_ASE_KEY_256:
			type=SEC_ENG_AES_KEY_256BITS;
			break;
		case SEC_ASE_KEY_192:
			type=SEC_ENG_AES_KEY_192BITS;
			break;
		default:
			return SEC_ENG_AES_KEY_128BITS;
	}
    return type;
}

int sec_aes_setkey(sec_aes_handle_t *handle,const uint8_t *key,uint8_t key_len,const uint8_t *nonce,uint8_t dir)
{
    SEC_ENG_AES_Key_Type type=sec_aes_get_key_type(handle);

	switch(handle->aes_type)
	{
		case SEC_ASE_CBC:
			Sec_Eng_AES_Enable_BE(SEC_ENG_AES_ID0);
            Sec_Eng_AES_Init(&aesCtx,SEC_ENG_AES_ID0,SEC_ENG_AES_CBC,type,
					SEC_AES_DIR_ENCRYPT==dir?SEC_ENG_AES_ENCRYPTION:SEC_ENG_AES_DECRYPTION);
			break;
		case SEC_ASE_CTR:
			Sec_Eng_AES_Enable_BE(SEC_ENG_AES_ID0);
			Sec_Eng_AES_Init(&aesCtx,SEC_ENG_AES_ID0,SEC_ENG_AES_CTR,type,
					SEC_AES_DIR_ENCRYPT==dir?SEC_ENG_AES_ENCRYPTION:SEC_ENG_AES_DECRYPTION);
			break;
		case SEC_ASE_ECB:
			break;
		default:
			return -1;
	}

	/* if key len is 0, means key is from efuse and *key value is key_sel value */
	if(key_len==0){
		Sec_Eng_AES_Set_Key_IV_BE(SEC_ENG_AES_ID0,SEC_ENG_AES_KEY_HW,key,nonce);
	}else{
		Sec_Eng_AES_Set_Key_IV_BE(SEC_ENG_AES_ID0,SEC_ENG_AES_KEY_SW,key,nonce);
	}

	return 0;
}

int sec_aes_encrypt(sec_aes_handle_t *handle,const uint8_t *in,uint32_t len, size_t offset,uint8_t *out)
{

    if(SUCCESS!=Sec_Eng_AES_Crypt(&aesCtx,SEC_ENG_AES_ID0,in, len,out)){
        return -1;
    }

    return 0;
}


int sec_aes_decrypt(sec_aes_handle_t *handle,const uint8_t *in,uint32_t len,size_t offset,uint8_t *out)
{

    if(SUCCESS!=Sec_Eng_AES_Crypt(&aesCtx,SEC_ENG_AES_ID0,in, len,out)){
        return -1;
    }

    return 0;
}

int sec_aes_deinit(sec_aes_handle_t *handle)
{
	Sec_Eng_AES_Finish(SEC_ENG_AES_ID0);

    memset(handle,0,sizeof(sec_aes_handle_t));

    return 0;
}
