[FL-1934] Core: wipe memory after free. SubGhz: key encryption tool. (#797)
* Core: wipe memory after free. RFID,iButton: fix iterator use after invalidation. * Debug: support unix wildcards for register matching in svd, update MCU description file and minify it. * Toolbox: getter for File in FlipperFile. * Makefile: conditional flashing * SubGhz: keeloq_mfcodes encryption tool. * FuriHal: proper IV handling on CBC in crypto. SubGhz: add support for encrypted keeloq keys. Makefile: move formatting to top Makefile. * SubGhz: rename some function names to match naming scheme. * SubGhz: encryption tool, fix windows line endings Co-authored-by: DrZlo13 <who.just.the.doctor@gmail.com>
This commit is contained in:
		| @@ -15,21 +15,21 @@ bool furi_hal_crypto_store_add_key(FuriHalCryptoKey* key, uint8_t* slot) { | ||||
|     SHCI_C2_FUS_StoreUsrKey_Cmd_Param_t pParam; | ||||
|     size_t key_data_size = 0; | ||||
|  | ||||
|     if (key->type == FuriHalCryptoKeyTypeMaster) { | ||||
|     if(key->type == FuriHalCryptoKeyTypeMaster) { | ||||
|         pParam.KeyType = KEYTYPE_MASTER; | ||||
|     } else if (key->type == FuriHalCryptoKeyTypeSimple) { | ||||
|     } else if(key->type == FuriHalCryptoKeyTypeSimple) { | ||||
|         pParam.KeyType = KEYTYPE_SIMPLE; | ||||
|     } else if (key->type == FuriHalCryptoKeyTypeEncrypted) { | ||||
|     } else if(key->type == FuriHalCryptoKeyTypeEncrypted) { | ||||
|         pParam.KeyType = KEYTYPE_ENCRYPTED; | ||||
|         key_data_size += 12; | ||||
|     } else { | ||||
|         furi_crash("Incorrect key type"); | ||||
|     } | ||||
|  | ||||
|     if (key->size == FuriHalCryptoKeySize128) { | ||||
|     if(key->size == FuriHalCryptoKeySize128) { | ||||
|         pParam.KeySize = KEYSIZE_16; | ||||
|         key_data_size += 16; | ||||
|     } else if (key->size == FuriHalCryptoKeySize256) { | ||||
|     } else if(key->size == FuriHalCryptoKeySize256) { | ||||
|         pParam.KeySize = KEYSIZE_32; | ||||
|         key_data_size += 32; | ||||
|     } else { | ||||
| @@ -49,11 +49,12 @@ bool furi_hal_crypto_store_load_key(uint8_t slot, const uint8_t* iv) { | ||||
|     crypt.Init.KeySize = CRYP_KEYSIZE_256B; | ||||
|     crypt.Init.Algorithm = CRYP_AES_CBC; | ||||
|     crypt.Init.pInitVect = (uint32_t*)iv; | ||||
|     crypt.Init.KeyIVConfigSkip = CRYP_KEYIVCONFIG_ONCE; | ||||
|     crypt.Init.pKey = NULL; | ||||
|  | ||||
|     furi_check(HAL_CRYP_Init(&crypt) == HAL_OK); | ||||
|  | ||||
|     if (SHCI_C2_FUS_LoadUsrKey(slot) == SHCI_Success) { | ||||
|     if(SHCI_C2_FUS_LoadUsrKey(slot) == SHCI_Success) { | ||||
|         return true; | ||||
|     } else { | ||||
|         furi_check(HAL_CRYP_DeInit(&crypt) == HAL_OK); | ||||
| @@ -66,10 +67,10 @@ bool furi_hal_crypto_store_unload_key(uint8_t slot) { | ||||
|     return SHCI_C2_FUS_UnloadUsrKey(slot) == SHCI_Success; | ||||
| } | ||||
|  | ||||
| bool furi_hal_crypto_encrypt(const uint8_t *input, uint8_t *output, size_t size) { | ||||
|     return HAL_CRYP_Encrypt(&crypt, (uint32_t*)input, size/4, (uint32_t*)output, 1000) == HAL_OK; | ||||
| bool furi_hal_crypto_encrypt(const uint8_t* input, uint8_t* output, size_t size) { | ||||
|     return HAL_CRYP_Encrypt(&crypt, (uint32_t*)input, size / 4, (uint32_t*)output, 1000) == HAL_OK; | ||||
| } | ||||
|  | ||||
| bool furi_hal_crypto_decrypt(const uint8_t *input, uint8_t *output, size_t size) { | ||||
|     return HAL_CRYP_Decrypt(&crypt, (uint32_t*)input, size/4, (uint32_t*)output, 1000) == HAL_OK; | ||||
| bool furi_hal_crypto_decrypt(const uint8_t* input, uint8_t* output, size_t size) { | ||||
|     return HAL_CRYP_Decrypt(&crypt, (uint32_t*)input, size / 4, (uint32_t*)output, 1000) == HAL_OK; | ||||
| } | ||||
|   | ||||
		Reference in New Issue
	
	Block a user