@@ -166,8 +166,8 @@ static int _AesMp16(whServerContext* server, uint8_t* in, word32 inSz,
166166 if (server == NULL || server -> she == NULL ) {
167167 return WH_ERROR_BADARGS ;
168168 }
169- return wh_She_AesMp16_ex (server -> she -> sheAes , NULL , server -> defaultDevId ,
170- in , inSz , out );
169+ return wh_She_AesMp16_ex (server -> she -> sheAes , NULL , server -> devId , in , inSz ,
170+ out );
171171}
172172
173173/* AuthID is the 4 rightmost bits of messageOne */
@@ -262,7 +262,7 @@ static int _SecureBootInit(whServerContext* server, uint16_t magic,
262262 * expected digest so meta->len will be too long */
263263 if (ret == 0 ) {
264264 ret = wc_InitCmac_ex (server -> she -> sheCmac , macKey , WH_SHE_KEY_SZ ,
265- WC_CMAC_AES , NULL , NULL , server -> defaultDevId );
265+ WC_CMAC_AES , NULL , NULL , server -> devId );
266266 }
267267 /* hash 12 zeros */
268268 if (ret == 0 ) {
@@ -498,10 +498,9 @@ static int _LoadKey(whServerContext* server, uint16_t magic, uint16_t req_size,
498498 sizeof (req .messageTwo ));
499499
500500 field = AES_BLOCK_SIZE ;
501- ret = wc_AesCmacGenerate_ex (server -> she -> sheCmac , cmacOutput ,
502- (word32 * )& field , cmacInput ,
503- sizeof (cmacInput ), tmpKey , WH_SHE_KEY_SZ ,
504- NULL , server -> defaultDevId );
501+ ret = wc_AesCmacGenerate_ex (
502+ server -> she -> sheCmac , cmacOutput , (word32 * )& field , cmacInput ,
503+ sizeof (cmacInput ), tmpKey , WH_SHE_KEY_SZ , NULL , server -> devId );
505504 }
506505 /* compare digest to M3 */
507506 if (ret == 0 && memcmp (req .messageThree , cmacOutput , field ) != 0 ) {
@@ -518,7 +517,7 @@ static int _LoadKey(whServerContext* server, uint16_t magic, uint16_t req_size,
518517 }
519518 /* decrypt messageTwo */
520519 if (ret == 0 ) {
521- ret = wc_AesInit (server -> she -> sheAes , NULL , server -> defaultDevId );
520+ ret = wc_AesInit (server -> she -> sheAes , NULL , server -> devId );
522521 }
523522 if (ret == 0 ) {
524523 ret = wc_AesSetKey (server -> she -> sheAes , tmpKey , WH_SHE_KEY_SZ , NULL ,
@@ -611,7 +610,7 @@ static int _LoadKey(whServerContext* server, uint16_t magic, uint16_t req_size,
611610 meta -> len + sizeof (_SHE_KEY_UPDATE_ENC_C ), tmpKey );
612611 }
613612 if (ret == 0 ) {
614- ret = wc_AesInit (server -> she -> sheAes , NULL , server -> defaultDevId );
613+ ret = wc_AesInit (server -> she -> sheAes , NULL , server -> devId );
615614 }
616615 if (ret == 0 ) {
617616 ret = wc_AesSetKey (server -> she -> sheAes , tmpKey , WH_SHE_KEY_SZ , NULL ,
@@ -651,7 +650,7 @@ static int _LoadKey(whServerContext* server, uint16_t magic, uint16_t req_size,
651650 ret = wc_AesCmacGenerate_ex (server -> she -> sheCmac , resp .messageFive ,
652651 (word32 * )& field , resp .messageFour ,
653652 sizeof (resp .messageFour ), tmpKey ,
654- WH_SHE_KEY_SZ , NULL , server -> defaultDevId );
653+ WH_SHE_KEY_SZ , NULL , server -> devId );
655654 }
656655 if (ret == 0 ) {
657656 /* mark if the ram key was loaded */
@@ -764,7 +763,7 @@ static int _ExportRamKey(whServerContext* server, uint16_t magic,
764763 }
765764 /* encrypt M2 with K1 */
766765 if (ret == 0 ) {
767- ret = wc_AesInit (server -> she -> sheAes , NULL , server -> defaultDevId );
766+ ret = wc_AesInit (server -> she -> sheAes , NULL , server -> devId );
768767 }
769768 if (ret == 0 ) {
770769 ret = wc_AesSetKey (server -> she -> sheAes , tmpKey , WH_SHE_KEY_SZ , NULL ,
@@ -795,10 +794,9 @@ static int _ExportRamKey(whServerContext* server, uint16_t magic,
795794 sizeof (resp .messageTwo ));
796795
797796 field = AES_BLOCK_SIZE ;
798- ret = wc_AesCmacGenerate_ex (server -> she -> sheCmac , resp .messageThree ,
799- (word32 * )& field , cmacInput ,
800- sizeof (cmacInput ), tmpKey , WH_SHE_KEY_SZ ,
801- NULL , server -> defaultDevId );
797+ ret = wc_AesCmacGenerate_ex (
798+ server -> she -> sheCmac , resp .messageThree , (word32 * )& field , cmacInput ,
799+ sizeof (cmacInput ), tmpKey , WH_SHE_KEY_SZ , NULL , server -> devId );
802800 }
803801 if (ret == 0 ) {
804802 /* copy the ram key to kdfInput */
@@ -812,7 +810,7 @@ static int _ExportRamKey(whServerContext* server, uint16_t magic,
812810 }
813811 /* set K3 as encryption key */
814812 if (ret == 0 ) {
815- ret = wc_AesInit (server -> she -> sheAes , NULL , server -> defaultDevId );
813+ ret = wc_AesInit (server -> she -> sheAes , NULL , server -> devId );
816814 }
817815 if (ret == 0 ) {
818816 ret = wc_AesSetKey (server -> she -> sheAes , tmpKey , WH_SHE_KEY_SZ , NULL ,
@@ -850,7 +848,7 @@ static int _ExportRamKey(whServerContext* server, uint16_t magic,
850848 ret = wc_AesCmacGenerate_ex (server -> she -> sheCmac , resp .messageFive ,
851849 (word32 * )& field , resp .messageFour ,
852850 sizeof (resp .messageFour ), tmpKey ,
853- WH_SHE_KEY_SZ , NULL , server -> defaultDevId );
851+ WH_SHE_KEY_SZ , NULL , server -> devId );
854852 }
855853
856854 resp .rc = _TranslateSheReturnCode (ret );
@@ -914,7 +912,7 @@ static int _InitRnd(whServerContext* server, uint16_t magic, uint16_t req_size,
914912 }
915913 /* set up aes */
916914 if (ret == 0 ) {
917- ret = wc_AesInit (server -> she -> sheAes , NULL , server -> defaultDevId );
915+ ret = wc_AesInit (server -> she -> sheAes , NULL , server -> devId );
918916 }
919917 if (ret == 0 ) {
920918 ret = wc_AesSetKey (server -> she -> sheAes , tmpKey , WH_SHE_KEY_SZ , NULL ,
@@ -979,7 +977,7 @@ static int _Rnd(whServerContext* server, uint16_t magic, uint16_t req_size,
979977
980978 /* set up aes */
981979 if (ret == 0 ) {
982- ret = wc_AesInit (server -> she -> sheAes , NULL , server -> defaultDevId );
980+ ret = wc_AesInit (server -> she -> sheAes , NULL , server -> devId );
983981 }
984982
985983 /* use PRNG_KEY as the encryption key */
@@ -1105,7 +1103,7 @@ static int _EncEcb(whServerContext* server, uint16_t magic, uint16_t req_size,
11051103 WH_MAKE_KEYID (WH_KEYTYPE_SHE , server -> comm -> client_id , req .keyId ), NULL ,
11061104 tmpKey , & keySz );
11071105 if (ret == 0 ) {
1108- ret = wc_AesInit (server -> she -> sheAes , NULL , server -> defaultDevId );
1106+ ret = wc_AesInit (server -> she -> sheAes , NULL , server -> devId );
11091107 }
11101108 else {
11111109 ret = WH_SHE_ERC_KEY_NOT_AVAILABLE ;
@@ -1164,7 +1162,7 @@ static int _EncCbc(whServerContext* server, uint16_t magic, uint16_t req_size,
11641162 tmpKey , & keySz );
11651163
11661164 if (ret == 0 ) {
1167- ret = wc_AesInit (server -> she -> sheAes , NULL , server -> defaultDevId );
1165+ ret = wc_AesInit (server -> she -> sheAes , NULL , server -> devId );
11681166 }
11691167 else {
11701168 ret = WH_SHE_ERC_KEY_NOT_AVAILABLE ;
@@ -1229,7 +1227,7 @@ static int _DecEcb(whServerContext* server, uint16_t magic, uint16_t req_size,
12291227 WH_MAKE_KEYID (WH_KEYTYPE_SHE , server -> comm -> client_id , req .keyId ), NULL ,
12301228 tmpKey , & keySz );
12311229 if (ret == 0 ) {
1232- ret = wc_AesInit (server -> she -> sheAes , NULL , server -> defaultDevId );
1230+ ret = wc_AesInit (server -> she -> sheAes , NULL , server -> devId );
12331231 }
12341232 else {
12351233 ret = WH_SHE_ERC_KEY_NOT_AVAILABLE ;
@@ -1293,7 +1291,7 @@ static int _DecCbc(whServerContext* server, uint16_t magic, uint16_t req_size,
12931291 tmpKey , & keySz );
12941292
12951293 if (ret == 0 ) {
1296- ret = wc_AesInit (server -> she -> sheAes , NULL , server -> defaultDevId );
1294+ ret = wc_AesInit (server -> she -> sheAes , NULL , server -> devId );
12971295 }
12981296 else {
12991297 ret = WH_SHE_ERC_KEY_NOT_AVAILABLE ;
@@ -1355,7 +1353,7 @@ static int _GenerateMac(whServerContext* server, uint16_t magic,
13551353 if (ret == 0 ) {
13561354 ret = wc_AesCmacGenerate_ex (server -> she -> sheCmac , resp .mac ,
13571355 (word32 * )& field , in , req .sz , tmpKey ,
1358- WH_SHE_KEY_SZ , NULL , server -> defaultDevId );
1356+ WH_SHE_KEY_SZ , NULL , server -> devId );
13591357 }
13601358 else {
13611359 ret = WH_SHE_ERC_KEY_NOT_AVAILABLE ;
@@ -1399,7 +1397,7 @@ static int _VerifyMac(whServerContext* server, uint16_t magic,
13991397 if (ret == 0 ) {
14001398 ret = wc_AesCmacVerify_ex (server -> she -> sheCmac , mac , req .macLen ,
14011399 message , req .messageLen , tmpKey , keySz , NULL ,
1402- server -> defaultDevId );
1400+ server -> devId );
14031401 /* only evaluate if key was found */
14041402 if (ret == 0 ) {
14051403 resp .status = 0 ;
0 commit comments