Crypto: Align to Mbed Crypto 3.0.1
This patch upgrades the Crypto service to be able
to use Mbed Crypto 3.0.1:
- Updates the PSA crypto headers to latest available in mbed-crypto
- Updates the service implementation
- Updates the test suites where needed
- Updates the SST and Attestation interfaces
towards cryptographic functionalities
- Updates documentation to reflect updated
requirements, and changes in the integration guide
This patch migrates the use of psa_asymmetric_sign() and
psa_asymmetric_verify() to the non-deprecated versions of
the API psa_sign_hash() and psa_verify_hash().
Signed-off-by: Antonio de Angelis <antonio.deangelis@arm.com>
Change-Id: I7d8275def2336c1b5cfb8847b2842c305cfab116
diff --git a/secure_fw/services/crypto/crypto_aead.c b/secure_fw/services/crypto/crypto_aead.c
index be85c92..f663ae6 100644
--- a/secure_fw/services/crypto/crypto_aead.c
+++ b/secure_fw/services/crypto/crypto_aead.c
@@ -1,5 +1,5 @@
/*
- * Copyright (c) 2019, Arm Limited. All rights reserved.
+ * Copyright (c) 2019-2020, Arm Limited. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*
@@ -127,4 +127,94 @@
return status;
#endif /* TFM_CRYPTO_AEAD_MODULE_DISABLED */
}
+
+psa_status_t tfm_crypto_aead_encrypt_setup(psa_invec in_vec[],
+ size_t in_len,
+ psa_outvec out_vec[],
+ size_t out_len)
+{
+ /* FixMe: To be implemented */
+ return PSA_ERROR_NOT_SUPPORTED;
+}
+
+psa_status_t tfm_crypto_aead_decrypt_setup(psa_invec in_vec[],
+ size_t in_len,
+ psa_outvec out_vec[],
+ size_t out_len)
+{
+ /* FixMe: To be implemented */
+ return PSA_ERROR_NOT_SUPPORTED;
+}
+
+psa_status_t tfm_crypto_aead_abort(psa_invec in_vec[],
+ size_t in_len,
+ psa_outvec out_vec[],
+ size_t out_len)
+{
+ /* FixMe: To be implemented */
+ return PSA_ERROR_NOT_SUPPORTED;
+}
+
+psa_status_t tfm_crypto_aead_finish(psa_invec in_vec[],
+ size_t in_len,
+ psa_outvec out_vec[],
+ size_t out_len)
+{
+ /* FixMe: To be implemented */
+ return PSA_ERROR_NOT_SUPPORTED;
+}
+
+psa_status_t tfm_crypto_aead_generate_nonce(psa_invec in_vec[],
+ size_t in_len,
+ psa_outvec out_vec[],
+ size_t out_len)
+{
+ /* FixMe: To be implemented */
+ return PSA_ERROR_NOT_SUPPORTED;
+}
+
+psa_status_t tfm_crypto_aead_set_nonce(psa_invec in_vec[],
+ size_t in_len,
+ psa_outvec out_vec[],
+ size_t out_len)
+{
+ /* FixMe: To be implemented */
+ return PSA_ERROR_NOT_SUPPORTED;
+}
+
+psa_status_t tfm_crypto_aead_set_lengths(psa_invec in_vec[],
+ size_t in_len,
+ psa_outvec out_vec[],
+ size_t out_len)
+{
+ /* FixMe: To be implemented */
+ return PSA_ERROR_NOT_SUPPORTED;
+}
+
+psa_status_t tfm_crypto_aead_update(psa_invec in_vec[],
+ size_t in_len,
+ psa_outvec out_vec[],
+ size_t out_len)
+{
+ /* FixMe: To be implemented */
+ return PSA_ERROR_NOT_SUPPORTED;
+}
+
+psa_status_t tfm_crypto_aead_update_ad(psa_invec in_vec[],
+ size_t in_len,
+ psa_outvec out_vec[],
+ size_t out_len)
+{
+ /* FixMe: To be implemented */
+ return PSA_ERROR_NOT_SUPPORTED;
+}
+
+psa_status_t tfm_crypto_aead_verify(psa_invec in_vec[],
+ size_t in_len,
+ psa_outvec out_vec[],
+ size_t out_len)
+{
+ /* FixMe: To be implemented */
+ return PSA_ERROR_NOT_SUPPORTED;
+}
/*!@}*/