Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 1 | /* |
Antonio de Angelis | 04debbd | 2019-10-14 12:12:52 +0100 | [diff] [blame] | 2 | * Copyright (c) 2018-2020, Arm Limited. All rights reserved. |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 3 | * |
| 4 | * SPDX-License-Identifier: BSD-3-Clause |
| 5 | * |
| 6 | */ |
| 7 | |
| 8 | #ifndef __TFM_CRYPTO_API_H__ |
| 9 | #define __TFM_CRYPTO_API_H__ |
| 10 | |
| 11 | #ifdef __cplusplus |
| 12 | extern "C" { |
| 13 | #endif |
| 14 | |
| 15 | #include <stdint.h> |
| 16 | #include "tfm_crypto_defs.h" |
Antonio de Angelis | 4743e67 | 2019-04-11 11:38:48 +0100 | [diff] [blame] | 17 | #ifdef TFM_PSA_API |
Jamie Fox | cc31d40 | 2019-01-28 17:13:52 +0000 | [diff] [blame] | 18 | #include "psa/service.h" |
Antonio de Angelis | 4743e67 | 2019-04-11 11:38:48 +0100 | [diff] [blame] | 19 | |
| 20 | /** |
| 21 | * \brief This define is a function pointer type to the Uniform Signature API |
| 22 | * prototype. |
| 23 | */ |
| 24 | typedef psa_status_t (*tfm_crypto_us_t)(psa_invec[],size_t,psa_outvec[],size_t); |
| 25 | #endif |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 26 | |
Soby Mathew | d7b79f2 | 2020-05-21 15:06:54 +0100 | [diff] [blame^] | 27 | #include "psa/crypto_client_struct.h" |
| 28 | |
Antonio de Angelis | ab85ccd | 2019-03-25 15:14:29 +0000 | [diff] [blame] | 29 | #define UNIFORM_SIGNATURE_API(api_name) \ |
| 30 | psa_status_t api_name(psa_invec[], size_t, psa_outvec[], size_t) |
| 31 | |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 32 | /** |
| 33 | * \brief List of possible operation types supported by the TFM based |
| 34 | * implementation. This type is needed by the operation allocation, |
| 35 | * lookup and release functions. |
| 36 | * |
| 37 | */ |
| 38 | enum tfm_crypto_operation_type { |
| 39 | TFM_CRYPTO_OPERATION_NONE = 0, |
| 40 | TFM_CRYPTO_CIPHER_OPERATION = 1, |
| 41 | TFM_CRYPTO_MAC_OPERATION = 2, |
| 42 | TFM_CRYPTO_HASH_OPERATION = 3, |
Antonio de Angelis | 04debbd | 2019-10-14 12:12:52 +0100 | [diff] [blame] | 43 | TFM_CRYPTO_KEY_DERIVATION_OPERATION = 4, |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 44 | |
| 45 | /* Used to force the enum size */ |
| 46 | TFM_CRYPTO_OPERATION_TYPE_MAX = INT_MAX |
| 47 | }; |
| 48 | |
| 49 | /** |
Antonio de Angelis | cf85ba2 | 2018-10-09 13:29:40 +0100 | [diff] [blame] | 50 | * \brief Initialise the service |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 51 | * |
Antonio de Angelis | ab85ccd | 2019-03-25 15:14:29 +0000 | [diff] [blame] | 52 | * \return Return values as described in \ref psa_status_t |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 53 | */ |
Antonio de Angelis | ab85ccd | 2019-03-25 15:14:29 +0000 | [diff] [blame] | 54 | psa_status_t tfm_crypto_init(void); |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 55 | |
| 56 | /** |
Antonio de Angelis | cf85ba2 | 2018-10-09 13:29:40 +0100 | [diff] [blame] | 57 | * \brief Initialise the Alloc module |
| 58 | * |
Antonio de Angelis | ab85ccd | 2019-03-25 15:14:29 +0000 | [diff] [blame] | 59 | * \return Return values as described in \ref psa_status_t |
Antonio de Angelis | cf85ba2 | 2018-10-09 13:29:40 +0100 | [diff] [blame] | 60 | */ |
Antonio de Angelis | ab85ccd | 2019-03-25 15:14:29 +0000 | [diff] [blame] | 61 | psa_status_t tfm_crypto_init_alloc(void); |
Antonio de Angelis | cf85ba2 | 2018-10-09 13:29:40 +0100 | [diff] [blame] | 62 | |
| 63 | /** |
Antonio de Angelis | 60a6fe6 | 2019-06-18 15:27:34 +0100 | [diff] [blame] | 64 | * \brief Returns the ID of the caller |
| 65 | * |
| 66 | * \param[out] id Pointer to hold the ID of the caller |
| 67 | * |
| 68 | * \return Return values as described in \ref psa_status_t |
| 69 | */ |
| 70 | psa_status_t tfm_crypto_get_caller_id(int32_t *id); |
| 71 | |
| 72 | /** |
Jamie Fox | 98ab441 | 2020-01-17 17:12:30 +0000 | [diff] [blame] | 73 | * \brief Gets key attributes from client key attributes. |
| 74 | * |
| 75 | * \param[in] client_key_attr Client key attributes |
| 76 | * \param[in] client_id Partition ID of the calling client |
| 77 | * \param[out] key_attributes Key attributes |
| 78 | * |
| 79 | * \return Return values as described in \ref psa_status_t |
| 80 | */ |
| 81 | psa_status_t tfm_crypto_key_attributes_from_client( |
Soby Mathew | d7b79f2 | 2020-05-21 15:06:54 +0100 | [diff] [blame^] | 82 | const struct psa_client_key_attributes_s *client_key_attr, |
Jamie Fox | 98ab441 | 2020-01-17 17:12:30 +0000 | [diff] [blame] | 83 | int32_t client_id, |
| 84 | psa_key_attributes_t *key_attributes); |
| 85 | |
| 86 | /** |
| 87 | * \brief Converts key attributes to client key attributes. |
| 88 | * |
| 89 | * \param[in] key_attributes Key attributes |
| 90 | * \param[out] client_key_attr Client key attributes |
| 91 | * |
| 92 | * \return Return values as described in \ref psa_status_t |
| 93 | */ |
| 94 | psa_status_t tfm_crypto_key_attributes_to_client( |
| 95 | const psa_key_attributes_t *key_attributes, |
Soby Mathew | d7b79f2 | 2020-05-21 15:06:54 +0100 | [diff] [blame^] | 96 | struct psa_client_key_attributes_s *client_key_attr); |
Jamie Fox | 98ab441 | 2020-01-17 17:12:30 +0000 | [diff] [blame] | 97 | |
| 98 | /** |
Antonio de Angelis | 60a6fe6 | 2019-06-18 15:27:34 +0100 | [diff] [blame] | 99 | * \brief Checks that the requested handle belongs to the requesting |
| 100 | * partition |
| 101 | * |
| 102 | * \param[in] handle Handle given as input |
| 103 | * \param[out] index Optionally, pointer to hold the internal index |
| 104 | * corresponding to the input handle. Valid only |
| 105 | * on PSA_SUCCESS, it's returned only if the input |
| 106 | * parameter is not NULL. |
| 107 | * |
| 108 | * \return Return values as described in \ref psa_status_t |
| 109 | */ |
| 110 | psa_status_t tfm_crypto_check_handle_owner(psa_key_handle_t handle, |
| 111 | uint32_t *index); |
Antonio de Angelis | 04debbd | 2019-10-14 12:12:52 +0100 | [diff] [blame] | 112 | |
| 113 | /** |
Jamie Fox | 99360e8 | 2020-02-20 16:00:09 +0000 | [diff] [blame] | 114 | * \brief Checks that there is enough local storage in RAM to keep another key, |
| 115 | * and returns the index of the storage to use. |
Antonio de Angelis | 04debbd | 2019-10-14 12:12:52 +0100 | [diff] [blame] | 116 | * |
Jamie Fox | 99360e8 | 2020-02-20 16:00:09 +0000 | [diff] [blame] | 117 | * \param[out] index Index of the local storage to use |
Antonio de Angelis | 04debbd | 2019-10-14 12:12:52 +0100 | [diff] [blame] | 118 | * |
| 119 | * \return Return values as described in \ref psa_status_t |
| 120 | */ |
Jamie Fox | 99360e8 | 2020-02-20 16:00:09 +0000 | [diff] [blame] | 121 | psa_status_t tfm_crypto_check_key_storage(uint32_t *index); |
Antonio de Angelis | 04debbd | 2019-10-14 12:12:52 +0100 | [diff] [blame] | 122 | |
| 123 | /** |
Jamie Fox | 99360e8 | 2020-02-20 16:00:09 +0000 | [diff] [blame] | 124 | * \brief Sets the index of the local storage in use with a key requested by the |
| 125 | * calling partition, and stores the corresponding key_handle. |
Antonio de Angelis | 04debbd | 2019-10-14 12:12:52 +0100 | [diff] [blame] | 126 | * |
Jamie Fox | 99360e8 | 2020-02-20 16:00:09 +0000 | [diff] [blame] | 127 | * \param[in] index Index of the local storage to use |
| 128 | * \param[in] key_handle Corresponding key handle to associate |
Antonio de Angelis | 04debbd | 2019-10-14 12:12:52 +0100 | [diff] [blame] | 129 | * |
| 130 | * \return Return values as described in \ref psa_status_t |
| 131 | */ |
Jamie Fox | 99360e8 | 2020-02-20 16:00:09 +0000 | [diff] [blame] | 132 | psa_status_t tfm_crypto_set_key_storage(uint32_t index, |
Antonio de Angelis | 04debbd | 2019-10-14 12:12:52 +0100 | [diff] [blame] | 133 | psa_key_handle_t key_handle); |
Antonio de Angelis | 60a6fe6 | 2019-06-18 15:27:34 +0100 | [diff] [blame] | 134 | /** |
Antonio de Angelis | 819c2f3 | 2019-02-06 14:32:02 +0000 | [diff] [blame] | 135 | * \brief Allocate an operation context in the backend |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 136 | * |
Antonio de Angelis | 4743e67 | 2019-04-11 11:38:48 +0100 | [diff] [blame] | 137 | * \param[in] type Type of the operation context to allocate |
Antonio de Angelis | 60a6fe6 | 2019-06-18 15:27:34 +0100 | [diff] [blame] | 138 | * \param[out] handle Pointer to hold the allocated handle |
Antonio de Angelis | 4743e67 | 2019-04-11 11:38:48 +0100 | [diff] [blame] | 139 | * \param[out ctx Double pointer to the corresponding context |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 140 | * |
Antonio de Angelis | ab85ccd | 2019-03-25 15:14:29 +0000 | [diff] [blame] | 141 | * \return Return values as described in \ref psa_status_t |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 142 | */ |
Antonio de Angelis | ab85ccd | 2019-03-25 15:14:29 +0000 | [diff] [blame] | 143 | psa_status_t tfm_crypto_operation_alloc(enum tfm_crypto_operation_type type, |
Antonio de Angelis | 4743e67 | 2019-04-11 11:38:48 +0100 | [diff] [blame] | 144 | uint32_t *handle, |
Antonio de Angelis | 819c2f3 | 2019-02-06 14:32:02 +0000 | [diff] [blame] | 145 | void **ctx); |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 146 | /** |
Antonio de Angelis | 819c2f3 | 2019-02-06 14:32:02 +0000 | [diff] [blame] | 147 | * \brief Release an operation context in the backend |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 148 | * |
Antonio de Angelis | 4743e67 | 2019-04-11 11:38:48 +0100 | [diff] [blame] | 149 | * \param[in] handle Pointer to the handle of the context to release |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 150 | * |
Antonio de Angelis | ab85ccd | 2019-03-25 15:14:29 +0000 | [diff] [blame] | 151 | * \return Return values as described in \ref psa_status_t |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 152 | */ |
Antonio de Angelis | 4743e67 | 2019-04-11 11:38:48 +0100 | [diff] [blame] | 153 | psa_status_t tfm_crypto_operation_release(uint32_t *handle); |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 154 | /** |
Antonio de Angelis | 819c2f3 | 2019-02-06 14:32:02 +0000 | [diff] [blame] | 155 | * \brief Look up an operation context in the backend for the corresponding |
| 156 | * frontend operation |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 157 | * |
Antonio de Angelis | 4743e67 | 2019-04-11 11:38:48 +0100 | [diff] [blame] | 158 | * \param[in] type Type of the operation context to look up |
| 159 | * \param[in] handle Handle of the context to lookup |
| 160 | * \param[out] ctx Double pointer to the corresponding context |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 161 | * |
Antonio de Angelis | ab85ccd | 2019-03-25 15:14:29 +0000 | [diff] [blame] | 162 | * \return Return values as described in \ref psa_status_t |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 163 | */ |
Antonio de Angelis | ab85ccd | 2019-03-25 15:14:29 +0000 | [diff] [blame] | 164 | psa_status_t tfm_crypto_operation_lookup(enum tfm_crypto_operation_type type, |
Antonio de Angelis | 4743e67 | 2019-04-11 11:38:48 +0100 | [diff] [blame] | 165 | uint32_t handle, |
Antonio de Angelis | ab85ccd | 2019-03-25 15:14:29 +0000 | [diff] [blame] | 166 | void **ctx); |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 167 | |
Antonio de Angelis | ab85ccd | 2019-03-25 15:14:29 +0000 | [diff] [blame] | 168 | #define LIST_TFM_CRYPTO_UNIFORM_SIGNATURE_API \ |
Antonio de Angelis | 04debbd | 2019-10-14 12:12:52 +0100 | [diff] [blame] | 169 | X(tfm_crypto_get_key_attributes) \ |
| 170 | X(tfm_crypto_reset_key_attributes) \ |
Jamie Fox | dadb4e8 | 2019-09-03 17:59:41 +0100 | [diff] [blame] | 171 | X(tfm_crypto_open_key) \ |
| 172 | X(tfm_crypto_close_key) \ |
Antonio de Angelis | 25e2b2d | 2019-04-25 14:49:50 +0100 | [diff] [blame] | 173 | X(tfm_crypto_import_key) \ |
| 174 | X(tfm_crypto_destroy_key) \ |
Antonio de Angelis | 25e2b2d | 2019-04-25 14:49:50 +0100 | [diff] [blame] | 175 | X(tfm_crypto_export_key) \ |
| 176 | X(tfm_crypto_export_public_key) \ |
| 177 | X(tfm_crypto_copy_key) \ |
Antonio de Angelis | 04debbd | 2019-10-14 12:12:52 +0100 | [diff] [blame] | 178 | X(tfm_crypto_hash_compute) \ |
| 179 | X(tfm_crypto_hash_compare) \ |
Antonio de Angelis | 25e2b2d | 2019-04-25 14:49:50 +0100 | [diff] [blame] | 180 | X(tfm_crypto_hash_setup) \ |
| 181 | X(tfm_crypto_hash_update) \ |
| 182 | X(tfm_crypto_hash_finish) \ |
| 183 | X(tfm_crypto_hash_verify) \ |
| 184 | X(tfm_crypto_hash_abort) \ |
| 185 | X(tfm_crypto_hash_clone) \ |
Antonio de Angelis | 04debbd | 2019-10-14 12:12:52 +0100 | [diff] [blame] | 186 | X(tfm_crypto_mac_compute) \ |
| 187 | X(tfm_crypto_mac_verify) \ |
Antonio de Angelis | 25e2b2d | 2019-04-25 14:49:50 +0100 | [diff] [blame] | 188 | X(tfm_crypto_mac_sign_setup) \ |
| 189 | X(tfm_crypto_mac_verify_setup) \ |
| 190 | X(tfm_crypto_mac_update) \ |
| 191 | X(tfm_crypto_mac_sign_finish) \ |
| 192 | X(tfm_crypto_mac_verify_finish) \ |
| 193 | X(tfm_crypto_mac_abort) \ |
Antonio de Angelis | 04debbd | 2019-10-14 12:12:52 +0100 | [diff] [blame] | 194 | X(tfm_crypto_cipher_encrypt) \ |
| 195 | X(tfm_crypto_cipher_decrypt) \ |
| 196 | X(tfm_crypto_cipher_encrypt_setup) \ |
| 197 | X(tfm_crypto_cipher_decrypt_setup) \ |
| 198 | X(tfm_crypto_cipher_generate_iv) \ |
| 199 | X(tfm_crypto_cipher_set_iv) \ |
| 200 | X(tfm_crypto_cipher_update) \ |
| 201 | X(tfm_crypto_cipher_finish) \ |
| 202 | X(tfm_crypto_cipher_abort) \ |
Antonio de Angelis | 25e2b2d | 2019-04-25 14:49:50 +0100 | [diff] [blame] | 203 | X(tfm_crypto_aead_encrypt) \ |
| 204 | X(tfm_crypto_aead_decrypt) \ |
Antonio de Angelis | 04debbd | 2019-10-14 12:12:52 +0100 | [diff] [blame] | 205 | X(tfm_crypto_aead_encrypt_setup) \ |
| 206 | X(tfm_crypto_aead_decrypt_setup) \ |
| 207 | X(tfm_crypto_aead_generate_nonce) \ |
| 208 | X(tfm_crypto_aead_set_nonce) \ |
| 209 | X(tfm_crypto_aead_set_lengths) \ |
| 210 | X(tfm_crypto_aead_update_ad) \ |
| 211 | X(tfm_crypto_aead_update) \ |
| 212 | X(tfm_crypto_aead_finish) \ |
| 213 | X(tfm_crypto_aead_verify) \ |
| 214 | X(tfm_crypto_aead_abort) \ |
| 215 | X(tfm_crypto_sign_hash) \ |
| 216 | X(tfm_crypto_verify_hash) \ |
Antonio de Angelis | 25e2b2d | 2019-04-25 14:49:50 +0100 | [diff] [blame] | 217 | X(tfm_crypto_asymmetric_encrypt) \ |
| 218 | X(tfm_crypto_asymmetric_decrypt) \ |
Antonio de Angelis | 04debbd | 2019-10-14 12:12:52 +0100 | [diff] [blame] | 219 | X(tfm_crypto_key_derivation_setup) \ |
| 220 | X(tfm_crypto_key_derivation_get_capacity) \ |
| 221 | X(tfm_crypto_key_derivation_set_capacity) \ |
| 222 | X(tfm_crypto_key_derivation_input_bytes) \ |
| 223 | X(tfm_crypto_key_derivation_input_key) \ |
| 224 | X(tfm_crypto_key_derivation_key_agreement)\ |
| 225 | X(tfm_crypto_key_derivation_output_bytes) \ |
| 226 | X(tfm_crypto_key_derivation_output_key) \ |
| 227 | X(tfm_crypto_key_derivation_abort) \ |
| 228 | X(tfm_crypto_raw_key_agreement) \ |
Antonio de Angelis | 25e2b2d | 2019-04-25 14:49:50 +0100 | [diff] [blame] | 229 | X(tfm_crypto_generate_random) \ |
| 230 | X(tfm_crypto_generate_key) \ |
Antonio de Angelis | 04debbd | 2019-10-14 12:12:52 +0100 | [diff] [blame] | 231 | X(tfm_crypto_set_key_domain_parameters) \ |
| 232 | X(tfm_crypto_get_key_domain_parameters) \ |
Jamie Fox | efd8273 | 2018-11-26 10:34:32 +0000 | [diff] [blame] | 233 | |
Antonio de Angelis | 25e2b2d | 2019-04-25 14:49:50 +0100 | [diff] [blame] | 234 | #define X(api_name) UNIFORM_SIGNATURE_API(api_name); |
Antonio de Angelis | ab85ccd | 2019-03-25 15:14:29 +0000 | [diff] [blame] | 235 | LIST_TFM_CRYPTO_UNIFORM_SIGNATURE_API |
| 236 | #undef X |
Jamie Fox | efd8273 | 2018-11-26 10:34:32 +0000 | [diff] [blame] | 237 | |
Antonio de Angelis | 8908f47 | 2018-08-31 15:44:25 +0100 | [diff] [blame] | 238 | #ifdef __cplusplus |
| 239 | } |
| 240 | #endif |
| 241 | |
| 242 | #endif /* __TFM_CRYPTO_API_H__ */ |