blob: 88b6b5367d8a0003afa45f70fcaf887717dc242b [file] [log] [blame]
Antonio de Angelis377a1552018-11-22 17:02:40 +00001/*
Summer Qinf07cc312022-01-05 16:52:54 +08002 * Copyright (c) 2018-2022, Arm Limited. All rights reserved.
Antonio de Angelis377a1552018-11-22 17:02:40 +00003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 *
6 */
7/**
Jamie Foxcc31d402019-01-28 17:13:52 +00008 * \file psa/crypto_struct.h
Antonio de Angelis377a1552018-11-22 17:02:40 +00009 *
10 * \brief PSA cryptography module: structured type implementations
11 *
12 * \note This file may not be included directly. Applications must
Jamie Foxcc31d402019-01-28 17:13:52 +000013 * include psa/crypto.h.
Antonio de Angelis377a1552018-11-22 17:02:40 +000014 *
15 * This file contains the definitions of some data structures with
16 * implementation-specific definitions.
17 *
18 * In implementations with isolation between the application and the
19 * cryptography module, it is expected that the front-end and the back-end
20 * would have different versions of this file.
21 */
22
23#ifndef PSA_CRYPTO_STRUCT_H
24#define PSA_CRYPTO_STRUCT_H
25
Antonio de Angelis04debbd2019-10-14 12:12:52 +010026#ifdef __cplusplus
27extern "C" {
28#endif
29
30/*
31 * Note that the below structures are different from the decalrations in
32 * mbed-crypto. This is because TF-M maintains 'front-end' and 'back-end'
33 * versions of this header. In the front-end version, exported to NS
34 * clients in interface/include/psa, a crypto operation is defined as an
35 * opaque handle to a context in the Crypto service. The back-end
36 * version, directly included from the mbed-crypto repo by the Crypto
37 * service, contains the full definition of the operation structs.
38 *
39 * One of the functions of the Crypto service is to allocate the back-end
40 * operation contexts in its own partition memory (in crypto_alloc.c),
41 * and then do the mapping between front-end operation handles passed by
42 * NS clients and the corresponding back-end operation contexts. The
43 * advantage of doing it this way is that internal mbed-crypto state is never
44 * exposed to the NS client.
45 */
46
Antonio de Angelis377a1552018-11-22 17:02:40 +000047struct psa_hash_operation_s
48{
49 uint32_t handle;
50};
51
Jamie Fox0e54ebc2019-04-09 14:21:04 +010052#define PSA_HASH_OPERATION_INIT {0}
Gilles Peskineba5aae92023-03-02 13:14:49 +010053static inline struct psa_hash_operation_s psa_hash_operation_init(void)
Jamie Fox0e54ebc2019-04-09 14:21:04 +010054{
55 const struct psa_hash_operation_s v = PSA_HASH_OPERATION_INIT;
Gilles Peskineba5aae92023-03-02 13:14:49 +010056 return v;
Jamie Fox0e54ebc2019-04-09 14:21:04 +010057}
58
Antonio de Angelis377a1552018-11-22 17:02:40 +000059struct psa_mac_operation_s
60{
61 uint32_t handle;
62};
63
Jamie Fox0e54ebc2019-04-09 14:21:04 +010064#define PSA_MAC_OPERATION_INIT {0}
Gilles Peskineba5aae92023-03-02 13:14:49 +010065static inline struct psa_mac_operation_s psa_mac_operation_init(void)
Jamie Fox0e54ebc2019-04-09 14:21:04 +010066{
67 const struct psa_mac_operation_s v = PSA_MAC_OPERATION_INIT;
Gilles Peskineba5aae92023-03-02 13:14:49 +010068 return v;
Jamie Fox0e54ebc2019-04-09 14:21:04 +010069}
70
Antonio de Angelis377a1552018-11-22 17:02:40 +000071struct psa_cipher_operation_s
72{
73 uint32_t handle;
74};
75
Jamie Fox0e54ebc2019-04-09 14:21:04 +010076#define PSA_CIPHER_OPERATION_INIT {0}
Gilles Peskineba5aae92023-03-02 13:14:49 +010077static inline struct psa_cipher_operation_s psa_cipher_operation_init(void)
Jamie Fox0e54ebc2019-04-09 14:21:04 +010078{
79 const struct psa_cipher_operation_s v = PSA_CIPHER_OPERATION_INIT;
Gilles Peskineba5aae92023-03-02 13:14:49 +010080 return v;
Jamie Fox0e54ebc2019-04-09 14:21:04 +010081}
82
Antonio de Angelis04debbd2019-10-14 12:12:52 +010083struct psa_aead_operation_s
Jamie Fox0e54ebc2019-04-09 14:21:04 +010084{
85 uint32_t handle;
86};
87
Antonio de Angelis04debbd2019-10-14 12:12:52 +010088#define PSA_AEAD_OPERATION_INIT {0}
Gilles Peskineba5aae92023-03-02 13:14:49 +010089static inline struct psa_aead_operation_s psa_aead_operation_init(void)
Jamie Fox0e54ebc2019-04-09 14:21:04 +010090{
Antonio de Angelis04debbd2019-10-14 12:12:52 +010091 const struct psa_aead_operation_s v = PSA_AEAD_OPERATION_INIT;
Gilles Peskineba5aae92023-03-02 13:14:49 +010092 return v;
Antonio de Angelis04debbd2019-10-14 12:12:52 +010093}
94
95struct psa_key_derivation_s
96{
97 uint32_t handle;
98};
99
100#define PSA_KEY_DERIVATION_OPERATION_INIT {0}
Gilles Peskineba5aae92023-03-02 13:14:49 +0100101static inline struct psa_key_derivation_s psa_key_derivation_operation_init(void)
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100102{
103 const struct psa_key_derivation_s v = PSA_KEY_DERIVATION_OPERATION_INIT;
Gilles Peskineba5aae92023-03-02 13:14:49 +0100104 return v;
Jamie Fox0e54ebc2019-04-09 14:21:04 +0100105}
106
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100107/* The type used internally for key sizes.
108 * Public interfaces use size_t, but internally we use a smaller type. */
109typedef uint16_t psa_key_bits_t;
110/* The maximum value of the type used to represent bit-sizes.
111 * This is used to mark an invalid key size. */
Summer Qind635cd02023-03-31 18:07:38 +0800112#define PSA_KEY_BITS_TOO_LARGE ((psa_key_bits_t) -1)
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100113/* The maximum size of a key in bits.
114 * Currently defined as the maximum that can be represented, rounded down
115 * to a whole number of bytes.
116 * This is an uncast value so that it can be used in preprocessor
117 * conditionals. */
118#define PSA_MAX_KEY_BITS 0xfff8
119
Gilles Peskine2f820412023-03-01 21:28:46 +0100120/* On the client side, only some key attributes are visible.
121 * The server has a different definition of psa_key_attributes_s which
122 * maintains more attributes.
123 */
Antonio de Angelis380b2b42023-03-17 13:54:37 +0000124#include "crypto_client_struct.h"
Gilles Peskine2f820412023-03-01 21:28:46 +0100125struct psa_key_attributes_s {
126 struct psa_client_key_attributes_s client;
127};
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100128
Gilles Peskine2f820412023-03-01 21:28:46 +0100129#define PSA_KEY_ATTRIBUTES_INIT {PSA_CLIENT_KEY_ATTRIBUTES_INIT}
130
131static inline struct psa_key_attributes_s psa_key_attributes_init(void)
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100132{
Gilles Peskine2f820412023-03-01 21:28:46 +0100133 const struct psa_key_attributes_s v = PSA_KEY_ATTRIBUTES_INIT;
Gilles Peskineba5aae92023-03-02 13:14:49 +0100134 return v;
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100135}
136
137static inline void psa_set_key_id(psa_key_attributes_t *attributes,
Antonio de Angelis34a0ffd2023-02-16 11:56:46 +0000138 mbedtls_svc_key_id_t key)
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100139{
Gilles Peskine2f820412023-03-01 21:28:46 +0100140 psa_key_lifetime_t lifetime = attributes->client.lifetime;
Maulik Patel28659c42021-01-06 14:09:22 +0000141
Antonio de Angelis34a0ffd2023-02-16 11:56:46 +0000142 attributes->client.id = (psa_key_id_t)key;
Maulik Patel28659c42021-01-06 14:09:22 +0000143
Summer Qind635cd02023-03-31 18:07:38 +0800144 if (PSA_KEY_LIFETIME_IS_VOLATILE(lifetime))
Maulik Patel28659c42021-01-06 14:09:22 +0000145 {
Gilles Peskine2f820412023-03-01 21:28:46 +0100146 attributes->client.lifetime =
Maulik Patel28659c42021-01-06 14:09:22 +0000147 PSA_KEY_LIFETIME_FROM_PERSISTENCE_AND_LOCATION(
148 PSA_KEY_LIFETIME_PERSISTENT,
149 PSA_KEY_LIFETIME_GET_LOCATION(lifetime));
150 }
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100151}
152
Antonio de Angelis34a0ffd2023-02-16 11:56:46 +0000153static inline mbedtls_svc_key_id_t psa_get_key_id(
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100154 const psa_key_attributes_t *attributes)
155{
Antonio de Angelis34a0ffd2023-02-16 11:56:46 +0000156 return (mbedtls_svc_key_id_t)attributes->client.id;
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100157}
158
159static inline void psa_set_key_lifetime(psa_key_attributes_t *attributes,
160 psa_key_lifetime_t lifetime)
161{
Gilles Peskine2f820412023-03-01 21:28:46 +0100162 attributes->client.lifetime = lifetime;
Summer Qind635cd02023-03-31 18:07:38 +0800163 if (PSA_KEY_LIFETIME_IS_VOLATILE(lifetime))
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100164 {
Gilles Peskine2f820412023-03-01 21:28:46 +0100165 attributes->client.id = 0;
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100166 }
167}
168
169static inline psa_key_lifetime_t psa_get_key_lifetime(
170 const psa_key_attributes_t *attributes)
171{
Gilles Peskine2f820412023-03-01 21:28:46 +0100172 return attributes->client.lifetime;
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100173}
174
Summer Qinf07cc312022-01-05 16:52:54 +0800175static inline void psa_extend_key_usage_flags(psa_key_usage_t *usage_flags)
176{
Summer Qind635cd02023-03-31 18:07:38 +0800177 if (*usage_flags & PSA_KEY_USAGE_SIGN_HASH) {
Summer Qinf07cc312022-01-05 16:52:54 +0800178 *usage_flags |= PSA_KEY_USAGE_SIGN_MESSAGE;
Summer Qind635cd02023-03-31 18:07:38 +0800179 }
Summer Qinf07cc312022-01-05 16:52:54 +0800180
Summer Qind635cd02023-03-31 18:07:38 +0800181 if (*usage_flags & PSA_KEY_USAGE_VERIFY_HASH) {
Summer Qinf07cc312022-01-05 16:52:54 +0800182 *usage_flags |= PSA_KEY_USAGE_VERIFY_MESSAGE;
Summer Qind635cd02023-03-31 18:07:38 +0800183 }
Summer Qinf07cc312022-01-05 16:52:54 +0800184}
185
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100186static inline void psa_set_key_usage_flags(psa_key_attributes_t *attributes,
187 psa_key_usage_t usage_flags)
188{
Summer Qinf07cc312022-01-05 16:52:54 +0800189 psa_extend_key_usage_flags(&usage_flags);
Gilles Peskine2f820412023-03-01 21:28:46 +0100190 attributes->client.usage = usage_flags;
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100191}
192
193static inline psa_key_usage_t psa_get_key_usage_flags(
194 const psa_key_attributes_t *attributes)
195{
Gilles Peskine2f820412023-03-01 21:28:46 +0100196 return attributes->client.usage;
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100197}
198
199static inline void psa_set_key_algorithm(psa_key_attributes_t *attributes,
200 psa_algorithm_t alg)
201{
Gilles Peskine2f820412023-03-01 21:28:46 +0100202 attributes->client.alg = alg;
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100203}
204
205static inline psa_algorithm_t psa_get_key_algorithm(
206 const psa_key_attributes_t *attributes)
207{
Gilles Peskine2f820412023-03-01 21:28:46 +0100208 return attributes->client.alg;
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100209}
210
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100211static inline void psa_set_key_type(psa_key_attributes_t *attributes,
212 psa_key_type_t type)
213{
Gilles Peskine2f820412023-03-01 21:28:46 +0100214 attributes->client.type = type;
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100215}
216
217static inline psa_key_type_t psa_get_key_type(
218 const psa_key_attributes_t *attributes)
219{
Gilles Peskine2f820412023-03-01 21:28:46 +0100220 return attributes->client.type;
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100221}
222
223static inline void psa_set_key_bits(psa_key_attributes_t *attributes,
224 size_t bits)
225{
Summer Qind635cd02023-03-31 18:07:38 +0800226 if (bits > PSA_MAX_KEY_BITS) {
Gilles Peskine2f820412023-03-01 21:28:46 +0100227 attributes->client.bits = PSA_KEY_BITS_TOO_LARGE;
Summer Qind635cd02023-03-31 18:07:38 +0800228 } else {
Gilles Peskine2f820412023-03-01 21:28:46 +0100229 attributes->client.bits = bits;
Summer Qind635cd02023-03-31 18:07:38 +0800230 }
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100231}
232
233static inline size_t psa_get_key_bits(
234 const psa_key_attributes_t *attributes)
235{
Gilles Peskine2f820412023-03-01 21:28:46 +0100236 return attributes->client.bits;
Antonio de Angelis04debbd2019-10-14 12:12:52 +0100237}
238
239#ifdef __cplusplus
240}
241#endif
242
Antonio de Angelis377a1552018-11-22 17:02:40 +0000243#endif /* PSA_CRYPTO_STRUCT_H */