blob: 4884344799b89e050a6ffb9a3138bbea17a4263f [file] [log] [blame]
Julian Hallc02fffb2020-11-23 18:22:06 +01001/*
julhal01c3f4e9a2020-12-15 13:39:01 +00002 * Copyright (c) 2020-2021, Arm Limited and Contributors. All rights reserved.
Julian Hallc02fffb2020-11-23 18:22:06 +01003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#ifndef CRYPTO_CLIENT_H
8#define CRYPTO_CLIENT_H
9
10#include <cstdint>
11#include <psa/crypto.h>
Julian Hallc02fffb2020-11-23 18:22:06 +010012
13struct rpc_caller;
14
julhal01734dbad2020-12-21 10:27:41 +000015/*
16 * Provides a client interface for accessing an instance of the Crypto service
17 * using a C++ version of the PSA Crypto API.
18 */
Julian Hallc02fffb2020-11-23 18:22:06 +010019class crypto_client
20{
21public:
Julian Hallc02fffb2020-11-23 18:22:06 +010022 virtual ~crypto_client();
23
24 int err_rpc_status() const;
25
26 /* Key lifecycle methods */
Balint Dobszay3c52ce62021-05-10 16:27:18 +020027 virtual psa_status_t generate_key(const psa_key_attributes_t *attributes, psa_key_id_t *id) = 0;
28 virtual psa_status_t destroy_key(psa_key_id_t id) = 0;
julhal01734dbad2020-12-21 10:27:41 +000029 virtual psa_status_t import_key(const psa_key_attributes_t *attributes,
Balint Dobszay3c52ce62021-05-10 16:27:18 +020030 const uint8_t *data, size_t data_length, psa_key_id_t *id) = 0;
Julian Hallc02fffb2020-11-23 18:22:06 +010031
32 /* Key export methods */
Balint Dobszay3c52ce62021-05-10 16:27:18 +020033 virtual psa_status_t export_key(psa_key_id_t id,
Julian Hallc02fffb2020-11-23 18:22:06 +010034 uint8_t *data, size_t data_size,
julhal01734dbad2020-12-21 10:27:41 +000035 size_t *data_length) = 0;
Balint Dobszay3c52ce62021-05-10 16:27:18 +020036 virtual psa_status_t export_public_key(psa_key_id_t id,
julhal01734dbad2020-12-21 10:27:41 +000037 uint8_t *data, size_t data_size, size_t *data_length) = 0;
Julian Hallc02fffb2020-11-23 18:22:06 +010038
39 /* Sign/verify methods */
Balint Dobszay3c52ce62021-05-10 16:27:18 +020040 virtual psa_status_t sign_hash(psa_key_id_t id, psa_algorithm_t alg,
Julian Hallc02fffb2020-11-23 18:22:06 +010041 const uint8_t *hash, size_t hash_length,
julhal01734dbad2020-12-21 10:27:41 +000042 uint8_t *signature, size_t signature_size, size_t *signature_length) = 0;
Balint Dobszay3c52ce62021-05-10 16:27:18 +020043 virtual psa_status_t verify_hash(psa_key_id_t id, psa_algorithm_t alg,
Julian Hallc02fffb2020-11-23 18:22:06 +010044 const uint8_t *hash, size_t hash_length,
julhal01734dbad2020-12-21 10:27:41 +000045 const uint8_t *signature, size_t signature_length) = 0;
Julian Hallc02fffb2020-11-23 18:22:06 +010046
47 /* Asymmetric encrypt/decrypt */
Balint Dobszay3c52ce62021-05-10 16:27:18 +020048 virtual psa_status_t asymmetric_encrypt(psa_key_id_t id, psa_algorithm_t alg,
Julian Hallc02fffb2020-11-23 18:22:06 +010049 const uint8_t *input, size_t input_length,
50 const uint8_t *salt, size_t salt_length,
julhal01734dbad2020-12-21 10:27:41 +000051 uint8_t *output, size_t output_size, size_t *output_length) = 0;
Balint Dobszay3c52ce62021-05-10 16:27:18 +020052 virtual psa_status_t asymmetric_decrypt(psa_key_id_t id, psa_algorithm_t alg,
Julian Hallc02fffb2020-11-23 18:22:06 +010053 const uint8_t *input, size_t input_length,
54 const uint8_t *salt, size_t salt_length,
julhal01734dbad2020-12-21 10:27:41 +000055 uint8_t *output, size_t output_size, size_t *output_length) = 0;
Julian Hallc02fffb2020-11-23 18:22:06 +010056
57 /* Random number generation */
julhal01734dbad2020-12-21 10:27:41 +000058 virtual psa_status_t generate_random(uint8_t *output, size_t output_size) = 0;
Julian Hallc02fffb2020-11-23 18:22:06 +010059
60protected:
61 crypto_client();
julhal01734dbad2020-12-21 10:27:41 +000062 crypto_client(struct rpc_caller *caller);
julhal01c3f4e9a2020-12-15 13:39:01 +000063 void set_caller(struct rpc_caller *caller);
Julian Hallc02fffb2020-11-23 18:22:06 +010064
Julian Hallc02fffb2020-11-23 18:22:06 +010065 struct rpc_caller *m_caller;
66 int m_err_rpc_status;
67};
68
69#endif /* CRYPTO_CLIENT_H */