Julian Hall | c02fffb | 2020-11-23 18:22:06 +0100 | [diff] [blame] | 1 | /* |
julhal01 | c3f4e9a | 2020-12-15 13:39:01 +0000 | [diff] [blame] | 2 | * Copyright (c) 2020-2021, Arm Limited and Contributors. All rights reserved. |
Julian Hall | c02fffb | 2020-11-23 18:22:06 +0100 | [diff] [blame] | 3 | * |
| 4 | * SPDX-License-Identifier: BSD-3-Clause |
| 5 | */ |
| 6 | |
| 7 | #ifndef CRYPTO_CLIENT_H |
| 8 | #define CRYPTO_CLIENT_H |
| 9 | |
| 10 | #include <cstdint> |
| 11 | #include <psa/crypto.h> |
Julian Hall | c02fffb | 2020-11-23 18:22:06 +0100 | [diff] [blame] | 12 | |
| 13 | struct rpc_caller; |
| 14 | |
julhal01 | 734dbad | 2020-12-21 10:27:41 +0000 | [diff] [blame] | 15 | /* |
| 16 | * Provides a client interface for accessing an instance of the Crypto service |
| 17 | * using a C++ version of the PSA Crypto API. |
| 18 | */ |
Julian Hall | c02fffb | 2020-11-23 18:22:06 +0100 | [diff] [blame] | 19 | class crypto_client |
| 20 | { |
| 21 | public: |
Julian Hall | c02fffb | 2020-11-23 18:22:06 +0100 | [diff] [blame] | 22 | virtual ~crypto_client(); |
| 23 | |
| 24 | int err_rpc_status() const; |
| 25 | |
| 26 | /* Key lifecycle methods */ |
Julian Hall | f572896 | 2021-06-24 09:40:23 +0100 | [diff] [blame^] | 27 | virtual psa_status_t generate_key(const psa_key_attributes_t *attributes, |
| 28 | psa_key_id_t *id) = 0; |
Balint Dobszay | 3c52ce6 | 2021-05-10 16:27:18 +0200 | [diff] [blame] | 29 | virtual psa_status_t destroy_key(psa_key_id_t id) = 0; |
julhal01 | 734dbad | 2020-12-21 10:27:41 +0000 | [diff] [blame] | 30 | virtual psa_status_t import_key(const psa_key_attributes_t *attributes, |
Balint Dobszay | 3c52ce6 | 2021-05-10 16:27:18 +0200 | [diff] [blame] | 31 | const uint8_t *data, size_t data_length, psa_key_id_t *id) = 0; |
Julian Hall | c02fffb | 2020-11-23 18:22:06 +0100 | [diff] [blame] | 32 | |
| 33 | /* Key export methods */ |
Balint Dobszay | 3c52ce6 | 2021-05-10 16:27:18 +0200 | [diff] [blame] | 34 | virtual psa_status_t export_key(psa_key_id_t id, |
Julian Hall | c02fffb | 2020-11-23 18:22:06 +0100 | [diff] [blame] | 35 | uint8_t *data, size_t data_size, |
julhal01 | 734dbad | 2020-12-21 10:27:41 +0000 | [diff] [blame] | 36 | size_t *data_length) = 0; |
Balint Dobszay | 3c52ce6 | 2021-05-10 16:27:18 +0200 | [diff] [blame] | 37 | virtual psa_status_t export_public_key(psa_key_id_t id, |
julhal01 | 734dbad | 2020-12-21 10:27:41 +0000 | [diff] [blame] | 38 | uint8_t *data, size_t data_size, size_t *data_length) = 0; |
Julian Hall | c02fffb | 2020-11-23 18:22:06 +0100 | [diff] [blame] | 39 | |
| 40 | /* Sign/verify methods */ |
Balint Dobszay | 3c52ce6 | 2021-05-10 16:27:18 +0200 | [diff] [blame] | 41 | virtual psa_status_t sign_hash(psa_key_id_t id, psa_algorithm_t alg, |
Julian Hall | c02fffb | 2020-11-23 18:22:06 +0100 | [diff] [blame] | 42 | const uint8_t *hash, size_t hash_length, |
Julian Hall | f572896 | 2021-06-24 09:40:23 +0100 | [diff] [blame^] | 43 | uint8_t *signature, size_t signature_size, |
| 44 | size_t *signature_length) = 0; |
Balint Dobszay | 3c52ce6 | 2021-05-10 16:27:18 +0200 | [diff] [blame] | 45 | virtual psa_status_t verify_hash(psa_key_id_t id, psa_algorithm_t alg, |
Julian Hall | c02fffb | 2020-11-23 18:22:06 +0100 | [diff] [blame] | 46 | const uint8_t *hash, size_t hash_length, |
julhal01 | 734dbad | 2020-12-21 10:27:41 +0000 | [diff] [blame] | 47 | const uint8_t *signature, size_t signature_length) = 0; |
Julian Hall | c02fffb | 2020-11-23 18:22:06 +0100 | [diff] [blame] | 48 | |
| 49 | /* Asymmetric encrypt/decrypt */ |
Balint Dobszay | 3c52ce6 | 2021-05-10 16:27:18 +0200 | [diff] [blame] | 50 | virtual psa_status_t asymmetric_encrypt(psa_key_id_t id, psa_algorithm_t alg, |
Julian Hall | c02fffb | 2020-11-23 18:22:06 +0100 | [diff] [blame] | 51 | const uint8_t *input, size_t input_length, |
| 52 | const uint8_t *salt, size_t salt_length, |
julhal01 | 734dbad | 2020-12-21 10:27:41 +0000 | [diff] [blame] | 53 | uint8_t *output, size_t output_size, size_t *output_length) = 0; |
Balint Dobszay | 3c52ce6 | 2021-05-10 16:27:18 +0200 | [diff] [blame] | 54 | virtual psa_status_t asymmetric_decrypt(psa_key_id_t id, psa_algorithm_t alg, |
Julian Hall | c02fffb | 2020-11-23 18:22:06 +0100 | [diff] [blame] | 55 | const uint8_t *input, size_t input_length, |
| 56 | const uint8_t *salt, size_t salt_length, |
julhal01 | 734dbad | 2020-12-21 10:27:41 +0000 | [diff] [blame] | 57 | uint8_t *output, size_t output_size, size_t *output_length) = 0; |
Julian Hall | c02fffb | 2020-11-23 18:22:06 +0100 | [diff] [blame] | 58 | |
| 59 | /* Random number generation */ |
julhal01 | 734dbad | 2020-12-21 10:27:41 +0000 | [diff] [blame] | 60 | virtual psa_status_t generate_random(uint8_t *output, size_t output_size) = 0; |
Julian Hall | c02fffb | 2020-11-23 18:22:06 +0100 | [diff] [blame] | 61 | |
Julian Hall | f572896 | 2021-06-24 09:40:23 +0100 | [diff] [blame^] | 62 | /* Hash methods */ |
| 63 | virtual psa_status_t hash_setup(uint32_t *op_handle, |
| 64 | psa_algorithm_t alg) = 0; |
| 65 | virtual psa_status_t hash_update(uint32_t op_handle, |
| 66 | const uint8_t *input, size_t input_length) = 0; |
| 67 | virtual psa_status_t hash_finish(uint32_t op_handle, |
| 68 | uint8_t *hash, size_t hash_size, size_t *hash_length) = 0; |
| 69 | |
Julian Hall | c02fffb | 2020-11-23 18:22:06 +0100 | [diff] [blame] | 70 | protected: |
| 71 | crypto_client(); |
julhal01 | 734dbad | 2020-12-21 10:27:41 +0000 | [diff] [blame] | 72 | crypto_client(struct rpc_caller *caller); |
julhal01 | c3f4e9a | 2020-12-15 13:39:01 +0000 | [diff] [blame] | 73 | void set_caller(struct rpc_caller *caller); |
Julian Hall | c02fffb | 2020-11-23 18:22:06 +0100 | [diff] [blame] | 74 | |
Julian Hall | c02fffb | 2020-11-23 18:22:06 +0100 | [diff] [blame] | 75 | struct rpc_caller *m_caller; |
| 76 | int m_err_rpc_status; |
| 77 | }; |
| 78 | |
| 79 | #endif /* CRYPTO_CLIENT_H */ |