Gilles Peskine | 882f7c7 | 2022-04-07 13:44:55 +0200 | [diff] [blame^] | 1 | |
| 2 | <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" |
| 3 | "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> |
| 4 | |
| 5 | <html xmlns="http://www.w3.org/1999/xhtml"> |
| 6 | <head> |
| 7 | <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> |
| 8 | <title>PSA Cryptography API 1.1 — PSA Crypto API 1.1.0 documentation</title> |
| 9 | <link rel="stylesheet" href="_static/alabaster.css" type="text/css" /> |
| 10 | <link rel="stylesheet" href="_static/pygments.css" type="text/css" /> |
| 11 | <script type="text/javascript"> |
| 12 | var DOCUMENTATION_OPTIONS = { |
| 13 | URL_ROOT: './', |
| 14 | VERSION: '1.1.0', |
| 15 | COLLAPSE_INDEX: false, |
| 16 | FILE_SUFFIX: '.html', |
| 17 | HAS_SOURCE: false, |
| 18 | SOURCELINK_SUFFIX: '.txt' |
| 19 | }; |
| 20 | </script> |
| 21 | <script type="text/javascript" src="_static/jquery.js"></script> |
| 22 | <script type="text/javascript" src="_static/underscore.js"></script> |
| 23 | <script type="text/javascript" src="_static/doctools.js"></script> |
| 24 | <link rel="author" title="About these documents" href="about.html" /> |
| 25 | <link rel="index" title="Index" href="genindex.html" /> |
| 26 | <link rel="search" title="Search" href="search.html" /> |
| 27 | <link rel="next" title="About this document" href="about.html" /> |
| 28 | |
| 29 | <link rel="stylesheet" href="_static/custom.css" type="text/css" /> |
| 30 | |
| 31 | <meta name="viewport" content="width=device-width, initial-scale=0.9, maximum-scale=0.9" /> |
| 32 | |
| 33 | </head> |
| 34 | <body> |
| 35 | |
| 36 | |
| 37 | <div class="document"> |
| 38 | <div class="documentwrapper"> |
| 39 | <div class="bodywrapper"> |
| 40 | <div class="body" role="main"> |
| 41 | |
| 42 | <a class="reference internal image-reference" href="_images/Arm_logo_blue_150LG.png"><img alt="_images/Arm_logo_blue_150LG.png" class="align-right" src="_images/Arm_logo_blue_150LG.png" style="width: 5cm;" /></a> |
| 43 | <div class="section" id="doctitle-docversion"> |
| 44 | <h1>PSA Cryptography API 1.1</h1> |
| 45 | <table border="1" class="titletable docutils align-left"> |
| 46 | <colgroup> |
| 47 | <col width="50%" /> |
| 48 | <col width="50%" /> |
| 49 | </colgroup> |
| 50 | <tbody valign="top"> |
| 51 | <tr class="row-odd"><td>Document number:</td> |
| 52 | <td>IHI 0086</td> |
| 53 | </tr> |
| 54 | <tr class="row-even"><td>Release Quality:</td> |
| 55 | <td>Final</td> |
| 56 | </tr> |
| 57 | <tr class="row-odd"><td>Issue Number:</td> |
| 58 | <td>0</td> |
| 59 | </tr> |
| 60 | <tr class="row-even"><td>Confidentiality:</td> |
| 61 | <td>Non-confidential</td> |
| 62 | </tr> |
| 63 | <tr class="row-odd"><td>Date of Issue:</td> |
| 64 | <td>10/02/2022</td> |
| 65 | </tr> |
| 66 | </tbody> |
| 67 | </table> |
| 68 | <p class="titlecopyright">Copyright © 2018-2022, Arm Limited. All rights reserved.</p> |
| 69 | <p><span class="sectiontitle">Contents</span></p> |
| 70 | <div class="toctree-wrapper compound"> |
| 71 | <ul> |
| 72 | <li class="toctree-l1"><a class="reference internal" href="about.html">About this document</a><ul> |
| 73 | <li class="toctree-l2"><a class="reference internal" href="about.html#release-information">Release information</a></li> |
| 74 | <li class="toctree-l2"><a class="reference internal" href="about.html#arm-non-confidential-document-licence-licence">Arm Non-Confidential Document Licence (“Licence”)</a></li> |
| 75 | <li class="toctree-l2"><a class="reference internal" href="about.html#references">References</a></li> |
| 76 | <li class="toctree-l2"><a class="reference internal" href="about.html#terms-and-abbreviations">Terms and abbreviations</a></li> |
| 77 | <li class="toctree-l2"><a class="reference internal" href="about.html#potential-for-change">Potential for change</a></li> |
| 78 | <li class="toctree-l2"><a class="reference internal" href="about.html#conventions">Conventions</a></li> |
| 79 | <li class="toctree-l2"><a class="reference internal" href="about.html#pseudocode-descriptions">Pseudocode descriptions</a></li> |
| 80 | <li class="toctree-l2"><a class="reference internal" href="about.html#assembler-syntax-descriptions">Assembler syntax descriptions</a></li> |
| 81 | <li class="toctree-l2"><a class="reference internal" href="about.html#feedback">Feedback</a></li> |
| 82 | </ul> |
| 83 | </li> |
| 84 | </ul> |
| 85 | </div> |
| 86 | <div class="toctree-wrapper compound"> |
| 87 | <ul> |
| 88 | <li class="toctree-l1"><a class="reference internal" href="overview/intro.html">1. Introduction</a></li> |
| 89 | <li class="toctree-l1"><a class="reference internal" href="overview/goals.html">2. Design goals</a><ul> |
| 90 | <li class="toctree-l2"><a class="reference internal" href="overview/goals.html#suitable-for-constrained-devices">2.1. Suitable for constrained devices</a></li> |
| 91 | <li class="toctree-l2"><a class="reference internal" href="overview/goals.html#a-keystore-interface">2.2. A keystore interface</a></li> |
| 92 | <li class="toctree-l2"><a class="reference internal" href="overview/goals.html#optional-isolation">2.3. Optional isolation</a></li> |
| 93 | <li class="toctree-l2"><a class="reference internal" href="overview/goals.html#choice-of-algorithms">2.4. Choice of algorithms</a></li> |
| 94 | <li class="toctree-l2"><a class="reference internal" href="overview/goals.html#ease-of-use">2.5. Ease of use</a></li> |
| 95 | <li class="toctree-l2"><a class="reference internal" href="overview/goals.html#example-use-cases">2.6. Example use cases</a><ul> |
| 96 | <li class="toctree-l3"><a class="reference internal" href="overview/goals.html#network-security-tls">2.6.1. Network Security (TLS)</a></li> |
| 97 | <li class="toctree-l3"><a class="reference internal" href="overview/goals.html#secure-storage">2.6.2. Secure Storage</a></li> |
| 98 | <li class="toctree-l3"><a class="reference internal" href="overview/goals.html#network-credentials">2.6.3. Network Credentials</a></li> |
| 99 | <li class="toctree-l3"><a class="reference internal" href="overview/goals.html#device-pairing">2.6.4. Device Pairing</a></li> |
| 100 | <li class="toctree-l3"><a class="reference internal" href="overview/goals.html#secure-boot">2.6.5. Secure Boot</a></li> |
| 101 | <li class="toctree-l3"><a class="reference internal" href="overview/goals.html#attestation">2.6.6. Attestation</a></li> |
| 102 | <li class="toctree-l3"><a class="reference internal" href="overview/goals.html#factory-provisioning">2.6.7. Factory Provisioning</a></li> |
| 103 | </ul> |
| 104 | </li> |
| 105 | </ul> |
| 106 | </li> |
| 107 | <li class="toctree-l1"><a class="reference internal" href="overview/functionality.html">3. Functionality overview</a><ul> |
| 108 | <li class="toctree-l2"><a class="reference internal" href="overview/functionality.html#library-management">3.1. Library management</a></li> |
| 109 | <li class="toctree-l2"><a class="reference internal" href="overview/functionality.html#key-management">3.2. Key management</a><ul> |
| 110 | <li class="toctree-l3"><a class="reference internal" href="overview/functionality.html#key-types">3.2.1. Key types</a></li> |
| 111 | <li class="toctree-l3"><a class="reference internal" href="overview/functionality.html#key-identifiers">3.2.2. Key identifiers</a></li> |
| 112 | <li class="toctree-l3"><a class="reference internal" href="overview/functionality.html#key-lifetimes">3.2.3. Key lifetimes</a></li> |
| 113 | <li class="toctree-l3"><a class="reference internal" href="overview/functionality.html#key-policies">3.2.4. Key policies</a></li> |
| 114 | <li class="toctree-l3"><a class="reference internal" href="overview/functionality.html#recommendations-of-minimum-standards-for-key-management">3.2.5. Recommendations of minimum standards for key management</a></li> |
| 115 | </ul> |
| 116 | </li> |
| 117 | <li class="toctree-l2"><a class="reference internal" href="overview/functionality.html#symmetric-cryptography">3.3. Symmetric cryptography</a><ul> |
| 118 | <li class="toctree-l3"><a class="reference internal" href="overview/functionality.html#single-part-functions">3.3.1. Single-part Functions</a></li> |
| 119 | <li class="toctree-l3"><a class="reference internal" href="overview/functionality.html#multi-part-operations">3.3.2. Multi-part operations</a></li> |
| 120 | <li class="toctree-l3"><a class="reference internal" href="overview/functionality.html#example-of-the-symmetric-cryptography-api">3.3.3. Example of the symmetric cryptography API</a></li> |
| 121 | </ul> |
| 122 | </li> |
| 123 | <li class="toctree-l2"><a class="reference internal" href="overview/functionality.html#asymmetric-cryptography">3.4. Asymmetric cryptography</a></li> |
| 124 | <li class="toctree-l2"><a class="reference internal" href="overview/functionality.html#randomness-and-key-generation">3.5. Randomness and key generation</a></li> |
| 125 | </ul> |
| 126 | </li> |
| 127 | <li class="toctree-l1"><a class="reference internal" href="overview/sample-arch.html">4. Sample architectures</a><ul> |
| 128 | <li class="toctree-l2"><a class="reference internal" href="overview/sample-arch.html#single-partition-architecture">4.1. Single-partition architecture</a></li> |
| 129 | <li class="toctree-l2"><a class="reference internal" href="overview/sample-arch.html#cryptographic-token-and-single-application-processor">4.2. Cryptographic token and single-application processor</a></li> |
| 130 | <li class="toctree-l2"><a class="reference internal" href="overview/sample-arch.html#cryptoprocessor-with-no-key-storage">4.3. Cryptoprocessor with no key storage</a></li> |
| 131 | <li class="toctree-l2"><a class="reference internal" href="overview/sample-arch.html#multi-client-cryptoprocessor">4.4. Multi-client cryptoprocessor</a></li> |
| 132 | <li class="toctree-l2"><a class="reference internal" href="overview/sample-arch.html#multi-cryptoprocessor-architecture">4.5. Multi-cryptoprocessor architecture</a></li> |
| 133 | </ul> |
| 134 | </li> |
| 135 | <li class="toctree-l1"><a class="reference internal" href="overview/conventions.html">5. Library conventions</a><ul> |
| 136 | <li class="toctree-l2"><a class="reference internal" href="overview/conventions.html#header-files">5.1. Header files</a></li> |
| 137 | <li class="toctree-l2"><a class="reference internal" href="overview/conventions.html#api-conventions">5.2. API conventions</a><ul> |
| 138 | <li class="toctree-l3"><a class="reference internal" href="overview/conventions.html#identifier-names">5.2.1. Identifier names</a></li> |
| 139 | <li class="toctree-l3"><a class="reference internal" href="overview/conventions.html#basic-types">5.2.2. Basic types</a></li> |
| 140 | <li class="toctree-l3"><a class="reference internal" href="overview/conventions.html#data-types">5.2.3. Data types</a></li> |
| 141 | <li class="toctree-l3"><a class="reference internal" href="overview/conventions.html#constants">5.2.4. Constants</a></li> |
| 142 | <li class="toctree-l3"><a class="reference internal" href="overview/conventions.html#function-like-macros">5.2.5. Function-like macros</a></li> |
| 143 | <li class="toctree-l3"><a class="reference internal" href="overview/conventions.html#functions">5.2.6. Functions</a></li> |
| 144 | </ul> |
| 145 | </li> |
| 146 | <li class="toctree-l2"><a class="reference internal" href="overview/conventions.html#error-handling">5.3. Error handling</a><ul> |
| 147 | <li class="toctree-l3"><a class="reference internal" href="overview/conventions.html#return-status">5.3.1. Return status</a></li> |
| 148 | <li class="toctree-l3"><a class="reference internal" href="overview/conventions.html#behavior-on-error">5.3.2. Behavior on error</a></li> |
| 149 | </ul> |
| 150 | </li> |
| 151 | <li class="toctree-l2"><a class="reference internal" href="overview/conventions.html#parameter-conventions">5.4. Parameter conventions</a><ul> |
| 152 | <li class="toctree-l3"><a class="reference internal" href="overview/conventions.html#pointer-conventions">5.4.1. Pointer conventions</a></li> |
| 153 | <li class="toctree-l3"><a class="reference internal" href="overview/conventions.html#input-buffer-sizes">5.4.2. Input buffer sizes</a></li> |
| 154 | <li class="toctree-l3"><a class="reference internal" href="overview/conventions.html#output-buffer-sizes">5.4.3. Output buffer sizes</a></li> |
| 155 | <li class="toctree-l3"><a class="reference internal" href="overview/conventions.html#overlap-between-parameters">5.4.4. Overlap between parameters</a></li> |
| 156 | <li class="toctree-l3"><a class="reference internal" href="overview/conventions.html#stability-of-parameters">5.4.5. Stability of parameters</a></li> |
| 157 | </ul> |
| 158 | </li> |
| 159 | <li class="toctree-l2"><a class="reference internal" href="overview/conventions.html#key-types-and-algorithms">5.5. Key types and algorithms</a><ul> |
| 160 | <li class="toctree-l3"><a class="reference internal" href="overview/conventions.html#structure-of-key-types-and-algorithms">5.5.1. Structure of key types and algorithms</a></li> |
| 161 | </ul> |
| 162 | </li> |
| 163 | <li class="toctree-l2"><a class="reference internal" href="overview/conventions.html#concurrent-calls">5.6. Concurrent calls</a></li> |
| 164 | </ul> |
| 165 | </li> |
| 166 | <li class="toctree-l1"><a class="reference internal" href="overview/implementation.html">6. Implementation considerations</a><ul> |
| 167 | <li class="toctree-l2"><a class="reference internal" href="overview/implementation.html#implementation-specific-aspects-of-the-interface">6.1. Implementation-specific aspects of the interface</a><ul> |
| 168 | <li class="toctree-l3"><a class="reference internal" href="overview/implementation.html#implementation-profile">6.1.1. Implementation profile</a></li> |
| 169 | <li class="toctree-l3"><a class="reference internal" href="overview/implementation.html#implementation-specific-types">6.1.2. Implementation-specific types</a></li> |
| 170 | <li class="toctree-l3"><a class="reference internal" href="overview/implementation.html#implementation-specific-macros">6.1.3. Implementation-specific macros</a></li> |
| 171 | </ul> |
| 172 | </li> |
| 173 | <li class="toctree-l2"><a class="reference internal" href="overview/implementation.html#porting-to-a-platform">6.2. Porting to a platform</a><ul> |
| 174 | <li class="toctree-l3"><a class="reference internal" href="overview/implementation.html#platform-assumptions">6.2.1. Platform assumptions</a></li> |
| 175 | <li class="toctree-l3"><a class="reference internal" href="overview/implementation.html#platform-specific-types">6.2.2. Platform-specific types</a></li> |
| 176 | <li class="toctree-l3"><a class="reference internal" href="overview/implementation.html#cryptographic-hardware-support">6.2.3. Cryptographic hardware support</a></li> |
| 177 | </ul> |
| 178 | </li> |
| 179 | <li class="toctree-l2"><a class="reference internal" href="overview/implementation.html#security-requirements-and-recommendations">6.3. Security requirements and recommendations</a><ul> |
| 180 | <li class="toctree-l3"><a class="reference internal" href="overview/implementation.html#error-detection">6.3.1. Error detection</a></li> |
| 181 | <li class="toctree-l3"><a class="reference internal" href="overview/implementation.html#indirect-object-references">6.3.2. Indirect object references</a></li> |
| 182 | <li class="toctree-l3"><a class="reference internal" href="overview/implementation.html#memory-cleanup">6.3.3. Memory cleanup</a></li> |
| 183 | <li class="toctree-l3"><a class="reference internal" href="overview/implementation.html#managing-key-material">6.3.4. Managing key material</a></li> |
| 184 | <li class="toctree-l3"><a class="reference internal" href="overview/implementation.html#safe-outputs-on-error">6.3.5. Safe outputs on error</a></li> |
| 185 | <li class="toctree-l3"><a class="reference internal" href="overview/implementation.html#attack-resistance">6.3.6. Attack resistance</a></li> |
| 186 | </ul> |
| 187 | </li> |
| 188 | <li class="toctree-l2"><a class="reference internal" href="overview/implementation.html#other-implementation-considerations">6.4. Other implementation considerations</a><ul> |
| 189 | <li class="toctree-l3"><a class="reference internal" href="overview/implementation.html#philosophy-of-resource-management">6.4.1. Philosophy of resource management</a></li> |
| 190 | </ul> |
| 191 | </li> |
| 192 | </ul> |
| 193 | </li> |
| 194 | <li class="toctree-l1"><a class="reference internal" href="overview/usage.html">7. Usage considerations</a><ul> |
| 195 | <li class="toctree-l2"><a class="reference internal" href="overview/usage.html#security-recommendations">7.1. Security recommendations</a><ul> |
| 196 | <li class="toctree-l3"><a class="reference internal" href="overview/usage.html#always-check-for-errors">7.1.1. Always check for errors</a></li> |
| 197 | <li class="toctree-l3"><a class="reference internal" href="overview/usage.html#shared-memory-and-concurrency">7.1.2. Shared memory and concurrency</a></li> |
| 198 | <li class="toctree-l3"><a class="reference internal" href="overview/usage.html#cleaning-up-after-use">7.1.3. Cleaning up after use</a></li> |
| 199 | </ul> |
| 200 | </li> |
| 201 | </ul> |
| 202 | </li> |
| 203 | <li class="toctree-l1"><a class="reference internal" href="api/library/index.html">8. Library management reference</a><ul> |
| 204 | <li class="toctree-l2"><a class="reference internal" href="api/library/status.html">8.1. PSA status codes</a><ul> |
| 205 | <li class="toctree-l3"><a class="reference internal" href="api/library/status.html#status-type">8.1.1. Status type</a></li> |
| 206 | <li class="toctree-l3"><a class="reference internal" href="api/library/status.html#success-codes">8.1.2. Success codes</a></li> |
| 207 | <li class="toctree-l3"><a class="reference internal" href="api/library/status.html#common-error-codes">8.1.3. Common error codes</a></li> |
| 208 | <li class="toctree-l3"><a class="reference internal" href="api/library/status.html#error-codes-specific-to-this-api">8.1.4. Error codes specific to this API</a></li> |
| 209 | </ul> |
| 210 | </li> |
| 211 | <li class="toctree-l2"><a class="reference internal" href="api/library/library.html">8.2. PSA Crypto library</a><ul> |
| 212 | <li class="toctree-l3"><a class="reference internal" href="api/library/library.html#api-version">8.2.1. API version</a></li> |
| 213 | <li class="toctree-l3"><a class="reference internal" href="api/library/library.html#library-initialization">8.2.2. Library initialization</a></li> |
| 214 | </ul> |
| 215 | </li> |
| 216 | </ul> |
| 217 | </li> |
| 218 | <li class="toctree-l1"><a class="reference internal" href="api/keys/index.html">9. Key management reference</a><ul> |
| 219 | <li class="toctree-l2"><a class="reference internal" href="api/keys/attributes.html">9.1. Key attributes</a><ul> |
| 220 | <li class="toctree-l3"><a class="reference internal" href="api/keys/attributes.html#managing-key-attributes">9.1.1. Managing key attributes</a></li> |
| 221 | </ul> |
| 222 | </li> |
| 223 | <li class="toctree-l2"><a class="reference internal" href="api/keys/types.html">9.2. Key types</a><ul> |
| 224 | <li class="toctree-l3"><a class="reference internal" href="api/keys/types.html#key-type-encoding">9.2.1. Key type encoding</a></li> |
| 225 | <li class="toctree-l3"><a class="reference internal" href="api/keys/types.html#key-categories">9.2.2. Key categories</a></li> |
| 226 | <li class="toctree-l3"><a class="reference internal" href="api/keys/types.html#symmetric-keys">9.2.3. Symmetric keys</a></li> |
| 227 | <li class="toctree-l3"><a class="reference internal" href="api/keys/types.html#rsa-keys">9.2.4. RSA keys</a></li> |
| 228 | <li class="toctree-l3"><a class="reference internal" href="api/keys/types.html#elliptic-curve-keys">9.2.5. Elliptic Curve keys</a></li> |
| 229 | <li class="toctree-l3"><a class="reference internal" href="api/keys/types.html#diffie-hellman-keys">9.2.6. Diffie Hellman keys</a></li> |
| 230 | <li class="toctree-l3"><a class="reference internal" href="api/keys/types.html#attribute-accessors">9.2.7. Attribute accessors</a></li> |
| 231 | </ul> |
| 232 | </li> |
| 233 | <li class="toctree-l2"><a class="reference internal" href="api/keys/lifetimes.html">9.3. Key lifetimes</a><ul> |
| 234 | <li class="toctree-l3"><a class="reference internal" href="api/keys/lifetimes.html#volatile-keys">9.3.1. Volatile keys</a></li> |
| 235 | <li class="toctree-l3"><a class="reference internal" href="api/keys/lifetimes.html#persistent-keys">9.3.2. Persistent keys</a></li> |
| 236 | <li class="toctree-l3"><a class="reference internal" href="api/keys/lifetimes.html#lifetime-encodings">9.3.3. Lifetime encodings</a></li> |
| 237 | <li class="toctree-l3"><a class="reference internal" href="api/keys/lifetimes.html#lifetime-values">9.3.4. Lifetime values</a></li> |
| 238 | <li class="toctree-l3"><a class="reference internal" href="api/keys/lifetimes.html#attribute-accessors">9.3.5. Attribute accessors</a></li> |
| 239 | <li class="toctree-l3"><a class="reference internal" href="api/keys/lifetimes.html#support-macros">9.3.6. Support macros</a></li> |
| 240 | </ul> |
| 241 | </li> |
| 242 | <li class="toctree-l2"><a class="reference internal" href="api/keys/ids.html">9.4. Key identifiers</a><ul> |
| 243 | <li class="toctree-l3"><a class="reference internal" href="api/keys/ids.html#key-identifier-type">9.4.1. Key identifier type</a></li> |
| 244 | <li class="toctree-l3"><a class="reference internal" href="api/keys/ids.html#attribute-accessors">9.4.2. Attribute accessors</a></li> |
| 245 | </ul> |
| 246 | </li> |
| 247 | <li class="toctree-l2"><a class="reference internal" href="api/keys/policy.html">9.5. Key policies</a><ul> |
| 248 | <li class="toctree-l3"><a class="reference internal" href="api/keys/policy.html#permitted-algorithms">9.5.1. Permitted algorithms</a></li> |
| 249 | <li class="toctree-l3"><a class="reference internal" href="api/keys/policy.html#key-usage-flags">9.5.2. Key usage flags</a></li> |
| 250 | </ul> |
| 251 | </li> |
| 252 | <li class="toctree-l2"><a class="reference internal" href="api/keys/management.html">9.6. Key management functions</a><ul> |
| 253 | <li class="toctree-l3"><a class="reference internal" href="api/keys/management.html#key-creation">9.6.1. Key creation</a></li> |
| 254 | <li class="toctree-l3"><a class="reference internal" href="api/keys/management.html#key-destruction">9.6.2. Key destruction</a></li> |
| 255 | <li class="toctree-l3"><a class="reference internal" href="api/keys/management.html#key-export">9.6.3. Key export</a></li> |
| 256 | </ul> |
| 257 | </li> |
| 258 | </ul> |
| 259 | </li> |
| 260 | <li class="toctree-l1"><a class="reference internal" href="api/ops/index.html">10. Cryptographic operation reference</a><ul> |
| 261 | <li class="toctree-l2"><a class="reference internal" href="api/ops/algorithms.html">10.1. Algorithms</a><ul> |
| 262 | <li class="toctree-l3"><a class="reference internal" href="api/ops/algorithms.html#algorithm-encoding">10.1.1. Algorithm encoding</a></li> |
| 263 | <li class="toctree-l3"><a class="reference internal" href="api/ops/algorithms.html#algorithm-categories">10.1.2. Algorithm categories</a></li> |
| 264 | </ul> |
| 265 | </li> |
| 266 | <li class="toctree-l2"><a class="reference internal" href="api/ops/hashes.html">10.2. Message digests (Hashes)</a><ul> |
| 267 | <li class="toctree-l3"><a class="reference internal" href="api/ops/hashes.html#hash-algorithms">10.2.1. Hash algorithms</a></li> |
| 268 | <li class="toctree-l3"><a class="reference internal" href="api/ops/hashes.html#single-part-hashing-functions">10.2.2. Single-part hashing functions</a></li> |
| 269 | <li class="toctree-l3"><a class="reference internal" href="api/ops/hashes.html#multi-part-hashing-operations">10.2.3. Multi-part hashing operations</a></li> |
| 270 | <li class="toctree-l3"><a class="reference internal" href="api/ops/hashes.html#support-macros">10.2.4. Support macros</a></li> |
| 271 | <li class="toctree-l3"><a class="reference internal" href="api/ops/hashes.html#hash-suspend-state">10.2.5. Hash suspend state</a></li> |
| 272 | </ul> |
| 273 | </li> |
| 274 | <li class="toctree-l2"><a class="reference internal" href="api/ops/macs.html">10.3. Message authentication codes (MAC)</a><ul> |
| 275 | <li class="toctree-l3"><a class="reference internal" href="api/ops/macs.html#mac-algorithms">10.3.1. MAC algorithms</a></li> |
| 276 | <li class="toctree-l3"><a class="reference internal" href="api/ops/macs.html#single-part-mac-functions">10.3.2. Single-part MAC functions</a></li> |
| 277 | <li class="toctree-l3"><a class="reference internal" href="api/ops/macs.html#multi-part-mac-operations">10.3.3. Multi-part MAC operations</a></li> |
| 278 | <li class="toctree-l3"><a class="reference internal" href="api/ops/macs.html#support-macros">10.3.4. Support macros</a></li> |
| 279 | </ul> |
| 280 | </li> |
| 281 | <li class="toctree-l2"><a class="reference internal" href="api/ops/ciphers.html">10.4. Unauthenticated ciphers</a><ul> |
| 282 | <li class="toctree-l3"><a class="reference internal" href="api/ops/ciphers.html#cipher-algorithms">10.4.1. Cipher algorithms</a></li> |
| 283 | <li class="toctree-l3"><a class="reference internal" href="api/ops/ciphers.html#single-part-cipher-functions">10.4.2. Single-part cipher functions</a></li> |
| 284 | <li class="toctree-l3"><a class="reference internal" href="api/ops/ciphers.html#multi-part-cipher-operations">10.4.3. Multi-part cipher operations</a></li> |
| 285 | <li class="toctree-l3"><a class="reference internal" href="api/ops/ciphers.html#support-macros">10.4.4. Support macros</a></li> |
| 286 | </ul> |
| 287 | </li> |
| 288 | <li class="toctree-l2"><a class="reference internal" href="api/ops/aead.html">10.5. Authenticated encryption with associated data (AEAD)</a><ul> |
| 289 | <li class="toctree-l3"><a class="reference internal" href="api/ops/aead.html#aead-algorithms">10.5.1. AEAD algorithms</a></li> |
| 290 | <li class="toctree-l3"><a class="reference internal" href="api/ops/aead.html#single-part-aead-functions">10.5.2. Single-part AEAD functions</a></li> |
| 291 | <li class="toctree-l3"><a class="reference internal" href="api/ops/aead.html#multi-part-aead-operations">10.5.3. Multi-part AEAD operations</a></li> |
| 292 | <li class="toctree-l3"><a class="reference internal" href="api/ops/aead.html#support-macros">10.5.4. Support macros</a></li> |
| 293 | </ul> |
| 294 | </li> |
| 295 | <li class="toctree-l2"><a class="reference internal" href="api/ops/kdf.html">10.6. Key derivation</a><ul> |
| 296 | <li class="toctree-l3"><a class="reference internal" href="api/ops/kdf.html#key-derivation-algorithms">10.6.1. Key derivation algorithms</a></li> |
| 297 | <li class="toctree-l3"><a class="reference internal" href="api/ops/kdf.html#input-step-types">10.6.2. Input step types</a></li> |
| 298 | <li class="toctree-l3"><a class="reference internal" href="api/ops/kdf.html#key-derivation-functions">10.6.3. Key derivation functions</a></li> |
| 299 | <li class="toctree-l3"><a class="reference internal" href="api/ops/kdf.html#support-macros">10.6.4. Support macros</a></li> |
| 300 | </ul> |
| 301 | </li> |
| 302 | <li class="toctree-l2"><a class="reference internal" href="api/ops/sign.html">10.7. Asymmetric signature</a><ul> |
| 303 | <li class="toctree-l3"><a class="reference internal" href="api/ops/sign.html#asymmetric-signature-algorithms">10.7.1. Asymmetric signature algorithms</a></li> |
| 304 | <li class="toctree-l3"><a class="reference internal" href="api/ops/sign.html#asymmetric-signature-functions">10.7.2. Asymmetric signature functions</a></li> |
| 305 | <li class="toctree-l3"><a class="reference internal" href="api/ops/sign.html#support-macros">10.7.3. Support macros</a></li> |
| 306 | </ul> |
| 307 | </li> |
| 308 | <li class="toctree-l2"><a class="reference internal" href="api/ops/pke.html">10.8. Asymmetric encryption</a><ul> |
| 309 | <li class="toctree-l3"><a class="reference internal" href="api/ops/pke.html#asymmetric-encryption-algorithms">10.8.1. Asymmetric encryption algorithms</a></li> |
| 310 | <li class="toctree-l3"><a class="reference internal" href="api/ops/pke.html#asymmetric-encryption-functions">10.8.2. Asymmetric encryption functions</a></li> |
| 311 | <li class="toctree-l3"><a class="reference internal" href="api/ops/pke.html#support-macros">10.8.3. Support macros</a></li> |
| 312 | </ul> |
| 313 | </li> |
| 314 | <li class="toctree-l2"><a class="reference internal" href="api/ops/ka.html">10.9. Key agreement</a><ul> |
| 315 | <li class="toctree-l3"><a class="reference internal" href="api/ops/ka.html#key-agreement-algorithms">10.9.1. Key agreement algorithms</a></li> |
| 316 | <li class="toctree-l3"><a class="reference internal" href="api/ops/ka.html#standalone-key-agreement">10.9.2. Standalone key agreement</a></li> |
| 317 | <li class="toctree-l3"><a class="reference internal" href="api/ops/ka.html#combining-key-agreement-and-key-derivation">10.9.3. Combining key agreement and key derivation</a></li> |
| 318 | <li class="toctree-l3"><a class="reference internal" href="api/ops/ka.html#support-macros">10.9.4. Support macros</a></li> |
| 319 | </ul> |
| 320 | </li> |
| 321 | <li class="toctree-l2"><a class="reference internal" href="api/ops/rng.html">10.10. Other cryptographic services</a><ul> |
| 322 | <li class="toctree-l3"><a class="reference internal" href="api/ops/rng.html#random-number-generation">10.10.1. Random number generation</a></li> |
| 323 | </ul> |
| 324 | </li> |
| 325 | </ul> |
| 326 | </li> |
| 327 | </ul> |
| 328 | </div> |
| 329 | <div class="toctree-wrapper compound"> |
| 330 | <ul> |
| 331 | <li class="toctree-l1"><a class="reference internal" href="appendix/example_header.html">Example header file</a><ul> |
| 332 | <li class="toctree-l2"><a class="reference internal" href="appendix/example_header.html#psa-crypto-h">psa/crypto.h</a></li> |
| 333 | </ul> |
| 334 | </li> |
| 335 | <li class="toctree-l1"><a class="reference internal" href="appendix/encodings.html">Algorithm and key type encoding</a><ul> |
| 336 | <li class="toctree-l2"><a class="reference internal" href="appendix/encodings.html#algorithm-identifier-encoding">Algorithm identifier encoding</a><ul> |
| 337 | <li class="toctree-l3"><a class="reference internal" href="appendix/encodings.html#algorithm-categories">Algorithm categories</a></li> |
| 338 | <li class="toctree-l3"><a class="reference internal" href="appendix/encodings.html#hash-algorithm-encoding">Hash algorithm encoding</a></li> |
| 339 | <li class="toctree-l3"><a class="reference internal" href="appendix/encodings.html#mac-algorithm-encoding">MAC algorithm encoding</a></li> |
| 340 | <li class="toctree-l3"><a class="reference internal" href="appendix/encodings.html#cipher-algorithm-encoding">Cipher algorithm encoding</a></li> |
| 341 | <li class="toctree-l3"><a class="reference internal" href="appendix/encodings.html#aead-algorithm-encoding">AEAD algorithm encoding</a></li> |
| 342 | <li class="toctree-l3"><a class="reference internal" href="appendix/encodings.html#key-derivation-algorithm-encoding">Key derivation algorithm encoding</a></li> |
| 343 | <li class="toctree-l3"><a class="reference internal" href="appendix/encodings.html#asymmetric-signature-algorithm-encoding">Asymmetric signature algorithm encoding</a></li> |
| 344 | <li class="toctree-l3"><a class="reference internal" href="appendix/encodings.html#asymmetric-encryption-algorithm-encoding">Asymmetric encryption algorithm encoding</a></li> |
| 345 | <li class="toctree-l3"><a class="reference internal" href="appendix/encodings.html#key-agreement-algorithm-encoding">Key agreement algorithm encoding</a></li> |
| 346 | </ul> |
| 347 | </li> |
| 348 | <li class="toctree-l2"><a class="reference internal" href="appendix/encodings.html#key-type-encoding">Key type encoding</a><ul> |
| 349 | <li class="toctree-l3"><a class="reference internal" href="appendix/encodings.html#key-type-categories">Key type categories</a></li> |
| 350 | <li class="toctree-l3"><a class="reference internal" href="appendix/encodings.html#raw-key-encoding">Raw key encoding</a></li> |
| 351 | <li class="toctree-l3"><a class="reference internal" href="appendix/encodings.html#symmetric-key-encoding">Symmetric key encoding</a></li> |
| 352 | <li class="toctree-l3"><a class="reference internal" href="appendix/encodings.html#asymmetric-key-encoding">Asymmetric key encoding</a></li> |
| 353 | </ul> |
| 354 | </li> |
| 355 | </ul> |
| 356 | </li> |
| 357 | <li class="toctree-l1"><a class="reference internal" href="appendix/specdef_values.html">Example macro implementations</a><ul> |
| 358 | <li class="toctree-l2"><a class="reference internal" href="appendix/specdef_values.html#algorithm-macros">Algorithm macros</a></li> |
| 359 | <li class="toctree-l2"><a class="reference internal" href="appendix/specdef_values.html#key-type-macros">Key type macros</a></li> |
| 360 | <li class="toctree-l2"><a class="reference internal" href="appendix/specdef_values.html#hash-suspend-state-macros">Hash suspend state macros</a></li> |
| 361 | </ul> |
| 362 | </li> |
| 363 | <li class="toctree-l1"><a class="reference internal" href="appendix/sra.html">Security Risk Assessment</a><ul> |
| 364 | <li class="toctree-l2"><a class="reference internal" href="appendix/sra.html#architecture">Architecture</a><ul> |
| 365 | <li class="toctree-l3"><a class="reference internal" href="appendix/sra.html#system-definition">System definition</a></li> |
| 366 | <li class="toctree-l3"><a class="reference internal" href="appendix/sra.html#assets-and-stakeholders">Assets and stakeholders</a></li> |
| 367 | <li class="toctree-l3"><a class="reference internal" href="appendix/sra.html#security-goals">Security goals</a></li> |
| 368 | </ul> |
| 369 | </li> |
| 370 | <li class="toctree-l2"><a class="reference internal" href="appendix/sra.html#threat-model">Threat Model</a><ul> |
| 371 | <li class="toctree-l3"><a class="reference internal" href="appendix/sra.html#adversarial-models">Adversarial models</a></li> |
| 372 | <li class="toctree-l3"><a class="reference internal" href="appendix/sra.html#threats-and-attacks">Threats and attacks</a></li> |
| 373 | <li class="toctree-l3"><a class="reference internal" href="appendix/sra.html#risk-assessment">Risk assessment</a></li> |
| 374 | </ul> |
| 375 | </li> |
| 376 | <li class="toctree-l2"><a class="reference internal" href="appendix/sra.html#mitigations">Mitigations</a><ul> |
| 377 | <li class="toctree-l3"><a class="reference internal" href="appendix/sra.html#objectives">Objectives</a></li> |
| 378 | <li class="toctree-l3"><a class="reference internal" href="appendix/sra.html#requirements">Requirements</a></li> |
| 379 | </ul> |
| 380 | </li> |
| 381 | <li class="toctree-l2"><a class="reference internal" href="appendix/sra.html#remediation-residual-risk">Remediation & residual risk</a><ul> |
| 382 | <li class="toctree-l3"><a class="reference internal" href="appendix/sra.html#implementation-remediations">Implementation remediations</a></li> |
| 383 | <li class="toctree-l3"><a class="reference internal" href="appendix/sra.html#residual-risk">Residual risk</a></li> |
| 384 | </ul> |
| 385 | </li> |
| 386 | </ul> |
| 387 | </li> |
| 388 | <li class="toctree-l1"><a class="reference internal" href="appendix/history.html">Changes to the API</a><ul> |
| 389 | <li class="toctree-l2"><a class="reference internal" href="appendix/history.html#document-change-history">Document change history</a><ul> |
| 390 | <li class="toctree-l3"><a class="reference internal" href="appendix/history.html#changes-between-1-0-1-and-1-1-0">Changes between <em>1.0.1</em> and <em>1.1.0</em></a></li> |
| 391 | <li class="toctree-l3"><a class="reference internal" href="appendix/history.html#changes-between-1-0-0-and-1-0-1">Changes between <em>1.0.0</em> and <em>1.0.1</em></a></li> |
| 392 | <li class="toctree-l3"><a class="reference internal" href="appendix/history.html#changes-between-1-0-beta-3-and-1-0-0">Changes between <em>1.0 beta 3</em> and <em>1.0.0</em></a></li> |
| 393 | <li class="toctree-l3"><a class="reference internal" href="appendix/history.html#changes-between-1-0-beta-2-and-1-0-beta-3">Changes between <em>1.0 beta 2</em> and <em>1.0 beta 3</em></a></li> |
| 394 | <li class="toctree-l3"><a class="reference internal" href="appendix/history.html#changes-between-1-0-beta-1-and-1-0-beta-2">Changes between <em>1.0 beta 1</em> and <em>1.0 beta 2</em></a></li> |
| 395 | </ul> |
| 396 | </li> |
| 397 | <li class="toctree-l2"><a class="reference internal" href="appendix/history.html#planned-changes-for-version-1-1-x">Planned changes for version 1.1.x</a></li> |
| 398 | <li class="toctree-l2"><a class="reference internal" href="appendix/history.html#future-additions">Future additions</a></li> |
| 399 | </ul> |
| 400 | </li> |
| 401 | </ul> |
| 402 | </div> |
| 403 | </div> |
| 404 | |
| 405 | |
| 406 | </div> |
| 407 | </div> |
| 408 | </div> |
| 409 | <div class="sphinxsidebar" role="navigation" aria-label="main navigation"> |
| 410 | <div class="sphinxsidebarwrapper"><h3><a href="#"><b>PSA Crypto API</b></a></h3> |
| 411 | IHI 0086<br/> |
| 412 | Non-confidential<br/> |
| 413 | Version 1.1.0 |
| 414 | <span style="color: red; font-weight: bold;"></span> |
| 415 | <ul> |
| 416 | <li class="toctree-l1"><a class="reference internal" href="about.html">About this document</a></li> |
| 417 | </ul> |
| 418 | <ul> |
| 419 | <li class="toctree-l1"><a class="reference internal" href="overview/intro.html">1. Introduction</a></li> |
| 420 | <li class="toctree-l1"><a class="reference internal" href="overview/goals.html">2. Design goals</a></li> |
| 421 | <li class="toctree-l1"><a class="reference internal" href="overview/functionality.html">3. Functionality overview</a></li> |
| 422 | <li class="toctree-l1"><a class="reference internal" href="overview/sample-arch.html">4. Sample architectures</a></li> |
| 423 | <li class="toctree-l1"><a class="reference internal" href="overview/conventions.html">5. Library conventions</a></li> |
| 424 | <li class="toctree-l1"><a class="reference internal" href="overview/implementation.html">6. Implementation considerations</a></li> |
| 425 | <li class="toctree-l1"><a class="reference internal" href="overview/usage.html">7. Usage considerations</a></li> |
| 426 | <li class="toctree-l1"><a class="reference internal" href="api/library/index.html">8. Library management reference</a></li> |
| 427 | <li class="toctree-l1"><a class="reference internal" href="api/keys/index.html">9. Key management reference</a></li> |
| 428 | <li class="toctree-l1"><a class="reference internal" href="api/ops/index.html">10. Cryptographic operation reference</a></li> |
| 429 | </ul> |
| 430 | <ul> |
| 431 | <li class="toctree-l1"><a class="reference internal" href="appendix/example_header.html">Example header file</a></li> |
| 432 | <li class="toctree-l1"><a class="reference internal" href="appendix/encodings.html">Algorithm and key type encoding</a></li> |
| 433 | <li class="toctree-l1"><a class="reference internal" href="appendix/specdef_values.html">Example macro implementations</a></li> |
| 434 | <li class="toctree-l1"><a class="reference internal" href="appendix/sra.html">Security Risk Assessment</a></li> |
| 435 | <li class="toctree-l1"><a class="reference internal" href="appendix/history.html">Changes to the API</a></li> |
| 436 | </ul> |
| 437 | <ul> |
| 438 | <li class="toctree-l1"><a class="reference internal" href="psa_c-identifiers.html">Index of API elements</a></li> |
| 439 | </ul> |
| 440 | <div id="searchbox" style="display: none" role="search"> |
| 441 | <h3>Quick search</h3> |
| 442 | <form class="search" action="search.html" method="get"> |
| 443 | <div><input type="text" name="q" /></div> |
| 444 | <div><input type="submit" value="Go" /></div> |
| 445 | <input type="hidden" name="check_keywords" value="yes" /> |
| 446 | <input type="hidden" name="area" value="default" /> |
| 447 | </form> |
| 448 | </div> |
| 449 | <script type="text/javascript">$('#searchbox').show(0);</script> |
| 450 | </div> |
| 451 | </div> |
| 452 | <div class="clearer"></div> |
| 453 | </div> |
| 454 | <div class="footer"> |
| 455 | © 2018-2022, Arm Limited or its affiliates. All rights reserved. |
| 456 | |
| 457 | | |
| 458 | Powered by <a href="http://sphinx-doc.org/">Sphinx 1.6.7</a> |
| 459 | & <a href="https://github.com/bitprophet/alabaster">Alabaster 0.7.8</a> |
| 460 | |
| 461 | </div> |
| 462 | |
| 463 | |
| 464 | |
| 465 | |
| 466 | </body> |
| 467 | </html> |