| Paul Bakker | 8123e9d | 2011-01-06 15:37:30 +0000 | [diff] [blame] | 1 | /** | 
| Chris Jones | daacb59 | 2021-03-09 17:03:29 +0000 | [diff] [blame] | 2 | * \file cipher_wrap.h | 
| Paul Bakker | 9af723c | 2014-05-01 13:03:14 +0200 | [diff] [blame] | 3 | * | 
| Paul Bakker | 8123e9d | 2011-01-06 15:37:30 +0000 | [diff] [blame] | 4 | * \brief Cipher wrappers. | 
|  | 5 | * | 
|  | 6 | * \author Adriaan de Jong <dejong@fox-it.com> | 
| Darryl Green | a40a101 | 2018-01-05 15:33:17 +0000 | [diff] [blame] | 7 | */ | 
|  | 8 | /* | 
| Bence Szépkúti | 1e14827 | 2020-08-07 13:07:28 +0200 | [diff] [blame] | 9 | *  Copyright The Mbed TLS Contributors | 
| Dave Rodgman | 16799db | 2023-11-02 19:47:20 +0000 | [diff] [blame] | 10 | *  SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later | 
| Paul Bakker | 8123e9d | 2011-01-06 15:37:30 +0000 | [diff] [blame] | 11 | */ | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 12 | #ifndef MBEDTLS_CIPHER_WRAP_H | 
|  | 13 | #define MBEDTLS_CIPHER_WRAP_H | 
| Paul Bakker | 8123e9d | 2011-01-06 15:37:30 +0000 | [diff] [blame] | 14 |  | 
| Bence Szépkúti | c662b36 | 2021-05-27 11:25:03 +0200 | [diff] [blame] | 15 | #include "mbedtls/build_info.h" | 
| Manuel Pégourié-Gonnard | 6c5abfa | 2015-02-13 14:12:07 +0000 | [diff] [blame] | 16 |  | 
| Jaeden Amero | c49fbbf | 2019-07-04 20:01:14 +0100 | [diff] [blame] | 17 | #include "mbedtls/cipher.h" | 
| Paul Bakker | 8123e9d | 2011-01-06 15:37:30 +0000 | [diff] [blame] | 18 |  | 
| Hanno Becker | 6118e43 | 2018-11-09 16:47:20 +0000 | [diff] [blame] | 19 | #if defined(MBEDTLS_USE_PSA_CRYPTO) | 
|  | 20 | #include "psa/crypto.h" | 
|  | 21 | #endif /* MBEDTLS_USE_PSA_CRYPTO */ | 
|  | 22 |  | 
| Paul Bakker | 8123e9d | 2011-01-06 15:37:30 +0000 | [diff] [blame] | 23 | #ifdef __cplusplus | 
|  | 24 | extern "C" { | 
|  | 25 | #endif | 
|  | 26 |  | 
| Valerio Setti | db1ca8f | 2023-10-11 12:46:16 +0200 | [diff] [blame] | 27 | /* Support for GCM either through Mbed TLS SW implementation or PSA */ | 
|  | 28 | #if defined(MBEDTLS_GCM_C) || \ | 
|  | 29 | (defined(MBEDTLS_USE_PSA_CRYPTO) && defined(PSA_WANT_ALG_GCM)) | 
| Valerio Setti | dcee987 | 2023-10-16 11:35:57 +0200 | [diff] [blame] | 30 | #define MBEDTLS_CIPHER_HAVE_GCM_VIA_LEGACY_OR_USE_PSA | 
| Valerio Setti | db1ca8f | 2023-10-11 12:46:16 +0200 | [diff] [blame] | 31 | #endif | 
|  | 32 |  | 
|  | 33 | #if (defined(MBEDTLS_GCM_C) && defined(MBEDTLS_AES_C)) || \ | 
|  | 34 | (defined(MBEDTLS_USE_PSA_CRYPTO) && defined(PSA_WANT_ALG_GCM) && defined(PSA_WANT_KEY_TYPE_AES)) | 
| Valerio Setti | dcee987 | 2023-10-16 11:35:57 +0200 | [diff] [blame] | 35 | #define MBEDTLS_CIPHER_HAVE_GCM_AES_VIA_LEGACY_OR_USE_PSA | 
| Valerio Setti | db1ca8f | 2023-10-11 12:46:16 +0200 | [diff] [blame] | 36 | #endif | 
|  | 37 |  | 
|  | 38 | #if defined(MBEDTLS_CCM_C) || \ | 
|  | 39 | (defined(MBEDTLS_USE_PSA_CRYPTO) && defined(PSA_WANT_ALG_CCM)) | 
| Valerio Setti | dcee987 | 2023-10-16 11:35:57 +0200 | [diff] [blame] | 40 | #define MBEDTLS_CIPHER_HAVE_CCM_VIA_LEGACY_OR_USE_PSA | 
| Valerio Setti | db1ca8f | 2023-10-11 12:46:16 +0200 | [diff] [blame] | 41 | #endif | 
|  | 42 |  | 
|  | 43 | #if (defined(MBEDTLS_CCM_C) && defined(MBEDTLS_AES_C)) || \ | 
|  | 44 | (defined(MBEDTLS_USE_PSA_CRYPTO) && defined(PSA_WANT_ALG_CCM) && defined(PSA_WANT_KEY_TYPE_AES)) | 
| Valerio Setti | dcee987 | 2023-10-16 11:35:57 +0200 | [diff] [blame] | 45 | #define MBEDTLS_CIPHER_HAVE_CCM_AES_VIA_LEGACY_OR_USE_PSA | 
| Valerio Setti | db1ca8f | 2023-10-11 12:46:16 +0200 | [diff] [blame] | 46 | #endif | 
|  | 47 |  | 
|  | 48 | #if defined(MBEDTLS_CCM_C) || \ | 
|  | 49 | (defined(MBEDTLS_USE_PSA_CRYPTO) && defined(PSA_WANT_ALG_CCM_STAR_NO_TAG)) | 
| Valerio Setti | dcee987 | 2023-10-16 11:35:57 +0200 | [diff] [blame] | 50 | #define MBEDTLS_CIPHER_HAVE_CCM_STAR_NO_TAG_VIA_LEGACY_OR_USE_PSA | 
| Valerio Setti | db1ca8f | 2023-10-11 12:46:16 +0200 | [diff] [blame] | 51 | #endif | 
|  | 52 |  | 
| Valerio Setti | a6c0761 | 2023-10-12 18:48:24 +0200 | [diff] [blame] | 53 | #if (defined(MBEDTLS_CCM_C) && defined(MBEDTLS_AES_C)) || \ | 
|  | 54 | (defined(MBEDTLS_USE_PSA_CRYPTO) && defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && \ | 
|  | 55 | defined(PSA_WANT_KEY_TYPE_AES)) | 
|  | 56 | #define MBEDTLS_CIPHER_HAVE_CCM_STAR_NO_TAG_AES_VIA_LEGACY_OR_USE_PSA | 
|  | 57 | #endif | 
|  | 58 |  | 
| Valerio Setti | db1ca8f | 2023-10-11 12:46:16 +0200 | [diff] [blame] | 59 | #if defined(MBEDTLS_CHACHAPOLY_C) || \ | 
|  | 60 | (defined(MBEDTLS_USE_PSA_CRYPTO) && defined(PSA_WANT_ALG_CHACHA20_POLY1305)) | 
| Valerio Setti | dcee987 | 2023-10-16 11:35:57 +0200 | [diff] [blame] | 61 | #define MBEDTLS_CIPHER_HAVE_CHACHAPOLY_VIA_LEGACY_OR_USE_PSA | 
| Valerio Setti | db1ca8f | 2023-10-11 12:46:16 +0200 | [diff] [blame] | 62 | #endif | 
|  | 63 |  | 
| Valerio Setti | dcee987 | 2023-10-16 11:35:57 +0200 | [diff] [blame] | 64 | #if defined(MBEDTLS_CIPHER_HAVE_GCM_VIA_LEGACY_OR_USE_PSA) || \ | 
|  | 65 | defined(MBEDTLS_CIPHER_HAVE_CCM_VIA_LEGACY_OR_USE_PSA) || \ | 
|  | 66 | defined(MBEDTLS_CIPHER_HAVE_CCM_STAR_NO_TAG_VIA_LEGACY_OR_USE_PSA) || \ | 
|  | 67 | defined(MBEDTLS_CIPHER_HAVE_CHACHAPOLY_VIA_LEGACY_OR_USE_PSA) | 
|  | 68 | #define MBEDTLS_CIPHER_HAVE_SOME_AEAD_VIA_LEGACY_OR_USE_PSA | 
| Valerio Setti | db1ca8f | 2023-10-11 12:46:16 +0200 | [diff] [blame] | 69 | #endif | 
|  | 70 |  | 
| Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 71 | /** | 
|  | 72 | * Base cipher information. The non-mode specific functions and values. | 
|  | 73 | */ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 74 | struct mbedtls_cipher_base_t { | 
| Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 75 | /** Base Cipher type (e.g. MBEDTLS_CIPHER_ID_AES) */ | 
|  | 76 | mbedtls_cipher_id_t cipher; | 
|  | 77 |  | 
|  | 78 | /** Encrypt using ECB */ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 79 | int (*ecb_func)(void *ctx, mbedtls_operation_t mode, | 
|  | 80 | const unsigned char *input, unsigned char *output); | 
| Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 81 |  | 
|  | 82 | #if defined(MBEDTLS_CIPHER_MODE_CBC) | 
|  | 83 | /** Encrypt using CBC */ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 84 | int (*cbc_func)(void *ctx, mbedtls_operation_t mode, size_t length, | 
|  | 85 | unsigned char *iv, const unsigned char *input, | 
|  | 86 | unsigned char *output); | 
| Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 87 | #endif | 
|  | 88 |  | 
|  | 89 | #if defined(MBEDTLS_CIPHER_MODE_CFB) | 
|  | 90 | /** Encrypt using CFB (Full length) */ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 91 | int (*cfb_func)(void *ctx, mbedtls_operation_t mode, size_t length, size_t *iv_off, | 
|  | 92 | unsigned char *iv, const unsigned char *input, | 
|  | 93 | unsigned char *output); | 
| Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 94 | #endif | 
|  | 95 |  | 
| Simon Butcher | 8c0fd1e | 2018-04-22 22:58:07 +0100 | [diff] [blame] | 96 | #if defined(MBEDTLS_CIPHER_MODE_OFB) | 
|  | 97 | /** Encrypt using OFB (Full length) */ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 98 | int (*ofb_func)(void *ctx, size_t length, size_t *iv_off, | 
|  | 99 | unsigned char *iv, | 
|  | 100 | const unsigned char *input, | 
|  | 101 | unsigned char *output); | 
| Simon Butcher | 8c0fd1e | 2018-04-22 22:58:07 +0100 | [diff] [blame] | 102 | #endif | 
|  | 103 |  | 
| Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 104 | #if defined(MBEDTLS_CIPHER_MODE_CTR) | 
|  | 105 | /** Encrypt using CTR */ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 106 | int (*ctr_func)(void *ctx, size_t length, size_t *nc_off, | 
|  | 107 | unsigned char *nonce_counter, unsigned char *stream_block, | 
|  | 108 | const unsigned char *input, unsigned char *output); | 
| Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 109 | #endif | 
|  | 110 |  | 
| Jaeden Amero | c653990 | 2018-04-30 17:17:41 +0100 | [diff] [blame] | 111 | #if defined(MBEDTLS_CIPHER_MODE_XTS) | 
|  | 112 | /** Encrypt or decrypt using XTS. */ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 113 | int (*xts_func)(void *ctx, mbedtls_operation_t mode, size_t length, | 
|  | 114 | const unsigned char data_unit[16], | 
|  | 115 | const unsigned char *input, unsigned char *output); | 
| Jaeden Amero | c653990 | 2018-04-30 17:17:41 +0100 | [diff] [blame] | 116 | #endif | 
|  | 117 |  | 
| Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 118 | #if defined(MBEDTLS_CIPHER_MODE_STREAM) | 
|  | 119 | /** Encrypt using STREAM */ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 120 | int (*stream_func)(void *ctx, size_t length, | 
|  | 121 | const unsigned char *input, unsigned char *output); | 
| Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 122 | #endif | 
|  | 123 |  | 
|  | 124 | /** Set key for encryption purposes */ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 125 | int (*setkey_enc_func)(void *ctx, const unsigned char *key, | 
|  | 126 | unsigned int key_bitlen); | 
| Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 127 |  | 
| Yanray Wang | b67b474 | 2023-10-31 17:10:32 +0800 | [diff] [blame] | 128 | #if !defined(MBEDTLS_BLOCK_CIPHER_NO_DECRYPT) | 
| Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 129 | /** Set key for decryption purposes */ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 130 | int (*setkey_dec_func)(void *ctx, const unsigned char *key, | 
|  | 131 | unsigned int key_bitlen); | 
| Yanray Wang | db9b309 | 2023-08-24 15:47:53 +0800 | [diff] [blame] | 132 | #endif | 
| Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 133 |  | 
|  | 134 | /** Allocate a new context */ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 135 | void * (*ctx_alloc_func)(void); | 
| Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 136 |  | 
|  | 137 | /** Free the given context */ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 138 | void (*ctx_free_func)(void *ctx); | 
| Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 139 |  | 
|  | 140 | }; | 
|  | 141 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 142 | typedef struct { | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 143 | mbedtls_cipher_type_t type; | 
|  | 144 | const mbedtls_cipher_info_t *info; | 
|  | 145 | } mbedtls_cipher_definition_t; | 
| Paul Bakker | 8123e9d | 2011-01-06 15:37:30 +0000 | [diff] [blame] | 146 |  | 
| Hanno Becker | 6118e43 | 2018-11-09 16:47:20 +0000 | [diff] [blame] | 147 | #if defined(MBEDTLS_USE_PSA_CRYPTO) | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 148 | typedef enum { | 
| Hanno Becker | 1908655 | 2018-11-17 22:11:16 +0000 | [diff] [blame] | 149 | MBEDTLS_CIPHER_PSA_KEY_UNSET = 0, | 
| Hanno Becker | 9de97d7 | 2018-11-19 14:05:48 +0000 | [diff] [blame] | 150 | MBEDTLS_CIPHER_PSA_KEY_OWNED, /* Used for PSA-based cipher contexts which */ | 
|  | 151 | /* use raw key material internally imported */ | 
| Gilles Peskine | 1139249 | 2019-05-27 14:53:19 +0200 | [diff] [blame] | 152 | /* as a volatile key, and which hence need  */ | 
|  | 153 | /* to destroy that key when the context is  */ | 
|  | 154 | /* freed.                                   */ | 
| Hanno Becker | 9de97d7 | 2018-11-19 14:05:48 +0000 | [diff] [blame] | 155 | MBEDTLS_CIPHER_PSA_KEY_NOT_OWNED, /* Used for PSA-based cipher contexts   */ | 
| Gilles Peskine | 1139249 | 2019-05-27 14:53:19 +0200 | [diff] [blame] | 156 | /* which use a key provided by the      */ | 
|  | 157 | /* user, and which hence will not be    */ | 
|  | 158 | /* destroyed when the context is freed. */ | 
| Hanno Becker | 1908655 | 2018-11-17 22:11:16 +0000 | [diff] [blame] | 159 | } mbedtls_cipher_psa_key_ownership; | 
|  | 160 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 161 | typedef struct { | 
| Hanno Becker | edda8b8 | 2018-11-12 11:59:30 +0000 | [diff] [blame] | 162 | psa_algorithm_t alg; | 
| Andrzej Kurek | 03e0146 | 2022-01-03 12:53:24 +0100 | [diff] [blame] | 163 | mbedtls_svc_key_id_t slot; | 
| Hanno Becker | 1908655 | 2018-11-17 22:11:16 +0000 | [diff] [blame] | 164 | mbedtls_cipher_psa_key_ownership slot_state; | 
| Hanno Becker | 6118e43 | 2018-11-09 16:47:20 +0000 | [diff] [blame] | 165 | } mbedtls_cipher_context_psa; | 
|  | 166 | #endif /* MBEDTLS_USE_PSA_CRYPTO */ | 
|  | 167 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 168 | extern const mbedtls_cipher_definition_t mbedtls_cipher_definitions[]; | 
| Paul Bakker | 5e0efa7 | 2013-09-08 23:04:04 +0200 | [diff] [blame] | 169 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 170 | extern int mbedtls_cipher_supported[]; | 
| Paul Bakker | fab5c82 | 2012-02-06 16:45:10 +0000 | [diff] [blame] | 171 |  | 
| Dave Rodgman | 3b46b77 | 2023-06-24 13:25:06 +0100 | [diff] [blame] | 172 | extern const mbedtls_cipher_base_t *mbedtls_cipher_base_lookup_table[]; | 
| Dave Rodgman | de3de77 | 2023-06-24 12:51:06 +0100 | [diff] [blame] | 173 |  | 
| Paul Bakker | 8123e9d | 2011-01-06 15:37:30 +0000 | [diff] [blame] | 174 | #ifdef __cplusplus | 
|  | 175 | } | 
|  | 176 | #endif | 
|  | 177 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 178 | #endif /* MBEDTLS_CIPHER_WRAP_H */ |