Paul Bakker | 8123e9d | 2011-01-06 15:37:30 +0000 | [diff] [blame] | 1 | /** |
Chris Jones | daacb59 | 2021-03-09 17:03:29 +0000 | [diff] [blame] | 2 | * \file cipher_wrap.h |
Paul Bakker | 9af723c | 2014-05-01 13:03:14 +0200 | [diff] [blame] | 3 | * |
Paul Bakker | 8123e9d | 2011-01-06 15:37:30 +0000 | [diff] [blame] | 4 | * \brief Cipher wrappers. |
| 5 | * |
| 6 | * \author Adriaan de Jong <dejong@fox-it.com> |
Darryl Green | a40a101 | 2018-01-05 15:33:17 +0000 | [diff] [blame] | 7 | */ |
| 8 | /* |
Bence Szépkúti | 1e14827 | 2020-08-07 13:07:28 +0200 | [diff] [blame] | 9 | * Copyright The Mbed TLS Contributors |
Dave Rodgman | e3c0585 | 2023-11-03 12:21:36 +0000 | [diff] [blame] | 10 | * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later |
Paul Bakker | 8123e9d | 2011-01-06 15:37:30 +0000 | [diff] [blame] | 11 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 12 | #ifndef MBEDTLS_CIPHER_WRAP_H |
| 13 | #define MBEDTLS_CIPHER_WRAP_H |
Paul Bakker | 8123e9d | 2011-01-06 15:37:30 +0000 | [diff] [blame] | 14 | |
Bence Szépkúti | c662b36 | 2021-05-27 11:25:03 +0200 | [diff] [blame] | 15 | #include "mbedtls/build_info.h" |
Manuel Pégourié-Gonnard | 6c5abfa | 2015-02-13 14:12:07 +0000 | [diff] [blame] | 16 | |
Jaeden Amero | c49fbbf | 2019-07-04 20:01:14 +0100 | [diff] [blame] | 17 | #include "mbedtls/cipher.h" |
Paul Bakker | 8123e9d | 2011-01-06 15:37:30 +0000 | [diff] [blame] | 18 | |
Hanno Becker | 6118e43 | 2018-11-09 16:47:20 +0000 | [diff] [blame] | 19 | #if defined(MBEDTLS_USE_PSA_CRYPTO) |
| 20 | #include "psa/crypto.h" |
| 21 | #endif /* MBEDTLS_USE_PSA_CRYPTO */ |
| 22 | |
Paul Bakker | 8123e9d | 2011-01-06 15:37:30 +0000 | [diff] [blame] | 23 | #ifdef __cplusplus |
| 24 | extern "C" { |
| 25 | #endif |
| 26 | |
Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 27 | /** |
| 28 | * Base cipher information. The non-mode specific functions and values. |
| 29 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 30 | struct mbedtls_cipher_base_t { |
Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 31 | /** Base Cipher type (e.g. MBEDTLS_CIPHER_ID_AES) */ |
| 32 | mbedtls_cipher_id_t cipher; |
| 33 | |
| 34 | /** Encrypt using ECB */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 35 | int (*ecb_func)(void *ctx, mbedtls_operation_t mode, |
| 36 | const unsigned char *input, unsigned char *output); |
Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 37 | |
| 38 | #if defined(MBEDTLS_CIPHER_MODE_CBC) |
| 39 | /** Encrypt using CBC */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 40 | int (*cbc_func)(void *ctx, mbedtls_operation_t mode, size_t length, |
| 41 | unsigned char *iv, const unsigned char *input, |
| 42 | unsigned char *output); |
Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 43 | #endif |
| 44 | |
| 45 | #if defined(MBEDTLS_CIPHER_MODE_CFB) |
| 46 | /** Encrypt using CFB (Full length) */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 47 | int (*cfb_func)(void *ctx, mbedtls_operation_t mode, size_t length, size_t *iv_off, |
| 48 | unsigned char *iv, const unsigned char *input, |
| 49 | unsigned char *output); |
Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 50 | #endif |
| 51 | |
Simon Butcher | 8c0fd1e | 2018-04-22 22:58:07 +0100 | [diff] [blame] | 52 | #if defined(MBEDTLS_CIPHER_MODE_OFB) |
| 53 | /** Encrypt using OFB (Full length) */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 54 | int (*ofb_func)(void *ctx, size_t length, size_t *iv_off, |
| 55 | unsigned char *iv, |
| 56 | const unsigned char *input, |
| 57 | unsigned char *output); |
Simon Butcher | 8c0fd1e | 2018-04-22 22:58:07 +0100 | [diff] [blame] | 58 | #endif |
| 59 | |
Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 60 | #if defined(MBEDTLS_CIPHER_MODE_CTR) |
| 61 | /** Encrypt using CTR */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 62 | int (*ctr_func)(void *ctx, size_t length, size_t *nc_off, |
| 63 | unsigned char *nonce_counter, unsigned char *stream_block, |
| 64 | const unsigned char *input, unsigned char *output); |
Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 65 | #endif |
| 66 | |
Jaeden Amero | c653990 | 2018-04-30 17:17:41 +0100 | [diff] [blame] | 67 | #if defined(MBEDTLS_CIPHER_MODE_XTS) |
| 68 | /** Encrypt or decrypt using XTS. */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 69 | int (*xts_func)(void *ctx, mbedtls_operation_t mode, size_t length, |
| 70 | const unsigned char data_unit[16], |
| 71 | const unsigned char *input, unsigned char *output); |
Jaeden Amero | c653990 | 2018-04-30 17:17:41 +0100 | [diff] [blame] | 72 | #endif |
| 73 | |
Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 74 | #if defined(MBEDTLS_CIPHER_MODE_STREAM) |
| 75 | /** Encrypt using STREAM */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 76 | int (*stream_func)(void *ctx, size_t length, |
| 77 | const unsigned char *input, unsigned char *output); |
Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 78 | #endif |
| 79 | |
| 80 | /** Set key for encryption purposes */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 81 | int (*setkey_enc_func)(void *ctx, const unsigned char *key, |
| 82 | unsigned int key_bitlen); |
Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 83 | |
| 84 | /** Set key for decryption purposes */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 85 | int (*setkey_dec_func)(void *ctx, const unsigned char *key, |
| 86 | unsigned int key_bitlen); |
Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 87 | |
| 88 | /** Allocate a new context */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 89 | void * (*ctx_alloc_func)(void); |
Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 90 | |
| 91 | /** Free the given context */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 92 | void (*ctx_free_func)(void *ctx); |
Manuel Pégourié-Gonnard | 5a74e8b | 2015-05-06 17:10:55 +0100 | [diff] [blame] | 93 | |
| 94 | }; |
| 95 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 96 | typedef struct { |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 97 | mbedtls_cipher_type_t type; |
| 98 | const mbedtls_cipher_info_t *info; |
| 99 | } mbedtls_cipher_definition_t; |
Paul Bakker | 8123e9d | 2011-01-06 15:37:30 +0000 | [diff] [blame] | 100 | |
Hanno Becker | 6118e43 | 2018-11-09 16:47:20 +0000 | [diff] [blame] | 101 | #if defined(MBEDTLS_USE_PSA_CRYPTO) |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 102 | typedef enum { |
Hanno Becker | 1908655 | 2018-11-17 22:11:16 +0000 | [diff] [blame] | 103 | MBEDTLS_CIPHER_PSA_KEY_UNSET = 0, |
Hanno Becker | 9de97d7 | 2018-11-19 14:05:48 +0000 | [diff] [blame] | 104 | MBEDTLS_CIPHER_PSA_KEY_OWNED, /* Used for PSA-based cipher contexts which */ |
| 105 | /* use raw key material internally imported */ |
Gilles Peskine | 1139249 | 2019-05-27 14:53:19 +0200 | [diff] [blame] | 106 | /* as a volatile key, and which hence need */ |
| 107 | /* to destroy that key when the context is */ |
| 108 | /* freed. */ |
Hanno Becker | 9de97d7 | 2018-11-19 14:05:48 +0000 | [diff] [blame] | 109 | MBEDTLS_CIPHER_PSA_KEY_NOT_OWNED, /* Used for PSA-based cipher contexts */ |
Gilles Peskine | 1139249 | 2019-05-27 14:53:19 +0200 | [diff] [blame] | 110 | /* which use a key provided by the */ |
| 111 | /* user, and which hence will not be */ |
| 112 | /* destroyed when the context is freed. */ |
Hanno Becker | 1908655 | 2018-11-17 22:11:16 +0000 | [diff] [blame] | 113 | } mbedtls_cipher_psa_key_ownership; |
| 114 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 115 | typedef struct { |
Hanno Becker | edda8b8 | 2018-11-12 11:59:30 +0000 | [diff] [blame] | 116 | psa_algorithm_t alg; |
Andrzej Kurek | 03e0146 | 2022-01-03 12:53:24 +0100 | [diff] [blame] | 117 | mbedtls_svc_key_id_t slot; |
Hanno Becker | 1908655 | 2018-11-17 22:11:16 +0000 | [diff] [blame] | 118 | mbedtls_cipher_psa_key_ownership slot_state; |
Hanno Becker | 6118e43 | 2018-11-09 16:47:20 +0000 | [diff] [blame] | 119 | } mbedtls_cipher_context_psa; |
| 120 | #endif /* MBEDTLS_USE_PSA_CRYPTO */ |
| 121 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 122 | extern const mbedtls_cipher_definition_t mbedtls_cipher_definitions[]; |
Paul Bakker | 5e0efa7 | 2013-09-08 23:04:04 +0200 | [diff] [blame] | 123 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 124 | extern int mbedtls_cipher_supported[]; |
Paul Bakker | fab5c82 | 2012-02-06 16:45:10 +0000 | [diff] [blame] | 125 | |
Dave Rodgman | 3b46b77 | 2023-06-24 13:25:06 +0100 | [diff] [blame] | 126 | extern const mbedtls_cipher_base_t *mbedtls_cipher_base_lookup_table[]; |
Dave Rodgman | de3de77 | 2023-06-24 12:51:06 +0100 | [diff] [blame] | 127 | |
Paul Bakker | 8123e9d | 2011-01-06 15:37:30 +0000 | [diff] [blame] | 128 | #ifdef __cplusplus |
| 129 | } |
| 130 | #endif |
| 131 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 132 | #endif /* MBEDTLS_CIPHER_WRAP_H */ |