Steven Cooreman | 3c8dd63 | 2021-04-26 12:16:27 +0200 | [diff] [blame] | 1 | /* |
| 2 | * Context structure declaration of the Mbed TLS software-based PSA drivers |
| 3 | * called through the PSA Crypto driver dispatch layer. |
| 4 | * This file contains the context structures of those algorithms which need to |
| 5 | * rely on other algorithms, i.e. are 'composite' algorithms. |
| 6 | * |
| 7 | * \note This file may not be included directly. Applications must |
| 8 | * include psa/crypto.h. |
| 9 | * |
| 10 | * \note This header and its content is not part of the Mbed TLS API and |
| 11 | * applications must not depend on it. Its main purpose is to define the |
| 12 | * multi-part state objects of the Mbed TLS software-based PSA drivers. The |
| 13 | * definition of these objects are then used by crypto_struct.h to define the |
| 14 | * implementation-defined types of PSA multi-part state objects. |
| 15 | */ |
| 16 | /* |
| 17 | * Copyright The Mbed TLS Contributors |
| 18 | * SPDX-License-Identifier: Apache-2.0 |
| 19 | * |
| 20 | * Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 21 | * not use this file except in compliance with the License. |
| 22 | * You may obtain a copy of the License at |
| 23 | * |
| 24 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 25 | * |
| 26 | * Unless required by applicable law or agreed to in writing, software |
| 27 | * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 28 | * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 29 | * See the License for the specific language governing permissions and |
| 30 | * limitations under the License. |
| 31 | */ |
| 32 | |
| 33 | #ifndef PSA_CRYPTO_BUILTIN_COMPOSITES_H |
| 34 | #define PSA_CRYPTO_BUILTIN_COMPOSITES_H |
Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 35 | #include "mbedtls/private_access.h" |
Steven Cooreman | 3c8dd63 | 2021-04-26 12:16:27 +0200 | [diff] [blame] | 36 | |
| 37 | #include <psa/crypto_driver_common.h> |
| 38 | |
| 39 | /* |
| 40 | * MAC multi-part operation definitions. |
| 41 | */ |
Steven Cooreman | 77e2cc5 | 2021-03-19 17:05:52 +0100 | [diff] [blame] | 42 | #if defined(MBEDTLS_PSA_BUILTIN_ALG_CMAC) || \ |
| 43 | defined(MBEDTLS_PSA_BUILTIN_ALG_HMAC) |
| 44 | #define MBEDTLS_PSA_BUILTIN_MAC |
| 45 | #endif |
Steven Cooreman | 3c8dd63 | 2021-04-26 12:16:27 +0200 | [diff] [blame] | 46 | |
Steven Cooreman | ac8d82a | 2021-04-29 18:01:53 +0200 | [diff] [blame] | 47 | #if defined(MBEDTLS_PSA_BUILTIN_ALG_HMAC) || defined(PSA_CRYPTO_DRIVER_TEST) |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 48 | typedef struct { |
Steven Cooreman | d1955af | 2021-03-22 14:49:06 +0100 | [diff] [blame] | 49 | /** The HMAC algorithm in use */ |
Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 50 | psa_algorithm_t MBEDTLS_PRIVATE(alg); |
Steven Cooreman | d1955af | 2021-03-22 14:49:06 +0100 | [diff] [blame] | 51 | /** The hash context. */ |
| 52 | struct psa_hash_operation_s hash_ctx; |
| 53 | /** The HMAC part of the context. */ |
Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 54 | uint8_t MBEDTLS_PRIVATE(opad)[PSA_HMAC_MAX_HASH_BLOCK_SIZE]; |
Steven Cooreman | dd1a915 | 2021-04-29 17:49:11 +0200 | [diff] [blame] | 55 | } mbedtls_psa_hmac_operation_t; |
Steven Cooreman | 4fdf060 | 2021-03-22 12:21:10 +0100 | [diff] [blame] | 56 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 57 | #define MBEDTLS_PSA_HMAC_OPERATION_INIT { 0, PSA_HASH_OPERATION_INIT, { 0 } } |
Steven Cooreman | ac8d82a | 2021-04-29 18:01:53 +0200 | [diff] [blame] | 58 | #endif /* MBEDTLS_PSA_BUILTIN_ALG_HMAC */ |
Steven Cooreman | 3c8dd63 | 2021-04-26 12:16:27 +0200 | [diff] [blame] | 59 | |
Steven Cooreman | d13a70f | 2021-03-19 15:24:23 +0100 | [diff] [blame] | 60 | #include "mbedtls/cmac.h" |
| 61 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 62 | typedef struct { |
Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 63 | psa_algorithm_t MBEDTLS_PRIVATE(alg); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 64 | union { |
Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 65 | unsigned MBEDTLS_PRIVATE(dummy); /* Make the union non-empty even with no supported algorithms. */ |
Steven Cooreman | ac8d82a | 2021-04-29 18:01:53 +0200 | [diff] [blame] | 66 | #if defined(MBEDTLS_PSA_BUILTIN_ALG_HMAC) || defined(PSA_CRYPTO_DRIVER_TEST) |
Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 67 | mbedtls_psa_hmac_operation_t MBEDTLS_PRIVATE(hmac); |
Steven Cooreman | ac8d82a | 2021-04-29 18:01:53 +0200 | [diff] [blame] | 68 | #endif /* MBEDTLS_PSA_BUILTIN_ALG_HMAC */ |
| 69 | #if defined(MBEDTLS_PSA_BUILTIN_ALG_CMAC) || defined(PSA_CRYPTO_DRIVER_TEST) |
Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 70 | mbedtls_cipher_context_t MBEDTLS_PRIVATE(cmac); |
Steven Cooreman | ac8d82a | 2021-04-29 18:01:53 +0200 | [diff] [blame] | 71 | #endif /* MBEDTLS_PSA_BUILTIN_ALG_CMAC */ |
Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 72 | } MBEDTLS_PRIVATE(ctx); |
Steven Cooreman | d13a70f | 2021-03-19 15:24:23 +0100 | [diff] [blame] | 73 | } mbedtls_psa_mac_operation_t; |
| 74 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 75 | #define MBEDTLS_PSA_MAC_OPERATION_INIT { 0, { 0 } } |
Steven Cooreman | d13a70f | 2021-03-19 15:24:23 +0100 | [diff] [blame] | 76 | |
Paul Elliott | 3dc1c24 | 2021-05-20 18:32:57 +0100 | [diff] [blame] | 77 | #if defined(MBEDTLS_PSA_BUILTIN_ALG_GCM) || \ |
| 78 | defined(MBEDTLS_PSA_BUILTIN_ALG_CCM) || \ |
| 79 | defined(MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305) |
| 80 | #define MBEDTLS_PSA_BUILTIN_AEAD 1 |
| 81 | #endif |
| 82 | |
| 83 | /* Context structure for the Mbed TLS AEAD implementation. */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 84 | typedef struct { |
Paul Elliott | 5977bc9 | 2021-09-23 17:35:08 +0100 | [diff] [blame] | 85 | psa_algorithm_t MBEDTLS_PRIVATE(alg); |
| 86 | psa_key_type_t MBEDTLS_PRIVATE(key_type); |
Paul Elliott | 3dc1c24 | 2021-05-20 18:32:57 +0100 | [diff] [blame] | 87 | |
Paul Elliott | 5977bc9 | 2021-09-23 17:35:08 +0100 | [diff] [blame] | 88 | unsigned int MBEDTLS_PRIVATE(is_encrypt) : 1; |
Paul Elliott | 3dc1c24 | 2021-05-20 18:32:57 +0100 | [diff] [blame] | 89 | |
Paul Elliott | 5977bc9 | 2021-09-23 17:35:08 +0100 | [diff] [blame] | 90 | uint8_t MBEDTLS_PRIVATE(tag_length); |
Paul Elliott | 3dc1c24 | 2021-05-20 18:32:57 +0100 | [diff] [blame] | 91 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 92 | union { |
Paul Elliott | 3dc1c24 | 2021-05-20 18:32:57 +0100 | [diff] [blame] | 93 | unsigned dummy; /* Enable easier initializing of the union. */ |
| 94 | #if defined(MBEDTLS_PSA_BUILTIN_ALG_CCM) |
Paul Elliott | 5977bc9 | 2021-09-23 17:35:08 +0100 | [diff] [blame] | 95 | mbedtls_ccm_context MBEDTLS_PRIVATE(ccm); |
Paul Elliott | 3dc1c24 | 2021-05-20 18:32:57 +0100 | [diff] [blame] | 96 | #endif /* MBEDTLS_PSA_BUILTIN_ALG_CCM */ |
| 97 | #if defined(MBEDTLS_PSA_BUILTIN_ALG_GCM) |
Paul Elliott | 5977bc9 | 2021-09-23 17:35:08 +0100 | [diff] [blame] | 98 | mbedtls_gcm_context MBEDTLS_PRIVATE(gcm); |
Paul Elliott | 3dc1c24 | 2021-05-20 18:32:57 +0100 | [diff] [blame] | 99 | #endif /* MBEDTLS_PSA_BUILTIN_ALG_GCM */ |
| 100 | #if defined(MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305) |
Paul Elliott | 5977bc9 | 2021-09-23 17:35:08 +0100 | [diff] [blame] | 101 | mbedtls_chachapoly_context MBEDTLS_PRIVATE(chachapoly); |
Paul Elliott | 3dc1c24 | 2021-05-20 18:32:57 +0100 | [diff] [blame] | 102 | #endif /* MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 */ |
| 103 | |
| 104 | } ctx; |
| 105 | |
| 106 | } mbedtls_psa_aead_operation_t; |
| 107 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 108 | #define MBEDTLS_PSA_AEAD_OPERATION_INIT { 0, 0, 0, 0, { 0 } } |
Paul Elliott | 3dc1c24 | 2021-05-20 18:32:57 +0100 | [diff] [blame] | 109 | |
Paul Elliott | 588f8ed | 2022-12-02 18:10:26 +0000 | [diff] [blame] | 110 | #include "mbedtls/ecdsa.h" |
| 111 | |
| 112 | /* Context structure for the Mbed TLS interruptible sign hash implementation. */ |
| 113 | typedef struct { |
Paul Elliott | 90a91f0 | 2023-01-24 15:23:25 +0000 | [diff] [blame] | 114 | #if (defined(MBEDTLS_PSA_BUILTIN_ALG_ECDSA) || \ |
| 115 | defined(MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA)) && \ |
| 116 | defined(MBEDTLS_ECP_RESTARTABLE) |
Paul Elliott | 588f8ed | 2022-12-02 18:10:26 +0000 | [diff] [blame] | 117 | mbedtls_ecdsa_context *MBEDTLS_PRIVATE(ctx); |
Paul Elliott | 588f8ed | 2022-12-02 18:10:26 +0000 | [diff] [blame] | 118 | mbedtls_ecdsa_restart_ctx MBEDTLS_PRIVATE(restart_ctx); |
Paul Elliott | 588f8ed | 2022-12-02 18:10:26 +0000 | [diff] [blame] | 119 | |
Paul Elliott | 93d9ca8 | 2023-02-15 18:14:21 +0000 | [diff] [blame] | 120 | uint32_t MBEDTLS_PRIVATE(num_ops); |
| 121 | |
Paul Elliott | 1bc59df | 2023-02-05 13:41:57 +0000 | [diff] [blame] | 122 | size_t MBEDTLS_PRIVATE(coordinate_bytes); |
Paul Elliott | 588f8ed | 2022-12-02 18:10:26 +0000 | [diff] [blame] | 123 | psa_algorithm_t MBEDTLS_PRIVATE(alg); |
| 124 | mbedtls_md_type_t MBEDTLS_PRIVATE(md_alg); |
Paul Elliott | 8432946 | 2023-02-07 17:32:04 +0000 | [diff] [blame] | 125 | uint8_t MBEDTLS_PRIVATE(hash)[PSA_BITS_TO_BYTES(PSA_VENDOR_ECC_MAX_CURVE_BITS)]; |
Paul Elliott | 588f8ed | 2022-12-02 18:10:26 +0000 | [diff] [blame] | 126 | size_t MBEDTLS_PRIVATE(hash_length); |
| 127 | |
Paul Elliott | 90a91f0 | 2023-01-24 15:23:25 +0000 | [diff] [blame] | 128 | #else |
| 129 | /* Make the struct non-empty if algs not supported. */ |
| 130 | unsigned MBEDTLS_PRIVATE(dummy); |
Paul Elliott | 588f8ed | 2022-12-02 18:10:26 +0000 | [diff] [blame] | 131 | |
Paul Elliott | fe9e77f | 2023-02-10 11:04:27 +0000 | [diff] [blame] | 132 | #endif /* defined(MBEDTLS_PSA_BUILTIN_ALG_ECDSA) || |
| 133 | * defined(MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA) && |
| 134 | * defined( MBEDTLS_ECP_RESTARTABLE ) */ |
Paul Elliott | 588f8ed | 2022-12-02 18:10:26 +0000 | [diff] [blame] | 135 | } mbedtls_psa_sign_hash_interruptible_operation_t; |
| 136 | |
Paul Elliott | a3a8aba | 2023-02-03 14:49:37 +0000 | [diff] [blame] | 137 | #if (defined(MBEDTLS_PSA_BUILTIN_ALG_ECDSA) || \ |
| 138 | defined(MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA)) && \ |
| 139 | defined(MBEDTLS_ECP_RESTARTABLE) |
Paul Elliott | 93d9ca8 | 2023-02-15 18:14:21 +0000 | [diff] [blame] | 140 | #define MBEDTLS_PSA_SIGN_HASH_INTERRUPTIBLE_OPERATION_INIT { { 0 }, { 0 }, 0, 0, 0, 0, 0, 0 } |
Paul Elliott | a3a8aba | 2023-02-03 14:49:37 +0000 | [diff] [blame] | 141 | #else |
| 142 | #define MBEDTLS_PSA_SIGN_HASH_INTERRUPTIBLE_OPERATION_INIT { 0 } |
| 143 | #endif |
Paul Elliott | 588f8ed | 2022-12-02 18:10:26 +0000 | [diff] [blame] | 144 | |
| 145 | /* Context structure for the Mbed TLS interruptible verify hash |
| 146 | * implementation.*/ |
| 147 | typedef struct { |
Paul Elliott | 749dec5 | 2023-01-16 12:18:46 +0000 | [diff] [blame] | 148 | #if (defined(MBEDTLS_PSA_BUILTIN_ALG_ECDSA) || \ |
| 149 | defined(MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA)) && \ |
| 150 | defined(MBEDTLS_ECP_RESTARTABLE) |
Paul Elliott | 588f8ed | 2022-12-02 18:10:26 +0000 | [diff] [blame] | 151 | |
Paul Elliott | 588f8ed | 2022-12-02 18:10:26 +0000 | [diff] [blame] | 152 | mbedtls_ecdsa_context *MBEDTLS_PRIVATE(ctx); |
Paul Elliott | 588f8ed | 2022-12-02 18:10:26 +0000 | [diff] [blame] | 153 | mbedtls_ecdsa_restart_ctx MBEDTLS_PRIVATE(restart_ctx); |
Paul Elliott | 588f8ed | 2022-12-02 18:10:26 +0000 | [diff] [blame] | 154 | |
Paul Elliott | 93d9ca8 | 2023-02-15 18:14:21 +0000 | [diff] [blame] | 155 | uint32_t MBEDTLS_PRIVATE(num_ops); |
| 156 | |
Paul Elliott | 8432946 | 2023-02-07 17:32:04 +0000 | [diff] [blame] | 157 | uint8_t MBEDTLS_PRIVATE(hash)[PSA_BITS_TO_BYTES(PSA_VENDOR_ECC_MAX_CURVE_BITS)]; |
Paul Elliott | 588f8ed | 2022-12-02 18:10:26 +0000 | [diff] [blame] | 158 | size_t MBEDTLS_PRIVATE(hash_length); |
| 159 | |
| 160 | mbedtls_mpi MBEDTLS_PRIVATE(r); |
| 161 | mbedtls_mpi MBEDTLS_PRIVATE(s); |
| 162 | |
Paul Elliott | 90a91f0 | 2023-01-24 15:23:25 +0000 | [diff] [blame] | 163 | #else |
| 164 | /* Make the struct non-empty if algs not supported. */ |
| 165 | unsigned MBEDTLS_PRIVATE(dummy); |
| 166 | |
Paul Elliott | fe9e77f | 2023-02-10 11:04:27 +0000 | [diff] [blame] | 167 | #endif /* defined(MBEDTLS_PSA_BUILTIN_ALG_ECDSA) || |
| 168 | * defined(MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA) && |
| 169 | * defined( MBEDTLS_ECP_RESTARTABLE ) */ |
Paul Elliott | 588f8ed | 2022-12-02 18:10:26 +0000 | [diff] [blame] | 170 | |
| 171 | } mbedtls_psa_verify_hash_interruptible_operation_t; |
| 172 | |
Paul Elliott | a3a8aba | 2023-02-03 14:49:37 +0000 | [diff] [blame] | 173 | #if (defined(MBEDTLS_PSA_BUILTIN_ALG_ECDSA) || \ |
| 174 | defined(MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA)) && \ |
| 175 | defined(MBEDTLS_ECP_RESTARTABLE) |
Paul Elliott | 93d9ca8 | 2023-02-15 18:14:21 +0000 | [diff] [blame] | 176 | #define MBEDTLS_VERIFY_SIGN_HASH_INTERRUPTIBLE_OPERATION_INIT { { 0 }, { 0 }, 0, 0, 0, 0, { 0 }, \ |
Paul Elliott | 588f8ed | 2022-12-02 18:10:26 +0000 | [diff] [blame] | 177 | { 0 } } |
Paul Elliott | a3a8aba | 2023-02-03 14:49:37 +0000 | [diff] [blame] | 178 | #else |
| 179 | #define MBEDTLS_VERIFY_SIGN_HASH_INTERRUPTIBLE_OPERATION_INIT { 0 } |
| 180 | #endif |
Paul Elliott | 588f8ed | 2022-12-02 18:10:26 +0000 | [diff] [blame] | 181 | |
| 182 | |
Przemek Stekiel | 96ae8b9 | 2022-12-07 11:52:08 +0100 | [diff] [blame] | 183 | /* EC-JPAKE operation definitions */ |
| 184 | |
| 185 | #include "mbedtls/ecjpake.h" |
| 186 | |
| 187 | #if defined(MBEDTLS_PSA_BUILTIN_ALG_JPAKE) |
| 188 | #define MBEDTLS_PSA_BUILTIN_PAKE 1 |
| 189 | #endif |
| 190 | |
| 191 | /* Note: the format for mbedtls_ecjpake_read/write function has an extra |
| 192 | * length byte for each step, plus an extra 3 bytes for ECParameters in the |
| 193 | * server's 2nd round. */ |
| 194 | #define MBEDTLS_PSA_PAKE_BUFFER_SIZE ((3 + 1 + 65 + 1 + 65 + 1 + 32) * 2) |
| 195 | |
| 196 | typedef struct { |
| 197 | psa_algorithm_t MBEDTLS_PRIVATE(alg); |
| 198 | unsigned int MBEDTLS_PRIVATE(state); |
| 199 | unsigned int MBEDTLS_PRIVATE(sequence); |
| 200 | #if defined(MBEDTLS_PSA_BUILTIN_PAKE) |
| 201 | unsigned int MBEDTLS_PRIVATE(input_step); |
| 202 | unsigned int MBEDTLS_PRIVATE(output_step); |
| 203 | uint8_t *MBEDTLS_PRIVATE(password); |
| 204 | size_t MBEDTLS_PRIVATE(password_len); |
| 205 | uint8_t MBEDTLS_PRIVATE(role); |
| 206 | uint8_t MBEDTLS_PRIVATE(buffer[MBEDTLS_PSA_PAKE_BUFFER_SIZE]); |
| 207 | size_t MBEDTLS_PRIVATE(buffer_length); |
| 208 | size_t MBEDTLS_PRIVATE(buffer_offset); |
| 209 | #endif |
| 210 | /* Context structure for the Mbed TLS EC-JPAKE implementation. */ |
| 211 | union { |
| 212 | unsigned int MBEDTLS_PRIVATE(dummy); |
| 213 | mbedtls_ecjpake_context MBEDTLS_PRIVATE(pake); |
| 214 | } MBEDTLS_PRIVATE(ctx); |
| 215 | |
| 216 | } mbedtls_psa_pake_operation_t; |
| 217 | |
| 218 | #define MBEDTLS_PSA_PAKE_OPERATION_INIT { { 0 } } |
Paul Elliott | 588f8ed | 2022-12-02 18:10:26 +0000 | [diff] [blame] | 219 | |
Steven Cooreman | 3c8dd63 | 2021-04-26 12:16:27 +0200 | [diff] [blame] | 220 | #endif /* PSA_CRYPTO_BUILTIN_COMPOSITES_H */ |