1 /*
2 * Copyright (c) 2018-2023, Arm Limited. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 *
6 */
7 /**
8 * \file psa/crypto_struct.h
9 *
10 * \brief PSA cryptography module: structured type implementations
11 *
12 * \note This file may not be included directly. Applications must
13 * include psa/crypto.h.
14 *
15 * This file contains the definitions of some data structures with
16 * implementation-specific definitions.
17 *
18 * In implementations with isolation between the application and the
19 * cryptography module, it is expected that the front-end and the back-end
20 * would have different versions of this file.
21 */
22
23 #ifndef PSA_CRYPTO_STRUCT_H
24 #define PSA_CRYPTO_STRUCT_H
25
26 #ifdef __cplusplus
27 extern "C" {
28 #endif
29
30 /*
31 * Note that the below structures are different from the decalrations in
32 * mbed-crypto. This is because TF-M maintains 'front-end' and 'back-end'
33 * versions of this header. In the front-end version, exported to NS
34 * clients in interface/include/psa, a crypto operation is defined as an
35 * opaque handle to a context in the Crypto service. The back-end
36 * version, directly included from the mbed-crypto repo by the Crypto
37 * service, contains the full definition of the operation structs.
38 *
39 * One of the functions of the Crypto service is to allocate the back-end
40 * operation contexts in its own partition memory (in crypto_alloc.c),
41 * and then do the mapping between front-end operation handles passed by
42 * NS clients and the corresponding back-end operation contexts. The
43 * advantage of doing it this way is that internal mbed-crypto state is never
44 * exposed to the NS client.
45 */
46
47 struct psa_hash_operation_s
48 {
49 uint32_t handle;
50 };
51
52 #define PSA_HASH_OPERATION_INIT {0}
psa_hash_operation_init(void)53 static inline struct psa_hash_operation_s psa_hash_operation_init( void )
54 {
55 const struct psa_hash_operation_s v = PSA_HASH_OPERATION_INIT;
56 return( v );
57 }
58
59 struct psa_mac_operation_s
60 {
61 uint32_t handle;
62 };
63
64 #define PSA_MAC_OPERATION_INIT {0}
psa_mac_operation_init(void)65 static inline struct psa_mac_operation_s psa_mac_operation_init( void )
66 {
67 const struct psa_mac_operation_s v = PSA_MAC_OPERATION_INIT;
68 return( v );
69 }
70
71 struct psa_cipher_operation_s
72 {
73 uint32_t handle;
74 };
75
76 #define PSA_CIPHER_OPERATION_INIT {0}
psa_cipher_operation_init(void)77 static inline struct psa_cipher_operation_s psa_cipher_operation_init( void )
78 {
79 const struct psa_cipher_operation_s v = PSA_CIPHER_OPERATION_INIT;
80 return( v );
81 }
82
83 struct psa_aead_operation_s
84 {
85 uint32_t handle;
86 };
87
88 #define PSA_AEAD_OPERATION_INIT {0}
psa_aead_operation_init(void)89 static inline struct psa_aead_operation_s psa_aead_operation_init( void )
90 {
91 const struct psa_aead_operation_s v = PSA_AEAD_OPERATION_INIT;
92 return( v );
93 }
94
95 struct psa_key_derivation_s
96 {
97 uint32_t handle;
98 };
99
100 #define PSA_KEY_DERIVATION_OPERATION_INIT {0}
psa_key_derivation_operation_init(void)101 static inline struct psa_key_derivation_s psa_key_derivation_operation_init( void )
102 {
103 const struct psa_key_derivation_s v = PSA_KEY_DERIVATION_OPERATION_INIT;
104 return( v );
105 }
106
107 /* The type used internally for key sizes.
108 * Public interfaces use size_t, but internally we use a smaller type. */
109 typedef uint16_t psa_key_bits_t;
110 /* The maximum value of the type used to represent bit-sizes.
111 * This is used to mark an invalid key size. */
112 #define PSA_KEY_BITS_TOO_LARGE ( (psa_key_bits_t) ( -1 ) )
113 /* The maximum size of a key in bits.
114 * Currently defined as the maximum that can be represented, rounded down
115 * to a whole number of bytes.
116 * This is an uncast value so that it can be used in preprocessor
117 * conditionals. */
118 #define PSA_MAX_KEY_BITS 0xfff8
119
120 #define PSA_KEY_ATTRIBUTES_INIT PSA_CLIENT_KEY_ATTRIBUTES_INIT
121
psa_key_attributes_init(void)122 static inline struct psa_client_key_attributes_s psa_key_attributes_init( void )
123 {
124 const struct psa_client_key_attributes_s v = PSA_KEY_ATTRIBUTES_INIT;
125 return( v );
126 }
127
psa_set_key_id(psa_key_attributes_t * attributes,psa_key_id_t id)128 static inline void psa_set_key_id(psa_key_attributes_t *attributes,
129 psa_key_id_t id)
130 {
131 attributes->id = id;
132 if( attributes->lifetime == PSA_KEY_LIFETIME_VOLATILE )
133 attributes->lifetime = PSA_KEY_LIFETIME_PERSISTENT;
134 }
135
psa_get_key_id(const psa_key_attributes_t * attributes)136 static inline psa_key_id_t psa_get_key_id(
137 const psa_key_attributes_t *attributes)
138 {
139 return( attributes->id );
140 }
141
psa_set_key_lifetime(psa_key_attributes_t * attributes,psa_key_lifetime_t lifetime)142 static inline void psa_set_key_lifetime(psa_key_attributes_t *attributes,
143 psa_key_lifetime_t lifetime)
144 {
145 attributes->lifetime = lifetime;
146 if( lifetime == PSA_KEY_LIFETIME_VOLATILE )
147 {
148 attributes->id = 0;
149 }
150 }
151
psa_get_key_lifetime(const psa_key_attributes_t * attributes)152 static inline psa_key_lifetime_t psa_get_key_lifetime(
153 const psa_key_attributes_t *attributes)
154 {
155 return( attributes->lifetime );
156 }
157
psa_extend_key_usage_flags(psa_key_usage_t * usage_flags)158 static inline void psa_extend_key_usage_flags( psa_key_usage_t *usage_flags )
159 {
160 if( *usage_flags & PSA_KEY_USAGE_SIGN_HASH )
161 *usage_flags |= PSA_KEY_USAGE_SIGN_MESSAGE;
162
163 if( *usage_flags & PSA_KEY_USAGE_VERIFY_HASH )
164 *usage_flags |= PSA_KEY_USAGE_VERIFY_MESSAGE;
165 }
166
psa_set_key_usage_flags(psa_key_attributes_t * attributes,psa_key_usage_t usage_flags)167 static inline void psa_set_key_usage_flags(psa_key_attributes_t *attributes,
168 psa_key_usage_t usage_flags)
169 {
170 psa_extend_key_usage_flags( &usage_flags );
171 attributes->usage = usage_flags;
172 }
173
psa_get_key_usage_flags(const psa_key_attributes_t * attributes)174 static inline psa_key_usage_t psa_get_key_usage_flags(
175 const psa_key_attributes_t *attributes)
176 {
177 return( attributes->usage );
178 }
179
psa_set_key_algorithm(psa_key_attributes_t * attributes,psa_algorithm_t alg)180 static inline void psa_set_key_algorithm(psa_key_attributes_t *attributes,
181 psa_algorithm_t alg)
182 {
183 attributes->alg = alg;
184 }
185
psa_get_key_algorithm(const psa_key_attributes_t * attributes)186 static inline psa_algorithm_t psa_get_key_algorithm(
187 const psa_key_attributes_t *attributes)
188 {
189 return( attributes->alg );
190 }
191
psa_set_key_type(psa_key_attributes_t * attributes,psa_key_type_t type)192 static inline void psa_set_key_type(psa_key_attributes_t *attributes,
193 psa_key_type_t type)
194 {
195 attributes->type = type;
196 }
197
psa_get_key_type(const psa_key_attributes_t * attributes)198 static inline psa_key_type_t psa_get_key_type(
199 const psa_key_attributes_t *attributes)
200 {
201 return( attributes->type );
202 }
203
psa_set_key_bits(psa_key_attributes_t * attributes,size_t bits)204 static inline void psa_set_key_bits(psa_key_attributes_t *attributes,
205 size_t bits)
206 {
207 if( bits > PSA_MAX_KEY_BITS )
208 attributes->bits = PSA_KEY_BITS_TOO_LARGE;
209 else
210 attributes->bits = bits;
211 }
212
psa_get_key_bits(const psa_key_attributes_t * attributes)213 static inline size_t psa_get_key_bits(
214 const psa_key_attributes_t *attributes)
215 {
216 return( attributes->bits );
217 }
218
219 #ifdef __cplusplus
220 }
221 #endif
222
223 #endif /* PSA_CRYPTO_STRUCT_H */
224