1 /*
2  * Copyright (c) 2018-2022, Arm Limited. All rights reserved.
3  *
4  * SPDX-License-Identifier: BSD-3-Clause
5  *
6  */
7 /**
8  * \file psa/crypto_struct.h
9  *
10  * \brief PSA cryptography module: structured type implementations
11  *
12  * \note This file may not be included directly. Applications must
13  * include psa/crypto.h.
14  *
15  * This file contains the definitions of some data structures with
16  * implementation-specific definitions.
17  *
18  * In implementations with isolation between the application and the
19  * cryptography module, it is expected that the front-end and the back-end
20  * would have different versions of this file.
21  */
22 
23 #ifndef PSA_CRYPTO_STRUCT_H
24 #define PSA_CRYPTO_STRUCT_H
25 
26 #ifdef __cplusplus
27 extern "C" {
28 #endif
29 
30 /*
31  * Note that the below structures are different from the decalrations in
32  * mbed-crypto. This is because TF-M maintains 'front-end' and 'back-end'
33  * versions of this header. In the front-end version, exported to NS
34  * clients in interface/include/psa, a crypto operation is defined as an
35  * opaque handle to a context in the Crypto service. The back-end
36  * version, directly included from the mbed-crypto repo by the Crypto
37  * service, contains the full definition of the operation structs.
38  *
39  * One of the functions of the Crypto service is to allocate the back-end
40  * operation contexts in its own partition memory (in crypto_alloc.c),
41  * and then do the mapping between front-end operation handles passed by
42  * NS clients and the corresponding back-end operation contexts. The
43  * advantage of doing it this way is that internal mbed-crypto state is never
44  * exposed to the NS client.
45  */
46 
47 struct psa_hash_operation_s
48 {
49     uint32_t handle;
50 };
51 
52 #define PSA_HASH_OPERATION_INIT {0}
psa_hash_operation_init(void)53 static inline struct psa_hash_operation_s psa_hash_operation_init(void)
54 {
55     const struct psa_hash_operation_s v = PSA_HASH_OPERATION_INIT;
56     return v;
57 }
58 
59 struct psa_mac_operation_s
60 {
61     uint32_t handle;
62 };
63 
64 #define PSA_MAC_OPERATION_INIT {0}
psa_mac_operation_init(void)65 static inline struct psa_mac_operation_s psa_mac_operation_init(void)
66 {
67     const struct psa_mac_operation_s v = PSA_MAC_OPERATION_INIT;
68     return v;
69 }
70 
71 struct psa_cipher_operation_s
72 {
73     uint32_t handle;
74 };
75 
76 #define PSA_CIPHER_OPERATION_INIT {0}
psa_cipher_operation_init(void)77 static inline struct psa_cipher_operation_s psa_cipher_operation_init(void)
78 {
79     const struct psa_cipher_operation_s v = PSA_CIPHER_OPERATION_INIT;
80     return v;
81 }
82 
83 struct psa_aead_operation_s
84 {
85     uint32_t handle;
86 };
87 
88 #define PSA_AEAD_OPERATION_INIT {0}
psa_aead_operation_init(void)89 static inline struct psa_aead_operation_s psa_aead_operation_init(void)
90 {
91     const struct psa_aead_operation_s v = PSA_AEAD_OPERATION_INIT;
92     return v;
93 }
94 
95 struct psa_key_derivation_s
96 {
97     uint32_t handle;
98 };
99 
100 #define PSA_KEY_DERIVATION_OPERATION_INIT {0}
psa_key_derivation_operation_init(void)101 static inline struct psa_key_derivation_s psa_key_derivation_operation_init(void)
102 {
103     const struct psa_key_derivation_s v = PSA_KEY_DERIVATION_OPERATION_INIT;
104     return v;
105 }
106 
107 /* The type used internally for key sizes.
108  * Public interfaces use size_t, but internally we use a smaller type. */
109 typedef uint16_t psa_key_bits_t;
110 /* The maximum value of the type used to represent bit-sizes.
111  * This is used to mark an invalid key size. */
112 #define PSA_KEY_BITS_TOO_LARGE ( (psa_key_bits_t) ( -1 ) )
113 /* The maximum size of a key in bits.
114  * Currently defined as the maximum that can be represented, rounded down
115  * to a whole number of bytes.
116  * This is an uncast value so that it can be used in preprocessor
117  * conditionals. */
118 #define PSA_MAX_KEY_BITS 0xfff8
119 
120 /* On the client side, only some key attributes are visible.
121  * The server has a different definition of psa_key_attributes_s which
122  * maintains more attributes.
123  */
124 #include "crypto_client_struct.h"
125 struct psa_key_attributes_s {
126     struct psa_client_key_attributes_s client;
127 };
128 
129 #define PSA_KEY_ATTRIBUTES_INIT {PSA_CLIENT_KEY_ATTRIBUTES_INIT}
130 
psa_key_attributes_init(void)131 static inline struct psa_key_attributes_s psa_key_attributes_init(void)
132 {
133     const struct psa_key_attributes_s v = PSA_KEY_ATTRIBUTES_INIT;
134     return v;
135 }
136 
psa_set_key_id(psa_key_attributes_t * attributes,mbedtls_svc_key_id_t key)137 static inline void psa_set_key_id(psa_key_attributes_t *attributes,
138                                   mbedtls_svc_key_id_t key)
139 {
140     psa_key_lifetime_t lifetime = attributes->client.lifetime;
141 
142     attributes->client.id = (psa_key_id_t)key;
143 
144     if( PSA_KEY_LIFETIME_IS_VOLATILE(lifetime))
145     {
146         attributes->client.lifetime =
147             PSA_KEY_LIFETIME_FROM_PERSISTENCE_AND_LOCATION(
148                 PSA_KEY_LIFETIME_PERSISTENT,
149                 PSA_KEY_LIFETIME_GET_LOCATION(lifetime));
150     }
151 }
152 
psa_get_key_id(const psa_key_attributes_t * attributes)153 static inline mbedtls_svc_key_id_t psa_get_key_id(
154     const psa_key_attributes_t *attributes)
155 {
156     return (mbedtls_svc_key_id_t)attributes->client.id;
157 }
158 
psa_set_key_lifetime(psa_key_attributes_t * attributes,psa_key_lifetime_t lifetime)159 static inline void psa_set_key_lifetime(psa_key_attributes_t *attributes,
160                                         psa_key_lifetime_t lifetime)
161 {
162     attributes->client.lifetime = lifetime;
163     if(PSA_KEY_LIFETIME_IS_VOLATILE(lifetime))
164     {
165         attributes->client.id = 0;
166     }
167 }
168 
psa_get_key_lifetime(const psa_key_attributes_t * attributes)169 static inline psa_key_lifetime_t psa_get_key_lifetime(
170     const psa_key_attributes_t *attributes)
171 {
172     return attributes->client.lifetime;
173 }
174 
psa_extend_key_usage_flags(psa_key_usage_t * usage_flags)175 static inline void psa_extend_key_usage_flags(psa_key_usage_t *usage_flags)
176 {
177     if (*usage_flags & PSA_KEY_USAGE_SIGN_HASH)
178         *usage_flags |= PSA_KEY_USAGE_SIGN_MESSAGE;
179 
180     if (*usage_flags & PSA_KEY_USAGE_VERIFY_HASH)
181         *usage_flags |= PSA_KEY_USAGE_VERIFY_MESSAGE;
182 }
183 
psa_set_key_usage_flags(psa_key_attributes_t * attributes,psa_key_usage_t usage_flags)184 static inline void psa_set_key_usage_flags(psa_key_attributes_t *attributes,
185                                            psa_key_usage_t usage_flags)
186 {
187     psa_extend_key_usage_flags(&usage_flags);
188     attributes->client.usage = usage_flags;
189 }
190 
psa_get_key_usage_flags(const psa_key_attributes_t * attributes)191 static inline psa_key_usage_t psa_get_key_usage_flags(
192     const psa_key_attributes_t *attributes)
193 {
194     return attributes->client.usage;
195 }
196 
psa_set_key_algorithm(psa_key_attributes_t * attributes,psa_algorithm_t alg)197 static inline void psa_set_key_algorithm(psa_key_attributes_t *attributes,
198                                          psa_algorithm_t alg)
199 {
200     attributes->client.alg = alg;
201 }
202 
psa_get_key_algorithm(const psa_key_attributes_t * attributes)203 static inline psa_algorithm_t psa_get_key_algorithm(
204     const psa_key_attributes_t *attributes)
205 {
206     return attributes->client.alg;
207 }
208 
psa_set_key_type(psa_key_attributes_t * attributes,psa_key_type_t type)209 static inline void psa_set_key_type(psa_key_attributes_t *attributes,
210                                     psa_key_type_t type)
211 {
212     attributes->client.type = type;
213 }
214 
psa_get_key_type(const psa_key_attributes_t * attributes)215 static inline psa_key_type_t psa_get_key_type(
216     const psa_key_attributes_t *attributes)
217 {
218     return attributes->client.type;
219 }
220 
psa_set_key_bits(psa_key_attributes_t * attributes,size_t bits)221 static inline void psa_set_key_bits(psa_key_attributes_t *attributes,
222                                     size_t bits)
223 {
224     if (bits > PSA_MAX_KEY_BITS)
225         attributes->client.bits = PSA_KEY_BITS_TOO_LARGE;
226     else
227         attributes->client.bits = bits;
228 }
229 
psa_get_key_bits(const psa_key_attributes_t * attributes)230 static inline size_t psa_get_key_bits(
231     const psa_key_attributes_t *attributes)
232 {
233     return attributes->client.bits;
234 }
235 
236 #ifdef __cplusplus
237 }
238 #endif
239 
240 #endif /* PSA_CRYPTO_STRUCT_H */
241