2018-01-27 23:32:46 +01:00
|
|
|
/*
|
|
|
|
* PSA crypto layer on top of Mbed TLS crypto
|
|
|
|
*/
|
|
|
|
/* Copyright (C) 2018, ARM Limited, All Rights Reserved
|
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
|
|
* not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*
|
|
|
|
* This file is part of mbed TLS (https://tls.mbed.org)
|
|
|
|
*/
|
|
|
|
|
|
|
|
#if !defined(MBEDTLS_CONFIG_FILE)
|
|
|
|
#include "mbedtls/config.h"
|
|
|
|
#else
|
|
|
|
#include MBEDTLS_CONFIG_FILE
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_PSA_CRYPTO_C)
|
|
|
|
|
|
|
|
#include "psa/crypto.h"
|
|
|
|
|
2018-01-28 13:16:24 +01:00
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#if defined(MBEDTLS_PLATFORM_C)
|
|
|
|
#include "mbedtls/platform.h"
|
|
|
|
#else
|
|
|
|
#define mbedtls_calloc calloc
|
|
|
|
#define mbedtls_free free
|
|
|
|
#endif
|
|
|
|
|
2018-02-07 20:59:33 +01:00
|
|
|
#include "mbedtls/arc4.h"
|
2018-06-21 09:35:35 +02:00
|
|
|
#include "mbedtls/asn1.h"
|
2018-02-07 20:59:33 +01:00
|
|
|
#include "mbedtls/blowfish.h"
|
|
|
|
#include "mbedtls/camellia.h"
|
|
|
|
#include "mbedtls/cipher.h"
|
|
|
|
#include "mbedtls/ccm.h"
|
|
|
|
#include "mbedtls/cmac.h"
|
2018-01-27 23:32:46 +01:00
|
|
|
#include "mbedtls/ctr_drbg.h"
|
2018-02-07 20:59:33 +01:00
|
|
|
#include "mbedtls/des.h"
|
2018-01-28 18:16:59 +01:00
|
|
|
#include "mbedtls/ecp.h"
|
2018-01-27 23:32:46 +01:00
|
|
|
#include "mbedtls/entropy.h"
|
2018-02-07 20:59:33 +01:00
|
|
|
#include "mbedtls/error.h"
|
|
|
|
#include "mbedtls/gcm.h"
|
|
|
|
#include "mbedtls/md2.h"
|
|
|
|
#include "mbedtls/md4.h"
|
|
|
|
#include "mbedtls/md5.h"
|
2018-02-03 22:44:14 +01:00
|
|
|
#include "mbedtls/md.h"
|
|
|
|
#include "mbedtls/md_internal.h"
|
2018-01-28 13:16:24 +01:00
|
|
|
#include "mbedtls/pk.h"
|
2018-01-28 18:16:59 +01:00
|
|
|
#include "mbedtls/pk_internal.h"
|
2018-02-07 20:59:33 +01:00
|
|
|
#include "mbedtls/ripemd160.h"
|
2018-01-28 18:16:59 +01:00
|
|
|
#include "mbedtls/rsa.h"
|
2018-02-07 20:59:33 +01:00
|
|
|
#include "mbedtls/sha1.h"
|
|
|
|
#include "mbedtls/sha256.h"
|
|
|
|
#include "mbedtls/sha512.h"
|
|
|
|
#include "mbedtls/xtea.h"
|
|
|
|
|
2018-01-27 23:32:46 +01:00
|
|
|
|
|
|
|
|
|
|
|
/* Implementation that should never be optimized out by the compiler */
|
|
|
|
static void mbedtls_zeroize( void *v, size_t n )
|
|
|
|
{
|
|
|
|
volatile unsigned char *p = v; while( n-- ) *p++ = 0;
|
|
|
|
}
|
|
|
|
|
2018-02-07 21:05:37 +01:00
|
|
|
/* constant-time buffer comparison */
|
|
|
|
static inline int safer_memcmp( const uint8_t *a, const uint8_t *b, size_t n )
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
unsigned char diff = 0;
|
|
|
|
|
|
|
|
for( i = 0; i < n; i++ )
|
|
|
|
diff |= a[i] ^ b[i];
|
|
|
|
|
|
|
|
return( diff );
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
2018-01-28 13:16:24 +01:00
|
|
|
/****************************************************************/
|
|
|
|
/* Global data, support functions and library management */
|
|
|
|
/****************************************************************/
|
|
|
|
|
|
|
|
/* Number of key slots (plus one because 0 is not used).
|
|
|
|
* The value is a compile-time constant for now, for simplicity. */
|
2018-06-18 23:25:51 +02:00
|
|
|
#define PSA_KEY_SLOT_COUNT 32
|
2018-01-28 13:16:24 +01:00
|
|
|
|
2018-06-18 15:41:12 +02:00
|
|
|
typedef struct
|
|
|
|
{
|
2018-01-28 13:16:24 +01:00
|
|
|
psa_key_type_t type;
|
2018-03-28 00:21:33 +02:00
|
|
|
psa_key_policy_t policy;
|
2018-03-20 21:44:08 +01:00
|
|
|
psa_key_lifetime_t lifetime;
|
2018-06-18 15:41:12 +02:00
|
|
|
union
|
|
|
|
{
|
|
|
|
struct raw_data
|
|
|
|
{
|
2018-01-28 13:16:24 +01:00
|
|
|
uint8_t *data;
|
|
|
|
size_t bytes;
|
|
|
|
} raw;
|
2018-01-28 18:16:59 +01:00
|
|
|
#if defined(MBEDTLS_RSA_C)
|
|
|
|
mbedtls_rsa_context *rsa;
|
|
|
|
#endif /* MBEDTLS_RSA_C */
|
|
|
|
#if defined(MBEDTLS_ECP_C)
|
|
|
|
mbedtls_ecp_keypair *ecp;
|
|
|
|
#endif /* MBEDTLS_ECP_C */
|
2018-01-28 13:16:24 +01:00
|
|
|
} data;
|
|
|
|
} key_slot_t;
|
|
|
|
|
2018-06-21 14:15:31 +02:00
|
|
|
static int key_type_is_raw_bytes( psa_key_type_t type )
|
|
|
|
{
|
|
|
|
psa_key_type_t category = type & PSA_KEY_TYPE_CATEGORY_MASK;
|
|
|
|
return( category == PSA_KEY_TYPE_RAW_DATA ||
|
|
|
|
category == PSA_KEY_TYPE_CATEGORY_SYMMETRIC );
|
|
|
|
}
|
|
|
|
|
2018-06-18 15:41:12 +02:00
|
|
|
typedef struct
|
|
|
|
{
|
2018-01-27 23:32:46 +01:00
|
|
|
int initialized;
|
|
|
|
mbedtls_entropy_context entropy;
|
|
|
|
mbedtls_ctr_drbg_context ctr_drbg;
|
2018-06-18 23:25:51 +02:00
|
|
|
key_slot_t key_slots[PSA_KEY_SLOT_COUNT];
|
2018-01-27 23:32:46 +01:00
|
|
|
} psa_global_data_t;
|
|
|
|
|
|
|
|
static psa_global_data_t global_data;
|
|
|
|
|
|
|
|
static psa_status_t mbedtls_to_psa_error( int ret )
|
|
|
|
{
|
2018-02-07 20:59:33 +01:00
|
|
|
/* If there's both a high-level code and low-level code, dispatch on
|
|
|
|
* the high-level code. */
|
|
|
|
switch( ret < -0x7f ? - ( -ret & 0x7f80 ) : ret )
|
2018-01-27 23:32:46 +01:00
|
|
|
{
|
|
|
|
case 0:
|
|
|
|
return( PSA_SUCCESS );
|
2018-02-07 20:59:33 +01:00
|
|
|
|
|
|
|
case MBEDTLS_ERR_AES_INVALID_KEY_LENGTH:
|
|
|
|
case MBEDTLS_ERR_AES_INVALID_INPUT_LENGTH:
|
|
|
|
case MBEDTLS_ERR_AES_FEATURE_UNAVAILABLE:
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
case MBEDTLS_ERR_AES_HW_ACCEL_FAILED:
|
|
|
|
return( PSA_ERROR_HARDWARE_FAILURE );
|
|
|
|
|
|
|
|
case MBEDTLS_ERR_ARC4_HW_ACCEL_FAILED:
|
|
|
|
return( PSA_ERROR_HARDWARE_FAILURE );
|
|
|
|
|
2018-06-21 09:35:35 +02:00
|
|
|
case MBEDTLS_ERR_ASN1_OUT_OF_DATA:
|
|
|
|
case MBEDTLS_ERR_ASN1_UNEXPECTED_TAG:
|
|
|
|
case MBEDTLS_ERR_ASN1_INVALID_LENGTH:
|
|
|
|
case MBEDTLS_ERR_ASN1_LENGTH_MISMATCH:
|
|
|
|
case MBEDTLS_ERR_ASN1_INVALID_DATA:
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
case MBEDTLS_ERR_ASN1_ALLOC_FAILED:
|
|
|
|
return( PSA_ERROR_INSUFFICIENT_MEMORY );
|
|
|
|
case MBEDTLS_ERR_ASN1_BUF_TOO_SMALL:
|
|
|
|
return( PSA_ERROR_BUFFER_TOO_SMALL );
|
|
|
|
|
2018-02-07 20:59:33 +01:00
|
|
|
case MBEDTLS_ERR_BLOWFISH_INVALID_KEY_LENGTH:
|
|
|
|
case MBEDTLS_ERR_BLOWFISH_INVALID_INPUT_LENGTH:
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
case MBEDTLS_ERR_BLOWFISH_HW_ACCEL_FAILED:
|
|
|
|
return( PSA_ERROR_HARDWARE_FAILURE );
|
|
|
|
|
|
|
|
case MBEDTLS_ERR_CAMELLIA_INVALID_KEY_LENGTH:
|
|
|
|
case MBEDTLS_ERR_CAMELLIA_INVALID_INPUT_LENGTH:
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
case MBEDTLS_ERR_CAMELLIA_HW_ACCEL_FAILED:
|
|
|
|
return( PSA_ERROR_HARDWARE_FAILURE );
|
|
|
|
|
|
|
|
case MBEDTLS_ERR_CCM_BAD_INPUT:
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
case MBEDTLS_ERR_CCM_AUTH_FAILED:
|
|
|
|
return( PSA_ERROR_INVALID_SIGNATURE );
|
|
|
|
case MBEDTLS_ERR_CCM_HW_ACCEL_FAILED:
|
|
|
|
return( PSA_ERROR_HARDWARE_FAILURE );
|
|
|
|
|
|
|
|
case MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE:
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
case MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA:
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
case MBEDTLS_ERR_CIPHER_ALLOC_FAILED:
|
|
|
|
return( PSA_ERROR_INSUFFICIENT_MEMORY );
|
|
|
|
case MBEDTLS_ERR_CIPHER_INVALID_PADDING:
|
|
|
|
return( PSA_ERROR_INVALID_PADDING );
|
|
|
|
case MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED:
|
|
|
|
return( PSA_ERROR_BAD_STATE );
|
|
|
|
case MBEDTLS_ERR_CIPHER_AUTH_FAILED:
|
|
|
|
return( PSA_ERROR_INVALID_SIGNATURE );
|
|
|
|
case MBEDTLS_ERR_CIPHER_INVALID_CONTEXT:
|
|
|
|
return( PSA_ERROR_TAMPERING_DETECTED );
|
|
|
|
case MBEDTLS_ERR_CIPHER_HW_ACCEL_FAILED:
|
|
|
|
return( PSA_ERROR_HARDWARE_FAILURE );
|
|
|
|
|
|
|
|
case MBEDTLS_ERR_CMAC_HW_ACCEL_FAILED:
|
|
|
|
return( PSA_ERROR_HARDWARE_FAILURE );
|
|
|
|
|
|
|
|
case MBEDTLS_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED:
|
|
|
|
return( PSA_ERROR_INSUFFICIENT_ENTROPY );
|
|
|
|
case MBEDTLS_ERR_CTR_DRBG_REQUEST_TOO_BIG:
|
|
|
|
case MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG:
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
case MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR:
|
|
|
|
return( PSA_ERROR_INSUFFICIENT_ENTROPY );
|
|
|
|
|
|
|
|
case MBEDTLS_ERR_DES_INVALID_INPUT_LENGTH:
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
case MBEDTLS_ERR_DES_HW_ACCEL_FAILED:
|
|
|
|
return( PSA_ERROR_HARDWARE_FAILURE );
|
|
|
|
|
2018-01-27 23:32:46 +01:00
|
|
|
case MBEDTLS_ERR_ENTROPY_NO_SOURCES_DEFINED:
|
|
|
|
case MBEDTLS_ERR_ENTROPY_NO_STRONG_SOURCE:
|
|
|
|
case MBEDTLS_ERR_ENTROPY_SOURCE_FAILED:
|
|
|
|
return( PSA_ERROR_INSUFFICIENT_ENTROPY );
|
2018-02-07 20:59:33 +01:00
|
|
|
|
|
|
|
case MBEDTLS_ERR_GCM_AUTH_FAILED:
|
|
|
|
return( PSA_ERROR_INVALID_SIGNATURE );
|
|
|
|
case MBEDTLS_ERR_GCM_BAD_INPUT:
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
case MBEDTLS_ERR_GCM_HW_ACCEL_FAILED:
|
|
|
|
return( PSA_ERROR_HARDWARE_FAILURE );
|
|
|
|
|
|
|
|
case MBEDTLS_ERR_MD2_HW_ACCEL_FAILED:
|
|
|
|
case MBEDTLS_ERR_MD4_HW_ACCEL_FAILED:
|
|
|
|
case MBEDTLS_ERR_MD5_HW_ACCEL_FAILED:
|
|
|
|
return( PSA_ERROR_HARDWARE_FAILURE );
|
|
|
|
|
|
|
|
case MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE:
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
case MBEDTLS_ERR_MD_BAD_INPUT_DATA:
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
case MBEDTLS_ERR_MD_ALLOC_FAILED:
|
|
|
|
return( PSA_ERROR_INSUFFICIENT_MEMORY );
|
|
|
|
case MBEDTLS_ERR_MD_FILE_IO_ERROR:
|
|
|
|
return( PSA_ERROR_STORAGE_FAILURE );
|
|
|
|
case MBEDTLS_ERR_MD_HW_ACCEL_FAILED:
|
|
|
|
return( PSA_ERROR_HARDWARE_FAILURE );
|
|
|
|
|
2018-01-28 13:16:24 +01:00
|
|
|
case MBEDTLS_ERR_PK_ALLOC_FAILED:
|
|
|
|
return( PSA_ERROR_INSUFFICIENT_MEMORY );
|
|
|
|
case MBEDTLS_ERR_PK_TYPE_MISMATCH:
|
|
|
|
case MBEDTLS_ERR_PK_BAD_INPUT_DATA:
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
case MBEDTLS_ERR_PK_FILE_IO_ERROR:
|
2018-02-07 20:59:33 +01:00
|
|
|
return( PSA_ERROR_STORAGE_FAILURE );
|
2018-01-28 13:16:24 +01:00
|
|
|
case MBEDTLS_ERR_PK_KEY_INVALID_VERSION:
|
|
|
|
case MBEDTLS_ERR_PK_KEY_INVALID_FORMAT:
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
case MBEDTLS_ERR_PK_UNKNOWN_PK_ALG:
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
case MBEDTLS_ERR_PK_PASSWORD_REQUIRED:
|
|
|
|
case MBEDTLS_ERR_PK_PASSWORD_MISMATCH:
|
|
|
|
return( PSA_ERROR_NOT_PERMITTED );
|
|
|
|
case MBEDTLS_ERR_PK_INVALID_PUBKEY:
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
case MBEDTLS_ERR_PK_INVALID_ALG:
|
|
|
|
case MBEDTLS_ERR_PK_UNKNOWN_NAMED_CURVE:
|
|
|
|
case MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE:
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
case MBEDTLS_ERR_PK_SIG_LEN_MISMATCH:
|
|
|
|
return( PSA_ERROR_INVALID_SIGNATURE );
|
2018-02-07 20:59:33 +01:00
|
|
|
case MBEDTLS_ERR_PK_HW_ACCEL_FAILED:
|
|
|
|
return( PSA_ERROR_HARDWARE_FAILURE );
|
|
|
|
|
|
|
|
case MBEDTLS_ERR_RIPEMD160_HW_ACCEL_FAILED:
|
|
|
|
return( PSA_ERROR_HARDWARE_FAILURE );
|
|
|
|
|
|
|
|
case MBEDTLS_ERR_RSA_BAD_INPUT_DATA:
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
case MBEDTLS_ERR_RSA_INVALID_PADDING:
|
|
|
|
return( PSA_ERROR_INVALID_PADDING );
|
|
|
|
case MBEDTLS_ERR_RSA_KEY_GEN_FAILED:
|
|
|
|
return( PSA_ERROR_HARDWARE_FAILURE );
|
|
|
|
case MBEDTLS_ERR_RSA_KEY_CHECK_FAILED:
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
case MBEDTLS_ERR_RSA_PUBLIC_FAILED:
|
|
|
|
case MBEDTLS_ERR_RSA_PRIVATE_FAILED:
|
|
|
|
return( PSA_ERROR_TAMPERING_DETECTED );
|
|
|
|
case MBEDTLS_ERR_RSA_VERIFY_FAILED:
|
|
|
|
return( PSA_ERROR_INVALID_SIGNATURE );
|
|
|
|
case MBEDTLS_ERR_RSA_OUTPUT_TOO_LARGE:
|
|
|
|
return( PSA_ERROR_BUFFER_TOO_SMALL );
|
|
|
|
case MBEDTLS_ERR_RSA_RNG_FAILED:
|
|
|
|
return( PSA_ERROR_INSUFFICIENT_MEMORY );
|
|
|
|
case MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION:
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
case MBEDTLS_ERR_RSA_HW_ACCEL_FAILED:
|
|
|
|
return( PSA_ERROR_HARDWARE_FAILURE );
|
|
|
|
|
|
|
|
case MBEDTLS_ERR_SHA1_HW_ACCEL_FAILED:
|
|
|
|
case MBEDTLS_ERR_SHA256_HW_ACCEL_FAILED:
|
|
|
|
case MBEDTLS_ERR_SHA512_HW_ACCEL_FAILED:
|
|
|
|
return( PSA_ERROR_HARDWARE_FAILURE );
|
|
|
|
|
|
|
|
case MBEDTLS_ERR_XTEA_INVALID_INPUT_LENGTH:
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
case MBEDTLS_ERR_XTEA_HW_ACCEL_FAILED:
|
|
|
|
return( PSA_ERROR_HARDWARE_FAILURE );
|
|
|
|
|
2018-05-08 10:18:38 +02:00
|
|
|
case MBEDTLS_ERR_ECP_BAD_INPUT_DATA:
|
2018-05-09 15:07:36 +02:00
|
|
|
case MBEDTLS_ERR_ECP_INVALID_KEY:
|
2018-05-08 10:18:38 +02:00
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
2018-05-09 15:07:36 +02:00
|
|
|
case MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL:
|
|
|
|
return( PSA_ERROR_BUFFER_TOO_SMALL );
|
|
|
|
case MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE:
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
case MBEDTLS_ERR_ECP_SIG_LEN_MISMATCH:
|
|
|
|
case MBEDTLS_ERR_ECP_VERIFY_FAILED:
|
|
|
|
return( PSA_ERROR_INVALID_SIGNATURE );
|
|
|
|
case MBEDTLS_ERR_ECP_ALLOC_FAILED:
|
|
|
|
return( PSA_ERROR_INSUFFICIENT_MEMORY );
|
|
|
|
case MBEDTLS_ERR_ECP_HW_ACCEL_FAILED:
|
|
|
|
return( PSA_ERROR_HARDWARE_FAILURE );
|
2018-05-08 10:18:38 +02:00
|
|
|
|
2018-01-27 23:32:46 +01:00
|
|
|
default:
|
|
|
|
return( PSA_ERROR_UNKNOWN_ERROR );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-18 21:49:39 +02:00
|
|
|
|
|
|
|
|
2018-01-28 13:16:24 +01:00
|
|
|
/****************************************************************/
|
|
|
|
/* Key management */
|
|
|
|
/****************************************************************/
|
|
|
|
|
2018-06-18 20:47:51 +02:00
|
|
|
static psa_ecc_curve_t mbedtls_ecc_group_to_psa( mbedtls_ecp_group_id grpid )
|
|
|
|
{
|
|
|
|
switch( grpid )
|
|
|
|
{
|
|
|
|
case MBEDTLS_ECP_DP_SECP192R1:
|
|
|
|
return( PSA_ECC_CURVE_SECP192R1 );
|
|
|
|
case MBEDTLS_ECP_DP_SECP224R1:
|
|
|
|
return( PSA_ECC_CURVE_SECP224R1 );
|
|
|
|
case MBEDTLS_ECP_DP_SECP256R1:
|
|
|
|
return( PSA_ECC_CURVE_SECP256R1 );
|
|
|
|
case MBEDTLS_ECP_DP_SECP384R1:
|
|
|
|
return( PSA_ECC_CURVE_SECP384R1 );
|
|
|
|
case MBEDTLS_ECP_DP_SECP521R1:
|
|
|
|
return( PSA_ECC_CURVE_SECP521R1 );
|
|
|
|
case MBEDTLS_ECP_DP_BP256R1:
|
|
|
|
return( PSA_ECC_CURVE_BRAINPOOL_P256R1 );
|
|
|
|
case MBEDTLS_ECP_DP_BP384R1:
|
|
|
|
return( PSA_ECC_CURVE_BRAINPOOL_P384R1 );
|
|
|
|
case MBEDTLS_ECP_DP_BP512R1:
|
|
|
|
return( PSA_ECC_CURVE_BRAINPOOL_P512R1 );
|
|
|
|
case MBEDTLS_ECP_DP_CURVE25519:
|
|
|
|
return( PSA_ECC_CURVE_CURVE25519 );
|
|
|
|
case MBEDTLS_ECP_DP_SECP192K1:
|
|
|
|
return( PSA_ECC_CURVE_SECP192K1 );
|
|
|
|
case MBEDTLS_ECP_DP_SECP224K1:
|
|
|
|
return( PSA_ECC_CURVE_SECP224K1 );
|
|
|
|
case MBEDTLS_ECP_DP_SECP256K1:
|
|
|
|
return( PSA_ECC_CURVE_SECP256K1 );
|
|
|
|
case MBEDTLS_ECP_DP_CURVE448:
|
|
|
|
return( PSA_ECC_CURVE_CURVE448 );
|
|
|
|
default:
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-20 00:20:32 +02:00
|
|
|
static mbedtls_ecp_group_id mbedtls_ecc_group_of_psa( psa_ecc_curve_t curve )
|
|
|
|
{
|
|
|
|
switch( curve )
|
|
|
|
{
|
|
|
|
case PSA_ECC_CURVE_SECP192R1:
|
|
|
|
return( MBEDTLS_ECP_DP_SECP192R1 );
|
|
|
|
case PSA_ECC_CURVE_SECP224R1:
|
|
|
|
return( MBEDTLS_ECP_DP_SECP224R1 );
|
|
|
|
case PSA_ECC_CURVE_SECP256R1:
|
|
|
|
return( MBEDTLS_ECP_DP_SECP256R1 );
|
|
|
|
case PSA_ECC_CURVE_SECP384R1:
|
|
|
|
return( MBEDTLS_ECP_DP_SECP384R1 );
|
|
|
|
case PSA_ECC_CURVE_SECP521R1:
|
|
|
|
return( MBEDTLS_ECP_DP_SECP521R1 );
|
|
|
|
case PSA_ECC_CURVE_BRAINPOOL_P256R1:
|
|
|
|
return( MBEDTLS_ECP_DP_BP256R1 );
|
|
|
|
case PSA_ECC_CURVE_BRAINPOOL_P384R1:
|
|
|
|
return( MBEDTLS_ECP_DP_BP384R1 );
|
|
|
|
case PSA_ECC_CURVE_BRAINPOOL_P512R1:
|
|
|
|
return( MBEDTLS_ECP_DP_BP512R1 );
|
|
|
|
case PSA_ECC_CURVE_CURVE25519:
|
|
|
|
return( MBEDTLS_ECP_DP_CURVE25519 );
|
|
|
|
case PSA_ECC_CURVE_SECP192K1:
|
|
|
|
return( MBEDTLS_ECP_DP_SECP192K1 );
|
|
|
|
case PSA_ECC_CURVE_SECP224K1:
|
|
|
|
return( MBEDTLS_ECP_DP_SECP224K1 );
|
|
|
|
case PSA_ECC_CURVE_SECP256K1:
|
|
|
|
return( MBEDTLS_ECP_DP_SECP256K1 );
|
|
|
|
case PSA_ECC_CURVE_CURVE448:
|
|
|
|
return( MBEDTLS_ECP_DP_CURVE448 );
|
|
|
|
default:
|
|
|
|
return( MBEDTLS_ECP_DP_NONE );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-19 21:31:50 +02:00
|
|
|
static psa_status_t prepare_raw_data_slot( psa_key_type_t type,
|
|
|
|
size_t bits,
|
|
|
|
struct raw_data *raw )
|
|
|
|
{
|
|
|
|
/* Check that the bit size is acceptable for the key type */
|
|
|
|
switch( type )
|
|
|
|
{
|
|
|
|
case PSA_KEY_TYPE_RAW_DATA:
|
|
|
|
#if defined(MBEDTLS_MD_C)
|
|
|
|
case PSA_KEY_TYPE_HMAC:
|
|
|
|
#endif
|
|
|
|
break;
|
|
|
|
#if defined(MBEDTLS_AES_C)
|
|
|
|
case PSA_KEY_TYPE_AES:
|
|
|
|
if( bits != 128 && bits != 192 && bits != 256 )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CAMELLIA_C)
|
|
|
|
case PSA_KEY_TYPE_CAMELLIA:
|
|
|
|
if( bits != 128 && bits != 192 && bits != 256 )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_DES_C)
|
|
|
|
case PSA_KEY_TYPE_DES:
|
|
|
|
if( bits != 64 && bits != 128 && bits != 192 )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_ARC4_C)
|
|
|
|
case PSA_KEY_TYPE_ARC4:
|
|
|
|
if( bits < 8 || bits > 2048 )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
default:
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
}
|
2018-06-21 09:32:47 +02:00
|
|
|
if( bits % 8 != 0 )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
2018-06-19 21:31:50 +02:00
|
|
|
|
|
|
|
/* Allocate memory for the key */
|
|
|
|
raw->bytes = PSA_BITS_TO_BYTES( bits );
|
|
|
|
raw->data = mbedtls_calloc( 1, raw->bytes );
|
|
|
|
if( raw->data == NULL )
|
|
|
|
{
|
|
|
|
raw->bytes = 0;
|
|
|
|
return( PSA_ERROR_INSUFFICIENT_MEMORY );
|
|
|
|
}
|
|
|
|
return( PSA_SUCCESS );
|
|
|
|
}
|
|
|
|
|
2018-06-18 15:41:12 +02:00
|
|
|
psa_status_t psa_import_key( psa_key_slot_t key,
|
|
|
|
psa_key_type_t type,
|
|
|
|
const uint8_t *data,
|
|
|
|
size_t data_length )
|
2018-01-28 13:16:24 +01:00
|
|
|
{
|
|
|
|
key_slot_t *slot;
|
|
|
|
|
2018-06-18 23:25:51 +02:00
|
|
|
if( key == 0 || key > PSA_KEY_SLOT_COUNT )
|
2018-01-28 13:16:24 +01:00
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
slot = &global_data.key_slots[key];
|
|
|
|
if( slot->type != PSA_KEY_TYPE_NONE )
|
|
|
|
return( PSA_ERROR_OCCUPIED_SLOT );
|
|
|
|
|
2018-06-21 14:15:31 +02:00
|
|
|
if( key_type_is_raw_bytes( type ) )
|
2018-01-28 13:16:24 +01:00
|
|
|
{
|
2018-06-19 21:31:50 +02:00
|
|
|
psa_status_t status;
|
2018-03-07 16:41:37 +01:00
|
|
|
/* Ensure that a bytes-to-bit conversion won't overflow. */
|
2018-01-28 13:16:24 +01:00
|
|
|
if( data_length > SIZE_MAX / 8 )
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
2018-06-19 21:31:50 +02:00
|
|
|
status = prepare_raw_data_slot( type,
|
|
|
|
PSA_BYTES_TO_BITS( data_length ),
|
|
|
|
&slot->data.raw );
|
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( status );
|
2018-01-28 13:16:24 +01:00
|
|
|
memcpy( slot->data.raw.data, data, data_length );
|
|
|
|
}
|
|
|
|
else
|
2018-01-28 18:16:59 +01:00
|
|
|
#if defined(MBEDTLS_PK_PARSE_C)
|
2018-02-03 22:43:28 +01:00
|
|
|
if( type == PSA_KEY_TYPE_RSA_PUBLIC_KEY ||
|
|
|
|
type == PSA_KEY_TYPE_RSA_KEYPAIR ||
|
|
|
|
PSA_KEY_TYPE_IS_ECC( type ) )
|
2018-01-28 13:16:24 +01:00
|
|
|
{
|
|
|
|
int ret;
|
2018-01-28 18:16:59 +01:00
|
|
|
mbedtls_pk_context pk;
|
|
|
|
mbedtls_pk_init( &pk );
|
2018-02-03 22:43:28 +01:00
|
|
|
if( PSA_KEY_TYPE_IS_KEYPAIR( type ) )
|
|
|
|
ret = mbedtls_pk_parse_key( &pk, data, data_length, NULL, 0 );
|
|
|
|
else
|
|
|
|
ret = mbedtls_pk_parse_public_key( &pk, data, data_length );
|
2018-01-28 13:16:24 +01:00
|
|
|
if( ret != 0 )
|
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
2018-01-28 18:16:59 +01:00
|
|
|
switch( mbedtls_pk_get_type( &pk ) )
|
|
|
|
{
|
|
|
|
#if defined(MBEDTLS_RSA_C)
|
|
|
|
case MBEDTLS_PK_RSA:
|
2018-02-03 22:43:28 +01:00
|
|
|
if( type == PSA_KEY_TYPE_RSA_PUBLIC_KEY ||
|
|
|
|
type == PSA_KEY_TYPE_RSA_KEYPAIR )
|
2018-06-18 20:47:51 +02:00
|
|
|
slot->data.rsa = mbedtls_pk_rsa( pk );
|
2018-01-28 18:16:59 +01:00
|
|
|
else
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
break;
|
|
|
|
#endif /* MBEDTLS_RSA_C */
|
|
|
|
#if defined(MBEDTLS_ECP_C)
|
|
|
|
case MBEDTLS_PK_ECKEY:
|
|
|
|
if( PSA_KEY_TYPE_IS_ECC( type ) )
|
|
|
|
{
|
2018-06-18 20:47:51 +02:00
|
|
|
mbedtls_ecp_keypair *ecp = mbedtls_pk_ec( pk );
|
|
|
|
psa_ecc_curve_t actual_curve =
|
|
|
|
mbedtls_ecc_group_to_psa( ecp->grp.id );
|
|
|
|
psa_ecc_curve_t expected_curve =
|
|
|
|
PSA_KEY_TYPE_GET_CURVE( type );
|
|
|
|
if( actual_curve != expected_curve )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
slot->data.ecp = ecp;
|
2018-01-28 18:16:59 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
break;
|
|
|
|
#endif /* MBEDTLS_ECP_C */
|
|
|
|
default:
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
}
|
2018-01-28 13:16:24 +01:00
|
|
|
}
|
|
|
|
else
|
2018-01-28 18:16:59 +01:00
|
|
|
#endif /* defined(MBEDTLS_PK_PARSE_C) */
|
2018-01-28 13:16:24 +01:00
|
|
|
{
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
}
|
|
|
|
|
|
|
|
slot->type = type;
|
|
|
|
return( PSA_SUCCESS );
|
|
|
|
}
|
|
|
|
|
2018-06-18 15:41:12 +02:00
|
|
|
psa_status_t psa_destroy_key( psa_key_slot_t key )
|
2018-01-28 13:16:24 +01:00
|
|
|
{
|
|
|
|
key_slot_t *slot;
|
|
|
|
|
2018-06-18 23:25:51 +02:00
|
|
|
if( key == 0 || key > PSA_KEY_SLOT_COUNT )
|
2018-01-28 13:16:24 +01:00
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
slot = &global_data.key_slots[key];
|
|
|
|
if( slot->type == PSA_KEY_TYPE_NONE )
|
2018-04-19 08:38:16 +02:00
|
|
|
{
|
|
|
|
/* No key material to clean, but do zeroize the slot below to wipe
|
|
|
|
* metadata such as policies. */
|
|
|
|
}
|
2018-06-21 14:15:31 +02:00
|
|
|
else if( key_type_is_raw_bytes( slot->type ) )
|
2018-01-28 13:16:24 +01:00
|
|
|
{
|
|
|
|
mbedtls_free( slot->data.raw.data );
|
|
|
|
}
|
|
|
|
else
|
2018-01-28 18:16:59 +01:00
|
|
|
#if defined(MBEDTLS_RSA_C)
|
2018-02-03 22:43:28 +01:00
|
|
|
if( slot->type == PSA_KEY_TYPE_RSA_PUBLIC_KEY ||
|
|
|
|
slot->type == PSA_KEY_TYPE_RSA_KEYPAIR )
|
2018-01-28 18:16:59 +01:00
|
|
|
{
|
|
|
|
mbedtls_rsa_free( slot->data.rsa );
|
2018-03-07 16:42:44 +01:00
|
|
|
mbedtls_free( slot->data.rsa );
|
2018-01-28 18:16:59 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* defined(MBEDTLS_RSA_C) */
|
|
|
|
#if defined(MBEDTLS_ECP_C)
|
|
|
|
if( PSA_KEY_TYPE_IS_ECC( slot->type ) )
|
2018-01-28 13:16:24 +01:00
|
|
|
{
|
2018-01-28 18:16:59 +01:00
|
|
|
mbedtls_ecp_keypair_free( slot->data.ecp );
|
2018-03-07 16:42:44 +01:00
|
|
|
mbedtls_free( slot->data.ecp );
|
2018-01-28 13:16:24 +01:00
|
|
|
}
|
|
|
|
else
|
2018-01-28 18:16:59 +01:00
|
|
|
#endif /* defined(MBEDTLS_ECP_C) */
|
2018-01-28 13:16:24 +01:00
|
|
|
{
|
|
|
|
/* Shouldn't happen: the key type is not any type that we
|
2018-03-07 16:41:37 +01:00
|
|
|
* put in. */
|
2018-01-28 13:16:24 +01:00
|
|
|
return( PSA_ERROR_TAMPERING_DETECTED );
|
|
|
|
}
|
|
|
|
|
|
|
|
mbedtls_zeroize( slot, sizeof( *slot ) );
|
|
|
|
return( PSA_SUCCESS );
|
|
|
|
}
|
|
|
|
|
2018-06-18 15:41:12 +02:00
|
|
|
psa_status_t psa_get_key_information( psa_key_slot_t key,
|
|
|
|
psa_key_type_t *type,
|
|
|
|
size_t *bits )
|
2018-01-28 13:16:24 +01:00
|
|
|
{
|
|
|
|
key_slot_t *slot;
|
|
|
|
|
2018-06-18 23:25:51 +02:00
|
|
|
if( key == 0 || key > PSA_KEY_SLOT_COUNT )
|
2018-02-03 22:43:28 +01:00
|
|
|
return( PSA_ERROR_EMPTY_SLOT );
|
2018-01-28 13:16:24 +01:00
|
|
|
slot = &global_data.key_slots[key];
|
|
|
|
if( type != NULL )
|
|
|
|
*type = slot->type;
|
|
|
|
if( bits != NULL )
|
|
|
|
*bits = 0;
|
|
|
|
if( slot->type == PSA_KEY_TYPE_NONE )
|
|
|
|
return( PSA_ERROR_EMPTY_SLOT );
|
|
|
|
|
2018-06-21 14:15:31 +02:00
|
|
|
if( key_type_is_raw_bytes( slot->type ) )
|
2018-01-28 13:16:24 +01:00
|
|
|
{
|
|
|
|
if( bits != NULL )
|
|
|
|
*bits = slot->data.raw.bytes * 8;
|
|
|
|
}
|
|
|
|
else
|
2018-01-28 18:16:59 +01:00
|
|
|
#if defined(MBEDTLS_RSA_C)
|
2018-02-03 22:43:28 +01:00
|
|
|
if( slot->type == PSA_KEY_TYPE_RSA_PUBLIC_KEY ||
|
|
|
|
slot->type == PSA_KEY_TYPE_RSA_KEYPAIR )
|
2018-01-28 13:16:24 +01:00
|
|
|
{
|
|
|
|
if( bits != NULL )
|
2018-01-28 18:16:59 +01:00
|
|
|
*bits = mbedtls_rsa_get_bitlen( slot->data.rsa );
|
2018-01-28 13:16:24 +01:00
|
|
|
}
|
|
|
|
else
|
2018-01-28 18:16:59 +01:00
|
|
|
#endif /* defined(MBEDTLS_RSA_C) */
|
|
|
|
#if defined(MBEDTLS_ECP_C)
|
|
|
|
if( PSA_KEY_TYPE_IS_ECC( slot->type ) )
|
|
|
|
{
|
|
|
|
if( bits != NULL )
|
|
|
|
*bits = slot->data.ecp->grp.pbits;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* defined(MBEDTLS_ECP_C) */
|
2018-01-28 13:16:24 +01:00
|
|
|
{
|
|
|
|
/* Shouldn't happen: the key type is not any type that we
|
2018-03-07 16:41:37 +01:00
|
|
|
* put in. */
|
2018-01-28 13:16:24 +01:00
|
|
|
return( PSA_ERROR_TAMPERING_DETECTED );
|
|
|
|
}
|
|
|
|
|
|
|
|
return( PSA_SUCCESS );
|
|
|
|
}
|
|
|
|
|
2018-06-18 15:41:12 +02:00
|
|
|
static psa_status_t psa_internal_export_key( psa_key_slot_t key,
|
|
|
|
uint8_t *data,
|
|
|
|
size_t data_size,
|
|
|
|
size_t *data_length,
|
|
|
|
int export_public_key )
|
2018-01-28 13:16:24 +01:00
|
|
|
{
|
|
|
|
key_slot_t *slot;
|
|
|
|
|
2018-06-18 23:25:51 +02:00
|
|
|
if( key == 0 || key > PSA_KEY_SLOT_COUNT )
|
2018-02-03 22:43:28 +01:00
|
|
|
return( PSA_ERROR_EMPTY_SLOT );
|
2018-01-28 13:16:24 +01:00
|
|
|
slot = &global_data.key_slots[key];
|
|
|
|
if( slot->type == PSA_KEY_TYPE_NONE )
|
|
|
|
return( PSA_ERROR_EMPTY_SLOT );
|
|
|
|
|
2018-06-18 16:04:39 +02:00
|
|
|
if( export_public_key && ! PSA_KEY_TYPE_IS_ASYMMETRIC( slot->type ) )
|
2018-04-16 17:16:20 +02:00
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
2018-03-28 12:17:44 +02:00
|
|
|
|
2018-06-18 16:04:39 +02:00
|
|
|
if( ! export_public_key &&
|
|
|
|
! PSA_KEY_TYPE_IS_PUBLIC_KEY( slot->type ) &&
|
|
|
|
( slot->policy.usage & PSA_KEY_USAGE_EXPORT ) == 0 )
|
2018-06-04 17:41:37 +02:00
|
|
|
return( PSA_ERROR_NOT_PERMITTED );
|
2018-06-18 15:41:12 +02:00
|
|
|
|
2018-06-21 14:15:31 +02:00
|
|
|
if( key_type_is_raw_bytes( slot->type ) )
|
2018-01-28 13:16:24 +01:00
|
|
|
{
|
|
|
|
if( slot->data.raw.bytes > data_size )
|
|
|
|
return( PSA_ERROR_BUFFER_TOO_SMALL );
|
|
|
|
memcpy( data, slot->data.raw.data, slot->data.raw.bytes );
|
|
|
|
*data_length = slot->data.raw.bytes;
|
|
|
|
return( PSA_SUCCESS );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2018-01-28 18:16:59 +01:00
|
|
|
#if defined(MBEDTLS_PK_WRITE_C)
|
2018-02-03 22:43:28 +01:00
|
|
|
if( slot->type == PSA_KEY_TYPE_RSA_PUBLIC_KEY ||
|
2018-04-16 17:16:20 +02:00
|
|
|
slot->type == PSA_KEY_TYPE_RSA_KEYPAIR ||
|
|
|
|
PSA_KEY_TYPE_IS_ECC( slot->type ) )
|
2018-01-28 18:16:59 +01:00
|
|
|
{
|
2018-04-16 17:16:20 +02:00
|
|
|
mbedtls_pk_context pk;
|
|
|
|
int ret;
|
|
|
|
mbedtls_pk_init( &pk );
|
|
|
|
if( slot->type == PSA_KEY_TYPE_RSA_PUBLIC_KEY ||
|
|
|
|
slot->type == PSA_KEY_TYPE_RSA_KEYPAIR )
|
|
|
|
{
|
|
|
|
pk.pk_info = &mbedtls_rsa_info;
|
|
|
|
pk.pk_ctx = slot->data.rsa;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
pk.pk_info = &mbedtls_eckey_info;
|
|
|
|
pk.pk_ctx = slot->data.ecp;
|
|
|
|
}
|
2018-05-29 15:56:39 +02:00
|
|
|
if( export_public_key || PSA_KEY_TYPE_IS_PUBLIC_KEY( slot->type ) )
|
2018-04-16 17:16:20 +02:00
|
|
|
ret = mbedtls_pk_write_pubkey_der( &pk, data, data_size );
|
2018-05-02 11:55:20 +02:00
|
|
|
else
|
|
|
|
ret = mbedtls_pk_write_key_der( &pk, data, data_size );
|
2018-04-29 10:34:58 +02:00
|
|
|
if( ret < 0 )
|
2018-06-20 00:11:45 +02:00
|
|
|
{
|
|
|
|
memset( data, 0, data_size );
|
2018-04-16 17:16:20 +02:00
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
2018-06-20 00:11:45 +02:00
|
|
|
}
|
2018-06-20 00:11:07 +02:00
|
|
|
/* The mbedtls_pk_xxx functions write to the end of the buffer.
|
|
|
|
* Move the data to the beginning and erase remaining data
|
|
|
|
* at the original location. */
|
|
|
|
if( 2 * (size_t) ret <= data_size )
|
|
|
|
{
|
|
|
|
memcpy( data, data + data_size - ret, ret );
|
2018-06-20 00:11:45 +02:00
|
|
|
memset( data + data_size - ret, 0, ret );
|
2018-06-20 00:11:07 +02:00
|
|
|
}
|
|
|
|
else if( (size_t) ret < data_size )
|
|
|
|
{
|
|
|
|
memmove( data, data + data_size - ret, ret );
|
2018-06-20 00:11:45 +02:00
|
|
|
memset( data + ret, 0, data_size - ret );
|
2018-06-20 00:11:07 +02:00
|
|
|
}
|
2018-04-16 17:16:20 +02:00
|
|
|
*data_length = ret;
|
|
|
|
return( PSA_SUCCESS );
|
2018-01-28 18:16:59 +01:00
|
|
|
}
|
|
|
|
else
|
2018-04-16 17:16:20 +02:00
|
|
|
#endif /* defined(MBEDTLS_PK_WRITE_C) */
|
2018-01-28 18:16:59 +01:00
|
|
|
{
|
2018-04-16 17:16:20 +02:00
|
|
|
/* This shouldn't happen in the reference implementation, but
|
2018-06-04 15:08:56 +02:00
|
|
|
it is valid for a special-purpose implementation to omit
|
|
|
|
support for exporting certain key types. */
|
2018-04-16 17:16:20 +02:00
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
2018-01-28 18:16:59 +01:00
|
|
|
}
|
2018-01-28 13:16:24 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-18 15:41:12 +02:00
|
|
|
psa_status_t psa_export_key( psa_key_slot_t key,
|
|
|
|
uint8_t *data,
|
|
|
|
size_t data_size,
|
|
|
|
size_t *data_length )
|
2018-04-16 17:16:20 +02:00
|
|
|
{
|
2018-06-18 16:04:39 +02:00
|
|
|
return( psa_internal_export_key( key, data, data_size,
|
|
|
|
data_length, 0 ) );
|
2018-01-28 13:16:24 +01:00
|
|
|
}
|
|
|
|
|
2018-06-18 15:41:12 +02:00
|
|
|
psa_status_t psa_export_public_key( psa_key_slot_t key,
|
|
|
|
uint8_t *data,
|
|
|
|
size_t data_size,
|
|
|
|
size_t *data_length )
|
2018-04-03 14:30:03 +02:00
|
|
|
{
|
2018-06-18 16:04:39 +02:00
|
|
|
return( psa_internal_export_key( key, data, data_size,
|
|
|
|
data_length, 1 ) );
|
2018-04-03 14:30:03 +02:00
|
|
|
}
|
2018-01-28 13:16:24 +01:00
|
|
|
|
2018-06-18 21:49:39 +02:00
|
|
|
|
|
|
|
|
2018-02-03 22:44:14 +01:00
|
|
|
/****************************************************************/
|
|
|
|
/* Message digests */
|
|
|
|
/****************************************************************/
|
|
|
|
|
2018-03-07 16:42:59 +01:00
|
|
|
static const mbedtls_md_info_t *mbedtls_md_info_from_psa( psa_algorithm_t alg )
|
2018-02-03 22:44:14 +01:00
|
|
|
{
|
|
|
|
switch( alg )
|
|
|
|
{
|
|
|
|
#if defined(MBEDTLS_MD2_C)
|
|
|
|
case PSA_ALG_MD2:
|
|
|
|
return( &mbedtls_md2_info );
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD4_C)
|
|
|
|
case PSA_ALG_MD4:
|
|
|
|
return( &mbedtls_md4_info );
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case PSA_ALG_MD5:
|
|
|
|
return( &mbedtls_md5_info );
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case PSA_ALG_RIPEMD160:
|
|
|
|
return( &mbedtls_ripemd160_info );
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case PSA_ALG_SHA_1:
|
|
|
|
return( &mbedtls_sha1_info );
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
|
|
|
case PSA_ALG_SHA_224:
|
|
|
|
return( &mbedtls_sha224_info );
|
|
|
|
case PSA_ALG_SHA_256:
|
|
|
|
return( &mbedtls_sha256_info );
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
|
|
|
case PSA_ALG_SHA_384:
|
|
|
|
return( &mbedtls_sha384_info );
|
|
|
|
case PSA_ALG_SHA_512:
|
|
|
|
return( &mbedtls_sha512_info );
|
|
|
|
#endif
|
|
|
|
default:
|
|
|
|
return( NULL );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-07 21:05:37 +01:00
|
|
|
psa_status_t psa_hash_abort( psa_hash_operation_t *operation )
|
|
|
|
{
|
|
|
|
switch( operation->alg )
|
|
|
|
{
|
|
|
|
#if defined(MBEDTLS_MD2_C)
|
|
|
|
case PSA_ALG_MD2:
|
|
|
|
mbedtls_md2_free( &operation->ctx.md2 );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD4_C)
|
|
|
|
case PSA_ALG_MD4:
|
|
|
|
mbedtls_md4_free( &operation->ctx.md4 );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case PSA_ALG_MD5:
|
|
|
|
mbedtls_md5_free( &operation->ctx.md5 );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case PSA_ALG_RIPEMD160:
|
|
|
|
mbedtls_ripemd160_free( &operation->ctx.ripemd160 );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case PSA_ALG_SHA_1:
|
|
|
|
mbedtls_sha1_free( &operation->ctx.sha1 );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
|
|
|
case PSA_ALG_SHA_224:
|
|
|
|
case PSA_ALG_SHA_256:
|
|
|
|
mbedtls_sha256_free( &operation->ctx.sha256 );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
|
|
|
case PSA_ALG_SHA_384:
|
|
|
|
case PSA_ALG_SHA_512:
|
|
|
|
mbedtls_sha512_free( &operation->ctx.sha512 );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
default:
|
2018-06-21 16:57:07 +02:00
|
|
|
return( PSA_ERROR_BAD_STATE );
|
2018-02-07 21:05:37 +01:00
|
|
|
}
|
|
|
|
operation->alg = 0;
|
|
|
|
return( PSA_SUCCESS );
|
|
|
|
}
|
|
|
|
|
|
|
|
psa_status_t psa_hash_start( psa_hash_operation_t *operation,
|
|
|
|
psa_algorithm_t alg )
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
operation->alg = 0;
|
|
|
|
switch( alg )
|
|
|
|
{
|
|
|
|
#if defined(MBEDTLS_MD2_C)
|
|
|
|
case PSA_ALG_MD2:
|
|
|
|
mbedtls_md2_init( &operation->ctx.md2 );
|
|
|
|
ret = mbedtls_md2_starts_ret( &operation->ctx.md2 );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD4_C)
|
|
|
|
case PSA_ALG_MD4:
|
|
|
|
mbedtls_md4_init( &operation->ctx.md4 );
|
|
|
|
ret = mbedtls_md4_starts_ret( &operation->ctx.md4 );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case PSA_ALG_MD5:
|
|
|
|
mbedtls_md5_init( &operation->ctx.md5 );
|
|
|
|
ret = mbedtls_md5_starts_ret( &operation->ctx.md5 );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case PSA_ALG_RIPEMD160:
|
|
|
|
mbedtls_ripemd160_init( &operation->ctx.ripemd160 );
|
|
|
|
ret = mbedtls_ripemd160_starts_ret( &operation->ctx.ripemd160 );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case PSA_ALG_SHA_1:
|
|
|
|
mbedtls_sha1_init( &operation->ctx.sha1 );
|
|
|
|
ret = mbedtls_sha1_starts_ret( &operation->ctx.sha1 );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
|
|
|
case PSA_ALG_SHA_224:
|
|
|
|
mbedtls_sha256_init( &operation->ctx.sha256 );
|
|
|
|
ret = mbedtls_sha256_starts_ret( &operation->ctx.sha256, 1 );
|
|
|
|
break;
|
|
|
|
case PSA_ALG_SHA_256:
|
|
|
|
mbedtls_sha256_init( &operation->ctx.sha256 );
|
|
|
|
ret = mbedtls_sha256_starts_ret( &operation->ctx.sha256, 0 );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
|
|
|
case PSA_ALG_SHA_384:
|
|
|
|
mbedtls_sha512_init( &operation->ctx.sha512 );
|
|
|
|
ret = mbedtls_sha512_starts_ret( &operation->ctx.sha512, 1 );
|
|
|
|
break;
|
|
|
|
case PSA_ALG_SHA_512:
|
|
|
|
mbedtls_sha512_init( &operation->ctx.sha512 );
|
|
|
|
ret = mbedtls_sha512_starts_ret( &operation->ctx.sha512, 0 );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
default:
|
2018-06-20 16:21:04 +02:00
|
|
|
return( PSA_ALG_IS_HASH( alg ) ?
|
|
|
|
PSA_ERROR_NOT_SUPPORTED :
|
|
|
|
PSA_ERROR_INVALID_ARGUMENT );
|
2018-02-07 21:05:37 +01:00
|
|
|
}
|
|
|
|
if( ret == 0 )
|
|
|
|
operation->alg = alg;
|
|
|
|
else
|
|
|
|
psa_hash_abort( operation );
|
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
|
|
|
|
|
|
|
psa_status_t psa_hash_update( psa_hash_operation_t *operation,
|
|
|
|
const uint8_t *input,
|
|
|
|
size_t input_length )
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
switch( operation->alg )
|
|
|
|
{
|
|
|
|
#if defined(MBEDTLS_MD2_C)
|
|
|
|
case PSA_ALG_MD2:
|
|
|
|
ret = mbedtls_md2_update_ret( &operation->ctx.md2,
|
|
|
|
input, input_length );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD4_C)
|
|
|
|
case PSA_ALG_MD4:
|
|
|
|
ret = mbedtls_md4_update_ret( &operation->ctx.md4,
|
|
|
|
input, input_length );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case PSA_ALG_MD5:
|
|
|
|
ret = mbedtls_md5_update_ret( &operation->ctx.md5,
|
|
|
|
input, input_length );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case PSA_ALG_RIPEMD160:
|
|
|
|
ret = mbedtls_ripemd160_update_ret( &operation->ctx.ripemd160,
|
|
|
|
input, input_length );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case PSA_ALG_SHA_1:
|
|
|
|
ret = mbedtls_sha1_update_ret( &operation->ctx.sha1,
|
|
|
|
input, input_length );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
|
|
|
case PSA_ALG_SHA_224:
|
|
|
|
case PSA_ALG_SHA_256:
|
|
|
|
ret = mbedtls_sha256_update_ret( &operation->ctx.sha256,
|
|
|
|
input, input_length );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
|
|
|
case PSA_ALG_SHA_384:
|
|
|
|
case PSA_ALG_SHA_512:
|
|
|
|
ret = mbedtls_sha512_update_ret( &operation->ctx.sha512,
|
|
|
|
input, input_length );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
default:
|
|
|
|
ret = MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if( ret != 0 )
|
|
|
|
psa_hash_abort( operation );
|
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
|
|
|
|
|
|
|
psa_status_t psa_hash_finish( psa_hash_operation_t *operation,
|
|
|
|
uint8_t *hash,
|
|
|
|
size_t hash_size,
|
|
|
|
size_t *hash_length )
|
|
|
|
{
|
|
|
|
int ret;
|
2018-04-19 08:29:59 +02:00
|
|
|
size_t actual_hash_length = PSA_HASH_SIZE( operation->alg );
|
2018-02-07 21:05:37 +01:00
|
|
|
|
|
|
|
/* Fill the output buffer with something that isn't a valid hash
|
|
|
|
* (barring an attack on the hash and deliberately-crafted input),
|
|
|
|
* in case the caller doesn't check the return status properly. */
|
|
|
|
*hash_length = actual_hash_length;
|
|
|
|
memset( hash, '!', hash_size );
|
|
|
|
|
|
|
|
if( hash_size < actual_hash_length )
|
|
|
|
return( PSA_ERROR_BUFFER_TOO_SMALL );
|
|
|
|
|
|
|
|
switch( operation->alg )
|
|
|
|
{
|
|
|
|
#if defined(MBEDTLS_MD2_C)
|
|
|
|
case PSA_ALG_MD2:
|
|
|
|
ret = mbedtls_md2_finish_ret( &operation->ctx.md2, hash );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD4_C)
|
|
|
|
case PSA_ALG_MD4:
|
|
|
|
ret = mbedtls_md4_finish_ret( &operation->ctx.md4, hash );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case PSA_ALG_MD5:
|
|
|
|
ret = mbedtls_md5_finish_ret( &operation->ctx.md5, hash );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case PSA_ALG_RIPEMD160:
|
|
|
|
ret = mbedtls_ripemd160_finish_ret( &operation->ctx.ripemd160, hash );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case PSA_ALG_SHA_1:
|
|
|
|
ret = mbedtls_sha1_finish_ret( &operation->ctx.sha1, hash );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
|
|
|
case PSA_ALG_SHA_224:
|
|
|
|
case PSA_ALG_SHA_256:
|
|
|
|
ret = mbedtls_sha256_finish_ret( &operation->ctx.sha256, hash );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
|
|
|
case PSA_ALG_SHA_384:
|
|
|
|
case PSA_ALG_SHA_512:
|
|
|
|
ret = mbedtls_sha512_finish_ret( &operation->ctx.sha512, hash );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
default:
|
|
|
|
ret = MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if( ret == 0 )
|
|
|
|
{
|
|
|
|
return( psa_hash_abort( operation ) );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
psa_hash_abort( operation );
|
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-18 15:41:12 +02:00
|
|
|
psa_status_t psa_hash_verify( psa_hash_operation_t *operation,
|
|
|
|
const uint8_t *hash,
|
|
|
|
size_t hash_length )
|
2018-02-07 21:05:37 +01:00
|
|
|
{
|
|
|
|
uint8_t actual_hash[MBEDTLS_MD_MAX_SIZE];
|
|
|
|
size_t actual_hash_length;
|
|
|
|
psa_status_t status = psa_hash_finish( operation,
|
|
|
|
actual_hash, sizeof( actual_hash ),
|
|
|
|
&actual_hash_length );
|
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( status );
|
|
|
|
if( actual_hash_length != hash_length )
|
|
|
|
return( PSA_ERROR_INVALID_SIGNATURE );
|
|
|
|
if( safer_memcmp( hash, actual_hash, actual_hash_length ) != 0 )
|
|
|
|
return( PSA_ERROR_INVALID_SIGNATURE );
|
|
|
|
return( PSA_SUCCESS );
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/****************************************************************/
|
2018-02-08 10:02:12 +01:00
|
|
|
/* MAC */
|
|
|
|
/****************************************************************/
|
|
|
|
|
2018-03-07 16:42:59 +01:00
|
|
|
static const mbedtls_cipher_info_t *mbedtls_cipher_info_from_psa(
|
2018-02-08 10:02:12 +01:00
|
|
|
psa_algorithm_t alg,
|
|
|
|
psa_key_type_t key_type,
|
2018-06-18 15:41:12 +02:00
|
|
|
size_t key_bits,
|
2018-06-03 14:04:51 +02:00
|
|
|
mbedtls_cipher_id_t* cipher_id )
|
2018-02-08 10:02:12 +01:00
|
|
|
{
|
|
|
|
mbedtls_cipher_mode_t mode;
|
2018-06-03 14:04:51 +02:00
|
|
|
mbedtls_cipher_id_t cipher_id_tmp;
|
2018-02-08 10:02:12 +01:00
|
|
|
|
|
|
|
if( PSA_ALG_IS_CIPHER( alg ) || PSA_ALG_IS_AEAD( alg ) )
|
|
|
|
{
|
|
|
|
if( PSA_ALG_IS_BLOCK_CIPHER( alg ) )
|
2018-03-18 12:57:31 +01:00
|
|
|
{
|
|
|
|
alg &= ~PSA_ALG_BLOCK_CIPHER_PADDING_MASK;
|
|
|
|
}
|
2018-06-11 17:26:17 +02:00
|
|
|
|
2018-06-17 13:41:30 +02:00
|
|
|
switch( alg )
|
2018-02-08 10:02:12 +01:00
|
|
|
{
|
|
|
|
case PSA_ALG_STREAM_CIPHER:
|
|
|
|
mode = MBEDTLS_MODE_STREAM;
|
|
|
|
break;
|
|
|
|
case PSA_ALG_CBC_BASE:
|
|
|
|
mode = MBEDTLS_MODE_CBC;
|
|
|
|
break;
|
|
|
|
case PSA_ALG_CFB_BASE:
|
|
|
|
mode = MBEDTLS_MODE_CFB;
|
|
|
|
break;
|
|
|
|
case PSA_ALG_OFB_BASE:
|
|
|
|
mode = MBEDTLS_MODE_OFB;
|
|
|
|
break;
|
|
|
|
case PSA_ALG_CTR:
|
|
|
|
mode = MBEDTLS_MODE_CTR;
|
|
|
|
break;
|
|
|
|
case PSA_ALG_CCM:
|
|
|
|
mode = MBEDTLS_MODE_CCM;
|
|
|
|
break;
|
|
|
|
case PSA_ALG_GCM:
|
|
|
|
mode = MBEDTLS_MODE_GCM;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return( NULL );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if( alg == PSA_ALG_CMAC )
|
|
|
|
mode = MBEDTLS_MODE_ECB;
|
|
|
|
else if( alg == PSA_ALG_GMAC )
|
|
|
|
mode = MBEDTLS_MODE_GCM;
|
|
|
|
else
|
|
|
|
return( NULL );
|
|
|
|
|
|
|
|
switch( key_type )
|
|
|
|
{
|
|
|
|
case PSA_KEY_TYPE_AES:
|
2018-06-03 14:04:51 +02:00
|
|
|
cipher_id_tmp = MBEDTLS_CIPHER_ID_AES;
|
2018-02-08 10:02:12 +01:00
|
|
|
break;
|
|
|
|
case PSA_KEY_TYPE_DES:
|
2018-06-21 09:40:04 +02:00
|
|
|
/* key_bits is 64 for Single-DES, 128 for two-key Triple-DES,
|
|
|
|
* and 192 for three-key Triple-DES. */
|
2018-02-08 10:02:12 +01:00
|
|
|
if( key_bits == 64 )
|
2018-06-03 14:04:51 +02:00
|
|
|
cipher_id_tmp = MBEDTLS_CIPHER_ID_DES;
|
2018-02-08 10:02:12 +01:00
|
|
|
else
|
2018-06-03 14:04:51 +02:00
|
|
|
cipher_id_tmp = MBEDTLS_CIPHER_ID_3DES;
|
2018-06-21 09:40:04 +02:00
|
|
|
/* mbedtls doesn't recognize two-key Triple-DES as an algorithm,
|
|
|
|
* but two-key Triple-DES is functionally three-key Triple-DES
|
|
|
|
* with K1=K3, so that's how we present it to mbedtls. */
|
|
|
|
if( key_bits == 128 )
|
|
|
|
key_bits = 192;
|
2018-02-08 10:02:12 +01:00
|
|
|
break;
|
|
|
|
case PSA_KEY_TYPE_CAMELLIA:
|
2018-06-03 14:04:51 +02:00
|
|
|
cipher_id_tmp = MBEDTLS_CIPHER_ID_CAMELLIA;
|
2018-02-08 10:02:12 +01:00
|
|
|
break;
|
|
|
|
case PSA_KEY_TYPE_ARC4:
|
2018-06-03 14:04:51 +02:00
|
|
|
cipher_id_tmp = MBEDTLS_CIPHER_ID_ARC4;
|
2018-02-08 10:02:12 +01:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return( NULL );
|
|
|
|
}
|
2018-06-03 14:04:51 +02:00
|
|
|
if( cipher_id != NULL )
|
2018-06-03 16:20:42 +02:00
|
|
|
*cipher_id = cipher_id_tmp;
|
2018-02-08 10:02:12 +01:00
|
|
|
|
2018-06-03 14:04:51 +02:00
|
|
|
return( mbedtls_cipher_info_from_values( cipher_id_tmp, key_bits, mode ) );
|
2018-02-08 10:02:12 +01:00
|
|
|
}
|
|
|
|
|
2018-06-18 11:24:33 +02:00
|
|
|
static size_t psa_get_hash_block_size( psa_algorithm_t alg )
|
2018-06-17 13:41:10 +02:00
|
|
|
{
|
2018-06-18 15:41:12 +02:00
|
|
|
switch( alg )
|
2018-06-17 13:41:10 +02:00
|
|
|
{
|
|
|
|
case PSA_ALG_MD2:
|
2018-06-18 11:24:33 +02:00
|
|
|
return( 16 );
|
2018-06-17 13:41:10 +02:00
|
|
|
case PSA_ALG_MD4:
|
2018-06-18 11:24:33 +02:00
|
|
|
return( 64 );
|
2018-06-17 13:41:10 +02:00
|
|
|
case PSA_ALG_MD5:
|
2018-06-18 11:24:33 +02:00
|
|
|
return( 64 );
|
2018-06-17 13:41:10 +02:00
|
|
|
case PSA_ALG_RIPEMD160:
|
2018-06-18 11:24:33 +02:00
|
|
|
return( 64 );
|
2018-06-17 13:41:10 +02:00
|
|
|
case PSA_ALG_SHA_1:
|
2018-06-18 11:24:33 +02:00
|
|
|
return( 64 );
|
2018-06-17 13:41:10 +02:00
|
|
|
case PSA_ALG_SHA_224:
|
2018-06-18 11:24:33 +02:00
|
|
|
return( 64 );
|
2018-06-17 13:41:10 +02:00
|
|
|
case PSA_ALG_SHA_256:
|
2018-06-18 11:24:33 +02:00
|
|
|
return( 64 );
|
2018-06-17 13:41:10 +02:00
|
|
|
case PSA_ALG_SHA_384:
|
2018-06-18 11:24:33 +02:00
|
|
|
return( 128 );
|
2018-06-17 13:41:10 +02:00
|
|
|
case PSA_ALG_SHA_512:
|
2018-06-18 15:41:12 +02:00
|
|
|
return( 128 );
|
|
|
|
default:
|
|
|
|
return( 0 );
|
2018-06-17 13:41:10 +02:00
|
|
|
}
|
|
|
|
}
|
2018-06-07 12:27:47 +02:00
|
|
|
|
2018-06-20 16:05:20 +02:00
|
|
|
/* Initialize the MAC operation structure. Once this function has been
|
|
|
|
* called, psa_mac_abort can run and will do the right thing. */
|
|
|
|
static psa_status_t psa_mac_init( psa_mac_operation_t *operation,
|
|
|
|
psa_algorithm_t alg )
|
|
|
|
{
|
|
|
|
psa_status_t status = PSA_ERROR_NOT_SUPPORTED;
|
|
|
|
|
|
|
|
operation->alg = alg;
|
|
|
|
operation->key_set = 0;
|
|
|
|
operation->iv_set = 0;
|
|
|
|
operation->iv_required = 0;
|
|
|
|
operation->has_input = 0;
|
|
|
|
operation->key_usage_sign = 0;
|
|
|
|
operation->key_usage_verify = 0;
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CMAC_C)
|
|
|
|
if( alg == PSA_ALG_CMAC )
|
|
|
|
{
|
|
|
|
operation->iv_required = 0;
|
|
|
|
mbedtls_cipher_init( &operation->ctx.cmac );
|
|
|
|
status = PSA_SUCCESS;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_CMAC_C */
|
|
|
|
#if defined(MBEDTLS_MD_C)
|
|
|
|
if( PSA_ALG_IS_HMAC( operation->alg ) )
|
|
|
|
{
|
|
|
|
status = psa_hash_start( &operation->ctx.hmac.hash_ctx,
|
|
|
|
PSA_ALG_HMAC_HASH( alg ) );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_MD_C */
|
|
|
|
{
|
2018-06-20 16:21:04 +02:00
|
|
|
if( ! PSA_ALG_IS_MAC( alg ) )
|
|
|
|
status = PSA_ERROR_INVALID_ARGUMENT;
|
2018-06-20 16:05:20 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
memset( operation, 0, sizeof( *operation ) );
|
|
|
|
return( status );
|
|
|
|
}
|
|
|
|
|
2018-02-08 10:02:12 +01:00
|
|
|
psa_status_t psa_mac_abort( psa_mac_operation_t *operation )
|
|
|
|
{
|
|
|
|
switch( operation->alg )
|
|
|
|
{
|
2018-06-20 16:05:20 +02:00
|
|
|
case 0:
|
|
|
|
return( PSA_SUCCESS );
|
2018-02-08 10:02:12 +01:00
|
|
|
#if defined(MBEDTLS_CMAC_C)
|
|
|
|
case PSA_ALG_CMAC:
|
|
|
|
mbedtls_cipher_free( &operation->ctx.cmac );
|
|
|
|
break;
|
|
|
|
#endif /* MBEDTLS_CMAC_C */
|
|
|
|
default:
|
|
|
|
#if defined(MBEDTLS_MD_C)
|
|
|
|
if( PSA_ALG_IS_HMAC( operation->alg ) )
|
2018-06-04 15:03:32 +02:00
|
|
|
{
|
2018-06-11 17:13:00 +02:00
|
|
|
unsigned int block_size =
|
2018-06-18 16:04:39 +02:00
|
|
|
psa_get_hash_block_size( PSA_ALG_HMAC_HASH( operation->alg ) );
|
2018-06-08 21:52:24 +02:00
|
|
|
|
2018-06-11 17:13:00 +02:00
|
|
|
if( block_size == 0 )
|
2018-06-08 21:52:24 +02:00
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
|
2018-06-04 15:03:32 +02:00
|
|
|
psa_hash_abort( &operation->ctx.hmac.hash_ctx );
|
2018-06-18 15:41:12 +02:00
|
|
|
mbedtls_zeroize( operation->ctx.hmac.opad, block_size );
|
2018-06-04 15:03:32 +02:00
|
|
|
}
|
2018-02-08 10:02:12 +01:00
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_MD_C */
|
2018-06-21 16:57:07 +02:00
|
|
|
{
|
|
|
|
/* Sanity check (shouldn't happen: operation->alg should
|
|
|
|
* always have been initialized to a valid value). */
|
|
|
|
return( PSA_ERROR_BAD_STATE );
|
|
|
|
}
|
2018-02-08 10:02:12 +01:00
|
|
|
}
|
2018-04-04 14:43:05 +02:00
|
|
|
|
2018-02-08 10:02:12 +01:00
|
|
|
operation->alg = 0;
|
|
|
|
operation->key_set = 0;
|
|
|
|
operation->iv_set = 0;
|
|
|
|
operation->iv_required = 0;
|
|
|
|
operation->has_input = 0;
|
2018-06-20 16:05:20 +02:00
|
|
|
operation->key_usage_sign = 0;
|
|
|
|
operation->key_usage_verify = 0;
|
2018-04-04 14:43:05 +02:00
|
|
|
|
2018-02-08 10:02:12 +01:00
|
|
|
return( PSA_SUCCESS );
|
|
|
|
}
|
|
|
|
|
2018-06-19 11:57:35 +02:00
|
|
|
#if defined(MBEDTLS_CMAC_C)
|
2018-06-11 17:26:17 +02:00
|
|
|
static int psa_cmac_start( psa_mac_operation_t *operation,
|
|
|
|
size_t key_bits,
|
|
|
|
key_slot_t *slot,
|
|
|
|
const mbedtls_cipher_info_t *cipher_info )
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
operation->mac_size = cipher_info->block_size;
|
|
|
|
|
|
|
|
ret = mbedtls_cipher_setup( &operation->ctx.cmac, cipher_info );
|
|
|
|
if( ret != 0 )
|
|
|
|
return( ret );
|
|
|
|
|
|
|
|
ret = mbedtls_cipher_cmac_starts( &operation->ctx.cmac,
|
|
|
|
slot->data.raw.data,
|
|
|
|
key_bits );
|
|
|
|
return( ret );
|
|
|
|
}
|
2018-06-19 11:57:35 +02:00
|
|
|
#endif /* MBEDTLS_CMAC_C */
|
2018-06-11 17:26:17 +02:00
|
|
|
|
2018-06-20 16:09:38 +02:00
|
|
|
#if defined(MBEDTLS_MD_C)
|
2018-06-11 17:26:17 +02:00
|
|
|
static int psa_hmac_start( psa_mac_operation_t *operation,
|
|
|
|
psa_key_type_t key_type,
|
|
|
|
key_slot_t *slot,
|
|
|
|
psa_algorithm_t alg )
|
|
|
|
{
|
2018-06-18 22:16:43 +02:00
|
|
|
unsigned char ipad[PSA_HMAC_MAX_HASH_BLOCK_SIZE];
|
2018-06-17 13:03:40 +02:00
|
|
|
unsigned char *opad = operation->ctx.hmac.opad;
|
2018-06-11 17:26:17 +02:00
|
|
|
size_t i;
|
2018-06-11 17:36:05 +02:00
|
|
|
size_t block_size =
|
2018-06-18 16:04:39 +02:00
|
|
|
psa_get_hash_block_size( PSA_ALG_HMAC_HASH( alg ) );
|
2018-06-11 17:26:17 +02:00
|
|
|
unsigned int digest_size =
|
2018-06-18 16:04:39 +02:00
|
|
|
PSA_HASH_SIZE( PSA_ALG_HMAC_HASH( alg ) );
|
2018-06-11 17:26:17 +02:00
|
|
|
size_t key_length = slot->data.raw.bytes;
|
|
|
|
psa_status_t status;
|
|
|
|
|
2018-06-18 16:04:39 +02:00
|
|
|
if( block_size == 0 || digest_size == 0 )
|
2018-06-11 17:26:17 +02:00
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
|
|
|
|
if( key_type != PSA_KEY_TYPE_HMAC )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
|
|
|
|
operation->mac_size = digest_size;
|
|
|
|
|
2018-06-20 16:05:20 +02:00
|
|
|
/* The hash was started earlier in psa_mac_init. */
|
2018-06-11 18:12:58 +02:00
|
|
|
if( key_length > block_size )
|
2018-06-11 17:26:17 +02:00
|
|
|
{
|
|
|
|
status = psa_hash_update( &operation->ctx.hmac.hash_ctx,
|
2018-06-11 18:12:58 +02:00
|
|
|
slot->data.raw.data, slot->data.raw.bytes );
|
2018-06-11 17:26:17 +02:00
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( status );
|
|
|
|
status = psa_hash_finish( &operation->ctx.hmac.hash_ctx,
|
2018-06-11 18:12:58 +02:00
|
|
|
ipad, sizeof( ipad ), &key_length );
|
2018-06-11 17:26:17 +02:00
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( status );
|
|
|
|
}
|
2018-06-11 18:12:58 +02:00
|
|
|
else
|
|
|
|
memcpy( ipad, slot->data.raw.data, slot->data.raw.bytes );
|
2018-06-11 17:26:17 +02:00
|
|
|
|
2018-06-11 18:12:58 +02:00
|
|
|
/* ipad contains the key followed by garbage. Xor and fill with 0x36
|
|
|
|
* to create the ipad value. */
|
|
|
|
for( i = 0; i < key_length; i++ )
|
|
|
|
ipad[i] ^= 0x36;
|
|
|
|
memset( ipad + key_length, 0x36, block_size - key_length );
|
2018-06-11 17:26:17 +02:00
|
|
|
|
2018-06-11 18:12:58 +02:00
|
|
|
/* Copy the key material from ipad to opad, flipping the requisite bits,
|
|
|
|
* and filling the rest of opad with the requisite constant. */
|
2018-06-11 17:26:17 +02:00
|
|
|
for( i = 0; i < key_length; i++ )
|
2018-06-11 18:12:58 +02:00
|
|
|
opad[i] = ipad[i] ^ 0x36 ^ 0x5C;
|
|
|
|
memset( opad + key_length, 0x5C, block_size - key_length );
|
2018-06-11 17:26:17 +02:00
|
|
|
|
|
|
|
status = psa_hash_start( &operation->ctx.hmac.hash_ctx,
|
|
|
|
PSA_ALG_HMAC_HASH( alg ) );
|
|
|
|
if( status != PSA_SUCCESS )
|
2018-06-11 17:42:48 +02:00
|
|
|
goto cleanup;
|
2018-06-11 17:26:17 +02:00
|
|
|
|
|
|
|
status = psa_hash_update( &operation->ctx.hmac.hash_ctx, ipad,
|
|
|
|
block_size );
|
2018-06-11 17:42:48 +02:00
|
|
|
|
|
|
|
cleanup:
|
|
|
|
mbedtls_zeroize( ipad, key_length );
|
|
|
|
/* opad is in the context. It needs to stay in memory if this function
|
|
|
|
* succeeds, and it will be wiped by psa_mac_abort() called from
|
|
|
|
* psa_mac_start in the error case. */
|
|
|
|
|
2018-06-11 17:26:17 +02:00
|
|
|
return( status );
|
|
|
|
}
|
2018-06-20 16:09:38 +02:00
|
|
|
#endif /* MBEDTLS_MD_C */
|
2018-06-11 17:26:17 +02:00
|
|
|
|
2018-02-08 10:02:12 +01:00
|
|
|
psa_status_t psa_mac_start( psa_mac_operation_t *operation,
|
|
|
|
psa_key_slot_t key,
|
|
|
|
psa_algorithm_t alg )
|
|
|
|
{
|
|
|
|
psa_status_t status;
|
|
|
|
key_slot_t *slot;
|
|
|
|
psa_key_type_t key_type;
|
|
|
|
size_t key_bits;
|
2018-06-18 23:25:51 +02:00
|
|
|
const mbedtls_cipher_info_t *cipher_info = NULL;
|
2018-02-08 10:02:12 +01:00
|
|
|
|
2018-06-20 16:05:20 +02:00
|
|
|
status = psa_mac_init( operation, alg );
|
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( status );
|
2018-02-08 10:02:12 +01:00
|
|
|
|
|
|
|
status = psa_get_key_information( key, &key_type, &key_bits );
|
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( status );
|
2018-06-04 15:03:32 +02:00
|
|
|
|
2018-02-08 10:02:12 +01:00
|
|
|
slot = &global_data.key_slots[key];
|
2018-06-11 17:13:00 +02:00
|
|
|
if( slot->type == PSA_KEY_TYPE_NONE )
|
|
|
|
return( PSA_ERROR_EMPTY_SLOT );
|
2018-06-04 15:03:32 +02:00
|
|
|
|
2018-05-29 15:56:39 +02:00
|
|
|
if( ( slot->policy.usage & PSA_KEY_USAGE_SIGN ) != 0 )
|
2018-04-02 17:34:15 +02:00
|
|
|
operation->key_usage_sign = 1;
|
|
|
|
|
2018-05-29 15:56:39 +02:00
|
|
|
if( ( slot->policy.usage & PSA_KEY_USAGE_VERIFY ) != 0 )
|
2018-04-02 17:34:15 +02:00
|
|
|
operation->key_usage_verify = 1;
|
|
|
|
|
2018-02-08 10:02:12 +01:00
|
|
|
if( ! PSA_ALG_IS_HMAC( alg ) )
|
|
|
|
{
|
2018-06-03 14:04:51 +02:00
|
|
|
cipher_info = mbedtls_cipher_info_from_psa( alg, key_type, key_bits, NULL );
|
2018-02-08 10:02:12 +01:00
|
|
|
if( cipher_info == NULL )
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
operation->mac_size = cipher_info->block_size;
|
|
|
|
}
|
|
|
|
switch( alg )
|
|
|
|
{
|
|
|
|
#if defined(MBEDTLS_CMAC_C)
|
|
|
|
case PSA_ALG_CMAC:
|
2018-06-11 17:26:17 +02:00
|
|
|
status = mbedtls_to_psa_error( psa_cmac_start( operation,
|
|
|
|
key_bits,
|
|
|
|
slot,
|
|
|
|
cipher_info ) );
|
2018-02-08 10:02:12 +01:00
|
|
|
break;
|
|
|
|
#endif /* MBEDTLS_CMAC_C */
|
|
|
|
default:
|
|
|
|
#if defined(MBEDTLS_MD_C)
|
|
|
|
if( PSA_ALG_IS_HMAC( alg ) )
|
2018-06-11 18:12:58 +02:00
|
|
|
status = psa_hmac_start( operation, key_type, slot, alg );
|
2018-02-08 10:02:12 +01:00
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_MD_C */
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
}
|
2018-06-11 17:26:17 +02:00
|
|
|
|
2018-02-08 10:02:12 +01:00
|
|
|
/* If we reach this point, then the algorithm-specific part of the
|
2018-06-11 17:26:17 +02:00
|
|
|
* context may contain data that needs to be wiped on error. */
|
|
|
|
if( status != PSA_SUCCESS )
|
2018-02-08 10:02:12 +01:00
|
|
|
{
|
2018-06-11 17:42:48 +02:00
|
|
|
psa_mac_abort( operation );
|
2018-02-08 10:02:12 +01:00
|
|
|
}
|
2018-06-11 17:26:17 +02:00
|
|
|
else
|
|
|
|
{
|
|
|
|
operation->key_set = 1;
|
|
|
|
}
|
|
|
|
return( status );
|
2018-02-08 10:02:12 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
psa_status_t psa_mac_update( psa_mac_operation_t *operation,
|
|
|
|
const uint8_t *input,
|
|
|
|
size_t input_length )
|
|
|
|
{
|
2018-06-04 15:03:32 +02:00
|
|
|
int ret = 0 ;
|
|
|
|
psa_status_t status = PSA_SUCCESS;
|
2018-02-08 10:02:12 +01:00
|
|
|
if( ! operation->key_set )
|
|
|
|
return( PSA_ERROR_BAD_STATE );
|
|
|
|
if( operation->iv_required && ! operation->iv_set )
|
|
|
|
return( PSA_ERROR_BAD_STATE );
|
|
|
|
operation->has_input = 1;
|
|
|
|
|
|
|
|
switch( operation->alg )
|
|
|
|
{
|
|
|
|
#if defined(MBEDTLS_CMAC_C)
|
|
|
|
case PSA_ALG_CMAC:
|
|
|
|
ret = mbedtls_cipher_cmac_update( &operation->ctx.cmac,
|
|
|
|
input, input_length );
|
|
|
|
break;
|
|
|
|
#endif /* MBEDTLS_CMAC_C */
|
|
|
|
default:
|
|
|
|
#if defined(MBEDTLS_MD_C)
|
|
|
|
if( PSA_ALG_IS_HMAC( operation->alg ) )
|
|
|
|
{
|
2018-06-04 15:03:32 +02:00
|
|
|
status = psa_hash_update( &operation->ctx.hmac.hash_ctx, input,
|
2018-06-18 15:41:12 +02:00
|
|
|
input_length );
|
2018-02-08 10:02:12 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_MD_C */
|
|
|
|
{
|
|
|
|
ret = MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
2018-06-18 16:04:39 +02:00
|
|
|
if( ret != 0 || status != PSA_SUCCESS )
|
2018-06-04 15:03:32 +02:00
|
|
|
{
|
2018-06-17 13:41:30 +02:00
|
|
|
psa_mac_abort( operation );
|
2018-06-18 15:41:12 +02:00
|
|
|
if( ret != 0 )
|
2018-06-17 13:41:30 +02:00
|
|
|
status = mbedtls_to_psa_error( ret );
|
2018-06-04 15:03:32 +02:00
|
|
|
}
|
|
|
|
|
2018-06-18 16:04:39 +02:00
|
|
|
return( status );
|
2018-02-08 10:02:12 +01:00
|
|
|
}
|
|
|
|
|
2018-04-02 17:34:15 +02:00
|
|
|
static psa_status_t psa_mac_finish_internal( psa_mac_operation_t *operation,
|
2018-06-18 15:41:12 +02:00
|
|
|
uint8_t *mac,
|
|
|
|
size_t mac_size,
|
|
|
|
size_t *mac_length )
|
2018-02-08 10:02:12 +01:00
|
|
|
{
|
2018-06-04 15:03:32 +02:00
|
|
|
int ret = 0;
|
|
|
|
psa_status_t status = PSA_SUCCESS;
|
2018-02-08 10:02:12 +01:00
|
|
|
if( ! operation->key_set )
|
|
|
|
return( PSA_ERROR_BAD_STATE );
|
|
|
|
if( operation->iv_required && ! operation->iv_set )
|
|
|
|
return( PSA_ERROR_BAD_STATE );
|
|
|
|
|
|
|
|
/* Fill the output buffer with something that isn't a valid mac
|
|
|
|
* (barring an attack on the mac and deliberately-crafted input),
|
|
|
|
* in case the caller doesn't check the return status properly. */
|
|
|
|
*mac_length = operation->mac_size;
|
|
|
|
memset( mac, '!', mac_size );
|
|
|
|
|
|
|
|
if( mac_size < operation->mac_size )
|
|
|
|
return( PSA_ERROR_BUFFER_TOO_SMALL );
|
|
|
|
|
|
|
|
switch( operation->alg )
|
|
|
|
{
|
|
|
|
#if defined(MBEDTLS_CMAC_C)
|
|
|
|
case PSA_ALG_CMAC:
|
|
|
|
ret = mbedtls_cipher_cmac_finish( &operation->ctx.cmac, mac );
|
|
|
|
break;
|
|
|
|
#endif /* MBEDTLS_CMAC_C */
|
|
|
|
default:
|
|
|
|
#if defined(MBEDTLS_MD_C)
|
|
|
|
if( PSA_ALG_IS_HMAC( operation->alg ) )
|
|
|
|
{
|
2018-06-04 15:03:32 +02:00
|
|
|
unsigned char tmp[MBEDTLS_MD_MAX_SIZE];
|
2018-06-17 13:03:40 +02:00
|
|
|
unsigned char *opad = operation->ctx.hmac.opad;
|
2018-06-04 15:03:32 +02:00
|
|
|
size_t hash_size = 0;
|
2018-06-17 13:41:10 +02:00
|
|
|
size_t block_size =
|
2018-06-18 16:04:39 +02:00
|
|
|
psa_get_hash_block_size( PSA_ALG_HMAC_HASH( operation->alg ) );
|
2018-06-08 21:52:24 +02:00
|
|
|
|
2018-06-11 17:13:00 +02:00
|
|
|
if( block_size == 0 )
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
2018-06-04 15:03:32 +02:00
|
|
|
|
|
|
|
status = psa_hash_finish( &operation->ctx.hmac.hash_ctx, tmp,
|
2018-06-11 17:13:00 +02:00
|
|
|
sizeof( tmp ), &hash_size );
|
2018-06-04 15:03:32 +02:00
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
goto cleanup;
|
2018-06-11 17:42:48 +02:00
|
|
|
/* From here on, tmp needs to be wiped. */
|
2018-06-04 15:03:32 +02:00
|
|
|
|
|
|
|
status = psa_hash_start( &operation->ctx.hmac.hash_ctx,
|
|
|
|
PSA_ALG_HMAC_HASH( operation->alg ) );
|
|
|
|
if( status != PSA_SUCCESS )
|
2018-06-11 17:42:48 +02:00
|
|
|
goto hmac_cleanup;
|
2018-06-04 15:03:32 +02:00
|
|
|
|
|
|
|
status = psa_hash_update( &operation->ctx.hmac.hash_ctx, opad,
|
2018-06-07 12:27:47 +02:00
|
|
|
block_size );
|
2018-06-04 15:03:32 +02:00
|
|
|
if( status != PSA_SUCCESS )
|
2018-06-11 17:42:48 +02:00
|
|
|
goto hmac_cleanup;
|
2018-06-04 15:03:32 +02:00
|
|
|
|
|
|
|
status = psa_hash_update( &operation->ctx.hmac.hash_ctx, tmp,
|
2018-06-18 15:41:12 +02:00
|
|
|
hash_size );
|
2018-06-04 15:03:32 +02:00
|
|
|
if( status != PSA_SUCCESS )
|
2018-06-11 17:42:48 +02:00
|
|
|
goto hmac_cleanup;
|
2018-06-04 15:03:32 +02:00
|
|
|
|
|
|
|
status = psa_hash_finish( &operation->ctx.hmac.hash_ctx, mac,
|
|
|
|
mac_size, mac_length );
|
2018-06-11 17:42:48 +02:00
|
|
|
hmac_cleanup:
|
|
|
|
mbedtls_zeroize( tmp, hash_size );
|
2018-02-08 10:02:12 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_MD_C */
|
|
|
|
{
|
|
|
|
ret = MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
2018-06-04 15:03:32 +02:00
|
|
|
cleanup:
|
2018-02-08 10:02:12 +01:00
|
|
|
|
2018-06-18 16:04:39 +02:00
|
|
|
if( ret == 0 && status == PSA_SUCCESS )
|
2018-02-08 10:02:12 +01:00
|
|
|
{
|
|
|
|
return( psa_mac_abort( operation ) );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
psa_mac_abort( operation );
|
2018-06-11 17:13:00 +02:00
|
|
|
if( ret != 0 )
|
2018-06-18 15:41:12 +02:00
|
|
|
status = mbedtls_to_psa_error( ret );
|
2018-06-04 15:03:32 +02:00
|
|
|
|
2018-06-18 16:04:39 +02:00
|
|
|
return( status );
|
2018-02-08 10:02:12 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-04-02 17:34:15 +02:00
|
|
|
psa_status_t psa_mac_finish( psa_mac_operation_t *operation,
|
|
|
|
uint8_t *mac,
|
|
|
|
size_t mac_size,
|
|
|
|
size_t *mac_length )
|
|
|
|
{
|
2018-06-18 16:04:39 +02:00
|
|
|
if( ! operation->key_usage_sign )
|
2018-04-02 17:34:15 +02:00
|
|
|
return( PSA_ERROR_NOT_PERMITTED );
|
|
|
|
|
2018-06-11 17:13:00 +02:00
|
|
|
return( psa_mac_finish_internal( operation, mac,
|
|
|
|
mac_size, mac_length ) );
|
2018-04-02 17:34:15 +02:00
|
|
|
}
|
|
|
|
|
2018-06-18 23:25:51 +02:00
|
|
|
#define PSA_MAC_MAX_SIZE \
|
2018-06-18 15:41:12 +02:00
|
|
|
( MBEDTLS_MD_MAX_SIZE > MBEDTLS_MAX_BLOCK_LENGTH ? \
|
|
|
|
MBEDTLS_MD_MAX_SIZE : \
|
2018-02-08 10:02:12 +01:00
|
|
|
MBEDTLS_MAX_BLOCK_LENGTH )
|
|
|
|
psa_status_t psa_mac_verify( psa_mac_operation_t *operation,
|
|
|
|
const uint8_t *mac,
|
|
|
|
size_t mac_length )
|
|
|
|
{
|
2018-06-18 23:25:51 +02:00
|
|
|
uint8_t actual_mac[PSA_MAC_MAX_SIZE];
|
2018-02-08 10:02:12 +01:00
|
|
|
size_t actual_mac_length;
|
2018-04-02 17:34:15 +02:00
|
|
|
psa_status_t status;
|
|
|
|
|
2018-06-18 16:04:39 +02:00
|
|
|
if( ! operation->key_usage_verify )
|
2018-04-02 17:34:15 +02:00
|
|
|
return( PSA_ERROR_NOT_PERMITTED );
|
|
|
|
|
|
|
|
status = psa_mac_finish_internal( operation,
|
|
|
|
actual_mac, sizeof( actual_mac ),
|
|
|
|
&actual_mac_length );
|
2018-02-08 10:02:12 +01:00
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( status );
|
|
|
|
if( actual_mac_length != mac_length )
|
|
|
|
return( PSA_ERROR_INVALID_SIGNATURE );
|
|
|
|
if( safer_memcmp( mac, actual_mac, actual_mac_length ) != 0 )
|
|
|
|
return( PSA_ERROR_INVALID_SIGNATURE );
|
|
|
|
return( PSA_SUCCESS );
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-02-03 22:44:14 +01:00
|
|
|
|
|
|
|
/****************************************************************/
|
|
|
|
/* Asymmetric cryptography */
|
|
|
|
/****************************************************************/
|
|
|
|
|
2018-06-08 16:34:46 +02:00
|
|
|
/* Decode the hash algorithm from alg and store the mbedtls encoding in
|
|
|
|
* md_alg. Verify that the hash length is consistent. */
|
|
|
|
static psa_status_t psa_rsa_decode_md_type( psa_algorithm_t alg,
|
|
|
|
size_t hash_length,
|
|
|
|
mbedtls_md_type_t *md_alg )
|
2018-02-03 22:44:14 +01:00
|
|
|
{
|
2018-06-08 16:09:36 +02:00
|
|
|
psa_algorithm_t hash_alg = PSA_ALG_RSA_GET_HASH( alg );
|
|
|
|
const mbedtls_md_info_t *md_info = mbedtls_md_info_from_psa( hash_alg );
|
|
|
|
*md_alg = hash_alg == 0 ? MBEDTLS_MD_NONE : mbedtls_md_get_type( md_info );
|
|
|
|
if( *md_alg == MBEDTLS_MD_NONE )
|
2018-06-04 15:40:31 +02:00
|
|
|
{
|
|
|
|
#if SIZE_MAX > UINT_MAX
|
2018-06-08 16:09:36 +02:00
|
|
|
if( hash_length > UINT_MAX )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
2018-06-04 15:40:31 +02:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2018-06-08 16:09:36 +02:00
|
|
|
if( mbedtls_md_get_size( md_info ) != hash_length )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
if( md_info == NULL )
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
2018-06-04 15:40:31 +02:00
|
|
|
}
|
2018-06-08 16:09:36 +02:00
|
|
|
return( PSA_SUCCESS );
|
2018-06-04 15:40:31 +02:00
|
|
|
}
|
2018-02-03 22:44:14 +01:00
|
|
|
|
2018-06-08 16:09:36 +02:00
|
|
|
psa_status_t psa_asymmetric_sign( psa_key_slot_t key,
|
|
|
|
psa_algorithm_t alg,
|
|
|
|
const uint8_t *hash,
|
|
|
|
size_t hash_length,
|
|
|
|
const uint8_t *salt,
|
|
|
|
size_t salt_length,
|
|
|
|
uint8_t *signature,
|
|
|
|
size_t signature_size,
|
|
|
|
size_t *signature_length )
|
2018-02-03 22:44:14 +01:00
|
|
|
{
|
|
|
|
key_slot_t *slot;
|
2018-06-04 15:40:31 +02:00
|
|
|
psa_status_t status;
|
2018-02-03 23:58:03 +01:00
|
|
|
*signature_length = 0;
|
|
|
|
(void) salt;
|
|
|
|
(void) salt_length;
|
|
|
|
|
2018-06-18 23:25:51 +02:00
|
|
|
if( key == 0 || key > PSA_KEY_SLOT_COUNT )
|
2018-02-03 22:44:14 +01:00
|
|
|
return( PSA_ERROR_EMPTY_SLOT );
|
|
|
|
slot = &global_data.key_slots[key];
|
|
|
|
if( slot->type == PSA_KEY_TYPE_NONE )
|
|
|
|
return( PSA_ERROR_EMPTY_SLOT );
|
|
|
|
if( ! PSA_KEY_TYPE_IS_KEYPAIR( slot->type ) )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
2018-06-08 16:09:36 +02:00
|
|
|
if( ! ( slot->policy.usage & PSA_KEY_USAGE_SIGN ) )
|
2018-03-28 12:17:44 +02:00
|
|
|
return( PSA_ERROR_NOT_PERMITTED );
|
2018-02-03 22:44:14 +01:00
|
|
|
|
|
|
|
#if defined(MBEDTLS_RSA_C)
|
|
|
|
if( slot->type == PSA_KEY_TYPE_RSA_KEYPAIR )
|
|
|
|
{
|
|
|
|
mbedtls_rsa_context *rsa = slot->data.rsa;
|
|
|
|
int ret;
|
2018-06-04 15:40:31 +02:00
|
|
|
mbedtls_md_type_t md_alg;
|
2018-06-08 16:34:46 +02:00
|
|
|
status = psa_rsa_decode_md_type( alg, hash_length, &md_alg );
|
2018-06-08 16:09:36 +02:00
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( status );
|
2018-06-04 15:40:31 +02:00
|
|
|
|
2018-02-03 22:44:14 +01:00
|
|
|
if( signature_size < rsa->len )
|
|
|
|
return( PSA_ERROR_BUFFER_TOO_SMALL );
|
|
|
|
#if defined(MBEDTLS_PKCS1_V15)
|
2018-03-28 14:16:50 +02:00
|
|
|
if( PSA_ALG_IS_RSA_PKCS1V15_SIGN( alg ) )
|
2018-02-03 22:44:14 +01:00
|
|
|
{
|
|
|
|
mbedtls_rsa_set_padding( rsa, MBEDTLS_RSA_PKCS_V15,
|
|
|
|
MBEDTLS_MD_NONE );
|
|
|
|
ret = mbedtls_rsa_pkcs1_sign( rsa,
|
|
|
|
mbedtls_ctr_drbg_random,
|
|
|
|
&global_data.ctr_drbg,
|
|
|
|
MBEDTLS_RSA_PRIVATE,
|
|
|
|
md_alg, hash_length, hash,
|
|
|
|
signature );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_PKCS1_V15 */
|
|
|
|
#if defined(MBEDTLS_PKCS1_V21)
|
|
|
|
if( alg == PSA_ALG_RSA_PSS_MGF1 )
|
|
|
|
{
|
|
|
|
mbedtls_rsa_set_padding( rsa, MBEDTLS_RSA_PKCS_V21, md_alg );
|
|
|
|
ret = mbedtls_rsa_rsassa_pss_sign( rsa,
|
|
|
|
mbedtls_ctr_drbg_random,
|
|
|
|
&global_data.ctr_drbg,
|
|
|
|
MBEDTLS_RSA_PRIVATE,
|
|
|
|
md_alg, hash_length, hash,
|
|
|
|
signature );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_PKCS1_V21 */
|
|
|
|
{
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
}
|
2018-02-03 23:58:03 +01:00
|
|
|
if( ret == 0 )
|
|
|
|
*signature_length = rsa->len;
|
2018-02-03 22:44:14 +01:00
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* defined(MBEDTLS_RSA_C) */
|
|
|
|
#if defined(MBEDTLS_ECP_C)
|
|
|
|
if( PSA_KEY_TYPE_IS_ECC( slot->type ) )
|
|
|
|
{
|
2018-05-08 10:18:38 +02:00
|
|
|
mbedtls_ecp_keypair *ecdsa = slot->data.ecp;
|
|
|
|
int ret;
|
|
|
|
const mbedtls_md_info_t *md_info;
|
|
|
|
mbedtls_md_type_t md_alg;
|
|
|
|
if( signature_size < PSA_ECDSA_SIGNATURE_SIZE( ecdsa->grp.pbits ) )
|
|
|
|
return( PSA_ERROR_BUFFER_TOO_SMALL );
|
|
|
|
md_info = mbedtls_md_info_from_psa( alg );
|
|
|
|
md_alg = mbedtls_md_get_type( md_info );
|
|
|
|
ret = mbedtls_ecdsa_write_signature( ecdsa, md_alg, hash, hash_length,
|
2018-06-08 16:09:36 +02:00
|
|
|
signature, signature_length,
|
|
|
|
mbedtls_ctr_drbg_random,
|
|
|
|
&global_data.ctr_drbg );
|
2018-05-08 10:18:38 +02:00
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* defined(MBEDTLS_ECP_C) */
|
|
|
|
{
|
2018-02-03 22:44:14 +01:00
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
}
|
2018-05-08 10:18:38 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
psa_status_t psa_asymmetric_verify( psa_key_slot_t key,
|
|
|
|
psa_algorithm_t alg,
|
|
|
|
const uint8_t *hash,
|
|
|
|
size_t hash_length,
|
|
|
|
const uint8_t *salt,
|
|
|
|
size_t salt_length,
|
|
|
|
uint8_t *signature,
|
|
|
|
size_t signature_size )
|
|
|
|
{
|
|
|
|
key_slot_t *slot;
|
2018-06-04 15:40:31 +02:00
|
|
|
psa_status_t status;
|
2018-05-08 10:18:38 +02:00
|
|
|
(void) salt;
|
|
|
|
(void) salt_length;
|
|
|
|
|
2018-06-18 23:25:51 +02:00
|
|
|
if( key == 0 || key > PSA_KEY_SLOT_COUNT )
|
2018-05-08 10:18:38 +02:00
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
slot = &global_data.key_slots[key];
|
|
|
|
if( slot->type == PSA_KEY_TYPE_NONE )
|
|
|
|
return( PSA_ERROR_EMPTY_SLOT );
|
2018-06-08 16:09:36 +02:00
|
|
|
if( ! ( slot->policy.usage & PSA_KEY_USAGE_VERIFY ) )
|
2018-05-08 10:18:38 +02:00
|
|
|
return( PSA_ERROR_NOT_PERMITTED );
|
|
|
|
|
2018-06-08 16:09:36 +02:00
|
|
|
#if defined(MBEDTLS_RSA_C)
|
2018-06-18 16:04:39 +02:00
|
|
|
if( slot->type == PSA_KEY_TYPE_RSA_KEYPAIR ||
|
|
|
|
slot->type == PSA_KEY_TYPE_RSA_PUBLIC_KEY )
|
2018-05-02 22:16:26 +02:00
|
|
|
{
|
|
|
|
mbedtls_rsa_context *rsa = slot->data.rsa;
|
|
|
|
int ret;
|
2018-06-04 15:40:31 +02:00
|
|
|
mbedtls_md_type_t md_alg;
|
2018-06-08 16:34:46 +02:00
|
|
|
status = psa_rsa_decode_md_type( alg, hash_length, &md_alg );
|
2018-06-08 16:09:36 +02:00
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( status );
|
2018-06-04 15:40:31 +02:00
|
|
|
|
2018-05-02 22:16:26 +02:00
|
|
|
if( signature_size < rsa->len )
|
|
|
|
return( PSA_ERROR_BUFFER_TOO_SMALL );
|
|
|
|
#if defined(MBEDTLS_PKCS1_V15)
|
2018-05-31 13:16:08 +02:00
|
|
|
if( PSA_ALG_IS_RSA_PKCS1V15_SIGN( alg ) )
|
2018-05-02 22:16:26 +02:00
|
|
|
{
|
|
|
|
mbedtls_rsa_set_padding( rsa, MBEDTLS_RSA_PKCS_V15,
|
|
|
|
MBEDTLS_MD_NONE );
|
|
|
|
|
|
|
|
ret = mbedtls_rsa_pkcs1_verify( rsa,
|
2018-06-08 16:09:36 +02:00
|
|
|
mbedtls_ctr_drbg_random,
|
|
|
|
&global_data.ctr_drbg,
|
|
|
|
MBEDTLS_RSA_PUBLIC,
|
|
|
|
md_alg,
|
|
|
|
hash_length,
|
|
|
|
hash,
|
|
|
|
signature );
|
2018-05-02 22:16:26 +02:00
|
|
|
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_PKCS1_V15 */
|
|
|
|
#if defined(MBEDTLS_PKCS1_V21)
|
|
|
|
if( alg == PSA_ALG_RSA_PSS_MGF1 )
|
|
|
|
{
|
2018-06-08 17:44:35 +02:00
|
|
|
mbedtls_rsa_set_padding( rsa, MBEDTLS_RSA_PKCS_V21, md_alg );
|
|
|
|
ret = mbedtls_rsa_rsassa_pss_verify( rsa,
|
|
|
|
mbedtls_ctr_drbg_random,
|
|
|
|
&global_data.ctr_drbg,
|
|
|
|
MBEDTLS_RSA_PUBLIC,
|
|
|
|
md_alg, hash_length, hash,
|
|
|
|
signature );
|
2018-05-02 22:16:26 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_PKCS1_V21 */
|
|
|
|
{
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
}
|
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* defined(MBEDTLS_RSA_C) */
|
2018-05-08 10:18:38 +02:00
|
|
|
#if defined(MBEDTLS_ECP_C)
|
|
|
|
if( PSA_KEY_TYPE_IS_ECC( slot->type ) )
|
|
|
|
{
|
|
|
|
mbedtls_ecp_keypair *ecdsa = slot->data.ecp;
|
|
|
|
int ret;
|
2018-06-18 15:41:12 +02:00
|
|
|
(void) alg;
|
2018-06-08 16:09:36 +02:00
|
|
|
ret = mbedtls_ecdsa_read_signature( ecdsa, hash, hash_length,
|
|
|
|
signature, signature_size );
|
2018-05-08 10:18:38 +02:00
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
2018-02-03 22:44:14 +01:00
|
|
|
else
|
|
|
|
#endif /* defined(MBEDTLS_ECP_C) */
|
|
|
|
{
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-08 16:09:36 +02:00
|
|
|
psa_status_t psa_asymmetric_encrypt( psa_key_slot_t key,
|
|
|
|
psa_algorithm_t alg,
|
|
|
|
const uint8_t *input,
|
|
|
|
size_t input_length,
|
|
|
|
const uint8_t *salt,
|
|
|
|
size_t salt_length,
|
|
|
|
uint8_t *output,
|
|
|
|
size_t output_size,
|
|
|
|
size_t *output_length )
|
2018-05-02 22:16:26 +02:00
|
|
|
{
|
|
|
|
key_slot_t *slot;
|
|
|
|
(void) salt;
|
|
|
|
(void) salt_length;
|
2018-06-04 15:43:12 +02:00
|
|
|
*output_length = 0;
|
2018-05-02 22:16:26 +02:00
|
|
|
|
2018-06-18 23:25:51 +02:00
|
|
|
if( key == 0 || key > PSA_KEY_SLOT_COUNT )
|
2018-05-06 21:26:54 +02:00
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
2018-05-02 22:16:26 +02:00
|
|
|
slot = &global_data.key_slots[key];
|
|
|
|
if( slot->type == PSA_KEY_TYPE_NONE )
|
|
|
|
return( PSA_ERROR_EMPTY_SLOT );
|
|
|
|
if( ! PSA_KEY_TYPE_IS_KEYPAIR( slot->type ) )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
2018-06-08 16:09:36 +02:00
|
|
|
if( ! ( slot->policy.usage & PSA_KEY_USAGE_ENCRYPT ) )
|
|
|
|
return( PSA_ERROR_NOT_PERMITTED );
|
2018-05-02 22:16:26 +02:00
|
|
|
|
|
|
|
#if defined(MBEDTLS_RSA_C)
|
2018-06-18 16:04:39 +02:00
|
|
|
if( slot->type == PSA_KEY_TYPE_RSA_KEYPAIR ||
|
|
|
|
slot->type == PSA_KEY_TYPE_RSA_PUBLIC_KEY )
|
2018-05-02 22:16:26 +02:00
|
|
|
{
|
|
|
|
mbedtls_rsa_context *rsa = slot->data.rsa;
|
|
|
|
int ret;
|
2018-05-31 13:25:48 +02:00
|
|
|
if( output_size < rsa->len )
|
2018-06-08 16:09:36 +02:00
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
2018-05-02 22:16:26 +02:00
|
|
|
#if defined(MBEDTLS_PKCS1_V15)
|
2018-05-31 13:16:08 +02:00
|
|
|
if( alg == PSA_ALG_RSA_PKCS1V15_CRYPT )
|
2018-05-02 22:16:26 +02:00
|
|
|
{
|
2018-06-08 16:09:36 +02:00
|
|
|
ret = mbedtls_rsa_pkcs1_encrypt( rsa,
|
|
|
|
mbedtls_ctr_drbg_random,
|
|
|
|
&global_data.ctr_drbg,
|
|
|
|
MBEDTLS_RSA_PUBLIC,
|
|
|
|
input_length,
|
|
|
|
input,
|
|
|
|
output );
|
2018-05-02 22:16:26 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_PKCS1_V15 */
|
|
|
|
#if defined(MBEDTLS_PKCS1_V21)
|
2018-06-08 17:43:16 +02:00
|
|
|
if( PSA_ALG_IS_RSA_OAEP_MGF1( alg ) )
|
2018-05-02 22:16:26 +02:00
|
|
|
{
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_PKCS1_V21 */
|
|
|
|
{
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
}
|
|
|
|
if( ret == 0 )
|
2018-06-04 15:36:15 +02:00
|
|
|
*output_length = rsa->len;
|
2018-05-02 22:16:26 +02:00
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
|
|
|
else
|
2018-06-08 17:44:47 +02:00
|
|
|
#endif /* defined(MBEDTLS_RSA_C) */
|
2018-05-02 22:16:26 +02:00
|
|
|
{
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
}
|
2018-05-31 13:25:48 +02:00
|
|
|
}
|
|
|
|
|
2018-06-08 16:09:36 +02:00
|
|
|
psa_status_t psa_asymmetric_decrypt( psa_key_slot_t key,
|
|
|
|
psa_algorithm_t alg,
|
|
|
|
const uint8_t *input,
|
|
|
|
size_t input_length,
|
|
|
|
const uint8_t *salt,
|
|
|
|
size_t salt_length,
|
|
|
|
uint8_t *output,
|
|
|
|
size_t output_size,
|
|
|
|
size_t *output_length )
|
2018-05-02 22:16:26 +02:00
|
|
|
{
|
|
|
|
key_slot_t *slot;
|
|
|
|
(void) salt;
|
|
|
|
(void) salt_length;
|
2018-06-04 15:43:12 +02:00
|
|
|
*output_length = 0;
|
2018-05-02 22:16:26 +02:00
|
|
|
|
2018-06-18 23:25:51 +02:00
|
|
|
if( key == 0 || key > PSA_KEY_SLOT_COUNT )
|
2018-05-02 22:16:26 +02:00
|
|
|
return( PSA_ERROR_EMPTY_SLOT );
|
|
|
|
slot = &global_data.key_slots[key];
|
|
|
|
if( slot->type == PSA_KEY_TYPE_NONE )
|
|
|
|
return( PSA_ERROR_EMPTY_SLOT );
|
|
|
|
if( ! PSA_KEY_TYPE_IS_KEYPAIR( slot->type ) )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
2018-06-08 16:09:36 +02:00
|
|
|
if( ! ( slot->policy.usage & PSA_KEY_USAGE_DECRYPT ) )
|
|
|
|
return( PSA_ERROR_NOT_PERMITTED );
|
2018-05-02 22:16:26 +02:00
|
|
|
|
|
|
|
#if defined(MBEDTLS_RSA_C)
|
|
|
|
if( slot->type == PSA_KEY_TYPE_RSA_KEYPAIR )
|
|
|
|
{
|
|
|
|
mbedtls_rsa_context *rsa = slot->data.rsa;
|
|
|
|
int ret;
|
|
|
|
|
2018-06-08 17:53:48 +02:00
|
|
|
if( input_length != rsa->len )
|
2018-05-02 22:16:26 +02:00
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_PKCS1_V15)
|
2018-05-31 13:16:08 +02:00
|
|
|
if( alg == PSA_ALG_RSA_PKCS1V15_CRYPT )
|
2018-05-02 22:16:26 +02:00
|
|
|
{
|
2018-06-08 16:09:36 +02:00
|
|
|
ret = mbedtls_rsa_pkcs1_decrypt( rsa,
|
|
|
|
mbedtls_ctr_drbg_random,
|
|
|
|
&global_data.ctr_drbg,
|
|
|
|
MBEDTLS_RSA_PRIVATE,
|
|
|
|
output_length,
|
|
|
|
input,
|
|
|
|
output,
|
|
|
|
output_size );
|
2018-05-02 22:16:26 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_PKCS1_V15 */
|
|
|
|
#if defined(MBEDTLS_PKCS1_V21)
|
2018-06-08 17:43:16 +02:00
|
|
|
if( PSA_ALG_IS_RSA_OAEP_MGF1( alg ) )
|
2018-05-02 22:16:26 +02:00
|
|
|
{
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_PKCS1_V21 */
|
|
|
|
{
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
}
|
2018-06-04 15:36:15 +02:00
|
|
|
|
2018-05-02 22:16:26 +02:00
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
|
|
|
else
|
2018-06-08 17:44:47 +02:00
|
|
|
#endif /* defined(MBEDTLS_RSA_C) */
|
2018-05-02 22:16:26 +02:00
|
|
|
{
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
}
|
2018-05-31 13:25:48 +02:00
|
|
|
}
|
2018-02-03 22:44:14 +01:00
|
|
|
|
2018-06-18 21:49:39 +02:00
|
|
|
|
|
|
|
|
2018-03-12 14:59:30 +01:00
|
|
|
/****************************************************************/
|
|
|
|
/* Symmetric cryptography */
|
|
|
|
/****************************************************************/
|
|
|
|
|
2018-06-20 16:05:20 +02:00
|
|
|
/* Initialize the cipher operation structure. Once this function has been
|
|
|
|
* called, psa_cipher_abort can run and will do the right thing. */
|
|
|
|
static psa_status_t psa_cipher_init( psa_cipher_operation_t *operation,
|
|
|
|
psa_algorithm_t alg )
|
|
|
|
{
|
2018-06-20 16:21:04 +02:00
|
|
|
if( ! PSA_ALG_IS_CIPHER( alg ) )
|
|
|
|
{
|
|
|
|
memset( operation, 0, sizeof( *operation ) );
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
}
|
|
|
|
|
2018-06-20 16:05:20 +02:00
|
|
|
operation->alg = alg;
|
|
|
|
operation->key_set = 0;
|
|
|
|
operation->iv_set = 0;
|
|
|
|
operation->iv_required = 1;
|
|
|
|
operation->iv_size = 0;
|
|
|
|
operation->block_size = 0;
|
|
|
|
mbedtls_cipher_init( &operation->ctx.cipher );
|
|
|
|
return( PSA_SUCCESS );
|
|
|
|
}
|
|
|
|
|
2018-06-04 16:22:46 +02:00
|
|
|
static psa_status_t psa_cipher_setup( psa_cipher_operation_t *operation,
|
|
|
|
psa_key_slot_t key,
|
2018-06-04 16:23:10 +02:00
|
|
|
psa_algorithm_t alg,
|
|
|
|
mbedtls_operation_t cipher_operation )
|
2018-03-12 14:59:30 +01:00
|
|
|
{
|
|
|
|
int ret = MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE;
|
|
|
|
psa_status_t status;
|
|
|
|
key_slot_t *slot;
|
|
|
|
psa_key_type_t key_type;
|
|
|
|
size_t key_bits;
|
|
|
|
const mbedtls_cipher_info_t *cipher_info = NULL;
|
|
|
|
|
2018-06-20 16:05:20 +02:00
|
|
|
status = psa_cipher_init( operation, alg );
|
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( status );
|
2018-03-12 14:59:30 +01:00
|
|
|
|
|
|
|
status = psa_get_key_information( key, &key_type, &key_bits );
|
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( status );
|
|
|
|
slot = &global_data.key_slots[key];
|
|
|
|
|
2018-06-08 18:46:05 +02:00
|
|
|
cipher_info = mbedtls_cipher_info_from_psa( alg, key_type, key_bits, NULL );
|
2018-03-12 14:59:30 +01:00
|
|
|
if( cipher_info == NULL )
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
|
|
|
|
ret = mbedtls_cipher_setup( &operation->ctx.cipher, cipher_info );
|
2018-04-04 14:43:05 +02:00
|
|
|
if( ret != 0 )
|
2018-03-12 14:59:30 +01:00
|
|
|
{
|
|
|
|
psa_cipher_abort( operation );
|
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
|
|
|
|
2018-06-21 09:40:04 +02:00
|
|
|
#if defined(MBEDTLS_DES_C)
|
|
|
|
if( key_type == PSA_KEY_TYPE_DES && key_bits == 128 )
|
|
|
|
{
|
|
|
|
/* Two-key Triple-DES is 3-key Triple-DES with K1=K3 */
|
|
|
|
unsigned char keys[24];
|
|
|
|
memcpy( keys, slot->data.raw.data, 16 );
|
|
|
|
memcpy( keys + 16, slot->data.raw.data, 8 );
|
|
|
|
ret = mbedtls_cipher_setkey( &operation->ctx.cipher,
|
|
|
|
keys,
|
|
|
|
192, cipher_operation );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
ret = mbedtls_cipher_setkey( &operation->ctx.cipher,
|
|
|
|
slot->data.raw.data,
|
|
|
|
key_bits, cipher_operation );
|
|
|
|
}
|
2018-04-04 14:43:05 +02:00
|
|
|
if( ret != 0 )
|
2018-03-12 14:59:30 +01:00
|
|
|
{
|
|
|
|
psa_cipher_abort( operation );
|
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
|
|
|
|
2018-03-18 12:57:31 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
|
2018-06-05 10:40:02 +02:00
|
|
|
if( ( alg & ~PSA_ALG_BLOCK_CIPHER_PADDING_MASK ) == PSA_ALG_CBC_BASE )
|
2018-03-18 12:57:31 +01:00
|
|
|
{
|
2018-06-06 15:11:46 +02:00
|
|
|
psa_algorithm_t padding_mode = alg & PSA_ALG_BLOCK_CIPHER_PADDING_MASK;
|
|
|
|
mbedtls_cipher_padding_t mode;
|
2018-03-18 12:57:31 +01:00
|
|
|
|
2018-05-29 15:25:04 +02:00
|
|
|
switch ( padding_mode )
|
2018-03-18 12:57:31 +01:00
|
|
|
{
|
|
|
|
case PSA_ALG_BLOCK_CIPHER_PAD_PKCS7:
|
|
|
|
mode = MBEDTLS_PADDING_PKCS7;
|
|
|
|
break;
|
|
|
|
case PSA_ALG_BLOCK_CIPHER_PAD_NONE:
|
|
|
|
mode = MBEDTLS_PADDING_NONE;
|
|
|
|
break;
|
|
|
|
default:
|
2018-05-31 13:06:17 +02:00
|
|
|
psa_cipher_abort( operation );
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
2018-03-18 12:57:31 +01:00
|
|
|
}
|
|
|
|
ret = mbedtls_cipher_set_padding_mode( &operation->ctx.cipher, mode );
|
2018-05-29 15:25:04 +02:00
|
|
|
if( ret != 0 )
|
2018-04-22 19:23:16 +02:00
|
|
|
{
|
|
|
|
psa_cipher_abort( operation );
|
2018-03-18 12:57:31 +01:00
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
2018-04-22 19:23:16 +02:00
|
|
|
}
|
2018-03-18 12:57:31 +01:00
|
|
|
}
|
|
|
|
#endif //MBEDTLS_CIPHER_MODE_WITH_PADDING
|
|
|
|
|
2018-03-12 14:59:30 +01:00
|
|
|
operation->key_set = 1;
|
2018-06-04 16:23:10 +02:00
|
|
|
operation->block_size = ( PSA_ALG_IS_BLOCK_CIPHER( alg ) ?
|
|
|
|
PSA_BLOCK_CIPHER_BLOCK_SIZE( key_type ) :
|
|
|
|
1 );
|
2018-06-18 16:04:39 +02:00
|
|
|
if( PSA_ALG_IS_BLOCK_CIPHER( alg ) || alg == PSA_ALG_CTR )
|
2018-03-18 12:57:31 +01:00
|
|
|
{
|
2018-04-12 07:48:45 +02:00
|
|
|
operation->iv_size = PSA_BLOCK_CIPHER_BLOCK_SIZE( key_type );
|
2018-03-18 12:57:31 +01:00
|
|
|
}
|
2018-03-12 14:59:30 +01:00
|
|
|
|
2018-05-31 13:07:14 +02:00
|
|
|
return( PSA_SUCCESS );
|
2018-03-12 14:59:30 +01:00
|
|
|
}
|
|
|
|
|
2018-06-04 16:22:46 +02:00
|
|
|
psa_status_t psa_encrypt_setup( psa_cipher_operation_t *operation,
|
|
|
|
psa_key_slot_t key,
|
|
|
|
psa_algorithm_t alg )
|
2018-03-18 12:57:31 +01:00
|
|
|
{
|
2018-06-18 16:04:39 +02:00
|
|
|
return( psa_cipher_setup( operation, key, alg, MBEDTLS_ENCRYPT ) );
|
2018-03-18 12:57:31 +01:00
|
|
|
}
|
|
|
|
|
2018-06-04 16:22:46 +02:00
|
|
|
psa_status_t psa_decrypt_setup( psa_cipher_operation_t *operation,
|
|
|
|
psa_key_slot_t key,
|
|
|
|
psa_algorithm_t alg )
|
2018-03-18 12:57:31 +01:00
|
|
|
{
|
2018-06-18 16:04:39 +02:00
|
|
|
return( psa_cipher_setup( operation, key, alg, MBEDTLS_DECRYPT ) );
|
2018-03-18 12:57:31 +01:00
|
|
|
}
|
|
|
|
|
2018-06-04 16:22:46 +02:00
|
|
|
psa_status_t psa_encrypt_generate_iv( psa_cipher_operation_t *operation,
|
|
|
|
unsigned char *iv,
|
|
|
|
size_t iv_size,
|
|
|
|
size_t *iv_length )
|
2018-03-12 14:59:30 +01:00
|
|
|
{
|
2018-04-04 14:43:05 +02:00
|
|
|
int ret = PSA_SUCCESS;
|
2018-06-18 16:04:39 +02:00
|
|
|
if( operation->iv_set || ! operation->iv_required )
|
2018-04-04 14:43:05 +02:00
|
|
|
return( PSA_ERROR_BAD_STATE );
|
|
|
|
if( iv_size < operation->iv_size )
|
|
|
|
{
|
|
|
|
ret = PSA_ERROR_BUFFER_TOO_SMALL;
|
|
|
|
goto exit;
|
|
|
|
}
|
2018-06-04 16:23:10 +02:00
|
|
|
ret = mbedtls_ctr_drbg_random( &global_data.ctr_drbg,
|
|
|
|
iv, operation->iv_size );
|
2018-04-04 14:43:05 +02:00
|
|
|
if( ret != 0 )
|
2018-03-12 14:59:30 +01:00
|
|
|
{
|
2018-04-04 14:43:05 +02:00
|
|
|
ret = mbedtls_to_psa_error( ret );
|
2018-06-04 16:22:46 +02:00
|
|
|
goto exit;
|
2018-03-12 14:59:30 +01:00
|
|
|
}
|
2018-06-04 16:22:46 +02:00
|
|
|
|
2018-03-18 12:57:31 +01:00
|
|
|
*iv_length = operation->iv_size;
|
2018-04-12 07:48:45 +02:00
|
|
|
ret = psa_encrypt_set_iv( operation, iv, *iv_length );
|
2018-04-04 14:43:05 +02:00
|
|
|
|
2018-05-31 13:07:14 +02:00
|
|
|
exit:
|
|
|
|
if( ret != PSA_SUCCESS )
|
|
|
|
psa_cipher_abort( operation );
|
|
|
|
return( ret );
|
2018-03-12 14:59:30 +01:00
|
|
|
}
|
|
|
|
|
2018-06-04 16:22:46 +02:00
|
|
|
psa_status_t psa_encrypt_set_iv( psa_cipher_operation_t *operation,
|
|
|
|
const unsigned char *iv,
|
|
|
|
size_t iv_length )
|
2018-03-12 14:59:30 +01:00
|
|
|
{
|
2018-04-04 14:43:05 +02:00
|
|
|
int ret = PSA_SUCCESS;
|
2018-06-18 16:04:39 +02:00
|
|
|
if( operation->iv_set || ! operation->iv_required )
|
2018-04-04 14:43:05 +02:00
|
|
|
return( PSA_ERROR_BAD_STATE );
|
2018-05-29 15:25:04 +02:00
|
|
|
if( iv_length != operation->iv_size )
|
2018-04-22 19:23:16 +02:00
|
|
|
{
|
2018-05-31 13:06:17 +02:00
|
|
|
psa_cipher_abort( operation );
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
2018-04-22 19:23:16 +02:00
|
|
|
}
|
2018-03-12 14:59:30 +01:00
|
|
|
ret = mbedtls_cipher_set_iv( &operation->ctx.cipher, iv, iv_length );
|
2018-04-04 14:43:05 +02:00
|
|
|
if( ret != 0 )
|
2018-03-12 14:59:30 +01:00
|
|
|
{
|
|
|
|
psa_cipher_abort( operation );
|
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
|
|
|
|
|
|
|
operation->iv_set = 1;
|
|
|
|
|
2018-05-31 13:07:14 +02:00
|
|
|
return( PSA_SUCCESS );
|
2018-03-12 14:59:30 +01:00
|
|
|
}
|
|
|
|
|
2018-06-04 16:22:46 +02:00
|
|
|
psa_status_t psa_cipher_update( psa_cipher_operation_t *operation,
|
|
|
|
const uint8_t *input,
|
|
|
|
size_t input_length,
|
|
|
|
unsigned char *output,
|
|
|
|
size_t output_size,
|
|
|
|
size_t *output_length )
|
2018-03-12 14:59:30 +01:00
|
|
|
{
|
|
|
|
int ret = MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE;
|
2018-06-04 17:17:16 +02:00
|
|
|
size_t expected_output_size;
|
|
|
|
if( PSA_ALG_IS_BLOCK_CIPHER( operation->alg ) )
|
|
|
|
{
|
|
|
|
/* Take the unprocessed partial block left over from previous
|
|
|
|
* update calls, if any, plus the input to this call. Remove
|
|
|
|
* the last partial block, if any. You get the data that will be
|
|
|
|
* output in this call. */
|
|
|
|
expected_output_size =
|
|
|
|
( operation->ctx.cipher.unprocessed_len + input_length )
|
|
|
|
/ operation->block_size * operation->block_size;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
expected_output_size = input_length;
|
|
|
|
}
|
|
|
|
if( output_size < expected_output_size )
|
2018-05-31 13:07:14 +02:00
|
|
|
return( PSA_ERROR_BUFFER_TOO_SMALL );
|
2018-03-12 17:16:40 +01:00
|
|
|
|
2018-03-12 14:59:30 +01:00
|
|
|
ret = mbedtls_cipher_update( &operation->ctx.cipher, input,
|
2018-06-04 16:22:46 +02:00
|
|
|
input_length, output, output_length );
|
2018-04-04 14:43:05 +02:00
|
|
|
if( ret != 0 )
|
2018-03-12 14:59:30 +01:00
|
|
|
{
|
|
|
|
psa_cipher_abort( operation );
|
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
|
|
|
|
2018-05-31 13:07:14 +02:00
|
|
|
return( PSA_SUCCESS );
|
2018-03-12 14:59:30 +01:00
|
|
|
}
|
|
|
|
|
2018-06-04 16:22:46 +02:00
|
|
|
psa_status_t psa_cipher_finish( psa_cipher_operation_t *operation,
|
|
|
|
uint8_t *output,
|
|
|
|
size_t output_size,
|
|
|
|
size_t *output_length )
|
2018-03-12 14:59:30 +01:00
|
|
|
{
|
|
|
|
int ret = MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE;
|
2018-06-04 16:22:46 +02:00
|
|
|
uint8_t temp_output_buffer[MBEDTLS_MAX_BLOCK_LENGTH];
|
2018-04-22 19:19:20 +02:00
|
|
|
|
2018-03-12 14:59:30 +01:00
|
|
|
if( ! operation->key_set )
|
2018-06-05 10:40:02 +02:00
|
|
|
{
|
|
|
|
psa_cipher_abort( operation );
|
2018-03-12 14:59:30 +01:00
|
|
|
return( PSA_ERROR_BAD_STATE );
|
2018-06-05 10:40:02 +02:00
|
|
|
}
|
2018-05-29 15:25:04 +02:00
|
|
|
if( operation->iv_required && ! operation->iv_set )
|
2018-06-05 10:40:02 +02:00
|
|
|
{
|
2018-06-06 15:12:32 +02:00
|
|
|
psa_cipher_abort( operation );
|
2018-03-12 14:59:30 +01:00
|
|
|
return( PSA_ERROR_BAD_STATE );
|
2018-06-05 10:40:02 +02:00
|
|
|
}
|
2018-06-06 15:12:32 +02:00
|
|
|
if( operation->ctx.cipher.operation == MBEDTLS_ENCRYPT &&
|
|
|
|
PSA_ALG_IS_BLOCK_CIPHER( operation->alg ) )
|
2018-04-22 19:19:20 +02:00
|
|
|
{
|
2018-06-06 15:11:46 +02:00
|
|
|
psa_algorithm_t padding_mode =
|
|
|
|
operation->alg & PSA_ALG_BLOCK_CIPHER_PADDING_MASK;
|
2018-06-05 10:40:02 +02:00
|
|
|
if( operation->ctx.cipher.unprocessed_len >= operation->block_size )
|
2018-06-04 17:17:16 +02:00
|
|
|
{
|
2018-06-06 15:12:32 +02:00
|
|
|
psa_cipher_abort( operation );
|
2018-06-05 10:40:02 +02:00
|
|
|
return( PSA_ERROR_TAMPERING_DETECTED );
|
|
|
|
}
|
2018-06-06 15:11:46 +02:00
|
|
|
if( padding_mode == PSA_ALG_BLOCK_CIPHER_PAD_NONE )
|
2018-06-05 10:40:02 +02:00
|
|
|
{
|
|
|
|
if( operation->ctx.cipher.unprocessed_len != 0 )
|
|
|
|
{
|
2018-06-06 15:12:32 +02:00
|
|
|
psa_cipher_abort( operation );
|
2018-06-05 10:40:02 +02:00
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
}
|
2018-06-04 17:17:16 +02:00
|
|
|
}
|
2018-04-30 14:45:34 +02:00
|
|
|
}
|
2018-03-12 14:59:30 +01:00
|
|
|
|
2018-04-30 14:45:34 +02:00
|
|
|
ret = mbedtls_cipher_finish( &operation->ctx.cipher, temp_output_buffer,
|
2018-06-04 16:22:46 +02:00
|
|
|
output_length );
|
2018-04-04 14:43:05 +02:00
|
|
|
if( ret != 0 )
|
2018-03-12 14:59:30 +01:00
|
|
|
{
|
|
|
|
psa_cipher_abort( operation );
|
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
2018-06-04 16:22:46 +02:00
|
|
|
if( output_size >= *output_length )
|
2018-04-30 14:45:34 +02:00
|
|
|
memcpy( output, temp_output_buffer, *output_length );
|
|
|
|
else
|
|
|
|
{
|
|
|
|
psa_cipher_abort( operation );
|
|
|
|
return( PSA_ERROR_BUFFER_TOO_SMALL );
|
|
|
|
}
|
2018-03-12 14:59:30 +01:00
|
|
|
|
2018-04-22 19:15:31 +02:00
|
|
|
return( PSA_SUCCESS );
|
2018-03-12 14:59:30 +01:00
|
|
|
}
|
|
|
|
|
2018-06-04 16:22:46 +02:00
|
|
|
psa_status_t psa_cipher_abort( psa_cipher_operation_t *operation )
|
|
|
|
{
|
2018-06-20 16:05:20 +02:00
|
|
|
if( operation->alg == 0 )
|
|
|
|
return( PSA_SUCCESS );
|
|
|
|
|
2018-06-21 16:57:07 +02:00
|
|
|
/* Sanity check (shouldn't happen: operation->alg should
|
|
|
|
* always have been initialized to a valid value). */
|
|
|
|
if( ! PSA_ALG_IS_CIPHER( operation->alg ) )
|
|
|
|
return( PSA_ERROR_BAD_STATE );
|
|
|
|
|
2018-03-12 14:59:30 +01:00
|
|
|
mbedtls_cipher_free( &operation->ctx.cipher );
|
2018-06-04 16:22:46 +02:00
|
|
|
|
2018-04-04 14:43:05 +02:00
|
|
|
operation->alg = 0;
|
2018-04-30 11:31:04 +02:00
|
|
|
operation->key_set = 0;
|
|
|
|
operation->iv_set = 0;
|
|
|
|
operation->iv_size = 0;
|
2018-04-04 14:43:05 +02:00
|
|
|
operation->block_size = 0;
|
2018-04-30 11:31:04 +02:00
|
|
|
operation->iv_required = 0;
|
2018-04-04 14:43:05 +02:00
|
|
|
|
2018-05-31 13:07:14 +02:00
|
|
|
return( PSA_SUCCESS );
|
2018-03-12 14:59:30 +01:00
|
|
|
}
|
|
|
|
|
2018-04-30 17:06:50 +02:00
|
|
|
|
2018-06-18 21:49:39 +02:00
|
|
|
|
2018-03-28 00:21:33 +02:00
|
|
|
/****************************************************************/
|
|
|
|
/* Key Policy */
|
|
|
|
/****************************************************************/
|
|
|
|
|
2018-06-18 15:41:12 +02:00
|
|
|
void psa_key_policy_init( psa_key_policy_t *policy )
|
2018-03-28 00:21:33 +02:00
|
|
|
{
|
2018-06-18 16:07:14 +02:00
|
|
|
memset( policy, 0, sizeof( *policy ) );
|
2018-03-28 00:21:33 +02:00
|
|
|
}
|
|
|
|
|
2018-06-18 15:41:12 +02:00
|
|
|
void psa_key_policy_set_usage( psa_key_policy_t *policy,
|
|
|
|
psa_key_usage_t usage,
|
|
|
|
psa_algorithm_t alg )
|
2018-03-28 00:21:33 +02:00
|
|
|
{
|
2018-03-28 14:14:59 +02:00
|
|
|
policy->usage = usage;
|
|
|
|
policy->alg = alg;
|
2018-03-28 00:21:33 +02:00
|
|
|
}
|
|
|
|
|
2018-06-18 15:41:12 +02:00
|
|
|
psa_key_usage_t psa_key_policy_get_usage( psa_key_policy_t *policy )
|
2018-03-28 00:21:33 +02:00
|
|
|
{
|
2018-04-02 17:34:15 +02:00
|
|
|
return( policy->usage );
|
2018-03-28 00:21:33 +02:00
|
|
|
}
|
|
|
|
|
2018-06-18 15:41:12 +02:00
|
|
|
psa_algorithm_t psa_key_policy_get_algorithm( psa_key_policy_t *policy )
|
2018-03-28 00:21:33 +02:00
|
|
|
{
|
2018-04-02 17:34:15 +02:00
|
|
|
return( policy->alg );
|
2018-03-28 00:21:33 +02:00
|
|
|
}
|
|
|
|
|
2018-06-18 15:41:12 +02:00
|
|
|
psa_status_t psa_set_key_policy( psa_key_slot_t key,
|
|
|
|
const psa_key_policy_t *policy )
|
2018-03-28 00:21:33 +02:00
|
|
|
{
|
|
|
|
key_slot_t *slot;
|
|
|
|
|
2018-06-18 23:25:51 +02:00
|
|
|
if( key == 0 || key > PSA_KEY_SLOT_COUNT || policy == NULL )
|
2018-03-28 00:21:33 +02:00
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
2018-05-31 13:25:48 +02:00
|
|
|
|
2018-03-28 00:21:33 +02:00
|
|
|
slot = &global_data.key_slots[key];
|
|
|
|
if( slot->type != PSA_KEY_TYPE_NONE )
|
|
|
|
return( PSA_ERROR_OCCUPIED_SLOT );
|
|
|
|
|
2018-06-18 16:04:39 +02:00
|
|
|
if( ( policy->usage & ~( PSA_KEY_USAGE_EXPORT |
|
|
|
|
PSA_KEY_USAGE_ENCRYPT |
|
|
|
|
PSA_KEY_USAGE_DECRYPT |
|
|
|
|
PSA_KEY_USAGE_SIGN |
|
|
|
|
PSA_KEY_USAGE_VERIFY ) ) != 0 )
|
2018-04-16 13:38:57 +02:00
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
2018-03-28 00:21:33 +02:00
|
|
|
|
2018-04-02 17:34:15 +02:00
|
|
|
slot->policy = *policy;
|
2018-03-28 00:21:33 +02:00
|
|
|
|
|
|
|
return( PSA_SUCCESS );
|
|
|
|
}
|
|
|
|
|
2018-06-18 15:41:12 +02:00
|
|
|
psa_status_t psa_get_key_policy( psa_key_slot_t key,
|
|
|
|
psa_key_policy_t *policy )
|
2018-03-28 00:21:33 +02:00
|
|
|
{
|
|
|
|
key_slot_t *slot;
|
|
|
|
|
2018-06-18 23:25:51 +02:00
|
|
|
if( key == 0 || key > PSA_KEY_SLOT_COUNT || policy == NULL )
|
2018-03-28 00:21:33 +02:00
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
|
|
|
|
slot = &global_data.key_slots[key];
|
2018-05-31 13:25:48 +02:00
|
|
|
|
2018-04-02 17:34:15 +02:00
|
|
|
*policy = slot->policy;
|
2018-03-28 00:21:33 +02:00
|
|
|
|
|
|
|
return( PSA_SUCCESS );
|
|
|
|
}
|
2018-02-03 22:44:14 +01:00
|
|
|
|
2018-04-30 17:06:50 +02:00
|
|
|
|
|
|
|
|
2018-03-20 21:44:08 +01:00
|
|
|
/****************************************************************/
|
|
|
|
/* Key Lifetime */
|
|
|
|
/****************************************************************/
|
|
|
|
|
2018-06-18 15:41:12 +02:00
|
|
|
psa_status_t psa_get_key_lifetime( psa_key_slot_t key,
|
|
|
|
psa_key_lifetime_t *lifetime )
|
2018-03-20 21:44:08 +01:00
|
|
|
{
|
|
|
|
key_slot_t *slot;
|
|
|
|
|
2018-06-18 23:25:51 +02:00
|
|
|
if( key == 0 || key > PSA_KEY_SLOT_COUNT )
|
2018-03-20 21:44:08 +01:00
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
|
|
|
|
slot = &global_data.key_slots[key];
|
2018-05-31 13:25:48 +02:00
|
|
|
|
2018-03-20 21:44:08 +01:00
|
|
|
*lifetime = slot->lifetime;
|
|
|
|
|
|
|
|
return( PSA_SUCCESS );
|
|
|
|
}
|
|
|
|
|
2018-06-18 15:41:12 +02:00
|
|
|
psa_status_t psa_set_key_lifetime( psa_key_slot_t key,
|
|
|
|
const psa_key_lifetime_t lifetime )
|
2018-03-20 21:44:08 +01:00
|
|
|
{
|
|
|
|
key_slot_t *slot;
|
|
|
|
|
2018-06-18 23:25:51 +02:00
|
|
|
if( key == 0 || key > PSA_KEY_SLOT_COUNT )
|
2018-03-20 21:44:08 +01:00
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
|
2018-05-31 13:25:48 +02:00
|
|
|
if( lifetime != PSA_KEY_LIFETIME_VOLATILE &&
|
|
|
|
lifetime != PSA_KEY_LIFETIME_PERSISTENT &&
|
2018-03-20 21:44:08 +01:00
|
|
|
lifetime != PSA_KEY_LIFETIME_WRITE_ONCE)
|
2018-03-21 12:35:20 +01:00
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
2018-03-20 21:44:08 +01:00
|
|
|
|
2018-03-21 12:35:20 +01:00
|
|
|
slot = &global_data.key_slots[key];
|
2018-03-28 00:29:41 +02:00
|
|
|
if( slot->type != PSA_KEY_TYPE_NONE )
|
|
|
|
return( PSA_ERROR_OCCUPIED_SLOT );
|
2018-03-21 12:35:20 +01:00
|
|
|
|
2018-05-29 15:56:39 +02:00
|
|
|
if( lifetime != PSA_KEY_LIFETIME_VOLATILE )
|
2018-03-21 12:35:20 +01:00
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
2018-05-31 13:25:48 +02:00
|
|
|
|
2018-03-20 22:28:38 +01:00
|
|
|
slot->lifetime = lifetime;
|
2018-03-20 21:44:08 +01:00
|
|
|
|
|
|
|
return( PSA_SUCCESS );
|
|
|
|
}
|
|
|
|
|
2018-02-03 22:44:14 +01:00
|
|
|
|
2018-06-18 21:49:39 +02:00
|
|
|
|
2018-04-25 23:53:03 +02:00
|
|
|
/****************************************************************/
|
|
|
|
/* AEAD */
|
|
|
|
/****************************************************************/
|
2018-06-18 21:49:39 +02:00
|
|
|
|
2018-04-25 23:53:03 +02:00
|
|
|
psa_status_t psa_aead_encrypt( psa_key_slot_t key,
|
|
|
|
psa_algorithm_t alg,
|
|
|
|
const uint8_t *nonce,
|
|
|
|
size_t nonce_length,
|
|
|
|
const uint8_t *additional_data,
|
|
|
|
size_t additional_data_length,
|
|
|
|
const uint8_t *plaintext,
|
|
|
|
size_t plaintext_length,
|
|
|
|
uint8_t *ciphertext,
|
|
|
|
size_t ciphertext_size,
|
|
|
|
size_t *ciphertext_length )
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
psa_status_t status;
|
|
|
|
key_slot_t *slot;
|
|
|
|
psa_key_type_t key_type;
|
|
|
|
size_t key_bits;
|
2018-06-03 16:19:55 +02:00
|
|
|
uint8_t *tag;
|
|
|
|
size_t tag_length;
|
2018-05-09 11:24:42 +02:00
|
|
|
mbedtls_cipher_id_t cipher_id;
|
2018-06-03 14:10:06 +02:00
|
|
|
const mbedtls_cipher_info_t *cipher_info = NULL;
|
2018-06-18 15:41:12 +02:00
|
|
|
|
2018-06-03 14:05:47 +02:00
|
|
|
*ciphertext_length = 0;
|
2018-05-09 13:58:32 +02:00
|
|
|
|
2018-04-25 23:53:03 +02:00
|
|
|
status = psa_get_key_information( key, &key_type, &key_bits );
|
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( status );
|
|
|
|
slot = &global_data.key_slots[key];
|
2018-06-06 12:45:55 +02:00
|
|
|
if( slot->type == PSA_KEY_TYPE_NONE )
|
2018-06-18 15:41:12 +02:00
|
|
|
return( PSA_ERROR_EMPTY_SLOT );
|
2018-04-25 23:53:03 +02:00
|
|
|
|
2018-06-06 12:09:34 +02:00
|
|
|
cipher_info = mbedtls_cipher_info_from_psa( alg, key_type,
|
|
|
|
key_bits, &cipher_id );
|
2018-06-03 14:10:06 +02:00
|
|
|
if( cipher_info == NULL )
|
2018-06-18 15:41:12 +02:00
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
2018-05-09 11:24:42 +02:00
|
|
|
|
2018-06-18 16:04:39 +02:00
|
|
|
if( ( slot->policy.usage & PSA_KEY_USAGE_ENCRYPT ) == 0 )
|
2018-06-04 13:33:19 +02:00
|
|
|
return( PSA_ERROR_NOT_PERMITTED );
|
2018-04-25 23:53:03 +02:00
|
|
|
|
2018-06-18 15:41:12 +02:00
|
|
|
if( ( key_type & PSA_KEY_TYPE_CATEGORY_MASK ) !=
|
|
|
|
PSA_KEY_TYPE_CATEGORY_SYMMETRIC )
|
2018-04-30 16:21:50 +02:00
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
2018-04-25 23:53:03 +02:00
|
|
|
|
|
|
|
if( alg == PSA_ALG_GCM )
|
|
|
|
{
|
|
|
|
mbedtls_gcm_context gcm;
|
2018-06-03 16:19:55 +02:00
|
|
|
tag_length = 16;
|
|
|
|
|
2018-06-04 13:33:00 +02:00
|
|
|
if( PSA_BLOCK_CIPHER_BLOCK_SIZE( key_type ) != 16 )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
|
2018-06-03 16:19:55 +02:00
|
|
|
//make sure we have place to hold the tag in the ciphertext buffer
|
|
|
|
if( ciphertext_size < ( plaintext_length + tag_length ) )
|
2018-06-06 12:45:03 +02:00
|
|
|
return( PSA_ERROR_BUFFER_TOO_SMALL );
|
2018-06-03 16:19:55 +02:00
|
|
|
|
|
|
|
//update the tag pointer to point to the end of the ciphertext_length
|
|
|
|
tag = ciphertext + plaintext_length;
|
|
|
|
|
2018-04-25 23:53:03 +02:00
|
|
|
mbedtls_gcm_init( &gcm );
|
2018-06-01 16:28:30 +02:00
|
|
|
ret = mbedtls_gcm_setkey( &gcm, cipher_id,
|
2018-06-03 14:06:17 +02:00
|
|
|
slot->data.raw.data,
|
2018-06-01 16:28:30 +02:00
|
|
|
key_bits );
|
2018-04-25 23:53:03 +02:00
|
|
|
if( ret != 0 )
|
|
|
|
{
|
|
|
|
mbedtls_gcm_free( &gcm );
|
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
|
|
|
ret = mbedtls_gcm_crypt_and_tag( &gcm, MBEDTLS_GCM_ENCRYPT,
|
2018-06-01 16:28:30 +02:00
|
|
|
plaintext_length, nonce,
|
|
|
|
nonce_length, additional_data,
|
|
|
|
additional_data_length, plaintext,
|
2018-06-03 16:19:55 +02:00
|
|
|
ciphertext, tag_length, tag );
|
2018-04-25 23:53:03 +02:00
|
|
|
mbedtls_gcm_free( &gcm );
|
|
|
|
}
|
|
|
|
else if( alg == PSA_ALG_CCM )
|
|
|
|
{
|
|
|
|
mbedtls_ccm_context ccm;
|
2018-06-03 16:19:55 +02:00
|
|
|
tag_length = 16;
|
|
|
|
|
2018-06-04 13:33:00 +02:00
|
|
|
if( PSA_BLOCK_CIPHER_BLOCK_SIZE( key_type ) != 16 )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
|
2018-04-26 00:11:21 +02:00
|
|
|
if( nonce_length < 7 || nonce_length > 13 )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
|
2018-06-03 16:19:55 +02:00
|
|
|
//make sure we have place to hold the tag in the ciphertext buffer
|
|
|
|
if( ciphertext_size < ( plaintext_length + tag_length ) )
|
2018-06-06 12:45:03 +02:00
|
|
|
return( PSA_ERROR_BUFFER_TOO_SMALL );
|
2018-06-03 16:19:55 +02:00
|
|
|
|
|
|
|
//update the tag pointer to point to the end of the ciphertext_length
|
|
|
|
tag = ciphertext + plaintext_length;
|
|
|
|
|
2018-04-25 23:53:03 +02:00
|
|
|
mbedtls_ccm_init( &ccm );
|
2018-06-01 16:28:30 +02:00
|
|
|
ret = mbedtls_ccm_setkey( &ccm, cipher_id,
|
2018-04-30 16:22:52 +02:00
|
|
|
slot->data.raw.data, key_bits );
|
2018-04-25 23:53:03 +02:00
|
|
|
if( ret != 0 )
|
|
|
|
{
|
|
|
|
mbedtls_ccm_free( &ccm );
|
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
2018-06-01 16:28:30 +02:00
|
|
|
ret = mbedtls_ccm_encrypt_and_tag( &ccm, plaintext_length,
|
2018-06-18 16:04:39 +02:00
|
|
|
nonce, nonce_length,
|
|
|
|
additional_data,
|
2018-06-01 16:28:30 +02:00
|
|
|
additional_data_length,
|
|
|
|
plaintext, ciphertext,
|
2018-06-03 16:19:55 +02:00
|
|
|
tag, tag_length );
|
2018-04-25 23:53:03 +02:00
|
|
|
mbedtls_ccm_free( &ccm );
|
|
|
|
}
|
2018-05-09 14:40:09 +02:00
|
|
|
else
|
|
|
|
{
|
2018-06-03 14:07:38 +02:00
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
2018-05-09 14:40:09 +02:00
|
|
|
}
|
2018-06-18 15:41:12 +02:00
|
|
|
|
2018-06-03 16:19:55 +02:00
|
|
|
if( ret != 0 )
|
|
|
|
{
|
|
|
|
memset( ciphertext, 0, ciphertext_size );
|
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
2018-06-18 15:41:12 +02:00
|
|
|
|
2018-06-03 16:19:55 +02:00
|
|
|
*ciphertext_length = plaintext_length + tag_length;
|
2018-04-26 00:11:21 +02:00
|
|
|
return( PSA_SUCCESS );
|
2018-04-25 23:53:03 +02:00
|
|
|
}
|
|
|
|
|
2018-06-01 19:23:52 +02:00
|
|
|
/* Locate the tag in a ciphertext buffer containing the encrypted data
|
|
|
|
* followed by the tag. Return the length of the part preceding the tag in
|
|
|
|
* *plaintext_length. This is the size of the plaintext in modes where
|
|
|
|
* the encrypted data has the same size as the plaintext, such as
|
|
|
|
* CCM and GCM. */
|
|
|
|
static psa_status_t psa_aead_unpadded_locate_tag( size_t tag_length,
|
|
|
|
const uint8_t *ciphertext,
|
|
|
|
size_t ciphertext_length,
|
|
|
|
size_t plaintext_size,
|
|
|
|
const uint8_t **p_tag )
|
|
|
|
{
|
|
|
|
size_t payload_length;
|
|
|
|
if( tag_length > ciphertext_length )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
payload_length = ciphertext_length - tag_length;
|
|
|
|
if( payload_length > plaintext_size )
|
|
|
|
return( PSA_ERROR_BUFFER_TOO_SMALL );
|
|
|
|
*p_tag = ciphertext + payload_length;
|
|
|
|
return( PSA_SUCCESS );
|
|
|
|
}
|
|
|
|
|
2018-04-25 23:53:03 +02:00
|
|
|
psa_status_t psa_aead_decrypt( psa_key_slot_t key,
|
|
|
|
psa_algorithm_t alg,
|
|
|
|
const uint8_t *nonce,
|
|
|
|
size_t nonce_length,
|
|
|
|
const uint8_t *additional_data,
|
|
|
|
size_t additional_data_length,
|
|
|
|
const uint8_t *ciphertext,
|
|
|
|
size_t ciphertext_length,
|
|
|
|
uint8_t *plaintext,
|
|
|
|
size_t plaintext_size,
|
|
|
|
size_t *plaintext_length )
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
psa_status_t status;
|
|
|
|
key_slot_t *slot;
|
|
|
|
psa_key_type_t key_type;
|
|
|
|
size_t key_bits;
|
2018-06-01 19:23:52 +02:00
|
|
|
const uint8_t *tag;
|
|
|
|
size_t tag_length;
|
2018-05-09 11:24:42 +02:00
|
|
|
mbedtls_cipher_id_t cipher_id;
|
2018-06-03 14:10:06 +02:00
|
|
|
const mbedtls_cipher_info_t *cipher_info = NULL;
|
2018-06-18 15:41:12 +02:00
|
|
|
|
2018-06-01 19:23:52 +02:00
|
|
|
*plaintext_length = 0;
|
2018-04-26 11:07:35 +02:00
|
|
|
|
2018-04-25 23:53:03 +02:00
|
|
|
status = psa_get_key_information( key, &key_type, &key_bits );
|
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( status );
|
|
|
|
slot = &global_data.key_slots[key];
|
2018-06-06 12:45:55 +02:00
|
|
|
if( slot->type == PSA_KEY_TYPE_NONE )
|
2018-06-18 15:41:12 +02:00
|
|
|
return( PSA_ERROR_EMPTY_SLOT );
|
2018-04-25 23:53:03 +02:00
|
|
|
|
2018-06-06 12:09:34 +02:00
|
|
|
cipher_info = mbedtls_cipher_info_from_psa( alg, key_type,
|
|
|
|
key_bits, &cipher_id );
|
2018-06-03 14:10:06 +02:00
|
|
|
if( cipher_info == NULL )
|
2018-06-18 15:41:12 +02:00
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
|
2018-06-04 13:33:19 +02:00
|
|
|
if( !( slot->policy.usage & PSA_KEY_USAGE_DECRYPT ) )
|
|
|
|
return( PSA_ERROR_NOT_PERMITTED );
|
2018-04-25 23:53:03 +02:00
|
|
|
|
2018-06-18 15:41:12 +02:00
|
|
|
if( ( key_type & PSA_KEY_TYPE_CATEGORY_MASK ) !=
|
|
|
|
PSA_KEY_TYPE_CATEGORY_SYMMETRIC )
|
2018-04-30 16:25:45 +02:00
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
2018-04-25 23:53:03 +02:00
|
|
|
|
|
|
|
if( alg == PSA_ALG_GCM )
|
|
|
|
{
|
|
|
|
mbedtls_gcm_context gcm;
|
2018-04-26 00:11:21 +02:00
|
|
|
|
2018-06-01 19:23:52 +02:00
|
|
|
tag_length = 16;
|
|
|
|
status = psa_aead_unpadded_locate_tag( tag_length,
|
|
|
|
ciphertext, ciphertext_length,
|
2018-06-03 16:20:42 +02:00
|
|
|
plaintext_size, &tag );
|
2018-06-01 19:23:52 +02:00
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( status );
|
|
|
|
|
2018-04-25 23:53:03 +02:00
|
|
|
mbedtls_gcm_init( &gcm );
|
2018-06-01 16:28:30 +02:00
|
|
|
ret = mbedtls_gcm_setkey( &gcm, cipher_id,
|
2018-04-30 16:22:52 +02:00
|
|
|
slot->data.raw.data, key_bits );
|
2018-04-25 23:53:03 +02:00
|
|
|
if( ret != 0 )
|
|
|
|
{
|
|
|
|
mbedtls_gcm_free( &gcm );
|
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
|
|
|
|
2018-06-01 19:23:52 +02:00
|
|
|
ret = mbedtls_gcm_auth_decrypt( &gcm,
|
2018-06-03 16:20:42 +02:00
|
|
|
ciphertext_length - tag_length,
|
2018-06-01 19:23:52 +02:00
|
|
|
nonce, nonce_length,
|
2018-06-06 12:09:34 +02:00
|
|
|
additional_data,
|
|
|
|
additional_data_length,
|
2018-06-01 19:23:52 +02:00
|
|
|
tag, tag_length,
|
|
|
|
ciphertext, plaintext );
|
2018-04-25 23:53:03 +02:00
|
|
|
mbedtls_gcm_free( &gcm );
|
|
|
|
}
|
|
|
|
else if( alg == PSA_ALG_CCM )
|
|
|
|
{
|
|
|
|
mbedtls_ccm_context ccm;
|
2018-06-01 16:28:30 +02:00
|
|
|
|
2018-04-26 00:11:21 +02:00
|
|
|
if( nonce_length < 7 || nonce_length > 13 )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
|
2018-06-03 13:28:24 +02:00
|
|
|
tag_length = 16;
|
|
|
|
status = psa_aead_unpadded_locate_tag( tag_length,
|
|
|
|
ciphertext, ciphertext_length,
|
2018-06-03 16:20:42 +02:00
|
|
|
plaintext_size, &tag );
|
2018-06-03 13:28:24 +02:00
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( status );
|
|
|
|
|
2018-04-25 23:53:03 +02:00
|
|
|
mbedtls_ccm_init( &ccm );
|
2018-06-01 16:28:30 +02:00
|
|
|
ret = mbedtls_ccm_setkey( &ccm, cipher_id,
|
2018-04-30 16:22:52 +02:00
|
|
|
slot->data.raw.data, key_bits );
|
2018-04-25 23:53:03 +02:00
|
|
|
if( ret != 0 )
|
|
|
|
{
|
|
|
|
mbedtls_ccm_free( &ccm );
|
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
2018-06-03 16:20:42 +02:00
|
|
|
ret = mbedtls_ccm_auth_decrypt( &ccm, ciphertext_length - tag_length,
|
2018-06-01 19:23:52 +02:00
|
|
|
nonce, nonce_length,
|
2018-06-18 16:04:39 +02:00
|
|
|
additional_data,
|
|
|
|
additional_data_length,
|
2018-06-01 19:23:52 +02:00
|
|
|
ciphertext, plaintext,
|
|
|
|
tag, tag_length );
|
2018-04-25 23:53:03 +02:00
|
|
|
mbedtls_ccm_free( &ccm );
|
|
|
|
}
|
2018-06-01 13:39:53 +02:00
|
|
|
else
|
|
|
|
{
|
2018-06-03 14:07:38 +02:00
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
2018-06-01 13:39:53 +02:00
|
|
|
}
|
2018-06-01 16:28:30 +02:00
|
|
|
|
2018-06-01 19:23:52 +02:00
|
|
|
if( ret != 0 )
|
2018-06-03 16:20:42 +02:00
|
|
|
memset( plaintext, 0, plaintext_size );
|
|
|
|
else
|
|
|
|
*plaintext_length = ciphertext_length - tag_length;
|
|
|
|
|
2018-06-01 19:23:52 +02:00
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
2018-04-25 23:53:03 +02:00
|
|
|
}
|
|
|
|
|
2018-04-30 17:06:50 +02:00
|
|
|
|
2018-06-18 21:49:39 +02:00
|
|
|
|
2018-06-19 22:00:52 +02:00
|
|
|
/****************************************************************/
|
|
|
|
/* Key generation */
|
|
|
|
/****************************************************************/
|
|
|
|
|
|
|
|
psa_status_t psa_generate_random( uint8_t *output,
|
|
|
|
size_t output_size )
|
|
|
|
{
|
|
|
|
int ret = mbedtls_ctr_drbg_random( &global_data.ctr_drbg,
|
|
|
|
output, output_size );
|
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
|
|
|
|
|
|
|
psa_status_t psa_generate_key( psa_key_slot_t key,
|
|
|
|
psa_key_type_t type,
|
|
|
|
size_t bits,
|
|
|
|
const void *parameters,
|
|
|
|
size_t parameters_size )
|
|
|
|
{
|
2018-06-20 00:20:32 +02:00
|
|
|
key_slot_t *slot;
|
|
|
|
|
|
|
|
if( key == 0 || key > PSA_KEY_SLOT_COUNT )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
slot = &global_data.key_slots[key];
|
|
|
|
if( slot->type != PSA_KEY_TYPE_NONE )
|
|
|
|
return( PSA_ERROR_OCCUPIED_SLOT );
|
|
|
|
if( parameters == NULL && parameters_size != 0 )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
|
2018-06-21 14:15:31 +02:00
|
|
|
if( key_type_is_raw_bytes( type ) )
|
2018-06-20 00:20:32 +02:00
|
|
|
{
|
|
|
|
psa_status_t status = prepare_raw_data_slot( type, bits,
|
|
|
|
&slot->data.raw );
|
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( status );
|
|
|
|
status = psa_generate_random( slot->data.raw.data,
|
|
|
|
slot->data.raw.bytes );
|
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
{
|
|
|
|
mbedtls_free( slot->data.raw.data );
|
|
|
|
return( status );
|
|
|
|
}
|
|
|
|
#if defined(MBEDTLS_DES_C)
|
|
|
|
if( type == PSA_KEY_TYPE_DES )
|
|
|
|
{
|
|
|
|
mbedtls_des_key_set_parity( slot->data.raw.data );
|
|
|
|
if( slot->data.raw.bytes >= 16 )
|
|
|
|
mbedtls_des_key_set_parity( slot->data.raw.data + 8 );
|
|
|
|
if( slot->data.raw.bytes == 24 )
|
|
|
|
mbedtls_des_key_set_parity( slot->data.raw.data + 16 );
|
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_DES_C */
|
|
|
|
}
|
|
|
|
else
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_RSA_C) && defined(MBEDTLS_GENPRIME)
|
|
|
|
if ( type == PSA_KEY_TYPE_RSA_KEYPAIR )
|
|
|
|
{
|
|
|
|
mbedtls_rsa_context *rsa;
|
|
|
|
int ret;
|
|
|
|
int exponent = 65537;
|
|
|
|
if( parameters != NULL )
|
|
|
|
{
|
|
|
|
const unsigned *p = parameters;
|
|
|
|
if( parameters_size != sizeof( *p ) )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
if( *p > INT_MAX )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
exponent = *p;
|
|
|
|
}
|
|
|
|
rsa = mbedtls_calloc( 1, sizeof( *rsa ) );
|
|
|
|
if( rsa == NULL )
|
|
|
|
return( PSA_ERROR_INSUFFICIENT_MEMORY );
|
|
|
|
mbedtls_rsa_init( rsa, MBEDTLS_RSA_PKCS_V15, MBEDTLS_MD_NONE );
|
|
|
|
ret = mbedtls_rsa_gen_key( rsa,
|
|
|
|
mbedtls_ctr_drbg_random,
|
|
|
|
&global_data.ctr_drbg,
|
|
|
|
bits,
|
|
|
|
exponent );
|
|
|
|
if( ret != 0 )
|
|
|
|
{
|
|
|
|
mbedtls_rsa_free( rsa );
|
|
|
|
mbedtls_free( rsa );
|
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
|
|
|
slot->data.rsa = rsa;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_RSA_C && MBEDTLS_GENPRIME */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_ECP_C)
|
|
|
|
if ( PSA_KEY_TYPE_IS_ECC( type ) && PSA_KEY_TYPE_IS_KEYPAIR( type ) )
|
|
|
|
{
|
|
|
|
psa_ecc_curve_t curve = PSA_KEY_TYPE_GET_CURVE( type );
|
|
|
|
mbedtls_ecp_group_id grp_id = mbedtls_ecc_group_of_psa( curve );
|
|
|
|
const mbedtls_ecp_curve_info *curve_info =
|
|
|
|
mbedtls_ecp_curve_info_from_grp_id( grp_id );
|
|
|
|
mbedtls_ecp_keypair *ecp;
|
|
|
|
int ret;
|
|
|
|
if( parameters != NULL )
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
if( grp_id == MBEDTLS_ECP_DP_NONE || curve_info == NULL )
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
if( curve_info->bit_size != bits )
|
|
|
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
|
|
|
ecp = mbedtls_calloc( 1, sizeof( *ecp ) );
|
|
|
|
if( ecp == NULL )
|
|
|
|
return( PSA_ERROR_INSUFFICIENT_MEMORY );
|
|
|
|
mbedtls_ecp_keypair_init( ecp );
|
|
|
|
ret = mbedtls_ecp_gen_key( grp_id, ecp,
|
|
|
|
mbedtls_ctr_drbg_random,
|
|
|
|
&global_data.ctr_drbg );
|
|
|
|
if( ret != 0 )
|
|
|
|
{
|
|
|
|
mbedtls_ecp_keypair_free( ecp );
|
|
|
|
mbedtls_free( ecp );
|
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
|
|
|
slot->data.ecp = ecp;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_ECP_C */
|
|
|
|
|
|
|
|
return( PSA_ERROR_NOT_SUPPORTED );
|
|
|
|
|
|
|
|
slot->type = type;
|
|
|
|
return( PSA_SUCCESS );
|
2018-06-19 22:00:52 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-01-28 13:16:24 +01:00
|
|
|
/****************************************************************/
|
|
|
|
/* Module setup */
|
|
|
|
/****************************************************************/
|
|
|
|
|
2018-01-27 23:32:46 +01:00
|
|
|
void mbedtls_psa_crypto_free( void )
|
|
|
|
{
|
2018-01-28 13:16:24 +01:00
|
|
|
size_t key;
|
2018-06-18 23:25:51 +02:00
|
|
|
for( key = 1; key < PSA_KEY_SLOT_COUNT; key++ )
|
2018-01-28 13:16:24 +01:00
|
|
|
psa_destroy_key( key );
|
2018-01-27 23:32:46 +01:00
|
|
|
mbedtls_ctr_drbg_free( &global_data.ctr_drbg );
|
|
|
|
mbedtls_entropy_free( &global_data.entropy );
|
|
|
|
mbedtls_zeroize( &global_data, sizeof( global_data ) );
|
|
|
|
}
|
|
|
|
|
|
|
|
psa_status_t psa_crypto_init( void )
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
const unsigned char drbg_seed[] = "PSA";
|
|
|
|
|
|
|
|
if( global_data.initialized != 0 )
|
|
|
|
return( PSA_SUCCESS );
|
|
|
|
|
|
|
|
mbedtls_zeroize( &global_data, sizeof( global_data ) );
|
|
|
|
mbedtls_entropy_init( &global_data.entropy );
|
|
|
|
mbedtls_ctr_drbg_init( &global_data.ctr_drbg );
|
|
|
|
|
|
|
|
ret = mbedtls_ctr_drbg_seed( &global_data.ctr_drbg,
|
|
|
|
mbedtls_entropy_func,
|
|
|
|
&global_data.entropy,
|
|
|
|
drbg_seed, sizeof( drbg_seed ) - 1 );
|
|
|
|
if( ret != 0 )
|
|
|
|
goto exit;
|
|
|
|
|
2018-03-07 14:16:44 +01:00
|
|
|
global_data.initialized = 1;
|
|
|
|
|
2018-01-27 23:32:46 +01:00
|
|
|
exit:
|
|
|
|
if( ret != 0 )
|
|
|
|
mbedtls_psa_crypto_free( );
|
|
|
|
return( mbedtls_to_psa_error( ret ) );
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* MBEDTLS_PSA_CRYPTO_C */
|