mbed TLS v3.3.0
Loading...
Searching...
No Matches
crypto_values.h
Go to the documentation of this file.
1
22/*
23 * Copyright The Mbed TLS Contributors
24 * SPDX-License-Identifier: Apache-2.0
25 *
26 * Licensed under the Apache License, Version 2.0 (the "License"); you may
27 * not use this file except in compliance with the License.
28 * You may obtain a copy of the License at
29 *
30 * http://www.apache.org/licenses/LICENSE-2.0
31 *
32 * Unless required by applicable law or agreed to in writing, software
33 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
34 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
35 * See the License for the specific language governing permissions and
36 * limitations under the License.
37 */
38
39#ifndef PSA_CRYPTO_VALUES_H
40#define PSA_CRYPTO_VALUES_H
42
47/* PSA error codes */
48
49/* Error codes are standardized across PSA domains (framework, crypto, storage,
50 * etc.). Do not change the values in this section or even the expansions
51 * of each macro: it must be possible to `#include` both this header
52 * and some other PSA component's headers in the same C source,
53 * which will lead to duplicate definitions of the `PSA_SUCCESS` and
54 * `PSA_ERROR_xxx` macros, which is ok if and only if the macros expand
55 * to the same sequence of tokens.
56 *
57 * If you must add a new
58 * value, check with the Arm PSA framework group to pick one that other
59 * domains aren't already using. */
60
62#define PSA_SUCCESS ((psa_status_t)0)
63
69#define PSA_ERROR_GENERIC_ERROR ((psa_status_t)-132)
70
78#define PSA_ERROR_NOT_SUPPORTED ((psa_status_t)-134)
79
91#define PSA_ERROR_NOT_PERMITTED ((psa_status_t)-133)
92
103#define PSA_ERROR_BUFFER_TOO_SMALL ((psa_status_t)-138)
104
109#define PSA_ERROR_ALREADY_EXISTS ((psa_status_t)-139)
110
115#define PSA_ERROR_DOES_NOT_EXIST ((psa_status_t)-140)
116
131#define PSA_ERROR_BAD_STATE ((psa_status_t)-137)
132
142#define PSA_ERROR_INVALID_ARGUMENT ((psa_status_t)-135)
143
148#define PSA_ERROR_INSUFFICIENT_MEMORY ((psa_status_t)-141)
149
157#define PSA_ERROR_INSUFFICIENT_STORAGE ((psa_status_t)-142)
158
174#define PSA_ERROR_COMMUNICATION_FAILURE ((psa_status_t)-145)
175
199#define PSA_ERROR_STORAGE_FAILURE ((psa_status_t)-146)
200
205#define PSA_ERROR_HARDWARE_FAILURE ((psa_status_t)-147)
206
236#define PSA_ERROR_CORRUPTION_DETECTED ((psa_status_t)-151)
237
255#define PSA_ERROR_INSUFFICIENT_ENTROPY ((psa_status_t)-148)
256
265#define PSA_ERROR_INVALID_SIGNATURE ((psa_status_t)-149)
266
281#define PSA_ERROR_INVALID_PADDING ((psa_status_t)-150)
282
285#define PSA_ERROR_INSUFFICIENT_DATA ((psa_status_t)-143)
286
289#define PSA_ERROR_INVALID_HANDLE ((psa_status_t)-136)
290
313#define PSA_ERROR_DATA_CORRUPT ((psa_status_t)-152)
314
329#define PSA_ERROR_DATA_INVALID ((psa_status_t)-153)
330
337/* Note that key type values, including ECC family and DH group values, are
338 * embedded in the persistent key store, as part of key metadata. As a
339 * consequence, they must not be changed (unless the storage format version
340 * changes).
341 */
342
347#define PSA_KEY_TYPE_NONE ((psa_key_type_t)0x0000)
348
356#define PSA_KEY_TYPE_VENDOR_FLAG ((psa_key_type_t)0x8000)
357
358#define PSA_KEY_TYPE_CATEGORY_MASK ((psa_key_type_t)0x7000)
359#define PSA_KEY_TYPE_CATEGORY_RAW ((psa_key_type_t)0x1000)
360#define PSA_KEY_TYPE_CATEGORY_SYMMETRIC ((psa_key_type_t)0x2000)
361#define PSA_KEY_TYPE_CATEGORY_PUBLIC_KEY ((psa_key_type_t)0x4000)
362#define PSA_KEY_TYPE_CATEGORY_KEY_PAIR ((psa_key_type_t)0x7000)
363
364#define PSA_KEY_TYPE_CATEGORY_FLAG_PAIR ((psa_key_type_t)0x3000)
365
370#define PSA_KEY_TYPE_IS_VENDOR_DEFINED(type) \
371 (((type) & PSA_KEY_TYPE_VENDOR_FLAG) != 0)
372
377#define PSA_KEY_TYPE_IS_UNSTRUCTURED(type) \
378 (((type) & PSA_KEY_TYPE_CATEGORY_MASK) == PSA_KEY_TYPE_CATEGORY_RAW || \
379 ((type) & PSA_KEY_TYPE_CATEGORY_MASK) == PSA_KEY_TYPE_CATEGORY_SYMMETRIC)
380
382#define PSA_KEY_TYPE_IS_ASYMMETRIC(type) \
383 (((type) & PSA_KEY_TYPE_CATEGORY_MASK \
384 & ~PSA_KEY_TYPE_CATEGORY_FLAG_PAIR) == \
385 PSA_KEY_TYPE_CATEGORY_PUBLIC_KEY)
387#define PSA_KEY_TYPE_IS_PUBLIC_KEY(type) \
388 (((type) & PSA_KEY_TYPE_CATEGORY_MASK) == PSA_KEY_TYPE_CATEGORY_PUBLIC_KEY)
391#define PSA_KEY_TYPE_IS_KEY_PAIR(type) \
392 (((type) & PSA_KEY_TYPE_CATEGORY_MASK) == PSA_KEY_TYPE_CATEGORY_KEY_PAIR)
403#define PSA_KEY_TYPE_KEY_PAIR_OF_PUBLIC_KEY(type) \
404 ((type) | PSA_KEY_TYPE_CATEGORY_FLAG_PAIR)
415#define PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(type) \
416 ((type) & ~PSA_KEY_TYPE_CATEGORY_FLAG_PAIR)
417
422#define PSA_KEY_TYPE_RAW_DATA ((psa_key_type_t)0x1001)
423
432#define PSA_KEY_TYPE_HMAC ((psa_key_type_t)0x1100)
433
445#define PSA_KEY_TYPE_DERIVE ((psa_key_type_t)0x1200)
446
468#define PSA_KEY_TYPE_PASSWORD ((psa_key_type_t)0x1203)
469
476#define PSA_KEY_TYPE_PASSWORD_HASH ((psa_key_type_t)0x1205)
477
483#define PSA_KEY_TYPE_PEPPER ((psa_key_type_t)0x1206)
484
490#define PSA_KEY_TYPE_AES ((psa_key_type_t)0x2400)
491
494#define PSA_KEY_TYPE_ARIA ((psa_key_type_t)0x2406)
495
505#define PSA_KEY_TYPE_DES ((psa_key_type_t)0x2301)
506
509#define PSA_KEY_TYPE_CAMELLIA ((psa_key_type_t)0x2403)
510
522#define PSA_KEY_TYPE_CHACHA20 ((psa_key_type_t)0x2004)
523
528#define PSA_KEY_TYPE_RSA_PUBLIC_KEY ((psa_key_type_t)0x4001)
533#define PSA_KEY_TYPE_RSA_KEY_PAIR ((psa_key_type_t)0x7001)
535#define PSA_KEY_TYPE_IS_RSA(type) \
536 (PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(type) == PSA_KEY_TYPE_RSA_PUBLIC_KEY)
537
538#define PSA_KEY_TYPE_ECC_PUBLIC_KEY_BASE ((psa_key_type_t)0x4100)
539#define PSA_KEY_TYPE_ECC_KEY_PAIR_BASE ((psa_key_type_t)0x7100)
540#define PSA_KEY_TYPE_ECC_CURVE_MASK ((psa_key_type_t)0x00ff)
550#define PSA_KEY_TYPE_ECC_KEY_PAIR(curve) \
551 (PSA_KEY_TYPE_ECC_KEY_PAIR_BASE | (curve))
561#define PSA_KEY_TYPE_ECC_PUBLIC_KEY(curve) \
562 (PSA_KEY_TYPE_ECC_PUBLIC_KEY_BASE | (curve))
563
565#define PSA_KEY_TYPE_IS_ECC(type) \
566 ((PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(type) & \
567 ~PSA_KEY_TYPE_ECC_CURVE_MASK) == PSA_KEY_TYPE_ECC_PUBLIC_KEY_BASE)
569#define PSA_KEY_TYPE_IS_ECC_KEY_PAIR(type) \
570 (((type) & ~PSA_KEY_TYPE_ECC_CURVE_MASK) == \
571 PSA_KEY_TYPE_ECC_KEY_PAIR_BASE)
573#define PSA_KEY_TYPE_IS_ECC_PUBLIC_KEY(type) \
574 (((type) & ~PSA_KEY_TYPE_ECC_CURVE_MASK) == \
575 PSA_KEY_TYPE_ECC_PUBLIC_KEY_BASE)
576
578#define PSA_KEY_TYPE_ECC_GET_FAMILY(type) \
579 ((psa_ecc_family_t) (PSA_KEY_TYPE_IS_ECC(type) ? \
580 ((type) & PSA_KEY_TYPE_ECC_CURVE_MASK) : \
581 0))
582
584#define PSA_ECC_FAMILY_IS_WEIERSTRASS(family) ((family & 0xc0) == 0)
585
594#define PSA_ECC_FAMILY_SECP_K1 ((psa_ecc_family_t) 0x17)
595
604#define PSA_ECC_FAMILY_SECP_R1 ((psa_ecc_family_t) 0x12)
605/* SECP160R2 (SEC2 v1, obsolete) */
606#define PSA_ECC_FAMILY_SECP_R2 ((psa_ecc_family_t) 0x1b)
607
616#define PSA_ECC_FAMILY_SECT_K1 ((psa_ecc_family_t) 0x27)
617
626#define PSA_ECC_FAMILY_SECT_R1 ((psa_ecc_family_t) 0x22)
627
636#define PSA_ECC_FAMILY_SECT_R2 ((psa_ecc_family_t) 0x2b)
637
645#define PSA_ECC_FAMILY_BRAINPOOL_P_R1 ((psa_ecc_family_t) 0x30)
646
657#define PSA_ECC_FAMILY_MONTGOMERY ((psa_ecc_family_t) 0x41)
658
673#define PSA_ECC_FAMILY_TWISTED_EDWARDS ((psa_ecc_family_t) 0x42)
674
675#define PSA_KEY_TYPE_DH_PUBLIC_KEY_BASE ((psa_key_type_t)0x4200)
676#define PSA_KEY_TYPE_DH_KEY_PAIR_BASE ((psa_key_type_t)0x7200)
677#define PSA_KEY_TYPE_DH_GROUP_MASK ((psa_key_type_t)0x00ff)
683#define PSA_KEY_TYPE_DH_KEY_PAIR(group) \
684 (PSA_KEY_TYPE_DH_KEY_PAIR_BASE | (group))
690#define PSA_KEY_TYPE_DH_PUBLIC_KEY(group) \
691 (PSA_KEY_TYPE_DH_PUBLIC_KEY_BASE | (group))
692
694#define PSA_KEY_TYPE_IS_DH(type) \
695 ((PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(type) & \
696 ~PSA_KEY_TYPE_DH_GROUP_MASK) == PSA_KEY_TYPE_DH_PUBLIC_KEY_BASE)
698#define PSA_KEY_TYPE_IS_DH_KEY_PAIR(type) \
699 (((type) & ~PSA_KEY_TYPE_DH_GROUP_MASK) == \
700 PSA_KEY_TYPE_DH_KEY_PAIR_BASE)
702#define PSA_KEY_TYPE_IS_DH_PUBLIC_KEY(type) \
703 (((type) & ~PSA_KEY_TYPE_DH_GROUP_MASK) == \
704 PSA_KEY_TYPE_DH_PUBLIC_KEY_BASE)
705
707#define PSA_KEY_TYPE_DH_GET_FAMILY(type) \
708 ((psa_dh_family_t) (PSA_KEY_TYPE_IS_DH(type) ? \
709 ((type) & PSA_KEY_TYPE_DH_GROUP_MASK) : \
710 0))
711
718#define PSA_DH_FAMILY_RFC7919 ((psa_dh_family_t) 0x03)
719
720#define PSA_GET_KEY_TYPE_BLOCK_SIZE_EXPONENT(type) \
721 (((type) >> 8) & 7)
740#define PSA_BLOCK_CIPHER_BLOCK_LENGTH(type) \
741 (((type) & PSA_KEY_TYPE_CATEGORY_MASK) == PSA_KEY_TYPE_CATEGORY_SYMMETRIC ? \
742 1u << PSA_GET_KEY_TYPE_BLOCK_SIZE_EXPONENT(type) : \
743 0u)
744
745/* Note that algorithm values are embedded in the persistent key store,
746 * as part of key metadata. As a consequence, they must not be changed
747 * (unless the storage format version changes).
748 */
749
757#define PSA_ALG_VENDOR_FLAG ((psa_algorithm_t)0x80000000)
758
759#define PSA_ALG_CATEGORY_MASK ((psa_algorithm_t)0x7f000000)
760#define PSA_ALG_CATEGORY_HASH ((psa_algorithm_t)0x02000000)
761#define PSA_ALG_CATEGORY_MAC ((psa_algorithm_t)0x03000000)
762#define PSA_ALG_CATEGORY_CIPHER ((psa_algorithm_t)0x04000000)
763#define PSA_ALG_CATEGORY_AEAD ((psa_algorithm_t)0x05000000)
764#define PSA_ALG_CATEGORY_SIGN ((psa_algorithm_t)0x06000000)
765#define PSA_ALG_CATEGORY_ASYMMETRIC_ENCRYPTION ((psa_algorithm_t)0x07000000)
766#define PSA_ALG_CATEGORY_KEY_DERIVATION ((psa_algorithm_t)0x08000000)
767#define PSA_ALG_CATEGORY_KEY_AGREEMENT ((psa_algorithm_t)0x09000000)
768
773#define PSA_ALG_IS_VENDOR_DEFINED(alg) \
774 (((alg) & PSA_ALG_VENDOR_FLAG) != 0)
775
784#define PSA_ALG_IS_HASH(alg) \
785 (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_HASH)
786
795#define PSA_ALG_IS_MAC(alg) \
796 (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_MAC)
797
806#define PSA_ALG_IS_CIPHER(alg) \
807 (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_CIPHER)
808
818#define PSA_ALG_IS_AEAD(alg) \
819 (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_AEAD)
820
830#define PSA_ALG_IS_SIGN(alg) \
831 (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_SIGN)
832
842#define PSA_ALG_IS_ASYMMETRIC_ENCRYPTION(alg) \
843 (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_ASYMMETRIC_ENCRYPTION)
844
853#define PSA_ALG_IS_KEY_AGREEMENT(alg) \
854 (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_KEY_AGREEMENT)
855
864#define PSA_ALG_IS_KEY_DERIVATION(alg) \
865 (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_KEY_DERIVATION)
866
881#define PSA_ALG_IS_KEY_DERIVATION_STRETCHING(alg) \
882 (PSA_ALG_IS_KEY_DERIVATION(alg) && \
883 (alg) & PSA_ALG_KEY_DERIVATION_STRETCHING_FLAG)
884
886#define PSA_ALG_NONE ((psa_algorithm_t)0)
887
888#define PSA_ALG_HASH_MASK ((psa_algorithm_t)0x000000ff)
890#define PSA_ALG_MD5 ((psa_algorithm_t)0x02000003)
892#define PSA_ALG_RIPEMD160 ((psa_algorithm_t)0x02000004)
894#define PSA_ALG_SHA_1 ((psa_algorithm_t)0x02000005)
896#define PSA_ALG_SHA_224 ((psa_algorithm_t)0x02000008)
898#define PSA_ALG_SHA_256 ((psa_algorithm_t)0x02000009)
900#define PSA_ALG_SHA_384 ((psa_algorithm_t)0x0200000a)
902#define PSA_ALG_SHA_512 ((psa_algorithm_t)0x0200000b)
904#define PSA_ALG_SHA_512_224 ((psa_algorithm_t)0x0200000c)
906#define PSA_ALG_SHA_512_256 ((psa_algorithm_t)0x0200000d)
908#define PSA_ALG_SHA3_224 ((psa_algorithm_t)0x02000010)
910#define PSA_ALG_SHA3_256 ((psa_algorithm_t)0x02000011)
912#define PSA_ALG_SHA3_384 ((psa_algorithm_t)0x02000012)
914#define PSA_ALG_SHA3_512 ((psa_algorithm_t)0x02000013)
921#define PSA_ALG_SHAKE256_512 ((psa_algorithm_t)0x02000015)
922
956#define PSA_ALG_ANY_HASH ((psa_algorithm_t)0x020000ff)
957
958#define PSA_ALG_MAC_SUBCATEGORY_MASK ((psa_algorithm_t)0x00c00000)
959#define PSA_ALG_HMAC_BASE ((psa_algorithm_t)0x03800000)
971#define PSA_ALG_HMAC(hash_alg) \
972 (PSA_ALG_HMAC_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
973
974#define PSA_ALG_HMAC_GET_HASH(hmac_alg) \
975 (PSA_ALG_CATEGORY_HASH | ((hmac_alg) & PSA_ALG_HASH_MASK))
976
987#define PSA_ALG_IS_HMAC(alg) \
988 (((alg) & (PSA_ALG_CATEGORY_MASK | PSA_ALG_MAC_SUBCATEGORY_MASK)) == \
989 PSA_ALG_HMAC_BASE)
990
991/* In the encoding of a MAC algorithm, the bits corresponding to
992 * PSA_ALG_MAC_TRUNCATION_MASK encode the length to which the MAC is
993 * truncated. As an exception, the value 0 means the untruncated algorithm,
994 * whatever its length is. The length is encoded in 6 bits, so it can
995 * reach up to 63; the largest MAC is 64 bytes so its trivial truncation
996 * to full length is correctly encoded as 0 and any non-trivial truncation
997 * is correctly encoded as a value between 1 and 63. */
998#define PSA_ALG_MAC_TRUNCATION_MASK ((psa_algorithm_t)0x003f0000)
999#define PSA_MAC_TRUNCATION_OFFSET 16
1000
1001/* In the encoding of a MAC algorithm, the bit corresponding to
1002 * #PSA_ALG_MAC_AT_LEAST_THIS_LENGTH_FLAG encodes the fact that the algorithm
1003 * is a wildcard algorithm. A key with such wildcard algorithm as permitted
1004 * algorithm policy can be used with any algorithm corresponding to the
1005 * same base class and having a (potentially truncated) MAC length greater or
1006 * equal than the one encoded in #PSA_ALG_MAC_TRUNCATION_MASK. */
1007#define PSA_ALG_MAC_AT_LEAST_THIS_LENGTH_FLAG ((psa_algorithm_t)0x00008000)
1008
1042#define PSA_ALG_TRUNCATED_MAC(mac_alg, mac_length) \
1043 (((mac_alg) & ~(PSA_ALG_MAC_TRUNCATION_MASK | \
1044 PSA_ALG_MAC_AT_LEAST_THIS_LENGTH_FLAG)) | \
1045 ((mac_length) << PSA_MAC_TRUNCATION_OFFSET & PSA_ALG_MAC_TRUNCATION_MASK))
1046
1059#define PSA_ALG_FULL_LENGTH_MAC(mac_alg) \
1060 ((mac_alg) & ~(PSA_ALG_MAC_TRUNCATION_MASK | \
1061 PSA_ALG_MAC_AT_LEAST_THIS_LENGTH_FLAG))
1062
1074#define PSA_MAC_TRUNCATED_LENGTH(mac_alg) \
1075 (((mac_alg) & PSA_ALG_MAC_TRUNCATION_MASK) >> PSA_MAC_TRUNCATION_OFFSET)
1076
1101#define PSA_ALG_AT_LEAST_THIS_LENGTH_MAC(mac_alg, min_mac_length) \
1102 ( PSA_ALG_TRUNCATED_MAC(mac_alg, min_mac_length) | \
1103 PSA_ALG_MAC_AT_LEAST_THIS_LENGTH_FLAG )
1104
1105#define PSA_ALG_CIPHER_MAC_BASE ((psa_algorithm_t)0x03c00000)
1111#define PSA_ALG_CBC_MAC ((psa_algorithm_t)0x03c00100)
1113#define PSA_ALG_CMAC ((psa_algorithm_t)0x03c00200)
1114
1123#define PSA_ALG_IS_BLOCK_CIPHER_MAC(alg) \
1124 (((alg) & (PSA_ALG_CATEGORY_MASK | PSA_ALG_MAC_SUBCATEGORY_MASK)) == \
1125 PSA_ALG_CIPHER_MAC_BASE)
1126
1127#define PSA_ALG_CIPHER_STREAM_FLAG ((psa_algorithm_t)0x00800000)
1128#define PSA_ALG_CIPHER_FROM_BLOCK_FLAG ((psa_algorithm_t)0x00400000)
1129
1142#define PSA_ALG_IS_STREAM_CIPHER(alg) \
1143 (((alg) & (PSA_ALG_CATEGORY_MASK | PSA_ALG_CIPHER_STREAM_FLAG)) == \
1144 (PSA_ALG_CATEGORY_CIPHER | PSA_ALG_CIPHER_STREAM_FLAG))
1145
1151#define PSA_ALG_STREAM_CIPHER ((psa_algorithm_t)0x04800100)
1152
1160#define PSA_ALG_CTR ((psa_algorithm_t)0x04c01000)
1161
1166#define PSA_ALG_CFB ((psa_algorithm_t)0x04c01100)
1167
1172#define PSA_ALG_OFB ((psa_algorithm_t)0x04c01200)
1173
1180#define PSA_ALG_XTS ((psa_algorithm_t)0x0440ff00)
1181
1200#define PSA_ALG_ECB_NO_PADDING ((psa_algorithm_t)0x04404400)
1201
1209#define PSA_ALG_CBC_NO_PADDING ((psa_algorithm_t)0x04404000)
1210
1217#define PSA_ALG_CBC_PKCS7 ((psa_algorithm_t)0x04404100)
1218
1219#define PSA_ALG_AEAD_FROM_BLOCK_FLAG ((psa_algorithm_t)0x00400000)
1220
1230#define PSA_ALG_IS_AEAD_ON_BLOCK_CIPHER(alg) \
1231 (((alg) & (PSA_ALG_CATEGORY_MASK | PSA_ALG_AEAD_FROM_BLOCK_FLAG)) == \
1232 (PSA_ALG_CATEGORY_AEAD | PSA_ALG_AEAD_FROM_BLOCK_FLAG))
1233
1238#define PSA_ALG_CCM ((psa_algorithm_t)0x05500100)
1239
1249#define PSA_ALG_CCM_STAR_NO_TAG ((psa_algorithm_t)0x04c01300)
1250
1255#define PSA_ALG_GCM ((psa_algorithm_t)0x05500200)
1256
1266#define PSA_ALG_CHACHA20_POLY1305 ((psa_algorithm_t)0x05100500)
1267
1268/* In the encoding of an AEAD algorithm, the bits corresponding to
1269 * PSA_ALG_AEAD_TAG_LENGTH_MASK encode the length of the AEAD tag.
1270 * The constants for default lengths follow this encoding.
1271 */
1272#define PSA_ALG_AEAD_TAG_LENGTH_MASK ((psa_algorithm_t)0x003f0000)
1273#define PSA_AEAD_TAG_LENGTH_OFFSET 16
1274
1275/* In the encoding of an AEAD algorithm, the bit corresponding to
1276 * #PSA_ALG_AEAD_AT_LEAST_THIS_LENGTH_FLAG encodes the fact that the algorithm
1277 * is a wildcard algorithm. A key with such wildcard algorithm as permitted
1278 * algorithm policy can be used with any algorithm corresponding to the
1279 * same base class and having a tag length greater than or equal to the one
1280 * encoded in #PSA_ALG_AEAD_TAG_LENGTH_MASK. */
1281#define PSA_ALG_AEAD_AT_LEAST_THIS_LENGTH_FLAG ((psa_algorithm_t)0x00008000)
1282
1301#define PSA_ALG_AEAD_WITH_SHORTENED_TAG(aead_alg, tag_length) \
1302 (((aead_alg) & ~(PSA_ALG_AEAD_TAG_LENGTH_MASK | \
1303 PSA_ALG_AEAD_AT_LEAST_THIS_LENGTH_FLAG)) | \
1304 ((tag_length) << PSA_AEAD_TAG_LENGTH_OFFSET & \
1305 PSA_ALG_AEAD_TAG_LENGTH_MASK))
1306
1317#define PSA_ALG_AEAD_GET_TAG_LENGTH(aead_alg) \
1318 (((aead_alg) & PSA_ALG_AEAD_TAG_LENGTH_MASK) >> \
1319 PSA_AEAD_TAG_LENGTH_OFFSET )
1320
1329#define PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG(aead_alg) \
1330 ( \
1331 PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG_CASE(aead_alg, PSA_ALG_CCM) \
1332 PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG_CASE(aead_alg, PSA_ALG_GCM) \
1333 PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG_CASE(aead_alg, PSA_ALG_CHACHA20_POLY1305) \
1334 0)
1335#define PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG_CASE(aead_alg, ref) \
1336 PSA_ALG_AEAD_WITH_SHORTENED_TAG(aead_alg, 0) == \
1337 PSA_ALG_AEAD_WITH_SHORTENED_TAG(ref, 0) ? \
1338 ref :
1339
1364#define PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(aead_alg, min_tag_length) \
1365 ( PSA_ALG_AEAD_WITH_SHORTENED_TAG(aead_alg, min_tag_length) | \
1366 PSA_ALG_AEAD_AT_LEAST_THIS_LENGTH_FLAG )
1367
1368#define PSA_ALG_RSA_PKCS1V15_SIGN_BASE ((psa_algorithm_t)0x06000200)
1384#define PSA_ALG_RSA_PKCS1V15_SIGN(hash_alg) \
1385 (PSA_ALG_RSA_PKCS1V15_SIGN_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1392#define PSA_ALG_RSA_PKCS1V15_SIGN_RAW PSA_ALG_RSA_PKCS1V15_SIGN_BASE
1393#define PSA_ALG_IS_RSA_PKCS1V15_SIGN(alg) \
1394 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_RSA_PKCS1V15_SIGN_BASE)
1395
1396#define PSA_ALG_RSA_PSS_BASE ((psa_algorithm_t)0x06000300)
1397#define PSA_ALG_RSA_PSS_ANY_SALT_BASE ((psa_algorithm_t)0x06001300)
1418#define PSA_ALG_RSA_PSS(hash_alg) \
1419 (PSA_ALG_RSA_PSS_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1420
1436#define PSA_ALG_RSA_PSS_ANY_SALT(hash_alg) \
1437 (PSA_ALG_RSA_PSS_ANY_SALT_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1438
1450#define PSA_ALG_IS_RSA_PSS_STANDARD_SALT(alg) \
1451 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_RSA_PSS_BASE)
1452
1464#define PSA_ALG_IS_RSA_PSS_ANY_SALT(alg) \
1465 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_RSA_PSS_ANY_SALT_BASE)
1466
1482#define PSA_ALG_IS_RSA_PSS(alg) \
1483 (PSA_ALG_IS_RSA_PSS_STANDARD_SALT(alg) || \
1484 PSA_ALG_IS_RSA_PSS_ANY_SALT(alg))
1485
1486#define PSA_ALG_ECDSA_BASE ((psa_algorithm_t)0x06000600)
1507#define PSA_ALG_ECDSA(hash_alg) \
1508 (PSA_ALG_ECDSA_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1518#define PSA_ALG_ECDSA_ANY PSA_ALG_ECDSA_BASE
1519#define PSA_ALG_DETERMINISTIC_ECDSA_BASE ((psa_algorithm_t)0x06000700)
1542#define PSA_ALG_DETERMINISTIC_ECDSA(hash_alg) \
1543 (PSA_ALG_DETERMINISTIC_ECDSA_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1544#define PSA_ALG_ECDSA_DETERMINISTIC_FLAG ((psa_algorithm_t)0x00000100)
1545#define PSA_ALG_IS_ECDSA(alg) \
1546 (((alg) & ~PSA_ALG_HASH_MASK & ~PSA_ALG_ECDSA_DETERMINISTIC_FLAG) == \
1547 PSA_ALG_ECDSA_BASE)
1548#define PSA_ALG_ECDSA_IS_DETERMINISTIC(alg) \
1549 (((alg) & PSA_ALG_ECDSA_DETERMINISTIC_FLAG) != 0)
1550#define PSA_ALG_IS_DETERMINISTIC_ECDSA(alg) \
1551 (PSA_ALG_IS_ECDSA(alg) && PSA_ALG_ECDSA_IS_DETERMINISTIC(alg))
1552#define PSA_ALG_IS_RANDOMIZED_ECDSA(alg) \
1553 (PSA_ALG_IS_ECDSA(alg) && !PSA_ALG_ECDSA_IS_DETERMINISTIC(alg))
1554
1583#define PSA_ALG_PURE_EDDSA ((psa_algorithm_t)0x06000800)
1584
1585#define PSA_ALG_HASH_EDDSA_BASE ((psa_algorithm_t)0x06000900)
1586#define PSA_ALG_IS_HASH_EDDSA(alg) \
1587 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HASH_EDDSA_BASE)
1588
1610#define PSA_ALG_ED25519PH \
1611 (PSA_ALG_HASH_EDDSA_BASE | (PSA_ALG_SHA_512 & PSA_ALG_HASH_MASK))
1612
1635#define PSA_ALG_ED448PH \
1636 (PSA_ALG_HASH_EDDSA_BASE | (PSA_ALG_SHAKE256_512 & PSA_ALG_HASH_MASK))
1637
1638/* Default definition, to be overridden if the library is extended with
1639 * more hash-and-sign algorithms that we want to keep out of this header
1640 * file. */
1641#define PSA_ALG_IS_VENDOR_HASH_AND_SIGN(alg) 0
1642
1660#define PSA_ALG_IS_SIGN_HASH(alg) \
1661 (PSA_ALG_IS_RSA_PSS(alg) || PSA_ALG_IS_RSA_PKCS1V15_SIGN(alg) || \
1662 PSA_ALG_IS_ECDSA(alg) || PSA_ALG_IS_HASH_EDDSA(alg) || \
1663 PSA_ALG_IS_VENDOR_HASH_AND_SIGN(alg))
1664
1676#define PSA_ALG_IS_SIGN_MESSAGE(alg) \
1677 (PSA_ALG_IS_SIGN_HASH(alg) || (alg) == PSA_ALG_PURE_EDDSA )
1678
1705#define PSA_ALG_IS_HASH_AND_SIGN(alg) \
1706 (PSA_ALG_IS_SIGN_HASH(alg) && \
1707 ((alg) & PSA_ALG_HASH_MASK) != 0)
1708
1727#define PSA_ALG_SIGN_GET_HASH(alg) \
1728 (PSA_ALG_IS_HASH_AND_SIGN(alg) ? \
1729 ((alg) & PSA_ALG_HASH_MASK) | PSA_ALG_CATEGORY_HASH : \
1730 0)
1731
1734#define PSA_ALG_RSA_PKCS1V15_CRYPT ((psa_algorithm_t)0x07000200)
1735
1736#define PSA_ALG_RSA_OAEP_BASE ((psa_algorithm_t)0x07000300)
1751#define PSA_ALG_RSA_OAEP(hash_alg) \
1752 (PSA_ALG_RSA_OAEP_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1753#define PSA_ALG_IS_RSA_OAEP(alg) \
1754 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_RSA_OAEP_BASE)
1755#define PSA_ALG_RSA_OAEP_GET_HASH(alg) \
1756 (PSA_ALG_IS_RSA_OAEP(alg) ? \
1757 ((alg) & PSA_ALG_HASH_MASK) | PSA_ALG_CATEGORY_HASH : \
1758 0)
1759
1760#define PSA_ALG_HKDF_BASE ((psa_algorithm_t)0x08000100)
1787#define PSA_ALG_HKDF(hash_alg) \
1788 (PSA_ALG_HKDF_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1800#define PSA_ALG_IS_HKDF(alg) \
1801 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HKDF_BASE)
1802#define PSA_ALG_HKDF_GET_HASH(hkdf_alg) \
1803 (PSA_ALG_CATEGORY_HASH | ((hkdf_alg) & PSA_ALG_HASH_MASK))
1804
1805#define PSA_ALG_HKDF_EXTRACT_BASE ((psa_algorithm_t)0x08000400)
1838#define PSA_ALG_HKDF_EXTRACT(hash_alg) \
1839 (PSA_ALG_HKDF_EXTRACT_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1851#define PSA_ALG_IS_HKDF_EXTRACT(alg) \
1852 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HKDF_EXTRACT_BASE)
1853
1854#define PSA_ALG_HKDF_EXPAND_BASE ((psa_algorithm_t)0x08000500)
1880#define PSA_ALG_HKDF_EXPAND(hash_alg) \
1881 (PSA_ALG_HKDF_EXPAND_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1893#define PSA_ALG_IS_HKDF_EXPAND(alg) \
1894 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HKDF_EXPAND_BASE)
1895
1906#define PSA_ALG_IS_ANY_HKDF(alg) \
1907 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HKDF_BASE || \
1908 ((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HKDF_EXTRACT_BASE || \
1909 ((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HKDF_EXPAND_BASE)
1910
1911#define PSA_ALG_TLS12_PRF_BASE ((psa_algorithm_t)0x08000200)
1938#define PSA_ALG_TLS12_PRF(hash_alg) \
1939 (PSA_ALG_TLS12_PRF_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1940
1949#define PSA_ALG_IS_TLS12_PRF(alg) \
1950 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_TLS12_PRF_BASE)
1951#define PSA_ALG_TLS12_PRF_GET_HASH(hkdf_alg) \
1952 (PSA_ALG_CATEGORY_HASH | ((hkdf_alg) & PSA_ALG_HASH_MASK))
1953
1954#define PSA_ALG_TLS12_PSK_TO_MS_BASE ((psa_algorithm_t)0x08000300)
2008#define PSA_ALG_TLS12_PSK_TO_MS(hash_alg) \
2009 (PSA_ALG_TLS12_PSK_TO_MS_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
2010
2019#define PSA_ALG_IS_TLS12_PSK_TO_MS(alg) \
2020 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_TLS12_PSK_TO_MS_BASE)
2021#define PSA_ALG_TLS12_PSK_TO_MS_GET_HASH(hkdf_alg) \
2022 (PSA_ALG_CATEGORY_HASH | ((hkdf_alg) & PSA_ALG_HASH_MASK))
2023
2024/* The TLS 1.2 ECJPAKE-to-PMS KDF. It takes the shared secret K (an EC point
2025 * in case of EC J-PAKE) and calculates SHA256(K.X) that the rest of TLS 1.2
2026 * will use to derive the session secret, as defined by step 2 of
2027 * https://datatracker.ietf.org/doc/html/draft-cragie-tls-ecjpake-01#section-8.7.
2028 * Uses PSA_ALG_SHA_256.
2029 * This function takes a single input:
2030 * #PSA_KEY_DERIVATION_INPUT_SECRET is the shared secret K from EC J-PAKE.
2031 * The only supported curve is secp256r1 (the 256-bit curve in
2032 * #PSA_ECC_FAMILY_SECP_R1), so the input must be exactly 65 bytes.
2033 * The output has to be read as a single chunk of 32 bytes, defined as
2034 * PSA_TLS12_ECJPAKE_TO_PMS_DATA_SIZE.
2035 */
2036#define PSA_ALG_TLS12_ECJPAKE_TO_PMS ((psa_algorithm_t)0x08000609)
2037
2038/* This flag indicates whether the key derivation algorithm is suitable for
2039 * use on low-entropy secrets such as password - these algorithms are also
2040 * known as key stretching or password hashing schemes. These are also the
2041 * algorithms that accepts inputs of type #PSA_KEY_DERIVATION_INPUT_PASSWORD.
2042 *
2043 * Those algorithms cannot be combined with a key agreement algorithm.
2044 */
2045#define PSA_ALG_KEY_DERIVATION_STRETCHING_FLAG ((psa_algorithm_t)0x00800000)
2046
2047#define PSA_ALG_PBKDF2_HMAC_BASE ((psa_algorithm_t)0x08800100)
2074#define PSA_ALG_PBKDF2_HMAC(hash_alg) \
2075 (PSA_ALG_PBKDF2_HMAC_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
2076
2085#define PSA_ALG_IS_PBKDF2_HMAC(alg) \
2086 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_PBKDF2_HMAC_BASE)
2087
2097#define PSA_ALG_PBKDF2_AES_CMAC_PRF_128 ((psa_algorithm_t)0x08800200)
2098
2099#define PSA_ALG_KEY_DERIVATION_MASK ((psa_algorithm_t)0xfe00ffff)
2100#define PSA_ALG_KEY_AGREEMENT_MASK ((psa_algorithm_t)0xffff0000)
2101
2116#define PSA_ALG_KEY_AGREEMENT(ka_alg, kdf_alg) \
2117 ((ka_alg) | (kdf_alg))
2118
2119#define PSA_ALG_KEY_AGREEMENT_GET_KDF(alg) \
2120 (((alg) & PSA_ALG_KEY_DERIVATION_MASK) | PSA_ALG_CATEGORY_KEY_DERIVATION)
2121
2122#define PSA_ALG_KEY_AGREEMENT_GET_BASE(alg) \
2123 (((alg) & PSA_ALG_KEY_AGREEMENT_MASK) | PSA_ALG_CATEGORY_KEY_AGREEMENT)
2124
2139#define PSA_ALG_IS_RAW_KEY_AGREEMENT(alg) \
2140 (PSA_ALG_IS_KEY_AGREEMENT(alg) && \
2141 PSA_ALG_KEY_AGREEMENT_GET_KDF(alg) == PSA_ALG_CATEGORY_KEY_DERIVATION)
2142
2143#define PSA_ALG_IS_KEY_DERIVATION_OR_AGREEMENT(alg) \
2144 ((PSA_ALG_IS_KEY_DERIVATION(alg) || PSA_ALG_IS_KEY_AGREEMENT(alg)))
2145
2153#define PSA_ALG_FFDH ((psa_algorithm_t)0x09010000)
2154
2167#define PSA_ALG_IS_FFDH(alg) \
2168 (PSA_ALG_KEY_AGREEMENT_GET_BASE(alg) == PSA_ALG_FFDH)
2169
2195#define PSA_ALG_ECDH ((psa_algorithm_t)0x09020000)
2196
2211#define PSA_ALG_IS_ECDH(alg) \
2212 (PSA_ALG_KEY_AGREEMENT_GET_BASE(alg) == PSA_ALG_ECDH)
2213
2227#define PSA_ALG_IS_WILDCARD(alg) \
2228 (PSA_ALG_IS_HASH_AND_SIGN(alg) ? \
2229 PSA_ALG_SIGN_GET_HASH(alg) == PSA_ALG_ANY_HASH : \
2230 PSA_ALG_IS_MAC(alg) ? \
2231 (alg & PSA_ALG_MAC_AT_LEAST_THIS_LENGTH_FLAG) != 0 : \
2232 PSA_ALG_IS_AEAD(alg) ? \
2233 (alg & PSA_ALG_AEAD_AT_LEAST_THIS_LENGTH_FLAG) != 0 : \
2234 (alg) == PSA_ALG_ANY_HASH)
2235
2245#define PSA_ALG_GET_HASH(alg) \
2246 (((alg) & 0x000000ff) == 0 ? ((psa_algorithm_t)0) : 0x02000000 | ((alg) & 0x000000ff))
2247
2254/* Note that location and persistence level values are embedded in the
2255 * persistent key store, as part of key metadata. As a consequence, they
2256 * must not be changed (unless the storage format version changes).
2257 */
2258
2270#define PSA_KEY_LIFETIME_VOLATILE ((psa_key_lifetime_t)0x00000000)
2271
2284#define PSA_KEY_LIFETIME_PERSISTENT ((psa_key_lifetime_t)0x00000001)
2285
2290#define PSA_KEY_PERSISTENCE_VOLATILE ((psa_key_persistence_t)0x00)
2291
2296#define PSA_KEY_PERSISTENCE_DEFAULT ((psa_key_persistence_t)0x01)
2297
2302#define PSA_KEY_PERSISTENCE_READ_ONLY ((psa_key_persistence_t)0xff)
2303
2304#define PSA_KEY_LIFETIME_GET_PERSISTENCE(lifetime) \
2305 ((psa_key_persistence_t)((lifetime) & 0x000000ff))
2306
2307#define PSA_KEY_LIFETIME_GET_LOCATION(lifetime) \
2308 ((psa_key_location_t)((lifetime) >> 8))
2309
2326#define PSA_KEY_LIFETIME_IS_VOLATILE(lifetime) \
2327 (PSA_KEY_LIFETIME_GET_PERSISTENCE(lifetime) == \
2328 PSA_KEY_PERSISTENCE_VOLATILE)
2329
2347#define PSA_KEY_LIFETIME_IS_READ_ONLY(lifetime) \
2348 (PSA_KEY_LIFETIME_GET_PERSISTENCE(lifetime) == \
2349 PSA_KEY_PERSISTENCE_READ_ONLY)
2350
2360#define PSA_KEY_LIFETIME_FROM_PERSISTENCE_AND_LOCATION(persistence, location) \
2361 ((location) << 8 | (persistence))
2362
2370#define PSA_KEY_LOCATION_LOCAL_STORAGE ((psa_key_location_t)0x000000)
2371
2372#define PSA_KEY_LOCATION_VENDOR_FLAG ((psa_key_location_t)0x800000)
2373
2374/* Note that key identifier values are embedded in the
2375 * persistent key store, as part of key metadata. As a consequence, they
2376 * must not be changed (unless the storage format version changes).
2377 */
2378
2381#define PSA_KEY_ID_NULL ((psa_key_id_t)0)
2384#define PSA_KEY_ID_USER_MIN ((psa_key_id_t)0x00000001)
2387#define PSA_KEY_ID_USER_MAX ((psa_key_id_t)0x3fffffff)
2390#define PSA_KEY_ID_VENDOR_MIN ((psa_key_id_t)0x40000000)
2393#define PSA_KEY_ID_VENDOR_MAX ((psa_key_id_t)0x7fffffff)
2394
2395
2396#if !defined(MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER)
2397
2398#define MBEDTLS_SVC_KEY_ID_INIT ( (psa_key_id_t)0 )
2399#define MBEDTLS_SVC_KEY_ID_GET_KEY_ID( id ) ( id )
2400#define MBEDTLS_SVC_KEY_ID_GET_OWNER_ID( id ) ( 0 )
2401
2408 unsigned int unused, psa_key_id_t key_id )
2409{
2410 (void)unused;
2411
2412 return( key_id );
2413}
2414
2424{
2425 return( id1 == id2 );
2426}
2427
2435{
2436 return( key == 0 );
2437}
2438
2439#else /* MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER */
2440
2441#define MBEDTLS_SVC_KEY_ID_INIT ( (mbedtls_svc_key_id_t){ 0, 0 } )
2442#define MBEDTLS_SVC_KEY_ID_GET_KEY_ID( id ) ( ( id ).MBEDTLS_PRIVATE(key_id) )
2443#define MBEDTLS_SVC_KEY_ID_GET_OWNER_ID( id ) ( ( id ).MBEDTLS_PRIVATE(owner) )
2444
2451 mbedtls_key_owner_id_t owner_id, psa_key_id_t key_id )
2452{
2453 return( (mbedtls_svc_key_id_t){ .MBEDTLS_PRIVATE(key_id) = key_id,
2454 .MBEDTLS_PRIVATE(owner) = owner_id } );
2455}
2456
2464static inline int mbedtls_svc_key_id_equal( mbedtls_svc_key_id_t id1,
2466{
2467 return( ( id1.MBEDTLS_PRIVATE(key_id) == id2.MBEDTLS_PRIVATE(key_id) ) &&
2468 mbedtls_key_owner_id_equal( id1.MBEDTLS_PRIVATE(owner), id2.MBEDTLS_PRIVATE(owner) ) );
2469}
2470
2477static inline int mbedtls_svc_key_id_is_null( mbedtls_svc_key_id_t key )
2478{
2479 return( key.MBEDTLS_PRIVATE(key_id) == 0 );
2480}
2481
2482#endif /* !MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER */
2483
2490/* Note that key usage flags are embedded in the
2491 * persistent key store, as part of key metadata. As a consequence, they
2492 * must not be changed (unless the storage format version changes).
2493 */
2494
2506#define PSA_KEY_USAGE_EXPORT ((psa_key_usage_t)0x00000001)
2507
2522#define PSA_KEY_USAGE_COPY ((psa_key_usage_t)0x00000002)
2523
2533#define PSA_KEY_USAGE_ENCRYPT ((psa_key_usage_t)0x00000100)
2534
2544#define PSA_KEY_USAGE_DECRYPT ((psa_key_usage_t)0x00000200)
2545
2554#define PSA_KEY_USAGE_SIGN_MESSAGE ((psa_key_usage_t)0x00000400)
2555
2564#define PSA_KEY_USAGE_VERIFY_MESSAGE ((psa_key_usage_t)0x00000800)
2565
2574#define PSA_KEY_USAGE_SIGN_HASH ((psa_key_usage_t)0x00001000)
2575
2584#define PSA_KEY_USAGE_VERIFY_HASH ((psa_key_usage_t)0x00002000)
2585
2598#define PSA_KEY_USAGE_DERIVE ((psa_key_usage_t)0x00004000)
2599
2613#define PSA_KEY_USAGE_VERIFY_DERIVATION ((psa_key_usage_t)0x00008000)
2614
2621/* Key input steps are not embedded in the persistent storage, so you can
2622 * change them if needed: it's only an ABI change. */
2623
2639#define PSA_KEY_DERIVATION_INPUT_SECRET ((psa_key_derivation_step_t)0x0101)
2640
2657#define PSA_KEY_DERIVATION_INPUT_PASSWORD ((psa_key_derivation_step_t)0x0102)
2658
2666#define PSA_KEY_DERIVATION_INPUT_OTHER_SECRET \
2667 ((psa_key_derivation_step_t)0x0103)
2668
2674#define PSA_KEY_DERIVATION_INPUT_LABEL ((psa_key_derivation_step_t)0x0201)
2675
2682#define PSA_KEY_DERIVATION_INPUT_SALT ((psa_key_derivation_step_t)0x0202)
2683
2689#define PSA_KEY_DERIVATION_INPUT_INFO ((psa_key_derivation_step_t)0x0203)
2690
2696#define PSA_KEY_DERIVATION_INPUT_SEED ((psa_key_derivation_step_t)0x0204)
2697
2702#define PSA_KEY_DERIVATION_INPUT_COST ((psa_key_derivation_step_t)0x0205)
2703
2710/* Helper macros */
2711
2723#define MBEDTLS_PSA_ALG_AEAD_EQUAL(aead_alg_1, aead_alg_2) \
2724 (!(((aead_alg_1) ^ (aead_alg_2)) & \
2725 ~(PSA_ALG_AEAD_TAG_LENGTH_MASK | PSA_ALG_AEAD_AT_LEAST_THIS_LENGTH_FLAG)))
2726
2729#endif /* PSA_CRYPTO_VALUES_H */
static mbedtls_svc_key_id_t mbedtls_svc_key_id_make(unsigned int unused, psa_key_id_t key_id)
uint32_t psa_key_id_t
Definition: crypto_types.h:279
static int mbedtls_svc_key_id_is_null(mbedtls_svc_key_id_t key)
psa_key_id_t mbedtls_svc_key_id_t
Definition: crypto_types.h:296
static int mbedtls_svc_key_id_equal(mbedtls_svc_key_id_t id1, mbedtls_svc_key_id_t id2)
Macro wrapper for struct's members.
#define MBEDTLS_PRIVATE(member)