Mbed TLS v3.5.2
Loading...
Searching...
No Matches
crypto_values.h
Go to the documentation of this file.
1
22/*
23 * Copyright The Mbed TLS Contributors
24 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
25 */
26
27#ifndef PSA_CRYPTO_VALUES_H
28#define PSA_CRYPTO_VALUES_H
30
35/* PSA error codes */
36
37/* Error codes are standardized across PSA domains (framework, crypto, storage,
38 * etc.). Do not change the values in this section or even the expansions
39 * of each macro: it must be possible to `#include` both this header
40 * and some other PSA component's headers in the same C source,
41 * which will lead to duplicate definitions of the `PSA_SUCCESS` and
42 * `PSA_ERROR_xxx` macros, which is ok if and only if the macros expand
43 * to the same sequence of tokens.
44 *
45 * If you must add a new
46 * value, check with the Arm PSA framework group to pick one that other
47 * domains aren't already using. */
48
49/* Tell uncrustify not to touch the constant definitions, otherwise
50 * it might change the spacing to something that is not PSA-compliant
51 * (e.g. adding a space after casts).
52 *
53 * *INDENT-OFF*
54 */
55
57#define PSA_SUCCESS ((psa_status_t)0)
58
64#define PSA_ERROR_GENERIC_ERROR ((psa_status_t)-132)
65
73#define PSA_ERROR_NOT_SUPPORTED ((psa_status_t)-134)
74
86#define PSA_ERROR_NOT_PERMITTED ((psa_status_t)-133)
87
98#define PSA_ERROR_BUFFER_TOO_SMALL ((psa_status_t)-138)
99
104#define PSA_ERROR_ALREADY_EXISTS ((psa_status_t)-139)
105
110#define PSA_ERROR_DOES_NOT_EXIST ((psa_status_t)-140)
111
126#define PSA_ERROR_BAD_STATE ((psa_status_t)-137)
127
137#define PSA_ERROR_INVALID_ARGUMENT ((psa_status_t)-135)
138
143#define PSA_ERROR_INSUFFICIENT_MEMORY ((psa_status_t)-141)
144
152#define PSA_ERROR_INSUFFICIENT_STORAGE ((psa_status_t)-142)
153
169#define PSA_ERROR_COMMUNICATION_FAILURE ((psa_status_t)-145)
170
194#define PSA_ERROR_STORAGE_FAILURE ((psa_status_t)-146)
195
200#define PSA_ERROR_HARDWARE_FAILURE ((psa_status_t)-147)
201
231#define PSA_ERROR_CORRUPTION_DETECTED ((psa_status_t)-151)
232
250#define PSA_ERROR_INSUFFICIENT_ENTROPY ((psa_status_t)-148)
251
260#define PSA_ERROR_INVALID_SIGNATURE ((psa_status_t)-149)
261
276#define PSA_ERROR_INVALID_PADDING ((psa_status_t)-150)
277
280#define PSA_ERROR_INSUFFICIENT_DATA ((psa_status_t)-143)
281
284#define PSA_ERROR_INVALID_HANDLE ((psa_status_t)-136)
285
308#define PSA_ERROR_DATA_CORRUPT ((psa_status_t)-152)
309
324#define PSA_ERROR_DATA_INVALID ((psa_status_t)-153)
325
331#define PSA_OPERATION_INCOMPLETE ((psa_status_t)-248)
332
333/* *INDENT-ON* */
334
341/* Note that key type values, including ECC family and DH group values, are
342 * embedded in the persistent key store, as part of key metadata. As a
343 * consequence, they must not be changed (unless the storage format version
344 * changes).
345 */
346
351#define PSA_KEY_TYPE_NONE ((psa_key_type_t) 0x0000)
352
360#define PSA_KEY_TYPE_VENDOR_FLAG ((psa_key_type_t) 0x8000)
361
362#define PSA_KEY_TYPE_CATEGORY_MASK ((psa_key_type_t) 0x7000)
363#define PSA_KEY_TYPE_CATEGORY_RAW ((psa_key_type_t) 0x1000)
364#define PSA_KEY_TYPE_CATEGORY_SYMMETRIC ((psa_key_type_t) 0x2000)
365#define PSA_KEY_TYPE_CATEGORY_PUBLIC_KEY ((psa_key_type_t) 0x4000)
366#define PSA_KEY_TYPE_CATEGORY_KEY_PAIR ((psa_key_type_t) 0x7000)
367
368#define PSA_KEY_TYPE_CATEGORY_FLAG_PAIR ((psa_key_type_t) 0x3000)
369
374#define PSA_KEY_TYPE_IS_VENDOR_DEFINED(type) \
375 (((type) & PSA_KEY_TYPE_VENDOR_FLAG) != 0)
376
381#define PSA_KEY_TYPE_IS_UNSTRUCTURED(type) \
382 (((type) & PSA_KEY_TYPE_CATEGORY_MASK) == PSA_KEY_TYPE_CATEGORY_RAW || \
383 ((type) & PSA_KEY_TYPE_CATEGORY_MASK) == PSA_KEY_TYPE_CATEGORY_SYMMETRIC)
384
386#define PSA_KEY_TYPE_IS_ASYMMETRIC(type) \
387 (((type) & PSA_KEY_TYPE_CATEGORY_MASK \
388 & ~PSA_KEY_TYPE_CATEGORY_FLAG_PAIR) == \
389 PSA_KEY_TYPE_CATEGORY_PUBLIC_KEY)
391#define PSA_KEY_TYPE_IS_PUBLIC_KEY(type) \
392 (((type) & PSA_KEY_TYPE_CATEGORY_MASK) == PSA_KEY_TYPE_CATEGORY_PUBLIC_KEY)
395#define PSA_KEY_TYPE_IS_KEY_PAIR(type) \
396 (((type) & PSA_KEY_TYPE_CATEGORY_MASK) == PSA_KEY_TYPE_CATEGORY_KEY_PAIR)
407#define PSA_KEY_TYPE_KEY_PAIR_OF_PUBLIC_KEY(type) \
408 ((type) | PSA_KEY_TYPE_CATEGORY_FLAG_PAIR)
419#define PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(type) \
420 ((type) & ~PSA_KEY_TYPE_CATEGORY_FLAG_PAIR)
421
426#define PSA_KEY_TYPE_RAW_DATA ((psa_key_type_t) 0x1001)
427
436#define PSA_KEY_TYPE_HMAC ((psa_key_type_t) 0x1100)
437
449#define PSA_KEY_TYPE_DERIVE ((psa_key_type_t) 0x1200)
450
472#define PSA_KEY_TYPE_PASSWORD ((psa_key_type_t) 0x1203)
473
480#define PSA_KEY_TYPE_PASSWORD_HASH ((psa_key_type_t) 0x1205)
481
487#define PSA_KEY_TYPE_PEPPER ((psa_key_type_t) 0x1206)
488
494#define PSA_KEY_TYPE_AES ((psa_key_type_t) 0x2400)
495
498#define PSA_KEY_TYPE_ARIA ((psa_key_type_t) 0x2406)
499
509#define PSA_KEY_TYPE_DES ((psa_key_type_t) 0x2301)
510
513#define PSA_KEY_TYPE_CAMELLIA ((psa_key_type_t) 0x2403)
514
526#define PSA_KEY_TYPE_CHACHA20 ((psa_key_type_t) 0x2004)
527
532#define PSA_KEY_TYPE_RSA_PUBLIC_KEY ((psa_key_type_t) 0x4001)
537#define PSA_KEY_TYPE_RSA_KEY_PAIR ((psa_key_type_t) 0x7001)
539#define PSA_KEY_TYPE_IS_RSA(type) \
540 (PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(type) == PSA_KEY_TYPE_RSA_PUBLIC_KEY)
541
542#define PSA_KEY_TYPE_ECC_PUBLIC_KEY_BASE ((psa_key_type_t) 0x4100)
543#define PSA_KEY_TYPE_ECC_KEY_PAIR_BASE ((psa_key_type_t) 0x7100)
544#define PSA_KEY_TYPE_ECC_CURVE_MASK ((psa_key_type_t) 0x00ff)
554#define PSA_KEY_TYPE_ECC_KEY_PAIR(curve) \
555 (PSA_KEY_TYPE_ECC_KEY_PAIR_BASE | (curve))
565#define PSA_KEY_TYPE_ECC_PUBLIC_KEY(curve) \
566 (PSA_KEY_TYPE_ECC_PUBLIC_KEY_BASE | (curve))
567
569#define PSA_KEY_TYPE_IS_ECC(type) \
570 ((PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(type) & \
571 ~PSA_KEY_TYPE_ECC_CURVE_MASK) == PSA_KEY_TYPE_ECC_PUBLIC_KEY_BASE)
573#define PSA_KEY_TYPE_IS_ECC_KEY_PAIR(type) \
574 (((type) & ~PSA_KEY_TYPE_ECC_CURVE_MASK) == \
575 PSA_KEY_TYPE_ECC_KEY_PAIR_BASE)
577#define PSA_KEY_TYPE_IS_ECC_PUBLIC_KEY(type) \
578 (((type) & ~PSA_KEY_TYPE_ECC_CURVE_MASK) == \
579 PSA_KEY_TYPE_ECC_PUBLIC_KEY_BASE)
580
582#define PSA_KEY_TYPE_ECC_GET_FAMILY(type) \
583 ((psa_ecc_family_t) (PSA_KEY_TYPE_IS_ECC(type) ? \
584 ((type) & PSA_KEY_TYPE_ECC_CURVE_MASK) : \
585 0))
586
588#define PSA_ECC_FAMILY_IS_WEIERSTRASS(family) ((family & 0xc0) == 0)
589
598#define PSA_ECC_FAMILY_SECP_K1 ((psa_ecc_family_t) 0x17)
599
608#define PSA_ECC_FAMILY_SECP_R1 ((psa_ecc_family_t) 0x12)
609/* SECP160R2 (SEC2 v1, obsolete) */
610#define PSA_ECC_FAMILY_SECP_R2 ((psa_ecc_family_t) 0x1b)
611
620#define PSA_ECC_FAMILY_SECT_K1 ((psa_ecc_family_t) 0x27)
621
630#define PSA_ECC_FAMILY_SECT_R1 ((psa_ecc_family_t) 0x22)
631
640#define PSA_ECC_FAMILY_SECT_R2 ((psa_ecc_family_t) 0x2b)
641
649#define PSA_ECC_FAMILY_BRAINPOOL_P_R1 ((psa_ecc_family_t) 0x30)
650
661#define PSA_ECC_FAMILY_MONTGOMERY ((psa_ecc_family_t) 0x41)
662
677#define PSA_ECC_FAMILY_TWISTED_EDWARDS ((psa_ecc_family_t) 0x42)
678
679#define PSA_KEY_TYPE_DH_PUBLIC_KEY_BASE ((psa_key_type_t) 0x4200)
680#define PSA_KEY_TYPE_DH_KEY_PAIR_BASE ((psa_key_type_t) 0x7200)
681#define PSA_KEY_TYPE_DH_GROUP_MASK ((psa_key_type_t) 0x00ff)
687#define PSA_KEY_TYPE_DH_KEY_PAIR(group) \
688 (PSA_KEY_TYPE_DH_KEY_PAIR_BASE | (group))
694#define PSA_KEY_TYPE_DH_PUBLIC_KEY(group) \
695 (PSA_KEY_TYPE_DH_PUBLIC_KEY_BASE | (group))
696
698#define PSA_KEY_TYPE_IS_DH(type) \
699 ((PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(type) & \
700 ~PSA_KEY_TYPE_DH_GROUP_MASK) == PSA_KEY_TYPE_DH_PUBLIC_KEY_BASE)
702#define PSA_KEY_TYPE_IS_DH_KEY_PAIR(type) \
703 (((type) & ~PSA_KEY_TYPE_DH_GROUP_MASK) == \
704 PSA_KEY_TYPE_DH_KEY_PAIR_BASE)
706#define PSA_KEY_TYPE_IS_DH_PUBLIC_KEY(type) \
707 (((type) & ~PSA_KEY_TYPE_DH_GROUP_MASK) == \
708 PSA_KEY_TYPE_DH_PUBLIC_KEY_BASE)
709
711#define PSA_KEY_TYPE_DH_GET_FAMILY(type) \
712 ((psa_dh_family_t) (PSA_KEY_TYPE_IS_DH(type) ? \
713 ((type) & PSA_KEY_TYPE_DH_GROUP_MASK) : \
714 0))
715
722#define PSA_DH_FAMILY_RFC7919 ((psa_dh_family_t) 0x03)
723
724#define PSA_GET_KEY_TYPE_BLOCK_SIZE_EXPONENT(type) \
725 (((type) >> 8) & 7)
744#define PSA_BLOCK_CIPHER_BLOCK_LENGTH(type) \
745 (((type) & PSA_KEY_TYPE_CATEGORY_MASK) == PSA_KEY_TYPE_CATEGORY_SYMMETRIC ? \
746 1u << PSA_GET_KEY_TYPE_BLOCK_SIZE_EXPONENT(type) : \
747 0u)
748
749/* Note that algorithm values are embedded in the persistent key store,
750 * as part of key metadata. As a consequence, they must not be changed
751 * (unless the storage format version changes).
752 */
753
761#define PSA_ALG_VENDOR_FLAG ((psa_algorithm_t) 0x80000000)
762
763#define PSA_ALG_CATEGORY_MASK ((psa_algorithm_t) 0x7f000000)
764#define PSA_ALG_CATEGORY_HASH ((psa_algorithm_t) 0x02000000)
765#define PSA_ALG_CATEGORY_MAC ((psa_algorithm_t) 0x03000000)
766#define PSA_ALG_CATEGORY_CIPHER ((psa_algorithm_t) 0x04000000)
767#define PSA_ALG_CATEGORY_AEAD ((psa_algorithm_t) 0x05000000)
768#define PSA_ALG_CATEGORY_SIGN ((psa_algorithm_t) 0x06000000)
769#define PSA_ALG_CATEGORY_ASYMMETRIC_ENCRYPTION ((psa_algorithm_t) 0x07000000)
770#define PSA_ALG_CATEGORY_KEY_DERIVATION ((psa_algorithm_t) 0x08000000)
771#define PSA_ALG_CATEGORY_KEY_AGREEMENT ((psa_algorithm_t) 0x09000000)
772
777#define PSA_ALG_IS_VENDOR_DEFINED(alg) \
778 (((alg) & PSA_ALG_VENDOR_FLAG) != 0)
779
788#define PSA_ALG_IS_HASH(alg) \
789 (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_HASH)
790
799#define PSA_ALG_IS_MAC(alg) \
800 (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_MAC)
801
810#define PSA_ALG_IS_CIPHER(alg) \
811 (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_CIPHER)
812
822#define PSA_ALG_IS_AEAD(alg) \
823 (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_AEAD)
824
834#define PSA_ALG_IS_SIGN(alg) \
835 (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_SIGN)
836
846#define PSA_ALG_IS_ASYMMETRIC_ENCRYPTION(alg) \
847 (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_ASYMMETRIC_ENCRYPTION)
848
857#define PSA_ALG_IS_KEY_AGREEMENT(alg) \
858 (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_KEY_AGREEMENT)
859
868#define PSA_ALG_IS_KEY_DERIVATION(alg) \
869 (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_KEY_DERIVATION)
870
885#define PSA_ALG_IS_KEY_DERIVATION_STRETCHING(alg) \
886 (PSA_ALG_IS_KEY_DERIVATION(alg) && \
887 (alg) & PSA_ALG_KEY_DERIVATION_STRETCHING_FLAG)
888
890/* *INDENT-OFF* (https://github.com/ARM-software/psa-arch-tests/issues/337) */
891#define PSA_ALG_NONE ((psa_algorithm_t)0)
892/* *INDENT-ON* */
893
894#define PSA_ALG_HASH_MASK ((psa_algorithm_t) 0x000000ff)
896#define PSA_ALG_MD5 ((psa_algorithm_t) 0x02000003)
898#define PSA_ALG_RIPEMD160 ((psa_algorithm_t) 0x02000004)
900#define PSA_ALG_SHA_1 ((psa_algorithm_t) 0x02000005)
902#define PSA_ALG_SHA_224 ((psa_algorithm_t) 0x02000008)
904#define PSA_ALG_SHA_256 ((psa_algorithm_t) 0x02000009)
906#define PSA_ALG_SHA_384 ((psa_algorithm_t) 0x0200000a)
908#define PSA_ALG_SHA_512 ((psa_algorithm_t) 0x0200000b)
910#define PSA_ALG_SHA_512_224 ((psa_algorithm_t) 0x0200000c)
912#define PSA_ALG_SHA_512_256 ((psa_algorithm_t) 0x0200000d)
914#define PSA_ALG_SHA3_224 ((psa_algorithm_t) 0x02000010)
916#define PSA_ALG_SHA3_256 ((psa_algorithm_t) 0x02000011)
918#define PSA_ALG_SHA3_384 ((psa_algorithm_t) 0x02000012)
920#define PSA_ALG_SHA3_512 ((psa_algorithm_t) 0x02000013)
927#define PSA_ALG_SHAKE256_512 ((psa_algorithm_t) 0x02000015)
928
962#define PSA_ALG_ANY_HASH ((psa_algorithm_t) 0x020000ff)
963
964#define PSA_ALG_MAC_SUBCATEGORY_MASK ((psa_algorithm_t) 0x00c00000)
965#define PSA_ALG_HMAC_BASE ((psa_algorithm_t) 0x03800000)
977#define PSA_ALG_HMAC(hash_alg) \
978 (PSA_ALG_HMAC_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
979
980#define PSA_ALG_HMAC_GET_HASH(hmac_alg) \
981 (PSA_ALG_CATEGORY_HASH | ((hmac_alg) & PSA_ALG_HASH_MASK))
982
993#define PSA_ALG_IS_HMAC(alg) \
994 (((alg) & (PSA_ALG_CATEGORY_MASK | PSA_ALG_MAC_SUBCATEGORY_MASK)) == \
995 PSA_ALG_HMAC_BASE)
996
997/* In the encoding of a MAC algorithm, the bits corresponding to
998 * PSA_ALG_MAC_TRUNCATION_MASK encode the length to which the MAC is
999 * truncated. As an exception, the value 0 means the untruncated algorithm,
1000 * whatever its length is. The length is encoded in 6 bits, so it can
1001 * reach up to 63; the largest MAC is 64 bytes so its trivial truncation
1002 * to full length is correctly encoded as 0 and any non-trivial truncation
1003 * is correctly encoded as a value between 1 and 63. */
1004#define PSA_ALG_MAC_TRUNCATION_MASK ((psa_algorithm_t) 0x003f0000)
1005#define PSA_MAC_TRUNCATION_OFFSET 16
1006
1007/* In the encoding of a MAC algorithm, the bit corresponding to
1008 * #PSA_ALG_MAC_AT_LEAST_THIS_LENGTH_FLAG encodes the fact that the algorithm
1009 * is a wildcard algorithm. A key with such wildcard algorithm as permitted
1010 * algorithm policy can be used with any algorithm corresponding to the
1011 * same base class and having a (potentially truncated) MAC length greater or
1012 * equal than the one encoded in #PSA_ALG_MAC_TRUNCATION_MASK. */
1013#define PSA_ALG_MAC_AT_LEAST_THIS_LENGTH_FLAG ((psa_algorithm_t) 0x00008000)
1014
1048#define PSA_ALG_TRUNCATED_MAC(mac_alg, mac_length) \
1049 (((mac_alg) & ~(PSA_ALG_MAC_TRUNCATION_MASK | \
1050 PSA_ALG_MAC_AT_LEAST_THIS_LENGTH_FLAG)) | \
1051 ((mac_length) << PSA_MAC_TRUNCATION_OFFSET & PSA_ALG_MAC_TRUNCATION_MASK))
1052
1065#define PSA_ALG_FULL_LENGTH_MAC(mac_alg) \
1066 ((mac_alg) & ~(PSA_ALG_MAC_TRUNCATION_MASK | \
1067 PSA_ALG_MAC_AT_LEAST_THIS_LENGTH_FLAG))
1068
1080#define PSA_MAC_TRUNCATED_LENGTH(mac_alg) \
1081 (((mac_alg) & PSA_ALG_MAC_TRUNCATION_MASK) >> PSA_MAC_TRUNCATION_OFFSET)
1082
1107#define PSA_ALG_AT_LEAST_THIS_LENGTH_MAC(mac_alg, min_mac_length) \
1108 (PSA_ALG_TRUNCATED_MAC(mac_alg, min_mac_length) | \
1109 PSA_ALG_MAC_AT_LEAST_THIS_LENGTH_FLAG)
1110
1111#define PSA_ALG_CIPHER_MAC_BASE ((psa_algorithm_t) 0x03c00000)
1117#define PSA_ALG_CBC_MAC ((psa_algorithm_t) 0x03c00100)
1119#define PSA_ALG_CMAC ((psa_algorithm_t) 0x03c00200)
1120
1129#define PSA_ALG_IS_BLOCK_CIPHER_MAC(alg) \
1130 (((alg) & (PSA_ALG_CATEGORY_MASK | PSA_ALG_MAC_SUBCATEGORY_MASK)) == \
1131 PSA_ALG_CIPHER_MAC_BASE)
1132
1133#define PSA_ALG_CIPHER_STREAM_FLAG ((psa_algorithm_t) 0x00800000)
1134#define PSA_ALG_CIPHER_FROM_BLOCK_FLAG ((psa_algorithm_t) 0x00400000)
1135
1148#define PSA_ALG_IS_STREAM_CIPHER(alg) \
1149 (((alg) & (PSA_ALG_CATEGORY_MASK | PSA_ALG_CIPHER_STREAM_FLAG)) == \
1150 (PSA_ALG_CATEGORY_CIPHER | PSA_ALG_CIPHER_STREAM_FLAG))
1151
1157#define PSA_ALG_STREAM_CIPHER ((psa_algorithm_t) 0x04800100)
1158
1166#define PSA_ALG_CTR ((psa_algorithm_t) 0x04c01000)
1167
1172#define PSA_ALG_CFB ((psa_algorithm_t) 0x04c01100)
1173
1178#define PSA_ALG_OFB ((psa_algorithm_t) 0x04c01200)
1179
1186#define PSA_ALG_XTS ((psa_algorithm_t) 0x0440ff00)
1187
1206#define PSA_ALG_ECB_NO_PADDING ((psa_algorithm_t) 0x04404400)
1207
1215#define PSA_ALG_CBC_NO_PADDING ((psa_algorithm_t) 0x04404000)
1216
1223#define PSA_ALG_CBC_PKCS7 ((psa_algorithm_t) 0x04404100)
1224
1225#define PSA_ALG_AEAD_FROM_BLOCK_FLAG ((psa_algorithm_t) 0x00400000)
1226
1236#define PSA_ALG_IS_AEAD_ON_BLOCK_CIPHER(alg) \
1237 (((alg) & (PSA_ALG_CATEGORY_MASK | PSA_ALG_AEAD_FROM_BLOCK_FLAG)) == \
1238 (PSA_ALG_CATEGORY_AEAD | PSA_ALG_AEAD_FROM_BLOCK_FLAG))
1239
1244#define PSA_ALG_CCM ((psa_algorithm_t) 0x05500100)
1245
1255#define PSA_ALG_CCM_STAR_NO_TAG ((psa_algorithm_t) 0x04c01300)
1256
1261#define PSA_ALG_GCM ((psa_algorithm_t) 0x05500200)
1262
1272#define PSA_ALG_CHACHA20_POLY1305 ((psa_algorithm_t) 0x05100500)
1273
1274/* In the encoding of an AEAD algorithm, the bits corresponding to
1275 * PSA_ALG_AEAD_TAG_LENGTH_MASK encode the length of the AEAD tag.
1276 * The constants for default lengths follow this encoding.
1277 */
1278#define PSA_ALG_AEAD_TAG_LENGTH_MASK ((psa_algorithm_t) 0x003f0000)
1279#define PSA_AEAD_TAG_LENGTH_OFFSET 16
1280
1281/* In the encoding of an AEAD algorithm, the bit corresponding to
1282 * #PSA_ALG_AEAD_AT_LEAST_THIS_LENGTH_FLAG encodes the fact that the algorithm
1283 * is a wildcard algorithm. A key with such wildcard algorithm as permitted
1284 * algorithm policy can be used with any algorithm corresponding to the
1285 * same base class and having a tag length greater than or equal to the one
1286 * encoded in #PSA_ALG_AEAD_TAG_LENGTH_MASK. */
1287#define PSA_ALG_AEAD_AT_LEAST_THIS_LENGTH_FLAG ((psa_algorithm_t) 0x00008000)
1288
1307#define PSA_ALG_AEAD_WITH_SHORTENED_TAG(aead_alg, tag_length) \
1308 (((aead_alg) & ~(PSA_ALG_AEAD_TAG_LENGTH_MASK | \
1309 PSA_ALG_AEAD_AT_LEAST_THIS_LENGTH_FLAG)) | \
1310 ((tag_length) << PSA_AEAD_TAG_LENGTH_OFFSET & \
1311 PSA_ALG_AEAD_TAG_LENGTH_MASK))
1312
1323#define PSA_ALG_AEAD_GET_TAG_LENGTH(aead_alg) \
1324 (((aead_alg) & PSA_ALG_AEAD_TAG_LENGTH_MASK) >> \
1325 PSA_AEAD_TAG_LENGTH_OFFSET)
1326
1335#define PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG(aead_alg) \
1336 ( \
1337 PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG_CASE(aead_alg, PSA_ALG_CCM) \
1338 PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG_CASE(aead_alg, PSA_ALG_GCM) \
1339 PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG_CASE(aead_alg, PSA_ALG_CHACHA20_POLY1305) \
1340 0)
1341#define PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG_CASE(aead_alg, ref) \
1342 PSA_ALG_AEAD_WITH_SHORTENED_TAG(aead_alg, 0) == \
1343 PSA_ALG_AEAD_WITH_SHORTENED_TAG(ref, 0) ? \
1344 ref :
1345
1370#define PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(aead_alg, min_tag_length) \
1371 (PSA_ALG_AEAD_WITH_SHORTENED_TAG(aead_alg, min_tag_length) | \
1372 PSA_ALG_AEAD_AT_LEAST_THIS_LENGTH_FLAG)
1373
1374#define PSA_ALG_RSA_PKCS1V15_SIGN_BASE ((psa_algorithm_t) 0x06000200)
1390#define PSA_ALG_RSA_PKCS1V15_SIGN(hash_alg) \
1391 (PSA_ALG_RSA_PKCS1V15_SIGN_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1398#define PSA_ALG_RSA_PKCS1V15_SIGN_RAW PSA_ALG_RSA_PKCS1V15_SIGN_BASE
1399#define PSA_ALG_IS_RSA_PKCS1V15_SIGN(alg) \
1400 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_RSA_PKCS1V15_SIGN_BASE)
1401
1402#define PSA_ALG_RSA_PSS_BASE ((psa_algorithm_t) 0x06000300)
1403#define PSA_ALG_RSA_PSS_ANY_SALT_BASE ((psa_algorithm_t) 0x06001300)
1424#define PSA_ALG_RSA_PSS(hash_alg) \
1425 (PSA_ALG_RSA_PSS_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1426
1442#define PSA_ALG_RSA_PSS_ANY_SALT(hash_alg) \
1443 (PSA_ALG_RSA_PSS_ANY_SALT_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1444
1456#define PSA_ALG_IS_RSA_PSS_STANDARD_SALT(alg) \
1457 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_RSA_PSS_BASE)
1458
1470#define PSA_ALG_IS_RSA_PSS_ANY_SALT(alg) \
1471 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_RSA_PSS_ANY_SALT_BASE)
1472
1488#define PSA_ALG_IS_RSA_PSS(alg) \
1489 (PSA_ALG_IS_RSA_PSS_STANDARD_SALT(alg) || \
1490 PSA_ALG_IS_RSA_PSS_ANY_SALT(alg))
1491
1492#define PSA_ALG_ECDSA_BASE ((psa_algorithm_t) 0x06000600)
1513#define PSA_ALG_ECDSA(hash_alg) \
1514 (PSA_ALG_ECDSA_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1524#define PSA_ALG_ECDSA_ANY PSA_ALG_ECDSA_BASE
1525#define PSA_ALG_DETERMINISTIC_ECDSA_BASE ((psa_algorithm_t) 0x06000700)
1548#define PSA_ALG_DETERMINISTIC_ECDSA(hash_alg) \
1549 (PSA_ALG_DETERMINISTIC_ECDSA_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1550#define PSA_ALG_ECDSA_DETERMINISTIC_FLAG ((psa_algorithm_t) 0x00000100)
1551#define PSA_ALG_IS_ECDSA(alg) \
1552 (((alg) & ~PSA_ALG_HASH_MASK & ~PSA_ALG_ECDSA_DETERMINISTIC_FLAG) == \
1553 PSA_ALG_ECDSA_BASE)
1554#define PSA_ALG_ECDSA_IS_DETERMINISTIC(alg) \
1555 (((alg) & PSA_ALG_ECDSA_DETERMINISTIC_FLAG) != 0)
1556#define PSA_ALG_IS_DETERMINISTIC_ECDSA(alg) \
1557 (PSA_ALG_IS_ECDSA(alg) && PSA_ALG_ECDSA_IS_DETERMINISTIC(alg))
1558#define PSA_ALG_IS_RANDOMIZED_ECDSA(alg) \
1559 (PSA_ALG_IS_ECDSA(alg) && !PSA_ALG_ECDSA_IS_DETERMINISTIC(alg))
1560
1589#define PSA_ALG_PURE_EDDSA ((psa_algorithm_t) 0x06000800)
1590
1591#define PSA_ALG_HASH_EDDSA_BASE ((psa_algorithm_t) 0x06000900)
1592#define PSA_ALG_IS_HASH_EDDSA(alg) \
1593 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HASH_EDDSA_BASE)
1594
1616#define PSA_ALG_ED25519PH \
1617 (PSA_ALG_HASH_EDDSA_BASE | (PSA_ALG_SHA_512 & PSA_ALG_HASH_MASK))
1618
1641#define PSA_ALG_ED448PH \
1642 (PSA_ALG_HASH_EDDSA_BASE | (PSA_ALG_SHAKE256_512 & PSA_ALG_HASH_MASK))
1643
1644/* Default definition, to be overridden if the library is extended with
1645 * more hash-and-sign algorithms that we want to keep out of this header
1646 * file. */
1647#define PSA_ALG_IS_VENDOR_HASH_AND_SIGN(alg) 0
1648
1666#define PSA_ALG_IS_SIGN_HASH(alg) \
1667 (PSA_ALG_IS_RSA_PSS(alg) || PSA_ALG_IS_RSA_PKCS1V15_SIGN(alg) || \
1668 PSA_ALG_IS_ECDSA(alg) || PSA_ALG_IS_HASH_EDDSA(alg) || \
1669 PSA_ALG_IS_VENDOR_HASH_AND_SIGN(alg))
1670
1682#define PSA_ALG_IS_SIGN_MESSAGE(alg) \
1683 (PSA_ALG_IS_SIGN_HASH(alg) || (alg) == PSA_ALG_PURE_EDDSA)
1684
1711#define PSA_ALG_IS_HASH_AND_SIGN(alg) \
1712 (PSA_ALG_IS_SIGN_HASH(alg) && \
1713 ((alg) & PSA_ALG_HASH_MASK) != 0)
1714
1733#define PSA_ALG_SIGN_GET_HASH(alg) \
1734 (PSA_ALG_IS_HASH_AND_SIGN(alg) ? \
1735 ((alg) & PSA_ALG_HASH_MASK) | PSA_ALG_CATEGORY_HASH : \
1736 0)
1737
1747#define PSA_ALG_RSA_PKCS1V15_CRYPT ((psa_algorithm_t) 0x07000200)
1748
1749#define PSA_ALG_RSA_OAEP_BASE ((psa_algorithm_t) 0x07000300)
1764#define PSA_ALG_RSA_OAEP(hash_alg) \
1765 (PSA_ALG_RSA_OAEP_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1766#define PSA_ALG_IS_RSA_OAEP(alg) \
1767 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_RSA_OAEP_BASE)
1768#define PSA_ALG_RSA_OAEP_GET_HASH(alg) \
1769 (PSA_ALG_IS_RSA_OAEP(alg) ? \
1770 ((alg) & PSA_ALG_HASH_MASK) | PSA_ALG_CATEGORY_HASH : \
1771 0)
1772
1773#define PSA_ALG_HKDF_BASE ((psa_algorithm_t) 0x08000100)
1800#define PSA_ALG_HKDF(hash_alg) \
1801 (PSA_ALG_HKDF_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1813#define PSA_ALG_IS_HKDF(alg) \
1814 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HKDF_BASE)
1815#define PSA_ALG_HKDF_GET_HASH(hkdf_alg) \
1816 (PSA_ALG_CATEGORY_HASH | ((hkdf_alg) & PSA_ALG_HASH_MASK))
1817
1818#define PSA_ALG_HKDF_EXTRACT_BASE ((psa_algorithm_t) 0x08000400)
1851#define PSA_ALG_HKDF_EXTRACT(hash_alg) \
1852 (PSA_ALG_HKDF_EXTRACT_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1864#define PSA_ALG_IS_HKDF_EXTRACT(alg) \
1865 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HKDF_EXTRACT_BASE)
1866
1867#define PSA_ALG_HKDF_EXPAND_BASE ((psa_algorithm_t) 0x08000500)
1893#define PSA_ALG_HKDF_EXPAND(hash_alg) \
1894 (PSA_ALG_HKDF_EXPAND_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1906#define PSA_ALG_IS_HKDF_EXPAND(alg) \
1907 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HKDF_EXPAND_BASE)
1908
1919#define PSA_ALG_IS_ANY_HKDF(alg) \
1920 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HKDF_BASE || \
1921 ((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HKDF_EXTRACT_BASE || \
1922 ((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HKDF_EXPAND_BASE)
1923
1924#define PSA_ALG_TLS12_PRF_BASE ((psa_algorithm_t) 0x08000200)
1951#define PSA_ALG_TLS12_PRF(hash_alg) \
1952 (PSA_ALG_TLS12_PRF_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1953
1962#define PSA_ALG_IS_TLS12_PRF(alg) \
1963 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_TLS12_PRF_BASE)
1964#define PSA_ALG_TLS12_PRF_GET_HASH(hkdf_alg) \
1965 (PSA_ALG_CATEGORY_HASH | ((hkdf_alg) & PSA_ALG_HASH_MASK))
1966
1967#define PSA_ALG_TLS12_PSK_TO_MS_BASE ((psa_algorithm_t) 0x08000300)
2021#define PSA_ALG_TLS12_PSK_TO_MS(hash_alg) \
2022 (PSA_ALG_TLS12_PSK_TO_MS_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
2023
2032#define PSA_ALG_IS_TLS12_PSK_TO_MS(alg) \
2033 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_TLS12_PSK_TO_MS_BASE)
2034#define PSA_ALG_TLS12_PSK_TO_MS_GET_HASH(hkdf_alg) \
2035 (PSA_ALG_CATEGORY_HASH | ((hkdf_alg) & PSA_ALG_HASH_MASK))
2036
2037/* The TLS 1.2 ECJPAKE-to-PMS KDF. It takes the shared secret K (an EC point
2038 * in case of EC J-PAKE) and calculates SHA256(K.X) that the rest of TLS 1.2
2039 * will use to derive the session secret, as defined by step 2 of
2040 * https://datatracker.ietf.org/doc/html/draft-cragie-tls-ecjpake-01#section-8.7.
2041 * Uses PSA_ALG_SHA_256.
2042 * This function takes a single input:
2043 * #PSA_KEY_DERIVATION_INPUT_SECRET is the shared secret K from EC J-PAKE.
2044 * The only supported curve is secp256r1 (the 256-bit curve in
2045 * #PSA_ECC_FAMILY_SECP_R1), so the input must be exactly 65 bytes.
2046 * The output has to be read as a single chunk of 32 bytes, defined as
2047 * PSA_TLS12_ECJPAKE_TO_PMS_DATA_SIZE.
2048 */
2049#define PSA_ALG_TLS12_ECJPAKE_TO_PMS ((psa_algorithm_t) 0x08000609)
2050
2051/* This flag indicates whether the key derivation algorithm is suitable for
2052 * use on low-entropy secrets such as password - these algorithms are also
2053 * known as key stretching or password hashing schemes. These are also the
2054 * algorithms that accepts inputs of type #PSA_KEY_DERIVATION_INPUT_PASSWORD.
2055 *
2056 * Those algorithms cannot be combined with a key agreement algorithm.
2057 */
2058#define PSA_ALG_KEY_DERIVATION_STRETCHING_FLAG ((psa_algorithm_t) 0x00800000)
2059
2060#define PSA_ALG_PBKDF2_HMAC_BASE ((psa_algorithm_t) 0x08800100)
2087#define PSA_ALG_PBKDF2_HMAC(hash_alg) \
2088 (PSA_ALG_PBKDF2_HMAC_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
2089
2098#define PSA_ALG_IS_PBKDF2_HMAC(alg) \
2099 (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_PBKDF2_HMAC_BASE)
2100#define PSA_ALG_PBKDF2_HMAC_GET_HASH(pbkdf2_alg) \
2101 (PSA_ALG_CATEGORY_HASH | ((pbkdf2_alg) & PSA_ALG_HASH_MASK))
2111#define PSA_ALG_PBKDF2_AES_CMAC_PRF_128 ((psa_algorithm_t) 0x08800200)
2112
2113#define PSA_ALG_IS_PBKDF2(kdf_alg) \
2114 (PSA_ALG_IS_PBKDF2_HMAC(kdf_alg) || \
2115 ((kdf_alg) == PSA_ALG_PBKDF2_AES_CMAC_PRF_128))
2116
2117#define PSA_ALG_KEY_DERIVATION_MASK ((psa_algorithm_t) 0xfe00ffff)
2118#define PSA_ALG_KEY_AGREEMENT_MASK ((psa_algorithm_t) 0xffff0000)
2119
2134#define PSA_ALG_KEY_AGREEMENT(ka_alg, kdf_alg) \
2135 ((ka_alg) | (kdf_alg))
2136
2137#define PSA_ALG_KEY_AGREEMENT_GET_KDF(alg) \
2138 (((alg) & PSA_ALG_KEY_DERIVATION_MASK) | PSA_ALG_CATEGORY_KEY_DERIVATION)
2139
2140#define PSA_ALG_KEY_AGREEMENT_GET_BASE(alg) \
2141 (((alg) & PSA_ALG_KEY_AGREEMENT_MASK) | PSA_ALG_CATEGORY_KEY_AGREEMENT)
2142
2157#define PSA_ALG_IS_RAW_KEY_AGREEMENT(alg) \
2158 (PSA_ALG_IS_KEY_AGREEMENT(alg) && \
2159 PSA_ALG_KEY_AGREEMENT_GET_KDF(alg) == PSA_ALG_CATEGORY_KEY_DERIVATION)
2160
2161#define PSA_ALG_IS_KEY_DERIVATION_OR_AGREEMENT(alg) \
2162 ((PSA_ALG_IS_KEY_DERIVATION(alg) || PSA_ALG_IS_KEY_AGREEMENT(alg)))
2163
2171#define PSA_ALG_FFDH ((psa_algorithm_t) 0x09010000)
2172
2185#define PSA_ALG_IS_FFDH(alg) \
2186 (PSA_ALG_KEY_AGREEMENT_GET_BASE(alg) == PSA_ALG_FFDH)
2187
2213#define PSA_ALG_ECDH ((psa_algorithm_t) 0x09020000)
2214
2229#define PSA_ALG_IS_ECDH(alg) \
2230 (PSA_ALG_KEY_AGREEMENT_GET_BASE(alg) == PSA_ALG_ECDH)
2231
2245#define PSA_ALG_IS_WILDCARD(alg) \
2246 (PSA_ALG_IS_HASH_AND_SIGN(alg) ? \
2247 PSA_ALG_SIGN_GET_HASH(alg) == PSA_ALG_ANY_HASH : \
2248 PSA_ALG_IS_MAC(alg) ? \
2249 (alg & PSA_ALG_MAC_AT_LEAST_THIS_LENGTH_FLAG) != 0 : \
2250 PSA_ALG_IS_AEAD(alg) ? \
2251 (alg & PSA_ALG_AEAD_AT_LEAST_THIS_LENGTH_FLAG) != 0 : \
2252 (alg) == PSA_ALG_ANY_HASH)
2253
2263#define PSA_ALG_GET_HASH(alg) \
2264 (((alg) & 0x000000ff) == 0 ? ((psa_algorithm_t) 0) : 0x02000000 | ((alg) & 0x000000ff))
2265
2272/* Note that location and persistence level values are embedded in the
2273 * persistent key store, as part of key metadata. As a consequence, they
2274 * must not be changed (unless the storage format version changes).
2275 */
2276
2288#define PSA_KEY_LIFETIME_VOLATILE ((psa_key_lifetime_t) 0x00000000)
2289
2302#define PSA_KEY_LIFETIME_PERSISTENT ((psa_key_lifetime_t) 0x00000001)
2303
2308#define PSA_KEY_PERSISTENCE_VOLATILE ((psa_key_persistence_t) 0x00)
2309
2314#define PSA_KEY_PERSISTENCE_DEFAULT ((psa_key_persistence_t) 0x01)
2315
2320#define PSA_KEY_PERSISTENCE_READ_ONLY ((psa_key_persistence_t) 0xff)
2321
2322#define PSA_KEY_LIFETIME_GET_PERSISTENCE(lifetime) \
2323 ((psa_key_persistence_t) ((lifetime) & 0x000000ff))
2324
2325#define PSA_KEY_LIFETIME_GET_LOCATION(lifetime) \
2326 ((psa_key_location_t) ((lifetime) >> 8))
2327
2344#define PSA_KEY_LIFETIME_IS_VOLATILE(lifetime) \
2345 (PSA_KEY_LIFETIME_GET_PERSISTENCE(lifetime) == \
2346 PSA_KEY_PERSISTENCE_VOLATILE)
2347
2365#define PSA_KEY_LIFETIME_IS_READ_ONLY(lifetime) \
2366 (PSA_KEY_LIFETIME_GET_PERSISTENCE(lifetime) == \
2367 PSA_KEY_PERSISTENCE_READ_ONLY)
2368
2378#define PSA_KEY_LIFETIME_FROM_PERSISTENCE_AND_LOCATION(persistence, location) \
2379 ((location) << 8 | (persistence))
2380
2388#define PSA_KEY_LOCATION_LOCAL_STORAGE ((psa_key_location_t) 0x000000)
2389
2390#define PSA_KEY_LOCATION_VENDOR_FLAG ((psa_key_location_t) 0x800000)
2391
2392/* Note that key identifier values are embedded in the
2393 * persistent key store, as part of key metadata. As a consequence, they
2394 * must not be changed (unless the storage format version changes).
2395 */
2396
2399/* *INDENT-OFF* (https://github.com/ARM-software/psa-arch-tests/issues/337) */
2400#define PSA_KEY_ID_NULL ((psa_key_id_t)0)
2401/* *INDENT-ON* */
2404#define PSA_KEY_ID_USER_MIN ((psa_key_id_t) 0x00000001)
2407#define PSA_KEY_ID_USER_MAX ((psa_key_id_t) 0x3fffffff)
2410#define PSA_KEY_ID_VENDOR_MIN ((psa_key_id_t) 0x40000000)
2413#define PSA_KEY_ID_VENDOR_MAX ((psa_key_id_t) 0x7fffffff)
2414
2415
2416#if !defined(MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER)
2417
2418#define MBEDTLS_SVC_KEY_ID_INIT ((psa_key_id_t) 0)
2419#define MBEDTLS_SVC_KEY_ID_GET_KEY_ID(id) (id)
2420#define MBEDTLS_SVC_KEY_ID_GET_OWNER_ID(id) (0)
2421
2428 unsigned int unused, psa_key_id_t key_id)
2429{
2430 (void) unused;
2431
2432 return key_id;
2433}
2434
2444{
2445 return id1 == id2;
2446}
2447
2455{
2456 return key == 0;
2457}
2458
2459#else /* MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER */
2460
2461#define MBEDTLS_SVC_KEY_ID_INIT ((mbedtls_svc_key_id_t){ 0, 0 })
2462#define MBEDTLS_SVC_KEY_ID_GET_KEY_ID(id) ((id).MBEDTLS_PRIVATE(key_id))
2463#define MBEDTLS_SVC_KEY_ID_GET_OWNER_ID(id) ((id).MBEDTLS_PRIVATE(owner))
2464
2471 mbedtls_key_owner_id_t owner_id, psa_key_id_t key_id)
2472{
2473 return (mbedtls_svc_key_id_t){ .MBEDTLS_PRIVATE(key_id) = key_id,
2474 .MBEDTLS_PRIVATE(owner) = owner_id };
2475}
2476
2486{
2487 return (id1.MBEDTLS_PRIVATE(key_id) == id2.MBEDTLS_PRIVATE(key_id)) &&
2488 mbedtls_key_owner_id_equal(id1.MBEDTLS_PRIVATE(owner), id2.MBEDTLS_PRIVATE(owner));
2489}
2490
2498{
2499 return key.MBEDTLS_PRIVATE(key_id) == 0;
2500}
2501
2502#endif /* !MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER */
2503
2510/* Note that key usage flags are embedded in the
2511 * persistent key store, as part of key metadata. As a consequence, they
2512 * must not be changed (unless the storage format version changes).
2513 */
2514
2526#define PSA_KEY_USAGE_EXPORT ((psa_key_usage_t) 0x00000001)
2527
2542#define PSA_KEY_USAGE_COPY ((psa_key_usage_t) 0x00000002)
2543
2553#define PSA_KEY_USAGE_ENCRYPT ((psa_key_usage_t) 0x00000100)
2554
2564#define PSA_KEY_USAGE_DECRYPT ((psa_key_usage_t) 0x00000200)
2565
2574#define PSA_KEY_USAGE_SIGN_MESSAGE ((psa_key_usage_t) 0x00000400)
2575
2584#define PSA_KEY_USAGE_VERIFY_MESSAGE ((psa_key_usage_t) 0x00000800)
2585
2594#define PSA_KEY_USAGE_SIGN_HASH ((psa_key_usage_t) 0x00001000)
2595
2604#define PSA_KEY_USAGE_VERIFY_HASH ((psa_key_usage_t) 0x00002000)
2605
2618#define PSA_KEY_USAGE_DERIVE ((psa_key_usage_t) 0x00004000)
2619
2633#define PSA_KEY_USAGE_VERIFY_DERIVATION ((psa_key_usage_t) 0x00008000)
2634
2641/* Key input steps are not embedded in the persistent storage, so you can
2642 * change them if needed: it's only an ABI change. */
2643
2659#define PSA_KEY_DERIVATION_INPUT_SECRET ((psa_key_derivation_step_t) 0x0101)
2660
2677#define PSA_KEY_DERIVATION_INPUT_PASSWORD ((psa_key_derivation_step_t) 0x0102)
2678
2686#define PSA_KEY_DERIVATION_INPUT_OTHER_SECRET \
2687 ((psa_key_derivation_step_t) 0x0103)
2688
2694#define PSA_KEY_DERIVATION_INPUT_LABEL ((psa_key_derivation_step_t) 0x0201)
2695
2702#define PSA_KEY_DERIVATION_INPUT_SALT ((psa_key_derivation_step_t) 0x0202)
2703
2709#define PSA_KEY_DERIVATION_INPUT_INFO ((psa_key_derivation_step_t) 0x0203)
2710
2716#define PSA_KEY_DERIVATION_INPUT_SEED ((psa_key_derivation_step_t) 0x0204)
2717
2722#define PSA_KEY_DERIVATION_INPUT_COST ((psa_key_derivation_step_t) 0x0205)
2723
2730/* Helper macros */
2731
2743#define MBEDTLS_PSA_ALG_AEAD_EQUAL(aead_alg_1, aead_alg_2) \
2744 (!(((aead_alg_1) ^ (aead_alg_2)) & \
2745 ~(PSA_ALG_AEAD_TAG_LENGTH_MASK | PSA_ALG_AEAD_AT_LEAST_THIS_LENGTH_FLAG)))
2746
2759#define PSA_INTERRUPTIBLE_MAX_OPS_UNLIMITED UINT32_MAX
2760
2763#endif /* PSA_CRYPTO_VALUES_H */
static mbedtls_svc_key_id_t mbedtls_svc_key_id_make(unsigned int unused, psa_key_id_t key_id)
uint32_t psa_key_id_t
static int mbedtls_svc_key_id_is_null(mbedtls_svc_key_id_t key)
psa_key_id_t mbedtls_svc_key_id_t
static int mbedtls_svc_key_id_equal(mbedtls_svc_key_id_t id1, mbedtls_svc_key_id_t id2)
Macro wrapper for struct's members.