Mbed TLS v3.6.4
Loading...
Searching...
No Matches
crypto_extra.h
Go to the documentation of this file.
1
11/*
12 * Copyright The Mbed TLS Contributors
13 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
14 */
15
16#ifndef PSA_CRYPTO_EXTRA_H
17#define PSA_CRYPTO_EXTRA_H
19
20#include "crypto_types.h"
21#include "crypto_compat.h"
22
23#ifdef __cplusplus
24extern "C" {
25#endif
26
27/* UID for secure storage seed */
28#define PSA_CRYPTO_ITS_RANDOM_SEED_UID 0xFFFFFF52
29
30/* See mbedtls_config.h for definition */
31#if !defined(MBEDTLS_PSA_KEY_SLOT_COUNT)
32#define MBEDTLS_PSA_KEY_SLOT_COUNT 32
33#endif
34
35/* If the size of static key slots is not explicitly defined by the user, then
36 * set it to the maximum between PSA_EXPORT_KEY_PAIR_OR_PUBLIC_MAX_SIZE and
37 * PSA_CIPHER_MAX_KEY_LENGTH.
38 * See mbedtls_config.h for the definition. */
39#if !defined(MBEDTLS_PSA_STATIC_KEY_SLOT_BUFFER_SIZE)
40#define MBEDTLS_PSA_STATIC_KEY_SLOT_BUFFER_SIZE \
41 ((PSA_EXPORT_KEY_PAIR_OR_PUBLIC_MAX_SIZE > PSA_CIPHER_MAX_KEY_LENGTH) ? \
42 PSA_EXPORT_KEY_PAIR_OR_PUBLIC_MAX_SIZE : PSA_CIPHER_MAX_KEY_LENGTH)
43#endif /* !MBEDTLS_PSA_STATIC_KEY_SLOT_BUFFER_SIZE*/
44
69 psa_key_attributes_t *attributes,
70 psa_algorithm_t alg2)
71{
72 attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(alg2) = alg2;
73}
74
82 const psa_key_attributes_t *attributes)
83{
84 return attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(alg2);
85}
86
87#if defined(MBEDTLS_PSA_CRYPTO_SE_C)
88
111psa_status_t psa_get_key_slot_number(
112 const psa_key_attributes_t *attributes,
113 psa_key_slot_number_t *slot_number);
114
138static inline void psa_set_key_slot_number(
139 psa_key_attributes_t *attributes,
140 psa_key_slot_number_t slot_number)
141{
142 attributes->MBEDTLS_PRIVATE(has_slot_number) = 1;
143 attributes->MBEDTLS_PRIVATE(slot_number) = slot_number;
144}
145
152static inline void psa_clear_key_slot_number(
153 psa_key_attributes_t *attributes)
154{
155 attributes->MBEDTLS_PRIVATE(has_slot_number) = 0;
156}
157
206psa_status_t mbedtls_psa_register_se_key(
207 const psa_key_attributes_t *attributes);
208
209#endif /* MBEDTLS_PSA_CRYPTO_SE_C */
210
224
231typedef struct mbedtls_psa_stats_s {
233 size_t MBEDTLS_PRIVATE(volatile_slots);
236 size_t MBEDTLS_PRIVATE(persistent_slots);
239 size_t MBEDTLS_PRIVATE(external_slots);
242 size_t MBEDTLS_PRIVATE(half_filled_slots);
244 size_t MBEDTLS_PRIVATE(cache_slots);
246 size_t MBEDTLS_PRIVATE(empty_slots);
248 size_t MBEDTLS_PRIVATE(locked_slots);
250 psa_key_id_t MBEDTLS_PRIVATE(max_open_internal_key_id);
252 psa_key_id_t MBEDTLS_PRIVATE(max_open_external_key_id);
254
263
334 size_t seed_size);
335
347#define PSA_KEY_TYPE_DSA_PUBLIC_KEY ((psa_key_type_t) 0x4002)
348
365#define PSA_KEY_TYPE_DSA_KEY_PAIR ((psa_key_type_t) 0x7002)
366
368#define PSA_KEY_TYPE_IS_DSA(type) \
369 (PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(type) == PSA_KEY_TYPE_DSA_PUBLIC_KEY)
370
371#define PSA_ALG_DSA_BASE ((psa_algorithm_t) 0x06000400)
386#define PSA_ALG_DSA(hash_alg) \
387 (PSA_ALG_DSA_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
388#define PSA_ALG_DETERMINISTIC_DSA_BASE ((psa_algorithm_t) 0x06000500)
389#define PSA_ALG_DSA_DETERMINISTIC_FLAG PSA_ALG_ECDSA_DETERMINISTIC_FLAG
404#define PSA_ALG_DETERMINISTIC_DSA(hash_alg) \
405 (PSA_ALG_DETERMINISTIC_DSA_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
406#define PSA_ALG_IS_DSA(alg) \
407 (((alg) & ~PSA_ALG_HASH_MASK & ~PSA_ALG_DSA_DETERMINISTIC_FLAG) == \
408 PSA_ALG_DSA_BASE)
409#define PSA_ALG_DSA_IS_DETERMINISTIC(alg) \
410 (((alg) & PSA_ALG_DSA_DETERMINISTIC_FLAG) != 0)
411#define PSA_ALG_IS_DETERMINISTIC_DSA(alg) \
412 (PSA_ALG_IS_DSA(alg) && PSA_ALG_DSA_IS_DETERMINISTIC(alg))
413#define PSA_ALG_IS_RANDOMIZED_DSA(alg) \
414 (PSA_ALG_IS_DSA(alg) && !PSA_ALG_DSA_IS_DETERMINISTIC(alg))
415
416
417/* We need to expand the sample definition of this macro from
418 * the API definition. */
419#undef PSA_ALG_IS_VENDOR_HASH_AND_SIGN
420#define PSA_ALG_IS_VENDOR_HASH_AND_SIGN(alg) \
421 PSA_ALG_IS_DSA(alg)
422
430#define PSA_PAKE_OPERATION_STAGE_SETUP 0
431#define PSA_PAKE_OPERATION_STAGE_COLLECT_INPUTS 1
432#define PSA_PAKE_OPERATION_STAGE_COMPUTATION 2
433
441#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
481psa_status_t mbedtls_psa_external_get_random(
482 mbedtls_psa_external_random_context_t *context,
483 uint8_t *output, size_t output_size, size_t *output_length);
484#endif /* MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */
485
503#define MBEDTLS_PSA_KEY_ID_BUILTIN_MIN ((psa_key_id_t) 0x7fff0000)
504
510#define MBEDTLS_PSA_KEY_ID_BUILTIN_MAX ((psa_key_id_t) 0x7fffefff)
511
516typedef uint64_t psa_drv_slot_number_t;
517
518#if defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS)
528static inline int psa_key_id_is_builtin(psa_key_id_t key_id)
529{
530 return (key_id >= MBEDTLS_PSA_KEY_ID_BUILTIN_MIN) &&
532}
533
578psa_status_t mbedtls_psa_platform_get_builtin_key(
580 psa_key_lifetime_t *lifetime,
581 psa_drv_slot_number_t *slot_number);
582#endif /* MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS */
583
612
619#define PSA_ALG_CATEGORY_PAKE ((psa_algorithm_t) 0x0a000000)
620
630#define PSA_ALG_IS_PAKE(alg) \
631 (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_PAKE)
632
748#define PSA_ALG_JPAKE ((psa_algorithm_t) 0x0a000100)
749
770typedef uint8_t psa_pake_role_t;
771
778typedef uint8_t psa_pake_step_t;
779
789
795typedef uint8_t psa_pake_family_t;
796
801typedef uint32_t psa_pake_primitive_t;
802
807#define PSA_PAKE_ROLE_NONE ((psa_pake_role_t) 0x00)
808
816#define PSA_PAKE_ROLE_FIRST ((psa_pake_role_t) 0x01)
817
825#define PSA_PAKE_ROLE_SECOND ((psa_pake_role_t) 0x02)
826
831#define PSA_PAKE_ROLE_CLIENT ((psa_pake_role_t) 0x11)
832
837#define PSA_PAKE_ROLE_SERVER ((psa_pake_role_t) 0x12)
838
857#define PSA_PAKE_PRIMITIVE_TYPE_ECC ((psa_pake_primitive_type_t) 0x01)
858
877#define PSA_PAKE_PRIMITIVE_TYPE_DH ((psa_pake_primitive_type_t) 0x02)
878
898#define PSA_PAKE_PRIMITIVE(pake_type, pake_family, pake_bits) \
899 ((pake_bits & 0xFFFF) != pake_bits) ? 0 : \
900 ((psa_pake_primitive_t) (((pake_type) << 24 | \
901 (pake_family) << 16) | (pake_bits)))
902
915#define PSA_PAKE_STEP_KEY_SHARE ((psa_pake_step_t) 0x01)
916
932#define PSA_PAKE_STEP_ZK_PUBLIC ((psa_pake_step_t) 0x02)
933
953#define PSA_PAKE_STEP_ZK_PROOF ((psa_pake_step_t) 0x03)
954
977#define PSA_PAKE_OUTPUT_SIZE(alg, primitive, output_step) \
978 (alg == PSA_ALG_JPAKE && \
979 primitive == PSA_PAKE_PRIMITIVE(PSA_PAKE_PRIMITIVE_TYPE_ECC, \
980 PSA_ECC_FAMILY_SECP_R1, 256) ? \
981 ( \
982 output_step == PSA_PAKE_STEP_KEY_SHARE ? 65 : \
983 output_step == PSA_PAKE_STEP_ZK_PUBLIC ? 65 : \
984 32 \
985 ) : \
986 0)
987
1007#define PSA_PAKE_INPUT_SIZE(alg, primitive, input_step) \
1008 (alg == PSA_ALG_JPAKE && \
1009 primitive == PSA_PAKE_PRIMITIVE(PSA_PAKE_PRIMITIVE_TYPE_ECC, \
1010 PSA_ECC_FAMILY_SECP_R1, 256) ? \
1011 ( \
1012 input_step == PSA_PAKE_STEP_KEY_SHARE ? 65 : \
1013 input_step == PSA_PAKE_STEP_ZK_PUBLIC ? 65 : \
1014 32 \
1015 ) : \
1016 0)
1017
1028#define PSA_PAKE_OUTPUT_MAX_SIZE 65
1029
1040#define PSA_PAKE_INPUT_MAX_SIZE 65
1041
1045#define PSA_PAKE_CIPHER_SUITE_INIT { PSA_ALG_NONE, 0, 0, 0, PSA_ALG_NONE }
1046
1050#if defined(MBEDTLS_PSA_CRYPTO_CLIENT) && !defined(MBEDTLS_PSA_CRYPTO_C)
1051#define PSA_PAKE_OPERATION_INIT { 0 }
1052#else
1053#define PSA_PAKE_OPERATION_INIT { 0, PSA_ALG_NONE, 0, PSA_PAKE_OPERATION_STAGE_SETUP, \
1054 { 0 }, { { 0 } } }
1055#endif
1056
1064
1066 uint8_t *MBEDTLS_PRIVATE(password);
1067 size_t MBEDTLS_PRIVATE(password_len);
1068 uint8_t *MBEDTLS_PRIVATE(user);
1069 size_t MBEDTLS_PRIVATE(user_len);
1070 uint8_t *MBEDTLS_PRIVATE(peer);
1071 size_t MBEDTLS_PRIVATE(peer_len);
1074};
1075
1077 PSA_JPAKE_STEP_INVALID = 0, /* Invalid step */
1078 PSA_JPAKE_X1_STEP_KEY_SHARE = 1, /* Round 1: input/output key share (for ephemeral private key X1).*/
1079 PSA_JPAKE_X1_STEP_ZK_PUBLIC = 2, /* Round 1: input/output Schnorr NIZKP public key for the X1 key */
1080 PSA_JPAKE_X1_STEP_ZK_PROOF = 3, /* Round 1: input/output Schnorr NIZKP proof for the X1 key */
1081 PSA_JPAKE_X2_STEP_KEY_SHARE = 4, /* Round 1: input/output key share (for ephemeral private key X2).*/
1082 PSA_JPAKE_X2_STEP_ZK_PUBLIC = 5, /* Round 1: input/output Schnorr NIZKP public key for the X2 key */
1083 PSA_JPAKE_X2_STEP_ZK_PROOF = 6, /* Round 1: input/output Schnorr NIZKP proof for the X2 key */
1084 PSA_JPAKE_X2S_STEP_KEY_SHARE = 7, /* Round 2: output X2S key (our key) */
1085 PSA_JPAKE_X2S_STEP_ZK_PUBLIC = 8, /* Round 2: output Schnorr NIZKP public key for the X2S key (our key) */
1086 PSA_JPAKE_X2S_STEP_ZK_PROOF = 9, /* Round 2: output Schnorr NIZKP proof for the X2S key (our key) */
1087 PSA_JPAKE_X4S_STEP_KEY_SHARE = 10, /* Round 2: input X4S key (from peer) */
1088 PSA_JPAKE_X4S_STEP_ZK_PUBLIC = 11, /* Round 2: input Schnorr NIZKP public key for the X4S key (from peer) */
1089 PSA_JPAKE_X4S_STEP_ZK_PROOF = 12 /* Round 2: input Schnorr NIZKP proof for the X4S key (from peer) */
1091
1097
1102
1104 /* The J-PAKE round we are currently on */
1106 /* The 'mode' we are currently in (inputting or outputting) */
1108 /* The number of completed inputs so far this round */
1109 uint8_t MBEDTLS_PRIVATE(inputs);
1110 /* The number of completed outputs so far this round */
1111 uint8_t MBEDTLS_PRIVATE(outputs);
1112 /* The next expected step (KEY_SHARE, ZK_PUBLIC or ZK_PROOF) */
1114};
1115
1116#define PSA_JPAKE_EXPECTED_INPUTS(round) ((round) == PSA_JPAKE_FINISHED ? 0 : \
1117 ((round) == PSA_JPAKE_FIRST ? 2 : 1))
1118#define PSA_JPAKE_EXPECTED_OUTPUTS(round) ((round) == PSA_JPAKE_FINISHED ? 0 : \
1119 ((round) == PSA_JPAKE_FIRST ? 2 : 1))
1120
1122#if defined(MBEDTLS_PSA_CRYPTO_CLIENT) && !defined(MBEDTLS_PSA_CRYPTO_C)
1123 mbedtls_psa_client_handle_t handle;
1124#else
1131 unsigned int MBEDTLS_PRIVATE(id);
1132 /* Algorithm of the PAKE operation */
1134 /* A primitive of type compatible with algorithm */
1136 /* Stage of the PAKE operation: waiting for the setup, collecting inputs
1137 * or computing. */
1138 uint8_t MBEDTLS_PRIVATE(stage);
1139 /* Holds computation stage of the PAKE algorithms. */
1140 union {
1141 uint8_t MBEDTLS_PRIVATE(dummy);
1142#if defined(PSA_WANT_ALG_JPAKE)
1144#endif
1145 } MBEDTLS_PRIVATE(computation_stage);
1146 union {
1150#endif
1151};
1152
1164
1168
1176 const psa_pake_cipher_suite_t *cipher_suite);
1177
1190static void psa_pake_cs_set_algorithm(psa_pake_cipher_suite_t *cipher_suite,
1192
1200 const psa_pake_cipher_suite_t *cipher_suite);
1201
1211static void psa_pake_cs_set_primitive(psa_pake_cipher_suite_t *cipher_suite,
1212 psa_pake_primitive_t primitive);
1213
1221 const psa_pake_cipher_suite_t *cipher_suite);
1222
1229static uint16_t psa_pake_cs_get_bits(
1230 const psa_pake_cipher_suite_t *cipher_suite);
1231
1241 const psa_pake_cipher_suite_t *cipher_suite);
1242
1259static void psa_pake_cs_set_hash(psa_pake_cipher_suite_t *cipher_suite,
1261
1291
1294
1297
1301
1313 const psa_crypto_driver_pake_inputs_t *inputs,
1314 size_t *password_len);
1315
1329 const psa_crypto_driver_pake_inputs_t *inputs,
1330 uint8_t *buffer, size_t buffer_size, size_t *buffer_length);
1331
1343 const psa_crypto_driver_pake_inputs_t *inputs,
1344 size_t *user_len);
1345
1357 const psa_crypto_driver_pake_inputs_t *inputs,
1358 size_t *peer_len);
1359
1375 const psa_crypto_driver_pake_inputs_t *inputs,
1376 uint8_t *user_id, size_t user_id_size, size_t *user_id_len);
1377
1393 const psa_crypto_driver_pake_inputs_t *inputs,
1394 uint8_t *peer_id, size_t peer_id_size, size_t *peer_id_length);
1395
1407 const psa_crypto_driver_pake_inputs_t *inputs,
1408 psa_pake_cipher_suite_t *cipher_suite);
1409
1481 const psa_pake_cipher_suite_t *cipher_suite);
1482
1529 mbedtls_svc_key_id_t password);
1530
1569 const uint8_t *user_id,
1570 size_t user_id_len);
1571
1611 const uint8_t *peer_id,
1612 size_t peer_id_len);
1613
1653 psa_pake_role_t role);
1654
1711 psa_pake_step_t step,
1712 uint8_t *output,
1713 size_t output_size,
1714 size_t *output_length);
1715
1766 psa_pake_step_t step,
1767 const uint8_t *input,
1768 size_t input_length);
1769
1830
1856
1860 const psa_pake_cipher_suite_t *cipher_suite)
1861{
1862 return cipher_suite->algorithm;
1863}
1864
1865static inline void psa_pake_cs_set_algorithm(
1866 psa_pake_cipher_suite_t *cipher_suite,
1867 psa_algorithm_t algorithm)
1868{
1869 if (!PSA_ALG_IS_PAKE(algorithm)) {
1870 cipher_suite->algorithm = 0;
1871 } else {
1872 cipher_suite->algorithm = algorithm;
1873 }
1874}
1875
1877 const psa_pake_cipher_suite_t *cipher_suite)
1878{
1879 return PSA_PAKE_PRIMITIVE(cipher_suite->type, cipher_suite->family,
1880 cipher_suite->bits);
1881}
1882
1883static inline void psa_pake_cs_set_primitive(
1884 psa_pake_cipher_suite_t *cipher_suite,
1885 psa_pake_primitive_t primitive)
1886{
1887 cipher_suite->type = (psa_pake_primitive_type_t) (primitive >> 24);
1888 cipher_suite->family = (psa_pake_family_t) (0xFF & (primitive >> 16));
1889 cipher_suite->bits = (uint16_t) (0xFFFF & primitive);
1890}
1891
1893 const psa_pake_cipher_suite_t *cipher_suite)
1894{
1895 return cipher_suite->family;
1896}
1897
1898static inline uint16_t psa_pake_cs_get_bits(
1899 const psa_pake_cipher_suite_t *cipher_suite)
1900{
1901 return cipher_suite->bits;
1902}
1903
1905 const psa_pake_cipher_suite_t *cipher_suite)
1906{
1907 return cipher_suite->hash;
1908}
1909
1910static inline void psa_pake_cs_set_hash(psa_pake_cipher_suite_t *cipher_suite,
1911 psa_algorithm_t hash)
1912{
1913 if (!PSA_ALG_IS_HASH(hash)) {
1914 cipher_suite->hash = 0;
1915 } else {
1916 cipher_suite->hash = hash;
1917 }
1918}
1919
1921{
1923 return v;
1924}
1925
1927{
1929 return v;
1930}
1931
1932#ifdef __cplusplus
1933}
1934#endif
1935
1936#endif /* PSA_CRYPTO_EXTRA_H */
PSA cryptography module: Backward compatibility aliases.
void mbedtls_psa_crypto_free(void)
Library deinitialization.
#define PSA_PAKE_OPERATION_INIT
psa_crypto_driver_pake_step
@ PSA_JPAKE_X2_STEP_KEY_SHARE
@ PSA_JPAKE_X2S_STEP_KEY_SHARE
@ PSA_JPAKE_X1_STEP_ZK_PUBLIC
@ PSA_JPAKE_STEP_INVALID
@ PSA_JPAKE_X4S_STEP_KEY_SHARE
@ PSA_JPAKE_X2S_STEP_ZK_PROOF
@ PSA_JPAKE_X2_STEP_ZK_PUBLIC
@ PSA_JPAKE_X4S_STEP_ZK_PROOF
@ PSA_JPAKE_X2_STEP_ZK_PROOF
@ PSA_JPAKE_X4S_STEP_ZK_PUBLIC
@ PSA_JPAKE_X1_STEP_KEY_SHARE
@ PSA_JPAKE_X2S_STEP_ZK_PUBLIC
@ PSA_JPAKE_X1_STEP_ZK_PROOF
psa_jpake_io_mode
@ PSA_JPAKE_OUTPUT
@ PSA_JPAKE_INPUT
enum psa_crypto_driver_pake_step psa_crypto_driver_pake_step_t
psa_jpake_round
@ PSA_JPAKE_FINISHED
@ PSA_JPAKE_FIRST
@ PSA_JPAKE_SECOND
#define PSA_PAKE_CIPHER_SUITE_INIT
enum psa_jpake_io_mode psa_jpake_io_mode_t
enum psa_jpake_round psa_jpake_round_t
void mbedtls_psa_get_stats(mbedtls_psa_stats_t *stats)
Get statistics about resource consumption related to the PSA keystore.
struct mbedtls_psa_stats_s mbedtls_psa_stats_t
Statistics about resource consumption related to the PSA keystore.
psa_status_t mbedtls_psa_inject_entropy(const uint8_t *seed, size_t seed_size)
Inject an initial entropy seed for the random generator into secure storage.
PSA cryptography module: type aliases.
static psa_algorithm_t psa_get_key_enrollment_algorithm(const psa_key_attributes_t *attributes)
static void psa_set_key_enrollment_algorithm(psa_key_attributes_t *attributes, psa_algorithm_t alg2)
Declare the enrollment algorithm for a key.
#define PSA_ALG_IS_PAKE(alg)
uint32_t psa_algorithm_t
Encoding of a cryptographic algorithm.
#define PSA_ALG_IS_HASH(alg)
int32_t psa_status_t
Function return status.
uint32_t psa_key_id_t
uint32_t psa_key_lifetime_t
psa_key_id_t mbedtls_svc_key_id_t
static uint16_t psa_pake_cs_get_bits(const psa_pake_cipher_suite_t *cipher_suite)
psa_status_t psa_pake_set_password_key(psa_pake_operation_t *operation, mbedtls_svc_key_id_t password)
static psa_pake_primitive_t psa_pake_cs_get_primitive(const psa_pake_cipher_suite_t *cipher_suite)
psa_status_t psa_pake_abort(psa_pake_operation_t *operation)
psa_status_t psa_crypto_driver_pake_get_password(const psa_crypto_driver_pake_inputs_t *inputs, uint8_t *buffer, size_t buffer_size, size_t *buffer_length)
psa_status_t psa_pake_input(psa_pake_operation_t *operation, psa_pake_step_t step, const uint8_t *input, size_t input_length)
uint32_t psa_pake_primitive_t
Encoding of the primitive associated with the PAKE.
static void psa_pake_cs_set_hash(psa_pake_cipher_suite_t *cipher_suite, psa_algorithm_t hash)
psa_status_t psa_pake_setup(psa_pake_operation_t *operation, const psa_pake_cipher_suite_t *cipher_suite)
psa_status_t psa_pake_output(psa_pake_operation_t *operation, psa_pake_step_t step, uint8_t *output, size_t output_size, size_t *output_length)
psa_status_t psa_pake_set_user(psa_pake_operation_t *operation, const uint8_t *user_id, size_t user_id_len)
static void psa_pake_cs_set_primitive(psa_pake_cipher_suite_t *cipher_suite, psa_pake_primitive_t primitive)
static psa_pake_cipher_suite_t psa_pake_cipher_suite_init(void)
psa_status_t psa_crypto_driver_pake_get_password_len(const psa_crypto_driver_pake_inputs_t *inputs, size_t *password_len)
static void psa_pake_cs_set_algorithm(psa_pake_cipher_suite_t *cipher_suite, psa_algorithm_t algorithm)
uint8_t psa_pake_role_t
Encoding of the application role of PAKE.
static psa_pake_family_t psa_pake_cs_get_family(const psa_pake_cipher_suite_t *cipher_suite)
psa_status_t psa_pake_set_peer(psa_pake_operation_t *operation, const uint8_t *peer_id, size_t peer_id_len)
static psa_pake_operation_t psa_pake_operation_init(void)
uint8_t psa_pake_step_t
psa_status_t psa_crypto_driver_pake_get_peer(const psa_crypto_driver_pake_inputs_t *inputs, uint8_t *peer_id, size_t peer_id_size, size_t *peer_id_length)
uint8_t psa_pake_primitive_type_t
psa_status_t psa_crypto_driver_pake_get_peer_len(const psa_crypto_driver_pake_inputs_t *inputs, size_t *peer_len)
psa_status_t psa_crypto_driver_pake_get_user_len(const psa_crypto_driver_pake_inputs_t *inputs, size_t *user_len)
psa_status_t psa_pake_get_implicit_key(psa_pake_operation_t *operation, psa_key_derivation_operation_t *output)
uint8_t psa_pake_family_t
Encoding of the family of the primitive associated with the PAKE.
psa_status_t psa_crypto_driver_pake_get_user(const psa_crypto_driver_pake_inputs_t *inputs, uint8_t *user_id, size_t user_id_size, size_t *user_id_len)
static psa_algorithm_t psa_pake_cs_get_algorithm(const psa_pake_cipher_suite_t *cipher_suite)
#define PSA_PAKE_PRIMITIVE(pake_type, pake_family, pake_bits)
psa_status_t psa_pake_set_role(psa_pake_operation_t *operation, psa_pake_role_t role)
psa_status_t psa_crypto_driver_pake_get_cipher_suite(const psa_crypto_driver_pake_inputs_t *inputs, psa_pake_cipher_suite_t *cipher_suite)
static psa_algorithm_t psa_pake_cs_get_hash(const psa_pake_cipher_suite_t *cipher_suite)
#define MBEDTLS_PSA_KEY_ID_BUILTIN_MAX
uint64_t psa_drv_slot_number_t
#define MBEDTLS_PSA_KEY_ID_BUILTIN_MIN
int psa_can_do_hash(psa_algorithm_t hash_alg)
uint64_t psa_key_slot_number_t
Macro wrapper for struct's members.
#define MBEDTLS_PRIVATE(member)
Statistics about resource consumption related to the PSA keystore.
psa_algorithm_t algorithm
psa_pake_primitive_type_t type
psa_pake_family_t family