blob: 3a23df4b7c4d675c5fb5a8540ad234021ab76843 [file] [log] [blame]
Juan Castillo8e55d932015-04-02 09:48:16 +01001/*
Manish V Badarkhe92de80a2021-12-16 10:41:47 +00002 * Copyright (c) 2015-2022, Arm Limited and Contributors. All rights reserved.
Juan Castillo8e55d932015-04-02 09:48:16 +01003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Juan Castillo8e55d932015-04-02 09:48:16 +01005 */
6
Antonio Nino Diaz5eb88372018-11-08 10:20:19 +00007#ifndef CRYPTO_MOD_H
8#define CRYPTO_MOD_H
Juan Castillo8e55d932015-04-02 09:48:16 +01009
Manish V Badarkhec9fdaf62022-06-20 15:32:38 +010010#define CRYPTO_AUTH_VERIFY_ONLY 1
11#define CRYPTO_HASH_CALC_ONLY 2
12#define CRYPTO_AUTH_VERIFY_AND_HASH_CALC 3
13
Juan Castillo8e55d932015-04-02 09:48:16 +010014/* Return values */
15enum crypto_ret_value {
16 CRYPTO_SUCCESS = 0,
17 CRYPTO_ERR_INIT,
18 CRYPTO_ERR_HASH,
19 CRYPTO_ERR_SIGNATURE,
Sumit Garg392e4df2019-11-15 10:43:00 +053020 CRYPTO_ERR_DECRYPTION,
Juan Castillo8e55d932015-04-02 09:48:16 +010021 CRYPTO_ERR_UNKNOWN
22};
23
Sumit Garg392e4df2019-11-15 10:43:00 +053024#define CRYPTO_MAX_IV_SIZE 16U
25#define CRYPTO_MAX_TAG_SIZE 16U
26
27/* Decryption algorithm */
28enum crypto_dec_algo {
29 CRYPTO_GCM_DECRYPT = 0
30};
31
Manish V Badarkhee112a5a2021-10-06 23:41:50 +010032/* Message digest algorithm */
33enum crypto_md_algo {
34 CRYPTO_MD_SHA256,
35 CRYPTO_MD_SHA384,
36 CRYPTO_MD_SHA512,
37};
38
39/* Maximum size as per the known stronger hash algorithm i.e.SHA512 */
40#define CRYPTO_MD_MAX_SIZE 64U
41
Juan Castillo8e55d932015-04-02 09:48:16 +010042/*
43 * Cryptographic library descriptor
44 */
45typedef struct crypto_lib_desc_s {
46 const char *name;
47
48 /* Initialize library. This function is not expected to fail. All errors
49 * must be handled inside the function, asserting or panicing in case of
50 * a non-recoverable error */
51 void (*init)(void);
52
53 /* Verify a digital signature. Return one of the
54 * 'enum crypto_ret_value' options */
Manish V Badarkhec9fdaf62022-06-20 15:32:38 +010055#if CRYPTO_SUPPORT == CRYPTO_AUTH_VERIFY_ONLY || \
56CRYPTO_SUPPORT == CRYPTO_AUTH_VERIFY_AND_HASH_CALC
Juan Castillo8e55d932015-04-02 09:48:16 +010057 int (*verify_signature)(void *data_ptr, unsigned int data_len,
58 void *sig_ptr, unsigned int sig_len,
59 void *sig_alg, unsigned int sig_alg_len,
60 void *pk_ptr, unsigned int pk_len);
61
62 /* Verify a hash. Return one of the 'enum crypto_ret_value' options */
63 int (*verify_hash)(void *data_ptr, unsigned int data_len,
64 void *digest_info_ptr, unsigned int digest_info_len);
Manish V Badarkhec9fdaf62022-06-20 15:32:38 +010065#endif /* CRYPTO_SUPPORT == CRYPTO_AUTH_VERIFY_ONLY || \
66 CRYPTO_SUPPORT == CRYPTO_AUTH_VERIFY_AND_HASH_CALC */
Alexei Fedorov913cb7e2020-01-23 14:27:38 +000067
Manish V Badarkhec9fdaf62022-06-20 15:32:38 +010068#if CRYPTO_SUPPORT == CRYPTO_HASH_CALC_ONLY || \
69CRYPTO_SUPPORT == CRYPTO_AUTH_VERIFY_AND_HASH_CALC
Alexei Fedorov913cb7e2020-01-23 14:27:38 +000070 /* Calculate a hash. Return hash value */
Manish V Badarkhee112a5a2021-10-06 23:41:50 +010071 int (*calc_hash)(enum crypto_md_algo md_alg, void *data_ptr,
72 unsigned int data_len,
73 unsigned char output[CRYPTO_MD_MAX_SIZE]);
Manish V Badarkhec9fdaf62022-06-20 15:32:38 +010074#endif /* CRYPTO_SUPPORT == CRYPTO_HASH_CALC_ONLY || \
75 CRYPTO_SUPPORT == CRYPTO_AUTH_VERIFY_AND_HASH_CALC */
Alexei Fedorov913cb7e2020-01-23 14:27:38 +000076
Sumit Garg392e4df2019-11-15 10:43:00 +053077 /*
78 * Authenticated decryption. Return one of the
79 * 'enum crypto_ret_value' options.
80 */
81 int (*auth_decrypt)(enum crypto_dec_algo dec_algo, void *data_ptr,
82 size_t len, const void *key, unsigned int key_len,
83 unsigned int key_flags, const void *iv,
84 unsigned int iv_len, const void *tag,
85 unsigned int tag_len);
Juan Castillo8e55d932015-04-02 09:48:16 +010086} crypto_lib_desc_t;
87
88/* Public functions */
Manish V Badarkhe92de80a2021-12-16 10:41:47 +000089#if CRYPTO_SUPPORT
Juan Castillo8e55d932015-04-02 09:48:16 +010090void crypto_mod_init(void);
Manish V Badarkhe92de80a2021-12-16 10:41:47 +000091#else
92static inline void crypto_mod_init(void)
93{
94}
95#endif /* CRYPTO_SUPPORT */
96
Manish V Badarkhec9fdaf62022-06-20 15:32:38 +010097#if CRYPTO_SUPPORT == CRYPTO_AUTH_VERIFY_ONLY || \
98CRYPTO_SUPPORT == CRYPTO_AUTH_VERIFY_AND_HASH_CALC
Juan Castillo8e55d932015-04-02 09:48:16 +010099int crypto_mod_verify_signature(void *data_ptr, unsigned int data_len,
100 void *sig_ptr, unsigned int sig_len,
Roberto Vargasbe126ed2018-02-12 12:36:17 +0000101 void *sig_alg_ptr, unsigned int sig_alg_len,
Juan Castillo8e55d932015-04-02 09:48:16 +0100102 void *pk_ptr, unsigned int pk_len);
103int crypto_mod_verify_hash(void *data_ptr, unsigned int data_len,
104 void *digest_info_ptr, unsigned int digest_info_len);
Manish V Badarkhec9fdaf62022-06-20 15:32:38 +0100105#endif /* CRYPTO_SUPPORT == CRYPTO_AUTH_VERIFY_ONLY || \
106 CRYPTO_SUPPORT == CRYPTO_AUTH_VERIFY_AND_HASH_CALC */
107
Sumit Garg392e4df2019-11-15 10:43:00 +0530108int crypto_mod_auth_decrypt(enum crypto_dec_algo dec_algo, void *data_ptr,
109 size_t len, const void *key, unsigned int key_len,
110 unsigned int key_flags, const void *iv,
111 unsigned int iv_len, const void *tag,
112 unsigned int tag_len);
Juan Castillo8e55d932015-04-02 09:48:16 +0100113
Manish V Badarkhec9fdaf62022-06-20 15:32:38 +0100114#if CRYPTO_SUPPORT == CRYPTO_HASH_CALC_ONLY || \
115CRYPTO_SUPPORT == CRYPTO_AUTH_VERIFY_AND_HASH_CALC
Manish V Badarkhee112a5a2021-10-06 23:41:50 +0100116int crypto_mod_calc_hash(enum crypto_md_algo alg, void *data_ptr,
117 unsigned int data_len,
118 unsigned char output[CRYPTO_MD_MAX_SIZE]);
Manish V Badarkhec9fdaf62022-06-20 15:32:38 +0100119#endif /* CRYPTO_SUPPORT == CRYPTO_HASH_CALC_ONLY || \
120 CRYPTO_SUPPORT == CRYPTO_AUTH_VERIFY_AND_HASH_CALC */
Alexei Fedorov913cb7e2020-01-23 14:27:38 +0000121
Manish V Badarkhec9fdaf62022-06-20 15:32:38 +0100122#if CRYPTO_SUPPORT == CRYPTO_AUTH_VERIFY_AND_HASH_CALC
Juan Castillo8e55d932015-04-02 09:48:16 +0100123/* Macro to register a cryptographic library */
Alexei Fedorov913cb7e2020-01-23 14:27:38 +0000124#define REGISTER_CRYPTO_LIB(_name, _init, _verify_signature, _verify_hash, \
Sumit Garg392e4df2019-11-15 10:43:00 +0530125 _calc_hash, _auth_decrypt) \
Alexei Fedorov913cb7e2020-01-23 14:27:38 +0000126 const crypto_lib_desc_t crypto_lib_desc = { \
127 .name = _name, \
128 .init = _init, \
129 .verify_signature = _verify_signature, \
130 .verify_hash = _verify_hash, \
Sumit Garg392e4df2019-11-15 10:43:00 +0530131 .calc_hash = _calc_hash, \
132 .auth_decrypt = _auth_decrypt \
Alexei Fedorov913cb7e2020-01-23 14:27:38 +0000133 }
Manish V Badarkhec9fdaf62022-06-20 15:32:38 +0100134#elif CRYPTO_SUPPORT == CRYPTO_AUTH_VERIFY_ONLY
Sumit Garg392e4df2019-11-15 10:43:00 +0530135#define REGISTER_CRYPTO_LIB(_name, _init, _verify_signature, _verify_hash, \
136 _auth_decrypt) \
Juan Castillo8e55d932015-04-02 09:48:16 +0100137 const crypto_lib_desc_t crypto_lib_desc = { \
138 .name = _name, \
139 .init = _init, \
140 .verify_signature = _verify_signature, \
Sumit Garg392e4df2019-11-15 10:43:00 +0530141 .verify_hash = _verify_hash, \
142 .auth_decrypt = _auth_decrypt \
Juan Castillo8e55d932015-04-02 09:48:16 +0100143 }
Manish V Badarkhec9fdaf62022-06-20 15:32:38 +0100144#elif CRYPTO_SUPPORT == CRYPTO_HASH_CALC_ONLY
Manish V Badarkhe92de80a2021-12-16 10:41:47 +0000145#define REGISTER_CRYPTO_LIB(_name, _init, _calc_hash) \
146 const crypto_lib_desc_t crypto_lib_desc = { \
147 .name = _name, \
148 .init = _init, \
149 .calc_hash = _calc_hash, \
150 }
Manish V Badarkhec9fdaf62022-06-20 15:32:38 +0100151#endif /* CRYPTO_SUPPORT == CRYPTO_AUTH_VERIFY_AND_HASH_CALC */
Juan Castillo8e55d932015-04-02 09:48:16 +0100152
Roberto Vargas52f707f2018-02-12 12:36:17 +0000153extern const crypto_lib_desc_t crypto_lib_desc;
154
Antonio Nino Diaz5eb88372018-11-08 10:20:19 +0000155#endif /* CRYPTO_MOD_H */