blob: 9b6b798b66ba2156d41674b2b5ddd53129e4744b [file] [log] [blame]
Ronald Cron7ceee8d2021-03-17 16:55:43 +01001/*
2 * PSA AEAD driver entry points
3 */
4/*
5 * Copyright The Mbed TLS Contributors
6 * SPDX-License-Identifier: Apache-2.0
7 *
8 * Licensed under the Apache License, Version 2.0 (the "License"); you may
9 * not use this file except in compliance with the License.
10 * You may obtain a copy of the License at
11 *
12 * http://www.apache.org/licenses/LICENSE-2.0
13 *
14 * Unless required by applicable law or agreed to in writing, software
15 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 * See the License for the specific language governing permissions and
18 * limitations under the License.
19 */
20
21#ifndef PSA_CRYPTO_AEAD_H
22#define PSA_CRYPTO_AEAD_H
23
24#include <psa/crypto.h>
25
Ronald Cron46f91782021-03-17 08:16:34 +010026/**
27 * \brief Process an authenticated encryption operation.
28 *
29 * \note The signature of this function is that of a PSA driver
30 * aead_encrypt entry point. This function behaves as an aead_encrypt
31 * entry point as defined in the PSA driver interface specification for
32 * transparent drivers.
33 *
34 * \param[in] attributes The attributes of the key to use for the
35 * operation.
36 * \param[in] key_buffer The buffer containing the key context.
37 * \param key_buffer_size Size of the \p key_buffer buffer in bytes.
38 * \param alg The AEAD algorithm to compute.
39 * \param[in] nonce Nonce or IV to use.
40 * \param nonce_length Size of the nonce buffer in bytes. This must
41 * be appropriate for the selected algorithm.
42 * The default nonce size is
43 * PSA_AEAD_NONCE_LENGTH(key_type, alg) where
44 * key_type is the type of key.
45 * \param[in] additional_data Additional data that will be authenticated
46 * but not encrypted.
47 * \param additional_data_length Size of additional_data in bytes.
48 * \param[in] plaintext Data that will be authenticated and encrypted.
49 * \param plaintext_length Size of plaintext in bytes.
50 * \param[out] ciphertext Output buffer for the authenticated and
51 * encrypted data. The additional data is not
52 * part of this output. For algorithms where the
53 * encrypted data and the authentication tag are
54 * defined as separate outputs, the
55 * authentication tag is appended to the
56 * encrypted data.
57 * \param ciphertext_size Size of the ciphertext buffer in bytes. This
58 * must be appropriate for the selected algorithm
59 * and key:
60 * - A sufficient output size is
61 * PSA_AEAD_ENCRYPT_OUTPUT_SIZE(key_type, alg,
62 * plaintext_length) where key_type is the type
63 * of key.
64 * - PSA_AEAD_ENCRYPT_OUTPUT_MAX_SIZE(
65 * plaintext_length) evaluates to the maximum
66 * ciphertext size of any supported AEAD
67 * encryption.
68 * \param[out] ciphertext_length On success, the size of the output in the
69 * ciphertext buffer.
70 *
71 * \retval #PSA_SUCCESS Success.
72 * \retval #PSA_ERROR_NOT_SUPPORTED
73 * \p alg is not supported.
74 * \retval #PSA_ERROR_INSUFFICIENT_MEMORY
75 * \retval #PSA_ERROR_BUFFER_TOO_SMALL
76 * ciphertext_size is too small.
77 * \retval #PSA_ERROR_CORRUPTION_DETECTED
78 */
79psa_status_t mbedtls_psa_aead_encrypt(
80 const psa_key_attributes_t *attributes,
81 const uint8_t *key_buffer, size_t key_buffer_size,
82 psa_algorithm_t alg,
83 const uint8_t *nonce, size_t nonce_length,
84 const uint8_t *additional_data, size_t additional_data_length,
85 const uint8_t *plaintext, size_t plaintext_length,
86 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length );
87
88/**
89 * \brief Process an authenticated decryption operation.
90 *
91 * \note The signature of this function is that of a PSA driver
92 * aead_decrypt entry point. This function behaves as an aead_decrypt
93 * entry point as defined in the PSA driver interface specification for
94 * transparent drivers.
95 *
96 * \param[in] attributes The attributes of the key to use for the
97 * operation.
98 * \param[in] key_buffer The buffer containing the key context.
99 * \param key_buffer_size Size of the \p key_buffer buffer in bytes.
100 * \param alg The AEAD algorithm to compute.
101 * \param[in] nonce Nonce or IV to use.
102 * \param nonce_length Size of the nonce buffer in bytes. This must
103 * be appropriate for the selected algorithm.
104 * The default nonce size is
105 * PSA_AEAD_NONCE_LENGTH(key_type, alg) where
106 * key_type is the type of key.
107 * \param[in] additional_data Additional data that has been authenticated
108 * but not encrypted.
109 * \param additional_data_length Size of additional_data in bytes.
110 * \param[in] ciphertext Data that has been authenticated and
111 * encrypted. For algorithms where the encrypted
112 * data and the authentication tag are defined
113 * as separate inputs, the buffer contains
114 * encrypted data followed by the authentication
115 * tag.
116 * \param ciphertext_length Size of ciphertext in bytes.
117 * \param[out] plaintext Output buffer for the decrypted data.
118 * \param plaintext_size Size of the plaintext buffer in bytes. This
119 * must be appropriate for the selected algorithm
120 * and key:
121 * - A sufficient output size is
122 * PSA_AEAD_DECRYPT_OUTPUT_SIZE(key_type, alg,
123 * ciphertext_length) where key_type is the
124 * type of key.
125 * - PSA_AEAD_DECRYPT_OUTPUT_MAX_SIZE(
126 * ciphertext_length) evaluates to the maximum
127 * plaintext size of any supported AEAD
128 * decryption.
129 * \param[out] plaintext_length On success, the size of the output in the
130 * plaintext buffer.
131 *
132 * \retval #PSA_SUCCESS Success.
133 * \retval #PSA_ERROR_INVALID_SIGNATURE
134 * The cipher is not authentic.
135 * \retval #PSA_ERROR_NOT_SUPPORTED
136 * \p alg is not supported.
137 * \retval #PSA_ERROR_INSUFFICIENT_MEMORY
138 * \retval #PSA_ERROR_BUFFER_TOO_SMALL
139 * plaintext_size is too small.
140 * \retval #PSA_ERROR_CORRUPTION_DETECTED
141 */
142psa_status_t mbedtls_psa_aead_decrypt(
143 const psa_key_attributes_t *attributes,
144 const uint8_t *key_buffer, size_t key_buffer_size,
145 psa_algorithm_t alg,
146 const uint8_t *nonce, size_t nonce_length,
147 const uint8_t *additional_data, size_t additional_data_length,
148 const uint8_t *ciphertext, size_t ciphertext_length,
149 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length );
150
Paul Elliottadb8b162021-04-20 16:06:57 +0100151/** Set the key for a multipart authenticated encryption operation.
152 *
153 * \note The signature of this function is that of a PSA driver
154 * aead_encrypt_setup entry point. This function behaves as an
155 * aead_encrypt_setup entry point as defined in the PSA driver interface
156 * specification for transparent drivers.
157 *
Paul Elliottcbbde5f2021-05-10 18:19:46 +0100158 * If an error occurs at any step after a call to
Paul Elliott4148a682021-05-14 17:26:56 +0100159 * mbedtls_psa_aead_encrypt_setup(), the operation is reset by the PSA core by a
160 * call to mbedtls_psa_aead_abort(). The PSA core may call
Paul Elliottcbbde5f2021-05-10 18:19:46 +0100161 * mbedtls_psa_aead_abort() at any time after the operation has been
Paul Elliott36869702021-08-19 19:17:04 +0100162 * initialized, and is required to when the operation is no longer needed.
Paul Elliottadb8b162021-04-20 16:06:57 +0100163 *
164 * \param[in,out] operation The operation object to set up. It must have
165 * been initialized as per the documentation for
Paul Elliottcbbde5f2021-05-10 18:19:46 +0100166 * #mbedtls_psa_aead_operation_t and not yet in
167 * use.
Paul Elliottadb8b162021-04-20 16:06:57 +0100168 * \param[in] attributes The attributes of the key to use for the
169 * operation.
170 * \param[in] key_buffer The buffer containing the key context.
171 * \param key_buffer_size Size of the \p key_buffer buffer in bytes.
172 * \param alg The AEAD algorithm to compute
173 * (\c PSA_ALG_XXX value such that
174 * #PSA_ALG_IS_AEAD(\p alg) is true).
175 *
176 * \retval #PSA_SUCCESS
177 * Success.
Paul Elliottadb8b162021-04-20 16:06:57 +0100178 * \retval #PSA_ERROR_INVALID_ARGUMENT
Paul Elliotta8940ed2021-06-24 16:57:52 +0100179 * An invalid block length was supplied.
Paul Elliottadb8b162021-04-20 16:06:57 +0100180 * \retval #PSA_ERROR_NOT_SUPPORTED
Paul Elliott1c8de152021-06-03 15:54:00 +0100181 * \p alg is not supported.
Paul Elliottadb8b162021-04-20 16:06:57 +0100182 * \retval #PSA_ERROR_INSUFFICIENT_MEMORY
Paul Elliottb91f3312021-05-19 12:30:15 +0100183 * Failed to allocate memory for key material
Paul Elliottadb8b162021-04-20 16:06:57 +0100184 */
Paul Elliottbb8bf662021-05-19 17:29:42 +0100185psa_status_t mbedtls_psa_aead_encrypt_setup(
186 mbedtls_psa_aead_operation_t *operation,
187 const psa_key_attributes_t *attributes,
188 const uint8_t *key_buffer,
189 size_t key_buffer_size,
190 psa_algorithm_t alg );
Paul Elliottadb8b162021-04-20 16:06:57 +0100191
192/** Set the key for a multipart authenticated decryption operation.
193 *
194 * \note The signature of this function is that of a PSA driver
195 * aead_decrypt_setup entry point. This function behaves as an
196 * aead_decrypt_setup entry point as defined in the PSA driver interface
197 * specification for transparent drivers.
198 *
Paul Elliottcbbde5f2021-05-10 18:19:46 +0100199 * If an error occurs at any step after a call to
Paul Elliott4148a682021-05-14 17:26:56 +0100200 * mbedtls_psa_aead_decrypt_setup(), the PSA core resets the operation by a
201 * call to mbedtls_psa_aead_abort(). The PSA core may call
Paul Elliottcbbde5f2021-05-10 18:19:46 +0100202 * mbedtls_psa_aead_abort() at any time after the operation has been
Paul Elliott36869702021-08-19 19:17:04 +0100203 * initialized, and is required to when the operation is no longer needed.
Paul Elliottadb8b162021-04-20 16:06:57 +0100204 *
205 * \param[in,out] operation The operation object to set up. It must have
206 * been initialized as per the documentation for
Paul Elliottcbbde5f2021-05-10 18:19:46 +0100207 * #mbedtls_psa_aead_operation_t and not yet in
208 * use.
Paul Elliottadb8b162021-04-20 16:06:57 +0100209 * \param[in] attributes The attributes of the key to use for the
210 * operation.
211 * \param[in] key_buffer The buffer containing the key context.
212 * \param key_buffer_size Size of the \p key_buffer buffer in bytes.
213 * \param alg The AEAD algorithm to compute
214 * (\c PSA_ALG_XXX value such that
215 * #PSA_ALG_IS_AEAD(\p alg) is true).
216 *
217 * \retval #PSA_SUCCESS
218 * Success.
Paul Elliotta8940ed2021-06-24 16:57:52 +0100219 * \retval #PSA_ERROR_INVALID_ARGUMENT
220 * An invalid block length was supplied.
Paul Elliottadb8b162021-04-20 16:06:57 +0100221 * \retval #PSA_ERROR_NOT_SUPPORTED
Paul Elliott1c8de152021-06-03 15:54:00 +0100222 * \p alg is not supported.
Paul Elliottadb8b162021-04-20 16:06:57 +0100223 * \retval #PSA_ERROR_INSUFFICIENT_MEMORY
Paul Elliottb91f3312021-05-19 12:30:15 +0100224 * Failed to allocate memory for key material
Paul Elliottadb8b162021-04-20 16:06:57 +0100225 */
Paul Elliottbb8bf662021-05-19 17:29:42 +0100226psa_status_t mbedtls_psa_aead_decrypt_setup(
227 mbedtls_psa_aead_operation_t *operation,
228 const psa_key_attributes_t *attributes,
229 const uint8_t *key_buffer,
230 size_t key_buffer_size,
231 psa_algorithm_t alg );
Paul Elliottadb8b162021-04-20 16:06:57 +0100232
Paul Elliottadb8b162021-04-20 16:06:57 +0100233/** Set the nonce for an authenticated encryption or decryption operation.
234 *
Paul Elliott4148a682021-05-14 17:26:56 +0100235 * \note The signature of this function is that of a PSA driver aead_set_nonce
236 * entry point. This function behaves as an aead_set_nonce entry point as
237 * defined in the PSA driver interface specification for transparent
238 * drivers.
Paul Elliottadb8b162021-04-20 16:06:57 +0100239 *
240 * This function sets the nonce for the authenticated
241 * encryption or decryption operation.
242 *
Paul Elliott4148a682021-05-14 17:26:56 +0100243 * The PSA core calls mbedtls_psa_aead_encrypt_setup() or
Paul Elliottadb8b162021-04-20 16:06:57 +0100244 * mbedtls_psa_aead_decrypt_setup() before calling this function.
245 *
Paul Elliott498d3502021-05-17 18:16:20 +0100246 * If this function returns an error status, the PSA core will call
Paul Elliott4148a682021-05-14 17:26:56 +0100247 * mbedtls_psa_aead_abort().
Paul Elliottadb8b162021-04-20 16:06:57 +0100248 *
249 * \param[in,out] operation Active AEAD operation.
250 * \param[in] nonce Buffer containing the nonce to use.
251 * \param nonce_length Size of the nonce in bytes.
252 *
253 * \retval #PSA_SUCCESS
254 * Success.
Paul Elliottadb8b162021-04-20 16:06:57 +0100255 * \retval #PSA_ERROR_INVALID_ARGUMENT
256 * The size of \p nonce is not acceptable for the chosen algorithm.
Paul Elliottb91f3312021-05-19 12:30:15 +0100257 * \retval #PSA_ERROR_NOT_SUPPORTED
258 * Algorithm previously set is not supported in this configuration of
259 * the library.
Paul Elliottadb8b162021-04-20 16:06:57 +0100260 */
Paul Elliottbb8bf662021-05-19 17:29:42 +0100261psa_status_t mbedtls_psa_aead_set_nonce(
262 mbedtls_psa_aead_operation_t *operation,
263 const uint8_t *nonce,
264 size_t nonce_length );
Paul Elliottadb8b162021-04-20 16:06:57 +0100265
266/** Declare the lengths of the message and additional data for AEAD.
267 *
Paul Elliott4148a682021-05-14 17:26:56 +0100268 * \note The signature of this function is that of a PSA driver aead_set_lengths
269 * entry point. This function behaves as an aead_set_lengths entry point
270 * as defined in the PSA driver interface specification for transparent
271 * drivers.
Paul Elliottadb8b162021-04-20 16:06:57 +0100272 *
Paul Elliott4148a682021-05-14 17:26:56 +0100273 * The PSA core calls this function before calling mbedtls_psa_aead_update_ad()
274 * or mbedtls_psa_aead_update() if the algorithm for the operation requires it.
275 * If the algorithm does not require it, calling this function is optional, but
276 * if this function is called then the implementation must enforce the lengths.
Paul Elliottadb8b162021-04-20 16:06:57 +0100277 *
Paul Elliott4148a682021-05-14 17:26:56 +0100278 * The PSA core may call this function before or after setting the nonce with
279 * mbedtls_psa_aead_set_nonce().
Paul Elliottadb8b162021-04-20 16:06:57 +0100280 *
281 * - For #PSA_ALG_CCM, calling this function is required.
282 * - For the other AEAD algorithms defined in this specification, calling
283 * this function is not required.
Paul Elliottadb8b162021-04-20 16:06:57 +0100284 *
Paul Elliott498d3502021-05-17 18:16:20 +0100285 * If this function returns an error status, the PSA core calls
286 * mbedtls_psa_aead_abort().
Paul Elliottadb8b162021-04-20 16:06:57 +0100287 *
288 * \param[in,out] operation Active AEAD operation.
289 * \param ad_length Size of the non-encrypted additional
290 * authenticated data in bytes.
291 * \param plaintext_length Size of the plaintext to encrypt in bytes.
292 *
293 * \retval #PSA_SUCCESS
294 * Success.
Paul Elliottadb8b162021-04-20 16:06:57 +0100295 * \retval #PSA_ERROR_INVALID_ARGUMENT
296 * At least one of the lengths is not acceptable for the chosen
297 * algorithm.
Paul Elliottb91f3312021-05-19 12:30:15 +0100298 * \retval #PSA_ERROR_NOT_SUPPORTED
299 * Algorithm previously set is not supported in this configuration of
300 * the library.
Paul Elliottadb8b162021-04-20 16:06:57 +0100301 */
Paul Elliottbb8bf662021-05-19 17:29:42 +0100302psa_status_t mbedtls_psa_aead_set_lengths(
303 mbedtls_psa_aead_operation_t *operation,
304 size_t ad_length,
305 size_t plaintext_length );
Paul Elliottadb8b162021-04-20 16:06:57 +0100306
307/** Pass additional data to an active AEAD operation.
308 *
309 * \note The signature of this function is that of a PSA driver
310 * aead_update_ad entry point. This function behaves as an aead_update_ad
311 * entry point as defined in the PSA driver interface specification for
312 * transparent drivers.
313 *
314 * Additional data is authenticated, but not encrypted.
315 *
Paul Elliott4148a682021-05-14 17:26:56 +0100316 * The PSA core can call this function multiple times to pass successive
317 * fragments of the additional data. It will not call this function after
318 * passing data to encrypt or decrypt with mbedtls_psa_aead_update().
Paul Elliottadb8b162021-04-20 16:06:57 +0100319 *
Paul Elliott498d3502021-05-17 18:16:20 +0100320 * Before calling this function, the PSA core will:
Paul Elliott4148a682021-05-14 17:26:56 +0100321 * 1. Call either mbedtls_psa_aead_encrypt_setup() or
322 * mbedtls_psa_aead_decrypt_setup().
323 * 2. Set the nonce with mbedtls_psa_aead_set_nonce().
Paul Elliottadb8b162021-04-20 16:06:57 +0100324 *
Paul Elliott4148a682021-05-14 17:26:56 +0100325 * If this function returns an error status, the PSA core will call
326 * mbedtls_psa_aead_abort().
Paul Elliottadb8b162021-04-20 16:06:57 +0100327 *
Paul Elliottadb8b162021-04-20 16:06:57 +0100328 * \param[in,out] operation Active AEAD operation.
329 * \param[in] input Buffer containing the fragment of
330 * additional data.
331 * \param input_length Size of the \p input buffer in bytes.
332 *
333 * \retval #PSA_SUCCESS
334 * Success.
Paul Elliottb91f3312021-05-19 12:30:15 +0100335 * \retval #PSA_ERROR_NOT_SUPPORTED
336 * Algorithm previously set is not supported in this configuration of
337 * the library.
Paul Elliottadb8b162021-04-20 16:06:57 +0100338 */
Paul Elliottbb8bf662021-05-19 17:29:42 +0100339psa_status_t mbedtls_psa_aead_update_ad(
340 mbedtls_psa_aead_operation_t *operation,
341 const uint8_t *input,
342 size_t input_length );
Paul Elliottadb8b162021-04-20 16:06:57 +0100343
344/** Encrypt or decrypt a message fragment in an active AEAD operation.
345 *
346 * \note The signature of this function is that of a PSA driver
347 * aead_update entry point. This function behaves as an aead_update entry
348 * point as defined in the PSA driver interface specification for
349 * transparent drivers.
350 *
Paul Elliott4148a682021-05-14 17:26:56 +0100351 * Before calling this function, the PSA core will:
352 * 1. Call either mbedtls_psa_aead_encrypt_setup() or
353 * mbedtls_psa_aead_decrypt_setup(). The choice of setup function
354 * determines whether this function encrypts or decrypts its input.
355 * 2. Set the nonce with mbedtls_psa_aead_set_nonce().
356 * 3. Call mbedtls_psa_aead_update_ad() to pass all the additional data.
Paul Elliottadb8b162021-04-20 16:06:57 +0100357 *
Paul Elliott4148a682021-05-14 17:26:56 +0100358 * If this function returns an error status, the PSA core will call
359 * mbedtls_psa_aead_abort().
Paul Elliottadb8b162021-04-20 16:06:57 +0100360 *
361 * This function does not require the input to be aligned to any
362 * particular block boundary. If the implementation can only process
363 * a whole block at a time, it must consume all the input provided, but
364 * it may delay the end of the corresponding output until a subsequent
Paul Elliott12acb6b2021-09-15 17:45:22 +0100365 * call to mbedtls_psa_aead_update(), mbedtls_psa_aead_finish() provides
366 * sufficient input. The amount of data that can be delayed in this way is
367 * bounded by #PSA_AEAD_UPDATE_OUTPUT_SIZE.
Paul Elliottadb8b162021-04-20 16:06:57 +0100368 *
Paul Elliottadb8b162021-04-20 16:06:57 +0100369 * \param[in,out] operation Active AEAD operation.
370 * \param[in] input Buffer containing the message fragment to
371 * encrypt or decrypt.
372 * \param input_length Size of the \p input buffer in bytes.
373 * \param[out] output Buffer where the output is to be written.
374 * \param output_size Size of the \p output buffer in bytes.
Paul Elliott9622c9a2021-05-17 17:30:52 +0100375 * This must be appropriate for the selected
376 * algorithm and key:
377 * - A sufficient output size is
378 * #PSA_AEAD_UPDATE_OUTPUT_SIZE(\c key_type,
379 * \c alg, \p input_length) where
380 * \c key_type is the type of key and \c alg is
381 * the algorithm that were used to set up the
382 * operation.
383 * - #PSA_AEAD_UPDATE_OUTPUT_MAX_SIZE(\p
384 * input_length) evaluates to the maximum
385 * output size of any supported AEAD
386 * algorithm.
Paul Elliottadb8b162021-04-20 16:06:57 +0100387 * \param[out] output_length On success, the number of bytes
388 * that make up the returned output.
389 *
390 * \retval #PSA_SUCCESS
391 * Success.
Paul Elliotta8940ed2021-06-24 16:57:52 +0100392 *
Paul Elliottadb8b162021-04-20 16:06:57 +0100393 * \retval #PSA_ERROR_BUFFER_TOO_SMALL
394 * The size of the \p output buffer is too small.
Paul Elliott9622c9a2021-05-17 17:30:52 +0100395 * #PSA_AEAD_UPDATE_OUTPUT_SIZE(\c key_type, \c alg, \p input_length) or
396 * #PSA_AEAD_UPDATE_OUTPUT_MAX_SIZE(\p input_length) can be used to
397 * determine the required buffer size.
Paul Elliottadb8b162021-04-20 16:06:57 +0100398 */
Paul Elliottbb8bf662021-05-19 17:29:42 +0100399psa_status_t mbedtls_psa_aead_update(
400 mbedtls_psa_aead_operation_t *operation,
401 const uint8_t *input,
402 size_t input_length,
403 uint8_t *output,
404 size_t output_size,
405 size_t *output_length );
Paul Elliottadb8b162021-04-20 16:06:57 +0100406
407/** Finish encrypting a message in an AEAD operation.
408 *
409 * \note The signature of this function is that of a PSA driver
410 * aead_finish entry point. This function behaves as an aead_finish entry
411 * point as defined in the PSA driver interface specification for
412 * transparent drivers.
413 *
Paul Elliott4148a682021-05-14 17:26:56 +0100414 * The operation must have been set up by the PSA core with
415 * mbedtls_psa_aead_encrypt_setup().
Paul Elliottadb8b162021-04-20 16:06:57 +0100416 *
417 * This function finishes the authentication of the additional data
418 * formed by concatenating the inputs passed to preceding calls to
419 * mbedtls_psa_aead_update_ad() with the plaintext formed by concatenating the
420 * inputs passed to preceding calls to mbedtls_psa_aead_update().
421 *
422 * This function has two output buffers:
423 * - \p ciphertext contains trailing ciphertext that was buffered from
Paul Elliott498d3502021-05-17 18:16:20 +0100424 * preceding calls to mbedtls_psa_aead_update().
Paul Elliott4148a682021-05-14 17:26:56 +0100425 * - \p tag contains the authentication tag.
Paul Elliottadb8b162021-04-20 16:06:57 +0100426 *
Paul Elliott4148a682021-05-14 17:26:56 +0100427 * Whether or not this function returns successfuly, the PSA core subsequently
428 * calls mbedtls_psa_aead_abort() to deactivate the operation.
Paul Elliottadb8b162021-04-20 16:06:57 +0100429 *
430 * \param[in,out] operation Active AEAD operation.
431 * \param[out] ciphertext Buffer where the last part of the ciphertext
432 * is to be written.
433 * \param ciphertext_size Size of the \p ciphertext buffer in bytes.
Paul Elliott9622c9a2021-05-17 17:30:52 +0100434 * This must be appropriate for the selected
435 * algorithm and key:
436 * - A sufficient output size is
437 * #PSA_AEAD_FINISH_OUTPUT_SIZE(\c key_type,
438 * \c alg) where \c key_type is the type of key
439 * and \c alg is the algorithm that were used to
440 * set up the operation.
441 * - #PSA_AEAD_FINISH_OUTPUT_MAX_SIZE evaluates to
442 * the maximum output size of any supported AEAD
443 * algorithm.
Paul Elliottadb8b162021-04-20 16:06:57 +0100444 * \param[out] ciphertext_length On success, the number of bytes of
445 * returned ciphertext.
446 * \param[out] tag Buffer where the authentication tag is
447 * to be written.
448 * \param tag_size Size of the \p tag buffer in bytes.
Paul Elliott4148a682021-05-14 17:26:56 +0100449 * This must be appropriate for the selected
450 * algorithm and key:
451 * - The exact tag size is #PSA_AEAD_TAG_LENGTH(\c
452 * key_type, \c key_bits, \c alg) where
453 * \c key_type and \c key_bits are the type and
Paul Elliott498d3502021-05-17 18:16:20 +0100454 * bit-size of the key, and \c alg are the
Paul Elliott4148a682021-05-14 17:26:56 +0100455 * algorithm that were used in the call to
Paul Elliott498d3502021-05-17 18:16:20 +0100456 * mbedtls_psa_aead_encrypt_setup().
Paul Elliott4148a682021-05-14 17:26:56 +0100457 * - #PSA_AEAD_TAG_MAX_SIZE evaluates to the
458 * maximum tag size of any supported AEAD
459 * algorithm.
Paul Elliottadb8b162021-04-20 16:06:57 +0100460 * \param[out] tag_length On success, the number of bytes
461 * that make up the returned tag.
462 *
463 * \retval #PSA_SUCCESS
464 * Success.
Paul Elliottadb8b162021-04-20 16:06:57 +0100465 * \retval #PSA_ERROR_BUFFER_TOO_SMALL
Paul Elliotted68d742021-06-24 20:37:32 +0100466 * The size of the \p tag buffer is too small.
467 * #PSA_AEAD_TAG_LENGTH(\c key_type, key_bits, \c alg) or
468 * #PSA_AEAD_TAG_MAX_SIZE can be used to determine the required \p tag
469 * buffer size.
Paul Elliottadb8b162021-04-20 16:06:57 +0100470 */
Paul Elliottbb8bf662021-05-19 17:29:42 +0100471psa_status_t mbedtls_psa_aead_finish(
472 mbedtls_psa_aead_operation_t *operation,
473 uint8_t *ciphertext,
474 size_t ciphertext_size,
475 size_t *ciphertext_length,
476 uint8_t *tag,
477 size_t tag_size,
478 size_t *tag_length );
Paul Elliottadb8b162021-04-20 16:06:57 +0100479
Paul Elliottadb8b162021-04-20 16:06:57 +0100480/** Abort an AEAD operation.
481 *
482 * \note The signature of this function is that of a PSA driver
483 * aead_abort entry point. This function behaves as an aead_abort entry
484 * point as defined in the PSA driver interface specification for
485 * transparent drivers.
486 *
487 * Aborting an operation frees all associated resources except for the
488 * \p operation structure itself. Once aborted, the operation object
Paul Elliott4148a682021-05-14 17:26:56 +0100489 * can be reused for another operation by the PSA core by it calling
Paul Elliottadb8b162021-04-20 16:06:57 +0100490 * mbedtls_psa_aead_encrypt_setup() or mbedtls_psa_aead_decrypt_setup() again.
491 *
Paul Elliott4148a682021-05-14 17:26:56 +0100492 * The PSA core may call this function any time after the operation object has
Paul Elliottcbbde5f2021-05-10 18:19:46 +0100493 * been initialized as described in #mbedtls_psa_aead_operation_t.
Paul Elliottadb8b162021-04-20 16:06:57 +0100494 *
495 * In particular, calling mbedtls_psa_aead_abort() after the operation has been
Paul Elliott12acb6b2021-09-15 17:45:22 +0100496 * terminated by a call to mbedtls_psa_aead_abort() or
497 * mbedtls_psa_aead_finish() is safe and has no effect.
Paul Elliottadb8b162021-04-20 16:06:57 +0100498 *
499 * \param[in,out] operation Initialized AEAD operation.
500 *
501 * \retval #PSA_SUCCESS
Paul Elliottb91f3312021-05-19 12:30:15 +0100502 * Success.
Paul Elliottadb8b162021-04-20 16:06:57 +0100503 */
Paul Elliottbb8bf662021-05-19 17:29:42 +0100504psa_status_t mbedtls_psa_aead_abort(
505 mbedtls_psa_aead_operation_t *operation );
Paul Elliottadb8b162021-04-20 16:06:57 +0100506
Ronald Cron7ceee8d2021-03-17 16:55:43 +0100507#endif /* PSA_CRYPTO_AEAD */