Gilles Peskine | e59236f | 2018-01-27 23:32:46 +0100 | [diff] [blame] | 1 | /** |
| 2 | * \file psa/crypto_extra.h |
| 3 | * |
| 4 | * \brief PSA cryptography module: Mbed TLS vendor extensions |
Gilles Peskine | 07c91f5 | 2018-06-28 18:02:53 +0200 | [diff] [blame] | 5 | * |
| 6 | * \note This file may not be included directly. Applications must |
| 7 | * include psa/crypto.h. |
| 8 | * |
| 9 | * This file is reserved for vendor-specific definitions. |
Gilles Peskine | e59236f | 2018-01-27 23:32:46 +0100 | [diff] [blame] | 10 | */ |
| 11 | /* |
| 12 | * Copyright (C) 2018, ARM Limited, All Rights Reserved |
| 13 | * SPDX-License-Identifier: Apache-2.0 |
| 14 | * |
| 15 | * Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 16 | * not use this file except in compliance with the License. |
| 17 | * You may obtain a copy of the License at |
| 18 | * |
| 19 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 20 | * |
| 21 | * Unless required by applicable law or agreed to in writing, software |
| 22 | * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 23 | * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 24 | * See the License for the specific language governing permissions and |
| 25 | * limitations under the License. |
| 26 | * |
| 27 | * This file is part of mbed TLS (https://tls.mbed.org) |
| 28 | */ |
| 29 | |
| 30 | #ifndef PSA_CRYPTO_EXTRA_H |
| 31 | #define PSA_CRYPTO_EXTRA_H |
| 32 | |
Jaeden Amero | 81cefed | 2019-02-25 08:51:27 +0000 | [diff] [blame^] | 33 | #include "mbedtls/platform_util.h" |
| 34 | |
Gilles Peskine | e59236f | 2018-01-27 23:32:46 +0100 | [diff] [blame] | 35 | #ifdef __cplusplus |
| 36 | extern "C" { |
| 37 | #endif |
| 38 | |
Netanel Gonen | 2bcd312 | 2018-11-19 11:53:02 +0200 | [diff] [blame] | 39 | /* UID for secure storage seed */ |
avolinski | 0d2c266 | 2018-11-21 17:31:07 +0200 | [diff] [blame] | 40 | #define PSA_CRYPTO_ITS_RANDOM_SEED_UID 0xFFFFFF52 |
Netanel Gonen | 2bcd312 | 2018-11-19 11:53:02 +0200 | [diff] [blame] | 41 | |
Jaeden Amero | 5e6d24c | 2019-02-21 10:41:29 +0000 | [diff] [blame] | 42 | /* |
| 43 | * Deprecated PSA Crypto error code definitions |
| 44 | */ |
| 45 | #if !defined(MBEDTLS_DEPRECATED_REMOVED) |
| 46 | #define PSA_ERROR_UNKNOWN_ERROR \ |
| 47 | MBEDTLS_DEPRECATED_NUMERIC_CONSTANT( PSA_ERROR_GENERIC_ERROR ) |
| 48 | #endif |
| 49 | |
| 50 | #if !defined(MBEDTLS_DEPRECATED_REMOVED) |
| 51 | #define PSA_ERROR_OCCUPIED_SLOT \ |
| 52 | MBEDTLS_DEPRECATED_NUMERIC_CONSTANT( PSA_ERROR_ALREADY_EXISTS ) |
| 53 | #endif |
| 54 | |
| 55 | #if !defined(MBEDTLS_DEPRECATED_REMOVED) |
| 56 | #define PSA_ERROR_EMPTY_SLOT \ |
| 57 | MBEDTLS_DEPRECATED_NUMERIC_CONSTANT( PSA_ERROR_DOES_NOT_EXIST ) |
| 58 | #endif |
| 59 | |
| 60 | #if !defined(MBEDTLS_DEPRECATED_REMOVED) |
| 61 | #define PSA_ERROR_INSUFFICIENT_CAPACITY \ |
| 62 | MBEDTLS_DEPRECATED_NUMERIC_CONSTANT( PSA_ERROR_INSUFFICIENT_DATA ) |
| 63 | #endif |
| 64 | |
Gilles Peskine | e59236f | 2018-01-27 23:32:46 +0100 | [diff] [blame] | 65 | /** |
| 66 | * \brief Library deinitialization. |
| 67 | * |
| 68 | * This function clears all data associated with the PSA layer, |
| 69 | * including the whole key store. |
| 70 | * |
| 71 | * This is an Mbed TLS extension. |
| 72 | */ |
| 73 | void mbedtls_psa_crypto_free( void ); |
| 74 | |
Netanel Gonen | 2bcd312 | 2018-11-19 11:53:02 +0200 | [diff] [blame] | 75 | |
Netanel Gonen | 2bcd312 | 2018-11-19 11:53:02 +0200 | [diff] [blame] | 76 | /** |
Gilles Peskine | ee2ffd3 | 2018-11-16 11:02:49 +0100 | [diff] [blame] | 77 | * \brief Inject an initial entropy seed for the random generator into |
| 78 | * secure storage. |
Gilles Peskine | 0338ded | 2018-11-15 18:19:27 +0100 | [diff] [blame] | 79 | * |
| 80 | * This function injects data to be used as a seed for the random generator |
| 81 | * used by the PSA Crypto implementation. On devices that lack a trusted |
| 82 | * entropy source (preferably a hardware random number generator), |
| 83 | * the Mbed PSA Crypto implementation uses this value to seed its |
| 84 | * random generator. |
| 85 | * |
| 86 | * On devices without a trusted entropy source, this function must be |
| 87 | * called exactly once in the lifetime of the device. On devices with |
| 88 | * a trusted entropy source, calling this function is optional. |
| 89 | * In all cases, this function may only be called before calling any |
| 90 | * other function in the PSA Crypto API, including psa_crypto_init(). |
| 91 | * |
| 92 | * When this function returns successfully, it populates a file in |
| 93 | * persistent storage. Once the file has been created, this function |
| 94 | * can no longer succeed. |
Gilles Peskine | ee2ffd3 | 2018-11-16 11:02:49 +0100 | [diff] [blame] | 95 | * |
| 96 | * If any error occurs, this function does not change the system state. |
| 97 | * You can call this function again after correcting the reason for the |
| 98 | * error if possible. |
Netanel Gonen | 2bcd312 | 2018-11-19 11:53:02 +0200 | [diff] [blame] | 99 | * |
| 100 | * \warning This function **can** fail! Callers MUST check the return status. |
| 101 | * |
Gilles Peskine | 0338ded | 2018-11-15 18:19:27 +0100 | [diff] [blame] | 102 | * \warning If you use this function, you should use it as part of a |
| 103 | * factory provisioning process. The value of the injected seed |
| 104 | * is critical to the security of the device. It must be |
| 105 | * *secret*, *unpredictable* and (statistically) *unique per device*. |
| 106 | * You should be generate it randomly using a cryptographically |
| 107 | * secure random generator seeded from trusted entropy sources. |
| 108 | * You should transmit it securely to the device and ensure |
| 109 | * that its value is not leaked or stored anywhere beyond the |
| 110 | * needs of transmitting it from the point of generation to |
| 111 | * the call of this function, and erase all copies of the value |
| 112 | * once this function returns. |
Netanel Gonen | 2bcd312 | 2018-11-19 11:53:02 +0200 | [diff] [blame] | 113 | * |
Gilles Peskine | 0338ded | 2018-11-15 18:19:27 +0100 | [diff] [blame] | 114 | * This is an Mbed TLS extension. |
| 115 | * |
Netanel Gonen | 1d7195f | 2018-11-22 16:24:48 +0200 | [diff] [blame] | 116 | * \note This function is only available on the following platforms: |
Gilles Peskine | 0cfaed1 | 2018-11-22 17:11:45 +0200 | [diff] [blame] | 117 | * * If the compile-time options MBEDTLS_ENTROPY_NV_SEED and |
| 118 | * MBEDTLS_PSA_HAS_ITS_IO are both enabled. Note that you |
| 119 | * must provide compatible implementations of mbedtls_nv_seed_read |
Netanel Gonen | 1d7195f | 2018-11-22 16:24:48 +0200 | [diff] [blame] | 120 | * and mbedtls_nv_seed_write. |
Gilles Peskine | 0cfaed1 | 2018-11-22 17:11:45 +0200 | [diff] [blame] | 121 | * * In a client-server integration of PSA Cryptography, on the client side, |
Netanel Gonen | 1d7195f | 2018-11-22 16:24:48 +0200 | [diff] [blame] | 122 | * if the server supports this feature. |
Netanel Gonen | 596e65e | 2018-11-22 18:41:43 +0200 | [diff] [blame] | 123 | * \param[in] seed Buffer containing the seed value to inject. |
Gilles Peskine | 0cfaed1 | 2018-11-22 17:11:45 +0200 | [diff] [blame] | 124 | * \param[in] seed_size Size of the \p seed buffer. |
Netanel Gonen | 596e65e | 2018-11-22 18:41:43 +0200 | [diff] [blame] | 125 | * The size of the seed in bytes must be greater |
| 126 | * or equal to both #MBEDTLS_ENTROPY_MIN_PLATFORM |
| 127 | * and #MBEDTLS_ENTROPY_BLOCK_SIZE. |
| 128 | * It must be less or equal to |
| 129 | * #MBEDTLS_ENTROPY_MAX_SEED_SIZE. |
Netanel Gonen | 2bcd312 | 2018-11-19 11:53:02 +0200 | [diff] [blame] | 130 | * |
| 131 | * \retval #PSA_SUCCESS |
Gilles Peskine | 0338ded | 2018-11-15 18:19:27 +0100 | [diff] [blame] | 132 | * The seed value was injected successfully. The random generator |
| 133 | * of the PSA Crypto implementation is now ready for use. |
| 134 | * You may now call psa_crypto_init() and use the PSA Crypto |
| 135 | * implementation. |
Netanel Gonen | 2bcd312 | 2018-11-19 11:53:02 +0200 | [diff] [blame] | 136 | * \retval #PSA_ERROR_INVALID_ARGUMENT |
Gilles Peskine | ee2ffd3 | 2018-11-16 11:02:49 +0100 | [diff] [blame] | 137 | * \p seed_size is out of range. |
Netanel Gonen | 2bcd312 | 2018-11-19 11:53:02 +0200 | [diff] [blame] | 138 | * \retval #PSA_ERROR_STORAGE_FAILURE |
Gilles Peskine | 0338ded | 2018-11-15 18:19:27 +0100 | [diff] [blame] | 139 | * There was a failure reading or writing from storage. |
Netanel Gonen | 2bcd312 | 2018-11-19 11:53:02 +0200 | [diff] [blame] | 140 | * \retval #PSA_ERROR_NOT_PERMITTED |
Gilles Peskine | 0338ded | 2018-11-15 18:19:27 +0100 | [diff] [blame] | 141 | * The library has already been initialized. It is no longer |
| 142 | * possible to call this function. |
Netanel Gonen | 2bcd312 | 2018-11-19 11:53:02 +0200 | [diff] [blame] | 143 | */ |
| 144 | psa_status_t mbedtls_psa_inject_entropy(const unsigned char *seed, |
| 145 | size_t seed_size); |
| 146 | |
Netanel Gonen | 2bcd312 | 2018-11-19 11:53:02 +0200 | [diff] [blame] | 147 | |
Gilles Peskine | e59236f | 2018-01-27 23:32:46 +0100 | [diff] [blame] | 148 | #ifdef __cplusplus |
| 149 | } |
| 150 | #endif |
| 151 | |
| 152 | #endif /* PSA_CRYPTO_EXTRA_H */ |