blob: 84995176c6f1243ccaaab94bce8b905c46a02ddc [file] [log] [blame]
Gilles Peskinee59236f2018-01-27 23:32:46 +01001/*
2 * PSA crypto layer on top of Mbed TLS crypto
3 */
4/* Copyright (C) 2018, ARM Limited, All Rights Reserved
5 * SPDX-License-Identifier: Apache-2.0
6 *
7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
8 * not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
10 *
11 * http://www.apache.org/licenses/LICENSE-2.0
12 *
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
18 *
19 * This file is part of mbed TLS (https://tls.mbed.org)
20 */
21
22#if !defined(MBEDTLS_CONFIG_FILE)
23#include "mbedtls/config.h"
24#else
25#include MBEDTLS_CONFIG_FILE
26#endif
27
28#if defined(MBEDTLS_PSA_CRYPTO_C)
29
30#include "psa/crypto.h"
31
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +010032#include <stdlib.h>
33#include <string.h>
34#if defined(MBEDTLS_PLATFORM_C)
35#include "mbedtls/platform.h"
36#else
37#define mbedtls_calloc calloc
38#define mbedtls_free free
39#endif
40
Gilles Peskinea5905292018-02-07 20:59:33 +010041#include "mbedtls/arc4.h"
42#include "mbedtls/blowfish.h"
43#include "mbedtls/camellia.h"
44#include "mbedtls/cipher.h"
45#include "mbedtls/ccm.h"
46#include "mbedtls/cmac.h"
Gilles Peskinee59236f2018-01-27 23:32:46 +010047#include "mbedtls/ctr_drbg.h"
Gilles Peskinea5905292018-02-07 20:59:33 +010048#include "mbedtls/des.h"
Gilles Peskine969ac722018-01-28 18:16:59 +010049#include "mbedtls/ecp.h"
Gilles Peskinee59236f2018-01-27 23:32:46 +010050#include "mbedtls/entropy.h"
Gilles Peskinea5905292018-02-07 20:59:33 +010051#include "mbedtls/error.h"
52#include "mbedtls/gcm.h"
53#include "mbedtls/md2.h"
54#include "mbedtls/md4.h"
55#include "mbedtls/md5.h"
Gilles Peskine20035e32018-02-03 22:44:14 +010056#include "mbedtls/md.h"
57#include "mbedtls/md_internal.h"
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +010058#include "mbedtls/pk.h"
Gilles Peskine969ac722018-01-28 18:16:59 +010059#include "mbedtls/pk_internal.h"
Gilles Peskinea5905292018-02-07 20:59:33 +010060#include "mbedtls/ripemd160.h"
Gilles Peskine969ac722018-01-28 18:16:59 +010061#include "mbedtls/rsa.h"
Gilles Peskinea5905292018-02-07 20:59:33 +010062#include "mbedtls/sha1.h"
63#include "mbedtls/sha256.h"
64#include "mbedtls/sha512.h"
65#include "mbedtls/xtea.h"
66
Gilles Peskinee59236f2018-01-27 23:32:46 +010067
68
69/* Implementation that should never be optimized out by the compiler */
70static void mbedtls_zeroize( void *v, size_t n )
71{
72 volatile unsigned char *p = v; while( n-- ) *p++ = 0;
73}
74
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +010075/****************************************************************/
76/* Global data, support functions and library management */
77/****************************************************************/
78
79/* Number of key slots (plus one because 0 is not used).
80 * The value is a compile-time constant for now, for simplicity. */
81#define MBEDTLS_PSA_KEY_SLOT_COUNT 32
82
83typedef struct {
84 psa_key_type_t type;
85 union {
86 struct raw_data {
87 uint8_t *data;
88 size_t bytes;
89 } raw;
Gilles Peskine969ac722018-01-28 18:16:59 +010090#if defined(MBEDTLS_RSA_C)
91 mbedtls_rsa_context *rsa;
92#endif /* MBEDTLS_RSA_C */
93#if defined(MBEDTLS_ECP_C)
94 mbedtls_ecp_keypair *ecp;
95#endif /* MBEDTLS_ECP_C */
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +010096 } data;
97} key_slot_t;
98
Gilles Peskinee59236f2018-01-27 23:32:46 +010099typedef struct {
100 int initialized;
101 mbedtls_entropy_context entropy;
102 mbedtls_ctr_drbg_context ctr_drbg;
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100103 key_slot_t key_slots[MBEDTLS_PSA_KEY_SLOT_COUNT];
Gilles Peskinee59236f2018-01-27 23:32:46 +0100104} psa_global_data_t;
105
106static psa_global_data_t global_data;
107
108static psa_status_t mbedtls_to_psa_error( int ret )
109{
Gilles Peskinea5905292018-02-07 20:59:33 +0100110 /* If there's both a high-level code and low-level code, dispatch on
111 * the high-level code. */
112 switch( ret < -0x7f ? - ( -ret & 0x7f80 ) : ret )
Gilles Peskinee59236f2018-01-27 23:32:46 +0100113 {
114 case 0:
115 return( PSA_SUCCESS );
Gilles Peskinea5905292018-02-07 20:59:33 +0100116
117 case MBEDTLS_ERR_AES_INVALID_KEY_LENGTH:
118 case MBEDTLS_ERR_AES_INVALID_INPUT_LENGTH:
119 case MBEDTLS_ERR_AES_FEATURE_UNAVAILABLE:
120 return( PSA_ERROR_NOT_SUPPORTED );
121 case MBEDTLS_ERR_AES_HW_ACCEL_FAILED:
122 return( PSA_ERROR_HARDWARE_FAILURE );
123
124 case MBEDTLS_ERR_ARC4_HW_ACCEL_FAILED:
125 return( PSA_ERROR_HARDWARE_FAILURE );
126
127 case MBEDTLS_ERR_BLOWFISH_INVALID_KEY_LENGTH:
128 case MBEDTLS_ERR_BLOWFISH_INVALID_INPUT_LENGTH:
129 return( PSA_ERROR_NOT_SUPPORTED );
130 case MBEDTLS_ERR_BLOWFISH_HW_ACCEL_FAILED:
131 return( PSA_ERROR_HARDWARE_FAILURE );
132
133 case MBEDTLS_ERR_CAMELLIA_INVALID_KEY_LENGTH:
134 case MBEDTLS_ERR_CAMELLIA_INVALID_INPUT_LENGTH:
135 return( PSA_ERROR_NOT_SUPPORTED );
136 case MBEDTLS_ERR_CAMELLIA_HW_ACCEL_FAILED:
137 return( PSA_ERROR_HARDWARE_FAILURE );
138
139 case MBEDTLS_ERR_CCM_BAD_INPUT:
140 return( PSA_ERROR_INVALID_ARGUMENT );
141 case MBEDTLS_ERR_CCM_AUTH_FAILED:
142 return( PSA_ERROR_INVALID_SIGNATURE );
143 case MBEDTLS_ERR_CCM_HW_ACCEL_FAILED:
144 return( PSA_ERROR_HARDWARE_FAILURE );
145
146 case MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE:
147 return( PSA_ERROR_NOT_SUPPORTED );
148 case MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA:
149 return( PSA_ERROR_INVALID_ARGUMENT );
150 case MBEDTLS_ERR_CIPHER_ALLOC_FAILED:
151 return( PSA_ERROR_INSUFFICIENT_MEMORY );
152 case MBEDTLS_ERR_CIPHER_INVALID_PADDING:
153 return( PSA_ERROR_INVALID_PADDING );
154 case MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED:
155 return( PSA_ERROR_BAD_STATE );
156 case MBEDTLS_ERR_CIPHER_AUTH_FAILED:
157 return( PSA_ERROR_INVALID_SIGNATURE );
158 case MBEDTLS_ERR_CIPHER_INVALID_CONTEXT:
159 return( PSA_ERROR_TAMPERING_DETECTED );
160 case MBEDTLS_ERR_CIPHER_HW_ACCEL_FAILED:
161 return( PSA_ERROR_HARDWARE_FAILURE );
162
163 case MBEDTLS_ERR_CMAC_HW_ACCEL_FAILED:
164 return( PSA_ERROR_HARDWARE_FAILURE );
165
166 case MBEDTLS_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED:
167 return( PSA_ERROR_INSUFFICIENT_ENTROPY );
168 case MBEDTLS_ERR_CTR_DRBG_REQUEST_TOO_BIG:
169 case MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG:
170 return( PSA_ERROR_NOT_SUPPORTED );
171 case MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR:
172 return( PSA_ERROR_INSUFFICIENT_ENTROPY );
173
174 case MBEDTLS_ERR_DES_INVALID_INPUT_LENGTH:
175 return( PSA_ERROR_NOT_SUPPORTED );
176 case MBEDTLS_ERR_DES_HW_ACCEL_FAILED:
177 return( PSA_ERROR_HARDWARE_FAILURE );
178
Gilles Peskinee59236f2018-01-27 23:32:46 +0100179 case MBEDTLS_ERR_ENTROPY_NO_SOURCES_DEFINED:
180 case MBEDTLS_ERR_ENTROPY_NO_STRONG_SOURCE:
181 case MBEDTLS_ERR_ENTROPY_SOURCE_FAILED:
182 return( PSA_ERROR_INSUFFICIENT_ENTROPY );
Gilles Peskinea5905292018-02-07 20:59:33 +0100183
184 case MBEDTLS_ERR_GCM_AUTH_FAILED:
185 return( PSA_ERROR_INVALID_SIGNATURE );
186 case MBEDTLS_ERR_GCM_BAD_INPUT:
187 return( PSA_ERROR_NOT_SUPPORTED );
188 case MBEDTLS_ERR_GCM_HW_ACCEL_FAILED:
189 return( PSA_ERROR_HARDWARE_FAILURE );
190
191 case MBEDTLS_ERR_MD2_HW_ACCEL_FAILED:
192 case MBEDTLS_ERR_MD4_HW_ACCEL_FAILED:
193 case MBEDTLS_ERR_MD5_HW_ACCEL_FAILED:
194 return( PSA_ERROR_HARDWARE_FAILURE );
195
196 case MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE:
197 return( PSA_ERROR_NOT_SUPPORTED );
198 case MBEDTLS_ERR_MD_BAD_INPUT_DATA:
199 return( PSA_ERROR_INVALID_ARGUMENT );
200 case MBEDTLS_ERR_MD_ALLOC_FAILED:
201 return( PSA_ERROR_INSUFFICIENT_MEMORY );
202 case MBEDTLS_ERR_MD_FILE_IO_ERROR:
203 return( PSA_ERROR_STORAGE_FAILURE );
204 case MBEDTLS_ERR_MD_HW_ACCEL_FAILED:
205 return( PSA_ERROR_HARDWARE_FAILURE );
206
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100207 case MBEDTLS_ERR_PK_ALLOC_FAILED:
208 return( PSA_ERROR_INSUFFICIENT_MEMORY );
209 case MBEDTLS_ERR_PK_TYPE_MISMATCH:
210 case MBEDTLS_ERR_PK_BAD_INPUT_DATA:
211 return( PSA_ERROR_INVALID_ARGUMENT );
212 case MBEDTLS_ERR_PK_FILE_IO_ERROR:
Gilles Peskinea5905292018-02-07 20:59:33 +0100213 return( PSA_ERROR_STORAGE_FAILURE );
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100214 case MBEDTLS_ERR_PK_KEY_INVALID_VERSION:
215 case MBEDTLS_ERR_PK_KEY_INVALID_FORMAT:
216 return( PSA_ERROR_INVALID_ARGUMENT );
217 case MBEDTLS_ERR_PK_UNKNOWN_PK_ALG:
218 return( PSA_ERROR_NOT_SUPPORTED );
219 case MBEDTLS_ERR_PK_PASSWORD_REQUIRED:
220 case MBEDTLS_ERR_PK_PASSWORD_MISMATCH:
221 return( PSA_ERROR_NOT_PERMITTED );
222 case MBEDTLS_ERR_PK_INVALID_PUBKEY:
223 return( PSA_ERROR_INVALID_ARGUMENT );
224 case MBEDTLS_ERR_PK_INVALID_ALG:
225 case MBEDTLS_ERR_PK_UNKNOWN_NAMED_CURVE:
226 case MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE:
227 return( PSA_ERROR_NOT_SUPPORTED );
228 case MBEDTLS_ERR_PK_SIG_LEN_MISMATCH:
229 return( PSA_ERROR_INVALID_SIGNATURE );
Gilles Peskinea5905292018-02-07 20:59:33 +0100230 case MBEDTLS_ERR_PK_HW_ACCEL_FAILED:
231 return( PSA_ERROR_HARDWARE_FAILURE );
232
233 case MBEDTLS_ERR_RIPEMD160_HW_ACCEL_FAILED:
234 return( PSA_ERROR_HARDWARE_FAILURE );
235
236 case MBEDTLS_ERR_RSA_BAD_INPUT_DATA:
237 return( PSA_ERROR_INVALID_ARGUMENT );
238 case MBEDTLS_ERR_RSA_INVALID_PADDING:
239 return( PSA_ERROR_INVALID_PADDING );
240 case MBEDTLS_ERR_RSA_KEY_GEN_FAILED:
241 return( PSA_ERROR_HARDWARE_FAILURE );
242 case MBEDTLS_ERR_RSA_KEY_CHECK_FAILED:
243 return( PSA_ERROR_INVALID_ARGUMENT );
244 case MBEDTLS_ERR_RSA_PUBLIC_FAILED:
245 case MBEDTLS_ERR_RSA_PRIVATE_FAILED:
246 return( PSA_ERROR_TAMPERING_DETECTED );
247 case MBEDTLS_ERR_RSA_VERIFY_FAILED:
248 return( PSA_ERROR_INVALID_SIGNATURE );
249 case MBEDTLS_ERR_RSA_OUTPUT_TOO_LARGE:
250 return( PSA_ERROR_BUFFER_TOO_SMALL );
251 case MBEDTLS_ERR_RSA_RNG_FAILED:
252 return( PSA_ERROR_INSUFFICIENT_MEMORY );
253 case MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION:
254 return( PSA_ERROR_NOT_SUPPORTED );
255 case MBEDTLS_ERR_RSA_HW_ACCEL_FAILED:
256 return( PSA_ERROR_HARDWARE_FAILURE );
257
258 case MBEDTLS_ERR_SHA1_HW_ACCEL_FAILED:
259 case MBEDTLS_ERR_SHA256_HW_ACCEL_FAILED:
260 case MBEDTLS_ERR_SHA512_HW_ACCEL_FAILED:
261 return( PSA_ERROR_HARDWARE_FAILURE );
262
263 case MBEDTLS_ERR_XTEA_INVALID_INPUT_LENGTH:
264 return( PSA_ERROR_INVALID_ARGUMENT );
265 case MBEDTLS_ERR_XTEA_HW_ACCEL_FAILED:
266 return( PSA_ERROR_HARDWARE_FAILURE );
267
Gilles Peskinee59236f2018-01-27 23:32:46 +0100268 default:
269 return( PSA_ERROR_UNKNOWN_ERROR );
270 }
271}
272
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100273
274
275/****************************************************************/
276/* Key management */
277/****************************************************************/
278
279psa_status_t psa_import_key(psa_key_slot_t key,
280 psa_key_type_t type,
281 const uint8_t *data,
282 size_t data_length)
283{
284 key_slot_t *slot;
285
286 if( key == 0 || key > MBEDTLS_PSA_KEY_SLOT_COUNT )
287 return( PSA_ERROR_INVALID_ARGUMENT );
288 slot = &global_data.key_slots[key];
289 if( slot->type != PSA_KEY_TYPE_NONE )
290 return( PSA_ERROR_OCCUPIED_SLOT );
291
292 if( type == PSA_KEY_TYPE_RAW_DATA )
293 {
294 if( data_length > SIZE_MAX / 8 )
295 return( PSA_ERROR_NOT_SUPPORTED );
296 slot->data.raw.data = mbedtls_calloc( 1, data_length );
297 if( slot->data.raw.data == NULL )
298 return( PSA_ERROR_INSUFFICIENT_MEMORY );
299 memcpy( slot->data.raw.data, data, data_length );
300 slot->data.raw.bytes = data_length;
301 }
302 else
Gilles Peskine969ac722018-01-28 18:16:59 +0100303#if defined(MBEDTLS_PK_PARSE_C)
Gilles Peskinec66ea6a2018-02-03 22:43:28 +0100304 if( type == PSA_KEY_TYPE_RSA_PUBLIC_KEY ||
305 type == PSA_KEY_TYPE_RSA_KEYPAIR ||
306 PSA_KEY_TYPE_IS_ECC( type ) )
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100307 {
308 int ret;
Gilles Peskine969ac722018-01-28 18:16:59 +0100309 mbedtls_pk_context pk;
310 mbedtls_pk_init( &pk );
Gilles Peskinec66ea6a2018-02-03 22:43:28 +0100311 if( PSA_KEY_TYPE_IS_KEYPAIR( type ) )
312 ret = mbedtls_pk_parse_key( &pk, data, data_length, NULL, 0 );
313 else
314 ret = mbedtls_pk_parse_public_key( &pk, data, data_length );
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100315 if( ret != 0 )
316 return( mbedtls_to_psa_error( ret ) );
Gilles Peskine969ac722018-01-28 18:16:59 +0100317 switch( mbedtls_pk_get_type( &pk ) )
318 {
319#if defined(MBEDTLS_RSA_C)
320 case MBEDTLS_PK_RSA:
Gilles Peskinec66ea6a2018-02-03 22:43:28 +0100321 if( type == PSA_KEY_TYPE_RSA_PUBLIC_KEY ||
322 type == PSA_KEY_TYPE_RSA_KEYPAIR )
Gilles Peskine969ac722018-01-28 18:16:59 +0100323 slot->data.rsa = pk.pk_ctx;
324 else
325 return( PSA_ERROR_INVALID_ARGUMENT );
326 break;
327#endif /* MBEDTLS_RSA_C */
328#if defined(MBEDTLS_ECP_C)
329 case MBEDTLS_PK_ECKEY:
330 if( PSA_KEY_TYPE_IS_ECC( type ) )
331 {
332 // TODO: check curve
333 slot->data.ecp = pk.pk_ctx;
334 }
335 else
336 return( PSA_ERROR_INVALID_ARGUMENT );
337 break;
338#endif /* MBEDTLS_ECP_C */
339 default:
340 return( PSA_ERROR_INVALID_ARGUMENT );
341 }
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100342 }
343 else
Gilles Peskine969ac722018-01-28 18:16:59 +0100344#endif /* defined(MBEDTLS_PK_PARSE_C) */
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100345 {
346 return( PSA_ERROR_NOT_SUPPORTED );
347 }
348
349 slot->type = type;
350 return( PSA_SUCCESS );
351}
352
353psa_status_t psa_destroy_key(psa_key_slot_t key)
354{
355 key_slot_t *slot;
356
357 if( key == 0 || key > MBEDTLS_PSA_KEY_SLOT_COUNT )
358 return( PSA_ERROR_INVALID_ARGUMENT );
359 slot = &global_data.key_slots[key];
360 if( slot->type == PSA_KEY_TYPE_NONE )
361 return( PSA_ERROR_EMPTY_SLOT );
362
363 if( slot->type == PSA_KEY_TYPE_RAW_DATA )
364 {
365 mbedtls_free( slot->data.raw.data );
366 }
367 else
Gilles Peskine969ac722018-01-28 18:16:59 +0100368#if defined(MBEDTLS_RSA_C)
Gilles Peskinec66ea6a2018-02-03 22:43:28 +0100369 if( slot->type == PSA_KEY_TYPE_RSA_PUBLIC_KEY ||
370 slot->type == PSA_KEY_TYPE_RSA_KEYPAIR )
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100371 {
Gilles Peskine969ac722018-01-28 18:16:59 +0100372 mbedtls_rsa_free( slot->data.rsa );
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100373 }
374 else
Gilles Peskine969ac722018-01-28 18:16:59 +0100375#endif /* defined(MBEDTLS_RSA_C) */
376#if defined(MBEDTLS_ECP_C)
377 if( PSA_KEY_TYPE_IS_ECC( slot->type ) )
378 {
379 mbedtls_ecp_keypair_free( slot->data.ecp );
380 }
381 else
382#endif /* defined(MBEDTLS_ECP_C) */
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100383 {
384 /* Shouldn't happen: the key type is not any type that we
385 * put it. */
386 return( PSA_ERROR_TAMPERING_DETECTED );
387 }
388
389 mbedtls_zeroize( slot, sizeof( *slot ) );
390 return( PSA_SUCCESS );
391}
392
393psa_status_t psa_get_key_information(psa_key_slot_t key,
394 psa_key_type_t *type,
395 size_t *bits)
396{
397 key_slot_t *slot;
398
399 if( key == 0 || key > MBEDTLS_PSA_KEY_SLOT_COUNT )
Gilles Peskinec66ea6a2018-02-03 22:43:28 +0100400 return( PSA_ERROR_EMPTY_SLOT );
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100401 slot = &global_data.key_slots[key];
402 if( type != NULL )
403 *type = slot->type;
404 if( bits != NULL )
405 *bits = 0;
406 if( slot->type == PSA_KEY_TYPE_NONE )
407 return( PSA_ERROR_EMPTY_SLOT );
408
409 if( slot->type == PSA_KEY_TYPE_RAW_DATA )
410 {
411 if( bits != NULL )
412 *bits = slot->data.raw.bytes * 8;
413 }
414 else
Gilles Peskine969ac722018-01-28 18:16:59 +0100415#if defined(MBEDTLS_RSA_C)
Gilles Peskinec66ea6a2018-02-03 22:43:28 +0100416 if( slot->type == PSA_KEY_TYPE_RSA_PUBLIC_KEY ||
417 slot->type == PSA_KEY_TYPE_RSA_KEYPAIR )
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100418 {
419 if( bits != NULL )
Gilles Peskine969ac722018-01-28 18:16:59 +0100420 *bits = mbedtls_rsa_get_bitlen( slot->data.rsa );
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100421 }
422 else
Gilles Peskine969ac722018-01-28 18:16:59 +0100423#endif /* defined(MBEDTLS_RSA_C) */
424#if defined(MBEDTLS_ECP_C)
425 if( PSA_KEY_TYPE_IS_ECC( slot->type ) )
426 {
427 if( bits != NULL )
428 *bits = slot->data.ecp->grp.pbits;
429 }
430 else
431#endif /* defined(MBEDTLS_ECP_C) */
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100432 {
433 /* Shouldn't happen: the key type is not any type that we
434 * put it. */
435 return( PSA_ERROR_TAMPERING_DETECTED );
436 }
437
438 return( PSA_SUCCESS );
439}
440
441psa_status_t psa_export_key(psa_key_slot_t key,
442 uint8_t *data,
443 size_t data_size,
444 size_t *data_length)
445{
446 key_slot_t *slot;
447
448 if( key == 0 || key > MBEDTLS_PSA_KEY_SLOT_COUNT )
Gilles Peskinec66ea6a2018-02-03 22:43:28 +0100449 return( PSA_ERROR_EMPTY_SLOT );
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100450 slot = &global_data.key_slots[key];
451 if( slot->type == PSA_KEY_TYPE_NONE )
452 return( PSA_ERROR_EMPTY_SLOT );
453
454 if( slot->type == PSA_KEY_TYPE_RAW_DATA )
455 {
456 if( slot->data.raw.bytes > data_size )
457 return( PSA_ERROR_BUFFER_TOO_SMALL );
458 memcpy( data, slot->data.raw.data, slot->data.raw.bytes );
459 *data_length = slot->data.raw.bytes;
460 return( PSA_SUCCESS );
461 }
462 else
Gilles Peskine969ac722018-01-28 18:16:59 +0100463#if defined(MBEDTLS_PK_WRITE_C)
Gilles Peskinec66ea6a2018-02-03 22:43:28 +0100464 if( slot->type == PSA_KEY_TYPE_RSA_PUBLIC_KEY ||
465 slot->type == PSA_KEY_TYPE_RSA_KEYPAIR ||
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100466 PSA_KEY_TYPE_IS_ECC( slot->type ) )
467 {
Gilles Peskine969ac722018-01-28 18:16:59 +0100468 mbedtls_pk_context pk;
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100469 int ret;
Gilles Peskine969ac722018-01-28 18:16:59 +0100470 mbedtls_pk_init( &pk );
Gilles Peskinec66ea6a2018-02-03 22:43:28 +0100471 if( slot->type == PSA_KEY_TYPE_RSA_PUBLIC_KEY ||
472 slot->type == PSA_KEY_TYPE_RSA_KEYPAIR )
Gilles Peskine969ac722018-01-28 18:16:59 +0100473 {
474 pk.pk_info = &mbedtls_rsa_info;
475 pk.pk_ctx = slot->data.rsa;
476 }
477 else
478 {
479 pk.pk_info = &mbedtls_eckey_info;
480 pk.pk_ctx = slot->data.ecp;
481 }
Gilles Peskinec66ea6a2018-02-03 22:43:28 +0100482 if( PSA_KEY_TYPE_IS_KEYPAIR( slot->type ) )
483 ret = mbedtls_pk_write_key_der( &pk, data, data_size );
484 else
485 ret = mbedtls_pk_write_pubkey_der( &pk, data, data_size );
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100486 if( ret < 0 )
487 return( mbedtls_to_psa_error( ret ) );
488 *data_length = ret;
489 return( PSA_SUCCESS );
490 }
491 else
Gilles Peskine969ac722018-01-28 18:16:59 +0100492#endif /* definedMBEDTLS_PK_WRITE_C) */
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100493 {
494 return( PSA_ERROR_NOT_SUPPORTED );
495 }
496}
497
498
499
500/****************************************************************/
Gilles Peskine20035e32018-02-03 22:44:14 +0100501/* Message digests */
502/****************************************************************/
503
504static const mbedtls_md_info_t *mbedtls_md_info_of_psa( psa_algorithm_t alg )
505{
506 switch( alg )
507 {
508#if defined(MBEDTLS_MD2_C)
509 case PSA_ALG_MD2:
510 return( &mbedtls_md2_info );
511#endif
512#if defined(MBEDTLS_MD4_C)
513 case PSA_ALG_MD4:
514 return( &mbedtls_md4_info );
515#endif
516#if defined(MBEDTLS_MD5_C)
517 case PSA_ALG_MD5:
518 return( &mbedtls_md5_info );
519#endif
520#if defined(MBEDTLS_RIPEMD160_C)
521 case PSA_ALG_RIPEMD160:
522 return( &mbedtls_ripemd160_info );
523#endif
524#if defined(MBEDTLS_SHA1_C)
525 case PSA_ALG_SHA_1:
526 return( &mbedtls_sha1_info );
527#endif
528#if defined(MBEDTLS_SHA256_C)
529 case PSA_ALG_SHA_224:
530 return( &mbedtls_sha224_info );
531 case PSA_ALG_SHA_256:
532 return( &mbedtls_sha256_info );
533#endif
534#if defined(MBEDTLS_SHA512_C)
535 case PSA_ALG_SHA_384:
536 return( &mbedtls_sha384_info );
537 case PSA_ALG_SHA_512:
538 return( &mbedtls_sha512_info );
539#endif
540 default:
541 return( NULL );
542 }
543}
544
545#if 0
546static psa_algorithm_t mbedtls_md_alg_to_psa( mbedtls_md_type_t md_alg )
547{
548 switch( md_alg )
549 {
550 case MBEDTLS_MD_NONE:
551 return( 0 );
552 case MBEDTLS_MD_MD2:
553 return( PSA_ALG_MD2 );
554 case MBEDTLS_MD_MD4:
555 return( PSA_ALG_MD4 );
556 case MBEDTLS_MD_MD5:
557 return( PSA_ALG_MD5 );
558 case MBEDTLS_MD_SHA1:
559 return( PSA_ALG_SHA_1 );
560 case MBEDTLS_MD_SHA224:
561 return( PSA_ALG_SHA_224 );
562 case MBEDTLS_MD_SHA256:
563 return( PSA_ALG_SHA_256 );
564 case MBEDTLS_MD_SHA384:
565 return( PSA_ALG_SHA_384 );
566 case MBEDTLS_MD_SHA512:
567 return( PSA_ALG_SHA_512 );
568 case MBEDTLS_MD_RIPEMD160:
569 return( PSA_ALG_RIPEMD160 );
570 default:
571 return( MBEDTLS_MD_NOT_SUPPORTED );
572 }
573}
574#endif
575
576
577
578/****************************************************************/
579/* Asymmetric cryptography */
580/****************************************************************/
581
582psa_status_t psa_asymmetric_sign(psa_key_slot_t key,
583 psa_algorithm_t alg,
584 const uint8_t *hash,
585 size_t hash_length,
586 const uint8_t *salt,
587 size_t salt_length,
588 uint8_t *signature,
589 size_t signature_size,
590 size_t *signature_length)
591{
592 key_slot_t *slot;
593
Gilles Peskine93aa0332018-02-03 23:58:03 +0100594 *signature_length = 0;
595 (void) salt;
596 (void) salt_length;
597
Gilles Peskine20035e32018-02-03 22:44:14 +0100598 if( key == 0 || key > MBEDTLS_PSA_KEY_SLOT_COUNT )
599 return( PSA_ERROR_EMPTY_SLOT );
600 slot = &global_data.key_slots[key];
601 if( slot->type == PSA_KEY_TYPE_NONE )
602 return( PSA_ERROR_EMPTY_SLOT );
603 if( ! PSA_KEY_TYPE_IS_KEYPAIR( slot->type ) )
604 return( PSA_ERROR_INVALID_ARGUMENT );
605
Gilles Peskine20035e32018-02-03 22:44:14 +0100606#if defined(MBEDTLS_RSA_C)
607 if( slot->type == PSA_KEY_TYPE_RSA_KEYPAIR )
608 {
609 mbedtls_rsa_context *rsa = slot->data.rsa;
610 int ret;
611 psa_algorithm_t hash_alg = PSA_ALG_RSA_GET_HASH( alg );
612 const mbedtls_md_info_t *md_info = mbedtls_md_info_of_psa( hash_alg );
613 mbedtls_md_type_t md_alg =
614 hash_alg == 0 ? MBEDTLS_MD_NONE : mbedtls_md_get_type( md_info );
615 if( md_alg == MBEDTLS_MD_NONE )
616 {
617#if SIZE_MAX > UINT_MAX
618 if( hash_length > UINT_MAX )
619 return( PSA_ERROR_INVALID_ARGUMENT );
620#endif
621 }
622 else
623 {
624 if( mbedtls_md_get_size( md_info ) != hash_length )
625 return( PSA_ERROR_INVALID_ARGUMENT );
626 if( md_info == NULL )
627 return( PSA_ERROR_NOT_SUPPORTED );
628 }
629 if( signature_size < rsa->len )
630 return( PSA_ERROR_BUFFER_TOO_SMALL );
631#if defined(MBEDTLS_PKCS1_V15)
632 if( PSA_ALG_IS_RSA_PKCS1V15( alg ) )
633 {
634 mbedtls_rsa_set_padding( rsa, MBEDTLS_RSA_PKCS_V15,
635 MBEDTLS_MD_NONE );
636 ret = mbedtls_rsa_pkcs1_sign( rsa,
637 mbedtls_ctr_drbg_random,
638 &global_data.ctr_drbg,
639 MBEDTLS_RSA_PRIVATE,
640 md_alg, hash_length, hash,
641 signature );
642 }
643 else
644#endif /* MBEDTLS_PKCS1_V15 */
645#if defined(MBEDTLS_PKCS1_V21)
646 if( alg == PSA_ALG_RSA_PSS_MGF1 )
647 {
648 mbedtls_rsa_set_padding( rsa, MBEDTLS_RSA_PKCS_V21, md_alg );
649 ret = mbedtls_rsa_rsassa_pss_sign( rsa,
650 mbedtls_ctr_drbg_random,
651 &global_data.ctr_drbg,
652 MBEDTLS_RSA_PRIVATE,
653 md_alg, hash_length, hash,
654 signature );
655 }
656 else
657#endif /* MBEDTLS_PKCS1_V21 */
658 {
659 return( PSA_ERROR_INVALID_ARGUMENT );
660 }
Gilles Peskine93aa0332018-02-03 23:58:03 +0100661 if( ret == 0 )
662 *signature_length = rsa->len;
Gilles Peskine20035e32018-02-03 22:44:14 +0100663 return( mbedtls_to_psa_error( ret ) );
664 }
665 else
666#endif /* defined(MBEDTLS_RSA_C) */
667#if defined(MBEDTLS_ECP_C)
668 if( PSA_KEY_TYPE_IS_ECC( slot->type ) )
669 {
670 // TODO
671 return( PSA_ERROR_NOT_SUPPORTED );
672 }
673 else
674#endif /* defined(MBEDTLS_ECP_C) */
675 {
676 return( PSA_ERROR_NOT_SUPPORTED );
677 }
678}
679
680
681
682/****************************************************************/
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100683/* Module setup */
684/****************************************************************/
685
Gilles Peskinee59236f2018-01-27 23:32:46 +0100686void mbedtls_psa_crypto_free( void )
687{
Gilles Peskine2f9c4dc2018-01-28 13:16:24 +0100688 size_t key;
689 for( key = 1; key < MBEDTLS_PSA_KEY_SLOT_COUNT; key++ )
690 psa_destroy_key( key );
Gilles Peskinee59236f2018-01-27 23:32:46 +0100691 mbedtls_ctr_drbg_free( &global_data.ctr_drbg );
692 mbedtls_entropy_free( &global_data.entropy );
693 mbedtls_zeroize( &global_data, sizeof( global_data ) );
694}
695
696psa_status_t psa_crypto_init( void )
697{
698 int ret;
699 const unsigned char drbg_seed[] = "PSA";
700
701 if( global_data.initialized != 0 )
702 return( PSA_SUCCESS );
703
704 mbedtls_zeroize( &global_data, sizeof( global_data ) );
705 mbedtls_entropy_init( &global_data.entropy );
706 mbedtls_ctr_drbg_init( &global_data.ctr_drbg );
707
708 ret = mbedtls_ctr_drbg_seed( &global_data.ctr_drbg,
709 mbedtls_entropy_func,
710 &global_data.entropy,
711 drbg_seed, sizeof( drbg_seed ) - 1 );
712 if( ret != 0 )
713 goto exit;
714
715exit:
716 if( ret != 0 )
717 mbedtls_psa_crypto_free( );
718 return( mbedtls_to_psa_error( ret ) );
719}
720
721#endif /* MBEDTLS_PSA_CRYPTO_C */