1/*
2 *  PSA AEAD driver entry points
3 */
4/*
5 *  Copyright The Mbed TLS Contributors
6 *  SPDX-License-Identifier: Apache-2.0
7 *
8 *  Licensed under the Apache License, Version 2.0 (the "License"); you may
9 *  not use this file except in compliance with the License.
10 *  You may obtain a copy of the License at
11 *
12 *  http://www.apache.org/licenses/LICENSE-2.0
13 *
14 *  Unless required by applicable law or agreed to in writing, software
15 *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16 *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 *  See the License for the specific language governing permissions and
18 *  limitations under the License.
19 */
20
21#ifndef PSA_CRYPTO_AEAD_H
22#define PSA_CRYPTO_AEAD_H
23
24#include <psa/crypto.h>
25
26/**
27 * \brief Process an authenticated encryption operation.
28 *
29 * \note The signature of this function is that of a PSA driver
30 *       aead_encrypt entry point. This function behaves as an aead_encrypt
31 *       entry point as defined in the PSA driver interface specification for
32 *       transparent drivers.
33 *
34 * \param[in]  attributes         The attributes of the key to use for the
35 *                                operation.
36 * \param[in]  key_buffer         The buffer containing the key context.
37 * \param      key_buffer_size    Size of the \p key_buffer buffer in bytes.
38 * \param      alg                The AEAD algorithm to compute.
39 * \param[in]  nonce              Nonce or IV to use.
40 * \param      nonce_length       Size of the nonce buffer in bytes. This must
41 *                                be appropriate for the selected algorithm.
42 *                                The default nonce size is
43 *                                PSA_AEAD_NONCE_LENGTH(key_type, alg) where
44 *                                key_type is the type of key.
45 * \param[in]  additional_data    Additional data that will be authenticated
46 *                                but not encrypted.
47 * \param      additional_data_length  Size of additional_data in bytes.
48 * \param[in]  plaintext          Data that will be authenticated and encrypted.
49 * \param      plaintext_length   Size of plaintext in bytes.
50 * \param[out] ciphertext         Output buffer for the authenticated and
51 *                                encrypted data. The additional data is not
52 *                                part of this output. For algorithms where the
53 *                                encrypted data and the authentication tag are
54 *                                defined as separate outputs, the
55 *                                authentication tag is appended to the
56 *                                encrypted data.
57 * \param      ciphertext_size    Size of the ciphertext buffer in bytes. This
58 *                                must be appropriate for the selected algorithm
59 *                                and key:
60 *                                - A sufficient output size is
61 *                                  PSA_AEAD_ENCRYPT_OUTPUT_SIZE(key_type, alg,
62 *                                  plaintext_length) where key_type is the type
63 *                                  of key.
64 *                                - PSA_AEAD_ENCRYPT_OUTPUT_MAX_SIZE(
65 *                                  plaintext_length) evaluates to the maximum
66 *                                  ciphertext size of any supported AEAD
67 *                                  encryption.
68 * \param[out] ciphertext_length  On success, the size of the output in the
69 *                                ciphertext buffer.
70 *
71 * \retval #PSA_SUCCESS Success.
72 * \retval #PSA_ERROR_NOT_SUPPORTED
73 *         \p alg is not supported.
74 * \retval #PSA_ERROR_INSUFFICIENT_MEMORY \emptydescription
75 * \retval #PSA_ERROR_BUFFER_TOO_SMALL
76 *         ciphertext_size is too small.
77 * \retval #PSA_ERROR_CORRUPTION_DETECTED \emptydescription
78 */
79psa_status_t mbedtls_psa_aead_encrypt(
80    const psa_key_attributes_t *attributes,
81    const uint8_t *key_buffer, size_t key_buffer_size,
82    psa_algorithm_t alg,
83    const uint8_t *nonce, size_t nonce_length,
84    const uint8_t *additional_data, size_t additional_data_length,
85    const uint8_t *plaintext, size_t plaintext_length,
86    uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length);
87
88/**
89 * \brief Process an authenticated decryption operation.
90 *
91 * \note The signature of this function is that of a PSA driver
92 *       aead_decrypt entry point. This function behaves as an aead_decrypt
93 *       entry point as defined in the PSA driver interface specification for
94 *       transparent drivers.
95 *
96 * \param[in]  attributes         The attributes of the key to use for the
97 *                                operation.
98 * \param[in]  key_buffer         The buffer containing the key context.
99 * \param      key_buffer_size    Size of the \p key_buffer buffer in bytes.
100 * \param      alg                The AEAD algorithm to compute.
101 * \param[in]  nonce              Nonce or IV to use.
102 * \param      nonce_length       Size of the nonce buffer in bytes. This must
103 *                                be appropriate for the selected algorithm.
104 *                                The default nonce size is
105 *                                PSA_AEAD_NONCE_LENGTH(key_type, alg) where
106 *                                key_type is the type of key.
107 * \param[in]  additional_data    Additional data that has been authenticated
108 *                                but not encrypted.
109 * \param      additional_data_length  Size of additional_data in bytes.
110 * \param[in]  ciphertext         Data that has been authenticated and
111 *                                encrypted. For algorithms where the encrypted
112 *                                data and the authentication tag are defined
113 *                                as separate inputs, the buffer contains
114 *                                encrypted data followed by the authentication
115 *                                tag.
116 * \param      ciphertext_length  Size of ciphertext in bytes.
117 * \param[out] plaintext          Output buffer for the decrypted data.
118 * \param      plaintext_size     Size of the plaintext buffer in bytes. This
119 *                                must be appropriate for the selected algorithm
120 *                                and key:
121 *                                - A sufficient output size is
122 *                                  PSA_AEAD_DECRYPT_OUTPUT_SIZE(key_type, alg,
123 *                                  ciphertext_length) where key_type is the
124 *                                  type of key.
125 *                                - PSA_AEAD_DECRYPT_OUTPUT_MAX_SIZE(
126 *                                  ciphertext_length) evaluates to the maximum
127 *                                  plaintext size of any supported AEAD
128 *                                  decryption.
129 * \param[out] plaintext_length   On success, the size of the output in the
130 *                                plaintext buffer.
131 *
132 * \retval #PSA_SUCCESS Success.
133 * \retval #PSA_ERROR_INVALID_SIGNATURE
134 *         The cipher is not authentic.
135 * \retval #PSA_ERROR_NOT_SUPPORTED
136 *         \p alg is not supported.
137 * \retval #PSA_ERROR_INSUFFICIENT_MEMORY \emptydescription
138 * \retval #PSA_ERROR_BUFFER_TOO_SMALL
139 *         plaintext_size is too small.
140 * \retval #PSA_ERROR_CORRUPTION_DETECTED \emptydescription
141 */
142psa_status_t mbedtls_psa_aead_decrypt(
143    const psa_key_attributes_t *attributes,
144    const uint8_t *key_buffer, size_t key_buffer_size,
145    psa_algorithm_t alg,
146    const uint8_t *nonce, size_t nonce_length,
147    const uint8_t *additional_data, size_t additional_data_length,
148    const uint8_t *ciphertext, size_t ciphertext_length,
149    uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length);
150
151/** Set the key for a multipart authenticated encryption operation.
152 *
153 *  \note The signature of this function is that of a PSA driver
154 *       aead_encrypt_setup entry point. This function behaves as an
155 *       aead_encrypt_setup entry point as defined in the PSA driver interface
156 *       specification for transparent drivers.
157 *
158 * If an error occurs at any step after a call to
159 * mbedtls_psa_aead_encrypt_setup(), the operation is reset by the PSA core by a
160 * call to mbedtls_psa_aead_abort(). The PSA core may call
161 * mbedtls_psa_aead_abort() at any time after the operation has been
162 * initialized, and is required to when the operation is no longer needed.
163 *
164 * \param[in,out] operation     The operation object to set up. It must have
165 *                              been initialized as per the documentation for
166 *                              #mbedtls_psa_aead_operation_t and not yet in
167 *                              use.
168 * \param[in]  attributes       The attributes of the key to use for the
169 *                              operation.
170 * \param[in]  key_buffer       The buffer containing the key context.
171 * \param      key_buffer_size  Size of the \p key_buffer buffer in bytes.
172                                It must be consistent with the size in bits
173                                recorded in \p attributes.
174 * \param alg                   The AEAD algorithm to compute
175 *                              (\c PSA_ALG_XXX value such that
176 *                              #PSA_ALG_IS_AEAD(\p alg) is true).
177 *
178 * \retval #PSA_SUCCESS
179 *         Success.
180 * \retval #PSA_ERROR_INVALID_ARGUMENT
181 *         An invalid block length was supplied.
182 * \retval #PSA_ERROR_NOT_SUPPORTED
183 *         \p alg is not supported.
184 * \retval #PSA_ERROR_INSUFFICIENT_MEMORY
185 *         Failed to allocate memory for key material
186 */
187psa_status_t mbedtls_psa_aead_encrypt_setup(
188    mbedtls_psa_aead_operation_t *operation,
189    const psa_key_attributes_t *attributes,
190    const uint8_t *key_buffer,
191    size_t key_buffer_size,
192    psa_algorithm_t alg);
193
194/** Set the key for a multipart authenticated decryption operation.
195 *
196 * \note The signature of this function is that of a PSA driver
197 *       aead_decrypt_setup entry point. This function behaves as an
198 *       aead_decrypt_setup entry point as defined in the PSA driver interface
199 *       specification for transparent drivers.
200 *
201 * If an error occurs at any step after a call to
202 * mbedtls_psa_aead_decrypt_setup(), the PSA core resets the operation by a
203 * call to mbedtls_psa_aead_abort(). The PSA core may call
204 * mbedtls_psa_aead_abort() at any time after the operation has been
205 * initialized, and is required to when the operation is no longer needed.
206 *
207 * \param[in,out] operation     The operation object to set up. It must have
208 *                              been initialized as per the documentation for
209 *                              #mbedtls_psa_aead_operation_t and not yet in
210 *                              use.
211 * \param[in]  attributes       The attributes of the key to use for the
212 *                              operation.
213 * \param[in]  key_buffer       The buffer containing the key context.
214 * \param      key_buffer_size  Size of the \p key_buffer buffer in bytes.
215                                It must be consistent with the size in bits
216                                recorded in \p attributes.
217 * \param alg                   The AEAD algorithm to compute
218 *                              (\c PSA_ALG_XXX value such that
219 *                              #PSA_ALG_IS_AEAD(\p alg) is true).
220 *
221 * \retval #PSA_SUCCESS
222 *         Success.
223 * \retval #PSA_ERROR_INVALID_ARGUMENT
224 *         An invalid block length was supplied.
225 * \retval #PSA_ERROR_NOT_SUPPORTED
226 *         \p alg is not supported.
227 * \retval #PSA_ERROR_INSUFFICIENT_MEMORY
228 *         Failed to allocate memory for key material
229 */
230psa_status_t mbedtls_psa_aead_decrypt_setup(
231    mbedtls_psa_aead_operation_t *operation,
232    const psa_key_attributes_t *attributes,
233    const uint8_t *key_buffer,
234    size_t key_buffer_size,
235    psa_algorithm_t alg);
236
237/** Set the nonce for an authenticated encryption or decryption operation.
238 *
239 * \note The signature of this function is that of a PSA driver aead_set_nonce
240 *       entry point. This function behaves as an aead_set_nonce entry point as
241 *       defined in the PSA driver interface specification for transparent
242 *       drivers.
243 *
244 * This function sets the nonce for the authenticated
245 * encryption or decryption operation.
246 *
247 * The PSA core calls mbedtls_psa_aead_encrypt_setup() or
248 * mbedtls_psa_aead_decrypt_setup() before calling this function.
249 *
250 * If this function returns an error status, the PSA core will call
251 * mbedtls_psa_aead_abort().
252 *
253 * \param[in,out] operation     Active AEAD operation.
254 * \param[in] nonce             Buffer containing the nonce to use.
255 * \param nonce_length          Size of the nonce in bytes.
256 *
257 * \retval #PSA_SUCCESS
258 *         Success.
259 * \retval #PSA_ERROR_INVALID_ARGUMENT
260 *         The size of \p nonce is not acceptable for the chosen algorithm.
261 * \retval #PSA_ERROR_NOT_SUPPORTED
262 *         Algorithm previously set is not supported in this configuration of
263 *         the library.
264 */
265psa_status_t mbedtls_psa_aead_set_nonce(
266    mbedtls_psa_aead_operation_t *operation,
267    const uint8_t *nonce,
268    size_t nonce_length);
269
270/** Declare the lengths of the message and additional data for AEAD.
271 *
272 * \note The signature of this function is that of a PSA driver aead_set_lengths
273 *       entry point. This function behaves as an aead_set_lengths entry point
274 *       as defined in the PSA driver interface specification for transparent
275 *       drivers.
276 *
277 * The PSA core calls this function before calling mbedtls_psa_aead_update_ad()
278 * or mbedtls_psa_aead_update() if the algorithm for the operation requires it.
279 * If the algorithm does not require it, calling this function is optional, but
280 * if this function is called then the implementation must enforce the lengths.
281 *
282 * The PSA core may call this function before or after setting the nonce with
283 * mbedtls_psa_aead_set_nonce().
284 *
285 * - For #PSA_ALG_CCM, calling this function is required.
286 * - For the other AEAD algorithms defined in this specification, calling
287 *   this function is not required.
288 *
289 * If this function returns an error status, the PSA core calls
290 * mbedtls_psa_aead_abort().
291 *
292 * \param[in,out] operation     Active AEAD operation.
293 * \param ad_length             Size of the non-encrypted additional
294 *                              authenticated data in bytes.
295 * \param plaintext_length      Size of the plaintext to encrypt in bytes.
296 *
297 * \retval #PSA_SUCCESS
298 *         Success.
299 * \retval #PSA_ERROR_INVALID_ARGUMENT
300 *         At least one of the lengths is not acceptable for the chosen
301 *         algorithm.
302 * \retval #PSA_ERROR_NOT_SUPPORTED
303 *         Algorithm previously set is not supported in this configuration of
304 *         the library.
305 */
306psa_status_t mbedtls_psa_aead_set_lengths(
307    mbedtls_psa_aead_operation_t *operation,
308    size_t ad_length,
309    size_t plaintext_length);
310
311/** Pass additional data to an active AEAD operation.
312 *
313 *  \note The signature of this function is that of a PSA driver
314 *       aead_update_ad entry point. This function behaves as an aead_update_ad
315 *       entry point as defined in the PSA driver interface specification for
316 *       transparent drivers.
317 *
318 * Additional data is authenticated, but not encrypted.
319 *
320 * The PSA core can call this function multiple times to pass successive
321 * fragments of the additional data. It will not call this function after
322 * passing data to encrypt or decrypt with mbedtls_psa_aead_update().
323 *
324 * Before calling this function, the PSA core will:
325 *    1. Call either mbedtls_psa_aead_encrypt_setup() or
326 *       mbedtls_psa_aead_decrypt_setup().
327 *    2. Set the nonce with mbedtls_psa_aead_set_nonce().
328 *
329 * If this function returns an error status, the PSA core will call
330 * mbedtls_psa_aead_abort().
331 *
332 * \param[in,out] operation     Active AEAD operation.
333 * \param[in] input             Buffer containing the fragment of
334 *                              additional data.
335 * \param input_length          Size of the \p input buffer in bytes.
336 *
337 * \retval #PSA_SUCCESS
338 *         Success.
339 * \retval #PSA_ERROR_NOT_SUPPORTED
340 *         Algorithm previously set is not supported in this configuration of
341 *         the library.
342 */
343psa_status_t mbedtls_psa_aead_update_ad(
344    mbedtls_psa_aead_operation_t *operation,
345    const uint8_t *input,
346    size_t input_length);
347
348/** Encrypt or decrypt a message fragment in an active AEAD operation.
349 *
350 *  \note The signature of this function is that of a PSA driver
351 *       aead_update entry point. This function behaves as an aead_update entry
352 *       point as defined in the PSA driver interface specification for
353 *       transparent drivers.
354 *
355 * Before calling this function, the PSA core will:
356 *    1. Call either mbedtls_psa_aead_encrypt_setup() or
357 *       mbedtls_psa_aead_decrypt_setup(). The choice of setup function
358 *       determines whether this function encrypts or decrypts its input.
359 *    2. Set the nonce with mbedtls_psa_aead_set_nonce().
360 *    3. Call mbedtls_psa_aead_update_ad() to pass all the additional data.
361 *
362 * If this function returns an error status, the PSA core will call
363 * mbedtls_psa_aead_abort().
364 *
365 * This function does not require the input to be aligned to any
366 * particular block boundary. If the implementation can only process
367 * a whole block at a time, it must consume all the input provided, but
368 * it may delay the end of the corresponding output until a subsequent
369 * call to mbedtls_psa_aead_update(), mbedtls_psa_aead_finish() provides
370 * sufficient input. The amount of data that can be delayed in this way is
371 * bounded by #PSA_AEAD_UPDATE_OUTPUT_SIZE.
372 *
373 * \param[in,out] operation     Active AEAD operation.
374 * \param[in] input             Buffer containing the message fragment to
375 *                              encrypt or decrypt.
376 * \param input_length          Size of the \p input buffer in bytes.
377 * \param[out] output           Buffer where the output is to be written.
378 * \param output_size           Size of the \p output buffer in bytes.
379 *                              This must be appropriate for the selected
380 *                                algorithm and key:
381 *                                - A sufficient output size is
382 *                                  #PSA_AEAD_UPDATE_OUTPUT_SIZE(\c key_type,
383 *                                  \c alg, \p input_length) where
384 *                                  \c key_type is the type of key and \c alg is
385 *                                  the algorithm that were used to set up the
386 *                                  operation.
387 *                                - #PSA_AEAD_UPDATE_OUTPUT_MAX_SIZE(\p
388 *                                  input_length) evaluates to the maximum
389 *                                  output size of any supported AEAD
390 *                                  algorithm.
391 * \param[out] output_length    On success, the number of bytes
392 *                              that make up the returned output.
393 *
394 * \retval #PSA_SUCCESS
395 *         Success.
396 *
397 * \retval #PSA_ERROR_BUFFER_TOO_SMALL
398 *         The size of the \p output buffer is too small.
399 *         #PSA_AEAD_UPDATE_OUTPUT_SIZE(\c key_type, \c alg, \p input_length) or
400 *         #PSA_AEAD_UPDATE_OUTPUT_MAX_SIZE(\p input_length) can be used to
401 *         determine the required buffer size.
402 */
403psa_status_t mbedtls_psa_aead_update(
404    mbedtls_psa_aead_operation_t *operation,
405    const uint8_t *input,
406    size_t input_length,
407    uint8_t *output,
408    size_t output_size,
409    size_t *output_length);
410
411/** Finish encrypting a message in an AEAD operation.
412 *
413 *  \note The signature of this function is that of a PSA driver
414 *       aead_finish entry point. This function behaves as an aead_finish entry
415 *       point as defined in the PSA driver interface specification for
416 *       transparent drivers.
417 *
418 * The operation must have been set up by the PSA core with
419 * mbedtls_psa_aead_encrypt_setup().
420 *
421 * This function finishes the authentication of the additional data
422 * formed by concatenating the inputs passed to preceding calls to
423 * mbedtls_psa_aead_update_ad() with the plaintext formed by concatenating the
424 * inputs passed to preceding calls to mbedtls_psa_aead_update().
425 *
426 * This function has two output buffers:
427 * - \p ciphertext contains trailing ciphertext that was buffered from
428 *   preceding calls to mbedtls_psa_aead_update().
429 * - \p tag contains the authentication tag.
430 *
431 * Whether or not this function returns successfully, the PSA core subsequently
432 * calls mbedtls_psa_aead_abort() to deactivate the operation.
433 *
434 * \param[in,out] operation     Active AEAD operation.
435 * \param[out] ciphertext       Buffer where the last part of the ciphertext
436 *                              is to be written.
437 * \param ciphertext_size       Size of the \p ciphertext buffer in bytes.
438 *                              This must be appropriate for the selected
439 *                              algorithm and key:
440 *                              - A sufficient output size is
441 *                                #PSA_AEAD_FINISH_OUTPUT_SIZE(\c key_type,
442 *                                \c alg) where \c key_type is the type of key
443 *                                and \c alg is the algorithm that were used to
444 *                                set up the operation.
445 *                              - #PSA_AEAD_FINISH_OUTPUT_MAX_SIZE evaluates to
446 *                                the maximum output size of any supported AEAD
447 *                                algorithm.
448 * \param[out] ciphertext_length On success, the number of bytes of
449 *                              returned ciphertext.
450 * \param[out] tag              Buffer where the authentication tag is
451 *                              to be written.
452 * \param tag_size              Size of the \p tag buffer in bytes.
453 *                              This must be appropriate for the selected
454 *                              algorithm and key:
455 *                              - The exact tag size is #PSA_AEAD_TAG_LENGTH(\c
456 *                                key_type, \c key_bits, \c alg) where
457 *                                \c key_type and \c key_bits are the type and
458 *                                bit-size of the key, and \c alg are the
459 *                                algorithm that were used in the call to
460 *                                mbedtls_psa_aead_encrypt_setup().
461 *                              - #PSA_AEAD_TAG_MAX_SIZE evaluates to the
462 *                                maximum tag size of any supported AEAD
463 *                                algorithm.
464 * \param[out] tag_length       On success, the number of bytes
465 *                              that make up the returned tag.
466 *
467 * \retval #PSA_SUCCESS
468 *         Success.
469 * \retval #PSA_ERROR_BUFFER_TOO_SMALL
470 *         The size of the \p tag buffer is too small.
471 *         #PSA_AEAD_TAG_LENGTH(\c key_type, key_bits, \c alg) or
472 *         #PSA_AEAD_TAG_MAX_SIZE can be used to determine the required \p tag
473 *         buffer size.
474 */
475psa_status_t mbedtls_psa_aead_finish(
476    mbedtls_psa_aead_operation_t *operation,
477    uint8_t *ciphertext,
478    size_t ciphertext_size,
479    size_t *ciphertext_length,
480    uint8_t *tag,
481    size_t tag_size,
482    size_t *tag_length);
483
484/** Abort an AEAD operation.
485 *
486 *  \note The signature of this function is that of a PSA driver
487 *       aead_abort entry point. This function behaves as an aead_abort entry
488 *       point as defined in the PSA driver interface specification for
489 *       transparent drivers.
490 *
491 * Aborting an operation frees all associated resources except for the
492 * \p operation structure itself. Once aborted, the operation object
493 * can be reused for another operation by the PSA core by it calling
494 * mbedtls_psa_aead_encrypt_setup() or mbedtls_psa_aead_decrypt_setup() again.
495 *
496 * The PSA core may call this function any time after the operation object has
497 * been initialized as described in #mbedtls_psa_aead_operation_t.
498 *
499 * In particular, calling mbedtls_psa_aead_abort() after the operation has been
500 * terminated by a call to mbedtls_psa_aead_abort() or
501 * mbedtls_psa_aead_finish() is safe and has no effect.
502 *
503 * \param[in,out] operation     Initialized AEAD operation.
504 *
505 * \retval #PSA_SUCCESS
506 *         Success.
507 */
508psa_status_t mbedtls_psa_aead_abort(
509    mbedtls_psa_aead_operation_t *operation);
510
511#endif /* PSA_CRYPTO_AEAD_H */
512