2022-06-01 18:05:57 +02:00
|
|
|
|
/*
|
|
|
|
|
* PSA PAKE layer on top of Mbed TLS software crypto
|
|
|
|
|
*/
|
|
|
|
|
/*
|
|
|
|
|
* Copyright The Mbed TLS Contributors
|
|
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
|
|
|
*
|
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
|
|
|
* not use this file except in compliance with the License.
|
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
|
*
|
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
*
|
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
|
* limitations under the License.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#ifndef PSA_CRYPTO_PAKE_H
|
|
|
|
|
#define PSA_CRYPTO_PAKE_H
|
|
|
|
|
|
|
|
|
|
#include <psa/crypto.h>
|
|
|
|
|
|
|
|
|
|
/** Set the session information for a password-authenticated key exchange.
|
|
|
|
|
*
|
2022-12-07 14:47:34 +01:00
|
|
|
|
* \note The signature of this function is that of a PSA driver
|
|
|
|
|
* pake_setup entry point. This function behaves as a pake_setup
|
|
|
|
|
* entry point as defined in the PSA driver interface specification for
|
|
|
|
|
* transparent drivers.
|
2022-06-01 18:05:57 +02:00
|
|
|
|
*
|
|
|
|
|
* \param[in,out] operation The operation object to set up. It must have
|
|
|
|
|
* been initialized but not set up yet.
|
2022-12-07 14:47:34 +01:00
|
|
|
|
* \param[in] inputs Inputs required for PAKE operation (role, password,
|
|
|
|
|
* key lifetime, cipher suite)
|
2022-06-01 18:05:57 +02:00
|
|
|
|
*
|
|
|
|
|
* \retval #PSA_SUCCESS
|
|
|
|
|
* Success.
|
|
|
|
|
* \retval #PSA_ERROR_NOT_SUPPORTED
|
|
|
|
|
* The algorithm in \p cipher_suite is not a supported PAKE algorithm,
|
|
|
|
|
* or the PAKE primitive in \p cipher_suite is not supported or not
|
|
|
|
|
* compatible with the PAKE algorithm, or the hash algorithm in
|
|
|
|
|
* \p cipher_suite is not supported or not compatible with the PAKE
|
|
|
|
|
* algorithm and primitive.
|
|
|
|
|
*/
|
2022-11-22 14:05:12 +01:00
|
|
|
|
psa_status_t mbedtls_psa_pake_setup(mbedtls_psa_pake_operation_t *operation,
|
2022-12-07 11:04:51 +01:00
|
|
|
|
const psa_crypto_driver_pake_inputs_t *inputs);
|
2022-06-01 18:05:57 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/** Get output for a step of a password-authenticated key exchange.
|
|
|
|
|
*
|
2022-12-07 14:47:34 +01:00
|
|
|
|
* \note The signature of this function is that of a PSA driver
|
|
|
|
|
* pake_output entry point. This function behaves as a pake_output
|
|
|
|
|
* entry point as defined in the PSA driver interface specification for
|
|
|
|
|
* transparent drivers.
|
2022-06-01 18:05:57 +02:00
|
|
|
|
*
|
|
|
|
|
* \param[in,out] operation Active PAKE operation.
|
|
|
|
|
* \param step The step of the algorithm for which the output is
|
|
|
|
|
* requested.
|
|
|
|
|
* \param[out] output Buffer where the output is to be written in the
|
|
|
|
|
* format appropriate for this \p step. Refer to
|
|
|
|
|
* the documentation of the individual
|
|
|
|
|
* \c PSA_PAKE_STEP_XXX constants for more
|
|
|
|
|
* information.
|
|
|
|
|
* \param output_size Size of the \p output buffer in bytes. This must
|
|
|
|
|
* be at least #PSA_PAKE_OUTPUT_SIZE(\p alg, \p
|
|
|
|
|
* primitive, \p step) where \p alg and
|
|
|
|
|
* \p primitive are the PAKE algorithm and primitive
|
|
|
|
|
* in the operation's cipher suite, and \p step is
|
|
|
|
|
* the output step.
|
|
|
|
|
*
|
|
|
|
|
* \param[out] output_length On success, the number of bytes of the returned
|
|
|
|
|
* output.
|
|
|
|
|
*
|
|
|
|
|
* \retval #PSA_SUCCESS
|
|
|
|
|
* Success.
|
|
|
|
|
* \retval #PSA_ERROR_BUFFER_TOO_SMALL
|
|
|
|
|
* The size of the \p output buffer is too small.
|
|
|
|
|
* \retval #PSA_ERROR_INVALID_ARGUMENT
|
|
|
|
|
* \p step is not compatible with the operation's algorithm.
|
|
|
|
|
* \retval #PSA_ERROR_NOT_SUPPORTED
|
|
|
|
|
* \p step is not supported with the operation's algorithm.
|
|
|
|
|
* \retval #PSA_ERROR_INSUFFICIENT_ENTROPY
|
|
|
|
|
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
|
|
|
|
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
|
|
|
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
|
|
|
|
* \retval #PSA_ERROR_STORAGE_FAILURE
|
|
|
|
|
* \retval #PSA_ERROR_DATA_CORRUPT
|
|
|
|
|
* \retval #PSA_ERROR_DATA_INVALID
|
|
|
|
|
* \retval #PSA_ERROR_BAD_STATE
|
|
|
|
|
* The operation state is not valid (it must be active, and fully set
|
|
|
|
|
* up, and this call must conform to the algorithm's requirements
|
2022-12-07 14:47:34 +01:00
|
|
|
|
* for ordering of input and output steps).
|
2022-06-01 18:05:57 +02:00
|
|
|
|
* It is implementation-dependent whether a failure to initialize
|
|
|
|
|
* results in this error code.
|
|
|
|
|
*/
|
2022-11-22 14:05:12 +01:00
|
|
|
|
psa_status_t mbedtls_psa_pake_output(mbedtls_psa_pake_operation_t *operation,
|
2023-02-17 14:30:50 +01:00
|
|
|
|
psa_crypto_driver_pake_step_t step,
|
2022-06-01 18:05:57 +02:00
|
|
|
|
uint8_t *output,
|
|
|
|
|
size_t output_size,
|
|
|
|
|
size_t *output_length);
|
|
|
|
|
|
|
|
|
|
/** Provide input for a step of a password-authenticated key exchange.
|
|
|
|
|
*
|
2022-12-07 14:47:34 +01:00
|
|
|
|
* \note The signature of this function is that of a PSA driver
|
|
|
|
|
* key_agreement entry point. This function behaves as a key_agreement
|
|
|
|
|
* entry point as defined in the PSA driver interface specification for
|
|
|
|
|
* transparent drivers.
|
2022-06-01 18:05:57 +02:00
|
|
|
|
*
|
|
|
|
|
* \param[in,out] operation Active PAKE operation.
|
|
|
|
|
* \param step The step for which the input is provided.
|
|
|
|
|
* \param[in] input Buffer containing the input in the format
|
|
|
|
|
* appropriate for this \p step. Refer to the
|
|
|
|
|
* documentation of the individual
|
|
|
|
|
* \c PSA_PAKE_STEP_XXX constants for more
|
|
|
|
|
* information.
|
|
|
|
|
* \param input_length Size of the \p input buffer in bytes.
|
|
|
|
|
*
|
|
|
|
|
* \retval #PSA_SUCCESS
|
|
|
|
|
* Success.
|
|
|
|
|
* \retval #PSA_ERROR_INVALID_SIGNATURE
|
|
|
|
|
* The verification fails for a #PSA_PAKE_STEP_ZK_PROOF input step.
|
|
|
|
|
* \retval #PSA_ERROR_INVALID_ARGUMENT
|
2022-12-07 14:47:34 +01:00
|
|
|
|
* \p step is not compatible with the \p operation’s algorithm, or the
|
2022-06-01 18:05:57 +02:00
|
|
|
|
* \p input is not valid for the \p operation's algorithm, cipher suite
|
|
|
|
|
* or \p step.
|
|
|
|
|
* \retval #PSA_ERROR_NOT_SUPPORTED
|
|
|
|
|
* \p step p is not supported with the \p operation's algorithm, or the
|
|
|
|
|
* \p input is not supported for the \p operation's algorithm, cipher
|
|
|
|
|
* suite or \p step.
|
|
|
|
|
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
|
|
|
|
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
|
|
|
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
|
|
|
|
* \retval #PSA_ERROR_STORAGE_FAILURE
|
|
|
|
|
* \retval #PSA_ERROR_DATA_CORRUPT
|
|
|
|
|
* \retval #PSA_ERROR_DATA_INVALID
|
|
|
|
|
* \retval #PSA_ERROR_BAD_STATE
|
|
|
|
|
* The operation state is not valid (it must be active, and fully set
|
|
|
|
|
* up, and this call must conform to the algorithm's requirements
|
2022-12-07 14:47:34 +01:00
|
|
|
|
* for ordering of input and output steps).
|
2022-06-01 18:05:57 +02:00
|
|
|
|
* It is implementation-dependent whether a failure to initialize
|
|
|
|
|
* results in this error code.
|
|
|
|
|
*/
|
2022-11-22 14:05:12 +01:00
|
|
|
|
psa_status_t mbedtls_psa_pake_input(mbedtls_psa_pake_operation_t *operation,
|
2023-02-17 14:30:50 +01:00
|
|
|
|
psa_crypto_driver_pake_step_t step,
|
2022-06-01 18:05:57 +02:00
|
|
|
|
const uint8_t *input,
|
|
|
|
|
size_t input_length);
|
|
|
|
|
|
|
|
|
|
/** Get implicitly confirmed shared secret from a PAKE.
|
|
|
|
|
*
|
2022-12-07 14:47:34 +01:00
|
|
|
|
* \note The signature of this function is that of a PSA driver
|
|
|
|
|
* pake_get_implicit_key entry point. This function behaves as a
|
|
|
|
|
* pake_get_implicit_key entry point as defined in the PSA driver
|
|
|
|
|
* interface specification for transparent drivers.
|
2022-06-01 18:05:57 +02:00
|
|
|
|
*
|
|
|
|
|
* \param[in,out] operation Active PAKE operation.
|
2022-12-07 14:47:34 +01:00
|
|
|
|
* \param[out] output Output buffer for implicit key
|
|
|
|
|
* \param[out] output_size Size of the returned implicit key
|
2022-06-01 18:05:57 +02:00
|
|
|
|
*
|
|
|
|
|
* \retval #PSA_SUCCESS
|
|
|
|
|
* Success.
|
|
|
|
|
* \retval #PSA_ERROR_NOT_SUPPORTED
|
|
|
|
|
* Input from a PAKE is not supported by the algorithm in the \p output
|
|
|
|
|
* key derivation operation.
|
|
|
|
|
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
|
|
|
|
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
|
|
|
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
|
|
|
|
* \retval #PSA_ERROR_STORAGE_FAILURE
|
|
|
|
|
* \retval #PSA_ERROR_DATA_CORRUPT
|
|
|
|
|
* \retval #PSA_ERROR_DATA_INVALID
|
|
|
|
|
* \retval #PSA_ERROR_BAD_STATE
|
|
|
|
|
* The PAKE operation state is not valid (it must be active, but beyond
|
2022-12-07 14:47:34 +01:00
|
|
|
|
* that validity is specific to the algorithm),
|
2022-06-01 18:05:57 +02:00
|
|
|
|
* or the state of \p output is not valid for
|
|
|
|
|
* the #PSA_KEY_DERIVATION_INPUT_SECRET step. This can happen if the
|
|
|
|
|
* step is out of order or the application has done this step already
|
|
|
|
|
* and it may not be repeated.
|
|
|
|
|
* It is implementation-dependent whether a failure to initialize
|
|
|
|
|
* results in this error code.
|
|
|
|
|
*/
|
|
|
|
|
psa_status_t mbedtls_psa_pake_get_implicit_key(
|
2022-11-22 14:05:12 +01:00
|
|
|
|
mbedtls_psa_pake_operation_t *operation,
|
2022-11-29 14:53:13 +01:00
|
|
|
|
uint8_t *output, size_t *output_size);
|
2022-06-01 18:05:57 +02:00
|
|
|
|
|
|
|
|
|
/** Abort a PAKE operation.
|
|
|
|
|
*
|
2022-12-07 14:47:34 +01:00
|
|
|
|
* \note The signature of this function is that of a PSA driver
|
|
|
|
|
* pake_abort entry point. This function behaves as a pake_abort
|
|
|
|
|
* entry point as defined in the PSA driver interface specification for
|
|
|
|
|
* transparent drivers.
|
2022-06-01 18:05:57 +02:00
|
|
|
|
*
|
|
|
|
|
* \param[in,out] operation The operation to abort.
|
|
|
|
|
*
|
|
|
|
|
* \retval #PSA_SUCCESS
|
|
|
|
|
* Success.
|
|
|
|
|
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
|
|
|
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
|
|
|
|
* \retval #PSA_ERROR_BAD_STATE
|
|
|
|
|
* It is implementation-dependent whether a failure to initialize
|
|
|
|
|
* results in this error code.
|
|
|
|
|
*/
|
2022-11-22 14:05:12 +01:00
|
|
|
|
psa_status_t mbedtls_psa_pake_abort(mbedtls_psa_pake_operation_t *operation);
|
2022-06-01 18:05:57 +02:00
|
|
|
|
|
|
|
|
|
#endif /* PSA_CRYPTO_PAKE_H */
|