First pass addition of driver wrappers
Transparent driver test functions not yet implemented. Signed-off-by: Paul Elliott <paul.elliott@arm.com>
This commit is contained in:
parent
adb8b16b16
commit
6504aa6451
3 changed files with 441 additions and 1 deletions
|
@ -156,6 +156,14 @@ struct psa_aead_operation_s
|
||||||
psa_algorithm_t alg;
|
psa_algorithm_t alg;
|
||||||
psa_key_type_t key_type;
|
psa_key_type_t key_type;
|
||||||
|
|
||||||
|
/** Unique ID indicating which driver got assigned to do the
|
||||||
|
* operation. Since driver contexts are driver-specific, swapping
|
||||||
|
* drivers halfway through the operation is not supported.
|
||||||
|
* ID values are auto-generated in psa_crypto_driver_wrappers.h
|
||||||
|
* ID value zero means the context is not valid or not assigned to
|
||||||
|
* any driver (i.e. none of the driver contexts are active). */
|
||||||
|
unsigned int id;
|
||||||
|
|
||||||
unsigned int key_set : 1;
|
unsigned int key_set : 1;
|
||||||
unsigned int nonce_set : 1;
|
unsigned int nonce_set : 1;
|
||||||
unsigned int lengths_set : 1;
|
unsigned int lengths_set : 1;
|
||||||
|
@ -197,7 +205,7 @@ struct psa_aead_operation_s
|
||||||
} ctx;
|
} ctx;
|
||||||
};
|
};
|
||||||
|
|
||||||
#define PSA_AEAD_OPERATION_INIT {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, {0}, {0}}
|
#define PSA_AEAD_OPERATION_INIT {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, {0}, {0}}
|
||||||
static inline struct psa_aead_operation_s psa_aead_operation_init( void )
|
static inline struct psa_aead_operation_s psa_aead_operation_init( void )
|
||||||
{
|
{
|
||||||
const struct psa_aead_operation_s v = PSA_AEAD_OPERATION_INIT;
|
const struct psa_aead_operation_s v = PSA_AEAD_OPERATION_INIT;
|
||||||
|
|
|
@ -1292,6 +1292,377 @@ psa_status_t psa_driver_wrapper_aead_decrypt(
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_encrypt_setup(
|
||||||
|
psa_aead_operation_t *operation,
|
||||||
|
const psa_key_attributes_t *attributes,
|
||||||
|
const uint8_t *key_buffer, size_t key_buffer_size,
|
||||||
|
psa_algorithm_t alg )
|
||||||
|
{
|
||||||
|
psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
|
||||||
|
psa_key_location_t location =
|
||||||
|
PSA_KEY_LIFETIME_GET_LOCATION( attributes->core.lifetime );
|
||||||
|
|
||||||
|
switch( location )
|
||||||
|
{
|
||||||
|
case PSA_KEY_LOCATION_LOCAL_STORAGE:
|
||||||
|
/* Key is stored in the slot in export representation, so
|
||||||
|
* cycle through all known transparent accelerators */
|
||||||
|
|
||||||
|
#if defined(PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT)
|
||||||
|
#if defined(PSA_CRYPTO_DRIVER_TEST)
|
||||||
|
// status = test_transparent_aead_encrypt_setup(
|
||||||
|
// operation, attributes,
|
||||||
|
// key_buffer, key_buffer_size,
|
||||||
|
// alg );
|
||||||
|
/* Declared with fallback == true */
|
||||||
|
if( status == PSA_SUCCESS )
|
||||||
|
operation->id = PSA_CRYPTO_TRANSPARENT_TEST_DRIVER_ID;
|
||||||
|
|
||||||
|
if( status != PSA_ERROR_NOT_SUPPORTED )
|
||||||
|
return( status );
|
||||||
|
#endif /* PSA_CRYPTO_DRIVER_TEST */
|
||||||
|
#endif /* PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT */
|
||||||
|
|
||||||
|
/* Fell through, meaning no accelerator supports this operation */
|
||||||
|
status = mbedtls_psa_aead_encrypt_setup(
|
||||||
|
operation, attributes,
|
||||||
|
key_buffer, key_buffer_size,
|
||||||
|
alg );
|
||||||
|
|
||||||
|
if( status == PSA_SUCCESS )
|
||||||
|
operation->id = PSA_CRYPTO_MBED_TLS_DRIVER_ID;
|
||||||
|
|
||||||
|
return( status );
|
||||||
|
|
||||||
|
/* Add cases for opaque driver here */
|
||||||
|
|
||||||
|
default:
|
||||||
|
/* Key is declared with a lifetime not known to us */
|
||||||
|
(void)status;
|
||||||
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_decrypt_setup(
|
||||||
|
psa_aead_operation_t *operation,
|
||||||
|
const psa_key_attributes_t *attributes,
|
||||||
|
const uint8_t *key_buffer, size_t key_buffer_size,
|
||||||
|
psa_algorithm_t alg )
|
||||||
|
{
|
||||||
|
psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
|
||||||
|
psa_key_location_t location =
|
||||||
|
PSA_KEY_LIFETIME_GET_LOCATION( attributes->core.lifetime );
|
||||||
|
|
||||||
|
switch( location )
|
||||||
|
{
|
||||||
|
case PSA_KEY_LOCATION_LOCAL_STORAGE:
|
||||||
|
/* Key is stored in the slot in export representation, so
|
||||||
|
* cycle through all known transparent accelerators */
|
||||||
|
|
||||||
|
#if defined(PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT)
|
||||||
|
#if defined(PSA_CRYPTO_DRIVER_TEST)
|
||||||
|
// status = test_transparent_aead_decrypt_setup(
|
||||||
|
// operation, attributes,
|
||||||
|
// key_buffer, key_buffer_size,
|
||||||
|
// alg );
|
||||||
|
/* Declared with fallback == true */
|
||||||
|
if( status == PSA_SUCCESS )
|
||||||
|
operation->id = PSA_CRYPTO_TRANSPARENT_TEST_DRIVER_ID;
|
||||||
|
|
||||||
|
if( status != PSA_ERROR_NOT_SUPPORTED )
|
||||||
|
return( status );
|
||||||
|
#endif /* PSA_CRYPTO_DRIVER_TEST */
|
||||||
|
#endif /* PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT */
|
||||||
|
|
||||||
|
/* Fell through, meaning no accelerator supports this operation */
|
||||||
|
status = mbedtls_psa_aead_decrypt_setup(
|
||||||
|
operation, attributes,
|
||||||
|
key_buffer, key_buffer_size,
|
||||||
|
alg );
|
||||||
|
|
||||||
|
if( status == PSA_SUCCESS )
|
||||||
|
operation->id = PSA_CRYPTO_MBED_TLS_DRIVER_ID;
|
||||||
|
|
||||||
|
return( status );
|
||||||
|
|
||||||
|
/* Add cases for opaque driver here */
|
||||||
|
|
||||||
|
default:
|
||||||
|
/* Key is declared with a lifetime not known to us */
|
||||||
|
(void)status;
|
||||||
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_generate_nonce(
|
||||||
|
psa_aead_operation_t *operation,
|
||||||
|
uint8_t *nonce,
|
||||||
|
size_t nonce_size,
|
||||||
|
size_t *nonce_length )
|
||||||
|
{
|
||||||
|
switch( operation->id )
|
||||||
|
{
|
||||||
|
#if defined(MBEDTLS_PSA_BUILTIN_CIPHER)
|
||||||
|
case PSA_CRYPTO_MBED_TLS_DRIVER_ID:
|
||||||
|
return( mbedtls_psa_aead_generate_nonce( operation, nonce, nonce_size,
|
||||||
|
nonce_length ) );
|
||||||
|
#endif /* MBEDTLS_PSA_BUILTIN_CIPHER */
|
||||||
|
|
||||||
|
#if defined(PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT)
|
||||||
|
#if defined(PSA_CRYPTO_DRIVER_TEST)
|
||||||
|
case PSA_CRYPTO_TRANSPARENT_TEST_DRIVER_ID:
|
||||||
|
// return( test_transparent_aead_generate_nonce(
|
||||||
|
// operation, nonce, nonce_size, nonce_length ) );
|
||||||
|
|
||||||
|
/* Add cases for opaque driver here */
|
||||||
|
|
||||||
|
#endif /* PSA_CRYPTO_DRIVER_TEST */
|
||||||
|
#endif /* PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT */
|
||||||
|
}
|
||||||
|
|
||||||
|
(void)nonce;
|
||||||
|
(void)nonce_size;
|
||||||
|
(void)nonce_length;
|
||||||
|
|
||||||
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
||||||
|
}
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_set_nonce(
|
||||||
|
psa_aead_operation_t *operation,
|
||||||
|
const uint8_t *nonce,
|
||||||
|
size_t nonce_length )
|
||||||
|
{
|
||||||
|
switch( operation->id )
|
||||||
|
{
|
||||||
|
#if defined(MBEDTLS_PSA_BUILTIN_CIPHER)
|
||||||
|
case PSA_CRYPTO_MBED_TLS_DRIVER_ID:
|
||||||
|
return( mbedtls_psa_aead_set_nonce( operation, nonce, nonce_length ) );
|
||||||
|
|
||||||
|
#endif /* MBEDTLS_PSA_BUILTIN_CIPHER */
|
||||||
|
|
||||||
|
#if defined(PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT)
|
||||||
|
#if defined(PSA_CRYPTO_DRIVER_TEST)
|
||||||
|
case PSA_CRYPTO_TRANSPARENT_TEST_DRIVER_ID:
|
||||||
|
// return( test_transparent_aead_set_nonce(
|
||||||
|
// operation, nonce, nonce_length ) );
|
||||||
|
|
||||||
|
/* Add cases for opaque driver here */
|
||||||
|
|
||||||
|
#endif /* PSA_CRYPTO_DRIVER_TEST */
|
||||||
|
#endif /* PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT */
|
||||||
|
}
|
||||||
|
|
||||||
|
(void)nonce;
|
||||||
|
(void)nonce_length;
|
||||||
|
|
||||||
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
||||||
|
}
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_set_lengths(
|
||||||
|
psa_aead_operation_t *operation,
|
||||||
|
size_t ad_length,
|
||||||
|
size_t plaintext_length )
|
||||||
|
{
|
||||||
|
switch( operation->id )
|
||||||
|
{
|
||||||
|
#if defined(MBEDTLS_PSA_BUILTIN_CIPHER)
|
||||||
|
case PSA_CRYPTO_MBED_TLS_DRIVER_ID:
|
||||||
|
return( mbedtls_psa_aead_set_lengths( operation, ad_length, plaintext_length ) );
|
||||||
|
|
||||||
|
#endif /* MBEDTLS_PSA_BUILTIN_CIPHER */
|
||||||
|
|
||||||
|
#if defined(PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT)
|
||||||
|
#if defined(PSA_CRYPTO_DRIVER_TEST)
|
||||||
|
case PSA_CRYPTO_TRANSPARENT_TEST_DRIVER_ID:
|
||||||
|
// return( test_transparent_aead_set_lengths(
|
||||||
|
// operation, ad_length, plaintext_length ) );
|
||||||
|
|
||||||
|
/* Add cases for opaque driver here */
|
||||||
|
|
||||||
|
#endif /* PSA_CRYPTO_DRIVER_TEST */
|
||||||
|
#endif /* PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT */
|
||||||
|
}
|
||||||
|
|
||||||
|
(void)ad_length;
|
||||||
|
(void)plaintext_length;
|
||||||
|
|
||||||
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
||||||
|
}
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_update_ad(
|
||||||
|
psa_aead_operation_t *operation,
|
||||||
|
const uint8_t *input,
|
||||||
|
size_t input_length )
|
||||||
|
{
|
||||||
|
switch( operation->id )
|
||||||
|
{
|
||||||
|
#if defined(MBEDTLS_PSA_BUILTIN_CIPHER)
|
||||||
|
case PSA_CRYPTO_MBED_TLS_DRIVER_ID:
|
||||||
|
return( mbedtls_psa_aead_update_ad( operation, input, input_length ) );
|
||||||
|
|
||||||
|
#endif /* MBEDTLS_PSA_BUILTIN_CIPHER */
|
||||||
|
|
||||||
|
#if defined(PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT)
|
||||||
|
#if defined(PSA_CRYPTO_DRIVER_TEST)
|
||||||
|
case PSA_CRYPTO_TRANSPARENT_TEST_DRIVER_ID:
|
||||||
|
// return( test_transparent_aead_update_ad(
|
||||||
|
// operation, input, input_length ) );
|
||||||
|
|
||||||
|
/* Add cases for opaque driver here */
|
||||||
|
|
||||||
|
#endif /* PSA_CRYPTO_DRIVER_TEST */
|
||||||
|
#endif /* PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT */
|
||||||
|
}
|
||||||
|
|
||||||
|
(void)input;
|
||||||
|
(void)input_length;
|
||||||
|
|
||||||
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
||||||
|
}
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_update(
|
||||||
|
psa_aead_operation_t *operation,
|
||||||
|
const uint8_t *input,
|
||||||
|
size_t input_length,
|
||||||
|
uint8_t *output,
|
||||||
|
size_t output_size,
|
||||||
|
size_t *output_length )
|
||||||
|
{
|
||||||
|
switch( operation->id )
|
||||||
|
{
|
||||||
|
#if defined(MBEDTLS_PSA_BUILTIN_CIPHER)
|
||||||
|
case PSA_CRYPTO_MBED_TLS_DRIVER_ID:
|
||||||
|
return( mbedtls_psa_aead_update( operation, input, input_length, output,
|
||||||
|
output_size, output_length ) );
|
||||||
|
|
||||||
|
#endif /* MBEDTLS_PSA_BUILTIN_CIPHER */
|
||||||
|
|
||||||
|
#if defined(PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT)
|
||||||
|
#if defined(PSA_CRYPTO_DRIVER_TEST)
|
||||||
|
case PSA_CRYPTO_TRANSPARENT_TEST_DRIVER_ID:
|
||||||
|
// return( test_transparent_aead_update(
|
||||||
|
// operation, input, input_length, ouput, output_size,
|
||||||
|
// output_length ) );
|
||||||
|
|
||||||
|
/* Add cases for opaque driver here */
|
||||||
|
|
||||||
|
#endif /* PSA_CRYPTO_DRIVER_TEST */
|
||||||
|
#endif /* PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT */
|
||||||
|
}
|
||||||
|
|
||||||
|
(void)input;
|
||||||
|
(void)input_length;
|
||||||
|
(void)output;
|
||||||
|
(void)output_size;
|
||||||
|
(void)output_length;
|
||||||
|
|
||||||
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
||||||
|
}
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_finish(
|
||||||
|
psa_aead_operation_t *operation,
|
||||||
|
uint8_t *ciphertext,
|
||||||
|
size_t ciphertext_size,
|
||||||
|
size_t *ciphertext_length,
|
||||||
|
uint8_t *tag,
|
||||||
|
size_t tag_size,
|
||||||
|
size_t *tag_length )
|
||||||
|
{
|
||||||
|
switch( operation->id )
|
||||||
|
{
|
||||||
|
#if defined(MBEDTLS_PSA_BUILTIN_CIPHER)
|
||||||
|
case PSA_CRYPTO_MBED_TLS_DRIVER_ID:
|
||||||
|
return( mbedtls_psa_aead_finish( operation, ciphertext, ciphertext_size,
|
||||||
|
ciphertext_length, tag, tag_size, tag_length ) );
|
||||||
|
|
||||||
|
#endif /* MBEDTLS_PSA_BUILTIN_CIPHER */
|
||||||
|
|
||||||
|
#if defined(PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT)
|
||||||
|
#if defined(PSA_CRYPTO_DRIVER_TEST)
|
||||||
|
case PSA_CRYPTO_TRANSPARENT_TEST_DRIVER_ID:
|
||||||
|
// return( test_transparent_aead_finish(
|
||||||
|
// operation, ciphertext, ciphertext_size,
|
||||||
|
// ciphertext_length, tag, tag_size, tag_length ) );
|
||||||
|
|
||||||
|
/* Add cases for opaque driver here */
|
||||||
|
|
||||||
|
#endif /* PSA_CRYPTO_DRIVER_TEST */
|
||||||
|
#endif /* PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT */
|
||||||
|
}
|
||||||
|
|
||||||
|
(void)ciphertext;
|
||||||
|
(void)ciphertext_size;
|
||||||
|
(void)ciphertext_length;
|
||||||
|
(void)tag;
|
||||||
|
(void)tag_size;
|
||||||
|
(void)tag_length;
|
||||||
|
|
||||||
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
||||||
|
}
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_verify(
|
||||||
|
psa_aead_operation_t *operation,
|
||||||
|
uint8_t *plaintext,
|
||||||
|
size_t plaintext_size,
|
||||||
|
size_t *plaintext_length,
|
||||||
|
const uint8_t *tag,
|
||||||
|
size_t tag_length )
|
||||||
|
{
|
||||||
|
switch( operation->id )
|
||||||
|
{
|
||||||
|
#if defined(MBEDTLS_PSA_BUILTIN_CIPHER)
|
||||||
|
case PSA_CRYPTO_MBED_TLS_DRIVER_ID:
|
||||||
|
return( mbedtls_psa_aead_verify( operation, plaintext, plaintext_size,
|
||||||
|
plaintext_length, tag, tag_length ) );
|
||||||
|
|
||||||
|
#endif /* MBEDTLS_PSA_BUILTIN_CIPHER */
|
||||||
|
|
||||||
|
#if defined(PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT)
|
||||||
|
#if defined(PSA_CRYPTO_DRIVER_TEST)
|
||||||
|
case PSA_CRYPTO_TRANSPARENT_TEST_DRIVER_ID:
|
||||||
|
// return( test_transparent_aead_verify(
|
||||||
|
// operation, ciphertext, ciphertext_size,
|
||||||
|
// ciphertext_length, tag, tag_length ) );
|
||||||
|
|
||||||
|
/* Add cases for opaque driver here */
|
||||||
|
|
||||||
|
#endif /* PSA_CRYPTO_DRIVER_TEST */
|
||||||
|
#endif /* PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT */
|
||||||
|
}
|
||||||
|
|
||||||
|
(void)plaintext;
|
||||||
|
(void)plaintext_size;
|
||||||
|
(void)plaintext_length;
|
||||||
|
(void)tag;
|
||||||
|
(void)tag_length;
|
||||||
|
|
||||||
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
||||||
|
}
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_abort(
|
||||||
|
psa_aead_operation_t *operation )
|
||||||
|
{
|
||||||
|
switch( operation->id )
|
||||||
|
{
|
||||||
|
#if defined(MBEDTLS_PSA_BUILTIN_CIPHER)
|
||||||
|
case PSA_CRYPTO_MBED_TLS_DRIVER_ID:
|
||||||
|
return( mbedtls_psa_aead_abort( operation ) );
|
||||||
|
|
||||||
|
#endif /* MBEDTLS_PSA_BUILTIN_CIPHER */
|
||||||
|
|
||||||
|
#if defined(PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT)
|
||||||
|
#if defined(PSA_CRYPTO_DRIVER_TEST)
|
||||||
|
case PSA_CRYPTO_TRANSPARENT_TEST_DRIVER_ID:
|
||||||
|
// return( test_transparent_aead_abort( operation ) );
|
||||||
|
|
||||||
|
/* Add cases for opaque driver here */
|
||||||
|
|
||||||
|
#endif /* PSA_CRYPTO_DRIVER_TEST */
|
||||||
|
#endif /* PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT */
|
||||||
|
}
|
||||||
|
|
||||||
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
||||||
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* MAC functions
|
* MAC functions
|
||||||
|
|
|
@ -183,6 +183,67 @@ psa_status_t psa_driver_wrapper_aead_decrypt(
|
||||||
const uint8_t *ciphertext, size_t ciphertext_length,
|
const uint8_t *ciphertext, size_t ciphertext_length,
|
||||||
uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length );
|
uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length );
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_encrypt_setup(
|
||||||
|
psa_aead_operation_t *operation,
|
||||||
|
const psa_key_attributes_t *attributes,
|
||||||
|
const uint8_t *key_buffer, size_t key_buffer_size,
|
||||||
|
psa_algorithm_t alg );
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_decrypt_setup(
|
||||||
|
psa_aead_operation_t *operation,
|
||||||
|
const psa_key_attributes_t *attributes,
|
||||||
|
const uint8_t *key_buffer, size_t key_buffer_size,
|
||||||
|
psa_algorithm_t alg );
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_generate_nonce(
|
||||||
|
psa_aead_operation_t *operation,
|
||||||
|
uint8_t *nonce,
|
||||||
|
size_t nonce_size,
|
||||||
|
size_t *nonce_length );
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_set_nonce(
|
||||||
|
psa_aead_operation_t *operation,
|
||||||
|
const uint8_t *nonce,
|
||||||
|
size_t nonce_length );
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_set_lengths(
|
||||||
|
psa_aead_operation_t *operation,
|
||||||
|
size_t ad_length,
|
||||||
|
size_t plaintext_length );
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_update_ad(
|
||||||
|
psa_aead_operation_t *operation,
|
||||||
|
const uint8_t *input,
|
||||||
|
size_t input_length );
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_update(
|
||||||
|
psa_aead_operation_t *operation,
|
||||||
|
const uint8_t *input,
|
||||||
|
size_t input_length,
|
||||||
|
uint8_t *output,
|
||||||
|
size_t output_size,
|
||||||
|
size_t *output_length );
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_finish(
|
||||||
|
psa_aead_operation_t *operation,
|
||||||
|
uint8_t *ciphertext,
|
||||||
|
size_t ciphertext_size,
|
||||||
|
size_t *ciphertext_length,
|
||||||
|
uint8_t *tag,
|
||||||
|
size_t tag_size,
|
||||||
|
size_t *tag_length );
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_verify(
|
||||||
|
psa_aead_operation_t *operation,
|
||||||
|
uint8_t *plaintext,
|
||||||
|
size_t plaintext_size,
|
||||||
|
size_t *plaintext_length,
|
||||||
|
const uint8_t *tag,
|
||||||
|
size_t tag_length );
|
||||||
|
|
||||||
|
psa_status_t psa_driver_wrapper_aead_abort(
|
||||||
|
psa_aead_operation_t *operation );
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* MAC functions
|
* MAC functions
|
||||||
*/
|
*/
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue