edhoc 1.3.3 → 2.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (759) hide show
  1. package/.clang-format +79 -0
  2. package/README.md +6 -5
  3. package/dist/cbor-utils.d.ts +30 -0
  4. package/dist/cbor-utils.d.ts.map +1 -0
  5. package/dist/cbor-utils.js +179 -0
  6. package/dist/cipher-suites.d.ts +13 -0
  7. package/dist/cipher-suites.d.ts.map +1 -0
  8. package/dist/cipher-suites.js +22 -0
  9. package/dist/edhoc.d.ts +85 -277
  10. package/dist/edhoc.d.ts.map +1 -1
  11. package/dist/edhoc.js +562 -34
  12. package/package.json +5 -19
  13. package/.gitmodules +0 -3
  14. package/binding.gyp +0 -66
  15. package/dist/bindings.d.ts +0 -5
  16. package/dist/bindings.d.ts.map +0 -1
  17. package/dist/bindings.js +0 -10
  18. package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_decode.h +0 -35
  19. package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_encode.h +0 -35
  20. package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_types.h +0 -34
  21. package/external/libedhoc/backends/cbor/include/backend_cbor_ead_decode.h +0 -35
  22. package/external/libedhoc/backends/cbor/include/backend_cbor_ead_encode.h +0 -35
  23. package/external/libedhoc/backends/cbor/include/backend_cbor_edhoc_types.h +0 -102
  24. package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_decode.h +0 -35
  25. package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_encode.h +0 -35
  26. package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_types.h +0 -37
  27. package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_decode.h +0 -35
  28. package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_encode.h +0 -35
  29. package/external/libedhoc/backends/cbor/include/backend_cbor_info_decode.h +0 -35
  30. package/external/libedhoc/backends/cbor/include/backend_cbor_info_encode.h +0 -35
  31. package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_decode.h +0 -35
  32. package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_encode.h +0 -35
  33. package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_types.h +0 -34
  34. package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_decode.h +0 -35
  35. package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_encode.h +0 -35
  36. package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_decode.h +0 -35
  37. package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_encode.h +0 -35
  38. package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_decode.h +0 -35
  39. package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_encode.h +0 -35
  40. package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_decode.h +0 -35
  41. package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_encode.h +0 -35
  42. package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_decode.h +0 -35
  43. package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_encode.h +0 -35
  44. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_decode.h +0 -35
  45. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_encode.h +0 -35
  46. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_decode.h +0 -35
  47. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_encode.h +0 -35
  48. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_decode.h +0 -35
  49. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_encode.h +0 -35
  50. package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_decode.h +0 -35
  51. package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_encode.h +0 -35
  52. package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_types.h +0 -38
  53. package/external/libedhoc/backends/cbor/include/backend_cbor_x509_types.h +0 -180
  54. package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_decode.c +0 -50
  55. package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_encode.c +0 -50
  56. package/external/libedhoc/backends/cbor/src/backend_cbor_ead_decode.c +0 -69
  57. package/external/libedhoc/backends/cbor/src/backend_cbor_ead_encode.c +0 -69
  58. package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_decode.c +0 -53
  59. package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_encode.c +0 -53
  60. package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_decode.c +0 -152
  61. package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_encode.c +0 -152
  62. package/external/libedhoc/backends/cbor/src/backend_cbor_info_decode.c +0 -52
  63. package/external/libedhoc/backends/cbor/src/backend_cbor_info_encode.c +0 -52
  64. package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_decode.c +0 -50
  65. package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_encode.c +0 -50
  66. package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_decode.c +0 -115
  67. package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_encode.c +0 -115
  68. package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_decode.c +0 -50
  69. package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_encode.c +0 -50
  70. package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_decode.c +0 -50
  71. package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_encode.c +0 -50
  72. package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_decode.c +0 -50
  73. package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_encode.c +0 -50
  74. package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_decode.c +0 -92
  75. package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_encode.c +0 -92
  76. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_decode.c +0 -216
  77. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_encode.c +0 -217
  78. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_decode.c +0 -212
  79. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_encode.c +0 -212
  80. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_decode.c +0 -87
  81. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_encode.c +0 -87
  82. package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_decode.c +0 -54
  83. package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_encode.c +0 -54
  84. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode.c +0 -31
  85. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode.h +0 -10
  86. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode2.c +0 -18
  87. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode2.h +0 -9
  88. package/external/libedhoc/externals/Unity/examples/example_1/test/TestProductionCode.c +0 -69
  89. package/external/libedhoc/externals/Unity/examples/example_1/test/TestProductionCode2.c +0 -38
  90. package/external/libedhoc/externals/Unity/examples/example_1/test/test_runners/TestProductionCode2_Runner.c +0 -53
  91. package/external/libedhoc/externals/Unity/examples/example_1/test/test_runners/TestProductionCode_Runner.c +0 -57
  92. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode.c +0 -31
  93. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode.h +0 -10
  94. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode2.c +0 -18
  95. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode2.h +0 -9
  96. package/external/libedhoc/externals/Unity/examples/example_2/test/TestProductionCode.c +0 -71
  97. package/external/libedhoc/externals/Unity/examples/example_2/test/TestProductionCode2.c +0 -40
  98. package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/TestProductionCode2_Runner.c +0 -16
  99. package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/TestProductionCode_Runner.c +0 -18
  100. package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/all_tests.c +0 -19
  101. package/external/libedhoc/externals/Unity/examples/example_3/helper/UnityHelper.c +0 -17
  102. package/external/libedhoc/externals/Unity/examples/example_3/helper/UnityHelper.h +0 -19
  103. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode.c +0 -31
  104. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode.h +0 -10
  105. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode2.c +0 -18
  106. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode2.h +0 -9
  107. package/external/libedhoc/externals/Unity/examples/example_3/test/TestProductionCode.c +0 -69
  108. package/external/libedhoc/externals/Unity/examples/example_3/test/TestProductionCode2.c +0 -38
  109. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode.c +0 -31
  110. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode.h +0 -10
  111. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode2.c +0 -18
  112. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode2.h +0 -9
  113. package/external/libedhoc/externals/Unity/examples/example_4/test/TestProductionCode.c +0 -70
  114. package/external/libedhoc/externals/Unity/examples/example_4/test/TestProductionCode2.c +0 -42
  115. package/external/libedhoc/externals/Unity/examples/example_4/test/test_runners/TestProductionCode2_Runner.c +0 -53
  116. package/external/libedhoc/externals/Unity/examples/example_4/test/test_runners/TestProductionCode_Runner.c +0 -57
  117. package/external/libedhoc/externals/Unity/examples/unity_config.h +0 -251
  118. package/external/libedhoc/externals/Unity/extras/bdd/src/unity_bdd.h +0 -44
  119. package/external/libedhoc/externals/Unity/extras/bdd/test/test_bdd.c +0 -129
  120. package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture.c +0 -310
  121. package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture.h +0 -95
  122. package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture_internals.h +0 -51
  123. package/external/libedhoc/externals/Unity/extras/fixture/test/main/AllTests.c +0 -20
  124. package/external/libedhoc/externals/Unity/extras/fixture/test/template_fixture_tests.c +0 -40
  125. package/external/libedhoc/externals/Unity/extras/fixture/test/unity_fixture_Test.c +0 -246
  126. package/external/libedhoc/externals/Unity/extras/fixture/test/unity_fixture_TestRunner.c +0 -33
  127. package/external/libedhoc/externals/Unity/extras/memory/src/unity_memory.c +0 -203
  128. package/external/libedhoc/externals/Unity/extras/memory/src/unity_memory.h +0 -61
  129. package/external/libedhoc/externals/Unity/extras/memory/test/unity_memory_Test.c +0 -326
  130. package/external/libedhoc/externals/Unity/extras/memory/test/unity_memory_TestRunner.c +0 -50
  131. package/external/libedhoc/externals/Unity/extras/memory/test/unity_output_Spy.c +0 -57
  132. package/external/libedhoc/externals/Unity/extras/memory/test/unity_output_Spy.h +0 -17
  133. package/external/libedhoc/externals/Unity/src/unity.c +0 -2501
  134. package/external/libedhoc/externals/Unity/src/unity.h +0 -698
  135. package/external/libedhoc/externals/Unity/src/unity_internals.h +0 -1183
  136. package/external/libedhoc/externals/Unity/test/expectdata/testsample_cmd.c +0 -61
  137. package/external/libedhoc/externals/Unity/test/expectdata/testsample_def.c +0 -57
  138. package/external/libedhoc/externals/Unity/test/expectdata/testsample_head1.c +0 -55
  139. package/external/libedhoc/externals/Unity/test/expectdata/testsample_head1.h +0 -15
  140. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_cmd.c +0 -80
  141. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_def.c +0 -76
  142. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_head1.c +0 -75
  143. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_head1.h +0 -13
  144. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_new1.c +0 -89
  145. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_new2.c +0 -89
  146. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_param.c +0 -77
  147. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_run1.c +0 -89
  148. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_run2.c +0 -89
  149. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_yaml.c +0 -90
  150. package/external/libedhoc/externals/Unity/test/expectdata/testsample_new1.c +0 -67
  151. package/external/libedhoc/externals/Unity/test/expectdata/testsample_new2.c +0 -70
  152. package/external/libedhoc/externals/Unity/test/expectdata/testsample_param.c +0 -58
  153. package/external/libedhoc/externals/Unity/test/expectdata/testsample_run1.c +0 -67
  154. package/external/libedhoc/externals/Unity/test/expectdata/testsample_run2.c +0 -70
  155. package/external/libedhoc/externals/Unity/test/expectdata/testsample_yaml.c +0 -71
  156. package/external/libedhoc/externals/Unity/test/testdata/CException.h +0 -18
  157. package/external/libedhoc/externals/Unity/test/testdata/Defs.h +0 -16
  158. package/external/libedhoc/externals/Unity/test/testdata/cmock.h +0 -21
  159. package/external/libedhoc/externals/Unity/test/testdata/mockMock.h +0 -20
  160. package/external/libedhoc/externals/Unity/test/testdata/testRunnerGenerator.c +0 -204
  161. package/external/libedhoc/externals/Unity/test/testdata/testRunnerGeneratorSmall.c +0 -73
  162. package/external/libedhoc/externals/Unity/test/testdata/testRunnerGeneratorWithMocks.c +0 -200
  163. package/external/libedhoc/externals/Unity/test/tests/self_assessment_utils.h +0 -151
  164. package/external/libedhoc/externals/Unity/test/tests/test_unity_arrays.c +0 -2941
  165. package/external/libedhoc/externals/Unity/test/tests/test_unity_core.c +0 -375
  166. package/external/libedhoc/externals/Unity/test/tests/test_unity_doubles.c +0 -1285
  167. package/external/libedhoc/externals/Unity/test/tests/test_unity_floats.c +0 -1395
  168. package/external/libedhoc/externals/Unity/test/tests/test_unity_integers.c +0 -2863
  169. package/external/libedhoc/externals/Unity/test/tests/test_unity_integers_64.c +0 -783
  170. package/external/libedhoc/externals/Unity/test/tests/test_unity_memory.c +0 -82
  171. package/external/libedhoc/externals/Unity/test/tests/test_unity_parameterized.c +0 -309
  172. package/external/libedhoc/externals/Unity/test/tests/test_unity_parameterizedDemo.c +0 -28
  173. package/external/libedhoc/externals/Unity/test/tests/test_unity_strings.c +0 -330
  174. package/external/libedhoc/externals/Unity/test/tests/types_for_test.h +0 -21
  175. package/external/libedhoc/externals/compact25519/src/c25519/c25519.c +0 -126
  176. package/external/libedhoc/externals/compact25519/src/c25519/c25519.h +0 -49
  177. package/external/libedhoc/externals/compact25519/src/c25519/ed25519.c +0 -323
  178. package/external/libedhoc/externals/compact25519/src/c25519/ed25519.h +0 -84
  179. package/external/libedhoc/externals/compact25519/src/c25519/edsign.c +0 -171
  180. package/external/libedhoc/externals/compact25519/src/c25519/edsign.h +0 -53
  181. package/external/libedhoc/externals/compact25519/src/c25519/f25519.c +0 -330
  182. package/external/libedhoc/externals/compact25519/src/c25519/f25519.h +0 -98
  183. package/external/libedhoc/externals/compact25519/src/c25519/fprime.c +0 -226
  184. package/external/libedhoc/externals/compact25519/src/c25519/fprime.h +0 -81
  185. package/external/libedhoc/externals/compact25519/src/c25519/sha512.c +0 -230
  186. package/external/libedhoc/externals/compact25519/src/c25519/sha512.h +0 -54
  187. package/external/libedhoc/externals/compact25519/src/compact_ed25519.c +0 -46
  188. package/external/libedhoc/externals/compact25519/src/compact_ed25519.h +0 -110
  189. package/external/libedhoc/externals/compact25519/src/compact_wipe.c +0 -12
  190. package/external/libedhoc/externals/compact25519/src/compact_wipe.h +0 -14
  191. package/external/libedhoc/externals/compact25519/src/compact_x25519.c +0 -68
  192. package/external/libedhoc/externals/compact25519/src/compact_x25519.h +0 -101
  193. package/external/libedhoc/externals/compact25519/test/pcg_random.h +0 -25
  194. package/external/libedhoc/externals/compact25519/test/run-all.c +0 -178
  195. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/Hacl_Curve25519.h +0 -21
  196. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/everest.h +0 -234
  197. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlib/FStar_UInt128.h +0 -124
  198. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlib/FStar_UInt64_FStar_UInt32_FStar_UInt16_FStar_UInt8.h +0 -280
  199. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlib.h +0 -29
  200. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/c_endianness.h +0 -204
  201. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/builtin.h +0 -16
  202. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/callconv.h +0 -46
  203. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/compat.h +0 -34
  204. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/debug.h +0 -57
  205. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/target.h +0 -102
  206. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/types.h +0 -61
  207. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/wasmsupport.h +0 -5
  208. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/vs2013/Hacl_Curve25519.h +0 -21
  209. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/vs2013/inttypes.h +0 -36
  210. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/vs2013/stdbool.h +0 -31
  211. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/x25519.h +0 -190
  212. package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/Hacl_Curve25519.c +0 -760
  213. package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/Hacl_Curve25519_joined.c +0 -50
  214. package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/everest.c +0 -102
  215. package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/kremlib/FStar_UInt128_extracted.c +0 -413
  216. package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/kremlib/FStar_UInt64_FStar_UInt32_FStar_UInt16_FStar_UInt8.c +0 -100
  217. package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/legacy/Hacl_Curve25519.c +0 -805
  218. package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/x25519.c +0 -186
  219. package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m/p256-m.c +0 -1514
  220. package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m/p256-m.h +0 -135
  221. package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m_driver_entrypoints.c +0 -312
  222. package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m_driver_entrypoints.h +0 -219
  223. package/external/libedhoc/externals/mbedtls/configs/config-ccm-psk-dtls1_2.h +0 -92
  224. package/external/libedhoc/externals/mbedtls/configs/config-ccm-psk-tls1_2.h +0 -83
  225. package/external/libedhoc/externals/mbedtls/configs/config-no-entropy.h +0 -73
  226. package/external/libedhoc/externals/mbedtls/configs/config-suite-b.h +0 -106
  227. package/external/libedhoc/externals/mbedtls/configs/config-symmetric-only.h +0 -77
  228. package/external/libedhoc/externals/mbedtls/configs/config-thread.h +0 -76
  229. package/external/libedhoc/externals/mbedtls/configs/crypto-config-ccm-aes-sha256.h +0 -25
  230. package/external/libedhoc/externals/mbedtls/configs/crypto_config_profile_medium.h +0 -136
  231. package/external/libedhoc/externals/mbedtls/configs/tfm_mbedcrypto_config_profile_medium.h +0 -609
  232. package/external/libedhoc/externals/mbedtls/doxygen/input/doc_encdec.h +0 -54
  233. package/external/libedhoc/externals/mbedtls/doxygen/input/doc_hashing.h +0 -30
  234. package/external/libedhoc/externals/mbedtls/doxygen/input/doc_mainpage.h +0 -19
  235. package/external/libedhoc/externals/mbedtls/doxygen/input/doc_rng.h +0 -27
  236. package/external/libedhoc/externals/mbedtls/doxygen/input/doc_ssltls.h +0 -37
  237. package/external/libedhoc/externals/mbedtls/doxygen/input/doc_tcpip.h +0 -32
  238. package/external/libedhoc/externals/mbedtls/doxygen/input/doc_x509.h +0 -31
  239. package/external/libedhoc/externals/mbedtls/include/mbedtls/aes.h +0 -627
  240. package/external/libedhoc/externals/mbedtls/include/mbedtls/aria.h +0 -341
  241. package/external/libedhoc/externals/mbedtls/include/mbedtls/asn1.h +0 -641
  242. package/external/libedhoc/externals/mbedtls/include/mbedtls/asn1write.h +0 -389
  243. package/external/libedhoc/externals/mbedtls/include/mbedtls/base64.h +0 -82
  244. package/external/libedhoc/externals/mbedtls/include/mbedtls/bignum.h +0 -1084
  245. package/external/libedhoc/externals/mbedtls/include/mbedtls/build_info.h +0 -146
  246. package/external/libedhoc/externals/mbedtls/include/mbedtls/camellia.h +0 -303
  247. package/external/libedhoc/externals/mbedtls/include/mbedtls/ccm.h +0 -518
  248. package/external/libedhoc/externals/mbedtls/include/mbedtls/chacha20.h +0 -202
  249. package/external/libedhoc/externals/mbedtls/include/mbedtls/chachapoly.h +0 -342
  250. package/external/libedhoc/externals/mbedtls/include/mbedtls/check_config.h +0 -1206
  251. package/external/libedhoc/externals/mbedtls/include/mbedtls/cipher.h +0 -1183
  252. package/external/libedhoc/externals/mbedtls/include/mbedtls/cmac.h +0 -246
  253. package/external/libedhoc/externals/mbedtls/include/mbedtls/compat-2.x.h +0 -46
  254. package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_legacy_crypto.h +0 -183
  255. package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_legacy_from_psa.h +0 -877
  256. package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_psa_from_legacy.h +0 -334
  257. package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_psa_superset_legacy.h +0 -142
  258. package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_ssl.h +0 -76
  259. package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_x509.h +0 -25
  260. package/external/libedhoc/externals/mbedtls/include/mbedtls/config_psa.h +0 -55
  261. package/external/libedhoc/externals/mbedtls/include/mbedtls/constant_time.h +0 -36
  262. package/external/libedhoc/externals/mbedtls/include/mbedtls/ctr_drbg.h +0 -564
  263. package/external/libedhoc/externals/mbedtls/include/mbedtls/debug.h +0 -308
  264. package/external/libedhoc/externals/mbedtls/include/mbedtls/des.h +0 -385
  265. package/external/libedhoc/externals/mbedtls/include/mbedtls/dhm.h +0 -972
  266. package/external/libedhoc/externals/mbedtls/include/mbedtls/ecdh.h +0 -441
  267. package/external/libedhoc/externals/mbedtls/include/mbedtls/ecdsa.h +0 -671
  268. package/external/libedhoc/externals/mbedtls/include/mbedtls/ecjpake.h +0 -298
  269. package/external/libedhoc/externals/mbedtls/include/mbedtls/ecp.h +0 -1362
  270. package/external/libedhoc/externals/mbedtls/include/mbedtls/entropy.h +0 -273
  271. package/external/libedhoc/externals/mbedtls/include/mbedtls/error.h +0 -201
  272. package/external/libedhoc/externals/mbedtls/include/mbedtls/gcm.h +0 -370
  273. package/external/libedhoc/externals/mbedtls/include/mbedtls/hkdf.h +0 -124
  274. package/external/libedhoc/externals/mbedtls/include/mbedtls/hmac_drbg.h +0 -434
  275. package/external/libedhoc/externals/mbedtls/include/mbedtls/lms.h +0 -440
  276. package/external/libedhoc/externals/mbedtls/include/mbedtls/mbedtls_config.h +0 -4116
  277. package/external/libedhoc/externals/mbedtls/include/mbedtls/md.h +0 -640
  278. package/external/libedhoc/externals/mbedtls/include/mbedtls/md5.h +0 -190
  279. package/external/libedhoc/externals/mbedtls/include/mbedtls/memory_buffer_alloc.h +0 -142
  280. package/external/libedhoc/externals/mbedtls/include/mbedtls/net_sockets.h +0 -299
  281. package/external/libedhoc/externals/mbedtls/include/mbedtls/nist_kw.h +0 -166
  282. package/external/libedhoc/externals/mbedtls/include/mbedtls/oid.h +0 -722
  283. package/external/libedhoc/externals/mbedtls/include/mbedtls/pem.h +0 -160
  284. package/external/libedhoc/externals/mbedtls/include/mbedtls/pk.h +0 -1091
  285. package/external/libedhoc/externals/mbedtls/include/mbedtls/pkcs12.h +0 -186
  286. package/external/libedhoc/externals/mbedtls/include/mbedtls/pkcs5.h +0 -197
  287. package/external/libedhoc/externals/mbedtls/include/mbedtls/pkcs7.h +0 -241
  288. package/external/libedhoc/externals/mbedtls/include/mbedtls/platform.h +0 -485
  289. package/external/libedhoc/externals/mbedtls/include/mbedtls/platform_time.h +0 -79
  290. package/external/libedhoc/externals/mbedtls/include/mbedtls/platform_util.h +0 -201
  291. package/external/libedhoc/externals/mbedtls/include/mbedtls/poly1305.h +0 -168
  292. package/external/libedhoc/externals/mbedtls/include/mbedtls/private_access.h +0 -20
  293. package/external/libedhoc/externals/mbedtls/include/mbedtls/psa_util.h +0 -104
  294. package/external/libedhoc/externals/mbedtls/include/mbedtls/ripemd160.h +0 -136
  295. package/external/libedhoc/externals/mbedtls/include/mbedtls/rsa.h +0 -1143
  296. package/external/libedhoc/externals/mbedtls/include/mbedtls/sha1.h +0 -219
  297. package/external/libedhoc/externals/mbedtls/include/mbedtls/sha256.h +0 -198
  298. package/external/libedhoc/externals/mbedtls/include/mbedtls/sha3.h +0 -172
  299. package/external/libedhoc/externals/mbedtls/include/mbedtls/sha512.h +0 -208
  300. package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl.h +0 -5369
  301. package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_cache.h +0 -187
  302. package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_ciphersuites.h +0 -616
  303. package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_cookie.h +0 -106
  304. package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_ticket.h +0 -181
  305. package/external/libedhoc/externals/mbedtls/include/mbedtls/threading.h +0 -105
  306. package/external/libedhoc/externals/mbedtls/include/mbedtls/timing.h +0 -94
  307. package/external/libedhoc/externals/mbedtls/include/mbedtls/version.h +0 -78
  308. package/external/libedhoc/externals/mbedtls/include/mbedtls/x509.h +0 -550
  309. package/external/libedhoc/externals/mbedtls/include/mbedtls/x509_crl.h +0 -184
  310. package/external/libedhoc/externals/mbedtls/include/mbedtls/x509_crt.h +0 -1196
  311. package/external/libedhoc/externals/mbedtls/include/mbedtls/x509_csr.h +0 -319
  312. package/external/libedhoc/externals/mbedtls/include/psa/build_info.h +0 -20
  313. package/external/libedhoc/externals/mbedtls/include/psa/crypto.h +0 -4685
  314. package/external/libedhoc/externals/mbedtls/include/psa/crypto_adjust_auto_enabled.h +0 -21
  315. package/external/libedhoc/externals/mbedtls/include/psa/crypto_adjust_config_key_pair_types.h +0 -91
  316. package/external/libedhoc/externals/mbedtls/include/psa/crypto_adjust_config_synonyms.h +0 -45
  317. package/external/libedhoc/externals/mbedtls/include/psa/crypto_builtin_composites.h +0 -210
  318. package/external/libedhoc/externals/mbedtls/include/psa/crypto_builtin_key_derivation.h +0 -118
  319. package/external/libedhoc/externals/mbedtls/include/psa/crypto_builtin_primitives.h +0 -114
  320. package/external/libedhoc/externals/mbedtls/include/psa/crypto_compat.h +0 -153
  321. package/external/libedhoc/externals/mbedtls/include/psa/crypto_config.h +0 -153
  322. package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_common.h +0 -44
  323. package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_contexts_composites.h +0 -151
  324. package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_contexts_key_derivation.h +0 -52
  325. package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_contexts_primitives.h +0 -105
  326. package/external/libedhoc/externals/mbedtls/include/psa/crypto_extra.h +0 -2064
  327. package/external/libedhoc/externals/mbedtls/include/psa/crypto_legacy.h +0 -88
  328. package/external/libedhoc/externals/mbedtls/include/psa/crypto_platform.h +0 -92
  329. package/external/libedhoc/externals/mbedtls/include/psa/crypto_se_driver.h +0 -1383
  330. package/external/libedhoc/externals/mbedtls/include/psa/crypto_sizes.h +0 -1282
  331. package/external/libedhoc/externals/mbedtls/include/psa/crypto_struct.h +0 -460
  332. package/external/libedhoc/externals/mbedtls/include/psa/crypto_types.h +0 -453
  333. package/external/libedhoc/externals/mbedtls/include/psa/crypto_values.h +0 -2756
  334. package/external/libedhoc/externals/mbedtls/library/aes.c +0 -2315
  335. package/external/libedhoc/externals/mbedtls/library/aesce.c +0 -503
  336. package/external/libedhoc/externals/mbedtls/library/aesce.h +0 -121
  337. package/external/libedhoc/externals/mbedtls/library/aesni.c +0 -802
  338. package/external/libedhoc/externals/mbedtls/library/aesni.h +0 -158
  339. package/external/libedhoc/externals/mbedtls/library/alignment.h +0 -509
  340. package/external/libedhoc/externals/mbedtls/library/aria.c +0 -991
  341. package/external/libedhoc/externals/mbedtls/library/asn1parse.c +0 -467
  342. package/external/libedhoc/externals/mbedtls/library/asn1write.c +0 -436
  343. package/external/libedhoc/externals/mbedtls/library/base64.c +0 -299
  344. package/external/libedhoc/externals/mbedtls/library/base64_internal.h +0 -45
  345. package/external/libedhoc/externals/mbedtls/library/bignum.c +0 -2806
  346. package/external/libedhoc/externals/mbedtls/library/bignum_core.c +0 -894
  347. package/external/libedhoc/externals/mbedtls/library/bignum_core.h +0 -763
  348. package/external/libedhoc/externals/mbedtls/library/bignum_mod.c +0 -394
  349. package/external/libedhoc/externals/mbedtls/library/bignum_mod.h +0 -452
  350. package/external/libedhoc/externals/mbedtls/library/bignum_mod_raw.c +0 -276
  351. package/external/libedhoc/externals/mbedtls/library/bignum_mod_raw.h +0 -416
  352. package/external/libedhoc/externals/mbedtls/library/bignum_mod_raw_invasive.h +0 -34
  353. package/external/libedhoc/externals/mbedtls/library/bn_mul.h +0 -1094
  354. package/external/libedhoc/externals/mbedtls/library/camellia.c +0 -1044
  355. package/external/libedhoc/externals/mbedtls/library/ccm.c +0 -712
  356. package/external/libedhoc/externals/mbedtls/library/chacha20.c +0 -497
  357. package/external/libedhoc/externals/mbedtls/library/chachapoly.c +0 -478
  358. package/external/libedhoc/externals/mbedtls/library/check_crypto_config.h +0 -141
  359. package/external/libedhoc/externals/mbedtls/library/cipher.c +0 -1664
  360. package/external/libedhoc/externals/mbedtls/library/cipher_wrap.c +0 -2422
  361. package/external/libedhoc/externals/mbedtls/library/cipher_wrap.h +0 -132
  362. package/external/libedhoc/externals/mbedtls/library/cmac.c +0 -1067
  363. package/external/libedhoc/externals/mbedtls/library/common.h +0 -325
  364. package/external/libedhoc/externals/mbedtls/library/constant_time.c +0 -261
  365. package/external/libedhoc/externals/mbedtls/library/constant_time_impl.h +0 -554
  366. package/external/libedhoc/externals/mbedtls/library/constant_time_internal.h +0 -579
  367. package/external/libedhoc/externals/mbedtls/library/ctr_drbg.c +0 -881
  368. package/external/libedhoc/externals/mbedtls/library/debug.c +0 -465
  369. package/external/libedhoc/externals/mbedtls/library/des.c +0 -1042
  370. package/external/libedhoc/externals/mbedtls/library/dhm.c +0 -712
  371. package/external/libedhoc/externals/mbedtls/library/ecdh.c +0 -685
  372. package/external/libedhoc/externals/mbedtls/library/ecdsa.c +0 -867
  373. package/external/libedhoc/externals/mbedtls/library/ecjpake.c +0 -1216
  374. package/external/libedhoc/externals/mbedtls/library/ecp.c +0 -3631
  375. package/external/libedhoc/externals/mbedtls/library/ecp_curves.c +0 -5467
  376. package/external/libedhoc/externals/mbedtls/library/ecp_curves_new.c +0 -6043
  377. package/external/libedhoc/externals/mbedtls/library/ecp_internal_alt.h +0 -287
  378. package/external/libedhoc/externals/mbedtls/library/ecp_invasive.h +0 -325
  379. package/external/libedhoc/externals/mbedtls/library/entropy.c +0 -676
  380. package/external/libedhoc/externals/mbedtls/library/entropy_poll.c +0 -229
  381. package/external/libedhoc/externals/mbedtls/library/entropy_poll.h +0 -64
  382. package/external/libedhoc/externals/mbedtls/library/error.c +0 -878
  383. package/external/libedhoc/externals/mbedtls/library/gcm.c +0 -1168
  384. package/external/libedhoc/externals/mbedtls/library/hkdf.c +0 -161
  385. package/external/libedhoc/externals/mbedtls/library/hmac_drbg.c +0 -633
  386. package/external/libedhoc/externals/mbedtls/library/lmots.c +0 -821
  387. package/external/libedhoc/externals/mbedtls/library/lmots.h +0 -311
  388. package/external/libedhoc/externals/mbedtls/library/lms.c +0 -779
  389. package/external/libedhoc/externals/mbedtls/library/md.c +0 -1108
  390. package/external/libedhoc/externals/mbedtls/library/md5.c +0 -426
  391. package/external/libedhoc/externals/mbedtls/library/md_psa.h +0 -63
  392. package/external/libedhoc/externals/mbedtls/library/md_wrap.h +0 -46
  393. package/external/libedhoc/externals/mbedtls/library/memory_buffer_alloc.c +0 -745
  394. package/external/libedhoc/externals/mbedtls/library/mps_common.h +0 -181
  395. package/external/libedhoc/externals/mbedtls/library/mps_error.h +0 -89
  396. package/external/libedhoc/externals/mbedtls/library/mps_reader.c +0 -538
  397. package/external/libedhoc/externals/mbedtls/library/mps_reader.h +0 -366
  398. package/external/libedhoc/externals/mbedtls/library/mps_trace.c +0 -112
  399. package/external/libedhoc/externals/mbedtls/library/mps_trace.h +0 -154
  400. package/external/libedhoc/externals/mbedtls/library/net_sockets.c +0 -696
  401. package/external/libedhoc/externals/mbedtls/library/nist_kw.c +0 -725
  402. package/external/libedhoc/externals/mbedtls/library/oid.c +0 -1154
  403. package/external/libedhoc/externals/mbedtls/library/padlock.c +0 -155
  404. package/external/libedhoc/externals/mbedtls/library/padlock.h +0 -111
  405. package/external/libedhoc/externals/mbedtls/library/pem.c +0 -520
  406. package/external/libedhoc/externals/mbedtls/library/pk.c +0 -970
  407. package/external/libedhoc/externals/mbedtls/library/pk_internal.h +0 -118
  408. package/external/libedhoc/externals/mbedtls/library/pk_wrap.c +0 -1834
  409. package/external/libedhoc/externals/mbedtls/library/pk_wrap.h +0 -156
  410. package/external/libedhoc/externals/mbedtls/library/pkcs12.c +0 -447
  411. package/external/libedhoc/externals/mbedtls/library/pkcs5.c +0 -496
  412. package/external/libedhoc/externals/mbedtls/library/pkcs7.c +0 -773
  413. package/external/libedhoc/externals/mbedtls/library/pkparse.c +0 -1845
  414. package/external/libedhoc/externals/mbedtls/library/pkwrite.c +0 -836
  415. package/external/libedhoc/externals/mbedtls/library/pkwrite.h +0 -112
  416. package/external/libedhoc/externals/mbedtls/library/platform.c +0 -402
  417. package/external/libedhoc/externals/mbedtls/library/platform_util.c +0 -285
  418. package/external/libedhoc/externals/mbedtls/library/poly1305.c +0 -492
  419. package/external/libedhoc/externals/mbedtls/library/psa_crypto.c +0 -8432
  420. package/external/libedhoc/externals/mbedtls/library/psa_crypto_aead.c +0 -653
  421. package/external/libedhoc/externals/mbedtls/library/psa_crypto_aead.h +0 -499
  422. package/external/libedhoc/externals/mbedtls/library/psa_crypto_cipher.c +0 -590
  423. package/external/libedhoc/externals/mbedtls/library/psa_crypto_cipher.h +0 -293
  424. package/external/libedhoc/externals/mbedtls/library/psa_crypto_client.c +0 -67
  425. package/external/libedhoc/externals/mbedtls/library/psa_crypto_core.h +0 -838
  426. package/external/libedhoc/externals/mbedtls/library/psa_crypto_core_common.h +0 -52
  427. package/external/libedhoc/externals/mbedtls/library/psa_crypto_driver_wrappers.h +0 -2871
  428. package/external/libedhoc/externals/mbedtls/library/psa_crypto_driver_wrappers_no_static.c +0 -256
  429. package/external/libedhoc/externals/mbedtls/library/psa_crypto_driver_wrappers_no_static.h +0 -31
  430. package/external/libedhoc/externals/mbedtls/library/psa_crypto_ecp.c +0 -561
  431. package/external/libedhoc/externals/mbedtls/library/psa_crypto_ecp.h +0 -267
  432. package/external/libedhoc/externals/mbedtls/library/psa_crypto_ffdh.c +0 -295
  433. package/external/libedhoc/externals/mbedtls/library/psa_crypto_ffdh.h +0 -132
  434. package/external/libedhoc/externals/mbedtls/library/psa_crypto_hash.c +0 -470
  435. package/external/libedhoc/externals/mbedtls/library/psa_crypto_hash.h +0 -211
  436. package/external/libedhoc/externals/mbedtls/library/psa_crypto_invasive.h +0 -70
  437. package/external/libedhoc/externals/mbedtls/library/psa_crypto_its.h +0 -131
  438. package/external/libedhoc/externals/mbedtls/library/psa_crypto_mac.c +0 -496
  439. package/external/libedhoc/externals/mbedtls/library/psa_crypto_mac.h +0 -264
  440. package/external/libedhoc/externals/mbedtls/library/psa_crypto_pake.c +0 -571
  441. package/external/libedhoc/externals/mbedtls/library/psa_crypto_pake.h +0 -159
  442. package/external/libedhoc/externals/mbedtls/library/psa_crypto_random_impl.h +0 -192
  443. package/external/libedhoc/externals/mbedtls/library/psa_crypto_rsa.c +0 -727
  444. package/external/libedhoc/externals/mbedtls/library/psa_crypto_rsa.h +0 -317
  445. package/external/libedhoc/externals/mbedtls/library/psa_crypto_se.c +0 -373
  446. package/external/libedhoc/externals/mbedtls/library/psa_crypto_se.h +0 -185
  447. package/external/libedhoc/externals/mbedtls/library/psa_crypto_slot_management.c +0 -559
  448. package/external/libedhoc/externals/mbedtls/library/psa_crypto_slot_management.h +0 -213
  449. package/external/libedhoc/externals/mbedtls/library/psa_crypto_storage.c +0 -481
  450. package/external/libedhoc/externals/mbedtls/library/psa_crypto_storage.h +0 -384
  451. package/external/libedhoc/externals/mbedtls/library/psa_its_file.c +0 -259
  452. package/external/libedhoc/externals/mbedtls/library/psa_util.c +0 -160
  453. package/external/libedhoc/externals/mbedtls/library/psa_util_internal.h +0 -96
  454. package/external/libedhoc/externals/mbedtls/library/ripemd160.c +0 -490
  455. package/external/libedhoc/externals/mbedtls/library/rsa.c +0 -2640
  456. package/external/libedhoc/externals/mbedtls/library/rsa_alt_helpers.c +0 -447
  457. package/external/libedhoc/externals/mbedtls/library/rsa_alt_helpers.h +0 -208
  458. package/external/libedhoc/externals/mbedtls/library/sha1.c +0 -480
  459. package/external/libedhoc/externals/mbedtls/library/sha256.c +0 -946
  460. package/external/libedhoc/externals/mbedtls/library/sha3.c +0 -626
  461. package/external/libedhoc/externals/mbedtls/library/sha512.c +0 -1111
  462. package/external/libedhoc/externals/mbedtls/library/ssl_cache.c +0 -410
  463. package/external/libedhoc/externals/mbedtls/library/ssl_ciphersuites.c +0 -2050
  464. package/external/libedhoc/externals/mbedtls/library/ssl_client.c +0 -1017
  465. package/external/libedhoc/externals/mbedtls/library/ssl_client.h +0 -22
  466. package/external/libedhoc/externals/mbedtls/library/ssl_cookie.c +0 -380
  467. package/external/libedhoc/externals/mbedtls/library/ssl_debug_helpers.h +0 -78
  468. package/external/libedhoc/externals/mbedtls/library/ssl_debug_helpers_generated.c +0 -234
  469. package/external/libedhoc/externals/mbedtls/library/ssl_misc.h +0 -2847
  470. package/external/libedhoc/externals/mbedtls/library/ssl_msg.c +0 -6155
  471. package/external/libedhoc/externals/mbedtls/library/ssl_ticket.c +0 -540
  472. package/external/libedhoc/externals/mbedtls/library/ssl_tls.c +0 -9577
  473. package/external/libedhoc/externals/mbedtls/library/ssl_tls12_client.c +0 -3607
  474. package/external/libedhoc/externals/mbedtls/library/ssl_tls12_server.c +0 -4403
  475. package/external/libedhoc/externals/mbedtls/library/ssl_tls13_client.c +0 -3046
  476. package/external/libedhoc/externals/mbedtls/library/ssl_tls13_generic.c +0 -1740
  477. package/external/libedhoc/externals/mbedtls/library/ssl_tls13_invasive.h +0 -23
  478. package/external/libedhoc/externals/mbedtls/library/ssl_tls13_keys.c +0 -1897
  479. package/external/libedhoc/externals/mbedtls/library/ssl_tls13_keys.h +0 -651
  480. package/external/libedhoc/externals/mbedtls/library/ssl_tls13_server.c +0 -3146
  481. package/external/libedhoc/externals/mbedtls/library/threading.c +0 -181
  482. package/external/libedhoc/externals/mbedtls/library/timing.c +0 -154
  483. package/external/libedhoc/externals/mbedtls/library/version.c +0 -32
  484. package/external/libedhoc/externals/mbedtls/library/version_features.c +0 -826
  485. package/external/libedhoc/externals/mbedtls/library/x509.c +0 -1776
  486. package/external/libedhoc/externals/mbedtls/library/x509_create.c +0 -557
  487. package/external/libedhoc/externals/mbedtls/library/x509_crl.c +0 -712
  488. package/external/libedhoc/externals/mbedtls/library/x509_crt.c +0 -3292
  489. package/external/libedhoc/externals/mbedtls/library/x509_csr.c +0 -574
  490. package/external/libedhoc/externals/mbedtls/library/x509write.c +0 -174
  491. package/external/libedhoc/externals/mbedtls/library/x509write_crt.c +0 -681
  492. package/external/libedhoc/externals/mbedtls/library/x509write_csr.c +0 -331
  493. package/external/libedhoc/externals/mbedtls/programs/aes/crypt_and_hash.c +0 -573
  494. package/external/libedhoc/externals/mbedtls/programs/cipher/cipher_aead_demo.c +0 -259
  495. package/external/libedhoc/externals/mbedtls/programs/fuzz/common.c +0 -105
  496. package/external/libedhoc/externals/mbedtls/programs/fuzz/common.h +0 -25
  497. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_client.c +0 -195
  498. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_dtlsclient.c +0 -138
  499. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_dtlsserver.c +0 -183
  500. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_pkcs7.c +0 -20
  501. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_privkey.c +0 -106
  502. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_pubkey.c +0 -86
  503. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_server.c +0 -218
  504. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_x509crl.c +0 -41
  505. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_x509crt.c +0 -41
  506. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_x509csr.c +0 -41
  507. package/external/libedhoc/externals/mbedtls/programs/fuzz/onefile.c +0 -69
  508. package/external/libedhoc/externals/mbedtls/programs/hash/generic_sum.c +0 -209
  509. package/external/libedhoc/externals/mbedtls/programs/hash/hello.c +0 -45
  510. package/external/libedhoc/externals/mbedtls/programs/hash/md_hmac_demo.c +0 -136
  511. package/external/libedhoc/externals/mbedtls/programs/pkey/dh_client.c +0 -274
  512. package/external/libedhoc/externals/mbedtls/programs/pkey/dh_genprime.c +0 -161
  513. package/external/libedhoc/externals/mbedtls/programs/pkey/dh_server.c +0 -296
  514. package/external/libedhoc/externals/mbedtls/programs/pkey/ecdh_curve25519.c +0 -189
  515. package/external/libedhoc/externals/mbedtls/programs/pkey/ecdsa.c +0 -217
  516. package/external/libedhoc/externals/mbedtls/programs/pkey/gen_key.c +0 -419
  517. package/external/libedhoc/externals/mbedtls/programs/pkey/key_app.c +0 -316
  518. package/external/libedhoc/externals/mbedtls/programs/pkey/key_app_writer.c +0 -435
  519. package/external/libedhoc/externals/mbedtls/programs/pkey/mpi_demo.c +0 -84
  520. package/external/libedhoc/externals/mbedtls/programs/pkey/pk_decrypt.c +0 -153
  521. package/external/libedhoc/externals/mbedtls/programs/pkey/pk_encrypt.c +0 -154
  522. package/external/libedhoc/externals/mbedtls/programs/pkey/pk_sign.c +0 -155
  523. package/external/libedhoc/externals/mbedtls/programs/pkey/pk_verify.c +0 -128
  524. package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_decrypt.c +0 -172
  525. package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_encrypt.c +0 -149
  526. package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_genkey.c +0 -141
  527. package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_sign.c +0 -155
  528. package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_sign_pss.c +0 -161
  529. package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_verify.c +0 -131
  530. package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_verify_pss.c +0 -136
  531. package/external/libedhoc/externals/mbedtls/programs/psa/aead_demo.c +0 -281
  532. package/external/libedhoc/externals/mbedtls/programs/psa/crypto_examples.c +0 -321
  533. package/external/libedhoc/externals/mbedtls/programs/psa/hmac_demo.c +0 -159
  534. package/external/libedhoc/externals/mbedtls/programs/psa/key_ladder_demo.c +0 -691
  535. package/external/libedhoc/externals/mbedtls/programs/psa/psa_constant_names.c +0 -310
  536. package/external/libedhoc/externals/mbedtls/programs/psa/psa_constant_names_generated.c +0 -474
  537. package/external/libedhoc/externals/mbedtls/programs/random/gen_entropy.c +0 -75
  538. package/external/libedhoc/externals/mbedtls/programs/random/gen_random_ctr_drbg.c +0 -107
  539. package/external/libedhoc/externals/mbedtls/programs/ssl/dtls_client.c +0 -342
  540. package/external/libedhoc/externals/mbedtls/programs/ssl/dtls_server.c +0 -408
  541. package/external/libedhoc/externals/mbedtls/programs/ssl/mini_client.c +0 -274
  542. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_client1.c +0 -288
  543. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_client2.c +0 -3118
  544. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_context_info.c +0 -1009
  545. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_fork_server.c +0 -381
  546. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_mail_client.c +0 -804
  547. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_pthread_server.c +0 -489
  548. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_server.c +0 -362
  549. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_server2.c +0 -4268
  550. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_test_common_source.c +0 -375
  551. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_test_lib.c +0 -601
  552. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_test_lib.h +0 -306
  553. package/external/libedhoc/externals/mbedtls/programs/test/benchmark.c +0 -1284
  554. package/external/libedhoc/externals/mbedtls/programs/test/cmake_package/cmake_package.c +0 -27
  555. package/external/libedhoc/externals/mbedtls/programs/test/cmake_package_install/cmake_package_install.c +0 -28
  556. package/external/libedhoc/externals/mbedtls/programs/test/cmake_subproject/cmake_subproject.c +0 -28
  557. package/external/libedhoc/externals/mbedtls/programs/test/dlopen.c +0 -92
  558. package/external/libedhoc/externals/mbedtls/programs/test/query_compile_time_config.c +0 -66
  559. package/external/libedhoc/externals/mbedtls/programs/test/query_config.c +0 -5137
  560. package/external/libedhoc/externals/mbedtls/programs/test/query_config.h +0 -34
  561. package/external/libedhoc/externals/mbedtls/programs/test/query_included_headers.c +0 -29
  562. package/external/libedhoc/externals/mbedtls/programs/test/selftest.c +0 -583
  563. package/external/libedhoc/externals/mbedtls/programs/test/udp_proxy.c +0 -967
  564. package/external/libedhoc/externals/mbedtls/programs/test/zeroize.c +0 -72
  565. package/external/libedhoc/externals/mbedtls/programs/util/pem2der.c +0 -265
  566. package/external/libedhoc/externals/mbedtls/programs/util/strerror.c +0 -61
  567. package/external/libedhoc/externals/mbedtls/programs/wince_main.c +0 -31
  568. package/external/libedhoc/externals/mbedtls/programs/x509/cert_app.c +0 -456
  569. package/external/libedhoc/externals/mbedtls/programs/x509/cert_req.c +0 -509
  570. package/external/libedhoc/externals/mbedtls/programs/x509/cert_write.c +0 -1012
  571. package/external/libedhoc/externals/mbedtls/programs/x509/crl_app.c +0 -132
  572. package/external/libedhoc/externals/mbedtls/programs/x509/load_roots.c +0 -165
  573. package/external/libedhoc/externals/mbedtls/programs/x509/req_app.c +0 -132
  574. package/external/libedhoc/externals/mbedtls/tests/configs/tls13-only.h +0 -31
  575. package/external/libedhoc/externals/mbedtls/tests/configs/user-config-for-test.h +0 -89
  576. package/external/libedhoc/externals/mbedtls/tests/configs/user-config-malloc-0-null.h +0 -22
  577. package/external/libedhoc/externals/mbedtls/tests/configs/user-config-zeroize-memset.h +0 -17
  578. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/aes_alt.h +0 -23
  579. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/aria_alt.h +0 -16
  580. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/camellia_alt.h +0 -16
  581. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ccm_alt.h +0 -16
  582. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/chacha20_alt.h +0 -16
  583. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/chachapoly_alt.h +0 -18
  584. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/cmac_alt.h +0 -15
  585. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/des_alt.h +0 -22
  586. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/dhm_alt.h +0 -16
  587. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ecjpake_alt.h +0 -15
  588. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ecp_alt.h +0 -22
  589. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/gcm_alt.h +0 -16
  590. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/md5_alt.h +0 -16
  591. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/nist_kw_alt.h +0 -15
  592. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/platform_alt.h +0 -16
  593. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/poly1305_alt.h +0 -16
  594. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ripemd160_alt.h +0 -16
  595. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/rsa_alt.h +0 -16
  596. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/sha1_alt.h +0 -16
  597. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/sha256_alt.h +0 -16
  598. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/sha512_alt.h +0 -16
  599. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/threading_alt.h +0 -14
  600. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/timing_alt.h +0 -19
  601. package/external/libedhoc/externals/mbedtls/tests/include/alt-extra/psa/crypto.h +0 -7
  602. package/external/libedhoc/externals/mbedtls/tests/include/baremetal-override/time.h +0 -6
  603. package/external/libedhoc/externals/mbedtls/tests/include/spe/crypto_spe.h +0 -131
  604. package/external/libedhoc/externals/mbedtls/tests/include/test/arguments.h +0 -26
  605. package/external/libedhoc/externals/mbedtls/tests/include/test/asn1_helpers.h +0 -38
  606. package/external/libedhoc/externals/mbedtls/tests/include/test/bignum_helpers.h +0 -106
  607. package/external/libedhoc/externals/mbedtls/tests/include/test/certs.h +0 -234
  608. package/external/libedhoc/externals/mbedtls/tests/include/test/constant_flow.h +0 -71
  609. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/aead.h +0 -121
  610. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/asymmetric_encryption.h +0 -67
  611. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/cipher.h +0 -130
  612. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/config_test_driver.h +0 -44
  613. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/crypto_config_test_driver_extension.h +0 -430
  614. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/hash.h +0 -64
  615. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/key_agreement.h +0 -62
  616. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/key_management.h +0 -123
  617. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/mac.h +0 -125
  618. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/pake.h +0 -75
  619. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/signature.h +0 -112
  620. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/test_driver.h +0 -32
  621. package/external/libedhoc/externals/mbedtls/tests/include/test/fake_external_rng_for_test.h +0 -40
  622. package/external/libedhoc/externals/mbedtls/tests/include/test/helpers.h +0 -268
  623. package/external/libedhoc/externals/mbedtls/tests/include/test/macros.h +0 -250
  624. package/external/libedhoc/externals/mbedtls/tests/include/test/psa_crypto_helpers.h +0 -398
  625. package/external/libedhoc/externals/mbedtls/tests/include/test/psa_exercise_key.h +0 -223
  626. package/external/libedhoc/externals/mbedtls/tests/include/test/psa_helpers.h +0 -24
  627. package/external/libedhoc/externals/mbedtls/tests/include/test/random.h +0 -91
  628. package/external/libedhoc/externals/mbedtls/tests/include/test/ssl_helpers.h +0 -628
  629. package/external/libedhoc/externals/mbedtls/tests/src/asn1_helpers.c +0 -62
  630. package/external/libedhoc/externals/mbedtls/tests/src/bignum_helpers.c +0 -145
  631. package/external/libedhoc/externals/mbedtls/tests/src/certs.c +0 -480
  632. package/external/libedhoc/externals/mbedtls/tests/src/drivers/hash.c +0 -199
  633. package/external/libedhoc/externals/mbedtls/tests/src/drivers/platform_builtin_keys.c +0 -78
  634. package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_aead.c +0 -462
  635. package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_asymmetric_encryption.c +0 -151
  636. package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_cipher.c +0 -424
  637. package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_key_agreement.c +0 -147
  638. package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_key_management.c +0 -783
  639. package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_mac.c +0 -422
  640. package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_pake.c +0 -202
  641. package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_signature.c +0 -405
  642. package/external/libedhoc/externals/mbedtls/tests/src/fake_external_rng_for_test.c +0 -45
  643. package/external/libedhoc/externals/mbedtls/tests/src/helpers.c +0 -353
  644. package/external/libedhoc/externals/mbedtls/tests/src/psa_crypto_helpers.c +0 -196
  645. package/external/libedhoc/externals/mbedtls/tests/src/psa_exercise_key.c +0 -989
  646. package/external/libedhoc/externals/mbedtls/tests/src/random.c +0 -136
  647. package/external/libedhoc/externals/mbedtls/tests/src/test_certs.h +0 -1226
  648. package/external/libedhoc/externals/mbedtls/tests/src/test_helpers/ssl_helpers.c +0 -2292
  649. package/external/libedhoc/externals/mbedtls/tests/src/threading_helpers.c +0 -210
  650. package/external/libedhoc/externals/zcbor/include/zcbor_common.h +0 -509
  651. package/external/libedhoc/externals/zcbor/include/zcbor_decode.h +0 -447
  652. package/external/libedhoc/externals/zcbor/include/zcbor_encode.h +0 -240
  653. package/external/libedhoc/externals/zcbor/include/zcbor_print.h +0 -165
  654. package/external/libedhoc/externals/zcbor/include/zcbor_tags.h +0 -94
  655. package/external/libedhoc/externals/zcbor/samples/hello_world/src/main.c +0 -41
  656. package/external/libedhoc/externals/zcbor/samples/pet/include/pet_decode.h +0 -39
  657. package/external/libedhoc/externals/zcbor/samples/pet/include/pet_encode.h +0 -39
  658. package/external/libedhoc/externals/zcbor/samples/pet/include/pet_types.h +0 -47
  659. package/external/libedhoc/externals/zcbor/samples/pet/src/main.c +0 -128
  660. package/external/libedhoc/externals/zcbor/samples/pet/src/pet_decode.c +0 -60
  661. package/external/libedhoc/externals/zcbor/samples/pet/src/pet_encode.c +0 -61
  662. package/external/libedhoc/externals/zcbor/src/zcbor_common.c +0 -430
  663. package/external/libedhoc/externals/zcbor/src/zcbor_decode.c +0 -1567
  664. package/external/libedhoc/externals/zcbor/src/zcbor_encode.c +0 -609
  665. package/external/libedhoc/externals/zcbor/tests/decode/test1_suit_old_formats/src/main.c +0 -367
  666. package/external/libedhoc/externals/zcbor/tests/decode/test2_suit/src/main.c +0 -189
  667. package/external/libedhoc/externals/zcbor/tests/decode/test3_simple/src/main.c +0 -528
  668. package/external/libedhoc/externals/zcbor/tests/decode/test5_corner_cases/src/main.c +0 -2154
  669. package/external/libedhoc/externals/zcbor/tests/decode/test7_suit9_simple/src/main.c +0 -134
  670. package/external/libedhoc/externals/zcbor/tests/decode/test8_suit12/src/main.c +0 -862
  671. package/external/libedhoc/externals/zcbor/tests/decode/test9_manifest14/src/main.c +0 -363
  672. package/external/libedhoc/externals/zcbor/tests/encode/test1_suit/src/main.c +0 -453
  673. package/external/libedhoc/externals/zcbor/tests/encode/test2_simple/src/main.c +0 -122
  674. package/external/libedhoc/externals/zcbor/tests/encode/test3_corner_cases/src/main.c +0 -1554
  675. package/external/libedhoc/externals/zcbor/tests/encode/test4_senml/src/main.c +0 -65
  676. package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_everything.c +0 -12
  677. package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_manifest12.c +0 -136
  678. package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_pet.c +0 -12
  679. package/external/libedhoc/externals/zcbor/tests/fuzz/main_entry.c +0 -60
  680. package/external/libedhoc/externals/zcbor/tests/fuzz/main_entry.h +0 -5
  681. package/external/libedhoc/externals/zcbor/tests/unit/test1_unit_tests/src/main.c +0 -1437
  682. package/external/libedhoc/externals/zcbor/tests/unit/test3_float16/src/main.c +0 -203
  683. package/external/libedhoc/include/edhoc.h +0 -687
  684. package/external/libedhoc/include/edhoc_common.h +0 -289
  685. package/external/libedhoc/include/edhoc_context.h +0 -343
  686. package/external/libedhoc/include/edhoc_credentials.h +0 -265
  687. package/external/libedhoc/include/edhoc_crypto.h +0 -331
  688. package/external/libedhoc/include/edhoc_ead.h +0 -102
  689. package/external/libedhoc/include/edhoc_macros.h +0 -60
  690. package/external/libedhoc/include/edhoc_values.h +0 -181
  691. package/external/libedhoc/library/edhoc.c +0 -253
  692. package/external/libedhoc/library/edhoc_common.c +0 -1314
  693. package/external/libedhoc/library/edhoc_exporter.c +0 -542
  694. package/external/libedhoc/library/edhoc_message_1.c +0 -474
  695. package/external/libedhoc/library/edhoc_message_2.c +0 -1697
  696. package/external/libedhoc/library/edhoc_message_3.c +0 -1467
  697. package/external/libedhoc/library/edhoc_message_4.c +0 -828
  698. package/external/libedhoc/library/edhoc_message_error.c +0 -238
  699. package/external/libedhoc/tests/include/cipher_suite_0.h +0 -131
  700. package/external/libedhoc/tests/include/cipher_suite_2.h +0 -139
  701. package/external/libedhoc/tests/include/test_vector_rfc9529_chapter_2.h +0 -786
  702. package/external/libedhoc/tests/include/test_vector_rfc9529_chapter_3.h +0 -529
  703. package/external/libedhoc/tests/include/test_vector_x5chain_sign_keys_suite_0.h +0 -137
  704. package/external/libedhoc/tests/include/test_vector_x5chain_sign_keys_suite_2.h +0 -168
  705. package/external/libedhoc/tests/include/test_vector_x5chain_static_dh_keys_suite_2.h +0 -162
  706. package/external/libedhoc/tests/include/test_vector_x5t_sign_keys_suite_2.h +0 -180
  707. package/external/libedhoc/tests/src/cipher_suite_0.c +0 -445
  708. package/external/libedhoc/tests/src/cipher_suite_2.c +0 -600
  709. package/external/libedhoc/tests/src/module_test_api.c +0 -430
  710. package/external/libedhoc/tests/src/module_test_cipher_suite_0.c +0 -395
  711. package/external/libedhoc/tests/src/module_test_cipher_suite_2.c +0 -392
  712. package/external/libedhoc/tests/src/module_test_error_message.c +0 -251
  713. package/external/libedhoc/tests/src/module_test_main.c +0 -49
  714. package/external/libedhoc/tests/src/module_test_rfc9528_suites_negotiation.c +0 -541
  715. package/external/libedhoc/tests/src/module_test_rfc9529_chapter_2.c +0 -2681
  716. package/external/libedhoc/tests/src/module_test_rfc9529_chapter_3.c +0 -1635
  717. package/external/libedhoc/tests/src/module_test_x5chain_sign_keys_suite_0.c +0 -1135
  718. package/external/libedhoc/tests/src/module_test_x5chain_sign_keys_suite_2.c +0 -1249
  719. package/external/libedhoc/tests/src/module_test_x5chain_static_dh_keys_suite_2.c +0 -798
  720. package/external/libedhoc/tests/src/module_test_x5t_sign_keys_suite_2.c +0 -956
  721. package/include/Binding.h +0 -348
  722. package/include/EdhocComposeAsyncWorker.h +0 -49
  723. package/include/EdhocCredentialManager.h +0 -89
  724. package/include/EdhocCryptoManager.h +0 -495
  725. package/include/EdhocEadManager.h +0 -147
  726. package/include/EdhocExportOscoreAsyncWorker.h +0 -57
  727. package/include/EdhocKeyExporterAsyncWorker.h +0 -56
  728. package/include/EdhocKeyUpdateAsyncWorker.h +0 -55
  729. package/include/EdhocProcessAsyncWorker.h +0 -55
  730. package/include/RunningContext.h +0 -102
  731. package/include/Suites.h +0 -27
  732. package/include/Utils.h +0 -71
  733. package/patches/prebuildify-cross+5.1.0.dev.patch +0 -26
  734. package/patches/prebuildify-cross+5.1.1.dev.patch +0 -26
  735. package/prebuilds/android-arm/edhoc.armv7.node +0 -0
  736. package/prebuilds/android-arm64/edhoc.armv8.node +0 -0
  737. package/prebuilds/darwin-arm64/edhoc.node +0 -0
  738. package/prebuilds/darwin-x64/edhoc.node +0 -0
  739. package/prebuilds/linux-arm/edhoc.armv6.node +0 -0
  740. package/prebuilds/linux-arm/edhoc.armv7.node +0 -0
  741. package/prebuilds/linux-arm64/edhoc.armv8.node +0 -0
  742. package/prebuilds/linux-x64/edhoc.glibc.node +0 -0
  743. package/prebuilds/linux-x64/edhoc.musl.node +0 -0
  744. package/prebuilds/win32-ia32/edhoc.node +0 -0
  745. package/prebuilds/win32-x64/edhoc.node +0 -0
  746. package/src/Binding.cpp +0 -434
  747. package/src/EdhocComposeAsyncWorker.cpp +0 -60
  748. package/src/EdhocCredentialManager.cpp +0 -314
  749. package/src/EdhocCryptoManager.cpp +0 -593
  750. package/src/EdhocEadManager.cpp +0 -148
  751. package/src/EdhocExportOscoreAsyncWorker.cpp +0 -67
  752. package/src/EdhocKeyExporterAsyncWorker.cpp +0 -39
  753. package/src/EdhocKeyUpdateAsyncWorker.cpp +0 -31
  754. package/src/EdhocProcessAsyncWorker.cpp +0 -120
  755. package/src/RunningContext.cpp +0 -95
  756. package/src/Suites.cpp +0 -120
  757. package/src/Utils.cpp +0 -54
  758. package/test/basic.test.ts +0 -118
  759. package/test/vectors.test.ts +0 -111
@@ -1,2756 +0,0 @@
1
- /**
2
- * \file psa/crypto_values.h
3
- *
4
- * \brief PSA cryptography module: macros to build and analyze integer values.
5
- *
6
- * \note This file may not be included directly. Applications must
7
- * include psa/crypto.h. Drivers must include the appropriate driver
8
- * header file.
9
- *
10
- * This file contains portable definitions of macros to build and analyze
11
- * values of integral types that encode properties of cryptographic keys,
12
- * designations of cryptographic algorithms, and error codes returned by
13
- * the library.
14
- *
15
- * Note that many of the constants defined in this file are embedded in
16
- * the persistent key store, as part of key metadata (including usage
17
- * policies). As a consequence, they must not be changed (unless the storage
18
- * format version changes).
19
- *
20
- * This header file only defines preprocessor macros.
21
- */
22
- /*
23
- * Copyright The Mbed TLS Contributors
24
- * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
25
- */
26
-
27
- #ifndef PSA_CRYPTO_VALUES_H
28
- #define PSA_CRYPTO_VALUES_H
29
- #include "mbedtls/private_access.h"
30
-
31
- /** \defgroup error Error codes
32
- * @{
33
- */
34
-
35
- /* PSA error codes */
36
-
37
- /* Error codes are standardized across PSA domains (framework, crypto, storage,
38
- * etc.). Do not change the values in this section or even the expansions
39
- * of each macro: it must be possible to `#include` both this header
40
- * and some other PSA component's headers in the same C source,
41
- * which will lead to duplicate definitions of the `PSA_SUCCESS` and
42
- * `PSA_ERROR_xxx` macros, which is ok if and only if the macros expand
43
- * to the same sequence of tokens.
44
- *
45
- * If you must add a new
46
- * value, check with the Arm PSA framework group to pick one that other
47
- * domains aren't already using. */
48
-
49
- /* Tell uncrustify not to touch the constant definitions, otherwise
50
- * it might change the spacing to something that is not PSA-compliant
51
- * (e.g. adding a space after casts).
52
- *
53
- * *INDENT-OFF*
54
- */
55
-
56
- /** The action was completed successfully. */
57
- #define PSA_SUCCESS ((psa_status_t)0)
58
-
59
- /** An error occurred that does not correspond to any defined
60
- * failure cause.
61
- *
62
- * Implementations may use this error code if none of the other standard
63
- * error codes are applicable. */
64
- #define PSA_ERROR_GENERIC_ERROR ((psa_status_t)-132)
65
-
66
- /** The requested operation or a parameter is not supported
67
- * by this implementation.
68
- *
69
- * Implementations should return this error code when an enumeration
70
- * parameter such as a key type, algorithm, etc. is not recognized.
71
- * If a combination of parameters is recognized and identified as
72
- * not valid, return #PSA_ERROR_INVALID_ARGUMENT instead. */
73
- #define PSA_ERROR_NOT_SUPPORTED ((psa_status_t)-134)
74
-
75
- /** The requested action is denied by a policy.
76
- *
77
- * Implementations should return this error code when the parameters
78
- * are recognized as valid and supported, and a policy explicitly
79
- * denies the requested operation.
80
- *
81
- * If a subset of the parameters of a function call identify a
82
- * forbidden operation, and another subset of the parameters are
83
- * not valid or not supported, it is unspecified whether the function
84
- * returns #PSA_ERROR_NOT_PERMITTED, #PSA_ERROR_NOT_SUPPORTED or
85
- * #PSA_ERROR_INVALID_ARGUMENT. */
86
- #define PSA_ERROR_NOT_PERMITTED ((psa_status_t)-133)
87
-
88
- /** An output buffer is too small.
89
- *
90
- * Applications can call the \c PSA_xxx_SIZE macro listed in the function
91
- * description to determine a sufficient buffer size.
92
- *
93
- * Implementations should preferably return this error code only
94
- * in cases when performing the operation with a larger output
95
- * buffer would succeed. However implementations may return this
96
- * error if a function has invalid or unsupported parameters in addition
97
- * to the parameters that determine the necessary output buffer size. */
98
- #define PSA_ERROR_BUFFER_TOO_SMALL ((psa_status_t)-138)
99
-
100
- /** Asking for an item that already exists
101
- *
102
- * Implementations should return this error, when attempting
103
- * to write an item (like a key) that already exists. */
104
- #define PSA_ERROR_ALREADY_EXISTS ((psa_status_t)-139)
105
-
106
- /** Asking for an item that doesn't exist
107
- *
108
- * Implementations should return this error, if a requested item (like
109
- * a key) does not exist. */
110
- #define PSA_ERROR_DOES_NOT_EXIST ((psa_status_t)-140)
111
-
112
- /** The requested action cannot be performed in the current state.
113
- *
114
- * Multipart operations return this error when one of the
115
- * functions is called out of sequence. Refer to the function
116
- * descriptions for permitted sequencing of functions.
117
- *
118
- * Implementations shall not return this error code to indicate
119
- * that a key either exists or not,
120
- * but shall instead return #PSA_ERROR_ALREADY_EXISTS or #PSA_ERROR_DOES_NOT_EXIST
121
- * as applicable.
122
- *
123
- * Implementations shall not return this error code to indicate that a
124
- * key identifier is invalid, but shall return #PSA_ERROR_INVALID_HANDLE
125
- * instead. */
126
- #define PSA_ERROR_BAD_STATE ((psa_status_t)-137)
127
-
128
- /** The parameters passed to the function are invalid.
129
- *
130
- * Implementations may return this error any time a parameter or
131
- * combination of parameters are recognized as invalid.
132
- *
133
- * Implementations shall not return this error code to indicate that a
134
- * key identifier is invalid, but shall return #PSA_ERROR_INVALID_HANDLE
135
- * instead.
136
- */
137
- #define PSA_ERROR_INVALID_ARGUMENT ((psa_status_t)-135)
138
-
139
- /** There is not enough runtime memory.
140
- *
141
- * If the action is carried out across multiple security realms, this
142
- * error can refer to available memory in any of the security realms. */
143
- #define PSA_ERROR_INSUFFICIENT_MEMORY ((psa_status_t)-141)
144
-
145
- /** There is not enough persistent storage.
146
- *
147
- * Functions that modify the key storage return this error code if
148
- * there is insufficient storage space on the host media. In addition,
149
- * many functions that do not otherwise access storage may return this
150
- * error code if the implementation requires a mandatory log entry for
151
- * the requested action and the log storage space is full. */
152
- #define PSA_ERROR_INSUFFICIENT_STORAGE ((psa_status_t)-142)
153
-
154
- /** There was a communication failure inside the implementation.
155
- *
156
- * This can indicate a communication failure between the application
157
- * and an external cryptoprocessor or between the cryptoprocessor and
158
- * an external volatile or persistent memory. A communication failure
159
- * may be transient or permanent depending on the cause.
160
- *
161
- * \warning If a function returns this error, it is undetermined
162
- * whether the requested action has completed or not. Implementations
163
- * should return #PSA_SUCCESS on successful completion whenever
164
- * possible, however functions may return #PSA_ERROR_COMMUNICATION_FAILURE
165
- * if the requested action was completed successfully in an external
166
- * cryptoprocessor but there was a breakdown of communication before
167
- * the cryptoprocessor could report the status to the application.
168
- */
169
- #define PSA_ERROR_COMMUNICATION_FAILURE ((psa_status_t)-145)
170
-
171
- /** There was a storage failure that may have led to data loss.
172
- *
173
- * This error indicates that some persistent storage is corrupted.
174
- * It should not be used for a corruption of volatile memory
175
- * (use #PSA_ERROR_CORRUPTION_DETECTED), for a communication error
176
- * between the cryptoprocessor and its external storage (use
177
- * #PSA_ERROR_COMMUNICATION_FAILURE), or when the storage is
178
- * in a valid state but is full (use #PSA_ERROR_INSUFFICIENT_STORAGE).
179
- *
180
- * Note that a storage failure does not indicate that any data that was
181
- * previously read is invalid. However this previously read data may no
182
- * longer be readable from storage.
183
- *
184
- * When a storage failure occurs, it is no longer possible to ensure
185
- * the global integrity of the keystore. Depending on the global
186
- * integrity guarantees offered by the implementation, access to other
187
- * data may or may not fail even if the data is still readable but
188
- * its integrity cannot be guaranteed.
189
- *
190
- * Implementations should only use this error code to report a
191
- * permanent storage corruption. However application writers should
192
- * keep in mind that transient errors while reading the storage may be
193
- * reported using this error code. */
194
- #define PSA_ERROR_STORAGE_FAILURE ((psa_status_t)-146)
195
-
196
- /** A hardware failure was detected.
197
- *
198
- * A hardware failure may be transient or permanent depending on the
199
- * cause. */
200
- #define PSA_ERROR_HARDWARE_FAILURE ((psa_status_t)-147)
201
-
202
- /** A tampering attempt was detected.
203
- *
204
- * If an application receives this error code, there is no guarantee
205
- * that previously accessed or computed data was correct and remains
206
- * confidential. Applications should not perform any security function
207
- * and should enter a safe failure state.
208
- *
209
- * Implementations may return this error code if they detect an invalid
210
- * state that cannot happen during normal operation and that indicates
211
- * that the implementation's security guarantees no longer hold. Depending
212
- * on the implementation architecture and on its security and safety goals,
213
- * the implementation may forcibly terminate the application.
214
- *
215
- * This error code is intended as a last resort when a security breach
216
- * is detected and it is unsure whether the keystore data is still
217
- * protected. Implementations shall only return this error code
218
- * to report an alarm from a tampering detector, to indicate that
219
- * the confidentiality of stored data can no longer be guaranteed,
220
- * or to indicate that the integrity of previously returned data is now
221
- * considered compromised. Implementations shall not use this error code
222
- * to indicate a hardware failure that merely makes it impossible to
223
- * perform the requested operation (use #PSA_ERROR_COMMUNICATION_FAILURE,
224
- * #PSA_ERROR_STORAGE_FAILURE, #PSA_ERROR_HARDWARE_FAILURE,
225
- * #PSA_ERROR_INSUFFICIENT_ENTROPY or other applicable error code
226
- * instead).
227
- *
228
- * This error indicates an attack against the application. Implementations
229
- * shall not return this error code as a consequence of the behavior of
230
- * the application itself. */
231
- #define PSA_ERROR_CORRUPTION_DETECTED ((psa_status_t)-151)
232
-
233
- /** There is not enough entropy to generate random data needed
234
- * for the requested action.
235
- *
236
- * This error indicates a failure of a hardware random generator.
237
- * Application writers should note that this error can be returned not
238
- * only by functions whose purpose is to generate random data, such
239
- * as key, IV or nonce generation, but also by functions that execute
240
- * an algorithm with a randomized result, as well as functions that
241
- * use randomization of intermediate computations as a countermeasure
242
- * to certain attacks.
243
- *
244
- * Implementations should avoid returning this error after psa_crypto_init()
245
- * has succeeded. Implementations should generate sufficient
246
- * entropy during initialization and subsequently use a cryptographically
247
- * secure pseudorandom generator (PRNG). However implementations may return
248
- * this error at any time if a policy requires the PRNG to be reseeded
249
- * during normal operation. */
250
- #define PSA_ERROR_INSUFFICIENT_ENTROPY ((psa_status_t)-148)
251
-
252
- /** The signature, MAC or hash is incorrect.
253
- *
254
- * Verification functions return this error if the verification
255
- * calculations completed successfully, and the value to be verified
256
- * was determined to be incorrect.
257
- *
258
- * If the value to verify has an invalid size, implementations may return
259
- * either #PSA_ERROR_INVALID_ARGUMENT or #PSA_ERROR_INVALID_SIGNATURE. */
260
- #define PSA_ERROR_INVALID_SIGNATURE ((psa_status_t)-149)
261
-
262
- /** The decrypted padding is incorrect.
263
- *
264
- * \warning In some protocols, when decrypting data, it is essential that
265
- * the behavior of the application does not depend on whether the padding
266
- * is correct, down to precise timing. Applications should prefer
267
- * protocols that use authenticated encryption rather than plain
268
- * encryption. If the application must perform a decryption of
269
- * unauthenticated data, the application writer should take care not
270
- * to reveal whether the padding is invalid.
271
- *
272
- * Implementations should strive to make valid and invalid padding
273
- * as close as possible to indistinguishable to an external observer.
274
- * In particular, the timing of a decryption operation should not
275
- * depend on the validity of the padding. */
276
- #define PSA_ERROR_INVALID_PADDING ((psa_status_t)-150)
277
-
278
- /** Return this error when there's insufficient data when attempting
279
- * to read from a resource. */
280
- #define PSA_ERROR_INSUFFICIENT_DATA ((psa_status_t)-143)
281
-
282
- /** The key identifier is not valid. See also :ref:\`key-handles\`.
283
- */
284
- #define PSA_ERROR_INVALID_HANDLE ((psa_status_t)-136)
285
-
286
- /** Stored data has been corrupted.
287
- *
288
- * This error indicates that some persistent storage has suffered corruption.
289
- * It does not indicate the following situations, which have specific error
290
- * codes:
291
- *
292
- * - A corruption of volatile memory - use #PSA_ERROR_CORRUPTION_DETECTED.
293
- * - A communication error between the cryptoprocessor and its external
294
- * storage - use #PSA_ERROR_COMMUNICATION_FAILURE.
295
- * - When the storage is in a valid state but is full - use
296
- * #PSA_ERROR_INSUFFICIENT_STORAGE.
297
- * - When the storage fails for other reasons - use
298
- * #PSA_ERROR_STORAGE_FAILURE.
299
- * - When the stored data is not valid - use #PSA_ERROR_DATA_INVALID.
300
- *
301
- * \note A storage corruption does not indicate that any data that was
302
- * previously read is invalid. However this previously read data might no
303
- * longer be readable from storage.
304
- *
305
- * When a storage failure occurs, it is no longer possible to ensure the
306
- * global integrity of the keystore.
307
- */
308
- #define PSA_ERROR_DATA_CORRUPT ((psa_status_t)-152)
309
-
310
- /** Data read from storage is not valid for the implementation.
311
- *
312
- * This error indicates that some data read from storage does not have a valid
313
- * format. It does not indicate the following situations, which have specific
314
- * error codes:
315
- *
316
- * - When the storage or stored data is corrupted - use #PSA_ERROR_DATA_CORRUPT
317
- * - When the storage fails for other reasons - use #PSA_ERROR_STORAGE_FAILURE
318
- * - An invalid argument to the API - use #PSA_ERROR_INVALID_ARGUMENT
319
- *
320
- * This error is typically a result of either storage corruption on a
321
- * cleartext storage backend, or an attempt to read data that was
322
- * written by an incompatible version of the library.
323
- */
324
- #define PSA_ERROR_DATA_INVALID ((psa_status_t)-153)
325
-
326
- /** The function that returns this status is defined as interruptible and
327
- * still has work to do, thus the user should call the function again with the
328
- * same operation context until it either returns #PSA_SUCCESS or any other
329
- * error. This is not an error per se, more a notification of status.
330
- */
331
- #define PSA_OPERATION_INCOMPLETE ((psa_status_t)-248)
332
-
333
- /* *INDENT-ON* */
334
-
335
- /**@}*/
336
-
337
- /** \defgroup crypto_types Key and algorithm types
338
- * @{
339
- */
340
-
341
- /* Note that key type values, including ECC family and DH group values, are
342
- * embedded in the persistent key store, as part of key metadata. As a
343
- * consequence, they must not be changed (unless the storage format version
344
- * changes).
345
- */
346
-
347
- /** An invalid key type value.
348
- *
349
- * Zero is not the encoding of any key type.
350
- */
351
- #define PSA_KEY_TYPE_NONE ((psa_key_type_t) 0x0000)
352
-
353
- /** Vendor-defined key type flag.
354
- *
355
- * Key types defined by this standard will never have the
356
- * #PSA_KEY_TYPE_VENDOR_FLAG bit set. Vendors who define additional key types
357
- * must use an encoding with the #PSA_KEY_TYPE_VENDOR_FLAG bit set and should
358
- * respect the bitwise structure used by standard encodings whenever practical.
359
- */
360
- #define PSA_KEY_TYPE_VENDOR_FLAG ((psa_key_type_t) 0x8000)
361
-
362
- #define PSA_KEY_TYPE_CATEGORY_MASK ((psa_key_type_t) 0x7000)
363
- #define PSA_KEY_TYPE_CATEGORY_RAW ((psa_key_type_t) 0x1000)
364
- #define PSA_KEY_TYPE_CATEGORY_SYMMETRIC ((psa_key_type_t) 0x2000)
365
- #define PSA_KEY_TYPE_CATEGORY_PUBLIC_KEY ((psa_key_type_t) 0x4000)
366
- #define PSA_KEY_TYPE_CATEGORY_KEY_PAIR ((psa_key_type_t) 0x7000)
367
-
368
- #define PSA_KEY_TYPE_CATEGORY_FLAG_PAIR ((psa_key_type_t) 0x3000)
369
-
370
- /** Whether a key type is vendor-defined.
371
- *
372
- * See also #PSA_KEY_TYPE_VENDOR_FLAG.
373
- */
374
- #define PSA_KEY_TYPE_IS_VENDOR_DEFINED(type) \
375
- (((type) & PSA_KEY_TYPE_VENDOR_FLAG) != 0)
376
-
377
- /** Whether a key type is an unstructured array of bytes.
378
- *
379
- * This encompasses both symmetric keys and non-key data.
380
- */
381
- #define PSA_KEY_TYPE_IS_UNSTRUCTURED(type) \
382
- (((type) & PSA_KEY_TYPE_CATEGORY_MASK) == PSA_KEY_TYPE_CATEGORY_RAW || \
383
- ((type) & PSA_KEY_TYPE_CATEGORY_MASK) == PSA_KEY_TYPE_CATEGORY_SYMMETRIC)
384
-
385
- /** Whether a key type is asymmetric: either a key pair or a public key. */
386
- #define PSA_KEY_TYPE_IS_ASYMMETRIC(type) \
387
- (((type) & PSA_KEY_TYPE_CATEGORY_MASK \
388
- & ~PSA_KEY_TYPE_CATEGORY_FLAG_PAIR) == \
389
- PSA_KEY_TYPE_CATEGORY_PUBLIC_KEY)
390
- /** Whether a key type is the public part of a key pair. */
391
- #define PSA_KEY_TYPE_IS_PUBLIC_KEY(type) \
392
- (((type) & PSA_KEY_TYPE_CATEGORY_MASK) == PSA_KEY_TYPE_CATEGORY_PUBLIC_KEY)
393
- /** Whether a key type is a key pair containing a private part and a public
394
- * part. */
395
- #define PSA_KEY_TYPE_IS_KEY_PAIR(type) \
396
- (((type) & PSA_KEY_TYPE_CATEGORY_MASK) == PSA_KEY_TYPE_CATEGORY_KEY_PAIR)
397
- /** The key pair type corresponding to a public key type.
398
- *
399
- * You may also pass a key pair type as \p type, it will be left unchanged.
400
- *
401
- * \param type A public key type or key pair type.
402
- *
403
- * \return The corresponding key pair type.
404
- * If \p type is not a public key or a key pair,
405
- * the return value is undefined.
406
- */
407
- #define PSA_KEY_TYPE_KEY_PAIR_OF_PUBLIC_KEY(type) \
408
- ((type) | PSA_KEY_TYPE_CATEGORY_FLAG_PAIR)
409
- /** The public key type corresponding to a key pair type.
410
- *
411
- * You may also pass a key pair type as \p type, it will be left unchanged.
412
- *
413
- * \param type A public key type or key pair type.
414
- *
415
- * \return The corresponding public key type.
416
- * If \p type is not a public key or a key pair,
417
- * the return value is undefined.
418
- */
419
- #define PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(type) \
420
- ((type) & ~PSA_KEY_TYPE_CATEGORY_FLAG_PAIR)
421
-
422
- /** Raw data.
423
- *
424
- * A "key" of this type cannot be used for any cryptographic operation.
425
- * Applications may use this type to store arbitrary data in the keystore. */
426
- #define PSA_KEY_TYPE_RAW_DATA ((psa_key_type_t) 0x1001)
427
-
428
- /** HMAC key.
429
- *
430
- * The key policy determines which underlying hash algorithm the key can be
431
- * used for.
432
- *
433
- * HMAC keys should generally have the same size as the underlying hash.
434
- * This size can be calculated with #PSA_HASH_LENGTH(\c alg) where
435
- * \c alg is the HMAC algorithm or the underlying hash algorithm. */
436
- #define PSA_KEY_TYPE_HMAC ((psa_key_type_t) 0x1100)
437
-
438
- /** A secret for key derivation.
439
- *
440
- * This key type is for high-entropy secrets only. For low-entropy secrets,
441
- * #PSA_KEY_TYPE_PASSWORD should be used instead.
442
- *
443
- * These keys can be used as the #PSA_KEY_DERIVATION_INPUT_SECRET or
444
- * #PSA_KEY_DERIVATION_INPUT_PASSWORD input of key derivation algorithms.
445
- *
446
- * The key policy determines which key derivation algorithm the key
447
- * can be used for.
448
- */
449
- #define PSA_KEY_TYPE_DERIVE ((psa_key_type_t) 0x1200)
450
-
451
- /** A low-entropy secret for password hashing or key derivation.
452
- *
453
- * This key type is suitable for passwords and passphrases which are typically
454
- * intended to be memorizable by humans, and have a low entropy relative to
455
- * their size. It can be used for randomly generated or derived keys with
456
- * maximum or near-maximum entropy, but #PSA_KEY_TYPE_DERIVE is more suitable
457
- * for such keys. It is not suitable for passwords with extremely low entropy,
458
- * such as numerical PINs.
459
- *
460
- * These keys can be used as the #PSA_KEY_DERIVATION_INPUT_PASSWORD input of
461
- * key derivation algorithms. Algorithms that accept such an input were
462
- * designed to accept low-entropy secret and are known as password hashing or
463
- * key stretching algorithms.
464
- *
465
- * These keys cannot be used as the #PSA_KEY_DERIVATION_INPUT_SECRET input of
466
- * key derivation algorithms, as the algorithms that take such an input expect
467
- * it to be high-entropy.
468
- *
469
- * The key policy determines which key derivation algorithm the key can be
470
- * used for, among the permissible subset defined above.
471
- */
472
- #define PSA_KEY_TYPE_PASSWORD ((psa_key_type_t) 0x1203)
473
-
474
- /** A secret value that can be used to verify a password hash.
475
- *
476
- * The key policy determines which key derivation algorithm the key
477
- * can be used for, among the same permissible subset as for
478
- * #PSA_KEY_TYPE_PASSWORD.
479
- */
480
- #define PSA_KEY_TYPE_PASSWORD_HASH ((psa_key_type_t) 0x1205)
481
-
482
- /** A secret value that can be used in when computing a password hash.
483
- *
484
- * The key policy determines which key derivation algorithm the key
485
- * can be used for, among the subset of algorithms that can use pepper.
486
- */
487
- #define PSA_KEY_TYPE_PEPPER ((psa_key_type_t) 0x1206)
488
-
489
- /** Key for a cipher, AEAD or MAC algorithm based on the AES block cipher.
490
- *
491
- * The size of the key can be 16 bytes (AES-128), 24 bytes (AES-192) or
492
- * 32 bytes (AES-256).
493
- */
494
- #define PSA_KEY_TYPE_AES ((psa_key_type_t) 0x2400)
495
-
496
- /** Key for a cipher, AEAD or MAC algorithm based on the
497
- * ARIA block cipher. */
498
- #define PSA_KEY_TYPE_ARIA ((psa_key_type_t) 0x2406)
499
-
500
- /** Key for a cipher or MAC algorithm based on DES or 3DES (Triple-DES).
501
- *
502
- * The size of the key can be 64 bits (single DES), 128 bits (2-key 3DES) or
503
- * 192 bits (3-key 3DES).
504
- *
505
- * Note that single DES and 2-key 3DES are weak and strongly
506
- * deprecated and should only be used to decrypt legacy data. 3-key 3DES
507
- * is weak and deprecated and should only be used in legacy protocols.
508
- */
509
- #define PSA_KEY_TYPE_DES ((psa_key_type_t) 0x2301)
510
-
511
- /** Key for a cipher, AEAD or MAC algorithm based on the
512
- * Camellia block cipher. */
513
- #define PSA_KEY_TYPE_CAMELLIA ((psa_key_type_t) 0x2403)
514
-
515
- /** Key for the ChaCha20 stream cipher or the Chacha20-Poly1305 AEAD algorithm.
516
- *
517
- * ChaCha20 and the ChaCha20_Poly1305 construction are defined in RFC 7539.
518
- *
519
- * \note For ChaCha20 and ChaCha20_Poly1305, Mbed TLS only supports
520
- * 12-byte nonces.
521
- *
522
- * \note For ChaCha20, the initial counter value is 0. To encrypt or decrypt
523
- * with the initial counter value 1, you can process and discard a
524
- * 64-byte block before the real data.
525
- */
526
- #define PSA_KEY_TYPE_CHACHA20 ((psa_key_type_t) 0x2004)
527
-
528
- /** RSA public key.
529
- *
530
- * The size of an RSA key is the bit size of the modulus.
531
- */
532
- #define PSA_KEY_TYPE_RSA_PUBLIC_KEY ((psa_key_type_t) 0x4001)
533
- /** RSA key pair (private and public key).
534
- *
535
- * The size of an RSA key is the bit size of the modulus.
536
- */
537
- #define PSA_KEY_TYPE_RSA_KEY_PAIR ((psa_key_type_t) 0x7001)
538
- /** Whether a key type is an RSA key (pair or public-only). */
539
- #define PSA_KEY_TYPE_IS_RSA(type) \
540
- (PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(type) == PSA_KEY_TYPE_RSA_PUBLIC_KEY)
541
-
542
- #define PSA_KEY_TYPE_ECC_PUBLIC_KEY_BASE ((psa_key_type_t) 0x4100)
543
- #define PSA_KEY_TYPE_ECC_KEY_PAIR_BASE ((psa_key_type_t) 0x7100)
544
- #define PSA_KEY_TYPE_ECC_CURVE_MASK ((psa_key_type_t) 0x00ff)
545
- /** Elliptic curve key pair.
546
- *
547
- * The size of an elliptic curve key is the bit size associated with the curve,
548
- * i.e. the bit size of *q* for a curve over a field *F<sub>q</sub>*.
549
- * See the documentation of `PSA_ECC_FAMILY_xxx` curve families for details.
550
- *
551
- * \param curve A value of type ::psa_ecc_family_t that
552
- * identifies the ECC curve to be used.
553
- */
554
- #define PSA_KEY_TYPE_ECC_KEY_PAIR(curve) \
555
- (PSA_KEY_TYPE_ECC_KEY_PAIR_BASE | (curve))
556
- /** Elliptic curve public key.
557
- *
558
- * The size of an elliptic curve public key is the same as the corresponding
559
- * private key (see #PSA_KEY_TYPE_ECC_KEY_PAIR and the documentation of
560
- * `PSA_ECC_FAMILY_xxx` curve families).
561
- *
562
- * \param curve A value of type ::psa_ecc_family_t that
563
- * identifies the ECC curve to be used.
564
- */
565
- #define PSA_KEY_TYPE_ECC_PUBLIC_KEY(curve) \
566
- (PSA_KEY_TYPE_ECC_PUBLIC_KEY_BASE | (curve))
567
-
568
- /** Whether a key type is an elliptic curve key (pair or public-only). */
569
- #define PSA_KEY_TYPE_IS_ECC(type) \
570
- ((PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(type) & \
571
- ~PSA_KEY_TYPE_ECC_CURVE_MASK) == PSA_KEY_TYPE_ECC_PUBLIC_KEY_BASE)
572
- /** Whether a key type is an elliptic curve key pair. */
573
- #define PSA_KEY_TYPE_IS_ECC_KEY_PAIR(type) \
574
- (((type) & ~PSA_KEY_TYPE_ECC_CURVE_MASK) == \
575
- PSA_KEY_TYPE_ECC_KEY_PAIR_BASE)
576
- /** Whether a key type is an elliptic curve public key. */
577
- #define PSA_KEY_TYPE_IS_ECC_PUBLIC_KEY(type) \
578
- (((type) & ~PSA_KEY_TYPE_ECC_CURVE_MASK) == \
579
- PSA_KEY_TYPE_ECC_PUBLIC_KEY_BASE)
580
-
581
- /** Extract the curve from an elliptic curve key type. */
582
- #define PSA_KEY_TYPE_ECC_GET_FAMILY(type) \
583
- ((psa_ecc_family_t) (PSA_KEY_TYPE_IS_ECC(type) ? \
584
- ((type) & PSA_KEY_TYPE_ECC_CURVE_MASK) : \
585
- 0))
586
-
587
- /** Check if the curve of given family is Weierstrass elliptic curve. */
588
- #define PSA_ECC_FAMILY_IS_WEIERSTRASS(family) ((family & 0xc0) == 0)
589
-
590
- /** SEC Koblitz curves over prime fields.
591
- *
592
- * This family comprises the following curves:
593
- * secp192k1, secp224k1, secp256k1.
594
- * They are defined in _Standards for Efficient Cryptography_,
595
- * _SEC 2: Recommended Elliptic Curve Domain Parameters_.
596
- * https://www.secg.org/sec2-v2.pdf
597
- */
598
- #define PSA_ECC_FAMILY_SECP_K1 ((psa_ecc_family_t) 0x17)
599
-
600
- /** SEC random curves over prime fields.
601
- *
602
- * This family comprises the following curves:
603
- * secp192k1, secp224r1, secp256r1, secp384r1, secp521r1.
604
- * They are defined in _Standards for Efficient Cryptography_,
605
- * _SEC 2: Recommended Elliptic Curve Domain Parameters_.
606
- * https://www.secg.org/sec2-v2.pdf
607
- */
608
- #define PSA_ECC_FAMILY_SECP_R1 ((psa_ecc_family_t) 0x12)
609
- /* SECP160R2 (SEC2 v1, obsolete) */
610
- #define PSA_ECC_FAMILY_SECP_R2 ((psa_ecc_family_t) 0x1b)
611
-
612
- /** SEC Koblitz curves over binary fields.
613
- *
614
- * This family comprises the following curves:
615
- * sect163k1, sect233k1, sect239k1, sect283k1, sect409k1, sect571k1.
616
- * They are defined in _Standards for Efficient Cryptography_,
617
- * _SEC 2: Recommended Elliptic Curve Domain Parameters_.
618
- * https://www.secg.org/sec2-v2.pdf
619
- */
620
- #define PSA_ECC_FAMILY_SECT_K1 ((psa_ecc_family_t) 0x27)
621
-
622
- /** SEC random curves over binary fields.
623
- *
624
- * This family comprises the following curves:
625
- * sect163r1, sect233r1, sect283r1, sect409r1, sect571r1.
626
- * They are defined in _Standards for Efficient Cryptography_,
627
- * _SEC 2: Recommended Elliptic Curve Domain Parameters_.
628
- * https://www.secg.org/sec2-v2.pdf
629
- */
630
- #define PSA_ECC_FAMILY_SECT_R1 ((psa_ecc_family_t) 0x22)
631
-
632
- /** SEC additional random curves over binary fields.
633
- *
634
- * This family comprises the following curve:
635
- * sect163r2.
636
- * It is defined in _Standards for Efficient Cryptography_,
637
- * _SEC 2: Recommended Elliptic Curve Domain Parameters_.
638
- * https://www.secg.org/sec2-v2.pdf
639
- */
640
- #define PSA_ECC_FAMILY_SECT_R2 ((psa_ecc_family_t) 0x2b)
641
-
642
- /** Brainpool P random curves.
643
- *
644
- * This family comprises the following curves:
645
- * brainpoolP160r1, brainpoolP192r1, brainpoolP224r1, brainpoolP256r1,
646
- * brainpoolP320r1, brainpoolP384r1, brainpoolP512r1.
647
- * It is defined in RFC 5639.
648
- */
649
- #define PSA_ECC_FAMILY_BRAINPOOL_P_R1 ((psa_ecc_family_t) 0x30)
650
-
651
- /** Curve25519 and Curve448.
652
- *
653
- * This family comprises the following Montgomery curves:
654
- * - 255-bit: Bernstein et al.,
655
- * _Curve25519: new Diffie-Hellman speed records_, LNCS 3958, 2006.
656
- * The algorithm #PSA_ALG_ECDH performs X25519 when used with this curve.
657
- * - 448-bit: Hamburg,
658
- * _Ed448-Goldilocks, a new elliptic curve_, NIST ECC Workshop, 2015.
659
- * The algorithm #PSA_ALG_ECDH performs X448 when used with this curve.
660
- */
661
- #define PSA_ECC_FAMILY_MONTGOMERY ((psa_ecc_family_t) 0x41)
662
-
663
- /** The twisted Edwards curves Ed25519 and Ed448.
664
- *
665
- * These curves are suitable for EdDSA (#PSA_ALG_PURE_EDDSA for both curves,
666
- * #PSA_ALG_ED25519PH for the 255-bit curve,
667
- * #PSA_ALG_ED448PH for the 448-bit curve).
668
- *
669
- * This family comprises the following twisted Edwards curves:
670
- * - 255-bit: Edwards25519, the twisted Edwards curve birationally equivalent
671
- * to Curve25519.
672
- * Bernstein et al., _Twisted Edwards curves_, Africacrypt 2008.
673
- * - 448-bit: Edwards448, the twisted Edwards curve birationally equivalent
674
- * to Curve448.
675
- * Hamburg, _Ed448-Goldilocks, a new elliptic curve_, NIST ECC Workshop, 2015.
676
- */
677
- #define PSA_ECC_FAMILY_TWISTED_EDWARDS ((psa_ecc_family_t) 0x42)
678
-
679
- #define PSA_KEY_TYPE_DH_PUBLIC_KEY_BASE ((psa_key_type_t) 0x4200)
680
- #define PSA_KEY_TYPE_DH_KEY_PAIR_BASE ((psa_key_type_t) 0x7200)
681
- #define PSA_KEY_TYPE_DH_GROUP_MASK ((psa_key_type_t) 0x00ff)
682
- /** Diffie-Hellman key pair.
683
- *
684
- * \param group A value of type ::psa_dh_family_t that identifies the
685
- * Diffie-Hellman group to be used.
686
- */
687
- #define PSA_KEY_TYPE_DH_KEY_PAIR(group) \
688
- (PSA_KEY_TYPE_DH_KEY_PAIR_BASE | (group))
689
- /** Diffie-Hellman public key.
690
- *
691
- * \param group A value of type ::psa_dh_family_t that identifies the
692
- * Diffie-Hellman group to be used.
693
- */
694
- #define PSA_KEY_TYPE_DH_PUBLIC_KEY(group) \
695
- (PSA_KEY_TYPE_DH_PUBLIC_KEY_BASE | (group))
696
-
697
- /** Whether a key type is a Diffie-Hellman key (pair or public-only). */
698
- #define PSA_KEY_TYPE_IS_DH(type) \
699
- ((PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(type) & \
700
- ~PSA_KEY_TYPE_DH_GROUP_MASK) == PSA_KEY_TYPE_DH_PUBLIC_KEY_BASE)
701
- /** Whether a key type is a Diffie-Hellman key pair. */
702
- #define PSA_KEY_TYPE_IS_DH_KEY_PAIR(type) \
703
- (((type) & ~PSA_KEY_TYPE_DH_GROUP_MASK) == \
704
- PSA_KEY_TYPE_DH_KEY_PAIR_BASE)
705
- /** Whether a key type is a Diffie-Hellman public key. */
706
- #define PSA_KEY_TYPE_IS_DH_PUBLIC_KEY(type) \
707
- (((type) & ~PSA_KEY_TYPE_DH_GROUP_MASK) == \
708
- PSA_KEY_TYPE_DH_PUBLIC_KEY_BASE)
709
-
710
- /** Extract the group from a Diffie-Hellman key type. */
711
- #define PSA_KEY_TYPE_DH_GET_FAMILY(type) \
712
- ((psa_dh_family_t) (PSA_KEY_TYPE_IS_DH(type) ? \
713
- ((type) & PSA_KEY_TYPE_DH_GROUP_MASK) : \
714
- 0))
715
-
716
- /** Diffie-Hellman groups defined in RFC 7919 Appendix A.
717
- *
718
- * This family includes groups with the following key sizes (in bits):
719
- * 2048, 3072, 4096, 6144, 8192. A given implementation may support
720
- * all of these sizes or only a subset.
721
- */
722
- #define PSA_DH_FAMILY_RFC7919 ((psa_dh_family_t) 0x03)
723
-
724
- #define PSA_GET_KEY_TYPE_BLOCK_SIZE_EXPONENT(type) \
725
- (((type) >> 8) & 7)
726
- /** The block size of a block cipher.
727
- *
728
- * \param type A cipher key type (value of type #psa_key_type_t).
729
- *
730
- * \return The block size for a block cipher, or 1 for a stream cipher.
731
- * The return value is undefined if \p type is not a supported
732
- * cipher key type.
733
- *
734
- * \note It is possible to build stream cipher algorithms on top of a block
735
- * cipher, for example CTR mode (#PSA_ALG_CTR).
736
- * This macro only takes the key type into account, so it cannot be
737
- * used to determine the size of the data that #psa_cipher_update()
738
- * might buffer for future processing in general.
739
- *
740
- * \note This macro returns a compile-time constant if its argument is one.
741
- *
742
- * \warning This macro may evaluate its argument multiple times.
743
- */
744
- #define PSA_BLOCK_CIPHER_BLOCK_LENGTH(type) \
745
- (((type) & PSA_KEY_TYPE_CATEGORY_MASK) == PSA_KEY_TYPE_CATEGORY_SYMMETRIC ? \
746
- 1u << PSA_GET_KEY_TYPE_BLOCK_SIZE_EXPONENT(type) : \
747
- 0u)
748
-
749
- /* Note that algorithm values are embedded in the persistent key store,
750
- * as part of key metadata. As a consequence, they must not be changed
751
- * (unless the storage format version changes).
752
- */
753
-
754
- /** Vendor-defined algorithm flag.
755
- *
756
- * Algorithms defined by this standard will never have the #PSA_ALG_VENDOR_FLAG
757
- * bit set. Vendors who define additional algorithms must use an encoding with
758
- * the #PSA_ALG_VENDOR_FLAG bit set and should respect the bitwise structure
759
- * used by standard encodings whenever practical.
760
- */
761
- #define PSA_ALG_VENDOR_FLAG ((psa_algorithm_t) 0x80000000)
762
-
763
- #define PSA_ALG_CATEGORY_MASK ((psa_algorithm_t) 0x7f000000)
764
- #define PSA_ALG_CATEGORY_HASH ((psa_algorithm_t) 0x02000000)
765
- #define PSA_ALG_CATEGORY_MAC ((psa_algorithm_t) 0x03000000)
766
- #define PSA_ALG_CATEGORY_CIPHER ((psa_algorithm_t) 0x04000000)
767
- #define PSA_ALG_CATEGORY_AEAD ((psa_algorithm_t) 0x05000000)
768
- #define PSA_ALG_CATEGORY_SIGN ((psa_algorithm_t) 0x06000000)
769
- #define PSA_ALG_CATEGORY_ASYMMETRIC_ENCRYPTION ((psa_algorithm_t) 0x07000000)
770
- #define PSA_ALG_CATEGORY_KEY_DERIVATION ((psa_algorithm_t) 0x08000000)
771
- #define PSA_ALG_CATEGORY_KEY_AGREEMENT ((psa_algorithm_t) 0x09000000)
772
-
773
- /** Whether an algorithm is vendor-defined.
774
- *
775
- * See also #PSA_ALG_VENDOR_FLAG.
776
- */
777
- #define PSA_ALG_IS_VENDOR_DEFINED(alg) \
778
- (((alg) & PSA_ALG_VENDOR_FLAG) != 0)
779
-
780
- /** Whether the specified algorithm is a hash algorithm.
781
- *
782
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
783
- *
784
- * \return 1 if \p alg is a hash algorithm, 0 otherwise.
785
- * This macro may return either 0 or 1 if \p alg is not a supported
786
- * algorithm identifier.
787
- */
788
- #define PSA_ALG_IS_HASH(alg) \
789
- (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_HASH)
790
-
791
- /** Whether the specified algorithm is a MAC algorithm.
792
- *
793
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
794
- *
795
- * \return 1 if \p alg is a MAC algorithm, 0 otherwise.
796
- * This macro may return either 0 or 1 if \p alg is not a supported
797
- * algorithm identifier.
798
- */
799
- #define PSA_ALG_IS_MAC(alg) \
800
- (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_MAC)
801
-
802
- /** Whether the specified algorithm is a symmetric cipher algorithm.
803
- *
804
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
805
- *
806
- * \return 1 if \p alg is a symmetric cipher algorithm, 0 otherwise.
807
- * This macro may return either 0 or 1 if \p alg is not a supported
808
- * algorithm identifier.
809
- */
810
- #define PSA_ALG_IS_CIPHER(alg) \
811
- (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_CIPHER)
812
-
813
- /** Whether the specified algorithm is an authenticated encryption
814
- * with associated data (AEAD) algorithm.
815
- *
816
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
817
- *
818
- * \return 1 if \p alg is an AEAD algorithm, 0 otherwise.
819
- * This macro may return either 0 or 1 if \p alg is not a supported
820
- * algorithm identifier.
821
- */
822
- #define PSA_ALG_IS_AEAD(alg) \
823
- (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_AEAD)
824
-
825
- /** Whether the specified algorithm is an asymmetric signature algorithm,
826
- * also known as public-key signature algorithm.
827
- *
828
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
829
- *
830
- * \return 1 if \p alg is an asymmetric signature algorithm, 0 otherwise.
831
- * This macro may return either 0 or 1 if \p alg is not a supported
832
- * algorithm identifier.
833
- */
834
- #define PSA_ALG_IS_SIGN(alg) \
835
- (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_SIGN)
836
-
837
- /** Whether the specified algorithm is an asymmetric encryption algorithm,
838
- * also known as public-key encryption algorithm.
839
- *
840
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
841
- *
842
- * \return 1 if \p alg is an asymmetric encryption algorithm, 0 otherwise.
843
- * This macro may return either 0 or 1 if \p alg is not a supported
844
- * algorithm identifier.
845
- */
846
- #define PSA_ALG_IS_ASYMMETRIC_ENCRYPTION(alg) \
847
- (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_ASYMMETRIC_ENCRYPTION)
848
-
849
- /** Whether the specified algorithm is a key agreement algorithm.
850
- *
851
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
852
- *
853
- * \return 1 if \p alg is a key agreement algorithm, 0 otherwise.
854
- * This macro may return either 0 or 1 if \p alg is not a supported
855
- * algorithm identifier.
856
- */
857
- #define PSA_ALG_IS_KEY_AGREEMENT(alg) \
858
- (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_KEY_AGREEMENT)
859
-
860
- /** Whether the specified algorithm is a key derivation algorithm.
861
- *
862
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
863
- *
864
- * \return 1 if \p alg is a key derivation algorithm, 0 otherwise.
865
- * This macro may return either 0 or 1 if \p alg is not a supported
866
- * algorithm identifier.
867
- */
868
- #define PSA_ALG_IS_KEY_DERIVATION(alg) \
869
- (((alg) & PSA_ALG_CATEGORY_MASK) == PSA_ALG_CATEGORY_KEY_DERIVATION)
870
-
871
- /** Whether the specified algorithm is a key stretching / password hashing
872
- * algorithm.
873
- *
874
- * A key stretching / password hashing algorithm is a key derivation algorithm
875
- * that is suitable for use with a low-entropy secret such as a password.
876
- * Equivalently, it's a key derivation algorithm that uses a
877
- * #PSA_KEY_DERIVATION_INPUT_PASSWORD input step.
878
- *
879
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
880
- *
881
- * \return 1 if \p alg is a key stretching / password hashing algorithm, 0
882
- * otherwise. This macro may return either 0 or 1 if \p alg is not a
883
- * supported algorithm identifier.
884
- */
885
- #define PSA_ALG_IS_KEY_DERIVATION_STRETCHING(alg) \
886
- (PSA_ALG_IS_KEY_DERIVATION(alg) && \
887
- (alg) & PSA_ALG_KEY_DERIVATION_STRETCHING_FLAG)
888
-
889
- /** An invalid algorithm identifier value. */
890
- /* *INDENT-OFF* (https://github.com/ARM-software/psa-arch-tests/issues/337) */
891
- #define PSA_ALG_NONE ((psa_algorithm_t)0)
892
- /* *INDENT-ON* */
893
-
894
- #define PSA_ALG_HASH_MASK ((psa_algorithm_t) 0x000000ff)
895
- /** MD5 */
896
- #define PSA_ALG_MD5 ((psa_algorithm_t) 0x02000003)
897
- /** PSA_ALG_RIPEMD160 */
898
- #define PSA_ALG_RIPEMD160 ((psa_algorithm_t) 0x02000004)
899
- /** SHA1 */
900
- #define PSA_ALG_SHA_1 ((psa_algorithm_t) 0x02000005)
901
- /** SHA2-224 */
902
- #define PSA_ALG_SHA_224 ((psa_algorithm_t) 0x02000008)
903
- /** SHA2-256 */
904
- #define PSA_ALG_SHA_256 ((psa_algorithm_t) 0x02000009)
905
- /** SHA2-384 */
906
- #define PSA_ALG_SHA_384 ((psa_algorithm_t) 0x0200000a)
907
- /** SHA2-512 */
908
- #define PSA_ALG_SHA_512 ((psa_algorithm_t) 0x0200000b)
909
- /** SHA2-512/224 */
910
- #define PSA_ALG_SHA_512_224 ((psa_algorithm_t) 0x0200000c)
911
- /** SHA2-512/256 */
912
- #define PSA_ALG_SHA_512_256 ((psa_algorithm_t) 0x0200000d)
913
- /** SHA3-224 */
914
- #define PSA_ALG_SHA3_224 ((psa_algorithm_t) 0x02000010)
915
- /** SHA3-256 */
916
- #define PSA_ALG_SHA3_256 ((psa_algorithm_t) 0x02000011)
917
- /** SHA3-384 */
918
- #define PSA_ALG_SHA3_384 ((psa_algorithm_t) 0x02000012)
919
- /** SHA3-512 */
920
- #define PSA_ALG_SHA3_512 ((psa_algorithm_t) 0x02000013)
921
- /** The first 512 bits (64 bytes) of the SHAKE256 output.
922
- *
923
- * This is the prehashing for Ed448ph (see #PSA_ALG_ED448PH). For other
924
- * scenarios where a hash function based on SHA3/SHAKE is desired, SHA3-512
925
- * has the same output size and a (theoretically) higher security strength.
926
- */
927
- #define PSA_ALG_SHAKE256_512 ((psa_algorithm_t) 0x02000015)
928
-
929
- /** In a hash-and-sign algorithm policy, allow any hash algorithm.
930
- *
931
- * This value may be used to form the algorithm usage field of a policy
932
- * for a signature algorithm that is parametrized by a hash. The key
933
- * may then be used to perform operations using the same signature
934
- * algorithm parametrized with any supported hash.
935
- *
936
- * That is, suppose that `PSA_xxx_SIGNATURE` is one of the following macros:
937
- * - #PSA_ALG_RSA_PKCS1V15_SIGN, #PSA_ALG_RSA_PSS, #PSA_ALG_RSA_PSS_ANY_SALT,
938
- * - #PSA_ALG_ECDSA, #PSA_ALG_DETERMINISTIC_ECDSA.
939
- * Then you may create and use a key as follows:
940
- * - Set the key usage field using #PSA_ALG_ANY_HASH, for example:
941
- * ```
942
- * psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_SIGN_HASH); // or VERIFY
943
- * psa_set_key_algorithm(&attributes, PSA_xxx_SIGNATURE(PSA_ALG_ANY_HASH));
944
- * ```
945
- * - Import or generate key material.
946
- * - Call psa_sign_hash() or psa_verify_hash(), passing
947
- * an algorithm built from `PSA_xxx_SIGNATURE` and a specific hash. Each
948
- * call to sign or verify a message may use a different hash.
949
- * ```
950
- * psa_sign_hash(key, PSA_xxx_SIGNATURE(PSA_ALG_SHA_256), ...);
951
- * psa_sign_hash(key, PSA_xxx_SIGNATURE(PSA_ALG_SHA_512), ...);
952
- * psa_sign_hash(key, PSA_xxx_SIGNATURE(PSA_ALG_SHA3_256), ...);
953
- * ```
954
- *
955
- * This value may not be used to build other algorithms that are
956
- * parametrized over a hash. For any valid use of this macro to build
957
- * an algorithm \c alg, #PSA_ALG_IS_HASH_AND_SIGN(\c alg) is true.
958
- *
959
- * This value may not be used to build an algorithm specification to
960
- * perform an operation. It is only valid to build policies.
961
- */
962
- #define PSA_ALG_ANY_HASH ((psa_algorithm_t) 0x020000ff)
963
-
964
- #define PSA_ALG_MAC_SUBCATEGORY_MASK ((psa_algorithm_t) 0x00c00000)
965
- #define PSA_ALG_HMAC_BASE ((psa_algorithm_t) 0x03800000)
966
- /** Macro to build an HMAC algorithm.
967
- *
968
- * For example, #PSA_ALG_HMAC(#PSA_ALG_SHA_256) is HMAC-SHA-256.
969
- *
970
- * \param hash_alg A hash algorithm (\c PSA_ALG_XXX value such that
971
- * #PSA_ALG_IS_HASH(\p hash_alg) is true).
972
- *
973
- * \return The corresponding HMAC algorithm.
974
- * \return Unspecified if \p hash_alg is not a supported
975
- * hash algorithm.
976
- */
977
- #define PSA_ALG_HMAC(hash_alg) \
978
- (PSA_ALG_HMAC_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
979
-
980
- #define PSA_ALG_HMAC_GET_HASH(hmac_alg) \
981
- (PSA_ALG_CATEGORY_HASH | ((hmac_alg) & PSA_ALG_HASH_MASK))
982
-
983
- /** Whether the specified algorithm is an HMAC algorithm.
984
- *
985
- * HMAC is a family of MAC algorithms that are based on a hash function.
986
- *
987
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
988
- *
989
- * \return 1 if \p alg is an HMAC algorithm, 0 otherwise.
990
- * This macro may return either 0 or 1 if \p alg is not a supported
991
- * algorithm identifier.
992
- */
993
- #define PSA_ALG_IS_HMAC(alg) \
994
- (((alg) & (PSA_ALG_CATEGORY_MASK | PSA_ALG_MAC_SUBCATEGORY_MASK)) == \
995
- PSA_ALG_HMAC_BASE)
996
-
997
- /* In the encoding of a MAC algorithm, the bits corresponding to
998
- * PSA_ALG_MAC_TRUNCATION_MASK encode the length to which the MAC is
999
- * truncated. As an exception, the value 0 means the untruncated algorithm,
1000
- * whatever its length is. The length is encoded in 6 bits, so it can
1001
- * reach up to 63; the largest MAC is 64 bytes so its trivial truncation
1002
- * to full length is correctly encoded as 0 and any non-trivial truncation
1003
- * is correctly encoded as a value between 1 and 63. */
1004
- #define PSA_ALG_MAC_TRUNCATION_MASK ((psa_algorithm_t) 0x003f0000)
1005
- #define PSA_MAC_TRUNCATION_OFFSET 16
1006
-
1007
- /* In the encoding of a MAC algorithm, the bit corresponding to
1008
- * #PSA_ALG_MAC_AT_LEAST_THIS_LENGTH_FLAG encodes the fact that the algorithm
1009
- * is a wildcard algorithm. A key with such wildcard algorithm as permitted
1010
- * algorithm policy can be used with any algorithm corresponding to the
1011
- * same base class and having a (potentially truncated) MAC length greater or
1012
- * equal than the one encoded in #PSA_ALG_MAC_TRUNCATION_MASK. */
1013
- #define PSA_ALG_MAC_AT_LEAST_THIS_LENGTH_FLAG ((psa_algorithm_t) 0x00008000)
1014
-
1015
- /** Macro to build a truncated MAC algorithm.
1016
- *
1017
- * A truncated MAC algorithm is identical to the corresponding MAC
1018
- * algorithm except that the MAC value for the truncated algorithm
1019
- * consists of only the first \p mac_length bytes of the MAC value
1020
- * for the untruncated algorithm.
1021
- *
1022
- * \note This macro may allow constructing algorithm identifiers that
1023
- * are not valid, either because the specified length is larger
1024
- * than the untruncated MAC or because the specified length is
1025
- * smaller than permitted by the implementation.
1026
- *
1027
- * \note It is implementation-defined whether a truncated MAC that
1028
- * is truncated to the same length as the MAC of the untruncated
1029
- * algorithm is considered identical to the untruncated algorithm
1030
- * for policy comparison purposes.
1031
- *
1032
- * \param mac_alg A MAC algorithm identifier (value of type
1033
- * #psa_algorithm_t such that #PSA_ALG_IS_MAC(\p mac_alg)
1034
- * is true). This may be a truncated or untruncated
1035
- * MAC algorithm.
1036
- * \param mac_length Desired length of the truncated MAC in bytes.
1037
- * This must be at most the full length of the MAC
1038
- * and must be at least an implementation-specified
1039
- * minimum. The implementation-specified minimum
1040
- * shall not be zero.
1041
- *
1042
- * \return The corresponding MAC algorithm with the specified
1043
- * length.
1044
- * \return Unspecified if \p mac_alg is not a supported
1045
- * MAC algorithm or if \p mac_length is too small or
1046
- * too large for the specified MAC algorithm.
1047
- */
1048
- #define PSA_ALG_TRUNCATED_MAC(mac_alg, mac_length) \
1049
- (((mac_alg) & ~(PSA_ALG_MAC_TRUNCATION_MASK | \
1050
- PSA_ALG_MAC_AT_LEAST_THIS_LENGTH_FLAG)) | \
1051
- ((mac_length) << PSA_MAC_TRUNCATION_OFFSET & PSA_ALG_MAC_TRUNCATION_MASK))
1052
-
1053
- /** Macro to build the base MAC algorithm corresponding to a truncated
1054
- * MAC algorithm.
1055
- *
1056
- * \param mac_alg A MAC algorithm identifier (value of type
1057
- * #psa_algorithm_t such that #PSA_ALG_IS_MAC(\p mac_alg)
1058
- * is true). This may be a truncated or untruncated
1059
- * MAC algorithm.
1060
- *
1061
- * \return The corresponding base MAC algorithm.
1062
- * \return Unspecified if \p mac_alg is not a supported
1063
- * MAC algorithm.
1064
- */
1065
- #define PSA_ALG_FULL_LENGTH_MAC(mac_alg) \
1066
- ((mac_alg) & ~(PSA_ALG_MAC_TRUNCATION_MASK | \
1067
- PSA_ALG_MAC_AT_LEAST_THIS_LENGTH_FLAG))
1068
-
1069
- /** Length to which a MAC algorithm is truncated.
1070
- *
1071
- * \param mac_alg A MAC algorithm identifier (value of type
1072
- * #psa_algorithm_t such that #PSA_ALG_IS_MAC(\p mac_alg)
1073
- * is true).
1074
- *
1075
- * \return Length of the truncated MAC in bytes.
1076
- * \return 0 if \p mac_alg is a non-truncated MAC algorithm.
1077
- * \return Unspecified if \p mac_alg is not a supported
1078
- * MAC algorithm.
1079
- */
1080
- #define PSA_MAC_TRUNCATED_LENGTH(mac_alg) \
1081
- (((mac_alg) & PSA_ALG_MAC_TRUNCATION_MASK) >> PSA_MAC_TRUNCATION_OFFSET)
1082
-
1083
- /** Macro to build a MAC minimum-MAC-length wildcard algorithm.
1084
- *
1085
- * A minimum-MAC-length MAC wildcard algorithm permits all MAC algorithms
1086
- * sharing the same base algorithm, and where the (potentially truncated) MAC
1087
- * length of the specific algorithm is equal to or larger then the wildcard
1088
- * algorithm's minimum MAC length.
1089
- *
1090
- * \note When setting the minimum required MAC length to less than the
1091
- * smallest MAC length allowed by the base algorithm, this effectively
1092
- * becomes an 'any-MAC-length-allowed' policy for that base algorithm.
1093
- *
1094
- * \param mac_alg A MAC algorithm identifier (value of type
1095
- * #psa_algorithm_t such that #PSA_ALG_IS_MAC(\p mac_alg)
1096
- * is true).
1097
- * \param min_mac_length Desired minimum length of the message authentication
1098
- * code in bytes. This must be at most the untruncated
1099
- * length of the MAC and must be at least 1.
1100
- *
1101
- * \return The corresponding MAC wildcard algorithm with the
1102
- * specified minimum length.
1103
- * \return Unspecified if \p mac_alg is not a supported MAC
1104
- * algorithm or if \p min_mac_length is less than 1 or
1105
- * too large for the specified MAC algorithm.
1106
- */
1107
- #define PSA_ALG_AT_LEAST_THIS_LENGTH_MAC(mac_alg, min_mac_length) \
1108
- (PSA_ALG_TRUNCATED_MAC(mac_alg, min_mac_length) | \
1109
- PSA_ALG_MAC_AT_LEAST_THIS_LENGTH_FLAG)
1110
-
1111
- #define PSA_ALG_CIPHER_MAC_BASE ((psa_algorithm_t) 0x03c00000)
1112
- /** The CBC-MAC construction over a block cipher
1113
- *
1114
- * \warning CBC-MAC is insecure in many cases.
1115
- * A more secure mode, such as #PSA_ALG_CMAC, is recommended.
1116
- */
1117
- #define PSA_ALG_CBC_MAC ((psa_algorithm_t) 0x03c00100)
1118
- /** The CMAC construction over a block cipher */
1119
- #define PSA_ALG_CMAC ((psa_algorithm_t) 0x03c00200)
1120
-
1121
- /** Whether the specified algorithm is a MAC algorithm based on a block cipher.
1122
- *
1123
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
1124
- *
1125
- * \return 1 if \p alg is a MAC algorithm based on a block cipher, 0 otherwise.
1126
- * This macro may return either 0 or 1 if \p alg is not a supported
1127
- * algorithm identifier.
1128
- */
1129
- #define PSA_ALG_IS_BLOCK_CIPHER_MAC(alg) \
1130
- (((alg) & (PSA_ALG_CATEGORY_MASK | PSA_ALG_MAC_SUBCATEGORY_MASK)) == \
1131
- PSA_ALG_CIPHER_MAC_BASE)
1132
-
1133
- #define PSA_ALG_CIPHER_STREAM_FLAG ((psa_algorithm_t) 0x00800000)
1134
- #define PSA_ALG_CIPHER_FROM_BLOCK_FLAG ((psa_algorithm_t) 0x00400000)
1135
-
1136
- /** Whether the specified algorithm is a stream cipher.
1137
- *
1138
- * A stream cipher is a symmetric cipher that encrypts or decrypts messages
1139
- * by applying a bitwise-xor with a stream of bytes that is generated
1140
- * from a key.
1141
- *
1142
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
1143
- *
1144
- * \return 1 if \p alg is a stream cipher algorithm, 0 otherwise.
1145
- * This macro may return either 0 or 1 if \p alg is not a supported
1146
- * algorithm identifier or if it is not a symmetric cipher algorithm.
1147
- */
1148
- #define PSA_ALG_IS_STREAM_CIPHER(alg) \
1149
- (((alg) & (PSA_ALG_CATEGORY_MASK | PSA_ALG_CIPHER_STREAM_FLAG)) == \
1150
- (PSA_ALG_CATEGORY_CIPHER | PSA_ALG_CIPHER_STREAM_FLAG))
1151
-
1152
- /** The stream cipher mode of a stream cipher algorithm.
1153
- *
1154
- * The underlying stream cipher is determined by the key type.
1155
- * - To use ChaCha20, use a key type of #PSA_KEY_TYPE_CHACHA20.
1156
- */
1157
- #define PSA_ALG_STREAM_CIPHER ((psa_algorithm_t) 0x04800100)
1158
-
1159
- /** The CTR stream cipher mode.
1160
- *
1161
- * CTR is a stream cipher which is built from a block cipher.
1162
- * The underlying block cipher is determined by the key type.
1163
- * For example, to use AES-128-CTR, use this algorithm with
1164
- * a key of type #PSA_KEY_TYPE_AES and a length of 128 bits (16 bytes).
1165
- */
1166
- #define PSA_ALG_CTR ((psa_algorithm_t) 0x04c01000)
1167
-
1168
- /** The CFB stream cipher mode.
1169
- *
1170
- * The underlying block cipher is determined by the key type.
1171
- */
1172
- #define PSA_ALG_CFB ((psa_algorithm_t) 0x04c01100)
1173
-
1174
- /** The OFB stream cipher mode.
1175
- *
1176
- * The underlying block cipher is determined by the key type.
1177
- */
1178
- #define PSA_ALG_OFB ((psa_algorithm_t) 0x04c01200)
1179
-
1180
- /** The XTS cipher mode.
1181
- *
1182
- * XTS is a cipher mode which is built from a block cipher. It requires at
1183
- * least one full block of input, but beyond this minimum the input
1184
- * does not need to be a whole number of blocks.
1185
- */
1186
- #define PSA_ALG_XTS ((psa_algorithm_t) 0x0440ff00)
1187
-
1188
- /** The Electronic Code Book (ECB) mode of a block cipher, with no padding.
1189
- *
1190
- * \warning ECB mode does not protect the confidentiality of the encrypted data
1191
- * except in extremely narrow circumstances. It is recommended that applications
1192
- * only use ECB if they need to construct an operating mode that the
1193
- * implementation does not provide. Implementations are encouraged to provide
1194
- * the modes that applications need in preference to supporting direct access
1195
- * to ECB.
1196
- *
1197
- * The underlying block cipher is determined by the key type.
1198
- *
1199
- * This symmetric cipher mode can only be used with messages whose lengths are a
1200
- * multiple of the block size of the chosen block cipher.
1201
- *
1202
- * ECB mode does not accept an initialization vector (IV). When using a
1203
- * multi-part cipher operation with this algorithm, psa_cipher_generate_iv()
1204
- * and psa_cipher_set_iv() must not be called.
1205
- */
1206
- #define PSA_ALG_ECB_NO_PADDING ((psa_algorithm_t) 0x04404400)
1207
-
1208
- /** The CBC block cipher chaining mode, with no padding.
1209
- *
1210
- * The underlying block cipher is determined by the key type.
1211
- *
1212
- * This symmetric cipher mode can only be used with messages whose lengths
1213
- * are whole number of blocks for the chosen block cipher.
1214
- */
1215
- #define PSA_ALG_CBC_NO_PADDING ((psa_algorithm_t) 0x04404000)
1216
-
1217
- /** The CBC block cipher chaining mode with PKCS#7 padding.
1218
- *
1219
- * The underlying block cipher is determined by the key type.
1220
- *
1221
- * This is the padding method defined by PKCS#7 (RFC 2315) &sect;10.3.
1222
- */
1223
- #define PSA_ALG_CBC_PKCS7 ((psa_algorithm_t) 0x04404100)
1224
-
1225
- #define PSA_ALG_AEAD_FROM_BLOCK_FLAG ((psa_algorithm_t) 0x00400000)
1226
-
1227
- /** Whether the specified algorithm is an AEAD mode on a block cipher.
1228
- *
1229
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
1230
- *
1231
- * \return 1 if \p alg is an AEAD algorithm which is an AEAD mode based on
1232
- * a block cipher, 0 otherwise.
1233
- * This macro may return either 0 or 1 if \p alg is not a supported
1234
- * algorithm identifier.
1235
- */
1236
- #define PSA_ALG_IS_AEAD_ON_BLOCK_CIPHER(alg) \
1237
- (((alg) & (PSA_ALG_CATEGORY_MASK | PSA_ALG_AEAD_FROM_BLOCK_FLAG)) == \
1238
- (PSA_ALG_CATEGORY_AEAD | PSA_ALG_AEAD_FROM_BLOCK_FLAG))
1239
-
1240
- /** The CCM authenticated encryption algorithm.
1241
- *
1242
- * The underlying block cipher is determined by the key type.
1243
- */
1244
- #define PSA_ALG_CCM ((psa_algorithm_t) 0x05500100)
1245
-
1246
- /** The CCM* cipher mode without authentication.
1247
- *
1248
- * This is CCM* as specified in IEEE 802.15.4 §7, with a tag length of 0.
1249
- * For CCM* with a nonzero tag length, use the AEAD algorithm #PSA_ALG_CCM.
1250
- *
1251
- * The underlying block cipher is determined by the key type.
1252
- *
1253
- * Currently only 13-byte long IV's are supported.
1254
- */
1255
- #define PSA_ALG_CCM_STAR_NO_TAG ((psa_algorithm_t) 0x04c01300)
1256
-
1257
- /** The GCM authenticated encryption algorithm.
1258
- *
1259
- * The underlying block cipher is determined by the key type.
1260
- */
1261
- #define PSA_ALG_GCM ((psa_algorithm_t) 0x05500200)
1262
-
1263
- /** The Chacha20-Poly1305 AEAD algorithm.
1264
- *
1265
- * The ChaCha20_Poly1305 construction is defined in RFC 7539.
1266
- *
1267
- * Implementations must support 12-byte nonces, may support 8-byte nonces,
1268
- * and should reject other sizes.
1269
- *
1270
- * Implementations must support 16-byte tags and should reject other sizes.
1271
- */
1272
- #define PSA_ALG_CHACHA20_POLY1305 ((psa_algorithm_t) 0x05100500)
1273
-
1274
- /* In the encoding of an AEAD algorithm, the bits corresponding to
1275
- * PSA_ALG_AEAD_TAG_LENGTH_MASK encode the length of the AEAD tag.
1276
- * The constants for default lengths follow this encoding.
1277
- */
1278
- #define PSA_ALG_AEAD_TAG_LENGTH_MASK ((psa_algorithm_t) 0x003f0000)
1279
- #define PSA_AEAD_TAG_LENGTH_OFFSET 16
1280
-
1281
- /* In the encoding of an AEAD algorithm, the bit corresponding to
1282
- * #PSA_ALG_AEAD_AT_LEAST_THIS_LENGTH_FLAG encodes the fact that the algorithm
1283
- * is a wildcard algorithm. A key with such wildcard algorithm as permitted
1284
- * algorithm policy can be used with any algorithm corresponding to the
1285
- * same base class and having a tag length greater than or equal to the one
1286
- * encoded in #PSA_ALG_AEAD_TAG_LENGTH_MASK. */
1287
- #define PSA_ALG_AEAD_AT_LEAST_THIS_LENGTH_FLAG ((psa_algorithm_t) 0x00008000)
1288
-
1289
- /** Macro to build a shortened AEAD algorithm.
1290
- *
1291
- * A shortened AEAD algorithm is similar to the corresponding AEAD
1292
- * algorithm, but has an authentication tag that consists of fewer bytes.
1293
- * Depending on the algorithm, the tag length may affect the calculation
1294
- * of the ciphertext.
1295
- *
1296
- * \param aead_alg An AEAD algorithm identifier (value of type
1297
- * #psa_algorithm_t such that #PSA_ALG_IS_AEAD(\p aead_alg)
1298
- * is true).
1299
- * \param tag_length Desired length of the authentication tag in bytes.
1300
- *
1301
- * \return The corresponding AEAD algorithm with the specified
1302
- * length.
1303
- * \return Unspecified if \p aead_alg is not a supported
1304
- * AEAD algorithm or if \p tag_length is not valid
1305
- * for the specified AEAD algorithm.
1306
- */
1307
- #define PSA_ALG_AEAD_WITH_SHORTENED_TAG(aead_alg, tag_length) \
1308
- (((aead_alg) & ~(PSA_ALG_AEAD_TAG_LENGTH_MASK | \
1309
- PSA_ALG_AEAD_AT_LEAST_THIS_LENGTH_FLAG)) | \
1310
- ((tag_length) << PSA_AEAD_TAG_LENGTH_OFFSET & \
1311
- PSA_ALG_AEAD_TAG_LENGTH_MASK))
1312
-
1313
- /** Retrieve the tag length of a specified AEAD algorithm
1314
- *
1315
- * \param aead_alg An AEAD algorithm identifier (value of type
1316
- * #psa_algorithm_t such that #PSA_ALG_IS_AEAD(\p aead_alg)
1317
- * is true).
1318
- *
1319
- * \return The tag length specified by the input algorithm.
1320
- * \return Unspecified if \p aead_alg is not a supported
1321
- * AEAD algorithm.
1322
- */
1323
- #define PSA_ALG_AEAD_GET_TAG_LENGTH(aead_alg) \
1324
- (((aead_alg) & PSA_ALG_AEAD_TAG_LENGTH_MASK) >> \
1325
- PSA_AEAD_TAG_LENGTH_OFFSET)
1326
-
1327
- /** Calculate the corresponding AEAD algorithm with the default tag length.
1328
- *
1329
- * \param aead_alg An AEAD algorithm (\c PSA_ALG_XXX value such that
1330
- * #PSA_ALG_IS_AEAD(\p aead_alg) is true).
1331
- *
1332
- * \return The corresponding AEAD algorithm with the default
1333
- * tag length for that algorithm.
1334
- */
1335
- #define PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG(aead_alg) \
1336
- ( \
1337
- PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG_CASE(aead_alg, PSA_ALG_CCM) \
1338
- PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG_CASE(aead_alg, PSA_ALG_GCM) \
1339
- PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG_CASE(aead_alg, PSA_ALG_CHACHA20_POLY1305) \
1340
- 0)
1341
- #define PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG_CASE(aead_alg, ref) \
1342
- PSA_ALG_AEAD_WITH_SHORTENED_TAG(aead_alg, 0) == \
1343
- PSA_ALG_AEAD_WITH_SHORTENED_TAG(ref, 0) ? \
1344
- ref :
1345
-
1346
- /** Macro to build an AEAD minimum-tag-length wildcard algorithm.
1347
- *
1348
- * A minimum-tag-length AEAD wildcard algorithm permits all AEAD algorithms
1349
- * sharing the same base algorithm, and where the tag length of the specific
1350
- * algorithm is equal to or larger then the minimum tag length specified by the
1351
- * wildcard algorithm.
1352
- *
1353
- * \note When setting the minimum required tag length to less than the
1354
- * smallest tag length allowed by the base algorithm, this effectively
1355
- * becomes an 'any-tag-length-allowed' policy for that base algorithm.
1356
- *
1357
- * \param aead_alg An AEAD algorithm identifier (value of type
1358
- * #psa_algorithm_t such that
1359
- * #PSA_ALG_IS_AEAD(\p aead_alg) is true).
1360
- * \param min_tag_length Desired minimum length of the authentication tag in
1361
- * bytes. This must be at least 1 and at most the largest
1362
- * allowed tag length of the algorithm.
1363
- *
1364
- * \return The corresponding AEAD wildcard algorithm with the
1365
- * specified minimum length.
1366
- * \return Unspecified if \p aead_alg is not a supported
1367
- * AEAD algorithm or if \p min_tag_length is less than 1
1368
- * or too large for the specified AEAD algorithm.
1369
- */
1370
- #define PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(aead_alg, min_tag_length) \
1371
- (PSA_ALG_AEAD_WITH_SHORTENED_TAG(aead_alg, min_tag_length) | \
1372
- PSA_ALG_AEAD_AT_LEAST_THIS_LENGTH_FLAG)
1373
-
1374
- #define PSA_ALG_RSA_PKCS1V15_SIGN_BASE ((psa_algorithm_t) 0x06000200)
1375
- /** RSA PKCS#1 v1.5 signature with hashing.
1376
- *
1377
- * This is the signature scheme defined by RFC 8017
1378
- * (PKCS#1: RSA Cryptography Specifications) under the name
1379
- * RSASSA-PKCS1-v1_5.
1380
- *
1381
- * \param hash_alg A hash algorithm (\c PSA_ALG_XXX value such that
1382
- * #PSA_ALG_IS_HASH(\p hash_alg) is true).
1383
- * This includes #PSA_ALG_ANY_HASH
1384
- * when specifying the algorithm in a usage policy.
1385
- *
1386
- * \return The corresponding RSA PKCS#1 v1.5 signature algorithm.
1387
- * \return Unspecified if \p hash_alg is not a supported
1388
- * hash algorithm.
1389
- */
1390
- #define PSA_ALG_RSA_PKCS1V15_SIGN(hash_alg) \
1391
- (PSA_ALG_RSA_PKCS1V15_SIGN_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1392
- /** Raw PKCS#1 v1.5 signature.
1393
- *
1394
- * The input to this algorithm is the DigestInfo structure used by
1395
- * RFC 8017 (PKCS#1: RSA Cryptography Specifications), &sect;9.2
1396
- * steps 3&ndash;6.
1397
- */
1398
- #define PSA_ALG_RSA_PKCS1V15_SIGN_RAW PSA_ALG_RSA_PKCS1V15_SIGN_BASE
1399
- #define PSA_ALG_IS_RSA_PKCS1V15_SIGN(alg) \
1400
- (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_RSA_PKCS1V15_SIGN_BASE)
1401
-
1402
- #define PSA_ALG_RSA_PSS_BASE ((psa_algorithm_t) 0x06000300)
1403
- #define PSA_ALG_RSA_PSS_ANY_SALT_BASE ((psa_algorithm_t) 0x06001300)
1404
- /** RSA PSS signature with hashing.
1405
- *
1406
- * This is the signature scheme defined by RFC 8017
1407
- * (PKCS#1: RSA Cryptography Specifications) under the name
1408
- * RSASSA-PSS, with the message generation function MGF1, and with
1409
- * a salt length equal to the length of the hash, or the largest
1410
- * possible salt length for the algorithm and key size if that is
1411
- * smaller than the hash length. The specified hash algorithm is
1412
- * used to hash the input message, to create the salted hash, and
1413
- * for the mask generation.
1414
- *
1415
- * \param hash_alg A hash algorithm (\c PSA_ALG_XXX value such that
1416
- * #PSA_ALG_IS_HASH(\p hash_alg) is true).
1417
- * This includes #PSA_ALG_ANY_HASH
1418
- * when specifying the algorithm in a usage policy.
1419
- *
1420
- * \return The corresponding RSA PSS signature algorithm.
1421
- * \return Unspecified if \p hash_alg is not a supported
1422
- * hash algorithm.
1423
- */
1424
- #define PSA_ALG_RSA_PSS(hash_alg) \
1425
- (PSA_ALG_RSA_PSS_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1426
-
1427
- /** RSA PSS signature with hashing with relaxed verification.
1428
- *
1429
- * This algorithm has the same behavior as #PSA_ALG_RSA_PSS when signing,
1430
- * but allows an arbitrary salt length (including \c 0) when verifying a
1431
- * signature.
1432
- *
1433
- * \param hash_alg A hash algorithm (\c PSA_ALG_XXX value such that
1434
- * #PSA_ALG_IS_HASH(\p hash_alg) is true).
1435
- * This includes #PSA_ALG_ANY_HASH
1436
- * when specifying the algorithm in a usage policy.
1437
- *
1438
- * \return The corresponding RSA PSS signature algorithm.
1439
- * \return Unspecified if \p hash_alg is not a supported
1440
- * hash algorithm.
1441
- */
1442
- #define PSA_ALG_RSA_PSS_ANY_SALT(hash_alg) \
1443
- (PSA_ALG_RSA_PSS_ANY_SALT_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1444
-
1445
- /** Whether the specified algorithm is RSA PSS with standard salt.
1446
- *
1447
- * \param alg An algorithm value or an algorithm policy wildcard.
1448
- *
1449
- * \return 1 if \p alg is of the form
1450
- * #PSA_ALG_RSA_PSS(\c hash_alg),
1451
- * where \c hash_alg is a hash algorithm or
1452
- * #PSA_ALG_ANY_HASH. 0 otherwise.
1453
- * This macro may return either 0 or 1 if \p alg is not
1454
- * a supported algorithm identifier or policy.
1455
- */
1456
- #define PSA_ALG_IS_RSA_PSS_STANDARD_SALT(alg) \
1457
- (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_RSA_PSS_BASE)
1458
-
1459
- /** Whether the specified algorithm is RSA PSS with any salt.
1460
- *
1461
- * \param alg An algorithm value or an algorithm policy wildcard.
1462
- *
1463
- * \return 1 if \p alg is of the form
1464
- * #PSA_ALG_RSA_PSS_ANY_SALT_BASE(\c hash_alg),
1465
- * where \c hash_alg is a hash algorithm or
1466
- * #PSA_ALG_ANY_HASH. 0 otherwise.
1467
- * This macro may return either 0 or 1 if \p alg is not
1468
- * a supported algorithm identifier or policy.
1469
- */
1470
- #define PSA_ALG_IS_RSA_PSS_ANY_SALT(alg) \
1471
- (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_RSA_PSS_ANY_SALT_BASE)
1472
-
1473
- /** Whether the specified algorithm is RSA PSS.
1474
- *
1475
- * This includes any of the RSA PSS algorithm variants, regardless of the
1476
- * constraints on salt length.
1477
- *
1478
- * \param alg An algorithm value or an algorithm policy wildcard.
1479
- *
1480
- * \return 1 if \p alg is of the form
1481
- * #PSA_ALG_RSA_PSS(\c hash_alg) or
1482
- * #PSA_ALG_RSA_PSS_ANY_SALT_BASE(\c hash_alg),
1483
- * where \c hash_alg is a hash algorithm or
1484
- * #PSA_ALG_ANY_HASH. 0 otherwise.
1485
- * This macro may return either 0 or 1 if \p alg is not
1486
- * a supported algorithm identifier or policy.
1487
- */
1488
- #define PSA_ALG_IS_RSA_PSS(alg) \
1489
- (PSA_ALG_IS_RSA_PSS_STANDARD_SALT(alg) || \
1490
- PSA_ALG_IS_RSA_PSS_ANY_SALT(alg))
1491
-
1492
- #define PSA_ALG_ECDSA_BASE ((psa_algorithm_t) 0x06000600)
1493
- /** ECDSA signature with hashing.
1494
- *
1495
- * This is the ECDSA signature scheme defined by ANSI X9.62,
1496
- * with a random per-message secret number (*k*).
1497
- *
1498
- * The representation of the signature as a byte string consists of
1499
- * the concatenation of the signature values *r* and *s*. Each of
1500
- * *r* and *s* is encoded as an *N*-octet string, where *N* is the length
1501
- * of the base point of the curve in octets. Each value is represented
1502
- * in big-endian order (most significant octet first).
1503
- *
1504
- * \param hash_alg A hash algorithm (\c PSA_ALG_XXX value such that
1505
- * #PSA_ALG_IS_HASH(\p hash_alg) is true).
1506
- * This includes #PSA_ALG_ANY_HASH
1507
- * when specifying the algorithm in a usage policy.
1508
- *
1509
- * \return The corresponding ECDSA signature algorithm.
1510
- * \return Unspecified if \p hash_alg is not a supported
1511
- * hash algorithm.
1512
- */
1513
- #define PSA_ALG_ECDSA(hash_alg) \
1514
- (PSA_ALG_ECDSA_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1515
- /** ECDSA signature without hashing.
1516
- *
1517
- * This is the same signature scheme as #PSA_ALG_ECDSA(), but
1518
- * without specifying a hash algorithm. This algorithm may only be
1519
- * used to sign or verify a sequence of bytes that should be an
1520
- * already-calculated hash. Note that the input is padded with
1521
- * zeros on the left or truncated on the left as required to fit
1522
- * the curve size.
1523
- */
1524
- #define PSA_ALG_ECDSA_ANY PSA_ALG_ECDSA_BASE
1525
- #define PSA_ALG_DETERMINISTIC_ECDSA_BASE ((psa_algorithm_t) 0x06000700)
1526
- /** Deterministic ECDSA signature with hashing.
1527
- *
1528
- * This is the deterministic ECDSA signature scheme defined by RFC 6979.
1529
- *
1530
- * The representation of a signature is the same as with #PSA_ALG_ECDSA().
1531
- *
1532
- * Note that when this algorithm is used for verification, signatures
1533
- * made with randomized ECDSA (#PSA_ALG_ECDSA(\p hash_alg)) with the
1534
- * same private key are accepted. In other words,
1535
- * #PSA_ALG_DETERMINISTIC_ECDSA(\p hash_alg) differs from
1536
- * #PSA_ALG_ECDSA(\p hash_alg) only for signature, not for verification.
1537
- *
1538
- * \param hash_alg A hash algorithm (\c PSA_ALG_XXX value such that
1539
- * #PSA_ALG_IS_HASH(\p hash_alg) is true).
1540
- * This includes #PSA_ALG_ANY_HASH
1541
- * when specifying the algorithm in a usage policy.
1542
- *
1543
- * \return The corresponding deterministic ECDSA signature
1544
- * algorithm.
1545
- * \return Unspecified if \p hash_alg is not a supported
1546
- * hash algorithm.
1547
- */
1548
- #define PSA_ALG_DETERMINISTIC_ECDSA(hash_alg) \
1549
- (PSA_ALG_DETERMINISTIC_ECDSA_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1550
- #define PSA_ALG_ECDSA_DETERMINISTIC_FLAG ((psa_algorithm_t) 0x00000100)
1551
- #define PSA_ALG_IS_ECDSA(alg) \
1552
- (((alg) & ~PSA_ALG_HASH_MASK & ~PSA_ALG_ECDSA_DETERMINISTIC_FLAG) == \
1553
- PSA_ALG_ECDSA_BASE)
1554
- #define PSA_ALG_ECDSA_IS_DETERMINISTIC(alg) \
1555
- (((alg) & PSA_ALG_ECDSA_DETERMINISTIC_FLAG) != 0)
1556
- #define PSA_ALG_IS_DETERMINISTIC_ECDSA(alg) \
1557
- (PSA_ALG_IS_ECDSA(alg) && PSA_ALG_ECDSA_IS_DETERMINISTIC(alg))
1558
- #define PSA_ALG_IS_RANDOMIZED_ECDSA(alg) \
1559
- (PSA_ALG_IS_ECDSA(alg) && !PSA_ALG_ECDSA_IS_DETERMINISTIC(alg))
1560
-
1561
- /** Edwards-curve digital signature algorithm without prehashing (PureEdDSA),
1562
- * using standard parameters.
1563
- *
1564
- * Contexts are not supported in the current version of this specification
1565
- * because there is no suitable signature interface that can take the
1566
- * context as a parameter. A future version of this specification may add
1567
- * suitable functions and extend this algorithm to support contexts.
1568
- *
1569
- * PureEdDSA requires an elliptic curve key on a twisted Edwards curve.
1570
- * In this specification, the following curves are supported:
1571
- * - #PSA_ECC_FAMILY_TWISTED_EDWARDS, 255-bit: Ed25519 as specified
1572
- * in RFC 8032.
1573
- * The curve is Edwards25519.
1574
- * The hash function used internally is SHA-512.
1575
- * - #PSA_ECC_FAMILY_TWISTED_EDWARDS, 448-bit: Ed448 as specified
1576
- * in RFC 8032.
1577
- * The curve is Edwards448.
1578
- * The hash function used internally is the first 114 bytes of the
1579
- * SHAKE256 output.
1580
- *
1581
- * This algorithm can be used with psa_sign_message() and
1582
- * psa_verify_message(). Since there is no prehashing, it cannot be used
1583
- * with psa_sign_hash() or psa_verify_hash().
1584
- *
1585
- * The signature format is the concatenation of R and S as defined by
1586
- * RFC 8032 §5.1.6 and §5.2.6 (a 64-byte string for Ed25519, a 114-byte
1587
- * string for Ed448).
1588
- */
1589
- #define PSA_ALG_PURE_EDDSA ((psa_algorithm_t) 0x06000800)
1590
-
1591
- #define PSA_ALG_HASH_EDDSA_BASE ((psa_algorithm_t) 0x06000900)
1592
- #define PSA_ALG_IS_HASH_EDDSA(alg) \
1593
- (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HASH_EDDSA_BASE)
1594
-
1595
- /** Edwards-curve digital signature algorithm with prehashing (HashEdDSA),
1596
- * using SHA-512 and the Edwards25519 curve.
1597
- *
1598
- * See #PSA_ALG_PURE_EDDSA regarding context support and the signature format.
1599
- *
1600
- * This algorithm is Ed25519 as specified in RFC 8032.
1601
- * The curve is Edwards25519.
1602
- * The prehash is SHA-512.
1603
- * The hash function used internally is SHA-512.
1604
- *
1605
- * This is a hash-and-sign algorithm: to calculate a signature,
1606
- * you can either:
1607
- * - call psa_sign_message() on the message;
1608
- * - or calculate the SHA-512 hash of the message
1609
- * with psa_hash_compute()
1610
- * or with a multi-part hash operation started with psa_hash_setup(),
1611
- * using the hash algorithm #PSA_ALG_SHA_512,
1612
- * then sign the calculated hash with psa_sign_hash().
1613
- * Verifying a signature is similar, using psa_verify_message() or
1614
- * psa_verify_hash() instead of the signature function.
1615
- */
1616
- #define PSA_ALG_ED25519PH \
1617
- (PSA_ALG_HASH_EDDSA_BASE | (PSA_ALG_SHA_512 & PSA_ALG_HASH_MASK))
1618
-
1619
- /** Edwards-curve digital signature algorithm with prehashing (HashEdDSA),
1620
- * using SHAKE256 and the Edwards448 curve.
1621
- *
1622
- * See #PSA_ALG_PURE_EDDSA regarding context support and the signature format.
1623
- *
1624
- * This algorithm is Ed448 as specified in RFC 8032.
1625
- * The curve is Edwards448.
1626
- * The prehash is the first 64 bytes of the SHAKE256 output.
1627
- * The hash function used internally is the first 114 bytes of the
1628
- * SHAKE256 output.
1629
- *
1630
- * This is a hash-and-sign algorithm: to calculate a signature,
1631
- * you can either:
1632
- * - call psa_sign_message() on the message;
1633
- * - or calculate the first 64 bytes of the SHAKE256 output of the message
1634
- * with psa_hash_compute()
1635
- * or with a multi-part hash operation started with psa_hash_setup(),
1636
- * using the hash algorithm #PSA_ALG_SHAKE256_512,
1637
- * then sign the calculated hash with psa_sign_hash().
1638
- * Verifying a signature is similar, using psa_verify_message() or
1639
- * psa_verify_hash() instead of the signature function.
1640
- */
1641
- #define PSA_ALG_ED448PH \
1642
- (PSA_ALG_HASH_EDDSA_BASE | (PSA_ALG_SHAKE256_512 & PSA_ALG_HASH_MASK))
1643
-
1644
- /* Default definition, to be overridden if the library is extended with
1645
- * more hash-and-sign algorithms that we want to keep out of this header
1646
- * file. */
1647
- #define PSA_ALG_IS_VENDOR_HASH_AND_SIGN(alg) 0
1648
-
1649
- /** Whether the specified algorithm is a signature algorithm that can be used
1650
- * with psa_sign_hash() and psa_verify_hash().
1651
- *
1652
- * This encompasses all strict hash-and-sign algorithms categorized by
1653
- * PSA_ALG_IS_HASH_AND_SIGN(), as well as algorithms that follow the
1654
- * paradigm more loosely:
1655
- * - #PSA_ALG_RSA_PKCS1V15_SIGN_RAW (expects its input to be an encoded hash)
1656
- * - #PSA_ALG_ECDSA_ANY (doesn't specify what kind of hash the input is)
1657
- *
1658
- * \param alg An algorithm identifier (value of type psa_algorithm_t).
1659
- *
1660
- * \return 1 if alg is a signature algorithm that can be used to sign a
1661
- * hash. 0 if alg is a signature algorithm that can only be used
1662
- * to sign a message. 0 if alg is not a signature algorithm.
1663
- * This macro can return either 0 or 1 if alg is not a
1664
- * supported algorithm identifier.
1665
- */
1666
- #define PSA_ALG_IS_SIGN_HASH(alg) \
1667
- (PSA_ALG_IS_RSA_PSS(alg) || PSA_ALG_IS_RSA_PKCS1V15_SIGN(alg) || \
1668
- PSA_ALG_IS_ECDSA(alg) || PSA_ALG_IS_HASH_EDDSA(alg) || \
1669
- PSA_ALG_IS_VENDOR_HASH_AND_SIGN(alg))
1670
-
1671
- /** Whether the specified algorithm is a signature algorithm that can be used
1672
- * with psa_sign_message() and psa_verify_message().
1673
- *
1674
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
1675
- *
1676
- * \return 1 if alg is a signature algorithm that can be used to sign a
1677
- * message. 0 if \p alg is a signature algorithm that can only be used
1678
- * to sign an already-calculated hash. 0 if \p alg is not a signature
1679
- * algorithm. This macro can return either 0 or 1 if \p alg is not a
1680
- * supported algorithm identifier.
1681
- */
1682
- #define PSA_ALG_IS_SIGN_MESSAGE(alg) \
1683
- (PSA_ALG_IS_SIGN_HASH(alg) || (alg) == PSA_ALG_PURE_EDDSA)
1684
-
1685
- /** Whether the specified algorithm is a hash-and-sign algorithm.
1686
- *
1687
- * Hash-and-sign algorithms are asymmetric (public-key) signature algorithms
1688
- * structured in two parts: first the calculation of a hash in a way that
1689
- * does not depend on the key, then the calculation of a signature from the
1690
- * hash value and the key. Hash-and-sign algorithms encode the hash
1691
- * used for the hashing step, and you can call #PSA_ALG_SIGN_GET_HASH
1692
- * to extract this algorithm.
1693
- *
1694
- * Thus, for a hash-and-sign algorithm,
1695
- * `psa_sign_message(key, alg, input, ...)` is equivalent to
1696
- * ```
1697
- * psa_hash_compute(PSA_ALG_SIGN_GET_HASH(alg), input, ..., hash, ...);
1698
- * psa_sign_hash(key, alg, hash, ..., signature, ...);
1699
- * ```
1700
- * Most usefully, separating the hash from the signature allows the hash
1701
- * to be calculated in multiple steps with psa_hash_setup(), psa_hash_update()
1702
- * and psa_hash_finish(). Likewise psa_verify_message() is equivalent to
1703
- * calculating the hash and then calling psa_verify_hash().
1704
- *
1705
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
1706
- *
1707
- * \return 1 if \p alg is a hash-and-sign algorithm, 0 otherwise.
1708
- * This macro may return either 0 or 1 if \p alg is not a supported
1709
- * algorithm identifier.
1710
- */
1711
- #define PSA_ALG_IS_HASH_AND_SIGN(alg) \
1712
- (PSA_ALG_IS_SIGN_HASH(alg) && \
1713
- ((alg) & PSA_ALG_HASH_MASK) != 0)
1714
-
1715
- /** Get the hash used by a hash-and-sign signature algorithm.
1716
- *
1717
- * A hash-and-sign algorithm is a signature algorithm which is
1718
- * composed of two phases: first a hashing phase which does not use
1719
- * the key and produces a hash of the input message, then a signing
1720
- * phase which only uses the hash and the key and not the message
1721
- * itself.
1722
- *
1723
- * \param alg A signature algorithm (\c PSA_ALG_XXX value such that
1724
- * #PSA_ALG_IS_SIGN(\p alg) is true).
1725
- *
1726
- * \return The underlying hash algorithm if \p alg is a hash-and-sign
1727
- * algorithm.
1728
- * \return 0 if \p alg is a signature algorithm that does not
1729
- * follow the hash-and-sign structure.
1730
- * \return Unspecified if \p alg is not a signature algorithm or
1731
- * if it is not supported by the implementation.
1732
- */
1733
- #define PSA_ALG_SIGN_GET_HASH(alg) \
1734
- (PSA_ALG_IS_HASH_AND_SIGN(alg) ? \
1735
- ((alg) & PSA_ALG_HASH_MASK) | PSA_ALG_CATEGORY_HASH : \
1736
- 0)
1737
-
1738
- /** RSA PKCS#1 v1.5 encryption.
1739
- */
1740
- #define PSA_ALG_RSA_PKCS1V15_CRYPT ((psa_algorithm_t) 0x07000200)
1741
-
1742
- #define PSA_ALG_RSA_OAEP_BASE ((psa_algorithm_t) 0x07000300)
1743
- /** RSA OAEP encryption.
1744
- *
1745
- * This is the encryption scheme defined by RFC 8017
1746
- * (PKCS#1: RSA Cryptography Specifications) under the name
1747
- * RSAES-OAEP, with the message generation function MGF1.
1748
- *
1749
- * \param hash_alg The hash algorithm (\c PSA_ALG_XXX value such that
1750
- * #PSA_ALG_IS_HASH(\p hash_alg) is true) to use
1751
- * for MGF1.
1752
- *
1753
- * \return The corresponding RSA OAEP encryption algorithm.
1754
- * \return Unspecified if \p hash_alg is not a supported
1755
- * hash algorithm.
1756
- */
1757
- #define PSA_ALG_RSA_OAEP(hash_alg) \
1758
- (PSA_ALG_RSA_OAEP_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1759
- #define PSA_ALG_IS_RSA_OAEP(alg) \
1760
- (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_RSA_OAEP_BASE)
1761
- #define PSA_ALG_RSA_OAEP_GET_HASH(alg) \
1762
- (PSA_ALG_IS_RSA_OAEP(alg) ? \
1763
- ((alg) & PSA_ALG_HASH_MASK) | PSA_ALG_CATEGORY_HASH : \
1764
- 0)
1765
-
1766
- #define PSA_ALG_HKDF_BASE ((psa_algorithm_t) 0x08000100)
1767
- /** Macro to build an HKDF algorithm.
1768
- *
1769
- * For example, `PSA_ALG_HKDF(PSA_ALG_SHA_256)` is HKDF using HMAC-SHA-256.
1770
- *
1771
- * This key derivation algorithm uses the following inputs:
1772
- * - #PSA_KEY_DERIVATION_INPUT_SALT is the salt used in the "extract" step.
1773
- * It is optional; if omitted, the derivation uses an empty salt.
1774
- * - #PSA_KEY_DERIVATION_INPUT_SECRET is the secret key used in the "extract" step.
1775
- * - #PSA_KEY_DERIVATION_INPUT_INFO is the info string used in the "expand" step.
1776
- * You must pass #PSA_KEY_DERIVATION_INPUT_SALT before #PSA_KEY_DERIVATION_INPUT_SECRET.
1777
- * You may pass #PSA_KEY_DERIVATION_INPUT_INFO at any time after steup and before
1778
- * starting to generate output.
1779
- *
1780
- * \warning HKDF processes the salt as follows: first hash it with hash_alg
1781
- * if the salt is longer than the block size of the hash algorithm; then
1782
- * pad with null bytes up to the block size. As a result, it is possible
1783
- * for distinct salt inputs to result in the same outputs. To ensure
1784
- * unique outputs, it is recommended to use a fixed length for salt values.
1785
- *
1786
- * \param hash_alg A hash algorithm (\c PSA_ALG_XXX value such that
1787
- * #PSA_ALG_IS_HASH(\p hash_alg) is true).
1788
- *
1789
- * \return The corresponding HKDF algorithm.
1790
- * \return Unspecified if \p hash_alg is not a supported
1791
- * hash algorithm.
1792
- */
1793
- #define PSA_ALG_HKDF(hash_alg) \
1794
- (PSA_ALG_HKDF_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1795
- /** Whether the specified algorithm is an HKDF algorithm.
1796
- *
1797
- * HKDF is a family of key derivation algorithms that are based on a hash
1798
- * function and the HMAC construction.
1799
- *
1800
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
1801
- *
1802
- * \return 1 if \c alg is an HKDF algorithm, 0 otherwise.
1803
- * This macro may return either 0 or 1 if \c alg is not a supported
1804
- * key derivation algorithm identifier.
1805
- */
1806
- #define PSA_ALG_IS_HKDF(alg) \
1807
- (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HKDF_BASE)
1808
- #define PSA_ALG_HKDF_GET_HASH(hkdf_alg) \
1809
- (PSA_ALG_CATEGORY_HASH | ((hkdf_alg) & PSA_ALG_HASH_MASK))
1810
-
1811
- #define PSA_ALG_HKDF_EXTRACT_BASE ((psa_algorithm_t) 0x08000400)
1812
- /** Macro to build an HKDF-Extract algorithm.
1813
- *
1814
- * For example, `PSA_ALG_HKDF_EXTRACT(PSA_ALG_SHA_256)` is
1815
- * HKDF-Extract using HMAC-SHA-256.
1816
- *
1817
- * This key derivation algorithm uses the following inputs:
1818
- * - PSA_KEY_DERIVATION_INPUT_SALT is the salt.
1819
- * - PSA_KEY_DERIVATION_INPUT_SECRET is the input keying material used in the
1820
- * "extract" step.
1821
- * The inputs are mandatory and must be passed in the order above.
1822
- * Each input may only be passed once.
1823
- *
1824
- * \warning HKDF-Extract is not meant to be used on its own. PSA_ALG_HKDF
1825
- * should be used instead if possible. PSA_ALG_HKDF_EXTRACT is provided
1826
- * as a separate algorithm for the sake of protocols that use it as a
1827
- * building block. It may also be a slight performance optimization
1828
- * in applications that use HKDF with the same salt and key but many
1829
- * different info strings.
1830
- *
1831
- * \warning HKDF processes the salt as follows: first hash it with hash_alg
1832
- * if the salt is longer than the block size of the hash algorithm; then
1833
- * pad with null bytes up to the block size. As a result, it is possible
1834
- * for distinct salt inputs to result in the same outputs. To ensure
1835
- * unique outputs, it is recommended to use a fixed length for salt values.
1836
- *
1837
- * \param hash_alg A hash algorithm (\c PSA_ALG_XXX value such that
1838
- * #PSA_ALG_IS_HASH(\p hash_alg) is true).
1839
- *
1840
- * \return The corresponding HKDF-Extract algorithm.
1841
- * \return Unspecified if \p hash_alg is not a supported
1842
- * hash algorithm.
1843
- */
1844
- #define PSA_ALG_HKDF_EXTRACT(hash_alg) \
1845
- (PSA_ALG_HKDF_EXTRACT_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1846
- /** Whether the specified algorithm is an HKDF-Extract algorithm.
1847
- *
1848
- * HKDF-Extract is a family of key derivation algorithms that are based
1849
- * on a hash function and the HMAC construction.
1850
- *
1851
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
1852
- *
1853
- * \return 1 if \c alg is an HKDF-Extract algorithm, 0 otherwise.
1854
- * This macro may return either 0 or 1 if \c alg is not a supported
1855
- * key derivation algorithm identifier.
1856
- */
1857
- #define PSA_ALG_IS_HKDF_EXTRACT(alg) \
1858
- (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HKDF_EXTRACT_BASE)
1859
-
1860
- #define PSA_ALG_HKDF_EXPAND_BASE ((psa_algorithm_t) 0x08000500)
1861
- /** Macro to build an HKDF-Expand algorithm.
1862
- *
1863
- * For example, `PSA_ALG_HKDF_EXPAND(PSA_ALG_SHA_256)` is
1864
- * HKDF-Expand using HMAC-SHA-256.
1865
- *
1866
- * This key derivation algorithm uses the following inputs:
1867
- * - PSA_KEY_DERIVATION_INPUT_SECRET is the pseudorandom key (PRK).
1868
- * - PSA_KEY_DERIVATION_INPUT_INFO is the info string.
1869
- *
1870
- * The inputs are mandatory and must be passed in the order above.
1871
- * Each input may only be passed once.
1872
- *
1873
- * \warning HKDF-Expand is not meant to be used on its own. `PSA_ALG_HKDF`
1874
- * should be used instead if possible. `PSA_ALG_HKDF_EXPAND` is provided as
1875
- * a separate algorithm for the sake of protocols that use it as a building
1876
- * block. It may also be a slight performance optimization in applications
1877
- * that use HKDF with the same salt and key but many different info strings.
1878
- *
1879
- * \param hash_alg A hash algorithm (\c PSA_ALG_XXX value such that
1880
- * #PSA_ALG_IS_HASH(\p hash_alg) is true).
1881
- *
1882
- * \return The corresponding HKDF-Expand algorithm.
1883
- * \return Unspecified if \p hash_alg is not a supported
1884
- * hash algorithm.
1885
- */
1886
- #define PSA_ALG_HKDF_EXPAND(hash_alg) \
1887
- (PSA_ALG_HKDF_EXPAND_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1888
- /** Whether the specified algorithm is an HKDF-Expand algorithm.
1889
- *
1890
- * HKDF-Expand is a family of key derivation algorithms that are based
1891
- * on a hash function and the HMAC construction.
1892
- *
1893
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
1894
- *
1895
- * \return 1 if \c alg is an HKDF-Expand algorithm, 0 otherwise.
1896
- * This macro may return either 0 or 1 if \c alg is not a supported
1897
- * key derivation algorithm identifier.
1898
- */
1899
- #define PSA_ALG_IS_HKDF_EXPAND(alg) \
1900
- (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HKDF_EXPAND_BASE)
1901
-
1902
- /** Whether the specified algorithm is an HKDF or HKDF-Extract or
1903
- * HKDF-Expand algorithm.
1904
- *
1905
- *
1906
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
1907
- *
1908
- * \return 1 if \c alg is any HKDF type algorithm, 0 otherwise.
1909
- * This macro may return either 0 or 1 if \c alg is not a supported
1910
- * key derivation algorithm identifier.
1911
- */
1912
- #define PSA_ALG_IS_ANY_HKDF(alg) \
1913
- (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HKDF_BASE || \
1914
- ((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HKDF_EXTRACT_BASE || \
1915
- ((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HKDF_EXPAND_BASE)
1916
-
1917
- #define PSA_ALG_TLS12_PRF_BASE ((psa_algorithm_t) 0x08000200)
1918
- /** Macro to build a TLS-1.2 PRF algorithm.
1919
- *
1920
- * TLS 1.2 uses a custom pseudorandom function (PRF) for key schedule,
1921
- * specified in Section 5 of RFC 5246. It is based on HMAC and can be
1922
- * used with either SHA-256 or SHA-384.
1923
- *
1924
- * This key derivation algorithm uses the following inputs, which must be
1925
- * passed in the order given here:
1926
- * - #PSA_KEY_DERIVATION_INPUT_SEED is the seed.
1927
- * - #PSA_KEY_DERIVATION_INPUT_SECRET is the secret key.
1928
- * - #PSA_KEY_DERIVATION_INPUT_LABEL is the label.
1929
- *
1930
- * For the application to TLS-1.2 key expansion, the seed is the
1931
- * concatenation of ServerHello.Random + ClientHello.Random,
1932
- * and the label is "key expansion".
1933
- *
1934
- * For example, `PSA_ALG_TLS12_PRF(PSA_ALG_SHA_256)` represents the
1935
- * TLS 1.2 PRF using HMAC-SHA-256.
1936
- *
1937
- * \param hash_alg A hash algorithm (\c PSA_ALG_XXX value such that
1938
- * #PSA_ALG_IS_HASH(\p hash_alg) is true).
1939
- *
1940
- * \return The corresponding TLS-1.2 PRF algorithm.
1941
- * \return Unspecified if \p hash_alg is not a supported
1942
- * hash algorithm.
1943
- */
1944
- #define PSA_ALG_TLS12_PRF(hash_alg) \
1945
- (PSA_ALG_TLS12_PRF_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
1946
-
1947
- /** Whether the specified algorithm is a TLS-1.2 PRF algorithm.
1948
- *
1949
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
1950
- *
1951
- * \return 1 if \c alg is a TLS-1.2 PRF algorithm, 0 otherwise.
1952
- * This macro may return either 0 or 1 if \c alg is not a supported
1953
- * key derivation algorithm identifier.
1954
- */
1955
- #define PSA_ALG_IS_TLS12_PRF(alg) \
1956
- (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_TLS12_PRF_BASE)
1957
- #define PSA_ALG_TLS12_PRF_GET_HASH(hkdf_alg) \
1958
- (PSA_ALG_CATEGORY_HASH | ((hkdf_alg) & PSA_ALG_HASH_MASK))
1959
-
1960
- #define PSA_ALG_TLS12_PSK_TO_MS_BASE ((psa_algorithm_t) 0x08000300)
1961
- /** Macro to build a TLS-1.2 PSK-to-MasterSecret algorithm.
1962
- *
1963
- * In a pure-PSK handshake in TLS 1.2, the master secret is derived
1964
- * from the PreSharedKey (PSK) through the application of padding
1965
- * (RFC 4279, Section 2) and the TLS-1.2 PRF (RFC 5246, Section 5).
1966
- * The latter is based on HMAC and can be used with either SHA-256
1967
- * or SHA-384.
1968
- *
1969
- * This key derivation algorithm uses the following inputs, which must be
1970
- * passed in the order given here:
1971
- * - #PSA_KEY_DERIVATION_INPUT_SEED is the seed.
1972
- * - #PSA_KEY_DERIVATION_INPUT_OTHER_SECRET is the other secret for the
1973
- * computation of the premaster secret. This input is optional;
1974
- * if omitted, it defaults to a string of null bytes with the same length
1975
- * as the secret (PSK) input.
1976
- * - #PSA_KEY_DERIVATION_INPUT_SECRET is the secret key.
1977
- * - #PSA_KEY_DERIVATION_INPUT_LABEL is the label.
1978
- *
1979
- * For the application to TLS-1.2, the seed (which is
1980
- * forwarded to the TLS-1.2 PRF) is the concatenation of the
1981
- * ClientHello.Random + ServerHello.Random,
1982
- * the label is "master secret" or "extended master secret" and
1983
- * the other secret depends on the key exchange specified in the cipher suite:
1984
- * - for a plain PSK cipher suite (RFC 4279, Section 2), omit
1985
- * PSA_KEY_DERIVATION_INPUT_OTHER_SECRET
1986
- * - for a DHE-PSK (RFC 4279, Section 3) or ECDHE-PSK cipher suite
1987
- * (RFC 5489, Section 2), the other secret should be the output of the
1988
- * PSA_ALG_FFDH or PSA_ALG_ECDH key agreement performed with the peer.
1989
- * The recommended way to pass this input is to use a key derivation
1990
- * algorithm constructed as
1991
- * PSA_ALG_KEY_AGREEMENT(ka_alg, PSA_ALG_TLS12_PSK_TO_MS(hash_alg))
1992
- * and to call psa_key_derivation_key_agreement(). Alternatively,
1993
- * this input may be an output of `psa_raw_key_agreement()` passed with
1994
- * psa_key_derivation_input_bytes(), or an equivalent input passed with
1995
- * psa_key_derivation_input_bytes() or psa_key_derivation_input_key().
1996
- * - for a RSA-PSK cipher suite (RFC 4279, Section 4), the other secret
1997
- * should be the 48-byte client challenge (the PreMasterSecret of
1998
- * (RFC 5246, Section 7.4.7.1)) concatenation of the TLS version and
1999
- * a 46-byte random string chosen by the client. On the server, this is
2000
- * typically an output of psa_asymmetric_decrypt() using
2001
- * PSA_ALG_RSA_PKCS1V15_CRYPT, passed to the key derivation operation
2002
- * with `psa_key_derivation_input_bytes()`.
2003
- *
2004
- * For example, `PSA_ALG_TLS12_PSK_TO_MS(PSA_ALG_SHA_256)` represents the
2005
- * TLS-1.2 PSK to MasterSecret derivation PRF using HMAC-SHA-256.
2006
- *
2007
- * \param hash_alg A hash algorithm (\c PSA_ALG_XXX value such that
2008
- * #PSA_ALG_IS_HASH(\p hash_alg) is true).
2009
- *
2010
- * \return The corresponding TLS-1.2 PSK to MS algorithm.
2011
- * \return Unspecified if \p hash_alg is not a supported
2012
- * hash algorithm.
2013
- */
2014
- #define PSA_ALG_TLS12_PSK_TO_MS(hash_alg) \
2015
- (PSA_ALG_TLS12_PSK_TO_MS_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
2016
-
2017
- /** Whether the specified algorithm is a TLS-1.2 PSK to MS algorithm.
2018
- *
2019
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
2020
- *
2021
- * \return 1 if \c alg is a TLS-1.2 PSK to MS algorithm, 0 otherwise.
2022
- * This macro may return either 0 or 1 if \c alg is not a supported
2023
- * key derivation algorithm identifier.
2024
- */
2025
- #define PSA_ALG_IS_TLS12_PSK_TO_MS(alg) \
2026
- (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_TLS12_PSK_TO_MS_BASE)
2027
- #define PSA_ALG_TLS12_PSK_TO_MS_GET_HASH(hkdf_alg) \
2028
- (PSA_ALG_CATEGORY_HASH | ((hkdf_alg) & PSA_ALG_HASH_MASK))
2029
-
2030
- /* The TLS 1.2 ECJPAKE-to-PMS KDF. It takes the shared secret K (an EC point
2031
- * in case of EC J-PAKE) and calculates SHA256(K.X) that the rest of TLS 1.2
2032
- * will use to derive the session secret, as defined by step 2 of
2033
- * https://datatracker.ietf.org/doc/html/draft-cragie-tls-ecjpake-01#section-8.7.
2034
- * Uses PSA_ALG_SHA_256.
2035
- * This function takes a single input:
2036
- * #PSA_KEY_DERIVATION_INPUT_SECRET is the shared secret K from EC J-PAKE.
2037
- * The only supported curve is secp256r1 (the 256-bit curve in
2038
- * #PSA_ECC_FAMILY_SECP_R1), so the input must be exactly 65 bytes.
2039
- * The output has to be read as a single chunk of 32 bytes, defined as
2040
- * PSA_TLS12_ECJPAKE_TO_PMS_DATA_SIZE.
2041
- */
2042
- #define PSA_ALG_TLS12_ECJPAKE_TO_PMS ((psa_algorithm_t) 0x08000609)
2043
-
2044
- /* This flag indicates whether the key derivation algorithm is suitable for
2045
- * use on low-entropy secrets such as password - these algorithms are also
2046
- * known as key stretching or password hashing schemes. These are also the
2047
- * algorithms that accepts inputs of type #PSA_KEY_DERIVATION_INPUT_PASSWORD.
2048
- *
2049
- * Those algorithms cannot be combined with a key agreement algorithm.
2050
- */
2051
- #define PSA_ALG_KEY_DERIVATION_STRETCHING_FLAG ((psa_algorithm_t) 0x00800000)
2052
-
2053
- #define PSA_ALG_PBKDF2_HMAC_BASE ((psa_algorithm_t) 0x08800100)
2054
- /** Macro to build a PBKDF2-HMAC password hashing / key stretching algorithm.
2055
- *
2056
- * PBKDF2 is defined by PKCS#5, republished as RFC 8018 (section 5.2).
2057
- * This macro specifies the PBKDF2 algorithm constructed using a PRF based on
2058
- * HMAC with the specified hash.
2059
- * For example, `PSA_ALG_PBKDF2_HMAC(PSA_ALG_SHA_256)` specifies PBKDF2
2060
- * using the PRF HMAC-SHA-256.
2061
- *
2062
- * This key derivation algorithm uses the following inputs, which must be
2063
- * provided in the following order:
2064
- * - #PSA_KEY_DERIVATION_INPUT_COST is the iteration count.
2065
- * This input step must be used exactly once.
2066
- * - #PSA_KEY_DERIVATION_INPUT_SALT is the salt.
2067
- * This input step must be used one or more times; if used several times, the
2068
- * inputs will be concatenated. This can be used to build the final salt
2069
- * from multiple sources, both public and secret (also known as pepper).
2070
- * - #PSA_KEY_DERIVATION_INPUT_PASSWORD is the password to be hashed.
2071
- * This input step must be used exactly once.
2072
- *
2073
- * \param hash_alg A hash algorithm (\c PSA_ALG_XXX value such that
2074
- * #PSA_ALG_IS_HASH(\p hash_alg) is true).
2075
- *
2076
- * \return The corresponding PBKDF2-HMAC-XXX algorithm.
2077
- * \return Unspecified if \p hash_alg is not a supported
2078
- * hash algorithm.
2079
- */
2080
- #define PSA_ALG_PBKDF2_HMAC(hash_alg) \
2081
- (PSA_ALG_PBKDF2_HMAC_BASE | ((hash_alg) & PSA_ALG_HASH_MASK))
2082
-
2083
- /** Whether the specified algorithm is a PBKDF2-HMAC algorithm.
2084
- *
2085
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
2086
- *
2087
- * \return 1 if \c alg is a PBKDF2-HMAC algorithm, 0 otherwise.
2088
- * This macro may return either 0 or 1 if \c alg is not a supported
2089
- * key derivation algorithm identifier.
2090
- */
2091
- #define PSA_ALG_IS_PBKDF2_HMAC(alg) \
2092
- (((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_PBKDF2_HMAC_BASE)
2093
- #define PSA_ALG_PBKDF2_HMAC_GET_HASH(pbkdf2_alg) \
2094
- (PSA_ALG_CATEGORY_HASH | ((pbkdf2_alg) & PSA_ALG_HASH_MASK))
2095
- /** The PBKDF2-AES-CMAC-PRF-128 password hashing / key stretching algorithm.
2096
- *
2097
- * PBKDF2 is defined by PKCS#5, republished as RFC 8018 (section 5.2).
2098
- * This macro specifies the PBKDF2 algorithm constructed using the
2099
- * AES-CMAC-PRF-128 PRF specified by RFC 4615.
2100
- *
2101
- * This key derivation algorithm uses the same inputs as
2102
- * #PSA_ALG_PBKDF2_HMAC() with the same constraints.
2103
- */
2104
- #define PSA_ALG_PBKDF2_AES_CMAC_PRF_128 ((psa_algorithm_t) 0x08800200)
2105
-
2106
- #define PSA_ALG_IS_PBKDF2(kdf_alg) \
2107
- (PSA_ALG_IS_PBKDF2_HMAC(kdf_alg) || \
2108
- ((kdf_alg) == PSA_ALG_PBKDF2_AES_CMAC_PRF_128))
2109
-
2110
- #define PSA_ALG_KEY_DERIVATION_MASK ((psa_algorithm_t) 0xfe00ffff)
2111
- #define PSA_ALG_KEY_AGREEMENT_MASK ((psa_algorithm_t) 0xffff0000)
2112
-
2113
- /** Macro to build a combined algorithm that chains a key agreement with
2114
- * a key derivation.
2115
- *
2116
- * \param ka_alg A key agreement algorithm (\c PSA_ALG_XXX value such
2117
- * that #PSA_ALG_IS_KEY_AGREEMENT(\p ka_alg) is true).
2118
- * \param kdf_alg A key derivation algorithm (\c PSA_ALG_XXX value such
2119
- * that #PSA_ALG_IS_KEY_DERIVATION(\p kdf_alg) is true).
2120
- *
2121
- * \return The corresponding key agreement and derivation
2122
- * algorithm.
2123
- * \return Unspecified if \p ka_alg is not a supported
2124
- * key agreement algorithm or \p kdf_alg is not a
2125
- * supported key derivation algorithm.
2126
- */
2127
- #define PSA_ALG_KEY_AGREEMENT(ka_alg, kdf_alg) \
2128
- ((ka_alg) | (kdf_alg))
2129
-
2130
- #define PSA_ALG_KEY_AGREEMENT_GET_KDF(alg) \
2131
- (((alg) & PSA_ALG_KEY_DERIVATION_MASK) | PSA_ALG_CATEGORY_KEY_DERIVATION)
2132
-
2133
- #define PSA_ALG_KEY_AGREEMENT_GET_BASE(alg) \
2134
- (((alg) & PSA_ALG_KEY_AGREEMENT_MASK) | PSA_ALG_CATEGORY_KEY_AGREEMENT)
2135
-
2136
- /** Whether the specified algorithm is a raw key agreement algorithm.
2137
- *
2138
- * A raw key agreement algorithm is one that does not specify
2139
- * a key derivation function.
2140
- * Usually, raw key agreement algorithms are constructed directly with
2141
- * a \c PSA_ALG_xxx macro while non-raw key agreement algorithms are
2142
- * constructed with #PSA_ALG_KEY_AGREEMENT().
2143
- *
2144
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
2145
- *
2146
- * \return 1 if \p alg is a raw key agreement algorithm, 0 otherwise.
2147
- * This macro may return either 0 or 1 if \p alg is not a supported
2148
- * algorithm identifier.
2149
- */
2150
- #define PSA_ALG_IS_RAW_KEY_AGREEMENT(alg) \
2151
- (PSA_ALG_IS_KEY_AGREEMENT(alg) && \
2152
- PSA_ALG_KEY_AGREEMENT_GET_KDF(alg) == PSA_ALG_CATEGORY_KEY_DERIVATION)
2153
-
2154
- #define PSA_ALG_IS_KEY_DERIVATION_OR_AGREEMENT(alg) \
2155
- ((PSA_ALG_IS_KEY_DERIVATION(alg) || PSA_ALG_IS_KEY_AGREEMENT(alg)))
2156
-
2157
- /** The finite-field Diffie-Hellman (DH) key agreement algorithm.
2158
- *
2159
- * The shared secret produced by key agreement is
2160
- * `g^{ab}` in big-endian format.
2161
- * It is `ceiling(m / 8)` bytes long where `m` is the size of the prime `p`
2162
- * in bits.
2163
- */
2164
- #define PSA_ALG_FFDH ((psa_algorithm_t) 0x09010000)
2165
-
2166
- /** Whether the specified algorithm is a finite field Diffie-Hellman algorithm.
2167
- *
2168
- * This includes the raw finite field Diffie-Hellman algorithm as well as
2169
- * finite-field Diffie-Hellman followed by any supporter key derivation
2170
- * algorithm.
2171
- *
2172
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
2173
- *
2174
- * \return 1 if \c alg is a finite field Diffie-Hellman algorithm, 0 otherwise.
2175
- * This macro may return either 0 or 1 if \c alg is not a supported
2176
- * key agreement algorithm identifier.
2177
- */
2178
- #define PSA_ALG_IS_FFDH(alg) \
2179
- (PSA_ALG_KEY_AGREEMENT_GET_BASE(alg) == PSA_ALG_FFDH)
2180
-
2181
- /** The elliptic curve Diffie-Hellman (ECDH) key agreement algorithm.
2182
- *
2183
- * The shared secret produced by key agreement is the x-coordinate of
2184
- * the shared secret point. It is always `ceiling(m / 8)` bytes long where
2185
- * `m` is the bit size associated with the curve, i.e. the bit size of the
2186
- * order of the curve's coordinate field. When `m` is not a multiple of 8,
2187
- * the byte containing the most significant bit of the shared secret
2188
- * is padded with zero bits. The byte order is either little-endian
2189
- * or big-endian depending on the curve type.
2190
- *
2191
- * - For Montgomery curves (curve types `PSA_ECC_FAMILY_CURVEXXX`),
2192
- * the shared secret is the x-coordinate of `d_A Q_B = d_B Q_A`
2193
- * in little-endian byte order.
2194
- * The bit size is 448 for Curve448 and 255 for Curve25519.
2195
- * - For Weierstrass curves over prime fields (curve types
2196
- * `PSA_ECC_FAMILY_SECPXXX` and `PSA_ECC_FAMILY_BRAINPOOL_PXXX`),
2197
- * the shared secret is the x-coordinate of `d_A Q_B = d_B Q_A`
2198
- * in big-endian byte order.
2199
- * The bit size is `m = ceiling(log_2(p))` for the field `F_p`.
2200
- * - For Weierstrass curves over binary fields (curve types
2201
- * `PSA_ECC_FAMILY_SECTXXX`),
2202
- * the shared secret is the x-coordinate of `d_A Q_B = d_B Q_A`
2203
- * in big-endian byte order.
2204
- * The bit size is `m` for the field `F_{2^m}`.
2205
- */
2206
- #define PSA_ALG_ECDH ((psa_algorithm_t) 0x09020000)
2207
-
2208
- /** Whether the specified algorithm is an elliptic curve Diffie-Hellman
2209
- * algorithm.
2210
- *
2211
- * This includes the raw elliptic curve Diffie-Hellman algorithm as well as
2212
- * elliptic curve Diffie-Hellman followed by any supporter key derivation
2213
- * algorithm.
2214
- *
2215
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
2216
- *
2217
- * \return 1 if \c alg is an elliptic curve Diffie-Hellman algorithm,
2218
- * 0 otherwise.
2219
- * This macro may return either 0 or 1 if \c alg is not a supported
2220
- * key agreement algorithm identifier.
2221
- */
2222
- #define PSA_ALG_IS_ECDH(alg) \
2223
- (PSA_ALG_KEY_AGREEMENT_GET_BASE(alg) == PSA_ALG_ECDH)
2224
-
2225
- /** Whether the specified algorithm encoding is a wildcard.
2226
- *
2227
- * Wildcard values may only be used to set the usage algorithm field in
2228
- * a policy, not to perform an operation.
2229
- *
2230
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
2231
- *
2232
- * \return 1 if \c alg is a wildcard algorithm encoding.
2233
- * \return 0 if \c alg is a non-wildcard algorithm encoding (suitable for
2234
- * an operation).
2235
- * \return This macro may return either 0 or 1 if \c alg is not a supported
2236
- * algorithm identifier.
2237
- */
2238
- #define PSA_ALG_IS_WILDCARD(alg) \
2239
- (PSA_ALG_IS_HASH_AND_SIGN(alg) ? \
2240
- PSA_ALG_SIGN_GET_HASH(alg) == PSA_ALG_ANY_HASH : \
2241
- PSA_ALG_IS_MAC(alg) ? \
2242
- (alg & PSA_ALG_MAC_AT_LEAST_THIS_LENGTH_FLAG) != 0 : \
2243
- PSA_ALG_IS_AEAD(alg) ? \
2244
- (alg & PSA_ALG_AEAD_AT_LEAST_THIS_LENGTH_FLAG) != 0 : \
2245
- (alg) == PSA_ALG_ANY_HASH)
2246
-
2247
- /** Get the hash used by a composite algorithm.
2248
- *
2249
- * \param alg An algorithm identifier (value of type #psa_algorithm_t).
2250
- *
2251
- * \return The underlying hash algorithm if alg is a composite algorithm that
2252
- * uses a hash algorithm.
2253
- *
2254
- * \return \c 0 if alg is not a composite algorithm that uses a hash.
2255
- */
2256
- #define PSA_ALG_GET_HASH(alg) \
2257
- (((alg) & 0x000000ff) == 0 ? ((psa_algorithm_t) 0) : 0x02000000 | ((alg) & 0x000000ff))
2258
-
2259
- /**@}*/
2260
-
2261
- /** \defgroup key_lifetimes Key lifetimes
2262
- * @{
2263
- */
2264
-
2265
- /* Note that location and persistence level values are embedded in the
2266
- * persistent key store, as part of key metadata. As a consequence, they
2267
- * must not be changed (unless the storage format version changes).
2268
- */
2269
-
2270
- /** The default lifetime for volatile keys.
2271
- *
2272
- * A volatile key only exists as long as the identifier to it is not destroyed.
2273
- * The key material is guaranteed to be erased on a power reset.
2274
- *
2275
- * A key with this lifetime is typically stored in the RAM area of the
2276
- * PSA Crypto subsystem. However this is an implementation choice.
2277
- * If an implementation stores data about the key in a non-volatile memory,
2278
- * it must release all the resources associated with the key and erase the
2279
- * key material if the calling application terminates.
2280
- */
2281
- #define PSA_KEY_LIFETIME_VOLATILE ((psa_key_lifetime_t) 0x00000000)
2282
-
2283
- /** The default lifetime for persistent keys.
2284
- *
2285
- * A persistent key remains in storage until it is explicitly destroyed or
2286
- * until the corresponding storage area is wiped. This specification does
2287
- * not define any mechanism to wipe a storage area, but integrations may
2288
- * provide their own mechanism (for example to perform a factory reset,
2289
- * to prepare for device refurbishment, or to uninstall an application).
2290
- *
2291
- * This lifetime value is the default storage area for the calling
2292
- * application. Integrations of Mbed TLS may support other persistent lifetimes.
2293
- * See ::psa_key_lifetime_t for more information.
2294
- */
2295
- #define PSA_KEY_LIFETIME_PERSISTENT ((psa_key_lifetime_t) 0x00000001)
2296
-
2297
- /** The persistence level of volatile keys.
2298
- *
2299
- * See ::psa_key_persistence_t for more information.
2300
- */
2301
- #define PSA_KEY_PERSISTENCE_VOLATILE ((psa_key_persistence_t) 0x00)
2302
-
2303
- /** The default persistence level for persistent keys.
2304
- *
2305
- * See ::psa_key_persistence_t for more information.
2306
- */
2307
- #define PSA_KEY_PERSISTENCE_DEFAULT ((psa_key_persistence_t) 0x01)
2308
-
2309
- /** A persistence level indicating that a key is never destroyed.
2310
- *
2311
- * See ::psa_key_persistence_t for more information.
2312
- */
2313
- #define PSA_KEY_PERSISTENCE_READ_ONLY ((psa_key_persistence_t) 0xff)
2314
-
2315
- #define PSA_KEY_LIFETIME_GET_PERSISTENCE(lifetime) \
2316
- ((psa_key_persistence_t) ((lifetime) & 0x000000ff))
2317
-
2318
- #define PSA_KEY_LIFETIME_GET_LOCATION(lifetime) \
2319
- ((psa_key_location_t) ((lifetime) >> 8))
2320
-
2321
- /** Whether a key lifetime indicates that the key is volatile.
2322
- *
2323
- * A volatile key is automatically destroyed by the implementation when
2324
- * the application instance terminates. In particular, a volatile key
2325
- * is automatically destroyed on a power reset of the device.
2326
- *
2327
- * A key that is not volatile is persistent. Persistent keys are
2328
- * preserved until the application explicitly destroys them or until an
2329
- * implementation-specific device management event occurs (for example,
2330
- * a factory reset).
2331
- *
2332
- * \param lifetime The lifetime value to query (value of type
2333
- * ::psa_key_lifetime_t).
2334
- *
2335
- * \return \c 1 if the key is volatile, otherwise \c 0.
2336
- */
2337
- #define PSA_KEY_LIFETIME_IS_VOLATILE(lifetime) \
2338
- (PSA_KEY_LIFETIME_GET_PERSISTENCE(lifetime) == \
2339
- PSA_KEY_PERSISTENCE_VOLATILE)
2340
-
2341
- /** Whether a key lifetime indicates that the key is read-only.
2342
- *
2343
- * Read-only keys cannot be created or destroyed through the PSA Crypto API.
2344
- * They must be created through platform-specific means that bypass the API.
2345
- *
2346
- * Some platforms may offer ways to destroy read-only keys. For example,
2347
- * consider a platform with multiple levels of privilege, where a
2348
- * low-privilege application can use a key but is not allowed to destroy
2349
- * it, and the platform exposes the key to the application with a read-only
2350
- * lifetime. High-privilege code can destroy the key even though the
2351
- * application sees the key as read-only.
2352
- *
2353
- * \param lifetime The lifetime value to query (value of type
2354
- * ::psa_key_lifetime_t).
2355
- *
2356
- * \return \c 1 if the key is read-only, otherwise \c 0.
2357
- */
2358
- #define PSA_KEY_LIFETIME_IS_READ_ONLY(lifetime) \
2359
- (PSA_KEY_LIFETIME_GET_PERSISTENCE(lifetime) == \
2360
- PSA_KEY_PERSISTENCE_READ_ONLY)
2361
-
2362
- /** Construct a lifetime from a persistence level and a location.
2363
- *
2364
- * \param persistence The persistence level
2365
- * (value of type ::psa_key_persistence_t).
2366
- * \param location The location indicator
2367
- * (value of type ::psa_key_location_t).
2368
- *
2369
- * \return The constructed lifetime value.
2370
- */
2371
- #define PSA_KEY_LIFETIME_FROM_PERSISTENCE_AND_LOCATION(persistence, location) \
2372
- ((location) << 8 | (persistence))
2373
-
2374
- /** The local storage area for persistent keys.
2375
- *
2376
- * This storage area is available on all systems that can store persistent
2377
- * keys without delegating the storage to a third-party cryptoprocessor.
2378
- *
2379
- * See ::psa_key_location_t for more information.
2380
- */
2381
- #define PSA_KEY_LOCATION_LOCAL_STORAGE ((psa_key_location_t) 0x000000)
2382
-
2383
- #define PSA_KEY_LOCATION_VENDOR_FLAG ((psa_key_location_t) 0x800000)
2384
-
2385
- /* Note that key identifier values are embedded in the
2386
- * persistent key store, as part of key metadata. As a consequence, they
2387
- * must not be changed (unless the storage format version changes).
2388
- */
2389
-
2390
- /** The null key identifier.
2391
- */
2392
- /* *INDENT-OFF* (https://github.com/ARM-software/psa-arch-tests/issues/337) */
2393
- #define PSA_KEY_ID_NULL ((psa_key_id_t)0)
2394
- /* *INDENT-ON* */
2395
- /** The minimum value for a key identifier chosen by the application.
2396
- */
2397
- #define PSA_KEY_ID_USER_MIN ((psa_key_id_t) 0x00000001)
2398
- /** The maximum value for a key identifier chosen by the application.
2399
- */
2400
- #define PSA_KEY_ID_USER_MAX ((psa_key_id_t) 0x3fffffff)
2401
- /** The minimum value for a key identifier chosen by the implementation.
2402
- */
2403
- #define PSA_KEY_ID_VENDOR_MIN ((psa_key_id_t) 0x40000000)
2404
- /** The maximum value for a key identifier chosen by the implementation.
2405
- */
2406
- #define PSA_KEY_ID_VENDOR_MAX ((psa_key_id_t) 0x7fffffff)
2407
-
2408
-
2409
- #if !defined(MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER)
2410
-
2411
- #define MBEDTLS_SVC_KEY_ID_INIT ((psa_key_id_t) 0)
2412
- #define MBEDTLS_SVC_KEY_ID_GET_KEY_ID(id) (id)
2413
- #define MBEDTLS_SVC_KEY_ID_GET_OWNER_ID(id) (0)
2414
-
2415
- /** Utility to initialize a key identifier at runtime.
2416
- *
2417
- * \param unused Unused parameter.
2418
- * \param key_id Identifier of the key.
2419
- */
2420
- static inline mbedtls_svc_key_id_t mbedtls_svc_key_id_make(
2421
- unsigned int unused, psa_key_id_t key_id)
2422
- {
2423
- (void) unused;
2424
-
2425
- return key_id;
2426
- }
2427
-
2428
- /** Compare two key identifiers.
2429
- *
2430
- * \param id1 First key identifier.
2431
- * \param id2 Second key identifier.
2432
- *
2433
- * \return Non-zero if the two key identifier are equal, zero otherwise.
2434
- */
2435
- static inline int mbedtls_svc_key_id_equal(mbedtls_svc_key_id_t id1,
2436
- mbedtls_svc_key_id_t id2)
2437
- {
2438
- return id1 == id2;
2439
- }
2440
-
2441
- /** Check whether a key identifier is null.
2442
- *
2443
- * \param key Key identifier.
2444
- *
2445
- * \return Non-zero if the key identifier is null, zero otherwise.
2446
- */
2447
- static inline int mbedtls_svc_key_id_is_null(mbedtls_svc_key_id_t key)
2448
- {
2449
- return key == 0;
2450
- }
2451
-
2452
- #else /* MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER */
2453
-
2454
- #define MBEDTLS_SVC_KEY_ID_INIT ((mbedtls_svc_key_id_t){ 0, 0 })
2455
- #define MBEDTLS_SVC_KEY_ID_GET_KEY_ID(id) ((id).MBEDTLS_PRIVATE(key_id))
2456
- #define MBEDTLS_SVC_KEY_ID_GET_OWNER_ID(id) ((id).MBEDTLS_PRIVATE(owner))
2457
-
2458
- /** Utility to initialize a key identifier at runtime.
2459
- *
2460
- * \param owner_id Identifier of the key owner.
2461
- * \param key_id Identifier of the key.
2462
- */
2463
- static inline mbedtls_svc_key_id_t mbedtls_svc_key_id_make(
2464
- mbedtls_key_owner_id_t owner_id, psa_key_id_t key_id)
2465
- {
2466
- return (mbedtls_svc_key_id_t){ .MBEDTLS_PRIVATE(key_id) = key_id,
2467
- .MBEDTLS_PRIVATE(owner) = owner_id };
2468
- }
2469
-
2470
- /** Compare two key identifiers.
2471
- *
2472
- * \param id1 First key identifier.
2473
- * \param id2 Second key identifier.
2474
- *
2475
- * \return Non-zero if the two key identifier are equal, zero otherwise.
2476
- */
2477
- static inline int mbedtls_svc_key_id_equal(mbedtls_svc_key_id_t id1,
2478
- mbedtls_svc_key_id_t id2)
2479
- {
2480
- return (id1.MBEDTLS_PRIVATE(key_id) == id2.MBEDTLS_PRIVATE(key_id)) &&
2481
- mbedtls_key_owner_id_equal(id1.MBEDTLS_PRIVATE(owner), id2.MBEDTLS_PRIVATE(owner));
2482
- }
2483
-
2484
- /** Check whether a key identifier is null.
2485
- *
2486
- * \param key Key identifier.
2487
- *
2488
- * \return Non-zero if the key identifier is null, zero otherwise.
2489
- */
2490
- static inline int mbedtls_svc_key_id_is_null(mbedtls_svc_key_id_t key)
2491
- {
2492
- return key.MBEDTLS_PRIVATE(key_id) == 0;
2493
- }
2494
-
2495
- #endif /* !MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER */
2496
-
2497
- /**@}*/
2498
-
2499
- /** \defgroup policy Key policies
2500
- * @{
2501
- */
2502
-
2503
- /* Note that key usage flags are embedded in the
2504
- * persistent key store, as part of key metadata. As a consequence, they
2505
- * must not be changed (unless the storage format version changes).
2506
- */
2507
-
2508
- /** Whether the key may be exported.
2509
- *
2510
- * A public key or the public part of a key pair may always be exported
2511
- * regardless of the value of this permission flag.
2512
- *
2513
- * If a key does not have export permission, implementations shall not
2514
- * allow the key to be exported in plain form from the cryptoprocessor,
2515
- * whether through psa_export_key() or through a proprietary interface.
2516
- * The key may however be exportable in a wrapped form, i.e. in a form
2517
- * where it is encrypted by another key.
2518
- */
2519
- #define PSA_KEY_USAGE_EXPORT ((psa_key_usage_t) 0x00000001)
2520
-
2521
- /** Whether the key may be copied.
2522
- *
2523
- * This flag allows the use of psa_copy_key() to make a copy of the key
2524
- * with the same policy or a more restrictive policy.
2525
- *
2526
- * For lifetimes for which the key is located in a secure element which
2527
- * enforce the non-exportability of keys, copying a key outside the secure
2528
- * element also requires the usage flag #PSA_KEY_USAGE_EXPORT.
2529
- * Copying the key inside the secure element is permitted with just
2530
- * #PSA_KEY_USAGE_COPY if the secure element supports it.
2531
- * For keys with the lifetime #PSA_KEY_LIFETIME_VOLATILE or
2532
- * #PSA_KEY_LIFETIME_PERSISTENT, the usage flag #PSA_KEY_USAGE_COPY
2533
- * is sufficient to permit the copy.
2534
- */
2535
- #define PSA_KEY_USAGE_COPY ((psa_key_usage_t) 0x00000002)
2536
-
2537
- /** Whether the key may be used to encrypt a message.
2538
- *
2539
- * This flag allows the key to be used for a symmetric encryption operation,
2540
- * for an AEAD encryption-and-authentication operation,
2541
- * or for an asymmetric encryption operation,
2542
- * if otherwise permitted by the key's type and policy.
2543
- *
2544
- * For a key pair, this concerns the public key.
2545
- */
2546
- #define PSA_KEY_USAGE_ENCRYPT ((psa_key_usage_t) 0x00000100)
2547
-
2548
- /** Whether the key may be used to decrypt a message.
2549
- *
2550
- * This flag allows the key to be used for a symmetric decryption operation,
2551
- * for an AEAD decryption-and-verification operation,
2552
- * or for an asymmetric decryption operation,
2553
- * if otherwise permitted by the key's type and policy.
2554
- *
2555
- * For a key pair, this concerns the private key.
2556
- */
2557
- #define PSA_KEY_USAGE_DECRYPT ((psa_key_usage_t) 0x00000200)
2558
-
2559
- /** Whether the key may be used to sign a message.
2560
- *
2561
- * This flag allows the key to be used for a MAC calculation operation or for
2562
- * an asymmetric message signature operation, if otherwise permitted by the
2563
- * key’s type and policy.
2564
- *
2565
- * For a key pair, this concerns the private key.
2566
- */
2567
- #define PSA_KEY_USAGE_SIGN_MESSAGE ((psa_key_usage_t) 0x00000400)
2568
-
2569
- /** Whether the key may be used to verify a message.
2570
- *
2571
- * This flag allows the key to be used for a MAC verification operation or for
2572
- * an asymmetric message signature verification operation, if otherwise
2573
- * permitted by the key’s type and policy.
2574
- *
2575
- * For a key pair, this concerns the public key.
2576
- */
2577
- #define PSA_KEY_USAGE_VERIFY_MESSAGE ((psa_key_usage_t) 0x00000800)
2578
-
2579
- /** Whether the key may be used to sign a message.
2580
- *
2581
- * This flag allows the key to be used for a MAC calculation operation
2582
- * or for an asymmetric signature operation,
2583
- * if otherwise permitted by the key's type and policy.
2584
- *
2585
- * For a key pair, this concerns the private key.
2586
- */
2587
- #define PSA_KEY_USAGE_SIGN_HASH ((psa_key_usage_t) 0x00001000)
2588
-
2589
- /** Whether the key may be used to verify a message signature.
2590
- *
2591
- * This flag allows the key to be used for a MAC verification operation
2592
- * or for an asymmetric signature verification operation,
2593
- * if otherwise permitted by the key's type and policy.
2594
- *
2595
- * For a key pair, this concerns the public key.
2596
- */
2597
- #define PSA_KEY_USAGE_VERIFY_HASH ((psa_key_usage_t) 0x00002000)
2598
-
2599
- /** Whether the key may be used to derive other keys or produce a password
2600
- * hash.
2601
- *
2602
- * This flag allows the key to be used for a key derivation operation or for
2603
- * a key agreement operation, if otherwise permitted by the key's type and
2604
- * policy.
2605
- *
2606
- * If this flag is present on all keys used in calls to
2607
- * psa_key_derivation_input_key() for a key derivation operation, then it
2608
- * permits calling psa_key_derivation_output_bytes() or
2609
- * psa_key_derivation_output_key() at the end of the operation.
2610
- */
2611
- #define PSA_KEY_USAGE_DERIVE ((psa_key_usage_t) 0x00004000)
2612
-
2613
- /** Whether the key may be used to verify the result of a key derivation,
2614
- * including password hashing.
2615
- *
2616
- * This flag allows the key to be used:
2617
- *
2618
- * This flag allows the key to be used in a key derivation operation, if
2619
- * otherwise permitted by the key's type and policy.
2620
- *
2621
- * If this flag is present on all keys used in calls to
2622
- * psa_key_derivation_input_key() for a key derivation operation, then it
2623
- * permits calling psa_key_derivation_verify_bytes() or
2624
- * psa_key_derivation_verify_key() at the end of the operation.
2625
- */
2626
- #define PSA_KEY_USAGE_VERIFY_DERIVATION ((psa_key_usage_t) 0x00008000)
2627
-
2628
- /**@}*/
2629
-
2630
- /** \defgroup derivation Key derivation
2631
- * @{
2632
- */
2633
-
2634
- /* Key input steps are not embedded in the persistent storage, so you can
2635
- * change them if needed: it's only an ABI change. */
2636
-
2637
- /** A secret input for key derivation.
2638
- *
2639
- * This should be a key of type #PSA_KEY_TYPE_DERIVE
2640
- * (passed to psa_key_derivation_input_key())
2641
- * or the shared secret resulting from a key agreement
2642
- * (obtained via psa_key_derivation_key_agreement()).
2643
- *
2644
- * The secret can also be a direct input (passed to
2645
- * key_derivation_input_bytes()). In this case, the derivation operation
2646
- * may not be used to derive keys: the operation will only allow
2647
- * psa_key_derivation_output_bytes(),
2648
- * psa_key_derivation_verify_bytes(), or
2649
- * psa_key_derivation_verify_key(), but not
2650
- * psa_key_derivation_output_key().
2651
- */
2652
- #define PSA_KEY_DERIVATION_INPUT_SECRET ((psa_key_derivation_step_t) 0x0101)
2653
-
2654
- /** A low-entropy secret input for password hashing / key stretching.
2655
- *
2656
- * This is usually a key of type #PSA_KEY_TYPE_PASSWORD (passed to
2657
- * psa_key_derivation_input_key()) or a direct input (passed to
2658
- * psa_key_derivation_input_bytes()) that is a password or passphrase. It can
2659
- * also be high-entropy secret such as a key of type #PSA_KEY_TYPE_DERIVE or
2660
- * the shared secret resulting from a key agreement.
2661
- *
2662
- * The secret can also be a direct input (passed to
2663
- * key_derivation_input_bytes()). In this case, the derivation operation
2664
- * may not be used to derive keys: the operation will only allow
2665
- * psa_key_derivation_output_bytes(),
2666
- * psa_key_derivation_verify_bytes(), or
2667
- * psa_key_derivation_verify_key(), but not
2668
- * psa_key_derivation_output_key().
2669
- */
2670
- #define PSA_KEY_DERIVATION_INPUT_PASSWORD ((psa_key_derivation_step_t) 0x0102)
2671
-
2672
- /** A high-entropy additional secret input for key derivation.
2673
- *
2674
- * This is typically the shared secret resulting from a key agreement obtained
2675
- * via `psa_key_derivation_key_agreement()`. It may alternatively be a key of
2676
- * type `PSA_KEY_TYPE_DERIVE` passed to `psa_key_derivation_input_key()`, or
2677
- * a direct input passed to `psa_key_derivation_input_bytes()`.
2678
- */
2679
- #define PSA_KEY_DERIVATION_INPUT_OTHER_SECRET \
2680
- ((psa_key_derivation_step_t) 0x0103)
2681
-
2682
- /** A label for key derivation.
2683
- *
2684
- * This should be a direct input.
2685
- * It can also be a key of type #PSA_KEY_TYPE_RAW_DATA.
2686
- */
2687
- #define PSA_KEY_DERIVATION_INPUT_LABEL ((psa_key_derivation_step_t) 0x0201)
2688
-
2689
- /** A salt for key derivation.
2690
- *
2691
- * This should be a direct input.
2692
- * It can also be a key of type #PSA_KEY_TYPE_RAW_DATA or
2693
- * #PSA_KEY_TYPE_PEPPER.
2694
- */
2695
- #define PSA_KEY_DERIVATION_INPUT_SALT ((psa_key_derivation_step_t) 0x0202)
2696
-
2697
- /** An information string for key derivation.
2698
- *
2699
- * This should be a direct input.
2700
- * It can also be a key of type #PSA_KEY_TYPE_RAW_DATA.
2701
- */
2702
- #define PSA_KEY_DERIVATION_INPUT_INFO ((psa_key_derivation_step_t) 0x0203)
2703
-
2704
- /** A seed for key derivation.
2705
- *
2706
- * This should be a direct input.
2707
- * It can also be a key of type #PSA_KEY_TYPE_RAW_DATA.
2708
- */
2709
- #define PSA_KEY_DERIVATION_INPUT_SEED ((psa_key_derivation_step_t) 0x0204)
2710
-
2711
- /** A cost parameter for password hashing / key stretching.
2712
- *
2713
- * This must be a direct input, passed to psa_key_derivation_input_integer().
2714
- */
2715
- #define PSA_KEY_DERIVATION_INPUT_COST ((psa_key_derivation_step_t) 0x0205)
2716
-
2717
- /**@}*/
2718
-
2719
- /** \defgroup helper_macros Helper macros
2720
- * @{
2721
- */
2722
-
2723
- /* Helper macros */
2724
-
2725
- /** Check if two AEAD algorithm identifiers refer to the same AEAD algorithm
2726
- * regardless of the tag length they encode.
2727
- *
2728
- * \param aead_alg_1 An AEAD algorithm identifier.
2729
- * \param aead_alg_2 An AEAD algorithm identifier.
2730
- *
2731
- * \return 1 if both identifiers refer to the same AEAD algorithm,
2732
- * 0 otherwise.
2733
- * Unspecified if neither \p aead_alg_1 nor \p aead_alg_2 are
2734
- * a supported AEAD algorithm.
2735
- */
2736
- #define MBEDTLS_PSA_ALG_AEAD_EQUAL(aead_alg_1, aead_alg_2) \
2737
- (!(((aead_alg_1) ^ (aead_alg_2)) & \
2738
- ~(PSA_ALG_AEAD_TAG_LENGTH_MASK | PSA_ALG_AEAD_AT_LEAST_THIS_LENGTH_FLAG)))
2739
-
2740
- /**@}*/
2741
-
2742
- /**@}*/
2743
-
2744
- /** \defgroup interruptible Interruptible operations
2745
- * @{
2746
- */
2747
-
2748
- /** Maximum value for use with \c psa_interruptible_set_max_ops() to determine
2749
- * the maximum number of ops allowed to be executed by an interruptible
2750
- * function in a single call.
2751
- */
2752
- #define PSA_INTERRUPTIBLE_MAX_OPS_UNLIMITED UINT32_MAX
2753
-
2754
- /**@}*/
2755
-
2756
- #endif /* PSA_CRYPTO_VALUES_H */