cipher_structs.h 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278
  1. /*
  2. * Copyright (c) 2016 Intel Corporation.
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. */
  6. /**
  7. * @file
  8. * @brief Crypto Cipher structure definitions
  9. *
  10. * This file contains the Crypto Abstraction layer structures.
  11. *
  12. * [Experimental] Users should note that the Structures can change
  13. * as a part of ongoing development.
  14. */
  15. #ifndef ZEPHYR_INCLUDE_CRYPTO_CIPHER_STRUCTS_H_
  16. #define ZEPHYR_INCLUDE_CRYPTO_CIPHER_STRUCTS_H_
  17. #include <device.h>
  18. #include <sys/util.h>
  19. /**
  20. * @addtogroup crypto_cipher
  21. * @{
  22. */
  23. /** Cipher Algorithm */
  24. enum cipher_algo {
  25. CRYPTO_CIPHER_ALGO_AES = 1,
  26. };
  27. /** Cipher Operation */
  28. enum cipher_op {
  29. CRYPTO_CIPHER_OP_DECRYPT = 0,
  30. CRYPTO_CIPHER_OP_ENCRYPT = 1,
  31. };
  32. /**
  33. * Possible cipher mode options.
  34. *
  35. * More to be added as required.
  36. */
  37. enum cipher_mode {
  38. CRYPTO_CIPHER_MODE_ECB = 1,
  39. CRYPTO_CIPHER_MODE_CBC = 2,
  40. CRYPTO_CIPHER_MODE_CTR = 3,
  41. CRYPTO_CIPHER_MODE_CCM = 4,
  42. CRYPTO_CIPHER_MODE_GCM = 5,
  43. };
  44. /* Forward declarations */
  45. struct cipher_aead_pkt;
  46. struct cipher_ctx;
  47. struct cipher_pkt;
  48. typedef int (*block_op_t)(struct cipher_ctx *ctx, struct cipher_pkt *pkt);
  49. /* Function signatures for encryption/ decryption using standard cipher modes
  50. * like CBC, CTR, CCM.
  51. */
  52. typedef int (*cbc_op_t)(struct cipher_ctx *ctx, struct cipher_pkt *pkt,
  53. uint8_t *iv);
  54. typedef int (*ctr_op_t)(struct cipher_ctx *ctx, struct cipher_pkt *pkt,
  55. uint8_t *ctr);
  56. typedef int (*ccm_op_t)(struct cipher_ctx *ctx, struct cipher_aead_pkt *pkt,
  57. uint8_t *nonce);
  58. typedef int (*gcm_op_t)(struct cipher_ctx *ctx, struct cipher_aead_pkt *pkt,
  59. uint8_t *nonce);
  60. struct cipher_ops {
  61. enum cipher_mode cipher_mode;
  62. union {
  63. block_op_t block_crypt_hndlr;
  64. cbc_op_t cbc_crypt_hndlr;
  65. ctr_op_t ctr_crypt_hndlr;
  66. ccm_op_t ccm_crypt_hndlr;
  67. gcm_op_t gcm_crypt_hndlr;
  68. };
  69. };
  70. struct ccm_params {
  71. uint16_t tag_len;
  72. uint16_t nonce_len;
  73. };
  74. struct ctr_params {
  75. /* CTR mode counter is a split counter composed of iv and counter
  76. * such that ivlen + ctr_len = keylen
  77. */
  78. uint32_t ctr_len;
  79. };
  80. struct gcm_params {
  81. uint16_t tag_len;
  82. uint16_t nonce_len;
  83. };
  84. /**
  85. * Structure encoding session parameters.
  86. *
  87. * Refer to comments for individual fields to know the contract
  88. * in terms of who fills what and when w.r.t begin_session() call.
  89. */
  90. struct cipher_ctx {
  91. /** Place for driver to return function pointers to be invoked per
  92. * cipher operation. To be populated by crypto driver on return from
  93. * begin_session() based on the algo/mode chosen by the app.
  94. */
  95. struct cipher_ops ops;
  96. /** To be populated by the app before calling begin_session() */
  97. union {
  98. /* Cryptographic key to be used in this session */
  99. uint8_t *bit_stream;
  100. /* For cases where key is protected and is not
  101. * available to caller
  102. */
  103. void *handle;
  104. } key;
  105. /** The device driver instance this crypto context relates to. Will be
  106. * populated by the begin_session() API.
  107. */
  108. const struct device *device;
  109. /** If the driver supports multiple simultaneously crypto sessions, this
  110. * will identify the specific driver state this crypto session relates
  111. * to. Since dynamic memory allocation is not possible, it is
  112. * suggested that at build time drivers allocate space for the
  113. * max simultaneous sessions they intend to support. To be populated
  114. * by the driver on return from begin_session().
  115. */
  116. void *drv_sessn_state;
  117. /** Place for the user app to put info relevant stuff for resuming when
  118. * completion callback happens for async ops. Totally managed by the
  119. * app.
  120. */
  121. void *app_sessn_state;
  122. /** Cypher mode parameters, which remain constant for all ops
  123. * in a session. To be populated by the app before calling
  124. * begin_session().
  125. */
  126. union {
  127. struct ccm_params ccm_info;
  128. struct ctr_params ctr_info;
  129. struct gcm_params gcm_info;
  130. } mode_params;
  131. /** Cryptographic keylength in bytes. To be populated by the app
  132. * before calling begin_session()
  133. */
  134. uint16_t keylen;
  135. /** How certain fields are to be interpreted for this session.
  136. * (A bitmask of CAP_* below.)
  137. * To be populated by the app before calling begin_session().
  138. * An app can obtain the capability flags supported by a hw/driver
  139. * by calling cipher_query_hwcaps().
  140. */
  141. uint16_t flags;
  142. };
  143. /* cipher_ctx.flags values. Not all drivers support all flags.
  144. * A user app can query the supported hw / driver
  145. * capabilities via provided API (cipher_query_hwcaps()), and choose a
  146. * supported config during the session setup.
  147. */
  148. #define CAP_OPAQUE_KEY_HNDL BIT(0)
  149. #define CAP_RAW_KEY BIT(1)
  150. /* TBD to define */
  151. #define CAP_KEY_LOADING_API BIT(2)
  152. /** Whether the output is placed in separate buffer or not */
  153. #define CAP_INPLACE_OPS BIT(3)
  154. #define CAP_SEPARATE_IO_BUFS BIT(4)
  155. /**
  156. * These denotes if the output (completion of a cipher_xxx_op) is conveyed
  157. * by the op function returning, or it is conveyed by an async notification
  158. */
  159. #define CAP_SYNC_OPS BIT(5)
  160. #define CAP_ASYNC_OPS BIT(6)
  161. /** Whether the hardware/driver supports autononce feature */
  162. #define CAP_AUTONONCE BIT(7)
  163. /** Don't prefix IV to cipher blocks */
  164. #define CAP_NO_IV_PREFIX BIT(8)
  165. /* More flags to be added as necessary */
  166. /**
  167. * Structure encoding IO parameters of one cryptographic
  168. * operation like encrypt/decrypt.
  169. *
  170. * The fields which has not been explicitly called out has to
  171. * be filled up by the app before making the cipher_xxx_op()
  172. * call.
  173. */
  174. struct cipher_pkt {
  175. /** Start address of input buffer */
  176. uint8_t *in_buf;
  177. /** Bytes to be operated upon */
  178. int in_len;
  179. /** Start of the output buffer, to be allocated by
  180. * the application. Can be NULL for in-place ops. To be populated
  181. * with contents by the driver on return from op / async callback.
  182. */
  183. uint8_t *out_buf;
  184. /** Size of the out_buf area allocated by the application. Drivers
  185. * should not write past the size of output buffer.
  186. */
  187. int out_buf_max;
  188. /** To be populated by driver on return from cipher_xxx_op() and
  189. * holds the size of the actual result.
  190. */
  191. int out_len;
  192. /** Context this packet relates to. This can be useful to get the
  193. * session details, especially for async ops. Will be populated by the
  194. * cipher_xxx_op() API based on the ctx parameter.
  195. */
  196. struct cipher_ctx *ctx;
  197. };
  198. /**
  199. * Structure encoding IO parameters in AEAD (Authenticated Encryption
  200. * with Associated Data) scenario like in CCM.
  201. *
  202. * App has to furnish valid contents prior to making cipher_ccm_op() call.
  203. */
  204. struct cipher_aead_pkt {
  205. /* IO buffers for encryption. This has to be supplied by the app. */
  206. struct cipher_pkt *pkt;
  207. /**
  208. * Start address for Associated Data. This has to be supplied by app.
  209. */
  210. uint8_t *ad;
  211. /** Size of Associated Data. This has to be supplied by the app. */
  212. uint32_t ad_len;
  213. /** Start address for the auth hash. For an encryption op this will
  214. * be populated by the driver when it returns from cipher_ccm_op call.
  215. * For a decryption op this has to be supplied by the app.
  216. */
  217. uint8_t *tag;
  218. };
  219. /* Prototype for the application function to be invoked by the crypto driver
  220. * on completion of an async request. The app may get the session context
  221. * via the pkt->ctx field. For CCM ops the encompassing AEAD packet may be
  222. * accessed via container_of(). The type of a packet can be determined via
  223. * pkt->ctx.ops.mode .
  224. */
  225. typedef void (*crypto_completion_cb)(struct cipher_pkt *completed, int status);
  226. /**
  227. * @}
  228. */
  229. #endif /* ZEPHYR_INCLUDE_CRYPTO_CIPHER_STRUCTS_H_ */