Mistake on this page?
Report an issue in GitHub or email us
psa_crypto_storage.h
Go to the documentation of this file.
1 /**
2  * \file psa_crypto_storage.h
3  *
4  * \brief PSA cryptography module: Mbed TLS key storage
5  */
6 /*
7  * Copyright The Mbed TLS Contributors
8  * SPDX-License-Identifier: Apache-2.0
9  *
10  * Licensed under the Apache License, Version 2.0 (the "License"); you may
11  * not use this file except in compliance with the License.
12  * You may obtain a copy of the License at
13  *
14  * http://www.apache.org/licenses/LICENSE-2.0
15  *
16  * Unless required by applicable law or agreed to in writing, software
17  * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
18  * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19  * See the License for the specific language governing permissions and
20  * limitations under the License.
21  */
22 
23 #ifndef PSA_CRYPTO_STORAGE_H
24 #define PSA_CRYPTO_STORAGE_H
25 
26 #ifdef __cplusplus
27 extern "C" {
28 #endif
29 
30 #include "psa/crypto.h"
31 #include "psa/crypto_se_driver.h"
32 
33 #include <stdint.h>
34 #include <string.h>
35 
36 /* Limit the maximum key size in storage. This should have no effect
37  * since the key size is limited in memory. */
38 #define PSA_CRYPTO_MAX_STORAGE_SIZE ( PSA_BITS_TO_BYTES( PSA_MAX_KEY_BITS ) )
39 /* Sanity check: a file size must fit in 32 bits. Allow a generous
40  * 64kB of metadata. */
41 #if PSA_CRYPTO_MAX_STORAGE_SIZE > 0xffff0000
42 #error PSA_CRYPTO_MAX_STORAGE_SIZE > 0xffff0000
43 #endif
44 
45 /** The maximum permitted persistent slot number.
46  *
47  * In Mbed Crypto 0.1.0b:
48  * - Using the file backend, all key ids are ok except 0.
49  * - Using the ITS backend, all key ids are ok except 0xFFFFFF52
50  * (#PSA_CRYPTO_ITS_RANDOM_SEED_UID) for which the file contains the
51  * device's random seed (if this feature is enabled).
52  * - Only key ids from 1 to #PSA_KEY_SLOT_COUNT are actually used.
53  *
54  * Since we need to preserve the random seed, avoid using that key slot.
55  * Reserve a whole range of key slots just in case something else comes up.
56  *
57  * This limitation will probably become moot when we implement client
58  * separation for key storage.
59  */
60 #define PSA_MAX_PERSISTENT_KEY_IDENTIFIER PSA_KEY_ID_VENDOR_MAX
61 
62 /**
63  * \brief Checks if persistent data is stored for the given key slot number
64  *
65  * This function checks if any key data or metadata exists for the key slot in
66  * the persistent storage.
67  *
68  * \param key Persistent identifier to check.
69  *
70  * \retval 0
71  * No persistent data present for slot number
72  * \retval 1
73  * Persistent data present for slot number
74  */
75 int psa_is_key_present_in_storage( const psa_key_file_id_t key );
76 
77 /**
78  * \brief Format key data and metadata and save to a location for given key
79  * slot.
80  *
81  * This function formats the key data and metadata and saves it to a
82  * persistent storage backend. The storage location corresponding to the
83  * key slot must be empty, otherwise this function will fail. This function
84  * should be called after psa_import_key_into_slot() to ensure the
85  * persistent key is not saved into a storage location corresponding to an
86  * already occupied non-persistent key, as well as validating the key data.
87  *
88  *
89  * \param[in] attr The attributes of the key to save.
90  * The key identifier field in the attributes
91  * determines the key's location.
92  * \param[in] data Buffer containing the key data.
93  * \param data_length The number of bytes that make up the key data.
94  *
95  * \retval PSA_SUCCESS
96  * \retval PSA_ERROR_INSUFFICIENT_MEMORY
97  * \retval PSA_ERROR_INSUFFICIENT_STORAGE
98  * \retval PSA_ERROR_STORAGE_FAILURE
99  * \retval PSA_ERROR_ALREADY_EXISTS
100  */
102  const uint8_t *data,
103  const size_t data_length );
104 
105 /**
106  * \brief Parses key data and metadata and load persistent key for given
107  * key slot number.
108  *
109  * This function reads from a storage backend, parses the key data and
110  * metadata and writes them to the appropriate output parameters.
111  *
112  * Note: This function allocates a buffer and returns a pointer to it through
113  * the data parameter. psa_free_persistent_key_data() must be called after
114  * this function to zeroize and free this buffer, regardless of whether this
115  * function succeeds or fails.
116  *
117  * \param[in,out] attr On input, the key identifier field identifies
118  * the key to load. Other fields are ignored.
119  * On success, the attribute structure contains
120  * the key metadata that was loaded from storage.
121  * \param[out] data Pointer to an allocated key data buffer on return.
122  * \param[out] data_length The number of bytes that make up the key data.
123  *
124  * \retval PSA_SUCCESS
125  * \retval PSA_ERROR_INSUFFICIENT_MEMORY
126  * \retval PSA_ERROR_STORAGE_FAILURE
127  * \retval PSA_ERROR_DOES_NOT_EXIST
128  */
130  uint8_t **data,
131  size_t *data_length );
132 
133 /**
134  * \brief Remove persistent data for the given key slot number.
135  *
136  * \param key Persistent identifier of the key to remove
137  * from persistent storage.
138  *
139  * \retval PSA_SUCCESS
140  * The key was successfully removed,
141  * or the key did not exist.
142  * \retval PSA_ERROR_STORAGE_FAILURE
143  */
144 psa_status_t psa_destroy_persistent_key( const psa_key_file_id_t key );
145 
146 /**
147  * \brief Free the temporary buffer allocated by psa_load_persistent_key().
148  *
149  * This function must be called at some point after psa_load_persistent_key()
150  * to zeroize and free the memory allocated to the buffer in that function.
151  *
152  * \param key_data Buffer for the key data.
153  * \param key_data_length Size of the key data buffer.
154  *
155  */
156 void psa_free_persistent_key_data( uint8_t *key_data, size_t key_data_length );
157 
158 /**
159  * \brief Formats key data and metadata for persistent storage
160  *
161  * \param[in] data Buffer containing the key data.
162  * \param data_length Length of the key data buffer.
163  * \param[in] attr The core attributes of the key.
164  * \param[out] storage_data Output buffer for the formatted data.
165  *
166  */
167 void psa_format_key_data_for_storage( const uint8_t *data,
168  const size_t data_length,
169  const psa_core_key_attributes_t *attr,
170  uint8_t *storage_data );
171 
172 /**
173  * \brief Parses persistent storage data into key data and metadata
174  *
175  * \param[in] storage_data Buffer for the storage data.
176  * \param storage_data_length Length of the storage data buffer
177  * \param[out] key_data On output, pointer to a newly allocated buffer
178  * containing the key data. This must be freed
179  * using psa_free_persistent_key_data()
180  * \param[out] key_data_length Length of the key data buffer
181  * \param[out] attr On success, the attribute structure is filled
182  * with the loaded key metadata.
183  *
184  * \retval PSA_SUCCESS
185  * \retval PSA_ERROR_INSUFFICIENT_STORAGE
186  * \retval PSA_ERROR_INSUFFICIENT_MEMORY
187  * \retval PSA_ERROR_STORAGE_FAILURE
188  */
189 psa_status_t psa_parse_key_data_from_storage( const uint8_t *storage_data,
190  size_t storage_data_length,
191  uint8_t **key_data,
192  size_t *key_data_length,
194 
195 #if defined(MBEDTLS_PSA_CRYPTO_SE_C)
196 /** This symbol is defined if transaction support is required. */
197 #define PSA_CRYPTO_STORAGE_HAS_TRANSACTIONS
198 #endif
199 
200 #if defined(PSA_CRYPTO_STORAGE_HAS_TRANSACTIONS)
201 
202 /** The type of transaction that is in progress.
203  */
204 /* This is an integer type rather than an enum for two reasons: to support
205  * unknown values when loading a transaction file, and to ensure that the
206  * type has a known size.
207  */
208 typedef uint16_t psa_crypto_transaction_type_t;
209 
210 /** No transaction is in progress.
211  *
212  * This has the value 0, so zero-initialization sets a transaction's type to
213  * this value.
214  */
215 #define PSA_CRYPTO_TRANSACTION_NONE ( (psa_crypto_transaction_type_t) 0x0000 )
216 
217 /** A key creation transaction.
218  *
219  * This is only used for keys in an external cryptoprocessor (secure element).
220  * Keys in RAM or in internal storage are created atomically in storage
221  * (simple file creation), so they do not need a transaction mechanism.
222  */
223 #define PSA_CRYPTO_TRANSACTION_CREATE_KEY ( (psa_crypto_transaction_type_t) 0x0001 )
224 
225 /** A key destruction transaction.
226  *
227  * This is only used for keys in an external cryptoprocessor (secure element).
228  * Keys in RAM or in internal storage are destroyed atomically in storage
229  * (simple file deletion), so they do not need a transaction mechanism.
230  */
231 #define PSA_CRYPTO_TRANSACTION_DESTROY_KEY ( (psa_crypto_transaction_type_t) 0x0002 )
232 
233 /** Transaction data.
234  *
235  * This type is designed to be serialized by writing the memory representation
236  * and reading it back on the same device.
237  *
238  * \note The transaction mechanism is designed for a single active transaction
239  * at a time. The transaction object is #psa_crypto_transaction.
240  *
241  * \note If an API call starts a transaction, it must complete this transaction
242  * before returning to the application.
243  *
244  * The lifetime of a transaction is the following (note that only one
245  * transaction may be active at a time):
246  *
247  * -# Call psa_crypto_prepare_transaction() to initialize the transaction
248  * object in memory and declare the type of transaction that is starting.
249  * -# Fill in the type-specific fields of #psa_crypto_transaction.
250  * -# Call psa_crypto_save_transaction() to start the transaction. This
251  * saves the transaction data to internal storage.
252  * -# Perform the work of the transaction by modifying files, contacting
253  * external entities, or whatever needs doing. Note that the transaction
254  * may be interrupted by a power failure, so you need to have a way
255  * recover from interruptions either by undoing what has been done
256  * so far or by resuming where you left off.
257  * -# If there are intermediate stages in the transaction, update
258  * the fields of #psa_crypto_transaction and call
259  * psa_crypto_save_transaction() again when each stage is reached.
260  * -# When the transaction is over, call psa_crypto_stop_transaction() to
261  * remove the transaction data in storage and in memory.
262  *
263  * If the system crashes while a transaction is in progress, psa_crypto_init()
264  * calls psa_crypto_load_transaction() and takes care of completing or
265  * rewinding the transaction. This is done in psa_crypto_recover_transaction()
266  * in psa_crypto.c. If you add a new type of transaction, be
267  * sure to add code for it in psa_crypto_recover_transaction().
268  */
269 typedef union
270 {
271  /* Each element of this union must have the following properties
272  * to facilitate serialization and deserialization:
273  *
274  * - The element is a struct.
275  * - The first field of the struct is `psa_crypto_transaction_type_t type`.
276  * - Elements of the struct are arranged such a way that there is
277  * no padding.
278  */
279  struct psa_crypto_transaction_unknown_s
280  {
281  psa_crypto_transaction_type_t type;
282  uint16_t unused1;
283  uint32_t unused2;
284  uint64_t unused3;
285  uint64_t unused4;
286  } unknown;
287  /* ::type is #PSA_CRYPTO_TRANSACTION_CREATE_KEY or
288  * #PSA_CRYPTO_TRANSACTION_DESTROY_KEY. */
289  struct psa_crypto_transaction_key_s
290  {
291  psa_crypto_transaction_type_t type;
292  uint16_t unused1;
293  psa_key_lifetime_t lifetime;
295  psa_key_id_t id;
296  } key;
297 } psa_crypto_transaction_t;
298 
299 /** The single active transaction.
300  */
301 extern psa_crypto_transaction_t psa_crypto_transaction;
302 
303 /** Prepare for a transaction.
304  *
305  * There must not be an ongoing transaction.
306  *
307  * \param type The type of transaction to start.
308  */
309 static inline void psa_crypto_prepare_transaction(
310  psa_crypto_transaction_type_t type )
311 {
312  psa_crypto_transaction.unknown.type = type;
313 }
314 
315 /** Save the transaction data to storage.
316  *
317  * You may call this function multiple times during a transaction to
318  * atomically update the transaction state.
319  *
320  * \retval #PSA_SUCCESS
321  * \retval #PSA_ERROR_INSUFFICIENT_STORAGE
322  * \retval #PSA_ERROR_STORAGE_FAILURE
323  */
324 psa_status_t psa_crypto_save_transaction( void );
325 
326 /** Load the transaction data from storage, if any.
327  *
328  * This function is meant to be called from psa_crypto_init() to recover
329  * in case a transaction was interrupted by a system crash.
330  *
331  * \retval #PSA_SUCCESS
332  * The data about the ongoing transaction has been loaded to
333  * #psa_crypto_transaction.
334  * \retval #PSA_ERROR_DOES_NOT_EXIST
335  * There is no ongoing transaction.
336  * \retval #PSA_ERROR_STORAGE_FAILURE
337  */
338 psa_status_t psa_crypto_load_transaction( void );
339 
340 /** Indicate that the current transaction is finished.
341  *
342  * Call this function at the very end of transaction processing.
343  * This function does not "commit" or "abort" the transaction: the storage
344  * subsystem has no concept of "commit" and "abort", just saving and
345  * removing the transaction information in storage.
346  *
347  * This function erases the transaction data in storage (if any) and
348  * resets the transaction data in memory.
349  *
350  * \retval #PSA_SUCCESS
351  * There was transaction data in storage.
352  * \retval #PSA_ERROR_DOES_NOT_EXIST
353  * There was no transaction data in storage.
354  * \retval #PSA_ERROR_STORAGE_FAILURE
355  * It was impossible to determine whether there was transaction data
356  * in storage, or the transaction data could not be erased.
357  */
358 psa_status_t psa_crypto_stop_transaction( void );
359 
360 /** The ITS file identifier for the transaction data.
361  *
362  * 0xffffffNN = special file; 0x74 = 't' for transaction.
363  */
364 #define PSA_CRYPTO_ITS_TRANSACTION_UID ( (psa_key_id_t) 0xffffff74 )
365 
366 #endif /* PSA_CRYPTO_STORAGE_HAS_TRANSACTIONS */
367 
368 #if defined(MBEDTLS_PSA_INJECT_ENTROPY)
369 /** Backend side of mbedtls_psa_inject_entropy().
370  *
371  * This function stores the supplied data into the entropy seed file.
372  *
373  * \retval #PSA_SUCCESS
374  * Success
375  * \retval #PSA_ERROR_STORAGE_FAILURE
376  * \retval #PSA_ERROR_INSUFFICIENT_STORAGE
377  * \retval #PSA_ERROR_NOT_PERMITTED
378  * The entropy seed file already exists.
379  */
380 psa_status_t mbedtls_psa_storage_inject_entropy( const unsigned char *seed,
381  size_t seed_size );
382 #endif /* MBEDTLS_PSA_INJECT_ENTROPY */
383 
384 #ifdef __cplusplus
385 }
386 #endif
387 
388 #endif /* PSA_CRYPTO_STORAGE_H */
psa_status_t psa_save_persistent_key(const psa_core_key_attributes_t *attr, const uint8_t *data, const size_t data_length)
Format key data and metadata and save to a location for given key slot.
uint32_t psa_key_id_t
Encoding of identifiers of persistent keys.
uint64_t psa_key_slot_number_t
An internal designation of a key slot between the core part of the PSA Crypto implementation and the ...
void psa_format_key_data_for_storage(const uint8_t *data, const size_t data_length, const psa_core_key_attributes_t *attr, uint8_t *storage_data)
Formats key data and metadata for persistent storage.
psa_status_t psa_destroy_persistent_key(const psa_key_file_id_t key)
Remove persistent data for the given key slot number.
void psa_free_persistent_key_data(uint8_t *key_data, size_t key_data_length)
Free the temporary buffer allocated by psa_load_persistent_key().
psa_status_t psa_load_persistent_key(psa_core_key_attributes_t *attr, uint8_t **data, size_t *data_length)
Parses key data and metadata and load persistent key for given key slot number.
PSA external cryptoprocessor driver module.
psa_status_t psa_parse_key_data_from_storage(const uint8_t *storage_data, size_t storage_data_length, uint8_t **key_data, size_t *key_data_length, psa_core_key_attributes_t *attr)
Parses persistent storage data into key data and metadata.
uint32_t psa_key_lifetime_t
Encoding of key lifetimes.
int32_t psa_status_t
Function return status.
int psa_is_key_present_in_storage(const psa_key_file_id_t key)
Checks if persistent data is stored for the given key slot number.
Important Information for this Arm website

This site uses cookies to store information on your computer. By continuing to use our site, you consent to our cookies. If you are not happy with the use of these cookies, please review our Cookie Policy to learn how they can be disabled. By disabling cookies, some features of the site will not work.