1*62c56f98SSadaf Ebrahimi /*
2*62c56f98SSadaf Ebrahimi * PSA crypto client code
3*62c56f98SSadaf Ebrahimi */
4*62c56f98SSadaf Ebrahimi /*
5*62c56f98SSadaf Ebrahimi * Copyright The Mbed TLS Contributors
6*62c56f98SSadaf Ebrahimi * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
7*62c56f98SSadaf Ebrahimi */
8*62c56f98SSadaf Ebrahimi
9*62c56f98SSadaf Ebrahimi #include "common.h"
10*62c56f98SSadaf Ebrahimi #include "psa/crypto.h"
11*62c56f98SSadaf Ebrahimi
12*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PSA_CRYPTO_CLIENT)
13*62c56f98SSadaf Ebrahimi
14*62c56f98SSadaf Ebrahimi #include <string.h>
15*62c56f98SSadaf Ebrahimi #include "mbedtls/platform.h"
16*62c56f98SSadaf Ebrahimi
psa_reset_key_attributes(psa_key_attributes_t * attributes)17*62c56f98SSadaf Ebrahimi void psa_reset_key_attributes(psa_key_attributes_t *attributes)
18*62c56f98SSadaf Ebrahimi {
19*62c56f98SSadaf Ebrahimi mbedtls_free(attributes->domain_parameters);
20*62c56f98SSadaf Ebrahimi memset(attributes, 0, sizeof(*attributes));
21*62c56f98SSadaf Ebrahimi }
22*62c56f98SSadaf Ebrahimi
psa_set_key_domain_parameters(psa_key_attributes_t * attributes,psa_key_type_t type,const uint8_t * data,size_t data_length)23*62c56f98SSadaf Ebrahimi psa_status_t psa_set_key_domain_parameters(psa_key_attributes_t *attributes,
24*62c56f98SSadaf Ebrahimi psa_key_type_t type,
25*62c56f98SSadaf Ebrahimi const uint8_t *data,
26*62c56f98SSadaf Ebrahimi size_t data_length)
27*62c56f98SSadaf Ebrahimi {
28*62c56f98SSadaf Ebrahimi uint8_t *copy = NULL;
29*62c56f98SSadaf Ebrahimi
30*62c56f98SSadaf Ebrahimi if (data_length != 0) {
31*62c56f98SSadaf Ebrahimi copy = mbedtls_calloc(1, data_length);
32*62c56f98SSadaf Ebrahimi if (copy == NULL) {
33*62c56f98SSadaf Ebrahimi return PSA_ERROR_INSUFFICIENT_MEMORY;
34*62c56f98SSadaf Ebrahimi }
35*62c56f98SSadaf Ebrahimi memcpy(copy, data, data_length);
36*62c56f98SSadaf Ebrahimi }
37*62c56f98SSadaf Ebrahimi /* After this point, this function is guaranteed to succeed, so it
38*62c56f98SSadaf Ebrahimi * can start modifying `*attributes`. */
39*62c56f98SSadaf Ebrahimi
40*62c56f98SSadaf Ebrahimi if (attributes->domain_parameters != NULL) {
41*62c56f98SSadaf Ebrahimi mbedtls_free(attributes->domain_parameters);
42*62c56f98SSadaf Ebrahimi attributes->domain_parameters = NULL;
43*62c56f98SSadaf Ebrahimi attributes->domain_parameters_size = 0;
44*62c56f98SSadaf Ebrahimi }
45*62c56f98SSadaf Ebrahimi
46*62c56f98SSadaf Ebrahimi attributes->domain_parameters = copy;
47*62c56f98SSadaf Ebrahimi attributes->domain_parameters_size = data_length;
48*62c56f98SSadaf Ebrahimi attributes->core.type = type;
49*62c56f98SSadaf Ebrahimi return PSA_SUCCESS;
50*62c56f98SSadaf Ebrahimi }
51*62c56f98SSadaf Ebrahimi
psa_get_key_domain_parameters(const psa_key_attributes_t * attributes,uint8_t * data,size_t data_size,size_t * data_length)52*62c56f98SSadaf Ebrahimi psa_status_t psa_get_key_domain_parameters(
53*62c56f98SSadaf Ebrahimi const psa_key_attributes_t *attributes,
54*62c56f98SSadaf Ebrahimi uint8_t *data, size_t data_size, size_t *data_length)
55*62c56f98SSadaf Ebrahimi {
56*62c56f98SSadaf Ebrahimi if (attributes->domain_parameters_size > data_size) {
57*62c56f98SSadaf Ebrahimi return PSA_ERROR_BUFFER_TOO_SMALL;
58*62c56f98SSadaf Ebrahimi }
59*62c56f98SSadaf Ebrahimi *data_length = attributes->domain_parameters_size;
60*62c56f98SSadaf Ebrahimi if (attributes->domain_parameters_size != 0) {
61*62c56f98SSadaf Ebrahimi memcpy(data, attributes->domain_parameters,
62*62c56f98SSadaf Ebrahimi attributes->domain_parameters_size);
63*62c56f98SSadaf Ebrahimi }
64*62c56f98SSadaf Ebrahimi return PSA_SUCCESS;
65*62c56f98SSadaf Ebrahimi }
66*62c56f98SSadaf Ebrahimi
67*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PSA_CRYPTO_CLIENT */
68