1 /* SPDX-License-Identifier: BSD-2-Clause */ 2 /* 3 * Copyright (c) 2014, Linaro Limited 4 * Copyright (c) 2021, SumUp Services GmbH 5 */ 6 7 #ifndef TEE_API_DEFINES_EXTENSIONS_H 8 #define TEE_API_DEFINES_EXTENSIONS_H 9 10 /* 11 * HMAC-based Extract-and-Expand Key Derivation Function (HKDF) 12 */ 13 14 #define TEE_ALG_HKDF_MD5_DERIVE_KEY 0x800010C0 15 #define TEE_ALG_HKDF_SHA1_DERIVE_KEY 0x800020C0 16 #define TEE_ALG_HKDF_SHA224_DERIVE_KEY 0x800030C0 17 #define TEE_ALG_HKDF_SHA256_DERIVE_KEY 0x800040C0 18 #define TEE_ALG_HKDF_SHA384_DERIVE_KEY 0x800050C0 19 #define TEE_ALG_HKDF_SHA512_DERIVE_KEY 0x800060C0 20 21 #define TEE_TYPE_HKDF_IKM 0xA10000C0 22 23 #define TEE_ATTR_HKDF_IKM 0xC00001C0 24 #define TEE_ATTR_HKDF_SALT 0xD00002C0 25 #define TEE_ATTR_HKDF_INFO 0xD00003C0 26 #define TEE_ATTR_HKDF_OKM_LENGTH 0xF00004C0 27 28 /* 29 * Concatenation Key Derivation Function (Concat KDF) 30 * NIST SP 800-56A section 5.8.1 31 */ 32 33 #define TEE_ALG_CONCAT_KDF_SHA1_DERIVE_KEY 0x800020C1 34 #define TEE_ALG_CONCAT_KDF_SHA224_DERIVE_KEY 0x800030C1 35 #define TEE_ALG_CONCAT_KDF_SHA256_DERIVE_KEY 0x800040C1 36 #define TEE_ALG_CONCAT_KDF_SHA384_DERIVE_KEY 0x800050C1 37 #define TEE_ALG_CONCAT_KDF_SHA512_DERIVE_KEY 0x800060C1 38 39 #define TEE_TYPE_CONCAT_KDF_Z 0xA10000C1 40 41 #define TEE_ATTR_CONCAT_KDF_Z 0xC00001C1 42 #define TEE_ATTR_CONCAT_KDF_OTHER_INFO 0xD00002C1 43 #define TEE_ATTR_CONCAT_KDF_DKM_LENGTH 0xF00003C1 44 45 /* 46 * PKCS #5 v2.0 Key Derivation Function 2 (PBKDF2) 47 * RFC 2898 section 5.2 48 * https://www.ietf.org/rfc/rfc2898.txt 49 */ 50 51 #define TEE_ALG_PBKDF2_HMAC_SHA1_DERIVE_KEY 0x800020C2 52 53 #define TEE_TYPE_PBKDF2_PASSWORD 0xA10000C2 54 55 #define TEE_ATTR_PBKDF2_PASSWORD 0xC00001C2 56 #define TEE_ATTR_PBKDF2_SALT 0xD00002C2 57 #define TEE_ATTR_PBKDF2_ITERATION_COUNT 0xF00003C2 58 #define TEE_ATTR_PBKDF2_DKM_LENGTH 0xF00004C2 59 60 /* 61 * PKCS#1 v1.5 RSASSA pre-hashed sign/verify 62 */ 63 64 #define TEE_ALG_RSASSA_PKCS1_V1_5 0xF0000830 65 66 /* 67 * TDEA CMAC (NIST SP800-38B) 68 */ 69 #define TEE_ALG_DES3_CMAC 0xF0000613 70 71 /* 72 * Implementation-specific object storage constants 73 */ 74 75 /* Storage is provided by the Rich Execution Environment (REE) */ 76 #define TEE_STORAGE_PRIVATE_REE 0x80000000 77 /* Storage is the Replay Protected Memory Block partition of an eMMC device */ 78 #define TEE_STORAGE_PRIVATE_RPMB 0x80000100 79 /* Was TEE_STORAGE_PRIVATE_SQL, which isn't supported any longer */ 80 #define TEE_STORAGE_PRIVATE_SQL_RESERVED 0x80000200 81 82 /* 83 * Extension of "Memory Access Rights Constants" 84 * #define TEE_MEMORY_ACCESS_READ 0x00000001 85 * #define TEE_MEMORY_ACCESS_WRITE 0x00000002 86 * #define TEE_MEMORY_ACCESS_ANY_OWNER 0x00000004 87 * 88 * TEE_MEMORY_ACCESS_NONSECURE : if set TEE_CheckMemoryAccessRights() 89 * successfully returns only if target vmem range is mapped non-secure. 90 * 91 * TEE_MEMORY_ACCESS_SECURE : if set TEE_CheckMemoryAccessRights() 92 * successfully returns only if target vmem range is mapped secure. 93 94 */ 95 #define TEE_MEMORY_ACCESS_NONSECURE 0x10000000 96 #define TEE_MEMORY_ACCESS_SECURE 0x20000000 97 98 /* 99 * Implementation-specific login types 100 */ 101 102 /* Private login method for REE kernel clients */ 103 #define TEE_LOGIN_REE_KERNEL 0x80000000 104 105 #endif /* TEE_API_DEFINES_EXTENSIONS_H */ 106