Description

Secure Engine key handling API.

API for using cryptographic keys with the SE. Contains functionality to generate, import and export keys to and from protected types like wrapped or volatile keys.

Data Structures

struct sl_se_buffer_t
Describes where the key is or should be stored.
struct sl_se_key_storage_t
Describes the storage location of keys.
struct sl_se_key_descriptor_t
Contains a full description of a key used by an SE command.
struct sl_se_custom_weierstrass_prime_domain_t
Custom Weierstrass curve structure.

Functions

sl_status_t sl_se_validate_key (const sl_se_key_descriptor_t *key)
Validate key descriptor.
sl_status_t sl_se_generate_key ( sl_se_command_context_t *cmd_ctx, const sl_se_key_descriptor_t *key_out)
Generate a random key adhering to the given key descriptor.
sl_status_t sl_se_import_key ( sl_se_command_context_t *cmd_ctx, const sl_se_key_descriptor_t *key_in, const sl_se_key_descriptor_t *key_out)
Import a key using the SE.
sl_status_t sl_se_export_key ( sl_se_command_context_t *cmd_ctx, const sl_se_key_descriptor_t *key_in, const sl_se_key_descriptor_t *key_out)
Export a volatile or wrapped key back to plaintext.
sl_status_t sl_se_transfer_key ( sl_se_command_context_t *cmd_ctx, const sl_se_key_descriptor_t *key_in, const sl_se_key_descriptor_t *key_out)
Transfer a volatile or wrapped key to another protected storage.
sl_status_t sl_se_export_public_key ( sl_se_command_context_t *cmd_ctx, const sl_se_key_descriptor_t *key_in, const sl_se_key_descriptor_t *key_out)
Export the public part of an ECC keypair.
sl_status_t sl_se_delete_key ( sl_se_command_context_t *cmd_ctx, const sl_se_key_descriptor_t *key)
Delete a key from a volatile SE storage slot.
sl_status_t sl_se_get_storage_size (const sl_se_key_descriptor_t *key, uint32_t *storage_size)
Returns the required storage size for the given key.

Macros

#define SL_SE_KEY_FLAG_ASYMMETRIC_SIGNING_ONLY (1UL << 10)
Asymmetric key can only be used for signing (not key exchange)
#define SL_SE_KEY_FLAG_ASYMMETRIC_USES_CUSTOM_DOMAIN (1UL << 12)
Described key belongs to a custom ECC domain.
#define SL_SE_KEY_FLAG_ASYMMETRIC_BUFFER_HAS_PUBLIC_KEY (1UL << 13)
Storage buffer contains public part of an asymmetric key.
#define SL_SE_KEY_FLAG_ASYMMETRIC_BUFFER_HAS_PRIVATE_KEY (1UL << 14)
Storage buffer contains private part of an asymmetric key.
#define SL_SE_KEY_FLAG_ALLOW_ANY_ACCESS (1UL << 15)
Allow usage of this key by other bus masters or TrustZone levels than the one which created/imported the key.
#define SL_SE_KEY_FLAG_ASYMMMETRIC_SIGNING_ONLY ( SL_SE_KEY_FLAG_ASYMMETRIC_SIGNING_ONLY )
Old definition. Retained for backwards compatibility.
#define SL_SE_KEY_FLAG_NON_EXPORTABLE (1UL << 24)
Do not allow exporting the key to plaintext.
#define SL_SE_KEY_FLAG_IS_DEVICE_GENERATED (1UL << 25)
Indicate that the key has been generated by this device.
#define SL_SE_KEY_FLAG_IS_RESTRICTED (1UL << 25 | 1UL << 24)
Indicate that the key can only be used to sign SE generated content.
#define SL_SE_KEY_TYPE_ALGORITHM_MASK 0xf0000000
Mask for algorithm field in key type.
#define SL_SE_KEY_TYPE_ALGORITHM_OFFSET 28
Offset of algorithm field in key type.
#define SL_SE_KEY_TYPE_ATTRIBUTES_MASK 0x00007fff
Mask for attributes field in key type.
#define SL_SE_KEY_TYPE_ATTRIBUTES_OFFSET 0
Offset of attributes field in key type.
#define SL_SE_KEY_TYPE_SYMMETRIC 0x00000000
Symmetric key type.
#define SL_SE_KEY_TYPE_AES_128 0x00000010
Symmetric key type for AES-128 (16 byte key)
#define SL_SE_KEY_TYPE_AES_192 0x00000018
Symmetric key type for AES-192 (24 byte key)
#define SL_SE_KEY_TYPE_AES_256 0x00000020
Symmetric key type for AES-256 (32 byte key)
#define SL_SE_KEY_TYPE_ECC_WEIERSTRASS_PRIME_CUSTOM (0x8U << SL_SE_KEY_TYPE_ALGORITHM_OFFSET )
ECC Weierstrass Prime key type.
#define SL_SE_KEY_TYPE_ECC_P192 ( SL_SE_KEY_TYPE_ECC_WEIERSTRASS_PRIME_CUSTOM | (0x18))
ECC NIST P-192.
#define SL_SE_KEY_TYPE_ECC_P224 ( SL_SE_KEY_TYPE_ECC_WEIERSTRASS_PRIME_CUSTOM | (0x1C))
ECC NIST P-224.
#define SL_SE_KEY_TYPE_ECC_P256 ( SL_SE_KEY_TYPE_ECC_WEIERSTRASS_PRIME_CUSTOM | (0x20))
ECC NIST P-256.
#define SL_SE_KEY_TYPE_CHACHA20 0x00000020
Symmetric key type for ChaCha20.
#define SL_SE_KEY_TYPE_ECC_MONTGOMERY (0xbU << SL_SE_KEY_TYPE_ALGORITHM_OFFSET )
ECC Montgomery key type.
#define SL_SE_KEY_TYPE_ECC_EDDSA (0xcU << SL_SE_KEY_TYPE_ALGORITHM_OFFSET )
EDDSA key type.
#define SL_SE_KEY_TYPE_ECC_P384 ( SL_SE_KEY_TYPE_ECC_WEIERSTRASS_PRIME_CUSTOM | (0x30))
ECC NIST P-384.
#define SL_SE_KEY_TYPE_ECC_P521 ( SL_SE_KEY_TYPE_ECC_WEIERSTRASS_PRIME_CUSTOM | (0x42))
ECC NIST P-521.
#define SL_SE_KEY_TYPE_ECC_X25519 ( SL_SE_KEY_TYPE_ECC_MONTGOMERY | (0x20))
ECC X25519 key for ECDH.
#define SL_SE_KEY_TYPE_ECC_X448 ( SL_SE_KEY_TYPE_ECC_MONTGOMERY | (0x38))
ECC X448 key for ECDH.
#define SL_SE_KEY_TYPE_ECC_ED25519 ( SL_SE_KEY_TYPE_ECC_EDDSA | (0x20))
ECC Ed25519 key for EdDSA.
#define SL_SE_KEY_TYPE_ECC_ED448 ( SL_SE_KEY_TYPE_ECC_EDDSA | (0x38))
ECC Ed448 key for EdDSA.
#define SL_SE_KEY_STORAGE_EXTERNAL_PLAINTEXT 0x00
Key storage methods.
#define SL_SE_KEY_STORAGE_EXTERNAL_WRAPPED 0x01
Key is stored encrypted in application memory.
#define SL_SE_KEY_STORAGE_INTERNAL_VOLATILE 0x02
Key is stored inside the SE, and will persist until system reset or explicitly deleted.
#define SL_SE_KEY_STORAGE_INTERNAL_IMMUTABLE 0x03
Key is one of the pre-defined keys (pre-loaded or write-once) available in the SE.
#define SL_SE_KEY_SLOT_VOLATILE_0 0x00
List of available internal SE key slots.
#define SL_SE_KEY_SLOT_VOLATILE_1 0x01
Internal volatile slot 1.
#define SL_SE_KEY_SLOT_VOLATILE_2 0x02
Internal volatile slot 2.
#define SL_SE_KEY_SLOT_VOLATILE_3 0x03
Internal volatile slot 3.
#define SL_SE_KEY_SLOT_APPLICATION_SECURE_DEBUG_KEY 0xF8
Internal immutable application secure debug key.
#define SL_SE_KEY_SLOT_APPLICATION_AES_128_KEY 0xFA
Internal immutable application AES-128 key (bootloader key)
#define SL_SE_KEY_SLOT_APPLICATION_SECURE_BOOT_KEY 0xFC
Internal immutable application secure boot key.
#define SL_SE_KEY_SLOT_APPLICATION_ATTESTATION_KEY 0xFE
Internal immutable application attestation key.
#define SL_SE_KEY_SLOT_SE_ATTESTATION_KEY 0xFF
Internal immutable SE attestation key.
#define SLI_SE_WRAPPED_KEY_OVERHEAD (12 + 16)
Size overhead for wrapped keys.

Typedefs

typedef uint32_t sl_se_key_type_t
Supported key types.
typedef uint32_t sl_se_storage_method_t
Key storage method.
typedef uint32_t sl_se_key_slot_t
Internal SE key slot.

Function Documentation

sl_se_validate_key()

sl_status_t sl_se_validate_key ( const sl_se_key_descriptor_t * key )

Validate key descriptor.

Takes a key descriptor and checks if all required properties have been set for the specific key type.

Parameters
[in] key The key to validate.
Returns
Status code, sl_status.h.

sl_se_generate_key()

sl_status_t sl_se_generate_key ( sl_se_command_context_t * cmd_ctx,
const sl_se_key_descriptor_t * key_out
)

Generate a random key adhering to the given key descriptor.

The SE takes a key descriptor and generates a key with the given properties in the location specified by the descriptor.

If the key size is not aligned to a multiple of words the key representation is padded in front of the key.

Parameters
[in] cmd_ctx Pointer to an SE command context object.
[in] key_out Description of the key to generate. Sets key parameters and describes the storage location for the key.
Returns
Status code, sl_status.h.

sl_se_import_key()

sl_status_t sl_se_import_key ( sl_se_command_context_t * cmd_ctx,
const sl_se_key_descriptor_t * key_in,
const sl_se_key_descriptor_t * key_out
)

Import a key using the SE.

Protect a key using the SE. Import a plaintext key and store it either in a volatile slot or as a wrapped key.

Parameters
[in] cmd_ctx Pointer to an SE command context object.
[in] key_in A plaintext key.
[in] key_out Either a volatile or a wrapped key with similar properties as key_in.
Returns
Status code, sl_status.h.

sl_se_export_key()

sl_status_t sl_se_export_key ( sl_se_command_context_t * cmd_ctx,
const sl_se_key_descriptor_t * key_in,
const sl_se_key_descriptor_t * key_out
)

Export a volatile or wrapped key back to plaintext.

Attempt to have the SE export a volatile or wrapped key back to plaintext if allowed.

Parameters
[in] cmd_ctx Pointer to an SE command context object.
[in] key_in Either a volatile or a wrapped key with similar properties as key_out.
[in] key_out The exported key in plaintext.
Returns
Status code, sl_status.h. SL_STATUS_INVALID_PARAMETER if key does not exist.

sl_se_transfer_key()

sl_status_t sl_se_transfer_key ( sl_se_command_context_t * cmd_ctx,
const sl_se_key_descriptor_t * key_in,
const sl_se_key_descriptor_t * key_out
)

Transfer a volatile or wrapped key to another protected storage.

Attempt to have the SE transfer a volatile or wrapped key if allowed.

Note
The key stored in the source protected storage will not be deleted.

Transferring a key between the same volatile slot is not allowed.

Parameters
[in] cmd_ctx Pointer to an SE command context object.
[in] key_in Either a volatile or a wrapped key with similar properties as key_out.
[in] key_out Either a volatile or a wrapped key with similar properties as key_in.
Returns
Status code, sl_status.h. SL_STATUS_INVALID_PARAMETER if key does not exist.

sl_se_export_public_key()

sl_status_t sl_se_export_public_key ( sl_se_command_context_t * cmd_ctx,
const sl_se_key_descriptor_t * key_in,
const sl_se_key_descriptor_t * key_out
)

Export the public part of an ECC keypair.

The output key must be specified to only contain a public key.

Parameters
[in] cmd_ctx Pointer to an SE command context object.
[in] key_in An asymmetric key with either a private or public part.
[out] key_out Describes output key parameters. Should only be set to contain the public part of the key.
Returns
Status code, sl_status.h.

sl_se_delete_key()

sl_status_t sl_se_delete_key ( sl_se_command_context_t * cmd_ctx,
const sl_se_key_descriptor_t * key
)

Delete a key from a volatile SE storage slot.

The given key will be removed from the SE. The key descriptor is not modified and can be used to generate a new key without any updates.

Parameters
[in] cmd_ctx Pointer to an SE command context object.
[in] key Key to delete.
Returns
Status code, sl_status.h.

sl_se_get_storage_size()

sl_status_t sl_se_get_storage_size ( const sl_se_key_descriptor_t * key,
uint32_t * storage_size
)

Returns the required storage size for the given key.

Finds the total storage size required for a given key. This includes storage for the public and private part of asymmetric keys, as well as overhead for wrapping keys.

Parameters
[in] key The sl_se_key_descriptor_t to find the required storage size for.
[out] storage_size The required storage size in bytes.
Returns
Status code, sl_status.h.

Macro Definition Documentation

SL_SE_KEY_FLAG_ASYMMETRIC_SIGNING_ONLY

#define SL_SE_KEY_FLAG_ASYMMETRIC_SIGNING_ONLY   (1UL << 10)

Asymmetric key can only be used for signing (not key exchange)

SL_SE_KEY_FLAG_ASYMMETRIC_USES_CUSTOM_DOMAIN

#define SL_SE_KEY_FLAG_ASYMMETRIC_USES_CUSTOM_DOMAIN   (1UL << 12)

Described key belongs to a custom ECC domain.

SL_SE_KEY_FLAG_ASYMMETRIC_BUFFER_HAS_PUBLIC_KEY

#define SL_SE_KEY_FLAG_ASYMMETRIC_BUFFER_HAS_PUBLIC_KEY   (1UL << 13)

Storage buffer contains public part of an asymmetric key.

SL_SE_KEY_FLAG_ASYMMETRIC_BUFFER_HAS_PRIVATE_KEY

#define SL_SE_KEY_FLAG_ASYMMETRIC_BUFFER_HAS_PRIVATE_KEY   (1UL << 14)

Storage buffer contains private part of an asymmetric key.

SL_SE_KEY_FLAG_ALLOW_ANY_ACCESS

#define SL_SE_KEY_FLAG_ALLOW_ANY_ACCESS   (1UL << 15)

Allow usage of this key by other bus masters or TrustZone levels than the one which created/imported the key.

SL_SE_KEY_FLAG_ASYMMMETRIC_SIGNING_ONLY

#define SL_SE_KEY_FLAG_ASYMMMETRIC_SIGNING_ONLY   ( SL_SE_KEY_FLAG_ASYMMETRIC_SIGNING_ONLY )

Old definition. Retained for backwards compatibility.

SL_SE_KEY_FLAG_NON_EXPORTABLE

#define SL_SE_KEY_FLAG_NON_EXPORTABLE   (1UL << 24)

Do not allow exporting the key to plaintext.

SL_SE_KEY_FLAG_IS_DEVICE_GENERATED

#define SL_SE_KEY_FLAG_IS_DEVICE_GENERATED   (1UL << 25)

Indicate that the key has been generated by this device.

This flag is only valid when using the SE to generate a key and makes it non-exportable.

SL_SE_KEY_FLAG_IS_RESTRICTED

#define SL_SE_KEY_FLAG_IS_RESTRICTED   (1UL << 25 | 1UL << 24)

Indicate that the key can only be used to sign SE generated content.

This flag is only valid when using the SE to generate a key and makes it non-exportable.

SL_SE_KEY_TYPE_ALGORITHM_MASK

#define SL_SE_KEY_TYPE_ALGORITHM_MASK   0xf0000000

Mask for algorithm field in key type.

SL_SE_KEY_TYPE_ALGORITHM_OFFSET

#define SL_SE_KEY_TYPE_ALGORITHM_OFFSET   28

Offset of algorithm field in key type.

SL_SE_KEY_TYPE_ATTRIBUTES_MASK

#define SL_SE_KEY_TYPE_ATTRIBUTES_MASK   0x00007fff

Mask for attributes field in key type.

SL_SE_KEY_TYPE_ATTRIBUTES_OFFSET

#define SL_SE_KEY_TYPE_ATTRIBUTES_OFFSET   0

Offset of attributes field in key type.

SL_SE_KEY_TYPE_SYMMETRIC

#define SL_SE_KEY_TYPE_SYMMETRIC   0x00000000

Symmetric key type.

SL_SE_KEY_TYPE_AES_128

#define SL_SE_KEY_TYPE_AES_128   0x00000010

Symmetric key type for AES-128 (16 byte key)

SL_SE_KEY_TYPE_AES_192

#define SL_SE_KEY_TYPE_AES_192   0x00000018

Symmetric key type for AES-192 (24 byte key)

SL_SE_KEY_TYPE_AES_256

#define SL_SE_KEY_TYPE_AES_256   0x00000020

Symmetric key type for AES-256 (32 byte key)

SL_SE_KEY_TYPE_ECC_WEIERSTRASS_PRIME_CUSTOM

#define SL_SE_KEY_TYPE_ECC_WEIERSTRASS_PRIME_CUSTOM   (0x8U << SL_SE_KEY_TYPE_ALGORITHM_OFFSET )

ECC Weierstrass Prime key type.

SL_SE_KEY_TYPE_ECC_P192

#define SL_SE_KEY_TYPE_ECC_P192   ( SL_SE_KEY_TYPE_ECC_WEIERSTRASS_PRIME_CUSTOM | (0x18))

ECC NIST P-192.

SL_SE_KEY_TYPE_ECC_P224

#define SL_SE_KEY_TYPE_ECC_P224   ( SL_SE_KEY_TYPE_ECC_WEIERSTRASS_PRIME_CUSTOM | (0x1C))

ECC NIST P-224.

SL_SE_KEY_TYPE_ECC_P256

#define SL_SE_KEY_TYPE_ECC_P256   ( SL_SE_KEY_TYPE_ECC_WEIERSTRASS_PRIME_CUSTOM | (0x20))

ECC NIST P-256.

SL_SE_KEY_TYPE_CHACHA20

#define SL_SE_KEY_TYPE_CHACHA20   0x00000020

Symmetric key type for ChaCha20.

SL_SE_KEY_TYPE_ECC_MONTGOMERY

#define SL_SE_KEY_TYPE_ECC_MONTGOMERY   (0xbU << SL_SE_KEY_TYPE_ALGORITHM_OFFSET )

ECC Montgomery key type.

SL_SE_KEY_TYPE_ECC_EDDSA

#define SL_SE_KEY_TYPE_ECC_EDDSA   (0xcU << SL_SE_KEY_TYPE_ALGORITHM_OFFSET )

EDDSA key type.

SL_SE_KEY_TYPE_ECC_P384

#define SL_SE_KEY_TYPE_ECC_P384   ( SL_SE_KEY_TYPE_ECC_WEIERSTRASS_PRIME_CUSTOM | (0x30))

ECC NIST P-384.

SL_SE_KEY_TYPE_ECC_P521

#define SL_SE_KEY_TYPE_ECC_P521   ( SL_SE_KEY_TYPE_ECC_WEIERSTRASS_PRIME_CUSTOM | (0x42))

ECC NIST P-521.

SL_SE_KEY_TYPE_ECC_X25519

#define SL_SE_KEY_TYPE_ECC_X25519   ( SL_SE_KEY_TYPE_ECC_MONTGOMERY | (0x20))

ECC X25519 key for ECDH.

SL_SE_KEY_TYPE_ECC_X448

#define SL_SE_KEY_TYPE_ECC_X448   ( SL_SE_KEY_TYPE_ECC_MONTGOMERY | (0x38))

ECC X448 key for ECDH.

SL_SE_KEY_TYPE_ECC_ED25519

#define SL_SE_KEY_TYPE_ECC_ED25519   ( SL_SE_KEY_TYPE_ECC_EDDSA | (0x20))

ECC Ed25519 key for EdDSA.

SL_SE_KEY_TYPE_ECC_ED448

#define SL_SE_KEY_TYPE_ECC_ED448   ( SL_SE_KEY_TYPE_ECC_EDDSA | (0x38))

ECC Ed448 key for EdDSA.

SL_SE_KEY_STORAGE_EXTERNAL_PLAINTEXT

#define SL_SE_KEY_STORAGE_EXTERNAL_PLAINTEXT   0x00

Key storage methods.

Key is stored in a plaintext buffer in application memory. Application can save its in-memory buffer to non-volatile memory as needed to provide key persistence.

SL_SE_KEY_STORAGE_EXTERNAL_WRAPPED

#define SL_SE_KEY_STORAGE_EXTERNAL_WRAPPED   0x01

Key is stored encrypted in application memory.

This ensures the key in wrapped form is only usable on a specific device. If the key additionally needs to be prevented from ever being output as plaintext, also set the corresponding permission bit. Application can save its in-memory buffer to non-volatile memory as needed to provide key persistence. Keys stored in this way should use the flag SL_SE_KEY_FLAG_NON_EXPORTABLE unless there is a specific need to access the key value outside the SE.

SL_SE_KEY_STORAGE_INTERNAL_VOLATILE

#define SL_SE_KEY_STORAGE_INTERNAL_VOLATILE   0x02

Key is stored inside the SE, and will persist until system reset or explicitly deleted.

Keys stored in this way should use the flag SL_SE_KEY_FLAG_NON_EXPORTABLE unless there is a specific need to access the key value outside the SE.

SL_SE_KEY_STORAGE_INTERNAL_IMMUTABLE

#define SL_SE_KEY_STORAGE_INTERNAL_IMMUTABLE   0x03

Key is one of the pre-defined keys (pre-loaded or write-once) available in the SE.

See documentation for a list of available keys.

SL_SE_KEY_SLOT_VOLATILE_0

#define SL_SE_KEY_SLOT_VOLATILE_0   0x00

List of available internal SE key slots.

Internal volatile slot 0

SL_SE_KEY_SLOT_VOLATILE_1

#define SL_SE_KEY_SLOT_VOLATILE_1   0x01

Internal volatile slot 1.

SL_SE_KEY_SLOT_VOLATILE_2

#define SL_SE_KEY_SLOT_VOLATILE_2   0x02

Internal volatile slot 2.

SL_SE_KEY_SLOT_VOLATILE_3

#define SL_SE_KEY_SLOT_VOLATILE_3   0x03

Internal volatile slot 3.

SL_SE_KEY_SLOT_APPLICATION_SECURE_DEBUG_KEY

#define SL_SE_KEY_SLOT_APPLICATION_SECURE_DEBUG_KEY   0xF8

Internal immutable application secure debug key.

SL_SE_KEY_SLOT_APPLICATION_AES_128_KEY

#define SL_SE_KEY_SLOT_APPLICATION_AES_128_KEY   0xFA

Internal immutable application AES-128 key (bootloader key)

SL_SE_KEY_SLOT_APPLICATION_SECURE_BOOT_KEY

#define SL_SE_KEY_SLOT_APPLICATION_SECURE_BOOT_KEY   0xFC

Internal immutable application secure boot key.

SL_SE_KEY_SLOT_APPLICATION_ATTESTATION_KEY

#define SL_SE_KEY_SLOT_APPLICATION_ATTESTATION_KEY   0xFE

Internal immutable application attestation key.

SL_SE_KEY_SLOT_SE_ATTESTATION_KEY

#define SL_SE_KEY_SLOT_SE_ATTESTATION_KEY   0xFF

Internal immutable SE attestation key.

SLI_SE_WRAPPED_KEY_OVERHEAD

#define SLI_SE_WRAPPED_KEY_OVERHEAD   (12 + 16)

Size overhead for wrapped keys.

Typedef Documentation

sl_se_key_type_t

typedef uint32_t sl_se_key_type_t

Supported key types.

sl_se_storage_method_t

sl_se_key_slot_t

typedef uint32_t sl_se_key_slot_t

Internal SE key slot.