cryptoengine.c 8.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279
  1. /* Motenpoche
  2. *
  3. * (c) 2023 Daniele Lacamera <root@danielinux.net>
  4. *
  5. *
  6. * Motenpoche is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License as published by
  8. * the Free Software Foundation; either version 2 of the License, or
  9. * (at your option) any later version.
  10. *
  11. * Motenpoche is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. * GNU General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU General Public License
  17. * along with this program; if not, write to the Free Software
  18. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
  19. *
  20. */
  21. #include "user_settings.h"
  22. #include <stdint.h>
  23. #include "cryptoengine.h"
  24. #include "fsm.h"
  25. #include "flash.h"
  26. #include "class/cdc/cdc.h"
  27. #include "class/cdc/cdc_device.h"
  28. #include "bsp/board.h"
  29. #include "wolfssl/wolfcrypt/sha512.h"
  30. #include "wolfssl/wolfcrypt/pwdbased.h"
  31. #include "wolfssl/wolfcrypt/chacha.h"
  32. #include "wolfssl/wolfcrypt/ecc.h"
  33. #include "hardware/gpio.h"
  34. static struct vault_header hdr_cache;
  35. uint32_t sector_cache_id = 0xFFFFFFFF;
  36. static ChaCha cha;
  37. static ecc_key ecc;
  38. static struct vault_service svc_cache;
  39. static int svc_cache_id = -1;
  40. int flash_decrypt_read_sector(uint32_t sector, uint8_t *buf)
  41. {
  42. if (cryptoengine_check_vault() < 0)
  43. return -1;
  44. if (fsm_get() < VAULT_MAIN_MENU)
  45. return -1;
  46. if ((sector * SPI_FLASH_SECTOR_SIZE) >= DRIVE_FLASH_SIZE)
  47. return -1;
  48. flash_read(DRIVE_FLASH_OFFSET + sector * SPI_FLASH_SECTOR_SIZE, buf,
  49. SPI_FLASH_SECTOR_SIZE);
  50. wc_Chacha_SetIV(&cha, hdr_cache.host_seed, sector);
  51. wc_Chacha_Process(&cha, buf, buf, SPI_FLASH_SECTOR_SIZE);
  52. return 0;
  53. }
  54. int flash_encrypt_write_sector(uint32_t sector, uint8_t *buf)
  55. {
  56. if (cryptoengine_check_vault() < 0)
  57. return -1;
  58. if (fsm_get() < VAULT_MAIN_MENU)
  59. return -1;
  60. if ((sector * SPI_FLASH_SECTOR_SIZE) >= DRIVE_FLASH_SIZE)
  61. return -1;
  62. wc_Chacha_SetIV(&cha, hdr_cache.host_seed, sector);
  63. wc_Chacha_Process(&cha, buf, buf, SPI_FLASH_SECTOR_SIZE);
  64. flash_sector_erase(DRIVE_FLASH_OFFSET + sector * SPI_FLASH_SECTOR_SIZE);
  65. flash_write(DRIVE_FLASH_OFFSET + sector * SPI_FLASH_SECTOR_SIZE, buf,
  66. SPI_FLASH_SECTOR_SIZE);
  67. return 0;
  68. }
  69. int flash_decrypt_read_svc(struct vault_service *out, uint32_t addr)
  70. {
  71. if (cryptoengine_check_vault() < 0)
  72. return -1;
  73. flash_read(addr, &svc_cache, SVC_SIZE);
  74. memcpy(out, (uint8_t *)(&svc_cache), SVC_ENC_OFF);
  75. wc_Chacha_SetIV(&cha, hdr_cache.host_seed, addr);
  76. wc_Chacha_Process(&cha, (uint8_t *)out + SVC_ENC_OFF, ((uint8_t *)&svc_cache) + SVC_ENC_OFF, SVC_ENC_SIZE);
  77. return 0;
  78. }
  79. static int flash_encrypt_write_svc(const struct vault_service *svc, uint32_t idx)
  80. {
  81. uint32_t addr = idx * SVC_SIZE + SVC_FLASH_OFFSET;
  82. if (cryptoengine_check_vault() < 0)
  83. return -1;
  84. wc_Chacha_SetIV(&cha, hdr_cache.host_seed, addr);
  85. wc_Chacha_Process(&cha, (uint8_t *)&svc_cache, (uint8_t *)svc, SVC_SIZE);
  86. flash_write_svc(&svc_cache, idx);
  87. }
  88. int cryptoengine_verify_passphrase(const char *passphrase, int *res)
  89. {
  90. int ret = -1;
  91. int i;
  92. uint8_t SecretKey[CRYPTO_KEY_SIZE];
  93. uint8_t DecryptedSignature[PK_SIGNATURE_SIZE];
  94. mp_int r, s;
  95. mp_init(&r);
  96. mp_init(&s);
  97. *res = 0;
  98. if (cryptoengine_check_vault() < 0) {
  99. return -1;
  100. }
  101. ret = wc_PBKDF2(SecretKey, passphrase, strlen(passphrase), hdr_cache.host_salt, SALT_LEN, 1000, 32, SHA512);
  102. if (ret < 0)
  103. return ret;
  104. wc_Chacha_SetKey(&cha, SecretKey, CRYPTO_KEY_SIZE);
  105. wc_Chacha_SetIV(&cha, hdr_cache.host_seed, 0);
  106. wc_Chacha_Process(&cha, DecryptedSignature, hdr_cache.signature, PK_SIGNATURE_SIZE);
  107. wc_ecc_init(&ecc);
  108. if (wc_ecc_import_unsigned(&ecc, hdr_cache.auth_pubkey,
  109. hdr_cache.auth_pubkey + CRYPTO_KEY_SIZE,
  110. NULL, ECC_SECP256R1) < 0) {
  111. mp_free(&r);
  112. mp_free(&s);
  113. wc_ecc_free(&ecc);
  114. return -1;
  115. }
  116. mp_read_unsigned_bin(&r, DecryptedSignature, CRYPTO_KEY_SIZE);
  117. mp_read_unsigned_bin(&s, DecryptedSignature + CRYPTO_KEY_SIZE,
  118. CRYPTO_KEY_SIZE);
  119. ret = wc_ecc_verify_hash_ex(&r, &s, hdr_cache.digest, VAULT_DIGEST_SIZE,
  120. res, &ecc);
  121. mp_free(&r);
  122. mp_free(&s);
  123. if ((ret < 0) || (*res != 1)) {
  124. if (*res == 0)
  125. gpio_put(16, 0);
  126. wc_ecc_free(&ecc);
  127. }
  128. return ret;
  129. }
  130. static void hdr_cache_load(void)
  131. {
  132. flash_read(VAULT_FLASH_OFFSET, &hdr_cache, sizeof(struct vault_header));
  133. }
  134. uint8_t checked_digest[VAULT_DIGEST_SIZE];
  135. int cryptoengine_hdr_sha_check(const struct vault_header *vh)
  136. {
  137. Sha512 sha;
  138. int hash, hash_len;
  139. wc_InitSha512(&sha);
  140. for (hash = 0; hash < SHA_PAYLOAD_SIZE;) {
  141. hash_len = WC_SHA512_BLOCK_SIZE;
  142. if ((SHA_PAYLOAD_SIZE - hash) < hash_len)
  143. hash_len = SHA_PAYLOAD_SIZE - hash;
  144. wc_Sha512Update(&sha, ((uint8_t*)vh) + hash, hash_len);
  145. hash += hash_len;
  146. }
  147. wc_Sha512Final(&sha, checked_digest);
  148. if(memcmp(checked_digest, vh->digest, VAULT_DIGEST_SIZE) != 0) {
  149. return -1;
  150. }
  151. wc_Sha512Free(&sha);
  152. return 0;
  153. }
  154. int cryptoengine_svc_sha_check(const struct vault_service *vs)
  155. {
  156. Sha512 sha;
  157. int hash, hash_len;
  158. const uint32_t svc_sha_payload_size = (sizeof(struct vault_service) - (VAULT_DIGEST_SIZE + PK_SIGNATURE_SIZE));
  159. wc_InitSha512(&sha);
  160. for (hash = 0; hash < svc_sha_payload_size;) {
  161. hash_len = WC_SHA512_BLOCK_SIZE;
  162. if ((svc_sha_payload_size - hash) < hash_len)
  163. hash_len = svc_sha_payload_size - hash;
  164. wc_Sha512Update(&sha, ((uint8_t*)vs) + hash, hash_len);
  165. hash += hash_len;
  166. }
  167. wc_Sha512Final(&sha, checked_digest);
  168. if(memcmp(checked_digest, vs->dig, VAULT_DIGEST_SIZE) != 0) {
  169. return -1;
  170. }
  171. wc_Sha512Free(&sha);
  172. return 0;
  173. }
  174. int cryptoengine_svc_sig_verify(const struct vault_service *vs, int *res)
  175. {
  176. int ret;
  177. mp_int r, s;
  178. mp_init(&r);
  179. mp_init(&s);
  180. mp_read_unsigned_bin(&r, vs->sig, CRYPTO_KEY_SIZE);
  181. mp_read_unsigned_bin(&s, vs->sig + CRYPTO_KEY_SIZE, CRYPTO_KEY_SIZE);
  182. ret = wc_ecc_verify_hash_ex(&r, &s, vs->dig, VAULT_DIGEST_SIZE, res, &ecc);
  183. mp_free(&r);
  184. mp_free(&s);
  185. return ret;
  186. }
  187. int cryptoengine_check_vault(void)
  188. {
  189. hdr_cache_load();
  190. if (hdr_cache.magic != VAULT_MAGIC) {
  191. return -1;
  192. }
  193. /* Checking hdr integrity */
  194. if (cryptoengine_hdr_sha_check(&hdr_cache) < 0)
  195. return -1;
  196. /* Vault seems valid, integrity check OK */
  197. return 0;
  198. }
  199. int cryptoengine_import_service(struct vault_service *vs, uint32_t idx)
  200. {
  201. uint32_t address = SVC_FLASH_OFFSET + SVC_SIZE * idx;
  202. int res;
  203. if (cryptoengine_check_vault() < 0)
  204. return -1;
  205. memcpy(&svc_cache, ((uint8_t *)vs), SVC_ENC_OFF);
  206. wc_Chacha_SetIV(&cha, hdr_cache.host_seed, address);
  207. wc_Chacha_Process(&cha, ((uint8_t *)&svc_cache) + SVC_ENC_OFF,
  208. ((uint8_t *)vs) + SVC_ENC_OFF, SVC_ENC_SIZE);
  209. if (cryptoengine_svc_sha_check(&svc_cache) < 0) {
  210. return -1;
  211. }
  212. if ((cryptoengine_svc_sig_verify(&svc_cache, &res) < 0) || (res != 1))
  213. {
  214. return -2;
  215. }
  216. flash_write_svc(vs, idx);
  217. return 0;
  218. }
  219. int cryptoengine_service_count(uint16_t *n_srv, uint16_t *first_avail)
  220. {
  221. int i = 0;
  222. *first_avail = (uint16_t)-1;
  223. *n_srv = 0;
  224. struct vault_service svc;
  225. if (cryptoengine_check_vault() < 0)
  226. return -1;
  227. while (1) {
  228. flash_read(SVC_FLASH_OFFSET + (i * SVC_SIZE), &svc, SVC_SIZE);
  229. if (svc.flags == SVC_FLAG_ACTIVE)
  230. (*n_srv)++;
  231. else if (svc.flags == SVC_FLAG_ERASED)
  232. *first_avail = i;
  233. else if (svc.flags == SVC_FLAG_UNUSED) {
  234. if (*first_avail == ((uint16_t)-1))
  235. *first_avail = i;
  236. break;
  237. }
  238. i++;
  239. }
  240. return *n_srv;
  241. }
  242. int cryptoengine_fill_vault_status(struct vault_status *vst)
  243. {
  244. if (cryptoengine_check_vault() < 0)
  245. return -1;
  246. memcpy(vst->id, &hdr_cache.id, 2 * sizeof(uint32_t));
  247. memcpy(vst->salt, &hdr_cache.host_salt, SALT_LEN);
  248. memcpy(vst->seed, &hdr_cache.host_seed, SEED_LEN);
  249. }