cryptoengine.c 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276
  1. /* Motenpoche
  2. *
  3. * (c) 2023 Daniele Lacamera <root@danielinux.net>
  4. *
  5. *
  6. * Motenpoche is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License as published by
  8. * the Free Software Foundation; either version 2 of the License, or
  9. * (at your option) any later version.
  10. *
  11. * Motenpoche is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. * GNU General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU General Public License
  17. * along with this program; if not, write to the Free Software
  18. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
  19. *
  20. */
  21. #include "user_settings.h"
  22. #include <stdint.h>
  23. #include "cryptoengine.h"
  24. #include "fsm.h"
  25. #include "flash.h"
  26. #include "class/cdc/cdc.h"
  27. #include "class/cdc/cdc_device.h"
  28. #include "bsp/board.h"
  29. #include "wolfssl/wolfcrypt/sha512.h"
  30. #include "wolfssl/wolfcrypt/pwdbased.h"
  31. #include "wolfssl/wolfcrypt/chacha.h"
  32. #include "wolfssl/wolfcrypt/ecc.h"
  33. #include "hardware/gpio.h"
  34. static struct vault_header hdr_cache;
  35. uint32_t sector_cache_id = 0xFFFFFFFF;
  36. static ChaCha cha;
  37. static ecc_key ecc;
  38. static struct vault_service svc_cache;
  39. static int svc_cache_id = -1;
  40. int flash_decrypt_read_sector(uint32_t sector, uint8_t *buf)
  41. {
  42. if (cryptoengine_check_vault() < 0)
  43. return -1;
  44. if (fsm_get() < VAULT_MAIN_MENU)
  45. return -1;
  46. if ((sector * SPI_FLASH_SECTOR_SIZE) >= DRIVE_FLASH_SIZE)
  47. return -1;
  48. flash_read(DRIVE_FLASH_OFFSET + sector * SPI_FLASH_SECTOR_SIZE, buf,
  49. SPI_FLASH_SECTOR_SIZE);
  50. wc_Chacha_SetIV(&cha, hdr_cache.host_seed, sector);
  51. wc_Chacha_Process(&cha, buf, buf, SPI_FLASH_SECTOR_SIZE);
  52. return 0;
  53. }
  54. int flash_encrypt_write_sector(uint32_t sector, uint8_t *buf)
  55. {
  56. if (cryptoengine_check_vault() < 0)
  57. return -1;
  58. if (fsm_get() < VAULT_MAIN_MENU)
  59. return -1;
  60. if ((sector * SPI_FLASH_SECTOR_SIZE) >= DRIVE_FLASH_SIZE)
  61. return -1;
  62. wc_Chacha_SetIV(&cha, hdr_cache.host_seed, sector);
  63. wc_Chacha_Process(&cha, buf, buf, SPI_FLASH_SECTOR_SIZE);
  64. flash_write(DRIVE_FLASH_OFFSET + sector * SPI_FLASH_SECTOR_SIZE, buf,
  65. SPI_FLASH_SECTOR_SIZE);
  66. return 0;
  67. }
  68. int flash_decrypt_read_svc(struct vault_service *out, uint32_t addr)
  69. {
  70. if (cryptoengine_check_vault() < 0)
  71. return -1;
  72. flash_read(addr, &svc_cache, SVC_SIZE);
  73. memcpy(out, (uint8_t *)(&svc_cache), SVC_ENC_OFF);
  74. wc_Chacha_SetIV(&cha, hdr_cache.host_seed, addr);
  75. wc_Chacha_Process(&cha, (uint8_t *)out + SVC_ENC_OFF, ((uint8_t *)&svc_cache) + SVC_ENC_OFF, SVC_ENC_SIZE);
  76. return 0;
  77. }
  78. static int flash_encrypt_write_svc(const struct vault_service *svc, uint32_t idx)
  79. {
  80. uint32_t addr = idx * SVC_SIZE + SVC_FLASH_OFFSET;
  81. if (cryptoengine_check_vault() < 0)
  82. return -1;
  83. wc_Chacha_SetIV(&cha, hdr_cache.host_seed, addr);
  84. wc_Chacha_Process(&cha, (uint8_t *)&svc_cache, (uint8_t *)svc, SVC_SIZE);
  85. flash_write_svc(&svc_cache, idx);
  86. }
  87. int cryptoengine_verify_passphrase(const char *passphrase, int *res)
  88. {
  89. int ret = -1;
  90. int i;
  91. uint8_t SecretKey[CRYPTO_KEY_SIZE];
  92. uint8_t DecryptedSignature[PK_SIGNATURE_SIZE];
  93. mp_int r, s;
  94. mp_init(&r);
  95. mp_init(&s);
  96. *res = 0;
  97. if (cryptoengine_check_vault() < 0) {
  98. return -1;
  99. }
  100. ret = wc_PBKDF2(SecretKey, passphrase, strlen(passphrase), hdr_cache.host_salt, SALT_LEN, 1000, 32, SHA512);
  101. if (ret < 0)
  102. return ret;
  103. wc_Chacha_SetKey(&cha, SecretKey, CRYPTO_KEY_SIZE);
  104. wc_Chacha_SetIV(&cha, hdr_cache.host_seed, 0);
  105. wc_Chacha_Process(&cha, DecryptedSignature, hdr_cache.signature, PK_SIGNATURE_SIZE);
  106. wc_ecc_init(&ecc);
  107. if (wc_ecc_import_unsigned(&ecc, hdr_cache.auth_pubkey,
  108. hdr_cache.auth_pubkey + CRYPTO_KEY_SIZE,
  109. NULL, ECC_SECP256R1) < 0) {
  110. mp_free(&r);
  111. mp_free(&s);
  112. wc_ecc_free(&ecc);
  113. return -1;
  114. }
  115. mp_read_unsigned_bin(&r, DecryptedSignature, CRYPTO_KEY_SIZE);
  116. mp_read_unsigned_bin(&s, DecryptedSignature + CRYPTO_KEY_SIZE,
  117. CRYPTO_KEY_SIZE);
  118. ret = wc_ecc_verify_hash_ex(&r, &s, hdr_cache.digest, VAULT_DIGEST_SIZE,
  119. res, &ecc);
  120. mp_free(&r);
  121. mp_free(&s);
  122. if ((ret < 0) || (*res != 1)) {
  123. if (*res == 0)
  124. gpio_put(16, 0);
  125. wc_ecc_free(&ecc);
  126. }
  127. return ret;
  128. }
  129. static void hdr_cache_load(void)
  130. {
  131. flash_read(VAULT_FLASH_OFFSET, &hdr_cache, sizeof(struct vault_header));
  132. }
  133. uint8_t checked_digest[VAULT_DIGEST_SIZE];
  134. int cryptoengine_hdr_sha_check(const struct vault_header *vh)
  135. {
  136. Sha512 sha;
  137. int hash, hash_len;
  138. wc_InitSha512(&sha);
  139. for (hash = 0; hash < SHA_PAYLOAD_SIZE;) {
  140. hash_len = WC_SHA512_BLOCK_SIZE;
  141. if ((SHA_PAYLOAD_SIZE - hash) < hash_len)
  142. hash_len = SHA_PAYLOAD_SIZE - hash;
  143. wc_Sha512Update(&sha, ((uint8_t*)vh) + hash, hash_len);
  144. hash += hash_len;
  145. }
  146. wc_Sha512Final(&sha, checked_digest);
  147. if(memcmp(checked_digest, vh->digest, VAULT_DIGEST_SIZE) != 0) {
  148. return -1;
  149. }
  150. wc_Sha512Free(&sha);
  151. return 0;
  152. }
  153. int cryptoengine_svc_sha_check(const struct vault_service *vs)
  154. {
  155. Sha512 sha;
  156. int hash, hash_len;
  157. const uint32_t svc_sha_payload_size = (sizeof(struct vault_service) - (VAULT_DIGEST_SIZE + PK_SIGNATURE_SIZE));
  158. wc_InitSha512(&sha);
  159. for (hash = 0; hash < svc_sha_payload_size;) {
  160. hash_len = WC_SHA512_BLOCK_SIZE;
  161. if ((svc_sha_payload_size - hash) < hash_len)
  162. hash_len = svc_sha_payload_size - hash;
  163. wc_Sha512Update(&sha, ((uint8_t*)vs) + hash, hash_len);
  164. hash += hash_len;
  165. }
  166. wc_Sha512Final(&sha, checked_digest);
  167. if(memcmp(checked_digest, vs->dig, VAULT_DIGEST_SIZE) != 0) {
  168. return -1;
  169. }
  170. wc_Sha512Free(&sha);
  171. return 0;
  172. }
  173. int cryptoengine_svc_sig_verify(const struct vault_service *vs, int *res)
  174. {
  175. int ret;
  176. mp_int r, s;
  177. mp_init(&r);
  178. mp_init(&s);
  179. mp_read_unsigned_bin(&r, vs->sig, CRYPTO_KEY_SIZE);
  180. mp_read_unsigned_bin(&s, vs->sig + CRYPTO_KEY_SIZE, CRYPTO_KEY_SIZE);
  181. ret = wc_ecc_verify_hash_ex(&r, &s, vs->dig, VAULT_DIGEST_SIZE, res, &ecc);
  182. mp_free(&r);
  183. mp_free(&s);
  184. return ret;
  185. }
  186. int cryptoengine_check_vault(void)
  187. {
  188. hdr_cache_load();
  189. if (hdr_cache.magic != VAULT_MAGIC) {
  190. return -1;
  191. }
  192. /* Checking hdr integrity */
  193. if (cryptoengine_hdr_sha_check(&hdr_cache) < 0)
  194. return -1;
  195. /* Vault seems valid, integrity check OK */
  196. return 0;
  197. }
  198. int cryptoengine_import_service(struct vault_service *vs, uint32_t idx)
  199. {
  200. uint32_t address = SVC_FLASH_OFFSET + SVC_SIZE * idx;
  201. int res;
  202. if (cryptoengine_check_vault() < 0)
  203. return -1;
  204. memcpy(&svc_cache, ((uint8_t *)vs), SVC_ENC_OFF);
  205. wc_Chacha_SetIV(&cha, hdr_cache.host_seed, address);
  206. wc_Chacha_Process(&cha, ((uint8_t *)&svc_cache) + SVC_ENC_OFF,
  207. ((uint8_t *)vs) + SVC_ENC_OFF, SVC_ENC_SIZE);
  208. if (cryptoengine_svc_sha_check(&svc_cache) < 0) {
  209. return -1;
  210. }
  211. if ((cryptoengine_svc_sig_verify(&svc_cache, &res) < 0) || (res != 1))
  212. {
  213. return -2;
  214. }
  215. flash_write_svc(vs, idx);
  216. return 0;
  217. }
  218. int cryptoengine_service_count(uint16_t *n_srv, uint16_t *first_avail)
  219. {
  220. int i = 0;
  221. *first_avail = (uint16_t)-1;
  222. *n_srv = 0;
  223. struct vault_service svc;
  224. if (cryptoengine_check_vault() < 0)
  225. return -1;
  226. while (1) {
  227. flash_read(SVC_FLASH_OFFSET + (i * SVC_SIZE), &svc, SVC_SIZE);
  228. if (svc.flags == SVC_FLAG_ACTIVE)
  229. (*n_srv)++;
  230. else if (svc.flags == SVC_FLAG_ERASED)
  231. *first_avail = i;
  232. else if (svc.flags == SVC_FLAG_UNUSED) {
  233. if (*first_avail == ((uint16_t)-1))
  234. *first_avail = i;
  235. break;
  236. }
  237. i++;
  238. }
  239. return *n_srv;
  240. }
  241. int cryptoengine_fill_vault_status(struct vault_status *vst)
  242. {
  243. if (cryptoengine_check_vault() < 0)
  244. return -1;
  245. memcpy(vst->id, &hdr_cache.id, 2 * sizeof(uint32_t));
  246. memcpy(vst->salt, &hdr_cache.host_salt, SALT_LEN);
  247. memcpy(vst->seed, &hdr_cache.host_seed, SEED_LEN);
  248. }