aboutsummaryrefslogblamecommitdiff
path: root/mkm.c
blob: 41197444fcd60cd1fcd80297a1234a3374f4a64c (plain) (tree)
1
2
3
4
5
6
7
8




                               
                                                             

                                                            












































                                                                                  

                         



                   


                                                                                           












                                                     

                               
                    
                  


                  
                          
 
                                                                
               
 


                                                                                        
             






                                                                                                          

                                                                                                      
               


                    



                      





                                                                 
                          



                                          
                                                  
                                                                

               


                                                                                        






                                                                                      

                                                                            

   




                      
                               
                  









                                                                               
                          






                                          
                                                  
                                                                

               




                                                                                         





                                                    
                          



                                          
                                                  
                                                                

               




                                                                                                 

 



                                                                             













                                                                       
                      
                   
                  



                               







                                                                      
                                                       
                   
                  























                                                                             
/*
 * mkm.c
 * -----
 * Master Key Memory functions.
 *
 * Copyright (c) 2016-2019, NORDUnet A/S All rights reserved.
 * Copyright: 2020, The Commons Conservancy Cryptech Project
 * SPDX-License-Identifier: BSD-3-Clause
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions are
 * met:
 * - Redistributions of source code must retain the above copyright notice,
 *   this list of conditions and the following disclaimer.
 *
 * - Redistributions in binary form must reproduce the above copyright
 *   notice, this list of conditions and the following disclaimer in the
 *   documentation and/or other materials provided with the distribution.
 *
 * - Neither the name of the NORDUnet nor the names of its contributors may
 *   be used to endorse or promote products derived from this software
 *   without specific prior written permission.
 *
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
 * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
 * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
 * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
 * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 */

/*
 * Code to load the Master key (Key Encryption Key) from either the volatile MKM
 * (by asking the FPGA to provide it, using the mkmif) or from the last sector in
 * the keystore flash.
 *
 * Storing the master key in flash is a pretty Bad Idea, but since the Alpha board
 * doesn't have a battery mounted (only pin headers for attaching one), it might
 * help in non-production use where one doesn't have tamper protection anyways.
 *
 * For production use on the Alpha, one option is to have the Master Key on paper
 * and enter it into volatile RAM after each power on.
 *
 * In both volatile memory and flash, the data is stored as a 32 bit status to
 * know if the memory is initialized or not, followed by 32 bytes (256 bits) of
 * Master Key.
 */

#include "hal.h"
#include "hal_internal.h"

#include <string.h>


#define MKM_VOLATILE_STATUS_ADDRESS     0
#define MKM_VOLATILE_SCLK_DIV           0x20
#define MKM_FLASH_STATUS_ADDRESS        (KEYSTORE_SECTOR_SIZE * (KEYSTORE_NUM_SECTORS - 1))

/*
 * Match uninitialized flash for the "not set" value.
 * Leave some bits at 1 for the "set" value to allow
 * for adding more values later, if needed.
 */
#define MKM_STATUS_NOT_SET              0xffffffff
#define MKM_STATUS_SET                  0x0000ffff
#define MKM_STATUS_ERASED               0x00000000


static hal_error_t hal_mkm_volatile_init(void)
{
  static int volatile_init = 0;

  if (volatile_init)
    return HAL_OK;

  hal_error_t err;
  uint32_t status;
  hal_core_t *core = NULL;

  if ((err = hal_core_alloc(MKMIF_NAME, &core, NULL)) != HAL_OK)
    return err;

  if ((err = hal_mkmif_set_clockspeed(core, MKM_VOLATILE_SCLK_DIV)) != HAL_OK ||
      (err = hal_mkmif_init(core)) != HAL_OK ||
      (err = hal_mkmif_read_word(core, MKM_VOLATILE_STATUS_ADDRESS, &status)) != HAL_OK)
    goto out;

  if (status != MKM_STATUS_SET && status != MKM_STATUS_NOT_SET) {
    /*
     * XXX Something is a bit fishy here. If we just write the status word, it reads back wrong sometimes,
     * while if we write the full buf too it is consistently right afterwards.
     */
    uint8_t buf[KEK_LENGTH] = {0};
    if ((err = hal_mkmif_write(core, MKM_VOLATILE_STATUS_ADDRESS + 4, buf, sizeof(buf))) != HAL_OK ||
	(err = hal_mkmif_write_word(core, MKM_VOLATILE_STATUS_ADDRESS, MKM_STATUS_NOT_SET)) != HAL_OK)
      goto out;
  }

  volatile_init = 1;

out:
  hal_core_free(core);
  return err;
}

hal_error_t hal_mkm_volatile_read(uint8_t *buf, const size_t len)
{
  hal_error_t err;
  uint32_t status;
  hal_core_t *core = NULL;

  if (len && len != KEK_LENGTH)
    return HAL_ERROR_MASTERKEY_BAD_LENGTH;

  if ((err = hal_mkm_volatile_init()) != HAL_OK ||
      (err = hal_core_alloc(MKMIF_NAME, &core, NULL)) != HAL_OK)
    return err;

  if ((err = hal_mkmif_read_word(core, MKM_VOLATILE_STATUS_ADDRESS, &status)) != HAL_OK)
      goto out;

  if (buf != NULL && len) {
    /*
     * Don't return the random bytes in the RAM memory in case it isn't initialized.
     * Or maybe we should fill the buffer with proper random data in that case... hmm.
     */
    if (status != MKM_STATUS_SET)
      memset(buf, 0x0, len);
    else
      err = hal_mkmif_read(core, MKM_VOLATILE_STATUS_ADDRESS + 4, buf, len);
  }

out:
  hal_core_free(core);
  if (err != HAL_OK)
    return err;

  if (status == MKM_STATUS_SET)
    return HAL_OK;

  if (status == MKM_STATUS_NOT_SET)
    return HAL_ERROR_MASTERKEY_NOT_SET;

  return HAL_ERROR_MASTERKEY_FAIL;
}

hal_error_t hal_mkm_volatile_write(const uint8_t * const buf, const size_t len)
{
  hal_error_t err;
  hal_core_t *core = NULL;

  if (len != KEK_LENGTH)
    return HAL_ERROR_MASTERKEY_BAD_LENGTH;

  if (buf == NULL)
    return HAL_ERROR_MASTERKEY_FAIL;

  if ((err = hal_mkm_volatile_init()) != HAL_OK ||
      (err = hal_core_alloc(MKMIF_NAME, &core, NULL)) != HAL_OK)
    return err;

  if ((err = hal_mkmif_write(core, MKM_VOLATILE_STATUS_ADDRESS + 4, buf, len)) == HAL_OK)
    err = hal_mkmif_write_word(core, MKM_VOLATILE_STATUS_ADDRESS, MKM_STATUS_SET);

  hal_core_free(core);
  return err;
}

hal_error_t hal_mkm_volatile_erase(const size_t len)
{
  uint8_t buf[KEK_LENGTH] = {0};
  hal_error_t err;
  hal_core_t *core = NULL;

  if (len != KEK_LENGTH)
    return HAL_ERROR_MASTERKEY_BAD_LENGTH;

  if ((err = hal_mkm_volatile_init()) != HAL_OK ||
      (err = hal_core_alloc(MKMIF_NAME, &core, NULL)) != HAL_OK)
    return err;

  if ((err = hal_mkmif_write(NULL, MKM_VOLATILE_STATUS_ADDRESS + 4, buf, sizeof(buf))) == HAL_OK)
    err = hal_mkmif_write_word(NULL, MKM_VOLATILE_STATUS_ADDRESS, MKM_STATUS_NOT_SET);

  hal_core_free(core);
  return err;
}

/*
 * hal_mkm_flash_*() functions moved to ks_flash.c, to keep all the code that
 * knows intimate details of the keystore flash layout in one place.
 */

hal_error_t hal_mkm_get_kek(uint8_t *kek,
			    size_t *kek_len,
			    const size_t kek_max)
{
  if (kek == NULL || kek_len == NULL || kek_max < bitsToBytes(128))
    return HAL_ERROR_BAD_ARGUMENTS;

  const size_t len = ((kek_max < bitsToBytes(192)) ? bitsToBytes(128) :
                      (kek_max < bitsToBytes(256)) ? bitsToBytes(192) :
                      bitsToBytes(256));

  hal_error_t err = hal_mkm_volatile_read(kek, len);

  if (err == HAL_OK) {
    *kek_len = len;
    return HAL_OK;
  }

#if HAL_MKM_FLASH_BACKUP_KLUDGE

  /*
   * It turns out that, in every case where this function is called,
   * we already hold the keystore lock, so attempting to grab it again
   * would deadlock.  This almost never happens when the volatile MKM
   * is set, but there's a race condition that might drop us here if
   * hal_mkm_volatile_read() returns HAL_ERROR_CORE_BUSY.  Whee!
   */

  if (hal_mkm_flash_read_no_lock(kek, len) == HAL_OK) {
    *kek_len = len;
    return HAL_OK;
  }

#endif

  /*
   * Both keystores returned an error, probably HAL_ERROR_MASTERKEY_NOT_SET.
   * I could try to be clever and compare the errors, but really the volatile
   * keystore is the important one (you shouldn't store the master key in
   * flash), so return that error.
   */
  return err;
}

/*
 * "Any programmer who fails to comply with the standard naming, formatting,
 *  or commenting conventions should be shot.  If it so happens that it is
 *  inconvenient to shoot him, then he is to be politely requested to recode
 *  his program in adherence to the above standard."
 *                      -- Michael Spier, Digital Equipment Corporation
 *
 * Local variables:
 * indent-tabs-mode: nil
 * End:
 */