aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--hal.h1
-rw-r--r--hal_internal.h6
-rw-r--r--ks_flash.c1231
-rw-r--r--ks_index.c9
-rw-r--r--ks_volatile.c3
-rw-r--r--mkm.c100
6 files changed, 854 insertions, 496 deletions
diff --git a/hal.h b/hal.h
index 6f312af..55397a4 100644
--- a/hal.h
+++ b/hal.h
@@ -144,6 +144,7 @@
DEFINE_HAL_ERROR(HAL_ERROR_MASTERKEY_FAIL, "Master key generic failure") \
DEFINE_HAL_ERROR(HAL_ERROR_MASTERKEY_BAD_LENGTH, "Master key of unacceptable length") \
DEFINE_HAL_ERROR(HAL_ERROR_KS_DRIVER_NOT_FOUND, "Keystore driver not found") \
+ DEFINE_HAL_ERROR(HAL_ERROR_KEYSTORE_BAD_CRC, "Bad CRC in keystore") \
END_OF_HAL_ERROR_LIST
/* Marker to forestall silly line continuation errors */
diff --git a/hal_internal.h b/hal_internal.h
index a6dc619..e779168 100644
--- a/hal_internal.h
+++ b/hal_internal.h
@@ -348,6 +348,10 @@ extern hal_error_t hal_set_pin(const hal_user_t user,
#define HAL_MKM_FLASH_BACKUP_KLUDGE 1
#endif
+#ifndef KEK_LENGTH
+#define KEK_LENGTH (bitsToBytes(256))
+#endif
+
extern hal_error_t hal_mkm_get_kek(uint8_t *kek, size_t *kek_len, const size_t kek_max);
extern hal_error_t hal_mkm_volatile_read(uint8_t *buf, const size_t len);
@@ -356,7 +360,7 @@ extern hal_error_t hal_mkm_volatile_erase(const size_t len);
#if HAL_MKM_FLASH_BACKUP_KLUDGE
-#warning MKM flash backup kludge enabled. Do NOT use this in production!
+/* #warning MKM flash backup kludge enabled. Do NOT use this in production! */
extern hal_error_t hal_mkm_flash_read(uint8_t *buf, const size_t len);
extern hal_error_t hal_mkm_flash_write(const uint8_t * const buf, const size_t len);
diff --git a/ks_flash.c b/ks_flash.c
index ac10602..37c2563 100644
--- a/ks_flash.c
+++ b/ks_flash.c
@@ -33,24 +33,19 @@
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
-#define HAL_OK LIBHAL_OK
+#include <stddef.h>
+#include <string.h>
+#include <assert.h>
+
#include "hal.h"
#include "hal_internal.h"
-#undef HAL_OK
+
+#include "last_gasp_pin_internal.h"
#define HAL_OK CMIS_HAL_OK
#include "stm-keystore.h"
#undef HAL_OK
-#include <string.h>
-#include <assert.h>
-
-#include "last_gasp_pin_internal.h"
-
-#define PAGE_SIZE_MASK (KEYSTORE_PAGE_SIZE - 1)
-
-#define KEK_LENGTH (bitsToBytes(256))
-
/*
* Revised flash keystore database. Work in progress.
*
@@ -60,7 +55,7 @@
* (sub)sector. This has some odd knock on effects in terms of
* things like values of enumerated constants used here.
*
- * - At the moment, all of hte the low-level flash code deals with
+ * - At the moment, all of the the low-level flash code deals with
* sectors, not sub-sectors, so for the moment we only use the first
* sub-sector of each sector. Fixing this should not involve any
* major changes to the code, just redefinition of some constants
@@ -71,297 +66,662 @@
*
* - This code assumes we're using ks_index.c, including its notion
* of a free list and its attempt at light-weight wear leveling.
+ *
+ * - This version takes a simplistic approach to updating existing
+ * blocks: write the modified contents to a new block regardless of
+ * whether they could have been made in-place. The only in-place
+ * modifications we make are things like zeroing a block to mark it
+ * as having been used recently, so that it will go near the end of
+ * the free list. We could allow many kinds of updates in place by
+ * making the crc field in the block header an array with some kind
+ * of counter (probably encoded as a mask given the constraints),
+ * but the code would be more complicated and it's not immediately
+ * obvious that it's worth it. Maybe add that as a wear reduction
+ * feature later, but let's get the simpler version working first.
+ *
+ * Current theory for update logic:
+ *
+ * 1) Update-in-place of old block to deprecate;
+ * 2) Write new block, including updating index;
+ * 3) Update-in-place of old block to zero.
*/
/*
* Known block states.
*
- * This assumes that an enum is stored as a 32-bit unsigned integer,
- * which may be a bad assumption. Might be better to use uint32_t (or
- * whatever) and inline functions for safe casting.
- *
* Might want an additional state 0xDEADDEAD to mark blocks which
* are known to be unusable, but the current hardware is NOR flash
* so that may not be as important as it would be with NAND flash.
+ *
+ * C does not guarantee any particular representation for enums, so
+ * including an enum directly in the block header isn't safe.
*/
typedef enum {
- FLASH_ERASED = 0xFFFFFFFF, /* Pristine erased block (candidate for reuse) */
- FLASH_ZEROED = 0x00000000, /* Zeroed block (recently used) */
- FLASH_KEYBLK = 0x55555555, /* Block contains key material */
- FLASH_PINBLK = 0xAAAAAAAA, /* Block contains PINs */
+ FLASH_ERASED = 0xFFFFFFFF, /* Pristine erased block (candidate for reuse) */
+ FLASH_ZEROED = 0x00000000, /* Zeroed block (recently used) */
+ FLASH_KEYBLK = 0x55555555, /* Block contains key material */
+ FLASH_KEYOLD = 0x41411414, /* Deprecated key block */
+ FLASH_PINBLK = 0xAAAAAAAA, /* Block contains PINs */
+ FLASH_PINOLD = 0x82822828, /* Deprecated PIN block */
+ FLASH_UNKNOWN = 0x12345678, /* Internal code for "I have no clue what this is" */
} flash_block_type_t;
-typedef struct {
+/*
+ * Common header for all flash block types. The crc fields should
+ * remain at the end of the header to simplify the CRC calculation.
+ */
- /*
- * What kind of flash block this is
- */
- flash_block_type_t block_type;
+typedef struct {
+ uint32_t block_type;
+ hal_crc32_t crc1, crc2;
+} flash_block_header_t;
- /*
- * CRC-32 of block contents. crc_mask width should be at least as
- * many bits as there are slots in the crc array. Once all of the
- * slots have been used, we have to move to a new block. Using 32
- * slots initially, adjust that up or down once we have some clue
- * how well this design works and how many slots we really want.
- */
- uint32_t crc_mask;
- hal_crc32_t crc[32];
+/*
+ * We probably want some kind of TLV format for optional attributes
+ * in key objects, and might want to put the DER key itself there to
+ * save space.
+ */
- /*
- * Payload for key and PIN blocks. Anonymous structures and unions
- * until and unless we have a reason to name them.
- *
- * Storing the KEK in a PIN block is a dangerous kludge and should
- * be removed as soon as we have a battery backup for the MKM.
- *
- * We probably want some kind of TLV format for optional attributes
- * in key objects, and might want to put the DER key itself there to
- * save space.
- */
+typedef struct {
+ flash_block_header_t header;
+ hal_uuid_t name;
+ hal_key_type_t type;
+ hal_curve_name_t curve;
+ hal_key_flags_t flags;
+ size_t der_len;
+ uint8_t der[HAL_KS_WRAPPED_KEYSIZE];
+} flash_key_block_t;
- union {
+/*
+ * PIN block. Also includes space for backing up the KEK when
+ * HAL_MKM_FLASH_BACKUP_KLUDGE is enabled.
+ */
- struct {
- hal_uuid_t name;
- hal_key_type_t type;
- hal_curve_name_t curve;
- hal_key_flags_t flags;
- size_t der_len;
- uint8_t der[HAL_KS_WRAPPED_KEYSIZE];
- } key;
+typedef struct {
+ flash_block_header_t header;
+ hal_ks_pin_t wheel_pin;
+ hal_ks_pin_t so_pin;
+ hal_ks_pin_t user_pin;
+#if HAL_MKM_FLASH_BACKUP_KLUDGE
+ uint32_t kek_set;
+ uint8_t kek[KEK_LENGTH];
+#endif
+} flash_pin_block_t;
- struct {
- struct {
- hal_user_t user;
- hal_ks_pin_t pin;
- } pins[40];
- uint8_t kek[KEK_LENGTH]; /* Kludge */
- } pin;
+#define FLASH_KEK_SET 0x33333333
- } payload;
+/*
+ * One flash block.
+ */
+typedef union {
+ uint8_t bytes[KEYSTORE_SUBSECTOR_SIZE];
+ flash_block_header_t header;
+ flash_key_block_t key;
+ flash_pin_block_t pin;
} flash_block_t;
-
-#warning Old keystore code below here
/*
- * Temporary hack: In-memory copy of entire (tiny) keystore database.
- * This is backwards compatability to let us debug without changing
- * too many moving parts at the same time, but will need to be
- * replaced by something that can handle a much larger number of keys,
- * which is one of the main points of the new keystore API.
+ * In-memory index, cache, etc.
*
- * hal_ks_key_t is ordered such that all metadata appears before the
- * big buffers, in order for all metadata to be loaded with a single
- * page read.
+ * Some or all of this probably ought to be allocated out of external
+ * SDRAM, but try it as a plain static variable initially.
+ *
+ * NUM_FLASH_BLOCKS should be KEYSTORE_NUM_SUBSECTORS, but all the
+ * current flash code uses sectors rather than subsectors, so use
+ * KEYSTORE_NUM_SECTORS until we have subsector erase code.
*/
-typedef struct {
- hal_key_type_t type;
- hal_curve_name_t curve;
- hal_key_flags_t flags;
- uint8_t in_use;
- size_t der_len;
- hal_uuid_t name;
- uint8_t der[HAL_KS_WRAPPED_KEYSIZE];
-} hal_ks_key_t;
+#ifndef KS_FLASH_CACHE_SIZE
+#define KS_FLASH_CACHE_SIZE 4
+#endif
+
+#define NUM_FLASH_BLOCKS KEYSTORE_NUM_SECTORS
typedef struct {
- hal_ks_t ks; /* Must be first (C "subclassing") */
- hal_ks_pin_t wheel_pin;
- hal_ks_pin_t so_pin;
- hal_ks_pin_t user_pin;
+ hal_ks_t ks; /* Must be first (C "subclassing") */
+ hal_ks_index_t ksi;
+ hal_ks_pin_t wheel_pin;
+ hal_ks_pin_t so_pin;
+ hal_ks_pin_t user_pin;
+ uint32_t cache_lru;
+ struct {
+ unsigned blockno;
+ uint32_t lru;
+ flash_block_t block;
+ } cache[KS_FLASH_CACHE_SIZE];
+ uint16_t _index[NUM_FLASH_BLOCKS];
+ hal_uuid_t _names[NUM_FLASH_BLOCKS];
+} db_t;
-#if HAL_STATIC_PKEY_STATE_BLOCKS > 0
- hal_ks_key_t keys[HAL_STATIC_PKEY_STATE_BLOCKS];
-#else
-#warning No keys in keydb
-#endif
+/*
+ * PIN block gets the all-zeros UUID, which will never be returned by
+ * the UUID generation code (by definition -- it's not a version 4 UUID).
+ */
-} db_t;
+const static hal_uuid_t pin_uuid = {{0}};
+
+/*
+ * The in-memory database almost certainly should be a pointer to
+ * allocated SDRAM rather than compile-time data space. Well,
+ * the arrays should be, anyway, it might be reasonable to keep
+ * the top level structure here. Worry about that later.
+ */
static db_t db;
-#define FLASH_SECTOR_1_OFFSET (0 * KEYSTORE_SECTOR_SIZE)
-#define FLASH_SECTOR_2_OFFSET (1 * KEYSTORE_SECTOR_SIZE)
+/*
+ * Type safe cast.
+ */
-static inline uint32_t _active_sector_offset()
+static inline flash_block_type_t block_get_type(const flash_block_t * const block)
{
- /* XXX Load status bytes from both sectors and decide which is current. */
-#warning Have not implemented two flash sectors yet
- return FLASH_SECTOR_1_OFFSET;
+ assert(block != NULL);
+ return (flash_block_type_t) block->header.block_type;
}
-static inline uint32_t _get_key_offset(uint32_t num)
+/*
+ * Pick unused or least-recently-used slot in our in-memory cache.
+ *
+ * Updating lru values is caller's problem: if caller is using cache
+ * slot as a temporary buffer and there's no point in caching the
+ * result, leave the lru values alone and the right thing will happen.
+ */
+
+static inline flash_block_t *cache_pick_lru(void)
{
- /*
- * Reserve first two pages for flash sector state, PINs and future additions.
- * The three PINs alone currently occupy 3 * (64 + 16 + 4) bytes (252).
- */
- uint32_t offset = KEYSTORE_PAGE_SIZE * 2;
- uint32_t key_size = sizeof(*db.keys);
- uint32_t bytes_per_key = KEYSTORE_PAGE_SIZE * ((key_size / KEYSTORE_PAGE_SIZE) + 1);
- offset += num * bytes_per_key;
- return offset;
+ uint32_t best_delta = 0;
+ int best_index = 0;
+
+ for (int i = 0; i < sizeof(db.cache)/sizeof(*db.cache); i++) {
+
+ if (db.cache[i].blockno == ~0)
+ return &db.cache[i].block;
+
+ const uint32_t delta = db.cache_lru - db.cache[i].lru;
+ if (delta > best_delta) {
+ best_delta = delta;
+ best_index = i;
+ }
+
+ }
+
+ db.cache[best_index].blockno = ~0;
+ return &db.cache[best_index].block;
}
-static hal_error_t ks_init(const hal_ks_driver_t * const driver)
+/*
+ * Find a block in our in-memory cache; return block or NULL if not present.
+ */
+
+static inline flash_block_t *cache_find_block(const unsigned blockno)
{
- uint8_t page_buf[KEYSTORE_PAGE_SIZE];
- uint32_t idx = 0; /* Current index into db.keys[] */
+ for (int i = 0; i < sizeof(db.cache)/sizeof(*db.cache); i++)
+ if (db.cache[i].blockno == blockno)
+ return &db.cache[i].block;
+ return NULL;
+}
- memset(&db, 0, sizeof(db));
+/*
+ * Mark a block in our in-memory cache as being in current use.
+ */
- if (keystore_check_id() != 1)
- return HAL_ERROR_KEYSTORE_ACCESS;
+static inline void cache_mark_used(const flash_block_t * const block, const unsigned blockno)
+{
+ for (int i = 0; i < sizeof(db.cache)/sizeof(*db.cache); i++) {
+ if (&db.cache[i].block == block) {
+ db.cache[i].blockno = blockno;
+ db.cache[i].lru = ++db.cache_lru;
+ return;
+ }
+ }
+}
- uint32_t active_sector_offset = _active_sector_offset();
+/*
+ * Release a block from the in-memory cache.
+ */
- /*
- * The PINs are in the second page of the sector.
- * Caching all of these these makes some sense in any case.
- */
+static inline void cache_release(const flash_block_t * const block)
+{
+ if (block != NULL)
+ cache_mark_used(block, ~0);
+}
- uint32_t offset = active_sector_offset + KEYSTORE_PAGE_SIZE;
- if (keystore_read_data(offset, page_buf, sizeof(page_buf)) != 1)
- return HAL_ERROR_KEYSTORE_ACCESS;
+/*
+ * Generate CRC-32 for a block.
+ *
+ * This function needs to understand the structure of
+ * flash_block_header_t, so that it can skip over the crc field.
+ */
- offset = 0;
- memcpy(&db.wheel_pin, page_buf + offset, sizeof(db.wheel_pin));
+static hal_crc32_t calculate_block_crc(const flash_block_t * const block)
+{
+ assert(block != NULL);
- offset += sizeof(db.wheel_pin);
- memcpy(&db.so_pin, page_buf + offset, sizeof(db.so_pin));
+ hal_crc32_t crc = hal_crc32_init();
- offset += sizeof(db.so_pin);
- memcpy(&db.user_pin, page_buf + offset, sizeof(db.user_pin));
+ crc = hal_crc32_update(crc,
+ block->bytes,
+ offsetof(flash_block_header_t, crc1));
- /*
- * Now read out all the keys. This is a temporary hack, in the long
- * run we want to pull these as they're needed, although depending
- * on how we organize the flash we might still need an initial scan
- * on startup to build some kind of in-memory index.
- */
+ crc = hal_crc32_update(crc,
+ block->bytes + sizeof(flash_block_header_t),
+ sizeof(block) - sizeof(flash_block_header_t));
- for (int i = 0; i < sizeof(db.keys) / sizeof(*db.keys); i++) {
+ return hal_crc32_finalize(crc);
+}
- if ((offset = _get_key_offset(i)) > KEYSTORE_SECTOR_SIZE) {
- idx++;
- continue;
- }
+/*
+ * Calculate block offset. Once we have subsectors working this will
+ * use subsector offsets, for the moment we have to use sector offsets.
+ */
+
+#if 0
+#define BLOCK_OFFSET_SIZE KEYSTORE_SUBSECTOR_SIZE
+#else
+#define BLOCK_OFFSET_SIZE KEYSTORE_SECTOR_SIZE
+#endif
- offset += active_sector_offset;
+static uint32_t block_offset(const unsigned blockno)
+{
+ return blockno * BLOCK_OFFSET_SIZE;
+}
- if (keystore_read_data(offset, page_buf, sizeof(page_buf)) != 1)
- return HAL_ERROR_KEYSTORE_ACCESS;
+/*
+ * Read a flash block. In some cases we might be able to optimize by
+ * reading just the first page, but NOR flash should be relatively
+ * fast to read, and we need the whole block to check the CRC
+ * anyway.
+ */
- const hal_ks_key_t *key = (const hal_ks_key_t *) page_buf;
+static hal_error_t block_read(const unsigned blockno, flash_block_t *block)
+{
+ assert(block != NULL && blockno < NUM_FLASH_BLOCKS && sizeof(*block) == KEYSTORE_SUBSECTOR_SIZE);
- if (key->in_use == 0xff) {
- /* unprogrammed data */
- idx++;
- continue;
- }
+ /* Sigh, magic numeric return codes */
+ if (keystore_read_data(block_offset(blockno), block->bytes, sizeof(block)) != 1)
+ return HAL_ERROR_KEYSTORE_ACCESS;
- if (key->in_use == 1) {
- uint8_t *dst = (uint8_t *) &db.keys[idx];
- uint32_t to_read = sizeof(*db.keys);
-
- /* We already have the first page in page_buf. Put it into place. */
- memcpy(dst, page_buf, sizeof(page_buf));
- to_read -= sizeof(page_buf);
- dst += sizeof(page_buf);
-
- /* Read as many more full pages as possible */
- if (keystore_read_data (offset + KEYSTORE_PAGE_SIZE, dst, to_read & ~PAGE_SIZE_MASK) != 1)
- return HAL_ERROR_KEYSTORE_ACCESS;
- dst += to_read & ~PAGE_SIZE_MASK;
- to_read &= PAGE_SIZE_MASK;
-
- if (to_read) {
- /* Partial last page. We can only read full pages so load it into page_buf. */
- if (keystore_read_data(offset + sizeof(*db.keys) - to_read, page_buf, sizeof(page_buf)) != 1)
- return HAL_ERROR_KEYSTORE_ACCESS;
- memcpy(dst, page_buf, to_read);
- }
- }
- idx++;
+ switch (block_get_type(block)) {
+ case FLASH_KEYBLK:
+ case FLASH_PINBLK:
+ if (calculate_block_crc(block) != block->header.crc1)
+ return HAL_ERROR_KEYSTORE_BAD_CRC;
+ break;
+ case FLASH_KEYOLD:
+ case FLASH_PINOLD:
+ if (calculate_block_crc(block) != block->header.crc2)
+ return HAL_ERROR_KEYSTORE_BAD_CRC;
+ break;
+ default:
+ break;
}
- db.ks.driver = driver;
+ return HAL_OK;
+}
- return LIBHAL_OK;
+/*
+ * Read a block using the cache. Marking the block as used is left
+ * for the caller, so we can avoid blowing out the cache when we
+ * perform a ks_list() operation.
+ */
+
+static hal_error_t block_read_cached(const unsigned blockno, flash_block_t **block)
+{
+ if (block == NULL)
+ return HAL_ERROR_IMPOSSIBLE;
+
+ if ((*block = cache_find_block(blockno)) != NULL)
+ return HAL_OK;
+
+ if ((*block = cache_pick_lru()) == NULL)
+ return HAL_ERROR_IMPOSSIBLE;
+
+ return block_read(blockno, *block);
}
-static hal_error_t ks_shutdown(const hal_ks_driver_t * const driver)
+/*
+ * Write a flash block, calculating CRC when appropriate.
+ *
+ * NB: This does NOT automatically erase the block prior to write,
+ * because doing so would either mess up our wear leveling algorithm
+ * (such as it is) or cause gratuitous erasures (increasing wear).
+ */
+
+static hal_error_t block_write(const unsigned blockno, flash_block_t *block)
{
- if (db.ks.driver != driver)
+ assert(block != NULL && blockno < NUM_FLASH_BLOCKS && sizeof(*block) == KEYSTORE_SUBSECTOR_SIZE);
+
+ switch (block_get_type(block)) {
+ case FLASH_KEYBLK:
+ case FLASH_PINBLK:
+ block->header.crc1 = calculate_block_crc(block);
+ break;
+ case FLASH_KEYOLD:
+ case FLASH_PINOLD:
+ block->header.crc2 = calculate_block_crc(block);
+ break;
+ default:
+ break;
+ }
+
+ /* Sigh, magic numeric return codes */
+ if (keystore_write_data(block_offset(blockno), block->bytes, sizeof(block)) != 1)
return HAL_ERROR_KEYSTORE_ACCESS;
- memset(&db, 0, sizeof(db));
- return LIBHAL_OK;
+
+ return HAL_OK;
}
-static hal_error_t _write_data_to_flash(const uint32_t offset, const uint8_t *data, const size_t len)
+/*
+ * Zero (not erase) a flash block.
+ */
+
+static hal_error_t block_zero(const unsigned blockno)
{
- uint8_t page_buf[KEYSTORE_PAGE_SIZE];
- uint32_t to_write = len;
+ flash_block_t *block = cache_pick_lru();
+
+ if (block == NULL)
+ return HAL_ERROR_IMPOSSIBLE;
+
+ memset(block, 0, sizeof(*block));
- if (keystore_write_data(offset, data, to_write & ~PAGE_SIZE_MASK) != 1)
+ /* Sigh, magic numeric return codes */
+ if (keystore_write_data(block_offset(blockno), block->bytes, sizeof(*block)) != 1)
return HAL_ERROR_KEYSTORE_ACCESS;
- to_write &= PAGE_SIZE_MASK;
- if (to_write) {
- /*
- * Use page_buf to write the remaining bytes, since we must write a full page each time.
- */
- memset(page_buf, 0xff, sizeof(page_buf));
- memcpy(page_buf, data + len - to_write, to_write);
- if (keystore_write_data((offset + len) & ~PAGE_SIZE_MASK, page_buf, sizeof(page_buf)) != 1)
- return HAL_ERROR_KEYSTORE_ACCESS;
- }
+ return HAL_OK;
+}
+
+/*
+ * Erase a flash block.
+ *
+ * At the moment this erases the whole sector, when we move to
+ * subsector-based blocks that will need to change.
+ */
+
+static hal_error_t block_erase(const unsigned blockno)
+{
+ assert(blockno < NUM_FLASH_BLOCKS);
- return LIBHAL_OK;
+ /* Sigh, magic numeric return codes */
+ if (keystore_erase_sectors(blockno, blockno) != 1)
+ return HAL_ERROR_KEYSTORE_ACCESS;
+
+ return HAL_OK;
}
/*
- * Write the full DB to flash, PINs and all.
+ * Erase a flash block if it hasn't already been erased.
+ *
+ * May not be necessary, trying to avoid unnecessary wear.
*/
-static hal_error_t _write_db_to_flash(const uint32_t sector_offset)
+static hal_error_t block_erase_maybe(const unsigned blockno)
{
- hal_error_t status;
- uint8_t page_buf[KEYSTORE_PAGE_SIZE];
- uint32_t i, offset;
+ flash_block_t *block = cache_pick_lru();
+ hal_error_t err;
- if (sizeof(db.wheel_pin) + sizeof(db.so_pin) + sizeof(db.user_pin) > sizeof(page_buf))
- return HAL_ERROR_BAD_ARGUMENTS;
+ if (block == NULL)
+ return HAL_ERROR_IMPOSSIBLE;
+
+ if ((err = block_read(blockno, block)) != HAL_OK)
+ return err;
+
+ for (int i = 0; i < sizeof(*block); i++)
+ if (block->bytes[i] != 0xFF)
+ return block_erase(blockno);
+
+ return HAL_OK;
+}
+
+/*
+ * Initialize keystore. This includes some tricky bits that attempt
+ * to preserve the free list ordering across reboots, to improve our
+ * simplistic attempt at wear leveling.
+ */
+
+static hal_error_t ks_init(const hal_ks_driver_t * const driver)
+{
+ /*
+ * Initialize the in-memory database. In the long run this probably
+ * needs to be using a block of SDRAM, which we would allocate here.
+ */
+
+ memset(&db, 0, sizeof(db));
+ db.ksi.size = NUM_FLASH_BLOCKS;
+ db.ksi.used = 0;
+ db.ksi.index = db._index;
+ db.ksi.names = db._names;
+
+ for (int i = 0; i < sizeof(db.cache)/sizeof(*db.cache); i++)
+ db.cache[i].blockno = ~0;
+
+ /*
+ * Scan existing content of flash to figure out what we've got.
+ * This gets a bit involved due to the need to recover from things
+ * like power failures at inconvenient times.
+ */
+
+ flash_block_type_t block_types[NUM_FLASH_BLOCKS];
+ flash_block_t *block = cache_pick_lru();
+ int first_erased = -1;
+ int saw_pins = 0;
+ hal_error_t err;
+ uint16_t n = 0;
+
+ if (block == NULL)
+ return HAL_ERROR_IMPOSSIBLE;
+
+ for (int i = 0; i < NUM_FLASH_BLOCKS; i++) {
+
+ /*
+ * Read one block. If the CRC is bad, it's old data we don't
+ * understand, something we were writing when we crashed, or bad
+ * flash; in any of these cases, we want the block to ends up near
+ * the end of the free list.
+ */
+
+ if ((err = block_read(i, block)) == HAL_ERROR_KEYSTORE_BAD_CRC)
+ block_types[i] = FLASH_UNKNOWN;
+
+ else if (err == HAL_OK)
+ block_types[i] = block_get_type(block);
+
+ else
+ return err;
+
+ /*
+ * First erased block we see is head of the free list.
+ */
+
+ if (block_types[i] == FLASH_ERASED && first_erased < 0)
+ first_erased = i;
+
+ /*
+ * If it is or was a key block, remember its name.
+ * PIN blocks get the all-zeros UUID for ks_index purposes.
+ */
+
+ if (block_types[i] == FLASH_KEYBLK || block_types[i] == FLASH_KEYOLD)
+ db.ksi.names[i] = block->key.name;
+
+ /*
+ * If it is or was a PIN block, remember the PINs, but don't
+ * overwrite PINs from a current PIN block with PINs from a
+ * deprecated PIN block.
+ */
+
+ if (block_types[i] == FLASH_PINBLK || (block_types[i] == FLASH_PINOLD && !saw_pins)) {
+ db.wheel_pin = block->pin.wheel_pin;
+ db.so_pin = block->pin.so_pin;
+ db.user_pin = block->pin.user_pin;
+ saw_pins = 1;
+ }
+
+ /*
+ * If it's a current block, include it in the index.
+ */
+
+ if (block_types[i] == FLASH_KEYBLK || block_types[i] == FLASH_PINBLK)
+ db.ksi.index[n++] = i;
+ }
+
+ db.ksi.used = n;
+
+ assert(db.ksi.used <= db.ksi.size);
+
+ /*
+ * At this point we've built the (unsorted) index from all the
+ * current blocks. Now we need to insert free, deprecated, and
+ * unrecognized blocks into the free list in our preferred order.
+ * There's probably a more efficient way to do this, but this is
+ * just integer comparisons in a fairly small data set, so all of
+ * these loops should be pretty fast.
+ */
+
+ if (n < db.ksi.size)
+ for (int i = 0; i < NUM_FLASH_BLOCKS; i++)
+ if (block_types[i] == FLASH_ERASED)
+ db.ksi.index[n++] = i;
+
+ if (n < db.ksi.size)
+ for (int i = first_erased; i < NUM_FLASH_BLOCKS; i++)
+ if (block_types[i] == FLASH_ZEROED)
+ db.ksi.index[n++] = i;
+
+ if (n < db.ksi.size)
+ for (int i = 0; i < first_erased; i++)
+ if (block_types[i] == FLASH_ZEROED)
+ db.ksi.index[n++] = i;
+
+ if (n < db.ksi.size)
+ for (int i = 0; i < NUM_FLASH_BLOCKS; i++)
+ if (block_types[i] == FLASH_KEYOLD || block_types[i] == FLASH_PINOLD)
+ db.ksi.index[n++] = i;
+
+ if (n < db.ksi.size)
+ for (int i = 0; i < NUM_FLASH_BLOCKS; i++)
+ if (block_types[i] == FLASH_UNKNOWN)
+ db.ksi.index[n++] = i;
+
+ assert(n == db.ksi.size);
+
+ /*
+ * Initialize the ks_index stuff.
+ */
+
+ if ((err = hal_ks_index_setup(&db.ksi)) != HAL_OK)
+ return err;
+
+ /*
+ * Deal with deprecated blocks. These are tombstones left behind
+ * when something bad happened while we updating a block. If write
+ * of the updated block completed, we have nothing to do other than
+ * cleaning up the tombstone, but if the write didn't complete, we
+ * need to resurrect the data from the tombstone.
+ */
+
+ for (int i = 0; i < NUM_FLASH_BLOCKS; i++) {
+ flash_block_type_t restore_type;
+
+ switch (block_types[i]) {
+ case FLASH_KEYOLD: restore_type = FLASH_KEYBLK; break;
+ case FLASH_PINOLD: restore_type = FLASH_PINBLK; break;
+ default: continue;
+ }
- /* Put the three PINs into page_buf */
- offset = 0;
- memcpy(page_buf + offset, &db.wheel_pin, sizeof(db.wheel_pin));
- offset += sizeof(db.wheel_pin);
- memcpy(page_buf + offset, &db.so_pin, sizeof(db.so_pin));
- offset += sizeof(db.so_pin);
- memcpy(page_buf + offset, &db.user_pin, sizeof(db.user_pin));
+ err = hal_ks_index_find(&db.ksi, &db.ksi.names[i], NULL);
- /* Write PINs into the second of the two reserved pages at the start of the sector. */
- offset = sector_offset + KEYSTORE_PAGE_SIZE;
- if ((status = _write_data_to_flash(offset, page_buf, sizeof(page_buf))) != LIBHAL_OK)
- return status;
+ if (err != HAL_OK && err != HAL_ERROR_KEY_NOT_FOUND)
+ return err;
+
+ unsigned b = ~0;
+
+ if (err == HAL_ERROR_KEY_NOT_FOUND) {
+
+ /*
+ * Block did not exist, need to resurrect.
+ */
- for (i = 0; i < sizeof(db.keys) / sizeof(*db.keys); i++) {
- offset = _get_key_offset(i);
- if (offset > KEYSTORE_SECTOR_SIZE)
- return HAL_ERROR_BAD_ARGUMENTS;
+ hal_uuid_t name = db.ksi.names[i]; /* Paranoia */
- offset += sector_offset;
+ if ((err = block_read(i, block)) != HAL_OK)
+ return err;
+
+ block->header.block_type = restore_type;
+
+ if ((err = hal_ks_index_add(&db.ksi, &name, &b)) != HAL_OK ||
+ (err = block_erase(b)) != HAL_OK ||
+ (err = block_write(b, block)) != HAL_OK)
+ return err;
+
+ if (restore_type == FLASH_PINBLK)
+ saw_pins = 1;
+ }
- if ((status =_write_data_to_flash(offset, (uint8_t *) &db.keys[i], sizeof(*db.keys))) != LIBHAL_OK)
- return status;
+ /*
+ * Done with the tombstone, zero it.
+ */
+
+ if ((unsigned) i != b && (err = block_zero(i)) != HAL_OK)
+ return err;
}
- return LIBHAL_OK;
+ /*
+ * If we didn't see a PIN block, create one, with the user and so
+ * PINs cleared and the wheel PIN set to the last-gasp value. The
+ * last-gasp WHEEL PIN is a terrible answer, but we need some kind
+ * of bootstrapping mechanism when all else fails. If you have a
+ * better suggestion, we'd love to hear it.
+ */
+
+ if (!saw_pins) {
+ unsigned b;
+
+ memset(block, 0xFF, sizeof(*block));
+ memset(&block->pin.so_pin, 0, sizeof(block->pin.so_pin));
+ memset(&block->pin.user_pin, 0, sizeof(block->pin.user_pin));
+ block->header.block_type = FLASH_PINBLK;
+ block->pin.wheel_pin = hal_last_gasp_pin;
+
+ if ((err = hal_ks_index_add(&db.ksi, &pin_uuid, &b)) != HAL_OK)
+ return err;
+
+ cache_mark_used(block, b);
+
+ if ((err = block_erase_maybe(b)) == HAL_OK)
+ err = block_write(b, block);
+
+ cache_release(block);
+
+ if (err != HAL_OK)
+ return err;
+ }
+
+ /*
+ * Erase first block on free list if it's not already erased.
+ */
+
+ if (db.ksi.used < db.ksi.size &&
+ (err = block_erase_maybe(db.ksi.index[db.ksi.used])) != HAL_OK)
+ return err;
+
+ /*
+ * And we're finally done.
+ */
+
+ db.ks.driver = driver;
+
+ return HAL_OK;
+}
+
+static hal_error_t ks_shutdown(const hal_ks_driver_t * const driver)
+{
+ if (db.ks.driver != driver)
+ return HAL_ERROR_KEYSTORE_ACCESS;
+ memset(&db, 0, sizeof(db));
+ return HAL_OK;
}
static hal_error_t ks_open(const hal_ks_driver_t * const driver,
@@ -371,7 +731,7 @@ static hal_error_t ks_open(const hal_ks_driver_t * const driver,
return HAL_ERROR_BAD_ARGUMENTS;
*ks = &db.ks;
- return LIBHAL_OK;
+ return HAL_OK;
}
static hal_error_t ks_close(hal_ks_t *ks)
@@ -379,7 +739,7 @@ static hal_error_t ks_close(hal_ks_t *ks)
if (ks != NULL && ks != &db.ks)
return HAL_ERROR_BAD_ARGUMENTS;
- return LIBHAL_OK;
+ return HAL_OK;
}
static inline int acceptable_key_type(const hal_key_type_t type)
@@ -395,15 +755,50 @@ static inline int acceptable_key_type(const hal_key_type_t type)
}
}
-static inline hal_ks_key_t *find(const hal_uuid_t * const name)
+static hal_error_t ks_store(hal_ks_t *ks,
+ const hal_pkey_slot_t * const slot,
+ const uint8_t * const der, const size_t der_len)
{
- assert(name != NULL);
+ if (ks != &db.ks || slot == NULL || der == NULL || der_len == 0 || !acceptable_key_type(slot->type))
+ return HAL_ERROR_BAD_ARGUMENTS;
+
+ flash_block_t *block = cache_pick_lru();
+ flash_key_block_t *k = &block->key;
+ uint8_t kek[KEK_LENGTH];
+ size_t kek_len;
+ hal_error_t err;
+ unsigned b;
- for (int i = 0; i < sizeof(db.keys)/sizeof(*db.keys); i++)
- if (db.keys[i].in_use && hal_uuid_cmp(&db.keys[i].name, name) == 0)
- return &db.keys[i];
+ if (block == NULL)
+ return HAL_ERROR_IMPOSSIBLE;
- return NULL;
+ if ((err = hal_ks_index_add(&db.ksi, &slot->name, &b)) != HAL_OK)
+ return err;
+
+ cache_mark_used(block, b);
+
+ memset(block, 0xFF, sizeof(*block));
+ block->header.block_type = FLASH_KEYBLK;
+ k->name = slot->name;
+ k->type = slot->type;
+ k->curve = slot->curve;
+ k->flags = slot->flags;
+ k->der_len = sizeof(k->der);
+
+ if ((err = hal_mkm_get_kek(kek, &kek_len, sizeof(kek))) == HAL_OK)
+ err = hal_aes_keywrap(NULL, kek, kek_len, der, der_len, k->der, &k->der_len);
+
+ memset(kek, 0, sizeof(kek));
+
+ if (err == HAL_OK &&
+ (err = block_erase_maybe(b)) == HAL_OK &&
+ (err = block_write(b, block)) == HAL_OK)
+ return HAL_OK;
+
+ memset(block, 0, sizeof(*block));
+ cache_release(block);
+ (void) hal_ks_index_delete(&db.ksi, &slot->name, NULL);
+ return err;
}
static hal_error_t ks_fetch(hal_ks_t *ks,
@@ -413,10 +808,17 @@ static hal_error_t ks_fetch(hal_ks_t *ks,
if (ks != &db.ks || slot == NULL)
return HAL_ERROR_BAD_ARGUMENTS;
- const hal_ks_key_t * const k = find(&slot->name);
+ flash_block_t *block;
+ hal_error_t err;
+ unsigned b;
+
+ if ((err = hal_ks_index_find(&db.ksi, &slot->name, &b)) != HAL_OK ||
+ (err = block_read_cached(b, &block)) != HAL_OK)
+ return err;
+
+ cache_mark_used(block, b);
- if (k == NULL)
- return HAL_ERROR_KEY_NOT_FOUND;
+ flash_key_block_t *k = &block->key;
slot->type = k->type;
slot->curve = k->curve;
@@ -436,16 +838,42 @@ static hal_error_t ks_fetch(hal_ks_t *ks,
*der_len = der_max;
- if ((err = hal_mkm_get_kek(kek, &kek_len, sizeof(kek))) == LIBHAL_OK)
+ if ((err = hal_mkm_get_kek(kek, &kek_len, sizeof(kek))) == HAL_OK)
err = hal_aes_keyunwrap(NULL, kek, kek_len, k->der, k->der_len, der, der_len);
memset(kek, 0, sizeof(kek));
- if (err != LIBHAL_OK)
+ if (err != HAL_OK)
return err;
}
- return LIBHAL_OK;
+ return HAL_OK;
+}
+
+static hal_error_t ks_delete(hal_ks_t *ks,
+ const hal_pkey_slot_t * const slot)
+{
+ if (ks != &db.ks || slot == NULL)
+ return HAL_ERROR_BAD_ARGUMENTS;
+
+ hal_error_t err;
+ unsigned b;
+
+ if ((err = hal_ks_index_delete(&db.ksi, &slot->name, &b)) != HAL_OK)
+ return err;
+
+ /*
+ * If we wanted to double-check the flash block itself against what
+ * we got from the index, this is where we'd do it.
+ */
+
+ cache_release(cache_find_block(b));
+
+ if ((err = block_zero(b)) != HAL_OK ||
+ (err = block_erase_maybe(db.ksi.index[db.ksi.used])) != HAL_OK)
+ return err;
+
+ return HAL_OK;
}
static hal_error_t ks_list(hal_ks_t *ks,
@@ -456,250 +884,259 @@ static hal_error_t ks_list(hal_ks_t *ks,
if (ks != &db.ks || result == NULL || result_len == NULL)
return HAL_ERROR_BAD_ARGUMENTS;
+ if (db.ksi.used > result_max)
+ return HAL_ERROR_RESULT_TOO_LONG;
+
+ flash_block_t *block;
+ hal_error_t err;
+ unsigned b;
+
*result_len = 0;
- for (int i = 0; i < sizeof(db.keys)/sizeof(*db.keys); i++) {
+ for (int i = 0; i < db.ksi.used; i++) {
+ b = db.ksi.index[i];
- if (!db.keys[i].in_use)
- continue;
+ if ((err = block_read_cached(b, &block)) != HAL_OK)
+ return err;
- if (*result_len == result_max)
- return HAL_ERROR_RESULT_TOO_LONG;
+ if (block_get_type(block) != FLASH_KEYBLK)
+ continue;
- result[*result_len].type = db.keys[i].type;
- result[*result_len].curve = db.keys[i].curve;
- result[*result_len].flags = db.keys[i].flags;
- result[*result_len].name = db.keys[i].name;
+ result[*result_len].type = block->key.type;
+ result[*result_len].curve = block->key.curve;
+ result[*result_len].flags = block->key.flags;
+ result[*result_len].name = block->key.name;
++ *result_len;
}
- return LIBHAL_OK;
+ return HAL_OK;
}
+const hal_ks_driver_t hal_ks_token_driver[1] = {{
+ ks_init,
+ ks_shutdown,
+ ks_open,
+ ks_close,
+ ks_store,
+ ks_fetch,
+ ks_delete,
+ ks_list
+}};
+
/*
- * This function in particular really needs to be rewritten to take
- * advantage of the new keystore API.
+ * The remaining functions aren't really part of the keystore API per se,
+ * but they all involve non-key data which we keep in the keystore
+ * because it's the flash we've got.
*/
-static hal_error_t ks_store(hal_ks_t *ks,
- const hal_pkey_slot_t * const slot,
- const uint8_t * const der, const size_t der_len)
+/*
+ * Fetch PIN. This is always cached, so just returned cached value.
+ */
+
+hal_error_t hal_get_pin(const hal_user_t user,
+ const hal_ks_pin_t **pin)
{
- if (ks != &db.ks || slot == NULL || der == NULL || der_len == 0 || !acceptable_key_type(slot->type))
+ if (pin == NULL)
return HAL_ERROR_BAD_ARGUMENTS;
- if (find(&slot->name) != NULL)
- return HAL_ERROR_KEY_NAME_IN_USE;
-
- int loc = -1;
-
- for (int i = 0; i < sizeof(db.keys)/sizeof(*db.keys); i++)
- if (!db.keys[i].in_use && loc < 0)
- loc = i;
+ switch (user) {
+ case HAL_USER_WHEEL: *pin = &db.wheel_pin; break;
+ case HAL_USER_SO: *pin = &db.so_pin; break;
+ case HAL_USER_NORMAL: *pin = &db.user_pin; break;
+ default: return HAL_ERROR_BAD_ARGUMENTS;
+ }
- if (loc < 0)
- return HAL_ERROR_NO_KEY_SLOTS_AVAILABLE;
+ return HAL_OK;
+}
- hal_ks_key_t k;
- memset(&k, 0, sizeof(k));
- k.der_len = sizeof(k.der);
+/*
+ * Fetch PIN block.
+ */
- uint8_t kek[KEK_LENGTH];
- size_t kek_len;
+static hal_error_t fetch_pin_block(unsigned *b, flash_block_t **block)
+{
+ assert(b != NULL && block != NULL);
hal_error_t err;
- if ((err = hal_mkm_get_kek(kek, &kek_len, sizeof(kek))) == LIBHAL_OK)
- err = hal_aes_keywrap(NULL, kek, kek_len, der, der_len, k.der, &k.der_len);
+ if ((err = hal_ks_index_find(&db.ksi, &pin_uuid, b)) != HAL_OK ||
+ (err = block_read_cached(*b, block)) != HAL_OK)
+ return err;
- memset(kek, 0, sizeof(kek));
+ cache_mark_used(*block, *b);
- if (err != LIBHAL_OK)
- return err;
+ if (block_get_type(*block) != FLASH_PINBLK)
+ return HAL_ERROR_IMPOSSIBLE;
- k.name = slot->name;
- k.type = slot->type;
- k.curve = slot->curve;
- k.flags = slot->flags;
+ return HAL_OK;
+}
+
+/*
+ * Update the PIN block. This block should always be present, but we
+ * have to dance a bit to make sure we write the new PIN block before
+ * destroying the old one.
+ */
- uint8_t page_buf[KEYSTORE_PAGE_SIZE];
+static hal_error_t update_pin_block(const unsigned b1,
+ flash_block_t *block,
+ const flash_pin_block_t * const new_data)
+{
+ assert(block != NULL && new_data != NULL && block_get_type(block) == FLASH_PINBLK);
- uint32_t offset = _get_key_offset(loc);
+ hal_error_t err;
+ unsigned b2;
- if (offset > KEYSTORE_SECTOR_SIZE)
- return HAL_ERROR_BAD_ARGUMENTS;
+ block->header.block_type = FLASH_PINOLD;
- uint32_t active_sector_offset = _active_sector_offset();
+ err = block_write(b1, block);
- offset += active_sector_offset;
+ cache_release(block);
- if (keystore_check_id() != 1)
- return HAL_ERROR_KEYSTORE_ACCESS;
+ if (err != HAL_OK)
+ return err;
/*
- * Check if there is a key occupying this slot in the flash already.
- * This includes the case where we've zeroed a former key without
- * erasing the flash sector, so we have to check the flash itself,
- * we can't just look at the in-memory representation.
+ * We could simplify and speed this up a bit by taking advantage of
+ * knowing that the PIN block is always db.ksi->index[0] (because of
+ * the all-zeros UUID). Maybe later.
*/
- if (keystore_read_data(offset, page_buf, sizeof(page_buf)) != 1)
- return HAL_ERROR_KEYSTORE_ACCESS;
-
- const int unused_since_erasure = ((hal_ks_key_t *) page_buf)->in_use == 0xFF;
+ if ((err = hal_ks_index_delete(&db.ksi, &pin_uuid, &b2)) != HAL_OK)
+ return err;
- db.keys[loc] = k;
- db.keys[loc].in_use = 1;
+ if (b2 != b1)
+ return HAL_ERROR_IMPOSSIBLE;
- if (unused_since_erasure) {
+ block->pin = *new_data;
- /*
- * Key slot was unused in flash, so we can just write the new key there.
- */
+ err = hal_ks_index_add(&db.ksi, &pin_uuid, &b2);
- if ((err = _write_data_to_flash(offset, (uint8_t *) &k, sizeof(k))) != LIBHAL_OK)
- return err;
+ if (err == HAL_OK)
+ cache_mark_used(block, b2);
- } else {
+ if (err == HAL_OK)
+ err = block_erase_maybe(b2);
- /*
- * Key slot in flash has been used. We should be more clever than
- * this, but for now we just rewrite the whole freaking keystore.
- */
+ if (err == HAL_OK)
+ err = block_write(b2, block);
- /* TODO: Erase and write the database to the inactive sector, and then toggle active sector. */
+ if (err != HAL_OK)
+ return err;
- if (keystore_erase_sectors(active_sector_offset / KEYSTORE_SECTOR_SIZE,
- active_sector_offset / KEYSTORE_SECTOR_SIZE) != 1)
- return HAL_ERROR_KEYSTORE_ACCESS;
+ if ((err = block_zero(b1)) != HAL_OK)
+ return err;
- if ((err =_write_db_to_flash(active_sector_offset)) != LIBHAL_OK)
- return err;
- }
+ if (db.ksi.used < db.ksi.size)
+ err = block_erase_maybe(db.ksi.index[db.ksi.used]);
- return LIBHAL_OK;
+ return err;
}
-static hal_error_t ks_delete(hal_ks_t *ks,
- const hal_pkey_slot_t * const slot)
+/*
+ * Change a PIN.
+ */
+
+hal_error_t hal_set_pin(const hal_user_t user,
+ const hal_ks_pin_t * const pin)
{
- if (ks != &db.ks || slot == NULL)
+ if (pin == NULL)
return HAL_ERROR_BAD_ARGUMENTS;
- hal_ks_key_t *k = find(&slot->name);
+ flash_block_t *block;
+ hal_error_t err;
+ unsigned b;
- if (k == NULL)
- return HAL_ERROR_KEY_NOT_FOUND;
+ if ((err = fetch_pin_block(&b, &block)) != HAL_OK)
+ return err;
- const int loc = k - db.keys;
- uint32_t offset = _get_key_offset(loc);
+ flash_pin_block_t new_data = block->pin;
+ hal_ks_pin_t *dp, *bp;
- if (loc < 0 || offset > KEYSTORE_SECTOR_SIZE)
- return HAL_ERROR_IMPOSSIBLE;
+ switch (user) {
+ case HAL_USER_WHEEL: bp = &new_data.wheel_pin; dp = &db.wheel_pin; break;
+ case HAL_USER_SO: bp = &new_data.so_pin; dp = &db.so_pin; break;
+ case HAL_USER_NORMAL: bp = &new_data.user_pin; dp = &db.user_pin; break;
+ default: return HAL_ERROR_BAD_ARGUMENTS;
+ }
- offset += _active_sector_offset();
+ const hal_ks_pin_t old_pin = *dp;
+ *dp = *bp = *pin;
- memset(k, 0, sizeof(*k));
+ if ((err = update_pin_block(b, block, &new_data)) != HAL_OK)
+ *dp = old_pin;
- /*
- * Setting bits to 0 never requires erasing flash. Just write it.
- */
-
- return _write_data_to_flash(offset, (uint8_t *) k, sizeof(*k));
+ return err;
}
-const hal_ks_driver_t hal_ks_token_driver[1] = {{
- ks_init,
- ks_shutdown,
- ks_open,
- ks_close,
- ks_store,
- ks_fetch,
- ks_delete,
- ks_list
-}};
-
-/*
- * The remaining functions aren't really part of the keystore API per se,
- * but they all involve non-key data which we keep in the keystore
- * because it's the flash we've got.
- */
+#if HAL_MKM_FLASH_BACKUP_KLUDGE
-hal_error_t hal_get_pin(const hal_user_t user,
- const hal_ks_pin_t **pin)
+hal_error_t hal_mkm_flash_read(uint8_t *buf, const size_t len)
{
- if (pin == NULL)
+ if (buf == NULL)
return HAL_ERROR_BAD_ARGUMENTS;
- switch (user) {
- case HAL_USER_WHEEL: *pin = &db.wheel_pin; break;
- case HAL_USER_SO: *pin = &db.so_pin; break;
- case HAL_USER_NORMAL: *pin = &db.user_pin; break;
- default: return HAL_ERROR_BAD_ARGUMENTS;
- }
+ if (len != KEK_LENGTH)
+ return HAL_ERROR_MASTERKEY_BAD_LENGTH;
- /*
- * If we were looking for the WHEEL PIN and it appears to be
- * completely unset, return the compiled-in last-gasp PIN. This is
- * a terrible answer, but we need some kind of bootstrapping
- * mechanism. Feel free to suggest something better.
- */
+ flash_block_t *block;
+ hal_error_t err;
+ unsigned b;
- uint8_t u00 = 0x00, uFF = 0xFF;
- for (int i = 0; i < sizeof((*pin)->pin); i++) {
- u00 |= (*pin)->pin[i];
- uFF &= (*pin)->pin[i];
- }
- for (int i = 0; i < sizeof((*pin)->salt); i++) {
- u00 |= (*pin)->salt[i];
- uFF &= (*pin)->salt[i];
- }
- if (user == HAL_USER_WHEEL && ((u00 == 0x00 && (*pin)->iterations == 0x00000000) ||
- (uFF == 0xFF && (*pin)->iterations == 0xFFFFFFFF)))
- *pin = &hal_last_gasp_pin;
+ if ((err = fetch_pin_block(&b, &block)) != HAL_OK)
+ return err;
- return LIBHAL_OK;
+ if (block->pin.kek_set != FLASH_KEK_SET)
+ return HAL_ERROR_MASTERKEY_NOT_SET;
+
+ memcpy(buf, block->pin.kek, len);
+ return HAL_OK;
}
-hal_error_t hal_set_pin(const hal_user_t user,
- const hal_ks_pin_t * const pin)
+hal_error_t hal_mkm_flash_write(const uint8_t * const buf, const size_t len)
{
- uint32_t active_sector_offset;
-
- if (pin == NULL)
+ if (buf == NULL)
return HAL_ERROR_BAD_ARGUMENTS;
- hal_ks_pin_t *p = NULL;
+ if (len != KEK_LENGTH)
+ return HAL_ERROR_MASTERKEY_BAD_LENGTH;
- switch (user) {
- case HAL_USER_WHEEL: p = &db.wheel_pin; break;
- case HAL_USER_SO: p = &db.so_pin; break;
- case HAL_USER_NORMAL: p = &db.user_pin; break;
- default: return HAL_ERROR_BAD_ARGUMENTS;
- }
+ flash_block_t *block;
+ hal_error_t err;
+ unsigned b;
+
+ if ((err = fetch_pin_block(&b, &block)) != HAL_OK)
+ return err;
- memcpy(p, pin, sizeof(*p));
+ flash_pin_block_t new_data = block->pin;
- active_sector_offset = _active_sector_offset();
+ new_data.kek_set = FLASH_KEK_SET;
+ memcpy(new_data.kek, buf, len);
- /* TODO: Could check if the PIN is currently all 0xff, in which case we wouldn't have to
- * erase and re-write the whole DB.
- */
+ return update_pin_block(b, block, &new_data);
+}
- /* TODO: Erase and write the database to the inactive sector, and then toggle active sector. */
- if (keystore_erase_sectors(active_sector_offset / KEYSTORE_SECTOR_SIZE,
- active_sector_offset / KEYSTORE_SECTOR_SIZE) != 1)
- return HAL_ERROR_KEYSTORE_ACCESS;
+hal_error_t hal_mkm_flash_erase(const size_t len)
+{
+ if (len != KEK_LENGTH)
+ return HAL_ERROR_MASTERKEY_BAD_LENGTH;
+
+ flash_block_t *block;
+ hal_error_t err;
+ unsigned b;
- return _write_db_to_flash(active_sector_offset);
+ if ((err = fetch_pin_block(&b, &block)) != HAL_OK)
+ return err;
+
+ flash_pin_block_t new_data = block->pin;
+
+ new_data.kek_set = FLASH_KEK_SET;
+ memset(new_data.kek, 0, len);
+
+ return update_pin_block(b, block, &new_data);
}
-#warning MKM flash kludge support needed here
-/*
- * Need functions to handle lower level stuff we want
- * hal_mkm_flash_read() and hal_mkm_flash_write() to call, since we're
- * stuffing that data into the PIN block.
- */
+#endif /* HAL_MKM_FLASH_BACKUP_KLUDGE */
+
/*
* Local variables:
diff --git a/ks_index.c b/ks_index.c
index f506a32..b35d5e0 100644
--- a/ks_index.c
+++ b/ks_index.c
@@ -216,6 +216,15 @@ hal_error_t hal_ks_index_delete(hal_ks_index_t *ksi,
}
/*
+ * Might want a hal_ks_index_replace(), which would be an efficiency
+ * hack replacement (roughly 2x) for a delete followed by an add with
+ * the same name. Implementation would be to find the old existing
+ * block, pull the first block off the free list, sliding the free
+ * list down, drop the new block in instead of the old, put the old
+ * block at the end of the free list, and return the new block.
+ */
+
+/*
* Local variables:
* indent-tabs-mode: nil
* End:
diff --git a/ks_volatile.c b/ks_volatile.c
index 02bd4cc..72ee1cb 100644
--- a/ks_volatile.c
+++ b/ks_volatile.c
@@ -99,9 +99,6 @@ static hal_error_t ks_init(db_t *db)
{
assert(db != NULL);
- if (db->ksi.size) /* Already initialized */
- return HAL_OK;
-
/*
* Set up keystore with empty index and full free list.
* Since this driver doesn't care about wear leveling,
diff --git a/mkm.c b/mkm.c
index b8dc3c5..2b2141f 100644
--- a/mkm.c
+++ b/mkm.c
@@ -62,13 +62,12 @@
#include <string.h>
-static int volatile_init = 0, flash_init = 0;
+static int volatile_init = 0;
static hal_core_t *core = NULL;
#define MKM_VOLATILE_STATUS_ADDRESS 0
#define MKM_VOLATILE_SCLK_DIV 0x20
#define MKM_FLASH_STATUS_ADDRESS (KEYSTORE_SECTOR_SIZE * (KEYSTORE_NUM_SECTORS - 1))
-#define KEK_LENGTH (256 / 8)
/*
* Match uninitialized flash for the "not set" value.
@@ -177,99 +176,10 @@ hal_error_t hal_mkm_volatile_erase(const size_t len)
return LIBHAL_OK;
}
-#if HAL_MKM_FLASH_BACKUP_KLUDGE
-
-static hal_error_t hal_mkm_flash_init(void)
-{
- if (flash_init)
- return LIBHAL_OK;
-
- if (!keystore_check_id())
- return HAL_ERROR_IO_UNEXPECTED;
-
- flash_init = 1;
- return LIBHAL_OK;
-}
-
-hal_error_t hal_mkm_flash_read(uint8_t *buf, const size_t len)
-{
- uint8_t page[KEYSTORE_PAGE_SIZE];
- uint32_t *status = (uint32_t *) page;
- hal_error_t err;
-
- if (len && len != KEK_LENGTH)
- return HAL_ERROR_MASTERKEY_BAD_LENGTH;
-
- if ((err = hal_mkm_flash_init()) != LIBHAL_OK)
- return err;
-
- if (!keystore_read_data(MKM_FLASH_STATUS_ADDRESS, page, sizeof(page))) {
- memset(page, 0, sizeof(page));
- return HAL_ERROR_MASTERKEY_FAIL;
- }
-
- if (buf != NULL && len) {
- /*
- * Don't return what's in the flash memory in case it isn't initialized.
- * Or maybe we should fill the buffer with proper random data in that case... hmm.
- */
- if (*status == MKM_STATUS_SET)
- memcpy(buf, page + 4, len);
- else
- memset(buf, 0x0, len);
- }
-
- memset(page + 4, 0, sizeof(page) - 4);
-
- if (*status == MKM_STATUS_SET)
- return LIBHAL_OK;
-
- if (*status == MKM_STATUS_ERASED || *status == MKM_STATUS_NOT_SET)
- return HAL_ERROR_MASTERKEY_NOT_SET;
-
- return HAL_ERROR_MASTERKEY_FAIL;
-}
-
-hal_error_t hal_mkm_flash_write(const uint8_t * const buf, const size_t len)
-{
- uint8_t page[KEYSTORE_PAGE_SIZE] = {0xff};
- uint32_t *status = (uint32_t *) page;
- int res;
-
- if (len != KEK_LENGTH)
- return HAL_ERROR_MASTERKEY_BAD_LENGTH;
-
- if (buf == NULL)
- return HAL_ERROR_MASTERKEY_FAIL;
-
- if (hal_mkm_flash_init() != LIBHAL_OK)
- return HAL_ERROR_MASTERKEY_FAIL;
-
- *status = MKM_STATUS_SET;
- memcpy(page + 4, buf, len);
-
- res = keystore_write_data(MKM_FLASH_STATUS_ADDRESS, page, sizeof(page));
- memset(page, 0, sizeof(page));
- if (res != 1)
- return HAL_ERROR_MASTERKEY_FAIL;
-
- return LIBHAL_OK;
-}
-
-hal_error_t hal_mkm_flash_erase(const size_t len)
-{
- if (len != KEK_LENGTH)
- return HAL_ERROR_MASTERKEY_BAD_LENGTH;
-
- if (keystore_erase_sectors(MKM_FLASH_STATUS_ADDRESS / KEYSTORE_SECTOR_SIZE,
- MKM_FLASH_STATUS_ADDRESS / KEYSTORE_SECTOR_SIZE) != 1)
- return HAL_ERROR_MASTERKEY_FAIL;
-
- return LIBHAL_OK;
-}
-
-#endif /* HAL_MKM_FLASH_BACKUP_KLUDGE */
-
+/*
+ * hal_mkm_flash_*() functions moved to ks_flash.c, to keep all the code that
+ * knows intimate details of the keystore flash layout in one place.
+ */
hal_error_t hal_mkm_get_kek(uint8_t *kek,
size_t *kek_len,