/* * mkm.c * ----- * Master Key Memory functions. * * Copyright (c) 2016-2019, NORDUnet A/S All rights reserved. * Copyright: 2020, The Commons Conservancy Cryptech Project * SPDX-License-Identifier: BSD-3-Clause * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are * met: * - Redistributions of source code must retain the above copyright notice, * this list of conditions and the following disclaimer. * * - Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * - Neither the name of the NORDUnet nor the names of its contributors may * be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ /* * Code to load the Master key (Key Encryption Key) from either the volatile MKM * (by asking the FPGA to provide it, using the mkmif) or from the last sector in * the keystore flash. * * Storing the master key in flash is a pretty Bad Idea, but since the Alpha board * doesn't have a battery mounted (only pin headers for attaching one), it might * help in non-production use where one doesn't have tamper protection anyways. * * For production use on the Alpha, one option is to have the Master Key on paper * and enter it into volatile RAM after each power on. * * In both volatile memory and flash, the data is stored as a 32 bit status to * know if the memory is initialized or not, followed by 32 bytes (256 bits) of * Master Key. */ #include "hal.h" #include "hal_internal.h" #include #define MKM_VOLATILE_STATUS_ADDRESS 0 #define MKM_VOLATILE_SCLK_DIV 0x20 #define MKM_FLASH_STATUS_ADDRESS (KEYSTORE_SECTOR_SIZE * (KEYSTORE_NUM_SECTORS - 1)) /* * Match uninitialized flash for the "not set" value. * Leave some bits at 1 for the "set" value to allow * for adding more values later, if needed. */ #define MKM_STATUS_NOT_SET 0xffffffff #define MKM_STATUS_SET 0x0000ffff #define MKM_STATUS_ERASED 0x00000000 static hal_error_t hal_mkm_volatile_init(void) { static int volatile_init = 0; if (volatile_init) return HAL_OK; hal_error_t err; uint32_t status; hal_core_t *core = NULL; if ((err = hal_core_alloc(MKMIF_NAME, &core, NULL)) != HAL_OK) return err; if ((err = hal_mkmif_set_clockspeed(core, MKM_VOLATILE_SCLK_DIV)) != HAL_OK || (err = hal_mkmif_init(core)) != HAL_OK || (err = hal_mkmif_read_word(core, MKM_VOLATILE_STATUS_ADDRESS, &status)) != HAL_OK) goto out; if (status != MKM_STATUS_SET && status != MKM_STATUS_NOT_SET) { /* * XXX Something is a bit fishy here. If we just write the status word, it reads back wrong sometimes, * while if we write the full buf too it is consistently right afterwards. */ uint8_t buf[KEK_LENGTH] = {0}; if ((err = hal_mkmif_write(core, MKM_VOLATILE_STATUS_ADDRESS + 4, buf, sizeof(buf))) != HAL_OK || (err = hal_mkmif_write_word(core, MKM_VOLATILE_STATUS_ADDRESS, MKM_STATUS_NOT_SET)) != HAL_OK) goto out; } volatile_init = 1; out: hal_core_free(core); return err; } hal_error_t hal_mkm_volatile_read(uint8_t *buf, const size_t len) { hal_error_t err; uint32_t status; hal_core_t *core = NULL; if (len && len != KEK_LENGTH) return HAL_ERROR_MASTERKEY_BAD_LENGTH; if ((err = hal_mkm_volatile_init()) != HAL_OK || (err = hal_core_alloc(MKMIF_NAME, &core, NULL)) != HAL_OK) return err; if ((err = hal_mkmif_read_word(core, MKM_VOLATILE_STATUS_ADDRESS, &status)) != HAL_OK) goto out; if (buf != NULL && len) { /* * Don't return the random bytes in the RAM memory in case it isn't initialized. * Or maybe we should fill the buffer with proper random data in that case... hmm. */ if (status != MKM_STATUS_SET) memset(buf, 0x0, len); else err = hal_mkmif_read(core, MKM_VOLATILE_STATUS_ADDRESS + 4, buf, len); } out: hal_core_free(core); if (err != HAL_OK) return err; if (status == MKM_STATUS_SET) return HAL_OK; if (status == MKM_STATUS_NOT_SET) return HAL_ERROR_MASTERKEY_NOT_SET; return HAL_ERROR_MASTERKEY_FAIL; } hal_error_t hal_mkm_volatile_write(const uint8_t * const buf, const size_t len) { hal_error_t err; hal_core_t *core = NULL; if (len != KEK_LENGTH) return HAL_ERROR_MASTERKEY_BAD_LENGTH; if (buf == NULL) return HAL_ERROR_MASTERKEY_FAIL; if ((err = hal_mkm_volatile_init()) != HAL_OK || (err = hal_core_alloc(MKMIF_NAME, &core, NULL)) != HAL_OK) return err; if ((err = hal_mkmif_write(core, MKM_VOLATILE_STATUS_ADDRESS + 4, buf, len)) == HAL_OK) err = hal_mkmif_write_word(core, MKM_VOLATILE_STATUS_ADDRESS, MKM_STATUS_SET); hal_core_free(core); return err; } hal_error_t hal_mkm_volatile_erase(const size_t len) { uint8_t buf[KEK_LENGTH] = {0}; hal_error_t err; hal_core_t *core = NULL; if (len != KEK_LENGTH) return HAL_ERROR_MASTERKEY_BAD_LENGTH; if ((err = hal_mkm_volatile_init()) != HAL_OK || (err = hal_core_alloc(MKMIF_NAME, &core, NULL)) != HAL_OK) return err; if ((err = hal_mkmif_write(NULL, MKM_VOLATILE_STATUS_ADDRESS + 4, buf, sizeof(buf))) == HAL_OK) err = hal_mkmif_write_word(NULL, MKM_VOLATILE_STATUS_ADDRESS, MKM_STATUS_NOT_SET); hal_core_free(core); return err; } /* * hal_mkm_flash_*() functions moved to ks_flash.c, to keep all the code that * knows intimate details of the keystore flash layout in one place. */ hal_error_t hal_mkm_get_kek(uint8_t *kek, size_t *kek_len, const size_t kek_max) { if (kek == NULL || kek_len == NULL || kek_max < bitsToBytes(128)) return HAL_ERROR_BAD_ARGUMENTS; const size_t len = ((kek_max < bitsToBytes(192)) ? bitsToBytes(128) : (kek_max < bitsToBytes(256)) ? bitsToBytes(192) : bitsToBytes(256)); hal_error_t err = hal_mkm_volatile_read(kek, len); if (err == HAL_OK) { *kek_len = len; return HAL_OK; } #if HAL_MKM_FLASH_BACKUP_KLUDGE /* * It turns out that, in every case where this function is called, * we already hold the keystore lock, so attempting to grab it again * would deadlock. This almost never happens when the volatile MKM * is set, but there's a race condition that might drop us here if * hal_mkm_volatile_read() returns HAL_ERROR_CORE_BUSY. Whee! */ if (hal_mkm_flash_read_no_lock(kek, len) == HAL_OK) { *kek_len = len; return HAL_OK; } #endif /* * Both keystores returned an error, probably HAL_ERROR_MASTERKEY_NOT_SET. * I could try to be clever and compare the errors, but really the volatile * keystore is the important one (you shouldn't store the master key in * flash), so return that error. */ return err; } /* * "Any programmer who fails to comply with the standard naming, formatting, * or commenting conventions should be shot. If it so happens that it is * inconvenient to shoot him, then he is to be politely requested to recode * his program in adherence to the above standard." * -- Michael Spier, Digital Equipment Corporation * * Local variables: * indent-tabs-mode: nil * End: */