aboutsummaryrefslogtreecommitdiff
path: root/projects
AgeCommit message (Collapse)Author
2020-09-02Well of course there had to be one last dumb Python3 string bugpython3Rob Austein
2020-09-01..Aaaand a few more Python3 string bugs in cryptech_uploadRob Austein
2020-09-01One more set of silly Python3 bytes handling errorsRob Austein
2020-07-13Whack all Python shebangs to Python 3Rob Austein
2020-05-26Wow, python-version-independent hexadecimal is painfulRob Austein
2020-05-25Untested conversion to support Python 3Rob Austein
2020-05-05Add more RPC tasks for better signing performance.Paul Selkirk
2020-04-29The new keywrap core now talks directly to the MKM, so there are some API ↵Paul Selkirk
changes.
2020-03-10change hal_aes_use_keywrap_corePaul Selkirk
2020-02-26Merge branch 'js_keywrap' to 'master'Paul Selkirk
2020-02-26conditionalize timing testsPaul Selkirk
2020-02-26Some timing tests overflow the meagre 16K CLI task stack, so bump it up for ↵Paul Selkirk
that case.
2020-02-18timing tests for RSA signingmodexpngPaul Selkirk
2019-04-09Rebase branch 'js_keywrap' from masterjs_keywrapPaul Selkirk
2019-04-03Merge branch 'fmc_clk_60mhz' to 'master'Paul Selkirk
2019-03-31Remove inclusion of now-deleted hashsig.hPaul Selkirk
2019-02-28Report SDRAM usage in `task show`Paul Selkirk
2018-11-26Add loop unrolling to bring the profilable mem* functions closer toPaul Selkirk
newlib, because memset is called a LOT in the course of RSA signing, and we need to understand how much time we're actually spending there.
2018-11-14Increase cli task, and move it to SDRAM, because main RAM is getting full.Paul Selkirk
2018-09-11Cleanup, move 'keywrap core' command to the hsm project, where it will ↵Paul Selkirk
actually be useful for short-term testing.
2018-09-05When erasing the whole keystore, optionally preserve the login PINs.Paul Selkirk
2018-09-04Make parsing and display of masterkey values consistent with one another,Paul Selkirk
so the user might be able to copy and paste a generated key into the CLI for recovery. Display had been a 32-byte hexdump. Parsing (manual re-entry of the KEK) had been 8 32-bit little-endian values. This has been a pain point for literally two years, albeit at a low enough pain level that I've managed to cringe and ignore it.
2018-08-27Add startup delay to let fmc bus settlePaul Selkirk
2018-08-17Add sanity test for arbitrary size keys, to be really sure the keywrap core ↵Paul Selkirk
bank-switched memory works.
2018-08-16Add timing tests for key unwrap.Paul Selkirk
2018-08-15Add support for Joachim's keywrap core.Paul Selkirk
2018-07-25Merge branch 'hashsig'Paul Selkirk
2018-07-24Add dummy hal_free_static_memory to cli-test, to avoid a link error.Paul Selkirk
We really ought to rototill cli-test, but not today.
2018-07-16Whack various bits of sw/stm32 test code to compile on fmc_clk branch.Rob Austein
2018-05-27FMC cleanup: constification, gratuitous pointer.Rob Austein
2018-05-20Mutex for RSA blinding factors cache.Rob Austein
2018-04-19Reconstruct the hashsig hash tree(s) on device restart.Paul Selkirk
This can take long enough (several minutes for h=10) that we do it in a background task, which is then converted to an RPC dispatch task. Also add a very limited form of free(), to free the topmost allocation in the sdram "heap". I don't want to deal with real heap management, but I do want to be able to recover memory upon deleting a hashsig key, if it's easy to do so.
2018-04-19Implement hash-based signatures, per draft-mcgrew-hash-sigs-08.txtPaul Selkirk
2018-04-06Merge branch 'profiling'Paul Selkirk
2017-12-14Revert a clean up 'fix' which actually broke FPGA upload.Paul Selkirk
2017-10-17Overhaul UART APIPaul Selkirk
MGMT is the default UART, and no one should have to explicitly refer to the UART unless they need USER (hsm.c:hal_serial_send_char). The default UART is now exposed in the header file, so that the default-using functions can be macros, which saves a few bytes in code space, and a few microseconds in function call overhead.
2017-10-15Cleanup: All drivers return HAL_StatusTypeDef rather than magic values.Paul Selkirk
Note: This affects libhal/ks_token.c, which uses the keystore driver directly.
2017-10-11Cleanup 'unused parameter' warnings, a couple of which are actual coding errors.Paul Selkirk
2017-10-11Cleanup: signed/unsigned mismatches, mostly in loop countersPaul Selkirk
2017-09-21cleanupPaul Selkirk
2017-09-21Make fmc-test less chatty.Paul Selkirk
2017-09-07Rebase branch 'profiling' from masterPaul Selkirk
2017-09-07Add task_yield_maybePaul Selkirk
2017-09-07Sigh, right offset for the wrong register. Get the PC (the address wePaul Selkirk
interrupted) rather than LR (the return address from the function we interrupted). Also, change u_short and u_int to unsigned short and unsigned int, since gcc recently decided that those aren't part of the C99 standard. Finally, add profilable versions of memcpy, memset, and friends, because they get called a lot in the course of unit testing, and it would be nice to know who's calling them.
2017-09-07Port profiling code, using a new SysTick hook and new CLI commands.Paul Selkirk
2017-09-07Add some task metrics.Paul Selkirk
2017-08-31Withdraw SysTick_hook (commit 9ffead1), because it turns out there was ↵Paul Selkirk
already a user-callback mechanism with HAL_SYSTICK_IRQHandler() and HAL_SYSTICK_Callback().
2017-07-31Report UART receive queue length, so we can tune it.Paul Selkirk
2017-07-31Adapt uart_rx_thread to the post-thread tasking model, because we're stillPaul Selkirk
subject to the same forces that made it a good idea in the first place. commit 2b6b9f8 Change RPC UART to have a high-priority thread monitoring a large(ish) DMA buffer, because we've observed out-of-order receives under load.
2017-05-28Stub out hal_allocate_static_memory() to avoid linker error.Rob Austein
This is a quick fix, so that we can get on with testing the ks9 branch changes. A better fix in the long run might be to add a third keystore ("ks_pin_read_only", or some such) which implemented the bare minimum interface that the bootloader needs and left everything else unimplemented. This would require a bit of refactoring the current PIN code to make it work right with both the bootloader's abbreivated keystore and the normal token keystore. Probably worth doing, but a bit of a can of worms, so postponing for now.