9 #include "sw/device/lib/crypto/impl/aes_kwp/aes_kwp.h"
10 #include "sw/device/lib/crypto/impl/integrity.h"
11 #include "sw/device/lib/crypto/impl/keyblob.h"
12 #include "sw/device/lib/crypto/impl/status.h"
17 #define MODULE_ID MAKE_MODULE_ID('k', 't', 'r')
21 if (key == NULL || key->keyblob == NULL) {
22 return OTCRYPTO_BAD_ARGS;
27 HARDENED_TRY(keyblob_ensure_xor_masked(key->config));
33 HARDENED_TRY(keyblob_to_shares(key, &share0, &share1));
38 .len = keyblob_share_num_words(key->config),
42 .len = keyblob_share_num_words(key->config),
55 key->checksum = integrity_blinded_checksum(key);
60 const uint32_t salt[7],
62 if (key == NULL || key->keyblob == NULL) {
63 return OTCRYPTO_BAD_ARGS;
65 if (key->keyblob_length != 8 *
sizeof(uint32_t) ||
67 return OTCRYPTO_BAD_ARGS;
74 if (key_type == kOtcryptoKeyTypeRsa) {
75 return OTCRYPTO_BAD_ARGS;
79 key->keyblob[0] = version;
80 memcpy(&key->keyblob[1], salt, 7 *
sizeof(uint32_t));
83 key->checksum = integrity_blinded_checksum(key);
89 size_t *wrapped_num_words) {
92 if (keyblob_num_words(config) > UINT32_MAX - config_num_words - 2) {
93 return OTCRYPTO_BAD_ARGS;
101 *wrapped_num_words = config_num_words + 2 + keyblob_num_words(config);
104 *wrapped_num_words += 2;
107 if (*wrapped_num_words % 2 == 1) {
108 *wrapped_num_words += 1;
127 return OTCRYPTO_BAD_ARGS;
132 if (launder32((uint32_t)key_kek->config.key_mode) != kOtcryptoKeyModeAesKwp) {
133 return OTCRYPTO_BAD_ARGS;
144 HARDENED_TRY(keyblob_to_keymgr_diversification(key_kek, &diversification));
145 HARDENED_TRY(keymgr_generate_key_aes(diversification));
147 return OTCRYPTO_BAD_ARGS;
157 HARDENED_TRY(keyblob_to_shares(key_kek, &share0, &share1));
167 if (key_to_wrap == NULL || key_to_wrap->keyblob == NULL || key_kek == NULL ||
168 key_kek->keyblob == NULL || wrapped_key.data == NULL) {
169 return OTCRYPTO_BAD_ARGS;
173 if (launder32(integrity_blinded_key_check(key_to_wrap)) !=
175 return OTCRYPTO_BAD_ARGS;
183 if (wrapped_key.len != exp_len) {
184 return OTCRYPTO_BAD_ARGS;
190 HARDENED_TRY(aes_kwp_key_construct(key_kek, &kek));
193 uint32_t keyblob_words = keyblob_num_words(key_to_wrap->config);
194 if (key_to_wrap->keyblob_length != keyblob_words *
sizeof(uint32_t)) {
195 return OTCRYPTO_BAD_ARGS;
200 return OTCRYPTO_BAD_ARGS;
206 size_t plaintext_num_words = config_words + 2 + keyblob_words;
207 uint32_t plaintext[plaintext_num_words];
208 hardened_memcpy(plaintext, (uint32_t *)&key_to_wrap->config, config_words);
209 plaintext[config_words] = key_to_wrap->checksum;
210 plaintext[config_words + 1] = keyblob_words;
215 return aes_kwp_wrap(kek, plaintext,
sizeof(plaintext), wrapped_key.data);
224 if (wrapped_key.data == NULL || key_kek == NULL || key_kek->keyblob == NULL ||
225 success == NULL || unwrapped_key == NULL ||
226 unwrapped_key->keyblob == NULL) {
227 return OTCRYPTO_BAD_ARGS;
233 HARDENED_TRY(aes_kwp_key_construct(key_kek, &kek));
237 return OTCRYPTO_BAD_ARGS;
241 uint32_t plaintext[wrapped_key.len];
242 HARDENED_TRY(aes_kwp_unwrap(kek, wrapped_key.data,
243 wrapped_key.len *
sizeof(uint32_t), success,
257 hardened_memcpy((uint32_t *)&unwrapped_key->config, plaintext, config_words);
260 unwrapped_key->checksum = plaintext[config_words];
261 uint32_t keyblob_words = plaintext[config_words + 1];
262 if (keyblob_words != keyblob_num_words(unwrapped_key->config)) {
268 if (unwrapped_key->keyblob_length != keyblob_words *
sizeof(uint32_t)) {
269 return OTCRYPTO_BAD_ARGS;
275 *success = integrity_blinded_key_check(unwrapped_key);
283 if (blinded_key == NULL || blinded_key->keyblob == NULL ||
284 key_share0.data == NULL || key_share1.data == NULL) {
285 return OTCRYPTO_BAD_ARGS;
289 HARDENED_TRY(keyblob_ensure_xor_masked(blinded_key->config));
292 size_t share_words = launder32(keyblob_share_num_words(blinded_key->config));
293 if (launder32(key_share0.len) != share_words ||
294 launder32(key_share1.len) != share_words) {
295 return OTCRYPTO_BAD_ARGS;
298 keyblob_share_num_words(blinded_key->config));
300 keyblob_share_num_words(blinded_key->config));
303 size_t keyblob_words = launder32(keyblob_num_words(blinded_key->config));
304 if ((blinded_key->keyblob_length %
sizeof(uint32_t) != 0) ||
305 (blinded_key->keyblob_length /
sizeof(uint32_t) != keyblob_words)) {
306 return OTCRYPTO_BAD_ARGS;
309 keyblob_words *
sizeof(uint32_t));
312 keyblob_from_shares(key_share0.data, key_share1.data, blinded_key->config,
313 blinded_key->keyblob);
314 blinded_key->checksum = integrity_blinded_checksum(blinded_key);
321 if (blinded_key.keyblob == NULL || key_share0.data == NULL ||
322 key_share1.data == NULL) {
323 return OTCRYPTO_BAD_ARGS;
327 if (launder32(integrity_blinded_key_check(&blinded_key)) !=
329 return OTCRYPTO_BAD_ARGS;
335 HARDENED_TRY(keyblob_ensure_xor_masked(blinded_key.config));
339 return OTCRYPTO_BAD_ARGS;
344 size_t share_words = launder32(keyblob_share_num_words(blinded_key.config));
345 if (launder32(key_share0.len) != share_words ||
346 launder32(key_share1.len) != share_words) {
347 return OTCRYPTO_BAD_ARGS;
350 keyblob_share_num_words(blinded_key.config));
352 keyblob_share_num_words(blinded_key.config));
355 size_t keyblob_words = launder32(keyblob_num_words(blinded_key.config));
356 if ((blinded_key.keyblob_length %
sizeof(uint32_t) != 0) ||
357 (blinded_key.keyblob_length /
sizeof(uint32_t) != keyblob_words)) {
358 return OTCRYPTO_BAD_ARGS;
361 keyblob_words *
sizeof(uint32_t));
364 uint32_t *keyblob_share0;
365 uint32_t *keyblob_share1;
367 keyblob_to_shares(&blinded_key, &keyblob_share0, &keyblob_share1));