Software APIs
Functions
key_transport.h File Reference

(7b97eec0c5)

Key import/export for the OpenTitan cryptography library. More...

#include "datatypes.h"

Go to the source code of this file.

Functions

OT_WARN_UNUSED_RESULT otcrypto_status_t otcrypto_symmetric_keygen (otcrypto_const_byte_buf_t perso_string, otcrypto_blinded_key_t *key)
 Generates a new, random symmetric key. More...
 
OT_WARN_UNUSED_RESULT otcrypto_status_t otcrypto_hw_backed_key (uint32_t version, const uint32_t salt[7], otcrypto_blinded_key_t *key)
 Creates a handle for a hardware-backed key. More...
 
OT_WARN_UNUSED_RESULT otcrypto_status_t otcrypto_wrapped_key_len (const otcrypto_key_config_t config, size_t *wrapped_num_words)
 Returns the length that the blinded key will have once wrapped. More...
 
OT_WARN_UNUSED_RESULT otcrypto_status_t otcrypto_key_wrap (const otcrypto_blinded_key_t *key_to_wrap, const otcrypto_blinded_key_t *key_kek, otcrypto_word32_buf_t wrapped_key)
 Wraps (encrypts) a secret key. More...
 
OT_WARN_UNUSED_RESULT otcrypto_status_t otcrypto_key_unwrap (otcrypto_const_word32_buf_t wrapped_key, const otcrypto_blinded_key_t *key_kek, hardened_bool_t *success, otcrypto_blinded_key_t *unwrapped_key)
 Unwraps (decrypts) a secret key. More...
 
OT_WARN_UNUSED_RESULT otcrypto_status_t otcrypto_import_blinded_key (const otcrypto_const_word32_buf_t key_share0, const otcrypto_const_word32_buf_t key_share1, otcrypto_blinded_key_t *blinded_key)
 Creates a blinded key struct from masked key material. More...
 
OT_WARN_UNUSED_RESULT otcrypto_status_t otcrypto_export_blinded_key (const otcrypto_blinded_key_t blinded_key, otcrypto_word32_buf_t key_share0, otcrypto_word32_buf_t key_share1)
 Exports a blinded key to the user provided key buffer, in shares. More...
 

Detailed Description

Key import/export for the OpenTitan cryptography library.

These functions allow library users to translate to and from the crypto library's key representations.

Definition in file key_transport.h.

Function Documentation

◆ otcrypto_export_blinded_key()

OT_WARN_UNUSED_RESULT otcrypto_status_t otcrypto_export_blinded_key ( const otcrypto_blinded_key_t  blinded_key,
otcrypto_word32_buf_t  key_share0,
otcrypto_word32_buf_t  key_share1 
)

Exports a blinded key to the user provided key buffer, in shares.

This function will copy data from the keyblob into the shares; after the call, it is safe to free the blinded key and the data pointed to by blinded_key.keyblob.

Hardware-backed, non-exportable, and asymmetric (ECC or RSA) keys cannot be exported this way. For asymmetric keys, use an algorithm-specific funtion.

Parameters
blinded_keyBlinded key struct to be exported.
[out]key_share0First share of the blinded key.
[out]key_share1Second share of the blinded key.
Returns
Result of the blinded key export operation.

Definition at line 318 of file key_transport.c.

◆ otcrypto_hw_backed_key()

OT_WARN_UNUSED_RESULT otcrypto_status_t otcrypto_hw_backed_key ( uint32_t  version,
const uint32_t  salt[7],
otcrypto_blinded_key_t key 
)

Creates a handle for a hardware-backed key.

This routine may be used for both symmetric and asymmetric algorithms, since conceptually it only creates some data that the key manager can use to generate key material at the time of use. However, not all algorithms are suitable for hardware-backed keys (for example, RSA is not suitable), so some choices of algorithm may result in errors.

The caller should partially populate the blinded key struct; they should set the full key configuration and the keyblob length (always 32 bytes), and then allocate 32 bytes of space for the keyblob and set the keyblob pointer.

This function will populate the checksum field and copy the salt/version data into the keyblob buffer in the specific order that the rest of cryptolib expects.

Parameters
versionKey version.
saltKey salt (diversification data for KDF).
[out]keyDestination blinded key struct.
Returns
The result of the operation.

Definition at line 59 of file key_transport.c.

◆ otcrypto_import_blinded_key()

OT_WARN_UNUSED_RESULT otcrypto_status_t otcrypto_import_blinded_key ( const otcrypto_const_word32_buf_t  key_share0,
const otcrypto_const_word32_buf_t  key_share1,
otcrypto_blinded_key_t blinded_key 
)

Creates a blinded key struct from masked key material.

The caller should allocate and partially populate the blinded key struct, including populating the key configuration and allocating space for the keyblob. The keyblob should be twice the length of the user key. Hardware-backed and asymmetric (ECC or RSA) keys cannot be imported this way. For asymmetric keys, use algorithm-specific key construction methods.

This function will copy the data from the shares into the keyblob; it is safe to free key_share0 and key_share1 after this call.

Parameters
key_share0First share of the user provided key.
key_share1Second share of the user provided key.
[out]blinded_keyGenerated blinded key struct.
Returns
Result of the blinded key import operation.

Definition at line 279 of file key_transport.c.

◆ otcrypto_key_unwrap()

OT_WARN_UNUSED_RESULT otcrypto_status_t otcrypto_key_unwrap ( otcrypto_const_word32_buf_t  wrapped_key,
const otcrypto_blinded_key_t key_kek,
hardened_bool_t success,
otcrypto_blinded_key_t unwrapped_key 
)

Unwraps (decrypts) a secret key.

The key unwrap function uses AES-KWP (key wrapping with padding), an authenticated encryption mode designed for encrypting key material.

The caller must allocate space for the keyblob and set the keyblob-length and keyblob fields in unwrapped_key accordingly. If there is not enough space in the keyblob, this function will return an error. Too much space in the keyblob is okay; this function will write to the first part of the keyblob buffer and set the keyblob length field to the correct exact value for the unwrapped key, at which point it is safe to check the new length and free the remaining keyblob memory. It is always safe to allocate a keyblob the same size as the wrapped key; this will always be enough space by definition.

The caller does not need to populate the blinded key configuration, since this information is encrypted along with the key. However, the caller may want to check that the configuration matches expectations.

An OK status from this function does NOT necessarily mean that unwrapping succeeded; the caller must check both the returned status and the success parameter before reading the unwrapped key.

Parameters
wrapped_keyEncrypted key data.
key_kekAES-KWP key used to decrypt wrapped_key.
[out]successWhether the wrapped key was valid.
[out]unwrapped_keyDecrypted key data.
Returns
Result of the aes-kwp unwrap operation.

Definition at line 218 of file key_transport.c.

◆ otcrypto_key_wrap()

OT_WARN_UNUSED_RESULT otcrypto_status_t otcrypto_key_wrap ( const otcrypto_blinded_key_t key_to_wrap,
const otcrypto_blinded_key_t key_kek,
otcrypto_word32_buf_t  wrapped_key 
)

Wraps (encrypts) a secret key.

The key wrap function uses AES-KWP (key wrapping with padding), an authenticated encryption mode designed for encrypting key material.

The caller should allocate space for the wrapped_key buffer according to otcrypto_wrapped_key_len, and set the length of expected output in the len field of wrapped_key. If the user-set length and the output length do not match, an error message will be returned.

The blinded key struct to wrap must be 32-bit aligned.

Parameters
key_to_wrapBlinded key that will be encrypted.
key_kekAES-KWP key used to encrypt key_to_wrap.
[out]wrapped_keyEncrypted key data.
Returns
Result of the wrap operation.

Definition at line 164 of file key_transport.c.

◆ otcrypto_symmetric_keygen()

OT_WARN_UNUSED_RESULT otcrypto_status_t otcrypto_symmetric_keygen ( otcrypto_const_byte_buf_t  perso_string,
otcrypto_blinded_key_t key 
)

Generates a new, random symmetric key.

Use this only for symmetric algorithms (e.g. AES, HMAC, KMAC). Asymmetric algorithms (e.g. ECDSA, RSA) have their own specialized key-generation routines. Cannot be used for hardware-backed keys; use otcrypto_hw_backed_key instead to generate these.

The caller should allocate space for the keyblob and populate the blinded key struct with the length of the keyblob, the pointer to the keyblob buffer, and the key configuration. The value in the checksum field of the blinded key struct will be populated by the key generation function. The keyblob should be twice the length of the unblinded key. This function will return an error if the keyblob length does not match expectations based on the key mode and configuration.

The keyblob should be twice the length of the key. The caller only needs to allocate the keyblob, not populate it.

The personalization string may empty, and may be up to 48 bytes long; any longer will result in an error. It is passed as an extra seed input to the DRBG, in addition to the hardware TRNG.

Parameters
perso_stringOptional personalization string to be passed to DRBG.
[out]keyDestination blinded key struct.
Returns
The result of the operation.

Definition at line 19 of file key_transport.c.

◆ otcrypto_wrapped_key_len()

OT_WARN_UNUSED_RESULT otcrypto_status_t otcrypto_wrapped_key_len ( const otcrypto_key_config_t  config,
size_t *  wrapped_num_words 
)

Returns the length that the blinded key will have once wrapped.

Parameters
configKey configuration.
[out]wrapped_num_wordsNumber of 32b words for the wrapped key.
Returns
Result of the operation.

Definition at line 88 of file key_transport.c.