Software APIs
aes.c
1 // Copyright lowRISC contributors (OpenTitan project).
2 // Licensed under the Apache License, Version 2.0, see LICENSE for details.
3 // SPDX-License-Identifier: Apache-2.0
4 
6 
11 #include "sw/device/lib/crypto/drivers/aes.h"
12 #include "sw/device/lib/crypto/drivers/keymgr.h"
13 #include "sw/device/lib/crypto/impl/integrity.h"
14 #include "sw/device/lib/crypto/impl/keyblob.h"
15 #include "sw/device/lib/crypto/impl/status.h"
17 
18 // Module ID for status codes.
19 #define MODULE_ID MAKE_MODULE_ID('a', 'e', 's')
20 
21 // Check that cipher mode enum from AES driver matches the one from the
22 // top-level API.
23 OT_ASSERT_ENUM_VALUE(kAesCipherModeEcb, (uint32_t)kOtcryptoAesModeEcb);
24 OT_ASSERT_ENUM_VALUE(kAesCipherModeCbc, (uint32_t)kOtcryptoAesModeCbc);
25 OT_ASSERT_ENUM_VALUE(kAesCipherModeCfb, (uint32_t)kOtcryptoAesModeCfb);
26 OT_ASSERT_ENUM_VALUE(kAesCipherModeOfb, (uint32_t)kOtcryptoAesModeOfb);
27 OT_ASSERT_ENUM_VALUE(kAesCipherModeCtr, (uint32_t)kOtcryptoAesModeCtr);
28 
29 /**
30  * Extract an AES key from the blinded key struct.
31  *
32  * Also performs integrity, mode, and null-pointer checks on the key. This
33  * function is only for basic AES modes; do not use for AES-GCM or AES-KWP keys
34  * since they will fail the mode check.
35  *
36  * @param blinded_key Blinded key struct.
37  * @param aes_mode Block cipher mode.
38  * @param[out] aes_key Destination AES key struct.
39  * @return Result of the operation.
40  */
41 static status_t aes_key_construct(const otcrypto_blinded_key_t *blinded_key,
42  const otcrypto_aes_mode_t aes_mode,
43  aes_key_t *aes_key) {
44  // Key integrity check.
45  if (launder32(integrity_blinded_key_check(blinded_key)) !=
47  return OTCRYPTO_BAD_ARGS;
48  }
49  HARDENED_CHECK_EQ(integrity_blinded_key_check(blinded_key),
51 
52  if (blinded_key->config.hw_backed == kHardenedBoolTrue) {
53  // Call keymgr to sideload the key into AES.
54  keymgr_diversification_t diversification;
55  HARDENED_TRY(
56  keyblob_to_keymgr_diversification(blinded_key, &diversification));
57  HARDENED_TRY(keymgr_generate_key_aes(diversification));
58  aes_key->key_shares[0] = NULL;
59  aes_key->key_shares[1] = NULL;
60  } else if (blinded_key->config.hw_backed == kHardenedBoolFalse) {
61  // Get pointers to the individual shares.
62  uint32_t *share0;
63  uint32_t *share1;
64  HARDENED_TRY(keyblob_to_shares(blinded_key, &share0, &share1));
65  aes_key->key_shares[0] = share0;
66  aes_key->key_shares[1] = share1;
67  } else {
68  return OTCRYPTO_BAD_ARGS;
69  }
70  aes_key->sideload = blinded_key->config.hw_backed;
71 
72  // Check for null pointer.
73  if (blinded_key->keyblob == NULL) {
74  return OTCRYPTO_BAD_ARGS;
75  }
76 
77  // Set the block cipher mode based on the key mode.
78  switch (blinded_key->config.key_mode) {
79  case kOtcryptoKeyModeAesEcb:
80  aes_key->mode = kAesCipherModeEcb;
81  break;
82  case kOtcryptoKeyModeAesCbc:
83  aes_key->mode = kAesCipherModeCbc;
84  break;
85  case kOtcryptoKeyModeAesCfb:
86  aes_key->mode = kAesCipherModeCfb;
87  break;
88  case kOtcryptoKeyModeAesOfb:
89  aes_key->mode = kAesCipherModeOfb;
90  break;
91  case kOtcryptoKeyModeAesCtr:
92  aes_key->mode = kAesCipherModeCtr;
93  break;
94  default:
95  return OTCRYPTO_BAD_ARGS;
96  }
97 
98  // Check that the key mode matches the requested block cipher mode.
99  if (memcmp(&aes_key->mode, &aes_mode, sizeof(aes_key->mode)) != 0) {
100  return OTCRYPTO_BAD_ARGS;
101  }
102  HARDENED_CHECK_EQ(aes_key->mode, aes_mode);
103 
104  // Set the AES key length (in words).
105  aes_key->key_len = keyblob_share_num_words(blinded_key->config);
106 
107  return OTCRYPTO_OK;
108 }
109 
110 /**
111  * Applies the specified mode of AES padding to the block.
112  *
113  * Modifies only positions on and after index `last_block_len` in the
114  * `padded_block`; real input may be written to the initial locations either
115  * before or after calling this function.
116  *
117  * @param padding_mode Padding mode.
118  * @param partial_data_len Length of real input in this block (may be 0).
119  * @param[out] padded_block Destination padded block.
120  * @return Result of the operation.
121  */
122 static status_t aes_padding_apply(otcrypto_aes_padding_t padding_mode,
123  const size_t partial_data_len,
124  aes_block_t *block) {
125  if (partial_data_len >= kAesBlockNumBytes) {
126  return OTCRYPTO_BAD_ARGS;
127  }
128 
129  // Get a byte-sized pointer to the padding start point within the block's
130  // data buffer.
131  char *padding = ((char *)block->data) + partial_data_len;
132 
133  // Pad a full block if the last block is full, otherwise just fill the last
134  // block.
135  size_t padding_len = kAesBlockNumBytes - partial_data_len;
136  hardened_bool_t padding_written = kHardenedBoolFalse;
137  switch (launder32(padding_mode)) {
138  case kOtcryptoAesPaddingPkcs7:
139  // Pads with value same as the number of padding bytes.
140  memset(padding, (uint8_t)padding_len, padding_len);
141  padding_written = kHardenedBoolTrue;
142  break;
143  case kOtcryptoAesPaddingIso9797M2:
144  // Pads with 0x80 (0b10000000), followed by zero bytes.
145  memset(padding, 0x0, padding_len);
146  padding[0] = 0x80;
147  padding_written = kHardenedBoolTrue;
148  break;
149  case kOtcryptoAesPaddingNull:
150  // This routine should not be called if padding is not needed.
151  return OTCRYPTO_RECOV_ERR;
152  default:
153  // Unrecognized padding mode.
154  return OTCRYPTO_BAD_ARGS;
155  }
156  HARDENED_CHECK_EQ(padding_written, kHardenedBoolTrue);
157 
158  return OTCRYPTO_OK;
159 }
160 
161 /**
162  * Return the number of blocks for the input and padding mode.
163  *
164  * @param plaintext_len Length of plaintext in bytes.
165  * @param padding Padding mode.
166  * @returns Number of AES blocks required.
167  */
168 static status_t num_padded_blocks_get(size_t plaintext_len,
169  otcrypto_aes_padding_t padding,
170  size_t *num_blocks) {
171  size_t num_full_blocks = plaintext_len / kAesBlockNumBytes;
172 
173  if (padding == kOtcryptoAesPaddingNull) {
174  // If no padding mode is given, the last block must be full.
175  if (num_full_blocks * kAesBlockNumBytes != plaintext_len) {
176  return OTCRYPTO_BAD_ARGS;
177  }
178 
179  *num_blocks = num_full_blocks;
180  return OTCRYPTO_OK;
181  }
182  HARDENED_CHECK_NE(padding, kOtcryptoAesPaddingNull);
183 
184  // For non-null padding modes, we append a full block of padding if the last
185  // block is full, so the value is always <full blocks> + 1.
186  *num_blocks = num_full_blocks + 1;
187  return OTCRYPTO_OK;
188 }
189 
190 /**
191  * Return the block at index i for the given input and padding mode.
192  *
193  * @param input Input data buffer.
194  * @param padding Padding mode.
195  * @param index Block index.
196  * @param[out] AES block at `index`.
197  * @param input_len Length of cipher input in bytes.
198  * @param padding Padding mode.
199  * @returns Number of AES blocks required.
200  */
201 static status_t get_block(otcrypto_const_byte_buf_t input,
202  otcrypto_aes_padding_t padding, size_t index,
203  aes_block_t *block) {
204  size_t num_full_blocks = input.len / kAesBlockNumBytes;
205 
206  // The index should never be more than `num_full_blocks` + 1, even including
207  // padding.
208  HARDENED_CHECK_LE(index, num_full_blocks + 1);
209 
210  if (launder32(index) < num_full_blocks) {
211  HARDENED_CHECK_LT(index, num_full_blocks);
212  // No need to worry about padding, just copy the data into the output
213  // block.
214  // TODO(#17711) Change to `hardened_memcpy`.
215  memcpy(block->data, &input.data[index * kAesBlockNumBytes],
216  kAesBlockNumBytes);
217  return OTCRYPTO_OK;
218  }
219  HARDENED_CHECK_GE(index, num_full_blocks);
220 
221  // If we get here, this block is the one with padding. It may be a partial
222  // block or an empty block that will be entirely filled with padded bytes.
223  size_t partial_data_len = input.len % kAesBlockNumBytes;
224  memcpy(block->data, &input.data[index * kAesBlockNumBytes], partial_data_len);
225 
226  // Apply padding.
227  HARDENED_TRY(aes_padding_apply(padding, partial_data_len, block));
228  return OTCRYPTO_OK;
229 }
230 
232  size_t plaintext_len, otcrypto_aes_padding_t aes_padding,
233  size_t *padded_len) {
234  size_t padded_nblocks;
235  HARDENED_TRY(
236  num_padded_blocks_get(plaintext_len, aes_padding, &padded_nblocks));
237  *padded_len = padded_nblocks * kAesBlockNumBytes;
238  return OTCRYPTO_OK;
239 }
240 
243  otcrypto_aes_mode_t aes_mode,
244  otcrypto_aes_operation_t aes_operation,
245  otcrypto_const_byte_buf_t cipher_input,
246  otcrypto_aes_padding_t aes_padding,
247  otcrypto_byte_buf_t cipher_output) {
248  // Check for NULL pointers in input pointers and data buffers.
249  if (key == NULL || (aes_mode != kOtcryptoAesModeEcb && iv.data == NULL) ||
250  cipher_input.data == NULL || cipher_output.data == NULL) {
251  return OTCRYPTO_BAD_ARGS;
252  }
253 
254  // Calculate the number of blocks for the input, including the padding for
255  // encryption.
256  size_t input_nblocks;
257  if (aes_operation == kOtcryptoAesOperationEncrypt) {
258  HARDENED_TRY(
259  num_padded_blocks_get(cipher_input.len, aes_padding, &input_nblocks));
260  } else if (aes_operation == kOtcryptoAesOperationDecrypt) {
261  // If the operation is decryption, the input length must be divisible by
262  // the block size.
263  if (launder32(cipher_input.len) % kAesBlockNumBytes != 0) {
264  return OTCRYPTO_BAD_ARGS;
265  }
266  HARDENED_CHECK_EQ(cipher_input.len % kAesBlockNumBytes, 0);
267  input_nblocks = cipher_input.len / kAesBlockNumBytes;
268  }
269 
270  // Check input/output lengths.
271  // - Input length must be nonzero.
272  // - Output length must match number of input blocks.
273  if (cipher_input.len == 0 ||
274  launder32(cipher_output.len) != input_nblocks * kAesBlockNumBytes) {
275  return OTCRYPTO_BAD_ARGS;
276  }
277  HARDENED_CHECK_EQ(cipher_output.len, input_nblocks * kAesBlockNumBytes);
278 
279  // Construct the IV and check its length. ECB mode will ignore the IV, so in
280  // this case it is left uninitialized.
281  aes_block_t aes_iv;
282  if (aes_mode == launder32(kAesCipherModeEcb)) {
283  HARDENED_CHECK_EQ(aes_mode, kAesCipherModeEcb);
284  } else {
285  HARDENED_CHECK_NE(aes_mode, kAesCipherModeEcb);
286 
287  // The IV must be exactly one block long.
288  if (launder32(iv.len) != kAesBlockNumWords) {
289  return OTCRYPTO_BAD_ARGS;
290  }
291  HARDENED_CHECK_EQ(iv.len, kAesBlockNumWords);
292  hardened_memcpy(aes_iv.data, iv.data, kAesBlockNumWords);
293  }
294 
295  // Parse the AES key.
297  HARDENED_TRY(aes_key_construct(key, aes_mode, &aes_key));
298 
299  // Start the operation (encryption or decryption).
300  switch (aes_operation) {
301  case kOtcryptoAesOperationEncrypt:
302  HARDENED_TRY(aes_encrypt_begin(aes_key, &aes_iv));
303  break;
304  case kOtcryptoAesOperationDecrypt:
305  HARDENED_TRY(aes_decrypt_begin(aes_key, &aes_iv));
306  break;
307  default:
308  return OTCRYPTO_BAD_ARGS;
309  }
310 
311  // Perform the cipher operation for all full blocks. The input and output are
312  // offset by `block_offset` number of blocks, where `block_offset` can be 1
313  // or 2. So if unrolled, these loops would look like:
314  //
315  // - block_offset == 1
316  // aes_update(NULL, input[0]);
317  // aes_update(output[0], input[1]);
318  // aes_update(output[1], input[2]);
319  // aes_update(output[2], NULL);
320  //
321  // - block_offset == 2
322  // aes_update(NULL, input[0]);
323  // aes_update(NULL, input[1]);
324  // aes_update(output[0], input[2]); // The HW is processing input[1].
325  // aes_update(output[1], input[3]); // The HW is processing input[2].
326  // aes_update(output[2], NULL);
327  // aes_update(output[3], NULL);
328  //
329  // Using a `block_offset` of 2 allows having 3 blocks in flight which is
330  // beneficial from a hardening and performance point of view:
331  // - Software retrieves Block x-1 from the data output registers.
332  // - Hardware processes Block x.
333  // - Software provides Block x+1 via the data input registers.
334  //
335  // See the AES driver for details.
336  const size_t block_offset = input_nblocks >= 3 ? 2 : 1;
337  aes_block_t block_in;
338  aes_block_t block_out;
339  size_t i;
340 
341  // Provide the first `block_offset` number of input blocks and call the AES
342  // cipher.
343  for (i = 0; launder32(i) < block_offset; ++i) {
344  HARDENED_TRY(get_block(cipher_input, aes_padding, i, &block_in));
345  TRY(aes_update(/*dest=*/NULL, &block_in));
346  }
347  // Check that the loop ran for the correct number of iterations.
348  HARDENED_CHECK_EQ(i, block_offset);
349 
350  // Call the AES cipher while providing new input and copying data to the
351  // output buffer.
352  for (i = block_offset; launder32(i) < input_nblocks; ++i) {
353  HARDENED_TRY(get_block(cipher_input, aes_padding, i, &block_in));
354  TRY(aes_update(&block_out, &block_in));
355  // TODO(#17711) Change to `hardened_memcpy`.
356  memcpy(&cipher_output.data[(i - block_offset) * kAesBlockNumBytes],
357  block_out.data, kAesBlockNumBytes);
358  }
359  // Check that the loop ran for the correct number of iterations.
360  HARDENED_CHECK_EQ(i, input_nblocks);
361 
362  // Retrieve the output from the final `block_offset` blocks (providing no
363  // input).
364  for (i = block_offset; launder32(i) > 0; --i) {
365  HARDENED_TRY(aes_update(&block_out, /*src=*/NULL));
366  // TODO(#17711) Change to `hardened_memcpy`.
367  memcpy(&cipher_output.data[(input_nblocks - i) * kAesBlockNumBytes],
368  block_out.data, kAesBlockNumBytes);
369  }
370  // Check that the loop ran for the correct number of iterations.
371  HARDENED_CHECK_EQ(i, 0);
372 
373  // Deinitialize the AES block and update the IV (in ECB mode, skip the IV).
374  if (aes_mode == launder32(kAesCipherModeEcb)) {
375  HARDENED_TRY(aes_end(NULL));
376  } else {
377  HARDENED_TRY(aes_end(&aes_iv));
378  hardened_memcpy(iv.data, aes_iv.data, kAesBlockNumWords);
379  }
380 
381  // If the key was sideloaded, clear it.
382  if (key->config.hw_backed == kHardenedBoolTrue) {
383  HARDENED_TRY(keymgr_sideload_clear_aes());
384  }
385 
386  return OTCRYPTO_OK;
387 }