feat(core): Add aesgcm class to trezor.crypto Python module.

[no changelog]
pull/3675/head
Andrew Kozlik 2 months ago committed by Andrew Kozlik
parent f1b5617652
commit 703ea32ceb

@ -19,6 +19,7 @@ FEATURE_FLAGS = {
"RDI": True,
"SECP256K1_ZKP": True, # required for trezor.crypto.curve.bip340 (BIP340/Taproot)
"SYSTEM_VIEW": False,
"AES_GCM": False,
}
FEATURES_WANTED = ["input", "sbu", "sd_card", "rgb_led", "dma2d", "consumption_mask", "usb" ,"optiga", "haptic"]
@ -177,6 +178,17 @@ if FEATURE_FLAGS["SECP256K1_ZKP"]:
'vendor/trezor-crypto/zkp_bip340.c',
]
# AES-GCM
if FEATURE_FLAGS["AES_GCM"]:
CPPDEFINES_MOD += [
'USE_AES_GCM',
'AES_VAR',
]
SOURCE_MOD += [
'vendor/trezor-crypto/aes/gf128mul.c',
'vendor/trezor-crypto/aes/aesgcm.c',
]
# modtrezorio
SOURCE_MOD += [
'embed/extmod/modtrezorio/modtrezorio.c',

@ -24,6 +24,7 @@ if TREZOR_MODEL in ('DISC1', 'DISC2'):
FEATURE_FLAGS = {
"SECP256K1_ZKP": True, # required for trezor.crypto.curve.bip340 (BIP340/Taproot)
"AES_GCM": True,
}
CCFLAGS_MOD = ''
@ -174,6 +175,17 @@ if FEATURE_FLAGS["SECP256K1_ZKP"]:
'vendor/trezor-crypto/zkp_bip340.c',
]
# AES-GCM
if FEATURE_FLAGS["AES_GCM"]:
CPPDEFINES_MOD += [
'USE_AES_GCM',
'AES_VAR',
]
SOURCE_MOD += [
'vendor/trezor-crypto/aes/gf128mul.c',
'vendor/trezor-crypto/aes/aesgcm.c',
]
# modtrezorio
SOURCE_MOD += [
'embed/extmod/modtrezorio/modtrezorio.c',

@ -0,0 +1,213 @@
/*
* This file is part of the Trezor project, https://trezor.io/
*
* Copyright (c) SatoshiLabs
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "py/objstr.h"
#include "aes/aesgcm.h"
#include "memzero.h"
/// package: trezorcrypto.__init__
/// class aesgcm:
/// """
/// AES-GCM context.
/// """
typedef struct _mp_obj_AesGcm_t {
mp_obj_base_t base;
gcm_ctx ctx;
enum {
STATE_INIT,
STATE_ENCRYPTING,
STATE_DECRYPTING,
STATE_FINISHED,
STATE_FAILED,
} state;
} mp_obj_AesGcm_t;
/// def __init__(self, key: bytes, iv: bytes) -> None:
/// """
/// Initialize the AES-GCM context for encryption or decryption.
/// """
STATIC mp_obj_t mod_trezorcrypto_AesGcm_make_new(const mp_obj_type_t *type,
size_t n_args, size_t n_kw,
const mp_obj_t *args) {
mp_arg_check_num(n_args, n_kw, 2, 2, false);
mp_buffer_info_t key = {0}, iv = {0};
mp_get_buffer_raise(args[0], &key, MP_BUFFER_READ);
mp_get_buffer_raise(args[1], &iv, MP_BUFFER_READ);
if (key.len != 16 && key.len != 24 && key.len != 32) {
mp_raise_ValueError(
"Invalid length of key (has to be 128, 192 or 256 bits)");
}
mp_obj_AesGcm_t *o = m_new_obj_with_finaliser(mp_obj_AesGcm_t);
o->base.type = type;
o->state = STATE_INIT;
if (gcm_init_and_key(key.buf, key.len, &(o->ctx)) != RETURN_GOOD ||
gcm_init_message(iv.buf, iv.len, &(o->ctx)) != RETURN_GOOD) {
m_del_obj(mp_obj_AesGcm_t, o);
mp_raise_type(&mp_type_RuntimeError);
}
return MP_OBJ_FROM_PTR(o);
}
/// def reset(self, iv: bytes) -> None:
/// """
/// Reset the IV for encryption or decryption.
/// """
STATIC mp_obj_t mod_trezorcrypto_AesGcm_reset(mp_obj_t self, mp_obj_t iv) {
mp_obj_AesGcm_t *o = MP_OBJ_TO_PTR(self);
mp_buffer_info_t in = {0};
mp_get_buffer_raise(iv, &in, MP_BUFFER_READ);
if (gcm_init_message(in.buf, in.len, &(o->ctx)) != RETURN_GOOD) {
o->state = STATE_FAILED;
mp_raise_type(&mp_type_RuntimeError);
}
o->state = STATE_INIT;
return mp_const_none;
}
STATIC MP_DEFINE_CONST_FUN_OBJ_2(mod_trezorcrypto_AesGcm_reset_obj,
mod_trezorcrypto_AesGcm_reset);
/// def encrypt(self, data: bytes) -> bytes:
/// """
/// Encrypt data chunk.
/// """
STATIC mp_obj_t mod_trezorcrypto_AesGcm_encrypt(mp_obj_t self, mp_obj_t data) {
mp_obj_AesGcm_t *o = MP_OBJ_TO_PTR(self);
if (o->state != STATE_INIT && o->state != STATE_ENCRYPTING) {
mp_raise_msg(&mp_type_RuntimeError, "Invalid state.");
}
o->state = STATE_ENCRYPTING;
mp_buffer_info_t in = {0};
mp_get_buffer_raise(data, &in, MP_BUFFER_READ);
vstr_t vstr = {0};
vstr_init_len(&vstr, in.len);
memcpy(vstr.buf, in.buf, in.len);
if (gcm_encrypt((unsigned char *)vstr.buf, in.len, &(o->ctx)) !=
RETURN_GOOD) {
o->state = STATE_FAILED;
mp_raise_type(&mp_type_RuntimeError);
}
return mp_obj_new_str_from_vstr(&mp_type_bytes, &vstr);
}
STATIC MP_DEFINE_CONST_FUN_OBJ_2(mod_trezorcrypto_AesGcm_encrypt_obj,
mod_trezorcrypto_AesGcm_encrypt);
/// def decrypt(self, data: bytes) -> bytes:
/// """
/// Decrypt data chunk.
/// """
STATIC mp_obj_t mod_trezorcrypto_AesGcm_decrypt(mp_obj_t self, mp_obj_t data) {
mp_obj_AesGcm_t *o = MP_OBJ_TO_PTR(self);
if (o->state != STATE_INIT && o->state != STATE_DECRYPTING) {
mp_raise_msg(&mp_type_RuntimeError, "Invalid state.");
}
o->state = STATE_DECRYPTING;
mp_buffer_info_t in = {0};
mp_get_buffer_raise(data, &in, MP_BUFFER_READ);
vstr_t vstr = {0};
vstr_init_len(&vstr, in.len);
memcpy(vstr.buf, in.buf, in.len);
if (gcm_decrypt((unsigned char *)vstr.buf, in.len, &(o->ctx)) !=
RETURN_GOOD) {
o->state = STATE_FAILED;
mp_raise_type(&mp_type_RuntimeError);
}
return mp_obj_new_str_from_vstr(&mp_type_bytes, &vstr);
}
STATIC MP_DEFINE_CONST_FUN_OBJ_2(mod_trezorcrypto_AesGcm_decrypt_obj,
mod_trezorcrypto_AesGcm_decrypt);
/// def auth(self, data: bytes) -> None:
/// """
/// Include authenticated data chunk in the GCM authentication tag. This can
/// be called repeatedly to add authenticated data at any point before
/// finish().
/// """
STATIC mp_obj_t mod_trezorcrypto_AesGcm_auth(mp_obj_t self, mp_obj_t data) {
mp_obj_AesGcm_t *o = MP_OBJ_TO_PTR(self);
if (o->state != STATE_INIT && o->state != STATE_ENCRYPTING &&
o->state != STATE_DECRYPTING) {
mp_raise_msg(&mp_type_RuntimeError, "Invalid state.");
}
mp_buffer_info_t in = {0};
mp_get_buffer_raise(data, &in, MP_BUFFER_READ);
if (gcm_auth_header(in.buf, in.len, &(o->ctx)) != RETURN_GOOD) {
o->state = STATE_FAILED;
mp_raise_type(&mp_type_RuntimeError);
}
return mp_const_none;
}
STATIC MP_DEFINE_CONST_FUN_OBJ_2(mod_trezorcrypto_AesGcm_auth_obj,
mod_trezorcrypto_AesGcm_auth);
/// def finish(self) -> bytes:
/// """
/// Compute GCM authentication tag.
/// """
STATIC mp_obj_t mod_trezorcrypto_AesGcm_finish(mp_obj_t self) {
mp_obj_AesGcm_t *o = MP_OBJ_TO_PTR(self);
if (o->state != STATE_INIT && o->state != STATE_ENCRYPTING &&
o->state != STATE_DECRYPTING) {
mp_raise_msg(&mp_type_RuntimeError, "Invalid state.");
}
o->state = STATE_FINISHED;
vstr_t tag = {0};
vstr_init_len(&tag, 16);
if (gcm_compute_tag((unsigned char *)tag.buf, tag.len, &(o->ctx)) !=
RETURN_GOOD) {
o->state = STATE_FAILED;
mp_raise_type(&mp_type_RuntimeError);
}
return mp_obj_new_str_from_vstr(&mp_type_bytes, &tag);
}
STATIC MP_DEFINE_CONST_FUN_OBJ_1(mod_trezorcrypto_AesGcm_finish_obj,
mod_trezorcrypto_AesGcm_finish);
STATIC mp_obj_t mod_trezorcrypto_AesGcm___del__(mp_obj_t self) {
mp_obj_AesGcm_t *o = MP_OBJ_TO_PTR(self);
memzero(&(o->ctx), sizeof(gcm_ctx));
return mp_const_none;
}
STATIC MP_DEFINE_CONST_FUN_OBJ_1(mod_trezorcrypto_AesGcm___del___obj,
mod_trezorcrypto_AesGcm___del__);
STATIC const mp_rom_map_elem_t mod_trezorcrypto_AesGcm_locals_dict_table[] = {
{MP_ROM_QSTR(MP_QSTR_reset),
MP_ROM_PTR(&mod_trezorcrypto_AesGcm_reset_obj)},
{MP_ROM_QSTR(MP_QSTR_encrypt),
MP_ROM_PTR(&mod_trezorcrypto_AesGcm_encrypt_obj)},
{MP_ROM_QSTR(MP_QSTR_decrypt),
MP_ROM_PTR(&mod_trezorcrypto_AesGcm_decrypt_obj)},
{MP_ROM_QSTR(MP_QSTR_auth), MP_ROM_PTR(&mod_trezorcrypto_AesGcm_auth_obj)},
{MP_ROM_QSTR(MP_QSTR_finish),
MP_ROM_PTR(&mod_trezorcrypto_AesGcm_finish_obj)},
{MP_ROM_QSTR(MP_QSTR___del__),
MP_ROM_PTR(&mod_trezorcrypto_AesGcm___del___obj)},
};
STATIC MP_DEFINE_CONST_DICT(mod_trezorcrypto_AesGcm_locals_dict,
mod_trezorcrypto_AesGcm_locals_dict_table);
STATIC const mp_obj_type_t mod_trezorcrypto_AesGcm_type = {
{&mp_type_type},
.name = MP_QSTR_AesGcm,
.make_new = mod_trezorcrypto_AesGcm_make_new,
.locals_dict = (void *)&mod_trezorcrypto_AesGcm_locals_dict,
};

@ -39,6 +39,9 @@ static void wrapped_ui_wait_callback(uint32_t current, uint32_t total) {
}
#include "modtrezorcrypto-aes.h"
#ifdef USE_AES_GCM
#include "modtrezorcrypto-aesgcm.h"
#endif
#include "modtrezorcrypto-bech32.h"
#include "modtrezorcrypto-bip32.h"
#ifdef USE_SECP256K1_ZKP
@ -78,6 +81,9 @@ static void wrapped_ui_wait_callback(uint32_t current, uint32_t total) {
STATIC const mp_rom_map_elem_t mp_module_trezorcrypto_globals_table[] = {
{MP_ROM_QSTR(MP_QSTR___name__), MP_ROM_QSTR(MP_QSTR_trezorcrypto)},
{MP_ROM_QSTR(MP_QSTR_aes), MP_ROM_PTR(&mod_trezorcrypto_AES_type)},
#if USE_AES_GCM
{MP_ROM_QSTR(MP_QSTR_aesgcm), MP_ROM_PTR(&mod_trezorcrypto_AesGcm_type)},
#endif
{MP_ROM_QSTR(MP_QSTR_bech32), MP_ROM_PTR(&mod_trezorcrypto_bech32_module)},
{MP_ROM_QSTR(MP_QSTR_bip32), MP_ROM_PTR(&mod_trezorcrypto_bip32_module)},
{MP_ROM_QSTR(MP_QSTR_bip39), MP_ROM_PTR(&mod_trezorcrypto_bip39_module)},

@ -33,6 +33,45 @@ class aes:
"""
# extmod/modtrezorcrypto/modtrezorcrypto-aesgcm.h
class aesgcm:
"""
AES-GCM context.
"""
def __init__(self, key: bytes, iv: bytes) -> None:
"""
Initialize the AES-GCM context for encryption or decryption.
"""
def reset(self, iv: bytes) -> None:
"""
Reset the IV for encryption or decryption.
"""
def encrypt(self, data: bytes) -> bytes:
"""
Encrypt data chunk.
"""
def decrypt(self, data: bytes) -> bytes:
"""
Decrypt data chunk.
"""
def auth(self, data: bytes) -> None:
"""
Include authenticated data chunk in the GCM authentication tag. This can
be called repeatedly to add authenticated data at any point before
finish().
"""
def finish(self) -> bytes:
"""
Compute GCM authentication tag.
"""
# extmod/modtrezorcrypto/modtrezorcrypto-blake256.h
class blake256:
"""

@ -9,6 +9,11 @@ from trezorcrypto import ( # noqa: F401
random,
)
try:
from trezorcrypto import aesgcm # noqa: F401
except Exception:
pass
from trezor import utils
if not utils.BITCOIN_ONLY:

Loading…
Cancel
Save