mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-12-18 20:38:10 +00:00
feat(core): Add aesgcm class to trezor.crypto Python module.
[no changelog]
This commit is contained in:
parent
f1b5617652
commit
703ea32ceb
@ -19,6 +19,7 @@ FEATURE_FLAGS = {
|
|||||||
"RDI": True,
|
"RDI": True,
|
||||||
"SECP256K1_ZKP": True, # required for trezor.crypto.curve.bip340 (BIP340/Taproot)
|
"SECP256K1_ZKP": True, # required for trezor.crypto.curve.bip340 (BIP340/Taproot)
|
||||||
"SYSTEM_VIEW": False,
|
"SYSTEM_VIEW": False,
|
||||||
|
"AES_GCM": False,
|
||||||
}
|
}
|
||||||
|
|
||||||
FEATURES_WANTED = ["input", "sbu", "sd_card", "rgb_led", "dma2d", "consumption_mask", "usb" ,"optiga", "haptic"]
|
FEATURES_WANTED = ["input", "sbu", "sd_card", "rgb_led", "dma2d", "consumption_mask", "usb" ,"optiga", "haptic"]
|
||||||
@ -177,6 +178,17 @@ if FEATURE_FLAGS["SECP256K1_ZKP"]:
|
|||||||
'vendor/trezor-crypto/zkp_bip340.c',
|
'vendor/trezor-crypto/zkp_bip340.c',
|
||||||
]
|
]
|
||||||
|
|
||||||
|
# AES-GCM
|
||||||
|
if FEATURE_FLAGS["AES_GCM"]:
|
||||||
|
CPPDEFINES_MOD += [
|
||||||
|
'USE_AES_GCM',
|
||||||
|
'AES_VAR',
|
||||||
|
]
|
||||||
|
SOURCE_MOD += [
|
||||||
|
'vendor/trezor-crypto/aes/gf128mul.c',
|
||||||
|
'vendor/trezor-crypto/aes/aesgcm.c',
|
||||||
|
]
|
||||||
|
|
||||||
# modtrezorio
|
# modtrezorio
|
||||||
SOURCE_MOD += [
|
SOURCE_MOD += [
|
||||||
'embed/extmod/modtrezorio/modtrezorio.c',
|
'embed/extmod/modtrezorio/modtrezorio.c',
|
||||||
|
@ -24,6 +24,7 @@ if TREZOR_MODEL in ('DISC1', 'DISC2'):
|
|||||||
|
|
||||||
FEATURE_FLAGS = {
|
FEATURE_FLAGS = {
|
||||||
"SECP256K1_ZKP": True, # required for trezor.crypto.curve.bip340 (BIP340/Taproot)
|
"SECP256K1_ZKP": True, # required for trezor.crypto.curve.bip340 (BIP340/Taproot)
|
||||||
|
"AES_GCM": True,
|
||||||
}
|
}
|
||||||
|
|
||||||
CCFLAGS_MOD = ''
|
CCFLAGS_MOD = ''
|
||||||
@ -174,6 +175,17 @@ if FEATURE_FLAGS["SECP256K1_ZKP"]:
|
|||||||
'vendor/trezor-crypto/zkp_bip340.c',
|
'vendor/trezor-crypto/zkp_bip340.c',
|
||||||
]
|
]
|
||||||
|
|
||||||
|
# AES-GCM
|
||||||
|
if FEATURE_FLAGS["AES_GCM"]:
|
||||||
|
CPPDEFINES_MOD += [
|
||||||
|
'USE_AES_GCM',
|
||||||
|
'AES_VAR',
|
||||||
|
]
|
||||||
|
SOURCE_MOD += [
|
||||||
|
'vendor/trezor-crypto/aes/gf128mul.c',
|
||||||
|
'vendor/trezor-crypto/aes/aesgcm.c',
|
||||||
|
]
|
||||||
|
|
||||||
# modtrezorio
|
# modtrezorio
|
||||||
SOURCE_MOD += [
|
SOURCE_MOD += [
|
||||||
'embed/extmod/modtrezorio/modtrezorio.c',
|
'embed/extmod/modtrezorio/modtrezorio.c',
|
||||||
|
213
core/embed/extmod/modtrezorcrypto/modtrezorcrypto-aesgcm.h
Normal file
213
core/embed/extmod/modtrezorcrypto/modtrezorcrypto-aesgcm.h
Normal file
@ -0,0 +1,213 @@
|
|||||||
|
/*
|
||||||
|
* This file is part of the Trezor project, https://trezor.io/
|
||||||
|
*
|
||||||
|
* Copyright (c) SatoshiLabs
|
||||||
|
*
|
||||||
|
* This program is free software: you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License as published by
|
||||||
|
* the Free Software Foundation, either version 3 of the License, or
|
||||||
|
* (at your option) any later version.
|
||||||
|
*
|
||||||
|
* This program is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
* GNU General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU General Public License
|
||||||
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "py/objstr.h"
|
||||||
|
|
||||||
|
#include "aes/aesgcm.h"
|
||||||
|
#include "memzero.h"
|
||||||
|
|
||||||
|
/// package: trezorcrypto.__init__
|
||||||
|
|
||||||
|
/// class aesgcm:
|
||||||
|
/// """
|
||||||
|
/// AES-GCM context.
|
||||||
|
/// """
|
||||||
|
typedef struct _mp_obj_AesGcm_t {
|
||||||
|
mp_obj_base_t base;
|
||||||
|
gcm_ctx ctx;
|
||||||
|
enum {
|
||||||
|
STATE_INIT,
|
||||||
|
STATE_ENCRYPTING,
|
||||||
|
STATE_DECRYPTING,
|
||||||
|
STATE_FINISHED,
|
||||||
|
STATE_FAILED,
|
||||||
|
} state;
|
||||||
|
} mp_obj_AesGcm_t;
|
||||||
|
|
||||||
|
/// def __init__(self, key: bytes, iv: bytes) -> None:
|
||||||
|
/// """
|
||||||
|
/// Initialize the AES-GCM context for encryption or decryption.
|
||||||
|
/// """
|
||||||
|
STATIC mp_obj_t mod_trezorcrypto_AesGcm_make_new(const mp_obj_type_t *type,
|
||||||
|
size_t n_args, size_t n_kw,
|
||||||
|
const mp_obj_t *args) {
|
||||||
|
mp_arg_check_num(n_args, n_kw, 2, 2, false);
|
||||||
|
mp_buffer_info_t key = {0}, iv = {0};
|
||||||
|
mp_get_buffer_raise(args[0], &key, MP_BUFFER_READ);
|
||||||
|
mp_get_buffer_raise(args[1], &iv, MP_BUFFER_READ);
|
||||||
|
if (key.len != 16 && key.len != 24 && key.len != 32) {
|
||||||
|
mp_raise_ValueError(
|
||||||
|
"Invalid length of key (has to be 128, 192 or 256 bits)");
|
||||||
|
}
|
||||||
|
|
||||||
|
mp_obj_AesGcm_t *o = m_new_obj_with_finaliser(mp_obj_AesGcm_t);
|
||||||
|
o->base.type = type;
|
||||||
|
o->state = STATE_INIT;
|
||||||
|
if (gcm_init_and_key(key.buf, key.len, &(o->ctx)) != RETURN_GOOD ||
|
||||||
|
gcm_init_message(iv.buf, iv.len, &(o->ctx)) != RETURN_GOOD) {
|
||||||
|
m_del_obj(mp_obj_AesGcm_t, o);
|
||||||
|
mp_raise_type(&mp_type_RuntimeError);
|
||||||
|
}
|
||||||
|
return MP_OBJ_FROM_PTR(o);
|
||||||
|
}
|
||||||
|
|
||||||
|
/// def reset(self, iv: bytes) -> None:
|
||||||
|
/// """
|
||||||
|
/// Reset the IV for encryption or decryption.
|
||||||
|
/// """
|
||||||
|
STATIC mp_obj_t mod_trezorcrypto_AesGcm_reset(mp_obj_t self, mp_obj_t iv) {
|
||||||
|
mp_obj_AesGcm_t *o = MP_OBJ_TO_PTR(self);
|
||||||
|
mp_buffer_info_t in = {0};
|
||||||
|
mp_get_buffer_raise(iv, &in, MP_BUFFER_READ);
|
||||||
|
if (gcm_init_message(in.buf, in.len, &(o->ctx)) != RETURN_GOOD) {
|
||||||
|
o->state = STATE_FAILED;
|
||||||
|
mp_raise_type(&mp_type_RuntimeError);
|
||||||
|
}
|
||||||
|
o->state = STATE_INIT;
|
||||||
|
return mp_const_none;
|
||||||
|
}
|
||||||
|
STATIC MP_DEFINE_CONST_FUN_OBJ_2(mod_trezorcrypto_AesGcm_reset_obj,
|
||||||
|
mod_trezorcrypto_AesGcm_reset);
|
||||||
|
|
||||||
|
/// def encrypt(self, data: bytes) -> bytes:
|
||||||
|
/// """
|
||||||
|
/// Encrypt data chunk.
|
||||||
|
/// """
|
||||||
|
STATIC mp_obj_t mod_trezorcrypto_AesGcm_encrypt(mp_obj_t self, mp_obj_t data) {
|
||||||
|
mp_obj_AesGcm_t *o = MP_OBJ_TO_PTR(self);
|
||||||
|
if (o->state != STATE_INIT && o->state != STATE_ENCRYPTING) {
|
||||||
|
mp_raise_msg(&mp_type_RuntimeError, "Invalid state.");
|
||||||
|
}
|
||||||
|
o->state = STATE_ENCRYPTING;
|
||||||
|
mp_buffer_info_t in = {0};
|
||||||
|
mp_get_buffer_raise(data, &in, MP_BUFFER_READ);
|
||||||
|
vstr_t vstr = {0};
|
||||||
|
vstr_init_len(&vstr, in.len);
|
||||||
|
memcpy(vstr.buf, in.buf, in.len);
|
||||||
|
if (gcm_encrypt((unsigned char *)vstr.buf, in.len, &(o->ctx)) !=
|
||||||
|
RETURN_GOOD) {
|
||||||
|
o->state = STATE_FAILED;
|
||||||
|
mp_raise_type(&mp_type_RuntimeError);
|
||||||
|
}
|
||||||
|
return mp_obj_new_str_from_vstr(&mp_type_bytes, &vstr);
|
||||||
|
}
|
||||||
|
STATIC MP_DEFINE_CONST_FUN_OBJ_2(mod_trezorcrypto_AesGcm_encrypt_obj,
|
||||||
|
mod_trezorcrypto_AesGcm_encrypt);
|
||||||
|
|
||||||
|
/// def decrypt(self, data: bytes) -> bytes:
|
||||||
|
/// """
|
||||||
|
/// Decrypt data chunk.
|
||||||
|
/// """
|
||||||
|
STATIC mp_obj_t mod_trezorcrypto_AesGcm_decrypt(mp_obj_t self, mp_obj_t data) {
|
||||||
|
mp_obj_AesGcm_t *o = MP_OBJ_TO_PTR(self);
|
||||||
|
if (o->state != STATE_INIT && o->state != STATE_DECRYPTING) {
|
||||||
|
mp_raise_msg(&mp_type_RuntimeError, "Invalid state.");
|
||||||
|
}
|
||||||
|
o->state = STATE_DECRYPTING;
|
||||||
|
mp_buffer_info_t in = {0};
|
||||||
|
mp_get_buffer_raise(data, &in, MP_BUFFER_READ);
|
||||||
|
vstr_t vstr = {0};
|
||||||
|
vstr_init_len(&vstr, in.len);
|
||||||
|
memcpy(vstr.buf, in.buf, in.len);
|
||||||
|
if (gcm_decrypt((unsigned char *)vstr.buf, in.len, &(o->ctx)) !=
|
||||||
|
RETURN_GOOD) {
|
||||||
|
o->state = STATE_FAILED;
|
||||||
|
mp_raise_type(&mp_type_RuntimeError);
|
||||||
|
}
|
||||||
|
return mp_obj_new_str_from_vstr(&mp_type_bytes, &vstr);
|
||||||
|
}
|
||||||
|
STATIC MP_DEFINE_CONST_FUN_OBJ_2(mod_trezorcrypto_AesGcm_decrypt_obj,
|
||||||
|
mod_trezorcrypto_AesGcm_decrypt);
|
||||||
|
|
||||||
|
/// def auth(self, data: bytes) -> None:
|
||||||
|
/// """
|
||||||
|
/// Include authenticated data chunk in the GCM authentication tag. This can
|
||||||
|
/// be called repeatedly to add authenticated data at any point before
|
||||||
|
/// finish().
|
||||||
|
/// """
|
||||||
|
STATIC mp_obj_t mod_trezorcrypto_AesGcm_auth(mp_obj_t self, mp_obj_t data) {
|
||||||
|
mp_obj_AesGcm_t *o = MP_OBJ_TO_PTR(self);
|
||||||
|
if (o->state != STATE_INIT && o->state != STATE_ENCRYPTING &&
|
||||||
|
o->state != STATE_DECRYPTING) {
|
||||||
|
mp_raise_msg(&mp_type_RuntimeError, "Invalid state.");
|
||||||
|
}
|
||||||
|
mp_buffer_info_t in = {0};
|
||||||
|
mp_get_buffer_raise(data, &in, MP_BUFFER_READ);
|
||||||
|
if (gcm_auth_header(in.buf, in.len, &(o->ctx)) != RETURN_GOOD) {
|
||||||
|
o->state = STATE_FAILED;
|
||||||
|
mp_raise_type(&mp_type_RuntimeError);
|
||||||
|
}
|
||||||
|
return mp_const_none;
|
||||||
|
}
|
||||||
|
STATIC MP_DEFINE_CONST_FUN_OBJ_2(mod_trezorcrypto_AesGcm_auth_obj,
|
||||||
|
mod_trezorcrypto_AesGcm_auth);
|
||||||
|
|
||||||
|
/// def finish(self) -> bytes:
|
||||||
|
/// """
|
||||||
|
/// Compute GCM authentication tag.
|
||||||
|
/// """
|
||||||
|
STATIC mp_obj_t mod_trezorcrypto_AesGcm_finish(mp_obj_t self) {
|
||||||
|
mp_obj_AesGcm_t *o = MP_OBJ_TO_PTR(self);
|
||||||
|
if (o->state != STATE_INIT && o->state != STATE_ENCRYPTING &&
|
||||||
|
o->state != STATE_DECRYPTING) {
|
||||||
|
mp_raise_msg(&mp_type_RuntimeError, "Invalid state.");
|
||||||
|
}
|
||||||
|
o->state = STATE_FINISHED;
|
||||||
|
vstr_t tag = {0};
|
||||||
|
vstr_init_len(&tag, 16);
|
||||||
|
if (gcm_compute_tag((unsigned char *)tag.buf, tag.len, &(o->ctx)) !=
|
||||||
|
RETURN_GOOD) {
|
||||||
|
o->state = STATE_FAILED;
|
||||||
|
mp_raise_type(&mp_type_RuntimeError);
|
||||||
|
}
|
||||||
|
return mp_obj_new_str_from_vstr(&mp_type_bytes, &tag);
|
||||||
|
}
|
||||||
|
STATIC MP_DEFINE_CONST_FUN_OBJ_1(mod_trezorcrypto_AesGcm_finish_obj,
|
||||||
|
mod_trezorcrypto_AesGcm_finish);
|
||||||
|
|
||||||
|
STATIC mp_obj_t mod_trezorcrypto_AesGcm___del__(mp_obj_t self) {
|
||||||
|
mp_obj_AesGcm_t *o = MP_OBJ_TO_PTR(self);
|
||||||
|
memzero(&(o->ctx), sizeof(gcm_ctx));
|
||||||
|
return mp_const_none;
|
||||||
|
}
|
||||||
|
STATIC MP_DEFINE_CONST_FUN_OBJ_1(mod_trezorcrypto_AesGcm___del___obj,
|
||||||
|
mod_trezorcrypto_AesGcm___del__);
|
||||||
|
|
||||||
|
STATIC const mp_rom_map_elem_t mod_trezorcrypto_AesGcm_locals_dict_table[] = {
|
||||||
|
{MP_ROM_QSTR(MP_QSTR_reset),
|
||||||
|
MP_ROM_PTR(&mod_trezorcrypto_AesGcm_reset_obj)},
|
||||||
|
{MP_ROM_QSTR(MP_QSTR_encrypt),
|
||||||
|
MP_ROM_PTR(&mod_trezorcrypto_AesGcm_encrypt_obj)},
|
||||||
|
{MP_ROM_QSTR(MP_QSTR_decrypt),
|
||||||
|
MP_ROM_PTR(&mod_trezorcrypto_AesGcm_decrypt_obj)},
|
||||||
|
{MP_ROM_QSTR(MP_QSTR_auth), MP_ROM_PTR(&mod_trezorcrypto_AesGcm_auth_obj)},
|
||||||
|
{MP_ROM_QSTR(MP_QSTR_finish),
|
||||||
|
MP_ROM_PTR(&mod_trezorcrypto_AesGcm_finish_obj)},
|
||||||
|
{MP_ROM_QSTR(MP_QSTR___del__),
|
||||||
|
MP_ROM_PTR(&mod_trezorcrypto_AesGcm___del___obj)},
|
||||||
|
};
|
||||||
|
STATIC MP_DEFINE_CONST_DICT(mod_trezorcrypto_AesGcm_locals_dict,
|
||||||
|
mod_trezorcrypto_AesGcm_locals_dict_table);
|
||||||
|
|
||||||
|
STATIC const mp_obj_type_t mod_trezorcrypto_AesGcm_type = {
|
||||||
|
{&mp_type_type},
|
||||||
|
.name = MP_QSTR_AesGcm,
|
||||||
|
.make_new = mod_trezorcrypto_AesGcm_make_new,
|
||||||
|
.locals_dict = (void *)&mod_trezorcrypto_AesGcm_locals_dict,
|
||||||
|
};
|
@ -39,6 +39,9 @@ static void wrapped_ui_wait_callback(uint32_t current, uint32_t total) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
#include "modtrezorcrypto-aes.h"
|
#include "modtrezorcrypto-aes.h"
|
||||||
|
#ifdef USE_AES_GCM
|
||||||
|
#include "modtrezorcrypto-aesgcm.h"
|
||||||
|
#endif
|
||||||
#include "modtrezorcrypto-bech32.h"
|
#include "modtrezorcrypto-bech32.h"
|
||||||
#include "modtrezorcrypto-bip32.h"
|
#include "modtrezorcrypto-bip32.h"
|
||||||
#ifdef USE_SECP256K1_ZKP
|
#ifdef USE_SECP256K1_ZKP
|
||||||
@ -78,6 +81,9 @@ static void wrapped_ui_wait_callback(uint32_t current, uint32_t total) {
|
|||||||
STATIC const mp_rom_map_elem_t mp_module_trezorcrypto_globals_table[] = {
|
STATIC const mp_rom_map_elem_t mp_module_trezorcrypto_globals_table[] = {
|
||||||
{MP_ROM_QSTR(MP_QSTR___name__), MP_ROM_QSTR(MP_QSTR_trezorcrypto)},
|
{MP_ROM_QSTR(MP_QSTR___name__), MP_ROM_QSTR(MP_QSTR_trezorcrypto)},
|
||||||
{MP_ROM_QSTR(MP_QSTR_aes), MP_ROM_PTR(&mod_trezorcrypto_AES_type)},
|
{MP_ROM_QSTR(MP_QSTR_aes), MP_ROM_PTR(&mod_trezorcrypto_AES_type)},
|
||||||
|
#if USE_AES_GCM
|
||||||
|
{MP_ROM_QSTR(MP_QSTR_aesgcm), MP_ROM_PTR(&mod_trezorcrypto_AesGcm_type)},
|
||||||
|
#endif
|
||||||
{MP_ROM_QSTR(MP_QSTR_bech32), MP_ROM_PTR(&mod_trezorcrypto_bech32_module)},
|
{MP_ROM_QSTR(MP_QSTR_bech32), MP_ROM_PTR(&mod_trezorcrypto_bech32_module)},
|
||||||
{MP_ROM_QSTR(MP_QSTR_bip32), MP_ROM_PTR(&mod_trezorcrypto_bip32_module)},
|
{MP_ROM_QSTR(MP_QSTR_bip32), MP_ROM_PTR(&mod_trezorcrypto_bip32_module)},
|
||||||
{MP_ROM_QSTR(MP_QSTR_bip39), MP_ROM_PTR(&mod_trezorcrypto_bip39_module)},
|
{MP_ROM_QSTR(MP_QSTR_bip39), MP_ROM_PTR(&mod_trezorcrypto_bip39_module)},
|
||||||
|
@ -33,6 +33,45 @@ class aes:
|
|||||||
"""
|
"""
|
||||||
|
|
||||||
|
|
||||||
|
# extmod/modtrezorcrypto/modtrezorcrypto-aesgcm.h
|
||||||
|
class aesgcm:
|
||||||
|
"""
|
||||||
|
AES-GCM context.
|
||||||
|
"""
|
||||||
|
|
||||||
|
def __init__(self, key: bytes, iv: bytes) -> None:
|
||||||
|
"""
|
||||||
|
Initialize the AES-GCM context for encryption or decryption.
|
||||||
|
"""
|
||||||
|
|
||||||
|
def reset(self, iv: bytes) -> None:
|
||||||
|
"""
|
||||||
|
Reset the IV for encryption or decryption.
|
||||||
|
"""
|
||||||
|
|
||||||
|
def encrypt(self, data: bytes) -> bytes:
|
||||||
|
"""
|
||||||
|
Encrypt data chunk.
|
||||||
|
"""
|
||||||
|
|
||||||
|
def decrypt(self, data: bytes) -> bytes:
|
||||||
|
"""
|
||||||
|
Decrypt data chunk.
|
||||||
|
"""
|
||||||
|
|
||||||
|
def auth(self, data: bytes) -> None:
|
||||||
|
"""
|
||||||
|
Include authenticated data chunk in the GCM authentication tag. This can
|
||||||
|
be called repeatedly to add authenticated data at any point before
|
||||||
|
finish().
|
||||||
|
"""
|
||||||
|
|
||||||
|
def finish(self) -> bytes:
|
||||||
|
"""
|
||||||
|
Compute GCM authentication tag.
|
||||||
|
"""
|
||||||
|
|
||||||
|
|
||||||
# extmod/modtrezorcrypto/modtrezorcrypto-blake256.h
|
# extmod/modtrezorcrypto/modtrezorcrypto-blake256.h
|
||||||
class blake256:
|
class blake256:
|
||||||
"""
|
"""
|
||||||
|
@ -9,6 +9,11 @@ from trezorcrypto import ( # noqa: F401
|
|||||||
random,
|
random,
|
||||||
)
|
)
|
||||||
|
|
||||||
|
try:
|
||||||
|
from trezorcrypto import aesgcm # noqa: F401
|
||||||
|
except Exception:
|
||||||
|
pass
|
||||||
|
|
||||||
from trezor import utils
|
from trezor import utils
|
||||||
|
|
||||||
if not utils.BITCOIN_ONLY:
|
if not utils.BITCOIN_ONLY:
|
||||||
|
Loading…
Reference in New Issue
Block a user