diff --git a/core/embed/extmod/modtrezorcrypto/modtrezorcrypto-optiga.h b/core/embed/extmod/modtrezorcrypto/modtrezorcrypto-optiga.h index 44a713879d..2a56e2bde7 100644 --- a/core/embed/extmod/modtrezorcrypto/modtrezorcrypto-optiga.h +++ b/core/embed/extmod/modtrezorcrypto/modtrezorcrypto-optiga.h @@ -90,11 +90,12 @@ STATIC mp_obj_t mod_trezorcrypto_optiga_sign(mp_obj_t key_index, vstr_t sig = {0}; vstr_init_len(&sig, MAX_DER_SIGNATURE_SIZE); size_t sig_size = 0; - int ret = optiga_sign(idx, (const uint8_t *)dig.buf, dig.len, - ((uint8_t *)sig.buf), sig.alloc, &sig_size); - if (ret != 0) { + optiga_sign_result ret = + optiga_sign(idx, (const uint8_t *)dig.buf, dig.len, ((uint8_t *)sig.buf), + sig.alloc, &sig_size); + if (ret != OPTIGA_SIGN_SUCCESS) { vstr_clear(&sig); - if (ret == OPTIGA_ERR_ACCESS_COND_NOT_SAT) { + if (ret == OPTIGA_SIGN_INACCESSIBLE) { mp_raise_msg(&mp_type_SigningInaccessible, "Signing inaccessible."); } else { mp_raise_msg(&mp_type_OptigaError, "Signing failed."); diff --git a/core/embed/trezorhal/optiga.h b/core/embed/trezorhal/optiga.h index 05ff3c8af4..9ae082bbfb 100644 --- a/core/embed/trezorhal/optiga.h +++ b/core/embed/trezorhal/optiga.h @@ -28,16 +28,20 @@ #define OPTIGA_DEVICE_CERT_INDEX 1 #define OPTIGA_DEVICE_ECC_KEY_INDEX 0 -#define OPTIGA_COMMAND_ERROR_OFFSET 0x100 -// Error code 0x07: Access conditions not satisfied -#define OPTIGA_ERR_ACCESS_COND_NOT_SAT (OPTIGA_COMMAND_ERROR_OFFSET + 0x07) +typedef enum _optiga_pin_result { + OPTIGA_PIN_SUCCESS = 0, // The operation completed successfully. + OPTIGA_PIN_INVALID, // The PIN is invalid. + OPTIGA_PIN_COUNTER_EXCEEDED, // The PIN try counter limit was exceeded. + OPTIGA_PIN_ERROR, // Optiga processing or communication error. +} optiga_pin_result; -// Error code 0x0E: Counter threshold limit exceeded -#define OPTIGA_ERR_COUNTER_EXCEEDED (OPTIGA_COMMAND_ERROR_OFFSET + 0x0E) - -// Error code 0x2F: Authorization failure -#define OPTIGA_ERR_AUTH_FAIL (OPTIGA_COMMAND_ERROR_OFFSET + 0x2F) +typedef enum _optiga_sign_result { + OPTIGA_SIGN_SUCCESS = 0, // The operation completed successfully. + OPTIGA_SIGN_INACCESSIBLE, // The signing key is inaccessible. + OPTIGA_SIGN_ERROR, // Invalid parameters or Optiga processing or + // communication error. +} optiga_sign_result; // Size of secrets used in PIN processing, e.g. salted PIN, master secret etc. #define OPTIGA_PIN_SECRET_SIZE 32 @@ -50,9 +54,9 @@ typedef secbool (*OPTIGA_UI_PROGRESS)(uint32_t elapsed_ms); -int __wur optiga_sign(uint8_t index, const uint8_t *digest, size_t digest_size, - uint8_t *signature, size_t max_sig_size, - size_t *sig_size); +optiga_sign_result __wur optiga_sign(uint8_t index, const uint8_t *digest, + size_t digest_size, uint8_t *signature, + size_t max_sig_size, size_t *sig_size); bool __wur optiga_cert_size(uint8_t index, size_t *cert_size); @@ -63,15 +67,17 @@ bool __wur optiga_read_sec(uint8_t *sec); bool __wur optiga_random_buffer(uint8_t *dest, size_t size); -int __wur optiga_pin_set(OPTIGA_UI_PROGRESS ui_progress, - uint8_t stretched_pin[OPTIGA_PIN_SECRET_SIZE]); +bool __wur optiga_pin_set(OPTIGA_UI_PROGRESS ui_progress, + uint8_t stretched_pin[OPTIGA_PIN_SECRET_SIZE]); -int __wur optiga_pin_verify(OPTIGA_UI_PROGRESS ui_progress, - uint8_t stretched_pin[OPTIGA_PIN_SECRET_SIZE]); +optiga_pin_result __wur +optiga_pin_verify(OPTIGA_UI_PROGRESS ui_progress, + uint8_t stretched_pin[OPTIGA_PIN_SECRET_SIZE]); -int __wur optiga_pin_verify_v4(OPTIGA_UI_PROGRESS ui_progress, - const uint8_t pin_secret[OPTIGA_PIN_SECRET_SIZE], - uint8_t out_secret[OPTIGA_PIN_SECRET_SIZE]); +optiga_pin_result __wur +optiga_pin_verify_v4(OPTIGA_UI_PROGRESS ui_progress, + const uint8_t pin_secret[OPTIGA_PIN_SECRET_SIZE], + uint8_t out_secret[OPTIGA_PIN_SECRET_SIZE]); int __wur optiga_pin_get_fails_v4(uint32_t *ctr); diff --git a/core/embed/trezorhal/optiga/optiga.c b/core/embed/trezorhal/optiga/optiga.c index 0008ee4c92..0cf61ebb0d 100644 --- a/core/embed/trezorhal/optiga/optiga.c +++ b/core/embed/trezorhal/optiga/optiga.c @@ -89,34 +89,36 @@ static const optiga_metadata_item ACCESS_PIN_HMAC_CTR = // Size of the CMAC/HMAC prefix returned by Optiga. #define ENCRYPT_SYM_PREFIX_SIZE 3 -int optiga_sign(uint8_t index, const uint8_t *digest, size_t digest_size, - uint8_t *signature, size_t max_sig_size, size_t *sig_size) { +optiga_sign_result optiga_sign(uint8_t index, const uint8_t *digest, + size_t digest_size, uint8_t *signature, + size_t max_sig_size, size_t *sig_size) { if (index >= OPTIGA_ECC_KEY_COUNT) { - return OPTIGA_ERR_PARAM; + return OPTIGA_SIGN_ERROR; } - optiga_result ret = + optiga_result res = optiga_calc_sign(OPTIGA_OID_ECC_KEY + index, digest, digest_size, &signature[2], max_sig_size - 2, sig_size); - if (ret == OPTIGA_ERR_CMD) { + if (res != OPTIGA_SUCCESS) { uint8_t error_code = 0; - (void)optiga_get_error_code(&error_code); - return error_code + OPTIGA_COMMAND_ERROR_OFFSET; - } - - if (ret != OPTIGA_SUCCESS) { - return ret; + if (res == OPTIGA_ERR_CMD && + optiga_get_error_code(&error_code) == OPTIGA_SUCCESS && + error_code == OPTIGA_ERR_CODE_ACCESS_COND) { + return OPTIGA_SIGN_INACCESSIBLE; + } else { + return OPTIGA_SIGN_ERROR; + } } // Add sequence tag and length. if (*sig_size >= 0x80) { // Length not supported. - return OPTIGA_ERR_SIZE; + return OPTIGA_SIGN_ERROR; } signature[0] = 0x30; signature[1] = *sig_size; *sig_size += 2; - return OPTIGA_SUCCESS; + return OPTIGA_SIGN_SUCCESS; } bool optiga_cert_size(uint8_t index, size_t *cert_size) { @@ -188,28 +190,24 @@ bool optiga_random_buffer(uint8_t *dest, size_t size) { static bool read_metadata(uint16_t oid, optiga_metadata *metadata) { static uint8_t serialized[OPTIGA_MAX_METADATA_SIZE] = {0}; size_t size = 0; - optiga_result ret = - optiga_get_data_object(oid, true, serialized, sizeof(serialized), &size); - if (OPTIGA_SUCCESS != ret) { + if (optiga_get_data_object(oid, true, serialized, sizeof(serialized), + &size) != OPTIGA_SUCCESS) { return false; } - ret = optiga_parse_metadata(serialized, size, metadata); - return OPTIGA_SUCCESS == ret; + return optiga_parse_metadata(serialized, size, metadata) == OPTIGA_SUCCESS; } static bool write_metadata(uint16_t oid, const optiga_metadata *metadata) { uint8_t serialized[OPTIGA_MAX_METADATA_SIZE] = {0}; size_t size = 0; - optiga_result ret = optiga_serialize_metadata(metadata, serialized, - sizeof(serialized), &size); - if (OPTIGA_SUCCESS != ret) { + if (optiga_serialize_metadata(metadata, serialized, sizeof(serialized), + &size) != OPTIGA_SUCCESS) { return false; } - ret = optiga_set_data_object(oid, true, serialized, size); - return OPTIGA_SUCCESS == ret; + return optiga_set_data_object(oid, true, serialized, size) == OPTIGA_SUCCESS; } bool optiga_set_metadata(uint16_t oid, const optiga_metadata *metadata) { @@ -353,28 +351,22 @@ static bool optiga_pin_init_metadata(void) { return true; } -static int optiga_pin_init_stretch(void) { +static bool optiga_pin_init_stretch(void) { // Generate a new key in OID_PIN_CMAC. - optiga_result res = - optiga_gen_sym_key(OPTIGA_AES_256, OPTIGA_KEY_USAGE_ENC, OID_PIN_CMAC); - if (res != OPTIGA_SUCCESS) { - return res; + if (optiga_gen_sym_key(OPTIGA_AES_256, OPTIGA_KEY_USAGE_ENC, OID_PIN_CMAC) != + OPTIGA_SUCCESS) { + return false; } // Generate a new key in OID_PIN_ECDH. uint8_t public_key[6 + 65] = {0}; size_t size = 0; - res = - optiga_gen_key_pair(OPTIGA_CURVE_P256, OPTIGA_KEY_USAGE_KEYAGREE, - OID_PIN_ECDH, public_key, sizeof(public_key), &size); - if (res != OPTIGA_SUCCESS) { - return res; - } - - return OPTIGA_SUCCESS; + return optiga_gen_key_pair(OPTIGA_CURVE_P256, OPTIGA_KEY_USAGE_KEYAGREE, + OID_PIN_ECDH, public_key, sizeof(public_key), + &size) == OPTIGA_SUCCESS; } -static int optiga_pin_stretch_common( +static bool optiga_pin_stretch_common( OPTIGA_UI_PROGRESS ui_progress, HMAC_SHA256_CTX *ctx, const uint8_t input[OPTIGA_PIN_SECRET_SIZE], bool version4) { // Implements the functionality that is common to @@ -383,26 +375,25 @@ static int optiga_pin_stretch_common( uint8_t buffer[ENCRYPT_SYM_PREFIX_SIZE + OPTIGA_PIN_SECRET_SIZE] = {0}; size_t size = 0; + bool ret = true; // Combine intermediate result with OID_PIN_CMAC. - optiga_result res = - optiga_encrypt_sym(OPTIGA_SYM_MODE_CMAC, OID_PIN_CMAC, input, - OPTIGA_PIN_SECRET_SIZE, buffer, sizeof(buffer), &size); - if (res != OPTIGA_SUCCESS) { - memzero(buffer, sizeof(buffer)); - return res; + if (optiga_encrypt_sym(OPTIGA_SYM_MODE_CMAC, OID_PIN_CMAC, input, + OPTIGA_PIN_SECRET_SIZE, buffer, sizeof(buffer), + &size) != OPTIGA_SUCCESS) { + ret = false; + goto end; } hmac_sha256_Update(ctx, buffer, size); if (version4) { // Combine intermediate result with OID_PIN_HMAC - res = optiga_encrypt_sym(OPTIGA_SYM_MODE_HMAC_SHA256, OID_PIN_HMAC_V4, - input, OPTIGA_PIN_SECRET_SIZE, buffer, - sizeof(buffer), &size); - if (res != OPTIGA_SUCCESS) { - memzero(buffer, sizeof(buffer)); - return res; + if (optiga_encrypt_sym(OPTIGA_SYM_MODE_HMAC_SHA256, OID_PIN_HMAC_V4, input, + OPTIGA_PIN_SECRET_SIZE, buffer, sizeof(buffer), + &size) != OPTIGA_SUCCESS) { + ret = false; + goto end; } hmac_sha256_Update(ctx, buffer, size); @@ -411,25 +402,28 @@ static int optiga_pin_stretch_common( // Combine intermediate result with OID_PIN_ECDH uint8_t encoded_point[BIT_STRING_HEADER_SIZE + 65] = {0x03, 0x42, 0x00}; if (!hash_to_curve_optiga(input, &encoded_point[BIT_STRING_HEADER_SIZE])) { - memzero(buffer, sizeof(buffer)); - return -1; + ret = false; + goto end; } - res = optiga_calc_ssec(OPTIGA_CURVE_P256, OID_PIN_ECDH, encoded_point, - sizeof(encoded_point), buffer, sizeof(buffer), &size); - memzero(encoded_point, sizeof(encoded_point)); - if (res != OPTIGA_SUCCESS) { - memzero(buffer, sizeof(buffer)); - return res; + + if (optiga_calc_ssec(OPTIGA_CURVE_P256, OID_PIN_ECDH, encoded_point, + sizeof(encoded_point), buffer, sizeof(buffer), + &size) != OPTIGA_SUCCESS) { + ret = false; + goto end; } ui_progress(250); hmac_sha256_Update(ctx, buffer, size); + +end: + memzero(encoded_point, sizeof(encoded_point)); memzero(buffer, sizeof(buffer)); - return OPTIGA_SUCCESS; + return ret; } -static int optiga_pin_stretch_secret_v4( +static bool optiga_pin_stretch_secret_v4( OPTIGA_UI_PROGRESS ui_progress, uint8_t secret[OPTIGA_PIN_SECRET_SIZE]) { // Legacy PIN verification method used in storage versions 3 and 4. @@ -451,19 +445,16 @@ static int optiga_pin_stretch_secret_v4( HMAC_SHA256_CTX ctx = {0}; hmac_sha256_Init(&ctx, secret, OPTIGA_PIN_SECRET_SIZE); - optiga_result res = - optiga_pin_stretch_common(ui_progress, &ctx, secret, true); - if (res != OPTIGA_SUCCESS) { - memzero(&ctx, sizeof(ctx)); - return res; + bool ret = optiga_pin_stretch_common(ui_progress, &ctx, secret, true); + if (ret) { + hmac_sha256_Final(&ctx, secret); } - hmac_sha256_Final(&ctx, secret); memzero(&ctx, sizeof(ctx)); - return OPTIGA_SUCCESS; + return ret; } -static int optiga_pin_stretch_cmac_ecdh( +static bool optiga_pin_stretch_cmac_ecdh( OPTIGA_UI_PROGRESS ui_progress, uint8_t stretched_pin[OPTIGA_PIN_SECRET_SIZE]) { // This step hardens the PIN verification process in case an attacker is able @@ -483,6 +474,7 @@ static int optiga_pin_stretch_cmac_ecdh( // ecdh_out = ECDH(OID_PIN_ECDH, digest) // stretched_pin = HMAC-SHA256(stretched_pin, cmac_out || ecdh_out) + bool ret = true; uint8_t digest[OPTIGA_PIN_SECRET_SIZE] = {0}; HMAC_SHA256_CTX ctx = {0}; for (int i = 0; i < PIN_STRETCH_ITERATIONS; ++i) { @@ -493,32 +485,25 @@ static int optiga_pin_stretch_cmac_ecdh( hmac_sha256(stretched_pin, OPTIGA_PIN_SECRET_SIZE, NULL, 0, digest); hmac_sha256_Init(&ctx, stretched_pin, OPTIGA_PIN_SECRET_SIZE); - optiga_result res = - optiga_pin_stretch_common(ui_progress, &ctx, digest, false); - if (res != OPTIGA_SUCCESS) { - memzero(digest, sizeof(digest)); - memzero(&ctx, sizeof(ctx)); - return res; + if (!optiga_pin_stretch_common(ui_progress, &ctx, digest, false)) { + ret = false; + goto end; } hmac_sha256_Final(&ctx, stretched_pin); } +end: memzero(digest, sizeof(digest)); memzero(&ctx, sizeof(ctx)); - return OPTIGA_SUCCESS; + return ret; } -int optiga_pin_set(OPTIGA_UI_PROGRESS ui_progress, - uint8_t stretched_pin[OPTIGA_PIN_SECRET_SIZE]) { - int res = OPTIGA_SUCCESS; - if (!optiga_pin_init_metadata()) { - res = -1; - goto end; - } - - res = optiga_pin_init_stretch(); - if (res != OPTIGA_SUCCESS) { +bool optiga_pin_set(OPTIGA_UI_PROGRESS ui_progress, + uint8_t stretched_pin[OPTIGA_PIN_SECRET_SIZE]) { + bool ret = true; + if (!optiga_pin_init_metadata() || !optiga_pin_init_stretch()) { + ret = false; goto end; } @@ -528,38 +513,38 @@ int optiga_pin_set(OPTIGA_UI_PROGRESS ui_progress, // ensures that if an attacker extracts the value of OID_STRETCHED_PIN or // OID_PIN_SECRET, then it cannot be used to conduct an offline brute-force // search for the PIN. - res = optiga_pin_stretch_cmac_ecdh(ui_progress, stretched_pin); - if (res != OPTIGA_SUCCESS) { + if (!optiga_pin_stretch_cmac_ecdh(ui_progress, stretched_pin)) { + ret = false; goto end; } // Generate and store the counter-protected PIN secret. uint8_t pin_secret[OPTIGA_PIN_SECRET_SIZE] = {0}; - res = optiga_get_random(pin_secret, sizeof(pin_secret)); - if (res != OPTIGA_SUCCESS) { + if (optiga_get_random(pin_secret, sizeof(pin_secret)) != OPTIGA_SUCCESS) { + ret = false; goto end; } random_xor(pin_secret, sizeof(pin_secret)); - res = optiga_set_data_object(OID_PIN_SECRET, false, pin_secret, - sizeof(pin_secret)); - if (res != OPTIGA_SUCCESS) { + if (optiga_set_data_object(OID_PIN_SECRET, false, pin_secret, + sizeof(pin_secret)) != OPTIGA_SUCCESS) { + ret = false; goto end; } // Generate the key for the HMAC-SHA256 PIN stretching step. uint8_t pin_hmac[OPTIGA_PIN_SECRET_SIZE] = {0}; - res = optiga_get_random(pin_hmac, sizeof(pin_hmac)); - if (res != OPTIGA_SUCCESS) { + if (optiga_get_random(pin_hmac, sizeof(pin_hmac)) != OPTIGA_SUCCESS) { + ret = false; goto end; } random_xor(pin_hmac, sizeof(pin_hmac)); // Authorise using OID_PIN_SECRET so that we can write to OID_STRETCHED_PIN // and OID_STRETCHED_PIN_CTR. - res = optiga_set_auto_state(OPTIGA_OID_SESSION_CTX, OID_PIN_SECRET, - pin_secret, sizeof(pin_secret)); - if (res != OPTIGA_SUCCESS) { + if (optiga_set_auto_state(OPTIGA_OID_SESSION_CTX, OID_PIN_SECRET, pin_secret, + sizeof(pin_secret)) != OPTIGA_SUCCESS) { + ret = false; goto end; } @@ -587,17 +572,17 @@ int optiga_pin_set(OPTIGA_UI_PROGRESS ui_progress, hmac_sha256(stretched_pin, OPTIGA_PIN_SECRET_SIZE, NULL, 0, digest); // Store the digest of the stretched PIN in OID_STRETCHED_PIN. - res = - optiga_set_data_object(OID_STRETCHED_PIN, false, digest, sizeof(digest)); - if (res != OPTIGA_SUCCESS) { + if (optiga_set_data_object(OID_STRETCHED_PIN, false, digest, + sizeof(digest)) != OPTIGA_SUCCESS) { + ret = false; goto end; } // Initialize the counter which limits the guesses at OID_STRETCHED_PIN so // that we can authorise using OID_STRETCHED_PIN. - res = optiga_set_data_object(OID_STRETCHED_PIN_CTR, false, COUNTER_RESET, - sizeof(COUNTER_RESET)); - if (res != OPTIGA_SUCCESS) { + if (optiga_set_data_object(OID_STRETCHED_PIN_CTR, false, COUNTER_RESET, + sizeof(COUNTER_RESET)) != OPTIGA_SUCCESS) { + ret = false; goto end; } @@ -605,31 +590,31 @@ int optiga_pin_set(OPTIGA_UI_PROGRESS ui_progress, // Authorise using OID_STRETCHED_PIN so that we can write to OID_PIN_HMAC and // OID_PIN_HMAC_CTR. - res = optiga_set_auto_state(OPTIGA_OID_SESSION_CTX, OID_STRETCHED_PIN, digest, - sizeof(digest)); - if (res != OPTIGA_SUCCESS) { + if (optiga_set_auto_state(OPTIGA_OID_SESSION_CTX, OID_STRETCHED_PIN, digest, + sizeof(digest)) != OPTIGA_SUCCESS) { + ret = false; goto end; } // Initialize the key for HMAC-SHA256 PIN stretching. - res = optiga_set_data_object(OID_PIN_HMAC, false, pin_hmac, sizeof(pin_hmac)); - if (res != OPTIGA_SUCCESS) { + if (optiga_set_data_object(OID_PIN_HMAC, false, pin_hmac, sizeof(pin_hmac)) != + OPTIGA_SUCCESS) { + ret = false; goto end; } // Initialize the counter which limits the guesses at OID_STRETCHED_PIN again, // since we just depleted one attempt. - res = optiga_set_data_object(OID_STRETCHED_PIN_CTR, false, COUNTER_RESET, - sizeof(COUNTER_RESET)); - optiga_clear_auto_state(OID_PIN_SECRET); - if (res != OPTIGA_SUCCESS) { + if (optiga_set_data_object(OID_STRETCHED_PIN_CTR, false, COUNTER_RESET, + sizeof(COUNTER_RESET)) != OPTIGA_SUCCESS) { + ret = false; goto end; } // Initialize the PIN counter which limits the use of OID_PIN_HMAC. - res = optiga_set_data_object(OID_PIN_HMAC_CTR, false, COUNTER_RESET, - sizeof(COUNTER_RESET)); - if (res != OPTIGA_SUCCESS) { + if (optiga_set_data_object(OID_PIN_HMAC_CTR, false, COUNTER_RESET, + sizeof(COUNTER_RESET)) != OPTIGA_SUCCESS) { + ret = false; goto end; } @@ -642,9 +627,6 @@ int optiga_pin_set(OPTIGA_UI_PROGRESS ui_progress, // integrated into the device in the first place. hmac_sha256(stretched_pin, OPTIGA_PIN_SECRET_SIZE, pin_secret, sizeof(pin_secret), stretched_pin); - if (res != OPTIGA_SUCCESS) { - goto end; - } end: memzero(hmac_buffer, sizeof(hmac_buffer)); @@ -653,60 +635,69 @@ end: memzero(digest, sizeof(digest)); optiga_clear_auto_state(OID_PIN_SECRET); optiga_clear_auto_state(OID_STRETCHED_PIN); - return res; + return ret; } -int optiga_pin_verify_v4(OPTIGA_UI_PROGRESS ui_progress, - const uint8_t pin_secret[OPTIGA_PIN_SECRET_SIZE], - uint8_t out_secret[OPTIGA_PIN_SECRET_SIZE]) { +optiga_pin_result optiga_pin_verify_v4( + OPTIGA_UI_PROGRESS ui_progress, + const uint8_t pin_secret[OPTIGA_PIN_SECRET_SIZE], + uint8_t out_secret[OPTIGA_PIN_SECRET_SIZE]) { // Legacy PIN verification method used in storage version 3 and 4. + optiga_pin_result ret = OPTIGA_PIN_SUCCESS; + // Process the PIN-derived secret using a one-way function before sending it // to the Optiga. uint8_t stretched_pin[OPTIGA_PIN_SECRET_SIZE] = {0}; hmac_sha256(pin_secret, OPTIGA_PIN_SECRET_SIZE, NULL, 0, stretched_pin); // Combine the result with stretching secrets from the Optiga. - optiga_result res = optiga_pin_stretch_secret_v4(ui_progress, stretched_pin); - if (res != OPTIGA_SUCCESS) { - memzero(stretched_pin, sizeof(stretched_pin)); - return res; + if (!optiga_pin_stretch_secret_v4(ui_progress, stretched_pin)) { + ret = OPTIGA_PIN_ERROR; + goto end; } // Authorise using OID_STRETCHED_PIN so that we can read from OID_PIN_SECRET. - res = optiga_set_auto_state(OPTIGA_OID_SESSION_CTX, OID_STRETCHED_PIN, - stretched_pin, sizeof(stretched_pin)); - memzero(stretched_pin, sizeof(stretched_pin)); - if (res == OPTIGA_ERR_CMD) { - uint8_t error_code = 0; - (void)optiga_get_error_code(&error_code); - return error_code + OPTIGA_COMMAND_ERROR_OFFSET; - } - + optiga_result res = + optiga_set_auto_state(OPTIGA_OID_SESSION_CTX, OID_STRETCHED_PIN, + stretched_pin, sizeof(stretched_pin)); if (res != OPTIGA_SUCCESS) { - return res; + uint8_t error_code = 0; + if (res != OPTIGA_ERR_CMD || + optiga_get_error_code(&error_code) != OPTIGA_SUCCESS) { + ret = OPTIGA_PIN_ERROR; + goto end; + } + + switch (error_code) { + case OPTIGA_ERR_CODE_CTR_LIMIT: + ret = OPTIGA_PIN_COUNTER_EXCEEDED; + break; + case OPTIGA_ERR_CODE_AUTH_FAIL: + ret = OPTIGA_PIN_INVALID; + break; + default: + ret = OPTIGA_PIN_ERROR; + } + goto end; } // Read the master secret from OID_PIN_SECRET. size_t size = 0; - res = optiga_get_data_object(OID_PIN_SECRET, false, out_secret, - OPTIGA_PIN_SECRET_SIZE, &size); - optiga_clear_auto_state(OID_STRETCHED_PIN); - if (res != OPTIGA_SUCCESS) { - return res; - } - - if (size != OPTIGA_PIN_SECRET_SIZE) { - return OPTIGA_ERR_SIZE; + if (optiga_get_data_object(OID_PIN_SECRET, false, out_secret, + OPTIGA_PIN_SECRET_SIZE, &size) != OPTIGA_SUCCESS || + size != OPTIGA_PIN_SECRET_SIZE) { + ret = OPTIGA_PIN_ERROR; + goto end; } ui_progress(200); // Authorise using OID_PIN_SECRET so that we can write to OID_PIN_COUNTER. - res = optiga_set_auto_state(OPTIGA_OID_SESSION_CTX, OID_PIN_SECRET, - out_secret, OPTIGA_PIN_SECRET_SIZE); - if (res != OPTIGA_SUCCESS) { - return res; + if (optiga_set_auto_state(OPTIGA_OID_SESSION_CTX, OID_PIN_SECRET, out_secret, + OPTIGA_PIN_SECRET_SIZE) != OPTIGA_SUCCESS) { + ret = OPTIGA_PIN_ERROR; + goto end; } ui_progress(200); @@ -715,20 +706,26 @@ int optiga_pin_verify_v4(OPTIGA_UI_PROGRESS ui_progress, // stretching secrets from the Optiga. hmac_sha256(pin_secret, OPTIGA_PIN_SECRET_SIZE, out_secret, OPTIGA_PIN_SECRET_SIZE, out_secret); - res = optiga_pin_stretch_secret_v4(ui_progress, out_secret); - if (res != OPTIGA_SUCCESS) { - return res; + if (!optiga_pin_stretch_secret_v4(ui_progress, out_secret)) { + ret = OPTIGA_PIN_ERROR; + goto end; } // Combine the stretched master secret with the PIN-derived secret to derive // the output secret. hmac_sha256(pin_secret, OPTIGA_PIN_SECRET_SIZE, out_secret, OPTIGA_PIN_SECRET_SIZE, out_secret); - return OPTIGA_SUCCESS; + +end: + memzero(stretched_pin, sizeof(stretched_pin)); + optiga_clear_auto_state(OID_STRETCHED_PIN); + return ret; } -static int optiga_pin_stretch_hmac( +static optiga_pin_result optiga_pin_stretch_hmac( uint8_t stretched_pin[OPTIGA_PIN_SECRET_SIZE]) { + optiga_pin_result ret = OPTIGA_PIN_SUCCESS; + // Process the stretched PIN using a one-way function before sending it to the // Optiga. uint8_t digest[OPTIGA_PIN_SECRET_SIZE] = {0}; @@ -740,36 +737,42 @@ static int optiga_pin_stretch_hmac( optiga_result res = optiga_encrypt_sym( OPTIGA_SYM_MODE_HMAC_SHA256, OID_PIN_HMAC, digest, sizeof(digest), hmac_buffer, sizeof(hmac_buffer), &size); - memzero(digest, sizeof(digest)); if (res != OPTIGA_SUCCESS) { uint8_t error_code = 0; - (void)optiga_get_error_code(&error_code); - if (error_code + OPTIGA_COMMAND_ERROR_OFFSET == - OPTIGA_ERR_ACCESS_COND_NOT_SAT) { - return OPTIGA_ERR_COUNTER_EXCEEDED; + if (res == OPTIGA_ERR_CMD && + optiga_get_error_code(&error_code) == OPTIGA_SUCCESS && + error_code == OPTIGA_ERR_CODE_ACCESS_COND) { + ret = OPTIGA_PIN_COUNTER_EXCEEDED; } else { - return error_code + OPTIGA_COMMAND_ERROR_OFFSET; + ret = OPTIGA_PIN_ERROR; } + goto end; } // Stretch the PIN with the result. hmac_sha256(stretched_pin, OPTIGA_PIN_SECRET_SIZE, hmac_buffer, size, stretched_pin); + +end: + memzero(digest, sizeof(digest)); memzero(hmac_buffer, sizeof(hmac_buffer)); - return OPTIGA_SUCCESS; + return ret; } -int optiga_pin_verify(OPTIGA_UI_PROGRESS ui_progress, - uint8_t stretched_pin[OPTIGA_PIN_SECRET_SIZE]) { +optiga_pin_result optiga_pin_verify( + OPTIGA_UI_PROGRESS ui_progress, + uint8_t stretched_pin[OPTIGA_PIN_SECRET_SIZE]) { + optiga_pin_result ret = OPTIGA_PIN_SUCCESS; + // Stretch the PIN more with stretching secrets from the Optiga. - optiga_result res = optiga_pin_stretch_cmac_ecdh(ui_progress, stretched_pin); - if (res != OPTIGA_SUCCESS) { - return res; + if (!optiga_pin_stretch_cmac_ecdh(ui_progress, stretched_pin)) { + ret = OPTIGA_PIN_ERROR; + goto end; } - res = optiga_pin_stretch_hmac(stretched_pin); - if (res != OPTIGA_SUCCESS) { - return res; + ret = optiga_pin_stretch_hmac(stretched_pin); + if (ret != OPTIGA_PIN_SUCCESS) { + goto end; } // Process the stretched PIN using a one-way function before sending it to the @@ -779,33 +782,45 @@ int optiga_pin_verify(OPTIGA_UI_PROGRESS ui_progress, // Authorise using OID_STRETCHED_PIN so that we can read from OID_PIN_SECRET // and reset OID_PIN_HMAC_CTR. - res = optiga_set_auto_state(OPTIGA_OID_SESSION_CTX, OID_STRETCHED_PIN, digest, - sizeof(digest)); - memzero(digest, sizeof(digest)); - if (res == OPTIGA_ERR_CMD) { + optiga_result res = optiga_set_auto_state( + OPTIGA_OID_SESSION_CTX, OID_STRETCHED_PIN, digest, sizeof(digest)); + if (res != OPTIGA_SUCCESS) { uint8_t error_code = 0; - (void)optiga_get_error_code(&error_code); - return error_code + OPTIGA_COMMAND_ERROR_OFFSET; + if (res != OPTIGA_ERR_CMD || + optiga_get_error_code(&error_code) != OPTIGA_SUCCESS) { + ret = OPTIGA_PIN_ERROR; + goto end; + } + + switch (error_code) { + case OPTIGA_ERR_CODE_CTR_LIMIT: + ret = OPTIGA_PIN_COUNTER_EXCEEDED; + break; + case OPTIGA_ERR_CODE_AUTH_FAIL: + ret = OPTIGA_PIN_INVALID; + break; + default: + ret = OPTIGA_PIN_ERROR; + } + goto end; } ui_progress(200); // Reset the counter which limits the use of OID_PIN_HMAC. - res = optiga_set_data_object(OID_PIN_HMAC_CTR, false, COUNTER_RESET, - sizeof(COUNTER_RESET)); - if (res != OPTIGA_SUCCESS) { - optiga_clear_auto_state(OID_STRETCHED_PIN); - return res; + if (optiga_set_data_object(OID_PIN_HMAC_CTR, false, COUNTER_RESET, + sizeof(COUNTER_RESET)) != OPTIGA_SUCCESS) { + ret = OPTIGA_PIN_ERROR; + goto end; } // Read the counter-protected PIN secret from OID_PIN_SECRET. uint8_t pin_secret[OPTIGA_PIN_SECRET_SIZE] = {0}; size_t size = 0; - res = optiga_get_data_object(OID_PIN_SECRET, false, pin_secret, - OPTIGA_PIN_SECRET_SIZE, &size); - optiga_clear_auto_state(OID_STRETCHED_PIN); - if (res != OPTIGA_SUCCESS) { - return res; + if (optiga_get_data_object(OID_PIN_SECRET, false, pin_secret, + OPTIGA_PIN_SECRET_SIZE, &size) != OPTIGA_SUCCESS) { + ret = OPTIGA_PIN_ERROR; + goto end; } // Stretch the PIN more with the counter-protected PIN secret. @@ -813,24 +828,27 @@ int optiga_pin_verify(OPTIGA_UI_PROGRESS ui_progress, stretched_pin); // Authorise using OID_PIN_SECRET so that we can reset OID_STRETCHED_PIN_CTR. - res = optiga_set_auto_state(OPTIGA_OID_SESSION_CTX, OID_PIN_SECRET, - pin_secret, sizeof(pin_secret)); - memzero(pin_secret, sizeof(pin_secret)); - if (res != OPTIGA_SUCCESS) { - return res; + if (optiga_set_auto_state(OPTIGA_OID_SESSION_CTX, OID_PIN_SECRET, pin_secret, + sizeof(pin_secret)) != OPTIGA_SUCCESS) { + ret = OPTIGA_PIN_ERROR; + goto end; } // Reset the counter which limits the guesses at OID_STRETCHED_PIN. - res = optiga_set_data_object(OID_STRETCHED_PIN_CTR, false, COUNTER_RESET, - sizeof(COUNTER_RESET)); - optiga_clear_auto_state(OID_PIN_SECRET); - if (res != OPTIGA_SUCCESS) { - return res; + if (optiga_set_data_object(OID_STRETCHED_PIN_CTR, false, COUNTER_RESET, + sizeof(COUNTER_RESET)) != OPTIGA_SUCCESS) { + ret = OPTIGA_PIN_ERROR; + goto end; } ui_progress(200); - return OPTIGA_SUCCESS; +end: + memzero(pin_secret, sizeof(pin_secret)); + memzero(digest, sizeof(digest)); + optiga_clear_auto_state(OID_STRETCHED_PIN); + optiga_clear_auto_state(OID_PIN_SECRET); + return ret; } static int optiga_get_counter(uint16_t oid, uint32_t *ctr) { diff --git a/core/embed/trezorhal/optiga_commands.h b/core/embed/trezorhal/optiga_commands.h index 57a5bb1742..61cd7d949f 100644 --- a/core/embed/trezorhal/optiga_commands.h +++ b/core/embed/trezorhal/optiga_commands.h @@ -113,6 +113,40 @@ typedef enum { OPTIGA_LCS_TE = 0x0f, // Termination state. } optiga_lcs; +// Error codes returned by optiga_get_error_code(). +typedef enum { + OPTIGA_ERR_CODE_NONE = 0x00, // No Error. + OPTIGA_ERR_CODE_INVAL_OID = 0x01, // Invalid OID. + OPTIGA_ERR_CODE_INVAL_CMD_PARAM = 0x03, // Invalid param field in command. + OPTIGA_ERR_CODE_INVAL_CMD_LEN = 0x04, // Invalid length field in command. + OPTIGA_ERR_CODE_INVAL_CMD_DATA = 0x05, // Invalid parameter in command data. + OPTIGA_ERR_CODE_PROCESS = 0x06, // Internal process error. + OPTIGA_ERR_CODE_ACCESS_COND = 0x07, // Access conditions not satisfied. + OPTIGA_ERR_CODE_OBJ_BOUNDARY = 0x08, // Data object boundary exceeded. + OPTIGA_ERR_CODE_META_TRUNC = 0x09, // Metadata truncation error. + OPTIGA_ERR_CODE_INVAL_CMD_FIELD = 0x0A, // Invalid command field. + OPTIGA_ERR_CODE_CMD_SEQ = 0x0B, // Command out of sequence. + OPTIGA_ERR_CODE_CMD_UNAVAIL = 0x0C, // Command not available. + OPTIGA_ERR_CODE_MEMORY = 0x0D, // Insufficient memory to process the + // command. + OPTIGA_ERR_CODE_CTR_LIMIT = 0x0E, // Counter threshold limit exceeded. + OPTIGA_ERR_CODE_INVAL_MANIFEST = 0x0F, // Invalid manifest. + OPTIGA_ERR_CODE_PAYLOAD_VER = 0x10, // Wrong payload version. + OPTIGA_ERR_CODE_INVAL_OBJ_META = 0x11, // Invalid data object metadata. + OPTIGA_ERR_CODE_UNSUP_EXT_ID = 0x24, // Unsupported key usage, extension + // or algorithm identifier. + OPTIGA_ERR_CODE_UNSUP_PARAM = 0x25, // Unsupported parameters in + // handshake or command APDU InData. + OPTIGA_ERR_CODE_INVAL_CERT = 0x29, // Invalid certificate format or + // signature. + OPTIGA_ERR_CODE_UNSUP_CERT = 0x2A, // Unsupported certificate. + OPTIGA_ERR_CODE_SIG_FAIL = 0x2C, // Signature verification failure. + OPTIGA_ERR_CODE_INT_FAIL = 0x2D, // Message integrity validation failed + // (e.g. during CCM decryption). + OPTIGA_ERR_CODE_DECRYPT_FAIL = 0x2E, // Decryption failure + OPTIGA_ERR_CODE_AUTH_FAIL = 0x2F, // Authorization failure +} optiga_err_code; + typedef struct { const uint8_t *ptr; uint16_t len; diff --git a/core/embed/trezorhal/unix/optiga.c b/core/embed/trezorhal/unix/optiga.c index e6380fdd9a..1deca6dd69 100644 --- a/core/embed/trezorhal/unix/optiga.c +++ b/core/embed/trezorhal/unix/optiga.c @@ -34,27 +34,28 @@ #error "Cert chain for specified model is not available." #endif -int optiga_sign(uint8_t index, const uint8_t *digest, size_t digest_size, - uint8_t *signature, size_t max_sig_size, size_t *sig_size) { +optiga_sign_result optiga_sign(uint8_t index, const uint8_t *digest, + size_t digest_size, uint8_t *signature, + size_t max_sig_size, size_t *sig_size) { const uint8_t DEVICE_PRIV_KEY[32] = {1}; if (index != OPTIGA_DEVICE_ECC_KEY_INDEX) { - return false; + return OPTIGA_SIGN_ERROR; } if (max_sig_size < 72) { - return OPTIGA_ERR_SIZE; + return OPTIGA_SIGN_ERROR; } uint8_t raw_signature[64] = {0}; int ret = ecdsa_sign_digest(&nist256p1, DEVICE_PRIV_KEY, digest, raw_signature, NULL, NULL); if (ret != 0) { - return OPTIGA_ERR_CMD; + return OPTIGA_SIGN_ERROR; } *sig_size = ecdsa_sig_to_der(raw_signature, signature); - return OPTIGA_SUCCESS; + return OPTIGA_SIGN_SUCCESS; } bool optiga_cert_size(uint8_t index, size_t *cert_size) { @@ -91,24 +92,26 @@ bool optiga_random_buffer(uint8_t *dest, size_t size) { return true; } -int optiga_pin_set(OPTIGA_UI_PROGRESS ui_progress, - uint8_t stretched_pin[OPTIGA_PIN_SECRET_SIZE]) { +bool optiga_pin_set(OPTIGA_UI_PROGRESS ui_progress, + uint8_t stretched_pin[OPTIGA_PIN_SECRET_SIZE]) { ui_progress(OPTIGA_PIN_SET_MS); - return OPTIGA_SUCCESS; + return true; } -int optiga_pin_verify_v4(OPTIGA_UI_PROGRESS ui_progress, - const uint8_t pin_secret[OPTIGA_PIN_SECRET_SIZE], - uint8_t out_secret[OPTIGA_PIN_SECRET_SIZE]) { +optiga_pin_result optiga_pin_verify_v4( + OPTIGA_UI_PROGRESS ui_progress, + const uint8_t pin_secret[OPTIGA_PIN_SECRET_SIZE], + uint8_t out_secret[OPTIGA_PIN_SECRET_SIZE]) { memcpy(out_secret, pin_secret, OPTIGA_PIN_SECRET_SIZE); ui_progress(OPTIGA_PIN_VERIFY_MS); - return OPTIGA_SUCCESS; + return OPTIGA_PIN_SUCCESS; } -int optiga_pin_verify(OPTIGA_UI_PROGRESS ui_progress, - uint8_t stretched_pin[OPTIGA_PIN_SECRET_SIZE]) { +optiga_pin_result optiga_pin_verify( + OPTIGA_UI_PROGRESS ui_progress, + uint8_t stretched_pin[OPTIGA_PIN_SECRET_SIZE]) { ui_progress(OPTIGA_PIN_VERIFY_MS); - return OPTIGA_SUCCESS; + return OPTIGA_PIN_SUCCESS; } int optiga_pin_get_fails_v4(uint32_t *ctr) { diff --git a/storage/storage.c b/storage/storage.c index 4614e9f986..08b5e3ac72 100644 --- a/storage/storage.c +++ b/storage/storage.c @@ -609,7 +609,7 @@ static secbool __wur derive_kek_set( const uint8_t *ext_salt, uint8_t stretched_pin[SHA256_DIGEST_LENGTH]) { stretch_pin(pin, pin_len, storage_salt, ext_salt, stretched_pin); #if USE_OPTIGA - if (optiga_pin_set(ui_progress, stretched_pin) != OPTIGA_SUCCESS) { + if (!optiga_pin_set(ui_progress, stretched_pin)) { memzero(stretched_pin, SHA256_DIGEST_LENGTH); return secfalse; } @@ -627,16 +627,17 @@ static secbool __wur derive_kek_unlock_v4(const uint8_t *pin, size_t pin_len, uint8_t optiga_secret[OPTIGA_PIN_SECRET_SIZE] = {0}; uint8_t stretched_pin[OPTIGA_PIN_SECRET_SIZE] = {0}; stretch_pin(pin, pin_len, storage_salt, ext_salt, stretched_pin); - int ret = optiga_pin_verify_v4(ui_progress, stretched_pin, optiga_secret); + optiga_pin_result ret = + optiga_pin_verify_v4(ui_progress, stretched_pin, optiga_secret); memzero(stretched_pin, sizeof(stretched_pin)); - if (ret != OPTIGA_SUCCESS) { + if (ret != OPTIGA_PIN_SUCCESS) { memzero(optiga_secret, sizeof(optiga_secret)); - if (ret == OPTIGA_ERR_COUNTER_EXCEEDED) { + if (ret == OPTIGA_PIN_COUNTER_EXCEEDED) { // Unreachable code. Wipe should have already been triggered in unlock(). storage_wipe(); show_pin_too_many_screen(); } - ensure(ret == OPTIGA_ERR_AUTH_FAIL ? sectrue : secfalse, + ensure(ret == OPTIGA_PIN_INVALID ? sectrue : secfalse, "optiga_pin_verify failed"); return secfalse; } @@ -653,16 +654,16 @@ static secbool __wur derive_kek_unlock( const uint8_t *ext_salt, uint8_t stretched_pin[SHA256_DIGEST_LENGTH]) { stretch_pin(pin, pin_len, storage_salt, ext_salt, stretched_pin); #if USE_OPTIGA - int ret = optiga_pin_verify(ui_progress, stretched_pin); - if (ret != OPTIGA_SUCCESS) { + optiga_pin_result ret = optiga_pin_verify(ui_progress, stretched_pin); + if (ret != OPTIGA_PIN_SUCCESS) { memzero(stretched_pin, SHA256_DIGEST_LENGTH); - if (ret == OPTIGA_ERR_COUNTER_EXCEEDED) { + if (ret == OPTIGA_PIN_COUNTER_EXCEEDED) { // Unreachable code. Wipe should have already been triggered in unlock(). storage_wipe(); show_pin_too_many_screen(); } - ensure(ret == OPTIGA_ERR_AUTH_FAIL ? sectrue : secfalse, + ensure(ret == OPTIGA_PIN_INVALID ? sectrue : secfalse, "optiga_pin_verify failed"); return secfalse; }