mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-12-24 15:28:10 +00:00
1705 lines
52 KiB
C
1705 lines
52 KiB
C
/*
|
|
* This file is part of the Trezor project, https://trezor.io/
|
|
*
|
|
* Copyright (c) SatoshiLabs
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include <assert.h>
|
|
#include <string.h>
|
|
|
|
#include "chacha20poly1305/rfc7539.h"
|
|
#include "common.h"
|
|
#include "hmac.h"
|
|
#include "memzero.h"
|
|
#include "norcow.h"
|
|
#include "pbkdf2.h"
|
|
#include "rand.h"
|
|
#include "random_delays.h"
|
|
#include "sha2.h"
|
|
#include "storage.h"
|
|
#include "storage_utils.h"
|
|
|
|
#if USE_OPTIGA
|
|
#include "optiga.h"
|
|
#endif
|
|
|
|
#ifdef STM32U5
|
|
#include "secure_aes.h"
|
|
#endif
|
|
|
|
// The APP namespace which is reserved for storage related values.
|
|
#define APP_STORAGE 0x00
|
|
|
|
// Norcow storage keys.
|
|
// PIN entry log and PIN success log.
|
|
#define PIN_LOGS_KEY ((APP_STORAGE << 8) | 0x01)
|
|
|
|
// Combined salt, EDEK, ESAK and PIN verification code entry.
|
|
#define EDEK_PVC_KEY ((APP_STORAGE << 8) | 0x02)
|
|
|
|
// PIN set flag.
|
|
#define PIN_NOT_SET_KEY ((APP_STORAGE << 8) | 0x03)
|
|
|
|
// Authenticated storage version.
|
|
// NOTE: This should equal the norcow version unless an upgrade is in progress.
|
|
#define VERSION_KEY ((APP_STORAGE << 8) | 0x04)
|
|
|
|
// Storage authentication tag.
|
|
#define STORAGE_TAG_KEY ((APP_STORAGE << 8) | 0x05)
|
|
|
|
// Wipe code data. Introduced in storage version 2.
|
|
#define WIPE_CODE_DATA_KEY ((APP_STORAGE << 8) | 0x06)
|
|
|
|
// Storage upgrade flag. Introduced in storage version 2.
|
|
#define STORAGE_UPGRADED_KEY ((APP_STORAGE << 8) | 0x07)
|
|
|
|
// Unauthenticated storage version. Introduced in storage version 3.
|
|
// NOTE: This should always equal the value in VERSION_KEY.
|
|
#define UNAUTH_VERSION_KEY ((APP_STORAGE << 8) | 0x08)
|
|
|
|
// The PIN value corresponding to an empty PIN.
|
|
const uint8_t *PIN_EMPTY = (const uint8_t *)"";
|
|
|
|
// The uint32 representation of an empty PIN, used prior to storage version 3.
|
|
const uint32_t V0_PIN_EMPTY = 1;
|
|
|
|
// Maximum number of PIN digits allowed prior to storage version 3.
|
|
#define V0_MAX_PIN_LEN 9
|
|
|
|
// Maximum length of the wipe code.
|
|
// Some limit should be imposed on the length, because the wipe code takes up
|
|
// storage space proportional to the length, as opposed to the PIN, which takes
|
|
// up constant storage space.
|
|
#define MAX_WIPE_CODE_LEN 50
|
|
|
|
// The total number of iterations to use in PBKDF2.
|
|
#define PIN_ITER_COUNT 20000
|
|
|
|
// The number of milliseconds required to execute PBKDF2.
|
|
#define PIN_PBKDF2_MS 1280
|
|
|
|
// The number of milliseconds required to set the PIN.
|
|
#if USE_OPTIGA
|
|
#define PIN_SET_MS (PIN_PBKDF2_MS + OPTIGA_PIN_SET_MS)
|
|
#else
|
|
#define PIN_SET_MS PIN_PBKDF2_MS
|
|
#endif
|
|
|
|
// The number of milliseconds required to verify the PIN.
|
|
#if USE_OPTIGA
|
|
#define PIN_VERIFY_MS (PIN_PBKDF2_MS + OPTIGA_PIN_VERIFY_MS)
|
|
#else
|
|
#define PIN_VERIFY_MS PIN_PBKDF2_MS
|
|
#endif
|
|
|
|
// The length of the hashed hardware salt in bytes.
|
|
#define HARDWARE_SALT_SIZE SHA256_DIGEST_LENGTH
|
|
|
|
// The length of the data encryption key in bytes.
|
|
#define DEK_SIZE 32
|
|
|
|
// The length of the storage authentication key in bytes.
|
|
#define SAK_SIZE 16
|
|
|
|
// The combined length of the data encryption key and the storage authentication
|
|
// key in bytes.
|
|
#define KEYS_SIZE (DEK_SIZE + SAK_SIZE)
|
|
|
|
// The length of the PIN verification code in bytes.
|
|
#define PVC_SIZE 8
|
|
|
|
// The length of the storage authentication tag in bytes.
|
|
#define STORAGE_TAG_SIZE 16
|
|
|
|
// The length of the Poly1305 authentication tag in bytes.
|
|
#define POLY1305_TAG_SIZE 16
|
|
|
|
// The length of the ChaCha20 IV (aka nonce) in bytes as per RFC 7539.
|
|
#define CHACHA20_IV_SIZE 12
|
|
|
|
// The length of the ChaCha20 block in bytes.
|
|
#define CHACHA20_BLOCK_SIZE 64
|
|
|
|
// The byte length of the salt used in checking the wipe code.
|
|
#define WIPE_CODE_SALT_SIZE 8
|
|
|
|
// The byte length of the tag used in checking the wipe code.
|
|
#define WIPE_CODE_TAG_SIZE 8
|
|
|
|
// The value corresponding to an unconfigured wipe code.
|
|
// NOTE: This is intentionally different from an empty PIN so that we don't need
|
|
// special handling when both the PIN and wipe code are not set.
|
|
const uint8_t WIPE_CODE_EMPTY[] = {0, 0, 0, 0};
|
|
#define WIPE_CODE_EMPTY_LEN 4
|
|
|
|
// The uint32 representation of an empty wipe code used in storage version 2.
|
|
#define V2_WIPE_CODE_EMPTY 0
|
|
|
|
CONFIDENTIAL static secbool initialized = secfalse;
|
|
CONFIDENTIAL static secbool unlocked = secfalse;
|
|
static PIN_UI_WAIT_CALLBACK ui_callback = NULL;
|
|
static uint32_t ui_total = 0;
|
|
static uint32_t ui_rem = 0;
|
|
static enum storage_ui_message_t ui_message = NO_MSG;
|
|
CONFIDENTIAL static uint8_t cached_keys[KEYS_SIZE] = {0};
|
|
CONFIDENTIAL static uint8_t *const cached_dek = cached_keys;
|
|
CONFIDENTIAL static uint8_t *const cached_sak = cached_keys + DEK_SIZE;
|
|
CONFIDENTIAL uint8_t authentication_sum[SHA256_DIGEST_LENGTH] = {0};
|
|
CONFIDENTIAL static uint8_t hardware_salt[HARDWARE_SALT_SIZE] = {0};
|
|
CONFIDENTIAL static uint32_t norcow_active_version = 0;
|
|
static const uint8_t TRUE_BYTE = 0x01;
|
|
static const uint8_t FALSE_BYTE = 0x00;
|
|
static const uint32_t TRUE_WORD = 0xC35A69A5;
|
|
static const uint32_t FALSE_WORD = 0x3CA5965A;
|
|
|
|
static void __handle_fault(const char *msg, const char *file, int line);
|
|
#define handle_fault(msg) (__handle_fault(msg, __FILE_NAME__, __LINE__))
|
|
|
|
static uint32_t pin_to_int(const uint8_t *pin, size_t pin_len);
|
|
static secbool storage_upgrade(void);
|
|
static secbool storage_upgrade_unlocked(const uint8_t *pin, size_t pin_len,
|
|
const uint8_t *ext_salt);
|
|
static secbool storage_set_encrypted(const uint16_t key, const void *val,
|
|
const uint16_t len);
|
|
static secbool storage_get_encrypted(const uint16_t key, void *val_dest,
|
|
const uint16_t max_len, uint16_t *len);
|
|
|
|
#include "flash.h"
|
|
#ifdef FLASH_BIT_ACCESS
|
|
#include "pinlogs_bitwise.h"
|
|
#else
|
|
#include "pinlogs_blockwise.h"
|
|
#endif
|
|
|
|
static secbool secequal(const void *ptr1, const void *ptr2, size_t n) {
|
|
const uint8_t *p1 = ptr1;
|
|
const uint8_t *p2 = ptr2;
|
|
uint8_t diff = 0;
|
|
size_t i = 0;
|
|
for (i = 0; i < n; ++i) {
|
|
diff |= *p1 ^ *p2;
|
|
++p1;
|
|
++p2;
|
|
}
|
|
|
|
// Check loop completion in case of a fault injection attack.
|
|
if (i != n) {
|
|
handle_fault("loop completion check");
|
|
}
|
|
|
|
return diff ? secfalse : sectrue;
|
|
}
|
|
|
|
static secbool secequal32(const void *ptr1, const void *ptr2, size_t n) {
|
|
assert(n % sizeof(uint32_t) == 0);
|
|
assert((uintptr_t)ptr1 % sizeof(uint32_t) == 0);
|
|
assert((uintptr_t)ptr2 % sizeof(uint32_t) == 0);
|
|
|
|
size_t wn = n / sizeof(uint32_t);
|
|
const uint32_t *p1 = (const uint32_t *)ptr1;
|
|
const uint32_t *p2 = (const uint32_t *)ptr2;
|
|
uint32_t diff = 0;
|
|
size_t i = 0;
|
|
for (i = 0; i < wn; ++i) {
|
|
uint32_t mask = random32();
|
|
diff |= (*p1 + mask - *p2) ^ mask;
|
|
++p1;
|
|
++p2;
|
|
}
|
|
|
|
// Check loop completion in case of a fault injection attack.
|
|
if (i != wn) {
|
|
handle_fault("loop completion check");
|
|
}
|
|
|
|
return diff ? secfalse : sectrue;
|
|
}
|
|
|
|
static secbool is_protected(uint16_t key) {
|
|
const uint8_t app = key >> 8;
|
|
return ((app & FLAG_PUBLIC) == 0 && app != APP_STORAGE) ? sectrue : secfalse;
|
|
}
|
|
|
|
/*
|
|
* Initialize the storage authentication tag for freshly wiped storage.
|
|
*/
|
|
static secbool auth_init(void) {
|
|
uint8_t tag[SHA256_DIGEST_LENGTH] = {0};
|
|
memzero(authentication_sum, sizeof(authentication_sum));
|
|
hmac_sha256(cached_sak, SAK_SIZE, authentication_sum,
|
|
sizeof(authentication_sum), tag);
|
|
return norcow_set(STORAGE_TAG_KEY, tag, STORAGE_TAG_SIZE);
|
|
}
|
|
|
|
/*
|
|
* Update the storage authentication tag with the given key.
|
|
*/
|
|
static secbool auth_update(uint16_t key) {
|
|
if (sectrue != is_protected(key)) {
|
|
return sectrue;
|
|
}
|
|
|
|
uint8_t tag[SHA256_DIGEST_LENGTH] = {0};
|
|
hmac_sha256(cached_sak, SAK_SIZE, (uint8_t *)&key, sizeof(key), tag);
|
|
for (uint32_t i = 0; i < SHA256_DIGEST_LENGTH; i++) {
|
|
authentication_sum[i] ^= tag[i];
|
|
}
|
|
hmac_sha256(cached_sak, SAK_SIZE, authentication_sum,
|
|
sizeof(authentication_sum), tag);
|
|
return norcow_set(STORAGE_TAG_KEY, tag, STORAGE_TAG_SIZE);
|
|
}
|
|
|
|
/*
|
|
* A secure version of norcow_set(), which updates the storage authentication
|
|
* tag.
|
|
*/
|
|
static secbool auth_set(uint16_t key, const void *val, uint16_t len) {
|
|
secbool found = secfalse;
|
|
secbool ret = norcow_set_ex(key, val, len, &found);
|
|
if (sectrue == ret && secfalse == found) {
|
|
ret = auth_update(key);
|
|
if (sectrue != ret) {
|
|
norcow_delete(key);
|
|
}
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* A secure version of norcow_get(), which checks the storage authentication
|
|
* tag.
|
|
*/
|
|
static secbool auth_get(uint16_t key, const void **val, uint16_t *len) {
|
|
*val = NULL;
|
|
*len = 0;
|
|
uint32_t sum[SHA256_DIGEST_LENGTH / sizeof(uint32_t)] = {0};
|
|
|
|
// Prepare inner and outer digest.
|
|
uint32_t odig[SHA256_DIGEST_LENGTH / sizeof(uint32_t)] = {0};
|
|
uint32_t idig[SHA256_DIGEST_LENGTH / sizeof(uint32_t)] = {0};
|
|
hmac_sha256_prepare(cached_sak, SAK_SIZE, odig, idig);
|
|
|
|
// Prepare SHA-256 message padding.
|
|
uint32_t g[SHA256_BLOCK_LENGTH / sizeof(uint32_t)] = {0};
|
|
uint32_t h[SHA256_BLOCK_LENGTH / sizeof(uint32_t)] = {0};
|
|
g[15] = (SHA256_BLOCK_LENGTH + 2) * 8;
|
|
h[15] = (SHA256_BLOCK_LENGTH + SHA256_DIGEST_LENGTH) * 8;
|
|
h[8] = 0x80000000;
|
|
|
|
uint32_t offset = 0;
|
|
uint16_t k = 0;
|
|
uint16_t l = 0;
|
|
uint16_t tag_len = 0;
|
|
uint16_t entry_count = 0; // Mitigation against fault injection.
|
|
uint16_t other_count = 0; // Mitigation against fault injection.
|
|
const void *v = NULL;
|
|
const void *tag_val = NULL;
|
|
while (sectrue == norcow_get_next(&offset, &k, &v, &l)) {
|
|
++entry_count;
|
|
if (k == key) {
|
|
*val = v;
|
|
*len = l;
|
|
} else {
|
|
++other_count;
|
|
}
|
|
if (sectrue != is_protected(k)) {
|
|
if (k == STORAGE_TAG_KEY) {
|
|
tag_val = v;
|
|
tag_len = l;
|
|
}
|
|
continue;
|
|
}
|
|
g[0] = (((uint32_t)k & 0xff) << 24) | (((uint32_t)k & 0xff00) << 8) |
|
|
0x8000; // Add SHA message padding.
|
|
sha256_Transform(idig, g, h);
|
|
sha256_Transform(odig, h, h);
|
|
for (uint32_t i = 0; i < SHA256_DIGEST_LENGTH / sizeof(uint32_t); i++) {
|
|
sum[i] ^= h[i];
|
|
}
|
|
}
|
|
memcpy(h, sum, sizeof(sum));
|
|
|
|
sha256_Transform(idig, h, h);
|
|
sha256_Transform(odig, h, h);
|
|
|
|
memzero(odig, sizeof(odig));
|
|
memzero(idig, sizeof(idig));
|
|
|
|
// Cache the authentication sum.
|
|
for (size_t i = 0; i < SHA256_DIGEST_LENGTH / sizeof(uint32_t); i++) {
|
|
#if BYTE_ORDER == LITTLE_ENDIAN
|
|
REVERSE32(sum[i], ((uint32_t *)authentication_sum)[i]);
|
|
#else
|
|
((uint32_t *)authentication_sum)[i] = sum[i];
|
|
#endif
|
|
}
|
|
|
|
// Check loop completion in case of a fault injection attack.
|
|
if (secfalse != norcow_get_next(&offset, &k, &v, &l)) {
|
|
handle_fault("loop completion check");
|
|
}
|
|
|
|
// Check storage authentication tag.
|
|
#if BYTE_ORDER == LITTLE_ENDIAN
|
|
for (size_t i = 0; i < SHA256_DIGEST_LENGTH / sizeof(uint32_t); i++) {
|
|
REVERSE32(h[i], h[i]);
|
|
}
|
|
#endif
|
|
if (tag_val == NULL || tag_len != STORAGE_TAG_SIZE ||
|
|
sectrue != secequal(h, tag_val, STORAGE_TAG_SIZE)) {
|
|
handle_fault("storage tag check");
|
|
}
|
|
|
|
if (*val == NULL) {
|
|
// Check for fault injection.
|
|
if (other_count != entry_count) {
|
|
handle_fault("sanity check");
|
|
}
|
|
return secfalse;
|
|
}
|
|
return sectrue;
|
|
}
|
|
|
|
static secbool set_wipe_code(const uint8_t *wipe_code, size_t wipe_code_len) {
|
|
if (wipe_code_len > MAX_WIPE_CODE_LEN ||
|
|
wipe_code_len > UINT16_MAX - WIPE_CODE_SALT_SIZE - WIPE_CODE_TAG_SIZE) {
|
|
return secfalse;
|
|
}
|
|
|
|
if (wipe_code_len == 0) {
|
|
// This is to avoid having to check pin != PIN_EMPTY when checking the wipe
|
|
// code.
|
|
wipe_code = WIPE_CODE_EMPTY;
|
|
wipe_code_len = WIPE_CODE_EMPTY_LEN;
|
|
}
|
|
|
|
// The format of the WIPE_CODE_DATA_KEY entry is:
|
|
// wipe code (variable), random salt (8 bytes), authentication tag (8 bytes)
|
|
// NOTE: We allocate extra space for the HMAC result.
|
|
uint8_t data[(MAX_WIPE_CODE_LEN + WIPE_CODE_SALT_SIZE +
|
|
SHA256_DIGEST_LENGTH)] = {0};
|
|
uint8_t *salt = data + wipe_code_len;
|
|
uint8_t *tag = salt + WIPE_CODE_SALT_SIZE;
|
|
memcpy(data, wipe_code, wipe_code_len);
|
|
|
|
random_buffer(salt, WIPE_CODE_SALT_SIZE);
|
|
hmac_sha256(salt, WIPE_CODE_SALT_SIZE, wipe_code, wipe_code_len, tag);
|
|
|
|
secbool ret =
|
|
norcow_set(WIPE_CODE_DATA_KEY, data,
|
|
wipe_code_len + WIPE_CODE_SALT_SIZE + WIPE_CODE_TAG_SIZE);
|
|
|
|
memzero(data, sizeof(data));
|
|
return ret;
|
|
}
|
|
|
|
static secbool is_not_wipe_code(const uint8_t *pin, size_t pin_len) {
|
|
uint8_t salt[WIPE_CODE_SALT_SIZE] = {0};
|
|
uint8_t stored_tag[WIPE_CODE_TAG_SIZE] = {0};
|
|
uint8_t computed_tag1[SHA256_DIGEST_LENGTH] = {0};
|
|
uint8_t computed_tag2[SHA256_DIGEST_LENGTH] = {0};
|
|
|
|
// Read the wipe code data from the storage.
|
|
const void *wipe_code_data = NULL;
|
|
uint16_t len = 0;
|
|
if (sectrue != norcow_get(WIPE_CODE_DATA_KEY, &wipe_code_data, &len) ||
|
|
len <= WIPE_CODE_SALT_SIZE + WIPE_CODE_TAG_SIZE) {
|
|
handle_fault("no wipe code");
|
|
return secfalse;
|
|
}
|
|
const uint8_t *wipe_code = (const uint8_t *)wipe_code_data;
|
|
size_t wipe_code_len = len - WIPE_CODE_SALT_SIZE - WIPE_CODE_TAG_SIZE;
|
|
memcpy(salt, (uint8_t *)wipe_code_data + wipe_code_len, sizeof(salt));
|
|
memcpy(stored_tag,
|
|
(uint8_t *)wipe_code_data + wipe_code_len + WIPE_CODE_SALT_SIZE,
|
|
sizeof(stored_tag));
|
|
|
|
// Check integrity in case of flash read manipulation attack.
|
|
hmac_sha256(salt, WIPE_CODE_SALT_SIZE, wipe_code, wipe_code_len,
|
|
computed_tag1);
|
|
if (sectrue != secequal(stored_tag, computed_tag1, sizeof(stored_tag))) {
|
|
handle_fault("wipe code tag");
|
|
return secfalse;
|
|
}
|
|
|
|
// Prepare the authentication tag of the entered PIN.
|
|
wait_random();
|
|
hmac_sha256(salt, WIPE_CODE_SALT_SIZE, pin, pin_len, computed_tag1);
|
|
|
|
// Recompute to check for fault injection attack.
|
|
wait_random();
|
|
hmac_sha256(salt, WIPE_CODE_SALT_SIZE, pin, pin_len, computed_tag2);
|
|
memzero(salt, sizeof(salt));
|
|
if (sectrue !=
|
|
secequal(computed_tag1, computed_tag2, sizeof(computed_tag1))) {
|
|
handle_fault("wipe code fault");
|
|
return secfalse;
|
|
}
|
|
|
|
// Compare wipe code with the entered PIN via the authentication tag.
|
|
wait_random();
|
|
if (secfalse != secequal(stored_tag, computed_tag1, sizeof(stored_tag))) {
|
|
return secfalse;
|
|
}
|
|
memzero(stored_tag, sizeof(stored_tag));
|
|
return sectrue;
|
|
}
|
|
|
|
static void ui_total_init(uint32_t total_ms) {
|
|
ui_total = total_ms;
|
|
ui_rem = total_ms;
|
|
}
|
|
|
|
static void ui_total_add(uint32_t added_ms) {
|
|
ui_total += added_ms;
|
|
ui_rem += added_ms;
|
|
}
|
|
|
|
static secbool ui_progress(uint32_t elapsed_ms) {
|
|
ui_rem -= elapsed_ms;
|
|
if (ui_callback && ui_message) {
|
|
uint32_t progress = 0;
|
|
if (ui_total < 1000000) {
|
|
progress = 1000 * (ui_total - ui_rem) / ui_total;
|
|
} else {
|
|
// Avoid overflow. Precise enough.
|
|
progress = (ui_total - ui_rem) / (ui_total / 1000);
|
|
}
|
|
// Round the remaining time to the nearest second.
|
|
return ui_callback((ui_rem + 500) / 1000, progress, ui_message);
|
|
} else {
|
|
return secfalse;
|
|
}
|
|
}
|
|
|
|
#if !USE_OPTIGA
|
|
static void derive_kek_v4(const uint8_t *pin, size_t pin_len,
|
|
const uint8_t *storage_salt, const uint8_t *ext_salt,
|
|
uint8_t kek[SHA256_DIGEST_LENGTH],
|
|
uint8_t keiv[SHA256_DIGEST_LENGTH]) {
|
|
// Legacy PIN verification method used in storage versions 1, 2, 3 and 4.
|
|
uint8_t salt[HARDWARE_SALT_SIZE + STORAGE_SALT_SIZE + EXTERNAL_SALT_SIZE] = {
|
|
0};
|
|
size_t salt_len = 0;
|
|
|
|
memcpy(salt + salt_len, hardware_salt, HARDWARE_SALT_SIZE);
|
|
salt_len += HARDWARE_SALT_SIZE;
|
|
|
|
memcpy(salt + salt_len, storage_salt, STORAGE_SALT_SIZE);
|
|
salt_len += STORAGE_SALT_SIZE;
|
|
|
|
if (ext_salt != NULL) {
|
|
memcpy(salt + salt_len, ext_salt, EXTERNAL_SALT_SIZE);
|
|
salt_len += EXTERNAL_SALT_SIZE;
|
|
}
|
|
|
|
PBKDF2_HMAC_SHA256_CTX ctx = {0};
|
|
pbkdf2_hmac_sha256_Init(&ctx, pin, pin_len, salt, salt_len, 1);
|
|
for (int i = 1; i <= 5; i++) {
|
|
pbkdf2_hmac_sha256_Update(&ctx, PIN_ITER_COUNT / 10);
|
|
ui_progress(PIN_PBKDF2_MS / 10);
|
|
}
|
|
|
|
#ifdef STM32U5
|
|
uint8_t pre_kek[SHA256_DIGEST_LENGTH] = {0};
|
|
pbkdf2_hmac_sha256_Final(&ctx, pre_kek);
|
|
ensure(secure_aes_ecb_encrypt_hw(pre_kek, SHA256_DIGEST_LENGTH, kek,
|
|
SECURE_AES_KEY_XORK),
|
|
"secure_aes derive kek failed");
|
|
memzero(pre_kek, sizeof(pre_kek));
|
|
#else
|
|
pbkdf2_hmac_sha256_Final(&ctx, kek);
|
|
#endif
|
|
|
|
pbkdf2_hmac_sha256_Init(&ctx, pin, pin_len, salt, salt_len, 2);
|
|
for (int i = 6; i <= 10; i++) {
|
|
pbkdf2_hmac_sha256_Update(&ctx, PIN_ITER_COUNT / 10);
|
|
ui_progress(PIN_PBKDF2_MS / 10);
|
|
}
|
|
pbkdf2_hmac_sha256_Final(&ctx, keiv);
|
|
|
|
memzero(&ctx, sizeof(PBKDF2_HMAC_SHA256_CTX));
|
|
memzero(&salt, sizeof(salt));
|
|
}
|
|
#endif
|
|
|
|
static void stretch_pin(const uint8_t *pin, size_t pin_len,
|
|
const uint8_t storage_salt[STORAGE_SALT_SIZE],
|
|
const uint8_t *ext_salt,
|
|
uint8_t stretched_pin[SHA256_DIGEST_LENGTH]) {
|
|
// Combining the PIN with the storage salt aims to ensure that if the
|
|
// MCU-Optiga communication is compromised, then a user with a low-entropy PIN
|
|
// remains protected against an attacker who is not able to read the contents
|
|
// of the MCU storage. Stretching the PIN with PBKDF2 ensures that even if
|
|
// Optiga itself is completely compromised, it will not reduce the security
|
|
// of the device below that of earlier Trezor models which also use PBKDF2
|
|
// with the same number of iterations.
|
|
|
|
uint8_t salt[HARDWARE_SALT_SIZE + STORAGE_SALT_SIZE + EXTERNAL_SALT_SIZE] = {
|
|
0};
|
|
size_t salt_len = 0;
|
|
|
|
memcpy(salt + salt_len, hardware_salt, HARDWARE_SALT_SIZE);
|
|
salt_len += HARDWARE_SALT_SIZE;
|
|
|
|
memcpy(salt + salt_len, storage_salt, STORAGE_SALT_SIZE);
|
|
salt_len += STORAGE_SALT_SIZE;
|
|
|
|
if (ext_salt != NULL) {
|
|
memcpy(salt + salt_len, ext_salt, EXTERNAL_SALT_SIZE);
|
|
salt_len += EXTERNAL_SALT_SIZE;
|
|
}
|
|
|
|
PBKDF2_HMAC_SHA256_CTX ctx = {0};
|
|
pbkdf2_hmac_sha256_Init(&ctx, pin, pin_len, salt, salt_len, 1);
|
|
memzero(&salt, sizeof(salt));
|
|
|
|
for (int i = 1; i <= 10; i++) {
|
|
pbkdf2_hmac_sha256_Update(&ctx, PIN_ITER_COUNT / 10);
|
|
ui_progress(PIN_PBKDF2_MS / 10);
|
|
}
|
|
#ifdef STM32U5
|
|
uint8_t stretched_pin_tmp[OPTIGA_PIN_SECRET_SIZE] = {0};
|
|
pbkdf2_hmac_sha256_Final(&ctx, stretched_pin_tmp);
|
|
ensure(secure_aes_ecb_encrypt_hw(stretched_pin_tmp, OPTIGA_PIN_SECRET_SIZE,
|
|
stretched_pin, SECURE_AES_KEY_XORK),
|
|
"secure_aes pin stretch failed");
|
|
memzero(stretched_pin_tmp, sizeof(stretched_pin_tmp));
|
|
#else
|
|
pbkdf2_hmac_sha256_Final(&ctx, stretched_pin);
|
|
#endif
|
|
memzero(&ctx, sizeof(ctx));
|
|
}
|
|
|
|
#if USE_OPTIGA
|
|
static void derive_kek_optiga_v4(
|
|
// Legacy PIN verification method used in storage versions 3 and 4.
|
|
const uint8_t optiga_secret[OPTIGA_PIN_SECRET_SIZE],
|
|
uint8_t kek[SHA256_DIGEST_LENGTH], uint8_t keiv[SHA256_DIGEST_LENGTH]) {
|
|
PBKDF2_HMAC_SHA256_CTX ctx = {0};
|
|
pbkdf2_hmac_sha256_Init(&ctx, optiga_secret, OPTIGA_PIN_SECRET_SIZE, NULL, 0,
|
|
1);
|
|
pbkdf2_hmac_sha256_Update(&ctx, 1);
|
|
pbkdf2_hmac_sha256_Final(&ctx, kek);
|
|
|
|
pbkdf2_hmac_sha256_Init(&ctx, optiga_secret, OPTIGA_PIN_SECRET_SIZE, NULL, 0,
|
|
2);
|
|
pbkdf2_hmac_sha256_Update(&ctx, 1);
|
|
pbkdf2_hmac_sha256_Final(&ctx, keiv);
|
|
|
|
memzero(&ctx, sizeof(ctx));
|
|
}
|
|
#endif
|
|
|
|
static secbool __wur derive_kek_set(
|
|
const uint8_t *pin, size_t pin_len, const uint8_t *storage_salt,
|
|
const uint8_t *ext_salt, uint8_t stretched_pin[SHA256_DIGEST_LENGTH]) {
|
|
stretch_pin(pin, pin_len, storage_salt, ext_salt, stretched_pin);
|
|
#if USE_OPTIGA
|
|
if (optiga_pin_set(ui_progress, stretched_pin) != OPTIGA_SUCCESS) {
|
|
memzero(stretched_pin, SHA256_DIGEST_LENGTH);
|
|
return secfalse;
|
|
}
|
|
#endif
|
|
return sectrue;
|
|
}
|
|
|
|
static secbool __wur derive_kek_unlock_v4(const uint8_t *pin, size_t pin_len,
|
|
const uint8_t *storage_salt,
|
|
const uint8_t *ext_salt,
|
|
uint8_t kek[SHA256_DIGEST_LENGTH],
|
|
uint8_t keiv[SHA256_DIGEST_LENGTH]) {
|
|
// Legacy PIN verification method used in storage versions 1, 2, 3 and 4.
|
|
#if USE_OPTIGA
|
|
uint8_t optiga_secret[OPTIGA_PIN_SECRET_SIZE] = {0};
|
|
uint8_t stretched_pin[OPTIGA_PIN_SECRET_SIZE] = {0};
|
|
stretch_pin(pin, pin_len, storage_salt, ext_salt, stretched_pin);
|
|
int ret = optiga_pin_verify_v4(ui_progress, stretched_pin, optiga_secret);
|
|
memzero(stretched_pin, sizeof(stretched_pin));
|
|
if (ret != OPTIGA_SUCCESS) {
|
|
memzero(optiga_secret, sizeof(optiga_secret));
|
|
if (ret == OPTIGA_ERR_COUNTER_EXCEEDED) {
|
|
// Unreachable code. Wipe should have already been triggered in unlock().
|
|
storage_wipe();
|
|
show_pin_too_many_screen();
|
|
}
|
|
ensure(ret == OPTIGA_ERR_AUTH_FAIL ? sectrue : secfalse,
|
|
"optiga_pin_verify failed");
|
|
return secfalse;
|
|
}
|
|
derive_kek_optiga_v4(optiga_secret, kek, keiv);
|
|
memzero(optiga_secret, sizeof(optiga_secret));
|
|
#else
|
|
derive_kek_v4(pin, pin_len, storage_salt, ext_salt, kek, keiv);
|
|
#endif
|
|
return sectrue;
|
|
}
|
|
|
|
static secbool __wur derive_kek_unlock(
|
|
const uint8_t *pin, size_t pin_len, const uint8_t *storage_salt,
|
|
const uint8_t *ext_salt, uint8_t stretched_pin[SHA256_DIGEST_LENGTH]) {
|
|
stretch_pin(pin, pin_len, storage_salt, ext_salt, stretched_pin);
|
|
#if USE_OPTIGA
|
|
int ret = optiga_pin_verify(ui_progress, stretched_pin);
|
|
if (ret != OPTIGA_SUCCESS) {
|
|
memzero(stretched_pin, SHA256_DIGEST_LENGTH);
|
|
|
|
if (ret == OPTIGA_ERR_COUNTER_EXCEEDED) {
|
|
// Unreachable code. Wipe should have already been triggered in unlock().
|
|
storage_wipe();
|
|
show_pin_too_many_screen();
|
|
}
|
|
ensure(ret == OPTIGA_ERR_AUTH_FAIL ? sectrue : secfalse,
|
|
"optiga_pin_verify failed");
|
|
return secfalse;
|
|
}
|
|
#endif
|
|
return sectrue;
|
|
}
|
|
|
|
static secbool set_pin(const uint8_t *pin, size_t pin_len,
|
|
const uint8_t *ext_salt) {
|
|
// Encrypt the cached keys using the new PIN and set the new PVC.
|
|
uint8_t buffer[STORAGE_SALT_SIZE + KEYS_SIZE + POLY1305_TAG_SIZE] = {0};
|
|
uint8_t *rand_salt = buffer;
|
|
uint8_t *ekeys = buffer + STORAGE_SALT_SIZE;
|
|
uint8_t *pvc = buffer + STORAGE_SALT_SIZE + KEYS_SIZE;
|
|
|
|
uint8_t kek[SHA256_DIGEST_LENGTH] = {0};
|
|
uint8_t keiv[12] = {0};
|
|
chacha20poly1305_ctx ctx = {0};
|
|
random_buffer(rand_salt, STORAGE_SALT_SIZE);
|
|
ui_progress(0);
|
|
ensure(derive_kek_set(pin, pin_len, rand_salt, ext_salt, kek),
|
|
"derive_kek_set failed");
|
|
rfc7539_init(&ctx, kek, keiv);
|
|
memzero(kek, sizeof(kek));
|
|
chacha20poly1305_encrypt(&ctx, cached_keys, ekeys, KEYS_SIZE);
|
|
rfc7539_finish(&ctx, 0, KEYS_SIZE, pvc);
|
|
memzero(&ctx, sizeof(ctx));
|
|
secbool ret = norcow_set(EDEK_PVC_KEY, buffer,
|
|
STORAGE_SALT_SIZE + KEYS_SIZE + PVC_SIZE);
|
|
memzero(buffer, sizeof(buffer));
|
|
|
|
if (ret == sectrue) {
|
|
if (pin_len == 0) {
|
|
ret = norcow_set(PIN_NOT_SET_KEY, &TRUE_BYTE, sizeof(TRUE_BYTE));
|
|
} else {
|
|
ret = norcow_set(PIN_NOT_SET_KEY, &FALSE_BYTE, sizeof(FALSE_BYTE));
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Initializes the values of VERSION_KEY, EDEK_PVC_KEY, PIN_NOT_SET_KEY and
|
|
* PIN_LOGS_KEY using an empty PIN. This function should be called to initialize
|
|
* freshly wiped storage.
|
|
*/
|
|
static void init_wiped_storage(void) {
|
|
if (sectrue != initialized) {
|
|
// We cannot initialize the storage contents if the hardware_salt is not
|
|
// set.
|
|
return;
|
|
}
|
|
|
|
#if USE_OPTIGA
|
|
ensure(optiga_random_buffer(cached_keys, sizeof(cached_keys)) ? sectrue
|
|
: secfalse,
|
|
"optiga_random_buffer failed");
|
|
random_xor(cached_keys, sizeof(cached_keys));
|
|
#else
|
|
random_buffer(cached_keys, sizeof(cached_keys));
|
|
#endif
|
|
unlocked = sectrue;
|
|
uint32_t version = NORCOW_VERSION;
|
|
ensure(auth_init(), "set_storage_auth_tag failed");
|
|
ensure(storage_set_encrypted(VERSION_KEY, &version, sizeof(version)),
|
|
"set_storage_version failed");
|
|
ensure(norcow_set(UNAUTH_VERSION_KEY, &version, sizeof(version)),
|
|
"set_unauth_storage_version failed");
|
|
ensure(norcow_set(STORAGE_UPGRADED_KEY, &FALSE_WORD, sizeof(FALSE_WORD)),
|
|
"set_storage_not_upgraded failed");
|
|
ensure(pin_logs_init(0), "init_pin_logs failed");
|
|
ensure(set_wipe_code(WIPE_CODE_EMPTY, WIPE_CODE_EMPTY_LEN),
|
|
"set_wipe_code failed");
|
|
|
|
ui_total_init(PIN_SET_MS);
|
|
ui_message = PROCESSING_MSG;
|
|
ensure(set_pin(PIN_EMPTY, PIN_EMPTY_LEN, NULL), "init_pin failed");
|
|
}
|
|
|
|
void storage_init(PIN_UI_WAIT_CALLBACK callback, const uint8_t *salt,
|
|
const uint16_t salt_len) {
|
|
initialized = secfalse;
|
|
unlocked = secfalse;
|
|
norcow_init(&norcow_active_version);
|
|
initialized = sectrue;
|
|
ui_callback = callback;
|
|
|
|
sha256_Raw(salt, salt_len, hardware_salt);
|
|
|
|
if (norcow_active_version < NORCOW_VERSION) {
|
|
if (sectrue != storage_upgrade()) {
|
|
storage_wipe();
|
|
ensure(secfalse, "storage_upgrade failed");
|
|
}
|
|
}
|
|
|
|
// If there is no EDEK, then generate a random DEK and SAK and store them.
|
|
const void *val = NULL;
|
|
uint16_t len = 0;
|
|
if (secfalse == norcow_get(EDEK_PVC_KEY, &val, &len)) {
|
|
init_wiped_storage();
|
|
storage_lock();
|
|
}
|
|
memzero(cached_keys, sizeof(cached_keys));
|
|
}
|
|
|
|
secbool storage_pin_fails_increase(void) {
|
|
if (sectrue != initialized) {
|
|
return secfalse;
|
|
}
|
|
return pin_fails_increase();
|
|
}
|
|
|
|
secbool storage_is_unlocked(void) {
|
|
if (sectrue != initialized) {
|
|
return secfalse;
|
|
}
|
|
|
|
return unlocked;
|
|
}
|
|
|
|
void storage_lock(void) {
|
|
unlocked = secfalse;
|
|
memzero(cached_keys, sizeof(cached_keys));
|
|
memzero(authentication_sum, sizeof(authentication_sum));
|
|
}
|
|
|
|
// Returns the storage version that was used to lock the storage.
|
|
static uint32_t get_lock_version(void) {
|
|
const void *val = NULL;
|
|
uint16_t len = 0;
|
|
if (sectrue != norcow_get(UNAUTH_VERSION_KEY, &val, &len) ||
|
|
len != sizeof(uint32_t)) {
|
|
handle_fault("no lock version");
|
|
}
|
|
|
|
return *(uint32_t *)val;
|
|
}
|
|
|
|
secbool check_storage_version(void) {
|
|
uint32_t version = 0;
|
|
uint16_t len = 0;
|
|
if (sectrue !=
|
|
storage_get_encrypted(VERSION_KEY, &version, sizeof(version), &len) ||
|
|
len != sizeof(version)) {
|
|
handle_fault("storage version check");
|
|
return secfalse;
|
|
}
|
|
|
|
if (version != get_lock_version()) {
|
|
handle_fault("storage version check");
|
|
return secfalse;
|
|
}
|
|
|
|
const void *storage_upgraded = NULL;
|
|
if (sectrue != norcow_get(STORAGE_UPGRADED_KEY, &storage_upgraded, &len) ||
|
|
len != sizeof(TRUE_WORD)) {
|
|
handle_fault("storage version check");
|
|
return secfalse;
|
|
}
|
|
|
|
if (version > norcow_active_version) {
|
|
// Attack: Storage was downgraded.
|
|
storage_wipe();
|
|
handle_fault("storage version check");
|
|
return secfalse;
|
|
} else if (version < norcow_active_version) {
|
|
// Storage was upgraded.
|
|
if (*(const uint32_t *)storage_upgraded != TRUE_WORD) {
|
|
// Attack: The upgrade process was bypassed.
|
|
storage_wipe();
|
|
handle_fault("storage version check");
|
|
return secfalse;
|
|
}
|
|
norcow_set(STORAGE_UPGRADED_KEY, &FALSE_WORD, sizeof(FALSE_WORD));
|
|
storage_set_encrypted(VERSION_KEY, &norcow_active_version,
|
|
sizeof(norcow_active_version));
|
|
norcow_set(UNAUTH_VERSION_KEY, &norcow_active_version,
|
|
sizeof(norcow_active_version));
|
|
} else {
|
|
// Standard operation. The storage was neither upgraded nor downgraded.
|
|
if (*(const uint32_t *)storage_upgraded != FALSE_WORD) {
|
|
// Attack: The upgrade process was launched when it shouldn't have been.
|
|
storage_wipe();
|
|
handle_fault("storage version check");
|
|
return secfalse;
|
|
}
|
|
}
|
|
return sectrue;
|
|
}
|
|
|
|
static secbool __wur decrypt_dek(const uint8_t *pin, size_t pin_len,
|
|
const uint8_t *ext_salt) {
|
|
// Read the storage salt, EDEK, ESAK and PIN verification code entry.
|
|
const void *buffer = NULL;
|
|
uint16_t len = 0;
|
|
if (sectrue != initialized ||
|
|
sectrue != norcow_get(EDEK_PVC_KEY, &buffer, &len) ||
|
|
len != STORAGE_SALT_SIZE + KEYS_SIZE + PVC_SIZE) {
|
|
handle_fault("no EDEK");
|
|
return secfalse;
|
|
}
|
|
|
|
const uint8_t *storage_salt = (const uint8_t *)buffer;
|
|
const uint8_t *ekeys = (const uint8_t *)buffer + STORAGE_SALT_SIZE;
|
|
const uint32_t *pvc = (const uint32_t *)buffer +
|
|
(STORAGE_SALT_SIZE + KEYS_SIZE) / sizeof(uint32_t);
|
|
_Static_assert(((STORAGE_SALT_SIZE + KEYS_SIZE) & 3) == 0, "PVC unaligned");
|
|
_Static_assert((PVC_SIZE & 3) == 0, "PVC size unaligned");
|
|
|
|
// Derive the key encryption key and IV.
|
|
uint8_t kek[SHA256_DIGEST_LENGTH] = {0};
|
|
uint8_t keiv[SHA256_DIGEST_LENGTH] = {0};
|
|
if (get_lock_version() >= 5) {
|
|
if (sectrue !=
|
|
derive_kek_unlock(pin, pin_len, storage_salt, ext_salt, kek)) {
|
|
return secfalse;
|
|
}
|
|
} else {
|
|
if (sectrue !=
|
|
derive_kek_unlock_v4(pin, pin_len, storage_salt, ext_salt, kek, keiv)) {
|
|
return secfalse;
|
|
};
|
|
}
|
|
|
|
uint8_t keys[KEYS_SIZE] = {0};
|
|
uint8_t tag[POLY1305_TAG_SIZE] __attribute__((aligned(sizeof(uint32_t))));
|
|
chacha20poly1305_ctx ctx = {0};
|
|
|
|
// Decrypt the data encryption key and the storage authentication key and
|
|
// check the PIN verification code.
|
|
rfc7539_init(&ctx, kek, keiv);
|
|
memzero(kek, sizeof(kek));
|
|
memzero(keiv, sizeof(keiv));
|
|
chacha20poly1305_decrypt(&ctx, ekeys, keys, KEYS_SIZE);
|
|
rfc7539_finish(&ctx, 0, KEYS_SIZE, tag);
|
|
memzero(&ctx, sizeof(ctx));
|
|
wait_random();
|
|
if (secequal32(tag, pvc, PVC_SIZE) != sectrue) {
|
|
memzero(keys, sizeof(keys));
|
|
memzero(tag, sizeof(tag));
|
|
return secfalse;
|
|
}
|
|
memcpy(cached_keys, keys, sizeof(keys));
|
|
memzero(keys, sizeof(keys));
|
|
memzero(tag, sizeof(tag));
|
|
return sectrue;
|
|
}
|
|
|
|
static void ensure_not_wipe_code(const uint8_t *pin, size_t pin_len) {
|
|
if (sectrue != is_not_wipe_code(pin, pin_len)) {
|
|
storage_wipe();
|
|
show_wipe_code_screen();
|
|
}
|
|
}
|
|
|
|
static secbool unlock(const uint8_t *pin, size_t pin_len,
|
|
const uint8_t *ext_salt) {
|
|
const uint8_t *unlock_pin = pin;
|
|
size_t unlock_pin_len = pin_len;
|
|
|
|
// In case of an upgrade from version 1 or 2, encode the PIN to the old
|
|
// format.
|
|
uint32_t legacy_pin = 0;
|
|
if (get_lock_version() <= 2) {
|
|
legacy_pin = pin_to_int(pin, pin_len);
|
|
unlock_pin = (const uint8_t *)&legacy_pin;
|
|
unlock_pin_len = sizeof(legacy_pin);
|
|
}
|
|
|
|
// In case of an upgrade from version 4 or earlier bump the total time of UI
|
|
// progress to account for the set_pin() call in storage_upgrade_unlocked().
|
|
if (get_lock_version() <= 4) {
|
|
ui_total_add(PIN_SET_MS);
|
|
}
|
|
|
|
// Now we can check for wipe code.
|
|
ensure_not_wipe_code(unlock_pin, unlock_pin_len);
|
|
|
|
// Get the pin failure counter
|
|
uint32_t ctr = 0;
|
|
if (sectrue != pin_get_fails(&ctr)) {
|
|
memzero(&legacy_pin, sizeof(legacy_pin));
|
|
return secfalse;
|
|
}
|
|
|
|
// Wipe storage if too many failures
|
|
wait_random();
|
|
if (ctr >= PIN_MAX_TRIES) {
|
|
storage_wipe();
|
|
show_pin_too_many_screen();
|
|
return secfalse;
|
|
}
|
|
|
|
// Sleep for 2^ctr - 1 seconds before checking the PIN.
|
|
uint32_t wait = (1 << ctr) - 1;
|
|
ui_total_add(wait * 1000);
|
|
ui_progress(0);
|
|
for (uint32_t i = 0; i < 10 * wait; i++) {
|
|
if (sectrue == ui_progress(100)) {
|
|
memzero(&legacy_pin, sizeof(legacy_pin));
|
|
return secfalse;
|
|
}
|
|
hal_delay(100);
|
|
}
|
|
|
|
// First, we increase PIN fail counter in storage, even before checking the
|
|
// PIN. If the PIN is correct, we reset the counter afterwards. If not, we
|
|
// check if this is the last allowed attempt.
|
|
if (sectrue != storage_pin_fails_increase()) {
|
|
return secfalse;
|
|
}
|
|
|
|
// Check that the PIN fail counter was incremented.
|
|
uint32_t ctr_ck = 0;
|
|
if (sectrue != pin_get_fails(&ctr_ck) || ctr + 1 != ctr_ck) {
|
|
handle_fault("PIN counter increment");
|
|
return secfalse;
|
|
}
|
|
|
|
// Check whether the entered PIN is correct.
|
|
if (sectrue != decrypt_dek(unlock_pin, unlock_pin_len, ext_salt)) {
|
|
memzero(&legacy_pin, sizeof(legacy_pin));
|
|
// Wipe storage if too many failures
|
|
wait_random();
|
|
if (ctr + 1 >= PIN_MAX_TRIES) {
|
|
storage_wipe();
|
|
show_pin_too_many_screen();
|
|
}
|
|
|
|
// Finish the countdown. Check for ui_rem underflow.
|
|
while (0 < ui_rem && ui_rem < ui_total) {
|
|
ui_message = WRONG_PIN_MSG;
|
|
if (sectrue == ui_progress(100)) {
|
|
return secfalse;
|
|
}
|
|
hal_delay(100);
|
|
}
|
|
|
|
return secfalse;
|
|
}
|
|
memzero(&legacy_pin, sizeof(legacy_pin));
|
|
|
|
// Check for storage upgrades that need to be performed after unlocking and
|
|
// check that the authenticated version number matches the unauthenticated
|
|
// version and norcow version.
|
|
// NOTE: This also initializes the authentication_sum by calling
|
|
// storage_get_encrypted() which calls auth_get().
|
|
if (sectrue != storage_upgrade_unlocked(pin, pin_len, ext_salt) ||
|
|
sectrue != check_storage_version()) {
|
|
return secfalse;
|
|
}
|
|
|
|
unlocked = sectrue;
|
|
|
|
// Finally set the counter to 0 to indicate success.
|
|
return pin_fails_reset();
|
|
}
|
|
|
|
secbool storage_unlock(const uint8_t *pin, size_t pin_len,
|
|
const uint8_t *ext_salt) {
|
|
if (sectrue != initialized || pin == NULL) {
|
|
return secfalse;
|
|
}
|
|
|
|
ui_total_init(PIN_VERIFY_MS);
|
|
if (pin_len == 0) {
|
|
if (ui_message == NO_MSG) {
|
|
ui_message = STARTING_MSG;
|
|
} else {
|
|
ui_message = PROCESSING_MSG;
|
|
}
|
|
} else {
|
|
ui_message = VERIFYING_PIN_MSG;
|
|
}
|
|
return unlock(pin, pin_len, ext_salt);
|
|
}
|
|
|
|
/*
|
|
* Finds the encrypted data stored under key and writes its length to len.
|
|
* If val_dest is not NULL and max_len >= len, then the data is decrypted
|
|
* to val_dest using cached_dek as the decryption key.
|
|
*/
|
|
static secbool storage_get_encrypted(const uint16_t key, void *val_dest,
|
|
const uint16_t max_len, uint16_t *len) {
|
|
const void *val_stored = NULL;
|
|
|
|
if (sectrue != auth_get(key, &val_stored, len)) {
|
|
return secfalse;
|
|
}
|
|
|
|
if (*len < CHACHA20_IV_SIZE + POLY1305_TAG_SIZE) {
|
|
handle_fault("ciphertext length check");
|
|
return secfalse;
|
|
}
|
|
*len -= CHACHA20_IV_SIZE + POLY1305_TAG_SIZE;
|
|
|
|
if (val_dest == NULL) {
|
|
return sectrue;
|
|
}
|
|
|
|
if (*len > max_len) {
|
|
return secfalse;
|
|
}
|
|
|
|
const uint8_t *iv = (const uint8_t *)val_stored;
|
|
const uint8_t *tag_stored =
|
|
(const uint8_t *)val_stored + CHACHA20_IV_SIZE + *len;
|
|
const uint8_t *ciphertext = (const uint8_t *)val_stored + CHACHA20_IV_SIZE;
|
|
uint8_t tag_computed[POLY1305_TAG_SIZE] = {0};
|
|
chacha20poly1305_ctx ctx = {0};
|
|
rfc7539_init(&ctx, cached_dek, iv);
|
|
rfc7539_auth(&ctx, (const uint8_t *)&key, sizeof(key));
|
|
chacha20poly1305_decrypt(&ctx, ciphertext, (uint8_t *)val_dest, *len);
|
|
rfc7539_finish(&ctx, sizeof(key), *len, tag_computed);
|
|
memzero(&ctx, sizeof(ctx));
|
|
|
|
// Verify authentication tag.
|
|
if (secequal(tag_computed, tag_stored, POLY1305_TAG_SIZE) != sectrue) {
|
|
memzero(val_dest, max_len);
|
|
memzero(tag_computed, sizeof(tag_computed));
|
|
handle_fault("authentication tag check");
|
|
return secfalse;
|
|
}
|
|
|
|
memzero(tag_computed, sizeof(tag_computed));
|
|
return sectrue;
|
|
}
|
|
|
|
secbool storage_has(const uint16_t key) {
|
|
uint16_t len = 0;
|
|
return storage_get(key, NULL, 0, &len);
|
|
}
|
|
|
|
/*
|
|
* Finds the data stored under key and writes its length to len. If val_dest is
|
|
* not NULL and max_len >= len, then the data is copied to val_dest.
|
|
*/
|
|
secbool storage_get(const uint16_t key, void *val_dest, const uint16_t max_len,
|
|
uint16_t *len) {
|
|
const uint8_t app = key >> 8;
|
|
// APP == 0 is reserved for PIN related values
|
|
if (sectrue != initialized || app == APP_STORAGE) {
|
|
return secfalse;
|
|
}
|
|
|
|
// If the top bit of APP is set, then the value is not encrypted and can be
|
|
// read from a locked device.
|
|
if ((app & FLAG_PUBLIC) != 0) {
|
|
const void *val_stored = NULL;
|
|
if (sectrue != norcow_get(key, &val_stored, len)) {
|
|
return secfalse;
|
|
}
|
|
if (val_dest == NULL) {
|
|
return sectrue;
|
|
}
|
|
if (*len > max_len) {
|
|
return secfalse;
|
|
}
|
|
memcpy(val_dest, val_stored, *len);
|
|
return sectrue;
|
|
} else {
|
|
if (sectrue != unlocked) {
|
|
return secfalse;
|
|
}
|
|
return storage_get_encrypted(key, val_dest, max_len, len);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Encrypts the data at val using cached_dek as the encryption key and stores
|
|
* the ciphertext under key.
|
|
*/
|
|
static secbool storage_set_encrypted(const uint16_t key, const void *val,
|
|
const uint16_t len) {
|
|
if (len > UINT16_MAX - CHACHA20_IV_SIZE - POLY1305_TAG_SIZE) {
|
|
return secfalse;
|
|
}
|
|
|
|
// Preallocate space on the flash storage.
|
|
if (sectrue !=
|
|
auth_set(key, NULL, CHACHA20_IV_SIZE + POLY1305_TAG_SIZE + len)) {
|
|
return secfalse;
|
|
}
|
|
|
|
// Write the IV to the flash.
|
|
uint8_t buffer[CHACHA20_BLOCK_SIZE] = {0};
|
|
random_buffer(buffer, CHACHA20_IV_SIZE);
|
|
|
|
if (sectrue != norcow_update_bytes(key, buffer, CHACHA20_IV_SIZE)) {
|
|
return secfalse;
|
|
}
|
|
// Encrypt all blocks except for the last one.
|
|
chacha20poly1305_ctx ctx = {0};
|
|
rfc7539_init(&ctx, cached_dek, buffer);
|
|
rfc7539_auth(&ctx, (const uint8_t *)&key, sizeof(key));
|
|
size_t i = 0;
|
|
for (i = 0; i + CHACHA20_BLOCK_SIZE < len; i += CHACHA20_BLOCK_SIZE) {
|
|
chacha20poly1305_encrypt(&ctx, ((const uint8_t *)val) + i, buffer,
|
|
CHACHA20_BLOCK_SIZE);
|
|
if (sectrue != norcow_update_bytes(key, buffer, CHACHA20_BLOCK_SIZE)) {
|
|
memzero(&ctx, sizeof(ctx));
|
|
memzero(buffer, sizeof(buffer));
|
|
return secfalse;
|
|
}
|
|
}
|
|
|
|
// Encrypt final block and compute message authentication tag.
|
|
chacha20poly1305_encrypt(&ctx, ((const uint8_t *)val) + i, buffer, len - i);
|
|
secbool ret = norcow_update_bytes(key, buffer, len - i);
|
|
if (sectrue == ret) {
|
|
rfc7539_finish(&ctx, sizeof(key), len, buffer);
|
|
ret = norcow_update_bytes(key, buffer, POLY1305_TAG_SIZE);
|
|
}
|
|
memzero(&ctx, sizeof(ctx));
|
|
memzero(buffer, sizeof(buffer));
|
|
return ret;
|
|
}
|
|
|
|
secbool storage_set(const uint16_t key, const void *val, const uint16_t len) {
|
|
const uint8_t app = key >> 8;
|
|
|
|
// APP == 0 is reserved for PIN related values
|
|
if (sectrue != initialized || app == APP_STORAGE) {
|
|
return secfalse;
|
|
}
|
|
|
|
if (sectrue != unlocked && (app & FLAGS_WRITE) != FLAGS_WRITE) {
|
|
return secfalse;
|
|
}
|
|
|
|
secbool ret = secfalse;
|
|
if ((app & FLAG_PUBLIC) != 0) {
|
|
ret = norcow_set(key, val, len);
|
|
} else {
|
|
ret = storage_set_encrypted(key, val, len);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
secbool storage_delete(const uint16_t key) {
|
|
const uint8_t app = key >> 8;
|
|
|
|
// APP == 0 is reserved for storage related values
|
|
if (sectrue != initialized || app == APP_STORAGE) {
|
|
return secfalse;
|
|
}
|
|
|
|
if (sectrue != unlocked && (app & FLAGS_WRITE) != FLAGS_WRITE) {
|
|
return secfalse;
|
|
}
|
|
|
|
secbool ret = norcow_delete(key);
|
|
if (sectrue == ret) {
|
|
ret = auth_update(key);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
secbool storage_set_counter(const uint16_t key, const uint32_t count) {
|
|
const uint8_t app = key >> 8;
|
|
if ((app & FLAG_PUBLIC) == 0) {
|
|
return secfalse;
|
|
}
|
|
|
|
// APP == 0 is reserved for PIN related values
|
|
if (sectrue != initialized || app == APP_STORAGE) {
|
|
return secfalse;
|
|
}
|
|
|
|
if (sectrue != unlocked && (app & FLAGS_WRITE) != FLAGS_WRITE) {
|
|
return secfalse;
|
|
}
|
|
|
|
return norcow_set_counter(key, count);
|
|
}
|
|
|
|
secbool storage_next_counter(const uint16_t key, uint32_t *count) {
|
|
const uint8_t app = key >> 8;
|
|
|
|
if ((app & FLAG_PUBLIC) == 0) {
|
|
return secfalse;
|
|
}
|
|
|
|
// APP == 0 is reserved for PIN related values
|
|
if (sectrue != initialized || app == APP_STORAGE ||
|
|
(app & FLAG_PUBLIC) == 0) {
|
|
return secfalse;
|
|
}
|
|
|
|
if (sectrue != unlocked && (app & FLAGS_WRITE) != FLAGS_WRITE) {
|
|
return secfalse;
|
|
}
|
|
|
|
return norcow_next_counter(key, count);
|
|
}
|
|
|
|
secbool storage_has_pin(void) {
|
|
if (sectrue != initialized) {
|
|
return secfalse;
|
|
}
|
|
|
|
const void *val = NULL;
|
|
uint16_t len = 0;
|
|
if (sectrue != norcow_get(PIN_NOT_SET_KEY, &val, &len) ||
|
|
(len > 0 && *(uint8_t *)val != FALSE_BYTE)) {
|
|
return secfalse;
|
|
}
|
|
return sectrue;
|
|
}
|
|
|
|
uint32_t storage_get_pin_rem(void) {
|
|
if (sectrue != initialized) {
|
|
return 0;
|
|
}
|
|
|
|
uint32_t ctr_mcu = 0;
|
|
if (sectrue != pin_get_fails(&ctr_mcu)) {
|
|
return 0;
|
|
}
|
|
|
|
#if USE_OPTIGA
|
|
// Synchronize counters in case they diverged.
|
|
uint32_t ctr_optiga = 0;
|
|
optiga_result ret = OPTIGA_SUCCESS;
|
|
if (get_lock_version() >= 5) {
|
|
ret = optiga_pin_get_fails(&ctr_optiga);
|
|
} else {
|
|
ret = optiga_pin_get_fails_v4(&ctr_optiga);
|
|
}
|
|
ensure(ret == OPTIGA_SUCCESS ? sectrue : secfalse,
|
|
"optiga_pin_get_fails failed");
|
|
|
|
while (ctr_mcu < ctr_optiga) {
|
|
storage_pin_fails_increase();
|
|
ctr_mcu++;
|
|
}
|
|
|
|
if (ctr_optiga < ctr_mcu) {
|
|
if (get_lock_version() >= 5) {
|
|
ret = optiga_pin_fails_increase(ctr_mcu - ctr_optiga);
|
|
} else {
|
|
ret = optiga_pin_fails_increase_v4(ctr_mcu - ctr_optiga);
|
|
}
|
|
ensure(ret == OPTIGA_SUCCESS ? sectrue : secfalse,
|
|
"optiga_pin_fails_increase failed");
|
|
}
|
|
#endif
|
|
|
|
return PIN_MAX_TRIES - ctr_mcu;
|
|
}
|
|
|
|
secbool storage_change_pin(const uint8_t *oldpin, size_t oldpin_len,
|
|
const uint8_t *newpin, size_t newpin_len,
|
|
const uint8_t *old_ext_salt,
|
|
const uint8_t *new_ext_salt) {
|
|
if (sectrue != initialized || oldpin == NULL || newpin == NULL) {
|
|
return secfalse;
|
|
}
|
|
|
|
ui_total_init(PIN_VERIFY_MS + PIN_SET_MS);
|
|
ui_message =
|
|
(oldpin_len != 0 && newpin_len == 0) ? VERIFYING_PIN_MSG : PROCESSING_MSG;
|
|
|
|
if (sectrue != unlock(oldpin, oldpin_len, old_ext_salt)) {
|
|
return secfalse;
|
|
}
|
|
|
|
// Fail if the new PIN is the same as the wipe code.
|
|
if (sectrue != is_not_wipe_code(newpin, newpin_len)) {
|
|
return secfalse;
|
|
}
|
|
|
|
return set_pin(newpin, newpin_len, new_ext_salt);
|
|
}
|
|
|
|
void storage_ensure_not_wipe_code(const uint8_t *pin, size_t pin_len) {
|
|
// If we are unlocking the storage during upgrade from version 2 or lower,
|
|
// then encode the PIN to the old format.
|
|
uint32_t legacy_pin = 0;
|
|
if (get_lock_version() <= 2) {
|
|
legacy_pin = pin_to_int(pin, pin_len);
|
|
pin = (const uint8_t *)&legacy_pin;
|
|
pin_len = sizeof(legacy_pin);
|
|
}
|
|
|
|
ensure_not_wipe_code(pin, pin_len);
|
|
memzero(&legacy_pin, sizeof(legacy_pin));
|
|
}
|
|
|
|
secbool storage_has_wipe_code(void) {
|
|
if (sectrue != initialized || sectrue != unlocked) {
|
|
return secfalse;
|
|
}
|
|
|
|
return is_not_wipe_code(WIPE_CODE_EMPTY, WIPE_CODE_EMPTY_LEN);
|
|
}
|
|
|
|
secbool storage_change_wipe_code(const uint8_t *pin, size_t pin_len,
|
|
const uint8_t *ext_salt,
|
|
const uint8_t *wipe_code,
|
|
size_t wipe_code_len) {
|
|
if (sectrue != initialized || pin == NULL || wipe_code == NULL ||
|
|
(pin_len != 0 && pin_len == wipe_code_len &&
|
|
memcmp(pin, wipe_code, pin_len) == 0)) {
|
|
return secfalse;
|
|
}
|
|
|
|
ui_total_init(PIN_VERIFY_MS);
|
|
ui_message =
|
|
(pin_len != 0 && wipe_code_len == 0) ? VERIFYING_PIN_MSG : PROCESSING_MSG;
|
|
|
|
secbool ret = secfalse;
|
|
if (sectrue == unlock(pin, pin_len, ext_salt)) {
|
|
ret = set_wipe_code(wipe_code, wipe_code_len);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
void storage_wipe(void) {
|
|
norcow_wipe();
|
|
norcow_active_version = NORCOW_VERSION;
|
|
memzero(authentication_sum, sizeof(authentication_sum));
|
|
memzero(cached_keys, sizeof(cached_keys));
|
|
init_wiped_storage();
|
|
}
|
|
|
|
static void __handle_fault(const char *msg, const char *file, int line) {
|
|
CONFIDENTIAL static secbool in_progress = secfalse;
|
|
|
|
// If fault handling is already in progress, then we are probably facing a
|
|
// fault injection attack, so wipe.
|
|
if (secfalse != in_progress) {
|
|
storage_wipe();
|
|
__fatal_error(msg, file, line);
|
|
}
|
|
|
|
// We use the PIN fail counter as a fault counter. Increment the counter,
|
|
// check that it was incremented and halt.
|
|
in_progress = sectrue;
|
|
uint32_t ctr = 0;
|
|
if (sectrue != pin_get_fails(&ctr)) {
|
|
storage_wipe();
|
|
__fatal_error(msg, file, line);
|
|
}
|
|
|
|
if (sectrue != storage_pin_fails_increase()) {
|
|
storage_wipe();
|
|
__fatal_error(msg, file, line);
|
|
}
|
|
|
|
uint32_t ctr_new = 0;
|
|
if (sectrue != pin_get_fails(&ctr_new) || ctr + 1 != ctr_new) {
|
|
storage_wipe();
|
|
}
|
|
__fatal_error(msg, file, line);
|
|
}
|
|
|
|
/*
|
|
* Reads the PIN fail counter in version 0 format. Returns the current number of
|
|
* failed PIN entries.
|
|
*/
|
|
static secbool v0_pin_get_fails(uint32_t *ctr) {
|
|
const uint16_t V0_PIN_FAIL_KEY = 0x0001;
|
|
// The PIN_FAIL_KEY points to an area of words, initialized to
|
|
// 0xffffffff (meaning no PIN failures). The first non-zero word
|
|
// in this area is the current PIN failure counter. If PIN_FAIL_KEY
|
|
// has no configuration or is empty, the PIN failure counter is 0.
|
|
// We rely on the fact that flash allows to clear bits and we clear one
|
|
// bit to indicate PIN failure. On success, the word is set to 0,
|
|
// indicating that the next word is the PIN failure counter.
|
|
|
|
// Find the current pin failure counter
|
|
const void *val = NULL;
|
|
uint16_t len = 0;
|
|
if (secfalse != norcow_get(V0_PIN_FAIL_KEY, &val, &len)) {
|
|
for (unsigned int i = 0; i < len / sizeof(uint32_t); i++) {
|
|
uint32_t word = ((const uint32_t *)val)[i];
|
|
if (word != 0) {
|
|
*ctr = hamming_weight(~word);
|
|
return sectrue;
|
|
}
|
|
}
|
|
}
|
|
|
|
// No PIN failures
|
|
*ctr = 0;
|
|
return sectrue;
|
|
}
|
|
|
|
// Legacy conversion of PIN to the uint32 scheme that was used prior to storage
|
|
// version 3.
|
|
static uint32_t pin_to_int(const uint8_t *pin, size_t pin_len) {
|
|
if (pin_len > V0_MAX_PIN_LEN) {
|
|
return 0;
|
|
}
|
|
|
|
uint32_t val = 1;
|
|
size_t i = 0;
|
|
for (i = 0; i < pin_len; ++i) {
|
|
if (pin[i] < '0' || pin[i] > '9') {
|
|
return 0;
|
|
}
|
|
val = 10 * val + pin[i] - '0';
|
|
}
|
|
|
|
return val;
|
|
}
|
|
|
|
// Legacy conversion of PIN from the uint32 scheme that was used prior to
|
|
// storage version 3.
|
|
static size_t int_to_pin(uint32_t val, uint8_t pin[V0_MAX_PIN_LEN]) {
|
|
size_t i = V0_MAX_PIN_LEN;
|
|
while (val > 9) {
|
|
i -= 1;
|
|
pin[i] = (val % 10) + '0';
|
|
val /= 10;
|
|
}
|
|
|
|
if (val != 1) {
|
|
return 0;
|
|
}
|
|
|
|
memmove(pin, &pin[i], V0_MAX_PIN_LEN - i);
|
|
return V0_MAX_PIN_LEN - i;
|
|
}
|
|
|
|
// Legacy conversion of wipe code from the uint32 scheme that was used prior to
|
|
// storage version 3.
|
|
static char *int_to_wipe_code(uint32_t val) {
|
|
CONFIDENTIAL static char wipe_code[V0_MAX_PIN_LEN + 1] = {0};
|
|
size_t pos = sizeof(wipe_code) - 1;
|
|
wipe_code[pos] = '\0';
|
|
|
|
// Handle the special representation of an empty wipe code.
|
|
if (val == V2_WIPE_CODE_EMPTY) {
|
|
return &wipe_code[pos];
|
|
}
|
|
|
|
if (val == V0_PIN_EMPTY) {
|
|
return NULL;
|
|
}
|
|
|
|
// Convert a non-empty wipe code.
|
|
while (val != 1) {
|
|
if (pos == 0) {
|
|
return NULL;
|
|
}
|
|
pos--;
|
|
wipe_code[pos] = '0' + (val % 10);
|
|
val /= 10;
|
|
}
|
|
return &wipe_code[pos];
|
|
}
|
|
|
|
static secbool storage_upgrade(void) {
|
|
// Storage version 0: plaintext norcow
|
|
// Storage version 1: encrypted norcow
|
|
// Storage version 2: adds 9 digit wipe code
|
|
// Storage version 3: adds variable length PIN and wipe code
|
|
// Storage version 4: changes data structure of encrypted data
|
|
// Storage version 5: unifies KEK derivation for non-Optiga and Optiga
|
|
|
|
const uint16_t V0_PIN_KEY = 0x0000;
|
|
const uint16_t V0_PIN_FAIL_KEY = 0x0001;
|
|
uint16_t key = 0;
|
|
uint16_t len = 0;
|
|
const void *val = NULL;
|
|
secbool ret = secfalse;
|
|
|
|
if (norcow_active_version == 0) {
|
|
random_buffer(cached_keys, sizeof(cached_keys));
|
|
|
|
// Initialize the storage authentication tag.
|
|
auth_init();
|
|
|
|
// Set the new storage version number.
|
|
uint32_t version = NORCOW_VERSION;
|
|
if (sectrue !=
|
|
storage_set_encrypted(VERSION_KEY, &version, sizeof(version))) {
|
|
return secfalse;
|
|
}
|
|
|
|
// Set EDEK_PVC_KEY and PIN_NOT_SET_KEY.
|
|
ui_total_init(PIN_SET_MS);
|
|
ui_message = PROCESSING_MSG;
|
|
uint8_t pin[V0_MAX_PIN_LEN] = {0};
|
|
size_t pin_len = 0;
|
|
secbool found = norcow_get(V0_PIN_KEY, &val, &len);
|
|
if (sectrue == found && *(const uint32_t *)val != V0_PIN_EMPTY) {
|
|
pin_len = int_to_pin(*(const uint32_t *)val, pin);
|
|
}
|
|
set_pin(pin, pin_len, NULL);
|
|
memzero(pin, sizeof(pin));
|
|
|
|
// Convert PIN failure counter.
|
|
uint32_t fails = 0;
|
|
v0_pin_get_fails(&fails);
|
|
pin_logs_init(fails);
|
|
|
|
// Copy the remaining entries (encrypting the protected ones).
|
|
uint32_t offset = 0;
|
|
while (sectrue == norcow_get_next(&offset, &key, &val, &len)) {
|
|
if (key == V0_PIN_KEY || key == V0_PIN_FAIL_KEY) {
|
|
continue;
|
|
}
|
|
|
|
if (((key >> 8) & FLAG_PUBLIC) != 0) {
|
|
ret = norcow_set(key, val, len);
|
|
} else {
|
|
ret = storage_set_encrypted(key, val, len);
|
|
}
|
|
|
|
if (sectrue != ret) {
|
|
return secfalse;
|
|
}
|
|
}
|
|
|
|
unlocked = secfalse;
|
|
memzero(cached_keys, sizeof(cached_keys));
|
|
} else if (norcow_active_version < 4) {
|
|
// Change data structure for encrypted entries.
|
|
uint32_t offset = 0;
|
|
while (sectrue == norcow_get_next(&offset, &key, &val, &len)) {
|
|
const uint8_t app = key >> 8;
|
|
if (((app & FLAG_PUBLIC) == 0) &&
|
|
(app != APP_STORAGE || key == VERSION_KEY)) {
|
|
const uint8_t *iv = (const uint8_t *)val;
|
|
const uint8_t *tag = (const uint8_t *)val + CHACHA20_IV_SIZE;
|
|
const uint8_t *ciphertext =
|
|
(const uint8_t *)val + CHACHA20_IV_SIZE + POLY1305_TAG_SIZE;
|
|
const size_t ciphertext_len =
|
|
len - CHACHA20_IV_SIZE - POLY1305_TAG_SIZE;
|
|
if (sectrue != norcow_set(key, NULL, len) ||
|
|
sectrue != norcow_update_bytes(key, iv, CHACHA20_IV_SIZE) ||
|
|
sectrue != norcow_update_bytes(key, ciphertext, ciphertext_len) ||
|
|
sectrue != norcow_update_bytes(key, tag, POLY1305_TAG_SIZE)) {
|
|
return secfalse;
|
|
}
|
|
} else {
|
|
if (sectrue != norcow_set(key, val, len)) {
|
|
return secfalse;
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
// Copy all entries.
|
|
uint32_t offset = 0;
|
|
while (sectrue == norcow_get_next(&offset, &key, &val, &len)) {
|
|
if (sectrue != norcow_set(key, val, len)) {
|
|
return secfalse;
|
|
}
|
|
}
|
|
}
|
|
|
|
// Set wipe code.
|
|
if (norcow_active_version <= 1) {
|
|
if (sectrue != set_wipe_code(WIPE_CODE_EMPTY, WIPE_CODE_EMPTY_LEN)) {
|
|
return secfalse;
|
|
}
|
|
}
|
|
|
|
if (norcow_active_version <= 2) {
|
|
// Set UNAUTH_VERSION_KEY, so that it matches VERSION_KEY.
|
|
uint32_t version = 1;
|
|
|
|
// The storage may have gone through an upgrade to version 2 without having
|
|
// been unlocked. We can tell by looking at STORAGE_UPGRADED_KEY.
|
|
if (sectrue == norcow_get(STORAGE_UPGRADED_KEY, &val, &len) &&
|
|
len == sizeof(FALSE_WORD) && *((uint32_t *)val) == FALSE_WORD) {
|
|
version = 2;
|
|
}
|
|
|
|
// Version 0 upgrades directly to the latest.
|
|
if (norcow_active_version == 0) {
|
|
version = NORCOW_VERSION;
|
|
}
|
|
|
|
if (sectrue != norcow_set(UNAUTH_VERSION_KEY, &version, sizeof(version))) {
|
|
return secfalse;
|
|
}
|
|
}
|
|
|
|
if (norcow_active_version == 0) {
|
|
// Version 0 upgrades directly to the latest.
|
|
norcow_set(STORAGE_UPGRADED_KEY, &FALSE_WORD, sizeof(FALSE_WORD));
|
|
} else {
|
|
norcow_set(STORAGE_UPGRADED_KEY, &TRUE_WORD, sizeof(TRUE_WORD));
|
|
}
|
|
|
|
norcow_active_version = NORCOW_VERSION;
|
|
return norcow_upgrade_finish();
|
|
}
|
|
|
|
static secbool storage_upgrade_unlocked(const uint8_t *pin, size_t pin_len,
|
|
const uint8_t *ext_salt) {
|
|
uint32_t version = 0;
|
|
uint16_t len = 0;
|
|
if (sectrue !=
|
|
storage_get_encrypted(VERSION_KEY, &version, sizeof(version), &len) ||
|
|
len != sizeof(version)) {
|
|
handle_fault("storage version check");
|
|
return secfalse;
|
|
}
|
|
|
|
secbool ret = sectrue;
|
|
if (version <= 4) {
|
|
// Upgrade EDEK_PVC_KEY from the uint32 PIN scheme (versions 1 and 2) or
|
|
// from the version 3 and 4 variable-length PIN scheme to the unified PIN
|
|
// scheme.
|
|
if (sectrue != set_pin(pin, pin_len, ext_salt)) {
|
|
return secfalse;
|
|
}
|
|
}
|
|
|
|
if (version == 2) {
|
|
// Upgrade WIPE_CODE_DATA_KEY from the old uint32 scheme to the new
|
|
// variable-length scheme.
|
|
const void *wipe_code_data = NULL;
|
|
if (sectrue != norcow_get(WIPE_CODE_DATA_KEY, &wipe_code_data, &len) ||
|
|
len < sizeof(uint32_t)) {
|
|
handle_fault("no wipe code");
|
|
return secfalse;
|
|
}
|
|
|
|
char *wipe_code = int_to_wipe_code(*(uint32_t *)wipe_code_data);
|
|
if (wipe_code == NULL) {
|
|
handle_fault("invalid wipe code");
|
|
return secfalse;
|
|
}
|
|
|
|
size_t wipe_code_len = strnlen(wipe_code, V0_MAX_PIN_LEN);
|
|
ret = set_wipe_code((const uint8_t *)wipe_code, wipe_code_len);
|
|
memzero(wipe_code, wipe_code_len);
|
|
}
|
|
|
|
return ret;
|
|
}
|