wolfcaam_init.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605
  1. /*
  2. * Copyright (C) 2006-2020 wolfSSL Inc.
  3. *
  4. * This file is part of wolfSSL.
  5. *
  6. * wolfSSL is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License as published by
  8. * the Free Software Foundation; either version 2 of the License, or
  9. * (at your option) any later version.
  10. *
  11. * wolfSSL is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. * GNU General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU General Public License
  17. * along with this program; if not, write to the Free Software
  18. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
  19. */
  20. #ifdef HAVE_CONFIG_H
  21. #include <config.h>
  22. #endif
  23. #include <wolfssl/wolfcrypt/settings.h>
  24. #if defined(WOLFSSL_IMX6_CAAM) || defined(WOLFSSL_IMX6_CAAM_RNG) || \
  25. defined(WOLFSSL_IMX6UL_CAAM) || defined(WOLFSSL_IMX6_CAAM_BLOB)
  26. #include <wolfssl/wolfcrypt/logging.h>
  27. #include <wolfssl/wolfcrypt/error-crypt.h>
  28. #include <wolfssl/wolfcrypt/port/caam/wolfcaam.h>
  29. #define WC_CAAM_BLOB_SZ 48
  30. /* determine which porting header to include */
  31. #if defined(__INTEGRITY) || defined(INTEGRITY)
  32. #ifndef WC_CAAM_PASSWORD
  33. #define WC_CAAM_PASSWORD "!systempassword"
  34. #endif
  35. #include <INTEGRITY.h>
  36. static IODevice caam = NULLIODevice;
  37. #define CAAM_SEND_REQUEST(type, sz, arg, buf) \
  38. SynchronousSendIORequest(caam, (type), (const Value*)(arg), (buf))
  39. #endif
  40. #if defined(__INTEGRITY) || defined(INTEGRITY)
  41. /* Allow runtime setting for CAAM IODevice in case user wants to use password
  42. * at run time.
  43. *
  44. * returns 0 on success
  45. *
  46. * NOTE this is how IODevice is defined in INTEGRITY "typedef struct
  47. * IODeviceStruct *IODevice;"
  48. */
  49. int wc_caamSetResource(IODevice ioDev)
  50. {
  51. WOLFSSL_MSG("Setting CAAM driver");
  52. caam = ioDev;
  53. return 0;
  54. }
  55. #endif
  56. /* used to route crypto operations through crypto callback */
  57. static int wc_CAAM_router(int devId, wc_CryptoInfo* info, void* ctx)
  58. {
  59. int ret = CRYPTOCB_UNAVAILABLE;
  60. (void)ctx;
  61. (void)devId;
  62. switch (info->algo_type) {
  63. case WC_ALGO_TYPE_PK:
  64. switch (info->pk.type) {
  65. case WC_PK_TYPE_ECDSA_SIGN:
  66. ret = wc_CAAM_EccSign(info->pk.eccsign.in,
  67. info->pk.eccsign.inlen, info->pk.eccsign.out,
  68. info->pk.eccsign.outlen, info->pk.eccsign.rng,
  69. info->pk.eccsign.key);
  70. break;
  71. case WC_PK_TYPE_ECDSA_VERIFY:
  72. ret = wc_CAAM_EccVerify(info->pk.eccverify.sig,
  73. info->pk.eccverify.siglen, info->pk.eccverify.hash,
  74. info->pk.eccverify.hashlen, info->pk.eccverify.res,
  75. info->pk.eccverify.key);
  76. break;
  77. case WC_PK_TYPE_EC_KEYGEN:
  78. ret = wc_CAAM_MakeEccKey(info->pk.eckg.rng,
  79. info->pk.eckg.size, info->pk.eckg.key,
  80. info->pk.eckg.curveId);
  81. break;
  82. case WC_PK_TYPE_ECDH:
  83. ret = wc_CAAM_Ecdh(info->pk.ecdh.private_key,
  84. info->pk.ecdh.public_key, info->pk.ecdh.out,
  85. info->pk.ecdh.outlen);
  86. break;
  87. case WC_PK_TYPE_EC_CHECK_PRIV_KEY:
  88. ret = wc_CAAM_EccCheckPrivKey(info->pk.ecc_check.key,
  89. info->pk.ecc_check.pubKey,
  90. info->pk.ecc_check.pubKeySz);
  91. break;
  92. default:
  93. WOLFSSL_MSG("unsupported public key operation");
  94. }
  95. break;
  96. case WC_ALGO_TYPE_CMAC:
  97. #if defined(WOLFSSL_CMAC) && !defined(NO_AES) && \
  98. defined(WOLFSSL_AES_DIRECT)
  99. ret = wc_CAAM_Cmac(info->cmac.cmac, info->cmac.key,
  100. info->cmac.keySz, info->cmac.in, info->cmac.inSz,
  101. info->cmac.out, info->cmac.outSz, info->cmac.type,
  102. info->cmac.ctx);
  103. #else
  104. WOLFSSL_MSG("CMAC not compiled in");
  105. ret = NOT_COMPILED_IN;
  106. #endif
  107. break;
  108. case WC_ALGO_TYPE_NONE:
  109. case WC_ALGO_TYPE_HASH:
  110. case WC_ALGO_TYPE_CIPHER:
  111. case WC_ALGO_TYPE_RNG:
  112. case WC_ALGO_TYPE_SEED:
  113. case WC_ALGO_TYPE_HMAC:
  114. default:
  115. WOLFSSL_MSG("Not implemented yet with CAAM");
  116. }
  117. return ret;
  118. }
  119. /* Check hardware support
  120. *
  121. * returns 0 on success
  122. */
  123. int wc_caamInit(void)
  124. {
  125. int ret;
  126. WOLFSSL_MSG("Starting interface with CAAM driver");
  127. if (CAAM_INIT_INTERFACE() != 0) {
  128. WOLFSSL_MSG("Error initializing CAAM");
  129. return -1;
  130. }
  131. #if 0
  132. /* check that for implemented modules
  133. * bits 0-3 AES, 4-7 DES, 12-15 Hashing , 16-19 RNG, 28-31 public key module */
  134. reg = WC_CAAM_READ(CAMM_SUPPORT_LS);
  135. #ifndef WC_NO_RNG
  136. if (((reg & 0x000F0000) >> 16) > 0) {
  137. WOLFSSL_MSG("Found CAAM RNG hardware module");
  138. if ((WC_CAAM_READ(CAAM_RTMCTL) & 0x40000001) != 0x40000001) {
  139. WOLFSSL_MSG("Error CAAM RNG has not been set up");
  140. }
  141. }
  142. #endif
  143. #ifndef NO_SHA256
  144. if ((reg & 0x0000F000) > 0) {
  145. WOLFSSL_MSG("Found CAAM MDHA module");
  146. }
  147. else {
  148. WOLFSSL_MSG("Hashing not supported by CAAM");
  149. return WC_HW_E;
  150. }
  151. #endif
  152. #ifndef NO_AES
  153. if ((reg & 0x0000000F) > 0) {
  154. WOLFSSL_MSG("Found CAAM AES module");
  155. }
  156. else {
  157. WOLFSSL_MSG("AES not supported by CAAM");
  158. return WC_HW_E;
  159. }
  160. #endif
  161. #ifdef HAVE_ECC
  162. if ((reg & 0xF0000000) > 0) {
  163. WOLFSSL_MSG("Found CAAM Public Key module");
  164. }
  165. else {
  166. WOLFSSL_MSG("Public Key not supported by CAAM");
  167. }
  168. #endif
  169. #endif
  170. (void)ret;
  171. ret = wc_CryptoDev_RegisterDevice(WOLFSSL_CAAM_DEVID, wc_CAAM_router, NULL);
  172. return 0;
  173. }
  174. /* free up all resources used for CAAM */
  175. int wc_caamFree(void)
  176. {
  177. CAAM_FREE_INTERFACE();
  178. return 0;
  179. }
  180. #ifndef WOLFSSL_QNX_CAAM
  181. word32 wc_caamReadRegister(word32 reg)
  182. {
  183. word32 out = 0;
  184. if (caam == NULLIODevice) {
  185. WOLFSSL_MSG("Error CAAM IODevice not found! Bad password?");
  186. return 0;
  187. }
  188. if (ReadIODeviceRegister(caam, reg, &out) != Success) {
  189. WOLFSSL_MSG("Error reading register\n");
  190. }
  191. return (word32)out;
  192. }
  193. void wc_caamWriteRegister(word32 reg, word32 value)
  194. {
  195. if (caam == NULLIODevice) {
  196. WOLFSSL_MSG("Error CAAM IODevice not found! Bad password?");
  197. return;
  198. }
  199. if (WriteIODeviceRegister(caam, reg, value) != Success) {
  200. WOLFSSL_MSG("Error writing to register\n");
  201. }
  202. }
  203. #endif
  204. /* return 0 on success and WC_HW_E on failure. Can also return WC_HW_WAIT_E
  205. * in the case that the driver is waiting for a resource or RAN_BLOCK_E if
  206. * waiting for entropy. */
  207. int wc_caamAddAndWait(CAAM_BUFFER* buf, int sz, word32 arg[4], word32 type)
  208. {
  209. int ret;
  210. #ifdef DEBUG_WOLFSSL
  211. static int wait = 0;
  212. #endif
  213. #ifndef WOLFSSL_QNX_CAAM
  214. if (caam == NULLIODevice) {
  215. WOLFSSL_MSG("Error CAAM IODevice not found! Bad password?");
  216. return WC_HW_E;
  217. }
  218. #endif
  219. if ((ret = CAAM_SEND_REQUEST(type, sz, arg, buf)) != Success) {
  220. /* if waiting for resource or RNG return waiting */
  221. if (ret == CAAM_WAITING) {
  222. #ifdef DEBUG_WOLFSSL
  223. if (wait == 0) {
  224. wait = 1;
  225. WOLFSSL_MSG("Waiting on entropy from driver");
  226. }
  227. fprintf(stderr, ".");
  228. #endif
  229. return RAN_BLOCK_E;
  230. }
  231. if (ret == ResourceNotAvailable) {
  232. WOLFSSL_MSG("Waiting on CAAM driver");
  233. return WC_HW_WAIT_E;
  234. }
  235. return WC_HW_E;
  236. }
  237. #ifdef DEBUG_WOLFSSL
  238. if (wait) {
  239. wait = 0;
  240. fprintf(stderr, "\n");
  241. }
  242. #endif
  243. (void)ret;
  244. return 0;
  245. }
  246. /* Create a red or black blob
  247. *
  248. * mod : key modifier, expected 8 bytes for RED key types and 16 for BLACK
  249. * if 'mod' is null than 0's are used
  250. *
  251. * returns 0 on success
  252. */
  253. int wc_caamCreateBlob_ex(byte* data, word32 dataSz, byte* out, word32* outSz,
  254. int type, byte* mod, word32 modSz)
  255. {
  256. CAAM_BUFFER in[3];
  257. word32 arg[4];
  258. int ret;
  259. byte local[16] = {0};
  260. byte* keyMod;
  261. int keyModSz;
  262. keyMod = mod;
  263. XMEMSET(local, 0, sizeof(local));
  264. if (data == NULL || out == NULL || outSz == NULL ||
  265. *outSz < dataSz + WC_CAAM_BLOB_SZ) {
  266. return BAD_FUNC_ARG;
  267. }
  268. if (type == WC_CAAM_BLOB_RED) {
  269. arg[0] = 0;
  270. if (mod != NULL) {
  271. if (modSz != 8) {
  272. WOLFSSL_MSG("bad key mod red size");
  273. return BAD_FUNC_ARG;
  274. }
  275. }
  276. keyModSz = 8;
  277. }
  278. else if (type == WC_CAAM_BLOB_BLACK) {
  279. arg[0] = 1;
  280. if (mod != NULL) {
  281. if (modSz != 16) {
  282. WOLFSSL_MSG("bad key mod black size");
  283. return BAD_FUNC_ARG;
  284. }
  285. }
  286. keyModSz = 16;
  287. }
  288. else {
  289. WOLFSSL_MSG("unknown blob type!");
  290. return BAD_FUNC_ARG;
  291. }
  292. if (mod == NULL) {
  293. WOLFSSL_MSG("using local all 0's key modifier");
  294. keyMod = local;
  295. }
  296. in[0].BufferType = DataBuffer;
  297. in[0].TheAddress = (CAAM_ADDRESS)keyMod;
  298. in[0].Length = keyModSz;
  299. in[1].BufferType = DataBuffer;
  300. in[1].TheAddress = (CAAM_ADDRESS)data;
  301. in[1].Length = dataSz;
  302. in[2].BufferType = DataBuffer | LastBuffer;
  303. in[2].TheAddress = (CAAM_ADDRESS)out;
  304. in[2].Length = dataSz + WC_CAAM_BLOB_SZ;
  305. arg[2] = dataSz;
  306. arg[3] = keyModSz;
  307. if ((ret = wc_caamAddAndWait(in, 3, arg, CAAM_BLOB_ENCAP)) != 0) {
  308. WOLFSSL_MSG("Error with CAAM blob create");
  309. return ret;
  310. }
  311. *outSz = dataSz + WC_CAAM_BLOB_SZ;
  312. return 0;
  313. }
  314. /* create a red key blob
  315. * returns 0 on success */
  316. int wc_caamCreateBlob(byte* data, word32 dataSz, byte* out, word32* outSz)
  317. {
  318. return wc_caamCreateBlob_ex(data, dataSz, out, outSz, WC_CAAM_BLOB_RED,
  319. NULL, 0);
  320. }
  321. /* uncover black or red keys
  322. * returns 0 on success */
  323. int wc_caamOpenBlob_ex(byte* data, word32 dataSz, byte* out, word32* outSz,
  324. int type, byte* mod, word32 modSz)
  325. {
  326. CAAM_BUFFER in[3];
  327. word32 arg[4];
  328. int ret;
  329. byte local[16];
  330. byte* keyMod;
  331. int keyModSz;
  332. keyMod = mod;
  333. XMEMSET(local, 0, sizeof(local));
  334. if (data == NULL || out == NULL || outSz == NULL ||
  335. *outSz < dataSz - WC_CAAM_BLOB_SZ) {
  336. WOLFSSL_MSG("NULL argument or outSz is too small");
  337. return BAD_FUNC_ARG;
  338. }
  339. if (type == WC_CAAM_BLOB_RED) {
  340. arg[0] = 0;
  341. if (mod != NULL) {
  342. if (modSz != 8) {
  343. WOLFSSL_MSG("bad key mod red size");
  344. return BAD_FUNC_ARG;
  345. }
  346. }
  347. keyModSz = 8;
  348. }
  349. else if (type == WC_CAAM_BLOB_BLACK) {
  350. arg[0] = 1;
  351. if (mod != NULL) {
  352. if (modSz != 16) {
  353. WOLFSSL_MSG("bad key mod black size");
  354. return BAD_FUNC_ARG;
  355. }
  356. }
  357. keyModSz = 16;
  358. }
  359. else {
  360. WOLFSSL_MSG("unknown blob type!");
  361. return BAD_FUNC_ARG;
  362. }
  363. if (mod == NULL) {
  364. WOLFSSL_MSG("using local all 0's key modifier");
  365. keyMod = local;
  366. }
  367. in[0].BufferType = DataBuffer;
  368. in[0].TheAddress = (CAAM_ADDRESS)keyMod;
  369. in[0].Length = keyModSz;
  370. in[1].BufferType = DataBuffer;
  371. in[1].TheAddress = (CAAM_ADDRESS)data;
  372. in[1].Length = dataSz;
  373. in[2].BufferType = DataBuffer | LastBuffer;
  374. in[2].TheAddress = (CAAM_ADDRESS)out;
  375. in[2].Length = dataSz - WC_CAAM_BLOB_SZ;
  376. arg[2] = dataSz;
  377. arg[3] = keyModSz;
  378. if ((ret = wc_caamAddAndWait(in, 3, arg, CAAM_BLOB_DECAP)) != 0) {
  379. WOLFSSL_MSG("Error with CAAM blob open");
  380. return ret;
  381. }
  382. *outSz = dataSz - WC_CAAM_BLOB_SZ;
  383. return 0;
  384. }
  385. /* open a red blob
  386. * returns 0 on success */
  387. int wc_caamOpenBlob(byte* data, word32 dataSz, byte* out, word32* outSz)
  388. {
  389. return wc_caamOpenBlob_ex(data, dataSz, out, outSz, WC_CAAM_BLOB_RED,
  390. NULL, 0);
  391. }
  392. /* outSz gets set to key size plus 16 for mac and padding
  393. * return 0 on success
  394. */
  395. int wc_caamCoverKey(byte* in, word32 inSz, byte* out, word32* outSz, int flag)
  396. {
  397. CAAM_BUFFER buf[2];
  398. word32 arg[4];
  399. int ret;
  400. (void)flag;
  401. if (*outSz < inSz + WC_CAAM_MAC_SZ) {
  402. return BUFFER_E;
  403. }
  404. buf[0].BufferType = DataBuffer;
  405. buf[0].TheAddress = (CAAM_ADDRESS)in;
  406. buf[0].Length = inSz;
  407. buf[1].BufferType = DataBuffer;
  408. buf[1].TheAddress = (CAAM_ADDRESS)out;
  409. buf[1].Length = inSz;
  410. arg[0] = 0x00140000; /* AES-CCM */
  411. arg[1] = inSz;
  412. if ((ret = wc_caamAddAndWait(buf, 2, arg, CAAM_FIFO_S)) != 0) {
  413. WOLFSSL_MSG("Error with CAAM blob create");
  414. return ret;
  415. }
  416. *outSz = inSz + WC_CAAM_MAC_SZ;
  417. return 0;
  418. }
  419. int caamFindUnusuedPartition()
  420. {
  421. CAAM_BUFFER buf[1];
  422. word32 arg[4];
  423. int ret = 0;
  424. buf[0].BufferType = DataBuffer;
  425. buf[0].TheAddress = (CAAM_ADDRESS)&ret;
  426. buf[0].Length = sizeof(int);
  427. if ((wc_caamAddAndWait(buf, 1, arg, CAAM_FIND_PART)) != 0) {
  428. WOLFSSL_MSG("Error finding a partition to use");
  429. return -1;
  430. }
  431. return ret;
  432. }
  433. CAAM_ADDRESS caamGetPartition(int part, int sz)
  434. {
  435. CAAM_BUFFER buf[1];
  436. word32 arg[4];
  437. CAAM_ADDRESS ret = 0;
  438. buf[0].BufferType = DataBuffer;
  439. buf[0].TheAddress = (CAAM_ADDRESS)(&ret);
  440. buf[0].Length = sizeof(int);
  441. arg[0] = part;
  442. arg[1] = sz;
  443. if ((wc_caamAddAndWait(buf, 1, arg, CAAM_GET_PART)) != 0) {
  444. WOLFSSL_MSG("Error getting a partition");
  445. return -1;
  446. }
  447. return ret;
  448. }
  449. /* Internal function to free a secure partition
  450. * return 0 on success */
  451. int caamFreePart(int partNum)
  452. {
  453. word32 arg[4];
  454. arg[0] = partNum;
  455. if ((wc_caamAddAndWait(NULL, 0, arg, CAAM_FREE_PART)) != 0) {
  456. WOLFSSL_MSG("Error freeing a partition");
  457. return -1;
  458. }
  459. return 0;
  460. }
  461. /* Internal function to help write to a secure partition
  462. * return 0 on success */
  463. int caamWriteToPartition(CAAM_ADDRESS addr, const unsigned char* in, int inSz)
  464. {
  465. CAAM_BUFFER buf[1];
  466. word32 arg[4];
  467. buf[0].BufferType = DataBuffer;
  468. buf[0].TheAddress = (CAAM_ADDRESS)in;
  469. buf[0].Length = inSz;
  470. arg[0] = addr;
  471. arg[1] = inSz;
  472. if ((wc_caamAddAndWait(buf, 1, arg, CAAM_WRITE_PART)) != 0) {
  473. WOLFSSL_MSG("Error writing to a partition");
  474. return -1;
  475. }
  476. return 0;
  477. }
  478. /* Internal function to help read from a secure partition
  479. * return 0 on success */
  480. int caamReadPartition(CAAM_ADDRESS addr, unsigned char* out, int outSz)
  481. {
  482. CAAM_BUFFER buf[1];
  483. word32 arg[4];
  484. buf[0].BufferType = DataBuffer;
  485. buf[0].TheAddress = (CAAM_ADDRESS)out;
  486. buf[0].Length = outSz;
  487. arg[0] = addr;
  488. arg[1] = outSz;
  489. if ((wc_caamAddAndWait(buf, 1, arg, CAAM_READ_PART)) != 0) {
  490. WOLFSSL_MSG("Error reading a partition");
  491. return -1;
  492. }
  493. return 0;
  494. }
  495. #endif /* WOLFSSL_IMX6_CAAM */