ecc_acts.c 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212
  1. #include <zephyr.h>
  2. #include <sys/atomic.h>
  3. #include <debug/stack.h>
  4. #include <sys/byteorder.h>
  5. #include <device.h>
  6. #include <kernel.h>
  7. #include <soc.h>
  8. #include <tinycrypt/constants.h>
  9. #include <tinycrypt/hmac_prng.h>
  10. #include <tinycrypt/utils.h>
  11. #include <tinycrypt/ecc.h>
  12. #include <tinycrypt/ecc_dh.h>
  13. #include "ecc_acts.h"
  14. #ifdef CONFIG_SOC_SERIES_LARK_FPGA
  15. #include <acts_bluetooth/crypto.h>
  16. #define ECC_USE_TRNG 0
  17. #else
  18. #define ECC_USE_TRNG 1
  19. #endif
  20. #if defined(CONFIG_BT_USE_DEBUG_KEYS)
  21. /* based on Core Specification 4.2 Vol 3. Part H 2.3.5.6.1 */
  22. static const uint32_t debug_private_key[8] = {
  23. 0xcd3c1abd, 0x5899b8a6, 0xeb40b799, 0x4aff607b, 0xd2103f50, 0x74c9b3e3,
  24. 0xa3c55f38, 0x3f49f6d4
  25. };
  26. static const uint8_t debug_public_key[64] = {
  27. 0xe6, 0x9d, 0x35, 0x0e, 0x48, 0x01, 0x03, 0xcc, 0xdb, 0xfd, 0xf4, 0xac,
  28. 0x11, 0x91, 0xf4, 0xef, 0xb9, 0xa5, 0xf9, 0xe9, 0xa7, 0x83, 0x2c, 0x5e,
  29. 0x2c, 0xbe, 0x97, 0xf2, 0xd2, 0x03, 0xb0, 0x20, 0x8b, 0xd2, 0x89, 0x15,
  30. 0xd0, 0x8e, 0x1c, 0x74, 0x24, 0x30, 0xed, 0x8f, 0xc2, 0x45, 0x63, 0x76,
  31. 0x5c, 0x15, 0x52, 0x5a, 0xbf, 0x9a, 0x32, 0x63, 0x6d, 0xeb, 0x2a, 0x65,
  32. 0x49, 0x9c, 0x80, 0xdc
  33. };
  34. #endif
  35. #if ECC_USE_TRNG
  36. static struct tc_hmac_prng_struct prng;
  37. static void trng_process(uint8_t *seed)
  38. {
  39. uint32_t trng_low, trng_high;
  40. se_trng_init();
  41. se_trng_process(&trng_low, &trng_high);
  42. sys_put_le32(trng_low, seed);
  43. sys_put_le32(trng_high, &seed[4]);
  44. se_trng_deinit();
  45. }
  46. /* 1 for success, 0 for failure */
  47. static int prng_reseed(struct tc_hmac_prng_struct *h)
  48. {
  49. uint8_t seed[32];
  50. int64_t extra;
  51. size_t i;
  52. int ret;
  53. for (i = 0; i < (sizeof(seed) / 8); i++) {
  54. trng_process(&seed[i * 8]);
  55. }
  56. extra = k_uptime_get();
  57. ret = tc_hmac_prng_reseed(h, seed, sizeof(seed), (uint8_t *)&extra, sizeof(extra));
  58. if (ret == TC_CRYPTO_FAIL) {
  59. printk("Failed to re-seed PRNG\n");
  60. }
  61. return ret;
  62. }
  63. /* 1 for success, 0 for failure */
  64. static int prng_init(void)
  65. {
  66. int ret;
  67. uint8_t rand[8];
  68. trng_process(rand);
  69. ret = tc_hmac_prng_init(&prng, rand, sizeof(rand));
  70. if (ret == TC_CRYPTO_FAIL) {
  71. printk("Failed to initialize PRNG\n");
  72. return -EIO;
  73. }
  74. return prng_reseed(&prng);
  75. }
  76. /* 1 for success, 0 for failure */
  77. static int ecc_rand(void *buf, size_t len)
  78. {
  79. int ret;
  80. ret = tc_hmac_prng_generate(buf, len, &prng);
  81. if (ret == TC_HMAC_PRNG_RESEED_REQ) {
  82. ret = prng_reseed(&prng);
  83. if (ret == TC_CRYPTO_FAIL) {
  84. return ret;
  85. }
  86. ret = tc_hmac_prng_generate(buf, len, &prng);
  87. }
  88. return ret;
  89. }
  90. #endif
  91. int default_CSPRNG(uint8_t *dst, unsigned int len)
  92. {
  93. #if ECC_USE_TRNG
  94. return ecc_rand(dst, len);
  95. #else
  96. return !bt_rand(dst, len);
  97. #endif
  98. }
  99. int ecc_gen_p192_pk(uint8_t *public_key, uint8_t *private_key)
  100. {
  101. int rc;
  102. rc = uECC_make_key(public_key, private_key, &curve_secp192r1);
  103. if (rc == TC_CRYPTO_FAIL) {
  104. printk("Failed to create ECC public/private pair\n");
  105. return -EINVAL;
  106. }
  107. return 0;
  108. }
  109. /* 0 for valid, otherwise invalid */
  110. int ecc_valid_p192_pk(uint8_t *public_key)
  111. {
  112. return uECC_valid_public_key(public_key, &curve_secp192r1);
  113. }
  114. int ecc_gen_p192_dhkey(uint8_t *public_key, uint8_t *private_key, uint8_t *dhkey)
  115. {
  116. int ret;
  117. ret = uECC_shared_secret(public_key, private_key, dhkey, &curve_secp192r1);
  118. if (ret == TC_CRYPTO_FAIL) {
  119. printk("dhkey gen failed (ret %d)\n", ret);
  120. return -EINVAL;
  121. }
  122. return 0;
  123. }
  124. int ecc_gen_p256_pk(uint8_t *public_key, uint8_t *private_key)
  125. {
  126. int rc;
  127. rc = uECC_make_key(public_key, private_key, &curve_secp256r1);
  128. if (rc == TC_CRYPTO_FAIL) {
  129. printk("Failed to create ECC public/private pair\n");
  130. return -EINVAL;
  131. }
  132. return 0;
  133. }
  134. /* 0 for valid, otherwise invalid */
  135. int ecc_valid_p256_pk(uint8_t *public_key)
  136. {
  137. return uECC_valid_public_key(public_key, &curve_secp256r1);
  138. }
  139. int ecc_gen_p256_dhkey(uint8_t *public_key, uint8_t *private_key, uint8_t *dhkey)
  140. {
  141. int ret;
  142. ret = uECC_shared_secret(public_key, private_key, dhkey, &curve_secp256r1);
  143. if (ret == TC_CRYPTO_FAIL) {
  144. printk("dhkey gen failed (ret %d)\n", ret);
  145. return -EINVAL;
  146. }
  147. return 0;
  148. }
  149. static K_THREAD_STACK_DEFINE(acts_ecc_stack, 1152);
  150. static struct k_work_q acts_ecc_work_q;
  151. void acts_work_submit(struct k_work *work)
  152. {
  153. k_work_submit_to_queue(&acts_ecc_work_q, work);
  154. }
  155. int ecc_init(void)
  156. {
  157. #if ECC_USE_TRNG
  158. int ret;
  159. ret = prng_init();
  160. if (!ret) {
  161. return -EIO;
  162. }
  163. #endif
  164. k_work_queue_start(&acts_ecc_work_q, acts_ecc_stack, K_THREAD_STACK_SIZEOF(acts_ecc_stack), 13, NULL);
  165. return 0;
  166. }