From patchwork Mon Nov 9 15:18:26 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steffen Trumtrar X-Patchwork-Id: 7584571 X-Patchwork-Delegate: herbert@gondor.apana.org.au Return-Path: X-Original-To: patchwork-linux-crypto@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork1.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.136]) by patchwork1.web.kernel.org (Postfix) with ESMTP id 01F889F1AF for ; Mon, 9 Nov 2015 15:19:11 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 4714A204EA for ; Mon, 9 Nov 2015 15:19:09 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id A40DA20609 for ; Mon, 9 Nov 2015 15:19:06 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1750989AbbKIPTE (ORCPT ); Mon, 9 Nov 2015 10:19:04 -0500 Received: from metis.ext.4.pengutronix.de ([92.198.50.35]:56971 "EHLO metis.ext.pengutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751213AbbKIPTD (ORCPT ); Mon, 9 Nov 2015 10:19:03 -0500 Received: from dude.hi.pengutronix.de ([2001:67c:670:100:1d::7]) by metis.ext.pengutronix.de with esmtps (TLS1.2:RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from ) id 1ZvoDk-0005my-NV; Mon, 09 Nov 2015 16:19:00 +0100 Received: from str by dude.hi.pengutronix.de with local (Exim 4.86) (envelope-from ) id 1ZvoDj-0007tp-R7; Mon, 09 Nov 2015 16:18:59 +0100 From: Steffen Trumtrar To: linux-crypto@vger.kernel.org Cc: linux-ima-devel@lists.sourceforge.net, linux-ima-user@lists.sourceforge.net, keyrings@linux-nfs.org, David Howells , kernel@pengutronix.de, Steffen Trumtrar Subject: [RFC] crypto: caam - add red blobifier Date: Mon, 9 Nov 2015 16:18:26 +0100 Message-Id: <1447082306-19946-2-git-send-email-s.trumtrar@pengutronix.de> X-Mailer: git-send-email 2.6.1 In-Reply-To: <1447082306-19946-1-git-send-email-s.trumtrar@pengutronix.de> References: <1447082306-19946-1-git-send-email-s.trumtrar@pengutronix.de> X-SA-Exim-Connect-IP: 2001:67c:670:100:1d::7 X-SA-Exim-Mail-From: str@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-crypto@vger.kernel.org Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org X-Spam-Status: No, score=-5.6 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_HI, RP_MATCHES_RCVD, UNPARSEABLE_RELAY, URIBL_SBL autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Signed-off-by: Steffen Trumtrar --- drivers/crypto/caam/Kconfig | 9 + drivers/crypto/caam/Makefile | 1 + drivers/crypto/caam/blob_gen.c | 528 +++++++++++++++++++++++++++++++++++++++++ 3 files changed, 538 insertions(+) create mode 100644 drivers/crypto/caam/blob_gen.c diff --git a/drivers/crypto/caam/Kconfig b/drivers/crypto/caam/Kconfig index e7555ff4cafd..329fab7ba4f7 100644 --- a/drivers/crypto/caam/Kconfig +++ b/drivers/crypto/caam/Kconfig @@ -99,6 +99,15 @@ config CRYPTO_DEV_FSL_CAAM_AHASH_API To compile this as a module, choose M here: the module will be called caamhash. +config CRYPTO_DEV_FSL_CAAM_BLOB_GEN + tristate "CAAM Blob Generator (EXPERIMENTAL)" + depends on CRYPTO_DEV_FSL_CAAM + default n + help + Selecting this will enable the CAAM red blob generator. + This module will take a chunk of data via sysfs and returns + an encrypted red blob. The inverse is also possible. + config CRYPTO_DEV_FSL_CAAM_RNG_API tristate "Register caam device for hwrng API" depends on CRYPTO_DEV_FSL_CAAM && CRYPTO_DEV_FSL_CAAM_JR diff --git a/drivers/crypto/caam/Makefile b/drivers/crypto/caam/Makefile index 550758a333e7..359ef3b97fdf 100644 --- a/drivers/crypto/caam/Makefile +++ b/drivers/crypto/caam/Makefile @@ -10,6 +10,7 @@ obj-$(CONFIG_CRYPTO_DEV_FSL_CAAM_JR) += caam_jr.o obj-$(CONFIG_CRYPTO_DEV_FSL_CAAM_CRYPTO_API) += caamalg.o obj-$(CONFIG_CRYPTO_DEV_FSL_CAAM_AHASH_API) += caamhash.o obj-$(CONFIG_CRYPTO_DEV_FSL_CAAM_RNG_API) += caamrng.o +obj-$(CONFIG_CRYPTO_DEV_FSL_CAAM_BLOB_GEN) += blob_gen.o caam-objs := ctrl.o caam_jr-objs := jr.o key_gen.o error.o diff --git a/drivers/crypto/caam/blob_gen.c b/drivers/crypto/caam/blob_gen.c new file mode 100644 index 000000000000..9c2a02c2882a --- /dev/null +++ b/drivers/crypto/caam/blob_gen.c @@ -0,0 +1,528 @@ +/* + * Copyright (C) 2015 Pengutronix, Steffen Trumtrar + * + * This program is free software; you can redistribute it and/or modify it under + * the terms of the GNU General Public License version 2 as published by the + * Free Software Foundation. + */ + +#include +#include +#include +#include "compat.h" +#include "intern.h" +#include "desc.h" +#include "desc_constr.h" +#include "error.h" +#include "jr.h" + +enum access_rights { + KERNEL, + KERNEL_EVM, + USERSPACE, +}; + +struct blob_priv { + struct device *jrdev; + struct device dev; + u32 *desc; + u8 __iomem *red_blob; + u8 __iomem *modifier; + u8 __iomem *output; + bool busy; + enum access_rights access; + unsigned int payload_size; + struct bin_attribute *blob; + struct bin_attribute *payload; + struct caam_drv_private *ctrlpriv; +}; + +struct blob_job_result { + int err; + struct completion completion; +}; + +static struct platform_device *pdev; + +static void blob_job_done(struct device *dev, u32 *desc, u32 err, void *context) +{ + struct blob_job_result *res = context; + +#ifdef DEBUG + dev_err(dev, "%s %d: err 0x%x\n", __func__, __LINE__, err); +#endif + + if (err) + caam_jr_strstatus(dev, err); + + res->err = err; + + complete(&res->completion); +} + +/* + * Upon completion, desc points to a buffer containing a CAAM job + * descriptor which encapsulates data into an externally-storable + * blob. + */ +#define INITIAL_DESCSZ 16 +#define BLOB_OVERHEAD (32 + 16) +#define KEYMOD_LENGTH 16 +#define RED_BLOB_LENGTH 64 +#define MAX_BLOB_LEN 4096 + +/* + * Generate a blob with the following format: + * Format: Normal format (Test format only for testing) + * Contents: General data (aka red blob) + * Security State: Secure State (Non-Secure for testing) + * Memory Types: General memory + */ +static int blob_encap_blob(struct blob_priv *priv, u8 *keymod, u8 *input, + u8 *output, u16 length) +{ + u32 *desc; + struct device *jrdev = priv->jrdev; + dma_addr_t dma_keymod; + dma_addr_t dma_in; + dma_addr_t dma_out; + struct blob_job_result testres; + int ret; + + desc = kmalloc(CAAM_CMD_SZ * 5 + CAAM_PTR_SZ * 5, GFP_KERNEL | GFP_DMA); + if (!desc) { + dev_err(jrdev, "unable to allocate desc\n"); + return -ENOMEM; + } + + dma_keymod = dma_map_single(jrdev, keymod, KEYMOD_LENGTH, DMA_TO_DEVICE); + if (dma_mapping_error(jrdev, dma_keymod)) { + dev_err(jrdev, "unable to map keymod buffer\n"); + ret = -ENOMEM; + goto out_free; + } + + dma_in = dma_map_single(jrdev, input, length - BLOB_OVERHEAD, + DMA_TO_DEVICE); + if (dma_mapping_error(jrdev, dma_in)) { + dev_err(jrdev, "unable to map keymod buffer\n"); + ret = -ENOMEM; + goto out_unmap_key; + } + + dma_out = dma_map_single(jrdev, output, length, DMA_FROM_DEVICE); + if (dma_mapping_error(jrdev, dma_out)) { + dev_err(jrdev, "unable to map output DMA buffer\n"); + ret = -ENOMEM; + goto out_unmap_in; + } + + /* + * A data blob is encrypted using a blob key (BK); a random number. + * The BK is used as an AES-CCM key. The initial block (B0) and the + * initial counter (Ctr0) are generated automatically and stored in + * Class 1 Context DWords 0+1+2+3. The random BK is stored in the + * Class 1 Key Register. Operation Mode is set to AES-CCM. + */ + + init_job_desc(desc, 0); + /* + * The key modifier can be used to differentiate specific data. + * Or to prevent replay attacks. + */ + append_key(desc, dma_keymod, KEYMOD_LENGTH, CLASS_2 | KEY_DEST_CLASS_REG); + append_seq_in_ptr(desc, dma_in, length - BLOB_OVERHEAD, 0); + append_seq_out_ptr(desc, dma_out, length, 0); + append_operation(desc, OP_TYPE_ENCAP_PROTOCOL | OP_PCLID_BLOB); + +#ifdef DEBUG + printk("%s: keymod %s\n", __func__, keymod); + print_hex_dump(KERN_ERR, "data@"__stringify(__LINE__)": ", + DUMP_PREFIX_ADDRESS, 16, 1, input, + length - BLOB_OVERHEAD, false); + print_hex_dump(KERN_ERR, "jobdesc@"__stringify(__LINE__)": ", + DUMP_PREFIX_ADDRESS, 16, 1, desc, + desc_bytes(desc), false); +#endif + + testres.err = 0; + init_completion(&testres.completion); + + ret = caam_jr_enqueue(jrdev, desc, blob_job_done, &testres); + if (!ret) { + wait_for_completion_interruptible(&testres.completion); + ret = testres.err; +#ifdef DEBUG + print_hex_dump(KERN_ERR, "output@"__stringify(__LINE__)": ", + DUMP_PREFIX_ADDRESS, 16, 1, output, + length, false); +#endif + } + + dma_unmap_single(jrdev, dma_out, length, + DMA_FROM_DEVICE); +out_unmap_in: + dma_unmap_single(jrdev, dma_keymod, KEYMOD_LENGTH, DMA_TO_DEVICE); +out_unmap_key: + dma_unmap_single(jrdev, dma_in, length - BLOB_OVERHEAD, DMA_TO_DEVICE); +out_free: + kfree(desc); + + return ret; +} + +static int blob_decap_blob(struct blob_priv *priv, u8 *keymod, u8 *input, + u8 *output, u16 length) +{ + u32 *desc; + struct device *jrdev = priv->jrdev; + dma_addr_t dma_keymod; + dma_addr_t dma_in; + dma_addr_t dma_out; + struct blob_job_result testres; + int ret; + + desc = kzalloc(CAAM_CMD_SZ * 5 + CAAM_PTR_SZ * 5, GFP_KERNEL | GFP_DMA); + if (!desc) { + dev_err(jrdev, "unable to allocate desc\n"); + return -ENOMEM; + } + + dma_keymod = dma_map_single(jrdev, keymod, KEYMOD_LENGTH, DMA_TO_DEVICE); + if (dma_mapping_error(jrdev, dma_keymod)) { + dev_err(jrdev, "unable to map keymod buffer\n"); + ret = -ENOMEM; + goto out_free; + } + + dma_in = dma_map_single(jrdev, input, length, DMA_TO_DEVICE); + if (dma_mapping_error(jrdev, dma_in)) { + dev_err(jrdev, "unable to map keymod buffer\n"); + ret = -ENOMEM; + goto out_unmap_key; + } + + dma_out = dma_map_single(jrdev, output, length - BLOB_OVERHEAD, DMA_FROM_DEVICE); + if (dma_mapping_error(jrdev, dma_out)) { + dev_err(jrdev, "unable to map output DMA buffer\n"); + ret = -ENOMEM; + goto out_unmap_in; + } + + /* + * A data blob is encrypted using a blob key (BK); a random number. + * The BK is used as an AES-CCM key. The initial block (B0) and the + * initial counter (Ctr0) are generated automatically and stored in + * Class 1 Context DWords 0+1+2+3. The random BK is stored in the + * Class 1 Key Register. Operation Mode is set to AES-CCM. + */ + + init_job_desc(desc, 0); + /* + * The key modifier can be used to differentiate specific data. + * Or to prevent replay attacks. + */ + append_key(desc, dma_keymod, KEYMOD_LENGTH, CLASS_2 | KEY_DEST_CLASS_REG); + append_seq_in_ptr(desc, dma_in, length, 0); + append_seq_out_ptr(desc, dma_out, length - BLOB_OVERHEAD, 0); + append_operation(desc, OP_TYPE_DECAP_PROTOCOL | OP_PCLID_BLOB); + +#ifdef DEBUG + print_hex_dump(KERN_ERR, "data@"__stringify(__LINE__)": ", + DUMP_PREFIX_ADDRESS, 16, 1, input, + length, false); + print_hex_dump(KERN_ERR, "jobdesc@"__stringify(__LINE__)": ", + DUMP_PREFIX_ADDRESS, 16, 1, desc, + desc_bytes(desc), false); +#endif + + testres.err = 0; + init_completion(&testres.completion); + + ret = caam_jr_enqueue(jrdev, desc, blob_job_done, &testres); + if (!ret) { + wait_for_completion_interruptible(&testres.completion); + ret = testres.err; +#ifdef DEBUG + print_hex_dump(KERN_ERR, "output@"__stringify(__LINE__)": ", + DUMP_PREFIX_ADDRESS, 16, 1, output, + length - BLOB_OVERHEAD, false); +#endif + } + + dma_unmap_single(jrdev, dma_out, length - BLOB_OVERHEAD, DMA_FROM_DEVICE); +out_unmap_in: + dma_unmap_single(jrdev, dma_keymod, KEYMOD_LENGTH, DMA_TO_DEVICE); +out_unmap_key: + dma_unmap_single(jrdev, dma_in, length, DMA_TO_DEVICE); +out_free: + kfree(desc); + + return ret; +} + +static void blob_gen_init_evm(struct blob_priv *priv) +{ + evm_init((const char *)priv->output, priv->payload_size); +} + +static ssize_t +blob_gen_blob_read(struct file *filp, struct kobject *kobj, struct bin_attribute *attr, + char *buf, loff_t off, size_t size) +{ + struct device *dev = kobj_to_dev(kobj); + struct blob_priv *priv = dev_get_drvdata(dev); + int length = min((int)size, (int) (priv->payload_size + BLOB_OVERHEAD - off)); + int ret; + + if (length > 0) { + priv->busy = true; + + ret = blob_encap_blob(priv, priv->modifier, priv->output, priv->red_blob, length); + if (ret) { + priv->busy = false; + return -EINVAL; + } + + memcpy(buf, priv->red_blob, length); + + priv->busy = false; + } + + return length; +} + +static ssize_t +blob_gen_blob_write(struct file *filp, struct kobject *kobj, + struct bin_attribute *attr, char *buf, loff_t off, size_t size) +{ + struct device *dev = kobj_to_dev(kobj); + struct blob_priv *priv = dev_get_drvdata(dev); + int ret; + + if (size > 0) { + priv->busy = true; + + memcpy(priv->red_blob, buf, size); + + memset(priv->output, 0, MAX_BLOB_LEN - BLOB_OVERHEAD); + + ret = blob_decap_blob(priv, priv->modifier, priv->red_blob, + priv->output, size); + if (ret) { + priv->busy = false; + return -EINVAL; + } + + priv->payload_size = size - BLOB_OVERHEAD; + + if (priv->access == KERNEL_EVM) + blob_gen_init_evm(priv); + + priv->busy = false; + } + + return size; +} + +static ssize_t +blob_gen_payload_read(struct file *filp, struct kobject *kobj, + struct bin_attribute *attr, char *buf, loff_t off, + size_t size) +{ + struct device *dev = kobj_to_dev(kobj); + struct blob_priv *priv = dev_get_drvdata(dev); + int length = min((int) size, (int) (priv->payload_size - off)); + + if (priv->payload_size == 0) + return -EINVAL; + + if (priv->access != USERSPACE) + return -EPERM; + + memcpy(buf, priv->output + off, length); + + return length; +} + +static ssize_t +blob_gen_payload_write(struct file *filp, struct kobject *kobj, + struct bin_attribute *attr, char *buf, loff_t off, + size_t size) +{ + struct device *dev = kobj_to_dev(kobj); + struct blob_priv *priv = dev_get_drvdata(dev); + + if (priv->busy) + return -EPERM; + + memcpy(priv->output, buf, size); + + priv->payload_size = size; + + return size; +} + +static ssize_t +blob_gen_show_modifier(struct device *dev, struct device_attribute *attr, + char *buf) +{ + struct blob_priv *priv = dev_get_drvdata(dev); + + memcpy(buf, priv->modifier, KEYMOD_LENGTH); + + return KEYMOD_LENGTH; +} + +static ssize_t +blob_gen_set_modifier(struct device *dev, struct device_attribute *attr, + const char *buf, size_t n) +{ + struct blob_priv *priv = dev_get_drvdata(dev); + char *buf_ptr; + + if (n > KEYMOD_LENGTH) + return -EINVAL; + + if (priv->busy) + return -EPERM; + + buf_ptr = (char *)buf; + if (!strncmp(buf_ptr, "kernel:evm", 10)) + priv->access = KERNEL_EVM; + else if (!strncmp(buf_ptr, "kernel:", 7)) + priv->access = KERNEL; + else if (!strncmp(buf_ptr, "user:", 5)) + priv->access = USERSPACE; + + memset(priv->output, 0, MAX_BLOB_LEN - BLOB_OVERHEAD); + memset(priv->red_blob, 0, MAX_BLOB_LEN); + + memcpy(priv->modifier, buf, n); + + return n; +} +static DEVICE_ATTR(modifier, S_IRUSR | S_IWUSR, + blob_gen_show_modifier, blob_gen_set_modifier); + +static struct attribute *blob_attrs[] = { + &dev_attr_modifier.attr, + NULL, +}; +ATTRIBUTE_GROUPS(blob); + +static int __init blob_gen_init(void) +{ + struct device_node *dev_node; + struct device *ctrldev; + struct caam_drv_private *ctrlpriv; + struct blob_priv *priv; + int ret; + + dev_node = of_find_compatible_node(NULL, NULL, "fsl,sec-v4.0"); + if (!dev_node) { + dev_node = of_find_compatible_node(NULL, NULL, "fsl,sec4.0"); + if (!dev_node) + return -ENODEV; + } + + pdev = of_find_device_by_node(dev_node); + if (!pdev) { + of_node_put(dev_node); + return -ENODEV; + } + + ctrldev = &pdev->dev; + ctrlpriv = dev_get_drvdata(ctrldev); + + pdev = platform_device_alloc("blob_gen", -1); + if (!pdev) + return -ENOMEM; + pdev->dev.parent = ctrldev; + pdev->dev.groups = blob_groups; + + priv = devm_kzalloc(&pdev->dev, sizeof(*priv), GFP_KERNEL); + priv->blob = devm_kzalloc(&pdev->dev, sizeof(struct bin_attribute), + GFP_KERNEL); + priv->payload = devm_kzalloc(&pdev->dev, sizeof(struct bin_attribute), + GFP_KERNEL); + + ret = platform_device_add(pdev); + if (ret) + goto pdev_add_failed; + + priv->modifier = devm_kzalloc(&pdev->dev, sizeof(*priv->modifier)*KEYMOD_LENGTH, + GFP_KERNEL | GFP_DMA); + + priv->red_blob = devm_kzalloc(&pdev->dev, sizeof(*priv->red_blob)* + MAX_BLOB_LEN, GFP_KERNEL | GFP_DMA); + + priv->output = devm_kzalloc(&pdev->dev, sizeof(*priv->output)* + MAX_BLOB_LEN - BLOB_OVERHEAD, GFP_KERNEL | GFP_DMA); + + priv->desc = devm_kzalloc(&pdev->dev, sizeof(*priv->desc), GFP_KERNEL | GFP_DMA); + if (priv->desc == NULL) + return -ENOMEM; + + dev_set_drvdata(&pdev->dev, priv); + + priv->busy = false; + + priv->jrdev = &ctrlpriv->jrpdev[0]->dev; + + priv->blob->attr.name = "blob"; + priv->blob->attr.mode = S_IRUSR | S_IWUSR; + + sysfs_bin_attr_init(priv->blob); + priv->blob->read = blob_gen_blob_read; + priv->blob->write = blob_gen_blob_write; + + ret = sysfs_create_bin_file(&pdev->dev.kobj, priv->blob); + if (ret) + dev_err(&pdev->dev, "unable to create sysfs file %s\n", + priv->blob->attr.name); + else + dev_info(&pdev->dev, "added sysfs binary attribute\n"); + + priv->payload->attr.name = "payload"; + priv->payload->attr.mode = S_IRUSR | S_IWUSR; + + sysfs_bin_attr_init(priv->payload); + priv->payload->read = blob_gen_payload_read; + priv->payload->write = blob_gen_payload_write; + + ret = sysfs_create_bin_file(&pdev->dev.kobj, priv->payload); + if (ret) + dev_err(&pdev->dev, "unable to create sysfs file %s\n", + priv->payload->attr.name); + else + dev_info(&pdev->dev, "added sysfs binary attribute\n"); + + return 0; + +pdev_add_failed: + platform_device_put(pdev); + + return ret; +} + +static void __exit blob_gen_exit(void) +{ + struct blob_priv *priv; + + priv = dev_get_drvdata(&pdev->dev); + if (!priv) + return; + + sysfs_remove_bin_file(&pdev->dev.kobj, priv->payload); + sysfs_remove_bin_file(&pdev->dev.kobj, priv->blob); + + platform_device_unregister(pdev); +} + +module_init(blob_gen_init); +module_exit(blob_gen_exit); + +MODULE_LICENSE("GPL"); +MODULE_DESCRIPTION("Blob Generator Example"); +MODULE_AUTHOR("Steffen Trumtrar ");