| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277 |
- /*
- * SPDX-FileCopyrightText: 2023 Espressif Systems (Shanghai) CO LTD
- *
- * SPDX-License-Identifier: CC0-1.0
- */
- #include <stdio.h>
- #include <stdbool.h>
- #include <string.h>
- #include "esp_private/esp_crypto_lock_internal.h"
- #include "esp_random.h"
- #include "hal/clk_gate_ll.h"
- #include "hal/ecdsa_hal.h"
- #include "hal/ecdsa_ll.h"
- #include "hal/ecdsa_types.h"
- #include "memory_checks.h"
- #include "unity_fixture.h"
- #include "ecdsa_params.h"
- static void ecdsa_enable_and_reset(void)
- {
- ECDSA_RCC_ATOMIC() {
- ecdsa_ll_enable_bus_clock(true);
- ecdsa_ll_reset_register();
- }
- }
- static void ecdsa_disable(void)
- {
- ECDSA_RCC_ATOMIC() {
- ecdsa_ll_enable_bus_clock(false);
- }
- }
- static void ecc_be_to_le(const uint8_t* be_point, uint8_t *le_point, uint8_t len)
- {
- memset(le_point, 0x0, 32);
- for (int i = 0; i < len; i++) {
- le_point[i] = be_point[len - i - 1];
- }
- }
- static int test_ecdsa_verify(bool is_p256, uint8_t* sha, uint8_t* r_le, uint8_t* s_le, uint8_t *pub_x, uint8_t *pub_y)
- {
- uint16_t len;
- uint8_t sha_le[32];
- ecdsa_hal_config_t conf = {
- .mode = ECDSA_MODE_SIGN_VERIFY,
- .k_mode = ECDSA_K_USE_TRNG,
- .sha_mode = ECDSA_Z_USER_PROVIDED,
- };
- if (is_p256) {
- conf.curve = ECDSA_CURVE_SECP256R1;
- len = 32;
- } else {
- conf.curve = ECDSA_CURVE_SECP192R1;
- len = 24;
- }
- /* Set HASH */
- ecc_be_to_le(sha, sha_le, len);
- ecdsa_enable_and_reset();
- int ret = ecdsa_hal_verify_signature(&conf, sha_le, r_le, s_le, pub_x, pub_y, len);
- ecdsa_disable();
- return ret;
- }
- static void test_ecdsa_corrupt_data(bool is_p256, uint8_t* sha, uint8_t* r_le, uint8_t* s_le, uint8_t *pub_x, uint8_t *pub_y)
- {
- int len;
- if (is_p256) {
- len = 32;
- } else {
- len = 24;
- }
- // Randomly select a bit and corrupt its correpsonding value
- uint16_t r_bit = esp_random() % len * 8;
- printf("Corrupting SHA bit %d...\n", r_bit);
- sha[r_bit / 8] ^= 1 << (r_bit % 8);
- TEST_ASSERT_EQUAL(-1, test_ecdsa_verify(1, sha, r_le, s_le, pub_x, pub_y));
- sha[r_bit / 8] ^= 1 << (r_bit % 8);
- printf("Corrupting R bit %d...\n", r_bit);
- r_le[r_bit / 8] ^= 1 << (r_bit % 8);
- TEST_ASSERT_EQUAL(-1, test_ecdsa_verify(1, sha, r_le, s_le, pub_x, pub_y));
- r_le[r_bit / 8] ^= 1 << (r_bit % 8);
- printf("Corrupting S bit %d...\n", r_bit);
- s_le[r_bit / 8] ^= 1 << (r_bit % 8);
- TEST_ASSERT_EQUAL(-1, test_ecdsa_verify(1, sha, r_le, s_le, pub_x, pub_y));
- s_le[r_bit / 8] ^= 1 << (r_bit % 8);
- printf("Corrupting pub_x bit %d...\n", r_bit);
- pub_x[r_bit / 8] ^= 1 << (r_bit % 8);
- TEST_ASSERT_EQUAL(-1, test_ecdsa_verify(1, sha, r_le, s_le, pub_x, pub_y));
- pub_x[r_bit / 8] ^= 1 << (r_bit % 8);
- printf("Corrupting pub_y bit %d...\n", r_bit);
- pub_y[r_bit / 8] ^= 1 << (r_bit % 8);
- TEST_ASSERT_EQUAL(-1, test_ecdsa_verify(1, sha, r_le, s_le, pub_x, pub_y));
- pub_y[r_bit / 8] ^= 1 << (r_bit % 8);
- }
- static void test_ecdsa_sign(bool is_p256, uint8_t* sha, uint8_t* r_le, uint8_t* s_le, bool use_km_key)
- {
- uint8_t sha_le[32] = {0};
- uint8_t zeroes[32] = {0};
- uint16_t len;
- ecdsa_hal_config_t conf = {
- .mode = ECDSA_MODE_SIGN_GEN,
- .k_mode = ECDSA_K_USE_TRNG,
- .sha_mode = ECDSA_Z_USER_PROVIDED,
- .use_km_key = use_km_key,
- };
- if (is_p256) {
- conf.curve = ECDSA_CURVE_SECP256R1;
- if (use_km_key == 0) {
- conf.efuse_key_blk = 6;
- }
- len = 32;
- } else {
- conf.curve = ECDSA_CURVE_SECP192R1;
- if (use_km_key == 0) {
- conf.efuse_key_blk = 5;
- }
- len = 24;
- }
- /* Set HASH */
- ecc_be_to_le(sha, sha_le, len);
- ecdsa_enable_and_reset();
- do {
- ecdsa_hal_gen_signature(&conf, NULL, sha_le, r_le, s_le, len);
- } while(!memcmp(r_le, zeroes, len) || !memcmp(s_le, zeroes, len));
- ecdsa_disable();
- }
- static void test_ecdsa_sign_and_verify(bool is_p256, uint8_t* sha, uint8_t* pub_x, uint8_t* pub_y, bool use_km_key)
- {
- uint8_t r_le[32] = {0};
- uint8_t s_le[32] = {0};
- test_ecdsa_sign(is_p256, sha, r_le, s_le, use_km_key);
- TEST_ASSERT_EQUAL(0, test_ecdsa_verify(is_p256, sha, r_le, s_le, pub_x, pub_y));
- }
- #ifdef SOC_ECDSA_SUPPORT_EXPORT_PUBKEY
- static void test_ecdsa_export_pubkey(bool is_p256, bool use_km_key)
- {
- uint8_t pub_x[32] = {0};
- uint8_t pub_y[32] = {0};
- uint16_t len;
- ecdsa_hal_config_t conf = {
- .mode = ECDSA_MODE_EXPORT_PUBKEY,
- .use_km_key = use_km_key,
- };
- if (is_p256) {
- conf.curve = ECDSA_CURVE_SECP256R1;
- if (use_km_key == 0) {
- conf.efuse_key_blk = 6;
- }
- len = 32;
- } else {
- conf.curve = ECDSA_CURVE_SECP192R1;
- if (use_km_key == 0) {
- conf.efuse_key_blk = 5;
- }
- len = 24;
- }
- ecdsa_enable_and_reset();
- ecdsa_hal_export_pubkey(&conf, pub_x, pub_y, len);
- if (is_p256) {
- TEST_ASSERT_EQUAL_HEX8_ARRAY(ecdsa256_pub_x, pub_x, len);
- TEST_ASSERT_EQUAL_HEX8_ARRAY(ecdsa256_pub_y, pub_y, len);
- } else {
- TEST_ASSERT_EQUAL_HEX8_ARRAY(ecdsa192_pub_x, pub_x, len);
- TEST_ASSERT_EQUAL_HEX8_ARRAY(ecdsa192_pub_y, pub_y, len);
- }
- ecdsa_disable();
- }
- #endif /* SOC_ECDSA_SUPPORT_EXPORT_PUBKEY */
- TEST_GROUP(ecdsa);
- TEST_SETUP(ecdsa)
- {
- test_utils_record_free_mem();
- TEST_ESP_OK(test_utils_set_leak_level(0, ESP_LEAK_TYPE_CRITICAL, ESP_COMP_LEAK_GENERAL));
- }
- TEST_TEAR_DOWN(ecdsa)
- {
- test_utils_finish_and_evaluate_leaks(test_utils_get_leak_level(ESP_LEAK_TYPE_WARNING, ESP_COMP_LEAK_ALL),
- test_utils_get_leak_level(ESP_LEAK_TYPE_CRITICAL, ESP_COMP_LEAK_ALL));
- }
- TEST(ecdsa, ecdsa_SECP192R1_signature_verification)
- {
- TEST_ASSERT_EQUAL(0, test_ecdsa_verify(0, sha, ecdsa192_r, ecdsa192_s, ecdsa192_pub_x, ecdsa192_pub_y));
- }
- TEST(ecdsa, ecdsa_SECP192R1_sign_and_verify)
- {
- test_ecdsa_sign_and_verify(0, sha, ecdsa192_pub_x, ecdsa192_pub_y, 0);
- }
- TEST(ecdsa, ecdsa_SECP192R1_corrupt_signature)
- {
- test_ecdsa_corrupt_data(0, sha, ecdsa192_r, ecdsa192_s, ecdsa192_pub_x, ecdsa192_pub_y);
- }
- TEST(ecdsa, ecdsa_SECP256R1_signature_verification)
- {
- TEST_ASSERT_EQUAL(0, test_ecdsa_verify(1, sha, ecdsa256_r, ecdsa256_s, ecdsa256_pub_x, ecdsa256_pub_y));
- }
- TEST(ecdsa, ecdsa_SECP256R1_sign_and_verify)
- {
- test_ecdsa_sign_and_verify(1, sha, ecdsa256_pub_x, ecdsa256_pub_y, 0);
- }
- TEST(ecdsa, ecdsa_SECP256R1_corrupt_signature)
- {
- test_ecdsa_corrupt_data(1, sha, ecdsa256_r, ecdsa256_s, ecdsa256_pub_x, ecdsa256_pub_y);
- }
- #ifdef SOC_ECDSA_SUPPORT_EXPORT_PUBKEY
- TEST(ecdsa, ecdsa_SECP192R1_export_pubkey)
- {
- test_ecdsa_export_pubkey(0, 0);
- }
- TEST(ecdsa, ecdsa_SECP256R1_export_pubkey)
- {
- test_ecdsa_export_pubkey(1, 0);
- }
- #endif /* SOC_ECDSA_SUPPORT_EXPORT_PUBKEY */
- TEST_GROUP_RUNNER(ecdsa)
- {
- RUN_TEST_CASE(ecdsa, ecdsa_SECP192R1_signature_verification)
- RUN_TEST_CASE(ecdsa, ecdsa_SECP192R1_sign_and_verify)
- RUN_TEST_CASE(ecdsa, ecdsa_SECP192R1_corrupt_signature)
- RUN_TEST_CASE(ecdsa, ecdsa_SECP256R1_signature_verification)
- RUN_TEST_CASE(ecdsa, ecdsa_SECP256R1_sign_and_verify)
- RUN_TEST_CASE(ecdsa, ecdsa_SECP256R1_corrupt_signature)
- #ifdef SOC_ECDSA_SUPPORT_EXPORT_PUBKEY
- RUN_TEST_CASE(ecdsa, ecdsa_SECP192R1_export_pubkey)
- RUN_TEST_CASE(ecdsa, ecdsa_SECP256R1_export_pubkey)
- #endif /* SOC_ECDSA_SUPPORT_EXPORT_PUBKEY */
- }
|