1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
// Licensed under the Apache License, Version 2.0 or the MIT License.
// SPDX-License-Identifier: Apache-2.0 OR MIT
// Copyright Tock Contributors 2022.

use core::cell::Cell;

use kernel::grant::{AllowRoCount, AllowRwCount, Grant, UpcallCount};
use kernel::hil::symmetric_encryption::{AES128Ctr, Client, AES128, AES128_BLOCK_SIZE};
use kernel::processbuffer::ReadableProcessBuffer;
use kernel::syscall::{CommandReturn, SyscallDriver};
use kernel::utilities::cells::{OptionalCell, TakeCell};
use kernel::ErrorCode;
use kernel::ProcessId;

pub const DRIVER_NUM: usize = 0x99999;

pub static KEY: &[u8; kernel::hil::symmetric_encryption::AES128_KEY_SIZE] = b"InsecureAESKey12";

#[derive(Default)]
pub struct ProcessState {
    request_pending: bool,
    offset: usize,
}

/// Ids for subscribe upcalls
mod upcall {
    pub const DONE: usize = 0;
    /// The number of subscribe upcalls the kernel stores for this grant
    pub const COUNT: u8 = 1;
}

/// Ids for read-only allow buffers
mod ro_allow {
    pub const IV: usize = 0;
    pub const SOURCE: usize = 1;
    /// The number of allow buffers the kernel stores for this grant
    pub const COUNT: u8 = 2;
}

/// Ids for read-write allow buffers
mod rw_allow {
    pub const DEST: usize = 0;
    /// The number of allow buffers the kernel stores for this grant
    pub const COUNT: u8 = 1;
}

pub struct EncryptionOracleDriver<'a, A: AES128<'a> + AES128Ctr> {
    aes: &'a A,
    process_grants: Grant<
        ProcessState,
        UpcallCount<{ upcall::COUNT }>,
        AllowRoCount<{ ro_allow::COUNT }>,
        AllowRwCount<{ rw_allow::COUNT }>,
    >,

    current_process: OptionalCell<ProcessId>,
    source_buffer: TakeCell<'static, [u8]>,
    dest_buffer: TakeCell<'static, [u8]>,
    crypt_len: Cell<usize>,
}

impl<'a, A: AES128<'a> + AES128Ctr> EncryptionOracleDriver<'a, A> {
    /// Create a new instance of our encryption oracle userspace driver:
    pub fn new(
        aes: &'a A,
        source_buffer: &'static mut [u8],
        dest_buffer: &'static mut [u8],
        process_grants: Grant<
            ProcessState,
            UpcallCount<{ upcall::COUNT }>,
            AllowRoCount<{ ro_allow::COUNT }>,
            AllowRwCount<{ rw_allow::COUNT }>,
        >,
    ) -> Self {
        EncryptionOracleDriver {
            process_grants,
            aes,
            current_process: OptionalCell::empty(),
            source_buffer: TakeCell::new(source_buffer),
            dest_buffer: TakeCell::new(dest_buffer),
            crypt_len: Cell::new(0),
        }
    }

    /// Return a `ProcessId` which has `request_pending` set, if there is some:
    fn next_pending(&self) -> Option<ProcessId> {
        for process_grant in self.process_grants.iter() {
            let processid = process_grant.processid();
            if process_grant.enter(|grant, _| grant.request_pending) {
                // The process to which `process_grant` belongs
                // has a request pending, return its id:
                return Some(processid);
            }
        }

        // No process with `request_pending` found:
        None
    }

    /// The run method initiates a new decryption operation or continues an
    /// existing asynchronous decryption in the context of a process.
    ///
    /// If the process-state `offset` is larger or equal to the process-provided
    /// source or destination buffer size, this indicates that we have completed
    /// the requested description operation and return an error of
    /// `ErrorCode::NOMEM`. A caller can use this as a method to check whether
    /// the descryption operation has finished.
    ///
    /// If the process-state `offset` is `0`, we will initialize the AES engine
    /// with an initialization vector (IV) provided by the application, and
    /// configure it to perform an AES128-CTR operation.
    fn run(&self, processid: ProcessId) -> Result<(), ErrorCode> {
        // If the kernel's source buffer is not present in its TakeCell,
        // this implies that we're currently running a decryption
        // operation:
        if self.source_buffer.is_none() {
            return Err(ErrorCode::BUSY);
        }

        self.process_grants
            .enter(processid, |grant, kernel_data| {
                // Get a reference to both the application-provided source
                // and destination buffers:
                let (source_processbuffer, dest_processbuffer) = kernel_data
                    .get_readonly_processbuffer(ro_allow::SOURCE)
                    .and_then(|source| {
                        kernel_data
                            .get_readwrite_processbuffer(rw_allow::DEST)
                            .map(|dest| (source, dest))
                    })?;

                // Calculate the minimum length of the source & destination
                // buffers:
                let min_processbuffer_len =
                    core::cmp::min(source_processbuffer.len(), dest_processbuffer.len());

                // If our operation-offset stored in the process grant exceeds
                // `min_buffer_len`, then our operation is finished. Return with
                // the appropriate error code.
                //
                // This check also ensures that we're never running a zero-byte
                // encryption operation.
                if grant.offset >= min_processbuffer_len {
                    return Err(ErrorCode::NOMEM);
                }

                // Perform some special initialization if this is the first
                // invocation of our AES engine as part of this decryption
                // operation:
                if grant.offset == 0 {
                    // Offset = 0, initialize the AES engine & IV:
                    self.aes.enable();

                    // Set the AES engine mode to AES128 CTR (counter) mode, and
                    // make this a decryption operation:
                    self.aes.set_mode_aes128ctr(true)?;

                    self.aes.set_key(KEY)?;

                    // Set the initialization vector:
                    kernel_data
                        .get_readonly_processbuffer(ro_allow::IV)
                        .and_then(|iv| {
                            iv.enter(|iv| {
                                let mut static_buf =
                                    [0; kernel::hil::symmetric_encryption::AES128_KEY_SIZE];
                                // Determine the size of the static buffer we have
                                let copy_len = core::cmp::min(static_buf.len(), iv.len());

                                // Clear any previous iv
                                for c in static_buf.iter_mut() {
                                    *c = 0;
                                }
                                // Copy the data into the static buffer
                                iv[..copy_len].copy_to_slice(&mut static_buf[..copy_len]);

                                AES128::set_iv(self.aes, &static_buf[..copy_len])
                            })
                            .map_err(Into::into)
                        })??;
                }

                // Our AES engine works with kernel-provided `&'static mut`
                // buffers. We copy a chunk of application's source buffer
                // contents into this kernel buffer:
                source_processbuffer.enter(|source_processbuffer| {
                    // Attempt to "take" the kernel-internal source &
                    // destination buffers from their TakeCells. We expect them
                    // to be placed back into the TakeCell after an encryption
                    // operation is done, and checked that the `source_buffer`
                    // is present above -- thus this should never fail:
                    let source_buffer = self.source_buffer.take().unwrap();
                    let dest_buffer = self.dest_buffer.take().unwrap();

                    // Determine the amount of data we pass to the AES engine,
                    // which is the minimum of the user-provided buffer space
                    // and our kernel-internal buffer capacity:
                    let data_len = core::cmp::min(source_buffer.len(), min_processbuffer_len);

                    // Now, copy this data into the kernel-internal buffer:
                    source_processbuffer[..data_len].copy_to_slice(&mut source_buffer[..data_len]);

                    // However, our AES engine requires us to pass it at least
                    // `AES128_BLOCK_SIZE` data, and have our data length be a
                    // multiple of the `AES128_BLOCK_SIZE`. We assume that our
                    // `source_buffer` holds at least a full AES128 block. Then,
                    // we can round up or down to a multiple of the
                    // `AES128_BLOCK_SIZE` as required:
                    let crypt_len = if data_len < AES128_BLOCK_SIZE {
                        AES128_BLOCK_SIZE
                    } else {
                        data_len - (data_len % AES128_BLOCK_SIZE)
                    };

                    // Save `crypt_len`, so we know how much data to copy back
                    // to the process buffer after the operation finished:
                    self.crypt_len.set(crypt_len);

                    // Set this process as active:
                    self.current_process.set(processid);

                    // Now, run the operation:
                    if let Some((e, source, dest)) =
                        AES128::crypt(self.aes, Some(source_buffer), dest_buffer, 0, crypt_len)
                    {
                        // An error occurred, clear the currently active process
                        // and replace the buffers. Reset the current process'
                        // offset:
                        grant.offset = 0;
                        self.aes.disable();
                        self.current_process.clear();
                        self.source_buffer.replace(source.unwrap());
                        self.dest_buffer.replace(dest);
                        e
                    } else {
                        Ok(())
                    }
                })?
            })
            .unwrap_or(Err(ErrorCode::RESERVE))
    }

    fn run_next_pending(&self) {
        if self.current_process.is_some() {
            return;
        }

        while let Some(processid) = self.next_pending() {
            let res = self.run(processid);

            let _ = self.process_grants.enter(processid, |grant, kernel_data| {
                grant.request_pending = false;

                if let Err(e) = res {
                    kernel_data
                        .schedule_upcall(
                            upcall::DONE,
                            (kernel::errorcode::into_statuscode(Err(e)), 0, 0),
                        )
                        .ok();
                }
            });
        }
    }
}

impl<'a, A: AES128<'a> + AES128Ctr> SyscallDriver for EncryptionOracleDriver<'a, A> {
    fn command(
        &self,
        command_num: usize,
        _data1: usize,
        _data2: usize,
        processid: ProcessId,
    ) -> CommandReturn {
        match command_num {
            // Check whether the driver is present:
            0 => CommandReturn::success(),

            // Request the decryption operation:
            1 => {
                let res = self
                    .process_grants
                    .enter(processid, |grant, _kernel_data| {
                        grant.request_pending = true;
                        CommandReturn::success()
                    })
                    .unwrap_or_else(|err| err.into());

                self.run_next_pending();

                res
            }

            // Unknown command number, return a NOSUPPORT error
            _ => CommandReturn::failure(ErrorCode::NOSUPPORT),
        }
    }

    fn allocate_grant(&self, processid: ProcessId) -> Result<(), kernel::process::Error> {
        self.process_grants.enter(processid, |_, _| {})
    }
}

impl<'a, A: AES128<'a> + AES128Ctr> Client<'a> for EncryptionOracleDriver<'a, A> {
    fn crypt_done(&'a self, mut source: Option<&'static mut [u8]>, destination: &'static mut [u8]) {
        unimplemented!()
    }
}