Skip to content

Commit d155fde

Browse files
[nrf noup] Use KMU instead of ITS in Matter Crypto
Use KMU to store crypto materials instead of ITS when it is possible. Added translation between ITS key IDs and KMU slots and adapted existing API. The new feature can be enabled by setting the CHIP_CRYPTO_USE_KMU kconfig option to ``y``. Signed-off-by: Arkadiusz Balys <arkadiusz.balys@nordicsemi.no>
1 parent d218a95 commit d155fde

8 files changed

+171
-5
lines changed

config/nrfconnect/chip-module/CMakeLists.txt

+1
Original file line numberDiff line numberDiff line change
@@ -192,6 +192,7 @@ endif()
192192
if (CONFIG_CHIP_CRYPTO_PSA)
193193
matter_add_gn_arg_string("chip_crypto" "psa")
194194
matter_add_gn_arg_bool ("chip_crypto_psa_spake2p" CONFIG_PSA_WANT_ALG_SPAKE2P_MATTER)
195+
matter_add_gn_arg_bool ("chip_crypto_kmu" CONFIG_CHIP_CRYPTO_USE_KMU)
195196
endif()
196197

197198
if (BOARD STREQUAL "native_posix")

config/nrfconnect/chip-module/Kconfig.features

+9
Original file line numberDiff line numberDiff line change
@@ -289,4 +289,13 @@ config CHIP_LAST_FABRIC_REMOVED_ACTION_DELAY
289289
an action chosen by the CHIP_LAST_FABRIC_REMOVED_ACTION option. This schedule will allow for
290290
avoiding race conditions before the device removes non-volatile data.
291291

292+
config CHIP_CRYPTO_USE_KMU
293+
bool "Use CRACEN KMU driver for storing security materials"
294+
depends on PSA_NEED_CRACEN_KMU_DRIVER
295+
depends on CHIP_CRYPTO_PSA
296+
help
297+
Store security materials in the CRACEN KMU space instead of PSA ITS.
298+
KMU slots 100-180 are dedicated for Matter purposes.
299+
The solution is currently limited to maximum 5 Matter fabrics.
300+
292301
endif # CHIP

src/crypto/BUILD.gn

+8
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,7 @@ buildconfig_header("crypto_buildconfig") {
5555
"CHIP_CRYPTO_OPENSSL=${chip_crypto_openssl}",
5656
"CHIP_CRYPTO_BORINGSSL=${chip_crypto_boringssl}",
5757
"CHIP_CRYPTO_PLATFORM=${chip_crypto_platform}",
58+
"CHIP_CRYPTO_KMU=${chip_crypto_kmu}",
5859
]
5960
}
6061

@@ -124,6 +125,13 @@ if (chip_crypto == "openssl") {
124125
"CHIPCryptoPALmbedTLS.h",
125126
"CHIPCryptoPALmbedTLSCert.cpp",
126127
]
128+
129+
if (chip_crypto_kmu) {
130+
sources += [
131+
"KMUKeystoreAdaptation.h"
132+
]
133+
}
134+
127135
public_deps = [ ":public_headers" ]
128136

129137
if (!chip_external_mbedtls) {

src/crypto/CHIPCryptoPALPSA.cpp

+7
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,9 @@
2222

2323
#include "CHIPCryptoPALPSA.h"
2424
#include "CHIPCryptoPALmbedTLS.h"
25+
#if CHIP_CRYPTO_KMU
26+
#include "KMUKeystoreAdaptation.h"
27+
#endif
2528

2629
#include <lib/core/CHIPEncoding.h>
2730
#include <lib/core/CHIPSafeCasts.h>
@@ -272,6 +275,10 @@ CHIP_ERROR FindFreeKeySlotInRange(psa_key_id_t & keyId, psa_key_id_t start, uint
272275

273276
for (keyId = start; keyId < end; keyId++)
274277
{
278+
#if CHIP_CRYPTO_KMU
279+
CHIP_ERROR error = KMU::GetSlot(&keyId, &attributes);
280+
VerifyOrReturnError(error == CHIP_NO_ERROR, error);
281+
#endif
275282
psa_status_t status = psa_get_key_attributes(keyId, &attributes);
276283
if (status == PSA_ERROR_INVALID_HANDLE)
277284
{

src/crypto/KMUKeystoreAdaptation.h

+108
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,108 @@
1+
/*
2+
* Copyright (c) 2024 Project CHIP Authors
3+
* All rights reserved.
4+
*
5+
* Licensed under the Apache License, Version 2.0 (the "License");
6+
* you may not use this file except in compliance with the License.
7+
* You may obtain a copy of the License at
8+
*
9+
* http://www.apache.org/licenses/LICENSE-2.0
10+
*
11+
* Unless required by applicable law or agreed to in writing, software
12+
* distributed under the License is distributed on an "AS IS" BASIS,
13+
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14+
* See the License for the specific language governing permissions and
15+
* limitations under the License.
16+
*/
17+
#pragma once
18+
19+
#include "CHIPCryptoPALPSA.h"
20+
21+
#include <cinttypes>
22+
#include <cracen_psa_kmu.h>
23+
24+
/* KMU Slots for Matter purpose:
25+
*
26+
* DAC private key 176-180 (1 key)
27+
* NOC private keys (Operational) 155-175 (5 fabrics max)
28+
* ICD keys 113-153 (5 fabrics max)
29+
*
30+
* DAC private key needs 4 KMU slots
31+
* NOC private key needs 4 KMU slots
32+
* ICD key needs 8 KMU slots
33+
*/
34+
#define KMU_ADAPTATION_USE_ENCRYPTION 0
35+
36+
namespace chip {
37+
namespace Crypto {
38+
namespace KMU {
39+
40+
inline constexpr static uint8_t NOC_Offset = 155;
41+
inline constexpr static uint8_t ICD_Offset = 113;
42+
inline constexpr static uint8_t NOC_KeyMax = 5;
43+
inline constexpr static uint8_t ICD_KeyMax = 5;
44+
inline constexpr static uint8_t NOC_SingleKeySlots = 2;
45+
inline constexpr static uint8_t ICD_SingleKeySlots = 1;
46+
#if KMU_ADAPTATION_USE_ENCRYPTION
47+
inline constexpr static uint8_t EncryptionOverhead = 2;
48+
#else
49+
inline constexpr static uint8_t EncryptionOverhead = 0;
50+
#endif
51+
52+
inline CHIP_ERROR GetSlot(psa_key_id_t * keyID, psa_key_attributes_t * attributes)
53+
{
54+
if (!keyID)
55+
{
56+
return CHIP_ERROR_INVALID_ARGUMENT;
57+
}
58+
59+
if (static_cast<uint8_t>(*keyID) >= static_cast<uint8_t>(KeyIdBase::Operational) &&
60+
static_cast<uint8_t>(*keyID) < static_cast<uint8_t>(KeyIdBase::DACPrivKey))
61+
{
62+
if (static_cast<uint8_t>(*keyID) > static_cast<uint8_t>(NOC_KeyMax))
63+
{
64+
return CHIP_ERROR_PERSISTED_STORAGE_FAILED;
65+
}
66+
67+
psa_key_id_t newId = NOC_Offset + ((NOC_SingleKeySlots + EncryptionOverhead) * (*keyID - 1));
68+
*keyID = static_cast<psa_key_id_t>(PSA_KEY_HANDLE_FROM_CRACEN_KMU_SLOT(CRACEN_KMU_KEY_USAGE_SCHEME_ENCRYPTED, newId));
69+
if (attributes)
70+
{
71+
psa_set_key_lifetime(
72+
attributes,
73+
PSA_KEY_LIFETIME_FROM_PERSISTENCE_AND_LOCATION(PSA_KEY_PERSISTENCE_DEFAULT, PSA_KEY_LOCATION_CRACEN_KMU));
74+
}
75+
76+
return CHIP_NO_ERROR;
77+
}
78+
else if (static_cast<uint8_t>(*keyID) >= static_cast<uint8_t>(KeyIdBase::ICDKeyRangeStart) &&
79+
static_cast<uint8_t>(*keyID) < static_cast<uint8_t>(KeyIdBase::Maximum))
80+
{
81+
if (static_cast<uint8_t>(*keyID) > static_cast<uint8_t>(NOC_KeyMax))
82+
{
83+
return CHIP_ERROR_PERSISTED_STORAGE_FAILED;
84+
}
85+
86+
psa_key_id_t newId = ICD_Offset + ((ICD_SingleKeySlots + EncryptionOverhead) * (*keyID - 1));
87+
*keyID = static_cast<psa_key_id_t>(PSA_KEY_HANDLE_FROM_CRACEN_KMU_SLOT(CRACEN_KMU_KEY_USAGE_SCHEME_RAW, newId));
88+
89+
if (attributes)
90+
{
91+
// Cracen KMU supports only PSA_ALG_CCM algorithm, so convert it.
92+
if (psa_get_key_algorithm(attributes) == PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(PSA_ALG_CCM, 8))
93+
{
94+
psa_set_key_algorithm(attributes, PSA_ALG_CCM);
95+
}
96+
97+
psa_set_key_lifetime(
98+
attributes,
99+
PSA_KEY_LIFETIME_FROM_PERSISTENCE_AND_LOCATION(PSA_KEY_PERSISTENCE_DEFAULT, PSA_KEY_LOCATION_CRACEN_KMU));
100+
}
101+
return CHIP_NO_ERROR;
102+
}
103+
104+
return CHIP_ERROR_INVALID_ARGUMENT;
105+
}
106+
} // namespace KMU
107+
} // namespace Crypto
108+
} // namespace chip

src/crypto/PSAOperationalKeystore.cpp

+31-3
Original file line numberDiff line numberDiff line change
@@ -22,13 +22,27 @@
2222

2323
#include <psa/crypto.h>
2424

25+
#if CHIP_CRYPTO_KMU
26+
#include "KMUKeystoreAdaptation.h"
27+
#endif
28+
2529
namespace chip {
2630
namespace Crypto {
2731

2832
PSAOperationalKeystore::PersistentP256Keypair::PersistentP256Keypair(FabricIndex fabricIndex)
2933
{
3034
ToPsaContext(mKeypair).key_id = MakeOperationalKeyId(fabricIndex);
31-
mInitialized = true;
35+
36+
#if CHIP_CRYPTO_KMU
37+
if (CHIP_NO_ERROR != KMU::GetSlot(&ToPsaContext(mKeypair).key_id, nullptr))
38+
{
39+
ToPsaContext(mKeypair).key_id = 0;
40+
mInitialized = false;
41+
return;
42+
}
43+
#endif
44+
45+
mInitialized = true;
3246
}
3347

3448
PSAOperationalKeystore::PersistentP256Keypair::~PersistentP256Keypair()
@@ -66,12 +80,20 @@ CHIP_ERROR PSAOperationalKeystore::PersistentP256Keypair::Generate()
6680
// Type based on ECC with the elliptic curve SECP256r1 -> PSA_ECC_FAMILY_SECP_R1
6781
psa_set_key_type(&attributes, PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1));
6882
psa_set_key_bits(&attributes, kP256_PrivateKey_Length * 8);
69-
psa_set_key_algorithm(&attributes, PSA_ALG_ECDSA(PSA_ALG_SHA_256));
7083
psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_SIGN_MESSAGE);
84+
#if CHIP_CRYPTO_KMU
85+
psa_set_key_algorithm(&attributes, PSA_ALG_ECDSA(PSA_ALG_ANY_HASH));
86+
psa_set_key_lifetime(&attributes,
87+
PSA_KEY_LIFETIME_FROM_PERSISTENCE_AND_LOCATION(PSA_KEY_PERSISTENCE_DEFAULT, PSA_KEY_LOCATION_CRACEN_KMU));
88+
#else
89+
psa_set_key_algorithm(&attributes, PSA_ALG_ECDSA(PSA_ALG_SHA_256));
7190
psa_set_key_lifetime(&attributes, PSA_KEY_LIFETIME_PERSISTENT);
91+
#endif
7292
psa_set_key_id(&attributes, GetKeyId());
7393

94+
ChipLogError(Crypto, "keyId: 0x%x\n\n", keyId);
7495
status = psa_generate_key(&attributes, &keyId);
96+
ChipLogError(Crypto, "psa_generate_key failed with status %d", status);
7597
VerifyOrExit(status == PSA_SUCCESS, error = CHIP_ERROR_INTERNAL);
7698

7799
status = psa_export_public_key(keyId, mPublicKey.Bytes(), mPublicKey.Length(), &publicKeyLength);
@@ -149,9 +171,15 @@ CHIP_ERROR PSAOperationalKeystore::PersistentP256Keypair::Deserialize(P256Serial
149171
// Type based on ECC with the elliptic curve SECP256r1 -> PSA_ECC_FAMILY_SECP_R1
150172
psa_set_key_type(&attributes, PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1));
151173
psa_set_key_bits(&attributes, kP256_PrivateKey_Length * 8);
152-
psa_set_key_algorithm(&attributes, PSA_ALG_ECDSA(PSA_ALG_SHA_256));
153174
psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_SIGN_MESSAGE);
175+
#if CHIP_CRYPTO_KMU
176+
psa_set_key_algorithm(&attributes, PSA_ALG_ECDSA(PSA_ALG_ANY_HASH));
177+
psa_set_key_lifetime(&attributes,
178+
PSA_KEY_LIFETIME_FROM_PERSISTENCE_AND_LOCATION(PSA_KEY_PERSISTENCE_DEFAULT, PSA_KEY_LOCATION_CRACEN_KMU));
179+
#else
180+
psa_set_key_algorithm(&attributes, PSA_ALG_ECDSA(PSA_ALG_SHA_256));
154181
psa_set_key_lifetime(&attributes, PSA_KEY_LIFETIME_PERSISTENT);
182+
#endif
155183
psa_set_key_id(&attributes, GetKeyId());
156184

157185
status = psa_import_key(&attributes, input.ConstBytes() + mPublicKey.Length(), kP256_PrivateKey_Length, &keyId);

src/crypto/PSASessionKeystore.cpp

+4-2
Original file line numberDiff line numberDiff line change
@@ -202,8 +202,10 @@ CHIP_ERROR PSASessionKeystore::PersistICDKey(Symmetric128BitsKeyHandle & key)
202202
return CHIP_NO_ERROR;
203203
}
204204

205-
SuccessOrExit(err = Crypto::FindFreeKeySlotInRange(newKeyId, to_underlying(KeyIdBase::ICDKeyRangeStart), kMaxICDClientKeys));
206-
psa_set_key_lifetime(&attrs, PSA_KEY_LIFETIME_PERSISTENT);
205+
SuccessOrExit(err = Crypto::FindFreeKeySlotInRange(newKeyId, to_underlying(KeyIdBase::ICDKeyRangeStart), kMaxICDClientKeys));
206+
#if !CHIP_CRYPTO_KMU
207+
psa_set_key_lifetime(&attributes, PSA_KEY_LIFETIME_PERSISTENT);
208+
#endif
207209
psa_set_key_id(&attrs, newKeyId);
208210
VerifyOrExit(psa_copy_key(key.As<psa_key_id_t>(), &attrs, &newKeyId) == PSA_SUCCESS, err = CHIP_ERROR_INTERNAL);
209211

src/crypto/crypto.gni

+3
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,9 @@ declare_args() {
2222

2323
# Use PSA Spake2+ implementation. Only used if chip_crypto == "psa"
2424
chip_crypto_psa_spake2p = false
25+
26+
# Provide KMU support for nRF54L15 devices. Only used if chip_crypto == "psa"
27+
chip_crypto_kmu = false
2528
}
2629

2730
assert(

0 commit comments

Comments
 (0)