-
Notifications
You must be signed in to change notification settings - Fork 96
Specification of how keys and the random seed are stored #53
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Patater
merged 4 commits into
ARMmbed:development
from
gilles-peskine-arm:storage_spec-initial
Feb 20, 2019
Merged
Changes from all commits
Commits
Show all changes
4 commits
Select commit
Hold shift + click to select a range
4945176
Add framework for architecture documents in Markdown
gilles-peskine-arm 0b02002
Specification of how Mbed Crypto uses storage
gilles-peskine-arm b5a132f
Minor clarifications
gilles-peskine-arm f02fbf4
Don't mention "crypto service" when discussing a library integration
gilles-peskine-arm File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,2 @@ | ||
*.html | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
PANDOC = pandoc | ||
|
||
default: all | ||
|
||
all_markdown = \ | ||
mbed-crypto-storage-specification.md \ | ||
# This line is intentionally left blank | ||
|
||
html: $(all_markdown:.md=.html) | ||
pdf: $(all_markdown:.md=.pdf) | ||
all: html pdf | ||
|
||
.SUFFIXES: | ||
.SUFFIXES: .md .html .pdf | ||
|
||
.md.html: | ||
$(PANDOC) -o $@ $< | ||
.md.pdf: | ||
$(PANDOC) -o $@ $< |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,153 @@ | ||
Mbed Crypto storage specification | ||
================================= | ||
|
||
This document specifies how Mbed Crypto uses storage. | ||
|
||
Mbed Crypto may be upgraded on an existing device with the storage preserved. Therefore: | ||
|
||
1. Any change may break existing installations and may require an upgrade path. | ||
1. This document retains historical information about all past released versions. Do not remove information from this document unless it has always been incorrect or it is about a version that you are sure was never released. | ||
|
||
Mbed Crypto 0.1.0 | ||
----------------- | ||
|
||
Tags: mbedcrypto-0.1.0b, mbedcrypto-0.1.0b2 | ||
|
||
Released in November 2018. <br> | ||
Integrated in Mbed OS 5.11. | ||
|
||
Supported backends: | ||
|
||
* [PSA ITS](#file-namespace-on-its-for-0.1.0) | ||
* [C stdio](#file-namespace-on-stdio-for-0.1.0) | ||
|
||
Supported features: | ||
|
||
* [Persistent transparent keys](#key-file-format-for-0.1.0) designated by a [slot number](#key-names-for-0.1.0). | ||
* [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-0.1.0) on ITS only. | ||
|
||
This is a beta release, and we do not promise backward compatibility, with one exception: | ||
|
||
> On Mbed OS, if a device has a nonvolatile random seed file produced with Mbed OS 5.11.x and is upgraded to a later version of Mbed OS, the nonvolatile random seed file is preserved or upgraded. | ||
|
||
We do not make any promises regarding key storage, or regarding the nonvolatile random seed file on other platforms. | ||
|
||
### Key names for 0.1.0 | ||
|
||
Information about each key is stored in a dedicated file whose name is constructed from the key identifier. The way in which the file name is constructed depends on the storage backend. The content of the file is described [below](#key-file-format-for-0.1.0). | ||
|
||
The valid values for a key identifier are the range from 1 to 0xfffeffff. This limitation on the range is not documented in user-facing documentation: according to the user-facing documentation, arbitrary 32-bit values are valid. | ||
|
||
The code uses the following constant in an internal header (note that despite the name, this value is actually one plus the maximum permitted value): | ||
|
||
#define PSA_MAX_PERSISTENT_KEY_IDENTIFIER 0xffff0000 | ||
|
||
There is a shared namespace for all callers. | ||
|
||
### Key file format for 0.1.0 | ||
|
||
All integers are encoded in little-endian order in 8-bit bytes. | ||
|
||
The layout of a key file is: | ||
|
||
* magic (8 bytes): `"PSA\0KEY\0"` | ||
* version (4 bytes): 0 | ||
* type (4 bytes): `psa_key_type_t` value | ||
* policy usage flags (4 bytes): `psa_key_usage_t` value | ||
* policy usage algorithm (4 bytes): `psa_algorithm_t` value | ||
* key material length (4 bytes) | ||
* key material: output of `psa_export_key` | ||
* Any trailing data is rejected on load. | ||
|
||
### Nonvolatile random seed file format for 0.1.0 | ||
|
||
The nonvolatile random seed file contains a seed for the random generator. If present, it is rewritten at each boot as part of the random generator initialization. | ||
|
||
The file format is just the seed as a byte string with no metadata or encoding of any kind. | ||
|
||
### File namespace on ITS for 0.1.0 | ||
|
||
Assumption: ITS provides a 32-bit file identifier namespace. The Crypto service can use arbitrary file identifiers and no other part of the system accesses the same file identifier namespace. | ||
|
||
* File 0: unused. | ||
* Files 1 through 0xfffeffff: [content](#key-file-format-for-0.1.0) of the [key whose identifier is the file identifier](#key-names-for-0.1.0). | ||
* File 0xffffff52 (`PSA_CRYPTO_ITS_RANDOM_SEED_UID`): [nonvolatile random seed](#nonvolatile-random-seed-file-format-for-0.1.0). | ||
* Files 0xffff0000 through 0xffffff51, 0xffffff53 through 0xffffffff: unused. | ||
|
||
### File namespace on stdio for 0.1.0 | ||
|
||
Assumption: C stdio, allowing names containing lowercase letters, digits and underscores, of length up to 23. | ||
|
||
An undocumented build-time configuration value `CRYPTO_STORAGE_FILE_LOCATION` allows storing the key files in a directory other than the current directory. This value is simply prepended to the file name (so it must end with a directory separator to put the keys in a different directory). | ||
|
||
* `CRYPTO_STORAGE_FILE_LOCATION "psa_key_slot_0"`: used as a temporary file. Must be writable. May be overwritten or deleted if present. | ||
* `sprintf(CRYPTO_STORAGE_FILE_LOCATION "psa_key_slot_%lu", key_id)` [content](#key-file-format-for-0.1.0) of the [key whose identifier](#key-names-for-0.1.0) is `key_id`. | ||
* Other files: unused. | ||
|
||
Mbed Crypto 0.2.0 | ||
Patater marked this conversation as resolved.
Show resolved
Hide resolved
|
||
----------------- | ||
|
||
**Warning:** the information in this section is provisional and may change before Mbed Crypto is released for Mbed OS 5.12. At the time of writing, we don't even know whether this version will be called 0.2.0. | ||
|
||
To be released for Mbed OS 5.12. | ||
|
||
Supported backends: | ||
|
||
* [PSA platform](#file-namespace-on-a-psa-platform-for-0.2.0) | ||
* [library using PSA ITS](#file-namespace-on-its-as-a-library-for-0.2.0) | ||
* [library using C stdio](#file-namespace-on-stdio-for-0.2.0) | ||
|
||
Supported features: | ||
|
||
* [Persistent transparent keys](#key-file-format-for-0.2.0) designated by a [key identifier and owner](#key-names-for-0.2.0). | ||
* [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-0.2.0) on ITS only. | ||
|
||
Backward compatibility commitments: TBD | ||
|
||
### Key names for 0.2.0 | ||
|
||
Information about each key is stored in a dedicated file whose name is constructed from the 32-bit key identifier (`psa_key_id_t`) and, if applicable, the owner identifier. The way in which the file name is constructed depends on the storage backend. The content of the file is described [below](#key-file-format-for-0.2.0). | ||
|
||
The valid values for a key identifier are the range from 1 to 0xfffeffff. This limitation on the range is not documented in user-facing documentation: according to the user-facing documentation, arbitrary 32-bit values are valid. | ||
|
||
* Library integration: the key file name is just the key identifer. This is a 32-bit value. | ||
* PSA service integration: the key file name is `key_id << 32 | owner_uid` where `key_id` is the key identifier specified by the application and `owner_uid` is the calling partition identifier provided to the server by the partition manager. This is a 64-bit value. | ||
|
||
### Key file format for 0.2.0 | ||
|
||
The layout is identical to [0.1.0](#key-file-format-for-0.1.0) so far. However note that the encoding of key types, algorithms and key material has changed, therefore the storage format is not compatible (despite using the same value in the version field so far). | ||
|
||
### Nonvolatile random seed file format for 0.2.0 | ||
|
||
[Identical to 0.1.0](#nonvolatile-random-seed-file-format-for-0.1.0). | ||
|
||
### File namespace on a PSA platform for 0.2.0 | ||
|
||
Assumption: ITS provides a 64-bit file identifier namespace. The Crypto service can use arbitrary file identifiers and no other part of the system accesses the same file identifier namespace. | ||
|
||
* Files 0 through 0xffffff51, 0xffffff53 through 0xffffffff: unused. | ||
* File 0xffffff52 (`PSA_CRYPTO_ITS_RANDOM_SEED_UID`): [nonvolatile random seed](#nonvolatile-random-seed-file-format-for-0.1.0). | ||
* Files 0x100000000 through 0xffffffffffff: [content](#key-file-format-for-0.2.0) of the [key whose identifier is the file identifier](#key-names-for-0.2.0). | ||
|
||
### File namespace on ITS as a library for 0.2.0 | ||
|
||
Assumption: ITS provides a 64-bit file identifier namespace. The entity using the crypto library can use arbitrary file identifiers and no other part of the system accesses the same file identifier namespace. | ||
|
||
* File 0: unused. | ||
* Files 1 through 0xfffeffff: [content](#key-file-format-for-0.2.0) of the [key whose identifier is the file identifier](#key-names-for-0.2.0). | ||
* File 0xffffff52 (`PSA_CRYPTO_ITS_RANDOM_SEED_UID`): [nonvolatile random seed](#nonvolatile-random-seed-file-format-for-0.2.0). | ||
* Files 0xffff0000 through 0xffffff51, 0xffffff53 through 0xffffffff, 0x100000000 through 0xffffffffffffffff: unused. | ||
|
||
### File namespace on stdio for 0.2.0 | ||
|
||
[Identical to 0.1.0](#file-namespace-on-stdio-for-0.1.0). | ||
|
||
### Upgrade from 0.1.0 to 0.2.0. | ||
|
||
* Delete files 1 through 0xfffeffff, which contain keys in a format that is no longer supported. | ||
|
||
### Suggested changes to make before 0.2.0 | ||
|
||
The library integration and the PSA platform integration use different sets of file names. This is annoyingly non-uniform. For example, if we want to store non-key files, we have room in different ranges (0 through 0xffffffff on a PSA platform, 0xffff0000 through 0xffffffffffffffff in a library integration). | ||
|
||
It would simplify things to always have a 32-bit owner, with a nonzero value, and thus reserve the range 0–0xffffffff for internal library use. |
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.