Skip to content

Commit 5236902

Browse files
committed
tss-esapi: move public keys to rustcrypto ecosystem
Signed-off-by: Arthur Gautier <arthur.gautier@arista.com>
1 parent 2cc4f63 commit 5236902

File tree

4 files changed

+251
-145
lines changed

4 files changed

+251
-145
lines changed

tss-esapi/Cargo.toml

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -34,9 +34,6 @@ hostname-validator = "1.1.0"
3434
regex = "1.3.9"
3535
zeroize = { version = "1.5.7", features = ["zeroize_derive"] }
3636
tss-esapi-sys = { path = "../tss-esapi-sys", version = "0.5.0" }
37-
oid = { version = "0.2.1", optional = true }
38-
picky-asn1 = { version = "0.9.0", optional = true }
39-
picky-asn1-x509 = { version = "0.13.0", optional = true }
4037
x509-cert = { version = "0.2.0", optional = true }
4138
ecdsa = { version = "0.16.9", features = ["der", "hazmat", "arithmetic", "verifying"], optional = true }
4239
elliptic-curve = { version = "0.13.8", optional = true, features = ["alloc", "pkcs8"] }
@@ -77,7 +74,7 @@ semver = "1.0.7"
7774
[features]
7875
default = ["abstraction"]
7976
generate-bindings = ["tss-esapi-sys/generate-bindings"]
80-
abstraction = ["oid", "picky-asn1", "picky-asn1-x509"]
77+
abstraction = ["rustcrypto"]
8178
integration-tests = ["strum", "strum_macros"]
8279

8380
rustcrypto = ["ecdsa", "elliptic-curve", "signature", "x509-cert"]

tss-esapi/src/abstraction/public.rs

Lines changed: 202 additions & 90 deletions
Original file line numberDiff line numberDiff line change
@@ -2,127 +2,239 @@
22
// SPDX-License-Identifier: Apache-2.0
33

44
use crate::interface_types::ecc::EccCurve;
5-
use crate::structures::{Public, RsaExponent};
5+
use crate::structures::Public;
6+
use crate::utils::PublicKey as TpmPublicKey;
67
use crate::{Error, WrapperErrorKind};
78

89
use core::convert::TryFrom;
9-
use oid::ObjectIdentifier;
10-
use picky_asn1::bit_string::BitString;
11-
use picky_asn1::wrapper::{IntegerAsn1, OctetStringAsn1};
12-
use picky_asn1_x509::{
13-
AlgorithmIdentifier, EcParameters, EcPoint, PublicKey, RsaPublicKey, SubjectPublicKeyInfo,
10+
use elliptic_curve::{
11+
generic_array::typenum::Unsigned,
12+
sec1::{EncodedPoint, FromEncodedPoint, ModulusSize, ToEncodedPoint},
13+
AffinePoint, CurveArithmetic, FieldBytesSize, PublicKey,
1414
};
1515

16-
/// Can be converted from [`crate::structures::Public`] when not a fully constructed
17-
/// [`picky_asn1_x509::SubjectPublicKeyInfo`] is required.
18-
///
19-
/// # Details
20-
/// Holds either [`picky_asn1_x509::RsaPublicKey`] for [`crate::structures::Public::Rsa`] or
21-
/// [`picky_asn1_x509::EcPoint`] for [`crate::structures::Public::Ecc`].
22-
///
23-
/// This object can be serialized and deserialized
24-
/// using serde if the `serde` feature is enabled.
25-
#[derive(Debug, PartialEq, Eq, Clone)]
26-
#[cfg_attr(feature = "serde", derive(serde::Deserialize, serde::Serialize))]
27-
pub enum DecodedKey {
28-
RsaPublicKey(RsaPublicKey),
29-
EcPoint(EcPoint),
16+
use x509_cert::spki::SubjectPublicKeyInfoOwned;
17+
18+
#[cfg(all(feature = "rustcrypto", feature = "rsa"))]
19+
use {
20+
crate::structures::RsaExponent,
21+
rsa::{pkcs8::EncodePublicKey, BigUint, RsaPublicKey},
22+
};
23+
24+
/// Default exponent for RSA keys.
25+
// Also known as 0x10001
26+
#[cfg(all(feature = "rustcrypto", feature = "rsa"))]
27+
const RSA_DEFAULT_EXP: u64 = 65537;
28+
29+
impl<C> TryFrom<&Public> for PublicKey<C>
30+
where
31+
C: CurveArithmetic + AssociatedTpmCurve,
32+
FieldBytesSize<C>: ModulusSize,
33+
AffinePoint<C>: FromEncodedPoint<C> + ToEncodedPoint<C>,
34+
{
35+
type Error = Error;
36+
37+
fn try_from(value: &Public) -> Result<Self, Self::Error> {
38+
match value {
39+
Public::Ecc {
40+
parameters, unique, ..
41+
} => {
42+
if parameters.ecc_curve() != C::TPM_CURVE {
43+
return Err(Error::local_error(WrapperErrorKind::InvalidParam));
44+
}
45+
46+
let x = unique.x().as_bytes();
47+
let y = unique.y().as_bytes();
48+
49+
if x.len() != FieldBytesSize::<C>::USIZE {
50+
return Err(Error::local_error(WrapperErrorKind::InvalidParam));
51+
}
52+
if y.len() != FieldBytesSize::<C>::USIZE {
53+
return Err(Error::local_error(WrapperErrorKind::InvalidParam));
54+
}
55+
56+
let encoded_point =
57+
EncodedPoint::<C>::from_affine_coordinates(x.into(), y.into(), false);
58+
let public_key = PublicKey::<C>::try_from(&encoded_point)
59+
.map_err(|_| Error::local_error(WrapperErrorKind::InvalidParam))?;
60+
61+
Ok(public_key)
62+
}
63+
_ => Err(Error::local_error(WrapperErrorKind::UnsupportedParam)),
64+
}
65+
}
3066
}
3167

32-
impl TryFrom<Public> for DecodedKey {
68+
#[cfg(all(feature = "rustcrypto", feature = "rsa"))]
69+
impl TryFrom<&Public> for RsaPublicKey {
3370
type Error = Error;
3471

35-
fn try_from(value: Public) -> Result<Self, Self::Error> {
36-
public_to_decoded_key(&value)
72+
fn try_from(value: &Public) -> Result<Self, Self::Error> {
73+
match value {
74+
Public::Rsa {
75+
unique, parameters, ..
76+
} => {
77+
let exponent = match parameters.exponent() {
78+
RsaExponent::ZERO_EXPONENT => BigUint::from(RSA_DEFAULT_EXP),
79+
_ => BigUint::from(parameters.exponent().value()),
80+
};
81+
let modulus = BigUint::from_bytes_be(unique.as_bytes());
82+
83+
let public_key = RsaPublicKey::new(modulus, exponent)
84+
.map_err(|_| Error::local_error(WrapperErrorKind::InvalidParam))?;
85+
86+
Ok(public_key)
87+
}
88+
_ => Err(Error::local_error(WrapperErrorKind::UnsupportedParam)),
89+
}
3790
}
3891
}
3992

40-
impl TryFrom<Public> for SubjectPublicKeyInfo {
93+
impl TryFrom<&Public> for SubjectPublicKeyInfoOwned {
4194
type Error = Error;
4295

43-
/// Converts [`crate::structures::Public::Rsa`] and [`crate::structures::Public::Ecc`] to [`picky_asn1_x509::SubjectPublicKeyInfo`].
96+
/// Converts [`crate::structures::Public::Rsa`] and [`crate::structures::Public::Ecc`] to [`x509_cert::spki::SubjectPublicKeyInfoOwned`].
4497
///
4598
/// # Details
46-
/// The result can be used to convert TPM public keys to DER using `picky_asn1_der`.
99+
/// The result can be used to convert TPM public keys to DER using `x509-cert`.
47100
///
48101
/// # Errors
49102
/// * if other instances of [`crate::structures::Public`] are used `UnsupportedParam` will be returned.
50-
fn try_from(value: Public) -> Result<Self, Self::Error> {
51-
let decoded_key = public_to_decoded_key(&value)?;
52-
53-
match (value, decoded_key) {
54-
(Public::Rsa { .. }, DecodedKey::RsaPublicKey(key)) => Ok(SubjectPublicKeyInfo {
55-
algorithm: AlgorithmIdentifier::new_rsa_encryption(),
56-
subject_public_key: PublicKey::Rsa(key.into()),
57-
}),
58-
(Public::Ecc { parameters, .. }, DecodedKey::EcPoint(point)) => {
59-
Ok(SubjectPublicKeyInfo {
60-
algorithm: AlgorithmIdentifier::new_elliptic_curve(EcParameters::NamedCurve(
61-
curve_oid(parameters.ecc_curve())?.into(),
62-
)),
63-
subject_public_key: PublicKey::Ec(BitString::with_bytes(point).into()),
64-
})
103+
fn try_from(value: &Public) -> Result<Self, Self::Error> {
104+
match value {
105+
#[cfg(all(feature = "rustcrypto", feature = "rsa"))]
106+
Public::Rsa { .. } => {
107+
let public_key = RsaPublicKey::try_from(value)?;
108+
109+
Ok(public_key
110+
.to_public_key_der()
111+
.map_err(|_| Error::local_error(WrapperErrorKind::InvalidParam))?
112+
.decode_msg::<Self>()
113+
.map_err(|_| Error::local_error(WrapperErrorKind::InvalidParam))?)
114+
}
115+
#[allow(unused)]
116+
Public::Ecc { parameters, .. } => {
117+
macro_rules! read_key {
118+
($curve:expr, $key_type:ty) => {
119+
if parameters.ecc_curve() == <$key_type>::TPM_CURVE {
120+
let public_key = PublicKey::<$key_type>::try_from(value)?;
121+
122+
return public_key
123+
.to_public_key_der()
124+
.map_err(|_| Error::local_error(WrapperErrorKind::InvalidParam))?
125+
.decode_msg::<Self>()
126+
.map_err(|_| Error::local_error(WrapperErrorKind::InvalidParam));
127+
}
128+
};
129+
}
130+
131+
#[cfg(all(feature = "rustcrypto", feature = "p192"))]
132+
read_key!(EccCurve::NistP192, p192::NistP192);
133+
#[cfg(all(feature = "rustcrypto", feature = "p224"))]
134+
read_key!(EccCurve::NistP224, p224::NistP224);
135+
#[cfg(all(feature = "rustcrypto", feature = "p256"))]
136+
read_key!(EccCurve::NistP256, p256::NistP256);
137+
#[cfg(all(feature = "rustcrypto", feature = "p384"))]
138+
read_key!(EccCurve::NistP384, p384::NistP384);
139+
#[cfg(all(feature = "rustcrypto", feature = "p521"))]
140+
read_key!(EccCurve::NistP521, p521::NistP521);
141+
#[cfg(all(feature = "rustcrypto", feature = "sm2"))]
142+
read_key!(EccCurve::Sm2P256, sm2::Sm2);
143+
144+
Err(Error::local_error(WrapperErrorKind::UnsupportedParam))
65145
}
66146
_ => Err(Error::local_error(WrapperErrorKind::UnsupportedParam)),
67147
}
68148
}
69149
}
70150

71-
/// Converts [`crate::structures::Public::Rsa`] and [`crate::structures::Public::Ecc`] to [DecodedKey].
72-
///
73-
/// # Details
74-
/// Does basic key conversion to either RSA or ECC. In RSA conversion the TPM zero exponent is replaced with `65537`.
75-
///
76-
/// # Errors
77-
/// * if other instances of [`crate::structures::Public`] are used `UnsupportedParam` will be returned.
78-
fn public_to_decoded_key(public: &Public) -> Result<DecodedKey, Error> {
79-
match public {
80-
Public::Rsa {
81-
unique, parameters, ..
82-
} => {
83-
let exponent = match parameters.exponent() {
84-
RsaExponent::ZERO_EXPONENT => 65537,
85-
_ => parameters.exponent().value(),
151+
impl<C> TryFrom<&TpmPublicKey> for PublicKey<C>
152+
where
153+
C: CurveArithmetic + AssociatedTpmCurve,
154+
FieldBytesSize<C>: ModulusSize,
155+
AffinePoint<C>: FromEncodedPoint<C> + ToEncodedPoint<C>,
156+
{
157+
type Error = Error;
158+
159+
fn try_from(value: &TpmPublicKey) -> Result<Self, Self::Error> {
160+
match value {
161+
TpmPublicKey::Ecc { x, y } => {
162+
let x = x.as_slice();
163+
let y = y.as_slice();
164+
165+
// TODO: When elliptic_curve bumps to 0.14, we can use the TryFrom implementation instead
166+
// of checking lengths manually
167+
if x.len() != FieldBytesSize::<C>::USIZE {
168+
return Err(Error::local_error(WrapperErrorKind::InvalidParam));
169+
}
170+
if y.len() != FieldBytesSize::<C>::USIZE {
171+
return Err(Error::local_error(WrapperErrorKind::InvalidParam));
172+
}
173+
174+
let encoded_point =
175+
EncodedPoint::<C>::from_affine_coordinates(x.into(), y.into(), false);
176+
let public_key = PublicKey::<C>::try_from(&encoded_point)
177+
.map_err(|_| Error::local_error(WrapperErrorKind::InvalidParam))?;
178+
179+
Ok(public_key)
86180
}
87-
.to_be_bytes();
88-
Ok(DecodedKey::RsaPublicKey(RsaPublicKey {
89-
modulus: IntegerAsn1::from_bytes_be_unsigned(unique.as_bytes().to_vec()),
90-
public_exponent: IntegerAsn1::from_bytes_be_signed(exponent.to_vec()),
91-
}))
92-
}
93-
Public::Ecc { unique, .. } => {
94-
let x = unique.x().as_bytes().to_vec();
95-
let y = unique.y().as_bytes().to_vec();
96-
Ok(DecodedKey::EcPoint(OctetStringAsn1(
97-
elliptic_curve_point_to_octet_string(x, y),
98-
)))
181+
_ => Err(Error::local_error(WrapperErrorKind::UnsupportedParam)),
99182
}
183+
}
184+
}
100185

101-
_ => Err(Error::local_error(WrapperErrorKind::UnsupportedParam)),
186+
#[cfg(all(feature = "rustcrypto", feature = "rsa"))]
187+
impl TryFrom<&TpmPublicKey> for RsaPublicKey {
188+
type Error = Error;
189+
190+
fn try_from(value: &TpmPublicKey) -> Result<Self, Self::Error> {
191+
match value {
192+
TpmPublicKey::Rsa(modulus) => {
193+
let exponent = BigUint::from(RSA_DEFAULT_EXP);
194+
let modulus = BigUint::from_bytes_be(modulus.as_slice());
195+
196+
let public_key = RsaPublicKey::new(modulus, exponent)
197+
.map_err(|_| Error::local_error(WrapperErrorKind::InvalidParam))?;
198+
199+
Ok(public_key)
200+
}
201+
_ => Err(Error::local_error(WrapperErrorKind::UnsupportedParam)),
202+
}
102203
}
103204
}
104205

105-
// Taken from https://github.com/parallaxsecond/parsec/blob/561235f3cc37bcff3d9a6cb29c84eeae5d55100b/src/providers/tpm/utils.rs#L319
106-
// Points on elliptic curves are represented as defined in section 2.3.3 of https://www.secg.org/sec1-v2.pdf
107-
// The (uncompressed) representation is [ 0x04 || x || y ] where x and y are the coordinates of the point
108-
fn elliptic_curve_point_to_octet_string(mut x: Vec<u8>, mut y: Vec<u8>) -> Vec<u8> {
109-
let mut octet_string = vec![0x04];
110-
octet_string.append(&mut x);
111-
octet_string.append(&mut y);
112-
octet_string
206+
/// Provides the value of the curve used in this crate for the specific curve.
207+
pub trait AssociatedTpmCurve {
208+
/// Value of the curve when interacting with the TPM.
209+
const TPM_CURVE: EccCurve;
113210
}
114211

115-
// Map TPM supported ECC curves to their respective OIDs
116-
fn curve_oid(ecc_curve: EccCurve) -> Result<ObjectIdentifier, Error> {
117-
match ecc_curve {
118-
EccCurve::NistP192 => Ok(picky_asn1_x509::oids::secp192r1()),
119-
EccCurve::NistP224 => Ok(picky_asn1_x509::oids::secp256r1()),
120-
EccCurve::NistP256 => Ok(picky_asn1_x509::oids::secp256r1()),
121-
EccCurve::NistP384 => Ok(picky_asn1_x509::oids::secp384r1()),
122-
EccCurve::NistP521 => Ok(picky_asn1_x509::oids::secp521r1()),
123-
// Barreto-Naehrig curves seem to not have any OIDs
124-
EccCurve::BnP256 => Err(Error::local_error(WrapperErrorKind::UnsupportedParam)),
125-
EccCurve::BnP638 => Err(Error::local_error(WrapperErrorKind::UnsupportedParam)),
126-
EccCurve::Sm2P256 => Ok(ObjectIdentifier::try_from("1.2.156.10197.1.301").unwrap()),
127-
}
212+
#[cfg(all(feature = "rustcrypto", feature = "p192"))]
213+
impl AssociatedTpmCurve for p192::NistP192 {
214+
const TPM_CURVE: EccCurve = EccCurve::NistP192;
215+
}
216+
217+
#[cfg(all(feature = "rustcrypto", feature = "p224"))]
218+
impl AssociatedTpmCurve for p224::NistP224 {
219+
const TPM_CURVE: EccCurve = EccCurve::NistP224;
220+
}
221+
222+
#[cfg(all(feature = "rustcrypto", feature = "p256"))]
223+
impl AssociatedTpmCurve for p256::NistP256 {
224+
const TPM_CURVE: EccCurve = EccCurve::NistP256;
225+
}
226+
227+
#[cfg(all(feature = "rustcrypto", feature = "p384"))]
228+
impl AssociatedTpmCurve for p384::NistP384 {
229+
const TPM_CURVE: EccCurve = EccCurve::NistP384;
230+
}
231+
232+
#[cfg(all(feature = "rustcrypto", feature = "p521"))]
233+
impl AssociatedTpmCurve for p521::NistP521 {
234+
const TPM_CURVE: EccCurve = EccCurve::NistP521;
235+
}
236+
237+
#[cfg(all(feature = "rustcrypto", feature = "sm2"))]
238+
impl AssociatedTpmCurve for sm2::Sm2 {
239+
const TPM_CURVE: EccCurve = EccCurve::Sm2P256;
128240
}

tss-esapi/src/structures/tagged/public.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,9 @@ use crate::{
1313
Error, Result, ReturnCode, WrapperErrorKind,
1414
};
1515

16+
use self::rsa::PublicRsaParameters;
1617
use ecc::PublicEccParameters;
1718
use keyed_hash::PublicKeyedHashParameters;
18-
use rsa::PublicRsaParameters;
1919

2020
use log::error;
2121
use std::convert::{TryFrom, TryInto};

0 commit comments

Comments
 (0)