Skip to content

Commit 9c7d580

Browse files
authored
Merge pull request #546 from Superhepper/7.x.y-allow-to-specify-exact-key-type
ek, ak abstractions: allow to specficy exact key type
2 parents 96f6855 + 7c4dcee commit 9c7d580

File tree

13 files changed

+603
-139
lines changed

13 files changed

+603
-139
lines changed

tss-esapi/src/abstraction/ak.rs

Lines changed: 107 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -2,31 +2,62 @@
22
// SPDX-License-Identifier: Apache-2.0
33

44
use crate::{
5-
abstraction::{cipher::Cipher, IntoKeyCustomization, KeyCustomization},
5+
abstraction::{AsymmetricAlgorithmSelection, IntoKeyCustomization, KeyCustomization},
66
attributes::{ObjectAttributesBuilder, SessionAttributesBuilder},
77
constants::{AlgorithmIdentifier, SessionType},
88
handles::{AuthHandle, KeyHandle, SessionHandle},
99
interface_types::{
1010
algorithm::{
11-
AsymmetricAlgorithm, EccSchemeAlgorithm, HashingAlgorithm, PublicAlgorithm,
12-
RsaSchemeAlgorithm, SignatureSchemeAlgorithm,
11+
EccSchemeAlgorithm, HashingAlgorithm, PublicAlgorithm, RsaSchemeAlgorithm,
12+
SignatureSchemeAlgorithm,
1313
},
14-
ecc::EccCurve,
15-
key_bits::RsaKeyBits,
1614
session_handles::PolicySession,
1715
},
1816
structures::{
19-
Auth, CreateKeyResult, EccScheme, KeyDerivationFunctionScheme, Private, Public,
20-
PublicBuilder, PublicEccParametersBuilder, PublicKeyRsa, PublicRsaParametersBuilder,
21-
RsaExponent, RsaScheme, SymmetricDefinitionObject,
17+
Auth, CreateKeyResult, Digest, DigestList, EccPoint, EccScheme,
18+
KeyDerivationFunctionScheme, Private, Public, PublicBuilder, PublicEccParametersBuilder,
19+
PublicKeyRsa, PublicRsaParametersBuilder, RsaExponent, RsaScheme,
20+
SymmetricDefinitionObject,
2221
},
2322
Context, Error, Result, WrapperErrorKind,
2423
};
25-
use log::error;
26-
use std::convert::{TryFrom, TryInto};
24+
use std::convert::TryFrom;
25+
26+
// Source: TCG EK Credential Profile for TPM Family 2.0; Level 0 Version 2.5 Revision 2
27+
// Section B.6
28+
const POLICY_A_SHA384: [u8; 48] = [
29+
0x8b, 0xbf, 0x22, 0x66, 0x53, 0x7c, 0x17, 0x1c, 0xb5, 0x6e, 0x40, 0x3c, 0x4d, 0xc1, 0xd4, 0xb6,
30+
0x4f, 0x43, 0x26, 0x11, 0xdc, 0x38, 0x6e, 0x6f, 0x53, 0x20, 0x50, 0xc3, 0x27, 0x8c, 0x93, 0x0e,
31+
0x14, 0x3e, 0x8b, 0xb1, 0x13, 0x38, 0x24, 0xcc, 0xb4, 0x31, 0x05, 0x38, 0x71, 0xc6, 0xdb, 0x53,
32+
];
33+
const POLICY_A_SHA512: [u8; 64] = [
34+
0x1e, 0x3b, 0x76, 0x50, 0x2c, 0x8a, 0x14, 0x25, 0xaa, 0x0b, 0x7b, 0x3f, 0xc6, 0x46, 0xa1, 0xb0,
35+
0xfa, 0xe0, 0x63, 0xb0, 0x3b, 0x53, 0x68, 0xf9, 0xc4, 0xcd, 0xde, 0xca, 0xff, 0x08, 0x91, 0xdd,
36+
0x68, 0x2b, 0xac, 0x1a, 0x85, 0xd4, 0xd8, 0x32, 0xb7, 0x81, 0xea, 0x45, 0x19, 0x15, 0xde, 0x5f,
37+
0xc5, 0xbf, 0x0d, 0xc4, 0xa1, 0x91, 0x7c, 0xd4, 0x2f, 0xa0, 0x41, 0xe3, 0xf9, 0x98, 0xe0, 0xee,
38+
];
39+
const POLICY_A_SM3_256: [u8; 32] = [
40+
0xc6, 0x7f, 0x7d, 0x35, 0xf6, 0x6f, 0x3b, 0xec, 0x13, 0xc8, 0x9f, 0xe8, 0x98, 0x92, 0x1c, 0x65,
41+
0x1b, 0x0c, 0xb5, 0xa3, 0x8a, 0x92, 0x69, 0x0a, 0x62, 0xa4, 0x3c, 0x00, 0x12, 0xe4, 0xfb, 0x8b,
42+
];
43+
const POLICY_C_SHA384: [u8; 48] = [
44+
0xd6, 0x03, 0x2c, 0xe6, 0x1f, 0x2f, 0xb3, 0xc2, 0x40, 0xeb, 0x3c, 0xf6, 0xa3, 0x32, 0x37, 0xef,
45+
0x2b, 0x6a, 0x16, 0xf4, 0x29, 0x3c, 0x22, 0xb4, 0x55, 0xe2, 0x61, 0xcf, 0xfd, 0x21, 0x7a, 0xd5,
46+
0xb4, 0x94, 0x7c, 0x2d, 0x73, 0xe6, 0x30, 0x05, 0xee, 0xd2, 0xdc, 0x2b, 0x35, 0x93, 0xd1, 0x65,
47+
];
48+
const POLICY_C_SHA512: [u8; 64] = [
49+
0x58, 0x9e, 0xe1, 0xe1, 0x46, 0x54, 0x47, 0x16, 0xe8, 0xde, 0xaf, 0xe6, 0xdb, 0x24, 0x7b, 0x01,
50+
0xb8, 0x1e, 0x9f, 0x9c, 0x7d, 0xd1, 0x6b, 0x81, 0x4a, 0xa1, 0x59, 0x13, 0x87, 0x49, 0x10, 0x5f,
51+
0xba, 0x53, 0x88, 0xdd, 0x1d, 0xea, 0x70, 0x2f, 0x35, 0x24, 0x0c, 0x18, 0x49, 0x33, 0x12, 0x1e,
52+
0x2c, 0x61, 0xb8, 0xf5, 0x0d, 0x3e, 0xf9, 0x13, 0x93, 0xa4, 0x9a, 0x38, 0xc3, 0xf7, 0x3f, 0xc8,
53+
];
54+
const POLICY_C_SM3_256: [u8; 32] = [
55+
0x2d, 0x4e, 0x81, 0x57, 0x8c, 0x35, 0x31, 0xd9, 0xbd, 0x1c, 0xdd, 0x7d, 0x02, 0xba, 0x29, 0x8d,
56+
0x56, 0x99, 0xa3, 0xe3, 0x9f, 0xc3, 0x55, 0x1b, 0xfe, 0xff, 0xcf, 0x13, 0x2b, 0x49, 0xe1, 0x1d,
57+
];
2758

2859
fn create_ak_public<IKC: IntoKeyCustomization>(
29-
key_alg: AsymmetricAlgorithm,
60+
key_alg: AsymmetricAlgorithmSelection,
3061
hash_alg: HashingAlgorithm,
3162
sign_alg: SignatureSchemeAlgorithm,
3263
key_customization: IKC,
@@ -50,7 +81,7 @@ fn create_ak_public<IKC: IntoKeyCustomization>(
5081
.build()?;
5182

5283
let key_builder = match key_alg {
53-
AsymmetricAlgorithm::Rsa => PublicBuilder::new()
84+
AsymmetricAlgorithmSelection::Rsa(key_bits) => PublicBuilder::new()
5485
.with_public_algorithm(PublicAlgorithm::Rsa)
5586
.with_name_hashing_algorithm(hash_alg)
5687
.with_object_attributes(obj_attrs)
@@ -60,15 +91,15 @@ fn create_ak_public<IKC: IntoKeyCustomization>(
6091
RsaSchemeAlgorithm::try_from(AlgorithmIdentifier::from(sign_alg))?,
6192
Some(hash_alg),
6293
)?)
63-
.with_key_bits(RsaKeyBits::Rsa2048)
94+
.with_key_bits(key_bits)
6495
.with_exponent(RsaExponent::default())
6596
.with_is_signing_key(obj_attrs.sign_encrypt())
6697
.with_is_decryption_key(obj_attrs.decrypt())
6798
.with_restricted(obj_attrs.restricted())
6899
.build()?,
69100
)
70101
.with_rsa_unique_identifier(PublicKeyRsa::default()),
71-
AsymmetricAlgorithm::Ecc => PublicBuilder::new()
102+
AsymmetricAlgorithmSelection::Ecc(ecc_curve) => PublicBuilder::new()
72103
.with_public_algorithm(PublicAlgorithm::Ecc)
73104
.with_name_hashing_algorithm(hash_alg)
74105
.with_object_attributes(obj_attrs)
@@ -78,16 +109,17 @@ fn create_ak_public<IKC: IntoKeyCustomization>(
78109
.with_ecc_scheme(EccScheme::create(
79110
EccSchemeAlgorithm::try_from(AlgorithmIdentifier::from(sign_alg))?,
80111
Some(hash_alg),
81-
Some(0),
112+
if sign_alg == SignatureSchemeAlgorithm::EcDaa {
113+
Some(0)
114+
} else {
115+
None
116+
},
82117
)?)
83-
.with_curve(EccCurve::NistP192)
118+
.with_curve(ecc_curve)
84119
.with_key_derivation_function_scheme(KeyDerivationFunctionScheme::Null)
85120
.build()?,
86-
),
87-
AsymmetricAlgorithm::Null => {
88-
// TODO: Figure out what to with Null.
89-
return Err(Error::local_error(WrapperErrorKind::UnsupportedParam));
90-
}
121+
)
122+
.with_ecc_unique_identifier(EccPoint::default()),
91123
};
92124

93125
let key_builder = if let Some(ref k) = key_customization {
@@ -99,6 +131,38 @@ fn create_ak_public<IKC: IntoKeyCustomization>(
99131
key_builder.build()
100132
}
101133

134+
// extracts the hashing and sysmmetric algorithm from parent and constructs the correct DigestList for OR policy
135+
fn session_config(
136+
context: &mut Context,
137+
parent: KeyHandle,
138+
) -> Result<(HashingAlgorithm, SymmetricDefinitionObject, DigestList)> {
139+
let (parent_public, _, _) = context.read_public(parent)?;
140+
let parent_hash_alg = parent_public.name_hashing_algorithm();
141+
let parent_symmetric = parent_public
142+
.symmetric_algorithm()
143+
.ok_or_else(|| Error::local_error(WrapperErrorKind::InvalidParam))?;
144+
145+
let mut policy_digests = DigestList::new();
146+
147+
match parent_hash_alg {
148+
HashingAlgorithm::Sha384 => {
149+
policy_digests.add(Digest::try_from(POLICY_A_SHA384.as_slice())?)?;
150+
policy_digests.add(Digest::try_from(POLICY_C_SHA384.as_slice())?)?;
151+
}
152+
HashingAlgorithm::Sha512 => {
153+
policy_digests.add(Digest::try_from(POLICY_A_SHA512.as_slice())?)?;
154+
policy_digests.add(Digest::try_from(POLICY_C_SHA512.as_slice())?)?;
155+
}
156+
HashingAlgorithm::Sm3_256 => {
157+
policy_digests.add(Digest::try_from(POLICY_A_SM3_256.as_slice())?)?;
158+
policy_digests.add(Digest::try_from(POLICY_C_SM3_256.as_slice())?)?;
159+
}
160+
_ => (),
161+
};
162+
163+
Ok((parent_hash_alg, parent_symmetric, policy_digests))
164+
}
165+
102166
/// This loads an Attestation Key previously generated under the Endorsement hierarchy
103167
pub fn load_ak(
104168
context: &mut Context,
@@ -107,14 +171,16 @@ pub fn load_ak(
107171
private: Private,
108172
public: Public,
109173
) -> Result<KeyHandle> {
174+
let (parent_hash_alg, parent_symmetric, policy_digests) = session_config(context, parent)?;
175+
110176
let policy_auth_session = context
111177
.start_auth_session(
112178
None,
113179
None,
114180
None,
115181
SessionType::Policy,
116-
Cipher::aes_128_cfb().try_into()?,
117-
HashingAlgorithm::Sha256,
182+
parent_symmetric.into(),
183+
parent_hash_alg,
118184
)?
119185
.ok_or_else(|| Error::local_error(WrapperErrorKind::WrongValueFromTpm))?;
120186

@@ -142,6 +208,13 @@ pub fn load_ak(
142208
)
143209
})?;
144210

211+
if !policy_digests.is_empty() {
212+
ctx.policy_or(
213+
PolicySession::try_from(policy_auth_session)?,
214+
policy_digests,
215+
)?
216+
}
217+
145218
ctx.execute_with_session(Some(policy_auth_session), |ctx| {
146219
ctx.load(parent, private, public)
147220
})
@@ -160,26 +233,22 @@ pub fn create_ak<IKC: IntoKeyCustomization>(
160233
context: &mut Context,
161234
parent: KeyHandle,
162235
hash_alg: HashingAlgorithm,
236+
key_alg: AsymmetricAlgorithmSelection,
163237
sign_alg: SignatureSchemeAlgorithm,
164238
ak_auth_value: Option<Auth>,
165239
key_customization: IKC,
166240
) -> Result<CreateKeyResult> {
167-
let key_alg = AsymmetricAlgorithm::try_from(sign_alg).map_err(|e| {
168-
// sign_alg is either HMAC or Null.
169-
error!("Could not retrieve asymmetric algorithm for provided signature scheme");
170-
e
171-
})?;
172-
173241
let ak_pub = create_ak_public(key_alg, hash_alg, sign_alg, key_customization)?;
242+
let (parent_hash_alg, parent_symmetric, policy_digests) = session_config(context, parent)?;
174243

175244
let policy_auth_session = context
176245
.start_auth_session(
177246
None,
178247
None,
179248
None,
180249
SessionType::Policy,
181-
Cipher::aes_128_cfb().try_into()?,
182-
HashingAlgorithm::Sha256,
250+
parent_symmetric.into(),
251+
parent_hash_alg,
183252
)?
184253
.ok_or_else(|| Error::local_error(WrapperErrorKind::WrongValueFromTpm))?;
185254

@@ -207,6 +276,13 @@ pub fn create_ak<IKC: IntoKeyCustomization>(
207276
)
208277
})?;
209278

279+
if !policy_digests.is_empty() {
280+
ctx.policy_or(
281+
PolicySession::try_from(policy_auth_session)?,
282+
policy_digests,
283+
)?
284+
};
285+
210286
ctx.execute_with_session(Some(policy_auth_session), |ctx| {
211287
ctx.create(parent, ak_pub, ak_auth_value, None, None, None)
212288
})

0 commit comments

Comments
 (0)