Botan 3.10.0
Crypto and TLS for C&
tpm2_key.cpp
Go to the documentation of this file.
1/*
2* TPM 2.0 Key Wrappers' Base Class
3* (C) 2024 Jack Lloyd
4* (C) 2024 René Meusel, Amos Treiber - Rohde & Schwarz Cybersecurity GmbH, financed by LANCOM Systems GmbH
5*
6* Botan is released under the Simplified BSD License (see license.txt)
7*/
8
9#include <botan/tpm2_key.h>
10
11#if defined(BOTAN_HAS_TPM2_RSA_ADAPTER)
12 #include <botan/tpm2_rsa.h>
13#endif
14#if defined(BOTAN_HAS_TPM2_ECC_ADAPTER)
15 #include <botan/tpm2_ecc.h>
16#endif
17
18#include <botan/internal/fmt.h>
19#include <botan/internal/stl_util.h>
20#include <botan/internal/tpm2_algo_mappings.h>
21#include <botan/internal/tpm2_hash.h>
22#include <botan/internal/tpm2_util.h>
23
24#include <tss2/tss2_esys.h>
25#include <tss2/tss2_mu.h>
26
27namespace Botan::TPM2 {
28
29#if defined(BOTAN_HAS_RSA)
30Botan::RSA_PublicKey rsa_pubkey_from_tss2_public(const TPM2B_PUBLIC* public_area) {
31 // TODO: this RSA_PublicKey currently takes const-refs, so we cannot benefit
32 // from moving them in place. This should be fixed in the future.
33 return std::apply([](const BigInt& n, const BigInt& e) { return Botan::RSA_PublicKey(n, e); },
34 rsa_pubkey_components_from_tss2_public(public_area));
35}
36#endif
37
38#if defined(BOTAN_HAS_ECC_GROUP)
39std::pair<EC_Group, EC_AffinePoint> ecc_pubkey_from_tss2_public(const TPM2B_PUBLIC* public_blob) {
40 BOTAN_ASSERT_NONNULL(public_blob);
41 BOTAN_ARG_CHECK(public_blob->publicArea.type == TPM2_ALG_ECC, "Public blob is not an ECC key");
42
43 const auto curve_id = public_blob->publicArea.parameters.eccDetail.curveID;
44 const auto curve_name = curve_id_tss2_to_botan(curve_id);
45 if(!curve_name) {
46 throw Invalid_Argument(Botan::fmt("Unsupported ECC curve: {}", curve_id));
47 }
48
49 auto curve = Botan::EC_Group::from_name(curve_name.value());
50 // Create an EC_AffinePoint from the x and y coordinates as SEC1 uncompressed point.
51 // According to the TPM2.0 specification Part 1 C.8, each coordinate is already padded to the curve's size.
52 auto point = EC_AffinePoint::deserialize(curve,
53 concat(std::vector<uint8_t>({0x04}),
54 as_span(public_blob->publicArea.unique.ecc.x),
55 as_span(public_blob->publicArea.unique.ecc.y)));
56 if(!point) {
57 throw Invalid_Argument("Invalid ECC Point");
58 }
59 return {std::move(curve), std::move(point.value())};
60}
61#endif
62
63namespace {
64
65Object load_persistent_object(const std::shared_ptr<Context>& ctx,
66 TPM2_HANDLE persistent_object_handle,
67 std::span<const uint8_t> auth_value,
68 const SessionBundle& sessions) {
70 TPM2_PERSISTENT_FIRST <= persistent_object_handle && persistent_object_handle <= TPM2_PERSISTENT_LAST,
71 "persistent_object_handle out of range");
73 const bool is_persistent = value_exists(ctx->persistent_handles(), persistent_object_handle);
74 BOTAN_STATE_CHECK(is_persistent);
75
76 Object object(ctx);
77
78 check_rc("Esys_TR_FromTPMPublic",
79 Esys_TR_FromTPMPublic(ctx->esys_context(),
80 persistent_object_handle,
81 sessions[0],
82 sessions[1],
83 sessions[2],
84 out_transient_handle(object)));
85
86 if(!auth_value.empty()) {
87 const auto user_auth = copy_into<TPM2B_AUTH>(auth_value);
88 check_rc("Esys_TR_SetAuth", Esys_TR_SetAuth(ctx->esys_context(), object.transient_handle(), &user_auth));
89 }
90
91 check_rc("Esys_TR_GetTpmHandle",
92 Esys_TR_GetTpmHandle(ctx->esys_context(), object.transient_handle(), out_persistent_handle(object)));
93
94 const auto key_type = object._public_info(sessions).pub->publicArea.type;
95 BOTAN_ARG_CHECK(key_type == TPM2_ALG_RSA || key_type == TPM2_ALG_ECC,
96 "persistent object is neither RSA nor ECC public key");
97
98 return object;
99}
100
101std::vector<uint8_t> marshal_public_blob(const TPM2B_PUBLIC* public_data) {
102 size_t bytes_required = 0;
103 std::vector<uint8_t> marshalled_blob(sizeof(TPM2B_PUBLIC));
104 check_rc("Tss2_MU_TPM2B_PUBLIC_Marshal",
105 Tss2_MU_TPM2B_PUBLIC_Marshal(public_data, marshalled_blob.data(), marshalled_blob.size(), &bytes_required));
106 marshalled_blob.resize(bytes_required);
107 marshalled_blob.shrink_to_fit();
108 return marshalled_blob;
109}
110
111TPM2B_PUBLIC unmarshal_public_blob(std::span<const uint8_t> marshalled_blob) {
112 TPM2B_PUBLIC public_data{};
113 size_t offset = 0;
114 check_rc("Tss2_MU_TPM2B_PUBLIC_Unmarshal",
115 Tss2_MU_TPM2B_PUBLIC_Unmarshal(marshalled_blob.data(), marshalled_blob.size(), &offset, &public_data));
116 BOTAN_ASSERT_NOMSG(offset == marshalled_blob.size());
117 return public_data;
118}
119
120TPM2B_TEMPLATE marshal_template(const TPMT_PUBLIC& key_template) {
121 TPM2B_TEMPLATE result = {};
122 size_t offset = 0;
123 check_rc("Tss2_MU_TPMT_PUBLIC_Marshal",
124 Tss2_MU_TPMT_PUBLIC_Marshal(&key_template, result.buffer, sizeof(TPMT_PUBLIC), &offset));
125 BOTAN_ASSERT_NOMSG(offset <= sizeof(result.buffer));
126 result.size = static_cast<uint16_t>(offset);
127 return result;
128}
129
130} // namespace
131
132std::unique_ptr<PublicKey> PublicKey::load_persistent(const std::shared_ptr<Context>& ctx,
133 TPM2_HANDLE persistent_object_handle,
134 const SessionBundle& sessions) {
135 return create(load_persistent_object(ctx, persistent_object_handle, {}, sessions), sessions);
136}
137
138std::unique_ptr<PublicKey> PublicKey::load_transient(const std::shared_ptr<Context>& ctx,
139 std::span<const uint8_t> public_blob,
140 const SessionBundle& sessions) {
141 const auto public_data = unmarshal_public_blob(public_blob);
142
144
145 Object handle(ctx);
146 check_rc("Esys_LoadExternal",
147 Esys_LoadExternal(ctx->esys_context(),
148 sessions[0],
149 sessions[1],
150 sessions[2],
151 nullptr /* no private data to be loaded */,
152 &public_data,
153 TPM2_RH_NULL,
154 out_transient_handle(handle)));
155 return create(std::move(handle), sessions);
156}
157
158std::vector<uint8_t> PublicKey::raw_public_key_bits() const {
159 return marshal_public_blob(m_handle._public_info(m_sessions).pub.get());
160}
161
162std::unique_ptr<PublicKey> PublicKey::create(Object handles, const SessionBundle& sessions) {
163 [[maybe_unused]] const auto* pubinfo = handles._public_info(sessions).pub.get();
164#if defined(BOTAN_HAS_TPM2_RSA_ADAPTER)
165 if(pubinfo->publicArea.type == TPM2_ALG_RSA) {
166 return std::unique_ptr<PublicKey>(new RSA_PublicKey(std::move(handles), sessions, pubinfo));
167 }
168#endif
169#if defined(BOTAN_HAS_TPM2_ECC_ADAPTER)
170 if(pubinfo->publicArea.type == TPM2_ALG_ECC) {
171 return std::unique_ptr<PublicKey>(new EC_PublicKey(std::move(handles), sessions, pubinfo));
172 }
173#endif
174
175 throw Not_Implemented(Botan::fmt("Loaded a {} public key of an unsupported type",
176 handles.has_persistent_handle() ? "persistent" : "transient"));
177}
178
179// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
180
181std::unique_ptr<PrivateKey> PrivateKey::load_persistent(const std::shared_ptr<Context>& ctx,
182 TPM2_HANDLE persistent_object_handle,
183 std::span<const uint8_t> auth_value,
184 const SessionBundle& sessions) {
185 return create(load_persistent_object(ctx, persistent_object_handle, auth_value, sessions),
186 sessions,
187 nullptr /* pull public info from handle */,
188 {} /* persistent keys don't have an encrypted private blob */);
189}
190
191std::unique_ptr<PrivateKey> PrivateKey::load_transient(const std::shared_ptr<Context>& ctx,
192 std::span<const uint8_t> auth_value,
193 const TPM2::PrivateKey& parent,
194 std::span<const uint8_t> public_blob,
195 std::span<const uint8_t> private_blob,
196 const SessionBundle& sessions) {
198 Object handle(ctx);
199
200 const auto public_data = unmarshal_public_blob(public_blob);
201 const auto private_data = copy_into<TPM2B_PRIVATE>(private_blob);
202
203 check_rc("Esys_Load",
204 Esys_Load(ctx->esys_context(),
205 parent.handles().transient_handle(),
206 sessions[0],
207 sessions[1],
208 sessions[2],
209 &private_data,
210 &public_data,
211 out_transient_handle(handle)));
212
213 if(!auth_value.empty()) {
214 const auto user_auth = copy_into<TPM2B_AUTH>(auth_value);
215 check_rc("Esys_TR_SetAuth", Esys_TR_SetAuth(ctx->esys_context(), handle.transient_handle(), &user_auth));
216 }
217
218 return create(std::move(handle), sessions, nullptr /* pull public info from handle */, private_blob);
219}
220
221std::unique_ptr<PrivateKey> PrivateKey::create_transient_from_template(const std::shared_ptr<Context>& ctx,
222 const SessionBundle& sessions,
223 ESYS_TR parent,
224 const TPMT_PUBLIC& key_template,
225 const TPM2B_SENSITIVE_CREATE& sensitive_data) {
227
228 // NOLINTBEGIN(*-branch-clone)
229
230 switch(key_template.type) {
231 case TPM2_ALG_RSA:
232#if not defined(BOTAN_HAS_TPM2_RSA_ADAPTER)
233 throw Not_Implemented("TPM2-based RSA keys are not supported in this build");
234#endif
235 break;
236 case TPM2_ALG_ECC:
237#if not defined(BOTAN_HAS_TPM2_ECC_ADAPTER)
238 throw Not_Implemented("TPM2-based ECC keys are not supported in this build");
239#endif
240 break;
241 default:
242 throw Invalid_Argument("Unsupported key type");
243 }
244
245 // NOLINTEND(*-branch-clone)
246
247 const auto marshalled_template = marshal_template(key_template);
248
249 Object handle(ctx);
250 unique_esys_ptr<TPM2B_PRIVATE> private_bytes;
252
253 // Esys_CreateLoaded can create different object types depending on the type
254 // of the parent passed in. Namely, this will create a Primary object if the
255 // parent is referencing a Primary Seed; an Ordinary Object if the parent is
256 // referencing a Storage Parent; and a Derived Object if the parent is
257 // referencing a Derivation Parent.
258 //
259 // See the Architecture Document, Section 27.1.
260 check_rc("Esys_CreateLoaded",
261 Esys_CreateLoaded(ctx->esys_context(),
262 parent,
263 sessions[0],
264 sessions[1],
265 sessions[2],
266 &sensitive_data,
267 &marshalled_template,
268 out_transient_handle(handle),
269 out_ptr(private_bytes),
270 out_ptr(public_info)));
271 BOTAN_ASSERT_NONNULL(private_bytes);
272 BOTAN_ASSERT_NOMSG(public_info->publicArea.type == key_template.type);
274
275 return create(std::move(handle), sessions, public_info.get(), as_span(*private_bytes));
276}
277
279 BOTAN_STATE_CHECK(!m_handle.has_persistent_handle());
280 BOTAN_ASSERT_NOMSG(!m_private_blob.empty());
281 return Botan::lock(m_private_blob);
282}
283
284std::vector<uint8_t> PrivateKey::raw_public_key_bits() const {
285 return marshal_public_blob(m_handle._public_info(m_sessions).pub.get());
286}
287
289 // Architectural Document, Section 4.54
290 // any object with the decrypt and restricted attributes SET and the sign
291 // attribute CLEAR
292 const auto attrs = m_handle.attributes(m_sessions);
293 return attrs.decrypt && attrs.restricted && !attrs.sign_encrypt;
294}
295
296std::unique_ptr<PrivateKey> PrivateKey::create(Object handles,
297 [[maybe_unused]] const SessionBundle& sessions,
298 [[maybe_unused]] const TPM2B_PUBLIC* public_info,
299 [[maybe_unused]] std::span<const uint8_t> private_blob) {
300 if(public_info == nullptr) {
301 public_info = handles._public_info(sessions).pub.get();
302 }
303
304#if defined(BOTAN_HAS_TPM2_RSA_ADAPTER)
305 if(public_info->publicArea.type == TPM2_ALG_RSA) {
306 return std::unique_ptr<RSA_PrivateKey>(
307 new RSA_PrivateKey(std::move(handles), sessions, public_info, private_blob));
308 }
309#endif
310
311#if defined(BOTAN_HAS_TPM2_ECC_ADAPTER)
312 if(public_info->publicArea.type == TPM2_ALG_ECC) {
313 return std::unique_ptr<EC_PrivateKey>(new EC_PrivateKey(std::move(handles), sessions, public_info, private_blob));
314 }
315#endif
316
317 throw Not_Implemented(Botan::fmt("Loaded a {} private key of an unsupported type",
318 handles.has_persistent_handle() ? "persistent" : "transient"));
319}
320
321} // namespace Botan::TPM2
#define BOTAN_ASSERT_NOMSG(expr)
Definition assert.h:75
#define BOTAN_STATE_CHECK(expr)
Definition assert.h:49
#define BOTAN_ASSERT_NONNULL(ptr)
Definition assert.h:114
#define BOTAN_ARG_CHECK(expr, msg)
Definition assert.h:33
static std::optional< EC_AffinePoint > deserialize(const EC_Group &group, std::span< const uint8_t > bytes)
static EC_Group from_name(std::string_view name)
Definition ec_group.cpp:384
bool has_transient_handle() const
ESYS_TR transient_handle() const noexcept
static std::unique_ptr< PrivateKey > create_transient_from_template(const std::shared_ptr< Context > &ctx, const SessionBundle &sessions, ESYS_TR parent, const TPMT_PUBLIC &key_template, const TPM2B_SENSITIVE_CREATE &sensitive_data)
Definition tpm2_key.cpp:221
std::vector< uint8_t > raw_public_key_bits() const override
Definition tpm2_key.cpp:284
static std::unique_ptr< PrivateKey > create(Object handles, const SessionBundle &sessions, const TPM2B_PUBLIC *public_info, std::span< const uint8_t > private_blob)
Definition tpm2_key.cpp:296
static std::unique_ptr< PrivateKey > load_persistent(const std::shared_ptr< Context > &ctx, TPM2_HANDLE persistent_object_handle, std::span< const uint8_t > auth_value, const SessionBundle &sessions)
Definition tpm2_key.cpp:181
static std::unique_ptr< PrivateKey > load_transient(const std::shared_ptr< Context > &ctx, std::span< const uint8_t > auth_value, const TPM2::PrivateKey &parent, std::span< const uint8_t > public_blob, std::span< const uint8_t > private_blob, const SessionBundle &sessions)
Definition tpm2_key.cpp:191
const SessionBundle & sessions() const
Definition tpm2_key.h:224
secure_vector< uint8_t > raw_private_key_bits() const override
Definition tpm2_key.cpp:278
static std::unique_ptr< PublicKey > create(Object handles, const SessionBundle &sessions)
Definition tpm2_key.cpp:162
std::vector< uint8_t > raw_public_key_bits() const override
Definition tpm2_key.cpp:158
static std::unique_ptr< PublicKey > load_persistent(const std::shared_ptr< Context > &ctx, TPM2_HANDLE persistent_object_handle, const SessionBundle &sessions={})
Definition tpm2_key.cpp:132
const Object & handles() const
Definition tpm2_key.h:99
const SessionBundle & sessions() const
Definition tpm2_key.h:101
static std::unique_ptr< PublicKey > load_transient(const std::shared_ptr< Context > &ctx, std::span< const uint8_t > public_blob, const SessionBundle &sessions)
Definition tpm2_key.cpp:138
constexpr void check_rc(std::string_view location, TSS2_RC rc)
Definition tpm2_util.h:55
constexpr auto out_persistent_handle(Object &object)
Definition tpm2_util.h:225
std::unique_ptr< T, esys_liberator > unique_esys_ptr
A unique pointer type for ESYS handles that automatically frees the handle.
Definition tpm2_util.h:163
std::optional< std::string > curve_id_tss2_to_botan(TPMI_ECC_CURVE mode_id)
constexpr auto out_transient_handle(Object &object)
Definition tpm2_util.h:219
constexpr void copy_into(T &dest, std::span< const uint8_t > data)
Definition tpm2_util.h:118
constexpr auto as_span(tpm2_buffer auto &data)
Construct a std::span as a view into a TPM2 buffer.
Definition tpm2_util.h:103
constexpr auto out_ptr(T &outptr) noexcept
Definition stl_util.h:414
std::string fmt(std::string_view format, const T &... args)
Definition fmt.h:53
secure_vector< T > lock(const std::vector< T > &in)
Definition secmem.h:81
constexpr auto concat(Rs &&... ranges)
Definition stl_util.h:254
bool value_exists(const std::vector< T > &vec, const V &val)
Definition stl_util.h:51
std::vector< T, secure_allocator< T > > secure_vector
Definition secmem.h:69
uint32_t ESYS_TR
Forward declaration of TSS2 type for convenience.
uint32_t TPM2_HANDLE
Forward declaration of TSS2 type for convenience.