Botan 3.11.0
Crypto and TLS for C&
tpm2_key.cpp
Go to the documentation of this file.
1/*
2* TPM 2.0 Key Wrappers' Base Class
3* (C) 2024 Jack Lloyd
4* (C) 2024 René Meusel, Amos Treiber - Rohde & Schwarz Cybersecurity GmbH, financed by LANCOM Systems GmbH
5*
6* Botan is released under the Simplified BSD License (see license.txt)
7*/
8
9#include <botan/tpm2_key.h>
10
11#if defined(BOTAN_HAS_TPM2_RSA_ADAPTER)
12 #include <botan/tpm2_rsa.h>
13#endif
14#if defined(BOTAN_HAS_TPM2_ECC_ADAPTER)
15 #include <botan/tpm2_ecc.h>
16#endif
17
18#include <botan/internal/concat_util.h>
19#include <botan/internal/fmt.h>
20#include <botan/internal/stl_util.h>
21#include <botan/internal/tpm2_algo_mappings.h>
22#include <botan/internal/tpm2_hash.h>
23#include <botan/internal/tpm2_util.h>
24
25#include <tss2/tss2_esys.h>
26#include <tss2/tss2_mu.h>
27
28namespace Botan::TPM2 {
29
30#if defined(BOTAN_HAS_RSA)
31Botan::RSA_PublicKey rsa_pubkey_from_tss2_public(const TPM2B_PUBLIC* public_area) {
32 // TODO: this RSA_PublicKey currently takes const-refs, so we cannot benefit
33 // from moving them in place. This should be fixed in the future.
34 return std::apply([](const BigInt& n, const BigInt& e) { return Botan::RSA_PublicKey(n, e); },
35 rsa_pubkey_components_from_tss2_public(public_area));
36}
37#endif
38
39#if defined(BOTAN_HAS_ECC_GROUP)
40std::pair<EC_Group, EC_AffinePoint> ecc_pubkey_from_tss2_public(const TPM2B_PUBLIC* public_blob) {
41 BOTAN_ASSERT_NONNULL(public_blob);
42 BOTAN_ARG_CHECK(public_blob->publicArea.type == TPM2_ALG_ECC, "Public blob is not an ECC key");
43
44 const auto curve_id = public_blob->publicArea.parameters.eccDetail.curveID;
45 const auto curve_name = curve_id_tss2_to_botan(curve_id);
46 if(!curve_name) {
47 throw Invalid_Argument(Botan::fmt("Unsupported ECC curve: {}", curve_id));
48 }
49
50 auto curve = Botan::EC_Group::from_name(curve_name.value());
51 // Create an EC_AffinePoint from the x and y coordinates as SEC1 uncompressed point.
52 // According to the TPM2.0 specification Part 1 C.8, each coordinate is already padded to the curve's size.
53 auto point = EC_AffinePoint::deserialize(curve,
54 concat(std::vector<uint8_t>({0x04}),
55 as_span(public_blob->publicArea.unique.ecc.x),
56 as_span(public_blob->publicArea.unique.ecc.y)));
57 if(!point) {
58 throw Invalid_Argument("Invalid ECC Point");
59 }
60 return {std::move(curve), std::move(point.value())};
61}
62#endif
63
64namespace {
65
66Object load_persistent_object(const std::shared_ptr<Context>& ctx,
67 TPM2_HANDLE persistent_object_handle,
68 std::span<const uint8_t> auth_value,
69 const SessionBundle& sessions) {
71 TPM2_PERSISTENT_FIRST <= persistent_object_handle && persistent_object_handle <= TPM2_PERSISTENT_LAST,
72 "persistent_object_handle out of range");
74 const bool is_persistent = value_exists(ctx->persistent_handles(), persistent_object_handle);
75 BOTAN_STATE_CHECK(is_persistent);
76
77 Object object(ctx);
78
79 check_rc("Esys_TR_FromTPMPublic",
80 Esys_TR_FromTPMPublic(ctx->esys_context(),
81 persistent_object_handle,
82 sessions[0],
83 sessions[1],
84 sessions[2],
85 out_transient_handle(object)));
86
87 if(!auth_value.empty()) {
88 const auto user_auth = copy_into<TPM2B_AUTH>(auth_value);
89 check_rc("Esys_TR_SetAuth", Esys_TR_SetAuth(ctx->esys_context(), object.transient_handle(), &user_auth));
90 }
91
92 check_rc("Esys_TR_GetTpmHandle",
93 Esys_TR_GetTpmHandle(ctx->esys_context(), object.transient_handle(), out_persistent_handle(object)));
94
95 const auto key_type = object._public_info(sessions).pub->publicArea.type;
96 BOTAN_ARG_CHECK(key_type == TPM2_ALG_RSA || key_type == TPM2_ALG_ECC,
97 "persistent object is neither RSA nor ECC public key");
98
99 return object;
100}
101
102std::vector<uint8_t> marshal_public_blob(const TPM2B_PUBLIC* public_data) {
103 size_t bytes_required = 0;
104 std::vector<uint8_t> marshalled_blob(sizeof(TPM2B_PUBLIC));
105 check_rc("Tss2_MU_TPM2B_PUBLIC_Marshal",
106 Tss2_MU_TPM2B_PUBLIC_Marshal(public_data, marshalled_blob.data(), marshalled_blob.size(), &bytes_required));
107 marshalled_blob.resize(bytes_required);
108 marshalled_blob.shrink_to_fit();
109 return marshalled_blob;
110}
111
112TPM2B_PUBLIC unmarshal_public_blob(std::span<const uint8_t> marshalled_blob) {
113 TPM2B_PUBLIC public_data{};
114 size_t offset = 0;
115 check_rc("Tss2_MU_TPM2B_PUBLIC_Unmarshal",
116 Tss2_MU_TPM2B_PUBLIC_Unmarshal(marshalled_blob.data(), marshalled_blob.size(), &offset, &public_data));
117 BOTAN_ASSERT_NOMSG(offset == marshalled_blob.size());
118 return public_data;
119}
120
121TPM2B_TEMPLATE marshal_template(const TPMT_PUBLIC& key_template) {
122 TPM2B_TEMPLATE result = {};
123 size_t offset = 0;
124 check_rc("Tss2_MU_TPMT_PUBLIC_Marshal",
125 Tss2_MU_TPMT_PUBLIC_Marshal(&key_template, result.buffer, sizeof(TPMT_PUBLIC), &offset));
126 BOTAN_ASSERT_NOMSG(offset <= sizeof(result.buffer));
127 result.size = static_cast<uint16_t>(offset);
128 return result;
129}
130
131} // namespace
132
133std::unique_ptr<PublicKey> PublicKey::load_persistent(const std::shared_ptr<Context>& ctx,
134 TPM2_HANDLE persistent_object_handle,
135 const SessionBundle& sessions) {
136 return create(load_persistent_object(ctx, persistent_object_handle, {}, sessions), sessions);
137}
138
139std::unique_ptr<PublicKey> PublicKey::load_transient(const std::shared_ptr<Context>& ctx,
140 std::span<const uint8_t> public_blob,
141 const SessionBundle& sessions) {
142 const auto public_data = unmarshal_public_blob(public_blob);
143
145
146 Object handle(ctx);
147 check_rc("Esys_LoadExternal",
148 Esys_LoadExternal(ctx->esys_context(),
149 sessions[0],
150 sessions[1],
151 sessions[2],
152 nullptr /* no private data to be loaded */,
153 &public_data,
154 TPM2_RH_NULL,
155 out_transient_handle(handle)));
156 return create(std::move(handle), sessions);
157}
158
159std::vector<uint8_t> PublicKey::raw_public_key_bits() const {
160 return marshal_public_blob(m_handle._public_info(m_sessions).pub.get());
161}
162
163std::unique_ptr<PublicKey> PublicKey::create(Object handles, const SessionBundle& sessions) {
164 [[maybe_unused]] const auto* pubinfo = handles._public_info(sessions).pub.get();
165#if defined(BOTAN_HAS_TPM2_RSA_ADAPTER)
166 if(pubinfo->publicArea.type == TPM2_ALG_RSA) {
167 return std::unique_ptr<PublicKey>(new RSA_PublicKey(std::move(handles), sessions, pubinfo));
168 }
169#endif
170#if defined(BOTAN_HAS_TPM2_ECC_ADAPTER)
171 if(pubinfo->publicArea.type == TPM2_ALG_ECC) {
172 return std::unique_ptr<PublicKey>(new EC_PublicKey(std::move(handles), sessions, pubinfo));
173 }
174#endif
175
176 throw Not_Implemented(Botan::fmt("Loaded a {} public key of an unsupported type",
177 handles.has_persistent_handle() ? "persistent" : "transient"));
178}
179
180// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
181
182std::unique_ptr<PrivateKey> PrivateKey::load_persistent(const std::shared_ptr<Context>& ctx,
183 TPM2_HANDLE persistent_object_handle,
184 std::span<const uint8_t> auth_value,
185 const SessionBundle& sessions) {
186 return create(load_persistent_object(ctx, persistent_object_handle, auth_value, sessions),
187 sessions,
188 nullptr /* pull public info from handle */,
189 {} /* persistent keys don't have an encrypted private blob */);
190}
191
192std::unique_ptr<PrivateKey> PrivateKey::load_transient(const std::shared_ptr<Context>& ctx,
193 std::span<const uint8_t> auth_value,
194 const TPM2::PrivateKey& parent,
195 std::span<const uint8_t> public_blob,
196 std::span<const uint8_t> private_blob,
197 const SessionBundle& sessions) {
199 Object handle(ctx);
200
201 const auto public_data = unmarshal_public_blob(public_blob);
202 const auto private_data = copy_into<TPM2B_PRIVATE>(private_blob);
203
204 check_rc("Esys_Load",
205 Esys_Load(ctx->esys_context(),
206 parent.handles().transient_handle(),
207 sessions[0],
208 sessions[1],
209 sessions[2],
210 &private_data,
211 &public_data,
212 out_transient_handle(handle)));
213
214 if(!auth_value.empty()) {
215 const auto user_auth = copy_into<TPM2B_AUTH>(auth_value);
216 check_rc("Esys_TR_SetAuth", Esys_TR_SetAuth(ctx->esys_context(), handle.transient_handle(), &user_auth));
217 }
218
219 return create(std::move(handle), sessions, nullptr /* pull public info from handle */, private_blob);
220}
221
222std::unique_ptr<PrivateKey> PrivateKey::create_transient_from_template(const std::shared_ptr<Context>& ctx,
223 const SessionBundle& sessions,
224 ESYS_TR parent,
225 const TPMT_PUBLIC& key_template,
226 const TPM2B_SENSITIVE_CREATE& sensitive_data) {
228
229 // NOLINTBEGIN(*-branch-clone)
230
231 switch(key_template.type) {
232 case TPM2_ALG_RSA:
233#if not defined(BOTAN_HAS_TPM2_RSA_ADAPTER)
234 throw Not_Implemented("TPM2-based RSA keys are not supported in this build");
235#endif
236 break;
237 case TPM2_ALG_ECC:
238#if not defined(BOTAN_HAS_TPM2_ECC_ADAPTER)
239 throw Not_Implemented("TPM2-based ECC keys are not supported in this build");
240#endif
241 break;
242 default:
243 throw Invalid_Argument("Unsupported key type");
244 }
245
246 // NOLINTEND(*-branch-clone)
247
248 const auto marshalled_template = marshal_template(key_template);
249
250 Object handle(ctx);
251 unique_esys_ptr<TPM2B_PRIVATE> private_bytes;
253
254 // Esys_CreateLoaded can create different object types depending on the type
255 // of the parent passed in. Namely, this will create a Primary object if the
256 // parent is referencing a Primary Seed; an Ordinary Object if the parent is
257 // referencing a Storage Parent; and a Derived Object if the parent is
258 // referencing a Derivation Parent.
259 //
260 // See the Architecture Document, Section 27.1.
261 check_rc("Esys_CreateLoaded",
262 Esys_CreateLoaded(ctx->esys_context(),
263 parent,
264 sessions[0],
265 sessions[1],
266 sessions[2],
267 &sensitive_data,
268 &marshalled_template,
269 out_transient_handle(handle),
270 out_ptr(private_bytes),
271 out_ptr(public_info)));
272 BOTAN_ASSERT_NONNULL(private_bytes);
273 BOTAN_ASSERT_NOMSG(public_info->publicArea.type == key_template.type);
275
276 return create(std::move(handle), sessions, public_info.get(), as_span(*private_bytes));
277}
278
280 BOTAN_STATE_CHECK(!m_handle.has_persistent_handle());
281 BOTAN_ASSERT_NOMSG(!m_private_blob.empty());
282 return Botan::lock(m_private_blob);
283}
284
285std::vector<uint8_t> PrivateKey::raw_public_key_bits() const {
286 return marshal_public_blob(m_handle._public_info(m_sessions).pub.get());
287}
288
290 // Architectural Document, Section 4.54
291 // any object with the decrypt and restricted attributes SET and the sign
292 // attribute CLEAR
293 const auto attrs = m_handle.attributes(m_sessions);
294 return attrs.decrypt && attrs.restricted && !attrs.sign_encrypt;
295}
296
297std::unique_ptr<PrivateKey> PrivateKey::create(Object handles,
298 [[maybe_unused]] const SessionBundle& sessions,
299 [[maybe_unused]] const TPM2B_PUBLIC* public_info,
300 [[maybe_unused]] std::span<const uint8_t> private_blob) {
301 if(public_info == nullptr) {
302 public_info = handles._public_info(sessions).pub.get();
303 }
304
305#if defined(BOTAN_HAS_TPM2_RSA_ADAPTER)
306 if(public_info->publicArea.type == TPM2_ALG_RSA) {
307 return std::unique_ptr<RSA_PrivateKey>(
308 new RSA_PrivateKey(std::move(handles), sessions, public_info, private_blob));
309 }
310#endif
311
312#if defined(BOTAN_HAS_TPM2_ECC_ADAPTER)
313 if(public_info->publicArea.type == TPM2_ALG_ECC) {
314 return std::unique_ptr<EC_PrivateKey>(new EC_PrivateKey(std::move(handles), sessions, public_info, private_blob));
315 }
316#endif
317
318 throw Not_Implemented(Botan::fmt("Loaded a {} private key of an unsupported type",
319 handles.has_persistent_handle() ? "persistent" : "transient"));
320}
321
322} // namespace Botan::TPM2
#define BOTAN_ASSERT_NOMSG(expr)
Definition assert.h:75
#define BOTAN_STATE_CHECK(expr)
Definition assert.h:49
#define BOTAN_ASSERT_NONNULL(ptr)
Definition assert.h:114
#define BOTAN_ARG_CHECK(expr, msg)
Definition assert.h:33
static std::optional< EC_AffinePoint > deserialize(const EC_Group &group, std::span< const uint8_t > bytes)
static EC_Group from_name(std::string_view name)
Definition ec_group.cpp:438
bool has_transient_handle() const
ESYS_TR transient_handle() const noexcept
static std::unique_ptr< PrivateKey > create_transient_from_template(const std::shared_ptr< Context > &ctx, const SessionBundle &sessions, ESYS_TR parent, const TPMT_PUBLIC &key_template, const TPM2B_SENSITIVE_CREATE &sensitive_data)
Definition tpm2_key.cpp:222
std::vector< uint8_t > raw_public_key_bits() const override
Definition tpm2_key.cpp:285
static std::unique_ptr< PrivateKey > create(Object handles, const SessionBundle &sessions, const TPM2B_PUBLIC *public_info, std::span< const uint8_t > private_blob)
Definition tpm2_key.cpp:297
static std::unique_ptr< PrivateKey > load_persistent(const std::shared_ptr< Context > &ctx, TPM2_HANDLE persistent_object_handle, std::span< const uint8_t > auth_value, const SessionBundle &sessions)
Definition tpm2_key.cpp:182
static std::unique_ptr< PrivateKey > load_transient(const std::shared_ptr< Context > &ctx, std::span< const uint8_t > auth_value, const TPM2::PrivateKey &parent, std::span< const uint8_t > public_blob, std::span< const uint8_t > private_blob, const SessionBundle &sessions)
Definition tpm2_key.cpp:192
const SessionBundle & sessions() const
Definition tpm2_key.h:224
secure_vector< uint8_t > raw_private_key_bits() const override
Definition tpm2_key.cpp:279
static std::unique_ptr< PublicKey > create(Object handles, const SessionBundle &sessions)
Definition tpm2_key.cpp:163
std::vector< uint8_t > raw_public_key_bits() const override
Definition tpm2_key.cpp:159
static std::unique_ptr< PublicKey > load_persistent(const std::shared_ptr< Context > &ctx, TPM2_HANDLE persistent_object_handle, const SessionBundle &sessions={})
Definition tpm2_key.cpp:133
const Object & handles() const
Definition tpm2_key.h:99
const SessionBundle & sessions() const
Definition tpm2_key.h:101
static std::unique_ptr< PublicKey > load_transient(const std::shared_ptr< Context > &ctx, std::span< const uint8_t > public_blob, const SessionBundle &sessions)
Definition tpm2_key.cpp:139
constexpr void check_rc(std::string_view location, TSS2_RC rc)
Definition tpm2_util.h:55
constexpr auto out_persistent_handle(Object &object)
Definition tpm2_util.h:225
std::unique_ptr< T, esys_liberator > unique_esys_ptr
A unique pointer type for ESYS handles that automatically frees the handle.
Definition tpm2_util.h:163
std::optional< std::string > curve_id_tss2_to_botan(TPMI_ECC_CURVE mode_id)
constexpr auto out_transient_handle(Object &object)
Definition tpm2_util.h:219
constexpr void copy_into(T &dest, std::span< const uint8_t > data)
Definition tpm2_util.h:118
constexpr auto as_span(tpm2_buffer auto &data)
Construct a std::span as a view into a TPM2 buffer.
Definition tpm2_util.h:103
constexpr auto out_ptr(T &outptr) noexcept
Definition stl_util.h:127
std::string fmt(std::string_view format, const T &... args)
Definition fmt.h:53
secure_vector< T > lock(const std::vector< T > &in)
Definition secmem.h:80
constexpr auto concat(Rs &&... ranges)
Definition concat_util.h:90
bool value_exists(const std::vector< T > &vec, const V &val)
Definition stl_util.h:43
std::vector< T, secure_allocator< T > > secure_vector
Definition secmem.h:68
uint32_t ESYS_TR
Forward declaration of TSS2 type for convenience.
uint32_t TPM2_HANDLE
Forward declaration of TSS2 type for convenience.