10#include <botan/hash.h>
11#include <botan/internal/hash_id.h>
12#include <botan/der_enc.h>
13#include <botan/internal/workfactor.h>
14#include <botan/internal/pk_ops.h>
18#include <tss/platform.h>
20#include <trousers/trousers.h>
28void tss_error(TSS_RESULT res,
const char* expr,
const char* file,
int line)
30 std::ostringstream err;
31 err <<
"TPM error " << Trspi_Error_String(res)
32 <<
" layer " << Trspi_Error_Layer(res)
33 <<
" in " << expr <<
" at " << file <<
":" << line;
35 throw TPM_Error(err.str());
38TSS_FLAG bit_flag(
size_t bits)
44 return TSS_KEY_SIZE_1024;
46 return TSS_KEY_SIZE_2048;
50 return TSS_KEY_SIZE_4096;
52 return TSS_KEY_SIZE_8192;
54 return TSS_KEY_SIZE_16384;
56 throw Invalid_Argument(
"Unsupported TPM key size " +
std::to_string(bits));
61uint32_t to_uint32(
T v)
64 "Value too large for 32bit unsigned integer");
65 return static_cast<uint32_t
>(
v);
69bool is_srk_uuid(
const UUID& uuid)
71 static const uint8_t srk[16] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1 };
72 const std::vector<uint8_t>&
b = uuid.binary_value();
73 return (
b.size() == 16 &&
same_mem(
b.data(), srk, 16));
77#define TSPI_CHECK_SUCCESS(expr) do { \
78 TSS_RESULT res = expr; \
79 if(res != TSS_SUCCESS) \
80 tss_error(res, #expr, __FILE__, __LINE__); \
83std::vector<uint8_t> get_obj_attr(TSS_HCONTEXT ctx,
92 std::vector<uint8_t> r(data, data + data_len);
99void set_policy_secret(TSS_HPOLICY policy,
const char* secret)
103 BYTE* as_b =
const_cast<BYTE*
>(
reinterpret_cast<const BYTE*
>(secret));
105 TSS_SECRET_MODE_PLAIN,
106 to_uint32(std::strlen(secret)),
111 static const uint8_t nullpass[20] = { 0 };
114 TSS_SECRET_MODE_SHA1,
116 const_cast<BYTE*
>(nullpass)));
120TSS_UUID to_tss_uuid(
const UUID& uuid)
122 static_assert(
sizeof(TSS_UUID) == 16,
"Expected size of packed UUID");
129UUID from_tss_uuid(
const TSS_UUID& tss_uuid)
131 static_assert(
sizeof(TSS_UUID) == 16,
"Expected size of packed UUID");
133 std::vector<uint8_t> mem(16);
135 UUID uuid(std::move(mem));
141 if(flag == TSS_PS_TYPE_USER)
143 else if(flag == TSS_PS_TYPE_SYSTEM)
152 return "tpmkey:uuid=" + uuid.to_string() +
";storage=" + storage_str;
155std::string format_url(
const TSS_UUID& tss_uuid, TSS_FLAG store_type)
157 UUID uuid = from_tss_uuid(tss_uuid);
159 return format_url(from_tss_uuid(tss_uuid),
160 storage_type_from_tss_flag(store_type));
174 const TSS_UUID SRK_UUID = TSS_UUID_SRK;
176 TSPI_CHECK_SUCCESS(::Tspi_Context_LoadKeyByUUID(m_ctx, TSS_PS_TYPE_SYSTEM, SRK_UUID, &m_srk));
179 set_policy_secret(m_srk_policy, srk_password);
204 copy_mem(out,
reinterpret_cast<const uint8_t*
>(mem), out_len);
210 TSPI_CHECK_SUCCESS(::Tspi_TPM_StirRandom(m_tpm, to_uint32(in_len),
const_cast<BYTE*
>(in)));
214 const char* key_password) : m_ctx(ctx)
219 TSS_FLAG key_flags = bit_flag(bits) | TSS_KEY_VOLATILE | TSS_KEY_TYPE_SIGNING;
225 TSS_TSPATTRIB_KEYINFO_SIGSCHEME,
226 TSS_SS_RSASSAPKCS1V15_DER));
230 set_policy_secret(policy, key_password);
242 m_storage(storage_type)
244 const TSS_FLAG key_ps_type =
254 const std::vector<uint8_t>& blob) : m_ctx(ctx)
257 const_cast<uint8_t*
>(blob.data()),
269 m_storage = storage_type;
271 const TSS_UUID key_uuid = to_tss_uuid(m_uuid);
272 const TSS_FLAG key_ps_type =
275 const TSS_UUID srk_uuid = TSS_UUID_SRK;
288 if(storage_type != m_storage)
291 " already registered with different storage type");
294 return format_url(m_uuid, m_storage);
299 TSS_KM_KEYINFO2* key_info;
300 UINT32 key_info_size;
309 std::vector<std::string> r(key_info_size);
311 for(
size_t i = 0; i != key_info_size; ++i)
313 r[i] = format_url(key_info[i].keyUUID, key_info[i].persistentStorageType);
327 TSS_TSPATTRIB_RSAKEY_INFO,
328 TSS_TSPATTRIB_KEYINFO_RSA_MODULUS));
339 TSS_TSPATTRIB_RSAKEY_INFO,
340 TSS_TSPATTRIB_KEYINFO_RSA_EXPONENT));
364 std::vector<uint8_t> bits;
375 throw TPM_Error(
"Private key export not supported for TPM keys");
380 return get_obj_attr(m_ctx.
handle(), m_key,
381 TSS_TSPATTRIB_KEY_BLOB,
382 TSS_TSPATTRIB_KEYBLOB_BLOB);
387 return std::make_unique<RSA_PublicKey>(
get_n(),
get_e());
401 const std::string& hash_name) :
408 size_t signature_length()
const override
410 return m_key.get_n().bytes();
413 void update(
const uint8_t msg[],
size_t msg_len)
override
415 m_hash->update(msg, msg_len);
418 secure_vector<uint8_t> sign(RandomNumberGenerator&)
override
427 secure_vector<uint8_t> msg_hash = m_hash->final();
429 std::vector<uint8_t> id_and_msg;
430 id_and_msg.reserve(m_hash_id.size() + msg_hash.size());
431 id_and_msg.insert(id_and_msg.end(), m_hash_id.begin(), m_hash_id.end());
432 id_and_msg.insert(id_and_msg.end(), msg_hash.begin(), msg_hash.end());
434 TSS_HCONTEXT ctx = m_key.ctx().handle();
436 TSPI_CHECK_SUCCESS(::Tspi_Context_CreateObject(ctx, TSS_OBJECT_TYPE_HASH, TSS_HASH_OTHER, &tpm_hash));
437 TSPI_CHECK_SUCCESS(::Tspi_Hash_SetHashValue(tpm_hash, to_uint32(id_and_msg.size()), id_and_msg.data()));
439 BYTE* sig_bytes =
nullptr;
442 secure_vector<uint8_t> sig(sig_bytes, sig_bytes + sig_len);
454 const TPM_PrivateKey& m_key;
455 std::unique_ptr<HashFunction> m_hash;
456 std::vector<uint8_t> m_hash_id;
461std::unique_ptr<PK_Ops::Signature>
463 const std::string& params,
464 const std::string& )
const
466 return std::make_unique<TPM_Signing_Operation>(*
this, params);
#define BOTAN_ARG_CHECK(expr, msg)
static BigInt decode(const uint8_t buf[], size_t length)
DER_Encoder & start_sequence()
DER_Encoder & encode(bool b)
virtual OID get_oid() const
TSS_HCONTEXT handle() const
TPM_Context(pin_cb cb, const char *srk_password)
void gen_random(uint8_t out[], size_t out_len)
uint32_t current_counter()
std::function< std::string(std::string)> pin_cb
void stir_random(const uint8_t in[], size_t in_len)
std::vector< uint8_t > export_blob() const
std::string register_key(TPM_Storage_Type storage_type)
TPM_PrivateKey(TPM_Context &ctx, size_t bits, const char *key_password)
secure_vector< uint8_t > private_key_bits() const override
std::unique_ptr< PK_Ops::Signature > create_signature_op(RandomNumberGenerator &rng, const std::string ¶ms, const std::string &provider) const override
static std::vector< std::string > registered_keys(TPM_Context &ctx)
bool check_key(RandomNumberGenerator &rng, bool) const override
TPM_Context & ctx() const
size_t key_length() const override
std::vector< uint8_t > public_key_bits() const override
size_t estimated_strength() const override
std::unique_ptr< Public_Key > public_key() const override
AlgorithmIdentifier algorithm_identifier() const override
std::string to_string() const
int(* update)(CTX *, const void *, CC_LONG len)
int(* final)(unsigned char *, CTX *)
std::string to_string(const BER_Object &obj)
std::vector< uint8_t > pkcs_hash_id(const std::string &name)
constexpr void copy_mem(T *out, const T *in, size_t n)
constexpr void typecast_copy(uint8_t out[], T in[], size_t N)
bool same_mem(const T *p1, const T *p2, size_t n)
size_t if_work_factor(size_t bits)
std::vector< T, secure_allocator< T > > secure_vector
#define TSPI_CHECK_SUCCESS(expr)