/* * Copyright (C) 2018 James.Bottomley@HansenPartnership.com * * Cryptographic helper routines for handling TPM2 sessions for * authorization HMAC and request response encryption. * * The idea is to ensure that every TPM command is HMAC protected by a * session, meaning in-flight tampering would be detected and in * addition all sensitive inputs and responses should be encrypted. * * The basic way this works is to use a TPM feature called salted * sessions where a random secret used in session construction is * encrypted to the public part of a known TPM key. The problem is we * have no known keys, so initially a primary Elliptic Curve key is * derived from the NULL seed (we use EC because most TPMs generate * these keys much faster than RSA ones). The curve used is NIST_P256 * because that's now mandated to be present in 'TCG TPM v2.0 * Provisioning Guidance' * * Threat problems: the initial TPM2_CreatePrimary is not (and cannot * be) session protected, so a clever Man in the Middle could return a * public key they control to this command and from there intercept * and decode all subsequent session based transactions. The kernel * cannot mitigate this threat but, after boot, userspace can get * proof this has not happened by asking the TPM to certify the NULL * key. This certification would chain back to the TPM Endorsement * Certificate and prove the NULL seed primary had not been tampered * with and thus all sessions must have been cryptographically secure. * To assist with this, the initial NULL seed public key name is made * available in a sysfs file. * * Use of these functions: * * The design is all the crypto, hash and hmac gunk is confined in this * file and never needs to be seen even by the kernel internal user. To * the user there's an init function tpm2_sessions_init() that needs to * be called once per TPM which generates the NULL seed primary key. * * These are the usage functions: * * tpm2_end_auth_session() kills the session and frees the resources. * Under normal operation this function is done by * tpm_buf_check_hmac_response(), so this is only to be used on * error legs where the latter is not executed. * tpm_buf_append_name() to add a handle to the buffer. This must be * used in place of the usual tpm_buf_append_u32() for adding * handles because handles have to be processed specially when * calculating the HMAC. In particular, for NV, volatile and * permanent objects you now need to provide the name. * tpm_buf_append_hmac_session() which appends the hmac session to the * buf in the same way tpm_buf_append_auth does(). * tpm_buf_fill_hmac_session() This calculates the correct hash and * places it in the buffer. It must be called after the complete * command buffer is finalized so it can fill in the correct HMAC * based on the parameters. * tpm_buf_check_hmac_response() which checks the session response in * the buffer and calculates what it should be. If there's a * mismatch it will log a warning and return an error. If * tpm_buf_append_hmac_session() did not specify * TPM_SA_CONTINUE_SESSION then the session will be closed (if it * hasn't been consumed) and the auth structure freed.
*/
/* * This is the structure that carries all the auth information (like * session handle, nonces, session key and auth) from use to use it is * designed to be opaque to anything outside.
*/ struct tpm2_auth {
u32 handle; /* * This has two meanings: before tpm_buf_fill_hmac_session() * it marks the offset in the buffer of the start of the * sessions (i.e. after all the handles). Once the buffer has * been filled it markes the session number of our auth * session so we can find it again in the response buffer. * * The two cases are distinguished because the first offset * must always be greater than TPM_HEADER_SIZE and the second * must be less than or equal to 5.
*/
u32 session; /* * the size here is variable and set by the size of our_nonce * which must be between 16 and the name hash length. we set * the maximum sha256 size for the greatest protection
*/
u8 our_nonce[SHA256_DIGEST_SIZE];
u8 tpm_nonce[SHA256_DIGEST_SIZE]; /* * the salt is only used across the session command/response * after that it can be used as a scratch area
*/ union {
u8 salt[EC_PT_SZ]; /* scratch for key + IV */
u8 scratch[AES_KEY_BYTES + AES_BLOCK_SIZE];
}; /* * the session key and passphrase are the same size as the * name digest (sha256 again). The session key is constant * for the use of the session and the passphrase can change * with every invocation. * * Note: these fields must be adjacent and in this order * because several HMAC/KDF schemes use the combination of the * session_key and passphrase.
*/
u8 session_key[SHA256_DIGEST_SIZE];
u8 passphrase[SHA256_DIGEST_SIZE]; int passphrase_len; struct crypto_aes_ctx aes_ctx; /* saved session attributes: */
u8 attrs;
__be32 ordinal;
/* * memory for three authorization handles. We know them by * handle, but they are part of the session by name, which * we must compute and remember
*/
u32 name_h[AUTH_MAX_NAMES];
u8 name[AUTH_MAX_NAMES][2 + SHA512_DIGEST_SIZE];
};
#ifdef CONFIG_TCG_TPM2_HMAC /* * Name Size based on TPM algorithm (assumes no hash bigger than 255)
*/ static u8 name_size(const u8 *name)
{ static u8 size_map[] = {
[TPM_ALG_SHA1] = SHA1_DIGEST_SIZE,
[TPM_ALG_SHA256] = SHA256_DIGEST_SIZE,
[TPM_ALG_SHA384] = SHA384_DIGEST_SIZE,
[TPM_ALG_SHA512] = SHA512_DIGEST_SIZE,
};
u16 alg = get_unaligned_be16(name); return size_map[alg] + 2;
}
/** * tpm_buf_append_name() - add a handle area to the buffer * @chip: the TPM chip structure * @buf: The buffer to be appended * @handle: The handle to be appended * @name: The name of the handle (may be NULL) * * In order to compute session HMACs, we need to know the names of the * objects pointed to by the handles. For most objects, this is simply * the actual 4 byte handle or an empty buf (in these cases @name * should be NULL) but for volatile objects, permanent objects and NV * areas, the name is defined as the hash (according to the name * algorithm which should be set to sha256) of the public area to * which the two byte algorithm id has been appended. For these * objects, the @name pointer should point to this. If a name is * required but @name is NULL, then TPM2_ReadPublic() will be called * on the handle to obtain the name. * * As with most tpm_buf operations, success is assumed because failure * will be caused by an incorrect programming model and indicated by a * kernel message.
*/ void tpm_buf_append_name(struct tpm_chip *chip, struct tpm_buf *buf,
u32 handle, u8 *name)
{ #ifdef CONFIG_TCG_TPM2_HMAC enum tpm2_mso_type mso = tpm2_handle_mso(handle); struct tpm2_auth *auth; int slot; #endif
if (!tpm2_chip_auth(chip)) {
tpm_buf_append_handle(chip, buf, handle); return;
}
#ifdef CONFIG_TCG_TPM2_HMAC
slot = (tpm_buf_length(buf) - TPM_HEADER_SIZE) / 4; if (slot >= AUTH_MAX_NAMES) {
dev_err(&chip->dev, "TPM: too many handles\n"); return;
}
auth = chip->auth;
WARN(auth->session != tpm_buf_length(buf), "name added in wrong place\n");
tpm_buf_append_u32(buf, handle);
auth->session += 4;
if (mso == TPM2_MSO_PERSISTENT ||
mso == TPM2_MSO_VOLATILE ||
mso == TPM2_MSO_NVRAM) { if (!name)
tpm2_read_public(chip, handle, auth->name[slot]);
} else { if (name)
dev_err(&chip->dev, "TPM: Handle does not require name but one is specified\n");
}
void tpm_buf_append_auth(struct tpm_chip *chip, struct tpm_buf *buf,
u8 attributes, u8 *passphrase, int passphrase_len)
{ /* offset tells us where the sessions area begins */ int offset = buf->handles * 4 + TPM_HEADER_SIZE;
u32 len = 9 + passphrase_len;
if (tpm_buf_length(buf) != offset) { /* not the first session so update the existing length */
len += get_unaligned_be32(&buf->data[offset]);
put_unaligned_be32(len, &buf->data[offset]);
} else {
tpm_buf_append_u32(buf, len);
} /* auth handle */
tpm_buf_append_u32(buf, TPM2_RS_PW); /* nonce */
tpm_buf_append_u16(buf, 0); /* attributes */
tpm_buf_append_u8(buf, 0); /* passphrase */
tpm_buf_append_u16(buf, passphrase_len);
tpm_buf_append(buf, passphrase, passphrase_len);
}
/** * tpm_buf_append_hmac_session() - Append a TPM session element * @chip: the TPM chip structure * @buf: The buffer to be appended * @attributes: The session attributes * @passphrase: The session authority (NULL if none) * @passphrase_len: The length of the session authority (0 if none) * * This fills in a session structure in the TPM command buffer, except * for the HMAC which cannot be computed until the command buffer is * complete. The type of session is controlled by the @attributes, * the main ones of which are TPM2_SA_CONTINUE_SESSION which means the * session won't terminate after tpm_buf_check_hmac_response(), * TPM2_SA_DECRYPT which means this buffers first parameter should be * encrypted with a session key and TPM2_SA_ENCRYPT, which means the * response buffer's first parameter needs to be decrypted (confusing, * but the defines are written from the point of view of the TPM). * * Any session appended by this command must be finalized by calling * tpm_buf_fill_hmac_session() otherwise the HMAC will be incorrect * and the TPM will reject the command. * * As with most tpm_buf operations, success is assumed because failure * will be caused by an incorrect programming model and indicated by a * kernel message.
*/ void tpm_buf_append_hmac_session(struct tpm_chip *chip, struct tpm_buf *buf,
u8 attributes, u8 *passphrase, int passphrase_len)
{ #ifdef CONFIG_TCG_TPM2_HMAC
u8 nonce[SHA256_DIGEST_SIZE]; struct tpm2_auth *auth;
u32 len; #endif
if (!tpm2_chip_auth(chip)) {
tpm_buf_append_auth(chip, buf, attributes, passphrase,
passphrase_len); return;
}
#ifdef CONFIG_TCG_TPM2_HMAC /* The first write to /dev/tpm{rm0} will flush the session. */
attributes |= TPM2_SA_CONTINUE_SESSION;
/* * The Architecture Guide requires us to strip trailing zeros * before computing the HMAC
*/ while (passphrase && passphrase_len > 0 && passphrase[passphrase_len - 1] == '\0')
passphrase_len--;
if (auth->session != tpm_buf_length(buf)) { /* we're not the first session */
len = get_unaligned_be32(&buf->data[auth->session]); if (4 + len + auth->session != tpm_buf_length(buf)) {
WARN(1, "session length mismatch, cannot append"); return;
}
/* random number for our nonce */
get_random_bytes(nonce, sizeof(nonce));
memcpy(auth->our_nonce, nonce, sizeof(nonce));
tpm_buf_append_u32(buf, auth->handle); /* our new nonce */
tpm_buf_append_u16(buf, SHA256_DIGEST_SIZE);
tpm_buf_append(buf, nonce, SHA256_DIGEST_SIZE);
tpm_buf_append_u8(buf, auth->attrs); /* and put a placeholder for the hmac */
tpm_buf_append_u16(buf, SHA256_DIGEST_SIZE);
tpm_buf_append(buf, nonce, SHA256_DIGEST_SIZE); #endif
}
EXPORT_SYMBOL_GPL(tpm_buf_append_hmac_session);
/* * It turns out the crypto hmac(sha256) is hard for us to consume * because it assumes a fixed key and the TPM seems to change the key * on every operation, so we weld the hmac init and final functions in * here to give it the same usage characteristics as a regular hash
*/ staticvoid tpm2_hmac_init(struct sha256_ctx *sctx, u8 *key, u32 key_len)
{
u8 pad[SHA256_BLOCK_SIZE]; int i;
sha256_init(sctx); for (i = 0; i < sizeof(pad); i++) { if (i < key_len)
pad[i] = key[i]; else
pad[i] = 0;
pad[i] ^= HMAC_IPAD_VALUE;
}
sha256_update(sctx, pad, sizeof(pad));
}
bytes -= SHA256_DIGEST_SIZE;
counter++;
out += SHA256_DIGEST_SIZE;
}
}
/* * Somewhat of a bastardization of the real KDFe. We're assuming * we're working with known point sizes for the input parameters and * the hash algorithm is fixed at sha256. Because we know that the * point size is 32 bytes like the hash size, there's no need to loop * in this KDF.
*/ staticvoid tpm2_KDFe(u8 z[EC_PT_SZ], constchar *str, u8 *pt_u, u8 *pt_v,
u8 *out)
{ struct sha256_ctx sctx; /* * this should be an iterative counter, but because we know * we're only taking 32 bytes for the point using a sha256 * hash which is also 32 bytes, there's only one loop
*/
__be32 c = cpu_to_be32(1);
/* secret is two sized points */
tpm_buf_append_u16(buf, (EC_PT_SZ + 2)*2); /* * we cheat here and append uninitialized data to form * the points. All we care about is getting the two * co-ordinate pointers, which will be used to overwrite * the uninitialized data
*/
tpm_buf_append_u16(buf, EC_PT_SZ);
x = &buf->data[tpm_buf_length(buf)];
tpm_buf_append(buf, encoded_key, EC_PT_SZ);
tpm_buf_append_u16(buf, EC_PT_SZ);
y = &buf->data[tpm_buf_length(buf)];
tpm_buf_append(buf, encoded_key, EC_PT_SZ);
sg_init_table(s, 2);
sg_set_buf(&s[0], x, EC_PT_SZ);
sg_set_buf(&s[1], y, EC_PT_SZ);
buf_len = crypto_ecdh_key_len(&p); if (sizeof(encoded_key) < buf_len) {
dev_err(&chip->dev, "salt buffer too small needs %d\n",
buf_len); goto out;
}
crypto_ecdh_encode_key(encoded_key, buf_len, &p); /* this generates a random private key */
crypto_kpp_set_secret(kpp, encoded_key, buf_len);
/* salt is now the public point of this private key */
req = kpp_request_alloc(kpp, GFP_KERNEL); if (!req) goto out;
kpp_request_set_input(req, NULL, 0);
kpp_request_set_output(req, s, EC_PT_SZ*2);
crypto_kpp_generate_public_key(req); /* * we're not done: now we have to compute the shared secret * which is our private key multiplied by the tpm_key public * point, we actually only take the x point and discard the y * point and feed it through KDFe to get the final secret salt
*/
sg_set_buf(&s[0], chip->null_ec_key_x, EC_PT_SZ);
sg_set_buf(&s[1], chip->null_ec_key_y, EC_PT_SZ);
kpp_request_set_input(req, s, EC_PT_SZ*2);
sg_init_one(d, auth->salt, EC_PT_SZ);
kpp_request_set_output(req, d, EC_PT_SZ);
crypto_kpp_compute_shared_secret(req);
kpp_request_free(req);
/* * pass the shared secret through KDFe for salt. Note salt * area is used both for input shared secret and output salt. * This works because KDFe fully consumes the secret before it * writes the salt
*/
tpm2_KDFe(auth->salt, "SECRET", x, chip->null_ec_key_x, auth->salt);
out:
crypto_free_kpp(kpp);
}
/** * tpm_buf_fill_hmac_session() - finalize the session HMAC * @chip: the TPM chip structure * @buf: The buffer to be appended * * This command must not be called until all of the parameters have * been appended to @buf otherwise the computed HMAC will be * incorrect. * * This function computes and fills in the session HMAC using the * session key and, if TPM2_SA_DECRYPT was specified, computes the * encryption key and encrypts the first parameter of the command * buffer with it. * * As with most tpm_buf operations, success is assumed because failure * will be caused by an incorrect programming model and indicated by a * kernel message.
*/ void tpm_buf_fill_hmac_session(struct tpm_chip *chip, struct tpm_buf *buf)
{
u32 cc, handles, val; struct tpm2_auth *auth = chip->auth; int i; struct tpm_header *head = (struct tpm_header *)buf->data;
off_t offset_s = TPM_HEADER_SIZE, offset_p;
u8 *hmac = NULL;
u32 attrs;
u8 cphash[SHA256_DIGEST_SIZE]; struct sha256_ctx sctx;
if (!auth) return;
/* save the command code in BE format */
auth->ordinal = head->ordinal;
cc = be32_to_cpu(head->ordinal);
i = tpm2_find_cc(chip, cc); if (i < 0) {
dev_err(&chip->dev, "Command 0x%x not found in TPM\n", cc); return;
}
attrs = chip->cc_attrs_tbl[i];
/* * just check the names, it's easy to make mistakes. This * would happen if someone added a handle via * tpm_buf_append_u32() instead of tpm_buf_append_name()
*/ for (i = 0; i < handles; i++) {
u32 handle = tpm_buf_read_u32(buf, &offset_s);
if (auth->name_h[i] != handle) {
dev_err(&chip->dev, "TPM: handle %d wrong for name\n",
i); return;
}
} /* point offset_s to the start of the sessions */
val = tpm_buf_read_u32(buf, &offset_s); /* point offset_p to the start of the parameters */
offset_p = offset_s + val; for (i = 1; offset_s < offset_p; i++) {
u32 handle = tpm_buf_read_u32(buf, &offset_s);
u16 len;
u8 a;
/* nonce (already in auth) */
len = tpm_buf_read_u16(buf, &offset_s);
offset_s += len;
a = tpm_buf_read_u8(buf, &offset_s);
len = tpm_buf_read_u16(buf, &offset_s); if (handle == auth->handle && auth->attrs == a) {
hmac = &buf->data[offset_s]; /* * save our session number so we know which * session in the response belongs to us
*/
auth->session = i;
}
offset_s += len;
} if (offset_s != offset_p) {
dev_err(&chip->dev, "TPM session length is incorrect\n"); return;
} if (!hmac) {
dev_err(&chip->dev, "TPM could not find HMAC session\n"); return;
}
/* encrypt before HMAC */ if (auth->attrs & TPM2_SA_DECRYPT) {
u16 len;
/* need key and IV */
tpm2_KDFa(auth->session_key, SHA256_DIGEST_SIZE
+ auth->passphrase_len, "CFB", auth->our_nonce,
auth->tpm_nonce, AES_KEY_BYTES + AES_BLOCK_SIZE,
auth->scratch);
len = tpm_buf_read_u16(buf, &offset_p);
aes_expandkey(&auth->aes_ctx, auth->scratch, AES_KEY_BYTES);
aescfb_encrypt(&auth->aes_ctx, &buf->data[offset_p],
&buf->data[offset_p], len,
auth->scratch + AES_KEY_BYTES); /* reset p to beginning of parameters for HMAC */
offset_p -= 2;
}
sha256_init(&sctx); /* ordinal is already BE */
sha256_update(&sctx, (u8 *)&head->ordinal, sizeof(head->ordinal)); /* add the handle names */ for (i = 0; i < handles; i++) { enum tpm2_mso_type mso = tpm2_handle_mso(auth->name_h[i]);
/** * tpm_buf_check_hmac_response() - check the TPM return HMAC for correctness * @chip: the TPM chip structure * @buf: the original command buffer (which now contains the response) * @rc: the return code from tpm_transmit_cmd * * If @rc is non zero, @buf may not contain an actual return, so @rc * is passed through as the return and the session cleaned up and * de-allocated if required (this is required if * TPM2_SA_CONTINUE_SESSION was not specified as a session flag). * * If @rc is zero, the response HMAC is computed against the returned * @buf and matched to the TPM one in the session area. If there is a * mismatch, an error is logged and -EINVAL returned. * * The reason for this is that the command issue and HMAC check * sequence should look like: * * rc = tpm_transmit_cmd(...); * rc = tpm_buf_check_hmac_response(&buf, auth, rc); * if (rc) * ... * * Which is easily layered into the current contrl flow. * * Returns: 0 on success or an error.
*/ int tpm_buf_check_hmac_response(struct tpm_chip *chip, struct tpm_buf *buf, int rc)
{ struct tpm_header *head = (struct tpm_header *)buf->data; struct tpm2_auth *auth = chip->auth;
off_t offset_s, offset_p;
u8 rphash[SHA256_DIGEST_SIZE];
u32 attrs, cc; struct sha256_ctx sctx;
u16 tag = be16_to_cpu(head->tag); int parm_len, len, i, handles;
if (!auth) return rc;
cc = be32_to_cpu(auth->ordinal);
if (auth->session >= TPM_HEADER_SIZE) {
WARN(1, "tpm session not filled correctly\n"); goto out;
}
if (rc != 0) /* pass non success rc through and close the session */ goto out;
rc = -EINVAL; if (tag != TPM2_ST_SESSIONS) {
dev_err(&chip->dev, "TPM: HMAC response check has no sessions tag\n"); goto out;
}
i = tpm2_find_cc(chip, cc); if (i < 0) goto out;
attrs = chip->cc_attrs_tbl[i];
handles = (attrs >> TPM2_CC_ATTR_RHANDLE) & 1;
/* point to area beyond handles */
offset_s = TPM_HEADER_SIZE + handles * 4;
parm_len = tpm_buf_read_u32(buf, &offset_s);
offset_p = offset_s;
offset_s += parm_len; /* skip over any sessions before ours */ for (i = 0; i < auth->session - 1; i++) {
len = tpm_buf_read_u16(buf, &offset_s);
offset_s += len + 1;
len = tpm_buf_read_u16(buf, &offset_s);
offset_s += len;
} /* TPM nonce */
len = tpm_buf_read_u16(buf, &offset_s); if (offset_s + len > tpm_buf_length(buf)) goto out; if (len != SHA256_DIGEST_SIZE) goto out;
memcpy(auth->tpm_nonce, &buf->data[offset_s], len);
offset_s += len;
attrs = tpm_buf_read_u8(buf, &offset_s);
len = tpm_buf_read_u16(buf, &offset_s); if (offset_s + len != tpm_buf_length(buf)) goto out; if (len != SHA256_DIGEST_SIZE) goto out; /* * offset_s points to the HMAC. now calculate comparison, beginning * with rphash
*/
sha256_init(&sctx); /* yes, I know this is now zero, but it's what the standard says */
sha256_update(&sctx, (u8 *)&head->return_code, sizeof(head->return_code)); /* ordinal is already BE */
sha256_update(&sctx, (u8 *)&auth->ordinal, sizeof(auth->ordinal));
sha256_update(&sctx, &buf->data[offset_p], parm_len);
sha256_final(&sctx, rphash);
/* now calculate the hmac */
tpm2_hmac_init(&sctx, auth->session_key, sizeof(auth->session_key)
+ auth->passphrase_len);
sha256_update(&sctx, rphash, sizeof(rphash));
sha256_update(&sctx, auth->tpm_nonce, sizeof(auth->tpm_nonce));
sha256_update(&sctx, auth->our_nonce, sizeof(auth->our_nonce));
sha256_update(&sctx, &auth->attrs, 1); /* we're done with the rphash, so put our idea of the hmac there */
tpm2_hmac_final(&sctx, auth->session_key, sizeof(auth->session_key)
+ auth->passphrase_len, rphash); if (memcmp(rphash, &buf->data[offset_s], SHA256_DIGEST_SIZE) == 0) {
rc = 0;
} else {
dev_err(&chip->dev, "TPM: HMAC check failed\n"); goto out;
}
/* now do response decryption */ if (auth->attrs & TPM2_SA_ENCRYPT) { /* need key and IV */
tpm2_KDFa(auth->session_key, SHA256_DIGEST_SIZE
+ auth->passphrase_len, "CFB", auth->tpm_nonce,
auth->our_nonce, AES_KEY_BYTES + AES_BLOCK_SIZE,
auth->scratch);
out: if ((auth->attrs & TPM2_SA_CONTINUE_SESSION) == 0) { if (rc) /* manually close the session if it wasn't consumed */
tpm2_flush_context(chip, auth->handle);
kfree_sensitive(auth);
chip->auth = NULL;
} else { /* reset for next use */
auth->session = TPM_HEADER_SIZE;
}
/** * tpm2_end_auth_session() - kill the allocated auth session * @chip: the TPM chip structure * * ends the session started by tpm2_start_auth_session and frees all * the resources. Under normal conditions, * tpm_buf_check_hmac_response() will correctly end the session if * required, so this function is only for use in error legs that will * bypass the normal invocation of tpm_buf_check_hmac_response().
*/ void tpm2_end_auth_session(struct tpm_chip *chip)
{ struct tpm2_auth *auth = chip->auth;
/** * tpm2_start_auth_session() - Create an a HMAC authentication session * @chip: A TPM chip * * Loads the ephemeral key (null seed), and starts an HMAC authenticated * session. The null seed is flushed before the return. * * Returns zero on success, or a POSIX error code.
*/ int tpm2_start_auth_session(struct tpm_chip *chip)
{ struct tpm2_auth *auth; struct tpm_buf buf;
u32 null_key; int rc;
if (chip->auth) {
dev_dbg_once(&chip->dev, "auth session is active\n"); return 0;
}
auth = kzalloc(sizeof(*auth), GFP_KERNEL); if (!auth) return -ENOMEM;
rc = tpm2_load_null(chip, &null_key); if (rc) goto out;
auth->session = TPM_HEADER_SIZE;
rc = tpm_buf_init(&buf, TPM2_ST_NO_SESSIONS, TPM2_CC_START_AUTH_SESS); if (rc) goto out;
/* append encrypted salt and squirrel away unencrypted in auth */
tpm_buf_append_salt(&buf, chip, auth); /* session type (HMAC, audit or policy) */
tpm_buf_append_u8(&buf, TPM2_SE_HMAC);
/* * A mask containing the object attributes for the kernel held null primary key * used in HMAC encryption. For more information on specific attributes look up * to "8.3 TPMA_OBJECT (Object Attributes)".
*/ #define TPM2_OA_NULL_KEY ( \
TPM2_OA_NO_DA | \
TPM2_OA_FIXED_TPM | \
TPM2_OA_FIXED_PARENT | \
TPM2_OA_SENSITIVE_DATA_ORIGIN | \
TPM2_OA_USER_WITH_AUTH | \
TPM2_OA_DECRYPT | \
TPM2_OA_RESTRICTED)
/** * tpm2_parse_create_primary() - parse the data returned from TPM_CC_CREATE_PRIMARY * * @chip: The TPM the primary was created under * @buf: The response buffer from the chip * @handle: pointer to be filled in with the return handle of the primary * @hierarchy: The hierarchy the primary was created for * @name: pointer to be filled in with the primary key name * * Return: * * 0 - OK * * -errno - A system error * * TPM_RC - A TPM error
*/ staticint tpm2_parse_create_primary(struct tpm_chip *chip, struct tpm_buf *buf,
u32 *handle, u32 hierarchy, u8 *name)
{ struct tpm_header *head = (struct tpm_header *)buf->data;
off_t offset_r = TPM_HEADER_SIZE, offset_t;
u16 len = TPM_HEADER_SIZE;
u32 total_len = be32_to_cpu(head->length);
u32 val, param_len, keyhandle;
param_len = tpm_buf_read_u32(buf, &offset_r); /* * param_len doesn't include the header, but all the other * lengths and offsets do, so add it to parm len to make * the comparisons easier
*/
param_len += TPM_HEADER_SIZE;
if (param_len + 8 > total_len) return -EINVAL;
len = tpm_buf_read_u16(buf, &offset_r);
offset_t = offset_r; if (name) { /* * now we have the public area, compute the name of * the object
*/
put_unaligned_be16(TPM_ALG_SHA256, name);
sha256(&buf->data[offset_r], len, name + 2);
}
/* validate the public key */
val = tpm_buf_read_u16(buf, &offset_t);
/* key type (must be what we asked for) */ if (val != TPM_ALG_ECC) return -EINVAL;
val = tpm_buf_read_u16(buf, &offset_t);
/* name algorithm */ if (val != TPM_ALG_SHA256) return -EINVAL;
val = tpm_buf_read_u32(buf, &offset_t);
/* object properties */ if (val != TPM2_OA_NULL_KEY) return -EINVAL;
/* auth policy (empty) */
val = tpm_buf_read_u16(buf, &offset_t); if (val != 0) return -EINVAL;
/* symmetric key parameters */
val = tpm_buf_read_u16(buf, &offset_t); if (val != TPM_ALG_AES) return -EINVAL;
/* symmetric key length */
val = tpm_buf_read_u16(buf, &offset_t); if (val != AES_KEY_BITS) return -EINVAL;
/* symmetric encryption scheme */
val = tpm_buf_read_u16(buf, &offset_t); if (val != TPM_ALG_CFB) return -EINVAL;
/* signing scheme */
val = tpm_buf_read_u16(buf, &offset_t); if (val != TPM_ALG_NULL) return -EINVAL;
/* ECC Curve */
val = tpm_buf_read_u16(buf, &offset_t); if (val != TPM2_ECC_NIST_P256) return -EINVAL;
/* KDF Scheme */
val = tpm_buf_read_u16(buf, &offset_t); if (val != TPM_ALG_NULL) return -EINVAL;
/* extract public key (x and y points) */
val = tpm_buf_read_u16(buf, &offset_t); if (val != EC_PT_SZ) return -EINVAL;
memcpy(chip->null_ec_key_x, &buf->data[offset_t], val);
offset_t += val;
val = tpm_buf_read_u16(buf, &offset_t); if (val != EC_PT_SZ) return -EINVAL;
memcpy(chip->null_ec_key_y, &buf->data[offset_t], val);
offset_t += val;
/* original length of the whole TPM2B */
offset_r += len;
/* should have exactly consumed the TPM2B public structure */ if (offset_t != offset_r) return -EINVAL; if (offset_r > param_len) return -EINVAL;
/* creation data (skip) */
len = tpm_buf_read_u16(buf, &offset_r);
offset_r += len; if (offset_r > param_len) return -EINVAL;
/* creation digest (must be sha256) */
len = tpm_buf_read_u16(buf, &offset_r);
offset_r += len; if (len != SHA256_DIGEST_SIZE || offset_r > param_len) return -EINVAL;
/* TPMT_TK_CREATION follows */ /* tag, must be TPM_ST_CREATION (0x8021) */
val = tpm_buf_read_u16(buf, &offset_r); if (val != TPM2_ST_CREATION || offset_r > param_len) return -EINVAL;
/* hierarchy */
val = tpm_buf_read_u32(buf, &offset_r); if (val != hierarchy || offset_r > param_len) return -EINVAL;
/* the ticket digest HMAC (might not be sha256) */
len = tpm_buf_read_u16(buf, &offset_r);
offset_r += len; if (offset_r > param_len) return -EINVAL;
/* * finally we have the name, which is a sha256 digest plus a 2 * byte algorithm type
*/
len = tpm_buf_read_u16(buf, &offset_r); if (offset_r + len != param_len + 8) return -EINVAL; if (len != SHA256_DIGEST_SIZE + 2) return -EINVAL;
if (memcmp(chip->null_key_name, &buf->data[offset_r],
SHA256_DIGEST_SIZE + 2) != 0) {
dev_err(&chip->dev, "NULL Seed name comparison failed\n"); return -EINVAL;
}
return 0;
}
/** * tpm2_create_primary() - create a primary key using a fixed P-256 template * * @chip: the TPM chip to create under * @hierarchy: The hierarchy handle to create under * @handle: The returned volatile handle on success * @name: The name of the returned key * * For platforms that might not have a persistent primary, this can be * used to create one quickly on the fly (it uses Elliptic Curve not * RSA, so even slow TPMs can create one fast). The template uses the * TCG mandated H one for non-endorsement ECC primaries, i.e. P-256 * elliptic curve (the only current one all TPM2s are required to * have) a sha256 name hash and no policy. * * Return: * * 0 - OK * * -errno - A system error * * TPM_RC - A TPM error
*/ staticint tpm2_create_primary(struct tpm_chip *chip, u32 hierarchy,
u32 *handle, u8 *name)
{ int rc; struct tpm_buf buf; struct tpm_buf template;
rc = tpm_buf_init(&buf, TPM2_ST_SESSIONS, TPM2_CC_CREATE_PRIMARY); if (rc) return rc;
rc = tpm_buf_init_sized(&template); if (rc) {
tpm_buf_destroy(&buf); return rc;
}
/* * create the template. Note: in order for userspace to * verify the security of the system, it will have to create * and certify this NULL primary, meaning all the template * parameters will have to be identical, so conform exactly to * the TCG TPM v2.0 Provisioning Guidance for the SRK ECC * key H template (H has zero size unique points)
*/
/* key type */
tpm_buf_append_u16(&template, TPM_ALG_ECC);
/* name algorithm */
tpm_buf_append_u16(&template, TPM_ALG_SHA256);
/** * tpm2_sessions_init() - start of day initialization for the sessions code * @chip: TPM chip * * Derive and context save the null primary and allocate memory in the * struct tpm_chip for the authorizations. * * Return: * * 0 - OK * * -errno - A system error * * TPM_RC - A TPM error
*/ int tpm2_sessions_init(struct tpm_chip *chip)
{ int rc;
rc = tpm2_create_null_primary(chip); if (rc) {
dev_err(&chip->dev, "null key creation failed with %d\n", rc); return rc;
}
return rc;
} #endif/* CONFIG_TCG_TPM2_HMAC */
Messung V0.5
¤ Dauer der Verarbeitung: 0.38 Sekunden
(vorverarbeitet)
¤
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung und die Messung sind noch experimentell.