Skip to content

Commit d3506ed

Browse files
committed
tss-esapi: move public keys to rustcrypto ecosystem
Signed-off-by: Arthur Gautier <[email protected]>
1 parent 2cc4f63 commit d3506ed

File tree

4 files changed

+259
-145
lines changed

4 files changed

+259
-145
lines changed

tss-esapi/Cargo.toml

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -34,9 +34,6 @@ hostname-validator = "1.1.0"
3434
regex = "1.3.9"
3535
zeroize = { version = "1.5.7", features = ["zeroize_derive"] }
3636
tss-esapi-sys = { path = "../tss-esapi-sys", version = "0.5.0" }
37-
oid = { version = "0.2.1", optional = true }
38-
picky-asn1 = { version = "0.9.0", optional = true }
39-
picky-asn1-x509 = { version = "0.13.0", optional = true }
4037
x509-cert = { version = "0.2.0", optional = true }
4138
ecdsa = { version = "0.16.9", features = ["der", "hazmat", "arithmetic", "verifying"], optional = true }
4239
elliptic-curve = { version = "0.13.8", optional = true, features = ["alloc", "pkcs8"] }
@@ -77,7 +74,7 @@ semver = "1.0.7"
7774
[features]
7875
default = ["abstraction"]
7976
generate-bindings = ["tss-esapi-sys/generate-bindings"]
80-
abstraction = ["oid", "picky-asn1", "picky-asn1-x509"]
77+
abstraction = ["rustcrypto"]
8178
integration-tests = ["strum", "strum_macros"]
8279

8380
rustcrypto = ["ecdsa", "elliptic-curve", "signature", "x509-cert"]

tss-esapi/src/abstraction/public.rs

Lines changed: 210 additions & 90 deletions
Original file line numberDiff line numberDiff line change
@@ -2,127 +2,247 @@
22
// SPDX-License-Identifier: Apache-2.0
33

44
use crate::interface_types::ecc::EccCurve;
5-
use crate::structures::{Public, RsaExponent};
5+
use crate::structures::Public;
6+
use crate::utils::PublicKey as TpmPublicKey;
67
use crate::{Error, WrapperErrorKind};
78

89
use core::convert::TryFrom;
9-
use oid::ObjectIdentifier;
10-
use picky_asn1::bit_string::BitString;
11-
use picky_asn1::wrapper::{IntegerAsn1, OctetStringAsn1};
12-
use picky_asn1_x509::{
13-
AlgorithmIdentifier, EcParameters, EcPoint, PublicKey, RsaPublicKey, SubjectPublicKeyInfo,
10+
use elliptic_curve::{
11+
// See TODO below, you're upgrading from 0.13 to 0.14 and
12+
// that moved the implementation from generic-array to
13+
// hybrid-array, you can now use TryFrom
14+
generic_array::typenum::Unsigned,
15+
sec1::{EncodedPoint, FromEncodedPoint, ModulusSize, ToEncodedPoint},
16+
AffinePoint,
17+
CurveArithmetic,
18+
FieldBytesSize,
19+
PublicKey,
1420
};
1521

16-
/// Can be converted from [`crate::structures::Public`] when not a fully constructed
17-
/// [`picky_asn1_x509::SubjectPublicKeyInfo`] is required.
18-
///
19-
/// # Details
20-
/// Holds either [`picky_asn1_x509::RsaPublicKey`] for [`crate::structures::Public::Rsa`] or
21-
/// [`picky_asn1_x509::EcPoint`] for [`crate::structures::Public::Ecc`].
22-
///
23-
/// This object can be serialized and deserialized
24-
/// using serde if the `serde` feature is enabled.
25-
#[derive(Debug, PartialEq, Eq, Clone)]
26-
#[cfg_attr(feature = "serde", derive(serde::Deserialize, serde::Serialize))]
27-
pub enum DecodedKey {
28-
RsaPublicKey(RsaPublicKey),
29-
EcPoint(EcPoint),
22+
use x509_cert::spki::SubjectPublicKeyInfoOwned;
23+
24+
#[cfg(all(feature = "rustcrypto", feature = "rsa"))]
25+
use {
26+
crate::structures::RsaExponent,
27+
rsa::{pkcs8::EncodePublicKey, BigUint, RsaPublicKey},
28+
};
29+
30+
/// Default exponent for RSA keys.
31+
// Also known as 0x10001
32+
#[cfg(all(feature = "rustcrypto", feature = "rsa"))]
33+
const RSA_DEFAULT_EXP: u64 = 65537;
34+
35+
impl<C> TryFrom<&Public> for PublicKey<C>
36+
where
37+
C: CurveArithmetic + AssociatedTpmCurve,
38+
FieldBytesSize<C>: ModulusSize,
39+
AffinePoint<C>: FromEncodedPoint<C> + ToEncodedPoint<C>,
40+
{
41+
type Error = Error;
42+
43+
fn try_from(value: &Public) -> Result<Self, Self::Error> {
44+
match value {
45+
Public::Ecc {
46+
parameters, unique, ..
47+
} => {
48+
if parameters.ecc_curve() != C::TPM_CURVE {
49+
return Err(Error::local_error(WrapperErrorKind::InvalidParam));
50+
}
51+
52+
let x = unique.x().as_bytes();
53+
let y = unique.y().as_bytes();
54+
55+
// TODO: When elliptic_curve bumps to 0.14, we can use the TryFrom implementation instead
56+
// of checking lengths manually
57+
if x.len() != FieldBytesSize::<C>::USIZE {
58+
return Err(Error::local_error(WrapperErrorKind::InvalidParam));
59+
}
60+
if y.len() != FieldBytesSize::<C>::USIZE {
61+
return Err(Error::local_error(WrapperErrorKind::InvalidParam));
62+
}
63+
64+
let encoded_point =
65+
EncodedPoint::<C>::from_affine_coordinates(x.into(), y.into(), false);
66+
let public_key = PublicKey::<C>::try_from(&encoded_point)
67+
.map_err(|_| Error::local_error(WrapperErrorKind::InvalidParam))?;
68+
69+
Ok(public_key)
70+
}
71+
_ => Err(Error::local_error(WrapperErrorKind::UnsupportedParam)),
72+
}
73+
}
3074
}
3175

32-
impl TryFrom<Public> for DecodedKey {
76+
#[cfg(all(feature = "rustcrypto", feature = "rsa"))]
77+
impl TryFrom<&Public> for RsaPublicKey {
3378
type Error = Error;
3479

35-
fn try_from(value: Public) -> Result<Self, Self::Error> {
36-
public_to_decoded_key(&value)
80+
fn try_from(value: &Public) -> Result<Self, Self::Error> {
81+
match value {
82+
Public::Rsa {
83+
unique, parameters, ..
84+
} => {
85+
let exponent = match parameters.exponent() {
86+
RsaExponent::ZERO_EXPONENT => BigUint::from(RSA_DEFAULT_EXP),
87+
_ => BigUint::from(parameters.exponent().value()),
88+
};
89+
let modulus = BigUint::from_bytes_be(unique.as_bytes());
90+
91+
let public_key = RsaPublicKey::new(modulus, exponent)
92+
.map_err(|_| Error::local_error(WrapperErrorKind::InvalidParam))?;
93+
94+
Ok(public_key)
95+
}
96+
_ => Err(Error::local_error(WrapperErrorKind::UnsupportedParam)),
97+
}
3798
}
3899
}
39100

40-
impl TryFrom<Public> for SubjectPublicKeyInfo {
101+
impl TryFrom<&Public> for SubjectPublicKeyInfoOwned {
41102
type Error = Error;
42103

43-
/// Converts [`crate::structures::Public::Rsa`] and [`crate::structures::Public::Ecc`] to [`picky_asn1_x509::SubjectPublicKeyInfo`].
104+
/// Converts [`crate::structures::Public::Rsa`] and [`crate::structures::Public::Ecc`] to [`x509_cert::spki::SubjectPublicKeyInfoOwned`].
44105
///
45106
/// # Details
46-
/// The result can be used to convert TPM public keys to DER using `picky_asn1_der`.
107+
/// The result can be used to convert TPM public keys to DER using `x509-cert`.
47108
///
48109
/// # Errors
49110
/// * if other instances of [`crate::structures::Public`] are used `UnsupportedParam` will be returned.
50-
fn try_from(value: Public) -> Result<Self, Self::Error> {
51-
let decoded_key = public_to_decoded_key(&value)?;
52-
53-
match (value, decoded_key) {
54-
(Public::Rsa { .. }, DecodedKey::RsaPublicKey(key)) => Ok(SubjectPublicKeyInfo {
55-
algorithm: AlgorithmIdentifier::new_rsa_encryption(),
56-
subject_public_key: PublicKey::Rsa(key.into()),
57-
}),
58-
(Public::Ecc { parameters, .. }, DecodedKey::EcPoint(point)) => {
59-
Ok(SubjectPublicKeyInfo {
60-
algorithm: AlgorithmIdentifier::new_elliptic_curve(EcParameters::NamedCurve(
61-
curve_oid(parameters.ecc_curve())?.into(),
62-
)),
63-
subject_public_key: PublicKey::Ec(BitString::with_bytes(point).into()),
64-
})
111+
fn try_from(value: &Public) -> Result<Self, Self::Error> {
112+
match value {
113+
#[cfg(all(feature = "rustcrypto", feature = "rsa"))]
114+
Public::Rsa { .. } => {
115+
let public_key = RsaPublicKey::try_from(value)?;
116+
117+
Ok(public_key
118+
.to_public_key_der()
119+
.map_err(|_| Error::local_error(WrapperErrorKind::InvalidParam))?
120+
.decode_msg::<Self>()
121+
.map_err(|_| Error::local_error(WrapperErrorKind::InvalidParam))?)
122+
}
123+
#[allow(unused)]
124+
Public::Ecc { parameters, .. } => {
125+
macro_rules! read_key {
126+
($curve:expr, $key_type:ty) => {
127+
if parameters.ecc_curve() == <$key_type>::TPM_CURVE {
128+
let public_key = PublicKey::<$key_type>::try_from(value)?;
129+
130+
return public_key
131+
.to_public_key_der()
132+
.map_err(|_| Error::local_error(WrapperErrorKind::InvalidParam))?
133+
.decode_msg::<Self>()
134+
.map_err(|_| Error::local_error(WrapperErrorKind::InvalidParam));
135+
}
136+
};
137+
}
138+
139+
#[cfg(all(feature = "rustcrypto", feature = "p192"))]
140+
read_key!(EccCurve::NistP192, p192::NistP192);
141+
#[cfg(all(feature = "rustcrypto", feature = "p224"))]
142+
read_key!(EccCurve::NistP224, p224::NistP224);
143+
#[cfg(all(feature = "rustcrypto", feature = "p256"))]
144+
read_key!(EccCurve::NistP256, p256::NistP256);
145+
#[cfg(all(feature = "rustcrypto", feature = "p384"))]
146+
read_key!(EccCurve::NistP384, p384::NistP384);
147+
#[cfg(all(feature = "rustcrypto", feature = "p521"))]
148+
read_key!(EccCurve::NistP521, p521::NistP521);
149+
#[cfg(all(feature = "rustcrypto", feature = "sm2"))]
150+
read_key!(EccCurve::Sm2P256, sm2::Sm2);
151+
152+
Err(Error::local_error(WrapperErrorKind::UnsupportedParam))
65153
}
66154
_ => Err(Error::local_error(WrapperErrorKind::UnsupportedParam)),
67155
}
68156
}
69157
}
70158

71-
/// Converts [`crate::structures::Public::Rsa`] and [`crate::structures::Public::Ecc`] to [DecodedKey].
72-
///
73-
/// # Details
74-
/// Does basic key conversion to either RSA or ECC. In RSA conversion the TPM zero exponent is replaced with `65537`.
75-
///
76-
/// # Errors
77-
/// * if other instances of [`crate::structures::Public`] are used `UnsupportedParam` will be returned.
78-
fn public_to_decoded_key(public: &Public) -> Result<DecodedKey, Error> {
79-
match public {
80-
Public::Rsa {
81-
unique, parameters, ..
82-
} => {
83-
let exponent = match parameters.exponent() {
84-
RsaExponent::ZERO_EXPONENT => 65537,
85-
_ => parameters.exponent().value(),
159+
impl<C> TryFrom<&TpmPublicKey> for PublicKey<C>
160+
where
161+
C: CurveArithmetic + AssociatedTpmCurve,
162+
FieldBytesSize<C>: ModulusSize,
163+
AffinePoint<C>: FromEncodedPoint<C> + ToEncodedPoint<C>,
164+
{
165+
type Error = Error;
166+
167+
fn try_from(value: &TpmPublicKey) -> Result<Self, Self::Error> {
168+
match value {
169+
TpmPublicKey::Ecc { x, y } => {
170+
let x = x.as_slice();
171+
let y = y.as_slice();
172+
173+
// TODO: When elliptic_curve bumps to 0.14, we can use the TryFrom implementation instead
174+
// of checking lengths manually
175+
if x.len() != FieldBytesSize::<C>::USIZE {
176+
return Err(Error::local_error(WrapperErrorKind::InvalidParam));
177+
}
178+
if y.len() != FieldBytesSize::<C>::USIZE {
179+
return Err(Error::local_error(WrapperErrorKind::InvalidParam));
180+
}
181+
182+
let encoded_point =
183+
EncodedPoint::<C>::from_affine_coordinates(x.into(), y.into(), false);
184+
let public_key = PublicKey::<C>::try_from(&encoded_point)
185+
.map_err(|_| Error::local_error(WrapperErrorKind::InvalidParam))?;
186+
187+
Ok(public_key)
86188
}
87-
.to_be_bytes();
88-
Ok(DecodedKey::RsaPublicKey(RsaPublicKey {
89-
modulus: IntegerAsn1::from_bytes_be_unsigned(unique.as_bytes().to_vec()),
90-
public_exponent: IntegerAsn1::from_bytes_be_signed(exponent.to_vec()),
91-
}))
92-
}
93-
Public::Ecc { unique, .. } => {
94-
let x = unique.x().as_bytes().to_vec();
95-
let y = unique.y().as_bytes().to_vec();
96-
Ok(DecodedKey::EcPoint(OctetStringAsn1(
97-
elliptic_curve_point_to_octet_string(x, y),
98-
)))
189+
_ => Err(Error::local_error(WrapperErrorKind::UnsupportedParam)),
99190
}
191+
}
192+
}
100193

101-
_ => Err(Error::local_error(WrapperErrorKind::UnsupportedParam)),
194+
#[cfg(all(feature = "rustcrypto", feature = "rsa"))]
195+
impl TryFrom<&TpmPublicKey> for RsaPublicKey {
196+
type Error = Error;
197+
198+
fn try_from(value: &TpmPublicKey) -> Result<Self, Self::Error> {
199+
match value {
200+
TpmPublicKey::Rsa(modulus) => {
201+
let exponent = BigUint::from(RSA_DEFAULT_EXP);
202+
let modulus = BigUint::from_bytes_be(modulus.as_slice());
203+
204+
let public_key = RsaPublicKey::new(modulus, exponent)
205+
.map_err(|_| Error::local_error(WrapperErrorKind::InvalidParam))?;
206+
207+
Ok(public_key)
208+
}
209+
_ => Err(Error::local_error(WrapperErrorKind::UnsupportedParam)),
210+
}
102211
}
103212
}
104213

105-
// Taken from https://github.com/parallaxsecond/parsec/blob/561235f3cc37bcff3d9a6cb29c84eeae5d55100b/src/providers/tpm/utils.rs#L319
106-
// Points on elliptic curves are represented as defined in section 2.3.3 of https://www.secg.org/sec1-v2.pdf
107-
// The (uncompressed) representation is [ 0x04 || x || y ] where x and y are the coordinates of the point
108-
fn elliptic_curve_point_to_octet_string(mut x: Vec<u8>, mut y: Vec<u8>) -> Vec<u8> {
109-
let mut octet_string = vec![0x04];
110-
octet_string.append(&mut x);
111-
octet_string.append(&mut y);
112-
octet_string
214+
/// Provides the value of the curve used in this crate for the specific curve.
215+
pub trait AssociatedTpmCurve {
216+
/// Value of the curve when interacting with the TPM.
217+
const TPM_CURVE: EccCurve;
113218
}
114219

115-
// Map TPM supported ECC curves to their respective OIDs
116-
fn curve_oid(ecc_curve: EccCurve) -> Result<ObjectIdentifier, Error> {
117-
match ecc_curve {
118-
EccCurve::NistP192 => Ok(picky_asn1_x509::oids::secp192r1()),
119-
EccCurve::NistP224 => Ok(picky_asn1_x509::oids::secp256r1()),
120-
EccCurve::NistP256 => Ok(picky_asn1_x509::oids::secp256r1()),
121-
EccCurve::NistP384 => Ok(picky_asn1_x509::oids::secp384r1()),
122-
EccCurve::NistP521 => Ok(picky_asn1_x509::oids::secp521r1()),
123-
// Barreto-Naehrig curves seem to not have any OIDs
124-
EccCurve::BnP256 => Err(Error::local_error(WrapperErrorKind::UnsupportedParam)),
125-
EccCurve::BnP638 => Err(Error::local_error(WrapperErrorKind::UnsupportedParam)),
126-
EccCurve::Sm2P256 => Ok(ObjectIdentifier::try_from("1.2.156.10197.1.301").unwrap()),
127-
}
220+
#[cfg(all(feature = "rustcrypto", feature = "p192"))]
221+
impl AssociatedTpmCurve for p192::NistP192 {
222+
const TPM_CURVE: EccCurve = EccCurve::NistP192;
223+
}
224+
225+
#[cfg(all(feature = "rustcrypto", feature = "p224"))]
226+
impl AssociatedTpmCurve for p224::NistP224 {
227+
const TPM_CURVE: EccCurve = EccCurve::NistP224;
228+
}
229+
230+
#[cfg(all(feature = "rustcrypto", feature = "p256"))]
231+
impl AssociatedTpmCurve for p256::NistP256 {
232+
const TPM_CURVE: EccCurve = EccCurve::NistP256;
233+
}
234+
235+
#[cfg(all(feature = "rustcrypto", feature = "p384"))]
236+
impl AssociatedTpmCurve for p384::NistP384 {
237+
const TPM_CURVE: EccCurve = EccCurve::NistP384;
238+
}
239+
240+
#[cfg(all(feature = "rustcrypto", feature = "p521"))]
241+
impl AssociatedTpmCurve for p521::NistP521 {
242+
const TPM_CURVE: EccCurve = EccCurve::NistP521;
243+
}
244+
245+
#[cfg(all(feature = "rustcrypto", feature = "sm2"))]
246+
impl AssociatedTpmCurve for sm2::Sm2 {
247+
const TPM_CURVE: EccCurve = EccCurve::Sm2P256;
128248
}

tss-esapi/src/structures/tagged/public.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,9 @@ use crate::{
1313
Error, Result, ReturnCode, WrapperErrorKind,
1414
};
1515

16+
use self::rsa::PublicRsaParameters;
1617
use ecc::PublicEccParameters;
1718
use keyed_hash::PublicKeyedHashParameters;
18-
use rsa::PublicRsaParameters;
1919

2020
use log::error;
2121
use std::convert::{TryFrom, TryInto};

0 commit comments

Comments
 (0)