| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394 |
- // SPDX-License-Identifier: GPL-2.0
- /*
- * Copyright (C) 2018 James.Bottomley@HansenPartnership.com
- *
- * Cryptographic helper routines for handling TPM2 sessions for
- * authorization HMAC and request response encryption.
- *
- * The idea is to ensure that every TPM command is HMAC protected by a
- * session, meaning in-flight tampering would be detected and in
- * addition all sensitive inputs and responses should be encrypted.
- *
- * The basic way this works is to use a TPM feature called salted
- * sessions where a random secret used in session construction is
- * encrypted to the public part of a known TPM key. The problem is we
- * have no known keys, so initially a primary Elliptic Curve key is
- * derived from the NULL seed (we use EC because most TPMs generate
- * these keys much faster than RSA ones). The curve used is NIST_P256
- * because that's now mandated to be present in 'TCG TPM v2.0
- * Provisioning Guidance'
- *
- * Threat problems: the initial TPM2_CreatePrimary is not (and cannot
- * be) session protected, so a clever Man in the Middle could return a
- * public key they control to this command and from there intercept
- * and decode all subsequent session based transactions. The kernel
- * cannot mitigate this threat but, after boot, userspace can get
- * proof this has not happened by asking the TPM to certify the NULL
- * key. This certification would chain back to the TPM Endorsement
- * Certificate and prove the NULL seed primary had not been tampered
- * with and thus all sessions must have been cryptographically secure.
- * To assist with this, the initial NULL seed public key name is made
- * available in a sysfs file.
- *
- * Use of these functions:
- *
- * The design is all the crypto, hash and hmac gunk is confined in this
- * file and never needs to be seen even by the kernel internal user. To
- * the user there's an init function tpm2_sessions_init() that needs to
- * be called once per TPM which generates the NULL seed primary key.
- *
- * These are the usage functions:
- *
- * tpm2_start_auth_session() which allocates the opaque auth structure
- * and gets a session from the TPM. This must be called before
- * any of the following functions. The session is protected by a
- * session_key which is derived from a random salt value
- * encrypted to the NULL seed.
- * tpm2_end_auth_session() kills the session and frees the resources.
- * Under normal operation this function is done by
- * tpm_buf_check_hmac_response(), so this is only to be used on
- * error legs where the latter is not executed.
- * tpm_buf_append_name() to add a handle to the buffer. This must be
- * used in place of the usual tpm_buf_append_u32() for adding
- * handles because handles have to be processed specially when
- * calculating the HMAC. In particular, for NV, volatile and
- * permanent objects you now need to provide the name.
- * tpm_buf_append_hmac_session() which appends the hmac session to the
- * buf in the same way tpm_buf_append_auth does().
- * tpm_buf_fill_hmac_session() This calculates the correct hash and
- * places it in the buffer. It must be called after the complete
- * command buffer is finalized so it can fill in the correct HMAC
- * based on the parameters.
- * tpm_buf_check_hmac_response() which checks the session response in
- * the buffer and calculates what it should be. If there's a
- * mismatch it will log a warning and return an error. If
- * tpm_buf_append_hmac_session() did not specify
- * TPM_SA_CONTINUE_SESSION then the session will be closed (if it
- * hasn't been consumed) and the auth structure freed.
- */
- #include "tpm.h"
- #include <linux/random.h>
- #include <linux/scatterlist.h>
- #include <linux/unaligned.h>
- #include <crypto/kpp.h>
- #include <crypto/ecdh.h>
- #include <crypto/hash.h>
- #include <crypto/hmac.h>
- /* maximum number of names the TPM must remember for authorization */
- #define AUTH_MAX_NAMES 3
- #define AES_KEY_BYTES AES_KEYSIZE_128
- #define AES_KEY_BITS (AES_KEY_BYTES*8)
- /*
- * This is the structure that carries all the auth information (like
- * session handle, nonces, session key and auth) from use to use it is
- * designed to be opaque to anything outside.
- */
- struct tpm2_auth {
- u32 handle;
- /*
- * This has two meanings: before tpm_buf_fill_hmac_session()
- * it marks the offset in the buffer of the start of the
- * sessions (i.e. after all the handles). Once the buffer has
- * been filled it markes the session number of our auth
- * session so we can find it again in the response buffer.
- *
- * The two cases are distinguished because the first offset
- * must always be greater than TPM_HEADER_SIZE and the second
- * must be less than or equal to 5.
- */
- u32 session;
- /*
- * the size here is variable and set by the size of our_nonce
- * which must be between 16 and the name hash length. we set
- * the maximum sha256 size for the greatest protection
- */
- u8 our_nonce[SHA256_DIGEST_SIZE];
- u8 tpm_nonce[SHA256_DIGEST_SIZE];
- /*
- * the salt is only used across the session command/response
- * after that it can be used as a scratch area
- */
- union {
- u8 salt[EC_PT_SZ];
- /* scratch for key + IV */
- u8 scratch[AES_KEY_BYTES + AES_BLOCK_SIZE];
- };
- /*
- * the session key and passphrase are the same size as the
- * name digest (sha256 again). The session key is constant
- * for the use of the session and the passphrase can change
- * with every invocation.
- *
- * Note: these fields must be adjacent and in this order
- * because several HMAC/KDF schemes use the combination of the
- * session_key and passphrase.
- */
- u8 session_key[SHA256_DIGEST_SIZE];
- u8 passphrase[SHA256_DIGEST_SIZE];
- int passphrase_len;
- struct crypto_aes_ctx aes_ctx;
- /* saved session attributes: */
- u8 attrs;
- __be32 ordinal;
- /*
- * memory for three authorization handles. We know them by
- * handle, but they are part of the session by name, which
- * we must compute and remember
- */
- u32 name_h[AUTH_MAX_NAMES];
- u8 name[AUTH_MAX_NAMES][2 + SHA512_DIGEST_SIZE];
- };
- #ifdef CONFIG_TCG_TPM2_HMAC
- /*
- * Name Size based on TPM algorithm (assumes no hash bigger than 255)
- */
- static u8 name_size(const u8 *name)
- {
- static u8 size_map[] = {
- [TPM_ALG_SHA1] = SHA1_DIGEST_SIZE,
- [TPM_ALG_SHA256] = SHA256_DIGEST_SIZE,
- [TPM_ALG_SHA384] = SHA384_DIGEST_SIZE,
- [TPM_ALG_SHA512] = SHA512_DIGEST_SIZE,
- };
- u16 alg = get_unaligned_be16(name);
- return size_map[alg] + 2;
- }
- static int tpm2_parse_read_public(char *name, struct tpm_buf *buf)
- {
- struct tpm_header *head = (struct tpm_header *)buf->data;
- off_t offset = TPM_HEADER_SIZE;
- u32 tot_len = be32_to_cpu(head->length);
- u32 val;
- /* we're starting after the header so adjust the length */
- tot_len -= TPM_HEADER_SIZE;
- /* skip public */
- val = tpm_buf_read_u16(buf, &offset);
- if (val > tot_len)
- return -EINVAL;
- offset += val;
- /* name */
- val = tpm_buf_read_u16(buf, &offset);
- if (val != name_size(&buf->data[offset]))
- return -EINVAL;
- memcpy(name, &buf->data[offset], val);
- /* forget the rest */
- return 0;
- }
- static int tpm2_read_public(struct tpm_chip *chip, u32 handle, char *name)
- {
- struct tpm_buf buf;
- int rc;
- rc = tpm_buf_init(&buf, TPM2_ST_NO_SESSIONS, TPM2_CC_READ_PUBLIC);
- if (rc)
- return rc;
- tpm_buf_append_u32(&buf, handle);
- rc = tpm_transmit_cmd(chip, &buf, 0, "read public");
- if (rc == TPM2_RC_SUCCESS)
- rc = tpm2_parse_read_public(name, &buf);
- tpm_buf_destroy(&buf);
- return rc;
- }
- #endif /* CONFIG_TCG_TPM2_HMAC */
- /**
- * tpm_buf_append_name() - add a handle area to the buffer
- * @chip: the TPM chip structure
- * @buf: The buffer to be appended
- * @handle: The handle to be appended
- * @name: The name of the handle (may be NULL)
- *
- * In order to compute session HMACs, we need to know the names of the
- * objects pointed to by the handles. For most objects, this is simply
- * the actual 4 byte handle or an empty buf (in these cases @name
- * should be NULL) but for volatile objects, permanent objects and NV
- * areas, the name is defined as the hash (according to the name
- * algorithm which should be set to sha256) of the public area to
- * which the two byte algorithm id has been appended. For these
- * objects, the @name pointer should point to this. If a name is
- * required but @name is NULL, then TPM2_ReadPublic() will be called
- * on the handle to obtain the name.
- *
- * As with most tpm_buf operations, success is assumed because failure
- * will be caused by an incorrect programming model and indicated by a
- * kernel message.
- */
- void tpm_buf_append_name(struct tpm_chip *chip, struct tpm_buf *buf,
- u32 handle, u8 *name)
- {
- #ifdef CONFIG_TCG_TPM2_HMAC
- enum tpm2_mso_type mso = tpm2_handle_mso(handle);
- struct tpm2_auth *auth;
- int slot;
- #endif
- if (!tpm2_chip_auth(chip)) {
- tpm_buf_append_handle(chip, buf, handle);
- return;
- }
- #ifdef CONFIG_TCG_TPM2_HMAC
- slot = (tpm_buf_length(buf) - TPM_HEADER_SIZE) / 4;
- if (slot >= AUTH_MAX_NAMES) {
- dev_err(&chip->dev, "TPM: too many handles\n");
- return;
- }
- auth = chip->auth;
- WARN(auth->session != tpm_buf_length(buf),
- "name added in wrong place\n");
- tpm_buf_append_u32(buf, handle);
- auth->session += 4;
- if (mso == TPM2_MSO_PERSISTENT ||
- mso == TPM2_MSO_VOLATILE ||
- mso == TPM2_MSO_NVRAM) {
- if (!name)
- tpm2_read_public(chip, handle, auth->name[slot]);
- } else {
- if (name)
- dev_err(&chip->dev, "TPM: Handle does not require name but one is specified\n");
- }
- auth->name_h[slot] = handle;
- if (name)
- memcpy(auth->name[slot], name, name_size(name));
- #endif
- }
- EXPORT_SYMBOL_GPL(tpm_buf_append_name);
- void tpm_buf_append_auth(struct tpm_chip *chip, struct tpm_buf *buf,
- u8 attributes, u8 *passphrase, int passphrase_len)
- {
- /* offset tells us where the sessions area begins */
- int offset = buf->handles * 4 + TPM_HEADER_SIZE;
- u32 len = 9 + passphrase_len;
- if (tpm_buf_length(buf) != offset) {
- /* not the first session so update the existing length */
- len += get_unaligned_be32(&buf->data[offset]);
- put_unaligned_be32(len, &buf->data[offset]);
- } else {
- tpm_buf_append_u32(buf, len);
- }
- /* auth handle */
- tpm_buf_append_u32(buf, TPM2_RS_PW);
- /* nonce */
- tpm_buf_append_u16(buf, 0);
- /* attributes */
- tpm_buf_append_u8(buf, 0);
- /* passphrase */
- tpm_buf_append_u16(buf, passphrase_len);
- tpm_buf_append(buf, passphrase, passphrase_len);
- }
- /**
- * tpm_buf_append_hmac_session() - Append a TPM session element
- * @chip: the TPM chip structure
- * @buf: The buffer to be appended
- * @attributes: The session attributes
- * @passphrase: The session authority (NULL if none)
- * @passphrase_len: The length of the session authority (0 if none)
- *
- * This fills in a session structure in the TPM command buffer, except
- * for the HMAC which cannot be computed until the command buffer is
- * complete. The type of session is controlled by the @attributes,
- * the main ones of which are TPM2_SA_CONTINUE_SESSION which means the
- * session won't terminate after tpm_buf_check_hmac_response(),
- * TPM2_SA_DECRYPT which means this buffers first parameter should be
- * encrypted with a session key and TPM2_SA_ENCRYPT, which means the
- * response buffer's first parameter needs to be decrypted (confusing,
- * but the defines are written from the point of view of the TPM).
- *
- * Any session appended by this command must be finalized by calling
- * tpm_buf_fill_hmac_session() otherwise the HMAC will be incorrect
- * and the TPM will reject the command.
- *
- * As with most tpm_buf operations, success is assumed because failure
- * will be caused by an incorrect programming model and indicated by a
- * kernel message.
- */
- void tpm_buf_append_hmac_session(struct tpm_chip *chip, struct tpm_buf *buf,
- u8 attributes, u8 *passphrase,
- int passphrase_len)
- {
- #ifdef CONFIG_TCG_TPM2_HMAC
- u8 nonce[SHA256_DIGEST_SIZE];
- struct tpm2_auth *auth;
- u32 len;
- #endif
- if (!tpm2_chip_auth(chip)) {
- tpm_buf_append_auth(chip, buf, attributes, passphrase,
- passphrase_len);
- return;
- }
- #ifdef CONFIG_TCG_TPM2_HMAC
- /* The first write to /dev/tpm{rm0} will flush the session. */
- attributes |= TPM2_SA_CONTINUE_SESSION;
- /*
- * The Architecture Guide requires us to strip trailing zeros
- * before computing the HMAC
- */
- while (passphrase && passphrase_len > 0 && passphrase[passphrase_len - 1] == '\0')
- passphrase_len--;
- auth = chip->auth;
- auth->attrs = attributes;
- auth->passphrase_len = passphrase_len;
- if (passphrase_len)
- memcpy(auth->passphrase, passphrase, passphrase_len);
- if (auth->session != tpm_buf_length(buf)) {
- /* we're not the first session */
- len = get_unaligned_be32(&buf->data[auth->session]);
- if (4 + len + auth->session != tpm_buf_length(buf)) {
- WARN(1, "session length mismatch, cannot append");
- return;
- }
- /* add our new session */
- len += 9 + 2 * SHA256_DIGEST_SIZE;
- put_unaligned_be32(len, &buf->data[auth->session]);
- } else {
- tpm_buf_append_u32(buf, 9 + 2 * SHA256_DIGEST_SIZE);
- }
- /* random number for our nonce */
- get_random_bytes(nonce, sizeof(nonce));
- memcpy(auth->our_nonce, nonce, sizeof(nonce));
- tpm_buf_append_u32(buf, auth->handle);
- /* our new nonce */
- tpm_buf_append_u16(buf, SHA256_DIGEST_SIZE);
- tpm_buf_append(buf, nonce, SHA256_DIGEST_SIZE);
- tpm_buf_append_u8(buf, auth->attrs);
- /* and put a placeholder for the hmac */
- tpm_buf_append_u16(buf, SHA256_DIGEST_SIZE);
- tpm_buf_append(buf, nonce, SHA256_DIGEST_SIZE);
- #endif
- }
- EXPORT_SYMBOL_GPL(tpm_buf_append_hmac_session);
- #ifdef CONFIG_TCG_TPM2_HMAC
- static int tpm2_create_primary(struct tpm_chip *chip, u32 hierarchy,
- u32 *handle, u8 *name);
- /*
- * It turns out the crypto hmac(sha256) is hard for us to consume
- * because it assumes a fixed key and the TPM seems to change the key
- * on every operation, so we weld the hmac init and final functions in
- * here to give it the same usage characteristics as a regular hash
- */
- static void tpm2_hmac_init(struct sha256_state *sctx, u8 *key, u32 key_len)
- {
- u8 pad[SHA256_BLOCK_SIZE];
- int i;
- sha256_init(sctx);
- for (i = 0; i < sizeof(pad); i++) {
- if (i < key_len)
- pad[i] = key[i];
- else
- pad[i] = 0;
- pad[i] ^= HMAC_IPAD_VALUE;
- }
- sha256_update(sctx, pad, sizeof(pad));
- }
- static void tpm2_hmac_final(struct sha256_state *sctx, u8 *key, u32 key_len,
- u8 *out)
- {
- u8 pad[SHA256_BLOCK_SIZE];
- int i;
- for (i = 0; i < sizeof(pad); i++) {
- if (i < key_len)
- pad[i] = key[i];
- else
- pad[i] = 0;
- pad[i] ^= HMAC_OPAD_VALUE;
- }
- /* collect the final hash; use out as temporary storage */
- sha256_final(sctx, out);
- sha256_init(sctx);
- sha256_update(sctx, pad, sizeof(pad));
- sha256_update(sctx, out, SHA256_DIGEST_SIZE);
- sha256_final(sctx, out);
- }
- /*
- * assume hash sha256 and nonces u, v of size SHA256_DIGEST_SIZE but
- * otherwise standard tpm2_KDFa. Note output is in bytes not bits.
- */
- static void tpm2_KDFa(u8 *key, u32 key_len, const char *label, u8 *u,
- u8 *v, u32 bytes, u8 *out)
- {
- u32 counter = 1;
- const __be32 bits = cpu_to_be32(bytes * 8);
- while (bytes > 0) {
- struct sha256_state sctx;
- __be32 c = cpu_to_be32(counter);
- tpm2_hmac_init(&sctx, key, key_len);
- sha256_update(&sctx, (u8 *)&c, sizeof(c));
- sha256_update(&sctx, label, strlen(label)+1);
- sha256_update(&sctx, u, SHA256_DIGEST_SIZE);
- sha256_update(&sctx, v, SHA256_DIGEST_SIZE);
- sha256_update(&sctx, (u8 *)&bits, sizeof(bits));
- tpm2_hmac_final(&sctx, key, key_len, out);
- bytes -= SHA256_DIGEST_SIZE;
- counter++;
- out += SHA256_DIGEST_SIZE;
- }
- }
- /*
- * Somewhat of a bastardization of the real KDFe. We're assuming
- * we're working with known point sizes for the input parameters and
- * the hash algorithm is fixed at sha256. Because we know that the
- * point size is 32 bytes like the hash size, there's no need to loop
- * in this KDF.
- */
- static void tpm2_KDFe(u8 z[EC_PT_SZ], const char *str, u8 *pt_u, u8 *pt_v,
- u8 *out)
- {
- struct sha256_state sctx;
- /*
- * this should be an iterative counter, but because we know
- * we're only taking 32 bytes for the point using a sha256
- * hash which is also 32 bytes, there's only one loop
- */
- __be32 c = cpu_to_be32(1);
- sha256_init(&sctx);
- /* counter (BE) */
- sha256_update(&sctx, (u8 *)&c, sizeof(c));
- /* secret value */
- sha256_update(&sctx, z, EC_PT_SZ);
- /* string including trailing zero */
- sha256_update(&sctx, str, strlen(str)+1);
- sha256_update(&sctx, pt_u, EC_PT_SZ);
- sha256_update(&sctx, pt_v, EC_PT_SZ);
- sha256_final(&sctx, out);
- }
- static void tpm_buf_append_salt(struct tpm_buf *buf, struct tpm_chip *chip,
- struct tpm2_auth *auth)
- {
- struct crypto_kpp *kpp;
- struct kpp_request *req;
- struct scatterlist s[2], d[1];
- struct ecdh p = {0};
- u8 encoded_key[EC_PT_SZ], *x, *y;
- unsigned int buf_len;
- /* secret is two sized points */
- tpm_buf_append_u16(buf, (EC_PT_SZ + 2)*2);
- /*
- * we cheat here and append uninitialized data to form
- * the points. All we care about is getting the two
- * co-ordinate pointers, which will be used to overwrite
- * the uninitialized data
- */
- tpm_buf_append_u16(buf, EC_PT_SZ);
- x = &buf->data[tpm_buf_length(buf)];
- tpm_buf_append(buf, encoded_key, EC_PT_SZ);
- tpm_buf_append_u16(buf, EC_PT_SZ);
- y = &buf->data[tpm_buf_length(buf)];
- tpm_buf_append(buf, encoded_key, EC_PT_SZ);
- sg_init_table(s, 2);
- sg_set_buf(&s[0], x, EC_PT_SZ);
- sg_set_buf(&s[1], y, EC_PT_SZ);
- kpp = crypto_alloc_kpp("ecdh-nist-p256", CRYPTO_ALG_INTERNAL, 0);
- if (IS_ERR(kpp)) {
- dev_err(&chip->dev, "crypto ecdh allocation failed\n");
- return;
- }
- buf_len = crypto_ecdh_key_len(&p);
- if (sizeof(encoded_key) < buf_len) {
- dev_err(&chip->dev, "salt buffer too small needs %d\n",
- buf_len);
- goto out;
- }
- crypto_ecdh_encode_key(encoded_key, buf_len, &p);
- /* this generates a random private key */
- crypto_kpp_set_secret(kpp, encoded_key, buf_len);
- /* salt is now the public point of this private key */
- req = kpp_request_alloc(kpp, GFP_KERNEL);
- if (!req)
- goto out;
- kpp_request_set_input(req, NULL, 0);
- kpp_request_set_output(req, s, EC_PT_SZ*2);
- crypto_kpp_generate_public_key(req);
- /*
- * we're not done: now we have to compute the shared secret
- * which is our private key multiplied by the tpm_key public
- * point, we actually only take the x point and discard the y
- * point and feed it through KDFe to get the final secret salt
- */
- sg_set_buf(&s[0], chip->null_ec_key_x, EC_PT_SZ);
- sg_set_buf(&s[1], chip->null_ec_key_y, EC_PT_SZ);
- kpp_request_set_input(req, s, EC_PT_SZ*2);
- sg_init_one(d, auth->salt, EC_PT_SZ);
- kpp_request_set_output(req, d, EC_PT_SZ);
- crypto_kpp_compute_shared_secret(req);
- kpp_request_free(req);
- /*
- * pass the shared secret through KDFe for salt. Note salt
- * area is used both for input shared secret and output salt.
- * This works because KDFe fully consumes the secret before it
- * writes the salt
- */
- tpm2_KDFe(auth->salt, "SECRET", x, chip->null_ec_key_x, auth->salt);
- out:
- crypto_free_kpp(kpp);
- }
- /**
- * tpm_buf_fill_hmac_session() - finalize the session HMAC
- * @chip: the TPM chip structure
- * @buf: The buffer to be appended
- *
- * This command must not be called until all of the parameters have
- * been appended to @buf otherwise the computed HMAC will be
- * incorrect.
- *
- * This function computes and fills in the session HMAC using the
- * session key and, if TPM2_SA_DECRYPT was specified, computes the
- * encryption key and encrypts the first parameter of the command
- * buffer with it.
- *
- * As with most tpm_buf operations, success is assumed because failure
- * will be caused by an incorrect programming model and indicated by a
- * kernel message.
- */
- void tpm_buf_fill_hmac_session(struct tpm_chip *chip, struct tpm_buf *buf)
- {
- u32 cc, handles, val;
- struct tpm2_auth *auth = chip->auth;
- int i;
- struct tpm_header *head = (struct tpm_header *)buf->data;
- off_t offset_s = TPM_HEADER_SIZE, offset_p;
- u8 *hmac = NULL;
- u32 attrs;
- u8 cphash[SHA256_DIGEST_SIZE];
- struct sha256_state sctx;
- if (!auth)
- return;
- /* save the command code in BE format */
- auth->ordinal = head->ordinal;
- cc = be32_to_cpu(head->ordinal);
- i = tpm2_find_cc(chip, cc);
- if (i < 0) {
- dev_err(&chip->dev, "Command 0x%x not found in TPM\n", cc);
- return;
- }
- attrs = chip->cc_attrs_tbl[i];
- handles = (attrs >> TPM2_CC_ATTR_CHANDLES) & GENMASK(2, 0);
- /*
- * just check the names, it's easy to make mistakes. This
- * would happen if someone added a handle via
- * tpm_buf_append_u32() instead of tpm_buf_append_name()
- */
- for (i = 0; i < handles; i++) {
- u32 handle = tpm_buf_read_u32(buf, &offset_s);
- if (auth->name_h[i] != handle) {
- dev_err(&chip->dev, "TPM: handle %d wrong for name\n",
- i);
- return;
- }
- }
- /* point offset_s to the start of the sessions */
- val = tpm_buf_read_u32(buf, &offset_s);
- /* point offset_p to the start of the parameters */
- offset_p = offset_s + val;
- for (i = 1; offset_s < offset_p; i++) {
- u32 handle = tpm_buf_read_u32(buf, &offset_s);
- u16 len;
- u8 a;
- /* nonce (already in auth) */
- len = tpm_buf_read_u16(buf, &offset_s);
- offset_s += len;
- a = tpm_buf_read_u8(buf, &offset_s);
- len = tpm_buf_read_u16(buf, &offset_s);
- if (handle == auth->handle && auth->attrs == a) {
- hmac = &buf->data[offset_s];
- /*
- * save our session number so we know which
- * session in the response belongs to us
- */
- auth->session = i;
- }
- offset_s += len;
- }
- if (offset_s != offset_p) {
- dev_err(&chip->dev, "TPM session length is incorrect\n");
- return;
- }
- if (!hmac) {
- dev_err(&chip->dev, "TPM could not find HMAC session\n");
- return;
- }
- /* encrypt before HMAC */
- if (auth->attrs & TPM2_SA_DECRYPT) {
- u16 len;
- /* need key and IV */
- tpm2_KDFa(auth->session_key, SHA256_DIGEST_SIZE
- + auth->passphrase_len, "CFB", auth->our_nonce,
- auth->tpm_nonce, AES_KEY_BYTES + AES_BLOCK_SIZE,
- auth->scratch);
- len = tpm_buf_read_u16(buf, &offset_p);
- aes_expandkey(&auth->aes_ctx, auth->scratch, AES_KEY_BYTES);
- aescfb_encrypt(&auth->aes_ctx, &buf->data[offset_p],
- &buf->data[offset_p], len,
- auth->scratch + AES_KEY_BYTES);
- /* reset p to beginning of parameters for HMAC */
- offset_p -= 2;
- }
- sha256_init(&sctx);
- /* ordinal is already BE */
- sha256_update(&sctx, (u8 *)&head->ordinal, sizeof(head->ordinal));
- /* add the handle names */
- for (i = 0; i < handles; i++) {
- enum tpm2_mso_type mso = tpm2_handle_mso(auth->name_h[i]);
- if (mso == TPM2_MSO_PERSISTENT ||
- mso == TPM2_MSO_VOLATILE ||
- mso == TPM2_MSO_NVRAM) {
- sha256_update(&sctx, auth->name[i],
- name_size(auth->name[i]));
- } else {
- __be32 h = cpu_to_be32(auth->name_h[i]);
- sha256_update(&sctx, (u8 *)&h, 4);
- }
- }
- if (offset_s != tpm_buf_length(buf))
- sha256_update(&sctx, &buf->data[offset_s],
- tpm_buf_length(buf) - offset_s);
- sha256_final(&sctx, cphash);
- /* now calculate the hmac */
- tpm2_hmac_init(&sctx, auth->session_key, sizeof(auth->session_key)
- + auth->passphrase_len);
- sha256_update(&sctx, cphash, sizeof(cphash));
- sha256_update(&sctx, auth->our_nonce, sizeof(auth->our_nonce));
- sha256_update(&sctx, auth->tpm_nonce, sizeof(auth->tpm_nonce));
- sha256_update(&sctx, &auth->attrs, 1);
- tpm2_hmac_final(&sctx, auth->session_key, sizeof(auth->session_key)
- + auth->passphrase_len, hmac);
- }
- EXPORT_SYMBOL(tpm_buf_fill_hmac_session);
- /**
- * tpm_buf_check_hmac_response() - check the TPM return HMAC for correctness
- * @chip: the TPM chip structure
- * @buf: the original command buffer (which now contains the response)
- * @rc: the return code from tpm_transmit_cmd
- *
- * If @rc is non zero, @buf may not contain an actual return, so @rc
- * is passed through as the return and the session cleaned up and
- * de-allocated if required (this is required if
- * TPM2_SA_CONTINUE_SESSION was not specified as a session flag).
- *
- * If @rc is zero, the response HMAC is computed against the returned
- * @buf and matched to the TPM one in the session area. If there is a
- * mismatch, an error is logged and -EINVAL returned.
- *
- * The reason for this is that the command issue and HMAC check
- * sequence should look like:
- *
- * rc = tpm_transmit_cmd(...);
- * rc = tpm_buf_check_hmac_response(&buf, auth, rc);
- * if (rc)
- * ...
- *
- * Which is easily layered into the current contrl flow.
- *
- * Returns: 0 on success or an error.
- */
- int tpm_buf_check_hmac_response(struct tpm_chip *chip, struct tpm_buf *buf,
- int rc)
- {
- struct tpm_header *head = (struct tpm_header *)buf->data;
- struct tpm2_auth *auth = chip->auth;
- off_t offset_s, offset_p;
- u8 rphash[SHA256_DIGEST_SIZE];
- u32 attrs, cc;
- struct sha256_state sctx;
- u16 tag = be16_to_cpu(head->tag);
- int parm_len, len, i, handles;
- if (!auth)
- return rc;
- cc = be32_to_cpu(auth->ordinal);
- if (auth->session >= TPM_HEADER_SIZE) {
- WARN(1, "tpm session not filled correctly\n");
- goto out;
- }
- if (rc != 0)
- /* pass non success rc through and close the session */
- goto out;
- rc = -EINVAL;
- if (tag != TPM2_ST_SESSIONS) {
- dev_err(&chip->dev, "TPM: HMAC response check has no sessions tag\n");
- goto out;
- }
- i = tpm2_find_cc(chip, cc);
- if (i < 0)
- goto out;
- attrs = chip->cc_attrs_tbl[i];
- handles = (attrs >> TPM2_CC_ATTR_RHANDLE) & 1;
- /* point to area beyond handles */
- offset_s = TPM_HEADER_SIZE + handles * 4;
- parm_len = tpm_buf_read_u32(buf, &offset_s);
- offset_p = offset_s;
- offset_s += parm_len;
- /* skip over any sessions before ours */
- for (i = 0; i < auth->session - 1; i++) {
- len = tpm_buf_read_u16(buf, &offset_s);
- offset_s += len + 1;
- len = tpm_buf_read_u16(buf, &offset_s);
- offset_s += len;
- }
- /* TPM nonce */
- len = tpm_buf_read_u16(buf, &offset_s);
- if (offset_s + len > tpm_buf_length(buf))
- goto out;
- if (len != SHA256_DIGEST_SIZE)
- goto out;
- memcpy(auth->tpm_nonce, &buf->data[offset_s], len);
- offset_s += len;
- attrs = tpm_buf_read_u8(buf, &offset_s);
- len = tpm_buf_read_u16(buf, &offset_s);
- if (offset_s + len != tpm_buf_length(buf))
- goto out;
- if (len != SHA256_DIGEST_SIZE)
- goto out;
- /*
- * offset_s points to the HMAC. now calculate comparison, beginning
- * with rphash
- */
- sha256_init(&sctx);
- /* yes, I know this is now zero, but it's what the standard says */
- sha256_update(&sctx, (u8 *)&head->return_code,
- sizeof(head->return_code));
- /* ordinal is already BE */
- sha256_update(&sctx, (u8 *)&auth->ordinal, sizeof(auth->ordinal));
- sha256_update(&sctx, &buf->data[offset_p], parm_len);
- sha256_final(&sctx, rphash);
- /* now calculate the hmac */
- tpm2_hmac_init(&sctx, auth->session_key, sizeof(auth->session_key)
- + auth->passphrase_len);
- sha256_update(&sctx, rphash, sizeof(rphash));
- sha256_update(&sctx, auth->tpm_nonce, sizeof(auth->tpm_nonce));
- sha256_update(&sctx, auth->our_nonce, sizeof(auth->our_nonce));
- sha256_update(&sctx, &auth->attrs, 1);
- /* we're done with the rphash, so put our idea of the hmac there */
- tpm2_hmac_final(&sctx, auth->session_key, sizeof(auth->session_key)
- + auth->passphrase_len, rphash);
- if (memcmp(rphash, &buf->data[offset_s], SHA256_DIGEST_SIZE) == 0) {
- rc = 0;
- } else {
- dev_err(&chip->dev, "TPM: HMAC check failed\n");
- goto out;
- }
- /* now do response decryption */
- if (auth->attrs & TPM2_SA_ENCRYPT) {
- /* need key and IV */
- tpm2_KDFa(auth->session_key, SHA256_DIGEST_SIZE
- + auth->passphrase_len, "CFB", auth->tpm_nonce,
- auth->our_nonce, AES_KEY_BYTES + AES_BLOCK_SIZE,
- auth->scratch);
- len = tpm_buf_read_u16(buf, &offset_p);
- aes_expandkey(&auth->aes_ctx, auth->scratch, AES_KEY_BYTES);
- aescfb_decrypt(&auth->aes_ctx, &buf->data[offset_p],
- &buf->data[offset_p], len,
- auth->scratch + AES_KEY_BYTES);
- }
- out:
- if ((auth->attrs & TPM2_SA_CONTINUE_SESSION) == 0) {
- if (rc)
- /* manually close the session if it wasn't consumed */
- tpm2_flush_context(chip, auth->handle);
- kfree_sensitive(auth);
- chip->auth = NULL;
- } else {
- /* reset for next use */
- auth->session = TPM_HEADER_SIZE;
- }
- return rc;
- }
- EXPORT_SYMBOL(tpm_buf_check_hmac_response);
- /**
- * tpm2_end_auth_session() - kill the allocated auth session
- * @chip: the TPM chip structure
- *
- * ends the session started by tpm2_start_auth_session and frees all
- * the resources. Under normal conditions,
- * tpm_buf_check_hmac_response() will correctly end the session if
- * required, so this function is only for use in error legs that will
- * bypass the normal invocation of tpm_buf_check_hmac_response().
- */
- void tpm2_end_auth_session(struct tpm_chip *chip)
- {
- struct tpm2_auth *auth = chip->auth;
- if (!auth)
- return;
- tpm2_flush_context(chip, auth->handle);
- kfree_sensitive(auth);
- chip->auth = NULL;
- }
- EXPORT_SYMBOL(tpm2_end_auth_session);
- static int tpm2_parse_start_auth_session(struct tpm2_auth *auth,
- struct tpm_buf *buf)
- {
- struct tpm_header *head = (struct tpm_header *)buf->data;
- u32 tot_len = be32_to_cpu(head->length);
- off_t offset = TPM_HEADER_SIZE;
- u32 val;
- /* we're starting after the header so adjust the length */
- tot_len -= TPM_HEADER_SIZE;
- /* should have handle plus nonce */
- if (tot_len != 4 + 2 + sizeof(auth->tpm_nonce))
- return -EINVAL;
- auth->handle = tpm_buf_read_u32(buf, &offset);
- val = tpm_buf_read_u16(buf, &offset);
- if (val != sizeof(auth->tpm_nonce))
- return -EINVAL;
- memcpy(auth->tpm_nonce, &buf->data[offset], sizeof(auth->tpm_nonce));
- /* now compute the session key from the nonces */
- tpm2_KDFa(auth->salt, sizeof(auth->salt), "ATH", auth->tpm_nonce,
- auth->our_nonce, sizeof(auth->session_key),
- auth->session_key);
- return 0;
- }
- static int tpm2_load_null(struct tpm_chip *chip, u32 *null_key)
- {
- unsigned int offset = 0; /* dummy offset for null seed context */
- u8 name[SHA256_DIGEST_SIZE + 2];
- u32 tmp_null_key;
- int rc;
- rc = tpm2_load_context(chip, chip->null_key_context, &offset,
- &tmp_null_key);
- if (rc != -EINVAL) {
- if (!rc)
- *null_key = tmp_null_key;
- goto err;
- }
- /* Try to re-create null key, given the integrity failure: */
- rc = tpm2_create_primary(chip, TPM2_RH_NULL, &tmp_null_key, name);
- if (rc)
- goto err;
- /* Return null key if the name has not been changed: */
- if (!memcmp(name, chip->null_key_name, sizeof(name))) {
- *null_key = tmp_null_key;
- return 0;
- }
- /* Deduce from the name change TPM interference: */
- dev_err(&chip->dev, "null key integrity check failed\n");
- tpm2_flush_context(chip, tmp_null_key);
- err:
- if (rc) {
- chip->flags |= TPM_CHIP_FLAG_DISABLE;
- rc = -ENODEV;
- }
- return rc;
- }
- /**
- * tpm2_start_auth_session() - create a HMAC authentication session with the TPM
- * @chip: the TPM chip structure to create the session with
- *
- * This function loads the NULL seed from its saved context and starts
- * an authentication session on the null seed, fills in the
- * @chip->auth structure to contain all the session details necessary
- * for performing the HMAC, encrypt and decrypt operations and
- * returns. The NULL seed is flushed before this function returns.
- *
- * Return: zero on success or actual error encountered.
- */
- int tpm2_start_auth_session(struct tpm_chip *chip)
- {
- struct tpm2_auth *auth;
- struct tpm_buf buf;
- u32 null_key;
- int rc;
- if (chip->auth) {
- dev_warn_once(&chip->dev, "auth session is active\n");
- return 0;
- }
- auth = kzalloc(sizeof(*auth), GFP_KERNEL);
- if (!auth)
- return -ENOMEM;
- rc = tpm2_load_null(chip, &null_key);
- if (rc)
- goto out;
- auth->session = TPM_HEADER_SIZE;
- rc = tpm_buf_init(&buf, TPM2_ST_NO_SESSIONS, TPM2_CC_START_AUTH_SESS);
- if (rc)
- goto out;
- /* salt key handle */
- tpm_buf_append_u32(&buf, null_key);
- /* bind key handle */
- tpm_buf_append_u32(&buf, TPM2_RH_NULL);
- /* nonce caller */
- get_random_bytes(auth->our_nonce, sizeof(auth->our_nonce));
- tpm_buf_append_u16(&buf, sizeof(auth->our_nonce));
- tpm_buf_append(&buf, auth->our_nonce, sizeof(auth->our_nonce));
- /* append encrypted salt and squirrel away unencrypted in auth */
- tpm_buf_append_salt(&buf, chip, auth);
- /* session type (HMAC, audit or policy) */
- tpm_buf_append_u8(&buf, TPM2_SE_HMAC);
- /* symmetric encryption parameters */
- /* symmetric algorithm */
- tpm_buf_append_u16(&buf, TPM_ALG_AES);
- /* bits for symmetric algorithm */
- tpm_buf_append_u16(&buf, AES_KEY_BITS);
- /* symmetric algorithm mode (must be CFB) */
- tpm_buf_append_u16(&buf, TPM_ALG_CFB);
- /* hash algorithm for session */
- tpm_buf_append_u16(&buf, TPM_ALG_SHA256);
- rc = tpm_transmit_cmd(chip, &buf, 0, "start auth session");
- tpm2_flush_context(chip, null_key);
- if (rc == TPM2_RC_SUCCESS)
- rc = tpm2_parse_start_auth_session(auth, &buf);
- tpm_buf_destroy(&buf);
- if (rc == TPM2_RC_SUCCESS) {
- chip->auth = auth;
- return 0;
- }
- out:
- kfree_sensitive(auth);
- return rc;
- }
- EXPORT_SYMBOL(tpm2_start_auth_session);
- /*
- * A mask containing the object attributes for the kernel held null primary key
- * used in HMAC encryption. For more information on specific attributes look up
- * to "8.3 TPMA_OBJECT (Object Attributes)".
- */
- #define TPM2_OA_NULL_KEY ( \
- TPM2_OA_NO_DA | \
- TPM2_OA_FIXED_TPM | \
- TPM2_OA_FIXED_PARENT | \
- TPM2_OA_SENSITIVE_DATA_ORIGIN | \
- TPM2_OA_USER_WITH_AUTH | \
- TPM2_OA_DECRYPT | \
- TPM2_OA_RESTRICTED)
- /**
- * tpm2_parse_create_primary() - parse the data returned from TPM_CC_CREATE_PRIMARY
- *
- * @chip: The TPM the primary was created under
- * @buf: The response buffer from the chip
- * @handle: pointer to be filled in with the return handle of the primary
- * @hierarchy: The hierarchy the primary was created for
- * @name: pointer to be filled in with the primary key name
- *
- * Return:
- * * 0 - OK
- * * -errno - A system error
- * * TPM_RC - A TPM error
- */
- static int tpm2_parse_create_primary(struct tpm_chip *chip, struct tpm_buf *buf,
- u32 *handle, u32 hierarchy, u8 *name)
- {
- struct tpm_header *head = (struct tpm_header *)buf->data;
- off_t offset_r = TPM_HEADER_SIZE, offset_t;
- u16 len = TPM_HEADER_SIZE;
- u32 total_len = be32_to_cpu(head->length);
- u32 val, param_len, keyhandle;
- keyhandle = tpm_buf_read_u32(buf, &offset_r);
- if (handle)
- *handle = keyhandle;
- else
- tpm2_flush_context(chip, keyhandle);
- param_len = tpm_buf_read_u32(buf, &offset_r);
- /*
- * param_len doesn't include the header, but all the other
- * lengths and offsets do, so add it to parm len to make
- * the comparisons easier
- */
- param_len += TPM_HEADER_SIZE;
- if (param_len + 8 > total_len)
- return -EINVAL;
- len = tpm_buf_read_u16(buf, &offset_r);
- offset_t = offset_r;
- if (name) {
- /*
- * now we have the public area, compute the name of
- * the object
- */
- put_unaligned_be16(TPM_ALG_SHA256, name);
- sha256(&buf->data[offset_r], len, name + 2);
- }
- /* validate the public key */
- val = tpm_buf_read_u16(buf, &offset_t);
- /* key type (must be what we asked for) */
- if (val != TPM_ALG_ECC)
- return -EINVAL;
- val = tpm_buf_read_u16(buf, &offset_t);
- /* name algorithm */
- if (val != TPM_ALG_SHA256)
- return -EINVAL;
- val = tpm_buf_read_u32(buf, &offset_t);
- /* object properties */
- if (val != TPM2_OA_NULL_KEY)
- return -EINVAL;
- /* auth policy (empty) */
- val = tpm_buf_read_u16(buf, &offset_t);
- if (val != 0)
- return -EINVAL;
- /* symmetric key parameters */
- val = tpm_buf_read_u16(buf, &offset_t);
- if (val != TPM_ALG_AES)
- return -EINVAL;
- /* symmetric key length */
- val = tpm_buf_read_u16(buf, &offset_t);
- if (val != AES_KEY_BITS)
- return -EINVAL;
- /* symmetric encryption scheme */
- val = tpm_buf_read_u16(buf, &offset_t);
- if (val != TPM_ALG_CFB)
- return -EINVAL;
- /* signing scheme */
- val = tpm_buf_read_u16(buf, &offset_t);
- if (val != TPM_ALG_NULL)
- return -EINVAL;
- /* ECC Curve */
- val = tpm_buf_read_u16(buf, &offset_t);
- if (val != TPM2_ECC_NIST_P256)
- return -EINVAL;
- /* KDF Scheme */
- val = tpm_buf_read_u16(buf, &offset_t);
- if (val != TPM_ALG_NULL)
- return -EINVAL;
- /* extract public key (x and y points) */
- val = tpm_buf_read_u16(buf, &offset_t);
- if (val != EC_PT_SZ)
- return -EINVAL;
- memcpy(chip->null_ec_key_x, &buf->data[offset_t], val);
- offset_t += val;
- val = tpm_buf_read_u16(buf, &offset_t);
- if (val != EC_PT_SZ)
- return -EINVAL;
- memcpy(chip->null_ec_key_y, &buf->data[offset_t], val);
- offset_t += val;
- /* original length of the whole TPM2B */
- offset_r += len;
- /* should have exactly consumed the TPM2B public structure */
- if (offset_t != offset_r)
- return -EINVAL;
- if (offset_r > param_len)
- return -EINVAL;
- /* creation data (skip) */
- len = tpm_buf_read_u16(buf, &offset_r);
- offset_r += len;
- if (offset_r > param_len)
- return -EINVAL;
- /* creation digest (must be sha256) */
- len = tpm_buf_read_u16(buf, &offset_r);
- offset_r += len;
- if (len != SHA256_DIGEST_SIZE || offset_r > param_len)
- return -EINVAL;
- /* TPMT_TK_CREATION follows */
- /* tag, must be TPM_ST_CREATION (0x8021) */
- val = tpm_buf_read_u16(buf, &offset_r);
- if (val != TPM2_ST_CREATION || offset_r > param_len)
- return -EINVAL;
- /* hierarchy */
- val = tpm_buf_read_u32(buf, &offset_r);
- if (val != hierarchy || offset_r > param_len)
- return -EINVAL;
- /* the ticket digest HMAC (might not be sha256) */
- len = tpm_buf_read_u16(buf, &offset_r);
- offset_r += len;
- if (offset_r > param_len)
- return -EINVAL;
- /*
- * finally we have the name, which is a sha256 digest plus a 2
- * byte algorithm type
- */
- len = tpm_buf_read_u16(buf, &offset_r);
- if (offset_r + len != param_len + 8)
- return -EINVAL;
- if (len != SHA256_DIGEST_SIZE + 2)
- return -EINVAL;
- if (memcmp(chip->null_key_name, &buf->data[offset_r],
- SHA256_DIGEST_SIZE + 2) != 0) {
- dev_err(&chip->dev, "NULL Seed name comparison failed\n");
- return -EINVAL;
- }
- return 0;
- }
- /**
- * tpm2_create_primary() - create a primary key using a fixed P-256 template
- *
- * @chip: the TPM chip to create under
- * @hierarchy: The hierarchy handle to create under
- * @handle: The returned volatile handle on success
- * @name: The name of the returned key
- *
- * For platforms that might not have a persistent primary, this can be
- * used to create one quickly on the fly (it uses Elliptic Curve not
- * RSA, so even slow TPMs can create one fast). The template uses the
- * TCG mandated H one for non-endorsement ECC primaries, i.e. P-256
- * elliptic curve (the only current one all TPM2s are required to
- * have) a sha256 name hash and no policy.
- *
- * Return:
- * * 0 - OK
- * * -errno - A system error
- * * TPM_RC - A TPM error
- */
- static int tpm2_create_primary(struct tpm_chip *chip, u32 hierarchy,
- u32 *handle, u8 *name)
- {
- int rc;
- struct tpm_buf buf;
- struct tpm_buf template;
- rc = tpm_buf_init(&buf, TPM2_ST_SESSIONS, TPM2_CC_CREATE_PRIMARY);
- if (rc)
- return rc;
- rc = tpm_buf_init_sized(&template);
- if (rc) {
- tpm_buf_destroy(&buf);
- return rc;
- }
- /*
- * create the template. Note: in order for userspace to
- * verify the security of the system, it will have to create
- * and certify this NULL primary, meaning all the template
- * parameters will have to be identical, so conform exactly to
- * the TCG TPM v2.0 Provisioning Guidance for the SRK ECC
- * key H template (H has zero size unique points)
- */
- /* key type */
- tpm_buf_append_u16(&template, TPM_ALG_ECC);
- /* name algorithm */
- tpm_buf_append_u16(&template, TPM_ALG_SHA256);
- /* object properties */
- tpm_buf_append_u32(&template, TPM2_OA_NULL_KEY);
- /* sauth policy (empty) */
- tpm_buf_append_u16(&template, 0);
- /* BEGIN parameters: key specific; for ECC*/
- /* symmetric algorithm */
- tpm_buf_append_u16(&template, TPM_ALG_AES);
- /* bits for symmetric algorithm */
- tpm_buf_append_u16(&template, AES_KEY_BITS);
- /* algorithm mode (must be CFB) */
- tpm_buf_append_u16(&template, TPM_ALG_CFB);
- /* scheme (NULL means any scheme) */
- tpm_buf_append_u16(&template, TPM_ALG_NULL);
- /* ECC Curve ID */
- tpm_buf_append_u16(&template, TPM2_ECC_NIST_P256);
- /* KDF Scheme */
- tpm_buf_append_u16(&template, TPM_ALG_NULL);
- /* unique: key specific; for ECC it is two zero size points */
- tpm_buf_append_u16(&template, 0);
- tpm_buf_append_u16(&template, 0);
- /* END parameters */
- /* primary handle */
- tpm_buf_append_u32(&buf, hierarchy);
- tpm_buf_append_empty_auth(&buf, TPM2_RS_PW);
- /* sensitive create size is 4 for two empty buffers */
- tpm_buf_append_u16(&buf, 4);
- /* sensitive create auth data (empty) */
- tpm_buf_append_u16(&buf, 0);
- /* sensitive create sensitive data (empty) */
- tpm_buf_append_u16(&buf, 0);
- /* the public template */
- tpm_buf_append(&buf, template.data, template.length);
- tpm_buf_destroy(&template);
- /* outside info (empty) */
- tpm_buf_append_u16(&buf, 0);
- /* creation PCR (none) */
- tpm_buf_append_u32(&buf, 0);
- rc = tpm_transmit_cmd(chip, &buf, 0,
- "attempting to create NULL primary");
- if (rc == TPM2_RC_SUCCESS)
- rc = tpm2_parse_create_primary(chip, &buf, handle, hierarchy,
- name);
- tpm_buf_destroy(&buf);
- return rc;
- }
- static int tpm2_create_null_primary(struct tpm_chip *chip)
- {
- u32 null_key;
- int rc;
- rc = tpm2_create_primary(chip, TPM2_RH_NULL, &null_key,
- chip->null_key_name);
- if (rc == TPM2_RC_SUCCESS) {
- unsigned int offset = 0; /* dummy offset for null key context */
- rc = tpm2_save_context(chip, null_key, chip->null_key_context,
- sizeof(chip->null_key_context), &offset);
- tpm2_flush_context(chip, null_key);
- }
- return rc;
- }
- /**
- * tpm2_sessions_init() - start of day initialization for the sessions code
- * @chip: TPM chip
- *
- * Derive and context save the null primary and allocate memory in the
- * struct tpm_chip for the authorizations.
- *
- * Return:
- * * 0 - OK
- * * -errno - A system error
- * * TPM_RC - A TPM error
- */
- int tpm2_sessions_init(struct tpm_chip *chip)
- {
- int rc;
- rc = tpm2_create_null_primary(chip);
- if (rc) {
- dev_err(&chip->dev, "null key creation failed with %d\n", rc);
- return rc;
- }
- return rc;
- }
- EXPORT_SYMBOL(tpm2_sessions_init);
- #endif /* CONFIG_TCG_TPM2_HMAC */
|