// // Copyright (C) 2014 The Android Open Source Project // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // #ifndef TRUNKS_HMAC_AUTHORIZATION_DELEGATE_H_ #define TRUNKS_HMAC_AUTHORIZATION_DELEGATE_H_ #include <string> #include <base/gtest_prod_util.h> #include <crypto/secure_hash.h> #include <gtest/gtest_prod.h> #include "trunks/authorization_delegate.h" #include "trunks/tpm_generated.h" #include "trunks/trunks_export.h" namespace trunks { const uint8_t kContinueSession = 1; const size_t kAesKeySize = 16; // 128 bits is minimum AES key size. const size_t kHashDigestSize = 32; // 256 bits is SHA256 digest size. // HmacAuthorizationDelegate is an implementation of the AuthorizationDelegate // interface. It provides the necessary Auth data for HMAC sessions. // This delegate also does parameter encryption on sessions that support it. // Usage: // 1) After running the StartAuthSession command on the TPM2.0, we declare this // delegate using the constructor. We can specify if we want parameter // obfuscation enabled or not. // 2) We initialize the session using |InitSession|. We feed in the handle and // tpm_nonce returned by StartAuthSession. Additionally we inject the // caller_nonce, salt and auth_value of the bound entity we fed into // StartAuthSession. // 3) Pass a pointer to this delegate to any TPM command that needs // authorization using this delegate. // Sample control flow: // TrunksProxy proxy; // proxy.Init(); // Tpm tpm(&proxy); // tpm.StartAuthSession(...); // HmacAuthorizationDelegate hmac(); // hmac.InitSession(...); // tpm.Create(..., &hmac); // hmac.set_entity_authorization_value(...); // tpm.Load(..., &hmac); class TRUNKS_EXPORT HmacAuthorizationDelegate: public AuthorizationDelegate { public: HmacAuthorizationDelegate(); ~HmacAuthorizationDelegate() override; // AuthorizationDelegate methods. bool GetCommandAuthorization(const std::string& command_hash, bool is_command_parameter_encryption_possible, bool is_response_parameter_encryption_possible, std::string* authorization) override; bool CheckResponseAuthorization(const std::string& response_hash, const std::string& authorization) override; bool EncryptCommandParameter(std::string* parameter) override; bool DecryptResponseParameter(std::string* parameter) override; // This function is called with the return data of |StartAuthSession|. It // will initialize the session to start providing auth information. It can // only be called once per delegate, and must be called before the delegate // is used for any operation. The boolean arg |enable_parameter_encryption| // specifies if parameter encryption should be enabled for this delegate. // |salt| and |bind_auth_value| specify the injected auth values into this // delegate. bool InitSession(TPM_HANDLE session_handle, const TPM2B_NONCE& tpm_nonce, const TPM2B_NONCE& caller_nonce, const std::string& salt, const std::string& bind_auth_value, bool enable_parameter_encryption); // This method sets the FutureAuthorizationValue. This value is used in // computing the HMAC response of TPM2_HierarchyChangeAuth. void set_future_authorization_value(const std::string& auth_value); std::string future_authorization_value() { return future_authorization_value_; } // This method is used to inject an auth_value associated with an entity. // This auth_value is then used when generating HMACs and encryption keys. // Note: This value will be used for all commands until explicitly reset. void set_entity_authorization_value(const std::string& auth_value) { entity_authorization_value_ = auth_value; } std::string entity_authorization_value() const { return entity_authorization_value_; } TPM_HANDLE session_handle() const { return session_handle_; } void set_use_entity_authorization_for_encryption_only(bool value) { use_entity_authorization_for_encryption_only_ = value; } protected: FRIEND_TEST(HmacAuthorizationDelegateFixture, NonceRegenerationTest); FRIEND_TEST(HmacAuthorizationDelegateTest, EncryptDecryptTest); FRIEND_TEST(HmacAuthorizationDelegateTest, SessionKeyTest); private: // This method implements the key derivation function used in the TPM. // NOTE: It only returns 32 byte keys. std::string CreateKey(const std::string& hmac_key, const std::string& label, const TPM2B_NONCE& nonce_newer, const TPM2B_NONCE& nonce_older); // This method performs a FIPS198 HMAC operation on |data| using |key| std::string HmacSha256(const std::string& key, const std::string& data); // This method performs an AES operation using a 128 bit key. // |operation_type| can be either AES_ENCRYPT or AES_DECRYPT and it // determines if the operation is an encryption or decryption. void AesOperation(std::string* parameter, const TPM2B_NONCE& nonce_newer, const TPM2B_NONCE& nonce_older, int operation_type); // This method regenerates the caller nonce. The new nonce is the same // length as the previous nonce. The buffer is filled with random data using // openssl's |RAND_bytes| function. // NOTE: This operation is DESTRUCTIVE, and rewrites the caller_nonce_ field. void RegenerateCallerNonce(); TPM_HANDLE session_handle_; TPM2B_NONCE caller_nonce_; TPM2B_NONCE tpm_nonce_; bool is_parameter_encryption_enabled_; bool nonce_generated_; std::string session_key_; std::string entity_authorization_value_; bool future_authorization_value_set_; std::string future_authorization_value_; // This boolean flag determines if the entity_authorization_value_ is needed // when computing the hmac_key to create the authorization hmac. Defaults // to false, but policy sessions may set this flag to true. bool use_entity_authorization_for_encryption_only_; DISALLOW_COPY_AND_ASSIGN(HmacAuthorizationDelegate); }; } // namespace trunks #endif // TRUNKS_HMAC_AUTHORIZATION_DELEGATE_H_