mirror of
git://git.gnupg.org/gnupg.git
synced 2024-12-22 10:19:57 +01:00
1f995b9ba4
* agent/call-tpm2d.c: New. * divert-tpm2.c: New. * agent/Makefile.am: Add new files. * agent/agent.h (DAEMON_TPM2D): New. Add stub fucntions. * agent/call-daemon.c (GNUPG_MODULE_NAME_TPM2DAEMON): New. * agent/command.c (do_one_keyinfo): Handle tpmv2. * agent/gpg-agent.c (oTpm2daemonProgram): New. (opts): New option --tpm2daemon-program. (parse_rereadable_options): Handle option. * agent/pkdecrypt.c (agent_pkdecrypt): Divert to tpm2d. (agent_pksign_do): Ditto. --- A new shadow key type: "tpm2-v1" is introduced signalling that the shadowed key is handled by the tpm2daemon. A function to identify this type is introduced and diversions to the tpm2daemon functions are conditioned on this function for pkign and pkdecrypt where the same diversions to scd are currently done. The (info) field of the shadowed key stores the actual TPM key. The TPM key is encrypted so only the physical TPM it was created on can read it (so no special protection is required for the info filed), but if the (info) field becomes corrupt or damaged, the key will be lost (unlike the token case, where the key is actually moved inside the token). Note, this commit adds handling for existing TPM format shadow keys, but there is still no way to create them. Signed-off-by: James Bottomley <James.Bottomley@HansenPartnership.com> Additional changes: * Add ChangeLog entries. * Some minor indentation fixes. * agent/Makefile.am (gpg_agent_SOURCES): Change to make distcheck work. * agent/agent.h [!HAVE_LIBTSS]: Do not return -EINVAL but an gpg_error_t. Mark args as unused. * agent/protect.c (agent_is_tpm2_key): Free BUF. Signed-off-by: Werner Koch <wk@gnupg.org>
249 lines
5.5 KiB
C
249 lines
5.5 KiB
C
#include <config.h>
|
|
#include <errno.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <ctype.h>
|
|
#include <assert.h>
|
|
#include <unistd.h>
|
|
|
|
#include "agent.h"
|
|
#include <assuan.h>
|
|
#include "../common/strlist.h"
|
|
#include "../common/sexp-parse.h"
|
|
#include "../common/i18n.h"
|
|
|
|
static int
|
|
start_tpm2d (ctrl_t ctrl)
|
|
{
|
|
return daemon_start (DAEMON_TPM2D, ctrl);
|
|
}
|
|
|
|
static int
|
|
unlock_tpm2d (ctrl_t ctrl, gpg_error_t err)
|
|
{
|
|
return daemon_unlock (DAEMON_TPM2D, ctrl, err);
|
|
}
|
|
|
|
static assuan_context_t
|
|
daemon_ctx (ctrl_t ctrl)
|
|
{
|
|
return daemon_type_ctx (DAEMON_TPM2D, ctrl);
|
|
}
|
|
|
|
struct inq_parm_s {
|
|
assuan_context_t ctx;
|
|
gpg_error_t (*getpin_cb)(ctrl_t, const char *, char **);
|
|
ctrl_t ctrl;
|
|
/* The next fields are used by inq_keydata. */
|
|
const unsigned char *keydata;
|
|
size_t keydatalen;
|
|
/* following only used by inq_extra */
|
|
const unsigned char *extra;
|
|
size_t extralen;
|
|
char *pin;
|
|
};
|
|
|
|
static gpg_error_t
|
|
inq_needpin (void *opaque, const char *line)
|
|
{
|
|
struct inq_parm_s *parm = opaque;
|
|
char *pin = NULL;
|
|
gpg_error_t rc;
|
|
const char *s;
|
|
|
|
if ((s = has_leading_keyword (line, "NEEDPIN")))
|
|
{
|
|
rc = parm->getpin_cb (parm->ctrl, s, &pin);
|
|
if (!rc)
|
|
rc = assuan_send_data (parm->ctx, pin, strlen(pin));
|
|
parm->pin = pin;
|
|
}
|
|
else
|
|
{
|
|
log_error ("unsupported inquiry '%s'\n", line);
|
|
rc = gpg_error (GPG_ERR_ASS_UNKNOWN_INQUIRE);
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
static gpg_error_t
|
|
inq_keydata (void *opaque, const char *line)
|
|
{
|
|
struct inq_parm_s *parm = opaque;
|
|
|
|
if (has_leading_keyword (line, "KEYDATA"))
|
|
return assuan_send_data (parm->ctx, parm->keydata, parm->keydatalen);
|
|
else
|
|
return inq_needpin (opaque, line);
|
|
}
|
|
|
|
static gpg_error_t
|
|
inq_extra (void *opaque, const char *line)
|
|
{
|
|
struct inq_parm_s *parm = opaque;
|
|
|
|
if (has_leading_keyword (line, "EXTRA"))
|
|
return assuan_send_data (parm->ctx, parm->extra, parm->extralen);
|
|
else
|
|
return inq_keydata (opaque, line);
|
|
}
|
|
|
|
int
|
|
agent_tpm2d_writekey (ctrl_t ctrl, unsigned char **shadow_info,
|
|
gcry_sexp_t s_skey)
|
|
{
|
|
int rc;
|
|
char line[ASSUAN_LINELENGTH];
|
|
size_t n;
|
|
unsigned char *kbuf;
|
|
membuf_t data;
|
|
struct inq_parm_s inqparm;
|
|
size_t len;
|
|
|
|
rc = start_tpm2d (ctrl);
|
|
if (rc)
|
|
return rc;
|
|
|
|
/* note: returned data is TPM protected so no need for a sensitive context */
|
|
init_membuf(&data, 4096);
|
|
|
|
inqparm.ctx = daemon_ctx (ctrl);
|
|
inqparm.getpin_cb = agent_ask_new_passphrase;
|
|
inqparm.ctrl = ctrl;
|
|
inqparm.pin = NULL;
|
|
|
|
n = gcry_sexp_sprint (s_skey, GCRYSEXP_FMT_CANON, NULL, 0);
|
|
kbuf = xtrymalloc (n);
|
|
gcry_sexp_sprint (s_skey, GCRYSEXP_FMT_CANON, kbuf, n);
|
|
inqparm.keydata = kbuf;
|
|
inqparm.keydatalen = n;
|
|
snprintf(line, sizeof(line), "IMPORT");
|
|
|
|
rc = assuan_transact (daemon_ctx (ctrl), line,
|
|
put_membuf_cb, &data,
|
|
inq_keydata, &inqparm,
|
|
NULL, NULL);
|
|
xfree (kbuf);
|
|
xfree (inqparm.pin);
|
|
if (rc)
|
|
{
|
|
xfree (get_membuf (&data, &len));
|
|
return unlock_tpm2d (ctrl, rc);
|
|
}
|
|
|
|
*shadow_info = get_membuf (&data, &len);
|
|
|
|
return unlock_tpm2d (ctrl, 0);
|
|
}
|
|
|
|
static gpg_error_t
|
|
pin_cb (ctrl_t ctrl, const char *prompt, char **passphrase)
|
|
{
|
|
*passphrase = agent_get_cache (ctrl, ctrl->keygrip, CACHE_MODE_USER);
|
|
if (*passphrase)
|
|
return 0;
|
|
return agent_get_passphrase(ctrl, passphrase,
|
|
_("Please enter your passphrase, so that the "
|
|
"secret key can be unlocked for this session"),
|
|
prompt, NULL, 0,
|
|
ctrl->keygrip, CACHE_MODE_USER, NULL);
|
|
}
|
|
|
|
int
|
|
agent_tpm2d_pksign (ctrl_t ctrl, const unsigned char *digest,
|
|
size_t digestlen, const unsigned char *shadow_info,
|
|
unsigned char **r_sig, size_t *r_siglen)
|
|
{
|
|
int rc;
|
|
char line[ASSUAN_LINELENGTH];
|
|
membuf_t data;
|
|
struct inq_parm_s inqparm;
|
|
|
|
rc = start_tpm2d (ctrl);
|
|
if (rc)
|
|
return rc;
|
|
|
|
init_membuf (&data, 1024);
|
|
|
|
inqparm.ctx = daemon_ctx (ctrl);
|
|
inqparm.getpin_cb = pin_cb;
|
|
inqparm.ctrl = ctrl;
|
|
inqparm.keydata = shadow_info;
|
|
inqparm.keydatalen = gcry_sexp_canon_len (shadow_info, 0, NULL, NULL);
|
|
inqparm.extra = digest;
|
|
inqparm.extralen = digestlen;
|
|
inqparm.pin = NULL;
|
|
|
|
snprintf(line, sizeof(line), "PKSIGN");
|
|
|
|
rc = assuan_transact (daemon_ctx (ctrl), line,
|
|
put_membuf_cb, &data,
|
|
inq_extra, &inqparm,
|
|
NULL, NULL);
|
|
if (!rc)
|
|
agent_put_cache (ctrl, ctrl->keygrip, CACHE_MODE_USER, inqparm.pin, 0);
|
|
|
|
xfree (inqparm.pin);
|
|
|
|
if (rc)
|
|
{
|
|
size_t len;
|
|
xfree (get_membuf (&data, &len));
|
|
return unlock_tpm2d (ctrl, rc);
|
|
}
|
|
|
|
*r_sig = get_membuf (&data, r_siglen);
|
|
|
|
return unlock_tpm2d (ctrl, 0);
|
|
}
|
|
|
|
int
|
|
agent_tpm2d_pkdecrypt (ctrl_t ctrl, const unsigned char *cipher,
|
|
size_t cipherlen, const unsigned char *shadow_info,
|
|
char **r_buf, size_t *r_len)
|
|
{
|
|
int rc;
|
|
char line[ASSUAN_LINELENGTH];
|
|
membuf_t data;
|
|
struct inq_parm_s inqparm;
|
|
|
|
rc = start_tpm2d (ctrl);
|
|
if (rc)
|
|
return rc;
|
|
|
|
init_membuf (&data, 1024);
|
|
|
|
inqparm.ctx = daemon_ctx (ctrl);
|
|
inqparm.getpin_cb = pin_cb;
|
|
inqparm.ctrl = ctrl;
|
|
inqparm.keydata = shadow_info;
|
|
inqparm.keydatalen = gcry_sexp_canon_len (shadow_info, 0, NULL, NULL);
|
|
inqparm.extra = cipher;
|
|
inqparm.extralen = cipherlen;
|
|
inqparm.pin = NULL;
|
|
|
|
snprintf(line, sizeof(line), "PKDECRYPT");
|
|
|
|
rc = assuan_transact (daemon_ctx (ctrl), line,
|
|
put_membuf_cb, &data,
|
|
inq_extra, &inqparm,
|
|
NULL, NULL);
|
|
if (!rc)
|
|
agent_put_cache (ctrl, ctrl->keygrip, CACHE_MODE_USER, inqparm.pin, 0);
|
|
|
|
xfree (inqparm.pin);
|
|
|
|
if (rc)
|
|
{
|
|
size_t len;
|
|
xfree (get_membuf (&data, &len));
|
|
return unlock_tpm2d (ctrl, rc);
|
|
}
|
|
|
|
*r_buf = get_membuf (&data, r_len);
|
|
|
|
return unlock_tpm2d (ctrl, 0);
|
|
}
|