2019-03-28 20:21:16 +00:00
|
|
|
// Copyright 2019 Google Inc.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License"); you may not
|
|
|
|
// use this file except in compliance with the License. You may obtain a copy of
|
|
|
|
// the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
// WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
|
|
// License for the specific language governing permissions and limitations under
|
|
|
|
// the License.
|
2019-03-28 20:29:24 +00:00
|
|
|
|
2019-03-28 20:21:16 +00:00
|
|
|
// +build windows
|
|
|
|
|
|
|
|
package attest
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"encoding/binary"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"syscall"
|
|
|
|
"unsafe"
|
|
|
|
|
|
|
|
"github.com/google/certificate-transparency-go/x509"
|
|
|
|
|
|
|
|
"github.com/google/go-tpm/tpmutil"
|
2019-03-28 21:00:07 +00:00
|
|
|
tpmtbs "github.com/google/go-tpm/tpmutil/tbs"
|
|
|
|
"golang.org/x/sys/windows"
|
2019-03-28 20:21:16 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
pcpProviderName = "Microsoft Platform Crypto Provider"
|
|
|
|
cryptENotFound = 0x80092004 // From winerror.h.
|
|
|
|
|
|
|
|
// The below is documented in this Microsoft whitepaper:
|
|
|
|
// https://github.com/Microsoft/TSS.MSR/blob/master/PCPTool.v11/Using%20the%20Windows%208%20Platform%20Crypto%20Provider%20and%20Associated%20TPM%20Functionality.pdf
|
|
|
|
ncryptOverwriteKeyFlag = 0x80
|
|
|
|
// Key usage value for AIKs.
|
|
|
|
nCryptPropertyPCPKeyUsagePolicyIdentity = 0x8
|
|
|
|
)
|
|
|
|
|
|
|
|
// DLL references.
|
|
|
|
var (
|
|
|
|
nCrypt = windows.MustLoadDLL("ncrypt.dll")
|
|
|
|
nCryptOpenStorageProvider = nCrypt.MustFindProc("NCryptOpenStorageProvider")
|
|
|
|
nCryptFreeObject = nCrypt.MustFindProc("NCryptFreeObject")
|
|
|
|
nCryptGetProperty = nCrypt.MustFindProc("NCryptGetProperty")
|
|
|
|
nCryptSetProperty = nCrypt.MustFindProc("NCryptSetProperty")
|
|
|
|
nCryptOpenKey = nCrypt.MustFindProc("NCryptOpenKey")
|
|
|
|
nCryptCreatePersistedKey = nCrypt.MustFindProc("NCryptCreatePersistedKey")
|
|
|
|
nCryptFinalizeKey = nCrypt.MustFindProc("NCryptFinalizeKey")
|
|
|
|
|
|
|
|
crypt32 = windows.MustLoadDLL("crypt32.dll")
|
|
|
|
crypt32CertEnumCertificatesInStore = crypt32.MustFindProc("CertEnumCertificatesInStore")
|
|
|
|
crypt32CertCloseStore = crypt32.MustFindProc("CertCloseStore")
|
|
|
|
|
|
|
|
tbs = windows.MustLoadDLL("Tbs.dll")
|
|
|
|
tbsGetDeviceInfo = tbs.MustFindProc("Tbsi_GetDeviceInfo")
|
|
|
|
)
|
|
|
|
|
|
|
|
func utf16ToString(buf []byte) (string, error) {
|
|
|
|
b := make([]uint16, len(buf)/2)
|
|
|
|
// LPCSTR (Windows' representation of utf16) is always little endian.
|
|
|
|
if err := binary.Read(bytes.NewReader(buf), binary.LittleEndian, &b); err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
return windows.UTF16ToString(b), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// closeNCryptoObject is a helper to call NCryptFreeObject on a given handle.
|
|
|
|
func closeNCryptObject(hnd uintptr) error {
|
|
|
|
r, _, msg := nCryptFreeObject.Call(hnd)
|
|
|
|
if r != 0 {
|
|
|
|
return fmt.Errorf("NCryptFreeObject returned %X: %v", r, msg)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// getNCryptBufferProperty is a helper to read a byte slice from a NCrypt handle property
|
|
|
|
// using NCryptGetProperty.
|
|
|
|
func getNCryptBufferProperty(hnd uintptr, field string) ([]byte, error) {
|
|
|
|
var size uint32
|
|
|
|
wideField, err := windows.UTF16FromString(field)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
r, _, msg := nCryptGetProperty.Call(hnd, uintptr(unsafe.Pointer(&wideField[0])), 0, 0, uintptr(unsafe.Pointer(&size)), 0)
|
|
|
|
if r != 0 {
|
|
|
|
return nil, fmt.Errorf("NCryptGetProperty returned %d,%X (%v) for key %q on size read", size, r, msg, field)
|
|
|
|
}
|
|
|
|
buff := make([]byte, size)
|
|
|
|
r, _, msg = nCryptGetProperty.Call(hnd, uintptr(unsafe.Pointer(&wideField[0])), uintptr(unsafe.Pointer(&buff[0])), uintptr(size), uintptr(unsafe.Pointer(&size)), 0)
|
|
|
|
if r != 0 {
|
|
|
|
return nil, fmt.Errorf("NCryptGetProperty returned %X (%v) for key %q on data read", r, msg, field)
|
|
|
|
}
|
|
|
|
return buff, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// winPCP represents a reference to the Platform Crypto Provider.
|
|
|
|
type winPCP struct {
|
|
|
|
hProv uintptr
|
|
|
|
}
|
|
|
|
|
|
|
|
// tbsDeviceInfo represents TPM device information from the TBS
|
|
|
|
// API. This structure is identical to _TBS_DEVICE_INFO in tbs.h.
|
|
|
|
type tbsDeviceInfo struct {
|
|
|
|
TBSVersion uint32
|
|
|
|
TPMVersion uint32
|
|
|
|
TPMInterfaceType uint32
|
|
|
|
TPMImplementationRevision uint32
|
|
|
|
}
|
|
|
|
|
|
|
|
// windowsTPMInfo describes the versions of the TPM and OS interface code.
|
|
|
|
type windowsTPMInfo struct {
|
|
|
|
Manufacturer string
|
|
|
|
PCPVersion string
|
|
|
|
TBSInfo tbsDeviceInfo
|
|
|
|
}
|
|
|
|
|
|
|
|
// TPMInfo returns version information about the TPM & OS interface code.
|
|
|
|
func (h *winPCP) TPMInfo() (*windowsTPMInfo, error) {
|
|
|
|
var err error
|
|
|
|
out := &windowsTPMInfo{}
|
|
|
|
|
|
|
|
buf, err := getNCryptBufferProperty(h.hProv, "PCP_PLATFORM_TYPE")
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Failed to read PCP_PLATFORM_TYPE: %v", err)
|
|
|
|
}
|
|
|
|
out.Manufacturer, err = utf16ToString(buf)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
buf, err = getNCryptBufferProperty(h.hProv, "PCP_PROVIDER_VERSION")
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Failed to read PCP_PROVIDER_VERSION: %v", err)
|
|
|
|
}
|
|
|
|
out.PCPVersion, err = utf16ToString(buf)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
r, _, msg := tbsGetDeviceInfo.Call(unsafe.Sizeof(out.TBSInfo), uintptr(unsafe.Pointer(&out.TBSInfo)))
|
|
|
|
if r != 0 {
|
|
|
|
return nil, fmt.Errorf("Failed to call Tbsi_GetDeviceInfo: %v", msg)
|
|
|
|
}
|
|
|
|
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// TPMCommandInterface returns an interface where TPM commands can issued directly.
|
|
|
|
func (h *winPCP) TPMCommandInterface() (io.ReadWriteCloser, error) {
|
|
|
|
var provTBS tpmtbs.Context
|
|
|
|
var sz uint32
|
|
|
|
platformHndField, err := windows.UTF16FromString("PCP_PLATFORMHANDLE")
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
r, _, err := nCryptGetProperty.Call(h.hProv, uintptr(unsafe.Pointer(&platformHndField[0])), uintptr(unsafe.Pointer(&provTBS)), unsafe.Sizeof(provTBS), uintptr(unsafe.Pointer(&sz)), 0)
|
|
|
|
if r != 0 {
|
|
|
|
return nil, fmt.Errorf("NCryptGetProperty for platform handle returned %X (%v)", r, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return tpmutil.FromContext(provTBS), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// TPMKeyHandle returns a transient handle to the given key on the TPM.
|
|
|
|
func (h *winPCP) TPMKeyHandle(hnd uintptr) (tpmutil.Handle, error) {
|
|
|
|
var keyHndTBS tpmutil.Handle
|
|
|
|
var sz uint32
|
|
|
|
platformHndField, err := windows.UTF16FromString("PCP_PLATFORMHANDLE")
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if r, _, err := nCryptGetProperty.Call(hnd, uintptr(unsafe.Pointer(&platformHndField[0])), uintptr(unsafe.Pointer(&keyHndTBS)), unsafe.Sizeof(keyHndTBS), uintptr(unsafe.Pointer(&sz)), 0); r != 0 {
|
|
|
|
return 0, fmt.Errorf("NCryptGetProperty for hKey platform handle returned %X (%v)", r, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return keyHndTBS, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Close releases all resources managed by the Handle.
|
|
|
|
func (h *winPCP) Close() error {
|
|
|
|
return closeNCryptObject(h.hProv)
|
|
|
|
}
|
|
|
|
|
|
|
|
// EKCerts returns the Endorsement Certificates.
|
|
|
|
// Failure to fetch an ECC certificate is not considered
|
|
|
|
// an error as they do not exist on all platforms.
|
|
|
|
func (h *winPCP) EKCerts() ([]*x509.Certificate, error) {
|
|
|
|
c, err := getPCPCerts(h.hProv, "PCP_RSA_EKNVCERT")
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
eccCerts, err := getPCPCerts(h.hProv, "PCP_ECC_EKNVCERT")
|
|
|
|
if err == nil { // ECC certs are not present on all platforms
|
|
|
|
c = append(c, eccCerts...)
|
|
|
|
}
|
|
|
|
|
|
|
|
var out []*x509.Certificate
|
|
|
|
for _, der := range c {
|
|
|
|
cert, err := x509.ParseCertificate(der)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
out = append(out, cert)
|
|
|
|
}
|
|
|
|
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// getPCPCerts is a helper to iterate over a certificates in a cert store,
|
|
|
|
// whose handle was obtained by reading a specific property on a PCP handle.
|
|
|
|
func getPCPCerts(hProv uintptr, propertyName string) ([][]byte, error) {
|
|
|
|
var size, cryptCertHnd uintptr
|
|
|
|
utf16PropName, err := windows.UTF16FromString(propertyName)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
r, _, msg := nCryptGetProperty.Call(hProv, uintptr(unsafe.Pointer(&utf16PropName[0])), uintptr(unsafe.Pointer(&cryptCertHnd)), 8, uintptr(unsafe.Pointer(&size)), 0)
|
|
|
|
if r != 0 {
|
|
|
|
return nil, fmt.Errorf("NCryptGetProperty returned %X, %v", r, msg)
|
|
|
|
}
|
|
|
|
defer crypt32CertCloseStore.Call(uintptr(unsafe.Pointer(cryptCertHnd)), 0)
|
|
|
|
|
|
|
|
var out [][]byte
|
|
|
|
var certContext uintptr
|
|
|
|
for {
|
|
|
|
certContext, _, msg = crypt32CertEnumCertificatesInStore.Call(uintptr(unsafe.Pointer(cryptCertHnd)), certContext)
|
|
|
|
if certContext == 0 && msg != nil {
|
|
|
|
if errno, ok := msg.(syscall.Errno); ok {
|
|
|
|
// cryptENotFound is returned when there are no more certificates to iterate through.
|
|
|
|
if errno == cryptENotFound {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil, msg
|
|
|
|
}
|
|
|
|
cert := (*syscall.CertContext)(unsafe.Pointer(certContext))
|
|
|
|
// Copy the buffer. This was taken straight from the Go source: src/crypto/x509/root_windows.go#L70
|
|
|
|
buf := (*[1 << 20]byte)(unsafe.Pointer(cert.EncodedCert))[:]
|
|
|
|
buf2 := make([]byte, cert.Length)
|
|
|
|
copy(buf2, buf)
|
|
|
|
out = append(out, buf2)
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// MintAIK creates a persistent attestation key of the specified name.
|
|
|
|
func (h *winPCP) MintAIK(name string) (uintptr, error) {
|
|
|
|
var kh uintptr
|
|
|
|
utf16Name, err := windows.UTF16FromString(name)
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
utf16RSA, err := windows.UTF16FromString("RSA")
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a persistent RSA key of the specified name.
|
|
|
|
r, _, msg := nCryptCreatePersistedKey.Call(h.hProv, uintptr(unsafe.Pointer(&kh)), uintptr(unsafe.Pointer(&utf16RSA[0])), uintptr(unsafe.Pointer(&utf16Name[0])), 0, 0)
|
|
|
|
if r != 0 {
|
|
|
|
return 0, fmt.Errorf("NCryptCreatePersistedKey returned %X: %v", r, msg)
|
|
|
|
}
|
|
|
|
// Specify generated key length to be 2048 bits.
|
|
|
|
utf16Length, err := windows.UTF16FromString("Length")
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
var length uint32 = 2048
|
|
|
|
r, _, msg = nCryptSetProperty.Call(kh, uintptr(unsafe.Pointer(&utf16Length[0])), uintptr(unsafe.Pointer(&length)), unsafe.Sizeof(length), 0)
|
|
|
|
if r != 0 {
|
|
|
|
return 0, fmt.Errorf("NCryptSetProperty (Length) returned %X: %v", r, msg)
|
|
|
|
}
|
|
|
|
// Specify the generated key can only be used for identity attestation.
|
|
|
|
utf16KeyPolicy, err := windows.UTF16FromString("PCP_KEY_USAGE_POLICY")
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
var policy uint32 = nCryptPropertyPCPKeyUsagePolicyIdentity
|
|
|
|
r, _, msg = nCryptSetProperty.Call(kh, uintptr(unsafe.Pointer(&utf16KeyPolicy[0])), uintptr(unsafe.Pointer(&policy)), unsafe.Sizeof(policy), 0)
|
|
|
|
if r != 0 {
|
|
|
|
return 0, fmt.Errorf("NCryptSetProperty (PCP KeyUsage Policy) returned %X: %v", r, msg)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Finalize (create) the key.
|
|
|
|
r, _, msg = nCryptFinalizeKey.Call(kh, 0)
|
|
|
|
if r != 0 {
|
|
|
|
return 0, fmt.Errorf("NCryptFinalizeKey returned %X: %v", r, msg)
|
|
|
|
}
|
|
|
|
|
|
|
|
return kh, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type aikProps struct {
|
|
|
|
RawPublic []byte
|
|
|
|
RawCreationData []byte
|
|
|
|
RawAttest []byte
|
|
|
|
RawSignature []byte
|
|
|
|
}
|
|
|
|
|
|
|
|
// AIKProperties returns the binding properties of the given attestation
|
|
|
|
// key. Note that it is only valid to call this function with the same
|
|
|
|
// winPCP handle within which the AIK was created.
|
|
|
|
func (h *winPCP) AIKProperties(kh uintptr) (*aikProps, error) {
|
|
|
|
idBlob, err := getNCryptBufferProperty(kh, "PCP_TPM12_IDBINDING")
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
r := bytes.NewReader(idBlob)
|
|
|
|
var out aikProps
|
|
|
|
|
|
|
|
var publicSize uint16
|
|
|
|
if err := binary.Read(r, binary.BigEndian, &publicSize); err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to decode TPM2B_PUBLIC.size: %v", err)
|
|
|
|
}
|
|
|
|
out.RawPublic = make([]byte, publicSize)
|
|
|
|
if err := binary.Read(r, binary.BigEndian, &out.RawPublic); err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to decode TPM2B_PUBLIC.data: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var creationDataSize uint16
|
|
|
|
if err := binary.Read(r, binary.BigEndian, &creationDataSize); err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to decode TPM2B_CREATION_DATA.size: %v", err)
|
|
|
|
}
|
|
|
|
out.RawCreationData = make([]byte, creationDataSize)
|
|
|
|
if err := binary.Read(r, binary.BigEndian, &out.RawCreationData); err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to decode TPM2B_CREATION_DATA.data: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var attestSize uint16
|
|
|
|
if err := binary.Read(r, binary.BigEndian, &attestSize); err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to decode TPM2B_ATTEST.size: %v", err)
|
|
|
|
}
|
|
|
|
out.RawAttest = make([]byte, attestSize)
|
|
|
|
if err := binary.Read(r, binary.BigEndian, &out.RawAttest); err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to decode TPM2B_ATTEST.data: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// The encoded TPMT_SIGNATURE structure represents the remaining bytes in
|
|
|
|
// the ID binding blob.
|
|
|
|
out.RawSignature = make([]byte, r.Len())
|
|
|
|
if err := binary.Read(r, binary.BigEndian, &out.RawSignature); err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to decode TPMT_SIGNATURE.data: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// LoadKeyByName returns a handle to the persistent PCP key with the specified
|
|
|
|
// name.
|
|
|
|
func (h *winPCP) LoadKeyByName(name string) (uintptr, error) {
|
|
|
|
utf16Name, err := windows.UTF16FromString(name)
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
|
|
|
|
var hKey uintptr
|
|
|
|
r, _, msg := nCryptOpenKey.Call(h.hProv, uintptr(unsafe.Pointer(&hKey)), uintptr(unsafe.Pointer(&utf16Name[0])), 0, 0)
|
|
|
|
if r != 0 {
|
|
|
|
return 0, msg
|
|
|
|
}
|
|
|
|
return hKey, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ActivateCredential performs TPM2_ActivateCredential or TPM_ActivateIdentity.
|
|
|
|
func (h *winPCP) ActivateCredential(hKey uintptr, activationBlob []byte) ([]byte, error) {
|
|
|
|
utf16ActivationStr, err := windows.UTF16FromString("PCP_TPM12_IDACTIVATION")
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
r, _, msg := nCryptSetProperty.Call(hKey, uintptr(unsafe.Pointer(&utf16ActivationStr[0])), uintptr(unsafe.Pointer(&activationBlob[0])), uintptr(len(activationBlob)), 0)
|
|
|
|
if r != 0 {
|
|
|
|
return nil, fmt.Errorf("NCryptSetProperty returned %X (%v) for key activation", r, msg)
|
|
|
|
}
|
|
|
|
|
|
|
|
secretBuff := make([]byte, 256)
|
|
|
|
var size uint32
|
|
|
|
r, _, msg = nCryptGetProperty.Call(hKey, uintptr(unsafe.Pointer(&utf16ActivationStr[0])), uintptr(unsafe.Pointer(&secretBuff[0])), uintptr(len(secretBuff)), uintptr(unsafe.Pointer(&size)), 0)
|
|
|
|
if r != 0 {
|
|
|
|
return nil, fmt.Errorf("NCryptGetProperty returned %X (%v) for key activation", r, msg)
|
|
|
|
}
|
|
|
|
return secretBuff[:size], nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// openPCP initializes a reference to the Microsoft PCP provider.
|
|
|
|
// The Caller is expected to call Close() when they are done.
|
|
|
|
func openPCP() (*winPCP, error) {
|
|
|
|
var err error
|
|
|
|
var h winPCP
|
|
|
|
pname, err := windows.UTF16FromString(pcpProviderName)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
r, _, err := nCryptOpenStorageProvider.Call(uintptr(unsafe.Pointer(&h.hProv)), uintptr(unsafe.Pointer(&pname[0])), 0)
|
|
|
|
if r != 0 { // r is non-zero on error, err is always populated in this case.
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return &h, nil
|
|
|
|
}
|