summaryrefslogtreecommitdiffstats
path: root/src/tpm2/X509_ECC.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/tpm2/X509_ECC.c')
-rw-r--r--src/tpm2/X509_ECC.c173
1 files changed, 173 insertions, 0 deletions
diff --git a/src/tpm2/X509_ECC.c b/src/tpm2/X509_ECC.c
new file mode 100644
index 0000000..703b9ff
--- /dev/null
+++ b/src/tpm2/X509_ECC.c
@@ -0,0 +1,173 @@
+/********************************************************************************/
+/* */
+/* TPM X509 ECC */
+/* Written by Ken Goldman */
+/* IBM Thomas J. Watson Research Center */
+/* $Id: X509_ECC.c 1658 2021-01-22 23:14:01Z kgoldman $ */
+/* */
+/* Licenses and Notices */
+/* */
+/* 1. Copyright Licenses: */
+/* */
+/* - Trusted Computing Group (TCG) grants to the user of the source code in */
+/* this specification (the "Source Code") a worldwide, irrevocable, */
+/* nonexclusive, royalty free, copyright license to reproduce, create */
+/* derivative works, distribute, display and perform the Source Code and */
+/* derivative works thereof, and to grant others the rights granted herein. */
+/* */
+/* - The TCG grants to the user of the other parts of the specification */
+/* (other than the Source Code) the rights to reproduce, distribute, */
+/* display, and perform the specification solely for the purpose of */
+/* developing products based on such documents. */
+/* */
+/* 2. Source Code Distribution Conditions: */
+/* */
+/* - Redistributions of Source Code must retain the above copyright licenses, */
+/* this list of conditions and the following disclaimers. */
+/* */
+/* - Redistributions in binary form must reproduce the above copyright */
+/* licenses, this list of conditions and the following disclaimers in the */
+/* documentation and/or other materials provided with the distribution. */
+/* */
+/* 3. Disclaimers: */
+/* */
+/* - THE COPYRIGHT LICENSES SET FORTH ABOVE DO NOT REPRESENT ANY FORM OF */
+/* LICENSE OR WAIVER, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, WITH */
+/* RESPECT TO PATENT RIGHTS HELD BY TCG MEMBERS (OR OTHER THIRD PARTIES) */
+/* THAT MAY BE NECESSARY TO IMPLEMENT THIS SPECIFICATION OR OTHERWISE. */
+/* Contact TCG Administration (admin@trustedcomputinggroup.org) for */
+/* information on specification licensing rights available through TCG */
+/* membership agreements. */
+/* */
+/* - THIS SPECIFICATION IS PROVIDED "AS IS" WITH NO EXPRESS OR IMPLIED */
+/* WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY OR */
+/* FITNESS FOR A PARTICULAR PURPOSE, ACCURACY, COMPLETENESS, OR */
+/* NONINFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS, OR ANY WARRANTY */
+/* OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE. */
+/* */
+/* - Without limitation, TCG and its members and licensors disclaim all */
+/* liability, including liability for infringement of any proprietary */
+/* rights, relating to use of information in this specification and to the */
+/* implementation of this specification, and TCG disclaims all liability for */
+/* cost of procurement of substitute goods or services, lost profits, loss */
+/* of use, loss of data or any incidental, consequential, direct, indirect, */
+/* or special damages, whether under contract, tort, warranty or otherwise, */
+/* arising in any way out of use or reliance upon this specification or any */
+/* information herein. */
+/* */
+/* (c) Copyright IBM Corp. and others, 2019 - 2021 */
+/* */
+/********************************************************************************/
+
+/* 10.2.24 X509_ECC.c */
+/* 10.2.24.1 Includes */
+#include "Tpm.h"
+#include "X509.h"
+#include "OIDs.h"
+#include "TpmAsn1_fp.h"
+#include "X509_ECC_fp.h"
+#include "X509_spt_fp.h"
+#include "CryptHash_fp.h"
+
+/* 10.2.24.2 Functions */
+/* 10.2.24.2.1 X509PushPoint() */
+/* This seems like it might be used more than once so... */
+/* Return Value Meaning */
+/* > 0 number of bytes added */
+/* == 0 failure */
+INT16
+X509PushPoint(
+ ASN1MarshalContext *ctx,
+ TPMS_ECC_POINT *p
+ )
+{
+ // Push a bit string containing the public key. For now, push the x, and y
+ // coordinates of the public point, bottom up
+ ASN1StartMarshalContext(ctx); // BIT STRING
+ {
+ ASN1PushBytes(ctx, p->y.t.size, p->y.t.buffer);
+ ASN1PushBytes(ctx, p->x.t.size, p->x.t.buffer);
+ ASN1PushByte(ctx, 0x04);
+ }
+ return ASN1EndEncapsulation(ctx, ASN1_BITSTRING); // Ends BIT STRING
+}
+/* 10.2.24.2.2 X509AddSigningAlgorithmECC() */
+/* This creates the singing algorithm data. */
+/* Return Value Meaning */
+/* > 0 number of bytes added */
+/* == 0 failure */
+INT16
+X509AddSigningAlgorithmECC(
+ OBJECT *signKey,
+ TPMT_SIG_SCHEME *scheme,
+ ASN1MarshalContext *ctx
+ )
+{
+ PHASH_DEF hashDef = CryptGetHashDef(scheme->details.any.hashAlg);
+ //
+ NOT_REFERENCED(signKey);
+ // If the desired hashAlg definition wasn't found...
+ if(hashDef->hashAlg != scheme->details.any.hashAlg)
+ return 0;
+
+ switch(scheme->scheme)
+ {
+#if ALG_ECDSA
+ case TPM_ALG_ECDSA:
+ // Make sure that we have an OID for this hash and ECC
+ if((hashDef->ECDSA)[0] != ASN1_OBJECT_IDENTIFIER)
+ break;
+ // if this is just an implementation check, indicate that this
+ // combination is supported
+ if(!ctx)
+ return 1;
+ ASN1StartMarshalContext(ctx);
+ ASN1PushOID(ctx, hashDef->ECDSA);
+ return ASN1EndEncapsulation(ctx, ASN1_CONSTRUCTED_SEQUENCE);
+#endif // ALG_ECDSA
+ default:
+ break;
+ }
+ return 0;
+}
+/* 10.2.24.2.3 X509AddPublicECC() */
+/* This function will add the publicKey description to the DER data. If ctx is NULL, then no data is
+ transferred and this function will indicate if the TPM has the values for DER-encoding of the
+ public key. */
+/* Return Value Meaning */
+/* > 0 number of bytes added */
+/* == 0 failure */
+INT16
+X509AddPublicECC(
+ OBJECT *object,
+ ASN1MarshalContext *ctx
+ )
+{
+ const BYTE *curveOid =
+ CryptEccGetOID(object->publicArea.parameters.eccDetail.curveID);
+ if((curveOid == NULL) || (*curveOid != ASN1_OBJECT_IDENTIFIER))
+ return 0;
+ //
+ //
+ // SEQUENCE (2 elem) 1st
+ // SEQUENCE (2 elem) 2nd
+ // OBJECT IDENTIFIER 1.2.840.10045.2.1 ecPublicKey (ANSI X9.62 public key type)
+ // OBJECT IDENTIFIER 1.2.840.10045.3.1.7 prime256v1 (ANSI X9.62 named curve)
+ // BIT STRING (520 bit) 000001001010000111010101010111001001101101000100000010...
+ //
+ // If this is a check to see if the key can be encoded, it can.
+ // Need to mark the end sequence
+ if(ctx == NULL)
+ return 1;
+ ASN1StartMarshalContext(ctx); // SEQUENCE (2 elem) 1st
+ {
+ X509PushPoint(ctx, &object->publicArea.unique.ecc); // BIT STRING
+ ASN1StartMarshalContext(ctx); // SEQUENCE (2 elem) 2nd
+ {
+ ASN1PushOID(ctx, curveOid); // curve dependent
+ ASN1PushOID(ctx, OID_ECC_PUBLIC); // (1.2.840.10045.2.1)
+ }
+ ASN1EndEncapsulation(ctx, ASN1_CONSTRUCTED_SEQUENCE); // Ends SEQUENCE 2nd
+ }
+ return ASN1EndEncapsulation(ctx, ASN1_CONSTRUCTED_SEQUENCE); // Ends SEQUENCE 1st
+}