parsec-service 1.5.0

A language-agnostic API to secure services in a platform-agnostic way
Documentation
// Copyright 2021 Contributors to the Parsec project.
// SPDX-License-Identifier: Apache-2.0
use super::{Provider, utils};
use crate::authenticators::ApplicationIdentity;
use crate::key_info_managers::KeyIdentity;
use log::error;
use parsec_interface::operations::{attest_key, prepare_key_attestation};
use parsec_interface::requests::{ResponseStatus, Result};
use parsec_interface::secrecy::zeroize::Zeroizing;
use std::convert::TryFrom;
use tss_esapi::Error;
use tss_esapi::constants::response_code::Tss2ResponseCodeKind;
use tss_esapi::{abstraction::transient::ObjectWrapper, structures::Auth};

impl Provider {
    pub(super) fn prepare_key_attestation_internal(
        &self,
        application_identity: &ApplicationIdentity,
        op: prepare_key_attestation::Operation,
    ) -> Result<prepare_key_attestation::Result> {
        match op {
            prepare_key_attestation::Operation::ActivateCredential {
                attested_key_name,
                attesting_key_name,
            } => self.prepare_activate_credential(
                application_identity,
                attested_key_name,
                attesting_key_name,
            ),
            _ => {
                error!("Key attestation mechanism is not supported");
                Err(ResponseStatus::PsaErrorNotSupported)
            }
        }
    }

    // Get the parameters required for a MakeCredential operation
    //
    // If the `attesting_key_name` is not given, a default, RSA decryption
    // Endorsement Key will be used.
    fn prepare_activate_credential(
        &self,
        application_identity: &ApplicationIdentity,
        attested_key_name: String,
        attesting_key_name: Option<String>,
    ) -> Result<prepare_key_attestation::Result> {
        if attesting_key_name.is_some() {
            error!("Attesting with a non-default key is currently not supported");
            return Err(ResponseStatus::PsaErrorNotSupported);
        }

        let key_identity = KeyIdentity::new(
            application_identity.clone(),
            self.provider_identity.clone(),
            attested_key_name,
        );
        let pass_context = self.get_key_ctx(&key_identity)?;
        let key_attributes = self.key_info_store.get_key_attributes(&key_identity)?;
        let params = utils::parsec_to_tpm_params(key_attributes)?;
        let auth = Some(
            Auth::try_from(pass_context.auth_value().to_vec())
                .map_err(utils::to_response_status)?,
        );
        let attested_key = ObjectWrapper {
            material: pass_context.key_material().clone(),
            auth,
            params,
        };

        let mut esapi_context = self
            .esapi_context
            .lock()
            .expect("ESAPI Context lock poisoned");

        let params = esapi_context
            .get_make_cred_params(attested_key, None)
            .map_err(|e| {
                format_error!("Failed to get MakeCredential parameters", e);
                key_attest_response_status(e)
            })?;

        Ok(prepare_key_attestation::Result::ActivateCredential {
            name: params.name.into(),
            attesting_key_pub: utils::ek_pub_key_to_bytes(params.attesting_key_pub)?.into(),
            public: params.public.into(),
        })
    }

    pub(super) fn attest_key_internal(
        &self,
        application_identity: &ApplicationIdentity,
        op: attest_key::Operation,
    ) -> Result<attest_key::Result> {
        match op {
            attest_key::Operation::ActivateCredential {
                attested_key_name,
                attesting_key_name,
                credential_blob,
                secret,
            } => self.activate_credential(
                application_identity,
                attested_key_name,
                attesting_key_name,
                credential_blob,
                secret,
            ),
            _ => {
                error!("Key attestation mechanism is not supported");
                Err(ResponseStatus::PsaErrorNotSupported)
            }
        }
    }

    fn activate_credential(
        &self,
        application_identity: &ApplicationIdentity,
        attested_key_name: String,
        attesting_key_name: Option<String>,
        credential_blob: Zeroizing<Vec<u8>>,
        secret: Zeroizing<Vec<u8>>,
    ) -> Result<attest_key::Result> {
        if attesting_key_name.is_some() {
            error!("Attesting with a non-default key is currently not supported");
            return Err(ResponseStatus::PsaErrorNotSupported);
        }

        let key_identity = KeyIdentity::new(
            application_identity.clone(),
            self.provider_identity.clone(),
            attested_key_name,
        );
        let pass_context = self.get_key_ctx(&key_identity)?;
        let key_attributes = self.key_info_store.get_key_attributes(&key_identity)?;
        let params = utils::parsec_to_tpm_params(key_attributes)?;
        let auth = Some(
            Auth::try_from(pass_context.auth_value().to_vec())
                .map_err(utils::to_response_status)?,
        );
        let attested_key = ObjectWrapper {
            material: pass_context.key_material().clone(),
            auth,
            params,
        };

        let mut esapi_context = self
            .esapi_context
            .lock()
            .expect("ESAPI Context lock poisoned");

        let credential = esapi_context
            .activate_credential(
                attested_key,
                None,
                credential_blob.to_vec(),
                secret.to_vec(),
            )
            .map_err(|e| {
                format_error!("Failed to activate credential", e);
                key_attest_response_status(e)
            })?;

        Ok(attest_key::Result::ActivateCredential {
            credential: credential.into(),
        })
    }
}

fn key_attest_response_status(error: Error) -> ResponseStatus {
    match error {
        Error::Tss2Error(e) => match e.kind() {
            Some(Tss2ResponseCodeKind::BadAuth) => {
                error!("Wrong authentication value for attesting key");
                ResponseStatus::PsaErrorGenericError
            }
            Some(Tss2ResponseCodeKind::Value) => {
                error!("Wrong parameter value for key attestation");
                ResponseStatus::PsaErrorInvalidArgument
            }
            Some(Tss2ResponseCodeKind::Size) => {
                error!("Wrong parameter size for key attestation");
                ResponseStatus::PsaErrorInvalidArgument
            }
            _ => utils::to_response_status(error),
        },
        _ => utils::to_response_status(error),
    }
}