blob: fef4b664759e2381d6c5ac6f0d0816be6017d463 [file] [log] [blame]
// This file was extracted from the TCG Published
// Trusted Platform Module Library
// Part 3: Commands
// Family "2.0"
// Level 00 Revision 01.16
// October 30, 2014
#include "InternalRoutines.h"
#include "Import_fp.h"
#include "Object_spt_fp.h"
//
//
// Error Returns Meaning
//
// TPM_RC_ASYMMETRIC non-duplicable storage key represented by objectPublic and its
// parent referenced by parentHandle have different public parameters
// TPM_RC_ATTRIBUTES attributes FixedTPM and fixedParent of objectPublic are not both
// CLEAR; or inSymSeed is nonempty and parentHandle does not
// reference a decryption key; or objectPublic and parentHandle have
// incompatible or inconsistent attributes; or encrytpedDuplication is
// SET in objectPublic but the inner or outer wrapper is missing.
//
// NOTE: if the TPM provides parameter values, the parameter number will indicate symmetricKey (missing
// inner wrapper) or inSymSeed (missing outer wrapper).
//
//
// TPM_RC_BINDING duplicate and objectPublic are not cryptographically
// bound
//
// TPM_RC_ECC_POINT inSymSeed is nonempty and ECC point in inSymSeed is not on the
// curve
// TPM_RC_HASH non-duplicable storage key represented by objectPublic and its
// parent referenced by parentHandle have different name algorithm
// TPM_RC_INSUFFICIENT inSymSeed is nonempty and failed to retrieve ECC point from the
// secret; or unmarshaling sensitive value from duplicate failed the
// result of inSymSeed decryption
// TPM_RC_INTEGRITY duplicate integrity is broken
// TPM_RC_KDF objectPublic representing decrypting keyed hash object specifies
// invalid KDF
// TPM_RC_KEY inconsistent parameters of objectPublic; or inSymSeed is nonempty
// and parentHandle does not reference a key of supported type; or
// invalid key size in objectPublic representing an asymmetric key
// TPM_RC_NO_RESULT inSymSeed is nonempty and multiplication resulted in ECC point at
// infinity
// TPM_RC_OBJECT_MEMORY no available object slot
// TPM_RC_SCHEME inconsistent attributes decrypt, sign, restricted and key's scheme ID
// in objectPublic; or hash algorithm is inconsistent with the scheme ID
// for keyed hash object
// TPM_RC_SIZE authPolicy size does not match digest size of the name algorithm in
// objectPublic; or symmetricAlg and encryptionKey have different
// sizes; or inSymSeed is nonempty and it size is not consistent with the
// type of parentHandle; or unmarshaling sensitive value from duplicate
// failed
// TPM_RC_SYMMETRIC objectPublic is either a storage key with no symmetric algorithm or a
// non-storage key with symmetric algorithm different from
// TPM_ALG_NULL
// TPM_RC_TYPE unsupported type of objectPublic; or non-duplicable storage key
// represented by objectPublic and its parent referenced by
// parentHandle are of different types; or parentHandle is not a storage
// key; or only the public portion of parentHandle is loaded; or
// objectPublic and duplicate are of different types
// TPM_RC_VALUE nonempty inSymSeed and its numeric value is greater than the
// modulus of the key referenced by parentHandle or inSymSeed is
// larger than the size of the digest produced by the name algorithm of
// the symmetric key referenced by parentHandle
//
TPM_RC
TPM2_Import(
Import_In *in, // IN: input parameter list
Import_Out *out // OUT: output parameter list
)
{
TPM_RC result = TPM_RC_SUCCESS;
OBJECT *parentObject;
TPM2B_DATA data; // symmetric key
TPMT_SENSITIVE sensitive;
TPM2B_NAME name;
UINT16 innerKeySize = 0; // encrypt key size for inner
// wrapper
// Input Validation
// FixedTPM and fixedParent must be CLEAR
if( in->objectPublic.t.publicArea.objectAttributes.fixedTPM == SET
|| in->objectPublic.t.publicArea.objectAttributes.fixedParent == SET)
return TPM_RC_ATTRIBUTES + RC_Import_objectPublic;
// Get parent pointer
parentObject = ObjectGet(in->parentHandle);
if(!AreAttributesForParent(parentObject))
return TPM_RC_TYPE + RC_Import_parentHandle;
if(in->symmetricAlg.algorithm != TPM_ALG_NULL)
{
// Get inner wrap key size
innerKeySize = in->symmetricAlg.keyBits.sym;
// Input symmetric key must match the size of algorithm.
if(in->encryptionKey.t.size != (innerKeySize + 7) / 8)
return TPM_RC_SIZE + RC_Import_encryptionKey;
}
else
{
// If input symmetric algorithm is NULL, input symmetric key size must
// be 0 as well
if(in->encryptionKey.t.size != 0)
return TPM_RC_SIZE + RC_Import_encryptionKey;
// If encryptedDuplication is SET, then the object must have an inner
// wrapper
if(in->objectPublic.t.publicArea.objectAttributes.encryptedDuplication)
return TPM_RC_ATTRIBUTES + RC_Import_encryptionKey;
}
// See if there is an outer wrapper
if(in->inSymSeed.t.size != 0)
{
// Decrypt input secret data via asymmetric decryption. TPM_RC_ATTRIBUTES,
// TPM_RC_ECC_POINT, TPM_RC_INSUFFICIENT, TPM_RC_KEY, TPM_RC_NO_RESULT,
// TPM_RC_SIZE, TPM_RC_VALUE may be returned at this point
result = CryptSecretDecrypt(in->parentHandle, NULL, "DUPLICATE",
&in->inSymSeed, &data);
pAssert(result != TPM_RC_BINDING);
//
if(result != TPM_RC_SUCCESS)
return RcSafeAddToResult(result, RC_Import_inSymSeed);
}
else
{
// If encrytpedDuplication is set, then the object must have an outer
// wrapper
if(in->objectPublic.t.publicArea.objectAttributes.encryptedDuplication)
return TPM_RC_ATTRIBUTES + RC_Import_inSymSeed;
data.t.size = 0;
}
// Compute name of object
ObjectComputeName(&(in->objectPublic.t.publicArea), &name);
// Retrieve sensitive from private.
// TPM_RC_INSUFFICIENT, TPM_RC_INTEGRITY, TPM_RC_SIZE may be returned here.
result = DuplicateToSensitive(&in->duplicate, &name, in->parentHandle,
in->objectPublic.t.publicArea.nameAlg,
(TPM2B_SEED *) &data, &in->symmetricAlg,
&in->encryptionKey, &sensitive);
if(result != TPM_RC_SUCCESS)
return RcSafeAddToResult(result, RC_Import_duplicate);
// If the parent of this object has fixedTPM SET, then fully validate this
// object so that validation can be skipped when it is loaded
if(parentObject->publicArea.objectAttributes.fixedTPM == SET)
{
TPM_HANDLE objectHandle;
// Perform self check on input public area. A TPM_RC_SIZE, TPM_RC_SCHEME,
// TPM_RC_VALUE, TPM_RC_SYMMETRIC, TPM_RC_TYPE, TPM_RC_HASH,
// TPM_RC_ASYMMETRIC, TPM_RC_ATTRIBUTES or TPM_RC_KDF error may be returned
// at this point
result = PublicAttributesValidation(TRUE, in->parentHandle,
&in->objectPublic.t.publicArea);
if(result != TPM_RC_SUCCESS)
return RcSafeAddToResult(result, RC_Import_objectPublic);
// Create internal object. A TPM_RC_KEY_SIZE, TPM_RC_KEY or
// TPM_RC_OBJECT_MEMORY error may be returned at this point
result = ObjectLoad(TPM_RH_NULL, &in->objectPublic.t.publicArea,
&sensitive, NULL, in->parentHandle, FALSE,
&objectHandle);
if(result != TPM_RC_SUCCESS)
return result;
// Don't need the object, just needed the checks to be performed so
// flush the object
ObjectFlush(objectHandle);
}
// Command output
// Prepare output private data from sensitive
SensitiveToPrivate(&sensitive, &name, in->parentHandle,
in->objectPublic.t.publicArea.nameAlg,
&out->outPrivate);
return TPM_RC_SUCCESS;
}