193 lines
8 KiB
Protocol Buffer
193 lines
8 KiB
Protocol Buffer
//
|
|
// Copyright (C) 2015 The Android Open Source Project
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
//
|
|
|
|
option optimize_for = LITE_RUNTIME;
|
|
|
|
import "common.proto";
|
|
|
|
package attestation;
|
|
|
|
// This message holds all information to be sent to the attestation server in
|
|
// order to complete enrollment.
|
|
message AttestationEnrollmentRequest {
|
|
// The EK cert, in X.509 form, encrypted using the server's public key with
|
|
// the following parameters:
|
|
// Key encryption: RSA-OAEP with no custom parameters.
|
|
// Data encryption: 256-bit key, AES-CBC with PKCS5 padding.
|
|
// MAC: HMAC-SHA-512 using the AES key.
|
|
optional EncryptedData encrypted_endorsement_credential = 1;
|
|
// The AIK public key, in TPM_PUBKEY form.
|
|
optional bytes identity_public_key = 2;
|
|
// PCR0 quoted by AIK.
|
|
optional Quote pcr0_quote = 3;
|
|
// PCR1 quoted by AIK.
|
|
optional Quote pcr1_quote = 4;
|
|
}
|
|
|
|
enum ResponseStatus {
|
|
OK = 0;
|
|
// Internal server error.
|
|
SERVER_ERROR = 1;
|
|
// The server cannot parse the request.
|
|
BAD_REQUEST = 2;
|
|
// The server rejects the request.
|
|
REJECT = 3;
|
|
// Only appears in enrollment response. The server returns the same generated
|
|
// id and reports the quota limit exceeded status when the number of reset
|
|
// action in a specified time window is more than self reset limitation.
|
|
QUOTA_LIMIT_EXCEEDED = 4;
|
|
}
|
|
|
|
// The response from the attestation server for the enrollment request.
|
|
message AttestationEnrollmentResponse {
|
|
optional ResponseStatus status = 1;
|
|
// Detail response message. Included when the result is not OK.
|
|
optional string detail = 2;
|
|
optional EncryptedIdentityCredential encrypted_identity_credential = 3;
|
|
}
|
|
|
|
// The certificate request to be sent to the attestation server.
|
|
message AttestationCertificateRequest {
|
|
// The AIK cert in X.509 format.
|
|
optional bytes identity_credential = 1;
|
|
// A certified public key in TPM_PUBKEY.
|
|
optional bytes certified_public_key = 3;
|
|
// The serialized TPM_CERTIFY_INFO for the certified key.
|
|
optional bytes certified_key_info = 4;
|
|
// The signature of the TPM_CERTIFY_INFO by the AIK.
|
|
optional bytes certified_key_proof = 5;
|
|
// A message identifier to be included in the response.
|
|
optional bytes message_id = 10;
|
|
// The certificate profile defines the type of certificate to issue.
|
|
optional CertificateProfile profile = 11;
|
|
// Information about the origin of the request which may be used depending on
|
|
// the certificate profile.
|
|
optional string origin = 12;
|
|
// The index of a temporal value. This may be used or ignored depending on
|
|
// the certificate profile.
|
|
optional int32 temporal_index = 13;
|
|
}
|
|
|
|
// The response from the attestation server for the certificate request.
|
|
message AttestationCertificateResponse {
|
|
optional ResponseStatus status = 1;
|
|
// Detail response message. Included when the result is not OK.
|
|
optional string detail = 2;
|
|
// The credential of the certified key in X.509 format.
|
|
optional bytes certified_key_credential = 3;
|
|
// The issuer intermediate CA certificate in X.509 format.
|
|
optional bytes intermediate_ca_cert = 5;
|
|
// A message identifier from the request this message is responding to.
|
|
optional bytes message_id = 6;
|
|
// Additional intermediate CA certificates that can help in validation.
|
|
// Certificate chaining order is from the leaf to the root. That is,
|
|
// |certified_key_credential| is signed by
|
|
// |intermediate_ca_cert|, which is signed by
|
|
// |additional_intermediate_ca_cert(0)|, which is signed by
|
|
// |additional_intermediate_ca_cert(1)|, ... and so on.
|
|
repeated bytes additional_intermediate_ca_cert = 7;
|
|
}
|
|
|
|
// The reset request to be sent to the attestation server.
|
|
message AttestationResetRequest {
|
|
// The AIK cert, in X.509 form, encrypted using the server's public key with
|
|
// the following parameters:
|
|
// Key encryption: RSA-OAEP with no custom parameters.
|
|
// Data encryption: 256-bit key, AES-CBC with PKCS5 padding.
|
|
// MAC: HMAC-SHA-512 using the AES key.
|
|
optional EncryptedData encrypted_identity_credential = 1;
|
|
|
|
// The one time token to make sure the reset process can be triggered only once.
|
|
optional bytes token = 2;
|
|
|
|
// The EK cert, in X.509 form, encrypted using the server's public key with
|
|
// the following parameters:
|
|
// Key encryption: RSA-OAEP with no custom parameters.
|
|
// Data encryption: 256-bit key, AES-CBC with PKCS5 padding.
|
|
// MAC: HMAC-SHA-512 using the AES key.
|
|
optional EncryptedData encrypted_endorsement_credential = 3;
|
|
}
|
|
|
|
// The response from the attestation server for the reset request.
|
|
message AttestationResetResponse {
|
|
// The response status.
|
|
optional ResponseStatus status = 1;
|
|
// Detail response message. Included when the result is not OK.
|
|
optional string detail = 2;
|
|
}
|
|
|
|
// The challenge data (as in challenge-response) generated by the server.
|
|
// Before transmitted to the client, this message will be wrapped as a
|
|
// SignedData message, in which the data field is the serialized Challenge
|
|
// message, and the signature field is the signature of the data field signed
|
|
// by the enterprise server using a hard-coded key. The signature algorithm is
|
|
// RSASSA-PKCS1-v1_5-SHA256.
|
|
message Challenge {
|
|
// A string for the client to sanity check a legitimate challenge.
|
|
optional string prefix = 1;
|
|
// A 256-bit random value generated by the server.
|
|
optional bytes nonce = 2;
|
|
// A timestamp for a stateless server to limit the timeframe during which the
|
|
// challenge may be replayed.
|
|
optional int64 timestamp = 3;
|
|
}
|
|
|
|
// The response data (as in challenge-response) generated by the client.
|
|
// Before transmitted to the server, this message will be wrapped as a
|
|
// SignedData message, in which the data field is the serialized
|
|
// ChallengeResponse message, and the signature field is the signature of the
|
|
// data field signed by the client using the key being challenged. The
|
|
// signature algorithm is RSASSA-PKCS1-v1_5-SHA256.
|
|
message ChallengeResponse {
|
|
// The original challenge data.
|
|
optional SignedData challenge = 1;
|
|
// A 256-bit random value generated by the client. Mixing in this nonce
|
|
// prevents a caller from using a challenge to sign arbitrary data.
|
|
optional bytes nonce = 2;
|
|
// The KeyInfo message encrypted using a public encryption key, pushed via
|
|
// policy with the following parameters:
|
|
// Key encryption: RSA-OAEP with no custom parameters.
|
|
// Data encryption: 256-bit key, AES-CBC with PKCS5 padding.
|
|
// MAC: HMAC-SHA-512 using the AES key.
|
|
optional EncryptedData encrypted_key_info = 3;
|
|
}
|
|
|
|
// The data type of the message decrypted from
|
|
// ChallengeResponse.encrypted_key_info.encrypted_data field. This message holds
|
|
// information required by enterprise server to complete the verification.
|
|
message KeyInfo {
|
|
// Indicates whether the key is an EMK or EUK.
|
|
optional KeyProfile key_type = 1;
|
|
// Domain information about the device or user associated with the key. For an
|
|
// EMK, this value is the enrolled domain. For an EUK, this value is the
|
|
// user's email address.
|
|
optional string domain = 2;
|
|
// The virtual device ID associated with the device or user.
|
|
optional bytes device_id = 3;
|
|
// If the key is an EUK, this value is the PCA-issued certificate for the key.
|
|
optional bytes certificate = 4;
|
|
// If the key is an EUK, this value may hold a SignedPublicKeyAndChallenge
|
|
// with a random challenge. The SignedPublicKeyAndChallenge specification is
|
|
// here: https://developer.mozilla.org/en-US/docs/HTML/Element/keygen.
|
|
optional bytes signed_public_key_and_challenge = 5;
|
|
}
|
|
|
|
enum KeyProfile {
|
|
// Enterprise machine key.
|
|
EMK = 0;
|
|
// Enterprise user key.
|
|
EUK = 1;
|
|
}
|