An experimental pure Rust reimplementation of [libyubihsm] providing an interface to [YubiHSM2] devices from [Yubico].
This is a pure-Rust client which supports interfacing with YubiHSM2 devices over an encrypted channel.
It presently reimplements a small subset of the of the functionality of libyubihsm, a closed-source C library which acts as a libcurl-based HTTP(S) client and sends commands to the [yubihsm-connector] process, which implements an HTTP(S) server which sends the commands to the YubiHSM2 hardware device over USB.
Note that this is NOT an official Yubico project and is in no way supported or endorsed by Yubico.
Initial support for creating encrypted channels to a YubiHSM2 via yubihsm-connector is complete, along with authenticating to the YubiHSM2 via a password/authentication key.
The following commands are presently supported:
This crate depends on the aesni
crate, which uses the new "stdsimd" API
(which recently landed in nightly) to invoke hardware AES instructions via
core::arch
.
To access these features, you will need both a relatively recent Rust nightly and to pass the following as RUSTFLAGS:
RUSTFLAGS=-Ctarget-feature=+aes`
You can configure your ~/.cargo/config
to always pass these flags:
toml
[build]
rustflags = ["-Ctarget-feature=+aes"]
If there are additional [YubiHSM2 commands] you would like to use but aren't presently supported, adding them is very easy, and PRs are welcome!
The YubiHSM2 uses a simple, bincode-like message format, which largely consists of fixed-width integers, bytestrings, and bitfields. This crate implements a [Serde-based message parser] which can automatically parse command/response messages used by the HSM derived from a corresponding Rust struct describing their structure.
Here's a list of steps necessary to implement a new command type:
Here is an [example PR that implements Ed25519 signing] you can study to see what the above steps look like in practice.
This crate allows you to run the integration test suite in two different ways: live testing against a real YubiHSM2 device, and simulated testing using a MockHSM service which reimplements some YubiHSM2 functionality in software.
cargo test
: test live against a YubiHSM2 deviceThis mode assumes you have a YubiHSM2 hardware device, have downloaded the [YubiHSM2 SDK] for your platform, and are running a yubihsm-connector process listening on localhost on the default port of 12345.
The YubiHSM2 device should be in the default factory state. To reset it to this state, either use the [yubihsm-shell reset] command or press on the YubiHSM2 for 10 seconds immediately after inserting it.
You can confirm the tests are running live against the YubiHSM2 by the LED blinking rapidly for 1 second.
NOTE THAT THESE TESTS ARE DESTRUCTIVE: DO NOT RUN THEM AGAINST A YUBIHSM2 WHICH CONTAINS KEYS YOU CARE ABOUT
cargo test --features=mockhsm
: simulated tests against a mock HSMThis mode is useful for when you don't have access to physical YubiHSM2 hardware, such as CI environments.
yubihsm.rs is distributed under the terms of both the MIT license and the Apache License (Version 2.0).
See LICENSE-APACHE and LICENSE-MIT for details.