esys-policy-authorize-nv-opt.int.c 7.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239
  1. /* SPDX-License-Identifier: BSD-2-Clause */
  2. /*******************************************************************************
  3. * Copyright 2017-2018, Fraunhofer SIT sponsored by Infineon Technologies AG
  4. * All rights reserved.
  5. *******************************************************************************/
  6. #ifdef HAVE_CONFIG_H
  7. #include <config.h>
  8. #endif
  9. #include <stdlib.h>
  10. #include "tss2_esys.h"
  11. #include "tss2_mu.h"
  12. #include "esys_iutil.h"
  13. #include "test-esys.h"
  14. #define LOGMODULE test
  15. #include "util/log.h"
  16. #include "util/aux_util.h"
  17. #define FLUSH true
  18. #define NOT_FLUSH false
  19. /*
  20. * Function to compare policy digest with expected digest.
  21. * The digest is computed with Esys_PolicyGetDigest.
  22. */
  23. bool
  24. cmp_policy_digest(ESYS_CONTEXT * esys_context,
  25. ESYS_TR * session,
  26. TPM2B_DIGEST * expected_digest,
  27. char *comment, bool flush_session)
  28. {
  29. TSS2_RC r;
  30. TPM2B_DIGEST *policyDigest;
  31. r = Esys_PolicyGetDigest(esys_context,
  32. *session,
  33. ESYS_TR_NONE,
  34. ESYS_TR_NONE, ESYS_TR_NONE, &policyDigest);
  35. goto_if_error(r, "Error: PolicyGetDigest", error);
  36. LOGBLOB_DEBUG(&policyDigest->buffer[0], policyDigest->size,
  37. "POLICY DIGEST");
  38. if (policyDigest->size != 32
  39. || memcmp(&policyDigest->buffer[0], &expected_digest->buffer[0],
  40. policyDigest->size)) {
  41. free(policyDigest);
  42. LOG_ERROR("Error: Policy%s digest did not match expected policy.",
  43. comment);
  44. return false;
  45. }
  46. free(policyDigest);
  47. if (flush_session) {
  48. r = Esys_FlushContext(esys_context, *session);
  49. goto_if_error(r, "Error: PolicyGetDigest", error);
  50. *session = ESYS_TR_NONE;
  51. }
  52. return true;
  53. error:
  54. return false;
  55. }
  56. /** This test is intended to test the ESYS policy commands, not tested
  57. * in other test cases.
  58. * When possoble the commands are tested with a
  59. * trial session and the policy digest is compared with the expected digest.
  60. *
  61. * Tested ESYS commands:
  62. * - Esys_FlushContext() (M)
  63. * - Esys_NV_DefineSpace() (M)
  64. * - Esys_PolicyAuthorizeNV() (F)
  65. * - Esys_PolicyNV() (M)
  66. *
  67. * @param[in,out] esys_context The ESYS_CONTEXT.
  68. * @retval EXIT_FAILURE
  69. * @retval EXIT_SKIP
  70. * @retval EXIT_SUCCESS
  71. */
  72. int
  73. test_esys_policy_authorize_nv_opt(ESYS_CONTEXT * esys_context)
  74. {
  75. TSS2_RC r;
  76. int failure_return = EXIT_FAILURE;
  77. ESYS_TR nvHandle = ESYS_TR_NONE;
  78. /* Dummy parameters for trial sessoin */
  79. ESYS_TR sessionTrial = ESYS_TR_NONE;
  80. TPMT_SYM_DEF symmetricTrial = {.algorithm = TPM2_ALG_AES,
  81. .keyBits = {.aes = 128},
  82. .mode = {.aes = TPM2_ALG_CFB}
  83. };
  84. TPM2B_NONCE nonceCallerTrial = {
  85. .size = 32,
  86. .buffer = { 1, 2, 3, 4, 5, 6, 7, 8, 9, 10,11, 12, 13, 14, 15, 16, 17,
  87. 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32}
  88. };
  89. /* Create valid NV handle */
  90. TPM2B_AUTH auth = {.size = 20,
  91. .buffer = {10, 11, 12, 13, 14, 15, 16, 17, 18, 19,
  92. 20, 21, 22, 23, 24, 25, 26, 27, 28, 29}
  93. };
  94. TPM2B_NV_PUBLIC publicInfo = {
  95. .size = 0,
  96. .nvPublic = {
  97. .nvIndex = TPM2_NV_INDEX_FIRST,
  98. .nameAlg = TPM2_ALG_SHA256,
  99. .attributes = (TPMA_NV_OWNERWRITE |
  100. TPMA_NV_AUTHWRITE |
  101. TPMA_NV_WRITE_STCLEAR |
  102. TPMA_NV_READ_STCLEAR |
  103. TPMA_NV_AUTHREAD | TPMA_NV_OWNERREAD),
  104. .authPolicy = {
  105. .size = 0,
  106. .buffer = {}
  107. ,
  108. }
  109. ,
  110. .dataSize = 32,
  111. }
  112. };
  113. r = Esys_NV_DefineSpace(esys_context,
  114. ESYS_TR_RH_OWNER,
  115. ESYS_TR_PASSWORD,
  116. ESYS_TR_NONE,
  117. ESYS_TR_NONE, &auth, &publicInfo, &nvHandle);
  118. goto_if_error(r, "Error esys define nv space", error);
  119. /*
  120. * Test PolicyNV
  121. */
  122. r = Esys_StartAuthSession(esys_context, ESYS_TR_NONE, ESYS_TR_NONE,
  123. ESYS_TR_NONE, ESYS_TR_NONE, ESYS_TR_NONE,
  124. &nonceCallerTrial,
  125. TPM2_SE_TRIAL, &symmetricTrial, TPM2_ALG_SHA256,
  126. &sessionTrial);
  127. goto_if_error(r, "Error: During initialization of policy trial session",
  128. error);
  129. UINT16 offset = 0;
  130. TPM2_EO operation = TPM2_EO_EQ;
  131. TPM2B_OPERAND operandB = {
  132. .size = 8,
  133. .buffer = {0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x08, 0x09}
  134. };
  135. r = Esys_PolicyNV(esys_context,
  136. ESYS_TR_RH_OWNER,
  137. nvHandle,
  138. sessionTrial,
  139. ESYS_TR_PASSWORD,
  140. ESYS_TR_NONE, ESYS_TR_NONE, &operandB, offset, operation);
  141. goto_if_error(r, "Error: PolicyNV", error);
  142. TPM2B_DIGEST expectedPolicyNV = {
  143. .size = 32,
  144. .buffer = { 0xe3, 0x60, 0x27, 0x10, 0xe7, 0x58, 0x18, 0xc5, 0x96, 0xed, 0xf4,
  145. 0x32, 0x6a, 0x84, 0x06, 0x65, 0x85, 0x8e, 0x67, 0x8b, 0x0c, 0xb7,
  146. 0x0f, 0x60, 0x85, 0xc9, 0xa6, 0xc5, 0xb1, 0x4e, 0x22, 0x45 }
  147. };
  148. if (!cmp_policy_digest(esys_context, &sessionTrial, &expectedPolicyNV,
  149. "NV", NOT_FLUSH))
  150. goto error;
  151. /*
  152. * Test PolicyAuthorizeNV
  153. */
  154. r = Esys_PolicyAuthorizeNV(esys_context,
  155. ESYS_TR_RH_OWNER,
  156. nvHandle,
  157. sessionTrial,
  158. ESYS_TR_PASSWORD,
  159. ESYS_TR_NONE, ESYS_TR_NONE);
  160. if ((r == TPM2_RC_COMMAND_CODE) ||
  161. (r == (TPM2_RC_COMMAND_CODE | TSS2_RESMGR_RC_LAYER)) ||
  162. (r == (TPM2_RC_COMMAND_CODE | TSS2_RESMGR_TPM_RC_LAYER))) {
  163. LOG_WARNING("Command TPM2_PolicyAuthorizeNV not supported by TPM.");
  164. failure_return = EXIT_SKIP;
  165. goto error;
  166. } else {
  167. goto_if_error(r, "Error: PolicyAuthorizeNV", error);
  168. }
  169. /*
  170. * Space not needed for further tests.
  171. */
  172. r = Esys_NV_UndefineSpace(esys_context,
  173. ESYS_TR_RH_OWNER,
  174. nvHandle,
  175. ESYS_TR_PASSWORD,
  176. ESYS_TR_NONE,
  177. ESYS_TR_NONE
  178. );
  179. goto_if_error(r, "Error: NV_UndefineSpace", error);
  180. nvHandle = ESYS_TR_NONE;
  181. r = Esys_FlushContext(esys_context, sessionTrial);
  182. goto_if_error(r, "Error: FlushContext", error);
  183. sessionTrial = ESYS_TR_NONE;
  184. return EXIT_SUCCESS;
  185. error:
  186. if (sessionTrial != ESYS_TR_NONE) {
  187. if (Esys_FlushContext(esys_context, sessionTrial) != TSS2_RC_SUCCESS) {
  188. LOG_ERROR("Cleanup sessionTrial failed.");
  189. }
  190. }
  191. if (nvHandle != ESYS_TR_NONE) {
  192. if (Esys_NV_UndefineSpace(esys_context,
  193. ESYS_TR_RH_OWNER,
  194. nvHandle,
  195. ESYS_TR_PASSWORD,
  196. ESYS_TR_NONE,
  197. ESYS_TR_NONE) != TSS2_RC_SUCCESS) {
  198. LOG_ERROR("Cleanup nvHandle failed.");
  199. }
  200. }
  201. return failure_return;
  202. }
  203. int
  204. test_invoke_esys(ESYS_CONTEXT * esys_context) {
  205. return test_esys_policy_authorize_nv_opt(esys_context);
  206. }