esys-tr-fromTpmPublic-session.int.c 3.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122
  1. /* SPDX-License-Identifier: BSD-2-Clause */
  2. #ifdef HAVE_CONFIG_H
  3. #include <config.h>
  4. #endif
  5. #include <stdlib.h>
  6. #include "tss2_esys.h"
  7. #include "esys_iutil.h"
  8. #define LOGMODULE test
  9. #include "util/log.h"
  10. #include "util/aux_util.h"
  11. /** This tests the ability to create an ESYS_TR object via Esys_TR_FromTPMPublic
  12. * given a TPM2_HANDLE representing a session handle.
  13. *
  14. * Tested ESYS commands:
  15. * - Esys_StartAuthSession() (M)
  16. * - Esys_GetCapability() (M)
  17. * - Esys_FlushContext() (M)
  18. *
  19. * @param[in,out] ectx The ESYS_CONTEXT.
  20. * @retval EXIT_FAILURE
  21. * @retval EXIT_SUCCESS
  22. */
  23. int
  24. test_esys_tr_fromTpmPublic_session(ESYS_CONTEXT * ectx)
  25. {
  26. int rc = EXIT_FAILURE;
  27. ESYS_TR session = ESYS_TR_NONE;
  28. TPMT_SYM_DEF symmetric = {
  29. .algorithm = TPM2_ALG_XOR,
  30. .keyBits = { .exclusiveOr = TPM2_ALG_SHA256 }
  31. };
  32. TPMS_CAPABILITY_DATA *cap_data = NULL;
  33. TSS2_RC r = Esys_StartAuthSession(ectx, ESYS_TR_NONE, ESYS_TR_NONE,
  34. ESYS_TR_NONE, ESYS_TR_NONE, ESYS_TR_NONE,
  35. NULL,
  36. TPM2_SE_HMAC, &symmetric, TPM2_ALG_SHA256,
  37. &session);
  38. goto_if_error(r, "Error: During initialization of session", out);
  39. TPMI_YES_NO more_data;
  40. r = Esys_GetCapability(ectx, ESYS_TR_NONE, ESYS_TR_NONE, ESYS_TR_NONE,
  41. TPM2_CAP_HANDLES,
  42. TPM2_LOADED_SESSION_FIRST,
  43. TPM2_MAX_CAP_HANDLES,
  44. &more_data,
  45. &cap_data);
  46. goto_if_error(r, "Error: getting capability for loaded sessions", out);
  47. if (cap_data->data.handles.count != 1) {
  48. LOG_ERROR("Expected 1 loaded session handle, got: %"PRIu32,
  49. cap_data->data.handles.count);
  50. goto out;
  51. }
  52. TPM2_HANDLE tpm2_handle = cap_data->data.handles.handle[0];
  53. ESYS_TR new_handle = ESYS_TR_NONE;
  54. r = Esys_TR_FromTPMPublic(
  55. ectx,
  56. tpm2_handle,
  57. ESYS_TR_NONE,
  58. ESYS_TR_NONE,
  59. ESYS_TR_NONE,
  60. &new_handle);
  61. goto_if_error(r, "Error: converting TPM2_HANDLE to ESYS_TR object", out);
  62. r = Esys_TRSess_SetAttributes(ectx, new_handle,
  63. TPMA_SESSION_DECRYPT|TPMA_SESSION_ENCRYPT,
  64. 0xFF);
  65. if (r != TSS2_ESYS_RC_BAD_TR) {
  66. LOG_ERROR("Error: Expected GetCapability call to fail with "
  67. "TSS2_ESYS_RC_BAD_TR, got: "TPM2_ERROR_FORMAT,
  68. TPM2_ERROR_TEXT(r));
  69. goto out;
  70. }
  71. free(cap_data);
  72. cap_data = NULL;
  73. r = Esys_GetCapability(ectx, new_handle, ESYS_TR_NONE, ESYS_TR_NONE,
  74. TPM2_CAP_HANDLES,
  75. TPM2_LOADED_SESSION_FIRST,
  76. TPM2_MAX_CAP_HANDLES,
  77. &more_data,
  78. &cap_data);
  79. if (r != TSS2_ESYS_RC_BAD_TR) {
  80. LOG_ERROR("Error: Expected GetCapability call to fail with "
  81. "TSS2_ESYS_RC_BAD_TR, got: "TPM2_ERROR_FORMAT,
  82. TPM2_ERROR_TEXT(r));
  83. goto out;
  84. }
  85. /* ensure you can flush the frompublic session handle */
  86. session = new_handle;
  87. rc = EXIT_SUCCESS;
  88. out:
  89. free(cap_data);
  90. if (session != ESYS_TR_NONE) {
  91. r = Esys_FlushContext(ectx, session);
  92. if (r != TSS2_RC_SUCCESS) {
  93. LOG_ERROR("Error: FlushContext " TPM2_ERROR_FORMAT, TPM2_ERROR_TEXT(r));
  94. rc = EXIT_FAILURE;
  95. }
  96. }
  97. return rc;
  98. }
  99. int
  100. test_invoke_esys(ESYS_CONTEXT * esys_context) {
  101. return test_esys_tr_fromTpmPublic_session(esys_context);
  102. }