esys-verify-signature.int.c 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220
  1. /* SPDX-License-Identifier: BSD-2-Clause */
  2. /*******************************************************************************
  3. * Copyright 2017-2018, Fraunhofer SIT sponsored by Infineon Technologies AG
  4. * All rights reserved.
  5. *******************************************************************************/
  6. #ifdef HAVE_CONFIG_H
  7. #include <config.h>
  8. #endif
  9. #include <stdlib.h>
  10. #include "tss2_esys.h"
  11. #include "tss2_mu.h"
  12. #include "esys_iutil.h"
  13. #define LOGMODULE test
  14. #include "util/log.h"
  15. #include "util/aux_util.h"
  16. /** This test is intended to test the ESYS signing and signature verification.
  17. *
  18. * Tested ESYS commands:
  19. * - Esys_CreatePrimary() (M)
  20. * - Esys_FlushContext() (M)
  21. * - Esys_ReadPublic() (M)
  22. * - Esys_Sign() (M)
  23. * - Esys_VerifySignature() (M)
  24. *
  25. * @param[in,out] esys_context The ESYS_CONTEXT.
  26. * @retval EXIT_FAILURE
  27. * @retval EXIT_SUCCESS
  28. */
  29. int
  30. test_esys_verify_signature(ESYS_CONTEXT * esys_context)
  31. {
  32. TSS2_RC r;
  33. ESYS_TR primaryHandle = ESYS_TR_NONE;
  34. TPM2B_PUBLIC *outPublic = NULL;
  35. TPM2B_CREATION_DATA *creationData = NULL;
  36. TPM2B_DIGEST *creationHash = NULL;
  37. TPMT_TK_CREATION *creationTicket = NULL;
  38. TPM2B_NAME *nameKeySign = NULL;
  39. TPM2B_NAME *keyQualifiedName = NULL;
  40. TPMT_SIGNATURE *signature = NULL;
  41. TPMT_TK_VERIFIED *validation = NULL;
  42. /*
  43. * 1. Create Primary. This primary will be used as signing key.
  44. */
  45. TPM2B_AUTH authValuePrimary = {
  46. .size = 5,
  47. .buffer = {1, 2, 3, 4, 5}
  48. };
  49. TPM2B_SENSITIVE_CREATE inSensitivePrimary = {
  50. .size = 0,
  51. .sensitive = {
  52. .userAuth = authValuePrimary,
  53. .data = {
  54. .size = 0,
  55. .buffer = {0},
  56. },
  57. },
  58. };
  59. TPM2B_PUBLIC inPublic = {
  60. .size = 0,
  61. .publicArea = {
  62. .type = TPM2_ALG_RSA,
  63. .nameAlg = TPM2_ALG_SHA256,
  64. .objectAttributes = (TPMA_OBJECT_USERWITHAUTH |
  65. TPMA_OBJECT_SIGN_ENCRYPT |
  66. TPMA_OBJECT_FIXEDTPM |
  67. TPMA_OBJECT_FIXEDPARENT |
  68. TPMA_OBJECT_SENSITIVEDATAORIGIN),
  69. .authPolicy = {
  70. .size = 0,
  71. },
  72. .parameters.rsaDetail = {
  73. .symmetric = {
  74. .algorithm = TPM2_ALG_NULL,
  75. .keyBits.aes = 128,
  76. .mode.aes = TPM2_ALG_CFB},
  77. .scheme = {
  78. .scheme = TPM2_ALG_RSAPSS,
  79. .details = {
  80. .rsapss = { .hashAlg = TPM2_ALG_SHA256 }
  81. }
  82. },
  83. .keyBits = 2048,
  84. .exponent = 0,
  85. },
  86. .unique.rsa = {
  87. .size = 0,
  88. .buffer = {},
  89. },
  90. },
  91. };
  92. LOG_INFO("\nRSA key will be created.");
  93. TPM2B_DATA outsideInfo = {
  94. .size = 0,
  95. .buffer = {},
  96. };
  97. TPML_PCR_SELECTION creationPCR = {
  98. .count = 0,
  99. };
  100. TPM2B_AUTH authValue = {
  101. .size = 0,
  102. .buffer = {}
  103. };
  104. r = Esys_TR_SetAuth(esys_context, ESYS_TR_RH_OWNER, &authValue);
  105. goto_if_error(r, "Error: TR_SetAuth", error);
  106. r = Esys_CreatePrimary(esys_context, ESYS_TR_RH_OWNER, ESYS_TR_PASSWORD,
  107. ESYS_TR_NONE, ESYS_TR_NONE,
  108. &inSensitivePrimary, &inPublic,
  109. &outsideInfo, &creationPCR, &primaryHandle,
  110. &outPublic, &creationData, &creationHash,
  111. &creationTicket);
  112. goto_if_error(r, "Error esys create primary", error);
  113. Esys_Free(outPublic);
  114. Esys_Free(creationData);
  115. Esys_Free(creationHash);
  116. Esys_Free(creationTicket);
  117. r = Esys_ReadPublic(esys_context,
  118. primaryHandle,
  119. ESYS_TR_NONE,
  120. ESYS_TR_NONE,
  121. ESYS_TR_NONE,
  122. &outPublic,
  123. &nameKeySign,
  124. &keyQualifiedName);
  125. goto_if_error(r, "Error: ReadPublic", error);
  126. TPMT_SIG_SCHEME inScheme = { .scheme = TPM2_ALG_NULL };
  127. TPMT_TK_HASHCHECK hash_validation = {
  128. .tag = TPM2_ST_HASHCHECK,
  129. .hierarchy = TPM2_RH_OWNER,
  130. .digest = {0}
  131. };
  132. /* Digest to be signed. */
  133. TPM2B_DIGEST digest = {
  134. .size = 32,
  135. .buffer = { 1, 2, 3, 4, 5, 6, 7, 8, 9, 10,11, 12, 13, 14, 15, 16, 17,
  136. 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32}
  137. };
  138. /*
  139. * 1. Sign digest and verfiy the signature.
  140. */
  141. r = Esys_Sign(
  142. esys_context,
  143. primaryHandle,
  144. ESYS_TR_PASSWORD,
  145. ESYS_TR_NONE,
  146. ESYS_TR_NONE,
  147. &digest,
  148. &inScheme,
  149. &hash_validation,
  150. &signature);
  151. goto_if_error(r, "Error: Sign", error);
  152. r = Esys_VerifySignature(
  153. esys_context,
  154. primaryHandle,
  155. ESYS_TR_NONE,
  156. ESYS_TR_NONE,
  157. ESYS_TR_NONE,
  158. &digest,
  159. signature,
  160. &validation);
  161. goto_if_error(r, "Error: Sign", error);
  162. r = Esys_FlushContext(esys_context, primaryHandle);
  163. goto_if_error(r, "Error: FlushContext", error);
  164. Esys_Free(outPublic);
  165. Esys_Free(nameKeySign);
  166. Esys_Free(keyQualifiedName);
  167. Esys_Free(signature);
  168. Esys_Free(validation);
  169. return EXIT_SUCCESS;
  170. error:
  171. if (primaryHandle != ESYS_TR_NONE) {
  172. if (Esys_FlushContext(esys_context, primaryHandle) != TSS2_RC_SUCCESS) {
  173. LOG_ERROR("Cleanup primaryHandle failed.");
  174. }
  175. }
  176. Esys_Free(outPublic);
  177. Esys_Free(creationData);
  178. Esys_Free(creationHash);
  179. Esys_Free(nameKeySign);
  180. Esys_Free(keyQualifiedName);
  181. Esys_Free(signature);
  182. Esys_Free(validation);
  183. return EXIT_FAILURE;
  184. }
  185. int
  186. test_invoke_esys(ESYS_CONTEXT * esys_context) {
  187. return test_esys_verify_signature(esys_context);
  188. }