sys-policy-template.int.c 9.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246
  1. /* SPDX-License-Identifier: BSD-2-Clause */
  2. /***********************************************************************
  3. * Copyright (c) 2017-2018, Intel Corporation
  4. *
  5. * All rights reserved.
  6. ***********************************************************************/
  7. #ifdef HAVE_CONFIG_H
  8. #include <config.h>
  9. #endif
  10. #include <inttypes.h>
  11. #include <stdio.h>
  12. #include <stdlib.h>
  13. #include <string.h>
  14. #include "tss2_mu.h"
  15. #include "tss2_sys.h"
  16. #define LOGMODULE test
  17. #include "util/log.h"
  18. #include "test.h"
  19. #include "sys-util.h"
  20. int
  21. test_invoke (TSS2_SYS_CONTEXT *sys_context)
  22. {
  23. TSS2_RC rc;
  24. TPM2B_SENSITIVE_CREATE in_sensitive = { 0 };
  25. TPM2B_PUBLIC in_public = { 0 };
  26. TPM2B_DATA outside_info = { 0 };
  27. TPML_PCR_SELECTION creation_pcr = { 0 };
  28. TPM2B_PUBLIC out_public = { 0 };
  29. TPM2B_CREATION_DATA creation_data = { 0 };
  30. TPM2B_DIGEST creation_hash = TPM2B_DIGEST_INIT;
  31. TPMT_TK_CREATION creation_ticket = { 0 };
  32. TPM2B_NAME name = TPM2B_NAME_INIT;
  33. TPM2B_NONCE nonce_caller = {
  34. .size = TPM2_SHA256_DIGEST_SIZE,
  35. .buffer = { 0 }
  36. };
  37. TPM2B_NONCE nonce_tpm = {
  38. .size = TPM2_SHA256_DIGEST_SIZE,
  39. .buffer = { 0 }
  40. };
  41. TPM2B_ENCRYPTED_SECRET encrypted_salt = { 0 };
  42. TPMI_SH_AUTH_SESSION session_handle = 0;
  43. TPMT_SYM_DEF symmetric = { .algorithm = TPM2_ALG_NULL };
  44. TPM2B_DIGEST templ_dgst = { 0 };
  45. TPM2_HANDLE object_handle = 0;
  46. TSS2L_SYS_AUTH_COMMAND cmd_auth = { 0 };
  47. TSS2L_SYS_AUTH_RESPONSE rsp_auth = { 0 };
  48. TPM2B_DIGEST policy_digest;
  49. size_t template_size = 0;
  50. uint8_t tmp_buff[sizeof(in_public)] = { 0 };
  51. static uint8_t auth[32];
  52. memset(auth, 's', 32);
  53. LOG_INFO("StartAuthSession for TPM2_SE_POLICY (policy session)");
  54. rc = Tss2_Sys_StartAuthSession (sys_context,
  55. TPM2_RH_NULL, /* tpmKey */
  56. TPM2_RH_NULL, /* bind */
  57. NULL, /* cmdAuthsArray */
  58. &nonce_caller, /* nonceCaller */
  59. &encrypted_salt, /* encryptedSalt */
  60. TPM2_SE_POLICY, /* sessionType */
  61. &symmetric, /* symmetric */
  62. TPM2_ALG_SHA256, /* authHash */
  63. &session_handle, /* sessionHandle */
  64. &nonce_tpm, /* nonceTPM */
  65. NULL /* rspAuthsArray */
  66. );
  67. if (rc != TSS2_RC_SUCCESS) {
  68. LOG_ERROR("Tss2_Sys_StartAuthSession failed: 0x%" PRIx32, rc);
  69. exit(1);
  70. }
  71. LOG_INFO("StartAuthSession for TPM2_SE_POLICY success! Session handle: "
  72. "0x%" PRIx32, session_handle);
  73. in_public.publicArea.type = TPM2_ALG_RSA;
  74. in_public.publicArea.nameAlg = TPM2_ALG_SHA256;
  75. in_public.publicArea.objectAttributes = TPMA_OBJECT_RESTRICTED;
  76. in_public.publicArea.objectAttributes |= TPMA_OBJECT_USERWITHAUTH;
  77. in_public.publicArea.objectAttributes |= TPMA_OBJECT_DECRYPT;
  78. in_public.publicArea.objectAttributes |= TPMA_OBJECT_FIXEDTPM;
  79. in_public.publicArea.objectAttributes |= TPMA_OBJECT_FIXEDPARENT;
  80. in_public.publicArea.objectAttributes |= TPMA_OBJECT_SENSITIVEDATAORIGIN;
  81. in_public.publicArea.parameters.rsaDetail.symmetric.algorithm = TPM2_ALG_AES;
  82. in_public.publicArea.parameters.rsaDetail.symmetric.keyBits.aes = 128;
  83. in_public.publicArea.parameters.rsaDetail.symmetric.mode.aes = TPM2_ALG_CFB;
  84. in_public.publicArea.parameters.rsaDetail.scheme.scheme = TPM2_ALG_NULL;
  85. in_public.publicArea.parameters.rsaDetail.keyBits = 2048;
  86. in_public.publicArea.authPolicy.size = sizeof(auth);
  87. memcpy(in_public.publicArea.authPolicy.buffer, auth, sizeof(auth));
  88. cmd_auth.auths[0].sessionHandle = session_handle;
  89. cmd_auth.auths[0].sessionAttributes |= TPMA_SESSION_CONTINUESESSION;
  90. cmd_auth.auths[0].hmac.size = sizeof(auth);
  91. memcpy(cmd_auth.auths[0].hmac.buffer, auth, sizeof(auth));
  92. /* Calculate the digest of the public param template */
  93. rc = Tss2_MU_TPM2B_PUBLIC_Marshal(&in_public, tmp_buff,
  94. sizeof(in_public), &template_size);
  95. if (rc != TSS2_RC_SUCCESS) {
  96. LOG_ERROR("Marshal in_public failed");
  97. exit(1);
  98. }
  99. LOG_INFO("Calculating template digest size of in_public: %d", (int)template_size - 2);
  100. rc = hash(in_public.publicArea.nameAlg, tmp_buff + 2,
  101. template_size - 2, &templ_dgst);
  102. if (rc != TSS2_RC_SUCCESS) {
  103. LOG_ERROR("Failed calculating template hash");
  104. exit(1);
  105. }
  106. LOGBLOB_DEBUG(tmp_buff + 2, template_size - 2, "%s", "in_public:");
  107. LOGBLOB_DEBUG(templ_dgst.buffer, templ_dgst.size, "%s", "template digest:");
  108. /* Set the template digest on the session.
  109. * After that all objects created for this session will be limited
  110. * to this particular template
  111. */
  112. LOG_INFO("Calling Tss2_Sys_PolicyTemplate");
  113. rc = Tss2_Sys_PolicyTemplate (sys_context,
  114. session_handle,
  115. NULL,
  116. &templ_dgst,
  117. NULL);
  118. if (rc != TSS2_RC_SUCCESS) {
  119. LOG_ERROR("Tss2_Sys_PolicyTemplate failed: 0x%" PRIx32, rc);
  120. exit(1);
  121. }
  122. /* Need to set the policy auth value */
  123. rc = Tss2_Sys_PolicyGetDigest(sys_context, session_handle,
  124. 0, &policy_digest, 0);
  125. if (rc != TSS2_RC_SUCCESS) {
  126. LOG_ERROR("Tss2_Sys_PolicyGetDigest failed: 0x%" PRIx32, rc);
  127. exit(1);
  128. }
  129. LOGBLOB_DEBUG(policy_digest.buffer, policy_digest.size, "%s", "policy digest:");
  130. cmd_auth.count = 1;
  131. cmd_auth.auths[0].sessionHandle = TPM2_RH_PW;
  132. cmd_auth.auths[0].nonce.size = 0;
  133. cmd_auth.auths[0].hmac.size = 0;
  134. rc = Tss2_Sys_SetPrimaryPolicy(sys_context,
  135. TPM2_RH_OWNER,
  136. &cmd_auth,
  137. &policy_digest,
  138. TPM2_ALG_SHA256,
  139. &rsp_auth);
  140. if (rc == TPM2_RC_SUCCESS) {
  141. LOG_INFO("Tss2_Sys_SetPrimaryPolicy success");
  142. } else {
  143. LOG_ERROR("Tss2_Sys_SetPrimaryPolicy FAILED! Response Code : 0x%x", rc);
  144. exit(1);
  145. }
  146. cmd_auth.auths[0].sessionHandle = session_handle;
  147. cmd_auth.auths[0].sessionAttributes |= TPMA_SESSION_CONTINUESESSION;
  148. /* Create an object using the valid template */
  149. LOG_INFO("Creating an object using a correct template");
  150. rc = Tss2_Sys_CreatePrimary (sys_context,
  151. TPM2_RH_OWNER,
  152. &cmd_auth,
  153. &in_sensitive,
  154. &in_public,
  155. &outside_info,
  156. &creation_pcr,
  157. &object_handle,
  158. &out_public,
  159. &creation_data,
  160. &creation_hash,
  161. &creation_ticket,
  162. &name,
  163. &rsp_auth
  164. );
  165. if (rc == TPM2_RC_SUCCESS) {
  166. LOG_INFO("Creating object: 0x%" PRIx32 " success", object_handle);
  167. } else {
  168. LOG_ERROR("CreatePrimary FAILED! Response Code : 0x%x", rc);
  169. exit(1);
  170. }
  171. rc = Tss2_Sys_FlushContext(sys_context, object_handle);
  172. if (rc != TSS2_RC_SUCCESS) {
  173. LOG_ERROR("Tss2_Sys_FlushContext failed with 0x%"PRIx32, rc);
  174. return 99; /* fatal error */
  175. }
  176. object_handle = 0;
  177. TPM2B_DATA outside_info2 = { 0 };
  178. TPML_PCR_SELECTION creation_pcr2 = { 0 };
  179. TPM2B_PUBLIC out_public2 = { 0 };
  180. TPM2B_CREATION_DATA creation_data2 = { 0 };
  181. TPM2B_DIGEST creation_hash2 = TPM2B_DIGEST_INIT;
  182. TPMT_TK_CREATION creation_ticket2 = { 0 };
  183. TPM2B_NAME name2 = TPM2B_NAME_INIT;
  184. /* Changing the template value */
  185. in_public.publicArea.parameters.rsaDetail.symmetric.keyBits.aes = 256;
  186. /* Create an object using an invalid template. This should fail */
  187. LOG_INFO("Creating an object using an incorrect template");
  188. rc = Tss2_Sys_CreatePrimary (sys_context,
  189. TPM2_RH_OWNER,
  190. &cmd_auth,
  191. &in_sensitive,
  192. &in_public,
  193. &outside_info2,
  194. &creation_pcr2,
  195. &object_handle,
  196. &out_public2,
  197. &creation_data2,
  198. &creation_hash2,
  199. &creation_ticket2,
  200. &name2,
  201. &rsp_auth
  202. );
  203. if (rc != TPM2_RC_1 + TPM2_RC_S + TPM2_RC_POLICY_FAIL) {
  204. LOG_ERROR("Error: CreatePrimary with invalid template succeeded!"
  205. "Response Code: 0x%x expected: 0x%x", rc,
  206. TPM2_RC_1 + TPM2_RC_S + TPM2_RC_POLICY_FAIL);
  207. exit(1);
  208. }
  209. rc = Tss2_Sys_FlushContext (sys_context, session_handle);
  210. if (rc != TSS2_RC_SUCCESS) {
  211. LOG_ERROR("Tss2_Sys_FlushContext failed: 0x%" PRIx32, rc);
  212. exit(1);
  213. }
  214. LOG_INFO("Flushed context for session handle: 0x%" PRIx32 " success!",
  215. session_handle);
  216. return 0;
  217. }