123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745 |
- /* SPDX-License-Identifier: BSD-2-Clause */
- /***********************************************************************
- * Copyright (c) 2017-2018, Intel Corporation
- *
- * All rights reserved.
- ***********************************************************************/
- #ifdef HAVE_CONFIG_H
- #include <config.h>
- #endif
- #include <inttypes.h>
- #include <stdlib.h>
- #include <string.h>
- #include <assert.h>
- #include <openssl/evp.h>
- #include <openssl/sha.h>
- #if OPENSSL_VERSION_NUMBER < 0x30000000L
- #include <openssl/hmac.h>
- #else
- #include <openssl/core_names.h>
- #endif
- #define LOGMODULE testintegration
- #include "util/log.h"
- #include "sys-util.h"
- #include "test.h"
- /*
- * Use te provide SYS context to create & load a primary key. The key will
- * be a 2048 bit (restricted decryption) RSA key. The associated symmetric
- * key is a 128 bit AES (CFB mode) key.
- */
- TSS2_RC
- create_primary_rsa_2048_aes_128_cfb (
- TSS2_SYS_CONTEXT *sys_context,
- TPM2_HANDLE *handle)
- {
- TSS2_RC rc = TSS2_RC_SUCCESS;
- TPM2B_SENSITIVE_CREATE in_sensitive = { 0 };
- TPM2B_PUBLIC in_public = { 0 };
- TPM2B_DATA outside_info = { 0 };
- TPML_PCR_SELECTION creation_pcr = { 0 };
- TPM2B_PUBLIC out_public = { 0 };
- TPM2B_CREATION_DATA creation_data = { 0 };
- TPM2B_DIGEST creation_hash = TPM2B_DIGEST_INIT;
- TPMT_TK_CREATION creation_ticket = { 0 };
- TPM2B_NAME name = TPM2B_NAME_INIT;
- /* session parameters */
- /* command session info */
- TSS2L_SYS_AUTH_COMMAND sessions_cmd = {
- .auths = {{ .sessionHandle = TPM2_RH_PW }},
- .count = 1
- };
- /* response session info */
- TSS2L_SYS_AUTH_RESPONSE sessions_rsp = {
- .auths = { 0 },
- .count = 0
- };
- if (sys_context == NULL || handle == NULL) {
- return TSS2_RC_LAYER_MASK | TSS2_BASE_RC_BAD_REFERENCE;
- }
- in_public.publicArea.type = TPM2_ALG_RSA;
- in_public.publicArea.nameAlg = TPM2_ALG_SHA256;
- in_public.publicArea.objectAttributes |= TPMA_OBJECT_RESTRICTED;
- in_public.publicArea.objectAttributes |= TPMA_OBJECT_USERWITHAUTH;
- in_public.publicArea.objectAttributes |= TPMA_OBJECT_DECRYPT;
- in_public.publicArea.objectAttributes |= TPMA_OBJECT_FIXEDTPM;
- in_public.publicArea.objectAttributes |= TPMA_OBJECT_FIXEDPARENT;
- in_public.publicArea.objectAttributes |= TPMA_OBJECT_SENSITIVEDATAORIGIN;
- in_public.publicArea.parameters.rsaDetail.symmetric.algorithm = TPM2_ALG_AES;
- in_public.publicArea.parameters.rsaDetail.symmetric.keyBits.aes = 128;
- in_public.publicArea.parameters.rsaDetail.symmetric.mode.aes = TPM2_ALG_CFB;
- in_public.publicArea.parameters.rsaDetail.scheme.scheme = TPM2_ALG_NULL;
- in_public.publicArea.parameters.rsaDetail.keyBits = 2048;
- LOG_INFO("CreatePrimary RSA 2048, AES 128 CFB");
- rc = Tss2_Sys_CreatePrimary (sys_context,
- TPM2_RH_OWNER,
- &sessions_cmd,
- &in_sensitive,
- &in_public,
- &outside_info,
- &creation_pcr,
- handle,
- &out_public,
- &creation_data,
- &creation_hash,
- &creation_ticket,
- &name,
- &sessions_rsp);
- if (rc == TPM2_RC_SUCCESS) {
- LOG_INFO("success");
- } else {
- LOG_ERROR("CreatePrimary FAILED! Response Code : 0x%x", rc);
- exit(1);
- }
- return rc;
- }
- TSS2_RC
- create_aes_128_cfb (
- TSS2_SYS_CONTEXT *sys_context,
- TPM2_HANDLE handle_parent,
- TPM2_HANDLE *handle)
- {
- TSS2_RC rc = TSS2_RC_SUCCESS;
- TPM2B_SENSITIVE_CREATE in_sensitive = { 0 };
- /* template defining key type */
- TPM2B_PUBLIC in_public = {
- .size = 0,
- .publicArea.type = TPM2_ALG_SYMCIPHER,
- .publicArea.nameAlg = TPM2_ALG_SHA256,
- .publicArea.objectAttributes = TPMA_OBJECT_DECRYPT |
- TPMA_OBJECT_FIXEDTPM |
- TPMA_OBJECT_FIXEDPARENT |
- TPMA_OBJECT_SENSITIVEDATAORIGIN |
- TPMA_OBJECT_SIGN_ENCRYPT |
- TPMA_OBJECT_USERWITHAUTH,
- .publicArea.parameters.symDetail.sym = {
- .algorithm = TPM2_ALG_AES,
- .keyBits.sym = 128,
- .mode.sym = TPM2_ALG_CFB,
- },
- };
- TPM2B_DATA outside_info = { 0 };
- TPML_PCR_SELECTION creation_pcr = { 0 };
- TPM2B_PRIVATE out_private = TPM2B_PRIVATE_INIT;
- TPM2B_PUBLIC out_public = { 0 };
- TPM2B_CREATION_DATA creation_data = { 0 };
- TPM2B_DIGEST creation_hash = TPM2B_DIGEST_INIT;
- TPMT_TK_CREATION creation_ticket = { 0 };
- TPM2B_NAME name = TPM2B_NAME_INIT;
- /* session parameters */
- /* command session info */
- TSS2L_SYS_AUTH_COMMAND sessions_cmd = {
- .auths = {{ .sessionHandle = TPM2_RH_PW }},
- .count = 1
- };
- /* response session info */
- TSS2L_SYS_AUTH_RESPONSE sessions_rsp = {
- .auths = { 0 },
- .count = 0
- };
- rc = TSS2_RETRY_EXP (Tss2_Sys_Create (sys_context,
- handle_parent,
- &sessions_cmd,
- &in_sensitive,
- &in_public,
- &outside_info,
- &creation_pcr,
- &out_private,
- &out_public,
- &creation_data,
- &creation_hash,
- &creation_ticket,
- &sessions_rsp));
- if (rc != TPM2_RC_SUCCESS) {
- return rc;
- }
- return Tss2_Sys_Load (sys_context,
- handle_parent,
- &sessions_cmd,
- &out_private,
- &out_public,
- handle,
- &name,
- &sessions_rsp);
- }
- TSS2_RC
- create_keyedhash_key (
- TSS2_SYS_CONTEXT *sys_context,
- TPM2_HANDLE handle_parent,
- TPM2_HANDLE *handle)
- {
- TSS2_RC rc = TSS2_RC_SUCCESS;
- TPM2B_SENSITIVE_CREATE in_sensitive = { 0 };
- /* template defining key type */
- TPM2B_PUBLIC in_public = {
- .size = 0,
- .publicArea.type = TPM2_ALG_KEYEDHASH,
- .publicArea.nameAlg = TPM2_ALG_SHA256,
- .publicArea.objectAttributes = TPMA_OBJECT_RESTRICTED |
- TPMA_OBJECT_SIGN_ENCRYPT |
- TPMA_OBJECT_FIXEDTPM |
- TPMA_OBJECT_FIXEDPARENT |
- TPMA_OBJECT_SENSITIVEDATAORIGIN |
- TPMA_OBJECT_USERWITHAUTH,
- .publicArea.parameters.keyedHashDetail.scheme.scheme = TPM2_ALG_HMAC,
- .publicArea.parameters.keyedHashDetail.scheme.details.hmac.hashAlg = TPM2_ALG_SHA1,
- .publicArea.unique.keyedHash.size = 0,
- };
- TPM2B_DATA outside_info = { 0 };
- TPML_PCR_SELECTION creation_pcr = { 0 };
- TPM2B_PRIVATE out_private = TPM2B_PRIVATE_INIT;
- TPM2B_PUBLIC out_public = { 0 };
- TPM2B_CREATION_DATA creation_data = { 0 };
- TPM2B_DIGEST creation_hash = TPM2B_DIGEST_INIT;
- TPMT_TK_CREATION creation_ticket = { 0 };
- TPM2B_NAME name = TPM2B_NAME_INIT;
- /* session parameters */
- /* command session info */
- TSS2L_SYS_AUTH_COMMAND sessions_cmd = {
- .auths = {{ .sessionHandle = TPM2_RH_PW }},
- .count = 1
- };
- /* response session info */
- TSS2L_SYS_AUTH_RESPONSE sessions_rsp = {
- .auths = { 0 },
- .count = 0
- };
- rc = TSS2_RETRY_EXP (Tss2_Sys_Create (sys_context,
- handle_parent,
- &sessions_cmd,
- &in_sensitive,
- &in_public,
- &outside_info,
- &creation_pcr,
- &out_private,
- &out_public,
- &creation_data,
- &creation_hash,
- &creation_ticket,
- &sessions_rsp));
- if (rc != TPM2_RC_SUCCESS) {
- return rc;
- }
- return Tss2_Sys_Load (sys_context,
- handle_parent,
- &sessions_cmd,
- &out_private,
- &out_public,
- handle,
- &name,
- &sessions_rsp);
- }
- TSS2_RC
- tpm_encrypt_decrypt_cfb (
- TSS2_SYS_CONTEXT *sys_context,
- TPMI_DH_OBJECT handle,
- TPMI_YES_NO decrypt,
- TPM2B_MAX_BUFFER *data_in,
- TPM2B_MAX_BUFFER *data_out)
- {
- TPMI_ALG_CIPHER_MODE mode = TPM2_ALG_NULL;
- TPM2B_IV iv_in = TPM2B_IV_INIT;
- TPM2B_IV iv_out = TPM2B_IV_INIT;
- /* session parameters */
- /* command session info */
- /* command session info */
- TSS2L_SYS_AUTH_COMMAND sessions_cmd = {
- .auths = {{ .sessionHandle = TPM2_RH_PW }},
- .count = 1
- };
- /* response session info */
- TSS2L_SYS_AUTH_RESPONSE sessions_rsp = {
- .auths = { 0 },
- .count = 0
- };
- return Tss2_Sys_EncryptDecrypt (sys_context,
- handle,
- &sessions_cmd,
- decrypt,
- mode,
- &iv_in,
- data_in,
- data_out,
- &iv_out,
- &sessions_rsp);
- }
- TSS2_RC
- tpm_decrypt_cfb (
- TSS2_SYS_CONTEXT *sys_context,
- TPMI_DH_OBJECT handle,
- TPM2B_MAX_BUFFER *data_in,
- TPM2B_MAX_BUFFER *data_out)
- {
- return tpm_encrypt_decrypt_cfb (sys_context, handle, YES, data_in, data_out);
- }
- TSS2_RC
- tpm_encrypt_cfb (
- TSS2_SYS_CONTEXT *sys_context,
- TPMI_DH_OBJECT handle,
- TPM2B_MAX_BUFFER *data_in,
- TPM2B_MAX_BUFFER *data_out)
- {
- return tpm_encrypt_decrypt_cfb (sys_context, handle, NO, data_in, data_out);
- }
- TSS2_RC
- tpm_encrypt_decrypt_2_cfb (
- TSS2_SYS_CONTEXT *sys_context,
- TPMI_DH_OBJECT handle,
- TPMI_YES_NO decrypt,
- TPM2B_MAX_BUFFER *data_in,
- TPM2B_MAX_BUFFER *data_out)
- {
- TPMI_ALG_CIPHER_MODE mode = TPM2_ALG_NULL;
- TPM2B_IV iv_in = TPM2B_IV_INIT;
- TPM2B_IV iv_out = TPM2B_IV_INIT;
- /* session parameters */
- /* command session info */
- /* command session info */
- TSS2L_SYS_AUTH_COMMAND sessions_cmd = {
- .auths = {{ .sessionHandle = TPM2_RH_PW }},
- .count = 1
- };
- /* response session info */
- TSS2L_SYS_AUTH_RESPONSE sessions_rsp = {
- .auths = { 0 },
- .count = 0
- };
- return Tss2_Sys_EncryptDecrypt2 (sys_context,
- handle,
- &sessions_cmd,
- data_in,
- decrypt,
- mode,
- &iv_in,
- data_out,
- &iv_out,
- &sessions_rsp);
- }
- TSS2_RC
- tpm_decrypt_2_cfb (
- TSS2_SYS_CONTEXT *sys_context,
- TPMI_DH_OBJECT handle,
- TPM2B_MAX_BUFFER *data_in,
- TPM2B_MAX_BUFFER *data_out)
- {
- return tpm_encrypt_decrypt_2_cfb (sys_context, handle, YES, data_in, data_out);
- }
- TSS2_RC
- tpm_encrypt_2_cfb (
- TSS2_SYS_CONTEXT *sys_context,
- TPMI_DH_OBJECT handle,
- TPM2B_MAX_BUFFER *data_in,
- TPM2B_MAX_BUFFER *data_out)
- {
- return tpm_encrypt_decrypt_2_cfb (sys_context, handle, NO, data_in, data_out);
- }
- static TSS2_RC
- encrypt_decrypt_cfb (
- TPM2B_MAX_BUFFER *data_out,
- TPM2B_MAX_BUFFER *data_in,
- TPMI_YES_NO decrypt,
- TPM2B_MAX_BUFFER *key,
- TPM2B_IV *iv)
- {
- EVP_CIPHER_CTX *ctx;
- const EVP_CIPHER *type;
- TSS2_RC rc = TSS2_SYS_RC_BAD_VALUE;
- int len = 0, sll_rc;
- ctx = EVP_CIPHER_CTX_new();
- if (!ctx)
- return TSS2_SYS_RC_GENERAL_FAILURE;
- switch (key->size) {
- case 16:
- type = EVP_aes_128_cfb();
- break;
- case 24:
- type = EVP_aes_192_cfb();
- break;
- case 32:
- type = EVP_aes_256_cfb();
- break;
- default:
- goto clean;
- }
- rc = TSS2_SYS_RC_GENERAL_FAILURE;
- if (decrypt) {
- sll_rc = EVP_DecryptInit_ex(ctx, type, NULL, key->buffer, iv->buffer);
- if (sll_rc != 1)
- goto clean;
- sll_rc = EVP_DecryptUpdate(ctx, data_out->buffer, &len,
- data_in->buffer, data_in->size);
- if (sll_rc != 1)
- goto clean;
- data_out->size = len;
- sll_rc = EVP_DecryptFinal_ex(ctx, data_out->buffer + len, &len);
- if (sll_rc != 1)
- goto clean;
- } else {
- sll_rc = EVP_EncryptInit_ex(ctx, type, NULL, key->buffer, iv->buffer);
- if (sll_rc != 1)
- goto clean;
- sll_rc = EVP_EncryptUpdate(ctx, data_out->buffer, &len,
- data_in->buffer, data_in->size);
- if (sll_rc != 1)
- goto clean;
- data_out->size = len;
- sll_rc = EVP_EncryptFinal_ex(ctx, data_out->buffer + len, &len);
- if (sll_rc != 1)
- goto clean;
- }
- data_out->size += len;
- rc = TPM2_RC_SUCCESS;
- clean:
- EVP_CIPHER_CTX_free(ctx);
- return rc;
- }
- TSS2_RC
- decrypt_cfb (
- TPM2B_MAX_BUFFER *data_out,
- TPM2B_MAX_BUFFER *data_in,
- TPM2B_MAX_BUFFER *key,
- TPM2B_IV *iv)
- {
- return encrypt_decrypt_cfb(data_out, data_in, YES, key, iv);
- }
- TSS2_RC
- encrypt_cfb (
- TPM2B_MAX_BUFFER *data_out,
- TPM2B_MAX_BUFFER *data_in,
- TPM2B_MAX_BUFFER *key,
- TPM2B_IV *iv)
- {
- return encrypt_decrypt_cfb(data_out, data_in, NO, key, iv);
- }
- #if HAVE_EVP_SM3 && !defined(OPENSSL_NO_SM3)
- static unsigned char *SM3(const unsigned char *d, size_t n, unsigned char *md)
- {
- EVP_MD_CTX *ctx;
- static unsigned char m[TPM2_SM3_256_DIGEST_SIZE] = { 0 };
- uint32_t mdLen = TPM2_SM3_256_DIGEST_SIZE;
- if (md == NULL) {
- md = m;
- }
- ctx = EVP_MD_CTX_new();
- EVP_DigestInit_ex(ctx, EVP_sm3(), NULL);
- EVP_DigestUpdate(ctx, d, n);
- EVP_DigestFinal_ex(ctx, md, &mdLen);
- if (mdLen != TPM2_SM3_256_DIGEST_SIZE) {
- EVP_MD_CTX_free(ctx);
- return NULL;
- }
- EVP_MD_CTX_free(ctx);
- return md;
- }
- #endif
- TSS2_RC
- hash (
- TPM2_ALG_ID alg,
- const void *data,
- int size,
- TPM2B_DIGEST *out)
- {
- switch (alg) {
- case TPM2_ALG_SHA1:
- SHA1(data, size, out->buffer);
- out->size = TPM2_SHA1_DIGEST_SIZE;
- break;
- case TPM2_ALG_SHA256:
- SHA256(data, size, out->buffer);
- out->size = TPM2_SHA256_DIGEST_SIZE;
- break;
- case TPM2_ALG_SHA384:
- SHA384(data, size, out->buffer);
- out->size = TPM2_SHA384_DIGEST_SIZE;
- break;
- case TPM2_ALG_SHA512:
- SHA512(data, size, out->buffer);
- out->size = TPM2_SHA512_DIGEST_SIZE;
- break;
- #if HAVE_EVP_SM3 && !defined(OPENSSL_NO_SM3)
- case TPM2_ALG_SM3_256:
- SM3(data, size, out->buffer);
- out->size = TPM2_SM3_256_DIGEST_SIZE;
- break;
- #endif
- default:
- return TSS2_SYS_RC_BAD_VALUE;
- }
- return TPM2_RC_SUCCESS;
- }
- TSS2_RC
- hmac(
- TPM2_ALG_ID alg,
- const void *key,
- int key_len,
- TPM2B_DIGEST **buffer_list,
- TPM2B_DIGEST *out)
- {
- int rc = 1, i;
- unsigned int *buf = NULL;
- uint8_t *buf_ptr;
- EVP_MD *evp;
- #if OPENSSL_VERSION_NUMBER < 0x30000000L
- unsigned int size;
- HMAC_CTX *ctx = HMAC_CTX_new();
- #else
- size_t size;
- EVP_MAC *hmac = EVP_MAC_fetch(NULL, "HMAC", NULL);
- EVP_MAC_CTX *ctx = EVP_MAC_CTX_new(hmac);
- #endif
- if (!ctx)
- return TSS2_SYS_RC_GENERAL_FAILURE;
- switch (alg) {
- case TPM2_ALG_SHA1:
- evp = (EVP_MD *) EVP_sha1();
- out->size = TPM2_SHA1_DIGEST_SIZE;
- break;
- case TPM2_ALG_SHA256:
- evp = (EVP_MD *) EVP_sha256();
- out->size = TPM2_SHA256_DIGEST_SIZE;
- break;
- case TPM2_ALG_SHA384:
- evp = (EVP_MD *) EVP_sha384();
- out->size = TPM2_SHA384_DIGEST_SIZE;
- break;
- case TPM2_ALG_SHA512:
- evp = (EVP_MD *) EVP_sha512();
- out->size = TPM2_SHA512_DIGEST_SIZE;
- break;
- #if HAVE_EVP_SM3 && !defined(OPENSSL_NO_SM3)
- case TPM2_ALG_SM3_256:
- evp = (EVP_MD *) EVP_sm3();
- out->size = TPM2_SM3_256_DIGEST_SIZE;
- break;
- #endif
- default:
- rc = TSS2_SYS_RC_BAD_VALUE;
- goto out;
- }
- rc = 0;
- buf = calloc(1, out->size);
- if (!buf)
- goto out;
- buf_ptr = (uint8_t *)buf;
- #if OPENSSL_VERSION_NUMBER < 0x30000000L
- rc = HMAC_Init_ex(ctx, key, key_len, evp, NULL);
- #else
- OSSL_PARAM params[2];
- params[0] = OSSL_PARAM_construct_utf8_string(OSSL_ALG_PARAM_DIGEST,
- (char *)EVP_MD_get0_name(evp), 0);
- params[1] = OSSL_PARAM_construct_end();
- rc = EVP_MAC_init(ctx, key, key_len, params);
- #endif
- if (rc != 1)
- goto out;
- for (i = 0; buffer_list[i] != 0; i++) {
- #if OPENSSL_VERSION_NUMBER < 0x30000000L
- rc = HMAC_Update(ctx, buffer_list[i]->buffer, buffer_list[i]->size);
- #else
- rc = EVP_MAC_update(ctx, buffer_list[i]->buffer, buffer_list[i]->size);
- #endif
- if (rc != 1)
- goto out;
- }
- /* buf_ptr has to be 4 bytes alligned for whatever reason */
- #if OPENSSL_VERSION_NUMBER < 0x30000000L
- rc = HMAC_Final(ctx, buf_ptr, &size);
- #else
- rc = EVP_MAC_final(ctx, buf_ptr, &size, out->size);
- #endif
- if (rc != 1)
- goto out;
- assert(size == out->size);
- memcpy(out->buffer, buf, out->size);
- out:
- #if OPENSSL_VERSION_NUMBER < 0x30000000L
- HMAC_CTX_free(ctx);
- #else
- EVP_MAC_CTX_free(ctx);
- EVP_MAC_free(hmac);
- #endif
- if (buf)
- free(buf);
- /* In openSSL 1 means success 0 error */
- return rc == 1 ? TPM2_RC_SUCCESS : TSS2_SYS_RC_GENERAL_FAILURE;
- }
- TSS2_RC
- ConcatSizedByteBuffer(
- TPM2B_MAX_BUFFER *result,
- TPM2B *buf)
- {
- if (result->size + buf->size > TPM2_MAX_DIGEST_BUFFER)
- return TSS2_SYS_RC_BAD_VALUE;
- memmove(result->buffer + result->size,
- buf->buffer, buf->size);
- result->size += buf->size;
- return TPM2_RC_SUCCESS;
- }
- TSS2_RC
- CompareSizedByteBuffer(
- TPM2B *buffer1,
- TPM2B *buffer2)
- {
- if (buffer1->size != buffer2->size)
- return TPM2_RC_FAILURE;
- if (memcmp(buffer1->buffer, buffer2->buffer, buffer1->size))
- return TPM2_RC_FAILURE;
- return TPM2_RC_SUCCESS;
- }
- void
- CatSizedByteBuffer(
- TPM2B *dest,
- TPM2B *src)
- {
- if (!dest || !src)
- return;
- memcpy(dest->buffer + dest->size, src->buffer, src->size);
- dest->size += src->size;
- }
- UINT16
- CopySizedByteBuffer(
- TPM2B *dest,
- const TPM2B *src)
- {
- if (!dest)
- return 0;
- if (!src) {
- dest->size = 0;
- return 0;
- }
- memcpy(dest->buffer, src->buffer, src->size);
- dest->size = src->size;
- return src->size + 2;
- }
- UINT16
- GetDigestSize(TPM2_ALG_ID hash)
- {
- switch (hash) {
- case TPM2_ALG_SHA1:
- return TPM2_SHA1_DIGEST_SIZE;
- case TPM2_ALG_SHA256:
- return TPM2_SHA256_DIGEST_SIZE;
- case TPM2_ALG_SHA384:
- return TPM2_SHA384_DIGEST_SIZE;
- case TPM2_ALG_SHA512:
- return TPM2_SHA512_DIGEST_SIZE;
- case TPM2_ALG_SM3_256:
- return TPM2_SM3_256_DIGEST_SIZE;
- default:
- return 0;
- }
- }
- TSS2_RC
- DefineNvIndex (
- TSS2_SYS_CONTEXT *sys_ctx,
- TPMI_RH_PROVISION authHandle,
- TPM2B_AUTH *auth,
- const TPM2B_DIGEST *authPolicy,
- TPMI_RH_NV_INDEX nvIndex,
- TPMI_ALG_HASH nameAlg,
- TPMA_NV attributes,
- UINT16 size)
- {
- TPM2B_NV_PUBLIC publicInfo = {
- .nvPublic = {
- .attributes = attributes | TPMA_NV_ORDERLY,
- .dataSize = size,
- .nameAlg = nameAlg,
- .nvIndex = nvIndex,
- },
- .size = sizeof (TPMI_RH_NV_INDEX) + sizeof (TPMI_ALG_HASH) +
- sizeof (TPMA_NV) + sizeof (UINT16) + sizeof (UINT16),
- };
- CopySizedByteBuffer ((TPM2B*)&publicInfo.nvPublic.authPolicy,
- (TPM2B*)authPolicy);
- TSS2L_SYS_AUTH_RESPONSE sessionsDataOut;
- TSS2L_SYS_AUTH_COMMAND sessionsData = {
- .count = 1,
- .auths = {
- {
- .sessionHandle = TPM2_RH_PW,
- .sessionAttributes = 0,
- .nonce = { .size = 0 },
- .hmac = { .size = 0 },
- },
- },
- };
- return Tss2_Sys_NV_DefineSpace (sys_ctx,
- authHandle,
- &sessionsData,
- auth,
- &publicInfo,
- &sessionsDataOut);
- }
|