TPML-marshal.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492
  1. /* SPDX-License-Identifier: BSD-2-Clause */
  2. /***********************************************************************
  3. * Copyright (c) 2017-2018, Intel Corporation
  4. *
  5. * All rights reserved.
  6. ***********************************************************************/
  7. #ifdef HAVE_CONFIG_H
  8. #include <config.h>
  9. #endif
  10. #include <stdarg.h>
  11. #include <stddef.h>
  12. #include <string.h>
  13. #include <setjmp.h>
  14. #include <cmocka.h>
  15. #include <stdio.h>
  16. #include "tss2_mu.h"
  17. #include "util/tss2_endian.h"
  18. /*
  19. * Success case
  20. */
  21. static void
  22. tpml_marshal_success(void **state)
  23. {
  24. TPML_HANDLE hndl = {0};
  25. TPML_PCR_SELECTION sel = {0};
  26. uint8_t buffer[sizeof(hndl) + sizeof(sel)] = { 0 };
  27. size_t buffer_size = sizeof(buffer);
  28. TPML_HANDLE *ptr;
  29. TSS2_RC rc;
  30. hndl.count = 2;
  31. hndl.handle[0] = 0x81000001;
  32. hndl.handle[1] = 0x81000002;
  33. ptr = (TPML_HANDLE *) buffer;
  34. rc = Tss2_MU_TPML_HANDLE_Marshal(&hndl, buffer, buffer_size, NULL);
  35. assert_int_equal (rc, TSS2_RC_SUCCESS);
  36. assert_int_equal (ptr->count, HOST_TO_BE_32(2));
  37. assert_int_equal (ptr->handle[0], HOST_TO_BE_32(0x81000001));
  38. assert_int_equal (ptr->handle[1], HOST_TO_BE_32(0x81000002));
  39. sel.count = 2;
  40. sel.pcrSelections[0].hash = TPM2_ALG_SHA1;
  41. sel.pcrSelections[0].sizeofSelect = 3;
  42. sel.pcrSelections[0].pcrSelect[0] = 0xaa;
  43. sel.pcrSelections[0].pcrSelect[1] = 0xbb;
  44. sel.pcrSelections[0].pcrSelect[2] = 0xcc;
  45. sel.pcrSelections[1].hash = TPM2_ALG_SHA256;
  46. sel.pcrSelections[1].sizeofSelect = 2;
  47. sel.pcrSelections[1].pcrSelect[0] = 0xdd;
  48. sel.pcrSelections[1].pcrSelect[1] = 0xee;
  49. rc = Tss2_MU_TPML_PCR_SELECTION_Marshal(&sel, buffer, buffer_size, NULL);
  50. assert_int_equal (rc, TSS2_RC_SUCCESS);
  51. uint8_t expect [] = {
  52. 0, 0, 0, 2,
  53. 0, 0x04, /* TPM2_ALG_SHA1 */
  54. 3,
  55. 0xaa, 0xbb, 0xcc,
  56. 0, 0x0b, /* TPM2_ALG_SHA256 */
  57. 2,
  58. 0xdd, 0xee};
  59. assert_memory_equal(buffer, &expect[0], sizeof(expect));
  60. }
  61. /*
  62. * Success case with a valid offset
  63. */
  64. static void
  65. tpml_marshal_success_offset(void **state)
  66. {
  67. TPML_HANDLE hndl = {0};
  68. TPML_PCR_SELECTION sel = {0};
  69. uint8_t buffer[sizeof(hndl) + sizeof(sel) + 10] = { 0 };
  70. size_t buffer_size = sizeof(buffer);
  71. TPML_HANDLE *ptr;
  72. size_t offset = 10;
  73. TSS2_RC rc;
  74. hndl.count = 2;
  75. hndl.handle[0] = 0x81000001;
  76. hndl.handle[1] = 0x81000002;
  77. ptr = (TPML_HANDLE *) (buffer + 10);
  78. rc = Tss2_MU_TPML_HANDLE_Marshal(&hndl, buffer, buffer_size, &offset);
  79. assert_int_equal (rc, TSS2_RC_SUCCESS);
  80. assert_int_equal (ptr->count, HOST_TO_BE_32(2));
  81. assert_int_equal (ptr->handle[0], HOST_TO_BE_32(0x81000001));
  82. assert_int_equal (ptr->handle[1], HOST_TO_BE_32(0x81000002));
  83. assert_int_equal (offset, 10 + 4 + 4 + 4);
  84. sel.count = 2;
  85. sel.pcrSelections[0].hash = TPM2_ALG_SHA1;
  86. sel.pcrSelections[0].sizeofSelect = 3;
  87. sel.pcrSelections[0].pcrSelect[0] = 0xaa;
  88. sel.pcrSelections[0].pcrSelect[1] = 0xbb;
  89. sel.pcrSelections[0].pcrSelect[2] = 0xcc;
  90. sel.pcrSelections[1].hash = TPM2_ALG_SHA256;
  91. sel.pcrSelections[1].sizeofSelect = 2;
  92. sel.pcrSelections[1].pcrSelect[0] = 0xdd;
  93. sel.pcrSelections[1].pcrSelect[1] = 0xee;
  94. rc = Tss2_MU_TPML_PCR_SELECTION_Marshal(&sel, buffer, buffer_size, &offset);
  95. assert_int_equal (rc, TSS2_RC_SUCCESS);
  96. uint8_t expect [] = {
  97. 0, 0, 0, 2,
  98. 0, 0x04, /* TPM2_ALG_SHA1 */
  99. 3,
  100. 0xaa, 0xbb, 0xcc,
  101. 0, 0x0b, /* TPM2_ALG_SHA256 */
  102. 2,
  103. 0xdd, 0xee};
  104. assert_memory_equal((buffer + 10 + 4 + 4 + 4), &expect[0], sizeof(expect));
  105. assert_int_equal (offset, 10 + 4 + 4 + 4 + 4 + 2 + 1 + 1 + 1 + 1 + 2 + 1 + 1 + 1);
  106. }
  107. /*
  108. * Success case with a null buffer
  109. */
  110. static void
  111. tpml_marshal_buffer_null_with_offset(void **state)
  112. {
  113. TPML_HANDLE hndl = {0};
  114. TPML_PCR_SELECTION sel = {0};
  115. TPML_DIGEST dgst = {0};
  116. TPML_DIGEST_VALUES dgst_vals = {0};
  117. size_t buffer_size = sizeof(hndl) + sizeof(sel) + sizeof(dgst) + 99;
  118. size_t offset = 99;
  119. TSS2_RC rc;
  120. hndl.count = 2;
  121. hndl.handle[0] = 0x81000001;
  122. hndl.handle[1] = 0x81000002;
  123. rc = Tss2_MU_TPML_HANDLE_Marshal(&hndl, NULL, buffer_size, &offset);
  124. assert_int_equal (rc, TSS2_RC_SUCCESS);
  125. assert_int_equal (offset, 99 + 4 + 4 + 4);
  126. sel.count = 2;
  127. sel.pcrSelections[0].hash = TPM2_ALG_SHA1;
  128. sel.pcrSelections[0].sizeofSelect = 3;
  129. sel.pcrSelections[0].pcrSelect[0] = 0xaa;
  130. sel.pcrSelections[0].pcrSelect[1] = 0xbb;
  131. sel.pcrSelections[0].pcrSelect[2] = 0xcc;
  132. sel.pcrSelections[1].hash = TPM2_ALG_SHA256;
  133. sel.pcrSelections[1].sizeofSelect = 2;
  134. sel.pcrSelections[1].pcrSelect[0] = 0xdd;
  135. sel.pcrSelections[1].pcrSelect[1] = 0xee;
  136. rc = Tss2_MU_TPML_PCR_SELECTION_Marshal(&sel, NULL, buffer_size, &offset);
  137. assert_int_equal (rc, TSS2_RC_SUCCESS);
  138. assert_int_equal (offset, 99 + 4 + 4 + 4 + 4 + 2 + 1 + 1 + 1 + 1 + 2 + 1 + 1 + 1);
  139. offset = 99;
  140. dgst.count = 2;
  141. dgst.digests[0].size = TPM2_SHA1_DIGEST_SIZE;
  142. dgst.digests[1].size = TPM2_SHA512_DIGEST_SIZE;
  143. rc = Tss2_MU_TPML_DIGEST_Marshal(&dgst, NULL, buffer_size, &offset);
  144. assert_int_equal (rc, TSS2_RC_SUCCESS);
  145. assert_int_equal (offset, 99 + sizeof(UINT32) + 2*sizeof(UINT16) +
  146. TPM2_SHA1_DIGEST_SIZE + TPM2_SHA512_DIGEST_SIZE);
  147. offset = 99;
  148. dgst_vals.count = 2;
  149. dgst_vals.digests[0].hashAlg = TPM2_ALG_SHA1;
  150. dgst_vals.digests[1].hashAlg = TPM2_ALG_SHA512;
  151. rc = Tss2_MU_TPML_DIGEST_VALUES_Marshal(&dgst_vals, NULL, buffer_size, &offset);
  152. assert_int_equal (rc, TSS2_RC_SUCCESS);
  153. assert_int_equal (offset, 99 + sizeof(UINT32) + 2*sizeof(TPMI_ALG_HASH) +
  154. TPM2_SHA1_DIGEST_SIZE + TPM2_SHA512_DIGEST_SIZE);
  155. }
  156. /*
  157. * Invalid case with a null buffer and a null offset
  158. */
  159. static void
  160. tpml_marshal_buffer_null_offset_null(void **state)
  161. {
  162. TPML_HANDLE hndl = {0};
  163. TPML_PCR_SELECTION sel = {0};
  164. TSS2_RC rc;
  165. hndl.count = 2;
  166. hndl.handle[0] = 0x81000001;
  167. hndl.handle[1] = 0x81000002;
  168. rc = Tss2_MU_TPML_HANDLE_Marshal(&hndl, NULL, sizeof(hndl), NULL);
  169. assert_int_equal (rc, TSS2_MU_RC_BAD_REFERENCE);
  170. rc = Tss2_MU_TPML_PCR_SELECTION_Marshal(&sel, NULL, sizeof(sel), NULL);
  171. assert_int_equal (rc, TSS2_MU_RC_BAD_REFERENCE);
  172. }
  173. /*
  174. * Invalid case with not big enough buffer
  175. */
  176. static void
  177. tpml_marshal_buffer_size_lt_data_nad_lt_offset(void **state)
  178. {
  179. TPML_HANDLE hndl = {0};
  180. TPML_PCR_SELECTION sel = {0};
  181. uint8_t buffer[sizeof(hndl) + sizeof(sel) + 10] = { 0 };
  182. size_t buffer_size = 3 * 4;
  183. size_t offset = 10;
  184. TSS2_RC rc;
  185. hndl.count = 2;
  186. hndl.handle[0] = 0x81000001;
  187. hndl.handle[1] = 0x81000002;
  188. rc = Tss2_MU_TPML_HANDLE_Marshal(&hndl, buffer, buffer_size, &offset);
  189. assert_int_equal (rc, TSS2_MU_RC_INSUFFICIENT_BUFFER);
  190. assert_int_equal (offset, 10);
  191. sel.count = 2;
  192. sel.pcrSelections[0].hash = TPM2_ALG_SHA1;
  193. sel.pcrSelections[0].sizeofSelect = 3;
  194. sel.pcrSelections[0].pcrSelect[0] = 0xaa;
  195. sel.pcrSelections[0].pcrSelect[1] = 0xbb;
  196. sel.pcrSelections[0].pcrSelect[2] = 0xcc;
  197. sel.pcrSelections[1].hash = TPM2_ALG_SHA256;
  198. sel.pcrSelections[1].sizeofSelect = 2;
  199. sel.pcrSelections[1].pcrSelect[0] = 0xdd;
  200. sel.pcrSelections[1].pcrSelect[1] = 0xee;
  201. offset = 2;
  202. buffer_size = 4 + 2 + 4 + 2 + 2;
  203. rc = Tss2_MU_TPML_PCR_SELECTION_Marshal(&sel, buffer, buffer_size, &offset);
  204. assert_int_equal (rc, TSS2_MU_RC_INSUFFICIENT_BUFFER);
  205. assert_int_equal (offset, 2);
  206. }
  207. /*
  208. * Invalid case with too big count
  209. */
  210. static void
  211. tpml_marshal_invalid_count(void **state)
  212. {
  213. TPML_HANDLE hndl = {0};
  214. TPML_PCR_SELECTION sel = {0};
  215. uint8_t buffer[sizeof(hndl) + sizeof(sel)] = { 0 };
  216. size_t buffer_size = sizeof(buffer);
  217. TSS2_RC rc;
  218. hndl.count = TPM2_MAX_CAP_HANDLES + 2;
  219. hndl.handle[0] = 0x81000001;
  220. hndl.handle[1] = 0x81000002;
  221. rc = Tss2_MU_TPML_HANDLE_Marshal(&hndl, buffer, buffer_size, NULL);
  222. assert_int_equal (rc, TSS2_SYS_RC_BAD_VALUE);
  223. sel.count = TPM2_NUM_PCR_BANKS + 2;
  224. sel.pcrSelections[0].hash = TPM2_ALG_SHA1;
  225. sel.pcrSelections[0].sizeofSelect = 3;
  226. sel.pcrSelections[0].pcrSelect[0] = 0xaa;
  227. sel.pcrSelections[0].pcrSelect[1] = 0xbb;
  228. sel.pcrSelections[0].pcrSelect[2] = 0xcc;
  229. sel.pcrSelections[1].hash = TPM2_ALG_SHA256;
  230. sel.pcrSelections[1].sizeofSelect = 2;
  231. sel.pcrSelections[1].pcrSelect[0] = 0xdd;
  232. sel.pcrSelections[1].pcrSelect[1] = 0xee;
  233. rc = Tss2_MU_TPML_PCR_SELECTION_Marshal(&sel, buffer, buffer_size, NULL);
  234. assert_int_equal (rc, TSS2_SYS_RC_BAD_VALUE);
  235. }
  236. /*
  237. * Success case
  238. */
  239. static void
  240. tpml_unmarshal_success(void **state)
  241. {
  242. TPML_HANDLE hndl = {0};
  243. TPML_PCR_SELECTION sel = {0};
  244. uint8_t buffer[sizeof(hndl) + sizeof(sel) + 10] = { 0 };
  245. size_t buffer_size = sizeof(buffer);
  246. TPML_HANDLE *ptr;
  247. size_t offset = 0;
  248. TSS2_RC rc;
  249. ptr = (TPML_HANDLE *) (buffer);
  250. ptr->count = HOST_TO_BE_32(2);
  251. ptr->handle[0] = HOST_TO_BE_32(0x81000001);
  252. ptr->handle[1] = HOST_TO_BE_32(0x81000002);
  253. rc = Tss2_MU_TPML_HANDLE_Unmarshal(buffer, buffer_size, &offset, &hndl);
  254. assert_int_equal (rc, TSS2_RC_SUCCESS);
  255. assert_int_equal (hndl.count, 2);
  256. assert_int_equal (hndl.handle[0], 0x81000001);
  257. assert_int_equal (hndl.handle[1], 0x81000002);
  258. assert_int_equal (offset, 4 + 4 + 4);
  259. uint8_t data [] = {
  260. 0, 0, 0, 2,
  261. 0, 0x04, /* TPM2_ALG_SHA1 */
  262. 3,
  263. 0xaa, 0xbb, 0xcc,
  264. 0, 0x0b, /* TPM2_ALG_SHA256 */
  265. 2,
  266. 0xdd, 0xee};
  267. memcpy(buffer + 4 + 4 + 4, &data[0], sizeof(data));
  268. rc = Tss2_MU_TPML_PCR_SELECTION_Unmarshal(buffer, buffer_size, &offset, &sel);
  269. assert_int_equal (rc, TSS2_RC_SUCCESS);
  270. assert_int_equal (sel.count, 2);
  271. assert_int_equal (sel.pcrSelections[0].hash, TPM2_ALG_SHA1);
  272. assert_int_equal (sel.pcrSelections[0].sizeofSelect, 3);
  273. assert_int_equal (sel.pcrSelections[0].pcrSelect[0], 0xaa);
  274. assert_int_equal (sel.pcrSelections[0].pcrSelect[1], 0xbb);
  275. assert_int_equal (sel.pcrSelections[0].pcrSelect[2], 0xcc);
  276. assert_int_equal (sel.pcrSelections[1].hash, TPM2_ALG_SHA256);
  277. assert_int_equal (sel.pcrSelections[1].sizeofSelect, 2);
  278. assert_int_equal (sel.pcrSelections[1].pcrSelect[0], 0xdd);
  279. assert_int_equal (sel.pcrSelections[1].pcrSelect[1], 0xee);
  280. assert_int_equal (offset, 4 + 4 + 4 + 4 + 2 + 1 + 1 + 1 + 1 + 2 + 1 + 1 + 1);
  281. }
  282. /*
  283. * Invalid test case with buffer null and dest null
  284. */
  285. static void
  286. tpml_unmarshal_dest_null_buff_null(void **state)
  287. {
  288. size_t offset = 1;
  289. TSS2_RC rc;
  290. rc = Tss2_MU_TPML_HANDLE_Unmarshal(NULL, 120, &offset, NULL);
  291. assert_int_equal (rc, TSS2_MU_RC_BAD_REFERENCE);
  292. assert_int_equal (offset, 1);
  293. rc = Tss2_MU_TPML_PCR_SELECTION_Unmarshal(NULL, 120, &offset, NULL);
  294. assert_int_equal (rc, TSS2_MU_RC_BAD_REFERENCE);
  295. assert_int_equal (offset, 1);
  296. }
  297. /*
  298. * Invalid test case with offset null and dest null
  299. */
  300. static void
  301. tpml_unmarshal_buffer_null_offset_null(void **state)
  302. {
  303. uint8_t buffer[sizeof(TPML_HANDLE) + sizeof(TPML_PCR_SELECTION)] = { 0 };
  304. size_t buffer_size = sizeof(buffer);
  305. TSS2_RC rc;
  306. rc = Tss2_MU_TPML_HANDLE_Unmarshal(buffer, buffer_size, NULL, NULL);
  307. assert_int_equal (rc, TSS2_MU_RC_BAD_REFERENCE);
  308. rc = Tss2_MU_TPML_PCR_SELECTION_Unmarshal(buffer, buffer_size, NULL, NULL);
  309. assert_int_equal (rc, TSS2_MU_RC_BAD_REFERENCE);
  310. }
  311. /*
  312. * Test case ensures the offset is updated when dest is NULL
  313. * and offset is valid
  314. */
  315. static void
  316. tpml_unmarshal_dest_null_offset_valid(void **state)
  317. {
  318. uint8_t buffer[sizeof(TPML_HANDLE) + sizeof(TPML_PCR_SELECTION) + 10] = { 0 };
  319. size_t buffer_size = sizeof(buffer);
  320. TPML_HANDLE *ptr;
  321. size_t offset = 0;
  322. TSS2_RC rc;
  323. ptr = (TPML_HANDLE *) (buffer);
  324. ptr->count = HOST_TO_BE_32(2);
  325. ptr->handle[0] = HOST_TO_BE_32(0x81000001);
  326. ptr->handle[1] = HOST_TO_BE_32(0x81000002);
  327. rc = Tss2_MU_TPML_HANDLE_Unmarshal(buffer, buffer_size, &offset, NULL);
  328. assert_int_equal (rc, TSS2_RC_SUCCESS);
  329. assert_int_equal (offset, 4 + 4 + 4);
  330. uint8_t data [] = {
  331. 0, 0, 0, 2,
  332. 0, 0x04, /* TPM2_ALG_SHA1 */
  333. 3,
  334. 0xaa, 0xbb, 0xcc,
  335. 0, 0x0b, /* TPM2_ALG_SHA256 */
  336. 2,
  337. 0xdd, 0xee};
  338. memcpy(buffer + 4 + 4 + 4, &data[0], sizeof(data));
  339. rc = Tss2_MU_TPML_PCR_SELECTION_Unmarshal(buffer, buffer_size, &offset, NULL);
  340. assert_int_equal (rc, TSS2_RC_SUCCESS);
  341. assert_int_equal (offset, 4 + 4 + 4 + 4 + 2 + 1 + 1 + 1 + 1 + 2 + 1 + 1 + 1);
  342. }
  343. /*
  344. * Invalid case with not big enough buffer. Make sure offest is untouched.
  345. */
  346. static void
  347. tpml_unmarshal_buffer_size_lt_data_nad_lt_offset(void **state)
  348. {
  349. uint8_t buffer[sizeof(TPML_HANDLE) + sizeof(TPML_PCR_SELECTION)] = { 0 };
  350. TPML_HANDLE *ptr;
  351. size_t offset = 2;
  352. TSS2_RC rc;
  353. ptr = (TPML_HANDLE *) (buffer + 2);
  354. ptr->count = HOST_TO_BE_32(2);
  355. ptr->handle[0] = HOST_TO_BE_32(0x81000001);
  356. ptr->handle[1] = HOST_TO_BE_32(0x81000002);
  357. rc = Tss2_MU_TPML_HANDLE_Unmarshal(buffer, 3 * 4, &offset, NULL);
  358. assert_int_equal (rc, TSS2_MU_RC_INSUFFICIENT_BUFFER);
  359. assert_int_equal (offset, 2);
  360. uint8_t data [] = {
  361. 0, 0, 0, 2,
  362. 0, 0x04, /* TPM2_ALG_SHA1 */
  363. 3,
  364. 0xaa, 0xbb, 0xcc,
  365. 0, 0x0b, /* TPM2_ALG_SHA256 */
  366. 2,
  367. 0xdd, 0xee};
  368. memcpy(buffer + 2, &data[0], sizeof(data));
  369. rc = Tss2_MU_TPML_PCR_SELECTION_Unmarshal(buffer, 4 + 2 + 1 + 1 + 1 + 1 + 2 + 1 + 1 + 1, &offset, NULL);
  370. assert_int_equal (rc, TSS2_MU_RC_INSUFFICIENT_BUFFER);
  371. assert_int_equal (offset, 2);
  372. }
  373. /*
  374. * Invalid case with too big count
  375. */
  376. static void
  377. tpml_unmarshal_invalid_count(void **state)
  378. {
  379. TPML_HANDLE hndl = {0};
  380. TPML_PCR_SELECTION sel = {0};
  381. uint8_t buffer[sizeof(hndl) + sizeof(sel) + 10] = { 0 };
  382. size_t buffer_size = sizeof(buffer);
  383. TPML_HANDLE *ptr;
  384. TPML_PCR_SELECTION *ptr2;
  385. size_t offset = 0;
  386. TSS2_RC rc;
  387. ptr = (TPML_HANDLE *) (buffer);
  388. ptr->count = HOST_TO_BE_32(TPM2_MAX_CAP_HANDLES + 2);
  389. ptr->handle[0] = HOST_TO_BE_32(0x81000001);
  390. ptr->handle[1] = HOST_TO_BE_32(0x81000002);
  391. rc = Tss2_MU_TPML_HANDLE_Unmarshal(buffer, buffer_size, &offset, &hndl);
  392. assert_int_equal (rc, TSS2_SYS_RC_MALFORMED_RESPONSE);
  393. ptr2 = (TPML_PCR_SELECTION *)(buffer + 4 + 4 + 4);
  394. ptr2->count = HOST_TO_BE_32(TPM2_NUM_PCR_BANKS + 2);
  395. ptr2->pcrSelections[0].hash = HOST_TO_BE_16(TPM2_ALG_SHA1);
  396. ptr2->pcrSelections[0].sizeofSelect = 3;
  397. ptr2->pcrSelections[0].pcrSelect[0] = 0xaa;
  398. ptr2->pcrSelections[0].pcrSelect[1] = 0xbb;
  399. ptr2->pcrSelections[0].pcrSelect[2] = 0xcc;
  400. ptr2->pcrSelections[1].hash = HOST_TO_BE_16(TPM2_ALG_SHA256);
  401. ptr2->pcrSelections[1].sizeofSelect = 2;
  402. ptr2->pcrSelections[1].pcrSelect[0] = 0xdd;
  403. ptr2->pcrSelections[1].pcrSelect[1] = 0xee;
  404. rc = Tss2_MU_TPML_PCR_SELECTION_Unmarshal(buffer, buffer_size, &offset, &sel);
  405. assert_int_equal (rc, TSS2_SYS_RC_MALFORMED_RESPONSE);
  406. }
  407. int main(void) {
  408. const struct CMUnitTest tests[] = {
  409. cmocka_unit_test (tpml_marshal_success),
  410. cmocka_unit_test (tpml_marshal_success_offset),
  411. cmocka_unit_test (tpml_marshal_buffer_null_with_offset),
  412. cmocka_unit_test (tpml_marshal_buffer_null_offset_null),
  413. cmocka_unit_test (tpml_marshal_buffer_size_lt_data_nad_lt_offset),
  414. cmocka_unit_test (tpml_marshal_invalid_count),
  415. cmocka_unit_test (tpml_unmarshal_success),
  416. cmocka_unit_test (tpml_unmarshal_dest_null_buff_null),
  417. cmocka_unit_test (tpml_unmarshal_buffer_null_offset_null),
  418. cmocka_unit_test (tpml_unmarshal_dest_null_offset_valid),
  419. cmocka_unit_test (tpml_unmarshal_buffer_size_lt_data_nad_lt_offset),
  420. cmocka_unit_test (tpml_unmarshal_invalid_count),
  421. };
  422. return cmocka_run_group_tests(tests, NULL, NULL);
  423. }