fapi-json.c 83 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325
  1. /* SPDX-License-Identifier: BSD-2-Clause */
  2. /*******************************************************************************
  3. * Copyright 2018, Fraunhofer SIT sponsored by Infineon Technologies AG
  4. * All rights reserved.
  5. ******************************************************************************/
  6. #ifdef HAVE_CONFIG_H
  7. #include <config.h>
  8. #endif
  9. #include <stdarg.h>
  10. #include <inttypes.h>
  11. #include <string.h>
  12. #include <stdlib.h>
  13. #include <stdio.h>
  14. #include <json-c/json_util.h>
  15. #include <json-c/json_tokener.h>
  16. #include <setjmp.h>
  17. #include <cmocka.h>
  18. #include "tss2_fapi.h"
  19. #include "tpm_json_serialize.h"
  20. #include "tpm_json_deserialize.h"
  21. #include "ifapi_json_serialize.h"
  22. #include "ifapi_json_deserialize.h"
  23. #include "fapi_policy.h"
  24. #include "util/aux_util.h"
  25. #define LOGMODULE tests
  26. #include "util/log.h"
  27. static void
  28. cleanup_policy_element(TPMT_POLICYELEMENT *policy)
  29. {
  30. switch (policy->type) {
  31. case POLICYSECRET:
  32. SAFE_FREE(policy->element.PolicySecret.objectPath);
  33. break;
  34. case POLICYAUTHORIZE:
  35. SAFE_FREE(policy->element.PolicyAuthorize.keyPath);
  36. SAFE_FREE(policy->element.PolicyAuthorize.keyPEM);
  37. break;
  38. case POLICYAUTHORIZENV:
  39. SAFE_FREE( policy->element.PolicyAuthorizeNv.nvPath);
  40. SAFE_FREE( policy->element.PolicyAuthorizeNv.policy_buffer);
  41. break;
  42. case POLICYSIGNED:
  43. SAFE_FREE(policy->element.PolicySigned.keyPath);
  44. SAFE_FREE(policy->element.PolicySigned.keyPEM);
  45. break;
  46. case POLICYPCR:
  47. SAFE_FREE(policy->element.PolicyPCR.pcrs);
  48. break;
  49. case POLICYNV:
  50. SAFE_FREE(policy->element.PolicyNV.nvPath);
  51. break;
  52. case POLICYDUPLICATIONSELECT:
  53. SAFE_FREE(policy->element.PolicyDuplicationSelect.newParentPath);
  54. break;
  55. }
  56. }
  57. static void cleanup_policy_elements(TPML_POLICYELEMENTS *policy)
  58. {
  59. size_t i, j;
  60. if (policy != NULL) {
  61. for (i = 0; i < policy->count; i++) {
  62. if (policy->elements[i].type == POLICYOR) {
  63. /* Policy with sub policies */
  64. TPML_POLICYBRANCHES *branches = policy->elements[i].element.PolicyOr.branches;
  65. for (j = 0; j < branches->count; j++) {
  66. SAFE_FREE(branches->authorizations[j].name);
  67. SAFE_FREE(branches->authorizations[j].description);
  68. cleanup_policy_elements(branches->authorizations[j].policy);
  69. }
  70. SAFE_FREE(branches);
  71. } else {
  72. cleanup_policy_element(&policy->elements[i]);
  73. }
  74. }
  75. SAFE_FREE(policy);
  76. }
  77. }
  78. /** Free memory allocated during deserialization of policy.
  79. *
  80. * The object will not be freed (might be declared on the stack).
  81. *
  82. * @param[in] object The policy to be cleaned up.
  83. *
  84. */
  85. static void ifapi_cleanup_policy(TPMS_POLICY *policy)
  86. {
  87. if (policy) {
  88. SAFE_FREE(policy->description);
  89. SAFE_FREE(policy->policyAuthorizations);
  90. cleanup_policy_elements(policy->policy);
  91. }
  92. }
  93. /* 6 copies of cleanup functions from ifapi_keystore.c */
  94. void
  95. cleanup_ifapi_duplicate(IFAPI_DUPLICATE * duplicate) {
  96. if (duplicate != NULL) {
  97. SAFE_FREE(duplicate->certificate);
  98. }
  99. }
  100. void
  101. cleanup_ifapi_hierarchy(IFAPI_HIERARCHY * hierarchy) {
  102. if (hierarchy != NULL) {
  103. SAFE_FREE(hierarchy->description);
  104. }
  105. }
  106. void
  107. cleanup_ifapi_ext_pub_key(IFAPI_EXT_PUB_KEY * key) {
  108. if (key != NULL) {
  109. SAFE_FREE(key->pem_ext_public);
  110. SAFE_FREE(key->certificate);
  111. }
  112. }
  113. void
  114. cleanup_ifapi_key(IFAPI_KEY * key) {
  115. if (key != NULL) {
  116. SAFE_FREE(key->policyInstance);
  117. SAFE_FREE(key->serialization.buffer);
  118. SAFE_FREE(key->private.buffer);
  119. SAFE_FREE(key->description);
  120. SAFE_FREE(key->certificate);
  121. SAFE_FREE(key->appData.buffer);
  122. }
  123. }
  124. void
  125. cleanup_ifapi_nv(IFAPI_NV * nv) {
  126. if (nv != NULL) {
  127. SAFE_FREE(nv->serialization.buffer);
  128. SAFE_FREE(nv->appData.buffer);
  129. SAFE_FREE(nv->policyInstance);
  130. SAFE_FREE(nv->description);
  131. SAFE_FREE(nv->event_log);
  132. }
  133. }
  134. void
  135. cleanup_ifapi_object(
  136. IFAPI_OBJECT * object)
  137. {
  138. if (object != NULL) {
  139. if (object->objectType != IFAPI_OBJ_NONE) {
  140. if (object->objectType == IFAPI_KEY_OBJ) {
  141. cleanup_ifapi_key(&object->misc.key);
  142. } else if (object->objectType == IFAPI_NV_OBJ) {
  143. cleanup_ifapi_nv(&object->misc.nv);
  144. } else if (object->objectType == IFAPI_DUPLICATE_OBJ) {
  145. cleanup_ifapi_duplicate(&object->misc.key_tree);
  146. } else if (object->objectType == IFAPI_EXT_PUB_KEY_OBJ) {
  147. cleanup_ifapi_ext_pub_key(&object->misc.ext_pub_key);
  148. } else if (object->objectType == IFAPI_HIERARCHY_OBJ) {
  149. cleanup_ifapi_hierarchy(&object->misc.hierarchy);
  150. }
  151. ifapi_cleanup_policy(object->policy);
  152. SAFE_FREE(object->rel_path);
  153. SAFE_FREE(object->policy);
  154. object->objectType = IFAPI_OBJ_NONE;
  155. }
  156. }
  157. }
  158. char * normalize(const char *string) {
  159. char *string2 = malloc(strlen(string)+1);
  160. int i;
  161. int j = 0;
  162. for(i = 0; string[i] != '\0'; i++) {
  163. if ((string[i] != '\n' && string[i] != ' ')) {
  164. string2[j] = string[i];
  165. j += 1;
  166. }
  167. }
  168. string2[j] = '\0';
  169. return string2;
  170. }
  171. #define CHECK_ERROR(TYPE, SRC, RC) \
  172. { \
  173. TYPE out; \
  174. TSS2_RC rc; \
  175. json_object *jso = json_tokener_parse((SRC)); \
  176. assert_non_null(jso); \
  177. rc = ifapi_json_ ## TYPE ## _deserialize (jso, &out); \
  178. assert_int_equal (rc, RC); \
  179. json_object_put(jso); \
  180. }
  181. #define CHECK_ERROR_CLEANUP(TYPE, SRC, RC) \
  182. { \
  183. TYPE out; \
  184. TSS2_RC rc; \
  185. json_object *jso = json_tokener_parse((SRC)); \
  186. memset(&out, 0, sizeof(TYPE)); \
  187. assert_non_null(jso); \
  188. rc = ifapi_json_ ## TYPE ## _deserialize (jso, &out); \
  189. assert_int_equal (rc, RC); \
  190. json_object_put(jso); \
  191. cleanup_ifapi_object(&out); \
  192. }
  193. #define CHECK_JSON2(TYPE, SRC, DST, PSERIALIZE) \
  194. { \
  195. TYPE out; \
  196. TSS2_RC rc; \
  197. json_object *jso = json_tokener_parse((SRC)); \
  198. if (!jso) fprintf(stderr, "JSON parsing failed\n"); \
  199. assert_non_null(jso); \
  200. rc = ifapi_json_ ## TYPE ## _deserialize (jso, &out); \
  201. if (rc) fprintf(stderr, "Deserialization failed\n"); \
  202. assert_int_equal (rc, TSS2_RC_SUCCESS); \
  203. json_object_put(jso); \
  204. jso = NULL; \
  205. rc = ifapi_json_ ## TYPE ## _serialize (PSERIALIZE, &jso); \
  206. assert_int_equal (rc, TSS2_RC_SUCCESS); \
  207. assert_non_null(jso); \
  208. const char *jso_string = json_object_to_json_string_ext(jso, JSON_C_TO_STRING_PRETTY); \
  209. assert_non_null(jso_string); \
  210. char *string1 = normalize(jso_string); \
  211. char *string2 = normalize(DST); \
  212. assert_string_equal(string1, string2); \
  213. json_object_put(jso); \
  214. free(string1); \
  215. free(string2); \
  216. }
  217. #define CHECK_JSON(TYPE, SRC, DST) \
  218. CHECK_JSON2(TYPE, SRC, DST, &out)
  219. #define CHECK_JSON_SIMPLE(TYPE, SRC, DST) \
  220. CHECK_JSON2(TYPE, SRC, DST, out)
  221. #define CHECK_JSON_TO_BIN(TYPE, SRC, DST) \
  222. { \
  223. TYPE out; \
  224. TSS2_RC rc; \
  225. TYPE expected = DST; \
  226. json_object *jso = json_tokener_parse((SRC)); \
  227. assert_non_null(jso); \
  228. rc = ifapi_json_ ## TYPE ## _deserialize (jso, &out); \
  229. assert_int_equal (rc, TSS2_RC_SUCCESS); \
  230. json_object_put(jso); \
  231. assert_true(out == expected); \
  232. }
  233. #define CHECK_BIN2(TYPE, BIN, PSERIALIZE) \
  234. TYPE BIN ## 2; \
  235. { \
  236. char *jso_string1, *jso_string2; \
  237. json_object *jso = NULL; \
  238. TSS2_RC rc = ifapi_json_ ## TYPE ## _serialize (PSERIALIZE, &jso); \
  239. jso_string1 = strdup(json_object_to_json_string_ext(jso, JSON_C_TO_STRING_PRETTY)); \
  240. assert_int_equal (rc, TSS2_RC_SUCCESS); \
  241. rc = ifapi_json_ ## TYPE ## _deserialize (jso, &BIN ## 2); \
  242. assert_int_equal (rc, TSS2_RC_SUCCESS); \
  243. json_object_put(jso); \
  244. jso = NULL; \
  245. rc = ifapi_json_ ## TYPE ## _serialize (PSERIALIZE ## 2, &jso); \
  246. jso_string2 = strdup(json_object_to_json_string_ext(jso, JSON_C_TO_STRING_PRETTY)); \
  247. assert_int_equal (rc, TSS2_RC_SUCCESS); \
  248. if (strcmp(jso_string1, jso_string2)) { \
  249. fprintf(stderr,"\n jso: %s\n", jso_string1); \
  250. fprintf(stderr,"\n jso: %s\n", jso_string2); \
  251. } \
  252. assert_string_equal(jso_string1, jso_string2); \
  253. json_object_put(jso); \
  254. free(jso_string1); \
  255. free(jso_string2); \
  256. }
  257. #define CHECK_BIN(TYPE, BIN) \
  258. CHECK_BIN2(TYPE, BIN, &BIN)
  259. #define CHECK_BIN_SIMPLE(TYPE, BIN) \
  260. CHECK_BIN2(TYPE, BIN, BIN)
  261. static void
  262. check_bin(void **state)
  263. {
  264. TPM2B_PUBLIC inPublicAES = {
  265. .size = 0,
  266. .publicArea = {
  267. .type = TPM2_ALG_SYMCIPHER,
  268. .nameAlg = TPM2_ALG_SHA256,
  269. .objectAttributes = (TPMA_OBJECT_USERWITHAUTH |
  270. TPMA_OBJECT_SIGN_ENCRYPT |
  271. TPMA_OBJECT_DECRYPT),
  272. .authPolicy = {
  273. .size = 0,
  274. },
  275. .parameters.symDetail = {
  276. .sym = {
  277. .algorithm = TPM2_ALG_AES,
  278. .keyBits = {.aes = 128},
  279. .mode = {.aes = TPM2_ALG_CFB}}
  280. },
  281. .unique.sym = {
  282. .size = 0,
  283. .buffer = {}
  284. }
  285. }
  286. };
  287. CHECK_BIN(TPM2B_PUBLIC, inPublicAES);
  288. TPM2B_PUBLIC inPublicECC = {
  289. .size = 0,
  290. .publicArea = {
  291. .type = TPM2_ALG_ECC,
  292. .nameAlg = TPM2_ALG_SHA1,
  293. .objectAttributes = (
  294. TPMA_OBJECT_USERWITHAUTH |
  295. TPMA_OBJECT_RESTRICTED |
  296. TPMA_OBJECT_SIGN_ENCRYPT |
  297. TPMA_OBJECT_FIXEDTPM |
  298. TPMA_OBJECT_FIXEDPARENT |
  299. TPMA_OBJECT_SENSITIVEDATAORIGIN
  300. ),
  301. .authPolicy = {
  302. .size = 0,
  303. },
  304. .parameters.eccDetail = {
  305. .symmetric = {
  306. .algorithm = TPM2_ALG_NULL,
  307. .keyBits.aes = 128,
  308. .mode.aes = TPM2_ALG_ECB,
  309. },
  310. .scheme = {
  311. .scheme = TPM2_ALG_ECDAA,
  312. .details = { .ecdaa = { .hashAlg = TPM2_ALG_SHA256 }},
  313. },
  314. .curveID = TPM2_ECC_BN_P256,
  315. .kdf = { .scheme = TPM2_ALG_NULL, .details = {} }
  316. },
  317. /*
  318. .parameters.asymDetail.symmetric.algorithm = TPM2_ALG_NULL,
  319. */
  320. .unique.ecc = {
  321. .x = { .size = 0, .buffer = {} } ,
  322. .y = { .size = 0, .buffer = {} } ,
  323. },
  324. },
  325. };
  326. CHECK_BIN(TPM2B_PUBLIC, inPublicECC);
  327. TPM2B_PUBLIC inPublicECC_MGF1 = inPublicECC;
  328. inPublicECC_MGF1.publicArea.parameters.eccDetail.kdf.scheme = TPM2_ALG_MGF1;
  329. inPublicECC_MGF1.publicArea.parameters.eccDetail.kdf.details.mgf1.hashAlg = TPM2_ALG_SHA256;
  330. CHECK_BIN(TPM2B_PUBLIC, inPublicECC_MGF1);
  331. TPM2B_PUBLIC inPublicECC_KDF12 = inPublicECC;
  332. inPublicECC_KDF12.publicArea.parameters.eccDetail.kdf.scheme = TPM2_ALG_KDF1_SP800_56A;
  333. inPublicECC_KDF12.publicArea.parameters.eccDetail.kdf.details.kdf1_sp800_56a.hashAlg = TPM2_ALG_SHA256;
  334. CHECK_BIN(TPM2B_PUBLIC, inPublicECC_KDF12);
  335. TPM2B_PUBLIC inPublicECC_KDF13 = inPublicECC;
  336. inPublicECC_KDF13.publicArea.parameters.eccDetail.kdf.scheme = TPM2_ALG_KDF1_SP800_108;
  337. inPublicECC_KDF13.publicArea.parameters.eccDetail.kdf.details.kdf1_sp800_108.hashAlg = TPM2_ALG_SHA256;
  338. CHECK_BIN(TPM2B_PUBLIC, inPublicECC_KDF13);
  339. TPM2B_PUBLIC inPublicRSA2 = {
  340. .size = 0,
  341. .publicArea = {
  342. .type = TPM2_ALG_RSA,
  343. .nameAlg = TPM2_ALG_SHA1,
  344. .objectAttributes = (TPMA_OBJECT_USERWITHAUTH |
  345. TPMA_OBJECT_SIGN_ENCRYPT |
  346. TPMA_OBJECT_FIXEDTPM |
  347. TPMA_OBJECT_FIXEDPARENT |
  348. TPMA_OBJECT_SENSITIVEDATAORIGIN),
  349. .authPolicy = {
  350. .size = 0,
  351. },
  352. .parameters.rsaDetail = {
  353. .symmetric = {
  354. .algorithm = TPM2_ALG_NULL,
  355. .keyBits.aes = 128,
  356. .mode.aes = TPM2_ALG_CFB},
  357. .scheme = {
  358. .scheme = TPM2_ALG_RSAPSS,
  359. .details = {
  360. .rsapss = { .hashAlg = TPM2_ALG_SHA1 }
  361. }
  362. },
  363. .keyBits = 2048,
  364. .exponent = 0,
  365. },
  366. .unique.rsa = {
  367. .size = 0,
  368. .buffer = {},
  369. },
  370. },
  371. };
  372. TPMS_SIGNATURE_ECC ecc_signature = {
  373. .hash = TPM2_ALG_SHA1,
  374. .signatureR = {
  375. .size = 32,
  376. .buffer = {
  377. 0x25, 0xdb, 0x1f, 0x8b, 0xbc, 0xfa, 0xbc, 0x31,
  378. 0xf8, 0x17, 0x6a, 0xcb, 0xb2, 0xf8, 0x40, 0xa3,
  379. 0xb6, 0xa5, 0xd3, 0x40, 0x65, 0x9d, 0x37, 0xee,
  380. 0xd9, 0xfd, 0x52, 0x47, 0xf5, 0x14, 0xd5, 0x98
  381. },
  382. },
  383. .signatureS = {
  384. .size = 32,
  385. .buffer = {
  386. 0xed, 0x62, 0x3e, 0x3d, 0xd2, 0x09, 0x08, 0xcf,
  387. 0x58, 0x3c, 0x81, 0x4b, 0xbf, 0x65, 0x7e, 0x08,
  388. 0xab, 0x9f, 0x40, 0xff, 0xea, 0x51, 0xda, 0x21,
  389. 0x29, 0x8c, 0xe2, 0x4d, 0xeb, 0x34, 0x4c, 0xcc
  390. }
  391. }
  392. };
  393. CHECK_BIN(TPMS_SIGNATURE_ECC, ecc_signature);
  394. CHECK_BIN(TPM2B_PUBLIC, inPublicRSA2);
  395. TPMT_SIG_SCHEME ecc_scheme_ecdsa = { .scheme = TPM2_ALG_ECDSA, .details.ecdsa = TPM2_ALG_SHA1 };
  396. CHECK_BIN(TPMT_SIG_SCHEME, ecc_scheme_ecdsa);
  397. TPMT_SIG_SCHEME ecc_scheme_ecdaa = { .scheme = TPM2_ALG_ECDAA, .details.ecdaa = TPM2_ALG_SHA1 };
  398. CHECK_BIN(TPMT_SIG_SCHEME, ecc_scheme_ecdaa);
  399. TPMT_SIG_SCHEME rsa_scheme_rsapss = { .scheme = TPM2_ALG_RSAPSS, .details.rsapss = TPM2_ALG_SHA1 };
  400. CHECK_BIN(TPMT_SIG_SCHEME, rsa_scheme_rsapss);
  401. TPMT_SIG_SCHEME rsa_scheme_rsassa = { .scheme = TPM2_ALG_RSASSA, .details.rsassa = TPM2_ALG_SHA1 };
  402. CHECK_BIN(TPMT_SIG_SCHEME, rsa_scheme_rsassa);
  403. TPMT_SIG_SCHEME sm2_scheme = { .scheme = TPM2_ALG_SM2, .details.sm2 = TPM2_ALG_SHA1 };
  404. CHECK_BIN(TPMT_SIG_SCHEME, sm2_scheme);
  405. TPMT_SIG_SCHEME hmac_scheme = { .scheme = TPM2_ALG_HMAC, .details.hmac = TPM2_ALG_SHA1 };
  406. CHECK_BIN(TPMT_SIG_SCHEME, hmac_scheme);
  407. TPMT_SIG_SCHEME ecschnorr_scheme = { .scheme = TPM2_ALG_ECSCHNORR, .details.ecschnorr = TPM2_ALG_SHA1 };
  408. CHECK_BIN(TPMT_SIG_SCHEME, ecschnorr_scheme);
  409. TPMT_SIG_SCHEME rsa_scheme = { .scheme = TPM2_ALG_NULL };
  410. CHECK_BIN(TPMT_SIG_SCHEME, rsa_scheme);
  411. TPMA_NV testNV = 0xffffff0f ;
  412. CHECK_BIN_SIMPLE(TPMA_NV, testNV);
  413. TPML_PCR_SELECTION pcr_selection = {
  414. .count = 3,
  415. .pcrSelections = {
  416. {
  417. .hash = TPM2_ALG_SHA1,
  418. .sizeofSelect = 3,
  419. .pcrSelect = { 01, 00, 03 }},
  420. {
  421. .hash = TPM2_ALG_SHA256,
  422. .sizeofSelect = 3,
  423. .pcrSelect = { 01 ,00 ,03 }},
  424. {
  425. .hash = TPM2_ALG_SHA384,
  426. .sizeofSelect = 3,
  427. .pcrSelect = { 02, 00, 02 }}
  428. }
  429. };
  430. CHECK_BIN(TPML_PCR_SELECTION, pcr_selection);
  431. IFAPI_IMA_EVENT imaEvent = {
  432. .eventData = {
  433. .size = 0,
  434. .buffer = { 0 }
  435. },
  436. .eventName = "Event"
  437. };
  438. CHECK_BIN(IFAPI_IMA_EVENT, imaEvent);
  439. free(imaEvent2.eventName);
  440. }
  441. static void
  442. check_policy_bin(void **state)
  443. {
  444. TPMS_PCRVALUE pcr_value;
  445. TPML_PCRVALUES *pcr_value_list;
  446. TPML_POLICYBRANCHES *or_branch_list;
  447. TPMS_POLICYPCR pcr_policy;
  448. TPMT_POLICYELEMENT policy_element0;
  449. TPMT_POLICYELEMENT policy_element1;
  450. TPMT_POLICYELEMENT policy_element_or;
  451. TPML_POLICYELEMENTS *policy_elements_or;
  452. TPML_POLICYELEMENTS *policy_elements0;
  453. TPML_POLICYELEMENTS *policy_elements1;
  454. TPMS_POLICY policy;
  455. TPMS_POLICYBRANCH branch0;
  456. TPMS_POLICYBRANCH branch1;
  457. pcr_value.pcr = 16;
  458. pcr_value.hashAlg = TPM2_ALG_SHA1;
  459. memset(&pcr_value.digest, 0, sizeof(TPMU_HA));
  460. memset(&pcr_policy, 0, sizeof(TPMS_POLICYPCR));
  461. pcr_value_list = calloc(1, sizeof(TPML_PCRVALUES) + sizeof(TPMS_PCRVALUE));
  462. if (pcr_value_list == NULL) {
  463. LOG_ERROR("%s", "Out of memory.");
  464. return;
  465. }
  466. pcr_value_list->count = 1;
  467. pcr_value_list->pcrs[0] = pcr_value;
  468. pcr_policy.pcrs = pcr_value_list;
  469. memset(&policy_element0, 0, sizeof(TPMT_POLICYELEMENT));
  470. policy_element0.element.PolicyPCR = pcr_policy;
  471. policy_element0.type = POLICYPCR;
  472. memset(&policy_element1, 0, sizeof(TPMT_POLICYELEMENT));
  473. policy_element1.element.PolicyPCR = pcr_policy;
  474. policy_element1.type = POLICYPCR;
  475. policy_elements0 = calloc(1, sizeof(TPML_POLICYELEMENTS) + sizeof(TPMT_POLICYELEMENT));
  476. if (policy_elements0 == NULL) {
  477. LOG_ERROR("%s", "Out of memory.");
  478. if (pcr_policy.pcrs){
  479. free(pcr_policy.pcrs);
  480. }
  481. return;
  482. }
  483. policy_elements0->count = 1;
  484. policy_elements0->elements[0] = policy_element0;
  485. policy.policy = policy_elements0;
  486. policy.description = "hareness description";
  487. policy.policyAuthorizations = NULL;
  488. memset(&policy.policyDigests, 0, sizeof(TPML_DIGEST_VALUES));
  489. //CHECK_BIN(TPMS_POLICY, policy);
  490. {
  491. char *jso_string1, *jso_string2;
  492. json_object *jso = NULL;
  493. TSS2_RC rc = ifapi_json_TPMS_POLICY_serialize (&policy, &jso);
  494. jso_string1 = strdup(json_object_to_json_string_ext(jso, JSON_C_TO_STRING_PRETTY));
  495. assert_int_equal (rc, TSS2_RC_SUCCESS);
  496. rc = ifapi_json_TPMS_POLICY_deserialize (jso, &policy);
  497. assert_int_equal (rc, TSS2_RC_SUCCESS);
  498. json_object_put(jso);
  499. jso = NULL;
  500. rc = ifapi_json_TPMS_POLICY_serialize (&policy, &jso);
  501. jso_string2 = strdup(json_object_to_json_string_ext(jso, JSON_C_TO_STRING_PRETTY));
  502. assert_int_equal (rc, TSS2_RC_SUCCESS);
  503. if (strcmp(jso_string1, jso_string2)) {
  504. fprintf(stderr,"\n jso: %s\n", jso_string1);
  505. fprintf(stderr,"\n jso: %s\n", jso_string2);
  506. }
  507. assert_string_equal(jso_string1, jso_string2);
  508. json_object_put(jso);
  509. free(jso_string1);
  510. free(jso_string2);
  511. }
  512. ifapi_cleanup_policy(&policy);
  513. or_branch_list = calloc(2, sizeof(TPML_POLICYBRANCHES) + (2 * sizeof(TPMS_POLICYBRANCH)));
  514. if (or_branch_list == NULL) {
  515. LOG_ERROR("%s", "Out of memory.");
  516. return;
  517. }
  518. or_branch_list->count = 2;
  519. policy_elements1 = calloc(1, sizeof(TPML_POLICYELEMENTS) + sizeof(TPMT_POLICYELEMENT));
  520. if (policy_elements1 == NULL) {
  521. LOG_ERROR("%s", "Out of memory.");
  522. if (or_branch_list){
  523. free(or_branch_list);
  524. }
  525. return;
  526. }
  527. policy_elements1->count = 1;
  528. policy_elements1->elements[0] = policy_element1;
  529. memset(&branch0, 0, sizeof(TPMS_POLICYBRANCH));
  530. memset(&branch1, 0, sizeof(TPMS_POLICYBRANCH));
  531. branch0.policy = policy_elements0;
  532. branch0.name = "branch0";
  533. branch0.description = "description branch 0";
  534. branch1.policy = policy_elements1;
  535. branch1.name = "branch1";
  536. branch1.description = "description branch 1";
  537. memcpy(&or_branch_list->authorizations[0], &branch0, sizeof(TPMS_POLICYBRANCH));
  538. memcpy(&or_branch_list->authorizations[1], &branch1, sizeof(TPMS_POLICYBRANCH));
  539. //or_policy.pcrs = pcr_branch_list;
  540. policy_elements_or = calloc(1, sizeof(TPML_POLICYELEMENTS) + sizeof(TPMT_POLICYELEMENT));
  541. if (policy_elements_or == NULL) {
  542. LOG_ERROR("%s", "Out of memory.");
  543. if (or_branch_list) {
  544. free(or_branch_list);
  545. }
  546. return;
  547. }
  548. policy_elements_or->count = 1;
  549. memset(&policy_element_or, 0, sizeof(TPMT_POLICYELEMENT));
  550. policy_element_or.element.PolicyOr.branches = or_branch_list;
  551. policy_element_or.type = POLICYOR;
  552. policy_elements_or->elements[0] = policy_element_or;
  553. policy.policy = policy_elements_or;
  554. //CHECK_BIN(TPMS_POLICY, policy);
  555. {
  556. char *jso_string1, *jso_string2;
  557. json_object *jso = NULL;
  558. TSS2_RC rc = ifapi_json_TPMS_POLICY_serialize (&policy, &jso);
  559. jso_string1 = strdup(json_object_to_json_string_ext(jso, JSON_C_TO_STRING_PRETTY));
  560. assert_int_equal (rc, TSS2_RC_SUCCESS);
  561. rc = ifapi_json_TPMS_POLICY_deserialize (jso, &policy);
  562. assert_int_equal (rc, TSS2_RC_SUCCESS);
  563. json_object_put(jso);
  564. jso = NULL;
  565. rc = ifapi_json_TPMS_POLICY_serialize (&policy, &jso);
  566. jso_string2 = strdup(json_object_to_json_string_ext(jso, JSON_C_TO_STRING_PRETTY));
  567. assert_int_equal (rc, TSS2_RC_SUCCESS);
  568. if (strcmp(jso_string1, jso_string2)) {
  569. fprintf(stderr,"\n jso: %s\n", jso_string1);
  570. fprintf(stderr,"\n jso: %s\n", jso_string2);
  571. }
  572. assert_string_equal(jso_string1, jso_string2);
  573. json_object_put(jso);
  574. free(jso_string1);
  575. free(jso_string2);
  576. }
  577. ifapi_cleanup_policy(&policy);
  578. free(policy_elements_or);
  579. free(policy_elements0);
  580. free(policy_elements1);
  581. free(or_branch_list);
  582. free(pcr_value_list);
  583. }
  584. static void
  585. check_json_to_bin(void **state)
  586. {
  587. CHECK_JSON_TO_BIN(UINT64, "22147483647", 22147483647);
  588. CHECK_JSON_TO_BIN(UINT64, "\"0xffffffff\"", 0xffffffff);
  589. CHECK_JSON_TO_BIN(UINT64, "\"0xfffffffff\"", 0xfffffffff);
  590. CHECK_JSON_TO_BIN(UINT32, "\"0xFfffffff\"", 0xffffffff);
  591. CHECK_JSON_TO_BIN(UINT16, "\"0xffff\"", 0xffff);
  592. }
  593. static void
  594. check_json_structs(void **state)
  595. {
  596. const char *test_json_TPMS_POLICYTEMPLATE =
  597. "{\n"
  598. " \"templateHash\": \"0011223344556677889900112233445566778899\"\n"
  599. "}";
  600. CHECK_JSON(TPMS_POLICYTEMPLATE, test_json_TPMS_POLICYTEMPLATE, test_json_TPMS_POLICYTEMPLATE);
  601. const char *test_json_TPM2B_PUBLIC_expected =
  602. "{\n"
  603. " \"size\":0,\n"
  604. " \"publicArea\":{\n"
  605. " \"type\":\"ECC\",\n"
  606. " \"nameAlg\":\"SHA1\",\n"
  607. "\"objectAttributes\":{"
  608. " \"fixedTPM\":1,"
  609. " \"stClear\":0,"
  610. " \"fixedParent\":1,"
  611. " \"sensitiveDataOrigin\":1,"
  612. " \"userWithAuth\":1,"
  613. " \"adminWithPolicy\":0,"
  614. " \"noDA\":0,"
  615. " \"encryptedDuplication\":0,"
  616. " \"restricted\":1,"
  617. " \"decrypt\":0,"
  618. " \"sign\":1"
  619. " },"
  620. " \"authPolicy\":\"\",\n"
  621. " \"parameters\":{\n"
  622. " \"symmetric\":{\n"
  623. " \"algorithm\":\"NULL\"\n"
  624. " },\n"
  625. " \"scheme\":{\n"
  626. " \"scheme\":\"ECDAA\",\n"
  627. " \"details\":{\n"
  628. " \"hashAlg\":\"SHA256\",\n"
  629. " \"count\":0\n"
  630. " }\n"
  631. " },\n"
  632. " \"curveID\":\"BN_P256\",\n"
  633. " \"kdf\":{\n"
  634. " \"scheme\":\"NULL\"\n"
  635. " }\n"
  636. " },\n"
  637. " \"unique\":{\n"
  638. " \"x\": \"\",\n"
  639. " \"y\": \"\"\n"
  640. " }\n"
  641. " }\n"
  642. "}";
  643. const char *test_json_TPM2B_PUBLIC_src=
  644. "{"
  645. " \"size\":0,"
  646. " \"publicArea\":{"
  647. " \"type\":\"ECC\","
  648. " \"nameAlg\":\"SHA1\","
  649. " \"objectAttributes\":["
  650. " \"fixedTPM\","
  651. " \"fixedParent\","
  652. " \"sensitiveDataOrigin\","
  653. " \"userWithAuth\","
  654. " \"restricted\","
  655. " \"sign\""
  656. " ],"
  657. " \"authPolicy\":\"\","
  658. " \"parameters\":{"
  659. " \"symmetric\":{"
  660. " \"algorithm\":\"NULL\""
  661. " },"
  662. " \"scheme\":{"
  663. " \"scheme\":\"ECDAA\","
  664. " \"details\":{"
  665. " \"hashAlg\":\"SHA256\","
  666. " \"count\":0"
  667. " }"
  668. " },"
  669. " \"curveID\":\"ECC_BN_P256\","
  670. " \"kdf\":{"
  671. " \"scheme\":\"NULL\""
  672. " }"
  673. " },"
  674. " \"unique\":{"
  675. " \"x\": \"\",\n"
  676. " \"y\": \"\"\n"
  677. " }"
  678. " }"
  679. "}"
  680. "";
  681. const char *test_json_TPM2B_PUBLIC_dwnc_src =
  682. "{"
  683. " \"size\":0,"
  684. " \"publicArea\":{"
  685. " \"type\":\"ecc\","
  686. " \"nameAlg\":\"sha1\","
  687. " \"objectAttributes\":["
  688. " \"fixedTPM\","
  689. " \"fixedParent\","
  690. " \"sensitiveDataOrigin\","
  691. " \"userWithAuth\","
  692. " \"restricted\","
  693. " \"sign\""
  694. " ],"
  695. " \"authPolicy\":\"\","
  696. " \"parameters\":{"
  697. " \"symmetric\":{"
  698. " \"algorithm\":\"null\""
  699. " },"
  700. " \"scheme\":{"
  701. " \"scheme\":\"ecdaa\","
  702. " \"details\":{"
  703. " \"hashAlg\":\"sha256\","
  704. " \"count\":0"
  705. " }"
  706. " },"
  707. " \"curveID\":\"ecc_BN_P256\","
  708. " \"kdf\":{"
  709. " \"scheme\":\"null\""
  710. " }"
  711. " },"
  712. " \"unique\":{"
  713. " \"x\": \"\",\n"
  714. " \"y\": \"\"\n"
  715. " }"
  716. " }"
  717. " }"
  718. "}"
  719. "";
  720. CHECK_JSON(TPM2B_PUBLIC, test_json_TPM2B_PUBLIC_src, test_json_TPM2B_PUBLIC_expected);
  721. CHECK_JSON(TPM2B_PUBLIC, test_json_TPM2B_PUBLIC_dwnc_src, test_json_TPM2B_PUBLIC_expected);
  722. const char *test_json_TPMS_ATTEST_certify_src =
  723. "{\n"
  724. " \"magic\": \"0xff544347\",\n"
  725. " \"type\": \"ST_ATTEST_CERTIFY\",\n"
  726. " \"qualifiedSigner\": \"0x00010203040506070809a0a1a2a3a4a5a6a7a8a9\",\n"
  727. " \"extraData\": \"0x00010203040506070809b0b1b2b3b4b5b6b7b8b9\",\n"
  728. " \"clockInfo\": {\n"
  729. " \"clock\": 123,\n"
  730. " \"resetCount\": 23,\n"
  731. " \"restartCount\": 1,\n"
  732. " \"safe\": \"yes\"\n"
  733. " },\n"
  734. " \"firmwareVersion\": 783,\n"
  735. " \"attested\": {\n"
  736. " \"name\": \"0x00010203040506070809c0c1c2c3c4c5c6c7c8c9\",\n"
  737. " \"qualifiedName\": \"0x00010203040506070809d0d1d2d3d4d5d6d7d8d9\"\n"
  738. " }\n"
  739. "}";
  740. const char *test_json_TPMS_ATTEST_certify_expt =
  741. "{\n"
  742. " \"magic\": \"VALUE\",\n"
  743. " \"type\": \"ATTEST_CERTIFY\",\n"
  744. " \"qualifiedSigner\": \"00010203040506070809a0a1a2a3a4a5a6a7a8a9\",\n"
  745. " \"extraData\": \"00010203040506070809b0b1b2b3b4b5b6b7b8b9\",\n"
  746. " \"clockInfo\": {\n"
  747. " \"clock\": 123,\n"
  748. " \"resetCount\": 23,\n"
  749. " \"restartCount\": 1,\n"
  750. " \"safe\": \"YES\"\n"
  751. " },\n"
  752. " \"firmwareVersion\": 783,\n"
  753. " \"attested\": {\n"
  754. " \"name\": \"00010203040506070809c0c1c2c3c4c5c6c7c8c9\",\n"
  755. " \"qualifiedName\": \"00010203040506070809d0d1d2d3d4d5d6d7d8d9\"\n"
  756. " }\n"
  757. "}";
  758. CHECK_JSON(TPMS_ATTEST, test_json_TPMS_ATTEST_certify_src, test_json_TPMS_ATTEST_certify_expt);
  759. const char *test_json_TPMS_ATTEST_sessionaudit_src =
  760. "{\n"
  761. " \"magic\": \"0xff544347\",\n"
  762. " \"type\": \"ST_ATTEST_SESSION_AUDIT\",\n"
  763. " \"qualifiedSigner\": \"0x00010203040506070809a0a1a2a3a4a5a6a7a8a9\",\n"
  764. " \"extraData\": \"0x00010203040506070809b0b1b2b3b4b5b6b7b8b9\",\n"
  765. " \"clockInfo\": {\n"
  766. " \"clock\": [12345,0],\n"
  767. " \"resetCount\": 23,\n"
  768. " \"restartCount\": 1,\n"
  769. " \"safe\": \"yes\"\n"
  770. " },\n"
  771. " \"firmwareVersion\": [783783,0],\n"
  772. " \"attested\": {\n"
  773. " \"exclusiveSession\": \"yes\",\n"
  774. " \"sessionDigest\": \"0x00010203040506070809d0d1d2d3d4d5d6d7d8d9\"\n"
  775. " }\n"
  776. "}";
  777. const char *test_json_TPMS_ATTEST_sessionaudit_expt =
  778. "{\n"
  779. " \"magic\": \"VALUE\",\n"
  780. " \"type\": \"ATTEST_SESSION_AUDIT\",\n"
  781. " \"qualifiedSigner\": \"00010203040506070809a0a1a2a3a4a5a6a7a8a9\",\n"
  782. " \"extraData\": \"00010203040506070809b0b1b2b3b4b5b6b7b8b9\",\n"
  783. " \"clockInfo\": {\n"
  784. " \"clock\": 53021371269120,\n"
  785. " \"resetCount\": 23,\n"
  786. " \"restartCount\": 1,\n"
  787. " \"safe\": \"YES\"\n"
  788. " },\n"
  789. " \"firmwareVersion\": [783783,0],\n"
  790. " \"attested\": {\n"
  791. " \"exclusiveSession\": \"YES\",\n"
  792. " \"sessionDigest\": \"00010203040506070809d0d1d2d3d4d5d6d7d8d9\"\n"
  793. " }\n"
  794. "}";
  795. CHECK_JSON(TPMS_ATTEST, test_json_TPMS_ATTEST_sessionaudit_src, test_json_TPMS_ATTEST_sessionaudit_expt);
  796. const char *test_json_TPMS_ATTEST_certifycreation_src =
  797. "{\n"
  798. " \"magic\": \"0xff544347\",\n"
  799. " \"type\": \"ST_ATTEST_CREATION\",\n"
  800. " \"qualifiedSigner\": \"0x00010203040506070809a0a1a2a3a4a5a6a7a8a9\",\n"
  801. " \"extraData\": \"0x00010203040506070809b0b1b2b3b4b5b6b7b8b9\",\n"
  802. " \"clockInfo\": {\n"
  803. " \"clock\": 123,\n"
  804. " \"resetCount\": 23,\n"
  805. " \"restartCount\": 1,\n"
  806. " \"safe\": \"yes\"\n"
  807. " },\n"
  808. " \"firmwareVersion\": [0,783],\n"
  809. " \"attested\": {\n"
  810. " \"objectName\": \"0x00010203040506070809c0c1c2c3c4c5c6c7c8c9\",\n"
  811. " \"creationHash\": \"0x00010203040506070809d0d1d2d3d4d5d6d7d8d9\"\n"
  812. " }\n"
  813. "}";
  814. const char *test_json_TPMS_ATTEST_certifycreation_expt =
  815. "{\n"
  816. " \"magic\": \"VALUE\",\n"
  817. " \"type\": \"ATTEST_CREATION\",\n"
  818. " \"qualifiedSigner\": \"00010203040506070809a0a1a2a3a4a5a6a7a8a9\",\n"
  819. " \"extraData\": \"00010203040506070809b0b1b2b3b4b5b6b7b8b9\",\n"
  820. " \"clockInfo\": {\n"
  821. " \"clock\": 123,\n"
  822. " \"resetCount\": 23,\n"
  823. " \"restartCount\": 1,\n"
  824. " \"safe\": \"YES\"\n"
  825. " },\n"
  826. " \"firmwareVersion\": 783,\n"
  827. " \"attested\": {\n"
  828. " \"objectName\": \"00010203040506070809c0c1c2c3c4c5c6c7c8c9\",\n"
  829. " \"creationHash\": \"00010203040506070809d0d1d2d3d4d5d6d7d8d9\"\n"
  830. " }\n"
  831. "}";
  832. CHECK_JSON(TPMS_ATTEST, test_json_TPMS_ATTEST_certifycreation_src, test_json_TPMS_ATTEST_certifycreation_expt);
  833. const char *test_json_TPMS_ATTEST_commandaudit_src =
  834. "{\n"
  835. " \"magic\": \"0xff544347\",\n"
  836. " \"type\": \"ST_ATTEST_COMMAND_AUDIT\",\n"
  837. " \"qualifiedSigner\": \"0x00010203040506070809a0a1a2a3a4a5a6a7a8a9\",\n"
  838. " \"extraData\": \"0x00010203040506070809b0b1b2b3b4b5b6b7b8b9\",\n"
  839. " \"clockInfo\": {\n"
  840. " \"clock\": 123,\n"
  841. " \"resetCount\": 23,\n"
  842. " \"restartCount\": 1,\n"
  843. " \"safe\": \"yes\"\n"
  844. " },\n"
  845. " \"firmwareVersion\": 783,\n"
  846. " \"attested\": {\n"
  847. " \"auditCounter\": 456,\n"
  848. " \"digestAlg\": \"sha1\",\n"
  849. " \"auditDigest\": \"0x00010203040506070809c0c1c2c3c4c5c6c7c8c9\",\n"
  850. " \"commandDigest\": \"0x00010203040506070809d0d1d2d3d4d5d6d7d8d9\"\n"
  851. " }\n"
  852. "}";
  853. const char *test_json_TPMS_ATTEST_commandaudit_expt =
  854. "{\n"
  855. " \"magic\": \"VALUE\",\n"
  856. " \"type\": \"ATTEST_COMMAND_AUDIT\",\n"
  857. " \"qualifiedSigner\": \"00010203040506070809a0a1a2a3a4a5a6a7a8a9\",\n"
  858. " \"extraData\": \"00010203040506070809b0b1b2b3b4b5b6b7b8b9\",\n"
  859. " \"clockInfo\": {\n"
  860. " \"clock\": 123,\n"
  861. " \"resetCount\": 23,\n"
  862. " \"restartCount\": 1,\n"
  863. " \"safe\": \"YES\"\n"
  864. " },\n"
  865. " \"firmwareVersion\": 783,\n"
  866. " \"attested\": {\n"
  867. " \"auditCounter\": 456,\n"
  868. " \"digestAlg\": \"SHA1\",\n"
  869. " \"auditDigest\": \"00010203040506070809c0c1c2c3c4c5c6c7c8c9\",\n"
  870. " \"commandDigest\": \"00010203040506070809d0d1d2d3d4d5d6d7d8d9\"\n"
  871. " }\n"
  872. "}";
  873. CHECK_JSON(TPMS_ATTEST, test_json_TPMS_ATTEST_commandaudit_src, test_json_TPMS_ATTEST_commandaudit_expt);
  874. const char *test_json_TPMS_ATTEST_time_src =
  875. "{\n"
  876. " \"magic\": \"0xff544347\",\n"
  877. " \"type\": \"ST_ATTEST_TIME\",\n"
  878. " \"qualifiedSigner\": \"0x00010203040506070809a0a1a2a3a4a5a6a7a8a9\",\n"
  879. " \"extraData\": \"0x00010203040506070809b0b1b2b3b4b5b6b7b8b9\",\n"
  880. " \"clockInfo\": {\n"
  881. " \"clock\": 123,\n"
  882. " \"resetCount\": 23,\n"
  883. " \"restartCount\": 1,\n"
  884. " \"safe\": \"yes\"\n"
  885. " },\n"
  886. " \"firmwareVersion\": 783,\n"
  887. " \"attested\": {\n"
  888. " \"time\": {\n"
  889. " \"time\": 234,\n"
  890. " \"clockInfo\": {\n"
  891. " \"clock\": 123,\n"
  892. " \"resetCount\": 23,\n"
  893. " \"restartCount\": 1,\n"
  894. " \"safe\": \"yes\"\n"
  895. " }\n"
  896. " },\n"
  897. " \"firmwareVersion\": 783\n"
  898. " }\n"
  899. "}";
  900. const char *test_json_TPMS_ATTEST_time_expt =
  901. "{\n"
  902. " \"magic\": \"VALUE\",\n"
  903. " \"type\": \"ATTEST_TIME\",\n"
  904. " \"qualifiedSigner\": \"00010203040506070809a0a1a2a3a4a5a6a7a8a9\",\n"
  905. " \"extraData\": \"00010203040506070809b0b1b2b3b4b5b6b7b8b9\",\n"
  906. " \"clockInfo\": {\n"
  907. " \"clock\": 123,\n"
  908. " \"resetCount\": 23,\n"
  909. " \"restartCount\": 1,\n"
  910. " \"safe\": \"YES\"\n"
  911. " },\n"
  912. " \"firmwareVersion\": 783,\n"
  913. " \"attested\": {\n"
  914. " \"time\": {\n"
  915. " \"time\": 234,\n"
  916. " \"clockInfo\": {\n"
  917. " \"clock\": 123,\n"
  918. " \"resetCount\": 23,\n"
  919. " \"restartCount\": 1,\n"
  920. " \"safe\": \"YES\"\n"
  921. " }\n"
  922. " },\n"
  923. " \"firmwareVersion\": 783\n"
  924. " }\n"
  925. "}";
  926. CHECK_JSON(TPMS_ATTEST, test_json_TPMS_ATTEST_time_src, test_json_TPMS_ATTEST_time_expt);
  927. const char *test_json_TPMS_ATTEST_certifynv_src =
  928. "{\n"
  929. " \"magic\": \"0xff544347\",\n"
  930. " \"type\": \"ST_ATTEST_NV\",\n"
  931. " \"qualifiedSigner\": \"0x00010203040506070809a0a1a2a3a4a5a6a7a8a9\",\n"
  932. " \"extraData\": \"0x00010203040506070809b0b1b2b3b4b5b6b7b8b9\",\n"
  933. " \"clockInfo\": {\n"
  934. " \"clock\": 123,\n"
  935. " \"resetCount\": 23,\n"
  936. " \"restartCount\": 1,\n"
  937. " \"safe\": \"yes\"\n"
  938. " },\n"
  939. " \"firmwareVersion\": 783,\n"
  940. " \"attested\": {\n"
  941. " \"indexName\": \"0x00010203040506070809c0c1c2c3c4c5c6c7c8c9\",\n"
  942. " \"offset\": 10,\n"
  943. " \"nvContents\": \"0x00010203040506070809d0d1d2d3d4d5d6d7d8d9\"\n"
  944. " }\n"
  945. "}";
  946. const char *test_json_TPMS_ATTEST_certifynv_expt =
  947. "{\n"
  948. " \"magic\": \"VALUE\",\n"
  949. " \"type\": \"ATTEST_NV\",\n"
  950. " \"qualifiedSigner\": \"00010203040506070809a0a1a2a3a4a5a6a7a8a9\",\n"
  951. " \"extraData\": \"00010203040506070809b0b1b2b3b4b5b6b7b8b9\",\n"
  952. " \"clockInfo\": {\n"
  953. " \"clock\": 123,\n"
  954. " \"resetCount\": 23,\n"
  955. " \"restartCount\": 1,\n"
  956. " \"safe\": \"YES\"\n"
  957. " },\n"
  958. " \"firmwareVersion\": 783,\n"
  959. " \"attested\": {\n"
  960. " \"indexName\": \"00010203040506070809c0c1c2c3c4c5c6c7c8c9\",\n"
  961. " \"offset\": 10,\n"
  962. " \"nvContents\": \"00010203040506070809d0d1d2d3d4d5d6d7d8d9\"\n"
  963. " }\n"
  964. "}";
  965. CHECK_JSON(TPMS_ATTEST, test_json_TPMS_ATTEST_certifynv_src, test_json_TPMS_ATTEST_certifynv_expt);
  966. const char *test_json_TPMT_KEYEDHASH_SCHEME_hmac_src =
  967. "{\n"
  968. " \"scheme\": \"HMAC\",\n"
  969. " \"details\": {\n"
  970. " \"hashAlg\": \"SHA256\"\n"
  971. " }\n"
  972. "}";
  973. const char *test_json_TPMT_KEYEDHASH_SCHEME_hmac_expt =
  974. "{\n"
  975. " \"scheme\": \"HMAC\",\n"
  976. " \"details\": {\n"
  977. " \"hashAlg\": \"SHA256\"\n"
  978. " }\n"
  979. "}";
  980. CHECK_JSON(TPMT_KEYEDHASH_SCHEME, test_json_TPMT_KEYEDHASH_SCHEME_hmac_src, test_json_TPMT_KEYEDHASH_SCHEME_hmac_expt);
  981. const char *test_json_TPMT_KEYEDHASH_SCHEME_xor_src =
  982. "{\n"
  983. " \"scheme\": \"XOR\",\n"
  984. " \"details\": {\n"
  985. " \"hashAlg\": \"SHA256\",\n"
  986. " \"kdf\": \"MGF1\"\n"
  987. " }\n"
  988. "}";
  989. const char *test_json_TPMT_KEYEDHASH_SCHEME_xor_expt =
  990. "{\n"
  991. " \"scheme\": \"XOR\",\n"
  992. " \"details\": {\n"
  993. " \"hashAlg\": \"SHA256\",\n"
  994. " \"kdf\": \"MGF1\"\n"
  995. " }\n"
  996. "}";
  997. CHECK_JSON(TPMT_KEYEDHASH_SCHEME, test_json_TPMT_KEYEDHASH_SCHEME_xor_src, test_json_TPMT_KEYEDHASH_SCHEME_xor_expt);
  998. const char *test_json_TPMS_TAGGED_POLICY_sha256_src =
  999. "{\n"
  1000. " \"handle\":0,"
  1001. " \"policyHash\": {\n"
  1002. " \"hashAlg\":\"SHA256\",\n"
  1003. " \"digest\":\"59215cb6c21a60e26b2cc479334a021113611903795507c1227659e2aef23d16\"\n"
  1004. " }\n"
  1005. "}";
  1006. const char *test_json_TPMS_TAGGED_POLICY_sha256_expt =
  1007. "{\n"
  1008. " \"handle\":0,"
  1009. " \"policyHash\": {\n"
  1010. " \"hashAlg\":\"SHA256\",\n"
  1011. " \"digest\":\"59215cb6c21a60e26b2cc479334a021113611903795507c1227659e2aef23d16\"\n"
  1012. " }\n"
  1013. "}";
  1014. CHECK_JSON(TPMS_TAGGED_POLICY, test_json_TPMS_TAGGED_POLICY_sha256_src, test_json_TPMS_TAGGED_POLICY_sha256_expt);
  1015. const char *test_json_TPMS_ACT_DATA_src =
  1016. "{"
  1017. " \"handle\":0,"
  1018. " \"timeout\":23,"
  1019. " \"attributes\":["
  1020. " \"signaled\""
  1021. " ],"
  1022. "}";
  1023. const char *test_json_TPMS_ACT_DATA_expt =
  1024. "{\n"
  1025. " \"handle\":0,\n"
  1026. " \"timeout\":23,\n"
  1027. " \"attributes\":{"
  1028. " \"signaled\":1,"
  1029. " \"preserveSignaled\":0"
  1030. " }"
  1031. "}";
  1032. CHECK_JSON(TPMS_ACT_DATA, test_json_TPMS_ACT_DATA_src, test_json_TPMS_ACT_DATA_expt);
  1033. }
  1034. static void
  1035. check_json_constants(void **state)
  1036. {
  1037. CHECK_JSON_SIMPLE(TPMI_ALG_HASH, "\"sha1\"", "\"SHA1\"");
  1038. CHECK_JSON_SIMPLE(TPMI_ALG_HASH, "\"0x04\"", "\"SHA1\"");
  1039. CHECK_JSON_SIMPLE(TPMI_ALG_HASH, "4", "\"SHA1\"");
  1040. }
  1041. static void
  1042. check_json_numbers(void **state)
  1043. {
  1044. CHECK_JSON_SIMPLE(UINT16, "10", "10");
  1045. CHECK_JSON_SIMPLE(UINT16, "\"0x0a\"", "10");
  1046. CHECK_JSON_SIMPLE(UINT64, "10000000000000000","[2328306,1874919424]");
  1047. }
  1048. static void
  1049. check_json_bits(void **state)
  1050. {
  1051. CHECK_JSON_SIMPLE(TPMA_NV, "{\"PPWRITE\":1,\"OWNERWRITE\":1}",
  1052. "{\"PPWRITE\":1,\"OWNERWRITE\":1,\"AUTHWRITE\":0,\"POLICYWRITE\":0,\"POLICY_DELETE\":0,"
  1053. "\"WRITELOCKED\":0,\"WRITEALL\":0,\"WRITEDEFINE\":0,\"WRITE_STCLEAR\":0,\"GLOBALLOCK\":0,\"PPREAD\":0,"
  1054. "\"OWNERREAD\":0,\"AUTHREAD\":0,\"POLICYREAD\":0,\"NO_DA\":0,\"ORDERLY\":0,\"CLEAR_STCLEAR\":0,"
  1055. "\"READLOCKED\":0,\"WRITTEN\":0,\"PLATFORMCREATE\":0,\"READ_STCLEAR\":0,\"TPM2_NT\":\"ORDINARY\"}");
  1056. CHECK_JSON_SIMPLE(TPMA_LOCALITY, "3", "{\"ZERO\":1,\"ONE\":1,\"TWO\":0,\"THREE\":0,\"FOUR\":0,\"Extended\":0}");
  1057. CHECK_JSON_SIMPLE(TPMA_LOCALITY,
  1058. "[ \"ZERO\", \"ONE\" ]",
  1059. "{\"ZERO\":1,\"ONE\":1,\"TWO\":0,\"THREE\":0,\"FOUR\":0,\"Extended\":0}");
  1060. CHECK_JSON_SIMPLE(TPMA_NV, "\"0xffffff0f\"",
  1061. "{\"PPWRITE\":1,\"OWNERWRITE\":1,\"AUTHWRITE\":1,\"POLICYWRITE\":1,\"POLICY_DELETE\":1,"
  1062. "\"WRITELOCKED\":1,\"WRITEALL\":1,\"WRITEDEFINE\":1,\"WRITE_STCLEAR\":1,\"GLOBALLOCK\":1,\"PPREAD\":1,"
  1063. "\"OWNERREAD\":1,\"AUTHREAD\":1,\"POLICYREAD\":1,\"NO_DA\":1,\"ORDERLY\":1,\"CLEAR_STCLEAR\":1,"
  1064. "\"READLOCKED\":1,\"WRITTEN\":1,\"PLATFORMCREATE\":1,\"READ_STCLEAR\":1,\"TPM2_NT\":\"ORDINARY\"}");
  1065. CHECK_JSON_SIMPLE(TPMA_LOCALITY, "3", "{\"ZERO\":1,\"ONE\":1,\"TWO\":0,\"THREE\":0,\"FOUR\":0,\"Extended\":0}");
  1066. CHECK_JSON_SIMPLE(TPMA_LOCALITY,
  1067. "{\"ZERO\":1,\"ONE\":1,\"TWO\":0,\"THREE\":0,\"FOUR\":0,\"Extended\":0}",
  1068. "{\"ZERO\":1,\"ONE\":1,\"TWO\":0,\"THREE\":0,\"FOUR\":0,\"Extended\":0}");
  1069. CHECK_JSON_SIMPLE(TPMA_OBJECT,
  1070. "{\"fixedTPM\":1,\"stClear\":1,\"fixedParent\":0,\"sensitiveDataOrigin\":0,\"userWithAuth\":0,"
  1071. "\"adminWithPolicy\":0,\"noDA\":0,\"encryptedDuplication\":0,\"restricted\":0,\"decrypt\":0,\"sign\":0}",
  1072. "{\"fixedTPM\":1,\"stClear\":1,\"fixedParent\":0,\"sensitiveDataOrigin\":0,\"userWithAuth\":0,"
  1073. "\"adminWithPolicy\":0,\"noDA\":0,\"encryptedDuplication\":0,\"restricted\":0,\"decrypt\":0,\"sign\":0}");
  1074. CHECK_JSON_SIMPLE(TPMA_OBJECT,
  1075. "\"0\"",
  1076. "{\"fixedTPM\":0,\"stClear\":0,\"fixedParent\":0,\"sensitiveDataOrigin\":0,\"userWithAuth\":0,"
  1077. "\"adminWithPolicy\":0,\"noDA\":0,\"encryptedDuplication\":0,\"restricted\":0,\"decrypt\":0,\"sign\":0}");
  1078. CHECK_JSON_SIMPLE(TPMA_ACT,
  1079. "\"0\"",
  1080. "{\"signaled\":0,\"preserveSignaled\":0}");
  1081. CHECK_JSON_SIMPLE(TPMA_ACT,
  1082. "0",
  1083. "{\"signaled\":0,\"preserveSignaled\":0}");
  1084. CHECK_JSON_SIMPLE(TPMA_ACT,
  1085. "\"1\"",
  1086. "{\"signaled\":1,\"preserveSignaled\":0}");
  1087. CHECK_JSON_SIMPLE(TPMA_ACT,
  1088. "1",
  1089. "{\"signaled\":1,\"preserveSignaled\":0}");
  1090. CHECK_JSON_SIMPLE(TPMA_ACT,
  1091. "\"2\"",
  1092. "{\"signaled\":0,\"preserveSignaled\":1}");
  1093. CHECK_JSON_SIMPLE(TPMA_ACT,
  1094. "2",
  1095. "{\"signaled\":0,\"preserveSignaled\":1}");
  1096. CHECK_JSON_SIMPLE(TPMA_ACT,
  1097. "\"3\"",
  1098. "{\"signaled\":1,\"preserveSignaled\":1}");
  1099. CHECK_JSON_SIMPLE(TPMA_ACT,
  1100. "3",
  1101. "{\"signaled\":1,\"preserveSignaled\":1}");
  1102. CHECK_JSON_SIMPLE(TPMA_ACT,
  1103. "{\"signaled\":1,\"preserveSignaled\":0}",
  1104. "{\"signaled\":1,\"preserveSignaled\":0}");
  1105. CHECK_JSON_SIMPLE(TPMA_ACT,
  1106. "{\"signaled\":0,\"preserveSignaled\":1}",
  1107. "{\"signaled\":0,\"preserveSignaled\":1}");
  1108. const char *test_json_TPMA_NV_expected =\
  1109. "{"
  1110. " \"PPWRITE\":0,"
  1111. " \"OWNERWRITE\":1,"
  1112. " \"AUTHWRITE\":1,"
  1113. " \"POLICYWRITE\":1,"
  1114. " \"POLICY_DELETE\":1,"
  1115. " \"WRITELOCKED\":0,"
  1116. " \"WRITEALL\":0,"
  1117. " \"WRITEDEFINE\":0,"
  1118. " \"WRITE_STCLEAR\":0,"
  1119. " \"GLOBALLOCK\":0,"
  1120. " \"PPREAD\":0,"
  1121. " \"OWNERREAD\":1,"
  1122. " \"AUTHREAD\":1,"
  1123. " \"POLICYREAD\":1,"
  1124. " \"NO_DA\":0,"
  1125. " \"ORDERLY\":1,"
  1126. " \"CLEAR_STCLEAR\":1,"
  1127. " \"READLOCKED\":1,"
  1128. " \"WRITTEN\":1,"
  1129. " \"PLATFORMCREATE\":0,"
  1130. " \"READ_STCLEAR\":0,"
  1131. " \"TPM2_NT\":\"COUNTER\""
  1132. "}";
  1133. const char *test_json_TPMA_NV_src_array =\
  1134. "["
  1135. " \"nv_ownerwrite\","
  1136. " \"nv_authwrite\","
  1137. " \"nv_policywrite\","
  1138. " \"nv_policy_delete\","
  1139. " \"nv_ownerread\","
  1140. " \"nv_authread\","
  1141. " \"nv_policyread\","
  1142. " \"nv_orderly\","
  1143. " \"nv_clear_stclear\","
  1144. " \"nv_readlocked\","
  1145. " \"nv_written\","
  1146. " {"
  1147. " \"TPM2_NT\": \"NT_COUNTER\""
  1148. " }"
  1149. "]";
  1150. const char *test_json_TPMA_NV_src_struct = \
  1151. "{"
  1152. " \"TPMA_NV_OWNERWRITE\":\"YES\","
  1153. " \"TPMA_NV_AUTHWRITE\":\"yes\","
  1154. " \"TPMA_NV_POLICYWRITE\":\"TPM2_YES\","
  1155. " \"TPMA_NV_POLICY_DELETE\":\"tpm2_yes\","
  1156. " \"TPMA_NV_OWNERREAD\":\"SET\","
  1157. " \"TPMA_NV_AUTHREAD\":\"set\","
  1158. " \"TPMA_NV_POLICYREAD\":1,"
  1159. " \"TPMA_NV_ORDERLY\":1,"
  1160. " \"TPMA_NV_CLEAR_STCLEAR\":1,"
  1161. " \"TPMA_NV_READLOCKED\":1,"
  1162. " \"TPMA_NV_WRITTEN\":1,"
  1163. " \"TPM2_NT\":1"
  1164. " }";
  1165. const char *test_json_TPMA_NV_expected2 = \
  1166. "{"
  1167. " \"PPWRITE\":1,"
  1168. " \"OWNERWRITE\":0,"
  1169. " \"AUTHWRITE\":0,"
  1170. " \"POLICYWRITE\":0,"
  1171. " \"POLICY_DELETE\":0,"
  1172. " \"WRITELOCKED\":0,"
  1173. " \"WRITEALL\":0,"
  1174. " \"WRITEDEFINE\":0,"
  1175. " \"WRITE_STCLEAR\":0,"
  1176. " \"GLOBALLOCK\":0,"
  1177. " \"PPREAD\":0,"
  1178. " \"OWNERREAD\":0,"
  1179. " \"AUTHREAD\":0,"
  1180. " \"POLICYREAD\":0,"
  1181. " \"NO_DA\":0,"
  1182. " \"ORDERLY\":0,"
  1183. " \"CLEAR_STCLEAR\":0,"
  1184. " \"READLOCKED\":0,"
  1185. " \"WRITTEN\":0,"
  1186. " \"PLATFORMCREATE\":0,"
  1187. " \"READ_STCLEAR\":0,"
  1188. " \"TPM2_NT\":\"ORDINARY\""
  1189. "}";
  1190. CHECK_JSON_SIMPLE(TPMA_NV, test_json_TPMA_NV_src_array, test_json_TPMA_NV_expected);
  1191. CHECK_JSON_SIMPLE(TPMA_NV, test_json_TPMA_NV_src_struct, test_json_TPMA_NV_expected);
  1192. CHECK_JSON_SIMPLE(TPMA_NV, "1", test_json_TPMA_NV_expected2);
  1193. }
  1194. static void
  1195. check_json_policy(void **state)
  1196. {
  1197. const char *test_json_policy_nv_src = \
  1198. "{"
  1199. " \"description\":\"Description pol_nv\","
  1200. " \"policyDigests\":["
  1201. " ],"
  1202. " \"policyAuthorizations\":["
  1203. " ],"
  1204. " \"policy\":["
  1205. " {"
  1206. " \"type\": \"POLICYNV\","
  1207. " \"nvPath\": \"myNV\","
  1208. " \"operandB\": \"01030304\""
  1209. " }"
  1210. " ]"
  1211. "}";
  1212. const char *test_json_policy_nv_expected = \
  1213. "{"
  1214. " \"description\":\"Description pol_nv\","
  1215. " \"policyDigests\":["
  1216. " ],"
  1217. " \"policyAuthorizations\":["
  1218. " ],"
  1219. " \"policy\":["
  1220. " {"
  1221. " \"type\": \"POLICYNV\","
  1222. " \"nvPath\": \"myNV\","
  1223. " \"operandB\": \"01030304\""
  1224. " }"
  1225. " ]"
  1226. "}";
  1227. // CHECK_JSON(TPMS_POLICY, test_json_policy_nv_src, test_json_policy_nv_expected);
  1228. {
  1229. TPMS_POLICY out;
  1230. TSS2_RC rc;
  1231. json_object *jso = json_tokener_parse(test_json_policy_nv_src);
  1232. if (!jso) fprintf(stderr, "JSON parsing failed\n");
  1233. assert_non_null(jso);
  1234. rc = ifapi_json_TPMS_POLICY_deserialize (jso, &out);
  1235. if (rc) fprintf(stderr, "Deserialization failed\n");
  1236. assert_int_equal (rc, TSS2_RC_SUCCESS);
  1237. json_object_put(jso);
  1238. jso = NULL;
  1239. rc = ifapi_json_TPMS_POLICY_serialize (&out, &jso);
  1240. assert_int_equal (rc, TSS2_RC_SUCCESS);
  1241. assert_non_null(jso);
  1242. const char *jso_string = json_object_to_json_string_ext(jso, JSON_C_TO_STRING_PRETTY);
  1243. assert_non_null(jso_string);
  1244. char *string1 = normalize(jso_string);
  1245. char *string2 = normalize(test_json_policy_nv_expected);
  1246. assert_string_equal(string1, string2);
  1247. json_object_put(jso);
  1248. ifapi_cleanup_policy(&out);
  1249. free(string1);
  1250. free(string2);
  1251. }
  1252. const char *test_json_policy_or_src = \
  1253. "{"
  1254. " \"description\":\"hareness description\","
  1255. " \"policyDigests\":["
  1256. " {"
  1257. " \"hashAlg\":\"SHA256\","
  1258. " \"digest\":\"59215cb6c21a60e26b2cc479334a021113611903795507c1227659e2aef23d16\""
  1259. " }"
  1260. " ],"
  1261. " \"policy\":["
  1262. " {"
  1263. " \"type\":\"POLICYOR\","
  1264. " \"policyDigests\":["
  1265. " {"
  1266. " \"hashAlg\":\"SHA256\","
  1267. " \"digest\":\"59215cb6c21a60e26b2cc479334a021113611903795507c1227659e2aef23d16\""
  1268. " }"
  1269. " ],"
  1270. " \"branches\":["
  1271. " {"
  1272. " \"name\":\"branch1\","
  1273. " \"description\":\"description branch 1\","
  1274. " \"policy\":["
  1275. " {"
  1276. " \"type\":\"POLICYPCR\","
  1277. " \"policyDigests\":["
  1278. " {"
  1279. " \"hashAlg\":\"SHA256\","
  1280. " \"digest\":\"17d552f8e39ad882f6b3c09ae139af59616bf6a63f4093d6d20e9e1b9f7cdb6e\""
  1281. " }"
  1282. " ],"
  1283. " \"pcrs\":["
  1284. " {"
  1285. " \"pcr\":16,"
  1286. " \"hashAlg\":\"SHA1\","
  1287. " \"digest\":\"0000000000000000000000000000000000000000\""
  1288. " }"
  1289. " ]"
  1290. " }"
  1291. " ],"
  1292. " \"policyDigests\":["
  1293. " {"
  1294. " \"hashAlg\":\"SHA256\","
  1295. " \"digest\":\"17d552f8e39ad882f6b3c09ae139af59616bf6a63f4093d6d20e9e1b9f7cdb6e\""
  1296. " }"
  1297. " ]"
  1298. " },"
  1299. " {"
  1300. " \"name\":\"branch1\","
  1301. " \"description\":\"description branch 1\","
  1302. " \"policy\":["
  1303. " {"
  1304. " \"type\":\"POLICYPCR\","
  1305. " \"policyDigests\":["
  1306. " {"
  1307. " \"hashAlg\":\"SHA256\","
  1308. " \"digest\":\"17d552f8e39ad882f6b3c09ae139af59616bf6a63f4093d6d20e9e1b9f7cdb6e\""
  1309. " }"
  1310. " ],"
  1311. " \"pcrs\":["
  1312. " {"
  1313. " \"pcr\":16,"
  1314. " \"hashAlg\":\"SHA1\","
  1315. " \"digest\":\"0000000000000000000000000000000000000000\""
  1316. " }"
  1317. " ]"
  1318. " }"
  1319. " ],"
  1320. " \"policyDigests\":["
  1321. " {"
  1322. " \"hashAlg\":\"SHA256\","
  1323. " \"digest\":\"17d552f8e39ad882f6b3c09ae139af59616bf6a63f4093d6d20e9e1b9f7cdb6e\""
  1324. " }"
  1325. " ]"
  1326. " }"
  1327. " ]"
  1328. " }"
  1329. " ]"
  1330. "}";
  1331. char *test_json_policy_or_expected = strdup(test_json_policy_or_src);
  1332. if (test_json_policy_or_expected == NULL){
  1333. LOG_ERROR("%s", "Out of memory.");
  1334. return;
  1335. }
  1336. // CHECK_JSON(TPMS_POLICY, test_json_policy_or_src, test_json_policy_or_expected);
  1337. {
  1338. TPMS_POLICY out;
  1339. TSS2_RC rc;
  1340. json_object *jso = json_tokener_parse(test_json_policy_or_src);
  1341. if (!jso) fprintf(stderr, "JSON parsing failed\n");
  1342. assert_non_null(jso);
  1343. rc = ifapi_json_TPMS_POLICY_deserialize (jso, &out);
  1344. if (rc) fprintf(stderr, "Deserialization failed\n");
  1345. assert_int_equal (rc, TSS2_RC_SUCCESS);
  1346. json_object_put(jso);
  1347. jso = NULL;
  1348. rc = ifapi_json_TPMS_POLICY_serialize (&out, &jso);
  1349. assert_int_equal (rc, TSS2_RC_SUCCESS);
  1350. assert_non_null(jso);
  1351. const char *jso_string = json_object_to_json_string_ext(jso, JSON_C_TO_STRING_PRETTY);
  1352. assert_non_null(jso_string);
  1353. char *string1 = normalize(jso_string);
  1354. char *string2 = normalize(test_json_policy_or_expected);
  1355. assert_string_equal(string1, string2);
  1356. json_object_put(jso);
  1357. ifapi_cleanup_policy(&out);
  1358. free(string1);
  1359. free(string2);
  1360. }
  1361. free(test_json_policy_or_expected);
  1362. }
  1363. static void
  1364. check_json_tpm2bs(void **state)
  1365. {
  1366. CHECK_JSON(TPM2B_DIGEST, "\"0x0102\"", "\"0102\"");
  1367. CHECK_JSON(TPM2B_DIGEST, "\"0102\"", "\"0102\"");
  1368. CHECK_JSON(TPM2B_DIGEST, "\"caffee\"", "\"caffee\"");
  1369. }
  1370. static void
  1371. check_error(void **state)
  1372. {
  1373. /* Value is > then max value for UINT */
  1374. CHECK_ERROR(UINT16, "\"0x10000\"", TSS2_FAPI_RC_BAD_VALUE);
  1375. CHECK_ERROR(UINT32, "\"0x100000000\"", TSS2_FAPI_RC_BAD_VALUE);
  1376. /* Digest/list is too large*/
  1377. CHECK_ERROR(TPM2B_DIGEST, "\"0x0102222222222222222222222222222222222222222222222222222"
  1378. "22222222222222222222222222222222222222222222222222222222222222222222222222222\"",
  1379. TSS2_FAPI_RC_BAD_VALUE);
  1380. /* Illegal values */
  1381. CHECK_ERROR(TPMI_ALG_HASH, "\"SHA9999\"", TSS2_FAPI_RC_BAD_VALUE);
  1382. CHECK_ERROR(TPM2B_DIGEST, "\"xxxx\"", TSS2_FAPI_RC_BAD_VALUE);
  1383. CHECK_ERROR(TPM2B_DIGEST, "\"0x010x\"", TSS2_FAPI_RC_BAD_VALUE);
  1384. /*
  1385. * Illegal keys
  1386. */
  1387. const char *test_json_key_err1 =
  1388. /* Without persistent handle */
  1389. "{"
  1390. " \"objectType\":1,"
  1391. " \"system\":\"YES\","
  1392. "}";
  1393. CHECK_ERROR_CLEANUP(IFAPI_OBJECT, test_json_key_err1, TSS2_FAPI_RC_BAD_VALUE);
  1394. const char *test_json_key_err2 =
  1395. /* Without public */
  1396. "{"
  1397. " \"objectType\":1,"
  1398. " \"system\":\"YES\","
  1399. " \"persistent_handle\":0,"
  1400. "}";
  1401. CHECK_ERROR_CLEANUP(IFAPI_OBJECT, test_json_key_err2, TSS2_FAPI_RC_BAD_VALUE);
  1402. const char *test_json_key_err3 =
  1403. /* Without serialization */
  1404. "{"
  1405. " \"objectType\":1,"
  1406. " \"system\":\"YES\","
  1407. " \"with_auth\":\"NO\","
  1408. " \"persistent_handle\":0,"
  1409. " \"public\":{"
  1410. " \"size\":122,"
  1411. " \"publicArea\":{"
  1412. " \"type\":\"ECC\","
  1413. " \"nameAlg\":\"SHA256\","
  1414. " \"objectAttributes\":1,"
  1415. " \"authPolicy\":\"837197674484b3f81a90cc8d46a5d724fd52d76e06520b64f2a1da1b331469aa\","
  1416. " \"parameters\":{"
  1417. " \"symmetric\":{"
  1418. " \"algorithm\":\"AES\","
  1419. " \"keyBits\":128,"
  1420. " \"mode\":\"CFB\""
  1421. " },"
  1422. " \"scheme\":{"
  1423. " \"scheme\":\"NULL\""
  1424. " },"
  1425. " \"curveID\":\"NIST_P256\","
  1426. " \"kdf\":{"
  1427. " \"scheme\":\"NULL\""
  1428. " }"
  1429. " },"
  1430. " \"unique\":{"
  1431. " \"x\":\"78d926c582566a70eedffcda4fe147e1b24fe624305441167fac483a3079b2e7\","
  1432. " \"y\":\"8bdc62992c3382e29687114ea0a9e1ac69f91283ae1d018b6d37859731617c3a\""
  1433. " }"
  1434. " }"
  1435. " },"
  1436. "}";
  1437. CHECK_ERROR_CLEANUP(IFAPI_OBJECT, test_json_key_err3, TSS2_FAPI_RC_BAD_VALUE);
  1438. const char *test_json_key_err4 =
  1439. /* Without PolicyInstance */
  1440. "{"
  1441. " \"objectType\":1,"
  1442. " \"system\":\"YES\","
  1443. " \"with_auth\":\"NO\","
  1444. " \"persistent_handle\":0,"
  1445. " \"public\":{"
  1446. " \"size\":122,"
  1447. " \"publicArea\":{"
  1448. " \"type\":\"ECC\","
  1449. " \"nameAlg\":\"SHA256\","
  1450. " \"objectAttributes\":{"
  1451. " \"fixedTPM\":1,"
  1452. " \"stClear\":0,"
  1453. " \"fixedParent\":1,"
  1454. " \"sensitiveDataOrigin\":1,"
  1455. " \"userWithAuth\":0,"
  1456. " \"adminWithPolicy\":1,"
  1457. " \"noDA\":0,"
  1458. " \"encryptedDuplication\":0,"
  1459. " \"restricted\":1,"
  1460. " \"decrypt\":1,"
  1461. " \"sign\":0"
  1462. " },"
  1463. " \"authPolicy\":\"837197674484b3f81a90cc8d46a5d724fd52d76e06520b64f2a1da1b331469aa\","
  1464. " \"parameters\":{"
  1465. " \"symmetric\":{"
  1466. " \"algorithm\":\"AES\","
  1467. " \"keyBits\":128,"
  1468. " \"mode\":\"CFB\""
  1469. " },"
  1470. " \"scheme\":{"
  1471. " \"scheme\":\"NULL\""
  1472. " },"
  1473. " \"curveID\":\"NIST_P256\","
  1474. " \"kdf\":{"
  1475. " \"scheme\":\"NULL\""
  1476. " }"
  1477. " },"
  1478. " \"unique\":{"
  1479. " \"x\":\"78d926c582566a70eedffcda4fe147e1b24fe624305441167fac483a3079b2e7\","
  1480. " \"y\":\"8bdc62992c3382e29687114ea0a9e1ac69f91283ae1d018b6d37859731617c3a\""
  1481. " }"
  1482. " }"
  1483. " },"
  1484. " \"serialization\":\"\","
  1485. "}";
  1486. CHECK_ERROR_CLEANUP(IFAPI_OBJECT, test_json_key_err4, TSS2_FAPI_RC_BAD_VALUE);
  1487. const char *test_json_key_err5 =
  1488. /* Without certificate */
  1489. "{"
  1490. " \"objectType\":1,"
  1491. " \"system\":\"YES\","
  1492. " \"with_auth\":\"NO\","
  1493. " \"persistent_handle\":0,"
  1494. " \"public\":{"
  1495. " \"size\":122,"
  1496. " \"publicArea\":{"
  1497. " \"type\":\"ECC\","
  1498. " \"nameAlg\":\"SHA256\","
  1499. " \"objectAttributes\":{"
  1500. " \"fixedTPM\":1,"
  1501. " \"stClear\":0,"
  1502. " \"fixedParent\":1,"
  1503. " \"sensitiveDataOrigin\":1,"
  1504. " \"userWithAuth\":0,"
  1505. " \"adminWithPolicy\":1,"
  1506. " \"noDA\":0,"
  1507. " \"encryptedDuplication\":0,"
  1508. " \"restricted\":1,"
  1509. " \"decrypt\":1,"
  1510. " \"sign\":0"
  1511. " },"
  1512. " \"authPolicy\":\"837197674484b3f81a90cc8d46a5d724fd52d76e06520b64f2a1da1b331469aa\","
  1513. " \"parameters\":{"
  1514. " \"symmetric\":{"
  1515. " \"algorithm\":\"AES\","
  1516. " \"keyBits\":128,"
  1517. " \"mode\":\"CFB\""
  1518. " },"
  1519. " \"scheme\":{"
  1520. " \"scheme\":\"NULL\""
  1521. " },"
  1522. " \"curveID\":\"NIST_P256\","
  1523. " \"kdf\":{"
  1524. " \"scheme\":\"NULL\""
  1525. " }"
  1526. " },"
  1527. " \"unique\":{"
  1528. " \"x\":\"78d926c582566a70eedffcda4fe147e1b24fe624305441167fac483a3079b2e7\","
  1529. " \"y\":\"8bdc62992c3382e29687114ea0a9e1ac69f91283ae1d018b6d37859731617c3a\""
  1530. " }"
  1531. " }"
  1532. " },"
  1533. " \"serialization\":\"\","
  1534. " \"policyInstance\":\"\","
  1535. " \"description\":\"\","
  1536. "}";
  1537. CHECK_ERROR_CLEANUP(IFAPI_OBJECT, test_json_key_err5, TSS2_FAPI_RC_BAD_VALUE);
  1538. const char *test_json_key_err6 =
  1539. /* Without description */
  1540. "{"
  1541. " \"objectType\":1,"
  1542. " \"system\":\"YES\","
  1543. " \"with_auth\":\"NO\","
  1544. " \"persistent_handle\":0,"
  1545. " \"public\":{"
  1546. " \"size\":122,"
  1547. " \"publicArea\":{"
  1548. " \"type\":\"ECC\","
  1549. " \"nameAlg\":\"SHA256\","
  1550. " \"objectAttributes\":{"
  1551. " \"fixedTPM\":1,"
  1552. " \"stClear\":0,"
  1553. " \"fixedParent\":1,"
  1554. " \"sensitiveDataOrigin\":1,"
  1555. " \"userWithAuth\":0,"
  1556. " \"adminWithPolicy\":1,"
  1557. " \"noDA\":0,"
  1558. " \"encryptedDuplication\":0,"
  1559. " \"restricted\":1,"
  1560. " \"decrypt\":1,"
  1561. " \"sign\":0"
  1562. " },"
  1563. " \"authPolicy\":\"837197674484b3f81a90cc8d46a5d724fd52d76e06520b64f2a1da1b331469aa\","
  1564. " \"parameters\":{"
  1565. " \"symmetric\":{"
  1566. " \"algorithm\":\"AES\","
  1567. " \"keyBits\":128,"
  1568. " \"mode\":\"CFB\""
  1569. " },"
  1570. " \"scheme\":{"
  1571. " \"scheme\":\"NULL\""
  1572. " },"
  1573. " \"curveID\":\"NIST_P256\","
  1574. " \"kdf\":{"
  1575. " \"scheme\":\"NULL\""
  1576. " }"
  1577. " },"
  1578. " \"unique\":{"
  1579. " \"x\":\"78d926c582566a70eedffcda4fe147e1b24fe624305441167fac483a3079b2e7\","
  1580. " \"y\":\"8bdc62992c3382e29687114ea0a9e1ac69f91283ae1d018b6d37859731617c3a\""
  1581. " }"
  1582. " }"
  1583. " },"
  1584. " \"serialization\":\"\","
  1585. " \"policyInstance\":\"\","
  1586. " \"certificate\":\"\","
  1587. "}";
  1588. CHECK_ERROR_CLEANUP(IFAPI_OBJECT, test_json_key_err6, TSS2_FAPI_RC_BAD_VALUE);
  1589. const char *test_json_key_err7 =
  1590. /* Without signing scheme */
  1591. "{"
  1592. " \"objectType\":1,"
  1593. " \"system\":\"YES\","
  1594. " \"public\":{"
  1595. " \"size\":122,"
  1596. " \"publicArea\":{"
  1597. " \"type\":\"ECC\","
  1598. " \"nameAlg\":\"SHA256\","
  1599. " \"objectAttributes\":{"
  1600. " \"fixedTPM\":1,"
  1601. " \"stClear\":0,"
  1602. " \"fixedParent\":1,"
  1603. " \"sensitiveDataOrigin\":1,"
  1604. " \"userWithAuth\":0,"
  1605. " \"adminWithPolicy\":1,"
  1606. " \"noDA\":0,"
  1607. " \"encryptedDuplication\":0,"
  1608. " \"restricted\":1,"
  1609. " \"decrypt\":1,"
  1610. " \"sign\":0"
  1611. " },"
  1612. " \"authPolicy\":\"837197674484b3f81a90cc8d46a5d724fd52d76e06520b64f2a1da1b331469aa\","
  1613. " \"parameters\":{"
  1614. " \"symmetric\":{"
  1615. " \"algorithm\":\"AES\","
  1616. " \"keyBits\":128,"
  1617. " \"mode\":\"CFB\""
  1618. " },"
  1619. " \"scheme\":{"
  1620. " \"scheme\":\"NULL\""
  1621. " },"
  1622. " \"curveID\":\"NIST_P256\","
  1623. " \"kdf\":{"
  1624. " \"scheme\":\"NULL\""
  1625. " }"
  1626. " },"
  1627. " \"unique\":{"
  1628. " \"x\":\"78d926c582566a70eedffcda4fe147e1b24fe624305441167fac483a3079b2e7\","
  1629. " \"y\":\"8bdc62992c3382e29687114ea0a9e1ac69f91283ae1d018b6d37859731617c3a\""
  1630. " }"
  1631. " }"
  1632. " },"
  1633. " \"with_auth\":\"NO\","
  1634. " \"persistent_handle\":0,"
  1635. " \"serialization\":\"\","
  1636. " \"policyInstance\":\"\","
  1637. " \"certificate\":\"\","
  1638. " \"description\":\"\","
  1639. "}";
  1640. CHECK_ERROR_CLEANUP(IFAPI_OBJECT, test_json_key_err7, TSS2_FAPI_RC_BAD_VALUE);
  1641. const char *test_json_key_err8 =
  1642. /* Without name */
  1643. "{"
  1644. " \"objectType\":1,"
  1645. " \"system\":\"YES\","
  1646. " \"public\":{"
  1647. " \"size\":122,"
  1648. " \"publicArea\":{"
  1649. " \"type\":\"ECC\","
  1650. " \"nameAlg\":\"SHA256\","
  1651. " \"objectAttributes\":{"
  1652. " \"fixedTPM\":1,"
  1653. " \"stClear\":0,"
  1654. " \"fixedParent\":1,"
  1655. " \"sensitiveDataOrigin\":1,"
  1656. " \"userWithAuth\":0,"
  1657. " \"adminWithPolicy\":1,"
  1658. " \"noDA\":0,"
  1659. " \"encryptedDuplication\":0,"
  1660. " \"restricted\":1,"
  1661. " \"decrypt\":1,"
  1662. " \"sign\":0"
  1663. " },"
  1664. " \"authPolicy\":\"837197674484b3f81a90cc8d46a5d724fd52d76e06520b64f2a1da1b331469aa\","
  1665. " \"parameters\":{"
  1666. " \"symmetric\":{"
  1667. " \"algorithm\":\"AES\","
  1668. " \"keyBits\":128,"
  1669. " \"mode\":\"CFB\""
  1670. " },"
  1671. " \"scheme\":{"
  1672. " \"scheme\":\"NULL\""
  1673. " },"
  1674. " \"curveID\":\"NIST_P256\","
  1675. " \"kdf\":{"
  1676. " \"scheme\":\"NULL\""
  1677. " }"
  1678. " },"
  1679. " \"unique\":{"
  1680. " \"x\":\"78d926c582566a70eedffcda4fe147e1b24fe624305441167fac483a3079b2e7\","
  1681. " \"y\":\"8bdc62992c3382e29687114ea0a9e1ac69f91283ae1d018b6d37859731617c3a\""
  1682. " }"
  1683. " }"
  1684. " },"
  1685. " \"with_auth\":\"NO\","
  1686. " \"persistent_handle\":0,"
  1687. " \"serialization\":\"\","
  1688. " \"policyInstance\":\"\","
  1689. " \"certificate\":\"\","
  1690. " \"description\":\"\","
  1691. " \"signing_scheme\":{"
  1692. " \"scheme\":\"ECDSA\","
  1693. " \"details\":{"
  1694. " \"hashAlg\":\"SHA256\""
  1695. " }"
  1696. " },"
  1697. "}";
  1698. CHECK_ERROR_CLEANUP(IFAPI_OBJECT, test_json_key_err8, TSS2_FAPI_RC_BAD_VALUE);
  1699. const char *test_json_nv_err1 =
  1700. "{"
  1701. " \"objectType\":2,"
  1702. " \"system\":\"NO\","
  1703. " \"with_auth\":\"NO\","
  1704. " \"nv_object\":true,"
  1705. " \"hierarchy\":257,"
  1706. " \"policyInstance\":\"\","
  1707. " \"description\":\"\","
  1708. "}";
  1709. CHECK_ERROR_CLEANUP(IFAPI_OBJECT, test_json_nv_err1, TSS2_FAPI_RC_BAD_VALUE);
  1710. const char *test_json_nv_err2 =
  1711. "{"
  1712. " \"objectType\":2,"
  1713. " \"system\":\"NO\","
  1714. " \"with_auth\":\"NO\","
  1715. " \"nv_object\":true,"
  1716. " \"public\":{"
  1717. " \"size\":0,"
  1718. " \"nvPublic\":{"
  1719. " \"nvIndex\":25165824,"
  1720. " \"nameAlg\":\"SHA256\","
  1721. " \"attributes\":{"
  1722. " \"PPWRITE\":0,"
  1723. " \"OWNERWRITE\":0,"
  1724. " \"AUTHWRITE\":0,"
  1725. " \"POLICYWRITE\":1,"
  1726. " \"POLICY_DELETE\":0,"
  1727. " \"WRITELOCKED\":0,"
  1728. " \"WRITEALL\":0,"
  1729. " \"WRITEDEFINE\":0,"
  1730. " \"WRITE_STCLEAR\":1,"
  1731. " \"GLOBALLOCK\":0,"
  1732. " \"PPREAD\":0,"
  1733. " \"OWNERREAD\":0,"
  1734. " \"AUTHREAD\":0,"
  1735. " \"POLICYREAD\":1,"
  1736. " \"NO_DA\":1,"
  1737. " \"ORDERLY\":0,"
  1738. " \"CLEAR_STCLEAR\":0,"
  1739. " \"READLOCKED\":0,"
  1740. " \"WRITTEN\":0,"
  1741. " \"PLATFORMCREATE\":0,"
  1742. " \"READ_STCLEAR\":1,"
  1743. " \"TPM2_NT\":\"ORDINARY\""
  1744. " },"
  1745. " \"authPolicy\":\"0000000000000000000000000000000000000000000000000000000000000000\","
  1746. " \"dataSize\":1200"
  1747. " }"
  1748. " },"
  1749. " \"serialization\":\"018000000022000b59323f518181d5e607ade494f3ecaf7ba552ddc57fde379b3cf8ca82c009257c00000002002e01800000000b820840080020000000000000000000000000000000000000000000000000000000000000000004b0\","
  1750. " \"policyInstance\":\"\","
  1751. " \"description\":\"\","
  1752. "}";
  1753. CHECK_ERROR_CLEANUP(IFAPI_OBJECT, test_json_nv_err2, TSS2_FAPI_RC_BAD_VALUE);
  1754. const char *test_json_nv_err3 =
  1755. "{"
  1756. " \"objectType\":2,"
  1757. " \"system\":\"NO\","
  1758. " \"with_auth\":\"NO\","
  1759. " \"nv_object\":true,"
  1760. " \"public\":{"
  1761. " \"size\":0,"
  1762. " \"nvPublic\":{"
  1763. " \"nvIndex\":25165824,"
  1764. " \"nameAlg\":\"SHA256\","
  1765. " \"attributes\":{"
  1766. " \"PPWRITE\":0,"
  1767. " \"OWNERWRITE\":0,"
  1768. " \"AUTHWRITE\":0,"
  1769. " \"POLICYWRITE\":1,"
  1770. " \"POLICY_DELETE\":0,"
  1771. " \"WRITELOCKED\":0,"
  1772. " \"WRITEALL\":0,"
  1773. " \"WRITEDEFINE\":0,"
  1774. " \"WRITE_STCLEAR\":1,"
  1775. " \"GLOBALLOCK\":0,"
  1776. " \"PPREAD\":0,"
  1777. " \"OWNERREAD\":0,"
  1778. " \"AUTHREAD\":0,"
  1779. " \"POLICYREAD\":1,"
  1780. " \"NO_DA\":1,"
  1781. " \"ORDERLY\":0,"
  1782. " \"CLEAR_STCLEAR\":0,"
  1783. " \"READLOCKED\":0,"
  1784. " \"WRITTEN\":0,"
  1785. " \"PLATFORMCREATE\":0,"
  1786. " \"READ_STCLEAR\":1,"
  1787. " \"TPM2_NT\":\"ORDINARY\""
  1788. " },"
  1789. " \"authPolicy\":\"0000000000000000000000000000000000000000000000000000000000000000\","
  1790. " \"dataSize\":1200"
  1791. " }"
  1792. " },"
  1793. " \"serialization\":\"018000000022000b59323f518181d5e607ade494f3ecaf7ba552ddc57fde379b3cf8ca82c009257c00000002002e01800000000b820840080020000000000000000000000000000000000000000000000000000000000000000004b0\","
  1794. " \"hierarchy\":257,"
  1795. " \"description\":\"\","
  1796. "}";
  1797. CHECK_ERROR_CLEANUP(IFAPI_OBJECT, test_json_nv_err3, TSS2_FAPI_RC_BAD_VALUE);
  1798. const char *test_json_nv_err4 =
  1799. "{"
  1800. " \"objectType\":2,"
  1801. " \"system\":\"NO\","
  1802. " \"nv_object\":true,"
  1803. " \"public\":{"
  1804. " \"size\":0,"
  1805. " \"nvPublic\":{"
  1806. " \"nvIndex\":25165824,"
  1807. " \"nameAlg\":\"SHA256\","
  1808. " \"attributes\":{"
  1809. " \"PPWRITE\":0,"
  1810. " \"OWNERWRITE\":0,"
  1811. " \"AUTHWRITE\":0,"
  1812. " \"POLICYWRITE\":1,"
  1813. " \"POLICY_DELETE\":0,"
  1814. " \"WRITELOCKED\":0,"
  1815. " \"WRITEALL\":0,"
  1816. " \"WRITEDEFINE\":0,"
  1817. " \"WRITE_STCLEAR\":1,"
  1818. " \"GLOBALLOCK\":0,"
  1819. " \"PPREAD\":0,"
  1820. " \"OWNERREAD\":0,"
  1821. " \"AUTHREAD\":0,"
  1822. " \"POLICYREAD\":1,"
  1823. " \"NO_DA\":1,"
  1824. " \"ORDERLY\":0,"
  1825. " \"CLEAR_STCLEAR\":0,"
  1826. " \"READLOCKED\":0,"
  1827. " \"WRITTEN\":0,"
  1828. " \"PLATFORMCREATE\":0,"
  1829. " \"READ_STCLEAR\":1,"
  1830. " \"TPM2_NT\":\"ORDINARY\""
  1831. " },"
  1832. " \"authPolicy\":\"0000000000000000000000000000000000000000000000000000000000000000\","
  1833. " \"dataSize\":1200"
  1834. " }"
  1835. " },"
  1836. " \"serialization\":\"018000000022000b59323f518181d5e607ade494f3ecaf7ba552ddc57fde379b3cf8ca82c009257c00000002002e01800000000b820840080020000000000000000000000000000000000000000000000000000000000000000004b0\","
  1837. " \"hierarchy\":257,"
  1838. " \"policyInstance\":\"\","
  1839. "}";
  1840. CHECK_ERROR_CLEANUP(IFAPI_OBJECT, test_json_nv_err4, TSS2_FAPI_RC_BAD_VALUE);
  1841. const char *test_json_nv_err5 =
  1842. "{"
  1843. " \"objectType\":2,"
  1844. " \"system\":\"NO\","
  1845. " \"with_auth\":\"NO\","
  1846. " \"nv_object\":true,"
  1847. " \"public\":{"
  1848. " \"size\":0,"
  1849. " \"nvPublic\":{"
  1850. " \"nvIndex\":25165824,"
  1851. " \"nameAlg\":\"SHA256\","
  1852. " \"attributes\":{"
  1853. " \"PPWRITE\":0,"
  1854. " \"OWNERWRITE\":0,"
  1855. " \"AUTHWRITE\":0,"
  1856. " \"POLICYWRITE\":1,"
  1857. " \"POLICY_DELETE\":0,"
  1858. " \"WRITELOCKED\":0,"
  1859. " \"WRITEALL\":0,"
  1860. " \"WRITEDEFINE\":0,"
  1861. " \"WRITE_STCLEAR\":1,"
  1862. " \"GLOBALLOCK\":0,"
  1863. " \"PPREAD\":0,"
  1864. " \"OWNERREAD\":0,"
  1865. " \"AUTHREAD\":0,"
  1866. " \"POLICYREAD\":1,"
  1867. " \"NO_DA\":1,"
  1868. " \"ORDERLY\":0,"
  1869. " \"CLEAR_STCLEAR\":0,"
  1870. " \"READLOCKED\":0,"
  1871. " \"WRITTEN\":0,"
  1872. " \"PLATFORMCREATE\":0,"
  1873. " \"READ_STCLEAR\":1,"
  1874. " \"TPM2_NT\":\"ORDINARY\""
  1875. " },"
  1876. " \"authPolicy\":\"0000000000000000000000000000000000000000000000000000000000000000\","
  1877. " \"dataSize\":1200"
  1878. " }"
  1879. " },"
  1880. " \"serialization\":\"018000000022000b59323f518181d5e607ade494f3ecaf7ba552ddc57fde379b3cf8ca82c009257c00000002002e01800000000b820840080020000000000000000000000000000000000000000000000000000000000000000004b0\","
  1881. " \"hierarchy\":257,"
  1882. " \"description\":\"\","
  1883. "}";
  1884. CHECK_ERROR_CLEANUP(IFAPI_OBJECT, test_json_nv_err5, TSS2_FAPI_RC_BAD_VALUE);
  1885. const char *test_json_attest_err1 =
  1886. "{"
  1887. " \"magic\":\"VALUE\","
  1888. " \"type\":\"ATTEST_QUOTE\","
  1889. " \"qualifiedSigner\":\"000b5adea4e8b49b3f76db36b9442a29e515263e28bbd9e9263843675bb3cf750202\","
  1890. " \"extraData\":\"6768033e216468247bd031a0a2d9876d79818f8f\","
  1891. " \"clockInfo\":{"
  1892. " \"clock\":8048,"
  1893. " \"resetCount\":639972755,"
  1894. " \"restartCount\":158941495,"
  1895. " \"safe\":\"YES\" }"
  1896. "}";
  1897. CHECK_ERROR(TPMS_ATTEST, test_json_attest_err1, TSS2_FAPI_RC_BAD_VALUE);
  1898. const char *test_json_attest_err2 =
  1899. "{"
  1900. " \"magic\":\"VALUE\","
  1901. " \"type\":\"ATTEST_QUOTE\","
  1902. " \"qualifiedSigner\":\"000b5adea4e8b49b3f76db36b9442a29e515263e28bbd9e9263843675bb3cf750202\","
  1903. " \"extraData\":\"6768033e216468247bd031a0a2d9876d79818f8f\""
  1904. "}";
  1905. CHECK_ERROR(TPMS_ATTEST, test_json_attest_err2, TSS2_FAPI_RC_BAD_VALUE);
  1906. const char *test_json_attest_err3 =
  1907. "{"
  1908. " \"magic\":\"VALUE\","
  1909. " \"type\":\"ATTEST_QUOTE\","
  1910. " \"qualifiedSigner\":\"000b5adea4e8b49b3f76db36b9442a29e515263e28bbd9e9263843675bb3cf750202\","
  1911. "}";
  1912. CHECK_ERROR(TPMS_ATTEST, test_json_attest_err3, TSS2_FAPI_RC_BAD_VALUE);
  1913. const char *test_json_attest_err4 =
  1914. "{"
  1915. " \"magic\":\"VALUE\","
  1916. " \"type\":\"ATTEST_QUOTE\","
  1917. "}";
  1918. CHECK_ERROR(TPMS_ATTEST, test_json_attest_err4, TSS2_FAPI_RC_BAD_VALUE);
  1919. const char *test_json_attest_err5 =
  1920. "{"
  1921. " \"magic\":\"VALUE\","
  1922. "}";
  1923. CHECK_ERROR(TPMS_ATTEST, test_json_attest_err5, TSS2_FAPI_RC_BAD_VALUE);
  1924. const char *test_json_attest_err6 =
  1925. "{"
  1926. "}";
  1927. CHECK_ERROR(TPMS_ATTEST, test_json_attest_err6, TSS2_FAPI_RC_BAD_VALUE);
  1928. const char *test_json_clock_err1 =
  1929. "{"
  1930. " \"clock\":8048,"
  1931. " \"resetCount\":639972755,"
  1932. " \"restartCount\":158941495,"
  1933. "}";
  1934. CHECK_ERROR(TPMS_CLOCK_INFO, test_json_clock_err1, TSS2_FAPI_RC_BAD_VALUE);
  1935. const char *test_json_clock_err2 =
  1936. "{"
  1937. " \"clock\":8048,"
  1938. " \"resetCount\":639972755,"
  1939. "}";
  1940. CHECK_ERROR(TPMS_CLOCK_INFO, test_json_clock_err2, TSS2_FAPI_RC_BAD_VALUE);
  1941. const char *test_json_clock_err3 =
  1942. "{"
  1943. " \"clock\":8048,"
  1944. "}";
  1945. CHECK_ERROR(TPMS_CLOCK_INFO, test_json_clock_err3, TSS2_FAPI_RC_BAD_VALUE);
  1946. const char *test_json_clock_err4 =
  1947. "{"
  1948. "}";
  1949. CHECK_ERROR(TPMS_CLOCK_INFO, test_json_clock_err4, TSS2_FAPI_RC_BAD_VALUE);
  1950. const char *test_json_command_audit_err1 =
  1951. "{"
  1952. " \"auditCounter\":8048,"
  1953. " \"digestAlg\":\"sha1\","
  1954. " \"auditDigest\":\"0102\","
  1955. "}";
  1956. CHECK_ERROR(TPMS_COMMAND_AUDIT_INFO, test_json_command_audit_err1, TSS2_FAPI_RC_BAD_VALUE);
  1957. const char *test_json_command_audit_err2 =
  1958. "{"
  1959. " \"auditCounter\":8048,"
  1960. " \"digestAlg\":\"sha1\","
  1961. "}";
  1962. CHECK_ERROR(TPMS_COMMAND_AUDIT_INFO, test_json_command_audit_err2, TSS2_FAPI_RC_BAD_VALUE);
  1963. const char *test_json_command_audit_err3 =
  1964. "{"
  1965. " \"auditCounter\":8048,"
  1966. "}";
  1967. CHECK_ERROR(TPMS_COMMAND_AUDIT_INFO, test_json_command_audit_err3, TSS2_FAPI_RC_BAD_VALUE);
  1968. const char *test_json_command_audit_err4 =
  1969. "{"
  1970. "}";
  1971. CHECK_ERROR(TPMS_COMMAND_AUDIT_INFO, test_json_command_audit_err4, TSS2_FAPI_RC_BAD_VALUE);
  1972. const char *test_json_tk_creation_err1 =
  1973. "{"
  1974. " \"tag\":\"NULL\","
  1975. " \"hierarchy\":\"OWNER\","
  1976. "}";
  1977. CHECK_ERROR(TPMT_TK_CREATION, test_json_tk_creation_err1, TSS2_FAPI_RC_BAD_VALUE);
  1978. const char *test_json_tk_creation_err2 =
  1979. "{"
  1980. " \"tag\":\"NULL\","
  1981. "}";
  1982. CHECK_ERROR(TPMT_TK_CREATION, test_json_tk_creation_err2, TSS2_FAPI_RC_BAD_VALUE);
  1983. const char *test_json_tk_creation_err3 =
  1984. "{"
  1985. "}";
  1986. CHECK_ERROR(TPMT_TK_CREATION, test_json_tk_creation_err3, TSS2_FAPI_RC_BAD_VALUE);
  1987. const char *test_json_nv_certify_info_err1 =
  1988. "{"
  1989. " \"indexName\":\"0102\","
  1990. " \"offset\":0,"
  1991. "}";
  1992. CHECK_ERROR(TPMS_NV_CERTIFY_INFO, test_json_nv_certify_info_err1, TSS2_FAPI_RC_BAD_VALUE);
  1993. const char *test_json_nv_certify_info_err2 =
  1994. "{"
  1995. " \"indexName\":\"0102\","
  1996. "}";
  1997. CHECK_ERROR(TPMS_NV_CERTIFY_INFO, test_json_nv_certify_info_err2, TSS2_FAPI_RC_BAD_VALUE);
  1998. const char *test_json_nv_certify_info_err3 =
  1999. "{"
  2000. "}";
  2001. CHECK_ERROR(TPMS_NV_CERTIFY_INFO, test_json_nv_certify_info_err3, TSS2_FAPI_RC_BAD_VALUE);
  2002. const char *test_json_signature_ecc_err1 =
  2003. "{"
  2004. " \"hash\":\"sha1\","
  2005. " \"signatureR\":\"0102\","
  2006. "}";
  2007. CHECK_ERROR(TPMS_SIGNATURE_ECC, test_json_signature_ecc_err1, TSS2_FAPI_RC_BAD_VALUE);
  2008. const char *test_json_signature_ecc_err2 =
  2009. "{"
  2010. " \"hash\":\"sha1\","
  2011. "}";
  2012. CHECK_ERROR(TPMS_SIGNATURE_ECC, test_json_signature_ecc_err2, TSS2_FAPI_RC_BAD_VALUE);
  2013. const char *test_json_signature_ecc_err4 =
  2014. "{"
  2015. "}";
  2016. CHECK_ERROR(TPMS_SIGNATURE_ECC, test_json_signature_ecc_err4, TSS2_FAPI_RC_BAD_VALUE);
  2017. const char *test_json_signature_err1 =
  2018. "{"
  2019. " \"sigAlg\":\"HMAC\","
  2020. " \"signature\":\"0102\","
  2021. "}";
  2022. CHECK_ERROR(TPMT_SIGNATURE, test_json_signature_err1, TSS2_FAPI_RC_BAD_VALUE);
  2023. const char *test_json_signature_err2 =
  2024. "{"
  2025. " \"sigAlg\":\"ECDSA\","
  2026. " \"signature\":\"0102\","
  2027. "}";
  2028. CHECK_ERROR(TPMT_SIGNATURE, test_json_signature_err2, TSS2_FAPI_RC_BAD_VALUE);
  2029. const char *test_json_signature_err3 =
  2030. "{"
  2031. " \"sigAlg\":\"ECDAA\","
  2032. " \"signature\":\"0102\","
  2033. "}";
  2034. CHECK_ERROR(TPMT_SIGNATURE, test_json_signature_err3, TSS2_FAPI_RC_BAD_VALUE);
  2035. const char *test_json_signature_err4 =
  2036. "{"
  2037. " \"sigAlg\":\"SM2\","
  2038. " \"signature\":\"0102\","
  2039. "}";
  2040. CHECK_ERROR(TPMT_SIGNATURE, test_json_signature_err4, TSS2_FAPI_RC_BAD_VALUE);
  2041. const char *test_json_signature_err5 =
  2042. "{"
  2043. " \"sigAlg\":\"ECSCHNORR\","
  2044. " \"signature\":\"0102\","
  2045. "}";
  2046. CHECK_ERROR(TPMT_SIGNATURE, test_json_signature_err5, TSS2_FAPI_RC_BAD_VALUE);
  2047. const char *test_json_signature_err6 =
  2048. "{"
  2049. " \"sigAlg\":\"RSASSA\","
  2050. " \"signature\":\"0102\","
  2051. "}";
  2052. CHECK_ERROR(TPMT_SIGNATURE, test_json_signature_err6, TSS2_FAPI_RC_BAD_VALUE);
  2053. const char *test_json_signature_err7 =
  2054. "{"
  2055. "}";
  2056. CHECK_ERROR(TPMT_SIGNATURE, test_json_signature_err7, TSS2_FAPI_RC_BAD_VALUE);
  2057. const char *test_json_signature_err8 =
  2058. "{"
  2059. " \"sigAlg\":\"RSASSA\","
  2060. "}";
  2061. CHECK_ERROR(TPMT_SIGNATURE, test_json_signature_err8, TSS2_FAPI_RC_BAD_VALUE);
  2062. }
  2063. static void
  2064. check_tpmjson_tofromtxt(void **state)
  2065. {
  2066. const char *testcase_alg_id[] = { "\"TPM_ALG_ID_SHA1\"", "\"TPM2_ALG_ID_SHA1\"",
  2067. "\"ALG_ID_SHA1\"", "\"SHA1\"", "\"ALG_SHA1\"",
  2068. "\"tpm2_alg_id_sha1\"", "\"sha1\"", "\"0x0004\"" };
  2069. const char *expected_ald_id = { "\"SHA1\"" };
  2070. for (size_t i = 0; i < sizeof(testcase_alg_id) / sizeof(testcase_alg_id[0]); i++) {
  2071. CHECK_JSON_SIMPLE(TPM2_ALG_ID, testcase_alg_id[i], expected_ald_id);
  2072. }
  2073. const char *testcase_ecc_curve[] = { "\"TPM2_ECC_NIST_P256\"", "\"ECC_NIST_P256\"",
  2074. "\"NIST_P256\"", "\"0x0003\"", "\"nist_p256\"" };
  2075. const char *expected_ecc_curve = { "\"NIST_P256\"" };
  2076. for (size_t i = 0; i < sizeof(testcase_ecc_curve) / sizeof(testcase_ecc_curve[0]); i++) {
  2077. CHECK_JSON_SIMPLE(TPM2_ECC_CURVE, testcase_ecc_curve[i], expected_ecc_curve);
  2078. }
  2079. const char *testcase_cc[] = { "\"TPM2_CC_Startup\"", "\"CC_Startup\"",
  2080. "\"Startup\"", "\"0x00000144\"" };
  2081. const char *expected_cc = { "\"Startup\"" };
  2082. for (size_t i = 0; i < sizeof(testcase_cc) / sizeof(testcase_cc[0]); i++) {
  2083. CHECK_JSON_SIMPLE(TPM2_CC, testcase_cc[i], expected_cc);
  2084. }
  2085. const char *testcase_eo[] = { "\"TPM2_EO_EQ\"", "\"EO_EQ\"",
  2086. "\"EQ\"", "\"0x0000\"" };
  2087. const char *expected_eo = { "\"EQ\"" };
  2088. for (size_t i = 0; i < sizeof(testcase_eo) / sizeof(testcase_eo[0]); i++) {
  2089. CHECK_JSON_SIMPLE(TPM2_EO, testcase_eo[i], expected_eo);
  2090. }
  2091. const char *testcase_st[] = { "\"TPM2_ST_NO_SESSIONS\"", "\"ST_NO_SESSIONS\"",
  2092. "\"no_SESSIONS\"", "\"0x8001\"" };
  2093. const char *expected_st = { "\"NO_SESSIONS\"" };
  2094. for (size_t i = 0; i < sizeof(testcase_st) / sizeof(testcase_st[0]); i++) {
  2095. CHECK_JSON_SIMPLE(TPM2_ST, testcase_st[i], expected_st);
  2096. }
  2097. const char *testcase_pt_pcr[] = { "\"TPM2_PT_PCR_EXTEND_L0\"", "\"PT_PCR_EXTEND_L0\"",
  2098. "\"PCR_EXTEND_L0\"", "\"EXTEND_L0\"" };
  2099. const char *expected_pt_pcr = { "\"EXTEND_L0\"" };
  2100. for (size_t i = 0; i < sizeof(testcase_pt_pcr) / sizeof(testcase_pt_pcr[0]); i++) {
  2101. CHECK_JSON_SIMPLE(TPM2_PT_PCR, testcase_pt_pcr[i], expected_pt_pcr);
  2102. }
  2103. const char *testcase_alg_public[] = { "\"TPM2_ALG_RSA\"", "\"ALG_RSA\"",
  2104. "\"RSA\"", "\"0x0001\"" };
  2105. const char *expected_alg_public = { "\"RSA\"" };
  2106. for (size_t i = 0; i < sizeof(testcase_alg_public) / sizeof(testcase_alg_public[0]); i++) {
  2107. CHECK_JSON_SIMPLE(TPMI_ALG_PUBLIC, testcase_alg_public[i], expected_alg_public);
  2108. }
  2109. }
  2110. static void
  2111. check_invalid_json(void **state) {
  2112. json_object *jso = ifapi_parse_json("{\n \"field\", \"value\"");
  2113. assert_null(jso);
  2114. }
  2115. int
  2116. main(int argc, char *argv[])
  2117. {
  2118. const struct CMUnitTest tests[] = {
  2119. cmocka_unit_test(check_tpmjson_tofromtxt),
  2120. cmocka_unit_test(check_json_structs),
  2121. cmocka_unit_test(check_json_constants),
  2122. cmocka_unit_test(check_json_numbers),
  2123. cmocka_unit_test(check_json_bits),
  2124. cmocka_unit_test(check_json_tpm2bs),
  2125. cmocka_unit_test(check_json_to_bin),
  2126. cmocka_unit_test(check_bin),
  2127. cmocka_unit_test(check_policy_bin),
  2128. cmocka_unit_test(check_error),
  2129. cmocka_unit_test(check_json_policy),
  2130. cmocka_unit_test(check_invalid_json),
  2131. };
  2132. return cmocka_run_group_tests(tests, NULL, NULL);
  2133. }