1 /* SPDX-License-Identifier: BSD-2-Clause */
2 /*******************************************************************************
3 * Copyright 2017-2018, Fraunhofer SIT sponsored by Infineon Technologies AG
4 * All rights reserved.
5 *******************************************************************************/
6
7 #ifdef HAVE_CONFIG_H
8 #include <config.h>
9 #endif
10
11 #include <stdlib.h>
12
13 #include "tss2_esys.h"
14
15 #include "esys_iutil.h"
16 #include "test-esapi.h"
17 #define LOGMODULE test
18 #include "util/log.h"
19 #include "util/aux_util.h"
20
21 /** This test is intended to test the GetTime command with password
22 * authentication.
23 *
24 * We create a RSA primary signing key which will be used
25 * for signing.
26 *
27 * Tested ESAPI commands:
28 * - Esys_CreatePrimary() (M)
29 * - Esys_FlushContext() (M)
30 * - Esys_GetTime() (O)
31 *
32 * @param[in,out] esys_context The ESYS_CONTEXT.
33 * @retval EXIT_FAILURE
34 * @retval EXIT_SKIP
35 * @retval EXIT_SUCCESS
36 */
37
38 int
test_esys_get_time(ESYS_CONTEXT * esys_context)39 test_esys_get_time(ESYS_CONTEXT * esys_context)
40 {
41 TSS2_RC r;
42 ESYS_TR signHandle = ESYS_TR_NONE;
43 int failure_return = EXIT_FAILURE;
44
45 TPM2B_PUBLIC *outPublic = NULL;
46 TPM2B_CREATION_DATA *creationData = NULL;
47 TPM2B_DIGEST *creationHash = NULL;
48 TPMT_TK_CREATION *creationTicket = NULL;
49 TPM2B_ATTEST *timeInfo = NULL;
50 TPMT_SIGNATURE *signature = NULL;
51
52 TPM2B_AUTH authValuePrimary = {
53 .size = 5,
54 .buffer = {1, 2, 3, 4, 5}
55 };
56
57 TPM2B_SENSITIVE_CREATE inSensitivePrimary = {
58 .size = 0,
59 .sensitive = {
60 .userAuth = {
61 .size = 0,
62 .buffer = {0},
63 },
64 .data = {
65 .size = 0,
66 .buffer = {0},
67 },
68 },
69 };
70
71 inSensitivePrimary.sensitive.userAuth = authValuePrimary;
72
73 TPM2B_PUBLIC inPublic = {
74 .size = 0,
75 .publicArea = {
76 .type = TPM2_ALG_RSA,
77 .nameAlg = TPM2_ALG_SHA1,
78 .objectAttributes = (
79 TPMA_OBJECT_USERWITHAUTH |
80 TPMA_OBJECT_RESTRICTED |
81 TPMA_OBJECT_SIGN_ENCRYPT |
82 TPMA_OBJECT_FIXEDTPM |
83 TPMA_OBJECT_FIXEDPARENT |
84 TPMA_OBJECT_SENSITIVEDATAORIGIN
85 ),
86 .authPolicy = {
87 .size = 0,
88 },
89 .parameters.rsaDetail = {
90 .symmetric = {
91 .algorithm = TPM2_ALG_NULL,
92 .keyBits.aes = 128,
93 .mode.aes = TPM2_ALG_CFB,
94 },
95 .scheme = {
96 .scheme = TPM2_ALG_RSASSA,
97 .details = { .rsassa = { .hashAlg = TPM2_ALG_SHA1 }},
98
99 },
100 .keyBits = 2048,
101 .exponent = 0,
102 },
103 .unique.rsa = {
104 .size = 0,
105 .buffer = {},
106 },
107 },
108 };
109
110 TPM2B_AUTH authValue = {
111 .size = 0,
112 .buffer = {}
113 };
114
115
116 TPM2B_DATA outsideInfo = {
117 .size = 0,
118 .buffer = {},
119 };
120
121
122 TPML_PCR_SELECTION creationPCR = {
123 .count = 0,
124 };
125
126 LOG_INFO("\nRSA key will be created.");
127
128 r = Esys_TR_SetAuth(esys_context, ESYS_TR_RH_OWNER, &authValue);
129 goto_if_error(r, "Error: TR_SetAuth", error);
130
131 RSRC_NODE_T *primaryHandle_node;
132
133 r = Esys_CreatePrimary(esys_context, ESYS_TR_RH_OWNER, ESYS_TR_PASSWORD,
134 ESYS_TR_NONE, ESYS_TR_NONE, &inSensitivePrimary,
135 &inPublic, &outsideInfo, &creationPCR,
136 &signHandle, &outPublic, &creationData,
137 &creationHash, &creationTicket);
138 goto_if_error(r, "Error esys create primary", error);
139
140 r = esys_GetResourceObject(esys_context, signHandle,
141 &primaryHandle_node);
142 goto_if_error(r, "Error Esys GetResourceObject", error);
143
144 LOG_INFO("Created Primary with handle 0x%08x...",
145 primaryHandle_node->rsrc.handle);
146
147 r = Esys_TR_SetAuth(esys_context, signHandle,
148 &authValuePrimary);
149 goto_if_error(r, "Error: TR_SetAuth", error);
150
151 ESYS_TR privacyAdminHandle= ESYS_TR_RH_ENDORSEMENT;
152 TPMT_SIG_SCHEME inScheme = { .scheme = TPM2_ALG_NULL };
153 TPM2B_DATA qualifyingData = {0};
154
155 r = Esys_GetTime (
156 esys_context,
157 privacyAdminHandle,
158 signHandle,
159 ESYS_TR_PASSWORD,
160 ESYS_TR_PASSWORD,
161 ESYS_TR_NONE,
162 &qualifyingData,
163 &inScheme,
164 &timeInfo,
165 &signature);
166 if ((r == TPM2_RC_COMMAND_CODE) ||
167 (r == (TPM2_RC_COMMAND_CODE | TSS2_RESMGR_RC_LAYER)) ||
168 (r == (TPM2_RC_COMMAND_CODE | TSS2_RESMGR_TPM_RC_LAYER))) {
169 LOG_WARNING("Command TPM2_GetTime not supported by TPM.");
170 r = Esys_FlushContext(esys_context, signHandle);
171 goto_if_error(r, "Flushing context", error);
172
173 signHandle = ESYS_TR_NONE;
174 failure_return = EXIT_SKIP;
175 goto error;
176 }
177 goto_if_error(r, "Error: GetTime", error);
178
179 r = Esys_FlushContext(esys_context, signHandle);
180 goto_if_error(r, "Error: FlushContext", error);
181
182 Esys_Free(outPublic);
183 Esys_Free(creationData);
184 Esys_Free(creationHash);
185 Esys_Free(creationTicket);
186 Esys_Free(timeInfo);
187 Esys_Free(signature);
188 return EXIT_SUCCESS;
189
190 error:
191
192 if (signHandle != ESYS_TR_NONE) {
193 if (Esys_FlushContext(esys_context, signHandle) != TSS2_RC_SUCCESS) {
194 LOG_ERROR("Cleanup signHandle failed.");
195 }
196 }
197 Esys_Free(outPublic);
198 Esys_Free(creationData);
199 Esys_Free(creationHash);
200 Esys_Free(creationTicket);
201 Esys_Free(timeInfo);
202 Esys_Free(signature);
203 return failure_return;
204 }
205
206 int
test_invoke_esapi(ESYS_CONTEXT * esys_context)207 test_invoke_esapi(ESYS_CONTEXT * esys_context) {
208 return test_esys_get_time(esys_context);
209 }
210