xref: /aosp_15_r20/external/tpm2-tss/test/integration/esys-get-time.int.c (revision 758e9fba6fc9adbf15340f70c73baee7b168b1c9)
1 /* SPDX-License-Identifier: BSD-2-Clause */
2 /*******************************************************************************
3  * Copyright 2017-2018, Fraunhofer SIT sponsored by Infineon Technologies AG
4  * All rights reserved.
5  *******************************************************************************/
6 
7 #ifdef HAVE_CONFIG_H
8 #include <config.h>
9 #endif
10 
11 #include <stdlib.h>
12 
13 #include "tss2_esys.h"
14 
15 #include "esys_iutil.h"
16 #include "test-esapi.h"
17 #define LOGMODULE test
18 #include "util/log.h"
19 #include "util/aux_util.h"
20 
21 /** This test is intended to test the GetTime command with password
22  *  authentication.
23  *
24  * We create a RSA primary signing key which will be used
25  * for signing.
26  *
27  * Tested ESAPI commands:
28  *  - Esys_CreatePrimary() (M)
29  *  - Esys_FlushContext() (M)
30  *  - Esys_GetTime() (O)
31  *
32  * @param[in,out] esys_context The ESYS_CONTEXT.
33  * @retval EXIT_FAILURE
34  * @retval EXIT_SKIP
35  * @retval EXIT_SUCCESS
36  */
37 
38 int
test_esys_get_time(ESYS_CONTEXT * esys_context)39 test_esys_get_time(ESYS_CONTEXT * esys_context)
40 {
41     TSS2_RC r;
42     ESYS_TR signHandle = ESYS_TR_NONE;
43     int failure_return = EXIT_FAILURE;
44 
45     TPM2B_PUBLIC *outPublic = NULL;
46     TPM2B_CREATION_DATA *creationData = NULL;
47     TPM2B_DIGEST *creationHash = NULL;
48     TPMT_TK_CREATION *creationTicket = NULL;
49     TPM2B_ATTEST *timeInfo = NULL;
50     TPMT_SIGNATURE *signature = NULL;
51 
52     TPM2B_AUTH authValuePrimary = {
53         .size = 5,
54         .buffer = {1, 2, 3, 4, 5}
55     };
56 
57     TPM2B_SENSITIVE_CREATE inSensitivePrimary = {
58         .size = 0,
59         .sensitive = {
60             .userAuth = {
61                  .size = 0,
62                  .buffer = {0},
63              },
64             .data = {
65                  .size = 0,
66                  .buffer = {0},
67              },
68         },
69     };
70 
71     inSensitivePrimary.sensitive.userAuth = authValuePrimary;
72 
73     TPM2B_PUBLIC inPublic = {
74             .size = 0,
75             .publicArea = {
76                 .type = TPM2_ALG_RSA,
77                 .nameAlg = TPM2_ALG_SHA1,
78                 .objectAttributes = (
79                     TPMA_OBJECT_USERWITHAUTH |
80                     TPMA_OBJECT_RESTRICTED |
81                     TPMA_OBJECT_SIGN_ENCRYPT |
82                     TPMA_OBJECT_FIXEDTPM |
83                     TPMA_OBJECT_FIXEDPARENT |
84                     TPMA_OBJECT_SENSITIVEDATAORIGIN
85                     ),
86                 .authPolicy = {
87                         .size = 0,
88                     },
89                 .parameters.rsaDetail = {
90                     .symmetric = {
91                         .algorithm = TPM2_ALG_NULL,
92                         .keyBits.aes = 128,
93                         .mode.aes = TPM2_ALG_CFB,
94                         },
95                     .scheme = {
96                          .scheme = TPM2_ALG_RSASSA,
97                          .details = { .rsassa = { .hashAlg = TPM2_ALG_SHA1 }},
98 
99                     },
100                     .keyBits = 2048,
101                     .exponent = 0,
102                 },
103                 .unique.rsa = {
104                         .size = 0,
105                         .buffer = {},
106                     },
107             },
108         };
109 
110     TPM2B_AUTH authValue = {
111                 .size = 0,
112                 .buffer = {}
113     };
114 
115 
116     TPM2B_DATA outsideInfo = {
117             .size = 0,
118             .buffer = {},
119     };
120 
121 
122     TPML_PCR_SELECTION creationPCR = {
123         .count = 0,
124     };
125 
126     LOG_INFO("\nRSA key will be created.");
127 
128     r = Esys_TR_SetAuth(esys_context, ESYS_TR_RH_OWNER, &authValue);
129     goto_if_error(r, "Error: TR_SetAuth", error);
130 
131     RSRC_NODE_T *primaryHandle_node;
132 
133     r = Esys_CreatePrimary(esys_context, ESYS_TR_RH_OWNER, ESYS_TR_PASSWORD,
134                            ESYS_TR_NONE, ESYS_TR_NONE, &inSensitivePrimary,
135                            &inPublic, &outsideInfo, &creationPCR,
136                            &signHandle, &outPublic, &creationData,
137                            &creationHash, &creationTicket);
138     goto_if_error(r, "Error esys create primary", error);
139 
140     r = esys_GetResourceObject(esys_context, signHandle,
141                                &primaryHandle_node);
142     goto_if_error(r, "Error Esys GetResourceObject", error);
143 
144     LOG_INFO("Created Primary with handle 0x%08x...",
145              primaryHandle_node->rsrc.handle);
146 
147     r = Esys_TR_SetAuth(esys_context, signHandle,
148                         &authValuePrimary);
149     goto_if_error(r, "Error: TR_SetAuth", error);
150 
151     ESYS_TR privacyAdminHandle= ESYS_TR_RH_ENDORSEMENT;
152     TPMT_SIG_SCHEME inScheme = { .scheme = TPM2_ALG_NULL };
153     TPM2B_DATA qualifyingData = {0};
154 
155     r = Esys_GetTime (
156          esys_context,
157          privacyAdminHandle,
158          signHandle,
159          ESYS_TR_PASSWORD,
160          ESYS_TR_PASSWORD,
161          ESYS_TR_NONE,
162          &qualifyingData,
163          &inScheme,
164          &timeInfo,
165          &signature);
166     if ((r == TPM2_RC_COMMAND_CODE) ||
167         (r == (TPM2_RC_COMMAND_CODE | TSS2_RESMGR_RC_LAYER)) ||
168         (r == (TPM2_RC_COMMAND_CODE | TSS2_RESMGR_TPM_RC_LAYER))) {
169         LOG_WARNING("Command TPM2_GetTime not supported by TPM.");
170         r = Esys_FlushContext(esys_context, signHandle);
171         goto_if_error(r, "Flushing context", error);
172 
173         signHandle = ESYS_TR_NONE;
174         failure_return = EXIT_SKIP;
175         goto error;
176     }
177     goto_if_error(r, "Error: GetTime", error);
178 
179     r = Esys_FlushContext(esys_context, signHandle);
180     goto_if_error(r, "Error: FlushContext", error);
181 
182     Esys_Free(outPublic);
183     Esys_Free(creationData);
184     Esys_Free(creationHash);
185     Esys_Free(creationTicket);
186     Esys_Free(timeInfo);
187     Esys_Free(signature);
188     return EXIT_SUCCESS;
189 
190  error:
191 
192     if (signHandle != ESYS_TR_NONE) {
193         if (Esys_FlushContext(esys_context, signHandle) != TSS2_RC_SUCCESS) {
194             LOG_ERROR("Cleanup signHandle failed.");
195         }
196     }
197     Esys_Free(outPublic);
198     Esys_Free(creationData);
199     Esys_Free(creationHash);
200     Esys_Free(creationTicket);
201     Esys_Free(timeInfo);
202     Esys_Free(signature);
203     return failure_return;
204 }
205 
206 int
test_invoke_esapi(ESYS_CONTEXT * esys_context)207 test_invoke_esapi(ESYS_CONTEXT * esys_context) {
208     return test_esys_get_time(esys_context);
209 }
210