blob: 230895be29e9ddf3cbeb7ac4de8b304281d6c47d [file] [log] [blame]
/*******************************************************************************
* Copyright 2017-2018, Fraunhofer SIT sponsored by Infineon Technologies AG
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are met:
*
* 1. Redistributions of source code must retain the above copyright notice,
* this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright notice,
* this list of conditions and the following disclaimer in the documentation
* and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
* THE POSSIBILITY OF SUCH DAMAGE.
*******************************************************************************/
#define _GNU_SOURCE
#include <getopt.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <signal.h>
#include <stdint.h>
#include <gcrypt.h>
#include "tpm20.h"
#define LOGMODULE test
#include "log/log.h"
#include "test.h"
#include "sysapi_util.h"
#include "tss2_esys.h"
#include "esys_types.h"
#include "esys_iutil.h"
/*
* Test the ESAPI commands HashSequenceStart, SequenceUpdate,
* and SequenceComplete.
*/
int
test_invoke_esapi(ESYS_CONTEXT * esys_context)
{
uint32_t r = 0;
#ifdef TEST_SESSION
ESYS_TR session;
TPMT_SYM_DEF symmetric = {.algorithm = TPM2_ALG_AES,
.keyBits = {.aes = 128},
.mode = {.aes = TPM2_ALG_CFB}
};
TPMA_SESSION sessionAttributes;
TPM2B_NONCE *nonceTpm;
TPM2B_NONCE nonceCaller = {
.size = 20,
.buffer = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10,
11, 12, 13, 14, 15, 16, 17, 18, 19, 20}
};
memset(&sessionAttributes, 0, sizeof sessionAttributes);
r = Esys_StartAuthSession(esys_context, ESYS_TR_NONE, ESYS_TR_NONE,
ESYS_TR_NONE, ESYS_TR_NONE, ESYS_TR_NONE,
&nonceCaller,
TPM2_SE_HMAC, &symmetric, TPM2_ALG_SHA1, &session,
&nonceTpm);
goto_if_error(r, "Error: During initialization of session", error);
#endif /* TEST_SESSION */
TPM2B_AUTH auth = {.size = 20,
.buffer={10, 11, 12, 13, 14, 15, 16, 17, 18, 19,
20, 21, 22, 23, 24, 25, 26, 27, 28, 29}};
TPMI_ALG_HASH hashAlg = TPM2_ALG_SHA256;
ESYS_TR sequenceHandle_handle;
r = Esys_HashSequenceStart(esys_context,
ESYS_TR_NONE,
ESYS_TR_NONE,
ESYS_TR_NONE,
&auth,
hashAlg,
&sequenceHandle_handle
);
goto_if_error(r, "Error: HashSequenceStart", error);
TPM2B_MAX_BUFFER buffer = {.size = 20,
.buffer={10, 11, 12, 13, 14, 15, 16, 17, 18, 19,
20, 21, 22, 23, 24, 25, 26, 27, 28, 29}};
r = Esys_TR_SetAuth(esys_context, sequenceHandle_handle, &auth);
goto_if_error(r, "Error esys TR_SetAuth ", error);
r = Esys_SequenceUpdate(esys_context,
sequenceHandle_handle,
#ifdef TEST_SESSION
session,
#else
ESYS_TR_PASSWORD,
#endif
ESYS_TR_NONE,
ESYS_TR_NONE,
&buffer
);
goto_if_error(r, "Error: SequenceUpdate", error);
TPM2B_DIGEST *result;
TPMT_TK_HASHCHECK *validation;
r = Esys_SequenceComplete(esys_context,
sequenceHandle_handle,
#ifdef TEST_SESSION
session,
#else
ESYS_TR_PASSWORD,
#endif
ESYS_TR_NONE,
ESYS_TR_NONE,
&buffer,
TPM2_RH_OWNER,
&result,
&validation
);
goto_if_error(r, "Error: SequenceComplete", error);
#ifdef TEST_SESSION
r = Esys_FlushContext(esys_context, session);
goto_if_error(r, "Error: FlushContext", error);
#endif
return 0;
error:
return 1;
}