1 /*
2 * Copyright (c) 2010-2012 United States Government, as represented by
3 * the Secretary of Defense. All rights reserved.
4 *
5 * based off of the original tools/vtpm_manager code base which is:
6 * Copyright (c) 2005, Intel Corp.
7 * All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 *
13 * * Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * * Redistributions in binary form must reproduce the above
16 * copyright notice, this list of conditions and the following
17 * disclaimer in the documentation and/or other materials provided
18 * with the distribution.
19 * * Neither the name of Intel Corporation nor the names of its
20 * contributors may be used to endorse or promote products derived
21 * from this software without specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
26 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
27 * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
28 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
29 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
30 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
32 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
33 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
34 * OF THE POSSIBILITY OF SUCH DAMAGE.
35 */
36
37 #include <stdio.h>
38 #include <string.h>
39 #include <malloc.h>
40 #include <unistd.h>
41 #include <errno.h>
42
43 #include <polarssl/sha1.h>
44
45 #include "tcg.h"
46 #include "tpm.h"
47 #include "log.h"
48 #include "marshal.h"
49 #include "tpmrsa.h"
50 #include "vtpmmgr.h"
51
52 #define TCPA_MAX_BUFFER_LENGTH 0x2000
53
54 #define TPM_BEGIN_CMD(ord) \
55 const TPM_COMMAND_CODE ordinal = ord; \
56 TPM_RESULT status = TPM_SUCCESS; \
57 BYTE _io_buffer[TCPA_MAX_BUFFER_LENGTH]; \
58 UINT32 _io_bufsize_in; \
59 UINT32 _io_bufsize_out; \
60 vtpmloginfo(VTPM_LOG_TPM, "%s\n", __func__); \
61 do { \
62 BYTE *in_buf = _io_buffer; \
63 UINT32 in_pos = 6; \
64 PACK_IN(UINT32, ordinal);
65
66 #define IN_PTR (in_buf + in_pos)
67
68 #define PACK_IN(type, item...) do { \
69 UINT32 isize = sizeof_ ## type(item); \
70 if (isize + in_pos > TCPA_MAX_BUFFER_LENGTH) { \
71 status = TPM_SIZE; \
72 goto abort_egress; \
73 } \
74 pack_ ## type (IN_PTR, item); \
75 in_pos += isize; \
76 } while (0)
77
78 #define TPM_HASH_IN_BEGIN \
79 sha1_context sha1_ctx; \
80 sha1_starts(&sha1_ctx); \
81 sha1_update(&sha1_ctx, in_buf + 6, 4); \
82 TPM_HASH_IN_START
83
84 #define TPM_HASH_IN_START \
85 do { \
86 UINT32 _hash_in_start = in_pos;
87
88 #define TPM_HASH_IN_STOP \
89 sha1_update(&sha1_ctx, in_buf + _hash_in_start, in_pos - _hash_in_start); \
90 } while (0)
91
92 #define TPM_TAG_COMMON(req_tag) \
93 _io_bufsize_in = in_pos; \
94 pack_TPM_TAG(in_buf, req_tag); \
95 pack_UINT32(in_buf + sizeof(TPM_TAG), in_pos); \
96 } while (0); \
97 _io_bufsize_out = TCPA_MAX_BUFFER_LENGTH; \
98 status = TPM_TransmitData(_io_buffer, _io_bufsize_in, _io_buffer, &_io_bufsize_out); \
99 if (status != TPM_SUCCESS) { \
100 goto abort_egress; \
101 } \
102 do { \
103 BYTE *out_buf = _io_buffer; \
104 UINT32 out_pos = 0; \
105 UINT32 out_len = _io_bufsize_out; \
106 do { \
107 TPM_TAG rsp_tag; \
108 UINT32 rsp_len; \
109 UINT32 rsp_status; \
110 UNPACK_OUT(TPM_RSP_HEADER, &rsp_tag, &rsp_len, &rsp_status); \
111 if (rsp_status != TPM_SUCCESS) { \
112 vtpmlogerror(VTPM_LOG_TPM, "Failed with return code %s\n", tpm_get_error_name(rsp_status)); \
113 status = rsp_status; \
114 goto abort_egress; \
115 } \
116 if (rsp_tag != req_tag + 3 || rsp_len != out_len) { \
117 status = TPM_FAIL; \
118 goto abort_egress; \
119 } \
120 } while(0)
121
122 #define OUT_PTR (out_buf + out_pos)
123
124 #define UNPACK_OUT(type, item...) do { \
125 if (unpack3_ ## type (out_buf, &out_pos, TCPA_MAX_BUFFER_LENGTH, item)) { \
126 status = TPM_SIZE; \
127 goto abort_egress; \
128 } \
129 } while (0)
130
131 #define TPM_XMIT_REQ() \
132 TPM_TAG_COMMON(TPM_TAG_RQU_COMMAND)
133
134 #define TPM_XMIT_AUTH1(sec1, auth1) \
135 TPM_HASH_IN_STOP; \
136 do { \
137 TPM_DIGEST paramDigest; \
138 sha1_finish(&sha1_ctx, paramDigest.digest); \
139 generateAuth(¶mDigest, sec1, auth1); \
140 PACK_IN(TPM_AUTH_SESSION, auth1); \
141 } while (0); \
142 TPM_TAG_COMMON(TPM_TAG_RQU_AUTH1_COMMAND); \
143 TPM_HASH_OUT_BEGIN
144
145 #define TPM_XMIT_AUTH2(sec1, auth1, sec2, auth2) \
146 TPM_HASH_IN_STOP; \
147 do { \
148 TPM_DIGEST paramDigest; \
149 sha1_finish(&sha1_ctx, paramDigest.digest); \
150 generateAuth(¶mDigest, sec1, auth1); \
151 PACK_IN(TPM_AUTH_SESSION, auth1); \
152 generateAuth(¶mDigest, sec2, auth2); \
153 PACK_IN(TPM_AUTH_SESSION, auth2); \
154 } while (0); \
155 TPM_TAG_COMMON(TPM_TAG_RQU_AUTH2_COMMAND); \
156 TPM_HASH_OUT_BEGIN
157
158 #define TPM_HASH_OUT_BEGIN \
159 sha1_context sha1_ctx; \
160 sha1_starts(&sha1_ctx); \
161 do { \
162 UINT32 buf[2] = { cpu_to_be32(status), cpu_to_be32(ordinal) }; \
163 sha1_update(&sha1_ctx, (BYTE*)buf, sizeof(buf)); \
164 } while(0); \
165 TPM_HASH_OUT_START
166
167 #define TPM_HASH_OUT_START \
168 do { \
169 UINT32 _hash_out_start = out_pos;
170
171 #define TPM_HASH_OUT_STOP \
172 sha1_update(&sha1_ctx, out_buf + _hash_out_start, out_pos - _hash_out_start); \
173 } while (0)
174
175 #define TPM_END_AUTH1(sec1, auth1) \
176 TPM_HASH_OUT_STOP; \
177 do { \
178 TPM_DIGEST paramDigest; \
179 sha1_finish(&sha1_ctx, paramDigest.digest); \
180 UNPACK_OUT(TPM_AUTH_SESSION, auth1); \
181 status = verifyAuth(¶mDigest, sec1, auth1); \
182 if (status != TPM_SUCCESS) \
183 goto abort_egress; \
184 } while(0); \
185 TPM_END_COMMON
186
187 #define TPM_END_AUTH2(sec1, auth1, sec2, auth2) \
188 TPM_HASH_OUT_STOP; \
189 do { \
190 TPM_DIGEST paramDigest; \
191 sha1_finish(&sha1_ctx, paramDigest.digest); \
192 UNPACK_OUT(TPM_AUTH_SESSION, auth1); \
193 status = verifyAuth(¶mDigest, sec1, auth1); \
194 if (status != TPM_SUCCESS) \
195 goto abort_egress; \
196 UNPACK_OUT(TPM_AUTH_SESSION, auth2); \
197 status = verifyAuth(¶mDigest, sec2, auth2); \
198 if (status != TPM_SUCCESS) \
199 goto abort_egress; \
200 } while(0); \
201 TPM_END_COMMON
202
203 #define TPM_END() TPM_END_COMMON
204
205 #define TPM_END_COMMON \
206 if (out_pos != out_len) { \
207 vtpmloginfo(VTPM_LOG_TPM, "Response too long (%d != %d)", out_pos, out_len);\
208 status = TPM_SIZE; \
209 goto abort_egress; \
210 } \
211 } while (0); \
212
213 #define TPM_AUTH_ERR_CHECK(auth) do {\
214 if(status != TPM_SUCCESS || auth->fContinueAuthSession == FALSE) {\
215 vtpmloginfo(VTPM_LOG_TPM, "Auth Session: 0x%x closed by TPM\n", auth->AuthHandle);\
216 auth->AuthHandle = 0;\
217 }\
218 } while(0)
219
xorEncrypt(const TPM_SECRET * sharedSecret,TPM_NONCE * nonce,const TPM_AUTHDATA * inAuth0,TPM_ENCAUTH outAuth0,const TPM_AUTHDATA * inAuth1,TPM_ENCAUTH outAuth1)220 static void xorEncrypt(const TPM_SECRET* sharedSecret,
221 TPM_NONCE* nonce,
222 const TPM_AUTHDATA* inAuth0,
223 TPM_ENCAUTH outAuth0,
224 const TPM_AUTHDATA* inAuth1,
225 TPM_ENCAUTH outAuth1) {
226 BYTE XORbuffer[sizeof(TPM_SECRET) + sizeof(TPM_NONCE)];
227 BYTE XORkey[TPM_DIGEST_SIZE];
228 BYTE* ptr = XORbuffer;
229 ptr = pack_TPM_SECRET(ptr, sharedSecret);
230 ptr = pack_TPM_NONCE(ptr, nonce);
231
232 sha1(XORbuffer, ptr - XORbuffer, XORkey);
233
234 if(inAuth0) {
235 for(int i = 0; i < TPM_DIGEST_SIZE; ++i) {
236 outAuth0[i] = XORkey[i] ^ (*inAuth0)[i];
237 }
238 }
239 if(inAuth1) {
240 for(int i = 0; i < TPM_DIGEST_SIZE; ++i) {
241 outAuth1[i] = XORkey[i] ^ (*inAuth1)[i];
242 }
243 }
244
245 }
246
generateAuth(const TPM_DIGEST * paramDigest,const TPM_SECRET * HMACkey,TPM_AUTH_SESSION * auth)247 static void generateAuth(const TPM_DIGEST* paramDigest,
248 const TPM_SECRET* HMACkey,
249 TPM_AUTH_SESSION *auth)
250 {
251 //Generate new OddNonce
252 vtpmmgr_rand((BYTE*)auth->NonceOdd.nonce, sizeof(TPM_NONCE));
253
254 // Create HMAC text. (Concat inParamsDigest with inAuthSetupParams).
255 BYTE hmacText[sizeof(TPM_DIGEST) + (2 * sizeof(TPM_NONCE)) + sizeof(BOOL)];
256 BYTE* ptr = hmacText;
257
258 ptr = pack_TPM_DIGEST(ptr, paramDigest);
259 ptr = pack_TPM_NONCE(ptr, &auth->NonceEven);
260 ptr = pack_TPM_NONCE(ptr, &auth->NonceOdd);
261 ptr = pack_BOOL(ptr, auth->fContinueAuthSession);
262
263 sha1_hmac((BYTE *) HMACkey, sizeof(TPM_DIGEST),
264 (BYTE *) hmacText, sizeof(hmacText),
265 auth->HMAC);
266 }
267
verifyAuth(const TPM_DIGEST * paramDigest,const TPM_SECRET * HMACkey,TPM_AUTH_SESSION * auth)268 static TPM_RESULT verifyAuth(const TPM_DIGEST* paramDigest,
269 /*[IN]*/ const TPM_SECRET *HMACkey,
270 /*[IN,OUT]*/ TPM_AUTH_SESSION *auth)
271 {
272
273 // Create HMAC text. (Concat inParamsDigest with inAuthSetupParams).
274 TPM_AUTHDATA hm;
275 BYTE hmacText[sizeof(TPM_DIGEST) + (2 * sizeof(TPM_NONCE)) + sizeof(BOOL)];
276 BYTE* ptr = hmacText;
277
278 ptr = pack_TPM_DIGEST(ptr, paramDigest);
279 ptr = pack_TPM_NONCE(ptr, &auth->NonceEven);
280 ptr = pack_TPM_NONCE(ptr, &auth->NonceOdd);
281 ptr = pack_BOOL(ptr, auth->fContinueAuthSession);
282
283 sha1_hmac( (BYTE *) HMACkey, sizeof(TPM_DIGEST),
284 (BYTE *) hmacText, sizeof(hmacText),
285 hm);
286
287 // Compare correct HMAC with provided one.
288 if (memcmp(hm, auth->HMAC, sizeof(TPM_DIGEST)) == 0) { // 0 indicates equality
289 return TPM_SUCCESS;
290 } else {
291 vtpmlogerror(VTPM_LOG_TPM, "Auth Session verification failed! %x %x\n",
292 *(UINT32*)auth->HMAC, *(UINT32*)hm);
293 return TPM_AUTHFAIL;
294 }
295 }
296
297
298
299 // ------------------------------------------------------------------
300 // Authorization Commands
301 // ------------------------------------------------------------------
302
TPM_OIAP(TPM_AUTH_SESSION * auth)303 TPM_RESULT TPM_OIAP(TPM_AUTH_SESSION* auth) // out
304 {
305 TPM_BEGIN_CMD(TPM_ORD_OIAP);
306
307 TPM_XMIT_REQ();
308
309 memset(&auth->HMAC, 0, sizeof(TPM_DIGEST));
310 auth->fContinueAuthSession = TRUE;
311
312 UNPACK_OUT(UINT32, &auth->AuthHandle);
313 UNPACK_OUT(TPM_NONCE, &auth->NonceEven);
314 TPM_END();
315
316 vtpmloginfo(VTPM_LOG_TPM, "Auth Session: 0x%x opened by TPM_OIAP.\n", auth->AuthHandle);
317
318 abort_egress:
319 return status;
320 }
321
TPM_OSAP(TPM_ENTITY_TYPE entityType,UINT32 entityValue,const TPM_AUTHDATA * usageAuth,TPM_SECRET * sharedSecret,TPM_AUTH_SESSION * auth)322 TPM_RESULT TPM_OSAP(TPM_ENTITY_TYPE entityType, // in
323 UINT32 entityValue, // in
324 const TPM_AUTHDATA* usageAuth, //in
325 TPM_SECRET *sharedSecret, //out
326 TPM_AUTH_SESSION *auth)
327 {
328 TPM_DIGEST nonceOddOSAP;
329 vtpmmgr_rand(nonceOddOSAP.digest, TPM_DIGEST_SIZE);
330 TPM_BEGIN_CMD(TPM_ORD_OSAP);
331
332 PACK_IN(TPM_ENTITY_TYPE, entityType);
333 PACK_IN(UINT32, entityValue);
334 PACK_IN(TPM_DIGEST, &nonceOddOSAP);
335
336 TPM_XMIT_REQ();
337
338 UNPACK_OUT(UINT32, &auth->AuthHandle);
339 UNPACK_OUT(TPM_NONCE, &auth->NonceEven);
340
341 //Calculate session secret
342 sha1_context ctx;
343 sha1_hmac_starts(&ctx, *usageAuth, TPM_DIGEST_SIZE);
344 sha1_hmac_update(&ctx, OUT_PTR, TPM_DIGEST_SIZE); // nonceEvenOSAP
345 sha1_hmac_update(&ctx, nonceOddOSAP.digest, TPM_DIGEST_SIZE);
346 sha1_hmac_finish(&ctx, *sharedSecret);
347
348 out_pos += TPM_DIGEST_SIZE;
349 TPM_END();
350
351 memset(&auth->HMAC, 0, sizeof(TPM_DIGEST));
352 auth->fContinueAuthSession = FALSE;
353
354 vtpmloginfo(VTPM_LOG_TPM, "Auth Session: 0x%x opened by TPM_OSAP.\n", auth->AuthHandle);
355
356 abort_egress:
357 return status;
358 }
359
TPM_TakeOwnership(const TPM_PUBKEY * pubEK,const TPM_AUTHDATA * ownerAuth,const TPM_AUTHDATA * srkAuth,const TPM_KEY * inSrk,TPM_KEY * outSrk,TPM_AUTH_SESSION * auth)360 TPM_RESULT TPM_TakeOwnership(
361 const TPM_PUBKEY *pubEK, //in
362 const TPM_AUTHDATA* ownerAuth, //in
363 const TPM_AUTHDATA* srkAuth, //in
364 const TPM_KEY* inSrk, //in
365 TPM_KEY* outSrk, //out, optional
366 TPM_AUTH_SESSION* auth) // in, out
367 {
368 int keyAlloced = 0;
369 tpmrsa_context ek_rsa = TPMRSA_CTX_INIT;
370
371 TPM_BEGIN_CMD(TPM_ORD_TakeOwnership);
372 TPM_HASH_IN_BEGIN;
373
374 tpmrsa_set_pubkey(&ek_rsa,
375 pubEK->pubKey.key, pubEK->pubKey.keyLength,
376 pubEK->algorithmParms.parms.rsa.exponent,
377 pubEK->algorithmParms.parms.rsa.exponentSize);
378
379 /* Pack the protocol ID */
380 PACK_IN(UINT16, TPM_PID_OWNER);
381
382 /* Pack the encrypted owner auth */
383 PACK_IN(UINT32, pubEK->algorithmParms.parms.rsa.keyLength / 8);
384 tpmrsa_pub_encrypt_oaep(&ek_rsa,
385 ctr_drbg_random, &vtpm_globals.ctr_drbg,
386 sizeof(TPM_SECRET),
387 (BYTE*) ownerAuth,
388 IN_PTR);
389 in_pos += pubEK->algorithmParms.parms.rsa.keyLength / 8;
390
391 /* Pack the encrypted srk auth */
392 PACK_IN(UINT32, pubEK->algorithmParms.parms.rsa.keyLength / 8);
393 tpmrsa_pub_encrypt_oaep(&ek_rsa,
394 ctr_drbg_random, &vtpm_globals.ctr_drbg,
395 sizeof(TPM_SECRET),
396 (BYTE*) srkAuth,
397 IN_PTR);
398 in_pos += pubEK->algorithmParms.parms.rsa.keyLength / 8;
399
400 PACK_IN(TPM_KEY, inSrk);
401
402 TPM_XMIT_AUTH1(ownerAuth, auth);
403
404 if (outSrk != NULL) {
405 /* If the user wants a copy of the srk we give it to them */
406 keyAlloced = 1;
407 UNPACK_OUT(TPM_KEY, outSrk, UNPACK_ALLOC);
408 } else {
409 /*otherwise just parse past it */
410 TPM_KEY temp;
411 UNPACK_OUT(TPM_KEY, &temp, UNPACK_ALIAS);
412 }
413
414 TPM_END_AUTH1(ownerAuth, auth);
415
416 goto egress;
417 abort_egress:
418 if(keyAlloced) {
419 free_TPM_KEY(outSrk);
420 }
421 egress:
422 tpmrsa_free(&ek_rsa);
423 TPM_AUTH_ERR_CHECK(auth);
424 return status;
425 }
426
427
TPM_DisablePubekRead(const TPM_AUTHDATA * ownerAuth,TPM_AUTH_SESSION * auth)428 TPM_RESULT TPM_DisablePubekRead (
429 const TPM_AUTHDATA* ownerAuth,
430 TPM_AUTH_SESSION* auth)
431 {
432 TPM_BEGIN_CMD(TPM_ORD_DisablePubekRead);
433 TPM_HASH_IN_BEGIN;
434
435 TPM_XMIT_AUTH1(ownerAuth, auth);
436
437 TPM_END_AUTH1(ownerAuth, auth);
438
439 abort_egress:
440 TPM_AUTH_ERR_CHECK(auth);
441 return status;
442 }
443
444
TPM_TerminateHandle(TPM_AUTHHANDLE handle)445 TPM_RESULT TPM_TerminateHandle(TPM_AUTHHANDLE handle) // in
446 {
447 if(handle == 0) {
448 return TPM_SUCCESS;
449 }
450
451 TPM_BEGIN_CMD(TPM_ORD_Terminate_Handle);
452
453 PACK_IN(TPM_AUTHHANDLE, handle);
454
455 TPM_XMIT_REQ();
456 TPM_END();
457
458 vtpmloginfo(VTPM_LOG_TPM, "Auth Session: 0x%x closed by TPM_TerminateHandle\n", handle);
459
460 abort_egress:
461 return status;
462 }
463
TPM_Extend(TPM_PCRINDEX pcrNum,TPM_DIGEST * inDigest,TPM_PCRVALUE * outDigest)464 TPM_RESULT TPM_Extend( TPM_PCRINDEX pcrNum, // in
465 TPM_DIGEST* inDigest, // in
466 TPM_PCRVALUE* outDigest) // out
467 {
468 TPM_BEGIN_CMD(TPM_ORD_Extend);
469
470 PACK_IN(TPM_PCRINDEX, pcrNum);
471 PACK_IN(TPM_DIGEST, inDigest);
472
473 TPM_XMIT_REQ();
474
475 UNPACK_OUT(TPM_PCRVALUE, outDigest);
476
477 TPM_END();
478
479 abort_egress:
480 return status;
481 }
482
TPM_Reset(TPM_PCR_SELECTION * sel)483 TPM_RESULT TPM_Reset(TPM_PCR_SELECTION *sel)
484 {
485 TPM_BEGIN_CMD(TPM_ORD_PCR_Reset);
486 PACK_IN(TPM_PCR_SELECTION, sel);
487 TPM_XMIT_REQ();
488 TPM_END();
489 abort_egress:
490 return status;
491 }
492
TPM_Seal(TPM_KEY_HANDLE keyHandle,UINT32 pcrInfoLongSize,TPM_PCR_INFO_LONG * pcrInfoLong,UINT32 inDataSize,const BYTE * inData,TPM_STORED_DATA12 * sealedData,const TPM_SECRET * osapSharedSecret,const TPM_AUTHDATA * sealedDataAuth,TPM_AUTH_SESSION * pubAuth)493 TPM_RESULT TPM_Seal(
494 TPM_KEY_HANDLE keyHandle, // in
495 UINT32 pcrInfoLongSize, // in
496 TPM_PCR_INFO_LONG* pcrInfoLong, // in
497 UINT32 inDataSize, // in
498 const BYTE* inData, // in
499 TPM_STORED_DATA12* sealedData, //out
500 const TPM_SECRET* osapSharedSecret, //in
501 const TPM_AUTHDATA* sealedDataAuth, //in
502 TPM_AUTH_SESSION* pubAuth // in, out
503 )
504 {
505 memset(sealedData, 0, sizeof(*sealedData));
506 TPM_BEGIN_CMD(TPM_ORD_Seal);
507 PACK_IN(TPM_KEY_HANDLE, keyHandle);
508 TPM_HASH_IN_BEGIN;
509
510 xorEncrypt(osapSharedSecret, &pubAuth->NonceEven, sealedDataAuth, IN_PTR, NULL, NULL);
511 in_pos += sizeof(TPM_ENCAUTH);
512
513 PACK_IN(UINT32, pcrInfoLongSize);
514 if (pcrInfoLongSize) {
515 PACK_IN(TPM_PCR_INFO_LONG, pcrInfoLong);
516 }
517 PACK_IN(UINT32, inDataSize);
518 PACK_IN(BUFFER, inData, inDataSize);
519
520 TPM_XMIT_AUTH1(osapSharedSecret, pubAuth);
521
522 UNPACK_OUT(TPM_STORED_DATA12, sealedData, UNPACK_ALLOC);
523
524 TPM_END_AUTH1(osapSharedSecret, pubAuth);
525
526 abort_egress:
527 if (status)
528 free_TPM_STORED_DATA12(sealedData);
529 TPM_AUTH_ERR_CHECK(pubAuth);
530 return status;
531 }
532
TPM_Unseal(TPM_KEY_HANDLE parentHandle,const TPM_STORED_DATA12 * sealedData,UINT32 * outSize,BYTE ** out,const TPM_AUTHDATA * key_usage_auth,const TPM_AUTHDATA * data_usage_auth,TPM_AUTH_SESSION * keyAuth,TPM_AUTH_SESSION * dataAuth)533 TPM_RESULT TPM_Unseal(
534 TPM_KEY_HANDLE parentHandle, // in
535 const TPM_STORED_DATA12* sealedData,
536 UINT32* outSize, // out
537 BYTE** out, //out
538 const TPM_AUTHDATA* key_usage_auth, //in
539 const TPM_AUTHDATA* data_usage_auth, //in
540 TPM_AUTH_SESSION* keyAuth, // in, out
541 TPM_AUTH_SESSION* dataAuth // in, out
542 )
543 {
544 TPM_BEGIN_CMD(TPM_ORD_Unseal);
545
546 PACK_IN(TPM_KEY_HANDLE, parentHandle);
547
548 TPM_HASH_IN_BEGIN;
549 PACK_IN(TPM_STORED_DATA12, sealedData);
550
551 TPM_XMIT_AUTH2(key_usage_auth, keyAuth, data_usage_auth, dataAuth);
552
553 UNPACK_OUT(UINT32, outSize);
554 UNPACK_OUT(PTR, out, *outSize, UNPACK_ALLOC);
555
556 TPM_END_AUTH2(key_usage_auth, keyAuth, data_usage_auth, dataAuth);
557
558 abort_egress:
559 TPM_AUTH_ERR_CHECK(keyAuth);
560 TPM_AUTH_ERR_CHECK(dataAuth);
561 return status;
562 }
563
TPM_LoadKey(TPM_KEY_HANDLE parentHandle,const TPM_KEY * key,TPM_HANDLE * keyHandle,const TPM_AUTHDATA * usage_auth,TPM_AUTH_SESSION * auth)564 TPM_RESULT TPM_LoadKey(
565 TPM_KEY_HANDLE parentHandle, //
566 const TPM_KEY* key, //in
567 TPM_HANDLE* keyHandle, // out
568 const TPM_AUTHDATA* usage_auth,
569 TPM_AUTH_SESSION* auth)
570 {
571 TPM_BEGIN_CMD(TPM_ORD_LoadKey);
572 PACK_IN(TPM_KEY_HANDLE, parentHandle);
573
574 TPM_HASH_IN_BEGIN;
575
576 PACK_IN(TPM_KEY, key);
577
578 TPM_XMIT_AUTH1(usage_auth, auth);
579
580 UNPACK_OUT(UINT32, keyHandle);
581
582 TPM_END_AUTH1(usage_auth, auth);
583
584 vtpmloginfo(VTPM_LOG_TPM, "Key Handle: 0x%x opened by TPM_LoadKey\n", *keyHandle);
585 abort_egress:
586 TPM_AUTH_ERR_CHECK(auth);
587 return status;
588 }
589
TPM_FlushSpecific(TPM_HANDLE handle,TPM_RESOURCE_TYPE rt)590 TPM_RESULT TPM_FlushSpecific(TPM_HANDLE handle,
591 TPM_RESOURCE_TYPE rt) {
592 if(handle == 0) {
593 return TPM_SUCCESS;
594 }
595 TPM_BEGIN_CMD(TPM_ORD_FlushSpecific);
596
597 PACK_IN(TPM_HANDLE, handle);
598 PACK_IN(TPM_RESOURCE_TYPE, rt);
599
600 TPM_XMIT_REQ();
601 TPM_END();
602
603 abort_egress:
604 return status;
605 }
606
TPM_GetRandom(UINT32 * bytesRequested,BYTE * randomBytes)607 TPM_RESULT TPM_GetRandom( UINT32* bytesRequested, // in, out
608 BYTE* randomBytes) // out
609 {
610 UINT32 req_len = *bytesRequested;
611 TPM_BEGIN_CMD(TPM_ORD_GetRandom);
612 PACK_IN(UINT32, req_len);
613
614 TPM_XMIT_REQ();
615
616 UNPACK_OUT(UINT32, bytesRequested);
617 if (*bytesRequested > req_len)
618 return TPM_FAIL;
619 UNPACK_OUT(BUFFER, randomBytes, *bytesRequested);
620 TPM_END();
621
622 abort_egress:
623 return status;
624 }
625
626
TPM_ReadPubek(TPM_PUBKEY * pubEK)627 TPM_RESULT TPM_ReadPubek(
628 TPM_PUBKEY* pubEK //out
629 )
630 {
631 TPM_DIGEST antiReplay;
632 BYTE* kptr = NULL;
633 BYTE digest[TPM_DIGEST_SIZE];
634 sha1_context ctx;
635
636 vtpmmgr_rand(antiReplay.digest, TPM_DIGEST_SIZE);
637
638 TPM_BEGIN_CMD(TPM_ORD_ReadPubek);
639
640 PACK_IN(TPM_DIGEST, &antiReplay);
641
642 TPM_XMIT_REQ();
643
644 //unpack and allocate the key
645 kptr = OUT_PTR;
646 UNPACK_OUT(TPM_PUBKEY, pubEK, UNPACK_ALLOC);
647
648 //Verify the checksum
649 sha1_starts(&ctx);
650 sha1_update(&ctx, kptr, OUT_PTR - kptr);
651 sha1_update(&ctx, antiReplay.digest, TPM_DIGEST_SIZE);
652 sha1_finish(&ctx, digest);
653
654 UNPACK_OUT(TPM_DIGEST, &antiReplay);
655
656 TPM_END();
657
658 //ptr points to the checksum computed by TPM
659 if(memcmp(digest, antiReplay.digest, TPM_DIGEST_SIZE)) {
660 vtpmlogerror(VTPM_LOG_TPM, "TPM_ReadPubek: Checksum returned by TPM was invalid!\n");
661 status = TPM_FAIL;
662 goto abort_egress;
663 }
664
665 goto egress;
666 abort_egress:
667 if(kptr != NULL) { //If we unpacked the pubEK, we have to free it
668 free_TPM_PUBKEY(pubEK);
669 }
670 egress:
671 return status;
672 }
673
TPM_PCR_Read(UINT32 pcr,TPM_DIGEST * value)674 TPM_RESULT TPM_PCR_Read(UINT32 pcr, TPM_DIGEST *value)
675 {
676 TPM_BEGIN_CMD(TPM_ORD_PcrRead);
677 PACK_IN(UINT32, pcr);
678 TPM_XMIT_REQ();
679 UNPACK_OUT(TPM_DIGEST, value);
680 TPM_END();
681 abort_egress:
682 return status;
683 }
684
TPM_SaveState(void)685 TPM_RESULT TPM_SaveState(void)
686 {
687 TPM_BEGIN_CMD(TPM_ORD_SaveState);
688 TPM_XMIT_REQ();
689 TPM_END();
690
691 abort_egress:
692 return status;
693 }
694
TPM_GetCapability(TPM_CAPABILITY_AREA capArea,UINT32 subCapSize,const BYTE * subCap,UINT32 * respSize,BYTE ** resp)695 TPM_RESULT TPM_GetCapability(
696 TPM_CAPABILITY_AREA capArea,
697 UINT32 subCapSize,
698 const BYTE* subCap,
699 UINT32* respSize,
700 BYTE** resp)
701 {
702 TPM_BEGIN_CMD(TPM_ORD_GetCapability);
703
704 PACK_IN(TPM_CAPABILITY_AREA, capArea);
705 PACK_IN(UINT32, subCapSize);
706 PACK_IN(BUFFER, subCap, subCapSize);
707
708 TPM_XMIT_REQ();
709
710 UNPACK_OUT(UINT32, respSize);
711 UNPACK_OUT(PTR, resp, *respSize, UNPACK_ALLOC);
712
713 TPM_END();
714
715 abort_egress:
716 return status;
717 }
718
TPM_CreateEndorsementKeyPair(const TPM_KEY_PARMS * keyInfo,TPM_PUBKEY * pubEK)719 TPM_RESULT TPM_CreateEndorsementKeyPair(
720 const TPM_KEY_PARMS* keyInfo,
721 TPM_PUBKEY* pubEK)
722 {
723 BYTE* kptr = NULL;
724 sha1_context ctx;
725 TPM_DIGEST checksum;
726 TPM_DIGEST hash;
727 TPM_NONCE antiReplay;
728 TPM_BEGIN_CMD(TPM_ORD_CreateEndorsementKeyPair);
729
730 //Make anti replay nonce
731 vtpmmgr_rand(antiReplay.nonce, sizeof(antiReplay.nonce));
732
733 PACK_IN(TPM_NONCE, &antiReplay);
734 PACK_IN(TPM_KEY_PARMS, keyInfo);
735
736 TPM_XMIT_REQ();
737
738 kptr = OUT_PTR;
739 UNPACK_OUT(TPM_PUBKEY, pubEK, UNPACK_ALLOC);
740
741 /* Hash the pub key blob */
742 sha1_starts(&ctx);
743 sha1_update(&ctx, kptr, OUT_PTR - kptr);
744 sha1_update(&ctx, antiReplay.nonce, sizeof(antiReplay.nonce));
745 sha1_finish(&ctx, hash.digest);
746
747 UNPACK_OUT(TPM_DIGEST, &checksum);
748
749 TPM_END();
750
751 if (memcmp(checksum.digest, hash.digest, TPM_DIGEST_SIZE)) {
752 vtpmloginfo(VTPM_LOG_VTPM, "TPM_CreateEndorsementKey: Checkum verification failed!\n");
753 status = TPM_FAIL;
754 goto abort_egress;
755 }
756
757 goto egress;
758 abort_egress:
759 if(kptr) {
760 free_TPM_PUBKEY(pubEK);
761 }
762 egress:
763 return status;
764 }
765
TPM_MakeIdentity(const TPM_AUTHDATA * identityAuth,const TPM_AUTHDATA * privCADigest,const TPM_KEY * kinfo,const TPM_AUTHDATA * srk_auth,const TPM_AUTHDATA * own_auth,TPM_AUTH_SESSION * srkAuth,TPM_AUTH_SESSION * ownAuth,TPM_KEY * key,UINT32 * identityBindingSize,BYTE ** identityBinding)766 TPM_RESULT TPM_MakeIdentity(
767 const TPM_AUTHDATA* identityAuth, // in
768 const TPM_AUTHDATA* privCADigest, // in
769 const TPM_KEY* kinfo, // in
770 const TPM_AUTHDATA* srk_auth, // in
771 const TPM_AUTHDATA* own_auth, // in
772 TPM_AUTH_SESSION* srkAuth, // in,out
773 TPM_AUTH_SESSION* ownAuth, // in,out
774 TPM_KEY* key, // out
775 UINT32* identityBindingSize, // out
776 BYTE** identityBinding) // out
777 {
778 TPM_BEGIN_CMD(TPM_ORD_MakeIdentity);
779 TPM_HASH_IN_BEGIN;
780
781 xorEncrypt(own_auth, &ownAuth->NonceEven, identityAuth, IN_PTR, NULL, NULL);
782 in_pos += sizeof(TPM_ENCAUTH);
783
784 PACK_IN(TPM_AUTHDATA, privCADigest);
785 PACK_IN(TPM_KEY, kinfo);
786
787 TPM_XMIT_AUTH2(srk_auth, srkAuth, own_auth, ownAuth);
788
789 UNPACK_OUT(TPM_KEY, key, UNPACK_ALLOC);
790 UNPACK_OUT(UINT32, identityBindingSize);
791 UNPACK_OUT(PTR, identityBinding, *identityBindingSize, UNPACK_ALLOC);
792
793 TPM_END_AUTH2(srk_auth, srkAuth, own_auth, ownAuth);
794
795 abort_egress:
796 TPM_AUTH_ERR_CHECK(srkAuth);
797 TPM_AUTH_ERR_CHECK(ownAuth);
798 return status;
799 }
800
TPM_ActivateIdentity(TPM_KEY_HANDLE aikHandle,BYTE * blob,UINT32 blobSize,const TPM_AUTHDATA * aik_auth,const TPM_AUTHDATA * owner_auth,TPM_AUTH_SESSION * aikAuth,TPM_AUTH_SESSION * ownAuth,TPM_SYMMETRIC_KEY * symKey)801 TPM_RESULT TPM_ActivateIdentity(
802 TPM_KEY_HANDLE aikHandle, // in
803 BYTE* blob, // in
804 UINT32 blobSize, // in
805 const TPM_AUTHDATA* aik_auth, // in
806 const TPM_AUTHDATA* owner_auth, // in
807 TPM_AUTH_SESSION* aikAuth, // in,out
808 TPM_AUTH_SESSION* ownAuth, // in,out
809 TPM_SYMMETRIC_KEY* symKey) // out
810 {
811 TPM_BEGIN_CMD(TPM_ORD_ActivateIdentity);
812 PACK_IN(TPM_KEY_HANDLE, aikHandle);
813 TPM_HASH_IN_BEGIN;
814 PACK_IN(UINT32, blobSize);
815 PACK_IN(BUFFER, blob, blobSize);
816
817 TPM_XMIT_AUTH2(aik_auth, aikAuth, owner_auth, ownAuth);
818
819 UNPACK_OUT(TPM_SYMMETRIC_KEY, symKey, UNPACK_ALLOC);
820
821 TPM_END_AUTH2(aik_auth, aikAuth, owner_auth, ownAuth);
822
823 abort_egress:
824 TPM_AUTH_ERR_CHECK(aikAuth);
825 TPM_AUTH_ERR_CHECK(ownAuth);
826 return status;
827 }
828
TPM_Quote(TPM_KEY_HANDLE keyh,const TPM_NONCE * data,const TPM_PCR_SELECTION * pcrSelect,const TPM_AUTHDATA * auth,TPM_AUTH_SESSION * oiap,TPM_PCR_COMPOSITE * pcrs,BYTE ** sig,UINT32 * sigSize)829 TPM_RESULT TPM_Quote(
830 TPM_KEY_HANDLE keyh, // in
831 const TPM_NONCE* data, // in
832 const TPM_PCR_SELECTION *pcrSelect, // in
833 const TPM_AUTHDATA* auth, // in
834 TPM_AUTH_SESSION* oiap, // in,out
835 TPM_PCR_COMPOSITE *pcrs, // out
836 BYTE** sig, // out
837 UINT32* sigSize) // out
838 {
839 TPM_BEGIN_CMD(TPM_ORD_Quote);
840 PACK_IN(TPM_KEY_HANDLE, keyh);
841 TPM_HASH_IN_BEGIN;
842 PACK_IN(TPM_NONCE, data);
843 PACK_IN(TPM_PCR_SELECTION, pcrSelect);
844
845 TPM_XMIT_AUTH1(auth, oiap);
846
847 UNPACK_OUT(TPM_PCR_COMPOSITE, pcrs, UNPACK_ALLOC);
848 UNPACK_OUT(UINT32, sigSize);
849 UNPACK_OUT(PTR, sig, *sigSize, UNPACK_ALLOC);
850
851 TPM_END_AUTH1(auth, oiap);
852
853 abort_egress:
854 TPM_AUTH_ERR_CHECK(oiap);
855 return status;
856 }
857
TPM_TransmitData(BYTE * in,UINT32 insize,BYTE * out,UINT32 * outsize)858 TPM_RESULT TPM_TransmitData(
859 BYTE* in,
860 UINT32 insize,
861 BYTE* out,
862 UINT32* outsize) {
863 TPM_RESULT status = TPM_SUCCESS;
864
865 UINT32 i;
866 vtpmloginfo(VTPM_LOG_TXDATA, "Sending buffer = 0x");
867 for(i = 0 ; i < insize ; i++)
868 vtpmloginfomore(VTPM_LOG_TXDATA, "%2.2x ", in[i]);
869
870 vtpmloginfomore(VTPM_LOG_TXDATA, "\n");
871
872 ssize_t size = 0;
873
874 // send the request
875 size = write (vtpm_globals.tpm_fd, in, insize);
876 if (size < 0) {
877 vtpmlogerror(VTPM_LOG_TXDATA, "write() failed : %s\n", strerror(errno));
878 ERRORDIE (TPM_IOERROR);
879 }
880 else if ((UINT32) size < insize) {
881 vtpmlogerror(VTPM_LOG_TXDATA, "Wrote %d instead of %d bytes!\n", (int) size, insize);
882 ERRORDIE (TPM_IOERROR);
883 }
884
885 // read the response
886 size = read (vtpm_globals.tpm_fd, out, *outsize);
887 if (size < 0) {
888 vtpmlogerror(VTPM_LOG_TXDATA, "read() failed : %s\n", strerror(errno));
889 ERRORDIE (TPM_IOERROR);
890 }
891
892 vtpmloginfo(VTPM_LOG_TXDATA, "Receiving buffer = 0x");
893 for(i = 0 ; i < size ; i++)
894 vtpmloginfomore(VTPM_LOG_TXDATA, "%2.2x ", out[i]);
895
896 vtpmloginfomore(VTPM_LOG_TXDATA, "\n");
897
898 *outsize = size;
899 goto egress;
900
901 abort_egress:
902 egress:
903 return status;
904 }
905