1 /*
2  * Copyright (c) 2010-2012 United States Government, as represented by
3  * the Secretary of Defense.  All rights reserved.
4  *
5  * based off of the original tools/vtpm_manager code base which is:
6  * Copyright (c) 2005, Intel Corp.
7  * All rights reserved.
8  *
9  * Redistribution and use in source and binary forms, with or without
10  * modification, are permitted provided that the following conditions
11  * are met:
12  *
13  *   * Redistributions of source code must retain the above copyright
14  *     notice, this list of conditions and the following disclaimer.
15  *   * Redistributions in binary form must reproduce the above
16  *     copyright notice, this list of conditions and the following
17  *     disclaimer in the documentation and/or other materials provided
18  *     with the distribution.
19  *   * Neither the name of Intel Corporation nor the names of its
20  *     contributors may be used to endorse or promote products derived
21  *     from this software without specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
26  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
27  * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
28  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
29  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
30  * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
32  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
33  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
34  * OF THE POSSIBILITY OF SUCH DAMAGE.
35 */
36 
37 #include <stdio.h>
38 #include <string.h>
39 #include <malloc.h>
40 #include <unistd.h>
41 #include <errno.h>
42 
43 #include <polarssl/sha1.h>
44 
45 #include "tcg.h"
46 #include "tpm.h"
47 #include "log.h"
48 #include "marshal.h"
49 #include "tpmrsa.h"
50 #include "vtpmmgr.h"
51 
52 #define TCPA_MAX_BUFFER_LENGTH 0x2000
53 
54 #define TPM_BEGIN_CMD(ord) \
55 	const TPM_COMMAND_CODE ordinal = ord; \
56 	TPM_RESULT status = TPM_SUCCESS; \
57 	BYTE _io_buffer[TCPA_MAX_BUFFER_LENGTH]; \
58 	UINT32 _io_bufsize_in; \
59 	UINT32 _io_bufsize_out; \
60 	vtpmloginfo(VTPM_LOG_TPM, "%s\n", __func__); \
61 	do { \
62 		BYTE *in_buf = _io_buffer; \
63 		UINT32 in_pos = 6; \
64 		PACK_IN(UINT32, ordinal);
65 
66 #define IN_PTR (in_buf + in_pos)
67 
68 #define PACK_IN(type, item...) do { \
69 	UINT32 isize = sizeof_ ## type(item); \
70 	if (isize + in_pos > TCPA_MAX_BUFFER_LENGTH) { \
71 		status = TPM_SIZE; \
72 		goto abort_egress; \
73 	} \
74 	pack_ ## type (IN_PTR, item); \
75 	in_pos += isize; \
76 } while (0)
77 
78 #define TPM_HASH_IN_BEGIN \
79 	sha1_context sha1_ctx; \
80 	sha1_starts(&sha1_ctx); \
81 	sha1_update(&sha1_ctx, in_buf + 6, 4); \
82 	TPM_HASH_IN_START
83 
84 #define TPM_HASH_IN_START \
85 	do { \
86 		UINT32 _hash_in_start = in_pos;
87 
88 #define TPM_HASH_IN_STOP \
89 		sha1_update(&sha1_ctx, in_buf + _hash_in_start, in_pos - _hash_in_start); \
90 	} while (0)
91 
92 #define TPM_TAG_COMMON(req_tag) \
93 		_io_bufsize_in = in_pos; \
94 		pack_TPM_TAG(in_buf, req_tag); \
95 		pack_UINT32(in_buf + sizeof(TPM_TAG), in_pos); \
96 	} while (0); \
97 	_io_bufsize_out = TCPA_MAX_BUFFER_LENGTH; \
98 	status = TPM_TransmitData(_io_buffer, _io_bufsize_in, _io_buffer, &_io_bufsize_out); \
99 	if (status != TPM_SUCCESS) { \
100 		goto abort_egress; \
101 	} \
102 	do { \
103 		BYTE *out_buf = _io_buffer; \
104 		UINT32 out_pos = 0; \
105 		UINT32 out_len = _io_bufsize_out; \
106 		do { \
107 			TPM_TAG rsp_tag; \
108 			UINT32 rsp_len; \
109 			UINT32 rsp_status; \
110 			UNPACK_OUT(TPM_RSP_HEADER, &rsp_tag, &rsp_len, &rsp_status); \
111 			if (rsp_status != TPM_SUCCESS) { \
112 				vtpmlogerror(VTPM_LOG_TPM, "Failed with return code %s\n", tpm_get_error_name(rsp_status)); \
113 				status = rsp_status; \
114 				goto abort_egress; \
115 			} \
116 			if (rsp_tag != req_tag + 3 || rsp_len != out_len) { \
117 				status = TPM_FAIL; \
118 				goto abort_egress; \
119 			} \
120 		} while(0)
121 
122 #define OUT_PTR (out_buf + out_pos)
123 
124 #define UNPACK_OUT(type, item...) do { \
125 	if (unpack3_ ## type (out_buf, &out_pos, TCPA_MAX_BUFFER_LENGTH, item)) { \
126 		status = TPM_SIZE; \
127 		goto abort_egress; \
128 	} \
129 } while (0)
130 
131 #define TPM_XMIT_REQ() \
132 	TPM_TAG_COMMON(TPM_TAG_RQU_COMMAND)
133 
134 #define TPM_XMIT_AUTH1(sec1, auth1) \
135 	TPM_HASH_IN_STOP; \
136 	do { \
137 		TPM_DIGEST paramDigest; \
138 		sha1_finish(&sha1_ctx, paramDigest.digest); \
139 		generateAuth(&paramDigest, sec1, auth1); \
140 		PACK_IN(TPM_AUTH_SESSION, auth1); \
141 	} while (0); \
142 	TPM_TAG_COMMON(TPM_TAG_RQU_AUTH1_COMMAND); \
143 	TPM_HASH_OUT_BEGIN
144 
145 #define TPM_XMIT_AUTH2(sec1, auth1, sec2, auth2) \
146 	TPM_HASH_IN_STOP; \
147 	do { \
148 		TPM_DIGEST paramDigest; \
149 		sha1_finish(&sha1_ctx, paramDigest.digest); \
150 		generateAuth(&paramDigest, sec1, auth1); \
151 		PACK_IN(TPM_AUTH_SESSION, auth1); \
152 		generateAuth(&paramDigest, sec2, auth2); \
153 		PACK_IN(TPM_AUTH_SESSION, auth2); \
154 	} while (0); \
155 	TPM_TAG_COMMON(TPM_TAG_RQU_AUTH2_COMMAND); \
156 	TPM_HASH_OUT_BEGIN
157 
158 #define TPM_HASH_OUT_BEGIN \
159 	sha1_context sha1_ctx; \
160 	sha1_starts(&sha1_ctx); \
161 	do { \
162 		UINT32 buf[2] = { cpu_to_be32(status), cpu_to_be32(ordinal) }; \
163 		sha1_update(&sha1_ctx, (BYTE*)buf, sizeof(buf)); \
164 	} while(0); \
165 	TPM_HASH_OUT_START
166 
167 #define TPM_HASH_OUT_START \
168 	do { \
169 		UINT32 _hash_out_start = out_pos;
170 
171 #define TPM_HASH_OUT_STOP \
172 		sha1_update(&sha1_ctx, out_buf + _hash_out_start, out_pos - _hash_out_start); \
173 	} while (0)
174 
175 #define TPM_END_AUTH1(sec1, auth1) \
176 	TPM_HASH_OUT_STOP; \
177 	do { \
178 		TPM_DIGEST paramDigest; \
179 		sha1_finish(&sha1_ctx, paramDigest.digest); \
180 		UNPACK_OUT(TPM_AUTH_SESSION, auth1); \
181 		status = verifyAuth(&paramDigest, sec1, auth1); \
182 		if (status != TPM_SUCCESS) \
183 			goto abort_egress; \
184 	} while(0); \
185 	TPM_END_COMMON
186 
187 #define TPM_END_AUTH2(sec1, auth1, sec2, auth2) \
188 	TPM_HASH_OUT_STOP; \
189 	do { \
190 		TPM_DIGEST paramDigest; \
191 		sha1_finish(&sha1_ctx, paramDigest.digest); \
192 		UNPACK_OUT(TPM_AUTH_SESSION, auth1); \
193 		status = verifyAuth(&paramDigest, sec1, auth1); \
194 		if (status != TPM_SUCCESS) \
195 			goto abort_egress; \
196 		UNPACK_OUT(TPM_AUTH_SESSION, auth2); \
197 		status = verifyAuth(&paramDigest, sec2, auth2); \
198 		if (status != TPM_SUCCESS) \
199 			goto abort_egress; \
200 	} while(0); \
201 	TPM_END_COMMON
202 
203 #define TPM_END() TPM_END_COMMON
204 
205 #define TPM_END_COMMON \
206 		if (out_pos != out_len) { \
207 			vtpmloginfo(VTPM_LOG_TPM, "Response too long (%d != %d)", out_pos, out_len);\
208 			status = TPM_SIZE; \
209 			goto abort_egress; \
210 		} \
211 	} while (0); \
212 
213 #define TPM_AUTH_ERR_CHECK(auth) do {\
214 	if(status != TPM_SUCCESS || auth->fContinueAuthSession == FALSE) {\
215 		vtpmloginfo(VTPM_LOG_TPM, "Auth Session: 0x%x closed by TPM\n", auth->AuthHandle);\
216 		auth->AuthHandle = 0;\
217 	}\
218 } while(0)
219 
xorEncrypt(const TPM_SECRET * sharedSecret,TPM_NONCE * nonce,const TPM_AUTHDATA * inAuth0,TPM_ENCAUTH outAuth0,const TPM_AUTHDATA * inAuth1,TPM_ENCAUTH outAuth1)220 static void xorEncrypt(const TPM_SECRET* sharedSecret,
221 		TPM_NONCE* nonce,
222 		const TPM_AUTHDATA* inAuth0,
223 		TPM_ENCAUTH outAuth0,
224 		const TPM_AUTHDATA* inAuth1,
225 		TPM_ENCAUTH outAuth1) {
226 	BYTE XORbuffer[sizeof(TPM_SECRET) + sizeof(TPM_NONCE)];
227 	BYTE XORkey[TPM_DIGEST_SIZE];
228 	BYTE* ptr = XORbuffer;
229 	ptr = pack_TPM_SECRET(ptr, sharedSecret);
230 	ptr = pack_TPM_NONCE(ptr, nonce);
231 
232 	sha1(XORbuffer, ptr - XORbuffer, XORkey);
233 
234 	if(inAuth0) {
235 		for(int i = 0; i < TPM_DIGEST_SIZE; ++i) {
236 			outAuth0[i] = XORkey[i] ^ (*inAuth0)[i];
237 		}
238 	}
239 	if(inAuth1) {
240 		for(int i = 0; i < TPM_DIGEST_SIZE; ++i) {
241 			outAuth1[i] = XORkey[i] ^ (*inAuth1)[i];
242 		}
243 	}
244 
245 }
246 
generateAuth(const TPM_DIGEST * paramDigest,const TPM_SECRET * HMACkey,TPM_AUTH_SESSION * auth)247 static void generateAuth(const TPM_DIGEST* paramDigest,
248 		const TPM_SECRET* HMACkey,
249 		TPM_AUTH_SESSION *auth)
250 {
251 	//Generate new OddNonce
252 	vtpmmgr_rand((BYTE*)auth->NonceOdd.nonce, sizeof(TPM_NONCE));
253 
254 	// Create HMAC text. (Concat inParamsDigest with inAuthSetupParams).
255 	BYTE hmacText[sizeof(TPM_DIGEST) + (2 * sizeof(TPM_NONCE)) + sizeof(BOOL)];
256 	BYTE* ptr = hmacText;
257 
258 	ptr = pack_TPM_DIGEST(ptr, paramDigest);
259 	ptr = pack_TPM_NONCE(ptr, &auth->NonceEven);
260 	ptr = pack_TPM_NONCE(ptr, &auth->NonceOdd);
261 	ptr = pack_BOOL(ptr, auth->fContinueAuthSession);
262 
263 	sha1_hmac((BYTE *) HMACkey, sizeof(TPM_DIGEST),
264 			(BYTE *) hmacText, sizeof(hmacText),
265 			auth->HMAC);
266 }
267 
verifyAuth(const TPM_DIGEST * paramDigest,const TPM_SECRET * HMACkey,TPM_AUTH_SESSION * auth)268 static TPM_RESULT verifyAuth(const TPM_DIGEST* paramDigest,
269 		/*[IN]*/ const TPM_SECRET *HMACkey,
270 		/*[IN,OUT]*/ TPM_AUTH_SESSION *auth)
271 {
272 
273 	// Create HMAC text. (Concat inParamsDigest with inAuthSetupParams).
274 	TPM_AUTHDATA hm;
275 	BYTE hmacText[sizeof(TPM_DIGEST) + (2 * sizeof(TPM_NONCE)) + sizeof(BOOL)];
276 	BYTE* ptr = hmacText;
277 
278 	ptr = pack_TPM_DIGEST(ptr, paramDigest);
279 	ptr = pack_TPM_NONCE(ptr, &auth->NonceEven);
280 	ptr = pack_TPM_NONCE(ptr, &auth->NonceOdd);
281 	ptr = pack_BOOL(ptr, auth->fContinueAuthSession);
282 
283 	sha1_hmac( (BYTE *) HMACkey, sizeof(TPM_DIGEST),
284 			(BYTE *) hmacText, sizeof(hmacText),
285 			hm);
286 
287 	// Compare correct HMAC with provided one.
288 	if (memcmp(hm, auth->HMAC, sizeof(TPM_DIGEST)) == 0) { // 0 indicates equality
289 		return TPM_SUCCESS;
290 	} else {
291 		vtpmlogerror(VTPM_LOG_TPM, "Auth Session verification failed! %x %x\n",
292 			*(UINT32*)auth->HMAC, *(UINT32*)hm);
293 		return TPM_AUTHFAIL;
294 	}
295 }
296 
297 
298 
299 // ------------------------------------------------------------------
300 // Authorization Commands
301 // ------------------------------------------------------------------
302 
TPM_OIAP(TPM_AUTH_SESSION * auth)303 TPM_RESULT TPM_OIAP(TPM_AUTH_SESSION*	auth)  // out
304 {
305 	TPM_BEGIN_CMD(TPM_ORD_OIAP);
306 
307 	TPM_XMIT_REQ();
308 
309 	memset(&auth->HMAC, 0, sizeof(TPM_DIGEST));
310 	auth->fContinueAuthSession = TRUE;
311 
312 	UNPACK_OUT(UINT32, &auth->AuthHandle);
313 	UNPACK_OUT(TPM_NONCE, &auth->NonceEven);
314 	TPM_END();
315 
316 	vtpmloginfo(VTPM_LOG_TPM, "Auth Session: 0x%x opened by TPM_OIAP.\n", auth->AuthHandle);
317 
318 abort_egress:
319 	return status;
320 }
321 
TPM_OSAP(TPM_ENTITY_TYPE entityType,UINT32 entityValue,const TPM_AUTHDATA * usageAuth,TPM_SECRET * sharedSecret,TPM_AUTH_SESSION * auth)322 TPM_RESULT TPM_OSAP(TPM_ENTITY_TYPE  entityType,  // in
323 		UINT32	 entityValue, // in
324 		const TPM_AUTHDATA* usageAuth, //in
325 		TPM_SECRET *sharedSecret, //out
326 		TPM_AUTH_SESSION *auth)
327 {
328 	TPM_DIGEST nonceOddOSAP;
329 	vtpmmgr_rand(nonceOddOSAP.digest, TPM_DIGEST_SIZE);
330 	TPM_BEGIN_CMD(TPM_ORD_OSAP);
331 
332 	PACK_IN(TPM_ENTITY_TYPE, entityType);
333 	PACK_IN(UINT32, entityValue);
334 	PACK_IN(TPM_DIGEST, &nonceOddOSAP);
335 
336 	TPM_XMIT_REQ();
337 
338 	UNPACK_OUT(UINT32, &auth->AuthHandle);
339 	UNPACK_OUT(TPM_NONCE, &auth->NonceEven);
340 
341 	//Calculate session secret
342 	sha1_context ctx;
343 	sha1_hmac_starts(&ctx, *usageAuth, TPM_DIGEST_SIZE);
344 	sha1_hmac_update(&ctx, OUT_PTR, TPM_DIGEST_SIZE); // nonceEvenOSAP
345 	sha1_hmac_update(&ctx, nonceOddOSAP.digest, TPM_DIGEST_SIZE);
346 	sha1_hmac_finish(&ctx, *sharedSecret);
347 
348 	out_pos += TPM_DIGEST_SIZE;
349 	TPM_END();
350 
351 	memset(&auth->HMAC, 0, sizeof(TPM_DIGEST));
352 	auth->fContinueAuthSession = FALSE;
353 
354 	vtpmloginfo(VTPM_LOG_TPM, "Auth Session: 0x%x opened by TPM_OSAP.\n", auth->AuthHandle);
355 
356 abort_egress:
357 	return status;
358 }
359 
TPM_TakeOwnership(const TPM_PUBKEY * pubEK,const TPM_AUTHDATA * ownerAuth,const TPM_AUTHDATA * srkAuth,const TPM_KEY * inSrk,TPM_KEY * outSrk,TPM_AUTH_SESSION * auth)360 TPM_RESULT TPM_TakeOwnership(
361 		const TPM_PUBKEY *pubEK, //in
362 		const TPM_AUTHDATA* ownerAuth, //in
363 		const TPM_AUTHDATA* srkAuth, //in
364 		const TPM_KEY* inSrk, //in
365 		TPM_KEY* outSrk, //out, optional
366 		TPM_AUTH_SESSION*	auth)	// in, out
367 {
368 	int keyAlloced = 0;
369 	tpmrsa_context ek_rsa = TPMRSA_CTX_INIT;
370 
371 	TPM_BEGIN_CMD(TPM_ORD_TakeOwnership);
372 	TPM_HASH_IN_BEGIN;
373 
374 	tpmrsa_set_pubkey(&ek_rsa,
375 			pubEK->pubKey.key, pubEK->pubKey.keyLength,
376 			pubEK->algorithmParms.parms.rsa.exponent,
377 			pubEK->algorithmParms.parms.rsa.exponentSize);
378 
379 	/* Pack the protocol ID */
380 	PACK_IN(UINT16, TPM_PID_OWNER);
381 
382 	/* Pack the encrypted owner auth */
383 	PACK_IN(UINT32, pubEK->algorithmParms.parms.rsa.keyLength / 8);
384 	tpmrsa_pub_encrypt_oaep(&ek_rsa,
385 			ctr_drbg_random, &vtpm_globals.ctr_drbg,
386 			sizeof(TPM_SECRET),
387 			(BYTE*) ownerAuth,
388 			IN_PTR);
389 	in_pos += pubEK->algorithmParms.parms.rsa.keyLength / 8;
390 
391 	/* Pack the encrypted srk auth */
392 	PACK_IN(UINT32, pubEK->algorithmParms.parms.rsa.keyLength / 8);
393 	tpmrsa_pub_encrypt_oaep(&ek_rsa,
394 			ctr_drbg_random, &vtpm_globals.ctr_drbg,
395 			sizeof(TPM_SECRET),
396 			(BYTE*) srkAuth,
397 			IN_PTR);
398 	in_pos += pubEK->algorithmParms.parms.rsa.keyLength / 8;
399 
400 	PACK_IN(TPM_KEY, inSrk);
401 
402 	TPM_XMIT_AUTH1(ownerAuth, auth);
403 
404 	if (outSrk != NULL) {
405 		/* If the user wants a copy of the srk we give it to them */
406 		keyAlloced = 1;
407 		UNPACK_OUT(TPM_KEY, outSrk, UNPACK_ALLOC);
408 	} else {
409 		/*otherwise just parse past it */
410 		TPM_KEY temp;
411 		UNPACK_OUT(TPM_KEY, &temp, UNPACK_ALIAS);
412 	}
413 
414 	TPM_END_AUTH1(ownerAuth, auth);
415 
416 	goto egress;
417 abort_egress:
418 	if(keyAlloced) {
419 		free_TPM_KEY(outSrk);
420 	}
421 egress:
422 	tpmrsa_free(&ek_rsa);
423 	TPM_AUTH_ERR_CHECK(auth);
424 	return status;
425 }
426 
427 
TPM_DisablePubekRead(const TPM_AUTHDATA * ownerAuth,TPM_AUTH_SESSION * auth)428 TPM_RESULT TPM_DisablePubekRead (
429 		const TPM_AUTHDATA* ownerAuth,
430 		TPM_AUTH_SESSION*	auth)
431 {
432 	TPM_BEGIN_CMD(TPM_ORD_DisablePubekRead);
433 	TPM_HASH_IN_BEGIN;
434 
435 	TPM_XMIT_AUTH1(ownerAuth, auth);
436 
437 	TPM_END_AUTH1(ownerAuth, auth);
438 
439 abort_egress:
440 	TPM_AUTH_ERR_CHECK(auth);
441 	return status;
442 }
443 
444 
TPM_TerminateHandle(TPM_AUTHHANDLE handle)445 TPM_RESULT TPM_TerminateHandle(TPM_AUTHHANDLE  handle)  // in
446 {
447 	if(handle == 0) {
448 		return TPM_SUCCESS;
449 	}
450 
451 	TPM_BEGIN_CMD(TPM_ORD_Terminate_Handle);
452 
453 	PACK_IN(TPM_AUTHHANDLE, handle);
454 
455 	TPM_XMIT_REQ();
456 	TPM_END();
457 
458 	vtpmloginfo(VTPM_LOG_TPM, "Auth Session: 0x%x closed by TPM_TerminateHandle\n", handle);
459 
460 abort_egress:
461 	return status;
462 }
463 
TPM_Extend(TPM_PCRINDEX pcrNum,TPM_DIGEST * inDigest,TPM_PCRVALUE * outDigest)464 TPM_RESULT TPM_Extend( TPM_PCRINDEX  pcrNum,  // in
465 		TPM_DIGEST* inDigest, // in
466 		TPM_PCRVALUE*  outDigest) // out
467 {
468 	TPM_BEGIN_CMD(TPM_ORD_Extend);
469 
470 	PACK_IN(TPM_PCRINDEX, pcrNum);
471 	PACK_IN(TPM_DIGEST, inDigest);
472 
473 	TPM_XMIT_REQ();
474 
475 	UNPACK_OUT(TPM_PCRVALUE, outDigest);
476 
477 	TPM_END();
478 
479 abort_egress:
480 	return status;
481 }
482 
TPM_Reset(TPM_PCR_SELECTION * sel)483 TPM_RESULT TPM_Reset(TPM_PCR_SELECTION *sel)
484 {
485 	TPM_BEGIN_CMD(TPM_ORD_PCR_Reset);
486 	PACK_IN(TPM_PCR_SELECTION, sel);
487 	TPM_XMIT_REQ();
488 	TPM_END();
489 abort_egress:
490 	return status;
491 }
492 
TPM_Seal(TPM_KEY_HANDLE keyHandle,UINT32 pcrInfoLongSize,TPM_PCR_INFO_LONG * pcrInfoLong,UINT32 inDataSize,const BYTE * inData,TPM_STORED_DATA12 * sealedData,const TPM_SECRET * osapSharedSecret,const TPM_AUTHDATA * sealedDataAuth,TPM_AUTH_SESSION * pubAuth)493 TPM_RESULT TPM_Seal(
494 		TPM_KEY_HANDLE  keyHandle,  // in
495 		UINT32	 pcrInfoLongSize, // in
496 		TPM_PCR_INFO_LONG*	 pcrInfoLong,  // in
497 		UINT32	 inDataSize,  // in
498 		const BYTE*	 inData,	// in
499 		TPM_STORED_DATA12* sealedData, //out
500 		const TPM_SECRET* osapSharedSecret, //in
501 		const TPM_AUTHDATA* sealedDataAuth, //in
502 		TPM_AUTH_SESSION*	pubAuth  // in, out
503 		)
504 {
505 	memset(sealedData, 0, sizeof(*sealedData));
506 	TPM_BEGIN_CMD(TPM_ORD_Seal);
507 	PACK_IN(TPM_KEY_HANDLE, keyHandle);
508 	TPM_HASH_IN_BEGIN;
509 
510 	xorEncrypt(osapSharedSecret, &pubAuth->NonceEven, sealedDataAuth, IN_PTR, NULL, NULL);
511 	in_pos += sizeof(TPM_ENCAUTH);
512 
513 	PACK_IN(UINT32, pcrInfoLongSize);
514 	if (pcrInfoLongSize) {
515 		PACK_IN(TPM_PCR_INFO_LONG, pcrInfoLong);
516 	}
517 	PACK_IN(UINT32, inDataSize);
518 	PACK_IN(BUFFER, inData, inDataSize);
519 
520 	TPM_XMIT_AUTH1(osapSharedSecret, pubAuth);
521 
522 	UNPACK_OUT(TPM_STORED_DATA12, sealedData, UNPACK_ALLOC);
523 
524 	TPM_END_AUTH1(osapSharedSecret, pubAuth);
525 
526  abort_egress:
527 	if (status)
528 		free_TPM_STORED_DATA12(sealedData);
529 	TPM_AUTH_ERR_CHECK(pubAuth);
530 	return status;
531 }
532 
TPM_Unseal(TPM_KEY_HANDLE parentHandle,const TPM_STORED_DATA12 * sealedData,UINT32 * outSize,BYTE ** out,const TPM_AUTHDATA * key_usage_auth,const TPM_AUTHDATA * data_usage_auth,TPM_AUTH_SESSION * keyAuth,TPM_AUTH_SESSION * dataAuth)533 TPM_RESULT TPM_Unseal(
534 		TPM_KEY_HANDLE parentHandle, // in
535 		const TPM_STORED_DATA12* sealedData,
536 		UINT32*	outSize,  // out
537 		BYTE**	 out, //out
538 		const TPM_AUTHDATA* key_usage_auth, //in
539 		const TPM_AUTHDATA* data_usage_auth, //in
540 		TPM_AUTH_SESSION*	keyAuth,  // in, out
541 		TPM_AUTH_SESSION*	dataAuth  // in, out
542 		)
543 {
544 	TPM_BEGIN_CMD(TPM_ORD_Unseal);
545 
546 	PACK_IN(TPM_KEY_HANDLE, parentHandle);
547 
548 	TPM_HASH_IN_BEGIN;
549 	PACK_IN(TPM_STORED_DATA12, sealedData);
550 
551 	TPM_XMIT_AUTH2(key_usage_auth, keyAuth, data_usage_auth, dataAuth);
552 
553 	UNPACK_OUT(UINT32, outSize);
554 	UNPACK_OUT(PTR, out, *outSize, UNPACK_ALLOC);
555 
556 	TPM_END_AUTH2(key_usage_auth, keyAuth, data_usage_auth, dataAuth);
557 
558 abort_egress:
559 	TPM_AUTH_ERR_CHECK(keyAuth);
560 	TPM_AUTH_ERR_CHECK(dataAuth);
561 	return status;
562 }
563 
TPM_LoadKey(TPM_KEY_HANDLE parentHandle,const TPM_KEY * key,TPM_HANDLE * keyHandle,const TPM_AUTHDATA * usage_auth,TPM_AUTH_SESSION * auth)564 TPM_RESULT TPM_LoadKey(
565 		TPM_KEY_HANDLE  parentHandle, //
566 		const TPM_KEY* key, //in
567 		TPM_HANDLE*  keyHandle,	 // out
568 		const TPM_AUTHDATA* usage_auth,
569 		TPM_AUTH_SESSION* auth)
570 {
571 	TPM_BEGIN_CMD(TPM_ORD_LoadKey);
572 	PACK_IN(TPM_KEY_HANDLE, parentHandle);
573 
574 	TPM_HASH_IN_BEGIN;
575 
576 	PACK_IN(TPM_KEY, key);
577 
578 	TPM_XMIT_AUTH1(usage_auth, auth);
579 
580 	UNPACK_OUT(UINT32, keyHandle);
581 
582 	TPM_END_AUTH1(usage_auth, auth);
583 
584 	vtpmloginfo(VTPM_LOG_TPM, "Key Handle: 0x%x opened by TPM_LoadKey\n", *keyHandle);
585 abort_egress:
586 	TPM_AUTH_ERR_CHECK(auth);
587 	return status;
588 }
589 
TPM_FlushSpecific(TPM_HANDLE handle,TPM_RESOURCE_TYPE rt)590 TPM_RESULT TPM_FlushSpecific(TPM_HANDLE handle,
591 		TPM_RESOURCE_TYPE rt) {
592 	if(handle == 0) {
593 		return TPM_SUCCESS;
594 	}
595 	TPM_BEGIN_CMD(TPM_ORD_FlushSpecific);
596 
597 	PACK_IN(TPM_HANDLE, handle);
598 	PACK_IN(TPM_RESOURCE_TYPE, rt);
599 
600 	TPM_XMIT_REQ();
601 	TPM_END();
602 
603 abort_egress:
604 	return status;
605 }
606 
TPM_GetRandom(UINT32 * bytesRequested,BYTE * randomBytes)607 TPM_RESULT TPM_GetRandom( UINT32*	 bytesRequested, // in, out
608 		BYTE*	 randomBytes) // out
609 {
610 	UINT32 req_len = *bytesRequested;
611 	TPM_BEGIN_CMD(TPM_ORD_GetRandom);
612 	PACK_IN(UINT32, req_len);
613 
614 	TPM_XMIT_REQ();
615 
616 	UNPACK_OUT(UINT32, bytesRequested);
617 	if (*bytesRequested > req_len)
618 		return TPM_FAIL;
619 	UNPACK_OUT(BUFFER, randomBytes, *bytesRequested);
620 	TPM_END();
621 
622 abort_egress:
623 	return status;
624 }
625 
626 
TPM_ReadPubek(TPM_PUBKEY * pubEK)627 TPM_RESULT TPM_ReadPubek(
628 		TPM_PUBKEY* pubEK //out
629 		)
630 {
631 	TPM_DIGEST antiReplay;
632 	BYTE* kptr = NULL;
633 	BYTE digest[TPM_DIGEST_SIZE];
634 	sha1_context ctx;
635 
636 	vtpmmgr_rand(antiReplay.digest, TPM_DIGEST_SIZE);
637 
638 	TPM_BEGIN_CMD(TPM_ORD_ReadPubek);
639 
640 	PACK_IN(TPM_DIGEST, &antiReplay);
641 
642 	TPM_XMIT_REQ();
643 
644 	//unpack and allocate the key
645 	kptr = OUT_PTR;
646 	UNPACK_OUT(TPM_PUBKEY, pubEK, UNPACK_ALLOC);
647 
648 	//Verify the checksum
649 	sha1_starts(&ctx);
650 	sha1_update(&ctx, kptr, OUT_PTR - kptr);
651 	sha1_update(&ctx, antiReplay.digest, TPM_DIGEST_SIZE);
652 	sha1_finish(&ctx, digest);
653 
654 	UNPACK_OUT(TPM_DIGEST, &antiReplay);
655 
656 	TPM_END();
657 
658 	//ptr points to the checksum computed by TPM
659 	if(memcmp(digest, antiReplay.digest, TPM_DIGEST_SIZE)) {
660 		vtpmlogerror(VTPM_LOG_TPM, "TPM_ReadPubek: Checksum returned by TPM was invalid!\n");
661 		status = TPM_FAIL;
662 		goto abort_egress;
663 	}
664 
665 	goto egress;
666 abort_egress:
667 	if(kptr != NULL) { //If we unpacked the pubEK, we have to free it
668 		free_TPM_PUBKEY(pubEK);
669 	}
670 egress:
671 	return status;
672 }
673 
TPM_PCR_Read(UINT32 pcr,TPM_DIGEST * value)674 TPM_RESULT TPM_PCR_Read(UINT32 pcr, TPM_DIGEST *value)
675 {
676 	TPM_BEGIN_CMD(TPM_ORD_PcrRead);
677 	PACK_IN(UINT32, pcr);
678 	TPM_XMIT_REQ();
679 	UNPACK_OUT(TPM_DIGEST, value);
680 	TPM_END();
681 abort_egress:
682 	return status;
683 }
684 
TPM_SaveState(void)685 TPM_RESULT TPM_SaveState(void)
686 {
687 	TPM_BEGIN_CMD(TPM_ORD_SaveState);
688 	TPM_XMIT_REQ();
689 	TPM_END();
690 
691 abort_egress:
692 	return status;
693 }
694 
TPM_GetCapability(TPM_CAPABILITY_AREA capArea,UINT32 subCapSize,const BYTE * subCap,UINT32 * respSize,BYTE ** resp)695 TPM_RESULT TPM_GetCapability(
696 		TPM_CAPABILITY_AREA capArea,
697 		UINT32 subCapSize,
698 		const BYTE* subCap,
699 		UINT32* respSize,
700 		BYTE** resp)
701 {
702 	TPM_BEGIN_CMD(TPM_ORD_GetCapability);
703 
704 	PACK_IN(TPM_CAPABILITY_AREA, capArea);
705 	PACK_IN(UINT32, subCapSize);
706 	PACK_IN(BUFFER, subCap, subCapSize);
707 
708 	TPM_XMIT_REQ();
709 
710 	UNPACK_OUT(UINT32, respSize);
711 	UNPACK_OUT(PTR, resp, *respSize, UNPACK_ALLOC);
712 
713 	TPM_END();
714 
715 abort_egress:
716 	return status;
717 }
718 
TPM_CreateEndorsementKeyPair(const TPM_KEY_PARMS * keyInfo,TPM_PUBKEY * pubEK)719 TPM_RESULT TPM_CreateEndorsementKeyPair(
720 		const TPM_KEY_PARMS* keyInfo,
721 		TPM_PUBKEY* pubEK)
722 {
723 	BYTE* kptr = NULL;
724 	sha1_context ctx;
725 	TPM_DIGEST checksum;
726 	TPM_DIGEST hash;
727 	TPM_NONCE antiReplay;
728 	TPM_BEGIN_CMD(TPM_ORD_CreateEndorsementKeyPair);
729 
730 	//Make anti replay nonce
731 	vtpmmgr_rand(antiReplay.nonce, sizeof(antiReplay.nonce));
732 
733 	PACK_IN(TPM_NONCE, &antiReplay);
734 	PACK_IN(TPM_KEY_PARMS, keyInfo);
735 
736 	TPM_XMIT_REQ();
737 
738 	kptr = OUT_PTR;
739 	UNPACK_OUT(TPM_PUBKEY, pubEK, UNPACK_ALLOC);
740 
741 	/* Hash the pub key blob */
742 	sha1_starts(&ctx);
743 	sha1_update(&ctx, kptr, OUT_PTR - kptr);
744 	sha1_update(&ctx, antiReplay.nonce, sizeof(antiReplay.nonce));
745 	sha1_finish(&ctx, hash.digest);
746 
747 	UNPACK_OUT(TPM_DIGEST, &checksum);
748 
749 	TPM_END();
750 
751 	if (memcmp(checksum.digest, hash.digest, TPM_DIGEST_SIZE)) {
752 		vtpmloginfo(VTPM_LOG_VTPM, "TPM_CreateEndorsementKey: Checkum verification failed!\n");
753 		status = TPM_FAIL;
754 		goto abort_egress;
755 	}
756 
757 	goto egress;
758 abort_egress:
759 	if(kptr) {
760 		free_TPM_PUBKEY(pubEK);
761 	}
762 egress:
763 	return status;
764 }
765 
TPM_MakeIdentity(const TPM_AUTHDATA * identityAuth,const TPM_AUTHDATA * privCADigest,const TPM_KEY * kinfo,const TPM_AUTHDATA * srk_auth,const TPM_AUTHDATA * own_auth,TPM_AUTH_SESSION * srkAuth,TPM_AUTH_SESSION * ownAuth,TPM_KEY * key,UINT32 * identityBindingSize,BYTE ** identityBinding)766 TPM_RESULT TPM_MakeIdentity(
767 	const TPM_AUTHDATA* identityAuth, // in
768 	const TPM_AUTHDATA* privCADigest, // in
769 	const TPM_KEY* kinfo, // in
770 	const TPM_AUTHDATA* srk_auth, // in
771 	const TPM_AUTHDATA* own_auth, // in
772 	TPM_AUTH_SESSION* srkAuth, // in,out
773 	TPM_AUTH_SESSION* ownAuth, // in,out
774 	TPM_KEY* key, // out
775 	UINT32* identityBindingSize, // out
776 	BYTE** identityBinding) // out
777 {
778 	TPM_BEGIN_CMD(TPM_ORD_MakeIdentity);
779 	TPM_HASH_IN_BEGIN;
780 
781 	xorEncrypt(own_auth, &ownAuth->NonceEven, identityAuth, IN_PTR, NULL, NULL);
782 	in_pos += sizeof(TPM_ENCAUTH);
783 
784 	PACK_IN(TPM_AUTHDATA, privCADigest);
785 	PACK_IN(TPM_KEY, kinfo);
786 
787 	TPM_XMIT_AUTH2(srk_auth, srkAuth, own_auth, ownAuth);
788 
789 	UNPACK_OUT(TPM_KEY, key, UNPACK_ALLOC);
790 	UNPACK_OUT(UINT32, identityBindingSize);
791 	UNPACK_OUT(PTR, identityBinding, *identityBindingSize, UNPACK_ALLOC);
792 
793 	TPM_END_AUTH2(srk_auth, srkAuth, own_auth, ownAuth);
794 
795 abort_egress:
796 	TPM_AUTH_ERR_CHECK(srkAuth);
797 	TPM_AUTH_ERR_CHECK(ownAuth);
798 	return status;
799 }
800 
TPM_ActivateIdentity(TPM_KEY_HANDLE aikHandle,BYTE * blob,UINT32 blobSize,const TPM_AUTHDATA * aik_auth,const TPM_AUTHDATA * owner_auth,TPM_AUTH_SESSION * aikAuth,TPM_AUTH_SESSION * ownAuth,TPM_SYMMETRIC_KEY * symKey)801 TPM_RESULT TPM_ActivateIdentity(
802 	TPM_KEY_HANDLE aikHandle, // in
803 	BYTE* blob, // in
804 	UINT32 blobSize, // in
805 	const TPM_AUTHDATA* aik_auth, // in
806 	const TPM_AUTHDATA* owner_auth, // in
807 	TPM_AUTH_SESSION* aikAuth, // in,out
808 	TPM_AUTH_SESSION* ownAuth, // in,out
809 	TPM_SYMMETRIC_KEY* symKey) // out
810 {
811 	TPM_BEGIN_CMD(TPM_ORD_ActivateIdentity);
812 	PACK_IN(TPM_KEY_HANDLE, aikHandle);
813 	TPM_HASH_IN_BEGIN;
814 	PACK_IN(UINT32, blobSize);
815 	PACK_IN(BUFFER, blob, blobSize);
816 
817 	TPM_XMIT_AUTH2(aik_auth, aikAuth, owner_auth, ownAuth);
818 
819 	UNPACK_OUT(TPM_SYMMETRIC_KEY, symKey, UNPACK_ALLOC);
820 
821 	TPM_END_AUTH2(aik_auth, aikAuth, owner_auth, ownAuth);
822 
823 abort_egress:
824 	TPM_AUTH_ERR_CHECK(aikAuth);
825 	TPM_AUTH_ERR_CHECK(ownAuth);
826 	return status;
827 }
828 
TPM_Quote(TPM_KEY_HANDLE keyh,const TPM_NONCE * data,const TPM_PCR_SELECTION * pcrSelect,const TPM_AUTHDATA * auth,TPM_AUTH_SESSION * oiap,TPM_PCR_COMPOSITE * pcrs,BYTE ** sig,UINT32 * sigSize)829 TPM_RESULT TPM_Quote(
830 	TPM_KEY_HANDLE keyh, // in
831 	const TPM_NONCE* data, // in
832 	const TPM_PCR_SELECTION *pcrSelect, // in
833 	const TPM_AUTHDATA* auth, // in
834 	TPM_AUTH_SESSION* oiap, // in,out
835 	TPM_PCR_COMPOSITE *pcrs, // out
836 	BYTE** sig, // out
837 	UINT32* sigSize) // out
838 {
839 	TPM_BEGIN_CMD(TPM_ORD_Quote);
840 	PACK_IN(TPM_KEY_HANDLE, keyh);
841 	TPM_HASH_IN_BEGIN;
842 	PACK_IN(TPM_NONCE, data);
843 	PACK_IN(TPM_PCR_SELECTION, pcrSelect);
844 
845 	TPM_XMIT_AUTH1(auth, oiap);
846 
847 	UNPACK_OUT(TPM_PCR_COMPOSITE, pcrs, UNPACK_ALLOC);
848 	UNPACK_OUT(UINT32, sigSize);
849 	UNPACK_OUT(PTR, sig, *sigSize, UNPACK_ALLOC);
850 
851 	TPM_END_AUTH1(auth, oiap);
852 
853 abort_egress:
854 	TPM_AUTH_ERR_CHECK(oiap);
855 	return status;
856 }
857 
TPM_TransmitData(BYTE * in,UINT32 insize,BYTE * out,UINT32 * outsize)858 TPM_RESULT TPM_TransmitData(
859 		BYTE* in,
860 		UINT32 insize,
861 		BYTE* out,
862 		UINT32* outsize) {
863 	TPM_RESULT status = TPM_SUCCESS;
864 
865 	UINT32 i;
866 	vtpmloginfo(VTPM_LOG_TXDATA, "Sending buffer = 0x");
867 	for(i = 0 ; i < insize ; i++)
868 		vtpmloginfomore(VTPM_LOG_TXDATA, "%2.2x ", in[i]);
869 
870 	vtpmloginfomore(VTPM_LOG_TXDATA, "\n");
871 
872 	ssize_t size = 0;
873 
874 	// send the request
875 	size = write (vtpm_globals.tpm_fd, in, insize);
876 	if (size < 0) {
877 		vtpmlogerror(VTPM_LOG_TXDATA, "write() failed : %s\n", strerror(errno));
878 		ERRORDIE (TPM_IOERROR);
879 	}
880 	else if ((UINT32) size < insize) {
881 		vtpmlogerror(VTPM_LOG_TXDATA, "Wrote %d instead of %d bytes!\n", (int) size, insize);
882 		ERRORDIE (TPM_IOERROR);
883 	}
884 
885 	// read the response
886 	size = read (vtpm_globals.tpm_fd, out, *outsize);
887 	if (size < 0) {
888 		vtpmlogerror(VTPM_LOG_TXDATA, "read() failed : %s\n", strerror(errno));
889 		ERRORDIE (TPM_IOERROR);
890 	}
891 
892 	vtpmloginfo(VTPM_LOG_TXDATA, "Receiving buffer = 0x");
893 	for(i = 0 ; i < size ; i++)
894 		vtpmloginfomore(VTPM_LOG_TXDATA, "%2.2x ", out[i]);
895 
896 	vtpmloginfomore(VTPM_LOG_TXDATA, "\n");
897 
898 	*outsize = size;
899 	goto egress;
900 
901 abort_egress:
902 egress:
903 	return status;
904 }
905