-
Notifications
You must be signed in to change notification settings - Fork 160
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Fixed nits and rewrote TestPCRReset.
- Loading branch information
Matthew Tsai
committed
Jul 29, 2022
1 parent
b9a5a2c
commit 0bf486b
Showing
1 changed file
with
95 additions
and
42 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,72 +1,125 @@ | ||
package tpm2 | ||
|
||
import ( | ||
"bytes" | ||
"crypto/sha1" | ||
"crypto/sha256" | ||
"crypto/sha512" | ||
"testing" | ||
|
||
"github.com/google/go-cmp/cmp" | ||
"github.com/google/go-tpm/direct/structures/tpm" | ||
"github.com/google/go-tpm/direct/structures/tpml" | ||
"github.com/google/go-tpm/direct/transport/simulator" | ||
|
||
"github.com/google/go-tpm/direct/structures/tpms" | ||
"github.com/google/go-tpm/direct/structures/tpmt" | ||
"github.com/google/go-tpm/direct/transport/simulator" | ||
) | ||
|
||
var extendsDirect = map[tpm.AlgID][]struct { | ||
digest []byte | ||
}{ | ||
tpm.AlgSHA1: { | ||
{bytes.Repeat([]byte{0x00}, sha1.Size)}, | ||
{bytes.Repeat([]byte{0x01}, sha1.Size)}, | ||
{bytes.Repeat([]byte{0x02}, sha1.Size)}}, | ||
tpm.AlgSHA256: { | ||
{bytes.Repeat([]byte{0x00}, sha256.Size)}, | ||
{bytes.Repeat([]byte{0x01}, sha256.Size)}, | ||
{bytes.Repeat([]byte{0x02}, sha256.Size)}}, | ||
tpm.AlgSHA384: { | ||
{bytes.Repeat([]byte{0x00}, sha512.Size384)}, | ||
{bytes.Repeat([]byte{0x01}, sha512.Size384)}, | ||
{bytes.Repeat([]byte{0x02}, sha512.Size384)}}, | ||
} | ||
|
||
func TestPCRReset(t *testing.T) { | ||
thetpm, err := simulator.OpenSimulator() | ||
if err != nil { | ||
t.Fatalf("could not connect to TPM simulator: %v", err) | ||
} | ||
defer thetpm.Close() | ||
|
||
PCRs, err := CreatePCRSelection([]int{16}) | ||
if err != nil { | ||
t.Fatalf("Failed to create PCRSelection") | ||
} | ||
DebugPCR := 16 | ||
|
||
selection := tpml.PCRSelection{ | ||
PCRSelections: []tpms.PCRSelection{ | ||
{ | ||
Hash: tpm.AlgSHA1, | ||
PCRSelect: PCRs, | ||
}, | ||
}, | ||
cases := []struct { | ||
name string | ||
hashalg tpm.AlgID | ||
}{ | ||
{"SHA1", tpm.AlgSHA1}, | ||
{"SHA256", tpm.AlgSHA256}, | ||
{"SHA384", tpm.AlgSHA384}, | ||
} | ||
|
||
pcrRead := PCRRead{ | ||
PCRSelectionIn: selection, | ||
} | ||
for _, c := range cases { | ||
t.Run(c.name, func(t *testing.T) { | ||
PCRs, err := CreatePCRSelection([]int{DebugPCR}) | ||
if err != nil { | ||
t.Fatalf("Failed to create PCRSelection") | ||
} | ||
|
||
pcrReadRsp, err := pcrRead.Execute(thetpm) | ||
if err != nil { | ||
t.Fatalf("failed to read PCRs") | ||
} | ||
preResetBuffer := pcrReadRsp.PCRValues.Digests[0].Buffer[:] | ||
authHandle := AuthHandle{ | ||
Handle: tpm.Handle(DebugPCR), | ||
Auth: PasswordAuth(nil), | ||
} | ||
|
||
authHandle := AuthHandle{ | ||
Handle: 16, | ||
Auth: PasswordAuth(nil), | ||
} | ||
pcrRead := PCRRead{ | ||
PCRSelectionIn: tpml.PCRSelection{ | ||
PCRSelections: []tpms.PCRSelection{ | ||
{ | ||
Hash: c.hashalg, | ||
PCRSelect: PCRs, | ||
}, | ||
}, | ||
}, | ||
} | ||
pcrReadRsp, err := pcrRead.Execute(thetpm) | ||
if err != nil { | ||
t.Fatalf("failed to read PCRs") | ||
} | ||
startPCR16 := pcrReadRsp.PCRValues.Digests[0].Buffer | ||
|
||
pcrReset := PCRReset{ | ||
PCRHandle: authHandle, | ||
} | ||
// Extending PCR 16 | ||
for _, d := range extendsDirect[c.hashalg] { | ||
|
||
if _, err := pcrReset.Execute(thetpm); err != nil { | ||
t.Fatalf("pcrReset failed: %v", err) | ||
} | ||
pcrExtend := PCRExtend{ | ||
PCRHandle: authHandle, | ||
Digests: tpml.DigestValues{ | ||
Digests: []tpmt.HA{ | ||
{ | ||
HashAlg: c.hashalg, | ||
Digest: d.digest, | ||
}, | ||
}, | ||
}, | ||
} | ||
|
||
pcrRead = PCRRead{ | ||
PCRSelectionIn: selection, | ||
} | ||
if err := pcrExtend.Execute(thetpm); err != nil { | ||
t.Fatalf("failed to extend pcr for test %v", err) | ||
} | ||
} | ||
|
||
pcrReadRsp, err = pcrRead.Execute(thetpm) | ||
if err != nil { | ||
t.Fatalf("failed to read PCRs") | ||
} | ||
if pcrReadRsp, err = pcrRead.Execute(thetpm); err != nil { | ||
t.Fatalf("failed to read PCRs") | ||
} | ||
postExtendPCR16 := pcrReadRsp.PCRValues.Digests[0].Buffer | ||
if bytes.Equal(startPCR16, postExtendPCR16) { | ||
t.Errorf("startPCR16: %v expected to not equal postExtendPCR16: %v", startPCR16, postExtendPCR16) | ||
} | ||
|
||
postResetBuffer := pcrReadRsp.PCRValues.Digests[0].Buffer[:] | ||
// Resetting PCR 16 | ||
pcrReset := PCRReset{ | ||
PCRHandle: authHandle, | ||
} | ||
if _, err := pcrReset.Execute(thetpm); err != nil { | ||
t.Fatalf("pcrReset failed: %v", err) | ||
} | ||
if pcrReadRsp, err = pcrRead.Execute(thetpm); err != nil { | ||
t.Fatalf("failed to read PCRs") | ||
} | ||
postResetPCR16 := pcrReadRsp.PCRValues.Digests[0].Buffer | ||
|
||
if !cmp.Equal(preResetBuffer, postResetBuffer) { | ||
t.Errorf("pcr after reset changed.") | ||
if !bytes.Equal(startPCR16, postResetPCR16) { | ||
t.Errorf("startPCR16: %v expected to equal postResetPCR16: %v", startPCR16, postResetPCR16) | ||
} | ||
}) | ||
} | ||
} |