diff options
author | 2023-10-10 14:33:42 +0000 | |
---|---|---|
committer | 2023-10-10 14:33:42 +0000 | |
commit | af1a266670d040d2f4083ff309d732d648afba2a (patch) | |
tree | 2fc46203448ddcc6f81546d379abfaeb323575e9 /roms/skiboot/libstb/tss2/ibmtpm20tss/utils/createek.c | |
parent | e02cda008591317b1625707ff8e115a4841aa889 (diff) |
Change-Id: Iaf8d18082d3991dec7c0ebbea540f092188eb4ec
Diffstat (limited to 'roms/skiboot/libstb/tss2/ibmtpm20tss/utils/createek.c')
-rw-r--r-- | roms/skiboot/libstb/tss2/ibmtpm20tss/utils/createek.c | 294 |
1 files changed, 294 insertions, 0 deletions
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/createek.c b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/createek.c new file mode 100644 index 000000000..d15aa8f09 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/createek.c @@ -0,0 +1,294 @@ +/********************************************************************************/ +/* */ +/* IWG EK Index Parsing */ +/* Written by Ken Goldman */ +/* IBM Thomas J. Watson Research Center */ +/* */ +/* (c) Copyright IBM Corporation 2015 - 2019. */ +/* */ +/* All rights reserved. */ +/* */ +/* Redistribution and use in source and binary forms, with or without */ +/* modification, are permitted provided that the following conditions are */ +/* met: */ +/* */ +/* Redistributions of source code must retain the above copyright notice, */ +/* this list of conditions and the following disclaimer. */ +/* */ +/* Redistributions in binary form must reproduce the above copyright */ +/* notice, this list of conditions and the following disclaimer in the */ +/* documentation and/or other materials provided with the distribution. */ +/* */ +/* Neither the names of the IBM Corporation nor the names of its */ +/* contributors may be used to endorse or promote products derived from */ +/* this software without specific prior written permission. */ +/* */ +/* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS */ +/* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT */ +/* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR */ +/* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT */ +/* HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, */ +/* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT */ +/* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, */ +/* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY */ +/* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT */ +/* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE */ +/* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ +/********************************************************************************/ + +/* This demo application shows the EK createprimary process. + + It reads the EK template at 01c00004 (RSA) 01c0000c (EC) + + It reads the EK nonce at 01c00003 (RSA) 01c0000b (EC) + + It constructs an EK createprimary input and runs the command + + It reads the EK certificate at 01c00002 (RSA) 01c0000a (EC) + + It compares the public key from the createprimary to that of the certificate. + + If validates the EK certificate against the TPM vendor root CA certificate. + + To validate certificate against the root, it must be in a file in PEM format. The root typically + comes from the TPM vendor in DER (binary) format. Convert using openssl, approximately: + + > openssl x509 -inform der -outform pem -in certificate.der -out certificate.pem + + This is a one time operation. +*/ + +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <stdint.h> + +/* Windows 10 crypto API clashes with openssl */ +#ifdef TPM_WINDOWS +#ifndef WIN32_LEAN_AND_MEAN +#define WIN32_LEAN_AND_MEAN +#endif +#endif + +#include <ibmtss/tss.h> +#include <ibmtss/tssutils.h> +#include <ibmtss/tssresponsecode.h> +#include <ibmtss/Unmarshal_fp.h> + +#include "ekutils.h" + +/* local function prototypes */ + +static void printUsage(void); + +/* possible utility commands */ + +#define EKTemplateType 1 +#define EKNonceType 2 +#define EKCertType 3 +#define CreateprimaryType 4 + +#define AlgRSA 1 +#define AlgEC 2 + +extern int tssUtilsVerbose; + +int main(int argc, char *argv[]) +{ + TPM_RC rc = 0; + int i; /* argc iterator */ + unsigned int ui; /* argc iterator */ + TSS_CONTEXT *tssContext = NULL; + int inputType = 0; + const char *listFilename = NULL; + unsigned int inputCount = 0; + unsigned int algType = 0; + /* initialized to suppress false gcc -O3 warning */ + TPMI_RH_NV_INDEX ekCertIndex = 0; + TPMI_RH_NV_INDEX ekNonceIndex = 0; + TPMI_RH_NV_INDEX ekTemplateIndex = 0; + TPMT_PUBLIC tpmtPublic; + char *rootFilename[MAX_ROOTS]; + unsigned int rootFileCount = 0; + unsigned char *nonce = NULL; /* freed @1 */ + uint16_t nonceSize; + void *ekCertificate = NULL; + uint8_t *modulusBin = NULL; + int modulusBytes; + unsigned int noFlush = 0; /* default flush after validation */ + TPM_HANDLE keyHandle; /* primary key handle */ + + setvbuf(stdout, 0, _IONBF, 0); /* output may be going through pipe to log file */ + TSS_SetProperty(NULL, TPM_TRACE_LEVEL, "1"); + tssUtilsVerbose = FALSE; + + /* for free */ + for (i = 0 ; i < MAX_ROOTS ; i++) { + rootFilename[i] = NULL; + } + /* command line argument defaults */ + for (i=1 ; (i<argc) && (rc == 0) ; i++) { + if (strcmp(argv[i],"-te") == 0) { + inputType = EKTemplateType; + inputCount++; + } + else if (strcmp(argv[i],"-no") == 0) { + inputType = EKNonceType; + inputCount++; + } + else if (strcmp(argv[i],"-ce") == 0) { + inputType = EKCertType; + inputCount++; + } + else if (strcmp(argv[i],"-cp") == 0) { + inputType = CreateprimaryType; + inputCount++; + } + else if (strcmp(argv[i],"-root") == 0) { + i++; + if (i < argc) { + listFilename = argv[i]; + } + else { + printf("-root option needs a value\n"); + printUsage(); + } + } + else if (strcmp(argv[i],"-alg") == 0) { + i++; + if (i < argc) { + if (strcmp(argv[i],"rsa") == 0) { + algType = AlgRSA; + ekCertIndex = EK_CERT_RSA_INDEX; + ekNonceIndex = EK_NONCE_RSA_INDEX; + ekTemplateIndex = EK_TEMPLATE_RSA_INDEX; + } + else if (strcmp(argv[i],"ecc") == 0) { + algType = AlgEC; + ekCertIndex = EK_CERT_EC_INDEX; + ekNonceIndex = EK_NONCE_EC_INDEX; + ekTemplateIndex = EK_TEMPLATE_EC_INDEX; + } + else { + printf("Bad parameter %s for -alg\n", argv[i]); + printUsage(); + } + } + else { + printf("-alg option needs a value\n"); + printUsage(); + } + } + else if (strcmp(argv[i],"-noflush") == 0) { + noFlush = 1; + } + else if (strcmp(argv[i],"-h") == 0) { + printUsage(); + } + else if (strcmp(argv[i],"-v") == 0) { + tssUtilsVerbose = TRUE; + TSS_SetProperty(NULL, TPM_TRACE_LEVEL, "2"); + } + else { + printf("\n%s is not a valid option\n", argv[i]); + printUsage(); + } + } + if (inputCount > 1) { + printf("Only one of -te, -no, -ce can be specified\n"); + printUsage(); + } + if ((inputCount == 0) && (listFilename == NULL)) { + printf("Nothing to do\n"); + printUsage(); + } + if (algType == 0) { + printf("-alg must be specified\n"); + printUsage(); + } + /* Start a TSS context */ + if (rc == 0) { + rc = TSS_Create(&tssContext); + } + if (rc == 0) { + switch (inputType) { + case EKTemplateType: + rc = processEKTemplate(tssContext, &tpmtPublic, ekTemplateIndex, TRUE); + if (rc != 0) { + printf("No EK template\n"); + } + break; + case EKNonceType: + rc = processEKNonce(tssContext, &nonce, &nonceSize, ekNonceIndex, TRUE); + if (rc != 0) { + printf("No EK nonce\n"); + } + break; + case EKCertType: + rc = processEKCertificate(tssContext, + &ekCertificate, /* freed @2 */ + &modulusBin, &modulusBytes, /* freed @3 */ + ekCertIndex, + TRUE); /* print the EK certificate */ + break; + case CreateprimaryType: + rc = processPrimary(tssContext, &keyHandle, + ekCertIndex, ekNonceIndex, ekTemplateIndex, + noFlush, TRUE); + break; + } + } + if (listFilename != NULL) { + if (rc == 0) { + rc = getRootCertificateFilenames(rootFilename, /* freed @4 */ + &rootFileCount, + listFilename, + tssUtilsVerbose); + } + if (rc == 0) { + rc = processRoot(tssContext, + ekCertIndex, + (const char **)rootFilename, + rootFileCount, + TRUE); + } + } + if ((rc == 0) && noFlush && (inputType == CreateprimaryType)) { + printf("Primary key Handle %08x\n", keyHandle); + } + { + TPM_RC rc1 = TSS_Delete(tssContext); + if (rc == 0) { + rc = rc1; + } + } + free(nonce); /* @1 */ + x509FreeStructure(ekCertificate); /* @2 */ + free(modulusBin); /* @3 */ + for (ui = 0 ; ui < rootFileCount ; ui++) { + free(rootFilename[ui]); /* @4 */ + } + return rc; +} + +static void printUsage(void) +{ + printf("\n"); + printf("createek\n"); + printf("\n"); + printf("Parses and prints the various EK NV indexes specified by the IWG\n"); + printf("Creates a primary key based on the EK NV indexes\n"); + printf("\n"); + printf("\t-te\tprint EK Template \n"); + printf("\t-no\tprint EK nonce \n"); + printf("\t-ce\tprint EK certificate \n"); + printf("\t-cp\tCreatePrimary using the EK template and EK nonce.\n"); + printf("\t\tValidate the EK against the EK certificate\n"); + printf("\t[-noflush\tDo not flush the primary key after validation]\n"); + printf("\t[-root\tfilename - validate EK certificate against the root]\n"); + printf("\t\tfilename contains a list of PEM format CA root certificate\n" + "\t\tfilenames, one per line.\n"); + printf("\t\tThe list may contain up to %u certificates.\n", MAX_ROOTS); + printf("\t-alg (rsa or ecc) \n"); + exit(1); +} |