diff options
Diffstat (limited to 'roms/skiboot/libstb/tss2/ibmtpm20tss/utils/regtests/initkeys.sh')
-rwxr-xr-x | roms/skiboot/libstb/tss2/ibmtpm20tss/utils/regtests/initkeys.sh | 130 |
1 files changed, 130 insertions, 0 deletions
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/regtests/initkeys.sh b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/regtests/initkeys.sh new file mode 100755 index 000000000..fba615342 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/regtests/initkeys.sh @@ -0,0 +1,130 @@ +#!/bin/bash +# + +################################################################################# +# # +# TPM2 regression test # +# Written by Ken Goldman # +# IBM Thomas J. Watson Research Center # +# # +# (c) Copyright IBM Corporation 2015 - 2020 # +# # +# All rights reserved. # +# # +# Redistribution and use in source and binary forms, with or without # +# modification, are permitted provided that the following conditions are # +# met: # +# # +# Redistributions of source code must retain the above copyright notice, # +# this list of conditions and the following disclaimer. # +# # +# Redistributions in binary form must reproduce the above copyright # +# notice, this list of conditions and the following disclaimer in the # +# documentation and/or other materials provided with the distribution. # +# # +# Neither the names of the IBM Corporation nor the names of its # +# contributors may be used to endorse or promote products derived from # +# this software without specific prior written permission. # +# # +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS # +# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT # +# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR # +# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT # +# HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, # +# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT # +# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, # +# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY # +# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT # +# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE # +# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. # +# # +################################################################################# + +echo -n "1234567890123456" > msg.bin +touch zero.bin + +# try to undefine any NV index left over from a previous test. Do not check for errors. +${PREFIX}nvundefinespace -hi p -ha 01000000 > run.out +${PREFIX}nvundefinespace -hi p -ha 01000000 -pwdp ppp > run.out +${PREFIX}nvundefinespace -hi p -ha 01000001 > run.out +${PREFIX}nvundefinespace -hi o -ha 01000002 > run.out +${PREFIX}nvundefinespace -hi o -ha 01000003 > run.out +# same for persistent objects +${PREFIX}evictcontrol -ho 81800000 -hp 81800000 -hi p > run.out + +echo "" +echo "Initialize Regression Test Keys" +echo "" + +# Create a platform primary RSA storage key +initprimary + +echo "Create an RSA storage key under the primary key" +${PREFIX}create -hp 80000000 -st -kt f -kt p -pol policies/policycccreate-auth.bin -opr storersa2048priv.bin -opu storersa2048pub.bin -tk storsatk.bin -ch storsach.bin -pwdp sto -pwdk sto > run.out +checkSuccess $? + +echo "Create an ECC storage key under the primary key" +${PREFIX}create -hp 80000000 -ecc nistp256 -st -kt f -kt p -opr storeeccpriv.bin -opu storeeccpub.bin -pwdp sto -pwdk sto > run.out +checkSuccess $? + +for BITS in 2048 3072 +do + + echo "Create an unrestricted RSA $BITS signing key under the primary key" + ${PREFIX}create -hp 80000000 -rsa ${BITS} -si -kt f -kt p -opr signrsa${BITS}priv.bin -opu signrsa${BITS}pub.bin -opem signrsa${BITS}pub.pem -pwdp sto -pwdk sig > run.out + checkSuccess $? + + echo "Create an RSA $BITS decryption key under the primary key" + ${PREFIX}create -hp 80000000 -den -kt f -kt p -opr derrsa${BITS}priv.bin -opu derrsa${BITS}pub.bin -pwdp sto -pwdk dec > run.out + checkSuccess $? + +done + +echo "Create an unrestricted ECC signing key under the primary key" +${PREFIX}create -hp 80000000 -ecc nistp256 -si -kt f -kt p -opr signeccpriv.bin -opu signeccpub.bin -opem signeccpub.pem -pwdp sto -pwdk sig > run.out +checkSuccess $? + +echo "Create a restricted RSA signing key under the primary key" +${PREFIX}create -hp 80000000 -rsa 2048 -sir -kt f -kt p -opr signrsa2048rpriv.bin -opu signrsa2048rpub.bin -opem signrsa2048rpub.pem -pwdp sto -pwdk sig > run.out +checkSuccess $? + +echo "Create an restricted ECC signing key under the primary key" +${PREFIX}create -hp 80000000 -ecc nistp256 -sir -kt f -kt p -opr signeccrpriv.bin -opu signeccrpub.bin -opem signeccrpub.pem -pwdp sto -pwdk sig > run.out +checkSuccess $? + +echo "Create a not fixedTPM RSA signing key under the primary key" +${PREFIX}create -hp 80000000 -sir -opr signrsa2048nfpriv.bin -opu signrsa2048nfpub.bin -opem signrsa2048nfpub.pem -pwdp sto -pwdk sig > run.out +checkSuccess $? + +echo "Create a not fixedTPM ECC signing key under the primary key" +${PREFIX}create -hp 80000000 -ecc nistp256 -sir -opr signeccnfpriv.bin -opu signeccnfpub.bin -opem signeccnfpub.pem -pwdp sto -pwdk sig > run.out +checkSuccess $? + +echo "Create a symmetric cipher key under the primary key" +${PREFIX}create -hp 80000000 -des -kt f -kt p -opr despriv.bin -opu despub.bin -pwdp sto -pwdk aes > run.out +RC=$? +checkWarning $RC "Symmetric cipher key may not support sign attribute" + +if [ $RC -ne 0 ]; then + echo "Create a rev 116 symmetric cipher key under the primary key" + ${PREFIX}create -hp 80000000 -des -116 -kt f -kt p -opr despriv.bin -opu despub.bin -pwdp sto -pwdk aes > run.out + checkSuccess $? +fi + +for HALG in ${ITERATE_ALGS} + +do + + echo "Create a ${HALG} unrestricted keyed hash key under the primary key" + ${PREFIX}create -hp 80000000 -kh -kt f -kt p -opr khpriv${HALG}.bin -opu khpub${HALG}.bin -pwdp sto -pwdk khk -halg ${HALG} > run.out + checkSuccess $? + + echo "Create a ${HALG} restricted keyed hash key under the primary key" + ${PREFIX}create -hp 80000000 -khr -kt f -kt p -opr khrpriv${HALG}.bin -opu khrpub${HALG}.bin -pwdp sto -pwdk khk -halg ${HALG} > run.out + checkSuccess $? + + + +done + +exit ${WARN} |