Merge pull request #26331 from ddstreet/tpm2_pcr_read

Tpm2 pcr read
This commit is contained in:
Lennart Poettering 2023-03-10 10:24:39 +01:00 committed by GitHub
commit f69edd6faf
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
11 changed files with 1355 additions and 162 deletions

73
src/basic/bitfield.h Normal file
View file

@ -0,0 +1,73 @@
/* SPDX-License-Identifier: LGPL-2.1-or-later */
#pragma once
#include "macro.h"
/* Bit index (0-based) to mask of specified type. Assertion failure if index is out of range. */
#define _INDEX_TO_MASK(type, i, uniq) \
({ \
int UNIQ_T(_i, uniq) = (i); \
assert(UNIQ_T(_i, uniq) < (int)sizeof(type) * 8); \
((type)1) << UNIQ_T(_i, uniq); \
})
#define INDEX_TO_MASK(type, i) \
({ \
assert_cc(sizeof(type) <= sizeof(unsigned long long)); \
assert_cc(__builtin_choose_expr(__builtin_constant_p(i), i, 0) < (int)(sizeof(type) * 8)); \
__builtin_choose_expr(__builtin_constant_p(i), \
((type)1) << (i), \
_INDEX_TO_MASK(type, i, UNIQ)); \
})
/* Builds a mask of specified type with multiple bits set. Note the result will not be constant, even if all
* indexes are constant. */
#define INDEXES_TO_MASK(type, ...) \
UNIQ_INDEXES_TO_MASK(type, UNIQ, ##__VA_ARGS__)
#define UNIQ_INDEXES_TO_MASK(type, uniq, ...) \
({ \
typeof(type) UNIQ_T(_mask, uniq) = (type)0; \
int UNIQ_T(_i, uniq); \
VA_ARGS_FOREACH(UNIQ_T(_i, uniq), ##__VA_ARGS__) \
UNIQ_T(_mask, uniq) |= INDEX_TO_MASK(type, UNIQ_T(_i, uniq)); \
UNIQ_T(_mask, uniq); \
})
/* Same as the FLAG macros, but accept a 0-based bit index instead of a mask. Results in assertion failure if
* index is out of range for the type. */
#define SET_BIT(bits, i) SET_FLAG(bits, INDEX_TO_MASK(typeof(bits), i), true)
#define CLEAR_BIT(bits, i) SET_FLAG(bits, INDEX_TO_MASK(typeof(bits), i), false)
#define BIT_SET(bits, i) FLAGS_SET(bits, INDEX_TO_MASK(typeof(bits), i))
/* As above, but accepts multiple indexes. Note the result will not be constant, even if all indexes are
* constant. */
#define SET_BITS(bits, ...) SET_FLAG(bits, INDEXES_TO_MASK(typeof(bits), ##__VA_ARGS__), true)
#define CLEAR_BITS(bits, ...) SET_FLAG(bits, INDEXES_TO_MASK(typeof(bits), ##__VA_ARGS__), false)
#define BITS_SET(bits, ...) FLAGS_SET(bits, INDEXES_TO_MASK(typeof(bits), ##__VA_ARGS__))
/* Iterate through each set bit. Index is 0-based and type int. */
#define BIT_FOREACH(index, bits) _BIT_FOREACH(index, bits, UNIQ)
#define _BIT_FOREACH(index, bits, uniq) \
for (int UNIQ_T(_last, uniq) = -1, index; \
(index = BIT_NEXT_SET(bits, UNIQ_T(_last, uniq))) >= 0; \
UNIQ_T(_last, uniq) = index)
/* Find the next set bit after 0-based index 'prev'. Result is 0-based index of next set bit, or -1 if no
* more bits are set. */
#define BIT_FIRST_SET(bits) BIT_NEXT_SET(bits, -1)
#define BIT_NEXT_SET(bits, prev) \
UNIQ_BIT_NEXT_SET(bits, prev, UNIQ)
#define UNIQ_BIT_NEXT_SET(bits, prev, uniq) \
({ \
typeof(bits) UNIQ_T(_bits, uniq) = (bits); \
int UNIQ_T(_prev, uniq) = (prev); \
int UNIQ_T(_next, uniq); \
_BIT_NEXT_SET(UNIQ_T(_bits, uniq), \
UNIQ_T(_prev, uniq), \
UNIQ_T(_next, uniq)); \
})
#define _BIT_NEXT_SET(bits, prev, next) \
((int)(prev + 1) == (int)sizeof(bits) * 8 \
? -1 /* Prev index was msb. */ \
: ((next = __builtin_ffsll(((unsigned long long)(bits)) >> (prev + 1))) == 0 \
? -1 /* No more bits set. */ \
: prev + next))

View file

@ -430,4 +430,13 @@ assert_cc(sizeof(dummy_t) == 0);
_q && _q > (base) ? &_q[-1] : NULL; \
})
/* Iterate through each variadic arg. All must be the same type as 'entry' or must be implicitly
* convertable. The iteration variable 'entry' must already be defined. */
#define VA_ARGS_FOREACH(entry, ...) \
_VA_ARGS_FOREACH(entry, UNIQ_T(_entries_, UNIQ), UNIQ_T(_current_, UNIQ), ##__VA_ARGS__)
#define _VA_ARGS_FOREACH(entry, _entries_, _current_, ...) \
for (typeof(entry) _entries_[] = { __VA_ARGS__ }, *_current_ = _entries_; \
((long)(_current_ - _entries_) < (long)ELEMENTSOF(_entries_)) && ({ entry = *_current_; true; }); \
_current_++)
#include "log.h"

View file

@ -870,7 +870,9 @@ static int verb_sign(int argc, char *argv[], void *userdata) {
return log_error_errno(tpmalg, "Unsupported PCR bank");
TPML_PCR_SELECTION pcr_selection;
tpm2_pcr_mask_to_selection(1 << TPM_PCR_INDEX_KERNEL_IMAGE, tpmalg, &pcr_selection);
tpm2_tpml_pcr_selection_from_mask(1 << TPM_PCR_INDEX_KERNEL_IMAGE,
tpmalg,
&pcr_selection);
rc = sym_Esys_PolicyPCR(
c->esys_context,

View file

@ -205,13 +205,13 @@ _public_ void cryptsetup_token_dump(
if (r < 0)
return (void) crypt_log_debug_errno(cd, r, "Failed to parse " TOKEN_NAME " JSON fields: %m");
r = pcr_mask_to_string(hash_pcr_mask, &hash_pcrs_str);
if (r < 0)
return (void) crypt_log_debug_errno(cd, r, "Cannot format PCR hash mask: %m");
hash_pcrs_str = tpm2_pcr_mask_to_string(hash_pcr_mask);
if (!hash_pcrs_str)
return (void) crypt_log_debug_errno(cd, ENOMEM, "Cannot format PCR hash mask: %m");
r = pcr_mask_to_string(pubkey_pcr_mask, &pubkey_pcrs_str);
if (r < 0)
return (void) crypt_log_debug_errno(cd, r, "Cannot format PCR hash mask: %m");
pubkey_pcrs_str = tpm2_pcr_mask_to_string(pubkey_pcr_mask);
if (!pubkey_pcrs_str)
return (void) crypt_log_debug_errno(cd, ENOMEM, "Cannot format PCR hash mask: %m");
r = crypt_dump_buffer_to_hex_string(blob, blob_size, &blob_str);
if (r < 0)
@ -271,7 +271,7 @@ _public_ int cryptsetup_token_validate(
}
u = json_variant_unsigned(e);
if (u >= TPM2_PCRS_MAX) {
if (!TPM2_PCR_VALID(u)) {
crypt_log_debug(cd, "TPM2 PCR number out of range.");
return 1;
}

View file

@ -438,7 +438,7 @@ static int parse_one_option(const char *option) {
}
pcr = r ? TPM_PCR_INDEX_VOLUME_KEY : UINT_MAX;
} else if (pcr >= TPM2_PCRS_MAX) {
} else if (!TPM2_PCR_VALID(pcr)) {
log_error("Selected TPM index for measurement %u outside of allowed range 0…%u, ignoring.", pcr, TPM2_PCRS_MAX-1);
return 0;
}

View file

@ -462,44 +462,424 @@ static int tpm2_make_primary(
return 0;
}
void tpm2_pcr_mask_to_selection(uint32_t mask, uint16_t bank, TPML_PCR_SELECTION *ret) {
/* Utility functions for TPMS_PCR_SELECTION. */
/* Convert a TPMS_PCR_SELECTION object to a mask. */
void tpm2_tpms_pcr_selection_to_mask(const TPMS_PCR_SELECTION *s, uint32_t *ret) {
assert(s);
assert(s->sizeofSelect <= sizeof(s->pcrSelect));
assert(ret);
/* We only do 24bit here, as that's what PC TPMs are supposed to support */
assert(mask <= 0xFFFFFFU);
uint32_t mask = 0;
for (unsigned i = 0; i < s->sizeofSelect; i++)
SET_FLAG(mask, (uint32_t)s->pcrSelect[i] << (i * 8), true);
*ret = mask;
}
*ret = (TPML_PCR_SELECTION) {
.count = 1,
.pcrSelections[0] = {
.hash = bank,
.sizeofSelect = 3,
.pcrSelect[0] = mask & 0xFF,
.pcrSelect[1] = (mask >> 8) & 0xFF,
.pcrSelect[2] = (mask >> 16) & 0xFF,
}
/* Convert a mask and hash alg to a TPMS_PCR_SELECTION object. */
void tpm2_tpms_pcr_selection_from_mask(uint32_t mask, TPMI_ALG_HASH hash_alg, TPMS_PCR_SELECTION *ret) {
assert(ret);
/* This is currently hardcoded at 24 PCRs, above. */
if (!TPM2_PCR_MASK_VALID(mask))
log_warning("PCR mask selections (%x) out of range, ignoring.",
mask & ~((uint32_t)TPM2_PCRS_MASK));
*ret = (TPMS_PCR_SELECTION){
.hash = hash_alg,
.sizeofSelect = TPM2_PCRS_MAX / 8,
.pcrSelect[0] = mask & 0xff,
.pcrSelect[1] = (mask >> 8) & 0xff,
.pcrSelect[2] = (mask >> 16) & 0xff,
};
}
static unsigned find_nth_bit(uint32_t mask, unsigned n) {
uint32_t bit = 1;
/* Add all PCR selections in 'b' to 'a'. Both must have the same hash alg. */
void tpm2_tpms_pcr_selection_add(TPMS_PCR_SELECTION *a, const TPMS_PCR_SELECTION *b) {
assert(a);
assert(b);
assert(a->hash == b->hash);
assert(n < 32);
uint32_t maska, maskb;
tpm2_tpms_pcr_selection_to_mask(a, &maska);
tpm2_tpms_pcr_selection_to_mask(b, &maskb);
tpm2_tpms_pcr_selection_from_mask(maska | maskb, a->hash, a);
}
/* Returns the bit index of the nth set bit, e.g. mask=0b101001, n=3 → 5 */
/* Remove all PCR selections in 'b' from 'a'. Both must have the same hash alg. */
void tpm2_tpms_pcr_selection_sub(TPMS_PCR_SELECTION *a, const TPMS_PCR_SELECTION *b) {
assert(a);
assert(b);
assert(a->hash == b->hash);
for (unsigned i = 0; i < sizeof(mask)*8; i++) {
uint32_t maska, maskb;
tpm2_tpms_pcr_selection_to_mask(a, &maska);
tpm2_tpms_pcr_selection_to_mask(b, &maskb);
tpm2_tpms_pcr_selection_from_mask(maska & ~maskb, a->hash, a);
}
if (bit & mask) {
if (n == 0)
return i;
/* Move all PCR selections in 'b' to 'a'. Both must have the same hash alg. */
void tpm2_tpms_pcr_selection_move(TPMS_PCR_SELECTION *a, TPMS_PCR_SELECTION *b) {
if (a == b)
return;
n--;
tpm2_tpms_pcr_selection_add(a, b);
tpm2_tpms_pcr_selection_from_mask(0, b->hash, b);
}
#define FOREACH_PCR_IN_TPMS_PCR_SELECTION(pcr, tpms) \
_FOREACH_PCR_IN_TPMS_PCR_SELECTION(pcr, tpms, UNIQ)
#define _FOREACH_PCR_IN_TPMS_PCR_SELECTION(pcr, tpms, uniq) \
FOREACH_PCR_IN_MASK(pcr, \
({ uint32_t UNIQ_T(_mask, uniq); \
tpm2_tpms_pcr_selection_to_mask(tpms, &UNIQ_T(_mask, uniq)); \
UNIQ_T(_mask, uniq); \
}))
#define FOREACH_TPMS_PCR_SELECTION_IN_TPML_PCR_SELECTION(tpms, tpml) \
UNIQ_FOREACH_TPMS_PCR_SELECTION_IN_TPML_PCR_SELECTION(tpms, tpml, UNIQ)
#define UNIQ_FOREACH_TPMS_PCR_SELECTION_IN_TPML_PCR_SELECTION(tpms, tpml, uniq) \
for (TPML_PCR_SELECTION *UNIQ_T(_tpml, uniq) = (TPML_PCR_SELECTION*)(tpml); \
UNIQ_T(_tpml, uniq); UNIQ_T(_tpml, uniq) = NULL) \
_FOREACH_TPMS_PCR_SELECTION_IN_TPML_PCR_SELECTION(tpms, UNIQ_T(_tpml, uniq))
#define _FOREACH_TPMS_PCR_SELECTION_IN_TPML_PCR_SELECTION(tpms, tpml) \
for (TPMS_PCR_SELECTION *tpms = tpml->pcrSelections; \
(uint32_t)(tpms - tpml->pcrSelections) < tpml->count; \
tpms++)
#define FOREACH_PCR_IN_TPML_PCR_SELECTION(pcr, tpms, tpml) \
FOREACH_TPMS_PCR_SELECTION_IN_TPML_PCR_SELECTION(tpms, tpml) \
FOREACH_PCR_IN_TPMS_PCR_SELECTION(pcr, tpms)
char *tpm2_tpms_pcr_selection_to_string(const TPMS_PCR_SELECTION *s) {
assert(s);
const char *algstr = strna(tpm2_hash_alg_to_string(s->hash));
uint32_t mask;
tpm2_tpms_pcr_selection_to_mask(s, &mask);
_cleanup_free_ char *maskstr = tpm2_pcr_mask_to_string(mask);
if (!maskstr)
return NULL;
return strjoin(algstr, "(", maskstr, ")");
}
size_t tpm2_tpms_pcr_selection_weight(const TPMS_PCR_SELECTION *s) {
assert(s);
uint32_t mask;
tpm2_tpms_pcr_selection_to_mask(s, &mask);
return (size_t)__builtin_popcount(mask);
}
/* Utility functions for TPML_PCR_SELECTION. */
/* Remove the (0-based) index entry from 'l', shift all following entries, and update the count. */
static void tpm2_tpml_pcr_selection_remove_index(TPML_PCR_SELECTION *l, uint32_t index) {
assert(l);
assert(l->count <= sizeof(l->pcrSelections));
assert(index < l->count);
size_t s = l->count - (index + 1);
memmove(&l->pcrSelections[index], &l->pcrSelections[index + 1], s * sizeof(l->pcrSelections[0]));
l->count--;
}
/* Get a TPMS_PCR_SELECTION from a TPML_PCR_SELECTION for the given hash alg. Returns NULL if there is no
* entry for the hash alg. This guarantees the returned entry contains all the PCR selections for the given
* hash alg, which may require modifying the TPML_PCR_SELECTION by removing duplicate entries. */
static TPMS_PCR_SELECTION *tpm2_tpml_pcr_selection_get_tpms_pcr_selection(
TPML_PCR_SELECTION *l,
TPMI_ALG_HASH hash_alg) {
assert(l);
TPMS_PCR_SELECTION *selection = NULL;
FOREACH_TPMS_PCR_SELECTION_IN_TPML_PCR_SELECTION(s, l)
if (s->hash == hash_alg) {
selection = s;
break;
}
bit <<= 1;
if (!selection)
return NULL;
/* Iterate backwards through the entries, removing any other entries for the hash alg. */
for (uint32_t i = l->count - 1; i > 0; i--) {
TPMS_PCR_SELECTION *s = &l->pcrSelections[i];
if (selection == s)
break;
if (s->hash == hash_alg) {
tpm2_tpms_pcr_selection_move(selection, s);
tpm2_tpml_pcr_selection_remove_index(l, i);
}
}
return UINT_MAX;
return selection;
}
/* Convert a TPML_PCR_SELECTION object to a mask. Returns -ENOENT if 'hash_alg' is not in the object. */
int tpm2_tpml_pcr_selection_to_mask(const TPML_PCR_SELECTION *l, TPMI_ALG_HASH hash_alg, uint32_t *ret) {
assert(l);
assert(ret);
/* Make a copy, as tpm2_tpml_pcr_selection_get_tpms_pcr_selection() will modify the object if there
* are multiple entries with the requested hash alg. */
TPML_PCR_SELECTION lcopy = *l;
TPMS_PCR_SELECTION *s;
s = tpm2_tpml_pcr_selection_get_tpms_pcr_selection(&lcopy, hash_alg);
if (!s)
return SYNTHETIC_ERRNO(ENOENT);
tpm2_tpms_pcr_selection_to_mask(s, ret);
return 0;
}
/* Convert a mask and hash alg to a TPML_PCR_SELECTION object. */
void tpm2_tpml_pcr_selection_from_mask(uint32_t mask, TPMI_ALG_HASH hash_alg, TPML_PCR_SELECTION *ret) {
assert(ret);
TPMS_PCR_SELECTION s;
tpm2_tpms_pcr_selection_from_mask(mask, hash_alg, &s);
*ret = (TPML_PCR_SELECTION){
.count = 1,
.pcrSelections[0] = s,
};
}
/* Combine all duplicate (same hash alg) TPMS_PCR_SELECTION entries in 'l'. */
static void tpm2_tpml_pcr_selection_cleanup(TPML_PCR_SELECTION *l) {
FOREACH_TPMS_PCR_SELECTION_IN_TPML_PCR_SELECTION(s, l)
/* This removes all duplicates for s->hash. */
(void) tpm2_tpml_pcr_selection_get_tpms_pcr_selection(l, s->hash);
}
/* Add the PCR selections in 's' to the corresponding hash alg TPMS_PCR_SELECTION entry in 'l'. Adds a new
* TPMS_PCR_SELECTION entry for the hash alg if needed. This may modify the TPML_PCR_SELECTION by combining
* entries with the same hash alg. */
void tpm2_tpml_pcr_selection_add_tpms_pcr_selection(TPML_PCR_SELECTION *l, const TPMS_PCR_SELECTION *s) {
assert(l);
assert(s);
if (tpm2_tpms_pcr_selection_is_empty(s))
return;
TPMS_PCR_SELECTION *selection = tpm2_tpml_pcr_selection_get_tpms_pcr_selection(l, s->hash);
if (selection) {
tpm2_tpms_pcr_selection_add(selection, s);
return;
}
/* It's already broken if the count is higher than the array has size for. */
assert(!(l->count > sizeof(l->pcrSelections)));
/* If full, the cleanup should result in at least one available entry. */
if (l->count == sizeof(l->pcrSelections))
tpm2_tpml_pcr_selection_cleanup(l);
assert(l->count < sizeof(l->pcrSelections));
l->pcrSelections[l->count++] = *s;
}
/* Remove the PCR selections in 's' from the corresponding hash alg TPMS_PCR_SELECTION entry in 'l'. This
* will combine all entries for 's->hash' in 'l'. */
void tpm2_tpml_pcr_selection_sub_tpms_pcr_selection(TPML_PCR_SELECTION *l, const TPMS_PCR_SELECTION *s) {
assert(l);
assert(s);
if (tpm2_tpms_pcr_selection_is_empty(s))
return;
TPMS_PCR_SELECTION *selection = tpm2_tpml_pcr_selection_get_tpms_pcr_selection(l, s->hash);
if (selection)
tpm2_tpms_pcr_selection_sub(selection, s);
}
/* Add all PCR selections in 'b' to 'a'. */
void tpm2_tpml_pcr_selection_add(TPML_PCR_SELECTION *a, const TPML_PCR_SELECTION *b) {
assert(a);
assert(b);
FOREACH_TPMS_PCR_SELECTION_IN_TPML_PCR_SELECTION(selection_b, (TPML_PCR_SELECTION*) b)
tpm2_tpml_pcr_selection_add_tpms_pcr_selection(a, selection_b);
}
/* Remove all PCR selections in 'b' from 'a'. */
void tpm2_tpml_pcr_selection_sub(TPML_PCR_SELECTION *a, const TPML_PCR_SELECTION *b) {
assert(a);
assert(b);
FOREACH_TPMS_PCR_SELECTION_IN_TPML_PCR_SELECTION(selection_b, (TPML_PCR_SELECTION*) b)
tpm2_tpml_pcr_selection_sub_tpms_pcr_selection(a, selection_b);
}
char *tpm2_tpml_pcr_selection_to_string(const TPML_PCR_SELECTION *l) {
assert(l);
_cleanup_free_ char *banks = NULL;
FOREACH_TPMS_PCR_SELECTION_IN_TPML_PCR_SELECTION(s, (TPML_PCR_SELECTION*) l) {
if (tpm2_tpms_pcr_selection_is_empty(s))
continue;
_cleanup_free_ char *str = tpm2_tpms_pcr_selection_to_string(s);
if (!str || !strextend_with_separator(&banks, ",", str))
return NULL;
}
return strjoin("[", strempty(banks), "]");
}
size_t tpm2_tpml_pcr_selection_weight(const TPML_PCR_SELECTION *l) {
assert(l);
assert(l->count <= sizeof(l->pcrSelections));
size_t weight = 0;
FOREACH_TPMS_PCR_SELECTION_IN_TPML_PCR_SELECTION(s, l) {
size_t w = tpm2_tpms_pcr_selection_weight(s);
assert(weight <= SIZE_MAX - w);
weight += w;
}
return weight;
}
static void tpm2_log_debug_tpml_pcr_selection(const TPML_PCR_SELECTION *l, const char *msg) {
if (!DEBUG_LOGGING || !l)
return;
_cleanup_free_ char *s = tpm2_tpml_pcr_selection_to_string(l);
log_debug("%s: %s", msg ?: "PCR selection", strna(s));
}
static void tpm2_log_debug_buffer(const void *buffer, size_t size, const char *msg) {
if (!DEBUG_LOGGING || !buffer || size == 0)
return;
_cleanup_free_ char *h = hexmem(buffer, size);
log_debug("%s: %s", msg ?: "Buffer", strna(h));
}
static void tpm2_log_debug_digest(const TPM2B_DIGEST *digest, const char *msg) {
if (digest)
tpm2_log_debug_buffer(digest->buffer, digest->size, msg ?: "Digest");
}
static int tpm2_get_policy_digest(
Tpm2Context *c,
const Tpm2Handle *session,
TPM2B_DIGEST **ret_policy_digest) {
TSS2_RC rc;
if (!DEBUG_LOGGING && !ret_policy_digest)
return 0;
assert(c);
assert(session);
log_debug("Acquiring policy digest.");
_cleanup_(Esys_Freep) TPM2B_DIGEST *policy_digest = NULL;
rc = sym_Esys_PolicyGetDigest(
c->esys_context,
session->esys_handle,
ESYS_TR_NONE,
ESYS_TR_NONE,
ESYS_TR_NONE,
&policy_digest);
if (rc != TSS2_RC_SUCCESS)
return log_error_errno(SYNTHETIC_ERRNO(ENOTRECOVERABLE),
"Failed to get policy digest from TPM: %s", sym_Tss2_RC_Decode(rc));
tpm2_log_debug_digest(policy_digest, "Session policy digest");
if (ret_policy_digest)
*ret_policy_digest = TAKE_PTR(policy_digest);
return 0;
}
static int tpm2_pcr_read(
Tpm2Context *c,
const TPML_PCR_SELECTION *pcr_selection,
TPML_PCR_SELECTION *ret_pcr_selection,
TPM2B_DIGEST **ret_pcr_values,
size_t *ret_pcr_values_size) {
_cleanup_free_ TPM2B_DIGEST *pcr_values = NULL;
TPML_PCR_SELECTION remaining, total_read = {};
size_t pcr_values_size = 0;
TSS2_RC rc;
assert(c);
assert(pcr_selection);
remaining = *pcr_selection;
while (!tpm2_tpml_pcr_selection_is_empty(&remaining)) {
_cleanup_(Esys_Freep) TPML_PCR_SELECTION *current_read = NULL;
_cleanup_(Esys_Freep) TPML_DIGEST *current_values = NULL;
tpm2_log_debug_tpml_pcr_selection(&remaining, "Reading PCR selection");
/* Unfortunately, PCR_Read will not return more than 8 values. */
rc = sym_Esys_PCR_Read(
c->esys_context,
ESYS_TR_NONE,
ESYS_TR_NONE,
ESYS_TR_NONE,
&remaining,
NULL,
&current_read,
&current_values);
if (rc != TSS2_RC_SUCCESS)
return log_error_errno(SYNTHETIC_ERRNO(ENOTRECOVERABLE),
"Failed to read TPM2 PCRs: %s", sym_Tss2_RC_Decode(rc));
if (tpm2_tpml_pcr_selection_is_empty(current_read)) {
log_warning("TPM2 refused to read possibly unimplemented PCRs, ignoring.");
break;
}
tpm2_tpml_pcr_selection_sub(&remaining, current_read);
tpm2_tpml_pcr_selection_add(&total_read, current_read);
if (!GREEDY_REALLOC(pcr_values, pcr_values_size + current_values->count))
return log_oom();
memcpy_safe(&pcr_values[pcr_values_size], current_values->digests,
current_values->count * sizeof(TPM2B_DIGEST));
pcr_values_size += current_values->count;
if (DEBUG_LOGGING) {
unsigned i = 0;
FOREACH_PCR_IN_TPML_PCR_SELECTION(pcr, s, current_read) {
assert(i < current_values->count);
TPM2B_DIGEST *d = &current_values->digests[i];
i++;
TPML_PCR_SELECTION l;
tpm2_tpml_pcr_selection_from_mask(INDEX_TO_MASK(uint32_t, pcr), s->hash, &l);
_cleanup_free_ char *desc = tpm2_tpml_pcr_selection_to_string(&l);
tpm2_log_debug_digest(d, strna(desc));
}
}
}
if (ret_pcr_selection)
*ret_pcr_selection = total_read;
if (ret_pcr_values)
*ret_pcr_values = TAKE_PTR(pcr_values);
if (ret_pcr_values_size)
*ret_pcr_values_size = pcr_values_size;
return 0;
}
static int tpm2_pcr_mask_good(
@ -507,10 +887,10 @@ static int tpm2_pcr_mask_good(
TPMI_ALG_HASH bank,
uint32_t mask) {
_cleanup_(Esys_Freep) TPML_DIGEST *pcr_values = NULL;
_cleanup_free_ TPM2B_DIGEST *pcr_values = NULL;
TPML_PCR_SELECTION selection;
bool good = false;
TSS2_RC rc;
size_t pcr_values_size = 0;
int r;
assert(c);
@ -518,40 +898,25 @@ static int tpm2_pcr_mask_good(
* actually measure into them, or only into a suboptimal bank. If so, the PCRs should be all zero or
* all 0xFF. Detect that, so that we can warn and maybe pick a better bank. */
tpm2_pcr_mask_to_selection(mask, bank, &selection);
tpm2_tpml_pcr_selection_from_mask(mask, bank, &selection);
rc = sym_Esys_PCR_Read(
c->esys_context,
ESYS_TR_NONE,
ESYS_TR_NONE,
ESYS_TR_NONE,
&selection,
NULL,
NULL,
&pcr_values);
if (rc != TSS2_RC_SUCCESS)
return log_error_errno(SYNTHETIC_ERRNO(ENOTRECOVERABLE),
"Failed to read TPM2 PCRs: %s", sym_Tss2_RC_Decode(rc));
r = tpm2_pcr_read(c, &selection, &selection, &pcr_values, &pcr_values_size);
if (r < 0)
return r;
/* If at least one of the selected PCR values is something other than all 0x00 or all 0xFF we are happy. */
for (unsigned i = 0; i < pcr_values->count; i++) {
if (DEBUG_LOGGING) {
_cleanup_free_ char *h = NULL;
unsigned j;
unsigned i = 0;
FOREACH_PCR_IN_TPML_PCR_SELECTION(pcr, s, &selection) {
assert(i < pcr_values_size);
h = hexmem(pcr_values->digests[i].buffer, pcr_values->digests[i].size);
j = find_nth_bit(mask, i);
assert(j != UINT_MAX);
if (!memeqbyte(0x00, pcr_values[i].buffer, pcr_values[i].size) &&
!memeqbyte(0xFF, pcr_values[i].buffer, pcr_values[i].size))
return true;
log_debug("PCR %u value: %s", j, strna(h));
}
if (!memeqbyte(0x00, pcr_values->digests[i].buffer, pcr_values->digests[i].size) &&
!memeqbyte(0xFF, pcr_values->digests[i].buffer, pcr_values->digests[i].size))
good = true;
i++;
}
return good;
return false;
}
static int tpm2_bank_has24(const TPMS_PCR_SELECTION *selection) {
@ -1108,7 +1473,6 @@ static int tpm2_make_policy_session(
.keyBits.aes = 128,
.mode.aes = TPM2_ALG_CFB,
};
_cleanup_(Esys_Freep) TPM2B_DIGEST *policy_digest = NULL;
TSS2_RC rc;
int r;
@ -1230,7 +1594,7 @@ static int tpm2_make_policy_session(
/* Put together the PCR policy we want to use */
TPML_PCR_SELECTION pcr_selection;
tpm2_pcr_mask_to_selection(pubkey_pcr_mask, pcr_bank, &pcr_selection);
tpm2_tpml_pcr_selection_from_mask(pubkey_pcr_mask, (TPMI_ALG_HASH)pcr_bank, &pcr_selection);
rc = sym_Esys_PolicyPCR(
c->esys_context,
session->esys_handle,
@ -1245,16 +1609,9 @@ static int tpm2_make_policy_session(
/* Get the policy hash of the PCR policy */
_cleanup_(Esys_Freep) TPM2B_DIGEST *approved_policy = NULL;
rc = sym_Esys_PolicyGetDigest(
c->esys_context,
session->esys_handle,
ESYS_TR_NONE,
ESYS_TR_NONE,
ESYS_TR_NONE,
&approved_policy);
if (rc != TSS2_RC_SUCCESS)
return log_error_errno(SYNTHETIC_ERRNO(ENOTRECOVERABLE),
"Failed to get policy digest from TPM: %s", sym_Tss2_RC_Decode(rc));
r = tpm2_get_policy_digest(c, session, &approved_policy);
if (r < 0)
return r;
/* When we are unlocking and have a signature, let's pass it to the TPM */
_cleanup_(Esys_Freep) TPMT_TK_VERIFIED *check_ticket_buffer = NULL;
@ -1340,7 +1697,7 @@ static int tpm2_make_policy_session(
log_debug("Configuring hash-based PCR policy.");
TPML_PCR_SELECTION pcr_selection;
tpm2_pcr_mask_to_selection(hash_pcr_mask, pcr_bank, &pcr_selection);
tpm2_tpml_pcr_selection_from_mask(hash_pcr_mask, (TPMI_ALG_HASH)pcr_bank, &pcr_selection);
rc = sym_Esys_PolicyPCR(
c->esys_context,
session->esys_handle,
@ -1369,38 +1726,13 @@ static int tpm2_make_policy_session(
sym_Tss2_RC_Decode(rc));
}
if (DEBUG_LOGGING || ret_policy_digest) {
log_debug("Acquiring policy digest.");
rc = sym_Esys_PolicyGetDigest(
c->esys_context,
session->esys_handle,
ESYS_TR_NONE,
ESYS_TR_NONE,
ESYS_TR_NONE,
&policy_digest);
if (rc != TSS2_RC_SUCCESS)
return log_error_errno(SYNTHETIC_ERRNO(ENOTRECOVERABLE),
"Failed to get policy digest from TPM: %s", sym_Tss2_RC_Decode(rc));
if (DEBUG_LOGGING) {
_cleanup_free_ char *h = NULL;
h = hexmem(policy_digest->buffer, policy_digest->size);
if (!h)
return log_oom();
log_debug("Session policy digest: %s", h);
}
}
r = tpm2_get_policy_digest(c, session, ret_policy_digest);
if (r < 0)
return r;
if (ret_session)
*ret_session = TAKE_PTR(session);
if (ret_policy_digest)
*ret_policy_digest = TAKE_PTR(policy_digest);
if (ret_pcr_bank)
*ret_pcr_bank = pcr_bank;
@ -1422,7 +1754,6 @@ int tpm2_seal(const char *device,
uint16_t *ret_pcr_bank,
uint16_t *ret_primary_alg) {
_cleanup_(Esys_Freep) TPM2B_DIGEST *policy_digest = NULL;
_cleanup_(Esys_Freep) TPM2B_PRIVATE *private = NULL;
_cleanup_(Esys_Freep) TPM2B_PUBLIC *public = NULL;
static const TPML_PCR_SELECTION creation_pcr = {};
@ -1431,7 +1762,6 @@ int tpm2_seal(const char *device,
TPM2B_SENSITIVE_CREATE hmac_sensitive;
TPMI_ALG_PUBLIC primary_alg;
TPM2B_PUBLIC hmac_template;
TPMI_ALG_HASH pcr_bank;
usec_t start;
TSS2_RC rc;
int r;
@ -1485,6 +1815,8 @@ int tpm2_seal(const char *device,
if (r < 0)
return r;
_cleanup_(Esys_Freep) TPM2B_DIGEST *policy_digest = NULL;
TPMI_ALG_HASH pcr_bank;
r = tpm2_make_policy_session(
c,
primary,
@ -1616,7 +1948,6 @@ int tpm2_unseal(const char *device,
size_t *ret_secret_size) {
_cleanup_(Esys_Freep) TPM2B_SENSITIVE_DATA* unsealed = NULL;
_cleanup_(Esys_Freep) TPM2B_DIGEST *policy_digest = NULL;
_cleanup_(erase_and_freep) char *secret = NULL;
TPM2B_PRIVATE private = {};
TPM2B_PUBLIC public = {};
@ -1716,6 +2047,7 @@ int tpm2_unseal(const char *device,
for (unsigned i = RETRY_UNSEAL_MAX;; i--) {
_cleanup_tpm2_handle_ Tpm2Handle *policy_session = NULL;
_cleanup_(Esys_Freep) TPM2B_DIGEST *policy_digest = NULL;
r = tpm2_make_policy_session(
c,
primary,
@ -1981,13 +2313,28 @@ int tpm2_extend_bytes(
}
#endif
int tpm2_parse_pcrs(const char *s, uint32_t *ret) {
const char *p = ASSERT_PTR(s);
char *tpm2_pcr_mask_to_string(uint32_t mask) {
_cleanup_free_ char *s = NULL;
FOREACH_PCR_IN_MASK(n, mask)
if (strextendf_with_separator(&s, "+", "%d", n) < 0)
return NULL;
if (!s)
return strdup("");
return TAKE_PTR(s);
}
int tpm2_pcr_mask_from_string(const char *arg, uint32_t *ret_mask) {
uint32_t mask = 0;
int r;
if (isempty(s)) {
*ret = 0;
assert(arg);
assert(ret_mask);
if (isempty(arg)) {
*ret_mask = 0;
return 0;
}
@ -1996,6 +2343,7 @@ int tpm2_parse_pcrs(const char *s, uint32_t *ret) {
* /etc/crypttab the "," is already used to separate options, hence a different separator is nice to
* avoid escaping. */
const char *p = arg;
for (;;) {
_cleanup_free_ char *pcr = NULL;
unsigned n;
@ -2004,19 +2352,20 @@ int tpm2_parse_pcrs(const char *s, uint32_t *ret) {
if (r == 0)
break;
if (r < 0)
return log_error_errno(r, "Failed to parse PCR list: %s", s);
return log_error_errno(r, "Failed to parse PCR list: %s", arg);
r = safe_atou(pcr, &n);
if (r < 0)
return log_error_errno(r, "Failed to parse PCR number: %s", pcr);
if (n >= TPM2_PCRS_MAX)
return log_error_errno(SYNTHETIC_ERRNO(ERANGE),
"PCR number out of range (valid range 0…23): %u", n);
"PCR number out of range (valid range 0…%u): %u",
TPM2_PCRS_MAX - 1, n);
mask |= UINT32_C(1) << n;
SET_BIT(mask, n);;
}
*ret = mask;
*ret_mask = mask;
return 0;
}
@ -2381,7 +2730,7 @@ int tpm2_parse_pcr_argument(const char *arg, uint32_t *mask) {
return 0;
}
r = tpm2_parse_pcrs(arg, &m);
r = tpm2_pcr_mask_from_string(arg, &m);
if (r < 0)
return r;
@ -2437,25 +2786,6 @@ int tpm2_load_pcr_public_key(const char *path, void **ret_pubkey, size_t *ret_pu
return 0;
}
int pcr_mask_to_string(uint32_t mask, char **ret) {
_cleanup_free_ char *buf = NULL;
int r;
assert(ret);
for (unsigned i = 0; i < TPM2_PCRS_MAX; i++) {
if (!(mask & (UINT32_C(1) << i)))
continue;
r = strextendf_with_separator(&buf, "+", "%u", i);
if (r < 0)
return r;
}
*ret = TAKE_PTR(buf);
return 0;
}
#define PBKDF2_HMAC_SHA256_ITERATIONS 10000
/*

View file

@ -3,6 +3,7 @@
#include <stdbool.h>
#include "bitfield.h"
#include "json.h"
#include "macro.h"
#include "sha256.h"
@ -11,6 +12,20 @@ typedef enum TPM2Flags {
TPM2_FLAGS_USE_PIN = 1 << 0,
} TPM2Flags;
/* As per https://trustedcomputinggroup.org/wp-content/uploads/TCG_PCClient_PFP_r1p05_v23_pub.pdf a
* TPM2 on a Client PC must have at least 24 PCRs. This hardcodes our expectation of 24. */
#define TPM2_PCRS_MAX 24U
#define TPM2_PCRS_MASK ((UINT32_C(1) << TPM2_PCRS_MAX) - 1)
static inline bool TPM2_PCR_VALID(unsigned pcr) {
return pcr < TPM2_PCRS_MAX;
}
static inline bool TPM2_PCR_MASK_VALID(uint32_t pcr_mask) {
return pcr_mask <= TPM2_PCRS_MASK;
}
#define FOREACH_PCR_IN_MASK(pcr, mask) BIT_FOREACH(pcr, mask)
#if HAVE_TPM2
#include <tss2/tss2_esys.h>
@ -80,8 +95,6 @@ Tpm2Handle *tpm2_handle_free(Tpm2Handle *handle);
DEFINE_TRIVIAL_CLEANUP_FUNC(Tpm2Handle*, tpm2_handle_free);
#define _cleanup_tpm2_handle_ _cleanup_(tpm2_handle_freep)
void tpm2_pcr_mask_to_selection(uint32_t mask, uint16_t bank, TPML_PCR_SELECTION *ret);
static inline void Esys_Freep(void *p) {
if (*(void**) p)
sym_Esys_Free(*(void**) p);
@ -92,6 +105,25 @@ int tpm2_get_good_pcr_banks_strv(Tpm2Context *c, uint32_t pcr_mask, char ***ret)
int tpm2_extend_bytes(Tpm2Context *c, char **banks, unsigned pcr_index, const void *data, size_t data_size, const void *secret, size_t secret_size);
void tpm2_tpms_pcr_selection_to_mask(const TPMS_PCR_SELECTION *s, uint32_t *ret);
void tpm2_tpms_pcr_selection_from_mask(uint32_t mask, TPMI_ALG_HASH hash, TPMS_PCR_SELECTION *ret);
void tpm2_tpms_pcr_selection_add(TPMS_PCR_SELECTION *a, const TPMS_PCR_SELECTION *b);
void tpm2_tpms_pcr_selection_sub(TPMS_PCR_SELECTION *a, const TPMS_PCR_SELECTION *b);
void tpm2_tpms_pcr_selection_move(TPMS_PCR_SELECTION *a, TPMS_PCR_SELECTION *b);
char *tpm2_tpms_pcr_selection_to_string(const TPMS_PCR_SELECTION *s);
size_t tpm2_tpms_pcr_selection_weight(const TPMS_PCR_SELECTION *s);
#define tpm2_tpms_pcr_selection_is_empty(s) (tpm2_tpms_pcr_selection_weight(s) == 0)
int tpm2_tpml_pcr_selection_to_mask(const TPML_PCR_SELECTION *l, TPMI_ALG_HASH hash, uint32_t *ret);
void tpm2_tpml_pcr_selection_from_mask(uint32_t mask, TPMI_ALG_HASH hash, TPML_PCR_SELECTION *ret);
void tpm2_tpml_pcr_selection_add_tpms_pcr_selection(TPML_PCR_SELECTION *l, const TPMS_PCR_SELECTION *s);
void tpm2_tpml_pcr_selection_sub_tpms_pcr_selection(TPML_PCR_SELECTION *l, const TPMS_PCR_SELECTION *s);
void tpm2_tpml_pcr_selection_add(TPML_PCR_SELECTION *a, const TPML_PCR_SELECTION *b);
void tpm2_tpml_pcr_selection_sub(TPML_PCR_SELECTION *a, const TPML_PCR_SELECTION *b);
char *tpm2_tpml_pcr_selection_to_string(const TPML_PCR_SELECTION *l);
size_t tpm2_tpml_pcr_selection_weight(const TPML_PCR_SELECTION *l);
#define tpm2_tpml_pcr_selection_is_empty(l) (tpm2_tpml_pcr_selection_weight(l) == 0)
#else /* HAVE_TPM2 */
typedef struct {} Tpm2Context;
typedef struct {} Tpm2Handle;
@ -100,20 +132,12 @@ typedef struct {} Tpm2Handle;
int tpm2_list_devices(void);
int tpm2_find_device_auto(int log_level, char **ret);
int tpm2_parse_pcrs(const char *s, uint32_t *ret);
int tpm2_make_pcr_json_array(uint32_t pcr_mask, JsonVariant **ret);
int tpm2_parse_pcr_json_array(JsonVariant *v, uint32_t *ret);
int tpm2_make_luks2_json(int keyslot, uint32_t hash_pcr_mask, uint16_t pcr_bank, const void *pubkey, size_t pubkey_size, uint32_t pubkey_pcr_mask, uint16_t primary_alg, const void *blob, size_t blob_size, const void *policy_hash, size_t policy_hash_size, const void *salt, size_t salt_size, TPM2Flags flags, JsonVariant **ret);
int tpm2_parse_luks2_json(JsonVariant *v, int *ret_keyslot, uint32_t *ret_hash_pcr_mask, uint16_t *ret_pcr_bank, void **ret_pubkey, size_t *ret_pubkey_size, uint32_t *ret_pubkey_pcr_mask, uint16_t *ret_primary_alg, void **ret_blob, size_t *ret_blob_size, void **ret_policy_hash, size_t *ret_policy_hash_size, void **ret_salt, size_t *ret_salt_size, TPM2Flags *ret_flags);
#define TPM2_PCRS_MAX 24U
static inline bool TPM2_PCR_MASK_VALID(uint64_t pcr_mask) {
return pcr_mask < (UINT64_C(1) << TPM2_PCRS_MAX); /* Support 24 PCR banks */
}
/* Default to PCR 7 only */
#define TPM2_PCR_MASK_DEFAULT (UINT32_C(1) << 7)
@ -149,6 +173,9 @@ int tpm2_hash_alg_from_string(const char *alg);
const char *tpm2_asym_alg_to_string(uint16_t alg);
int tpm2_asym_alg_from_string(const char *alg);
char *tpm2_pcr_mask_to_string(uint32_t mask);
int tpm2_pcr_mask_from_string(const char *arg, uint32_t *mask);
typedef struct {
uint32_t search_pcr_mask;
const char *device;
@ -173,8 +200,6 @@ int tpm2_parse_pcr_argument(const char *arg, uint32_t *mask);
int tpm2_load_pcr_signature(const char *path, JsonVariant **ret);
int tpm2_load_pcr_public_key(const char *path, void **ret_pubkey, size_t *ret_pubkey_size);
int pcr_mask_to_string(uint32_t mask, char **ret);
int tpm2_util_pbkdf2_hmac_sha256(const void *pass,
size_t passlen,
const void *salt,

View file

@ -44,6 +44,7 @@ simple_tests += files(
'test-architecture.c',
'test-argv-util.c',
'test-barrier.c',
'test-bitfield.c',
'test-bitmap.c',
'test-blockdev-util.c',
'test-bootspec.c',

227
src/test/test-bitfield.c Normal file
View file

@ -0,0 +1,227 @@
/* SPDX-License-Identifier: LGPL-2.1-or-later */
#include <stddef.h>
#include "bitfield.h"
#include "log.h"
#include "tests.h"
#define TEST_BITS(bits, v, ...) \
({ \
assert_se((!!BITS_SET(bits, ##__VA_ARGS__)) == v); \
assert_se((!!BITS_SET(~(bits), ##__VA_ARGS__)) == !v); \
})
#define TEST_BIT(bits, v, i) \
({ \
assert_se((!!BIT_SET(bits, i)) == v); \
assert_se((!!BIT_SET(~(bits), i)) == !v); \
TEST_BITS(bits, v, i); \
})
#define TEST_BIT_SET(bits, i) TEST_BIT(bits, 1, i)
#define TEST_BIT_CLEAR(bits, i) TEST_BIT(bits, 0, i)
#define TEST_BITS_SET(bits, ...) TEST_BITS(bits, 1, ##__VA_ARGS__)
#define TEST_BITS_CLEAR(bits, ...) TEST_BITS(bits, 0, ##__VA_ARGS__)
TEST(bits) {
int count;
/* Test uint8_t */
TEST_BIT_SET(0x81, 0);
TEST_BIT_SET(0x81, 7);
TEST_BITS_SET(0x81, 0, 7);
TEST_BIT_CLEAR(0x81, 4);
TEST_BIT_CLEAR(0x81, 6);
TEST_BITS_CLEAR(0x81, 1, 2, 3, 4, 5, 6);
uint8_t expected8 = 0;
BIT_FOREACH(i, 0x81)
expected8 |= UINT8_C(1) << i;
assert_se(expected8 == 0x81);
uint8_t u8 = 0x91;
TEST_BIT_SET(u8, 4);
TEST_BITS_SET(u8, 0, 4, 7);
TEST_BIT_CLEAR(u8, 2);
TEST_BITS_CLEAR(u8, 1, 2, 3, 5, 6);
SET_BIT(u8, 1);
TEST_BITS_SET(u8, 0, 1, 4, 7);
TEST_BITS_CLEAR(u8, 2, 3, 5, 6);
SET_BITS(u8, 3, 5);
TEST_BITS_SET(u8, 0, 1, 3, 4, 5, 7);
TEST_BITS_CLEAR(u8, 2, 6);
CLEAR_BIT(u8, 4);
TEST_BITS_SET(u8, 0, 1, 3, 5, 7);
TEST_BITS_CLEAR(u8, 2, 4, 6);
CLEAR_BITS(u8, 1);
CLEAR_BITS(u8, 0, 7);
TEST_BITS_SET(u8, 3, 5);
TEST_BITS_CLEAR(u8, 0, 1, 2, 4, 6, 7);
expected8 = 0;
BIT_FOREACH(i, u8)
expected8 |= UINT8_C(1) << i;
assert_se(expected8 == u8);
u8 = 0;
TEST_BITS_CLEAR(u8, 0, 1, 2, 3, 4, 5, 6, 7);
BIT_FOREACH(i, u8)
assert_se(0);
u8 = ~u8;
TEST_BITS_SET(u8, 0, 1, 2, 3, 4, 5, 6, 7);
count = 0;
BIT_FOREACH(i, u8)
count++;
assert_se(count == 8);
uint8_t _u8 = u8;
SET_BITS(u8);
assert_se(_u8 == u8);
CLEAR_BITS(u8);
assert_se(_u8 == u8);
/* Test uint16_t */
TEST_BIT_SET(0x1f81, 10);
TEST_BITS_SET(0x1f81, 0, 7, 8, 9, 10, 11, 12);
TEST_BIT_CLEAR(0x1f81, 13);
TEST_BITS_CLEAR(0x1f81, 1, 2, 3, 4, 5, 6, 13, 14, 15);
uint16_t expected16 = 0;
BIT_FOREACH(i, 0x1f81)
expected16 |= UINT16_C(1) << i;
assert_se(expected16 == 0x1f81);
uint16_t u16 = 0xf060;
TEST_BIT_SET(u16, 12);
TEST_BITS_SET(u16, 5, 6, 12, 13, 14, 15);
TEST_BIT_CLEAR(u16, 9);
TEST_BITS_CLEAR(u16, 0, 1, 2, 3, 4, 7, 8, 9, 10, 11);
SET_BITS(u16, 1, 8);
TEST_BITS_SET(u16, 1, 5, 6, 8, 12, 13, 14, 15);
TEST_BITS_CLEAR(u16, 0, 2, 3, 4, 7, 9, 10, 11);
CLEAR_BITS(u16, 13, 14);
TEST_BITS_SET(u16, 1, 5, 6, 8, 12, 15);
TEST_BITS_CLEAR(u16, 0, 2, 3, 4, 7, 9, 10, 11, 13, 14);
expected16 = 0;
BIT_FOREACH(i, u16)
expected16 |= UINT16_C(1) << i;
assert_se(expected16 == u16);
u16 = 0;
TEST_BITS_CLEAR(u16, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15);
BIT_FOREACH(i, u16)
assert_se(0);
u16 = ~u16;
TEST_BITS_SET(u16, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15);
count = 0;
BIT_FOREACH(i, u16)
count++;
assert_se(count == 16);
uint16_t _u16 = u16;
SET_BITS(u16);
assert_se(_u16 == u16);
CLEAR_BITS(u16);
assert_se(_u16 == u16);
/* Test uint32_t */
TEST_BIT_SET(0x80224f10, 11);
TEST_BITS_SET(0x80224f10, 4, 8, 9, 10, 11, 14, 17, 21, 31);
TEST_BIT_CLEAR(0x80224f10, 28);
TEST_BITS_CLEAR(0x80224f10, 0, 1, 2, 3, 5, 6, 7, 12, 13, 15, 16, 18, 19, 20, 22, 23, 24, 25, 26, 27, 28, 29, 30);
uint32_t expected32 = 0;
BIT_FOREACH(i, 0x80224f10)
expected32 |= UINT32_C(1) << i;
assert_se(expected32 == 0x80224f10);
uint32_t u32 = 0x605e0388;
TEST_BIT_SET(u32, 3);
TEST_BIT_SET(u32, 30);
TEST_BITS_SET(u32, 3, 7, 8, 9, 17, 18, 19, 20, 22, 29, 30);
TEST_BIT_CLEAR(u32, 0);
TEST_BIT_CLEAR(u32, 31);
TEST_BITS_CLEAR(u32, 0, 1, 2, 4, 5, 6, 10, 11, 12, 13, 14, 15, 16, 21, 23, 24, 25, 26, 27, 28, 31);
SET_BITS(u32, 1, 25, 26);
TEST_BITS_SET(u32, 1, 3, 7, 8, 9, 17, 18, 19, 20, 22, 25, 26, 29, 30);
TEST_BITS_CLEAR(u32, 0, 2, 4, 5, 6, 10, 11, 12, 13, 14, 15, 16, 21, 23, 24, 27, 28, 31);
CLEAR_BITS(u32, 29, 17, 1);
TEST_BITS_SET(u32, 3, 7, 8, 9, 18, 19, 20, 22, 25, 26, 30);
TEST_BITS_CLEAR(u32, 0, 1, 2, 4, 5, 6, 10, 11, 12, 13, 14, 15, 16, 17, 21, 23, 24, 27, 28, 29, 31);
expected32 = 0;
BIT_FOREACH(i, u32)
expected32 |= UINT32_C(1) << i;
assert_se(expected32 == u32);
u32 = 0;
TEST_BITS_CLEAR(u32, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31);
BIT_FOREACH(i, u32)
assert_se(0);
u32 = ~u32;
TEST_BITS_SET(u32, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31);
count = 0;
BIT_FOREACH(i, u32)
count++;
assert_se(count == 32);
uint32_t _u32 = u32;
SET_BITS(u32);
assert_se(_u32 == u32);
CLEAR_BITS(u32);
assert_se(_u32 == u32);
/* Test uint64_t */
TEST_BIT_SET(0x18ba1400f4857460, 60);
TEST_BITS_SET(0x18ba1400f4857460, 5, 6, 10, 12, 13, 14, 16, 18, 23, 26, 28, 29, 30, 31, 42, 44, 49, 51, 52, 53, 55, 59, 60);
TEST_BIT_CLEAR(UINT64_C(0x18ba1400f4857460), 0);
TEST_BIT_CLEAR(UINT64_C(0x18ba1400f4857460), 63);
TEST_BITS_CLEAR(UINT64_C(0x18ba1400f4857460), 0, 1, 2, 3, 4, 7, 8, 9, 11, 15, 17, 19, 20, 21, 22, 24, 25, 27, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 43, 45, 46, 47, 48, 50, 54, 56, 57, 58, 61, 62, 63);
uint64_t expected64 = 0;
BIT_FOREACH(i, 0x18ba1400f4857460)
expected64 |= UINT64_C(1) << i;
assert_se(expected64 == 0x18ba1400f4857460);
uint64_t u64 = 0xa90e2d8507a65739;
TEST_BIT_SET(u64, 0);
TEST_BIT_SET(u64, 63);
TEST_BITS_SET(u64, 0, 3, 4, 5, 8, 9, 10, 12, 14, 17, 18, 21, 23, 24, 25, 26, 32, 34, 39, 40, 42, 43, 45, 49, 50, 51, 56, 59, 61, 63);
TEST_BIT_CLEAR(u64, 1);
TEST_BITS_CLEAR(u64, 1, 2, 6, 7, 11, 13, 15, 16, 19, 20, 22, 27, 28, 29, 30, 31, 33, 35, 36, 37, 38, 41, 44, 46, 47, 48, 52, 53, 54, 55, 57, 58, 60, 62);
SET_BIT(u64, 1);
TEST_BITS_SET(u64, 0, 1, 3, 4, 5, 8, 9, 10, 12, 14, 17, 18, 21, 23, 24, 25, 26, 32, 34, 39, 40, 42, 43, 45, 49, 50, 51, 56, 59, 61, 63);
TEST_BITS_CLEAR(u64, 2, 6, 7, 11, 13, 15, 16, 19, 20, 22, 27, 28, 29, 30, 31, 33, 35, 36, 37, 38, 41, 44, 46, 47, 48, 52, 53, 54, 55, 57, 58, 60, 62);
CLEAR_BIT(u64, 63);
TEST_BITS_SET(u64, 0, 1, 3, 4, 5, 8, 9, 10, 12, 14, 17, 18, 21, 23, 24, 25, 26, 32, 34, 39, 40, 42, 43, 45, 49, 50, 51, 56, 59, 61);
TEST_BITS_CLEAR(u64, 2, 6, 7, 11, 13, 15, 16, 19, 20, 22, 27, 28, 29, 30, 31, 33, 35, 36, 37, 38, 41, 44, 46, 47, 48, 52, 53, 54, 55, 57, 58, 60, 62, 63);
SET_BIT(u64, 62);
TEST_BITS_SET(u64, 0, 1, 3, 4, 5, 8, 9, 10, 12, 14, 17, 18, 21, 23, 24, 25, 26, 32, 34, 39, 40, 42, 43, 45, 49, 50, 51, 56, 59, 61, 62);
TEST_BITS_CLEAR(u64, 2, 6, 7, 11, 13, 15, 16, 19, 20, 22, 27, 28, 29, 30, 31, 33, 35, 36, 37, 38, 41, 44, 46, 47, 48, 52, 53, 54, 55, 57, 58, 60, 63);
SET_BITS(u64, 63, 62, 7, 13, 38, 40);
TEST_BITS_SET(u64, 0, 1, 3, 4, 5, 7, 8, 9, 10, 12, 13, 14, 17, 18, 21, 23, 24, 25, 26, 32, 34, 38, 39, 40, 42, 43, 45, 49, 50, 51, 56, 59, 61, 62, 63);
TEST_BITS_CLEAR(u64, 2, 6, 11, 15, 16, 19, 20, 22, 27, 28, 29, 30, 31, 33, 35, 36, 37, 41, 44, 46, 47, 48, 52, 53, 54, 55, 57, 58, 60);
CLEAR_BIT(u64, 32);
TEST_BITS_SET(u64, 0, 1, 3, 4, 5, 7, 8, 9, 10, 12, 13, 14, 17, 18, 21, 23, 24, 25, 26, 34, 38, 39, 40, 42, 43, 45, 49, 50, 51, 56, 59, 61, 62, 63);
TEST_BITS_CLEAR(u64, 2, 6, 11, 15, 16, 19, 20, 22, 27, 28, 29, 30, 31, 32, 33, 35, 36, 37, 41, 44, 46, 47, 48, 52, 53, 54, 55, 57, 58, 60);
CLEAR_BITS(u64, 0, 2, 11, 63, 32, 58);
TEST_BITS_SET(u64, 1, 3, 4, 5, 7, 8, 9, 10, 12, 13, 14, 17, 18, 21, 23, 24, 25, 26, 34, 38, 39, 40, 42, 43, 45, 49, 50, 51, 56, 59, 61, 62);
TEST_BITS_CLEAR(u64, 0, 2, 6, 11, 15, 16, 19, 20, 22, 27, 28, 29, 30, 31, 32, 33, 35, 36, 37, 41, 44, 46, 47, 48, 52, 53, 54, 55, 57, 58, 60, 63);
expected64 = 0;
BIT_FOREACH(i, u64)
expected64 |= UINT64_C(1) << i;
assert_se(expected64 == u64);
u64 = 0;
TEST_BITS_CLEAR(u64, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63);
BIT_FOREACH(i, u64)
assert_se(0);
u64 = ~u64;
TEST_BITS_SET(u64, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63);
count = 0;
BIT_FOREACH(i, u64)
count++;
assert_se(count == 64);
uint64_t _u64 = u64;
SET_BITS(u64);
assert_se(_u64 == u64);
CLEAR_BITS(u64);
assert_se(_u64 == u64);
/* Verify these use cases are constant-folded. */
assert_cc(__builtin_constant_p(INDEX_TO_MASK(uint8_t, 1)));
assert_cc(__builtin_constant_p(INDEX_TO_MASK(uint16_t, 1)));
assert_cc(__builtin_constant_p(INDEX_TO_MASK(uint32_t, 1)));
assert_cc(__builtin_constant_p(INDEX_TO_MASK(uint64_t, 1)));
assert_cc(__builtin_constant_p(BIT_SET((uint8_t)2, 1)));
assert_cc(__builtin_constant_p(BIT_SET((uint16_t)2, 1)));
assert_cc(__builtin_constant_p(BIT_SET((uint32_t)2, 1)));
assert_cc(__builtin_constant_p(BIT_SET((uint64_t)2, 1)));
}
DEFINE_TEST_MAIN(LOG_INFO);

View file

@ -300,6 +300,190 @@ TEST(foreach_pointer) {
assert_se(k == 11);
}
TEST(foreach_va_args) {
size_t i;
i = 0;
uint8_t u8, u8_1 = 1, u8_2 = 2, u8_3 = 3;
VA_ARGS_FOREACH(u8, u8_2, 8, 0xff, u8_1, u8_3, 0, 1) {
switch(i++) {
case 0: assert_se(u8 == u8_2); break;
case 1: assert_se(u8 == 8); break;
case 2: assert_se(u8 == 0xff); break;
case 3: assert_se(u8 == u8_1); break;
case 4: assert_se(u8 == u8_3); break;
case 5: assert_se(u8 == 0); break;
case 6: assert_se(u8 == 1); break;
default: assert_se(false);
}
}
assert_se(i == 7);
i = 0;
VA_ARGS_FOREACH(u8, 0) {
assert_se(u8 == 0);
assert_se(i++ == 0);
}
assert_se(i == 1);
i = 0;
VA_ARGS_FOREACH(u8, 0xff) {
assert_se(u8 == 0xff);
assert_se(i++ == 0);
}
assert_se(i == 1);
VA_ARGS_FOREACH(u8)
assert_se(false);
i = 0;
uint32_t u32, u32_1 = 0xffff0000, u32_2 = 10, u32_3 = 0xffff;
VA_ARGS_FOREACH(u32, 1, 100, u32_2, 1000, u32_3, u32_1, 1, 0) {
switch(i++) {
case 0: assert_se(u32 == 1); break;
case 1: assert_se(u32 == 100); break;
case 2: assert_se(u32 == u32_2); break;
case 3: assert_se(u32 == 1000); break;
case 4: assert_se(u32 == u32_3); break;
case 5: assert_se(u32 == u32_1); break;
case 6: assert_se(u32 == 1); break;
case 7: assert_se(u32 == 0); break;
default: assert_se(false);
}
}
assert_se(i == 8);
i = 0;
VA_ARGS_FOREACH(u32, 0) {
assert_se(u32 == 0);
assert_se(i++ == 0);
}
assert_se(i == 1);
i = 0;
VA_ARGS_FOREACH(u32, 1000) {
assert_se(u32 == 1000);
assert_se(i++ == 0);
}
assert_se(i == 1);
VA_ARGS_FOREACH(u32)
assert_se(false);
i = 0;
uint64_t u64, u64_1 = 0xffffffffffffffff, u64_2 = 50, u64_3 = 0xffff;
VA_ARGS_FOREACH(u64, 44, 0, u64_3, 100, u64_2, u64_1, 50000) {
switch(i++) {
case 0: assert_se(u64 == 44); break;
case 1: assert_se(u64 == 0); break;
case 2: assert_se(u64 == u64_3); break;
case 3: assert_se(u64 == 100); break;
case 4: assert_se(u64 == u64_2); break;
case 5: assert_se(u64 == u64_1); break;
case 6: assert_se(u64 == 50000); break;
default: assert_se(false);
}
}
assert_se(i == 7);
i = 0;
VA_ARGS_FOREACH(u64, 0) {
assert_se(u64 == 0);
assert_se(i++ == 0);
}
assert_se(i == 1);
i = 0;
VA_ARGS_FOREACH(u64, 0xff00ff00000000) {
assert_se(u64 == 0xff00ff00000000);
assert_se(i++ == 0);
}
assert_se(i == 1);
VA_ARGS_FOREACH(u64)
assert_se(false);
struct test {
int a;
char b;
};
i = 0;
struct test s,
s_1 = { .a = 0, .b = 'c', },
s_2 = { .a = 100000, .b = 'z', },
s_3 = { .a = 0xff, .b = 'q', },
s_4 = { .a = 1, .b = 'x', };
VA_ARGS_FOREACH(s, s_1, (struct test){ .a = 10, .b = 'd', }, s_2, (struct test){}, s_3, s_4) {
switch(i++) {
case 0: assert_se(s.a == 0 ); assert_se(s.b == 'c'); break;
case 1: assert_se(s.a == 10 ); assert_se(s.b == 'd'); break;
case 2: assert_se(s.a == 100000); assert_se(s.b == 'z'); break;
case 3: assert_se(s.a == 0 ); assert_se(s.b == 0 ); break;
case 4: assert_se(s.a == 0xff ); assert_se(s.b == 'q'); break;
case 5: assert_se(s.a == 1 ); assert_se(s.b == 'x'); break;
default: assert_se(false);
}
}
assert_se(i == 6);
i = 0;
VA_ARGS_FOREACH(s, (struct test){ .a = 1, .b = 'A', }) {
assert_se(s.a == 1);
assert_se(s.b == 'A');
assert_se(i++ == 0);
}
assert_se(i == 1);
VA_ARGS_FOREACH(s)
assert_se(false);
i = 0;
struct test *p, *p_1 = &s_1, *p_2 = &s_2, *p_3 = &s_3, *p_4 = &s_4;
VA_ARGS_FOREACH(p, p_1, NULL, p_2, p_3, NULL, p_4, NULL) {
switch(i++) {
case 0: assert_se(p == p_1); break;
case 1: assert_se(p == NULL); break;
case 2: assert_se(p == p_2); break;
case 3: assert_se(p == p_3); break;
case 4: assert_se(p == NULL); break;
case 5: assert_se(p == p_4); break;
case 6: assert_se(p == NULL); break;
default: assert_se(false);
}
}
assert_se(i == 7);
i = 0;
VA_ARGS_FOREACH(p, p_3) {
assert_se(p == p_3);
assert_se(i++ == 0);
}
assert_se(i == 1);
VA_ARGS_FOREACH(p)
assert_se(false);
i = 0;
void *v, *v_1 = p_1, *v_2 = p_2, *v_3 = p_3;
uint32_t *u32p = &u32;
VA_ARGS_FOREACH(v, v_1, NULL, u32p, v_3, p_2, p_4, v_2, NULL) {
switch(i++) {
case 0: assert_se(v == v_1); break;
case 1: assert_se(v == NULL); break;
case 2: assert_se(v == u32p); break;
case 3: assert_se(v == v_3); break;
case 4: assert_se(v == p_2); break;
case 5: assert_se(v == p_4); break;
case 6: assert_se(v == v_2); break;
case 7: assert_se(v == NULL); break;
default: assert_se(false);
}
}
assert_se(i == 8);
i = 0;
VA_ARGS_FOREACH(v, NULL) {
assert_se(v == NULL);
assert_se(i++ == 0);
}
assert_se(i == 1);
i = 0;
VA_ARGS_FOREACH(v, v_1) {
assert_se(v == v_1);
assert_se(i++ == 0);
}
assert_se(i == 1);
VA_ARGS_FOREACH(v)
assert_se(false);
}
TEST(align_to) {
assert_se(ALIGN_TO(0, 1) == 0);
assert_se(ALIGN_TO(1, 1) == 1);

View file

@ -3,29 +3,29 @@
#include "tpm2-util.h"
#include "tests.h"
static void test_tpm2_parse_pcrs_one(const char *s, uint32_t mask, int ret) {
static void test_tpm2_pcr_mask_from_string_one(const char *s, uint32_t mask, int ret) {
uint32_t m;
assert_se(tpm2_parse_pcrs(s, &m) == ret);
assert_se(tpm2_pcr_mask_from_string(s, &m) == ret);
if (ret >= 0)
assert_se(m == mask);
}
TEST(tpm2_parse_pcrs) {
test_tpm2_parse_pcrs_one("", 0, 0);
test_tpm2_parse_pcrs_one("0", 1, 0);
test_tpm2_parse_pcrs_one("1", 2, 0);
test_tpm2_parse_pcrs_one("0,1", 3, 0);
test_tpm2_parse_pcrs_one("0+1", 3, 0);
test_tpm2_parse_pcrs_one("0-1", 0, -EINVAL);
test_tpm2_parse_pcrs_one("0,1,2", 7, 0);
test_tpm2_parse_pcrs_one("0+1+2", 7, 0);
test_tpm2_parse_pcrs_one("0+1,2", 7, 0);
test_tpm2_parse_pcrs_one("0,1+2", 7, 0);
test_tpm2_parse_pcrs_one("0,2", 5, 0);
test_tpm2_parse_pcrs_one("0+2", 5, 0);
test_tpm2_parse_pcrs_one("foo", 0, -EINVAL);
TEST(tpm2_mask_from_string) {
test_tpm2_pcr_mask_from_string_one("", 0, 0);
test_tpm2_pcr_mask_from_string_one("0", 1, 0);
test_tpm2_pcr_mask_from_string_one("1", 2, 0);
test_tpm2_pcr_mask_from_string_one("0,1", 3, 0);
test_tpm2_pcr_mask_from_string_one("0+1", 3, 0);
test_tpm2_pcr_mask_from_string_one("0-1", 0, -EINVAL);
test_tpm2_pcr_mask_from_string_one("0,1,2", 7, 0);
test_tpm2_pcr_mask_from_string_one("0+1+2", 7, 0);
test_tpm2_pcr_mask_from_string_one("0+1,2", 7, 0);
test_tpm2_pcr_mask_from_string_one("0,1+2", 7, 0);
test_tpm2_pcr_mask_from_string_one("0,2", 5, 0);
test_tpm2_pcr_mask_from_string_one("0+2", 5, 0);
test_tpm2_pcr_mask_from_string_one("foo", 0, -EINVAL);
}
TEST(tpm2_util_pbkdf2_hmac_sha256) {
@ -69,4 +69,346 @@ TEST(tpm2_util_pbkdf2_hmac_sha256) {
}
}
#if HAVE_TPM2
#define POISON(type) \
({ \
type _p; \
memset(&_p, 0xaa, sizeof(_p)); \
_p; \
})
#define POISON_TPML POISON(TPML_PCR_SELECTION)
#define POISON_TPMS POISON(TPMS_PCR_SELECTION)
#define POISON_U32 POISON(uint32_t)
static void assert_tpms_pcr_selection_eq(TPMS_PCR_SELECTION *a, TPMS_PCR_SELECTION *b) {
assert_se(a);
assert_se(b);
assert_se(a->hash == b->hash);
assert_se(a->sizeofSelect == b->sizeofSelect);
for (size_t i = 0; i < a->sizeofSelect; i++)
assert_se(a->pcrSelect[i] == b->pcrSelect[i]);
}
static void assert_tpml_pcr_selection_eq(TPML_PCR_SELECTION *a, TPML_PCR_SELECTION *b) {
assert_se(a);
assert_se(b);
assert_se(a->count == b->count);
for (size_t i = 0; i < a->count; i++)
assert_tpms_pcr_selection_eq(&a->pcrSelections[i], &b->pcrSelections[i]);
}
static void verify_tpms_pcr_selection(TPMS_PCR_SELECTION *s, uint32_t mask, TPMI_ALG_HASH hash) {
assert_se(s->hash == hash);
assert_se(s->sizeofSelect == 3);
assert_se(s->pcrSelect[0] == (mask & 0xff));
assert_se(s->pcrSelect[1] == ((mask >> 8) & 0xff));
assert_se(s->pcrSelect[2] == ((mask >> 16) & 0xff));
assert_se(s->pcrSelect[3] == 0);
uint32_t m = POISON_U32;
tpm2_tpms_pcr_selection_to_mask(s, &m);
assert_se(m == mask);
}
static void verify_tpml_pcr_selection(TPML_PCR_SELECTION *l, TPMS_PCR_SELECTION s[], size_t count) {
assert_se(l->count == count);
for (size_t i = 0; i < count; i++) {
assert_tpms_pcr_selection_eq(&s[i], &l->pcrSelections[i]);
uint32_t mask = POISON_U32;
TPMI_ALG_HASH hash = l->pcrSelections[i].hash;
assert_se(tpm2_tpml_pcr_selection_to_mask(l, hash, &mask) == 0);
verify_tpms_pcr_selection(&l->pcrSelections[i], mask, hash);
}
}
static void _test_pcr_selection_mask_hash(uint32_t mask, TPMI_ALG_HASH hash) {
TPMS_PCR_SELECTION s = POISON_TPMS;
tpm2_tpms_pcr_selection_from_mask(mask, hash, &s);
verify_tpms_pcr_selection(&s, mask, hash);
TPML_PCR_SELECTION l = POISON_TPML;
tpm2_tpml_pcr_selection_from_mask(mask, hash, &l);
verify_tpml_pcr_selection(&l, &s, 1);
verify_tpms_pcr_selection(&l.pcrSelections[0], mask, hash);
uint32_t test_masks[] = {
0x0, 0x1, 0x100, 0x10000, 0xf0f0f0, 0xaaaaaa, 0xffffff,
};
for (unsigned i = 0; i < ELEMENTSOF(test_masks); i++) {
uint32_t test_mask = test_masks[i];
TPMS_PCR_SELECTION a = POISON_TPMS, b = POISON_TPMS, test_s = POISON_TPMS;
tpm2_tpms_pcr_selection_from_mask(test_mask, hash, &test_s);
a = s;
b = test_s;
tpm2_tpms_pcr_selection_add(&a, &b);
verify_tpms_pcr_selection(&a, UPDATE_FLAG(mask, test_mask, true), hash);
verify_tpms_pcr_selection(&b, test_mask, hash);
a = s;
b = test_s;
tpm2_tpms_pcr_selection_sub(&a, &b);
verify_tpms_pcr_selection(&a, UPDATE_FLAG(mask, test_mask, false), hash);
verify_tpms_pcr_selection(&b, test_mask, hash);
a = s;
b = test_s;
tpm2_tpms_pcr_selection_move(&a, &b);
verify_tpms_pcr_selection(&a, UPDATE_FLAG(mask, test_mask, true), hash);
verify_tpms_pcr_selection(&b, 0, hash);
}
}
TEST(tpms_pcr_selection_mask_and_hash) {
TPMI_ALG_HASH HASH_ALGS[] = { TPM2_ALG_SHA1, TPM2_ALG_SHA256, };
for (unsigned i = 0; i < ELEMENTSOF(HASH_ALGS); i++)
for (uint32_t m2 = 0; m2 <= 0xffffff; m2 += 0x30000)
for (uint32_t m1 = 0; m1 <= 0xffff; m1 += 0x300)
for (uint32_t m0 = 0; m0 <= 0xff; m0 += 0x3)
_test_pcr_selection_mask_hash(m0 | m1 | m2, HASH_ALGS[i]);
}
static void _test_tpms_sw(
TPMI_ALG_HASH hash,
uint32_t mask,
const char *expected_str,
size_t expected_weight) {
TPMS_PCR_SELECTION s = POISON_TPMS;
tpm2_tpms_pcr_selection_from_mask(mask, hash, &s);
_cleanup_free_ char *tpms_str = tpm2_tpms_pcr_selection_to_string(&s);
assert_se(streq(tpms_str, expected_str));
assert_se(tpm2_tpms_pcr_selection_weight(&s) == expected_weight);
assert_se(tpm2_tpms_pcr_selection_is_empty(&s) == (expected_weight == 0));
}
TEST(tpms_pcr_selection_string_and_weight) {
TPMI_ALG_HASH sha1 = TPM2_ALG_SHA1, sha256 = TPM2_ALG_SHA256;
_test_tpms_sw(sha1, 0, "sha1()", 0);
_test_tpms_sw(sha1, 1, "sha1(0)", 1);
_test_tpms_sw(sha1, 0xf, "sha1(0+1+2+3)", 4);
_test_tpms_sw(sha1, 0x00ff00, "sha1(8+9+10+11+12+13+14+15)", 8);
_test_tpms_sw(sha1, 0xffffff, "sha1(0+1+2+3+4+5+6+7+8+9+10+11+12+13+14+15+16+17+18+19+20+21+22+23)", 24);
_test_tpms_sw(sha256, 0, "sha256()", 0);
_test_tpms_sw(sha256, 1, "sha256(0)", 1);
_test_tpms_sw(sha256, 7, "sha256(0+1+2)", 3);
_test_tpms_sw(sha256, 0xf00000, "sha256(20+21+22+23)", 4);
_test_tpms_sw(sha256, 0xffffff, "sha256(0+1+2+3+4+5+6+7+8+9+10+11+12+13+14+15+16+17+18+19+20+21+22+23)", 24);
}
static void _tpml_pcr_selection_add_tpms(TPMS_PCR_SELECTION s[], size_t count, TPML_PCR_SELECTION *ret) {
for (size_t i = 0; i < count; i++)
tpm2_tpml_pcr_selection_add_tpms_pcr_selection(ret, &s[i]);
}
static void _tpml_pcr_selection_sub_tpms(TPMS_PCR_SELECTION s[], size_t count, TPML_PCR_SELECTION *ret) {
for (size_t i = 0; i < count; i++)
tpm2_tpml_pcr_selection_sub_tpms_pcr_selection(ret, &s[i]);
}
static void _test_tpml_sw(
TPMS_PCR_SELECTION s[],
size_t count,
size_t expected_count,
const char *expected_str,
size_t expected_weight) {
TPML_PCR_SELECTION l = {};
_tpml_pcr_selection_add_tpms(s, count, &l);
assert_se(l.count == expected_count);
_cleanup_free_ char *tpml_str = tpm2_tpml_pcr_selection_to_string(&l);
assert_se(streq(tpml_str, expected_str));
assert_se(tpm2_tpml_pcr_selection_weight(&l) == expected_weight);
assert_se(tpm2_tpml_pcr_selection_is_empty(&l) == (expected_weight == 0));
}
TEST(tpml_pcr_selection_string_and_weight) {
size_t size = 0xaa;
TPMI_ALG_HASH sha1 = TPM2_ALG_SHA1,
sha256 = TPM2_ALG_SHA256,
sha384 = TPM2_ALG_SHA384,
sha512 = TPM2_ALG_SHA512;
TPMS_PCR_SELECTION s[4] = { POISON_TPMS, POISON_TPMS, POISON_TPMS, POISON_TPMS, };
size = 0;
tpm2_tpms_pcr_selection_from_mask(0x000002, sha1 , &s[size++]);
tpm2_tpms_pcr_selection_from_mask(0x0080f0, sha384, &s[size++]);
tpm2_tpms_pcr_selection_from_mask(0x010100, sha512, &s[size++]);
tpm2_tpms_pcr_selection_from_mask(0xff0000, sha256, &s[size++]);
_test_tpml_sw(s,
size,
/* expected_count= */ 4,
"[sha1(1),sha384(4+5+6+7+15),sha512(8+16),sha256(16+17+18+19+20+21+22+23)]",
/* expected_weight= */ 16);
size = 0;
tpm2_tpms_pcr_selection_from_mask(0x0403aa, sha512, &s[size++]);
tpm2_tpms_pcr_selection_from_mask(0x0080f0, sha256, &s[size++]);
_test_tpml_sw(s,
size,
/* expected_count= */ 2,
"[sha512(1+3+5+7+8+9+18),sha256(4+5+6+7+15)]",
/* expected_weight= */ 12);
size = 0;
/* Empty hashes should be ignored */
tpm2_tpms_pcr_selection_from_mask(0x0300ce, sha384, &s[size++]);
tpm2_tpms_pcr_selection_from_mask(0xffffff, sha512, &s[size++]);
tpm2_tpms_pcr_selection_from_mask(0x000000, sha1 , &s[size++]);
tpm2_tpms_pcr_selection_from_mask(0x330010, sha256, &s[size++]);
_test_tpml_sw(s,
size,
/* expected_count= */ 3,
"[sha384(1+2+3+6+7+16+17),sha512(0+1+2+3+4+5+6+7+8+9+10+11+12+13+14+15+16+17+18+19+20+21+22+23),sha256(4+16+17+20+21)]",
/* expected_weight= */ 36);
size = 0;
/* Verify same-hash entries are properly combined. */
tpm2_tpms_pcr_selection_from_mask(0x000001, sha1 , &s[size++]);
tpm2_tpms_pcr_selection_from_mask(0x000001, sha256, &s[size++]);
tpm2_tpms_pcr_selection_from_mask(0x000010, sha1 , &s[size++]);
tpm2_tpms_pcr_selection_from_mask(0x000010, sha256, &s[size++]);
_test_tpml_sw(s,
size,
/* expected_count= */ 2,
"[sha1(0+4),sha256(0+4)]",
/* expected_weight= */ 4);
}
/* Test tpml add/sub by changing the tpms individually */
static void _test_tpml_addsub_tpms(
TPML_PCR_SELECTION *start,
TPMS_PCR_SELECTION add[],
size_t add_count,
TPMS_PCR_SELECTION expected1[],
size_t expected1_count,
TPMS_PCR_SELECTION sub[],
size_t sub_count,
TPMS_PCR_SELECTION expected2[],
size_t expected2_count) {
TPML_PCR_SELECTION l = *start;
_tpml_pcr_selection_add_tpms(add, add_count, &l);
verify_tpml_pcr_selection(&l, expected1, expected1_count);
_tpml_pcr_selection_sub_tpms(sub, sub_count, &l);
verify_tpml_pcr_selection(&l, expected2, expected2_count);
}
/* Test tpml add/sub by creating new tpmls */
static void _test_tpml_addsub_tpml(
TPML_PCR_SELECTION *start,
TPMS_PCR_SELECTION add[],
size_t add_count,
TPMS_PCR_SELECTION expected1[],
size_t expected1_count,
TPMS_PCR_SELECTION sub[],
size_t sub_count,
TPMS_PCR_SELECTION expected2[],
size_t expected2_count) {
TPML_PCR_SELECTION l = {};
tpm2_tpml_pcr_selection_add(&l, start);
assert_tpml_pcr_selection_eq(&l, start);
TPML_PCR_SELECTION addl = {};
_tpml_pcr_selection_add_tpms(add, add_count, &addl);
tpm2_tpml_pcr_selection_add(&l, &addl);
TPML_PCR_SELECTION e1 = {};
_tpml_pcr_selection_add_tpms(expected1, expected1_count, &e1);
assert_tpml_pcr_selection_eq(&l, &e1);
TPML_PCR_SELECTION subl = {};
_tpml_pcr_selection_add_tpms(sub, sub_count, &subl);
tpm2_tpml_pcr_selection_sub(&l, &subl);
TPML_PCR_SELECTION e2 = {};
_tpml_pcr_selection_add_tpms(expected2, expected2_count, &e2);
assert_tpml_pcr_selection_eq(&l, &e2);
}
#define _test_tpml_addsub(...) \
({ \
_test_tpml_addsub_tpms(__VA_ARGS__); \
_test_tpml_addsub_tpml(__VA_ARGS__); \
})
TEST(tpml_pcr_selection_add_sub) {
size_t add_count = 0xaa, expected1_count = 0xaa, sub_count = 0xaa, expected2_count = 0xaa;
TPMI_ALG_HASH sha1 = TPM2_ALG_SHA1,
sha256 = TPM2_ALG_SHA256,
sha384 = TPM2_ALG_SHA384,
sha512 = TPM2_ALG_SHA512;
TPML_PCR_SELECTION l = POISON_TPML;
TPMS_PCR_SELECTION add[4] = { POISON_TPMS, POISON_TPMS, POISON_TPMS, POISON_TPMS, },
sub[4] = { POISON_TPMS, POISON_TPMS, POISON_TPMS, POISON_TPMS, },
expected1[4] = { POISON_TPMS, POISON_TPMS, POISON_TPMS, POISON_TPMS, },
expected2[4] = { POISON_TPMS, POISON_TPMS, POISON_TPMS, POISON_TPMS, };
l = (TPML_PCR_SELECTION){};
add_count = 0;
expected1_count = 0;
sub_count = 0;
expected2_count = 0;
tpm2_tpms_pcr_selection_from_mask(0x010101, sha256, &add[add_count++]);
tpm2_tpms_pcr_selection_from_mask(0x101010, sha256, &add[add_count++]);
tpm2_tpms_pcr_selection_from_mask(0x0000ff, sha512, &add[add_count++]);
tpm2_tpms_pcr_selection_from_mask(0x111111, sha256, &expected1[expected1_count++]);
tpm2_tpms_pcr_selection_from_mask(0x0000ff, sha512, &expected1[expected1_count++]);
tpm2_tpms_pcr_selection_from_mask(0x000001, sha256, &sub[sub_count++]);
tpm2_tpms_pcr_selection_from_mask(0xff0000, sha512, &sub[sub_count++]);
tpm2_tpms_pcr_selection_from_mask(0x111110, sha256, &expected2[expected2_count++]);
tpm2_tpms_pcr_selection_from_mask(0x0000ff, sha512, &expected2[expected2_count++]);
_test_tpml_addsub(&l,
add, add_count,
expected1, expected1_count,
sub, sub_count,
expected2, expected2_count);
l = (TPML_PCR_SELECTION){
.count = 1,
.pcrSelections[0].hash = sha1,
.pcrSelections[0].sizeofSelect = 3,
.pcrSelections[0].pcrSelect[0] = 0xf0,
};
add_count = 0;
expected1_count = 0;
sub_count = 0;
expected2_count = 0;
tpm2_tpms_pcr_selection_from_mask(0xff0000, sha256, &add[add_count++]);
tpm2_tpms_pcr_selection_from_mask(0xffff00, sha384, &add[add_count++]);
tpm2_tpms_pcr_selection_from_mask(0x0000ff, sha512, &add[add_count++]);
tpm2_tpms_pcr_selection_from_mask(0xf00000, sha1 , &add[add_count++]);
tpm2_tpms_pcr_selection_from_mask(0xf000f0, sha1 , &expected1[expected1_count++]);
tpm2_tpms_pcr_selection_from_mask(0xff0000, sha256, &expected1[expected1_count++]);
tpm2_tpms_pcr_selection_from_mask(0xffff00, sha384, &expected1[expected1_count++]);
tpm2_tpms_pcr_selection_from_mask(0x0000ff, sha512, &expected1[expected1_count++]);
tpm2_tpms_pcr_selection_from_mask(0x00ffff, sha256, &sub[sub_count++]);
tpm2_tpms_pcr_selection_from_mask(0xf000f0, sha1 , &expected2[expected2_count++]);
tpm2_tpms_pcr_selection_from_mask(0xff0000, sha256, &expected2[expected2_count++]);
tpm2_tpms_pcr_selection_from_mask(0xffff00, sha384, &expected2[expected2_count++]);
tpm2_tpms_pcr_selection_from_mask(0x0000ff, sha512, &expected2[expected2_count++]);
_test_tpml_addsub(&l,
add, add_count,
expected1, expected1_count,
sub, sub_count,
expected2, expected2_count);
}
#endif /* HAVE_TPM2 */
DEFINE_TEST_MAIN(LOG_DEBUG);