#!/usr/bin/env bash # For the license, see the LICENSE file in the root directory. #set -x if [ "${SWTPM_TEST_IBMTSS2:-0}" -eq 0 ]; then echo "SWTPM_TEST_IBMTSS2 must be set to run this test." exit 77 fi if ! type -p nvdefinespace startup &>/dev/null; then PREFIX=tss if ! type -p ${PREFIX}nvdefinespace ${PREFIX}startup; then echo "Could not find TPM2 tools (e.g., (tss)startup, (tss)nvdefinespace) in PATH." exit 77 fi fi TOOLSPATH=$(dirname "$(type -P "${PREFIX}startup")") ROOT=${abs_top_builddir:-$(dirname "$0")/..} TESTDIR=${abs_top_testdir:-$(dirname "$0")} SWTPM=swtpm SWTPM_EXE=${SWTPM_EXE:-$ROOT/src/swtpm/$SWTPM} SWTPM_IOCTL=$ROOT/src/swtpm_ioctl/swtpm_ioctl TPMDIR="$(mktemp -d)" || exit 1 PID_FILE=$TPMDIR/${SWTPM}.pid SOCK_PATH=$TPMDIR/sock LOGFILE=$TPMDIR/logfile TMPFILE=$TPMDIR/tmpfile BINFILE=$TPMDIR/binfile SIGFILE=$TPMDIR/sigfile SIGFILE2=$TPMDIR/sigfile2 TMP2FILE=$TPMDIR/tmpfile2 PRIVKEY=$TPMDIR/privkey.pem PUBKEY=$TPMDIR/pubkey.pem PUBKEYCONTEXT=$TPMDIR/pubkey.context HKEYPRIV=${TESTDIR}/data/tpm2state3/hkey.priv HKEYPUB=${TESTDIR}/data/tpm2state3/hkey.pub source "${TESTDIR}/test_common" source "${TESTDIR}/common" skip_test_no_tpm20 "${SWTPM_EXE}" trap "cleanup" SIGTERM EXIT function cleanup() { rm -rf "$TPMDIR" # remove files from tss tools rm -f h01*.bin nvp*.bin if [ -n "$PID" ]; then kill_quiet -SIGTERM "$PID" 2>/dev/null fi } function test_nvram_state() { local create="$1" local check="$2" local i res rc act exp ody if [ "$create" -eq 1 ]; then # the 1st and 2nd spaces are 'orderly' and will be cleared by reset ody="+at ody" for ((i=0; i < 10; i++)); do printf "Creating NVRAM location 01%06x\n" "$i" # the '+at wd' allows us to only write once if ! "${TOOLSPATH}/${PREFIX}nvdefinespace" \ -ha "$(printf "01%06x" "$i")" \ -sz $((100 + i * 10)) \ -pwdn nnn \ +at wst \ +at wd \ ${ody:+${ody}} \ -hi o >/dev/null; then echo "Error: nvdefinespace failed for i = $i." exit 1 fi if [ "$i" -eq 1 ]; then ody="" fi if ! "${TOOLSPATH}/${PREFIX}nvwrite" \ -ha "$(printf "01%06x" "$i")" \ -ic "Hello TPM2" \ -pwdn nnn; then echo "Error: nwrite failed for i = $i." exit 1 fi if ! "${TOOLSPATH}/${PREFIX}nvwritelock" \ -ha "$(printf "01%06x" "$i")" \ -pwdn nnn; then echo "Error: nwritelock failed for i = $i." exit 1 fi done # Create a counter space echo "Creating NVRAM location 01000010 for counter" if ! "${TOOLSPATH}/${PREFIX}nvdefinespace" \ -hi o \ -ha 01000010 \ -pwdn nnn \ -ty c >/dev/null; then echo "Error: nvdefinespace for counter failed." exit 1 fi echo "Incrementing the counter at location 01000010" if ! "${TOOLSPATH}/${PREFIX}nvincrement" \ -ha 01000010 \ -pwdn nnn >/dev/null; then echo "Error: nvincrement failed." exit 1 fi fi if [ "$check" -eq 1 ]; then local last=0 if [ "$create" -eq 0 ]; then last=2 fi # The orderly indices must not be readable UNLESS they were just # created. In the latter case we skip this first loop here. for ((i=0; i < last; i++)); do printf "Checking orderly NVRAM location 01%06x after reset\n" "$i" if "${TOOLSPATH}/${PREFIX}nvread" \ -ha "$(printf "01%06x" "$i")" \ -pwdn nnn \ -sz 10 > "$TMPFILE"; then echo "Error: nvread succeeded for orderly NVRAM index; i = $i" cat "$TMPFILE" exit 1 fi done # test the non-orderly indices OR orderly we just created above for ((i=last; i < 10; i++)); do printf "Checking NVRAM location 01%06x\n" "$i" if ! "${TOOLSPATH}/${PREFIX}nvread" \ -ha "$(printf "01%06x" "$i")" \ -pwdn nnn \ -sz 10 > "$TMPFILE"; then echo "Error: nvread failed for i = $i" cat "$TMPFILE" exit 1 fi # we want one line with xdigits and spaces res=$(grep -c -E "^[ [:xdigit:]]+$" < "$TMPFILE") if [ "$res" -ne 1 ]; then echo "Error: nvread did not show expected results" cat "$TMPFILE" fi if "${TOOLSPATH}/${PREFIX}nvwrite" \ -ha "$(printf "01%06x" "$i")" \ -ic "Hello TPM2" \ -pwdn nnn > "$TMPFILE"; then echo "Error: nwrite succeeded for i = $i." exit 1 fi done # Read the counter echo "Checking counter value at location 01000010" if ! "${TOOLSPATH}/${PREFIX}nvread" \ -ha 01000010 \ -pwdn nnn \ -sz 8 \ -of "$BINFILE" > "$TMPFILE"; then echo "Error: nvread of counter failed." cat "$TMPFILE" exit 1 fi exp=' 00 00 00 00 00 00 00 01' act="$(od -t x1 -A n < "$BINFILE")" if [ "$act" != "$exp" ]; then echo "Error: Counter has unexpected value." echo " expected: $exp" echo " actual : $act" fi fi } function test_primary() { local create="$1" local check="$2" # whether we are using previous stored stated that had a different # key and we have to use the old signature local previousstate="$3" local i res rc if [ "$create" -eq 1 ]; then # Create a permanent primary key that we expect # to again see after the TPM has been restarted if ! "${TOOLSPATH}/${PREFIX}createprimary" -hi o -si > "$TMPFILE"; then echo "Error: createprimary failed." exit 1 fi if ! grep -q 80000000 "$TMPFILE"; then echo "Error: createprimary did not result in expected handle 80000000" exit 1 fi if ! "${TOOLSPATH}/${PREFIX}evictcontrol" -ho 80000000 -hp 81000000 -hi o; then echo "Error: evictcontrol did not work" exit 1 fi "${TOOLSPATH}/${PREFIX}flushcontext" -ha 80000000 echo -n "123" > "$BINFILE" if ! "${TOOLSPATH}/${PREFIX}sign" -hk 81000000 -if "${BINFILE}" -os "${SIGFILE}" > "$TMPFILE"; then echo "Error: Could not create signature." cat "$TMPFILE" exit 1 fi fi if [ "$check" -eq 1 ]; then printf "Checking availability of key with perm. handle 0x81000000\n" "${TOOLSPATH}/${PREFIX}getcapability" -cap 1 -pr 0x81000000 >"$TMPFILE" if ! grep -q 81000000 "$TMPFILE"; then echo "Could not find key with permanent handle 0x81000000" exit 1 fi printf "Verifying signature with this key\n" echo -n "123" > "$BINFILE" if [ "$previousstate" -eq 0 ]; then "${TOOLSPATH}/${PREFIX}verifysignature" -hk 81000000 \ -is "${SIGFILE}" \ -if "${BINFILE}" > "$TMPFILE" rc=$? else "${TOOLSPATH}/${PREFIX}verifysignature" -hk 81000000 \ -is "${TESTDIR}/data/tpm2state3/signature.bin" \ -if "${BINFILE}" > "$TMPFILE" rc=$? fi if [ $rc -ne 0 ]; then echo "Verifying signature failed." exit 1 fi fi } # Allocate a SHA256 PCR bank # This will prevent shutdown -s (with state) function test_pcr_allocation() { local create="$1" local check="$2" local i res rc ha if ! "$TOOLSPATH/${PREFIX}pcrallocate" | grep -q sha512; then echo " Skipping PCR Allocate test since it does not support sha512" return 0 fi if [ "$create" -eq 1 ]; then echo "Allocating SHA256 PCR bank" "${TOOLSPATH}/${PREFIX}pcrallocate" -sha512 +sha256 for ((ha = 0; ha < 24; ha++)); do "${TOOLSPATH}/${PREFIX}pcrread" -ha "${ha}" -halg sha512 > "$TMPFILE" if ! grep -q "^count 1.*$" "$TMPFILE"; then echo "Error: PCR ${ha} in SHA512 bank should be available for read before reboot" cat "$TMPFILE" exit 1 fi "${TOOLSPATH}/${PREFIX}pcrread" -ha "${ha}" -halg sha256 > "$TMPFILE" if ! grep -q "^count 1.*$" "$TMPFILE"; then echo "Error: PCR ${ha} in SHA256 bank should be available for read before reboot" cat "$TMPFILE" exit 1 fi done fi if [ "$check" -eq 1 ]; then echo "Checking the PCR Allocation" for ((ha = 0; ha < 24; ha++)); do "${TOOLSPATH}/${PREFIX}pcrread" -ha "${ha}" -halg sha512 > "$TMPFILE" if ! grep -q "^count 0.*$" "$TMPFILE"; then echo "Error: PCR ${ha} in SHA512 bank should be unavailable for read after reboot" cat "$TMPFILE" exit 1 fi "${TOOLSPATH}/${PREFIX}pcrread" -ha "${ha}" -halg sha256 > "$TMPFILE" if ! grep -q "^count 1.*$" "$TMPFILE"; then echo "Error: PCR ${ha} in SHA256 bank should be available for read after reboot" exit 1 fi done fi } function test_hierarchy() { local create="$1" local check="$2" local hi pwdn pwda if [ "$create" -eq 1 ]; then echo "Setting hierarchy passwords" # Change the hierarchy password; the 'p' hierarchy has # no effect on permanent RAM, so we won't test that for hi in "l" "e" "o"; do pwdn="${hi}${hi}${hi}" if ! "${TOOLSPATH}/${PREFIX}hierarchychangeauth" \ -hi "${hi}" \ -pwdn "${pwdn}" > "$TMPFILE"; then echo "Error: hierarchychangeauth failed to set password." cat "$TMPFILE" exit 1 fi done fi if [ "$check" -eq 1 ]; then echo "Checking previously set hierarchy passwords" for hi in "l" "e" "o"; do pwda="${hi}${hi}${hi}" pwdn="new-${pwda}" if ! "${TOOLSPATH}/${PREFIX}hierarchychangeauth" \ -hi "${hi}" \ -pwda "${pwda}" \ -pwdn "${pwdn}" > "$TMPFILE"; then echo "Error: hierarchychangeauth failed to change password." cat "$TMPFILE" exit 1 fi # change back if ! "${TOOLSPATH}/${PREFIX}hierarchychangeauth" \ -hi "${hi}" \ -pwda "${pwdn}" \ -pwdn "${pwda}" > "$TMPFILE"; then echo "Error: hierarchychangeauth failed to change back password." cat "$TMPFILE" exit 1 fi done fi } function test_hash_context() { local create="$1" local check="$2" local res if [ "$create" -eq 1 ]; then echo -n "123" > "${TMP2FILE}" echo "Starting a sha1 sequence" if ! res="$("${TOOLSPATH}/${PREFIX}hashsequencestart" -halg sha1)"; then echo "Error: Could not start hash sequence." exit 1 fi SHA1_SEQUENCE_HANDLE="$(echo "$res" | cut -d " " -f3)" echo "sha1 sequence handle: $SHA1_SEQUENCE_HANDLE" if ! "${TOOLSPATH}/${PREFIX}sequenceupdate" \ -hs "${SHA1_SEQUENCE_HANDLE}" \ -if "${TMP2FILE}"; then echo "Error: Could not updated the sha1 sequence." exit 1 fi echo "Updated sha1 sequence." echo "Starting a sha256 sequence" if ! res="$("${TOOLSPATH}/${PREFIX}hashsequencestart" -halg sha256)"; then echo "Error: Could not start sha256 sequence." exit 1 fi SHA256_SEQUENCE_HANDLE="$(echo "$res" | cut -d " " -f3)" echo "sha256 sequence handle: $SHA256_SEQUENCE_HANDLE" if ! "${TOOLSPATH}/${PREFIX}sequenceupdate" \ -hs "${SHA256_SEQUENCE_HANDLE}" \ -if "${TMP2FILE}"; then echo "Error: Could not updated the hash sequence." exit 1 fi echo "Updated sha256 sequence." echo "Starting a sha384 sequence" if ! res="$("${TOOLSPATH}/${PREFIX}hashsequencestart" -halg sha384)"; then echo "Error: Could not start sha384 sequence." exit 1 fi SHA384_SEQUENCE_HANDLE="$(echo "$res" | cut -d " " -f3)" echo "sha384 sequence handle: $SHA384_SEQUENCE_HANDLE" if ! "${TOOLSPATH}/${PREFIX}sequenceupdate" \ -hs "${SHA384_SEQUENCE_HANDLE}" \ -if "${TMP2FILE}"; then echo "Error: Could not updated the hash sequence." exit 1 fi echo "Updated sha384 sequence." fi if [ "$check" -eq 1 ]; then echo -n "456" > "${TMP2FILE}" echo "Completing previously started sha1 sequence" touch "$TPMDIR/h${SHA1_SEQUENCE_HANDLE}.bin" res=$("${TOOLSPATH}/${PREFIX}sequencecomplete" \ -hs "${SHA1_SEQUENCE_HANDLE}" \ -if "${TMP2FILE}" -v | tail -n 4 | grep " 7c 4a 8d ") if [ -z "$res" ]; then echo "Error: Did not get expected result from completing sha1 sequence." exit 1 fi echo "Completing previously started sha256 sequence" touch "$TPMDIR/h${SHA256_SEQUENCE_HANDLE}.bin" res=$("${TOOLSPATH}/${PREFIX}sequencecomplete" \ -hs "${SHA256_SEQUENCE_HANDLE}" \ -if "${TMP2FILE}" -v | tail -n 4 | grep " 8d 96 9e ") if [ -z "$res" ]; then echo "Error: Did not get expected result from completing sha256 sequence." exit 1 fi echo "Completing previously started sha384 sequence" touch "$TPMDIR/h${SHA384_SEQUENCE_HANDLE}.bin" res=$("${TOOLSPATH}/${PREFIX}sequencecomplete" \ -hs "${SHA384_SEQUENCE_HANDLE}" \ -if "${TMP2FILE}" -v | tail -n 4 | grep " 0a 98 9e ") if [ -z "$res" ]; then echo "Error: Did not get expected result from completing sha384 sequence." exit 1 fi fi } function test_session() { local create="$1" local check="$2" # whether we are using previous stored stated that had a different # key and we have to use the old signature local previousstate="$3" local i res rc if [ "$create" -eq 1 ]; then # Create a permanent primary key that we expect # to again see after the TPM has been restarted if ! "${TOOLSPATH}/${PREFIX}createprimary" -hi o -st > "$TMPFILE"; then echo "Error: createprimary for creating storage key failed." exit 1 fi if ! grep -q 80000000 "$TMPFILE"; then echo "Error: createprimary did not result in expected handle 80000000" cat "$TMPFILE" exit 1 fi if ! "${TOOLSPATH}/${PREFIX}evictcontrol" -ho 80000000 -hp 81000000 -hi o; then echo "Error: evictcontrol did not work" exit 1 fi "${TOOLSPATH}/${PREFIX}flushcontext" -ha 80000000 if ! "${TOOLSPATH}/${PREFIX}startauthsession" -se h -bi 81000000 > "$TMPFILE"; then echo "Error: Could not start an auth session." cat "$TMPFILE" exit 1 fi AUTHSESSION_HANDLE=$(sed 's/Handle//' "$TMPFILE") if [ -z "${AUTHSESSION_HANDLE}" ]; then echo "Error: Could not get auth session handle." exit 1 fi fi if [ "$check" -eq 1 ]; then echo "Using auth session ${AUTHSESSION_HANDLE} to create a key." if ! "${TOOLSPATH}/${PREFIX}create" \ -hp 81000000 \ -st \ -se0 "${AUTHSESSION_HANDLE}" 1; then echo "Error: Could not create key using authsession" exit 1 fi echo "Successfully created key" fi } function test_hmac_context() { local create="$1" local check="$2" # whether we are using previous stored stated that had a different # key and we have to use the old signature local previousstate="$3" local i res rc if [ "$create" -eq 1 ]; then if ! "${TOOLSPATH}/${PREFIX}createprimary" -hi o -st > "$TMPFILE"; then echo "Error: createprimary failed." exit 1 fi if ! grep -q 80000000 "$TMPFILE"; then echo "Error: createprimary did not result in expected handle 80000000" exit 1 fi if ! "${TOOLSPATH}/${PREFIX}create" -hp 80000000 -kh \ -opr "${HKEYPRIV}" -opu "${HKEYPUB}" > "$TMPFILE"; then echo "Error: could not create key for HMAC" exit 1 fi if ! "${TOOLSPATH}/${PREFIX}load" -hp 80000000 \ -ipr "${HKEYPRIV}" -ipu "${HKEYPUB}" -v > "$TMPFILE"; then echo "Error: could not load key for HMAC" cat "$TMPFILE" exit 1 fi if ! grep -q 80000001 "$TMPFILE"; then echo "Error: load did not result in expected handle 80000001" exit 1 fi if ! "${TOOLSPATH}/${PREFIX}hmacstart" -hk 80000001 > "$TMPFILE"; then echo "Error: could not start HMAC sequence" exit 1 fi if ! grep -q 80000002 "$TMPFILE"; then echo "Error: load did not result in expected handle 80000002" exit 1 fi echo -n "123" > "${TMP2FILE}" if ! "${TOOLSPATH}/${PREFIX}sequenceupdate" \ -hs 80000002 \ -if "${TMP2FILE}"; then echo "Error: Could not updated the HMAC sequence." exit 1 fi echo "Updated HMAC sequence." fi if [ "$check" -eq 1 ]; then echo -n "456" > "${TMP2FILE}" echo "Completing previously started HMAC sequence" touch "$TPMDIR/h80000002.bin" "${TOOLSPATH}/${PREFIX}sequencecomplete" \ -hs 80000002 \ -if "${TMP2FILE}" -v | tail -n 4 > "${TMPFILE}" if ! grep -q " 6e 40 33 1a " "${TMPFILE}"; then echo "Error: Did not get expected result from completing HMAC sequence." cat "$TMPFILE" exit 1 fi fi } function test_primary_volatile_load() { local create="$1" local check="$2" # whether we are using previous stored stated that had a different # key and we have to use the old signature local previousstate="$3" local i res rc if [ "$create" -eq 1 ]; then # Create a permanent primary key that we expect # to again see after the TPM has been restarted if ! "${TOOLSPATH}/${PREFIX}createprimary" -hi o -si > "$TMPFILE"; then echo "Error: createprimary failed." exit 1 fi if ! grep -q 80000000 "$TMPFILE"; then echo "Error: createprimary did not result in expected handle 80000000" exit 1 fi echo -n "123" > "$BINFILE" if ! "${TOOLSPATH}/${PREFIX}sign" -hk 80000000 -if "${BINFILE}" -os "${SIGFILE}" > "$TMPFILE"; then echo "Error: Could not create signature." cat "$TMPFILE" exit 1 fi printf "Verifying signature with this key (create phase)\n" if ! "${TOOLSPATH}/${PREFIX}verifysignature" -hk 80000000 \ -is "${SIGFILE}" \ -if "${BINFILE}" > "$TMPFILE"; then echo "Verifying signature failed." exit 1 fi fi if [ "$check" -eq 1 ]; then local sigfile=${SIGFILE} hash1 hash2 if [ "$previousstate" -ne 0 ]; then sigfile=${TESTDIR}/data/tpm2state3d/signature2.bin fi printf "Checking availability of key with handle 0x80000000\n" "${TOOLSPATH}/${PREFIX}getcapability" -cap 1 -pr 0x80000000 > "$TMPFILE" if ! grep -q 80000000 "$TMPFILE"; then echo "Could not find key with handle 0x80000000" exit 1 fi printf "Verifying signature with this key (check phase)\n" echo -n "123" > "$BINFILE" if ! "${TOOLSPATH}/${PREFIX}verifysignature" -hk 80000000 \ -is "${sigfile}" \ -if "${BINFILE}" > "$TMPFILE"; then echo "Verifying signature failed." exit 1 fi if [ "$previousstate" -eq 0 ]; then if ! "${TOOLSPATH}/${PREFIX}sign" -hk 80000000 -if "${BINFILE}" -os "${SIGFILE2}" > "$TMPFILE"; then echo "Error: Could not create signature." cat "$TMPFILE" exit 1 fi hash1=$(get_sha1_file "${SIGFILE}") hash2=$(get_sha1_file "${SIGFILE2}") if [ "${hash1}" != "${hash2}" ]; then echo "Error: hashes of signatures are different. Loaded key may be different." exit 1 fi fi fi } # libtpms issue #195: Create an external key and load it into the TPM 2 # and do a context save/load cycle function test_external_key() { local create="$1" local check="$2" if [ "$create" -eq 1 ]; then ${CERTTOOL} --generate-privkey --bits 2048 --outfile "${PRIVKEY}" &>/dev/null ${CERTTOOL} --pubkey-info --load-privkey "${PRIVKEY}" > "${PUBKEY}" if ! "$TOOLSPATH/${PREFIX}loadexternal" -hi o -ipem "${PUBKEY}" > "$TMPFILE"; then echo "Error: loadexternal failed." exit 1 fi if ! grep -q 80000001 "$TMPFILE"; then echo "Error: loadexternal did not result in expected handle 80000001" exit 1 fi fi if [ "$check" -eq 1 ]; then if ! "$TOOLSPATH/${PREFIX}contextsave" -ha 80000001 -of "${PUBKEYCONTEXT}"; then echo "Error: contextsave on loaded public key failed." exit 1 fi "$TOOLSPATH/${PREFIX}flushcontext" -ha 80000001 if ! "$TOOLSPATH/${PREFIX}contextload" -if "${PUBKEYCONTEXT}" > "$TMPFILE"; then echo "Error: contextload on context of public key failed." exit 1 fi if ! grep -q 80000001 "$TMPFILE"; then echo "Error: contextload did not result in expected handle 80000001" exit 1 fi fi } export TPM_SERVER_TYPE=raw export TPM_SERVER_NAME=127.0.0.1 export TPM_INTERFACE_TYPE=socsim export TPM_COMMAND_PORT=65533 export TPM_DATA_DIR=$TPMDIR export TPM_SESSION_ENCKEY="807e2bfe898ddaed8fa6310e716a24dc" # for sessions $SWTPM_EXE socket \ --server port=${TPM_COMMAND_PORT} \ --tpmstate "dir=$TPMDIR" \ --pid "file=$PID_FILE" \ --ctrl "type=unixio,path=$SOCK_PATH" \ --log "file=$LOGFILE,level=20" \ --tpm2 \ ${SWTPM_TEST_SECCOMP_OPT:+${SWTPM_TEST_SECCOMP_OPT}} & if wait_for_file "$PID_FILE" 3; then echo "Error: (1) Socket TPM did not write pidfile." exit 1 fi PID="$(cat "$PID_FILE")" # Send TPM_Init if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -i 2>&1); then echo "Error: $SWTPM_IOCTL CMD_INIT failed: $act" exit 1 fi if ! "${TOOLSPATH}/${PREFIX}startup" -c; then echo "Error: tpm_startup clear failed." exit 1 fi test_nvram_state 1 1 test_primary 1 1 0 test_pcr_allocation 1 0 # can only check after reboot test_hierarchy 1 1 if ! "${TOOLSPATH}/${PREFIX}shutdown" -c; then echo "Error: tpm_shutdown clear failed." cat "$LOGFILE" exit 1 fi # Send Shutdown if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -s 2>&1); then echo "Error: $SWTPM_IOCTL CMD_SHUTDOWN failed: $act" exit 1 fi echo "============================" >> "$LOGFILE" echo "TPM was shut down" # Store this state for later usage # cp $TPMDIR/tpm2-00.permall ${TESTDIR}/data/tpm2state3; # cp $SIGFILE ${TESTDIR}/data/tpm2state3/signature.bin ################################################################# # Run TPM2 with the created state and verify it's the same $SWTPM_EXE socket \ --server port=${TPM_COMMAND_PORT} \ --tpmstate "dir=$TPMDIR" \ --pid "file=$PID_FILE" \ --ctrl "type=unixio,path=$SOCK_PATH" \ --log "file=$LOGFILE,level=20" \ --tpm2 \ ${SWTPM_TEST_SECCOMP_OPT:+${SWTPM_TEST_SECCOMP_OPT}} & if wait_for_file "$PID_FILE" 3; then echo "Error: (2) Socket TPM did not write pidfile." exit 1 fi echo "TPM re-started" PID="$(cat "$PID_FILE")" # Send TPM_Init if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -i 2>&1); then echo "Error: $SWTPM_IOCTL CMD_INIT failed: $act" exit 1 fi if ! "${TOOLSPATH}/${PREFIX}startup" -c; then echo "Error: tpm_startup clear failed." cat "$LOGFILE" exit 1 fi test_nvram_state 0 1 test_primary 0 1 0 test_pcr_allocation 0 1 test_hierarchy 0 1 if ! "${TOOLSPATH}/${PREFIX}shutdown" -c; then echo "Error: tpm_shutdown clear failed." cat "$LOGFILE" exit 1 fi # Send Shutdown if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -s 2>&1); then echo "Error: $SWTPM_IOCTL CMD_SHUTDOWN failed: $act" exit 1 fi echo "============================" >> "$LOGFILE" echo "TPM was shut down" ################################################################# # Run TPM2 with previously saved state and verify it's the same rm -f "$TPMDIR/"* cp -f "${TESTDIR}/data/tpm2state3/tpm2-00.permall" "$TPMDIR/tpm2-00.permall" $SWTPM_EXE socket \ --server port=${TPM_COMMAND_PORT} \ --tpmstate "dir=$TPMDIR" \ --pid "file=$PID_FILE" \ --ctrl "type=unixio,path=$SOCK_PATH" \ --log "file=$LOGFILE,level=20" \ --tpm2 \ ${SWTPM_TEST_SECCOMP_OPT:+${SWTPM_TEST_SECCOMP_OPT}} & if wait_for_file "$PID_FILE" 3; then echo "Error: (3) Socket TPM did not write pidfile." exit 1 fi echo "TPM started with previously generated state" PID="$(cat "$PID_FILE")" # Send TPM_Init if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -i 2>&1); then echo "Error: $SWTPM_IOCTL CMD_INIT failed: $act" exit 1 fi if ! "${TOOLSPATH}/${PREFIX}startup" -c; then echo "Error: tpm_startup clear failed." cat "$LOGFILE" exit 1 fi test_nvram_state 0 1 test_primary 0 1 1 test_pcr_allocation 0 1 test_hierarchy 0 1 if ! "${TOOLSPATH}/${PREFIX}shutdown" -c; then echo "Error: tpm_shutdown clear failed." cat "$LOGFILE" exit 1 fi # Send Shutdown if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -s 2>&1); then echo "Error: $SWTPM_IOCTL CMD_SHUTDOWN failed: $act" exit 1 fi echo "Test 1 OK" # # # Tests with volatile state # # rm -f "${TPMDIR}"/* $SWTPM_EXE socket \ --server port=${TPM_COMMAND_PORT} \ --tpmstate "dir=$TPMDIR" \ --pid "file=$PID_FILE" \ --ctrl "type=unixio,path=$SOCK_PATH" \ --log "file=$LOGFILE,level=20" \ --tpm2 \ ${SWTPM_TEST_SECCOMP_OPT:+${SWTPM_TEST_SECCOMP_OPT}} & if wait_for_file "$PID_FILE" 3; then echo "Error: (3) Socket TPM did not write pidfile." exit 1 fi PID="$(cat "$PID_FILE")" # Send TPM_Init if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -i 2>&1); then echo "Error: $SWTPM_IOCTL CMD_INIT failed: $act" exit 1 fi if ! "${TOOLSPATH}/${PREFIX}startup" -c; then echo "Error: tpm_startup clear failed." cat "$LOGFILE" exit 1 fi test_session 1 1 test_hash_context 1 0 if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -v 2>&1); then echo "Error: $SWTPM_IOCTL CMD_STORE_VOLATILE failed: $act" exit 1 fi if ! "${TOOLSPATH}/${PREFIX}shutdown" -c; then echo "Error: tpm_shutdown clear failed." cat "$LOGFILE" exit 1 fi # Send Shutdown if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -s 2>&1); then echo "Error: $SWTPM_IOCTL CMD_SHUTDOWN failed: $act" exit 1 fi ################################################################# # Run TPM2 with the saved volatile state # create a backup for running the next test... # cp $TPMDIR/tpm2-00.permall ${TESTDIR}/data/tpm2state3b/tpm2-00.permall # cp $TPMDIR/tpm2-00.volatilestate ${TESTDIR}/data/tpm2state3b/tpm2-00.volatilestate # cp $TPMDIR/h02000000.bin ${TESTDIR}/data/tpm2state3b/h02000000.bin # cp $TPMDIR/h81000000.bin ${TESTDIR}/data/tpm2state3b/h81000000.bin $SWTPM_EXE socket \ --server port=${TPM_COMMAND_PORT} \ --tpmstate "dir=$TPMDIR" \ --pid "file=$PID_FILE" \ --ctrl "type=unixio,path=$SOCK_PATH" \ --log "file=$LOGFILE,level=20" \ --tpm2 \ ${SWTPM_TEST_SECCOMP_OPT:+${SWTPM_TEST_SECCOMP_OPT}} & if wait_for_file "$PID_FILE" 3; then echo "Error: (3) Socket TPM did not write pidfile." exit 1 fi PID="$(cat "$PID_FILE")" # Send TPM_Init if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -i 2>&1); then cat "$LOGFILE" echo "Error: $SWTPM_IOCTL CMD_INIT failed: $act" exit 1 fi test_hash_context 0 1 test_session 0 1 if ! "${TOOLSPATH}/${PREFIX}shutdown" -c; then echo "Error: tpm_shutdown clear failed." cat "$LOGFILE" exit 1 fi # Send Shutdown if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -s 2>&1); then echo "Error: $SWTPM_IOCTL CMD_SHUTDOWN failed: $act" exit 1 fi ##################################################################### # Run TPM2 with previously saved (volatile) state and verify it's # working as well cp -f "${TESTDIR}/data/tpm2state3b/tpm2-00.permall" "$TPMDIR/tpm2-00.permall" cp -f "${TESTDIR}/data/tpm2state3b/tpm2-00.volatilestate" "$TPMDIR/tpm2-00.volatilestate" cp -f "${TESTDIR}/data/tpm2state3b/h02000000.bin" "$TPMDIR/h02000000.bin" cp -f "${TESTDIR}/data/tpm2state3b/h81000000.bin" "$TPMDIR/h81000000.bin" $SWTPM_EXE socket \ --server port=${TPM_COMMAND_PORT} \ --tpmstate "dir=$TPMDIR" \ --pid "file=$PID_FILE" \ --ctrl "type=unixio,path=$SOCK_PATH" \ --log "file=$LOGFILE,level=20" \ --tpm2 \ ${SWTPM_TEST_SECCOMP_OPT:+${SWTPM_TEST_SECCOMP_OPT}} & if wait_for_file "$PID_FILE" 3; then echo "Error: (3) Socket TPM did not write pidfile." exit 1 fi echo "TPM started with previously generated state" PID="$(cat "$PID_FILE")" # Send TPM_Init if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -i 2>&1); then echo "Error: $SWTPM_IOCTL CMD_INIT failed: $act" tail -n 10 "$LOGFILE" exit 1 fi test_hash_context 0 1 test_session 0 1 # Send Shutdown if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -s 2>&1); then echo "Error: $SWTPM_IOCTL CMD_SHUTDOWN failed: $act" exit 1 fi echo "Test 2 OK" # # # Tests with volatile state -- 2nd test # # rm -f "${TPMDIR}"/* $SWTPM_EXE socket \ --server port=${TPM_COMMAND_PORT} \ --tpmstate "dir=$TPMDIR" \ --pid "file=$PID_FILE" \ --ctrl "type=unixio,path=$SOCK_PATH" \ --log "file=$LOGFILE,level=20" \ --tpm2 \ ${SWTPM_TEST_SECCOMP_OPT:+${SWTPM_TEST_SECCOMP_OPT}} & if wait_for_file "$PID_FILE" 3; then echo "Error: (3) Socket TPM did not write pidfile." exit 1 fi PID="$(cat "$PID_FILE")" # Send TPM_Init if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -i 2>&1); then echo "Error: $SWTPM_IOCTL CMD_INIT failed: $act" exit 1 fi if ! "${TOOLSPATH}/${PREFIX}startup" -c; then echo "Error: tpm_startup clear failed." cat "$LOGFILE" exit 1 fi # we only run this to generate the AES key which is different every time... # test_hmac_context 1 0 if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -v 2>&1); then echo "Error: $SWTPM_IOCTL CMD_STORE_VOLATILE failed: $act" exit 1 fi if ! "${TOOLSPATH}/${PREFIX}shutdown" -c; then echo "Error: tpm_shutdown clear failed." cat "$LOGFILE" exit 1 fi # Send Shutdown if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -s 2>&1); then echo "Error: $SWTPM_IOCTL CMD_SHUTDOWN failed: $act" exit 1 fi ################################################################# # Run TPM2 with the saved volatile state # create a backup for running the next test... # cp $TPMDIR/tpm2-00.permall ${TESTDIR}/data/tpm2state3c/tpm2-00.permall # cp $TPMDIR/tpm2-00.volatilestate ${TESTDIR}/data/tpm2state3c/tpm2-00.volatilestate #echo $TPMDIR #ls -l $TPMDIR $SWTPM_EXE socket \ --server port=${TPM_COMMAND_PORT} \ --tpmstate "dir=$TPMDIR" \ --pid "file=$PID_FILE" \ --ctrl "type=unixio,path=$SOCK_PATH" \ --log "file=$LOGFILE,level=20" \ --tpm2 \ ${SWTPM_TEST_SECCOMP_OPT:+${SWTPM_TEST_SECCOMP_OPT}} & if wait_for_file "$PID_FILE" 3; then echo "Error: (3) Socket TPM did not write pidfile." exit 1 fi PID="$(cat "$PID_FILE")" # Send TPM_Init if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -i 2>&1); then cat "$LOGFILE" echo "Error: $SWTPM_IOCTL CMD_INIT failed: $act" exit 1 fi # since the AES key is different every time, we cannot run # the HMAC function that's using it since the result would # be different every time # test_hmac_context 0 1 if ! "${TOOLSPATH}/${PREFIX}shutdown" -c; then echo "Error: tpm_shutdown clear failed." cat "$LOGFILE" exit 1 fi # Send Shutdown if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -s 2>&1); then echo "Error: $SWTPM_IOCTL CMD_SHUTDOWN failed: $act" exit 1 fi ##################################################################### # Run TPM2 with previously saved (volatile) state and verify it's # working as well cp -f "${TESTDIR}/data/tpm2state3c/tpm2-00.volatilestate" "$TPMDIR/tpm2-00.volatilestate" cp -f "${TESTDIR}/data/tpm2state3c/tpm2-00.permall" "$TPMDIR/tpm2-00.permall" $SWTPM_EXE socket \ --server port=${TPM_COMMAND_PORT} \ --tpmstate "dir=$TPMDIR" \ --pid "file=$PID_FILE" \ --ctrl "type=unixio,path=$SOCK_PATH" \ --log "file=$LOGFILE,level=20" \ --tpm2 \ ${SWTPM_TEST_SECCOMP_OPT:+${SWTPM_TEST_SECCOMP_OPT}} & if wait_for_file "$PID_FILE" 3; then echo "Error: (3) Socket TPM did not write pidfile." exit 1 fi echo "TPM started with previously generated state" PID="$(cat "$PID_FILE")" # Send TPM_Init if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -i 2>&1); then echo "Error: $SWTPM_IOCTL CMD_INIT failed: $act" exit 1 fi test_hmac_context 0 1 # Send Shutdown if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -s 2>&1); then echo "Error: $SWTPM_IOCTL CMD_SHUTDOWN failed: $act" exit 1 fi echo "Test 3 OK" # # # Tests with volatile state -- 3rd test # # rm -f "${TPMDIR}"/* $SWTPM_EXE socket \ --server port=${TPM_COMMAND_PORT} \ --tpmstate "dir=$TPMDIR" \ --pid "file=$PID_FILE" \ --ctrl "type=unixio,path=$SOCK_PATH" \ --log "file=$LOGFILE,level=20" \ --tpm2 \ ${SWTPM_TEST_SECCOMP_OPT:+${SWTPM_TEST_SECCOMP_OPT}} & if wait_for_file "$PID_FILE" 3; then echo "Error: (3) Socket TPM did not write pidfile." exit 1 fi PID="$(cat "$PID_FILE")" # Send TPM_Init if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -i 2>&1); then echo "Error: $SWTPM_IOCTL CMD_INIT failed: $act" exit 1 fi if ! "${TOOLSPATH}/${PREFIX}startup" -c; then echo "Error: tpm_startup clear failed." cat "$LOGFILE" exit 1 fi test_primary_volatile_load 1 0 0 test_external_key 1 1 if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -v 2>&1); then echo "Error: $SWTPM_IOCTL CMD_STORE_VOLATILE failed: $act" exit 1 fi if ! "${TOOLSPATH}/${PREFIX}shutdown" -c; then echo "Error: tpm_shutdown clear failed." cat "$LOGFILE" exit 1 fi # Send Shutdown if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -s 2>&1); then echo "Error: $SWTPM_IOCTL CMD_SHUTDOWN failed: $act" exit 1 fi ################################################################# # Run TPM2 with the saved volatile state # create a backup for running the next test... # cp $TPMDIR/tpm2-00.volatilestate ${TESTDIR}/data/tpm2state3d/tpm2-00.volatilestate # cp $TPMDIR/tpm2-00.permall ${TESTDIR}/data/tpm2state3d/tpm2-00.permall # cp $SIGFILE ${TESTDIR}/data/tpm2state3d/signature2.bin #echo $TPMDIR #ls -l $TPMDIR $SWTPM_EXE socket \ --server port=${TPM_COMMAND_PORT} \ --tpmstate "dir=$TPMDIR" \ --pid "file=$PID_FILE" \ --ctrl "type=unixio,path=$SOCK_PATH" \ --log "file=$LOGFILE,level=20" \ --tpm2 \ ${SWTPM_TEST_SECCOMP_OPT:+${SWTPM_TEST_SECCOMP_OPT}} & if wait_for_file "$PID_FILE" 3; then echo "Error: (3) Socket TPM did not write pidfile." exit 1 fi PID="$(cat "$PID_FILE")" # Send TPM_Init if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -i 2>&1); then cat "$LOGFILE" echo "Error: $SWTPM_IOCTL CMD_INIT failed: $act" exit 1 fi test_primary_volatile_load 0 1 0 test_external_key 0 1 if ! "${TOOLSPATH}/${PREFIX}shutdown" -c; then echo "Error: tpm_shutdown clear failed." cat "$LOGFILE" exit 1 fi # Send Shutdown if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -s 2>&1); then echo "Error: $SWTPM_IOCTL CMD_SHUTDOWN failed: $act" exit 1 fi ##################################################################### # Run TPM2 with previously saved (volatile) state and verify it's # working as well cp -f "${TESTDIR}/data/tpm2state3d/tpm2-00.permall" "$TPMDIR/tpm2-00.permall" cp -f "${TESTDIR}/data/tpm2state3d/tpm2-00.volatilestate" "$TPMDIR/tpm2-00.volatilestate" $SWTPM_EXE socket \ --server port=${TPM_COMMAND_PORT} \ --tpmstate "dir=$TPMDIR" \ --pid "file=$PID_FILE" \ --ctrl "type=unixio,path=$SOCK_PATH" \ --log "file=$LOGFILE,level=20" \ --tpm2 \ ${SWTPM_TEST_SECCOMP_OPT:+${SWTPM_TEST_SECCOMP_OPT}} & if wait_for_file "$PID_FILE" 3; then echo "Error: (3) Socket TPM did not write pidfile." exit 1 fi echo "TPM started with previously generated state" PID="$(cat "$PID_FILE")" # Send TPM_Init if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -i 2>&1); then echo "Error: $SWTPM_IOCTL CMD_INIT failed: $act" exit 1 fi test_primary_volatile_load 0 1 1 test_external_key 0 1 # Create the orderly nv indices and have them cleared (for coverage) test_nvram_state 1 1 if ! "${TOOLSPATH}/${PREFIX}clear" -hi p; then echo "Error: clear failed." cat "$LOGFILE" exit 1 fi # Send Shutdown if ! act=$($SWTPM_IOCTL --unix "$SOCK_PATH" -s 2>&1); then echo "Error: $SWTPM_IOCTL CMD_SHUTDOWN failed: $act" exit 1 fi echo "Test 4 OK" exit 0