mirror of
https://github.com/stefanberger/swtpm.git
synced 2025-08-22 19:04:35 +00:00

Ensure that no profile is passed to the TPM 2 when it is to be reconfigured by: - Showing an error if user tries to pass a profile when also --reconfigure is passed - Not taking the default profile from the swtpm_setup.conf configuration file if the user did not pass a profile Extend an existing test case with a default profile in its swtpm_setup.conf so that the above 2nd item is tested. Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
243 lines
6.4 KiB
Bash
Executable File
243 lines
6.4 KiB
Bash
Executable File
#!/usr/bin/env bash
|
|
|
|
# For the license, see the LICENSE file in the root directory.
|
|
|
|
TOPBUILD=${abs_top_builddir:-$(dirname "$0")/..}
|
|
ROOT=${abs_top_builddir:-$(dirname "$0")/..}
|
|
TESTDIR=${abs_top_testdir:-$(dirname "$0")}
|
|
|
|
source "${TESTDIR}/common"
|
|
skip_test_no_tpm20 "${SWTPM_EXE}"
|
|
|
|
workdir="$(mktemp -d "/tmp/path with spaces.XXXXXX")" || exit 1
|
|
|
|
SIGNINGKEY=${workdir}/signingkey.pem
|
|
ISSUERCERT=${workdir}/issuercert.pem
|
|
CERTSERIAL=${workdir}/certserial
|
|
USER_CERTSDIR=${workdir}/mycerts
|
|
mkdir -p "${USER_CERTSDIR}"
|
|
|
|
PATH=${TOPBUILD}/src/swtpm_bios:$PATH
|
|
|
|
trap "cleanup" SIGTERM EXIT
|
|
|
|
function cleanup()
|
|
{
|
|
rm -rf "${workdir}"
|
|
}
|
|
|
|
# We want swtpm_cert to use the local CA and see that the
|
|
# local CA script automatically creates a signingkey and
|
|
# self-signed certificate
|
|
|
|
cat <<_EOF_ > "${workdir}/swtpm-localca.conf"
|
|
statedir=${workdir}
|
|
signingkey = ${SIGNINGKEY}
|
|
issuercert = ${ISSUERCERT}
|
|
certserial = ${CERTSERIAL}
|
|
_EOF_
|
|
|
|
#max. serial number must immediately be replace with 20 digits one
|
|
echo -n 1461501637330902918203684832716283019655932542975 > "${CERTSERIAL}"
|
|
|
|
cat <<_EOF_ > "${workdir}/swtpm-localca.options"
|
|
--tpm-manufacturer IBM
|
|
--tpm-model swtpm-libtpms
|
|
--tpm-version 2
|
|
--platform-manufacturer "Fedora XYZ"
|
|
--platform-version 2.1
|
|
--platform-model "QEMU A.B"
|
|
_EOF_
|
|
|
|
export MY_SWTPM_LOCALCA="${SWTPM_LOCALCA}"
|
|
|
|
cat <<_EOF_ > "${workdir}/swtpm_setup.conf"
|
|
create_certs_tool=\${MY_SWTPM_LOCALCA}
|
|
create_certs_tool_config=${workdir}/swtpm-localca.conf
|
|
create_certs_tool_options=${workdir}/swtpm-localca.options
|
|
profile = {"Name": "default-v1"}
|
|
_EOF_
|
|
|
|
# We need to adapt the PATH so the correct swtpm_cert is picked
|
|
export PATH=${TOPBUILD}/src/swtpm_cert:${PATH}
|
|
|
|
keysizes="2048"
|
|
if ${SWTPM_SETUP} \
|
|
--tpm2 \
|
|
--tpm "${SWTPM_EXE} socket ${SWTPM_TEST_SECCOMP_OPT}" \
|
|
--print-capabilities |
|
|
grep -q tpm2-rsa-keysize-3072; then
|
|
keysizes+=" 3072"
|
|
fi
|
|
|
|
for keysize in ${keysizes}; do
|
|
echo "Testing with RSA keysize $keysize"
|
|
# we need to create at least one cert: --create-ek-cert
|
|
if ! ${SWTPM_SETUP} \
|
|
--tpm2 \
|
|
--allow-signing \
|
|
--tpm-state "${workdir}" \
|
|
--create-ek-cert \
|
|
--create-platform-cert \
|
|
--config "${workdir}/swtpm_setup.conf" \
|
|
--logfile "${workdir}/logfile" \
|
|
--tpm "${SWTPM_EXE} socket ${SWTPM_TEST_SECCOMP_OPT}" \
|
|
--rsa-keysize "${keysize}" \
|
|
--overwrite \
|
|
--write-ek-cert-files "${USER_CERTSDIR}";
|
|
then
|
|
echo "Error: Could not run $SWTPM_SETUP."
|
|
echo "Logfile output:"
|
|
cat "${workdir}/logfile"
|
|
exit 1
|
|
fi
|
|
|
|
if [ ! -r "${SIGNINGKEY}" ]; then
|
|
echo "Error: Signingkey file ${SIGNINGKEY} was not created."
|
|
exit 1
|
|
fi
|
|
|
|
if [ ! -r "${ISSUERCERT}" ]; then
|
|
echo "Error: Issuer cert file ${ISSUERCERT} was not created."
|
|
exit 1
|
|
fi
|
|
|
|
if [ ! -r "${CERTSERIAL}" ]; then
|
|
echo "Error: Cert serial number file ${CERTSERIAL} was not created."
|
|
exit 1
|
|
fi
|
|
|
|
tmp=$(cat "${CERTSERIAL}")
|
|
if [ "${#tmp}" -ne 20 ]; then
|
|
echo "Error: Cert serial number in file should now be 20 digits long."
|
|
exit 1
|
|
fi
|
|
|
|
certfile="${USER_CERTSDIR}/ek-rsa${keysize}.crt"
|
|
if [ ! -f "${certfile}" ]; then
|
|
echo "Error: EK file '${certfile}' was not written."
|
|
ls -l "${USER_CERTSDIR}"
|
|
exit 1
|
|
fi
|
|
|
|
if ! $CERTTOOL --inder --infile "${certfile}" -i | grep -q "${keysize} bits"; then
|
|
echo "Error: EK file '${certfile}' is not an RSA ${keysize} bit key."
|
|
$CERTTOOL --inder --infile "${certfile}" -i
|
|
exit 1
|
|
fi
|
|
|
|
rm -rf "${SIGNINGKEY}" "${ISSUERCERT}" "${CERTSERIAL}" "${USER_CERTSDIR}"/ek-*.crt
|
|
done
|
|
|
|
echo "Test 1: OK"
|
|
|
|
function swtpm_setup_reconfigure() {
|
|
local workdir="$1"
|
|
local pwdfile="$2"
|
|
|
|
# Reconfigure the active PCR banks a few times; the size of the state
|
|
# file must not change but its content (hash) must change every time
|
|
# since activating the PCR banks changes a few bits in the permanent
|
|
# state, also when the state is not encrypted.
|
|
local PERMALL_FILE="${workdir}/tpm2-00.permall"
|
|
local permall_hash permall_size newhash newsize
|
|
|
|
permall_size=$(get_filesize "${PERMALL_FILE}")
|
|
|
|
for pcrbanks in "sha256" "sha256,sha384" "sha256,sha384,sha512"; do
|
|
# hash must change between before and after
|
|
permall_hash=$(get_sha1_file "${PERMALL_FILE}")
|
|
|
|
if ! ${SWTPM_SETUP} \
|
|
--tpm2 \
|
|
--tpm-state "${workdir}" \
|
|
--config "${workdir}/swtpm_setup.conf" \
|
|
--logfile "${workdir}/logfile" \
|
|
--tpm "${SWTPM_EXE} socket ${SWTPM_TEST_SECCOMP_OPT}" \
|
|
--pcr-banks "${pcrbanks}" \
|
|
--reconfigure \
|
|
${pwdfile:+--pwdfile "${pwdfile}"};
|
|
then
|
|
echo "Error: Could not run $SWTPM_SETUP --reconfigure."
|
|
echo "Logfile output:"
|
|
cat "${workdir}/logfile"
|
|
exit 1
|
|
fi
|
|
|
|
newhash=$(get_sha1_file "${PERMALL_FILE}")
|
|
if [ "${newhash}" = "${permall_hash}" ]; then
|
|
echo "Error: The hash of the permanent state did not change."
|
|
exit 1
|
|
fi
|
|
|
|
newsize=$(get_filesize "${PERMALL_FILE}")
|
|
if [ "${newsize}" != "${permall_size}" ]; then
|
|
echo "Error: The size of the permanent state file changed."
|
|
echo "Actual : ${newsize}"
|
|
echo "Expected: ${permall_size}"
|
|
exit 1
|
|
fi
|
|
echo "Filesize: ${newsize}; hash: ${newhash}; pwdfile: ${pwdfile}"
|
|
done
|
|
}
|
|
|
|
# Create with certificates with and without encryption enabled and reconfigure
|
|
# the PCR banks
|
|
PWDFILE="${workdir}/pwd"
|
|
echo -n "password" > "${PWDFILE}"
|
|
rm -f "${workdir}/logfile"
|
|
|
|
for pwdfile in "" "${PWDFILE}"; do
|
|
if ! ${SWTPM_SETUP} \
|
|
--tpm2 \
|
|
--ecc \
|
|
--tpm-state "${workdir}" \
|
|
--create-ek-cert \
|
|
--create-platform-cert \
|
|
--config "${workdir}/swtpm_setup.conf" \
|
|
--logfile "${workdir}/logfile" \
|
|
--tpm "${SWTPM_EXE} socket ${SWTPM_TEST_SECCOMP_OPT}" \
|
|
--overwrite \
|
|
--write-ek-cert-files "${workdir}" \
|
|
${pwdfile:+--pwdfile "${pwdfile}"}; then
|
|
echo "Error: Could not run $SWTPM_SETUP."
|
|
echo "Logfile output:"
|
|
cat "${workdir}/logfile"
|
|
exit 1
|
|
fi
|
|
|
|
if [ ! -r "${SIGNINGKEY}" ]; then
|
|
echo "Error: Signingkey file ${SIGNINGKEY} was not created."
|
|
exit 1
|
|
fi
|
|
|
|
if [ ! -r "${ISSUERCERT}" ]; then
|
|
echo "Error: Issuer cert file ${ISSUERCERT} was not created."
|
|
exit 1
|
|
fi
|
|
|
|
if [ ! -r "${CERTSERIAL}" ]; then
|
|
echo "Error: Cert serial number file ${CERTSERIAL} was not created."
|
|
exit 1
|
|
fi
|
|
|
|
certfile="${workdir}/ek-secp384r1.crt"
|
|
if [ ! -f "${certfile}" ]; then
|
|
echo "Error: EK file '${certfile}' was not written."
|
|
ls -l "${workdir}"
|
|
exit 1
|
|
fi
|
|
|
|
if ! $CERTTOOL --inder --infile "${certfile}" -i | grep -q "384 bits"; then
|
|
echo "Error: EK file '${certfile}' is not an ECC 384 bit key."
|
|
$CERTTOOL --inder --infile "${certfile}" -i
|
|
exit 1
|
|
fi
|
|
|
|
swtpm_setup_reconfigure "${workdir}" "${pwdfile}"
|
|
done
|
|
|
|
echo "Test 2: OK"
|
|
|
|
exit 0
|