go-attestation/attest/attest_simulated_tpm20_test.go

217 lines
5.3 KiB
Go
Raw Normal View History

2019-03-28 20:21:16 +00:00
// Copyright 2019 Google Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License"); you may not
// use this file except in compliance with the License. You may obtain a copy of
// the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
// WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
// License for the specific language governing permissions and limitations under
// the License.
// +build !localtest !tpm12
2019-03-28 20:21:16 +00:00
package attest
import (
"bytes"
"crypto"
"testing"
"github.com/google/go-tpm-tools/simulator"
)
func setupSimulatedTPM(t *testing.T) (*simulator.Simulator, *TPM) {
t.Helper()
tpm, err := simulator.Get()
if err != nil {
t.Fatal(err)
}
return tpm, &TPM{
version: TPMVersion20,
interf: TPMInterfaceKernelManaged,
sysPath: "/dev/tpmrm0",
rwc: tpm,
}
}
func TestSimTPM20EK(t *testing.T) {
2019-03-28 20:21:16 +00:00
sim, tpm := setupSimulatedTPM(t)
defer sim.Close()
eks, err := tpm.EKs()
if err != nil {
t.Errorf("EKs() failed: %v", err)
}
if len(eks) == 0 || (eks[0].Public == nil) {
2019-03-28 20:21:16 +00:00
t.Errorf("EKs() = %v, want at least 1 EK with populated fields", eks)
}
}
func TestSimTPM20Info(t *testing.T) {
2019-03-28 20:21:16 +00:00
sim, tpm := setupSimulatedTPM(t)
defer sim.Close()
if _, err := tpm.Info(); err != nil {
2019-03-28 20:21:16 +00:00
t.Errorf("tpm.Info() failed: %v", err)
}
}
func TestSimTPM20AIKCreateAndLoad(t *testing.T) {
2019-03-28 20:21:16 +00:00
sim, tpm := setupSimulatedTPM(t)
defer sim.Close()
aik, err := tpm.MintAIK(nil)
if err != nil {
t.Fatalf("MintAIK() failed: %v", err)
}
enc, err := aik.Marshal()
if err != nil {
aik.Close(tpm)
t.Fatalf("aik.Marshal() failed: %v", err)
}
if err := aik.Close(tpm); err != nil {
t.Fatalf("aik.Close() failed: %v", err)
}
loaded, err := tpm.LoadAIK(enc)
2019-03-28 20:21:16 +00:00
if err != nil {
t.Fatalf("LoadKey() failed: %v", err)
}
defer loaded.Close(tpm)
k1, k2 := aik.aik.(*key20), loaded.aik.(*key20)
if !bytes.Equal(k1.public, k2.public) {
2019-03-28 20:21:16 +00:00
t.Error("Original & loaded AIK public blobs did not match.")
t.Logf("Original = %v", k1.public)
t.Logf("Loaded = %v", k2.public)
2019-03-28 20:21:16 +00:00
}
}
func TestSimTPM20ActivateCredential(t *testing.T) {
2019-03-28 20:21:16 +00:00
sim, tpm := setupSimulatedTPM(t)
defer sim.Close()
aik, err := tpm.MintAIK(nil)
if err != nil {
t.Fatalf("MintAIK() failed: %v", err)
}
defer aik.Close(tpm)
EKs, err := tpm.EKs()
if err != nil {
t.Fatalf("EKs() failed: %v", err)
}
ek := chooseEK(t, EKs)
2019-03-28 20:21:16 +00:00
ap := ActivationParameters{
TPMVersion: TPMVersion20,
AIK: aik.AttestationParameters(),
EK: ek,
2019-03-28 20:21:16 +00:00
}
secret, challenge, err := ap.Generate()
2019-03-28 20:21:16 +00:00
if err != nil {
t.Fatalf("Generate() failed: %v", err)
2019-03-28 20:21:16 +00:00
}
decryptedSecret, err := aik.ActivateCredential(tpm, *challenge)
2019-03-28 20:21:16 +00:00
if err != nil {
t.Errorf("aik.ActivateCredential() failed: %v", err)
}
if !bytes.Equal(secret, decryptedSecret) {
t.Error("secret does not match decrypted secret")
t.Logf("Secret = %v", secret)
t.Logf("Decrypted secret = %v", decryptedSecret)
}
}
func TestParseAIKPublic20(t *testing.T) {
sim, tpm := setupSimulatedTPM(t)
defer sim.Close()
aik, err := tpm.MintAIK(nil)
if err != nil {
t.Fatalf("MintAIK() failed: %v", err)
}
defer aik.Close(tpm)
params := aik.AttestationParameters()
if _, err := ParseAIKPublic(TPMVersion20, params.Public); err != nil {
t.Errorf("parsing AIK public blob: %v", err)
}
}
func TestSimTPM20Quote(t *testing.T) {
2019-03-28 20:21:16 +00:00
sim, tpm := setupSimulatedTPM(t)
defer sim.Close()
aik, err := tpm.MintAIK(nil)
if err != nil {
t.Fatalf("MintAIK() failed: %v", err)
}
defer aik.Close(tpm)
nonce := []byte{1, 2, 3, 4, 5, 6, 7, 8}
quote, err := aik.Quote(tpm, nonce, HashSHA256)
2019-03-28 20:21:16 +00:00
if err != nil {
t.Fatalf("aik.Quote() failed: %v", err)
}
// TODO(jsonp): Parse quote structure once gotpm/tpm2 supports it.
if quote == nil {
t.Error("quote was nil, want *Quote")
}
}
func TestSimTPM20PCRs(t *testing.T) {
2019-03-28 20:21:16 +00:00
sim, tpm := setupSimulatedTPM(t)
defer sim.Close()
PCRs, err := tpm.PCRs(HashSHA256)
2019-03-28 20:21:16 +00:00
if err != nil {
t.Fatalf("PCRs() failed: %v", err)
}
if len(PCRs) != 24 {
t.Errorf("len(PCRs) = %d, want %d", len(PCRs), 24)
}
2019-03-28 20:21:16 +00:00
for i, pcr := range PCRs {
if len(pcr.Digest) != pcr.DigestAlg.Size() {
t.Errorf("PCR %d len(digest) = %d, expected match with digest algorithm size (%d)", pcr.Index, len(pcr.Digest), pcr.DigestAlg.Size())
}
if pcr.Index != i {
t.Errorf("PCR index %d does not match map index %d", pcr.Index, i)
}
if pcr.DigestAlg != crypto.SHA256 {
t.Errorf("pcr.DigestAlg = %v, expected crypto.SHA256", pcr.DigestAlg)
}
}
}
func TestSimTPM20Persistence(t *testing.T) {
2019-03-28 20:21:16 +00:00
sim, tpm := setupSimulatedTPM(t)
defer sim.Close()
ekHnd, _, err := tpm.getPrimaryKeyHandle(commonEkEquivalentHandle)
2019-03-28 20:21:16 +00:00
if err != nil {
t.Fatalf("getPrimaryKeyHandle() failed: %v", err)
}
if ekHnd != commonEkEquivalentHandle {
t.Fatalf("bad EK-equivalent handle: got 0x%x, wanted 0x%x", ekHnd, commonEkEquivalentHandle)
}
ekHnd, p, err := tpm.getPrimaryKeyHandle(commonEkEquivalentHandle)
2019-03-28 20:21:16 +00:00
if err != nil {
t.Fatalf("second getPrimaryKeyHandle() failed: %v", err)
}
if ekHnd != commonEkEquivalentHandle {
t.Fatalf("bad EK-equivalent handle: got 0x%x, wanted 0x%x", ekHnd, commonEkEquivalentHandle)
}
if p {
t.Fatalf("generated a new key the second time; that shouldn't happen")
}
}