go-attestation/attest/attest_tpm12_test.go
2019-10-10 14:29:46 -07:00

172 lines
3.7 KiB
Go

// Copyright 2019 Google Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License"); you may not
// use this file except in compliance with the License. You may obtain a copy of
// the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
// WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
// License for the specific language governing permissions and limitations under
// the License.
package attest
import (
"bytes"
"crypto/rand"
"flag"
"sort"
"testing"
)
var (
testTPM12 = flag.Bool("testTPM12", false, "run tests for TPM1.2")
tpm12config = &OpenConfig{TPMVersion12}
)
func openTPM12(t *testing.T) *TPM {
if !*testTPM12 {
t.SkipNow()
}
tpm, err := OpenTPM(tpm12config)
if err != nil {
t.Fatalf("Failed to open tpm 1.2: %v", err)
}
return tpm
}
func TestTPM12Info(t *testing.T) {
tpm := openTPM12(t)
defer tpm.Close()
Info, err := tpm.Info()
if err != nil {
t.Fatalf("Failed to get Vendor info: %v", err)
}
t.Logf("Vendor info: %s\n", Info.VendorInfo)
}
func TestTPM12PCRs(t *testing.T) {
tpm := openTPM12(t)
defer tpm.Close()
PCRs, err := tpm.PCRs(HashSHA1)
if err != nil {
t.Fatalf("Failed to get PCR values: %v", err)
}
var indices []int
for i, PCR := range PCRs {
if i != PCR.Index {
t.Errorf("Index %d does not match the PCRindex %d\n", i, PCR.Index)
}
indices = append(indices, i)
}
sort.Ints(indices)
for i := range indices {
PCR := PCRs[i]
t.Logf("PCR %v contains value 0x%x, which was caculated using alg %v\n", PCR.Index, bytes.NewBuffer(PCR.Digest), PCR.DigestAlg)
}
}
func TestTPM12EKs(t *testing.T) {
tpm := openTPM12(t)
defer tpm.Close()
eks, err := tpm.EKs()
if err != nil {
t.Fatalf("Failed to get EKs: %v", err)
}
if len(eks) == 0 {
t.Fatalf("EKs returned nothing")
}
}
func TestNewAK(t *testing.T) {
tpm := openTPM12(t)
defer tpm.Close()
if _, err := tpm.NewAK(nil); err != nil {
t.Fatalf("NewAK failed: %v", err)
}
}
func TestTPMQuote(t *testing.T) {
tpm := openTPM12(t)
defer tpm.Close()
nonce := make([]byte, 20)
if _, err := rand.Read(nonce); err != nil {
t.Fatalf("reading nonce: %v", err)
}
ak, err := tpm.NewAK(nil)
if err != nil {
t.Fatalf("NewAK failed: %v", err)
}
quote, err := ak.Quote(tpm, nonce, HashSHA1)
if err != nil {
t.Fatalf("Quote failed: %v", err)
}
t.Logf("Quote{version: %v, quote: %x, signature: %x}\n", quote.Version, quote.Quote, quote.Signature)
}
func TestParseAKPublic12(t *testing.T) {
tpm := openTPM12(t)
defer tpm.Close()
ak, err := tpm.NewAK(nil)
if err != nil {
t.Fatalf("NewAK() failed: %v", err)
}
defer ak.Close(tpm)
params := ak.AttestationParameters()
if _, err := ParseAKPublic(TPMVersion12, params.Public); err != nil {
t.Errorf("parsing AK public blob: %v", err)
}
}
func TestTPMActivateCredential(t *testing.T) {
tpm := openTPM12(t)
defer tpm.Close()
ak, err := tpm.NewAK(nil)
if err != nil {
t.Fatalf("NewAK failed: %v", err)
}
EKs, err := tpm.EKs()
if err != nil {
t.Fatalf("failed to read EKs: %v", err)
}
ek := chooseEK(t, EKs)
ap := ActivationParameters{
TPMVersion: TPMVersion12,
AK: ak.AttestationParameters(),
EK: ek,
}
secret, challenge, err := ap.Generate()
if err != nil {
t.Fatalf("Generate() failed: %v", err)
}
validation, err := ak.ActivateCredential(tpm, *challenge)
if err != nil {
t.Fatalf("ActivateCredential failed: %v", err)
}
if !bytes.Equal(validation, secret) {
t.Errorf("secret mismatch: expected %x, got %x", secret, validation)
}
t.Logf("validation: %x", validation)
}