mirror of
https://github.com/google/go-attestation.git
synced 2024-12-30 09:48:59 +00:00
39d2f6efff
It's best practice to define as much code, especially exported API, in files that can build on any platform. With as little code as possible in OS specific files. Ensure files with build tags don't contain any exported APIs. This helps us not accidentally define API that only works on one platform, or have incompatible method defintions between OSes. TODO: follow up with an "unsupported" implementation so this builds on Mac or without CGO (e.g. for servers)?
172 lines
3.7 KiB
Go
172 lines
3.7 KiB
Go
// Copyright 2019 Google Inc.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License"); you may not
|
|
// use this file except in compliance with the License. You may obtain a copy of
|
|
// the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
// WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
// License for the specific language governing permissions and limitations under
|
|
// the License.
|
|
|
|
package attest
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/rand"
|
|
"flag"
|
|
"sort"
|
|
"testing"
|
|
)
|
|
|
|
var (
|
|
testTPM12 = flag.Bool("testTPM12", false, "run tests for TPM1.2")
|
|
tpm12config = &OpenConfig{TPMVersion12}
|
|
)
|
|
|
|
func openTPM12(t *testing.T) *TPM {
|
|
if !*testTPM12 {
|
|
t.SkipNow()
|
|
}
|
|
tpm, err := OpenTPM(tpm12config)
|
|
if err != nil {
|
|
t.Fatalf("Failed to open tpm 1.2: %v", err)
|
|
}
|
|
return tpm
|
|
}
|
|
|
|
func TestTPM12Info(t *testing.T) {
|
|
tpm := openTPM12(t)
|
|
defer tpm.Close()
|
|
|
|
Info, err := tpm.Info()
|
|
if err != nil {
|
|
t.Fatalf("Failed to get Vendor info: %v", err)
|
|
}
|
|
|
|
t.Logf("Vendor info: %s\n", Info.VendorInfo)
|
|
}
|
|
|
|
func TestTPM12PCRs(t *testing.T) {
|
|
tpm := openTPM12(t)
|
|
defer tpm.Close()
|
|
|
|
PCRs, err := tpm.PCRs(HashSHA1)
|
|
if err != nil {
|
|
t.Fatalf("Failed to get PCR values: %v", err)
|
|
}
|
|
|
|
var indices []int
|
|
for i, PCR := range PCRs {
|
|
if i != PCR.Index {
|
|
t.Errorf("Index %d does not match the PCRindex %d\n", i, PCR.Index)
|
|
}
|
|
indices = append(indices, i)
|
|
}
|
|
sort.Ints(indices)
|
|
for i := range indices {
|
|
PCR := PCRs[i]
|
|
t.Logf("PCR %v contains value 0x%x, which was caculated using alg %v\n", PCR.Index, bytes.NewBuffer(PCR.Digest), PCR.DigestAlg)
|
|
}
|
|
}
|
|
|
|
func TestTPM12EKs(t *testing.T) {
|
|
tpm := openTPM12(t)
|
|
defer tpm.Close()
|
|
|
|
eks, err := tpm.EKs()
|
|
if err != nil {
|
|
t.Fatalf("Failed to get EKs: %v", err)
|
|
}
|
|
|
|
if len(eks) == 0 {
|
|
t.Fatalf("EKs returned nothing")
|
|
}
|
|
}
|
|
|
|
func TestNewAIK(t *testing.T) {
|
|
tpm := openTPM12(t)
|
|
defer tpm.Close()
|
|
|
|
if _, err := tpm.NewAIK(nil); err != nil {
|
|
t.Fatalf("NewAIK failed: %v", err)
|
|
}
|
|
}
|
|
|
|
func TestTPMQuote(t *testing.T) {
|
|
tpm := openTPM12(t)
|
|
defer tpm.Close()
|
|
|
|
nonce := make([]byte, 20)
|
|
if _, err := rand.Read(nonce); err != nil {
|
|
t.Fatalf("reading nonce: %v", err)
|
|
}
|
|
|
|
aik, err := tpm.NewAIK(nil)
|
|
if err != nil {
|
|
t.Fatalf("NewAIK failed: %v", err)
|
|
}
|
|
|
|
quote, err := aik.Quote(tpm, nonce, HashSHA1)
|
|
if err != nil {
|
|
t.Fatalf("Quote failed: %v", err)
|
|
}
|
|
|
|
t.Logf("Quote{version: %v, quote: %x, signature: %x}\n", quote.Version, quote.Quote, quote.Signature)
|
|
}
|
|
|
|
func TestParseAIKPublic12(t *testing.T) {
|
|
tpm := openTPM12(t)
|
|
defer tpm.Close()
|
|
|
|
aik, err := tpm.NewAIK(nil)
|
|
if err != nil {
|
|
t.Fatalf("NewAIK() failed: %v", err)
|
|
}
|
|
defer aik.Close(tpm)
|
|
params := aik.AttestationParameters()
|
|
if _, err := ParseAIKPublic(TPMVersion12, params.Public); err != nil {
|
|
t.Errorf("parsing AIK public blob: %v", err)
|
|
}
|
|
}
|
|
|
|
func TestTPMActivateCredential(t *testing.T) {
|
|
tpm := openTPM12(t)
|
|
defer tpm.Close()
|
|
|
|
aik, err := tpm.NewAIK(nil)
|
|
if err != nil {
|
|
t.Fatalf("NewAIK failed: %v", err)
|
|
}
|
|
|
|
EKs, err := tpm.EKs()
|
|
if err != nil {
|
|
t.Fatalf("failed to read EKs: %v", err)
|
|
}
|
|
ek := chooseEK(t, EKs)
|
|
|
|
ap := ActivationParameters{
|
|
TPMVersion: TPMVersion12,
|
|
AIK: aik.AttestationParameters(),
|
|
EK: ek,
|
|
}
|
|
secret, challenge, err := ap.Generate()
|
|
if err != nil {
|
|
t.Fatalf("Generate() failed: %v", err)
|
|
}
|
|
|
|
validation, err := aik.ActivateCredential(tpm, *challenge)
|
|
if err != nil {
|
|
t.Fatalf("ActivateCredential failed: %v", err)
|
|
}
|
|
|
|
if !bytes.Equal(validation, secret) {
|
|
t.Errorf("secret mismatch: expected %x, got %x", secret, validation)
|
|
}
|
|
|
|
t.Logf("validation: %x", validation)
|
|
}
|