summaryrefslogtreecommitdiff
path: root/src/tspi/obj_tpm.c
diff options
context:
space:
mode:
authorIgor Pashev <pashev.igor@gmail.com>2012-11-25 14:36:20 +0000
committerIgor Pashev <pashev.igor@gmail.com>2012-11-25 14:36:20 +0000
commitc3649a2def02c41d837ae1f79dda729ccb91e677 (patch)
treebea46dff212fdef977fe9094a70a939e8cc21885 /src/tspi/obj_tpm.c
downloadtrousers-upstream.tar.gz
Imported Upstream version 0.3.9upstream/0.3.9upstream
Diffstat (limited to 'src/tspi/obj_tpm.c')
-rw-r--r--src/tspi/obj_tpm.c531
1 files changed, 531 insertions, 0 deletions
diff --git a/src/tspi/obj_tpm.c b/src/tspi/obj_tpm.c
new file mode 100644
index 0000000..586b875
--- /dev/null
+++ b/src/tspi/obj_tpm.c
@@ -0,0 +1,531 @@
+
+/*
+ * Licensed Materials - Property of IBM
+ *
+ * trousers - An open source TCG Software Stack
+ *
+ * (C) Copyright International Business Machines Corp. 2005, 2007
+ *
+ */
+
+
+#include <stdlib.h>
+#include <stdio.h>
+#include <errno.h>
+#include <string.h>
+
+#include "trousers/tss.h"
+#include "trousers/trousers.h"
+#include "trousers_types.h"
+#include "spi_utils.h"
+#include "capabilities.h"
+#include "tsplog.h"
+#include "obj.h"
+
+void
+tpm_free(void *data)
+{
+ struct tr_tpm_obj *tpm = (struct tr_tpm_obj *)data;
+
+ free(tpm);
+}
+
+TSS_RESULT
+obj_tpm_add(TSS_HCONTEXT tspContext, TSS_HOBJECT *phObject)
+{
+ TSS_RESULT result;
+ struct tr_tpm_obj *tpm = calloc(1, sizeof(struct tr_tpm_obj));
+
+ if (tpm == NULL) {
+ LogError("malloc of %zd bytes failed.",
+ sizeof(struct tr_tpm_obj));
+ return TSPERR(TSS_E_OUTOFMEMORY);
+ }
+
+ /* add usage policy */
+ if ((result = obj_policy_add(tspContext, TSS_POLICY_USAGE,
+ &tpm->policy))) {
+ free(tpm);
+ return result;
+ }
+
+ /* initialize the default ctr_id to inactive until we query the TPM */
+ tpm->ctr_id = 0xffffffff;
+
+ if ((result = obj_list_add(&tpm_list, tspContext, 0, tpm, phObject))) {
+ free(tpm);
+ return result;
+ }
+
+ return TSS_SUCCESS;
+}
+
+TSS_BOOL
+obj_is_tpm(TSS_HOBJECT hObject)
+{
+ TSS_BOOL answer = FALSE;
+
+ if ((obj_list_get_obj(&tpm_list, hObject))) {
+ answer = TRUE;
+ obj_list_put(&tpm_list);
+ }
+
+ return answer;
+}
+
+TSS_RESULT
+obj_tpm_set_policy(TSS_HTPM hTpm, TSS_HPOLICY hPolicy)
+{
+ struct tsp_object *obj;
+ struct tr_tpm_obj *tpm;
+ UINT32 policyType;
+ TSS_RESULT result = TSS_SUCCESS;
+
+ if ((result = obj_policy_get_type(hPolicy, &policyType)))
+ return result;
+
+ if ((obj = obj_list_get_obj(&tpm_list, hTpm)) == NULL)
+ return TSPERR(TSS_E_INVALID_HANDLE);
+
+ tpm = (struct tr_tpm_obj *)obj->data;
+
+ switch (policyType) {
+ case TSS_POLICY_USAGE:
+ tpm->policy = hPolicy;
+ break;
+#ifdef TSS_BUILD_TSS12
+ case TSS_POLICY_OPERATOR:
+ tpm->operatorPolicy = hPolicy;
+ break;
+#endif
+ default:
+ result = TSPERR(TSS_E_BAD_PARAMETER);
+ }
+
+ obj_list_put(&tpm_list);
+
+ return result;
+}
+
+TSS_RESULT
+obj_tpm_get_policy(TSS_HTPM hTpm, UINT32 policyType, TSS_HPOLICY *phPolicy)
+{
+ struct tsp_object *obj;
+ struct tr_tpm_obj *tpm;
+ TSS_RESULT result = TSS_SUCCESS;
+
+ if ((obj = obj_list_get_obj(&tpm_list, hTpm)) == NULL)
+ return TSPERR(TSS_E_INVALID_HANDLE);
+
+ tpm = (struct tr_tpm_obj *)obj->data;
+
+ switch (policyType) {
+ case TSS_POLICY_USAGE:
+ *phPolicy = tpm->policy;
+ break;
+#ifdef TSS_BUILD_TSS12
+ case TSS_POLICY_OPERATOR:
+ *phPolicy = tpm->operatorPolicy;
+ break;
+#endif
+ default:
+ result = TSPERR(TSS_E_BAD_PARAMETER);
+ }
+
+ obj_list_put(&tpm_list);
+
+ return result;
+}
+
+TSS_RESULT
+obj_tpm_get_tsp_context(TSS_HTPM hTpm, TSS_HCONTEXT *tspContext)
+{
+ struct tsp_object *obj;
+
+ if ((obj = obj_list_get_obj(&tpm_list, hTpm)) == NULL)
+ return TSPERR(TSS_E_INVALID_HANDLE);
+
+ *tspContext = obj->tspContext;
+
+ obj_list_put(&tpm_list);
+
+ return TSS_SUCCESS;
+}
+
+TSS_RESULT
+obj_tpm_get(TSS_HCONTEXT tspContext, TSS_HTPM *phTpm)
+{
+ struct tsp_object *obj;
+
+ if ((obj = obj_list_get_tspcontext(&tpm_list, tspContext)) == NULL)
+ return TSPERR(TSS_E_INVALID_HANDLE);
+
+ *phTpm = obj->handle;
+
+ obj_list_put(&tpm_list);
+
+ return TSS_SUCCESS;
+}
+
+TSS_RESULT
+obj_tpm_get_cb11(TSS_HTPM hTpm, TSS_FLAG type, UINT32 *cb)
+{
+#ifndef __LP64__
+ struct tsp_object *obj;
+ struct tr_tpm_obj *tpm;
+ TSS_RESULT result = TSS_SUCCESS;
+
+ if ((obj = obj_list_get_obj(&tpm_list, hTpm)) == NULL)
+ return TSPERR(TSS_E_INVALID_HANDLE);
+
+ tpm = (struct tr_tpm_obj *)obj->data;
+
+ switch (type) {
+ case TSS_TSPATTRIB_TPM_CALLBACK_COLLATEIDENTITY:
+ *cb = (UINT32)tpm->Tspicb_CollateIdentity;
+ break;
+ case TSS_TSPATTRIB_TPM_CALLBACK_ACTIVATEIDENTITY:
+ *cb = (UINT32)tpm->Tspicb_ActivateIdentity;
+ break;
+ default:
+ result = TSPERR(TSS_E_INVALID_ATTRIB_FLAG);
+ break;
+ }
+
+ obj_list_put(&tpm_list);
+
+ return result;
+#else
+ return TSPERR(TSS_E_FAIL);
+#endif
+}
+
+TSS_RESULT
+obj_tpm_set_cb11(TSS_HTPM hTpm, TSS_FLAG type, TSS_FLAG app_data, UINT32 cb)
+{
+#ifndef __LP64__
+ struct tsp_object *obj;
+ struct tr_tpm_obj *tpm;
+ TSS_RESULT result = TSS_SUCCESS;
+
+ if ((obj = obj_list_get_obj(&tpm_list, hTpm)) == NULL)
+ return TSPERR(TSS_E_INVALID_HANDLE);
+
+ tpm = (struct tr_tpm_obj *)obj->data;
+
+ switch (type) {
+ case TSS_TSPATTRIB_TPM_CALLBACK_COLLATEIDENTITY:
+ tpm->Tspicb_CollateIdentity = (PVOID)cb;
+ tpm->collateAppData = (PVOID)app_data;
+ break;
+ case TSS_TSPATTRIB_TPM_CALLBACK_ACTIVATEIDENTITY:
+ tpm->Tspicb_ActivateIdentity = (PVOID)cb;
+ tpm->activateAppData = (PVOID)app_data;
+ break;
+ default:
+ result = TSPERR(TSS_E_INVALID_ATTRIB_FLAG);
+ break;
+ }
+
+ obj_list_put(&tpm_list);
+
+ return result;
+#else
+ return TSPERR(TSS_E_FAIL);
+#endif
+}
+
+TSS_RESULT
+obj_tpm_set_cred(TSS_HTPM hTpm, TSS_FLAG type, UINT32 CredSize, BYTE *CredData)
+{
+ struct tsp_object *obj;
+ struct tr_tpm_obj *tpm;
+ TSS_RESULT result = TSS_SUCCESS;
+
+ if ((obj = obj_list_get_obj(&tpm_list, hTpm)) == NULL)
+ return TSPERR(TSS_E_INVALID_HANDLE);
+
+ tpm = (struct tr_tpm_obj *)obj->data;
+
+ switch (type) {
+ case TSS_TPMATTRIB_EKCERT:
+ if ((tpm->EndorsementCred = malloc(CredSize)) == NULL) {
+ LogError("malloc of %u bytes failed", CredSize);
+ result = TSPERR(TSS_E_OUTOFMEMORY);
+ goto done;
+ }
+ memcpy(tpm->EndorsementCred, CredData, CredSize);
+ tpm->EndorsementCredSize = CredSize;
+ break;
+ case TSS_TPMATTRIB_TPM_CC:
+ if ((tpm->ConformanceCred = malloc(CredSize)) == NULL) {
+ LogError("malloc of %u bytes failed", CredSize);
+ result = TSPERR(TSS_E_OUTOFMEMORY);
+ goto done;
+ }
+ memcpy(tpm->ConformanceCred, CredData, CredSize);
+ tpm->ConformanceCredSize = CredSize;
+ break;
+ case TSS_TPMATTRIB_PLATFORMCERT:
+ if ((tpm->PlatformCred = malloc(CredSize)) == NULL) {
+ LogError("malloc of %u bytes failed", CredSize);
+ result = TSPERR(TSS_E_OUTOFMEMORY);
+ goto done;
+ }
+ memcpy(tpm->PlatformCred, CredData, CredSize);
+ tpm->PlatformCredSize = CredSize;
+ break;
+ case TSS_TPMATTRIB_PLATFORM_CC:
+ if ((tpm->PlatformConfCred = malloc(CredSize)) == NULL) {
+ LogError("malloc of %u bytes failed", CredSize);
+ result = TSPERR(TSS_E_OUTOFMEMORY);
+ goto done;
+ }
+ memcpy(tpm->PlatformConfCred, CredData, CredSize);
+ tpm->PlatformConfCredSize = CredSize;
+ break;
+ default:
+ result = TSPERR(TSS_E_INVALID_ATTRIB_FLAG);
+ break;
+ }
+done:
+ obj_list_put(&tpm_list);
+
+ return result;
+}
+
+TSS_RESULT
+obj_tpm_get_cred(TSS_HTPM hTpm, TSS_FLAG type, UINT32 *CredSize, BYTE **CredData)
+{
+ struct tsp_object *obj;
+ struct tr_tpm_obj *tpm;
+ TSS_RESULT result = TSS_SUCCESS;
+
+ if ((obj = obj_list_get_obj(&tpm_list, hTpm)) == NULL)
+ return TSPERR(TSS_E_INVALID_HANDLE);
+
+ tpm = (struct tr_tpm_obj *)obj->data;
+
+ /* get the size of data we need to allocate */
+ switch (type) {
+ case TSS_TPMATTRIB_EKCERT:
+ *CredSize = tpm->EndorsementCredSize;
+ break;
+ case TSS_TPMATTRIB_TPM_CC:
+ *CredSize = tpm->ConformanceCredSize;
+ break;
+ case TSS_TPMATTRIB_PLATFORMCERT:
+ *CredSize = tpm->PlatformCredSize;
+ break;
+ case TSS_TPMATTRIB_PLATFORM_CC:
+ *CredSize = tpm->PlatformConfCredSize;
+ break;
+ default:
+ LogError("Credential type is unknown");
+ result = TSPERR(TSS_E_INTERNAL_ERROR);
+ goto done;
+ }
+
+ if (*CredSize == 0) {
+ *CredData = NULL;
+ goto done;
+ }
+
+ if ((*CredData = calloc_tspi(obj->tspContext, *CredSize)) == NULL) {
+ *CredSize = 0;
+ result = TSPERR(TSS_E_OUTOFMEMORY);
+ goto done;
+ }
+
+ switch (type) {
+ case TSS_TPMATTRIB_EKCERT:
+ memcpy(*CredData, tpm->EndorsementCred, *CredSize);
+ break;
+ case TSS_TPMATTRIB_TPM_CC:
+ memcpy(*CredData, tpm->ConformanceCred, *CredSize);
+ break;
+ case TSS_TPMATTRIB_PLATFORMCERT:
+ memcpy(*CredData, tpm->PlatformCred, *CredSize);
+ break;
+ case TSS_TPMATTRIB_PLATFORM_CC:
+ memcpy(*CredData, tpm->PlatformConfCred, *CredSize);
+ break;
+ default:
+ result = TSPERR(TSS_E_BAD_PARAMETER);
+ *CredSize = 0;
+ free(*CredData);
+ *CredData = NULL;
+ break;
+ }
+
+done:
+ obj_list_put(&tpm_list);
+ return result;
+}
+
+TSS_RESULT
+obj_tpm_set_cb12(TSS_HTPM hTpm, TSS_FLAG flag, BYTE *in)
+{
+ struct tsp_object *obj;
+ struct tr_tpm_obj *tpm;
+ TSS_RESULT result = TSS_SUCCESS;
+ TSS_CALLBACK *cb = (TSS_CALLBACK *)in;
+
+ if ((obj = obj_list_get_obj(&tpm_list, hTpm)) == NULL)
+ return TSPERR(TSS_E_INVALID_HANDLE);
+
+ tpm = (struct tr_tpm_obj *)obj->data;
+
+ switch (flag) {
+ case TSS_TSPATTRIB_TPM_CALLBACK_COLLATEIDENTITY:
+ if (!cb) {
+ tpm->Tspicb_CollateIdentity = NULL;
+ break;
+ }
+
+ tpm->Tspicb_CollateIdentity = (TSS_RESULT (*)(PVOID,
+ UINT32, BYTE *, TSS_ALGORITHM_ID, UINT32 *,
+ BYTE *, UINT32 *, BYTE *))cb->callback;
+ tpm->collateAppData = cb->appData;
+ tpm->collateAlg = cb->alg;
+ break;
+ case TSS_TSPATTRIB_TPM_CALLBACK_ACTIVATEIDENTITY:
+ if (!cb) {
+ tpm->Tspicb_ActivateIdentity = NULL;
+ break;
+ }
+
+ tpm->Tspicb_ActivateIdentity = (TSS_RESULT (*)(PVOID,
+ UINT32, BYTE *, UINT32, BYTE *, UINT32 *,
+ BYTE *))cb->callback;
+ tpm->activateAppData = cb->appData;
+ tpm->activateAlg = cb->alg;
+ break;
+ default:
+ result = TSPERR(TSS_E_INVALID_ATTRIB_FLAG);
+ break;
+ }
+
+ obj_list_put(&tpm_list);
+
+ return result;
+}
+
+TSS_RESULT
+obj_tpm_get_cb12(TSS_HTPM hTpm, TSS_FLAG flag, UINT32 *size, BYTE **out)
+{
+ struct tsp_object *obj;
+ struct tr_tpm_obj *tpm;
+ TSS_RESULT result = TSS_SUCCESS;
+ TSS_CALLBACK *cb;
+
+ if ((obj = obj_list_get_obj(&tpm_list, hTpm)) == NULL)
+ return TSPERR(TSS_E_INVALID_HANDLE);
+
+ tpm = (struct tr_tpm_obj *)obj->data;
+
+ if ((cb = calloc_tspi(obj->tspContext, sizeof(TSS_CALLBACK))) == NULL) {
+ LogError("malloc of %zd bytes failed.", sizeof(TSS_CALLBACK));
+ result = TSPERR(TSS_E_OUTOFMEMORY);
+ goto done;
+ }
+
+ switch (flag) {
+ case TSS_TSPATTRIB_TPM_CALLBACK_COLLATEIDENTITY:
+ cb->callback = tpm->Tspicb_CollateIdentity;
+ cb->appData = tpm->collateAppData;
+ cb->alg = tpm->collateAlg;
+ *size = sizeof(TSS_CALLBACK);
+ *out = (BYTE *)cb;
+ break;
+ case TSS_TSPATTRIB_TPM_CALLBACK_ACTIVATEIDENTITY:
+ cb->callback = tpm->Tspicb_ActivateIdentity;
+ cb->appData = tpm->activateAppData;
+ cb->alg = tpm->activateAlg;
+ *size = sizeof(TSS_CALLBACK);
+ *out = (BYTE *)cb;
+ break;
+ default:
+ free_tspi(obj->tspContext, cb);
+ result = TSPERR(TSS_E_INVALID_ATTRIB_FLAG);
+ break;
+ }
+done:
+ obj_list_put(&tpm_list);
+
+ return result;
+}
+
+void
+obj_tpm_remove_policy_refs(TSS_HPOLICY hPolicy, TSS_HCONTEXT tspContext)
+{
+ struct tsp_object *obj;
+ struct obj_list *list = &tpm_list;
+ struct tr_tpm_obj *tpm;
+
+ pthread_mutex_lock(&list->lock);
+
+ for (obj = list->head; obj; obj = obj->next) {
+ if (obj->tspContext != tspContext)
+ continue;
+
+ tpm = (struct tr_tpm_obj *)obj->data;
+ if (tpm->policy == hPolicy)
+ tpm->policy = NULL_HPOLICY;
+#ifdef TSS_BUILD_TSS12
+ if (tpm->operatorPolicy == hPolicy)
+ tpm->operatorPolicy = NULL_HPOLICY;
+#endif
+ }
+
+ pthread_mutex_unlock(&list->lock);
+}
+
+#ifdef TSS_BUILD_COUNTER
+TSS_RESULT
+obj_tpm_get_current_counter(TSS_HTPM hTPM, TSS_COUNTER_ID *ctr_id)
+{
+ struct tsp_object *obj;
+ struct tr_tpm_obj *tpm;
+ TSS_RESULT result = TSS_SUCCESS;
+ UINT32 respLen, subCap = endian32(TPM_CAP_PROP_ACTIVE_COUNTER);
+ BYTE *resp;
+
+ if ((obj = obj_list_get_obj(&tpm_list, hTPM)) == NULL)
+ return TSPERR(TSS_E_INVALID_HANDLE);
+
+ tpm = (struct tr_tpm_obj *)obj->data;
+
+ if (tpm->ctr_id != 0xffffffff) {
+ *ctr_id = tpm->ctr_id;
+ goto done;
+ }
+
+ /* No counter has yet been associated with the TPM object, so let the TPM object lock
+ * protect us here and get a counter ID */
+ if ((result = TCS_API(obj->tspContext)->GetTPMCapability(obj->tspContext, TPM_CAP_PROPERTY,
+ sizeof(UINT32), (BYTE *)&subCap,
+ &respLen, &resp)))
+ goto done;
+
+ if (respLen != sizeof(UINT32)) {
+ LogDebug("TPM GetCap response size isn't sizeof(UINT32)!");
+ result = TSPERR(TSS_E_INTERNAL_ERROR);
+ goto done;
+ }
+
+ memcpy(&tpm->ctr_id, resp, respLen);
+ free(resp);
+
+ if (tpm->ctr_id == 0xffffffff) {
+ result = TSPERR(TSS_E_NO_ACTIVE_COUNTER);
+ goto done;
+ }
+ *ctr_id = tpm->ctr_id;
+done:
+ obj_list_put(&tpm_list);
+
+ return result;
+}
+#endif
+