summaryrefslogtreecommitdiff
path: root/src/tspi/tspi_quote.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/tspi/tspi_quote.c')
-rw-r--r--src/tspi/tspi_quote.c217
1 files changed, 217 insertions, 0 deletions
diff --git a/src/tspi/tspi_quote.c b/src/tspi/tspi_quote.c
new file mode 100644
index 0000000..58d5de0
--- /dev/null
+++ b/src/tspi/tspi_quote.c
@@ -0,0 +1,217 @@
+
+/*
+ * Licensed Materials - Property of IBM
+ *
+ * trousers - An open source TCG Software Stack
+ *
+ * (C) Copyright International Business Machines Corp. 2004-2007
+ *
+ */
+
+#include <stdlib.h>
+#include <stdio.h>
+#include <string.h>
+#include <inttypes.h>
+
+#include "trousers/tss.h"
+#include "trousers/trousers.h"
+#include "trousers_types.h"
+#include "spi_utils.h"
+#include "capabilities.h"
+#include "tsplog.h"
+#include "obj.h"
+
+
+TSS_RESULT
+Tspi_TPM_Quote(TSS_HTPM hTPM, /* in */
+ TSS_HKEY hIdentKey, /* in */
+ TSS_HPCRS hPcrComposite, /* in */
+ TSS_VALIDATION * pValidationData) /* in, out */
+{
+ TCPA_RESULT result;
+ TPM_AUTH privAuth;
+ TPM_AUTH *pPrivAuth = &privAuth;
+ UINT64 offset;
+ TCPA_DIGEST digest;
+ TCS_KEY_HANDLE tcsKeyHandle;
+ TSS_HPOLICY hPolicy;
+ TCPA_NONCE antiReplay;
+ UINT32 pcrDataSize;
+ BYTE pcrData[128];
+ UINT32 validationLength = 0;
+ BYTE *validationData = NULL;
+ UINT32 pcrDataOutSize;
+ BYTE *pcrDataOut;
+ UINT32 keyDataSize;
+ BYTE *keyData;
+ TSS_KEY keyContainer;
+ BYTE quoteinfo[1024];
+ TSS_BOOL usesAuth;
+ TSS_HCONTEXT tspContext;
+ TCPA_VERSION version = {1, 1, 0, 0};
+ Trspi_HashCtx hashCtx;
+
+ if ((result = obj_tpm_get_tsp_context(hTPM, &tspContext)))
+ return result;
+
+ if (hPcrComposite && !obj_is_pcrs(hPcrComposite))
+ return TSPERR(TSS_E_INVALID_HANDLE);
+
+ /* get the identKey Policy */
+ if ((result = obj_rsakey_get_policy(hIdentKey, TSS_POLICY_USAGE, &hPolicy, &usesAuth)))
+ return result;
+
+ /* get the Identity TCS keyHandle */
+ if ((result = obj_rsakey_get_tcs_handle(hIdentKey, &tcsKeyHandle)))
+ return result;
+
+ if (pValidationData == NULL) {
+ if ((result = get_local_random(tspContext, FALSE, sizeof(TCPA_NONCE),
+ (BYTE **)antiReplay.nonce)))
+ return result;
+ } else {
+ if (pValidationData->ulExternalDataLength < sizeof(antiReplay.nonce))
+ return TSPERR(TSS_E_BAD_PARAMETER);
+
+ memcpy(antiReplay.nonce, pValidationData->rgbExternalData,
+ sizeof(antiReplay.nonce));
+ }
+
+ pcrDataSize = 0;
+ if (hPcrComposite) {
+ if ((result = obj_pcrs_get_selection(hPcrComposite, &pcrDataSize, pcrData)))
+ return result;
+ }
+
+ result = Trspi_HashInit(&hashCtx, TSS_HASH_SHA1);
+ result |= Trspi_Hash_UINT32(&hashCtx, TPM_ORD_Quote);
+ result |= Trspi_HashUpdate(&hashCtx, TPM_SHA1_160_HASH_LEN, antiReplay.nonce);
+ result |= Trspi_HashUpdate(&hashCtx, pcrDataSize, pcrData);
+ if ((result |= Trspi_HashFinal(&hashCtx, digest.digest)))
+ return result;
+
+ if (usesAuth) {
+ if ((result = secret_PerformAuth_OIAP(hIdentKey, TPM_ORD_Quote, hPolicy, FALSE,
+ &digest, &privAuth))) {
+ return result;
+ }
+ pPrivAuth = &privAuth;
+ } else {
+ pPrivAuth = NULL;
+ }
+
+ if ((result = TCS_API(tspContext)->Quote(tspContext, tcsKeyHandle, &antiReplay, pcrDataSize,
+ pcrData, pPrivAuth, &pcrDataOutSize, &pcrDataOut,
+ &validationLength, &validationData)))
+ return result;
+
+ result = Trspi_HashInit(&hashCtx, TSS_HASH_SHA1);
+ result |= Trspi_Hash_UINT32(&hashCtx, result);
+ result |= Trspi_Hash_UINT32(&hashCtx, TPM_ORD_Quote);
+ result |= Trspi_HashUpdate(&hashCtx, pcrDataOutSize, pcrDataOut);
+ result |= Trspi_Hash_UINT32(&hashCtx, validationLength);
+ result |= Trspi_HashUpdate(&hashCtx, validationLength, validationData);
+ if ((result |= Trspi_HashFinal(&hashCtx, digest.digest)))
+ return result;
+
+ if (usesAuth == TRUE) {
+ if ((result = obj_policy_validate_auth_oiap(hPolicy, &digest, &privAuth))) {
+ free(pcrDataOut);
+ free(validationData);
+ return result;
+ }
+ }
+
+ if (hPcrComposite) {
+ TCPA_PCR_COMPOSITE pcrComp;
+
+ offset = 0;
+ if ((result = Trspi_UnloadBlob_PCR_COMPOSITE(&offset, pcrDataOut, &pcrComp))) {
+ free(pcrDataOut);
+ free(validationData);
+ return result;
+ }
+
+ if ((result = obj_pcrs_set_values(hPcrComposite, &pcrComp))) {
+ free(pcrDataOut);
+ free(validationData);
+ return result;
+ }
+ }
+
+ if ((result = Tspi_GetAttribData(hIdentKey, TSS_TSPATTRIB_KEY_BLOB,
+ TSS_TSPATTRIB_KEYBLOB_BLOB, &keyDataSize, &keyData))) {
+ free(pcrDataOut);
+ free(validationData);
+ return result;
+ }
+
+ /* create the validation data */
+ offset = 0;
+ memset(&keyContainer, 0, sizeof(TSS_KEY));
+ if ((result = UnloadBlob_TSS_KEY(&offset, keyData, &keyContainer)))
+ return result;
+
+ /* creating pcrCompositeHash */
+ Trspi_Hash(TSS_HASH_SHA1, pcrDataOutSize, pcrDataOut, digest.digest);
+ free(pcrDataOut);
+
+ /* generate Quote_info struct */
+ /* 1. add version */
+ offset = 0;
+ if (keyContainer.hdr.key12.tag == TPM_TAG_KEY12)
+ Trspi_LoadBlob_TCPA_VERSION(&offset, quoteinfo, version);
+ else
+ Trspi_LoadBlob_TCPA_VERSION(&offset, quoteinfo, keyContainer.hdr.key11.ver);
+ /* 2. add "QUOT" */
+ quoteinfo[offset++] = 'Q';
+ quoteinfo[offset++] = 'U';
+ quoteinfo[offset++] = 'O';
+ quoteinfo[offset++] = 'T';
+ /* 3. Composite Hash */
+ Trspi_LoadBlob(&offset, TCPA_SHA1_160_HASH_LEN, quoteinfo,
+ digest.digest);
+ /* 4. AntiReplay Nonce */
+ Trspi_LoadBlob(&offset, TCPA_SHA1_160_HASH_LEN, quoteinfo,
+ antiReplay.nonce);
+
+ if (pValidationData == NULL) {
+ /* validate the data here */
+ Trspi_Hash(TSS_HASH_SHA1, offset, quoteinfo, digest.digest);
+
+ if ((result = Trspi_Verify(TSS_HASH_SHA1, digest.digest, 20,
+ keyContainer.pubKey.key,
+ keyContainer.pubKey.keyLength,
+ validationData,
+ validationLength))) {
+ free_key_refs(&keyContainer);
+ free(validationData);
+ return result;
+ }
+ free_key_refs(&keyContainer);
+ } else {
+ free_key_refs(&keyContainer);
+
+ pValidationData->rgbValidationData = calloc_tspi(tspContext, validationLength);
+ if (pValidationData->rgbValidationData == NULL) {
+ LogError("malloc of %u bytes failed.", validationLength);
+ return TSPERR(TSS_E_OUTOFMEMORY);
+ }
+ pValidationData->ulValidationDataLength = validationLength;
+ memcpy(pValidationData->rgbValidationData, validationData, validationLength);
+ free(validationData);
+
+ pValidationData->rgbData = calloc_tspi(tspContext, offset);
+ if (pValidationData->rgbData == NULL) {
+ LogError("malloc of %" PRIu64 " bytes failed.", offset);
+ free_tspi(tspContext, pValidationData->rgbValidationData);
+ pValidationData->rgbValidationData = NULL;
+ pValidationData->ulValidationDataLength = 0;
+ return TSPERR(TSS_E_OUTOFMEMORY);
+ }
+ pValidationData->ulDataLength = (UINT32)offset;
+ memcpy(pValidationData->rgbData, quoteinfo, offset);
+ }
+
+ return TSS_SUCCESS;
+}