tpm_extendpcr: Extend digests into a TPM PCR

This commit is contained in:
Andreas Steffen 2017-12-12 17:42:08 +01:00
parent 5d3eb57cfd
commit 0fb293fc91
7 changed files with 424 additions and 4 deletions

View File

@ -1991,6 +1991,7 @@ AC_CONFIG_FILES([
src/_copyright/Makefile
src/scepclient/Makefile
src/aikgen/Makefile
src/tpm_extendpcr/Makefile
src/pki/Makefile
src/pki/man/Makefile
src/pool/Makefile

View File

@ -143,3 +143,7 @@ endif
if USE_AIKGEN
SUBDIRS += aikgen
endif
if USE_TPM
SUBDIRS += tpm_extendpcr
endif

View File

@ -48,5 +48,3 @@ if MONOLITHIC
libtpmtss_la_LIBADD += plugins/tpm/libstrongswan-tpm.la
endif
endif

View File

@ -604,8 +604,93 @@ METHOD(tpm_tss_t, extend_pcr, bool,
private_tpm_tss_tss2_t *this, uint32_t pcr_num, chunk_t *pcr_value,
chunk_t data, hash_algorithm_t alg)
{
/* TODO */
return FALSE;
uint32_t rval;
TPM_ALG_ID alg_id;
TPML_DIGEST_VALUES digest_values;
TPMS_AUTH_COMMAND session_data_cmd;
TPMS_AUTH_RESPONSE session_data_rsp;
TSS2_SYS_CMD_AUTHS sessions_data_cmd;
TSS2_SYS_RSP_AUTHS sessions_data_rsp;
TPMS_AUTH_COMMAND *session_data_cmd_array[1];
TPMS_AUTH_RESPONSE *session_data_rsp_array[1];
session_data_cmd_array[0] = &session_data_cmd;
session_data_rsp_array[0] = &session_data_rsp;
sessions_data_cmd.cmdAuths = &session_data_cmd_array[0];
sessions_data_rsp.rspAuths = &session_data_rsp_array[0];
sessions_data_cmd.cmdAuthsCount = 1;
sessions_data_rsp.rspAuthsCount = 1;
session_data_cmd.sessionHandle = TPM_RS_PW;
session_data_cmd.hmac.t.size = 0;
session_data_cmd.nonce.t.size = 0;
*( (uint8_t *)((void *)&session_data_cmd.sessionAttributes ) ) = 0;
/* check if hash algorithm is supported by TPM */
alg_id = hash_alg_to_tpm_alg_id(alg);
if (!is_supported_alg(this, alg_id))
{
DBG1(DBG_PTS, "%s %N hash algorithm not supported by TPM",
LABEL, hash_algorithm_short_names, alg);
return FALSE;
}
digest_values.count = 1;
digest_values.digests[0].hashAlg = alg_id;
switch (alg)
{
case HASH_SHA1:
if (data.len != HASH_SIZE_SHA1)
{
return FALSE;
}
memcpy(digest_values.digests[0].digest.sha1, data.ptr,
HASH_SIZE_SHA1);
break;
case HASH_SHA256:
if (data.len != HASH_SIZE_SHA256)
{
return FALSE;
}
memcpy(digest_values.digests[0].digest.sha256, data.ptr,
HASH_SIZE_SHA256);
break;
case HASH_SHA384:
if (data.len != HASH_SIZE_SHA384)
{
return FALSE;
}
memcpy(digest_values.digests[0].digest.sha384, data.ptr,
HASH_SIZE_SHA384);
break;
case HASH_SHA512:
if (data.len != HASH_SIZE_SHA512)
{
return FALSE;
}
memcpy(digest_values.digests[0].digest.sha512, data.ptr,
HASH_SIZE_SHA512);
break;
default:
return FALSE;
}
/* extend PCR */
rval = Tss2_Sys_PCR_Extend(this->sys_context, pcr_num, &sessions_data_cmd,
&digest_values, &sessions_data_rsp);
if (rval != TPM_RC_SUCCESS)
{
DBG1(DBG_PTS, "%s PCR %02u could not be extended: 0x%06x",
LABEL, pcr_num, rval);
return FALSE;
}
/* get updated PCR value */
return read_pcr(this, pcr_num, pcr_value, alg);
}
METHOD(tpm_tss_t, quote, bool,

1
src/tpm_extendpcr/.gitignore vendored Normal file
View File

@ -0,0 +1 @@
tpm_extendpcr

View File

@ -0,0 +1,14 @@
bin_PROGRAMS = tpm_extendpcr
tpm_extendpcr_SOURCES = tpm_extendpcr.c
tpm_extendpcr_LDADD = \
$(top_builddir)/src/libstrongswan/libstrongswan.la \
$(top_builddir)/src/libtpmtss/libtpmtss.la
tpm_extendpcr.o : $(top_builddir)/config.status
AM_CPPFLAGS = \
-I$(top_srcdir)/src/libstrongswan \
-I$(top_srcdir)/src/libtpmtss \
-DIPSEC_CONFDIR=\"${sysconfdir}\"

View File

@ -0,0 +1,317 @@
/*
* Copyright (C) 2017 Andreas Steffen
* HSR Hochschule fuer Technik Rapperswil
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the
* Free Software Foundation; either version 2 of the License, or (at your
* option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
*/
#include <tpm_tss.h>
#include <library.h>
#include <crypto/hashers/hasher.h>
#include <utils/debug.h>
#include <syslog.h>
#include <getopt.h>
#include <errno.h>
/* logging */
static bool log_to_stderr = TRUE;
static bool log_to_syslog = TRUE;
static level_t default_loglevel = 1;
/* global variables */
tpm_tss_t *tpm;
chunk_t digest;
chunk_t pcr_value;
/**
* logging function for tpm_extendpcr
*/
static void tpm_extendpcr_dbg(debug_t group, level_t level, char *fmt, ...)
{
char buffer[8192];
char *current = buffer, *next;
va_list args;
if (level <= default_loglevel)
{
if (log_to_stderr)
{
va_start(args, fmt);
vfprintf(stderr, fmt, args);
va_end(args);
fprintf(stderr, "\n");
}
if (log_to_syslog)
{
/* write in memory buffer first */
va_start(args, fmt);
vsnprintf(buffer, sizeof(buffer), fmt, args);
va_end(args);
/* do a syslog with every line */
while (current)
{
next = strchr(current, '\n');
if (next)
{
*(next++) = '\0';
}
syslog(LOG_INFO, "%s\n", current);
current = next;
}
}
}
}
/**
* Initialize logging to stderr/syslog
*/
static void init_log(const char *program)
{
dbg = tpm_extendpcr_dbg;
if (log_to_stderr)
{
setbuf(stderr, NULL);
}
if (log_to_syslog)
{
openlog(program, LOG_CONS | LOG_NDELAY | LOG_PID, LOG_AUTHPRIV);
}
}
/**
* @brief exit tpm_extendpcr
*
* @param status 0 = OK, -1 = general discomfort
*/
static void exit_tpm_extendpcr(err_t message, ...)
{
int status = 0;
DESTROY_IF(tpm);
chunk_free(&digest);
chunk_free(&pcr_value);
/* print any error message to stderr */
if (message != NULL && *message != '\0')
{
va_list args;
char m[8192];
va_start(args, message);
vsnprintf(m, sizeof(m), message, args);
va_end(args);
fprintf(stderr, "tpm_extendpcr error: %s\n", m);
status = -1;
}
library_deinit();
exit(status);
}
/**
* @brief prints the usage of the program to the stderr output
*
* If message is set, program is exited with 1 (error)
* @param message message in case of an error
*/
static void usage(const char *message)
{
fprintf(stderr,
"Usage: tpm_extendpcr [--alg <name>] --pcr <nr> --digest <hex>|--in"
" <file>\n"
" [--hash] [--out <file>] [--quiet]"
" [--debug <level>]\n"
" tpm_extendpcr --help\n"
"\n"
"Options:\n"
" --alg (-a) hash algorithm (sha1|sha256)\n"
" --pcr (-p) platform configuration register (0..23)\n"
" --digest (-d) digest in hex format to be extended\n"
" --in (-i) binary input file with digest to be extended\n"
" --hash (-x) prehash the input file to create digest\n"
" --out (-o) binary output file with updated PCR value\n"
" --help (-h) show usage and exit\n"
"\n"
"Debugging output:\n"
" --debug (-l) changes the log level (-1..4, default: 1)\n"
" --quiet (-q) do not write log output to stderr\n"
);
exit_tpm_extendpcr(message);
}
/**
* @brief main of tpm_extendpcr which extends digest into a PCR
*
* @param argc number of arguments
* @param argv pointer to the argument values
*/
int main(int argc, char *argv[])
{
hash_algorithm_t alg = HASH_SHA1;
hasher_t *hasher = NULL;
char *infile = NULL, *outfile = NULL;
uint32_t pcr = 16;
bool hash = FALSE;
atexit(library_deinit);
if (!library_init(NULL, "tpm_extendpcr"))
{
exit(SS_RC_LIBSTRONGSWAN_INTEGRITY);
}
if (lib->integrity &&
!lib->integrity->check_file(lib->integrity, "tpm_extendpcr", argv[0]))
{
fprintf(stderr, "integrity check of tpm_extendpcr failed\n");
exit(SS_RC_DAEMON_INTEGRITY);
}
for (;;)
{
static const struct option long_opts[] = {
/* name, has_arg, flag, val */
{ "help", no_argument, NULL, 'h' },
{ "alg", required_argument, NULL, 'a' },
{ "pcr", required_argument, NULL, 'p' },
{ "digest", required_argument, NULL, 'd' },
{ "in", required_argument, NULL, 'i' },
{ "hash", no_argument, NULL, 'x' },
{ "out", required_argument, NULL, 'o' },
{ "quiet", no_argument, NULL, 'q' },
{ "debug", required_argument, NULL, 'l' },
{ 0,0,0,0 }
};
/* parse next option */
int c = getopt_long(argc, argv, "ha:p:d:i:xo:ql:", long_opts, NULL);
switch (c)
{
case EOF: /* end of flags */
break;
case 'h': /* --help */
usage(NULL);
case 'a': /* --alg <name> */
if (!enum_from_name(hash_algorithm_short_names, optarg, &alg))
{
usage("unsupported hash algorithm");
}
continue;
case 'p': /* --pcr <nr> */
pcr = atoi(optarg);
continue;
case 'd': /* --digest <hex> */
digest = chunk_from_hex(chunk_from_str(optarg), NULL);
continue;
case 'i': /* --in <file> */
infile = optarg;
continue;
case 'x': /* --hash */
hash = TRUE;
continue;
case 'o': /* --out <file> */
outfile = optarg;
continue;
case 'q': /* --quiet */
log_to_stderr = FALSE;
continue;
case 'l': /* --debug <level> */
default_loglevel = atoi(optarg);
continue;
default:
usage("unknown option");
}
/* break from loop */
break;
}
init_log("tpm_extendpcr");
if (!lib->plugins->load(lib->plugins,
lib->settings->get_str(lib->settings, "tpm_extendpcr.load",
"tpm sha1 sha2")))
{
exit_tpm_extendpcr("plugin loading failed");
}
/* try to find a TPM */
tpm = tpm_tss_probe(TPM_VERSION_ANY);
if (!tpm)
{
exit_tpm_extendpcr("no TPM found");
}
/* read digest from file */
if (digest.len == 0)
{
chunk_t *chunk;
if (!infile)
{
exit_tpm_extendpcr("--digest or --in option required");
}
chunk = chunk_map(infile, FALSE);
if (!chunk)
{
exit_tpm_extendpcr("reading input file failed");
}
if (hash)
{
hasher = lib->crypto->create_hasher(lib->crypto, alg);
if (!hasher || !hasher->allocate_hash(hasher, *chunk, &digest))
{
DESTROY_IF(hasher);
chunk_unmap(chunk);
exit_tpm_extendpcr("prehashing infile failed");
}
hasher->destroy(hasher);
}
else
{
digest = chunk_clone(*chunk);
}
chunk_unmap(chunk);
}
DBG1(DBG_PTS, "Digest: %#B", &digest);
/* extend digest into PCR */
if (!tpm->extend_pcr(tpm, pcr, &pcr_value, digest, alg))
{
exit_tpm_extendpcr("extending PCR failed");
}
DBG1(DBG_PTS, "PCR %02u: %#B", pcr, &pcr_value);
/* write PCR value to file */
if (outfile)
{
if (!chunk_write(pcr_value, outfile, 022, TRUE))
{
DBG1(DBG_PTS, "writing '%s' failed", outfile);
}
}
chunk_free(&pcr_value);
exit_tpm_extendpcr(NULL);
return -1; /* should never be reached */
}