File: fapi-nv-write-authorize.sh

package info (click to toggle)
tpm2-tools 5.7-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 5,988 kB
  • sloc: ansic: 45,737; sh: 14,915; xml: 8,342; makefile: 610; python: 51
file content (91 lines) | stat: -rw-r--r-- 2,361 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91

set -e
source helpers.sh

start_up

CRYPTO_PROFILE="RSA"
setup_fapi $CRYPTO_PROFILE

function cleanup {
    tss2 delete --path=/
    shut_down
}

trap cleanup EXIT

POLICY_SIGN_KEY_PATH="HS/SRK/policySignKey"
SIGN_KEY_PATH="HS/SRK/signKey"
NV_PATH="/nv/Owner/myNV"
PCR_POLICY_JSON=$TEMP_DIR/pol_pcr16_0.json
POLICY_PCR=policy/pcr-policy
AUTHORIZE_NV_POLICY_JSON=$TEMP_DIR/pol_authorize_nv.json
AUTHORIZE_NV_POLICY=policy/authorize-nv-policy
SIGNATURE_FILE=$TEMP_DIR/signature.file
PUBLIC_KEY_FILE=$TEMP_DIR/public_key.file
DIGEST_FILE=$TEMP_DIR/digest.file
echo -n 01234567890123456789 > $DIGEST_FILE

tss2 provision

tss2 createnv --path=$NV_PATH --type="noDa" --size=34 --authValue=""

tss2 import --path=$AUTHORIZE_NV_POLICY --importData=$AUTHORIZE_NV_POLICY_JSON

tss2 import --path=$POLICY_PCR --importData=$PCR_POLICY_JSON

expect <<EOF
# Try if command is supported
spawn tss2 writeauthorizenv --nvPath=$NV_PATH --policyPath=$POLICY_PCR
set ret [wait]
if {[lindex \$ret 2] || [lindex \$ret 3] != 0} {
    send_user "Command has failed. If using a physical TPM, see log since it is
    probably not supported by TPM. Skipping test\n"
    exit 77
}
EOF

tss2 createkey --path=$POLICY_SIGN_KEY_PATH --type="noDa, sign" --authValue=""

tss2 createkey --path=$SIGN_KEY_PATH --type="noDa, sign" \
    --policyPath=$AUTHORIZE_NV_POLICY  --authValue=""

if [ "$CRYPTO_PROFILE" = "RSA" ]; then
tss2 sign --keyPath=$SIGN_KEY_PATH --padding="RSA_PSS" --digest=$DIGEST_FILE \
    --signature=$SIGNATURE_FILE --publicKey=$PUBLIC_KEY_FILE
else
tss2 sign --keyPath=$SIGN_KEY_PATH --digest=$DIGEST_FILE \
    --signature=$SIGNATURE_FILE --publicKey=$PUBLIC_KEY_FILE
fi

expect <<EOF
# Try with missing nvPath
spawn tss2 writeauthorizenv --policyPath=$POLICY_PCR
set ret [wait]
if {[lindex \$ret 2] || [lindex \$ret 3] != 1} {
    send_user "Command has not failed as expected\n"
    exit 1
}
EOF

expect <<EOF
# Try with missing policyPath
spawn tss2 writeauthorizenv --nvPath=$NV_PATH
set ret [wait]
if {[lindex \$ret 2] || [lindex \$ret 3] != 1} {
    send_user "Command has not failed as expected\n"
    exit 1
}
EOF

expect <<EOF
# Try to fail command
spawn tss2 writeauthorizenv --nvPath=/abc/def --policyPath=$POLICY_PCR
set ret [wait]
if {[lindex \$ret 2] || [lindex \$ret 3] != 1} {
    send_user "Command has not failed as expected\n"
    exit 1
}
EOF

exit 0