1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91
|
set -e
source helpers.sh
start_up
CRYPTO_PROFILE="RSA"
setup_fapi $CRYPTO_PROFILE
function cleanup {
tss2 delete --path=/
shut_down
}
trap cleanup EXIT
POLICY_SIGN_KEY_PATH="HS/SRK/policySignKey"
SIGN_KEY_PATH="HS/SRK/signKey"
NV_PATH="/nv/Owner/myNV"
PCR_POLICY_JSON=$TEMP_DIR/pol_pcr16_0.json
POLICY_PCR=policy/pcr-policy
AUTHORIZE_NV_POLICY_JSON=$TEMP_DIR/pol_authorize_nv.json
AUTHORIZE_NV_POLICY=policy/authorize-nv-policy
SIGNATURE_FILE=$TEMP_DIR/signature.file
PUBLIC_KEY_FILE=$TEMP_DIR/public_key.file
DIGEST_FILE=$TEMP_DIR/digest.file
echo -n 01234567890123456789 > $DIGEST_FILE
tss2 provision
tss2 createnv --path=$NV_PATH --type="noDa" --size=34 --authValue=""
tss2 import --path=$AUTHORIZE_NV_POLICY --importData=$AUTHORIZE_NV_POLICY_JSON
tss2 import --path=$POLICY_PCR --importData=$PCR_POLICY_JSON
expect <<EOF
# Try if command is supported
spawn tss2 writeauthorizenv --nvPath=$NV_PATH --policyPath=$POLICY_PCR
set ret [wait]
if {[lindex \$ret 2] || [lindex \$ret 3] != 0} {
send_user "Command has failed. If using a physical TPM, see log since it is
probably not supported by TPM. Skipping test\n"
exit 77
}
EOF
tss2 createkey --path=$POLICY_SIGN_KEY_PATH --type="noDa, sign" --authValue=""
tss2 createkey --path=$SIGN_KEY_PATH --type="noDa, sign" \
--policyPath=$AUTHORIZE_NV_POLICY --authValue=""
if [ "$CRYPTO_PROFILE" = "RSA" ]; then
tss2 sign --keyPath=$SIGN_KEY_PATH --padding="RSA_PSS" --digest=$DIGEST_FILE \
--signature=$SIGNATURE_FILE --publicKey=$PUBLIC_KEY_FILE
else
tss2 sign --keyPath=$SIGN_KEY_PATH --digest=$DIGEST_FILE \
--signature=$SIGNATURE_FILE --publicKey=$PUBLIC_KEY_FILE
fi
expect <<EOF
# Try with missing nvPath
spawn tss2 writeauthorizenv --policyPath=$POLICY_PCR
set ret [wait]
if {[lindex \$ret 2] || [lindex \$ret 3] != 1} {
send_user "Command has not failed as expected\n"
exit 1
}
EOF
expect <<EOF
# Try with missing policyPath
spawn tss2 writeauthorizenv --nvPath=$NV_PATH
set ret [wait]
if {[lindex \$ret 2] || [lindex \$ret 3] != 1} {
send_user "Command has not failed as expected\n"
exit 1
}
EOF
expect <<EOF
# Try to fail command
spawn tss2 writeauthorizenv --nvPath=/abc/def --policyPath=$POLICY_PCR
set ret [wait]
if {[lindex \$ret 2] || [lindex \$ret 3] != 1} {
send_user "Command has not failed as expected\n"
exit 1
}
EOF
exit 0
|