File: abrmd_policycommandcode.sh

package info (click to toggle)
tpm2-tools 5.7-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 5,988 kB
  • sloc: ansic: 45,737; sh: 14,915; xml: 8,342; makefile: 610; python: 51
file content (92 lines) | stat: -rw-r--r-- 2,444 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
# SPDX-License-Identifier: BSD-3-Clause

source helpers.sh

file_primary_key_ctx=prim.ctx
file_input_data=secret.data
file_policy=policy.data
file_unseal_key_pub=sealkey.pub
file_unseal_key_priv=sealkey.priv
file_unseal_key_ctx=sealkey.ctx
file_unseal_key_name=sealkey.name
file_output_data=unsealed.data
file_session_data=session.dat

secret=12345678

cleanup() {
    rm -f $file_primary_key_ctx $file_input_data $file_policy \
    $file_unseal_key_pub $file_unseal_key_priv $file_unseal_key_ctx \
    $file_unseal_key_name $file_output_data $file_session_data

    if [ "${1}" != "no-shutdown" ]; then
        shut_down
    fi
}
trap cleanup EXIT

start_up

cleanup "no-shutdown"

echo $secret > $file_input_data

## Check cpHash output for TPM2_PolicyCommandCode
tpm2 startauthsession -S $file_session_data
tpm2 policycommandcode -S $file_session_data TPM2_CC_Unseal \
    --cphash cp.hash
TPM2_CC_PolicyCommandCode="0000016c"
code="0000015e"
policySession=$(tpm2 sessionconfig session.dat | grep Session-Handle | \
    awk -F ' 0x' '{print $2}')

echo -ne $TPM2_CC_PolicyCommandCode$policySession$code | xxd -r -p | \
openssl dgst -sha256 -binary -out test.bin
cmp cp.hash test.bin 2
tpm2 flushcontext $file_session_data

tpm2 clear

tpm2 createprimary -Q -C o -c $file_primary_key_ctx

tpm2 startauthsession -S $file_session_data

tpm2 policycommandcode -S $file_session_data -L $file_policy TPM2_CC_Unseal

tpm2 flushcontext $file_session_data

rm $file_session_data

echo "tpm2 create -C $file_primary_key_ctx -u $file_unseal_key_pub \
-r $file_unseal_key_priv -L $file_policy -i- <<< $secret"

tpm2 create -C $file_primary_key_ctx -u $file_unseal_key_pub \
-r $file_unseal_key_priv -L $file_policy -i- <<< $secret

tpm2 load -C $file_primary_key_ctx -u $file_unseal_key_pub \
-r $file_unseal_key_priv -n $file_unseal_key_name -c $file_unseal_key_ctx


# Ensure unsealing passes with proper policy
tpm2 startauthsession --policy-session -S $file_session_data

tpm2 policycommandcode -S $file_session_data -L $file_policy TPM2_CC_Unseal

tpm2 unseal -p session:$file_session_data -c sealkey.ctx > $file_output_data

tpm2 flushcontext $file_session_data

rm $file_session_data

cmp -s $file_output_data $file_input_data

# Test that other operations fail
if tpm2 encryptdecrypt -o $file_output_data -c $file_unseal_key_ctx \
$file_input_data; then
    echo "tpm2 policycommandcode: Should have failed!"
    exit 1
else
    true
fi

exit 0