1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92
|
# SPDX-License-Identifier: BSD-3-Clause
source helpers.sh
file_primary_key_ctx=prim.ctx
file_input_data=secret.data
file_policy=policy.data
file_unseal_key_pub=sealkey.pub
file_unseal_key_priv=sealkey.priv
file_unseal_key_ctx=sealkey.ctx
file_unseal_key_name=sealkey.name
file_output_data=unsealed.data
file_session_data=session.dat
secret=12345678
cleanup() {
rm -f $file_primary_key_ctx $file_input_data $file_policy \
$file_unseal_key_pub $file_unseal_key_priv $file_unseal_key_ctx \
$file_unseal_key_name $file_output_data $file_session_data
if [ "${1}" != "no-shutdown" ]; then
shut_down
fi
}
trap cleanup EXIT
start_up
cleanup "no-shutdown"
echo $secret > $file_input_data
## Check cpHash output for TPM2_PolicyCommandCode
tpm2 startauthsession -S $file_session_data
tpm2 policycommandcode -S $file_session_data TPM2_CC_Unseal \
--cphash cp.hash
TPM2_CC_PolicyCommandCode="0000016c"
code="0000015e"
policySession=$(tpm2 sessionconfig session.dat | grep Session-Handle | \
awk -F ' 0x' '{print $2}')
echo -ne $TPM2_CC_PolicyCommandCode$policySession$code | xxd -r -p | \
openssl dgst -sha256 -binary -out test.bin
cmp cp.hash test.bin 2
tpm2 flushcontext $file_session_data
tpm2 clear
tpm2 createprimary -Q -C o -c $file_primary_key_ctx
tpm2 startauthsession -S $file_session_data
tpm2 policycommandcode -S $file_session_data -L $file_policy TPM2_CC_Unseal
tpm2 flushcontext $file_session_data
rm $file_session_data
echo "tpm2 create -C $file_primary_key_ctx -u $file_unseal_key_pub \
-r $file_unseal_key_priv -L $file_policy -i- <<< $secret"
tpm2 create -C $file_primary_key_ctx -u $file_unseal_key_pub \
-r $file_unseal_key_priv -L $file_policy -i- <<< $secret
tpm2 load -C $file_primary_key_ctx -u $file_unseal_key_pub \
-r $file_unseal_key_priv -n $file_unseal_key_name -c $file_unseal_key_ctx
# Ensure unsealing passes with proper policy
tpm2 startauthsession --policy-session -S $file_session_data
tpm2 policycommandcode -S $file_session_data -L $file_policy TPM2_CC_Unseal
tpm2 unseal -p session:$file_session_data -c sealkey.ctx > $file_output_data
tpm2 flushcontext $file_session_data
rm $file_session_data
cmp -s $file_output_data $file_input_data
# Test that other operations fail
if tpm2 encryptdecrypt -o $file_output_data -c $file_unseal_key_ctx \
$file_input_data; then
echo "tpm2 policycommandcode: Should have failed!"
exit 1
else
true
fi
exit 0
|