Loading...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 | #ifndef __TRUSTED_KEY_H #define __TRUSTED_KEY_H /* implementation specific TPM constants */ #define MAX_PCRINFO_SIZE 64 #define MAX_BUF_SIZE 512 #define TPM_GETRANDOM_SIZE 14 #define TPM_OSAP_SIZE 36 #define TPM_OIAP_SIZE 10 #define TPM_SEAL_SIZE 87 #define TPM_UNSEAL_SIZE 104 #define TPM_SIZE_OFFSET 2 #define TPM_RETURN_OFFSET 6 #define TPM_DATA_OFFSET 10 #define LOAD32(buffer, offset) (ntohl(*(uint32_t *)&buffer[offset])) #define LOAD32N(buffer, offset) (*(uint32_t *)&buffer[offset]) #define LOAD16(buffer, offset) (ntohs(*(uint16_t *)&buffer[offset])) struct tpm_buf { int len; unsigned char data[MAX_BUF_SIZE]; }; #define INIT_BUF(tb) (tb->len = 0) struct osapsess { uint32_t handle; unsigned char secret[SHA1_DIGEST_SIZE]; unsigned char enonce[TPM_NONCE_SIZE]; }; /* discrete values, but have to store in uint16_t for TPM use */ enum { SEAL_keytype = 1, SRK_keytype = 4 }; struct trusted_key_options { uint16_t keytype; uint32_t keyhandle; unsigned char keyauth[SHA1_DIGEST_SIZE]; unsigned char blobauth[SHA1_DIGEST_SIZE]; uint32_t pcrinfo_len; unsigned char pcrinfo[MAX_PCRINFO_SIZE]; int pcrlock; }; #define TPM_DEBUG 0 #if TPM_DEBUG static inline void dump_options(struct trusted_key_options *o) { pr_info("trusted_key: sealing key type %d\n", o->keytype); pr_info("trusted_key: sealing key handle %0X\n", o->keyhandle); pr_info("trusted_key: pcrlock %d\n", o->pcrlock); pr_info("trusted_key: pcrinfo %d\n", o->pcrinfo_len); print_hex_dump(KERN_INFO, "pcrinfo ", DUMP_PREFIX_NONE, 16, 1, o->pcrinfo, o->pcrinfo_len, 0); } static inline void dump_payload(struct trusted_key_payload *p) { pr_info("trusted_key: key_len %d\n", p->key_len); print_hex_dump(KERN_INFO, "key ", DUMP_PREFIX_NONE, 16, 1, p->key, p->key_len, 0); pr_info("trusted_key: bloblen %d\n", p->blob_len); print_hex_dump(KERN_INFO, "blob ", DUMP_PREFIX_NONE, 16, 1, p->blob, p->blob_len, 0); pr_info("trusted_key: migratable %d\n", p->migratable); } static inline void dump_sess(struct osapsess *s) { print_hex_dump(KERN_INFO, "trusted-key: handle ", DUMP_PREFIX_NONE, 16, 1, &s->handle, 4, 0); pr_info("trusted-key: secret:\n"); print_hex_dump(KERN_INFO, "", DUMP_PREFIX_NONE, 16, 1, &s->secret, SHA1_DIGEST_SIZE, 0); pr_info("trusted-key: enonce:\n"); print_hex_dump(KERN_INFO, "", DUMP_PREFIX_NONE, 16, 1, &s->enonce, SHA1_DIGEST_SIZE, 0); } static inline void dump_tpm_buf(unsigned char *buf) { int len; pr_info("\ntrusted-key: tpm buffer\n"); len = LOAD32(buf, TPM_SIZE_OFFSET); print_hex_dump(KERN_INFO, "", DUMP_PREFIX_NONE, 16, 1, buf, len, 0); } #else static inline void dump_options(struct trusted_key_options *o) { } static inline void dump_payload(struct trusted_key_payload *p) { } static inline void dump_sess(struct osapsess *s) { } static inline void dump_tpm_buf(unsigned char *buf) { } #endif static inline void store8(struct tpm_buf *buf, const unsigned char value) { buf->data[buf->len++] = value; } static inline void store16(struct tpm_buf *buf, const uint16_t value) { *(uint16_t *) & buf->data[buf->len] = htons(value); buf->len += sizeof value; } static inline void store32(struct tpm_buf *buf, const uint32_t value) { *(uint32_t *) & buf->data[buf->len] = htonl(value); buf->len += sizeof value; } static inline void storebytes(struct tpm_buf *buf, const unsigned char *in, const int len) { memcpy(buf->data + buf->len, in, len); buf->len += len; } #endif |