blob: ac04f7191ecadec623a9f7aebf15981db98d61e5 [file] [log] [blame]
Miquel Raynalcaaf40a2018-05-15 11:57:24 +02001# SPDX-License-Identifier: GPL-2.0+
2# Copyright (c) 2018, Bootlin
3# Author: Miquel Raynal <miquel.raynal@bootlin.com>
4
5import os.path
6import pytest
7import u_boot_utils
8import re
9import time
10
11"""
12Test the TPMv2.x related commands. You must have a working hardware setup in
13order to do these tests.
14
15Notes:
16* These tests will prove the password mechanism. The TPM chip must be cleared of
17any password.
18* Commands like pcr_setauthpolicy and pcr_resetauthpolicy are not implemented
19here because they would fail the tests in most cases (TPMs do not implement them
20and return an error).
21"""
22
23updates = 0
24
25def force_init(u_boot_console, force=False):
26 """When a test fails, U-Boot is reset. Because TPM stack must be initialized
27 after each reboot, we must ensure these lines are always executed before
28 trying any command or they will fail with no reason. Executing 'tpm init'
29 twice will spawn an error used to detect that the TPM was not reset and no
30 initialization code should be run.
31 """
Miquel Raynal6a53b822018-07-19 22:35:10 +020032 output = u_boot_console.run_command('tpm2 init')
Miquel Raynalcaaf40a2018-05-15 11:57:24 +020033 if force or not 'Error' in output:
34 u_boot_console.run_command('echo --- start of init ---')
Miquel Raynal6a53b822018-07-19 22:35:10 +020035 u_boot_console.run_command('tpm2 startup TPM2_SU_CLEAR')
36 u_boot_console.run_command('tpm2 self_test full')
37 u_boot_console.run_command('tpm2 clear TPM2_RH_LOCKOUT')
Miquel Raynalcaaf40a2018-05-15 11:57:24 +020038 output = u_boot_console.run_command('echo $?')
39 if not output.endswith('0'):
Miquel Raynal6a53b822018-07-19 22:35:10 +020040 u_boot_console.run_command('tpm2 clear TPM2_RH_PLATFORM')
Miquel Raynalcaaf40a2018-05-15 11:57:24 +020041 u_boot_console.run_command('echo --- end of init ---')
42
43@pytest.mark.buildconfigspec('cmd_tpm_v2')
44def test_tpm2_init(u_boot_console):
45 """Init the software stack to use TPMv2 commands."""
46
Miquel Raynal6a53b822018-07-19 22:35:10 +020047 u_boot_console.run_command('tpm2 init')
Miquel Raynalcaaf40a2018-05-15 11:57:24 +020048 output = u_boot_console.run_command('echo $?')
49 assert output.endswith('0')
50
51@pytest.mark.buildconfigspec('cmd_tpm_v2')
52def test_tpm2_startup(u_boot_console):
53 """Execute a TPM2_Startup command.
54
55 Initiate the TPM internal state machine.
56 """
57
Miquel Raynal6a53b822018-07-19 22:35:10 +020058 u_boot_console.run_command('tpm2 startup TPM2_SU_CLEAR')
Miquel Raynalcaaf40a2018-05-15 11:57:24 +020059 output = u_boot_console.run_command('echo $?')
60 assert output.endswith('0')
61
62@pytest.mark.buildconfigspec('cmd_tpm_v2')
63def test_tpm2_self_test_full(u_boot_console):
64 """Execute a TPM2_SelfTest (full) command.
65
66 Ask the TPM to perform all self tests to also enable full capabilities.
67 """
68
Miquel Raynal6a53b822018-07-19 22:35:10 +020069 u_boot_console.run_command('tpm2 self_test full')
Miquel Raynalcaaf40a2018-05-15 11:57:24 +020070 output = u_boot_console.run_command('echo $?')
71 assert output.endswith('0')
72
73@pytest.mark.buildconfigspec('cmd_tpm_v2')
74def test_tpm2_continue_self_test(u_boot_console):
75 """Execute a TPM2_SelfTest (continued) command.
76
77 Ask the TPM to finish its self tests (alternative to the full test) in order
78 to enter a fully operational state.
79 """
80
Miquel Raynal6a53b822018-07-19 22:35:10 +020081 u_boot_console.run_command('tpm2 self_test continue')
Miquel Raynalcaaf40a2018-05-15 11:57:24 +020082 output = u_boot_console.run_command('echo $?')
83 assert output.endswith('0')
84
85@pytest.mark.buildconfigspec('cmd_tpm_v2')
86def test_tpm2_clear(u_boot_console):
87 """Execute a TPM2_Clear command.
88
89 Ask the TPM to reset entirely its internal state (including internal
90 configuration, passwords, counters and DAM parameters). This is half of the
91 TAKE_OWNERSHIP command from TPMv1.
92
93 Use the LOCKOUT hierarchy for this. The LOCKOUT/PLATFORM hierarchies must
94 not have a password set, otherwise this test will fail. ENDORSEMENT and
95 PLATFORM hierarchies are also available.
96 """
97
Miquel Raynal6a53b822018-07-19 22:35:10 +020098 u_boot_console.run_command('tpm2 clear TPM2_RH_LOCKOUT')
Miquel Raynalcaaf40a2018-05-15 11:57:24 +020099 output = u_boot_console.run_command('echo $?')
100 assert output.endswith('0')
101
Miquel Raynal6a53b822018-07-19 22:35:10 +0200102 u_boot_console.run_command('tpm2 clear TPM2_RH_PLATFORM')
Miquel Raynalcaaf40a2018-05-15 11:57:24 +0200103 output = u_boot_console.run_command('echo $?')
104 assert output.endswith('0')
105
106@pytest.mark.buildconfigspec('cmd_tpm_v2')
107def test_tpm2_change_auth(u_boot_console):
108 """Execute a TPM2_HierarchyChangeAuth command.
109
110 Ask the TPM to change the owner, ie. set a new password: 'unicorn'
111
112 Use the LOCKOUT hierarchy for this. ENDORSEMENT and PLATFORM hierarchies are
113 also available.
114 """
115
116 force_init(u_boot_console)
117
Miquel Raynal6a53b822018-07-19 22:35:10 +0200118 u_boot_console.run_command('tpm2 change_auth TPM2_RH_LOCKOUT unicorn')
Miquel Raynalcaaf40a2018-05-15 11:57:24 +0200119 output = u_boot_console.run_command('echo $?')
120 assert output.endswith('0')
121
Miquel Raynal6a53b822018-07-19 22:35:10 +0200122 u_boot_console.run_command('tpm2 clear TPM2_RH_LOCKOUT unicorn')
Miquel Raynalcaaf40a2018-05-15 11:57:24 +0200123 output = u_boot_console.run_command('echo $?')
Miquel Raynal6a53b822018-07-19 22:35:10 +0200124 u_boot_console.run_command('tpm2 clear TPM2_RH_PLATFORM')
Miquel Raynalcaaf40a2018-05-15 11:57:24 +0200125 assert output.endswith('0')
126
127@pytest.mark.buildconfigspec('cmd_tpm_v2')
128def test_tpm2_get_capability(u_boot_console):
129 """Execute a TPM_GetCapability command.
130
131 Display one capability. In our test case, let's display the default DAM
132 lockout counter that should be 0 since the CLEAR:
133 - TPM_CAP_TPM_PROPERTIES = 0x6
134 - TPM_PT_LOCKOUT_COUNTER (1st parameter) = PTR_VAR + 14
135
136 There is no expected default values because it would depend on the chip
137 used. We can still save them in order to check they have changed later.
138 """
139
140 force_init(u_boot_console)
141 ram = u_boot_utils.find_ram_base(u_boot_console)
142
Miquel Raynal6a53b822018-07-19 22:35:10 +0200143 read_cap = u_boot_console.run_command('tpm2 get_capability 0x6 0x20e 0x200 1') #0x%x 1' % ram)
Miquel Raynalcaaf40a2018-05-15 11:57:24 +0200144 output = u_boot_console.run_command('echo $?')
145 assert output.endswith('0')
146 assert 'Property 0x0000020e: 0x00000000' in read_cap
147
148@pytest.mark.buildconfigspec('cmd_tpm_v2')
149def test_tpm2_dam_parameters(u_boot_console):
150 """Execute a TPM2_DictionaryAttackParameters command.
151
152 Change Dictionary Attack Mitigation (DAM) parameters. Ask the TPM to change:
153 - Max number of failed authentication before lockout: 3
154 - Time before the failure counter is automatically decremented: 10 sec
155 - Time after a lockout failure before it can be attempted again: 0 sec
156
157 For an unknown reason, the DAM parameters must be changed before changing
158 the authentication, otherwise the lockout will be engaged after the first
159 failed authentication attempt.
160 """
161
162 force_init(u_boot_console)
163 ram = u_boot_utils.find_ram_base(u_boot_console)
164
165 # Set the DAM parameters to known values
Miquel Raynal6a53b822018-07-19 22:35:10 +0200166 u_boot_console.run_command('tpm2 dam_parameters 3 10 0')
Miquel Raynalcaaf40a2018-05-15 11:57:24 +0200167 output = u_boot_console.run_command('echo $?')
168 assert output.endswith('0')
169
170 # Check the values have been saved
Miquel Raynal6a53b822018-07-19 22:35:10 +0200171 read_cap = u_boot_console.run_command('tpm2 get_capability 0x6 0x20f 0x%x 3' % ram)
Miquel Raynalcaaf40a2018-05-15 11:57:24 +0200172 output = u_boot_console.run_command('echo $?')
173 assert output.endswith('0')
174 assert 'Property 0x0000020f: 0x00000003' in read_cap
175 assert 'Property 0x00000210: 0x0000000a' in read_cap
176 assert 'Property 0x00000211: 0x00000000' in read_cap
177
178@pytest.mark.buildconfigspec('cmd_tpm_v2')
179def test_tpm2_pcr_read(u_boot_console):
180 """Execute a TPM2_PCR_Read command.
181
182 Perform a PCR read of the 0th PCR. Must be zero.
183 """
184
185 force_init(u_boot_console)
Quentin Schulzdae1aa82018-07-09 19:16:27 +0200186 ram = u_boot_utils.find_ram_base(u_boot_console)
Miquel Raynalcaaf40a2018-05-15 11:57:24 +0200187
Miquel Raynal6a53b822018-07-19 22:35:10 +0200188 read_pcr = u_boot_console.run_command('tpm2 pcr_read 0 0x%x' % ram)
Miquel Raynalcaaf40a2018-05-15 11:57:24 +0200189 output = u_boot_console.run_command('echo $?')
190 assert output.endswith('0')
191
192 # Save the number of PCR updates
193 str = re.findall(r'\d+ known updates', read_pcr)[0]
194 global updates
195 updates = int(re.findall(r'\d+', str)[0])
196
197 # Check the output value
198 assert 'PCR #0 content' in read_pcr
199 assert '00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00' in read_pcr
200
201@pytest.mark.buildconfigspec('cmd_tpm_v2')
202def test_tpm2_pcr_extend(u_boot_console):
203 """Execute a TPM2_PCR_Extend command.
204
205 Perform a PCR extension with a known hash in memory (zeroed since the board
206 must have been rebooted).
207
208 No authentication mechanism is used here, not protecting against packet
209 replay, yet.
210 """
211
212 force_init(u_boot_console)
Quentin Schulzdae1aa82018-07-09 19:16:27 +0200213 ram = u_boot_utils.find_ram_base(u_boot_console)
Miquel Raynalcaaf40a2018-05-15 11:57:24 +0200214
Miquel Raynal6a53b822018-07-19 22:35:10 +0200215 u_boot_console.run_command('tpm2 pcr_extend 0 0x%x' % ram)
Miquel Raynalcaaf40a2018-05-15 11:57:24 +0200216 output = u_boot_console.run_command('echo $?')
217 assert output.endswith('0')
218
Simon Glass00211022021-07-18 14:18:06 -0600219 # Read the value back into a different place so we can still use 'ram' as
220 # our zero bytes
221 read_pcr = u_boot_console.run_command('tpm2 pcr_read 0 0x%x' % (ram + 0x20))
Miquel Raynalcaaf40a2018-05-15 11:57:24 +0200222 output = u_boot_console.run_command('echo $?')
223 assert output.endswith('0')
224 assert 'f5 a5 fd 42 d1 6a 20 30 27 98 ef 6e d3 09 97 9b' in read_pcr
225 assert '43 00 3d 23 20 d9 f0 e8 ea 98 31 a9 27 59 fb 4b' in read_pcr
226
227 str = re.findall(r'\d+ known updates', read_pcr)[0]
228 new_updates = int(re.findall(r'\d+', str)[0])
229 assert (updates + 1) == new_updates
230
Simon Glass00211022021-07-18 14:18:06 -0600231 u_boot_console.run_command('tpm2 pcr_extend 0 0x%x' % ram)
232 output = u_boot_console.run_command('echo $?')
233 assert output.endswith('0')
234
235 read_pcr = u_boot_console.run_command('tpm2 pcr_read 0 0x%x' % (ram + 0x20))
236 output = u_boot_console.run_command('echo $?')
237 assert output.endswith('0')
238 assert '7a 05 01 f5 95 7b df 9c b3 a8 ff 49 66 f0 22 65' in read_pcr
239 assert 'f9 68 65 8b 7a 9c 62 64 2c ba 11 65 e8 66 42 f5' in read_pcr
240
241 str = re.findall(r'\d+ known updates', read_pcr)[0]
242 new_updates = int(re.findall(r'\d+', str)[0])
243 assert (updates + 2) == new_updates
244
Miquel Raynalcaaf40a2018-05-15 11:57:24 +0200245@pytest.mark.buildconfigspec('cmd_tpm_v2')
246def test_tpm2_cleanup(u_boot_console):
247 """Ensure the TPM is cleared from password or test related configuration."""
248
249 force_init(u_boot_console, True)