| // |
| // Copyright (C) 2014 The Android Open Source Project |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| // |
| |
| #include "trunks/trunks_factory_for_test.h" |
| |
| #include <memory> |
| |
| #include <base/memory/ptr_util.h> |
| #include <gmock/gmock.h> |
| |
| #include "trunks/authorization_delegate.h" |
| #include "trunks/blob_parser.h" |
| #include "trunks/hmac_session.h" |
| #include "trunks/mock_blob_parser.h" |
| #include "trunks/mock_hmac_session.h" |
| #include "trunks/mock_policy_session.h" |
| #include "trunks/mock_session_manager.h" |
| #include "trunks/mock_tpm.h" |
| #include "trunks/mock_tpm_state.h" |
| #include "trunks/mock_tpm_utility.h" |
| #include "trunks/policy_session.h" |
| #include "trunks/session_manager.h" |
| #include "trunks/tpm_generated.h" |
| #include "trunks/tpm_state.h" |
| #include "trunks/tpm_utility.h" |
| |
| using testing::NiceMock; |
| |
| namespace trunks { |
| |
| // Forwards all calls to a target instance. |
| class TpmStateForwarder : public TpmState { |
| public: |
| explicit TpmStateForwarder(TpmState* target) : target_(target) {} |
| ~TpmStateForwarder() override = default; |
| |
| TPM_RC Initialize() override { return target_->Initialize(); } |
| |
| bool IsOwnerPasswordSet() override { return target_->IsOwnerPasswordSet(); } |
| |
| bool IsEndorsementPasswordSet() override { |
| return target_->IsEndorsementPasswordSet(); |
| } |
| |
| bool IsLockoutPasswordSet() override { |
| return target_->IsLockoutPasswordSet(); |
| } |
| |
| bool IsOwned() override { return target_->IsOwned(); } |
| |
| bool IsInLockout() override { return target_->IsInLockout(); } |
| |
| bool IsPlatformHierarchyEnabled() override { |
| return target_->IsPlatformHierarchyEnabled(); |
| } |
| |
| bool IsStorageHierarchyEnabled() override { |
| return target_->IsStorageHierarchyEnabled(); |
| } |
| |
| bool IsEndorsementHierarchyEnabled() override { |
| return target_->IsEndorsementHierarchyEnabled(); |
| } |
| |
| bool IsEnabled() override { return target_->IsEnabled(); } |
| |
| bool WasShutdownOrderly() override { return target_->WasShutdownOrderly(); } |
| |
| bool IsRSASupported() override { return target_->IsRSASupported(); } |
| |
| bool IsECCSupported() override { return target_->IsECCSupported(); } |
| |
| uint32_t GetLockoutCounter() override { return target_->GetLockoutCounter(); } |
| |
| uint32_t GetLockoutThreshold() override { |
| return target_->GetLockoutThreshold(); |
| } |
| |
| uint32_t GetLockoutInterval() override { |
| return target_->GetLockoutInterval(); |
| } |
| |
| uint32_t GetLockoutRecovery() override { |
| return target_->GetLockoutRecovery(); |
| } |
| |
| uint32_t GetMaxNVSize() override { return target_->GetMaxNVSize(); } |
| |
| bool GetTpmProperty(TPM_PT property, uint32_t* value) override { |
| return target_->GetTpmProperty(property, value); |
| } |
| |
| bool GetAlgorithmProperties(TPM_ALG_ID algorithm, |
| TPMA_ALGORITHM* properties) override { |
| return target_->GetAlgorithmProperties(algorithm, properties); |
| } |
| |
| private: |
| TpmState* target_; |
| }; |
| |
| // Forwards all calls to a target instance. |
| class TpmUtilityForwarder : public TpmUtility { |
| public: |
| explicit TpmUtilityForwarder(TpmUtility* target) : target_(target) {} |
| ~TpmUtilityForwarder() override = default; |
| |
| TPM_RC Startup() override { return target_->Startup(); } |
| |
| TPM_RC Clear() override { return target_->Clear(); } |
| |
| void Shutdown() override { return target_->Shutdown(); } |
| |
| TPM_RC InitializeTpm() override { return target_->InitializeTpm(); } |
| |
| TPM_RC AllocatePCR(const std::string& platform_password) override { |
| return target_->AllocatePCR(platform_password); |
| } |
| |
| TPM_RC TakeOwnership(const std::string& owner_password, |
| const std::string& endorsement_password, |
| const std::string& lockout_password) override { |
| return target_->TakeOwnership(owner_password, endorsement_password, |
| lockout_password); |
| } |
| |
| TPM_RC StirRandom(const std::string& entropy_data, |
| AuthorizationDelegate* delegate) override { |
| return target_->StirRandom(entropy_data, delegate); |
| } |
| |
| TPM_RC GenerateRandom(size_t num_bytes, |
| AuthorizationDelegate* delegate, |
| std::string* random_data) override { |
| return target_->GenerateRandom(num_bytes, delegate, random_data); |
| } |
| |
| TPM_RC ExtendPCR(int pcr_index, |
| const std::string& extend_data, |
| AuthorizationDelegate* delegate) override { |
| return target_->ExtendPCR(pcr_index, extend_data, delegate); |
| } |
| |
| TPM_RC ReadPCR(int pcr_index, std::string* pcr_value) override { |
| return target_->ReadPCR(pcr_index, pcr_value); |
| } |
| |
| TPM_RC AsymmetricEncrypt(TPM_HANDLE key_handle, |
| TPM_ALG_ID scheme, |
| TPM_ALG_ID hash_alg, |
| const std::string& plaintext, |
| AuthorizationDelegate* delegate, |
| std::string* ciphertext) override { |
| return target_->AsymmetricEncrypt(key_handle, scheme, hash_alg, plaintext, |
| delegate, ciphertext); |
| } |
| |
| TPM_RC AsymmetricDecrypt(TPM_HANDLE key_handle, |
| TPM_ALG_ID scheme, |
| TPM_ALG_ID hash_alg, |
| const std::string& ciphertext, |
| AuthorizationDelegate* delegate, |
| std::string* plaintext) override { |
| return target_->AsymmetricDecrypt(key_handle, scheme, hash_alg, ciphertext, |
| delegate, plaintext); |
| } |
| |
| TPM_RC Sign(TPM_HANDLE key_handle, |
| TPM_ALG_ID scheme, |
| TPM_ALG_ID hash_alg, |
| const std::string& plaintext, |
| AuthorizationDelegate* delegate, |
| std::string* signature) override { |
| return target_->Sign(key_handle, scheme, hash_alg, plaintext, delegate, |
| signature); |
| } |
| |
| TPM_RC Verify(TPM_HANDLE key_handle, |
| TPM_ALG_ID scheme, |
| TPM_ALG_ID hash_alg, |
| const std::string& plaintext, |
| const std::string& signature, |
| AuthorizationDelegate* delegate) override { |
| return target_->Verify(key_handle, scheme, hash_alg, plaintext, signature, |
| delegate); |
| } |
| |
| TPM_RC CertifyCreation(TPM_HANDLE key_handle, |
| const std::string& creation_blob) override { |
| return target_->CertifyCreation(key_handle, creation_blob); |
| } |
| |
| TPM_RC ChangeKeyAuthorizationData(TPM_HANDLE key_handle, |
| const std::string& new_password, |
| AuthorizationDelegate* delegate, |
| std::string* key_blob) override { |
| return target_->ChangeKeyAuthorizationData(key_handle, new_password, |
| delegate, key_blob); |
| } |
| |
| TPM_RC ImportRSAKey(AsymmetricKeyUsage key_type, |
| const std::string& modulus, |
| uint32_t public_exponent, |
| const std::string& prime_factor, |
| const std::string& password, |
| AuthorizationDelegate* delegate, |
| std::string* key_blob) override { |
| return target_->ImportRSAKey(key_type, modulus, public_exponent, |
| prime_factor, password, delegate, key_blob); |
| } |
| |
| TPM_RC CreateRSAKeyPair(AsymmetricKeyUsage key_type, |
| int modulus_bits, |
| uint32_t public_exponent, |
| const std::string& password, |
| const std::string& policy_digest, |
| bool use_only_policy_authorization, |
| int creation_pcr_index, |
| AuthorizationDelegate* delegate, |
| std::string* key_blob, |
| std::string* creation_blob) override { |
| return target_->CreateRSAKeyPair( |
| key_type, modulus_bits, public_exponent, password, policy_digest, |
| use_only_policy_authorization, creation_pcr_index, delegate, key_blob, |
| creation_blob); |
| } |
| |
| TPM_RC LoadKey(const std::string& key_blob, |
| AuthorizationDelegate* delegate, |
| TPM_HANDLE* key_handle) override { |
| return target_->LoadKey(key_blob, delegate, key_handle); |
| } |
| |
| TPM_RC GetKeyName(TPM_HANDLE handle, std::string* name) override { |
| return target_->GetKeyName(handle, name); |
| } |
| |
| TPM_RC GetKeyPublicArea(TPM_HANDLE handle, |
| TPMT_PUBLIC* public_data) override { |
| return target_->GetKeyPublicArea(handle, public_data); |
| } |
| |
| TPM_RC SealData(const std::string& data_to_seal, |
| const std::string& policy_digest, |
| AuthorizationDelegate* delegate, |
| std::string* sealed_data) override { |
| return target_->SealData(data_to_seal, policy_digest, delegate, |
| sealed_data); |
| } |
| |
| TPM_RC UnsealData(const std::string& sealed_data, |
| AuthorizationDelegate* delegate, |
| std::string* unsealed_data) override { |
| return target_->UnsealData(sealed_data, delegate, unsealed_data); |
| } |
| |
| TPM_RC StartSession(HmacSession* session) override { |
| return target_->StartSession(session); |
| } |
| |
| TPM_RC GetPolicyDigestForPcrValue(int pcr_index, |
| const std::string& pcr_value, |
| std::string* policy_digest) override { |
| return target_->GetPolicyDigestForPcrValue(pcr_index, pcr_value, |
| policy_digest); |
| } |
| |
| TPM_RC DefineNVSpace(uint32_t index, |
| size_t num_bytes, |
| TPMA_NV attributes, |
| const std::string& authorization_value, |
| const std::string& policy_digest, |
| AuthorizationDelegate* delegate) override { |
| return target_->DefineNVSpace(index, num_bytes, attributes, |
| authorization_value, policy_digest, delegate); |
| } |
| |
| TPM_RC DestroyNVSpace(uint32_t index, |
| AuthorizationDelegate* delegate) override { |
| return target_->DestroyNVSpace(index, delegate); |
| } |
| |
| TPM_RC LockNVSpace(uint32_t index, |
| bool lock_read, |
| bool lock_write, |
| bool using_owner_authorization, |
| AuthorizationDelegate* delegate) override { |
| return target_->LockNVSpace(index, lock_read, lock_write, |
| using_owner_authorization, delegate); |
| } |
| |
| TPM_RC WriteNVSpace(uint32_t index, |
| uint32_t offset, |
| const std::string& nvram_data, |
| bool using_owner_authorization, |
| bool extend, |
| AuthorizationDelegate* delegate) override { |
| return target_->WriteNVSpace(index, offset, nvram_data, |
| using_owner_authorization, extend, delegate); |
| } |
| |
| TPM_RC ReadNVSpace(uint32_t index, |
| uint32_t offset, |
| size_t num_bytes, |
| bool using_owner_authorization, |
| std::string* nvram_data, |
| AuthorizationDelegate* delegate) override { |
| return target_->ReadNVSpace(index, offset, num_bytes, |
| using_owner_authorization, nvram_data, |
| delegate); |
| } |
| |
| TPM_RC GetNVSpaceName(uint32_t index, std::string* name) override { |
| return target_->GetNVSpaceName(index, name); |
| } |
| |
| TPM_RC GetNVSpacePublicArea(uint32_t index, |
| TPMS_NV_PUBLIC* public_data) override { |
| return target_->GetNVSpacePublicArea(index, public_data); |
| } |
| |
| TPM_RC ListNVSpaces(std::vector<uint32_t>* index_list) override { |
| return target_->ListNVSpaces(index_list); |
| } |
| |
| TPM_RC SetDictionaryAttackParameters( |
| uint32_t max_tries, |
| uint32_t recovery_time, |
| uint32_t lockout_recovery, |
| AuthorizationDelegate* delegate) override { |
| return target_->SetDictionaryAttackParameters(max_tries, recovery_time, |
| lockout_recovery, delegate); |
| } |
| |
| TPM_RC ResetDictionaryAttackLock(AuthorizationDelegate* delegate) override { |
| return target_->ResetDictionaryAttackLock(delegate); |
| } |
| |
| private: |
| TpmUtility* target_; |
| }; |
| |
| // Forwards all calls to a target instance. |
| class AuthorizationDelegateForwarder : public AuthorizationDelegate { |
| public: |
| explicit AuthorizationDelegateForwarder(AuthorizationDelegate* target) |
| : target_(target) {} |
| ~AuthorizationDelegateForwarder() override = default; |
| |
| bool GetCommandAuthorization(const std::string& command_hash, |
| bool is_command_parameter_encryption_possible, |
| bool is_response_parameter_encryption_possible, |
| std::string* authorization) override { |
| return target_->GetCommandAuthorization( |
| command_hash, is_command_parameter_encryption_possible, |
| is_response_parameter_encryption_possible, authorization); |
| } |
| |
| bool CheckResponseAuthorization(const std::string& response_hash, |
| const std::string& authorization) override { |
| return target_->CheckResponseAuthorization(response_hash, authorization); |
| } |
| |
| bool EncryptCommandParameter(std::string* parameter) override { |
| return target_->EncryptCommandParameter(parameter); |
| } |
| |
| bool DecryptResponseParameter(std::string* parameter) override { |
| return target_->DecryptResponseParameter(parameter); |
| } |
| |
| private: |
| AuthorizationDelegate* target_; |
| }; |
| |
| // Forwards all calls to a target instance. |
| class SessionManagerForwarder : public SessionManager { |
| public: |
| explicit SessionManagerForwarder(SessionManager* target) : target_(target) {} |
| ~SessionManagerForwarder() override {} |
| |
| TPM_HANDLE GetSessionHandle() const override { |
| return target_->GetSessionHandle(); |
| } |
| |
| void CloseSession() override { return target_->CloseSession(); } |
| |
| TPM_RC StartSession(TPM_SE session_type, |
| TPMI_DH_ENTITY bind_entity, |
| const std::string& bind_authorization_value, |
| bool enable_encryption, |
| HmacAuthorizationDelegate* delegate) override { |
| return target_->StartSession(session_type, bind_entity, |
| bind_authorization_value, enable_encryption, |
| delegate); |
| } |
| |
| private: |
| SessionManager* target_; |
| }; |
| |
| // Forwards all calls to a target instance. |
| class HmacSessionForwarder : public HmacSession { |
| public: |
| explicit HmacSessionForwarder(HmacSession* target) : target_(target) {} |
| ~HmacSessionForwarder() override = default; |
| |
| AuthorizationDelegate* GetDelegate() override { |
| return target_->GetDelegate(); |
| } |
| |
| TPM_RC StartBoundSession(TPMI_DH_ENTITY bind_entity, |
| const std::string& bind_authorization_value, |
| bool enable_encryption) override { |
| return target_->StartBoundSession(bind_entity, bind_authorization_value, |
| enable_encryption); |
| } |
| |
| TPM_RC StartUnboundSession(bool enable_encryption) override { |
| return target_->StartUnboundSession(enable_encryption); |
| } |
| |
| void SetEntityAuthorizationValue(const std::string& value) override { |
| return target_->SetEntityAuthorizationValue(value); |
| } |
| |
| void SetFutureAuthorizationValue(const std::string& value) override { |
| return target_->SetFutureAuthorizationValue(value); |
| } |
| |
| private: |
| HmacSession* target_; |
| }; |
| |
| // Forwards all calls to a target instance. |
| class PolicySessionForwarder : public PolicySession { |
| public: |
| explicit PolicySessionForwarder(PolicySession* target) : target_(target) {} |
| ~PolicySessionForwarder() override = default; |
| |
| AuthorizationDelegate* GetDelegate() override { |
| return target_->GetDelegate(); |
| } |
| |
| TPM_RC StartBoundSession(TPMI_DH_ENTITY bind_entity, |
| const std::string& bind_authorization_value, |
| bool enable_encryption) override { |
| return target_->StartBoundSession(bind_entity, bind_authorization_value, |
| enable_encryption); |
| } |
| |
| TPM_RC StartUnboundSession(bool enable_encryption) override { |
| return target_->StartUnboundSession(enable_encryption); |
| } |
| |
| TPM_RC GetDigest(std::string* digest) override { |
| return target_->GetDigest(digest); |
| } |
| |
| TPM_RC PolicyOR(const std::vector<std::string>& digests) override { |
| return target_->PolicyOR(digests); |
| } |
| |
| TPM_RC PolicyPCR(uint32_t pcr_index, const std::string& pcr_value) override { |
| return target_->PolicyPCR(pcr_index, pcr_value); |
| } |
| |
| TPM_RC PolicyCommandCode(TPM_CC command_code) override { |
| return target_->PolicyCommandCode(command_code); |
| } |
| |
| TPM_RC PolicyAuthValue() override { return target_->PolicyAuthValue(); } |
| |
| TPM_RC PolicyRestart() override { return target_->PolicyRestart(); } |
| |
| void SetEntityAuthorizationValue(const std::string& value) override { |
| return target_->SetEntityAuthorizationValue(value); |
| } |
| |
| private: |
| PolicySession* target_; |
| }; |
| |
| // Forwards all calls to a target instance. |
| class BlobParserForwarder : public BlobParser { |
| public: |
| explicit BlobParserForwarder(BlobParser* target) : target_(target) {} |
| ~BlobParserForwarder() override = default; |
| |
| bool SerializeKeyBlob(const TPM2B_PUBLIC& public_info, |
| const TPM2B_PRIVATE& private_info, |
| std::string* key_blob) override { |
| return target_->SerializeKeyBlob(public_info, private_info, key_blob); |
| } |
| |
| bool ParseKeyBlob(const std::string& key_blob, |
| TPM2B_PUBLIC* public_info, |
| TPM2B_PRIVATE* private_info) override { |
| return target_->ParseKeyBlob(key_blob, public_info, private_info); |
| } |
| |
| bool SerializeCreationBlob(const TPM2B_CREATION_DATA& creation_data, |
| const TPM2B_DIGEST& creation_hash, |
| const TPMT_TK_CREATION& creation_ticket, |
| std::string* creation_blob) override { |
| return target_->SerializeCreationBlob(creation_data, creation_hash, |
| creation_ticket, creation_blob); |
| } |
| |
| bool ParseCreationBlob(const std::string& creation_blob, |
| TPM2B_CREATION_DATA* creation_data, |
| TPM2B_DIGEST* creation_hash, |
| TPMT_TK_CREATION* creation_ticket) override { |
| return target_->ParseCreationBlob(creation_blob, creation_data, |
| creation_hash, creation_ticket); |
| } |
| |
| private: |
| BlobParser* target_; |
| }; |
| |
| TrunksFactoryForTest::TrunksFactoryForTest() |
| : default_tpm_(new NiceMock<MockTpm>()), |
| tpm_(default_tpm_.get()), |
| default_tpm_state_(new NiceMock<MockTpmState>()), |
| tpm_state_(default_tpm_state_.get()), |
| default_tpm_utility_(new NiceMock<MockTpmUtility>()), |
| tpm_utility_(default_tpm_utility_.get()), |
| default_authorization_delegate_(new PasswordAuthorizationDelegate("")), |
| password_authorization_delegate_(default_authorization_delegate_.get()), |
| default_session_manager_(new NiceMock<MockSessionManager>()), |
| session_manager_(default_session_manager_.get()), |
| default_hmac_session_(new NiceMock<MockHmacSession>()), |
| hmac_session_(default_hmac_session_.get()), |
| default_policy_session_(new NiceMock<MockPolicySession>()), |
| policy_session_(default_policy_session_.get()), |
| default_trial_session_(new NiceMock<MockPolicySession>()), |
| trial_session_(default_trial_session_.get()), |
| default_blob_parser_(new NiceMock<MockBlobParser>()), |
| blob_parser_(default_blob_parser_.get()) {} |
| |
| TrunksFactoryForTest::~TrunksFactoryForTest() {} |
| |
| Tpm* TrunksFactoryForTest::GetTpm() const { |
| return tpm_; |
| } |
| |
| std::unique_ptr<TpmState> TrunksFactoryForTest::GetTpmState() const { |
| return base::MakeUnique<TpmStateForwarder>(tpm_state_); |
| } |
| |
| std::unique_ptr<TpmUtility> TrunksFactoryForTest::GetTpmUtility() const { |
| return base::MakeUnique<TpmUtilityForwarder>(tpm_utility_); |
| } |
| |
| std::unique_ptr<AuthorizationDelegate> |
| TrunksFactoryForTest::GetPasswordAuthorization( |
| const std::string& password) const { |
| return base::MakeUnique<AuthorizationDelegateForwarder>( |
| password_authorization_delegate_); |
| } |
| |
| std::unique_ptr<SessionManager> TrunksFactoryForTest::GetSessionManager() |
| const { |
| return base::MakeUnique<SessionManagerForwarder>(session_manager_); |
| } |
| |
| std::unique_ptr<HmacSession> TrunksFactoryForTest::GetHmacSession() const { |
| return base::MakeUnique<HmacSessionForwarder>(hmac_session_); |
| } |
| |
| std::unique_ptr<PolicySession> TrunksFactoryForTest::GetPolicySession() const { |
| return base::MakeUnique<PolicySessionForwarder>(policy_session_); |
| } |
| |
| std::unique_ptr<PolicySession> TrunksFactoryForTest::GetTrialSession() const { |
| return base::MakeUnique<PolicySessionForwarder>(trial_session_); |
| } |
| |
| std::unique_ptr<BlobParser> TrunksFactoryForTest::GetBlobParser() const { |
| return base::MakeUnique<BlobParserForwarder>(blob_parser_); |
| } |
| |
| } // namespace trunks |