1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-3-Clause)
12 TPM2_ST_NO_SESSIONS = 0x8001
13 TPM2_ST_SESSIONS = 0x8002
15 TPM2_CC_FIRST = 0x01FF
17 TPM2_CC_CREATE_PRIMARY = 0x0131
18 TPM2_CC_DICTIONARY_ATTACK_LOCK_RESET = 0x0139
19 TPM2_CC_CREATE = 0x0153
21 TPM2_CC_UNSEAL = 0x015E
22 TPM2_CC_FLUSH_CONTEXT = 0x0165
23 TPM2_CC_START_AUTH_SESSION = 0x0176
24 TPM2_CC_GET_CAPABILITY = 0x017A
25 TPM2_CC_GET_RANDOM = 0x017B
26 TPM2_CC_PCR_READ = 0x017E
27 TPM2_CC_POLICY_PCR = 0x017F
28 TPM2_CC_PCR_EXTEND = 0x0182
29 TPM2_CC_POLICY_PASSWORD = 0x018C
30 TPM2_CC_POLICY_GET_DIGEST = 0x0189
36 TPM2_ALG_SHA1 = 0x0004
38 TPM2_ALG_KEYEDHASH = 0x0008
39 TPM2_ALG_SHA256 = 0x000B
40 TPM2_ALG_NULL = 0x0010
44 TPM2_RH_OWNER = 0x40000001
45 TPM2_RH_NULL = 0x40000007
46 TPM2_RH_LOCKOUT = 0x4000000A
47 TPM2_RS_PW = 0x40000009
50 TPM2_RC_AUTH_FAIL = 0x098E
51 TPM2_RC_POLICY_FAIL = 0x099D
52 TPM2_RC_COMMAND_CODE = 0x0143
54 TSS2_RC_LAYER_SHIFT = 16
55 TSS2_RESMGR_TPM_RC_LAYER = (11 << TSS2_RC_LAYER_SHIFT)
57 TPM2_CAP_HANDLES = 0x00000001
58 TPM2_CAP_COMMANDS = 0x00000002
59 TPM2_CAP_PCRS = 0x00000005
60 TPM2_CAP_TPM_PROPERTIES = 0x00000006
63 TPM2_PT_TOTAL_COMMANDS = TPM2_PT_FIXED + 41
66 HR_LOADED_SESSION = 0x02000000
67 HR_TRANSIENT = 0x80000000
70 SHA256_DIGEST_SIZE = 32
73 0x000: "TPM_RC_SUCCESS",
74 0x030: "TPM_RC_BAD_TAG",
78 0x000: "TPM_RC_FAILURE",
79 0x001: "TPM_RC_FAILURE",
80 0x003: "TPM_RC_SEQUENCE",
81 0x00B: "TPM_RC_PRIVATE",
83 0x020: "TPM_RC_DISABLED",
84 0x021: "TPM_RC_EXCLUSIVE",
85 0x024: "TPM_RC_AUTH_TYPE",
86 0x025: "TPM_RC_AUTH_MISSING",
87 0x026: "TPM_RC_POLICY",
89 0x028: "TPM_RC_PCR_CHANGED",
90 0x02D: "TPM_RC_UPGRADE",
91 0x02E: "TPM_RC_TOO_MANY_CONTEXTS",
92 0x02F: "TPM_RC_AUTH_UNAVAILABLE",
93 0x030: "TPM_RC_REBOOT",
94 0x031: "TPM_RC_UNBALANCED",
95 0x042: "TPM_RC_COMMAND_SIZE",
96 0x043: "TPM_RC_COMMAND_CODE",
97 0x044: "TPM_RC_AUTHSIZE",
98 0x045: "TPM_RC_AUTH_CONTEXT",
99 0x046: "TPM_RC_NV_RANGE",
100 0x047: "TPM_RC_NV_SIZE",
101 0x048: "TPM_RC_NV_LOCKED",
102 0x049: "TPM_RC_NV_AUTHORIZATION",
103 0x04A: "TPM_RC_NV_UNINITIALIZED",
104 0x04B: "TPM_RC_NV_SPACE",
105 0x04C: "TPM_RC_NV_DEFINED",
106 0x050: "TPM_RC_BAD_CONTEXT",
107 0x051: "TPM_RC_CPHASH",
108 0x052: "TPM_RC_PARENT",
109 0x053: "TPM_RC_NEEDS_TEST",
110 0x054: "TPM_RC_NO_RESULT",
111 0x055: "TPM_RC_SENSITIVE",
116 0x001: "TPM_RC_ASYMMETRIC",
117 0x002: "TPM_RC_ATTRIBUTES",
118 0x003: "TPM_RC_HASH",
119 0x004: "TPM_RC_VALUE",
120 0x005: "TPM_RC_HIERARCHY",
121 0x007: "TPM_RC_KEY_SIZE",
123 0x009: "TPM_RC_MODE",
124 0x00A: "TPM_RC_TYPE",
125 0x00B: "TPM_RC_HANDLE",
127 0x00D: "TPM_RC_RANGE",
128 0x00E: "TPM_RC_AUTH_FAIL",
129 0x00F: "TPM_RC_NONCE",
131 0x012: "TPM_RC_SCHEME",
132 0x015: "TPM_RC_SIZE",
133 0x016: "TPM_RC_SYMMETRIC",
135 0x018: "TPM_RC_SELECTOR",
136 0x01A: "TPM_RC_INSUFFICIENT",
137 0x01B: "TPM_RC_SIGNATURE",
139 0x01D: "TPM_RC_POLICY_FAIL",
140 0x01F: "TPM_RC_INTEGRITY",
141 0x020: "TPM_RC_TICKET",
142 0x021: "TPM_RC_RESERVED_BITS",
143 0x022: "TPM_RC_BAD_AUTH",
144 0x023: "TPM_RC_EXPIRED",
145 0x024: "TPM_RC_POLICY_CC",
146 0x025: "TPM_RC_BINDING",
147 0x026: "TPM_RC_CURVE",
148 0x027: "TPM_RC_ECC_POINT",
152 0x001: "TPM_RC_CONTEXT_GAP",
153 0x002: "TPM_RC_OBJECT_MEMORY",
154 0x003: "TPM_RC_SESSION_MEMORY",
155 0x004: "TPM_RC_MEMORY",
156 0x005: "TPM_RC_SESSION_HANDLES",
157 0x006: "TPM_RC_OBJECT_HANDLES",
158 0x007: "TPM_RC_LOCALITY",
159 0x008: "TPM_RC_YIELDED",
160 0x009: "TPM_RC_CANCELED",
161 0x00A: "TPM_RC_TESTING",
162 0x010: "TPM_RC_REFERENCE_H0",
163 0x011: "TPM_RC_REFERENCE_H1",
164 0x012: "TPM_RC_REFERENCE_H2",
165 0x013: "TPM_RC_REFERENCE_H3",
166 0x014: "TPM_RC_REFERENCE_H4",
167 0x015: "TPM_RC_REFERENCE_H5",
168 0x016: "TPM_RC_REFERENCE_H6",
169 0x018: "TPM_RC_REFERENCE_S0",
170 0x019: "TPM_RC_REFERENCE_S1",
171 0x01A: "TPM_RC_REFERENCE_S2",
172 0x01B: "TPM_RC_REFERENCE_S3",
173 0x01C: "TPM_RC_REFERENCE_S4",
174 0x01D: "TPM_RC_REFERENCE_S5",
175 0x01E: "TPM_RC_REFERENCE_S6",
176 0x020: "TPM_RC_NV_RATE",
177 0x021: "TPM_RC_LOCKOUT",
178 0x022: "TPM_RC_RETRY",
179 0x023: "TPM_RC_NV_UNAVAILABLE",
180 0x7F: "TPM_RC_NOT_USED",
187 ALG_DIGEST_SIZE_MAP = {
188 TPM2_ALG_SHA1: SHA1_DIGEST_SIZE,
189 TPM2_ALG_SHA256: SHA256_DIGEST_SIZE,
192 ALG_HASH_FUNCTION_MAP = {
193 TPM2_ALG_SHA1: hashlib.sha1,
194 TPM2_ALG_SHA256: hashlib.sha256
198 "sha1": TPM2_ALG_SHA1,
199 "sha256": TPM2_ALG_SHA256,
203 class UnknownAlgorithmIdError(Exception):
204 def __init__(self, alg):
208 return '0x%0x' % (alg)
211 class UnknownAlgorithmNameError(Exception):
212 def __init__(self, name):
219 class UnknownPCRBankError(Exception):
220 def __init__(self, alg):
224 return '0x%0x' % (alg)
227 class ProtocolError(Exception):
228 def __init__(self, cc, rc):
232 if (rc & RC_FMT1) == RC_FMT1:
233 self.name = TPM2_FMT1_ERRORS.get(rc & 0x3f, "TPM_RC_UNKNOWN")
234 elif (rc & RC_WARN) == RC_WARN:
235 self.name = TPM2_WARN_ERRORS.get(rc & 0x7f, "TPM_RC_UNKNOWN")
236 elif (rc & RC_VER1) == RC_VER1:
237 self.name = TPM2_VER1_ERRORS.get(rc & 0x7f, "TPM_RC_UNKNOWN")
239 self.name = TPM2_VER0_ERRORS.get(rc & 0x7f, "TPM_RC_UNKNOWN")
243 return '%s: cc=0x%08x, rc=0x%08x' % (self.name, self.cc, self.rc)
245 return '%s: rc=0x%08x' % (self.name, self.rc)
248 class AuthCommand(object):
249 """TPMS_AUTH_COMMAND"""
251 def __init__(self, session_handle=TPM2_RS_PW, nonce=bytes(),
252 session_attributes=0, hmac=bytes()):
253 self.session_handle = session_handle
255 self.session_attributes = session_attributes
259 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac))
260 return struct.pack(fmt, self.session_handle, len(self.nonce),
261 self.nonce, self.session_attributes, len(self.hmac),
265 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac))
266 return struct.calcsize(fmt)
269 class SensitiveCreate(object):
270 """TPMS_SENSITIVE_CREATE"""
272 def __init__(self, user_auth=bytes(), data=bytes()):
273 self.user_auth = user_auth
277 fmt = '>H%us H%us' % (len(self.user_auth), len(self.data))
278 return struct.pack(fmt, len(self.user_auth), self.user_auth,
279 len(self.data), self.data)
282 fmt = '>H%us H%us' % (len(self.user_auth), len(self.data))
283 return struct.calcsize(fmt)
286 class Public(object):
290 FIXED_PARENT = (1 << 4)
291 SENSITIVE_DATA_ORIGIN = (1 << 5)
292 USER_WITH_AUTH = (1 << 6)
293 RESTRICTED = (1 << 16)
297 return '>HHIH%us%usH%us' % \
298 (len(self.auth_policy), len(self.parameters), len(self.unique))
300 def __init__(self, object_type, name_alg, object_attributes,
301 auth_policy=bytes(), parameters=bytes(),
303 self.object_type = object_type
304 self.name_alg = name_alg
305 self.object_attributes = object_attributes
306 self.auth_policy = auth_policy
307 self.parameters = parameters
311 return struct.pack(self.__fmt(),
314 self.object_attributes,
315 len(self.auth_policy),
322 return struct.calcsize(self.__fmt())
325 def get_digest_size(alg):
326 ds = ALG_DIGEST_SIZE_MAP.get(alg)
328 raise UnknownAlgorithmIdError(alg)
332 def get_hash_function(alg):
333 f = ALG_HASH_FUNCTION_MAP.get(alg)
335 raise UnknownAlgorithmIdError(alg)
339 def get_algorithm(name):
340 alg = NAME_ALG_MAP.get(name)
342 raise UnknownAlgorithmNameError(name)
347 d = [format(ord(x), '02x') for x in d]
348 d = [d[i: i + 16] for i in range(0, len(d), 16)]
349 d = [' '.join(x) for x in d]
350 d = os.linesep.join(d)
358 TPM_IOC_NEW_SPACE = 0xa200
360 def __init__(self, flags = 0):
363 if (self.flags & Client.FLAG_SPACE) == 0:
364 self.tpm = open('/dev/tpm0', 'r+b', buffering=0)
366 self.tpm = open('/dev/tpmrm0', 'r+b', buffering=0)
368 if (self.flags & Client.FLAG_NONBLOCK):
369 flags = fcntl.fcntl(self.tpm, fcntl.F_GETFL)
370 flags |= os.O_NONBLOCK
371 fcntl.fcntl(self.tpm, fcntl.F_SETFL, flags)
372 self.tpm_poll = select.poll()
381 def send_cmd(self, cmd):
384 if (self.flags & Client.FLAG_NONBLOCK):
385 self.tpm_poll.register(self.tpm, select.POLLIN)
386 self.tpm_poll.poll(10000)
388 rsp = self.tpm.read()
390 if (self.flags & Client.FLAG_NONBLOCK):
391 self.tpm_poll.unregister(self.tpm)
393 if (self.flags & Client.FLAG_DEBUG) != 0:
394 sys.stderr.write('cmd' + os.linesep)
395 sys.stderr.write(hex_dump(cmd) + os.linesep)
396 sys.stderr.write('rsp' + os.linesep)
397 sys.stderr.write(hex_dump(rsp) + os.linesep)
399 rc = struct.unpack('>I', rsp[6:10])[0]
401 cc = struct.unpack('>I', cmd[6:10])[0]
402 raise ProtocolError(cc, rc)
406 def read_pcr(self, i, bank_alg = TPM2_ALG_SHA1):
407 pcrsel_len = max((i >> 3) + 1, 3)
408 pcrsel = [0] * pcrsel_len
409 pcrsel[i >> 3] = 1 << (i & 7)
410 pcrsel = ''.join(map(chr, pcrsel)).encode()
412 fmt = '>HII IHB%us' % (pcrsel_len)
413 cmd = struct.pack(fmt,
415 struct.calcsize(fmt),
421 rsp = self.send_cmd(cmd)
423 pcr_update_cnt, pcr_select_cnt = struct.unpack('>II', rsp[10:18])
424 assert pcr_select_cnt == 1
427 alg2, pcrsel_len2 = struct.unpack('>HB', rsp[:3])
428 assert bank_alg == alg2 and pcrsel_len == pcrsel_len2
429 rsp = rsp[3 + pcrsel_len:]
431 digest_cnt = struct.unpack('>I', rsp[:4])[0]
438 def extend_pcr(self, i, dig, bank_alg = TPM2_ALG_SHA1):
439 ds = get_digest_size(bank_alg)
440 assert(ds == len(dig))
442 auth_cmd = AuthCommand()
444 fmt = '>HII I I%us IH%us' % (len(auth_cmd), ds)
448 struct.calcsize(fmt),
457 def start_auth_session(self, session_type, name_alg = TPM2_ALG_SHA1):
458 fmt = '>HII IIH16sHBHH'
459 cmd = struct.pack(fmt,
461 struct.calcsize(fmt),
462 TPM2_CC_START_AUTH_SESSION,
466 ('\0' * 16).encode(),
472 return struct.unpack('>I', self.send_cmd(cmd)[10:14])[0]
474 def __calc_pcr_digest(self, pcrs, bank_alg = TPM2_ALG_SHA1,
475 digest_alg = TPM2_ALG_SHA1):
477 f = get_hash_function(digest_alg)
480 pcr = self.read_pcr(i, bank_alg)
485 return f(bytearray(x)).digest()
487 def policy_pcr(self, handle, pcrs, bank_alg = TPM2_ALG_SHA1,
488 name_alg = TPM2_ALG_SHA1):
489 ds = get_digest_size(name_alg)
490 dig = self.__calc_pcr_digest(pcrs, bank_alg, name_alg)
492 raise UnknownPCRBankError(bank_alg)
494 pcrsel_len = max((max(pcrs) >> 3) + 1, 3)
495 pcrsel = [0] * pcrsel_len
497 pcrsel[i >> 3] |= 1 << (i & 7)
498 pcrsel = ''.join(map(chr, pcrsel)).encode()
500 fmt = '>HII IH%usIHB3s' % ds
501 cmd = struct.pack(fmt,
503 struct.calcsize(fmt),
514 def policy_password(self, handle):
516 cmd = struct.pack(fmt,
518 struct.calcsize(fmt),
519 TPM2_CC_POLICY_PASSWORD,
524 def get_policy_digest(self, handle):
526 cmd = struct.pack(fmt,
528 struct.calcsize(fmt),
529 TPM2_CC_POLICY_GET_DIGEST,
532 return self.send_cmd(cmd)[12:]
534 def flush_context(self, handle):
536 cmd = struct.pack(fmt,
538 struct.calcsize(fmt),
539 TPM2_CC_FLUSH_CONTEXT,
544 def create_root_key(self, auth_value = bytes()):
547 Public.FIXED_PARENT | \
548 Public.SENSITIVE_DATA_ORIGIN | \
549 Public.USER_WITH_AUTH | \
550 Public.RESTRICTED | \
553 auth_cmd = AuthCommand()
554 sensitive = SensitiveCreate(user_auth=auth_value)
556 public_parms = struct.pack(
566 object_type=TPM2_ALG_RSA,
567 name_alg=TPM2_ALG_SHA1,
568 object_attributes=attributes,
569 parameters=public_parms)
571 fmt = '>HIII I%us H%us H%us HI' % \
572 (len(auth_cmd), len(sensitive), len(public))
576 struct.calcsize(fmt),
577 TPM2_CC_CREATE_PRIMARY,
587 return struct.unpack('>I', self.send_cmd(cmd)[10:14])[0]
589 def seal(self, parent_key, data, auth_value, policy_dig,
590 name_alg = TPM2_ALG_SHA1):
591 ds = get_digest_size(name_alg)
592 assert(not policy_dig or ds == len(policy_dig))
596 attributes |= Public.USER_WITH_AUTH
599 auth_cmd = AuthCommand()
600 sensitive = SensitiveCreate(user_auth=auth_value, data=data)
603 object_type=TPM2_ALG_KEYEDHASH,
605 object_attributes=attributes,
606 auth_policy=policy_dig,
607 parameters=struct.pack('>H', TPM2_ALG_NULL))
609 fmt = '>HIII I%us H%us H%us HI' % \
610 (len(auth_cmd), len(sensitive), len(public))
614 struct.calcsize(fmt),
625 rsp = self.send_cmd(cmd)
629 def unseal(self, parent_key, blob, auth_value, policy_handle):
630 private_len = struct.unpack('>H', blob[0:2])[0]
631 public_start = private_len + 2
632 public_len = struct.unpack('>H', blob[public_start:public_start + 2])[0]
633 blob = blob[:private_len + public_len + 4]
635 auth_cmd = AuthCommand()
637 fmt = '>HII I I%us %us' % (len(auth_cmd), len(blob))
641 struct.calcsize(fmt),
648 data_handle = struct.unpack('>I', self.send_cmd(cmd)[10:14])[0]
651 auth_cmd = AuthCommand(session_handle=policy_handle, hmac=auth_value)
653 auth_cmd = AuthCommand(hmac=auth_value)
655 fmt = '>HII I I%us' % (len(auth_cmd))
659 struct.calcsize(fmt),
666 rsp = self.send_cmd(cmd)
668 self.flush_context(data_handle)
670 data_len = struct.unpack('>I', rsp[10:14])[0] - 2
672 return rsp[16:16 + data_len]
674 def reset_da_lock(self):
675 auth_cmd = AuthCommand()
677 fmt = '>HII I I%us' % (len(auth_cmd))
681 struct.calcsize(fmt),
682 TPM2_CC_DICTIONARY_ATTACK_LOCK_RESET,
689 def __get_cap_cnt(self, cap, pt, cnt):
693 cmd = struct.pack(fmt,
695 struct.calcsize(fmt),
696 TPM2_CC_GET_CAPABILITY,
699 rsp = self.send_cmd(cmd)[10:]
700 more_data, cap, cnt = struct.unpack('>BII', rsp[:9])
703 for i in range(0, cnt):
704 handle = struct.unpack('>I', rsp[:4])[0]
705 handles.append(handle)
708 return handles, more_data
710 def get_cap(self, cap, pt):
715 next_handles, more_data = self.__get_cap_cnt(cap, pt, 1)
716 handles += next_handles
721 def get_cap_pcrs(self):
726 cmd = struct.pack(fmt,
728 struct.calcsize(fmt),
729 TPM2_CC_GET_CAPABILITY,
731 rsp = self.send_cmd(cmd)[10:]
732 _, _, cnt = struct.unpack('>BII', rsp[:9])
735 # items are TPMS_PCR_SELECTION's
736 for i in range(0, cnt):
737 hash, sizeOfSelect = struct.unpack('>HB', rsp[:3])
742 pcrSelect, = struct.unpack('%ds' % sizeOfSelect,
744 rsp = rsp[sizeOfSelect:]
745 pcrSelect = int.from_bytes(pcrSelect, byteorder='big')
747 pcr_banks[hash] = pcrSelect