3
* Licensed Materials - Property of IBM
5
* trousers - An open source TCG Software Stack
7
* (C) Copyright International Business Machines Corp. 2004-2006
17
#include "trousers/tss.h"
18
#include "trousers_types.h"
20
#include "tcs_utils.h"
21
#include "tcs_int_literals.h"
22
#include "capabilities.h"
24
#include "tcsd_wrap.h"
26
#include "tcs_utils.h"
27
#include "rpc_tcstp_tcs.h"
31
tcs_wrap_CreateMigrationBlob(struct tcsd_thread_data *data)
33
TCS_CONTEXT_HANDLE hContext;
35
TCS_KEY_HANDLE parentHandle;
36
TSS_MIGRATE_SCHEME migrationType;
37
UINT32 MigrationKeyAuthSize, encDataSize, randomSize, outDataSize;
38
BYTE *MigrationKeyAuth, *encData, *random, *outData;
39
TPM_AUTH auth1, auth2, *pParentAuth, *pEntityAuth;
42
if (getData(TCSD_PACKET_TYPE_UINT32, 0, &hContext, 0, &data->comm))
43
return TCSERR(TSS_E_INTERNAL_ERROR);
45
LogDebugFn("thread %zd context %x", THREAD_ID, hContext);
47
if (getData(TCSD_PACKET_TYPE_UINT32, 1, &parentHandle, 0, &data->comm))
48
return TCSERR(TSS_E_INTERNAL_ERROR);
49
if (getData(TCSD_PACKET_TYPE_UINT16, 2, &migrationType, 0, &data->comm))
50
return TCSERR(TSS_E_INTERNAL_ERROR);
52
if (getData(TCSD_PACKET_TYPE_UINT32, 3, &MigrationKeyAuthSize, 0, &data->comm))
53
return TCSERR(TSS_E_INTERNAL_ERROR);
55
MigrationKeyAuth = (BYTE *)malloc(MigrationKeyAuthSize);
56
if (MigrationKeyAuth == NULL) {
57
LogError("malloc of %d bytes failed.", MigrationKeyAuthSize);
58
return TCSERR(TSS_E_INTERNAL_ERROR);
60
if (getData(TCSD_PACKET_TYPE_PBYTE, 4, MigrationKeyAuth, MigrationKeyAuthSize, &data->comm)) {
61
free(MigrationKeyAuth);
62
return TCSERR(TSS_E_INTERNAL_ERROR);
65
if (getData(TCSD_PACKET_TYPE_UINT32, 5, &encDataSize, 0, &data->comm)) {
66
free(MigrationKeyAuth);
67
return TCSERR(TSS_E_INTERNAL_ERROR);
70
encData = (BYTE *)malloc(encDataSize);
71
if (encData == NULL) {
72
free(MigrationKeyAuth);
73
LogError("malloc of %d bytes failed.", encDataSize);
74
return TCSERR(TSS_E_INTERNAL_ERROR);
76
if (getData(TCSD_PACKET_TYPE_PBYTE, 6, encData, encDataSize, &data->comm)) {
77
free(MigrationKeyAuth);
79
return TCSERR(TSS_E_INTERNAL_ERROR);
82
if (getData(TCSD_PACKET_TYPE_AUTH, 7, &auth1, 0, &data->comm)) {
83
free(MigrationKeyAuth);
85
return TCSERR(TSS_E_INTERNAL_ERROR);
88
if (getData(TCSD_PACKET_TYPE_AUTH, 8, &auth2, 0, &data->comm)) {
89
/* If loading the 2nd auth fails, the first one was entity auth */
93
/* If loading the 2nd auth succeeds, the first one was parent auth */
98
MUTEX_LOCK(tcsp_lock);
100
result = TCSP_CreateMigrationBlob_Internal(hContext, parentHandle, migrationType,
101
MigrationKeyAuthSize, MigrationKeyAuth,
102
encDataSize, encData, pParentAuth, pEntityAuth,
103
&randomSize, &random, &outDataSize, &outData);
105
MUTEX_UNLOCK(tcsp_lock);
107
free(MigrationKeyAuth);
109
if (result == TSS_SUCCESS) {
111
initData(&data->comm, 6);
113
if (setData(TCSD_PACKET_TYPE_AUTH, i++, pParentAuth, 0, &data->comm)) {
116
return TCSERR(TSS_E_INTERNAL_ERROR);
120
if (setData(TCSD_PACKET_TYPE_AUTH, i++, pEntityAuth, 0, &data->comm)) {
123
return TCSERR(TSS_E_INTERNAL_ERROR);
126
if (setData(TCSD_PACKET_TYPE_UINT32, i++, &randomSize, 0, &data->comm)) {
129
return TCSERR(TSS_E_INTERNAL_ERROR);
131
if (randomSize > 0) {
132
if (setData(TCSD_PACKET_TYPE_PBYTE, i++, random, randomSize, &data->comm)) {
135
return TCSERR(TSS_E_INTERNAL_ERROR);
139
if (setData(TCSD_PACKET_TYPE_UINT32, i++, &outDataSize, 0, &data->comm)) {
142
return TCSERR(TSS_E_INTERNAL_ERROR);
144
if (setData(TCSD_PACKET_TYPE_PBYTE, i++, outData, outDataSize, &data->comm)) {
147
return TCSERR(TSS_E_INTERNAL_ERROR);
153
initData(&data->comm, 0);
155
data->comm.hdr.u.result = result;
161
tcs_wrap_ConvertMigrationBlob(struct tcsd_thread_data *data)
163
TCS_CONTEXT_HANDLE hContext;
165
TCS_KEY_HANDLE parentHandle;
166
UINT32 outDataSize, randomSize, inDataSize;
167
BYTE *outData, *random, *inData;
168
TPM_AUTH parentAuth, *pParentAuth;
171
if (getData(TCSD_PACKET_TYPE_UINT32, 0, &hContext, 0, &data->comm))
172
return TCSERR(TSS_E_INTERNAL_ERROR);
174
LogDebugFn("thread %zd context %x", THREAD_ID, hContext);
176
if (getData(TCSD_PACKET_TYPE_UINT32, 1, &parentHandle, 0, &data->comm))
177
return TCSERR(TSS_E_INTERNAL_ERROR);
179
if (getData(TCSD_PACKET_TYPE_UINT32, 2, &inDataSize, 0, &data->comm))
180
return TCSERR(TSS_E_INTERNAL_ERROR);
182
inData = (BYTE *)malloc(inDataSize);
183
if (inData == NULL) {
184
LogError("malloc of %d bytes failed.", inDataSize);
185
return TCSERR(TSS_E_INTERNAL_ERROR);
187
if (getData(TCSD_PACKET_TYPE_PBYTE, 3, inData, inDataSize, &data->comm)) {
189
return TCSERR(TSS_E_INTERNAL_ERROR);
192
if (getData(TCSD_PACKET_TYPE_UINT32, 4, &randomSize, 0, &data->comm)) {
194
return TCSERR(TSS_E_INTERNAL_ERROR);
197
random = (BYTE *)malloc(randomSize);
198
if (random == NULL) {
200
LogError("malloc of %d bytes failed.", randomSize);
201
return TCSERR(TSS_E_INTERNAL_ERROR);
203
if (getData(TCSD_PACKET_TYPE_PBYTE, 5, random, randomSize, &data->comm)) {
206
return TCSERR(TSS_E_INTERNAL_ERROR);
209
if (getData(TCSD_PACKET_TYPE_AUTH, 6, &parentAuth, 0, &data->comm))
212
pParentAuth = &parentAuth;
215
MUTEX_LOCK(tcsp_lock);
217
result = TCSP_ConvertMigrationBlob_Internal(hContext, parentHandle, inDataSize, inData,
218
randomSize, random, pParentAuth, &outDataSize,
221
MUTEX_UNLOCK(tcsp_lock);
225
if (result == TSS_SUCCESS) {
227
initData(&data->comm, 3);
229
if (setData(TCSD_PACKET_TYPE_AUTH, i++, pParentAuth, 0, &data->comm)) {
231
return TCSERR(TSS_E_INTERNAL_ERROR);
235
if (setData(TCSD_PACKET_TYPE_UINT32, i++, &outDataSize, 0, &data->comm)) {
237
return TCSERR(TSS_E_INTERNAL_ERROR);
239
if (setData(TCSD_PACKET_TYPE_PBYTE, i++, outData, outDataSize, &data->comm)) {
241
return TCSERR(TSS_E_INTERNAL_ERROR);
246
initData(&data->comm, 0);
248
data->comm.hdr.u.result = result;
254
tcs_wrap_AuthorizeMigrationKey(struct tcsd_thread_data *data)
256
TCS_CONTEXT_HANDLE hContext;
258
TSS_MIGRATE_SCHEME migrateScheme;
259
UINT32 MigrationKeySize, MigrationKeyAuthSize;
260
BYTE *MigrationKey, *MigrationKeyAuth;
263
if (getData(TCSD_PACKET_TYPE_UINT32, 0, &hContext, 0, &data->comm))
264
return TCSERR(TSS_E_INTERNAL_ERROR);
266
LogDebugFn("thread %zd context %x", THREAD_ID, hContext);
268
if (getData(TCSD_PACKET_TYPE_UINT16, 1, &migrateScheme, 0, &data->comm))
269
return TCSERR(TSS_E_INTERNAL_ERROR);
271
if (getData(TCSD_PACKET_TYPE_UINT32, 2, &MigrationKeySize, 0, &data->comm))
272
return TCSERR(TSS_E_INTERNAL_ERROR);
274
MigrationKey = (BYTE *)malloc(MigrationKeySize);
275
if (MigrationKey == NULL) {
276
LogError("malloc of %d bytes failed.", MigrationKeySize);
277
return TCSERR(TSS_E_INTERNAL_ERROR);
279
if (getData(TCSD_PACKET_TYPE_PBYTE, 3, MigrationKey, MigrationKeySize, &data->comm)) {
281
return TCSERR(TSS_E_INTERNAL_ERROR);
284
if (getData(TCSD_PACKET_TYPE_AUTH, 4, &ownerAuth, 0, &data->comm)) {
286
return TCSERR(TSS_E_INTERNAL_ERROR);
289
MUTEX_LOCK(tcsp_lock);
291
result = TCSP_AuthorizeMigrationKey_Internal(hContext, migrateScheme, MigrationKeySize,
292
MigrationKey, &ownerAuth,
293
&MigrationKeyAuthSize, &MigrationKeyAuth);
295
MUTEX_UNLOCK(tcsp_lock);
298
if (result == TSS_SUCCESS) {
299
initData(&data->comm, 3);
300
if (setData(TCSD_PACKET_TYPE_AUTH, 0, &ownerAuth, 0, &data->comm)) {
301
free(MigrationKeyAuth);
302
return TCSERR(TSS_E_INTERNAL_ERROR);
304
if (setData(TCSD_PACKET_TYPE_UINT32, 1, &MigrationKeyAuthSize, 0, &data->comm)) {
305
free(MigrationKeyAuth);
306
return TCSERR(TSS_E_INTERNAL_ERROR);
308
if (setData(TCSD_PACKET_TYPE_PBYTE, 2, MigrationKeyAuth, MigrationKeyAuthSize,
310
free(MigrationKeyAuth);
311
return TCSERR(TSS_E_INTERNAL_ERROR);
314
free(MigrationKeyAuth);
316
initData(&data->comm, 0);
318
data->comm.hdr.u.result = result;