Home | History | Annotate | Download | only in server
      1 //
      2 // Copyright (C) 2015 The Android Open Source Project
      3 //
      4 // Licensed under the Apache License, Version 2.0 (the "License");
      5 // you may not use this file except in compliance with the License.
      6 // You may obtain a copy of the License at
      7 //
      8 //      http://www.apache.org/licenses/LICENSE-2.0
      9 //
     10 // Unless required by applicable law or agreed to in writing, software
     11 // distributed under the License is distributed on an "AS IS" BASIS,
     12 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     13 // See the License for the specific language governing permissions and
     14 // limitations under the License.
     15 //
     16 
     17 #include "tpm_manager/server/tpm_status_impl.h"
     18 
     19 #include <vector>
     20 
     21 #include <base/logging.h>
     22 #include <trousers/tss.h>
     23 #include <trousers/trousers.h>  // NOLINT(build/include_alpha)
     24 
     25 namespace tpm_manager {
     26 
     27 // Minimum size of TPM_DA_INFO struct.
     28 const size_t kMinimumDaInfoSize = 21;
     29 
     30 bool TpmStatusImpl::IsTpmEnabled() {
     31   if (!is_enable_initialized_) {
     32     RefreshOwnedEnabledInfo();
     33   }
     34   return is_enabled_;
     35 }
     36 
     37 bool TpmStatusImpl::IsTpmOwned() {
     38   if (!is_owned_) {
     39     RefreshOwnedEnabledInfo();
     40   }
     41   return is_owned_;
     42 }
     43 
     44 bool TpmStatusImpl::GetDictionaryAttackInfo(int* counter,
     45                                             int* threshold,
     46                                             bool* lockout,
     47                                             int* seconds_remaining) {
     48   std::string capability_data;
     49   if (!GetCapability(TSS_TPMCAP_DA_LOGIC, TPM_ET_KEYHANDLE,
     50                      &capability_data, nullptr) ||
     51       capability_data.size() < kMinimumDaInfoSize) {
     52     LOG(ERROR) << "Error getting tpm capability data.";
     53     return false;
     54   }
     55   if (static_cast<uint16_t>(capability_data[1]) == TPM_TAG_DA_INFO) {
     56     TPM_DA_INFO da_info;
     57     uint64_t offset = 0;
     58     std::vector<BYTE> bytes(capability_data.begin(), capability_data.end());
     59     Trspi_UnloadBlob_DA_INFO(&offset, bytes.data(), &da_info);
     60     if (counter) { *counter = da_info.currentCount; }
     61     if (threshold) { *threshold = da_info.thresholdCount; }
     62     if (lockout) { *lockout = (da_info.state == TPM_DA_STATE_ACTIVE); }
     63     if (seconds_remaining) { *seconds_remaining = da_info.actionDependValue; }
     64   }
     65   return true;
     66 }
     67 
     68 void TpmStatusImpl::RefreshOwnedEnabledInfo() {
     69   TSS_RESULT result;
     70   std::string capability_data;
     71   if (!GetCapability(TSS_TPMCAP_PROPERTY, TSS_TPMCAP_PROP_OWNER,
     72                      &capability_data, &result)) {
     73     if (ERROR_CODE(result) == TPM_E_DISABLED) {
     74       is_enable_initialized_ = true;
     75       is_enabled_ = false;
     76     }
     77   } else {
     78     is_enable_initialized_ = true;
     79     is_enabled_ = true;
     80     // |capability_data| should be populated with a TSS_BOOL which is true iff
     81     // the Tpm is owned.
     82     if (capability_data.size() != sizeof(TSS_BOOL)) {
     83       LOG(ERROR) << "Error refreshing Tpm ownership information.";
     84       return;
     85     }
     86     is_owned_ = (capability_data[0] != 0);
     87   }
     88 }
     89 
     90 bool TpmStatusImpl::GetCapability(uint32_t capability,
     91                                   uint32_t sub_capability,
     92                                   std::string* data,
     93                                   TSS_RESULT* tpm_result) {
     94   CHECK(data);
     95   TSS_HTPM tpm_handle = tpm_connection_.GetTpm();
     96   if (tpm_handle == 0) {
     97     return false;
     98   }
     99   uint32_t length = 0;
    100   trousers::ScopedTssMemory buf(tpm_connection_.GetContext());
    101   TSS_RESULT result = Tspi_TPM_GetCapability(
    102       tpm_handle, capability, sizeof(uint32_t),
    103       reinterpret_cast<BYTE*>(&sub_capability),
    104       &length, buf.ptr());
    105   if (tpm_result) {
    106     *tpm_result = result;
    107   }
    108   if (TPM_ERROR(result)) {
    109     LOG(ERROR) << "Error getting TPM capability data.";
    110     return false;
    111   }
    112   data->assign(buf.value(), buf.value() + length);
    113   return true;
    114 }
    115 
    116 }  // namespace tpm_manager
    117