cachepc-linux

Fork of AMDESE/linux with modifications for CachePC side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-linux
Log | Files | Refs | README | LICENSE | sfeed.txt

tpm2.py (21092B)


      1# SPDX-License-Identifier: (GPL-2.0 OR BSD-3-Clause)
      2
      3import hashlib
      4import os
      5import socket
      6import struct
      7import sys
      8import unittest
      9import fcntl
     10import select
     11
     12TPM2_ST_NO_SESSIONS = 0x8001
     13TPM2_ST_SESSIONS = 0x8002
     14
     15TPM2_CC_FIRST = 0x01FF
     16
     17TPM2_CC_CREATE_PRIMARY = 0x0131
     18TPM2_CC_DICTIONARY_ATTACK_LOCK_RESET = 0x0139
     19TPM2_CC_CREATE = 0x0153
     20TPM2_CC_LOAD = 0x0157
     21TPM2_CC_UNSEAL = 0x015E
     22TPM2_CC_FLUSH_CONTEXT = 0x0165
     23TPM2_CC_START_AUTH_SESSION = 0x0176
     24TPM2_CC_GET_CAPABILITY	= 0x017A
     25TPM2_CC_GET_RANDOM = 0x017B
     26TPM2_CC_PCR_READ = 0x017E
     27TPM2_CC_POLICY_PCR = 0x017F
     28TPM2_CC_PCR_EXTEND = 0x0182
     29TPM2_CC_POLICY_PASSWORD = 0x018C
     30TPM2_CC_POLICY_GET_DIGEST = 0x0189
     31
     32TPM2_SE_POLICY = 0x01
     33TPM2_SE_TRIAL = 0x03
     34
     35TPM2_ALG_RSA = 0x0001
     36TPM2_ALG_SHA1 = 0x0004
     37TPM2_ALG_AES = 0x0006
     38TPM2_ALG_KEYEDHASH = 0x0008
     39TPM2_ALG_SHA256 = 0x000B
     40TPM2_ALG_NULL = 0x0010
     41TPM2_ALG_CBC = 0x0042
     42TPM2_ALG_CFB = 0x0043
     43
     44TPM2_RH_OWNER = 0x40000001
     45TPM2_RH_NULL = 0x40000007
     46TPM2_RH_LOCKOUT = 0x4000000A
     47TPM2_RS_PW = 0x40000009
     48
     49TPM2_RC_SIZE            = 0x01D5
     50TPM2_RC_AUTH_FAIL       = 0x098E
     51TPM2_RC_POLICY_FAIL     = 0x099D
     52TPM2_RC_COMMAND_CODE    = 0x0143
     53
     54TSS2_RC_LAYER_SHIFT = 16
     55TSS2_RESMGR_TPM_RC_LAYER = (11 << TSS2_RC_LAYER_SHIFT)
     56
     57TPM2_CAP_HANDLES = 0x00000001
     58TPM2_CAP_COMMANDS = 0x00000002
     59TPM2_CAP_PCRS = 0x00000005
     60TPM2_CAP_TPM_PROPERTIES = 0x00000006
     61
     62TPM2_PT_FIXED = 0x100
     63TPM2_PT_TOTAL_COMMANDS = TPM2_PT_FIXED + 41
     64
     65HR_SHIFT = 24
     66HR_LOADED_SESSION = 0x02000000
     67HR_TRANSIENT = 0x80000000
     68
     69SHA1_DIGEST_SIZE = 20
     70SHA256_DIGEST_SIZE = 32
     71
     72TPM2_VER0_ERRORS = {
     73    0x000: "TPM_RC_SUCCESS",
     74    0x030: "TPM_RC_BAD_TAG",
     75}
     76
     77TPM2_VER1_ERRORS = {
     78    0x000: "TPM_RC_FAILURE",
     79    0x001: "TPM_RC_FAILURE",
     80    0x003: "TPM_RC_SEQUENCE",
     81    0x00B: "TPM_RC_PRIVATE",
     82    0x019: "TPM_RC_HMAC",
     83    0x020: "TPM_RC_DISABLED",
     84    0x021: "TPM_RC_EXCLUSIVE",
     85    0x024: "TPM_RC_AUTH_TYPE",
     86    0x025: "TPM_RC_AUTH_MISSING",
     87    0x026: "TPM_RC_POLICY",
     88    0x027: "TPM_RC_PCR",
     89    0x028: "TPM_RC_PCR_CHANGED",
     90    0x02D: "TPM_RC_UPGRADE",
     91    0x02E: "TPM_RC_TOO_MANY_CONTEXTS",
     92    0x02F: "TPM_RC_AUTH_UNAVAILABLE",
     93    0x030: "TPM_RC_REBOOT",
     94    0x031: "TPM_RC_UNBALANCED",
     95    0x042: "TPM_RC_COMMAND_SIZE",
     96    0x043: "TPM_RC_COMMAND_CODE",
     97    0x044: "TPM_RC_AUTHSIZE",
     98    0x045: "TPM_RC_AUTH_CONTEXT",
     99    0x046: "TPM_RC_NV_RANGE",
    100    0x047: "TPM_RC_NV_SIZE",
    101    0x048: "TPM_RC_NV_LOCKED",
    102    0x049: "TPM_RC_NV_AUTHORIZATION",
    103    0x04A: "TPM_RC_NV_UNINITIALIZED",
    104    0x04B: "TPM_RC_NV_SPACE",
    105    0x04C: "TPM_RC_NV_DEFINED",
    106    0x050: "TPM_RC_BAD_CONTEXT",
    107    0x051: "TPM_RC_CPHASH",
    108    0x052: "TPM_RC_PARENT",
    109    0x053: "TPM_RC_NEEDS_TEST",
    110    0x054: "TPM_RC_NO_RESULT",
    111    0x055: "TPM_RC_SENSITIVE",
    112    0x07F: "RC_MAX_FM0",
    113}
    114
    115TPM2_FMT1_ERRORS = {
    116    0x001: "TPM_RC_ASYMMETRIC",
    117    0x002: "TPM_RC_ATTRIBUTES",
    118    0x003: "TPM_RC_HASH",
    119    0x004: "TPM_RC_VALUE",
    120    0x005: "TPM_RC_HIERARCHY",
    121    0x007: "TPM_RC_KEY_SIZE",
    122    0x008: "TPM_RC_MGF",
    123    0x009: "TPM_RC_MODE",
    124    0x00A: "TPM_RC_TYPE",
    125    0x00B: "TPM_RC_HANDLE",
    126    0x00C: "TPM_RC_KDF",
    127    0x00D: "TPM_RC_RANGE",
    128    0x00E: "TPM_RC_AUTH_FAIL",
    129    0x00F: "TPM_RC_NONCE",
    130    0x010: "TPM_RC_PP",
    131    0x012: "TPM_RC_SCHEME",
    132    0x015: "TPM_RC_SIZE",
    133    0x016: "TPM_RC_SYMMETRIC",
    134    0x017: "TPM_RC_TAG",
    135    0x018: "TPM_RC_SELECTOR",
    136    0x01A: "TPM_RC_INSUFFICIENT",
    137    0x01B: "TPM_RC_SIGNATURE",
    138    0x01C: "TPM_RC_KEY",
    139    0x01D: "TPM_RC_POLICY_FAIL",
    140    0x01F: "TPM_RC_INTEGRITY",
    141    0x020: "TPM_RC_TICKET",
    142    0x021: "TPM_RC_RESERVED_BITS",
    143    0x022: "TPM_RC_BAD_AUTH",
    144    0x023: "TPM_RC_EXPIRED",
    145    0x024: "TPM_RC_POLICY_CC",
    146    0x025: "TPM_RC_BINDING",
    147    0x026: "TPM_RC_CURVE",
    148    0x027: "TPM_RC_ECC_POINT",
    149}
    150
    151TPM2_WARN_ERRORS = {
    152    0x001: "TPM_RC_CONTEXT_GAP",
    153    0x002: "TPM_RC_OBJECT_MEMORY",
    154    0x003: "TPM_RC_SESSION_MEMORY",
    155    0x004: "TPM_RC_MEMORY",
    156    0x005: "TPM_RC_SESSION_HANDLES",
    157    0x006: "TPM_RC_OBJECT_HANDLES",
    158    0x007: "TPM_RC_LOCALITY",
    159    0x008: "TPM_RC_YIELDED",
    160    0x009: "TPM_RC_CANCELED",
    161    0x00A: "TPM_RC_TESTING",
    162    0x010: "TPM_RC_REFERENCE_H0",
    163    0x011: "TPM_RC_REFERENCE_H1",
    164    0x012: "TPM_RC_REFERENCE_H2",
    165    0x013: "TPM_RC_REFERENCE_H3",
    166    0x014: "TPM_RC_REFERENCE_H4",
    167    0x015: "TPM_RC_REFERENCE_H5",
    168    0x016: "TPM_RC_REFERENCE_H6",
    169    0x018: "TPM_RC_REFERENCE_S0",
    170    0x019: "TPM_RC_REFERENCE_S1",
    171    0x01A: "TPM_RC_REFERENCE_S2",
    172    0x01B: "TPM_RC_REFERENCE_S3",
    173    0x01C: "TPM_RC_REFERENCE_S4",
    174    0x01D: "TPM_RC_REFERENCE_S5",
    175    0x01E: "TPM_RC_REFERENCE_S6",
    176    0x020: "TPM_RC_NV_RATE",
    177    0x021: "TPM_RC_LOCKOUT",
    178    0x022: "TPM_RC_RETRY",
    179    0x023: "TPM_RC_NV_UNAVAILABLE",
    180    0x7F: "TPM_RC_NOT_USED",
    181}
    182
    183RC_VER1 = 0x100
    184RC_FMT1 = 0x080
    185RC_WARN = 0x900
    186
    187ALG_DIGEST_SIZE_MAP = {
    188    TPM2_ALG_SHA1: SHA1_DIGEST_SIZE,
    189    TPM2_ALG_SHA256: SHA256_DIGEST_SIZE,
    190}
    191
    192ALG_HASH_FUNCTION_MAP = {
    193    TPM2_ALG_SHA1: hashlib.sha1,
    194    TPM2_ALG_SHA256: hashlib.sha256
    195}
    196
    197NAME_ALG_MAP = {
    198    "sha1": TPM2_ALG_SHA1,
    199    "sha256": TPM2_ALG_SHA256,
    200}
    201
    202
    203class UnknownAlgorithmIdError(Exception):
    204    def __init__(self, alg):
    205        self.alg = alg
    206
    207    def __str__(self):
    208        return '0x%0x' % (alg)
    209
    210
    211class UnknownAlgorithmNameError(Exception):
    212    def __init__(self, name):
    213        self.name = name
    214
    215    def __str__(self):
    216        return name
    217
    218
    219class UnknownPCRBankError(Exception):
    220    def __init__(self, alg):
    221        self.alg = alg
    222
    223    def __str__(self):
    224        return '0x%0x' % (alg)
    225
    226
    227class ProtocolError(Exception):
    228    def __init__(self, cc, rc):
    229        self.cc = cc
    230        self.rc = rc
    231
    232        if (rc & RC_FMT1) == RC_FMT1:
    233            self.name = TPM2_FMT1_ERRORS.get(rc & 0x3f, "TPM_RC_UNKNOWN")
    234        elif (rc & RC_WARN) == RC_WARN:
    235            self.name = TPM2_WARN_ERRORS.get(rc & 0x7f, "TPM_RC_UNKNOWN")
    236        elif (rc & RC_VER1) == RC_VER1:
    237            self.name = TPM2_VER1_ERRORS.get(rc & 0x7f, "TPM_RC_UNKNOWN")
    238        else:
    239            self.name = TPM2_VER0_ERRORS.get(rc & 0x7f, "TPM_RC_UNKNOWN")
    240
    241    def __str__(self):
    242        if self.cc:
    243            return '%s: cc=0x%08x, rc=0x%08x' % (self.name, self.cc, self.rc)
    244        else:
    245            return '%s: rc=0x%08x' % (self.name, self.rc)
    246
    247
    248class AuthCommand(object):
    249    """TPMS_AUTH_COMMAND"""
    250
    251    def __init__(self, session_handle=TPM2_RS_PW, nonce=bytes(),
    252                 session_attributes=0, hmac=bytes()):
    253        self.session_handle = session_handle
    254        self.nonce = nonce
    255        self.session_attributes = session_attributes
    256        self.hmac = hmac
    257
    258    def __bytes__(self):
    259        fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac))
    260        return struct.pack(fmt, self.session_handle, len(self.nonce),
    261                           self.nonce, self.session_attributes, len(self.hmac),
    262                           self.hmac)
    263
    264    def __len__(self):
    265        fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac))
    266        return struct.calcsize(fmt)
    267
    268
    269class SensitiveCreate(object):
    270    """TPMS_SENSITIVE_CREATE"""
    271
    272    def __init__(self, user_auth=bytes(), data=bytes()):
    273        self.user_auth = user_auth
    274        self.data = data
    275
    276    def __bytes__(self):
    277        fmt = '>H%us H%us' % (len(self.user_auth), len(self.data))
    278        return struct.pack(fmt, len(self.user_auth), self.user_auth,
    279                           len(self.data), self.data)
    280
    281    def __len__(self):
    282        fmt = '>H%us H%us' % (len(self.user_auth), len(self.data))
    283        return struct.calcsize(fmt)
    284
    285
    286class Public(object):
    287    """TPMT_PUBLIC"""
    288
    289    FIXED_TPM = (1 << 1)
    290    FIXED_PARENT = (1 << 4)
    291    SENSITIVE_DATA_ORIGIN = (1 << 5)
    292    USER_WITH_AUTH = (1 << 6)
    293    RESTRICTED = (1 << 16)
    294    DECRYPT = (1 << 17)
    295
    296    def __fmt(self):
    297        return '>HHIH%us%usH%us' % \
    298            (len(self.auth_policy), len(self.parameters), len(self.unique))
    299
    300    def __init__(self, object_type, name_alg, object_attributes,
    301                 auth_policy=bytes(), parameters=bytes(),
    302                 unique=bytes()):
    303        self.object_type = object_type
    304        self.name_alg = name_alg
    305        self.object_attributes = object_attributes
    306        self.auth_policy = auth_policy
    307        self.parameters = parameters
    308        self.unique = unique
    309
    310    def __bytes__(self):
    311        return struct.pack(self.__fmt(),
    312                           self.object_type,
    313                           self.name_alg,
    314                           self.object_attributes,
    315                           len(self.auth_policy),
    316                           self.auth_policy,
    317                           self.parameters,
    318                           len(self.unique),
    319                           self.unique)
    320
    321    def __len__(self):
    322        return struct.calcsize(self.__fmt())
    323
    324
    325def get_digest_size(alg):
    326    ds = ALG_DIGEST_SIZE_MAP.get(alg)
    327    if not ds:
    328        raise UnknownAlgorithmIdError(alg)
    329    return ds
    330
    331
    332def get_hash_function(alg):
    333    f = ALG_HASH_FUNCTION_MAP.get(alg)
    334    if not f:
    335        raise UnknownAlgorithmIdError(alg)
    336    return f
    337
    338
    339def get_algorithm(name):
    340    alg = NAME_ALG_MAP.get(name)
    341    if not alg:
    342        raise UnknownAlgorithmNameError(name)
    343    return alg
    344
    345
    346def hex_dump(d):
    347    d = [format(ord(x), '02x') for x in d]
    348    d = [d[i: i + 16] for i in range(0, len(d), 16)]
    349    d = [' '.join(x) for x in d]
    350    d = os.linesep.join(d)
    351
    352    return d
    353
    354class Client:
    355    FLAG_DEBUG = 0x01
    356    FLAG_SPACE = 0x02
    357    FLAG_NONBLOCK = 0x04
    358    TPM_IOC_NEW_SPACE = 0xa200
    359
    360    def __init__(self, flags = 0):
    361        self.flags = flags
    362
    363        if (self.flags & Client.FLAG_SPACE) == 0:
    364            self.tpm = open('/dev/tpm0', 'r+b', buffering=0)
    365        else:
    366            self.tpm = open('/dev/tpmrm0', 'r+b', buffering=0)
    367
    368        if (self.flags & Client.FLAG_NONBLOCK):
    369            flags = fcntl.fcntl(self.tpm, fcntl.F_GETFL)
    370            flags |= os.O_NONBLOCK
    371            fcntl.fcntl(self.tpm, fcntl.F_SETFL, flags)
    372            self.tpm_poll = select.poll()
    373
    374    def close(self):
    375        self.tpm.close()
    376
    377    def send_cmd(self, cmd):
    378        self.tpm.write(cmd)
    379
    380        if (self.flags & Client.FLAG_NONBLOCK):
    381            self.tpm_poll.register(self.tpm, select.POLLIN)
    382            self.tpm_poll.poll(10000)
    383
    384        rsp = self.tpm.read()
    385
    386        if (self.flags & Client.FLAG_NONBLOCK):
    387            self.tpm_poll.unregister(self.tpm)
    388
    389        if (self.flags & Client.FLAG_DEBUG) != 0:
    390            sys.stderr.write('cmd' + os.linesep)
    391            sys.stderr.write(hex_dump(cmd) + os.linesep)
    392            sys.stderr.write('rsp' + os.linesep)
    393            sys.stderr.write(hex_dump(rsp) + os.linesep)
    394
    395        rc = struct.unpack('>I', rsp[6:10])[0]
    396        if rc != 0:
    397            cc = struct.unpack('>I', cmd[6:10])[0]
    398            raise ProtocolError(cc, rc)
    399
    400        return rsp
    401
    402    def read_pcr(self, i, bank_alg = TPM2_ALG_SHA1):
    403        pcrsel_len = max((i >> 3) + 1, 3)
    404        pcrsel = [0] * pcrsel_len
    405        pcrsel[i >> 3] = 1 << (i & 7)
    406        pcrsel = ''.join(map(chr, pcrsel)).encode()
    407
    408        fmt = '>HII IHB%us' % (pcrsel_len)
    409        cmd = struct.pack(fmt,
    410                          TPM2_ST_NO_SESSIONS,
    411                          struct.calcsize(fmt),
    412                          TPM2_CC_PCR_READ,
    413                          1,
    414                          bank_alg,
    415                          pcrsel_len, pcrsel)
    416
    417        rsp = self.send_cmd(cmd)
    418
    419        pcr_update_cnt, pcr_select_cnt = struct.unpack('>II', rsp[10:18])
    420        assert pcr_select_cnt == 1
    421        rsp = rsp[18:]
    422
    423        alg2, pcrsel_len2 = struct.unpack('>HB', rsp[:3])
    424        assert bank_alg == alg2 and pcrsel_len == pcrsel_len2
    425        rsp = rsp[3 + pcrsel_len:]
    426
    427        digest_cnt = struct.unpack('>I', rsp[:4])[0]
    428        if digest_cnt == 0:
    429            return None
    430        rsp = rsp[6:]
    431
    432        return rsp
    433
    434    def extend_pcr(self, i, dig, bank_alg = TPM2_ALG_SHA1):
    435        ds = get_digest_size(bank_alg)
    436        assert(ds == len(dig))
    437
    438        auth_cmd = AuthCommand()
    439
    440        fmt = '>HII I I%us IH%us' % (len(auth_cmd), ds)
    441        cmd = struct.pack(
    442            fmt,
    443            TPM2_ST_SESSIONS,
    444            struct.calcsize(fmt),
    445            TPM2_CC_PCR_EXTEND,
    446            i,
    447            len(auth_cmd),
    448            bytes(auth_cmd),
    449            1, bank_alg, dig)
    450
    451        self.send_cmd(cmd)
    452
    453    def start_auth_session(self, session_type, name_alg = TPM2_ALG_SHA1):
    454        fmt = '>HII IIH16sHBHH'
    455        cmd = struct.pack(fmt,
    456                          TPM2_ST_NO_SESSIONS,
    457                          struct.calcsize(fmt),
    458                          TPM2_CC_START_AUTH_SESSION,
    459                          TPM2_RH_NULL,
    460                          TPM2_RH_NULL,
    461                          16,
    462                          ('\0' * 16).encode(),
    463                          0,
    464                          session_type,
    465                          TPM2_ALG_NULL,
    466                          name_alg)
    467
    468        return struct.unpack('>I', self.send_cmd(cmd)[10:14])[0]
    469
    470    def __calc_pcr_digest(self, pcrs, bank_alg = TPM2_ALG_SHA1,
    471                          digest_alg = TPM2_ALG_SHA1):
    472        x = []
    473        f = get_hash_function(digest_alg)
    474
    475        for i in pcrs:
    476            pcr = self.read_pcr(i, bank_alg)
    477            if pcr is None:
    478                return None
    479            x += pcr
    480
    481        return f(bytearray(x)).digest()
    482
    483    def policy_pcr(self, handle, pcrs, bank_alg = TPM2_ALG_SHA1,
    484                   name_alg = TPM2_ALG_SHA1):
    485        ds = get_digest_size(name_alg)
    486        dig = self.__calc_pcr_digest(pcrs, bank_alg, name_alg)
    487        if not dig:
    488            raise UnknownPCRBankError(bank_alg)
    489
    490        pcrsel_len = max((max(pcrs) >> 3) + 1, 3)
    491        pcrsel = [0] * pcrsel_len
    492        for i in pcrs:
    493            pcrsel[i >> 3] |= 1 << (i & 7)
    494        pcrsel = ''.join(map(chr, pcrsel)).encode()
    495
    496        fmt = '>HII IH%usIHB3s' % ds
    497        cmd = struct.pack(fmt,
    498                          TPM2_ST_NO_SESSIONS,
    499                          struct.calcsize(fmt),
    500                          TPM2_CC_POLICY_PCR,
    501                          handle,
    502                          len(dig),
    503                          bytes(dig),
    504                          1,
    505                          bank_alg,
    506                          pcrsel_len, pcrsel)
    507
    508        self.send_cmd(cmd)
    509
    510    def policy_password(self, handle):
    511        fmt = '>HII I'
    512        cmd = struct.pack(fmt,
    513                          TPM2_ST_NO_SESSIONS,
    514                          struct.calcsize(fmt),
    515                          TPM2_CC_POLICY_PASSWORD,
    516                          handle)
    517
    518        self.send_cmd(cmd)
    519
    520    def get_policy_digest(self, handle):
    521        fmt = '>HII I'
    522        cmd = struct.pack(fmt,
    523                          TPM2_ST_NO_SESSIONS,
    524                          struct.calcsize(fmt),
    525                          TPM2_CC_POLICY_GET_DIGEST,
    526                          handle)
    527
    528        return self.send_cmd(cmd)[12:]
    529
    530    def flush_context(self, handle):
    531        fmt = '>HIII'
    532        cmd = struct.pack(fmt,
    533                          TPM2_ST_NO_SESSIONS,
    534                          struct.calcsize(fmt),
    535                          TPM2_CC_FLUSH_CONTEXT,
    536                          handle)
    537
    538        self.send_cmd(cmd)
    539
    540    def create_root_key(self, auth_value = bytes()):
    541        attributes = \
    542            Public.FIXED_TPM | \
    543            Public.FIXED_PARENT | \
    544            Public.SENSITIVE_DATA_ORIGIN | \
    545            Public.USER_WITH_AUTH | \
    546            Public.RESTRICTED | \
    547            Public.DECRYPT
    548
    549        auth_cmd = AuthCommand()
    550        sensitive = SensitiveCreate(user_auth=auth_value)
    551
    552        public_parms = struct.pack(
    553            '>HHHHHI',
    554            TPM2_ALG_AES,
    555            128,
    556            TPM2_ALG_CFB,
    557            TPM2_ALG_NULL,
    558            2048,
    559            0)
    560
    561        public = Public(
    562            object_type=TPM2_ALG_RSA,
    563            name_alg=TPM2_ALG_SHA1,
    564            object_attributes=attributes,
    565            parameters=public_parms)
    566
    567        fmt = '>HIII I%us H%us H%us HI' % \
    568            (len(auth_cmd), len(sensitive), len(public))
    569        cmd = struct.pack(
    570            fmt,
    571            TPM2_ST_SESSIONS,
    572            struct.calcsize(fmt),
    573            TPM2_CC_CREATE_PRIMARY,
    574            TPM2_RH_OWNER,
    575            len(auth_cmd),
    576            bytes(auth_cmd),
    577            len(sensitive),
    578            bytes(sensitive),
    579            len(public),
    580            bytes(public),
    581            0, 0)
    582
    583        return struct.unpack('>I', self.send_cmd(cmd)[10:14])[0]
    584
    585    def seal(self, parent_key, data, auth_value, policy_dig,
    586             name_alg = TPM2_ALG_SHA1):
    587        ds = get_digest_size(name_alg)
    588        assert(not policy_dig or ds == len(policy_dig))
    589
    590        attributes = 0
    591        if not policy_dig:
    592            attributes |= Public.USER_WITH_AUTH
    593            policy_dig = bytes()
    594
    595        auth_cmd =  AuthCommand()
    596        sensitive = SensitiveCreate(user_auth=auth_value, data=data)
    597
    598        public = Public(
    599            object_type=TPM2_ALG_KEYEDHASH,
    600            name_alg=name_alg,
    601            object_attributes=attributes,
    602            auth_policy=policy_dig,
    603            parameters=struct.pack('>H', TPM2_ALG_NULL))
    604
    605        fmt = '>HIII I%us H%us H%us HI' % \
    606            (len(auth_cmd), len(sensitive), len(public))
    607        cmd = struct.pack(
    608            fmt,
    609            TPM2_ST_SESSIONS,
    610            struct.calcsize(fmt),
    611            TPM2_CC_CREATE,
    612            parent_key,
    613            len(auth_cmd),
    614            bytes(auth_cmd),
    615            len(sensitive),
    616            bytes(sensitive),
    617            len(public),
    618            bytes(public),
    619            0, 0)
    620
    621        rsp = self.send_cmd(cmd)
    622
    623        return rsp[14:]
    624
    625    def unseal(self, parent_key, blob, auth_value, policy_handle):
    626        private_len = struct.unpack('>H', blob[0:2])[0]
    627        public_start = private_len + 2
    628        public_len = struct.unpack('>H', blob[public_start:public_start + 2])[0]
    629        blob = blob[:private_len + public_len + 4]
    630
    631        auth_cmd = AuthCommand()
    632
    633        fmt = '>HII I I%us %us' % (len(auth_cmd), len(blob))
    634        cmd = struct.pack(
    635            fmt,
    636            TPM2_ST_SESSIONS,
    637            struct.calcsize(fmt),
    638            TPM2_CC_LOAD,
    639            parent_key,
    640            len(auth_cmd),
    641            bytes(auth_cmd),
    642            blob)
    643
    644        data_handle = struct.unpack('>I', self.send_cmd(cmd)[10:14])[0]
    645
    646        if policy_handle:
    647            auth_cmd = AuthCommand(session_handle=policy_handle, hmac=auth_value)
    648        else:
    649            auth_cmd = AuthCommand(hmac=auth_value)
    650
    651        fmt = '>HII I I%us' % (len(auth_cmd))
    652        cmd = struct.pack(
    653            fmt,
    654            TPM2_ST_SESSIONS,
    655            struct.calcsize(fmt),
    656            TPM2_CC_UNSEAL,
    657            data_handle,
    658            len(auth_cmd),
    659            bytes(auth_cmd))
    660
    661        try:
    662            rsp = self.send_cmd(cmd)
    663        finally:
    664            self.flush_context(data_handle)
    665
    666        data_len = struct.unpack('>I', rsp[10:14])[0] - 2
    667
    668        return rsp[16:16 + data_len]
    669
    670    def reset_da_lock(self):
    671        auth_cmd = AuthCommand()
    672
    673        fmt = '>HII I I%us' % (len(auth_cmd))
    674        cmd = struct.pack(
    675            fmt,
    676            TPM2_ST_SESSIONS,
    677            struct.calcsize(fmt),
    678            TPM2_CC_DICTIONARY_ATTACK_LOCK_RESET,
    679            TPM2_RH_LOCKOUT,
    680            len(auth_cmd),
    681            bytes(auth_cmd))
    682
    683        self.send_cmd(cmd)
    684
    685    def __get_cap_cnt(self, cap, pt, cnt):
    686        handles = []
    687        fmt = '>HII III'
    688
    689        cmd = struct.pack(fmt,
    690                          TPM2_ST_NO_SESSIONS,
    691                          struct.calcsize(fmt),
    692                          TPM2_CC_GET_CAPABILITY,
    693                          cap, pt, cnt)
    694
    695        rsp = self.send_cmd(cmd)[10:]
    696        more_data, cap, cnt = struct.unpack('>BII', rsp[:9])
    697        rsp = rsp[9:]
    698
    699        for i in range(0, cnt):
    700            handle = struct.unpack('>I', rsp[:4])[0]
    701            handles.append(handle)
    702            rsp = rsp[4:]
    703
    704        return handles, more_data
    705
    706    def get_cap(self, cap, pt):
    707        handles = []
    708
    709        more_data = True
    710        while more_data:
    711            next_handles, more_data = self.__get_cap_cnt(cap, pt, 1)
    712            handles += next_handles
    713            pt += 1
    714
    715        return handles
    716
    717    def get_cap_pcrs(self):
    718        pcr_banks = {}
    719
    720        fmt = '>HII III'
    721
    722        cmd = struct.pack(fmt,
    723                          TPM2_ST_NO_SESSIONS,
    724                          struct.calcsize(fmt),
    725                          TPM2_CC_GET_CAPABILITY,
    726                          TPM2_CAP_PCRS, 0, 1)
    727        rsp = self.send_cmd(cmd)[10:]
    728        _, _, cnt = struct.unpack('>BII', rsp[:9])
    729        rsp = rsp[9:]
    730
    731        # items are TPMS_PCR_SELECTION's
    732        for i in range(0, cnt):
    733              hash, sizeOfSelect = struct.unpack('>HB', rsp[:3])
    734              rsp = rsp[3:]
    735
    736              pcrSelect = 0
    737              if sizeOfSelect > 0:
    738                  pcrSelect, = struct.unpack('%ds' % sizeOfSelect,
    739                                             rsp[:sizeOfSelect])
    740                  rsp = rsp[sizeOfSelect:]
    741                  pcrSelect = int.from_bytes(pcrSelect, byteorder='big')
    742
    743              pcr_banks[hash] = pcrSelect
    744
    745        return pcr_banks