1 //
2 // Copyright (C) 2015 The Android Open Source Project
3 //
4 // Licensed under the Apache License, Version 2.0 (the "License");
5 // you may not use this file except in compliance with the License.
6 // You may obtain a copy of the License at
7 //
8 //      http://www.apache.org/licenses/LICENSE-2.0
9 //
10 // Unless required by applicable law or agreed to in writing, software
11 // distributed under the License is distributed on an "AS IS" BASIS,
12 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 // See the License for the specific language governing permissions and
14 // limitations under the License.
15 //
16 
17 #include "tpm_manager/server/tpm_status_impl.h"
18 
19 #include <vector>
20 
21 #include <base/logging.h>
22 #include <trousers/tss.h>
23 #include <trousers/trousers.h>  // NOLINT(build/include_alpha)
24 
25 namespace tpm_manager {
26 
27 // Minimum size of TPM_DA_INFO struct.
28 const size_t kMinimumDaInfoSize = 21;
29 
IsTpmEnabled()30 bool TpmStatusImpl::IsTpmEnabled() {
31   if (!is_enable_initialized_) {
32     RefreshOwnedEnabledInfo();
33   }
34   return is_enabled_;
35 }
36 
IsTpmOwned()37 bool TpmStatusImpl::IsTpmOwned() {
38   if (!is_owned_) {
39     RefreshOwnedEnabledInfo();
40   }
41   return is_owned_;
42 }
43 
GetDictionaryAttackInfo(int * counter,int * threshold,bool * lockout,int * seconds_remaining)44 bool TpmStatusImpl::GetDictionaryAttackInfo(int* counter,
45                                             int* threshold,
46                                             bool* lockout,
47                                             int* seconds_remaining) {
48   std::string capability_data;
49   if (!GetCapability(TSS_TPMCAP_DA_LOGIC, TPM_ET_KEYHANDLE,
50                      &capability_data, nullptr) ||
51       capability_data.size() < kMinimumDaInfoSize) {
52     LOG(ERROR) << "Error getting tpm capability data.";
53     return false;
54   }
55   if (static_cast<uint16_t>(capability_data[1]) == TPM_TAG_DA_INFO) {
56     TPM_DA_INFO da_info;
57     uint64_t offset = 0;
58     std::vector<BYTE> bytes(capability_data.begin(), capability_data.end());
59     Trspi_UnloadBlob_DA_INFO(&offset, bytes.data(), &da_info);
60     if (counter) { *counter = da_info.currentCount; }
61     if (threshold) { *threshold = da_info.thresholdCount; }
62     if (lockout) { *lockout = (da_info.state == TPM_DA_STATE_ACTIVE); }
63     if (seconds_remaining) { *seconds_remaining = da_info.actionDependValue; }
64   }
65   return true;
66 }
67 
RefreshOwnedEnabledInfo()68 void TpmStatusImpl::RefreshOwnedEnabledInfo() {
69   TSS_RESULT result;
70   std::string capability_data;
71   if (!GetCapability(TSS_TPMCAP_PROPERTY, TSS_TPMCAP_PROP_OWNER,
72                      &capability_data, &result)) {
73     if (ERROR_CODE(result) == TPM_E_DISABLED) {
74       is_enable_initialized_ = true;
75       is_enabled_ = false;
76     }
77   } else {
78     is_enable_initialized_ = true;
79     is_enabled_ = true;
80     // |capability_data| should be populated with a TSS_BOOL which is true iff
81     // the Tpm is owned.
82     if (capability_data.size() != sizeof(TSS_BOOL)) {
83       LOG(ERROR) << "Error refreshing Tpm ownership information.";
84       return;
85     }
86     is_owned_ = (capability_data[0] != 0);
87   }
88 }
89 
GetCapability(uint32_t capability,uint32_t sub_capability,std::string * data,TSS_RESULT * tpm_result)90 bool TpmStatusImpl::GetCapability(uint32_t capability,
91                                   uint32_t sub_capability,
92                                   std::string* data,
93                                   TSS_RESULT* tpm_result) {
94   CHECK(data);
95   TSS_HTPM tpm_handle = tpm_connection_.GetTpm();
96   if (tpm_handle == 0) {
97     return false;
98   }
99   uint32_t length = 0;
100   trousers::ScopedTssMemory buf(tpm_connection_.GetContext());
101   TSS_RESULT result = Tspi_TPM_GetCapability(
102       tpm_handle, capability, sizeof(uint32_t),
103       reinterpret_cast<BYTE*>(&sub_capability),
104       &length, buf.ptr());
105   if (tpm_result) {
106     *tpm_result = result;
107   }
108   if (TPM_ERROR(result)) {
109     LOG(ERROR) << "Error getting TPM capability data.";
110     return false;
111   }
112   data->assign(buf.value(), buf.value() + length);
113   return true;
114 }
115 
116 }  // namespace tpm_manager
117