函数源码

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source File:security\keys\trusted-keys\trusted_tpm1.c Create Date:2022-07-27 20:04:34
首页 Copyright©Brick

394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
/*
 * Create an object specific authorisation protocol (OSAP) session
 */
static int osap(struct tpm_buf *tb, struct osapsess *s,
        const unsigned char *key, uint16_t type, uint32_t handle)
{
    unsigned char enonce[TPM_NONCE_SIZE];
    unsigned char ononce[TPM_NONCE_SIZE];
    int ret;
 
    ret = tpm_get_random(chip, ononce, TPM_NONCE_SIZE);
    if (ret != TPM_NONCE_SIZE)
        return ret;
 
    tpm_buf_reset(tb, TPM_TAG_RQU_COMMAND, TPM_ORD_OSAP);
    tpm_buf_append_u16(tb, type);
    tpm_buf_append_u32(tb, handle);
    tpm_buf_append(tb, ononce, TPM_NONCE_SIZE);
 
    ret = trusted_tpm_send(tb->data, MAX_BUF_SIZE);
    if (ret < 0)
        return ret;
 
    s->handle = LOAD32(tb->data, TPM_DATA_OFFSET);
    memcpy(s->enonce, &(tb->data[TPM_DATA_OFFSET + sizeof(uint32_t)]),
           TPM_NONCE_SIZE);
    memcpy(enonce, &(tb->data[TPM_DATA_OFFSET + sizeof(uint32_t) +
                  TPM_NONCE_SIZE]), TPM_NONCE_SIZE);
    return TSS_rawhmac(s->secret, key, SHA1_DIGEST_SIZE, TPM_NONCE_SIZE,
               enonce, TPM_NONCE_SIZE, ononce, 0, 0);
}