xref: /linux/tools/testing/selftests/tpm2/tpm2.py (revision b5bee6ced21ca98389000b7017dd41b0cc37fa50)
1# SPDX-License-Identifier: (GPL-2.0 OR BSD-3-Clause)
2
3import hashlib
4import os
5import socket
6import struct
7import sys
8import unittest
9import fcntl
10import select
11
12TPM2_ST_NO_SESSIONS = 0x8001
13TPM2_ST_SESSIONS = 0x8002
14
15TPM2_CC_FIRST = 0x01FF
16
17TPM2_CC_CREATE_PRIMARY = 0x0131
18TPM2_CC_DICTIONARY_ATTACK_LOCK_RESET = 0x0139
19TPM2_CC_CREATE = 0x0153
20TPM2_CC_LOAD = 0x0157
21TPM2_CC_UNSEAL = 0x015E
22TPM2_CC_FLUSH_CONTEXT = 0x0165
23TPM2_CC_START_AUTH_SESSION = 0x0176
24TPM2_CC_GET_CAPABILITY	= 0x017A
25TPM2_CC_GET_RANDOM = 0x017B
26TPM2_CC_PCR_READ = 0x017E
27TPM2_CC_POLICY_PCR = 0x017F
28TPM2_CC_PCR_EXTEND = 0x0182
29TPM2_CC_POLICY_PASSWORD = 0x018C
30TPM2_CC_POLICY_GET_DIGEST = 0x0189
31
32TPM2_SE_POLICY = 0x01
33TPM2_SE_TRIAL = 0x03
34
35TPM2_ALG_RSA = 0x0001
36TPM2_ALG_SHA1 = 0x0004
37TPM2_ALG_AES = 0x0006
38TPM2_ALG_KEYEDHASH = 0x0008
39TPM2_ALG_SHA256 = 0x000B
40TPM2_ALG_NULL = 0x0010
41TPM2_ALG_CBC = 0x0042
42TPM2_ALG_CFB = 0x0043
43
44TPM2_RH_OWNER = 0x40000001
45TPM2_RH_NULL = 0x40000007
46TPM2_RH_LOCKOUT = 0x4000000A
47TPM2_RS_PW = 0x40000009
48
49TPM2_RC_SIZE            = 0x01D5
50TPM2_RC_AUTH_FAIL       = 0x098E
51TPM2_RC_POLICY_FAIL     = 0x099D
52TPM2_RC_COMMAND_CODE    = 0x0143
53
54TSS2_RC_LAYER_SHIFT = 16
55TSS2_RESMGR_TPM_RC_LAYER = (11 << TSS2_RC_LAYER_SHIFT)
56
57TPM2_CAP_HANDLES = 0x00000001
58TPM2_CAP_COMMANDS = 0x00000002
59TPM2_CAP_PCRS = 0x00000005
60TPM2_CAP_TPM_PROPERTIES = 0x00000006
61
62TPM2_PT_FIXED = 0x100
63TPM2_PT_TOTAL_COMMANDS = TPM2_PT_FIXED + 41
64
65HR_SHIFT = 24
66HR_LOADED_SESSION = 0x02000000
67HR_TRANSIENT = 0x80000000
68
69SHA1_DIGEST_SIZE = 20
70SHA256_DIGEST_SIZE = 32
71
72TPM2_VER0_ERRORS = {
73    0x000: "TPM_RC_SUCCESS",
74    0x030: "TPM_RC_BAD_TAG",
75}
76
77TPM2_VER1_ERRORS = {
78    0x000: "TPM_RC_FAILURE",
79    0x001: "TPM_RC_FAILURE",
80    0x003: "TPM_RC_SEQUENCE",
81    0x00B: "TPM_RC_PRIVATE",
82    0x019: "TPM_RC_HMAC",
83    0x020: "TPM_RC_DISABLED",
84    0x021: "TPM_RC_EXCLUSIVE",
85    0x024: "TPM_RC_AUTH_TYPE",
86    0x025: "TPM_RC_AUTH_MISSING",
87    0x026: "TPM_RC_POLICY",
88    0x027: "TPM_RC_PCR",
89    0x028: "TPM_RC_PCR_CHANGED",
90    0x02D: "TPM_RC_UPGRADE",
91    0x02E: "TPM_RC_TOO_MANY_CONTEXTS",
92    0x02F: "TPM_RC_AUTH_UNAVAILABLE",
93    0x030: "TPM_RC_REBOOT",
94    0x031: "TPM_RC_UNBALANCED",
95    0x042: "TPM_RC_COMMAND_SIZE",
96    0x043: "TPM_RC_COMMAND_CODE",
97    0x044: "TPM_RC_AUTHSIZE",
98    0x045: "TPM_RC_AUTH_CONTEXT",
99    0x046: "TPM_RC_NV_RANGE",
100    0x047: "TPM_RC_NV_SIZE",
101    0x048: "TPM_RC_NV_LOCKED",
102    0x049: "TPM_RC_NV_AUTHORIZATION",
103    0x04A: "TPM_RC_NV_UNINITIALIZED",
104    0x04B: "TPM_RC_NV_SPACE",
105    0x04C: "TPM_RC_NV_DEFINED",
106    0x050: "TPM_RC_BAD_CONTEXT",
107    0x051: "TPM_RC_CPHASH",
108    0x052: "TPM_RC_PARENT",
109    0x053: "TPM_RC_NEEDS_TEST",
110    0x054: "TPM_RC_NO_RESULT",
111    0x055: "TPM_RC_SENSITIVE",
112    0x07F: "RC_MAX_FM0",
113}
114
115TPM2_FMT1_ERRORS = {
116    0x001: "TPM_RC_ASYMMETRIC",
117    0x002: "TPM_RC_ATTRIBUTES",
118    0x003: "TPM_RC_HASH",
119    0x004: "TPM_RC_VALUE",
120    0x005: "TPM_RC_HIERARCHY",
121    0x007: "TPM_RC_KEY_SIZE",
122    0x008: "TPM_RC_MGF",
123    0x009: "TPM_RC_MODE",
124    0x00A: "TPM_RC_TYPE",
125    0x00B: "TPM_RC_HANDLE",
126    0x00C: "TPM_RC_KDF",
127    0x00D: "TPM_RC_RANGE",
128    0x00E: "TPM_RC_AUTH_FAIL",
129    0x00F: "TPM_RC_NONCE",
130    0x010: "TPM_RC_PP",
131    0x012: "TPM_RC_SCHEME",
132    0x015: "TPM_RC_SIZE",
133    0x016: "TPM_RC_SYMMETRIC",
134    0x017: "TPM_RC_TAG",
135    0x018: "TPM_RC_SELECTOR",
136    0x01A: "TPM_RC_INSUFFICIENT",
137    0x01B: "TPM_RC_SIGNATURE",
138    0x01C: "TPM_RC_KEY",
139    0x01D: "TPM_RC_POLICY_FAIL",
140    0x01F: "TPM_RC_INTEGRITY",
141    0x020: "TPM_RC_TICKET",
142    0x021: "TPM_RC_RESERVED_BITS",
143    0x022: "TPM_RC_BAD_AUTH",
144    0x023: "TPM_RC_EXPIRED",
145    0x024: "TPM_RC_POLICY_CC",
146    0x025: "TPM_RC_BINDING",
147    0x026: "TPM_RC_CURVE",
148    0x027: "TPM_RC_ECC_POINT",
149}
150
151TPM2_WARN_ERRORS = {
152    0x001: "TPM_RC_CONTEXT_GAP",
153    0x002: "TPM_RC_OBJECT_MEMORY",
154    0x003: "TPM_RC_SESSION_MEMORY",
155    0x004: "TPM_RC_MEMORY",
156    0x005: "TPM_RC_SESSION_HANDLES",
157    0x006: "TPM_RC_OBJECT_HANDLES",
158    0x007: "TPM_RC_LOCALITY",
159    0x008: "TPM_RC_YIELDED",
160    0x009: "TPM_RC_CANCELED",
161    0x00A: "TPM_RC_TESTING",
162    0x010: "TPM_RC_REFERENCE_H0",
163    0x011: "TPM_RC_REFERENCE_H1",
164    0x012: "TPM_RC_REFERENCE_H2",
165    0x013: "TPM_RC_REFERENCE_H3",
166    0x014: "TPM_RC_REFERENCE_H4",
167    0x015: "TPM_RC_REFERENCE_H5",
168    0x016: "TPM_RC_REFERENCE_H6",
169    0x018: "TPM_RC_REFERENCE_S0",
170    0x019: "TPM_RC_REFERENCE_S1",
171    0x01A: "TPM_RC_REFERENCE_S2",
172    0x01B: "TPM_RC_REFERENCE_S3",
173    0x01C: "TPM_RC_REFERENCE_S4",
174    0x01D: "TPM_RC_REFERENCE_S5",
175    0x01E: "TPM_RC_REFERENCE_S6",
176    0x020: "TPM_RC_NV_RATE",
177    0x021: "TPM_RC_LOCKOUT",
178    0x022: "TPM_RC_RETRY",
179    0x023: "TPM_RC_NV_UNAVAILABLE",
180    0x7F: "TPM_RC_NOT_USED",
181}
182
183RC_VER1 = 0x100
184RC_FMT1 = 0x080
185RC_WARN = 0x900
186
187ALG_DIGEST_SIZE_MAP = {
188    TPM2_ALG_SHA1: SHA1_DIGEST_SIZE,
189    TPM2_ALG_SHA256: SHA256_DIGEST_SIZE,
190}
191
192ALG_HASH_FUNCTION_MAP = {
193    TPM2_ALG_SHA1: hashlib.sha1,
194    TPM2_ALG_SHA256: hashlib.sha256
195}
196
197NAME_ALG_MAP = {
198    "sha1": TPM2_ALG_SHA1,
199    "sha256": TPM2_ALG_SHA256,
200}
201
202
203class UnknownAlgorithmIdError(Exception):
204    def __init__(self, alg):
205        self.alg = alg
206
207    def __str__(self):
208        return '0x%0x' % (alg)
209
210
211class UnknownAlgorithmNameError(Exception):
212    def __init__(self, name):
213        self.name = name
214
215    def __str__(self):
216        return name
217
218
219class UnknownPCRBankError(Exception):
220    def __init__(self, alg):
221        self.alg = alg
222
223    def __str__(self):
224        return '0x%0x' % (alg)
225
226
227class ProtocolError(Exception):
228    def __init__(self, cc, rc):
229        self.cc = cc
230        self.rc = rc
231
232        if (rc & RC_FMT1) == RC_FMT1:
233            self.name = TPM2_FMT1_ERRORS.get(rc & 0x3f, "TPM_RC_UNKNOWN")
234        elif (rc & RC_WARN) == RC_WARN:
235            self.name = TPM2_WARN_ERRORS.get(rc & 0x7f, "TPM_RC_UNKNOWN")
236        elif (rc & RC_VER1) == RC_VER1:
237            self.name = TPM2_VER1_ERRORS.get(rc & 0x7f, "TPM_RC_UNKNOWN")
238        else:
239            self.name = TPM2_VER0_ERRORS.get(rc & 0x7f, "TPM_RC_UNKNOWN")
240
241    def __str__(self):
242        if self.cc:
243            return '%s: cc=0x%08x, rc=0x%08x' % (self.name, self.cc, self.rc)
244        else:
245            return '%s: rc=0x%08x' % (self.name, self.rc)
246
247
248class AuthCommand(object):
249    """TPMS_AUTH_COMMAND"""
250
251    def __init__(self, session_handle=TPM2_RS_PW, nonce=bytes(),
252                 session_attributes=0, hmac=bytes()):
253        self.session_handle = session_handle
254        self.nonce = nonce
255        self.session_attributes = session_attributes
256        self.hmac = hmac
257
258    def __bytes__(self):
259        fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac))
260        return struct.pack(fmt, self.session_handle, len(self.nonce),
261                           self.nonce, self.session_attributes, len(self.hmac),
262                           self.hmac)
263
264    def __len__(self):
265        fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac))
266        return struct.calcsize(fmt)
267
268
269class SensitiveCreate(object):
270    """TPMS_SENSITIVE_CREATE"""
271
272    def __init__(self, user_auth=bytes(), data=bytes()):
273        self.user_auth = user_auth
274        self.data = data
275
276    def __bytes__(self):
277        fmt = '>H%us H%us' % (len(self.user_auth), len(self.data))
278        return struct.pack(fmt, len(self.user_auth), self.user_auth,
279                           len(self.data), self.data)
280
281    def __len__(self):
282        fmt = '>H%us H%us' % (len(self.user_auth), len(self.data))
283        return struct.calcsize(fmt)
284
285
286class Public(object):
287    """TPMT_PUBLIC"""
288
289    FIXED_TPM = (1 << 1)
290    FIXED_PARENT = (1 << 4)
291    SENSITIVE_DATA_ORIGIN = (1 << 5)
292    USER_WITH_AUTH = (1 << 6)
293    RESTRICTED = (1 << 16)
294    DECRYPT = (1 << 17)
295
296    def __fmt(self):
297        return '>HHIH%us%usH%us' % \
298            (len(self.auth_policy), len(self.parameters), len(self.unique))
299
300    def __init__(self, object_type, name_alg, object_attributes,
301                 auth_policy=bytes(), parameters=bytes(),
302                 unique=bytes()):
303        self.object_type = object_type
304        self.name_alg = name_alg
305        self.object_attributes = object_attributes
306        self.auth_policy = auth_policy
307        self.parameters = parameters
308        self.unique = unique
309
310    def __bytes__(self):
311        return struct.pack(self.__fmt(),
312                           self.object_type,
313                           self.name_alg,
314                           self.object_attributes,
315                           len(self.auth_policy),
316                           self.auth_policy,
317                           self.parameters,
318                           len(self.unique),
319                           self.unique)
320
321    def __len__(self):
322        return struct.calcsize(self.__fmt())
323
324
325def get_digest_size(alg):
326    ds = ALG_DIGEST_SIZE_MAP.get(alg)
327    if not ds:
328        raise UnknownAlgorithmIdError(alg)
329    return ds
330
331
332def get_hash_function(alg):
333    f = ALG_HASH_FUNCTION_MAP.get(alg)
334    if not f:
335        raise UnknownAlgorithmIdError(alg)
336    return f
337
338
339def get_algorithm(name):
340    alg = NAME_ALG_MAP.get(name)
341    if not alg:
342        raise UnknownAlgorithmNameError(name)
343    return alg
344
345
346def hex_dump(d):
347    d = [format(ord(x), '02x') for x in d]
348    d = [d[i: i + 16] for i in range(0, len(d), 16)]
349    d = [' '.join(x) for x in d]
350    d = os.linesep.join(d)
351
352    return d
353
354class Client:
355    FLAG_DEBUG = 0x01
356    FLAG_SPACE = 0x02
357    FLAG_NONBLOCK = 0x04
358    TPM_IOC_NEW_SPACE = 0xa200
359
360    def __init__(self, flags = 0):
361        self.flags = flags
362
363        if (self.flags & Client.FLAG_SPACE) == 0:
364            self.tpm = open('/dev/tpm0', 'r+b', buffering=0)
365        else:
366            self.tpm = open('/dev/tpmrm0', 'r+b', buffering=0)
367
368        if (self.flags & Client.FLAG_NONBLOCK):
369            flags = fcntl.fcntl(self.tpm, fcntl.F_GETFL)
370            flags |= os.O_NONBLOCK
371            fcntl.fcntl(self.tpm, fcntl.F_SETFL, flags)
372            self.tpm_poll = select.poll()
373
374    def close(self):
375        self.tpm.close()
376
377    def send_cmd(self, cmd):
378        self.tpm.write(cmd)
379
380        if (self.flags & Client.FLAG_NONBLOCK):
381            self.tpm_poll.register(self.tpm, select.POLLIN)
382            self.tpm_poll.poll(10000)
383
384        rsp = self.tpm.read()
385
386        if (self.flags & Client.FLAG_NONBLOCK):
387            self.tpm_poll.unregister(self.tpm)
388
389        if (self.flags & Client.FLAG_DEBUG) != 0:
390            sys.stderr.write('cmd' + os.linesep)
391            sys.stderr.write(hex_dump(cmd) + os.linesep)
392            sys.stderr.write('rsp' + os.linesep)
393            sys.stderr.write(hex_dump(rsp) + os.linesep)
394
395        rc = struct.unpack('>I', rsp[6:10])[0]
396        if rc != 0:
397            cc = struct.unpack('>I', cmd[6:10])[0]
398            raise ProtocolError(cc, rc)
399
400        return rsp
401
402    def read_pcr(self, i, bank_alg = TPM2_ALG_SHA1):
403        pcrsel_len = max((i >> 3) + 1, 3)
404        pcrsel = [0] * pcrsel_len
405        pcrsel[i >> 3] = 1 << (i & 7)
406        pcrsel = ''.join(map(chr, pcrsel)).encode()
407
408        fmt = '>HII IHB%us' % (pcrsel_len)
409        cmd = struct.pack(fmt,
410                          TPM2_ST_NO_SESSIONS,
411                          struct.calcsize(fmt),
412                          TPM2_CC_PCR_READ,
413                          1,
414                          bank_alg,
415                          pcrsel_len, pcrsel)
416
417        rsp = self.send_cmd(cmd)
418
419        pcr_update_cnt, pcr_select_cnt = struct.unpack('>II', rsp[10:18])
420        assert pcr_select_cnt == 1
421        rsp = rsp[18:]
422
423        alg2, pcrsel_len2 = struct.unpack('>HB', rsp[:3])
424        assert bank_alg == alg2 and pcrsel_len == pcrsel_len2
425        rsp = rsp[3 + pcrsel_len:]
426
427        digest_cnt = struct.unpack('>I', rsp[:4])[0]
428        if digest_cnt == 0:
429            return None
430        rsp = rsp[6:]
431
432        return rsp
433
434    def extend_pcr(self, i, dig, bank_alg = TPM2_ALG_SHA1):
435        ds = get_digest_size(bank_alg)
436        assert(ds == len(dig))
437
438        auth_cmd = AuthCommand()
439
440        fmt = '>HII I I%us IH%us' % (len(auth_cmd), ds)
441        cmd = struct.pack(
442            fmt,
443            TPM2_ST_SESSIONS,
444            struct.calcsize(fmt),
445            TPM2_CC_PCR_EXTEND,
446            i,
447            len(auth_cmd),
448            bytes(auth_cmd),
449            1, bank_alg, dig)
450
451        self.send_cmd(cmd)
452
453    def start_auth_session(self, session_type, name_alg = TPM2_ALG_SHA1):
454        fmt = '>HII IIH16sHBHH'
455        cmd = struct.pack(fmt,
456                          TPM2_ST_NO_SESSIONS,
457                          struct.calcsize(fmt),
458                          TPM2_CC_START_AUTH_SESSION,
459                          TPM2_RH_NULL,
460                          TPM2_RH_NULL,
461                          16,
462                          ('\0' * 16).encode(),
463                          0,
464                          session_type,
465                          TPM2_ALG_NULL,
466                          name_alg)
467
468        return struct.unpack('>I', self.send_cmd(cmd)[10:14])[0]
469
470    def __calc_pcr_digest(self, pcrs, bank_alg = TPM2_ALG_SHA1,
471                          digest_alg = TPM2_ALG_SHA1):
472        x = []
473        f = get_hash_function(digest_alg)
474
475        for i in pcrs:
476            pcr = self.read_pcr(i, bank_alg)
477            if pcr is None:
478                return None
479            x += pcr
480
481        return f(bytearray(x)).digest()
482
483    def policy_pcr(self, handle, pcrs, bank_alg = TPM2_ALG_SHA1,
484                   name_alg = TPM2_ALG_SHA1):
485        ds = get_digest_size(name_alg)
486        dig = self.__calc_pcr_digest(pcrs, bank_alg, name_alg)
487        if not dig:
488            raise UnknownPCRBankError(bank_alg)
489
490        pcrsel_len = max((max(pcrs) >> 3) + 1, 3)
491        pcrsel = [0] * pcrsel_len
492        for i in pcrs:
493            pcrsel[i >> 3] |= 1 << (i & 7)
494        pcrsel = ''.join(map(chr, pcrsel)).encode()
495
496        fmt = '>HII IH%usIHB3s' % ds
497        cmd = struct.pack(fmt,
498                          TPM2_ST_NO_SESSIONS,
499                          struct.calcsize(fmt),
500                          TPM2_CC_POLICY_PCR,
501                          handle,
502                          len(dig),
503                          bytes(dig),
504                          1,
505                          bank_alg,
506                          pcrsel_len, pcrsel)
507
508        self.send_cmd(cmd)
509
510    def policy_password(self, handle):
511        fmt = '>HII I'
512        cmd = struct.pack(fmt,
513                          TPM2_ST_NO_SESSIONS,
514                          struct.calcsize(fmt),
515                          TPM2_CC_POLICY_PASSWORD,
516                          handle)
517
518        self.send_cmd(cmd)
519
520    def get_policy_digest(self, handle):
521        fmt = '>HII I'
522        cmd = struct.pack(fmt,
523                          TPM2_ST_NO_SESSIONS,
524                          struct.calcsize(fmt),
525                          TPM2_CC_POLICY_GET_DIGEST,
526                          handle)
527
528        return self.send_cmd(cmd)[12:]
529
530    def flush_context(self, handle):
531        fmt = '>HIII'
532        cmd = struct.pack(fmt,
533                          TPM2_ST_NO_SESSIONS,
534                          struct.calcsize(fmt),
535                          TPM2_CC_FLUSH_CONTEXT,
536                          handle)
537
538        self.send_cmd(cmd)
539
540    def create_root_key(self, auth_value = bytes()):
541        attributes = \
542            Public.FIXED_TPM | \
543            Public.FIXED_PARENT | \
544            Public.SENSITIVE_DATA_ORIGIN | \
545            Public.USER_WITH_AUTH | \
546            Public.RESTRICTED | \
547            Public.DECRYPT
548
549        auth_cmd = AuthCommand()
550        sensitive = SensitiveCreate(user_auth=auth_value)
551
552        public_parms = struct.pack(
553            '>HHHHHI',
554            TPM2_ALG_AES,
555            128,
556            TPM2_ALG_CFB,
557            TPM2_ALG_NULL,
558            2048,
559            0)
560
561        public = Public(
562            object_type=TPM2_ALG_RSA,
563            name_alg=TPM2_ALG_SHA1,
564            object_attributes=attributes,
565            parameters=public_parms)
566
567        fmt = '>HIII I%us H%us H%us HI' % \
568            (len(auth_cmd), len(sensitive), len(public))
569        cmd = struct.pack(
570            fmt,
571            TPM2_ST_SESSIONS,
572            struct.calcsize(fmt),
573            TPM2_CC_CREATE_PRIMARY,
574            TPM2_RH_OWNER,
575            len(auth_cmd),
576            bytes(auth_cmd),
577            len(sensitive),
578            bytes(sensitive),
579            len(public),
580            bytes(public),
581            0, 0)
582
583        return struct.unpack('>I', self.send_cmd(cmd)[10:14])[0]
584
585    def seal(self, parent_key, data, auth_value, policy_dig,
586             name_alg = TPM2_ALG_SHA1):
587        ds = get_digest_size(name_alg)
588        assert(not policy_dig or ds == len(policy_dig))
589
590        attributes = 0
591        if not policy_dig:
592            attributes |= Public.USER_WITH_AUTH
593            policy_dig = bytes()
594
595        auth_cmd =  AuthCommand()
596        sensitive = SensitiveCreate(user_auth=auth_value, data=data)
597
598        public = Public(
599            object_type=TPM2_ALG_KEYEDHASH,
600            name_alg=name_alg,
601            object_attributes=attributes,
602            auth_policy=policy_dig,
603            parameters=struct.pack('>H', TPM2_ALG_NULL))
604
605        fmt = '>HIII I%us H%us H%us HI' % \
606            (len(auth_cmd), len(sensitive), len(public))
607        cmd = struct.pack(
608            fmt,
609            TPM2_ST_SESSIONS,
610            struct.calcsize(fmt),
611            TPM2_CC_CREATE,
612            parent_key,
613            len(auth_cmd),
614            bytes(auth_cmd),
615            len(sensitive),
616            bytes(sensitive),
617            len(public),
618            bytes(public),
619            0, 0)
620
621        rsp = self.send_cmd(cmd)
622
623        return rsp[14:]
624
625    def unseal(self, parent_key, blob, auth_value, policy_handle):
626        private_len = struct.unpack('>H', blob[0:2])[0]
627        public_start = private_len + 2
628        public_len = struct.unpack('>H', blob[public_start:public_start + 2])[0]
629        blob = blob[:private_len + public_len + 4]
630
631        auth_cmd = AuthCommand()
632
633        fmt = '>HII I I%us %us' % (len(auth_cmd), len(blob))
634        cmd = struct.pack(
635            fmt,
636            TPM2_ST_SESSIONS,
637            struct.calcsize(fmt),
638            TPM2_CC_LOAD,
639            parent_key,
640            len(auth_cmd),
641            bytes(auth_cmd),
642            blob)
643
644        data_handle = struct.unpack('>I', self.send_cmd(cmd)[10:14])[0]
645
646        if policy_handle:
647            auth_cmd = AuthCommand(session_handle=policy_handle, hmac=auth_value)
648        else:
649            auth_cmd = AuthCommand(hmac=auth_value)
650
651        fmt = '>HII I I%us' % (len(auth_cmd))
652        cmd = struct.pack(
653            fmt,
654            TPM2_ST_SESSIONS,
655            struct.calcsize(fmt),
656            TPM2_CC_UNSEAL,
657            data_handle,
658            len(auth_cmd),
659            bytes(auth_cmd))
660
661        try:
662            rsp = self.send_cmd(cmd)
663        finally:
664            self.flush_context(data_handle)
665
666        data_len = struct.unpack('>I', rsp[10:14])[0] - 2
667
668        return rsp[16:16 + data_len]
669
670    def reset_da_lock(self):
671        auth_cmd = AuthCommand()
672
673        fmt = '>HII I I%us' % (len(auth_cmd))
674        cmd = struct.pack(
675            fmt,
676            TPM2_ST_SESSIONS,
677            struct.calcsize(fmt),
678            TPM2_CC_DICTIONARY_ATTACK_LOCK_RESET,
679            TPM2_RH_LOCKOUT,
680            len(auth_cmd),
681            bytes(auth_cmd))
682
683        self.send_cmd(cmd)
684
685    def __get_cap_cnt(self, cap, pt, cnt):
686        handles = []
687        fmt = '>HII III'
688
689        cmd = struct.pack(fmt,
690                          TPM2_ST_NO_SESSIONS,
691                          struct.calcsize(fmt),
692                          TPM2_CC_GET_CAPABILITY,
693                          cap, pt, cnt)
694
695        rsp = self.send_cmd(cmd)[10:]
696        more_data, cap, cnt = struct.unpack('>BII', rsp[:9])
697        rsp = rsp[9:]
698
699        for i in range(0, cnt):
700            handle = struct.unpack('>I', rsp[:4])[0]
701            handles.append(handle)
702            rsp = rsp[4:]
703
704        return handles, more_data
705
706    def get_cap(self, cap, pt):
707        handles = []
708
709        more_data = True
710        while more_data:
711            next_handles, more_data = self.__get_cap_cnt(cap, pt, 1)
712            handles += next_handles
713            pt += 1
714
715        return handles
716
717    def get_cap_pcrs(self):
718        pcr_banks = {}
719
720        fmt = '>HII III'
721
722        cmd = struct.pack(fmt,
723                          TPM2_ST_NO_SESSIONS,
724                          struct.calcsize(fmt),
725                          TPM2_CC_GET_CAPABILITY,
726                          TPM2_CAP_PCRS, 0, 1)
727        rsp = self.send_cmd(cmd)[10:]
728        _, _, cnt = struct.unpack('>BII', rsp[:9])
729        rsp = rsp[9:]
730
731        # items are TPMS_PCR_SELECTION's
732        for i in range(0, cnt):
733              hash, sizeOfSelect = struct.unpack('>HB', rsp[:3])
734              rsp = rsp[3:]
735
736              pcrSelect = 0
737              if sizeOfSelect > 0:
738                  pcrSelect, = struct.unpack('%ds' % sizeOfSelect,
739                                             rsp[:sizeOfSelect])
740                  rsp = rsp[sizeOfSelect:]
741                  pcrSelect = int.from_bytes(pcrSelect, byteorder='big')
742
743              pcr_banks[hash] = pcrSelect
744
745        return pcr_banks
746