blob: f0e0f6a2d50f33737e33cf514772bd517927bb4a [file] [log] [blame]
// Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CRYPTOHOME_MOCK_TPM_H_
#define CRYPTOHOME_MOCK_TPM_H_
#include "tpm.h"
#include <base/logging.h>
#include <chromeos/secure_blob.h>
#include <chromeos/utility.h>
#include <gmock/gmock.h>
namespace cryptohome {
using ::testing::_;
using ::testing::Invoke;
using ::testing::Return;
class Crypto;
class MockTpm : public Tpm {
public:
MockTpm();
~MockTpm();
MOCK_CONST_METHOD0(IsOwned, bool());
MOCK_CONST_METHOD0(IsBeingOwned, bool());
MOCK_METHOD1(Connect, bool(TpmRetryAction*)); // NOLINT
MOCK_METHOD6(EncryptBlob, bool(TSS_HCONTEXT, TSS_HKEY,
const chromeos::SecureBlob&,
const chromeos::SecureBlob&,
chromeos::SecureBlob*, TSS_RESULT*));
MOCK_METHOD6(DecryptBlob, bool(TSS_HCONTEXT, TSS_HKEY,
const chromeos::SecureBlob&,
const chromeos::SecureBlob&,
chromeos::SecureBlob*, TSS_RESULT*));
MOCK_METHOD2(GetPublicKey, bool(chromeos::SecureBlob*, TpmRetryAction*));
MOCK_METHOD3(GetPublicKeyHash, Tpm::TpmRetryAction(TSS_HCONTEXT,
TSS_HKEY,
chromeos::SecureBlob*));
MOCK_METHOD1(GetOwnerPassword, bool(chromeos::Blob*));
MOCK_CONST_METHOD0(IsEnabled, bool());
MOCK_METHOD2(GetRandomData, bool(size_t, chromeos::Blob*));
MOCK_METHOD2(DefineLockOnceNvram, bool(uint32_t, size_t));
MOCK_METHOD2(WriteNvram, bool(uint32_t, const chromeos::SecureBlob&));
MOCK_METHOD2(ReadNvram, bool(uint32_t, chromeos::SecureBlob*));
MOCK_METHOD1(DestroyNvram, bool(uint32_t));
MOCK_METHOD1(IsNvramDefined, bool(uint32_t));
MOCK_METHOD1(IsNvramLocked, bool(uint32_t));
MOCK_METHOD1(GetNvramSize, unsigned int(uint32_t));
MOCK_METHOD1(GetEndorsementPublicKey, bool(chromeos::SecureBlob*));
MOCK_METHOD1(GetEndorsementCredential, bool(chromeos::SecureBlob*));
MOCK_METHOD9(MakeIdentity, bool(chromeos::SecureBlob*,
chromeos::SecureBlob*,
chromeos::SecureBlob*,
chromeos::SecureBlob*,
chromeos::SecureBlob*,
chromeos::SecureBlob*,
chromeos::SecureBlob*,
chromeos::SecureBlob*,
chromeos::SecureBlob*));
MOCK_METHOD6(ActivateIdentity, bool(const chromeos::SecureBlob&,
const chromeos::SecureBlob&,
const chromeos::SecureBlob&,
const chromeos::SecureBlob&,
const chromeos::SecureBlob&,
chromeos::SecureBlob*));
MOCK_METHOD5(QuotePCR0, bool(const chromeos::SecureBlob&,
const chromeos::SecureBlob&,
chromeos::SecureBlob*,
chromeos::SecureBlob*,
chromeos::SecureBlob*));
MOCK_METHOD2(SealToPCR0, bool(const chromeos::Blob&, chromeos::Blob*));
MOCK_METHOD2(Unseal, bool(const chromeos::Blob&, chromeos::Blob*));
MOCK_METHOD3(CreateDelegate, bool(const chromeos::SecureBlob&,
chromeos::SecureBlob*,
chromeos::SecureBlob*));
MOCK_METHOD7(CreateCertifiedKey, bool(const chromeos::SecureBlob&,
const chromeos::SecureBlob&,
chromeos::SecureBlob*,
chromeos::SecureBlob*,
chromeos::SecureBlob*,
chromeos::SecureBlob*,
chromeos::SecureBlob*));
MOCK_METHOD3(Sign, bool(const chromeos::SecureBlob&,
const chromeos::SecureBlob&,
chromeos::SecureBlob*));
MOCK_METHOD4(CreatePCRBoundKey, bool(int,
const chromeos::SecureBlob&,
chromeos::SecureBlob*,
chromeos::SecureBlob*));
MOCK_METHOD3(VerifyPCRBoundKey, bool(int,
const chromeos::SecureBlob&,
const chromeos::SecureBlob&));
MOCK_METHOD2(ExtendPCR, bool(int, const chromeos::SecureBlob&));
private:
bool Xor(TSS_HCONTEXT _context,
TSS_HKEY _key,
const chromeos::SecureBlob& plaintext,
const chromeos::SecureBlob& key,
chromeos::SecureBlob* ciphertext,
TSS_RESULT* result) {
chromeos::SecureBlob local_data_out(plaintext.size());
for (unsigned int i = 0; i < local_data_out.size(); i++) {
local_data_out[i] = plaintext[i] ^ 0x1e;
}
ciphertext->swap(local_data_out);
return true;
}
bool GetBlankPublicKey(chromeos::SecureBlob* blob,
TpmRetryAction* retry_action) {
blob->resize(0);
return true;
}
bool FakeGetRandomData(size_t num_bytes, chromeos::Blob* blob) {
blob->resize(num_bytes);
return true;
}
};
} // namespace cryptohome
#endif // CRYPTOHOME_MOCK_TPM_H_