/* SPDX-License-Identifier: BSD-3-Clause */ #include #include #include #include "tools/fapi/tss2_template.h" /* Context struct used to store passed commandline parameters */ static struct cxt { char const *digest; char const *publicKeyPath; char const *signature; } ctx; /* Parse command line parameters */ static bool on_option(char key, char *value) { switch (key) { case 'd': ctx.digest = value; break; case 'p': ctx.publicKeyPath = value; break; case 'i': ctx.signature = value; break; } return true; } /* Define possible command line parameters */ static bool tss2_tool_onstart(tpm2_options **opts) { struct option topts[] = { {"keyPath", required_argument, NULL, 'p'}, {"digest", required_argument, NULL, 'd'}, {"signature", required_argument, NULL, 'i'} }; return (*opts = tpm2_options_new ("d:p:i:", ARRAY_LEN(topts), topts, on_option, NULL, 0)) != NULL; } /* Execute specific tool */ static int tss2_tool_onrun (FAPI_CONTEXT *fctx) { /* Check availability of required parameters */ if (!ctx.publicKeyPath) { fprintf (stderr, "public key path parameter not provided, use " \ "--keyPath\n"); return -1; } if (!ctx.digest) { fprintf (stderr, "digest parameter not provided, use --digest\n"); return -1; } if (!ctx.signature) { fprintf (stderr, "signature parameter not provided, use "\ "--signature\n"); return -1; } /* Check exclusive access to stdin */ int count_in = 0; if (ctx.digest && !strcmp (ctx.digest, "-")) count_in +=1; if (ctx.signature && !strcmp (ctx.signature, "-")) count_in +=1; if (count_in > 1) { fprintf (stderr, "Only one of --digest and --signature can read from -"\ "(standard input)\n"); return -1; } /* Read data needed for signature verification */ uint8_t *digest, *signature; size_t digestSize, signatureSize; TSS2_RC r = open_read_and_close (ctx.digest, (void**)&digest, &digestSize); if (r){ return 1; } r = open_read_and_close (ctx.signature, (void**)&signature, &signatureSize); if (r) { free (digest); return 1; } /* Execute FAPI command with passed arguments */ r = Fapi_VerifySignature (fctx, ctx.publicKeyPath, digest, digestSize, signature, signatureSize); if (r != TSS2_RC_SUCCESS){ free (digest); free (signature); LOG_PERR("Fapi_Key_VerifySignature", r); return 1; } free (digest); free (signature); return 0; } TSS2_TOOL_REGISTER("verifysignature", tss2_tool_onstart, tss2_tool_onrun, NULL)