123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217 |
- /* SPDX-License-Identifier: BSD-3-Clause */
- #include <inttypes.h>
- #include <stdio.h>
- #include <stdlib.h>
- #include <string.h>
- #include "files.h"
- #include "log.h"
- #include "tpm2.h"
- #include "tpm2_tool.h"
- typedef struct tpm_sessionconfig_ctx tpm_sessionconfig_ctx;
- struct tpm_sessionconfig_ctx {
- tpm2_session *session;
- const char *session_path;
- TPMA_SESSION bmask;
- TPMA_SESSION flags;
- };
- static tpm_sessionconfig_ctx ctx;
- #define PRINT_SESSION_ATTRIBUTE(ATTR, attr) \
- do { \
- if (attrs & ATTR) { \
- if (is_attr_set) { \
- tpm2_tool_output("|"); \
- } else { \
- is_attr_set = true; \
- } \
- tpm2_tool_output(attr); \
- } \
- } while(false)
- static tool_rc process_output(ESYS_CONTEXT *esys_context) {
- ESYS_TR sessionhandle = tpm2_session_get_handle(ctx.session);
- if (!sessionhandle) {
- LOG_ERR("Session handle cannot be null");
- return tool_rc_general_error;
- }
- if (ctx.bmask) {
- return Esys_TRSess_SetAttributes(esys_context, sessionhandle, ctx.flags,
- ctx.bmask);
- }
- TPM2_HANDLE tpm_handle;
- TSS2_RC rv = Esys_TR_GetTpmHandle(esys_context, sessionhandle, &tpm_handle);
- if (rv != TSS2_RC_SUCCESS) {
- return tool_rc_general_error;
- }
- /*
- * Describe session attributes
- */
- TPMA_SESSION attrs = 0;
- tool_rc rc = tpm2_sess_get_attributes(esys_context, sessionhandle,
- &attrs);
- if (rc != tool_rc_success) {
- return rc;
- }
- tpm2_tool_output("Session-Handle: 0x%.8"PRIx32"\n", tpm_handle);
- bool is_attr_set = false;
- tpm2_tool_output("Session-Attributes: ");
- PRINT_SESSION_ATTRIBUTE(TPMA_SESSION_CONTINUESESSION, "continuesession");
- PRINT_SESSION_ATTRIBUTE(TPMA_SESSION_AUDITEXCLUSIVE, "auditexclusive");
- PRINT_SESSION_ATTRIBUTE(TPMA_SESSION_AUDITRESET, "auditreset");
- PRINT_SESSION_ATTRIBUTE(TPMA_SESSION_DECRYPT, "decrypt");
- PRINT_SESSION_ATTRIBUTE(TPMA_SESSION_ENCRYPT, "encrypt");
- PRINT_SESSION_ATTRIBUTE(TPMA_SESSION_AUDIT, "audit");
- tpm2_tool_output("\n");
- return tool_rc_success;
- }
- static tool_rc process_input(ESYS_CONTEXT *esys_context) {
- tool_rc rc = tpm2_session_restore(esys_context, ctx.session_path, false,
- &ctx.session);
- if (rc != tool_rc_success) {
- LOG_ERR("Could not restore session from the specified file");
- return rc;
- }
- return tool_rc_success;
- }
- static bool on_option(char key, char *value) {
- UNUSED(value);
- switch (key) {
- case 0:
- ctx.bmask |= TPMA_SESSION_CONTINUESESSION;
- ctx.flags |= TPMA_SESSION_CONTINUESESSION;
- break;
- case 1:
- ctx.bmask |= TPMA_SESSION_CONTINUESESSION;
- break;
- case 2:
- ctx.bmask |= TPMA_SESSION_AUDITEXCLUSIVE;
- ctx.flags |= TPMA_SESSION_AUDITEXCLUSIVE;
- break;
- case 3:
- ctx.bmask |= TPMA_SESSION_AUDITEXCLUSIVE;
- break;
- case 4:
- ctx.bmask |= TPMA_SESSION_AUDITRESET;
- ctx.flags |= TPMA_SESSION_AUDITRESET;
- break;
- case 5:
- ctx.bmask |= TPMA_SESSION_AUDITRESET;
- break;
- case 6:
- ctx.bmask |= TPMA_SESSION_DECRYPT;
- ctx.flags |= TPMA_SESSION_DECRYPT;
- break;
- case 7:
- ctx.bmask |= TPMA_SESSION_DECRYPT;
- break;
- case 8:
- ctx.bmask |= TPMA_SESSION_ENCRYPT;
- ctx.flags |= TPMA_SESSION_ENCRYPT;
- break;
- case 9:
- ctx.bmask |= TPMA_SESSION_ENCRYPT;
- break;
- case 10:
- ctx.bmask |= TPMA_SESSION_AUDIT;
- ctx.flags |= TPMA_SESSION_AUDIT;
- break;
- case 11:
- ctx.bmask |= TPMA_SESSION_AUDIT;
- break;
- }
- return true;
- }
- static bool on_args(int argc, char **argv) {
- if (argc > 1) {
- LOG_ERR("Argument takes one file name for session data");
- return false;
- }
- ctx.session_path = argv[0];
- return true;
- }
- static bool is_input_option_args_valid(void) {
- if (!ctx.session_path) {
- LOG_ERR("Must specify session file as an argument.");
- return false;
- }
- return true;
- }
- static bool tpm2_tool_onstart(tpm2_options **opts) {
- const struct option topts[] = {
- { "enable-continuesession", no_argument, NULL, 0 },
- { "disable-continuesession", no_argument, NULL, 1 },
- { "enable-auditexclusive", no_argument, NULL, 2 },
- { "disable-auditexclusive", no_argument, NULL, 3 },
- { "enable-auditreset", no_argument, NULL, 4 },
- { "disable-auditreset", no_argument, NULL, 5 },
- { "enable-decrypt", no_argument, NULL, 6 },
- { "disable-decrypt", no_argument, NULL, 7 },
- { "enable-encrypt", no_argument, NULL, 8 },
- { "disable-encrypt", no_argument, NULL, 9 },
- { "enable-audit", no_argument, NULL, 10 },
- { "disable-audit", no_argument, NULL, 11 },
- };
- *opts = tpm2_options_new(NULL, ARRAY_LEN(topts), topts, on_option, on_args,
- 0);
- return *opts != NULL;
- }
- static tool_rc tpm2_tool_onrun(ESYS_CONTEXT *esys_context,
- tpm2_option_flags flags) {
- UNUSED(flags);
- bool retval = is_input_option_args_valid();
- if (!retval) {
- return tool_rc_option_error;
- }
- tool_rc rc = process_input(esys_context);
- if(rc != tool_rc_success) {
- return rc;
- }
- return process_output(esys_context);
- /*
- * Disabling continuesession should flush the session after use.
- */
- }
- static tool_rc tpm2_tool_onstop(ESYS_CONTEXT *esys_context) {
- UNUSED(esys_context);
- return tpm2_session_close(&ctx.session);
- }
- // Register this tool with tpm2_tool.c
- TPM2_TOOL_REGISTER("sessionconfig", tpm2_tool_onstart, tpm2_tool_onrun,
- tpm2_tool_onstop, NULL)
|