1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96
|
/* SPDX-License-Identifier: BSD-3-Clause */
#include <stdbool.h>
#include <stdlib.h>
#include <stdio.h>
#include "tools/fapi/tss2_template.h"
/* Context struct used to store passed command line parameters */
static struct cxt {
char const *keyPath;
char const *plainText;
char const *cipherText;
bool overwrite;
} ctx;
/* Parse command line parameters */
static bool on_option(char key, char *value) {
switch (key) {
case 'i':
ctx.cipherText = value;
break;
case 'f':
ctx.overwrite = true;
break;
case 'o':
ctx.plainText = value;
break;
case 'p':
ctx.keyPath = value;
break;
}
return true;
}
/* Define possible command line parameters */
static bool tss2_tool_onstart(tpm2_options **opts) {
struct option topts[] = {
{"keyPath", required_argument, NULL, 'p'},
{"cipherText", required_argument, NULL, 'i'},
{"force" , no_argument , NULL, 'f'},
{"plainText" , required_argument, NULL, 'o'},
};
return (*opts = tpm2_options_new ("i:fo:p:", ARRAY_LEN(topts), topts,
on_option, NULL, 0)) != NULL;
}
/* Execute specific tool */
static int tss2_tool_onrun (FAPI_CONTEXT *fctx) {
/* Check availability of required parameters */
if (!ctx.keyPath) {
fprintf (stderr, "No key path provided, use --keyPath\n");
return -1;
}
if (!ctx.cipherText) {
fprintf (stderr, "No encrypted text provided, use --cipherText\n");
return -1;
}
if (!ctx.plainText) {
fprintf (stderr, "No output file provided, use --plainText\n");
return -1;
}
/* Read ciphertext file */
uint8_t* cipherText;
size_t cipherTextSize;
TSS2_RC r = open_read_and_close (ctx.cipherText, (void**)&cipherText,
&cipherTextSize);
if (r){
return 1;
}
/* Execute FAPI command with passed arguments */
uint8_t *plainText;
size_t plainTextSize;
r = Fapi_Decrypt (fctx, ctx.keyPath, cipherText, cipherTextSize,
&plainText, &plainTextSize);
if (r != TSS2_RC_SUCCESS) {
free(cipherText);
LOG_PERR ("Fapi_Decrypt", r);
return 1;
}
free(cipherText);
/* Write returned data to file(s) */
r = open_write_and_close (ctx.plainText, ctx.overwrite, plainText,
plainTextSize);
if (r){
Fapi_Free (plainText);
return 1;
}
Fapi_Free (plainText);
return 0;
}
TSS2_TOOL_REGISTER("decrypt", tss2_tool_onstart, tss2_tool_onrun, NULL)
|