1tpm2_policypcr(1) General Commands Manual tpm2_policypcr(1)
2
3
4
6 tpm2_policypcr(1) - Create a policy that includes specific PCR values.
7
9 tpm2_policypcr [OPTIONS]
10
12 tpm2_policypcr(1) - Generates a PCR policy event with the TPM. A PCR
13 policy event creates a policy bound to specific PCR values and is use‐
14 ful within larger policies constructed using policyor and policyautho‐
15 rize events. See tpm2_policyor(1) and tpm2_policyauthorize(1) respec‐
16 tively for their usages.
17
19 · -L, --policy=FILE:
20
21 File to save the policy digest.
22
23 · -f, --pcr=FILE:
24
25 Optional Path or Name of the file containing expected PCR values for
26 the specified index. Default is to read the current PCRs per the set
27 list.
28
29 · -l, --pcr-list=PCR:
30
31 The list of PCR banks and selected PCRs' ids for each bank.
32
33 · -S, --session=FILE:
34
35 The policy session file generated via the -S option to tpm2_star‐
36 tauthsession(1).
37
38 References
40 The type of a context object, whether it is a handle or file name, is
41 determined according to the following logic in-order:
42
43 · If the argument is a file path, then the file is loaded as a restored
44 TPM transient object.
45
46 · If the argument is a prefix match on one of:
47
48 · owner: the owner hierarchy
49
50 · platform: the platform hierarchy
51
52 · endorsement: the endorsement hierarchy
53
54 · lockout: the lockout control persistent object
55
56 · If the argument argument can be loaded as a number it will be treat
57 as a handle, e.g. 0x81010013 and used directly.OBJECT.
58
60 Authorization for use of an object in TPM2.0 can come in 3 different
61 forms: 1. Password 2. HMAC 3. Sessions
62
63 NOTE: "Authorizations default to the EMPTY PASSWORD when not speci‐
64 fied".
65
66 Passwords
67 Passwords are interpreted in the following forms below using prefix
68 identifiers.
69
70 Note: By default passwords are assumed to be in the string form when
71 they do not have a prefix.
72
73 String
74 A string password, specified by prefix "str:" or it's absence (raw
75 string without prefix) is not interpreted, and is directly used for au‐
76 thorization.
77
78 Examples
79 foobar
80 str:foobar
81
82 Hex-string
83 A hex-string password, specified by prefix "hex:" is converted from a
84 hexidecimal form into a byte array form, thus allowing passwords with
85 non-printable and/or terminal un-friendly characters.
86
87 Example
88 hex:0x1122334455667788
89
90 File
91 A file based password, specified be prefix "file:" should be the path
92 of a file containing the password to be read by the tool or a "-" to
93 use stdin. Storing passwords in files prevents information leakage,
94 passwords passed as options can be read from the process list or common
95 shell history features.
96
97 Examples
98 # to use stdin and be prompted
99 file:-
100
101 # to use a file from a path
102 file:path/to/password/file
103
104 # to echo a password via stdin:
105 echo foobar | tpm2_tool -p file:-
106
107 # to use a bash here-string via stdin:
108
109 tpm2_tool -p file:- <<< foobar
110
111 Sessions
112 When using a policy session to authorize the use of an object, prefix
113 the option argument with the session keyword. Then indicate a path to
114 a session file that was created with tpm2_startauthsession(1). Option‐
115 ally, if the session requires an auth value to be sent with the session
116 handle (eg policy password), then append a + and a string as described
117 in the Passwords section.
118
119 Examples
120 To use a session context file called session.ctx.
121
122 session:session.ctx
123
124 To use a session context file called session.ctx AND send the authvalue
125 mypassword.
126
127 session:session.ctx+mypassword
128
129 To use a session context file called session.ctx AND send the HEX auth‐
130 value 0x11223344.
131
132 session:session.ctx+hex:11223344
133
134 PCR Authorizations
135 You can satisfy a PCR policy using the "pcr:" prefix and the PCR mini‐
136 language. The PCR minilanguage is as follows:
137 <pcr-spec>=<raw-pcr-file>
138
139 The PCR spec is documented in in the section "PCR bank specifiers".
140
141 The raw-pcr-file is an optional the output of the raw PCR contents as
142 returned by tpm2_pcrread(1).
143
144 PCR bank specifiers (common/pcr.md)
145
146 Examples
147 To satisfy a PCR policy of sha256 on banks 0, 1, 2 and 3 use a specifi‐
148 er of:
149
150 pcr:sha256:0,1,2,3
151
152 specifying AUTH.
153
155 PCR Bank Selection lists follow the below specification:
156
157 <BANK>:<PCR>[,<PCR>] or <BANK>:all
158
159 multiple banks may be separated by '+'.
160
161 For example:
162
163 sha1:3,4+sha256:all
164
165 will select PCRs 3 and 4 from the SHA1 bank and PCRs 0 to 23 from the
166 SHA256 bank.
167
168 Note
169 PCR Selections allow for up to 5 hash to pcr selection mappings. This
170 is a limitation in design in the single call to the tpm to get the pcr
171 values. PCR.
172
174 This collection of options are common to many programs and provide in‐
175 formation that many users may expect.
176
177 · -h, --help=[man|no-man]: Display the tools manpage. By default, it
178 attempts to invoke the manpager for the tool, however, on failure
179 will output a short tool summary. This is the same behavior if the
180 "man" option argument is specified, however if explicit "man" is re‐
181 quested, the tool will provide errors from man on stderr. If the
182 "no-man" option if specified, or the manpager fails, the short op‐
183 tions will be output to stdout.
184
185 To successfully use the manpages feature requires the manpages to be
186 installed or on MANPATH, See man(1) for more details.
187
188 · -v, --version: Display version information for this tool, supported
189 tctis and exit.
190
191 · -V, --verbose: Increase the information that the tool prints to the
192 console during its execution. When using this option the file and
193 line number are printed.
194
195 · -Q, --quiet: Silence normal tool output to stdout.
196
197 · -Z, --enable-errata: Enable the application of errata fixups. Useful
198 if an errata fixup needs to be applied to commands sent to the TPM.
199 Defining the environment TPM2TOOLS_ENABLE_ERRATA is equivalent. in‐
200 formation many users may expect.
201
203 The TCTI or "Transmission Interface" is the communication mechanism
204 with the TPM. TCTIs can be changed for communication with TPMs across
205 different mediums.
206
207 To control the TCTI, the tools respect:
208
209 1. The command line option -T or --tcti
210
211 2. The environment variable: TPM2TOOLS_TCTI.
212
213 Note: The command line option always overrides the environment vari‐
214 able.
215
216 The current known TCTIs are:
217
218 · tabrmd - The resource manager, called tabrmd
219 (https://github.com/tpm2-software/tpm2-abrmd). Note that tabrmd and
220 abrmd as a tcti name are synonymous.
221
222 · mssim - Typically used for communicating to the TPM software simula‐
223 tor.
224
225 · device - Used when talking directly to a TPM device file.
226
227 · none - Do not initalize a connection with the TPM. Some tools allow
228 for off-tpm options and thus support not using a TCTI. Tools that do
229 not support it will error when attempted to be used without a TCTI
230 connection. Does not support ANY options and MUST BE presented as
231 the exact text of "none".
232
233 The arguments to either the command line option or the environment
234 variable are in the form:
235
236 <tcti-name>:<tcti-option-config>
237
238 Specifying an empty string for either the <tcti-name> or <tcti-op‐
239 tion-config> results in the default being used for that portion respec‐
240 tively.
241
242 TCTI Defaults
243 When a TCTI is not specified, the default TCTI is searched for using
244 dlopen(3) semantics. The tools will search for tabrmd, device and
245 mssim TCTIs IN THAT ORDER and USE THE FIRST ONE FOUND. You can query
246 what TCTI will be chosen as the default by using the -v option to print
247 the version information. The "default-tcti" key-value pair will indi‐
248 cate which of the aforementioned TCTIs is the default.
249
250 Custom TCTIs
251 Any TCTI that implements the dynamic TCTI interface can be loaded. The
252 tools internally use dlopen(3), and the raw tcti-name value is used for
253 the lookup. Thus, this could be a path to the shared library, or a li‐
254 brary name as understood by dlopen(3) semantics.
255
257 This collection of options are used to configure the various known TCTI
258 modules available:
259
260 · device: For the device TCTI, the TPM character device file for use by
261 the device TCTI can be specified. The default is /dev/tpm0.
262
263 Example: -T device:/dev/tpm0 or export TPM2TOOLS_TCTI="de‐
264 vice:/dev/tpm0"
265
266 · mssim: For the mssim TCTI, the domain name or IP address and port
267 number used by the simulator can be specified. The default are
268 127.0.0.1 and 2321.
269
270 Example: -T mssim:host=localhost,port=2321 or export TPM2TOOLS_TC‐
271 TI="mssim:host=localhost,port=2321"
272
273 · abrmd: For the abrmd TCTI, the configuration string format is a se‐
274 ries of simple key value pairs separated by a ',' character. Each
275 key and value string are separated by a '=' character.
276
277 · TCTI abrmd supports two keys:
278
279 1. 'bus_name' : The name of the tabrmd service on the bus (a
280 string).
281
282 2. 'bus_type' : The type of the dbus instance (a string) limited to
283 'session' and 'system'.
284
285 Specify the tabrmd tcti name and a config string of bus_name=com.ex‐
286 ample.FooBar:
287
288 \--tcti=tabrmd:bus_name=com.example.FooBar
289
290 Specify the default (abrmd) tcti and a config string of bus_type=ses‐
291 sion:
292
293 \--tcti:bus_type=session
294
295 NOTE: abrmd and tabrmd are synonymous. the various known TCTI mod‐
296 ules.
297
299 Starts a trial session, builds a PCR policy and uses that policy in the
300 creation of an object. Then, it uses a policy session to unseal some
301 data stored in the object.
302
303 Step 1: create a policy
304 tpm2_createprimary -C e -g sha256 -G ecc -c primary.ctx
305
306 tpm2_pcrread -o pcr.dat "sha1:0,1,2,3"
307
308 tpm2_startauthsession -S session.dat
309
310 tpm2_policypcr -S session.dat -l "sha1:0,1,2,3" -f pcr.dat -L policy.dat
311
312 tpm2_flushcontext session.dat
313
315 tpm2_create -Q -u key.pub -r key.priv -C primary.ctx -L policy.dat \
316 -i- <<< "12345678"
317
318 tpm2_load -C primary.ctx -u key.pub -r key.priv -n unseal.key.name \
319 -c unseal.key.ctx
320
321 Step 3: Satisfy the policy
322 tpm2_startauthsession --policy-session -S session.dat
323
324 tpm2_policypcr -S session.dat -l "sha1:0,1,2,3" -f pcr.dat -L policy.dat
325
326 Step 4: Use the policy
327 tpm2_unseal -psession:session.dat -c unseal.key.ctx
328 12345678
329
330 tpm2_flushcontext session.dat
331
333 Tools can return any of the following codes:
334
335 · 0 - Success.
336
337 · 1 - General non-specific error.
338
339 · 2 - Options handling error.
340
341 · 3 - Authentication error.
342
343 · 4 - TCTI related error.
344
345 · 5 - Non supported scheme. Applicable to tpm2_testparams.
346
348 It expects a session to be already established via tpm2_startauthses‐
349 sion(1) and requires one of the following:
350
351 · direct device access
352
353 · extended session support with tpm2-abrmd.
354
355 Without it, most resource managers will not save session state between
356 command invocations.
357
359 Github Issues (https://github.com/tpm2-software/tpm2-tools/issues)
360
362 See the Mailing List (https://lists.01.org/mailman/listinfo/tpm2)
363
364
365
366tpm2-tools tpm2_policypcr(1)