|
NAMEtpm2_policycountertimer(1) - Enables policy authorization by evaluating the comparison operation on the TPM parameters time, clock, reset count, restart count and TPM clock safe flag.SYNOPSIStpm2_policycountertimer [OPTIONS] [ARGUMENT]DESCRIPTIONtpm2_policycountertimer(1) - Enables policy authorization by evaluating the comparison operation on the TPM parameters time, clock, reset count, restart count and TPM clock safe flag. If time/clock, it is input as milliseconds value. The parameter and the value is given as a command line argument as below:
By default comparison tests for equality and also by default it tests for time. OPTIONS
File to save the policy digest.
The policy session file generated via the -S option to tpm2_startauthsession or saved off of a previous tool run.
if value of current time in the TPM = value of specified input time.
if value of current time in the TPM != value of specified input time.
if signed value of current time in the TPM > signed value of specified input time.
if unsigned value of current time in the TPM > unsigned value of specified input time.
if signed value of current time in the TPM < signed value of specified input time.
if unsigned value of current time in the TPM < unsigned value of specified input time.
if signed value of current time in the TPM >= signed value of specified input time.
if unsigned value of current time in the TPM >= unsigned value of specified input time.
if signed value of current time in the TPM <= unsigned value of specified input time.
if unsigned value of current time in the TPM <= unsigned value of specified input time.
if all bits set in value of current time in the TPM are set in value of specified input time.
if all bits set in value of current time in the TPM are clear in value of specified input time. ReferencesCOMMON OPTIONSThis collection of options are common to many programs and provide information that many users may expect.
To successfully use the manpages feature requires the manpages to be installed or on MANPATH, See man(1) for more details.
TCTI ConfigurationThe TCTI or “Transmission Interface” is the communication mechanism with the TPM. TCTIs can be changed for communication with TPMs across different mediums.To control the TCTI, the tools respect:
Note: The command line option always overrides the environment variable. The current known TCTIs are:
The arguments to either the command line option or the environment variable are in the form: <tcti-name>:<tcti-option-config> Specifying an empty string for either the <tcti-name> or <tcti-option-config> results in the default being used for that portion respectively. TCTI DefaultsWhen a TCTI is not specified, the default TCTI is searched for using dlopen(3) semantics. The tools will search for tabrmd, device and mssim TCTIs IN THAT ORDER and USE THE FIRST ONE FOUND. You can query what TCTI will be chosen as the default by using the -v option to print the version information. The “default-tcti” key-value pair will indicate which of the aforementioned TCTIs is the default.Custom TCTIsAny TCTI that implements the dynamic TCTI interface can be loaded. The tools internally use dlopen(3), and the raw tcti-name value is used for the lookup. Thus, this could be a path to the shared library, or a library name as understood by dlopen(3) semantics.TCTI OPTIONSThis collection of options are used to configure the various known TCTI modules available:
Example: -T device:/dev/tpm0 or export TPM2TOOLS_TCTI=“device:/dev/tpm0”
Example: -T mssim:host=localhost,port=2321 or export TPM2TOOLS_TCTI=“mssim:host=localhost,port=2321”
Specify the tabrmd tcti name and a config string of bus_name=com.example.FooBar:
Specify the default (abrmd) tcti and a config string of bus_type=session:
NOTE: abrmd and tabrmd are synonymous. the various known TCTI modules. EXAMPLESCreate a sealing object with an authorization policy that evaluates only for first minute of TPM restart.Create the policy and the sealing object
Unsealing should work in the first minute after TPM restart
ReturnsTools can return any of the following codes:
LimitationsIt expects a session to be already established via tpm2_startauthsession(1) and requires one of the following:
Without it, most resource managers will not save session state between command invocations. BUGSGithub Issues (https://github.com/tpm2-software/tpm2-tools/issues)HELPSee the Mailing List (https://lists.01.org/mailman/listinfo/tpm2)
Visit the GSP FreeBSD Man Page Interface. |