Bug Summary

File:builds/wireshark/wireshark/epan/dissectors/packet-tpm20.c
Warning:line 1001, column 10
Access to field 'command' results in a dereference of a null pointer (loaded from variable 'entry')

Annotated Source Code

Press '?' to see keyboard shortcuts

clang -cc1 -cc1 -triple x86_64-pc-linux-gnu -analyze -disable-free -clear-ast-before-backend -disable-llvm-verifier -discard-value-names -main-file-name packet-tpm20.c -analyzer-checker=core -analyzer-checker=apiModeling -analyzer-checker=unix -analyzer-checker=deadcode -analyzer-checker=security.insecureAPI.UncheckedReturn -analyzer-checker=security.insecureAPI.getpw -analyzer-checker=security.insecureAPI.gets -analyzer-checker=security.insecureAPI.mktemp -analyzer-checker=security.insecureAPI.mkstemp -analyzer-checker=security.insecureAPI.vfork -analyzer-checker=nullability.NullPassedToNonnull -analyzer-checker=nullability.NullReturnedFromNonnull -analyzer-output plist -w -setup-static-analyzer -mrelocation-model pic -pic-level 2 -fhalf-no-semantic-interposition -fno-delete-null-pointer-checks -mframe-pointer=all -relaxed-aliasing -fmath-errno -ffp-contract=on -fno-rounding-math -ffloat16-excess-precision=fast -fbfloat16-excess-precision=fast -mconstructor-aliases -funwind-tables=2 -target-cpu x86-64 -tune-cpu generic -debugger-tuning=gdb -fdebug-compilation-dir=/builds/wireshark/wireshark/build -fcoverage-compilation-dir=/builds/wireshark/wireshark/build -resource-dir /usr/lib/llvm-18/lib/clang/18 -isystem /usr/include/glib-2.0 -isystem /usr/lib/x86_64-linux-gnu/glib-2.0/include -isystem /usr/include/mit-krb5 -isystem /usr/include/libxml2 -isystem /builds/wireshark/wireshark/build/epan/dissectors -isystem /builds/wireshark/wireshark/epan/dissectors -isystem /builds/wireshark/wireshark/epan -D G_DISABLE_DEPRECATED -D G_DISABLE_SINGLE_INCLUDES -D WS_BUILD_DLL -D WS_DEBUG -D WS_DEBUG_UTF_8 -I /builds/wireshark/wireshark/build -I /builds/wireshark/wireshark -I /builds/wireshark/wireshark/include -D _GLIBCXX_ASSERTIONS -internal-isystem /usr/lib/llvm-18/lib/clang/18/include -internal-isystem /usr/local/include -internal-isystem /usr/lib/gcc/x86_64-linux-gnu/14/../../../../x86_64-linux-gnu/include -internal-externc-isystem /usr/include/x86_64-linux-gnu -internal-externc-isystem /include -internal-externc-isystem /usr/include -fmacro-prefix-map=/builds/wireshark/wireshark/= -fmacro-prefix-map=/builds/wireshark/wireshark/build/= -fmacro-prefix-map=../= -Wno-format-truncation -Wno-format-nonliteral -Wno-pointer-sign -std=gnu11 -ferror-limit 19 -fvisibility=hidden -fwrapv -fstrict-flex-arrays=3 -stack-protector 2 -fstack-clash-protection -fcf-protection=full -fgnuc-version=4.2.1 -fskip-odr-check-in-gmf -fexceptions -fcolor-diagnostics -analyzer-output=html -dwarf-debug-flags /usr/lib/llvm-18/bin/clang -### --analyze -x c -D G_DISABLE_DEPRECATED -D G_DISABLE_SINGLE_INCLUDES -D WS_BUILD_DLL -D WS_DEBUG -D WS_DEBUG_UTF_8 -I /builds/wireshark/wireshark/build -I /builds/wireshark/wireshark -I /builds/wireshark/wireshark/include -isystem /usr/include/glib-2.0 -isystem /usr/lib/x86_64-linux-gnu/glib-2.0/include -isystem /usr/include/mit-krb5 -isystem /usr/include/libxml2 -isystem /builds/wireshark/wireshark/build/epan/dissectors -isystem /builds/wireshark/wireshark/epan/dissectors -isystem /builds/wireshark/wireshark/epan -fvisibility=hidden -fexcess-precision=fast -fstrict-flex-arrays=3 -fstack-clash-protection -fcf-protection=full -D _GLIBCXX_ASSERTIONS -fstack-protector-strong -fno-delete-null-pointer-checks -fno-strict-overflow -fno-strict-aliasing -fexceptions -Wno-format-truncation -Wno-format-nonliteral -fdiagnostics-color=always -Wno-pointer-sign -fmacro-prefix-map=/builds/wireshark/wireshark/= -fmacro-prefix-map=/builds/wireshark/wireshark/build/= -fmacro-prefix-map=../= -std=gnu11 -fPIC /builds/wireshark/wireshark/epan/dissectors/packet-tpm20.c -o /builds/wireshark/wireshark/sbout/2025-05-07-100253-3826-1 -Xclang -analyzer-output=html -faddrsig -D__GCC_HAVE_DWARF2_CFI_ASM=1 -o /builds/wireshark/wireshark/sbout/2025-05-07-100253-3826-1 -x c /builds/wireshark/wireshark/epan/dissectors/packet-tpm20.c
1/* packet-tpm20.c
2 * Dissector for TPM20 protocol
3 * Copyright (c) 2018, Intel Corporation
4 * Tadeusz Struk <tadeusz.struk@intel.com>
5 *
6 * Wireshark - Network traffic analyzer
7 * By Gerald Combs <gerald@wireshark.org>
8 * Copyright 1998 Gerald Combs
9 *
10 * SPDX-License-Identifier: GPL-2.0-or-later
11 */
12
13#include "config.h"
14
15#include <epan/packet.h>
16#include <epan/tvbuff.h>
17#include <epan/expert.h>
18#include <epan/tfs.h>
19#include <wsutil/array.h>
20#include <epan/wmem_scopes.h>
21
22typedef struct {
23 uint32_t com_pnum;
24 uint32_t resp_type;
25 uint32_t command;
26 uint32_t num_auths;
27} tpm_entry;
28
29static wmem_tree_t *cmd_tree;
30static unsigned last_command_pnum;
31static bool_Bool response_size = true1;
32
33/* sub tree items */
34static int proto_tpm20;
35static int proto_tpm20_header;
36static int proto_tpm20_resp_header;
37static int proto_tpm20_hndl_area;
38static int proto_tpm20_auth_area;
39static int proto_tpm20_params_area;
40
41/* pdu fields */
42static int hf_tpm20_platform_cmd;
43static int hf_tpm20_platform_resp_code;
44static int hf_tpm20_platform_resp_size;
45static int hf_tpm20_tag;
46static int hf_tpm20_size;
47static int hf_tpm20_cc;
48static int hf_tpm20_resp_tag;
49static int hf_tpm20_resp_size;
50static int hf_tpm20_resp_code;
51static int hf_tpm20_startup_type;
52static int hf_tpmi_rh_hierarhy;
53static int hf_tpmi_rh_provision;
54static int hf_tpmi_rh_platform;
55static int hf_tpmi_rh_endorsment;
56static int hf_tpmi_rh_nv_index;
57static int hf_tpmi_rh_nv_auth;
58static int hf_tpmi_rh_hierarhy_auth;
59static int hf_tpmi_rh_clear;
60static int hf_tpmi_rh_lockout;
61static int hf_tpmi_dh_object;
62static int hf_tpmi_dh_entity;
63static int hf_tpmi_dh_context;
64static int hf_tpmi_dh_parent;
65static int hf_tpmi_dh_pcr;
66static int hf_tpmi_ht_handle;
67static int hf_tpmi_sh_auth_session;
68static int hf_tpmi_rh_act;
69static int hf_auth_area_size;
70static int hf_session_nonce_size;
71static int hf_session_nonce;
72static int hf_session_attribs_cont;
73static int hf_session_attribs_auditex;
74static int hf_session_attribs_auditreset;
75static int hf_session_attribs_res;
76static int hf_session_attribs_decrypt;
77static int hf_session_attribs_encrypt;
78static int hf_session_attribs_audit;
79static int hf_session_auth_size;
80static int hf_session_auth;
81static int hf_resp_param_size;
82static int hf_encrypted_secret_size;
83static int hf_encrypted_secret;
84static int hf_session_type;
85static int hf_alg_hash;
86static int hf_alg_sym;
87static int hf_alg_sym_keybits;
88static int hf_alg_sym_mode;
89static int hf_tpm_priv_size;
90static int hf_tpm_priv;
91static int hf_tpm_pub_size;
92static int hf_tpm_pub;
93static int hf_tpm_name_size;
94static int hf_tpm_name;
95static int hf_tpm_sensitive_crate_size;
96static int hf_tpm_sensitive_crate;
97static int hf_tpm_template_size;
98static int hf_tpm_template;
99static int hf_tpm_data_size;
100static int hf_tpm_data;
101static int hf_tpm_creation_data_size;
102static int hf_tpm_creation_data;
103static int hf_tpm_digest_size;
104static int hf_tpm_digest;
105static int hf_params;
106
107/* sub trees */
108static int ett_tpm;
109static int ett_tpm_header;
110static int ett_tpm_response_header;
111static int ett_tpm_handles;
112static int ett_tpm_auth;
113static int ett_tpm_params;
114static int ett_tpm_attrib;
115
116static expert_field ei_invalid_tag;
117static expert_field ei_invalid_auth_size;
118static expert_field ei_invalid_num_sessions;
119
120void proto_register_tpm20(void);
121void proto_reg_handoff_tpm20(void);
122
123static dissector_handle_t tpm20_handle;
124
125#define TCP_TPM_PORT_PLATFORM_PORT2321 2321
126#define TCP_TPM_PORT_COMMAND_PORT2322 2322
127#define TCP_TPM_PORTS"2321-2322" "2321-2322"
128#define MAX_HNDL3 3
129#define MAX_SESSIONS3 3
130#define TPM_ALG_NULL0x0010 0x0010
131#define TPM_MIN_AUTH_LEN9 9
132#define TPM_COMMAND_HEADER_LEN10 10
133
134struct num_handles {
135 uint32_t command;
136 uint8_t num_req_handles;
137 int *req_pd[MAX_HNDL3];
138 uint8_t num_resp_handles;
139 int *resp_pd[MAX_HNDL3];
140};
141
142static struct num_handles tpm_handles_map[] = {
143 { 0x11f, 2, { &hf_tpmi_rh_provision, &hf_tpmi_dh_object, 0 }, 0, { 0, 0, 0}}, /* CC_NV_UndefineSpaceSpecial */
144 { 0x120, 2, { &hf_tpmi_rh_provision, &hf_tpmi_dh_object, 0 }, 0, { 0, 0, 0}}, /* CC_EvictControl */
145 { 0x121, 1, { &hf_tpmi_rh_hierarhy, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_HierarchyControl */
146 { 0x122, 2, { &hf_tpmi_rh_provision, &hf_tpmi_rh_nv_index, 0 }, 0, { 0, 0, 0 }}, /* CC_NV_UndefineSpace */
147 { 0x124, 1, { &hf_tpmi_rh_platform, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_ChangeEPS */
148 { 0x125, 1, { &hf_tpmi_rh_platform, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_ChangePPS */
149 { 0x126, 1, { &hf_tpmi_rh_clear, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_Clear */
150 { 0x127, 1, { &hf_tpmi_rh_clear, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_ClearControl */
151 { 0x128, 1, { &hf_tpmi_rh_provision, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_ClockSet */
152 { 0x129, 1, { &hf_tpmi_rh_hierarhy_auth, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_HierarchyChangeAuth */
153 { 0x12a, 1, { &hf_tpmi_rh_provision, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_NV_DefineSpace */
154 { 0x12b, 1, { &hf_tpmi_rh_platform, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PCR_Allocate */
155 { 0x12c, 1, { &hf_tpmi_rh_platform, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PCR_SetAuthPolicy */
156 { 0x12d, 1, { &hf_tpmi_rh_platform, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PP_Commands */
157 { 0x12e, 1, { &hf_tpmi_rh_hierarhy_auth, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_SetPrimaryPolicy */
158 { 0x12f, 2, { &hf_tpmi_rh_platform, &hf_tpmi_dh_object, 0 }, 0, { 0, 0, 0 }}, /* CC_FieldUpgradeStart */
159 { 0x130, 1, { &hf_tpmi_rh_platform, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_ClockRateAdjust */
160 { 0x131, 1, { &hf_tpmi_rh_hierarhy, 0, 0 }, 1, { &hf_tpmi_ht_handle, 0, 0 }}, /* CC_CreatePrimary */
161 { 0x132, 1, { &hf_tpmi_rh_provision, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_NV_GlobalWriteLock */
162 { 0x133, 2, { &hf_tpmi_rh_endorsment, &hf_tpmi_dh_object, 0 }, 0, { 0, 0, 0 }}, /* CC_GetCommandAuditDigest */
163 { 0x134, 2, { &hf_tpmi_rh_nv_auth, &hf_tpmi_rh_nv_index, 0 }, 0, { 0, 0, 0 }}, /* CC_NV_Increment */
164 { 0x135, 2, { &hf_tpmi_rh_nv_auth, &hf_tpmi_rh_nv_index, 0 }, 0, { 0, 0, 0 }}, /* CC_NV_SetBits */
165 { 0x136, 2, { &hf_tpmi_rh_nv_auth, &hf_tpmi_rh_nv_index, 0 }, 0, { 0, 0, 0 }}, /* CC_NV_Extend */
166 { 0x137, 2, { &hf_tpmi_rh_nv_auth, &hf_tpmi_rh_nv_index, 0 }, 0, { 0, 0, 0 }}, /* CC_NV_Write */
167 { 0x138, 2, { &hf_tpmi_rh_nv_auth, &hf_tpmi_rh_nv_index, 0 }, 0, { 0, 0, 0 }}, /* CC_NV_WriteLock */
168 { 0x139, 1, { &hf_tpmi_rh_lockout, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_DictionaryAttackLockReset */
169 { 0x13a, 1, { &hf_tpmi_rh_lockout, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_DictionaryAttackParameters */
170 { 0x13b, 1, { &hf_tpmi_rh_nv_index, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_NV_ChangeAuth */
171 { 0x13c, 1, { &hf_tpmi_dh_pcr, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PCR_Event */
172 { 0x13d, 1, { &hf_tpmi_dh_pcr, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PCR_Reset */
173 { 0x13e, 1, { &hf_tpmi_dh_object, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_SequenceComplete */
174 { 0x13f, 1, { &hf_tpmi_rh_platform, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_SetAlgorithmSet */
175 { 0x140, 1, { &hf_tpmi_rh_provision, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_SetCommandCodeAuditStatus */
176 { 0x141, 0, { 0, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_FieldUpgradeData */
177 { 0x142, 0, { 0, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_IncrementalSelfTest */
178 { 0x143, 0, { 0, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_SelfTest */
179 { 0x144, 0, { 0, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_Startup */
180 { 0x145, 0, { 0, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_Shutdown */
181 { 0x146, 0, { 0, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_StirRandom */
182 { 0x147, 2, { &hf_tpmi_dh_object, &hf_tpmi_dh_object, 0 }, 0, { 0, 0, 0 }}, /* CC_ActivateCredential */
183 { 0x148, 2, { &hf_tpmi_dh_object, &hf_tpmi_dh_object, 0 }, 0, { 0, 0, 0 }}, /* CC_Certify */
184 { 0x149, 3, { &hf_tpmi_rh_nv_auth, &hf_tpmi_rh_nv_index, &hf_tpmi_sh_auth_session}, 0, { 0, 0, 0 }}, /* CC_PolicyNV */
185 { 0x14a, 2, { &hf_tpmi_dh_object, &hf_tpmi_dh_object, 0 }, 0, { 0, 0, 0 }}, /* CC_CertifyCreation */
186 { 0x14b, 2, { &hf_tpmi_dh_object, &hf_tpmi_dh_object, 0 }, 0, { 0, 0, 0 }}, /* CC_Duplicate */
187 { 0x14c, 2, { &hf_tpmi_rh_endorsment, &hf_tpmi_dh_object, 0 }, 0, { 0, 0, 0 }}, /* CC_GetTime */
188 { 0x14d, 3, { &hf_tpmi_rh_endorsment, &hf_tpmi_dh_object, &hf_tpmi_sh_auth_session }, 0, { 0, 0, 0 }}, /* CC_GetSessionAuditDigest */
189 { 0x14e, 1, { &hf_tpmi_rh_nv_index, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_NV_Read */
190 { 0x14f, 2, { &hf_tpmi_rh_nv_auth, &hf_tpmi_rh_nv_index, 0 }, 0, { 0, 0, 0 }}, /* CC_NV_ReadLock */
191 { 0x150, 2, { &hf_tpmi_dh_object, &hf_tpmi_dh_object, 0 }, 0, { 0, 0, 0 }}, /* CC_ObjectChangeAuth */
192 { 0x151, 2, { &hf_tpmi_dh_entity, &hf_tpmi_sh_auth_session, 0 }, 0, { 0, 0, 0 }}, /* CC_PolicySecret */
193 { 0x152, 2, { &hf_tpmi_dh_object, &hf_tpmi_dh_object, 0 }, 0, { 0, 0, 0 }}, /* CC_Rewrap */
194 { 0x153, 1, { &hf_tpmi_dh_object, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_Create */
195 { 0x154, 1, { &hf_tpmi_dh_object, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_ECDH_ZGen */
196 { 0x155, 1, { &hf_tpmi_dh_object, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_HMAC */
197 { 0x156, 1, { &hf_tpmi_dh_object, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_Import */
198 { 0x157, 1, { &hf_tpmi_dh_object, 0, 0 }, 1, { &hf_tpmi_ht_handle, 0, 0 }}, /* CC_Load */
199 { 0x158, 1, { &hf_tpmi_dh_object, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_Quote */
200 { 0x159, 1, { &hf_tpmi_dh_object, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_RSA_Decrypt */
201 { 0x15b, 1, { &hf_tpmi_dh_object, 0, 0 }, 1, { &hf_tpmi_dh_object, 0, 0 }}, /* CC_HMAC_Start */
202 { 0x15c, 1, { &hf_tpmi_dh_object, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_SequenceUpdate */
203 { 0x15d, 1, { &hf_tpmi_dh_object, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_Sign */
204 { 0x15e, 1, { &hf_tpmi_dh_object, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_Unseal */
205 { 0x160, 2, { &hf_tpmi_dh_object, &hf_tpmi_sh_auth_session, 0 }, 0, { 0, 0, 0 }}, /* CC_PolicySigned */
206 { 0x161, 0, { 0, 0, 0 }, 1, { &hf_tpmi_dh_context, 0, 0 }}, /* CC_ContextLoad */
207 { 0x162, 1, { &hf_tpmi_dh_context, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_ContextSave */
208 { 0x163, 1, { &hf_tpmi_dh_object, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_ECDH_KeyGen */
209 { 0x164, 1, { &hf_tpmi_dh_object, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_EncryptDecrypt */
210 { 0x165, 1, { &hf_tpmi_dh_context, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_FlushContext */
211 { 0x167, 0, { 0, 0, 0 }, 1, { &hf_tpmi_dh_object, 0, 0 }}, /* CC_LoadExternal */
212 { 0x168, 1, { &hf_tpmi_dh_object, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_MakeCredential */
213 { 0x169, 1, { &hf_tpmi_rh_nv_index, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_NV_ReadPublic */
214 { 0x16a, 1, { &hf_tpmi_sh_auth_session, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PolicyAuthorize */
215 { 0x16b, 1, { &hf_tpmi_sh_auth_session, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PolicyAuthValue */
216 { 0x16c, 1, { &hf_tpmi_sh_auth_session, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PolicyCommandCode */
217 { 0x16d, 1, { &hf_tpmi_sh_auth_session, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PolicyCounterTimer" */
218 { 0x16e, 1, { &hf_tpmi_sh_auth_session, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PolicyCpHash */
219 { 0x16f, 1, { &hf_tpmi_sh_auth_session, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PolicyLocality */
220 { 0x170, 1, { &hf_tpmi_sh_auth_session, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PolicyNameHash */
221 { 0x171, 1, { &hf_tpmi_sh_auth_session, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PolicyOR */
222 { 0x172, 1, { &hf_tpmi_sh_auth_session, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PolicyTicket */
223 { 0x173, 1, { &hf_tpmi_dh_object, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_ReadPublic */
224 { 0x174, 1, { &hf_tpmi_dh_object, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_RSA_Encrypt */
225 { 0x176, 2, { &hf_tpmi_dh_object, &hf_tpmi_dh_entity, 0 }, 1, { &hf_tpmi_sh_auth_session, 0, 0 }}, /* CC_StartAuthSession */
226 { 0x177, 1, { &hf_tpmi_dh_object, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_VerifySignature */
227 { 0x178, 0, { 0, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_ECC_Parameters */
228 { 0x179, 0, { 0, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_FirmwareRead */
229 { 0x17a, 0, { 0, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_GetCapability */
230 { 0x17b, 0, { 0, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_GetRandom */
231 { 0x17c, 0, { 0, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_GetTestResult */
232 { 0x17d, 0, { 0, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_Hash */
233 { 0x17e, 0, { 0, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PCR_Read */
234 { 0x17f, 1, { &hf_tpmi_sh_auth_session, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PolicyPCR */
235 { 0x180, 1, { &hf_tpmi_sh_auth_session, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PolicyRestart */
236 { 0x181, 0, { 0, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_ReadClock */
237 { 0x182, 1, { &hf_tpmi_dh_pcr, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PCR_Extend */
238 { 0x183, 1, { &hf_tpmi_dh_pcr, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PCR_SetAuthValue */
239 { 0x184, 3, { &hf_tpmi_dh_object, &hf_tpmi_rh_nv_auth, &hf_tpmi_rh_nv_index }, 0, { 0, 0, 0 }}, /* CC_NV_Certify */
240 { 0x185, 2, { &hf_tpmi_dh_pcr, &hf_tpmi_dh_object, 0 }, 0, { 0, 0, 0 }}, /* CC_EventSequenceComplete */
241 { 0x186, 0, { 0, 0, 0 }, 1, { &hf_tpmi_dh_object, 0, 0 }}, /* CC_HashSequenceStart */
242 { 0x187, 1, { &hf_tpmi_sh_auth_session, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PolicyPhysicalPresence */
243 { 0x188, 1, { &hf_tpmi_sh_auth_session, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PolicyDuplicationSelect */
244 { 0x189, 1, { &hf_tpmi_sh_auth_session, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PolicyGetDigest */
245 { 0x18a, 0, { 0, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_TestParms */
246 { 0x18b, 1, { &hf_tpmi_dh_object, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_Commit */
247 { 0x18c, 1, { &hf_tpmi_sh_auth_session, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PolicyPassword */
248 { 0x18d, 1, { &hf_tpmi_dh_object, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_ZGen_2Phase */
249 { 0x18e, 0, { 0, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_EC_Ephemeral */
250 { 0x18f, 1, { &hf_tpmi_sh_auth_session, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PolicyNvWritten */
251 { 0x190, 1, { &hf_tpmi_sh_auth_session, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_PolicyTemplate */
252 { 0x191, 1, { &hf_tpmi_rh_hierarhy, 0, 0 }, 1, { &hf_tpmi_dh_parent, 0, 0 }}, /* CC_CreateLoaded */
253 { 0x192, 3, { &hf_tpmi_rh_nv_auth, &hf_tpmi_rh_nv_index, &hf_tpmi_sh_auth_session }, 0, { 0, 0, 0 }}, /* CC_PolicyAuthorizeNV */
254 { 0x193, 1, { &hf_tpmi_dh_object, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_EncryptDecrypt2 */
255 { 0x194, 1, { &hf_tpmi_ht_handle, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_AC_GetCapability */
256 { 0x195, 3, { &hf_tpmi_dh_object, &hf_tpmi_rh_nv_auth, &hf_tpmi_ht_handle }, 0, { 0, 0, 0 }}, /* CC_AC_Send */
257 { 0x196, 1, { &hf_tpmi_sh_auth_session, 0, 0 }, 0, { 0, 0, 0 }}, /* CC_Policy_AC_SendSelect */
258 { 0x197, 2, { &hf_tpmi_dh_object, &hf_tpmi_dh_object, 0 }, 0, { 0, 0, 0 }}, /* CC_CertifyX509 */
259 { 0x198, 1, { &hf_tpmi_rh_act, 0, 0 }, 0, { 0, 0, 0 }}, /* TPM_CC_ACT_SetTimeout */
260};
261
262static void get_num_hndl(struct num_handles *map)
263{
264 for (size_t i = 0; i < array_length(tpm_handles_map)(sizeof (tpm_handles_map) / sizeof (tpm_handles_map)[0]); i++) {
265 if (map->command == tpm_handles_map[i].command) {
266 map->num_req_handles = tpm_handles_map[i].num_req_handles;
267 map->num_resp_handles = tpm_handles_map[i].num_resp_handles;
268 for (size_t y = 0; y < map->num_req_handles; y++)
269 map->req_pd[y] = tpm_handles_map[i].req_pd[y];
270 for (size_t y = 0; y < map->num_resp_handles; y++)
271 map->resp_pd[y] = tpm_handles_map[i].resp_pd[y];
272 }
273 }
274}
275
276static const value_string handles[] = {
277 { 0x40000000, "TPM2_RH_SRK" },
278 { 0x40000001, "TPM2_RH_OWNER" },
279 { 0x40000002, "TPM2_RH_REVOKE" },
280 { 0x40000003, "TPM2_RH_TRANSPORT" },
281 { 0x40000004, "TPM2_RH_OPERATOR" },
282 { 0x40000005, "TPM2_RH_ADMIN" },
283 { 0x40000006, "TPM2_RH_EK" },
284 { 0x40000007, "TPM2_RH_NULL" },
285 { 0x40000008, "TPM2_RH_UNASSIGNED" },
286 { 0x40000009, "TPM2_RS_PW" },
287 { 0x4000000A, "TPM2_RH_LOCKOUT" },
288 { 0x4000000B, "TPM2_RH_ENDORSEMENT" },
289 { 0x4000000C, "TPM2_RH_PLATFORM" },
290 { 0x4000000D, "TPM2_RH_PLATFORM_NV" },
291 { 0x40000010, "TPM2_RH_AUTH_00" },
292 { 0x4000010F, "TPM2_RH_AUTH_FF" },
293 { 0x40000110, "TPM_RH_ACT_0" },
294 { 0x40000111, "TPM_RH_ACT_1" },
295 { 0x40000112, "TPM_RH_ACT_2" },
296 { 0x40000113, "TPM_RH_ACT_3" },
297 { 0x40000114, "TPM_RH_ACT_4" },
298 { 0x40000115, "TPM_RH_ACT_5" },
299 { 0x40000116, "TPM_RH_ACT_6" },
300 { 0x40000117, "TPM_RH_ACT_7" },
301 { 0x40000118, "TPM_RH_ACT_8" },
302 { 0x40000119, "TPM_RH_ACT_9" },
303 { 0x4000011A, "TPM_RH_ACT_10" },
304 { 0x4000011B, "TPM_RH_ACT_11" },
305 { 0x4000011C, "TPM_RH_ACT_12" },
306 { 0x4000011D, "TPM_RH_ACT_13" },
307 { 0x4000011E, "TPM_RH_ACT_14" },
308 { 0x4000011F, "TPM_RH_ACT_15" },
309 { 0, NULL((void*)0) }
310};
311
312static const value_string startup_types[] = {
313 { 0x0000, "TPM_SU_CLEAR" },
314 { 0x0001, "TPM_SU_STATE" },
315 { 0, NULL((void*)0) }
316};
317
318static const value_string platform_commands[] = {
319 { 0x01, "TPM_POWER_ON" },
320 { 0x02, "TPM_POWER_OFF" },
321 { 0x08, "TPM_SEND_COMMAND" },
322 { 0x09, "TPM_CANCEL_ON" },
323 { 0x0a, "TPM_CANCEL_OFF" },
324 { 0x0b, "TPM_NV_ON" },
325 { 0x14, "TPM_SESSION_END" },
326 { 0, NULL((void*)0) }
327};
328
329static const value_string tags[] = {
330 { 0x8001, "Command with no authorization Sessions" },
331 { 0x8002, "Command with authorization Sessions" },
332 { 0, NULL((void*)0) }
333};
334
335static const value_string hierarhies[] = {
336 { 0x40000001, "TPM2_RH_OWNER" },
337 { 0x40000007, "TPM2_RH_NULL" },
338 { 0x4000000B, "TPM2_RH_ENDORSEMENT" },
339 { 0x4000000C, "TPM2_RH_PLATFORM" },
340 { 0, NULL((void*)0) }
341};
342
343static const value_string algs[] = {
344 { 0x0001, "TPM2_ALG_RSA" },
345 { 0x0004, "TPM2_ALG_SHA" },
346 { 0x0005, "TPM2_ALG_HMAC" },
347 { 0x0006, "TPM2_ALG_AES" },
348 { 0x0007, "TPM2_ALG_MGF1" },
349 { 0x0008, "TPM2_ALG_KEYEDHASH" },
350 { 0x000A, "TPM2_ALG_XOR" },
351 { 0x000B, "TPM2_ALG_SHA256" },
352 { 0x000C, "TPM2_ALG_SHA384" },
353 { 0x000D, "TPM2_ALG_SHA512" },
354 { 0x0010, "TPM2_ALG_NULL" },
355 { 0x0012, "TPM2_ALG_SM3_256" },
356 { 0x0013, "TPM2_ALG_SM4" },
357 { 0x0014, "TPM2_ALG_RSASSA" },
358 { 0x0015, "TPM2_ALG_RSAES" },
359 { 0x0016, "TPM2_ALG_RSAPSS" },
360 { 0x0017, "TPM2_ALG_OAEP" },
361 { 0x0018, "TPM2_ALG_ECDSA" },
362 { 0x0019, "TPM2_ALG_ECDH" },
363 { 0x001A, "TPM2_ALG_ECDAA" },
364 { 0x001B, "TPM2_ALG_SM2" },
365 { 0x001C, "TPM2_ALG_ECSCHNORR" },
366 { 0x001D, "TPM2_ALG_ECMQV" },
367 { 0x0020, "TPM2_ALG_KDF1_SP800_56A" },
368 { 0x0021, "TPM2_ALG_KDF2" },
369 { 0x0022, "TPM2_ALG_KDF1_SP800_108" },
370 { 0x0023, "TPM2_ALG_ECC" },
371 { 0x0025, "TPM2_ALG_SYMCIPHER" },
372 { 0x0026, "TPM2_ALG_CAMELLIA" },
373 { 0x0040, "TPM2_ALG_CTR" },
374 { 0x0027, "TPM2_ALG_SHA3_256" },
375 { 0x0028, "TPM2_ALG_SHA3_384" },
376 { 0x0029, "TPM2_ALG_SHA3_512" },
377 { 0x0041, "TPM2_ALG_OFB" },
378 { 0x0042, "TPM2_ALG_CBC" },
379 { 0x0043, "TPM2_ALG_CFB" },
380 { 0x0044, "TPM2_ALG_ECB" },
381 { 0, NULL((void*)0) }
382};
383
384static const value_string commands[] = {
385 { 0x11f, "TPM2_CC_NV_UndefineSpaceSpecial" },
386 { 0x120, "TPM2_CC_EvictControl" },
387 { 0x121, "TPM2_CC_HierarchyControl" },
388 { 0x122, "TPM2_CC_NV_UndefineSpace" },
389 { 0x124, "TPM2_CC_ChangeEPS" },
390 { 0x125, "TPM2_CC_ChangePPS" },
391 { 0x126, "TPM2_CC_Clear" },
392 { 0x127, "TPM2_CC_ClearControl" },
393 { 0x128, "TPM2_CC_ClockSet" },
394 { 0x129, "TPM2_CC_HierarchyChangeAuth" },
395 { 0x12a, "TPM2_CC_NV_DefineSpace" },
396 { 0x12b, "TPM2_CC_PCR_Allocate" },
397 { 0x12c, "TPM2_CC_PCR_SetAuthPolicy" },
398 { 0x12d, "TPM2_CC_PP_Commands" },
399 { 0x12e, "TPM2_CC_SetPrimaryPolicy" },
400 { 0x12f, "TPM2_CC_FieldUpgradeStart" },
401 { 0x130, "TPM2_CC_ClockRateAdjust" },
402 { 0x131, "TPM2_CC_CreatePrimary" },
403 { 0x132, "TPM2_CC_NV_GlobalWriteLock" },
404 { 0x133, "TPM2_CC_GetCommandAuditDigest" },
405 { 0x134, "TPM2_CC_NV_Increment" },
406 { 0x135, "TPM2_CC_NV_SetBits" },
407 { 0x136, "TPM2_CC_NV_Extend" },
408 { 0x137, "TPM2_CC_NV_Write" },
409 { 0x138, "TPM2_CC_NV_WriteLock" },
410 { 0x139, "TPM2_CC_DictionaryAttackLockReset" },
411 { 0x13a, "TPM2_CC_DictionaryAttackParameters" },
412 { 0x13b, "TPM2_CC_NV_ChangeAuth" },
413 { 0x13c, "TPM2_CC_PCR_Event" },
414 { 0x13d, "TPM2_CC_PCR_Reset" },
415 { 0x13e, "TPM2_CC_SequenceComplete" },
416 { 0x13f, "TPM2_CC_SetAlgorithmSet" },
417 { 0x140, "TPM2_CC_SetCommandCodeAuditStatus" },
418 { 0x141, "TPM2_CC_FieldUpgradeData" },
419 { 0x142, "TPM2_CC_IncrementalSelfTest" },
420 { 0x143, "TPM2_CC_SelfTest" },
421 { 0x144, "TPM2_CC_Startup" },
422 { 0x145, "TPM2_CC_Shutdown" },
423 { 0x146, "TPM2_CC_StirRandom" },
424 { 0x147, "TPM2_CC_ActivateCredential" },
425 { 0x148, "TPM2_CC_Certify" },
426 { 0x149, "TPM2_CC_PolicyNV" },
427 { 0x14a, "TPM2_CC_CertifyCreation" },
428 { 0x14b, "TPM2_CC_Duplicate" },
429 { 0x14c, "TPM2_CC_GetTime" },
430 { 0x14d, "TPM2_CC_GetSessionAuditDigest" },
431 { 0x14e, "TPM2_CC_NV_Read" },
432 { 0x14f, "TPM2_CC_NV_ReadLock" },
433 { 0x150, "TPM2_CC_ObjectChangeAuth" },
434 { 0x151, "TPM2_CC_PolicySecret" },
435 { 0x152, "TPM2_CC_Rewrap" },
436 { 0x153, "TPM2_CC_Create" },
437 { 0x154, "TPM2_CC_ECDH_ZGen" },
438 { 0x155, "TPM2_CC_HMAC" },
439 { 0x156, "TPM2_CC_Import" },
440 { 0x157, "TPM2_CC_Load" },
441 { 0x158, "TPM2_CC_Quote" },
442 { 0x159, "TPM2_CC_RSA_Decrypt" },
443 { 0x15b, "TPM2_CC_HMAC_Start" },
444 { 0x15c, "TPM2_CC_SequenceUpdate" },
445 { 0x15d, "TPM2_CC_Sign" },
446 { 0x15e, "TPM2_CC_Unseal" },
447 { 0x160, "TPM2_CC_PolicySigned" },
448 { 0x161, "TPM2_CC_ContextLoad" },
449 { 0x162, "TPM2_CC_ContextSave" },
450 { 0x163, "TPM2_CC_ECDH_KeyGen" },
451 { 0x164, "TPM2_CC_EncryptDecrypt" },
452 { 0x165, "TPM2_CC_FlushContext" },
453 { 0x167, "TPM2_CC_LoadExternal" },
454 { 0x168, "TPM2_CC_MakeCredential" },
455 { 0x169, "TPM2_CC_NV_ReadPublic" },
456 { 0x16a, "TPM2_CC_PolicyAuthorize" },
457 { 0x16b, "TPM2_CC_PolicyAuthValue" },
458 { 0x16c, "TPM2_CC_PolicyCommandCode" },
459 { 0x16d, "TPM2_CC_PolicyCounterTimer" },
460 { 0x16e, "TPM2_CC_PolicyCpHash" },
461 { 0x16f, "TPM2_CC_PolicyLocality" },
462 { 0x170, "TPM2_CC_PolicyNameHash" },
463 { 0x171, "TPM2_CC_PolicyOR" },
464 { 0x172, "TPM2_CC_PolicyTicket" },
465 { 0x173, "TPM2_CC_ReadPublic" },
466 { 0x174, "TPM2_CC_RSA_Encrypt" },
467 { 0x176, "TPM2_CC_StartAuthSession" },
468 { 0x177, "TPM2_CC_VerifySignature" },
469 { 0x178, "TPM2_CC_ECC_Parameters" },
470 { 0x179, "TPM2_CC_FirmwareRead" },
471 { 0x17a, "TPM2_CC_GetCapability" },
472 { 0x17b, "TPM2_CC_GetRandom" },
473 { 0x17c, "TPM2_CC_GetTestResult" },
474 { 0x17d, "TPM2_CC_Hash" },
475 { 0x17e, "TPM2_CC_PCR_Read" },
476 { 0x17f, "TPM2_CC_PolicyPCR" },
477 { 0x180, "TPM2_CC_PolicyRestart" },
478 { 0x181, "TPM2_CC_ReadClock" },
479 { 0x182, "TPM2_CC_PCR_Extend" },
480 { 0x183, "TPM2_CC_PCR_SetAuthValue" },
481 { 0x184, "TPM2_CC_NV_Certify" },
482 { 0x185, "TPM2_CC_EventSequenceComplete" },
483 { 0x186, "TPM2_CC_HashSequenceStart" },
484 { 0x187, "TPM2_CC_PolicyPhysicalPresence" },
485 { 0x188, "TPM2_CC_PolicyDuplicationSelect" },
486 { 0x189, "TPM2_CC_PolicyGetDigest" },
487 { 0x18a, "TPM2_CC_TestParms" },
488 { 0x18b, "TPM2_CC_Commit" },
489 { 0x18c, "TPM2_CC_PolicyPassword" },
490 { 0x18d, "TPM2_CC_ZGen_2Phase" },
491 { 0x18e, "TPM2_CC_EC_Ephemeral" },
492 { 0x18f, "TPM2_CC_PolicyNvWritten" },
493 { 0x190, "TPM2_CC_PolicyTemplate" },
494 { 0x191, "TPM2_CC_CreateLoaded" },
495 { 0x192, "TPM2_CC_PolicyAuthorizeNV" },
496 { 0x193, "TPM2_CC_EncryptDecrypt2" },
497 { 0x194, "TPM2_CC_AC_GetCapability" },
498 { 0x195, "TPM2_CC_AC_Send" },
499 { 0x196, "TPM2_CC_Policy_AC_SendSelect" },
500 { 0x197, "TPM2_CC_CertifyX509" },
501 { 0x198, "TPM2_CC_ACT_SetTimeout" },
502 { 0, NULL((void*)0) }
503};
504
505static const value_string session_type [] = {
506 { 0x00, "TPM2_SE_HMAC" },
507 { 0x01, "TPM2_SE_POLICY" },
508 { 0x03, "TPM2_SE_TRIAL" },
509 { 0, NULL((void*)0) }
510};
511
512static const value_string responses [] = {
513 { 0x00, "TPM2 Success" },
514 { 0x100, "TPM2_RC_INITIALIZE, TPM not initialized by TPM2_Startup or already initialized" },
515 { 0x101, "TPM2_RC_FAILURE, Commands not being accepted because of a TPM failure" },
516 { 0x103, "TPM2_RC_SEQUENCE, Improper use of a sequence handle" },
517 { 0x10B, "TPM2_RC_PRIVATE" },
518 { 0x119, "TPM2_RC_HMAC" },
519 { 0x120, "TPM2_RC_DISABLED, The command is disabled" },
520 { 0x121, "TPM2_RC_EXCLUSIVE, Command failed because audit sequence required exclusivity" },
521 { 0x124, "TPM2_RC_AUTH_TYPE, Authorization handle is not correct for command" },
522 { 0x125, "TPM2_RC_AUTH_MISSING, Command requires an authorization session for handle and it is not present" },
523 { 0x126, "TPM2_RC_POLICY, Policy failure in math operation or an invalid authPolicy value" },
524 { 0x127, "TPM2_RC_PCR, PCR check fail" },
525 { 0x128, "TPM2_RC_PCR_CHANGED, PCR have changed since checked" },
526 { 0x12D, "TPM2_RC_UPGRADE, TPM is in field upgrade mode" },
527 { 0x12E, "TPM2_RC_TOO_MANY_CONTEXTS, Context ID counter is at maximum" },
528 { 0x12F, "TPM2_RC_AUTH_UNAVAILABLE, AuthValue or authPolicy is not available for selected entity" },
529 { 0x130, "TPM2_RC_REBOOT, _TPM_Init and StartupCLEAR is required before the TPM can resume operation" },
530 { 0x131, "TPM2_RC_UNBALANCED, The digest size of must be larger than the symmetric key size" },
531 { 0x142, "TPM2_RC_COMMAND_SIZE, Command Size value is inconsistent with contents of the command buffer" },
532 { 0x143, "TPM2_RC_COMMAND_CODE, Command code not supported" },
533 { 0x144, "TPM2_RC_AUTHSIZE, The value of authorization size is out of range" },
534 { 0x145, "TPM2_RC_AUTH_CONTEXT, Use of an authorization session with a context that cannot have an authorization session" },
535 { 0x146, "TPM2_RC_NV_RANGE, NV offset + size is out of range" },
536 { 0x147, "TPM2_RC_NV_SIZE, Requested allocation size is larger than allowed" },
537 { 0x148, "TPM2_RC_NV_LOCKED, NV access locked" },
538 { 0x149, "TPM2_RC_NV_AUTHORIZATION, NV access authorization fails in command actions" },
539 { 0x14A, "TPM2_RC_NV_UNINITIALIZED, An NV Index is used before being initialized or the state could not be restored" },
540 { 0x14B, "TPM2_RC_NV_SPACE, Insufficient space for NV allocation" },
541 { 0x14C, "TPM2_RC_NV_DEFINED, NV Index or persistent object already defined" },
542 { 0x150, "TPM2_RC_BAD_CONTEXT, Context in TPM2_ContextLoad is not valid" },
543 { 0x151, "TPM2_RC_CPHASH, cpHash value already set or not correct for use" },
544 { 0x152, "TPM2_RC_PARENT, Handle for parent is not a valid parent" },
545 { 0x153, "TPM2_RC_NEEDS_TEST, Some function needs testing" },
546 { 0x154, "TPM2_RC_NO_RESULT, Internal function cannot process a request due to an unspecified problem" },
547 { 0x155, "TPM2_RC_SENSITIVE, The sensitive area did not unmarshal correctly after decryption" },
548 { 0x801, "TPM2_RC_ASYMMETRIC, Asymmetric algorithm not supported or not correct" },
549 { 0x802, "TPM2_RC_ATTRIBUTES, Inconsistent attributes" },
550 { 0x803, "TPM2_RC_HASH, Hash algorithm not supported or not appropriate" },
551 { 0x804, "TPM2_RC_VALUE, Value is out of range or is not correct for the context" },
552 { 0x805, "TPM2_RC_HIERARCHY, Hierarchy is not enabled or is not correct for the use" },
553 { 0x807, "TPM2_RC_KEY_SIZE, Key size is not supported" },
554 { 0x808, "TPM2_RC_MGF, Mask generation function not supported" },
555 { 0x809, "TPM2_RC_MODE, Mode of operation not supported" },
556 { 0x80A, "TPM2_RC_TYPE, The type of the value is not appropriate for the use" },
557 { 0x80B, "TPM2_RC_HANDLE, The handle is not correct for the use" },
558 { 0x80C, "TPM2_RC_KDF, Unsupported key derivation function or function not appropriate for use" },
559 { 0x80D, "TPM2_RC_RANGE, Value was out of allowed range" },
560 { 0x80E, "TPM2_RC_AUTH_FAIL, The authorization HMAC check failed" },
561 { 0x80F, "TPM2_RC_NONCE, invalid nonce size or nonce value mismatch" },
562 { 0x810, "TPM2_RC_PP, Authorization requires assertion of PP" },
563 { 0x812, "TPM2_RC_SCHEME, Unsupported or incompatible scheme" },
564 { 0x815, "TPM2_RC_SIZE, Structure is the wrong size" },
565 { 0x816, "TPM2_RC_SYMMETRIC, Unsupported symmetric algorithm or key size or not appropriate for instance" },
566 { 0x817, "TPM2_RC_TAG, Incorrect structure tag" },
567 { 0x818, "TPM2_RC_SELECTOR, Union selector is incorrect" },
568 { 0x81A, "TPM2_RC_INSUFFICIENT, Unable to unmarshal a value because there were not enough octets in the input buffer" },
569 { 0x81B, "TPM2_RC_SIGNATURE, The signature is not valid" },
570 { 0x81C, "TPM2_RC_KEY, Key fields are not compatible with the selected use" },
571 { 0x81D, "TPM2_RC_POLICY_FAIL, Policy check failed" },
572 { 0x81F, "TPM2_RC_INTEGRITY, Integrity check failed" },
573 { 0x820, "TPM2_RC_TICKET, Invalid ticket" },
574 { 0x821, "TPM2_RC_RESERVED_BITS, Reserved bits not set to zero as required" },
575 { 0x822, "TPM2_RC_BAD_AUTH, Authorization failure without DA implications" },
576 { 0x823, "TPM2_RC_EXPIRED, The policy has expired" },
577 { 0x824, "TPM2_RC_POLICY_CC, The commandCode in the policy is not the commandCode of the command or command not implemented" },
578 { 0x825, "TPM2_RC_BINDING, Public and sensitive portions of an object are not cryptographically bound" },
579 { 0x826, "TPM2_RC_CURVE, Curve not supported" },
580 { 0x827, "TPM2_RC_ECC_POINT, Point is not on the required curve" },
581 { 0x901, "TPM2_RC_CONTEXT_GAP, Gap for context ID is too large" },
582 { 0x902, "TPM2_RC_OBJECT_MEMORY, Out of memory for object contexts" },
583 { 0x903, "TPM2_RC_SESSION_MEMORY, Out of memory for session contexts" },
584 { 0x904, "TPM2_RC_MEMORY, Out of shared objectsession memory or need space for internal operations" },
585 { 0x905, "TPM2_RC_SESSION_HANDLES, Out of session handles. A session must be flushed before a new session may be created" },
586 { 0x906, "TPM2_RC_OBJECT_HANDLES, Out of object handles. A reboot is required" },
587 { 0x907, "TPM2_RC_LOCALITY, Bad locality" },
588 { 0x908, "TPM2_RC_YIELDED, TPM has suspended operation on the command" },
589 { 0x909, "TPM2_RC_CANCELED, The command was canceled" },
590 { 0x90A, "TPM2_RC_TESTING, TPM is performing selftests" },
591 { 0x910, "TPM2_RC_REFERENCE_H0, The 1st handle references a transient object or session that is not loaded" },
592 { 0x911, "TPM2_RC_REFERENCE_H1, The 2nd handle references a transient object or session that is not loaded" },
593 { 0x912, "TPM2_RC_REFERENCE_H2, The 3rd handle references a transient object or session that is not loaded" },
594 { 0x913, "TPM2_RC_REFERENCE_H3, The 4th handle references a transient object or session that is not loaded" },
595 { 0x914, "TPM2_RC_REFERENCE_H4, The 5th handle references a transient object or session that is not loaded" },
596 { 0x915, "TPM2_RC_REFERENCE_H5, The 6th handle references a transient object or session that is not loaded" },
597 { 0x916, "TPM2_RC_REFERENCE_H6, The 7th handle references a transient object or session that is not loaded" },
598 { 0x918, "TPM2_RC_REFERENCE_S0, The 1st authorization session handle references a session that is not loaded" },
599 { 0x919, "TPM2_RC_REFERENCE_S1, The 2nd authorization session handle references a session that is not loaded" },
600 { 0x91A, "TPM2_RC_REFERENCE_S2, The 3rd authorization session handle references a session that is not loaded" },
601 { 0x91B, "TPM2_RC_REFERENCE_S3, The 4th authorization session handle references a session that is not loaded" },
602 { 0x91C, "TPM2_RC_REFERENCE_S4, The 5th session handle references a session that is not loaded" },
603 { 0x91D, "TPM2_RC_REFERENCE_S5, The 6th session handle references a session that is not loaded" },
604 { 0x91E, "TPM2_RC_REFERENCE_S6, The 7th authorization session handle references a session that is not loaded" },
605 { 0x920, "TPM2_RC_NV_RATE, The TPM is ratelimiting accesses to prevent wearout of NV" },
606 { 0x921, "TPM2_RC_LOCKOUT, Authorizations for objects subject to DA protection are not allowed at this time. TPM is in DA lockout mode" },
607 { 0x922, "TPM2_RC_RETRY - the TPM was not able to start the command" },
608 { 0x923, "TPM2_RC_NV_UNAVAILABLE - the command may require writing of NV and NV is not current accessible" },
609 { 0, NULL((void*)0) }
610};
611
612#define TPMA_SESSION_CONTINUESESSION0x01 0x01
613#define TPMA_SESSION_AUDITEXCLUSIVE0x02 0x02
614#define TPMA_SESSION_AUDITRESET0x04 0x04
615#define TPMA_SESSION_RESERVED1_MASK0x18 0x18
616#define TPMA_SESSION_DECRYPT0x20 0x20
617#define TPMA_SESSION_ENCRYPT0x40 0x40
618#define TPMA_SESSION_AUDIT0x80 0x80
619
620static tpm_entry *get_command_entry(wmem_tree_t *tree, uint32_t pnum)
621{
622 tpm_entry *entry = (tpm_entry *)wmem_tree_lookup32(tree, pnum);
623 if (entry == NULL((void*)0))
24
Assuming 'entry' is not equal to NULL
25
Taking false branch
624 return NULL((void*)0);
625
626 tpm_entry *command_entry = (tpm_entry *)wmem_tree_lookup32(tree, entry->com_pnum);
26
'command_entry' initialized here
627 return command_entry;
27
Returning pointer (loaded from 'command_entry')
628}
629
630static void
631dissect_tpm20_platform_command(tvbuff_t *tvb, packet_info *pinfo,
632 proto_tree *tree)
633{
634 uint32_t command;
635
636 proto_tree_add_item_ret_uint(tree, hf_tpm20_platform_cmd, tvb, 0,
637 4, ENC_BIG_ENDIAN0x00000000, &command);
638
639 col_append_fstr(pinfo->cinfo, COL_INFO, ", Platform Command %s",
640 val_to_str(command, platform_commands, "Unknown (0x%02x)"));
641
642 proto_item_append_text(tree, ", %s", val_to_str(command,
643 platform_commands, "Unknown (0x%02x)"));
644 response_size = false0;
645}
646
647static void
648dissect_auth_common(tvbuff_t *tvb, packet_info *pinfo _U___attribute__((unused)),
649 proto_tree *auth, proto_tree *tree _U___attribute__((unused)), int *offset)
650{
651 unsigned nonce_size, auth_size;
652 static int * const attrib_fields[] = {
653 &hf_session_attribs_cont,
654 &hf_session_attribs_auditex,
655 &hf_session_attribs_auditreset,
656 &hf_session_attribs_res,
657 &hf_session_attribs_decrypt,
658 &hf_session_attribs_encrypt,
659 &hf_session_attribs_audit,
660 NULL((void*)0)
661 };
662
663 proto_tree_add_item_ret_uint(auth, hf_session_nonce_size, tvb, *offset, 2,
664 ENC_BIG_ENDIAN0x00000000, &nonce_size);
665 *offset += 2;
666 proto_tree_add_item(auth, hf_session_nonce, tvb, *offset, nonce_size, ENC_NA0x00000000);
667 *offset += nonce_size;
668 proto_tree_add_bitmask_text(auth, tvb, *offset, 1, "Session attributes", NULL((void*)0),
669 ett_tpm_attrib, attrib_fields, ENC_NA0x00000000, BMT_NO_APPEND0x01);
670 *offset += 1;
671 proto_tree_add_item_ret_uint(auth, hf_session_auth_size, tvb, *offset, 2,
672 ENC_BIG_ENDIAN0x00000000, &auth_size);
673 *offset += 2;
674 proto_tree_add_item(auth, hf_session_auth, tvb, *offset, auth_size, ENC_NA0x00000000);
675 *offset += auth_size;
676}
677
678static void
679dissect_auth_resp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *auth,
680 proto_tree *tree, int *offset)
681{
682 tpm_entry *command_entry = get_command_entry(cmd_tree, pinfo->num);
683 uint32_t i;
684
685 if (command_entry != NULL((void*)0)) {
686 for (i = 0; i < command_entry->num_auths; i++)
687 dissect_auth_common(tvb, pinfo, auth, tree, offset);
688 }
689}
690
691static void
692dissect_auth_command(tvbuff_t *tvb, packet_info *pinfo, proto_tree *auth,
693 proto_tree *tree, int *offset)
694{
695 uint32_t auth_area_size;
696 uint32_t num_auths = 0;
697 tpm_entry *entry = (tpm_entry *)wmem_tree_lookup32(cmd_tree, pinfo->num);
698 DISSECTOR_ASSERT(entry != NULL)((void) ((entry != ((void*)0)) ? (void)0 : (proto_report_dissector_bug
("%s:%u: failed assertion \"%s\"", "epan/dissectors/packet-tpm20.c"
, 698, "entry != ((void*)0)"))))
;
699
700 proto_tree_add_item_ret_uint(auth, hf_auth_area_size, tvb, *offset,
701 4, ENC_BIG_ENDIAN0x00000000, &auth_area_size);
702 *offset += 4;
703
704 if (auth_area_size < TPM_MIN_AUTH_LEN9)
705 proto_tree_add_expert_format(auth, pinfo, &ei_invalid_auth_size, tvb, 0, 0,
706 "Error: Auth size: %d", auth_area_size);
707 while (auth_area_size) {
708 uint32_t size;
709 proto_tree_add_item(auth, hf_tpmi_sh_auth_session, tvb, *offset, 4, ENC_BIG_ENDIAN0x00000000);
710 *offset += 4;
711 auth_area_size -= 4;
712 size = *offset;
713 dissect_auth_common(tvb, pinfo, auth, tree, offset);
714 auth_area_size -= *offset - size;
715 num_auths++;
716 }
717
718 if (num_auths > MAX_SESSIONS3)
719 proto_tree_add_expert_format(auth, pinfo, &ei_invalid_num_sessions, tvb, 0, 0,
720 "Error: Invalid Number of sessions: %d", num_auths);
721 entry->num_auths = num_auths;
722}
723
724static void
725dissect_startup(tvbuff_t *tvb, packet_info *pinfo _U___attribute__((unused)),
726 proto_tree *header, proto_tree *tree _U___attribute__((unused)), int *offset)
727{
728 proto_tree_add_item(header, hf_tpm20_startup_type, tvb, *offset, 2, ENC_BIG_ENDIAN0x00000000);
729 *offset += 2;
730}
731
732static void
733dissect_start_auth_session(tvbuff_t *tvb, packet_info *pinfo _U___attribute__((unused)),
734 proto_tree *header _U___attribute__((unused)), proto_tree *tree, int *offset)
735{
736 uint32_t nonce_size, encrypted, sym_alg;
737 proto_tree_add_item_ret_uint(tree, hf_session_nonce_size, tvb, *offset, 2,
738 ENC_BIG_ENDIAN0x00000000, &nonce_size);
739 *offset += 2;
740 proto_tree_add_item(tree, hf_session_nonce, tvb, *offset, nonce_size, ENC_NA0x00000000);
741 *offset += nonce_size;
742
743 proto_tree_add_item_ret_uint(tree, hf_encrypted_secret_size, tvb, *offset, 2,
744 ENC_BIG_ENDIAN0x00000000, &encrypted);
745 *offset += 2;
746 proto_tree_add_item(tree, hf_encrypted_secret, tvb, *offset, encrypted, ENC_NA0x00000000);
747 *offset += encrypted;
748 proto_tree_add_item(tree, hf_session_type, tvb, *offset, 1, ENC_NA0x00000000);
749 *offset += 1;
750
751 proto_tree_add_item_ret_uint(tree, hf_alg_sym, tvb, *offset, 2, ENC_BIG_ENDIAN0x00000000, &sym_alg);
752 *offset += 2;
753 if (sym_alg != TPM_ALG_NULL0x0010) {
754 proto_tree_add_item(tree, hf_alg_sym_keybits, tvb, *offset, 2, ENC_BIG_ENDIAN0x00000000);
755 *offset += 2;
756 proto_tree_add_item(tree, hf_alg_sym_mode, tvb, *offset, 2, ENC_BIG_ENDIAN0x00000000);
757 *offset += 2;
758 }
759 proto_tree_add_item(tree, hf_alg_hash, tvb, *offset, 2, ENC_NA0x00000000);
760 *offset += 2;
761}
762
763static void
764dissect_create_primary(tvbuff_t *tvb, packet_info *pinfo _U___attribute__((unused)),
765 proto_tree *header _U___attribute__((unused)), proto_tree *tree, int *offset)
766{
767 uint32_t sensitive_size, pub_size, data_size;
768
769 proto_tree_add_item_ret_uint(tree, hf_tpm_sensitive_crate_size, tvb, *offset, 2,
770 ENC_BIG_ENDIAN0x00000000, &sensitive_size);
771 *offset += 2;
772 proto_tree_add_item(tree, hf_tpm_sensitive_crate, tvb, *offset, sensitive_size, ENC_NA0x00000000);
773 *offset += sensitive_size;
774
775 proto_tree_add_item_ret_uint(tree, hf_tpm_pub_size, tvb, *offset, 2,
776 ENC_BIG_ENDIAN0x00000000, &pub_size);
777 *offset += 2;
778 proto_tree_add_item(tree, hf_tpm_pub, tvb, *offset, pub_size, ENC_NA0x00000000);
779 *offset += pub_size;
780
781 proto_tree_add_item_ret_uint(tree, hf_tpm_data_size, tvb, *offset, 2,
782 ENC_BIG_ENDIAN0x00000000, &data_size);
783 *offset += 2;
784 proto_tree_add_item(tree, hf_tpm_data, tvb, *offset, data_size, ENC_NA0x00000000);
785 *offset += data_size;
786}
787
788static void
789dissect_create_loaded(tvbuff_t *tvb, packet_info *pinfo _U___attribute__((unused)),
790 proto_tree *header _U___attribute__((unused)), proto_tree *tree, int *offset)
791{
792 uint32_t sensitive_size, template_size;
793
794 proto_tree_add_item_ret_uint(tree, hf_tpm_sensitive_crate_size, tvb, *offset, 2,
795 ENC_BIG_ENDIAN0x00000000, &sensitive_size);
796 *offset += 2;
797 proto_tree_add_item(tree, hf_tpm_sensitive_crate, tvb, *offset, sensitive_size, ENC_NA0x00000000);
798 *offset += sensitive_size;
799
800 proto_tree_add_item_ret_uint(tree, hf_tpm_template_size, tvb, *offset, 2,
801 ENC_BIG_ENDIAN0x00000000, &template_size);
802 *offset += 2;
803 proto_tree_add_item(tree, hf_tpm_template, tvb, *offset, template_size, ENC_NA0x00000000);
804 *offset += template_size;
805}
806
807static void
808dissect_command(uint32_t command, tvbuff_t *tvb, packet_info *pinfo,
809 proto_tree *header, proto_tree *tree, int *offset)
810{
811 last_command_pnum = pinfo->num;
812
813 switch (command) {
814 case 0x144: /* TPM Start Up */
815 dissect_startup(tvb, pinfo, header, tree, offset);
816 break;
817 case 0x12e: /* Create Primary */
818 dissect_create_primary(tvb, pinfo, header, tree, offset);
819 break;
820 case 0x176: /* Start Auth Session */
821 dissect_start_auth_session(tvb, pinfo, header, tree, offset);
822 break;
823 case 0x191: /* Create Loaded */
824 dissect_create_loaded(tvb, pinfo, header, tree, offset);
825 break;
826 }
827}
828
829static void
830dissect_tpm20_tpm_command(tvbuff_t *tvb, packet_info *pinfo _U___attribute__((unused)),
831 proto_tree *tree)
832{
833 int offset = 0;
834 uint32_t command = tvb_get_uint32(tvb, 6, ENC_BIG_ENDIAN0x00000000);
835 uint16_t tag = tvb_get_uint16(tvb, 0, ENC_BIG_ENDIAN0x00000000);
836 struct num_handles handl_map;
837 unsigned int i;
838
839 col_append_fstr(pinfo->cinfo, COL_INFO, ", Command %s",
840 val_to_str(command, commands, "Unknown (0x%02x)"));
841
842 proto_item *item = proto_tree_add_item(tree, proto_tpm20_header,
843 tvb, 0, -1, ENC_NA0x00000000);
844 proto_item_append_text(item, ", %s", val_to_str(command, commands,
845 "Unknown (0x%02x)"));
846 proto_tree *header = proto_item_add_subtree(item, ett_tpm_header);
847 proto_tree_add_item(header, hf_tpm20_tag, tvb, offset, 2, ENC_BIG_ENDIAN0x00000000);
848 offset += 2;
849 proto_tree_add_item(header, hf_tpm20_size, tvb, offset, 4, ENC_BIG_ENDIAN0x00000000);
850 offset += 4;
851 proto_tree_add_item(header, hf_tpm20_cc, tvb, offset, 4, ENC_BIG_ENDIAN0x00000000);
852 offset += 4;
853
854 tpm_entry *entry = (tpm_entry *)wmem_tree_lookup32(cmd_tree, pinfo->num);
855 DISSECTOR_ASSERT(entry != NULL)((void) ((entry != ((void*)0)) ? (void)0 : (proto_report_dissector_bug
("%s:%u: failed assertion \"%s\"", "epan/dissectors/packet-tpm20.c"
, 855, "entry != ((void*)0)"))))
;
856 entry->command = command;
857
858 handl_map.command = command;
859 handl_map.num_req_handles = 0;
860 handl_map.num_resp_handles = 0;
861 get_num_hndl(&handl_map);
862
863 if (handl_map.num_req_handles) {
864 proto_item *hndls = proto_tree_add_item(tree, proto_tpm20_hndl_area,
865 tvb, 0, -1, ENC_NA0x00000000);
866 proto_tree *hndl_tree = proto_item_add_subtree(hndls, ett_tpm_handles);
867 for (i = 0; i < handl_map.num_req_handles; i++) {
868 proto_tree_add_item(hndl_tree, *handl_map.req_pd[i], tvb,
869 offset, 4, ENC_BIG_ENDIAN0x00000000);
870 offset += 4;
871 }
872 }
873 if (tag == 0x8002) {
874 proto_item *auth = proto_tree_add_item(tree, proto_tpm20_auth_area,
875 tvb, 0, -1, ENC_NA0x00000000);
876 proto_tree *auth_tree = proto_item_add_subtree(auth, ett_tpm_auth);
877 dissect_auth_command(tvb, pinfo, auth_tree, tree, &offset);
878 } else if (tag != 0x8001) {
879 proto_tree_add_expert_format(tree, pinfo, &ei_invalid_tag, tvb, 0, 0,
880 "Error: Invalid Tag: %x", tag);
881 }
882
883 dissect_command(command, tvb, pinfo, header, tree, &offset);
884 response_size = true1;
885}
886
887#define PNUM_UNINIT0xFFFFFFFF 0xFFFFFFFF
888#define RESP_CODE1 1
889#define RESP_SIZE2 2
890static void
891dissect_tpm20_platform_response(tvbuff_t *tvb, packet_info *pinfo _U___attribute__((unused)),
892 proto_tree *tree)
893{
894 uint32_t rc = tvb_get_uint32(tvb, 0, ENC_BIG_ENDIAN0x00000000);
895
896 tpm_entry *entry = (tpm_entry *)wmem_tree_lookup32(cmd_tree, pinfo->num);
897 DISSECTOR_ASSERT(entry != NULL)((void) ((entry != ((void*)0)) ? (void)0 : (proto_report_dissector_bug
("%s:%u: failed assertion \"%s\"", "epan/dissectors/packet-tpm20.c"
, 897, "entry != ((void*)0)"))))
;
898
899 if (entry->resp_type == PNUM_UNINIT0xFFFFFFFF) {
900 if (response_size == true1) {
901 entry->resp_type = RESP_SIZE2;
902 response_size = false0;
903 } else {
904 entry->resp_type = RESP_CODE1;
905 response_size = true1;
906 }
907 }
908
909 if (entry->resp_type == RESP_SIZE2) {
910 col_append_fstr(pinfo->cinfo, COL_INFO, ", Response size %d", rc);
911 proto_item_append_text(tree, ", Response size %d", rc);
912 proto_tree_add_item(tree, hf_tpm20_platform_resp_size, tvb, 0, 4, ENC_BIG_ENDIAN0x00000000);
913 } else {
914 col_append_fstr(pinfo->cinfo, COL_INFO, ", Response code %d", rc);
915 proto_item_append_text(tree, ", Response code %s",
916 val_to_str(rc, responses, "Unknown (0x%02x)"));
917 proto_tree_add_item(tree, hf_tpm20_platform_resp_code, tvb, 0, 4, ENC_BIG_ENDIAN0x00000000);
918 }
919}
920
921static void
922dissect_start_auth_session_resp(tvbuff_t *tvb, packet_info *pinfo _U___attribute__((unused)), proto_tree *tree,
923 int *offset, uint32_t param_size _U___attribute__((unused)))
924{
925 uint32_t nonce_size;
926
927 proto_tree_add_item_ret_uint(tree, hf_session_nonce_size, tvb, *offset, 2,
928 ENC_BIG_ENDIAN0x00000000, &nonce_size);
929 *offset += 2;
930 proto_tree_add_item(tree, hf_session_nonce, tvb, *offset, nonce_size, ENC_NA0x00000000);
931 *offset += nonce_size;
932}
933
934static void
935dissect_create_primary_resp(tvbuff_t *tvb, packet_info *pinfo _U___attribute__((unused)), proto_tree *tree,
936 int *offset, uint32_t param_size _U___attribute__((unused)))
937{
938 uint32_t pub_size, creation_data_size, digest_size, name_size;
939
940 proto_tree_add_item_ret_uint(tree, hf_tpm_pub_size, tvb, *offset, 2,
941 ENC_BIG_ENDIAN0x00000000, &pub_size);
942 *offset += 2;
943 proto_tree_add_item(tree, hf_tpm_pub, tvb, *offset, pub_size, ENC_NA0x00000000);
944 *offset += pub_size;
945
946 proto_tree_add_item_ret_uint(tree, hf_tpm_creation_data_size, tvb, *offset, 2,
947 ENC_BIG_ENDIAN0x00000000, &creation_data_size);
948 *offset += 2;
949 proto_tree_add_item(tree, hf_tpm_creation_data, tvb, *offset, creation_data_size, ENC_NA0x00000000);
950 *offset += creation_data_size;
951
952 proto_tree_add_item_ret_uint(tree, hf_tpm_digest_size, tvb, *offset, 2,
953 ENC_BIG_ENDIAN0x00000000, &digest_size);
954 *offset += 2;
955 proto_tree_add_item(tree, hf_tpm_digest, tvb, *offset, digest_size, ENC_NA0x00000000);
956 *offset += digest_size;
957
958 proto_tree_add_item_ret_uint(tree, hf_tpm_name_size, tvb, *offset, 2,
959 ENC_BIG_ENDIAN0x00000000, &name_size);
960 *offset += 2;
961 proto_tree_add_item(tree, hf_tpm_name, tvb, *offset, name_size, ENC_NA0x00000000);
962 *offset += name_size;
963}
964
965static void
966dissect_create_loaded_resp(tvbuff_t *tvb, packet_info *pinfo _U___attribute__((unused)), proto_tree *tree,
967 int *offset, uint32_t param_size _U___attribute__((unused)))
968{
969 uint32_t priv_size, pub_size, name_size;
970
971 proto_tree_add_item_ret_uint(tree, hf_tpm_priv_size, tvb, *offset, 2,
972 ENC_BIG_ENDIAN0x00000000, &priv_size);
973 *offset += 2;
974 proto_tree_add_item(tree, hf_tpm_priv, tvb, *offset, priv_size, ENC_NA0x00000000);
975 *offset += priv_size;
976
977 proto_tree_add_item_ret_uint(tree, hf_tpm_pub_size, tvb, *offset, 2,
978 ENC_BIG_ENDIAN0x00000000, &pub_size);
979 *offset += 2;
980 proto_tree_add_item(tree, hf_tpm_pub, tvb, *offset, pub_size, ENC_NA0x00000000);
981 *offset += pub_size;
982
983 proto_tree_add_item_ret_uint(tree, hf_tpm_name_size, tvb, *offset, 2,
984 ENC_BIG_ENDIAN0x00000000, &name_size);
985 *offset += 2;
986 proto_tree_add_item(tree, hf_tpm_name, tvb, *offset, name_size, ENC_NA0x00000000);
987 *offset += name_size;
988}
989
990static void
991dissect_response(tvbuff_t *tvb, packet_info *pinfo _U___attribute__((unused)), proto_tree *tree,
992 int *offset, uint32_t param_size)
993{
994 tpm_entry *entry = get_command_entry(cmd_tree, pinfo->num);
23
Calling 'get_command_entry'
28
Returning from 'get_command_entry'
29
'entry' initialized here
995 if (entry == NULL((void*)0)) {
30
Assuming 'entry' is equal to NULL
31
Taking true branch
996 /* Entry not found, treat as generic data */
997 proto_tree_add_item(tree, hf_params, tvb, *offset, param_size, ENC_NA0x00000000);
998 *offset += param_size;
999 }
1000
1001 switch (entry->command) {
32
Access to field 'command' results in a dereference of a null pointer (loaded from variable 'entry')
1002 case 0x12e: /* Create Primary */
1003 dissect_create_primary_resp(tvb, pinfo, tree, offset, param_size);
1004 break;
1005 case 0x176: /* Start Auth Session */
1006 dissect_start_auth_session_resp(tvb, pinfo, tree, offset, param_size);
1007 break;
1008 case 0x191: /* Create Loaded */
1009 dissect_create_loaded_resp(tvb, pinfo, tree, offset, param_size);
1010 break;
1011 case 0x144: /* TPM Start Up */
1012 break;
1013 default:
1014 /* For now dissect everything else and 'params'.
1015 * This will allow to process the response auth section */
1016 proto_tree_add_item(tree, hf_params, tvb, *offset, param_size, ENC_NA0x00000000);
1017 *offset += param_size;
1018 }
1019}
1020
1021static void
1022dissect_tpm20_tpm_response(tvbuff_t *tvb, packet_info *pinfo _U___attribute__((unused)),
1023 proto_tree *tree)
1024{
1025 int offset = 0;
1026 struct num_handles handl_map;
1027 uint16_t tag = tvb_get_uint16(tvb, 0, ENC_BIG_ENDIAN0x00000000);
1028 uint32_t rc = tvb_get_uint32(tvb, 6, ENC_BIG_ENDIAN0x00000000);
1029 uint32_t param_size;
1030 unsigned int i;
1031
1032 col_append_fstr(pinfo->cinfo, COL_INFO, ", Response Code %s",
1033 val_to_str(rc, responses, "Unknown (0x%02x)"));
1034
1035 proto_item *item = proto_tree_add_item(tree, proto_tpm20_resp_header,
1036 tvb, 0, -1, ENC_NA0x00000000);
1037 proto_item_append_text(item, ", %s", val_to_str(rc, responses, "Unknown (0x%02x)"));
1038 proto_tree *header = proto_item_add_subtree(item, ett_tpm_response_header);
1039
1040 proto_tree_add_item(header, hf_tpm20_resp_tag, tvb, offset, 2, ENC_BIG_ENDIAN0x00000000);
1041 offset += 2;
1042 proto_tree_add_item(header, hf_tpm20_resp_size, tvb, offset, 4, ENC_BIG_ENDIAN0x00000000);
1043 offset += 4;
1044 proto_tree_add_item(header, hf_tpm20_resp_code, tvb, offset, 4, ENC_BIG_ENDIAN0x00000000);
1045 offset += 4;
1046 /* if response code says error stop now */
1047 if (rc)
8
Assuming 'rc' is 0
9
Taking false branch
1048 return;
1049
1050 /* find a corresponding request */
1051 tpm_entry *entry = (tpm_entry *)wmem_tree_lookup32(cmd_tree, pinfo->num);
1052 DISSECTOR_ASSERT(entry != NULL)((void) ((entry != ((void*)0)) ? (void)0 : (proto_report_dissector_bug
("%s:%u: failed assertion \"%s\"", "epan/dissectors/packet-tpm20.c"
, 1052, "entry != ((void*)0)"))))
;
10
Assuming 'entry' is not equal to null
11
'?' condition is true
1053 if (entry->com_pnum == PNUM_UNINIT0xFFFFFFFF) {
12
Assuming field 'com_pnum' is not equal to PNUM_UNINIT
13
Taking false branch
1054 entry->com_pnum = last_command_pnum;
1055 }
1056 tpm_entry *command_entry = (tpm_entry *)wmem_tree_lookup32(cmd_tree, entry->com_pnum);
1057 DISSECTOR_ASSERT(command_entry != NULL)((void) ((command_entry != ((void*)0)) ? (void)0 : (proto_report_dissector_bug
("%s:%u: failed assertion \"%s\"", "epan/dissectors/packet-tpm20.c"
, 1057, "command_entry != ((void*)0)"))))
;
14
Assuming 'command_entry' is not equal to null
15
'?' condition is true
1058
1059 handl_map.command = command_entry->command;
1060 handl_map.num_req_handles = 0;
1061 handl_map.num_resp_handles = 0;
1062 get_num_hndl(&handl_map);
1063
1064 /* Dissect response handles */
1065 if (handl_map.num_resp_handles) {
16
Assuming field 'num_resp_handles' is 0
17
Taking false branch
1066 proto_item *hndls = proto_tree_add_item(tree, proto_tpm20_hndl_area,
1067 tvb, 0, -1, ENC_NA0x00000000);
1068 proto_tree *hndl_tree = proto_item_add_subtree(hndls, ett_tpm_handles);
1069 for (i = 0; i < handl_map.num_resp_handles; i++) {
1070 proto_tree_add_item(hndl_tree, *handl_map.resp_pd[i], tvb,
1071 offset, 4, ENC_BIG_ENDIAN0x00000000);
1072 offset += 4;
1073 }
1074 }
1075
1076 if (tag == 0x8002) {
18
Assuming 'tag' is not equal to 32770
19
Taking false branch
1077 /* Dissect response params size and params */
1078 param_size = tvb_get_uint32(tvb, offset, ENC_BIG_ENDIAN0x00000000);
1079 proto_tree_add_item(tree, hf_resp_param_size, tvb, offset, 4,
1080 ENC_BIG_ENDIAN0x00000000);
1081 offset += 4;
1082
1083 if (param_size) {
1084 proto_item *params = proto_tree_add_item(tree, proto_tpm20_params_area,
1085 tvb, 0, -1, ENC_NA0x00000000);
1086 proto_tree *param_tree = proto_item_add_subtree(params, ett_tpm_params);
1087 dissect_response(tvb, pinfo, param_tree, &offset, param_size);
1088 }
1089
1090 /* Dissect response auth area */
1091 proto_item *auth = proto_tree_add_item(tree, proto_tpm20_auth_area,
1092 tvb, 0, -1, ENC_NA0x00000000);
1093 proto_tree *auth_tree = proto_item_add_subtree(auth, ett_tpm_auth);
1094 dissect_auth_resp(tvb, pinfo, auth_tree, tree, &offset);
1095 } else if (tag == 0x8001) {
20
Assuming 'tag' is equal to 32769
21
Taking true branch
1096
1097 /* Dissect rest of the response */
1098 dissect_response(tvb, pinfo, tree, &offset, 0);
22
Calling 'dissect_response'
1099 } else {
1100 proto_tree_add_expert_format(tree, pinfo, &ei_invalid_tag, tvb, 0, 0,
1101 "Error: Invalid Tag: %x", tag);
1102 }
1103}
1104
1105static int
1106dissect_tpm20(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree,
1107 void* data _U___attribute__((unused)))
1108{
1109 tpm_entry *entry;
1110 col_set_str(pinfo->cinfo, COL_PROTOCOL, "TPM");
1111 col_clear(pinfo->cinfo, COL_INFO);
1112 col_append_ports(pinfo->cinfo, COL_INFO, PT_NONE, pinfo->srcport,
1113 pinfo->destport);
1114
1115 int length = tvb_reported_length(tvb);
1116 entry = (tpm_entry *)wmem_tree_lookup32(cmd_tree, pinfo->num);
1117
1118 if (entry == NULL((void*)0)) {
1
Assuming 'entry' is not equal to NULL
2
Taking false branch
1119 entry = wmem_new(wmem_file_scope(), tpm_entry)((tpm_entry*)wmem_alloc((wmem_file_scope()), sizeof(tpm_entry
)))
;
1120 entry->com_pnum = PNUM_UNINIT0xFFFFFFFF;
1121 entry->resp_type = PNUM_UNINIT0xFFFFFFFF;
1122 entry->command = 0;
1123 entry->num_auths = 0;
1124 wmem_tree_insert32(cmd_tree, pinfo->num, entry);
1125 }
1126
1127 proto_item *item = proto_tree_add_item(tree, proto_tpm20, tvb, 0, -1, ENC_NA0x00000000);
1128 proto_tree *tpm_tree = proto_item_add_subtree(item, ett_tpm);
1129
1130 if (pinfo->srcport > pinfo->destport) {
3
Assuming field 'srcport' is <= field 'destport'
4
Taking false branch
1131 col_append_sep_str(pinfo->cinfo, COL_INFO, NULL((void*)0), " [TPM Request]");
1132 if (length >= TPM_COMMAND_HEADER_LEN10)
1133 dissect_tpm20_tpm_command(tvb, pinfo, tpm_tree);
1134 else
1135 dissect_tpm20_platform_command(tvb, pinfo, tpm_tree);
1136
1137 } else {
1138 col_append_sep_str(pinfo->cinfo, COL_INFO, NULL((void*)0), " [TPM Response]");
1139 if (length >= TPM_COMMAND_HEADER_LEN10)
5
Assuming 'length' is >= TPM_COMMAND_HEADER_LEN
6
Taking true branch
1140 dissect_tpm20_tpm_response(tvb, pinfo, tpm_tree);
7
Calling 'dissect_tpm20_tpm_response'
1141 else
1142 dissect_tpm20_platform_response(tvb, pinfo, tpm_tree);
1143 }
1144 col_append_sep_fstr(pinfo->cinfo, COL_INFO, NULL((void*)0), "len(%d)", length);
1145
1146 return tvb_captured_length(tvb);
1147}
1148
1149static hf_register_info hf[] = {
1150 { &proto_tpm20_header,
1151 { "TPM2.0 Header", "tpm.req.header", FT_NONE, BASE_NONE, NULL((void*)0),
1152 0x0, "Tpm header", HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1153 { &hf_tpm20_tag,
1154 { "Tag", "tpm.req.tag", FT_UINT16, BASE_HEX, VALS(tags)((0 ? (const struct _value_string*)0 : ((tags)))),
1155 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1156 { &hf_tpm20_size,
1157 { "Command size", "tpm.req.size", FT_UINT32, BASE_DEC, NULL((void*)0),
1158 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1159 { &hf_tpm20_cc,
1160 { "Command Code", "tpm.req.cc", FT_UINT32, BASE_HEX, VALS(commands)((0 ? (const struct _value_string*)0 : ((commands)))),
1161 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1162 { &proto_tpm20_auth_area,
1163 { "Authorization Area", "tpm.req.auth", FT_NONE, BASE_NONE, NULL((void*)0),
1164 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1165 { &proto_tpm20_hndl_area,
1166 { "Handle Area", "tpm.req.hndl", FT_NONE, BASE_NONE, NULL((void*)0),
1167 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1168 { &proto_tpm20_params_area,
1169 { "Parameters Area", "tpm.resp.params", FT_NONE, BASE_NONE, NULL((void*)0),
1170 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1171 { &hf_tpm20_platform_cmd,
1172 { "Platform Command", "tpm.platform_req.cc", FT_UINT32, BASE_HEX, VALS(platform_commands)((0 ? (const struct _value_string*)0 : ((platform_commands)))
)
,
1173 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1174 { &proto_tpm20_resp_header,
1175 { "TPM2.0 Header", "tpm.resp.header", FT_NONE, BASE_NONE, NULL((void*)0),
1176 0x0, "Tpm header", HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1177 { &hf_tpm20_platform_resp_code,
1178 { "Platform Response Code", "tpm.resp.code", FT_UINT32, BASE_HEX, VALS(responses)((0 ? (const struct _value_string*)0 : ((responses)))),
1179 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1180 { &hf_tpm20_platform_resp_size,
1181 { "Platform Response size", "tpm.resp.size", FT_UINT32, BASE_HEX, NULL((void*)0),
1182 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1183 { &hf_tpm20_resp_tag,
1184 { "Response Tag", "tpm.resp.tag", FT_UINT16, BASE_HEX, VALS(tags)((0 ? (const struct _value_string*)0 : ((tags)))),
1185 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1186 { &hf_tpm20_resp_size,
1187 { "Response size", "tpm.resp.size", FT_UINT32, BASE_DEC, NULL((void*)0),
1188 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1189 { &hf_tpm20_resp_code,
1190 { "Response rc", "tpm.resp.rc", FT_UINT32, BASE_HEX, VALS(responses)((0 ? (const struct _value_string*)0 : ((responses)))),
1191 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1192 { &hf_tpm20_startup_type,
1193 { "Startup type", "tpm.startup.type", FT_UINT16, BASE_HEX, VALS(startup_types)((0 ? (const struct _value_string*)0 : ((startup_types)))),
1194 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1195 { &hf_tpmi_dh_object,
1196 { "TPMI_DH_OBJECT", "tpm.handle.TPMI_DH_OBJECT", FT_UINT32, BASE_HEX, VALS(handles)((0 ? (const struct _value_string*)0 : ((handles)))),
1197 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1198 { &hf_tpmi_dh_entity,
1199 { "TPMI_DH_ENTITY", "tpm.handle.TPMI_DH_ENTITY", FT_UINT32, BASE_HEX, VALS(handles)((0 ? (const struct _value_string*)0 : ((handles)))),
1200 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1201 { &hf_tpmi_dh_context,
1202 { "TPMI_DH_CONTEXT", "tpm.handle.TPMI_DH_CONTEXT", FT_UINT32, BASE_HEX, NULL((void*)0),
1203 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1204 { &hf_tpmi_dh_parent,
1205 { "TPMI_DH_PARENT", "tpm.handle.TPMI_DH_PARENT", FT_UINT32, BASE_HEX, VALS(hierarhies)((0 ? (const struct _value_string*)0 : ((hierarhies)))),
1206 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1207 { &hf_tpmi_dh_pcr,
1208 { "TPMI_DH_PCR", "tpm.handle.TPMI_DH_PCR", FT_UINT32, BASE_HEX, NULL((void*)0),
1209 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1210 { &hf_tpmi_sh_auth_session,
1211 { "TPMI_SH_AUTH_SESSION", "tpm.handle.TPMI_SH_AUTH_SESSION", FT_UINT32, BASE_HEX, VALS(handles)((0 ? (const struct _value_string*)0 : ((handles)))),
1212 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1213 { &hf_tpmi_rh_act,
1214 { "TPMI_RH_ACT", "tpm.handle.TPMI_RH_ACT", FT_UINT32, BASE_HEX, VALS(handles)((0 ? (const struct _value_string*)0 : ((handles)))),
1215 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1216 { &hf_tpmi_rh_hierarhy,
1217 { "TPMI_RH_HIERARCHY", "tpm.handle.TPMI_RH_HIERARCHY", FT_UINT32, BASE_HEX, VALS(hierarhies)((0 ? (const struct _value_string*)0 : ((hierarhies)))),
1218 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1219 { &hf_tpmi_rh_provision,
1220 { "TPMI_RH_PROVISION", "tpm.handle.TPMI_RH_PROVISION", FT_UINT32, BASE_HEX, VALS(handles)((0 ? (const struct _value_string*)0 : ((handles)))),
1221 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1222 { &hf_tpmi_rh_platform,
1223 { "TPMI_RH_PLATFORM", "tpm.handle.TPMI_RH_PLATFORM", FT_UINT32, BASE_HEX, VALS(handles)((0 ? (const struct _value_string*)0 : ((handles)))),
1224 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1225 { &hf_tpmi_rh_clear,
1226 { "TPMI_RH_CLEAR", "tpm.handle.TPMI_RH_CLEAR", FT_UINT32, BASE_HEX, VALS(handles)((0 ? (const struct _value_string*)0 : ((handles)))),
1227 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1228 { &hf_tpmi_rh_hierarhy_auth,
1229 { "TPMI_RH_HIERARCHY_AUTH", "tpm.handle.TPMI_RH_HIERARCHY_AUTH", FT_UINT32, BASE_HEX, VALS(handles)((0 ? (const struct _value_string*)0 : ((handles)))),
1230 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1231 { &hf_tpmi_rh_nv_auth,
1232 { "TPMI_RH_NV_AUTH", "tpm.handle.TPMI_RH_NV_AUTH", FT_UINT32, BASE_HEX, NULL((void*)0),
1233 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1234 { &hf_tpmi_rh_nv_index,
1235 { "TPMI_RH_NV_INDEX", "tpm.handle.TPMI_RH_NV_INDEX", FT_UINT32, BASE_HEX, NULL((void*)0),
1236 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1237 { &hf_tpmi_rh_lockout,
1238 { "TPMI_RH_LOCKOUT", "tpm.handle.TPMI_RH_LOCKOUT", FT_UINT32, BASE_HEX, NULL((void*)0),
1239 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1240 { &hf_tpmi_ht_handle,
1241 { "TPM_HANDLE", "tpm.handle.TPM_HANDLE", FT_UINT32, BASE_HEX, NULL((void*)0),
1242 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1243 { &hf_tpmi_rh_endorsment,
1244 { "TPMI_RH_ENDORSEMENT", "tpm.handle.TPMI_RH_ENDORSEMENT", FT_UINT32, BASE_HEX, NULL((void*)0),
1245 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1246 { &hf_auth_area_size,
1247 { "AUTHAREA SIZE", "tpm.autharea_size", FT_UINT32, BASE_DEC, NULL((void*)0),
1248 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1249 { &hf_session_nonce_size,
1250 { "AUTH NONCE SIZE", "tpm.auth_nonce_size", FT_UINT16, BASE_DEC, NULL((void*)0),
1251 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1252 { &hf_session_nonce,
1253 { "AUTH NONCE", "tpm.auth_nonce", FT_BYTES, BASE_ALLOW_ZERO0x00000800 | BASE_NONE, NULL((void*)0),
1254 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1255 { &hf_session_attribs_cont,
1256 { "SESSION_CONTINUESESSION", "tpm.auth_attribs_cont", FT_BOOLEAN, 8, TFS(&tfs_set_notset)((0 ? (const struct true_false_string*)0 : ((&tfs_set_notset
))))
,
1257 TPMA_SESSION_CONTINUESESSION0x01, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1258 { &hf_session_attribs_auditex,
1259 { "SESSION_AUDITEXCLUSIVE", "tpm.auth_attribs_auditex", FT_BOOLEAN, 8, TFS(&tfs_set_notset)((0 ? (const struct true_false_string*)0 : ((&tfs_set_notset
))))
,
1260 TPMA_SESSION_AUDITEXCLUSIVE0x02, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1261 { &hf_session_attribs_auditreset,
1262 { "SESSION_AUDITRESET", "tpm.auth_attribs_auditreset", FT_BOOLEAN, 8, TFS(&tfs_set_notset)((0 ? (const struct true_false_string*)0 : ((&tfs_set_notset
))))
,
1263 TPMA_SESSION_AUDITRESET0x04, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1264 { &hf_session_attribs_res,
1265 { "SESSION_RESERVED", "tpm.auth_attribs_res", FT_BOOLEAN, 8, TFS(&tfs_set_notset)((0 ? (const struct true_false_string*)0 : ((&tfs_set_notset
))))
,
1266 TPMA_SESSION_RESERVED1_MASK0x18, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1267 { &hf_session_attribs_decrypt,
1268 { "SESSION_DECRYPT", "tpm.auth_attribs_decrypt", FT_BOOLEAN, 8, TFS(&tfs_set_notset)((0 ? (const struct true_false_string*)0 : ((&tfs_set_notset
))))
,
1269 TPMA_SESSION_DECRYPT0x20, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1270 { &hf_session_attribs_encrypt,
1271 { "SESSION_ENCRYPT", "tpm.auth_attribs_encrypt", FT_BOOLEAN, 8, TFS(&tfs_set_notset)((0 ? (const struct true_false_string*)0 : ((&tfs_set_notset
))))
,
1272 TPMA_SESSION_ENCRYPT0x40, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1273 { &hf_session_attribs_audit,
1274 { "SESSION_AUDIT", "tpm.auth_attribs_audit", FT_BOOLEAN, 8, TFS(&tfs_set_notset)((0 ? (const struct true_false_string*)0 : ((&tfs_set_notset
))))
,
1275 TPMA_SESSION_AUDIT0x80, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1276 { &hf_session_auth_size,
1277 { "SESSION AUTH SIZE", "tpm.session_auth_size", FT_UINT16, BASE_DEC, NULL((void*)0),
1278 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1279 { &hf_session_auth,
1280 { "SESSION AUTH", "tpm.session_auth", FT_BYTES, BASE_ALLOW_ZERO0x00000800 | BASE_NONE, NULL((void*)0),
1281 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1282 { &hf_resp_param_size,
1283 { "RESP PARAM SIZE", "tpm.resp_param_size", FT_UINT32, BASE_DEC, NULL((void*)0),
1284 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1285 { &hf_encrypted_secret_size,
1286 { "ENCRYPTED SECRET SIZE", "tpm.enc_secret_size", FT_UINT32, BASE_DEC, NULL((void*)0),
1287 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1288 { &hf_encrypted_secret,
1289 { "ENCRYPTED SECRET", "tpm.enc_secret", FT_BYTES, BASE_ALLOW_ZERO0x00000800 | BASE_NONE, NULL((void*)0),
1290 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1291 { &hf_session_type,
1292 { "SESSION TYPE", "tpm.session_type", FT_UINT8, BASE_HEX, VALS(session_type)((0 ? (const struct _value_string*)0 : ((session_type)))),
1293 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1294 { &hf_alg_sym,
1295 { "SYM ALG", "tpm.sym_alg", FT_UINT16, BASE_HEX, VALS(algs)((0 ? (const struct _value_string*)0 : ((algs)))),
1296 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1297 { &hf_alg_sym_mode,
1298 { "SYM ALG MODE", "tpm.sym_alg_mode", FT_UINT16, BASE_HEX, VALS(algs)((0 ? (const struct _value_string*)0 : ((algs)))),
1299 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1300 { &hf_alg_sym_keybits,
1301 { "SYM ALG MODE", "tpm.sym_alg_keybits", FT_UINT16, BASE_DEC, NULL((void*)0),
1302 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1303 { &hf_alg_hash,
1304 { "ALG HASH", "tpm.alg_hash", FT_UINT16, BASE_HEX, VALS(algs)((0 ? (const struct _value_string*)0 : ((algs)))),
1305 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1306 { &hf_tpm_priv_size,
1307 { "TPM PRIVATE SIZE", "tpm.private_size", FT_UINT16, BASE_DEC, NULL((void*)0),
1308 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1309 { &hf_tpm_priv,
1310 { "TPM PRIVATE", "tpm.private", FT_BYTES, BASE_ALLOW_ZERO0x00000800 | BASE_NONE, NULL((void*)0),
1311 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1312 { &hf_tpm_pub_size,
1313 { "TPM PUBLIC SIZE", "tpm.public_size", FT_UINT16, BASE_DEC, NULL((void*)0),
1314 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1315 { &hf_tpm_pub,
1316 { "TPM PUBLIC", "tpm.public", FT_BYTES, BASE_ALLOW_ZERO0x00000800 | BASE_NONE, NULL((void*)0),
1317 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1318 { &hf_tpm_name_size,
1319 { "TPM NAME SIZE", "tpm.name_size", FT_UINT16, BASE_DEC, NULL((void*)0),
1320 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1321 { &hf_tpm_name,
1322 { "TPM NAME", "tpm.name", FT_BYTES, BASE_ALLOW_ZERO0x00000800 | BASE_NONE, NULL((void*)0),
1323 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1324 { &hf_tpm_sensitive_crate_size,
1325 { "TPM SENSITIVE CREATE SIZE", "tpm.sensitive_create_size", FT_UINT16, BASE_DEC, NULL((void*)0),
1326 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1327 { &hf_tpm_sensitive_crate,
1328 { "TPM SENSITIVE CREATE", "tpm.sensitive_create", FT_BYTES, BASE_ALLOW_ZERO0x00000800 | BASE_NONE, NULL((void*)0),
1329 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1330 { &hf_tpm_template_size,
1331 { "TPM TEMPLATE SIZE", "tpm.template_size", FT_UINT16, BASE_DEC, NULL((void*)0),
1332 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1333 { &hf_tpm_template,
1334 { "TPM TEMPLATE", "tpm.template", FT_BYTES, BASE_ALLOW_ZERO0x00000800 | BASE_NONE, NULL((void*)0),
1335 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1336 { &hf_tpm_data_size,
1337 { "TPM DATA SIZE", "tpm.data_size", FT_UINT16, BASE_DEC, NULL((void*)0),
1338 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1339 { &hf_tpm_data,
1340 { "TPM DATA", "tpm.data", FT_BYTES, BASE_ALLOW_ZERO0x00000800 | BASE_NONE, NULL((void*)0),
1341 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1342 { &hf_tpm_creation_data_size,
1343 { "TPM CREATION DATA SIZE", "tpm.creation_data_size", FT_UINT16, BASE_DEC, NULL((void*)0),
1344 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1345 { &hf_tpm_creation_data,
1346 { "TPM CREATION DATA", "tpm.creation_data", FT_BYTES, BASE_ALLOW_ZERO0x00000800 | BASE_NONE, NULL((void*)0),
1347 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1348 { &hf_tpm_digest_size,
1349 { "TPM DIGEST SIZE", "tpm.digest_size", FT_UINT16, BASE_DEC, NULL((void*)0),
1350 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1351 { &hf_tpm_digest,
1352 { "TPM DIGEST", "tpm.digest", FT_BYTES, BASE_ALLOW_ZERO0x00000800 | BASE_NONE, NULL((void*)0),
1353 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1354 { &hf_params,
1355 { "RESPONSE PARAMS", "tpm.PARAMS", FT_BYTES, BASE_NONE, NULL((void*)0),
1356 0x0, NULL((void*)0), HFILL-1, 0, HF_REF_TYPE_NONE, -1, ((void*)0) }},
1357};
1358
1359static int *ett[] = {
1360 &ett_tpm,
1361 &ett_tpm_header,
1362 &ett_tpm_response_header,
1363 &ett_tpm_handles,
1364 &ett_tpm_auth,
1365 &ett_tpm_params,
1366 &ett_tpm_attrib
1367};
1368
1369static ei_register_info ei[] = {
1370 { &ei_invalid_tag, { "tpm.invalid_tag", PI_PROTOCOL0x09000000, PI_ERROR0x00800000, "Invalid Header Tag", EXPFILL0, ((void*)0), 0, {0, {((void*)0), ((void*)0), FT_NONE, BASE_NONE
, ((void*)0), 0, ((void*)0), -1, 0, HF_REF_TYPE_NONE, -1, ((void
*)0)}}
}},
1371 { &ei_invalid_auth_size, { "tpm.invalid_auth_size", PI_PROTOCOL0x09000000, PI_ERROR0x00800000, "Auth area size too small", EXPFILL0, ((void*)0), 0, {0, {((void*)0), ((void*)0), FT_NONE, BASE_NONE
, ((void*)0), 0, ((void*)0), -1, 0, HF_REF_TYPE_NONE, -1, ((void
*)0)}}
}},
1372 { &ei_invalid_num_sessions, { "tpm.invalid_num_sessions", PI_PROTOCOL0x09000000, PI_ERROR0x00800000, "Maximum number of sessions exceeded", EXPFILL0, ((void*)0), 0, {0, {((void*)0), ((void*)0), FT_NONE, BASE_NONE
, ((void*)0), 0, ((void*)0), -1, 0, HF_REF_TYPE_NONE, -1, ((void
*)0)}}
}},
1373};
1374
1375static void
1376tpm_init(void)
1377{
1378 cmd_tree = wmem_tree_new(wmem_file_scope());
1379}
1380
1381void
1382proto_register_tpm20(void)
1383{
1384 proto_tpm20 = proto_register_protocol("TPM2.0 Protocol", "TPM2.0", "tpm");
1385 proto_register_field_array(proto_tpm20, hf, array_length(hf)(sizeof (hf) / sizeof (hf)[0]));
1386 proto_register_subtree_array(ett, array_length(ett)(sizeof (ett) / sizeof (ett)[0]));
1387 expert_module_t* expert_mod = expert_register_protocol(proto_tpm20);
1388 expert_register_field_array(expert_mod, ei, array_length(ei)(sizeof (ei) / sizeof (ei)[0]));
1389 register_init_routine(tpm_init);
1390 tpm20_handle = register_dissector("tpm", dissect_tpm20, proto_tpm20);
1391}
1392
1393void
1394proto_reg_handoff_tpm20(void)
1395{
1396 dissector_add_uint_range_with_preference("tcp.port", TCP_TPM_PORTS"2321-2322", tpm20_handle);
1397}
1398
1399/*
1400 * Editor modelines - https://www.wireshark.org/tools/modelines.html
1401 *
1402 * Local variables:
1403 * c-basic-offset: 8
1404 * tab-width: 8
1405 * indent-tabs-mode: t
1406 * End:
1407 *
1408 * vi: set shiftwidth=8 tabstop=8 noexpandtab:
1409 * :indentSize=8:tabSize=8:noTabs=false:
1410 */