Revision: 16713 http://sourceforge.net/p/edk2/code/16713 Author: vanjeff Date: 2015-02-03 08:37:37 +0000 (Tue, 03 Feb 2015) Log Message: ----------- Add TPM2 commands which might be used in provision.
(Sync patch r16548 from main trunk.) Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: "Yao, Jiewen" <jiewen....@intel.com> Reviewed-by: "Dong, Guo" <guo.d...@intel.com> Reviewed-by: "Long, Qin" <qin.l...@intel.com> Revision Links: -------------- http://sourceforge.net/p/edk2/code/16548 Modified Paths: -------------- branches/UDK2014.SP1/SecurityPkg/Include/Library/Tpm2CommandLib.h branches/UDK2014.SP1/SecurityPkg/Library/Tpm2CommandLib/Tpm2EnhancedAuthorization.c Modified: branches/UDK2014.SP1/SecurityPkg/Include/Library/Tpm2CommandLib.h =================================================================== --- branches/UDK2014.SP1/SecurityPkg/Include/Library/Tpm2CommandLib.h 2015-02-03 08:36:32 UTC (rev 16712) +++ branches/UDK2014.SP1/SecurityPkg/Include/Library/Tpm2CommandLib.h 2015-02-03 08:37:37 UTC (rev 16713) @@ -873,6 +873,25 @@ ); /** + This command allows options in authorizations without requiring that the TPM evaluate all of the options. + If a policy may be satisfied by different sets of conditions, the TPM need only evaluate one set that + satisfies the policy. This command will indicate that one of the required sets of conditions has been + satisfied. + + @param[in] PolicySession Handle for the policy session being extended. + @param[in] HashList the list of hashes to check for a match. + + @retval EFI_SUCCESS Operation completed successfully. + @retval EFI_DEVICE_ERROR The command was unsuccessful. +**/ +EFI_STATUS +EFIAPI +Tpm2PolicyOR ( + IN TPMI_SH_POLICY PolicySession, + IN TPML_DIGEST *HashList + ); + +/** This command indicates that the authorization will be limited to a specific command code. @param[in] PolicySession Handle for the policy session being extended. Modified: branches/UDK2014.SP1/SecurityPkg/Library/Tpm2CommandLib/Tpm2EnhancedAuthorization.c =================================================================== --- branches/UDK2014.SP1/SecurityPkg/Library/Tpm2CommandLib/Tpm2EnhancedAuthorization.c 2015-02-03 08:36:32 UTC (rev 16712) +++ branches/UDK2014.SP1/SecurityPkg/Library/Tpm2CommandLib/Tpm2EnhancedAuthorization.c 2015-02-03 08:37:37 UTC (rev 16713) @@ -44,6 +44,16 @@ typedef struct { TPM2_COMMAND_HEADER Header; TPMI_SH_POLICY PolicySession; + TPML_DIGEST HashList; +} TPM2_POLICY_OR_COMMAND; + +typedef struct { + TPM2_RESPONSE_HEADER Header; +} TPM2_POLICY_OR_RESPONSE; + +typedef struct { + TPM2_COMMAND_HEADER Header; + TPMI_SH_POLICY PolicySession; TPM_CC Code; } TPM2_POLICY_COMMAND_CODE_COMMAND; @@ -183,6 +193,74 @@ } /** + This command allows options in authorizations without requiring that the TPM evaluate all of the options. + If a policy may be satisfied by different sets of conditions, the TPM need only evaluate one set that + satisfies the policy. This command will indicate that one of the required sets of conditions has been + satisfied. + + @param[in] PolicySession Handle for the policy session being extended. + @param[in] HashList the list of hashes to check for a match. + + @retval EFI_SUCCESS Operation completed successfully. + @retval EFI_DEVICE_ERROR The command was unsuccessful. +**/ +EFI_STATUS +EFIAPI +Tpm2PolicyOR ( + IN TPMI_SH_POLICY PolicySession, + IN TPML_DIGEST *HashList + ) +{ + EFI_STATUS Status; + TPM2_POLICY_OR_COMMAND SendBuffer; + TPM2_POLICY_OR_RESPONSE RecvBuffer; + UINT32 SendBufferSize; + UINT32 RecvBufferSize; + UINT8 *Buffer; + UINTN Index; + + // + // Construct command + // + SendBuffer.Header.tag = SwapBytes16(TPM_ST_NO_SESSIONS); + SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_PolicyOR); + + SendBuffer.PolicySession = SwapBytes32 (PolicySession); + Buffer = (UINT8 *)&SendBuffer.HashList; + WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32 (HashList->count)); + Buffer += sizeof(UINT32); + for (Index = 0; Index < HashList->count; Index++) { + WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (HashList->digests[Index].size)); + Buffer += sizeof(UINT16); + CopyMem (Buffer, HashList->digests[Index].buffer, HashList->digests[Index].size); + Buffer += HashList->digests[Index].size; + } + + SendBufferSize = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer); + SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize); + + // + // send Tpm command + // + RecvBufferSize = sizeof (RecvBuffer); + Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer); + if (EFI_ERROR (Status)) { + return Status; + } + + if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) { + DEBUG ((EFI_D_ERROR, "Tpm2PolicyOR - RecvBufferSize Error - %x\n", RecvBufferSize)); + return EFI_DEVICE_ERROR; + } + if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) { + DEBUG ((EFI_D_ERROR, "Tpm2PolicyOR - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode))); + return EFI_DEVICE_ERROR; + } + + return EFI_SUCCESS; +} + +/** This command indicates that the authorization will be limited to a specific command code. @param[in] PolicySession Handle for the policy session being extended. ------------------------------------------------------------------------------ Dive into the World of Parallel Programming. The Go Parallel Website, sponsored by Intel and developed in partnership with Slashdot Media, is your hub for all things parallel software development, from weekly thought leadership blogs to news, videos, case studies, tutorials and more. Take a look and join the conversation now. http://goparallel.sourceforge.net/ _______________________________________________ edk2-commits mailing list edk2-commits@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/edk2-commits