Revision: 16713
          http://sourceforge.net/p/edk2/code/16713
Author:   vanjeff
Date:     2015-02-03 08:37:37 +0000 (Tue, 03 Feb 2015)
Log Message:
-----------
Add TPM2 commands which might be used in provision.

(Sync patch r16548 from main trunk.)

Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: "Yao, Jiewen" <jiewen....@intel.com>
Reviewed-by: "Dong, Guo" <guo.d...@intel.com>
Reviewed-by: "Long, Qin" <qin.l...@intel.com>

Revision Links:
--------------
    http://sourceforge.net/p/edk2/code/16548

Modified Paths:
--------------
    branches/UDK2014.SP1/SecurityPkg/Include/Library/Tpm2CommandLib.h
    
branches/UDK2014.SP1/SecurityPkg/Library/Tpm2CommandLib/Tpm2EnhancedAuthorization.c

Modified: branches/UDK2014.SP1/SecurityPkg/Include/Library/Tpm2CommandLib.h
===================================================================
--- branches/UDK2014.SP1/SecurityPkg/Include/Library/Tpm2CommandLib.h   
2015-02-03 08:36:32 UTC (rev 16712)
+++ branches/UDK2014.SP1/SecurityPkg/Include/Library/Tpm2CommandLib.h   
2015-02-03 08:37:37 UTC (rev 16713)
@@ -873,6 +873,25 @@
   );
 
 /**
+  This command allows options in authorizations without requiring that the TPM 
evaluate all of the options.
+  If a policy may be satisfied by different sets of conditions, the TPM need 
only evaluate one set that
+  satisfies the policy. This command will indicate that one of the required 
sets of conditions has been
+  satisfied.
+
+  @param[in] PolicySession      Handle for the policy session being extended.
+  @param[in] HashList           the list of hashes to check for a match.
+  
+  @retval EFI_SUCCESS            Operation completed successfully.
+  @retval EFI_DEVICE_ERROR       The command was unsuccessful.
+**/
+EFI_STATUS
+EFIAPI
+Tpm2PolicyOR (
+  IN TPMI_SH_POLICY           PolicySession,
+  IN TPML_DIGEST              *HashList
+  );
+
+/**
   This command indicates that the authorization will be limited to a specific 
command code.
 
   @param[in]  PolicySession      Handle for the policy session being extended.

Modified: 
branches/UDK2014.SP1/SecurityPkg/Library/Tpm2CommandLib/Tpm2EnhancedAuthorization.c
===================================================================
--- 
branches/UDK2014.SP1/SecurityPkg/Library/Tpm2CommandLib/Tpm2EnhancedAuthorization.c
 2015-02-03 08:36:32 UTC (rev 16712)
+++ 
branches/UDK2014.SP1/SecurityPkg/Library/Tpm2CommandLib/Tpm2EnhancedAuthorization.c
 2015-02-03 08:37:37 UTC (rev 16713)
@@ -44,6 +44,16 @@
 typedef struct {
   TPM2_COMMAND_HEADER       Header;
   TPMI_SH_POLICY            PolicySession;
+  TPML_DIGEST               HashList;
+} TPM2_POLICY_OR_COMMAND;
+
+typedef struct {
+  TPM2_RESPONSE_HEADER      Header;
+} TPM2_POLICY_OR_RESPONSE;
+
+typedef struct {
+  TPM2_COMMAND_HEADER       Header;
+  TPMI_SH_POLICY            PolicySession;
   TPM_CC                    Code;
 } TPM2_POLICY_COMMAND_CODE_COMMAND;
 
@@ -183,6 +193,74 @@
 }
 
 /**
+  This command allows options in authorizations without requiring that the TPM 
evaluate all of the options.
+  If a policy may be satisfied by different sets of conditions, the TPM need 
only evaluate one set that
+  satisfies the policy. This command will indicate that one of the required 
sets of conditions has been
+  satisfied.
+
+  @param[in] PolicySession      Handle for the policy session being extended.
+  @param[in] HashList           the list of hashes to check for a match.
+  
+  @retval EFI_SUCCESS            Operation completed successfully.
+  @retval EFI_DEVICE_ERROR       The command was unsuccessful.
+**/
+EFI_STATUS
+EFIAPI
+Tpm2PolicyOR (
+  IN TPMI_SH_POLICY           PolicySession,
+  IN TPML_DIGEST              *HashList
+  )
+{
+  EFI_STATUS                        Status;
+  TPM2_POLICY_OR_COMMAND            SendBuffer;
+  TPM2_POLICY_OR_RESPONSE           RecvBuffer;
+  UINT32                            SendBufferSize;
+  UINT32                            RecvBufferSize;
+  UINT8                             *Buffer;
+  UINTN                             Index;
+
+  //
+  // Construct command
+  //
+  SendBuffer.Header.tag = SwapBytes16(TPM_ST_NO_SESSIONS);
+  SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_PolicyOR);
+
+  SendBuffer.PolicySession = SwapBytes32 (PolicySession);
+  Buffer = (UINT8 *)&SendBuffer.HashList;
+  WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32 (HashList->count));
+  Buffer += sizeof(UINT32);
+  for (Index = 0; Index < HashList->count; Index++) {
+    WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 
(HashList->digests[Index].size));
+    Buffer += sizeof(UINT16);
+    CopyMem (Buffer, HashList->digests[Index].buffer, 
HashList->digests[Index].size);
+    Buffer += HashList->digests[Index].size;
+  }
+
+  SendBufferSize = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);
+  SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);
+
+  //
+  // send Tpm command
+  //
+  RecvBufferSize = sizeof (RecvBuffer);
+  Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, 
&RecvBufferSize, (UINT8 *)&RecvBuffer);
+  if (EFI_ERROR (Status)) {
+    return Status;
+  }
+
+  if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {
+    DEBUG ((EFI_D_ERROR, "Tpm2PolicyOR - RecvBufferSize Error - %x\n", 
RecvBufferSize));
+    return EFI_DEVICE_ERROR;
+  }
+  if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {
+    DEBUG ((EFI_D_ERROR, "Tpm2PolicyOR - responseCode - %x\n", 
SwapBytes32(RecvBuffer.Header.responseCode)));
+    return EFI_DEVICE_ERROR;
+  }
+
+  return EFI_SUCCESS;
+}
+
+/**
   This command indicates that the authorization will be limited to a specific 
command code.
 
   @param[in]  PolicySession      Handle for the policy session being extended.


------------------------------------------------------------------------------
Dive into the World of Parallel Programming. The Go Parallel Website,
sponsored by Intel and developed in partnership with Slashdot Media, is your
hub for all things parallel software development, from weekly thought
leadership blogs to news, videos, case studies, tutorials and more. Take a
look and join the conversation now. http://goparallel.sourceforge.net/
_______________________________________________
edk2-commits mailing list
edk2-commits@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/edk2-commits

Reply via email to