> Like TPM 1.2, the current device driver for TPM 2.0 supports extending only to
> the SHA1 PCR bank. But the TPM 2.0 supports multiple PCR banks and the
> specification recommends extending to all active PCR banks, this patch
> enhances the existing device driver support for TPM 2.0 extend function and
> its in-kernel interface to extend to all active PCR banks.
> 
> The existing in-kernel interface expects only a SHA1 digest.
> Hence, to extend all active PCR banks with differing digest sizes for TPM 2.0,
> the SHA1 digest is padded with trailing 0's as needed.
> 
> Signed-off-by: Nayna Jain <na...@linux.vnet.ibm.com>
> ---
>  drivers/char/tpm/tpm-interface.c | 17 ++++++++--
>  drivers/char/tpm/tpm2-cmd.c      | 71 ++++++++++++++++++++++++++------------
> --
>  drivers/char/tpm/tpm2.h          | 18 ++++++++++
>  3 files changed, 79 insertions(+), 27 deletions(-)
> 
> diff --git a/drivers/char/tpm/tpm-interface.c b/drivers/char/tpm/tpm-
> interface.c
> index 7743e8a..5dd5005 100644
> --- a/drivers/char/tpm/tpm-interface.c
> +++ b/drivers/char/tpm/tpm-interface.c
> @@ -7,6 +7,7 @@
>   * Dave Safford <saff...@watson.ibm.com>
>   * Reiner Sailer <sai...@watson.ibm.com>
>   * Kylene Hall <kjh...@us.ibm.com>
> + * Nayna Jain <na...@linux.vnet.ibm.com>
>   *
>   * Maintained by: <tpmdd-devel@lists.sourceforge.net>
>   *
> @@ -32,6 +33,7 @@
>  #include <linux/pm_runtime.h>
> 
>  #include "tpm.h"
> +#include "tpm2.h"
>  #include "tpm_eventlog.h"
> 
>  #define TPM_MAX_ORDINAL 243
> @@ -752,7 +754,7 @@ static const struct tpm_input_header
> pcrextend_header = {  int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8
> *hash)  {
>       struct tpm_cmd_t cmd;
> -     int rc;
> +     int i, rc;
>       struct tpm_chip *chip;
> 
>       chip = tpm_chip_find_get(chip_num);
> @@ -760,7 +762,18 @@ int tpm_pcr_extend(u32 chip_num, int pcr_idx, const
> u8 *hash)
>               return -ENODEV;
> 
>       if (chip->flags & TPM_CHIP_FLAG_TPM2) {
> -             rc = tpm2_pcr_extend(chip, pcr_idx, hash);
> +             struct tpml_digest_values d_values;
> +
> +             memset(&d_values, 0, sizeof(d_values));
> +
> +             for (i = 0; i < chip->no_of_active_banks; i++) {
> +                     d_values.digests[i].alg_id =
> +                             chip->active_banks[i];
> +                     memcpy(d_values.digests[i].digest, hash,
> +                            TPM_DIGEST_SIZE);
> +                     d_values.count++;
> +             }

This is tpm2 only feature so  I suggest to create a function inside tpm2-chip.c 
instead of  open coding  it here.
This will probably also prevent all this code movement. 


> +             rc = tpm2_pcr_extend(chip, pcr_idx, &d_values);
>               tpm_put_ops(chip);
>               return rc;
>       }
> diff --git a/drivers/char/tpm/tpm2-cmd.c b/drivers/char/tpm/tpm2-cmd.c
> index c597cf3c..8ba2992 100644
> --- a/drivers/char/tpm/tpm2-cmd.c
> +++ b/drivers/char/tpm/tpm2-cmd.c
> @@ -16,6 +16,7 @@
>   */
> 
>  #include "tpm.h"
> +#include "tpm2.h"
>  #include <crypto/hash_info.h>
>  #include <keys/trusted-type.h>
> 
> @@ -53,22 +54,6 @@ struct tpm2_pcr_read_out {
>       u8      digest[TPM_DIGEST_SIZE];
>  } __packed;
> 
> -struct tpm2_null_auth_area {
> -     __be32                  handle;
> -     __be16                  nonce_size;
> -     u8                      attributes;
> -     __be16                  auth_size;
> -} __packed;
> -
> -struct tpm2_pcr_extend_in {
> -     __be32                          pcr_idx;
> -     __be32                          auth_area_size;
> -     struct tpm2_null_auth_area      auth_area;
> -     __be32                          digest_cnt;
> -     __be16                          hash_alg;
> -     u8                              digest[TPM_DIGEST_SIZE];
> -} __packed;
> -
>  struct tpm2_get_tpm_pt_in {
>       __be32  cap_id;
>       __be32  property_id;
> @@ -300,38 +285,74 @@ int tpm2_pcr_read(struct tpm_chip *chip, int
> pcr_idx, u8 *res_buf)
> 
>  static const struct tpm_input_header tpm2_pcrextend_header = {
>       .tag = cpu_to_be16(TPM2_ST_SESSIONS),
> -     .length = cpu_to_be32(TPM2_GET_PCREXTEND_IN_SIZE),
>       .ordinal = cpu_to_be32(TPM2_CC_PCR_EXTEND)  };
> 
>  /**
>   * tpm2_pcr_extend() - extend a PCR value
> - * @chip:    TPM chip to use.
> - * @pcr_idx: index of the PCR.
> - * @hash:    hash value to use for the extend operation.
> + * @chip:            TPM chip to use.
> + * @pcr_idx:         index of the PCR.
> + * @digest_values:   list of hash values to be extended.
>   *
>   * 0 is returned when the operation is successful. If a negative number is
>   * returned it remarks a POSIX error code. If a positive number is returned
>   * it remarks a TPM error.
>   */
> -int tpm2_pcr_extend(struct tpm_chip *chip, int pcr_idx, const u8 *hash)
> +int tpm2_pcr_extend(struct tpm_chip *chip, int pcr_idx,
> +                 struct tpml_digest_values *digest_list)
>  {
>       struct tpm2_cmd cmd;
> -     int rc;
> +     int i, j, rc;
> +     void *marker;
> +     size_t size;
> +     u32 halg_size;
> +     u16 halg;
> 
>       cmd.header.in = tpm2_pcrextend_header;
> +     size = sizeof(struct tpm_input_header);
> +
>       cmd.params.pcrextend_in.pcr_idx = cpu_to_be32(pcr_idx);
> +     size = size + sizeof(cmd.params.pcrextend_in.pcr_idx);
> +
>       cmd.params.pcrextend_in.auth_area_size =
>               cpu_to_be32(sizeof(struct tpm2_null_auth_area));
> +     size = size + sizeof(cmd.params.pcrextend_in.auth_area_size);
> +
>       cmd.params.pcrextend_in.auth_area.handle =
>               cpu_to_be32(TPM2_RS_PW);
>       cmd.params.pcrextend_in.auth_area.nonce_size = 0;
>       cmd.params.pcrextend_in.auth_area.attributes = 0;
>       cmd.params.pcrextend_in.auth_area.auth_size = 0;
> -     cmd.params.pcrextend_in.digest_cnt = cpu_to_be32(1);
> -     cmd.params.pcrextend_in.hash_alg = cpu_to_be16(TPM2_ALG_SHA1);
> -     memcpy(cmd.params.pcrextend_in.digest, hash, TPM_DIGEST_SIZE);
> +     size = size + sizeof(cmd.params.pcrextend_in.auth_area);
> +
> +     cmd.params.pcrextend_in.digests.count =
> +             cpu_to_be32(digest_list->count);
> +     size = size + sizeof(cmd.params.pcrextend_in.digests.count);
> +     marker = &cmd.params.pcrextend_in.digests.digests[0];
> +
> +     for (i = 0; i < digest_list->count; i++) {
> +             for (j = 0; j < ARRAY_SIZE(tpm2_hash_map); j++) {
> +
> +                     if (digest_list->digests[i].alg_id !=
> +                         tpm2_hash_map[j].tpm_id)
> +                             continue;
> +
> +                     halg_size = sizeof(digest_list->digests[i].alg_id);
> +                     halg = cpu_to_be16(digest_list->digests[i].alg_id);
> +                     memcpy(marker, &halg, halg_size);
> +                     marker = marker + halg_size;
> +                     size = size + halg_size;
> +
> +                     memcpy(marker, &digest_list->digests[i].digest,
> +                            hash_digest_size[tpm2_hash_map[j].crypto_id]);
> +                     marker = marker +
> +
>       hash_digest_size[tpm2_hash_map[j].crypto_id];
> +                     size = size +
> +
>       hash_digest_size[tpm2_hash_map[j].crypto_id];
> +             }
> +     }
> 
> +     cmd.header.in.length = cpu_to_be32(size);
>       rc = tpm_transmit_cmd(chip, &cmd, sizeof(cmd), 0,
>                             "attempting extend a PCR value");
> 
> diff --git a/drivers/char/tpm/tpm2.h b/drivers/char/tpm/tpm2.h index
> 919fb05..0b1a107 100644
> --- a/drivers/char/tpm/tpm2.h
> +++ b/drivers/char/tpm/tpm2.h
> @@ -74,6 +74,22 @@ struct tcg_pcr_event2 {
>       struct tcg_event_field          event;
>  } __packed;
> 
> +/* Auth Area Structure. */
> +struct tpm2_null_auth_area {
> +     __be32          handle;
> +     __be16          nonce_size;
> +     u8              attributes;
> +     __be16          auth_size;
> +} __packed;
> +
> +/* Crypto agile extend format. */
> +struct tpm2_pcr_extend_in {
> +     __be32                          pcr_idx;
> +     __be32                          auth_area_size;
> +     struct tpm2_null_auth_area      auth_area;
> +     struct tpml_digest_values       digests;
> +} __packed;
> +
>  struct tpm2_get_cap_in {
>       __be32 cap_id;
>       __be32 property_id;
> @@ -108,6 +124,8 @@ struct tpm2_get_cap_out {  extern const struct
> seq_operations tpm2_binary_b_measurments_seqops;
> 
>  extern int tpm2_get_active_pcr_banks(struct tpm_chip *chip);
> +extern int tpm2_pcr_extend(struct tpm_chip *chip, int pcr_idx,
> +                        struct tpml_digest_values *digest_values);
>  extern int tpm2_get_capability(struct tpm_chip *chip, struct
> tpm2_get_cap_in
>       *cap_in, struct tpm2_get_cap_out *cap_out);
> 
> --
> 2.5.0
> 
> 
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, SlashDot.org! http://sdm.link/slashdot
> _______________________________________________
> tpmdd-devel mailing list
> tpmdd-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/tpmdd-devel

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most 
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
tpmdd-devel mailing list
tpmdd-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/tpmdd-devel

Reply via email to