mirror of https://github.com/acidanthera/audk.git
204 lines
7.1 KiB
C
204 lines
7.1 KiB
C
|
/** @file
|
||
|
Implement TPM2 DictionaryAttack related command.
|
||
|
|
||
|
Copyright (c) 2013, Intel Corporation. All rights reserved. <BR>
|
||
|
This program and the accompanying materials
|
||
|
are licensed and made available under the terms and conditions of the BSD License
|
||
|
which accompanies this distribution. The full text of the license may be found at
|
||
|
http://opensource.org/licenses/bsd-license.php
|
||
|
|
||
|
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||
|
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||
|
|
||
|
**/
|
||
|
|
||
|
#include <IndustryStandard/UefiTcgPlatform.h>
|
||
|
#include <Library/Tpm2CommandLib.h>
|
||
|
#include <Library/Tpm2DeviceLib.h>
|
||
|
#include <Library/BaseMemoryLib.h>
|
||
|
#include <Library/BaseLib.h>
|
||
|
#include <Library/DebugLib.h>
|
||
|
|
||
|
#pragma pack(1)
|
||
|
|
||
|
typedef struct {
|
||
|
TPM2_COMMAND_HEADER Header;
|
||
|
TPMI_RH_LOCKOUT LockHandle;
|
||
|
UINT32 AuthSessionSize;
|
||
|
TPMS_AUTH_COMMAND AuthSession;
|
||
|
} TPM2_DICTIONARY_ATTACK_LOCK_RESET_COMMAND;
|
||
|
|
||
|
typedef struct {
|
||
|
TPM2_RESPONSE_HEADER Header;
|
||
|
UINT32 AuthSessionSize;
|
||
|
TPMS_AUTH_RESPONSE AuthSession;
|
||
|
} TPM2_DICTIONARY_ATTACK_LOCK_RESET_RESPONSE;
|
||
|
|
||
|
typedef struct {
|
||
|
TPM2_COMMAND_HEADER Header;
|
||
|
TPMI_RH_LOCKOUT LockHandle;
|
||
|
UINT32 AuthSessionSize;
|
||
|
TPMS_AUTH_COMMAND AuthSession;
|
||
|
UINT32 NewMaxTries;
|
||
|
UINT32 NewRecoveryTime;
|
||
|
UINT32 LockoutRecovery;
|
||
|
} TPM2_DICTIONARY_ATTACK_PARAMETERS_COMMAND;
|
||
|
|
||
|
typedef struct {
|
||
|
TPM2_RESPONSE_HEADER Header;
|
||
|
UINT32 AuthSessionSize;
|
||
|
TPMS_AUTH_RESPONSE AuthSession;
|
||
|
} TPM2_DICTIONARY_ATTACK_PARAMETERS_RESPONSE;
|
||
|
|
||
|
#pragma pack()
|
||
|
|
||
|
/**
|
||
|
This command cancels the effect of a TPM lockout due to a number of successive authorization failures.
|
||
|
If this command is properly authorized, the lockout counter is set to zero.
|
||
|
|
||
|
@param[in] LockHandle TPM_RH_LOCKOUT
|
||
|
@param[in] AuthSession Auth Session context
|
||
|
|
||
|
@retval EFI_SUCCESS Operation completed successfully.
|
||
|
@retval EFI_DEVICE_ERROR Unexpected device behavior.
|
||
|
**/
|
||
|
EFI_STATUS
|
||
|
EFIAPI
|
||
|
Tpm2DictionaryAttackLockReset (
|
||
|
IN TPMI_RH_LOCKOUT LockHandle,
|
||
|
IN TPMS_AUTH_COMMAND *AuthSession
|
||
|
)
|
||
|
{
|
||
|
EFI_STATUS Status;
|
||
|
TPM2_DICTIONARY_ATTACK_LOCK_RESET_COMMAND SendBuffer;
|
||
|
TPM2_DICTIONARY_ATTACK_LOCK_RESET_RESPONSE RecvBuffer;
|
||
|
UINT32 SendBufferSize;
|
||
|
UINT32 RecvBufferSize;
|
||
|
UINT8 *Buffer;
|
||
|
UINT32 SessionInfoSize;
|
||
|
|
||
|
//
|
||
|
// Construct command
|
||
|
//
|
||
|
SendBuffer.Header.tag = SwapBytes16(TPM_ST_SESSIONS);
|
||
|
SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_DictionaryAttackLockReset);
|
||
|
|
||
|
SendBuffer.LockHandle = SwapBytes32 (LockHandle);
|
||
|
|
||
|
//
|
||
|
// Add in Auth session
|
||
|
//
|
||
|
Buffer = (UINT8 *)&SendBuffer.AuthSession;
|
||
|
|
||
|
// sessionInfoSize
|
||
|
SessionInfoSize = CopyAuthSessionCommand (AuthSession, Buffer);
|
||
|
Buffer += SessionInfoSize;
|
||
|
SendBuffer.AuthSessionSize = SwapBytes32(SessionInfoSize);
|
||
|
|
||
|
SendBufferSize = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);
|
||
|
SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);
|
||
|
|
||
|
//
|
||
|
// send Tpm command
|
||
|
//
|
||
|
RecvBufferSize = sizeof (RecvBuffer);
|
||
|
Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);
|
||
|
if (EFI_ERROR (Status)) {
|
||
|
return Status;
|
||
|
}
|
||
|
|
||
|
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {
|
||
|
DEBUG ((EFI_D_ERROR, "Tpm2DictionaryAttackLockReset - RecvBufferSize Error - %x\n", RecvBufferSize));
|
||
|
return EFI_DEVICE_ERROR;
|
||
|
}
|
||
|
if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {
|
||
|
DEBUG ((EFI_D_ERROR, "Tpm2DictionaryAttackLockReset - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));
|
||
|
return EFI_DEVICE_ERROR;
|
||
|
}
|
||
|
|
||
|
return EFI_SUCCESS;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
This command cancels the effect of a TPM lockout due to a number of successive authorization failures.
|
||
|
If this command is properly authorized, the lockout counter is set to zero.
|
||
|
|
||
|
@param[in] LockHandle TPM_RH_LOCKOUT
|
||
|
@param[in] AuthSession Auth Session context
|
||
|
@param[in] NewMaxTries Count of authorization failures before the lockout is imposed
|
||
|
@param[in] NewRecoveryTime Time in seconds before the authorization failure count is automatically decremented
|
||
|
@param[in] LockoutRecovery Time in seconds after a lockoutAuth failure before use of lockoutAuth is allowed
|
||
|
|
||
|
@retval EFI_SUCCESS Operation completed successfully.
|
||
|
@retval EFI_DEVICE_ERROR Unexpected device behavior.
|
||
|
**/
|
||
|
EFI_STATUS
|
||
|
EFIAPI
|
||
|
Tpm2DictionaryAttackParameters (
|
||
|
IN TPMI_RH_LOCKOUT LockHandle,
|
||
|
IN TPMS_AUTH_COMMAND *AuthSession,
|
||
|
IN UINT32 NewMaxTries,
|
||
|
IN UINT32 NewRecoveryTime,
|
||
|
IN UINT32 LockoutRecovery
|
||
|
)
|
||
|
{
|
||
|
EFI_STATUS Status;
|
||
|
TPM2_DICTIONARY_ATTACK_PARAMETERS_COMMAND SendBuffer;
|
||
|
TPM2_DICTIONARY_ATTACK_PARAMETERS_RESPONSE RecvBuffer;
|
||
|
UINT32 SendBufferSize;
|
||
|
UINT32 RecvBufferSize;
|
||
|
UINT8 *Buffer;
|
||
|
UINT32 SessionInfoSize;
|
||
|
|
||
|
//
|
||
|
// Construct command
|
||
|
//
|
||
|
SendBuffer.Header.tag = SwapBytes16(TPM_ST_SESSIONS);
|
||
|
SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_DictionaryAttackParameters);
|
||
|
|
||
|
SendBuffer.LockHandle = SwapBytes32 (LockHandle);
|
||
|
|
||
|
//
|
||
|
// Add in Auth session
|
||
|
//
|
||
|
Buffer = (UINT8 *)&SendBuffer.AuthSession;
|
||
|
|
||
|
// sessionInfoSize
|
||
|
SessionInfoSize = CopyAuthSessionCommand (AuthSession, Buffer);
|
||
|
Buffer += SessionInfoSize;
|
||
|
SendBuffer.AuthSessionSize = SwapBytes32(SessionInfoSize);
|
||
|
|
||
|
//
|
||
|
// Real data
|
||
|
//
|
||
|
WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32(NewMaxTries));
|
||
|
Buffer += sizeof(UINT32);
|
||
|
WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32(NewRecoveryTime));
|
||
|
Buffer += sizeof(UINT32);
|
||
|
WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32(LockoutRecovery));
|
||
|
Buffer += sizeof(UINT32);
|
||
|
|
||
|
SendBufferSize = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);
|
||
|
SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);
|
||
|
|
||
|
//
|
||
|
// send Tpm command
|
||
|
//
|
||
|
RecvBufferSize = sizeof (RecvBuffer);
|
||
|
Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);
|
||
|
if (EFI_ERROR (Status)) {
|
||
|
return Status;
|
||
|
}
|
||
|
|
||
|
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {
|
||
|
DEBUG ((EFI_D_ERROR, "Tpm2DictionaryAttackParameters - RecvBufferSize Error - %x\n", RecvBufferSize));
|
||
|
return EFI_DEVICE_ERROR;
|
||
|
}
|
||
|
if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {
|
||
|
DEBUG ((EFI_D_ERROR, "Tpm2DictionaryAttackParameters - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));
|
||
|
return EFI_DEVICE_ERROR;
|
||
|
}
|
||
|
|
||
|
return EFI_SUCCESS;
|
||
|
}
|