mirror of https://github.com/acidanthera/audk.git
Add TPM2 commands which might be used in provision.
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: "Yao, Jiewen" <jiewen.yao@intel.com> Reviewed-by: "Dong, Guo" <guo.dong@intel.com> Reviewed-by: "Long, Qin" <qin.long@intel.com> git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@16548 6f19259b-4bc3-4df7-8a09-765794883524
This commit is contained in:
parent
9da91aea69
commit
a50e58f48b
|
@ -872,6 +872,25 @@ Tpm2PolicySecret (
|
|||
OUT TPMT_TK_AUTH *PolicyTicket
|
||||
);
|
||||
|
||||
/**
|
||||
This command allows options in authorizations without requiring that the TPM evaluate all of the options.
|
||||
If a policy may be satisfied by different sets of conditions, the TPM need only evaluate one set that
|
||||
satisfies the policy. This command will indicate that one of the required sets of conditions has been
|
||||
satisfied.
|
||||
|
||||
@param[in] PolicySession Handle for the policy session being extended.
|
||||
@param[in] HashList the list of hashes to check for a match.
|
||||
|
||||
@retval EFI_SUCCESS Operation completed successfully.
|
||||
@retval EFI_DEVICE_ERROR The command was unsuccessful.
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
Tpm2PolicyOR (
|
||||
IN TPMI_SH_POLICY PolicySession,
|
||||
IN TPML_DIGEST *HashList
|
||||
);
|
||||
|
||||
/**
|
||||
This command indicates that the authorization will be limited to a specific command code.
|
||||
|
||||
|
|
|
@ -41,6 +41,16 @@ typedef struct {
|
|||
TPMS_AUTH_RESPONSE AuthSession;
|
||||
} TPM2_POLICY_SECRET_RESPONSE;
|
||||
|
||||
typedef struct {
|
||||
TPM2_COMMAND_HEADER Header;
|
||||
TPMI_SH_POLICY PolicySession;
|
||||
TPML_DIGEST HashList;
|
||||
} TPM2_POLICY_OR_COMMAND;
|
||||
|
||||
typedef struct {
|
||||
TPM2_RESPONSE_HEADER Header;
|
||||
} TPM2_POLICY_OR_RESPONSE;
|
||||
|
||||
typedef struct {
|
||||
TPM2_COMMAND_HEADER Header;
|
||||
TPMI_SH_POLICY PolicySession;
|
||||
|
@ -182,6 +192,74 @@ Tpm2PolicySecret (
|
|||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
/**
|
||||
This command allows options in authorizations without requiring that the TPM evaluate all of the options.
|
||||
If a policy may be satisfied by different sets of conditions, the TPM need only evaluate one set that
|
||||
satisfies the policy. This command will indicate that one of the required sets of conditions has been
|
||||
satisfied.
|
||||
|
||||
@param[in] PolicySession Handle for the policy session being extended.
|
||||
@param[in] HashList the list of hashes to check for a match.
|
||||
|
||||
@retval EFI_SUCCESS Operation completed successfully.
|
||||
@retval EFI_DEVICE_ERROR The command was unsuccessful.
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
Tpm2PolicyOR (
|
||||
IN TPMI_SH_POLICY PolicySession,
|
||||
IN TPML_DIGEST *HashList
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
TPM2_POLICY_OR_COMMAND SendBuffer;
|
||||
TPM2_POLICY_OR_RESPONSE RecvBuffer;
|
||||
UINT32 SendBufferSize;
|
||||
UINT32 RecvBufferSize;
|
||||
UINT8 *Buffer;
|
||||
UINTN Index;
|
||||
|
||||
//
|
||||
// Construct command
|
||||
//
|
||||
SendBuffer.Header.tag = SwapBytes16(TPM_ST_NO_SESSIONS);
|
||||
SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_PolicyOR);
|
||||
|
||||
SendBuffer.PolicySession = SwapBytes32 (PolicySession);
|
||||
Buffer = (UINT8 *)&SendBuffer.HashList;
|
||||
WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32 (HashList->count));
|
||||
Buffer += sizeof(UINT32);
|
||||
for (Index = 0; Index < HashList->count; Index++) {
|
||||
WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (HashList->digests[Index].size));
|
||||
Buffer += sizeof(UINT16);
|
||||
CopyMem (Buffer, HashList->digests[Index].buffer, HashList->digests[Index].size);
|
||||
Buffer += HashList->digests[Index].size;
|
||||
}
|
||||
|
||||
SendBufferSize = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);
|
||||
SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);
|
||||
|
||||
//
|
||||
// send Tpm command
|
||||
//
|
||||
RecvBufferSize = sizeof (RecvBuffer);
|
||||
Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
|
||||
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {
|
||||
DEBUG ((EFI_D_ERROR, "Tpm2PolicyOR - RecvBufferSize Error - %x\n", RecvBufferSize));
|
||||
return EFI_DEVICE_ERROR;
|
||||
}
|
||||
if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {
|
||||
DEBUG ((EFI_D_ERROR, "Tpm2PolicyOR - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));
|
||||
return EFI_DEVICE_ERROR;
|
||||
}
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
/**
|
||||
This command indicates that the authorization will be limited to a specific command code.
|
||||
|
||||
|
|
Loading…
Reference in New Issue