mirror of https://github.com/acidanthera/audk.git
Add TPM2 commands which might be used in provision.
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: "Yao, Jiewen" <jiewen.yao@intel.com> Reviewed-by: "Dong, Guo" <guo.dong@intel.com> Reviewed-by: "Long, Qin" <qin.long@intel.com> git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@16548 6f19259b-4bc3-4df7-8a09-765794883524
This commit is contained in:
parent
9da91aea69
commit
a50e58f48b
|
@ -872,6 +872,25 @@ Tpm2PolicySecret (
|
||||||
OUT TPMT_TK_AUTH *PolicyTicket
|
OUT TPMT_TK_AUTH *PolicyTicket
|
||||||
);
|
);
|
||||||
|
|
||||||
|
/**
|
||||||
|
This command allows options in authorizations without requiring that the TPM evaluate all of the options.
|
||||||
|
If a policy may be satisfied by different sets of conditions, the TPM need only evaluate one set that
|
||||||
|
satisfies the policy. This command will indicate that one of the required sets of conditions has been
|
||||||
|
satisfied.
|
||||||
|
|
||||||
|
@param[in] PolicySession Handle for the policy session being extended.
|
||||||
|
@param[in] HashList the list of hashes to check for a match.
|
||||||
|
|
||||||
|
@retval EFI_SUCCESS Operation completed successfully.
|
||||||
|
@retval EFI_DEVICE_ERROR The command was unsuccessful.
|
||||||
|
**/
|
||||||
|
EFI_STATUS
|
||||||
|
EFIAPI
|
||||||
|
Tpm2PolicyOR (
|
||||||
|
IN TPMI_SH_POLICY PolicySession,
|
||||||
|
IN TPML_DIGEST *HashList
|
||||||
|
);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
This command indicates that the authorization will be limited to a specific command code.
|
This command indicates that the authorization will be limited to a specific command code.
|
||||||
|
|
||||||
|
|
|
@ -41,6 +41,16 @@ typedef struct {
|
||||||
TPMS_AUTH_RESPONSE AuthSession;
|
TPMS_AUTH_RESPONSE AuthSession;
|
||||||
} TPM2_POLICY_SECRET_RESPONSE;
|
} TPM2_POLICY_SECRET_RESPONSE;
|
||||||
|
|
||||||
|
typedef struct {
|
||||||
|
TPM2_COMMAND_HEADER Header;
|
||||||
|
TPMI_SH_POLICY PolicySession;
|
||||||
|
TPML_DIGEST HashList;
|
||||||
|
} TPM2_POLICY_OR_COMMAND;
|
||||||
|
|
||||||
|
typedef struct {
|
||||||
|
TPM2_RESPONSE_HEADER Header;
|
||||||
|
} TPM2_POLICY_OR_RESPONSE;
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
TPM2_COMMAND_HEADER Header;
|
TPM2_COMMAND_HEADER Header;
|
||||||
TPMI_SH_POLICY PolicySession;
|
TPMI_SH_POLICY PolicySession;
|
||||||
|
@ -182,6 +192,74 @@ Tpm2PolicySecret (
|
||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
This command allows options in authorizations without requiring that the TPM evaluate all of the options.
|
||||||
|
If a policy may be satisfied by different sets of conditions, the TPM need only evaluate one set that
|
||||||
|
satisfies the policy. This command will indicate that one of the required sets of conditions has been
|
||||||
|
satisfied.
|
||||||
|
|
||||||
|
@param[in] PolicySession Handle for the policy session being extended.
|
||||||
|
@param[in] HashList the list of hashes to check for a match.
|
||||||
|
|
||||||
|
@retval EFI_SUCCESS Operation completed successfully.
|
||||||
|
@retval EFI_DEVICE_ERROR The command was unsuccessful.
|
||||||
|
**/
|
||||||
|
EFI_STATUS
|
||||||
|
EFIAPI
|
||||||
|
Tpm2PolicyOR (
|
||||||
|
IN TPMI_SH_POLICY PolicySession,
|
||||||
|
IN TPML_DIGEST *HashList
|
||||||
|
)
|
||||||
|
{
|
||||||
|
EFI_STATUS Status;
|
||||||
|
TPM2_POLICY_OR_COMMAND SendBuffer;
|
||||||
|
TPM2_POLICY_OR_RESPONSE RecvBuffer;
|
||||||
|
UINT32 SendBufferSize;
|
||||||
|
UINT32 RecvBufferSize;
|
||||||
|
UINT8 *Buffer;
|
||||||
|
UINTN Index;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Construct command
|
||||||
|
//
|
||||||
|
SendBuffer.Header.tag = SwapBytes16(TPM_ST_NO_SESSIONS);
|
||||||
|
SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_PolicyOR);
|
||||||
|
|
||||||
|
SendBuffer.PolicySession = SwapBytes32 (PolicySession);
|
||||||
|
Buffer = (UINT8 *)&SendBuffer.HashList;
|
||||||
|
WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32 (HashList->count));
|
||||||
|
Buffer += sizeof(UINT32);
|
||||||
|
for (Index = 0; Index < HashList->count; Index++) {
|
||||||
|
WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (HashList->digests[Index].size));
|
||||||
|
Buffer += sizeof(UINT16);
|
||||||
|
CopyMem (Buffer, HashList->digests[Index].buffer, HashList->digests[Index].size);
|
||||||
|
Buffer += HashList->digests[Index].size;
|
||||||
|
}
|
||||||
|
|
||||||
|
SendBufferSize = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);
|
||||||
|
SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);
|
||||||
|
|
||||||
|
//
|
||||||
|
// send Tpm command
|
||||||
|
//
|
||||||
|
RecvBufferSize = sizeof (RecvBuffer);
|
||||||
|
Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);
|
||||||
|
if (EFI_ERROR (Status)) {
|
||||||
|
return Status;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {
|
||||||
|
DEBUG ((EFI_D_ERROR, "Tpm2PolicyOR - RecvBufferSize Error - %x\n", RecvBufferSize));
|
||||||
|
return EFI_DEVICE_ERROR;
|
||||||
|
}
|
||||||
|
if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {
|
||||||
|
DEBUG ((EFI_D_ERROR, "Tpm2PolicyOR - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));
|
||||||
|
return EFI_DEVICE_ERROR;
|
||||||
|
}
|
||||||
|
|
||||||
|
return EFI_SUCCESS;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
This command indicates that the authorization will be limited to a specific command code.
|
This command indicates that the authorization will be limited to a specific command code.
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue