mirror of
				https://github.com/acidanthera/audk.git
				synced 2025-10-30 18:53:45 +01:00 
			
		
		
		
	What to do: 1. Merge from Auth Variable driver in SecurityPkg to Variable drive in MdeModulePkg. Then the merged Variable driver in MdeModulePkg will link to AuthVariableLib and TpmMeasurementLib. AuthVariableLibNull and TpmMeasurementLibNull in MdeModulePkg could be used for non auth variable support. AuthVariableLib and DxeTpmMeasurementLib in SecurityPkg may be used for auth variable support. Why to do: 1. Remove code duplication and reduce maintenance effort. After auth variable service separated from Auth Variable driver in SecurityPkg to AuthVariableLib. The remaining code logic of Auth Variable driver in SecurityPkg will be almost same with Variable driver in MdeModulePkg. Now it is to merge them. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Star Zeng <star.zeng@intel.com> Reviewed-by: Jiewen Yao <jiewen.yao@intel.com> Reviewed-by: Liming Gao <liming.gao@intel.com> git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@17765 6f19259b-4bc3-4df7-8a09-765794883524
		
			
				
	
	
		
			257 lines
		
	
	
		
			8.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			257 lines
		
	
	
		
			8.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /** @file
 | |
|   Provides variable driver extended services.
 | |
| 
 | |
| Copyright (c) 2015, Intel Corporation. All rights reserved.<BR>
 | |
| This program and the accompanying materials
 | |
| are licensed and made available under the terms and conditions of the BSD License
 | |
| which accompanies this distribution.  The full text of the license may be found at
 | |
| http://opensource.org/licenses/bsd-license.php
 | |
| 
 | |
| THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
 | |
| 
 | |
| **/
 | |
| 
 | |
| #include "Variable.h"
 | |
| 
 | |
| /**
 | |
|   Finds variable in storage blocks of volatile and non-volatile storage areas.
 | |
| 
 | |
|   This code finds variable in storage blocks of volatile and non-volatile storage areas.
 | |
|   If VariableName is an empty string, then we just return the first
 | |
|   qualified variable without comparing VariableName and VendorGuid.
 | |
| 
 | |
|   @param[in]  VariableName          Name of the variable to be found.
 | |
|   @param[in]  VendorGuid            Variable vendor GUID to be found.
 | |
|   @param[out] AuthVariableInfo      Pointer to AUTH_VARIABLE_INFO structure for
 | |
|                                     output of the variable found.
 | |
| 
 | |
|   @retval EFI_INVALID_PARAMETER     If VariableName is not an empty string,
 | |
|                                     while VendorGuid is NULL.
 | |
|   @retval EFI_SUCCESS               Variable successfully found.
 | |
|   @retval EFI_NOT_FOUND             Variable not found
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| VariableExLibFindVariable (
 | |
|   IN  CHAR16                *VariableName,
 | |
|   IN  EFI_GUID              *VendorGuid,
 | |
|   OUT AUTH_VARIABLE_INFO    *AuthVariableInfo
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                    Status;
 | |
|   VARIABLE_POINTER_TRACK        Variable;
 | |
|   AUTHENTICATED_VARIABLE_HEADER *AuthVariable;
 | |
| 
 | |
|   Status = FindVariable (
 | |
|              VariableName,
 | |
|              VendorGuid,
 | |
|              &Variable,
 | |
|              &mVariableModuleGlobal->VariableGlobal,
 | |
|              FALSE
 | |
|              );
 | |
|   if (EFI_ERROR (Status)) {
 | |
|     AuthVariableInfo->Data = NULL;
 | |
|     AuthVariableInfo->DataSize = 0;
 | |
|     AuthVariableInfo->Attributes = 0;
 | |
|     AuthVariableInfo->PubKeyIndex = 0;
 | |
|     AuthVariableInfo->MonotonicCount = 0;
 | |
|     AuthVariableInfo->TimeStamp = NULL;
 | |
|     return Status;
 | |
|   }
 | |
| 
 | |
|   AuthVariableInfo->DataSize        = DataSizeOfVariable (Variable.CurrPtr);
 | |
|   AuthVariableInfo->Data            = GetVariableDataPtr (Variable.CurrPtr);
 | |
|   AuthVariableInfo->Attributes      = Variable.CurrPtr->Attributes;
 | |
|   if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
 | |
|     AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) Variable.CurrPtr;
 | |
|     AuthVariableInfo->PubKeyIndex     = AuthVariable->PubKeyIndex;
 | |
|     AuthVariableInfo->MonotonicCount  = AuthVariable->MonotonicCount;
 | |
|     AuthVariableInfo->TimeStamp       = &AuthVariable->TimeStamp;
 | |
|   }
 | |
| 
 | |
|   return EFI_SUCCESS;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Finds next variable in storage blocks of volatile and non-volatile storage areas.
 | |
| 
 | |
|   This code finds next variable in storage blocks of volatile and non-volatile storage areas.
 | |
|   If VariableName is an empty string, then we just return the first
 | |
|   qualified variable without comparing VariableName and VendorGuid.
 | |
| 
 | |
|   @param[in]  VariableName          Name of the variable to be found.
 | |
|   @param[in]  VendorGuid            Variable vendor GUID to be found.
 | |
|   @param[out] AuthVariableInfo      Pointer to AUTH_VARIABLE_INFO structure for
 | |
|                                     output of the next variable.
 | |
| 
 | |
|   @retval EFI_INVALID_PARAMETER     If VariableName is not an empty string,
 | |
|                                     while VendorGuid is NULL.
 | |
|   @retval EFI_SUCCESS               Variable successfully found.
 | |
|   @retval EFI_NOT_FOUND             Variable not found
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| VariableExLibFindNextVariable (
 | |
|   IN  CHAR16                *VariableName,
 | |
|   IN  EFI_GUID              *VendorGuid,
 | |
|   OUT AUTH_VARIABLE_INFO    *AuthVariableInfo
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                    Status;
 | |
|   VARIABLE_HEADER               *VariablePtr;
 | |
|   AUTHENTICATED_VARIABLE_HEADER *AuthVariablePtr;
 | |
| 
 | |
|   Status = VariableServiceGetNextVariableInternal (
 | |
|              VariableName,
 | |
|              VendorGuid,
 | |
|              &VariablePtr
 | |
|              );
 | |
|   if (EFI_ERROR (Status)) {
 | |
|     AuthVariableInfo->VariableName = NULL;
 | |
|     AuthVariableInfo->VendorGuid = NULL;
 | |
|     AuthVariableInfo->Data = NULL;
 | |
|     AuthVariableInfo->DataSize = 0;
 | |
|     AuthVariableInfo->Attributes = 0;
 | |
|     AuthVariableInfo->PubKeyIndex = 0;
 | |
|     AuthVariableInfo->MonotonicCount = 0;
 | |
|     AuthVariableInfo->TimeStamp = NULL;
 | |
|     return Status;
 | |
|   }
 | |
| 
 | |
|   AuthVariableInfo->VariableName    = GetVariableNamePtr (VariablePtr);
 | |
|   AuthVariableInfo->VendorGuid      = GetVendorGuidPtr (VariablePtr);
 | |
|   AuthVariableInfo->DataSize        = DataSizeOfVariable (VariablePtr);
 | |
|   AuthVariableInfo->Data            = GetVariableDataPtr (VariablePtr);
 | |
|   AuthVariableInfo->Attributes      = VariablePtr->Attributes;
 | |
|   if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
 | |
|     AuthVariablePtr = (AUTHENTICATED_VARIABLE_HEADER *) VariablePtr;
 | |
|     AuthVariableInfo->PubKeyIndex     = AuthVariablePtr->PubKeyIndex;
 | |
|     AuthVariableInfo->MonotonicCount  = AuthVariablePtr->MonotonicCount;
 | |
|     AuthVariableInfo->TimeStamp       = &AuthVariablePtr->TimeStamp;
 | |
|   }
 | |
| 
 | |
|   return EFI_SUCCESS;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Update the variable region with Variable information.
 | |
| 
 | |
|   @param[in] AuthVariableInfo       Pointer AUTH_VARIABLE_INFO structure for
 | |
|                                     input of the variable.
 | |
| 
 | |
|   @retval EFI_SUCCESS               The update operation is success.
 | |
|   @retval EFI_INVALID_PARAMETER     Invalid parameter.
 | |
|   @retval EFI_WRITE_PROTECTED       Variable is write-protected.
 | |
|   @retval EFI_OUT_OF_RESOURCES      There is not enough resource.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| VariableExLibUpdateVariable (
 | |
|   IN AUTH_VARIABLE_INFO     *AuthVariableInfo
 | |
|   )
 | |
| {
 | |
|   VARIABLE_POINTER_TRACK    Variable;
 | |
| 
 | |
|   FindVariable (AuthVariableInfo->VariableName, AuthVariableInfo->VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE);
 | |
|   return UpdateVariable (
 | |
|            AuthVariableInfo->VariableName,
 | |
|            AuthVariableInfo->VendorGuid,
 | |
|            AuthVariableInfo->Data,
 | |
|            AuthVariableInfo->DataSize,
 | |
|            AuthVariableInfo->Attributes,
 | |
|            AuthVariableInfo->PubKeyIndex,
 | |
|            AuthVariableInfo->MonotonicCount,
 | |
|            &Variable,
 | |
|            AuthVariableInfo->TimeStamp
 | |
|            );
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Get scratch buffer.
 | |
| 
 | |
|   @param[in, out] ScratchBufferSize Scratch buffer size. If input size is greater than
 | |
|                                     the maximum supported buffer size, this value contains
 | |
|                                     the maximum supported buffer size as output.
 | |
|   @param[out]     ScratchBuffer     Pointer to scratch buffer address.
 | |
| 
 | |
|   @retval EFI_SUCCESS       Get scratch buffer successfully.
 | |
|   @retval EFI_UNSUPPORTED   If input size is greater than the maximum supported buffer size.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| VariableExLibGetScratchBuffer (
 | |
|   IN OUT UINTN      *ScratchBufferSize,
 | |
|   OUT    VOID       **ScratchBuffer
 | |
|   )
 | |
| {
 | |
|   UINTN MaxBufferSize;
 | |
| 
 | |
|   MaxBufferSize = mVariableModuleGlobal->ScratchBufferSize;
 | |
|   if (*ScratchBufferSize > MaxBufferSize) {
 | |
|     *ScratchBufferSize = MaxBufferSize;
 | |
|     return EFI_UNSUPPORTED;
 | |
|   }
 | |
| 
 | |
|   *ScratchBuffer = GetEndPointer ((VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase));
 | |
|   return EFI_SUCCESS;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   This function is to check if the remaining variable space is enough to set
 | |
|   all Variables from argument list successfully. The purpose of the check
 | |
|   is to keep the consistency of the Variables to be in variable storage.
 | |
| 
 | |
|   Note: Variables are assumed to be in same storage.
 | |
|   The set sequence of Variables will be same with the sequence of VariableEntry from argument list,
 | |
|   so follow the argument sequence to check the Variables.
 | |
| 
 | |
|   @param[in] Attributes         Variable attributes for Variable entries.
 | |
|   @param ...                    The variable argument list with type VARIABLE_ENTRY_CONSISTENCY *.
 | |
|                                 A NULL terminates the list. The VariableSize of
 | |
|                                 VARIABLE_ENTRY_CONSISTENCY is the variable data size as input.
 | |
|                                 It will be changed to variable total size as output.
 | |
| 
 | |
|   @retval TRUE                  Have enough variable space to set the Variables successfully.
 | |
|   @retval FALSE                 No enough variable space to set the Variables successfully.
 | |
| 
 | |
| **/
 | |
| BOOLEAN
 | |
| EFIAPI
 | |
| VariableExLibCheckRemainingSpaceForConsistency (
 | |
|   IN UINT32                     Attributes,
 | |
|   ...
 | |
|   )
 | |
| {
 | |
|   VA_LIST Marker;
 | |
|   BOOLEAN Return;
 | |
| 
 | |
|   VA_START (Marker, Attributes);
 | |
| 
 | |
|   Return = CheckRemainingSpaceForConsistencyInternal (Attributes, Marker);
 | |
| 
 | |
|   VA_END (Marker);
 | |
| 
 | |
|   return Return;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Return TRUE if at OS runtime.
 | |
| 
 | |
|   @retval TRUE If at OS runtime.
 | |
|   @retval FALSE If at boot time.
 | |
| 
 | |
| **/
 | |
| BOOLEAN
 | |
| EFIAPI
 | |
| VariableExLibAtRuntime (
 | |
|   VOID
 | |
|   )
 | |
| {
 | |
|   return AtRuntime ();
 | |
| }
 |