mirror of https://github.com/acidanthera/audk.git
dd577319e8
TPM2.0 command lib always assumes TPM device and transmission channel can respond correctly. But it is not true when communication channel is exploited and wrong data is spoofed. Add more logic to prohibit memory overflow attack. Cc: Long Qin <qin.long@intel.com> Cc: Yao Jiewen <jiewen.yao@intel.com> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Chao Zhang <chao.b.zhang@intel.com> Reviewed-by: Long Qin <qin.long@intel.com> Reviewed-by: Yao Jiewen <jiewen.yao@intel.com> |
||
---|---|---|
.. | ||
Tpm2Capability.c | ||
Tpm2CommandLib.inf | ||
Tpm2CommandLib.uni | ||
Tpm2Context.c | ||
Tpm2DictionaryAttack.c | ||
Tpm2EnhancedAuthorization.c | ||
Tpm2Help.c | ||
Tpm2Hierarchy.c | ||
Tpm2Integrity.c | ||
Tpm2Miscellaneous.c | ||
Tpm2NVStorage.c | ||
Tpm2Object.c | ||
Tpm2Sequences.c | ||
Tpm2Session.c | ||
Tpm2Startup.c | ||
Tpm2Test.c |