]> git.proxmox.com Git - mirror_edk2.git/commitdiff
SecurityPkg/TPM2: Extract GetSupportedAndActivePcrs to Tpm2CommandLib
authorJiewen Yao <jiewen.yao@intel.com>
Wed, 14 Sep 2016 08:28:12 +0000 (16:28 +0800)
committerStar Zeng <star.zeng@intel.com>
Wed, 21 Sep 2016 10:20:20 +0000 (18:20 +0800)
This patch extracts function Tpm2GetCapabilitySupportedAndActivePcrs()
from drivers and also update Tcg2ExecutePhysicalPresence() to call
Tpm2GetCapabilitySupportedAndActivePcrs() instead of
Tcg2Protocol->GetCapability to query the TPM to determine which
hashing algorithms are supported.

Cc: Chao B Zhang <chao.b.zhang@intel.com>
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Jiewen Yao <jiewen.yao@intel.com>
Signed-off-by: Star Zeng <star.zeng@intel.com>
Reviewed-by: Chao Zhang <chao.b.zhang@intel.com>
SecurityPkg/Include/Library/Tpm2CommandLib.h
SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/DxeTcg2PhysicalPresenceLib.c
SecurityPkg/Library/Tpm2CommandLib/Tpm2Capability.c
SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.c

index 825ffc37a46674671f345ba62932602de693e234..9a1dd8d8aceb4b97262f76af13d0f575942373fa 100644 (file)
@@ -762,6 +762,24 @@ Tpm2GetCapabilityPcrs (
   OUT TPML_PCR_SELECTION      *Pcrs\r
   );\r
 \r
+/**\r
+  This function will query the TPM to determine which hashing algorithms\r
+  are supported and which PCR banks are currently active.\r
+\r
+  @param[out]  TpmHashAlgorithmBitmap A bitmask containing the algorithms supported by the TPM.\r
+  @param[out]  ActivePcrBanks         A bitmask containing the PCRs currently allocated.\r
+\r
+  @retval     EFI_SUCCESS   TPM was successfully queried and return values can be trusted.\r
+  @retval     Others        An error occurred, likely in communication with the TPM.\r
+\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+Tpm2GetCapabilitySupportedAndActivePcrs(\r
+  OUT UINT32                            *TpmHashAlgorithmBitmap,\r
+  OUT UINT32                            *ActivePcrBanks\r
+  );\r
+\r
 /**\r
   This command returns the information of TPM AlgorithmSet.\r
 \r
index d1ed7e83c7ae84174ef0d367fbc9f0a7bba72591..4cec0f75278bcdeac4f5fdd956d69abed63ae28e 100644 (file)
@@ -160,17 +160,10 @@ Tcg2ExecutePhysicalPresence (
   )\r
 {\r
   EFI_STATUS                        Status;\r
-  EFI_TCG2_PROTOCOL                 *Tcg2Protocol;\r
-  EFI_TCG2_BOOT_SERVICE_CAPABILITY  ProtocolCapability;\r
-\r
-  Status = gBS->LocateProtocol (&gEfiTcg2ProtocolGuid, NULL, (VOID **) &Tcg2Protocol);\r
-  ASSERT_EFI_ERROR (Status);\r
+  EFI_TCG2_EVENT_ALGORITHM_BITMAP   TpmHashAlgorithmBitmap;\r
+  UINT32                            ActivePcrBanks;\r
 \r
-  ProtocolCapability.Size = sizeof(ProtocolCapability);\r
-  Status = Tcg2Protocol->GetCapability (\r
-                           Tcg2Protocol,\r
-                           &ProtocolCapability\r
-                           );\r
+  Status = Tpm2GetCapabilitySupportedAndActivePcrs (&TpmHashAlgorithmBitmap, &ActivePcrBanks);\r
   ASSERT_EFI_ERROR (Status);\r
 \r
   switch (CommandCode) {\r
@@ -194,7 +187,7 @@ Tcg2ExecutePhysicalPresence (
       return TCG_PP_OPERATION_RESPONSE_SUCCESS;\r
 \r
     case TCG2_PHYSICAL_PRESENCE_SET_PCR_BANKS:\r
-      Status = Tpm2PcrAllocateBanks (PlatformAuth, ProtocolCapability.HashAlgorithmBitmap, CommandParameter);\r
+      Status = Tpm2PcrAllocateBanks (PlatformAuth, TpmHashAlgorithmBitmap, CommandParameter);\r
       if (EFI_ERROR (Status)) {\r
         return TCG_PP_OPERATION_RESPONSE_BIOS_FAILURE;\r
       } else {\r
@@ -210,7 +203,7 @@ Tcg2ExecutePhysicalPresence (
       }\r
 \r
     case TCG2_PHYSICAL_PRESENCE_LOG_ALL_DIGESTS:\r
-      Status = Tpm2PcrAllocateBanks (PlatformAuth, ProtocolCapability.HashAlgorithmBitmap, ProtocolCapability.HashAlgorithmBitmap);\r
+      Status = Tpm2PcrAllocateBanks (PlatformAuth, TpmHashAlgorithmBitmap, TpmHashAlgorithmBitmap);\r
       if (EFI_ERROR (Status)) {\r
         return TCG_PP_OPERATION_RESPONSE_BIOS_FAILURE;\r
       } else {\r
index 0fe2c367d269347f7d9d9b45958a78ed1822ad18..9aab17f9345fdb7a71f225470274661a41ed35c1 100644 (file)
@@ -485,6 +485,98 @@ Tpm2GetCapabilityPcrs (
   return EFI_SUCCESS;\r
 }\r
 \r
+/**\r
+  This function will query the TPM to determine which hashing algorithms\r
+  are supported and which PCR banks are currently active.\r
+\r
+  @param[out]  TpmHashAlgorithmBitmap A bitmask containing the algorithms supported by the TPM.\r
+  @param[out]  ActivePcrBanks         A bitmask containing the PCRs currently allocated.\r
+\r
+  @retval     EFI_SUCCESS   TPM was successfully queried and return values can be trusted.\r
+  @retval     Others        An error occurred, likely in communication with the TPM.\r
+\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+Tpm2GetCapabilitySupportedAndActivePcrs (\r
+  OUT UINT32                            *TpmHashAlgorithmBitmap,\r
+  OUT UINT32                            *ActivePcrBanks\r
+  )\r
+{\r
+  EFI_STATUS            Status;\r
+  TPML_PCR_SELECTION    Pcrs;\r
+  UINTN                 Index;\r
+\r
+  //\r
+  // Get supported PCR and current Active PCRs.\r
+  //\r
+  Status = Tpm2GetCapabilityPcrs (&Pcrs);\r
+\r
+  //\r
+  // If error, assume that we have at least SHA-1 (and return the error.)\r
+  //\r
+  if (EFI_ERROR (Status)) {\r
+    DEBUG ((EFI_D_ERROR, "GetSupportedAndActivePcrs - Tpm2GetCapabilityPcrs fail!\n"));\r
+    *TpmHashAlgorithmBitmap = HASH_ALG_SHA1;\r
+    *ActivePcrBanks         = HASH_ALG_SHA1;\r
+  }\r
+  //\r
+  // Otherwise, process the return data to determine what algorithms are supported\r
+  // and currently allocated.\r
+  //\r
+  else {\r
+    DEBUG ((EFI_D_INFO, "GetSupportedAndActivePcrs - Count = %08x\n", Pcrs.count));\r
+    *TpmHashAlgorithmBitmap = 0;\r
+    *ActivePcrBanks         = 0;\r
+    for (Index = 0; Index < Pcrs.count; Index++) {\r
+      switch (Pcrs.pcrSelections[Index].hash) {\r
+      case TPM_ALG_SHA1:\r
+        DEBUG ((EFI_D_VERBOSE, "GetSupportedAndActivePcrs - HASH_ALG_SHA1 present.\n"));\r
+        *TpmHashAlgorithmBitmap |= HASH_ALG_SHA1;\r
+        if (!IsZeroBuffer (Pcrs.pcrSelections[Index].pcrSelect, Pcrs.pcrSelections[Index].sizeofSelect)) {\r
+          DEBUG ((EFI_D_VERBOSE, "GetSupportedAndActivePcrs - HASH_ALG_SHA1 active.\n"));\r
+          *ActivePcrBanks |= HASH_ALG_SHA1;\r
+        }\r
+        break;\r
+      case TPM_ALG_SHA256:\r
+        DEBUG ((EFI_D_VERBOSE, "GetSupportedAndActivePcrs - HASH_ALG_SHA256 present.\n"));\r
+        *TpmHashAlgorithmBitmap |= HASH_ALG_SHA256;\r
+        if (!IsZeroBuffer (Pcrs.pcrSelections[Index].pcrSelect, Pcrs.pcrSelections[Index].sizeofSelect)) {\r
+          DEBUG ((EFI_D_VERBOSE, "GetSupportedAndActivePcrs - HASH_ALG_SHA256 active.\n"));\r
+          *ActivePcrBanks |= HASH_ALG_SHA256;\r
+        }\r
+        break;\r
+      case TPM_ALG_SHA384:\r
+        DEBUG ((EFI_D_VERBOSE, "GetSupportedAndActivePcrs - HASH_ALG_SHA384 present.\n"));\r
+        *TpmHashAlgorithmBitmap |= HASH_ALG_SHA384;\r
+        if (!IsZeroBuffer (Pcrs.pcrSelections[Index].pcrSelect, Pcrs.pcrSelections[Index].sizeofSelect)) {\r
+          DEBUG ((EFI_D_VERBOSE, "GetSupportedAndActivePcrs - HASH_ALG_SHA384 active.\n"));\r
+          *ActivePcrBanks |= HASH_ALG_SHA384;\r
+        }\r
+        break;\r
+      case TPM_ALG_SHA512:\r
+        DEBUG ((EFI_D_VERBOSE, "GetSupportedAndActivePcrs - HASH_ALG_SHA512 present.\n"));\r
+        *TpmHashAlgorithmBitmap |= HASH_ALG_SHA512;\r
+        if (!IsZeroBuffer (Pcrs.pcrSelections[Index].pcrSelect, Pcrs.pcrSelections[Index].sizeofSelect)) {\r
+          DEBUG ((EFI_D_VERBOSE, "GetSupportedAndActivePcrs - HASH_ALG_SHA512 active.\n"));\r
+          *ActivePcrBanks |= HASH_ALG_SHA512;\r
+        }\r
+        break;\r
+      case TPM_ALG_SM3_256:\r
+        DEBUG ((EFI_D_VERBOSE, "GetSupportedAndActivePcrs - HASH_ALG_SM3_256 present.\n"));\r
+        *TpmHashAlgorithmBitmap |= HASH_ALG_SM3_256;\r
+        if (!IsZeroBuffer (Pcrs.pcrSelections[Index].pcrSelect, Pcrs.pcrSelections[Index].sizeofSelect)) {\r
+          DEBUG ((EFI_D_VERBOSE, "GetSupportedAndActivePcrs - HASH_ALG_SM3_256 active.\n"));\r
+          *ActivePcrBanks |= HASH_ALG_SM3_256;\r
+        }\r
+        break;\r
+      }\r
+    }\r
+  }\r
+\r
+  return Status;\r
+}\r
+\r
 /**\r
   This command returns the information of TPM AlgorithmSet.\r
 \r
index f3cc47796448123612172b26ed1cc9768b675979..db8d662f80dc0b1b679cf59784ee036d8261c5ff 100644 (file)
@@ -2222,7 +2222,6 @@ DriverEntry (
   VOID                              *Registration;\r
   UINT32                            MaxCommandSize;\r
   UINT32                            MaxResponseSize;\r
-  TPML_PCR_SELECTION                Pcrs;\r
   UINTN                             Index;\r
   EFI_TCG2_EVENT_ALGORITHM_BITMAP   TpmHashAlgorithmBitmap;\r
   UINT32                            ActivePCRBanks;\r
@@ -2292,51 +2291,9 @@ DriverEntry (
   //\r
   // Get supported PCR and current Active PCRs\r
   //\r
-  Status = Tpm2GetCapabilityPcrs (&Pcrs);\r
-  if (EFI_ERROR (Status)) {\r
-    DEBUG ((EFI_D_ERROR, "Tpm2GetCapabilityPcrs fail!\n"));\r
-    TpmHashAlgorithmBitmap = EFI_TCG2_BOOT_HASH_ALG_SHA1;\r
-    ActivePCRBanks = EFI_TCG2_BOOT_HASH_ALG_SHA1;\r
-  } else {\r
-    DEBUG ((EFI_D_INFO, "Tpm2GetCapabilityPcrs Count - %08x\n", Pcrs.count));\r
-    TpmHashAlgorithmBitmap = 0;\r
-    ActivePCRBanks = 0;\r
-    for (Index = 0; Index < Pcrs.count; Index++) {\r
-      DEBUG ((EFI_D_INFO, "hash - %x\n", Pcrs.pcrSelections[Index].hash));\r
-      switch (Pcrs.pcrSelections[Index].hash) {\r
-      case TPM_ALG_SHA1:\r
-        TpmHashAlgorithmBitmap |= EFI_TCG2_BOOT_HASH_ALG_SHA1;\r
-        if (!IsZeroBuffer (Pcrs.pcrSelections[Index].pcrSelect, Pcrs.pcrSelections[Index].sizeofSelect)) {\r
-          ActivePCRBanks |= EFI_TCG2_BOOT_HASH_ALG_SHA1;\r
-        }        \r
-        break;\r
-      case TPM_ALG_SHA256:\r
-        TpmHashAlgorithmBitmap |= EFI_TCG2_BOOT_HASH_ALG_SHA256;\r
-        if (!IsZeroBuffer (Pcrs.pcrSelections[Index].pcrSelect, Pcrs.pcrSelections[Index].sizeofSelect)) {\r
-          ActivePCRBanks |= EFI_TCG2_BOOT_HASH_ALG_SHA256;\r
-        }\r
-        break;\r
-      case TPM_ALG_SHA384:\r
-        TpmHashAlgorithmBitmap |= EFI_TCG2_BOOT_HASH_ALG_SHA384;\r
-        if (!IsZeroBuffer (Pcrs.pcrSelections[Index].pcrSelect, Pcrs.pcrSelections[Index].sizeofSelect)) {\r
-          ActivePCRBanks |= EFI_TCG2_BOOT_HASH_ALG_SHA384;\r
-        }\r
-        break;\r
-      case TPM_ALG_SHA512:\r
-        TpmHashAlgorithmBitmap |= EFI_TCG2_BOOT_HASH_ALG_SHA512;\r
-        if (!IsZeroBuffer (Pcrs.pcrSelections[Index].pcrSelect, Pcrs.pcrSelections[Index].sizeofSelect)) {\r
-          ActivePCRBanks |= EFI_TCG2_BOOT_HASH_ALG_SHA512;\r
-        }\r
-        break;\r
-      case TPM_ALG_SM3_256:\r
-        TpmHashAlgorithmBitmap |= EFI_TCG2_BOOT_HASH_ALG_SM3_256;\r
-        if (!IsZeroBuffer (Pcrs.pcrSelections[Index].pcrSelect, Pcrs.pcrSelections[Index].sizeofSelect)) {\r
-          ActivePCRBanks |= EFI_TCG2_BOOT_HASH_ALG_SM3_256;\r
-        }\r
-        break;\r
-      }\r
-    }\r
-  }\r
+  Status = Tpm2GetCapabilitySupportedAndActivePcrs (&TpmHashAlgorithmBitmap, &ActivePCRBanks);\r
+  ASSERT_EFI_ERROR (Status);\r
+\r
   mTcgDxeData.BsCap.HashAlgorithmBitmap = TpmHashAlgorithmBitmap & PcdGet32 (PcdTcg2HashAlgorithmBitmap);\r
   mTcgDxeData.BsCap.ActivePcrBanks = ActivePCRBanks & PcdGet32 (PcdTcg2HashAlgorithmBitmap);\r
 \r