From: Yao, Jiewen Date: Mon, 11 Jan 2016 05:18:32 +0000 (+0000) Subject: SecurityPkg: Clear AuthSession content after use. X-Git-Tag: edk2-stable201903~8059 X-Git-Url: https://git.proxmox.com/?p=mirror_edk2.git;a=commitdiff_plain;h=7ae130da858d41088d27736f99a8c8f07ec1c641 SecurityPkg: Clear AuthSession content after use. Some commands in Tpm2CommandLib accept AuthSession as input parameter and copy to local command buffer. After use, this AuthSession content should be zeroed, because there might be some secrete there. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: "Yao, Jiewen" Reviewed-by: "Zhang, Chao B" git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@19635 6f19259b-4bc3-4df7-8a09-765794883524 --- diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2DictionaryAttack.c b/SecurityPkg/Library/Tpm2CommandLib/Tpm2DictionaryAttack.c index 2f6488fb97..3198b8a4b8 100644 --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2DictionaryAttack.c +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2DictionaryAttack.c @@ -1,7 +1,7 @@ /** @file Implement TPM2 DictionaryAttack related command. -Copyright (c) 2013, Intel Corporation. All rights reserved.
+Copyright (c) 2013 - 2016, Intel Corporation. All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the BSD License which accompanies this distribution. The full text of the license may be found at @@ -104,19 +104,27 @@ Tpm2DictionaryAttackLockReset ( RecvBufferSize = sizeof (RecvBuffer); Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer); if (EFI_ERROR (Status)) { - return Status; + goto Done; } if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) { DEBUG ((EFI_D_ERROR, "Tpm2DictionaryAttackLockReset - RecvBufferSize Error - %x\n", RecvBufferSize)); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) { DEBUG ((EFI_D_ERROR, "Tpm2DictionaryAttackLockReset - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode))); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } - return EFI_SUCCESS; +Done: + // + // Clear AuthSession Content + // + ZeroMem (&SendBuffer, sizeof(SendBuffer)); + ZeroMem (&RecvBuffer, sizeof(RecvBuffer)); + return Status; } /** @@ -187,17 +195,25 @@ Tpm2DictionaryAttackParameters ( RecvBufferSize = sizeof (RecvBuffer); Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer); if (EFI_ERROR (Status)) { - return Status; + goto Done; } if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) { DEBUG ((EFI_D_ERROR, "Tpm2DictionaryAttackParameters - RecvBufferSize Error - %x\n", RecvBufferSize)); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) { DEBUG ((EFI_D_ERROR, "Tpm2DictionaryAttackParameters - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode))); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } - return EFI_SUCCESS; +Done: + // + // Clear AuthSession Content + // + ZeroMem (&SendBufferSize, sizeof(SendBufferSize)); + ZeroMem (&RecvBuffer, sizeof(RecvBuffer)); + return Status; } diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2EnhancedAuthorization.c b/SecurityPkg/Library/Tpm2CommandLib/Tpm2EnhancedAuthorization.c index d11f543463..6f6b3693f8 100644 --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2EnhancedAuthorization.c +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2EnhancedAuthorization.c @@ -1,7 +1,7 @@ /** @file Implement TPM2 EnhancedAuthorization related command. -Copyright (c) 2014, Intel Corporation. All rights reserved.
+Copyright (c) 2014 - 2016, Intel Corporation. All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the BSD License which accompanies this distribution. The full text of the license may be found at @@ -161,16 +161,18 @@ Tpm2PolicySecret ( RecvBufferSize = sizeof (RecvBuffer); Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer); if (EFI_ERROR (Status)) { - return Status; + goto Done; } if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) { DEBUG ((EFI_D_ERROR, "Tpm2PolicySecret - RecvBufferSize Error - %x\n", RecvBufferSize)); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) { DEBUG ((EFI_D_ERROR, "Tpm2PolicySecret - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode))); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } // @@ -189,7 +191,13 @@ Tpm2PolicySecret ( Buffer += sizeof(UINT16); CopyMem (PolicyTicket->digest.buffer, Buffer, PolicyTicket->digest.size); - return EFI_SUCCESS; +Done: + // + // Clear AuthSession Content + // + ZeroMem (&SendBuffer, sizeof(SendBuffer)); + ZeroMem (&RecvBuffer, sizeof(RecvBuffer)); + return Status; } /** diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Hierarchy.c b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Hierarchy.c index 11f1229434..9bfbdad394 100644 --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Hierarchy.c +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Hierarchy.c @@ -1,7 +1,7 @@ /** @file Implement TPM2 Hierarchy related command. -Copyright (c) 2013 - 2014, Intel Corporation. All rights reserved.
+Copyright (c) 2013 - 2016, Intel Corporation. All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the BSD License which accompanies this distribution. The full text of the license may be found at @@ -186,19 +186,27 @@ Tpm2SetPrimaryPolicy ( RecvBufferSize = sizeof (RecvBuffer); Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer); if (EFI_ERROR (Status)) { - return Status; + goto Done; } if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) { DEBUG ((EFI_D_ERROR, "Tpm2SetPrimaryPolicy - RecvBufferSize Error - %x\n", RecvBufferSize)); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) { DEBUG ((EFI_D_ERROR, "Tpm2SetPrimaryPolicy - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode))); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } - return EFI_SUCCESS; +Done: + // + // Clear AuthSession Content + // + ZeroMem (&SendBuffer, sizeof(SendBuffer)); + ZeroMem (&RecvBuffer, sizeof(RecvBuffer)); + return Status; } /** @@ -246,12 +254,13 @@ Tpm2Clear ( ResultBufSize = sizeof(Res); Status = Tpm2SubmitCommand (CmdSize, (UINT8 *)&Cmd, &ResultBufSize, (UINT8 *)&Res); if (EFI_ERROR(Status)) { - return Status; + goto Done; } if (ResultBufSize > sizeof(Res)) { DEBUG ((EFI_D_ERROR, "Clear: Failed ExecuteCommand: Buffer Too Small\r\n")); - return EFI_BUFFER_TOO_SMALL; + Status = EFI_BUFFER_TOO_SMALL; + goto Done; } // @@ -260,7 +269,8 @@ Tpm2Clear ( RespSize = SwapBytes32(Res.Header.paramSize); if (RespSize > sizeof(Res)) { DEBUG ((EFI_D_ERROR, "Clear: Response size too large! %d\r\n", RespSize)); - return EFI_BUFFER_TOO_SMALL; + Status = EFI_BUFFER_TOO_SMALL; + goto Done; } // @@ -268,7 +278,8 @@ Tpm2Clear ( // if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) { DEBUG ((EFI_D_ERROR, "Clear: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode))); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } // @@ -276,8 +287,13 @@ Tpm2Clear ( // // None - - return EFI_SUCCESS; +Done: + // + // Clear AuthSession Content + // + ZeroMem (&Cmd, sizeof(Cmd)); + ZeroMem (&Res, sizeof(Res)); + return Status; } /** @@ -332,12 +348,13 @@ Tpm2ClearControl ( ResultBufSize = sizeof(Res); Status = Tpm2SubmitCommand (CmdSize, (UINT8 *)&Cmd, &ResultBufSize, (UINT8 *)&Res); if (EFI_ERROR(Status)) { - return Status; + goto Done; } if (ResultBufSize > sizeof(Res)) { DEBUG ((EFI_D_ERROR, "ClearControl: Failed ExecuteCommand: Buffer Too Small\r\n")); - return EFI_BUFFER_TOO_SMALL; + Status = EFI_BUFFER_TOO_SMALL; + goto Done; } // @@ -346,7 +363,8 @@ Tpm2ClearControl ( RespSize = SwapBytes32(Res.Header.paramSize); if (RespSize > sizeof(Res)) { DEBUG ((EFI_D_ERROR, "ClearControl: Response size too large! %d\r\n", RespSize)); - return EFI_BUFFER_TOO_SMALL; + Status = EFI_BUFFER_TOO_SMALL; + goto Done; } // @@ -354,7 +372,8 @@ Tpm2ClearControl ( // if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) { DEBUG ((EFI_D_ERROR, "ClearControl: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode))); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } // @@ -362,8 +381,13 @@ Tpm2ClearControl ( // // None - - return EFI_SUCCESS; +Done: + // + // Clear AuthSession Content + // + ZeroMem (&Cmd, sizeof(Cmd)); + ZeroMem (&Res, sizeof(Res)); + return Status; } /** @@ -436,10 +460,14 @@ Tpm2HierarchyChangeAuth ( &ResultBufSize, ResultBuf ); + if (EFI_ERROR(Status)) { + goto Done; + } if (ResultBufSize > sizeof(Res)) { DEBUG ((EFI_D_ERROR, "HierarchyChangeAuth: Failed ExecuteCommand: Buffer Too Small\r\n")); - return EFI_BUFFER_TOO_SMALL; + Status = EFI_BUFFER_TOO_SMALL; + goto Done; } // @@ -448,7 +476,8 @@ Tpm2HierarchyChangeAuth ( RespSize = SwapBytes32(Res.Header.paramSize); if (RespSize > sizeof(Res)) { DEBUG ((EFI_D_ERROR, "HierarchyChangeAuth: Response size too large! %d\r\n", RespSize)); - return EFI_BUFFER_TOO_SMALL; + Status = EFI_BUFFER_TOO_SMALL; + goto Done; } // @@ -456,10 +485,17 @@ Tpm2HierarchyChangeAuth ( // if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) { DEBUG((EFI_D_ERROR,"HierarchyChangeAuth: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode))); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } - return EFI_SUCCESS; +Done: + // + // Clear AuthSession Content + // + ZeroMem (&Cmd, sizeof(Cmd)); + ZeroMem (&Res, sizeof(Res)); + return Status; } /** @@ -522,10 +558,14 @@ Tpm2ChangeEPS ( &ResultBufSize, ResultBuf ); + if (EFI_ERROR(Status)) { + goto Done; + } if (ResultBufSize > sizeof(Res)) { DEBUG ((EFI_D_ERROR, "ChangeEPS: Failed ExecuteCommand: Buffer Too Small\r\n")); - return EFI_BUFFER_TOO_SMALL; + Status = EFI_BUFFER_TOO_SMALL; + goto Done; } // @@ -534,7 +574,8 @@ Tpm2ChangeEPS ( RespSize = SwapBytes32(Res.Header.paramSize); if (RespSize > sizeof(Res)) { DEBUG ((EFI_D_ERROR, "ChangeEPS: Response size too large! %d\r\n", RespSize)); - return EFI_BUFFER_TOO_SMALL; + Status = EFI_BUFFER_TOO_SMALL; + goto Done; } // @@ -542,10 +583,17 @@ Tpm2ChangeEPS ( // if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) { DEBUG((EFI_D_ERROR,"ChangeEPS: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode))); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } - return EFI_SUCCESS; +Done: + // + // Clear AuthSession Content + // + ZeroMem (&Cmd, sizeof(Cmd)); + ZeroMem (&Res, sizeof(Res)); + return Status; } /** @@ -608,10 +656,14 @@ Tpm2ChangePPS ( &ResultBufSize, ResultBuf ); + if (EFI_ERROR(Status)) { + goto Done; + } if (ResultBufSize > sizeof(Res)) { DEBUG ((EFI_D_ERROR, "ChangePPS: Failed ExecuteCommand: Buffer Too Small\r\n")); - return EFI_BUFFER_TOO_SMALL; + Status = EFI_BUFFER_TOO_SMALL; + goto Done; } // @@ -620,7 +672,8 @@ Tpm2ChangePPS ( RespSize = SwapBytes32(Res.Header.paramSize); if (RespSize > sizeof(Res)) { DEBUG ((EFI_D_ERROR, "ChangePPS: Response size too large! %d\r\n", RespSize)); - return EFI_BUFFER_TOO_SMALL; + Status = EFI_BUFFER_TOO_SMALL; + goto Done; } // @@ -628,10 +681,17 @@ Tpm2ChangePPS ( // if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) { DEBUG((EFI_D_ERROR,"ChangePPS: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode))); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } - return EFI_SUCCESS; +Done: + // + // Clear AuthSession Content + // + ZeroMem (&Cmd, sizeof(Cmd)); + ZeroMem (&Res, sizeof(Res)); + return Status; } /** @@ -704,10 +764,14 @@ Tpm2HierarchyControl ( &ResultBufSize, ResultBuf ); + if (EFI_ERROR(Status)) { + goto Done; + } if (ResultBufSize > sizeof(Res)) { DEBUG ((EFI_D_ERROR, "HierarchyControl: Failed ExecuteCommand: Buffer Too Small\r\n")); - return EFI_BUFFER_TOO_SMALL; + Status = EFI_BUFFER_TOO_SMALL; + goto Done; } // @@ -716,7 +780,8 @@ Tpm2HierarchyControl ( RespSize = SwapBytes32(Res.Header.paramSize); if (RespSize > sizeof(Res)) { DEBUG ((EFI_D_ERROR, "HierarchyControl: Response size too large! %d\r\n", RespSize)); - return EFI_BUFFER_TOO_SMALL; + Status = EFI_BUFFER_TOO_SMALL; + goto Done; } // @@ -724,8 +789,15 @@ Tpm2HierarchyControl ( // if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) { DEBUG((EFI_D_ERROR,"HierarchyControl: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode))); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } - return EFI_SUCCESS; +Done: + // + // Clear AuthSession Content + // + ZeroMem (&Cmd, sizeof(Cmd)); + ZeroMem (&Res, sizeof(Res)); + return Status; } diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Integrity.c b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Integrity.c index cfb27ecd6b..fa4318dd5f 100644 --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Integrity.c +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Integrity.c @@ -1,7 +1,7 @@ /** @file Implement TPM2 Integrity related command. -Copyright (c) 2013 - 2014, Intel Corporation. All rights reserved.
+Copyright (c) 2013 - 2016, Intel Corporation. All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the BSD License which accompanies this distribution. The full text of the license may be found at @@ -490,10 +490,14 @@ Tpm2PcrAllocate ( &ResultBufSize, ResultBuf ); + if (EFI_ERROR(Status)) { + goto Done; + } if (ResultBufSize > sizeof(Res)) { DEBUG ((EFI_D_ERROR, "Tpm2PcrAllocate: Failed ExecuteCommand: Buffer Too Small\r\n")); - return EFI_BUFFER_TOO_SMALL; + Status = EFI_BUFFER_TOO_SMALL; + goto Done; } // @@ -502,7 +506,8 @@ Tpm2PcrAllocate ( RespSize = SwapBytes32(Res.Header.paramSize); if (RespSize > sizeof(Res)) { DEBUG ((EFI_D_ERROR, "Tpm2PcrAllocate: Response size too large! %d\r\n", RespSize)); - return EFI_BUFFER_TOO_SMALL; + Status = EFI_BUFFER_TOO_SMALL; + goto Done; } // @@ -510,7 +515,8 @@ Tpm2PcrAllocate ( // if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) { DEBUG((EFI_D_ERROR,"Tpm2PcrAllocate: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode))); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } // @@ -521,5 +527,11 @@ Tpm2PcrAllocate ( *SizeNeeded = SwapBytes32(Res.SizeNeeded); *SizeAvailable = SwapBytes32(Res.SizeAvailable); - return EFI_SUCCESS; +Done: + // + // Clear AuthSession Content + // + ZeroMem (&Cmd, sizeof(Cmd)); + ZeroMem (&Res, sizeof(Res)); + return Status; } diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Miscellaneous.c b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Miscellaneous.c index 914ad7f70b..5bd870fb9e 100644 --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Miscellaneous.c +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Miscellaneous.c @@ -1,7 +1,7 @@ /** @file Implement TPM2 Miscellanenous related command. -Copyright (c) 2013, Intel Corporation. All rights reserved.
+Copyright (c) 2013 - 2016, Intel Corporation. All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the BSD License which accompanies this distribution. The full text of the license may be found at @@ -98,17 +98,25 @@ Tpm2SetAlgorithmSet ( RecvBufferSize = sizeof (RecvBuffer); Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer); if (EFI_ERROR (Status)) { - return Status; + goto Done; } if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) { DEBUG ((EFI_D_ERROR, "Tpm2SetAlgorithmSet - RecvBufferSize Error - %x\n", RecvBufferSize)); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) { DEBUG ((EFI_D_ERROR, "Tpm2SetAlgorithmSet - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode))); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } - return EFI_SUCCESS; +Done: + // + // Clear AuthSession Content + // + ZeroMem (&SendBuffer, sizeof(SendBuffer)); + ZeroMem (&RecvBuffer, sizeof(RecvBuffer)); + return Status; } diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2NVStorage.c b/SecurityPkg/Library/Tpm2CommandLib/Tpm2NVStorage.c index c4714d3e19..5fe48e1804 100644 --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2NVStorage.c +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2NVStorage.c @@ -1,7 +1,7 @@ /** @file Implement TPM2 NVStorage related command. -Copyright (c) 2013, Intel Corporation. All rights reserved.
+Copyright (c) 2013 - 2016, Intel Corporation. All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the BSD License which accompanies this distribution. The full text of the license may be found at @@ -347,12 +347,13 @@ Tpm2NvDefineSpace ( RecvBufferSize = sizeof (RecvBuffer); Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer); if (EFI_ERROR (Status)) { - return Status; + goto Done; } if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) { DEBUG ((EFI_D_ERROR, "Tpm2NvDefineSpace - RecvBufferSize Error - %x\n", RecvBufferSize)); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode); @@ -365,24 +366,37 @@ Tpm2NvDefineSpace ( break; case TPM_RC_SIZE + RC_NV_DefineSpace_publicInfo: case TPM_RC_SIZE + RC_NV_DefineSpace_auth: - return EFI_BAD_BUFFER_SIZE; + Status = EFI_BAD_BUFFER_SIZE; + break; case TPM_RC_ATTRIBUTES: case TPM_RC_ATTRIBUTES + RC_NV_DefineSpace_publicInfo: - return EFI_UNSUPPORTED; + Status = EFI_UNSUPPORTED; + break; case TPM_RC_ATTRIBUTES + RC_NV_DefineSpace_authHandle: - return EFI_INVALID_PARAMETER; + Status = EFI_INVALID_PARAMETER; + break; case TPM_RC_NV_DEFINED: - return EFI_ALREADY_STARTED; + Status = EFI_ALREADY_STARTED; + break; case TPM_RC_VALUE + RC_NV_DefineSpace_publicInfo: case TPM_RC_VALUE + RC_NV_DefineSpace_authHandle: - return EFI_INVALID_PARAMETER; + Status = EFI_INVALID_PARAMETER; + break; case TPM_RC_NV_SPACE: - return EFI_OUT_OF_RESOURCES; + Status = EFI_OUT_OF_RESOURCES; + break; default: - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + break; } - - return EFI_SUCCESS; + +Done: + // + // Clear AuthSession Content + // + ZeroMem (&SendBuffer, sizeof(SendBuffer)); + ZeroMem (&RecvBuffer, sizeof(RecvBuffer)); + return Status; } /** @@ -441,12 +455,13 @@ Tpm2NvUndefineSpace ( RecvBufferSize = sizeof (RecvBuffer); Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer); if (EFI_ERROR (Status)) { - return Status; + goto Done; } if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) { DEBUG ((EFI_D_ERROR, "Tpm2NvUndefineSpace - RecvBufferSize Error - %x\n", RecvBufferSize)); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode); @@ -459,21 +474,33 @@ Tpm2NvUndefineSpace ( break; case TPM_RC_ATTRIBUTES: case TPM_RC_ATTRIBUTES + RC_NV_UndefineSpace_nvIndex: - return EFI_UNSUPPORTED; + Status = EFI_UNSUPPORTED; + break; case TPM_RC_NV_AUTHORIZATION: - return EFI_SECURITY_VIOLATION; + Status = EFI_SECURITY_VIOLATION; + break; case TPM_RC_HANDLE + RC_NV_UndefineSpace_nvIndex: // TPM_RC_NV_DEFINED: - return EFI_NOT_FOUND; + Status = EFI_NOT_FOUND; + break; case TPM_RC_HANDLE + RC_NV_UndefineSpace_authHandle: // TPM_RC_NV_DEFINED: - return EFI_INVALID_PARAMETER; + Status = EFI_INVALID_PARAMETER; + break; case TPM_RC_VALUE + RC_NV_UndefineSpace_authHandle: case TPM_RC_VALUE + RC_NV_UndefineSpace_nvIndex: - return EFI_INVALID_PARAMETER; + Status = EFI_INVALID_PARAMETER; + break; default: - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + break; } - return EFI_SUCCESS; +Done: + // + // Clear AuthSession Content + // + ZeroMem (&SendBuffer, sizeof(SendBuffer)); + ZeroMem (&RecvBuffer, sizeof(RecvBuffer)); + return Status; } /** @@ -543,12 +570,13 @@ Tpm2NvRead ( RecvBufferSize = sizeof (RecvBuffer); Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer); if (EFI_ERROR (Status)) { - return Status; + goto Done; } if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) { DEBUG ((EFI_D_ERROR, "Tpm2NvRead - RecvBufferSize Error - %x\n", RecvBufferSize)); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode); if (ResponseCode != TPM_RC_SUCCESS) { @@ -559,30 +587,45 @@ Tpm2NvRead ( // return data break; case TPM_RC_NV_AUTHORIZATION: - return EFI_SECURITY_VIOLATION; + Status = EFI_SECURITY_VIOLATION; + break; case TPM_RC_NV_LOCKED: - return EFI_ACCESS_DENIED; + Status = EFI_ACCESS_DENIED; + break; case TPM_RC_NV_RANGE: - return EFI_BAD_BUFFER_SIZE; + Status = EFI_BAD_BUFFER_SIZE; + break; case TPM_RC_NV_UNINITIALIZED: - return EFI_NOT_READY; + Status = EFI_NOT_READY; + break; case TPM_RC_HANDLE + RC_NV_Read_nvIndex: // TPM_RC_NV_DEFINED: - return EFI_NOT_FOUND; + Status = EFI_NOT_FOUND; + break; case TPM_RC_HANDLE + RC_NV_Read_authHandle: // TPM_RC_NV_DEFINED: - return EFI_INVALID_PARAMETER; + Status = EFI_INVALID_PARAMETER; + break; case TPM_RC_VALUE + RC_NV_Read_nvIndex: case TPM_RC_VALUE + RC_NV_Read_authHandle: - return EFI_INVALID_PARAMETER; + Status = EFI_INVALID_PARAMETER; + break; case TPM_RC_BAD_AUTH + RC_NV_Read_authHandle + TPM_RC_S: - return EFI_INVALID_PARAMETER; + Status = EFI_INVALID_PARAMETER; + break; case TPM_RC_AUTH_UNAVAILABLE: - return EFI_INVALID_PARAMETER; + Status = EFI_INVALID_PARAMETER; + break; case TPM_RC_AUTH_FAIL + RC_NV_Read_authHandle + TPM_RC_S: - return EFI_INVALID_PARAMETER; - default: - return EFI_DEVICE_ERROR; + Status = EFI_INVALID_PARAMETER; + break; case TPM_RC_ATTRIBUTES + RC_NV_Read_authHandle + TPM_RC_S: - return EFI_UNSUPPORTED; + Status = EFI_UNSUPPORTED; + break; + default: + Status = EFI_DEVICE_ERROR; + break; + } + if (Status != EFI_SUCCESS) { + goto Done; } // @@ -591,7 +634,13 @@ Tpm2NvRead ( OutData->size = SwapBytes16 (RecvBuffer.Data.size); CopyMem (OutData->buffer, &RecvBuffer.Data.buffer, OutData->size); - return EFI_SUCCESS; +Done: + // + // Clear AuthSession Content + // + ZeroMem (&SendBuffer, sizeof(SendBuffer)); + ZeroMem (&RecvBuffer, sizeof(RecvBuffer)); + return Status; } /** @@ -661,12 +710,13 @@ Tpm2NvWrite ( RecvBufferSize = sizeof (RecvBuffer); Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer); if (EFI_ERROR (Status)) { - return Status; + goto Done; } if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) { DEBUG ((EFI_D_ERROR, "Tpm2NvWrite - RecvBufferSize Error - %x\n", RecvBufferSize)); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode); if (ResponseCode != TPM_RC_SUCCESS) { @@ -674,33 +724,54 @@ Tpm2NvWrite ( } switch (ResponseCode) { case TPM_RC_SUCCESS: - return EFI_SUCCESS; + // return data + break; case TPM_RC_ATTRIBUTES: - return EFI_UNSUPPORTED; + Status = EFI_UNSUPPORTED; + break; case TPM_RC_NV_AUTHORIZATION: - return EFI_SECURITY_VIOLATION; + Status = EFI_SECURITY_VIOLATION; + break; case TPM_RC_NV_LOCKED: - return EFI_ACCESS_DENIED; + Status = EFI_ACCESS_DENIED; + break; case TPM_RC_NV_RANGE: - return EFI_BAD_BUFFER_SIZE; + Status = EFI_BAD_BUFFER_SIZE; + break; case TPM_RC_HANDLE + RC_NV_Write_nvIndex: // TPM_RC_NV_DEFINED: - return EFI_NOT_FOUND; + Status = EFI_NOT_FOUND; + break; case TPM_RC_HANDLE + RC_NV_Write_authHandle: // TPM_RC_NV_DEFINED: - return EFI_INVALID_PARAMETER; + Status = EFI_INVALID_PARAMETER; + break; case TPM_RC_VALUE + RC_NV_Write_nvIndex: case TPM_RC_VALUE + RC_NV_Write_authHandle: - return EFI_INVALID_PARAMETER; + Status = EFI_INVALID_PARAMETER; + break; case TPM_RC_BAD_AUTH + RC_NV_Write_authHandle + TPM_RC_S: - return EFI_INVALID_PARAMETER; + Status = EFI_INVALID_PARAMETER; + break; case TPM_RC_AUTH_UNAVAILABLE: - return EFI_INVALID_PARAMETER; + Status = EFI_INVALID_PARAMETER; + break; case TPM_RC_AUTH_FAIL + RC_NV_Write_authHandle + TPM_RC_S: - return EFI_INVALID_PARAMETER; - default: - return EFI_DEVICE_ERROR; + Status = EFI_INVALID_PARAMETER; + break; case TPM_RC_ATTRIBUTES + RC_NV_Write_authHandle + TPM_RC_S: - return EFI_UNSUPPORTED; + Status = EFI_UNSUPPORTED; + break; + default: + Status = EFI_DEVICE_ERROR; + break; } + +Done: + // + // Clear AuthSession Content + // + ZeroMem (&SendBuffer, sizeof(SendBuffer)); + ZeroMem (&RecvBuffer, sizeof(RecvBuffer)); + return Status; } /** @@ -759,12 +830,13 @@ Tpm2NvReadLock ( RecvBufferSize = sizeof (RecvBuffer); Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer); if (EFI_ERROR (Status)) { - return Status; + goto Done; } if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) { DEBUG ((EFI_D_ERROR, "Tpm2NvReadLock - RecvBufferSize Error - %x\n", RecvBufferSize)); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode); @@ -776,10 +848,17 @@ Tpm2NvReadLock ( // return data break; default: - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + break; } - return EFI_SUCCESS; +Done: + // + // Clear AuthSession Content + // + ZeroMem (&SendBuffer, sizeof(SendBuffer)); + ZeroMem (&RecvBuffer, sizeof(RecvBuffer)); + return Status; } /** @@ -838,12 +917,13 @@ Tpm2NvWriteLock ( RecvBufferSize = sizeof (RecvBuffer); Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer); if (EFI_ERROR (Status)) { - return Status; + goto Done; } if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) { DEBUG ((EFI_D_ERROR, "Tpm2NvWriteLock - RecvBufferSize Error - %x\n", RecvBufferSize)); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode); @@ -855,10 +935,17 @@ Tpm2NvWriteLock ( // return data break; default: - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + break; } - return EFI_SUCCESS; +Done: + // + // Clear AuthSession Content + // + ZeroMem (&SendBuffer, sizeof(SendBuffer)); + ZeroMem (&RecvBuffer, sizeof(RecvBuffer)); + return Status; } /** @@ -914,12 +1001,13 @@ Tpm2NvGlobalWriteLock ( RecvBufferSize = sizeof (RecvBuffer); Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer); if (EFI_ERROR (Status)) { - return Status; + goto Done; } if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) { DEBUG ((EFI_D_ERROR, "Tpm2NvGlobalWriteLock - RecvBufferSize Error - %x\n", RecvBufferSize)); - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + goto Done; } ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode); @@ -931,8 +1019,15 @@ Tpm2NvGlobalWriteLock ( // return data break; default: - return EFI_DEVICE_ERROR; + Status = EFI_DEVICE_ERROR; + break; } - return EFI_SUCCESS; +Done: + // + // Clear AuthSession Content + // + ZeroMem (&SendBuffer, sizeof(SendBuffer)); + ZeroMem (&RecvBuffer, sizeof(RecvBuffer)); + return Status; }