REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3737 Apply uncrustify changes to .c/.h files in the SecurityPkg package Cc: Andrew Fish <afish@apple.com> Cc: Leif Lindholm <leif@nuviainc.com> Cc: Michael D Kinney <michael.d.kinney@intel.com> Signed-off-by: Michael Kubacki <michael.kubacki@microsoft.com> Reviewed-by: Jian J Wang <jian.j.wang@intel.com>
		
			
				
	
	
		
			216 lines
		
	
	
		
			7.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			216 lines
		
	
	
		
			7.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/** @file
 | 
						|
  Implement TPM2 DictionaryAttack related command.
 | 
						|
 | 
						|
Copyright (c) 2013 - 2016, Intel Corporation. All rights reserved. <BR>
 | 
						|
SPDX-License-Identifier: BSD-2-Clause-Patent
 | 
						|
 | 
						|
**/
 | 
						|
 | 
						|
#include <IndustryStandard/UefiTcgPlatform.h>
 | 
						|
#include <Library/Tpm2CommandLib.h>
 | 
						|
#include <Library/Tpm2DeviceLib.h>
 | 
						|
#include <Library/BaseMemoryLib.h>
 | 
						|
#include <Library/BaseLib.h>
 | 
						|
#include <Library/DebugLib.h>
 | 
						|
 | 
						|
#pragma pack(1)
 | 
						|
 | 
						|
typedef struct {
 | 
						|
  TPM2_COMMAND_HEADER    Header;
 | 
						|
  TPMI_RH_LOCKOUT        LockHandle;
 | 
						|
  UINT32                 AuthSessionSize;
 | 
						|
  TPMS_AUTH_COMMAND      AuthSession;
 | 
						|
} TPM2_DICTIONARY_ATTACK_LOCK_RESET_COMMAND;
 | 
						|
 | 
						|
typedef struct {
 | 
						|
  TPM2_RESPONSE_HEADER    Header;
 | 
						|
  UINT32                  AuthSessionSize;
 | 
						|
  TPMS_AUTH_RESPONSE      AuthSession;
 | 
						|
} TPM2_DICTIONARY_ATTACK_LOCK_RESET_RESPONSE;
 | 
						|
 | 
						|
typedef struct {
 | 
						|
  TPM2_COMMAND_HEADER    Header;
 | 
						|
  TPMI_RH_LOCKOUT        LockHandle;
 | 
						|
  UINT32                 AuthSessionSize;
 | 
						|
  TPMS_AUTH_COMMAND      AuthSession;
 | 
						|
  UINT32                 NewMaxTries;
 | 
						|
  UINT32                 NewRecoveryTime;
 | 
						|
  UINT32                 LockoutRecovery;
 | 
						|
} TPM2_DICTIONARY_ATTACK_PARAMETERS_COMMAND;
 | 
						|
 | 
						|
typedef struct {
 | 
						|
  TPM2_RESPONSE_HEADER    Header;
 | 
						|
  UINT32                  AuthSessionSize;
 | 
						|
  TPMS_AUTH_RESPONSE      AuthSession;
 | 
						|
} TPM2_DICTIONARY_ATTACK_PARAMETERS_RESPONSE;
 | 
						|
 | 
						|
#pragma pack()
 | 
						|
 | 
						|
/**
 | 
						|
  This command cancels the effect of a TPM lockout due to a number of successive authorization failures.
 | 
						|
  If this command is properly authorized, the lockout counter is set to zero.
 | 
						|
 | 
						|
  @param[in]  LockHandle            TPM_RH_LOCKOUT
 | 
						|
  @param[in]  AuthSession           Auth Session context
 | 
						|
 | 
						|
  @retval EFI_SUCCESS      Operation completed successfully.
 | 
						|
  @retval EFI_DEVICE_ERROR Unexpected device behavior.
 | 
						|
**/
 | 
						|
EFI_STATUS
 | 
						|
EFIAPI
 | 
						|
Tpm2DictionaryAttackLockReset (
 | 
						|
  IN  TPMI_RH_LOCKOUT    LockHandle,
 | 
						|
  IN  TPMS_AUTH_COMMAND  *AuthSession
 | 
						|
  )
 | 
						|
{
 | 
						|
  EFI_STATUS                                  Status;
 | 
						|
  TPM2_DICTIONARY_ATTACK_LOCK_RESET_COMMAND   SendBuffer;
 | 
						|
  TPM2_DICTIONARY_ATTACK_LOCK_RESET_RESPONSE  RecvBuffer;
 | 
						|
  UINT32                                      SendBufferSize;
 | 
						|
  UINT32                                      RecvBufferSize;
 | 
						|
  UINT8                                       *Buffer;
 | 
						|
  UINT32                                      SessionInfoSize;
 | 
						|
 | 
						|
  //
 | 
						|
  // Construct command
 | 
						|
  //
 | 
						|
  SendBuffer.Header.tag         = SwapBytes16 (TPM_ST_SESSIONS);
 | 
						|
  SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_DictionaryAttackLockReset);
 | 
						|
 | 
						|
  SendBuffer.LockHandle = SwapBytes32 (LockHandle);
 | 
						|
 | 
						|
  //
 | 
						|
  // Add in Auth session
 | 
						|
  //
 | 
						|
  Buffer = (UINT8 *)&SendBuffer.AuthSession;
 | 
						|
 | 
						|
  // sessionInfoSize
 | 
						|
  SessionInfoSize            = CopyAuthSessionCommand (AuthSession, Buffer);
 | 
						|
  Buffer                    += SessionInfoSize;
 | 
						|
  SendBuffer.AuthSessionSize = SwapBytes32 (SessionInfoSize);
 | 
						|
 | 
						|
  SendBufferSize              = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);
 | 
						|
  SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);
 | 
						|
 | 
						|
  //
 | 
						|
  // send Tpm command
 | 
						|
  //
 | 
						|
  RecvBufferSize = sizeof (RecvBuffer);
 | 
						|
  Status         = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);
 | 
						|
  if (EFI_ERROR (Status)) {
 | 
						|
    goto Done;
 | 
						|
  }
 | 
						|
 | 
						|
  if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {
 | 
						|
    DEBUG ((DEBUG_ERROR, "Tpm2DictionaryAttackLockReset - RecvBufferSize Error - %x\n", RecvBufferSize));
 | 
						|
    Status = EFI_DEVICE_ERROR;
 | 
						|
    goto Done;
 | 
						|
  }
 | 
						|
 | 
						|
  if (SwapBytes32 (RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {
 | 
						|
    DEBUG ((DEBUG_ERROR, "Tpm2DictionaryAttackLockReset - responseCode - %x\n", SwapBytes32 (RecvBuffer.Header.responseCode)));
 | 
						|
    Status = EFI_DEVICE_ERROR;
 | 
						|
    goto Done;
 | 
						|
  }
 | 
						|
 | 
						|
Done:
 | 
						|
  //
 | 
						|
  // Clear AuthSession Content
 | 
						|
  //
 | 
						|
  ZeroMem (&SendBuffer, sizeof (SendBuffer));
 | 
						|
  ZeroMem (&RecvBuffer, sizeof (RecvBuffer));
 | 
						|
  return Status;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  This command cancels the effect of a TPM lockout due to a number of successive authorization failures.
 | 
						|
  If this command is properly authorized, the lockout counter is set to zero.
 | 
						|
 | 
						|
  @param[in]  LockHandle            TPM_RH_LOCKOUT
 | 
						|
  @param[in]  AuthSession           Auth Session context
 | 
						|
  @param[in]  NewMaxTries           Count of authorization failures before the lockout is imposed
 | 
						|
  @param[in]  NewRecoveryTime       Time in seconds before the authorization failure count is automatically decremented
 | 
						|
  @param[in]  LockoutRecovery       Time in seconds after a lockoutAuth failure before use of lockoutAuth is allowed
 | 
						|
 | 
						|
  @retval EFI_SUCCESS      Operation completed successfully.
 | 
						|
  @retval EFI_DEVICE_ERROR Unexpected device behavior.
 | 
						|
**/
 | 
						|
EFI_STATUS
 | 
						|
EFIAPI
 | 
						|
Tpm2DictionaryAttackParameters (
 | 
						|
  IN  TPMI_RH_LOCKOUT    LockHandle,
 | 
						|
  IN  TPMS_AUTH_COMMAND  *AuthSession,
 | 
						|
  IN  UINT32             NewMaxTries,
 | 
						|
  IN  UINT32             NewRecoveryTime,
 | 
						|
  IN  UINT32             LockoutRecovery
 | 
						|
  )
 | 
						|
{
 | 
						|
  EFI_STATUS                                  Status;
 | 
						|
  TPM2_DICTIONARY_ATTACK_PARAMETERS_COMMAND   SendBuffer;
 | 
						|
  TPM2_DICTIONARY_ATTACK_PARAMETERS_RESPONSE  RecvBuffer;
 | 
						|
  UINT32                                      SendBufferSize;
 | 
						|
  UINT32                                      RecvBufferSize;
 | 
						|
  UINT8                                       *Buffer;
 | 
						|
  UINT32                                      SessionInfoSize;
 | 
						|
 | 
						|
  //
 | 
						|
  // Construct command
 | 
						|
  //
 | 
						|
  SendBuffer.Header.tag         = SwapBytes16 (TPM_ST_SESSIONS);
 | 
						|
  SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_DictionaryAttackParameters);
 | 
						|
 | 
						|
  SendBuffer.LockHandle = SwapBytes32 (LockHandle);
 | 
						|
 | 
						|
  //
 | 
						|
  // Add in Auth session
 | 
						|
  //
 | 
						|
  Buffer = (UINT8 *)&SendBuffer.AuthSession;
 | 
						|
 | 
						|
  // sessionInfoSize
 | 
						|
  SessionInfoSize            = CopyAuthSessionCommand (AuthSession, Buffer);
 | 
						|
  Buffer                    += SessionInfoSize;
 | 
						|
  SendBuffer.AuthSessionSize = SwapBytes32 (SessionInfoSize);
 | 
						|
 | 
						|
  //
 | 
						|
  // Real data
 | 
						|
  //
 | 
						|
  WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32 (NewMaxTries));
 | 
						|
  Buffer += sizeof (UINT32);
 | 
						|
  WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32 (NewRecoveryTime));
 | 
						|
  Buffer += sizeof (UINT32);
 | 
						|
  WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32 (LockoutRecovery));
 | 
						|
  Buffer += sizeof (UINT32);
 | 
						|
 | 
						|
  SendBufferSize              = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);
 | 
						|
  SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);
 | 
						|
 | 
						|
  //
 | 
						|
  // send Tpm command
 | 
						|
  //
 | 
						|
  RecvBufferSize = sizeof (RecvBuffer);
 | 
						|
  Status         = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);
 | 
						|
  if (EFI_ERROR (Status)) {
 | 
						|
    goto Done;
 | 
						|
  }
 | 
						|
 | 
						|
  if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {
 | 
						|
    DEBUG ((DEBUG_ERROR, "Tpm2DictionaryAttackParameters - RecvBufferSize Error - %x\n", RecvBufferSize));
 | 
						|
    Status = EFI_DEVICE_ERROR;
 | 
						|
    goto Done;
 | 
						|
  }
 | 
						|
 | 
						|
  if (SwapBytes32 (RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {
 | 
						|
    DEBUG ((DEBUG_ERROR, "Tpm2DictionaryAttackParameters - responseCode - %x\n", SwapBytes32 (RecvBuffer.Header.responseCode)));
 | 
						|
    Status = EFI_DEVICE_ERROR;
 | 
						|
    goto Done;
 | 
						|
  }
 | 
						|
 | 
						|
Done:
 | 
						|
  //
 | 
						|
  // Clear AuthSession Content
 | 
						|
  //
 | 
						|
  ZeroMem (&SendBufferSize, sizeof (SendBufferSize));
 | 
						|
  ZeroMem (&RecvBuffer, sizeof (RecvBuffer));
 | 
						|
  return Status;
 | 
						|
}
 |