What to do: 1. Merge from Auth Variable driver in SecurityPkg to Variable drive in MdeModulePkg. Then the merged Variable driver in MdeModulePkg will link to AuthVariableLib and TpmMeasurementLib. AuthVariableLibNull and TpmMeasurementLibNull in MdeModulePkg could be used for non auth variable support. AuthVariableLib and DxeTpmMeasurementLib in SecurityPkg may be used for auth variable support. Why to do: 1. Remove code duplication and reduce maintenance effort. After auth variable service separated from Auth Variable driver in SecurityPkg to AuthVariableLib. The remaining code logic of Auth Variable driver in SecurityPkg will be almost same with Variable driver in MdeModulePkg. Now it is to merge them. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Star Zeng <star.zeng@intel.com> Reviewed-by: Jiewen Yao <jiewen.yao@intel.com> Reviewed-by: Liming Gao <liming.gao@intel.com> git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@17765 6f19259b-4bc3-4df7-8a09-765794883524
257 lines
8.9 KiB
C
257 lines
8.9 KiB
C
/** @file
|
|
Provides variable driver extended services.
|
|
|
|
Copyright (c) 2015, Intel Corporation. All rights reserved.<BR>
|
|
This program and the accompanying materials
|
|
are licensed and made available under the terms and conditions of the BSD License
|
|
which accompanies this distribution. The full text of the license may be found at
|
|
http://opensource.org/licenses/bsd-license.php
|
|
|
|
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
|
|
|
**/
|
|
|
|
#include "Variable.h"
|
|
|
|
/**
|
|
Finds variable in storage blocks of volatile and non-volatile storage areas.
|
|
|
|
This code finds variable in storage blocks of volatile and non-volatile storage areas.
|
|
If VariableName is an empty string, then we just return the first
|
|
qualified variable without comparing VariableName and VendorGuid.
|
|
|
|
@param[in] VariableName Name of the variable to be found.
|
|
@param[in] VendorGuid Variable vendor GUID to be found.
|
|
@param[out] AuthVariableInfo Pointer to AUTH_VARIABLE_INFO structure for
|
|
output of the variable found.
|
|
|
|
@retval EFI_INVALID_PARAMETER If VariableName is not an empty string,
|
|
while VendorGuid is NULL.
|
|
@retval EFI_SUCCESS Variable successfully found.
|
|
@retval EFI_NOT_FOUND Variable not found
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
VariableExLibFindVariable (
|
|
IN CHAR16 *VariableName,
|
|
IN EFI_GUID *VendorGuid,
|
|
OUT AUTH_VARIABLE_INFO *AuthVariableInfo
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
VARIABLE_POINTER_TRACK Variable;
|
|
AUTHENTICATED_VARIABLE_HEADER *AuthVariable;
|
|
|
|
Status = FindVariable (
|
|
VariableName,
|
|
VendorGuid,
|
|
&Variable,
|
|
&mVariableModuleGlobal->VariableGlobal,
|
|
FALSE
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
AuthVariableInfo->Data = NULL;
|
|
AuthVariableInfo->DataSize = 0;
|
|
AuthVariableInfo->Attributes = 0;
|
|
AuthVariableInfo->PubKeyIndex = 0;
|
|
AuthVariableInfo->MonotonicCount = 0;
|
|
AuthVariableInfo->TimeStamp = NULL;
|
|
return Status;
|
|
}
|
|
|
|
AuthVariableInfo->DataSize = DataSizeOfVariable (Variable.CurrPtr);
|
|
AuthVariableInfo->Data = GetVariableDataPtr (Variable.CurrPtr);
|
|
AuthVariableInfo->Attributes = Variable.CurrPtr->Attributes;
|
|
if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
|
|
AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) Variable.CurrPtr;
|
|
AuthVariableInfo->PubKeyIndex = AuthVariable->PubKeyIndex;
|
|
AuthVariableInfo->MonotonicCount = AuthVariable->MonotonicCount;
|
|
AuthVariableInfo->TimeStamp = &AuthVariable->TimeStamp;
|
|
}
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
Finds next variable in storage blocks of volatile and non-volatile storage areas.
|
|
|
|
This code finds next variable in storage blocks of volatile and non-volatile storage areas.
|
|
If VariableName is an empty string, then we just return the first
|
|
qualified variable without comparing VariableName and VendorGuid.
|
|
|
|
@param[in] VariableName Name of the variable to be found.
|
|
@param[in] VendorGuid Variable vendor GUID to be found.
|
|
@param[out] AuthVariableInfo Pointer to AUTH_VARIABLE_INFO structure for
|
|
output of the next variable.
|
|
|
|
@retval EFI_INVALID_PARAMETER If VariableName is not an empty string,
|
|
while VendorGuid is NULL.
|
|
@retval EFI_SUCCESS Variable successfully found.
|
|
@retval EFI_NOT_FOUND Variable not found
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
VariableExLibFindNextVariable (
|
|
IN CHAR16 *VariableName,
|
|
IN EFI_GUID *VendorGuid,
|
|
OUT AUTH_VARIABLE_INFO *AuthVariableInfo
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
VARIABLE_HEADER *VariablePtr;
|
|
AUTHENTICATED_VARIABLE_HEADER *AuthVariablePtr;
|
|
|
|
Status = VariableServiceGetNextVariableInternal (
|
|
VariableName,
|
|
VendorGuid,
|
|
&VariablePtr
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
AuthVariableInfo->VariableName = NULL;
|
|
AuthVariableInfo->VendorGuid = NULL;
|
|
AuthVariableInfo->Data = NULL;
|
|
AuthVariableInfo->DataSize = 0;
|
|
AuthVariableInfo->Attributes = 0;
|
|
AuthVariableInfo->PubKeyIndex = 0;
|
|
AuthVariableInfo->MonotonicCount = 0;
|
|
AuthVariableInfo->TimeStamp = NULL;
|
|
return Status;
|
|
}
|
|
|
|
AuthVariableInfo->VariableName = GetVariableNamePtr (VariablePtr);
|
|
AuthVariableInfo->VendorGuid = GetVendorGuidPtr (VariablePtr);
|
|
AuthVariableInfo->DataSize = DataSizeOfVariable (VariablePtr);
|
|
AuthVariableInfo->Data = GetVariableDataPtr (VariablePtr);
|
|
AuthVariableInfo->Attributes = VariablePtr->Attributes;
|
|
if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
|
|
AuthVariablePtr = (AUTHENTICATED_VARIABLE_HEADER *) VariablePtr;
|
|
AuthVariableInfo->PubKeyIndex = AuthVariablePtr->PubKeyIndex;
|
|
AuthVariableInfo->MonotonicCount = AuthVariablePtr->MonotonicCount;
|
|
AuthVariableInfo->TimeStamp = &AuthVariablePtr->TimeStamp;
|
|
}
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
Update the variable region with Variable information.
|
|
|
|
@param[in] AuthVariableInfo Pointer AUTH_VARIABLE_INFO structure for
|
|
input of the variable.
|
|
|
|
@retval EFI_SUCCESS The update operation is success.
|
|
@retval EFI_INVALID_PARAMETER Invalid parameter.
|
|
@retval EFI_WRITE_PROTECTED Variable is write-protected.
|
|
@retval EFI_OUT_OF_RESOURCES There is not enough resource.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
VariableExLibUpdateVariable (
|
|
IN AUTH_VARIABLE_INFO *AuthVariableInfo
|
|
)
|
|
{
|
|
VARIABLE_POINTER_TRACK Variable;
|
|
|
|
FindVariable (AuthVariableInfo->VariableName, AuthVariableInfo->VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE);
|
|
return UpdateVariable (
|
|
AuthVariableInfo->VariableName,
|
|
AuthVariableInfo->VendorGuid,
|
|
AuthVariableInfo->Data,
|
|
AuthVariableInfo->DataSize,
|
|
AuthVariableInfo->Attributes,
|
|
AuthVariableInfo->PubKeyIndex,
|
|
AuthVariableInfo->MonotonicCount,
|
|
&Variable,
|
|
AuthVariableInfo->TimeStamp
|
|
);
|
|
}
|
|
|
|
/**
|
|
Get scratch buffer.
|
|
|
|
@param[in, out] ScratchBufferSize Scratch buffer size. If input size is greater than
|
|
the maximum supported buffer size, this value contains
|
|
the maximum supported buffer size as output.
|
|
@param[out] ScratchBuffer Pointer to scratch buffer address.
|
|
|
|
@retval EFI_SUCCESS Get scratch buffer successfully.
|
|
@retval EFI_UNSUPPORTED If input size is greater than the maximum supported buffer size.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
VariableExLibGetScratchBuffer (
|
|
IN OUT UINTN *ScratchBufferSize,
|
|
OUT VOID **ScratchBuffer
|
|
)
|
|
{
|
|
UINTN MaxBufferSize;
|
|
|
|
MaxBufferSize = mVariableModuleGlobal->ScratchBufferSize;
|
|
if (*ScratchBufferSize > MaxBufferSize) {
|
|
*ScratchBufferSize = MaxBufferSize;
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
|
|
*ScratchBuffer = GetEndPointer ((VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase));
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
This function is to check if the remaining variable space is enough to set
|
|
all Variables from argument list successfully. The purpose of the check
|
|
is to keep the consistency of the Variables to be in variable storage.
|
|
|
|
Note: Variables are assumed to be in same storage.
|
|
The set sequence of Variables will be same with the sequence of VariableEntry from argument list,
|
|
so follow the argument sequence to check the Variables.
|
|
|
|
@param[in] Attributes Variable attributes for Variable entries.
|
|
@param ... The variable argument list with type VARIABLE_ENTRY_CONSISTENCY *.
|
|
A NULL terminates the list. The VariableSize of
|
|
VARIABLE_ENTRY_CONSISTENCY is the variable data size as input.
|
|
It will be changed to variable total size as output.
|
|
|
|
@retval TRUE Have enough variable space to set the Variables successfully.
|
|
@retval FALSE No enough variable space to set the Variables successfully.
|
|
|
|
**/
|
|
BOOLEAN
|
|
EFIAPI
|
|
VariableExLibCheckRemainingSpaceForConsistency (
|
|
IN UINT32 Attributes,
|
|
...
|
|
)
|
|
{
|
|
VA_LIST Marker;
|
|
BOOLEAN Return;
|
|
|
|
VA_START (Marker, Attributes);
|
|
|
|
Return = CheckRemainingSpaceForConsistencyInternal (Attributes, Marker);
|
|
|
|
VA_END (Marker);
|
|
|
|
return Return;
|
|
}
|
|
|
|
/**
|
|
Return TRUE if at OS runtime.
|
|
|
|
@retval TRUE If at OS runtime.
|
|
@retval FALSE If at boot time.
|
|
|
|
**/
|
|
BOOLEAN
|
|
EFIAPI
|
|
VariableExLibAtRuntime (
|
|
VOID
|
|
)
|
|
{
|
|
return AtRuntime ();
|
|
}
|