• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /* Microsoft Reference Implementation for TPM 2.0
2  *
3  *  The copyright in this software is being made available under the BSD License,
4  *  included below. This software may be subject to other third party and
5  *  contributor rights, including patent rights, and no such rights are granted
6  *  under this license.
7  *
8  *  Copyright (c) Microsoft Corporation
9  *
10  *  All rights reserved.
11  *
12  *  BSD License
13  *
14  *  Redistribution and use in source and binary forms, with or without modification,
15  *  are permitted provided that the following conditions are met:
16  *
17  *  Redistributions of source code must retain the above copyright notice, this list
18  *  of conditions and the following disclaimer.
19  *
20  *  Redistributions in binary form must reproduce the above copyright notice, this
21  *  list of conditions and the following disclaimer in the documentation and/or
22  *  other materials provided with the distribution.
23  *
24  *  THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ""AS IS""
25  *  AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26  *  IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
27  *  DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR
28  *  ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
29  *  (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
30  *  LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
31  *  ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
32  *  (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33  *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34  */
35 #include "Tpm.h"
36 #include "HierarchyChangeAuth_fp.h"
37 
38 #if CC_HierarchyChangeAuth  // Conditional expansion of this file
39 
40 #include "Object_spt_fp.h"
41 
42 /*(See part 3 specification)
43 // Set a hierarchy authValue
44 */
45 //  Return Type: TPM_RC
46 //      TPM_RC_SIZE        'newAuth' size is greater than that of integrity hash
47 //                          digest
48 TPM_RC
TPM2_HierarchyChangeAuth(HierarchyChangeAuth_In * in)49 TPM2_HierarchyChangeAuth(
50     HierarchyChangeAuth_In  *in             // IN: input parameter list
51     )
52 {
53     // The command needs NV update.
54     RETURN_IF_NV_IS_NOT_AVAILABLE;
55 
56     // Make sure that the authorization value is a reasonable size (not larger than
57     // the size of the digest produced by the integrity hash. The integrity
58     // hash is assumed to produce the longest digest of any hash implemented
59     // on the TPM. This will also remove trailing zeros from the authValue.
60     if(MemoryRemoveTrailingZeros(&in->newAuth) > CONTEXT_INTEGRITY_HASH_SIZE)
61         return TPM_RCS_SIZE + RC_HierarchyChangeAuth_newAuth;
62 
63     // Set hierarchy authValue
64     switch(in->authHandle)
65     {
66         case TPM_RH_OWNER:
67             gp.ownerAuth = in->newAuth;
68             NV_SYNC_PERSISTENT(ownerAuth);
69             break;
70         case TPM_RH_ENDORSEMENT:
71             gp.endorsementAuth = in->newAuth;
72             NV_SYNC_PERSISTENT(endorsementAuth);
73             break;
74         case TPM_RH_PLATFORM:
75             gc.platformAuth = in->newAuth;
76             // orderly state should be cleared
77             g_clearOrderly = TRUE;
78             break;
79         case TPM_RH_LOCKOUT:
80             gp.lockoutAuth = in->newAuth;
81             NV_SYNC_PERSISTENT(lockoutAuth);
82             break;
83         default:
84             FAIL(FATAL_ERROR_INTERNAL);
85             break;
86     }
87 
88     return TPM_RC_SUCCESS;
89 }
90 
91 #endif // CC_HierarchyChangeAuth