1 /* Microsoft Reference Implementation for TPM 2.0
2 *
3 * The copyright in this software is being made available under the BSD License,
4 * included below. This software may be subject to other third party and
5 * contributor rights, including patent rights, and no such rights are granted
6 * under this license.
7 *
8 * Copyright (c) Microsoft Corporation
9 *
10 * All rights reserved.
11 *
12 * BSD License
13 *
14 * Redistribution and use in source and binary forms, with or without modification,
15 * are permitted provided that the following conditions are met:
16 *
17 * Redistributions of source code must retain the above copyright notice, this list
18 * of conditions and the following disclaimer.
19 *
20 * Redistributions in binary form must reproduce the above copyright notice, this
21 * list of conditions and the following disclaimer in the documentation and/or
22 * other materials provided with the distribution.
23 *
24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ""AS IS""
25 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
27 * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR
28 * ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
29 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
30 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
31 * ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
32 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34 */
35 #include "Tpm.h"
36 #include "HierarchyChangeAuth_fp.h"
37
38 #if CC_HierarchyChangeAuth // Conditional expansion of this file
39
40 #include "Object_spt_fp.h"
41
42 /*(See part 3 specification)
43 // Set a hierarchy authValue
44 */
45 // Return Type: TPM_RC
46 // TPM_RC_SIZE 'newAuth' size is greater than that of integrity hash
47 // digest
48 TPM_RC
TPM2_HierarchyChangeAuth(HierarchyChangeAuth_In * in)49 TPM2_HierarchyChangeAuth(
50 HierarchyChangeAuth_In *in // IN: input parameter list
51 )
52 {
53 // The command needs NV update.
54 RETURN_IF_NV_IS_NOT_AVAILABLE;
55
56 // Make sure that the authorization value is a reasonable size (not larger than
57 // the size of the digest produced by the integrity hash. The integrity
58 // hash is assumed to produce the longest digest of any hash implemented
59 // on the TPM. This will also remove trailing zeros from the authValue.
60 if(MemoryRemoveTrailingZeros(&in->newAuth) > CONTEXT_INTEGRITY_HASH_SIZE)
61 return TPM_RCS_SIZE + RC_HierarchyChangeAuth_newAuth;
62
63 // Set hierarchy authValue
64 switch(in->authHandle)
65 {
66 case TPM_RH_OWNER:
67 gp.ownerAuth = in->newAuth;
68 NV_SYNC_PERSISTENT(ownerAuth);
69 break;
70 case TPM_RH_ENDORSEMENT:
71 gp.endorsementAuth = in->newAuth;
72 NV_SYNC_PERSISTENT(endorsementAuth);
73 break;
74 case TPM_RH_PLATFORM:
75 gc.platformAuth = in->newAuth;
76 // orderly state should be cleared
77 g_clearOrderly = TRUE;
78 break;
79 case TPM_RH_LOCKOUT:
80 gp.lockoutAuth = in->newAuth;
81 NV_SYNC_PERSISTENT(lockoutAuth);
82 break;
83 default:
84 FAIL(FATAL_ERROR_INTERNAL);
85 break;
86 }
87
88 return TPM_RC_SUCCESS;
89 }
90
91 #endif // CC_HierarchyChangeAuth