/********************************************************************************/ /* */ /* Command Audit */ /* Written by Ken Goldman */ /* IBM Thomas J. Watson Research Center */ /* */ /* Licenses and Notices */ /* */ /* 1. Copyright Licenses: */ /* */ /* - Trusted Computing Group (TCG) grants to the user of the source code in */ /* this specification (the "Source Code") a worldwide, irrevocable, */ /* nonexclusive, royalty free, copyright license to reproduce, create */ /* derivative works, distribute, display and perform the Source Code and */ /* derivative works thereof, and to grant others the rights granted herein. */ /* */ /* - The TCG grants to the user of the other parts of the specification */ /* (other than the Source Code) the rights to reproduce, distribute, */ /* display, and perform the specification solely for the purpose of */ /* developing products based on such documents. */ /* */ /* 2. Source Code Distribution Conditions: */ /* */ /* - Redistributions of Source Code must retain the above copyright licenses, */ /* this list of conditions and the following disclaimers. */ /* */ /* - Redistributions in binary form must reproduce the above copyright */ /* licenses, this list of conditions and the following disclaimers in the */ /* documentation and/or other materials provided with the distribution. */ /* */ /* 3. Disclaimers: */ /* */ /* - THE COPYRIGHT LICENSES SET FORTH ABOVE DO NOT REPRESENT ANY FORM OF */ /* LICENSE OR WAIVER, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, WITH */ /* RESPECT TO PATENT RIGHTS HELD BY TCG MEMBERS (OR OTHER THIRD PARTIES) */ /* THAT MAY BE NECESSARY TO IMPLEMENT THIS SPECIFICATION OR OTHERWISE. */ /* Contact TCG Administration (admin@trustedcomputinggroup.org) for */ /* information on specification licensing rights available through TCG */ /* membership agreements. */ /* */ /* - THIS SPECIFICATION IS PROVIDED "AS IS" WITH NO EXPRESS OR IMPLIED */ /* WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY OR */ /* FITNESS FOR A PARTICULAR PURPOSE, ACCURACY, COMPLETENESS, OR */ /* NONINFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS, OR ANY WARRANTY */ /* OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE. */ /* */ /* - Without limitation, TCG and its members and licensors disclaim all */ /* liability, including liability for infringement of any proprietary */ /* rights, relating to use of information in this specification and to the */ /* implementation of this specification, and TCG disclaims all liability for */ /* cost of procurement of substitute goods or services, lost profits, loss */ /* of use, loss of data or any incidental, consequential, direct, indirect, */ /* or special damages, whether under contract, tort, warranty or otherwise, */ /* arising in any way out of use or reliance upon this specification or any */ /* information herein. */ /* */ /* (c) Copyright IBM Corp. and others, 2016 - 2024 */ /* */ /********************************************************************************/ #include "Tpm.h" #include "SetCommandCodeAuditStatus_fp.h" extern int verbose; #if CC_SetCommandCodeAuditStatus // Conditional expansion of this file TPM_RC TPM2_SetCommandCodeAuditStatus( SetCommandCodeAuditStatus_In *in // IN: input parameter list ) { if (verbose) { FILE *f = fopen("trace.txt", "a"); fprintf(f, "TPM2_SetCommandCodeAuditStatus: auth %08x\n", in->auth); fclose(f); } // The command needs NV update. Check if NV is available. // A TPM_RC_NV_UNAVAILABLE or TPM_RC_NV_RATE error may be returned at // this point RETURN_IF_NV_IS_NOT_AVAILABLE; // Internal Data Update // Update hash algorithm if(in->auditAlg != TPM_ALG_NULL && in->auditAlg != gp.auditHashAlg) { // Can't change the algorithm and command list at the same time if(in->setList.count != 0 || in->clearList.count != 0) return TPM_RCS_VALUE + RC_SetCommandCodeAuditStatus_auditAlg; // Change the hash algorithm for audit gp.auditHashAlg = in->auditAlg; // Set the digest size to a unique value that indicates that the digest // algorithm has been changed. The size will be cleared to zero in the // command audit processing on exit. gr.commandAuditDigest.t.size = 1; // Save the change of command audit data (this sets g_updateNV so that NV // will be updated on exit.) NV_SYNC_PERSISTENT(auditHashAlg); } else { UINT32 i; BOOL changed = FALSE; // Process set list for(i = 0; i < in->setList.count; i++) // If change is made in CommandAuditSet, set changed flag if(CommandAuditSet(in->setList.commandCodes[i])) changed = TRUE; // Process clear list for(i = 0; i < in->clearList.count; i++) // If change is made in CommandAuditClear, set changed flag if(CommandAuditClear(in->clearList.commandCodes[i])) changed = TRUE; // if change was made to command list, update NV if(changed) // this sets g_updateNV so that NV will be updated on exit. NV_SYNC_PERSISTENT(auditCommands); } return TPM_RC_SUCCESS; } #endif // CC_SetCommandCodeAuditStatus