From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id AE521D80127 for ; Mon, 18 Mar 2024 20:42:44 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=0DWOv41SNyHZPQO3PlkJo784zLWrTAHJA0s5ynhkGY4=; c=relaxed/simple; d=groups.io; h=From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:nodisclaimer:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Resent-Date:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20240206; t=1710794563; v=1; b=5XLqHSk6rEhzaeqyIdheNWmgjDTURNS7MrfN4eSaulvdZFiNHIsSayjv85gz/0kz4WHxLUL8 TI1Eig2u0VDwO7wYziAclp+YZBO8BwzgaMTbXhaPE5S3YysmX+lBYNyJr2NXvt/Rrl3vaGqnpXy X0L1qPRki5VEg0744qsSAhfuO+KiPLeplfhj/MCheD1phluYEQWvP0i8XAYMxf745C6AXdYo2LA I3SE9aUjiREK5TEZjTDjAb+V5T7q1u8LVXpTLCpEag3L/aIFKsAaHu88+0z/RWmc4IPle9pyruB rap1k72OFrODTF55wpNNP/evCCntZ+Y6o4fXmh0sNKLWw== X-Received: by 127.0.0.2 with SMTP id zvL4YY7687511x9biSOePBa7; Mon, 18 Mar 2024 13:42:43 -0700 X-Received: from EUR05-DB8-obe.outbound.protection.outlook.com (EUR05-DB8-obe.outbound.protection.outlook.com [40.107.20.97]) by mx.groups.io with SMTP id smtpd.web10.56278.1710794561919204677 for ; Mon, 18 Mar 2024 13:42:42 -0700 X-Received: from AS8PR08MB7791.eurprd08.prod.outlook.com (2603:10a6:20b:52d::6) by AM8PR08MB6545.eurprd08.prod.outlook.com (2603:10a6:20b:368::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7386.26; Mon, 18 Mar 2024 20:42:37 +0000 X-Received: from AS8PR08MB7791.eurprd08.prod.outlook.com ([fe80::8ed9:ec8b:75b7:f127]) by AS8PR08MB7791.eurprd08.prod.outlook.com ([fe80::8ed9:ec8b:75b7:f127%6]) with mapi id 15.20.7386.025; Mon, 18 Mar 2024 20:42:37 +0000 From: "Sunny Wang" To: "devel@edk2.groups.io" , Stuart Yoder , G Edhaya Chandran , "gaojie@byosoft.com.cn" CC: "ilias.apalodimas@linaro.org" , "heinrich.schuchardt@canonical.com" , Samer El-Haj-Mahmoud , "Jiewen.Yao@intel.com" , Sunny Wang Subject: Re: [edk2-devel] [PATCH v2 1/6] uefi-sct/SctPkg: TCG2 Protocol: add header with TCG2 protocol definitions Thread-Topic: [edk2-devel] [PATCH v2 1/6] uefi-sct/SctPkg: TCG2 Protocol: add header with TCG2 protocol definitions Thread-Index: AQHaQykkbZk5FzQQWkS6khK6hVjmEbE+YFsg Date: Mon, 18 Mar 2024 20:42:37 +0000 Message-ID: References: <20240109182053.2540542-1-stuart.yoder@arm.com> <20240109182053.2540542-2-stuart.yoder@arm.com> In-Reply-To: <20240109182053.2540542-2-stuart.yoder@arm.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ts-tracking-id: 4A2C8C9BBC643146904DEF4F6E605987.0 x-checkrecipientchecked: true x-ms-publictraffictype: Email x-ms-traffictypediagnostic: AS8PR08MB7791:EE_|AM8PR08MB6545:EE_ nodisclaimer: true x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: 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 x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?/WiI9PiuXwhnKlCS+YKalWUjXOELe243UtQ17nLXW5Zouwb7tu0nl/mSPldt?= =?us-ascii?Q?FeO39RsVXOj/rhXS9Dr18QRhHxm7D1BRihJGSUq3yyR/Hb5APoDhgqP5VE2Z?= =?us-ascii?Q?LEEF8Y0i1RTUifOXcZHJvGPDR3ldK+yGZ6ZscgASTgJwMnYUjVIYlgshzGAN?= =?us-ascii?Q?CVKcARllE18cx7aeG9tq0x7B7vJ1s4nXP3jOgzpxY662jLbfs70p87W9FJYl?= =?us-ascii?Q?3l4UJmR9Jdk2Sh9BHO+1lcN9IsX+A3K2viDYWhh6lMtTIwXluQ5e6G7i0wZ1?= =?us-ascii?Q?AtsCFTs7wy8H2UKeHVDKtV9bDsq/5RjTeJsBUBTl5M826jp3vPlbon+Mn18y?= =?us-ascii?Q?A/TnTJFygahcOkdKwBPPTZLseofIBfaoeimLoPKQDTDyQbNMyhzm8/i2wFhL?= =?us-ascii?Q?SE6kjPp77l2K5k93FfNdLFPVLxrP1yqRNqPapQl4iz1KPKzbw+NJLUZMPQ1B?= =?us-ascii?Q?TG/dAsQj8QQo4YOcDw5+RPHLqA9itBzWQArIvCWHVMxdlEJPXqXpt+QPYdab?= =?us-ascii?Q?6GYLesFJhcbJaT+1oYMogqs0S3wJo5aAE8rf9QUW2Ed2lFdeEMaQL3dx3h1X?= =?us-ascii?Q?xq9rzyV9/F8EnET5utclyHF00qdMh7olExZkjw80vaneqpHVdn4V8ViCiVUp?= =?us-ascii?Q?dk8hmPmU4GOD0CDXsQKYcXkAPl6GNTIzy8e7jk9jY6ojHWHrQtFkZq5KLiXp?= =?us-ascii?Q?mCct6uIhQ1/2EBhkP7Ha1C0GpOrLt+26YoAg6kNv31wNomKubPqOAUwkpwG8?= =?us-ascii?Q?pssZJov1jbmc9GQhzft7BWziWihsWp9DDybWPe/NuFXv6rYHfwB3YrX1FjZQ?= =?us-ascii?Q?kB2i38gg7e36qT5LkwwRtpDQbOert9cOBecjp5FS1t37IOj7m9GptJyuW3WK?= =?us-ascii?Q?kd0bi0ioYsF+nefeuyq27yxeQpoUwHLnAtQ0ddmxajK/QBZuuK6cvFjlhyqt?= =?us-ascii?Q?FRBEjSfPPxfqI+hvxgTg8CvunP/NNKI90ulBQ1rM1Po9RvdJqj58AKGafI5V?= =?us-ascii?Q?lE1aQnYiHmv+1bbFF+0TAM+maH4IVgks5H/LSm8OJWJqJe3J68AlwSMG4FUW?= =?us-ascii?Q?Mh5taS8lBUAxbGsf2rNoqfvfWxEEqXeLAE1ZTmtOtTeFJuD/buTy4ctWCIRT?= =?us-ascii?Q?5nTlKDgJVGuOk8XlScg58unGJS3wwjGsab5IQurnaACTzKq8F8ZcX1gf4+V6?= =?us-ascii?Q?XYdipUdLkJ64cyUSroCqF7ojKEHPCtNK1H4x+POLmncYPq8qSdK7Fw2IN5uL?= =?us-ascii?Q?+AUadU87aWxQW2VetN5UakW92CtPlrOarzAzTpfMsOSzJTXxZ+v1ULJR3GBb?= =?us-ascii?Q?x4UnSvJfowoe01SN97PGwPS5iKa/ASEMfysn7UzBmxt+cC+U/vehmoxzYACq?= =?us-ascii?Q?DIl1x/K9wrqbogKgUnh5jUElPPZvFU868xa7b63EnxCtZ6Q8CVY+UcbjsoSJ?= =?us-ascii?Q?0cHU6NHg9CH6b+E3bpc0vygqTZjKaAP48Z6ry/9XPwZsVTsK/aYmcGLX5nHg?= =?us-ascii?Q?wM5RM1Pofql0+ESJEt1vN4E95HocjD/GAKyxFvOPBweyacYUM5XxmLtfxYlt?= =?us-ascii?Q?xsP2QoLHPaHz9BZOioo=3D?= MIME-Version: 1.0 X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: AS8PR08MB7791.eurprd08.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: a124d3bc-13bf-4276-159f-08dc478bf266 X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Mar 2024 20:42:37.1995 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: owjfaxIp9v431eShHqGnY4HnWZ+VV9kKikP6UprE0DHYHStxI7B6VXtajIVKz0jlUikIrWPrQVURJT2aZ2BZBg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR08MB6545 Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Resent-Date: Mon, 18 Mar 2024 13:42:42 -0700 Reply-To: devel@edk2.groups.io,Sunny.Wang@arm.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: IVCbpnHt05xn3DHBAU2csdOMx7686176AA= Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b=5XLqHSk6; spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=arm.com (policy=none) Looks good to me. For others' reference, the change has been already verified by running Syst= emReady SIE (Security Interface extension) tests on multiple SystemReady ce= rtified Arm systems. Reviewed-by: Sunny Wang -----Original Message----- From: devel@edk2.groups.io On Behalf Of Stuart Yoder= via groups.io Sent: Tuesday, January 9, 2024 12:21 PM To: devel@edk2.groups.io; G Edhaya Chandran ; gaoj= ie@byosoft.com.cn Cc: ilias.apalodimas@linaro.org; heinrich.schuchardt@canonical.com; Samer E= l-Haj-Mahmoud ; Jiewen.Yao@intel.com Subject: [edk2-devel] [PATCH v2 1/6] uefi-sct/SctPkg: TCG2 Protocol: add he= ader with TCG2 protocol definitions From: Joseph Hemann Define constants and data structure specified in the TCG EFI Protocol specification. Signed-off-by: Joseph Hemann Signed-off-by: Stuart Yoder --- uefi-sct/SctPkg/UEFI/Protocol/TCG2.h | 177 ++++++++++++++++++++ 1 file changed, 177 insertions(+) diff --git a/uefi-sct/SctPkg/UEFI/Protocol/TCG2.h b/uefi-sct/SctPkg/UEFI/Pr= otocol/TCG2.h new file mode 100644 index 000000000000..e62ecd85cbe9 --- /dev/null +++ b/uefi-sct/SctPkg/UEFI/Protocol/TCG2.h @@ -0,0 +1,177 @@ +/** @file + + Copyright 2006 - 2016 Unified EFI, Inc.
+ Copyright (c) 2013 - 2016, Intel Corporation. All rights reserved.
+ Copyright (c) 2021 - 2023, Arm Inc. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ +/*++ + +Module Name: + + TCG2.h + +Abstract: + + EFI TCG Protocol + +--*/ + + +#ifndef __TCG2_PROTOCOL_H__ +#define __TCG2_PROTOCOL_H__ + +// +// Global ID for the TCG2 Protocol +// +#define EFI_TCG2_PROTOCOL_GUID \ + {0x607f766c, 0x7455, 0x42be, {0x93, 0x0b, 0xe4, 0xd7, 0x6d, 0xb2, 0x72,= 0x0f}} + +// Following defintions come from TCG2 Efi Protocol Spec +#define EFI_TCG2_BOOT_HASH_ALG_SHA1 0x00000001 + +#define EFI_TCG2_BOOT_HASH_ALG_SHA256 0x00000002 + +#define EFI_TCG2_BOOT_HASH_ALG_SHA384 0x00000004 + +#define EFI_TCG2_BOOT_HASH_ALG_SHA512 0x00000008 + +#define EFI_TCG2_BOOT_HASH_ALG_SM3_256 0x00000010 + +#define EFI_TCG2_EVENT_LOG_FORMAT_TCG_1_2 0x00000001 + +#define EFI_TCG2_EVENT_LOG_FORMAT_TCG_2 0x00000002 + +typedef struct _EFI_TCG2_PROTOCOL EFI_TCG2_PROTOCOL; + +typedef UINT32 EFI_TCG2_EVENT_LOG_BITMAP; + +typedef UINT32 EFI_TCG2_EVENT_LOG_FORMAT; + +typedef UINT32 EFI_TCG2_EVENT_ALGORITHM_BITMAP; + +typedef UINT32 TCG_PCRINDEX; + +typedef UINT32 TCG_EVENTTYPE; + +// Following struct defintions come from TCG2 Efi Protocol Spec +typedef struct { + UINT8 Major; + UINT8 Minor; +} EFI_TCG2_VERSION; + +typedef struct { + UINT8 Size; + EFI_TCG2_VERSION StructureVersion; + EFI_TCG2_VERSION ProtocolVersion; + EFI_TCG2_EVENT_ALGORITHM_BITMAP HashAlgorithmBitmap; + EFI_TCG2_EVENT_LOG_BITMAP SupportedEventLogs; + BOOLEAN TPMPresentFlag; + UINT16 MaxCommandSize; + UINT16 MaxResponseSize; + UINT32 ManufacturerID; + UINT32 NumberOfPcrBanks; + EFI_TCG2_EVENT_ALGORITHM_BITMAP ActivePcrBanks; +} EFI_TCG2_BOOT_SERVICE_CAPABILITY; + +typedef +EFI_STATUS +(EFIAPI *EFI_TCG2_GET_CAPABILITY) ( + IN EFI_TCG2_PROTOCOL *This, + IN OUT EFI_TCG2_BOOT_SERVICE_CAPABILITY *ProtocolCapability +); + +typedef +EFI_STATUS +(EFIAPI *EFI_TCG2_GET_EVENT_LOG) ( + IN EFI_TCG2_PROTOCOL *This, + IN EFI_TCG2_EVENT_LOG_FORMAT EventLogFormat, + OUT EFI_PHYSICAL_ADDRESS *EventLogLocation, + OUT EFI_PHYSICAL_ADDRESS *EventLogLastEntry, + OUT BOOLEAN *EventLogTruncated +); + +// all structs except EFI_TCG2_BOOT_SERVICE_CAPABILITY are packed +#pragma pack(1) + +typedef struct tdEFI_TCG2_EVENT_HEADER { + UINT32 HeaderSize; + UINT16 HeaderVersion; + TCG_PCRINDEX PCRIndex; + TCG_EVENTTYPE EventType; +} EFI_TCG2_EVENT_HEADER; + +typedef struct tdEFI_TCG2_EVENT { + UINT32 Size; + EFI_TCG2_EVENT_HEADER Header; + UINT8 Event[]; +} EFI_TCG2_EVENT; + +#pragma pack() + +typedef +EFI_STATUS +(EFIAPI * EFI_TCG2_HASH_LOG_EXTEND_EVENT) ( + IN EFI_TCG2_PROTOCOL *This, + IN UINT64 Flags, + IN EFI_PHYSICAL_ADDRESS DataToHash, + IN UINT64 DataToHashLen, + IN EFI_TCG2_EVENT *EfiTcgEvent +); + +typedef +EFI_STATUS +(EFIAPI *EFI_TCG2_SUBMIT_COMMAND) ( + IN EFI_TCG2_PROTOCOL *This, + IN UINT32 InputParameterBlockSize, + IN UINT8 *InputParameterBlock, + IN UINT32 OutputParameterBlockSize, + IN UINT8 *OutputParameterBlock +); + +typedef +EFI_STATUS +(EFIAPI *EFI_TCG2_GET_ACTIVE_PCR_BANKS) ( + IN EFI_TCG2_PROTOCOL *This, + OUT UINT32 *ActivePcrBanks +); + +typedef +EFI_STATUS +(EFIAPI *EFI_TCG2_SET_ACTIVE_PCR_BANKS) ( + IN EFI_TCG2_PROTOCOL *This, + IN UINT32 ActivePcrBanks +); + +typedef +EFI_STATUS +(EFIAPI * EFI_TCG2_GET_RESULT_OF_SET_ACTIVE_PCR_BANKS) ( + IN EFI_TCG2_PROTOCOL *This, + OUT UINT32 *OperationPresent, + OUT UINT32 *Response +); + +// +// Interface structure for the TCG2 Protocol +// +struct _EFI_TCG2_PROTOCOL { + EFI_TCG2_GET_CAPABILITY GetCapability; + EFI_TCG2_GET_EVENT_LOG GetEventLog; + EFI_TCG2_HASH_LOG_EXTEND_EVENT HashLogExtendEvent; + EFI_TCG2_SUBMIT_COMMAND SubmitCommand; + EFI_TCG2_GET_ACTIVE_PCR_BANKS GetActivePcrBanks; + EFI_TCG2_SET_ACTIVE_PCR_BANKS SetActivePcrBanks; + EFI_TCG2_GET_RESULT_OF_SET_ACTIVE_PCR_BANKS GetResultOfSetActivePcrBanks= ; +}; + +extern EFI_GUID gEfiTcg2ProtocolGuid; + +#endif -- 2.34.1 -=3D-=3D-=3D-=3D-=3D-=3D Groups.io Links: You receive all messages sent to this group. View/Reply Online (#113490): https://edk2.groups.io/g/devel/message/113490 Mute This Topic: https://groups.io/mt/103625305/5985097 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [Sunny.Wang@arm.com] -=3D-=3D-=3D-=3D-=3D-=3D IMPORTANT NOTICE: The contents of this email and any attachments are confid= ential and may also be privileged. If you are not the intended recipient, p= lease notify the sender immediately and do not disclose the contents to any= other person, use it for any purpose, or store or copy the information in = any medium. Thank you. -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#116845): https://edk2.groups.io/g/devel/message/116845 Mute This Topic: https://groups.io/mt/103625305/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-