blob: c270b16078eabeb5e898203622e24041ce8841eb [file] [log] [blame]
// This file was extracted from the TCG Published
// Trusted Platform Module Library
// Part 3: Commands
// Family "2.0"
// Level 00 Revision 01.16
// October 30, 2014
#include "InternalRoutines.h"
#include "PCR_Extend_fp.h"
//
//
// Error Returns Meaning
//
// TPM_RC_LOCALITY current command locality is not allowed to extend the PCR
// referenced by pcrHandle
//
TPM_RC
TPM2_PCR_Extend(
PCR_Extend_In *in // IN: input parameter list
)
{
TPM_RC result;
UINT32 i;
// Input Validation
// NOTE: This function assumes that the unmarshaling function for 'digests' will
// have validated that all of the indicated hash algorithms are valid. If the
// hash algorithms are correct, the unmarshaling code will unmarshal a digest
// of the size indicated by the hash algorithm. If the overall size is not
// consistent, the unmarshaling code will run out of input data or have input
// data left over. In either case, it will cause an unmarshaling error and this
// function will not be called.
// For NULL handle, do nothing and return success
if(in->pcrHandle == TPM_RH_NULL)
return TPM_RC_SUCCESS;
// Check if the extend operation is allowed by the current command locality
if(!PCRIsExtendAllowed(in->pcrHandle))
return TPM_RC_LOCALITY;
// If PCR is state saved and we need to update orderlyState, check NV
// availability
if(PCRIsStateSaved(in->pcrHandle) && gp.orderlyState != SHUTDOWN_NONE)
{
result = NvIsAvailable();
if(result != TPM_RC_SUCCESS) return result;
g_clearOrderly = TRUE;
}
// Internal Data Update
// Iterate input digest list to extend
for(i = 0; i < in->digests.count; i++)
{
PCRExtend(in->pcrHandle, in->digests.digests[i].hashAlg,
CryptGetHashDigestSize(in->digests.digests[i].hashAlg),
(BYTE *) &in->digests.digests[i].digest);
}
return TPM_RC_SUCCESS;
}