SecurityPkg[all]
0.98
|
Functions | |
EFI_STATUS EFIAPI | Tpm2HashSequenceStart (IN TPMI_ALG_HASH HashAlg, OUT TPMI_DH_OBJECT *SequenceHandle) |
EFI_STATUS EFIAPI | Tpm2SequenceUpdate (IN TPMI_DH_OBJECT SequenceHandle, IN TPM2B_MAX_BUFFER *Buffer) |
EFI_STATUS EFIAPI | Tpm2EventSequenceComplete (IN TPMI_DH_PCR PcrHandle, IN TPMI_DH_OBJECT SequenceHandle, IN TPM2B_MAX_BUFFER *Buffer, OUT TPML_DIGEST_VALUES *Results) |
EFI_STATUS EFIAPI | Tpm2SequenceComplete (IN TPMI_DH_OBJECT SequenceHandle, IN TPM2B_MAX_BUFFER *Buffer, OUT TPM2B_DIGEST *Result) |
EFI_STATUS EFIAPI | Tpm2Startup (IN TPM_SU StartupType) |
EFI_STATUS EFIAPI | Tpm2Shutdown (IN TPM_SU ShutdownType) |
EFI_STATUS EFIAPI | Tpm2SelfTest (IN TPMI_YES_NO FullTest) |
EFI_STATUS EFIAPI | Tpm2SetPrimaryPolicy (IN TPMI_RH_HIERARCHY_AUTH AuthHandle, IN TPMS_AUTH_COMMAND *AuthSession, IN TPM2B_DIGEST *AuthPolicy, IN TPMI_ALG_HASH HashAlg) |
EFI_STATUS EFIAPI | Tpm2Clear (IN TPMI_RH_CLEAR AuthHandle, IN TPMS_AUTH_COMMAND *AuthSession) |
EFI_STATUS EFIAPI | Tpm2ClearControl (IN TPMI_RH_CLEAR AuthHandle, IN TPMS_AUTH_COMMAND *AuthSession, IN TPMI_YES_NO Disable) |
EFI_STATUS EFIAPI | Tpm2HierarchyChangeAuth (IN TPMI_RH_HIERARCHY_AUTH AuthHandle, IN TPMS_AUTH_COMMAND *AuthSession, IN TPM2B_AUTH *NewAuth) |
EFI_STATUS EFIAPI | Tpm2ChangeEPS (IN TPMI_RH_PLATFORM AuthHandle, IN TPMS_AUTH_COMMAND *AuthSession) |
EFI_STATUS EFIAPI | Tpm2ChangePPS (IN TPMI_RH_PLATFORM AuthHandle, IN TPMS_AUTH_COMMAND *AuthSession) |
EFI_STATUS EFIAPI | Tpm2HierarchyControl (IN TPMI_RH_HIERARCHY AuthHandle, IN TPMS_AUTH_COMMAND *AuthSession, IN TPMI_RH_HIERARCHY Hierarchy, IN TPMI_YES_NO State) |
EFI_STATUS EFIAPI | Tpm2DictionaryAttackLockReset (IN TPMI_RH_LOCKOUT LockHandle, IN TPMS_AUTH_COMMAND *AuthSession) |
EFI_STATUS EFIAPI | Tpm2DictionaryAttackParameters (IN TPMI_RH_LOCKOUT LockHandle, IN TPMS_AUTH_COMMAND *AuthSession, IN UINT32 NewMaxTries, IN UINT32 NewRecoveryTime, IN UINT32 LockoutRecovery) |
EFI_STATUS EFIAPI | Tpm2NvReadPublic (IN TPMI_RH_NV_INDEX NvIndex, OUT TPM2B_NV_PUBLIC *NvPublic, OUT TPM2B_NAME *NvName) |
EFI_STATUS EFIAPI | Tpm2NvDefineSpace (IN TPMI_RH_PROVISION AuthHandle, IN TPMS_AUTH_COMMAND *AuthSession, IN TPM2B_AUTH *Auth, IN TPM2B_NV_PUBLIC *NvPublic) |
EFI_STATUS EFIAPI | Tpm2NvUndefineSpace (IN TPMI_RH_PROVISION AuthHandle, IN TPMI_RH_NV_INDEX NvIndex, IN TPMS_AUTH_COMMAND *AuthSession) |
EFI_STATUS EFIAPI | Tpm2NvRead (IN TPMI_RH_NV_AUTH AuthHandle, IN TPMI_RH_NV_INDEX NvIndex, IN TPMS_AUTH_COMMAND *AuthSession, IN UINT16 Size, IN UINT16 Offset, IN OUT TPM2B_MAX_BUFFER *OutData) |
EFI_STATUS EFIAPI | Tpm2NvWrite (IN TPMI_RH_NV_AUTH AuthHandle, IN TPMI_RH_NV_INDEX NvIndex, IN TPMS_AUTH_COMMAND *AuthSession, IN TPM2B_MAX_BUFFER *InData, IN UINT16 Offset) |
EFI_STATUS EFIAPI | Tpm2NvReadLock (IN TPMI_RH_NV_AUTH AuthHandle, IN TPMI_RH_NV_INDEX NvIndex, IN TPMS_AUTH_COMMAND *AuthSession) |
EFI_STATUS EFIAPI | Tpm2NvWriteLock (IN TPMI_RH_NV_AUTH AuthHandle, IN TPMI_RH_NV_INDEX NvIndex, IN TPMS_AUTH_COMMAND *AuthSession) |
EFI_STATUS EFIAPI | Tpm2NvGlobalWriteLock (IN TPMI_RH_PROVISION AuthHandle, IN TPMS_AUTH_COMMAND *AuthSession) |
EFI_STATUS EFIAPI | Tpm2PcrExtend (IN TPMI_DH_PCR PcrHandle, IN TPML_DIGEST_VALUES *Digests) |
EFI_STATUS EFIAPI | Tpm2PcrEvent (IN TPMI_DH_PCR PcrHandle, IN TPM2B_EVENT *EventData, OUT TPML_DIGEST_VALUES *Digests) |
EFI_STATUS EFIAPI | Tpm2PcrRead (IN TPML_PCR_SELECTION *PcrSelectionIn, OUT UINT32 *PcrUpdateCounter, OUT TPML_PCR_SELECTION *PcrSelectionOut, OUT TPML_DIGEST *PcrValues) |
EFI_STATUS EFIAPI | Tpm2PcrAllocate (IN TPMI_RH_PLATFORM AuthHandle, IN TPMS_AUTH_COMMAND *AuthSession, IN TPML_PCR_SELECTION *PcrAllocation, OUT TPMI_YES_NO *AllocationSuccess, OUT UINT32 *MaxPCR, OUT UINT32 *SizeNeeded, OUT UINT32 *SizeAvailable) |
EFI_STATUS EFIAPI | Tpm2PcrAllocateBanks (IN TPM2B_AUTH *PlatformAuth, IN UINT32 SupportedPCRBanks, IN UINT32 PCRBanks) |
EFI_STATUS EFIAPI | Tpm2GetCapability (IN TPM_CAP Capability, IN UINT32 Property, IN UINT32 PropertyCount, OUT TPMI_YES_NO *MoreData, OUT TPMS_CAPABILITY_DATA *CapabilityData) |
EFI_STATUS EFIAPI | Tpm2GetCapabilityFamily (OUT CHAR8 *Family) |
EFI_STATUS EFIAPI | Tpm2GetCapabilityManufactureID (OUT UINT32 *ManufactureId) |
EFI_STATUS EFIAPI | Tpm2GetCapabilityFirmwareVersion (OUT UINT32 *FirmwareVersion1, OUT UINT32 *FirmwareVersion2) |
EFI_STATUS EFIAPI | Tpm2GetCapabilityMaxCommandResponseSize (OUT UINT32 *MaxCommandSize, OUT UINT32 *MaxResponseSize) |
EFI_STATUS EFIAPI | Tpm2GetCapabilitySupportedAlg (OUT TPML_ALG_PROPERTY *AlgList) |
EFI_STATUS EFIAPI | Tpm2GetCapabilityLockoutCounter (OUT UINT32 *LockoutCounter) |
EFI_STATUS EFIAPI | Tpm2GetCapabilityLockoutInterval (OUT UINT32 *LockoutInterval) |
EFI_STATUS EFIAPI | Tpm2GetCapabilityInputBufferSize (OUT UINT32 *InputBufferSize) |
EFI_STATUS EFIAPI | Tpm2GetCapabilityPcrs (OUT TPML_PCR_SELECTION *Pcrs) |
EFI_STATUS EFIAPI | Tpm2GetCapabilitySupportedAndActivePcrs (OUT UINT32 *TpmHashAlgorithmBitmap, OUT UINT32 *ActivePcrBanks) |
EFI_STATUS EFIAPI | Tpm2GetCapabilityAlgorithmSet (OUT UINT32 *AlgorithmSet) |
EFI_STATUS EFIAPI | Tpm2GetCapabilityIsCommandImplemented (IN TPM_CC Command, OUT BOOLEAN *IsCmdImpl) |
EFI_STATUS EFIAPI | Tpm2TestParms (IN TPMT_PUBLIC_PARMS *Parameters) |
EFI_STATUS EFIAPI | Tpm2SetAlgorithmSet (IN TPMI_RH_PLATFORM AuthHandle, IN TPMS_AUTH_COMMAND *AuthSession, IN UINT32 AlgorithmSet) |
EFI_STATUS EFIAPI | Tpm2StartAuthSession (IN TPMI_DH_OBJECT TpmKey, IN TPMI_DH_ENTITY Bind, IN TPM2B_NONCE *NonceCaller, IN TPM2B_ENCRYPTED_SECRET *Salt, IN TPM_SE SessionType, IN TPMT_SYM_DEF *Symmetric, IN TPMI_ALG_HASH AuthHash, OUT TPMI_SH_AUTH_SESSION *SessionHandle, OUT TPM2B_NONCE *NonceTPM) |
EFI_STATUS EFIAPI | Tpm2FlushContext (IN TPMI_DH_CONTEXT FlushHandle) |
EFI_STATUS EFIAPI | Tpm2PolicySecret (IN TPMI_DH_ENTITY AuthHandle, IN TPMI_SH_POLICY PolicySession, IN TPMS_AUTH_COMMAND *AuthSession, IN TPM2B_NONCE *NonceTPM, IN TPM2B_DIGEST *CpHashA, IN TPM2B_NONCE *PolicyRef, IN INT32 Expiration, OUT TPM2B_TIMEOUT *Timeout, OUT TPMT_TK_AUTH *PolicyTicket) |
EFI_STATUS EFIAPI | Tpm2PolicyOR (IN TPMI_SH_POLICY PolicySession, IN TPML_DIGEST *HashList) |
EFI_STATUS EFIAPI | Tpm2PolicyCommandCode (IN TPMI_SH_POLICY PolicySession, IN TPM_CC Code) |
EFI_STATUS EFIAPI | Tpm2PolicyGetDigest (IN TPMI_SH_POLICY PolicySession, OUT TPM2B_DIGEST *PolicyHash) |
EFI_STATUS EFIAPI | Tpm2ReadPublic (IN TPMI_DH_OBJECT ObjectHandle, OUT TPM2B_PUBLIC *OutPublic, OUT TPM2B_NAME *Name, OUT TPM2B_NAME *QualifiedName) |
UINT32 EFIAPI | CopyAuthSessionCommand (IN TPMS_AUTH_COMMAND *AuthSessionIn, OUT UINT8 *AuthSessionOut) |
UINT32 EFIAPI | CopyAuthSessionResponse (IN UINT8 *AuthSessionIn, OUT TPMS_AUTH_RESPONSE *AuthSessionOut) |
UINT16 EFIAPI | GetHashSizeFromAlgo (IN TPMI_ALG_HASH HashAlgo) |
UINT32 EFIAPI | GetHashMaskFromAlgo (IN TPMI_ALG_HASH HashAlgo) |
BOOLEAN EFIAPI | IsHashAlgSupportedInHashAlgorithmMask (IN TPMI_ALG_HASH HashAlg, IN UINT32 HashAlgorithmMask) |
VOID *EFIAPI | CopyDigestListToBuffer (IN OUT VOID *Buffer, IN TPML_DIGEST_VALUES *DigestList, IN UINT32 HashAlgorithmMask) |
UINT32 EFIAPI | GetDigestListSize (IN TPML_DIGEST_VALUES *DigestList) |
EFI_STATUS EFIAPI | GetDigestFromDigestList (IN TPMI_ALG_HASH HashAlg, IN TPML_DIGEST_VALUES *DigestList, OUT VOID *Digest) |
This library is used by other modules to send TPM2 command.
Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent
UINT32 EFIAPI CopyAuthSessionCommand | ( | IN TPMS_AUTH_COMMAND * | AuthSessionIn, |
OUT UINT8 * | AuthSessionOut | ||
) |
Copy AuthSessionIn to TPM2 command buffer.
[in] | AuthSessionIn | Input AuthSession data |
[out] | AuthSessionOut | Output AuthSession data in TPM2 command buffer |
UINT32 EFIAPI CopyAuthSessionResponse | ( | IN UINT8 * | AuthSessionIn, |
OUT TPMS_AUTH_RESPONSE * | AuthSessionOut | ||
) |
Copy AuthSessionIn from TPM2 response buffer.
[in] | AuthSessionIn | Input AuthSession data in TPM2 response buffer |
[out] | AuthSessionOut | Output AuthSession data |
VOID* EFIAPI CopyDigestListToBuffer | ( | IN OUT VOID * | Buffer, |
IN TPML_DIGEST_VALUES * | DigestList, | ||
IN UINT32 | HashAlgorithmMask | ||
) |
Copy TPML_DIGEST_VALUES into a buffer
[in,out] | Buffer | Buffer to hold copied TPML_DIGEST_VALUES compact binary. |
[in] | DigestList | TPML_DIGEST_VALUES to be copied. |
[in] | HashAlgorithmMask | HASH bits corresponding to the desired digests to copy. |
EFI_STATUS EFIAPI GetDigestFromDigestList | ( | IN TPMI_ALG_HASH | HashAlg, |
IN TPML_DIGEST_VALUES * | DigestList, | ||
OUT VOID * | Digest | ||
) |
This function get digest from digest list.
[in] | HashAlg | Digest algorithm |
[in] | DigestList | Digest list |
[out] | Digest | Digest |
EFI_SUCCESS | Digest is found and returned. |
EFI_NOT_FOUND | Digest is not found. |
UINT32 EFIAPI GetDigestListSize | ( | IN TPML_DIGEST_VALUES * | DigestList | ) |
Get TPML_DIGEST_VALUES data size.
[in] | DigestList | TPML_DIGEST_VALUES data. |
UINT32 EFIAPI GetHashMaskFromAlgo | ( | IN TPMI_ALG_HASH | HashAlgo | ) |
Get hash mask from algorithm.
[in] | HashAlgo | Hash algorithm |
UINT16 EFIAPI GetHashSizeFromAlgo | ( | IN TPMI_ALG_HASH | HashAlgo | ) |
Return size of digest.
[in] | HashAlgo | Hash algorithm |
BOOLEAN EFIAPI IsHashAlgSupportedInHashAlgorithmMask | ( | IN TPMI_ALG_HASH | HashAlg, |
IN UINT32 | HashAlgorithmMask | ||
) |
Return if hash alg is supported in HashAlgorithmMask.
HashAlg | Hash algorithm to be checked. |
HashAlgorithmMask | Bitfield of allowed hash algorithms. |
TRUE | Hash algorithm is supported. |
FALSE | Hash algorithm is not supported. |
EFI_STATUS EFIAPI Tpm2ChangeEPS | ( | IN TPMI_RH_PLATFORM | AuthHandle, |
IN TPMS_AUTH_COMMAND * | AuthSession | ||
) |
This replaces the current EPS with a value from the RNG and sets the Endorsement hierarchy controls to their default initialization values.
[in] | AuthHandle | TPM_RH_PLATFORM+{PP} |
[in] | AuthSession | Auth Session context |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2ChangePPS | ( | IN TPMI_RH_PLATFORM | AuthHandle, |
IN TPMS_AUTH_COMMAND * | AuthSession | ||
) |
This replaces the current PPS with a value from the RNG and sets platformPolicy to the default initialization value (the Empty Buffer).
[in] | AuthHandle | TPM_RH_PLATFORM+{PP} |
[in] | AuthSession | Auth Session context |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2Clear | ( | IN TPMI_RH_CLEAR | AuthHandle, |
IN TPMS_AUTH_COMMAND * | AuthSession | ||
) |
This command removes all TPM context associated with a specific Owner.
[in] | AuthHandle | TPM_RH_LOCKOUT or TPM_RH_PLATFORM+{PP} |
[in] | AuthSession | Auth Session context |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2ClearControl | ( | IN TPMI_RH_CLEAR | AuthHandle, |
IN TPMS_AUTH_COMMAND * | AuthSession, | ||
IN TPMI_YES_NO | Disable | ||
) |
Disables and enables the execution of TPM2_Clear().
[in] | AuthHandle | TPM_RH_LOCKOUT or TPM_RH_PLATFORM+{PP} |
[in] | AuthSession | Auth Session context |
[in] | Disable | YES if the disableOwnerClear flag is to be SET, NO if the flag is to be CLEAR. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2DictionaryAttackLockReset | ( | IN TPMI_RH_LOCKOUT | LockHandle, |
IN TPMS_AUTH_COMMAND * | AuthSession | ||
) |
This command cancels the effect of a TPM lockout due to a number of successive authorization failures. If this command is properly authorized, the lockout counter is set to zero.
[in] | LockHandle | LockHandle |
[in] | AuthSession | Auth Session context |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2DictionaryAttackParameters | ( | IN TPMI_RH_LOCKOUT | LockHandle, |
IN TPMS_AUTH_COMMAND * | AuthSession, | ||
IN UINT32 | NewMaxTries, | ||
IN UINT32 | NewRecoveryTime, | ||
IN UINT32 | LockoutRecovery | ||
) |
This command cancels the effect of a TPM lockout due to a number of successive authorization failures. If this command is properly authorized, the lockout counter is set to zero.
[in] | LockHandle | LockHandle |
[in] | AuthSession | Auth Session context |
[in] | NewMaxTries | Count of authorization failures before the lockout is imposed |
[in] | NewRecoveryTime | Time in seconds before the authorization failure count is automatically decremented |
[in] | LockoutRecovery | Time in seconds after a lockoutAuth failure before use of lockoutAuth is allowed |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2EventSequenceComplete | ( | IN TPMI_DH_PCR | PcrHandle, |
IN TPMI_DH_OBJECT | SequenceHandle, | ||
IN TPM2B_MAX_BUFFER * | Buffer, | ||
OUT TPML_DIGEST_VALUES * | Results | ||
) |
This command adds the last part of data, if any, to an Event sequence and returns the result in a digest list. If pcrHandle references a PCR and not TPM_RH_NULL, then the returned digest list is processed in the same manner as the digest list input parameter to TPM2_PCR_Extend() with the pcrHandle in each bank extended with the associated digest value.
[in] | PcrHandle | PCR to be extended with the Event data |
[in] | SequenceHandle | Authorization for the sequence |
[in] | Buffer | Data to be added to the Event |
[out] | Results | List of digests computed for the PCR |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2FlushContext | ( | IN TPMI_DH_CONTEXT | FlushHandle | ) |
This command causes all context associated with a loaded object or session to be removed from TPM memory.
[in] | FlushHandle | The handle of the item to flush. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2GetCapability | ( | IN TPM_CAP | Capability, |
IN UINT32 | Property, | ||
IN UINT32 | PropertyCount, | ||
OUT TPMI_YES_NO * | MoreData, | ||
OUT TPMS_CAPABILITY_DATA * | CapabilityData | ||
) |
This command returns various information regarding the TPM and its current state.
The capability parameter determines the category of data returned. The property parameter selects the first value of the selected category to be returned. If there is no property that corresponds to the value of property, the next higher value is returned, if it exists. The moreData parameter will have a value of YES if there are more values of the requested type that were not returned. If no next capability exists, the TPM will return a zero-length list and moreData will have a value of NO.
NOTE: To simplify this function, leave returned CapabilityData for caller to unpack since there are many capability categories and only few categories will be used in firmware. It means the caller need swap the byte order for the fields in CapabilityData.
[in] | Capability | Group selection; determines the format of the response. |
[in] | Property | Further definition of information. |
[in] | PropertyCount | Number of properties of the indicated type to return. |
[out] | MoreData | Flag to indicate if there are more values of this type. |
[out] | CapabilityData | The capability data. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2GetCapabilityAlgorithmSet | ( | OUT UINT32 * | AlgorithmSet | ) |
This command returns the information of TPM AlgorithmSet.
This function parse the value got from TPM2_GetCapability and return the AlgorithmSet.
[out] | AlgorithmSet | The AlgorithmSet of TPM. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2GetCapabilityFamily | ( | OUT CHAR8 * | Family | ) |
This command returns the information of TPM Family.
This function parse the value got from TPM2_GetCapability and return the Family.
[out] | Family | The Family of TPM. (a 4-octet character string) |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2GetCapabilityFirmwareVersion | ( | OUT UINT32 * | FirmwareVersion1, |
OUT UINT32 * | FirmwareVersion2 | ||
) |
This command returns the information of TPM FirmwareVersion.
This function parse the value got from TPM2_GetCapability and return the TPM FirmwareVersion.
[out] | FirmwareVersion1 | The FirmwareVersion1. |
[out] | FirmwareVersion2 | The FirmwareVersion2. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2GetCapabilityInputBufferSize | ( | OUT UINT32 * | InputBufferSize | ) |
This command returns the information of TPM InputBufferSize.
This function parse the value got from TPM2_GetCapability and return the InputBufferSize.
[out] | InputBufferSize | The InputBufferSize of TPM. the maximum size of a parameter (typically, a TPM2B_MAX_BUFFER) |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2GetCapabilityIsCommandImplemented | ( | IN TPM_CC | Command, |
OUT BOOLEAN * | IsCmdImpl | ||
) |
This function will query if the command is supported.
In] | Command TPM_CC command starts from TPM_CC_FIRST. | |
[out] | IsCmdImpl | The command is supported or not. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2GetCapabilityLockoutCounter | ( | OUT UINT32 * | LockoutCounter | ) |
This command returns the information of TPM LockoutCounter.
This function parse the value got from TPM2_GetCapability and return the LockoutCounter.
[out] | LockoutCounter | The LockoutCounter of TPM. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2GetCapabilityLockoutInterval | ( | OUT UINT32 * | LockoutInterval | ) |
This command returns the information of TPM LockoutInterval.
This function parse the value got from TPM2_GetCapability and return the LockoutInterval.
[out] | LockoutInterval | The LockoutInterval of TPM. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2GetCapabilityManufactureID | ( | OUT UINT32 * | ManufactureId | ) |
This command returns the information of TPM manufacture ID.
This function parse the value got from TPM2_GetCapability and return the TPM manufacture ID.
[out] | ManufactureId | The manufacture ID of TPM. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2GetCapabilityMaxCommandResponseSize | ( | OUT UINT32 * | MaxCommandSize, |
OUT UINT32 * | MaxResponseSize | ||
) |
This command returns the information of the maximum value for commandSize and responseSize in a command.
This function parse the value got from TPM2_GetCapability and return the max command size and response size
[out] | MaxCommandSize | The maximum value for commandSize in a command. |
[out] | MaxResponseSize | The maximum value for responseSize in a command. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2GetCapabilityPcrs | ( | OUT TPML_PCR_SELECTION * | Pcrs | ) |
This command returns the information of TPM PCRs.
This function parse the value got from TPM2_GetCapability and return the PcrSelection.
[out] | Pcrs | The Pcr Selection |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2GetCapabilitySupportedAlg | ( | OUT TPML_ALG_PROPERTY * | AlgList | ) |
This command returns Returns a list of TPMS_ALG_PROPERTIES. Each entry is an algorithm ID and a set of properties of the algorithm.
This function parse the value got from TPM2_GetCapability and return the list.
[out] | AlgList | List of algorithm. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2GetCapabilitySupportedAndActivePcrs | ( | OUT UINT32 * | TpmHashAlgorithmBitmap, |
OUT UINT32 * | ActivePcrBanks | ||
) |
This function will query the TPM to determine which hashing algorithms are supported and which PCR banks are currently active.
[out] | TpmHashAlgorithmBitmap | A bitmask containing the algorithms supported by the TPM. |
[out] | ActivePcrBanks | A bitmask containing the PCRs currently allocated. |
EFI_SUCCESS | TPM was successfully queried and return values can be trusted. |
Others | An error occurred, likely in communication with the TPM. |
EFI_STATUS EFIAPI Tpm2HashSequenceStart | ( | IN TPMI_ALG_HASH | HashAlg, |
OUT TPMI_DH_OBJECT * | SequenceHandle | ||
) |
This command starts a hash or an Event sequence. If hashAlg is an implemented hash, then a hash sequence is started. If hashAlg is TPM_ALG_NULL, then an Event sequence is started.
[in] | HashAlg | The hash algorithm to use for the hash sequence An Event sequence starts if this is TPM_ALG_NULL. |
[out] | SequenceHandle | A handle to reference the sequence |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2HierarchyChangeAuth | ( | IN TPMI_RH_HIERARCHY_AUTH | AuthHandle, |
IN TPMS_AUTH_COMMAND * | AuthSession, | ||
IN TPM2B_AUTH * | NewAuth | ||
) |
This command allows the authorization secret for a hierarchy or lockout to be changed using the current authorization value as the command authorization.
[in] | AuthHandle | TPM_RH_LOCKOUT, TPM_RH_ENDORSEMENT, TPM_RH_OWNER or TPM_RH_PLATFORM+{PP} |
[in] | AuthSession | Auth Session context |
[in] | NewAuth | New authorization secret |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2HierarchyControl | ( | IN TPMI_RH_HIERARCHY | AuthHandle, |
IN TPMS_AUTH_COMMAND * | AuthSession, | ||
IN TPMI_RH_HIERARCHY | Hierarchy, | ||
IN TPMI_YES_NO | State | ||
) |
This command enables and disables use of a hierarchy.
[in] | AuthHandle | TPM_RH_ENDORSEMENT, TPM_RH_OWNER or TPM_RH_PLATFORM+{PP} |
[in] | AuthSession | Auth Session context |
[in] | Hierarchy | Hierarchy of the enable being modified |
[in] | State | YES if the enable should be SET, NO if the enable should be CLEAR |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2NvDefineSpace | ( | IN TPMI_RH_PROVISION | AuthHandle, |
IN TPMS_AUTH_COMMAND * | AuthSession, | ||
IN TPM2B_AUTH * | Auth, | ||
IN TPM2B_NV_PUBLIC * | NvPublic | ||
) |
This command defines the attributes of an NV Index and causes the TPM to reserve space to hold the data associated with the index. If a definition already exists at the index, the TPM will return TPM_RC_NV_DEFINED.
[in] | AuthHandle | TPM_RH_OWNER or TPM_RH_PLATFORM+{PP}. |
[in] | AuthSession | Auth Session context |
[in] | Auth | The authorization data. |
[in] | NvPublic | The public area of the index. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_ALREADY_STARTED | The command was returned successfully, but NvIndex is already defined. |
EFI_STATUS EFIAPI Tpm2NvGlobalWriteLock | ( | IN TPMI_RH_PROVISION | AuthHandle, |
IN TPMS_AUTH_COMMAND * | AuthSession | ||
) |
The command will SET TPMA_NV_WRITELOCKED for all indexes that have their TPMA_NV_GLOBALLOCK attribute SET.
[in] | AuthHandle | TPM_RH_OWNER or TPM_RH_PLATFORM+{PP}. |
[in] | AuthSession | Auth Session context |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_NOT_FOUND | The command was returned successfully, but NvIndex is not found. |
EFI_STATUS EFIAPI Tpm2NvRead | ( | IN TPMI_RH_NV_AUTH | AuthHandle, |
IN TPMI_RH_NV_INDEX | NvIndex, | ||
IN TPMS_AUTH_COMMAND * | AuthSession, | ||
IN UINT16 | Size, | ||
IN UINT16 | Offset, | ||
IN OUT TPM2B_MAX_BUFFER * | OutData | ||
) |
This command reads a value from an area in NV memory previously defined by TPM2_NV_DefineSpace().
[in] | AuthHandle | the handle indicating the source of the authorization value. |
[in] | NvIndex | The index to be read. |
[in] | AuthSession | Auth Session context |
[in] | Size | Number of bytes to read. |
[in] | Offset | Byte offset into the area. |
[in,out] | OutData | The data read. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_NOT_FOUND | The command was returned successfully, but NvIndex is not found. |
EFI_STATUS EFIAPI Tpm2NvReadLock | ( | IN TPMI_RH_NV_AUTH | AuthHandle, |
IN TPMI_RH_NV_INDEX | NvIndex, | ||
IN TPMS_AUTH_COMMAND * | AuthSession | ||
) |
This command may be used to prevent further reads of the Index until the next TPM2_Startup (TPM_SU_CLEAR).
[in] | AuthHandle | the handle indicating the source of the authorization value. |
[in] | NvIndex | The NV Index of the area to lock. |
[in] | AuthSession | Auth Session context |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_NOT_FOUND | The command was returned successfully, but NvIndex is not found. |
EFI_STATUS EFIAPI Tpm2NvReadPublic | ( | IN TPMI_RH_NV_INDEX | NvIndex, |
OUT TPM2B_NV_PUBLIC * | NvPublic, | ||
OUT TPM2B_NAME * | NvName | ||
) |
This command is used to read the public area and Name of an NV Index.
[in] | NvIndex | The NV Index. |
[out] | NvPublic | The public area of the index. |
[out] | NvName | The Name of the nvIndex. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2NvUndefineSpace | ( | IN TPMI_RH_PROVISION | AuthHandle, |
IN TPMI_RH_NV_INDEX | NvIndex, | ||
IN TPMS_AUTH_COMMAND * | AuthSession | ||
) |
This command removes an index from the TPM.
[in] | AuthHandle | TPM_RH_OWNER or TPM_RH_PLATFORM+{PP}. |
[in] | NvIndex | The NV Index. |
[in] | AuthSession | Auth Session context |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_NOT_FOUND | The command was returned successfully, but NvIndex is not found. |
EFI_STATUS EFIAPI Tpm2NvWrite | ( | IN TPMI_RH_NV_AUTH | AuthHandle, |
IN TPMI_RH_NV_INDEX | NvIndex, | ||
IN TPMS_AUTH_COMMAND * | AuthSession, | ||
IN TPM2B_MAX_BUFFER * | InData, | ||
IN UINT16 | Offset | ||
) |
This command writes a value to an area in NV memory that was previously defined by TPM2_NV_DefineSpace().
[in] | AuthHandle | the handle indicating the source of the authorization value. |
[in] | NvIndex | The NV Index of the area to write. |
[in] | AuthSession | Auth Session context |
[in] | InData | The data to write. |
[in] | Offset | The offset into the NV Area. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_NOT_FOUND | The command was returned successfully, but NvIndex is not found. |
EFI_STATUS EFIAPI Tpm2NvWriteLock | ( | IN TPMI_RH_NV_AUTH | AuthHandle, |
IN TPMI_RH_NV_INDEX | NvIndex, | ||
IN TPMS_AUTH_COMMAND * | AuthSession | ||
) |
This command may be used to inhibit further writes of the Index.
[in] | AuthHandle | the handle indicating the source of the authorization value. |
[in] | NvIndex | The NV Index of the area to lock. |
[in] | AuthSession | Auth Session context |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_NOT_FOUND | The command was returned successfully, but NvIndex is not found. |
EFI_STATUS EFIAPI Tpm2PcrAllocate | ( | IN TPMI_RH_PLATFORM | AuthHandle, |
IN TPMS_AUTH_COMMAND * | AuthSession, | ||
IN TPML_PCR_SELECTION * | PcrAllocation, | ||
OUT TPMI_YES_NO * | AllocationSuccess, | ||
OUT UINT32 * | MaxPCR, | ||
OUT UINT32 * | SizeNeeded, | ||
OUT UINT32 * | SizeAvailable | ||
) |
This command is used to set the desired PCR allocation of PCR and algorithms.
[in] | AuthHandle | TPM_RH_PLATFORM+{PP} |
[in] | AuthSession | Auth Session context |
[in] | PcrAllocation | The requested allocation |
[out] | AllocationSuccess | YES if the allocation succeeded |
[out] | MaxPCR | maximum number of PCR that may be in a bank |
[out] | SizeNeeded | number of octets required to satisfy the request |
[out] | SizeAvailable | Number of octets available. Computed before the allocation |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2PcrAllocateBanks | ( | IN TPM2B_AUTH * | PlatformAuth, |
IN UINT32 | SupportedPCRBanks, | ||
IN UINT32 | PCRBanks | ||
) |
Alloc PCR data.
[in] | PlatformAuth | platform auth value. NULL means no platform auth change. |
[in] | SupportedPCRBanks | Supported PCR banks |
[in] | PCRBanks | PCR banks |
EFI_SUCCESS | Operation completed successfully. |
EFI_STATUS EFIAPI Tpm2PcrEvent | ( | IN TPMI_DH_PCR | PcrHandle, |
IN TPM2B_EVENT * | EventData, | ||
OUT TPML_DIGEST_VALUES * | Digests | ||
) |
This command is used to cause an update to the indicated PCR. The data in eventData is hashed using the hash algorithm associated with each bank in which the indicated PCR has been allocated. After the data is hashed, the digests list is returned. If the pcrHandle references an implemented PCR and not TPM_ALG_NULL, digests list is processed as in TPM2_PCR_Extend(). A TPM shall support an Event.size of zero through 1,024 inclusive.
[in] | PcrHandle | Handle of the PCR |
[in] | EventData | Event data in sized buffer |
[out] | Digests | List of digest |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2PcrExtend | ( | IN TPMI_DH_PCR | PcrHandle, |
IN TPML_DIGEST_VALUES * | Digests | ||
) |
This command is used to cause an update to the indicated PCR. The digests parameter contains one or more tagged digest value identified by an algorithm ID. For each digest, the PCR associated with pcrHandle is Extended into the bank identified by the tag (hashAlg).
[in] | PcrHandle | Handle of the PCR |
[in] | Digests | List of tagged digest values to be extended |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2PcrRead | ( | IN TPML_PCR_SELECTION * | PcrSelectionIn, |
OUT UINT32 * | PcrUpdateCounter, | ||
OUT TPML_PCR_SELECTION * | PcrSelectionOut, | ||
OUT TPML_DIGEST * | PcrValues | ||
) |
This command returns the values of all PCR specified in pcrSelect.
[in] | PcrSelectionIn | The selection of PCR to read. |
[out] | PcrUpdateCounter | The current value of the PCR update counter. |
[out] | PcrSelectionOut | The PCR in the returned list. |
[out] | PcrValues | The contents of the PCR indicated in pcrSelect. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2PolicyCommandCode | ( | IN TPMI_SH_POLICY | PolicySession, |
IN TPM_CC | Code | ||
) |
This command indicates that the authorization will be limited to a specific command code.
[in] | PolicySession | Handle for the policy session being extended. |
[in] | Code | The allowed commandCode. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2PolicyGetDigest | ( | IN TPMI_SH_POLICY | PolicySession, |
OUT TPM2B_DIGEST * | PolicyHash | ||
) |
This command returns the current policyDigest of the session. This command allows the TPM to be used to perform the actions required to precompute the authPolicy for an object.
[in] | PolicySession | Handle for the policy session. |
[out] | PolicyHash | the current value of the policyHash of policySession. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2PolicyOR | ( | IN TPMI_SH_POLICY | PolicySession, |
IN TPML_DIGEST * | HashList | ||
) |
This command allows options in authorizations without requiring that the TPM evaluate all of the options. If a policy may be satisfied by different sets of conditions, the TPM need only evaluate one set that satisfies the policy. This command will indicate that one of the required sets of conditions has been satisfied.
[in] | PolicySession | Handle for the policy session being extended. |
[in] | HashList | the list of hashes to check for a match. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2PolicySecret | ( | IN TPMI_DH_ENTITY | AuthHandle, |
IN TPMI_SH_POLICY | PolicySession, | ||
IN TPMS_AUTH_COMMAND * | AuthSession, | ||
IN TPM2B_NONCE * | NonceTPM, | ||
IN TPM2B_DIGEST * | CpHashA, | ||
IN TPM2B_NONCE * | PolicyRef, | ||
IN INT32 | Expiration, | ||
OUT TPM2B_TIMEOUT * | Timeout, | ||
OUT TPMT_TK_AUTH * | PolicyTicket | ||
) |
This command includes a secret-based authorization to a policy. The caller proves knowledge of the secret value using an authorization session using the authValue associated with authHandle.
[in] | AuthHandle | Handle for an entity providing the authorization |
[in] | PolicySession | Handle for the policy session being extended. |
[in] | AuthSession | Auth Session context |
[in] | NonceTPM | The policy nonce for the session. |
[in] | CpHashA | Digest of the command parameters to which this authorization is limited. |
[in] | PolicyRef | A reference to a policy relating to the authorization. |
[in] | Expiration | Time when authorization will expire, measured in seconds from the time that nonceTPM was generated. |
[out] | Timeout | Time value used to indicate to the TPM when the ticket expires. |
[out] | PolicyTicket | A ticket that includes a value indicating when the authorization expires. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2ReadPublic | ( | IN TPMI_DH_OBJECT | ObjectHandle, |
OUT TPM2B_PUBLIC * | OutPublic, | ||
OUT TPM2B_NAME * | Name, | ||
OUT TPM2B_NAME * | QualifiedName | ||
) |
This command allows access to the public area of a loaded object.
[in] | ObjectHandle | TPM handle of an object |
[out] | OutPublic | Structure containing the public area of an object |
[out] | Name | Name of the object |
[out] | QualifiedName | The Qualified Name of the object |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2SelfTest | ( | IN TPMI_YES_NO | FullTest | ) |
This command causes the TPM to perform a test of its capabilities. If the fullTest is YES, the TPM will test all functions. If fullTest = NO, the TPM will only test those functions that have not previously been tested.
[in] | FullTest | YES if full test to be performed NO if only test of untested functions required |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2SequenceComplete | ( | IN TPMI_DH_OBJECT | SequenceHandle, |
IN TPM2B_MAX_BUFFER * | Buffer, | ||
OUT TPM2B_DIGEST * | Result | ||
) |
This command adds the last part of data, if any, to a hash/HMAC sequence and returns the result.
[in] | SequenceHandle | Authorization for the sequence |
[in] | Buffer | Data to be added to the hash/HMAC |
[out] | Result | The returned HMAC or digest in a sized buffer |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2SequenceUpdate | ( | IN TPMI_DH_OBJECT | SequenceHandle, |
IN TPM2B_MAX_BUFFER * | Buffer | ||
) |
This command is used to add data to a hash or HMAC sequence. The amount of data in buffer may be any size up to the limits of the TPM. NOTE: In all TPM, a buffer size of 1,024 octets is allowed.
[in] | SequenceHandle | Handle for the sequence object |
[in] | Buffer | Data to be added to hash |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2SetAlgorithmSet | ( | IN TPMI_RH_PLATFORM | AuthHandle, |
IN TPMS_AUTH_COMMAND * | AuthSession, | ||
IN UINT32 | AlgorithmSet | ||
) |
This command allows the platform to change the set of algorithms that are used by the TPM. The algorithmSet setting is a vendor-dependent value.
[in] | AuthHandle | TPM_RH_PLATFORM |
[in] | AuthSession | Auth Session context |
[in] | AlgorithmSet | A TPM vendor-dependent value indicating the algorithm set selection |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2SetPrimaryPolicy | ( | IN TPMI_RH_HIERARCHY_AUTH | AuthHandle, |
IN TPMS_AUTH_COMMAND * | AuthSession, | ||
IN TPM2B_DIGEST * | AuthPolicy, | ||
IN TPMI_ALG_HASH | HashAlg | ||
) |
This command allows setting of the authorization policy for the platform hierarchy (platformPolicy), the storage hierarchy (ownerPolicy), and and the endorsement hierarchy (endorsementPolicy).
[in] | AuthHandle | TPM_RH_ENDORSEMENT, TPM_RH_OWNER or TPM_RH_PLATFORM+{PP} parameters to be validated |
[in] | AuthSession | Auth Session context |
[in] | AuthPolicy | An authorization policy hash |
[in] | HashAlg | The hash algorithm to use for the policy |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2Shutdown | ( | IN TPM_SU | ShutdownType | ) |
Send Shutdown command to TPM2.
[in] | ShutdownType | TPM_SU_CLEAR or TPM_SU_STATE. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2StartAuthSession | ( | IN TPMI_DH_OBJECT | TpmKey, |
IN TPMI_DH_ENTITY | Bind, | ||
IN TPM2B_NONCE * | NonceCaller, | ||
IN TPM2B_ENCRYPTED_SECRET * | Salt, | ||
IN TPM_SE | SessionType, | ||
IN TPMT_SYM_DEF * | Symmetric, | ||
IN TPMI_ALG_HASH | AuthHash, | ||
OUT TPMI_SH_AUTH_SESSION * | SessionHandle, | ||
OUT TPM2B_NONCE * | NonceTPM | ||
) |
This command is used to start an authorization session using alternative methods of establishing the session key (sessionKey) that is used for authorization and encrypting value.
[in] | TpmKey | Handle of a loaded decrypt key used to encrypt salt. |
[in] | Bind | Entity providing the authValue. |
[in] | NonceCaller | Initial nonceCaller, sets nonce size for the session. |
[in] | Salt | Value encrypted according to the type of tpmKey. |
[in] | SessionType | Indicates the type of the session. |
[in] | Symmetric | The algorithm and key size for parameter encryption. |
[in] | AuthHash | Hash algorithm to use for the session. |
[out] | SessionHandle | Handle for the newly created session. |
[out] | NonceTPM | The initial nonce from the TPM, used in the computation of the sessionKey. |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | The command was unsuccessful. |
EFI_STATUS EFIAPI Tpm2Startup | ( | IN TPM_SU | StartupType | ) |
Send Startup command to TPM2.
[in] | StartupType | TPM_SU_CLEAR or TPM_SU_STATE |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |
EFI_STATUS EFIAPI Tpm2TestParms | ( | IN TPMT_PUBLIC_PARMS * | Parameters | ) |
This command is used to check to see if specific combinations of algorithm parameters are supported.
[in] | Parameters | Algorithm parameters to be validated |
EFI_SUCCESS | Operation completed successfully. |
EFI_DEVICE_ERROR | Unexpected device behavior. |