]> git.proxmox.com Git - mirror_edk2.git/blame - SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibNull.c
SecurityPkg: Replace BSD License with BSD+Patent License
[mirror_edk2.git] / SecurityPkg / Library / Tcg2PpVendorLibNull / Tcg2PpVendorLibNull.c
CommitLineData
1abfa4ce
JY
1/** @file\r
2 NULL Tcg2 PP Vendor library instance that does not support any vendor specific PPI.\r
3\r
b3548d32 4Copyright (c) 2015 - 2018, Intel Corporation. All rights reserved.<BR>\r
289b714b 5SPDX-License-Identifier: BSD-2-Clause-Patent\r
1abfa4ce
JY
6\r
7**/\r
8\r
9#include <Library/DebugLib.h>\r
10#include <Library/Tcg2PpVendorLib.h>\r
11\r
12/**\r
13 Check and execute the requested physical presence command.\r
14\r
15 This API should be invoked in BIOS boot phase to process pending request.\r
b3548d32 16\r
1abfa4ce 17 Caution: This function may receive untrusted input.\r
b3548d32 18\r
1abfa4ce
JY
19 If OperationRequest < 128, then ASSERT().\r
20\r
21 @param[in] PlatformAuth platform auth value. NULL means no platform auth change.\r
22 @param[in] OperationRequest TPM physical presence operation request.\r
23 @param[in, out] ManagementFlags BIOS TPM Management Flags.\r
24 @param[out] ResetRequired If reset is required to vendor settings in effect.\r
25 True, it indicates the reset is required.\r
26 False, it indicates the reset is not required.\r
27\r
28 @return TPM Operation Response to OS Environment.\r
29**/\r
30UINT32\r
31EFIAPI\r
32Tcg2PpVendorLibExecutePendingRequest (\r
33 IN TPM2B_AUTH *PlatformAuth, OPTIONAL\r
34 IN UINT32 OperationRequest,\r
35 IN OUT UINT32 *ManagementFlags,\r
36 OUT BOOLEAN *ResetRequired\r
37 )\r
38{\r
39 ASSERT (OperationRequest >= TCG2_PHYSICAL_PRESENCE_VENDOR_SPECIFIC_OPERATION);\r
40 return TCG_PP_OPERATION_RESPONSE_BIOS_FAILURE;\r
41}\r
42\r
43/**\r
44 Check if there is a valid physical presence command request.\r
45\r
46 This API should be invoked in BIOS boot phase to process pending request.\r
b3548d32 47\r
1abfa4ce
JY
48 Caution: This function may receive untrusted input.\r
49\r
50 If OperationRequest < 128, then ASSERT().\r
51\r
52 @param[in] OperationRequest TPM physical presence operation request.\r
53 @param[in] ManagementFlags BIOS TPM Management Flags.\r
54 @param[out] RequestConfirmed If the physical presence operation command required user confirm from UI.\r
55 True, it indicates the command doesn't require user confirm.\r
56 False, it indicates the command need user confirm from UI.\r
57\r
58 @retval TRUE Physical Presence operation command is valid.\r
59 @retval FALSE Physical Presence operation command is invalid.\r
60**/\r
61BOOLEAN\r
62EFIAPI\r
63Tcg2PpVendorLibHasValidRequest (\r
64 IN UINT32 OperationRequest,\r
65 IN UINT32 ManagementFlags,\r
66 OUT BOOLEAN *RequestConfirmed\r
67 )\r
68{\r
69 ASSERT (OperationRequest >= TCG2_PHYSICAL_PRESENCE_VENDOR_SPECIFIC_OPERATION);\r
70 return FALSE;\r
71}\r
72\r
73/**\r
74 The callback for TPM vendor specific physical presence which is called for\r
75 Submit TPM Operation Request to Pre-OS Environment and\r
76 Submit TPM Operation Request to Pre-OS Environment 2.\r
77\r
78 This API should be invoked in OS runtime phase to interface with ACPI method.\r
79\r
80 Caution: This function may receive untrusted input.\r
b3548d32 81\r
1abfa4ce
JY
82 If OperationRequest < 128, then ASSERT().\r
83\r
84 @param[in] OperationRequest TPM physical presence operation request.\r
85 @param[in] ManagementFlags BIOS TPM Management Flags.\r
86 @param[in] RequestParameter Extra parameter from the passed package.\r
87\r
88 @return Return Code for Submit TPM Operation Request to Pre-OS Environment and\r
89 Submit TPM Operation Request to Pre-OS Environment 2.\r
90**/\r
91UINT32\r
92EFIAPI\r
93Tcg2PpVendorLibSubmitRequestToPreOSFunction (\r
94 IN UINT32 OperationRequest,\r
95 IN UINT32 ManagementFlags,\r
96 IN UINT32 RequestParameter\r
97 )\r
98{\r
99 ASSERT (OperationRequest >= TCG2_PHYSICAL_PRESENCE_VENDOR_SPECIFIC_OPERATION);\r
100 return TCG_PP_SUBMIT_REQUEST_TO_PREOS_NOT_IMPLEMENTED;\r
101}\r
102\r
103/**\r
104 The callback for TPM vendor specific physical presence which is called for\r
105 Get User Confirmation Status for Operation.\r
106\r
107 This API should be invoked in OS runtime phase to interface with ACPI method.\r
108\r
109 Caution: This function may receive untrusted input.\r
b3548d32 110\r
1abfa4ce
JY
111 If OperationRequest < 128, then ASSERT().\r
112\r
113 @param[in] OperationRequest TPM physical presence operation request.\r
114 @param[in] ManagementFlags BIOS TPM Management Flags.\r
115\r
116 @return Return Code for Get User Confirmation Status for Operation.\r
117**/\r
118UINT32\r
119EFIAPI\r
120Tcg2PpVendorLibGetUserConfirmationStatusFunction (\r
121 IN UINT32 OperationRequest,\r
122 IN UINT32 ManagementFlags\r
123 )\r
124{\r
125 ASSERT (OperationRequest >= TCG2_PHYSICAL_PRESENCE_VENDOR_SPECIFIC_OPERATION);\r
126 return TCG_PP_GET_USER_CONFIRMATION_NOT_IMPLEMENTED;\r
127}\r