}\r
}\r
if (Instance == NULL) {\r
- DEBUG ((EFI_D_ERROR, "Hash2ServiceBindingDestroyChild - Invalid handle\n"));\r
+ DEBUG ((DEBUG_ERROR, "Hash2ServiceBindingDestroyChild - Invalid handle\n"));\r
return EFI_UNSUPPORTED;\r
}\r
\r
AuthVariableInfo.Attributes | EFI_VARIABLE_NON_VOLATILE\r
);\r
CertCleaned = TRUE;\r
- DEBUG((EFI_D_INFO, "Recovery!! Cert for Auth Variable %s Guid %g is removed for consistency\n", VariableName, &AuthVarGuid));\r
+ DEBUG((DEBUG_INFO, "Recovery!! Cert for Auth Variable %s Guid %g is removed for consistency\n", VariableName, &AuthVarGuid));\r
FreePool(VariableName);\r
break;\r
}\r
\r
Status = AuthServiceInternalFindVariable (EFI_PLATFORM_KEY_NAME, &gEfiGlobalVariableGuid, (VOID **) &Data, &DataSize);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_INFO, "Variable %s does not exist.\n", EFI_PLATFORM_KEY_NAME));\r
+ DEBUG ((DEBUG_INFO, "Variable %s does not exist.\n", EFI_PLATFORM_KEY_NAME));\r
} else {\r
- DEBUG ((EFI_D_INFO, "Variable %s exists.\n", EFI_PLATFORM_KEY_NAME));\r
+ DEBUG ((DEBUG_INFO, "Variable %s exists.\n", EFI_PLATFORM_KEY_NAME));\r
}\r
\r
//\r
return Status;\r
}\r
\r
- DEBUG ((EFI_D_INFO, "Variable %s is %x\n", EFI_SETUP_MODE_NAME, mPlatformMode));\r
- DEBUG ((EFI_D_INFO, "Variable %s is %x\n", EFI_SECURE_BOOT_MODE_NAME, SecureBootMode));\r
- DEBUG ((EFI_D_INFO, "Variable %s is %x\n", EFI_SECURE_BOOT_ENABLE_NAME, SecureBootEnable));\r
+ DEBUG ((DEBUG_INFO, "Variable %s is %x\n", EFI_SETUP_MODE_NAME, mPlatformMode));\r
+ DEBUG ((DEBUG_INFO, "Variable %s is %x\n", EFI_SECURE_BOOT_MODE_NAME, SecureBootMode));\r
+ DEBUG ((DEBUG_INFO, "Variable %s is %x\n", EFI_SECURE_BOOT_ENABLE_NAME, SecureBootEnable));\r
\r
//\r
// Initialize "CustomMode" in STANDARD_SECURE_BOOT_MODE state.\r
return Status;\r
}\r
\r
- DEBUG ((EFI_D_INFO, "Variable %s is %x\n", EFI_CUSTOM_MODE_NAME, CustomMode));\r
+ DEBUG ((DEBUG_INFO, "Variable %s is %x\n", EFI_CUSTOM_MODE_NAME, CustomMode));\r
\r
//\r
// Check "certdb" variable's existence.\r
//\r
Status = CleanCertsFromDb();\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Clean up CertDB fail! Status %x\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "Clean up CertDB fail! Status %x\n", Status));\r
return Status;\r
}\r
}\r
return Status;\r
}\r
\r
- DEBUG ((EFI_D_INFO, "Variable %s is %x\n", EFI_VENDOR_KEYS_VARIABLE_NAME, mVendorKeyState));\r
+ DEBUG ((DEBUG_INFO, "Variable %s is %x\n", EFI_VENDOR_KEYS_VARIABLE_NAME, mVendorKeyState));\r
\r
AuthVarLibContextOut->StructVersion = AUTH_VAR_LIB_CONTEXT_OUT_STRUCT_VERSION;\r
AuthVarLibContextOut->StructSize = sizeof (AUTH_VAR_LIB_CONTEXT_OUT);\r
VarSize\r
);\r
\r
- DEBUG ((EFI_D_INFO, "DxeImageVerification: MeasureVariable (Pcr - %x, EventType - %x, ", (UINTN)7, (UINTN)EV_EFI_VARIABLE_AUTHORITY));\r
- DEBUG ((EFI_D_INFO, "VariableName - %s, VendorGuid - %g)\n", VarName, VendorGuid));\r
+ DEBUG ((DEBUG_INFO, "DxeImageVerification: MeasureVariable (Pcr - %x, EventType - %x, ", (UINTN)7, (UINTN)EV_EFI_VARIABLE_AUTHORITY));\r
+ DEBUG ((DEBUG_INFO, "VariableName - %s, VendorGuid - %g)\n", VarName, VendorGuid));\r
\r
Status = TpmMeasureAndLogData (\r
7,\r
}\r
\r
if (IsDataMeasured (VariableName, VendorGuid, Data, DataSize)) {\r
- DEBUG ((EFI_D_ERROR, "MeasureSecureAuthorityVariable - IsDataMeasured\n"));\r
+ DEBUG ((DEBUG_ERROR, "MeasureSecureAuthorityVariable - IsDataMeasured\n"));\r
return ;\r
}\r
\r
Data,\r
DataSize\r
);\r
- DEBUG ((EFI_D_INFO, "MeasureBootPolicyVariable - %r\n", Status));\r
+ DEBUG ((DEBUG_INFO, "MeasureBootPolicyVariable - %r\n", Status));\r
\r
if (!EFI_ERROR (Status)) {\r
AddDataMeasured (VariableName, VendorGuid, Data, DataSize);\r
CopyMem (LocalAuthSession.hmac.buffer, PlatformAuth->buffer, PlatformAuth->size);\r
}\r
\r
- DEBUG ((EFI_D_INFO, "Tpm2ClearControl ... \n"));\r
+ DEBUG ((DEBUG_INFO, "Tpm2ClearControl ... \n"));\r
Status = Tpm2ClearControl (TPM_RH_PLATFORM, AuthSession, NO);\r
- DEBUG ((EFI_D_INFO, "Tpm2ClearControl - %r\n", Status));\r
+ DEBUG ((DEBUG_INFO, "Tpm2ClearControl - %r\n", Status));\r
if (EFI_ERROR (Status)) {\r
goto Done;\r
}\r
- DEBUG ((EFI_D_INFO, "Tpm2Clear ... \n"));\r
+ DEBUG ((DEBUG_INFO, "Tpm2Clear ... \n"));\r
Status = Tpm2Clear (TPM_RH_PLATFORM, AuthSession);\r
- DEBUG ((EFI_D_INFO, "Tpm2Clear - %r\n", Status));\r
+ DEBUG ((DEBUG_INFO, "Tpm2Clear - %r\n", Status));\r
\r
Done:\r
ZeroMem (&LocalAuthSession.hmac, sizeof(LocalAuthSession.hmac));\r
}\r
\r
Status = Tpm2ChangeEPS (TPM_RH_PLATFORM, AuthSession);\r
- DEBUG ((EFI_D_INFO, "Tpm2ChangeEPS - %r\n", Status));\r
+ DEBUG ((DEBUG_INFO, "Tpm2ChangeEPS - %r\n", Status));\r
\r
ZeroMem(&LocalAuthSession.hmac, sizeof(LocalAuthSession.hmac));\r
return Status;\r
&gEfiTcg2PhysicalPresenceGuid\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "[TPM2] Error when lock variable %s, Status = %r\n", TCG2_PHYSICAL_PRESENCE_FLAGS_VARIABLE, Status));\r
+ DEBUG ((DEBUG_ERROR, "[TPM2] Error when lock variable %s, Status = %r\n", TCG2_PHYSICAL_PRESENCE_FLAGS_VARIABLE, Status));\r
ASSERT_EFI_ERROR (Status);\r
}\r
}\r
// Check S4 resume\r
//\r
if (GetBootModeHob () == BOOT_ON_S4_RESUME) {\r
- DEBUG ((EFI_D_INFO, "S4 Resume, Skip TPM PP process!\n"));\r
+ DEBUG ((DEBUG_INFO, "S4 Resume, Skip TPM PP process!\n"));\r
return ;\r
}\r
\r
&PpiFlags\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "[TPM2] Set physical presence flag failed, Status = %r\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "[TPM2] Set physical presence flag failed, Status = %r\n", Status));\r
return ;\r
}\r
DEBUG((DEBUG_INFO, "[TPM2] Initial physical presence flags value is 0x%x\n", PpiFlags.PPFlags));\r
&TcgPpData\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "[TPM2] Set physical presence variable failed, Status = %r\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "[TPM2] Set physical presence variable failed, Status = %r\n", Status));\r
return ;\r
}\r
}\r
\r
- DEBUG ((EFI_D_INFO, "[TPM2] Flags=%x, PPRequest=%x (LastPPRequest=%x)\n", PpiFlags.PPFlags, TcgPpData.PPRequest, TcgPpData.LastPPRequest));\r
+ DEBUG ((DEBUG_INFO, "[TPM2] Flags=%x, PPRequest=%x (LastPPRequest=%x)\n", PpiFlags.PPFlags, TcgPpData.PPRequest, TcgPpData.LastPPRequest));\r
\r
//\r
// Execute pending TPM request.\r
//\r
Tcg2ExecutePendingTpmRequest (PlatformAuth, &TcgPpData, &PpiFlags);\r
- DEBUG ((EFI_D_INFO, "[TPM2] PPResponse = %x (LastPPRequest=%x, Flags=%x)\n", TcgPpData.PPResponse, TcgPpData.LastPPRequest, PpiFlags.PPFlags));\r
+ DEBUG ((DEBUG_INFO, "[TPM2] PPResponse = %x (LastPPRequest=%x, Flags=%x)\n", TcgPpData.PPResponse, TcgPpData.LastPPRequest, PpiFlags.PPFlags));\r
\r
}\r
\r
// Check S4 resume\r
//\r
if (GetBootModeHob () == BOOT_ON_S4_RESUME) {\r
- DEBUG ((EFI_D_INFO, "S4 Resume, Skip TPM PP process!\n"));\r
+ DEBUG ((DEBUG_INFO, "S4 Resume, Skip TPM PP process!\n"));\r
return FALSE;\r
}\r
\r
UINTN DataSize;\r
EFI_TCG2_PHYSICAL_PRESENCE PpData;\r
\r
- DEBUG ((EFI_D_INFO, "[TPM2] ReturnOperationResponseToOsFunction\n"));\r
+ DEBUG ((DEBUG_INFO, "[TPM2] ReturnOperationResponseToOsFunction\n"));\r
\r
//\r
// Get the Physical Presence variable\r
if (EFI_ERROR (Status)) {\r
*MostRecentRequest = 0;\r
*Response = 0;\r
- DEBUG ((EFI_D_ERROR, "[TPM2] Get PP variable failure! Status = %r\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "[TPM2] Get PP variable failure! Status = %r\n", Status));\r
return TCG_PP_RETURN_TPM_OPERATION_RESPONSE_FAILURE;\r
}\r
\r
EFI_TCG2_PHYSICAL_PRESENCE PpData;\r
EFI_TCG2_PHYSICAL_PRESENCE_FLAGS Flags;\r
\r
- DEBUG ((EFI_D_INFO, "[TPM2] SubmitRequestToPreOSFunction, Request = %x, %x\n", OperationRequest, RequestParameter));\r
+ DEBUG ((DEBUG_INFO, "[TPM2] SubmitRequestToPreOSFunction, Request = %x, %x\n", OperationRequest, RequestParameter));\r
\r
//\r
// Get the Physical Presence variable\r
&PpData\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "[TPM2] Get PP variable failure! Status = %r\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "[TPM2] Get PP variable failure! Status = %r\n", Status));\r
return TCG_PP_SUBMIT_REQUEST_TO_PREOS_GENERAL_FAILURE;\r
}\r
\r
&PpData\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "[TPM2] Set PP variable failure! Status = %r\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "[TPM2] Set PP variable failure! Status = %r\n", Status));\r
return TCG_PP_SUBMIT_REQUEST_TO_PREOS_GENERAL_FAILURE;\r
}\r
}\r
EFI_TCG2_PHYSICAL_PRESENCE_FLAGS PpiFlags;\r
UINTN DataSize;\r
\r
- DEBUG ((EFI_D_INFO, "[TPM2] GetManagementFlags\n"));\r
+ DEBUG ((DEBUG_INFO, "[TPM2] GetManagementFlags\n"));\r
\r
DataSize = sizeof (EFI_TCG2_PHYSICAL_PRESENCE_FLAGS);\r
Status = gRT->GetVariable (\r
&PpiFlags\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "[TPM] Set physical presence flag failed, Status = %r\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "[TPM] Set physical presence flag failed, Status = %r\n", Status));\r
return ;\r
}\r
}\r
- DEBUG ((EFI_D_INFO, "[TPM] PpiFlags = %x\n", PpiFlags.PPFlags));\r
+ DEBUG ((DEBUG_INFO, "[TPM] PpiFlags = %x\n", PpiFlags.PPFlags));\r
\r
//\r
// This flags variable controls whether physical presence is required for TPM command.\r
&gEfiPhysicalPresenceGuid\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "[TPM] Error when lock variable %s, Status = %r\n", PHYSICAL_PRESENCE_FLAGS_VARIABLE, Status));\r
+ DEBUG ((DEBUG_ERROR, "[TPM] Error when lock variable %s, Status = %r\n", PHYSICAL_PRESENCE_FLAGS_VARIABLE, Status));\r
ASSERT_EFI_ERROR (Status);\r
}\r
}\r
&TcgPpData\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "[TPM] Set physical presence variable failed, Status = %r\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "[TPM] Set physical presence variable failed, Status = %r\n", Status));\r
return;\r
}\r
}\r
\r
- DEBUG ((EFI_D_INFO, "[TPM] Flags=%x, PPRequest=%x\n", PpiFlags.PPFlags, TcgPpData.PPRequest));\r
+ DEBUG ((DEBUG_INFO, "[TPM] Flags=%x, PPRequest=%x\n", PpiFlags.PPFlags, TcgPpData.PPRequest));\r
\r
if (TcgPpData.PPRequest == PHYSICAL_PRESENCE_NO_ACTION) {\r
//\r
// Execute pending TPM request.\r
//\r
ExecutePendingTpmRequest (TcgProtocol, &TcgPpData, PpiFlags);\r
- DEBUG ((EFI_D_INFO, "[TPM] PPResponse = %x\n", TcgPpData.PPResponse));\r
+ DEBUG ((DEBUG_INFO, "[TPM] PPResponse = %x\n", TcgPpData.PPResponse));\r
\r
//\r
// Lock physical presence.\r
\r
return FALSE;\r
}\r
-\r
(UINT8 *)PrimaryHeader\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Failed to Read Partition Table Header!\n"));\r
+ DEBUG ((DEBUG_ERROR, "Failed to Read Partition Table Header!\n"));\r
FreePool (PrimaryHeader);\r
return EFI_DEVICE_ERROR;\r
}\r
break;\r
default:\r
DEBUG ((\r
- EFI_D_ERROR,\r
+ DEBUG_ERROR,\r
"Tcg2MeasurePeImage: Unknown subsystem type %d",\r
ImageType\r
));\r
// Tcg2 protocol is not installed. So, TPM2 is not present.\r
// Don't do any measurement, and directly return EFI_SUCCESS.\r
//\r
- DEBUG ((EFI_D_VERBOSE, "DxeTpm2MeasureBootHandler - Tcg2 - %r\n", Status));\r
+ DEBUG ((DEBUG_VERBOSE, "DxeTpm2MeasureBootHandler - Tcg2 - %r\n", Status));\r
return EFI_SUCCESS;\r
}\r
\r
//\r
// TPM device doesn't work or activate.\r
//\r
- DEBUG ((EFI_D_ERROR, "DxeTpm2MeasureBootHandler (%r) - TPMPresentFlag - %x\n", Status, ProtocolCapability.TPMPresentFlag));\r
+ DEBUG ((DEBUG_ERROR, "DxeTpm2MeasureBootHandler (%r) - TPMPresentFlag - %x\n", Status, ProtocolCapability.TPMPresentFlag));\r
return EFI_SUCCESS;\r
}\r
\r
// Measure GPT disk.\r
//\r
Status = Tcg2MeasureGptTable (Tcg2Protocol, Handle);\r
- DEBUG ((EFI_D_INFO, "DxeTpm2MeasureBootHandler - Tcg2MeasureGptTable - %r\n", Status));\r
+ DEBUG ((DEBUG_INFO, "DxeTpm2MeasureBootHandler - Tcg2MeasureGptTable - %r\n", Status));\r
if (!EFI_ERROR (Status)) {\r
//\r
// GPT disk check done.\r
ImageContext.ImageType,\r
DevicePathNode\r
);\r
- DEBUG ((EFI_D_INFO, "DxeTpm2MeasureBootHandler - Tcg2MeasurePeImage - %r\n", Status));\r
+ DEBUG ((DEBUG_INFO, "DxeTpm2MeasureBootHandler - Tcg2MeasurePeImage - %r\n", Status));\r
}\r
\r
//\r
FreePool (OrigDevicePathNode);\r
}\r
\r
- DEBUG ((EFI_D_INFO, "DxeTpm2MeasureBootHandler - %r\n", Status));\r
+ DEBUG ((DEBUG_INFO, "DxeTpm2MeasureBootHandler - %r\n", Status));\r
\r
return Status;\r
}\r
(UINT8 *)PrimaryHeader\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Failed to Read Partition Table Header!\n"));\r
+ DEBUG ((DEBUG_ERROR, "Failed to Read Partition Table Header!\n"));\r
FreePool (PrimaryHeader);\r
return EFI_DEVICE_ERROR;\r
}\r
break;\r
default:\r
DEBUG ((\r
- EFI_D_ERROR,\r
+ DEBUG_ERROR,\r
"TcgMeasurePeImage: Unknown subsystem type %d",\r
ImageType\r
));\r
TPM2B_EVENT EventData;\r
TPM2B_DIGEST Result;\r
\r
- DEBUG((EFI_D_VERBOSE, "\n HashAndExtend Entry \n"));\r
+ DEBUG((DEBUG_VERBOSE, "\n HashAndExtend Entry \n"));\r
\r
SequenceHandle = 0xFFFFFFFF; // Know bad value\r
\r
if (EFI_ERROR(Status)) {\r
return EFI_DEVICE_ERROR;\r
}\r
- DEBUG((EFI_D_VERBOSE, "\n Tpm2HashSequenceStart Success \n"));\r
+ DEBUG((DEBUG_VERBOSE, "\n Tpm2HashSequenceStart Success \n"));\r
\r
Buffer = (UINT8 *)(UINTN)DataToHash;\r
for (HashLen = DataToHashLen; HashLen > sizeof(HashBuffer.buffer); HashLen -= sizeof(HashBuffer.buffer)) {\r
return EFI_DEVICE_ERROR;\r
}\r
}\r
- DEBUG((EFI_D_VERBOSE, "\n Tpm2SequenceUpdate Success \n"));\r
+ DEBUG((DEBUG_VERBOSE, "\n Tpm2SequenceUpdate Success \n"));\r
\r
HashBuffer.size = (UINT16)HashLen;\r
CopyMem(HashBuffer.buffer, Buffer, (UINTN)HashLen);\r
if (EFI_ERROR(Status)) {\r
return EFI_DEVICE_ERROR;\r
}\r
- DEBUG((EFI_D_VERBOSE, "\n Tpm2EventSequenceComplete Success \n"));\r
+ DEBUG((DEBUG_VERBOSE, "\n Tpm2EventSequenceComplete Success \n"));\r
} else {\r
Status = Tpm2SequenceComplete (\r
SequenceHandle,\r
if (EFI_ERROR(Status)) {\r
return EFI_DEVICE_ERROR;\r
}\r
- DEBUG((EFI_D_VERBOSE, "\n Tpm2SequenceComplete Success \n"));\r
+ DEBUG((DEBUG_VERBOSE, "\n Tpm2SequenceComplete Success \n"));\r
\r
DigestList->count = 1;\r
DigestList->digests[0].hashAlg = AlgoId;\r
if (EFI_ERROR(Status)) {\r
return EFI_DEVICE_ERROR;\r
}\r
- DEBUG((EFI_D_VERBOSE, "\n Tpm2PcrExtend Success \n"));\r
+ DEBUG((DEBUG_VERBOSE, "\n Tpm2PcrExtend Success \n"));\r
}\r
\r
return EFI_SUCCESS;\r
}\r
\r
if (SwapBytes32(Response.Hdr.returnCode) != TPM_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm12Extend: Response Code error! 0x%08x\r\n", SwapBytes32(Response.Hdr.returnCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm12Extend: Response Code error! 0x%08x\r\n", SwapBytes32(Response.Hdr.returnCode)));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
}\r
\r
if (SwapBytes32(Response.returnCode) != TPM_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm12PhysicalPresence: Response Code error! 0x%08x\r\n", SwapBytes32(Response.returnCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm12PhysicalPresence: Response Code error! 0x%08x\r\n", SwapBytes32(Response.returnCode)));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
DEBUG_CODE (\r
UINTN DebugSize;\r
\r
- DEBUG ((EFI_D_VERBOSE, "Tpm12TisTpmCommand Send - "));\r
+ DEBUG ((DEBUG_VERBOSE, "Tpm12TisTpmCommand Send - "));\r
if (SizeIn > 0x100) {\r
DebugSize = 0x40;\r
} else {\r
DebugSize = SizeIn;\r
}\r
for (Index = 0; Index < DebugSize; Index++) {\r
- DEBUG ((EFI_D_VERBOSE, "%02x ", BufferIn[Index]));\r
+ DEBUG ((DEBUG_VERBOSE, "%02x ", BufferIn[Index]));\r
}\r
if (DebugSize != SizeIn) {\r
- DEBUG ((EFI_D_VERBOSE, "...... "));\r
+ DEBUG ((DEBUG_VERBOSE, "...... "));\r
for (Index = SizeIn - 0x20; Index < SizeIn; Index++) {\r
- DEBUG ((EFI_D_VERBOSE, "%02x ", BufferIn[Index]));\r
+ DEBUG ((DEBUG_VERBOSE, "%02x ", BufferIn[Index]));\r
}\r
}\r
- DEBUG ((EFI_D_VERBOSE, "\n"));\r
+ DEBUG ((DEBUG_VERBOSE, "\n"));\r
);\r
TpmOutSize = 0;\r
\r
}\r
}\r
DEBUG_CODE (\r
- DEBUG ((EFI_D_VERBOSE, "Tpm12TisTpmCommand ReceiveHeader - "));\r
+ DEBUG ((DEBUG_VERBOSE, "Tpm12TisTpmCommand ReceiveHeader - "));\r
for (Index = 0; Index < sizeof (TPM_RSP_COMMAND_HDR); Index++) {\r
- DEBUG ((EFI_D_VERBOSE, "%02x ", BufferOut[Index]));\r
+ DEBUG ((DEBUG_VERBOSE, "%02x ", BufferOut[Index]));\r
}\r
- DEBUG ((EFI_D_VERBOSE, "\n"));\r
+ DEBUG ((DEBUG_VERBOSE, "\n"));\r
);\r
//\r
// Check the response data header (tag, parasize and returncode)\r
CopyMem (&Data16, BufferOut, sizeof (UINT16));\r
RspTag = SwapBytes16 (Data16);\r
if (RspTag != TPM_TAG_RSP_COMMAND && RspTag != TPM_TAG_RSP_AUTH1_COMMAND && RspTag != TPM_TAG_RSP_AUTH2_COMMAND) {\r
- DEBUG ((EFI_D_ERROR, "TPM12: Response tag error - current tag value is %x\n", RspTag));\r
+ DEBUG ((DEBUG_ERROR, "TPM12: Response tag error - current tag value is %x\n", RspTag));\r
Status = EFI_UNSUPPORTED;\r
goto Exit;\r
}\r
}\r
Exit:\r
DEBUG_CODE (\r
- DEBUG ((EFI_D_VERBOSE, "Tpm12TisTpmCommand Receive - "));\r
+ DEBUG ((DEBUG_VERBOSE, "Tpm12TisTpmCommand Receive - "));\r
for (Index = 0; Index < TpmOutSize; Index++) {\r
- DEBUG ((EFI_D_VERBOSE, "%02x ", BufferOut[Index]));\r
+ DEBUG ((DEBUG_VERBOSE, "%02x ", BufferOut[Index]));\r
}\r
- DEBUG ((EFI_D_VERBOSE, "\n"));\r
+ DEBUG ((DEBUG_VERBOSE, "\n"));\r
);\r
MmioWrite8((UINTN)&TisReg->Status, TIS_PC_STS_READY);\r
return Status;\r
//\r
// TCG protocol is not installed. So, TPM12 is not present.\r
//\r
- DEBUG ((EFI_D_ERROR, "Tpm12SubmitCommand - TCG - %r\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "Tpm12SubmitCommand - TCG - %r\n", Status));\r
return EFI_NOT_FOUND;\r
}\r
}\r
//\r
// TCG protocol is not installed. So, TPM12 is not present.\r
//\r
- DEBUG ((EFI_D_ERROR, "Tpm12RequestUseTpm - TCG - %r\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "Tpm12RequestUseTpm - TCG - %r\n", Status));\r
return EFI_NOT_FOUND;\r
}\r
}\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2FlushContext - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2FlushContext - RecvBufferSize Error - %x\n", RecvBufferSize));\r
return EFI_DEVICE_ERROR;\r
}\r
if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2FlushContext - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2FlushContext - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
return EFI_SUCCESS;\r
}\r
-\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2DictionaryAttackLockReset - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2DictionaryAttackLockReset - RecvBufferSize Error - %x\n", RecvBufferSize));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2DictionaryAttackLockReset - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2DictionaryAttackLockReset - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2DictionaryAttackParameters - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2DictionaryAttackParameters - RecvBufferSize Error - %x\n", RecvBufferSize));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2DictionaryAttackParameters - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2DictionaryAttackParameters - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PolicySecret - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PolicySecret - RecvBufferSize Error - %x\n", RecvBufferSize));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PolicySecret - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PolicySecret - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PolicyOR - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PolicyOR - RecvBufferSize Error - %x\n", RecvBufferSize));\r
return EFI_DEVICE_ERROR;\r
}\r
if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PolicyOR - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PolicyOR - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PolicyCommandCode - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PolicyCommandCode - RecvBufferSize Error - %x\n", RecvBufferSize));\r
return EFI_DEVICE_ERROR;\r
}\r
if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PolicyCommandCode - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PolicyCommandCode - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PolicyGetDigest - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PolicyGetDigest - RecvBufferSize Error - %x\n", RecvBufferSize));\r
return EFI_DEVICE_ERROR;\r
}\r
if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PolicyGetDigest - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PolicyGetDigest - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
Buffer = (UINT8 *)Buffer + sizeof(DigestList->count);\r
for (Index = 0; Index < DigestList->count; Index++) {\r
if (!IsHashAlgSupportedInHashAlgorithmMask(DigestList->digests[Index].hashAlg, HashAlgorithmMask)) {\r
- DEBUG ((EFI_D_ERROR, "WARNING: TPM2 Event log has HashAlg unsupported by PCR bank (0x%x)\n", DigestList->digests[Index].hashAlg));\r
+ DEBUG ((DEBUG_ERROR, "WARNING: TPM2 Event log has HashAlg unsupported by PCR bank (0x%x)\n", DigestList->digests[Index].hashAlg));\r
continue;\r
}\r
CopyMem (Buffer, &DigestList->digests[Index].hashAlg, sizeof(DigestList->digests[Index].hashAlg));\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2SetPrimaryPolicy - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2SetPrimaryPolicy - RecvBufferSize Error - %x\n", RecvBufferSize));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2SetPrimaryPolicy - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2SetPrimaryPolicy - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
}\r
\r
if (ResultBufSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "Clear: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
+ DEBUG ((DEBUG_ERROR, "Clear: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
Status = EFI_BUFFER_TOO_SMALL;\r
goto Done;\r
}\r
//\r
RespSize = SwapBytes32(Res.Header.paramSize);\r
if (RespSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "Clear: Response size too large! %d\r\n", RespSize));\r
+ DEBUG ((DEBUG_ERROR, "Clear: Response size too large! %d\r\n", RespSize));\r
Status = EFI_BUFFER_TOO_SMALL;\r
goto Done;\r
}\r
// Fail if command failed\r
//\r
if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Clear: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Clear: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
}\r
\r
if (ResultBufSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "ClearControl: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
+ DEBUG ((DEBUG_ERROR, "ClearControl: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
Status = EFI_BUFFER_TOO_SMALL;\r
goto Done;\r
}\r
//\r
RespSize = SwapBytes32(Res.Header.paramSize);\r
if (RespSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "ClearControl: Response size too large! %d\r\n", RespSize));\r
+ DEBUG ((DEBUG_ERROR, "ClearControl: Response size too large! %d\r\n", RespSize));\r
Status = EFI_BUFFER_TOO_SMALL;\r
goto Done;\r
}\r
// Fail if command failed\r
//\r
if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "ClearControl: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "ClearControl: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
}\r
\r
if (ResultBufSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "HierarchyChangeAuth: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
+ DEBUG ((DEBUG_ERROR, "HierarchyChangeAuth: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
Status = EFI_BUFFER_TOO_SMALL;\r
goto Done;\r
}\r
//\r
RespSize = SwapBytes32(Res.Header.paramSize);\r
if (RespSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "HierarchyChangeAuth: Response size too large! %d\r\n", RespSize));\r
+ DEBUG ((DEBUG_ERROR, "HierarchyChangeAuth: Response size too large! %d\r\n", RespSize));\r
Status = EFI_BUFFER_TOO_SMALL;\r
goto Done;\r
}\r
// Fail if command failed\r
//\r
if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG((EFI_D_ERROR,"HierarchyChangeAuth: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+ DEBUG((DEBUG_ERROR,"HierarchyChangeAuth: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
}\r
\r
if (ResultBufSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "ChangeEPS: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
+ DEBUG ((DEBUG_ERROR, "ChangeEPS: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
Status = EFI_BUFFER_TOO_SMALL;\r
goto Done;\r
}\r
//\r
RespSize = SwapBytes32(Res.Header.paramSize);\r
if (RespSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "ChangeEPS: Response size too large! %d\r\n", RespSize));\r
+ DEBUG ((DEBUG_ERROR, "ChangeEPS: Response size too large! %d\r\n", RespSize));\r
Status = EFI_BUFFER_TOO_SMALL;\r
goto Done;\r
}\r
// Fail if command failed\r
//\r
if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG((EFI_D_ERROR,"ChangeEPS: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+ DEBUG((DEBUG_ERROR,"ChangeEPS: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
}\r
\r
if (ResultBufSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "ChangePPS: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
+ DEBUG ((DEBUG_ERROR, "ChangePPS: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
Status = EFI_BUFFER_TOO_SMALL;\r
goto Done;\r
}\r
//\r
RespSize = SwapBytes32(Res.Header.paramSize);\r
if (RespSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "ChangePPS: Response size too large! %d\r\n", RespSize));\r
+ DEBUG ((DEBUG_ERROR, "ChangePPS: Response size too large! %d\r\n", RespSize));\r
Status = EFI_BUFFER_TOO_SMALL;\r
goto Done;\r
}\r
// Fail if command failed\r
//\r
if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG((EFI_D_ERROR,"ChangePPS: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+ DEBUG((DEBUG_ERROR,"ChangePPS: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
}\r
\r
if (ResultBufSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "HierarchyControl: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
+ DEBUG ((DEBUG_ERROR, "HierarchyControl: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
Status = EFI_BUFFER_TOO_SMALL;\r
goto Done;\r
}\r
//\r
RespSize = SwapBytes32(Res.Header.paramSize);\r
if (RespSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "HierarchyControl: Response size too large! %d\r\n", RespSize));\r
+ DEBUG ((DEBUG_ERROR, "HierarchyControl: Response size too large! %d\r\n", RespSize));\r
Status = EFI_BUFFER_TOO_SMALL;\r
goto Done;\r
}\r
// Fail if command failed\r
//\r
if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG((EFI_D_ERROR,"HierarchyControl: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+ DEBUG((DEBUG_ERROR,"HierarchyControl: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
Buffer += sizeof(UINT16);\r
DigestSize = GetHashSizeFromAlgo (Digests->digests[Index].hashAlg);\r
if (DigestSize == 0) {\r
- DEBUG ((EFI_D_ERROR, "Unknown hash algorithm %d\r\n", Digests->digests[Index].hashAlg));\r
+ DEBUG ((DEBUG_ERROR, "Unknown hash algorithm %d\r\n", Digests->digests[Index].hashAlg));\r
return EFI_DEVICE_ERROR;\r
}\r
CopyMem(\r
}\r
\r
if (ResultBufSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PcrExtend: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PcrExtend: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
\r
//\r
RespSize = SwapBytes32(Res.Header.paramSize);\r
if (RespSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PcrExtend: Response size too large! %d\r\n", RespSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PcrExtend: Response size too large! %d\r\n", RespSize));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
\r
// Fail if command failed\r
//\r
if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PcrExtend: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PcrExtend: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
}\r
\r
if (ResultBufSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PcrEvent: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PcrEvent: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
\r
//\r
RespSize = SwapBytes32(Res.Header.paramSize);\r
if (RespSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PcrEvent: Response size too large! %d\r\n", RespSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PcrEvent: Response size too large! %d\r\n", RespSize));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
\r
// Fail if command failed\r
//\r
if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PcrEvent: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PcrEvent: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
Buffer += sizeof(UINT16);\r
DigestSize = GetHashSizeFromAlgo (Digests->digests[Index].hashAlg);\r
if (DigestSize == 0) {\r
- DEBUG ((EFI_D_ERROR, "Unknown hash algorithm %d\r\n", Digests->digests[Index].hashAlg));\r
+ DEBUG ((DEBUG_ERROR, "Unknown hash algorithm %d\r\n", Digests->digests[Index].hashAlg));\r
return EFI_DEVICE_ERROR;\r
}\r
CopyMem(\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PcrRead - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PcrRead - RecvBufferSize Error - %x\n", RecvBufferSize));\r
return EFI_DEVICE_ERROR;\r
}\r
if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PcrRead - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PcrRead - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
return EFI_NOT_FOUND;\r
}\r
\r
// PcrUpdateCounter\r
//\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER) + sizeof(RecvBuffer.PcrUpdateCounter)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PcrRead - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PcrRead - RecvBufferSize Error - %x\n", RecvBufferSize));\r
return EFI_DEVICE_ERROR;\r
}\r
*PcrUpdateCounter = SwapBytes32(RecvBuffer.PcrUpdateCounter);\r
// PcrSelectionOut\r
//\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER) + sizeof(RecvBuffer.PcrUpdateCounter) + sizeof(RecvBuffer.PcrSelectionOut.count)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PcrRead - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PcrRead - RecvBufferSize Error - %x\n", RecvBufferSize));\r
return EFI_DEVICE_ERROR;\r
}\r
PcrSelectionOut->count = SwapBytes32(RecvBuffer.PcrSelectionOut.count);\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER) + sizeof(RecvBuffer.PcrUpdateCounter) + sizeof(RecvBuffer.PcrSelectionOut.count) + sizeof(RecvBuffer.PcrSelectionOut.pcrSelections[0]) * PcrSelectionOut->count) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PcrRead - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PcrRead - RecvBufferSize Error - %x\n", RecvBufferSize));\r
return EFI_DEVICE_ERROR;\r
}\r
for (Index = 0; Index < PcrSelectionOut->count; Index++) {\r
}\r
\r
if (ResultBufSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PcrAllocate: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PcrAllocate: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
Status = EFI_BUFFER_TOO_SMALL;\r
goto Done;\r
}\r
//\r
RespSize = SwapBytes32(Res.Header.paramSize);\r
if (RespSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2PcrAllocate: Response size too large! %d\r\n", RespSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2PcrAllocate: Response size too large! %d\r\n", RespSize));\r
Status = EFI_BUFFER_TOO_SMALL;\r
goto Done;\r
}\r
// Fail if command failed\r
//\r
if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG((EFI_D_ERROR,"Tpm2PcrAllocate: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+ DEBUG((DEBUG_ERROR,"Tpm2PcrAllocate: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
&SizeNeeded,\r
&SizeAvailable\r
);\r
- DEBUG ((EFI_D_INFO, "Tpm2PcrAllocateBanks call Tpm2PcrAllocate - %r\n", Status));\r
+ DEBUG ((DEBUG_INFO, "Tpm2PcrAllocateBanks call Tpm2PcrAllocate - %r\n", Status));\r
if (EFI_ERROR (Status)) {\r
goto Done;\r
}\r
\r
- DEBUG ((EFI_D_INFO, "AllocationSuccess - %02x\n", AllocationSuccess));\r
- DEBUG ((EFI_D_INFO, "MaxPCR - %08x\n", MaxPCR));\r
- DEBUG ((EFI_D_INFO, "SizeNeeded - %08x\n", SizeNeeded));\r
- DEBUG ((EFI_D_INFO, "SizeAvailable - %08x\n", SizeAvailable));\r
+ DEBUG ((DEBUG_INFO, "AllocationSuccess - %02x\n", AllocationSuccess));\r
+ DEBUG ((DEBUG_INFO, "MaxPCR - %08x\n", MaxPCR));\r
+ DEBUG ((DEBUG_INFO, "SizeNeeded - %08x\n", SizeNeeded));\r
+ DEBUG ((DEBUG_INFO, "SizeAvailable - %08x\n", SizeAvailable));\r
\r
Done:\r
ZeroMem(&LocalAuthSession.hmac, sizeof(LocalAuthSession.hmac));\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2SetAlgorithmSet - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2SetAlgorithmSet - RecvBufferSize Error - %x\n", RecvBufferSize));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2SetAlgorithmSet - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2SetAlgorithmSet - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2NvReadPublic - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2NvReadPublic - RecvBufferSize Error - %x\n", RecvBufferSize));\r
return EFI_DEVICE_ERROR;\r
}\r
ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode);\r
if (ResponseCode != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2NvReadPublic - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2NvReadPublic - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
}\r
switch (ResponseCode) {\r
case TPM_RC_SUCCESS:\r
}\r
\r
if (RecvBufferSize <= sizeof (TPM2_RESPONSE_HEADER) + sizeof (UINT16) + sizeof(UINT16)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2NvReadPublic - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2NvReadPublic - RecvBufferSize Error - %x\n", RecvBufferSize));\r
return EFI_NOT_FOUND;\r
}\r
\r
}\r
\r
if (RecvBufferSize != sizeof(TPM2_RESPONSE_HEADER) + sizeof(UINT16) + NvPublicSize + sizeof(UINT16) + NvNameSize) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2NvReadPublic - RecvBufferSize Error - NvPublicSize %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2NvReadPublic - RecvBufferSize Error - NvPublicSize %x\n", RecvBufferSize));\r
return EFI_NOT_FOUND;\r
}\r
\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2NvDefineSpace - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2NvDefineSpace - RecvBufferSize Error - %x\n", RecvBufferSize));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
\r
ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode);\r
if (ResponseCode != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2NvDefineSpace - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2NvDefineSpace - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
}\r
switch (ResponseCode) {\r
case TPM_RC_SUCCESS:\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2NvUndefineSpace - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2NvUndefineSpace - RecvBufferSize Error - %x\n", RecvBufferSize));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
\r
ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode);\r
if (ResponseCode != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2NvUndefineSpace - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2NvUndefineSpace - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
}\r
switch (ResponseCode) {\r
case TPM_RC_SUCCESS:\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2NvRead - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2NvRead - RecvBufferSize Error - %x\n", RecvBufferSize));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode);\r
if (ResponseCode != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2NvRead - responseCode - %x\n", ResponseCode));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2NvRead - responseCode - %x\n", ResponseCode));\r
}\r
switch (ResponseCode) {\r
case TPM_RC_SUCCESS:\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2NvWrite - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2NvWrite - RecvBufferSize Error - %x\n", RecvBufferSize));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode);\r
if (ResponseCode != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2NvWrite - responseCode - %x\n", ResponseCode));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2NvWrite - responseCode - %x\n", ResponseCode));\r
}\r
switch (ResponseCode) {\r
case TPM_RC_SUCCESS:\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2NvReadLock - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2NvReadLock - RecvBufferSize Error - %x\n", RecvBufferSize));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
\r
ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode);\r
if (ResponseCode != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2NvReadLock - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2NvReadLock - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
}\r
switch (ResponseCode) {\r
case TPM_RC_SUCCESS:\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2NvWriteLock - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2NvWriteLock - RecvBufferSize Error - %x\n", RecvBufferSize));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
\r
ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode);\r
if (ResponseCode != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2NvWriteLock - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2NvWriteLock - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
}\r
switch (ResponseCode) {\r
case TPM_RC_SUCCESS:\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2NvGlobalWriteLock - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2NvGlobalWriteLock - RecvBufferSize Error - %x\n", RecvBufferSize));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
\r
ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode);\r
if (ResponseCode != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2NvGlobalWriteLock - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2NvGlobalWriteLock - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
}\r
switch (ResponseCode) {\r
case TPM_RC_SUCCESS:\r
}\r
\r
if (ResultBufSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "HashSequenceStart: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
+ DEBUG ((DEBUG_ERROR, "HashSequenceStart: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
\r
//\r
RespSize = SwapBytes32(Res.Header.paramSize);\r
if (RespSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "HashSequenceStart: Response size too large! %d\r\n", RespSize));\r
+ DEBUG ((DEBUG_ERROR, "HashSequenceStart: Response size too large! %d\r\n", RespSize));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
\r
// Fail if command failed\r
//\r
if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "HashSequenceStart: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "HashSequenceStart: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
}\r
\r
if (ResultBufSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "SequenceUpdate: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
+ DEBUG ((DEBUG_ERROR, "SequenceUpdate: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
\r
//\r
RespSize = SwapBytes32(Res.Header.paramSize);\r
if (RespSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "SequenceUpdate: Response size too large! %d\r\n", RespSize));\r
+ DEBUG ((DEBUG_ERROR, "SequenceUpdate: Response size too large! %d\r\n", RespSize));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
\r
// Fail if command failed\r
//\r
if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "SequenceUpdate: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "SequenceUpdate: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
}\r
\r
if (ResultBufSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "EventSequenceComplete: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
+ DEBUG ((DEBUG_ERROR, "EventSequenceComplete: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
\r
//\r
RespSize = SwapBytes32(Res.Header.paramSize);\r
if (RespSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "EventSequenceComplete: Response size too large! %d\r\n", RespSize));\r
+ DEBUG ((DEBUG_ERROR, "EventSequenceComplete: Response size too large! %d\r\n", RespSize));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
\r
// Fail if command failed\r
//\r
if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "EventSequenceComplete: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "EventSequenceComplete: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
\r
DigestSize = GetHashSizeFromAlgo (Results->digests[Index].hashAlg);\r
if (DigestSize == 0) {\r
- DEBUG ((EFI_D_ERROR, "EventSequenceComplete: Unknown hash algorithm %d\r\n", Results->digests[Index].hashAlg));\r
+ DEBUG ((DEBUG_ERROR, "EventSequenceComplete: Unknown hash algorithm %d\r\n", Results->digests[Index].hashAlg));\r
return EFI_DEVICE_ERROR;\r
}\r
CopyMem(\r
}\r
\r
if (ResultBufSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "SequenceComplete: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
+ DEBUG ((DEBUG_ERROR, "SequenceComplete: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
\r
//\r
RespSize = SwapBytes32(Res.Header.paramSize);\r
if (RespSize > sizeof(Res)) {\r
- DEBUG ((EFI_D_ERROR, "SequenceComplete: Response size too large! %d\r\n", RespSize));\r
+ DEBUG ((DEBUG_ERROR, "SequenceComplete: Response size too large! %d\r\n", RespSize));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
\r
// Fail if command failed\r
//\r
if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "SequenceComplete: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "SequenceComplete: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
break;\r
default:\r
ASSERT (FALSE);\r
- DEBUG ((EFI_D_ERROR, "Tpm2StartAuthSession - Symmetric->algorithm - %x\n", Symmetric->algorithm));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2StartAuthSession - Symmetric->algorithm - %x\n", Symmetric->algorithm));\r
return EFI_UNSUPPORTED;\r
}\r
\r
}\r
\r
if (RecvBufferSize < sizeof (TPM2_RESPONSE_HEADER)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2StartAuthSession - RecvBufferSize Error - %x\n", RecvBufferSize));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2StartAuthSession - RecvBufferSize Error - %x\n", RecvBufferSize));\r
return EFI_DEVICE_ERROR;\r
}\r
if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2StartAuthSession - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2StartAuthSession - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
DEBUG ((DEBUG_INFO, "TPM2Startup: TPM_RC_INITIALIZE\n"));\r
return EFI_SUCCESS;\r
default:\r
- DEBUG ((EFI_D_ERROR, "Tpm2Startup: Response Code error! 0x%08x\r\n", ResponseCode));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2Startup: Response Code error! 0x%08x\r\n", ResponseCode));\r
return EFI_DEVICE_ERROR;\r
}\r
}\r
}\r
\r
if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2Shutdown: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2Shutdown: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
DEBUG_CODE (\r
UINTN DebugSize;\r
\r
- DEBUG ((EFI_D_VERBOSE, "PtpCrbTpmCommand Send - "));\r
+ DEBUG ((DEBUG_VERBOSE, "PtpCrbTpmCommand Send - "));\r
if (SizeIn > 0x100) {\r
DebugSize = 0x40;\r
} else {\r
DebugSize = SizeIn;\r
}\r
for (Index = 0; Index < DebugSize; Index++) {\r
- DEBUG ((EFI_D_VERBOSE, "%02x ", BufferIn[Index]));\r
+ DEBUG ((DEBUG_VERBOSE, "%02x ", BufferIn[Index]));\r
}\r
if (DebugSize != SizeIn) {\r
- DEBUG ((EFI_D_VERBOSE, "...... "));\r
+ DEBUG ((DEBUG_VERBOSE, "...... "));\r
for (Index = SizeIn - 0x20; Index < SizeIn; Index++) {\r
- DEBUG ((EFI_D_VERBOSE, "%02x ", BufferIn[Index]));\r
+ DEBUG ((DEBUG_VERBOSE, "%02x ", BufferIn[Index]));\r
}\r
}\r
- DEBUG ((EFI_D_VERBOSE, "\n"));\r
+ DEBUG ((DEBUG_VERBOSE, "\n"));\r
);\r
TpmOutSize = 0;\r
\r
BufferOut[Index] = MmioRead8 ((UINTN)&CrbReg->CrbDataBuffer[Index]);\r
}\r
DEBUG_CODE (\r
- DEBUG ((EFI_D_VERBOSE, "PtpCrbTpmCommand ReceiveHeader - "));\r
+ DEBUG ((DEBUG_VERBOSE, "PtpCrbTpmCommand ReceiveHeader - "));\r
for (Index = 0; Index < sizeof (TPM2_RESPONSE_HEADER); Index++) {\r
- DEBUG ((EFI_D_VERBOSE, "%02x ", BufferOut[Index]));\r
+ DEBUG ((DEBUG_VERBOSE, "%02x ", BufferOut[Index]));\r
}\r
- DEBUG ((EFI_D_VERBOSE, "\n"));\r
+ DEBUG ((DEBUG_VERBOSE, "\n"));\r
);\r
//\r
// Check the response data header (tag, parasize and returncode)\r
CopyMem (&Data16, BufferOut, sizeof (UINT16));\r
// TPM2 should not use this RSP_COMMAND\r
if (SwapBytes16 (Data16) == TPM_ST_RSP_COMMAND) {\r
- DEBUG ((EFI_D_ERROR, "TPM2: TPM_ST_RSP error - %x\n", TPM_ST_RSP_COMMAND));\r
+ DEBUG ((DEBUG_ERROR, "TPM2: TPM_ST_RSP error - %x\n", TPM_ST_RSP_COMMAND));\r
Status = EFI_UNSUPPORTED;\r
goto GoIdle_Exit;\r
}\r
}\r
\r
DEBUG_CODE (\r
- DEBUG ((EFI_D_VERBOSE, "PtpCrbTpmCommand Receive - "));\r
+ DEBUG ((DEBUG_VERBOSE, "PtpCrbTpmCommand Receive - "));\r
for (Index = 0; Index < TpmOutSize; Index++) {\r
- DEBUG ((EFI_D_VERBOSE, "%02x ", BufferOut[Index]));\r
+ DEBUG ((DEBUG_VERBOSE, "%02x ", BufferOut[Index]));\r
}\r
- DEBUG ((EFI_D_VERBOSE, "\n"));\r
+ DEBUG ((DEBUG_VERBOSE, "\n"));\r
);\r
\r
GoReady_Exit:\r
//\r
// Dump InterfaceId Register for PTP\r
//\r
- DEBUG ((EFI_D_INFO, "InterfaceId - 0x%08x\n", InterfaceId.Uint32));\r
- DEBUG ((EFI_D_INFO, " InterfaceType - 0x%02x\n", InterfaceId.Bits.InterfaceType));\r
+ DEBUG ((DEBUG_INFO, "InterfaceId - 0x%08x\n", InterfaceId.Uint32));\r
+ DEBUG ((DEBUG_INFO, " InterfaceType - 0x%02x\n", InterfaceId.Bits.InterfaceType));\r
if (InterfaceId.Bits.InterfaceType != PTP_INTERFACE_IDENTIFIER_INTERFACE_TYPE_TIS) {\r
- DEBUG ((EFI_D_INFO, " InterfaceVersion - 0x%02x\n", InterfaceId.Bits.InterfaceVersion));\r
- DEBUG ((EFI_D_INFO, " CapFIFO - 0x%x\n", InterfaceId.Bits.CapFIFO));\r
- DEBUG ((EFI_D_INFO, " CapCRB - 0x%x\n", InterfaceId.Bits.CapCRB));\r
+ DEBUG ((DEBUG_INFO, " InterfaceVersion - 0x%02x\n", InterfaceId.Bits.InterfaceVersion));\r
+ DEBUG ((DEBUG_INFO, " CapFIFO - 0x%x\n", InterfaceId.Bits.CapFIFO));\r
+ DEBUG ((DEBUG_INFO, " CapCRB - 0x%x\n", InterfaceId.Bits.CapCRB));\r
}\r
\r
//\r
// Dump Capability Register for TIS and FIFO\r
//\r
- DEBUG ((EFI_D_INFO, "InterfaceCapability - 0x%08x\n", InterfaceCapability.Uint32));\r
+ DEBUG ((DEBUG_INFO, "InterfaceCapability - 0x%08x\n", InterfaceCapability.Uint32));\r
if ((InterfaceId.Bits.InterfaceType == PTP_INTERFACE_IDENTIFIER_INTERFACE_TYPE_TIS) ||\r
(InterfaceId.Bits.InterfaceType == PTP_INTERFACE_IDENTIFIER_INTERFACE_TYPE_FIFO)) {\r
- DEBUG ((EFI_D_INFO, " InterfaceVersion - 0x%x\n", InterfaceCapability.Bits.InterfaceVersion));\r
+ DEBUG ((DEBUG_INFO, " InterfaceVersion - 0x%x\n", InterfaceCapability.Bits.InterfaceVersion));\r
}\r
\r
//\r
// Dump StatusEx Register for PTP FIFO\r
//\r
- DEBUG ((EFI_D_INFO, "StatusEx - 0x%02x\n", StatusEx));\r
+ DEBUG ((DEBUG_INFO, "StatusEx - 0x%02x\n", StatusEx));\r
if (InterfaceCapability.Bits.InterfaceVersion == INTERFACE_CAPABILITY_INTERFACE_VERSION_PTP) {\r
- DEBUG ((EFI_D_INFO, " TpmFamily - 0x%x\n", (StatusEx & PTP_FIFO_STS_EX_TPM_FAMILY) >> PTP_FIFO_STS_EX_TPM_FAMILY_OFFSET));\r
+ DEBUG ((DEBUG_INFO, " TpmFamily - 0x%x\n", (StatusEx & PTP_FIFO_STS_EX_TPM_FAMILY) >> PTP_FIFO_STS_EX_TPM_FAMILY_OFFSET));\r
}\r
\r
Vid = 0xFFFF;\r
Did = 0xFFFF;\r
Rid = 0xFF;\r
PtpInterface = GetCachedPtpInterface ();\r
- DEBUG ((EFI_D_INFO, "PtpInterface - %x\n", PtpInterface));\r
+ DEBUG ((DEBUG_INFO, "PtpInterface - %x\n", PtpInterface));\r
switch (PtpInterface) {\r
case Tpm2PtpInterfaceCrb:\r
Vid = MmioRead16 ((UINTN)&((PTP_CRB_REGISTERS *)Register)->Vid);\r
default:\r
break;\r
}\r
- DEBUG ((EFI_D_INFO, "VID - 0x%04x\n", Vid));\r
- DEBUG ((EFI_D_INFO, "DID - 0x%04x\n", Did));\r
- DEBUG ((EFI_D_INFO, "RID - 0x%02x\n", Rid));\r
+ DEBUG ((DEBUG_INFO, "VID - 0x%04x\n", Vid));\r
+ DEBUG ((DEBUG_INFO, "DID - 0x%04x\n", Did));\r
+ DEBUG ((DEBUG_INFO, "RID - 0x%02x\n", Rid));\r
}\r
\r
/**\r
DEBUG_CODE (\r
UINTN DebugSize;\r
\r
- DEBUG ((EFI_D_VERBOSE, "Tpm2TisTpmCommand Send - "));\r
+ DEBUG ((DEBUG_VERBOSE, "Tpm2TisTpmCommand Send - "));\r
if (SizeIn > 0x100) {\r
DebugSize = 0x40;\r
} else {\r
DebugSize = SizeIn;\r
}\r
for (Index = 0; Index < DebugSize; Index++) {\r
- DEBUG ((EFI_D_VERBOSE, "%02x ", BufferIn[Index]));\r
+ DEBUG ((DEBUG_VERBOSE, "%02x ", BufferIn[Index]));\r
}\r
if (DebugSize != SizeIn) {\r
- DEBUG ((EFI_D_VERBOSE, "...... "));\r
+ DEBUG ((DEBUG_VERBOSE, "...... "));\r
for (Index = SizeIn - 0x20; Index < SizeIn; Index++) {\r
- DEBUG ((EFI_D_VERBOSE, "%02x ", BufferIn[Index]));\r
+ DEBUG ((DEBUG_VERBOSE, "%02x ", BufferIn[Index]));\r
}\r
}\r
- DEBUG ((EFI_D_VERBOSE, "\n"));\r
+ DEBUG ((DEBUG_VERBOSE, "\n"));\r
);\r
TpmOutSize = 0;\r
\r
}\r
}\r
DEBUG_CODE (\r
- DEBUG ((EFI_D_VERBOSE, "Tpm2TisTpmCommand ReceiveHeader - "));\r
+ DEBUG ((DEBUG_VERBOSE, "Tpm2TisTpmCommand ReceiveHeader - "));\r
for (Index = 0; Index < sizeof (TPM2_RESPONSE_HEADER); Index++) {\r
- DEBUG ((EFI_D_VERBOSE, "%02x ", BufferOut[Index]));\r
+ DEBUG ((DEBUG_VERBOSE, "%02x ", BufferOut[Index]));\r
}\r
- DEBUG ((EFI_D_VERBOSE, "\n"));\r
+ DEBUG ((DEBUG_VERBOSE, "\n"));\r
);\r
//\r
// Check the response data header (tag,parasize and returncode )\r
CopyMem (&Data16, BufferOut, sizeof (UINT16));\r
// TPM2 should not use this RSP_COMMAND\r
if (SwapBytes16 (Data16) == TPM_ST_RSP_COMMAND) {\r
- DEBUG ((EFI_D_ERROR, "TPM2: TPM_ST_RSP error - %x\n", TPM_ST_RSP_COMMAND));\r
+ DEBUG ((DEBUG_ERROR, "TPM2: TPM_ST_RSP error - %x\n", TPM_ST_RSP_COMMAND));\r
Status = EFI_UNSUPPORTED;\r
goto Exit;\r
}\r
}\r
Exit:\r
DEBUG_CODE (\r
- DEBUG ((EFI_D_VERBOSE, "Tpm2TisTpmCommand Receive - "));\r
+ DEBUG ((DEBUG_VERBOSE, "Tpm2TisTpmCommand Receive - "));\r
for (Index = 0; Index < TpmOutSize; Index++) {\r
- DEBUG ((EFI_D_VERBOSE, "%02x ", BufferOut[Index]));\r
+ DEBUG ((DEBUG_VERBOSE, "%02x ", BufferOut[Index]));\r
}\r
- DEBUG ((EFI_D_VERBOSE, "\n"));\r
+ DEBUG ((DEBUG_VERBOSE, "\n"));\r
);\r
MmioWrite8((UINTN)&TisReg->Status, TIS_PC_STS_READY);\r
return Status;\r
//\r
// In PEI phase, there will be shadow driver dispatched again.\r
//\r
- DEBUG ((EFI_D_INFO, "Tpm2RegisterTpm2DeviceLib - Override\n"));\r
+ DEBUG ((DEBUG_INFO, "Tpm2RegisterTpm2DeviceLib - Override\n"));\r
CopyMem (Tpm2DeviceInterface, Tpm2Device, sizeof(*Tpm2Device));\r
return EFI_SUCCESS;\r
} else {\r
//\r
// Tcg2 protocol is not installed. So, TPM2 is not present.\r
//\r
- DEBUG ((EFI_D_ERROR, "Tpm2SubmitCommand - Tcg2 - %r\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2SubmitCommand - Tcg2 - %r\n", Status));\r
return EFI_NOT_FOUND;\r
}\r
}\r
//\r
// Tcg2 protocol is not installed. So, TPM2 is not present.\r
//\r
- DEBUG ((EFI_D_ERROR, "Tpm2RequestUseTpm - Tcg2 - %r\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2RequestUseTpm - Tcg2 - %r\n", Status));\r
return EFI_NOT_FOUND;\r
}\r
}\r
//\r
// Clear MOR_CLEAR_MEMORY_BIT\r
//\r
- DEBUG ((EFI_D_INFO, "TcgMor: Clear MorClearMemory bit\n"));\r
+ DEBUG ((DEBUG_INFO, "TcgMor: Clear MorClearMemory bit\n"));\r
mMorControl &= 0xFE;\r
\r
DataSize = sizeof (mMorControl);\r
// Found a TCG device.\r
//\r
TcgFlag = TRUE;\r
- DEBUG ((EFI_D_INFO, "This device is a TCG protocol device\n"));\r
+ DEBUG ((DEBUG_INFO, "This device is a TCG protocol device\n"));\r
break;\r
}\r
\r
// Found a IEEE 1667 device.\r
//\r
IeeeFlag = TRUE;\r
- DEBUG ((EFI_D_INFO, "This device is a IEEE 1667 protocol device\n"));\r
+ DEBUG ((DEBUG_INFO, "This device is a IEEE 1667 protocol device\n"));\r
break;\r
}\r
}\r
\r
if (!TcgFlag && !IeeeFlag) {\r
- DEBUG ((EFI_D_INFO, "Neither a TCG nor IEEE 1667 protocol device is found\n"));\r
+ DEBUG ((DEBUG_INFO, "Neither a TCG nor IEEE 1667 protocol device is found\n"));\r
goto Exit;\r
}\r
\r
);\r
\r
if (!EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_INFO, "Send TPer Reset Command Successfully !\n"));\r
+ DEBUG ((DEBUG_INFO, "Send TPer Reset Command Successfully !\n"));\r
} else {\r
- DEBUG ((EFI_D_INFO, "Send TPer Reset Command Fail !\n"));\r
+ DEBUG ((DEBUG_INFO, "Send TPer Reset Command Fail !\n"));\r
}\r
}\r
\r
//\r
// TBD : Perform a TPer Reset via IEEE 1667 Protocol\r
//\r
- DEBUG ((EFI_D_INFO, "IEEE 1667 Protocol didn't support yet!\n"));\r
+ DEBUG ((DEBUG_INFO, "IEEE 1667 Protocol didn't support yet!\n"));\r
}\r
\r
Exit:\r
DataSize,\r
&mMorControl\r
);\r
- DEBUG ((EFI_D_INFO, "TcgMor: Create MOR variable! Status = %r\n", Status));\r
+ DEBUG ((DEBUG_INFO, "TcgMor: Create MOR variable! Status = %r\n", Status));\r
} else {\r
//\r
// Create a Ready To Boot Event and Clear the MorControl bit in the call back function.\r
//\r
// Register EFI_END_OF_DXE_EVENT_GROUP_GUID event.\r
//\r
- DEBUG ((EFI_D_INFO, "TcgMor: Create EndofDxe Event for Mor TPer Reset!\n"));\r
+ DEBUG ((DEBUG_INFO, "TcgMor: Create EndofDxe Event for Mor TPer Reset!\n"));\r
Status = gBS->CreateEventEx (\r
EVT_NOTIFY_SIGNAL,\r
TPL_CALLBACK,\r
\r
return Status;\r
}\r
-\r
-\r
//\r
// This driver link to Smm Variable driver\r
//\r
- DEBUG ((EFI_D_INFO, "MorLockDriverEntryPointSmm\n"));\r
+ DEBUG ((DEBUG_INFO, "MorLockDriverEntryPointSmm\n"));\r
\r
Status = gSmst->SmmLocateProtocol (\r
&gEfiSmmVariableProtocolGuid,\r
\r
return Status;\r
}\r
-\r
&Tcg2DeviceDetection\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Tcg2ConfigDriver: Fail to set TCG2_DEVICE_DETECTION_NAME\n"));\r
+ DEBUG ((DEBUG_ERROR, "Tcg2ConfigDriver: Fail to set TCG2_DEVICE_DETECTION_NAME\n"));\r
Status = gRT->SetVariable (\r
TCG2_DEVICE_DETECTION_NAME,\r
&gTcg2ConfigFormSetGuid,\r
&Tcg2Configuration\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Tcg2ConfigDriver: Fail to set TCG2_STORAGE_NAME\n"));\r
+ DEBUG ((DEBUG_ERROR, "Tcg2ConfigDriver: Fail to set TCG2_STORAGE_NAME\n"));\r
}\r
\r
//\r
&Tcg2ConfigInfo\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Tcg2ConfigDriver: Fail to set TCG2_STORAGE_INFO_NAME\n"));\r
+ DEBUG ((DEBUG_ERROR, "Tcg2ConfigDriver: Fail to set TCG2_STORAGE_INFO_NAME\n"));\r
}\r
\r
return EFI_SUCCESS;\r
//\r
// Although we have SetupVariable info, we still need detect TPM device manually.\r
//\r
- DEBUG ((EFI_D_INFO, "Tcg2Configuration.TpmDevice from Setup: %x\n", Tcg2Configuration.TpmDevice));\r
+ DEBUG ((DEBUG_INFO, "Tcg2Configuration.TpmDevice from Setup: %x\n", Tcg2Configuration.TpmDevice));\r
\r
if (PcdGetBool (PcdTpmAutoDetection)) {\r
TpmDevice = DetectTpmDevice (Tcg2Configuration.TpmDevice);\r
- DEBUG ((EFI_D_INFO, "TpmDevice final: %x\n", TpmDevice));\r
+ DEBUG ((DEBUG_INFO, "TpmDevice final: %x\n", TpmDevice));\r
if (TpmDevice != TPM_DEVICE_NULL) {\r
Tcg2Configuration.TpmDevice = TpmDevice;\r
}\r
Size = sizeof(mTpmInstanceId[Index].TpmInstanceGuid);\r
Status = PcdSetPtrS (PcdTpmInstanceGuid, &Size, &mTpmInstanceId[Index].TpmInstanceGuid);\r
ASSERT_EFI_ERROR (Status);\r
- DEBUG ((EFI_D_INFO, "TpmDevice PCD: %g\n", &mTpmInstanceId[Index].TpmInstanceGuid));\r
+ DEBUG ((DEBUG_INFO, "TpmDevice PCD: %g\n", &mTpmInstanceId[Index].TpmInstanceGuid));\r
break;\r
}\r
}\r
// In S3, we rely on normal boot Detection, because we save to ReadOnly Variable in normal boot.\r
//\r
if (BootMode == BOOT_ON_S3_RESUME) {\r
- DEBUG ((EFI_D_INFO, "DetectTpmDevice: S3 mode\n"));\r
+ DEBUG ((DEBUG_INFO, "DetectTpmDevice: S3 mode\n"));\r
\r
Status = PeiServicesLocatePpi (&gEfiPeiReadOnlyVariable2PpiGuid, 0, NULL, (VOID **) &VariablePpi);\r
ASSERT_EFI_ERROR (Status);\r
if (!EFI_ERROR (Status) &&\r
(Tcg2DeviceDetection.TpmDeviceDetected >= TPM_DEVICE_MIN) &&\r
(Tcg2DeviceDetection.TpmDeviceDetected <= TPM_DEVICE_MAX)) {\r
- DEBUG ((EFI_D_ERROR, "TpmDevice from DeviceDetection: %x\n", Tcg2DeviceDetection.TpmDeviceDetected));\r
+ DEBUG ((DEBUG_ERROR, "TpmDevice from DeviceDetection: %x\n", Tcg2DeviceDetection.TpmDeviceDetected));\r
return Tcg2DeviceDetection.TpmDeviceDetected;\r
}\r
}\r
\r
- DEBUG ((EFI_D_INFO, "DetectTpmDevice:\n"));\r
+ DEBUG ((DEBUG_INFO, "DetectTpmDevice:\n"));\r
\r
// dTPM available and not disabled by setup\r
// We need check if it is TPM1.2 or TPM2.0\r
{\r
UINTN Index;\r
for (Index = 0; Index < Size; Index++) {\r
- DEBUG ((EFI_D_INFO, "%02x", (UINTN)Data[Index]));\r
+ DEBUG ((DEBUG_INFO, "%02x", (UINTN)Data[Index]));\r
}\r
}\r
\r
Count = Size / COLUME_SIZE;\r
Left = Size % COLUME_SIZE;\r
for (Index = 0; Index < Count; Index++) {\r
- DEBUG ((EFI_D_INFO, "%04x: ", Index * COLUME_SIZE));\r
+ DEBUG ((DEBUG_INFO, "%04x: ", Index * COLUME_SIZE));\r
InternalDumpData (Data + Index * COLUME_SIZE, COLUME_SIZE);\r
- DEBUG ((EFI_D_INFO, "\n"));\r
+ DEBUG ((DEBUG_INFO, "\n"));\r
}\r
\r
if (Left != 0) {\r
- DEBUG ((EFI_D_INFO, "%04x: ", Index * COLUME_SIZE));\r
+ DEBUG ((DEBUG_INFO, "%04x: ", Index * COLUME_SIZE));\r
InternalDumpData (Data + Index * COLUME_SIZE, Left);\r
- DEBUG ((EFI_D_INFO, "\n"));\r
+ DEBUG ((DEBUG_INFO, "\n"));\r
}\r
}\r
\r
ProtocolCapability->StructureVersion.Minor = 0;\r
ProtocolCapability->ProtocolVersion.Major = 1;\r
ProtocolCapability->ProtocolVersion.Minor = 0;\r
- DEBUG ((EFI_D_ERROR, "TreeGetCapability (Compatible) - %r\n", EFI_SUCCESS));\r
+ DEBUG ((DEBUG_ERROR, "TreeGetCapability (Compatible) - %r\n", EFI_SUCCESS));\r
return EFI_SUCCESS;\r
}\r
}\r
{\r
UINTN Index;\r
\r
- DEBUG ((EFI_D_INFO, " Event:\n"));\r
- DEBUG ((EFI_D_INFO, " PCRIndex - %d\n", EventHdr->PCRIndex));\r
- DEBUG ((EFI_D_INFO, " EventType - 0x%08x\n", EventHdr->EventType));\r
- DEBUG ((EFI_D_INFO, " Digest - "));\r
+ DEBUG ((DEBUG_INFO, " Event:\n"));\r
+ DEBUG ((DEBUG_INFO, " PCRIndex - %d\n", EventHdr->PCRIndex));\r
+ DEBUG ((DEBUG_INFO, " EventType - 0x%08x\n", EventHdr->EventType));\r
+ DEBUG ((DEBUG_INFO, " Digest - "));\r
for (Index = 0; Index < sizeof(TCG_DIGEST); Index++) {\r
- DEBUG ((EFI_D_INFO, "%02x ", EventHdr->Digest.digest[Index]));\r
+ DEBUG ((DEBUG_INFO, "%02x ", EventHdr->Digest.digest[Index]));\r
}\r
- DEBUG ((EFI_D_INFO, "\n"));\r
- DEBUG ((EFI_D_INFO, " EventSize - 0x%08x\n", EventHdr->EventSize));\r
+ DEBUG ((DEBUG_INFO, "\n"));\r
+ DEBUG ((DEBUG_INFO, " EventSize - 0x%08x\n", EventHdr->EventSize));\r
InternalDumpHex ((UINT8 *)(EventHdr + 1), EventHdr->EventSize);\r
}\r
\r
UINT8 *VendorInfo;\r
UINT32 NumberOfAlgorithms;\r
\r
- DEBUG ((EFI_D_INFO, " TCG_EfiSpecIDEventStruct:\n"));\r
- DEBUG ((EFI_D_INFO, " signature - '"));\r
+ DEBUG ((DEBUG_INFO, " TCG_EfiSpecIDEventStruct:\n"));\r
+ DEBUG ((DEBUG_INFO, " signature - '"));\r
for (Index = 0; Index < sizeof(TcgEfiSpecIdEventStruct->signature); Index++) {\r
- DEBUG ((EFI_D_INFO, "%c", TcgEfiSpecIdEventStruct->signature[Index]));\r
+ DEBUG ((DEBUG_INFO, "%c", TcgEfiSpecIdEventStruct->signature[Index]));\r
}\r
- DEBUG ((EFI_D_INFO, "'\n"));\r
- DEBUG ((EFI_D_INFO, " platformClass - 0x%08x\n", TcgEfiSpecIdEventStruct->platformClass));\r
- DEBUG ((EFI_D_INFO, " specVersion - %d.%d%d\n", TcgEfiSpecIdEventStruct->specVersionMajor, TcgEfiSpecIdEventStruct->specVersionMinor, TcgEfiSpecIdEventStruct->specErrata));\r
- DEBUG ((EFI_D_INFO, " uintnSize - 0x%02x\n", TcgEfiSpecIdEventStruct->uintnSize));\r
+ DEBUG ((DEBUG_INFO, "'\n"));\r
+ DEBUG ((DEBUG_INFO, " platformClass - 0x%08x\n", TcgEfiSpecIdEventStruct->platformClass));\r
+ DEBUG ((DEBUG_INFO, " specVersion - %d.%d%d\n", TcgEfiSpecIdEventStruct->specVersionMajor, TcgEfiSpecIdEventStruct->specVersionMinor, TcgEfiSpecIdEventStruct->specErrata));\r
+ DEBUG ((DEBUG_INFO, " uintnSize - 0x%02x\n", TcgEfiSpecIdEventStruct->uintnSize));\r
\r
CopyMem (&NumberOfAlgorithms, TcgEfiSpecIdEventStruct + 1, sizeof(NumberOfAlgorithms));\r
- DEBUG ((EFI_D_INFO, " NumberOfAlgorithms - 0x%08x\n", NumberOfAlgorithms));\r
+ DEBUG ((DEBUG_INFO, " NumberOfAlgorithms - 0x%08x\n", NumberOfAlgorithms));\r
\r
DigestSize = (TCG_EfiSpecIdEventAlgorithmSize *)((UINT8 *)TcgEfiSpecIdEventStruct + sizeof(*TcgEfiSpecIdEventStruct) + sizeof(NumberOfAlgorithms));\r
for (Index = 0; Index < NumberOfAlgorithms; Index++) {\r
- DEBUG ((EFI_D_INFO, " digest(%d)\n", Index));\r
- DEBUG ((EFI_D_INFO, " algorithmId - 0x%04x\n", DigestSize[Index].algorithmId));\r
- DEBUG ((EFI_D_INFO, " digestSize - 0x%04x\n", DigestSize[Index].digestSize));\r
+ DEBUG ((DEBUG_INFO, " digest(%d)\n", Index));\r
+ DEBUG ((DEBUG_INFO, " algorithmId - 0x%04x\n", DigestSize[Index].algorithmId));\r
+ DEBUG ((DEBUG_INFO, " digestSize - 0x%04x\n", DigestSize[Index].digestSize));\r
}\r
VendorInfoSize = (UINT8 *)&DigestSize[NumberOfAlgorithms];\r
- DEBUG ((EFI_D_INFO, " VendorInfoSize - 0x%02x\n", *VendorInfoSize));\r
+ DEBUG ((DEBUG_INFO, " VendorInfoSize - 0x%02x\n", *VendorInfoSize));\r
VendorInfo = VendorInfoSize + 1;\r
- DEBUG ((EFI_D_INFO, " VendorInfo - "));\r
+ DEBUG ((DEBUG_INFO, " VendorInfo - "));\r
for (Index = 0; Index < *VendorInfoSize; Index++) {\r
- DEBUG ((EFI_D_INFO, "%02x ", VendorInfo[Index]));\r
+ DEBUG ((DEBUG_INFO, "%02x ", VendorInfo[Index]));\r
}\r
- DEBUG ((EFI_D_INFO, "\n"));\r
+ DEBUG ((DEBUG_INFO, "\n"));\r
}\r
\r
/**\r
UINT32 EventSize;\r
UINT8 *EventBuffer;\r
\r
- DEBUG ((EFI_D_INFO, " Event:\n"));\r
- DEBUG ((EFI_D_INFO, " PCRIndex - %d\n", TcgPcrEvent2->PCRIndex));\r
- DEBUG ((EFI_D_INFO, " EventType - 0x%08x\n", TcgPcrEvent2->EventType));\r
+ DEBUG ((DEBUG_INFO, " Event:\n"));\r
+ DEBUG ((DEBUG_INFO, " PCRIndex - %d\n", TcgPcrEvent2->PCRIndex));\r
+ DEBUG ((DEBUG_INFO, " EventType - 0x%08x\n", TcgPcrEvent2->EventType));\r
\r
- DEBUG ((EFI_D_INFO, " DigestCount: 0x%08x\n", TcgPcrEvent2->Digest.count));\r
+ DEBUG ((DEBUG_INFO, " DigestCount: 0x%08x\n", TcgPcrEvent2->Digest.count));\r
\r
DigestCount = TcgPcrEvent2->Digest.count;\r
HashAlgo = TcgPcrEvent2->Digest.digests[0].hashAlg;\r
DigestBuffer = (UINT8 *)&TcgPcrEvent2->Digest.digests[0].digest;\r
for (DigestIndex = 0; DigestIndex < DigestCount; DigestIndex++) {\r
- DEBUG ((EFI_D_INFO, " HashAlgo : 0x%04x\n", HashAlgo));\r
- DEBUG ((EFI_D_INFO, " Digest(%d): ", DigestIndex));\r
+ DEBUG ((DEBUG_INFO, " HashAlgo : 0x%04x\n", HashAlgo));\r
+ DEBUG ((DEBUG_INFO, " Digest(%d): ", DigestIndex));\r
DigestSize = GetHashSizeFromAlgo (HashAlgo);\r
for (Index = 0; Index < DigestSize; Index++) {\r
- DEBUG ((EFI_D_INFO, "%02x ", DigestBuffer[Index]));\r
+ DEBUG ((DEBUG_INFO, "%02x ", DigestBuffer[Index]));\r
}\r
- DEBUG ((EFI_D_INFO, "\n"));\r
+ DEBUG ((DEBUG_INFO, "\n"));\r
//\r
// Prepare next\r
//\r
CopyMem (&HashAlgo, DigestBuffer + DigestSize, sizeof(TPMI_ALG_HASH));\r
DigestBuffer = DigestBuffer + DigestSize + sizeof(TPMI_ALG_HASH);\r
}\r
- DEBUG ((EFI_D_INFO, "\n"));\r
+ DEBUG ((DEBUG_INFO, "\n"));\r
DigestBuffer = DigestBuffer - sizeof(TPMI_ALG_HASH);\r
\r
CopyMem (&EventSize, DigestBuffer, sizeof(TcgPcrEvent2->EventSize));\r
- DEBUG ((EFI_D_INFO, " EventSize - 0x%08x\n", EventSize));\r
+ DEBUG ((DEBUG_INFO, " EventSize - 0x%08x\n", EventSize));\r
EventBuffer = DigestBuffer + sizeof(TcgPcrEvent2->EventSize);\r
InternalDumpHex (EventBuffer, EventSize);\r
}\r
TCG_EfiSpecIDEventStruct *TcgEfiSpecIdEventStruct;\r
UINTN NumberOfEvents;\r
\r
- DEBUG ((EFI_D_INFO, "EventLogFormat: (0x%x)\n", EventLogFormat));\r
+ DEBUG ((DEBUG_INFO, "EventLogFormat: (0x%x)\n", EventLogFormat));\r
\r
switch (EventLogFormat) {\r
case EFI_TCG2_EVENT_LOG_FORMAT_TCG_1_2:\r
EventHdr = (TCG_PCR_EVENT_HDR *)((UINTN)EventHdr + sizeof(TCG_PCR_EVENT_HDR) + EventHdr->EventSize);\r
}\r
if (FinalEventsTable == NULL) {\r
- DEBUG ((EFI_D_INFO, "FinalEventsTable: NOT FOUND\n"));\r
+ DEBUG ((DEBUG_INFO, "FinalEventsTable: NOT FOUND\n"));\r
} else {\r
- DEBUG ((EFI_D_INFO, "FinalEventsTable: (0x%x)\n", FinalEventsTable));\r
- DEBUG ((EFI_D_INFO, " Version: (0x%x)\n", FinalEventsTable->Version));\r
- DEBUG ((EFI_D_INFO, " NumberOfEvents: (0x%x)\n", FinalEventsTable->NumberOfEvents));\r
+ DEBUG ((DEBUG_INFO, "FinalEventsTable: (0x%x)\n", FinalEventsTable));\r
+ DEBUG ((DEBUG_INFO, " Version: (0x%x)\n", FinalEventsTable->Version));\r
+ DEBUG ((DEBUG_INFO, " NumberOfEvents: (0x%x)\n", FinalEventsTable->NumberOfEvents));\r
\r
EventHdr = (TCG_PCR_EVENT_HDR *)(UINTN)(FinalEventsTable + 1);\r
for (NumberOfEvents = 0; NumberOfEvents < FinalEventsTable->NumberOfEvents; NumberOfEvents++) {\r
}\r
\r
if (FinalEventsTable == NULL) {\r
- DEBUG ((EFI_D_INFO, "FinalEventsTable: NOT FOUND\n"));\r
+ DEBUG ((DEBUG_INFO, "FinalEventsTable: NOT FOUND\n"));\r
} else {\r
- DEBUG ((EFI_D_INFO, "FinalEventsTable: (0x%x)\n", FinalEventsTable));\r
- DEBUG ((EFI_D_INFO, " Version: (0x%x)\n", FinalEventsTable->Version));\r
- DEBUG ((EFI_D_INFO, " NumberOfEvents: (0x%x)\n", FinalEventsTable->NumberOfEvents));\r
+ DEBUG ((DEBUG_INFO, "FinalEventsTable: (0x%x)\n", FinalEventsTable));\r
+ DEBUG ((DEBUG_INFO, " Version: (0x%x)\n", FinalEventsTable->Version));\r
+ DEBUG ((DEBUG_INFO, " NumberOfEvents: (0x%x)\n", FinalEventsTable->NumberOfEvents));\r
\r
TcgPcrEvent2 = (TCG_PCR_EVENT2 *)(UINTN)(FinalEventsTable + 1);\r
for (NumberOfEvents = 0; NumberOfEvents < FinalEventsTable->NumberOfEvents; NumberOfEvents++) {\r
{\r
UINTN Index;\r
\r
- DEBUG ((EFI_D_INFO, "Tcg2GetEventLog ... (0x%x)\n", EventLogFormat));\r
+ DEBUG ((DEBUG_INFO, "Tcg2GetEventLog ... (0x%x)\n", EventLogFormat));\r
\r
if (This == NULL) {\r
return EFI_INVALID_PARAMETER;\r
\r
if (EventLogLocation != NULL) {\r
*EventLogLocation = mTcgDxeData.EventLogAreaStruct[Index].Lasa;\r
- DEBUG ((EFI_D_INFO, "Tcg2GetEventLog (EventLogLocation - %x)\n", *EventLogLocation));\r
+ DEBUG ((DEBUG_INFO, "Tcg2GetEventLog (EventLogLocation - %x)\n", *EventLogLocation));\r
}\r
\r
if (EventLogLastEntry != NULL) {\r
} else {\r
*EventLogLastEntry = (EFI_PHYSICAL_ADDRESS)(UINTN)mTcgDxeData.EventLogAreaStruct[Index].LastEvent;\r
}\r
- DEBUG ((EFI_D_INFO, "Tcg2GetEventLog (EventLogLastEntry - %x)\n", *EventLogLastEntry));\r
+ DEBUG ((DEBUG_INFO, "Tcg2GetEventLog (EventLogLastEntry - %x)\n", *EventLogLastEntry));\r
}\r
\r
if (EventLogTruncated != NULL) {\r
*EventLogTruncated = mTcgDxeData.EventLogAreaStruct[Index].EventLogTruncated;\r
- DEBUG ((EFI_D_INFO, "Tcg2GetEventLog (EventLogTruncated - %x)\n", *EventLogTruncated));\r
+ DEBUG ((DEBUG_INFO, "Tcg2GetEventLog (EventLogTruncated - %x)\n", *EventLogTruncated));\r
}\r
\r
- DEBUG ((EFI_D_INFO, "Tcg2GetEventLog - %r\n", EFI_SUCCESS));\r
+ DEBUG ((DEBUG_INFO, "Tcg2GetEventLog - %r\n", EFI_SUCCESS));\r
\r
// Dump Event Log for debug purpose\r
if ((EventLogLocation != NULL) && (EventLogLastEntry != NULL)) {\r
// Increase the NumberOfEvents in FinalEventsTable\r
//\r
(mTcgDxeData.FinalEventsTable[Index])->NumberOfEvents ++;\r
- DEBUG ((EFI_D_INFO, "FinalEventsTable->NumberOfEvents - 0x%x\n", (mTcgDxeData.FinalEventsTable[Index])->NumberOfEvents));\r
- DEBUG ((EFI_D_INFO, " Size - 0x%x\n", (UINTN)EventLogAreaStruct->EventLogSize));\r
+ DEBUG ((DEBUG_INFO, "FinalEventsTable->NumberOfEvents - 0x%x\n", (mTcgDxeData.FinalEventsTable[Index])->NumberOfEvents));\r
+ DEBUG ((DEBUG_INFO, " Size - 0x%x\n", (UINTN)EventLogAreaStruct->EventLogSize));\r
}\r
}\r
\r
UINT8 *DigestBuffer;\r
UINT32 *EventSizePtr;\r
\r
- DEBUG ((EFI_D_INFO, "SupportedEventLogs - 0x%08x\n", mTcgDxeData.BsCap.SupportedEventLogs));\r
+ DEBUG ((DEBUG_INFO, "SupportedEventLogs - 0x%08x\n", mTcgDxeData.BsCap.SupportedEventLogs));\r
\r
RetStatus = EFI_SUCCESS;\r
for (Index = 0; Index < sizeof(mTcg2EventInfo)/sizeof(mTcg2EventInfo[0]); Index++) {\r
if ((mTcgDxeData.BsCap.SupportedEventLogs & mTcg2EventInfo[Index].LogFormat) != 0) {\r
- DEBUG ((EFI_D_INFO, " LogFormat - 0x%08x\n", mTcg2EventInfo[Index].LogFormat));\r
+ DEBUG ((DEBUG_INFO, " LogFormat - 0x%08x\n", mTcg2EventInfo[Index].LogFormat));\r
switch (mTcg2EventInfo[Index].LogFormat) {\r
case EFI_TCG2_EVENT_LOG_FORMAT_TCG_1_2:\r
Status = GetDigestFromDigestList (TPM_ALG_SHA1, DigestList, &NewEventHdr->Digest);\r
}\r
\r
if (Status == EFI_DEVICE_ERROR) {\r
- DEBUG ((EFI_D_ERROR, "TcgDxeHashLogExtendEvent - %r. Disable TPM.\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "TcgDxeHashLogExtendEvent - %r. Disable TPM.\n", Status));\r
mTcgDxeData.BsCap.TPMPresentFlag = FALSE;\r
REPORT_STATUS_CODE (\r
EFI_ERROR_CODE | EFI_ERROR_MINOR,\r
}\r
}\r
if (Status == EFI_DEVICE_ERROR) {\r
- DEBUG ((EFI_D_ERROR, "MeasurePeImageAndExtend - %r. Disable TPM.\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "MeasurePeImageAndExtend - %r. Disable TPM.\n", Status));\r
mTcgDxeData.BsCap.TPMPresentFlag = FALSE;\r
REPORT_STATUS_CODE (\r
EFI_ERROR_CODE | EFI_ERROR_MINOR,\r
{\r
EFI_STATUS Status;\r
\r
- DEBUG ((EFI_D_INFO, "Tcg2SubmitCommand ...\n"));\r
+ DEBUG ((DEBUG_INFO, "Tcg2SubmitCommand ...\n"));\r
\r
if ((This == NULL) ||\r
(InputParameterBlockSize == 0) || (InputParameterBlock == NULL) ||\r
&OutputParameterBlockSize,\r
OutputParameterBlock\r
);\r
- DEBUG ((EFI_D_INFO, "Tcg2SubmitCommand - %r\n", Status));\r
+ DEBUG ((DEBUG_INFO, "Tcg2SubmitCommand - %r\n", Status));\r
return Status;\r
}\r
\r
EFI_STATUS Status;\r
UINT32 ReturnCode;\r
\r
- DEBUG ((EFI_D_INFO, "Tcg2SetActivePCRBanks ... (0x%x)\n", ActivePcrBanks));\r
+ DEBUG ((DEBUG_INFO, "Tcg2SetActivePCRBanks ... (0x%x)\n", ActivePcrBanks));\r
\r
if (ActivePcrBanks == 0) {\r
return EFI_INVALID_PARAMETER;\r
Status = EFI_DEVICE_ERROR;\r
}\r
\r
- DEBUG ((EFI_D_INFO, "Tcg2SetActivePCRBanks - %r\n", Status));\r
+ DEBUG ((DEBUG_INFO, "Tcg2SetActivePCRBanks - %r\n", Status));\r
\r
return Status;\r
}\r
UINT32 NumberOfAlgorithms;\r
TCG_EfiStartupLocalityEvent StartupLocalityEvent;\r
\r
- DEBUG ((EFI_D_INFO, "SetupEventLog\n"));\r
+ DEBUG ((DEBUG_INFO, "SetupEventLog\n"));\r
\r
//\r
// 1. Create Log Area\r
TCG_PCR_EVENT_HDR TcgEvent;\r
UINT32 EventData;\r
\r
- DEBUG ((EFI_D_INFO, "MeasureSeparatorEvent Pcr - %x\n", PCRIndex));\r
+ DEBUG ((DEBUG_INFO, "MeasureSeparatorEvent Pcr - %x\n", PCRIndex));\r
\r
EventData = 0;\r
TcgEvent.PCRIndex = PCRIndex;\r
UINTN VarNameLength;\r
UEFI_VARIABLE_DATA *VarLog;\r
\r
- DEBUG ((EFI_D_INFO, "Tcg2Dxe: MeasureVariable (Pcr - %x, EventType - %x, ", (UINTN)PCRIndex, (UINTN)EventType));\r
- DEBUG ((EFI_D_INFO, "VariableName - %s, VendorGuid - %g)\n", VarName, VendorGuid));\r
+ DEBUG ((DEBUG_INFO, "Tcg2Dxe: MeasureVariable (Pcr - %x, EventType - %x, ", (UINTN)PCRIndex, (UINTN)EventType));\r
+ DEBUG ((DEBUG_INFO, "VariableName - %s, VendorGuid - %g)\n", VarName, VendorGuid));\r
\r
VarNameLength = StrLen (VarName);\r
TcgEvent.PCRIndex = PCRIndex;\r
\r
if (PcdGetBool (PcdFirmwareDebuggerInitialized)) {\r
Status = MeasureLaunchOfFirmwareDebugger ();\r
- DEBUG ((EFI_D_INFO, "MeasureLaunchOfFirmwareDebugger - %r\n", Status));\r
+ DEBUG ((DEBUG_INFO, "MeasureLaunchOfFirmwareDebugger - %r\n", Status));\r
}\r
\r
Status = MeasureAllSecureVariables ();\r
- DEBUG ((EFI_D_INFO, "MeasureAllSecureVariables - %r\n", Status));\r
+ DEBUG ((DEBUG_INFO, "MeasureAllSecureVariables - %r\n", Status));\r
\r
//\r
// We need measure Separator(7) here, because this event must be between SecureBootPolicy (Configure)\r
// the Authority measurement happen before ReadToBoot event.\r
//\r
Status = MeasureSeparatorEvent (7);\r
- DEBUG ((EFI_D_INFO, "MeasureSeparatorEvent - %r\n", Status));\r
+ DEBUG ((DEBUG_INFO, "MeasureSeparatorEvent - %r\n", Status));\r
return ;\r
}\r
\r
//\r
Status = MeasureHandoffTables ();\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "HOBs not Measured. Error!\n"));\r
+ DEBUG ((DEBUG_ERROR, "HOBs not Measured. Error!\n"));\r
}\r
\r
//\r
//\r
Status = MeasureAllBootVariables ();\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Boot Variables not Measured. Error!\n"));\r
+ DEBUG ((DEBUG_ERROR, "Boot Variables not Measured. Error!\n"));\r
}\r
\r
//\r
EFI_CALLING_EFI_APPLICATION\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "%a not Measured. Error!\n", EFI_CALLING_EFI_APPLICATION));\r
+ DEBUG ((DEBUG_ERROR, "%a not Measured. Error!\n", EFI_CALLING_EFI_APPLICATION));\r
}\r
\r
//\r
EFI_RETURNING_FROM_EFI_APPLICATION\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "%a not Measured. Error!\n", EFI_RETURNING_FROM_EFI_APPLICATION));\r
+ DEBUG ((DEBUG_ERROR, "%a not Measured. Error!\n", EFI_RETURNING_FROM_EFI_APPLICATION));\r
}\r
\r
//\r
EFI_CALLING_EFI_APPLICATION\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "%a not Measured. Error!\n", EFI_CALLING_EFI_APPLICATION));\r
+ DEBUG ((DEBUG_ERROR, "%a not Measured. Error!\n", EFI_CALLING_EFI_APPLICATION));\r
}\r
}\r
\r
- DEBUG ((EFI_D_INFO, "TPM2 Tcg2Dxe Measure Data when ReadyToBoot\n"));\r
+ DEBUG ((DEBUG_INFO, "TPM2 Tcg2Dxe Measure Data when ReadyToBoot\n"));\r
//\r
// Increase boot attempt counter.\r
//\r
EFI_EXIT_BOOT_SERVICES_INVOCATION\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "%a not Measured. Error!\n", EFI_EXIT_BOOT_SERVICES_INVOCATION));\r
+ DEBUG ((DEBUG_ERROR, "%a not Measured. Error!\n", EFI_EXIT_BOOT_SERVICES_INVOCATION));\r
}\r
\r
//\r
EFI_EXIT_BOOT_SERVICES_SUCCEEDED\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "%a not Measured. Error!\n", EFI_EXIT_BOOT_SERVICES_SUCCEEDED));\r
+ DEBUG ((DEBUG_ERROR, "%a not Measured. Error!\n", EFI_EXIT_BOOT_SERVICES_SUCCEEDED));\r
}\r
}\r
\r
EFI_EXIT_BOOT_SERVICES_FAILED\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "%a not Measured. Error!\n", EFI_EXIT_BOOT_SERVICES_FAILED));\r
+ DEBUG ((DEBUG_ERROR, "%a not Measured. Error!\n", EFI_EXIT_BOOT_SERVICES_FAILED));\r
}\r
\r
}\r
}\r
\r
if (GetFirstGuidHob (&gTpmErrorHobGuid) != NULL) {\r
- DEBUG ((EFI_D_ERROR, "TPM2 error!\n"));\r
+ DEBUG ((DEBUG_ERROR, "TPM2 error!\n"));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
Status = Tpm2RequestUseTpm ();\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "TPM2 not detected!\n"));\r
+ DEBUG ((DEBUG_ERROR, "TPM2 not detected!\n"));\r
return Status;\r
}\r
\r
mTcgDxeData.BsCap.StructureVersion.Major = 1;\r
mTcgDxeData.BsCap.StructureVersion.Minor = 1;\r
\r
- DEBUG ((EFI_D_INFO, "Tcg2.ProtocolVersion - %02x.%02x\n", mTcgDxeData.BsCap.ProtocolVersion.Major, mTcgDxeData.BsCap.ProtocolVersion.Minor));\r
- DEBUG ((EFI_D_INFO, "Tcg2.StructureVersion - %02x.%02x\n", mTcgDxeData.BsCap.StructureVersion.Major, mTcgDxeData.BsCap.StructureVersion.Minor));\r
+ DEBUG ((DEBUG_INFO, "Tcg2.ProtocolVersion - %02x.%02x\n", mTcgDxeData.BsCap.ProtocolVersion.Major, mTcgDxeData.BsCap.ProtocolVersion.Minor));\r
+ DEBUG ((DEBUG_INFO, "Tcg2.StructureVersion - %02x.%02x\n", mTcgDxeData.BsCap.StructureVersion.Major, mTcgDxeData.BsCap.StructureVersion.Minor));\r
\r
Status = Tpm2GetCapabilityManufactureID (&mTcgDxeData.BsCap.ManufacturerID);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2GetCapabilityManufactureID fail!\n"));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2GetCapabilityManufactureID fail!\n"));\r
} else {\r
- DEBUG ((EFI_D_INFO, "Tpm2GetCapabilityManufactureID - %08x\n", mTcgDxeData.BsCap.ManufacturerID));\r
+ DEBUG ((DEBUG_INFO, "Tpm2GetCapabilityManufactureID - %08x\n", mTcgDxeData.BsCap.ManufacturerID));\r
}\r
\r
DEBUG_CODE (\r
\r
Status = Tpm2GetCapabilityFirmwareVersion (&FirmwareVersion1, &FirmwareVersion2);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2GetCapabilityFirmwareVersion fail!\n"));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2GetCapabilityFirmwareVersion fail!\n"));\r
} else {\r
- DEBUG ((EFI_D_INFO, "Tpm2GetCapabilityFirmwareVersion - %08x %08x\n", FirmwareVersion1, FirmwareVersion2));\r
+ DEBUG ((DEBUG_INFO, "Tpm2GetCapabilityFirmwareVersion - %08x %08x\n", FirmwareVersion1, FirmwareVersion2));\r
}\r
);\r
\r
Status = Tpm2GetCapabilityMaxCommandResponseSize (&MaxCommandSize, &MaxResponseSize);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Tpm2GetCapabilityMaxCommandResponseSize fail!\n"));\r
+ DEBUG ((DEBUG_ERROR, "Tpm2GetCapabilityMaxCommandResponseSize fail!\n"));\r
} else {\r
mTcgDxeData.BsCap.MaxCommandSize = (UINT16)MaxCommandSize;\r
mTcgDxeData.BsCap.MaxResponseSize = (UINT16)MaxResponseSize;\r
- DEBUG ((EFI_D_INFO, "Tpm2GetCapabilityMaxCommandResponseSize - %08x, %08x\n", MaxCommandSize, MaxResponseSize));\r
+ DEBUG ((DEBUG_INFO, "Tpm2GetCapabilityMaxCommandResponseSize - %08x, %08x\n", MaxCommandSize, MaxResponseSize));\r
}\r
\r
//\r
} else {\r
mTcgDxeData.BsCap.NumberOfPCRBanks = PcdGet32 (PcdTcg2NumberOfPCRBanks);\r
if (PcdGet32 (PcdTcg2NumberOfPCRBanks) > NumberOfPCRBanks) {\r
- DEBUG ((EFI_D_ERROR, "ERROR: PcdTcg2NumberOfPCRBanks(0x%x) > NumberOfPCRBanks(0x%x)\n", PcdGet32 (PcdTcg2NumberOfPCRBanks), NumberOfPCRBanks));\r
+ DEBUG ((DEBUG_ERROR, "ERROR: PcdTcg2NumberOfPCRBanks(0x%x) > NumberOfPCRBanks(0x%x)\n", PcdGet32 (PcdTcg2NumberOfPCRBanks), NumberOfPCRBanks));\r
mTcgDxeData.BsCap.NumberOfPCRBanks = NumberOfPCRBanks;\r
}\r
}\r
mTcgDxeData.BsCap.SupportedEventLogs &= ~EFI_TCG2_EVENT_LOG_FORMAT_TCG_1_2;\r
}\r
\r
- DEBUG ((EFI_D_INFO, "Tcg2.SupportedEventLogs - 0x%08x\n", mTcgDxeData.BsCap.SupportedEventLogs));\r
- DEBUG ((EFI_D_INFO, "Tcg2.HashAlgorithmBitmap - 0x%08x\n", mTcgDxeData.BsCap.HashAlgorithmBitmap));\r
- DEBUG ((EFI_D_INFO, "Tcg2.NumberOfPCRBanks - 0x%08x\n", mTcgDxeData.BsCap.NumberOfPCRBanks));\r
- DEBUG ((EFI_D_INFO, "Tcg2.ActivePcrBanks - 0x%08x\n", mTcgDxeData.BsCap.ActivePcrBanks));\r
+ DEBUG ((DEBUG_INFO, "Tcg2.SupportedEventLogs - 0x%08x\n", mTcgDxeData.BsCap.SupportedEventLogs));\r
+ DEBUG ((DEBUG_INFO, "Tcg2.HashAlgorithmBitmap - 0x%08x\n", mTcgDxeData.BsCap.HashAlgorithmBitmap));\r
+ DEBUG ((DEBUG_INFO, "Tcg2.NumberOfPCRBanks - 0x%08x\n", mTcgDxeData.BsCap.NumberOfPCRBanks));\r
+ DEBUG ((DEBUG_INFO, "Tcg2.ActivePcrBanks - 0x%08x\n", mTcgDxeData.BsCap.ActivePcrBanks));\r
\r
if (mTcgDxeData.BsCap.TPMPresentFlag) {\r
//\r
// Install Tcg2Protocol\r
//\r
Status = InstallTcg2 ();\r
- DEBUG ((EFI_D_INFO, "InstallTcg2 - %r\n", Status));\r
+ DEBUG ((DEBUG_INFO, "InstallTcg2 - %r\n", Status));\r
\r
return Status;\r
}\r
UINT32 Tpm2PcrMask;\r
UINT32 NewTpm2PcrMask;\r
\r
- DEBUG ((EFI_D_ERROR, "SyncPcrAllocationsAndPcrMask!\n"));\r
+ DEBUG ((DEBUG_ERROR, "SyncPcrAllocationsAndPcrMask!\n"));\r
\r
//\r
// Determine the current TPM support and the Platform PCR mask.\r
if ((TpmActivePcrBanks & Tpm2PcrMask) != TpmActivePcrBanks) {\r
NewTpmActivePcrBanks = TpmActivePcrBanks & Tpm2PcrMask;\r
\r
- DEBUG ((EFI_D_INFO, "%a - Reallocating PCR banks from 0x%X to 0x%X.\n", __FUNCTION__, TpmActivePcrBanks, NewTpmActivePcrBanks));\r
+ DEBUG ((DEBUG_INFO, "%a - Reallocating PCR banks from 0x%X to 0x%X.\n", __FUNCTION__, TpmActivePcrBanks, NewTpmActivePcrBanks));\r
if (NewTpmActivePcrBanks == 0) {\r
- DEBUG ((EFI_D_ERROR, "%a - No viable PCRs active! Please set a less restrictive value for PcdTpm2HashMask!\n", __FUNCTION__));\r
+ DEBUG ((DEBUG_ERROR, "%a - No viable PCRs active! Please set a less restrictive value for PcdTpm2HashMask!\n", __FUNCTION__));\r
ASSERT (FALSE);\r
} else {\r
Status = Tpm2PcrAllocateBanks (NULL, (UINT32)TpmHashAlgorithmBitmap, NewTpmActivePcrBanks);\r
//\r
// We can't do much here, but we hope that this doesn't happen.\r
//\r
- DEBUG ((EFI_D_ERROR, "%a - Failed to reallocate PCRs!\n", __FUNCTION__));\r
+ DEBUG ((DEBUG_ERROR, "%a - Failed to reallocate PCRs!\n", __FUNCTION__));\r
ASSERT_EFI_ERROR (Status);\r
}\r
//\r
if ((Tpm2PcrMask & TpmHashAlgorithmBitmap) != Tpm2PcrMask) {\r
NewTpm2PcrMask = Tpm2PcrMask & TpmHashAlgorithmBitmap;\r
\r
- DEBUG ((EFI_D_INFO, "%a - Updating PcdTpm2HashMask from 0x%X to 0x%X.\n", __FUNCTION__, Tpm2PcrMask, NewTpm2PcrMask));\r
+ DEBUG ((DEBUG_INFO, "%a - Updating PcdTpm2HashMask from 0x%X to 0x%X.\n", __FUNCTION__, Tpm2PcrMask, NewTpm2PcrMask));\r
if (NewTpm2PcrMask == 0) {\r
- DEBUG ((EFI_D_ERROR, "%a - No viable PCRs supported! Please set a less restrictive value for PcdTpm2HashMask!\n", __FUNCTION__));\r
+ DEBUG ((DEBUG_ERROR, "%a - No viable PCRs supported! Please set a less restrictive value for PcdTpm2HashMask!\n", __FUNCTION__));\r
ASSERT (FALSE);\r
}\r
\r
RetStatus = EFI_SUCCESS;\r
for (Index = 0; Index < sizeof(mTcg2EventInfo)/sizeof(mTcg2EventInfo[0]); Index++) {\r
if ((SupportedEventLogs & mTcg2EventInfo[Index].LogFormat) != 0) {\r
- DEBUG ((EFI_D_INFO, " LogFormat - 0x%08x\n", mTcg2EventInfo[Index].LogFormat));\r
+ DEBUG ((DEBUG_INFO, " LogFormat - 0x%08x\n", mTcg2EventInfo[Index].LogFormat));\r
switch (mTcg2EventInfo[Index].LogFormat) {\r
case EFI_TCG2_EVENT_LOG_FORMAT_TCG_1_2:\r
Status = GetDigestFromDigestList (TPM_ALG_SHA1, DigestList, &NewEventHdr->Digest);\r
}\r
\r
if (Status == EFI_DEVICE_ERROR) {\r
- DEBUG ((EFI_D_ERROR, "HashLogExtendEvent - %r. Disable TPM.\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "HashLogExtendEvent - %r. Disable TPM.\n", Status));\r
BuildGuidHob (&gTpmErrorHobGuid,0);\r
REPORT_STATUS_CODE (\r
EFI_ERROR_CODE | EFI_ERROR_MINOR,\r
}\r
\r
if (GetFirstGuidHob (&gTpmErrorHobGuid) != NULL) {\r
- DEBUG ((EFI_D_ERROR, "TPM2 error!\n"));\r
+ DEBUG ((DEBUG_ERROR, "TPM2 error!\n"));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
for (PcrIndex = 0; PcrIndex < 8; PcrIndex++) {\r
Status = MeasureSeparatorEventWithError (PcrIndex);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Separator Event with Error not Measured. Error!\n"));\r
+ DEBUG ((DEBUG_ERROR, "Separator Event with Error not Measured. Error!\n"));\r
}\r
}\r
}\r
\r
Done:\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "TPM2 error! Build Hob\n"));\r
+ DEBUG ((DEBUG_ERROR, "TPM2 error! Build Hob\n"));\r
BuildGuidHob (&gTpmErrorHobGuid,0);\r
REPORT_STATUS_CODE (\r
EFI_ERROR_CODE | EFI_ERROR_MINOR,\r
);\r
if (EFI_ERROR (Status)) {\r
mTcgNvs->MemoryClear.ReturnCode = MOR_REQUEST_GENERAL_FAILURE;\r
- DEBUG ((EFI_D_ERROR, "[TPM] Get MOR variable failure! Status = %r\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "[TPM] Get MOR variable failure! Status = %r\n", Status));\r
return EFI_SUCCESS;\r
}\r
\r
MorControl &= ~MOR_CLEAR_MEMORY_BIT_MASK;\r
} else {\r
mTcgNvs->MemoryClear.ReturnCode = MOR_REQUEST_GENERAL_FAILURE;\r
- DEBUG ((EFI_D_ERROR, "[TPM] MOR Parameter error! Parameter = %x\n", mTcgNvs->MemoryClear.Parameter));\r
+ DEBUG ((DEBUG_ERROR, "[TPM] MOR Parameter error! Parameter = %x\n", mTcgNvs->MemoryClear.Parameter));\r
return EFI_SUCCESS;\r
}\r
\r
);\r
if (EFI_ERROR (Status)) {\r
mTcgNvs->MemoryClear.ReturnCode = MOR_REQUEST_GENERAL_FAILURE;\r
- DEBUG ((EFI_D_ERROR, "[TPM] Set MOR variable failure! Status = %r\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "[TPM] Set MOR variable failure! Status = %r\n", Status));\r
}\r
\r
return EFI_SUCCESS;\r
EFI_HANDLE NotifyHandle;\r
\r
if (!CompareGuid (PcdGetPtr(PcdTpmInstanceGuid), &gEfiTpmDeviceInstanceTpm20DtpmGuid)){\r
- DEBUG ((EFI_D_ERROR, "No TPM2 DTPM instance required!\n"));\r
+ DEBUG ((DEBUG_ERROR, "No TPM2 DTPM instance required!\n"));\r
return EFI_UNSUPPORTED;\r
}\r
\r
\r
return Status;\r
}\r
-\r
EFI_TCG_PROTOCOL *TcgProtocol;\r
\r
if (!CompareGuid (PcdGetPtr(PcdTpmInstanceGuid), &gEfiTpmDeviceInstanceTpm12Guid)){\r
- DEBUG ((EFI_D_ERROR, "No TPM12 instance required!\n"));\r
+ DEBUG ((DEBUG_ERROR, "No TPM12 instance required!\n"));\r
return EFI_UNSUPPORTED;\r
}\r
\r
Status = Tpm12RequestUseTpm ();\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "TPM not detected!\n"));\r
+ DEBUG ((DEBUG_ERROR, "TPM not detected!\n"));\r
return Status;\r
}\r
\r
\r
Done:\r
if ((Status == EFI_DEVICE_ERROR) || (Status == EFI_TIMEOUT)) {\r
- DEBUG ((EFI_D_ERROR, "TcgDxeHashLogExtendEventI - %r. Disable TPM.\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "TcgDxeHashLogExtendEventI - %r. Disable TPM.\n", Status));\r
TcgData->BsCap.TPMPresentFlag = FALSE;\r
REPORT_STATUS_CODE (\r
EFI_ERROR_CODE | EFI_ERROR_MINOR,\r
//\r
Status = MeasureHandoffTables ();\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "HOBs not Measured. Error!\n"));\r
+ DEBUG ((DEBUG_ERROR, "HOBs not Measured. Error!\n"));\r
}\r
\r
//\r
//\r
Status = MeasureAllBootVariables ();\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Boot Variables not Measured. Error!\n"));\r
+ DEBUG ((DEBUG_ERROR, "Boot Variables not Measured. Error!\n"));\r
}\r
\r
//\r
EFI_CALLING_EFI_APPLICATION\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "%a not Measured. Error!\n", EFI_CALLING_EFI_APPLICATION));\r
+ DEBUG ((DEBUG_ERROR, "%a not Measured. Error!\n", EFI_CALLING_EFI_APPLICATION));\r
}\r
\r
//\r
EFI_RETURNING_FROM_EFI_APPLICATION\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "%a not Measured. Error!\n", EFI_RETURNING_FROM_EFI_APPLICATION));\r
+ DEBUG ((DEBUG_ERROR, "%a not Measured. Error!\n", EFI_RETURNING_FROM_EFI_APPLICATION));\r
}\r
}\r
\r
- DEBUG ((EFI_D_INFO, "TPM TcgDxe Measure Data when ReadyToBoot\n"));\r
+ DEBUG ((DEBUG_INFO, "TPM TcgDxe Measure Data when ReadyToBoot\n"));\r
//\r
// Increase boot attempt counter.\r
//\r
}\r
\r
if (EFI_ERROR (Status)) {\r
- DEBUG((EFI_D_ERROR, "Tcg Acpi Table installation failure"));\r
+ DEBUG((DEBUG_ERROR, "Tcg Acpi Table installation failure"));\r
}\r
}\r
\r
EFI_EXIT_BOOT_SERVICES_INVOCATION\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "%a not Measured. Error!\n", EFI_EXIT_BOOT_SERVICES_INVOCATION));\r
+ DEBUG ((DEBUG_ERROR, "%a not Measured. Error!\n", EFI_EXIT_BOOT_SERVICES_INVOCATION));\r
}\r
\r
//\r
EFI_EXIT_BOOT_SERVICES_SUCCEEDED\r
);\r
if (EFI_ERROR (Status)){\r
- DEBUG ((EFI_D_ERROR, "%a not Measured. Error!\n", EFI_EXIT_BOOT_SERVICES_SUCCEEDED));\r
+ DEBUG ((DEBUG_ERROR, "%a not Measured. Error!\n", EFI_EXIT_BOOT_SERVICES_SUCCEEDED));\r
}\r
}\r
\r
EFI_EXIT_BOOT_SERVICES_FAILED\r
);\r
if (EFI_ERROR (Status)){\r
- DEBUG ((EFI_D_ERROR, "%a not Measured. Error!\n", EFI_EXIT_BOOT_SERVICES_FAILED));\r
+ DEBUG ((DEBUG_ERROR, "%a not Measured. Error!\n", EFI_EXIT_BOOT_SERVICES_FAILED));\r
}\r
}\r
\r
VOID *Registration;\r
\r
if (!CompareGuid (PcdGetPtr(PcdTpmInstanceGuid), &gEfiTpmDeviceInstanceTpm12Guid)){\r
- DEBUG ((EFI_D_ERROR, "No TPM12 instance required!\n"));\r
+ DEBUG ((DEBUG_ERROR, "No TPM12 instance required!\n"));\r
return EFI_UNSUPPORTED;\r
}\r
\r
if (GetFirstGuidHob (&gTpmErrorHobGuid) != NULL) {\r
- DEBUG ((EFI_D_ERROR, "TPM error!\n"));\r
+ DEBUG ((DEBUG_ERROR, "TPM error!\n"));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
Status = Tpm12RequestUseTpm ();\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "TPM not detected!\n"));\r
+ DEBUG ((DEBUG_ERROR, "TPM not detected!\n"));\r
return Status;\r
}\r
\r
Status = GetTpmStatus (&mTcgDxeData.BsCap.TPMDeactivatedFlag);\r
if (EFI_ERROR (Status)) {\r
DEBUG ((\r
- EFI_D_ERROR,\r
+ DEBUG_ERROR,\r
"DriverEntry: TPM not working properly\n"\r
));\r
return Status;\r
\r
Done:\r
if ((Status == EFI_DEVICE_ERROR) || (Status == EFI_TIMEOUT)) {\r
- DEBUG ((EFI_D_ERROR, "HashLogExtendEvent - %r. Disable TPM.\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "HashLogExtendEvent - %r. Disable TPM.\n", Status));\r
BuildGuidHob (&gTpmErrorHobGuid,0);\r
REPORT_STATUS_CODE (\r
EFI_ERROR_CODE | EFI_ERROR_MINOR,\r
EFI_BOOT_MODE BootMode;\r
\r
if (!CompareGuid (PcdGetPtr(PcdTpmInstanceGuid), &gEfiTpmDeviceInstanceTpm12Guid)){\r
- DEBUG ((EFI_D_ERROR, "No TPM12 instance required!\n"));\r
+ DEBUG ((DEBUG_ERROR, "No TPM12 instance required!\n"));\r
return EFI_UNSUPPORTED;\r
}\r
\r
if (GetFirstGuidHob (&gTpmErrorHobGuid) != NULL) {\r
- DEBUG ((EFI_D_ERROR, "TPM error!\n"));\r
+ DEBUG ((DEBUG_ERROR, "TPM error!\n"));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
\r
Done:\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "TPM error! Build Hob\n"));\r
+ DEBUG ((DEBUG_ERROR, "TPM error! Build Hob\n"));\r
BuildGuidHob (&gTpmErrorHobGuid,0);\r
REPORT_STATUS_CODE (\r
EFI_ERROR_CODE | EFI_ERROR_MINOR,\r
&PpData\r
);\r
\r
- DEBUG ((EFI_D_INFO, "[TPM] PP callback, Parameter = %x\n", mTcgNvs->PhysicalPresence.Parameter));\r
+ DEBUG ((DEBUG_INFO, "[TPM] PP callback, Parameter = %x\n", mTcgNvs->PhysicalPresence.Parameter));\r
if (mTcgNvs->PhysicalPresence.Parameter == ACPI_FUNCTION_RETURN_REQUEST_RESPONSE_TO_OS) {\r
if (EFI_ERROR (Status)) {\r
mTcgNvs->PhysicalPresence.ReturnCode = PP_RETURN_TPM_OPERATION_RESPONSE_FAILURE;\r
mTcgNvs->PhysicalPresence.LastRequest = 0;\r
mTcgNvs->PhysicalPresence.Response = 0;\r
- DEBUG ((EFI_D_ERROR, "[TPM] Get PP variable failure! Status = %r\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "[TPM] Get PP variable failure! Status = %r\n", Status));\r
return EFI_SUCCESS;\r
}\r
mTcgNvs->PhysicalPresence.ReturnCode = PP_RETURN_TPM_OPERATION_RESPONSE_SUCCESS;\r
|| (mTcgNvs->PhysicalPresence.Parameter == ACPI_FUNCTION_SUBMIT_REQUEST_TO_BIOS_2)) {\r
if (EFI_ERROR (Status)) {\r
mTcgNvs->PhysicalPresence.ReturnCode = TCG_PP_SUBMIT_REQUEST_TO_PREOS_GENERAL_FAILURE;\r
- DEBUG ((EFI_D_ERROR, "[TPM] Get PP variable failure! Status = %r\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "[TPM] Get PP variable failure! Status = %r\n", Status));\r
return EFI_SUCCESS;\r
}\r
if (mTcgNvs->PhysicalPresence.Request == PHYSICAL_PRESENCE_SET_OPERATOR_AUTH) {\r
} else if (mTcgNvs->PhysicalPresence.Parameter == ACPI_FUNCTION_GET_USER_CONFIRMATION_STATUS_FOR_REQUEST) {\r
if (EFI_ERROR (Status)) {\r
mTcgNvs->PhysicalPresence.ReturnCode = TCG_PP_GET_USER_CONFIRMATION_BLOCKED_BY_BIOS_CONFIGURATION;\r
- DEBUG ((EFI_D_ERROR, "[TPM] Get PP variable failure! Status = %r\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "[TPM] Get PP variable failure! Status = %r\n", Status));\r
return EFI_SUCCESS;\r
}\r
//\r
);\r
if (EFI_ERROR (Status)) {\r
mTcgNvs->PhysicalPresence.ReturnCode = TCG_PP_GET_USER_CONFIRMATION_BLOCKED_BY_BIOS_CONFIGURATION;\r
- DEBUG ((EFI_D_ERROR, "[TPM] Get PP flags failure! Status = %r\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "[TPM] Get PP flags failure! Status = %r\n", Status));\r
return EFI_SUCCESS;\r
}\r
\r
);\r
if (EFI_ERROR (Status)) {\r
mTcgNvs->MemoryClear.ReturnCode = MOR_REQUEST_GENERAL_FAILURE;\r
- DEBUG ((EFI_D_ERROR, "[TPM] Get MOR variable failure! Status = %r\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "[TPM] Get MOR variable failure! Status = %r\n", Status));\r
return EFI_SUCCESS;\r
}\r
\r
MorControl &= ~MOR_CLEAR_MEMORY_BIT_MASK;\r
} else {\r
mTcgNvs->MemoryClear.ReturnCode = MOR_REQUEST_GENERAL_FAILURE;\r
- DEBUG ((EFI_D_ERROR, "[TPM] MOR Parameter error! Parameter = %x\n", mTcgNvs->MemoryClear.Parameter));\r
+ DEBUG ((DEBUG_ERROR, "[TPM] MOR Parameter error! Parameter = %x\n", mTcgNvs->MemoryClear.Parameter));\r
return EFI_SUCCESS;\r
}\r
\r
);\r
if (EFI_ERROR (Status)) {\r
mTcgNvs->MemoryClear.ReturnCode = MOR_REQUEST_GENERAL_FAILURE;\r
- DEBUG ((EFI_D_ERROR, "[TPM] Set MOR variable failure! Status = %r\n", Status));\r
+ DEBUG ((DEBUG_ERROR, "[TPM] Set MOR variable failure! Status = %r\n", Status));\r
}\r
\r
return EFI_SUCCESS;\r
EFI_HANDLE SwHandle;\r
\r
if (!CompareGuid (PcdGetPtr(PcdTpmInstanceGuid), &gEfiTpmDeviceInstanceTpm12Guid)){\r
- DEBUG ((EFI_D_ERROR, "No TPM12 instance required!\n"));\r
+ DEBUG ((DEBUG_ERROR, "No TPM12 instance required!\n"));\r
return EFI_UNSUPPORTED;\r
}\r
\r
\r
return EFI_SUCCESS;\r
}\r
-\r
DataSize = PkCert->SignatureListSize;\r
Status = CreateTimeBasedPayload (&DataSize, (UINT8**) &PkCert);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Fail to create time-based data payload: %r", Status));\r
+ DEBUG ((DEBUG_ERROR, "Fail to create time-based data payload: %r", Status));\r
goto ON_EXIT;\r
}\r
\r
);\r
if (EFI_ERROR (Status)) {\r
if (Status == EFI_OUT_OF_RESOURCES) {\r
- DEBUG ((EFI_D_ERROR, "Enroll PK failed with out of resource.\n"));\r
+ DEBUG ((DEBUG_ERROR, "Enroll PK failed with out of resource.\n"));\r
}\r
goto ON_EXIT;\r
}\r
| EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS;\r
Status = CreateTimeBasedPayload (&KekSigListSize, (UINT8**) &KekSigList);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Fail to create time-based data payload: %r", Status));\r
+ DEBUG ((DEBUG_ERROR, "Fail to create time-based data payload: %r", Status));\r
goto ON_EXIT;\r
}\r
\r
| EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS;\r
Status = CreateTimeBasedPayload (&KekSigListSize, (UINT8**) &KekSigList);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Fail to create time-based data payload: %r", Status));\r
+ DEBUG ((DEBUG_ERROR, "Fail to create time-based data payload: %r", Status));\r
goto ON_EXIT;\r
}\r
\r
| EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS;\r
Status = CreateTimeBasedPayload (&SigDBSize, (UINT8**) &Data);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Fail to create time-based data payload: %r", Status));\r
+ DEBUG ((DEBUG_ERROR, "Fail to create time-based data payload: %r", Status));\r
goto ON_EXIT;\r
}\r
\r
| EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS;\r
Status = CreateTimeBasedPayload (&SigDBSize, (UINT8**) &Data);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Fail to create time-based data payload: %r", Status));\r
+ DEBUG ((DEBUG_ERROR, "Fail to create time-based data payload: %r", Status));\r
goto ON_EXIT;\r
}\r
\r
if ((Attr & EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS) != 0) {\r
Status = CreateTimeBasedPayload (&DataSize, &OldData);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Fail to create time-based data payload: %r", Status));\r
+ DEBUG ((DEBUG_ERROR, "Fail to create time-based data payload: %r", Status));\r
goto ON_EXIT;\r
}\r
}\r
if ((Attr & EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS) != 0) {\r
Status = CreateTimeBasedPayload (&DataSize, &OldData);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Fail to create time-based data payload: %r", Status));\r
+ DEBUG ((DEBUG_ERROR, "Fail to create time-based data payload: %r", Status));\r
goto ON_EXIT;\r
}\r
}\r