]> git.proxmox.com Git - mirror_edk2.git/blobdiff - SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c
SecurityPkg: Apply uncrustify changes
[mirror_edk2.git] / SecurityPkg / Library / AuthVariableLib / AuthVariableLib.c
index 7f31458edbd3f9bc42a31966565970ce49692f58..dc61ae840c3d21a42abe180613d3b928b2224fb1 100644 (file)
@@ -21,19 +21,19 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
 ///\r
 /// Global database array for scratch\r
 ///\r
-UINT8    *mCertDbStore;\r
-UINT32   mMaxCertDbSize;\r
-UINT32   mPlatformMode;\r
-UINT8    mVendorKeyState;\r
+UINT8   *mCertDbStore;\r
+UINT32  mMaxCertDbSize;\r
+UINT32  mPlatformMode;\r
+UINT8   mVendorKeyState;\r
 \r
-EFI_GUID mSignatureSupport[] = {EFI_CERT_SHA1_GUID, EFI_CERT_SHA256_GUID, EFI_CERT_RSA2048_GUID, EFI_CERT_X509_GUID};\r
+EFI_GUID  mSignatureSupport[] = { EFI_CERT_SHA1_GUID, EFI_CERT_SHA256_GUID, EFI_CERT_RSA2048_GUID, EFI_CERT_X509_GUID };\r
 \r
 //\r
 // Hash context pointer\r
 //\r
 VOID  *mHashCtx = NULL;\r
 \r
-VARIABLE_ENTRY_PROPERTY mAuthVarEntry[] = {\r
+VARIABLE_ENTRY_PROPERTY  mAuthVarEntry[] = {\r
   {\r
     &gEfiSecureBootEnableDisableGuid,\r
     EFI_SECURE_BOOT_ENABLE_NAME,\r
@@ -91,9 +91,9 @@ VARIABLE_ENTRY_PROPERTY mAuthVarEntry[] = {
   },\r
 };\r
 \r
-VOID **mAuthVarAddressPointer[9];\r
+VOID  **mAuthVarAddressPointer[9];\r
 \r
-AUTH_VAR_LIB_CONTEXT_IN *mAuthVarLibContextIn = NULL;\r
+AUTH_VAR_LIB_CONTEXT_IN  *mAuthVarLibContextIn = NULL;\r
 \r
 /**\r
   Initialization for authenticated variable services.\r
@@ -116,15 +116,15 @@ AuthVariableLibInitialize (
   OUT AUTH_VAR_LIB_CONTEXT_OUT  *AuthVarLibContextOut\r
   )\r
 {\r
-  EFI_STATUS            Status;\r
-  UINT32                VarAttr;\r
-  UINT8                 *Data;\r
-  UINTN                 DataSize;\r
-  UINTN                 CtxSize;\r
-  UINT8                 SecureBootMode;\r
-  UINT8                 SecureBootEnable;\r
-  UINT8                 CustomMode;\r
-  UINT32                ListSize;\r
+  EFI_STATUS  Status;\r
+  UINT32      VarAttr;\r
+  UINT8       *Data;\r
+  UINTN       DataSize;\r
+  UINTN       CtxSize;\r
+  UINT8       SecureBootMode;\r
+  UINT8       SecureBootEnable;\r
+  UINT8       CustomMode;\r
+  UINT32      ListSize;\r
 \r
   if ((AuthVarLibContextIn == NULL) || (AuthVarLibContextOut == NULL)) {\r
     return EFI_INVALID_PARAMETER;\r
@@ -135,8 +135,8 @@ AuthVariableLibInitialize (
   //\r
   // Initialize hash context.\r
   //\r
-  CtxSize   = Sha256GetContextSize ();\r
-  mHashCtx  = AllocateRuntimePool (CtxSize);\r
+  CtxSize  = Sha256GetContextSize ();\r
+  mHashCtx = AllocateRuntimePool (CtxSize);\r
   if (mHashCtx == NULL) {\r
     return EFI_OUT_OF_RESOURCES;\r
   }\r
@@ -145,13 +145,13 @@ AuthVariableLibInitialize (
   // Reserve runtime buffer for certificate database. The size excludes variable header and name size.\r
   // Use EFI_CERT_DB_VOLATILE_NAME size since it is longer.\r
   //\r
-  mMaxCertDbSize = (UINT32) (mAuthVarLibContextIn->MaxAuthVariableSize - sizeof (EFI_CERT_DB_VOLATILE_NAME));\r
+  mMaxCertDbSize = (UINT32)(mAuthVarLibContextIn->MaxAuthVariableSize - sizeof (EFI_CERT_DB_VOLATILE_NAME));\r
   mCertDbStore   = AllocateRuntimePool (mMaxCertDbSize);\r
   if (mCertDbStore == NULL) {\r
     return EFI_OUT_OF_RESOURCES;\r
   }\r
 \r
-  Status = AuthServiceInternalFindVariable (EFI_PLATFORM_KEY_NAME, &gEfiGlobalVariableGuid, (VOID **) &Data, &DataSize);\r
+  Status = AuthServiceInternalFindVariable (EFI_PLATFORM_KEY_NAME, &gEfiGlobalVariableGuid, (VOID **)&Data, &DataSize);\r
   if (EFI_ERROR (Status)) {\r
     DEBUG ((DEBUG_INFO, "Variable %s does not exist.\n", EFI_PLATFORM_KEY_NAME));\r
   } else {\r
@@ -166,11 +166,12 @@ AuthVariableLibInitialize (
   } else {\r
     mPlatformMode = USER_MODE;\r
   }\r
+\r
   Status = AuthServiceInternalUpdateVariable (\r
              EFI_SETUP_MODE_NAME,\r
              &gEfiGlobalVariableGuid,\r
              &mPlatformMode,\r
-             sizeof(UINT8),\r
+             sizeof (UINT8),\r
              EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS\r
              );\r
   if (EFI_ERROR (Status)) {\r
@@ -180,13 +181,13 @@ AuthVariableLibInitialize (
   //\r
   // Create "SignatureSupport" variable with BS+RT attribute set.\r
   //\r
-  Status  = AuthServiceInternalUpdateVariable (\r
-              EFI_SIGNATURE_SUPPORT_NAME,\r
-              &gEfiGlobalVariableGuid,\r
-              mSignatureSupport,\r
-              sizeof(mSignatureSupport),\r
-              EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS\r
-              );\r
+  Status = AuthServiceInternalUpdateVariable (\r
+             EFI_SIGNATURE_SUPPORT_NAME,\r
+             &gEfiGlobalVariableGuid,\r
+             mSignatureSupport,\r
+             sizeof (mSignatureSupport),\r
+             EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS\r
+             );\r
   if (EFI_ERROR (Status)) {\r
     return Status;\r
   }\r
@@ -197,23 +198,23 @@ AuthVariableLibInitialize (
   // If "SecureBootEnable" variable is SECURE_BOOT_DISABLE, Set "SecureBoot" variable to SECURE_BOOT_MODE_DISABLE.\r
   //\r
   SecureBootEnable = SECURE_BOOT_DISABLE;\r
-  Status = AuthServiceInternalFindVariable (EFI_SECURE_BOOT_ENABLE_NAME, &gEfiSecureBootEnableDisableGuid, (VOID **) &Data, &DataSize);\r
+  Status           = AuthServiceInternalFindVariable (EFI_SECURE_BOOT_ENABLE_NAME, &gEfiSecureBootEnableDisableGuid, (VOID **)&Data, &DataSize);\r
   if (!EFI_ERROR (Status)) {\r
-    if (mPlatformMode == USER_MODE){\r
-      SecureBootEnable = *(UINT8 *) Data;\r
+    if (mPlatformMode == USER_MODE) {\r
+      SecureBootEnable = *(UINT8 *)Data;\r
     }\r
   } else if (mPlatformMode == USER_MODE) {\r
     //\r
     // "SecureBootEnable" not exist, initialize it in USER_MODE.\r
     //\r
     SecureBootEnable = SECURE_BOOT_ENABLE;\r
-    Status = AuthServiceInternalUpdateVariable (\r
-               EFI_SECURE_BOOT_ENABLE_NAME,\r
-               &gEfiSecureBootEnableDisableGuid,\r
-               &SecureBootEnable,\r
-               sizeof (UINT8),\r
-               EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS\r
-               );\r
+    Status           = AuthServiceInternalUpdateVariable (\r
+                         EFI_SECURE_BOOT_ENABLE_NAME,\r
+                         &gEfiSecureBootEnableDisableGuid,\r
+                         &SecureBootEnable,\r
+                         sizeof (UINT8),\r
+                         EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS\r
+                         );\r
     if (EFI_ERROR (Status)) {\r
       return Status;\r
     }\r
@@ -222,11 +223,12 @@ AuthVariableLibInitialize (
   //\r
   // Create "SecureBoot" variable with BS+RT attribute set.\r
   //\r
-  if (SecureBootEnable == SECURE_BOOT_ENABLE && mPlatformMode == USER_MODE) {\r
+  if ((SecureBootEnable == SECURE_BOOT_ENABLE) && (mPlatformMode == USER_MODE)) {\r
     SecureBootMode = SECURE_BOOT_MODE_ENABLE;\r
   } else {\r
     SecureBootMode = SECURE_BOOT_MODE_DISABLE;\r
   }\r
+\r
   Status = AuthServiceInternalUpdateVariable (\r
              EFI_SECURE_BOOT_MODE_NAME,\r
              &gEfiGlobalVariableGuid,\r
@@ -246,13 +248,13 @@ AuthVariableLibInitialize (
   // Initialize "CustomMode" in STANDARD_SECURE_BOOT_MODE state.\r
   //\r
   CustomMode = STANDARD_SECURE_BOOT_MODE;\r
-  Status = AuthServiceInternalUpdateVariable (\r
-             EFI_CUSTOM_MODE_NAME,\r
-             &gEfiCustomModeEnableGuid,\r
-             &CustomMode,\r
-             sizeof (UINT8),\r
-             EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS\r
-             );\r
+  Status     = AuthServiceInternalUpdateVariable (\r
+                 EFI_CUSTOM_MODE_NAME,\r
+                 &gEfiCustomModeEnableGuid,\r
+                 &CustomMode,\r
+                 sizeof (UINT8),\r
+                 EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS\r
+                 );\r
   if (EFI_ERROR (Status)) {\r
     return Status;\r
   }\r
@@ -267,7 +269,7 @@ AuthVariableLibInitialize (
   Status = AuthServiceInternalFindVariable (\r
              EFI_CERT_DB_NAME,\r
              &gEfiCertDbGuid,\r
-             (VOID **) &Data,\r
+             (VOID **)&Data,\r
              &DataSize\r
              );\r
   if (EFI_ERROR (Status)) {\r
@@ -287,7 +289,7 @@ AuthVariableLibInitialize (
     //\r
     // Clean up Certs to make certDB & Time based auth variable consistent\r
     //\r
-    Status = CleanCertsFromDb();\r
+    Status = CleanCertsFromDb ();\r
     if (EFI_ERROR (Status)) {\r
       DEBUG ((DEBUG_ERROR, "Clean up CertDB fail! Status %x\n", Status));\r
       return Status;\r
@@ -313,7 +315,7 @@ AuthVariableLibInitialize (
   //\r
   // Check "VendorKeysNv" variable's existence and create "VendorKeys" variable accordingly.\r
   //\r
-  Status = AuthServiceInternalFindVariable (EFI_VENDOR_KEYS_NV_VARIABLE_NAME, &gEfiVendorKeysNvGuid, (VOID **) &Data, &DataSize);\r
+  Status = AuthServiceInternalFindVariable (EFI_VENDOR_KEYS_NV_VARIABLE_NAME, &gEfiVendorKeysNvGuid, (VOID **)&Data, &DataSize);\r
   if (!EFI_ERROR (Status)) {\r
     mVendorKeyState = *(UINT8 *)Data;\r
   } else {\r
@@ -321,13 +323,13 @@ AuthVariableLibInitialize (
     // "VendorKeysNv" not exist, initialize it in VENDOR_KEYS_VALID state.\r
     //\r
     mVendorKeyState = VENDOR_KEYS_VALID;\r
-    Status = AuthServiceInternalUpdateVariable (\r
-               EFI_VENDOR_KEYS_NV_VARIABLE_NAME,\r
-               &gEfiVendorKeysNvGuid,\r
-               &mVendorKeyState,\r
-               sizeof (UINT8),\r
-               EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS\r
-               );\r
+    Status          = AuthServiceInternalUpdateVariable (\r
+                        EFI_VENDOR_KEYS_NV_VARIABLE_NAME,\r
+                        &gEfiVendorKeysNvGuid,\r
+                        &mVendorKeyState,\r
+                        sizeof (UINT8),\r
+                        EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS\r
+                        );\r
     if (EFI_ERROR (Status)) {\r
       return Status;\r
     }\r
@@ -349,20 +351,20 @@ AuthVariableLibInitialize (
 \r
   DEBUG ((DEBUG_INFO, "Variable %s is %x\n", EFI_VENDOR_KEYS_VARIABLE_NAME, mVendorKeyState));\r
 \r
-  AuthVarLibContextOut->StructVersion = AUTH_VAR_LIB_CONTEXT_OUT_STRUCT_VERSION;\r
-  AuthVarLibContextOut->StructSize = sizeof (AUTH_VAR_LIB_CONTEXT_OUT);\r
-  AuthVarLibContextOut->AuthVarEntry = mAuthVarEntry;\r
-  AuthVarLibContextOut->AuthVarEntryCount = ARRAY_SIZE (mAuthVarEntry);\r
-  mAuthVarAddressPointer[0] = (VOID **) &mCertDbStore;\r
-  mAuthVarAddressPointer[1] = (VOID **) &mHashCtx;\r
-  mAuthVarAddressPointer[2] = (VOID **) &mAuthVarLibContextIn;\r
-  mAuthVarAddressPointer[3] = (VOID **) &(mAuthVarLibContextIn->FindVariable),\r
-  mAuthVarAddressPointer[4] = (VOID **) &(mAuthVarLibContextIn->FindNextVariable),\r
-  mAuthVarAddressPointer[5] = (VOID **) &(mAuthVarLibContextIn->UpdateVariable),\r
-  mAuthVarAddressPointer[6] = (VOID **) &(mAuthVarLibContextIn->GetScratchBuffer),\r
-  mAuthVarAddressPointer[7] = (VOID **) &(mAuthVarLibContextIn->CheckRemainingSpaceForConsistency),\r
-  mAuthVarAddressPointer[8] = (VOID **) &(mAuthVarLibContextIn->AtRuntime),\r
-  AuthVarLibContextOut->AddressPointer = mAuthVarAddressPointer;\r
+  AuthVarLibContextOut->StructVersion       = AUTH_VAR_LIB_CONTEXT_OUT_STRUCT_VERSION;\r
+  AuthVarLibContextOut->StructSize          = sizeof (AUTH_VAR_LIB_CONTEXT_OUT);\r
+  AuthVarLibContextOut->AuthVarEntry        = mAuthVarEntry;\r
+  AuthVarLibContextOut->AuthVarEntryCount   = ARRAY_SIZE (mAuthVarEntry);\r
+  mAuthVarAddressPointer[0]                 = (VOID **)&mCertDbStore;\r
+  mAuthVarAddressPointer[1]                 = (VOID **)&mHashCtx;\r
+  mAuthVarAddressPointer[2]                 = (VOID **)&mAuthVarLibContextIn;\r
+  mAuthVarAddressPointer[3]                 = (VOID **)&(mAuthVarLibContextIn->FindVariable),\r
+  mAuthVarAddressPointer[4]                 = (VOID **)&(mAuthVarLibContextIn->FindNextVariable),\r
+  mAuthVarAddressPointer[5]                 = (VOID **)&(mAuthVarLibContextIn->UpdateVariable),\r
+  mAuthVarAddressPointer[6]                 = (VOID **)&(mAuthVarLibContextIn->GetScratchBuffer),\r
+  mAuthVarAddressPointer[7]                 = (VOID **)&(mAuthVarLibContextIn->CheckRemainingSpaceForConsistency),\r
+  mAuthVarAddressPointer[8]                 = (VOID **)&(mAuthVarLibContextIn->AtRuntime),\r
+  AuthVarLibContextOut->AddressPointer      = mAuthVarAddressPointer;\r
   AuthVarLibContextOut->AddressPointerCount = ARRAY_SIZE (mAuthVarAddressPointer);\r
 \r
   return Status;\r
@@ -391,16 +393,16 @@ AuthVariableLibInitialize (
 EFI_STATUS\r
 EFIAPI\r
 AuthVariableLibProcessVariable (\r
-  IN CHAR16         *VariableName,\r
-  IN EFI_GUID       *VendorGuid,\r
-  IN VOID           *Data,\r
-  IN UINTN          DataSize,\r
-  IN UINT32         Attributes\r
+  IN CHAR16    *VariableName,\r
+  IN EFI_GUID  *VendorGuid,\r
+  IN VOID      *Data,\r
+  IN UINTN     DataSize,\r
+  IN UINT32    Attributes\r
   )\r
 {\r
-  EFI_STATUS        Status;\r
+  EFI_STATUS  Status;\r
 \r
-  if (CompareGuid (VendorGuid, &gEfiGlobalVariableGuid) && (StrCmp (VariableName, EFI_PLATFORM_KEY_NAME) == 0)){\r
+  if (CompareGuid (VendorGuid, &gEfiGlobalVariableGuid) && (StrCmp (VariableName, EFI_PLATFORM_KEY_NAME) == 0)) {\r
     Status = ProcessVarWithPk (VariableName, VendorGuid, Data, DataSize, Attributes, TRUE);\r
   } else if (CompareGuid (VendorGuid, &gEfiGlobalVariableGuid) && (StrCmp (VariableName, EFI_KEY_EXCHANGE_KEY_NAME) == 0)) {\r
     Status = ProcessVarWithPk (VariableName, VendorGuid, Data, DataSize, Attributes, FALSE);\r
@@ -408,7 +410,8 @@ AuthVariableLibProcessVariable (
              ((StrCmp (VariableName, EFI_IMAGE_SECURITY_DATABASE)  == 0) ||\r
               (StrCmp (VariableName, EFI_IMAGE_SECURITY_DATABASE1) == 0) ||\r
               (StrCmp (VariableName, EFI_IMAGE_SECURITY_DATABASE2) == 0)\r
-             )) {\r
+             ))\r
+  {\r
     Status = ProcessVarWithPk (VariableName, VendorGuid, Data, DataSize, Attributes, FALSE);\r
     if (EFI_ERROR (Status)) {\r
       Status = ProcessVarWithKek (VariableName, VendorGuid, Data, DataSize, Attributes);\r