]> git.proxmox.com Git - mirror_edk2.git/blobdiff - SecurityPkg/Library/DxeRsa2048Sha256GuidedSectionExtractLib/DxeRsa2048Sha256GuidedSectionExtractLib.c
SecurityPkg: Apply uncrustify changes
[mirror_edk2.git] / SecurityPkg / Library / DxeRsa2048Sha256GuidedSectionExtractLib / DxeRsa2048Sha256GuidedSectionExtractLib.c
index 5124b884c9eaea661a94da6f7451465f87151bfb..ad95fc1ffd669ae64aff1f38cfe5f9710753a6b3 100644 (file)
@@ -27,19 +27,19 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
 /// RSA 2048 SHA 256 Guided Section header\r
 ///\r
 typedef struct {\r
-  EFI_GUID_DEFINED_SECTION        GuidedSectionHeader;     ///< EFI guided section header\r
-  EFI_CERT_BLOCK_RSA_2048_SHA256  CertBlockRsa2048Sha256;  ///< RSA 2048-bit Signature\r
+  EFI_GUID_DEFINED_SECTION          GuidedSectionHeader;    ///< EFI guided section header\r
+  EFI_CERT_BLOCK_RSA_2048_SHA256    CertBlockRsa2048Sha256; ///< RSA 2048-bit Signature\r
 } RSA_2048_SHA_256_SECTION_HEADER;\r
 \r
 typedef struct {\r
-  EFI_GUID_DEFINED_SECTION2       GuidedSectionHeader;     ///< EFI guided section header\r
-  EFI_CERT_BLOCK_RSA_2048_SHA256  CertBlockRsa2048Sha256;  ///< RSA 2048-bit Signature\r
+  EFI_GUID_DEFINED_SECTION2         GuidedSectionHeader;    ///< EFI guided section header\r
+  EFI_CERT_BLOCK_RSA_2048_SHA256    CertBlockRsa2048Sha256; ///< RSA 2048-bit Signature\r
 } RSA_2048_SHA_256_SECTION2_HEADER;\r
 \r
 ///\r
 /// Public Exponent of RSA Key.\r
 ///\r
-CONST UINT8 mRsaE[] = { 0x01, 0x00, 0x01 };\r
+CONST UINT8  mRsaE[] = { 0x01, 0x00, 0x01 };\r
 \r
 /**\r
 \r
@@ -71,31 +71,37 @@ Rsa2048Sha256GuidedSectionGetInfo (
     // Check whether the input guid section is recognized.\r
     //\r
     if (!CompareGuid (\r
-        &gEfiCertTypeRsa2048Sha256Guid,\r
-        &(((EFI_GUID_DEFINED_SECTION2 *) InputSection)->SectionDefinitionGuid))) {\r
+           &gEfiCertTypeRsa2048Sha256Guid,\r
+           &(((EFI_GUID_DEFINED_SECTION2 *)InputSection)->SectionDefinitionGuid)\r
+           ))\r
+    {\r
       return EFI_INVALID_PARAMETER;\r
     }\r
+\r
     //\r
     // Retrieve the size and attribute of the input section data.\r
     //\r
-    *SectionAttribute  = ((EFI_GUID_DEFINED_SECTION2 *) InputSection)->Attributes;\r
+    *SectionAttribute  = ((EFI_GUID_DEFINED_SECTION2 *)InputSection)->Attributes;\r
     *ScratchBufferSize = 0;\r
-    *OutputBufferSize  = SECTION2_SIZE (InputSection) - sizeof(RSA_2048_SHA_256_SECTION2_HEADER);\r
+    *OutputBufferSize  = SECTION2_SIZE (InputSection) - sizeof (RSA_2048_SHA_256_SECTION2_HEADER);\r
   } else {\r
     //\r
     // Check whether the input guid section is recognized.\r
     //\r
     if (!CompareGuid (\r
-        &gEfiCertTypeRsa2048Sha256Guid,\r
-        &(((EFI_GUID_DEFINED_SECTION *) InputSection)->SectionDefinitionGuid))) {\r
+           &gEfiCertTypeRsa2048Sha256Guid,\r
+           &(((EFI_GUID_DEFINED_SECTION *)InputSection)->SectionDefinitionGuid)\r
+           ))\r
+    {\r
       return EFI_INVALID_PARAMETER;\r
     }\r
+\r
     //\r
     // Retrieve the size and attribute of the input section data.\r
     //\r
-    *SectionAttribute  = ((EFI_GUID_DEFINED_SECTION *) InputSection)->Attributes;\r
+    *SectionAttribute  = ((EFI_GUID_DEFINED_SECTION *)InputSection)->Attributes;\r
     *ScratchBufferSize = 0;\r
-    *OutputBufferSize  = SECTION_SIZE (InputSection) - sizeof(RSA_2048_SHA_256_SECTION_HEADER);\r
+    *OutputBufferSize  = SECTION_SIZE (InputSection) - sizeof (RSA_2048_SHA_256_SECTION_HEADER);\r
   }\r
 \r
   return EFI_SUCCESS;\r
@@ -146,15 +152,17 @@ Rsa2048Sha256GuidedSectionHandler (
     // Check whether the input guid section is recognized.\r
     //\r
     if (!CompareGuid (\r
-        &gEfiCertTypeRsa2048Sha256Guid,\r
-        &(((EFI_GUID_DEFINED_SECTION2 *)InputSection)->SectionDefinitionGuid))) {\r
+           &gEfiCertTypeRsa2048Sha256Guid,\r
+           &(((EFI_GUID_DEFINED_SECTION2 *)InputSection)->SectionDefinitionGuid)\r
+           ))\r
+    {\r
       return EFI_INVALID_PARAMETER;\r
     }\r
 \r
     //\r
     // Get the RSA 2048 SHA 256 information.\r
     //\r
-    CertBlockRsa2048Sha256 = &((RSA_2048_SHA_256_SECTION2_HEADER *) InputSection)->CertBlockRsa2048Sha256;\r
+    CertBlockRsa2048Sha256 = &((RSA_2048_SHA_256_SECTION2_HEADER *)InputSection)->CertBlockRsa2048Sha256;\r
     OutputBufferSize       = SECTION2_SIZE (InputSection) - sizeof (RSA_2048_SHA_256_SECTION2_HEADER);\r
     if ((((EFI_GUID_DEFINED_SECTION *)InputSection)->Attributes & EFI_GUIDED_SECTION_PROCESSING_REQUIRED) != 0) {\r
       PERF_INMODULE_BEGIN ("DxeRsaCopy");\r
@@ -174,8 +182,10 @@ Rsa2048Sha256GuidedSectionHandler (
     // Check whether the input guid section is recognized.\r
     //\r
     if (!CompareGuid (\r
-        &gEfiCertTypeRsa2048Sha256Guid,\r
-        &(((EFI_GUID_DEFINED_SECTION *)InputSection)->SectionDefinitionGuid))) {\r
+           &gEfiCertTypeRsa2048Sha256Guid,\r
+           &(((EFI_GUID_DEFINED_SECTION *)InputSection)->SectionDefinitionGuid)\r
+           ))\r
+    {\r
       return EFI_INVALID_PARAMETER;\r
     }\r
 \r
@@ -195,7 +205,7 @@ Rsa2048Sha256GuidedSectionHandler (
     //\r
     // Implicitly RSA 2048 SHA 256 GUIDed section should have STATUS_VALID bit set\r
     //\r
-    ASSERT ((((EFI_GUID_DEFINED_SECTION *) InputSection)->Attributes & EFI_GUIDED_SECTION_AUTH_STATUS_VALID) != 0);\r
+    ASSERT ((((EFI_GUID_DEFINED_SECTION *)InputSection)->Attributes & EFI_GUIDED_SECTION_AUTH_STATUS_VALID) != 0);\r
     *AuthenticationStatus = EFI_AUTH_STATUS_IMAGE_SIGNED;\r
   }\r
 \r
@@ -246,13 +256,15 @@ Rsa2048Sha256GuidedSectionHandler (
     *AuthenticationStatus |= EFI_AUTH_STATUS_TEST_FAILED;\r
     goto Done;\r
   }\r
-  CryptoStatus = Sha256Update (HashContext, &CertBlockRsa2048Sha256->PublicKey, sizeof(CertBlockRsa2048Sha256->PublicKey));\r
+\r
+  CryptoStatus = Sha256Update (HashContext, &CertBlockRsa2048Sha256->PublicKey, sizeof (CertBlockRsa2048Sha256->PublicKey));\r
   if (!CryptoStatus) {\r
     DEBUG ((DEBUG_ERROR, "DxeRsa2048Sha256: Sha256Update() failed\n"));\r
     *AuthenticationStatus |= EFI_AUTH_STATUS_TEST_FAILED;\r
     goto Done;\r
   }\r
-  CryptoStatus  = Sha256Final (HashContext, Digest);\r
+\r
+  CryptoStatus = Sha256Final (HashContext, Digest);\r
   if (!CryptoStatus) {\r
     DEBUG ((DEBUG_ERROR, "DxeRsa2048Sha256: Sha256Final() failed\n"));\r
     *AuthenticationStatus |= EFI_AUTH_STATUS_TEST_FAILED;\r
@@ -275,9 +287,11 @@ Rsa2048Sha256GuidedSectionHandler (
       CryptoStatus = TRUE;\r
       break;\r
     }\r
-    PublicKey = PublicKey + SHA256_DIGEST_SIZE;\r
+\r
+    PublicKey           = PublicKey + SHA256_DIGEST_SIZE;\r
     PublicKeyBufferSize = PublicKeyBufferSize - SHA256_DIGEST_SIZE;\r
   }\r
+\r
   if (!CryptoStatus) {\r
     DEBUG ((DEBUG_ERROR, "DxeRsa2048Sha256: Public key in section is not supported\n"));\r
     *AuthenticationStatus |= EFI_AUTH_STATUS_TEST_FAILED;\r
@@ -298,12 +312,13 @@ Rsa2048Sha256GuidedSectionHandler (
   // Set RSA Key Components.\r
   // NOTE: Only N and E are needed to be set as RSA public key for signature verification.\r
   //\r
-  CryptoStatus = RsaSetKey (Rsa, RsaKeyN, CertBlockRsa2048Sha256->PublicKey, sizeof(CertBlockRsa2048Sha256->PublicKey));\r
+  CryptoStatus = RsaSetKey (Rsa, RsaKeyN, CertBlockRsa2048Sha256->PublicKey, sizeof (CertBlockRsa2048Sha256->PublicKey));\r
   if (!CryptoStatus) {\r
     DEBUG ((DEBUG_ERROR, "DxeRsa2048Sha256: RsaSetKey(RsaKeyN) failed\n"));\r
     *AuthenticationStatus |= EFI_AUTH_STATUS_TEST_FAILED;\r
     goto Done;\r
   }\r
+\r
   CryptoStatus = RsaSetKey (Rsa, RsaKeyE, mRsaE, sizeof (mRsaE));\r
   if (!CryptoStatus) {\r
     DEBUG ((DEBUG_ERROR, "DxeRsa2048Sha256: RsaSetKey(RsaKeyE) failed\n"));\r
@@ -321,6 +336,7 @@ Rsa2048Sha256GuidedSectionHandler (
     *AuthenticationStatus |= EFI_AUTH_STATUS_TEST_FAILED;\r
     goto Done;\r
   }\r
+\r
   PERF_INMODULE_BEGIN ("DxeRsaShaData");\r
   CryptoStatus = Sha256Update (HashContext, *OutputBuffer, OutputBufferSize);\r
   PERF_INMODULE_END ("DxeRsaShaData");\r
@@ -329,7 +345,8 @@ Rsa2048Sha256GuidedSectionHandler (
     *AuthenticationStatus |= EFI_AUTH_STATUS_TEST_FAILED;\r
     goto Done;\r
   }\r
-  CryptoStatus  = Sha256Final (HashContext, Digest);\r
+\r
+  CryptoStatus = Sha256Final (HashContext, Digest);\r
   if (!CryptoStatus) {\r
     DEBUG ((DEBUG_ERROR, "DxeRsa2048Sha256: Sha256Final() failed\n"));\r
     *AuthenticationStatus |= EFI_AUTH_STATUS_TEST_FAILED;\r
@@ -363,6 +380,7 @@ Done:
   if (Rsa != NULL) {\r
     RsaFree (Rsa);\r
   }\r
+\r
   if (HashContext != NULL) {\r
     FreePool (HashContext);\r
   }\r