// algorithm used for context integrity.\r
//\r
\r
-UINT16 mAuthSize;\r
+UINT16 mAuthSize;\r
\r
/**\r
Generate high-quality entropy source through RDRAND.\r
EFI_STATUS\r
EFIAPI\r
RdRandGenerateEntropy (\r
- IN UINTN Length,\r
- OUT UINT8 *Entropy\r
+ IN UINTN Length,\r
+ OUT UINT8 *Entropy\r
)\r
{\r
EFI_STATUS Status;\r
UINT64 Seed[2];\r
UINT8 *Ptr;\r
\r
- Status = EFI_NOT_READY;\r
- BlockCount = Length / sizeof(Seed);\r
- Ptr = (UINT8 *)Entropy;\r
+ Status = EFI_NOT_READY;\r
+ BlockCount = Length / sizeof (Seed);\r
+ Ptr = (UINT8 *)Entropy;\r
\r
//\r
// Generate high-quality seed for DRBG Entropy\r
if (EFI_ERROR (Status)) {\r
return Status;\r
}\r
- CopyMem (Ptr, Seed, sizeof(Seed));\r
+\r
+ CopyMem (Ptr, Seed, sizeof (Seed));\r
\r
BlockCount--;\r
- Ptr = Ptr + sizeof(Seed);\r
+ Ptr = Ptr + sizeof (Seed);\r
}\r
\r
//\r
if (EFI_ERROR (Status)) {\r
return Status;\r
}\r
- CopyMem (Ptr, Seed, (Length % sizeof(Seed)));\r
+\r
+ CopyMem (Ptr, Seed, (Length % sizeof (Seed)));\r
\r
return Status;\r
}\r
EFI_STATUS\r
EFIAPI\r
GetAuthSize (\r
- OUT UINT16 *AuthSize\r
+ OUT UINT16 *AuthSize\r
)\r
{\r
- EFI_STATUS Status;\r
- TPML_PCR_SELECTION Pcrs;\r
- UINTN Index;\r
- UINT16 DigestSize;\r
+ EFI_STATUS Status;\r
+ TPML_PCR_SELECTION Pcrs;\r
+ UINTN Index;\r
+ UINT16 DigestSize;\r
\r
Status = EFI_SUCCESS;\r
\r
while (mAuthSize == 0) {\r
-\r
mAuthSize = SHA1_DIGEST_SIZE;\r
ZeroMem (&Pcrs, sizeof (TPML_PCR_SELECTION));\r
Status = Tpm2GetCapabilityPcrs (&Pcrs);\r
DEBUG ((DEBUG_ERROR, "alg - %x\n", Pcrs.pcrSelections[Index].hash));\r
\r
switch (Pcrs.pcrSelections[Index].hash) {\r
- case TPM_ALG_SHA1:\r
- DigestSize = SHA1_DIGEST_SIZE;\r
- break;\r
- case TPM_ALG_SHA256:\r
- DigestSize = SHA256_DIGEST_SIZE;\r
- break;\r
- case TPM_ALG_SHA384:\r
- DigestSize = SHA384_DIGEST_SIZE;\r
- break;\r
- case TPM_ALG_SHA512:\r
- DigestSize = SHA512_DIGEST_SIZE;\r
- break;\r
- case TPM_ALG_SM3_256:\r
- DigestSize = SM3_256_DIGEST_SIZE;\r
- break;\r
- default:\r
- DigestSize = SHA1_DIGEST_SIZE;\r
- break;\r
+ case TPM_ALG_SHA1:\r
+ DigestSize = SHA1_DIGEST_SIZE;\r
+ break;\r
+ case TPM_ALG_SHA256:\r
+ DigestSize = SHA256_DIGEST_SIZE;\r
+ break;\r
+ case TPM_ALG_SHA384:\r
+ DigestSize = SHA384_DIGEST_SIZE;\r
+ break;\r
+ case TPM_ALG_SHA512:\r
+ DigestSize = SHA512_DIGEST_SIZE;\r
+ break;\r
+ case TPM_ALG_SM3_256:\r
+ DigestSize = SM3_256_DIGEST_SIZE;\r
+ break;\r
+ default:\r
+ DigestSize = SHA1_DIGEST_SIZE;\r
+ break;\r
}\r
\r
if (DigestSize > mAuthSize) {\r
mAuthSize = DigestSize;\r
}\r
}\r
+\r
break;\r
}\r
\r
VOID\r
)\r
{\r
- EFI_STATUS Status;\r
- UINT16 AuthSize;\r
- TPM2B_AUTH NewPlatformAuth;\r
+ EFI_STATUS Status;\r
+ UINT16 AuthSize;\r
+ TPM2B_AUTH NewPlatformAuth;\r
\r
//\r
// Send Tpm2HierarchyChange Auth with random value to avoid PlatformAuth being null\r