STATIC\r
EFI_STATUS\r
CreateSigList (\r
- IN VOID *Data,\r
- IN UINTN Size,\r
- OUT EFI_SIGNATURE_LIST **SigList\r
+ IN VOID *Data,\r
+ IN UINTN Size,\r
+ OUT EFI_SIGNATURE_LIST **SigList\r
)\r
{\r
- UINTN SigListSize;\r
- EFI_SIGNATURE_LIST *TmpSigList;\r
- EFI_SIGNATURE_DATA *SigData;\r
+ UINTN SigListSize;\r
+ EFI_SIGNATURE_LIST *TmpSigList;\r
+ EFI_SIGNATURE_DATA *SigData;\r
\r
//\r
// Allocate data for Signature Database\r
//\r
SigListSize = sizeof (EFI_SIGNATURE_LIST) + sizeof (EFI_SIGNATURE_DATA) - 1 + Size;\r
- TmpSigList = (EFI_SIGNATURE_LIST *) AllocateZeroPool (SigListSize);\r
+ TmpSigList = (EFI_SIGNATURE_LIST *)AllocateZeroPool (SigListSize);\r
if (TmpSigList == NULL) {\r
return EFI_OUT_OF_RESOURCES;\r
}\r
//\r
// Only gEfiCertX509Guid type is supported\r
//\r
- TmpSigList->SignatureListSize = (UINT32)SigListSize;\r
- TmpSigList->SignatureSize = (UINT32) (sizeof (EFI_SIGNATURE_DATA) - 1 + Size);\r
+ TmpSigList->SignatureListSize = (UINT32)SigListSize;\r
+ TmpSigList->SignatureSize = (UINT32)(sizeof (EFI_SIGNATURE_DATA) - 1 + Size);\r
TmpSigList->SignatureHeaderSize = 0;\r
CopyGuid (&TmpSigList->SignatureType, &gEfiCertX509Guid);\r
\r
//\r
// Copy key data\r
//\r
- SigData = (EFI_SIGNATURE_DATA *) (TmpSigList + 1);\r
+ SigData = (EFI_SIGNATURE_DATA *)(TmpSigList + 1);\r
CopyGuid (&SigData->SignatureOwner, &gEfiGlobalVariableGuid);\r
CopyMem (&SigData->SignatureData[0], Data, Size);\r
\r
STATIC\r
EFI_STATUS\r
ConcatenateSigList (\r
- IN EFI_SIGNATURE_LIST *SigLists,\r
- IN EFI_SIGNATURE_LIST *SigListAppend,\r
- OUT EFI_SIGNATURE_LIST **SigListOut,\r
- IN OUT UINTN *SigListsSize\r
-)\r
+ IN EFI_SIGNATURE_LIST *SigLists,\r
+ IN EFI_SIGNATURE_LIST *SigListAppend,\r
+ OUT EFI_SIGNATURE_LIST **SigListOut,\r
+ IN OUT UINTN *SigListsSize\r
+ )\r
{\r
- EFI_SIGNATURE_LIST *TmpSigList;\r
- UINT8 *Offset;\r
- UINTN NewSigListsSize;\r
+ EFI_SIGNATURE_LIST *TmpSigList;\r
+ UINT8 *Offset;\r
+ UINTN NewSigListsSize;\r
\r
NewSigListsSize = *SigListsSize + SigListAppend->SignatureListSize;\r
\r
- TmpSigList = (EFI_SIGNATURE_LIST *) AllocateZeroPool (NewSigListsSize);\r
+ TmpSigList = (EFI_SIGNATURE_LIST *)AllocateZeroPool (NewSigListsSize);\r
if (TmpSigList == NULL) {\r
return EFI_OUT_OF_RESOURCES;\r
}\r
\r
CopyMem (TmpSigList, SigLists, *SigListsSize);\r
\r
- Offset = (UINT8 *)TmpSigList;\r
+ Offset = (UINT8 *)TmpSigList;\r
Offset += *SigListsSize;\r
CopyMem ((VOID *)Offset, SigListAppend, SigListAppend->SignatureListSize);\r
\r
*SigListsSize = NewSigListsSize;\r
- *SigListOut = TmpSigList;\r
+ *SigListOut = TmpSigList;\r
return EFI_SUCCESS;\r
}\r
\r
**/\r
EFI_STATUS\r
SecureBootFetchData (\r
- IN EFI_GUID *KeyFileGuid,\r
- OUT UINTN *SigListsSize,\r
- OUT EFI_SIGNATURE_LIST **SigListOut\r
-)\r
+ IN EFI_GUID *KeyFileGuid,\r
+ OUT UINTN *SigListsSize,\r
+ OUT EFI_SIGNATURE_LIST **SigListOut\r
+ )\r
{\r
- EFI_SIGNATURE_LIST *EfiSig;\r
- EFI_SIGNATURE_LIST *TmpEfiSig;\r
- EFI_SIGNATURE_LIST *TmpEfiSig2;\r
- EFI_STATUS Status;\r
- VOID *Buffer;\r
- VOID *RsaPubKey;\r
+ EFI_SIGNATURE_LIST *EfiSig;\r
+ EFI_SIGNATURE_LIST *TmpEfiSig;\r
+ EFI_SIGNATURE_LIST *TmpEfiSig2;\r
+ EFI_STATUS Status;\r
+ VOID *Buffer;\r
+ VOID *RsaPubKey;\r
UINTN Size;\r
UINTN KeyIndex;\r
\r
-\r
- KeyIndex = 0;\r
- EfiSig = NULL;\r
+ KeyIndex = 0;\r
+ EfiSig = NULL;\r
*SigListsSize = 0;\r
while (1) {\r
Status = GetSectionFromAnyFv (\r
if (RsaGetPublicKeyFromX509 (Buffer, Size, &RsaPubKey) == FALSE) {\r
DEBUG ((DEBUG_ERROR, "%a: Invalid key format: %d\n", __FUNCTION__, KeyIndex));\r
if (EfiSig != NULL) {\r
- FreePool(EfiSig);\r
+ FreePool (EfiSig);\r
}\r
- FreePool(Buffer);\r
+\r
+ FreePool (Buffer);\r
return EFI_INVALID_PARAMETER;\r
}\r
\r
// Concatenate lists if more than one section found\r
//\r
if (KeyIndex == 0) {\r
- EfiSig = TmpEfiSig;\r
+ EfiSig = TmpEfiSig;\r
*SigListsSize = TmpEfiSig->SignatureListSize;\r
} else {\r
ConcatenateSigList (EfiSig, TmpEfiSig, &TmpEfiSig2, SigListsSize);\r
\r
KeyIndex++;\r
FreePool (Buffer);\r
- } if (Status == EFI_NOT_FOUND) {\r
+ }\r
+\r
+ if (Status == EFI_NOT_FOUND) {\r
break;\r
}\r
- };\r
+ }\r
\r
if (KeyIndex == 0) {\r
return EFI_NOT_FOUND;\r
**/\r
EFI_STATUS\r
CreateTimeBasedPayload (\r
- IN OUT UINTN *DataSize,\r
- IN OUT UINT8 **Data\r
+ IN OUT UINTN *DataSize,\r
+ IN OUT UINT8 **Data\r
)\r
{\r
- EFI_STATUS Status;\r
- UINT8 *NewData;\r
- UINT8 *Payload;\r
- UINTN PayloadSize;\r
- EFI_VARIABLE_AUTHENTICATION_2 *DescriptorData;\r
- UINTN DescriptorSize;\r
- EFI_TIME Time;\r
-\r
- if (Data == NULL || DataSize == NULL) {\r
+ EFI_STATUS Status;\r
+ UINT8 *NewData;\r
+ UINT8 *Payload;\r
+ UINTN PayloadSize;\r
+ EFI_VARIABLE_AUTHENTICATION_2 *DescriptorData;\r
+ UINTN DescriptorSize;\r
+ EFI_TIME Time;\r
+\r
+ if ((Data == NULL) || (DataSize == NULL)) {\r
return EFI_INVALID_PARAMETER;\r
}\r
\r
Payload = *Data;\r
PayloadSize = *DataSize;\r
\r
- DescriptorSize = OFFSET_OF (EFI_VARIABLE_AUTHENTICATION_2, AuthInfo) + OFFSET_OF (WIN_CERTIFICATE_UEFI_GUID, CertData);\r
- NewData = (UINT8*) AllocateZeroPool (DescriptorSize + PayloadSize);\r
+ DescriptorSize = OFFSET_OF (EFI_VARIABLE_AUTHENTICATION_2, AuthInfo) + OFFSET_OF (WIN_CERTIFICATE_UEFI_GUID, CertData);\r
+ NewData = (UINT8 *)AllocateZeroPool (DescriptorSize + PayloadSize);\r
if (NewData == NULL) {\r
return EFI_OUT_OF_RESOURCES;\r
}\r
CopyMem (NewData + DescriptorSize, Payload, PayloadSize);\r
}\r
\r
- DescriptorData = (EFI_VARIABLE_AUTHENTICATION_2 *) (NewData);\r
+ DescriptorData = (EFI_VARIABLE_AUTHENTICATION_2 *)(NewData);\r
\r
ZeroMem (&Time, sizeof (EFI_TIME));\r
Status = gRT->GetTime (&Time, NULL);\r
if (EFI_ERROR (Status)) {\r
- FreePool(NewData);\r
+ FreePool (NewData);\r
return Status;\r
}\r
+\r
Time.Pad1 = 0;\r
Time.Nanosecond = 0;\r
Time.TimeZone = 0;\r
CopyGuid (&DescriptorData->AuthInfo.CertType, &gEfiCertPkcs7Guid);\r
\r
if (Payload != NULL) {\r
- FreePool(Payload);\r
+ FreePool (Payload);\r
}\r
\r
*DataSize = DescriptorSize + PayloadSize;\r
**/\r
EFI_STATUS\r
DeleteVariable (\r
- IN CHAR16 *VariableName,\r
- IN EFI_GUID *VendorGuid\r
+ IN CHAR16 *VariableName,\r
+ IN EFI_GUID *VendorGuid\r
)\r
{\r
- EFI_STATUS Status;\r
- VOID* Variable;\r
- UINT8 *Data;\r
- UINTN DataSize;\r
- UINT32 Attr;\r
+ EFI_STATUS Status;\r
+ VOID *Variable;\r
+ UINT8 *Data;\r
+ UINTN DataSize;\r
+ UINT32 Attr;\r
\r
GetVariable2 (VariableName, VendorGuid, &Variable, NULL);\r
if (Variable == NULL) {\r
return EFI_SUCCESS;\r
}\r
+\r
FreePool (Variable);\r
\r
Data = NULL;\r
if (Data != NULL) {\r
FreePool (Data);\r
}\r
+\r
return Status;\r
}\r
\r
EFI_STATUS\r
EFIAPI\r
GetSetupMode (\r
- OUT UINT8 *SetupMode\r
-)\r
+ OUT UINT8 *SetupMode\r
+ )\r
{\r
- UINTN Size;\r
- EFI_STATUS Status;\r
+ UINTN Size;\r
+ EFI_STATUS Status;\r
\r
- Size = sizeof (*SetupMode);\r
+ Size = sizeof (*SetupMode);\r
Status = gRT->GetVariable (\r
EFI_SETUP_MODE_NAME,\r
&gEfiGlobalVariableGuid,\r
EFIAPI\r
DeleteDb (\r
VOID\r
-)\r
+ )\r
{\r
- EFI_STATUS Status;\r
+ EFI_STATUS Status;\r
\r
Status = DeleteVariable (\r
EFI_IMAGE_SECURITY_DATABASE,\r
EFIAPI\r
DeleteDbx (\r
VOID\r
-)\r
+ )\r
{\r
- EFI_STATUS Status;\r
+ EFI_STATUS Status;\r
\r
Status = DeleteVariable (\r
EFI_IMAGE_SECURITY_DATABASE1,\r
EFIAPI\r
DeleteDbt (\r
VOID\r
-)\r
+ )\r
{\r
- EFI_STATUS Status;\r
+ EFI_STATUS Status;\r
\r
Status = DeleteVariable (\r
EFI_IMAGE_SECURITY_DATABASE2,\r
EFIAPI\r
DeleteKEK (\r
VOID\r
-)\r
+ )\r
{\r
- EFI_STATUS Status;\r
+ EFI_STATUS Status;\r
\r
Status = DeleteVariable (\r
EFI_KEY_EXCHANGE_KEY_NAME,\r
EFIAPI\r
DeletePlatformKey (\r
VOID\r
-)\r
+ )\r
{\r
- EFI_STATUS Status;\r
+ EFI_STATUS Status;\r
\r
- Status = SetSecureBootMode(CUSTOM_SECURE_BOOT_MODE);\r
+ Status = SetSecureBootMode (CUSTOM_SECURE_BOOT_MODE);\r
if (EFI_ERROR (Status)) {\r
return Status;\r
}\r