]> git.proxmox.com Git - mirror_edk2.git/blobdiff - SecurityPkg/Library/Tpm2CommandLib/Tpm2DictionaryAttack.c
SecurityPkg: Apply uncrustify changes
[mirror_edk2.git] / SecurityPkg / Library / Tpm2CommandLib / Tpm2DictionaryAttack.c
index 2f830e0aea4898cac173c0ef6a2789e36207696f..ac8183d9ea885f73ec0ae39a15b4d308567aceb3 100644 (file)
@@ -16,32 +16,32 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
 #pragma pack(1)\r
 \r
 typedef struct {\r
-  TPM2_COMMAND_HEADER       Header;\r
-  TPMI_RH_LOCKOUT           LockHandle;\r
-  UINT32                    AuthSessionSize;\r
-  TPMS_AUTH_COMMAND         AuthSession;\r
+  TPM2_COMMAND_HEADER    Header;\r
+  TPMI_RH_LOCKOUT        LockHandle;\r
+  UINT32                 AuthSessionSize;\r
+  TPMS_AUTH_COMMAND      AuthSession;\r
 } TPM2_DICTIONARY_ATTACK_LOCK_RESET_COMMAND;\r
 \r
 typedef struct {\r
-  TPM2_RESPONSE_HEADER       Header;\r
-  UINT32                     AuthSessionSize;\r
-  TPMS_AUTH_RESPONSE         AuthSession;\r
+  TPM2_RESPONSE_HEADER    Header;\r
+  UINT32                  AuthSessionSize;\r
+  TPMS_AUTH_RESPONSE      AuthSession;\r
 } TPM2_DICTIONARY_ATTACK_LOCK_RESET_RESPONSE;\r
 \r
 typedef struct {\r
-  TPM2_COMMAND_HEADER       Header;\r
-  TPMI_RH_LOCKOUT           LockHandle;\r
-  UINT32                    AuthSessionSize;\r
-  TPMS_AUTH_COMMAND         AuthSession;\r
-  UINT32                    NewMaxTries;\r
-  UINT32                    NewRecoveryTime;\r
-  UINT32                    LockoutRecovery;\r
+  TPM2_COMMAND_HEADER    Header;\r
+  TPMI_RH_LOCKOUT        LockHandle;\r
+  UINT32                 AuthSessionSize;\r
+  TPMS_AUTH_COMMAND      AuthSession;\r
+  UINT32                 NewMaxTries;\r
+  UINT32                 NewRecoveryTime;\r
+  UINT32                 LockoutRecovery;\r
 } TPM2_DICTIONARY_ATTACK_PARAMETERS_COMMAND;\r
 \r
 typedef struct {\r
-  TPM2_RESPONSE_HEADER       Header;\r
-  UINT32                     AuthSessionSize;\r
-  TPMS_AUTH_RESPONSE         AuthSession;\r
+  TPM2_RESPONSE_HEADER    Header;\r
+  UINT32                  AuthSessionSize;\r
+  TPMS_AUTH_RESPONSE      AuthSession;\r
 } TPM2_DICTIONARY_ATTACK_PARAMETERS_RESPONSE;\r
 \r
 #pragma pack()\r
@@ -59,23 +59,23 @@ typedef struct {
 EFI_STATUS\r
 EFIAPI\r
 Tpm2DictionaryAttackLockReset (\r
-  IN  TPMI_RH_LOCKOUT           LockHandle,\r
-  IN  TPMS_AUTH_COMMAND         *AuthSession\r
+  IN  TPMI_RH_LOCKOUT    LockHandle,\r
+  IN  TPMS_AUTH_COMMAND  *AuthSession\r
   )\r
 {\r
-  EFI_STATUS                                 Status;\r
-  TPM2_DICTIONARY_ATTACK_LOCK_RESET_COMMAND  SendBuffer;\r
-  TPM2_DICTIONARY_ATTACK_LOCK_RESET_RESPONSE RecvBuffer;\r
-  UINT32                                     SendBufferSize;\r
-  UINT32                                     RecvBufferSize;\r
-  UINT8                                      *Buffer;\r
-  UINT32                                     SessionInfoSize;\r
+  EFI_STATUS                                  Status;\r
+  TPM2_DICTIONARY_ATTACK_LOCK_RESET_COMMAND   SendBuffer;\r
+  TPM2_DICTIONARY_ATTACK_LOCK_RESET_RESPONSE  RecvBuffer;\r
+  UINT32                                      SendBufferSize;\r
+  UINT32                                      RecvBufferSize;\r
+  UINT8                                       *Buffer;\r
+  UINT32                                      SessionInfoSize;\r
 \r
   //\r
   // Construct command\r
   //\r
-  SendBuffer.Header.tag = SwapBytes16(TPM_ST_SESSIONS);\r
-  SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_DictionaryAttackLockReset);\r
+  SendBuffer.Header.tag         = SwapBytes16 (TPM_ST_SESSIONS);\r
+  SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_DictionaryAttackLockReset);\r
 \r
   SendBuffer.LockHandle = SwapBytes32 (LockHandle);\r
 \r
@@ -85,18 +85,18 @@ Tpm2DictionaryAttackLockReset (
   Buffer = (UINT8 *)&SendBuffer.AuthSession;\r
 \r
   // sessionInfoSize\r
-  SessionInfoSize = CopyAuthSessionCommand (AuthSession, Buffer);\r
-  Buffer += SessionInfoSize;\r
-  SendBuffer.AuthSessionSize = SwapBytes32(SessionInfoSize);\r
+  SessionInfoSize            = CopyAuthSessionCommand (AuthSession, Buffer);\r
+  Buffer                    += SessionInfoSize;\r
+  SendBuffer.AuthSessionSize = SwapBytes32 (SessionInfoSize);\r
 \r
-  SendBufferSize = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);\r
+  SendBufferSize              = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);\r
   SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);\r
 \r
   //\r
   // send Tpm command\r
   //\r
   RecvBufferSize = sizeof (RecvBuffer);\r
-  Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
+  Status         = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
   if (EFI_ERROR (Status)) {\r
     goto Done;\r
   }\r
@@ -106,8 +106,9 @@ Tpm2DictionaryAttackLockReset (
     Status = EFI_DEVICE_ERROR;\r
     goto Done;\r
   }\r
-  if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
-    DEBUG ((DEBUG_ERROR, "Tpm2DictionaryAttackLockReset - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+\r
+  if (SwapBytes32 (RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
+    DEBUG ((DEBUG_ERROR, "Tpm2DictionaryAttackLockReset - responseCode - %x\n", SwapBytes32 (RecvBuffer.Header.responseCode)));\r
     Status = EFI_DEVICE_ERROR;\r
     goto Done;\r
   }\r
@@ -116,8 +117,8 @@ Done:
   //\r
   // Clear AuthSession Content\r
   //\r
-  ZeroMem (&SendBuffer, sizeof(SendBuffer));\r
-  ZeroMem (&RecvBuffer, sizeof(RecvBuffer));\r
+  ZeroMem (&SendBuffer, sizeof (SendBuffer));\r
+  ZeroMem (&RecvBuffer, sizeof (RecvBuffer));\r
   return Status;\r
 }\r
 \r
@@ -137,26 +138,26 @@ Done:
 EFI_STATUS\r
 EFIAPI\r
 Tpm2DictionaryAttackParameters (\r
-  IN  TPMI_RH_LOCKOUT           LockHandle,\r
-  IN  TPMS_AUTH_COMMAND         *AuthSession,\r
-  IN  UINT32                    NewMaxTries,\r
-  IN  UINT32                    NewRecoveryTime,\r
-  IN  UINT32                    LockoutRecovery\r
+  IN  TPMI_RH_LOCKOUT    LockHandle,\r
+  IN  TPMS_AUTH_COMMAND  *AuthSession,\r
+  IN  UINT32             NewMaxTries,\r
+  IN  UINT32             NewRecoveryTime,\r
+  IN  UINT32             LockoutRecovery\r
   )\r
 {\r
-  EFI_STATUS                                 Status;\r
-  TPM2_DICTIONARY_ATTACK_PARAMETERS_COMMAND  SendBuffer;\r
-  TPM2_DICTIONARY_ATTACK_PARAMETERS_RESPONSE RecvBuffer;\r
-  UINT32                                     SendBufferSize;\r
-  UINT32                                     RecvBufferSize;\r
-  UINT8                                      *Buffer;\r
-  UINT32                                     SessionInfoSize;\r
+  EFI_STATUS                                  Status;\r
+  TPM2_DICTIONARY_ATTACK_PARAMETERS_COMMAND   SendBuffer;\r
+  TPM2_DICTIONARY_ATTACK_PARAMETERS_RESPONSE  RecvBuffer;\r
+  UINT32                                      SendBufferSize;\r
+  UINT32                                      RecvBufferSize;\r
+  UINT8                                       *Buffer;\r
+  UINT32                                      SessionInfoSize;\r
 \r
   //\r
   // Construct command\r
   //\r
-  SendBuffer.Header.tag = SwapBytes16(TPM_ST_SESSIONS);\r
-  SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_DictionaryAttackParameters);\r
+  SendBuffer.Header.tag         = SwapBytes16 (TPM_ST_SESSIONS);\r
+  SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_DictionaryAttackParameters);\r
 \r
   SendBuffer.LockHandle = SwapBytes32 (LockHandle);\r
 \r
@@ -166,28 +167,28 @@ Tpm2DictionaryAttackParameters (
   Buffer = (UINT8 *)&SendBuffer.AuthSession;\r
 \r
   // sessionInfoSize\r
-  SessionInfoSize = CopyAuthSessionCommand (AuthSession, Buffer);\r
-  Buffer += SessionInfoSize;\r
-  SendBuffer.AuthSessionSize = SwapBytes32(SessionInfoSize);\r
+  SessionInfoSize            = CopyAuthSessionCommand (AuthSession, Buffer);\r
+  Buffer                    += SessionInfoSize;\r
+  SendBuffer.AuthSessionSize = SwapBytes32 (SessionInfoSize);\r
 \r
   //\r
   // Real data\r
   //\r
-  WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32(NewMaxTries));\r
-  Buffer += sizeof(UINT32);\r
-  WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32(NewRecoveryTime));\r
-  Buffer += sizeof(UINT32);\r
-  WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32(LockoutRecovery));\r
-  Buffer += sizeof(UINT32);\r
+  WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32 (NewMaxTries));\r
+  Buffer += sizeof (UINT32);\r
+  WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32 (NewRecoveryTime));\r
+  Buffer += sizeof (UINT32);\r
+  WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32 (LockoutRecovery));\r
+  Buffer += sizeof (UINT32);\r
 \r
-  SendBufferSize = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);\r
+  SendBufferSize              = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);\r
   SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);\r
 \r
   //\r
   // send Tpm command\r
   //\r
   RecvBufferSize = sizeof (RecvBuffer);\r
-  Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
+  Status         = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
   if (EFI_ERROR (Status)) {\r
     goto Done;\r
   }\r
@@ -197,8 +198,9 @@ Tpm2DictionaryAttackParameters (
     Status = EFI_DEVICE_ERROR;\r
     goto Done;\r
   }\r
-  if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
-    DEBUG ((DEBUG_ERROR, "Tpm2DictionaryAttackParameters - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+\r
+  if (SwapBytes32 (RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
+    DEBUG ((DEBUG_ERROR, "Tpm2DictionaryAttackParameters - responseCode - %x\n", SwapBytes32 (RecvBuffer.Header.responseCode)));\r
     Status = EFI_DEVICE_ERROR;\r
     goto Done;\r
   }\r
@@ -207,7 +209,7 @@ Done:
   //\r
   // Clear AuthSession Content\r
   //\r
-  ZeroMem (&SendBufferSize, sizeof(SendBufferSize));\r
-  ZeroMem (&RecvBuffer, sizeof(RecvBuffer));\r
+  ZeroMem (&SendBufferSize, sizeof (SendBufferSize));\r
+  ZeroMem (&RecvBuffer, sizeof (RecvBuffer));\r
   return Status;\r
 }\r