#pragma pack(1)\r
\r
typedef struct {\r
- TPM2_COMMAND_HEADER Header;\r
- TPMI_RH_LOCKOUT LockHandle;\r
- UINT32 AuthSessionSize;\r
- TPMS_AUTH_COMMAND AuthSession;\r
+ TPM2_COMMAND_HEADER Header;\r
+ TPMI_RH_LOCKOUT LockHandle;\r
+ UINT32 AuthSessionSize;\r
+ TPMS_AUTH_COMMAND AuthSession;\r
} TPM2_DICTIONARY_ATTACK_LOCK_RESET_COMMAND;\r
\r
typedef struct {\r
- TPM2_RESPONSE_HEADER Header;\r
- UINT32 AuthSessionSize;\r
- TPMS_AUTH_RESPONSE AuthSession;\r
+ TPM2_RESPONSE_HEADER Header;\r
+ UINT32 AuthSessionSize;\r
+ TPMS_AUTH_RESPONSE AuthSession;\r
} TPM2_DICTIONARY_ATTACK_LOCK_RESET_RESPONSE;\r
\r
typedef struct {\r
- TPM2_COMMAND_HEADER Header;\r
- TPMI_RH_LOCKOUT LockHandle;\r
- UINT32 AuthSessionSize;\r
- TPMS_AUTH_COMMAND AuthSession;\r
- UINT32 NewMaxTries;\r
- UINT32 NewRecoveryTime;\r
- UINT32 LockoutRecovery;\r
+ TPM2_COMMAND_HEADER Header;\r
+ TPMI_RH_LOCKOUT LockHandle;\r
+ UINT32 AuthSessionSize;\r
+ TPMS_AUTH_COMMAND AuthSession;\r
+ UINT32 NewMaxTries;\r
+ UINT32 NewRecoveryTime;\r
+ UINT32 LockoutRecovery;\r
} TPM2_DICTIONARY_ATTACK_PARAMETERS_COMMAND;\r
\r
typedef struct {\r
- TPM2_RESPONSE_HEADER Header;\r
- UINT32 AuthSessionSize;\r
- TPMS_AUTH_RESPONSE AuthSession;\r
+ TPM2_RESPONSE_HEADER Header;\r
+ UINT32 AuthSessionSize;\r
+ TPMS_AUTH_RESPONSE AuthSession;\r
} TPM2_DICTIONARY_ATTACK_PARAMETERS_RESPONSE;\r
\r
#pragma pack()\r
EFI_STATUS\r
EFIAPI\r
Tpm2DictionaryAttackLockReset (\r
- IN TPMI_RH_LOCKOUT LockHandle,\r
- IN TPMS_AUTH_COMMAND *AuthSession\r
+ IN TPMI_RH_LOCKOUT LockHandle,\r
+ IN TPMS_AUTH_COMMAND *AuthSession\r
)\r
{\r
- EFI_STATUS Status;\r
- TPM2_DICTIONARY_ATTACK_LOCK_RESET_COMMAND SendBuffer;\r
- TPM2_DICTIONARY_ATTACK_LOCK_RESET_RESPONSE RecvBuffer;\r
- UINT32 SendBufferSize;\r
- UINT32 RecvBufferSize;\r
- UINT8 *Buffer;\r
- UINT32 SessionInfoSize;\r
+ EFI_STATUS Status;\r
+ TPM2_DICTIONARY_ATTACK_LOCK_RESET_COMMAND SendBuffer;\r
+ TPM2_DICTIONARY_ATTACK_LOCK_RESET_RESPONSE RecvBuffer;\r
+ UINT32 SendBufferSize;\r
+ UINT32 RecvBufferSize;\r
+ UINT8 *Buffer;\r
+ UINT32 SessionInfoSize;\r
\r
//\r
// Construct command\r
//\r
- SendBuffer.Header.tag = SwapBytes16(TPM_ST_SESSIONS);\r
- SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_DictionaryAttackLockReset);\r
+ SendBuffer.Header.tag = SwapBytes16 (TPM_ST_SESSIONS);\r
+ SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_DictionaryAttackLockReset);\r
\r
SendBuffer.LockHandle = SwapBytes32 (LockHandle);\r
\r
Buffer = (UINT8 *)&SendBuffer.AuthSession;\r
\r
// sessionInfoSize\r
- SessionInfoSize = CopyAuthSessionCommand (AuthSession, Buffer);\r
- Buffer += SessionInfoSize;\r
- SendBuffer.AuthSessionSize = SwapBytes32(SessionInfoSize);\r
+ SessionInfoSize = CopyAuthSessionCommand (AuthSession, Buffer);\r
+ Buffer += SessionInfoSize;\r
+ SendBuffer.AuthSessionSize = SwapBytes32 (SessionInfoSize);\r
\r
- SendBufferSize = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);\r
+ SendBufferSize = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);\r
SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);\r
\r
//\r
// send Tpm command\r
//\r
RecvBufferSize = sizeof (RecvBuffer);\r
- Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
+ Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
if (EFI_ERROR (Status)) {\r
goto Done;\r
}\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
- if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((DEBUG_ERROR, "Tpm2DictionaryAttackLockReset - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+\r
+ if (SwapBytes32 (RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
+ DEBUG ((DEBUG_ERROR, "Tpm2DictionaryAttackLockReset - responseCode - %x\n", SwapBytes32 (RecvBuffer.Header.responseCode)));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
//\r
// Clear AuthSession Content\r
//\r
- ZeroMem (&SendBuffer, sizeof(SendBuffer));\r
- ZeroMem (&RecvBuffer, sizeof(RecvBuffer));\r
+ ZeroMem (&SendBuffer, sizeof (SendBuffer));\r
+ ZeroMem (&RecvBuffer, sizeof (RecvBuffer));\r
return Status;\r
}\r
\r
EFI_STATUS\r
EFIAPI\r
Tpm2DictionaryAttackParameters (\r
- IN TPMI_RH_LOCKOUT LockHandle,\r
- IN TPMS_AUTH_COMMAND *AuthSession,\r
- IN UINT32 NewMaxTries,\r
- IN UINT32 NewRecoveryTime,\r
- IN UINT32 LockoutRecovery\r
+ IN TPMI_RH_LOCKOUT LockHandle,\r
+ IN TPMS_AUTH_COMMAND *AuthSession,\r
+ IN UINT32 NewMaxTries,\r
+ IN UINT32 NewRecoveryTime,\r
+ IN UINT32 LockoutRecovery\r
)\r
{\r
- EFI_STATUS Status;\r
- TPM2_DICTIONARY_ATTACK_PARAMETERS_COMMAND SendBuffer;\r
- TPM2_DICTIONARY_ATTACK_PARAMETERS_RESPONSE RecvBuffer;\r
- UINT32 SendBufferSize;\r
- UINT32 RecvBufferSize;\r
- UINT8 *Buffer;\r
- UINT32 SessionInfoSize;\r
+ EFI_STATUS Status;\r
+ TPM2_DICTIONARY_ATTACK_PARAMETERS_COMMAND SendBuffer;\r
+ TPM2_DICTIONARY_ATTACK_PARAMETERS_RESPONSE RecvBuffer;\r
+ UINT32 SendBufferSize;\r
+ UINT32 RecvBufferSize;\r
+ UINT8 *Buffer;\r
+ UINT32 SessionInfoSize;\r
\r
//\r
// Construct command\r
//\r
- SendBuffer.Header.tag = SwapBytes16(TPM_ST_SESSIONS);\r
- SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_DictionaryAttackParameters);\r
+ SendBuffer.Header.tag = SwapBytes16 (TPM_ST_SESSIONS);\r
+ SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_DictionaryAttackParameters);\r
\r
SendBuffer.LockHandle = SwapBytes32 (LockHandle);\r
\r
Buffer = (UINT8 *)&SendBuffer.AuthSession;\r
\r
// sessionInfoSize\r
- SessionInfoSize = CopyAuthSessionCommand (AuthSession, Buffer);\r
- Buffer += SessionInfoSize;\r
- SendBuffer.AuthSessionSize = SwapBytes32(SessionInfoSize);\r
+ SessionInfoSize = CopyAuthSessionCommand (AuthSession, Buffer);\r
+ Buffer += SessionInfoSize;\r
+ SendBuffer.AuthSessionSize = SwapBytes32 (SessionInfoSize);\r
\r
//\r
// Real data\r
//\r
- WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32(NewMaxTries));\r
- Buffer += sizeof(UINT32);\r
- WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32(NewRecoveryTime));\r
- Buffer += sizeof(UINT32);\r
- WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32(LockoutRecovery));\r
- Buffer += sizeof(UINT32);\r
+ WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32 (NewMaxTries));\r
+ Buffer += sizeof (UINT32);\r
+ WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32 (NewRecoveryTime));\r
+ Buffer += sizeof (UINT32);\r
+ WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32 (LockoutRecovery));\r
+ Buffer += sizeof (UINT32);\r
\r
- SendBufferSize = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);\r
+ SendBufferSize = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);\r
SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);\r
\r
//\r
// send Tpm command\r
//\r
RecvBufferSize = sizeof (RecvBuffer);\r
- Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
+ Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
if (EFI_ERROR (Status)) {\r
goto Done;\r
}\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
- if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((DEBUG_ERROR, "Tpm2DictionaryAttackParameters - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+\r
+ if (SwapBytes32 (RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
+ DEBUG ((DEBUG_ERROR, "Tpm2DictionaryAttackParameters - responseCode - %x\n", SwapBytes32 (RecvBuffer.Header.responseCode)));\r
Status = EFI_DEVICE_ERROR;\r
goto Done;\r
}\r
//\r
// Clear AuthSession Content\r
//\r
- ZeroMem (&SendBufferSize, sizeof(SendBufferSize));\r
- ZeroMem (&RecvBuffer, sizeof(RecvBuffer));\r
+ ZeroMem (&SendBufferSize, sizeof (SendBufferSize));\r
+ ZeroMem (&RecvBuffer, sizeof (RecvBuffer));\r
return Status;\r
}\r