]> git.proxmox.com Git - mirror_edk2.git/blobdiff - SecurityPkg/Library/Tpm2CommandLib/Tpm2EnhancedAuthorization.c
SecurityPkg: Apply uncrustify changes
[mirror_edk2.git] / SecurityPkg / Library / Tpm2CommandLib / Tpm2EnhancedAuthorization.c
index 53983d745bf667933ad92448d3fe291cfde35592..c63db70336a7a7d20f38557f7a4eb40d96bc82f1 100644 (file)
@@ -16,53 +16,53 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
 #pragma pack(1)\r
 \r
 typedef struct {\r
-  TPM2_COMMAND_HEADER       Header;\r
-  TPMI_DH_ENTITY            AuthHandle;\r
-  TPMI_SH_POLICY            PolicySession;\r
-  UINT32                    AuthSessionSize;\r
-  TPMS_AUTH_COMMAND         AuthSession;\r
-  TPM2B_NONCE               NonceTPM;\r
-  TPM2B_DIGEST              CpHashA;\r
-  TPM2B_NONCE               PolicyRef;\r
-  INT32                     Expiration;\r
+  TPM2_COMMAND_HEADER    Header;\r
+  TPMI_DH_ENTITY         AuthHandle;\r
+  TPMI_SH_POLICY         PolicySession;\r
+  UINT32                 AuthSessionSize;\r
+  TPMS_AUTH_COMMAND      AuthSession;\r
+  TPM2B_NONCE            NonceTPM;\r
+  TPM2B_DIGEST           CpHashA;\r
+  TPM2B_NONCE            PolicyRef;\r
+  INT32                  Expiration;\r
 } TPM2_POLICY_SECRET_COMMAND;\r
 \r
 typedef struct {\r
-  TPM2_RESPONSE_HEADER      Header;\r
-  UINT32                    AuthSessionSize;\r
-  TPM2B_TIMEOUT             Timeout;\r
-  TPMT_TK_AUTH              PolicyTicket;\r
-  TPMS_AUTH_RESPONSE        AuthSession;\r
+  TPM2_RESPONSE_HEADER    Header;\r
+  UINT32                  AuthSessionSize;\r
+  TPM2B_TIMEOUT           Timeout;\r
+  TPMT_TK_AUTH            PolicyTicket;\r
+  TPMS_AUTH_RESPONSE      AuthSession;\r
 } TPM2_POLICY_SECRET_RESPONSE;\r
 \r
 typedef struct {\r
-  TPM2_COMMAND_HEADER       Header;\r
-  TPMI_SH_POLICY            PolicySession;\r
-  TPML_DIGEST               HashList;\r
+  TPM2_COMMAND_HEADER    Header;\r
+  TPMI_SH_POLICY         PolicySession;\r
+  TPML_DIGEST            HashList;\r
 } TPM2_POLICY_OR_COMMAND;\r
 \r
 typedef struct {\r
-  TPM2_RESPONSE_HEADER      Header;\r
+  TPM2_RESPONSE_HEADER    Header;\r
 } TPM2_POLICY_OR_RESPONSE;\r
 \r
 typedef struct {\r
-  TPM2_COMMAND_HEADER       Header;\r
-  TPMI_SH_POLICY            PolicySession;\r
-  TPM_CC                    Code;\r
+  TPM2_COMMAND_HEADER    Header;\r
+  TPMI_SH_POLICY         PolicySession;\r
+  TPM_CC                 Code;\r
 } TPM2_POLICY_COMMAND_CODE_COMMAND;\r
 \r
 typedef struct {\r
-  TPM2_RESPONSE_HEADER      Header;\r
+  TPM2_RESPONSE_HEADER    Header;\r
 } TPM2_POLICY_COMMAND_CODE_RESPONSE;\r
 \r
 typedef struct {\r
-  TPM2_COMMAND_HEADER       Header;\r
-  TPMI_SH_POLICY            PolicySession;\r
+  TPM2_COMMAND_HEADER    Header;\r
+  TPMI_SH_POLICY         PolicySession;\r
 } TPM2_POLICY_GET_DIGEST_COMMAND;\r
 \r
 typedef struct {\r
-  TPM2_RESPONSE_HEADER      Header;\r
-  TPM2B_DIGEST              PolicyHash;\r
+  TPM2_RESPONSE_HEADER    Header;\r
+  TPM2B_DIGEST            PolicyHash;\r
 } TPM2_POLICY_GET_DIGEST_RESPONSE;\r
 \r
 #pragma pack()\r
@@ -88,32 +88,32 @@ typedef struct {
 EFI_STATUS\r
 EFIAPI\r
 Tpm2PolicySecret (\r
-  IN      TPMI_DH_ENTITY            AuthHandle,\r
-  IN      TPMI_SH_POLICY            PolicySession,\r
-  IN      TPMS_AUTH_COMMAND         *AuthSession  OPTIONAL,\r
-  IN      TPM2B_NONCE               *NonceTPM,\r
-  IN      TPM2B_DIGEST              *CpHashA,\r
-  IN      TPM2B_NONCE               *PolicyRef,\r
-  IN      INT32                     Expiration,\r
-  OUT     TPM2B_TIMEOUT             *Timeout,\r
-  OUT     TPMT_TK_AUTH              *PolicyTicket\r
+  IN      TPMI_DH_ENTITY     AuthHandle,\r
+  IN      TPMI_SH_POLICY     PolicySession,\r
+  IN      TPMS_AUTH_COMMAND  *AuthSession  OPTIONAL,\r
+  IN      TPM2B_NONCE        *NonceTPM,\r
+  IN      TPM2B_DIGEST       *CpHashA,\r
+  IN      TPM2B_NONCE        *PolicyRef,\r
+  IN      INT32              Expiration,\r
+  OUT     TPM2B_TIMEOUT      *Timeout,\r
+  OUT     TPMT_TK_AUTH       *PolicyTicket\r
   )\r
 {\r
-  EFI_STATUS                        Status;\r
-  TPM2_POLICY_SECRET_COMMAND        SendBuffer;\r
-  TPM2_POLICY_SECRET_RESPONSE       RecvBuffer;\r
-  UINT32                            SendBufferSize;\r
-  UINT32                            RecvBufferSize;\r
-  UINT8                             *Buffer;\r
-  UINT32                            SessionInfoSize;\r
+  EFI_STATUS                   Status;\r
+  TPM2_POLICY_SECRET_COMMAND   SendBuffer;\r
+  TPM2_POLICY_SECRET_RESPONSE  RecvBuffer;\r
+  UINT32                       SendBufferSize;\r
+  UINT32                       RecvBufferSize;\r
+  UINT8                        *Buffer;\r
+  UINT32                       SessionInfoSize;\r
 \r
   //\r
   // Construct command\r
   //\r
-  SendBuffer.Header.tag = SwapBytes16(TPM_ST_SESSIONS);\r
-  SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_PolicySecret);\r
-  SendBuffer.AuthHandle = SwapBytes32 (AuthHandle);\r
-  SendBuffer.PolicySession = SwapBytes32 (PolicySession);\r
+  SendBuffer.Header.tag         = SwapBytes16 (TPM_ST_SESSIONS);\r
+  SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_PolicySecret);\r
+  SendBuffer.AuthHandle         = SwapBytes32 (AuthHandle);\r
+  SendBuffer.PolicySession      = SwapBytes32 (PolicySession);\r
 \r
   //\r
   // Add in Auth session\r
@@ -121,39 +121,39 @@ Tpm2PolicySecret (
   Buffer = (UINT8 *)&SendBuffer.AuthSession;\r
 \r
   // sessionInfoSize\r
-  SessionInfoSize = CopyAuthSessionCommand (AuthSession, Buffer);\r
-  Buffer += SessionInfoSize;\r
-  SendBuffer.AuthSessionSize = SwapBytes32(SessionInfoSize);\r
+  SessionInfoSize            = CopyAuthSessionCommand (AuthSession, Buffer);\r
+  Buffer                    += SessionInfoSize;\r
+  SendBuffer.AuthSessionSize = SwapBytes32 (SessionInfoSize);\r
 \r
   //\r
   // Real data\r
   //\r
-  WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16(NonceTPM->size));\r
-  Buffer += sizeof(UINT16);\r
+  WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (NonceTPM->size));\r
+  Buffer += sizeof (UINT16);\r
   CopyMem (Buffer, NonceTPM->buffer, NonceTPM->size);\r
   Buffer += NonceTPM->size;\r
 \r
-  WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16(CpHashA->size));\r
-  Buffer += sizeof(UINT16);\r
+  WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (CpHashA->size));\r
+  Buffer += sizeof (UINT16);\r
   CopyMem (Buffer, CpHashA->buffer, CpHashA->size);\r
   Buffer += CpHashA->size;\r
 \r
-  WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16(PolicyRef->size));\r
-  Buffer += sizeof(UINT16);\r
+  WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (PolicyRef->size));\r
+  Buffer += sizeof (UINT16);\r
   CopyMem (Buffer, PolicyRef->buffer, PolicyRef->size);\r
   Buffer += PolicyRef->size;\r
 \r
-  WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32((UINT32)Expiration));\r
-  Buffer += sizeof(UINT32);\r
+  WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32 ((UINT32)Expiration));\r
+  Buffer += sizeof (UINT32);\r
 \r
-  SendBufferSize = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);\r
+  SendBufferSize              = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);\r
   SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);\r
 \r
   //\r
   // send Tpm command\r
   //\r
   RecvBufferSize = sizeof (RecvBuffer);\r
-  Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
+  Status         = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
   if (EFI_ERROR (Status)) {\r
     goto Done;\r
   }\r
@@ -163,8 +163,9 @@ Tpm2PolicySecret (
     Status = EFI_DEVICE_ERROR;\r
     goto Done;\r
   }\r
-  if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
-    DEBUG ((DEBUG_ERROR, "Tpm2PolicySecret - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+\r
+  if (SwapBytes32 (RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
+    DEBUG ((DEBUG_ERROR, "Tpm2PolicySecret - responseCode - %x\n", SwapBytes32 (RecvBuffer.Header.responseCode)));\r
     Status = EFI_DEVICE_ERROR;\r
     goto Done;\r
   }\r
@@ -172,24 +173,24 @@ Tpm2PolicySecret (
   //\r
   // Return the response\r
   //\r
-  Buffer = (UINT8 *)&RecvBuffer.Timeout;\r
-  Timeout->size = SwapBytes16(ReadUnaligned16 ((UINT16 *)Buffer));\r
-  if (Timeout->size > sizeof(UINT64)) {\r
+  Buffer        = (UINT8 *)&RecvBuffer.Timeout;\r
+  Timeout->size = SwapBytes16 (ReadUnaligned16 ((UINT16 *)Buffer));\r
+  if (Timeout->size > sizeof (UINT64)) {\r
     DEBUG ((DEBUG_ERROR, "Tpm2PolicySecret - Timeout->size error %x\n", Timeout->size));\r
     Status = EFI_DEVICE_ERROR;\r
     goto Done;\r
   }\r
 \r
-  Buffer += sizeof(UINT16);\r
+  Buffer += sizeof (UINT16);\r
   CopyMem (Timeout->buffer, Buffer, Timeout->size);\r
 \r
-  PolicyTicket->tag = SwapBytes16(ReadUnaligned16 ((UINT16 *)Buffer));\r
-  Buffer += sizeof(UINT16);\r
-  PolicyTicket->hierarchy = SwapBytes32(ReadUnaligned32 ((UINT32 *)Buffer));\r
-  Buffer += sizeof(UINT32);\r
-  PolicyTicket->digest.size = SwapBytes16(ReadUnaligned16 ((UINT16 *)Buffer));\r
-  Buffer += sizeof(UINT16);\r
-  if (PolicyTicket->digest.size > sizeof(TPMU_HA)) {\r
+  PolicyTicket->tag         = SwapBytes16 (ReadUnaligned16 ((UINT16 *)Buffer));\r
+  Buffer                   += sizeof (UINT16);\r
+  PolicyTicket->hierarchy   = SwapBytes32 (ReadUnaligned32 ((UINT32 *)Buffer));\r
+  Buffer                   += sizeof (UINT32);\r
+  PolicyTicket->digest.size = SwapBytes16 (ReadUnaligned16 ((UINT16 *)Buffer));\r
+  Buffer                   += sizeof (UINT16);\r
+  if (PolicyTicket->digest.size > sizeof (TPMU_HA)) {\r
     DEBUG ((DEBUG_ERROR, "Tpm2PolicySecret - digest.size error %x\n", PolicyTicket->digest.size));\r
     Status = EFI_DEVICE_ERROR;\r
     goto Done;\r
@@ -201,8 +202,8 @@ Done:
   //\r
   // Clear AuthSession Content\r
   //\r
-  ZeroMem (&SendBuffer, sizeof(SendBuffer));\r
-  ZeroMem (&RecvBuffer, sizeof(RecvBuffer));\r
+  ZeroMem (&SendBuffer, sizeof (SendBuffer));\r
+  ZeroMem (&RecvBuffer, sizeof (RecvBuffer));\r
   return Status;\r
 }\r
 \r
@@ -221,43 +222,43 @@ Done:
 EFI_STATUS\r
 EFIAPI\r
 Tpm2PolicyOR (\r
-  IN TPMI_SH_POLICY           PolicySession,\r
-  IN TPML_DIGEST              *HashList\r
+  IN TPMI_SH_POLICY  PolicySession,\r
+  IN TPML_DIGEST     *HashList\r
   )\r
 {\r
-  EFI_STATUS                        Status;\r
-  TPM2_POLICY_OR_COMMAND            SendBuffer;\r
-  TPM2_POLICY_OR_RESPONSE           RecvBuffer;\r
-  UINT32                            SendBufferSize;\r
-  UINT32                            RecvBufferSize;\r
-  UINT8                             *Buffer;\r
-  UINTN                             Index;\r
+  EFI_STATUS               Status;\r
+  TPM2_POLICY_OR_COMMAND   SendBuffer;\r
+  TPM2_POLICY_OR_RESPONSE  RecvBuffer;\r
+  UINT32                   SendBufferSize;\r
+  UINT32                   RecvBufferSize;\r
+  UINT8                    *Buffer;\r
+  UINTN                    Index;\r
 \r
   //\r
   // Construct command\r
   //\r
-  SendBuffer.Header.tag = SwapBytes16(TPM_ST_NO_SESSIONS);\r
-  SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_PolicyOR);\r
+  SendBuffer.Header.tag         = SwapBytes16 (TPM_ST_NO_SESSIONS);\r
+  SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_PolicyOR);\r
 \r
   SendBuffer.PolicySession = SwapBytes32 (PolicySession);\r
-  Buffer = (UINT8 *)&SendBuffer.HashList;\r
+  Buffer                   = (UINT8 *)&SendBuffer.HashList;\r
   WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32 (HashList->count));\r
-  Buffer += sizeof(UINT32);\r
+  Buffer += sizeof (UINT32);\r
   for (Index = 0; Index < HashList->count; Index++) {\r
     WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (HashList->digests[Index].size));\r
-    Buffer += sizeof(UINT16);\r
+    Buffer += sizeof (UINT16);\r
     CopyMem (Buffer, HashList->digests[Index].buffer, HashList->digests[Index].size);\r
     Buffer += HashList->digests[Index].size;\r
   }\r
 \r
-  SendBufferSize = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);\r
+  SendBufferSize              = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);\r
   SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);\r
 \r
   //\r
   // send Tpm command\r
   //\r
   RecvBufferSize = sizeof (RecvBuffer);\r
-  Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
+  Status         = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
   if (EFI_ERROR (Status)) {\r
     return Status;\r
   }\r
@@ -266,8 +267,9 @@ Tpm2PolicyOR (
     DEBUG ((DEBUG_ERROR, "Tpm2PolicyOR - RecvBufferSize Error - %x\n", RecvBufferSize));\r
     return EFI_DEVICE_ERROR;\r
   }\r
-  if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
-    DEBUG ((DEBUG_ERROR, "Tpm2PolicyOR - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+\r
+  if (SwapBytes32 (RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
+    DEBUG ((DEBUG_ERROR, "Tpm2PolicyOR - responseCode - %x\n", SwapBytes32 (RecvBuffer.Header.responseCode)));\r
     return EFI_DEVICE_ERROR;\r
   }\r
 \r
@@ -286,33 +288,33 @@ Tpm2PolicyOR (
 EFI_STATUS\r
 EFIAPI\r
 Tpm2PolicyCommandCode (\r
-  IN      TPMI_SH_POLICY            PolicySession,\r
-  IN      TPM_CC                    Code\r
+  IN      TPMI_SH_POLICY  PolicySession,\r
+  IN      TPM_CC          Code\r
   )\r
 {\r
-  EFI_STATUS                        Status;\r
-  TPM2_POLICY_COMMAND_CODE_COMMAND  SendBuffer;\r
-  TPM2_POLICY_COMMAND_CODE_RESPONSE RecvBuffer;\r
-  UINT32                            SendBufferSize;\r
-  UINT32                            RecvBufferSize;\r
+  EFI_STATUS                         Status;\r
+  TPM2_POLICY_COMMAND_CODE_COMMAND   SendBuffer;\r
+  TPM2_POLICY_COMMAND_CODE_RESPONSE  RecvBuffer;\r
+  UINT32                             SendBufferSize;\r
+  UINT32                             RecvBufferSize;\r
 \r
   //\r
   // Construct command\r
   //\r
-  SendBuffer.Header.tag = SwapBytes16(TPM_ST_NO_SESSIONS);\r
-  SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_PolicyCommandCode);\r
+  SendBuffer.Header.tag         = SwapBytes16 (TPM_ST_NO_SESSIONS);\r
+  SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_PolicyCommandCode);\r
 \r
   SendBuffer.PolicySession = SwapBytes32 (PolicySession);\r
-  SendBuffer.Code = SwapBytes32 (Code);\r
+  SendBuffer.Code          = SwapBytes32 (Code);\r
 \r
-  SendBufferSize = (UINT32) sizeof (SendBuffer);\r
+  SendBufferSize              = (UINT32)sizeof (SendBuffer);\r
   SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);\r
 \r
   //\r
   // send Tpm command\r
   //\r
   RecvBufferSize = sizeof (RecvBuffer);\r
-  Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
+  Status         = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
   if (EFI_ERROR (Status)) {\r
     return Status;\r
   }\r
@@ -321,8 +323,9 @@ Tpm2PolicyCommandCode (
     DEBUG ((DEBUG_ERROR, "Tpm2PolicyCommandCode - RecvBufferSize Error - %x\n", RecvBufferSize));\r
     return EFI_DEVICE_ERROR;\r
   }\r
-  if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
-    DEBUG ((DEBUG_ERROR, "Tpm2PolicyCommandCode - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+\r
+  if (SwapBytes32 (RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
+    DEBUG ((DEBUG_ERROR, "Tpm2PolicyCommandCode - responseCode - %x\n", SwapBytes32 (RecvBuffer.Header.responseCode)));\r
     return EFI_DEVICE_ERROR;\r
   }\r
 \r
@@ -342,32 +345,32 @@ Tpm2PolicyCommandCode (
 EFI_STATUS\r
 EFIAPI\r
 Tpm2PolicyGetDigest (\r
-  IN      TPMI_SH_POLICY            PolicySession,\r
-     OUT  TPM2B_DIGEST              *PolicyHash\r
+  IN      TPMI_SH_POLICY  PolicySession,\r
+  OUT  TPM2B_DIGEST       *PolicyHash\r
   )\r
 {\r
-  EFI_STATUS                        Status;\r
-  TPM2_POLICY_GET_DIGEST_COMMAND    SendBuffer;\r
-  TPM2_POLICY_GET_DIGEST_RESPONSE   RecvBuffer;\r
-  UINT32                            SendBufferSize;\r
-  UINT32                            RecvBufferSize;\r
+  EFI_STATUS                       Status;\r
+  TPM2_POLICY_GET_DIGEST_COMMAND   SendBuffer;\r
+  TPM2_POLICY_GET_DIGEST_RESPONSE  RecvBuffer;\r
+  UINT32                           SendBufferSize;\r
+  UINT32                           RecvBufferSize;\r
 \r
   //\r
   // Construct command\r
   //\r
-  SendBuffer.Header.tag = SwapBytes16(TPM_ST_NO_SESSIONS);\r
-  SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_PolicyGetDigest);\r
+  SendBuffer.Header.tag         = SwapBytes16 (TPM_ST_NO_SESSIONS);\r
+  SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_PolicyGetDigest);\r
 \r
   SendBuffer.PolicySession = SwapBytes32 (PolicySession);\r
 \r
-  SendBufferSize = (UINT32) sizeof (SendBuffer);\r
+  SendBufferSize              = (UINT32)sizeof (SendBuffer);\r
   SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);\r
 \r
   //\r
   // send Tpm command\r
   //\r
   RecvBufferSize = sizeof (RecvBuffer);\r
-  Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
+  Status         = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
   if (EFI_ERROR (Status)) {\r
     return Status;\r
   }\r
@@ -376,8 +379,9 @@ Tpm2PolicyGetDigest (
     DEBUG ((DEBUG_ERROR, "Tpm2PolicyGetDigest - RecvBufferSize Error - %x\n", RecvBufferSize));\r
     return EFI_DEVICE_ERROR;\r
   }\r
-  if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
-    DEBUG ((DEBUG_ERROR, "Tpm2PolicyGetDigest - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+\r
+  if (SwapBytes32 (RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
+    DEBUG ((DEBUG_ERROR, "Tpm2PolicyGetDigest - responseCode - %x\n", SwapBytes32 (RecvBuffer.Header.responseCode)));\r
     return EFI_DEVICE_ERROR;\r
   }\r
 \r
@@ -385,7 +389,7 @@ Tpm2PolicyGetDigest (
   // Return the response\r
   //\r
   PolicyHash->size = SwapBytes16 (RecvBuffer.PolicyHash.size);\r
-  if (PolicyHash->size > sizeof(TPMU_HA)) {\r
+  if (PolicyHash->size > sizeof (TPMU_HA)) {\r
     DEBUG ((DEBUG_ERROR, "Tpm2PolicyGetDigest - PolicyHash->size error %x\n", PolicyHash->size));\r
     return EFI_DEVICE_ERROR;\r
   }\r