]> git.proxmox.com Git - mirror_edk2.git/blobdiff - SecurityPkg/Library/Tpm2CommandLib/Tpm2NVStorage.c
SecurityPkg: Apply uncrustify changes
[mirror_edk2.git] / SecurityPkg / Library / Tpm2CommandLib / Tpm2NVStorage.c
index d9171fb9a01803b0a26ca7812926b139883c580c..5077ace7c2c402a3b046882c51099598d7f536e1 100644 (file)
@@ -15,137 +15,137 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
 \r
 #pragma pack(1)\r
 \r
-#define RC_NV_ReadPublic_nvIndex            (TPM_RC_H + TPM_RC_1)\r
+#define RC_NV_ReadPublic_nvIndex  (TPM_RC_H + TPM_RC_1)\r
 \r
-#define RC_NV_DefineSpace_authHandle        (TPM_RC_H + TPM_RC_1)\r
-#define RC_NV_DefineSpace_auth              (TPM_RC_P + TPM_RC_1)\r
-#define RC_NV_DefineSpace_publicInfo        (TPM_RC_P + TPM_RC_2)\r
+#define RC_NV_DefineSpace_authHandle  (TPM_RC_H + TPM_RC_1)\r
+#define RC_NV_DefineSpace_auth        (TPM_RC_P + TPM_RC_1)\r
+#define RC_NV_DefineSpace_publicInfo  (TPM_RC_P + TPM_RC_2)\r
 \r
-#define RC_NV_UndefineSpace_authHandle      (TPM_RC_H + TPM_RC_1)\r
-#define RC_NV_UndefineSpace_nvIndex         (TPM_RC_H + TPM_RC_2)\r
+#define RC_NV_UndefineSpace_authHandle  (TPM_RC_H + TPM_RC_1)\r
+#define RC_NV_UndefineSpace_nvIndex     (TPM_RC_H + TPM_RC_2)\r
 \r
-#define RC_NV_Read_authHandle               (TPM_RC_H + TPM_RC_1)\r
-#define RC_NV_Read_nvIndex                  (TPM_RC_H + TPM_RC_2)\r
-#define RC_NV_Read_size                     (TPM_RC_P + TPM_RC_1)\r
-#define RC_NV_Read_offset                   (TPM_RC_P + TPM_RC_2)\r
+#define RC_NV_Read_authHandle  (TPM_RC_H + TPM_RC_1)\r
+#define RC_NV_Read_nvIndex     (TPM_RC_H + TPM_RC_2)\r
+#define RC_NV_Read_size        (TPM_RC_P + TPM_RC_1)\r
+#define RC_NV_Read_offset      (TPM_RC_P + TPM_RC_2)\r
 \r
-#define RC_NV_Write_authHandle              (TPM_RC_H + TPM_RC_1)\r
-#define RC_NV_Write_nvIndex                 (TPM_RC_H + TPM_RC_2)\r
-#define RC_NV_Write_data                    (TPM_RC_P + TPM_RC_1)\r
-#define RC_NV_Write_offset                  (TPM_RC_P + TPM_RC_2)\r
+#define RC_NV_Write_authHandle  (TPM_RC_H + TPM_RC_1)\r
+#define RC_NV_Write_nvIndex     (TPM_RC_H + TPM_RC_2)\r
+#define RC_NV_Write_data        (TPM_RC_P + TPM_RC_1)\r
+#define RC_NV_Write_offset      (TPM_RC_P + TPM_RC_2)\r
 \r
 typedef struct {\r
-  TPM2_COMMAND_HEADER       Header;\r
-  TPMI_RH_NV_INDEX          NvIndex;\r
+  TPM2_COMMAND_HEADER    Header;\r
+  TPMI_RH_NV_INDEX       NvIndex;\r
 } TPM2_NV_READPUBLIC_COMMAND;\r
 \r
 typedef struct {\r
-  TPM2_RESPONSE_HEADER      Header;\r
-  TPM2B_NV_PUBLIC           NvPublic;\r
-  TPM2B_NAME                NvName;\r
+  TPM2_RESPONSE_HEADER    Header;\r
+  TPM2B_NV_PUBLIC         NvPublic;\r
+  TPM2B_NAME              NvName;\r
 } TPM2_NV_READPUBLIC_RESPONSE;\r
 \r
 typedef struct {\r
-  TPM2_COMMAND_HEADER       Header;\r
-  TPMI_RH_PROVISION         AuthHandle;\r
-  UINT32                    AuthSessionSize;\r
-  TPMS_AUTH_COMMAND         AuthSession;\r
-  TPM2B_AUTH                Auth;\r
-  TPM2B_NV_PUBLIC           NvPublic;\r
+  TPM2_COMMAND_HEADER    Header;\r
+  TPMI_RH_PROVISION      AuthHandle;\r
+  UINT32                 AuthSessionSize;\r
+  TPMS_AUTH_COMMAND      AuthSession;\r
+  TPM2B_AUTH             Auth;\r
+  TPM2B_NV_PUBLIC        NvPublic;\r
 } TPM2_NV_DEFINESPACE_COMMAND;\r
 \r
 typedef struct {\r
-  TPM2_RESPONSE_HEADER       Header;\r
-  UINT32                     AuthSessionSize;\r
-  TPMS_AUTH_RESPONSE         AuthSession;\r
+  TPM2_RESPONSE_HEADER    Header;\r
+  UINT32                  AuthSessionSize;\r
+  TPMS_AUTH_RESPONSE      AuthSession;\r
 } TPM2_NV_DEFINESPACE_RESPONSE;\r
 \r
 typedef struct {\r
-  TPM2_COMMAND_HEADER       Header;\r
-  TPMI_RH_PROVISION         AuthHandle;\r
-  TPMI_RH_NV_INDEX          NvIndex;\r
-  UINT32                    AuthSessionSize;\r
-  TPMS_AUTH_COMMAND         AuthSession;\r
+  TPM2_COMMAND_HEADER    Header;\r
+  TPMI_RH_PROVISION      AuthHandle;\r
+  TPMI_RH_NV_INDEX       NvIndex;\r
+  UINT32                 AuthSessionSize;\r
+  TPMS_AUTH_COMMAND      AuthSession;\r
 } TPM2_NV_UNDEFINESPACE_COMMAND;\r
 \r
 typedef struct {\r
-  TPM2_RESPONSE_HEADER       Header;\r
-  UINT32                     AuthSessionSize;\r
-  TPMS_AUTH_RESPONSE         AuthSession;\r
+  TPM2_RESPONSE_HEADER    Header;\r
+  UINT32                  AuthSessionSize;\r
+  TPMS_AUTH_RESPONSE      AuthSession;\r
 } TPM2_NV_UNDEFINESPACE_RESPONSE;\r
 \r
 typedef struct {\r
-  TPM2_COMMAND_HEADER       Header;\r
-  TPMI_RH_NV_AUTH           AuthHandle;\r
-  TPMI_RH_NV_INDEX          NvIndex;\r
-  UINT32                    AuthSessionSize;\r
-  TPMS_AUTH_COMMAND         AuthSession;\r
-  UINT16                    Size;\r
-  UINT16                    Offset;\r
+  TPM2_COMMAND_HEADER    Header;\r
+  TPMI_RH_NV_AUTH        AuthHandle;\r
+  TPMI_RH_NV_INDEX       NvIndex;\r
+  UINT32                 AuthSessionSize;\r
+  TPMS_AUTH_COMMAND      AuthSession;\r
+  UINT16                 Size;\r
+  UINT16                 Offset;\r
 } TPM2_NV_READ_COMMAND;\r
 \r
 typedef struct {\r
-  TPM2_RESPONSE_HEADER       Header;\r
-  UINT32                     AuthSessionSize;\r
-  TPM2B_MAX_BUFFER           Data;\r
-  TPMS_AUTH_RESPONSE         AuthSession;\r
+  TPM2_RESPONSE_HEADER    Header;\r
+  UINT32                  AuthSessionSize;\r
+  TPM2B_MAX_BUFFER        Data;\r
+  TPMS_AUTH_RESPONSE      AuthSession;\r
 } TPM2_NV_READ_RESPONSE;\r
 \r
 typedef struct {\r
-  TPM2_COMMAND_HEADER       Header;\r
-  TPMI_RH_NV_AUTH           AuthHandle;\r
-  TPMI_RH_NV_INDEX          NvIndex;\r
-  UINT32                    AuthSessionSize;\r
-  TPMS_AUTH_COMMAND         AuthSession;\r
-  TPM2B_MAX_BUFFER          Data;\r
-  UINT16                    Offset;\r
+  TPM2_COMMAND_HEADER    Header;\r
+  TPMI_RH_NV_AUTH        AuthHandle;\r
+  TPMI_RH_NV_INDEX       NvIndex;\r
+  UINT32                 AuthSessionSize;\r
+  TPMS_AUTH_COMMAND      AuthSession;\r
+  TPM2B_MAX_BUFFER       Data;\r
+  UINT16                 Offset;\r
 } TPM2_NV_WRITE_COMMAND;\r
 \r
 typedef struct {\r
-  TPM2_RESPONSE_HEADER       Header;\r
-  UINT32                     AuthSessionSize;\r
-  TPMS_AUTH_RESPONSE         AuthSession;\r
+  TPM2_RESPONSE_HEADER    Header;\r
+  UINT32                  AuthSessionSize;\r
+  TPMS_AUTH_RESPONSE      AuthSession;\r
 } TPM2_NV_WRITE_RESPONSE;\r
 \r
 typedef struct {\r
-  TPM2_COMMAND_HEADER       Header;\r
-  TPMI_RH_NV_AUTH           AuthHandle;\r
-  TPMI_RH_NV_INDEX          NvIndex;\r
-  UINT32                    AuthSessionSize;\r
-  TPMS_AUTH_COMMAND         AuthSession;\r
+  TPM2_COMMAND_HEADER    Header;\r
+  TPMI_RH_NV_AUTH        AuthHandle;\r
+  TPMI_RH_NV_INDEX       NvIndex;\r
+  UINT32                 AuthSessionSize;\r
+  TPMS_AUTH_COMMAND      AuthSession;\r
 } TPM2_NV_READLOCK_COMMAND;\r
 \r
 typedef struct {\r
-  TPM2_RESPONSE_HEADER       Header;\r
-  UINT32                     AuthSessionSize;\r
-  TPMS_AUTH_RESPONSE         AuthSession;\r
+  TPM2_RESPONSE_HEADER    Header;\r
+  UINT32                  AuthSessionSize;\r
+  TPMS_AUTH_RESPONSE      AuthSession;\r
 } TPM2_NV_READLOCK_RESPONSE;\r
 \r
 typedef struct {\r
-  TPM2_COMMAND_HEADER       Header;\r
-  TPMI_RH_NV_AUTH           AuthHandle;\r
-  TPMI_RH_NV_INDEX          NvIndex;\r
-  UINT32                    AuthSessionSize;\r
-  TPMS_AUTH_COMMAND         AuthSession;\r
+  TPM2_COMMAND_HEADER    Header;\r
+  TPMI_RH_NV_AUTH        AuthHandle;\r
+  TPMI_RH_NV_INDEX       NvIndex;\r
+  UINT32                 AuthSessionSize;\r
+  TPMS_AUTH_COMMAND      AuthSession;\r
 } TPM2_NV_WRITELOCK_COMMAND;\r
 \r
 typedef struct {\r
-  TPM2_RESPONSE_HEADER       Header;\r
-  UINT32                     AuthSessionSize;\r
-  TPMS_AUTH_RESPONSE         AuthSession;\r
+  TPM2_RESPONSE_HEADER    Header;\r
+  UINT32                  AuthSessionSize;\r
+  TPMS_AUTH_RESPONSE      AuthSession;\r
 } TPM2_NV_WRITELOCK_RESPONSE;\r
 \r
 typedef struct {\r
-  TPM2_COMMAND_HEADER       Header;\r
-  TPMI_RH_PROVISION         AuthHandle;\r
-  UINT32                    AuthSessionSize;\r
-  TPMS_AUTH_COMMAND         AuthSession;\r
+  TPM2_COMMAND_HEADER    Header;\r
+  TPMI_RH_PROVISION      AuthHandle;\r
+  UINT32                 AuthSessionSize;\r
+  TPMS_AUTH_COMMAND      AuthSession;\r
 } TPM2_NV_GLOBALWRITELOCK_COMMAND;\r
 \r
 typedef struct {\r
-  TPM2_RESPONSE_HEADER       Header;\r
-  UINT32                     AuthSessionSize;\r
-  TPMS_AUTH_RESPONSE         AuthSession;\r
+  TPM2_RESPONSE_HEADER    Header;\r
+  UINT32                  AuthSessionSize;\r
+  TPMS_AUTH_RESPONSE      AuthSession;\r
 } TPM2_NV_GLOBALWRITELOCK_RESPONSE;\r
 \r
 #pragma pack()\r
@@ -164,37 +164,37 @@ typedef struct {
 EFI_STATUS\r
 EFIAPI\r
 Tpm2NvReadPublic (\r
-  IN      TPMI_RH_NV_INDEX          NvIndex,\r
-  OUT     TPM2B_NV_PUBLIC           *NvPublic,\r
-  OUT     TPM2B_NAME                *NvName\r
+  IN      TPMI_RH_NV_INDEX  NvIndex,\r
+  OUT     TPM2B_NV_PUBLIC   *NvPublic,\r
+  OUT     TPM2B_NAME        *NvName\r
   )\r
 {\r
-  EFI_STATUS                        Status;\r
-  TPM2_NV_READPUBLIC_COMMAND        SendBuffer;\r
-  TPM2_NV_READPUBLIC_RESPONSE       RecvBuffer;\r
-  UINT32                            SendBufferSize;\r
-  UINT32                            RecvBufferSize;\r
-  UINT16                            NvPublicSize;\r
-  UINT16                            NvNameSize;\r
-  UINT8                             *Buffer;\r
-  TPM_RC                            ResponseCode;\r
+  EFI_STATUS                   Status;\r
+  TPM2_NV_READPUBLIC_COMMAND   SendBuffer;\r
+  TPM2_NV_READPUBLIC_RESPONSE  RecvBuffer;\r
+  UINT32                       SendBufferSize;\r
+  UINT32                       RecvBufferSize;\r
+  UINT16                       NvPublicSize;\r
+  UINT16                       NvNameSize;\r
+  UINT8                        *Buffer;\r
+  TPM_RC                       ResponseCode;\r
 \r
   //\r
   // Construct command\r
   //\r
-  SendBuffer.Header.tag = SwapBytes16(TPM_ST_NO_SESSIONS);\r
-  SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_NV_ReadPublic);\r
+  SendBuffer.Header.tag         = SwapBytes16 (TPM_ST_NO_SESSIONS);\r
+  SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_NV_ReadPublic);\r
 \r
   SendBuffer.NvIndex = SwapBytes32 (NvIndex);\r
 \r
-  SendBufferSize = (UINT32) sizeof (SendBuffer);\r
+  SendBufferSize              = (UINT32)sizeof (SendBuffer);\r
   SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);\r
 \r
   //\r
   // send Tpm command\r
   //\r
   RecvBufferSize = sizeof (RecvBuffer);\r
-  Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
+  Status         = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
   if (EFI_ERROR (Status)) {\r
     return Status;\r
   }\r
@@ -203,23 +203,25 @@ Tpm2NvReadPublic (
     DEBUG ((DEBUG_ERROR, "Tpm2NvReadPublic - RecvBufferSize Error - %x\n", RecvBufferSize));\r
     return EFI_DEVICE_ERROR;\r
   }\r
-  ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode);\r
+\r
+  ResponseCode = SwapBytes32 (RecvBuffer.Header.responseCode);\r
   if (ResponseCode != TPM_RC_SUCCESS) {\r
-    DEBUG ((DEBUG_ERROR, "Tpm2NvReadPublic - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+    DEBUG ((DEBUG_ERROR, "Tpm2NvReadPublic - responseCode - %x\n", SwapBytes32 (RecvBuffer.Header.responseCode)));\r
   }\r
+\r
   switch (ResponseCode) {\r
-  case TPM_RC_SUCCESS:\r
-    // return data\r
-    break;\r
-  case TPM_RC_HANDLE + RC_NV_ReadPublic_nvIndex: // TPM_RC_NV_DEFINED:\r
-    return EFI_NOT_FOUND;\r
-  case TPM_RC_VALUE + RC_NV_ReadPublic_nvIndex:\r
-    return EFI_INVALID_PARAMETER;\r
-  default:\r
-    return EFI_DEVICE_ERROR;\r
+    case TPM_RC_SUCCESS:\r
+      // return data\r
+      break;\r
+    case TPM_RC_HANDLE + RC_NV_ReadPublic_nvIndex: // TPM_RC_NV_DEFINED:\r
+      return EFI_NOT_FOUND;\r
+    case TPM_RC_VALUE + RC_NV_ReadPublic_nvIndex:\r
+      return EFI_INVALID_PARAMETER;\r
+    default:\r
+      return EFI_DEVICE_ERROR;\r
   }\r
 \r
-  if (RecvBufferSize <= sizeof (TPM2_RESPONSE_HEADER) + sizeof (UINT16) + sizeof(UINT16)) {\r
+  if (RecvBufferSize <= sizeof (TPM2_RESPONSE_HEADER) + sizeof (UINT16) + sizeof (UINT16)) {\r
     DEBUG ((DEBUG_ERROR, "Tpm2NvReadPublic - RecvBufferSize Error - %x\n", RecvBufferSize));\r
     return EFI_NOT_FOUND;\r
   }\r
@@ -228,18 +230,18 @@ Tpm2NvReadPublic (
   // Basic check\r
   //\r
   NvPublicSize = SwapBytes16 (RecvBuffer.NvPublic.size);\r
-  if (NvPublicSize > sizeof(TPMS_NV_PUBLIC)) {\r
+  if (NvPublicSize > sizeof (TPMS_NV_PUBLIC)) {\r
     DEBUG ((DEBUG_ERROR, "Tpm2NvReadPublic - NvPublic.size error %x\n", NvPublicSize));\r
     return EFI_DEVICE_ERROR;\r
   }\r
 \r
-  NvNameSize = SwapBytes16 (ReadUnaligned16 ((UINT16 *)((UINT8 *)&RecvBuffer + sizeof(TPM2_RESPONSE_HEADER) + sizeof(UINT16) + NvPublicSize)));\r
-  if (NvNameSize > sizeof(TPMU_NAME)){\r
+  NvNameSize = SwapBytes16 (ReadUnaligned16 ((UINT16 *)((UINT8 *)&RecvBuffer + sizeof (TPM2_RESPONSE_HEADER) + sizeof (UINT16) + NvPublicSize)));\r
+  if (NvNameSize > sizeof (TPMU_NAME)) {\r
     DEBUG ((DEBUG_ERROR, "Tpm2NvReadPublic - NvNameSize error %x\n", NvNameSize));\r
     return EFI_DEVICE_ERROR;\r
   }\r
 \r
-  if (RecvBufferSize != sizeof(TPM2_RESPONSE_HEADER) + sizeof(UINT16) + NvPublicSize + sizeof(UINT16) + NvNameSize) {\r
+  if (RecvBufferSize != sizeof (TPM2_RESPONSE_HEADER) + sizeof (UINT16) + NvPublicSize + sizeof (UINT16) + NvNameSize) {\r
     DEBUG ((DEBUG_ERROR, "Tpm2NvReadPublic - RecvBufferSize Error - NvPublicSize %x\n", RecvBufferSize));\r
     return EFI_NOT_FOUND;\r
   }\r
@@ -247,17 +249,17 @@ Tpm2NvReadPublic (
   //\r
   // Return the response\r
   //\r
-  CopyMem (NvPublic, &RecvBuffer.NvPublic, sizeof(UINT16) + NvPublicSize);\r
-  NvPublic->size = NvPublicSize;\r
+  CopyMem (NvPublic, &RecvBuffer.NvPublic, sizeof (UINT16) + NvPublicSize);\r
+  NvPublic->size             = NvPublicSize;\r
   NvPublic->nvPublic.nvIndex = SwapBytes32 (NvPublic->nvPublic.nvIndex);\r
   NvPublic->nvPublic.nameAlg = SwapBytes16 (NvPublic->nvPublic.nameAlg);\r
   WriteUnaligned32 ((UINT32 *)&NvPublic->nvPublic.attributes, SwapBytes32 (ReadUnaligned32 ((UINT32 *)&NvPublic->nvPublic.attributes)));\r
   NvPublic->nvPublic.authPolicy.size = SwapBytes16 (NvPublic->nvPublic.authPolicy.size);\r
-  Buffer = (UINT8 *)&RecvBuffer.NvPublic.nvPublic.authPolicy;\r
-  Buffer += sizeof(UINT16) + NvPublic->nvPublic.authPolicy.size;\r
-  NvPublic->nvPublic.dataSize = SwapBytes16 (ReadUnaligned16 ((UINT16 *)Buffer));\r
+  Buffer                             = (UINT8 *)&RecvBuffer.NvPublic.nvPublic.authPolicy;\r
+  Buffer                            += sizeof (UINT16) + NvPublic->nvPublic.authPolicy.size;\r
+  NvPublic->nvPublic.dataSize        = SwapBytes16 (ReadUnaligned16 ((UINT16 *)Buffer));\r
 \r
-  CopyMem (NvName->name, (UINT8 *)&RecvBuffer + sizeof(TPM2_RESPONSE_HEADER) + sizeof(UINT16) + NvPublicSize + sizeof(UINT16), NvNameSize);\r
+  CopyMem (NvName->name, (UINT8 *)&RecvBuffer + sizeof (TPM2_RESPONSE_HEADER) + sizeof (UINT16) + NvPublicSize + sizeof (UINT16), NvNameSize);\r
   NvName->size = NvNameSize;\r
 \r
   return EFI_SUCCESS;\r
@@ -280,28 +282,28 @@ Tpm2NvReadPublic (
 EFI_STATUS\r
 EFIAPI\r
 Tpm2NvDefineSpace (\r
-  IN      TPMI_RH_PROVISION         AuthHandle,\r
-  IN      TPMS_AUTH_COMMAND         *AuthSession  OPTIONAL,\r
-  IN      TPM2B_AUTH                *Auth,\r
-  IN      TPM2B_NV_PUBLIC           *NvPublic\r
+  IN      TPMI_RH_PROVISION  AuthHandle,\r
+  IN      TPMS_AUTH_COMMAND  *AuthSession  OPTIONAL,\r
+  IN      TPM2B_AUTH         *Auth,\r
+  IN      TPM2B_NV_PUBLIC    *NvPublic\r
   )\r
 {\r
-  EFI_STATUS                        Status;\r
-  TPM2_NV_DEFINESPACE_COMMAND       SendBuffer;\r
-  TPM2_NV_DEFINESPACE_RESPONSE      RecvBuffer;\r
-  UINT32                            SendBufferSize;\r
-  UINT32                            RecvBufferSize;\r
-  UINT16                            NvPublicSize;\r
-  UINT8                             *Buffer;\r
-  UINT32                            SessionInfoSize;\r
-  TPM_RC                            ResponseCode;\r
+  EFI_STATUS                    Status;\r
+  TPM2_NV_DEFINESPACE_COMMAND   SendBuffer;\r
+  TPM2_NV_DEFINESPACE_RESPONSE  RecvBuffer;\r
+  UINT32                        SendBufferSize;\r
+  UINT32                        RecvBufferSize;\r
+  UINT16                        NvPublicSize;\r
+  UINT8                         *Buffer;\r
+  UINT32                        SessionInfoSize;\r
+  TPM_RC                        ResponseCode;\r
 \r
   //\r
   // Construct command\r
   //\r
-  SendBuffer.Header.tag = SwapBytes16(TPM_ST_SESSIONS);\r
-  SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_NV_DefineSpace);\r
-  SendBuffer.AuthHandle = SwapBytes32 (AuthHandle);\r
+  SendBuffer.Header.tag         = SwapBytes16 (TPM_ST_SESSIONS);\r
+  SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_NV_DefineSpace);\r
+  SendBuffer.AuthHandle         = SwapBytes32 (AuthHandle);\r
 \r
   //\r
   // Add in Auth session\r
@@ -309,16 +311,16 @@ Tpm2NvDefineSpace (
   Buffer = (UINT8 *)&SendBuffer.AuthSession;\r
 \r
   // sessionInfoSize\r
-  SessionInfoSize = CopyAuthSessionCommand (AuthSession, Buffer);\r
-  Buffer += SessionInfoSize;\r
-  SendBuffer.AuthSessionSize = SwapBytes32(SessionInfoSize);\r
+  SessionInfoSize            = CopyAuthSessionCommand (AuthSession, Buffer);\r
+  Buffer                    += SessionInfoSize;\r
+  SendBuffer.AuthSessionSize = SwapBytes32 (SessionInfoSize);\r
 \r
   //\r
   // IndexAuth\r
   //\r
-  WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16(Auth->size));\r
-  Buffer += sizeof(UINT16);\r
-  CopyMem(Buffer, Auth->buffer, Auth->size);\r
+  WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Auth->size));\r
+  Buffer += sizeof (UINT16);\r
+  CopyMem (Buffer, Auth->buffer, Auth->size);\r
   Buffer += Auth->size;\r
 \r
   //\r
@@ -327,28 +329,28 @@ Tpm2NvDefineSpace (
   NvPublicSize = NvPublic->size;\r
 \r
   WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (NvPublicSize));\r
-  Buffer += sizeof(UINT16);\r
+  Buffer += sizeof (UINT16);\r
   WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32 (NvPublic->nvPublic.nvIndex));\r
-  Buffer += sizeof(UINT32);\r
+  Buffer += sizeof (UINT32);\r
   WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (NvPublic->nvPublic.nameAlg));\r
-  Buffer += sizeof(UINT16);\r
+  Buffer += sizeof (UINT16);\r
   WriteUnaligned32 ((UINT32 *)Buffer, SwapBytes32 (ReadUnaligned32 ((UINT32 *)&NvPublic->nvPublic.attributes)));\r
-  Buffer += sizeof(UINT32);\r
+  Buffer += sizeof (UINT32);\r
   WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (NvPublic->nvPublic.authPolicy.size));\r
-  Buffer += sizeof(UINT16);\r
+  Buffer += sizeof (UINT16);\r
   CopyMem (Buffer, NvPublic->nvPublic.authPolicy.buffer, NvPublic->nvPublic.authPolicy.size);\r
   Buffer += NvPublic->nvPublic.authPolicy.size;\r
   WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (NvPublic->nvPublic.dataSize));\r
-  Buffer += sizeof(UINT16);\r
+  Buffer += sizeof (UINT16);\r
 \r
-  SendBufferSize = (UINT32)(Buffer - (UINT8 *)&SendBuffer);\r
+  SendBufferSize              = (UINT32)(Buffer - (UINT8 *)&SendBuffer);\r
   SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);\r
 \r
   //\r
   // send Tpm command\r
   //\r
   RecvBufferSize = sizeof (RecvBuffer);\r
-  Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
+  Status         = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
   if (EFI_ERROR (Status)) {\r
     goto Done;\r
   }\r
@@ -359,46 +361,47 @@ Tpm2NvDefineSpace (
     goto Done;\r
   }\r
 \r
-  ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode);\r
+  ResponseCode = SwapBytes32 (RecvBuffer.Header.responseCode);\r
   if (ResponseCode != TPM_RC_SUCCESS) {\r
-    DEBUG ((DEBUG_ERROR, "Tpm2NvDefineSpace - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+    DEBUG ((DEBUG_ERROR, "Tpm2NvDefineSpace - responseCode - %x\n", SwapBytes32 (RecvBuffer.Header.responseCode)));\r
   }\r
+\r
   switch (ResponseCode) {\r
-  case TPM_RC_SUCCESS:\r
-    // return data\r
-    break;\r
-  case TPM_RC_SIZE + RC_NV_DefineSpace_publicInfo:\r
-  case TPM_RC_SIZE + RC_NV_DefineSpace_auth:\r
-    Status = EFI_BAD_BUFFER_SIZE;\r
-    break;\r
-  case TPM_RC_ATTRIBUTES:\r
-  case TPM_RC_ATTRIBUTES + RC_NV_DefineSpace_publicInfo:\r
-    Status = EFI_UNSUPPORTED;\r
-    break;\r
-  case TPM_RC_ATTRIBUTES + RC_NV_DefineSpace_authHandle:\r
-    Status = EFI_INVALID_PARAMETER;\r
-    break;\r
-  case TPM_RC_NV_DEFINED:\r
-    Status = EFI_ALREADY_STARTED;\r
-    break;\r
-  case TPM_RC_VALUE + RC_NV_DefineSpace_publicInfo:\r
-  case TPM_RC_VALUE + RC_NV_DefineSpace_authHandle:\r
-    Status = EFI_INVALID_PARAMETER;\r
-    break;\r
-  case TPM_RC_NV_SPACE:\r
-    Status = EFI_OUT_OF_RESOURCES;\r
-    break;\r
-  default:\r
-    Status = EFI_DEVICE_ERROR;\r
-    break;\r
+    case TPM_RC_SUCCESS:\r
+      // return data\r
+      break;\r
+    case TPM_RC_SIZE + RC_NV_DefineSpace_publicInfo:\r
+    case TPM_RC_SIZE + RC_NV_DefineSpace_auth:\r
+      Status = EFI_BAD_BUFFER_SIZE;\r
+      break;\r
+    case TPM_RC_ATTRIBUTES:\r
+    case TPM_RC_ATTRIBUTES + RC_NV_DefineSpace_publicInfo:\r
+      Status = EFI_UNSUPPORTED;\r
+      break;\r
+    case TPM_RC_ATTRIBUTES + RC_NV_DefineSpace_authHandle:\r
+      Status = EFI_INVALID_PARAMETER;\r
+      break;\r
+    case TPM_RC_NV_DEFINED:\r
+      Status = EFI_ALREADY_STARTED;\r
+      break;\r
+    case TPM_RC_VALUE + RC_NV_DefineSpace_publicInfo:\r
+    case TPM_RC_VALUE + RC_NV_DefineSpace_authHandle:\r
+      Status = EFI_INVALID_PARAMETER;\r
+      break;\r
+    case TPM_RC_NV_SPACE:\r
+      Status = EFI_OUT_OF_RESOURCES;\r
+      break;\r
+    default:\r
+      Status = EFI_DEVICE_ERROR;\r
+      break;\r
   }\r
 \r
 Done:\r
   //\r
   // Clear AuthSession Content\r
   //\r
-  ZeroMem (&SendBuffer, sizeof(SendBuffer));\r
-  ZeroMem (&RecvBuffer, sizeof(RecvBuffer));\r
+  ZeroMem (&SendBuffer, sizeof (SendBuffer));\r
+  ZeroMem (&RecvBuffer, sizeof (RecvBuffer));\r
   return Status;\r
 }\r
 \r
@@ -416,28 +419,28 @@ Done:
 EFI_STATUS\r
 EFIAPI\r
 Tpm2NvUndefineSpace (\r
-  IN      TPMI_RH_PROVISION         AuthHandle,\r
-  IN      TPMI_RH_NV_INDEX          NvIndex,\r
-  IN      TPMS_AUTH_COMMAND         *AuthSession OPTIONAL\r
+  IN      TPMI_RH_PROVISION  AuthHandle,\r
+  IN      TPMI_RH_NV_INDEX   NvIndex,\r
+  IN      TPMS_AUTH_COMMAND  *AuthSession OPTIONAL\r
   )\r
 {\r
-  EFI_STATUS                        Status;\r
-  TPM2_NV_UNDEFINESPACE_COMMAND     SendBuffer;\r
-  TPM2_NV_UNDEFINESPACE_RESPONSE    RecvBuffer;\r
-  UINT32                            SendBufferSize;\r
-  UINT32                            RecvBufferSize;\r
-  UINT8                             *Buffer;\r
-  UINT32                            SessionInfoSize;\r
-  TPM_RC                            ResponseCode;\r
+  EFI_STATUS                      Status;\r
+  TPM2_NV_UNDEFINESPACE_COMMAND   SendBuffer;\r
+  TPM2_NV_UNDEFINESPACE_RESPONSE  RecvBuffer;\r
+  UINT32                          SendBufferSize;\r
+  UINT32                          RecvBufferSize;\r
+  UINT8                           *Buffer;\r
+  UINT32                          SessionInfoSize;\r
+  TPM_RC                          ResponseCode;\r
 \r
   //\r
   // Construct command\r
   //\r
-  SendBuffer.Header.tag = SwapBytes16(TPM_ST_SESSIONS);\r
-  SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_NV_UndefineSpace);\r
+  SendBuffer.Header.tag         = SwapBytes16 (TPM_ST_SESSIONS);\r
+  SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_NV_UndefineSpace);\r
 \r
   SendBuffer.AuthHandle = SwapBytes32 (AuthHandle);\r
-  SendBuffer.NvIndex = SwapBytes32 (NvIndex);\r
+  SendBuffer.NvIndex    = SwapBytes32 (NvIndex);\r
 \r
   //\r
   // Add in Auth session\r
@@ -445,18 +448,18 @@ Tpm2NvUndefineSpace (
   Buffer = (UINT8 *)&SendBuffer.AuthSession;\r
 \r
   // sessionInfoSize\r
-  SessionInfoSize = CopyAuthSessionCommand (AuthSession, Buffer);\r
-  Buffer += SessionInfoSize;\r
-  SendBuffer.AuthSessionSize = SwapBytes32(SessionInfoSize);\r
+  SessionInfoSize            = CopyAuthSessionCommand (AuthSession, Buffer);\r
+  Buffer                    += SessionInfoSize;\r
+  SendBuffer.AuthSessionSize = SwapBytes32 (SessionInfoSize);\r
 \r
-  SendBufferSize = (UINT32)(Buffer - (UINT8 *)&SendBuffer);\r
+  SendBufferSize              = (UINT32)(Buffer - (UINT8 *)&SendBuffer);\r
   SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);\r
 \r
   //\r
   // send Tpm command\r
   //\r
   RecvBufferSize = sizeof (RecvBuffer);\r
-  Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
+  Status         = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
   if (EFI_ERROR (Status)) {\r
     goto Done;\r
   }\r
@@ -467,42 +470,43 @@ Tpm2NvUndefineSpace (
     goto Done;\r
   }\r
 \r
-  ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode);\r
+  ResponseCode = SwapBytes32 (RecvBuffer.Header.responseCode);\r
   if (ResponseCode != TPM_RC_SUCCESS) {\r
-    DEBUG ((DEBUG_ERROR, "Tpm2NvUndefineSpace - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+    DEBUG ((DEBUG_ERROR, "Tpm2NvUndefineSpace - responseCode - %x\n", SwapBytes32 (RecvBuffer.Header.responseCode)));\r
   }\r
+\r
   switch (ResponseCode) {\r
-  case TPM_RC_SUCCESS:\r
-    // return data\r
-    break;\r
-  case TPM_RC_ATTRIBUTES:\r
-  case TPM_RC_ATTRIBUTES + RC_NV_UndefineSpace_nvIndex:\r
-    Status = EFI_UNSUPPORTED;\r
-    break;\r
-  case TPM_RC_NV_AUTHORIZATION:\r
-    Status = EFI_SECURITY_VIOLATION;\r
-    break;\r
-  case TPM_RC_HANDLE + RC_NV_UndefineSpace_nvIndex: // TPM_RC_NV_DEFINED:\r
-    Status = EFI_NOT_FOUND;\r
-    break;\r
-  case TPM_RC_HANDLE + RC_NV_UndefineSpace_authHandle: // TPM_RC_NV_DEFINED:\r
-    Status = EFI_INVALID_PARAMETER;\r
-    break;\r
-  case TPM_RC_VALUE + RC_NV_UndefineSpace_authHandle:\r
-  case TPM_RC_VALUE + RC_NV_UndefineSpace_nvIndex:\r
-    Status = EFI_INVALID_PARAMETER;\r
-    break;\r
-  default:\r
-    Status = EFI_DEVICE_ERROR;\r
-    break;\r
+    case TPM_RC_SUCCESS:\r
+      // return data\r
+      break;\r
+    case TPM_RC_ATTRIBUTES:\r
+    case TPM_RC_ATTRIBUTES + RC_NV_UndefineSpace_nvIndex:\r
+      Status = EFI_UNSUPPORTED;\r
+      break;\r
+    case TPM_RC_NV_AUTHORIZATION:\r
+      Status = EFI_SECURITY_VIOLATION;\r
+      break;\r
+    case TPM_RC_HANDLE + RC_NV_UndefineSpace_nvIndex: // TPM_RC_NV_DEFINED:\r
+      Status = EFI_NOT_FOUND;\r
+      break;\r
+    case TPM_RC_HANDLE + RC_NV_UndefineSpace_authHandle: // TPM_RC_NV_DEFINED:\r
+      Status = EFI_INVALID_PARAMETER;\r
+      break;\r
+    case TPM_RC_VALUE + RC_NV_UndefineSpace_authHandle:\r
+    case TPM_RC_VALUE + RC_NV_UndefineSpace_nvIndex:\r
+      Status = EFI_INVALID_PARAMETER;\r
+      break;\r
+    default:\r
+      Status = EFI_DEVICE_ERROR;\r
+      break;\r
   }\r
 \r
 Done:\r
   //\r
   // Clear AuthSession Content\r
   //\r
-  ZeroMem (&SendBuffer, sizeof(SendBuffer));\r
-  ZeroMem (&RecvBuffer, sizeof(RecvBuffer));\r
+  ZeroMem (&SendBuffer, sizeof (SendBuffer));\r
+  ZeroMem (&RecvBuffer, sizeof (RecvBuffer));\r
   return Status;\r
 }\r
 \r
@@ -523,31 +527,31 @@ Done:
 EFI_STATUS\r
 EFIAPI\r
 Tpm2NvRead (\r
-  IN      TPMI_RH_NV_AUTH           AuthHandle,\r
-  IN      TPMI_RH_NV_INDEX          NvIndex,\r
-  IN      TPMS_AUTH_COMMAND         *AuthSession  OPTIONAL,\r
-  IN      UINT16                    Size,\r
-  IN      UINT16                    Offset,\r
-  IN OUT  TPM2B_MAX_BUFFER          *OutData\r
+  IN      TPMI_RH_NV_AUTH    AuthHandle,\r
+  IN      TPMI_RH_NV_INDEX   NvIndex,\r
+  IN      TPMS_AUTH_COMMAND  *AuthSession  OPTIONAL,\r
+  IN      UINT16             Size,\r
+  IN      UINT16             Offset,\r
+  IN OUT  TPM2B_MAX_BUFFER   *OutData\r
   )\r
 {\r
-  EFI_STATUS                        Status;\r
-  TPM2_NV_READ_COMMAND              SendBuffer;\r
-  TPM2_NV_READ_RESPONSE             RecvBuffer;\r
-  UINT32                            SendBufferSize;\r
-  UINT32                            RecvBufferSize;\r
-  UINT8                             *Buffer;\r
-  UINT32                            SessionInfoSize;\r
-  TPM_RC                            ResponseCode;\r
+  EFI_STATUS             Status;\r
+  TPM2_NV_READ_COMMAND   SendBuffer;\r
+  TPM2_NV_READ_RESPONSE  RecvBuffer;\r
+  UINT32                 SendBufferSize;\r
+  UINT32                 RecvBufferSize;\r
+  UINT8                  *Buffer;\r
+  UINT32                 SessionInfoSize;\r
+  TPM_RC                 ResponseCode;\r
 \r
   //\r
   // Construct command\r
   //\r
-  SendBuffer.Header.tag = SwapBytes16(TPM_ST_SESSIONS);\r
-  SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_NV_Read);\r
+  SendBuffer.Header.tag         = SwapBytes16 (TPM_ST_SESSIONS);\r
+  SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_NV_Read);\r
 \r
   SendBuffer.AuthHandle = SwapBytes32 (AuthHandle);\r
-  SendBuffer.NvIndex = SwapBytes32 (NvIndex);\r
+  SendBuffer.NvIndex    = SwapBytes32 (NvIndex);\r
 \r
   //\r
   // Add in Auth session\r
@@ -555,23 +559,23 @@ Tpm2NvRead (
   Buffer = (UINT8 *)&SendBuffer.AuthSession;\r
 \r
   // sessionInfoSize\r
-  SessionInfoSize = CopyAuthSessionCommand (AuthSession, Buffer);\r
-  Buffer += SessionInfoSize;\r
-  SendBuffer.AuthSessionSize = SwapBytes32(SessionInfoSize);\r
+  SessionInfoSize            = CopyAuthSessionCommand (AuthSession, Buffer);\r
+  Buffer                    += SessionInfoSize;\r
+  SendBuffer.AuthSessionSize = SwapBytes32 (SessionInfoSize);\r
 \r
   WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Size));\r
-  Buffer += sizeof(UINT16);\r
+  Buffer += sizeof (UINT16);\r
   WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Offset));\r
-  Buffer += sizeof(UINT16);\r
+  Buffer += sizeof (UINT16);\r
 \r
-  SendBufferSize = (UINT32)(Buffer - (UINT8 *)&SendBuffer);\r
+  SendBufferSize              = (UINT32)(Buffer - (UINT8 *)&SendBuffer);\r
   SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);\r
 \r
   //\r
   // send Tpm command\r
   //\r
   RecvBufferSize = sizeof (RecvBuffer);\r
-  Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
+  Status         = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
   if (EFI_ERROR (Status)) {\r
     goto Done;\r
   }\r
@@ -581,52 +585,55 @@ Tpm2NvRead (
     Status = EFI_DEVICE_ERROR;\r
     goto Done;\r
   }\r
-  ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode);\r
+\r
+  ResponseCode = SwapBytes32 (RecvBuffer.Header.responseCode);\r
   if (ResponseCode != TPM_RC_SUCCESS) {\r
     DEBUG ((DEBUG_ERROR, "Tpm2NvRead - responseCode - %x\n", ResponseCode));\r
   }\r
+\r
   switch (ResponseCode) {\r
-  case TPM_RC_SUCCESS:\r
-    // return data\r
-    break;\r
-  case TPM_RC_NV_AUTHORIZATION:\r
-    Status = EFI_SECURITY_VIOLATION;\r
-    break;\r
-  case TPM_RC_NV_LOCKED:\r
-    Status = EFI_ACCESS_DENIED;\r
-    break;\r
-  case TPM_RC_NV_RANGE:\r
-    Status = EFI_BAD_BUFFER_SIZE;\r
-    break;\r
-  case TPM_RC_NV_UNINITIALIZED:\r
-    Status = EFI_NOT_READY;\r
-    break;\r
-  case TPM_RC_HANDLE + RC_NV_Read_nvIndex: // TPM_RC_NV_DEFINED:\r
-    Status = EFI_NOT_FOUND;\r
-    break;\r
-  case TPM_RC_HANDLE + RC_NV_Read_authHandle: // TPM_RC_NV_DEFINED:\r
-    Status = EFI_INVALID_PARAMETER;\r
-    break;\r
-  case TPM_RC_VALUE + RC_NV_Read_nvIndex:\r
-  case TPM_RC_VALUE + RC_NV_Read_authHandle:\r
-    Status = EFI_INVALID_PARAMETER;\r
-    break;\r
-  case TPM_RC_BAD_AUTH + RC_NV_Read_authHandle + TPM_RC_S:\r
-    Status = EFI_INVALID_PARAMETER;\r
-    break;\r
-  case TPM_RC_AUTH_UNAVAILABLE:\r
-    Status = EFI_INVALID_PARAMETER;\r
-    break;\r
-  case TPM_RC_AUTH_FAIL + RC_NV_Read_authHandle + TPM_RC_S:\r
-    Status = EFI_INVALID_PARAMETER;\r
-    break;\r
-  case TPM_RC_ATTRIBUTES + RC_NV_Read_authHandle + TPM_RC_S:\r
-    Status = EFI_UNSUPPORTED;\r
-    break;\r
-  default:\r
-    Status = EFI_DEVICE_ERROR;\r
-    break;\r
+    case TPM_RC_SUCCESS:\r
+      // return data\r
+      break;\r
+    case TPM_RC_NV_AUTHORIZATION:\r
+      Status = EFI_SECURITY_VIOLATION;\r
+      break;\r
+    case TPM_RC_NV_LOCKED:\r
+      Status = EFI_ACCESS_DENIED;\r
+      break;\r
+    case TPM_RC_NV_RANGE:\r
+      Status = EFI_BAD_BUFFER_SIZE;\r
+      break;\r
+    case TPM_RC_NV_UNINITIALIZED:\r
+      Status = EFI_NOT_READY;\r
+      break;\r
+    case TPM_RC_HANDLE + RC_NV_Read_nvIndex: // TPM_RC_NV_DEFINED:\r
+      Status = EFI_NOT_FOUND;\r
+      break;\r
+    case TPM_RC_HANDLE + RC_NV_Read_authHandle: // TPM_RC_NV_DEFINED:\r
+      Status = EFI_INVALID_PARAMETER;\r
+      break;\r
+    case TPM_RC_VALUE + RC_NV_Read_nvIndex:\r
+    case TPM_RC_VALUE + RC_NV_Read_authHandle:\r
+      Status = EFI_INVALID_PARAMETER;\r
+      break;\r
+    case TPM_RC_BAD_AUTH + RC_NV_Read_authHandle + TPM_RC_S:\r
+      Status = EFI_INVALID_PARAMETER;\r
+      break;\r
+    case TPM_RC_AUTH_UNAVAILABLE:\r
+      Status = EFI_INVALID_PARAMETER;\r
+      break;\r
+    case TPM_RC_AUTH_FAIL + RC_NV_Read_authHandle + TPM_RC_S:\r
+      Status = EFI_INVALID_PARAMETER;\r
+      break;\r
+    case TPM_RC_ATTRIBUTES + RC_NV_Read_authHandle + TPM_RC_S:\r
+      Status = EFI_UNSUPPORTED;\r
+      break;\r
+    default:\r
+      Status = EFI_DEVICE_ERROR;\r
+      break;\r
   }\r
+\r
   if (Status != EFI_SUCCESS) {\r
     goto Done;\r
   }\r
@@ -647,8 +654,8 @@ Done:
   //\r
   // Clear AuthSession Content\r
   //\r
-  ZeroMem (&SendBuffer, sizeof(SendBuffer));\r
-  ZeroMem (&RecvBuffer, sizeof(RecvBuffer));\r
+  ZeroMem (&SendBuffer, sizeof (SendBuffer));\r
+  ZeroMem (&RecvBuffer, sizeof (RecvBuffer));\r
   return Status;\r
 }\r
 \r
@@ -668,30 +675,30 @@ Done:
 EFI_STATUS\r
 EFIAPI\r
 Tpm2NvWrite (\r
-  IN      TPMI_RH_NV_AUTH           AuthHandle,\r
-  IN      TPMI_RH_NV_INDEX          NvIndex,\r
-  IN      TPMS_AUTH_COMMAND         *AuthSession  OPTIONAL,\r
-  IN      TPM2B_MAX_BUFFER          *InData,\r
-  IN      UINT16                    Offset\r
+  IN      TPMI_RH_NV_AUTH    AuthHandle,\r
+  IN      TPMI_RH_NV_INDEX   NvIndex,\r
+  IN      TPMS_AUTH_COMMAND  *AuthSession  OPTIONAL,\r
+  IN      TPM2B_MAX_BUFFER   *InData,\r
+  IN      UINT16             Offset\r
   )\r
 {\r
-  EFI_STATUS                        Status;\r
-  TPM2_NV_WRITE_COMMAND             SendBuffer;\r
-  TPM2_NV_WRITE_RESPONSE            RecvBuffer;\r
-  UINT32                            SendBufferSize;\r
-  UINT32                            RecvBufferSize;\r
-  UINT8                             *Buffer;\r
-  UINT32                            SessionInfoSize;\r
-  TPM_RC                            ResponseCode;\r
+  EFI_STATUS              Status;\r
+  TPM2_NV_WRITE_COMMAND   SendBuffer;\r
+  TPM2_NV_WRITE_RESPONSE  RecvBuffer;\r
+  UINT32                  SendBufferSize;\r
+  UINT32                  RecvBufferSize;\r
+  UINT8                   *Buffer;\r
+  UINT32                  SessionInfoSize;\r
+  TPM_RC                  ResponseCode;\r
 \r
   //\r
   // Construct command\r
   //\r
-  SendBuffer.Header.tag = SwapBytes16(TPM_ST_SESSIONS);\r
-  SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_NV_Write);\r
+  SendBuffer.Header.tag         = SwapBytes16 (TPM_ST_SESSIONS);\r
+  SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_NV_Write);\r
 \r
   SendBuffer.AuthHandle = SwapBytes32 (AuthHandle);\r
-  SendBuffer.NvIndex = SwapBytes32 (NvIndex);\r
+  SendBuffer.NvIndex    = SwapBytes32 (NvIndex);\r
 \r
   //\r
   // Add in Auth session\r
@@ -699,25 +706,25 @@ Tpm2NvWrite (
   Buffer = (UINT8 *)&SendBuffer.AuthSession;\r
 \r
   // sessionInfoSize\r
-  SessionInfoSize = CopyAuthSessionCommand (AuthSession, Buffer);\r
-  Buffer += SessionInfoSize;\r
-  SendBuffer.AuthSessionSize = SwapBytes32(SessionInfoSize);\r
+  SessionInfoSize            = CopyAuthSessionCommand (AuthSession, Buffer);\r
+  Buffer                    += SessionInfoSize;\r
+  SendBuffer.AuthSessionSize = SwapBytes32 (SessionInfoSize);\r
 \r
   WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (InData->size));\r
-  Buffer += sizeof(UINT16);\r
+  Buffer += sizeof (UINT16);\r
   CopyMem (Buffer, InData->buffer, InData->size);\r
   Buffer += InData->size;\r
   WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Offset));\r
-  Buffer += sizeof(UINT16);\r
+  Buffer += sizeof (UINT16);\r
 \r
-  SendBufferSize = (UINT32) (Buffer - (UINT8 *)&SendBuffer);\r
+  SendBufferSize              = (UINT32)(Buffer - (UINT8 *)&SendBuffer);\r
   SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);\r
 \r
   //\r
   // send Tpm command\r
   //\r
   RecvBufferSize = sizeof (RecvBuffer);\r
-  Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
+  Status         = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
   if (EFI_ERROR (Status)) {\r
     goto Done;\r
   }\r
@@ -727,59 +734,61 @@ Tpm2NvWrite (
     Status = EFI_DEVICE_ERROR;\r
     goto Done;\r
   }\r
-  ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode);\r
+\r
+  ResponseCode = SwapBytes32 (RecvBuffer.Header.responseCode);\r
   if (ResponseCode != TPM_RC_SUCCESS) {\r
     DEBUG ((DEBUG_ERROR, "Tpm2NvWrite - responseCode - %x\n", ResponseCode));\r
   }\r
+\r
   switch (ResponseCode) {\r
-  case TPM_RC_SUCCESS:\r
-    // return data\r
-    break;\r
-  case TPM_RC_ATTRIBUTES:\r
-    Status = EFI_UNSUPPORTED;\r
-    break;\r
-  case TPM_RC_NV_AUTHORIZATION:\r
-    Status = EFI_SECURITY_VIOLATION;\r
-    break;\r
-  case TPM_RC_NV_LOCKED:\r
-    Status = EFI_ACCESS_DENIED;\r
-    break;\r
-  case TPM_RC_NV_RANGE:\r
-    Status = EFI_BAD_BUFFER_SIZE;\r
-    break;\r
-  case TPM_RC_HANDLE + RC_NV_Write_nvIndex: // TPM_RC_NV_DEFINED:\r
-    Status = EFI_NOT_FOUND;\r
-    break;\r
-  case TPM_RC_HANDLE + RC_NV_Write_authHandle: // TPM_RC_NV_DEFINED:\r
-    Status = EFI_INVALID_PARAMETER;\r
-    break;\r
-  case TPM_RC_VALUE + RC_NV_Write_nvIndex:\r
-  case TPM_RC_VALUE + RC_NV_Write_authHandle:\r
-    Status = EFI_INVALID_PARAMETER;\r
-    break;\r
-  case TPM_RC_BAD_AUTH + RC_NV_Write_authHandle + TPM_RC_S:\r
-    Status = EFI_INVALID_PARAMETER;\r
-    break;\r
-  case TPM_RC_AUTH_UNAVAILABLE:\r
-    Status = EFI_INVALID_PARAMETER;\r
-    break;\r
-  case TPM_RC_AUTH_FAIL + RC_NV_Write_authHandle + TPM_RC_S:\r
-    Status = EFI_INVALID_PARAMETER;\r
-    break;\r
-  case TPM_RC_ATTRIBUTES + RC_NV_Write_authHandle + TPM_RC_S:\r
-    Status = EFI_UNSUPPORTED;\r
-    break;\r
-  default:\r
-    Status = EFI_DEVICE_ERROR;\r
-    break;\r
+    case TPM_RC_SUCCESS:\r
+      // return data\r
+      break;\r
+    case TPM_RC_ATTRIBUTES:\r
+      Status = EFI_UNSUPPORTED;\r
+      break;\r
+    case TPM_RC_NV_AUTHORIZATION:\r
+      Status = EFI_SECURITY_VIOLATION;\r
+      break;\r
+    case TPM_RC_NV_LOCKED:\r
+      Status = EFI_ACCESS_DENIED;\r
+      break;\r
+    case TPM_RC_NV_RANGE:\r
+      Status = EFI_BAD_BUFFER_SIZE;\r
+      break;\r
+    case TPM_RC_HANDLE + RC_NV_Write_nvIndex: // TPM_RC_NV_DEFINED:\r
+      Status = EFI_NOT_FOUND;\r
+      break;\r
+    case TPM_RC_HANDLE + RC_NV_Write_authHandle: // TPM_RC_NV_DEFINED:\r
+      Status = EFI_INVALID_PARAMETER;\r
+      break;\r
+    case TPM_RC_VALUE + RC_NV_Write_nvIndex:\r
+    case TPM_RC_VALUE + RC_NV_Write_authHandle:\r
+      Status = EFI_INVALID_PARAMETER;\r
+      break;\r
+    case TPM_RC_BAD_AUTH + RC_NV_Write_authHandle + TPM_RC_S:\r
+      Status = EFI_INVALID_PARAMETER;\r
+      break;\r
+    case TPM_RC_AUTH_UNAVAILABLE:\r
+      Status = EFI_INVALID_PARAMETER;\r
+      break;\r
+    case TPM_RC_AUTH_FAIL + RC_NV_Write_authHandle + TPM_RC_S:\r
+      Status = EFI_INVALID_PARAMETER;\r
+      break;\r
+    case TPM_RC_ATTRIBUTES + RC_NV_Write_authHandle + TPM_RC_S:\r
+      Status = EFI_UNSUPPORTED;\r
+      break;\r
+    default:\r
+      Status = EFI_DEVICE_ERROR;\r
+      break;\r
   }\r
 \r
 Done:\r
   //\r
   // Clear AuthSession Content\r
   //\r
-  ZeroMem (&SendBuffer, sizeof(SendBuffer));\r
-  ZeroMem (&RecvBuffer, sizeof(RecvBuffer));\r
+  ZeroMem (&SendBuffer, sizeof (SendBuffer));\r
+  ZeroMem (&RecvBuffer, sizeof (RecvBuffer));\r
   return Status;\r
 }\r
 \r
@@ -797,28 +806,28 @@ Done:
 EFI_STATUS\r
 EFIAPI\r
 Tpm2NvReadLock (\r
-  IN      TPMI_RH_NV_AUTH           AuthHandle,\r
-  IN      TPMI_RH_NV_INDEX          NvIndex,\r
-  IN      TPMS_AUTH_COMMAND         *AuthSession OPTIONAL\r
+  IN      TPMI_RH_NV_AUTH    AuthHandle,\r
+  IN      TPMI_RH_NV_INDEX   NvIndex,\r
+  IN      TPMS_AUTH_COMMAND  *AuthSession OPTIONAL\r
   )\r
 {\r
-  EFI_STATUS                        Status;\r
-  TPM2_NV_READLOCK_COMMAND          SendBuffer;\r
-  TPM2_NV_READLOCK_RESPONSE         RecvBuffer;\r
-  UINT32                            SendBufferSize;\r
-  UINT32                            RecvBufferSize;\r
-  UINT8                             *Buffer;\r
-  UINT32                            SessionInfoSize;\r
-  TPM_RC                            ResponseCode;\r
+  EFI_STATUS                 Status;\r
+  TPM2_NV_READLOCK_COMMAND   SendBuffer;\r
+  TPM2_NV_READLOCK_RESPONSE  RecvBuffer;\r
+  UINT32                     SendBufferSize;\r
+  UINT32                     RecvBufferSize;\r
+  UINT8                      *Buffer;\r
+  UINT32                     SessionInfoSize;\r
+  TPM_RC                     ResponseCode;\r
 \r
   //\r
   // Construct command\r
   //\r
-  SendBuffer.Header.tag = SwapBytes16(TPM_ST_SESSIONS);\r
-  SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_NV_ReadLock);\r
+  SendBuffer.Header.tag         = SwapBytes16 (TPM_ST_SESSIONS);\r
+  SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_NV_ReadLock);\r
 \r
   SendBuffer.AuthHandle = SwapBytes32 (AuthHandle);\r
-  SendBuffer.NvIndex = SwapBytes32 (NvIndex);\r
+  SendBuffer.NvIndex    = SwapBytes32 (NvIndex);\r
 \r
   //\r
   // Add in Auth session\r
@@ -826,18 +835,18 @@ Tpm2NvReadLock (
   Buffer = (UINT8 *)&SendBuffer.AuthSession;\r
 \r
   // sessionInfoSize\r
-  SessionInfoSize = CopyAuthSessionCommand (AuthSession, Buffer);\r
-  Buffer += SessionInfoSize;\r
-  SendBuffer.AuthSessionSize = SwapBytes32(SessionInfoSize);\r
+  SessionInfoSize            = CopyAuthSessionCommand (AuthSession, Buffer);\r
+  Buffer                    += SessionInfoSize;\r
+  SendBuffer.AuthSessionSize = SwapBytes32 (SessionInfoSize);\r
 \r
-  SendBufferSize = (UINT32)(Buffer - (UINT8 *)&SendBuffer);\r
+  SendBufferSize              = (UINT32)(Buffer - (UINT8 *)&SendBuffer);\r
   SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);\r
 \r
   //\r
   // send Tpm command\r
   //\r
   RecvBufferSize = sizeof (RecvBuffer);\r
-  Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
+  Status         = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
   if (EFI_ERROR (Status)) {\r
     goto Done;\r
   }\r
@@ -848,25 +857,26 @@ Tpm2NvReadLock (
     goto Done;\r
   }\r
 \r
-  ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode);\r
+  ResponseCode = SwapBytes32 (RecvBuffer.Header.responseCode);\r
   if (ResponseCode != TPM_RC_SUCCESS) {\r
-    DEBUG ((DEBUG_ERROR, "Tpm2NvReadLock - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+    DEBUG ((DEBUG_ERROR, "Tpm2NvReadLock - responseCode - %x\n", SwapBytes32 (RecvBuffer.Header.responseCode)));\r
   }\r
+\r
   switch (ResponseCode) {\r
-  case TPM_RC_SUCCESS:\r
-    // return data\r
-    break;\r
-  default:\r
-    Status = EFI_DEVICE_ERROR;\r
-    break;\r
+    case TPM_RC_SUCCESS:\r
+      // return data\r
+      break;\r
+    default:\r
+      Status = EFI_DEVICE_ERROR;\r
+      break;\r
   }\r
 \r
 Done:\r
   //\r
   // Clear AuthSession Content\r
   //\r
-  ZeroMem (&SendBuffer, sizeof(SendBuffer));\r
-  ZeroMem (&RecvBuffer, sizeof(RecvBuffer));\r
+  ZeroMem (&SendBuffer, sizeof (SendBuffer));\r
+  ZeroMem (&RecvBuffer, sizeof (RecvBuffer));\r
   return Status;\r
 }\r
 \r
@@ -884,28 +894,28 @@ Done:
 EFI_STATUS\r
 EFIAPI\r
 Tpm2NvWriteLock (\r
-  IN      TPMI_RH_NV_AUTH           AuthHandle,\r
-  IN      TPMI_RH_NV_INDEX          NvIndex,\r
-  IN      TPMS_AUTH_COMMAND         *AuthSession OPTIONAL\r
+  IN      TPMI_RH_NV_AUTH    AuthHandle,\r
+  IN      TPMI_RH_NV_INDEX   NvIndex,\r
+  IN      TPMS_AUTH_COMMAND  *AuthSession OPTIONAL\r
   )\r
 {\r
-  EFI_STATUS                        Status;\r
-  TPM2_NV_WRITELOCK_COMMAND         SendBuffer;\r
-  TPM2_NV_WRITELOCK_RESPONSE        RecvBuffer;\r
-  UINT32                            SendBufferSize;\r
-  UINT32                            RecvBufferSize;\r
-  UINT8                             *Buffer;\r
-  UINT32                            SessionInfoSize;\r
-  TPM_RC                            ResponseCode;\r
+  EFI_STATUS                  Status;\r
+  TPM2_NV_WRITELOCK_COMMAND   SendBuffer;\r
+  TPM2_NV_WRITELOCK_RESPONSE  RecvBuffer;\r
+  UINT32                      SendBufferSize;\r
+  UINT32                      RecvBufferSize;\r
+  UINT8                       *Buffer;\r
+  UINT32                      SessionInfoSize;\r
+  TPM_RC                      ResponseCode;\r
 \r
   //\r
   // Construct command\r
   //\r
-  SendBuffer.Header.tag = SwapBytes16(TPM_ST_SESSIONS);\r
-  SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_NV_WriteLock);\r
+  SendBuffer.Header.tag         = SwapBytes16 (TPM_ST_SESSIONS);\r
+  SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_NV_WriteLock);\r
 \r
   SendBuffer.AuthHandle = SwapBytes32 (AuthHandle);\r
-  SendBuffer.NvIndex = SwapBytes32 (NvIndex);\r
+  SendBuffer.NvIndex    = SwapBytes32 (NvIndex);\r
 \r
   //\r
   // Add in Auth session\r
@@ -913,18 +923,18 @@ Tpm2NvWriteLock (
   Buffer = (UINT8 *)&SendBuffer.AuthSession;\r
 \r
   // sessionInfoSize\r
-  SessionInfoSize = CopyAuthSessionCommand (AuthSession, Buffer);\r
-  Buffer += SessionInfoSize;\r
-  SendBuffer.AuthSessionSize = SwapBytes32(SessionInfoSize);\r
+  SessionInfoSize            = CopyAuthSessionCommand (AuthSession, Buffer);\r
+  Buffer                    += SessionInfoSize;\r
+  SendBuffer.AuthSessionSize = SwapBytes32 (SessionInfoSize);\r
 \r
-  SendBufferSize = (UINT32)(Buffer - (UINT8 *)&SendBuffer);\r
+  SendBufferSize              = (UINT32)(Buffer - (UINT8 *)&SendBuffer);\r
   SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);\r
 \r
   //\r
   // send Tpm command\r
   //\r
   RecvBufferSize = sizeof (RecvBuffer);\r
-  Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
+  Status         = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
   if (EFI_ERROR (Status)) {\r
     goto Done;\r
   }\r
@@ -935,25 +945,26 @@ Tpm2NvWriteLock (
     goto Done;\r
   }\r
 \r
-  ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode);\r
+  ResponseCode = SwapBytes32 (RecvBuffer.Header.responseCode);\r
   if (ResponseCode != TPM_RC_SUCCESS) {\r
-    DEBUG ((DEBUG_ERROR, "Tpm2NvWriteLock - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+    DEBUG ((DEBUG_ERROR, "Tpm2NvWriteLock - responseCode - %x\n", SwapBytes32 (RecvBuffer.Header.responseCode)));\r
   }\r
+\r
   switch (ResponseCode) {\r
-  case TPM_RC_SUCCESS:\r
-    // return data\r
-    break;\r
-  default:\r
-    Status = EFI_DEVICE_ERROR;\r
-    break;\r
+    case TPM_RC_SUCCESS:\r
+      // return data\r
+      break;\r
+    default:\r
+      Status = EFI_DEVICE_ERROR;\r
+      break;\r
   }\r
 \r
 Done:\r
   //\r
   // Clear AuthSession Content\r
   //\r
-  ZeroMem (&SendBuffer, sizeof(SendBuffer));\r
-  ZeroMem (&RecvBuffer, sizeof(RecvBuffer));\r
+  ZeroMem (&SendBuffer, sizeof (SendBuffer));\r
+  ZeroMem (&RecvBuffer, sizeof (RecvBuffer));\r
   return Status;\r
 }\r
 \r
@@ -970,8 +981,8 @@ Done:
 EFI_STATUS\r
 EFIAPI\r
 Tpm2NvGlobalWriteLock (\r
-  IN      TPMI_RH_PROVISION         AuthHandle,\r
-  IN      TPMS_AUTH_COMMAND         *AuthSession OPTIONAL\r
+  IN      TPMI_RH_PROVISION  AuthHandle,\r
+  IN      TPMS_AUTH_COMMAND  *AuthSession OPTIONAL\r
   )\r
 {\r
   EFI_STATUS                        Status;\r
@@ -986,8 +997,8 @@ Tpm2NvGlobalWriteLock (
   //\r
   // Construct command\r
   //\r
-  SendBuffer.Header.tag = SwapBytes16(TPM_ST_SESSIONS);\r
-  SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_NV_GlobalWriteLock);\r
+  SendBuffer.Header.tag         = SwapBytes16 (TPM_ST_SESSIONS);\r
+  SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_NV_GlobalWriteLock);\r
 \r
   SendBuffer.AuthHandle = SwapBytes32 (AuthHandle);\r
 \r
@@ -997,18 +1008,18 @@ Tpm2NvGlobalWriteLock (
   Buffer = (UINT8 *)&SendBuffer.AuthSession;\r
 \r
   // sessionInfoSize\r
-  SessionInfoSize = CopyAuthSessionCommand (AuthSession, Buffer);\r
-  Buffer += SessionInfoSize;\r
-  SendBuffer.AuthSessionSize = SwapBytes32(SessionInfoSize);\r
+  SessionInfoSize            = CopyAuthSessionCommand (AuthSession, Buffer);\r
+  Buffer                    += SessionInfoSize;\r
+  SendBuffer.AuthSessionSize = SwapBytes32 (SessionInfoSize);\r
 \r
-  SendBufferSize = (UINT32)(Buffer - (UINT8 *)&SendBuffer);\r
+  SendBufferSize              = (UINT32)(Buffer - (UINT8 *)&SendBuffer);\r
   SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);\r
 \r
   //\r
   // send Tpm command\r
   //\r
   RecvBufferSize = sizeof (RecvBuffer);\r
-  Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
+  Status         = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
   if (EFI_ERROR (Status)) {\r
     goto Done;\r
   }\r
@@ -1019,24 +1030,25 @@ Tpm2NvGlobalWriteLock (
     goto Done;\r
   }\r
 \r
-  ResponseCode = SwapBytes32(RecvBuffer.Header.responseCode);\r
+  ResponseCode = SwapBytes32 (RecvBuffer.Header.responseCode);\r
   if (ResponseCode != TPM_RC_SUCCESS) {\r
-    DEBUG ((DEBUG_ERROR, "Tpm2NvGlobalWriteLock - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+    DEBUG ((DEBUG_ERROR, "Tpm2NvGlobalWriteLock - responseCode - %x\n", SwapBytes32 (RecvBuffer.Header.responseCode)));\r
   }\r
+\r
   switch (ResponseCode) {\r
-  case TPM_RC_SUCCESS:\r
-    // return data\r
-    break;\r
-  default:\r
-    Status = EFI_DEVICE_ERROR;\r
-    break;\r
+    case TPM_RC_SUCCESS:\r
+      // return data\r
+      break;\r
+    default:\r
+      Status = EFI_DEVICE_ERROR;\r
+      break;\r
   }\r
 \r
 Done:\r
   //\r
   // Clear AuthSession Content\r
   //\r
-  ZeroMem (&SendBuffer, sizeof(SendBuffer));\r
-  ZeroMem (&RecvBuffer, sizeof(RecvBuffer));\r
+  ZeroMem (&SendBuffer, sizeof (SendBuffer));\r
+  ZeroMem (&RecvBuffer, sizeof (RecvBuffer));\r
   return Status;\r
 }\r