]> git.proxmox.com Git - mirror_edk2.git/blobdiff - SecurityPkg/Library/Tpm2CommandLib/Tpm2Sequences.c
SecurityPkg: Apply uncrustify changes
[mirror_edk2.git] / SecurityPkg / Library / Tpm2CommandLib / Tpm2Sequences.c
index 3d99f0615c3554a2321d517b83ed7a76ff7cffcc..00ae39feb77b4b7aa83a0fd6a447062da569f1b6 100644 (file)
@@ -16,62 +16,62 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
 #pragma pack(1)\r
 \r
 typedef struct {\r
-  TPM2_COMMAND_HEADER  Header;\r
-  TPM2B_AUTH           Auth;\r
-  TPMI_ALG_HASH        HashAlg;\r
+  TPM2_COMMAND_HEADER    Header;\r
+  TPM2B_AUTH             Auth;\r
+  TPMI_ALG_HASH          HashAlg;\r
 } TPM2_HASH_SEQUENCE_START_COMMAND;\r
 \r
 typedef struct {\r
-  TPM2_RESPONSE_HEADER  Header;\r
-  TPMI_DH_OBJECT        SequenceHandle;\r
+  TPM2_RESPONSE_HEADER    Header;\r
+  TPMI_DH_OBJECT          SequenceHandle;\r
 } TPM2_HASH_SEQUENCE_START_RESPONSE;\r
 \r
 typedef struct {\r
-  TPM2_COMMAND_HEADER       Header;\r
-  TPMI_DH_OBJECT            SequenceHandle;\r
-  UINT32                    AuthorizationSize;\r
-  TPMS_AUTH_COMMAND         AuthSessionSeq;\r
-  TPM2B_MAX_BUFFER          Buffer;\r
+  TPM2_COMMAND_HEADER    Header;\r
+  TPMI_DH_OBJECT         SequenceHandle;\r
+  UINT32                 AuthorizationSize;\r
+  TPMS_AUTH_COMMAND      AuthSessionSeq;\r
+  TPM2B_MAX_BUFFER       Buffer;\r
 } TPM2_SEQUENCE_UPDATE_COMMAND;\r
 \r
 typedef struct {\r
-  TPM2_RESPONSE_HEADER       Header;\r
-  UINT32                     ParameterSize;\r
-  TPMS_AUTH_RESPONSE         AuthSessionSeq;\r
+  TPM2_RESPONSE_HEADER    Header;\r
+  UINT32                  ParameterSize;\r
+  TPMS_AUTH_RESPONSE      AuthSessionSeq;\r
 } TPM2_SEQUENCE_UPDATE_RESPONSE;\r
 \r
 typedef struct {\r
-  TPM2_COMMAND_HEADER       Header;\r
-  TPMI_DH_PCR               PcrHandle;\r
-  TPMI_DH_OBJECT            SequenceHandle;\r
-  UINT32                    AuthorizationSize;\r
-  TPMS_AUTH_COMMAND         AuthSessionPcr;\r
-  TPMS_AUTH_COMMAND         AuthSessionSeq;\r
-  TPM2B_MAX_BUFFER          Buffer;\r
+  TPM2_COMMAND_HEADER    Header;\r
+  TPMI_DH_PCR            PcrHandle;\r
+  TPMI_DH_OBJECT         SequenceHandle;\r
+  UINT32                 AuthorizationSize;\r
+  TPMS_AUTH_COMMAND      AuthSessionPcr;\r
+  TPMS_AUTH_COMMAND      AuthSessionSeq;\r
+  TPM2B_MAX_BUFFER       Buffer;\r
 } TPM2_EVENT_SEQUENCE_COMPLETE_COMMAND;\r
 \r
 typedef struct {\r
-  TPM2_RESPONSE_HEADER       Header;\r
-  UINT32                     ParameterSize;\r
-  TPML_DIGEST_VALUES         Results;\r
-  TPMS_AUTH_RESPONSE         AuthSessionPcr;\r
-  TPMS_AUTH_RESPONSE         AuthSessionSeq;\r
+  TPM2_RESPONSE_HEADER    Header;\r
+  UINT32                  ParameterSize;\r
+  TPML_DIGEST_VALUES      Results;\r
+  TPMS_AUTH_RESPONSE      AuthSessionPcr;\r
+  TPMS_AUTH_RESPONSE      AuthSessionSeq;\r
 } TPM2_EVENT_SEQUENCE_COMPLETE_RESPONSE;\r
 \r
 typedef struct {\r
-  TPM2_COMMAND_HEADER       Header;\r
-  TPMI_DH_OBJECT            SequenceHandle;\r
-  UINT32                    AuthorizationSize;\r
-  TPMS_AUTH_COMMAND         AuthSessionSeq;\r
-  TPM2B_MAX_BUFFER          Buffer;\r
-  TPMI_RH_HIERARCHY         Hierarchy;\r
+  TPM2_COMMAND_HEADER    Header;\r
+  TPMI_DH_OBJECT         SequenceHandle;\r
+  UINT32                 AuthorizationSize;\r
+  TPMS_AUTH_COMMAND      AuthSessionSeq;\r
+  TPM2B_MAX_BUFFER       Buffer;\r
+  TPMI_RH_HIERARCHY      Hierarchy;\r
 } TPM2_SEQUENCE_COMPLETE_COMMAND;\r
 \r
 typedef struct {\r
-  TPM2_RESPONSE_HEADER       Header;\r
-  UINT32                     ParameterSize;\r
-  TPM2B_DIGEST               Digest;\r
-  TPMS_AUTH_RESPONSE         AuthSessionSeq;\r
+  TPM2_RESPONSE_HEADER    Header;\r
+  UINT32                  ParameterSize;\r
+  TPM2B_DIGEST            Digest;\r
+  TPMS_AUTH_RESPONSE      AuthSessionSeq;\r
 } TPM2_SEQUENCE_COMPLETE_RESPONSE;\r
 \r
 #pragma pack()\r
@@ -91,49 +91,49 @@ typedef struct {
 EFI_STATUS\r
 EFIAPI\r
 Tpm2HashSequenceStart (\r
-  IN TPMI_ALG_HASH   HashAlg,\r
-  OUT TPMI_DH_OBJECT *SequenceHandle\r
+  IN TPMI_ALG_HASH    HashAlg,\r
+  OUT TPMI_DH_OBJECT  *SequenceHandle\r
   )\r
 {\r
-  EFI_STATUS                        Status;\r
-  TPM2_HASH_SEQUENCE_START_COMMAND  Cmd;\r
-  TPM2_HASH_SEQUENCE_START_RESPONSE Res;\r
-  UINT32                            CmdSize;\r
-  UINT32                            RespSize;\r
-  UINT8                             *Buffer;\r
-  UINT32                            ResultBufSize;\r
+  EFI_STATUS                         Status;\r
+  TPM2_HASH_SEQUENCE_START_COMMAND   Cmd;\r
+  TPM2_HASH_SEQUENCE_START_RESPONSE  Res;\r
+  UINT32                             CmdSize;\r
+  UINT32                             RespSize;\r
+  UINT8                              *Buffer;\r
+  UINT32                             ResultBufSize;\r
 \r
-  ZeroMem(&Cmd, sizeof(Cmd));\r
+  ZeroMem (&Cmd, sizeof (Cmd));\r
 \r
   //\r
   // Construct command\r
   //\r
-  Cmd.Header.tag         = SwapBytes16(TPM_ST_NO_SESSIONS);\r
-  Cmd.Header.commandCode = SwapBytes32(TPM_CC_HashSequenceStart);\r
+  Cmd.Header.tag         = SwapBytes16 (TPM_ST_NO_SESSIONS);\r
+  Cmd.Header.commandCode = SwapBytes32 (TPM_CC_HashSequenceStart);\r
 \r
   Buffer = (UINT8 *)&Cmd.Auth;\r
 \r
   // auth = nullAuth\r
-  WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16(0));\r
-  Buffer += sizeof(UINT16);\r
+  WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (0));\r
+  Buffer += sizeof (UINT16);\r
 \r
   // hashAlg\r
-  WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16(HashAlg));\r
-  Buffer += sizeof(UINT16);\r
+  WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (HashAlg));\r
+  Buffer += sizeof (UINT16);\r
 \r
-  CmdSize = (UINT32)(Buffer - (UINT8 *)&Cmd);\r
-  Cmd.Header.paramSize = SwapBytes32(CmdSize);\r
+  CmdSize              = (UINT32)(Buffer - (UINT8 *)&Cmd);\r
+  Cmd.Header.paramSize = SwapBytes32 (CmdSize);\r
 \r
   //\r
   // Call the TPM\r
   //\r
-  ResultBufSize = sizeof(Res);\r
-  Status = Tpm2SubmitCommand (CmdSize, (UINT8 *)&Cmd, &ResultBufSize, (UINT8 *)&Res);\r
-  if (EFI_ERROR(Status)) {\r
+  ResultBufSize = sizeof (Res);\r
+  Status        = Tpm2SubmitCommand (CmdSize, (UINT8 *)&Cmd, &ResultBufSize, (UINT8 *)&Res);\r
+  if (EFI_ERROR (Status)) {\r
     return Status;\r
   }\r
 \r
-  if (ResultBufSize > sizeof(Res)) {\r
+  if (ResultBufSize > sizeof (Res)) {\r
     DEBUG ((DEBUG_ERROR, "HashSequenceStart: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
     return EFI_BUFFER_TOO_SMALL;\r
   }\r
@@ -141,8 +141,8 @@ Tpm2HashSequenceStart (
   //\r
   // Validate response headers\r
   //\r
-  RespSize = SwapBytes32(Res.Header.paramSize);\r
-  if (RespSize > sizeof(Res)) {\r
+  RespSize = SwapBytes32 (Res.Header.paramSize);\r
+  if (RespSize > sizeof (Res)) {\r
     DEBUG ((DEBUG_ERROR, "HashSequenceStart: Response size too large! %d\r\n", RespSize));\r
     return EFI_BUFFER_TOO_SMALL;\r
   }\r
@@ -150,8 +150,8 @@ Tpm2HashSequenceStart (
   //\r
   // Fail if command failed\r
   //\r
-  if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
-    DEBUG ((DEBUG_ERROR, "HashSequenceStart: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+  if (SwapBytes32 (Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
+    DEBUG ((DEBUG_ERROR, "HashSequenceStart: Response Code error! 0x%08x\r\n", SwapBytes32 (Res.Header.responseCode)));\r
     return EFI_DEVICE_ERROR;\r
   }\r
 \r
@@ -160,7 +160,7 @@ Tpm2HashSequenceStart (
   //\r
 \r
   // sequenceHandle\r
-  *SequenceHandle = SwapBytes32(Res.SequenceHandle);\r
+  *SequenceHandle = SwapBytes32 (Res.SequenceHandle);\r
 \r
   return EFI_SUCCESS;\r
 }\r
@@ -179,27 +179,27 @@ Tpm2HashSequenceStart (
 EFI_STATUS\r
 EFIAPI\r
 Tpm2SequenceUpdate (\r
-  IN TPMI_DH_OBJECT   SequenceHandle,\r
-  IN TPM2B_MAX_BUFFER *Buffer\r
+  IN TPMI_DH_OBJECT    SequenceHandle,\r
+  IN TPM2B_MAX_BUFFER  *Buffer\r
   )\r
 {\r
-  EFI_STATUS                    Status;\r
-  TPM2_SEQUENCE_UPDATE_COMMAND  Cmd;\r
-  TPM2_SEQUENCE_UPDATE_RESPONSE Res;\r
-  UINT32                        CmdSize;\r
-  UINT32                        RespSize;\r
-  UINT8                         *BufferPtr;\r
-  UINT32                        SessionInfoSize;\r
-  UINT32                        ResultBufSize;\r
+  EFI_STATUS                     Status;\r
+  TPM2_SEQUENCE_UPDATE_COMMAND   Cmd;\r
+  TPM2_SEQUENCE_UPDATE_RESPONSE  Res;\r
+  UINT32                         CmdSize;\r
+  UINT32                         RespSize;\r
+  UINT8                          *BufferPtr;\r
+  UINT32                         SessionInfoSize;\r
+  UINT32                         ResultBufSize;\r
 \r
-  ZeroMem(&Cmd, sizeof(Cmd));\r
+  ZeroMem (&Cmd, sizeof (Cmd));\r
 \r
   //\r
   // Construct command\r
   //\r
-  Cmd.Header.tag = SwapBytes16(TPM_ST_SESSIONS);\r
-  Cmd.Header.commandCode = SwapBytes32(TPM_CC_SequenceUpdate);\r
-  Cmd.SequenceHandle = SwapBytes32(SequenceHandle);\r
+  Cmd.Header.tag         = SwapBytes16 (TPM_ST_SESSIONS);\r
+  Cmd.Header.commandCode = SwapBytes32 (TPM_CC_SequenceUpdate);\r
+  Cmd.SequenceHandle     = SwapBytes32 (SequenceHandle);\r
 \r
   //\r
   // Add in Auth session\r
@@ -207,30 +207,30 @@ Tpm2SequenceUpdate (
   BufferPtr = (UINT8 *)&Cmd.AuthSessionSeq;\r
 \r
   // sessionInfoSize\r
-  SessionInfoSize = CopyAuthSessionCommand (NULL, BufferPtr);\r
-  BufferPtr += SessionInfoSize;\r
-  Cmd.AuthorizationSize = SwapBytes32(SessionInfoSize);\r
+  SessionInfoSize       = CopyAuthSessionCommand (NULL, BufferPtr);\r
+  BufferPtr            += SessionInfoSize;\r
+  Cmd.AuthorizationSize = SwapBytes32 (SessionInfoSize);\r
 \r
   // buffer.size\r
-  WriteUnaligned16 ((UINT16 *)BufferPtr, SwapBytes16(Buffer->size));\r
-  BufferPtr += sizeof(UINT16);\r
+  WriteUnaligned16 ((UINT16 *)BufferPtr, SwapBytes16 (Buffer->size));\r
+  BufferPtr += sizeof (UINT16);\r
 \r
-  CopyMem(BufferPtr, &Buffer->buffer, Buffer->size);\r
+  CopyMem (BufferPtr, &Buffer->buffer, Buffer->size);\r
   BufferPtr += Buffer->size;\r
 \r
-  CmdSize = (UINT32)(BufferPtr - (UINT8 *)&Cmd);\r
-  Cmd.Header.paramSize = SwapBytes32(CmdSize);\r
+  CmdSize              = (UINT32)(BufferPtr - (UINT8 *)&Cmd);\r
+  Cmd.Header.paramSize = SwapBytes32 (CmdSize);\r
 \r
   //\r
   // Call the TPM\r
   //\r
-  ResultBufSize = sizeof(Res);\r
-  Status = Tpm2SubmitCommand (CmdSize, (UINT8 *)&Cmd,&ResultBufSize, (UINT8 *)&Res);\r
-  if (EFI_ERROR(Status)) {\r
+  ResultBufSize = sizeof (Res);\r
+  Status        = Tpm2SubmitCommand (CmdSize, (UINT8 *)&Cmd, &ResultBufSize, (UINT8 *)&Res);\r
+  if (EFI_ERROR (Status)) {\r
     return Status;\r
   }\r
 \r
-  if (ResultBufSize > sizeof(Res)) {\r
+  if (ResultBufSize > sizeof (Res)) {\r
     DEBUG ((DEBUG_ERROR, "SequenceUpdate: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
     return EFI_BUFFER_TOO_SMALL;\r
   }\r
@@ -238,8 +238,8 @@ Tpm2SequenceUpdate (
   //\r
   // Validate response headers\r
   //\r
-  RespSize = SwapBytes32(Res.Header.paramSize);\r
-  if (RespSize > sizeof(Res)) {\r
+  RespSize = SwapBytes32 (Res.Header.paramSize);\r
+  if (RespSize > sizeof (Res)) {\r
     DEBUG ((DEBUG_ERROR, "SequenceUpdate: Response size too large! %d\r\n", RespSize));\r
     return EFI_BUFFER_TOO_SMALL;\r
   }\r
@@ -247,8 +247,8 @@ Tpm2SequenceUpdate (
   //\r
   // Fail if command failed\r
   //\r
-  if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
-    DEBUG ((DEBUG_ERROR, "SequenceUpdate: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+  if (SwapBytes32 (Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
+    DEBUG ((DEBUG_ERROR, "SequenceUpdate: Response Code error! 0x%08x\r\n", SwapBytes32 (Res.Header.responseCode)));\r
     return EFI_DEVICE_ERROR;\r
   }\r
 \r
@@ -278,33 +278,33 @@ Tpm2SequenceUpdate (
 EFI_STATUS\r
 EFIAPI\r
 Tpm2EventSequenceComplete (\r
-  IN TPMI_DH_PCR         PcrHandle,\r
-  IN TPMI_DH_OBJECT      SequenceHandle,\r
-  IN TPM2B_MAX_BUFFER    *Buffer,\r
-  OUT TPML_DIGEST_VALUES *Results\r
+  IN TPMI_DH_PCR          PcrHandle,\r
+  IN TPMI_DH_OBJECT       SequenceHandle,\r
+  IN TPM2B_MAX_BUFFER     *Buffer,\r
+  OUT TPML_DIGEST_VALUES  *Results\r
   )\r
 {\r
-  EFI_STATUS                            Status;\r
-  TPM2_EVENT_SEQUENCE_COMPLETE_COMMAND  Cmd;\r
-  TPM2_EVENT_SEQUENCE_COMPLETE_RESPONSE Res;\r
-  UINT32                                CmdSize;\r
-  UINT32                                RespSize;\r
-  UINT8                                 *BufferPtr;\r
-  UINT32                                SessionInfoSize;\r
-  UINT32                                SessionInfoSize2;\r
-  UINT32                                Index;\r
-  UINT32                                ResultBufSize;\r
-  UINT16                                DigestSize;\r
+  EFI_STATUS                             Status;\r
+  TPM2_EVENT_SEQUENCE_COMPLETE_COMMAND   Cmd;\r
+  TPM2_EVENT_SEQUENCE_COMPLETE_RESPONSE  Res;\r
+  UINT32                                 CmdSize;\r
+  UINT32                                 RespSize;\r
+  UINT8                                  *BufferPtr;\r
+  UINT32                                 SessionInfoSize;\r
+  UINT32                                 SessionInfoSize2;\r
+  UINT32                                 Index;\r
+  UINT32                                 ResultBufSize;\r
+  UINT16                                 DigestSize;\r
 \r
-  ZeroMem(&Cmd, sizeof(Cmd));\r
+  ZeroMem (&Cmd, sizeof (Cmd));\r
 \r
   //\r
   // Construct command\r
   //\r
-  Cmd.Header.tag = SwapBytes16(TPM_ST_SESSIONS);\r
-  Cmd.Header.commandCode = SwapBytes32(TPM_CC_EventSequenceComplete);\r
-  Cmd.PcrHandle = SwapBytes32(PcrHandle);\r
-  Cmd.SequenceHandle = SwapBytes32(SequenceHandle);\r
+  Cmd.Header.tag         = SwapBytes16 (TPM_ST_SESSIONS);\r
+  Cmd.Header.commandCode = SwapBytes32 (TPM_CC_EventSequenceComplete);\r
+  Cmd.PcrHandle          = SwapBytes32 (PcrHandle);\r
+  Cmd.SequenceHandle     = SwapBytes32 (SequenceHandle);\r
 \r
   //\r
   // Add in pcrHandle Auth session\r
@@ -313,33 +313,33 @@ Tpm2EventSequenceComplete (
 \r
   // sessionInfoSize\r
   SessionInfoSize = CopyAuthSessionCommand (NULL, BufferPtr);\r
-  BufferPtr += SessionInfoSize;\r
+  BufferPtr      += SessionInfoSize;\r
 \r
   // sessionInfoSize\r
-  SessionInfoSize2 = CopyAuthSessionCommand (NULL, BufferPtr);\r
-  BufferPtr += SessionInfoSize2;\r
-  Cmd.AuthorizationSize = SwapBytes32(SessionInfoSize + SessionInfoSize2);\r
+  SessionInfoSize2      = CopyAuthSessionCommand (NULL, BufferPtr);\r
+  BufferPtr            += SessionInfoSize2;\r
+  Cmd.AuthorizationSize = SwapBytes32 (SessionInfoSize + SessionInfoSize2);\r
 \r
   // buffer.size\r
-  WriteUnaligned16 ((UINT16 *)BufferPtr, SwapBytes16(Buffer->size));\r
-  BufferPtr += sizeof(UINT16);\r
+  WriteUnaligned16 ((UINT16 *)BufferPtr, SwapBytes16 (Buffer->size));\r
+  BufferPtr += sizeof (UINT16);\r
 \r
-  CopyMem(BufferPtr, &Buffer->buffer[0], Buffer->size);\r
+  CopyMem (BufferPtr, &Buffer->buffer[0], Buffer->size);\r
   BufferPtr += Buffer->size;\r
 \r
-  CmdSize = (UINT32)(BufferPtr - (UINT8 *)&Cmd);\r
-  Cmd.Header.paramSize = SwapBytes32(CmdSize);\r
+  CmdSize              = (UINT32)(BufferPtr - (UINT8 *)&Cmd);\r
+  Cmd.Header.paramSize = SwapBytes32 (CmdSize);\r
 \r
   //\r
   // Call the TPM\r
   //\r
-  ResultBufSize = sizeof(Res);\r
-  Status = Tpm2SubmitCommand (CmdSize, (UINT8 *)&Cmd, &ResultBufSize, (UINT8 *)&Res);\r
-  if (EFI_ERROR(Status)) {\r
+  ResultBufSize = sizeof (Res);\r
+  Status        = Tpm2SubmitCommand (CmdSize, (UINT8 *)&Cmd, &ResultBufSize, (UINT8 *)&Res);\r
+  if (EFI_ERROR (Status)) {\r
     return Status;\r
   }\r
 \r
-  if (ResultBufSize > sizeof(Res)) {\r
+  if (ResultBufSize > sizeof (Res)) {\r
     DEBUG ((DEBUG_ERROR, "EventSequenceComplete: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
     return EFI_BUFFER_TOO_SMALL;\r
   }\r
@@ -347,8 +347,8 @@ Tpm2EventSequenceComplete (
   //\r
   // Validate response headers\r
   //\r
-  RespSize = SwapBytes32(Res.Header.paramSize);\r
-  if (RespSize > sizeof(Res)) {\r
+  RespSize = SwapBytes32 (Res.Header.paramSize);\r
+  if (RespSize > sizeof (Res)) {\r
     DEBUG ((DEBUG_ERROR, "EventSequenceComplete: Response size too large! %d\r\n", RespSize));\r
     return EFI_BUFFER_TOO_SMALL;\r
   }\r
@@ -356,8 +356,8 @@ Tpm2EventSequenceComplete (
   //\r
   // Fail if command failed\r
   //\r
-  if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
-    DEBUG ((DEBUG_ERROR, "EventSequenceComplete: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+  if (SwapBytes32 (Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
+    DEBUG ((DEBUG_ERROR, "EventSequenceComplete: Response Code error! 0x%08x\r\n", SwapBytes32 (Res.Header.responseCode)));\r
     return EFI_DEVICE_ERROR;\r
   }\r
 \r
@@ -368,24 +368,25 @@ Tpm2EventSequenceComplete (
   BufferPtr = (UINT8 *)&Res.Results;\r
 \r
   // count\r
-  Results->count = SwapBytes32(ReadUnaligned32 ((UINT32 *)BufferPtr));\r
+  Results->count = SwapBytes32 (ReadUnaligned32 ((UINT32 *)BufferPtr));\r
   if (Results->count > HASH_COUNT) {\r
     DEBUG ((DEBUG_ERROR, "Tpm2EventSequenceComplete - Results->count error %x\n", Results->count));\r
     return EFI_DEVICE_ERROR;\r
   }\r
 \r
-  BufferPtr += sizeof(UINT32);\r
+  BufferPtr += sizeof (UINT32);\r
 \r
   for (Index = 0; Index < Results->count; Index++) {\r
-    Results->digests[Index].hashAlg = SwapBytes16(ReadUnaligned16 ((UINT16 *)BufferPtr));\r
-    BufferPtr += sizeof(UINT16);\r
+    Results->digests[Index].hashAlg = SwapBytes16 (ReadUnaligned16 ((UINT16 *)BufferPtr));\r
+    BufferPtr                      += sizeof (UINT16);\r
 \r
     DigestSize = GetHashSizeFromAlgo (Results->digests[Index].hashAlg);\r
     if (DigestSize == 0) {\r
       DEBUG ((DEBUG_ERROR, "EventSequenceComplete: Unknown hash algorithm %d\r\n", Results->digests[Index].hashAlg));\r
       return EFI_DEVICE_ERROR;\r
     }\r
-    CopyMem(\r
+\r
+    CopyMem (\r
       &Results->digests[Index].digest,\r
       BufferPtr,\r
       DigestSize\r
@@ -409,28 +410,28 @@ Tpm2EventSequenceComplete (
 EFI_STATUS\r
 EFIAPI\r
 Tpm2SequenceComplete (\r
-  IN TPMI_DH_OBJECT      SequenceHandle,\r
-  IN TPM2B_MAX_BUFFER    *Buffer,\r
-  OUT TPM2B_DIGEST       *Result\r
+  IN TPMI_DH_OBJECT    SequenceHandle,\r
+  IN TPM2B_MAX_BUFFER  *Buffer,\r
+  OUT TPM2B_DIGEST     *Result\r
   )\r
 {\r
-  EFI_STATUS                            Status;\r
-  TPM2_SEQUENCE_COMPLETE_COMMAND        Cmd;\r
-  TPM2_SEQUENCE_COMPLETE_RESPONSE       Res;\r
-  UINT32                                CmdSize;\r
-  UINT32                                RespSize;\r
-  UINT8                                 *BufferPtr;\r
-  UINT32                                SessionInfoSize;\r
-  UINT32                                ResultBufSize;\r
+  EFI_STATUS                       Status;\r
+  TPM2_SEQUENCE_COMPLETE_COMMAND   Cmd;\r
+  TPM2_SEQUENCE_COMPLETE_RESPONSE  Res;\r
+  UINT32                           CmdSize;\r
+  UINT32                           RespSize;\r
+  UINT8                            *BufferPtr;\r
+  UINT32                           SessionInfoSize;\r
+  UINT32                           ResultBufSize;\r
 \r
-  ZeroMem(&Cmd, sizeof(Cmd));\r
+  ZeroMem (&Cmd, sizeof (Cmd));\r
 \r
   //\r
   // Construct command\r
   //\r
-  Cmd.Header.tag = SwapBytes16(TPM_ST_SESSIONS);\r
-  Cmd.Header.commandCode = SwapBytes32(TPM_CC_SequenceComplete);\r
-  Cmd.SequenceHandle = SwapBytes32(SequenceHandle);\r
+  Cmd.Header.tag         = SwapBytes16 (TPM_ST_SESSIONS);\r
+  Cmd.Header.commandCode = SwapBytes32 (TPM_CC_SequenceComplete);\r
+  Cmd.SequenceHandle     = SwapBytes32 (SequenceHandle);\r
 \r
   //\r
   // Add in Auth session\r
@@ -438,34 +439,34 @@ Tpm2SequenceComplete (
   BufferPtr = (UINT8 *)&Cmd.AuthSessionSeq;\r
 \r
   // sessionInfoSize\r
-  SessionInfoSize = CopyAuthSessionCommand (NULL, BufferPtr);\r
-  BufferPtr += SessionInfoSize;\r
-  Cmd.AuthorizationSize = SwapBytes32(SessionInfoSize);\r
+  SessionInfoSize       = CopyAuthSessionCommand (NULL, BufferPtr);\r
+  BufferPtr            += SessionInfoSize;\r
+  Cmd.AuthorizationSize = SwapBytes32 (SessionInfoSize);\r
 \r
   // buffer.size\r
-  WriteUnaligned16 ((UINT16 *)BufferPtr, SwapBytes16(Buffer->size));\r
-  BufferPtr += sizeof(UINT16);\r
+  WriteUnaligned16 ((UINT16 *)BufferPtr, SwapBytes16 (Buffer->size));\r
+  BufferPtr += sizeof (UINT16);\r
 \r
-  CopyMem(BufferPtr, &Buffer->buffer[0], Buffer->size);\r
+  CopyMem (BufferPtr, &Buffer->buffer[0], Buffer->size);\r
   BufferPtr += Buffer->size;\r
 \r
   // Hierarchy\r
   WriteUnaligned32 ((UINT32 *)BufferPtr, SwapBytes32 (TPM_RH_NULL));\r
   BufferPtr += sizeof (UINT32);\r
 \r
-  CmdSize = (UINT32)(BufferPtr - (UINT8 *)&Cmd);\r
-  Cmd.Header.paramSize = SwapBytes32(CmdSize);\r
+  CmdSize              = (UINT32)(BufferPtr - (UINT8 *)&Cmd);\r
+  Cmd.Header.paramSize = SwapBytes32 (CmdSize);\r
 \r
   //\r
   // Call the TPM\r
   //\r
-  ResultBufSize = sizeof(Res);\r
-  Status = Tpm2SubmitCommand (CmdSize, (UINT8 *)&Cmd, &ResultBufSize, (UINT8 *)&Res);\r
-  if (EFI_ERROR(Status)) {\r
+  ResultBufSize = sizeof (Res);\r
+  Status        = Tpm2SubmitCommand (CmdSize, (UINT8 *)&Cmd, &ResultBufSize, (UINT8 *)&Res);\r
+  if (EFI_ERROR (Status)) {\r
     return Status;\r
   }\r
 \r
-  if (ResultBufSize > sizeof(Res)) {\r
+  if (ResultBufSize > sizeof (Res)) {\r
     DEBUG ((DEBUG_ERROR, "SequenceComplete: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
     return EFI_BUFFER_TOO_SMALL;\r
   }\r
@@ -473,8 +474,8 @@ Tpm2SequenceComplete (
   //\r
   // Validate response headers\r
   //\r
-  RespSize = SwapBytes32(Res.Header.paramSize);\r
-  if (RespSize > sizeof(Res)) {\r
+  RespSize = SwapBytes32 (Res.Header.paramSize);\r
+  if (RespSize > sizeof (Res)) {\r
     DEBUG ((DEBUG_ERROR, "SequenceComplete: Response size too large! %d\r\n", RespSize));\r
     return EFI_BUFFER_TOO_SMALL;\r
   }\r
@@ -482,8 +483,8 @@ Tpm2SequenceComplete (
   //\r
   // Fail if command failed\r
   //\r
-  if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
-    DEBUG ((DEBUG_ERROR, "SequenceComplete: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+  if (SwapBytes32 (Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
+    DEBUG ((DEBUG_ERROR, "SequenceComplete: Response Code error! 0x%08x\r\n", SwapBytes32 (Res.Header.responseCode)));\r
     return EFI_DEVICE_ERROR;\r
   }\r
 \r
@@ -494,15 +495,15 @@ Tpm2SequenceComplete (
   BufferPtr = (UINT8 *)&Res.Digest;\r
 \r
   // digestSize\r
-  Result->size = SwapBytes16(ReadUnaligned16 ((UINT16 *)BufferPtr));\r
-  if (Result->size > sizeof(TPMU_HA)){\r
+  Result->size = SwapBytes16 (ReadUnaligned16 ((UINT16 *)BufferPtr));\r
+  if (Result->size > sizeof (TPMU_HA)) {\r
     DEBUG ((DEBUG_ERROR, "Tpm2SequenceComplete - Result->size error %x\n", Result->size));\r
     return EFI_DEVICE_ERROR;\r
   }\r
 \r
-  BufferPtr += sizeof(UINT16);\r
+  BufferPtr += sizeof (UINT16);\r
 \r
-  CopyMem(\r
+  CopyMem (\r
     Result->buffer,\r
     BufferPtr,\r
     Result->size\r