#pragma pack(1)\r
\r
typedef struct {\r
- TPM2_COMMAND_HEADER Header;\r
- TPM2B_AUTH Auth;\r
- TPMI_ALG_HASH HashAlg;\r
+ TPM2_COMMAND_HEADER Header;\r
+ TPM2B_AUTH Auth;\r
+ TPMI_ALG_HASH HashAlg;\r
} TPM2_HASH_SEQUENCE_START_COMMAND;\r
\r
typedef struct {\r
- TPM2_RESPONSE_HEADER Header;\r
- TPMI_DH_OBJECT SequenceHandle;\r
+ TPM2_RESPONSE_HEADER Header;\r
+ TPMI_DH_OBJECT SequenceHandle;\r
} TPM2_HASH_SEQUENCE_START_RESPONSE;\r
\r
typedef struct {\r
- TPM2_COMMAND_HEADER Header;\r
- TPMI_DH_OBJECT SequenceHandle;\r
- UINT32 AuthorizationSize;\r
- TPMS_AUTH_COMMAND AuthSessionSeq;\r
- TPM2B_MAX_BUFFER Buffer;\r
+ TPM2_COMMAND_HEADER Header;\r
+ TPMI_DH_OBJECT SequenceHandle;\r
+ UINT32 AuthorizationSize;\r
+ TPMS_AUTH_COMMAND AuthSessionSeq;\r
+ TPM2B_MAX_BUFFER Buffer;\r
} TPM2_SEQUENCE_UPDATE_COMMAND;\r
\r
typedef struct {\r
- TPM2_RESPONSE_HEADER Header;\r
- UINT32 ParameterSize;\r
- TPMS_AUTH_RESPONSE AuthSessionSeq;\r
+ TPM2_RESPONSE_HEADER Header;\r
+ UINT32 ParameterSize;\r
+ TPMS_AUTH_RESPONSE AuthSessionSeq;\r
} TPM2_SEQUENCE_UPDATE_RESPONSE;\r
\r
typedef struct {\r
- TPM2_COMMAND_HEADER Header;\r
- TPMI_DH_PCR PcrHandle;\r
- TPMI_DH_OBJECT SequenceHandle;\r
- UINT32 AuthorizationSize;\r
- TPMS_AUTH_COMMAND AuthSessionPcr;\r
- TPMS_AUTH_COMMAND AuthSessionSeq;\r
- TPM2B_MAX_BUFFER Buffer;\r
+ TPM2_COMMAND_HEADER Header;\r
+ TPMI_DH_PCR PcrHandle;\r
+ TPMI_DH_OBJECT SequenceHandle;\r
+ UINT32 AuthorizationSize;\r
+ TPMS_AUTH_COMMAND AuthSessionPcr;\r
+ TPMS_AUTH_COMMAND AuthSessionSeq;\r
+ TPM2B_MAX_BUFFER Buffer;\r
} TPM2_EVENT_SEQUENCE_COMPLETE_COMMAND;\r
\r
typedef struct {\r
- TPM2_RESPONSE_HEADER Header;\r
- UINT32 ParameterSize;\r
- TPML_DIGEST_VALUES Results;\r
- TPMS_AUTH_RESPONSE AuthSessionPcr;\r
- TPMS_AUTH_RESPONSE AuthSessionSeq;\r
+ TPM2_RESPONSE_HEADER Header;\r
+ UINT32 ParameterSize;\r
+ TPML_DIGEST_VALUES Results;\r
+ TPMS_AUTH_RESPONSE AuthSessionPcr;\r
+ TPMS_AUTH_RESPONSE AuthSessionSeq;\r
} TPM2_EVENT_SEQUENCE_COMPLETE_RESPONSE;\r
\r
typedef struct {\r
- TPM2_COMMAND_HEADER Header;\r
- TPMI_DH_OBJECT SequenceHandle;\r
- UINT32 AuthorizationSize;\r
- TPMS_AUTH_COMMAND AuthSessionSeq;\r
- TPM2B_MAX_BUFFER Buffer;\r
- TPMI_RH_HIERARCHY Hierarchy;\r
+ TPM2_COMMAND_HEADER Header;\r
+ TPMI_DH_OBJECT SequenceHandle;\r
+ UINT32 AuthorizationSize;\r
+ TPMS_AUTH_COMMAND AuthSessionSeq;\r
+ TPM2B_MAX_BUFFER Buffer;\r
+ TPMI_RH_HIERARCHY Hierarchy;\r
} TPM2_SEQUENCE_COMPLETE_COMMAND;\r
\r
typedef struct {\r
- TPM2_RESPONSE_HEADER Header;\r
- UINT32 ParameterSize;\r
- TPM2B_DIGEST Digest;\r
- TPMS_AUTH_RESPONSE AuthSessionSeq;\r
+ TPM2_RESPONSE_HEADER Header;\r
+ UINT32 ParameterSize;\r
+ TPM2B_DIGEST Digest;\r
+ TPMS_AUTH_RESPONSE AuthSessionSeq;\r
} TPM2_SEQUENCE_COMPLETE_RESPONSE;\r
\r
#pragma pack()\r
EFI_STATUS\r
EFIAPI\r
Tpm2HashSequenceStart (\r
- IN TPMI_ALG_HASH HashAlg,\r
- OUT TPMI_DH_OBJECT *SequenceHandle\r
+ IN TPMI_ALG_HASH HashAlg,\r
+ OUT TPMI_DH_OBJECT *SequenceHandle\r
)\r
{\r
- EFI_STATUS Status;\r
- TPM2_HASH_SEQUENCE_START_COMMAND Cmd;\r
- TPM2_HASH_SEQUENCE_START_RESPONSE Res;\r
- UINT32 CmdSize;\r
- UINT32 RespSize;\r
- UINT8 *Buffer;\r
- UINT32 ResultBufSize;\r
+ EFI_STATUS Status;\r
+ TPM2_HASH_SEQUENCE_START_COMMAND Cmd;\r
+ TPM2_HASH_SEQUENCE_START_RESPONSE Res;\r
+ UINT32 CmdSize;\r
+ UINT32 RespSize;\r
+ UINT8 *Buffer;\r
+ UINT32 ResultBufSize;\r
\r
- ZeroMem(&Cmd, sizeof(Cmd));\r
+ ZeroMem (&Cmd, sizeof (Cmd));\r
\r
//\r
// Construct command\r
//\r
- Cmd.Header.tag = SwapBytes16(TPM_ST_NO_SESSIONS);\r
- Cmd.Header.commandCode = SwapBytes32(TPM_CC_HashSequenceStart);\r
+ Cmd.Header.tag = SwapBytes16 (TPM_ST_NO_SESSIONS);\r
+ Cmd.Header.commandCode = SwapBytes32 (TPM_CC_HashSequenceStart);\r
\r
Buffer = (UINT8 *)&Cmd.Auth;\r
\r
// auth = nullAuth\r
- WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16(0));\r
- Buffer += sizeof(UINT16);\r
+ WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (0));\r
+ Buffer += sizeof (UINT16);\r
\r
// hashAlg\r
- WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16(HashAlg));\r
- Buffer += sizeof(UINT16);\r
+ WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (HashAlg));\r
+ Buffer += sizeof (UINT16);\r
\r
- CmdSize = (UINT32)(Buffer - (UINT8 *)&Cmd);\r
- Cmd.Header.paramSize = SwapBytes32(CmdSize);\r
+ CmdSize = (UINT32)(Buffer - (UINT8 *)&Cmd);\r
+ Cmd.Header.paramSize = SwapBytes32 (CmdSize);\r
\r
//\r
// Call the TPM\r
//\r
- ResultBufSize = sizeof(Res);\r
- Status = Tpm2SubmitCommand (CmdSize, (UINT8 *)&Cmd, &ResultBufSize, (UINT8 *)&Res);\r
- if (EFI_ERROR(Status)) {\r
+ ResultBufSize = sizeof (Res);\r
+ Status = Tpm2SubmitCommand (CmdSize, (UINT8 *)&Cmd, &ResultBufSize, (UINT8 *)&Res);\r
+ if (EFI_ERROR (Status)) {\r
return Status;\r
}\r
\r
- if (ResultBufSize > sizeof(Res)) {\r
+ if (ResultBufSize > sizeof (Res)) {\r
DEBUG ((DEBUG_ERROR, "HashSequenceStart: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
//\r
// Validate response headers\r
//\r
- RespSize = SwapBytes32(Res.Header.paramSize);\r
- if (RespSize > sizeof(Res)) {\r
+ RespSize = SwapBytes32 (Res.Header.paramSize);\r
+ if (RespSize > sizeof (Res)) {\r
DEBUG ((DEBUG_ERROR, "HashSequenceStart: Response size too large! %d\r\n", RespSize));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
//\r
// Fail if command failed\r
//\r
- if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((DEBUG_ERROR, "HashSequenceStart: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+ if (SwapBytes32 (Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
+ DEBUG ((DEBUG_ERROR, "HashSequenceStart: Response Code error! 0x%08x\r\n", SwapBytes32 (Res.Header.responseCode)));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
//\r
\r
// sequenceHandle\r
- *SequenceHandle = SwapBytes32(Res.SequenceHandle);\r
+ *SequenceHandle = SwapBytes32 (Res.SequenceHandle);\r
\r
return EFI_SUCCESS;\r
}\r
EFI_STATUS\r
EFIAPI\r
Tpm2SequenceUpdate (\r
- IN TPMI_DH_OBJECT SequenceHandle,\r
- IN TPM2B_MAX_BUFFER *Buffer\r
+ IN TPMI_DH_OBJECT SequenceHandle,\r
+ IN TPM2B_MAX_BUFFER *Buffer\r
)\r
{\r
- EFI_STATUS Status;\r
- TPM2_SEQUENCE_UPDATE_COMMAND Cmd;\r
- TPM2_SEQUENCE_UPDATE_RESPONSE Res;\r
- UINT32 CmdSize;\r
- UINT32 RespSize;\r
- UINT8 *BufferPtr;\r
- UINT32 SessionInfoSize;\r
- UINT32 ResultBufSize;\r
+ EFI_STATUS Status;\r
+ TPM2_SEQUENCE_UPDATE_COMMAND Cmd;\r
+ TPM2_SEQUENCE_UPDATE_RESPONSE Res;\r
+ UINT32 CmdSize;\r
+ UINT32 RespSize;\r
+ UINT8 *BufferPtr;\r
+ UINT32 SessionInfoSize;\r
+ UINT32 ResultBufSize;\r
\r
- ZeroMem(&Cmd, sizeof(Cmd));\r
+ ZeroMem (&Cmd, sizeof (Cmd));\r
\r
//\r
// Construct command\r
//\r
- Cmd.Header.tag = SwapBytes16(TPM_ST_SESSIONS);\r
- Cmd.Header.commandCode = SwapBytes32(TPM_CC_SequenceUpdate);\r
- Cmd.SequenceHandle = SwapBytes32(SequenceHandle);\r
+ Cmd.Header.tag = SwapBytes16 (TPM_ST_SESSIONS);\r
+ Cmd.Header.commandCode = SwapBytes32 (TPM_CC_SequenceUpdate);\r
+ Cmd.SequenceHandle = SwapBytes32 (SequenceHandle);\r
\r
//\r
// Add in Auth session\r
BufferPtr = (UINT8 *)&Cmd.AuthSessionSeq;\r
\r
// sessionInfoSize\r
- SessionInfoSize = CopyAuthSessionCommand (NULL, BufferPtr);\r
- BufferPtr += SessionInfoSize;\r
- Cmd.AuthorizationSize = SwapBytes32(SessionInfoSize);\r
+ SessionInfoSize = CopyAuthSessionCommand (NULL, BufferPtr);\r
+ BufferPtr += SessionInfoSize;\r
+ Cmd.AuthorizationSize = SwapBytes32 (SessionInfoSize);\r
\r
// buffer.size\r
- WriteUnaligned16 ((UINT16 *)BufferPtr, SwapBytes16(Buffer->size));\r
- BufferPtr += sizeof(UINT16);\r
+ WriteUnaligned16 ((UINT16 *)BufferPtr, SwapBytes16 (Buffer->size));\r
+ BufferPtr += sizeof (UINT16);\r
\r
- CopyMem(BufferPtr, &Buffer->buffer, Buffer->size);\r
+ CopyMem (BufferPtr, &Buffer->buffer, Buffer->size);\r
BufferPtr += Buffer->size;\r
\r
- CmdSize = (UINT32)(BufferPtr - (UINT8 *)&Cmd);\r
- Cmd.Header.paramSize = SwapBytes32(CmdSize);\r
+ CmdSize = (UINT32)(BufferPtr - (UINT8 *)&Cmd);\r
+ Cmd.Header.paramSize = SwapBytes32 (CmdSize);\r
\r
//\r
// Call the TPM\r
//\r
- ResultBufSize = sizeof(Res);\r
- Status = Tpm2SubmitCommand (CmdSize, (UINT8 *)&Cmd,&ResultBufSize, (UINT8 *)&Res);\r
- if (EFI_ERROR(Status)) {\r
+ ResultBufSize = sizeof (Res);\r
+ Status = Tpm2SubmitCommand (CmdSize, (UINT8 *)&Cmd, &ResultBufSize, (UINT8 *)&Res);\r
+ if (EFI_ERROR (Status)) {\r
return Status;\r
}\r
\r
- if (ResultBufSize > sizeof(Res)) {\r
+ if (ResultBufSize > sizeof (Res)) {\r
DEBUG ((DEBUG_ERROR, "SequenceUpdate: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
//\r
// Validate response headers\r
//\r
- RespSize = SwapBytes32(Res.Header.paramSize);\r
- if (RespSize > sizeof(Res)) {\r
+ RespSize = SwapBytes32 (Res.Header.paramSize);\r
+ if (RespSize > sizeof (Res)) {\r
DEBUG ((DEBUG_ERROR, "SequenceUpdate: Response size too large! %d\r\n", RespSize));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
//\r
// Fail if command failed\r
//\r
- if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((DEBUG_ERROR, "SequenceUpdate: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+ if (SwapBytes32 (Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
+ DEBUG ((DEBUG_ERROR, "SequenceUpdate: Response Code error! 0x%08x\r\n", SwapBytes32 (Res.Header.responseCode)));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
EFI_STATUS\r
EFIAPI\r
Tpm2EventSequenceComplete (\r
- IN TPMI_DH_PCR PcrHandle,\r
- IN TPMI_DH_OBJECT SequenceHandle,\r
- IN TPM2B_MAX_BUFFER *Buffer,\r
- OUT TPML_DIGEST_VALUES *Results\r
+ IN TPMI_DH_PCR PcrHandle,\r
+ IN TPMI_DH_OBJECT SequenceHandle,\r
+ IN TPM2B_MAX_BUFFER *Buffer,\r
+ OUT TPML_DIGEST_VALUES *Results\r
)\r
{\r
- EFI_STATUS Status;\r
- TPM2_EVENT_SEQUENCE_COMPLETE_COMMAND Cmd;\r
- TPM2_EVENT_SEQUENCE_COMPLETE_RESPONSE Res;\r
- UINT32 CmdSize;\r
- UINT32 RespSize;\r
- UINT8 *BufferPtr;\r
- UINT32 SessionInfoSize;\r
- UINT32 SessionInfoSize2;\r
- UINT32 Index;\r
- UINT32 ResultBufSize;\r
- UINT16 DigestSize;\r
+ EFI_STATUS Status;\r
+ TPM2_EVENT_SEQUENCE_COMPLETE_COMMAND Cmd;\r
+ TPM2_EVENT_SEQUENCE_COMPLETE_RESPONSE Res;\r
+ UINT32 CmdSize;\r
+ UINT32 RespSize;\r
+ UINT8 *BufferPtr;\r
+ UINT32 SessionInfoSize;\r
+ UINT32 SessionInfoSize2;\r
+ UINT32 Index;\r
+ UINT32 ResultBufSize;\r
+ UINT16 DigestSize;\r
\r
- ZeroMem(&Cmd, sizeof(Cmd));\r
+ ZeroMem (&Cmd, sizeof (Cmd));\r
\r
//\r
// Construct command\r
//\r
- Cmd.Header.tag = SwapBytes16(TPM_ST_SESSIONS);\r
- Cmd.Header.commandCode = SwapBytes32(TPM_CC_EventSequenceComplete);\r
- Cmd.PcrHandle = SwapBytes32(PcrHandle);\r
- Cmd.SequenceHandle = SwapBytes32(SequenceHandle);\r
+ Cmd.Header.tag = SwapBytes16 (TPM_ST_SESSIONS);\r
+ Cmd.Header.commandCode = SwapBytes32 (TPM_CC_EventSequenceComplete);\r
+ Cmd.PcrHandle = SwapBytes32 (PcrHandle);\r
+ Cmd.SequenceHandle = SwapBytes32 (SequenceHandle);\r
\r
//\r
// Add in pcrHandle Auth session\r
\r
// sessionInfoSize\r
SessionInfoSize = CopyAuthSessionCommand (NULL, BufferPtr);\r
- BufferPtr += SessionInfoSize;\r
+ BufferPtr += SessionInfoSize;\r
\r
// sessionInfoSize\r
- SessionInfoSize2 = CopyAuthSessionCommand (NULL, BufferPtr);\r
- BufferPtr += SessionInfoSize2;\r
- Cmd.AuthorizationSize = SwapBytes32(SessionInfoSize + SessionInfoSize2);\r
+ SessionInfoSize2 = CopyAuthSessionCommand (NULL, BufferPtr);\r
+ BufferPtr += SessionInfoSize2;\r
+ Cmd.AuthorizationSize = SwapBytes32 (SessionInfoSize + SessionInfoSize2);\r
\r
// buffer.size\r
- WriteUnaligned16 ((UINT16 *)BufferPtr, SwapBytes16(Buffer->size));\r
- BufferPtr += sizeof(UINT16);\r
+ WriteUnaligned16 ((UINT16 *)BufferPtr, SwapBytes16 (Buffer->size));\r
+ BufferPtr += sizeof (UINT16);\r
\r
- CopyMem(BufferPtr, &Buffer->buffer[0], Buffer->size);\r
+ CopyMem (BufferPtr, &Buffer->buffer[0], Buffer->size);\r
BufferPtr += Buffer->size;\r
\r
- CmdSize = (UINT32)(BufferPtr - (UINT8 *)&Cmd);\r
- Cmd.Header.paramSize = SwapBytes32(CmdSize);\r
+ CmdSize = (UINT32)(BufferPtr - (UINT8 *)&Cmd);\r
+ Cmd.Header.paramSize = SwapBytes32 (CmdSize);\r
\r
//\r
// Call the TPM\r
//\r
- ResultBufSize = sizeof(Res);\r
- Status = Tpm2SubmitCommand (CmdSize, (UINT8 *)&Cmd, &ResultBufSize, (UINT8 *)&Res);\r
- if (EFI_ERROR(Status)) {\r
+ ResultBufSize = sizeof (Res);\r
+ Status = Tpm2SubmitCommand (CmdSize, (UINT8 *)&Cmd, &ResultBufSize, (UINT8 *)&Res);\r
+ if (EFI_ERROR (Status)) {\r
return Status;\r
}\r
\r
- if (ResultBufSize > sizeof(Res)) {\r
+ if (ResultBufSize > sizeof (Res)) {\r
DEBUG ((DEBUG_ERROR, "EventSequenceComplete: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
//\r
// Validate response headers\r
//\r
- RespSize = SwapBytes32(Res.Header.paramSize);\r
- if (RespSize > sizeof(Res)) {\r
+ RespSize = SwapBytes32 (Res.Header.paramSize);\r
+ if (RespSize > sizeof (Res)) {\r
DEBUG ((DEBUG_ERROR, "EventSequenceComplete: Response size too large! %d\r\n", RespSize));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
//\r
// Fail if command failed\r
//\r
- if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((DEBUG_ERROR, "EventSequenceComplete: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+ if (SwapBytes32 (Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
+ DEBUG ((DEBUG_ERROR, "EventSequenceComplete: Response Code error! 0x%08x\r\n", SwapBytes32 (Res.Header.responseCode)));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
BufferPtr = (UINT8 *)&Res.Results;\r
\r
// count\r
- Results->count = SwapBytes32(ReadUnaligned32 ((UINT32 *)BufferPtr));\r
+ Results->count = SwapBytes32 (ReadUnaligned32 ((UINT32 *)BufferPtr));\r
if (Results->count > HASH_COUNT) {\r
DEBUG ((DEBUG_ERROR, "Tpm2EventSequenceComplete - Results->count error %x\n", Results->count));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
- BufferPtr += sizeof(UINT32);\r
+ BufferPtr += sizeof (UINT32);\r
\r
for (Index = 0; Index < Results->count; Index++) {\r
- Results->digests[Index].hashAlg = SwapBytes16(ReadUnaligned16 ((UINT16 *)BufferPtr));\r
- BufferPtr += sizeof(UINT16);\r
+ Results->digests[Index].hashAlg = SwapBytes16 (ReadUnaligned16 ((UINT16 *)BufferPtr));\r
+ BufferPtr += sizeof (UINT16);\r
\r
DigestSize = GetHashSizeFromAlgo (Results->digests[Index].hashAlg);\r
if (DigestSize == 0) {\r
DEBUG ((DEBUG_ERROR, "EventSequenceComplete: Unknown hash algorithm %d\r\n", Results->digests[Index].hashAlg));\r
return EFI_DEVICE_ERROR;\r
}\r
- CopyMem(\r
+\r
+ CopyMem (\r
&Results->digests[Index].digest,\r
BufferPtr,\r
DigestSize\r
EFI_STATUS\r
EFIAPI\r
Tpm2SequenceComplete (\r
- IN TPMI_DH_OBJECT SequenceHandle,\r
- IN TPM2B_MAX_BUFFER *Buffer,\r
- OUT TPM2B_DIGEST *Result\r
+ IN TPMI_DH_OBJECT SequenceHandle,\r
+ IN TPM2B_MAX_BUFFER *Buffer,\r
+ OUT TPM2B_DIGEST *Result\r
)\r
{\r
- EFI_STATUS Status;\r
- TPM2_SEQUENCE_COMPLETE_COMMAND Cmd;\r
- TPM2_SEQUENCE_COMPLETE_RESPONSE Res;\r
- UINT32 CmdSize;\r
- UINT32 RespSize;\r
- UINT8 *BufferPtr;\r
- UINT32 SessionInfoSize;\r
- UINT32 ResultBufSize;\r
+ EFI_STATUS Status;\r
+ TPM2_SEQUENCE_COMPLETE_COMMAND Cmd;\r
+ TPM2_SEQUENCE_COMPLETE_RESPONSE Res;\r
+ UINT32 CmdSize;\r
+ UINT32 RespSize;\r
+ UINT8 *BufferPtr;\r
+ UINT32 SessionInfoSize;\r
+ UINT32 ResultBufSize;\r
\r
- ZeroMem(&Cmd, sizeof(Cmd));\r
+ ZeroMem (&Cmd, sizeof (Cmd));\r
\r
//\r
// Construct command\r
//\r
- Cmd.Header.tag = SwapBytes16(TPM_ST_SESSIONS);\r
- Cmd.Header.commandCode = SwapBytes32(TPM_CC_SequenceComplete);\r
- Cmd.SequenceHandle = SwapBytes32(SequenceHandle);\r
+ Cmd.Header.tag = SwapBytes16 (TPM_ST_SESSIONS);\r
+ Cmd.Header.commandCode = SwapBytes32 (TPM_CC_SequenceComplete);\r
+ Cmd.SequenceHandle = SwapBytes32 (SequenceHandle);\r
\r
//\r
// Add in Auth session\r
BufferPtr = (UINT8 *)&Cmd.AuthSessionSeq;\r
\r
// sessionInfoSize\r
- SessionInfoSize = CopyAuthSessionCommand (NULL, BufferPtr);\r
- BufferPtr += SessionInfoSize;\r
- Cmd.AuthorizationSize = SwapBytes32(SessionInfoSize);\r
+ SessionInfoSize = CopyAuthSessionCommand (NULL, BufferPtr);\r
+ BufferPtr += SessionInfoSize;\r
+ Cmd.AuthorizationSize = SwapBytes32 (SessionInfoSize);\r
\r
// buffer.size\r
- WriteUnaligned16 ((UINT16 *)BufferPtr, SwapBytes16(Buffer->size));\r
- BufferPtr += sizeof(UINT16);\r
+ WriteUnaligned16 ((UINT16 *)BufferPtr, SwapBytes16 (Buffer->size));\r
+ BufferPtr += sizeof (UINT16);\r
\r
- CopyMem(BufferPtr, &Buffer->buffer[0], Buffer->size);\r
+ CopyMem (BufferPtr, &Buffer->buffer[0], Buffer->size);\r
BufferPtr += Buffer->size;\r
\r
// Hierarchy\r
WriteUnaligned32 ((UINT32 *)BufferPtr, SwapBytes32 (TPM_RH_NULL));\r
BufferPtr += sizeof (UINT32);\r
\r
- CmdSize = (UINT32)(BufferPtr - (UINT8 *)&Cmd);\r
- Cmd.Header.paramSize = SwapBytes32(CmdSize);\r
+ CmdSize = (UINT32)(BufferPtr - (UINT8 *)&Cmd);\r
+ Cmd.Header.paramSize = SwapBytes32 (CmdSize);\r
\r
//\r
// Call the TPM\r
//\r
- ResultBufSize = sizeof(Res);\r
- Status = Tpm2SubmitCommand (CmdSize, (UINT8 *)&Cmd, &ResultBufSize, (UINT8 *)&Res);\r
- if (EFI_ERROR(Status)) {\r
+ ResultBufSize = sizeof (Res);\r
+ Status = Tpm2SubmitCommand (CmdSize, (UINT8 *)&Cmd, &ResultBufSize, (UINT8 *)&Res);\r
+ if (EFI_ERROR (Status)) {\r
return Status;\r
}\r
\r
- if (ResultBufSize > sizeof(Res)) {\r
+ if (ResultBufSize > sizeof (Res)) {\r
DEBUG ((DEBUG_ERROR, "SequenceComplete: Failed ExecuteCommand: Buffer Too Small\r\n"));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
//\r
// Validate response headers\r
//\r
- RespSize = SwapBytes32(Res.Header.paramSize);\r
- if (RespSize > sizeof(Res)) {\r
+ RespSize = SwapBytes32 (Res.Header.paramSize);\r
+ if (RespSize > sizeof (Res)) {\r
DEBUG ((DEBUG_ERROR, "SequenceComplete: Response size too large! %d\r\n", RespSize));\r
return EFI_BUFFER_TOO_SMALL;\r
}\r
//\r
// Fail if command failed\r
//\r
- if (SwapBytes32(Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((DEBUG_ERROR, "SequenceComplete: Response Code error! 0x%08x\r\n", SwapBytes32(Res.Header.responseCode)));\r
+ if (SwapBytes32 (Res.Header.responseCode) != TPM_RC_SUCCESS) {\r
+ DEBUG ((DEBUG_ERROR, "SequenceComplete: Response Code error! 0x%08x\r\n", SwapBytes32 (Res.Header.responseCode)));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
BufferPtr = (UINT8 *)&Res.Digest;\r
\r
// digestSize\r
- Result->size = SwapBytes16(ReadUnaligned16 ((UINT16 *)BufferPtr));\r
- if (Result->size > sizeof(TPMU_HA)){\r
+ Result->size = SwapBytes16 (ReadUnaligned16 ((UINT16 *)BufferPtr));\r
+ if (Result->size > sizeof (TPMU_HA)) {\r
DEBUG ((DEBUG_ERROR, "Tpm2SequenceComplete - Result->size error %x\n", Result->size));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
- BufferPtr += sizeof(UINT16);\r
+ BufferPtr += sizeof (UINT16);\r
\r
- CopyMem(\r
+ CopyMem (\r
Result->buffer,\r
BufferPtr,\r
Result->size\r