]> git.proxmox.com Git - mirror_edk2.git/blobdiff - SecurityPkg/Library/Tpm2CommandLib/Tpm2Session.c
SecurityPkg: Apply uncrustify changes
[mirror_edk2.git] / SecurityPkg / Library / Tpm2CommandLib / Tpm2Session.c
index 4ca616188c2fa0a6330d0136bd89f5a2318d9b9f..7f247da301fe9a9d3f0ce6718a7dae39ab406396 100644 (file)
@@ -27,9 +27,9 @@ typedef struct {
 } TPM2_START_AUTH_SESSION_COMMAND;\r
 \r
 typedef struct {\r
-  TPM2_RESPONSE_HEADER      Header;\r
-  TPMI_SH_AUTH_SESSION      SessionHandle;\r
-  TPM2B_NONCE               NonceTPM;\r
+  TPM2_RESPONSE_HEADER    Header;\r
+  TPMI_SH_AUTH_SESSION    SessionHandle;\r
+  TPM2B_NONCE             NonceTPM;\r
 } TPM2_START_AUTH_SESSION_RESPONSE;\r
 \r
 #pragma pack()\r
@@ -54,15 +54,15 @@ typedef struct {
 EFI_STATUS\r
 EFIAPI\r
 Tpm2StartAuthSession (\r
-  IN      TPMI_DH_OBJECT            TpmKey,\r
-  IN      TPMI_DH_ENTITY            Bind,\r
-  IN      TPM2B_NONCE               *NonceCaller,\r
-  IN      TPM2B_ENCRYPTED_SECRET    *Salt,\r
-  IN      TPM_SE                    SessionType,\r
-  IN      TPMT_SYM_DEF              *Symmetric,\r
-  IN      TPMI_ALG_HASH             AuthHash,\r
-     OUT  TPMI_SH_AUTH_SESSION      *SessionHandle,\r
-     OUT  TPM2B_NONCE               *NonceTPM\r
+  IN      TPMI_DH_OBJECT          TpmKey,\r
+  IN      TPMI_DH_ENTITY          Bind,\r
+  IN      TPM2B_NONCE             *NonceCaller,\r
+  IN      TPM2B_ENCRYPTED_SECRET  *Salt,\r
+  IN      TPM_SE                  SessionType,\r
+  IN      TPMT_SYM_DEF            *Symmetric,\r
+  IN      TPMI_ALG_HASH           AuthHash,\r
+  OUT  TPMI_SH_AUTH_SESSION       *SessionHandle,\r
+  OUT  TPM2B_NONCE                *NonceTPM\r
   )\r
 {\r
   EFI_STATUS                        Status;\r
@@ -75,20 +75,20 @@ Tpm2StartAuthSession (
   //\r
   // Construct command\r
   //\r
-  SendBuffer.Header.tag = SwapBytes16(TPM_ST_NO_SESSIONS);\r
-  SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_StartAuthSession);\r
+  SendBuffer.Header.tag         = SwapBytes16 (TPM_ST_NO_SESSIONS);\r
+  SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_StartAuthSession);\r
 \r
   SendBuffer.TpmKey = SwapBytes32 (TpmKey);\r
-  SendBuffer.Bind = SwapBytes32 (Bind);\r
-  Buffer = (UINT8 *)&SendBuffer.NonceCaller;\r
+  SendBuffer.Bind   = SwapBytes32 (Bind);\r
+  Buffer            = (UINT8 *)&SendBuffer.NonceCaller;\r
 \r
   WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (NonceCaller->size));\r
-  Buffer += sizeof(UINT16);\r
+  Buffer += sizeof (UINT16);\r
   CopyMem (Buffer, NonceCaller->buffer, NonceCaller->size);\r
   Buffer += NonceCaller->size;\r
 \r
   WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Salt->size));\r
-  Buffer += sizeof(UINT16);\r
+  Buffer += sizeof (UINT16);\r
   CopyMem (Buffer, Salt->secret, Salt->size);\r
   Buffer += Salt->size;\r
 \r
@@ -96,49 +96,49 @@ Tpm2StartAuthSession (
   Buffer++;\r
 \r
   WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->algorithm));\r
-  Buffer += sizeof(UINT16);\r
+  Buffer += sizeof (UINT16);\r
   switch (Symmetric->algorithm) {\r
-  case TPM_ALG_NULL:\r
-    break;\r
-  case TPM_ALG_AES:\r
-    WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->keyBits.aes));\r
-    Buffer += sizeof(UINT16);\r
-    WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->mode.aes));\r
-    Buffer += sizeof(UINT16);\r
-    break;\r
-  case TPM_ALG_SM4:\r
-    WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->keyBits.SM4));\r
-    Buffer += sizeof(UINT16);\r
-    WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->mode.SM4));\r
-    Buffer += sizeof(UINT16);\r
-    break;\r
-  case TPM_ALG_SYMCIPHER:\r
-    WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->keyBits.sym));\r
-    Buffer += sizeof(UINT16);\r
-    WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->mode.sym));\r
-    Buffer += sizeof(UINT16);\r
-    break;\r
-  case TPM_ALG_XOR:\r
-    WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->keyBits.xor));\r
-    Buffer += sizeof(UINT16);\r
-    break;\r
-  default:\r
-    ASSERT (FALSE);\r
-    DEBUG ((DEBUG_ERROR, "Tpm2StartAuthSession - Symmetric->algorithm - %x\n", Symmetric->algorithm));\r
-    return EFI_UNSUPPORTED;\r
+    case TPM_ALG_NULL:\r
+      break;\r
+    case TPM_ALG_AES:\r
+      WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->keyBits.aes));\r
+      Buffer += sizeof (UINT16);\r
+      WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->mode.aes));\r
+      Buffer += sizeof (UINT16);\r
+      break;\r
+    case TPM_ALG_SM4:\r
+      WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->keyBits.SM4));\r
+      Buffer += sizeof (UINT16);\r
+      WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->mode.SM4));\r
+      Buffer += sizeof (UINT16);\r
+      break;\r
+    case TPM_ALG_SYMCIPHER:\r
+      WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->keyBits.sym));\r
+      Buffer += sizeof (UINT16);\r
+      WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->mode.sym));\r
+      Buffer += sizeof (UINT16);\r
+      break;\r
+    case TPM_ALG_XOR:\r
+      WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->keyBits.xor));\r
+      Buffer += sizeof (UINT16);\r
+      break;\r
+    default:\r
+      ASSERT (FALSE);\r
+      DEBUG ((DEBUG_ERROR, "Tpm2StartAuthSession - Symmetric->algorithm - %x\n", Symmetric->algorithm));\r
+      return EFI_UNSUPPORTED;\r
   }\r
 \r
   WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (AuthHash));\r
-  Buffer += sizeof(UINT16);\r
+  Buffer += sizeof (UINT16);\r
 \r
-  SendBufferSize = (UINT32) ((UINTN)Buffer - (UINTN)&SendBuffer);\r
+  SendBufferSize              = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);\r
   SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);\r
 \r
   //\r
   // send Tpm command\r
   //\r
   RecvBufferSize = sizeof (RecvBuffer);\r
-  Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
+  Status         = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
   if (EFI_ERROR (Status)) {\r
     return Status;\r
   }\r
@@ -147,8 +147,9 @@ Tpm2StartAuthSession (
     DEBUG ((DEBUG_ERROR, "Tpm2StartAuthSession - RecvBufferSize Error - %x\n", RecvBufferSize));\r
     return EFI_DEVICE_ERROR;\r
   }\r
-  if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
-    DEBUG ((DEBUG_ERROR, "Tpm2StartAuthSession - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+\r
+  if (SwapBytes32 (RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
+    DEBUG ((DEBUG_ERROR, "Tpm2StartAuthSession - responseCode - %x\n", SwapBytes32 (RecvBuffer.Header.responseCode)));\r
     return EFI_DEVICE_ERROR;\r
   }\r
 \r
@@ -157,7 +158,7 @@ Tpm2StartAuthSession (
   //\r
   *SessionHandle = SwapBytes32 (RecvBuffer.SessionHandle);\r
   NonceTPM->size = SwapBytes16 (RecvBuffer.NonceTPM.size);\r
-  if (NonceTPM->size > sizeof(TPMU_HA)) {\r
+  if (NonceTPM->size > sizeof (TPMU_HA)) {\r
     DEBUG ((DEBUG_ERROR, "Tpm2StartAuthSession - NonceTPM->size error %x\n", NonceTPM->size));\r
     return EFI_DEVICE_ERROR;\r
   }\r