} TPM2_START_AUTH_SESSION_COMMAND;\r
\r
typedef struct {\r
- TPM2_RESPONSE_HEADER Header;\r
- TPMI_SH_AUTH_SESSION SessionHandle;\r
- TPM2B_NONCE NonceTPM;\r
+ TPM2_RESPONSE_HEADER Header;\r
+ TPMI_SH_AUTH_SESSION SessionHandle;\r
+ TPM2B_NONCE NonceTPM;\r
} TPM2_START_AUTH_SESSION_RESPONSE;\r
\r
#pragma pack()\r
EFI_STATUS\r
EFIAPI\r
Tpm2StartAuthSession (\r
- IN TPMI_DH_OBJECT TpmKey,\r
- IN TPMI_DH_ENTITY Bind,\r
- IN TPM2B_NONCE *NonceCaller,\r
- IN TPM2B_ENCRYPTED_SECRET *Salt,\r
- IN TPM_SE SessionType,\r
- IN TPMT_SYM_DEF *Symmetric,\r
- IN TPMI_ALG_HASH AuthHash,\r
- OUT TPMI_SH_AUTH_SESSION *SessionHandle,\r
- OUT TPM2B_NONCE *NonceTPM\r
+ IN TPMI_DH_OBJECT TpmKey,\r
+ IN TPMI_DH_ENTITY Bind,\r
+ IN TPM2B_NONCE *NonceCaller,\r
+ IN TPM2B_ENCRYPTED_SECRET *Salt,\r
+ IN TPM_SE SessionType,\r
+ IN TPMT_SYM_DEF *Symmetric,\r
+ IN TPMI_ALG_HASH AuthHash,\r
+ OUT TPMI_SH_AUTH_SESSION *SessionHandle,\r
+ OUT TPM2B_NONCE *NonceTPM\r
)\r
{\r
EFI_STATUS Status;\r
//\r
// Construct command\r
//\r
- SendBuffer.Header.tag = SwapBytes16(TPM_ST_NO_SESSIONS);\r
- SendBuffer.Header.commandCode = SwapBytes32(TPM_CC_StartAuthSession);\r
+ SendBuffer.Header.tag = SwapBytes16 (TPM_ST_NO_SESSIONS);\r
+ SendBuffer.Header.commandCode = SwapBytes32 (TPM_CC_StartAuthSession);\r
\r
SendBuffer.TpmKey = SwapBytes32 (TpmKey);\r
- SendBuffer.Bind = SwapBytes32 (Bind);\r
- Buffer = (UINT8 *)&SendBuffer.NonceCaller;\r
+ SendBuffer.Bind = SwapBytes32 (Bind);\r
+ Buffer = (UINT8 *)&SendBuffer.NonceCaller;\r
\r
WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (NonceCaller->size));\r
- Buffer += sizeof(UINT16);\r
+ Buffer += sizeof (UINT16);\r
CopyMem (Buffer, NonceCaller->buffer, NonceCaller->size);\r
Buffer += NonceCaller->size;\r
\r
WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Salt->size));\r
- Buffer += sizeof(UINT16);\r
+ Buffer += sizeof (UINT16);\r
CopyMem (Buffer, Salt->secret, Salt->size);\r
Buffer += Salt->size;\r
\r
Buffer++;\r
\r
WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->algorithm));\r
- Buffer += sizeof(UINT16);\r
+ Buffer += sizeof (UINT16);\r
switch (Symmetric->algorithm) {\r
- case TPM_ALG_NULL:\r
- break;\r
- case TPM_ALG_AES:\r
- WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->keyBits.aes));\r
- Buffer += sizeof(UINT16);\r
- WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->mode.aes));\r
- Buffer += sizeof(UINT16);\r
- break;\r
- case TPM_ALG_SM4:\r
- WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->keyBits.SM4));\r
- Buffer += sizeof(UINT16);\r
- WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->mode.SM4));\r
- Buffer += sizeof(UINT16);\r
- break;\r
- case TPM_ALG_SYMCIPHER:\r
- WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->keyBits.sym));\r
- Buffer += sizeof(UINT16);\r
- WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->mode.sym));\r
- Buffer += sizeof(UINT16);\r
- break;\r
- case TPM_ALG_XOR:\r
- WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->keyBits.xor));\r
- Buffer += sizeof(UINT16);\r
- break;\r
- default:\r
- ASSERT (FALSE);\r
- DEBUG ((DEBUG_ERROR, "Tpm2StartAuthSession - Symmetric->algorithm - %x\n", Symmetric->algorithm));\r
- return EFI_UNSUPPORTED;\r
+ case TPM_ALG_NULL:\r
+ break;\r
+ case TPM_ALG_AES:\r
+ WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->keyBits.aes));\r
+ Buffer += sizeof (UINT16);\r
+ WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->mode.aes));\r
+ Buffer += sizeof (UINT16);\r
+ break;\r
+ case TPM_ALG_SM4:\r
+ WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->keyBits.SM4));\r
+ Buffer += sizeof (UINT16);\r
+ WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->mode.SM4));\r
+ Buffer += sizeof (UINT16);\r
+ break;\r
+ case TPM_ALG_SYMCIPHER:\r
+ WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->keyBits.sym));\r
+ Buffer += sizeof (UINT16);\r
+ WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->mode.sym));\r
+ Buffer += sizeof (UINT16);\r
+ break;\r
+ case TPM_ALG_XOR:\r
+ WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->keyBits.xor));\r
+ Buffer += sizeof (UINT16);\r
+ break;\r
+ default:\r
+ ASSERT (FALSE);\r
+ DEBUG ((DEBUG_ERROR, "Tpm2StartAuthSession - Symmetric->algorithm - %x\n", Symmetric->algorithm));\r
+ return EFI_UNSUPPORTED;\r
}\r
\r
WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (AuthHash));\r
- Buffer += sizeof(UINT16);\r
+ Buffer += sizeof (UINT16);\r
\r
- SendBufferSize = (UINT32) ((UINTN)Buffer - (UINTN)&SendBuffer);\r
+ SendBufferSize = (UINT32)((UINTN)Buffer - (UINTN)&SendBuffer);\r
SendBuffer.Header.paramSize = SwapBytes32 (SendBufferSize);\r
\r
//\r
// send Tpm command\r
//\r
RecvBufferSize = sizeof (RecvBuffer);\r
- Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
+ Status = Tpm2SubmitCommand (SendBufferSize, (UINT8 *)&SendBuffer, &RecvBufferSize, (UINT8 *)&RecvBuffer);\r
if (EFI_ERROR (Status)) {\r
return Status;\r
}\r
DEBUG ((DEBUG_ERROR, "Tpm2StartAuthSession - RecvBufferSize Error - %x\n", RecvBufferSize));\r
return EFI_DEVICE_ERROR;\r
}\r
- if (SwapBytes32(RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
- DEBUG ((DEBUG_ERROR, "Tpm2StartAuthSession - responseCode - %x\n", SwapBytes32(RecvBuffer.Header.responseCode)));\r
+\r
+ if (SwapBytes32 (RecvBuffer.Header.responseCode) != TPM_RC_SUCCESS) {\r
+ DEBUG ((DEBUG_ERROR, "Tpm2StartAuthSession - responseCode - %x\n", SwapBytes32 (RecvBuffer.Header.responseCode)));\r
return EFI_DEVICE_ERROR;\r
}\r
\r
//\r
*SessionHandle = SwapBytes32 (RecvBuffer.SessionHandle);\r
NonceTPM->size = SwapBytes16 (RecvBuffer.NonceTPM.size);\r
- if (NonceTPM->size > sizeof(TPMU_HA)) {\r
+ if (NonceTPM->size > sizeof (TPMU_HA)) {\r
DEBUG ((DEBUG_ERROR, "Tpm2StartAuthSession - NonceTPM->size error %x\n", NonceTPM->size));\r
return EFI_DEVICE_ERROR;\r
}\r