\r
#include "TcgMor.h"\r
\r
-UINT8 mMorControl;\r
+UINT8 mMorControl;\r
\r
/**\r
Ready to Boot Event notification handler.\r
VOID\r
EFIAPI\r
OnReadyToBoot (\r
- IN EFI_EVENT Event,\r
- IN VOID *Context\r
+ IN EFI_EVENT Event,\r
+ IN VOID *Context\r
)\r
{\r
EFI_STATUS Status;\r
//\r
// MorControl is expected, directly return to avoid unnecessary variable operation\r
//\r
- return ;\r
+ return;\r
}\r
+\r
//\r
// Clear MOR_CLEAR_MEMORY_BIT\r
//\r
\r
DataSize = sizeof (mMorControl);\r
Status = gRT->SetVariable (\r
- MEMORY_OVERWRITE_REQUEST_VARIABLE_NAME,\r
- &gEfiMemoryOverwriteControlDataGuid,\r
- EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS,\r
- DataSize,\r
- &mMorControl\r
- );\r
+ MEMORY_OVERWRITE_REQUEST_VARIABLE_NAME,\r
+ &gEfiMemoryOverwriteControlDataGuid,\r
+ EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS,\r
+ DataSize,\r
+ &mMorControl\r
+ );\r
if (EFI_ERROR (Status)) {\r
DEBUG ((DEBUG_ERROR, "TcgMor: Clear MOR_CLEAR_MEMORY_BIT failure, Status = %r\n", Status));\r
}\r
**/\r
VOID\r
InitiateTPerReset (\r
- IN EFI_STORAGE_SECURITY_COMMAND_PROTOCOL *Ssp,\r
- IN UINT32 MediaId\r
+ IN EFI_STORAGE_SECURITY_COMMAND_PROTOCOL *Ssp,\r
+ IN UINT32 MediaId\r
)\r
{\r
-\r
EFI_STATUS Status;\r
UINT8 *Buffer;\r
UINTN XferSize;\r
BOOLEAN IeeeFlag;\r
SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA *Data;\r
\r
- Buffer = NULL;\r
- TcgFlag = FALSE;\r
- IeeeFlag = FALSE;\r
+ Buffer = NULL;\r
+ TcgFlag = FALSE;\r
+ IeeeFlag = FALSE;\r
\r
//\r
// ATA8-ACS 7.57.6.1 indicates the Transfer Length field requirements a multiple of 512.\r
// If the length of the TRUSTED RECEIVE parameter data is greater than the Transfer Length,\r
// then the device shall return the TRUSTED RECEIVE parameter data truncated to the requested Transfer Length.\r
//\r
- Len = ROUNDUP512(sizeof(SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA));\r
- Buffer = AllocateZeroPool(Len);\r
+ Len = ROUNDUP512 (sizeof (SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA));\r
+ Buffer = AllocateZeroPool (Len);\r
\r
if (Buffer == NULL) {\r
return;\r
// In returned data, the ListLength field indicates the total length, in bytes,\r
// of the supported security protocol list.\r
//\r
- Data = (SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA*)Buffer;\r
- Len = ROUNDUP512(sizeof (SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA) +\r
- (Data->SupportedSecurityListLength[0] << 8) +\r
- (Data->SupportedSecurityListLength[1])\r
- );\r
+ Data = (SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA *)Buffer;\r
+ Len = ROUNDUP512 (\r
+ sizeof (SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA) +\r
+ (Data->SupportedSecurityListLength[0] << 8) +\r
+ (Data->SupportedSecurityListLength[1])\r
+ );\r
\r
//\r
// Free original buffer and allocate new buffer.\r
//\r
- FreePool(Buffer);\r
- Buffer = AllocateZeroPool(Len);\r
+ FreePool (Buffer);\r
+ Buffer = AllocateZeroPool (Len);\r
if (Buffer == NULL) {\r
return;\r
}\r
goto Exit;\r
}\r
\r
- Data = (SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA*)Buffer;\r
+ Data = (SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA *)Buffer;\r
Len = (Data->SupportedSecurityListLength[0] << 8) + Data->SupportedSecurityListLength[1];\r
\r
//\r
Exit:\r
\r
if (Buffer != NULL) {\r
- FreePool(Buffer);\r
+ FreePool (Buffer);\r
}\r
}\r
\r
IN VOID *Context\r
)\r
{\r
- EFI_STORAGE_SECURITY_COMMAND_PROTOCOL *Ssp;\r
- EFI_BLOCK_IO_PROTOCOL *BlockIo;\r
- EFI_STATUS Status;\r
- UINTN HandleCount;\r
- EFI_HANDLE *HandleBuffer;\r
- UINTN Index;\r
+ EFI_STORAGE_SECURITY_COMMAND_PROTOCOL *Ssp;\r
+ EFI_BLOCK_IO_PROTOCOL *BlockIo;\r
+ EFI_STATUS Status;\r
+ UINTN HandleCount;\r
+ EFI_HANDLE *HandleBuffer;\r
+ UINTN Index;\r
\r
//\r
// Locate all SSP protocol instances.\r
return;\r
}\r
\r
- for (Index = 0; Index < HandleCount; Index ++) {\r
+ for (Index = 0; Index < HandleCount; Index++) {\r
//\r
// Get the SSP interface.\r
//\r
- Status = gBS->HandleProtocol(\r
+ Status = gBS->HandleProtocol (\r
HandleBuffer[Index],\r
&gEfiStorageSecurityCommandProtocolGuid,\r
- (VOID **) &Ssp\r
+ (VOID **)&Ssp\r
);\r
\r
if (EFI_ERROR (Status)) {\r
continue;\r
}\r
\r
- Status = gBS->HandleProtocol(\r
+ Status = gBS->HandleProtocol (\r
HandleBuffer[Index],\r
&gEfiBlockIoProtocolGuid,\r
- (VOID **) &BlockIo\r
+ (VOID **)&BlockIo\r
);\r
\r
if (EFI_ERROR (Status)) {\r
///\r
\r
DataSize = sizeof (mMorControl);\r
- Status = gRT->GetVariable (\r
- MEMORY_OVERWRITE_REQUEST_VARIABLE_NAME,\r
- &gEfiMemoryOverwriteControlDataGuid,\r
- NULL,\r
- &DataSize,\r
- &mMorControl\r
- );\r
+ Status = gRT->GetVariable (\r
+ MEMORY_OVERWRITE_REQUEST_VARIABLE_NAME,\r
+ &gEfiMemoryOverwriteControlDataGuid,\r
+ NULL,\r
+ &DataSize,\r
+ &mMorControl\r
+ );\r
if (EFI_ERROR (Status)) {\r
//\r
// Set default value to 0\r
//\r
mMorControl = 0;\r
- Status = gRT->SetVariable (\r
- MEMORY_OVERWRITE_REQUEST_VARIABLE_NAME,\r
- &gEfiMemoryOverwriteControlDataGuid,\r
- EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS,\r
- DataSize,\r
- &mMorControl\r
- );\r
+ Status = gRT->SetVariable (\r
+ MEMORY_OVERWRITE_REQUEST_VARIABLE_NAME,\r
+ &gEfiMemoryOverwriteControlDataGuid,\r
+ EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS,\r
+ DataSize,\r
+ &mMorControl\r
+ );\r
DEBUG ((DEBUG_INFO, "TcgMor: Create MOR variable! Status = %r\n", Status));\r
} else {\r
//\r