SecurityPkg: Apply uncrustify changes
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3737 Apply uncrustify changes to .c/.h files in the SecurityPkg package Cc: Andrew Fish <afish@apple.com> Cc: Leif Lindholm <leif@nuviainc.com> Cc: Michael D Kinney <michael.d.kinney@intel.com> Signed-off-by: Michael Kubacki <michael.kubacki@microsoft.com> Reviewed-by: Jian J Wang <jian.j.wang@intel.com>
This commit is contained in:
committed by
mergify[bot]
parent
39de741e2d
commit
c411b485b6
@@ -13,32 +13,32 @@
|
||||
//
|
||||
// The payload length of HDD related ATA commands
|
||||
//
|
||||
#define HDD_PAYLOAD 512
|
||||
#define HDD_PAYLOAD 512
|
||||
|
||||
#define ATA_SECURITY_SET_PASSWORD_CMD 0xF1
|
||||
#define ATA_SECURITY_UNLOCK_CMD 0xF2
|
||||
#define ATA_SECURITY_FREEZE_LOCK_CMD 0xF5
|
||||
#define ATA_SECURITY_DIS_PASSWORD_CMD 0xF6
|
||||
#define ATA_SECURITY_SET_PASSWORD_CMD 0xF1
|
||||
#define ATA_SECURITY_UNLOCK_CMD 0xF2
|
||||
#define ATA_SECURITY_FREEZE_LOCK_CMD 0xF5
|
||||
#define ATA_SECURITY_DIS_PASSWORD_CMD 0xF6
|
||||
|
||||
//
|
||||
// The max retry count specified in ATA 8 spec.
|
||||
//
|
||||
#define MAX_HDD_PASSWORD_RETRY_COUNT 5
|
||||
#define MAX_HDD_PASSWORD_RETRY_COUNT 5
|
||||
|
||||
//
|
||||
// According to ATA spec, the max length of hdd password is 32 bytes
|
||||
//
|
||||
#define HDD_PASSWORD_MAX_LENGTH 32
|
||||
#define HDD_PASSWORD_MAX_LENGTH 32
|
||||
|
||||
#define HDD_PASSWORD_DEVICE_INFO_GUID { 0x96d877ad, 0x48af, 0x4b39, { 0x9b, 0x27, 0x4d, 0x97, 0x43, 0x9, 0xae, 0x47 } }
|
||||
#define HDD_PASSWORD_DEVICE_INFO_GUID { 0x96d877ad, 0x48af, 0x4b39, { 0x9b, 0x27, 0x4d, 0x97, 0x43, 0x9, 0xae, 0x47 } }
|
||||
|
||||
typedef struct {
|
||||
UINT8 Bus;
|
||||
UINT8 Device;
|
||||
UINT8 Function;
|
||||
UINT8 Reserved;
|
||||
UINT16 Port;
|
||||
UINT16 PortMultiplierPort;
|
||||
UINT8 Bus;
|
||||
UINT8 Device;
|
||||
UINT8 Function;
|
||||
UINT8 Reserved;
|
||||
UINT16 Port;
|
||||
UINT16 PortMultiplierPort;
|
||||
} HDD_PASSWORD_DEVICE;
|
||||
|
||||
//
|
||||
|
File diff suppressed because it is too large
Load Diff
@@ -58,7 +58,7 @@ extern UINT8 HddPasswordBin[];
|
||||
//
|
||||
extern UINT8 HddPasswordDxeStrings[];
|
||||
|
||||
#define HDD_PASSWORD_DXE_PRIVATE_SIGNATURE SIGNATURE_32 ('H', 'D', 'D', 'P')
|
||||
#define HDD_PASSWORD_DXE_PRIVATE_SIGNATURE SIGNATURE_32 ('H', 'D', 'D', 'P')
|
||||
|
||||
typedef struct _HDD_PASSWORD_CONFIG_FORM_ENTRY {
|
||||
LIST_ENTRY Link;
|
||||
@@ -79,46 +79,46 @@ typedef struct _HDD_PASSWORD_CONFIG_FORM_ENTRY {
|
||||
} HDD_PASSWORD_CONFIG_FORM_ENTRY;
|
||||
|
||||
typedef struct _HDD_PASSWORD_DXE_PRIVATE_DATA {
|
||||
UINTN Signature;
|
||||
EFI_HANDLE DriverHandle;
|
||||
EFI_HII_HANDLE HiiHandle;
|
||||
EFI_HII_CONFIG_ACCESS_PROTOCOL ConfigAccess;
|
||||
HDD_PASSWORD_CONFIG_FORM_ENTRY *Current;
|
||||
UINTN Signature;
|
||||
EFI_HANDLE DriverHandle;
|
||||
EFI_HII_HANDLE HiiHandle;
|
||||
EFI_HII_CONFIG_ACCESS_PROTOCOL ConfigAccess;
|
||||
HDD_PASSWORD_CONFIG_FORM_ENTRY *Current;
|
||||
} HDD_PASSWORD_DXE_PRIVATE_DATA;
|
||||
|
||||
#define HDD_PASSWORD_DXE_PRIVATE_FROM_THIS(a) CR (a, HDD_PASSWORD_DXE_PRIVATE_DATA, ConfigAccess, HDD_PASSWORD_DXE_PRIVATE_SIGNATURE)
|
||||
|
||||
#define PASSWORD_SALT_SIZE 32
|
||||
#define PASSWORD_SALT_SIZE 32
|
||||
|
||||
#define HDD_PASSWORD_REQUEST_VARIABLE_NAME L"HddPasswordRequest"
|
||||
|
||||
//
|
||||
// It needs to be locked before EndOfDxe.
|
||||
//
|
||||
#define HDD_PASSWORD_VARIABLE_NAME L"HddPassword"
|
||||
#define HDD_PASSWORD_VARIABLE_NAME L"HddPassword"
|
||||
|
||||
#pragma pack(1)
|
||||
|
||||
typedef struct {
|
||||
HDD_PASSWORD_DEVICE Device;
|
||||
HDD_PASSWORD_REQUEST Request;
|
||||
HDD_PASSWORD_DEVICE Device;
|
||||
HDD_PASSWORD_REQUEST Request;
|
||||
} HDD_PASSWORD_REQUEST_VARIABLE;
|
||||
|
||||
//
|
||||
// It will be used to validate HDD password when the device is at frozen state.
|
||||
//
|
||||
typedef struct {
|
||||
HDD_PASSWORD_DEVICE Device;
|
||||
UINT8 PasswordHash[SHA256_DIGEST_SIZE];
|
||||
UINT8 PasswordSalt[PASSWORD_SALT_SIZE];
|
||||
HDD_PASSWORD_DEVICE Device;
|
||||
UINT8 PasswordHash[SHA256_DIGEST_SIZE];
|
||||
UINT8 PasswordSalt[PASSWORD_SALT_SIZE];
|
||||
} HDD_PASSWORD_VARIABLE;
|
||||
|
||||
///
|
||||
/// HII specific Vendor Device Path definition.
|
||||
///
|
||||
typedef struct {
|
||||
VENDOR_DEVICE_PATH VendorDevicePath;
|
||||
EFI_DEVICE_PATH_PROTOCOL End;
|
||||
VENDOR_DEVICE_PATH VendorDevicePath;
|
||||
EFI_DEVICE_PATH_PROTOCOL End;
|
||||
} HII_VENDOR_DEVICE_PATH;
|
||||
|
||||
#pragma pack()
|
||||
@@ -126,11 +126,11 @@ typedef struct {
|
||||
//
|
||||
// Time out value for ATA pass through protocol
|
||||
//
|
||||
#define ATA_TIMEOUT EFI_TIMER_PERIOD_SECONDS (3)
|
||||
#define ATA_TIMEOUT EFI_TIMER_PERIOD_SECONDS (3)
|
||||
|
||||
typedef struct {
|
||||
UINT32 Address;
|
||||
S3_BOOT_SCRIPT_LIB_WIDTH Width;
|
||||
UINT32 Address;
|
||||
S3_BOOT_SCRIPT_LIB_WIDTH Width;
|
||||
} HDD_HC_PCI_REGISTER_SAVE;
|
||||
|
||||
#endif
|
||||
|
@@ -17,38 +17,38 @@
|
||||
0x737cded7, 0x448b, 0x4801, { 0xb5, 0x7d, 0xb1, 0x94, 0x83, 0xec, 0x60, 0x6f } \
|
||||
}
|
||||
|
||||
#define FORMID_HDD_MAIN_FORM 1
|
||||
#define FORMID_HDD_DEVICE_FORM 2
|
||||
#define FORMID_HDD_MAIN_FORM 1
|
||||
#define FORMID_HDD_DEVICE_FORM 2
|
||||
|
||||
#define HDD_DEVICE_ENTRY_LABEL 0x1234
|
||||
#define HDD_DEVICE_LABEL_END 0xffff
|
||||
#define HDD_DEVICE_ENTRY_LABEL 0x1234
|
||||
#define HDD_DEVICE_LABEL_END 0xffff
|
||||
|
||||
#define KEY_HDD_DEVICE_ENTRY_BASE 0x1000
|
||||
#define KEY_HDD_DEVICE_ENTRY_BASE 0x1000
|
||||
|
||||
#define KEY_HDD_USER_PASSWORD 0x101
|
||||
#define KEY_HDD_MASTER_PASSWORD 0x102
|
||||
#define KEY_HDD_USER_PASSWORD 0x101
|
||||
#define KEY_HDD_MASTER_PASSWORD 0x102
|
||||
|
||||
#pragma pack(1)
|
||||
|
||||
typedef struct {
|
||||
UINT8 Supported:1;
|
||||
UINT8 Enabled:1;
|
||||
UINT8 Locked:1;
|
||||
UINT8 Frozen:1;
|
||||
UINT8 UserPasswordStatus:1;
|
||||
UINT8 MasterPasswordStatus:1;
|
||||
UINT8 Reserved:2;
|
||||
UINT8 Supported : 1;
|
||||
UINT8 Enabled : 1;
|
||||
UINT8 Locked : 1;
|
||||
UINT8 Frozen : 1;
|
||||
UINT8 UserPasswordStatus : 1;
|
||||
UINT8 MasterPasswordStatus : 1;
|
||||
UINT8 Reserved : 2;
|
||||
} HDD_PASSWORD_SECURITY_STATUS;
|
||||
|
||||
typedef struct {
|
||||
UINT8 UserPassword:1;
|
||||
UINT8 MasterPassword:1;
|
||||
UINT8 Reserved:6;
|
||||
UINT8 UserPassword : 1;
|
||||
UINT8 MasterPassword : 1;
|
||||
UINT8 Reserved : 6;
|
||||
} HDD_PASSWORD_REQUEST;
|
||||
|
||||
typedef struct _HDD_PASSWORD_CONFIG {
|
||||
HDD_PASSWORD_SECURITY_STATUS SecurityStatus;
|
||||
HDD_PASSWORD_REQUEST Request;
|
||||
HDD_PASSWORD_SECURITY_STATUS SecurityStatus;
|
||||
HDD_PASSWORD_REQUEST Request;
|
||||
} HDD_PASSWORD_CONFIG;
|
||||
|
||||
#pragma pack()
|
||||
|
@@ -9,8 +9,7 @@
|
||||
|
||||
#include "HddPasswordPei.h"
|
||||
|
||||
EFI_GUID mHddPasswordDeviceInfoGuid = HDD_PASSWORD_DEVICE_INFO_GUID;
|
||||
|
||||
EFI_GUID mHddPasswordDeviceInfoGuid = HDD_PASSWORD_DEVICE_INFO_GUID;
|
||||
|
||||
/**
|
||||
Send unlock hdd password cmd through ATA PassThru PPI.
|
||||
@@ -29,18 +28,18 @@ EFI_GUID mHddPasswordDeviceInfoGuid = HDD_PASSWORD_DEVICE_INFO_GUID;
|
||||
**/
|
||||
EFI_STATUS
|
||||
UnlockDevice (
|
||||
IN EDKII_PEI_ATA_PASS_THRU_PPI *AtaPassThru,
|
||||
IN UINT16 Port,
|
||||
IN UINT16 PortMultiplierPort,
|
||||
IN CHAR8 Identifier,
|
||||
IN CHAR8 *Password
|
||||
IN EDKII_PEI_ATA_PASS_THRU_PPI *AtaPassThru,
|
||||
IN UINT16 Port,
|
||||
IN UINT16 PortMultiplierPort,
|
||||
IN CHAR8 Identifier,
|
||||
IN CHAR8 *Password
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
EFI_ATA_COMMAND_BLOCK Acb;
|
||||
EFI_ATA_STATUS_BLOCK *Asb;
|
||||
EFI_ATA_PASS_THRU_COMMAND_PACKET Packet;
|
||||
UINT8 Buffer[HDD_PAYLOAD];
|
||||
EFI_STATUS Status;
|
||||
EFI_ATA_COMMAND_BLOCK Acb;
|
||||
EFI_ATA_STATUS_BLOCK *Asb;
|
||||
EFI_ATA_PASS_THRU_COMMAND_PACKET Packet;
|
||||
UINT8 Buffer[HDD_PAYLOAD];
|
||||
|
||||
if ((AtaPassThru == NULL) || (Password == NULL)) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
@@ -69,7 +68,7 @@ UnlockDevice (
|
||||
ZeroMem (&Acb, sizeof (Acb));
|
||||
ZeroMem (Asb, sizeof (EFI_ATA_STATUS_BLOCK));
|
||||
Acb.AtaCommand = ATA_SECURITY_UNLOCK_CMD;
|
||||
Acb.AtaDeviceHead = (UINT8) (PortMultiplierPort == 0xFFFF ? 0 : (PortMultiplierPort << 4));
|
||||
Acb.AtaDeviceHead = (UINT8)(PortMultiplierPort == 0xFFFF ? 0 : (PortMultiplierPort << 4));
|
||||
|
||||
//
|
||||
// Prepare for ATA pass through packet.
|
||||
@@ -80,8 +79,8 @@ UnlockDevice (
|
||||
Packet.Asb = Asb;
|
||||
Packet.Acb = &Acb;
|
||||
|
||||
((CHAR16 *) Buffer)[0] = Identifier & BIT0;
|
||||
CopyMem (&((CHAR16 *) Buffer)[1], Password, HDD_PASSWORD_MAX_LENGTH);
|
||||
((CHAR16 *)Buffer)[0] = Identifier & BIT0;
|
||||
CopyMem (&((CHAR16 *)Buffer)[1], Password, HDD_PASSWORD_MAX_LENGTH);
|
||||
|
||||
Packet.OutDataBuffer = Buffer;
|
||||
Packet.OutTransferLength = sizeof (Buffer);
|
||||
@@ -95,7 +94,8 @@ UnlockDevice (
|
||||
);
|
||||
if (!EFI_ERROR (Status) &&
|
||||
((Asb->AtaStatus & ATA_STSREG_ERR) != 0) &&
|
||||
((Asb->AtaError & ATA_ERRREG_ABRT) != 0)) {
|
||||
((Asb->AtaError & ATA_ERRREG_ABRT) != 0))
|
||||
{
|
||||
Status = EFI_DEVICE_ERROR;
|
||||
}
|
||||
|
||||
@@ -122,15 +122,15 @@ UnlockDevice (
|
||||
**/
|
||||
EFI_STATUS
|
||||
FreezeLockDevice (
|
||||
IN EDKII_PEI_ATA_PASS_THRU_PPI *AtaPassThru,
|
||||
IN UINT16 Port,
|
||||
IN UINT16 PortMultiplierPort
|
||||
IN EDKII_PEI_ATA_PASS_THRU_PPI *AtaPassThru,
|
||||
IN UINT16 Port,
|
||||
IN UINT16 PortMultiplierPort
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
EFI_ATA_COMMAND_BLOCK Acb;
|
||||
EFI_ATA_STATUS_BLOCK *Asb;
|
||||
EFI_ATA_PASS_THRU_COMMAND_PACKET Packet;
|
||||
EFI_STATUS Status;
|
||||
EFI_ATA_COMMAND_BLOCK Acb;
|
||||
EFI_ATA_STATUS_BLOCK *Asb;
|
||||
EFI_ATA_PASS_THRU_COMMAND_PACKET Packet;
|
||||
|
||||
if (AtaPassThru == NULL) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
@@ -159,7 +159,7 @@ FreezeLockDevice (
|
||||
ZeroMem (&Acb, sizeof (Acb));
|
||||
ZeroMem (Asb, sizeof (EFI_ATA_STATUS_BLOCK));
|
||||
Acb.AtaCommand = ATA_SECURITY_FREEZE_LOCK_CMD;
|
||||
Acb.AtaDeviceHead = (UINT8) (PortMultiplierPort == 0xFFFF ? 0 : (PortMultiplierPort << 4));
|
||||
Acb.AtaDeviceHead = (UINT8)(PortMultiplierPort == 0xFFFF ? 0 : (PortMultiplierPort << 4));
|
||||
|
||||
//
|
||||
// Prepare for ATA pass through packet.
|
||||
@@ -179,7 +179,8 @@ FreezeLockDevice (
|
||||
);
|
||||
if (!EFI_ERROR (Status) &&
|
||||
((Asb->AtaStatus & ATA_STSREG_ERR) != 0) &&
|
||||
((Asb->AtaError & ATA_ERRREG_ABRT) != 0)) {
|
||||
((Asb->AtaError & ATA_ERRREG_ABRT) != 0))
|
||||
{
|
||||
Status = EFI_DEVICE_ERROR;
|
||||
}
|
||||
|
||||
@@ -197,23 +198,23 @@ FreezeLockDevice (
|
||||
**/
|
||||
VOID
|
||||
UnlockHddPassword (
|
||||
IN EDKII_PEI_ATA_PASS_THRU_PPI *AtaPassThruPpi
|
||||
IN EDKII_PEI_ATA_PASS_THRU_PPI *AtaPassThruPpi
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
VOID *Buffer;
|
||||
UINTN Length;
|
||||
UINT8 DummyData;
|
||||
HDD_PASSWORD_DEVICE_INFO *DevInfo;
|
||||
UINT16 Port;
|
||||
UINT16 PortMultiplierPort;
|
||||
EFI_DEVICE_PATH_PROTOCOL *DevicePath;
|
||||
UINTN DevicePathLength;
|
||||
EFI_STATUS Status;
|
||||
VOID *Buffer;
|
||||
UINTN Length;
|
||||
UINT8 DummyData;
|
||||
HDD_PASSWORD_DEVICE_INFO *DevInfo;
|
||||
UINT16 Port;
|
||||
UINT16 PortMultiplierPort;
|
||||
EFI_DEVICE_PATH_PROTOCOL *DevicePath;
|
||||
UINTN DevicePathLength;
|
||||
|
||||
//
|
||||
// Get HDD password device info from LockBox.
|
||||
//
|
||||
Buffer = (VOID *) &DummyData;
|
||||
Buffer = (VOID *)&DummyData;
|
||||
Length = sizeof (DummyData);
|
||||
Status = RestoreLockBox (&mHddPasswordDeviceInfoGuid, Buffer, &Length);
|
||||
if (Status == EFI_BUFFER_TOO_SMALL) {
|
||||
@@ -222,7 +223,8 @@ UnlockHddPassword (
|
||||
Status = RestoreLockBox (&mHddPasswordDeviceInfoGuid, Buffer, &Length);
|
||||
}
|
||||
}
|
||||
if ((Buffer == NULL) || (Buffer == (VOID *) &DummyData)) {
|
||||
|
||||
if ((Buffer == NULL) || (Buffer == (VOID *)&DummyData)) {
|
||||
return;
|
||||
} else if (EFI_ERROR (Status)) {
|
||||
FreePages (Buffer, EFI_SIZE_TO_PAGES (Length));
|
||||
@@ -261,8 +263,8 @@ UnlockHddPassword (
|
||||
//
|
||||
// Search the device in the restored LockBox.
|
||||
//
|
||||
DevInfo = (HDD_PASSWORD_DEVICE_INFO *) Buffer;
|
||||
while ((UINTN) DevInfo < ((UINTN) Buffer + Length)) {
|
||||
DevInfo = (HDD_PASSWORD_DEVICE_INFO *)Buffer;
|
||||
while ((UINTN)DevInfo < ((UINTN)Buffer + Length)) {
|
||||
//
|
||||
// Find the matching device.
|
||||
//
|
||||
@@ -270,15 +272,18 @@ UnlockHddPassword (
|
||||
(DevInfo->Device.PortMultiplierPort == PortMultiplierPort) &&
|
||||
(DevInfo->DevicePathLength >= DevicePathLength) &&
|
||||
(CompareMem (
|
||||
DevInfo->DevicePath,
|
||||
DevicePath,
|
||||
DevicePathLength - sizeof (EFI_DEVICE_PATH_PROTOCOL)) == 0)) {
|
||||
DevInfo->DevicePath,
|
||||
DevicePath,
|
||||
DevicePathLength - sizeof (EFI_DEVICE_PATH_PROTOCOL)
|
||||
) == 0))
|
||||
{
|
||||
//
|
||||
// If device locked, unlock first.
|
||||
//
|
||||
if (!IsZeroBuffer (DevInfo->Password, HDD_PASSWORD_MAX_LENGTH)) {
|
||||
UnlockDevice (AtaPassThruPpi, Port, PortMultiplierPort, 0, DevInfo->Password);
|
||||
}
|
||||
|
||||
//
|
||||
// Freeze lock the device.
|
||||
//
|
||||
@@ -287,7 +292,7 @@ UnlockHddPassword (
|
||||
}
|
||||
|
||||
DevInfo = (HDD_PASSWORD_DEVICE_INFO *)
|
||||
((UINTN) DevInfo + sizeof (HDD_PASSWORD_DEVICE_INFO) + DevInfo->DevicePathLength);
|
||||
((UINTN)DevInfo + sizeof (HDD_PASSWORD_DEVICE_INFO) + DevInfo->DevicePathLength);
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -295,7 +300,6 @@ UnlockHddPassword (
|
||||
Exit:
|
||||
ZeroMem (Buffer, Length);
|
||||
FreePages (Buffer, EFI_SIZE_TO_PAGES (Length));
|
||||
|
||||
}
|
||||
|
||||
/**
|
||||
@@ -312,28 +316,26 @@ Exit:
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
HddPasswordAtaPassThruNotify (
|
||||
IN EFI_PEI_SERVICES **PeiServices,
|
||||
IN EFI_PEI_NOTIFY_DESCRIPTOR *NotifyDesc,
|
||||
IN VOID *Ppi
|
||||
IN EFI_PEI_SERVICES **PeiServices,
|
||||
IN EFI_PEI_NOTIFY_DESCRIPTOR *NotifyDesc,
|
||||
IN VOID *Ppi
|
||||
)
|
||||
{
|
||||
DEBUG ((DEBUG_INFO, "%a() - enter at S3 resume\n", __FUNCTION__));
|
||||
|
||||
UnlockHddPassword ((EDKII_PEI_ATA_PASS_THRU_PPI *) Ppi);
|
||||
UnlockHddPassword ((EDKII_PEI_ATA_PASS_THRU_PPI *)Ppi);
|
||||
|
||||
DEBUG ((DEBUG_INFO, "%a() - exit at S3 resume\n", __FUNCTION__));
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
|
||||
EFI_PEI_NOTIFY_DESCRIPTOR mHddPasswordAtaPassThruPpiNotifyDesc = {
|
||||
EFI_PEI_NOTIFY_DESCRIPTOR mHddPasswordAtaPassThruPpiNotifyDesc = {
|
||||
(EFI_PEI_PPI_DESCRIPTOR_NOTIFY_CALLBACK | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),
|
||||
&gEdkiiPeiAtaPassThruPpiGuid,
|
||||
HddPasswordAtaPassThruNotify
|
||||
};
|
||||
|
||||
|
||||
/**
|
||||
Main entry for this module.
|
||||
|
||||
@@ -346,12 +348,12 @@ EFI_PEI_NOTIFY_DESCRIPTOR mHddPasswordAtaPassThruPpiNotifyDesc = {
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
HddPasswordPeiInit (
|
||||
IN EFI_PEI_FILE_HANDLE FileHandle,
|
||||
IN CONST EFI_PEI_SERVICES **PeiServices
|
||||
IN EFI_PEI_FILE_HANDLE FileHandle,
|
||||
IN CONST EFI_PEI_SERVICES **PeiServices
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
EFI_BOOT_MODE BootMode;
|
||||
EFI_STATUS Status;
|
||||
EFI_BOOT_MODE BootMode;
|
||||
|
||||
Status = PeiServicesGetBootMode (&BootMode);
|
||||
if ((EFI_ERROR (Status)) || (BootMode != BOOT_ON_S3_RESUME)) {
|
||||
@@ -364,4 +366,3 @@ HddPasswordPeiInit (
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
return Status;
|
||||
}
|
||||
|
||||
|
@@ -26,10 +26,9 @@
|
||||
|
||||
#include "HddPasswordCommon.h"
|
||||
|
||||
|
||||
//
|
||||
// Time out value for ATA PassThru PPI
|
||||
//
|
||||
#define ATA_TIMEOUT 30000000
|
||||
#define ATA_TIMEOUT 30000000
|
||||
|
||||
#endif
|
||||
|
Reference in New Issue
Block a user