Added Inf variable, and the error case returned value was checked properly.
---
CryptoPkg/Library/BaseCryptLib/Pk/CryptX509.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptX509.c
b/CryptoPkg/Library/BaseCryptLib/Pk/CryptX509.c
ind
Hi Chris,
1. Please create a feature request BugZilla to introduce the background of the
new API, such as purpose and application scenarios.
2. I took a quick look, the new API will make Pkcs1v2De/Encrypt support
RsaContext input and the rest is same as old API right?
Regards,
Yi
-Original
Hi Gerd,
Thanks,
Chao
On 2024/3/18 23:28, Gerd Hoffmann wrote:
On Sat, Mar 16, 2024 at 10:17:00AM +0800, lixianglai wrote:
Hi Gerd:
On Mon, Mar 11, 2024 at 02:39:31AM -0700, Chao Li wrote:
This library for PEI phase, and obtains the QemuFwCfg base address by
directly parsing the FDT, reads a
Hi Gerd,
Thanks,
Chao
On 2024/3/18 23:21, Gerd Hoffmann wrote:
On Sat, Mar 16, 2024 at 06:19:00PM +0800, lixianglai wrote:
Hi Gerd:
On Mon, Mar 11, 2024 at 02:39:24AM -0700, Chao Li wrote:
Add NorFlashQemuLib for LoongArch, it is referenced from ArmVirtPkg.
What are the differences to the A
*Reminder: TianoCore Bug Triage - APAC / NAMO*
*When:*
Tuesday, March 19, 2024
6:30pm to 7:30pm
(UTC-07:00) America/Los Angeles
*Where:*
https://teams.microsoft.com/l/meetup-join/19%3ameeting_OTk1YzJhN2UtOGQwNi00NjY4LWEwMTktY2JiODRlYTY1NmY0%40thread.v2/0?context=%7b%22Tid%22%3a%2246c98d88-e344-4e
*Tools, CI, Code base construction meeting series*
*When:*
Monday, March 18, 2024
4:30pm to 5:30pm
(UTC-07:00) America/Los Angeles
*Where:*
https://teams.microsoft.com/l/meetup-join/19%3ameeting_ZDI2ZDg4NmMtMjI1My00MzI5LWFmYjAtMGQyNjUzNTBjZGYw%40thread.v2/0?context=%7b%22Tid%22%3a%2272f988bf-86f1
From: Chris Ruffin
Add unit test functions:
TestVerifyPkcs1v2Decrypt()
TestVerifyTestRsaOaepEncrypt()
TestVerifyTestRsaOaepDecrypt()
Signed-off-by: Chris Ruffin
Cc: Jiewen Yao
Cc: Yi Li
Cc: Wenxing Hou
---
.../Library/BaseCryptLib/OaepEncryptTests.c | 184 +-
1 file change
From: Chris Ruffin
Add new library members to CryptoPkg/Driver.
Signed-off-by: Chris Ruffin
Cc: Jiewen Yao
Cc: Yi Li
Cc: Wenxing Hou
---
CryptoPkg/Driver/Crypto.c | 116 +-
.../Pcd/PcdCryptoServiceFamilyEnable.h| 3 +
.../BaseCryptLibOnProtocolP
From: Chris Ruffin
Expand the availability of the RSAEP-OAEP crypto capability in
BaseCryptLib. Applications using RSA crypto functions directly from
OpensslLib can transition to BaseCryptLib to take advantage of the
shared crypto feature in CryptoDxe.
Pkcs1v2Decrypt(): decryption using DER-enc
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=4645
Clear out the variable SmmCommunicateSetPassword which contains password before
goto Exit.
To avoid vulnerability.
Signed-off-by: Nayana Patel
---
.../UserAuthenticationDxeSmm/UserAuthenticationSmm.c| 2 ++
1 file changed, 2 i
sPasswordStrong checks for password complexity requirements. It does bare
minimal
checking for existence of uppercase, lowercase, numeral, and symbol. A password
with repeating characters
would be an acceptable password, such as 1!Aa.IsPasswordInHistory checks if
the password hash of the pas
From: Bruce Wang
This reverts commit 1c0db2315109233e77e6b5a52704d14550dcba3c
That commit cause a build error "ProcessLibraryConstructorList undefined"
in FitUniversalPayloadEntry.c
Cc: Gua Guo
Cc: Guo Dong
Cc: James Lu
Cc: Sean Rhodes
Signed-off-by: BruceX Wang
---
.../UefiPayloadEntry/
From: Bruce Wang
This reverts commit 1c0db2315109233e77e6b5a52704d14550dcba3c
That commit caused debug messages to be missing in FitUniversalPayload.c.
Bruce Wang (1):
UefiPayloadPkg: Revert "ProcessLibraryConstructorList()"
.../UefiPayloadEntry/FitUniversalPayloadEntry.inf | 2 +-
Ue
From: Bruce Wang
ProcessLibraryConstructorList() no needs to be called manually
after INF version greater or equal to 1.30.
Cc: Guo Dong
Cc: Sean Rhodes
Cc: James Lu
Cc: Gua Guo
Signed-off-by: BruceX Wang
---
UefiPayloadPkg/UefiPayloadEntry/FitUniversalPayloadEntry.c | 2 --
UefiPayloadPk
From: Bruce Wang
ProcessLibraryConstructorList() no needs to be called manually
after INF version greater or equal to 1.30.
Bruce Wang (1):
UefiPayloadPkg: Cleanup ProcessLibraryConstructorList()
UefiPayloadPkg/UefiPayloadEntry/FitUniversalPayloadEntry.c | 2 --
UefiPayloadPkg/UefiPayloadEnt
From: Chris Ruffin
Add unit test functions:
TestVerifyPkcs1v2Decrypt()
TestVerifyTestRsaOaepEncrypt()
TestVerifyTestRsaOaepDecrypt()
Signed-off-by: Chris Ruffin
Cc: Jiewen Yao
Cc: Yi Li
Cc: Wenxing Hou
---
.../Library/BaseCryptLib/OaepEncryptTests.c | 184 +-
1 file change
From: Chris Ruffin
Add new library members to CryptoPkg/Driver.
Signed-off-by: Chris Ruffin
Cc: Jiewen Yao
Cc: Yi Li
Cc: Wenxing Hou
---
CryptoPkg/Driver/Crypto.c | 116 +-
.../Pcd/PcdCryptoServiceFamilyEnable.h| 3 +
.../BaseCryptLibOnProtocolP
From: Chris Ruffin
Expand the availability of the RSAEP-OAEP crypto capability in
BaseCryptLib. Applications using RSA crypto functions directly from
OpensslLib can transition to BaseCryptLib to take advantage of the
shared crypto feature in CryptoDxe.
Pkcs1v2Decrypt(): decryption using DER-enc
On Thu, Mar 14, 2024 at 12:28 PM Yao, Jiewen wrote:
> Question: What is the value to provide an *empty* HSTI table?
>
> IMHO, If the goal is to perform some security check, I think we need
> provide a *real* HSTI table.
>
HSTI is very vendor-specific and depends on features that a vendor
support
Signed-off-by: Konstantin Kostiuk
---
OvmfPkg/OvmfPkgIa32.dsc| 2 ++
OvmfPkg/OvmfPkgIa32.fdf| 1 +
OvmfPkg/OvmfPkgIa32X64.dsc | 2 ++
OvmfPkg/OvmfPkgIa32X64.fdf | 1 +
OvmfPkg/OvmfPkgX64.dsc | 2 ++
OvmfPkg/OvmfPkgX64.fdf | 1 +
6 files changed, 9 insertions(+)
diff --git a/OvmfP
The driver provides empty HSTI table.
Signed-off-by: Konstantin Kostiuk
---
OvmfPkg/VirtHstiDxe/VirtHstiDxe.c | 75 +
OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf | 64
2 files changed, 139 insertions(+)
create mode 100644 OvmfPkg/VirtHstiDxe/VirtHs
Resolve: https://issues.redhat.com/browse/RHEL-28751
HSTI (Hardware Security Test Interface) table is a requiremnt for
ont test [1] from Microsoft Server Virtualization Validation Program.
HSTI is a UEFI driver that provides a way to query the platform for
the presence of security features. Curre
Add Leif and Michael to cc list
Hi Sunil,
On 2024/3/14 13:28, Sunil V L wrote:
Hi Ran,
On Mon, Mar 11, 2024 at 12:29:53PM +0800, Ran Wang wrote:
Hi Sunil,
On 2024/3/8 19:44, Sunil V L wrote:
On Fri, Mar 08, 2024 at 12:31:26AM -0800, WangYang wrote:
Hi,Sunil V L
How about this status
Hi Mike ,
I had raised new code review addressing the coding standard errors and those
were not part of my change any way ..
Thanks,
P. Madhan
-Original Message-
From: Kinney, Michael D
Sent: Sunday, March 10, 2024 1:47 AM
To: devel@edk2.groups.io; Pethaiyan, Madhan
Cc: Liming Gao ;
1.For EFI_FIRMWARE_MANAGEMENT_PROTOCOL.GetImage():
Add the following sentence at the end of the Image parameter
description. "May be NULL with a zero ImageSize in order to determine
the size of the buffer needed".
Modify the description of "EFI_INVALID_PARAMETER" return code as "The
ImageSize is n
1.For EFI_FIRMWARE_MANAGEMENT_PROTOCOL.GetImage():
Add the following sentence at the end of the Image parameter
description. "May be NULL with a zero ImageSize in order to determine
the size of the buffer needed".
Modify the description of "EFI_INVALID_PARAMETER" return code as "The
ImageSize is n
1.For EFI_FIRMWARE_MANAGEMENT_PROTOCOL.GetImage():
Add the following sentence at the end of the Image parameter
description. "May be NULL with a zero ImageSize in order to determine
the size of the buffer needed".
Modify the description of "EFI_INVALID_PARAMETER" return code as "The
ImageSize is n
*Reminder: Tools, CI, Code base construction meeting series*
*When:*
Monday, March 18, 2024
4:30pm to 5:30pm
(UTC-07:00) America/Los Angeles
*Where:*
https://teams.microsoft.com/l/meetup-join/19%3ameeting_ZDI2ZDg4NmMtMjI1My00MzI5LWFmYjAtMGQyNjUzNTBjZGYw%40thread.v2/0?context=%7b%22Tid%22%3a%2272f
Looks good to me.
For others' reference, the change has been already verified by running
SystemReady SIE (Security Interface extension) tests on multiple SystemReady
certified Arm systems.
Reviewed-by: Sunny Wang
-Original Message-
From: devel@edk2.groups.io On Behalf Of Stuart Yoder v
Looks good to me.
For others' reference, the change has been already verified by running
SystemReady SIE (Security Interface extension) tests on multiple SystemReady
certified Arm systems.
Reviewed-by: Sunny Wang
-Original Message-
From: devel@edk2.groups.io On Behalf Of Stuart Yoder v
Looks good to me.
For others' reference, the change has been already verified by running
SystemReady SIE (Security Interface extension) tests on multiple SystemReady
certified Arm systems.
Reviewed-by: Sunny Wang
-Original Message-
From: devel@edk2.groups.io On Behalf Of Stuart Yoder v
Looks good to me.
For others' reference, the change has been already verified by running
SystemReady SIE (Security Interface extension) tests on multiple SystemReady
certified Arm systems.
Reviewed-by: Sunny Wang
-Original Message-
From: devel@edk2.groups.io On Behalf Of Stuart Yoder v
Looks good to me.
For others' reference, the change has been already verified by running
SystemReady SIE (Security Interface extension) tests on multiple SystemReady
certified Arm systems.
Reviewed-by: Sunny Wang
-Original Message-
From: devel@edk2.groups.io On Behalf Of Stuart Yoder v
Looks good to me.
For others' reference, the change has been already verified by running
SystemReady SIE (Security Interface extension) tests on multiple SystemReady
certified Arm systems.
Reviewed-by: Sunny Wang
-Original Message-
From: devel@edk2.groups.io On Behalf Of Stuart Yoder v
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4731
TCG2 configuration UI shows all the hash algorithms that TPM hardware
supports in the checkbox. If user only selects one algorithm that is
supported by TPM hardware but not supported by BIOS and uncheck the
others, the SyncPcrAllocationsAndP
On Sat, Mar 16, 2024 at 10:17:00AM +0800, lixianglai wrote:
> Hi Gerd:
> > On Mon, Mar 11, 2024 at 02:39:31AM -0700, Chao Li wrote:
> >> This library for PEI phase, and obtains the QemuFwCfg base address by
> >> directly parsing the FDT, reads and writes the data in QemuFwCfg by
> >> operating on t
On Sat, Mar 16, 2024 at 06:19:00PM +0800, lixianglai wrote:
> Hi Gerd:
> > On Mon, Mar 11, 2024 at 02:39:24AM -0700, Chao Li wrote:
> >> Add NorFlashQemuLib for LoongArch, it is referenced from ArmVirtPkg.
> > What are the differences to the ArmVirtPkg version?
> In this lib we have assigned the fo
On Thu, Mar 14, 2024 at 01:19:14PM -0700, Tuan Phan wrote:
> Define the BIT 2 as the override bit for Svpbmt extension. This will
> be used by RISC-V MMU library to support EFI_MEMORY_UC and
> EFI_MEMORY_WC.
>
Reviewed-by: Sunil V L
-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messa
On Thu, Mar 14, 2024 at 01:19:17PM -0700, Tuan Phan wrote:
> Disable Svpbmt extension as QEMU not enables it in default config.
>
Reviewed-by: Sunil V L
-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#116840): https://edk2.groups.io/g/de
Hi Tuan,
On Thu, Mar 14, 2024 at 01:19:16PM -0700, Tuan Phan wrote:
> The GCD EFI_MEMORY_UC and EFI_MEMORY_WC memory attributes will be
> supported when Svpbmt extension available.
>
> Cc: Gerd Hoffmann
> Cc: Laszlo Ersek
> Cc: Rahul Kumar
> Cc: Ray Ni
> Signed-off-by: Tuan Phan
> ---
> ...
The patch is up streamed by the below commit:
https://github.com/tianocore/edk2-test/commit/032822757792c5d4d0bfed1fd8524e69ef4f2d17
-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#116838): https://edk2.groups.io/g/devel/message/116838
Mut
I think it would be nice if you add
diff --git a/MdePkg/Library/BaseLib/AArch64/SetJumpLongJump.S
b/MdePkg/Library/BaseLib/AArch64/SetJumpLongJump.S
index 3e58119b25d2..505d3765c522 100644
--- a/MdePkg/Library/BaseLib/AArch64/SetJumpLongJump.S
+++ b/MdePkg/Library/BaseLib/AArch64/SetJumpLongJump.
Updated iterator usage for Python 3 compatibility
Cc: Chasel Chiu
Cc: Nate DeSimone
Cc: Duggapu Chinni B
Cc: Star Zeng
Cc: Ted Kuo
Cc: Ashraf Ali S
Cc: Susovan Mohapatra
Signed-off-by: Zhiguang Liu
---
IntelFsp2Pkg/Tools/PatchFv.py | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
dif
Now, the value params of PatchFv support below value getting from map
file:
ModuleName:FunctionName
ModuleName:GlobalVariableName
ModuleGuid:Offset
This patch add a new type ModuleName:KeyWord
KeyWord now supports "BASE", indicating the address of the Image base.
For example, ModuleName:BASE
44 matches
Mail list logo