Re: [edk2-devel] [PATCH v1 0/4] Don't require self-signed PK in setup mode

2023-01-27 Thread Jan Bobek via groups.io
PcdGet (PcdRequireSelfSignedPk) && IsPk) If IsPk is FALSE, both of these evaluate to TRUE no matter what the PCD is. -Jan > On 1/25/2023 1:38 PM, Jan Bobek wrote: >> Hi Sean, >> >>> From looking over the patch 1/4 email i have a concern. >>> >>&g

Re: [edk2-devel] [PATCH v1 0/4] Don't require self-signed PK in setup mode

2023-01-25 Thread Jan Bobek via groups.io
-Jan > On 1/22/2023 10:13 PM, Yao, Jiewen wrote: > > Hi Sean > I would like to hear your feedback, since it is a little different from the > original MSFT patch. > > Would you please take a look? > > Thank you > Yao, Jiewen > > > > -----Original Messag

[edk2-devel] [PATCH v2 1/1] SecurityPkg/AuthVariableLib: Check SHA-256 OID with ContentInfo present

2023-01-22 Thread Jan Bobek via groups.io
, but the old code assumed ContentInfo was not present and incorrectly rejected authenticated variable updates when it were present. Cc: Jiewen Yao Cc: Jian J Wang Cc: Min Xu Signed-off-by: Jan Bobek --- .../Library/AuthVariableLib/AuthService.c | 50 --- 1 file changed, 42

[edk2-devel] [PATCH v1 4/4] SecurityPkg: don't require PK to be self-signed by default

2023-01-20 Thread Jan Bobek via groups.io
self-signed in this case. Cc: Jiewen Yao Cc: Jian J Wang Signed-off-by: Jan Bobek --- SecurityPkg/SecurityPkg.dec | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/SecurityPkg/SecurityPkg.dec b/SecurityPkg/SecurityPkg.dec index d3b7ad7ff6fb..0382090f4e75 100644 --- a/SecurityPkg

[edk2-devel] [PATCH v1 1/4] SecurityPkg: limit verification of enrolled PK in setup mode

2023-01-20 Thread Jan Bobek via groups.io
Yao Cc: Jian J Wang Cc: Min Xu Co-authored-by: Matthew Carlson Signed-off-by: Jan Bobek --- SecurityPkg/SecurityPkg.dec | 7 +++ SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf | 3 +++ SecurityPkg/Library/AuthVariableLib/AuthService.c | 9

[edk2-devel] [PATCH v1 2/4] OvmfPkg: require self-signed PK when secure boot is enabled

2023-01-20 Thread Jan Bobek via groups.io
: Sebastien Boeuf Signed-off-by: Jan Bobek --- OvmfPkg/Bhyve/BhyveX64.dsc | 3 +++ OvmfPkg/CloudHv/CloudHvX64.dsc | 3 +++ OvmfPkg/IntelTdx/IntelTdxX64.dsc | 3 +++ OvmfPkg/Microvm/MicrovmX64.dsc | 3 +++ OvmfPkg/OvmfPkgIa32.dsc | 3 +++ OvmfPkg/OvmfPkgIa32X64.dsc | 3

[edk2-devel] [PATCH v1 3/4] ArmVirtPkg: require self-signed PK when secure boot is enabled

2023-01-20 Thread Jan Bobek via groups.io
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2506 In all DSC files that define SECURE_BOOT_ENABLE, opt-in into requiring self-signed PK when SECURE_BOOT_ENABLE is TRUE. Cc: Ard Biesheuvel Cc: Leif Lindholm Cc: Sami Mujawar Cc: Gerd Hoffmann Signed-off-by: Jan Bobek --- ArmVirtPkg

[edk2-devel] [PATCH v1 0/4] Don't require self-signed PK in setup mode

2023-01-20 Thread Jan Bobek via groups.io
by Matthew Carlson; I've credited him with co-authorship of the first patch even though in the end I decided to do the implementation a bit differently. Comments & reviews welcome! Cheers, -Jan References: 1. https://bugzilla.tianocore.org/show_bug.cgi?id=2506 Jan Bobek (4): SecurityPkg: li

Re: [edk2-devel] [PATCH 1/1] SecurityPkg/AuthVariableLib: Check SHA-256 OID with ContentInfo present

2023-01-16 Thread Jan Bobek via groups.io
ted to use EDK2 as a basis for their (typically proprietary) UEFI implementation, they would need to address this issue one way or the other on their own. -Jan >> -----Original Message- >> From: Jan Bobek >> Sent: Tuesday, January 17, 2023 6:30 AM >> To: Yao, Jiewen &g

Re: [edk2-devel] [PATCH 1/1] SecurityPkg/AuthVariableLib: Check SHA-256 OID with ContentInfo present

2023-01-16 Thread Jan Bobek via groups.io
> Hi > That is good catch! > My apology to miss it before. > > 1) Please file a bugzilla (https://bugzilla.tianocore.org/) to record the > issue and associate to the patch. Filed bug 4305 [1]. Sorry for the delay, I didn't get my bugzilla credentials until late last week. > 2) Would you please s

Re: [edk2-devel] [PATCH 1/1] SecurityPkg/AuthVariableLib: Check SHA-256 OID with ContentInfo present

2023-01-03 Thread Jan Bobek via groups.io
Anothing ping. Comments/reviews/merge highly appreciated. Thank you, -Jan Jan Bobek writes: > Ping. Can I get a review and/or some comments on this patch, please? > > Thanks, > -Jan > > Jan Bobek writes: > >> Based on whether the DER-encoded ContentInfo structure is

Re: [edk2-devel] [PATCH 1/1] SecurityPkg/AuthVariableLib: Check SHA-256 OID with ContentInfo present

2022-12-13 Thread Jan Bobek via groups.io
Ping. Can I get a review and/or some comments on this patch, please? Thanks, -Jan Jan Bobek writes: > Based on whether the DER-encoded ContentInfo structure is present in > authenticated SetVariable payload or not, the SHA-256 OID can be > located at different places. > > UEF

[edk2-devel] [PATCH 1/1] SecurityPkg/AuthVariableLib: Check SHA-256 OID with ContentInfo present

2022-12-02 Thread Jan Bobek via groups.io
incorrectly rejected authenticated variable updates when it were present. Cc: Jiewen Yao Cc: Jian J Wang Cc: Min Xu Signed-off-by: Jan Bobek --- .../Library/AuthVariableLib/AuthService.c | 18 +++--- 1 file changed, 11 insertions(+), 7 deletions(-) diff --git a/SecurityPkg

[edk2-devel] [PATCH v2 0/1] MdePkg/BaseLib: AArch64 SetJump/LongJump bugfix

2020-10-01 Thread Jan Bobek
Hello, sending a v2 of my patch after following the instructions Laszlo Ersek gave me in response to the v1. Best, -Jan Jan Bobek (1): MdePkg/BaseLib: Fix invalid memory access in AArch64 SetJump/LongJump MdePkg/Library/BaseLib/AArch64/SetJumpLongJump.S | 8 MdePkg/Library

[edk2-devel] [PATCH v2 1/1] MdePkg/BaseLib: Fix invalid memory access in AArch64 SetJump/LongJump

2020-10-01 Thread Jan Bobek
memory gap in the middle of the structure and causing SetJump/LongJump functions to read/write 8 bytes of memory past the end of the jump buffer struct. Signed-off-by: Jan Bobek --- MdePkg/Library/BaseLib/AArch64/SetJumpLongJump.S | 8 MdePkg/Library/BaseLib/AArch64/SetJumpLongJump.asm | 8

Re: [edk2-devel] [PATCH 1/1] MdePkg/BaseLib: Fix invalid memory access in AArch64 SetJump/LongJump

2020-10-01 Thread Jan Bobek
Ard Biesheuvel writes: > On 10/1/20 3:04 PM, Laszlo Ersek wrote: >> On 09/29/20 03:12, Jan Bobek wrote: >>> Correct the memory offsets used in REG_ONE/REG_PAIR macros to >>> synchronize them with definition of the BASE_LIBRARY_JUMP_BUFFER >>> structure o

[edk2-devel] [PATCH 1/1] MdePkg/BaseLib: Fix invalid memory access in AArch64 SetJump/LongJump

2020-09-29 Thread Jan Bobek
, creating an unused memory gap in the middle of the structure and causing SetJump/LongJump functions to read/write 8 bytes of memory past the end of the jump buffer struct. Signed-off-by: Jan Bobek --- MdePkg/Library/BaseLib/AArch64/SetJumpLongJump.S | 8 MdePkg/Library/BaseLib/AArch64

[edk2-devel] [PATCH 0/1] MdePkg/BaseLib: AArch64 SetJump/LongJump bugfix

2020-09-29 Thread Jan Bobek
s my first contribution to EDK-II; I have tried to follow the guidelines as closely as possible, but if there is still something wrong with formatting etc., let me know and I shall submit a v2 with the issues fixed. That being said, I did run PatchCheck.py and it reported no errors. Cheers! -Jan