After calling RegisterHotKey, the allocated memory in NewString should
be freed.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Thomas Palmer
---
MdeModulePkg/Universal/DisplayEngineDxe/FormDisplay.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/MdeModulePkg
After calling SetVariable, the allocated memory in Variable should be
freed.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Thomas Palmer
---
.../Library/UefiBootManagerLib/BmLoadOption.c | 19 +++
1 file changed, 11 insertions(+), 8 deletions
When cleaning the PciIoDevice, also free the BusNumberRange
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Thomas Palmer
---
MdeModulePkg/Bus/Pci/PciBusDxe/PciDeviceSupport.c | 5 +
1 file changed, 5 insertions(+)
diff --git a/MdeModulePkg/Bus/Pci/PciBusDxe
According to UEFI spec, the RouteConfig protocol function should populate
the Progress pointer with an address inside Configuration. This patch
ensures that these functions are compliant when EFI_NOT_FOUND is returned.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Thomas
According to UEFI spec, the RouteConfig protocol function should populate
the Progress pointer with an address inside Configuration. This patch
ensures that these functions are compliant when EFI_NOT_FOUND is returned.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Thomas
According to UEFI spec, the RouteConfig protocol function should populate
the Progress pointer with an address inside Configuration. This patch
ensures that these functions are compliant when EFI_NOT_FOUND is returned.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Thomas
According to UEFI spec, the RouteConfig protocol function should populate
the Progress pointer with an address inside Configuration. This patch
ensures that these functions are compliant when EFI_NOT_FOUND is returned.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Thomas
According to UEFI spec, the RouteConfig protocol function should populate
the Progress pointer with an address inside Configuration. This patch
ensures that these functions are compliant when EFI_NOT_FOUND is returned.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Thomas
According to UEFI spec, the RouteConfig protocol function should populate
the Progress pointer with an address inside Configuration. This patch
ensures that these functions are compliant when EFI_NOT_FOUND is returned.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Thomas
According to UEFI spec, the RouteConfig protocol function should populate
the Progress pointer with an address inside Configuration. This patch
ensures that these functions are compliant when EFI_NOT_FOUND is returned.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Thomas
According to UEFI spec, the RouteConfig protocol function should populate
the Progress pointer with an address inside Configuration. This patch
ensures that these functions are compliant when EFI_NOT_FOUND is returned.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Thomas
ore Contribution Agreement 1.1
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
StdLib/EfiSocketLib/Tcp4.c | 8 ++--
StdLib/EfiSocketLib/Tcp6.c | 8 ++--
2 files changed, 12 insertions(+), 4 deletions(-)
diff --git a/StdLib/EfiSocketLib/Tcp4.c b/StdLib/EfiSocketLib/Tcp
Correct the header guard macro
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
OvmfPkg/IoMmuDxe/AmdSevIoMmu.h | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/OvmfPkg/IoMmuDxe/AmdSevIoMmu.h b/O
Correct the header guard macro
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
OvmfPkg/IoMmuDxe/AmdSevIoMmu.h | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/OvmfPkg/IoMmuDxe/AmdSevIoMmu.h b/OvmfPkg/Io
FIAPI token to match the original
implementation.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
.../Library/UefiShellLevel2CommandsLib/UefiShellLevel2CommandsLib.c | 2 ++
1 file changed, 2 insertions(+)
diff
When allocating memory for a string, the CHAR16 NUL character needs
two bytes of space. Use StrSize to get accurate size
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
Nt32Pkg/WinNtBusDriverDxe/WinNtBusDriver.c | 4 ++--
SSL_set_options to
simulate SSL_CTX_set_min_proto_version.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
CryptoPkg/Library/TlsLib/TlsLib.c | 20
1 file changed, 16 insertions(+), 4 deletions(-)
diff --git a/Cry
Demonstrate the TLS regotiation in this feature branch. Remove the
code that calls EfiTlsVersion in the HttpDxe module.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
NetworkPkg/HttpDxe/HttpsSupport.c | 14 +-
TlsVersion in the HttpDxe
module.
Contributed-under: TianoCore Contribution Agreement 1.0
Thomas Palmer (2):
[edk2-staging/HTTPS-TLS][PATCH]: CryptoPkg/TlsLib: TLS Ver negotiate
[edk2-staging/HTTPS-TLS][PATCH]: NetworkPkg/HttpDxe: Unrestrict TLSv
CryptoPkg/Library/TlsLib/Tls
SSL_set_options to
simulate SSL_CTX_set_min_proto_version.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
CryptoPkg/Library/TlsLib/TlsLib.c | 21 +
1 file changed, 17 insertions(+), 4 deletions(-)
diff --git a/Cry
Demonstrate the TLS regotiation in this feature branch. Remove the
code that calls EfiTlsVersion in the HttpDxe module.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
NetworkPkg/HttpDxe/HttpsSupport.c | 12 +---
The TLS protocol allows for clients and servers to negotiate which
version of TLS to use. Newer versions are deemed safer, so when
they are available the client and server should opt to use them.
The EDK2 TLS code today only allows TLSv1.0 for TLS communication,
regardless of the target server's
-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
CryptoPkg/Library/TlsLib/TlsLib.c | 7 ---
1 file changed, 7 deletions(-)
diff --git a/CryptoPkg/Library/TlsLib/TlsLib.c
b/CryptoPkg/Library/TlsLib/TlsLib.c
index 1f3554a..aa08595
OvmfPkg/Sec: OvmfPkg/Sec: Handle bigger DXEFV sizes
Downstream projects may generate DXEFVs larger than 16MB and are
handled properly by the EDK2 build tools. However, Ovmf does not
expect to ever see such large FVs and an ASSERT ensues.
This patch will add support for FVs with SECTION2 common
: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
OvmfPkg/Sec/SecMain.c | 16 +---
1 file changed, 13 insertions(+), 3 deletions(-)
diff --git a/OvmfPkg/Sec/SecMain.c b/OvmfPkg/Sec/SecMain.c
index 384fa74..464de10 100644
--- a/OvmfPkg/Sec/Sec
Drop superfluous casts. There is no change in behavior because
EFI_FIRMWARE_VOLUME_IMAGE_SECTION is just a typedef of
EFI_COMMON_SECTION_HEADER.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
OvmfPkg/Sec/SecMain.c | 9 +-
Ovmf's SecMain needs to handle the EFI_COMMON_SECTION_HEADER2 header
so that larger images can be created. Use IS_SECTION2 and
SECTION2_SIZE macros to calculate accurate image sizes when
appropriate.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.
works)"
http://thread.gmane.org/gmane.comp.bios.tianocore.devel/13438
http://thread.gmane.org/gmane.comp.bios.tianocore.devel/14899
This patch tells the linker to preserve the .hii sections
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.p
uted-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
BaseTools/Scripts/GccBase.lds | 5 +
1 file changed, 5 insertions(+)
diff --git a/BaseTools/Scripts/GccBase.lds b/BaseTools/Scripts/GccBase.lds
index 32310bc..7e4cdde 100644
--- a/B
uted-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
BaseTools/Scripts/GccBase.lds | 4
1 file changed, 4 insertions(+)
diff --git a/BaseTools/Scripts/GccBase.lds b/BaseTools/Scripts/GccBase.lds
index 32310bc..a761fa6 100644
--- a/B
Print's "%g" argument requires a EFI_GUID pointer, not the EFI_GUID
value.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
ShellPkg/Library/UefiHandleParsingLib/UefiHandleParsingLib.c | 6 +++---
1 file changed, 3
Put the TLS cert variable name define into GlobalVariable.h and create
a GUID for it in CryptoPkg.dec. Describe the minimum size and expected
variable attributes in VarCheckUefiLib.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.
Initialize the variable that holds the return from SSL_do_handshake.
When the handshake function is not called it will be uninitialized.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
CryptoPkg/Library/TlsLib/TlsLib.c |
the handshake finishes. Our TLS protocol only expects
an alert to come after the handshake, so we would have continued TLS
operations.
Please note I am using types int and unsigned long to match the
OpenSSL api.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.
Add missing "done" token needed to complete the for loop. Tested in
Ubuntu 14.04
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
BaseTools/BinWrappers/PosixLike/LzmaF86Compress | 6 --
1 file changed, 4
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
MdePkg/Library/BaseLib/SafeString.c | 22 ++
1 file changed, 14 insertions(+), 8 deletions(-)
diff --git a/MdePkg/Library/BaseLib/SafeString.c
b/MdePkg/Library/BaseLib/SafeString.c
index b0e1ce7..ac5cfdc 100644
---
-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
.../Source/Python/Workspace/MetaFileParser.py | 40 ++
.../Source/Python/Workspace/WorkspaceDatabase.py | 7 +---
2 files changed, 26 insertions(+), 21 del
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
BaseTools/Source/Python/GenFds/FfsInfStatement.py | 36 --
.../Source/Python/Workspace/WorkspaceDatabase.py | 8 +
2 files changed, 14 insertions(+), 30 deletions(-)
diff --git a/BaseTools/Source/Python/
Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
MdeModulePkg/Include/Library/UefiBootManagerLib.h | 23 -
.../Library/UefiBootManagerLib/BmLoadOption.c | 38 ++
2 files changed, 46 insertions(+), 15 deletions(-)
diff --git a/MdeMod
Check for NULL from AllocateCopyPool before setting Count to 1. Also
change sizeof (EFI_HANDLE*) to sizeof (EFI_HANDLE). Handles is a
EFI_HANDLE pointer, so the allocated memory must be the size of
EFI_HANDLE.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer
Redfine the BmIsValidLoadOptionVariableName function to allow public
use. Change name to EfiBootManagerIsValidLoadOptionVariableName to
match naming scheme.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
MdeModulePkg/I
TempBuf in SetupEventLog needs to include sizeof (UINT32) to hold
NumberOfAlgorithms.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
Pass in GUID* for the GUID reference in a CatSPrint statement. Issue
was noticed when running "dh -d -v" command on a system with a PCI
NIC installed.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
-by: Thomas Palmer <thomas.pal...@hpe.com>
---
EmbeddedPkg/Ebl/Command.c | 9 +
EmbeddedPkg/Ebl/Dir.c | 3 +++
EmbeddedPkg/Ebl/EfiDevice.c | 9 +
EmbeddedPkg/Ebl/Hob.c | 2 ++
EmbeddedPkg/Ebl/HwDebug.c
. Using the HWRNG installed on the HP ProLiant m400 moonshot
cartridge, this will save about 50ms per RAW Entropy operation as compared with
calling GetRandomNumber64 twice.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
SecurityPkg/RandomNumberGenerator/RngDxe/RdRand.c | 256 ++--
SecurityPkg/RandomNumberGenerator/RngDxe/RdRand.h | 151 +---
SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c
GetRandomNumber128 in RngDxe to leverage 128 bit support found
in some HW RNG devices
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
MdePkg/Include/Library/RngLib.h| 17 ++
MdePkg/Library/BaseRngLib/Bas
UINT64 instead of UINTN where appropriate
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
.../RngDxe/IA32/AsmRdRand.asm | 67 --
.../RandomNumberGenerator/RngDxe/IA32/GccRdRand.c
1.0
Signed-off-by: Thomas Palmer <thomas.pal...@hpe.com>
---
.../RngDxe/IA32/AsmRdRand.asm | 67
.../RandomNumberGenerator/RngDxe/IA32/GccRdRand.c | 69
SecurityPkg/RandomNumberGenerator/RngDxe/RdRand.c | 173 +---
Secur
49 matches
Mail list logo