|
|
63d87e |
From 7f364d9a95905efee0a8b46e4108042aaebe7849 Mon Sep 17 00:00:00 2001
|
|
|
63d87e |
From: Laszlo Ersek <lersek@redhat.com>
|
|
|
63d87e |
Date: Fri, 31 Jan 2020 12:42:37 +0100
|
|
|
63d87e |
Subject: [PATCH 01/12] SecurityPkg: Fix spelling errors [PARTIAL PICK]
|
|
|
63d87e |
MIME-Version: 1.0
|
|
|
63d87e |
Content-Type: text/plain; charset=UTF-8
|
|
|
63d87e |
Content-Transfer-Encoding: 8bit
|
|
|
63d87e |
|
|
|
63d87e |
RH-Author: Laszlo Ersek <lersek@redhat.com>
|
|
|
63d87e |
Message-id: <20200131124248.22369-2-lersek@redhat.com>
|
|
|
63d87e |
Patchwork-id: 93612
|
|
|
63d87e |
O-Subject: [RHEL-8.2.0 edk2 PATCH 01/12] SecurityPkg: Fix spelling errors [PARTIAL PICK]
|
|
|
63d87e |
Bugzilla: 1751993
|
|
|
63d87e |
RH-Acked-by: Philippe Mathieu-Daudé <philmd@redhat.com>
|
|
|
63d87e |
RH-Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
|
|
63d87e |
|
|
|
63d87e |
From: Sean Brogan <sean.brogan@microsoft.com>
|
|
|
63d87e |
|
|
|
63d87e |
--v-- RHEL-8 note start --v--
|
|
|
63d87e |
|
|
|
63d87e |
This is a partial cherry-pick, restricted to
|
|
|
63d87e |
"SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.c".
|
|
|
63d87e |
|
|
|
63d87e |
The upstream patch has a super-ugly diffstat (81 files changed, 205
|
|
|
63d87e |
insertions(+), 205 deletions(-)), fixing spelling errors all over
|
|
|
63d87e |
SecurityPkg in one go. It doesn't apply cleanly down-stream, and I don't
|
|
|
63d87e |
want to pick more (unrelated) SecurityPkg dependencies for this backport
|
|
|
63d87e |
series.
|
|
|
63d87e |
|
|
|
63d87e |
Thus, the only alternative to this partial cherry-pick would be resolving
|
|
|
63d87e |
conflicts over the rest of this series. That's obviously worse than a
|
|
|
63d87e |
partial typo fix backport. At the next rebase, we're going to drop this
|
|
|
63d87e |
patch and the rest of the backport series alike, anyway.
|
|
|
63d87e |
|
|
|
63d87e |
--^-- RHEL-8 note end --^--
|
|
|
63d87e |
|
|
|
63d87e |
https://bugzilla.tianocore.org/show_bug.cgi?id=2265
|
|
|
63d87e |
|
|
|
63d87e |
Cc: Jiewen Yao <jiewen.yao@intel.com>
|
|
|
63d87e |
Cc: Jian J Wang <jian.j.wang@intel.com>
|
|
|
63d87e |
Cc: Chao Zhang <chao.b.zhang@intel.com>
|
|
|
63d87e |
Signed-off-by: Michael D Kinney <michael.d.kinney@intel.com>
|
|
|
63d87e |
Reviewed-by: Jiewen Yao <Jiewen.yao@intel.com>
|
|
|
63d87e |
Reviewed-by: Jian J Wang <jian.j.wang@intel.com>
|
|
|
63d87e |
(cherry picked from commit d6b926e76e3d639ac37610e97d33ff9e3a6281eb)
|
|
|
63d87e |
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
|
|
63d87e |
Signed-off-by: Miroslav Rezanina <mrezanin@redhat.com>
|
|
|
63d87e |
---
|
|
|
63d87e |
.../Library/DxeImageVerificationLib/DxeImageVerificationLib.c | 10 +++++-----
|
|
|
63d87e |
1 file changed, 5 insertions(+), 5 deletions(-)
|
|
|
63d87e |
|
|
|
63d87e |
diff --git a/SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.c b/SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.c
|
|
|
63d87e |
index fe4cdcc..a0a12b5 100644
|
|
|
63d87e |
--- a/SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.c
|
|
|
63d87e |
+++ b/SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.c
|
|
|
63d87e |
@@ -745,7 +745,7 @@ AddImageExeInfo (
|
|
|
63d87e |
if (ImageExeInfoTable != NULL) {
|
|
|
63d87e |
//
|
|
|
63d87e |
// The table has been found!
|
|
|
63d87e |
- // We must enlarge the table to accomodate the new exe info entry.
|
|
|
63d87e |
+ // We must enlarge the table to accommodate the new exe info entry.
|
|
|
63d87e |
//
|
|
|
63d87e |
ImageExeInfoTableSize = GetImageExeInfoTableSize (ImageExeInfoTable);
|
|
|
63d87e |
} else {
|
|
|
63d87e |
@@ -947,7 +947,7 @@ Done:
|
|
|
63d87e |
|
|
|
63d87e |
@param[in] VariableName Name of database variable that is searched in.
|
|
|
63d87e |
@param[in] Signature Pointer to signature that is searched for.
|
|
|
63d87e |
- @param[in] CertType Pointer to hash algrithom.
|
|
|
63d87e |
+ @param[in] CertType Pointer to hash algorithm.
|
|
|
63d87e |
@param[in] SignatureSize Size of Signature.
|
|
|
63d87e |
|
|
|
63d87e |
@return TRUE Found the signature in the variable database.
|
|
|
63d87e |
@@ -992,7 +992,7 @@ IsSignatureFoundInDatabase (
|
|
|
63d87e |
goto Done;
|
|
|
63d87e |
}
|
|
|
63d87e |
//
|
|
|
63d87e |
- // Enumerate all signature data in SigDB to check if executable's signature exists.
|
|
|
63d87e |
+ // Enumerate all signature data in SigDB to check if signature exists for executable.
|
|
|
63d87e |
//
|
|
|
63d87e |
CertList = (EFI_SIGNATURE_LIST *) Data;
|
|
|
63d87e |
while ((DataSize > 0) && (DataSize >= CertList->SignatureListSize)) {
|
|
|
63d87e |
@@ -1844,7 +1844,7 @@ DxeImageVerificationHandler (
|
|
|
63d87e |
|
|
|
63d87e |
if (OffSet != (SecDataDir->VirtualAddress + SecDataDir->Size)) {
|
|
|
63d87e |
//
|
|
|
63d87e |
- // The Size in Certificate Table or the attribute certicate table is corrupted.
|
|
|
63d87e |
+ // The Size in Certificate Table or the attribute certificate table is corrupted.
|
|
|
63d87e |
//
|
|
|
63d87e |
VerifyStatus = EFI_ACCESS_DENIED;
|
|
|
63d87e |
}
|
|
|
63d87e |
@@ -1855,7 +1855,7 @@ DxeImageVerificationHandler (
|
|
|
63d87e |
Status = EFI_ACCESS_DENIED;
|
|
|
63d87e |
if (Action == EFI_IMAGE_EXECUTION_AUTH_SIG_FAILED || Action == EFI_IMAGE_EXECUTION_AUTH_SIG_FOUND) {
|
|
|
63d87e |
//
|
|
|
63d87e |
- // Get image hash value as executable's signature.
|
|
|
63d87e |
+ // Get image hash value as signature of executable.
|
|
|
63d87e |
//
|
|
|
63d87e |
SignatureListSize = sizeof (EFI_SIGNATURE_LIST) + sizeof (EFI_SIGNATURE_DATA) - 1 + mImageDigestSize;
|
|
|
63d87e |
SignatureList = (EFI_SIGNATURE_LIST *) AllocateZeroPool (SignatureListSize);
|
|
|
63d87e |
--
|
|
|
63d87e |
1.8.3.1
|
|
|
63d87e |
|