ed852e Update EnrollDefaultKeys patch (bz #1398743)

Authored and Committed by crobinso 8 years ago
    Update EnrollDefaultKeys patch (bz #1398743)
    
        
0007-OvmfPkg-EnrollDefaultKeys-application-for-enrolling-.patch CHANGED
@@ -1,3 +1,4 @@
1
+ From da502f7cc283055a65ab3caeaa62eb5c6a6fddb5 Mon Sep 17 00:00:00 2001
1
2
From: Laszlo Ersek <lersek@redhat.com>
2
3
Date: Mon, 6 Jul 2015 20:22:02 +0200
3
4
Subject: [PATCH] OvmfPkg: EnrollDefaultKeys: application for enrolling default
@@ -43,21 +44,21 @@ DB:
43
44
Contributed-under: TianoCore Contribution Agreement 1.0
44
45
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
45
46
---
46
- OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c | 960 ++++++++++++++++++++++++
47
+ OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c | 963 ++++++++++++++++++++++++
47
48
OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf | 51 ++
48
49
OvmfPkg/OvmfPkgIa32.dsc | 4 +
49
50
OvmfPkg/OvmfPkgIa32X64.dsc | 4 +
50
51
OvmfPkg/OvmfPkgX64.dsc | 4 +
51
- 5 files changed, 1023 insertions(+)
52
+ 5 files changed, 1026 insertions(+)
52
53
create mode 100644 OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c
53
54
create mode 100644 OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf
54
55
55
56
diff --git a/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c b/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c
56
57
new file mode 100644
57
- index 0000000..081212b
58
+ index 0000000..447288f
58
59
--- /dev/null
59
60
+++ b/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c
60
- @@ -0,0 +1,960 @@
61
+ @@ -0,0 +1,963 @@
61
62
+/** @file
62
63
+ Enroll default PK, KEK, DB.
63
64
+
@@ -723,6 +724,8 @@ index 0000000..081212b
723
724
+ UINT8 *Data;
724
725
+ UINT8 *Position;
725
726
+
727
+ + Status = EFI_SUCCESS;
728
+ +
726
729
+ //
727
730
+ // compute total size first, for UINT32 range check, and allocation
728
731
+ //
@@ -800,10 +803,11 @@ index 0000000..081212b
800
803
+
801
804
+ RepeatingHeader = (REPEATING_HEADER *)Position;
802
805
+ CopyGuid (&RepeatingHeader->SignatureType, &gEfiCertX509Guid);
803
- + RepeatingHeader->SignatureListSize = sizeof *RepeatingHeader + CertSize;
806
+ + RepeatingHeader->SignatureListSize =
807
+ + (UINT32)(sizeof *RepeatingHeader + CertSize);
804
808
+ RepeatingHeader->SignatureHeaderSize = 0;
805
809
+ RepeatingHeader->SignatureSize =
806
- + sizeof RepeatingHeader->SignatureOwner + CertSize;
810
+ + (UINT32)(sizeof RepeatingHeader->SignatureOwner + CertSize);
807
811
+ CopyGuid (&RepeatingHeader->SignatureOwner, OwnerGuid);
808
812
+ Position += sizeof *RepeatingHeader;
809
813
+
@@ -1076,10 +1080,10 @@ index 0000000..ac919bb
1076
1080
+ UefiLib
1077
1081
+ UefiRuntimeServicesTableLib
1078
1082
diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc
1079
- index fa9661c..e2e6ba3 100644
1083
+ index 8af3267..6fb5c9c 100644
1080
1084
--- a/OvmfPkg/OvmfPkgIa32.dsc
1081
1085
+++ b/OvmfPkg/OvmfPkgIa32.dsc
1082
- @@ -764,6 +764,10 @@
1086
+ @@ -749,6 +749,10 @@
1083
1087
1084
1088
!if $(SECURE_BOOT_ENABLE) == TRUE
1085
1089
SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
@@ -1091,10 +1095,10 @@ index fa9661c..e2e6ba3 100644
1091
1095
1092
1096
OvmfPkg/PlatformDxe/Platform.inf
1093
1097
diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc
1094
- index 667584a..a0ae1aa 100644
1098
+ index 4bb38d0..e5abaff 100644
1095
1099
--- a/OvmfPkg/OvmfPkgIa32X64.dsc
1096
1100
+++ b/OvmfPkg/OvmfPkgIa32X64.dsc
1097
- @@ -773,6 +773,10 @@
1101
+ @@ -758,6 +758,10 @@
1098
1102
1099
1103
!if $(SECURE_BOOT_ENABLE) == TRUE
1100
1104
SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
@@ -1106,10 +1110,10 @@ index 667584a..a0ae1aa 100644
1106
1110
1107
1111
OvmfPkg/PlatformDxe/Platform.inf
1108
1112
diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
1109
- index 5ae8469..87cee52 100644
1113
+ index be3aa1f..4c36a7d 100644
1110
1114
--- a/OvmfPkg/OvmfPkgX64.dsc
1111
1115
+++ b/OvmfPkg/OvmfPkgX64.dsc
1112
- @@ -771,6 +771,10 @@
1116
+ @@ -756,6 +756,10 @@
1113
1117
1114
1118
!if $(SECURE_BOOT_ENABLE) == TRUE
1115
1119
SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
@@ -1120,3 +1124,6 @@ index 5ae8469..87cee52 100644
1120
1124
!endif
1121
1125
1122
1126
OvmfPkg/PlatformDxe/Platform.inf
1127
+ --
1128
+ 1.8.3.1
1129
+
file modified
+4 -1
edk2.spec CHANGED
@@ -4,7 +4,7 @@
4
4
5
5
Name: edk2
6
6
Version: %{edk2_date}git%{edk2_githash}
7
- Release: 1%{dist}
7
+ Release: 2%{dist}
8
8
Summary: EFI Development Kit II
9
9
10
10
Group: Applications/Emulators
@@ -305,6 +305,9 @@ cp -a arm %{buildroot}/usr/share/%{name}
305
305
306
306
307
307
%changelog
308
+ * Thu Feb 16 2017 Cole Robinson <crobinso@redhat.com> - 20170209git296153c5-2
309
+ - Update EnrollDefaultKeys patch (bz #1398743)
310
+
308
311
* Mon Feb 13 2017 Paolo Bonzini <pbonzini@redhat.com> - 20170209git296153c5-1
309
312
- Rebase to git master
310
313
- New patch 0010 fixes failure to build from source.