From patchwork Tue Nov 22 13:28:54 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Heinrich Schuchardt X-Patchwork-Id: 1707854 X-Patchwork-Delegate: trini@ti.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=gmx.de header.i=@gmx.de header.a=rsa-sha256 header.s=s31663417 header.b=I6TiE3YV; dkim-atps=neutral Received: from phobos.denx.de (phobos.denx.de [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4NGlTb490kz23nW for ; Wed, 23 Nov 2022 00:29:07 +1100 (AEDT) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id DC1A5852A8; Tue, 22 Nov 2022 14:29:01 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; secure) header.d=gmx.de header.i=@gmx.de header.b="I6TiE3YV"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id CD2E885330; Tue, 22 Nov 2022 14:28:59 +0100 (CET) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,RCVD_IN_MSPIKE_H2, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.2 Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 1A8B8851DC for ; Tue, 22 Nov 2022 14:28:57 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=xypron.glpk@gmx.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.de; s=s31663417; t=1669123735; bh=eYA/38ws4WKc/EzAm3hoBFqPLwNB03KWNdjZ+EzkfDQ=; h=X-UI-Sender-Class:Date:To:Cc:From:Subject; b=I6TiE3YVm9rgp5HDJEqImX+L6c9PtExGnNBcBTKfB+RuWrNcZTnFzIv8u97ZGsBwY Iz5B8dCjj1tymQWWyOa1ECRXG9kDH+O7Xmw8rCqTNL9jmwnNk2wgHYkh8ctyZ6A679 WIlVRnTS1OgLv2xK6guRGZK+dk8xaNrOBfjVM8n5M3iYRDqdSq88TL8sd066QYuLQb /vP+ICvx6kf25exCge68k+LKy9HbONGf5D0+etQtlGXHEZpUm8YjKaPPIzjN9gUvHn 4UhHhpxLtBwIjtR8yd7Ni3Oqf7DeC86YFWLUNgdp4DDQpPF2wte+071m/QKYyU7gdd XCQ6VHuqtC7HA== X-UI-Sender-Class: 724b4f7f-cbec-4199-ad4e-598c01a50d3a Received: from [192.168.123.67] ([84.118.157.2]) by mail.gmx.net (mrgmx004 [212.227.17.190]) with ESMTPSA (Nemesis) id 1MatVh-1pV9Bs0Sfj-00cUbE; Tue, 22 Nov 2022 14:28:55 +0100 Message-ID: Date: Tue, 22 Nov 2022 14:28:54 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.5.0 Content-Language: en-US To: Tom Rini Cc: U-Boot Mailing List , Ilias Apalodimas , Masahisa Kojima , Mikhail Ilin From: Heinrich Schuchardt Subject: Pull request for efi-2023-01-rc2-2 X-Provags-ID: V03:K1:s9Ry8fahKQoKDGAsGw+XZu2G1uFAiRpF5BOQdx8U2tINQDJrp+b oBI02OkBlUcmFWiltsJUML9KrdXW8AgsMBUG4/mFpf04GTqR4rqQy2hyds3EBvBPCB/5Plx PTYaGgJPnMO/eC4GnGu0KC2YzoKmZMv2siR1mO8oKXpI2EsNjsgju5K2C4hh2iU5blUzu2J 4FWYwTV5gsF/JmzJeKYAg== UI-OutboundReport: notjunk:1;M01:P0:5sT+X9CpNeo=;OtKPMb5nc2O//yx7ucniNgSgtzo 8sPw71Ah+iurwxuZRP871uiLA7wId+yhUApMzSI481ty2fPQqhCqlxRkxrDXXeV8IFRYhEQxx wRHmUXbcYemJ48vaTVeLeSDGeHYTMP1Uv+ugGXDLmXLw0sZbST1QkZK7saR4W269OO/4vxMFw xGCniATiqMDi1yvEESRsGd4Q+hpI2KPFX4Lhawy7VEuKuVBj4oY6K1YJmmxMXZGdpQO5E6G02 vYYPUJfeLmDPhVeRdtZTQQCUfXeTbwm095k5aQp93zJ5HYGweqS47PJnDUQ/QneGRIJAi6Zn6 AlR40c3++tJg+Wf/dNMbrg6XDmwGpOkkN5lMI87EyokSQJm/EiBQpMJt3hyovWLYm80EiL9zl h5AmluDPNHtXRfPqintlpT7HvkTyoGKt4N5De4XHRYEMTG7k2RBMZNz72P9QvFT4ZpmUkL47x W/CuUMh4c4YAn8BrJk4ZLtXClBhRV152cgpRLPtB6oowN4YcyQaE3Q+9ky/ltVHVfFpm5UfGd gQ5s4/YAiY62LN+w8+tI4/d8GJYXO6VAKmVOGu5jcTQhgAI3ZC8mEEjBHNTJ2Cp8ZmUXhVJ5r woC4sO14Jjx2/DU1y3YMr7BuTYFdnEKA/a3eYz/UihsSKA8XmB8LcZUZzJZ63HNK8DbQyQhFg jBoxglbh6jQpUhafpEBG524RU1GPYVeuBsFJAqf16kiCRyauewE/mc6WyUQ42t+YwJRj6wbfK Y231YSK8tnKbaR+XlZvaT1cXanGLqeGWOzsSIEYT22Q7DMUzphf9oWT9/7V9H8nDnOY3+iIK2 vsXWfeXGCmRXklNmyT5UAGvmmSJezeZtDZbQfQYjor0GHtkXouPEn7EXd2PPpjWXgPrid+/Jw oNfgQB65PuqmlyP7d3+m/rzEjmhfWuS9kJqThfDj5bwb/tzly30e/KYHU2rKvBYbiOVY9I75/ Nrxw7Q== X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.6 at phobos.denx.de X-Virus-Status: Clean Dear Tom, The following changes since commit 16e49a14b2af1421cbaeefb9ce8ee863e45fd71b: Prepare v2023.01-rc2 (2022-11-21 12:33:14 -0500) are available in the Git repository at: https://source.denx.de/u-boot/custodians/u-boot-efi.git tags/efi-2023-01-rc2-2 for you to fetch changes up to d0f9ae35fb25d732184b8b307a72c7e20b960353: eficonfig: add "Show Signature Database" menu entry (2022-11-22 12:00:45 +0100) Gitlab CI showed no issues: https://source.denx.de/u-boot/custodians/u-boot-efi/-/pipelines/14186 ---------------------------------------------------------------- Pull request for efi-2023-01-rc2-2 UEFI: * add UEFI Secure Boot Key enrollment interface to eficonfig command * fix buffer underflow in FatToStr() implementation ---------------------------------------------------------------- Heinrich Schuchardt (3): efi_selftest: unsigned char parameter for efi_st_strcmp_16_8() efi_selftest: Improve the FatToStr() unit test doc: in cmp man-page replace 'tuples' by 'values' Masahisa Kojima (7): eficonfig: refactor file selection handling eficonfig: expose append entry function eficonfig: refactor change boot order implementation eficonfig: expose eficonfig_create_device_path() eficonfig: use protocol interface for file selection eficonfig: add UEFI Secure Boot Key enrollment interface eficonfig: add "Show Signature Database" menu entry Mikhail Ilin (1): efi_loader: Fix buffer underflow cmd/Makefile | 5 + cmd/eficonfig.c | 234 +++++----- cmd/eficonfig_sbkey.c | 498 ++++++++++++++++++++++ doc/usage/cmd/cmp.rst | 12 +- include/efi_config.h | 13 +- include/efi_selftest.h | 2 +- lib/efi_loader/efi_unicode_collation.c | 2 +- lib/efi_selftest/efi_selftest_unicode_collation.c | 12 + lib/efi_selftest/efi_selftest_util.c | 2 +- test/py/tests/test_eficonfig/test_eficonfig.py | 1 + 10 files changed, 653 insertions(+), 128 deletions(-) create mode 100644 cmd/eficonfig_sbkey.c