summaryrefslogtreecommitdiffstats
path: root/SecurityPkg/SecurityPkg.dsc
diff options
context:
space:
mode:
authorPierre Gondois <pierre.gondois@arm.com>2022-10-28 17:32:54 +0200
committermergify[bot] <37929162+mergify[bot]@users.noreply.github.com>2022-11-06 16:32:28 +0000
commit4b3e9d80bedf5909a4ec901425ed9c0a738fc76f (patch)
treed1de5753058b765d8a2b776c64882bbdfdc63dde /SecurityPkg/SecurityPkg.dsc
parent199031b2b0233652ad5d5fdf73f0f44c0f264d55 (diff)
downloadedk2-4b3e9d80bedf5909a4ec901425ed9c0a738fc76f.tar.gz
edk2-4b3e9d80bedf5909a4ec901425ed9c0a738fc76f.tar.bz2
edk2-4b3e9d80bedf5909a4ec901425ed9c0a738fc76f.zip
SecurityPkg/RngDxe: Check before advertising Cpu Rng algo
RngGetBytes() relies on the RngLib. The RngLib might use the RNDR instruction if the FEAT_RNG feature is present. RngGetInfo and RngGetRNG both must check that RngGetBytes() is working before advertising/using it. To do so, allocate an array storing the available algorithms. The Rng algorithm at the lowest index will be the default Rng algorithm. The array is shared between RngGetInfo and RngGetRNG. This array is allocated when the driver is loaded, and freed when unloaded. This patch also prevents from having PcdCpuRngSupportedAlgorithm let to a zero GUID, but let the possibility to have no valid Rng algorithm in such case. Signed-off-by: Pierre Gondois <Pierre.Gondois@arm.com> Acked-by: Jiewen Yao <jiewen.yao@intel.com>
Diffstat (limited to 'SecurityPkg/SecurityPkg.dsc')
0 files changed, 0 insertions, 0 deletions