summaryrefslogtreecommitdiffstats
path: root/SecurityPkg/VariableAuthenticated
Commit message (Expand)AuthorAgeFilesLines
* SecurityPkg Variable: Add the check for PcdFlashNvStorageVariableSize <= PcdF...Star Zeng2013-07-112-1/+13
* SecurityPkg: Variable drivers robustly handle crashes during Reclaim().Star Zeng2013-07-037-199/+515
* The list of locked variables is traversed at runtime, hence we mustLaszlo Ersek2013-06-171-0/+23
* Revert the changes made in 14403 because it incorrectly changed the EOL.Ruiyu Ni2013-06-171-504/+481
* The list of locked variables is traversed at runtime, hence we mustLaszlo Ersek2013-06-141-481/+504
* Fix the TOCTOU issue of CommBufferSize itself for SMM communicate handler input.lzeng142013-05-211-4/+7
* Add the EDKII_VARIABLE_LOCK_PROTOCOL implementation in SecurityPkg variable d...niruiyu2013-05-208-22/+356
* Fix a bug that “SecureBoot” varaible will be updated to NV+AT attribute i...sfu52013-05-171-3/+1
* Pop up error message when user tries to enroll an invalid certificate file in...sfu52013-05-171-6/+33
* 1. Fix TOCTOU issue in VariableSmm, FtwSmm, FpdtSmm, SmmCorePerformance SMM h...lzeng142013-05-072-58/+86
* Fix memory overflow & VariableSize check issue for SetVariable append write.czhang462013-05-023-30/+73
* 1. Use the check IsAddressValid() to prevent SMM communication buffer overflo...lzeng142013-04-252-18/+110
* Check for NULL pointer before free it.sfu52013-04-251-3/+5
* Fix potential overflow for SetVariable interfaceczhang462013-04-223-10/+28
* Fix a potential SMM memory dump issue. If pass communication buffer with Data...czhang462013-04-191-0/+13
* Fix SMM Variable driver stack GetVariable return INVALID_PARAMETER when DataS...czhang462013-04-151-10/+28
* Update SMM variable DXE driver GetNextVariable interface to comply with UEFI ...czhang462013-04-121-9/+29
* Update secure boot UI driver to handle “reset to default” hot key.sfu52013-04-123-1/+46
* If DataSize or VariableNameSize is near MAX_ADDRESS, this can cause the compu...lzeng142013-04-082-0/+35
* Add error handling code to prevent variable store corruption in release build.sfu52013-02-213-28/+43
* Check the input VaraibleName for db/dbx when appending variables with formatt...sfu52013-01-251-4/+4
* Check for NULL pointer before dereference it.sfu52013-01-251-0/+1
* Variables with state VAR_ADDED&VAR_IN_DELETED_TRANSITION should be considered...lzeng142013-01-251-10/+49
* Add NULL pointer check.lzeng142013-01-251-0/+2
* Fix infinite loop bug in secure boot UI driver.sfu52013-01-251-0/+2
* 1. Update the logic of UpdateVariable() for updating variable from:lzeng142013-01-182-18/+116
* Fix the issue that RuntimeServiceQueryVariableInfo() in VariableSmmRuntimeDxe...lzeng142013-01-151-2/+2
* 1. Set the secure boot state to Standard Mode when user leaving secure boot s...sfu52013-01-095-50/+167
* Fix a bug that the invalid public key will never be removed from public key d...sfu52013-01-093-97/+391
* Add the TPL raise/restore code for VariableSmmRuntimeDxe to avoid variable se...lzeng142013-01-081-15/+77
* 1. Don't assume that flush the HOB variable to flash must be successful.lzeng142013-01-042-36/+130
* Use SMM_VARIABLE_COMMUNICATE_HEADER_SIZE instead of OFFSET_OF (SMM_VARIABLE_C...lzeng142012-12-121-5/+5
* Move the declaration of gEfiCertDbGuid to the package's Include folder.sfu52012-11-281-2/+0
* 1. Correct the counter-based hash algorithm according to UEFI spec.sfu52012-11-213-5/+29
* Fix time-based and count-based authenticated variable can be updated by each ...gdong12012-10-151-0/+16
* Add a dialog box with help message when user changes the state of "Attempt Se...sfu52012-09-141-0/+7
* 1. Fix a bug when comparing two timestamp in auth-variable driver.sfu52012-09-141-1/+1
* SecurityPkg/VariableSmm: Fix a VariableSmm bug when reading variable with siz...erictian2012-09-121-1/+1
* 1. Initialize certdb variable with correct value of list size.sfu52012-08-232-13/+20
* LastVariableOffset is wrongly set to 0 when FtwVariableSpace() fails. Recalcu...lzeng142012-08-061-14/+27
* Use RsaGetPublicKeyFromX509() to validate the given X.509 certificate for PK/...sfu52012-07-251-2/+31
* Update the secure boot configuration UI to accept *.crt certificate file.sfu52012-07-231-10/+52
* 1. Remove extra attribute for SetupMode, SignatureSupport and SecureBoot vari...sfu52012-07-172-73/+78
* Return EFI_UNSUPPORTED if READY_TO_BOOT function is invoked at SMM runtime.sfu52012-07-172-2/+6
* Verify the provided PKpub is signed with its private key when enrolling a new...sfu52012-07-132-43/+65
* Update the secure boot configuration UI to accept *.der certificate file as t...sfu52012-07-121-4/+4
* Reset the platform when user choose to enroll/delete the PK variable. sfu52012-07-092-2/+2
* Add SMRAM range check to variable SMM SMI handler.czhang462012-07-092-7/+123
* Include read data buffer in CommBufferSize when calculate the buffer size.ydong102012-07-091-2/+2
* 1. Reset system when user changes secure boot state in secure boot configurat...sfu52012-07-053-10/+18