From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=192.55.52.115; helo=mga14.intel.com; envelope-from=hao.a.wu@intel.com; receiver=edk2-devel@lists.01.org Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 475A1211CCD43 for ; Wed, 20 Feb 2019 16:30:57 -0800 (PST) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga103.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 20 Feb 2019 16:30:56 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.58,392,1544515200"; d="scan'208";a="140298578" Received: from shwdeopenpsi014.ccr.corp.intel.com ([10.239.9.8]) by orsmga001.jf.intel.com with ESMTP; 20 Feb 2019 16:30:54 -0800 From: Hao Wu To: edk2-devel@lists.01.org Cc: Hao Wu , Eric Dong , Ray Ni , Chao Zhang , Jiewen Yao Date: Thu, 21 Feb 2019 08:30:54 +0800 Message-Id: <20190221003055.10320-1-hao.a.wu@intel.com> X-Mailer: git-send-email 2.12.0.windows.1 Subject: [PATCH v2 0/1] Add Security feature set support for ATA devices X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 21 Feb 2019 00:30:57 -0000 This patch actually depends on a series that is currently under review: https://www.mail-archive.com/edk2-devel@lists.01.org/msg51681.html One can get this patch together with the above-mentioned series at: https://github.com/hwu25/edk2/tree/hddpassword_v2 V2 changes: As suggested by Ray, simplifies the logic within PPI notification callback to directly use the PPI instance provided by the input parameter of callback function. V1 history: Uni-tests performed for the patch: * Password can be set/update/disabled to an ATA device via the HII page; * A popup windows will show up if a device is set with password. And after inputting the correct password, the data can be accessed. Otherwise, data cannot be accessed; * A device with password set can be auto-unlocked during the S3 resume. Cc: Eric Dong Cc: Ray Ni Cc: Chao Zhang Cc: Jiewen Yao Hao Wu (1): SecurityPkg/HddPassword: Add Security feature set support for ATA dev SecurityPkg/SecurityPkg.dsc | 6 + SecurityPkg/HddPassword/HddPasswordDxe.inf | 75 + SecurityPkg/HddPassword/HddPasswordPei.inf | 54 + SecurityPkg/HddPassword/HddPasswordCommon.h | 61 + SecurityPkg/HddPassword/HddPasswordDxe.h | 148 + SecurityPkg/HddPassword/HddPasswordHiiDataStruc.h | 63 + SecurityPkg/HddPassword/HddPasswordPei.h | 42 + SecurityPkg/HddPassword/HddPassword.vfr | 188 ++ SecurityPkg/HddPassword/HddPasswordDxe.c | 2814 ++++++++++++++++++++ SecurityPkg/HddPassword/HddPasswordPei.c | 374 +++ SecurityPkg/HddPassword/HddPasswordStrings.uni | 48 + 11 files changed, 3873 insertions(+) create mode 100644 SecurityPkg/HddPassword/HddPasswordDxe.inf create mode 100644 SecurityPkg/HddPassword/HddPasswordPei.inf create mode 100644 SecurityPkg/HddPassword/HddPasswordCommon.h create mode 100644 SecurityPkg/HddPassword/HddPasswordDxe.h create mode 100644 SecurityPkg/HddPassword/HddPasswordHiiDataStruc.h create mode 100644 SecurityPkg/HddPassword/HddPasswordPei.h create mode 100644 SecurityPkg/HddPassword/HddPassword.vfr create mode 100644 SecurityPkg/HddPassword/HddPasswordDxe.c create mode 100644 SecurityPkg/HddPassword/HddPasswordPei.c create mode 100644 SecurityPkg/HddPassword/HddPasswordStrings.uni -- 2.12.0.windows.1