From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from EUR01-VE1-obe.outbound.protection.outlook.com (EUR01-VE1-obe.outbound.protection.outlook.com [40.107.14.48]) by mx.groups.io with SMTP id smtpd.web09.14432.1633016470265058032 for ; Thu, 30 Sep 2021 08:41:11 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=fYe3TOZD; spf=pass (domain: arm.com, ip: 40.107.14.48, mailfrom: sami.mujawar@arm.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HEZ91jCvEkNkKeLvMx+os4t+RBcKbnUiCqIpPnrZPS8=; b=fYe3TOZD+nX0NO/NCjTp37VrwiuqBzKwK/4wyvwZX1YmRksVX0mkC8PFOmn4YpCwzF2Pu0UKeQt5lv+uSQDUDUb+gnFxgte1D2z+09Vy2jjxl0NYe11iJoG/k5qku/YgM9kau56/BU3MDU2Wjv+4Qpp3F5642tSf+aRI7NSC0ko= Received: from AS8PR04CA0194.eurprd04.prod.outlook.com (2603:10a6:20b:2f3::19) by VI1PR08MB3534.eurprd08.prod.outlook.com (2603:10a6:803:85::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4544.18; Thu, 30 Sep 2021 15:41:05 +0000 Received: from AM5EUR03FT040.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:2f3:cafe::8a) by AS8PR04CA0194.outlook.office365.com (2603:10a6:20b:2f3::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4566.14 via Frontend Transport; Thu, 30 Sep 2021 15:41:05 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.33.187.114) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.33.187.114 as permitted sender) receiver=protection.outlook.com; client-ip=63.33.187.114; helo=64aa7808-outbound-2.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-2.mta.getcheckrecipient.com (63.33.187.114) by AM5EUR03FT040.mail.protection.outlook.com (10.152.17.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4566.14 via Frontend Transport; Thu, 30 Sep 2021 15:41:04 +0000 Received: ("Tessian outbound ac52c8afb262:v103"); Thu, 30 Sep 2021 15:41:04 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 24745b8f97766697 X-CR-MTA-TID: 64aa7808 Received: from bebd7768af9a.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id A739F08C-B53E-445D-A833-A215734D4172.1; Thu, 30 Sep 2021 15:40:54 +0000 Received: from EUR04-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id bebd7768af9a.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 30 Sep 2021 15:40:54 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HXXflCB60KFmF4ktykHRQCmg5Xl60L/S86Edfd6YW8dJBYRArwYLlgYbojG2v5BEZr6e1wXenDhWoT1mYfjj8w963FXLeS8tjUVj57qNPR7dX8bxRLMssdunA25qcKc3c+PJdGqMyz8wxsPTRDsqNfD6O6guk11ZMUM2tatvPF/eNc8HT+jkJBoH7OkVW8AIQYmGC/C8hmiikOSX/IpjvGGAZl6H0+nNhNa7u1vy6wk2TyCKzvqV1lhR5eYKXKF9pZOK/lxAnGwHyWJLuk56uqBWur++M1wNJ5381qIWh3bC2c/Sb+vm/0FOuCO9BQRYXvd3SsAZPZemP3J0JzSmGw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=HEZ91jCvEkNkKeLvMx+os4t+RBcKbnUiCqIpPnrZPS8=; b=AH2vEkLrwzubXaP3kT5n7wsKP9hSnny/pD+mK9K/kGk5YWmAUXPKCPOsl21VpcGkrgjyq7FW5Nl0bH/WwgN3J/9X9gI0fVcRwGZNkMggQEFyO6hiGMQGOfGnbVQz/eG5pycjkgzMewOi1vePdCc8z1oBNdb1RZbz5rh5Jam/oKDt7RWJgFEp36/J4/YeEoWUIdrZWS5abNNgrZ0Jtv80jYw/sj4N7iWqm69nc6u6+gSRalQCJWjg2jFkQSmjzqe6FX6ghyv1tNEcmIXhnQRewriaDxWTg7TTN0EP5nwyZda0G58YR5LR1GLfvFy6LFm4xHNDJh7eLaIZrBkyyav/1w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HEZ91jCvEkNkKeLvMx+os4t+RBcKbnUiCqIpPnrZPS8=; b=fYe3TOZD+nX0NO/NCjTp37VrwiuqBzKwK/4wyvwZX1YmRksVX0mkC8PFOmn4YpCwzF2Pu0UKeQt5lv+uSQDUDUb+gnFxgte1D2z+09Vy2jjxl0NYe11iJoG/k5qku/YgM9kau56/BU3MDU2Wjv+4Qpp3F5642tSf+aRI7NSC0ko= Received: from DB6PR07CA0093.eurprd07.prod.outlook.com (2603:10a6:6:2b::31) by DB8PR08MB4970.eurprd08.prod.outlook.com (2603:10a6:10:e7::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4544.15; Thu, 30 Sep 2021 15:40:51 +0000 Received: from DB5EUR03FT050.eop-EUR03.prod.protection.outlook.com (2603:10a6:6:2b:cafe::62) by DB6PR07CA0093.outlook.office365.com (2603:10a6:6:2b::31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4587.9 via Frontend Transport; Thu, 30 Sep 2021 15:40:51 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; Received: from nebula.arm.com (40.67.248.234) by DB5EUR03FT050.mail.protection.outlook.com (10.152.21.128) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.4566.14 via Frontend Transport; Thu, 30 Sep 2021 15:40:51 +0000 Received: from AZ-NEU-EX03.Arm.com (10.251.24.31) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.14; Thu, 30 Sep 2021 15:40:50 +0000 Received: from E114225.Arm.com (10.1.196.43) by mail.arm.com (10.251.24.31) with Microsoft SMTP Server id 15.1.2308.14 via Frontend Transport; Thu, 30 Sep 2021 15:40:49 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , , , , , , , , Subject: [PATCH v1 6/9] SecurityPkg: Rename RdRandGenerateEntropy to common name Date: Thu, 30 Sep 2021 16:40:41 +0100 Message-ID: <20210930154044.37336-7-sami.mujawar@arm.com> X-Mailer: git-send-email 2.16.2.windows.1 In-Reply-To: <20210930154044.37336-1-sami.mujawar@arm.com> References: <20210930154044.37336-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 110e0960-ac9d-42a6-249c-08d98428b6b4 X-MS-TrafficTypeDiagnostic: DB8PR08MB4970:|VI1PR08MB3534: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:5797;OLM:5797; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(6029001)(4636009)(36840700001)(46966006)(44832011)(426003)(36756003)(70206006)(54906003)(70586007)(1076003)(316002)(15650500001)(356005)(508600001)(86362001)(81166007)(36860700001)(6666004)(82310400003)(2616005)(8936002)(47076005)(26005)(7416002)(83380400001)(7696005)(966005)(4326008)(186003)(2906002)(8676002)(6916009)(336012)(5660300002)(36900700001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB4970 Return-Path: Sami.Mujawar@arm.com X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT040.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: f47afff7-c148-45c2-b65d-08d98428aee3 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.33.187.114;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-2.mta.getcheckrecipient.com;PTR:ec2-63-33-187-114.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(6029001)(4636009)(46966006)(36840700001)(54906003)(2906002)(316002)(1076003)(83380400001)(47076005)(81166007)(86362001)(82310400003)(36860700001)(15650500001)(8936002)(36756003)(966005)(8676002)(6666004)(70206006)(70586007)(26005)(5660300002)(7696005)(44832011)(2616005)(6916009)(508600001)(426003)(186003)(336012)(4326008);DIR:OUT;SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Sep 2021 15:41:04.7733 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 110e0960-ac9d-42a6-249c-08d98428b6b4 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.33.187.114];Helo=[64aa7808-outbound-2.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM5EUR03FT040.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB3534 Content-Type: text/plain Bugzilla: 3668 (https://bugzilla.tianocore.org/show_bug.cgi?id=3668) Rename RdRandGenerateEntropy() to GenerateEntropy() to provide a common interface to generate entropy on other architectures. Also move the definition to RngDxeInternals.h Signed-off-by: Sami Mujawar --- SecurityPkg/RandomNumberGenerator/RngDxe/Rand/RdRand.c | 13 ++++-- SecurityPkg/RandomNumberGenerator/RngDxe/Rand/RdRand.h | 43 -------------------- SecurityPkg/RandomNumberGenerator/RngDxe/Rand/RngDxe.c | 6 ++- SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf | 1 - SecurityPkg/RandomNumberGenerator/RngDxe/RngDxeInternals.h | 19 +++++++++ 5 files changed, 33 insertions(+), 49 deletions(-) diff --git a/SecurityPkg/RandomNumberGenerator/RngDxe/Rand/RdRand.c b/SecurityPkg/RandomNumberGenerator/RngDxe/Rand/RdRand.c index 83025a47d43d442bfe1c324eda2916e6b5599a7e..0ee99a8661fc20094daef019a2f8015597073be4 100644 --- a/SecurityPkg/RandomNumberGenerator/RngDxe/Rand/RdRand.c +++ b/SecurityPkg/RandomNumberGenerator/RngDxe/Rand/RdRand.c @@ -1,15 +1,22 @@ /** @file - Support routines for RDRAND instruction access. + Support routines for RDRAND instruction access, which will leverage + Intel Secure Key technology to provide high-quality random numbers for use + in applications, or entropy for seeding other random number generators. + Refer to http://software.intel.com/en-us/articles/intel-digital-random-number + -generator-drng-software-implementation-guide/ for more information about Intel + Secure Key technology. Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.
(C) Copyright 2015 Hewlett Packard Enterprise Development LP
SPDX-License-Identifier: BSD-2-Clause-Patent **/ +#include +#include #include +#include #include "AesCore.h" -#include "RdRand.h" #include "RngDxeInternals.h" /** @@ -87,7 +94,7 @@ RdRandGetSeed128 ( **/ EFI_STATUS EFIAPI -RdRandGenerateEntropy ( +GenerateEntropy ( IN UINTN Length, OUT UINT8 *Entropy ) diff --git a/SecurityPkg/RandomNumberGenerator/RngDxe/Rand/RdRand.h b/SecurityPkg/RandomNumberGenerator/RngDxe/Rand/RdRand.h deleted file mode 100644 index 072378e062e7bee81a7e763fe9b4ed4517e4d82c..0000000000000000000000000000000000000000 --- a/SecurityPkg/RandomNumberGenerator/RngDxe/Rand/RdRand.h +++ /dev/null @@ -1,43 +0,0 @@ -/** @file - Header for the RDRAND APIs used by RNG DXE driver. - - Support API definitions for RDRAND instruction access, which will leverage - Intel Secure Key technology to provide high-quality random numbers for use - in applications, or entropy for seeding other random number generators. - Refer to http://software.intel.com/en-us/articles/intel-digital-random-number - -generator-drng-software-implementation-guide/ for more information about Intel - Secure Key technology. - -Copyright (c) 2013, Intel Corporation. All rights reserved.
-(C) Copyright 2015 Hewlett Packard Enterprise Development LP
-SPDX-License-Identifier: BSD-2-Clause-Patent - -**/ - -#ifndef __RD_RAND_H__ -#define __RD_RAND_H__ - -#include -#include -#include -#include -#include - -/** - Generate high-quality entropy source through RDRAND. - - @param[in] Length Size of the buffer, in bytes, to fill with. - @param[out] Entropy Pointer to the buffer to store the entropy data. - - @retval EFI_SUCCESS Entropy generation succeeded. - @retval EFI_NOT_READY Failed to request random data. - -**/ -EFI_STATUS -EFIAPI -RdRandGenerateEntropy ( - IN UINTN Length, - OUT UINT8 *Entropy - ); - -#endif // __RD_RAND_H__ diff --git a/SecurityPkg/RandomNumberGenerator/RngDxe/Rand/RngDxe.c b/SecurityPkg/RandomNumberGenerator/RngDxe/Rand/RngDxe.c index d0e6b7de06352b6a92a823681eab92b7a4ca720f..2009f95b4cadb07fc9073c3c0660cf549965422a 100644 --- a/SecurityPkg/RandomNumberGenerator/RngDxe/Rand/RngDxe.c +++ b/SecurityPkg/RandomNumberGenerator/RngDxe/Rand/RngDxe.c @@ -20,7 +20,9 @@ **/ -#include "RdRand.h" +#include +#include + #include "RngDxeInternals.h" /** @@ -88,7 +90,7 @@ RngGetRNG ( return EFI_INVALID_PARAMETER; } - Status = RdRandGenerateEntropy (RNGValueLength, RNGValue); + Status = GenerateEntropy (RNGValueLength, RNGValue); return Status; } diff --git a/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf b/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf index f3300971993f7c6fcdca441858de4c2fb35912e8..ef5cd73273e68c67bec7411279bb8433c45ab2d4 100644 --- a/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf +++ b/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf @@ -36,7 +36,6 @@ [Sources.common] [Sources.IA32, Sources.X64] Rand/RngDxe.c Rand/RdRand.c - Rand/RdRand.h Rand/AesCore.c Rand/AesCore.h diff --git a/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxeInternals.h b/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxeInternals.h index 2660ed5875e0d52a6b9d806341431859374b1047..34886adcf549efdedc1a7b8f16b81a5148531de2 100644 --- a/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxeInternals.h +++ b/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxeInternals.h @@ -10,6 +10,8 @@ #ifndef RNGDXE_INTERNALS_H_ #define RNGDXE_INTERNALS_H_ +#include + /** Returns information about the random number generation implementation. @@ -114,4 +116,21 @@ RngGetBytes ( OUT UINT8 *RandBuffer ); +/** + Generate high-quality entropy source using a TRNG or through RDRAND. + + @param[in] Length Size of the buffer, in bytes, to fill with. + @param[out] Entropy Pointer to the buffer to store the entropy data. + + @retval EFI_SUCCESS Entropy generation succeeded. + @retval EFI_NOT_READY Failed to request random data. + +**/ +EFI_STATUS +EFIAPI +GenerateEntropy ( + IN UINTN Length, + OUT UINT8 *Entropy + ); + #endif // RNGDXE_INTERNALS_H_ -- 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)'