From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pj1-f51.google.com (mail-pj1-f51.google.com [209.85.216.51]) by mx.groups.io with SMTP id smtpd.web10.32237.1656633242077959782 for ; Thu, 30 Jun 2022 16:54:02 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20210112 header.b=VQ+EwB5S; spf=pass (domain: gmail.com, ip: 209.85.216.51, mailfrom: kuqin12@gmail.com) Received: by mail-pj1-f51.google.com with SMTP id g16-20020a17090a7d1000b001ea9f820449so4740203pjl.5 for ; Thu, 30 Jun 2022 16:54:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=qW33ADpL+rOCr/yraZwpVpWvmzOj8gv1zA4ihAmXaVs=; b=VQ+EwB5S6uR2fnfEMZvwIoDyqCChmqjBk5vURYY408CXC2pcJ97w8fpd8VXav4lXjJ 22dFkkpEyC6WExm6uTYiFvhS4gms1RJbSExmZnhFWoxURo5bY1J5w/4NxmkphU54ZeeE Wn3TLBKQAvLlWoG+XVuMvWanuyJWQgr9Rk1pEhiTh19TDDh7cr+SQDMC2j5vBiORoIx+ SBze7FPJqXbXIL6g9stCrdL686aPXqrH7LWnTlQ/YXbv7gHuJchLOSQRKEw9XHK8pMjl G00hmBlJzpIlg/ZnPPgbw1OKpYxPwPQRz+8NBVRR3a3NPmBySIxPqqbc0p/aGOc8nix7 iF1w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=qW33ADpL+rOCr/yraZwpVpWvmzOj8gv1zA4ihAmXaVs=; b=w5LPeDvMfO5yF0HmMQpVzQ5BcMncnBrzhKAsRjRdyEQUitvX/+OWrsMkckNpSy2vAh WAvjurDlZ7kFywIqRpAc84ko9e/HKyK5XW8nqwY/fo/6WLUmvGg0w2+nwCNTYW/171aP ZSxqfmdmtuB+0/tPCsHtj4a8suOwYR0k4Wdpzg6zdg2YV35w4Vd/CdZOvNFS5TUCG1d3 mBmLBF6/bp6dIONpZ+scEkdmNWi8GM/7EWI9DMIdT2s4SnTgKNPY/Zt4nXT5aLH+XX8m 2/fjxTOsq6kSf7pTZQJOziMxRC62nkF4Fhq7X4AXKSg0ov0LWr6Nl5hScpqXcv0NZMTQ Hf8Q== X-Gm-Message-State: AJIora9sNbtnRBYAaEwD4MmKswwv9r/Cnwkuw0CortFXjiOIO3gBPWDh xvPw3wdsPw29NTQCXPbyJMsoCgZo3yU= X-Google-Smtp-Source: AGRyM1uHjji58aRRZnbgdT/NbhdR2/FiQjUrphwnqJAq6onVDqm4e1H47vb1Dn2e1X3Lx3pA1bxAIw== X-Received: by 2002:a17:902:eac2:b0:169:847f:9443 with SMTP id p2-20020a170902eac200b00169847f9443mr17603023pld.156.1656633241487; Thu, 30 Jun 2022 16:54:01 -0700 (PDT) Return-Path: Received: from MININT-0U7P5GU.redmond.corp.microsoft.com ([2001:4898:80e8:7:19ac:d515:5a95:7969]) by smtp.gmail.com with ESMTPSA id x199-20020a627cd0000000b00525243d0dc6sm14679202pfc.15.2022.06.30.16.54.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Jun 2022 16:54:01 -0700 (PDT) From: "Kun Qin" To: devel@edk2.groups.io Cc: Jiewen Yao , Jian J Wang , Min Xu , Jiewen Yao , Michael Kubacki Subject: [PATCH v3 07/11] SecurityPkg: Secure Boot Drivers: Added common header files Date: Thu, 30 Jun 2022 16:53:37 -0700 Message-Id: <20220630235341.1746-8-kuqin12@gmail.com> X-Mailer: git-send-email 2.36.0.windows.1 In-Reply-To: <20220630235341.1746-1-kuqin12@gmail.com> References: <20220630235341.1746-1-kuqin12@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable From: Kun Qin REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3910 This change added common header files to consumer drivers to unblock pipeline builds. Cc: Jiewen Yao Cc: Jian J Wang Cc: Min Xu Signed-off-by: Kun Qin Reviewed-by: Jiewen Yao Acked-by: Michael Kubacki --- Notes: v3: - Added reviewed-by tag [Jiewen] - Added acked-by tag [Michael Kubacki] SecurityPkg/EnrollFromDefaultKeysApp/EnrollFromDefaultKeysApp.c = | 1 + SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigImpl= .c | 1 + SecurityPkg/VariableAuthenticated/SecureBootDefaultKeysDxe/SecureBootDefau= ltKeysDxe.c | 1 + 3 files changed, 3 insertions(+) diff --git a/SecurityPkg/EnrollFromDefaultKeysApp/EnrollFromDefaultKeysApp.= c b/SecurityPkg/EnrollFromDefaultKeysApp/EnrollFromDefaultKeysApp.c index cb7095b269b1..aa4d0c7a993d 100644 --- a/SecurityPkg/EnrollFromDefaultKeysApp/EnrollFromDefaultKeysApp.c +++ b/SecurityPkg/EnrollFromDefaultKeysApp/EnrollFromDefaultKeysApp.c @@ -19,6 +19,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent #include // AsciiPrint()=0D #include // gRT=0D #include =0D +#include =0D #include =0D #include =0D =0D diff --git a/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBo= otConfigImpl.c b/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/Secu= reBootConfigImpl.c index 0122e8d55fa0..a13c349a0f89 100644 --- a/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfi= gImpl.c +++ b/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfi= gImpl.c @@ -8,6 +8,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent **/=0D =0D #include "SecureBootConfigImpl.h"=0D +#include =0D #include =0D #include =0D #include =0D diff --git a/SecurityPkg/VariableAuthenticated/SecureBootDefaultKeysDxe/Sec= ureBootDefaultKeysDxe.c b/SecurityPkg/VariableAuthenticated/SecureBootDefau= ltKeysDxe/SecureBootDefaultKeysDxe.c index ef7b01f16119..0abde52a05ae 100644 --- a/SecurityPkg/VariableAuthenticated/SecureBootDefaultKeysDxe/SecureBoot= DefaultKeysDxe.c +++ b/SecurityPkg/VariableAuthenticated/SecureBootDefaultKeysDxe/SecureBoot= DefaultKeysDxe.c @@ -15,6 +15,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent #include =0D #include =0D #include =0D +#include =0D #include =0D #include =0D =0D --=20 2.36.0.windows.1