public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Liming Gao" <liming.gao@intel.com>
To: "Wang, Jian J" <jian.j.wang@intel.com>,
	"devel@edk2.groups.io" <devel@edk2.groups.io>
Cc: "Kinney, Michael D" <michael.d.kinney@intel.com>,
	"Ye, Ting" <ting.ye@intel.com>
Subject: Re: [PATCH] CryptoPkg/BaseCryptLib: remove unused code for IPF
Date: Fri, 17 May 2019 01:12:04 +0000	[thread overview]
Message-ID: <4A89E2EF3DFEDB4C8BFDE51014F606A14E44C21E@SHSMSX104.ccr.corp.intel.com> (raw)
In-Reply-To: <20190514143000.486176-1-jian.j.wang@intel.com>

I see no module consumes this source file. 

The change is good. Reviewed-by: Liming Gao <liming.gao@intel.com>

>-----Original Message-----
>From: Wang, Jian J
>Sent: Tuesday, May 14, 2019 10:30 PM
>To: devel@edk2.groups.io
>Cc: Gao, Liming <liming.gao@intel.com>; Kinney, Michael D
><michael.d.kinney@intel.com>; Ye, Ting <ting.ye@intel.com>
>Subject: [PATCH] CryptoPkg/BaseCryptLib: remove unused code for IPF
>
>BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=1805
>
>CryptRandItc.c is only for IPF arch, which has not been supported any
>more in edk2. And no module actually reference this file. This patch
>just removes it from tree.
>
>Cc: Liming Gao <liming.gao@intel.com>
>Cc: Michael D Kinney <michael.d.kinney@intel.com>
>Cc: Ting Ye <ting.ye@intel.com>
>Signed-off-by: Jian J Wang <jian.j.wang@intel.com>
>---
> .../Library/BaseCryptLib/Rand/CryptRandItc.c  | 112 ------------------
> 1 file changed, 112 deletions(-)
> delete mode 100644 CryptoPkg/Library/BaseCryptLib/Rand/CryptRandItc.c
>
>diff --git a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandItc.c
>b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandItc.c
>deleted file mode 100644
>index 8699cfeb71..0000000000
>--- a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandItc.c
>+++ /dev/null
>@@ -1,112 +0,0 @@
>-/** @file
>-  Pseudorandom Number Generator Wrapper Implementation over OpenSSL.
>-
>-Copyright (c) 2012 - 2018, Intel Corporation. All rights reserved.<BR>
>-SPDX-License-Identifier: BSD-2-Clause-Patent
>-
>-**/
>-
>-#include "InternalCryptLib.h"
>-#include <openssl/rand.h>
>-#include <openssl/evp.h>
>-#include <Library/PrintLib.h>
>-
>-/**
>-  Sets up the seed value for the pseudorandom number generator.
>-
>-  This function sets up the seed value for the pseudorandom number
>generator.
>-  If Seed is not NULL, then the seed passed in is used.
>-  If Seed is NULL, then default seed is used.
>-
>-  @param[in]  Seed      Pointer to seed value.
>-                        If NULL, default seed is used.
>-  @param[in]  SeedSize  Size of seed value.
>-                        If Seed is NULL, this parameter is ignored.
>-
>-  @retval TRUE   Pseudorandom number generator has enough entropy for
>random generation.
>-  @retval FALSE  Pseudorandom number generator does not have enough
>entropy for random generation.
>-
>-**/
>-BOOLEAN
>-EFIAPI
>-RandomSeed (
>-  IN  CONST  UINT8  *Seed  OPTIONAL,
>-  IN  UINTN         SeedSize
>-  )
>-{
>-  CHAR8  DefaultSeed[128];
>-
>-  if (SeedSize > INT_MAX) {
>-    return FALSE;
>-  }
>-
>-  //
>-  // The software PRNG implementation built in OpenSSL depends on
>message digest algorithm.
>-  // Make sure SHA-1 digest algorithm is available here.
>-  //
>-  if (EVP_add_digest (EVP_sha1 ()) == 0) {
>-    return FALSE;
>-  }
>-
>-  //
>-  // Seed the pseudorandom number generator with user-supplied value.
>-  // NOTE: A cryptographic PRNG must be seeded with unpredictable data.
>-  //
>-  if (Seed != NULL) {
>-    RAND_seed (Seed, (UINT32) SeedSize);
>-  } else {
>-    //
>-    // Retrieve current time.
>-    //
>-    AsciiSPrint (
>-      DefaultSeed,
>-      sizeof (DefaultSeed),
>-      "UEFI Crypto Library default seed (%ld)",
>-      AsmReadItc ()
>-      );
>-
>-    RAND_seed (DefaultSeed, sizeof (DefaultSeed));
>-  }
>-
>-  if (RAND_status () == 1) {
>-    return TRUE;
>-  }
>-
>-  return FALSE;
>-}
>-
>-/**
>-  Generates a pseudorandom byte stream of the specified size.
>-
>-  If Output is NULL, then return FALSE.
>-
>-  @param[out]  Output  Pointer to buffer to receive random value.
>-  @param[in]   Size    Size of random bytes to generate.
>-
>-  @retval TRUE   Pseudorandom byte stream generated successfully.
>-  @retval FALSE  Pseudorandom number generator fails to generate due to
>lack of entropy.
>-
>-**/
>-BOOLEAN
>-EFIAPI
>-RandomBytes (
>-  OUT  UINT8  *Output,
>-  IN   UINTN  Size
>-  )
>-{
>-  //
>-  // Check input parameters.
>-  //
>-  if (Output == NULL || Size > INT_MAX) {
>-    return FALSE;
>-  }
>-
>-  //
>-  // Generate random data.
>-  //
>-  if (RAND_bytes (Output, (UINT32) Size) != 1) {
>-    return FALSE;
>-  }
>-
>-  return TRUE;
>-}
>--
>2.17.1.windows.2


  reply	other threads:[~2019-05-17  1:12 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-05-14 14:30 [PATCH] CryptoPkg/BaseCryptLib: remove unused code for IPF Wang, Jian J
2019-05-17  1:12 ` Liming Gao [this message]
2019-05-17  5:16   ` Wang, Jian J

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4A89E2EF3DFEDB4C8BFDE51014F606A14E44C21E@SHSMSX104.ccr.corp.intel.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox