From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by mx.groups.io with SMTP id smtpd.web11.1880.1672797809870784937 for ; Tue, 03 Jan 2023 18:03:30 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=hHLsZZqZ; spf=pass (domain: intel.com, ip: 134.134.136.100, mailfrom: yi1.li@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1672797809; x=1704333809; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=CokaDxLC/bC4gq8/Fpi80D6HUQUmZ5VPeF1a/DlUMS0=; b=hHLsZZqZ/uQYQrsy3cKmzG1OkDKL2jTv63CHTQmoM8mDukqfVG2Xqota rsRuHysm5N2J12IUmLMwYDvUR1SpdAe9YzeXgZyT2iMI4GPU8VsCAiRHD IF0JvW2DFkgSAvRBQ+GZ8pghf+Qmj4Q/NApIk1utvPfCBnqEDwVhJab9q FZdifP99yXx7yYZ97sWEGXLIPyOHXcecJrIY9W1dxqkjHOjLEGrnZ3N2b z+P6SEOJhrXo2dNdf7s0ZttnKLphWMWRAD/Esx2gHob3V4ik/hADqdVVH rRC0diJwdKhM6pw21Tn9+UqRa0h5sxy/tDmPXpC4aQOdlFk9qmIpoUA7r Q==; X-IronPort-AV: E=McAfee;i="6500,9779,10579"; a="386244267" X-IronPort-AV: E=Sophos;i="5.96,297,1665471600"; d="scan'208";a="386244267" Received: from orsmga006.jf.intel.com ([10.7.209.51]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 03 Jan 2023 18:03:29 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10579"; a="632642739" X-IronPort-AV: E=Sophos;i="5.96,297,1665471600"; d="scan'208";a="632642739" Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16]) by orsmga006.jf.intel.com with ESMTP; 03 Jan 2023 18:03:29 -0800 Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16; Tue, 3 Jan 2023 18:03:28 -0800 Received: from orsedg603.ED.cps.intel.com (10.7.248.4) by orsmsx610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16 via Frontend Transport; Tue, 3 Jan 2023 18:03:28 -0800 Received: from NAM12-MW2-obe.outbound.protection.outlook.com (104.47.66.46) by edgegateway.intel.com (134.134.137.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.16; Tue, 3 Jan 2023 18:03:28 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QZIdyJcSu/bf+gEj9b7wbV+RM5vi5Q8z2XC/9ClN7R6buNodparmD1LzfCeS7swl7s7IY9I7TrWlfKGgIOqfRymfCsqrG/aGtGqbzU9z4hGXeLxltKVLl31cxQGNmNk2h4rBIyEmTK9qUNam4xgAFq8nstQkiaJ2AyLt5hRPCasuMc5Eg2+LsUrO9U84nXjoPaKbPmU5tYcxSyhOmaYoVHBDzDlAtmeCipWlPPBsbIdmLAVtAIwdUewWJZQ31Sz3yg0yoakvqvkn1Nq4z2a+HVVQVbHqh9gC5tGIXxJ6WPjPnhY0EJ3NljIxcqxPIN6q4TBZ/wUBAfwey9lu1cbyhQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=y8mqXvBLHDCcfsVb4XJVhJSCiCg8XGJ3B760wGKFqZg=; b=O3Y+/E+fgy7o9UA9h+k2op4KYel+POBh5UoAlnf6qBBqA0t5M4ZgcFO3nQQZtD1cF1aogeqPuHnvWcihUq+l9X5PuOc5j4d1Z+p2eV6FHc95D7gXEaHE6ugwPRINLQ294SDipCtXiqBOdFbLyRj8qsKximzGxyP4xqcGzq/1Az/tuAd9SxIfgC+yr90CtriNR84Y1h9RpKqkEktrhm8TbXbys6iy0+OMc6d/jCwZrvZ+ZF2pairLS8n7AXgavPo9nn3fTR5Z8DPeUQV7juMRiVmLsiIgOew1FKbKFUlF4ptzh+7HDS6fEQJOER4rARNBEO7JW/ktKmN2uW/Hu1insw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from SJ1PR11MB6227.namprd11.prod.outlook.com (2603:10b6:a03:45a::10) by MW4PR11MB6617.namprd11.prod.outlook.com (2603:10b6:303:1ed::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5944.19; Wed, 4 Jan 2023 02:03:25 +0000 Received: from SJ1PR11MB6227.namprd11.prod.outlook.com ([fe80::221e:24cf:a864:9986]) by SJ1PR11MB6227.namprd11.prod.outlook.com ([fe80::221e:24cf:a864:9986%5]) with mapi id 15.20.5944.019; Wed, 4 Jan 2023 02:03:25 +0000 From: "Li, Yi" To: "devel@edk2.groups.io" , "Li, Yi1" CC: "Yao, Jiewen" , "Wang, Jian J" , "Lu, Xiaoyu1" , "Jiang, Guomin" Subject: Re: [edk2-devel] [PATCH 1/1] CryptoPkg: Make Protocol Service API backward compatible Thread-Topic: [edk2-devel] [PATCH 1/1] CryptoPkg: Make Protocol Service API backward compatible Thread-Index: AQHZE3KiKk/wZcz5yE+quVxefKcceq6NmfeA Date: Wed, 4 Jan 2023 02:03:25 +0000 Message-ID: References: <17321DB57D822CE7.23615@groups.io> In-Reply-To: <17321DB57D822CE7.23615@groups.io> Accept-Language: zh-CN, en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: SJ1PR11MB6227:EE_|MW4PR11MB6617:EE_ x-ms-office365-filtering-correlation-id: 2014298a-b100-498f-b0ee-08daedf7dd9d x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SJ1PR11MB6227.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230022)(376002)(136003)(346002)(366004)(39860400002)(396003)(451199015)(38070700005)(53546011)(66899015)(41300700001)(66946007)(66446008)(66556008)(76116006)(66476007)(6506007)(7696005)(64756008)(4326008)(8676002)(86362001)(107886003)(83380400001)(19627235002)(54906003)(186003)(2906002)(316002)(26005)(9686003)(478600001)(966005)(82960400001)(110136005)(52536014)(30864003)(38100700002)(33656002)(122000001)(8936002)(55016003)(5660300002)(71200400001)(559001)(579004);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?ZXS2wJOJekiWpfZxtrWskmM/iN6cUdlktRggQzpeP4GLs9UjtsW4Jkt65rJu?= =?us-ascii?Q?lwo/bAaZG7gopP1jSudKehMB3eKv6h79l6ttkfwmxRSVP1y6ldSoW838qkYR?= =?us-ascii?Q?6RjJgQu9qQpP8V68+Wdzw4uw1AU/02oO8IeiKHhQ6BCUqwvcm29MXUNgKQcb?= =?us-ascii?Q?dRoizLSgc1NlGHifWwNWtCFg8Vd7/XgSibcRjdTGclMmuQ0Ce4j18aMtd1mB?= =?us-ascii?Q?DZlOm95nGYKdpyYzu97a/tVrWdSD4SaTpD+WBaiD36FHz6XZ/qaStcyKpUHU?= =?us-ascii?Q?RhKEKuRiPMrciM6Fn183rOO0vetPWHO/fRqauBS9c7W+Sn02i2EUSlDHI7TU?= =?us-ascii?Q?0rBG5OrC3o4HgOZSVSypOtLlrXa5ThcKa0e++RLwqznMKsIWIUA8YeKqFM9r?= =?us-ascii?Q?BbEFis3a2w9g0vyiTDglcqGHNZWF2ymPt0S3PhnmZ5+GoFSMxv/ANNeiKh/Z?= =?us-ascii?Q?NZvYQyVVjn1bwNxxDcA3MqgWokQl3BTflqTgguTOyuPdb7i5yfAc0Nv2fRqX?= =?us-ascii?Q?q67YlaJkAP06hyYkep3xigzIYg+9e9dYMaXo5D0carzBPvtkl9sRRB3N/SRu?= =?us-ascii?Q?ERiLzgjEJp+Jy1/GKistbAHN4BDwS8xnKRtpxseLUtUtVQDwSTFppPxD5i6J?= =?us-ascii?Q?5qq6zY0CH5yp6Yt+uuKSz7zS0iUZiqS0sRWbdQS9lWS7FBJY0BwaHigrKBPP?= =?us-ascii?Q?I09tnyFWXCQLBpQxHA72dWsB/seRekJLlaZxlof0Ll+OKfbhvCUOt8cUGQJX?= =?us-ascii?Q?5aJhhODe0WH3dEPDoweVYqKaevFaYWsJQjv+JdAIm8qmivgUoWw1Yin2oF7z?= =?us-ascii?Q?ZrPlYPSjJmoRK3a/TFEKtFdznzYHXaxT9SvRJtzTGZaTcai+ZdCGQRGgSgzw?= =?us-ascii?Q?6NrM0KM2mXun4lWgpSK0mCZCZE94MIXCmz5YK1sYH7o6qLxBcNkGSOBzyrHX?= =?us-ascii?Q?3TC/mlvKUpIVz/TokIysykUQTKJzILKEovMgVsZGwVSpKeZrm3DTVoX08tgu?= =?us-ascii?Q?7o+9Uiprar9i4aI9qAFHgJ/SuZNUnHjWtqpXe1zxFoH7M1WJtgB1bXKgybjR?= =?us-ascii?Q?FJkUMCiU2AnmYtj3Cg5q+1zRbWZ860R1ZoD5KGDj30s8wjTHY0kGhnovzn2Z?= =?us-ascii?Q?hT0XYfN5hTH4qqNm0aQrCKhZzVrbeGDwe4w4KMQZbOfpy0vbapWsDq97TThi?= =?us-ascii?Q?WOHL3313gX7w7ouLsFvYJ22Jvj5bh6Q65MuzyV9943uPf/lvA0wsZ5Hburia?= =?us-ascii?Q?mCHr0TY6mkSHeh4fKAiUREc5gH/W1UFeH5G94A6L+z56zGLY7VRD1nQXvWcK?= =?us-ascii?Q?TLWUsH1RZFJbCOSvcFoDIcqXAA6PsrHj9V6YtNJD3JQxpZbpGCqVjCEslCL4?= =?us-ascii?Q?ss+L0X1T7iLXepKFwc9NsJ9+VW3YbKLm4m1uD4OmqPwBv/IJyIfS9a1JJisg?= =?us-ascii?Q?bjG6+ar7V1pOsHcX2RtGEAN0fh4ODeMs3fJKVgF8QKNQdNJe3pnb0Y5A3HtZ?= =?us-ascii?Q?FtwyDSVEc2oQixvuNDIKjBs+A4xkOkr0WQc8q4dvvKYFS8E5TB5aTMfMLJVh?= =?us-ascii?Q?7OuVe/V7DkIRVAoJQRQ=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: SJ1PR11MB6227.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 2014298a-b100-498f-b0ee-08daedf7dd9d X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Jan 2023 02:03:25.6525 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: CwC2TbLpHfd1yTQ4da7g6pWrqm2VYQtZj6b4kVquYg9BkPN13V1GtF4vsrz8lqrz0EcYq9VenbqMG6JR78drUw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW4PR11MB6617 Return-Path: yi1.li@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi, any comments about this BZ and patch? Code link: https://github.com/tianocore/edk2/pull/3787 -----Original Message----- From: devel@edk2.groups.io On Behalf Of Li, Yi Sent: Monday, December 19, 2022 2:24 PM To: devel@edk2.groups.io Cc: Li, Yi1 ; Yao, Jiewen ; Wang, J= ian J ; Lu, Xiaoyu1 ; Jiang, G= uomin Subject: [edk2-devel] [PATCH 1/1] CryptoPkg: Make Protocol Service API back= ward compatible REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D4197 Using older Crypto protocol will be allowed. Each function wrapper will be annotated to require a minimum required version of the crypto protocol and assert if called when the version is not compatible. Ths minimum version difined as the version when the API was introduced. Details: ///Parallel hash: MinVersion 8 ParallelHash256HashAll, /// HMAC SHA256 (continued): MinVersion 9 HmacSha256All, /// HMAC SHA384: MinVersion 9 HmacSha384New, ... HmacSha384All, /// HKDF (continued): MinVersion 10 HkdfSha256Extract, ... HkdfSha384Expand, /// Aead Aes GCM: MinVersion 11 AeadAesGcmEncrypt, AeadAesGcmDecrypt, /// Big Numbers: MinVersion 12 BigNumInit, ... BigNumAddMod, /// EC: MinVersion 13 EcGroupInit, ... EcDhComputeKey, /// TLS (continued): MinVersion 14 TlsShutdown, ... TlsGetExportKey, /// Ec (Continued): MinVersion 15 EcGetPublicKeyFromX509, ... EcDsaVerify, /// X509 (Continued): MinVersion 16 X509GetVersion, ... X509GetExtendedBasicConstraints /// Others: MinVersion 7 Cc: Jiewen Yao Cc: Jian J Wang Cc: Xiaoyu Lu Cc: Guomin Jiang Signed-off-by: Yi Li --- .../BaseCryptLibOnProtocolPpi/CryptLib.c | 449 +++++++++--------- .../BaseCryptLibOnProtocolPpi/DxeCryptLib.c | 9 - .../BaseCryptLibOnProtocolPpi/PeiCryptLib.c | 8 - .../BaseCryptLibOnProtocolPpi/SmmCryptLib.c | 9 - 4 files changed, 227 insertions(+), 248 deletions(-) diff --git a/CryptoPkg/Library/BaseCryptLibOnProtocolPpi/CryptLib.c b/Crypt= oPkg/Library/BaseCryptLibOnProtocolPpi/CryptLib.c index 4e31bc278e..e470a0f0d4 100644 --- a/CryptoPkg/Library/BaseCryptLibOnProtocolPpi/CryptLib.c +++ b/CryptoPkg/Library/BaseCryptLibOnProtocolPpi/CryptLib.c @@ -24,18 +24,20 @@ @param Args The argument list to pass to Function. @param ErrorReturnValue The value to return if the protocol is NULL or= the service in the protocol is NULL. - -**/ -#define CALL_CRYPTO_SERVICE(Function, Args, ErrorReturnValue) \ - do { \ - EDKII_CRYPTO_PROTOCOL *CryptoServices; \ - \ - CryptoServices =3D (EDKII_CRYPTO_PROTOCOL *)GetCryptoServices (); \ - if (CryptoServices !=3D NULL && CryptoServices->Function !=3D NULL) { = \ - return (CryptoServices->Function) Args; \ - } \ - CryptoServiceNotAvailable (#Function); \ - return ErrorReturnValue; \ + @param MinVersion The minimum protocol version that supports the= API. + +**/ +#define CALL_CRYPTO_SERVICE(Function, Args, ErrorReturnValue, MinVersion) = \ + do { = \ + EDKII_CRYPTO_PROTOCOL *CryptoServices; = \ + = \ + CryptoServices =3D (EDKII_CRYPTO_PROTOCOL *)GetCryptoServices (); = \ + if (CryptoServices !=3D NULL && CryptoServices->Function !=3D NULL && = \ + CryptoServices->GetVersion () >=3D MinVersion) { = \ + return (CryptoServices->Function) Args; = \ + } = \ + CryptoServiceNotAvailable (#Function); = \ + return ErrorReturnValue; = \ } while (FALSE); =20 /** @@ -45,14 +47,16 @@ =20 @param Function Name of the EDK II Crypto Protocol service to = call. @param Args The argument list to pass to Function. + @param MinVersion The minimum protocol version that supports the= API. =20 **/ -#define CALL_VOID_CRYPTO_SERVICE(Function, Args) \ +#define CALL_VOID_CRYPTO_SERVICE(Function, Args, MinVersion) \ do { \ EDKII_CRYPTO_PROTOCOL *CryptoServices; \ \ CryptoServices =3D (EDKII_CRYPTO_PROTOCOL *)GetCryptoServices (); \ - if (CryptoServices !=3D NULL && CryptoServices->Function !=3D NULL) { = \ + if (CryptoServices !=3D NULL && CryptoServices->Function !=3D NULL && = \ + CryptoServices->GetVersion () >=3D MinVersion) { \ (CryptoServices->Function) Args; \ return; \ } \ @@ -116,7 +120,7 @@ Md5GetContextSize ( VOID ) { - CALL_CRYPTO_SERVICE (Md5GetContextSize, (), 0); + CALL_CRYPTO_SERVICE (Md5GetContextSize, (), 0, 7); } =20 /** @@ -139,7 +143,7 @@ Md5Init ( OUT VOID *Md5Context ) { - CALL_CRYPTO_SERVICE (Md5Init, (Md5Context), FALSE); + CALL_CRYPTO_SERVICE (Md5Init, (Md5Context), FALSE, 7); } =20 /** @@ -164,7 +168,7 @@ Md5Duplicate ( OUT VOID *NewMd5Context ) { - CALL_CRYPTO_SERVICE (Md5Duplicate, (Md5Context, NewMd5Context), FALSE); + CALL_CRYPTO_SERVICE (Md5Duplicate, (Md5Context, NewMd5Context), FALSE, 7= ); } =20 /** @@ -195,7 +199,7 @@ Md5Update ( IN UINTN DataSize ) { - CALL_CRYPTO_SERVICE (Md5Update, (Md5Context, Data, DataSize), FALSE); + CALL_CRYPTO_SERVICE (Md5Update, (Md5Context, Data, DataSize), FALSE, 7); } =20 /** @@ -227,7 +231,7 @@ Md5Final ( OUT UINT8 *HashValue ) { - CALL_CRYPTO_SERVICE (Md5Final, (Md5Context, HashValue), FALSE); + CALL_CRYPTO_SERVICE (Md5Final, (Md5Context, HashValue), FALSE, 7); } =20 /** @@ -256,7 +260,7 @@ Md5HashAll ( OUT UINT8 *HashValue ) { - CALL_CRYPTO_SERVICE (Md5HashAll, (Data, DataSize, HashValue), FALSE); + CALL_CRYPTO_SERVICE (Md5HashAll, (Data, DataSize, HashValue), FALSE, 7); } =20 #endif @@ -278,7 +282,7 @@ Sha1GetContextSize ( VOID ) { - CALL_CRYPTO_SERVICE (Sha1GetContextSize, (), 0); + CALL_CRYPTO_SERVICE (Sha1GetContextSize, (), 0, 7); } =20 /** @@ -301,7 +305,7 @@ Sha1Init ( OUT VOID *Sha1Context ) { - CALL_CRYPTO_SERVICE (Sha1Init, (Sha1Context), FALSE); + CALL_CRYPTO_SERVICE (Sha1Init, (Sha1Context), FALSE, 7); } =20 /** @@ -326,7 +330,7 @@ Sha1Duplicate ( OUT VOID *NewSha1Context ) { - CALL_CRYPTO_SERVICE (Sha1Duplicate, (Sha1Context, NewSha1Context), FALSE= ); + CALL_CRYPTO_SERVICE (Sha1Duplicate, (Sha1Context, NewSha1Context), FALSE= , 7); } =20 /** @@ -357,7 +361,7 @@ Sha1Update ( IN UINTN DataSize ) { - CALL_CRYPTO_SERVICE (Sha1Update, (Sha1Context, Data, DataSize), FALSE); + CALL_CRYPTO_SERVICE (Sha1Update, (Sha1Context, Data, DataSize), FALSE, 7= ); } =20 /** @@ -389,7 +393,7 @@ Sha1Final ( OUT UINT8 *HashValue ) { - CALL_CRYPTO_SERVICE (Sha1Final, (Sha1Context, HashValue), FALSE); + CALL_CRYPTO_SERVICE (Sha1Final, (Sha1Context, HashValue), FALSE, 7); } =20 /** @@ -418,7 +422,7 @@ Sha1HashAll ( OUT UINT8 *HashValue ) { - CALL_CRYPTO_SERVICE (Sha1HashAll, (Data, DataSize, HashValue), FALSE); + CALL_CRYPTO_SERVICE (Sha1HashAll, (Data, DataSize, HashValue), FALSE, 7)= ; } =20 #endif @@ -435,7 +439,7 @@ Sha256GetContextSize ( VOID ) { - CALL_CRYPTO_SERVICE (Sha256GetContextSize, (), 0); + CALL_CRYPTO_SERVICE (Sha256GetContextSize, (), 0, 7); } =20 /** @@ -456,7 +460,7 @@ Sha256Init ( OUT VOID *Sha256Context ) { - CALL_CRYPTO_SERVICE (Sha256Init, (Sha256Context), FALSE); + CALL_CRYPTO_SERVICE (Sha256Init, (Sha256Context), FALSE, 7); } =20 /** @@ -481,7 +485,7 @@ Sha256Duplicate ( OUT VOID *NewSha256Context ) { - CALL_CRYPTO_SERVICE (Sha256Duplicate, (Sha256Context, NewSha256Context),= FALSE); + CALL_CRYPTO_SERVICE (Sha256Duplicate, (Sha256Context, NewSha256Context),= FALSE, 7); } =20 /** @@ -510,7 +514,7 @@ Sha256Update ( IN UINTN DataSize ) { - CALL_CRYPTO_SERVICE (Sha256Update, (Sha256Context, Data, DataSize), FALS= E); + CALL_CRYPTO_SERVICE (Sha256Update, (Sha256Context, Data, DataSize), FALS= E, 7); } =20 /** @@ -540,7 +544,7 @@ Sha256Final ( OUT UINT8 *HashValue ) { - CALL_CRYPTO_SERVICE (Sha256Final, (Sha256Context, HashValue), FALSE); + CALL_CRYPTO_SERVICE (Sha256Final, (Sha256Context, HashValue), FALSE, 7); } =20 /** @@ -569,7 +573,7 @@ Sha256HashAll ( OUT UINT8 *HashValue ) { - CALL_CRYPTO_SERVICE (Sha256HashAll, (Data, DataSize, HashValue), FALSE); + CALL_CRYPTO_SERVICE (Sha256HashAll, (Data, DataSize, HashValue), FALSE, = 7); } =20 /** @@ -584,7 +588,7 @@ Sha384GetContextSize ( VOID ) { - CALL_CRYPTO_SERVICE (Sha384GetContextSize, (), 0); + CALL_CRYPTO_SERVICE (Sha384GetContextSize, (), 0, 7); } =20 /** @@ -605,7 +609,7 @@ Sha384Init ( OUT VOID *Sha384Context ) { - CALL_CRYPTO_SERVICE (Sha384Init, (Sha384Context), FALSE); + CALL_CRYPTO_SERVICE (Sha384Init, (Sha384Context), FALSE, 7); } =20 /** @@ -630,7 +634,7 @@ Sha384Duplicate ( OUT VOID *NewSha384Context ) { - CALL_CRYPTO_SERVICE (Sha384Duplicate, (Sha384Context, NewSha384Context),= FALSE); + CALL_CRYPTO_SERVICE (Sha384Duplicate, (Sha384Context, NewSha384Context),= FALSE, 7); } =20 /** @@ -659,7 +663,7 @@ Sha384Update ( IN UINTN DataSize ) { - CALL_CRYPTO_SERVICE (Sha384Update, (Sha384Context, Data, DataSize), FALS= E); + CALL_CRYPTO_SERVICE (Sha384Update, (Sha384Context, Data, DataSize), FALS= E, 7); } =20 /** @@ -689,7 +693,7 @@ Sha384Final ( OUT UINT8 *HashValue ) { - CALL_CRYPTO_SERVICE (Sha384Final, (Sha384Context, HashValue), FALSE); + CALL_CRYPTO_SERVICE (Sha384Final, (Sha384Context, HashValue), FALSE, 7); } =20 /** @@ -718,7 +722,7 @@ Sha384HashAll ( OUT UINT8 *HashValue ) { - CALL_CRYPTO_SERVICE (Sha384HashAll, (Data, DataSize, HashValue), FALSE); + CALL_CRYPTO_SERVICE (Sha384HashAll, (Data, DataSize, HashValue), FALSE, = 7); } =20 /** @@ -733,7 +737,7 @@ Sha512GetContextSize ( VOID ) { - CALL_CRYPTO_SERVICE (Sha512GetContextSize, (), 0); + CALL_CRYPTO_SERVICE (Sha512GetContextSize, (), 0, 7); } =20 /** @@ -754,7 +758,7 @@ Sha512Init ( OUT VOID *Sha512Context ) { - CALL_CRYPTO_SERVICE (Sha512Init, (Sha512Context), FALSE); + CALL_CRYPTO_SERVICE (Sha512Init, (Sha512Context), FALSE, 7); } =20 /** @@ -779,7 +783,7 @@ Sha512Duplicate ( OUT VOID *NewSha512Context ) { - CALL_CRYPTO_SERVICE (Sha512Duplicate, (Sha512Context, NewSha512Context),= FALSE); + CALL_CRYPTO_SERVICE (Sha512Duplicate, (Sha512Context, NewSha512Context),= FALSE, 7); } =20 /** @@ -808,7 +812,7 @@ Sha512Update ( IN UINTN DataSize ) { - CALL_CRYPTO_SERVICE (Sha512Update, (Sha512Context, Data, DataSize), FALS= E); + CALL_CRYPTO_SERVICE (Sha512Update, (Sha512Context, Data, DataSize), FALS= E, 7); } =20 /** @@ -838,7 +842,7 @@ Sha512Final ( OUT UINT8 *HashValue ) { - CALL_CRYPTO_SERVICE (Sha512Final, (Sha512Context, HashValue), FALSE); + CALL_CRYPTO_SERVICE (Sha512Final, (Sha512Context, HashValue), FALSE, 7); } =20 /** @@ -867,7 +871,7 @@ Sha512HashAll ( OUT UINT8 *HashValue ) { - CALL_CRYPTO_SERVICE (Sha512HashAll, (Data, DataSize, HashValue), FALSE); + CALL_CRYPTO_SERVICE (Sha512HashAll, (Data, DataSize, HashValue), FALSE, = 7); } =20 /** @@ -899,7 +903,7 @@ ParallelHash256HashAll ( IN UINTN CustomByteLen ) { - CALL_CRYPTO_SERVICE (ParallelHash256HashAll, (Input, InputByteLen, Block= Size, Output, OutputByteLen, Customization, CustomByteLen), FALSE); + CALL_CRYPTO_SERVICE (ParallelHash256HashAll, (Input, InputByteLen, Block= Size, Output, OutputByteLen, Customization, CustomByteLen), FALSE, 8); } =20 /** @@ -914,7 +918,7 @@ Sm3GetContextSize ( VOID ) { - CALL_CRYPTO_SERVICE (Sm3GetContextSize, (), 0); + CALL_CRYPTO_SERVICE (Sm3GetContextSize, (), 0, 7); } =20 /** @@ -935,7 +939,7 @@ Sm3Init ( OUT VOID *Sm3Context ) { - CALL_CRYPTO_SERVICE (Sm3Init, (Sm3Context), FALSE); + CALL_CRYPTO_SERVICE (Sm3Init, (Sm3Context), FALSE, 7); } =20 /** @@ -960,7 +964,7 @@ Sm3Duplicate ( OUT VOID *NewSm3Context ) { - CALL_CRYPTO_SERVICE (Sm3Duplicate, (Sm3Context, NewSm3Context), FALSE); + CALL_CRYPTO_SERVICE (Sm3Duplicate, (Sm3Context, NewSm3Context), FALSE, 7= ); } =20 /** @@ -989,7 +993,7 @@ Sm3Update ( IN UINTN DataSize ) { - CALL_CRYPTO_SERVICE (Sm3Update, (Sm3Context, Data, DataSize), FALSE); + CALL_CRYPTO_SERVICE (Sm3Update, (Sm3Context, Data, DataSize), FALSE, 7); } =20 /** @@ -1019,7 +1023,7 @@ Sm3Final ( OUT UINT8 *HashValue ) { - CALL_CRYPTO_SERVICE (Sm3Final, (Sm3Context, HashValue), FALSE); + CALL_CRYPTO_SERVICE (Sm3Final, (Sm3Context, HashValue), FALSE, 7); } =20 /** @@ -1048,7 +1052,7 @@ Sm3HashAll ( OUT UINT8 *HashValue ) { - CALL_CRYPTO_SERVICE (Sm3HashAll, (Data, DataSize, HashValue), FALSE); + CALL_CRYPTO_SERVICE (Sm3HashAll, (Data, DataSize, HashValue), FALSE, 7); } =20 // =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D @@ -1068,7 +1072,7 @@ HmacSha256New ( VOID ) { - CALL_CRYPTO_SERVICE (HmacSha256New, (), NULL); + CALL_CRYPTO_SERVICE (HmacSha256New, (), NULL, 7); } =20 /** @@ -1083,7 +1087,7 @@ HmacSha256Free ( IN VOID *HmacSha256Ctx ) { - CALL_VOID_CRYPTO_SERVICE (HmacSha256Free, (HmacSha256Ctx)); + CALL_VOID_CRYPTO_SERVICE (HmacSha256Free, (HmacSha256Ctx), 7); } =20 /** @@ -1110,7 +1114,7 @@ HmacSha256SetKey ( IN UINTN KeySize ) { - CALL_CRYPTO_SERVICE (HmacSha256SetKey, (HmacSha256Context, Key, KeySize)= , FALSE); + CALL_CRYPTO_SERVICE (HmacSha256SetKey, (HmacSha256Context, Key, KeySize)= , FALSE, 7); } =20 /** @@ -1135,7 +1139,7 @@ HmacSha256Duplicate ( OUT VOID *NewHmacSha256Context ) { - CALL_CRYPTO_SERVICE (HmacSha256Duplicate, (HmacSha256Context, NewHmacSha= 256Context), FALSE); + CALL_CRYPTO_SERVICE (HmacSha256Duplicate, (HmacSha256Context, NewHmacSha= 256Context), FALSE, 7); } =20 /** @@ -1166,7 +1170,7 @@ HmacSha256Update ( IN UINTN DataSize ) { - CALL_CRYPTO_SERVICE (HmacSha256Update, (HmacSha256Context, Data, DataSiz= e), FALSE); + CALL_CRYPTO_SERVICE (HmacSha256Update, (HmacSha256Context, Data, DataSiz= e), FALSE, 7); } =20 /** @@ -1198,7 +1202,7 @@ HmacSha256Final ( OUT UINT8 *HmacValue ) { - CALL_CRYPTO_SERVICE (HmacSha256Final, (HmacSha256Context, HmacValue), FA= LSE); + CALL_CRYPTO_SERVICE (HmacSha256Final, (HmacSha256Context, HmacValue), FA= LSE, 7); } =20 /** @@ -1231,7 +1235,7 @@ HmacSha256All ( OUT UINT8 *HmacValue ) { - CALL_CRYPTO_SERVICE (HmacSha256All, (Data, DataSize, Key, KeySize, HmacV= alue), FALSE); + CALL_CRYPTO_SERVICE (HmacSha256All, (Data, DataSize, Key, KeySize, HmacV= alue), FALSE, 9); } =20 /** @@ -1247,7 +1251,7 @@ HmacSha384New ( VOID ) { - CALL_CRYPTO_SERVICE (HmacSha384New, (), NULL); + CALL_CRYPTO_SERVICE (HmacSha384New, (), NULL, 9); } =20 /** @@ -1262,7 +1266,7 @@ HmacSha384Free ( IN VOID *HmacSha384Ctx ) { - CALL_VOID_CRYPTO_SERVICE (HmacSha384Free, (HmacSha384Ctx)); + CALL_VOID_CRYPTO_SERVICE (HmacSha384Free, (HmacSha384Ctx), 9); } =20 /** @@ -1289,7 +1293,7 @@ HmacSha384SetKey ( IN UINTN KeySize ) { - CALL_CRYPTO_SERVICE (HmacSha384SetKey, (HmacSha384Context, Key, KeySize)= , FALSE); + CALL_CRYPTO_SERVICE (HmacSha384SetKey, (HmacSha384Context, Key, KeySize)= , FALSE, 9); } =20 /** @@ -1314,7 +1318,7 @@ HmacSha384Duplicate ( OUT VOID *NewHmacSha384Context ) { - CALL_CRYPTO_SERVICE (HmacSha384Duplicate, (HmacSha384Context, NewHmacSha= 384Context), FALSE); + CALL_CRYPTO_SERVICE (HmacSha384Duplicate, (HmacSha384Context, NewHmacSha= 384Context), FALSE, 9); } =20 /** @@ -1345,7 +1349,7 @@ HmacSha384Update ( IN UINTN DataSize ) { - CALL_CRYPTO_SERVICE (HmacSha384Update, (HmacSha384Context, Data, DataSiz= e), FALSE); + CALL_CRYPTO_SERVICE (HmacSha384Update, (HmacSha384Context, Data, DataSiz= e), FALSE, 9); } =20 /** @@ -1377,7 +1381,7 @@ HmacSha384Final ( OUT UINT8 *HmacValue ) { - CALL_CRYPTO_SERVICE (HmacSha384Final, (HmacSha384Context, HmacValue), FA= LSE); + CALL_CRYPTO_SERVICE (HmacSha384Final, (HmacSha384Context, HmacValue), FA= LSE, 9); } =20 /** @@ -1410,7 +1414,7 @@ HmacSha384All ( OUT UINT8 *HmacValue ) { - CALL_CRYPTO_SERVICE (HmacSha384All, (Data, DataSize, Key, KeySize, HmacV= alue), FALSE); + CALL_CRYPTO_SERVICE (HmacSha384All, (Data, DataSize, Key, KeySize, HmacV= alue), FALSE, 9); } =20 // =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D @@ -1432,7 +1436,7 @@ AesGetContextSize ( VOID ) { - CALL_CRYPTO_SERVICE (AesGetContextSize, (), 0); + CALL_CRYPTO_SERVICE (AesGetContextSize, (), 0, 7); } =20 /** @@ -1465,7 +1469,7 @@ AesInit ( IN UINTN KeyLength ) { - CALL_CRYPTO_SERVICE (AesInit, (AesContext, Key, KeyLength), FALSE); + CALL_CRYPTO_SERVICE (AesInit, (AesContext, Key, KeyLength), FALSE, 7); } =20 /** @@ -1507,7 +1511,7 @@ AesCbcEncrypt ( OUT UINT8 *Output ) { - CALL_CRYPTO_SERVICE (AesCbcEncrypt, (AesContext, Input, InputSize, Ivec,= Output), FALSE); + CALL_CRYPTO_SERVICE (AesCbcEncrypt, (AesContext, Input, InputSize, Ivec,= Output), FALSE, 7); } =20 /** @@ -1549,7 +1553,7 @@ AesCbcDecrypt ( OUT UINT8 *Output ) { - CALL_CRYPTO_SERVICE (AesCbcDecrypt, (AesContext, Input, InputSize, Ivec,= Output), FALSE); + CALL_CRYPTO_SERVICE (AesCbcDecrypt, (AesContext, Input, InputSize, Ivec,= Output), FALSE, 7); } =20 // =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D @@ -1597,7 +1601,7 @@ AeadAesGcmEncrypt ( OUT UINTN *DataOutSize ) { - CALL_CRYPTO_SERVICE (AeadAesGcmEncrypt, (Key, KeySize, Iv, IvSize, AData= , ADataSize, DataIn, DataInSize, TagOut, TagSize, DataOut, DataOutSize), FA= LSE); + CALL_CRYPTO_SERVICE (AeadAesGcmEncrypt, (Key, KeySize, Iv, IvSize, AData= , ADataSize, DataIn, DataInSize, TagOut, TagSize, DataOut, DataOutSize), FA= LSE, 11); } =20 /** @@ -1642,7 +1646,7 @@ AeadAesGcmDecrypt ( OUT UINTN *DataOutSize ) { - CALL_CRYPTO_SERVICE (AeadAesGcmDecrypt, (Key, KeySize, Iv, IvSize, AData= , ADataSize, DataIn, DataInSize, Tag, TagSize, DataOut, DataOutSize), FALSE= ); + CALL_CRYPTO_SERVICE (AeadAesGcmDecrypt, (Key, KeySize, Iv, IvSize, AData= , ADataSize, DataIn, DataInSize, Tag, TagSize, DataOut, DataOutSize), FALSE= , 11); } =20 // =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D @@ -1662,7 +1666,7 @@ RsaNew ( VOID ) { - CALL_CRYPTO_SERVICE (RsaNew, (), NULL); + CALL_CRYPTO_SERVICE (RsaNew, (), NULL, 7); } =20 /** @@ -1679,7 +1683,7 @@ RsaFree ( IN VOID *RsaContext ) { - CALL_VOID_CRYPTO_SERVICE (RsaFree, (RsaContext)); + CALL_VOID_CRYPTO_SERVICE (RsaFree, (RsaContext), 7); } =20 /** @@ -1713,7 +1717,7 @@ RsaSetKey ( IN UINTN BnSize ) { - CALL_CRYPTO_SERVICE (RsaSetKey, (RsaContext, KeyTag, BigNumber, BnSize),= FALSE); + CALL_CRYPTO_SERVICE (RsaSetKey, (RsaContext, KeyTag, BigNumber, BnSize),= FALSE, 7); } =20 /** @@ -1753,7 +1757,7 @@ RsaGetKey ( IN OUT UINTN *BnSize ) { - CALL_CRYPTO_SERVICE (RsaGetKey, (RsaContext, KeyTag, BigNumber, BnSize),= FALSE); + CALL_CRYPTO_SERVICE (RsaGetKey, (RsaContext, KeyTag, BigNumber, BnSize),= FALSE, 7); } =20 /** @@ -1788,7 +1792,7 @@ RsaGenerateKey ( IN UINTN PublicExponentSize ) { - CALL_CRYPTO_SERVICE (RsaGenerateKey, (RsaContext, ModulusLength, PublicE= xponent, PublicExponentSize), FALSE); + CALL_CRYPTO_SERVICE (RsaGenerateKey, (RsaContext, ModulusLength, PublicE= xponent, PublicExponentSize), FALSE, 7); } =20 /** @@ -1818,7 +1822,7 @@ RsaCheckKey ( IN VOID *RsaContext ) { - CALL_CRYPTO_SERVICE (RsaCheckKey, (RsaContext), FALSE); + CALL_CRYPTO_SERVICE (RsaCheckKey, (RsaContext), FALSE, 7); } =20 /** @@ -1858,7 +1862,7 @@ RsaPkcs1Sign ( IN OUT UINTN *SigSize ) { - CALL_CRYPTO_SERVICE (RsaPkcs1Sign, (RsaContext, MessageHash, HashSize, S= ignature, SigSize), FALSE); + CALL_CRYPTO_SERVICE (RsaPkcs1Sign, (RsaContext, MessageHash, HashSize, S= ignature, SigSize), FALSE, 7); } =20 /** @@ -1890,7 +1894,7 @@ RsaPkcs1Verify ( IN UINTN SigSize ) { - CALL_CRYPTO_SERVICE (RsaPkcs1Verify, (RsaContext, MessageHash, HashSize,= Signature, SigSize), FALSE); + CALL_CRYPTO_SERVICE (RsaPkcs1Verify, (RsaContext, MessageHash, HashSize,= Signature, SigSize), FALSE, 7); } =20 /** @@ -1923,7 +1927,7 @@ RsaPssVerify ( IN UINT16 SaltLen ) { - CALL_CRYPTO_SERVICE (RsaPssVerify, (RsaContext, Message, MsgSize, Signat= ure, SigSize, DigestLen, SaltLen), FALSE); + CALL_CRYPTO_SERVICE (RsaPssVerify, (RsaContext, Message, MsgSize, Signat= ure, SigSize, DigestLen, SaltLen), FALSE, 7); } =20 /** @@ -1968,7 +1972,7 @@ RsaPssSign ( IN OUT UINTN *SigSize ) { - CALL_CRYPTO_SERVICE (RsaPssSign, (RsaContext, Message, MsgSize, DigestLe= n, SaltLen, Signature, SigSize), FALSE); + CALL_CRYPTO_SERVICE (RsaPssSign, (RsaContext, Message, MsgSize, DigestLe= n, SaltLen, Signature, SigSize), FALSE, 7); } =20 /** @@ -1999,7 +2003,7 @@ RsaGetPrivateKeyFromPem ( OUT VOID **RsaContext ) { - CALL_CRYPTO_SERVICE (RsaGetPrivateKeyFromPem, (PemData, PemSize, Passwor= d, RsaContext), FALSE); + CALL_CRYPTO_SERVICE (RsaGetPrivateKeyFromPem, (PemData, PemSize, Passwor= d, RsaContext), FALSE, 7); } =20 /** @@ -2028,7 +2032,7 @@ RsaGetPublicKeyFromX509 ( OUT VOID **RsaContext ) { - CALL_CRYPTO_SERVICE (RsaGetPublicKeyFromX509, (Cert, CertSize, RsaContex= t), FALSE); + CALL_CRYPTO_SERVICE (RsaGetPublicKeyFromX509, (Cert, CertSize, RsaContex= t), FALSE, 7); } =20 /** @@ -2059,7 +2063,7 @@ X509GetSubjectName ( IN OUT UINTN *SubjectSize ) { - CALL_CRYPTO_SERVICE (X509GetSubjectName, (Cert, CertSize, CertSubject, S= ubjectSize), FALSE); + CALL_CRYPTO_SERVICE (X509GetSubjectName, (Cert, CertSize, CertSubject, S= ubjectSize), FALSE, 7); } =20 /** @@ -2097,7 +2101,7 @@ X509GetCommonName ( IN OUT UINTN *CommonNameSize ) { - CALL_CRYPTO_SERVICE (X509GetCommonName, (Cert, CertSize, CommonName, Com= monNameSize), RETURN_UNSUPPORTED); + CALL_CRYPTO_SERVICE (X509GetCommonName, (Cert, CertSize, CommonName, Com= monNameSize), RETURN_UNSUPPORTED, 7); } =20 /** @@ -2135,7 +2139,7 @@ X509GetOrganizationName ( IN OUT UINTN *NameBufferSize ) { - CALL_CRYPTO_SERVICE (X509GetOrganizationName, (Cert, CertSize, NameBuffe= r, NameBufferSize), RETURN_UNSUPPORTED); + CALL_CRYPTO_SERVICE (X509GetOrganizationName, (Cert, CertSize, NameBuffe= r, NameBufferSize), RETURN_UNSUPPORTED, 7); } =20 /** @@ -2165,7 +2169,7 @@ X509VerifyCert ( IN UINTN CACertSize ) { - CALL_CRYPTO_SERVICE (X509VerifyCert, (Cert, CertSize, CACert, CACertSize= ), FALSE); + CALL_CRYPTO_SERVICE (X509VerifyCert, (Cert, CertSize, CACert, CACertSize= ), FALSE, 7); } =20 /** @@ -2192,7 +2196,7 @@ X509ConstructCertificate ( OUT UINT8 **SingleX509Cert ) { - CALL_CRYPTO_SERVICE (X509ConstructCertificate, (Cert, CertSize, SingleX5= 09Cert), FALSE); + CALL_CRYPTO_SERVICE (X509ConstructCertificate, (Cert, CertSize, SingleX5= 09Cert), FALSE, 7); } =20 /** @@ -2256,7 +2260,7 @@ X509ConstructCertificateStackV ( IN VA_LIST Args ) { - CALL_CRYPTO_SERVICE (X509ConstructCertificateStackV, (X509Stack, Args), = FALSE); + CALL_CRYPTO_SERVICE (X509ConstructCertificateStackV, (X509Stack, Args), = FALSE, 7); } =20 /** @@ -2273,7 +2277,7 @@ X509Free ( IN VOID *X509Cert ) { - CALL_VOID_CRYPTO_SERVICE (X509Free, (X509Cert)); + CALL_VOID_CRYPTO_SERVICE (X509Free, (X509Cert), 7); } =20 /** @@ -2290,7 +2294,7 @@ X509StackFree ( IN VOID *X509Stack ) { - CALL_VOID_CRYPTO_SERVICE (X509StackFree, (X509Stack)); + CALL_VOID_CRYPTO_SERVICE (X509StackFree, (X509Stack), 7); } =20 /** @@ -2319,7 +2323,7 @@ X509GetTBSCert ( OUT UINTN *TBSCertSize ) { - CALL_CRYPTO_SERVICE (X509GetTBSCert, (Cert, CertSize, TBSCert, TBSCertSi= ze), FALSE); + CALL_CRYPTO_SERVICE (X509GetTBSCert, (Cert, CertSize, TBSCert, TBSCertSi= ze), FALSE, 7); } =20 /** @@ -2346,7 +2350,7 @@ X509GetVersion ( OUT UINTN *Version ) { - CALL_CRYPTO_SERVICE (X509GetVersion, (Cert, CertSize, Version), FALSE); + CALL_CRYPTO_SERVICE (X509GetVersion, (Cert, CertSize, Version), FALSE, 1= 6); } =20 /** @@ -2381,7 +2385,7 @@ X509GetSerialNumber ( IN OUT UINTN *SerialNumberSize ) { - CALL_CRYPTO_SERVICE (X509GetSerialNumber, (Cert, CertSize, SerialNumber,= SerialNumberSize), FALSE); + CALL_CRYPTO_SERVICE (X509GetSerialNumber, (Cert, CertSize, SerialNumber,= SerialNumberSize), FALSE, 16); } =20 /** @@ -2412,7 +2416,7 @@ X509GetIssuerName ( IN OUT UINTN *CertIssuerSize ) { - CALL_CRYPTO_SERVICE (X509GetIssuerName, (Cert, CertSize, CertIssuer, Cer= tIssuerSize), FALSE); + CALL_CRYPTO_SERVICE (X509GetIssuerName, (Cert, CertSize, CertIssuer, Cer= tIssuerSize), FALSE, 16); } =20 /** @@ -2442,7 +2446,7 @@ X509GetSignatureAlgorithm ( IN OUT UINTN *OidSize ) { - CALL_CRYPTO_SERVICE (X509GetSignatureAlgorithm, (Cert, CertSize, Oid, Oi= dSize), FALSE); + CALL_CRYPTO_SERVICE (X509GetSignatureAlgorithm, (Cert, CertSize, Oid, Oi= dSize), FALSE, 16); } =20 /** @@ -2476,7 +2480,7 @@ X509GetExtensionData ( IN OUT UINTN *ExtensionDataSize ) { - CALL_CRYPTO_SERVICE (X509GetExtensionData, (Cert, CertSize, Oid, OidSize= , ExtensionData, ExtensionDataSize), FALSE); + CALL_CRYPTO_SERVICE (X509GetExtensionData, (Cert, CertSize, Oid, OidSize= , ExtensionData, ExtensionDataSize), FALSE, 16); } =20 /** @@ -2505,7 +2509,7 @@ X509GetExtendedKeyUsage ( IN OUT UINTN *UsageSize ) { - CALL_CRYPTO_SERVICE (X509GetExtendedKeyUsage, (Cert, CertSize, Usage, Us= ageSize), FALSE); + CALL_CRYPTO_SERVICE (X509GetExtendedKeyUsage, (Cert, CertSize, Usage, Us= ageSize), FALSE, 16); } =20 /** @@ -2540,7 +2544,7 @@ X509GetValidity ( IN OUT UINTN *ToSize ) { - CALL_CRYPTO_SERVICE (X509GetValidity, (Cert, CertSize, From, FromSize, T= o, ToSize), FALSE); + CALL_CRYPTO_SERVICE (X509GetValidity, (Cert, CertSize, From, FromSize, T= o, ToSize), FALSE, 16); } =20 /** @@ -2574,7 +2578,7 @@ X509FormatDateTime ( IN OUT UINTN *DateTimeSize ) { - CALL_CRYPTO_SERVICE (X509FormatDateTime, (DateTimeStr, DateTime, DateTim= eSize), FALSE); + CALL_CRYPTO_SERVICE (X509FormatDateTime, (DateTimeStr, DateTime, DateTim= eSize), FALSE, 16); } =20 /** @@ -2600,7 +2604,7 @@ X509CompareDateTime ( IN CONST VOID *DateTime2 ) { - CALL_CRYPTO_SERVICE (X509CompareDateTime, (DateTime1, DateTime2), FALSE)= ; + CALL_CRYPTO_SERVICE (X509CompareDateTime, (DateTime1, DateTime2), FALSE,= 16); } =20 /** @@ -2622,7 +2626,7 @@ X509GetKeyUsage ( OUT UINTN *Usage ) { - CALL_CRYPTO_SERVICE (X509GetKeyUsage, (Cert, CertSize, Usage), FALSE); + CALL_CRYPTO_SERVICE (X509GetKeyUsage, (Cert, CertSize, Usage), FALSE, 16= ); } =20 /** @@ -2650,7 +2654,7 @@ X509VerifyCertChain ( IN UINTN CertChainLength ) { - CALL_CRYPTO_SERVICE (X509VerifyCertChain, (RootCert, RootCertLength, Cer= tChain, CertChainLength), FALSE); + CALL_CRYPTO_SERVICE (X509VerifyCertChain, (RootCert, RootCertLength, Cer= tChain, CertChainLength), FALSE, 16); } =20 /** @@ -2681,7 +2685,7 @@ X509GetCertFromCertChain ( OUT UINTN *CertLength ) { - CALL_CRYPTO_SERVICE (X509GetCertFromCertChain, (CertChain, CertChainLeng= th, CertIndex, Cert, CertLength), FALSE); + CALL_CRYPTO_SERVICE (X509GetCertFromCertChain, (CertChain, CertChainLeng= th, CertIndex, Cert, CertLength), FALSE, 16); } =20 /** @@ -2704,7 +2708,7 @@ Asn1GetTag ( IN UINT32 Tag ) { - CALL_CRYPTO_SERVICE (Asn1GetTag, (Ptr, End, Length, Tag), FALSE); + CALL_CRYPTO_SERVICE (Asn1GetTag, (Ptr, End, Length, Tag), FALSE, 16); } =20 /** @@ -2734,7 +2738,7 @@ X509GetExtendedBasicConstraints ( UINTN *BasicConstraintsSize ) { - CALL_CRYPTO_SERVICE (X509GetExtendedBasicConstraints, (Cert, CertSize, B= asicConstraints, BasicConstraintsSize), FALSE); + CALL_CRYPTO_SERVICE (X509GetExtendedBasicConstraints, (Cert, CertSize, B= asicConstraints, BasicConstraintsSize), FALSE, 16); } =20 /** @@ -2777,7 +2781,7 @@ Pkcs5HashPassword ( OUT UINT8 *OutKey ) { - CALL_CRYPTO_SERVICE (Pkcs5HashPassword, (PasswordLength, Password, SaltL= ength, Salt, IterationCount, DigestSize, KeyLength, OutKey), FALSE); + CALL_CRYPTO_SERVICE (Pkcs5HashPassword, (PasswordLength, Password, SaltL= ength, Salt, IterationCount, DigestSize, KeyLength, OutKey), FALSE, 7); } =20 /** @@ -2822,7 +2826,7 @@ Pkcs1v2Encrypt ( OUT UINTN *EncryptedDataSize ) { - CALL_CRYPTO_SERVICE (Pkcs1v2Encrypt, (PublicKey, PublicKeySize, InData, = InDataSize, PrngSeed, PrngSeedSize, EncryptedData, EncryptedDataSize), FALS= E); + CALL_CRYPTO_SERVICE (Pkcs1v2Encrypt, (PublicKey, PublicKeySize, InData, = InDataSize, PrngSeed, PrngSeedSize, EncryptedData, EncryptedDataSize), FALS= E, 7); } =20 /** @@ -2862,7 +2866,7 @@ Pkcs7GetSigners ( OUT UINTN *CertLength ) { - CALL_CRYPTO_SERVICE (Pkcs7GetSigners, (P7Data, P7Length, CertStack, Stac= kLength, TrustedCert, CertLength), FALSE); + CALL_CRYPTO_SERVICE (Pkcs7GetSigners, (P7Data, P7Length, CertStack, Stac= kLength, TrustedCert, CertLength), FALSE, 7); } =20 /** @@ -2879,7 +2883,7 @@ Pkcs7FreeSigners ( IN UINT8 *Certs ) { - CALL_VOID_CRYPTO_SERVICE (Pkcs7FreeSigners, (Certs)); + CALL_VOID_CRYPTO_SERVICE (Pkcs7FreeSigners, (Certs), 7); } =20 /** @@ -2915,7 +2919,7 @@ Pkcs7GetCertificatesList ( OUT UINTN *UnchainLength ) { - CALL_CRYPTO_SERVICE (Pkcs7GetCertificatesList, (P7Data, P7Length, Signer= ChainCerts, ChainLength, UnchainCerts, UnchainLength), FALSE); + CALL_CRYPTO_SERVICE (Pkcs7GetCertificatesList, (P7Data, P7Length, Signer= ChainCerts, ChainLength, UnchainCerts, UnchainLength), FALSE, 7); } =20 /** @@ -2959,7 +2963,7 @@ Pkcs7Sign ( OUT UINTN *SignedDataSize ) { - CALL_CRYPTO_SERVICE (Pkcs7Sign, (PrivateKey, PrivateKeySize, KeyPassword= , InData, InDataSize, SignCert, OtherCerts, SignedData, SignedDataSize), FA= LSE); + CALL_CRYPTO_SERVICE (Pkcs7Sign, (PrivateKey, PrivateKeySize, KeyPassword= , InData, InDataSize, SignCert, OtherCerts, SignedData, SignedDataSize), FA= LSE, 7); } =20 /** @@ -2995,7 +2999,7 @@ Pkcs7Verify ( IN UINTN DataLength ) { - CALL_CRYPTO_SERVICE (Pkcs7Verify, (P7Data, P7Length, TrustedCert, CertLe= ngth, InData, DataLength), FALSE); + CALL_CRYPTO_SERVICE (Pkcs7Verify, (P7Data, P7Length, TrustedCert, CertLe= ngth, InData, DataLength), FALSE, 7); } =20 /** @@ -3040,7 +3044,7 @@ VerifyEKUsInPkcs7Signature ( IN BOOLEAN RequireAllPresent ) { - CALL_CRYPTO_SERVICE (VerifyEKUsInPkcs7Signature, (Pkcs7Signature, Signat= ureSize, RequiredEKUs, RequiredEKUsSize, RequireAllPresent), FALSE); + CALL_CRYPTO_SERVICE (VerifyEKUsInPkcs7Signature, (Pkcs7Signature, Signat= ureSize, RequiredEKUs, RequiredEKUsSize, RequireAllPresent), FALSE, 7); } =20 /** @@ -3072,7 +3076,7 @@ Pkcs7GetAttachedContent ( OUT UINTN *ContentSize ) { - CALL_CRYPTO_SERVICE (Pkcs7GetAttachedContent, (P7Data, P7Length, Content= , ContentSize), FALSE); + CALL_CRYPTO_SERVICE (Pkcs7GetAttachedContent, (P7Data, P7Length, Content= , ContentSize), FALSE, 7); } =20 /** @@ -3110,7 +3114,7 @@ AuthenticodeVerify ( IN UINTN HashSize ) { - CALL_CRYPTO_SERVICE (AuthenticodeVerify, (AuthData, DataSize, TrustedCer= t, CertSize, ImageHash, HashSize), FALSE); + CALL_CRYPTO_SERVICE (AuthenticodeVerify, (AuthData, DataSize, TrustedCer= t, CertSize, ImageHash, HashSize), FALSE, 7); } =20 /** @@ -3143,7 +3147,7 @@ ImageTimestampVerify ( OUT EFI_TIME *SigningTime ) { - CALL_CRYPTO_SERVICE (ImageTimestampVerify, (AuthData, DataSize, TsaCert,= CertSize, SigningTime), FALSE); + CALL_CRYPTO_SERVICE (ImageTimestampVerify, (AuthData, DataSize, TsaCert,= CertSize, SigningTime), FALSE, 7); } =20 // =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D @@ -3164,7 +3168,7 @@ DhNew ( VOID ) { - CALL_CRYPTO_SERVICE (DhNew, (), NULL); + CALL_CRYPTO_SERVICE (DhNew, (), NULL, 7); } =20 /** @@ -3181,7 +3185,7 @@ DhFree ( IN VOID *DhContext ) { - CALL_VOID_CRYPTO_SERVICE (DhFree, (DhContext)); + CALL_VOID_CRYPTO_SERVICE (DhFree, (DhContext), 7); } =20 /** @@ -3217,7 +3221,7 @@ DhGenerateParameter ( OUT UINT8 *Prime ) { - CALL_CRYPTO_SERVICE (DhGenerateParameter, (DhContext, Generator, PrimeLe= ngth, Prime), FALSE); + CALL_CRYPTO_SERVICE (DhGenerateParameter, (DhContext, Generator, PrimeLe= ngth, Prime), FALSE, 7); } =20 /** @@ -3252,7 +3256,7 @@ DhSetParameter ( IN CONST UINT8 *Prime ) { - CALL_CRYPTO_SERVICE (DhSetParameter, (DhContext, Generator, PrimeLength,= Prime), FALSE); + CALL_CRYPTO_SERVICE (DhSetParameter, (DhContext, Generator, PrimeLength,= Prime), FALSE, 7); } =20 /** @@ -3287,7 +3291,7 @@ DhGenerateKey ( IN OUT UINTN *PublicKeySize ) { - CALL_CRYPTO_SERVICE (DhGenerateKey, (DhContext, PublicKey, PublicKeySize= ), FALSE); + CALL_CRYPTO_SERVICE (DhGenerateKey, (DhContext, PublicKey, PublicKeySize= ), FALSE, 7); } =20 /** @@ -3326,7 +3330,7 @@ DhComputeKey ( IN OUT UINTN *KeySize ) { - CALL_CRYPTO_SERVICE (DhComputeKey, (DhContext, PeerPublicKey, PeerPublic= KeySize, Key, KeySize), FALSE); + CALL_CRYPTO_SERVICE (DhComputeKey, (DhContext, PeerPublicKey, PeerPublic= KeySize, Key, KeySize), FALSE, 7); } =20 // =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D @@ -3358,7 +3362,7 @@ RandomSeed ( IN UINTN SeedSize ) { - CALL_CRYPTO_SERVICE (RandomSeed, (Seed, SeedSize), FALSE); + CALL_CRYPTO_SERVICE (RandomSeed, (Seed, SeedSize), FALSE, 7); } =20 /** @@ -3382,7 +3386,7 @@ RandomBytes ( IN UINTN Size ) { - CALL_CRYPTO_SERVICE (RandomBytes, (Output, Size), FALSE); + CALL_CRYPTO_SERVICE (RandomBytes, (Output, Size), FALSE, 7); } =20 // =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D @@ -3418,7 +3422,7 @@ HkdfSha256ExtractAndExpand ( IN UINTN OutSize ) { - CALL_CRYPTO_SERVICE (HkdfSha256ExtractAndExpand, (Key, KeySize, Salt, Sa= ltSize, Info, InfoSize, Out, OutSize), FALSE); + CALL_CRYPTO_SERVICE (HkdfSha256ExtractAndExpand, (Key, KeySize, Salt, Sa= ltSize, Info, InfoSize, Out, OutSize), FALSE, 7); } =20 /** @@ -3446,7 +3450,7 @@ HkdfSha256Extract ( UINTN PrkOutSize ) { - CALL_CRYPTO_SERVICE (HkdfSha256Extract, (Key, KeySize, Salt, SaltSize, P= rkOut, PrkOutSize), FALSE); + CALL_CRYPTO_SERVICE (HkdfSha256Extract, (Key, KeySize, Salt, SaltSize, P= rkOut, PrkOutSize), FALSE, 10); } =20 /** @@ -3474,7 +3478,7 @@ HkdfSha256Expand ( IN UINTN OutSize ) { - CALL_CRYPTO_SERVICE (HkdfSha256Expand, (Prk, PrkSize, Info, InfoSize, Ou= t, OutSize), FALSE); + CALL_CRYPTO_SERVICE (HkdfSha256Expand, (Prk, PrkSize, Info, InfoSize, Ou= t, OutSize), FALSE, 10); } =20 /** @@ -3506,7 +3510,7 @@ HkdfSha384ExtractAndExpand ( IN UINTN OutSize ) { - CALL_CRYPTO_SERVICE (HkdfSha384ExtractAndExpand, (Key, KeySize, Salt, Sa= ltSize, Info, InfoSize, Out, OutSize), FALSE); + CALL_CRYPTO_SERVICE (HkdfSha384ExtractAndExpand, (Key, KeySize, Salt, Sa= ltSize, Info, InfoSize, Out, OutSize), FALSE, 10); } =20 /** @@ -3534,7 +3538,7 @@ HkdfSha384Extract ( UINTN PrkOutSize ) { - CALL_CRYPTO_SERVICE (HkdfSha384Extract, (Key, KeySize, Salt, SaltSize, P= rkOut, PrkOutSize), FALSE); + CALL_CRYPTO_SERVICE (HkdfSha384Extract, (Key, KeySize, Salt, SaltSize, P= rkOut, PrkOutSize), FALSE, 10); } =20 /** @@ -3562,7 +3566,7 @@ HkdfSha384Expand ( IN UINTN OutSize ) { - CALL_CRYPTO_SERVICE (HkdfSha384Expand, (Prk, PrkSize, Info, InfoSize, Ou= t, OutSize), FALSE); + CALL_CRYPTO_SERVICE (HkdfSha384Expand, (Prk, PrkSize, Info, InfoSize, Ou= t, OutSize), FALSE, 10); } =20 /** @@ -3582,7 +3586,7 @@ TlsInitialize ( VOID ) { - CALL_CRYPTO_SERVICE (TlsInitialize, (), FALSE); + CALL_CRYPTO_SERVICE (TlsInitialize, (), FALSE, 7); } =20 /** @@ -3597,7 +3601,7 @@ TlsCtxFree ( IN VOID *TlsCtx ) { - CALL_VOID_CRYPTO_SERVICE (TlsCtxFree, (TlsCtx)); + CALL_VOID_CRYPTO_SERVICE (TlsCtxFree, (TlsCtx), 7); } =20 /** @@ -3618,7 +3622,7 @@ TlsCtxNew ( IN UINT8 MinorVer ) { - CALL_CRYPTO_SERVICE (TlsCtxNew, (MajorVer, MinorVer), NULL); + CALL_CRYPTO_SERVICE (TlsCtxNew, (MajorVer, MinorVer), NULL, 7); } =20 /** @@ -3636,7 +3640,7 @@ TlsFree ( IN VOID *Tls ) { - CALL_VOID_CRYPTO_SERVICE (TlsFree, (Tls)); + CALL_VOID_CRYPTO_SERVICE (TlsFree, (Tls), 7); } =20 /** @@ -3658,7 +3662,7 @@ TlsNew ( IN VOID *TlsCtx ) { - CALL_CRYPTO_SERVICE (TlsNew, (TlsCtx), NULL); + CALL_CRYPTO_SERVICE (TlsNew, (TlsCtx), NULL, 7); } =20 /** @@ -3678,7 +3682,7 @@ TlsInHandshake ( IN VOID *Tls ) { - CALL_CRYPTO_SERVICE (TlsInHandshake, (Tls), FALSE); + CALL_CRYPTO_SERVICE (TlsInHandshake, (Tls), FALSE, 7); } =20 /** @@ -3717,7 +3721,7 @@ TlsDoHandshake ( IN OUT UINTN *BufferOutSize ) { - CALL_CRYPTO_SERVICE (TlsDoHandshake, (Tls, BufferIn, BufferInSize, Buffe= rOut, BufferOutSize), EFI_UNSUPPORTED); + CALL_CRYPTO_SERVICE (TlsDoHandshake, (Tls, BufferIn, BufferInSize, Buffe= rOut, BufferOutSize), EFI_UNSUPPORTED, 7); } =20 /** @@ -3755,7 +3759,7 @@ TlsHandleAlert ( IN OUT UINTN *BufferOutSize ) { - CALL_CRYPTO_SERVICE (TlsHandleAlert, (Tls, BufferIn, BufferInSize, Buffe= rOut, BufferOutSize), EFI_UNSUPPORTED); + CALL_CRYPTO_SERVICE (TlsHandleAlert, (Tls, BufferIn, BufferInSize, Buffe= rOut, BufferOutSize), EFI_UNSUPPORTED, 7); } =20 /** @@ -3784,7 +3788,7 @@ TlsCloseNotify ( IN OUT UINTN *BufferSize ) { - CALL_CRYPTO_SERVICE (TlsCloseNotify, (Tls, Buffer, BufferSize), EFI_UNSU= PPORTED); + CALL_CRYPTO_SERVICE (TlsCloseNotify, (Tls, Buffer, BufferSize), EFI_UNSU= PPORTED, 7); } =20 /** @@ -3809,7 +3813,7 @@ TlsCtrlTrafficOut ( IN UINTN BufferSize ) { - CALL_CRYPTO_SERVICE (TlsCtrlTrafficOut, (Tls, Buffer, BufferSize), 0); + CALL_CRYPTO_SERVICE (TlsCtrlTrafficOut, (Tls, Buffer, BufferSize), 0, 7)= ; } =20 /** @@ -3834,7 +3838,7 @@ TlsCtrlTrafficIn ( IN UINTN BufferSize ) { - CALL_CRYPTO_SERVICE (TlsCtrlTrafficIn, (Tls, Buffer, BufferSize), 0); + CALL_CRYPTO_SERVICE (TlsCtrlTrafficIn, (Tls, Buffer, BufferSize), 0, 7); } =20 /** @@ -3860,7 +3864,7 @@ TlsRead ( IN UINTN BufferSize ) { - CALL_CRYPTO_SERVICE (TlsRead, (Tls, Buffer, BufferSize), 0); + CALL_CRYPTO_SERVICE (TlsRead, (Tls, Buffer, BufferSize), 0, 7); } =20 /** @@ -3886,7 +3890,7 @@ TlsWrite ( IN UINTN BufferSize ) { - CALL_CRYPTO_SERVICE (TlsWrite, (Tls, Buffer, BufferSize), 0); + CALL_CRYPTO_SERVICE (TlsWrite, (Tls, Buffer, BufferSize), 0, 7); } =20 /** @@ -3908,7 +3912,7 @@ TlsShutdown ( IN VOID *Tls ) { - CALL_CRYPTO_SERVICE (TlsShutdown, (Tls), EFI_UNSUPPORTED); + CALL_CRYPTO_SERVICE (TlsShutdown, (Tls), EFI_UNSUPPORTED, 14); } =20 /** @@ -3933,7 +3937,7 @@ TlsSetVersion ( IN UINT8 MinorVer ) { - CALL_CRYPTO_SERVICE (TlsSetVersion, (Tls, MajorVer, MinorVer), EFI_UNSUP= PORTED); + CALL_CRYPTO_SERVICE (TlsSetVersion, (Tls, MajorVer, MinorVer), EFI_UNSUP= PORTED, 7); } =20 /** @@ -3956,7 +3960,7 @@ TlsSetConnectionEnd ( IN BOOLEAN IsServer ) { - CALL_CRYPTO_SERVICE (TlsSetConnectionEnd, (Tls, IsServer), EFI_UNSUPPORT= ED); + CALL_CRYPTO_SERVICE (TlsSetConnectionEnd, (Tls, IsServer), EFI_UNSUPPORT= ED, 7); } =20 /** @@ -3985,7 +3989,7 @@ TlsSetCipherList ( IN UINTN CipherNum ) { - CALL_CRYPTO_SERVICE (TlsSetCipherList, (Tls, CipherId, CipherNum), EFI_U= NSUPPORTED); + CALL_CRYPTO_SERVICE (TlsSetCipherList, (Tls, CipherId, CipherNum), EFI_U= NSUPPORTED, 7); } =20 /** @@ -4006,7 +4010,7 @@ TlsSetCompressionMethod ( IN UINT8 CompMethod ) { - CALL_CRYPTO_SERVICE (TlsSetCompressionMethod, (CompMethod), EFI_UNSUPPOR= TED); + CALL_CRYPTO_SERVICE (TlsSetCompressionMethod, (CompMethod), EFI_UNSUPPOR= TED, 7); } =20 /** @@ -4025,7 +4029,7 @@ TlsSetVerify ( IN UINT32 VerifyMode ) { - CALL_VOID_CRYPTO_SERVICE (TlsSetVerify, (Tls, VerifyMode)); + CALL_VOID_CRYPTO_SERVICE (TlsSetVerify, (Tls, VerifyMode), 7); } =20 /** @@ -4048,7 +4052,7 @@ TlsSetVerifyHost ( IN CHAR8 *HostName ) { - CALL_CRYPTO_SERVICE (TlsSetVerifyHost, (Tls, Flags, HostName), EFI_UNSUP= PORTED); + CALL_CRYPTO_SERVICE (TlsSetVerifyHost, (Tls, Flags, HostName), EFI_UNSUP= PORTED, 7); } =20 /** @@ -4074,7 +4078,7 @@ TlsSetSessionId ( IN UINT16 SessionIdLen ) { - CALL_CRYPTO_SERVICE (TlsSetSessionId, (Tls, SessionId, SessionIdLen), EF= I_UNSUPPORTED); + CALL_CRYPTO_SERVICE (TlsSetSessionId, (Tls, SessionId, SessionIdLen), EF= I_UNSUPPORTED, 7); } =20 /** @@ -4102,7 +4106,7 @@ TlsSetCaCertificate ( IN UINTN DataSize ) { - CALL_CRYPTO_SERVICE (TlsSetCaCertificate, (Tls, Data, DataSize), EFI_UNS= UPPORTED); + CALL_CRYPTO_SERVICE (TlsSetCaCertificate, (Tls, Data, DataSize), EFI_UNS= UPPORTED, 7); } =20 /** @@ -4130,7 +4134,7 @@ TlsSetHostPublicCert ( IN UINTN DataSize ) { - CALL_CRYPTO_SERVICE (TlsSetHostPublicCert, (Tls, Data, DataSize), EFI_UN= SUPPORTED); + CALL_CRYPTO_SERVICE (TlsSetHostPublicCert, (Tls, Data, DataSize), EFI_UN= SUPPORTED, 7); } =20 /** @@ -4160,7 +4164,7 @@ TlsSetHostPrivateKeyEx ( IN VOID *Password OPTIONAL ) { - CALL_CRYPTO_SERVICE (TlsSetHostPrivateKeyEx, (Tls, Data, DataSize, Passw= ord), EFI_UNSUPPORTED); + CALL_CRYPTO_SERVICE (TlsSetHostPrivateKeyEx, (Tls, Data, DataSize, Passw= ord), EFI_UNSUPPORTED, 14); } =20 /** @@ -4187,7 +4191,7 @@ TlsSetHostPrivateKey ( IN UINTN DataSize ) { - CALL_CRYPTO_SERVICE (TlsSetHostPrivateKey, (Tls, Data, DataSize), EFI_UN= SUPPORTED); + CALL_CRYPTO_SERVICE (TlsSetHostPrivateKey, (Tls, Data, DataSize), EFI_UN= SUPPORTED, 14); } =20 /** @@ -4211,7 +4215,7 @@ TlsSetCertRevocationList ( IN UINTN DataSize ) { - CALL_CRYPTO_SERVICE (TlsSetCertRevocationList, (Data, DataSize), EFI_UNS= UPPORTED); + CALL_CRYPTO_SERVICE (TlsSetCertRevocationList, (Data, DataSize), EFI_UNS= UPPORTED, 7); } =20 /** @@ -4239,7 +4243,7 @@ TlsSetSignatureAlgoList ( IN UINTN DataSize ) { - CALL_CRYPTO_SERVICE (TlsSetSignatureAlgoList, (Tls, Data, DataSize), EFI= _UNSUPPORTED); + CALL_CRYPTO_SERVICE (TlsSetSignatureAlgoList, (Tls, Data, DataSize), EFI= _UNSUPPORTED, 14); } =20 /** @@ -4264,7 +4268,7 @@ TlsSetEcCurve ( IN UINTN DataSize ) { - CALL_CRYPTO_SERVICE (TlsSetSignatureAlgoList, (Tls, Data, DataSize), EFI= _UNSUPPORTED); + CALL_CRYPTO_SERVICE (TlsSetEcCurve, (Tls, Data, DataSize), EFI_UNSUPPORT= ED, 14); } =20 /** @@ -4286,7 +4290,7 @@ TlsGetVersion ( IN VOID *Tls ) { - CALL_CRYPTO_SERVICE (TlsGetVersion, (Tls), 0); + CALL_CRYPTO_SERVICE (TlsGetVersion, (Tls), 0, 7); } =20 /** @@ -4308,7 +4312,7 @@ TlsGetConnectionEnd ( IN VOID *Tls ) { - CALL_CRYPTO_SERVICE (TlsGetConnectionEnd, (Tls), 0); + CALL_CRYPTO_SERVICE (TlsGetConnectionEnd, (Tls), 0, 7); } =20 /** @@ -4332,7 +4336,7 @@ TlsGetCurrentCipher ( IN OUT UINT16 *CipherId ) { - CALL_CRYPTO_SERVICE (TlsGetCurrentCipher, (Tls, CipherId), EFI_UNSUPPORT= ED); + CALL_CRYPTO_SERVICE (TlsGetCurrentCipher, (Tls, CipherId), EFI_UNSUPPORT= ED, 7); } =20 /** @@ -4358,7 +4362,7 @@ TlsGetCurrentCompressionId ( IN OUT UINT8 *CompressionId ) { - CALL_CRYPTO_SERVICE (TlsGetCurrentCompressionId, (Tls, CompressionId), E= FI_UNSUPPORTED); + CALL_CRYPTO_SERVICE (TlsGetCurrentCompressionId, (Tls, CompressionId), E= FI_UNSUPPORTED, 7); } =20 /** @@ -4380,7 +4384,7 @@ TlsGetVerify ( IN VOID *Tls ) { - CALL_CRYPTO_SERVICE (TlsGetVerify, (Tls), 0); + CALL_CRYPTO_SERVICE (TlsGetVerify, (Tls), 0, 7); } =20 /** @@ -4406,7 +4410,7 @@ TlsGetSessionId ( IN OUT UINT16 *SessionIdLen ) { - CALL_CRYPTO_SERVICE (TlsGetSessionId, (Tls, SessionId, SessionIdLen), EF= I_UNSUPPORTED); + CALL_CRYPTO_SERVICE (TlsGetSessionId, (Tls, SessionId, SessionIdLen), EF= I_UNSUPPORTED, 7); } =20 /** @@ -4427,7 +4431,7 @@ TlsGetClientRandom ( IN OUT UINT8 *ClientRandom ) { - CALL_VOID_CRYPTO_SERVICE (TlsGetClientRandom, (Tls, ClientRandom)); + CALL_VOID_CRYPTO_SERVICE (TlsGetClientRandom, (Tls, ClientRandom), 7); } =20 /** @@ -4448,7 +4452,7 @@ TlsGetServerRandom ( IN OUT UINT8 *ServerRandom ) { - CALL_VOID_CRYPTO_SERVICE (TlsGetServerRandom, (Tls, ServerRandom)); + CALL_VOID_CRYPTO_SERVICE (TlsGetServerRandom, (Tls, ServerRandom), 7); } =20 /** @@ -4472,7 +4476,7 @@ TlsGetKeyMaterial ( IN OUT UINT8 *KeyMaterial ) { - CALL_CRYPTO_SERVICE (TlsGetKeyMaterial, (Tls, KeyMaterial), EFI_UNSUPPOR= TED); + CALL_CRYPTO_SERVICE (TlsGetKeyMaterial, (Tls, KeyMaterial), EFI_UNSUPPOR= TED, 7); } =20 /** @@ -4499,7 +4503,7 @@ TlsGetCaCertificate ( IN OUT UINTN *DataSize ) { - CALL_CRYPTO_SERVICE (TlsGetCaCertificate, (Tls, Data, DataSize), EFI_UNS= UPPORTED); + CALL_CRYPTO_SERVICE (TlsGetCaCertificate, (Tls, Data, DataSize), EFI_UNS= UPPORTED, 7); } =20 /** @@ -4527,7 +4531,7 @@ TlsGetHostPublicCert ( IN OUT UINTN *DataSize ) { - CALL_CRYPTO_SERVICE (TlsGetHostPublicCert, (Tls, Data, DataSize), EFI_UN= SUPPORTED); + CALL_CRYPTO_SERVICE (TlsGetHostPublicCert, (Tls, Data, DataSize), EFI_UN= SUPPORTED, 7); } =20 /** @@ -4554,7 +4558,7 @@ TlsGetHostPrivateKey ( IN OUT UINTN *DataSize ) { - CALL_CRYPTO_SERVICE (TlsGetHostPrivateKey, (Tls, Data, DataSize), EFI_UN= SUPPORTED); + CALL_CRYPTO_SERVICE (TlsGetHostPrivateKey, (Tls, Data, DataSize), EFI_UN= SUPPORTED, 7); } =20 /** @@ -4579,7 +4583,7 @@ TlsGetCertRevocationList ( IN OUT UINTN *DataSize ) { - CALL_CRYPTO_SERVICE (TlsGetCertRevocationList, (Data, DataSize), EFI_UNS= UPPORTED); + CALL_CRYPTO_SERVICE (TlsGetCertRevocationList, (Data, DataSize), EFI_UNS= UPPORTED, 7); } =20 /** @@ -4615,7 +4619,8 @@ TlsGetExportKey ( TlsGetExportKey, (Tls, Label, Context, ContextLen, KeyBuffer, KeyBufferLen), - EFI_UNSUPPORTED + EFI_UNSUPPORTED, + 14 ); } =20 @@ -4634,7 +4639,7 @@ BigNumInit ( VOID ) { - CALL_CRYPTO_SERVICE (BigNumInit, (), NULL); + CALL_CRYPTO_SERVICE (BigNumInit, (), NULL, 12); } =20 /** @@ -4652,7 +4657,7 @@ BigNumFromBin ( IN UINTN Len ) { - CALL_CRYPTO_SERVICE (BigNumFromBin, (Buf, Len), NULL); + CALL_CRYPTO_SERVICE (BigNumFromBin, (Buf, Len), NULL, 12); } =20 /** @@ -4671,7 +4676,7 @@ BigNumToBin ( OUT UINT8 *Buf ) { - CALL_CRYPTO_SERVICE (BigNumToBin, (Bn, Buf), -1); + CALL_CRYPTO_SERVICE (BigNumToBin, (Bn, Buf), -1, 12); } =20 /** @@ -4687,7 +4692,7 @@ BigNumFree ( IN BOOLEAN Clear ) { - CALL_VOID_CRYPTO_SERVICE (BigNumFree, (Bn, Clear)); + CALL_VOID_CRYPTO_SERVICE (BigNumFree, (Bn, Clear), 12); } =20 /** @@ -4710,7 +4715,7 @@ BigNumAdd ( OUT VOID *BnRes ) { - CALL_CRYPTO_SERVICE (BigNumAdd, (BnA, BnB, BnRes), FALSE); + CALL_CRYPTO_SERVICE (BigNumAdd, (BnA, BnB, BnRes), FALSE, 12); } =20 /** @@ -4733,7 +4738,7 @@ BigNumSub ( OUT VOID *BnRes ) { - CALL_CRYPTO_SERVICE (BigNumSub, (BnA, BnB, BnRes), FALSE); + CALL_CRYPTO_SERVICE (BigNumSub, (BnA, BnB, BnRes), FALSE, 12); } =20 /** @@ -4756,7 +4761,7 @@ BigNumMod ( OUT VOID *BnRes ) { - CALL_CRYPTO_SERVICE (BigNumMod, (BnA, BnB, BnRes), FALSE); + CALL_CRYPTO_SERVICE (BigNumMod, (BnA, BnB, BnRes), FALSE, 12); } =20 /** @@ -4781,7 +4786,7 @@ BigNumExpMod ( OUT VOID *BnRes ) { - CALL_CRYPTO_SERVICE (BigNumExpMod, (BnA, BnP, BnM, BnRes), FALSE); + CALL_CRYPTO_SERVICE (BigNumExpMod, (BnA, BnP, BnM, BnRes), FALSE, 12); } =20 /** @@ -4804,7 +4809,7 @@ BigNumInverseMod ( OUT VOID *BnRes ) { - CALL_CRYPTO_SERVICE (BigNumInverseMod, (BnA, BnM, BnRes), FALSE); + CALL_CRYPTO_SERVICE (BigNumInverseMod, (BnA, BnM, BnRes), FALSE, 12); } =20 /** @@ -4827,7 +4832,7 @@ BigNumDiv ( OUT VOID *BnRes ) { - CALL_CRYPTO_SERVICE (BigNumDiv, (BnA, BnB, BnRes), FALSE); + CALL_CRYPTO_SERVICE (BigNumDiv, (BnA, BnB, BnRes), FALSE, 12); } =20 /** @@ -4852,7 +4857,7 @@ BigNumMulMod ( OUT VOID *BnRes ) { - CALL_CRYPTO_SERVICE (BigNumMulMod, (BnA, BnB, BnM, BnRes), FALSE); + CALL_CRYPTO_SERVICE (BigNumMulMod, (BnA, BnB, BnM, BnRes), FALSE, 12); } =20 /** @@ -4872,7 +4877,7 @@ BigNumCmp ( IN CONST VOID *BnB ) { - CALL_CRYPTO_SERVICE (BigNumCmp, (BnA, BnB), 0); + CALL_CRYPTO_SERVICE (BigNumCmp, (BnA, BnB), 0, 12); } =20 /** @@ -4888,7 +4893,7 @@ BigNumBits ( IN CONST VOID *Bn ) { - CALL_CRYPTO_SERVICE (BigNumBits, (Bn), 0); + CALL_CRYPTO_SERVICE (BigNumBits, (Bn), 0, 12); } =20 /** @@ -4904,7 +4909,7 @@ BigNumBytes ( IN CONST VOID *Bn ) { - CALL_CRYPTO_SERVICE (BigNumBytes, (Bn), 0); + CALL_CRYPTO_SERVICE (BigNumBytes, (Bn), 0, 12); } =20 /** @@ -4923,7 +4928,7 @@ BigNumIsWord ( IN UINTN Num ) { - CALL_CRYPTO_SERVICE (BigNumIsWord, (Bn, Num), FALSE); + CALL_CRYPTO_SERVICE (BigNumIsWord, (Bn, Num), FALSE, 12); } =20 /** @@ -4940,7 +4945,7 @@ BigNumIsOdd ( IN CONST VOID *Bn ) { - CALL_CRYPTO_SERVICE (BigNumIsOdd, (Bn), FALSE); + CALL_CRYPTO_SERVICE (BigNumIsOdd, (Bn), FALSE, 12); } =20 /** @@ -4959,7 +4964,7 @@ BigNumCopy ( IN CONST VOID *BnSrc ) { - CALL_CRYPTO_SERVICE (BigNumCopy, (BnDst, BnSrc), NULL); + CALL_CRYPTO_SERVICE (BigNumCopy, (BnDst, BnSrc), NULL, 12); } =20 /** @@ -4974,7 +4979,7 @@ BigNumValueOne ( VOID ) { - CALL_CRYPTO_SERVICE (BigNumValueOne, (), NULL); + CALL_CRYPTO_SERVICE (BigNumValueOne, (), NULL, 12); } =20 /** @@ -4997,7 +5002,7 @@ BigNumRShift ( OUT VOID *BnRes ) { - CALL_CRYPTO_SERVICE (BigNumRShift, (Bn, N, BnRes), FALSE); + CALL_CRYPTO_SERVICE (BigNumRShift, (Bn, N, BnRes), FALSE, 12); } =20 /** @@ -5013,7 +5018,7 @@ BigNumConstTime ( IN VOID *Bn ) { - CALL_VOID_CRYPTO_SERVICE (BigNumConstTime, (Bn)); + CALL_VOID_CRYPTO_SERVICE (BigNumConstTime, (Bn), 12); } =20 /** @@ -5036,7 +5041,7 @@ BigNumSqrMod ( OUT VOID *BnRes ) { - CALL_CRYPTO_SERVICE (BigNumSqrMod, (BnA, BnM, BnRes), FALSE); + CALL_CRYPTO_SERVICE (BigNumSqrMod, (BnA, BnM, BnRes), FALSE, 12); } =20 /** @@ -5052,7 +5057,7 @@ BigNumNewContext ( VOID ) { - CALL_CRYPTO_SERVICE (BigNumNewContext, (), NULL); + CALL_CRYPTO_SERVICE (BigNumNewContext, (), NULL, 12); } =20 /** @@ -5066,7 +5071,7 @@ BigNumContextFree ( IN VOID *BnCtx ) { - CALL_VOID_CRYPTO_SERVICE (BigNumContextFree, (BnCtx)); + CALL_VOID_CRYPTO_SERVICE (BigNumContextFree, (BnCtx), 12); } =20 /** @@ -5085,7 +5090,7 @@ BigNumSetUint ( IN UINTN Val ) { - CALL_CRYPTO_SERVICE (BigNumSetUint, (Bn, Val), FALSE); + CALL_CRYPTO_SERVICE (BigNumSetUint, (Bn, Val), FALSE, 12); } =20 /** @@ -5108,7 +5113,7 @@ BigNumAddMod ( OUT VOID *BnRes ) { - CALL_CRYPTO_SERVICE (BigNumAddMod, (BnA, BnB, BnM, BnRes), FALSE); + CALL_CRYPTO_SERVICE (BigNumAddMod, (BnA, BnB, BnM, BnRes), FALSE, 12); } =20 /** @@ -5128,7 +5133,7 @@ EcGroupInit ( IN UINTN CryptoNid ) { - CALL_CRYPTO_SERVICE (EcGroupInit, (CryptoNid), NULL); + CALL_CRYPTO_SERVICE (EcGroupInit, (CryptoNid), NULL, 13); } =20 /** @@ -5156,7 +5161,7 @@ EcGroupGetCurve ( IN VOID *BnCtx ) { - CALL_CRYPTO_SERVICE (EcGroupGetCurve, (EcGroup, BnPrime, BnA, BnB, BnCtx= ), FALSE); + CALL_CRYPTO_SERVICE (EcGroupGetCurve, (EcGroup, BnPrime, BnA, BnB, BnCtx= ), FALSE, 13); } =20 /** @@ -5178,7 +5183,7 @@ EcGroupGetOrder ( OUT VOID *BnOrder ) { - CALL_CRYPTO_SERVICE (EcGroupGetOrder, (EcGroup, BnOrder), FALSE); + CALL_CRYPTO_SERVICE (EcGroupGetOrder, (EcGroup, BnOrder), FALSE, 13); } =20 /** @@ -5192,7 +5197,7 @@ EcGroupFree ( IN VOID *EcGroup ) { - CALL_VOID_CRYPTO_SERVICE (EcGroupFree, (EcGroup)); + CALL_VOID_CRYPTO_SERVICE (EcGroupFree, (EcGroup), 13); } =20 /** @@ -5210,7 +5215,7 @@ EcPointInit ( IN CONST VOID *EcGroup ) { - CALL_CRYPTO_SERVICE (EcPointInit, (EcGroup), NULL); + CALL_CRYPTO_SERVICE (EcPointInit, (EcGroup), NULL, 13); } =20 /** @@ -5226,7 +5231,7 @@ EcPointDeInit ( IN BOOLEAN Clear ) { - CALL_VOID_CRYPTO_SERVICE (EcPointDeInit, (EcPoint, Clear)); + CALL_VOID_CRYPTO_SERVICE (EcPointDeInit, (EcPoint, Clear), 13); } =20 /** @@ -5254,7 +5259,7 @@ EcPointGetAffineCoordinates ( IN VOID *BnCtx ) { - CALL_CRYPTO_SERVICE (EcPointGetAffineCoordinates, (EcGroup, EcPoint, BnX= , BnY, BnCtx), FALSE); + CALL_CRYPTO_SERVICE (EcPointGetAffineCoordinates, (EcGroup, EcPoint, BnX= , BnY, BnCtx), FALSE, 13); } =20 /** @@ -5279,7 +5284,7 @@ EcPointSetAffineCoordinates ( IN VOID *BnCtx ) { - CALL_CRYPTO_SERVICE (EcPointSetAffineCoordinates, (EcGroup, EcPoint, BnX= , BnY, BnCtx), FALSE); + CALL_CRYPTO_SERVICE (EcPointSetAffineCoordinates, (EcGroup, EcPoint, BnX= , BnY, BnCtx), FALSE, 13); } =20 /** @@ -5305,7 +5310,7 @@ EcPointAdd ( IN VOID *BnCtx ) { - CALL_CRYPTO_SERVICE (EcPointAdd, (EcGroup, EcPointResult, EcPointA, EcPo= intB, BnCtx), FALSE); + CALL_CRYPTO_SERVICE (EcPointAdd, (EcGroup, EcPointResult, EcPointA, EcPo= intB, BnCtx), FALSE, 13); } =20 /** @@ -5331,7 +5336,7 @@ EcPointMul ( IN VOID *BnCtx ) { - CALL_CRYPTO_SERVICE (EcPointMul, (EcGroup, EcPointResult, EcPoint, BnPSc= alar, BnCtx), FALSE); + CALL_CRYPTO_SERVICE (EcPointMul, (EcGroup, EcPointResult, EcPoint, BnPSc= alar, BnCtx), FALSE, 13); } =20 /** @@ -5352,7 +5357,7 @@ EcPointInvert ( IN VOID *BnCtx ) { - CALL_CRYPTO_SERVICE (EcPointInvert, (EcGroup, EcPoint, BnCtx), FALSE); + CALL_CRYPTO_SERVICE (EcPointInvert, (EcGroup, EcPoint, BnCtx), FALSE, 13= ); } =20 /** @@ -5373,7 +5378,7 @@ EcPointIsOnCurve ( IN VOID *BnCtx ) { - CALL_CRYPTO_SERVICE (EcPointIsOnCurve, (EcGroup, EcPoint, BnCtx), FALSE)= ; + CALL_CRYPTO_SERVICE (EcPointIsOnCurve, (EcGroup, EcPoint, BnCtx), FALSE,= 13); } =20 /** @@ -5392,7 +5397,7 @@ EcPointIsAtInfinity ( IN CONST VOID *EcPoint ) { - CALL_CRYPTO_SERVICE (EcPointIsAtInfinity, (EcGroup, EcPoint), FALSE); + CALL_CRYPTO_SERVICE (EcPointIsAtInfinity, (EcGroup, EcPoint), FALSE, 13)= ; } =20 /** @@ -5415,7 +5420,7 @@ EcPointEqual ( IN VOID *BnCtx ) { - CALL_CRYPTO_SERVICE (EcPointEqual, (EcGroup, EcPointA, EcPointB, BnCtx),= FALSE); + CALL_CRYPTO_SERVICE (EcPointEqual, (EcGroup, EcPointA, EcPointB, BnCtx),= FALSE, 13); } =20 /** @@ -5445,7 +5450,7 @@ EcPointSetCompressedCoordinates ( IN VOID *BnCtx ) { - CALL_CRYPTO_SERVICE (EcPointSetCompressedCoordinates, (EcGroup, EcPoint,= BnX, YBit, BnCtx), FALSE); + CALL_CRYPTO_SERVICE (EcPointSetCompressedCoordinates, (EcGroup, EcPoint,= BnX, YBit, BnCtx), FALSE, 13); } =20 /** @@ -5462,7 +5467,7 @@ EcNewByNid ( IN UINTN Nid ) { - CALL_CRYPTO_SERVICE (EcNewByNid, (Nid), NULL); + CALL_CRYPTO_SERVICE (EcNewByNid, (Nid), NULL, 13); } =20 /** @@ -5476,7 +5481,7 @@ EcFree ( IN VOID *EcContext ) { - CALL_VOID_CRYPTO_SERVICE (EcFree, (EcContext)); + CALL_VOID_CRYPTO_SERVICE (EcFree, (EcContext), 13); } =20 /** @@ -5513,7 +5518,7 @@ EcGenerateKey ( IN OUT UINTN *PublicKeySize ) { - CALL_CRYPTO_SERVICE (EcGenerateKey, (EcContext, PublicKey, PublicKeySize= ), FALSE); + CALL_CRYPTO_SERVICE (EcGenerateKey, (EcContext, PublicKey, PublicKeySize= ), FALSE, 13); } =20 /** @@ -5538,7 +5543,7 @@ EcGetPubKey ( IN OUT UINTN *PublicKeySize ) { - CALL_CRYPTO_SERVICE (EcGetPubKey, (EcContext, PublicKey, PublicKeySize),= FALSE); + CALL_CRYPTO_SERVICE (EcGetPubKey, (EcContext, PublicKey, PublicKeySize),= FALSE, 13); } =20 /** @@ -5577,7 +5582,7 @@ EcDhComputeKey ( IN OUT UINTN *KeySize ) { - CALL_CRYPTO_SERVICE (EcDhComputeKey, (EcContext, PeerPublic, PeerPublicS= ize, CompressFlag, Key, KeySize), FALSE); + CALL_CRYPTO_SERVICE (EcDhComputeKey, (EcContext, PeerPublic, PeerPublicS= ize, CompressFlag, Key, KeySize), FALSE, 13); } =20 /** @@ -5604,7 +5609,7 @@ EcGetPublicKeyFromX509 ( OUT VOID **EcContext ) { - CALL_CRYPTO_SERVICE (EcGetPublicKeyFromX509, (Cert, CertSize, EcContext)= , FALSE); + CALL_CRYPTO_SERVICE (EcGetPublicKeyFromX509, (Cert, CertSize, EcContext)= , FALSE, 15); } =20 /** @@ -5633,7 +5638,7 @@ EcGetPrivateKeyFromPem ( OUT VOID **EcContext ) { - CALL_CRYPTO_SERVICE (EcGetPrivateKeyFromPem, (PemData, PemSize, Password= , EcContext), FALSE); + CALL_CRYPTO_SERVICE (EcGetPrivateKeyFromPem, (PemData, PemSize, Password= , EcContext), FALSE, 15); } =20 /** @@ -5676,7 +5681,7 @@ EcDsaSign ( IN OUT UINTN *SigSize ) { - CALL_CRYPTO_SERVICE (EcDsaSign, (EcContext, HashNid, MessageHash, HashSi= ze, Signature, SigSize), FALSE); + CALL_CRYPTO_SERVICE (EcDsaSign, (EcContext, HashNid, MessageHash, HashSi= ze, Signature, SigSize), FALSE, 15); } =20 /** @@ -5713,5 +5718,5 @@ EcDsaVerify ( IN UINTN SigSize ) { - CALL_CRYPTO_SERVICE (EcDsaVerify, (EcContext, HashNid, MessageHash, Hash= Size, Signature, SigSize), FALSE); + CALL_CRYPTO_SERVICE (EcDsaVerify, (EcContext, HashNid, MessageHash, Hash= Size, Signature, SigSize), FALSE, 15); } diff --git a/CryptoPkg/Library/BaseCryptLibOnProtocolPpi/DxeCryptLib.c b/Cr= yptoPkg/Library/BaseCryptLibOnProtocolPpi/DxeCryptLib.c index dc7527bb01..fe9cdc0d4d 100644 --- a/CryptoPkg/Library/BaseCryptLibOnProtocolPpi/DxeCryptLib.c +++ b/CryptoPkg/Library/BaseCryptLibOnProtocolPpi/DxeCryptLib.c @@ -49,7 +49,6 @@ DxeCryptLibConstructor ( ) { EFI_STATUS Status; - UINTN Version; =20 Status =3D gBS->LocateProtocol ( &gEdkiiCryptoProtocolGuid, @@ -65,13 +64,5 @@ DxeCryptLibConstructor ( return EFI_NOT_FOUND; } =20 - Version =3D mCryptoProtocol->GetVersion (); - if (Version < EDKII_CRYPTO_VERSION) { - DEBUG ((DEBUG_ERROR, "[DxeCryptLib] Crypto Protocol unsupported versio= n %d\n", Version)); - ASSERT (Version >=3D EDKII_CRYPTO_VERSION); - mCryptoProtocol =3D NULL; - return EFI_NOT_FOUND; - } - return EFI_SUCCESS; } diff --git a/CryptoPkg/Library/BaseCryptLibOnProtocolPpi/PeiCryptLib.c b/Cr= yptoPkg/Library/BaseCryptLibOnProtocolPpi/PeiCryptLib.c index 51f858302f..6ad1d3afe0 100644 --- a/CryptoPkg/Library/BaseCryptLibOnProtocolPpi/PeiCryptLib.c +++ b/CryptoPkg/Library/BaseCryptLibOnProtocolPpi/PeiCryptLib.c @@ -30,7 +30,6 @@ GetCryptoServices ( { EFI_STATUS Status; EDKII_CRYPTO_PPI *CryptoPpi; - UINTN Version; =20 CryptoPpi =3D NULL; Status =3D PeiServicesLocatePpi ( @@ -46,12 +45,5 @@ GetCryptoServices ( return NULL; } =20 - Version =3D CryptoPpi->GetVersion (); - if (Version < EDKII_CRYPTO_VERSION) { - DEBUG ((DEBUG_ERROR, "[PeiCryptLib] Crypto PPI unsupported version %d\= n", Version)); - ASSERT (Version >=3D EDKII_CRYPTO_VERSION); - return NULL; - } - return (VOID *)CryptoPpi; } diff --git a/CryptoPkg/Library/BaseCryptLibOnProtocolPpi/SmmCryptLib.c b/Cr= yptoPkg/Library/BaseCryptLibOnProtocolPpi/SmmCryptLib.c index be0f44e63b..6c7c75c8a7 100644 --- a/CryptoPkg/Library/BaseCryptLibOnProtocolPpi/SmmCryptLib.c +++ b/CryptoPkg/Library/BaseCryptLibOnProtocolPpi/SmmCryptLib.c @@ -52,7 +52,6 @@ SmmCryptLibConstructor ( ) { EFI_STATUS Status; - UINTN Version; =20 Status =3D gSmst->SmmLocateProtocol ( &gEdkiiSmmCryptoProtocolGuid, @@ -67,13 +66,5 @@ SmmCryptLibConstructor ( return EFI_NOT_FOUND; } =20 - Version =3D mSmmCryptoProtocol->GetVersion (); - if (Version < EDKII_CRYPTO_VERSION) { - DEBUG ((DEBUG_ERROR, "[SmmCryptLib] Crypto SMM Protocol unsupported ve= rsion %d\n", Version)); - ASSERT (Version >=3D EDKII_CRYPTO_VERSION); - mSmmCryptoProtocol =3D NULL; - return EFI_NOT_FOUND; - } - return EFI_SUCCESS; } --=20 2.31.1.windows.1