Michael Kubacki 
							
						 
					 
					
						
						
							
						
						c411b485b6 
					 
					
						
						
							
							SecurityPkg: Apply uncrustify changes  
						
						... 
						
						
						
						REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3737 
Apply uncrustify changes to .c/.h files in the SecurityPkg package
Cc: Andrew Fish <afish@apple.com >
Cc: Leif Lindholm <leif@nuviainc.com >
Cc: Michael D Kinney <michael.d.kinney@intel.com >
Signed-off-by: Michael Kubacki <michael.kubacki@microsoft.com >
Reviewed-by: Jian J Wang <jian.j.wang@intel.com > 
						
						
					 
					
						2021-12-07 17:24:28 +00:00 
						 
				 
			
				
					
						
							
							
								Michael D Kinney 
							
						 
					 
					
						
						
							
						
						289b714b77 
					 
					
						
						
							
							SecurityPkg: Replace BSD License with BSD+Patent License  
						
						... 
						
						
						
						https://bugzilla.tianocore.org/show_bug.cgi?id=1373 
Replace BSD 2-Clause License with BSD+Patent License.  This change is
based on the following emails:
  https://lists.01.org/pipermail/edk2-devel/2019-February/036260.html 
  https://lists.01.org/pipermail/edk2-devel/2018-October/030385.html 
RFCs with detailed process for the license change:
  V3: https://lists.01.org/pipermail/edk2-devel/2019-March/038116.html 
  V2: https://lists.01.org/pipermail/edk2-devel/2019-March/037669.html 
  V1: https://lists.01.org/pipermail/edk2-devel/2019-March/037500.html 
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Michael D Kinney <michael.d.kinney@intel.com >
Reviewed-by: Jiewen Yao <Jiewen.yao@intel.com >
Reviewed-by: Jian J Wang <jian.j.wang@intel.com > 
					
						2019-04-09 10:58:23 -07:00 
						 
				 
			
				
					
						
							
							
								Zhang, Chao B 
							
						 
					 
					
						
						
							
						
						dd577319e8 
					 
					
						
						
							
							SecurityPkg Tpm2CommandLib: Fix TPM2.0 response memory overflow  
						
						... 
						
						
						
						TPM2.0 command lib always assumes TPM device and transmission channel can
respond correctly. But it is not true when communication channel is exploited
and wrong data is spoofed. Add more logic to prohibit memory overflow attack.
Cc: Long Qin <qin.long@intel.com >
Cc: Yao Jiewen <jiewen.yao@intel.com >
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Chao Zhang <chao.b.zhang@intel.com >
Reviewed-by: Long Qin <qin.long@intel.com >
Reviewed-by: Yao Jiewen <jiewen.yao@intel.com > 
						
						
					 
					
						2018-03-21 16:43:34 +08:00 
						 
				 
			
				
					
						
							
							
								Jiewen Yao 
							
						 
					 
					
						
						
							
						
						087132a84a 
					 
					
						
						
							
							SecurityPkg/TpmCommandLib: Add Tpm2ReadPublic.  
						
						... 
						
						
						
						Cc: Chao Zhang <chao.b.zhang@intel.com >
Cc: Long Qin <qin.long@intel.com >
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Yao Jiewen <jiewen.yao@intel.com >
Reviewed-by: Chao Zhang <chao.b.zhang@intel.com > 
						
						
					 
					
						2017-02-21 16:47:18 +08:00