From nobody Sat Nov 2 16:30:25 2024 Delivered-To: importer@patchew.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Authentication-Results: mx.zoho.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org; Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1487995534709288.124349454671; Fri, 24 Feb 2017 20:05:34 -0800 (PST) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 8D506821A5; Fri, 24 Feb 2017 20:05:27 -0800 (PST) Received: from mga06.intel.com (mga06.intel.com [134.134.136.31]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 2E1A28219B for ; Fri, 24 Feb 2017 20:05:26 -0800 (PST) Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by orsmga104.jf.intel.com with ESMTP; 24 Feb 2017 20:05:26 -0800 Received: from shwdeopenpsi014.ccr.corp.intel.com ([10.239.9.13]) by fmsmga004.fm.intel.com with ESMTP; 24 Feb 2017 20:05:24 -0800 X-Original-To: edk2-devel@lists.01.org X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.35,202,1484035200"; d="scan'208";a="229518354" From: Hao Wu To: edk2-devel@lists.01.org Date: Sat, 25 Feb 2017 12:05:13 +0800 Message-Id: <1487995514-7628-6-git-send-email-hao.a.wu@intel.com> X-Mailer: git-send-email 1.9.5.msysgit.0 In-Reply-To: <1487995514-7628-1-git-send-email-hao.a.wu@intel.com> References: <1487995514-7628-1-git-send-email-hao.a.wu@intel.com> Subject: [edk2] [PATCH v3 5/6] SecurityPkg: Refine type cast for pointer subtraction X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Hao Wu , Chao Zhang MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" For pointer subtraction, the result is of type "ptrdiff_t". According to the C11 standard (Committee Draft - April 12, 2011): "When two pointers are subtracted, both shall point to elements of the same array object, or one past the last element of the array object; the result is the difference of the subscripts of the two array elements. The size of the result is implementation-defined, and its type (a signed integer type) is ptrdiff_t defined in the header. If the result is not representable in an object of that type, the behavior is undefined." In our codes, there are cases that the pointer subtraction is not performed by pointers to elements of the same array object. This might lead to potential issues, since the behavior is undefined according to C11 standard. Also, since the size of type "ptrdiff_t" is implementation-defined. Some static code checkers may warn that the pointer subtraction might underflow first and then being cast to a bigger size. For example: UINT8 *Ptr1, *Ptr2; UINTN PtrDiff; ... PtrDiff =3D (UINTN) (Ptr1 - Ptr2); The commit will refine the pointer subtraction expressions by casting each pointer to UINTN first and then perform the subtraction: PtrDiff =3D (UINTN) Ptr1 - (UINTN) Ptr2; Cc: Chao Zhang Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Acked-by: Laszlo Ersek Reviewed-by: Chao Zhang --- SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.c = | 16 ++++++++-------- SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c = | 10 +++++----- SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c = | 6 +++--- SecurityPkg/Tcg/Tcg2Dxe/MeasureBootPeCoff.c = | 10 +++++----- SecurityPkg/Tcg/TrEEDxe/MeasureBootPeCoff.c = | 10 +++++----- SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigImpl= .c | 12 ++++++------ 6 files changed, 32 insertions(+), 32 deletions(-) diff --git a/SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificati= onLib.c b/SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationL= ib.c index e28e106..588072c 100644 --- a/SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.c +++ b/SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.c @@ -391,13 +391,13 @@ HashPeImage ( // // Use PE32 offset. // - HashSize =3D (UINTN) ((UINT8 *) (&mNtHeader.Pe32->OptionalHeader.Check= Sum) - HashBase); + HashSize =3D (UINTN) (&mNtHeader.Pe32->OptionalHeader.CheckSum) - (UIN= TN) HashBase; NumberOfRvaAndSizes =3D mNtHeader.Pe32->OptionalHeader.NumberOfRvaAndS= izes; } else if (Magic =3D=3D EFI_IMAGE_NT_OPTIONAL_HDR64_MAGIC) { // // Use PE32+ offset. // - HashSize =3D (UINTN) ((UINT8 *) (&mNtHeader.Pe32Plus->OptionalHeader.C= heckSum) - HashBase); + HashSize =3D (UINTN) (&mNtHeader.Pe32Plus->OptionalHeader.CheckSum) - = (UINTN) HashBase; NumberOfRvaAndSizes =3D mNtHeader.Pe32Plus->OptionalHeader.NumberOfRva= AndSizes; } else { // @@ -425,13 +425,13 @@ HashPeImage ( // Use PE32 offset. // HashBase =3D (UINT8 *) &mNtHeader.Pe32->OptionalHeader.CheckSum + si= zeof (UINT32); - HashSize =3D mNtHeader.Pe32->OptionalHeader.SizeOfHeaders - (UINTN) = (HashBase - mImageBase); + HashSize =3D mNtHeader.Pe32->OptionalHeader.SizeOfHeaders - ((UINTN)= HashBase - (UINTN) mImageBase); } else { // // Use PE32+ offset. // HashBase =3D (UINT8 *) &mNtHeader.Pe32Plus->OptionalHeader.CheckSum = + sizeof (UINT32); - HashSize =3D mNtHeader.Pe32Plus->OptionalHeader.SizeOfHeaders - (UIN= TN) (HashBase - mImageBase); + HashSize =3D mNtHeader.Pe32Plus->OptionalHeader.SizeOfHeaders - ((UI= NTN) HashBase - (UINTN) mImageBase); } =20 if (HashSize !=3D 0) { @@ -449,13 +449,13 @@ HashPeImage ( // Use PE32 offset. // HashBase =3D (UINT8 *) &mNtHeader.Pe32->OptionalHeader.CheckSum + si= zeof (UINT32); - HashSize =3D (UINTN) ((UINT8 *) (&mNtHeader.Pe32->OptionalHeader.Dat= aDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY]) - HashBase); + HashSize =3D (UINTN) (&mNtHeader.Pe32->OptionalHeader.DataDirectory[= EFI_IMAGE_DIRECTORY_ENTRY_SECURITY]) - (UINTN) HashBase; } else { // // Use PE32+ offset. // HashBase =3D (UINT8 *) &mNtHeader.Pe32Plus->OptionalHeader.CheckSum = + sizeof (UINT32); - HashSize =3D (UINTN) ((UINT8 *) (&mNtHeader.Pe32Plus->OptionalHeader= .DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY]) - HashBase); + HashSize =3D (UINTN) (&mNtHeader.Pe32Plus->OptionalHeader.DataDirect= ory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY]) - (UINTN) HashBase; } =20 if (HashSize !=3D 0) { @@ -474,13 +474,13 @@ HashPeImage ( // Use PE32 offset // HashBase =3D (UINT8 *) &mNtHeader.Pe32->OptionalHeader.DataDirectory= [EFI_IMAGE_DIRECTORY_ENTRY_SECURITY + 1]; - HashSize =3D mNtHeader.Pe32->OptionalHeader.SizeOfHeaders - (UINTN) = (HashBase - mImageBase); + HashSize =3D mNtHeader.Pe32->OptionalHeader.SizeOfHeaders - ((UINTN)= HashBase - (UINTN) mImageBase); } else { // // Use PE32+ offset. // HashBase =3D (UINT8 *) &mNtHeader.Pe32Plus->OptionalHeader.DataDirec= tory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY + 1]; - HashSize =3D mNtHeader.Pe32Plus->OptionalHeader.SizeOfHeaders - (UIN= TN) (HashBase - mImageBase); + HashSize =3D mNtHeader.Pe32Plus->OptionalHeader.SizeOfHeaders - ((UI= NTN) HashBase - (UINTN) mImageBase); } =20 if (HashSize !=3D 0) { diff --git a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.= c b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c index 52bf582..8167a21 100644 --- a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c +++ b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c @@ -15,7 +15,7 @@ TcgMeasureGptTable() function will receive untrusted GPT partition table= , and parse partition data carefully. =20 -Copyright (c) 2009 - 2016, Intel Corporation. All rights reserved.
+Copyright (c) 2009 - 2017, Intel Corporation. All rights reserved.
This program and the accompanying materials=20 are licensed and made available under the terms and conditions of the BSD = License=20 which accompanies this distribution. The full text of the license may be = found at=20 @@ -443,13 +443,13 @@ TcgMeasurePeImage ( // Use PE32 offset // NumberOfRvaAndSizes =3D Hdr.Pe32->OptionalHeader.NumberOfRvaAndSizes; - HashSize =3D (UINTN) ((UINT8 *)(&Hdr.Pe32->OptionalHeader.CheckSum) - = HashBase); + HashSize =3D (UINTN) (&Hdr.Pe32->OptionalHeader.CheckSum) - (UINTN) Ha= shBase; } else { // // Use PE32+ offset // NumberOfRvaAndSizes =3D Hdr.Pe32Plus->OptionalHeader.NumberOfRvaAndSiz= es; - HashSize =3D (UINTN) ((UINT8 *)(&Hdr.Pe32Plus->OptionalHeader.CheckSum= ) - HashBase); + HashSize =3D (UINTN) (&Hdr.Pe32Plus->OptionalHeader.CheckSum) - (UINTN= ) HashBase; } =20 HashStatus =3D Sha1Update (Sha1Ctx, HashBase, HashSize); @@ -494,13 +494,13 @@ TcgMeasurePeImage ( // Use PE32 offset // HashBase =3D (UINT8 *) &Hdr.Pe32->OptionalHeader.CheckSum + sizeof (= UINT32); - HashSize =3D (UINTN) ((UINT8 *)(&Hdr.Pe32->OptionalHeader.DataDirect= ory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY]) - HashBase); + HashSize =3D (UINTN) (&Hdr.Pe32->OptionalHeader.DataDirectory[EFI_IM= AGE_DIRECTORY_ENTRY_SECURITY]) - (UINTN) HashBase; } else { // // Use PE32+ offset // =20 HashBase =3D (UINT8 *) &Hdr.Pe32Plus->OptionalHeader.CheckSum + size= of (UINT32); - HashSize =3D (UINTN) ((UINT8 *)(&Hdr.Pe32Plus->OptionalHeader.DataDi= rectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY]) - HashBase); + HashSize =3D (UINTN) (&Hdr.Pe32Plus->OptionalHeader.DataDirectory[EF= I_IMAGE_DIRECTORY_ENTRY_SECURITY]) - (UINTN) HashBase; } =20 if (HashSize !=3D 0) { diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c b/SecurityPkg/Li= brary/Tpm2CommandLib/Tpm2Help.c index 64d3c53..180f360 100644 --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c @@ -1,7 +1,7 @@ /** @file Implement TPM2 help. =20 -Copyright (c) 2013 - 2016, Intel Corporation. All rights reserved.
+Copyright (c) 2013 - 2017, Intel Corporation. All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the BSD = License which accompanies this distribution. The full text of the license may be = found at @@ -141,7 +141,7 @@ CopyAuthSessionCommand ( Buffer +=3D sizeof(UINT16); } =20 - return (UINT32)(UINTN)(Buffer - (UINT8 *)AuthSessionOut); + return (UINT32)((UINTN)Buffer - (UINTN)AuthSessionOut); } =20 /** @@ -186,7 +186,7 @@ CopyAuthSessionResponse ( CopyMem (AuthSessionOut->hmac.buffer, Buffer, AuthSessionOut->hmac.size); Buffer +=3D AuthSessionOut->hmac.size; =20 - return (UINT32)(UINTN)(Buffer - (UINT8 *)AuthSessionIn); + return (UINT32)((UINTN)Buffer - (UINTN)AuthSessionIn); } =20 /** diff --git a/SecurityPkg/Tcg/Tcg2Dxe/MeasureBootPeCoff.c b/SecurityPkg/Tcg/= Tcg2Dxe/MeasureBootPeCoff.c index de55ed9..8ee34a7 100644 --- a/SecurityPkg/Tcg/Tcg2Dxe/MeasureBootPeCoff.c +++ b/SecurityPkg/Tcg/Tcg2Dxe/MeasureBootPeCoff.c @@ -6,7 +6,7 @@ This external input must be validated carefully to avoid security issue = like buffer overflow, integer overflow. =20 -Copyright (c) 2015 - 2016, Intel Corporation. All rights reserved.
+Copyright (c) 2015 - 2017, Intel Corporation. All rights reserved.
This program and the accompanying materials=20 are licensed and made available under the terms and conditions of the BSD = License=20 which accompanies this distribution. The full text of the license may be = found at=20 @@ -206,13 +206,13 @@ MeasurePeImageAndExtend ( // Use PE32 offset // NumberOfRvaAndSizes =3D Hdr.Pe32->OptionalHeader.NumberOfRvaAndSizes; - HashSize =3D (UINTN) ((UINT8 *)(&Hdr.Pe32->OptionalHeader.CheckSum) - = HashBase); + HashSize =3D (UINTN) (&Hdr.Pe32->OptionalHeader.CheckSum) - (UINTN) Ha= shBase; } else { // // Use PE32+ offset // NumberOfRvaAndSizes =3D Hdr.Pe32Plus->OptionalHeader.NumberOfRvaAndSiz= es; - HashSize =3D (UINTN) ((UINT8 *)(&Hdr.Pe32Plus->OptionalHeader.CheckSum= ) - HashBase); + HashSize =3D (UINTN) (&Hdr.Pe32Plus->OptionalHeader.CheckSum) - (UINTN= ) HashBase; } =20 Status =3D HashUpdate (HashHandle, HashBase, HashSize); @@ -257,13 +257,13 @@ MeasurePeImageAndExtend ( // Use PE32 offset // HashBase =3D (UINT8 *) &Hdr.Pe32->OptionalHeader.CheckSum + sizeof (= UINT32); - HashSize =3D (UINTN) ((UINT8 *)(&Hdr.Pe32->OptionalHeader.DataDirect= ory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY]) - HashBase); + HashSize =3D (UINTN) (&Hdr.Pe32->OptionalHeader.DataDirectory[EFI_IM= AGE_DIRECTORY_ENTRY_SECURITY]) - (UINTN) HashBase; } else { // // Use PE32+ offset // =20 HashBase =3D (UINT8 *) &Hdr.Pe32Plus->OptionalHeader.CheckSum + size= of (UINT32); - HashSize =3D (UINTN) ((UINT8 *)(&Hdr.Pe32Plus->OptionalHeader.DataDi= rectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY]) - HashBase); + HashSize =3D (UINTN) (&Hdr.Pe32Plus->OptionalHeader.DataDirectory[EF= I_IMAGE_DIRECTORY_ENTRY_SECURITY]) - (UINTN) HashBase; } =20 if (HashSize !=3D 0) { diff --git a/SecurityPkg/Tcg/TrEEDxe/MeasureBootPeCoff.c b/SecurityPkg/Tcg/= TrEEDxe/MeasureBootPeCoff.c index b20fc70..a7de588 100644 --- a/SecurityPkg/Tcg/TrEEDxe/MeasureBootPeCoff.c +++ b/SecurityPkg/Tcg/TrEEDxe/MeasureBootPeCoff.c @@ -6,7 +6,7 @@ This external input must be validated carefully to avoid security issue = like buffer overflow, integer overflow. =20 -Copyright (c) 2013 - 2016, Intel Corporation. All rights reserved.
+Copyright (c) 2013 - 2017, Intel Corporation. All rights reserved.
This program and the accompanying materials=20 are licensed and made available under the terms and conditions of the BSD = License=20 which accompanies this distribution. The full text of the license may be = found at=20 @@ -206,13 +206,13 @@ MeasurePeImageAndExtend ( // Use PE32 offset // NumberOfRvaAndSizes =3D Hdr.Pe32->OptionalHeader.NumberOfRvaAndSizes; - HashSize =3D (UINTN) ((UINT8 *)(&Hdr.Pe32->OptionalHeader.CheckSum) - = HashBase); + HashSize =3D (UINTN) (&Hdr.Pe32->OptionalHeader.CheckSum) - (UINTN) Ha= shBase; } else { // // Use PE32+ offset // NumberOfRvaAndSizes =3D Hdr.Pe32Plus->OptionalHeader.NumberOfRvaAndSiz= es; - HashSize =3D (UINTN) ((UINT8 *)(&Hdr.Pe32Plus->OptionalHeader.CheckSum= ) - HashBase); + HashSize =3D (UINTN) (&Hdr.Pe32Plus->OptionalHeader.CheckSum) - (UINTN= ) HashBase; } =20 Status =3D HashUpdate (HashHandle, HashBase, HashSize); @@ -257,13 +257,13 @@ MeasurePeImageAndExtend ( // Use PE32 offset // HashBase =3D (UINT8 *) &Hdr.Pe32->OptionalHeader.CheckSum + sizeof (= UINT32); - HashSize =3D (UINTN) ((UINT8 *)(&Hdr.Pe32->OptionalHeader.DataDirect= ory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY]) - HashBase); + HashSize =3D (UINTN) (&Hdr.Pe32->OptionalHeader.DataDirectory[EFI_IM= AGE_DIRECTORY_ENTRY_SECURITY]) - (UINTN) HashBase; } else { // // Use PE32+ offset // =20 HashBase =3D (UINT8 *) &Hdr.Pe32Plus->OptionalHeader.CheckSum + size= of (UINT32); - HashSize =3D (UINTN) ((UINT8 *)(&Hdr.Pe32Plus->OptionalHeader.DataDi= rectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY]) - HashBase); + HashSize =3D (UINTN) (&Hdr.Pe32Plus->OptionalHeader.DataDirectory[EF= I_IMAGE_DIRECTORY_ENTRY_SECURITY]) - (UINTN) HashBase; } =20 if (HashSize !=3D 0) { diff --git a/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBo= otConfigImpl.c b/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/Secu= reBootConfigImpl.c index 6f58729..52804dd 100644 --- a/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfi= gImpl.c +++ b/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfi= gImpl.c @@ -1837,12 +1837,12 @@ HashPeImage ( // // Use PE32 offset. // - HashSize =3D (UINTN) ((UINT8 *) (&mNtHeader.Pe32->OptionalHeader.Check= Sum) - HashBase); + HashSize =3D (UINTN) (&mNtHeader.Pe32->OptionalHeader.CheckSum) - (UIN= TN) HashBase; } else { // // Use PE32+ offset. // - HashSize =3D (UINTN) ((UINT8 *) (&mNtHeader.Pe32Plus->OptionalHeader.C= heckSum) - HashBase); + HashSize =3D (UINTN) (&mNtHeader.Pe32Plus->OptionalHeader.CheckSum) - = (UINTN) HashBase; } =20 Status =3D mHash[HashAlg].HashUpdate(HashCtx, HashBase, HashSize); @@ -1859,13 +1859,13 @@ HashPeImage ( // Use PE32 offset. // HashBase =3D (UINT8 *) &mNtHeader.Pe32->OptionalHeader.CheckSum + size= of (UINT32); - HashSize =3D (UINTN) ((UINT8 *) (&mNtHeader.Pe32->OptionalHeader.DataD= irectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY]) - HashBase); + HashSize =3D (UINTN) (&mNtHeader.Pe32->OptionalHeader.DataDirectory[EF= I_IMAGE_DIRECTORY_ENTRY_SECURITY]) - (UINTN) HashBase; } else { // // Use PE32+ offset. // HashBase =3D (UINT8 *) &mNtHeader.Pe32Plus->OptionalHeader.CheckSum + = sizeof (UINT32); - HashSize =3D (UINTN) ((UINT8 *) (&mNtHeader.Pe32Plus->OptionalHeader.D= ataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY]) - HashBase); + HashSize =3D (UINTN) (&mNtHeader.Pe32Plus->OptionalHeader.DataDirector= y[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY]) - (UINTN) HashBase; } =20 Status =3D mHash[HashAlg].HashUpdate(HashCtx, HashBase, HashSize); @@ -1881,13 +1881,13 @@ HashPeImage ( // Use PE32 offset // HashBase =3D (UINT8 *) &mNtHeader.Pe32->OptionalHeader.DataDirectory[E= FI_IMAGE_DIRECTORY_ENTRY_SECURITY + 1]; - HashSize =3D mNtHeader.Pe32->OptionalHeader.SizeOfHeaders - (UINTN) ((= UINT8 *) (&mNtHeader.Pe32->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY= _ENTRY_SECURITY + 1]) - mImageBase); + HashSize =3D mNtHeader.Pe32->OptionalHeader.SizeOfHeaders - ((UINTN) (= &mNtHeader.Pe32->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SEC= URITY + 1]) - (UINTN) mImageBase); } else { // // Use PE32+ offset. // HashBase =3D (UINT8 *) &mNtHeader.Pe32Plus->OptionalHeader.DataDirecto= ry[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY + 1]; - HashSize =3D mNtHeader.Pe32Plus->OptionalHeader.SizeOfHeaders - (UINTN= ) ((UINT8 *) (&mNtHeader.Pe32Plus->OptionalHeader.DataDirectory[EFI_IMAGE_D= IRECTORY_ENTRY_SECURITY + 1]) - mImageBase); + HashSize =3D mNtHeader.Pe32Plus->OptionalHeader.SizeOfHeaders - ((UINT= N) (&mNtHeader.Pe32Plus->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_E= NTRY_SECURITY + 1]) - (UINTN) mImageBase); } =20 Status =3D mHash[HashAlg].HashUpdate(HashCtx, HashBase, HashSize); --=20 1.9.5.msysgit.0 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel