From nobody Tue Feb 10 04:12:41 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+105467+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+105467+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=intel.com ARC-Seal: i=1; a=rsa-sha256; t=1685472811; cv=none; d=zohomail.com; s=zohoarc; b=eUT3oio6+km9Dc/YYNPn6Ngj0s18OO74vJd2Eb714/4aLaJkylArPFZU8c1ji6Cxe4/rQQ4N21JqUhuCxqFRsUGFlE7axygv/+M18ZdzLmjZi/x2QKrQgVGF9DR9EYyRlenG/uTO244Ce+tIrNFEm9/8j5zsDdyfS4POF5zoiYs= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1685472811; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=fINgXcjpLiT5qjPFXULo2Fb4ynaOE4UVgBp6DpnkNco=; b=DAP3qeoiWPLTiBEnjrF0xynhxqLp5r6AtXWvjg+rxl7ts/OWTAI14qii3sjSrJzMGI3cIABPZpOhvY1YgYIZn+B99bc30sHtmMvS718QZnayenHn7n312LhSB34RJ/NqEe6WLsSz4XK3IMggjXqcDJAwczQXvs4zPCXBetPy1RE= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+105467+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1685472811867729.2102589199766; Tue, 30 May 2023 11:53:31 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id vifTYY1788612xZERfiZBUFG; Tue, 30 May 2023 11:53:31 -0700 X-Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web10.2491.1685472809773224682 for ; Tue, 30 May 2023 11:53:30 -0700 X-IronPort-AV: E=McAfee;i="6600,9927,10726"; a="352514925" X-IronPort-AV: E=Sophos;i="6.00,205,1681196400"; d="scan'208";a="352514925" X-Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 May 2023 11:53:30 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10726"; a="771675336" X-IronPort-AV: E=Sophos;i="6.00,205,1681196400"; d="scan'208";a="771675336" X-Received: from unknown (HELO mdkinney-mobl.amr.corp.intel.com) ([10.241.111.19]) by fmsmga008-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 May 2023 11:53:29 -0700 From: "Michael D Kinney" To: devel@edk2.groups.io Cc: Jiewen Yao , Jian J Wang , Oliver Smith-Denny , Pedro Falcato , Aaron Pop Subject: [edk2-devel] [Patch v2 2/3] SecurityPkg/Library/TpmCommandLib: Change xor to Xor Date: Tue, 30 May 2023 11:53:21 -0700 Message-Id: <20230530185322.70-3-michael.d.kinney@intel.com> In-Reply-To: <20230530185322.70-1-michael.d.kinney@intel.com> References: <20230530185322.70-1-michael.d.kinney@intel.com> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,michael.d.kinney@intel.com X-Gm-Message-State: KoGTHBN2QUez3fB0Bf2UzZEDx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1685472811; bh=d7Dy+77RVr0Rx4jtjEOokNsYrX839AOlqHusU8jhmgE=; h=Cc:Date:From:Reply-To:Subject:To; b=q6I+H+FDchb1LhN3b6rxiZaN12GuL9eIl5cUnOmsUCoNEbo0zh8gokOD/ODqmiKxqbj OliB6RyxR9IpEQ2DV4VFgAWg8Ha2O5TBQdNbKR1LjTCX841/6enM2li8LoGG5geMIX8wg +xp3l8nDhdQXvE1xJwOn0ZynF1HJinWkHTg= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1685472813593100007 Content-Type: text/plain; charset="utf-8" Change xor to Xor to avoid C++ reserved work name collisions when building with C++ compilers. Cc: Jiewen Yao Cc: Jian J Wang Cc: Oliver Smith-Denny Cc: Pedro Falcato Cc: Aaron Pop Signed-off-by: Michael D Kinney --- SecurityPkg/Library/Tpm2CommandLib/Tpm2Capability.c | 6 +++--- SecurityPkg/Library/Tpm2CommandLib/Tpm2Object.c | 6 +++--- SecurityPkg/Library/Tpm2CommandLib/Tpm2Session.c | 2 +- 3 files changed, 7 insertions(+), 7 deletions(-) diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Capability.c b/Security= Pkg/Library/Tpm2CommandLib/Tpm2Capability.c index f0e6019a47be..f8c781a445a1 100644 --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Capability.c +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Capability.c @@ -734,9 +734,9 @@ Tpm2TestParms ( Buffer +=3D sizeof (UINT16); break; case TPM_ALG_XOR: - WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Parameters->par= ameters.keyedHashDetail.scheme.details.xor.hashAlg)); + WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Parameters->par= ameters.keyedHashDetail.scheme.details.Xor.hashAlg)); Buffer +=3D sizeof (UINT16); - WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Parameters->par= ameters.keyedHashDetail.scheme.details.xor.kdf)); + WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Parameters->par= ameters.keyedHashDetail.scheme.details.Xor.kdf)); Buffer +=3D sizeof (UINT16); break; default: @@ -761,7 +761,7 @@ Tpm2TestParms ( Buffer +=3D sizeof (UINT16); break; case TPM_ALG_XOR: - WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Parameters->par= ameters.symDetail.keyBits.xor)); + WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Parameters->par= ameters.symDetail.keyBits.Xor)); Buffer +=3D sizeof (UINT16); break; case TPM_ALG_NULL: diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Object.c b/SecurityPkg/= Library/Tpm2CommandLib/Tpm2Object.c index 335957d6cedc..578a61b20339 100644 --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Object.c +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Object.c @@ -169,9 +169,9 @@ Tpm2ReadPublic ( Buffer = +=3D sizeof (UINT16); break; case TPM_ALG_XOR: - OutPublic->publicArea.parameters.keyedHashDetail.scheme.details.= xor.hashAlg =3D SwapBytes16 (ReadUnaligned16 ((UINT16 *)Buffer)); + OutPublic->publicArea.parameters.keyedHashDetail.scheme.details.= Xor.hashAlg =3D SwapBytes16 (ReadUnaligned16 ((UINT16 *)Buffer)); Buffer = +=3D sizeof (UINT16); - OutPublic->publicArea.parameters.keyedHashDetail.scheme.details.= xor.kdf =3D SwapBytes16 (ReadUnaligned16 ((UINT16 *)Buffer)); + OutPublic->publicArea.parameters.keyedHashDetail.scheme.details.= Xor.kdf =3D SwapBytes16 (ReadUnaligned16 ((UINT16 *)Buffer)); Buffer = +=3D sizeof (UINT16); break; default: @@ -195,7 +195,7 @@ Tpm2ReadPublic ( Buffer +=3D sizeo= f (UINT16); break; case TPM_ALG_XOR: - OutPublic->publicArea.parameters.symDetail.keyBits.xor =3D SwapB= ytes16 (ReadUnaligned16 ((UINT16 *)Buffer)); + OutPublic->publicArea.parameters.symDetail.keyBits.Xor =3D SwapB= ytes16 (ReadUnaligned16 ((UINT16 *)Buffer)); Buffer +=3D sizeo= f (UINT16); break; case TPM_ALG_NULL: diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Session.c b/SecurityPkg= /Library/Tpm2CommandLib/Tpm2Session.c index 7f247da301fe..e17318b6e6fb 100644 --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Session.c +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Session.c @@ -119,7 +119,7 @@ Tpm2StartAuthSession ( Buffer +=3D sizeof (UINT16); break; case TPM_ALG_XOR: - WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->keyBits.= xor)); + WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->keyBits.= Xor)); Buffer +=3D sizeof (UINT16); break; default: --=20 2.40.1.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#105467): https://edk2.groups.io/g/devel/message/105467 Mute This Topic: https://groups.io/mt/99226544/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/leave/3901457/1787277/102458076= /xyzzy [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-