audk/SecurityPkg/RandomNumberGenerator/RngDxe/Rand
Flickdm a85336531c SecurityPkg RngDxe: Remove incorrect limitation on GetRng
Removed from gEfiRngAlgorithmRaw an incorrect assumption that
Raw cannot return less than 256 bits. The DRNG Algorithms
should always use a 256 bit seed as per nist standards
however a caller is free to request less than 256 bits.
>
>     //
>    // When a DRBG is used on the output of a entropy source,
>    // its security level must be at least 256 bits according to UEFI
Spec.
>    //
>    if (RNGValueLength < 32) {
>      return EFI_INVALID_PARAMETER;
>    }
>

AARCH64 platforms do not have this limitation and this brings both
implementations into alignment with each other and the spec.

Cc: Jiewen Yao <jiewen.yao@intel.com>

Signed-off-by: Doug Flick [MSFT] <doug.edk2@gmail.com>
Reviewed-by: Ard Biesheuvel <ardb@kernel.org>
Reviewed-by: Pierre Gondois <pierre.gondois@arm.com>
Acked-by: Jiewe Yao <Jiewen.yao@intel.com>
2024-05-24 15:48:52 +00:00
..
AesCore.c SecurityPkg: Apply uncrustify changes 2021-12-07 17:24:28 +00:00
AesCore.h SecurityPkg: Apply uncrustify changes 2021-12-07 17:24:28 +00:00
RdRand.c SecurityPkg/RngDxe: Rename RdRandGenerateEntropy to generic name 2022-11-06 16:32:28 +00:00
RngDxe.c SecurityPkg RngDxe: Remove incorrect limitation on GetRng 2024-05-24 15:48:52 +00:00