Laszlo, There should be some places need to care about. I also need to check the detail.
I am ok to make the patch if it is not so urgent. Thanks, Star -----Original Message----- From: Laszlo Ersek [mailto:[email protected]] Sent: Wednesday, March 28, 2018 6:07 PM To: Zeng, Star <[email protected]>; Fu, Siyuan <[email protected]>; Wu, Jiaxin <[email protected]> Cc: edk2-devel-01 <[email protected]>; Daniel P. Berrange <[email protected]> Subject: Re: [edk2] internal structure of EFI_TLS_CA_CERTIFICATE_VARIABLE Hi Star, thanks for following up; comments below: On 03/28/18 05:28, Zeng, Star wrote: > Is there a PCD pointers to the siglist? We discussed that earlier, but because HttpDxe -- which consumes the certificate list -- is a UEFI driver, we decided that it should not consume dynamic PCDs. The alternative (specified in the UEFI spec) was variables. The earlier discussion wasn't exactly about the trusted CA cert list. Instead, it was about the trusted cipher algo list. However, both of these knobs pose the same "info channel" questions. So here's the link into the cipher algo list discussion: 895558F6EA4E3B41AC93A00D163B72741637DE9E@SHSMSX103.ccr.corp.intel.com">http://mid.mail-archive.com/895558F6EA4E3B41AC93A00D163B72741637DE9E@SHSMSX103.ccr.corp.intel.com > For adding PcdMaxVolatileVariableSize: non-authenticated, volatile, I think > it is acceptable if there are use cases. Thank you for accepting the idea in theory :) Do you think it is a simple change? Or is it intrusive? If it is intrusive, then I'd prefer if one of the variable driver maintainers wrote the patch. It's a complex driver and there can be hidden assumptions and relationships that I might miss. If it's a reasonably simple change then I'm happy to work on it. Thanks! Laszlo _______________________________________________ edk2-devel mailing list [email protected] https://lists.01.org/mailman/listinfo/edk2-devel

