From mboxrd@z Thu Jan 1 00:00:00 1970 Authentication-Results: mx.groups.io; dkim=missing; spf=pass (domain: intel.com, ip: 192.55.52.43, mailfrom: imran.desai@intel.com) Received: from mga05.intel.com (mga05.intel.com [192.55.52.43]) by groups.io with SMTP; Wed, 03 Jul 2019 17:47:32 -0700 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by fmsmga105.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 03 Jul 2019 17:47:31 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.63,449,1557212400"; d="scan'208";a="363206883" Received: from meknutso-mobl1.amr.corp.intel.com ([10.252.137.108]) by fmsmga006.fm.intel.com with ESMTP; 03 Jul 2019 17:47:30 -0700 From: "Imran Desai" To: devel@edk2.groups.io Cc: imran.desai@intel.com, imranodesai@gmail.com, Michael D Kinney , Liming Gao , Chao Zhang , Jiewen Yao , Jian Wang , Jordan Justen , Laszlo Ersek , Ard Biesheuvel , =?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= , Stefan Berger Subject: [PATCH v5 0/5] Implement SM3 measured boot Date: Wed, 3 Jul 2019 17:47:29 -0700 Message-Id: <20190704004729.77596-1-imran.desai@intel.com> X-Mailer: git-send-email 2.17.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=1781 EDK2 Support for SM3 digest algorithm is needed to enable TPM with SM3 PCR banks. This digest algorithm is part of the China Crypto algorithm suite. This integration has dependency on the openssl_1_1_1b integration into edk2. Cc: Michael D Kinney Cc: Liming Gao Cc: Chao Zhang Cc: Jiewen Yao Cc: Jian Wang Cc: Jordan Justen Cc: Laszlo Ersek Cc: Ard Biesheuvel Cc: Marc-André Lureau Cc: Stefan Berger Imran Desai (5): MdePkg/Protocol/Hash: introduce GUID for SM3 digest algorithm SecurityPkg: introduce the SM3 digest algorithm SecurityPkg/HashLibBaseCryptoRouter: recognize the SM3 digest algorithm SecurityPkg: set SM3 bit in TPM 2.0 hash mask by default OvmfPkg: link SM3 support into Tcg2Pei and Tcg2Dxe SecurityPkg/SecurityPkg.dec | 5 +- OvmfPkg/OvmfPkgIa32.dsc | 2 + OvmfPkg/OvmfPkgIa32X64.dsc | 2 + OvmfPkg/OvmfPkgX64.dsc | 2 + SecurityPkg/SecurityPkg.dsc | 3 + .../HashInstanceLibSm3/HashInstanceLibSm3.inf | 41 +++++ MdePkg/Include/Protocol/Hash.h | 5 + SecurityPkg/Include/Library/HashLib.h | 1 + .../HashInstanceLibSm3/HashInstanceLibSm3.c | 150 ++++++++++++++++++ .../HashLibBaseCryptoRouterCommon.c | 1 + .../HashInstanceLibSm3/HashInstanceLibSm3.uni | 15 ++ 11 files changed, 225 insertions(+), 2 deletions(-) create mode 100644 SecurityPkg/Library/HashInstanceLibSm3/HashInstanceLibSm3.inf create mode 100644 SecurityPkg/Library/HashInstanceLibSm3/HashInstanceLibSm3.c create mode 100644 SecurityPkg/Library/HashInstanceLibSm3/HashInstanceLibSm3.uni -- 2.17.0