From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web09.1002.1648250926075849685 for ; Fri, 25 Mar 2022 16:28:47 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=Q3legyww; spf=pass (domain: intel.com, ip: 192.55.52.93, mailfrom: judah.vang@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1648250927; x=1679786927; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=QWRdgEWDpL3U0Pl8U3czWy1GPYgkveNFpmje6+RATts=; b=Q3legyww6CiJAjG3k9wJd1xzJ4LKdomvUK3eoqMpcWjUyEkuWmnS1X+g +NNS8ZFrAk5q+AFYfMof+LrST4sLOM9IJYBXRWrVF7XUmONlfVTzfGQ21 b6gttMKRaCpYe3IqKv3xUU6KJ+UPgRwQFqS6Z9LZ7vMBlE9fTAx7NjfyF RO4zIb2B8XoQYkFK8VJi3pnKwams7Y9X6TuAyIwhkL4rt7uc+Q+B6pn3K m+skrV+A88mZ0BZkL5GCu0WHoOXCV/3x21W2TczgBt8a19PE03ESfIBSM 0L/PZqN1IRI9lKpsG9IaZMnwqSqu3yg1BIukxkJjS1SaDmmkfVF3/tujh A==; X-IronPort-AV: E=McAfee;i="6200,9189,10297"; a="256309544" X-IronPort-AV: E=Sophos;i="5.90,211,1643702400"; d="scan'208";a="256309544" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Mar 2022 16:28:47 -0700 X-IronPort-AV: E=Sophos;i="5.90,211,1643702400"; d="scan'208";a="638366625" Received: from jvang-mobl.amr.corp.intel.com ([10.212.95.18]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Mar 2022 16:28:46 -0700 From: "Judah Vang" To: devel@edk2.groups.io Cc: Judah Vang , Jiewen Yao , Jian J Wang , Xiaoyu Lu , Guomin Jiang , Nishant C Mistry Subject: [PATCH v1 28/28] CryptoPkg: Enable cypto HMAC KDF library Date: Fri, 25 Mar 2022 16:28:25 -0700 Message-Id: <20220325232825.2167-24-judah.vang@intel.com> X-Mailer: git-send-email 2.35.1.windows.2 In-Reply-To: <20220325232825.2167-1-judah.vang@intel.com> References: <20220325232825.2167-1-judah.vang@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2594 RPMC features requires HMAC-SHA256 support during SMM phase. Cc: Jiewen Yao Cc: Jian J Wang Cc: Xiaoyu Lu Cc: Guomin Jiang Cc: Nishant C Mistry Signed-off-by: Judah Vang --- CryptoPkg/Library/BaseCryptLib/SmmCryptLib.inf | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/CryptoPkg/Library/BaseCryptLib/SmmCryptLib.inf b/CryptoPkg/Library/BaseCryptLib/SmmCryptLib.inf index 8f39517f78b7..c862448bf12b 100644 --- a/CryptoPkg/Library/BaseCryptLib/SmmCryptLib.inf +++ b/CryptoPkg/Library/BaseCryptLib/SmmCryptLib.inf @@ -43,7 +43,7 @@ [Sources] Hash/CryptCShake256.c Hash/CryptParallelHash.c Hmac/CryptHmacSha256.c - Kdf/CryptHkdfNull.c + Kdf/CryptHkdf.c Cipher/CryptAes.c Pk/CryptRsaBasic.c Pk/CryptRsaExtNull.c -- 2.26.2.windows.1