From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) by mx.groups.io with SMTP id smtpd.web11.10109.1671591877026722017 for ; Tue, 20 Dec 2022 19:04:39 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=PhB7zD3b; spf=pass (domain: intel.com, ip: 192.55.52.151, mailfrom: judah.vang@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1671591879; x=1703127879; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=vVQpg62hsJlMhNje4zf8xfvaqEOTeqi/5qHVz1gi/vQ=; b=PhB7zD3b6Or1G4wMe/+/kT7ojIhT8DaqWE0COfwOO0QHbmArooLQD/+0 qE1piF903kIVNhl4ByeVglTJKOumgdyMwvkYSwSuNV/+JGMliRCoq+vv7 axZkVXol4eL4rQs3qTUAUg6QlXfabssKCXMs+y/HwGL7+4dRPMdoI0g35 iRME6smKf/lIm6u29B6hiGIt0wAyB5W4odY7+o6Kn1xaF8RkBRdNDda5L AZjE88Bksbim4ISaRidD7gI/LTYmqzRERE8SjuGDgvswsW4uNa2LjSNHS YwzvNMD/Yrk+9epD5iGXKmKU0oKF/vOz/s21jVcWgAnhxiFVBmk8lELCQ Q==; X-IronPort-AV: E=McAfee;i="6500,9779,10567"; a="300116156" X-IronPort-AV: E=Sophos;i="5.96,261,1665471600"; d="scan'208";a="300116156" Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Dec 2022 19:04:36 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10567"; a="628966727" X-IronPort-AV: E=Sophos;i="5.96,261,1665471600"; d="scan'208";a="628966727" Received: from jvang-mobl.amr.corp.intel.com ([10.209.79.47]) by orsmga006-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Dec 2022 19:04:36 -0800 From: "Judah Vang" To: devel@edk2.groups.io Cc: Jiewen Yao , Jian J Wang , Xiaoyu Lu , Guomin Jiang , Nishant C Mistry Subject: [PATCH v2 1/1] CryptoPkg: Need to enable crypto functions Date: Tue, 20 Dec 2022 19:04:18 -0800 Message-Id: <20221221030418.1137-2-judah.vang@intel.com> X-Mailer: git-send-email 2.35.1.windows.2 In-Reply-To: <20221221030418.1137-1-judah.vang@intel.com> References: <20221221030418.1137-1-judah.vang@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3992 V2: Update Readme and CryptoPkg.dsc to reflect changes and be in sync. V1: Enable CryptAes for PEI phase. Enable CryptHkdf for SMM phase. Update Readme.md Cc: Jiewen Yao Cc: Jian J Wang Cc: Xiaoyu Lu Cc: Guomin Jiang Cc: Nishant C Mistry Signed-off-by: Jian J Wang Signed-off-by: Nishant C Mistry Signed-off-by: Judah Vang --- CryptoPkg/CryptoPkg.dsc | 8 +++++++- CryptoPkg/Readme.md | 12 ++++++------ 2 files changed, 13 insertions(+), 7 deletions(-) diff --git a/CryptoPkg/CryptoPkg.dsc b/CryptoPkg/CryptoPkg.dsc index 3b245979c34c..4676193e8953 100644 --- a/CryptoPkg/CryptoPkg.dsc +++ b/CryptoPkg/CryptoPkg.dsc @@ -2,7 +2,7 @@ # Cryptographic Library Package for UEFI Security Implementation. # PEIM, DXE Driver, and SMM Driver with all crypto services enabled. # -# Copyright (c) 2009 - 2021, Intel Corporation. All rights reserved.
+# Copyright (c) 2009 - 2022, Intel Corporation. All rights reserved.
# Copyright (c) 2020, Hewlett Packard Enterprise Development LP. All rights reserved.
# Copyright (c) 2022, Loongson Technology Corporation Limited. All rights reserved.
# SPDX-License-Identifier: BSD-2-Clause-Patent @@ -239,6 +239,11 @@ [PcdsFixedAtBuild] gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.Free | TRUE gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.SetKey | TRUE gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Pkcs.Services.Pkcs5HashPassword | TRUE + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Aes.Services.GetContextSize | TRUE + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Aes.Services.Init | TRUE + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Aes.Services.CbcEncrypt | TRUE + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Aes.Services.CbcDecrypt | TRUE + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Hkdf.Family | PCD_CRYPTO_SERVICE_ENABLE_FAMILY !endif # @@ -278,6 +283,7 @@ [PcdsFixedAtBuild] gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Aes.Services.CbcDecrypt | TRUE gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.AeadAesGcm.Services.Encrypt | TRUE gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.AeadAesGcm.Services.Decrypt | TRUE + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Hkdf.Family | PCD_CRYPTO_SERVICE_ENABLE_FAMILY !endif ################################################################################################### diff --git a/CryptoPkg/Readme.md b/CryptoPkg/Readme.md index cb072db72397..284a16f299fd 100644 --- a/CryptoPkg/Readme.md +++ b/CryptoPkg/Readme.md @@ -207,15 +207,15 @@ also configured. | Sha512 | N | N | C | C | C | C | C | | X509 | N | N | | | C | C | C | | Tdes | Y | Y | | | | | | -| Aes.GetContextSize | N | N | | | C | C | C | -| Aes.Init | N | N | | | C | C | C | +| Aes.GetContextSize | N | N | | C | C | C | C | +| Aes.Init | N | N | | C | C | C | C | | Aes.EcbEncrypt | Y | Y | | | | | | | Aes.EcbDecrypt | Y | Y | | | | | | -| Aes.CbcEncrypt | N | N | | | C | C | C | -| Aes.CbcDecrypt | N | N | | | C | C | C | +| Aes.CbcEncrypt | N | N | | C | C | C | C | +| Aes.CbcDecrypt | N | N | | C | C | C | C | | Arc4 | Y | Y | | | | | | | Sm3 | N | N | | C | C | C | C | -| Hkdf | N | N | | C | C | | C | +| Hkdf | N | N | | C | C | C | C | | Tls | N | N | | | C-Tls | | | | TlsSet | N | N | | | C-Tls | | | | TlsGet | N | N | | | C-Tls | | | @@ -460,7 +460,7 @@ and CryptoSmm modules. gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.Free | TRUE gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.SetKey | TRUE gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Pkcs.Services.Pkcs5HashPassword | TRUE - gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Hkdf.Services.Sha256ExtractAndExpand | TRUE + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Hkdf.Family | PCD_CRYPTO_SERVICE_ENABLE_FAMILY ``` #### Common DXE and SMM PcdCryptoServiceFamilyEnable Settings -- 2.35.1.windows.2