From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) by mx.groups.io with SMTP id smtpd.web11.39144.1671497036207892346 for ; Mon, 19 Dec 2022 16:43:56 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=Nadu1wJj; spf=pass (domain: intel.com, ip: 192.55.52.151, mailfrom: judah.vang@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1671497036; x=1703033036; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=8cvh/HQcDK6qwY3nnf2xfmW2CC6NTCQeWc6ZXVdIPOQ=; b=Nadu1wJj7Hm+6UTgZ9SMGgk4Wsf0pIJQSTenWcAVrpdDUfcP2FhFVxI8 mbZL8oV6s0Nwf2YPJRyUB2oXpuKn46csuoJ6ekelvXQeSMoqy6mCgb2VU lUQ22GjT0JTaRQFveiQ1OGtZFl0VLHnbTRecGqfXdO/v8YGIl39XdkdSh 9pwvB2yCtc5y0tM1XJKB/l9bo3A/a2zOFCIGjccbx7MLDh+RYzJTIArMi heyTUfMMhq5iETC2HdLGdvVcnJuZZHDNxSRIjtOK9Iq8CYNp+B4V5auVb r17Z+RsY7dCb2CPmtRM8iCbu9w6tiu84XZYqAZORT90rk9qtyE1rWnx2y w==; X-IronPort-AV: E=McAfee;i="6500,9779,10566"; a="299831681" X-IronPort-AV: E=Sophos;i="5.96,258,1665471600"; d="scan'208";a="299831681" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Dec 2022 16:43:55 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10566"; a="650769435" X-IronPort-AV: E=Sophos;i="5.96,258,1665471600"; d="scan'208";a="650769435" Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16]) by orsmga002.jf.intel.com with ESMTP; 19 Dec 2022 16:43:55 -0800 Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16; Mon, 19 Dec 2022 16:43:54 -0800 Received: from orsmsx603.amr.corp.intel.com (10.22.229.16) by ORSMSX610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16; Mon, 19 Dec 2022 16:43:54 -0800 Received: from ORSEDG602.ED.cps.intel.com (10.7.248.7) by orsmsx603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16 via Frontend Transport; Mon, 19 Dec 2022 16:43:54 -0800 Received: from NAM11-BN8-obe.outbound.protection.outlook.com (104.47.58.168) by edgegateway.intel.com (134.134.137.103) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.16; Mon, 19 Dec 2022 16:43:54 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=YZBMAehgM+LkD5UBWeKlIGsdY/vB51Ynt2hEL+OntexBP+CCpMGsNV03D2LzW5AL+SCQXS9UG05IXuDI6fYJrpzt3bXz3KuUjn409GYpDThmFjTqJbWAV7ZvoAhFtJdQj8CH9tXgbw6WNjwJQMs75AvxyaQ0gZ1HTM2qgCVCGKxz/ijuEIKdK6InMgtOQDzFj2ILOYVgwFX6iF0Xo0O/K/OgvLcBcot7jYBzOKKybRenSuyOPAxOhpLDi/cwmrEPv8+TzVkVYIegs291+0xL2emxZFwvbdt6/ljy82qC+BdZPdmuCwg97SuLKqb3eIQGyJ7bKqTxsmQwAhjSkTFTDg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=O8RQaIIevZZpXE2eG/KrAUh72ThHgjIZHNqc15lW7ao=; b=BSWiYPcmkV4uPxLdehdzosmRXcsQ7GV9P3a0k7/OcPot52A6JsduH4AEDXlOYc33Fn2nhJ3uobZSLZixhjT+jIi8/aLDaoagKOr0VUzeB11/Oe7+P/xHAqUQm2AD/xH/FS5mY0edkcgWJR/ll4VZ/BnYr0uLtZqDMT6gWhb5NESEyAhscP00pZsfjlqr33eRDm8VT045U3nz+Ia/IOSKVl69LUv5HjGJ5Njo3bY6dmaEm4a5MBndPbY60dx0aWNurChL8sDMGTG+nA1Zl6gSOu1W/4/9YgAy5yMDFQytNu9UKGcphOykrRBEsaDAgiKn6BBwoTLFwBis8AMH0yaifA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from BL3PR11MB6434.namprd11.prod.outlook.com (2603:10b6:208:3ba::22) by BN9PR11MB5545.namprd11.prod.outlook.com (2603:10b6:408:102::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5924.16; Tue, 20 Dec 2022 00:43:50 +0000 Received: from BL3PR11MB6434.namprd11.prod.outlook.com ([fe80::c4e1:6f9b:9f0:aa64]) by BL3PR11MB6434.namprd11.prod.outlook.com ([fe80::c4e1:6f9b:9f0:aa64%8]) with mapi id 15.20.5924.016; Tue, 20 Dec 2022 00:43:50 +0000 From: "Judah Vang" To: "devel@edk2.groups.io" , "Vang, Judah" CC: "Yao, Jiewen" , "Wang, Jian J" , Xiaoyu Lu , "Jiang, Guomin" , "Mistry, Nishant C" Subject: Re: [edk2-devel] [PATCH v1 1/1] CryptoPkg: Need to enable crypto functions Thread-Topic: [edk2-devel] [PATCH v1 1/1] CryptoPkg: Need to enable crypto functions Thread-Index: AQHY8vakdG1r6vEKjUKJi3MMYKQ2fa52MZpQ Date: Tue, 20 Dec 2022 00:43:50 +0000 Message-ID: References: <20221107221553.3952-1-judah.vang@intel.com> <17256D461071259B.1802@groups.io> In-Reply-To: <17256D461071259B.1802@groups.io> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: BL3PR11MB6434:EE_|BN9PR11MB5545:EE_ x-ms-office365-filtering-correlation-id: ff417d9c-27ca-4bc6-6511-08dae22342f5 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BL3PR11MB6434.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230022)(366004)(39860400002)(136003)(396003)(346002)(376002)(451199015)(53546011)(71200400001)(6506007)(19627235002)(66899015)(2906002)(7696005)(478600001)(966005)(107886003)(316002)(110136005)(54906003)(76116006)(66946007)(66556008)(9686003)(8936002)(26005)(41300700001)(52536014)(186003)(4326008)(66446008)(83380400001)(82960400001)(122000001)(33656002)(38100700002)(5660300002)(55016003)(66476007)(86362001)(64756008)(8676002)(38070700005);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?Nn5pvxjLBLQPGkRhjK1f9MOvIB+6oIMybWMiM7DSp/s8ETqViBQmvlXPiN5e?= =?us-ascii?Q?2nkQY7ULVaclKGHXBMCGdndwTe0j9paVWsOfFn2Yx2JX6JRVPvIfaD1ykSN3?= =?us-ascii?Q?JvGH/WiOgWvbqMUbifXyh2LPnvEu0ItVUARGNwK0KYbuGLJbEFT0MSnHZ1FQ?= =?us-ascii?Q?qLgu7MMjmK2GNu9hWfxOPAFV/UpneQcKGmaGPWooKsbiPu2AS2gRQcveJ3Gf?= =?us-ascii?Q?6JBUM5bbXPHI9q7duxjMGqay9r11m4we7I0JXE1QAzMk3ey8qtxUg5W0lcdY?= =?us-ascii?Q?IYRuXDe9yuG+G5XYmDrcAMcr2wKd9AWZuT7YbelfVTTYcFA5ck2JDJSpK+n2?= =?us-ascii?Q?45BM3o1zDwlzpv6p426+7/BqVJU3ACdGJsqh0z4slUBxybf84kPwi6+Hzuox?= =?us-ascii?Q?BO8gRvDIXDkGwIlu10V/e7cyK1elvBeBu8UjzqAva8ptvLKkKzQwEYMvdF4t?= =?us-ascii?Q?mmH5RIRHBSGBI0ZuxI/vNrfclgh0paADWC/wVZJjofpLeTK0ouREwrvo5GQU?= =?us-ascii?Q?z14Uj3pBsd6ITZo5qY0H9weLSIk+que/vPGnzuQhRpPM6VswSMWvTjKtDD0V?= =?us-ascii?Q?zaXM2h4GhEfrO7SfPdFWZOrn4oKatILG6fAHopJRtPmnuFSlJUcO2FyshuQ4?= =?us-ascii?Q?mEblHzsKs56+thBn5vHviZPjM2/vfLIYvsUHgn7wo920U6IAKm1nTAGpXtyk?= =?us-ascii?Q?3AqawiDPS0zwhyKm/zoPwAp52nnOE/vmudI9WVLYYeVip2Su4S1jyCPnFinB?= =?us-ascii?Q?clnDvMdLZfzLF2LsWSOTnpJKl9Ly3cGlIY/++NM/RC3+R4ZpVj9LvRYlbZyS?= =?us-ascii?Q?66QZFf+TwKoPg+bgPgi5s7ZmSFcmnYB/aeMcAUqjwUFHwpkDVbMj6A3EDR4I?= =?us-ascii?Q?yrSwWa3MnX9Hms1dQkVMwzfIum+3AGjtqeD7mcAGl3tHgTfUoSB2xrUmiWUC?= =?us-ascii?Q?yXE1nzSLDI9J+geW5yDU2bcmu+9BWZaNH28LgWdonu3qUqF7TJgJ5xdSYn00?= =?us-ascii?Q?D5s/taFx8DmGwln5yLuQrjkyJeg/eGIp64mfopi2LB2xs55u7N4b1N5/6T6I?= =?us-ascii?Q?UVrHMNBGDsZfc3sF/x6LumUMss8Dd1IS1S2WY3BaK4fFZwIoFZME4C1b6BVO?= =?us-ascii?Q?jXdCAWI1mQ0avmPdSKFeXFT+1wj78XeIMIOnHz3juMlk8SXHlvRZ6Y26YJUT?= =?us-ascii?Q?c0EKkwj2nZ48YdQVYLf0OL67Z5aQXCQB+GkgwWACuOqUk1VgY25TTvBuCEi/?= =?us-ascii?Q?UZMEDX2Xdk7eL+JipUt7pmQtQZyX6zBAJOqIyhgKfJq9q74hrA9OBJe14dUE?= =?us-ascii?Q?7K5Q60ALEVcfyICsyNqXJVgRyfPiO4AHmL6a+/sBTzMUV3NrRgpYsewqJ6rS?= =?us-ascii?Q?2AysYU4c2zXD0i12xsExVHxsXSF2uPuG7D9V/XBe+Y5bvu2z14OruOUXt5y0?= =?us-ascii?Q?EkEakzAvqrhU+X3PKkKz54dJsdLLMCtAnOG5k8z/zCfX5Zt3ndJ7v67+InCC?= =?us-ascii?Q?YVUPK2TrqOqKqdodjPG8WHDi0EjBt2pIE8t0kkV2qujmGmtY6WS7STu90nr9?= =?us-ascii?Q?CdZyVKoiyBQqjcdhgcwsosUnm8g/nzr8cLOJkrat?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BL3PR11MB6434.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: ff417d9c-27ca-4bc6-6511-08dae22342f5 X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Dec 2022 00:43:50.0989 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: NehXOjWJUhM5GxoCg6DGrwMo7EkEiU+6FBP8refY613kJ6vlHNN17WrdnUifAT7K2O29jU8xjmwls04kkbQ55Q== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN9PR11MB5545 Return-Path: judah.vang@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi Jiewen, Has this patch been merged? This is an important change for the UEFI Protected Variable feature. Judah -----Original Message----- From: devel@edk2.groups.io On Behalf Of Judah Vang Sent: Monday, November 7, 2022 2:16 PM To: devel@edk2.groups.io Cc: Yao, Jiewen ; Wang, Jian J ; Xiaoyu Lu ; Jiang, Guomin = ; Mistry, Nishant C Subject: [edk2-devel] [PATCH v1 1/1] CryptoPkg: Need to enable crypto funct= ions REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3992 V1: Enable CryptAes for PEI phase. Enable CryptHkdf for SMM phase. Update Readme.md Cc: Jiewen Yao Cc: Jian J Wang Cc: Xiaoyu Lu Cc: Guomin Jiang Cc: Nishant C Mistry Signed-off-by: Jian J Wang Signed-off-by: Nishant C Mistry Signed-off-by: Judah Vang --- CryptoPkg/Library/BaseCryptLib/PeiCryptLib.inf | 2 +- CryptoPkg/Library/= BaseCryptLib/SmmCryptLib.inf | 2 +- CryptoPkg/Readme.md | 27 +++++++++++--------- 3 files changed, 17 insertions(+), 14 deletions(-) diff --git a/CryptoPkg/Library/BaseCryptLib/PeiCryptLib.inf b/CryptoPkg/Lib= rary/BaseCryptLib/PeiCryptLib.inf index b1629647f9c6..ee5f3cd5d4b6 100644 --- a/CryptoPkg/Library/BaseCryptLib/PeiCryptLib.inf +++ b/CryptoPkg/Library/BaseCryptLib/PeiCryptLib.inf @@ -43,7 +43,7 @@ [Sources] Hash/CryptParallelHashNull.c Hmac/CryptHmac.c Kdf/CryptHkdf.c - Cipher/CryptAesNull.c + Cipher/CryptAes.c Cipher/CryptAeadAesGcmNull.c Pk/CryptRsaBasic.c Pk/CryptRsaExtNull.c diff --git a/CryptoPkg/Library/BaseCryptLib/SmmCryptLib.inf b/CryptoPkg/Lib= rary/BaseCryptLib/SmmCryptLib.inf index 0af7a3f96e8f..cc5a53ca92cd 100644 --- a/CryptoPkg/Library/BaseCryptLib/SmmCryptLib.inf +++ b/CryptoPkg/Library/BaseCryptLib/SmmCryptLib.inf @@ -43,7 +43,7 @@ [Sources] Hash/CryptCShake256.c Hash/CryptParallelHash.c Hmac/CryptHmac.c - Kdf/CryptHkdfNull.c + Kdf/CryptHkdf.c Cipher/CryptAes.c Cipher/CryptAeadAesGcmNull.c Pk/CryptRsaBasic.c diff --git a/CryptoPkg/Readme.md b/CryptoPkg/Readme.md index 067465b8eb7d..= cb072db72397 100644 --- a/CryptoPkg/Readme.md +++ b/CryptoPkg/Readme.md @@ -447,18 +447,20 @@ and CryptoSmm modules. #### Common PEI PcdCryptoServiceFamilyEnable Settings =20 ``` - gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.HmacSha256.Fami= ly | PCD_CRYPTO_SERVICE_ENABLE_FAMILY - gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.HmacSha384.Fami= ly | PCD_CRYPTO_SERVICE_ENABLE_FAMILY - gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sha1.Family = | PCD_CRYPTO_SERVICE_ENABLE_FAMILY - gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sha256.Family = | PCD_CRYPTO_SERVICE_ENABLE_FAMILY - gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sha384.Family = | PCD_CRYPTO_SERVICE_ENABLE_FAMILY - gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sha512.Family = | PCD_CRYPTO_SERVICE_ENABLE_FAMILY - gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sm3.Family = | PCD_CRYPTO_SERVICE_ENABLE_FAMILY - gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.Pk= cs1Verify | TRUE - gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.Ne= w | TRUE - gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.Fr= ee | TRUE - gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.Se= tKey | TRUE - gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Pkcs.Services.P= kcs5HashPassword | TRUE + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.HmacSha256.Fami= ly | PCD_CRYPTO_SERVICE_ENABLE_FAMILY + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.HmacSha384.Fami= ly | PCD_CRYPTO_SERVICE_ENABLE_FAMILY + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sha1.Family = | PCD_CRYPTO_SERVICE_ENABLE_FAMILY + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sha256.Family = | PCD_CRYPTO_SERVICE_ENABLE_FAMILY + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sha384.Family = | PCD_CRYPTO_SERVICE_ENABLE_FAMILY + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sha512.Family = | PCD_CRYPTO_SERVICE_ENABLE_FAMILY + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sm3.Family = | PCD_CRYPTO_SERVICE_ENABLE_FAMILY + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Aes.Family = | PCD_CRYPTO_SERVICE_ENABLE_FAMILY + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.Pk= cs1Verify | TRUE + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.Ne= w | TRUE + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.Fr= ee | TRUE + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.Se= tKey | TRUE + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Pkcs.Services.P= kcs5HashPassword | TRUE + =20 + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Hkdf.Services + .Sha256ExtractAndExpand | TRUE ``` =20 #### Common DXE and SMM PcdCryptoServiceFamilyEnable Settings @@ -466,6 +4= 68,7 @@ and CryptoSmm modules. ``` gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.HmacSha256.Fami= ly | PCD_CRYPTO_SERVICE_ENABLE_FAMILY gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.HmacSha384.Fami= ly | PCD_CRYPTO_SERVICE_ENABLE_FAMILY + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Hkdf.Family = | PCD_CRYPTO_SERVICE_ENABLE_FAMILY gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Pkcs.Services.P= kcs1v2Encrypt | TRUE gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Pkcs.Services.P= kcs5HashPassword | TRUE gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Pkcs.Services.P= kcs7Verify | TRUE -- 2.35.1.windows.2