From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id 91087941DFC for ; Wed, 30 Aug 2023 18:56:45 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=t5KHl9sUF5njG+6Y/OYBNXt5u1jFF6d+mV9qn24x3Bk=; c=relaxed/simple; d=groups.io; h=ARC-Seal:ARC-Message-Signature:ARC-Authentication-Results:Message-ID:Date:User-Agent:Subject:To:References:From:In-Reply-To:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20140610; t=1693421804; v=1; b=Lq7nGUJsOgsV/atyPIhNXKPAdPwuMyEQsTfqKXXTUwuRL9cLZxlcdjoEob8LV3Q7Nyfor1MB oRN0670NSnuQoohdcgplZ1ls/+YC/D/nriE8yOHXN2A8ojH9X48txmtT9Vypl7DelUjCpvGjqye uoAjF8S/ipDSvLreRP5Iq4EY= X-Received: by 127.0.0.2 with SMTP id dZABYY7687511xmREOoKFcaT; Wed, 30 Aug 2023 11:56:44 -0700 X-Received: from NAM12-DM6-obe.outbound.protection.outlook.com (NAM12-DM6-obe.outbound.protection.outlook.com [40.92.22.75]) by mx.groups.io with SMTP id smtpd.web10.3182.1693421803240978646 for ; Wed, 30 Aug 2023 11:56:43 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=k+2h3iT5UmXOZsHnH2m6a0fqjzhZ4Zp6hr8sAlnDAi/5V9tL0Q+/+Ix4q7NvvsdktgjCyRPBx/w5kNoJcabx/cE5E/N8LKbPppU0MfgOJS6e7g/TNZHmaDwLxNFS+fPlbNnFrorTTGVIb8C3B0HiZJ+gi9iJ+WJMIKdSyi0yU5/n6vAbHzevlSmM91CpdNLKloUwpPDH2K3E69WKTAx6Xg/hX61j9Cm7prIESo8hQD+1jZICnI09VK9WD+JmRUEV11s7l7oLQk8WvXLdLz4bbIo0K4p/NwbqxXyD0d5UFnOnDt4fD6qDrLjpsFSv+yOXB78fauqzzv7rmfqBOLbb5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6meIyb621LMHbuPkTuq8oPs+tCL3zbDL7PvDZWuHRgU=; b=c9sqmmfNh7LecP+XnH09TX2H1YBjLoHhI6SNc4Cugj+8MQpT1Z1Hc8vSVtgQPwvh/HEHqOI4SjMcZ/YsB/ZR5CLvC7RlBu5eeR8v4k5Vo2NMmd6IcOYNPZYVci7VIGyx3EAYKacdMco+fN1utIKp8c3Nq+nBq9gR82RM6GcNFUS1JxfLXsXjRTynw+cPkc+lS6PoVZQl72clWcQutl4LSXmvQx2LoelEh6uRAHYpzkKsdG8EcyM/fYIf6+FkU3SHQTwZigzG7SEpwkfgqTWyeabK6+Io+QZq6faxaDIQ/vIK2/3WpWXLFq2ajiYhj8phalPHtx7MO+UVg+cYC+zQiw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none X-Received: from BY3PR19MB4900.namprd19.prod.outlook.com (2603:10b6:a03:354::11) by LV2PR19MB5789.namprd19.prod.outlook.com (2603:10b6:408:17a::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6745.20; Wed, 30 Aug 2023 18:56:40 +0000 X-Received: from BY3PR19MB4900.namprd19.prod.outlook.com ([fe80::f5ef:669c:fea1:a213]) by BY3PR19MB4900.namprd19.prod.outlook.com ([fe80::f5ef:669c:fea1:a213%7]) with mapi id 15.20.6745.015; Wed, 30 Aug 2023 18:56:40 +0000 Message-ID: Date: Wed, 30 Aug 2023 11:56:38 -0700 User-Agent: Mozilla Thunderbird Subject: Re: [edk2-devel] [edk2/add_mbedtls PATCH 0/9] *** Add HMAC/HKDF/RSA/HASH features based on Mbedtls *** To: devel@edk2.groups.io, wenxing.hou@intel.com References: <20230830075220.2070-1-wenxing.hou@intel.com> From: "Sean" In-Reply-To: <20230830075220.2070-1-wenxing.hou@intel.com> X-TMN: [kU+XPOS0spAqq5lqLmiOqQPD0V3D7Dkl] X-ClientProxiedBy: MW4P221CA0023.NAMP221.PROD.OUTLOOK.COM (2603:10b6:303:8b::28) To BY3PR19MB4900.namprd19.prod.outlook.com (2603:10b6:a03:354::11) X-Microsoft-Original-Message-ID: MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BY3PR19MB4900:EE_|LV2PR19MB5789:EE_ X-MS-Office365-Filtering-Correlation-Id: 1e365e42-025c-4ae0-deba-08dba98ad852 X-Microsoft-Antispam-Message-Info: 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 X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?3rWrS6EWcAxU4bibiyAjUnomvpLax5cQGw17vzguX/T1RTNxQTy4Sf+HdoCP?= =?us-ascii?Q?Clmv0rKQBbCv1gZBbnC48rtF56XhHpc0YHKGAMxkTvQMad2x3LWRpIUlTXUH?= =?us-ascii?Q?cajGAPMd0XuUPKddI4NvPbAtHgTPipmHWByp/VrphtbwzoadpeeJey29oLz4?= =?us-ascii?Q?4pP0XtEZ/UYKCGFL2FuDp0Gz58Tl1G6tl55k8LnIEREwpJAQ0ub9vsfB2gA+?= =?us-ascii?Q?tlwuYokvxlNGIptCVr395LrRzXq+M68xprEpZS3V7WwF5J5qxFLk53tlKJnV?= =?us-ascii?Q?8cGIrrr3C40SD5Exuyri/BoZZ1O2N4/+SUreHMs4TavEz6542d4m9RYAaTHE?= =?us-ascii?Q?pO9oAOlEenuDstFKy1pdfM8dufopVxAPVib+lgs48C8NNqUIEvineSWsbK/j?= =?us-ascii?Q?Hv6hTWrC9CBmAzcyULzyLy9nPQZyBUaaY5IbKA0D2nGtWsEejLz0F0Jew+Dr?= =?us-ascii?Q?EGPSFpq+OMba6eVZ1ho+gMEUkZPYDQd928H+HhXltzmAh+MuGhAecZV5xjyo?= =?us-ascii?Q?i+2gy7sSxTBEVhIYXZTr3dQLQHYBnNMqX54jdve/rW2JSccI5VnpmD89JNJ1?= =?us-ascii?Q?F16q4LqgxHAFYSTXpjSdcJ3Y5OgItikc4bwWwcca61RgDBxkzpuBIL3STfaK?= =?us-ascii?Q?eYZ2wP9gNf0xIRZUoddnVkM6o/EzMDNBYyWa2gdcZRy3Gk+MC7FvczCmRqKV?= =?us-ascii?Q?Orx1M2CCYKi8+lsDqqNvFlxwyJxkXn10618WTnWUBp6lZeR2PueTMcMahxtm?= =?us-ascii?Q?m9GM7H/VORb5yDKkcvFRZb/PFfYImdCmIn8eBkwi96rJYfcMkNCCzIAHJ4I+?= =?us-ascii?Q?oze5N4++MkIeDPP71MqCKt2kPzXFmdMkLS3eNTj9q5/DBPM1Cd8BIYzlog8X?= =?us-ascii?Q?bb3dM2lusQr38oA+Wxwr6yT4QhI+hWhd7VOGy+sgtEjemUjkbOA9PpdsGoLH?= =?us-ascii?Q?qjVNVkb0GrQEFa5eOlgUdN9k6xfGO+tKDScuAtrP8MOR0jOtjF9JAd2tB+Hb?= =?us-ascii?Q?H+QctuV3emoTReqILA5o+THudlZC88IjFxlJv2ETZlIdI6q+DFrN6lUa8DB+?= =?us-ascii?Q?5heKgM+liRJveYQq5RATYpgutjPBkD7Tf3GhqpOb0AA4UcWEDg7KD333MBGe?= =?us-ascii?Q?lhLsRzZ+zlLYtd+3iOTEfF10rYaaX/+dc4Dd2nQmGGfEDxCznkWKEv7beHH+?= =?us-ascii?Q?pttM4np8vF7QMOgj2FhZdpGq5/yloxPKh81Iow=3D=3D?= X-OriginatorOrg: outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 1e365e42-025c-4ae0-deba-08dba98ad852 X-MS-Exchange-CrossTenant-AuthSource: BY3PR19MB4900.namprd19.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Aug 2023 18:56:40.6640 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg: 00000000-0000-0000-0000-000000000000 X-MS-Exchange-Transport-CrossTenantHeadersStamped: LV2PR19MB5789 Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,spbrogan@outlook.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: JCfG7ot3Y5MR8eHRiU4ChWRmx7686176AA= Content-Language: en-US Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20140610 header.b=Lq7nGUJs; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=outlook.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io I appreciate and really like this work to enable mbedtls but I don't=20 like the idea of adding another submodule to edk2. For a long time there has been discussion about formalizing the=20 abstraction of the edk2 crypto api so that it would be practical to=20 implement edk2's crypto using various libraries.=C2=A0=C2=A0 I propose we r= emove=20 openssl from the edk2 CryptoPkg and into the OpenSslCryptoPkg in another=20 new tianocore repository dedicated to OpenSsl.=C2=A0 MbedTls could then be= =20 checked into the MbedTlsCryptoPkg and added to another new repository.=C2= =A0=20 This would also have the benefit of breaking the tight coupling of edk2=20 stable tags from the crypto used in the code base (crypto has more=20 widely tracked vulnerabilities). Happy to discuss more if others have different ideas. Thanks Sean On 8/30/2023 12:52 AM, Wenxing Hou wrote: > *** Add BaseCryptLibMbedTls for CryptoPkg, which can be an alternative to= OpenSSL in some scenarios. There are four features in the patch: HMAC/HKDF= /RSA/HASH.*** > > Wenxing Hou (9): > CryptoPkg: Add mbedtls submodule for EDKII > CryptoPkg: Add mbedtls_config and MbedTlsLib.inf > CryptoPkg: Add HMAC functions based on Mbedtls > CryptoPkg: Add HKDF functions based on Mbedtls > CryptoPkg: Add RSA functions based on Mbedtls > CryptoPkg: Add all .inf files for BaseCryptLibMbedTls > CryptoPkg: Add Null functions for building pass > CryptoPkg: Add MD5/SHA1/SHA2 functions based on Mbedtls > CryptoPkg: Add Mbedtls submodule in CI > > .gitmodules | 3 + > .pytool/CISettings.py | 2 + > CryptoPkg/CryptoPkg.ci.yaml | 66 +- > CryptoPkg/CryptoPkg.dec | 4 + > CryptoPkg/CryptoPkgMbedTls.dsc | 280 ++ > .../BaseCryptLibMbedTls/BaseCryptLib.inf | 81 + > .../BaseCryptLibMbedTls/Bn/CryptBnNull.c | 520 +++ > .../Cipher/CryptAeadAesGcmNull.c | 100 + > .../BaseCryptLibMbedTls/Cipher/CryptAesNull.c | 159 + > .../BaseCryptLibMbedTls/Hash/CryptMd5.c | 234 + > .../BaseCryptLibMbedTls/Hash/CryptMd5Null.c | 163 + > .../Hash/CryptParallelHashNull.c | 40 + > .../BaseCryptLibMbedTls/Hash/CryptSha1.c | 234 + > .../BaseCryptLibMbedTls/Hash/CryptSha1Null.c | 166 + > .../BaseCryptLibMbedTls/Hash/CryptSha256.c | 227 + > .../Hash/CryptSha256Null.c | 162 + > .../BaseCryptLibMbedTls/Hash/CryptSha512.c | 447 ++ > .../Hash/CryptSha512Null.c | 275 ++ > .../BaseCryptLibMbedTls/Hash/CryptSm3Null.c | 164 + > .../BaseCryptLibMbedTls/Hmac/CryptHmac.c | 620 +++ > .../BaseCryptLibMbedTls/Hmac/CryptHmacNull.c | 359 ++ > .../BaseCryptLibMbedTls/InternalCryptLib.h | 44 + > .../BaseCryptLibMbedTls/Kdf/CryptHkdf.c | 372 ++ > .../BaseCryptLibMbedTls/Kdf/CryptHkdfNull.c | 192 + > .../BaseCryptLibMbedTls/PeiCryptLib.inf | 101 + > .../BaseCryptLibMbedTls/PeiCryptLib.uni | 25 + > .../BaseCryptLibMbedTls/Pem/CryptPemNull.c | 69 + > .../Pk/CryptAuthenticodeNull.c | 45 + > .../BaseCryptLibMbedTls/Pk/CryptDhNull.c | 150 + > .../BaseCryptLibMbedTls/Pk/CryptEcNull.c | 578 +++ > .../Pk/CryptPkcs1OaepNull.c | 51 + > .../Pk/CryptPkcs5Pbkdf2Null.c | 48 + > .../Pk/CryptPkcs7Internal.h | 83 + > .../Pk/CryptPkcs7SignNull.c | 53 + > .../Pk/CryptPkcs7VerifyEkuNull.c | 152 + > .../Pk/CryptPkcs7VerifyEkuRuntime.c | 56 + > .../Pk/CryptPkcs7VerifyNull.c | 163 + > .../Pk/CryptPkcs7VerifyRuntime.c | 38 + > .../BaseCryptLibMbedTls/Pk/CryptRsaBasic.c | 268 ++ > .../Pk/CryptRsaBasicNull.c | 121 + > .../BaseCryptLibMbedTls/Pk/CryptRsaExt.c | 337 ++ > .../BaseCryptLibMbedTls/Pk/CryptRsaExtNull.c | 117 + > .../BaseCryptLibMbedTls/Pk/CryptRsaPss.c | 164 + > .../BaseCryptLibMbedTls/Pk/CryptRsaPssNull.c | 46 + > .../BaseCryptLibMbedTls/Pk/CryptRsaPssSign.c | 231 + > .../Pk/CryptRsaPssSignNull.c | 60 + > .../BaseCryptLibMbedTls/Pk/CryptTsNull.c | 42 + > .../BaseCryptLibMbedTls/Pk/CryptX509Null.c | 753 ++++ > .../BaseCryptLibMbedTls/Rand/CryptRandNull.c | 56 + > .../BaseCryptLibMbedTls/RuntimeCryptLib.inf | 92 + > .../BaseCryptLibMbedTls/RuntimeCryptLib.uni | 22 + > .../BaseCryptLibMbedTls/SecCryptLib.inf | 84 + > .../BaseCryptLibMbedTls/SecCryptLib.uni | 17 + > .../BaseCryptLibMbedTls/SmmCryptLib.inf | 92 + > .../BaseCryptLibMbedTls/SmmCryptLib.uni | 22 + > .../SysCall/ConstantTimeClock.c | 75 + > .../BaseCryptLibMbedTls/SysCall/CrtWrapper.c | 58 + > .../SysCall/RuntimeMemAllocation.c | 462 ++ > .../SysCall/TimerWrapper.c | 198 + > .../BaseCryptLibMbedTls/TestBaseCryptLib.inf | 78 + > CryptoPkg/Library/MbedTlsLib/CrtWrapper.c | 96 + > CryptoPkg/Library/MbedTlsLib/EcSm2Null.c | 495 +++ > .../Include/mbedtls/mbedtls_config.h | 3823 +++++++++++++++++ > CryptoPkg/Library/MbedTlsLib/MbedTlsLib.inf | 173 + > .../Library/MbedTlsLib/MbedTlsLibFull.inf | 177 + > CryptoPkg/Library/MbedTlsLib/mbedtls | 1 + > 66 files changed, 14683 insertions(+), 3 deletions(-) > create mode 100644 CryptoPkg/CryptoPkgMbedTls.dsc > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/BaseCryptLib.i= nf > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Bn/CryptBnNull= .c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Cipher/CryptAe= adAesGcmNull.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Cipher/CryptAe= sNull.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptMd5.= c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptMd5N= ull.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptPara= llelHashNull.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha1= .c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha1= Null.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha2= 56.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha2= 56Null.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha5= 12.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha5= 12Null.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSm3N= ull.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hmac/CryptHmac= .c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hmac/CryptHmac= Null.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/InternalCryptL= ib.h > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Kdf/CryptHkdf.= c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Kdf/CryptHkdfN= ull.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/PeiCryptLib.in= f > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/PeiCryptLib.un= i > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pem/CryptPemNu= ll.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptAuthen= ticodeNull.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptDhNull= .c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptEcNull= .c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs1O= aepNull.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs5P= bkdf2Null.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7I= nternal.h > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7S= ignNull.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7V= erifyEkuNull.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7V= erifyEkuRuntime.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7V= erifyNull.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7V= erifyRuntime.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaBas= ic.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaBas= icNull.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaExt= .c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaExt= Null.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaPss= .c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaPss= Null.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaPss= Sign.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaPss= SignNull.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptTsNull= .c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptX509Nu= ll.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Rand/CryptRand= Null.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/RuntimeCryptLi= b.inf > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/RuntimeCryptLi= b.uni > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SecCryptLib.in= f > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SecCryptLib.un= i > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SmmCryptLib.in= f > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SmmCryptLib.un= i > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SysCall/Consta= ntTimeClock.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SysCall/CrtWra= pper.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SysCall/Runtim= eMemAllocation.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SysCall/TimerW= rapper.c > create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/TestBaseCryptL= ib.inf > create mode 100644 CryptoPkg/Library/MbedTlsLib/CrtWrapper.c > create mode 100644 CryptoPkg/Library/MbedTlsLib/EcSm2Null.c > create mode 100644 CryptoPkg/Library/MbedTlsLib/Include/mbedtls/mbedtls= _config.h > create mode 100644 CryptoPkg/Library/MbedTlsLib/MbedTlsLib.inf > create mode 100644 CryptoPkg/Library/MbedTlsLib/MbedTlsLibFull.inf > create mode 160000 CryptoPkg/Library/MbedTlsLib/mbedtls > -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#108152): https://edk2.groups.io/g/devel/message/108152 Mute This Topic: https://groups.io/mt/101048094/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-