From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail05.groups.io (mail05.groups.io [45.79.224.7]) by spool.mail.gandi.net (Postfix) with ESMTPS id 03B9C7803CF for ; Fri, 16 Aug 2024 10:50:15 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=YuBNpw5vQq27B0PPOueYSxTPfG9bqqpMdsJoIJB8liI=; c=relaxed/simple; d=groups.io; h=From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:msip_labels:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Resent-Date:Resent-From:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type; s=20240206; t=1723805415; v=1; b=B+BFJ86+vXVTStaizigfRXy/Qhtj/45+zTnZWl2y9lZo6HDPtd6kjSvathwtiw1b99tsZ9dE G7iwaWV2HW1Yc9Z1Ts7nMIjR80EHgx9TPEWdRC3YPJccEqA26M6u4AapNJ5ZjG8uoQ96h9FmY9G xtaYp4EjxXay7Glu+eaPaqeAwsWGVcEnWeDsuJ0yVReJIMOhVdOk/oJC64SqVsJZJiXJz3J/0Bx RxQHc/B8zKGL0bXwRBkEr1HAYC8THllc7/5OIVnR1TrNw8xisY08lVFCx5l8vXc0NkrTf7dLL8M YQZYK+3ANKRzhEcAI1J1t2sohIsIR9ki1WAkdruws7zEg== X-Received: by 127.0.0.2 with SMTP id YXIoYY7687511xigTOriP9PR; Fri, 16 Aug 2024 03:50:14 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.10]) by mx.groups.io with SMTP id smtpd.web10.145381.1723805408118818995 for ; Fri, 16 Aug 2024 03:50:08 -0700 X-CSE-ConnectionGUID: jkhBLqwbSIGDBXs/Hy8gZA== X-CSE-MsgGUID: xu29LsoWTjuv1Z6uD4dL0A== X-IronPort-AV: E=McAfee;i="6700,10204,11165"; a="33506658" X-IronPort-AV: E=Sophos;i="6.10,151,1719903600"; d="scan'208,217";a="33506658" X-Received: from fmviesa002.fm.intel.com ([10.60.135.142]) by fmvoesa104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Aug 2024 03:50:06 -0700 X-CSE-ConnectionGUID: Sv4VS4DhQ6emXYqTqF4Dog== X-CSE-MsgGUID: DeX3EM3bTp23UQbcIIjJ+w== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.10,151,1719903600"; d="scan'208,217";a="82844700" X-Received: from fmsmsx601.amr.corp.intel.com ([10.18.126.81]) by fmviesa002.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 16 Aug 2024 03:50:06 -0700 X-Received: from fmsmsx602.amr.corp.intel.com (10.18.126.82) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 16 Aug 2024 03:50:06 -0700 X-Received: from fmsedg601.ED.cps.intel.com (10.1.192.135) by fmsmsx602.amr.corp.intel.com (10.18.126.82) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39 via Frontend Transport; Fri, 16 Aug 2024 03:50:06 -0700 X-Received: from NAM12-DM6-obe.outbound.protection.outlook.com (104.47.59.174) by edgegateway.intel.com (192.55.55.70) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.39; Fri, 16 Aug 2024 03:50:05 -0700 X-Received: from CH3PR11MB8342.namprd11.prod.outlook.com (2603:10b6:610:167::10) by PH0PR11MB5030.namprd11.prod.outlook.com (2603:10b6:510:41::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7875.19; Fri, 16 Aug 2024 10:49:56 +0000 X-Received: from CH3PR11MB8342.namprd11.prod.outlook.com ([fe80::816a:2545:1321:b23e]) by CH3PR11MB8342.namprd11.prod.outlook.com ([fe80::816a:2545:1321:b23e%4]) with mapi id 15.20.7875.018; Fri, 16 Aug 2024 10:49:56 +0000 From: "Xu, Wei6" To: "Ni, Ray" , Ard Biesheuvel , "devel@edk2.groups.io" CC: "Yao, Jiewen" , "Wu, Jiaxin" Subject: Re: [edk2-devel] Regarding MOR Secure feature Thread-Topic: [edk2-devel] Regarding MOR Secure feature Thread-Index: AQHaw62EtpleLzvEK0K+Pih0pELKf7HR5H0AgARI9wqAU6OAMA== Date: Fri, 16 Aug 2024 10:49:56 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US, en-GB X-MS-Has-Attach: X-MS-TNEF-Correlator: msip_labels: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: CH3PR11MB8342:EE_|PH0PR11MB5030:EE_ x-ms-office365-filtering-correlation-id: 6cf7c696-b313-437e-30cf-08dcbde12b19 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: =?us-ascii?Q?i6avfVW/qh9DIai61r3b0HRj/33hqNGuHcfs98x/gmztJwofB/6LGNMOjnLS?= =?us-ascii?Q?+j0JDsLzQl1dMiKPL1XrtFUeOiutjeY98akNtUAqV9OVE6lQF1ptZL6toh0l?= =?us-ascii?Q?/ljJJi9Q6immuvdJhgcy5rXa/a9K+ITe0x2mYE2RgY9vsyD/dWeEDhQ3g7H1?= =?us-ascii?Q?YzUw1W9OVl1NYeyD1yO73Rs+kalWLwjxvxWy80t1/nZf6/jZm4VAHPtl3uB0?= =?us-ascii?Q?2EwudPXpdg1IM6l2S0tkwmXGHh8adRG1LibHJti+Yf1m5C/2Wh+VUvuLAy4p?= =?us-ascii?Q?zFL/aIoVO+mOVRGmTycSojWZ1UBdx/adN84xvUYg1RTnL2h4XDdiPZcZSBtN?= =?us-ascii?Q?gA8EhjfXhmH7h2kE9zxn7kM1fcspE5kDqwSSvPRCiPSfWP/DxSDRrXpoYAFB?= =?us-ascii?Q?mc+6pCp1YHae2eoQJz1/NdnWiysApKCAoj05sTuipLA5TI2/IgbOti7g59T9?= =?us-ascii?Q?BWfUDaDAp7yk8O6nWADRUmlQuK2HXaPA5s2YQA7zVG8DdWrWWo0kIF7J2snN?= =?us-ascii?Q?PYYJQ+c9kSbNrI5/yQv8obOsL41MJMaJkC0u9wD2TPIg7essdN5HyQz6yq9M?= =?us-ascii?Q?5X9iXK6M1dQBfYdkbeXqF0j6S7V00r45R6VwOwoISqKe2uSjXxSvIM3PiBxK?= =?us-ascii?Q?bqieA817y5XmkJhxkfhhwrHv3m9leJbOorivl5if3wmeur9o5MynogAOVq93?= =?us-ascii?Q?Ecous7o/SYRPO5okJ2NUW+kMvHu8LcGy1EKdUD5QpHpXIt0wCgZypDouIj7U?= =?us-ascii?Q?qtkdrXvGxBOrDJjJF1290G138sw1M5r6Wg8lfqEkclTQb7nv+3CaVAnX9+tv?= =?us-ascii?Q?+omywofmgcZa178U7gXxKxtVitXTqJPTv5/W9uG0DFvIy/RDP4/Q1YogoCsz?= =?us-ascii?Q?/8LIQlGc3tEly1BAuLimbOJPPv0o8wEvndvK9wTNs/UffyqkUilhLBeM4gl3?= =?us-ascii?Q?TlDg7c/B6j4wiq8lafP32sI5FfQfFc7m2TzjkYB6c2wvIJldajyxs+jWY+/w?= =?us-ascii?Q?rb5vwg/azfDUsP56xif4RcTPYSyxq30Etlh8AbqP/l5Yv3KTKWCqopN5RFef?= =?us-ascii?Q?6tD/6zplgkFENRe1VX5PfURFdr9ODuJGaOcf3fvEEXJm/S8cQq9dvUavMkD2?= =?us-ascii?Q?+kIA40hrFc65FwUpFtSdbDIljCnb878o16jipFCE3zs3aLuMb79S+s3K7Ge6?= =?us-ascii?Q?/sGaPcwsM4o3V76WWufXhWydZO35ZuVK210oBFW/loMRABm2BU56H+7VhjiG?= =?us-ascii?Q?Kcgc0dqpemM2zy+N25yLzvg9cTL/AD58syj8/QsLWri+qQ6E9WAx2Jh8JSzZ?= =?us-ascii?Q?J+i6UgJwEYI5tlO9Pt15glsDOtNtY76QULleZkvDfPjfORIYDLfos4ekvERu?= =?us-ascii?Q?M3XLZQI=3D?= x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?W1OHmBrgA4hPPjHhSrKbaaoFjr+8DQPwPuYSM+6tyOGYGmMBJHfocGt4+YNZ?= =?us-ascii?Q?NPRUW0i6M+XvMshwosfWTWQ2HfXhnUz/P9m8L+hLKhtzArv0IXvjiellOAtN?= =?us-ascii?Q?AlHa9zDKyJ3sRgqURCjDvaxVcWyVq60b/TrEyvUKVjTOI19InNtd+kOxlcBX?= =?us-ascii?Q?D1nXFMAj+lzzMMvD1/EsaVDisAlfw8vHqI83Bnufj87MdbU9GhqEPouPUQ6V?= =?us-ascii?Q?5cvllVAi2t0Yb3Ppmiag4ueYFVpRzmf7c1g3pe/QQrCqKxUL1qXtwxVDvdvu?= =?us-ascii?Q?4DqZMgOkUd46ooEC8U3pntGdCcznHKZksTLeADJ8WNB6vmbR+AoSHdnmG82o?= =?us-ascii?Q?3wPu1IdYriorS7TC/ph7QYA9b5KK4wqOhRwK+aImqGjBTegKlm0C28GGGgpd?= =?us-ascii?Q?s70E+5g1KqgYRyzxdWvwKjyzKIOpP+1onr/wQ4Sn7Met8Ogm6SHKY6wYgfh8?= =?us-ascii?Q?ZRE0q/gLv+/COt20t4DloVA7tkcyr7j9uHXgEWURGxN+dG2Q6d4Yo7Iiic9o?= =?us-ascii?Q?3p01Df+34EVs1LT0Yv5tthF/oPnN1uFZBVjTTCcW9okveOJLw0soXAeJ0opB?= =?us-ascii?Q?EN5Pam8+QmX9dtCSuLVhnDRMd7hx35HbmZpGS119RIFGbUbX/saGKUqXyKB6?= =?us-ascii?Q?bCOUjzeFtiDbUARr5I1xOpv6b/pb+X9D0uh9ucERYTHDJUI83CijN6bV8mTG?= =?us-ascii?Q?ICTdHUF3mAVKl+iM8l+lVj0JgD0djba69BmYlzfMBNzk6TEj/b3dFofyKHGQ?= =?us-ascii?Q?M2rAtuPExEOSYmBA+dEiMdVWPhtmUfnjPj84ZfuHtsmbmBtWfsBLFwQsUcis?= =?us-ascii?Q?AXHHykOxffUXAF8wJMsqTHViu0pl/TlDRQKDbhqAgROaVdCYFowAQG8sJ9D7?= =?us-ascii?Q?c4quhBBtA7TpCrlktJxv85aRmfvxPWASlkeT4fnS2ZTdlhmoQUAp/C/f4qNp?= =?us-ascii?Q?7Dm3C1Qzf4qN73nC5mmEdA2NVSO13yiWqBMCG3oe2bnhLkvcIx5q1Z1Okb36?= =?us-ascii?Q?pg/Bs+/s4SN6IpBVhw1/oVTWOFdSAC2j4p0ZBKpvC+18xAHdBUOAwfAWKiVO?= =?us-ascii?Q?DHsNuTaSgS7f0P58PKUoAgNWzdSRXQKg4KpP8JN2NjNWky214/dJa6yrqYl3?= =?us-ascii?Q?J4KGzq1s3o5/rPaWtvG2aNbIpe1h3dEkuuFDAUAF+TNT8F8dpbwJfYSplo5x?= =?us-ascii?Q?dZBruRSxmGmp8EXUu3ncKs2ulg8oZzAco6ZVYGDwF9gBm1bfYCN116qFEjc4?= =?us-ascii?Q?nT8AxbB/ZqoZ1+go3kVIrRQULjU+Vmz9pPWjW/9+2RNZdbtB5QWg1pQFtGag?= =?us-ascii?Q?yCr2B3+VF6IQ6wmmEvCbkM/n63Xc4d9R8pbrwdlbEVL2mBfYR+w+ZfOsBS1u?= =?us-ascii?Q?grQniLXpp2OM3RhUj2UG1UEaQQ23vND3X2Sbf71mv9cAAqZHtHT3QRWB2VzS?= =?us-ascii?Q?k9CvE6NdD2aYzrtbuPJn/H9ZhYYvk+u4tuc5c4YkkQHEUJYuUWnAhYdNeUJk?= =?us-ascii?Q?V/LgYty1LJD4V1lCsB5XS/7m4qV4YAW/rvlV27heuajv/DCI66Od2Bn8Qbi9?= =?us-ascii?Q?XYj7HVoSwLYtk7SdQQw=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CH3PR11MB8342.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 6cf7c696-b313-437e-30cf-08dcbde12b19 X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Aug 2024 10:49:56.7790 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: /WDJH8ULi4qPRwMoN422XZg8vtzx7ogwuZbgjZGTLST5R/Axr5NBca18TRWcPTcbJ/pfL74sq48Sx+np1++dsw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR11MB5030 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Resent-Date: Fri, 16 Aug 2024 03:50:08 -0700 Resent-From: wei6.xu@intel.com Reply-To: devel@edk2.groups.io,wei6.xu@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: ncOT1KHsB9UgFJvi5PqKgFJxx7686176AA= Content-Language: en-US Content-Type: multipart/alternative; boundary="_000_CH3PR11MB83422437D680037F7EBF6C38A1812CH3PR11MB8342namp_" X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b=B+BFJ86+; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 45.79.224.7 as permitted sender) smtp.mailfrom=bounce@groups.io --_000_CH3PR11MB83422437D680037F7EBF6C38A1812CH3PR11MB8342namp_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi Ard, Regarding the PR: MdeModulePkg/Variable: Revert 'delete and lock OS-created= MOR variable' by xuweiintel * Pull Request #5902 * tianocore/edk2 (github.= com) Thanks a lot for reviewing the patch. I update it according to your comments. Could you please help to review it = again? Thanks. BR, Wei From: Ni, Ray Sent: Monday, June 24, 2024 4:50 PM To: Ard Biesheuvel ; devel@edk2.groups.io Cc: Yao, Jiewen ; Xu, Wei6 ; Ni, R= ay ; Wu, Jiaxin Subject: Re: [edk2-devel] Regarding MOR Secure feature Ard, Thank you very much for your willingness to think about this topic. Yes. we found the TCG MOR secure feature does not work in standalone MM env= and want to fix it. That leads the review of the code change history. If you can confirm my understanding (F24/F25 are EOL today and Laszlo's fix= is not needed), I can create a PR to remove that change. Thanks, Ray ________________________________ From: Ard Biesheuvel > Sent: Friday, June 21, 2024 16:35 To: devel@edk2.groups.io >; Ni, Ray > Cc: Yao, Jiewen >; Xu, We= i6 > Subject: Re: [edk2-devel] Regarding MOR Secure feature Hi Ray, On Fri, 21 Jun 2024 at 10:03, Ni, Ray > wrote: > > Ard, > > 7 years ago, Laszlo added this commit (https://github.com/tianocore/edk2/= commit/fda8f631edbbf3823760542a06f12bd60fd39181) to support some OS kernels= that incorrectly "create" the MOR variable. > The OS kernel bug is captured in this bugzilla (bugzilla.redhat.com/show_= bug.cgi?id=3D1498159). It seems to me the OS kernel bugs only exist in Fedo= ra 24 and 25 which are all EOL today. Fedora 26 has the correct implementat= ion that does NOT "create" the MOR variable. The implementation is done by = you here (https://lore.kernel.org/all/20170825155019.6740-2-ard.biesheuvel@= linaro.org/T/#u). > > 5 years ago, you added StandaloneMm variable driver and VariableHaveTcgPr= otocols() returns FALSE always in the standalone MM version. (Commit: https= ://github.com/tianocore/edk2/commit/a855f63e2fdd990837391b0e61e78b3f06b5691= 6) > As a result, MorLock variable is not created. It causes a bug that the BI= OS does not report the MOR Secure feature to OS. > > My questions are: > > can we revert Laszlo's commit? As the bug that commit fixes only exists i= n Fedora 24/25 which are all EOL today. Yes, I think we can revert it, although it is not clear from the commit log what the erroneous behavior is. > why is the MOR secure bug not found in ARM platform? > This is definitely a bug on ARM (and likely other users of standalone MM). The problem is, of course, that standalone MM is standalone, and cannot know for certain which EFI protocols are exposed by the DXE core, nor invoke them directly. > > I think you are the best person to answer the questions because you not o= nly fixed the kernel, but also know details on the ARM standalone MM. > I am so happy with that:) > :-) To be honest, I need some time to page this all back into my brain, but I am happy to help out. MOR does not really rely on the TCG protocols, right? If standalone MM can implement it without its ability to invoke those protocols, we should just separate those. I guess that is what you are doing at the moment? -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#120358): https://edk2.groups.io/g/devel/message/120358 Mute This Topic: https://groups.io/mt/106795434/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- --_000_CH3PR11MB83422437D680037F7EBF6C38A1812CH3PR11MB8342namp_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Hi Ard,<= /span>

 

Regarding the PR: <= a href=3D"https://github.com/tianocore/edk2/pull/5902"> MdeModulePkg/Variable: Revert 'delete and lock OS-created MOR variable' by = xuweiintel · Pull Request #5902 · tianocore/edk2 (github.com)=

Thanks a lot for re= viewing the patch.

 

I update it accordi= ng to your comments. Could you please help to review it again? Thanks.=

 

BR,

Wei

From: Ni, Ray <ray.ni@intel.com&g= t;
Sent: Monday, June 24, 2024 4:50 PM
To: Ard Biesheuvel <ardb@kernel.org>; devel@edk2.groups.io
Cc: Yao, Jiewen <jiewen.yao@intel.com>; Xu, Wei6 <wei6.xu@i= ntel.com>; Ni, Ray <ray.ni@intel.com>; Wu, Jiaxin <jiaxin.wu@in= tel.com>
Subject: Re: [edk2-devel] Regarding MOR Secure feature

 

Ard,

Thank y= ou very much for your willingness to think about this topic.

&n= bsp;

Yes. we= found the TCG MOR secure feature does not work in standalone MM env and wa= nt to fix it.

That le= ads the review of the code change history.

&n= bsp;

If you = can confirm my understanding (F24/F25 are EOL today and Laszlo's fix is not= needed), I can create a PR to remove that change.

&n= bsp;

Thanks,=

Ray

&n= bsp;


From: A= rd Biesheuvel <ardb@kernel.or= g>
Sent: Friday, June 21, 2024 16:35
To: 
devel@edk2= .groups.io <devel@edk2.groups.io>; Ni, Ray <ray.ni@intel.com>
Cc: Yao, Jiewen <
jiewen.yao@intel.com>; Xu, Wei6 <= wei6.xu@intel.com>
Subject: Re: [edk2-devel] Regarding MOR Secure feature
<= o:p>

 

Hi Ray,


On Fri, 21 Jun 2024 at 10:03, Ni, Ray <
ray.ni@intel.com> wrote:
>
> Ard,
>

> 7 years ago, L= aszlo added this commit (https://github.com/tianocore/edk2/commit/fda8f631edbbf3823760542a0= 6f12bd60fd39181) to support some OS kernels that incorrectly "create" the MOR var= iable.

> The OS kernel = bug is captured in this bugzilla (bugzilla.redhat.com/show_bug.cgi?id=3D149= 8159). It seems to me the OS kernel bugs only exist in Fedora 24 and 25 whi= ch are all EOL today. Fedora 26 has the correct implementation that does NOT "create" the MOR variable. The impl= ementation is done by you here (https://lore.kernel.org/all/20170825155019.6740-2-ard.bieshe= uvel@linaro.org/T/#u).
>
> 5 years ago, you added StandaloneMm variable driver and VariableHaveTc= gProtocols() returns FALSE always in the standalone MM version. (Commit:
https://github.= com/tianocore/edk2/commit/a855f63e2fdd990837391b0e61e78b3f06b56916)<= /a>
> As a result, MorLock variable is not created. It causes a bug that the= BIOS does not report the MOR Secure feature to OS.
>
> My questions are:
>
> can we revert Laszlo's commit? As the bug that commit fixes only exist= s in Fedora 24/25 which are all EOL today.

Yes, I think we can revert it, although it is not clear from the
commit log what the erroneous behavior is.

> why is the MOR secure bug not found in ARM platform?
>

This is definitely a bug on ARM (and likely other users of standalone MM).<= br>
The problem is, of course, that standalone MM is standalone, and
cannot know for certain which EFI protocols are exposed by the DXE
core, nor invoke them directly.

>
> I think you are the best person to answer the questions because you no= t only fixed the kernel, but also know details on the ARM standalone MM. > I am so happy with that:)
>

:-)

To be honest, I need some time to page this all back into my brain,
but I am happy to help out.

MOR does not really rely on the TCG protocols, right? If standalone MM
can implement it without its ability to invoke those protocols, we
should just separate those. I guess that is what you are doing at the
moment?

_._,_._,_

Groups.io Links:

=20 You receive all messages sent to this group. =20 =20

View/Reply Online (#120358) | =20 | Mute= This Topic | New Topic
Your Subscriptio= n | Contact Group Owner | Unsubscribe [rebecca@openfw.io]

_._,_._,_
--_000_CH3PR11MB83422437D680037F7EBF6C38A1812CH3PR11MB8342namp_--