From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail05.groups.io (mail05.groups.io [45.79.224.7]) by spool.mail.gandi.net (Postfix) with ESMTPS id 5AD747803CE for ; Mon, 29 Apr 2024 00:47:20 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=AuzJt7NeKSjC1xziAfLHlF2IoeUb4CmbxKTrEKEgQiY=; c=relaxed/simple; d=groups.io; h=From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Resent-Date:Resent-From:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20240206; t=1714351638; v=1; b=UlbA/f4gBUWCixoY9AfbWdXRgQXm2AmadRVJlCW5GaJu3mVeYNAAPM1nOgUoxt7dyYbwUsT1 Sh653rxKGeM9edguk98qhPA+O6MVZt4HW94XQKO1kLWKzqmBOoJwHJHmT49m3mPQJdEMpkww3s1 az9ATe+NaORIG1fwypSzRcCOgw0lzJsEqvHxWHSpCYPwwwNmIsvp5yoM6ztLDcUMoWG4FmY1ufj OKfmPQ+0GZq/NPsicw6m5gOHypsUBvq24t+dkUv45d8B/UBEhIehjp82AhIle2tf5nqaQcgBepd R+mecjsx4TokGhFGBOIJLwRqRxtBwRa+0gIrCHrKRIe6g== X-Received: by 127.0.0.2 with SMTP id uNQRYY7687511xMqBquMvLoF; Sun, 28 Apr 2024 17:47:18 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.11]) by mx.groups.io with SMTP id smtpd.web10.9832.1714351637922445455 for ; Sun, 28 Apr 2024 17:47:18 -0700 X-CSE-ConnectionGUID: rY69HXdjRP+BNMIrVM5Ztg== X-CSE-MsgGUID: P3zJ8DPYScm1Y67EC+7Pfg== X-IronPort-AV: E=McAfee;i="6600,9927,11057"; a="20616791" X-IronPort-AV: E=Sophos;i="6.07,238,1708416000"; d="scan'208";a="20616791" X-Received: from fmviesa004.fm.intel.com ([10.60.135.144]) by fmvoesa105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Apr 2024 17:47:17 -0700 X-CSE-ConnectionGUID: 4MHfGlo1QsyrhCQDK2H6GA== X-CSE-MsgGUID: kFuW/MS4Rmu2JZWsaytVtA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.07,238,1708416000"; d="scan'208";a="30609176" X-Received: from fmsmsx602.amr.corp.intel.com ([10.18.126.82]) by fmviesa004.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 28 Apr 2024 17:47:17 -0700 X-Received: from fmsmsx612.amr.corp.intel.com (10.18.126.92) by fmsmsx602.amr.corp.intel.com (10.18.126.82) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Sun, 28 Apr 2024 17:47:17 -0700 X-Received: from fmsmsx611.amr.corp.intel.com (10.18.126.91) by fmsmsx612.amr.corp.intel.com (10.18.126.92) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Sun, 28 Apr 2024 17:47:16 -0700 X-Received: from fmsedg601.ED.cps.intel.com (10.1.192.135) by fmsmsx611.amr.corp.intel.com (10.18.126.91) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35 via Frontend Transport; Sun, 28 Apr 2024 17:47:16 -0700 X-Received: from NAM02-DM3-obe.outbound.protection.outlook.com (104.47.56.41) by edgegateway.intel.com (192.55.55.70) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Sun, 28 Apr 2024 17:47:16 -0700 X-Received: from CO1PR11MB4929.namprd11.prod.outlook.com (2603:10b6:303:6d::19) by LV8PR11MB8607.namprd11.prod.outlook.com (2603:10b6:408:1ec::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7519.34; Mon, 29 Apr 2024 00:47:14 +0000 X-Received: from CO1PR11MB4929.namprd11.prod.outlook.com ([fe80::e34e:4d18:b93e:c368]) by CO1PR11MB4929.namprd11.prod.outlook.com ([fe80::e34e:4d18:b93e:c368%5]) with mapi id 15.20.7519.021; Mon, 29 Apr 2024 00:47:14 +0000 From: "Michael D Kinney" To: "Yao, Jiewen" , "Hou, Wenxing" , "devel@edk2.groups.io" , Andrew Fish , Leif Lindholm , Liming Gao , Sean Brogan , Joey Vagedes , "Liu, Zhiguang" , "Kumar, Rahul R" CC: "Kinney, Michael D" Subject: Re: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature based on PFP 1.06 spec Thread-Topic: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature based on PFP 1.06 spec Thread-Index: AQHakXaHvTHf67uoDEuNoXqn/wKphrFty3SQgAQ5EBCABXI38IAG/3GwgAAEFkA= Date: Mon, 29 Apr 2024 00:47:13 +0000 Message-ID: References: <17C755C8DBF259BF.15491@groups.io> In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: CO1PR11MB4929:EE_|LV8PR11MB8607:EE_ x-ms-office365-filtering-correlation-id: d1b135dc-4f50-4a6b-b1d1-08dc67e5e957 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: =?us-ascii?Q?ok+dJVt0kBibTl2fYtLy/QGVfV3lEeVfCg4BtDBxemUhL0lGSW7ULKi6OPn6?= =?us-ascii?Q?RPRAdi6+HaW2AxkfHTu4AIar8HitZB69IE06LW7olRol4Ub3Q6RtKlBITpap?= =?us-ascii?Q?FQsvd7dkUBkq+qJ2SnikVscyafGBsjCqP/bcgupb3URzcaX1szdnRIiFL0EP?= =?us-ascii?Q?gyCWdqAiSlx6nxf75QSbj8jxnCgrGNx+LVaJhR4DwpDFE3meA6qgueZ0rPB4?= =?us-ascii?Q?MCzAyZr5buXD62SWqwGPKo5EhbadiAiTkfqngadO4iFSgQSk2fhKJQS6b2gH?= =?us-ascii?Q?fB8FFrMvW7Zj+eiaEZVU3onvEzaIdLZfr4QcLKJvAHLzuUN6BPGek1eIDSl2?= =?us-ascii?Q?A9yg3Cw9djgPl2tW9zjvUP+vsVKM8jCzzaSE21/Iq/Rmmiy8QNNMlNXc6zYX?= =?us-ascii?Q?VwG2YLm2+aWhlyNGjemDYwT9fGudkrHPtxqpDXhFOkMWCXeIwQixQ+Ms0SnZ?= =?us-ascii?Q?E+I/PX20s4tKYBIkH2drX0oCuJKicmk97OM3x+yS6QCTxkWFgtf+Iat4BgSG?= =?us-ascii?Q?h5Os4IZZLwu5kJ2xZYmW5Rh73Sauw9KUp1vACI11W+yMbSoSwrJOI8q0RuFj?= =?us-ascii?Q?cv5j6oxHw35FMinQP+BU8Vge3bDlJmgK3SX/ks7ybTSQaYEiJPQe+lXUpw7M?= =?us-ascii?Q?uAWlva5tlUaVe73so4lwtGkiPI+vN7xQm7jM9r9DlT/AezXAcvTMsKuO62KT?= =?us-ascii?Q?bb6eCbOLBOu9Cvs9E8MRppjFLRM5ATAa/uXCpvRhSrAxAtX2x8T+mPLABvyf?= =?us-ascii?Q?kfxoXyV4XiEuGM9f6ZU1AvoD2Tje/wN867dl7UjqSpJ9mzEkHa1TuDn16yXn?= =?us-ascii?Q?t3kX4DfMmhcohokgnRDgmlNiKtqdwGb7ZpJNFrTTprksvK2ks6X436xFJ6LG?= =?us-ascii?Q?oRPziZKNs+nij9yjHNXsFMk8/A8fyckj7BcD7EfpLLp3CnqBpnte7PrNyT6r?= =?us-ascii?Q?9uNa8OOayriLx+0AjwPKZpepqEFzyYCUtjSHzc3NNnkG/nsVbyNiuz87SaQc?= =?us-ascii?Q?2Xkpwq56pBG6uKvB3/Tf0djvv+SLrM1wxuPL3iuLi6UVnf6joYvqE5Gb3zCW?= =?us-ascii?Q?+4vhI1oFgUwEdK4WmNjW6Tubwib1lxc/CbDJcTgR6ziwAN6f8YMR6GEXXbY+?= =?us-ascii?Q?62793Alvg0t8bIiWAfr098B12CJRFmAVWgiJXH1kU47n5f+/sx2/uWjTKnRT?= =?us-ascii?Q?KZuUiwknD0zHsr2NdPKbhZ3S5EKwZuNfSXmF2tcAtshi4x0NqYv6b5KEpQYi?= =?us-ascii?Q?1Fd1clJaGqLwuUp/ZI3beZZBR01hTutSCDIslgMstqrjX8wbCPiQOr5ucx+t?= =?us-ascii?Q?j+lmGYAUELzVpvjlDMTcPp3s?= x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?xoxetIKvonMjKDwe7GsU6tdDost79iyleUUJEKf5lbz5p4Yji0EInlyG+IDX?= =?us-ascii?Q?yecFYEgFUEmtEHqFSSy0ReBtVgwmIOlkN/6zTQWZUwUESGcCYTCDDOaL7CJL?= =?us-ascii?Q?YZ4RLLsEHP5ZR2+DUQjTSrI039ReYKku5VLF3Don5dGlv8Dq6QwBg/9t5B6W?= =?us-ascii?Q?qRfhZeLDacNNpHDWrKD9pRTY1I/SELhLEBrZBqG/rFtRzxVQWY66P+VDHpfH?= =?us-ascii?Q?fkvCTzh6px9iWFvinyLPr1EXS/MbUvBo5dUh9VZe9ONskO6KYfvNR5Pp2LyE?= =?us-ascii?Q?bFlAmXRW+cVWB++zdwlPWBgvVzwpLsRJXUjUueu5aXIQJ7+9LR5VCzORRob5?= =?us-ascii?Q?choLM5I35+7rLkx5jHj+ULGimjN3exe6gO/1hIaXFpj3p2mrlajurL5fpFGS?= =?us-ascii?Q?u82rpe2HkO7OtD2Waw+sDYSphJqn2hnwzg7T5NpsYPRWb/274KLHEqL3v2h9?= =?us-ascii?Q?1JdJ/BVXMpfl8pfR8PDLsewGNupXsjsqIF4PyBdXUnLc1hMmX9obq3kA8UkM?= =?us-ascii?Q?UQf9mwuVfnSlZ6UrJdqvCzAvUekjw2QHogAe8e99RFyHFTNS/AhYJv0cCcU4?= =?us-ascii?Q?FUgSTZy3/zKQfiIRbRI+YPEq0HOwW8Ft0RatRz94k5kJHxXG+IMqB9wXNVTZ?= =?us-ascii?Q?2RYsCSOCgR3IQ2ZkMS5GeYaEj7FeYKNZGb5Yx8RDyoHRQkBSAVlqiC7R4H/w?= =?us-ascii?Q?HIdJ+qRBasU4gVhbHdqUw7Egp6VGnMPGi/WLWrML02OGHBwr4MjomyTyv6hS?= =?us-ascii?Q?R6q1UO2P9c3ctms0tTHvLy2BDK6utpHu0qn4YaJNoVBz4Bhc0I5e0ICeMMIq?= =?us-ascii?Q?ydg58WMqTymcZrg+NSz6UVzuncJo5ITTVkiQizauE+JN9hwB+Z4nm95aKaQu?= =?us-ascii?Q?ZjU3YEmzMvJbxt4sxHUb+2kBsnHFnni2njfXEfy79W/1BehHCYhSiC3vZjYG?= =?us-ascii?Q?Gm7Ribrd/YSaZGm6VRKydS6Ke8mq8f6reXOv6CH+tpfByHjuhnhjulZtXPOl?= =?us-ascii?Q?I8XBrn7ze1msEV0sCE3RPvT2hhDaJRrTqVm1maoKoX1sNDbXufAaYz7pdhLt?= =?us-ascii?Q?0hYmPJh91PS6UiN0A69K7uSolTLtQMIt460xt6rmOuCmEiVBZXLv9toCMFDV?= =?us-ascii?Q?P+4jNYZYRBp4DiTMX/0LPMJMdpEg4rs/JYXlvxM+S//IYytKTr1PmaemhLtN?= =?us-ascii?Q?w9Iy4irxtyxTZVOTrFE8pU8jHvixRy4ImVGOAciiezC5ZfDx0TquUriOxMoa?= =?us-ascii?Q?Ocpy9lbIIUOsTV45XcCI5Wj7DDHfRSAuNjf8u99OFyjo4ok1cF/E5ob88SPd?= =?us-ascii?Q?XHbnoKiM2D28Bfn8R4iy++xxp7d/YvoIJR+j/QvkI/jhU8VP34NzpyR0kr7A?= =?us-ascii?Q?haQ32qvOGpnPkECoT6ynpU2JN+U0V5vEIYqwR8P+v3Udmx7wGawjg0mi9VDp?= =?us-ascii?Q?ygF6hxTC6nApmSk/X7XRQclj7sglKbxQ1DRl4D2AQW8J9jCeOyW8BNOdwo/D?= =?us-ascii?Q?TzwzWCu3D8v/lMjUCCVkSEL3b1mxRz0AR69FIU8dAksfhymdD/iFt8CcGeQx?= =?us-ascii?Q?ZPF7OkFYwEHnxWsaUuO5dElX+H6QUFLHzEst5Cgf?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4929.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: d1b135dc-4f50-4a6b-b1d1-08dc67e5e957 X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Apr 2024 00:47:13.9663 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: OuGDD3cm1ynDZ7X92BuM84nanUPnrrL0TPOlBIy6zL3n+uRMQrVLfVhCfAITBZkdwZTltx7txAS6Tm6AjhVTpJATP9VnJyChxOrcOLmYOqI= X-MS-Exchange-Transport-CrossTenantHeadersStamped: LV8PR11MB8607 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Resent-Date: Sun, 28 Apr 2024 17:47:18 -0700 Resent-From: michael.d.kinney@intel.com Reply-To: devel@edk2.groups.io,michael.d.kinney@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: hRU6Yqo5QlQKgSIopG2MjMnyx7686176AA= Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b="UlbA/f4g"; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 45.79.224.7 as permitted sender) smtp.mailfrom=bounce@groups.io No objections. For all patches related to adding libspdm submodule: Reviewed-by: Michael D Kinney Mike > -----Original Message----- > From: Yao, Jiewen > Sent: Sunday, April 28, 2024 5:33 PM > To: Hou, Wenxing ; devel@edk2.groups.io; Andrew > Fish ; Leif Lindholm ; > Kinney, Michael D ; Liming Gao > ; Sean Brogan ; > Joey Vagedes ; Liu, Zhiguang > ; Kumar, Rahul R > Subject: RE: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature > based on PFP 1.06 spec >=20 > Hi All > It has been 4 work weeks and this V4 patch resolved previous comments > and feedbacks. >=20 > If there is no further objection, I plan to merge it tomorrow. >=20 > Thank you > Yao, Jiewen >=20 >=20 > > -----Original Message----- > > From: Hou, Wenxing > > Sent: Friday, April 26, 2024 9:52 AM > > To: Yao, Jiewen ; devel@edk2.groups.io; Andrew > Fish > > ; Leif Lindholm ; Kinney, > Michael > > D ; Liming Gao ; > > Sean Brogan ; Joey Vagedes > > ; Liu, Zhiguang ; > Kumar, > > Rahul R > > Subject: RE: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature > based on > > PFP 1.06 spec > > > > Hi EDKII stewards, > > > > Could you please review the libspdm license? > > > > The libspdm(https://github.com/DMTF/libspdm) is a implementation that > follows > > the DMTF SPDM(https://www.dmtf.org/standards/spdm) spec. > > > > And the libspdm library is under DMTF repo. > > The license is: https://github.com/DMTF/libspdm/blob/main/LICENSE.md > > > > > > > > Thanks, > > Wenxing > > > > > > -----Original Message----- > > From: Yao, Jiewen > > Sent: Sunday, April 21, 2024 10:31 AM > > To: Hou, Wenxing ; devel@edk2.groups.io; Andrew > Fish > > ; Leif Lindholm ; Kinney, > Michael > > D ; Liming Gao ; > > Sean Brogan ; Joey Vagedes > > ; Liu, Zhiguang ; > Kumar, > > Rahul R > > Subject: RE: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature > based on > > PFP 1.06 spec > > > > All series: Reviewed-by: Jiewen Yao > > > > Dear Steward member > > Do you have any concern on adding libspdm > (https://github.com/DMTF/libspdm) > > as one more submodule? > > > > Thank you > > Yao, Jiewen > > > > > -----Original Message----- > > > From: Hou, Wenxing > > > Sent: Thursday, April 18, 2024 6:16 PM > > > To: devel@edk2.groups.io; Andrew Fish ; Leif > Lindholm > > > ; Kinney, Michael D > > > ; Liming Gao ; > > > Sean Brogan ; Joey Vagedes > > > ; Liu, Zhiguang ; > > > Kumar, Rahul R ; Yao, Jiewen > > > > > > Subject: RE: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity > feature > > > based on PFP 1.06 spec > > > > > > Dear EDKII reviewers: > > > > > > Thank you for your previous review of this patch set. > > > Currently, five patches have been reviewed by. > > > > > > But there are five patches need review. > > > Patch1: MdePkg: Add SPDM1.2 support. > > > Patch2: MdePkg: Add TCG PFP 1.06 support. > > > Patch4: MdeModulePkg/Variable: Add TCG SPDM device measurement > > > update > > > Patch8: .gitmodule: Add libspdm submodule for EDKII > > > Patch10: ReadMe.rst: Add libspdm submodule license > > > > > > Could you please review the PATCH v4? > > > > > > PS: Jiewen has reviewed all the PATCH. And I have fixed his feedback > in PATCH > > v4. > > > Jiewen has no questions about all the patches anymore. > > > > > > Thanks, > > > Wenxing > > > > > > > > > -----Original Message----- > > > From: devel@edk2.groups.io On Behalf Of > Wenxing > > > Hou > > > Sent: Thursday, April 18, 2024 5:28 PM > > > To: devel@edk2.groups.io > > > Cc: Andrew Fish ; Leif Lindholm > > > ; Kinney, Michael D > > > ; Liming Gao ; > > > Sean Brogan ; Joey Vagedes > > > ; Liu, Zhiguang ; > > > Kumar, Rahul R ; Yao, Jiewen > > > > > > Subject: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature > > > based on PFP > > > 1.06 spec > > > > > > REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D2479 > > > > > > In PFP spec 1.06, platform firmware records the device certificate > and > > > device measurement for each SPDM responder. > > > This PATCH set implement the DeviceSecurityLib to support spdm > device > > > Authentication and Measurement. > > > > > > Libspdm as submodule is to support DeviceSecurity feature: > > > https://github.com/DMTF/libspdm > > > > > > TCG PFP spec 1.06: > > > https://trustedcomputinggroup.org/resource/pc-client-specific- > platform > > > - > > > firmware-profile-specification/ > > > > > > The POC branch: > > > https://github.com/tianocore/edk2-staging/tree/DeviceSecurity > > > > > > And the PATCH set has passed the EDKII CI: > > > https://github.com/tianocore/edk2/pull/5508 > > > > > > v2 changes: > > > - Fix typo: PcdEnableSpdmDeviceAuthenticaion -> > > > PcdEnableSpdmDeviceAuthentication > > > v3 changes: > > > - Add new patch 10: Update ReadMe.rst for libspdm submodule license > > > v4 changes: > > > - Update submodule libspdm to latest tag > > > > > > PATCH 3: Reviewed-by: Liming Gao PATCH 5: > > > Reviewed-by: Jiewen Yao PATCH 6: Reviewed-by: > > > Jiewen Yao PATCH 7: Reviewed-by: Joey Vagedes > > > PATCH 9: Reviewed-by: Jiewen Yao > > > > > > > > > Cc: Andrew Fish > > > Cc: Leif Lindholm > > > Cc: Michael D Kinney > > > Cc: Liming Gao > > > Cc: Sean Brogan > > > Cc: Joey Vagedes > > > Cc: Zhiguang Liu > > > Cc: Rahul Kumar > > > Cc: Jiewen Yao > > > Signed-off-by: Wenxing Hou > > > > > > Wenxing Hou (10): > > > MdePkg: Add SPDM1.2 support. > > > MdePkg: Add TCG PFP 1.06 support. > > > MdePkg: Add devAuthBoot GlobalVariable > > > MdeModulePkg/Variable: Add TCG SPDM device measurement update > > > SecurityPkg: Add TCG PFP 1.06 support. > > > SecurityPkg: add DeviceSecurity support > > > .pytool/CISettings.py: add libspdm submodule. > > > .gitmodule: Add libspdm submodule for EDKII > > > SecurityPkg: Add libspdm submodule > > > ReadMe.rst: Add libspdm submodule license > > > > > > .gitmodules | 3 + > > > .pytool/CISettings.py | 2 + > > > MdeModulePkg/MdeModulePkg.dec | 5 + > > > .../Variable/RuntimeDxe/Measurement.c | 38 +- > > > .../RuntimeDxe/VariableRuntimeDxe.inf | 3 + > > > .../RuntimeDxe/VariableSmmRuntimeDxe.inf | 3 + > > > MdePkg/Include/Guid/GlobalVariable.h | 8 +- > > > MdePkg/Include/Guid/ImageAuthentication.h | 5 +- > > > MdePkg/Include/IndustryStandard/Spdm.h | 1112 > ++++++++++++++++- > > > .../IndustryStandard/UefiTcgPlatform.h | 186 ++- > > > ReadMe.rst | 1 + > > > .../OsStub/CryptlibWrapper/CryptlibWrapper.c | 970 ++++++++++++++ > > > .../CryptlibWrapper/CryptlibWrapper.inf | 38 + > > > .../OsStub/MemLibWrapper/MemLibWrapper.c | 177 +++ > > > .../OsStub/MemLibWrapper/MemLibWrapper.inf | 33 + > > > .../PlatformLibWrapper/PlatformLibWrapper.c | 85 ++ > > > .../PlatformLibWrapper/PlatformLibWrapper.inf | 33 + > > > .../SpdmLib/Include/Stub/SpdmLibStub.h | 347 +++++ > > > .../SpdmLib/Include/hal/LibspdmStdBoolAlt.h | 23 + > > > .../SpdmLib/Include/hal/LibspdmStdDefAlt.h | 16 + > > > .../SpdmLib/Include/hal/LibspdmStdIntAlt.h | 25 + > > > .../DeviceSecurity/SpdmLib/Include/hal/base.h | 94 ++ > > > .../SpdmLib/Include/hal/library/debuglib.h | 39 + > > > .../SpdmLib/Include/library/spdm_lib_config.h | 394 ++++++ > > > .../DeviceSecurity/SpdmLib/SpdmCommonLib.inf | 47 + > > > .../DeviceSecurity/SpdmLib/SpdmCryptLib.inf | 45 + > > > .../SpdmLib/SpdmDeviceSecretLibNull.inf | 36 + > > > .../SpdmLib/SpdmRequesterLib.inf | 59 + > > > .../SpdmLib/SpdmResponderLib.inf | 61 + > > > .../SpdmLib/SpdmSecuredMessageLib.inf | 44 + > > > .../SpdmLib/SpdmTransportMctpLib.inf | 38 + > > > .../SpdmLib/SpdmTransportPciDoeLib.inf | 38 + > > > SecurityPkg/DeviceSecurity/SpdmLib/libspdm | 1 + > > > .../SpdmSecurityLib/SpdmAuthentication.c | 697 +++++++++++ > > > .../SpdmSecurityLib/SpdmConnectionInit.c | 481 +++++++ > > > .../SpdmSecurityLib/SpdmMeasurement.c | 714 +++++++++++ > > > .../SpdmSecurityLib/SpdmSecurityLib.c | 148 +++ > > > .../SpdmSecurityLib/SpdmSecurityLib.inf | 54 + > > > .../SpdmSecurityLib/SpdmSecurityLibInternal.h | 250 ++++ > > > SecurityPkg/Include/Library/SpdmSecurityLib.h | 437 +++++++ > > > SecurityPkg/Include/Library/Tpm2CommandLib.h | 23 +- > > > .../Include/Protocol/DeviceSecurityPolicy.h | 133 ++ > > > .../HashLibBaseCryptoRouterDxe.c | 88 +- > > > .../Library/Tpm2CommandLib/Tpm2NVStorage.c | 122 +- > > > SecurityPkg/SecurityPkg.ci.yaml | 17 +- > > > SecurityPkg/SecurityPkg.dec | 13 +- > > > SecurityPkg/SecurityPkg.dsc | 31 +- > > > SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.c | 61 +- > > > SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf | 4 +- > > > 49 files changed, 7197 insertions(+), 85 deletions(-) create mode > > > 100644 > > > SecurityPkg/DeviceSecurity/OsStub/CryptlibWrapper/CryptlibWrapper.c > > > create mode 100644 > > > > SecurityPkg/DeviceSecurity/OsStub/CryptlibWrapper/CryptlibWrapper.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/OsStub/MemLibWrapper/MemLibWrapper.c > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/OsStub/MemLibWrapper/MemLibWrapper.inf > > > create mode 100644 > > > > SecurityPkg/DeviceSecurity/OsStub/PlatformLibWrapper/PlatformLibWrappe > > > r.c > > > create mode 100644 > > > > SecurityPkg/DeviceSecurity/OsStub/PlatformLibWrapper/PlatformLibWrappe > > > r.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/Include/Stub/SpdmLibStub.h > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdBoolAlt.h > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdDefAlt.h > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdIntAlt.h > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/base.h > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/library/debuglib.h > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/Include/library/spdm_lib_config.h > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmCommonLib.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmCryptLib.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmDeviceSecretLibNull.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmRequesterLib.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmResponderLib.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmSecuredMessageLib.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmTransportMctpLib.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmTransportPciDoeLib.inf > > > create mode 160000 SecurityPkg/DeviceSecurity/SpdmLib/libspdm > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmAuthentication.c > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmConnectionInit.c > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmMeasurement.c > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLib.c > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLib.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLibInternal.h > > > create mode 100644 SecurityPkg/Include/Library/SpdmSecurityLib.h > > > create mode 100644 > > > SecurityPkg/Include/Protocol/DeviceSecurityPolicy.h > > > > > > -- > > > 2.26.2.windows.1 > > > > > > > > > > > >=20 > > > -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#118358): https://edk2.groups.io/g/devel/message/118358 Mute This Topic: https://groups.io/mt/105594737/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-