From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id D98E574003A for ; Tue, 9 Apr 2024 15:14:08 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=K71yfccl6niEKq0vE73LrlneGgI+FTg3IWtWtBCT2NY=; c=relaxed/simple; d=groups.io; h=From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Resent-Date:Resent-From:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20240206; t=1712675647; v=1; b=tfk8nlG3jvVzVaTiT9+/qQKDu6Sm39WPkSsfVUwKfKmKnvuwzS6RaLsfHnHl1z3xAKZYXdIM IrpfQ96oSKSparnVBL+VWGRJoSXNV6w1YtU/0EOXUAGatgJcfvqgEJWXOPSyPipWkaeSd73aeVr /0INYljygBkAnMCqm+/7RVGjZG+9dII3yU13jLOxoatBKPYjR8Rll2QSbW4A9UM24ACxvaLd8ZM KcVSyNH5pAsG45nr7qE+KKfCwTN82RT1vfCZR15WjxjrgTZ+dBteBIZ8K6EUbE2Nu+j7khyV/zs ey0seDFBPac8IVseUUFeqpRrs4ujtcnaLb3zzRXDr9k4Q== X-Received: by 127.0.0.2 with SMTP id aUwIYY7687511x9JjmaddHAv; Tue, 09 Apr 2024 08:14:07 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) by mx.groups.io with SMTP id smtpd.web11.139805.1712675645431367586 for ; Tue, 09 Apr 2024 08:14:07 -0700 X-CSE-ConnectionGUID: Jp9Hb7qYQDStr+VSCDk92g== X-CSE-MsgGUID: efowJX32TR2rAFvW6vtZWw== X-IronPort-AV: E=McAfee;i="6600,9927,11039"; a="8569005" X-IronPort-AV: E=Sophos;i="6.07,189,1708416000"; d="scan'208";a="8569005" X-Received: from fmviesa009.fm.intel.com ([10.60.135.149]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Apr 2024 08:14:05 -0700 X-CSE-ConnectionGUID: ooQYpBGlTMe3vkFY4t50Qg== X-CSE-MsgGUID: WW9LQ45+QPu0sqJPuqGg4w== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.07,189,1708416000"; d="scan'208";a="20296511" X-Received: from orsmsx602.amr.corp.intel.com ([10.22.229.15]) by fmviesa009.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 09 Apr 2024 08:14:01 -0700 X-Received: from orsmsx603.amr.corp.intel.com (10.22.229.16) by ORSMSX602.amr.corp.intel.com (10.22.229.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Tue, 9 Apr 2024 08:13:58 -0700 X-Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by orsmsx603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35 via Frontend Transport; Tue, 9 Apr 2024 08:13:58 -0700 X-Received: from NAM11-BN8-obe.outbound.protection.outlook.com (104.47.58.170) by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Tue, 9 Apr 2024 08:13:58 -0700 X-Received: from CO1PR11MB4929.namprd11.prod.outlook.com (2603:10b6:303:6d::19) by SJ0PR11MB6694.namprd11.prod.outlook.com (2603:10b6:a03:44d::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7452.25; Tue, 9 Apr 2024 15:13:55 +0000 X-Received: from CO1PR11MB4929.namprd11.prod.outlook.com ([fe80::e34e:4d18:b93e:c368]) by CO1PR11MB4929.namprd11.prod.outlook.com ([fe80::e34e:4d18:b93e:c368%5]) with mapi id 15.20.7409.031; Tue, 9 Apr 2024 15:13:55 +0000 From: "Michael D Kinney" To: "Hou, Wenxing" , "devel@edk2.groups.io" CC: Sean Brogan , Joey Vagedes , Liming Gao , Andrew Fish , "Liu, Zhiguang" , "Kumar, Rahul R" , "Yao, Jiewen" , "Kinney, Michael D" Subject: Re: [edk2-devel] [PATCH 0/9] Add DeviceSecurity feature based on PFP 1.06 spec Thread-Topic: [PATCH 0/9] Add DeviceSecurity feature based on PFP 1.06 spec Thread-Index: AQHahKXkhl1aGvhDX0KVrKbW0mmUU7FgFIBQ Date: Tue, 9 Apr 2024 15:13:54 +0000 Message-ID: References: <20240402023125.4168-1-wenxing.hou@intel.com> In-Reply-To: <20240402023125.4168-1-wenxing.hou@intel.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: CO1PR11MB4929:EE_|SJ0PR11MB6694:EE_ x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: lp5fN1KlG2BV/Ll3j+PUwUu88oaLIBODcXMwJ732ajh9rrNBQIyk83Ct3udBqBJXYm5FSF85spKdrXHymMpJDVXExxpXcmCVgYCZtX3mFl6nhwEwqTcez8aTynPN83iPfzHKBJIaN+GTF0zxsGA//2V1Rpfj+Y8lhpFZRwN/V8KH7Y0LLk+XtqQn16PCVM4IZm0Nm4hXv0R/N8VnKrcXlUIjk7WSGqlji4cXxe821FIy17NyvGAUaVoKtcXyCZ/ddXojG/Qtnwnv7VlDzGYSb9gL/GTxiNrrWGJDcaYLBp97hbCvTUpOi5A8cuE8OsLsZGAEdW7wDqZVjr9cqA9fdE8EmPpmOYb6wzmAAKoiqAh4uV7Vfjkn97as2rC5ToSzoN3PojwgHkDj4lfWsxOnPT0ZGixkR/TGh8wklE8n+1VB9K9cN3wETYD/0LGET0DIyf3AVmOowjss84rZA17B9gTLABLn7BWKp7TVkU8d+Ls/Lrq5+N4g8VRSi+ltV5z4XhQHvrdv4oUHYoL0C0YRCnbvDwOJNM4dUDdExp005+Stdm7eeikugquefigB6iWx+tcSb/oAJjvh0hT0GwTq3cmBeKfI/kpwlAXR6vCWUXj6B1rFpvMKjn8qIQQ7jrG5 x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?LYHleN59K8QKCHzREShz1EMW4h7RQ8VRhWBYWejyq8jsK25RBMWAhynzdZ38?= =?us-ascii?Q?oQ2kUQJI3e9bIbiw5UgCOttfbUaUVqK8bxkfDvKRx8X22zNahlFcF+lkyM2R?= =?us-ascii?Q?dthWe6ysz6EILLvbJNA+ehvvIftWf0RqXqnmESYOs2bL/44wqXSuBnUM2+3q?= =?us-ascii?Q?3w+g5CX+YZxu94G5F0yPPB6hkDdLJV8vzuwoRDURwi/cIbUlTkYxUBupLbwC?= =?us-ascii?Q?1FGpJQl0xz11e4cN3Lh98Rc+Qduag7bUJB7RZPE4LVvVsS1tLcpalx2Fzy+I?= =?us-ascii?Q?MG+9bM7K/GDVW4t6REb0qxqXp4Y72r1bUA15zVrZVPZ0HTGZJICRzXEWn/cN?= =?us-ascii?Q?K4dK3y9eLZbDgaI/apn7RpeNh71OirmLAG/bFB7WN2r8frYZugAApu84LPuq?= =?us-ascii?Q?uhKsfXgpcXzvX7amaxRHBYOJ5UIgb7KNzt34Fl62LzaHBO8Vt3hsd3xcd5r6?= =?us-ascii?Q?8LA+cjcF/1j+dXsgFwRKlMRZAduftqa3Ad1YNGXjLZ2lzgPC0njeXcC2FJxH?= =?us-ascii?Q?0YL+Rj0jeojQJXfgxNCyjOpteYBup7tzVGjcGiDpzUQpoZaYwiwLNa/Ask/a?= =?us-ascii?Q?b6uT7niQcb0OtD+rlLsl97Kh5dIKHIniQlc0uYN6O1Lqq3nrwZ5kQKlvIoH6?= =?us-ascii?Q?7zn1bFJKK96mzixbu2EFVgd+TIbzTFUFdzwy9RbOn9CSmX+A2hDvzCDMyeBG?= =?us-ascii?Q?bKjY2RPR4BrBZE8QSlM/ZS4289T2B6Nvpc3yXpfBoN6y/7AY3FxBDGaf0byo?= =?us-ascii?Q?pgMxfP57M2p4LECnK8UoXjPKQTYsM/CpWF3mab51y7Im6zZ9v5JxnEWDY6Qq?= =?us-ascii?Q?V+OEWTPJWnlwEIXUUSPgRyDPtxXVauBWEGc4zlC1CJvxlGWMewmTp0wY0e6j?= =?us-ascii?Q?zdFOvrz1t+OOCMQX/E+clQvfXxdEhkgbvISRpnnfQEx756ZP4nFeMmzTCJFC?= =?us-ascii?Q?Vedo9wZhxbKWRBdVQz1a0pDda6MPVmBtzu79ghNtBtXQkGUTHzk0wm0X0b0D?= =?us-ascii?Q?mwsCK4v+JZI7oW7r4chK7CsoZZr+FoQBsIe2Mprnj2aOCcHygXb+RLRXv1G4?= =?us-ascii?Q?4F/DT2vOyjbCB/4VGoIhz0hMsB/EMZW/ofXjrGxZG2DhRCzUwayGuZene3cH?= =?us-ascii?Q?sF3E/H5sJ73EYzKPVt0RQ/R0gSCG8fTJL78rN3dnF+JvTc2+uqvnbE4pGfoQ?= =?us-ascii?Q?ih1nxa+I5QITs/YuIvgt2Xre4jom5sjaFDE6JqWOaM1m1+djEekg4lWHftQn?= =?us-ascii?Q?VxLC1HnCOPKu1lhVzWbBAwqzgkBZgkZlyZcJrGMFObEUPc3BFiiTr9h2lrf5?= =?us-ascii?Q?IOkFDDddf9PGDmF01Js6Rpyv53Dlotm2KTL+IGlNmpKJrj0eE6Pt9NXN362m?= =?us-ascii?Q?y6LFbTDceNxN4aOwDFdueovfsdnC+dCtPM2GjevsEP9OctMDFl4SwhbvY+zi?= =?us-ascii?Q?R21+gWHqu9YZjjAn+m2NDSHD4ar4Qv/raK0WIxnXuA5mkwlIhl/L0WHIbGM8?= =?us-ascii?Q?AFhJIEjDKgtzwTijXMC2pbod2b+fVO8a7cD6Nr4tR0cPYX7TurXSGf0FEFGE?= =?us-ascii?Q?43kf+PchLfyKrkLk3JHY3oIXf9Z50sxpDWceDhbT?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4929.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 354aad77-e3db-439c-0950-08dc58a7ac30 X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Apr 2024 15:13:55.1287 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: IkLAhKTCpu3TZGaiuEKeDz6JFww/eJkBxLEmjcxujP6GlZcfDSgUzsDspASU+emwFxDPPv++oG0jdXwOfX2IQKVz4aoJsK04ABSPaQhkZEQ= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB6694 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Resent-Date: Tue, 09 Apr 2024 08:14:07 -0700 Resent-From: michael.d.kinney@intel.com Reply-To: devel@edk2.groups.io,michael.d.kinney@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: 83WswXYGPmgS4mUln3zKjexOx7686176AA= Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b=tfk8nlG3; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io +Leif Adding a new submodule requires review by the stewards to review the license and the health and support of the submodule project. The top level Readme also requires updates. It lists all the submodules and licenses used. Please update this series with the Readme changes. https://github.com/tianocore/edk2?tab=3Dreadme-ov-file#license-details I also notice that libspdm has its own .gitmodules file that pulls in more submodules. [submodule "os_stub/openssllib/openssl"] path =3D os_stub/openssllib/openssl url =3D https://github.com/openssl/openssl [submodule "os_stub/mbedtlslib/mbedtls"] path =3D os_stub/mbedtlslib/mbedtls url =3D https://github.com/ARMmbed/mbedtls [submodule "unit_test/cmockalib/cmocka"] path =3D unit_test/cmockalib/cmocka url =3D https://git.cryptomilk.org/projects/cmocka.git edk2 already had openssl and mbedtls as submodules, does this mean that openssl and mbedtls will be cloned twice in 2 different locations now? The edk2 project had issues with the stability of the cmocka server and changed to a tianocore mirror of the cmocka submodule to improve CI stability. This is another submodule that will be cloned twice and may reintroduce the potential for CI stability issues. Thanks, Mike > -----Original Message----- > From: Hou, Wenxing > Sent: Monday, April 1, 2024 7:31 PM > To: devel@edk2.groups.io > Cc: Sean Brogan ; Joey Vagedes > ; Kinney, Michael D > ; Liming Gao ; > Andrew Fish ; Liu, Zhiguang ; > Kumar, Rahul R ; Yao, Jiewen > > Subject: [PATCH 0/9] Add DeviceSecurity feature based on PFP 1.06 spec >=20 > REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D2479 >=20 > In PFP spec 1.06, platform firmware records the device certificate and > device measurement for each SPDM responder. > This PATCH set implement the DeviceSecurityLib to support spdm device > Authentication and Measurement. >=20 > Libspdm as submodule is to support DeviceSecurity feature: > https://github.com/DMTF/libspdm >=20 > TCG PFP spec 1.06: > https://trustedcomputinggroup.org/resource/pc-client-specific- > platform-firmware-profile-specification/ >=20 > The POC branch: > https://github.com/tianocore/edk2-staging/tree/DeviceSecurity >=20 > And the PATCH set has passed the EDKII CI: > https://github.com/tianocore/edk2/pull/5508 >=20 > Cc: Sean Brogan > Cc: Joey Vagedes > Cc: Michael D Kinney > Cc: Liming Gao > Cc: Andrew Fish > Cc: Zhiguang Liu > Cc: Rahul Kumar > Cc: Jiewen Yao > Signed-off-by: Wenxing Hou >=20 > Wenxing Hou (9): > MdePkg: Add SPDM1.2 support. > MdePkg: Add TCG PFP 1.06 support. > MdePkg: Add devAuthBoot GlobalVariable > MdeModulePkg/Variable: Add TCG SPDM device measurement update > SecurityPkg: Add TCG PFP 1.06 support. > SecurityPkg: add DeviceSecurity support > .pytool/CISettings.py: add libspdm submodule. > .gitmodule: Add libspdm submodule for EDKII > SecurityPkg: Add libspdm submodule >=20 > .gitmodules | 3 + > .pytool/CISettings.py | 2 + > MdeModulePkg/MdeModulePkg.dec | 5 + > .../Variable/RuntimeDxe/Measurement.c | 38 +- > .../RuntimeDxe/VariableRuntimeDxe.inf | 3 + > .../RuntimeDxe/VariableSmmRuntimeDxe.inf | 3 + > MdePkg/Include/Guid/GlobalVariable.h | 8 +- > MdePkg/Include/Guid/ImageAuthentication.h | 5 +- > MdePkg/Include/IndustryStandard/Spdm.h | 1112 > ++++++++++++++++- > .../IndustryStandard/UefiTcgPlatform.h | 186 ++- > .../OsStub/CryptlibWrapper/CryptlibWrapper.c | 970 ++++++++++++++ > .../CryptlibWrapper/CryptlibWrapper.inf | 38 + > .../OsStub/MemLibWrapper/MemLibWrapper.c | 177 +++ > .../OsStub/MemLibWrapper/MemLibWrapper.inf | 33 + > .../PlatformLibWrapper/PlatformLibWrapper.c | 85 ++ > .../PlatformLibWrapper/PlatformLibWrapper.inf | 33 + > .../SpdmLib/Include/Stub/SpdmLibStub.h | 347 +++++ > .../SpdmLib/Include/hal/LibspdmStdBoolAlt.h | 23 + > .../SpdmLib/Include/hal/LibspdmStdDefAlt.h | 16 + > .../SpdmLib/Include/hal/LibspdmStdIntAlt.h | 25 + > .../DeviceSecurity/SpdmLib/Include/hal/base.h | 94 ++ > .../SpdmLib/Include/hal/library/debuglib.h | 39 + > .../SpdmLib/Include/library/spdm_lib_config.h | 394 ++++++ > .../DeviceSecurity/SpdmLib/SpdmCommonLib.inf | 47 + > .../DeviceSecurity/SpdmLib/SpdmCryptLib.inf | 45 + > .../SpdmLib/SpdmDeviceSecretLibNull.inf | 36 + > .../SpdmLib/SpdmRequesterLib.inf | 59 + > .../SpdmLib/SpdmResponderLib.inf | 61 + > .../SpdmLib/SpdmSecuredMessageLib.inf | 44 + > .../SpdmLib/SpdmTransportMctpLib.inf | 38 + > .../SpdmLib/SpdmTransportPciDoeLib.inf | 38 + > SecurityPkg/DeviceSecurity/SpdmLib/libspdm | 1 + > .../SpdmSecurityLib/SpdmAuthentication.c | 697 +++++++++++ > .../SpdmSecurityLib/SpdmConnectionInit.c | 481 +++++++ > .../SpdmSecurityLib/SpdmMeasurement.c | 714 +++++++++++ > .../SpdmSecurityLib/SpdmSecurityLib.c | 148 +++ > .../SpdmSecurityLib/SpdmSecurityLib.inf | 54 + > .../SpdmSecurityLib/SpdmSecurityLibInternal.h | 250 ++++ > SecurityPkg/Include/Library/SpdmSecurityLib.h | 437 +++++++ > SecurityPkg/Include/Library/Tpm2CommandLib.h | 23 +- > .../Include/Protocol/DeviceSecurityPolicy.h | 133 ++ > .../HashLibBaseCryptoRouterDxe.c | 88 +- > .../Library/Tpm2CommandLib/Tpm2NVStorage.c | 122 +- > SecurityPkg/SecurityPkg.ci.yaml | 17 +- > SecurityPkg/SecurityPkg.dec | 13 +- > SecurityPkg/SecurityPkg.dsc | 31 +- > SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.c | 61 +- > SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf | 4 +- > 48 files changed, 7196 insertions(+), 85 deletions(-) > create mode 100644 > SecurityPkg/DeviceSecurity/OsStub/CryptlibWrapper/CryptlibWrapper.c > create mode 100644 > SecurityPkg/DeviceSecurity/OsStub/CryptlibWrapper/CryptlibWrapper.inf > create mode 100644 > SecurityPkg/DeviceSecurity/OsStub/MemLibWrapper/MemLibWrapper.c > create mode 100644 > SecurityPkg/DeviceSecurity/OsStub/MemLibWrapper/MemLibWrapper.inf > create mode 100644 > SecurityPkg/DeviceSecurity/OsStub/PlatformLibWrapper/PlatformLibWrappe > r.c > create mode 100644 > SecurityPkg/DeviceSecurity/OsStub/PlatformLibWrapper/PlatformLibWrappe > r.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/Include/Stub/SpdmLibStub.h > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdBoolAlt.h > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdDefAlt.h > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdIntAlt.h > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/base.h > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/library/debuglib.h > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/Include/library/spdm_lib_config.h > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmCommonLib.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmCryptLib.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmDeviceSecretLibNull.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmRequesterLib.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmResponderLib.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmSecuredMessageLib.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmTransportMctpLib.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmTransportPciDoeLib.inf > create mode 160000 SecurityPkg/DeviceSecurity/SpdmLib/libspdm > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmAuthentication.c > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmConnectionInit.c > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmMeasurement.c > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLib.c > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLib.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLibInternal.h > create mode 100644 SecurityPkg/Include/Library/SpdmSecurityLib.h > create mode 100644 > SecurityPkg/Include/Protocol/DeviceSecurityPolicy.h >=20 > -- > 2.26.2.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#117548): https://edk2.groups.io/g/devel/message/117548 Mute This Topic: https://groups.io/mt/105281046/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-