From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by mx.groups.io with SMTP id smtpd.web10.32299.1585208488378977093 for ; Thu, 26 Mar 2020 00:41:28 -0700 Authentication-Results: mx.groups.io; dkim=missing; spf=pass (domain: intel.com, ip: 134.134.136.65, mailfrom: jian.j.wang@intel.com) IronPort-SDR: GWg2HoBI/3Z1ZC+yxmS4tLG4lQtmLKpzYTWSRmL4NXiFo1FAH0+1GLc2O3BaadA4g2gsWi8eRH J2Eenhmot/fA== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Mar 2020 00:41:27 -0700 IronPort-SDR: p1Urt0Y8/y2uuT8XcGTYoXHQrWHkejARg0fATMCM7H7jlA9wbDU/bv45blb44cMjGoTA1c+WuA Hbo+1ebxdzDg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.72,307,1580803200"; d="scan'208,217";a="271078598" Received: from fmsmsx103.amr.corp.intel.com ([10.18.124.201]) by fmsmga004.fm.intel.com with ESMTP; 26 Mar 2020 00:41:27 -0700 Received: from fmsmsx155.amr.corp.intel.com (10.18.116.71) by FMSMSX103.amr.corp.intel.com (10.18.124.201) with Microsoft SMTP Server (TLS) id 14.3.439.0; Thu, 26 Mar 2020 00:41:26 -0700 Received: from shsmsx103.ccr.corp.intel.com (10.239.4.69) by FMSMSX155.amr.corp.intel.com (10.18.116.71) with Microsoft SMTP Server (TLS) id 14.3.439.0; Thu, 26 Mar 2020 00:41:26 -0700 Received: from shsmsx107.ccr.corp.intel.com ([169.254.9.232]) by SHSMSX103.ccr.corp.intel.com ([169.254.4.137]) with mapi id 14.03.0439.000; Thu, 26 Mar 2020 15:41:23 +0800 From: "Wang, Jian J" To: "Yao, Jiewen" , Bret Barkelew , "devel@edk2.groups.io" CC: "Zhang, Chao B" , "Mistry, Nishant C" Subject: Re: [EXTERNAL] [edk2-devel] [PATCH v4 1/3] SecurityPkg: add RpmcLib and VariableKeyLib public headers Thread-Topic: [EXTERNAL] [edk2-devel] [PATCH v4 1/3] SecurityPkg: add RpmcLib and VariableKeyLib public headers Thread-Index: AQHWAaZqfdUmQ2YBEEe3PPHFZgaEdahYBD1HgACJJwCAAfJooA== Date: Thu, 26 Mar 2020 07:41:22 +0000 Message-ID: References: <20200324063523.336-1-jian.j.wang@intel.com>,<20200324063523.336-2-jian.j.wang@intel.com> <74D8A39837DF1E4DA445A8C0B3885C503F99952D@shsmsx102.ccr.corp.intel.com> In-Reply-To: <74D8A39837DF1E4DA445A8C0B3885C503F99952D@shsmsx102.ccr.corp.intel.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-version: 11.2.0.6 dlp-reaction: no-action msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2020-03-24T17:43:46.7432723Z;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Privileged x-originating-ip: [10.239.127.40] MIME-Version: 1.0 Return-Path: jian.j.wang@intel.com Content-Language: en-US Content-Type: multipart/alternative; boundary="_000_D827630B58408649ACB04F44C510003625A31FDBSHSMSX107ccrcor_" --_000_D827630B58408649ACB04F44C510003625A31FDBSHSMSX107ccrcor_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable I agree to change the function name to be more specific to avoid confusion,= since this lib is intended to be used for variable service only. I'll send v5 soon. Regards, Jian From: Yao, Jiewen Sent: Wednesday, March 25, 2020 5:55 PM To: Bret Barkelew ; devel@edk2.groups.io; Wang= , Jian J Cc: Zhang, Chao B ; Mistry, Nishant C Subject: RE: [EXTERNAL] [edk2-devel] [PATCH v4 1/3] SecurityPkg: add RpmcLi= b and VariableKeyLib public headers Good point. I think the original design limits the usage to be variable driver. As such= , the API only gets a "variable root key". A "platform root key" can derive the "variable root key" and some "other fe= atures' root key". The tricky part is to regenerate the key, when the variable is under attack= . In that case, we want to only regenerate the "variable root key", instead o= f "platform root key". That's why we want to introduce a variablekeylib module. To make API consistent, maybe we should rename GetVariableRootKey() to GetV= ariableKey(), RegenerateKey() to RegenerateVariableKey(), and LockKeyInterf= ace() to LockVariableKeyInterface() If we really want to create a generic platformkeylib module, then we need a= dd a key indicator. Such as: EFI_STATUS EFIAPI GetPlatformKey ( IN GUID *KeyIndicator, OUT VOID **PlatformKey, IN OUT UINTN *PlatformKeySize ); Then the variable driver can pass a GUID, and any other feature driver can = pass anther GUID. Thank you Yao Jiewen From: Bret Barkelew > Sent: Wednesday, March 25, 2020 1:44 AM To: devel@edk2.groups.io; Wang, Jian J > Cc: Yao, Jiewen >; Zhang,= Chao B >; Mistry, Ni= shant C > Subject: RE: [EXTERNAL] [edk2-devel] [PATCH v4 1/3] SecurityPkg: add RpmcLi= b and VariableKeyLib public headers Is there a reason this needs to be called "VariableKeyLib" rather than any = other "KeyLib"? It seems general-purpose as an interface. - Bret ________________________________ From: devel@edk2.groups.io > on behalf of Wang, Jian J via Groups.Io > Sent: Monday, March 23, 2020 11:35:21 PM To: devel@edk2.groups.io > Cc: Jiewen Yao >; Chao Zh= ang >; Nishant C Mist= ry > Subject: [EXTERNAL] [edk2-devel] [PATCH v4 1/3] SecurityPkg: add RpmcLib an= d VariableKeyLib public headers > v4: remove CounterId which should not be exposed REF: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fbu= gzilla.tianocore.org%2Fshow_bug.cgi%3Fid%3D2594&data=3D02%7C01%7Cbret.b= arkelew%40microsoft.com%7C3e34ac4a40d94c82e86b08d7cfbd8b82%7C72f988bf86f141= af91ab2d7cd011db47%7C1%7C0%7C637206285305504454&sdata=3DwCxxsc6cc%2Ffdu= q88XOZOZv6debpAQMZiIdsFjD0zHXE%3D&reserved=3D0 RpmcLib.h and VariableKeyLib.h are header files required to access RPMC device and Key generator from platform. They will be used to ensure the integrity and confidentiality of NV variables. Cc: Jiewen Yao > Cc: Chao Zhang > Cc: Nishant C Mistry > Signed-off-by: Jian J Wang > --- SecurityPkg/Include/Library/RpmcLib.h | 42 ++++++++++++++ SecurityPkg/Include/Library/VariableKeyLib.h | 59 ++++++++++++++++++++ SecurityPkg/SecurityPkg.dec | 8 +++ 3 files changed, 109 insertions(+) create mode 100644 SecurityPkg/Include/Library/RpmcLib.h create mode 100644 SecurityPkg/Include/Library/VariableKeyLib.h diff --git a/SecurityPkg/Include/Library/RpmcLib.h b/SecurityPkg/Include/Li= brary/RpmcLib.h new file mode 100644 index 0000000000..8e3868516c --- /dev/null +++ b/SecurityPkg/Include/Library/RpmcLib.h @@ -0,0 +1,42 @@ +/** @file + Public definitions for the Replay Protected Monotonic Counter (RPMC) Lib= rary. + +Copyright (c) 2020, Intel Corporation. All rights reserved.
+SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#ifndef _RPMC_LIB_H_ +#define _RPMC_LIB_H_ + +#include + +/** + Requests the monotonic counter from the designated RPMC counter. + + @param[out] CounterValue A pointer to a buffer to store the= RPMC value. + + @retval EFI_SUCCESS The operation completed successful= ly. + @retval EFI_DEVICE_ERROR A device error occurred while atte= mpting to update the counter. + @retval EFI_UNSUPPORTED The operation is un-supported. +**/ +EFI_STATUS +EFIAPI +RequestMonotonicCounter ( + OUT UINT32 *CounterValue + ); + +/** + Increments the monotonic counter in the SPI flash device by 1. + + @retval EFI_SUCCESS The operation completed successful= ly. + @retval EFI_DEVICE_ERROR A device error occurred while atte= mpting to update the counter. + @retval EFI_UNSUPPORTED The operation is un-supported. +**/ +EFI_STATUS +EFIAPI +IncrementMonotonicCounter ( + VOID + ); + +#endif \ No newline at end of file diff --git a/SecurityPkg/Include/Library/VariableKeyLib.h b/SecurityPkg/Inc= lude/Library/VariableKeyLib.h new file mode 100644 index 0000000000..fe642b3d66 --- /dev/null +++ b/SecurityPkg/Include/Library/VariableKeyLib.h @@ -0,0 +1,59 @@ +/** @file + Public definitions for Variable Key Library. + +Copyright (c) 2020, Intel Corporation. All rights reserved.
+SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#ifndef _VARIABLE_KEY_LIB_H_ +#define _VARIABLE_KEY_LIB_H_ + +#include + +/** + Retrieves the variable root key. + + @param[out] VariableRootKey A pointer to pointer for the var= iable root key buffer. + @param[in,out] VariableRootKeySize The size in bytes of the variabl= e root key. + + @retval EFI_SUCCESS The variable root key was returned= . + @retval EFI_DEVICE_ERROR An error occurred while attempting= to get the variable root key. + @retval EFI_ACCESS_DENIED The function was invoked after loc= king the key interface. + @retval EFI_UNSUPPORTED The variable root key is not suppo= rted in the current boot configuration. +**/ +EFI_STATUS +EFIAPI +GetVariableRootKey ( + OUT VOID **VariableRootKey, + IN OUT UINTN *VariableRootKeySize + ); + +/** + Regenerates the variable root key. + + @retval EFI_SUCCESS The variable root key was regenera= ted successfully. + @retval EFI_DEVICE_ERROR An error occurred while attempting= to regenerate the root key. + @retval EFI_ACCESS_DENIED The function was invoked after loc= king the key interface. + @retval EFI_UNSUPPORTED Key regeneration is not supported = in the current boot configuration. +**/ +EFI_STATUS +EFIAPI +RegenerateKey ( + VOID + ); + +/** + Locks the regenerate key interface. + + @retval EFI_SUCCESS The key interface was locked succe= ssfully. + @retval EFI_UNSUPPORTED Locking the key interface is not s= upported in the current boot configuration. + @retval Others An error occurred while attempting= to lock the key interface. +**/ +EFI_STATUS +EFIAPI +LockKeyInterface ( + VOID + ); + +#endif \ No newline at end of file diff --git a/SecurityPkg/SecurityPkg.dec b/SecurityPkg/SecurityPkg.dec index 5335cc5397..2cdfb02cc5 100644 --- a/SecurityPkg/SecurityPkg.dec +++ b/SecurityPkg/SecurityPkg.dec @@ -76,6 +76,14 @@ # TcgStorageOpalLib|Include/Library/TcgStorageOpalLib.h + ## @libraryclass Provides interfaces to access RPMC device. + # + RpmcLib|Include/Library/RpmcLib.h + + ## @libraryclass Provides interfaces to access variable root key. + # + VariableKeyLib|Include/Library/VariableKeyLib.h + [Guids] ## Security package token space guid. # Include/Guid/SecurityPkgTokenSpace.h -- 2.24.0.windows.2 -=3D-=3D-=3D-=3D-=3D-=3D Groups.io Links: You receive all messages sent to this group. View/Reply Online (#56132): https://nam06.safelinks.protection.outlook.com/= ?url=3Dhttps%3A%2F%2Fedk2.groups.io%2Fg%2Fdevel%2Fmessage%2F56132&data= =3D02%7C01%7Cbret.barkelew%40microsoft.com%7C3e34ac4a40d94c82e86b08d7cfbd8b= 82%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637206285305514447&sdat= a=3DCoBs9mwnHTAAZiErAEHS3E7dbdRd%2FZefJPKXKPmJwfc%3D&reserved=3D0 Mute This Topic: https://nam06.safelinks.protection.outlook.com/?url=3Dhttp= s%3A%2F%2Fgroups.io%2Fmt%2F72512084%2F1852292&data=3D02%7C01%7Cbret.bar= kelew%40microsoft.com%7C3e34ac4a40d94c82e86b08d7cfbd8b82%7C72f988bf86f141af= 91ab2d7cd011db47%7C1%7C0%7C637206285305514447&sdata=3D%2B14%2BIfGmu88GS= nKZnpb51EGaW3MqfFCT1%2BWI5Bhdlo0%3D&reserved=3D0 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A= %2F%2Fedk2.groups.io%2Fg%2Fdevel%2Funsub&data=3D02%7C01%7Cbret.barkelew= %40microsoft.com%7C3e34ac4a40d94c82e86b08d7cfbd8b82%7C72f988bf86f141af91ab2= d7cd011db47%7C1%7C0%7C637206285305514447&sdata=3DJLLWLjx0OW0eTjn7xXG5aN= HdAfWQqhY4qLXSuNhhcys%3D&reserved=3D0 [bret.barkelew@microsoft.com] -=3D-=3D-=3D-=3D-=3D-=3D --_000_D827630B58408649ACB04F44C510003625A31FDBSHSMSX107ccrcor_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

I agree to change the function name to be more speci= fic to avoid confusion, since this lib is intended

to be used for variable service only. I’ll sen= d v5 soon.

 

Regards,

Jian

 

From: Yao, Jiewen <jiewen.yao@intel.com>= ;
Sent: Wednesday, March 25, 2020 5:55 PM
To: Bret Barkelew <Bret.Barkelew@microsoft.com>; devel@edk2.gr= oups.io; Wang, Jian J <jian.j.wang@intel.com>
Cc: Zhang, Chao B <chao.b.zhang@intel.com>; Mistry, Nishant C = <nishant.c.mistry@intel.com>
Subject: RE: [EXTERNAL] [edk2-devel] [PATCH v4 1/3] SecurityPkg: add= RpmcLib and VariableKeyLib public headers

 

Good point.

 

I think the original design limits the usage to be v= ariable driver. As such, the API only gets a “variable root key”= ;.

 

A “platform root key” can derive the = 220;variable root key” and some “other features’ root key= ”.

 

The tricky part is to regenerate the key, when the v= ariable is under attack.

In that case, we want to only regenerate the “= variable root key”, instead of “platform root key”.<= /o:p>

 

That’s why we want to introduce a variablekeyl= ib module.

To make API consistent, maybe we should rename GetVa= riableRootKey() to GetVariableKey(), RegenerateKey() to RegenerateVariableK= ey(), and LockKeyInterface() to LockVariableKeyInterface()

 

 

If we really want to create a generic platformkeylib= module, then we need add a key indicator. Such as:

EFI_STATUS
EFIAPI
GetPlatformKey (

  IN GUID &= nbsp; *KeyIndicator,
  OUT VOID    **PlatformKey,
  IN  OUT UINTN   *PlatformKeySize
  );

Then the variable driver can pass a GUID, and any ot= her feature driver can pass anther GUID.

 

Thank you

Yao Jiewen

 

 

From: Bret Barkelew <Bret.Barkelew@microsoft.com>
Sent: Wednesday, March 25, 2020 1:44 AM
To: devel@edk2.groups.io= ; Wang, Jian J <jian.j.wang@int= el.com>
Cc: Yao, Jiewen <jiewen.y= ao@intel.com>; Zhang, Chao B <chao.b.zhang@intel.com>; Mistry, Nishant C <nishant.c.mistry@intel.com>
Subject: RE: [EXTERNAL] [edk2-devel] [PATCH v4 1/3] SecurityPkg: add= RpmcLib and VariableKeyLib public headers

 

Is there a reason this needs to be called “Var= iableKeyLib” rather than any other “KeyLib”? It seems gen= eral-purpose as an interface.

 

- Bret

 


From: devel@edk2.groups.io <devel@edk2.groups.io> on behalf of= Wang, Jian J via Groups.Io <jian.j.wang=3Dintel.com@groups.io>
Sent: Monday, March 23, 2020 11:35:21 PM
To: devel@edk2.groups.io= <devel@edk2.groups.io> Cc: Jiewen Yao <jiewen.ya= o@intel.com>; Chao Zhang <chao.b.zhang@intel.com>; Nishant C Mistry <nishant.c.mistry@intel.com>
Subject: [EXTERNAL] [edk2-devel] [PATCH v4 1/3] SecurityPkg: add Rpm= cLib and VariableKeyLib public headers

 

> v4: remove Count= erId which should not be exposed

REF: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fbugzill= a.tianocore.org%2Fshow_bug.cgi%3Fid%3D2594&amp;data=3D02%7C01%7Cbret.ba= rkelew%40microsoft.com%7C3e34ac4a40d94c82e86b08d7cfbd8b82%7C72f988bf86f141a= f91ab2d7cd011db47%7C1%7C0%7C637206285305504454&amp;sdata=3DwCxxsc6cc%2F= fduq88XOZOZv6debpAQMZiIdsFjD0zHXE%3D&amp;reserved=3D0

RpmcLib.h and VariableKeyLib.h are header files required to access RPMC
device and Key generator from platform. They will be used to ensure the
integrity and confidentiality of NV variables.

Cc: Jiewen Yao <jiewen.yao@intel= .com>
Cc: Chao Zhang <chao.b.zhang@i= ntel.com>
Cc: Nishant C Mistry <nish= ant.c.mistry@intel.com>
Signed-off-by: Jian J Wang <jia= n.j.wang@intel.com>
---
 SecurityPkg/Include/Library/RpmcLib.h     &n= bsp;  | 42 ++++++++++++= ;++
 SecurityPkg/Include/Library/VariableKeyLib.h | 59 ++++= ;+++++++++++++++= ;+
 SecurityPkg/SecurityPkg.dec       =            |  8 += ;++
 3 files changed, 109 insertions(+)
 create mode 100644 SecurityPkg/Include/Library/RpmcLib.h
 create mode 100644 SecurityPkg/Include/Library/VariableKeyLib.h

diff --git a/SecurityPkg/Include/Library/RpmcLib.h b/SecurityPkg/Include/Li= brary/RpmcLib.h
new file mode 100644
index 0000000000..8e3868516c
--- /dev/null
+++ b/SecurityPkg/Include/Library/RpmcLib.h
@@ -0,0 +1,42 @@
+/** @file

+  Public definitions for the Replay Protected Monotonic Counter (= RPMC) Library.

+

+Copyright (c) 2020, Intel Corporation. All rights reserved.<BR><= br>
+SPDX-License-Identifier: BSD-2-Clause-Patent

+

+**/

+

+#ifndef _RPMC_LIB_H_

+#define _RPMC_LIB_H_

+

+#include <Uefi/UefiBaseType.h>

+

+/**

+  Requests the monotonic counter from the designated RPMC counter= .

+

+  @param[out]   CounterValue    &nb= sp;       A pointer to a buffer to store the = RPMC value.

+

+  @retval       EFI_SUCCESS &n= bsp;           The operat= ion completed successfully.

+  @retval       EFI_DEVICE_ERROR&nb= sp;       A device error occurred while attem= pting to update the counter.

+  @retval       EFI_UNSUPPORTED&nbs= p;        The operation is un-supported.=

+**/

+EFI_STATUS

+EFIAPI

+RequestMonotonicCounter (

+  OUT UINT32  *CounterValue

+  );

+

+/**

+  Increments the monotonic counter in the SPI flash device by 1.<= br>
+

+  @retval       EFI_SUCCESS &n= bsp;           The operat= ion completed successfully.

+  @retval       EFI_DEVICE_ERROR&nb= sp;       A device error occurred while attem= pting to update the counter.

+  @retval       EFI_UNSUPPORTED&nbs= p;        The operation is un-supported.=

+**/

+EFI_STATUS

+EFIAPI

+IncrementMonotonicCounter (

+  VOID

+  );

+

+#endif
\ No newline at end of file
diff --git a/SecurityPkg/Include/Library/VariableKeyLib.h b/SecurityPkg/Inc= lude/Library/VariableKeyLib.h
new file mode 100644
index 0000000000..fe642b3d66
--- /dev/null
+++ b/SecurityPkg/Include/Library/VariableKeyLib.h
@@ -0,0 +1,59 @@
+/** @file

+  Public definitions for Variable Key Library.

+

+Copyright (c) 2020, Intel Corporation. All rights reserved.<BR><= br>
+SPDX-License-Identifier: BSD-2-Clause-Patent

+

+**/

+

+#ifndef _VARIABLE_KEY_LIB_H_

+#define _VARIABLE_KEY_LIB_H_

+

+#include <Uefi/UefiBaseType.h>

+

+/**

+  Retrieves the variable root key.

+

+  @param[out]     VariableRootKey  =        A pointer to pointer for the variable = root key buffer.

+  @param[in,out]  VariableRootKeySize    = ; The size in bytes of the variable root key.

+

+  @retval       EFI_SUCCESS &n= bsp;           The variab= le root key was returned.

+  @retval       EFI_DEVICE_ERROR&nb= sp;       An error occurred while attempting = to get the variable root key.

+  @retval       EFI_ACCESS_DENIED&n= bsp;      The function was invoked after locking t= he key interface.

+  @retval       EFI_UNSUPPORTED&nbs= p;        The variable root key is not s= upported in the current boot configuration.

+**/

+EFI_STATUS

+EFIAPI

+GetVariableRootKey (

+      OUT VOID    **VariableRo= otKey,

+  IN  OUT UINTN   *VariableRootKeySize

+  );

+

+/**

+  Regenerates the variable root key.

+

+  @retval       EFI_SUCCESS &n= bsp;           The variab= le root key was regenerated successfully.

+  @retval       EFI_DEVICE_ERROR&nb= sp;       An error occurred while attempting = to regenerate the root key.

+  @retval       EFI_ACCESS_DENIED&n= bsp;      The function was invoked after locking t= he key interface.

+  @retval       EFI_UNSUPPORTED&nbs= p;        Key regeneration is not suppor= ted in the current boot configuration.

+**/

+EFI_STATUS

+EFIAPI

+RegenerateKey (

+  VOID

+  );

+

+/**

+  Locks the regenerate key interface.

+

+  @retval       EFI_SUCCESS &n= bsp;           The key in= terface was locked successfully.

+  @retval       EFI_UNSUPPORTED&nbs= p;        Locking the key interface is n= ot supported in the current boot configuration.

+  @retval       Others  &= nbsp;           &nbs= p;   An error occurred while attempting to lock the key interface= .

+**/

+EFI_STATUS

+EFIAPI

+LockKeyInterface (

+  VOID

+  );

+

+#endif
\ No newline at end of file
diff --git a/SecurityPkg/SecurityPkg.dec b/SecurityPkg/SecurityPkg.dec
index 5335cc5397..2cdfb02cc5 100644
--- a/SecurityPkg/SecurityPkg.dec
+++ b/SecurityPkg/SecurityPkg.dec
@@ -76,6 +76,14 @@
   #

   TcgStorageOpalLib|Include/Library/TcgStorageOpalLib.h

 

+  ## @libraryclass  Provides interfaces to access RPMC devic= e.

+  #

+  RpmcLib|Include/Library/RpmcLib.h

+

+  ## @libraryclass  Provides interfaces to access variable r= oot key.

+  #

+  VariableKeyLib|Include/Library/VariableKeyLib.h

+

 [Guids]

   ## Security package token space guid.

   # Include/Guid/SecurityPkgTokenSpace.h

--
2.24.0.windows.2


-=3D-=3D-=3D-=3D-=3D-=3D
Groups.io Links: You receive all messages sent to this group.

View/Reply Online (#56132): https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fedk2.gr= oups.io%2Fg%2Fdevel%2Fmessage%2F56132&amp;data=3D02%7C01%7Cbret.barkele= w%40microsoft.com%7C3e34ac4a40d94c82e86b08d7cfbd8b82%7C72f988bf86f141af91ab= 2d7cd011db47%7C1%7C0%7C637206285305514447&amp;sdata=3DCoBs9mwnHTAAZiErA= EHS3E7dbdRd%2FZefJPKXKPmJwfc%3D&amp;reserved=3D0
Mute This Topic: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fgroups.= io%2Fmt%2F72512084%2F1852292&amp;data=3D02%7C01%7Cbret.barkelew%40micro= soft.com%7C3e34ac4a40d94c82e86b08d7cfbd8b82%7C72f988bf86f141af91ab2d7cd011d= b47%7C1%7C0%7C637206285305514447&amp;sdata=3D%2B14%2BIfGmu88GSnKZnpb51E= GaW3MqfFCT1%2BWI5Bhdlo0%3D&amp;reserved=3D0
Group Owner: devel+ow= ner@edk2.groups.io
Unsubscribe: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fedk2.gr= oups.io%2Fg%2Fdevel%2Funsub&amp;data=3D02%7C01%7Cbret.barkelew%40micros= oft.com%7C3e34ac4a40d94c82e86b08d7cfbd8b82%7C72f988bf86f141af91ab2d7cd011db= 47%7C1%7C0%7C637206285305514447&amp;sdata=3DJLLWLjx0OW0eTjn7xXG5aNHdAfW= QqhY4qLXSuNhhcys%3D&amp;reserved=3D0  [bret.barkelew@microsoft.com]
-=3D-=3D-=3D-=3D-=3D-=3D

--_000_D827630B58408649ACB04F44C510003625A31FDBSHSMSX107ccrcor_--