From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail05.groups.io (mail05.groups.io [45.79.224.7]) by spool.mail.gandi.net (Postfix) with ESMTPS id 94E637803CE for ; Fri, 10 May 2024 03:10:56 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=kL7kq4QbmzKnuoFuYuKFUcHA0lIMLTslKhTbnupum7o=; c=relaxed/simple; d=groups.io; h=From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:msip_labels:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Resent-Date:Resent-From:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type; s=20240206; t=1715310655; v=1; b=CLXdT0z9bGITK9hUq0ch1ZVu3DrGT3sJnMeHANmz3PvNQNBAQUJcn9aO1EIalFtL3qALikjL 0LqgeAWQ0bagNK/sf58SYvhNqH5riDmttAEK6j4CInC96bNr2LiL1AB7VSykOlAiQzlckUE+qpm MwQ90jAxREem9YL8YufCRmRUbQhwbKcXwQwcUOsc+G/Ik0XN4Jbs3YCgsNHPBeUYq04tbNVwaJ7 rd6O5lcM8p1J0nyzNOaE0cLteXNRTQfhwZnz+NtWYOzaIqJbsj3lwcmV+pnEHs7Q+wFsEDYi00i LWZtl67b1KxRscr0GcCPftJ8GsOhZ6z1DJBcZdZL/Fq7w== X-Received: by 127.0.0.2 with SMTP id scwcYY7687511xztXMmrn51e; Thu, 09 May 2024 20:10:55 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.19]) by mx.groups.io with SMTP id smtpd.web11.4402.1715310654190778114 for ; Thu, 09 May 2024 20:10:54 -0700 X-CSE-ConnectionGUID: qabN5dYDSnS6eYfFcIHBxg== X-CSE-MsgGUID: IYi0oXPXTTqhJDMOjh0eJQ== X-IronPort-AV: E=McAfee;i="6600,9927,11068"; a="11120745" X-IronPort-AV: E=Sophos;i="6.08,149,1712646000"; d="scan'208,217";a="11120745" X-Received: from orviesa008.jf.intel.com ([10.64.159.148]) by orvoesa111.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 May 2024 20:10:54 -0700 X-CSE-ConnectionGUID: 7G+wwisKS9idRhTY63Wznw== X-CSE-MsgGUID: DnmaPtRTQBWkeiBQk7pgaQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.08,149,1712646000"; d="scan'208,217";a="30013860" X-Received: from orsmsx601.amr.corp.intel.com ([10.22.229.14]) by orviesa008.jf.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 09 May 2024 20:10:53 -0700 X-Received: from orsmsx612.amr.corp.intel.com (10.22.229.25) by ORSMSX601.amr.corp.intel.com (10.22.229.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Thu, 9 May 2024 20:10:53 -0700 X-Received: from ORSEDG602.ED.cps.intel.com (10.7.248.7) by orsmsx612.amr.corp.intel.com (10.22.229.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35 via Frontend Transport; Thu, 9 May 2024 20:10:53 -0700 X-Received: from NAM12-DM6-obe.outbound.protection.outlook.com (104.47.59.169) by edgegateway.intel.com (134.134.137.103) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Thu, 9 May 2024 20:10:53 -0700 X-Received: from MN6PR11MB8244.namprd11.prod.outlook.com (2603:10b6:208:470::14) by IA1PR11MB7727.namprd11.prod.outlook.com (2603:10b6:208:3f1::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7544.43; Fri, 10 May 2024 03:10:51 +0000 X-Received: from MN6PR11MB8244.namprd11.prod.outlook.com ([fe80::41a4:c775:32e6:76a8]) by MN6PR11MB8244.namprd11.prod.outlook.com ([fe80::41a4:c775:32e6:76a8%4]) with mapi id 15.20.7544.046; Fri, 10 May 2024 03:10:51 +0000 From: "Ni, Ray" To: Doug Flick , "devel@edk2.groups.io" CC: Andrew Fish Subject: Re: [edk2-devel] [PATCH v1 02/14] EmulatorPkg: : Add Hash2DxeCrypto to EmulatorPkg Thread-Topic: [PATCH v1 02/14] EmulatorPkg: : Add Hash2DxeCrypto to EmulatorPkg Thread-Index: AQHaoVyTXt/Q2oyzNUiINGSSo6GmRLGPzIs9 Date: Fri, 10 May 2024 03:10:51 +0000 Message-ID: References: <20240508152925.741226-1-doug.edk2@gmail.com> <20240508152925.741226-3-doug.edk2@gmail.com> In-Reply-To: <20240508152925.741226-3-doug.edk2@gmail.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: msip_labels: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MN6PR11MB8244:EE_|IA1PR11MB7727:EE_ x-ms-office365-filtering-correlation-id: cf304a9b-aece-44d5-e937-08dc709ecc62 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: =?us-ascii?Q?mMlUswIpaOP589V5zf1fCuseuOvX6A6OwhTNLCEoLD7L0MG8o8Bc8zSjhUm7?= =?us-ascii?Q?9gipt5YmBrzVTxrxuf6LEkVna/SOcYNlMVTSnOrcl003fs70aFpfmy4fm3vQ?= =?us-ascii?Q?MGNTSKZS/pCPWuC/XdK7HfOqLBa1iUppc+kHhdil/o+nkrINZ91O3DdSncHZ?= =?us-ascii?Q?MjDGSj9mE81RLdV9yBzbwCzeX07ZL2OTKZgdr9yNmfoJgTqvVM0biUnYev/d?= =?us-ascii?Q?OF0dnX7AWdYoiZFKlPwuQktd4cS9w4of3n06uGavASqXh3bhoSxnBPbZh5fl?= =?us-ascii?Q?3qFNRQEbPMAx1bMVFFwWXSSicBGXZyv0bPwBT1rt/KDaC7kGz33uRSrngURs?= =?us-ascii?Q?TUz54AxVwuQrujh5wen4Hmu2Nei7l0uhjeBncTOKtSRxLO9wmL1zwwHWWudL?= =?us-ascii?Q?KjKbwa/cj65sJK/o8id0RXJtKwPRZ5/nZ/NGsuRYW8sheccmsdNKyFtuOyED?= =?us-ascii?Q?bGEthDh0CO/Ii0BG2tPkKw7HgPz+sKwmAm+YbJ2zKB59UrxR+e83CWExmT/L?= =?us-ascii?Q?KRH2XV7EjslojYyyq/hgvauf081jCBO8BQ49ZH7A15UOve58lVvvNe3vlxAN?= =?us-ascii?Q?15OhkHqyIHIzGDJNIq2S3p4DVzurLtjvqqYJIdHqOnFmQfJIfs9cdpUSJ8nC?= =?us-ascii?Q?gEhpLajASVhEbTG3d2mJjELuEbo6XhmLoNC+ZFcRe04vWsy8e/f0ZokEBep9?= =?us-ascii?Q?5IQYQcYPdfKAglNXIkCXQehQoG+0pIKnY1zeCgkiz6jafp1413sDRdZ2+3t+?= =?us-ascii?Q?29dhGPE4yKFh4MQLOEJnoiajz8KwCW7gqG38v/NKVgJBKrevSN3Cy64Z81WN?= =?us-ascii?Q?l5VekJFr3w8H6pTZBoAN1mShdlngGYWCUIqXAnzr3PnB4KAU5+skxNeEBo2w?= =?us-ascii?Q?45DwvqDKEwciWGOlJDnFMQ4qiW6Y0Scxb6AoaghYt/DjzV+e/Nrg4rsVLOjx?= =?us-ascii?Q?nKOu3lbcKQyTEDCr4YzhwtyWwtRA0dDvD3jzsLqRhclyxR1VZH+aqHXg8ytP?= =?us-ascii?Q?2bmilrLje8HrSvH7nqW57zloAJ2X/F9cGBhlCA4CZZqnQgVeSuWE1LqbDFvU?= =?us-ascii?Q?fGe3YfW3LRi7EpOWM9jAU8w30NVZrtdM9ai4XrMLuSxyyeyneWZeXto47mWf?= =?us-ascii?Q?ntFzh2+nV78n/8VCu6trxTbpcWdPUc59RunA77cjMSvFCunp/hsE3aTjkcxD?= =?us-ascii?Q?UiSDoBzE5rp9N9xfH9a+2P7pkgt4+wNJba1Gjlw87lve5j2y00q9yAryXIrW?= =?us-ascii?Q?QG4kLcWS36BvKMnGOgAuQfbD8T24T0mYvVsbJyCkaMu2YyMNkpc45ceUq10r?= =?us-ascii?Q?uQYwwSOGql2CeDGdpXEsu/i4DHzCIQNd5sScZg+5kTkRJQ=3D=3D?= x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?ehllXCK2N6t8l+15mEYLln5aorrI4Arm5lKKP2qWdf0ZVTNWFarOwSPIwAJU?= =?us-ascii?Q?iBk/lL7EPJUGmYwIviCKUDXjRAnDoJW4ZU6AtQ6uV9KjQRBtYVZVdNyZ7jmS?= =?us-ascii?Q?VkpJ7tFnztsolRYmpaz+MwguGzypKx6c/x9+ETSzFm6dYJHXWrwz/3VPpkdd?= =?us-ascii?Q?0rIMp/yRO0UU1iHFazBPY7uSg7UxQkeQsxtzvTntl8oVnH/E//7nrQL3DP/h?= =?us-ascii?Q?Efo+FXxYzbukx3u01139EZ44BLY7KiUuB5gm3FE4lUTUCfxIelBiTucuxmbY?= =?us-ascii?Q?CbiEwtvEP8cIv4YtWEy1oaNleR63oCFue5UyZd8Z4PaH90D1SYYP7NVm15Dr?= =?us-ascii?Q?pcuNRYj6yD5ube9LiQ3evt1XMCo7IYizqQ2yz1viTrnfDJ4ofO7Dc+/hh9o9?= =?us-ascii?Q?Otf3EIkx4ksUhPp4gAHx9YCYYriEYtFD+cLjeTmtm+Gd6py/925FJuD4fNjx?= =?us-ascii?Q?bOMBAkZdYA8OZcdtzcfxOwm1xuSBo0TruXxns3PE0vNsx1KJtwPWiLFYCgvS?= =?us-ascii?Q?0TZ/N/ZuvUDDMnlwoG7o6rrUpfbXutNO/odCYBZtMYsD95rf7sZrWs5Lyrs9?= =?us-ascii?Q?kQCgq2pSxu0OWZ0M6jvGjsavVwZpFJYpOE9BErWkX3k5f8ldgUZB94s06yEJ?= =?us-ascii?Q?n3ZocEtTA4V2d1I4+RN7RAv3iKKEwrPL5fsOdKYcJ8uRtAZHdyFJEtRYr4hP?= =?us-ascii?Q?t2OLiVFeYnVITA4XA9ZIRLbpKfywdFJGL9iDUGLpEZKONpWljNpi3UHU7Oi3?= =?us-ascii?Q?SheW5qR70zCvURgEcIrieOcXm6pFWxgYczKkYCRhe7cjoTNd2ZNP2qkH8U0R?= =?us-ascii?Q?xC1CF0Y98F3dbkfDDUtwovx77J4adZsyr/QNyJzonZahlAoCRo1YP7brK23x?= =?us-ascii?Q?fh8WYbSYXdDzBHv1Tk205zxrFHCC7MFjb9a3FKDUZz+VQkbj5JlEbBOdedLE?= =?us-ascii?Q?GrGqC1qkMWsbl3YyvknXWXM/yXJlrnphITsfM/7AJwWETeg8iW6DseSicsAw?= =?us-ascii?Q?2ymvU2NLijjCjeUB1+qIDQJ/g58gBa/GO0JgACelPAKbPYLoKzYXa8xK0Ozl?= =?us-ascii?Q?ZA1G6XTn0EU/0afZWJ/8ViA0l6ChiSn9aaQllu97GG+rcja2B1WZb8Jo7Ay1?= =?us-ascii?Q?SB3SPj1u0fhs/sPyV8qaZV9KYu4oYagxGhLI+KdQ5aG3uNmMtDSCb5xv56t6?= =?us-ascii?Q?FBsOHH2EDUjzPQdJDryLMHQgPu2d+MAhNnyDnihGH71ui+Vcd8QVbFMU9bGK?= =?us-ascii?Q?KUykovcW1nqjd0K/dBk6L+kRbFtvDU9aoo8b+w0TNi+MFIPjC8JYN2gdKqlo?= =?us-ascii?Q?h/LxHzKkPx6xk6p1Zy+juKhIRGWGxLmc1NeP0HzQ4mcBhBmjYJng91ZVvgUM?= =?us-ascii?Q?fm+ZWMJ06GEdDxJMyUINA80tLE/LyIEoHYYtm/gADHwAhcbeREu4eLZABrhv?= =?us-ascii?Q?G8834KiCE8ZYXaru3s52XHrXMJ8IAflEkDBZYP66uWcwgBNKx7hBjlNSKfLt?= =?us-ascii?Q?tF3izauBJmmPtLJXWJS2iTc1oLam21NqT7tNd6x6FDkG1t9bPbudgEADeMby?= =?us-ascii?Q?bLVAWB92nO07HWnRJDw=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MN6PR11MB8244.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: cf304a9b-aece-44d5-e937-08dc709ecc62 X-MS-Exchange-CrossTenant-originalarrivaltime: 10 May 2024 03:10:51.5799 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: XcTLWdcALKR3wmlwMPMpSFTG82JekkAJsNGLQpLVdPACJF1Fa1hTy3HsfOOa0IJOpj8Kx4a+zQwl7t5sbu+6RQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA1PR11MB7727 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Resent-Date: Thu, 09 May 2024 20:10:54 -0700 Resent-From: ray.ni@intel.com Reply-To: devel@edk2.groups.io,ray.ni@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: k35gKvCUcFS8V6qBTnbPqxaXx7686176AA= Content-Language: en-US Content-Type: multipart/alternative; boundary="_000_MN6PR11MB8244DB7B753797339131E5A38CE72MN6PR11MB8244namp_" X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b=CLXdT0z9; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 45.79.224.7 as permitted sender) smtp.mailfrom=bounce@groups.io --_000_MN6PR11MB8244DB7B753797339131E5A38CE72MN6PR11MB8244namp_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Reviewed-by: Ray Ni Thanks, Ray ________________________________ From: Doug Flick Sent: Wednesday, May 8, 2024 23:29 To: devel@edk2.groups.io Cc: Andrew Fish ; Ni, Ray Subject: [PATCH v1 02/14] EmulatorPkg: : Add Hash2DxeCrypto to EmulatorPkg From: Doug Flick This patch adds Hash2DxeCrypto to EmulatorPkg. The Hash2DxeCrypto is used to provide the hashing protocol services. Cc: Andrew Fish Cc: Ray Ni Signed-off-by: Doug Flick [MSFT] --- EmulatorPkg/EmulatorPkg.dsc | 9 +++++++-- EmulatorPkg/EmulatorPkg.fdf | 5 +++++ 2 files changed, 12 insertions(+), 2 deletions(-) diff --git a/EmulatorPkg/EmulatorPkg.dsc b/EmulatorPkg/EmulatorPkg.dsc index 0a66294cb768..1c356bc8c732 100644 --- a/EmulatorPkg/EmulatorPkg.dsc +++ b/EmulatorPkg/EmulatorPkg.dsc @@ -128,10 +128,11 @@ [LibraryClasses] FileHandleLib|MdePkg/Library/UefiFileHandleLib/UefiFileHandleLib.inf ImagePropertiesRecordLib|MdeModulePkg/Library/ImagePropertiesRecordLib/I= magePropertiesRecordLib.inf RngLib|MdeModulePkg/Library/BaseRngLibTimerLib/BaseRngLibTimerLib.inf - -!if $(SECURE_BOOT_ENABLE) =3D=3D TRUE IntrinsicLib|CryptoPkg/Library/IntrinsicLib/IntrinsicLib.inf OpensslLib|CryptoPkg/Library/OpensslLib/OpensslLibCrypto.inf + BaseCryptLib|CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf + +!if $(SECURE_BOOT_ENABLE) =3D=3D TRUE PlatformSecureLib|SecurityPkg/Library/PlatformSecureLibNull/PlatformSecu= reLibNull.inf AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo= otVariableLib.inf @@ -402,6 +403,10 @@ [Components] # Rng Protocol producer # SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf + # + # Hash2 Protocol producer + # + SecurityPkg/Hash2DxeCrypto/Hash2DxeCrypto.inf !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDx= e.inf diff --git a/EmulatorPkg/EmulatorPkg.fdf b/EmulatorPkg/EmulatorPkg.fdf index d756c144d94d..73d5b0068d3f 100644 --- a/EmulatorPkg/EmulatorPkg.fdf +++ b/EmulatorPkg/EmulatorPkg.fdf @@ -198,6 +198,11 @@ [FV.FvRecovery] # INF SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf +# +# Hash2 Protocol producer +# +INF SecurityPkg/Hash2DxeCrypto/Hash2DxeCrypto.inf + # # Secure Boot Key Enroll # -- 2.34.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#118787): https://edk2.groups.io/g/devel/message/118787 Mute This Topic: https://groups.io/mt/105983240/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- --_000_MN6PR11MB8244DB7B753797339131E5A38CE72MN6PR11MB8244namp_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable
Reviewed-by: Ray Ni <ray.ni@intel.com>



Thanks,
Ray

From: Doug Flick <doug.e= dk2@gmail.com>
Sent: Wednesday, May 8, 2024 23:29
To: devel@edk2.groups.io <devel@edk2.groups.io>
Cc: Andrew Fish <afish@apple.com>; Ni, Ray <ray.ni@intel.co= m>
Subject: [PATCH v1 02/14] EmulatorPkg: : Add Hash2DxeCrypto to Emula= torPkg
 
From: Doug Flick <dougflick@microsoft.com>
This patch adds Hash2DxeCrypto to EmulatorPkg. The Hash2DxeCrypto is
used to provide the hashing protocol services.

Cc: Andrew Fish <afish@apple.com>
Cc: Ray Ni <ray.ni@intel.com>

Signed-off-by: Doug Flick [MSFT] <doug.edk2@gmail.com>
---
 EmulatorPkg/EmulatorPkg.dsc | 9 +++++++--
 EmulatorPkg/EmulatorPkg.fdf | 5 +++++
 2 files changed, 12 insertions(+), 2 deletions(-)

diff --git a/EmulatorPkg/EmulatorPkg.dsc b/EmulatorPkg/EmulatorPkg.dsc
index 0a66294cb768..1c356bc8c732 100644
--- a/EmulatorPkg/EmulatorPkg.dsc
+++ b/EmulatorPkg/EmulatorPkg.dsc
@@ -128,10 +128,11 @@ [LibraryClasses]
   FileHandleLib|MdePkg/Library/UefiFileHandleLib/UefiFileHandleL= ib.inf

   ImagePropertiesRecordLib|MdeModulePkg/Library/ImagePropertiesR= ecordLib/ImagePropertiesRecordLib.inf

   RngLib|MdeModulePkg/Library/BaseRngLibTimerLib/BaseRngLibTimer= Lib.inf

-

-!if $(SECURE_BOOT_ENABLE) =3D=3D TRUE

   IntrinsicLib|CryptoPkg/Library/IntrinsicLib/IntrinsicLib.inf
   OpensslLib|CryptoPkg/Library/OpensslLib/OpensslLibCrypto.inf
+  BaseCryptLib|CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf

+

+!if $(SECURE_BOOT_ENABLE) =3D=3D TRUE

   PlatformSecureLib|SecurityPkg/Library/PlatformSecureLibNull/Pl= atformSecureLibNull.inf

   AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariab= leLib.inf

   SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLi= b/SecureBootVariableLib.inf

@@ -402,6 +403,10 @@ [Components]
   # Rng Protocol producer

   #

   SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf

+  #

+  # Hash2 Protocol producer

+  #

+  SecurityPkg/Hash2DxeCrypto/Hash2DxeCrypto.inf

 

 !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE

   SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBo= otConfigDxe.inf

diff --git a/EmulatorPkg/EmulatorPkg.fdf b/EmulatorPkg/EmulatorPkg.fdf
index d756c144d94d..73d5b0068d3f 100644
--- a/EmulatorPkg/EmulatorPkg.fdf
+++ b/EmulatorPkg/EmulatorPkg.fdf
@@ -198,6 +198,11 @@ [FV.FvRecovery]
 #

 INF  SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf

 

+#

+# Hash2 Protocol producer

+#

+INF  SecurityPkg/Hash2DxeCrypto/Hash2DxeCrypto.inf

+

 #

 # Secure Boot Key Enroll

 #

--
2.34.1

_._,_._,_

Groups.io Links:

=20 You receive all messages sent to this group. =20 =20

View/Reply Online (#118787) | =20 | Mute= This Topic | New Topic
Your Subscriptio= n | Contact Group Owner | Unsubscribe [rebecca@openfw.io]

_._,_._,_
--_000_MN6PR11MB8244DB7B753797339131E5A38CE72MN6PR11MB8244namp_--