From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail04.groups.io (mail04.groups.io [45.79.224.9]) by spool.mail.gandi.net (Postfix) with ESMTPS id 4915AAC0DC9 for ; Tue, 16 Apr 2024 09:25:44 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=tUNrl/kzbMIsaU9KHb+QDNnzx4wu0U+VeKt/5An/pgo=; c=relaxed/simple; d=groups.io; h=From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Resent-Date:Resent-From:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20240206; t=1713259543; v=1; b=luGzr85AlfvOp5ZARUWN/JqKkL2uaTExbtwVnfk6sa1D5y5MI48VWHTiTREAL2HtHxvz4kVQ bpJg8pSKHDPMevqfoi8GL14JTFHr2CuWSlq0MS6uUQOlCiuUemCfpM55inVC/uRCf8TXL8tjVDA 12ocob2zOCicwn3v7ChbRzqOv8rYEUrzgS1bh6FRMnPRdafIx1ANUmvfRiG6qZs2EmQXD5KGMNM 1J+KR5abHgYfisjm1CFnhOX23QgplxfsJVn+xsE0mvmBNeFKQNCoYb0LHgAVNKjyFVv1VPwapYT 93v0wxoHv59AWD3rvG/YT/7YpaFD6GznMgINy2TFLoEeg== X-Received: by 127.0.0.2 with SMTP id HIAlYY7687511xgnNDY4a0t6; Tue, 16 Apr 2024 02:25:42 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.13]) by mx.groups.io with SMTP id smtpd.web11.15878.1713259542288713829 for ; Tue, 16 Apr 2024 02:25:42 -0700 X-CSE-ConnectionGUID: bXZNcH1PTOK3QgU2pGy5XA== X-CSE-MsgGUID: PVFnCU9MQ8iQdHnnfjBU5Q== X-IronPort-AV: E=McAfee;i="6600,9927,11045"; a="19835060" X-IronPort-AV: E=Sophos;i="6.07,205,1708416000"; d="scan'208";a="19835060" X-Received: from orviesa008.jf.intel.com ([10.64.159.148]) by orvoesa105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Apr 2024 02:25:42 -0700 X-CSE-ConnectionGUID: bl2gD91ORpS9Ogld1phU4g== X-CSE-MsgGUID: gBB6/YYmSkK4+mM/QVdIQQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.07,205,1708416000"; d="scan'208";a="22787689" X-Received: from orsmsx601.amr.corp.intel.com ([10.22.229.14]) by orviesa008.jf.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 16 Apr 2024 02:25:42 -0700 X-Received: from orsmsx611.amr.corp.intel.com (10.22.229.24) by ORSMSX601.amr.corp.intel.com (10.22.229.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Tue, 16 Apr 2024 02:25:41 -0700 X-Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX611.amr.corp.intel.com (10.22.229.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Tue, 16 Apr 2024 02:25:41 -0700 X-Received: from orsedg603.ED.cps.intel.com (10.7.248.4) by orsmsx610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35 via Frontend Transport; Tue, 16 Apr 2024 02:25:41 -0700 X-Received: from NAM10-MW2-obe.outbound.protection.outlook.com (104.47.55.100) by edgegateway.intel.com (134.134.137.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Tue, 16 Apr 2024 02:25:40 -0700 X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14) by DM4PR11MB7397.namprd11.prod.outlook.com (2603:10b6:8:103::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7472.27; Tue, 16 Apr 2024 09:25:34 +0000 X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::be3f:5a4f:5180:2ba9]) by MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::be3f:5a4f:5180:2ba9%4]) with mapi id 15.20.7472.027; Tue, 16 Apr 2024 09:25:33 +0000 From: "Yao, Jiewen" To: "Hou, Wenxing" , "Kinney, Michael D" , "devel@edk2.groups.io" CC: Sean Brogan , Joey Vagedes , Liming Gao , Andrew Fish , "Liu, Zhiguang" , "Kumar, Rahul R" Subject: Re: [edk2-devel] [PATCH 0/9] Add DeviceSecurity feature based on PFP 1.06 spec Thread-Topic: [PATCH 0/9] Add DeviceSecurity feature based on PFP 1.06 spec Thread-Index: AQHahKXki6ut5M8/hk6icfuC7k+hLrFgF8YAgAiSe4CAAgwUcA== Date: Tue, 16 Apr 2024 09:25:33 +0000 Message-ID: References: <20240402023125.4168-1-wenxing.hou@intel.com> In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW4PR11MB5872:EE_|DM4PR11MB7397:EE_ x-ms-office365-filtering-correlation-id: 4b9d88cc-e717-4294-3db8-08dc5df72b02 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: w0nxkuR3KrmUyI0L/Bapkod+FmxEUAdvS7p2de+1GeAN67mtsaZGLYvnsC0gc7JRPkOndDDdJWBoDpmQ+veOuDgLau5fL/mHfkOnwkaiIq8xOn3aWAalo7k2DXAzXsCnbf+Syo2yFO2JvQHrs1FI4555WIIuel5++yuyGVHT4EiSD41TV0BCe1AzhhaNessLMP1T3/cgjN1uyTkwHXe1HVmrhf/8lLyE1mSxX6vdBPylMh9x9Y8j0JhgYasEmwKoDjqUTWuGRr/qTRckkggz7Yo6NVh1rmIivvWuHECLAbGc1OufEutpQKn2+UrB1mOJiZV0R9gHxwEFN/BzKUrss53PCiKRLgvxeLGN5TmAJjITV+3bQP1FCsLoRR69v/IrtE7F5n3dwL1leb2yJ4bxUOJ0irbM5net3DHx8aNuYmWdMTsA7ImUFlFHMSzAG7oNKcW8zJiOSh72hB8sTOYV1P8PLxIKzLIl7Fmz5AW2KhrX47x123VOQiRFAIlxDuAYTkUkgWBg76fN2ztfqSPQtxP/KkRDZbHxdOVt8ZE5HSitJOTOBfWe+oV2qagFrOVad+It+pwEAHbym6ZxjlPuTNLh6tn6Ur707MeaxGWO+AnJyfi69CZfZ6i+rjt7h4fhWFO/wUNIbDWU4CBQxCg+CSCy5Jnqjnr569aHxHKg13U= x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?8K/0tuoZO6MRFdx92kfhZFph8LD9fmP/B+qcEESxojPspamgpdt5Q0vBLCP/?= =?us-ascii?Q?RGxEXXnzGyUqa4ttXEdCJubBRs7ynm1p91QN2Jssde7MDrBrueAoC3ML8irJ?= =?us-ascii?Q?ggafwAcsbwfEVfDqNwEM3GScFWtsaHTfUNGqQiQKsxRw+bmouWsORx5BLes1?= =?us-ascii?Q?Fz73K1rkZHOZDnlh96HC3i/zy5wFFtdMv61lI+/HeEBtZCRZw2myRtpp9+V3?= =?us-ascii?Q?7OeFMdk+uYt8UYhBEebSt0YhF8ltE4cghZ+iHiQNTVFieAWSbn3/hdt8V8iG?= =?us-ascii?Q?R/4NpgTAnvRsVMk/yDT/NUXVyozpjpeeEBE7gXPBlpDxPRhRnTBKGPWQrMFV?= =?us-ascii?Q?52ynvpkBeL+EsaUIajLUOLcTnC6zFQiroKNHiKrsXHJ+IvS58o4N1SXvI9Xw?= =?us-ascii?Q?EX+TYL514juck2ZuTsUx4oMBJxxazB3ucu4s5cCwlYzfUOTkFLGlgl3bPMCq?= =?us-ascii?Q?NIuF6KkAd0KMIBiYhPu6XsPp003d7QR/U9jZRMayIiUOPZMVDdWh3strb92/?= =?us-ascii?Q?cS990zDXLaTIQ/PTZpHdhE5DR+0Z3i9t9hbRuAlFdTZmDoretxMzrSAPnAAP?= =?us-ascii?Q?Yw9EjL6eWxmhour4hRkFN3iOUowPvyU17zpH5Hb+H4KDMwngi1iE00HDI/AE?= =?us-ascii?Q?XusS3LoZLm/8PnrtjuH0vIX/Q7g4rxAAmdPStBA8K0ZiAQQRkwQUsOn18mxJ?= =?us-ascii?Q?OSUFi5IQupCPiEnex2B/aaqDA4cyAoTuTG0IGfnwqiLyC0p+4wWMDyYou3t/?= =?us-ascii?Q?6aBH4ImezVqpHVHcuRJUh9YxuKEVwyqNwM/w1s5mm87NyGqxq5AIhkv6nSwl?= =?us-ascii?Q?5L6EzM5OJvoRHxkn9tH3IXjOUhjOUkZtfZFBxGV+Mc3/KLNqfwynguExgaPK?= =?us-ascii?Q?cxAO7rz3dMmt8DIR5bMnVmhoZFzxvmIUDFv2VLJM1D/SFXeF7ZCL21Sjx/tC?= =?us-ascii?Q?cjT0bIWENuIEqrTFzgbCnsYdTMcKyzVyLKX9QIH2VqRs9YBo6jJwBkne9mQ6?= =?us-ascii?Q?cVfb6VTFYXf5RGSDvJ+teprHVU53ow7nUvalclOe+F1VxcXolTBisyCLD236?= =?us-ascii?Q?xCd4tYF9X/R0Sw4SAuySfcQI116EeK4Xk7K4+URPaVH16mE3TRKhIXs1mRZk?= =?us-ascii?Q?+5hVVSZO4iIUX8m94HhHXznNFLZcHKq60oJIj2gB5XOtLMOHOu280mnyKZEp?= =?us-ascii?Q?Nx/NUWkMVWn42rS4eJksYUiRhnwDR6I1iVOwHbI+tRBaIQ+SqFzNmP4fX27H?= =?us-ascii?Q?kSZAJDvmlS45UNqtzINaE4YbQojiNaZd8ont0wiqPn6mtr1NzIRUUZ87QFSl?= =?us-ascii?Q?EqlnDcv7SKlHCWmKDmhZ1/q+nVjK/Y1lJR0ljzEBmDo9jzMjNA2v2Awve4md?= =?us-ascii?Q?TO1NNh2xFH15L6hQDTqwtxVUFEBKgDRm51RsnS7kGL3Rxm+79kXuSJf6Dthn?= =?us-ascii?Q?Ca2/yJEWxpv7hkG3H96DCtw8NWDBIyR7AQYRj6xdLkmK2TBd71PqsWy54xsQ?= =?us-ascii?Q?upqeEwkjxGUPrzL33jDfOFILmu+xHuUMwLdXT9mip3DkUghgNzhOuDgbgKRT?= =?us-ascii?Q?lrO7fESt1dSJ8j5WVVSfK6HexNKIRDGaljs9JcV4?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 4b9d88cc-e717-4294-3db8-08dc5df72b02 X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Apr 2024 09:25:33.9579 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: VrBMC2mxuXkd6f7zQmR2F/UjA45wZTUKeUEWQ8xe/jSsDGGvFwaF4QW7Zay1V/EILkaPQ3x2KsMw+/EStX+qSw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR11MB7397 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Resent-Date: Tue, 16 Apr 2024 02:25:42 -0700 Resent-From: jiewen.yao@intel.com Reply-To: devel@edk2.groups.io,jiewen.yao@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: ScFY2kVH5Y67XfPLdDt7P4p9x7686176AA= Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b=luGzr85A; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 45.79.224.9 as permitted sender) smtp.mailfrom=bounce@groups.io Reviewed-by: Jiewen Yao > -----Original Message----- > From: Hou, Wenxing > Sent: Monday, April 15, 2024 10:08 AM > To: Kinney, Michael D ; devel@edk2.groups.io > Cc: Sean Brogan ; Joey Vagedes > ; Liming Gao ; Andrew > Fish ; Liu, Zhiguang ; Kumar, Ra= hul R > ; Yao, Jiewen > Subject: RE: [PATCH 0/9] Add DeviceSecurity feature based on PFP 1.06 spe= c >=20 > Hi Mike, >=20 > I have submitted PATCH v3, which updated the Readme.rst for libspdm submo= dule > license. And I have added Leif. > Please review the PATCH v3. >=20 > For your second feedback, I have investigate the situation. >=20 > If we use 'git submodule update --init' to clone the submodule, the > mbedtls/openssl/cmocka in libspdm will not be cloned due to the absence = of the > '--recursive' option. > And it will not affect the build and use of DeviceSecurity. >=20 >=20 > Thanks, > Wenxing >=20 >=20 > -----Original Message----- > From: Kinney, Michael D > Sent: Tuesday, April 9, 2024 11:14 PM > To: Hou, Wenxing ; devel@edk2.groups.io > Cc: Sean Brogan ; Joey Vagedes > ; Liming Gao ; Andrew > Fish ; Liu, Zhiguang ; Kumar, Ra= hul R > ; Yao, Jiewen ; Kinney, > Michael D > Subject: RE: [PATCH 0/9] Add DeviceSecurity feature based on PFP 1.06 spe= c >=20 > +Leif >=20 > Adding a new submodule requires review by the stewards to review the lice= nse > and the health and support of the submodule project. >=20 > The top level Readme also requires updates. It lists all the submodules = and > licenses used. Please update this series with the Readme changes. >=20 > https://github.com/tianocore/edk2?tab=3Dreadme-ov-file#license-details >=20 > I also notice that libspdm has its own .gitmodules file that pulls in mor= e > submodules. >=20 > [submodule "os_stub/openssllib/openssl"] > path =3D os_stub/openssllib/openssl > url =3D https://github.com/openssl/openssl > [submodule "os_stub/mbedtlslib/mbedtls"] > path =3D os_stub/mbedtlslib/mbedtls > url =3D https://github.com/ARMmbed/mbedtls > [submodule "unit_test/cmockalib/cmocka"] > path =3D unit_test/cmockalib/cmocka > url =3D https://git.cryptomilk.org/projects/cmocka.git >=20 >=20 > edk2 already had openssl and mbedtls as submodules, does this mean that > openssl and mbedtls will be cloned twice in 2 different locations now? >=20 > The edk2 project had issues with the stability of the cmocka server and c= hanged > to a tianocore mirror of the cmocka submodule to improve CI stability. Th= is is > another submodule that will be cloned twice and may reintroduce the poten= tial > for CI stability issues. >=20 > Thanks, >=20 > Mike >=20 > > -----Original Message----- > > From: Hou, Wenxing > > Sent: Monday, April 1, 2024 7:31 PM > > To: devel@edk2.groups.io > > Cc: Sean Brogan ; Joey Vagedes > > ; Kinney, Michael D > > ; Liming Gao ; > > Andrew Fish ; Liu, Zhiguang ; > > Kumar, Rahul R ; Yao, Jiewen > > > > Subject: [PATCH 0/9] Add DeviceSecurity feature based on PFP 1.06 spec > > > > REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D2479 > > > > In PFP spec 1.06, platform firmware records the device certificate and > > device measurement for each SPDM responder. > > This PATCH set implement the DeviceSecurityLib to support spdm device > > Authentication and Measurement. > > > > Libspdm as submodule is to support DeviceSecurity feature: > > https://github.com/DMTF/libspdm > > > > TCG PFP spec 1.06: > > https://trustedcomputinggroup.org/resource/pc-client-specific- > > platform-firmware-profile-specification/ > > > > The POC branch: > > https://github.com/tianocore/edk2-staging/tree/DeviceSecurity > > > > And the PATCH set has passed the EDKII CI: > > https://github.com/tianocore/edk2/pull/5508 > > > > Cc: Sean Brogan > > Cc: Joey Vagedes > > Cc: Michael D Kinney > > Cc: Liming Gao > > Cc: Andrew Fish > > Cc: Zhiguang Liu > > Cc: Rahul Kumar > > Cc: Jiewen Yao > > Signed-off-by: Wenxing Hou > > > > Wenxing Hou (9): > > MdePkg: Add SPDM1.2 support. > > MdePkg: Add TCG PFP 1.06 support. > > MdePkg: Add devAuthBoot GlobalVariable > > MdeModulePkg/Variable: Add TCG SPDM device measurement update > > SecurityPkg: Add TCG PFP 1.06 support. > > SecurityPkg: add DeviceSecurity support > > .pytool/CISettings.py: add libspdm submodule. > > .gitmodule: Add libspdm submodule for EDKII > > SecurityPkg: Add libspdm submodule > > > > .gitmodules | 3 + > > .pytool/CISettings.py | 2 + > > MdeModulePkg/MdeModulePkg.dec | 5 + > > .../Variable/RuntimeDxe/Measurement.c | 38 +- > > .../RuntimeDxe/VariableRuntimeDxe.inf | 3 + > > .../RuntimeDxe/VariableSmmRuntimeDxe.inf | 3 + > > MdePkg/Include/Guid/GlobalVariable.h | 8 +- > > MdePkg/Include/Guid/ImageAuthentication.h | 5 +- > > MdePkg/Include/IndustryStandard/Spdm.h | 1112 > > ++++++++++++++++- > > .../IndustryStandard/UefiTcgPlatform.h | 186 ++- > > .../OsStub/CryptlibWrapper/CryptlibWrapper.c | 970 ++++++++++++++ > > .../CryptlibWrapper/CryptlibWrapper.inf | 38 + > > .../OsStub/MemLibWrapper/MemLibWrapper.c | 177 +++ > > .../OsStub/MemLibWrapper/MemLibWrapper.inf | 33 + > > .../PlatformLibWrapper/PlatformLibWrapper.c | 85 ++ > > .../PlatformLibWrapper/PlatformLibWrapper.inf | 33 + > > .../SpdmLib/Include/Stub/SpdmLibStub.h | 347 +++++ > > .../SpdmLib/Include/hal/LibspdmStdBoolAlt.h | 23 + > > .../SpdmLib/Include/hal/LibspdmStdDefAlt.h | 16 + > > .../SpdmLib/Include/hal/LibspdmStdIntAlt.h | 25 + > > .../DeviceSecurity/SpdmLib/Include/hal/base.h | 94 ++ > > .../SpdmLib/Include/hal/library/debuglib.h | 39 + > > .../SpdmLib/Include/library/spdm_lib_config.h | 394 ++++++ > > .../DeviceSecurity/SpdmLib/SpdmCommonLib.inf | 47 + > > .../DeviceSecurity/SpdmLib/SpdmCryptLib.inf | 45 + > > .../SpdmLib/SpdmDeviceSecretLibNull.inf | 36 + > > .../SpdmLib/SpdmRequesterLib.inf | 59 + > > .../SpdmLib/SpdmResponderLib.inf | 61 + > > .../SpdmLib/SpdmSecuredMessageLib.inf | 44 + > > .../SpdmLib/SpdmTransportMctpLib.inf | 38 + > > .../SpdmLib/SpdmTransportPciDoeLib.inf | 38 + > > SecurityPkg/DeviceSecurity/SpdmLib/libspdm | 1 + > > .../SpdmSecurityLib/SpdmAuthentication.c | 697 +++++++++++ > > .../SpdmSecurityLib/SpdmConnectionInit.c | 481 +++++++ > > .../SpdmSecurityLib/SpdmMeasurement.c | 714 +++++++++++ > > .../SpdmSecurityLib/SpdmSecurityLib.c | 148 +++ > > .../SpdmSecurityLib/SpdmSecurityLib.inf | 54 + > > .../SpdmSecurityLib/SpdmSecurityLibInternal.h | 250 ++++ > > SecurityPkg/Include/Library/SpdmSecurityLib.h | 437 +++++++ > > SecurityPkg/Include/Library/Tpm2CommandLib.h | 23 +- > > .../Include/Protocol/DeviceSecurityPolicy.h | 133 ++ > > .../HashLibBaseCryptoRouterDxe.c | 88 +- > > .../Library/Tpm2CommandLib/Tpm2NVStorage.c | 122 +- > > SecurityPkg/SecurityPkg.ci.yaml | 17 +- > > SecurityPkg/SecurityPkg.dec | 13 +- > > SecurityPkg/SecurityPkg.dsc | 31 +- > > SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.c | 61 +- > > SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf | 4 +- > > 48 files changed, 7196 insertions(+), 85 deletions(-) create mode > > 100644 > > SecurityPkg/DeviceSecurity/OsStub/CryptlibWrapper/CryptlibWrapper.c > > create mode 100644 > > SecurityPkg/DeviceSecurity/OsStub/CryptlibWrapper/CryptlibWrapper.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/OsStub/MemLibWrapper/MemLibWrapper.c > > create mode 100644 > > SecurityPkg/DeviceSecurity/OsStub/MemLibWrapper/MemLibWrapper.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/OsStub/PlatformLibWrapper/PlatformLibWrappe > > r.c > > create mode 100644 > > SecurityPkg/DeviceSecurity/OsStub/PlatformLibWrapper/PlatformLibWrappe > > r.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/Include/Stub/SpdmLibStub.h > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdBoolAlt.h > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdDefAlt.h > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdIntAlt.h > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/base.h > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/library/debuglib.h > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/Include/library/spdm_lib_config.h > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmCommonLib.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmCryptLib.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmDeviceSecretLibNull.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmRequesterLib.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmResponderLib.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmSecuredMessageLib.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmTransportMctpLib.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmTransportPciDoeLib.inf > > create mode 160000 SecurityPkg/DeviceSecurity/SpdmLib/libspdm > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmAuthentication.c > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmConnectionInit.c > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmMeasurement.c > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLib.c > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLib.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLibInternal.h > > create mode 100644 SecurityPkg/Include/Library/SpdmSecurityLib.h > > create mode 100644 > > SecurityPkg/Include/Protocol/DeviceSecurityPolicy.h > > > > -- > > 2.26.2.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#117871): https://edk2.groups.io/g/devel/message/117871 Mute This Topic: https://groups.io/mt/105281046/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-