From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga05.intel.com (mga05.intel.com [192.55.52.43]) by mx.groups.io with SMTP id smtpd.web09.3883.1667292963574254252 for ; Tue, 01 Nov 2022 01:56:03 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=iqn6nCcs; spf=pass (domain: intel.com, ip: 192.55.52.43, mailfrom: jiewen.yao@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1667292963; x=1698828963; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=qyZ/PehQ54LwxnLA5DR4tOnN5nJnjS22mDAhCwvDJ8M=; b=iqn6nCcssWWLe7ONFLQvHYQC5uD49VuSpTeWC8XFSdMAgDfAodTsKNb1 jRQ4REtgSRjd7MACsGaiGnnItmH3g7OFTSKFOLndlbJAl2a1fN2LkoLXU dIY5r51HyISxVcJOynPuDJu0egmfIbxssLY4TYHD9IKvsDSOSA7XPHypC P9d8S6xcDCjZK/kyDgK7HynahJiXlCBxzjidkGqgeb5+5ZF3/jOYq0YEy xGBZwL50dd0pRBrdZo0UPoMly6C15N75QHENAzcWmlIYnF5ICZ0BZg4T4 PRnNB15crU0FZX4YDubUBEZFrQkIq3/c1KqnDtxI6yzE8ZpKb/LzEVpho w==; X-IronPort-AV: E=McAfee;i="6500,9779,10517"; a="395409420" X-IronPort-AV: E=Sophos;i="5.95,230,1661842800"; d="scan'208";a="395409420" Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 Nov 2022 01:55:55 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10517"; a="667127729" X-IronPort-AV: E=Sophos;i="5.95,230,1661842800"; d="scan'208";a="667127729" Received: from fmsmsx603.amr.corp.intel.com ([10.18.126.83]) by orsmga001.jf.intel.com with ESMTP; 01 Nov 2022 01:55:54 -0700 Received: from fmsmsx603.amr.corp.intel.com (10.18.126.83) by fmsmsx603.amr.corp.intel.com (10.18.126.83) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Tue, 1 Nov 2022 01:55:54 -0700 Received: from fmsedg602.ED.cps.intel.com (10.1.192.136) by fmsmsx603.amr.corp.intel.com (10.18.126.83) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31 via Frontend Transport; Tue, 1 Nov 2022 01:55:54 -0700 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (104.47.57.175) by edgegateway.intel.com (192.55.55.71) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2375.31; Tue, 1 Nov 2022 01:55:54 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Ppwy3KpvsEJHfspCjNbMK9QWFpvlsNAhu36Z4xEWGoDqtTXUc+IsGi4HCDw47mwzfKuhuSg7RlOFQQfWmD+AggJ5gGav35dOBHHE7LyDF1lZIkPTTCfogPGq1MsrbFjG6RERS02BsF9rrEnoTZuBzVHVQcqPDSCRtwuOW3Q4xWLI/bJgqymlqHKclKo3ma2TvQ4r4JesHVMz/1yvl6IAzdjW0yqbw6VX73t9M+5HXoMSck9ljEtMYS+AONi6K6mgio72z1x5jEFqIJBVkJp8W7B4lqkODOQg2zCm/ZNOUthrLrvlwtknUaa1wQ+ija2d7qv1uYP+toqvLOF8Vgtt2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=9sM6z7D+bUuK3ue/6GEw/bIONmjfGIlCxqZo1qJKpvw=; b=G1ViGQ6eVDwqshGE3fPsP+So1Qo3D1QkjZx9xh5PAgpu83ZGh/+gSgOnoTxZS4QH7JjRrmhRSLO1HDVkjyrFlLGNUgu9g90PncqtaXcQbpGK9ge21kZjIbi3OzlUKvCl/kfgWq5jidfBfNre2a8itV384PawcfUGDHisIzOFbPC9ven9zooVojnMShixMFTmUgEf3inVJf9b8q3opTNfznUryTko2Ch1kaCnWSK8LtfPPpn0gniExgetHLYRdO2CeZAZqUAanMb6sd8kEyK/wzvOkLqU98aZRf6Q05x94JFLSaNt/qH8OyqjlZfoUS+mEdo3YsERFgf0FFHkUFyX5Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14) by DM4PR11MB7352.namprd11.prod.outlook.com (2603:10b6:8:103::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5746.28; Tue, 1 Nov 2022 08:55:51 +0000 Received: from MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::8a27:e262:8996:473]) by MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::8a27:e262:8996:473%9]) with mapi id 15.20.5723.033; Tue, 1 Nov 2022 08:55:50 +0000 From: "Yao, Jiewen" To: "Pierre.Gondois@arm.com" , "devel@edk2.groups.io" CC: Sami Mujawar , Leif Lindholm , Ard Biesheuvel , Rebecca Cran , "Kinney, Michael D" , "Gao, Liming" , "Wang, Jian J" Subject: Re: [PATCH v9 00/19] Add Raw algorithm support using Arm TRNG interface Thread-Topic: [PATCH v9 00/19] Add Raw algorithm support using Arm TRNG interface Thread-Index: AQHY6uK1wB4pqzbZT0OrC1w1fGEl2K4pyObQ Date: Tue, 1 Nov 2022 08:55:50 +0000 Message-ID: References: <20221028153259.397445-1-Pierre.Gondois@arm.com> In-Reply-To: <20221028153259.397445-1-Pierre.Gondois@arm.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-version: 11.6.500.17 dlp-product: dlpe-windows dlp-reaction: no-action authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW4PR11MB5872:EE_|DM4PR11MB7352:EE_ x-ms-office365-filtering-correlation-id: 8752a9d1-d129-4ef2-bb71-08dabbe6e05c x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MW4PR11MB5872.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230022)(39860400002)(366004)(136003)(376002)(396003)(346002)(451199015)(33656002)(86362001)(66556008)(83380400001)(5660300002)(478600001)(82960400001)(186003)(110136005)(54906003)(9686003)(122000001)(66476007)(52536014)(2906002)(4326008)(19627235002)(316002)(8676002)(966005)(107886003)(38070700005)(71200400001)(38100700002)(6506007)(8936002)(26005)(41300700001)(76116006)(66946007)(64756008)(53546011)(66446008)(7696005)(55016003);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?XJLi1Mahe3TWSXHP+lnOtF9+jztvubxzi6yN3SDoujNl58rusfO0cyDZSAmf?= =?us-ascii?Q?QCOPKJGt6jYf1jI00DlXGfU6sQ3quOXQM2xJiY1nvfva0giIuFbLTGytVTFc?= =?us-ascii?Q?pkCrmBFUDM9V9e2tHV/tExLrUZS909lGbcnSX1ETAiyGOPvmmCCVXBhlyfFS?= =?us-ascii?Q?E9/pHX02MnLCKuiwyq9rTiL8pgDAF/ksLzLSey4NBWZUfNcOLl4h+H5YVpoB?= =?us-ascii?Q?g+4y4XESBmFEaBhjCFMqFt+2MFPzthrk73Buowze63z9yo/w+TfZAM70tNXS?= =?us-ascii?Q?/JrWUT2a0Mm481fbfUSi3oxn+30GnDnCM+LWTLz2wCKcU+5t0TicgrhelKcy?= =?us-ascii?Q?ZB06qVhHQyDaloCFe13gOfr9oQ4a9hWakphoegglXRsAD/dxJr+AKkV+MNQ9?= =?us-ascii?Q?PuGCbbe6TiE+XsgbnqZp4cQ75jXAKD1jJ+10fqexlDvBKhG+xXeCAZYINm/w?= =?us-ascii?Q?QT8fuMr6A9PWAnBJ+U22nkiCohM3+sLnFlOfGN4UO/u9GBzn/O5z33BNHgWy?= =?us-ascii?Q?YoFMS8BYjuWxQ7JmcvZzQymw9iA+7UJnRYpqFbnCJ5YR63q/D75/EfrXyvIl?= =?us-ascii?Q?honIaOwIgIBzVn03dg9lc8F+DtPCpukS02DibiMcz6lcFyCJ80SvvCcx5vHp?= =?us-ascii?Q?UVblxVizO/KbN5RFaG8rDkfbnBumN+yfz1AGU6vrKrvkYtEKRLygC+uvo4zE?= =?us-ascii?Q?y7gSkJdV92IMSdFNo1v+ZI0/PoS8VDV5RC6SPPNoWwsZhuEesrCSpp/2xQeY?= =?us-ascii?Q?C3oaq0QpvFqsYhmpQj7Vs2QEJDGM/1nLdMw//b6qVuOCY4cX1OXjpnomfth2?= =?us-ascii?Q?+IYQFWGnhwPFx10u0bHyEh5BYLIuuqQ45B0DL4sU/VLeURQEvXBBCOHxppnR?= =?us-ascii?Q?zYPvd3IGrlOWdoQWs73kACnF1L3/uNb3LxdmObYLSPBjC3xztwBxhWRIYkSu?= =?us-ascii?Q?6zqWBTJuiOvP+zDXJsMdL0DM8E5LTDENbD3Z8DinNVhrBv1qP+D/Mpa3X2Ev?= =?us-ascii?Q?taTP60C8SY5W7QpdZ3knPDo0MXXikdp+Nng+t+BHOYgeQbQYXNIEs9L+kvhv?= =?us-ascii?Q?KpEIWa5J5D23La0pAfp7NhDnRJDhrzlW33/U/xTvZJsOrqfxztHkEOpdfHFs?= =?us-ascii?Q?3kNDnfs5ATbzuZUDtxcGcvBsXz3e0uBtqSXhYZPRJRfqEx6/iTeqfk6sdo3/?= =?us-ascii?Q?B30+EAGaefqxf6Xq/3+L2sBaeBTOjBDUWncui+QZOWSIaE+oPKNReeROjiOS?= =?us-ascii?Q?lXPHurxwhDlGE/j73j7RSfzT+1Q7j02ep3cRoFxYLWQmcLR9GtoKzBEepHoj?= =?us-ascii?Q?WJBayNRwINoaDNjA/5PIWnRLcdc6u+mCl3mwlVoM67G2xSwyxptlOUu52jxI?= =?us-ascii?Q?c0VOdjD4aZNCPBCsq0V941lyKSNTQ8xVsl8o16IcruhmGqkuxGQvu0hv8R6l?= =?us-ascii?Q?3jWG6/eDLozFkgKwtzr+arHG42vrAQqf+EQPFf6XpB5nLV2M5YPxHUiYhV9u?= =?us-ascii?Q?zSoLzFP+dlwmSLkz7vpu5u/p4ux3e/xY8OnwLIIx5zmlCyRMs4TEqfJ3hzDm?= =?us-ascii?Q?KTjr2h3pppmVbqZLdEAFnHzfS5yPymAKLrJfdjis?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 8752a9d1-d129-4ef2-bb71-08dabbe6e05c X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Nov 2022 08:55:50.7079 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: XRgNrE0dhaf8q+cOSmsRzZ/Kp7QNq0cl+mXMuojTB/wl1hq3rsiB3+41PFWHHkPwza0T30oEcLRVh9Wf/TaE5Q== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR11MB7352 Return-Path: jiewen.yao@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Thanks for the update. For SecurityPkg (11~18), Acked-by: Jiewen Yao Since the update is for AARCH64, I recommend to have an ARM people to give = Reviewed-by. Thank you Yao Jiewen > -----Original Message----- > From: Pierre.Gondois@arm.com > Sent: Friday, October 28, 2022 11:33 PM > To: devel@edk2.groups.io > Cc: Sami Mujawar ; Leif Lindholm > ; Ard Biesheuvel > ; Rebecca Cran ; Kinney, > Michael D ; Gao, Liming > ; Yao, Jiewen ; Wang, > Jian J > Subject: [PATCH v9 00/19] Add Raw algorithm support using Arm TRNG > interface >=20 > From: Pierre Gondois >=20 > Bugzilla: Bug 3668 (https://bugzilla.tianocore.org/show_bug.cgi?id=3D3668= ) >=20 > The Arm True Random Number Generator Firmware, Interface 1.0, > specification > defines an interface between an Operating System (OS) executing at EL1 an= d > Firmware (FW) exposing a conditioned entropy source that is provided by a > TRNG back end. > This patch-set: > - defines an Arm TRNG library class that provides an interface to access > the entropy source on a platform. > - implements an Arm TRNG library instance that uses the Arm FW-TRNG > interface. > - Adds RawAlgorithm support to RngDxe for Arm architecture using the Arm > TRNG interface. > - Enables RNG support using Arm TRNG interface for Kvmtool Guest/Virtual > firmware. >=20 > This patch-set is based on the v2 from Sami Mujawar: > [PATCH v2 0/8] Add Raw algorithm support using Arm FW-TRNG interface > v2: > https://edk2.groups.io/g/devel/message/83775 > v3: > https://edk2.groups.io/g/devel/message/90845 > https://github.com/PierreARM/edk2/tree/Arm_Trng_v3 > v4: > https://github.com/PierreARM/edk2/tree/Arm_Trng_v4 > v5: > https://github.com/PierreARM/edk2/tree/Arm_Trng_v5 > v6: > https://github.com/PierreARM/edk2/tree/Arm_Trng_v6 > v7: > https://github.com/PierreARM/edk2/tree/Arm_Trng_v7 > v8: > https://github.com/PierreARM/edk2/tree/Arm_Trng_v8 > v9: > https://github.com/PierreARM/edk2/tree/Arm_Trng_v9 >=20 > v9: > - Added BaseArmTrngLibNull as default in MdePkg/MdeLibs.dsc.inc. [Liming= ] > - Renamed TrngLib to ArmTrngLib and updated documentation, commit > messages, function names accordingly. [Jiewen, Leif] > v8: > - Added Reviewed-by/Acked-by from Leif on ArmPkg/SecurityPkg > patches. [Leif] > - Renamed FID_TRNG_* macros to ARM_SMC_ID_TRNG_*. [Leif] > v7: > - Removed Reviewed-by from Leif. > - Remove Sami's Signed-off. > V6: > - Added my signed-off on patches authored by Sami. [Leif] > - New patch to make it easier to add new libraries in alphabetical > order: ArmPkg: Sort HVC/SMC section alphbetically in ArmPkg.dsc [Leif] > - Renmaed ArmHvcNullLib to ArmHvcLibNull. [Leif] > - Added RISCV64 to the list of VALID_ARCHITECTURES for BaseTrngLibNull. > [Leif] > - Removed unnecessary space in function parameter documentation > ('[in, out]'). [Rebecca] > - Updated INF_VERSION to latest spec (1.29) for new libraries. [Rebecca] > - Dropped the following patches [Leif]: > - ArmPkg/ArmLib: Add ArmHasRngExt() > - ArmPkg/ArmLib: Add ArmReadIdIsar0() helper > - MdePkg/BaseRngLib: Rename ArmReadIdIsar0() to ArmGetFeatRng() > V5: > - Removed references in Trnglib.h to 'Special Publication' > 800-90A and 800-90C, and only reference 'Arm True Random > Number Generator Firmware, Interface 1.0' in the Arm > implementation of the TrngLib. [Jiewen] > V4: > - Removed dependencies on ArmPkg and dropped patch: > [PATCH v3 12/22] SecurityPkg: Update Securitypkg.ci.yaml > [Jiewen] > - Use a dynamically allocated array to hold available algorithms. > The array is freed in a new UNLOAD_IMAGE function and > allocated in arch specific implementations of > GetAvailableAlgorithms(), available in AArch64/AArch64Algo.c > and Arm/ArmAlgo.c. > - Correctly reference gEfiRngAlgorithmSp80090Ctr256Guid > Guid by copying its address (add missing '&'). [Jiewen] > V3: > - Address Leif's comment (moving definitions, optimizations, ...) > - Add ArmMonitorLib to choose Hvc/Smc conduit depending on a Pcd. > - Re-factor some parts of SecurityPkg/RngDxe/ to ease the addition > of new algorithms. > - Add ArmHasRngExt() function to check Arm's FEAT_RNG extension. > V2: > - Updates TrngLib definitions to use RETURN_STATUS as the return type > from the interface functions as TrngLib is base type library. > - Drops the patch "MdePkg: Add definition for NULL GUID" as there is > already an equivalent definition provided by gZeroGuid. Thus, the > use of gNullGuid has been replaced with gZeroGuid. >=20 > Pierre Gondois (11): > ArmPkg/ArmMonitorLib: Definition for ArmMonitorLib library class > ArmPkg/ArmMonitorLib: Add ArmMonitorLib > ArmPkg: Sort HVC/SMC section alphbetically in ArmPkg.dsc > ArmPkg/ArmHvcLibNull: Add NULL instance of ArmHvcLib > SecurityPkg/RngDxe: Replace Pcd with Sp80090Ctr256Guid > SecurityPkg/RngDxe: Remove ArchGetSupportedRngAlgorithms() > SecurityPkg/RngDxe: Documentation/include/parameter cleanup > SecurityPkg/RngDxe: Check before advertising Cpu Rng algo > SecurityPkg/RngDxe: Add debug warning for NULL > PcdCpuRngSupportedAlgorithm > SecurityPkg/RngDxe: Rename AArch64/RngDxe.c > SecurityPkg/RngDxe: Add Arm support of RngDxe >=20 > Sami Mujawar (8): > ArmPkg: PCD to select conduit for monitor calls > MdePkg/ArmTrngLib: Definition for Arm TRNG library class interface > MdePkg/ArmTrngLib: Add NULL instance of Arm TRNG Library > ArmPkg: Add FID definitions for Arm TRNG > ArmPkg/ArmTrngLib: Add Arm TRNG library > SecurityPkg/RngDxe: Rename RdRandGenerateEntropy to generic name > SecurityPkg/RngDxe: Add AArch64 RawAlgorithm support through > ArmTrngLib > ArmVirtPkg: Kvmtool: Add RNG support using Arm TRNG interface >=20 > ArmPkg/ArmPkg.dec | 12 +- > ArmPkg/ArmPkg.dsc | 5 +- > ArmPkg/Include/IndustryStandard/ArmStdSmc.h | 109 ++++- > ArmPkg/Include/Library/ArmMonitorLib.h | 42 ++ > ArmPkg/Library/ArmHvcLibNull/ArmHvcLibNull.c | 29 ++ > .../Library/ArmHvcLibNull/ArmHvcLibNull.inf | 22 + > ArmPkg/Library/ArmMonitorLib/ArmMonitorLib.c | 34 ++ > .../Library/ArmMonitorLib/ArmMonitorLib.inf | 29 ++ > ArmPkg/Library/ArmTrngLib/ArmTrngDefs.h | 50 +++ > ArmPkg/Library/ArmTrngLib/ArmTrngLib.c | 388 > ++++++++++++++++++ > ArmPkg/Library/ArmTrngLib/ArmTrngLib.inf | 29 ++ > ArmVirtPkg/ArmVirtKvmTool.dsc | 10 + > ArmVirtPkg/ArmVirtKvmTool.fdf | 5 + > MdePkg/Include/Library/ArmTrngLib.h | 106 +++++ > .../BaseArmTrngLibNull/BaseArmTrngLibNull.c | 121 ++++++ > .../BaseArmTrngLibNull/BaseArmTrngLibNull.inf | 30 ++ > .../BaseArmTrngLibNull/BaseArmTrngLibNull.uni | 12 + > MdePkg/MdeLibs.dsc.inc | 1 + > MdePkg/MdePkg.dec | 5 + > MdePkg/MdePkg.dsc | 1 + > .../RngDxe/AArch64/AArch64Algo.c | 72 ++++ > .../RngDxe/Arm/ArmAlgo.c | 51 +++ > .../RngDxe/{AArch64/RngDxe.c =3D> ArmRngDxe.c} | 81 +++- > .../RandomNumberGenerator/RngDxe/ArmTrng.c | 71 ++++ > .../RngDxe/Rand/RdRand.c | 14 +- > .../RngDxe/Rand/RdRand.h | 43 -- > .../RngDxe/Rand/RngDxe.c | 62 ++- > .../RandomNumberGenerator/RngDxe/RngDxe.c | 90 ++-- > .../RandomNumberGenerator/RngDxe/RngDxe.inf | 18 +- > .../RngDxe/RngDxeInternals.h | 71 ++-- > SecurityPkg/SecurityPkg.dsc | 5 +- > 31 files changed, 1462 insertions(+), 156 deletions(-) > create mode 100644 ArmPkg/Include/Library/ArmMonitorLib.h > create mode 100644 ArmPkg/Library/ArmHvcLibNull/ArmHvcLibNull.c > create mode 100644 ArmPkg/Library/ArmHvcLibNull/ArmHvcLibNull.inf > create mode 100644 ArmPkg/Library/ArmMonitorLib/ArmMonitorLib.c > create mode 100644 ArmPkg/Library/ArmMonitorLib/ArmMonitorLib.inf > create mode 100644 ArmPkg/Library/ArmTrngLib/ArmTrngDefs.h > create mode 100644 ArmPkg/Library/ArmTrngLib/ArmTrngLib.c > create mode 100644 ArmPkg/Library/ArmTrngLib/ArmTrngLib.inf > create mode 100644 MdePkg/Include/Library/ArmTrngLib.h > create mode 100644 > MdePkg/Library/BaseArmTrngLibNull/BaseArmTrngLibNull.c > create mode 100644 > MdePkg/Library/BaseArmTrngLibNull/BaseArmTrngLibNull.inf > create mode 100644 > MdePkg/Library/BaseArmTrngLibNull/BaseArmTrngLibNull.uni > create mode 100644 > SecurityPkg/RandomNumberGenerator/RngDxe/AArch64/AArch64Algo.c > create mode 100644 > SecurityPkg/RandomNumberGenerator/RngDxe/Arm/ArmAlgo.c > rename > SecurityPkg/RandomNumberGenerator/RngDxe/{AArch64/RngDxe.c =3D> > ArmRngDxe.c} (64%) > create mode 100644 > SecurityPkg/RandomNumberGenerator/RngDxe/ArmTrng.c > delete mode 100644 > SecurityPkg/RandomNumberGenerator/RngDxe/Rand/RdRand.h >=20 > -- > 2.25.1