From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail05.groups.io (mail05.groups.io [45.79.224.7]) by spool.mail.gandi.net (Postfix) with ESMTPS id 3F557AC097D for ; Sun, 21 Apr 2024 02:30:53 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=omsWSsS38q6VfOfZjwyoVhJVbSfy5ZaaX31QnhlkIKg=; c=relaxed/simple; d=groups.io; h=From:To:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Resent-Date:Resent-From:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20240206; t=1713666651; v=1; b=mgHrXtZGtEdAdge641ioKLWUdffZhHg3d3NxojjY/lmLSWY/vx5b4nJIp/mJw7vhLzdap1GC tN+ktfntq52+B0ZX7/NiefX/uCR43QAJAZYMsTuf5RoeJPfw7PUY4WnovxJvTPgUZENoUq8ZhVh lNnJ9Sqztl+Abm7lr7ZtzVpv1AeRk2FJ8Qrd81mHIwxl4vPVHkGLGKE4neJeHkgMPXZazM9hiXB 1CV2wx8ZbAWTEbATpwQmgOoQBMLf6utW5aOBnLTCm8ms4YR8r5YiUWFi+xkXJqNRQXCCotCctM8 8PiMWlTYsy5zcnSXPtZrizWikZVnzghe+Gw0rH5W55JMQ== X-Received: by 127.0.0.2 with SMTP id EyJkYY7687511xPB4WqZb1Lx; Sat, 20 Apr 2024 19:30:51 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.15]) by mx.groups.io with SMTP id smtpd.web10.25361.1713666650914402458 for ; Sat, 20 Apr 2024 19:30:51 -0700 X-CSE-ConnectionGUID: vkR4bi8JT/CPKAi30wDZ0w== X-CSE-MsgGUID: IRAab1yESkOsO3ZjkWdjRA== X-IronPort-AV: E=McAfee;i="6600,9927,11050"; a="13024720" X-IronPort-AV: E=Sophos;i="6.07,217,1708416000"; d="scan'208";a="13024720" X-Received: from fmviesa009.fm.intel.com ([10.60.135.149]) by orvoesa107.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Apr 2024 19:30:50 -0700 X-CSE-ConnectionGUID: DZ/gw4HjT5K6dO4D3/0QbA== X-CSE-MsgGUID: 6Cd9PjtlSImvOF+H4puoHw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.07,217,1708416000"; d="scan'208";a="23713154" X-Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16]) by fmviesa009.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 20 Apr 2024 19:30:50 -0700 X-Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Sat, 20 Apr 2024 19:30:49 -0700 X-Received: from orsmsx603.amr.corp.intel.com (10.22.229.16) by ORSMSX610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Sat, 20 Apr 2024 19:30:48 -0700 X-Received: from orsedg603.ED.cps.intel.com (10.7.248.4) by orsmsx603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35 via Frontend Transport; Sat, 20 Apr 2024 19:30:48 -0700 X-Received: from NAM10-DM6-obe.outbound.protection.outlook.com (104.47.58.100) by edgegateway.intel.com (134.134.137.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Sat, 20 Apr 2024 19:30:48 -0700 X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14) by PH0PR11MB5950.namprd11.prod.outlook.com (2603:10b6:510:14f::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7472.37; Sun, 21 Apr 2024 02:30:41 +0000 X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::be3f:5a4f:5180:2ba9]) by MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::be3f:5a4f:5180:2ba9%4]) with mapi id 15.20.7519.014; Sun, 21 Apr 2024 02:30:41 +0000 From: "Yao, Jiewen" To: "Hou, Wenxing" , "devel@edk2.groups.io" , Andrew Fish , Leif Lindholm , "Kinney, Michael D" , Liming Gao , "Sean Brogan" , Joey Vagedes , "Liu, Zhiguang" , "Kumar, Rahul R" Subject: Re: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature based on PFP 1.06 spec Thread-Topic: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature based on PFP 1.06 spec Thread-Index: AQHakXaHvTHf67uoDEuNoXqn/wKphrFty3SQgAQ5EBA= Date: Sun, 21 Apr 2024 02:30:41 +0000 Message-ID: References: <17C755C8DBF259BF.15491@groups.io> In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW4PR11MB5872:EE_|PH0PR11MB5950:EE_ x-ms-office365-filtering-correlation-id: 9cc3b10a-c1b6-4fbb-350d-08dc61ab09e7 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: =?us-ascii?Q?wiXNnHDntKrx2RZJnVJQHsitoYRBLAKMxXCM+Zm/Ocn/5gIYpdXyBqyw+JTh?= =?us-ascii?Q?cEkONLRVo58lY3Rr1OUVK8DpQjBUqnKlh1vr9MH/o9mwsc49nhvxnUsW21w0?= =?us-ascii?Q?MQgBdAVVlMs1LrJvUYGNpUBH5Voamnegn+9LZA/HlouQMRTyv8WOVSyq0SzP?= =?us-ascii?Q?tFtmHyQjNLoARfoR1FQtEH41a5ZgkrjYJ3I6K0nvYrILFkuuVkuKHvI7VXl3?= =?us-ascii?Q?zm1DZPhnJgC9NS40umC+hnBhT6aNWbM02IWcYpdRbn6ghSSKexGN/+adcRN8?= =?us-ascii?Q?hSazQrzjBRHf+vmnUZfdpjwD8RRPZ95vncRI5zOZCWMgq8WLQfCS1PKHSUaQ?= =?us-ascii?Q?tMTczrx/Ytll/+Y8Tiw+r9BHy+rinrmkmHqqwOVo/+lWyxb3QEqAH+vPPgPp?= =?us-ascii?Q?GtVFh4vtSdrzQ9iakO8a6J8KjvydVPLXso+Jppoi4S12GfQeS/yDglHe3I4q?= =?us-ascii?Q?FuYjrrGYikjFzFWLUsNGy08J3m+miEU41KgGOGSpGzq6itujx236b0ETdSyg?= =?us-ascii?Q?eGWoGivl/LWGcvUUOpuKE8TsnjKlAX9UCNP7hGRoSzvHYshTnx8V7z0YJGlK?= =?us-ascii?Q?72oI/NmTQeco3X7plzvq7/m8AJ+MNlZ2fqHFYkLjIL/6Zwi8b67Ih86Q2HRs?= =?us-ascii?Q?zQosR2FXtr03mD6SHxIP4SlOacyA6iYbids+keMN49Z3Oy2McUKiwpmlfD8v?= =?us-ascii?Q?dSare0wY1VvXAxSgQ5gi8wqdDDr/x/N8ebrRXpxu3j/n55RlSn8g75adYO8J?= =?us-ascii?Q?EezejsS+pDqzchueS3pvmzoSAbGjWx4hfsI0EN4yvBdo2eFKhPx0Ohf2WJMl?= =?us-ascii?Q?e9mHIczK0gB5ebg3NI0Q4PkLAvDNisExnIgDpJsDL0oRr9THs39b2N28syyK?= =?us-ascii?Q?Qjxvx/FCrv2CaNhLMABhmN7icW1GuTponV3GBgbB5mIJPt2XMXrSP2xUet9O?= =?us-ascii?Q?vH5KNsXDit+uMR7JzBv/SVdcgcTwDD6LFv7HKKpXEMIU4Eq7AoxQo6ksxAdy?= =?us-ascii?Q?ywoybQizeY5VtRakK8AvmvhcZJDdAVn/bu3CgDnfL65Sph/mkOmrdY5crBQg?= =?us-ascii?Q?Fukx7YCU6LD8cw+J3gtAxKXJHjdjfS2ok+tPsRUQpQqKjjUNABhm8gF/ltRy?= =?us-ascii?Q?7Pzs31dsqQsbeQqttF3tF/N+n15XClgipZictIDmrdiHIYNxPt6TqCXcdh8A?= =?us-ascii?Q?kQJUTtf7SEFQ2x6axESc2X/DNMeYZ+zrkhTB/Z/0wM1bLag0I4JZeu2+r33M?= =?us-ascii?Q?gbOdvvBX35tkNhnuYv27ugi4iRE+lZiqB82mNAHbeVAKpjxAmOszE89ua79x?= =?us-ascii?Q?dz8liHsR7qWwla4rBFEU71bG?= x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?Cix3wJeYiK/0n6wfwCTNtERilU9K7kRfTXdvsXZQjgZJ4L0KgRVuLPu49NGj?= =?us-ascii?Q?0Y3eCvI1VvCvvi2DynZLHxGXo01uiKyldYUEnTUy5//qpk5Opy/oDw9qXRiM?= =?us-ascii?Q?GR4UGjXWz8GiP6OMd5yL1Y5keJwT2F17iLYoTI+ZaXwGcf5TSUIMCbZ9xL6p?= =?us-ascii?Q?TCRJChoi6ujeWheUuO3WGDMzLxp1G23pPCKffWHGX9OTWuBg+aY/o9nH2v0E?= =?us-ascii?Q?DctI3OhDonC6HkQMDGizBhIKXzffBaf/LwyyrzsMPeY52hPEd2ACiiDsDtaL?= =?us-ascii?Q?IPhKRiZh0wz0GsKmU44tNk7LKCwTFcfTNFySjW0hUUNnZqBOYN2MeKTCVz3l?= =?us-ascii?Q?tgTaIn+Hc9jWUHckoAXPgrcDqAkGAdC6ut9ojbwSJDnhLObveAuYsi3WKOWz?= =?us-ascii?Q?jSZYANbW7BfodhCc5eK+mhWW11FWPzr+LyO7BOigRKoxUeWu3J4GB6KVfv9x?= =?us-ascii?Q?64BDV51pV29TLN2OtF7N33/rYEmovWZyYa9KCoklRvFu/c+J06Fk6S+Fbzyz?= =?us-ascii?Q?YjTBAsgemddfLTttcJBuQupBurrKdMPtfJjS1rY7NN+QzoGJjq86tT2Q61Co?= =?us-ascii?Q?5eqyZ6IBmM0hy2vzqD6ICs67iw49fvRyULtQoj6m5dU2/k7XwBf0Aqvgo4Lo?= =?us-ascii?Q?Z2uB7Bw8qRkMFAHS0d2oT0EeTYZxaEcp51Upnx1qdwkEOeLUxMexFHnEqmde?= =?us-ascii?Q?mIB5bsxjdzXedtEclqshsdPaaOpkiCpiofj3BEZPxMAo1066TBRBesJ1cWkK?= =?us-ascii?Q?FQNbVjy5GuBDDqgm1mnM2kBJrQzqXi01qdmAYMwYYNYCgD07ZrHdOWSCbyVD?= =?us-ascii?Q?oFVvsZh7zBNsBvT84DaALsSc6+Ocy45BIlSpxpYtHVFlEdqvzAT/nBwv6szc?= =?us-ascii?Q?VY0v4e7PzvJA/QgCF6jpCWmdCNG+u8MJyPeDe/L3yOj5qt2XLYRdeASPi53D?= =?us-ascii?Q?FJo8MBeiiwru/VtI47QC5P2+UjuSHHP8KKf8RxHDR+ulxXkfWec4v6pem2Y8?= =?us-ascii?Q?RsJCxlSO4gZQkiDoRavyZvDzZFKMT1N+rA0gi4Kse+K3318EykFCLGiBZHAf?= =?us-ascii?Q?8W2jAeKtmx95zZdp1A4XBXWWPyf7xS+bNhQvWvYHSgmIvq+QjnB4lpyj3+HB?= =?us-ascii?Q?/SpcMUYSSmexy0qEVveXUDlAt2RffeVYOJi7+WE4Fk70tM7NyHrQfhGOcvFR?= =?us-ascii?Q?CkJTGU5ZMRvnkULSqGq5UmUkIBriW/h3QxFwHJwoyL+NtEpV/L/ySAdKi+Vw?= =?us-ascii?Q?ZtozP714Vm5ia1J4CpZlRzRrg76qXfOAZ9YLPj6tGcuRN2Xq1wz5P67xfJYB?= =?us-ascii?Q?ksIf2cmT26RIVN9Jk6wqjOjB6EUsFlxpaSbGzD+dIZeIlu4/TwcnIvsJ585x?= =?us-ascii?Q?MwaJjV04+LZXDvtEDEVAix4mb0phFL1BZzcHLcVsOag+eqq4IOLpP0h8Ovnq?= =?us-ascii?Q?snaU85XFpwjRBkVR3DWVSkI3vjYooCS3319s3nvYhRz7CMB90IiqZMjQ2QWF?= =?us-ascii?Q?L4G03x2PzJgT+eiS+JhNijpdX8k/pF5D0AwyFRl3FZFsoCeMr2XT/5DTkrBx?= =?us-ascii?Q?g6d7h/ZF0y5y/j7TYDJFuM98qDzVy0e64SA+FByk?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 9cc3b10a-c1b6-4fbb-350d-08dc61ab09e7 X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Apr 2024 02:30:41.3145 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: xiqDZdgSfWX7ZpdK4syYTxOeMtOtXQYv85RlBdEbWL2kEpfsZJnF9lHttcioPdteV7v9vdaIdY5bnaC+v7PYSA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR11MB5950 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Resent-Date: Sat, 20 Apr 2024 19:30:51 -0700 Resent-From: jiewen.yao@intel.com Reply-To: devel@edk2.groups.io,jiewen.yao@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: Gy0Pe6A1sDwSgIbEzBs6y5byx7686176AA= Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b=mgHrXtZG; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 45.79.224.7 as permitted sender) smtp.mailfrom=bounce@groups.io All series: Reviewed-by: Jiewen Yao Dear Steward member Do you have any concern on adding libspdm (https://github.com/DMTF/libspdm)= as one more submodule? Thank you Yao, Jiewen > -----Original Message----- > From: Hou, Wenxing > Sent: Thursday, April 18, 2024 6:16 PM > To: devel@edk2.groups.io; Andrew Fish ; Leif Lindholm > ; Kinney, Michael D ; > Liming Gao ; Sean Brogan > ; Joey Vagedes ; Liu, > Zhiguang ; Kumar, Rahul R ; > Yao, Jiewen > Subject: RE: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature bas= ed on > PFP 1.06 spec >=20 > Dear EDKII reviewers: >=20 > Thank you for your previous review of this patch set. > Currently, five patches have been reviewed by. >=20 > But there are five patches need review. > Patch1: MdePkg: Add SPDM1.2 support. > Patch2: MdePkg: Add TCG PFP 1.06 support. > Patch4: MdeModulePkg/Variable: Add TCG SPDM device measurement > update > Patch8: .gitmodule: Add libspdm submodule for EDKII > Patch10: ReadMe.rst: Add libspdm submodule license >=20 > Could you please review the PATCH v4? >=20 > PS: Jiewen has reviewed all the PATCH. And I have fixed his feedback in P= ATCH v4. > Jiewen has no questions about all the patches anymore. >=20 > Thanks, > Wenxing >=20 >=20 > -----Original Message----- > From: devel@edk2.groups.io On Behalf Of Wenxing Ho= u > Sent: Thursday, April 18, 2024 5:28 PM > To: devel@edk2.groups.io > Cc: Andrew Fish ; Leif Lindholm ; > Kinney, Michael D ; Liming Gao > ; Sean Brogan ; Joey > Vagedes ; Liu, Zhiguang ; > Kumar, Rahul R ; Yao, Jiewen > Subject: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature based o= n PFP > 1.06 spec >=20 > REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D2479 >=20 > In PFP spec 1.06, platform firmware records the device certificate and de= vice > measurement for each SPDM responder. > This PATCH set implement the DeviceSecurityLib to support spdm device > Authentication and Measurement. >=20 > Libspdm as submodule is to support DeviceSecurity feature: > https://github.com/DMTF/libspdm >=20 > TCG PFP spec 1.06: > https://trustedcomputinggroup.org/resource/pc-client-specific-platform- > firmware-profile-specification/ >=20 > The POC branch: > https://github.com/tianocore/edk2-staging/tree/DeviceSecurity >=20 > And the PATCH set has passed the EDKII CI: > https://github.com/tianocore/edk2/pull/5508 >=20 > v2 changes: > - Fix typo: PcdEnableSpdmDeviceAuthenticaion -> > PcdEnableSpdmDeviceAuthentication > v3 changes: > - Add new patch 10: Update ReadMe.rst for libspdm submodule license > v4 changes: > - Update submodule libspdm to latest tag >=20 > PATCH 3: Reviewed-by: Liming Gao PATCH 5: > Reviewed-by: Jiewen Yao PATCH 6: Reviewed-by: > Jiewen Yao PATCH 7: Reviewed-by: Joey Vagedes > PATCH 9: Reviewed-by: Jiewen Yao > >=20 > Cc: Andrew Fish > Cc: Leif Lindholm > Cc: Michael D Kinney > Cc: Liming Gao > Cc: Sean Brogan > Cc: Joey Vagedes > Cc: Zhiguang Liu > Cc: Rahul Kumar > Cc: Jiewen Yao > Signed-off-by: Wenxing Hou >=20 > Wenxing Hou (10): > MdePkg: Add SPDM1.2 support. > MdePkg: Add TCG PFP 1.06 support. > MdePkg: Add devAuthBoot GlobalVariable > MdeModulePkg/Variable: Add TCG SPDM device measurement update > SecurityPkg: Add TCG PFP 1.06 support. > SecurityPkg: add DeviceSecurity support > .pytool/CISettings.py: add libspdm submodule. > .gitmodule: Add libspdm submodule for EDKII > SecurityPkg: Add libspdm submodule > ReadMe.rst: Add libspdm submodule license >=20 > .gitmodules | 3 + > .pytool/CISettings.py | 2 + > MdeModulePkg/MdeModulePkg.dec | 5 + > .../Variable/RuntimeDxe/Measurement.c | 38 +- > .../RuntimeDxe/VariableRuntimeDxe.inf | 3 + > .../RuntimeDxe/VariableSmmRuntimeDxe.inf | 3 + > MdePkg/Include/Guid/GlobalVariable.h | 8 +- > MdePkg/Include/Guid/ImageAuthentication.h | 5 +- > MdePkg/Include/IndustryStandard/Spdm.h | 1112 ++++++++++++++++- > .../IndustryStandard/UefiTcgPlatform.h | 186 ++- > ReadMe.rst | 1 + > .../OsStub/CryptlibWrapper/CryptlibWrapper.c | 970 ++++++++++++++ > .../CryptlibWrapper/CryptlibWrapper.inf | 38 + > .../OsStub/MemLibWrapper/MemLibWrapper.c | 177 +++ > .../OsStub/MemLibWrapper/MemLibWrapper.inf | 33 + > .../PlatformLibWrapper/PlatformLibWrapper.c | 85 ++ > .../PlatformLibWrapper/PlatformLibWrapper.inf | 33 + > .../SpdmLib/Include/Stub/SpdmLibStub.h | 347 +++++ > .../SpdmLib/Include/hal/LibspdmStdBoolAlt.h | 23 + > .../SpdmLib/Include/hal/LibspdmStdDefAlt.h | 16 + > .../SpdmLib/Include/hal/LibspdmStdIntAlt.h | 25 + > .../DeviceSecurity/SpdmLib/Include/hal/base.h | 94 ++ > .../SpdmLib/Include/hal/library/debuglib.h | 39 + > .../SpdmLib/Include/library/spdm_lib_config.h | 394 ++++++ > .../DeviceSecurity/SpdmLib/SpdmCommonLib.inf | 47 + > .../DeviceSecurity/SpdmLib/SpdmCryptLib.inf | 45 + > .../SpdmLib/SpdmDeviceSecretLibNull.inf | 36 + > .../SpdmLib/SpdmRequesterLib.inf | 59 + > .../SpdmLib/SpdmResponderLib.inf | 61 + > .../SpdmLib/SpdmSecuredMessageLib.inf | 44 + > .../SpdmLib/SpdmTransportMctpLib.inf | 38 + > .../SpdmLib/SpdmTransportPciDoeLib.inf | 38 + > SecurityPkg/DeviceSecurity/SpdmLib/libspdm | 1 + > .../SpdmSecurityLib/SpdmAuthentication.c | 697 +++++++++++ > .../SpdmSecurityLib/SpdmConnectionInit.c | 481 +++++++ > .../SpdmSecurityLib/SpdmMeasurement.c | 714 +++++++++++ > .../SpdmSecurityLib/SpdmSecurityLib.c | 148 +++ > .../SpdmSecurityLib/SpdmSecurityLib.inf | 54 + > .../SpdmSecurityLib/SpdmSecurityLibInternal.h | 250 ++++ > SecurityPkg/Include/Library/SpdmSecurityLib.h | 437 +++++++ > SecurityPkg/Include/Library/Tpm2CommandLib.h | 23 +- > .../Include/Protocol/DeviceSecurityPolicy.h | 133 ++ > .../HashLibBaseCryptoRouterDxe.c | 88 +- > .../Library/Tpm2CommandLib/Tpm2NVStorage.c | 122 +- > SecurityPkg/SecurityPkg.ci.yaml | 17 +- > SecurityPkg/SecurityPkg.dec | 13 +- > SecurityPkg/SecurityPkg.dsc | 31 +- > SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.c | 61 +- > SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf | 4 +- > 49 files changed, 7197 insertions(+), 85 deletions(-) create mode 10064= 4 > SecurityPkg/DeviceSecurity/OsStub/CryptlibWrapper/CryptlibWrapper.c > create mode 100644 > SecurityPkg/DeviceSecurity/OsStub/CryptlibWrapper/CryptlibWrapper.inf > create mode 100644 > SecurityPkg/DeviceSecurity/OsStub/MemLibWrapper/MemLibWrapper.c > create mode 100644 > SecurityPkg/DeviceSecurity/OsStub/MemLibWrapper/MemLibWrapper.inf > create mode 100644 > SecurityPkg/DeviceSecurity/OsStub/PlatformLibWrapper/PlatformLibWrapper.c > create mode 100644 > SecurityPkg/DeviceSecurity/OsStub/PlatformLibWrapper/PlatformLibWrapper.i= nf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/Include/Stub/SpdmLibStub.h > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdBoolAlt.h > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdDefAlt.h > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdIntAlt.h > create mode 100644 SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/base.h > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/library/debuglib.h > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/Include/library/spdm_lib_config.h > create mode 100644 SecurityPkg/DeviceSecurity/SpdmLib/SpdmCommonLib.inf > create mode 100644 SecurityPkg/DeviceSecurity/SpdmLib/SpdmCryptLib.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmDeviceSecretLibNull.inf > create mode 100644 SecurityPkg/DeviceSecurity/SpdmLib/SpdmRequesterLib.i= nf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmResponderLib.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmSecuredMessageLib.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmTransportMctpLib.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmTransportPciDoeLib.inf > create mode 160000 SecurityPkg/DeviceSecurity/SpdmLib/libspdm > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmAuthentication.c > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmConnectionInit.c > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmMeasurement.c > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLib.c > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLib.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLibInternal.h > create mode 100644 SecurityPkg/Include/Library/SpdmSecurityLib.h > create mode 100644 SecurityPkg/Include/Protocol/DeviceSecurityPolicy.h >=20 > -- > 2.26.2.windows.1 >=20 >=20 >=20 >=20 >=20 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#118050): https://edk2.groups.io/g/devel/message/118050 Mute This Topic: https://groups.io/mt/105594737/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-