From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail05.groups.io (mail05.groups.io [45.79.224.7]) by spool.mail.gandi.net (Postfix) with ESMTPS id 1649D940AAE for ; Mon, 29 Apr 2024 00:33:11 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=LHDRWXDrt5+zjW2BrzHqetzIrq0OS5IaUdjYdI7+wKE=; c=relaxed/simple; d=groups.io; h=From:To:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Resent-Date:Resent-From:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20240206; t=1714350790; v=1; b=n2UihkDSTFQmOgrJIfS56w9q+NZnjRQyMN/HSN1OjtVY0AhURALkUqkamCLDXlXJ/zONQFjC I0ptxehJXpMGFb/NHjKpmGav/w17kTI0Wudl4Yyz3M9fxYiP4qcGgdRTduQLTfiIuM8VE5XLvLZ mrNHcj1CAGcQcaqzv6z9pNJontAq3TVsqSPIpzIMlgPWeyIy9z3qKEiWlpfITYXU4X80TqSpTt4 ZFd2Qsb6XLx9o8+Iloe53dgbG/IGbJA7f4BU6gJUDcaQX1peJMvYUhunIGU6ubKr8Ko/Kdm8lfk 1H5RedTA7B3rVW2gkylXkaVyZBOW+91GekciPiOAH3xpg== X-Received: by 127.0.0.2 with SMTP id 7O5iYY7687511xHALYGZNhch; Sun, 28 Apr 2024 17:33:10 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.18]) by mx.groups.io with SMTP id smtpd.web11.9409.1714350789480969298 for ; Sun, 28 Apr 2024 17:33:09 -0700 X-CSE-ConnectionGUID: sOCfPYCpRQqinlX3uCTK0Q== X-CSE-MsgGUID: GP2CXrb+S/uluPzyg3PMAg== X-IronPort-AV: E=McAfee;i="6600,9927,11057"; a="9853454" X-IronPort-AV: E=Sophos;i="6.07,238,1708416000"; d="scan'208";a="9853454" X-Received: from fmviesa003.fm.intel.com ([10.60.135.143]) by fmvoesa112.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Apr 2024 17:33:08 -0700 X-CSE-ConnectionGUID: 7kI+a9r4QPa4jAN7BVZqag== X-CSE-MsgGUID: m/8zkfx3Tbiewcq57uofgg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.07,238,1708416000"; d="scan'208";a="30401453" X-Received: from orsmsx601.amr.corp.intel.com ([10.22.229.14]) by fmviesa003.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 28 Apr 2024 17:33:08 -0700 X-Received: from orsmsx603.amr.corp.intel.com (10.22.229.16) by ORSMSX601.amr.corp.intel.com (10.22.229.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Sun, 28 Apr 2024 17:33:08 -0700 X-Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by orsmsx603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35 via Frontend Transport; Sun, 28 Apr 2024 17:33:08 -0700 X-Received: from NAM12-BN8-obe.outbound.protection.outlook.com (104.47.55.169) by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Sun, 28 Apr 2024 17:33:07 -0700 X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14) by LV3PR11MB8693.namprd11.prod.outlook.com (2603:10b6:408:215::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7519.34; Mon, 29 Apr 2024 00:33:04 +0000 X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::be3f:5a4f:5180:2ba9]) by MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::be3f:5a4f:5180:2ba9%4]) with mapi id 15.20.7519.031; Mon, 29 Apr 2024 00:33:04 +0000 From: "Yao, Jiewen" To: "Hou, Wenxing" , "devel@edk2.groups.io" , Andrew Fish , Leif Lindholm , "Kinney, Michael D" , Liming Gao , "Sean Brogan" , Joey Vagedes , "Liu, Zhiguang" , "Kumar, Rahul R" Subject: Re: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature based on PFP 1.06 spec Thread-Topic: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature based on PFP 1.06 spec Thread-Index: AQHakXaHvTHf67uoDEuNoXqn/wKphrFty3SQgAQ5EBCABXI38IAG/3Gw Date: Mon, 29 Apr 2024 00:33:04 +0000 Message-ID: References: <17C755C8DBF259BF.15491@groups.io> In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW4PR11MB5872:EE_|LV3PR11MB8693:EE_ x-ms-office365-filtering-correlation-id: 34ee834c-9e41-42f7-fd4b-08dc67e3eed3 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: =?us-ascii?Q?7DnCAacExKtuRYccUYRccd20fUjuL8Bf6HoD1EilEmPrXn4LLM7PaIS6t5rz?= =?us-ascii?Q?MG6TBkIQdvPxuhLJzAplH8Y5PznUW4nHNxv0kk7WzocgdNGaRsDzWc/XXpZW?= =?us-ascii?Q?O6o4N8bImax8FByYr1VQfR8zleaX+bWgGh4vtC44gYW2+bamM4rBzdoIh20R?= =?us-ascii?Q?nFwHcLIJSdPu/Nx8/DFosVXzSppJur+u2iGDSqhavCidn8nkgcUxrxkWOM69?= =?us-ascii?Q?Q+MzOIYI0U1wdzRS3+ZjKPjbtipnk8jdoSNHOeiOQg6mmy6TcPcw/sRJ8eUy?= =?us-ascii?Q?kcTAlCyISnMtYzu7A4NZyss/kJKa82JAm93BeUVs3man54Ji+nwVOxWGdEIP?= =?us-ascii?Q?P0EbD6oN3cYRXAi1eD2lvj3HeEIdahqX7nlC2zgeyOXx4NAkV1EAySc66pfX?= =?us-ascii?Q?Xh3lVYoJfzefhlra2go0UucrVTp8Wf6uyqfO7BzC0Jw/+I7A65PQrOc1ywk3?= =?us-ascii?Q?ODOmf/y5zBtWsljLLc59VDcAKA2LMpn9o4cEECB7Toe1L7PS8b1Up7xQRfPE?= =?us-ascii?Q?kb4dgysl3Sy2xGrB60yuDWAONYfELJmfMapGGAySjEZH/tHxBBtio4YztRts?= =?us-ascii?Q?6XRy2iEfryp//8Q28IunlG3dl4g72d/u3AgjX/Gt3GEb/dV7KVR6PDLi7VdD?= =?us-ascii?Q?30VSFvVftXmVwcAKik3lMJE5WgdjO9MJMOH2UAlz2SncUIGUlTOwqAgV7FwE?= =?us-ascii?Q?i9u5ZxwYhN1x+wA3bjkWUJHheqKEM5D4WeHEISuKxjxQALceZPlwpGAuIJu8?= =?us-ascii?Q?LLn91UKktmFcHIFe7NiEFyIxlmjmJMD9QWwpWV1q4vFdrNe+Yl4mYP2R8s9c?= =?us-ascii?Q?8Ppb6IapfzKGHZy8tBp2IxkE9pSIYkKcyTpUdTsuDlL/6TdRWkKC8uCzPSKn?= =?us-ascii?Q?nFHXPq9hXEdLnuI+Rq91a7dkRTMLre5MHAW48s6Sl36kPV2kMzb/24n3I7cp?= =?us-ascii?Q?DT/0JUXno86qOVTtZ8gOOR+vs3bxm85D3bNZucE15oBkSbJqPDbSHH8+4otO?= =?us-ascii?Q?rkLqKawQbKYZXq2syhH2xxLM7GsBhNGAnNex7LuHjRbMsTEfIFUQxz3NEvQH?= =?us-ascii?Q?SeBo/DbmkbzO2swq9W3BKhdvL8Yc80d3O+EFJQAodnqcdBA2y7rX67PKuLje?= =?us-ascii?Q?57tc6mT3fydABbV4OBRyG00SwzH05TfNo4Bt9CychVja8aEAdX+5beKtXqpm?= =?us-ascii?Q?0kINp6ZlaAV3peBj6LYIuYjGxqCCiEUp/bAZTwCRnvHEw+ip10dkZ/NfTStR?= =?us-ascii?Q?tOVzmnWVhvc+hY5uqEAZ7T9xbVtcPPO6/WknQ+VY1UgHN29//6PVbXaMwysE?= =?us-ascii?Q?g/B9ZO2356sTeAUO1Gtf9ti7?= x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?s/I8pdKVAezlDWyDQQIjprmKfRnu9vW8b2YjtMCHsUxhfzKwaZWOi4lT/tsB?= =?us-ascii?Q?jOy6ZMBItf6jJa9AqziBhzNhrZZCxqrqnIKm1tGHh1CYSppXISvl3IVdZd/9?= =?us-ascii?Q?ErgMmQRgJs3skL2InibzY5bswPXTol/SZNTtJCuwXaivrGuoYLKytO7kH30Y?= =?us-ascii?Q?0yZwRl73nRXO3aojzRrgyS6TDggzWzMta7nbFic0dWHQ4TwXZoXQP+KkPcf6?= =?us-ascii?Q?KW9EeYiefjeI1nP+tGzxZ3HfP3eU7pB4XhvFKIObWgxscA5V7YTGQ2xt2QXW?= =?us-ascii?Q?aVyhaarKi5Cya09woSNK/3O7rfoQtKKAgpqsX6nFAjsMhBRM+0Xvl/+3a6vV?= =?us-ascii?Q?oHEpGHuUZnB30JgwHkO8EEkpJRHbAwY65aWg94r3sL9PYANVLhfTaftkgSSf?= =?us-ascii?Q?5Ga/+tWFT5HbSoI3Yr71w63yaabDblL7BHGccINrdl4AH1whxQXFJpxe8Xla?= =?us-ascii?Q?4+TDwJ2JbYXR8qM2qhMfM9GCFwD2oNEVjEk/loA/GQC/PJBxh27Mtm6XsTF4?= =?us-ascii?Q?1SkE9EpQDJ930XSFjxQ/p8vDOAyIY7iQU6FPunIYf6MWNtsdAkA9Lrn6i8Xp?= =?us-ascii?Q?FBVS5jC5r7CcidBjOdWnJAwZoMEQR6IKfPHmHEOX7mdzSJ0iJaUN5kwRe2V3?= =?us-ascii?Q?2oSsMrA0m8Uer1L4jKxq2vLxUqmUaMkQIhcD+Rt6W+47C6WgDyR+mnqp/E1R?= =?us-ascii?Q?8aBvVjbbDx0fcK1VB6BRWKiOhlS0xOI2dsyXk4GAqIzSA9rtBBe4UKEuhrEP?= =?us-ascii?Q?C5TmWiFora0jaJVmMHDMACBcKAUJdnFKh5UEOUFb5o5f8cI0VPpPSgQ5MSEN?= =?us-ascii?Q?1i6oul5hQyoFpFVexF3b3TRFCPWFUm9BYt802kCkiz8TbRrXRnn6EICqJXdk?= =?us-ascii?Q?S1t9gJCVrepoxpH7CjTgTz/LWLDjMOYX3BrymckInn7C3nx9eWbSO26bj/Bc?= =?us-ascii?Q?bFqExWclmIfCGGCWz6rnfFIWElYkuC2a8/uxi8cpR8/AkCfBhEFWONurFcyo?= =?us-ascii?Q?rkeF8ai0j2kLqB+JPSnE+liFTEqcXmCqcb8DOmHFLfsj+6o7duNJi+5+xRba?= =?us-ascii?Q?uw19nHRUXrNLi73UlogsSRX5uciOjPE+iNDZ/CGQfLhr75ZJgerKxhlg9sT4?= =?us-ascii?Q?1DL80A0G9Ddq5QiBOJ9nO57I61VDk6EE/CYsqIrU9fTIh5Phutwj2oW7TPPN?= =?us-ascii?Q?6s+DEZkPAaKjaBsx8LZKrfQXc6g8AhUZw5TPoAsthlPHjAA3Ttpf2K3LWhbi?= =?us-ascii?Q?wV/JDR1+NriLTacKz17dKV/h4nZiNbtZpwRy0Htt4+LLW0xdqsvekHqQPpgN?= =?us-ascii?Q?wMNeyiaXy6Rv+kdqGGABUYbXZPUhkgcoJ2zwo9Z2oNp1WzRzZzg8bk1jwsHd?= =?us-ascii?Q?NwlmYTS1p9DxLnGipUX+ZWigWHwzUOpJlueZBJY0K0vaTeXhUUD4ER5mvNBm?= =?us-ascii?Q?T8kXQyu6foBm9Ebc0fbV+CASJd0UcYG0VewlSqF7ymbOLfFxS2L0M/OkPp2U?= =?us-ascii?Q?asDyEZ0Jmyv/lRLPHM8GnXWU8NzTUfyTlVDDmNPqAufliJ95X4NVei/5C53D?= =?us-ascii?Q?9Coia5HEFrKNXVmoCx9Hee2Fbjht/OmfoCJwMn6F?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 34ee834c-9e41-42f7-fd4b-08dc67e3eed3 X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Apr 2024 00:33:04.1401 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: d1ZzC812O41C3QhifsQd518W1Hzd9txI2UreBFGgDpxm5Yqt7ZsXZihOA2aMWInD+KipZlz1qac8c2Sp1Js/mw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: LV3PR11MB8693 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Resent-Date: Sun, 28 Apr 2024 17:33:09 -0700 Resent-From: jiewen.yao@intel.com Reply-To: devel@edk2.groups.io,jiewen.yao@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: oZm3Wl31wVg15r6AOX7nqmnjx7686176AA= Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b=n2UihkDS; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 45.79.224.7 as permitted sender) smtp.mailfrom=bounce@groups.io Hi All It has been 4 work weeks and this V4 patch resolved previous comments and f= eedbacks. If there is no further objection, I plan to merge it tomorrow. Thank you Yao, Jiewen > -----Original Message----- > From: Hou, Wenxing > Sent: Friday, April 26, 2024 9:52 AM > To: Yao, Jiewen ; devel@edk2.groups.io; Andrew Fish > ; Leif Lindholm ; Kinney, Mic= hael > D ; Liming Gao ; > Sean Brogan ; Joey Vagedes > ; Liu, Zhiguang ; Kumar, > Rahul R > Subject: RE: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature bas= ed on > PFP 1.06 spec >=20 > Hi EDKII stewards, >=20 > Could you please review the libspdm license? >=20 > The libspdm(https://github.com/DMTF/libspdm) is a implementation that fol= lows > the DMTF SPDM(https://www.dmtf.org/standards/spdm) spec. >=20 > And the libspdm library is under DMTF repo. > The license is: https://github.com/DMTF/libspdm/blob/main/LICENSE.md >=20 >=20 >=20 > Thanks, > Wenxing >=20 >=20 > -----Original Message----- > From: Yao, Jiewen > Sent: Sunday, April 21, 2024 10:31 AM > To: Hou, Wenxing ; devel@edk2.groups.io; Andrew Fi= sh > ; Leif Lindholm ; Kinney, Mic= hael > D ; Liming Gao ; > Sean Brogan ; Joey Vagedes > ; Liu, Zhiguang ; Kumar, > Rahul R > Subject: RE: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature bas= ed on > PFP 1.06 spec >=20 > All series: Reviewed-by: Jiewen Yao >=20 > Dear Steward member > Do you have any concern on adding libspdm (https://github.com/DMTF/libspd= m) > as one more submodule? >=20 > Thank you > Yao, Jiewen >=20 > > -----Original Message----- > > From: Hou, Wenxing > > Sent: Thursday, April 18, 2024 6:16 PM > > To: devel@edk2.groups.io; Andrew Fish ; Leif Lindholm > > ; Kinney, Michael D > > ; Liming Gao ; > > Sean Brogan ; Joey Vagedes > > ; Liu, Zhiguang ; > > Kumar, Rahul R ; Yao, Jiewen > > > > Subject: RE: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature > > based on PFP 1.06 spec > > > > Dear EDKII reviewers: > > > > Thank you for your previous review of this patch set. > > Currently, five patches have been reviewed by. > > > > But there are five patches need review. > > Patch1: MdePkg: Add SPDM1.2 support. > > Patch2: MdePkg: Add TCG PFP 1.06 support. > > Patch4: MdeModulePkg/Variable: Add TCG SPDM device measurement > > update > > Patch8: .gitmodule: Add libspdm submodule for EDKII > > Patch10: ReadMe.rst: Add libspdm submodule license > > > > Could you please review the PATCH v4? > > > > PS: Jiewen has reviewed all the PATCH. And I have fixed his feedback in= PATCH > v4. > > Jiewen has no questions about all the patches anymore. > > > > Thanks, > > Wenxing > > > > > > -----Original Message----- > > From: devel@edk2.groups.io On Behalf Of Wenxing > > Hou > > Sent: Thursday, April 18, 2024 5:28 PM > > To: devel@edk2.groups.io > > Cc: Andrew Fish ; Leif Lindholm > > ; Kinney, Michael D > > ; Liming Gao ; > > Sean Brogan ; Joey Vagedes > > ; Liu, Zhiguang ; > > Kumar, Rahul R ; Yao, Jiewen > > > > Subject: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature > > based on PFP > > 1.06 spec > > > > REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D2479 > > > > In PFP spec 1.06, platform firmware records the device certificate and > > device measurement for each SPDM responder. > > This PATCH set implement the DeviceSecurityLib to support spdm device > > Authentication and Measurement. > > > > Libspdm as submodule is to support DeviceSecurity feature: > > https://github.com/DMTF/libspdm > > > > TCG PFP spec 1.06: > > https://trustedcomputinggroup.org/resource/pc-client-specific-platform > > - > > firmware-profile-specification/ > > > > The POC branch: > > https://github.com/tianocore/edk2-staging/tree/DeviceSecurity > > > > And the PATCH set has passed the EDKII CI: > > https://github.com/tianocore/edk2/pull/5508 > > > > v2 changes: > > - Fix typo: PcdEnableSpdmDeviceAuthenticaion -> > > PcdEnableSpdmDeviceAuthentication > > v3 changes: > > - Add new patch 10: Update ReadMe.rst for libspdm submodule license > > v4 changes: > > - Update submodule libspdm to latest tag > > > > PATCH 3: Reviewed-by: Liming Gao PATCH 5: > > Reviewed-by: Jiewen Yao PATCH 6: Reviewed-by: > > Jiewen Yao PATCH 7: Reviewed-by: Joey Vagedes > > PATCH 9: Reviewed-by: Jiewen Yao > > > > > > Cc: Andrew Fish > > Cc: Leif Lindholm > > Cc: Michael D Kinney > > Cc: Liming Gao > > Cc: Sean Brogan > > Cc: Joey Vagedes > > Cc: Zhiguang Liu > > Cc: Rahul Kumar > > Cc: Jiewen Yao > > Signed-off-by: Wenxing Hou > > > > Wenxing Hou (10): > > MdePkg: Add SPDM1.2 support. > > MdePkg: Add TCG PFP 1.06 support. > > MdePkg: Add devAuthBoot GlobalVariable > > MdeModulePkg/Variable: Add TCG SPDM device measurement update > > SecurityPkg: Add TCG PFP 1.06 support. > > SecurityPkg: add DeviceSecurity support > > .pytool/CISettings.py: add libspdm submodule. > > .gitmodule: Add libspdm submodule for EDKII > > SecurityPkg: Add libspdm submodule > > ReadMe.rst: Add libspdm submodule license > > > > .gitmodules | 3 + > > .pytool/CISettings.py | 2 + > > MdeModulePkg/MdeModulePkg.dec | 5 + > > .../Variable/RuntimeDxe/Measurement.c | 38 +- > > .../RuntimeDxe/VariableRuntimeDxe.inf | 3 + > > .../RuntimeDxe/VariableSmmRuntimeDxe.inf | 3 + > > MdePkg/Include/Guid/GlobalVariable.h | 8 +- > > MdePkg/Include/Guid/ImageAuthentication.h | 5 +- > > MdePkg/Include/IndustryStandard/Spdm.h | 1112 ++++++++++++++++- > > .../IndustryStandard/UefiTcgPlatform.h | 186 ++- > > ReadMe.rst | 1 + > > .../OsStub/CryptlibWrapper/CryptlibWrapper.c | 970 ++++++++++++++ > > .../CryptlibWrapper/CryptlibWrapper.inf | 38 + > > .../OsStub/MemLibWrapper/MemLibWrapper.c | 177 +++ > > .../OsStub/MemLibWrapper/MemLibWrapper.inf | 33 + > > .../PlatformLibWrapper/PlatformLibWrapper.c | 85 ++ > > .../PlatformLibWrapper/PlatformLibWrapper.inf | 33 + > > .../SpdmLib/Include/Stub/SpdmLibStub.h | 347 +++++ > > .../SpdmLib/Include/hal/LibspdmStdBoolAlt.h | 23 + > > .../SpdmLib/Include/hal/LibspdmStdDefAlt.h | 16 + > > .../SpdmLib/Include/hal/LibspdmStdIntAlt.h | 25 + > > .../DeviceSecurity/SpdmLib/Include/hal/base.h | 94 ++ > > .../SpdmLib/Include/hal/library/debuglib.h | 39 + > > .../SpdmLib/Include/library/spdm_lib_config.h | 394 ++++++ > > .../DeviceSecurity/SpdmLib/SpdmCommonLib.inf | 47 + > > .../DeviceSecurity/SpdmLib/SpdmCryptLib.inf | 45 + > > .../SpdmLib/SpdmDeviceSecretLibNull.inf | 36 + > > .../SpdmLib/SpdmRequesterLib.inf | 59 + > > .../SpdmLib/SpdmResponderLib.inf | 61 + > > .../SpdmLib/SpdmSecuredMessageLib.inf | 44 + > > .../SpdmLib/SpdmTransportMctpLib.inf | 38 + > > .../SpdmLib/SpdmTransportPciDoeLib.inf | 38 + > > SecurityPkg/DeviceSecurity/SpdmLib/libspdm | 1 + > > .../SpdmSecurityLib/SpdmAuthentication.c | 697 +++++++++++ > > .../SpdmSecurityLib/SpdmConnectionInit.c | 481 +++++++ > > .../SpdmSecurityLib/SpdmMeasurement.c | 714 +++++++++++ > > .../SpdmSecurityLib/SpdmSecurityLib.c | 148 +++ > > .../SpdmSecurityLib/SpdmSecurityLib.inf | 54 + > > .../SpdmSecurityLib/SpdmSecurityLibInternal.h | 250 ++++ > > SecurityPkg/Include/Library/SpdmSecurityLib.h | 437 +++++++ > > SecurityPkg/Include/Library/Tpm2CommandLib.h | 23 +- > > .../Include/Protocol/DeviceSecurityPolicy.h | 133 ++ > > .../HashLibBaseCryptoRouterDxe.c | 88 +- > > .../Library/Tpm2CommandLib/Tpm2NVStorage.c | 122 +- > > SecurityPkg/SecurityPkg.ci.yaml | 17 +- > > SecurityPkg/SecurityPkg.dec | 13 +- > > SecurityPkg/SecurityPkg.dsc | 31 +- > > SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.c | 61 +- > > SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf | 4 +- > > 49 files changed, 7197 insertions(+), 85 deletions(-) create mode > > 100644 > > SecurityPkg/DeviceSecurity/OsStub/CryptlibWrapper/CryptlibWrapper.c > > create mode 100644 > > SecurityPkg/DeviceSecurity/OsStub/CryptlibWrapper/CryptlibWrapper.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/OsStub/MemLibWrapper/MemLibWrapper.c > > create mode 100644 > > SecurityPkg/DeviceSecurity/OsStub/MemLibWrapper/MemLibWrapper.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/OsStub/PlatformLibWrapper/PlatformLibWrappe > > r.c > > create mode 100644 > > SecurityPkg/DeviceSecurity/OsStub/PlatformLibWrapper/PlatformLibWrappe > > r.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/Include/Stub/SpdmLibStub.h > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdBoolAlt.h > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdDefAlt.h > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdIntAlt.h > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/base.h > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/library/debuglib.h > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/Include/library/spdm_lib_config.h > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmCommonLib.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmCryptLib.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmDeviceSecretLibNull.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmRequesterLib.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmResponderLib.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmSecuredMessageLib.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmTransportMctpLib.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmTransportPciDoeLib.inf > > create mode 160000 SecurityPkg/DeviceSecurity/SpdmLib/libspdm > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmAuthentication.c > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmConnectionInit.c > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmMeasurement.c > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLib.c > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLib.inf > > create mode 100644 > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLibInternal.h > > create mode 100644 SecurityPkg/Include/Library/SpdmSecurityLib.h > > create mode 100644 > > SecurityPkg/Include/Protocol/DeviceSecurityPolicy.h > > > > -- > > 2.26.2.windows.1 > > > > > > > >=20 > > -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#118357): https://edk2.groups.io/g/devel/message/118357 Mute This Topic: https://groups.io/mt/105594737/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-